{"id":392,"date":"2024-03-31T19:12:44","date_gmt":"2024-03-31T19:12:44","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/mgree035\/?p=392"},"modified":"2024-03-31T19:12:46","modified_gmt":"2024-03-31T19:12:46","slug":"week-12-journal-entry","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/mgree035\/2024\/03\/31\/week-12-journal-entry\/","title":{"rendered":"Week 12 &#8211; Journal Entry"},"content":{"rendered":"\n<p><strong>Read this <a href=\"https:\/\/dojmt.gov\/wp-content\/uploads\/Glasswasherparts.com_.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">sample breach letter<\/a>,  \u201cSAMPLE DATA BREACH NOTIFICATION,\u201d and describe how two different economics theories and two different social sciences theories relate to the letter.<\/strong><\/p>\n\n\n\n<p>A good way to approach this type of situation, and apply social &amp; economic theories, would be to incorporate theories based off of four perspectives that could be involved:&nbsp; the attackers, the victims, the company\/corporation, and the companies\/corporations outside of it.<\/p>\n\n\n\n<p>On the attackers\u2019 side of the equation, the Reinforcement Sensitivity Theory (RST) could provide insight as to why they may have committed the act; and it could also help the victim understand it as well from an objective point of view.&nbsp; RST, in short, posits that people will behave differently based on different sensitivities of brain systems.&nbsp; This theory involves factors like reward interest, goal-driven persistence, reward reactivity, and impulsivity; neural responses to these factors will influence a person\u2019s likelihood of getting involved with cybercrime, such as the data breach referenced in the breach letter.&nbsp; Furthermore, the Neutralization Theory could add external context relating to the justification of the crime.&nbsp; Neutralization Theory suggests that people know right from wrong, but they have already justified their behavior prior to committing the crime.&nbsp; A common example could be that the crime was committed for the benefit of their group or even their familial needs.&nbsp; It could be seen as immoral from the victim standpoint, but to them they\u2019ve already created the scenario where it isn\u2019t.<\/p>\n\n\n\n<p>On the company\u2019s or corporation\u2019s side of the equation, the Rational Choice Theory could provide insight as to what corrective actions were &amp; should be taken, as well as how they planned to go forward with those actions.&nbsp; The Rational Choice Theory suggests that people\/businesses act in their best interest; in this case, there was a data breach that lasted from Feb-Dec that put customer payment info at risk.&nbsp; It was in their best interest to delay notifying the customers until a time after the breach was discovered for the benefit of the investigation into the attack; following that, it was in their best interest to dedicate resources to work with a cybersecurity firm to ensure that no further damage was done to aid in maintaining customer satisfaction and loyalty.&nbsp; Moreover, Expected Utility Theory, a theory that suggests people make decisions based on the expected utility of different outcomes, would align well with this situation and the actions that were taken.&nbsp; Evaluating the pros and cons of dedicating more resources to the prevention of another attack would tie right into this theory.<\/p>\n\n\n\n<p>Lastly, from the perspective of other companies or corporations, this entire incident could be perceived as a risk for cooperation.&nbsp; It\u2019s going to be difficult to not take a hit to reputation after any type of cybersecurity incident.&nbsp; Companies and corporations actively try to keep their reputations as clean as possible; negative events such as this data breach will inevitably lead to attempts at\/strategies for recovering for this reputation decrease.&nbsp; Impression Management Theory encompasses this concept well; it focuses on how people manage their image and how they are seen by others, as well as how negative events can affect their image, leading to actions\/efforts to mitigate the damage done, similar to how the events in the breach letter unfolded.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Read this sample breach letter, \u201cSAMPLE DATA BREACH NOTIFICATION,\u201d and describe how two different economics theories and two different social sciences theories relate to the letter. A good way to approach this type of situation, and apply social &amp; economic theories, would be to incorporate theories based off of four perspectives that could be involved:&nbsp; &hellip; <\/p>\n<p><a class=\"more-link btn\" href=\"https:\/\/sites.wp.odu.edu\/mgree035\/2024\/03\/31\/week-12-journal-entry\/\">Continue reading<\/a><\/p>\n","protected":false},"author":26743,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[5],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/mgree035\/wp-json\/wp\/v2\/posts\/392"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/mgree035\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/mgree035\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/mgree035\/wp-json\/wp\/v2\/users\/26743"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/mgree035\/wp-json\/wp\/v2\/comments?post=392"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/mgree035\/wp-json\/wp\/v2\/posts\/392\/revisions"}],"predecessor-version":[{"id":393,"href":"https:\/\/sites.wp.odu.edu\/mgree035\/wp-json\/wp\/v2\/posts\/392\/revisions\/393"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/mgree035\/wp-json\/wp\/v2\/media?parent=392"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/mgree035\/wp-json\/wp\/v2\/categories?post=392"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/mgree035\/wp-json\/wp\/v2\/tags?post=392"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}