{"id":331,"date":"2024-11-29T06:32:26","date_gmt":"2024-11-29T06:32:26","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/jahmirbrown\/?page_id=331"},"modified":"2024-11-29T06:39:58","modified_gmt":"2024-11-29T06:39:58","slug":"journal-entry-5","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/jahmirbrown\/journal-entry-5\/","title":{"rendered":"Journal entry 5."},"content":{"rendered":"\n<p>1 For Money: Since cybercrime can be extremely profitable and targets people and corporations for personal profit, financial gain is often the driving force behind it.<\/p>\n\n\n\n<p>2 Political: Hacktivism is growing, with criminals using cyberattacks to disrupt or make statements due to ideological or political motivations.<\/p>\n\n\n\n<p>3 Recognition: A lot of hackers use high-profile attacks to draw attention in an effort to get celebrity or notoriety, either from the public or within their community.<\/p>\n\n\n\n<p>4 Revenge: As evidenced by instances like as revenge porn, when the goal is to harm someone, personal grudges can result in cybercrimes.<\/p>\n\n\n\n<p>5 Different Reasons: Cybercriminals can have a variety of motivations, making it challenging to identify a single motivating factor.<\/p>\n\n\n\n<p>6Entertainment: Although this is a less significant motivation, some hackers get pleasure from breaking into systems or stealing data.<\/p>\n\n\n\n<p>7 Boredom: While a factor in minor cybercrimes, boredom alone is a weak driver compared to the other factors.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>1 For Money: Since cybercrime can be extremely profitable and targets people and corporations for personal profit, financial gain is often the driving force behind it. 2 Political: Hacktivism is growing, with criminals using cyberattacks to disrupt or make statements due to ideological or political motivations. 3 Recognition: A lot of hackers use high-profile attacks&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/jahmirbrown\/journal-entry-5\/\">Read More<\/a><\/div>\n","protected":false},"author":29547,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/jahmirbrown\/wp-json\/wp\/v2\/pages\/331"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/jahmirbrown\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/jahmirbrown\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jahmirbrown\/wp-json\/wp\/v2\/users\/29547"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jahmirbrown\/wp-json\/wp\/v2\/comments?post=331"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/jahmirbrown\/wp-json\/wp\/v2\/pages\/331\/revisions"}],"predecessor-version":[{"id":339,"href":"https:\/\/sites.wp.odu.edu\/jahmirbrown\/wp-json\/wp\/v2\/pages\/331\/revisions\/339"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/jahmirbrown\/wp-json\/wp\/v2\/media?parent=331"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}