Journal Entry #11

For the sample breach letter two economic theories that describe relate to the letter are Rational choice and I said this because the company had decided to use a 3rd party company to handle the site instead of taking that on themselves leading to the information being part of that hack. And on top of that the 3rd party did not have the proper malware or detection system that would have prevented the hack and not had It go unnoticed for so long. Another theory is the classical economic theory and I say this because it is a possibility that if there was more government involvement the company would have had what it needed to prevent the hack in the first place. For the social theories that relate, one is the conflict theory this is because those who can hack and gain access to these databases have control over the finances of the people who use these companies and have the upper hand on them because in most cases by the time, they figure it out its already too late. Symbolic Interactionism, because in this case the hackers are interacting with the companies financial records and are stealing private data from them for their own financial gains.