{"id":314,"date":"2024-12-10T18:32:35","date_gmt":"2024-12-10T18:32:35","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/jahmeelcampbell\/?page_id=314"},"modified":"2024-12-11T04:56:01","modified_gmt":"2024-12-11T04:56:01","slug":"journal-entry-13","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/jahmeelcampbell\/journal-entry-13\/","title":{"rendered":"Journal Entry 13"},"content":{"rendered":"\n<p>Jahmeel C<br>Week 11 &#8211; Journal Entry 13<br>The study by Kiran Sridhar and Ming Ng examines the effectiveness of bug bounty programs,<br>where companies pay researchers to find vulnerabilities in their systems. Analyzing over 50,000<br>bug reports from Hacker One, the study finds that hacker participation is largely driven by non-<br>monetary factors with a low-price elasticity of supply 0.1 to 0.2. Newer hackers are more price<br>sensitive, while experienced ones are less so. The research shows that company size and brand<br>influence revenue or Twitter followers have little effect on the number of reports received<br>suggesting that bug bounty programs benefit companies of all sizes. However, sectors like<br>finance, healthcare, and retail tend to receive fewer valid reports possibly due to perceived risks<br>in these high-stakes industries.<br>New bug bounty programs do not significantly reduce reports to existing ones, indicating a<br>growing pool of hackers. older programs often see a decline in valid reports over time as easy<br>vulnerabilities are discovered. Expanding program scope can help maintain engagement.<br>The study highlights the need for further research to better understand factors influencing hacker<br>participation and the effectiveness of bug bounty programs in improving cybersecurity.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Jahmeel CWeek 11 &#8211; Journal Entry 13The study by Kiran Sridhar and Ming Ng examines the effectiveness of bug bounty programs,where companies pay researchers to find vulnerabilities in their systems. Analyzing over 50,000bug reports from Hacker One, the study finds that hacker participation is largely driven by non-monetary factors with a low-price elasticity of supply&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/jahmeelcampbell\/journal-entry-13\/\">Read More<\/a><\/div>\n","protected":false},"author":29731,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/jahmeelcampbell\/wp-json\/wp\/v2\/pages\/314"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/jahmeelcampbell\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/jahmeelcampbell\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jahmeelcampbell\/wp-json\/wp\/v2\/users\/29731"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jahmeelcampbell\/wp-json\/wp\/v2\/comments?post=314"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/jahmeelcampbell\/wp-json\/wp\/v2\/pages\/314\/revisions"}],"predecessor-version":[{"id":361,"href":"https:\/\/sites.wp.odu.edu\/jahmeelcampbell\/wp-json\/wp\/v2\/pages\/314\/revisions\/361"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/jahmeelcampbell\/wp-json\/wp\/v2\/media?parent=314"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}