Read this article: https://academic.oup.com/cybersecurity/article/7/1/tyab007/6168453?login=true and write a summary reaction to the use of the policies in your journal. Focus primarily on the literature review and the discussion of the findings.
In the article “Hacking for Good: Leveraging HackerOne Data to develop an Economic Model of Bug Bounties” by Kiran Sridhar and Ming Ng, the research findings on bug bounty programs present a significant contribution to the understanding of crowdsourced cybersecurity and bring light to the motivations of hackers who participate in bug bounty programs. These programs allow the organization to open up their systems to attack from these freelancers without risking the loss of sensitive information. The effectiveness of bug bounties across companies may vary; however, knowing where an organization’s security is valuable can be invaluable when preventing cyber criminals from causing large amounts of damage to organizations and their reputations. The study revealed that programs receive fewer valid reports over time, highlighting a temporal aspect that requires further investigation. Despite the comprehensive data, acknowledging gaps in understanding bug bounty markets emphasizes the complexity of hacker motivations and the necessity of further research into factors influencing hacker supply. This research is a critical step in further understanding the dynamics of bug bounty markets, providing a foundation for future studies to enhance understanding of this vital cybersecurity tool.