{"id":197,"date":"2024-10-02T21:09:19","date_gmt":"2024-10-02T21:09:19","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/aladj\/?p=197"},"modified":"2024-10-02T21:09:19","modified_gmt":"2024-10-02T21:09:19","slug":"review-the-articles-linked-with-each-individual-motive-in-the-presentation-page-or-slide-4-rank-the-motives-from-1-to-7-as-the-motives-that-you-think-make-the-most-sense-being-1-to-the-least","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/aladj\/2024\/10\/02\/review-the-articles-linked-with-each-individual-motive-in-the-presentation-page-or-slide-4-rank-the-motives-from-1-to-7-as-the-motives-that-you-think-make-the-most-sense-being-1-to-the-least\/","title":{"rendered":"Review the articles linked with each individual motive in the presentation page or Slide #4.\u00a0 Rank the motives from 1 to 7 as the motives that you think make the most sense (being 1) to the least sense (being 7).\u00a0 Explain why you rank each motive the way you rank it."},"content":{"rendered":"\n<ol>\n<li><strong>For Money<\/strong>: Financial gain is a primary motivator for cybercrime, as it directly impacts offenders&#8217; livelihoods.<\/li>\n\n\n\n<li><strong>Revenge<\/strong>: Personal vendettas can drive individuals to commit cybercrimes, making this motive relatable and understandable.<\/li>\n\n\n\n<li><strong>Recognition<\/strong>: The desire for status or fame, especially in hacker communities, can push individuals to engage in high-profile attacks.<\/li>\n\n\n\n<li><strong>Entertainment<\/strong>: Many hackers seek thrill and excitement, making this motive significant, though often secondary to more tangible goals.<\/li>\n\n\n\n<li><strong>Political<\/strong>: Hacktivism driven by political beliefs is compelling but typically appeals to a narrower audience.<\/li>\n\n\n\n<li><strong>Boredom<\/strong>: While boredom can lead to cybercrime, it often lacks the intensity of other motives.<\/li>\n\n\n\n<li><strong>Multiple Reasons<\/strong>: Although a realistic representation of motivations, it is less clear and harder to pinpoint than singular motives.<\/li>\n<\/ol>\n\n\n\n<p>This ranking reflects the varying levels of impact and clarity associated with each motive in the context of cybercrime.<\/p>\n\n\n\n<p>4<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This ranking reflects the varying levels of impact and clarity associated with each motive in the context of cybercrime. 4<\/p>\n","protected":false},"author":28242,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/aladj\/wp-json\/wp\/v2\/posts\/197"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/aladj\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/aladj\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/aladj\/wp-json\/wp\/v2\/users\/28242"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/aladj\/wp-json\/wp\/v2\/comments?post=197"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/aladj\/wp-json\/wp\/v2\/posts\/197\/revisions"}],"predecessor-version":[{"id":198,"href":"https:\/\/sites.wp.odu.edu\/aladj\/wp-json\/wp\/v2\/posts\/197\/revisions\/198"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/aladj\/wp-json\/wp\/v2\/media?parent=197"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/aladj\/wp-json\/wp\/v2\/categories?post=197"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/aladj\/wp-json\/wp\/v2\/tags?post=197"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}