{"id":64,"date":"2024-08-05T01:05:33","date_gmt":"2024-08-05T01:05:33","guid":{"rendered":"https:\/\/student.wp.odu.edu\/atrev004\/?p=64"},"modified":"2024-08-05T01:05:33","modified_gmt":"2024-08-05T01:05:33","slug":"module-11-journal","status":"publish","type":"post","link":"https:\/\/student.wp.odu.edu\/atrev004\/2024\/08\/05\/module-11-journal\/","title":{"rendered":"MODULE 11 JOURNAL"},"content":{"rendered":"\n<p>Alexander Trevino<br>Professor Umphlet<br>CYSE201S<br>Due: July 21, 2024<br>MODULE 11 JOURNAL<br>The letter Glasswasherparts.com provides a clear example of how economic and social<br>science theories can be applied in responding to cybersecurity incidents. In economic terms,<br>cost-benefit analysis is evident in the company&#8217;s approach to managing the breach. The letter<br>outlines actions such as investigating the breach, securing systems, and offering credit<br>monitoring services. These steps show how the company weighed the costs of these measures<br>against the benefits of reducing damage and maintaining customer trust, aiming to minimize<br>financial losses and protect its reputation. Another economic concept, externalities, is also<br>relevant here, as the breach impacts not just the company but also the customers. The letter<br>addresses these external effects by providing solutions like credit monitoring and advice on<br>protecting personal information, thus attempting to lessen the negative impact on customers.<br>From a social sciences perspective, social trust theory is reflected in the company\u2019s effort<br>to communicate transparently with customers about the breach. The letter explains what<br>happened, what data was compromised, and what steps are being taken to address the issue. By<br>providing detailed information and support, the company aims to rebuild trust and maintain long-<br>term customer relationships. Additionally, risk perception theory is addressed by acknowledging<br>the potential risks customers might feel after the breach and offering practical advice to protect<br>themselves. This shows the company\u2019s understanding of customers&#8217; heightened sense of<br>vulnerability and its effort to help manage and alleviate these perceived risks.<br>Trevino2<br>In summary, the Glasswasherparts.com data breach notification letter illustrates the application<br>of economic theories like cost-benefit analysis and externalities, as well as social science theories<br>such as social trust and risk perception. These theories guide the company&#8217;s response, focusing<br>on minimizing economic impact and addressing customer concerns to maintain trust and<br>security.<br>Trevino3<br>References<br>Sample Data Breach Notification. (n.d.). Retrieved from https:\/\/dojmt.gov\/wp-<br>content\/uploads\/Glasswasherparts.com_.pdf.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Alexander TrevinoProfessor UmphletCYSE201SDue: July 21, 2024MODULE 11 JOURNALThe letter Glasswasherparts.com provides a clear example of how economic and socialscience theories can be applied in responding to cybersecurity incidents. In economic terms,cost-benefit analysis is evident in the company&#8217;s approach to managing&#8230; <a class=\"more-link\" href=\"https:\/\/student.wp.odu.edu\/atrev004\/2024\/08\/05\/module-11-journal\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":26774,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/student.wp.odu.edu\/atrev004\/wp-json\/wp\/v2\/posts\/64"}],"collection":[{"href":"https:\/\/student.wp.odu.edu\/atrev004\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/student.wp.odu.edu\/atrev004\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/atrev004\/wp-json\/wp\/v2\/users\/26774"}],"replies":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/atrev004\/wp-json\/wp\/v2\/comments?post=64"}],"version-history":[{"count":1,"href":"https:\/\/student.wp.odu.edu\/atrev004\/wp-json\/wp\/v2\/posts\/64\/revisions"}],"predecessor-version":[{"id":65,"href":"https:\/\/student.wp.odu.edu\/atrev004\/wp-json\/wp\/v2\/posts\/64\/revisions\/65"}],"wp:attachment":[{"href":"https:\/\/student.wp.odu.edu\/atrev004\/wp-json\/wp\/v2\/media?parent=64"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/student.wp.odu.edu\/atrev004\/wp-json\/wp\/v2\/categories?post=64"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/student.wp.odu.edu\/atrev004\/wp-json\/wp\/v2\/tags?post=64"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}