{"id":269,"date":"2023-09-30T06:48:07","date_gmt":"2023-09-30T06:48:07","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/dhopk002cyse201s\/?page_id=269"},"modified":"2023-11-12T01:34:49","modified_gmt":"2023-11-12T01:34:49","slug":"journal-entry","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/dhopk002cyse201s\/journal-entries\/journal-entry\/","title":{"rendered":"Journal Entry #5"},"content":{"rendered":"\n<p>Review the articles linked with each individual motive. Rank the<br>motives from 1 to 7 as the motives that you think make the most sense<br>(being 1) to the least sense (being 7). Explain why you rank each<br>motive the way you rank it.<\/p>\n\n\n\n<ol>\n<li><strong>For Financial Gain<\/strong> (The pursuit of financial profit is a primary motivator for cybercriminals. The allure of monetary rewards through activities such as ransomware attacks and fraud is a compelling motive.)<\/li>\n\n\n\n<li><strong>Seeking Recognition and Notoriety<\/strong> (Many hackers are driven by a desire to gain recognition and notoriety within the hacking community and among their peers. They engage in cyber activities to prove their skills and achieve a sense of accomplishment.)<\/li>\n\n\n\n<li><strong>Driven by Political Beliefs<\/strong> (Hacking for political causes takes a significant position. These hackers use their skills to advance their political convictions, promote social change, or protest against governments and organizations.)<\/li>\n\n\n\n<li><strong>Motivated by Revenge<\/strong> (Revenge-driven hacking moves up the ranks. In cases like revenge porn, individuals are motivated by a strong desire for retribution against those they perceive as wrongdoers, making it a significant motive.)<\/li>\n\n\n\n<li><strong>Boredom and Thrill-Seeking<\/strong> (Hacking out of boredom and a desire for excitement takes this position. Some individuals engage in hacking activities when they have spare time and are seeking stimulation.)<\/li>\n\n\n\n<li><strong>Hacking for Entertainment and Challenge<\/strong> (Hacking for entertainment purposes, driven by curiosity, experimentation, or a desire to test one&#8217;s technical abilities, is generally considered less sensical when compared to other motives.)<\/li>\n\n\n\n<li><strong>Complex Motivations<\/strong> (Hacking driven by a combination of motives remains at the bottom of the list. This ranking acknowledges the complexity of human motivations, which may not be easily categorized into a single reason.)<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>Review the articles linked with each individual motive. Rank themotives from 1 to 7 as the motives that you think make the most sense(being 1) to the least sense (being 7). Explain why you rank eachmotive the way you rank it.<\/p>\n","protected":false},"author":25833,"featured_media":0,"parent":35,"menu_order":5,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/dhopk002cyse201s\/wp-json\/wp\/v2\/pages\/269"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/dhopk002cyse201s\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/dhopk002cyse201s\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/dhopk002cyse201s\/wp-json\/wp\/v2\/users\/25833"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/dhopk002cyse201s\/wp-json\/wp\/v2\/comments?post=269"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/dhopk002cyse201s\/wp-json\/wp\/v2\/pages\/269\/revisions"}],"predecessor-version":[{"id":271,"href":"https:\/\/sites.wp.odu.edu\/dhopk002cyse201s\/wp-json\/wp\/v2\/pages\/269\/revisions\/271"}],"up":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/dhopk002cyse201s\/wp-json\/wp\/v2\/pages\/35"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/dhopk002cyse201s\/wp-json\/wp\/v2\/media?parent=269"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}