{"id":353,"date":"2025-04-25T14:43:36","date_gmt":"2025-04-25T14:43:36","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/dtayl079\/?page_id=353"},"modified":"2025-04-25T14:43:36","modified_gmt":"2025-04-25T14:43:36","slug":"journal-entry-5","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/dtayl079\/journal-entry-5\/","title":{"rendered":"Journal Entry #5"},"content":{"rendered":"\n<p class=\"has-text-align-center\"><strong>Week 5 \u2013 Journal Entry #5: Ranking Cybercriminal Motives<\/strong><\/p>\n\n\n\n<p>If I had to rank the motives behind cybercrime, financial gain would be the strongest. Cybercriminals steal data, run scams, and deploy ransomware primarily for profit. Following that, multiple reasons often come into play, as many hackers are driven by a combination of financial, ideological, or personal motives.<\/p>\n\n\n\n<p>Political motives rank high, especially as hacktivism continues to grow in prominence. Revenge is also a significant factor, as seen in cases like doxing or revenge porn. Recognition comes next, with some hackers seeking fame or notoriety, but it is not as common as financial motives. Entertainment is a weaker factor, as hacking requires significant skill, and most individuals would not invest time in it just for fun. Finally, boredom ranks the lowest; cybercrime demands effort, and it is unlikely someone would engage in hacking simply because they have nothing else to do.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Week 5 \u2013 Journal Entry #5: Ranking Cybercriminal Motives If I had to rank the motives behind cybercrime, financial gain would be the strongest. Cybercriminals steal data, run scams, and deploy ransomware primarily for profit. Following that, multiple reasons often come into play, as many hackers are driven by a combination of financial, ideological, or&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/dtayl079\/journal-entry-5\/\">Read More<\/a><\/div>\n","protected":false},"author":28663,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/dtayl079\/wp-json\/wp\/v2\/pages\/353"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/dtayl079\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/dtayl079\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/dtayl079\/wp-json\/wp\/v2\/users\/28663"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/dtayl079\/wp-json\/wp\/v2\/comments?post=353"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/dtayl079\/wp-json\/wp\/v2\/pages\/353\/revisions"}],"predecessor-version":[{"id":354,"href":"https:\/\/sites.wp.odu.edu\/dtayl079\/wp-json\/wp\/v2\/pages\/353\/revisions\/354"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/dtayl079\/wp-json\/wp\/v2\/media?parent=353"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}