{"id":296,"date":"2025-04-28T20:30:55","date_gmt":"2025-04-28T20:30:55","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/iholl003\/?page_id=296"},"modified":"2025-04-28T20:31:43","modified_gmt":"2025-04-28T20:31:43","slug":"journal-entry-13","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/iholl003\/sample-page\/cyse-201s\/journal-entries\/journal-entry-13\/","title":{"rendered":"Journal Entry # 13"},"content":{"rendered":"\n<p>A later module addresses cybersecurity policy through a social science framework. At this point,<br>attention can be drawn to one type of policy, known as bug bounty policies. These policies pay<br>individuals for identifying vulnerabilities in a company\u2019s cyber infrastructure. To identify the<br>vulnerabilities, ethical hackers are invited to try explore the cyber infrastructure using their<br>penetration testing skills. The policies relate to economics in that they are based on<br>cost\/benefits principles. Read this<br>article https:\/\/academic.oup.com\/cybersecurity\/article\/7\/1\/tyab007\/6168453?login=trueLinks<br>to an external site. and write a summary reaction to the use of the policies in your<br>journal. Focus primarily on the literature review and the discussion of the findings.<br>The article \u201cHacking for good: Leveraging HackerOne data to develop an economic model of<br>Bug Bounties\u201d looks at the efficiency of bug bounty programs through an economic perspective<br>that focusses on how these programs operate within the gig economy. In the literature review,<br>the authors emphasize how bug bounties have been commended as cost efficient tools for<br>cybersecurity, allowing companies to crowdsource vulnerability identification from ethical<br>hackers. The review also talks about economic theories like price elasticity and non-monetary<br>motivation, setting up a foundation for understanding why security researchers choose to<br>participate in these programs. The study showed interesting data, proposing that most ethical<br>hackers are motivated by more than just financial incentives, as reflected in the low-price<br>elasticity of supply. The study finds that a company\u2019s revenue or popularity doesn\u2019t significantly<br>affect the number of valid vulnerabilities it receives, suggesting that smaller or less recognized<br>organizations can benefit just as much from bug bounty programs as larger firms. However,<br>companies in certain industries like finance, retail, and healthcare tend to receive fewer valid<br>reports. Over time, programs tend to receive fewer valid bug reports, possibly because the<br>most detectible vulnerabilities have already been discovered. Expanding the code base<br>available for testing could help combat this decline. Overall, the findings support the idea that<br>bug bounty programs can be both economically sustainable and effective, especially when<br>designed to maintain engagement over time.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A later module addresses cybersecurity policy through a social science framework. At this point,attention can be drawn to one type of policy, known as bug bounty policies. These policies payindividuals for identifying vulnerabilities in a company\u2019s cyber infrastructure. To identify&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/iholl003\/sample-page\/cyse-201s\/journal-entries\/journal-entry-13\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":30376,"featured_media":0,"parent":232,"menu_order":13,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/iholl003\/wp-json\/wp\/v2\/pages\/296"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/iholl003\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/iholl003\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/iholl003\/wp-json\/wp\/v2\/users\/30376"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/iholl003\/wp-json\/wp\/v2\/comments?post=296"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/iholl003\/wp-json\/wp\/v2\/pages\/296\/revisions"}],"predecessor-version":[{"id":298,"href":"https:\/\/sites.wp.odu.edu\/iholl003\/wp-json\/wp\/v2\/pages\/296\/revisions\/298"}],"up":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/iholl003\/wp-json\/wp\/v2\/pages\/232"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/iholl003\/wp-json\/wp\/v2\/media?parent=296"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}