1. What is stakeholder theory? How does it drive requirements to spend money on cybersecurity products & services?
2. How does social contract theory apply to purchasing requirements for cybersecurity products & services?
3. Name and briefly describe 3 ethics issues that IT Security managers and staff may encounter when selecting and evaluating cybersecurity products & services. (Use examples to drive home your points.)