{"id":317,"date":"2024-10-03T01:27:33","date_gmt":"2024-10-03T01:27:33","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/jadonwhite\/?page_id=317"},"modified":"2024-10-03T01:28:24","modified_gmt":"2024-10-03T01:28:24","slug":"journal-5","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/jadonwhite\/journal-5\/","title":{"rendered":"Journal 5"},"content":{"rendered":"\n<p><strong>Financial Gain<\/strong>: The desire to make money quickly through methods like theft, fraud, or selling stolen data is the most common motive for cybercrime.<\/p>\n\n\n\n<p><strong>Revenge<\/strong>: Individuals may commit cybercrimes to settle personal scores or seek revenge against organizations or people, often driven by emotions.<\/p>\n\n\n\n<p><strong>Curiosity\/Thrill-Seeking<\/strong>: Many hackers are motivated by the thrill of breaking into systems, testing their skills, and proving they can outsmart security measures.<\/p>\n\n\n\n<p><strong>Ideological Beliefs<\/strong>: Some engage in cybercrime for political or social reasons, such as hacktivism, where they target organizations to promote their beliefs or causes.<\/p>\n\n\n\n<p><strong>Competition<\/strong>: In some cases, individuals may commit cybercrimes to gain an edge over competitors, particularly in business environments where sabotage can be financially advantageous.<\/p>\n\n\n\n<p><strong>Data Harvesting<\/strong>: Cybercriminals may target organizations to gather valuable data, such as customer information or proprietary technology, which can be sold or used for malicious purposes.<\/p>\n\n\n\n<p><strong>Manipulation or Control<\/strong>: This involves using cybercrime to exert control over individuals or organizations, such as through ransomware attacks or social engineering, though it is less common compared to the other motives listed.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Financial Gain: The desire to make money quickly through methods like theft, fraud, or selling stolen data is the most common motive for cybercrime. Revenge: Individuals may commit cybercrimes to settle personal scores or seek revenge against organizations or people, often driven by emotions. Curiosity\/Thrill-Seeking: Many hackers are motivated by the thrill of breaking into&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/jadonwhite\/journal-5\/\">Read More<\/a><\/div>\n","protected":false},"author":29639,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/jadonwhite\/wp-json\/wp\/v2\/pages\/317"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/jadonwhite\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/jadonwhite\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jadonwhite\/wp-json\/wp\/v2\/users\/29639"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jadonwhite\/wp-json\/wp\/v2\/comments?post=317"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/jadonwhite\/wp-json\/wp\/v2\/pages\/317\/revisions"}],"predecessor-version":[{"id":321,"href":"https:\/\/sites.wp.odu.edu\/jadonwhite\/wp-json\/wp\/v2\/pages\/317\/revisions\/321"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/jadonwhite\/wp-json\/wp\/v2\/media?parent=317"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}