Read this article, https://academic.oup.com/cybersecurity/article/7/1/tyab007/6168453?login=true and write a summary reaction to the use of the policies in your journal. Focus primarily on the literature review and the discussion of the findings.
The use of these policies is beneficial to several organizations, especially smaller-grade ones. These bug bounty policies address the current shortage of cyber security professionals by allowing third-party sources to track vulnerabilities in systems. Since it can be difficult for smaller companies to employ cyber security professionals, bug bounties can be used to save money while still maintaining security. The evidence provided within this article shows that bug bounties are an effective approach to cybersecurity. I believe policies such as these can be beneficial not just to the organization, but to the third-party hired actors. This can help them gain experience to eventually become a cybersecurity professional.