{"id":398,"date":"2025-04-29T01:11:25","date_gmt":"2025-04-29T01:11:25","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/safcybersecurity\/?p=398"},"modified":"2025-04-29T01:32:32","modified_gmt":"2025-04-29T01:32:32","slug":"discussion-board-5","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/safcybersecurity\/2025\/04\/29\/discussion-board-5\/","title":{"rendered":"Discussion Board #5"},"content":{"rendered":"\n<p>One theory that I believe best explains cybercrime is Sigmund Freud\u2019s Psychodynamic Theory. The Psychodynamic Theory suggests that an individual\u2019s past experiences can influence their behavior in the future. To tie this into the cyber world, think of a little kid getting bullied through online games. The trauma from the bullying could stem from them becoming an online bully. Another theory I believe best represents cybercrime is Sykes and Matza\u2019s Neutralization Theory. The Neutralization Theory explains how individuals justify their criminal activity in order to eliminate guilt over their wrongdoings. For example, a cybercriminal could justify hacking into a medical provider\u2019s database by blaming the lack of security that allowed them to do so.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>One theory that I believe best explains cybercrime is Sigmund Freud\u2019s Psychodynamic Theory. The Psychodynamic Theory suggests that an individual\u2019s past experiences can influence their behavior in the future. To tie this into the cyber world, think of a little kid getting bullied through online games. The trauma from the bullying could stem from them&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/safcybersecurity\/2025\/04\/29\/discussion-board-5\/\">Read More<\/a><\/div>\n","protected":false},"author":27461,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[3],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/safcybersecurity\/wp-json\/wp\/v2\/posts\/398"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/safcybersecurity\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/safcybersecurity\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/safcybersecurity\/wp-json\/wp\/v2\/users\/27461"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/safcybersecurity\/wp-json\/wp\/v2\/comments?post=398"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/safcybersecurity\/wp-json\/wp\/v2\/posts\/398\/revisions"}],"predecessor-version":[{"id":399,"href":"https:\/\/sites.wp.odu.edu\/safcybersecurity\/wp-json\/wp\/v2\/posts\/398\/revisions\/399"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/safcybersecurity\/wp-json\/wp\/v2\/media?parent=398"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/safcybersecurity\/wp-json\/wp\/v2\/categories?post=398"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/safcybersecurity\/wp-json\/wp\/v2\/tags?post=398"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}