{"id":209,"date":"2024-02-05T22:25:05","date_gmt":"2024-02-05T22:25:05","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyber-201s\/?p=209"},"modified":"2025-11-12T20:54:04","modified_gmt":"2025-11-12T20:54:04","slug":"journal-entry-5","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/cyber-201s\/2024\/02\/05\/journal-entry-5\/","title":{"rendered":"Journal Entry #5"},"content":{"rendered":"\n<p>Review the articles linked with each individual motive in the presentation page or Slide #4.\u00a0 Rank the motives from 1 to 7 as the motives that you think make the most sense (being 1) to the least sense (being 7).\u00a0 Explain why you rank each motive the way you rank it.<\/p>\n\n\n\n<p>#1 Multiple Reasons &#8211; This motive makes the most sense as many crimes aren&#8217;t just linked to one motive. It could be a mix of reasons. Someone who seeks revenge may also find their work entertaining, or someone whose after financial gain may also be seeking recognition. <\/p>\n\n\n\n<p>#2 For Money &#8211; If there&#8217;s one thing we all strive to gain more of, it&#8217;s money. When dealing with a financial strain it can cause some people to turn to committing crimes.<\/p>\n\n\n\n<p>#3 Revenge &#8211; I feel as though it&#8217;s very common and likely for those to act on emotion, especially in a society where accessing the internet or social accounts takes but mere seconds. <\/p>\n\n\n\n<p>#4 Recognition &#8211; A lot of crime is based off of recognition because people want to be acknowledged for their abilities whether it be good or bad.<\/p>\n\n\n\n<p>#5 Political &#8211; While politics has always been a tricky subject, I believe hackers are more likely to be motivated off of making a political point\/statement.<\/p>\n\n\n\n<p>#6 Entertainment &#8211; Entertainment out of the 6 previous motivates seems a bit less likely as most hackers typically have a strong motive or statement to make with their crimes.<\/p>\n\n\n\n<p>#7 Boredom- Boredom goes a little bit hand in hand with entertainment, while it&#8217;s definitely a real possibility, I believe hackers typically take the risk because there&#8217;s something they wish to gain.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Review the articles linked with each individual motive in the presentation page or Slide #4.\u00a0 Rank the motives from 1 to 7 as the motives that you think make the most sense (being 1) to the least sense (being 7).\u00a0&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/cyber-201s\/2024\/02\/05\/journal-entry-5\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":25880,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[5],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/cyber-201s\/wp-json\/wp\/v2\/posts\/209"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/cyber-201s\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/cyber-201s\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyber-201s\/wp-json\/wp\/v2\/users\/25880"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyber-201s\/wp-json\/wp\/v2\/comments?post=209"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/cyber-201s\/wp-json\/wp\/v2\/posts\/209\/revisions"}],"predecessor-version":[{"id":210,"href":"https:\/\/sites.wp.odu.edu\/cyber-201s\/wp-json\/wp\/v2\/posts\/209\/revisions\/210"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/cyber-201s\/wp-json\/wp\/v2\/media?parent=209"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyber-201s\/wp-json\/wp\/v2\/categories?post=209"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyber-201s\/wp-json\/wp\/v2\/tags?post=209"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}