Journal Entry #11


Read this https://dojmt.gov/wp-
content/uploads/Glasswasherparts.com_.pdf sample breach letter
“SAMPLE DATA BREACH NOTIFICATION” and describe how two
different economics theories and two different social sciences
theories relate to the letter.

In this sample breach notification, a major company is letting their customers know that they have been investigating a breach that occurred through their third-party platform provider. This breach included the retrieval of customers information including their first and last names and also their card information. Two economic theories that I feel as though can relate to this breach notification are both the Marxian, and rational choice theory. The Marxian economic theory suggests that those with power (more money) exploit those with less power (poor or less money). This relates to cybersecurity because those who have more power in technology can exploit those without. In relation to this breach, someone had the richness in technical knowledge to gain a lot of debit and credit card numbers in order to try and obtain even more money. The rational choice economic theory suggests that individuals or businesses make choices in their best interest (Pleasure versus pain). For example, in regards to cybersecurity, deciding whether or not to invest in malware. This relates to the breach notification because going forward the sample company will need to decide if they want to invest into higher security protocols to protect their business and their customers. The first social science theory that relates to this sample document is the conflict theory. This theory introduces by Karl Marx suggest that different groups in society are competing for limited resources. It relates to this cybersecurity topic because we have social group of hackers who use their technology skills to gain power over others in society. The next social science theory I feel as though can relate to this letter is the social identity theory. I chose this theory because it explains how people develop their identity mainly through interacting with society. Those who hack systems and take others identity may be trying to hide their own identity. They could want to hide their own identity or use someone else for a number of reasons that may also be explained through social science. It could be because they don’t have money, don’t like themselves or want to commit cyber crimes as someone else.

Leave a Reply

Your email address will not be published. Required fields are marked *