{"id":390,"date":"2025-10-11T21:16:39","date_gmt":"2025-10-12T04:46:39","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/melissadbaddie\/?page_id=390"},"modified":"2025-10-11T21:19:00","modified_gmt":"2025-10-12T04:49:00","slug":"journal-entry-5","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/melissadbaddie\/journal-entry-5\/","title":{"rendered":"Journal Entry # 5"},"content":{"rendered":"\n<p>Review the articles linked with each individual motive in slide\/page #3.&nbsp; Rank the motives from 1 to 8 as the motives that you think make the most sense (being 1) to the least sense (being 8).&nbsp; Explain why you rank each motive the way you rank it.<\/p>\n\n\n\n<p>Upon reviewing the article links for each individual motive, I couldn\u2019t honestly say any of them made any sense to me. I started with (1) <strong>Multiple reasons<\/strong> link, I found it was very insightful and touched on many of the other reasons. The ending caught my attention the most. The author\u2019s quote about \u201ccyber criminals being too young or too insecure to work a system that feels like it\u2019s set up to watch them fail\u201d (Zurkus 2018). This can be said about many criminals being insecure and making up all types of excuses to commit crimes. (2) I found the <strong>recognition<\/strong> link a good motive, as the hacker would have to find out or intentionally disclose their acts for praise. (3) <strong>Curiosity<\/strong> is my next link as the skill that it would take for you to be motivated enough to hack into NASA, after removing Windows from your PC and installing Linux because they wanted to see how it worked. (4) <strong>Entertainment<\/strong> link was also interesting, although it seemed more like the scraping of LinkedIn was committed for money and recognition. (5) The link referencing the motivation of <strong>Money<\/strong> makes sense, creating the dream of every day you are living like a celebrity in Las Vegas or somewhere glamourous. The cyber offender is paying for companionship and how long does it last. (6) <strong>Political<\/strong> link is under the guise of hacktivism, but it really seems like young adults throwing tantrums as they don\u2019t get their way. (7) <strong>Revenge<\/strong> may have upset some so bad that they wanted them to feel what they felt and that is why they would do something to this degree. (8) <strong>Boredom <\/strong>children talking to others online because they have no choice due to the pandemic is understandable. Unfortunately, parents aren\u2019t using this time to reacquaint themselves with children, but no excuse for the online predator\u2019s motivation.<\/p>\n\n\n\n<ol>\n<li><a href=\"https:\/\/www.infosecurity-magazine.com\/news\/what-drives-hackers-to-a-life-of\/?__cf_chl_jschl_tk__=pmd_c1d89a4695edbd23f2bceb54d70f35ce5e536e86-1626721164-0-gqNtZGzNAfijcnBszQi6\">https:\/\/www.infosecurity-magazine.com\/news\/what-drives-hackers-to-a-life-of\/?__cf_chl_jschl_tk__=pmd_c1d89a4695edbd23f2bceb54d70f35ce5e536e86-1626721164-0-gqNtZGzNAfijcnBszQi6<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/timesofindia.indiatimes.com\/etimes\/trending\/nasa-appreciates-hacker-who-claims-to-have-breached-their-systems\/articleshow\/113787089.cms\">https:\/\/timesofindia.indiatimes.com\/etimes\/trending\/nasa-appreciates-hacker-who-claims-to-have-breached-their-systems\/articleshow\/113787089.cms<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/medium.com\/@sudra_shyam\/story-of-a-15-year-old-who-hacked-nasa-out-of-curiosity-a35ac2ff0d63\">https:\/\/medium.com\/@sudra_shyam\/story-of-a-15-year-old-who-hacked-nasa-out-of-curiosity-a35ac2ff0d63<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/9to5mac.com\/2021\/07\/19\/man-behind-linkedin-scraping\/\">https:\/\/9to5mac.com\/2021\/07\/19\/man-behind-linkedin-scraping\/<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/threatresearch.ext.hp.com\/sex-drugs-and-toilet-rolls-how-cybercriminals-spend-their-money-infographic\/\">https:\/\/threatresearch.ext.hp.com\/sex-drugs-and-toilet-rolls-how-cybercriminals-spend-their-money-infographic\/<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.csis.org\/programs\/strategic-technologies-program\/significant-cyber-incidents\">https:\/\/www.csis.org\/programs\/strategic-technologies-program\/significant-cyber-incidents<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/newsfromwales.co.uk\/news\/revenge-porn-victims-in-wales-often-feel-let-down-by-the-law-as-cybercrime-slips-through-the-net\/\">https:\/\/newsfromwales.co.uk\/news\/revenge-porn-victims-in-wales-often-feel-let-down-by-the-law-as-cybercrime-slips-through-the-net\/<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.heraldlive.co.za\/news\/2021-05-31-cyberbullying-and-online-sexual-grooming-of-children-on-the-increase\/\">https:\/\/www.heraldlive.co.za\/news\/2021-05-31-cyberbullying-and-online-sexual-grooming-of-children-on-the-increase\/<\/a><\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>Review the articles linked with each individual motive in slide\/page #3.&nbsp; Rank the motives from 1 to 8 as the motives that you think make the most sense (being 1) to the least sense (being 8).&nbsp; Explain why you rank each motive the way you rank it. Upon reviewing the article links for each individual&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/melissadbaddie\/journal-entry-5\/\">Read More<\/a><\/div>\n","protected":false},"author":31268,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/melissadbaddie\/wp-json\/wp\/v2\/pages\/390"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/melissadbaddie\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/melissadbaddie\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/melissadbaddie\/wp-json\/wp\/v2\/users\/31268"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/melissadbaddie\/wp-json\/wp\/v2\/comments?post=390"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/melissadbaddie\/wp-json\/wp\/v2\/pages\/390\/revisions"}],"predecessor-version":[{"id":394,"href":"https:\/\/sites.wp.odu.edu\/melissadbaddie\/wp-json\/wp\/v2\/pages\/390\/revisions\/394"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/melissadbaddie\/wp-json\/wp\/v2\/media?parent=390"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}