{"id":227,"date":"2025-04-28T18:12:28","date_gmt":"2025-04-28T18:12:28","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/iholl003\/?page_id=227"},"modified":"2025-04-28T20:14:59","modified_gmt":"2025-04-28T20:14:59","slug":"week-5-journal-entry","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/iholl003\/sample-page\/cyse-201s\/journal-entries\/week-5-journal-entry\/","title":{"rendered":"Journal Entry #5"},"content":{"rendered":"\n<p>Motive: Multiple Reasons<\/p>\n\n\n\n<p>Rank:1<\/p>\n\n\n\n<p>Explanation: Typically, criminal behavior is intricate and driven by multiple motives. The article explains that new research shows that most cyber-criminals are driven by multiple forces like ego and socioeconomic\/psychological factors. I believe it\u2019s most common for cyber criminals to commit cybercrimes when there\u2019s more than one drive which is why I had to rank this motive as one.<\/p>\n\n\n\n<p>Motive: For Money<\/p>\n\n\n\n<p>Rank:2<\/p>\n\n\n\n<p>Explanation: Money makes the world go around, which is why financial gain is one of the most frequent motives for cybercrime. If someone can receive a direct monetary benefit, they often will be likely to engage in illegal activities. The article highlights how cybercriminals do light work, earn easy money, and spend lavishly, which supports that money is a dominant and persuasive motive and why I had to place this motive as second.<\/p>\n\n\n\n<p>Motive: Revenge<\/p>\n\n\n\n<p>Rank:3<\/p>\n\n\n\n<p>Explanation: Individual conflicts and passionate responses can heavily drive someone to commit cybercrimes. For example, revenge porn shows how an inclination to hurt someone can lead people to utilize technology. The emotions behind revenge make it a powerful force.<\/p>\n\n\n\n<p>Motive: Political<\/p>\n\n\n\n<p>Rank:4<\/p>\n\n\n\n<p>Explanation: The article explains how hacktivism is increasing, with groups and individuals attacking governments or organizations to display their political views. Young hackers are contributing to this, showing that political ideology can be a big factor in cybercrime, however it\u2019s still less common compared to money or revenge.<\/p>\n\n\n\n<p>Motive: Recognition<\/p>\n\n\n\n<p>Rank:5<\/p>\n\n\n\n<p>Explanation: A few hackers want to receive fame or validation within their own communities. The article about a hacker disturbing an election for attention shows that recognition can be used as a driving force, although it\u2019s not very common.<\/p>\n\n\n\n<p>Motive: Boredom<\/p>\n\n\n\n<p>Rank:6<\/p>\n\n\n\n<p>Explanation: The article explains how boredom can lead to dangerous behavior like cyberbullying.&nbsp; Some people, especially younger people, participate in cybercrimes purely because they are curious and bored. Although this motive is understandable it\u2019s still less serious compared to the other motives.<\/p>\n\n\n\n<p>Motive: Entertainment<\/p>\n\n\n\n<p>Rank:7<\/p>\n\n\n\n<p>Explanation: I had to place this motive at the end because committing cybercrime for fun seems the least logical compared to other motives. It lacks the emotional, financial, and personal urgency found in other motives, which is why I had to rank it last.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Motive: Multiple Reasons Rank:1 Explanation: Typically, criminal behavior is intricate and driven by multiple motives. The article explains that new research shows that most cyber-criminals are driven by multiple forces like ego and socioeconomic\/psychological factors. I believe it\u2019s most common&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/iholl003\/sample-page\/cyse-201s\/journal-entries\/week-5-journal-entry\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":30376,"featured_media":0,"parent":232,"menu_order":5,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/iholl003\/wp-json\/wp\/v2\/pages\/227"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/iholl003\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/iholl003\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/iholl003\/wp-json\/wp\/v2\/users\/30376"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/iholl003\/wp-json\/wp\/v2\/comments?post=227"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/iholl003\/wp-json\/wp\/v2\/pages\/227\/revisions"}],"predecessor-version":[{"id":286,"href":"https:\/\/sites.wp.odu.edu\/iholl003\/wp-json\/wp\/v2\/pages\/227\/revisions\/286"}],"up":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/iholl003\/wp-json\/wp\/v2\/pages\/232"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/iholl003\/wp-json\/wp\/v2\/media?parent=227"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}