{"id":330,"date":"2023-11-10T16:02:48","date_gmt":"2023-11-10T16:02:48","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/kendaltaylor\/?p=330"},"modified":"2023-11-10T16:02:48","modified_gmt":"2023-11-10T16:02:48","slug":"economics-social-theories-in-a-breach","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/kendaltaylor\/2023\/11\/10\/economics-social-theories-in-a-breach\/","title":{"rendered":"Economics &amp; Social Theories in a Breach"},"content":{"rendered":"\n<p>Read this sample breach letter and describe how two different economics theories and two different social sciences theories relate to the letter.<br><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<p>        After reading this case study, I believe that the rational choice economic theory could apply to this case study. This is due to the fact that it would be in the company\u2019s best interest to make rational choices for their customers and for cybersecurity improvements after the breach. Another economic theory that relates to this is the Marxian economic theory. This is because those with \u201cpower\u201d over an organization\u2019s cyber security, such as the hackers, exploited an organization without proper cybersecurity power for economic gain. It is likely that the data was sold for profit with solely the hacker\u2019s interest in mind.\u00a0<\/p>\n\n\n\n<p>        An example of a social science theory that can relate to the letter would be neutralization theory. This is because the hackers likely tried to rationalize their behavior, since the breach went on for so long. Personality theories can also be used here, since these are clearly Blackhat hackers that are infiltrating the network. A black hat hacker t engages in criminal hacking, and a common personality theory trait is an \u2018openness to experience\u2019.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Read this sample breach letter and describe how two different economics theories and two different social sciences theories relate to the letter. After reading this case study, I believe that the rational choice economic theory could apply to this case study. This is due to the fact that it would be in the company\u2019s best&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/kendaltaylor\/2023\/11\/10\/economics-social-theories-in-a-breach\/\">Read More<\/a><\/div>\n","protected":false},"author":27206,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/kendaltaylor\/wp-json\/wp\/v2\/posts\/330"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/kendaltaylor\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/kendaltaylor\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/kendaltaylor\/wp-json\/wp\/v2\/users\/27206"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/kendaltaylor\/wp-json\/wp\/v2\/comments?post=330"}],"version-history":[{"count":3,"href":"https:\/\/sites.wp.odu.edu\/kendaltaylor\/wp-json\/wp\/v2\/posts\/330\/revisions"}],"predecessor-version":[{"id":333,"href":"https:\/\/sites.wp.odu.edu\/kendaltaylor\/wp-json\/wp\/v2\/posts\/330\/revisions\/333"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/kendaltaylor\/wp-json\/wp\/v2\/media?parent=330"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/kendaltaylor\/wp-json\/wp\/v2\/categories?post=330"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/kendaltaylor\/wp-json\/wp\/v2\/tags?post=330"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}