{"id":313,"date":"2024-12-10T18:32:35","date_gmt":"2024-12-10T18:32:35","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/jahmeelcampbell\/?page_id=313"},"modified":"2024-12-11T04:54:41","modified_gmt":"2024-12-11T04:54:41","slug":"journal-entry-12","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/jahmeelcampbell\/journal-entry-12\/","title":{"rendered":"Journal Entry 12"},"content":{"rendered":"\n<p>Jahmeel C<br>Week 11 &#8211; Journal Entry 12<br>Economic Theories<br>Asymmetric Information Theory Akerlof&#8217;s &#8220;Market for Lemons&#8221;<br>Theory When one side of a transaction has more or better information than the other, this<br>is referred to as asymmetric information, and it can cause market inefficiencies. George<br>Akerlof&#8217;s &#8220;Market for Lemons&#8221; highlighted how this dynamic can result in bad choices<br>when customers are unable to evaluate a good or service&#8217;s quality because they are<br>missing important information.<br>Relation In this instance, the business knew more about the data leak than the clients did.<br>The corporation kept customers in the dark about the possible exploitation of their data<br>by postponing the notification for months after the breach. Without timely information,<br>customers were left vulnerable to identity theft. Highlighting the inefficiencies and<br>danger posed by the company&#8217;s delayed disclosure of important information.<br>Principal-Agent Theory<br>Theory The principal-agent theory deals with the potential misalignment of incentives between<br>the principal employer and the agent contracted party.<br>Relation The company principal depended on the agent, a third-party platform provider, to<br>handle its website and client information. A principal-agent issue was exposed when the<br>platform&#8217;s security failed, resulting in the hack. Despite depending on the platform provider to<br>guarantee data security, the corporation is still accountable for the breach and must deal with<br>consumer notifications and reputational damage.<br>Social Science Theories<br>Social Contract Theory<br>Theory According to the social contract theory, people agree to certain limitations in return for<br>security and advantages from organizations or governments.<br>Relation Customers have implicit faith that the business will safeguard their personal<br>information. The company violated its social contract with consumers by neglecting to<br>secure that information and postponing disclosure, eroding confidence and failing to<br>safeguard them from the possibility of harm.<br>conflict Theory<br>Theory Conflict theory argues that society is divided into groups that have unequal access to<br>power, resources, and opportunities. Those with power the wealthy often exploit those with less<br>power the lower class, which creates conflict between these groups.<br>Relation The company\u2019s failure to secure customer data reflects a power imbalance. The<br>company holds control over customer information, yet its actions put consumers at risk without<br>immediate consequences for itself. While consumers are at risk of danger and vulnerability.<\/p>\n\n\n\n<p>conflict Theory<br>Theory Conflict theory argues that society is divided into groups that have unequal access to<br>power, resources, and opportunities. Those with power the wealthy often exploit those with less<br>power the lower class, which creates conflict between these groups.<br>Relation The company\u2019s failure to secure customer data reflects a power imbalance. The<br>company holds control over customer information, yet its actions put consumers at risk without<br>immediate consequences for itself. While consumers are at risk of danger and vulnerability.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Jahmeel CWeek 11 &#8211; Journal Entry 12Economic TheoriesAsymmetric Information Theory Akerlof&#8217;s &#8220;Market for Lemons&#8221;Theory When one side of a transaction has more or better information than the other, thisis referred to as asymmetric information, and it can cause market inefficiencies. GeorgeAkerlof&#8217;s &#8220;Market for Lemons&#8221; highlighted how this dynamic can result in bad choiceswhen customers are&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/jahmeelcampbell\/journal-entry-12\/\">Read More<\/a><\/div>\n","protected":false},"author":29731,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/jahmeelcampbell\/wp-json\/wp\/v2\/pages\/313"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/jahmeelcampbell\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/jahmeelcampbell\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jahmeelcampbell\/wp-json\/wp\/v2\/users\/29731"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jahmeelcampbell\/wp-json\/wp\/v2\/comments?post=313"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/jahmeelcampbell\/wp-json\/wp\/v2\/pages\/313\/revisions"}],"predecessor-version":[{"id":360,"href":"https:\/\/sites.wp.odu.edu\/jahmeelcampbell\/wp-json\/wp\/v2\/pages\/313\/revisions\/360"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/jahmeelcampbell\/wp-json\/wp\/v2\/media?parent=313"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}