{"id":311,"date":"2025-03-03T02:18:14","date_gmt":"2025-03-03T02:18:14","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/brittneydavis\/?p=311"},"modified":"2025-03-03T02:18:14","modified_gmt":"2025-03-03T02:18:14","slug":"journal-entry-5","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/brittneydavis\/2025\/03\/03\/journal-entry-5\/","title":{"rendered":"Journal Entry #5"},"content":{"rendered":"Motives Ranking<br \/><br \/>Rank the motives from 1 to 7 as the motives that you think make the most sense (being 1) to the least sense (being 7). Explain why you rank each motive the way you rank it.<br \/><br \/>1. Political\u2014Political motives make the most sense when it comes to cybercrimes because most people are passionate about their beliefs. Since politics dramatically affects people&#8217;s lives and survival, I believe this will motivate most cybercrimes. <br \/><br \/>2. Multiple reasons &#8211; This makes sense because most criminals have one motive that outranks most, but there are usually multiple reasons why cybercriminals commit their crimes. <br \/><br \/>3. Recognition &#8211; When it comes to recognition, this motive comes third because I believe some criminals want to be held in high esteem and want the infamy that will accompany their crimes if they succeed.<br \/><br \/>4. For money \u2013 I believe money is a strong motive for most cybercriminals because of economic reasons and the desire to buy what they desire and need. Everyone needs or wants money, which is why it plays a significant role in most people committing crimes involving money.  An example of this is when someone takes the opportunity to steal money that isn\u2019t theirs because they have necessities that they require, or they desire to purchase things they want, such as electronics, cars, clothes, or other miscellaneous items. <br \/><br \/>5. Revenge \u2013 This motive makes sense because people usually seek revenge in reaction to a strong emotional response, but the method and reason for it don\u2019t always make sense. Example if someone\u2018s bank account is compromised and their money stolen then I can understand why the person will want to seek revenge but similar to the article, if someone posts revenge porn or someone\u2019s personal information or pictures is not a suitable method of revenge. <br \/><br \/>6. Boredom\u2014This motive makes sense because with the use of technology and everyone having access to it in some form, boredom can lead to a lot of issues. Boredom can lead to people posting or revealing personal information online, which in turn leads to them becoming the victims of cybercrime, specifically cyberbullying or grooming. This motive doesn\u2019t make the most sense to me because people should be able to post their beliefs, wants, and opinions without others targeting them, but this is usually a factor in why someone may be targeted. As for hackers, this motive could play a role because they typically want to gain something from the attempt when they attempt a crime.<br \/><br \/>7. Entertainment \u2013 This motive makes the least sense to me because usually cybercriminals have a reason for their crime other than just for entertainment. ","protected":false},"excerpt":{"rendered":"<p>Motives Ranking Rank the motives from 1 to 7 as the motives that you think make the most sense (being 1) to the least sense (being 7). Explain why you rank each motive the way you rank it. 1. Political\u2014Political motives make the most sense when it comes to cybercrimes because most people are passionate&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/brittneydavis\/2025\/03\/03\/journal-entry-5\/\">Read More<\/a><\/div>\n","protected":false},"author":30351,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/brittneydavis\/wp-json\/wp\/v2\/posts\/311"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/brittneydavis\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/brittneydavis\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/brittneydavis\/wp-json\/wp\/v2\/users\/30351"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/brittneydavis\/wp-json\/wp\/v2\/comments?post=311"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/brittneydavis\/wp-json\/wp\/v2\/posts\/311\/revisions"}],"predecessor-version":[{"id":312,"href":"https:\/\/sites.wp.odu.edu\/brittneydavis\/wp-json\/wp\/v2\/posts\/311\/revisions\/312"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/brittneydavis\/wp-json\/wp\/v2\/media?parent=311"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/brittneydavis\/wp-json\/wp\/v2\/categories?post=311"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/brittneydavis\/wp-json\/wp\/v2\/tags?post=311"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}