{"id":316,"date":"2025-08-09T01:02:22","date_gmt":"2025-08-09T01:02:22","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/pierceferguson\/?p=316"},"modified":"2025-08-09T01:02:22","modified_gmt":"2025-08-09T01:02:22","slug":"module-11-journal-entry-1","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/pierceferguson\/2025\/08\/09\/module-11-journal-entry-1\/","title":{"rendered":"Module 11 Journal Entry 1"},"content":{"rendered":"\n<p>Economics and cybersecurity are more closely connected than one might think. Like in any career, economics influences the decisions that businesses and organizations make when managing their operations and employees, but this is especially evident in the field of cybersecurity. Economic theories are developed to illustrate how different economies are managed. The letter provided to us, titled \u201cSAMPLE DATA BREACH NOTIFICATION,\u201d showcases a few of these economic theories.<br><br>The first economic theory that can be identified in this letter is the Rational Choice theory, which suggests that people and organizations make decisions based on their best interests. Naturally, it would be in the company\u2019s best interest to prevent future cyberattacks or remove malware from their servers. Therefore, for GlassWasherParts to hire a cybersecurity firm to eliminate the malware and monitor their platform to protect customer information aligns with Rational Choice theory. This benefits both the customer and the business.<br><br>The second economic theory derived from this letter is Laissez-Faire economics, similar to Classical economic theory. Both theories advocate that the government should avoid intervening in the economy. However, in laissez-faire theory, the government should always protect people\u2019s natural rights. In this case, GlassWasherParts contacted federal law enforcement to investigate the data breach since customer personal information was stolen. Because law enforcement was involved, this exemplifies laissez-faire theory.<br><br>Additionally, this letter presents two examples of social science theories. The first is Reinforcement Sensitivity Theory (RST), which explains how individuals rationalize rewards and risks based on their behavior. Here, the cybercriminals used malware to steal customers\u2019 card information, seeking a high reward with low risk.<br><br>The second is Conflict Theory, which describes society functioning through power differences and inequalities. The breach highlights the imbalance between the company and the customer. While the company risks losing trust, the customers are more at risk because their personal information is compromised. This illustrates an imbalance of power and inequality, making Conflict Theory relevant here.<\/p>\n\n\n\n<p class=\"has-large-font-size\"><strong>References<\/strong><\/p>\n\n\n\n<p><em>Sample Data Breach Notification<\/em>, dojmt.gov\/wp-content\/uploads\/Glasswasherparts.com_.pdf. Accessed 30 July 2025.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Economics and cybersecurity are more closely connected than one might think. Like in any career, economics influences the decisions that businesses and organizations make when managing their operations and employees, but this is especially evident in the field of cybersecurity. Economic theories are developed to illustrate how different economies are managed. The letter provided to&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/pierceferguson\/2025\/08\/09\/module-11-journal-entry-1\/\">Read More<\/a><\/div>\n","protected":false},"author":30972,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/pierceferguson\/wp-json\/wp\/v2\/posts\/316"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/pierceferguson\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/pierceferguson\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/pierceferguson\/wp-json\/wp\/v2\/users\/30972"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/pierceferguson\/wp-json\/wp\/v2\/comments?post=316"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/pierceferguson\/wp-json\/wp\/v2\/posts\/316\/revisions"}],"predecessor-version":[{"id":320,"href":"https:\/\/sites.wp.odu.edu\/pierceferguson\/wp-json\/wp\/v2\/posts\/316\/revisions\/320"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/pierceferguson\/wp-json\/wp\/v2\/media?parent=316"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/pierceferguson\/wp-json\/wp\/v2\/categories?post=316"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/pierceferguson\/wp-json\/wp\/v2\/tags?post=316"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}