{"id":84,"date":"2025-04-05T19:14:53","date_gmt":"2025-04-05T19:14:53","guid":{"rendered":"https:\/\/student.wp.odu.edu\/cvanc003\/?p=84"},"modified":"2025-04-05T19:14:54","modified_gmt":"2025-04-05T19:14:54","slug":"cyse-201s-week-12-journal-entry-12","status":"publish","type":"post","link":"https:\/\/student.wp.odu.edu\/cvanc003\/2025\/04\/05\/cyse-201s-week-12-journal-entry-12\/","title":{"rendered":"CYSE 201S \/ Week 12 &#8211; Journal Entry 12"},"content":{"rendered":"\n<p><strong>Cybersecurity and the Social Sciences (CYSE 201S)<\/strong><\/p>\n\n\n\n<p><em>Read this <a href=\"https:\/\/dojmt.gov\/wp-content\/uploads\/Glasswasherparts.com_.pdf\">https:\/\/dojmt.gov\/wp-content\/uploads\/Glasswasherparts.com_.pdfLinks to an external site.<\/a> sample breach letter \u201cSAMPLE DATA BREACH NOTIFICATION\u201d and describe how two different economics theories and two different social sciences theories relate to the letter.<\/em><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Economic Theories<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">Marxian Economic Theory<\/h3>\n\n\n\n<p>Marxian Economic Theory, when relating to cybersecurity, explains how massive companies with power hoard and exploit the data of those without power over them (their consumers). With the way data is monetized, companies should be forced to better protect the data they store and better inform their consumers when a breach occurs. Due to the immense power these companies typically have, the consumer ultimately suffers by simply being offered services like Identity Monitoring. If the power wasn\u2019t with the company but was with someone with vested interest in the security of the data, letters like this would be unnecessary.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Keynesian Economic Theory<\/h3>\n\n\n\n<p>Keynesian Economic Theory emphasizes the role of institutions and government in stabilizing economic activity. In relation to cybersecurity and this letter, by notifying consumers, the company is following legal obligations as the company operates within a regulated framework put in place by the government to support consumer confidence. It reflects the idea that public intervention (like mandatory breach reporting laws) can help correct market failures and protect the broader economy.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Social Science Theories<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">Trust Theory | Sociology<\/h3>\n\n\n\n<p>The letter is a communication tool with the intent to rebuild and maintain consumer trust after it\u2019s been damaged. Offering identity protection services and expressing regret aligns with the idea that trust can be repaired through transparency, responsibility, and sincere concern.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Risk Perception Theory | Psychology<\/h3>\n\n\n\n<p>This theory helps explain how clear, calming language and concrete actions (like credit monitoring) shape public response. How individuals interpret and react to the breach depends on their perceived risk. By explaining what happened and the steps being taken, the company attempts to manage fear and anxiety in hopes the consumer perceives this with minimal risk.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity and the Social Sciences (CYSE 201S) Read this https:\/\/dojmt.gov\/wp-content\/uploads\/Glasswasherparts.com_.pdfLinks to an external site. sample breach letter \u201cSAMPLE DATA BREACH NOTIFICATION\u201d and describe how two different economics theories and two different social sciences theories relate to the letter. Economic Theories Marxian Economic Theory Marxian Economic Theory, when relating to cybersecurity, explains how massive companies with &hellip; <a href=\"https:\/\/student.wp.odu.edu\/cvanc003\/2025\/04\/05\/cyse-201s-week-12-journal-entry-12\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">CYSE 201S \/ Week 12 &#8211; Journal Entry 12<\/span><\/a><\/p>\n","protected":false},"author":30367,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/student.wp.odu.edu\/cvanc003\/wp-json\/wp\/v2\/posts\/84"}],"collection":[{"href":"https:\/\/student.wp.odu.edu\/cvanc003\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/student.wp.odu.edu\/cvanc003\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/cvanc003\/wp-json\/wp\/v2\/users\/30367"}],"replies":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/cvanc003\/wp-json\/wp\/v2\/comments?post=84"}],"version-history":[{"count":1,"href":"https:\/\/student.wp.odu.edu\/cvanc003\/wp-json\/wp\/v2\/posts\/84\/revisions"}],"predecessor-version":[{"id":85,"href":"https:\/\/student.wp.odu.edu\/cvanc003\/wp-json\/wp\/v2\/posts\/84\/revisions\/85"}],"wp:attachment":[{"href":"https:\/\/student.wp.odu.edu\/cvanc003\/wp-json\/wp\/v2\/media?parent=84"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/student.wp.odu.edu\/cvanc003\/wp-json\/wp\/v2\/categories?post=84"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/student.wp.odu.edu\/cvanc003\/wp-json\/wp\/v2\/tags?post=84"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}