{"id":218,"date":"2024-12-09T03:58:08","date_gmt":"2024-12-09T03:58:08","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyse201s-aboyd018\/?p=218"},"modified":"2024-12-09T03:58:08","modified_gmt":"2024-12-09T03:58:08","slug":"journal-12","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/cyse201s-aboyd018\/2024\/12\/09\/journal-12\/","title":{"rendered":"Journal #12"},"content":{"rendered":"\n<p><strong>Read this <\/strong><a href=\"https:\/\/dojmt.gov\/wp-content\/uploads\/Glasswasherparts.com_.pdf\"><strong>https:\/\/dojmt.gov\/wp-content\/uploads\/Glasswasherparts.com_.pdf<\/strong><\/a><strong> sample breach letter \u201cSAMPLE DATA BREACH NOTIFICATION\u201d and describe how two different economics theories and two different social sciences theories relate to the letter.<\/strong><\/p>\n\n\n\n<p>This letter on data breaches relates to different economic theories and social science theories. One economic theory that relates to this letter is market failure theory because the data breach is an example of market failure as the security measures were not effective enough to protect consumers\u2019 data. Another economic theory that relates to this letter is transaction cost theory as it focuses on the costs associated with economic exchanges, and the data breach involves a failure in managing the costs associated with protecting consumers\u2019 data. A social science theory that relates to this letter is social contract theory as it focuses on individuals consent to certain rules in exchange for the benefits of participating in a community. They trust the company to protect their information, and this letter discusses a data breach that would damage that trust. This letter also relates to the symbolic interactionism theory as it focuses on how symbols influence interactions between individuals, and this letter is essentially a symbolic interaction between the company and its customers.&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Read this https:\/\/dojmt.gov\/wp-content\/uploads\/Glasswasherparts.com_.pdf sample breach letter \u201cSAMPLE DATA BREACH NOTIFICATION\u201d and describe how two different economics theories and two different social sciences theories relate to the letter. This letter on data breaches relates to different economic theories and social science&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/cyse201s-aboyd018\/2024\/12\/09\/journal-12\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":28263,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/cyse201s-aboyd018\/wp-json\/wp\/v2\/posts\/218"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/cyse201s-aboyd018\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/cyse201s-aboyd018\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse201s-aboyd018\/wp-json\/wp\/v2\/users\/28263"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse201s-aboyd018\/wp-json\/wp\/v2\/comments?post=218"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/cyse201s-aboyd018\/wp-json\/wp\/v2\/posts\/218\/revisions"}],"predecessor-version":[{"id":219,"href":"https:\/\/sites.wp.odu.edu\/cyse201s-aboyd018\/wp-json\/wp\/v2\/posts\/218\/revisions\/219"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/cyse201s-aboyd018\/wp-json\/wp\/v2\/media?parent=218"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse201s-aboyd018\/wp-json\/wp\/v2\/categories?post=218"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse201s-aboyd018\/wp-json\/wp\/v2\/tags?post=218"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}