{"id":311,"date":"2023-10-05T12:47:24","date_gmt":"2023-10-05T12:47:24","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/kendaltaylor\/?p=311"},"modified":"2023-10-05T12:47:24","modified_gmt":"2023-10-05T12:47:24","slug":"different-hacking-motivations","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/kendaltaylor\/2023\/10\/05\/different-hacking-motivations\/","title":{"rendered":"Different Hacking Motivations"},"content":{"rendered":"\n<p><em>There are five common reasons for hacking. They are entertainment, political, revenge, boredom, recognition, for money, and for multiple reasons. My task was to rank each of these motivations on a scale of 1 to 7, with 1 being the most reasonable, and 7 being the least reasonable. <\/em><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<p><strong>Entertainment: <\/strong>5. This is not a good reason for the simple fact that it causes harm for no reason. However, these types of hackers do expose security vulnerabilities by conducting these \u201cfor-fun\u201d hacks, which I will give a few points for. More importantly, these types of hacks expose to the public how insecurely their data is handled by certain companies, which I believe can foster some transparency.&nbsp;&nbsp;<\/p>\n\n\n\n<p><strong>Political: <\/strong>2. This type of hacking can be beneficial to the public in several ways, but it can also be detrimental. On one hand, this type of hacking can establish transparency by exposing corruption or wrongdoing by government or presidential officials. Hacktivists can take down websites organized by hate groups, terrorists or the government that seek to promote wrongdoing. At the same time, hacktivism can be used to spread harmful or violent propaganda. This would be a line to look for in determining whether or not hacktivism is harmful or helpful.<\/p>\n\n\n\n<p><strong>Revenge: <\/strong>7. I think that the idea of gaining \u201crevenge\u201d on someone by sharing intimate photos of them is absolutely wrong. Nobody deserves to have their privacy destroyed, as images on the internet never truly go away. Once it is on there, a part of someone\u2019s privacy is onthere for good. I rank this as completely unsensible and wrong, nobody deserves this.&nbsp;<\/p>\n\n\n\n<p><strong>Boredom: <\/strong>7. Purposely causing harm to children or several other individuals is completely wrong. There are already enough cases of violence and wrongdoing in the world of cybercrime, adding to that pool out of a purse sense of boredom should not be tolerated.&nbsp;<\/p>\n\n\n\n<p><strong>Recognition: <\/strong>7. To purposely interrupt someone\u2019s user experience in order to gain hacker publicity is not a sensible reason for taking down a website. Sure, the hacker may believe that they are doing a good thing by shutting down a perceived \u201cbad\u201d candidate, but that also hurts democracy. Self-promotion of hacking is not likely to gain any traction either, as many users will just be annoyed at the advertisement of where the hack is coming from.&nbsp;<\/p>\n\n\n\n<p><strong>For money: <\/strong>6. I do not think that any amount of money is worth hurting someone else to gain. By stealing data, credit card information, or ransoming computers, hackers can be rolling in money. But that comes at a price; the victim suffers immensely and is left feeling fearful and taken advantage of. The only reason I would give this a 6 is because if cybercriminals didn\u2019t exist, cyber security wouldn\u2019t exist! These types of individuals are what we are learning to work against everyday<\/p>\n\n\n\n<p><strong>For multiple reasons: <\/strong>6. Hacking as a support to the ego is not a good reason to hack in my opinion. Psychosocial factors can influence this as well, with many hackers pursuing the role to \u201cbe cool\u201d or possibly to threaten those around them. This may also be the result of bullying; young hackers now turn to the world of the internet and learn how to use tools to defend themselves against bullies.&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>There are five common reasons for hacking. They are entertainment, political, revenge, boredom, recognition, for money, and for multiple reasons. My task was to rank each of these motivations on a scale of 1 to 7, with 1 being the most reasonable, and 7 being the least reasonable. Entertainment: 5. This is not a good&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/kendaltaylor\/2023\/10\/05\/different-hacking-motivations\/\">Read More<\/a><\/div>\n","protected":false},"author":27206,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/kendaltaylor\/wp-json\/wp\/v2\/posts\/311"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/kendaltaylor\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/kendaltaylor\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/kendaltaylor\/wp-json\/wp\/v2\/users\/27206"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/kendaltaylor\/wp-json\/wp\/v2\/comments?post=311"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/kendaltaylor\/wp-json\/wp\/v2\/posts\/311\/revisions"}],"predecessor-version":[{"id":312,"href":"https:\/\/sites.wp.odu.edu\/kendaltaylor\/wp-json\/wp\/v2\/posts\/311\/revisions\/312"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/kendaltaylor\/wp-json\/wp\/v2\/media?parent=311"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/kendaltaylor\/wp-json\/wp\/v2\/categories?post=311"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/kendaltaylor\/wp-json\/wp\/v2\/tags?post=311"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}