Technology has not only had a positive outcome but it has also come with a myriad of challenges. Today, cyberattacks are a common occurrence which are a threat to many stakeholders on different technological platforms (Markoff, 2008). Several motivators contribute to individuals perpetrating cyberattacks. Whether directly or indirectly, patriotism, economic poverty as well as political activism are some of the factors that fuel the above vice. Regardless of the intention that the perpetrator has, the above undertaking, in most cases is viewed as negative and it is highly prohibited by the laws of different countries.
Patriotism pushes individuals to act in ways that portray their love for their nation. The above can propagate cyberattacks by influencing a perpetrator to illegally attain information regarding another nation troops or government (Yadav, Piyush, & Gupta, G2013). The above information, which can mostly be used in intelligence-related research can then be retrieved in the above manner to help the perpetrator in his or her plans against a particular country or military base. Regardless, the approach is illegal.
Delegate your assignment to our experts and they will do the rest.
Widespread economic poverty that affects masses could influence individuals to engage in cyberattacks to illegally get finances by duping individuals online to provide their finance-related details, hacking bank accounts among others (Amoroso, 2012). The above is mainly achieved by the attacker sending a malicious malware that when the target individual receives, his or her information is anonymously retrieved with a malicious aim.
Political activists can maliciously access government software to get information that might not be available to the general public. They use the above against or to support several initiatives put in place by the government in question. Extremists majorly act in the above manner to spread propaganda against their enemies (Gandhi et al., 2011).
Cyberstalking or cyberbullying negatively influences the person who is the target. It does not only affect his or her esteem, but it can escalate to levels that are detrimental to one's health. In such instances, aspects such as depression might be common, leading one to think of negative undertakings such as suicide (Hinduja, Sameer & Patchin, 2010).
References
Amoroso, E. (2012). Cyber attacks: protecting national infrastructure . Elsevier.
Gandhi, R., Sharma, A., Mahoney, W., Sousan, W., Zhu, Q., & Laplante, P. (2011). Dimensions of cyber-attacks: Cultural, social, economic, and political. IEEE Technology and Society Magazine , 30 (1), 28-38.
Hinduja, S., & Patchin, J. W. (2010). Bullying, cyberbullying, and suicide. Archives of suicide research , 14 (3), 206-221.
Markoff, J. (2008). Before the gunfire, cyberattacks. New York Times , 12 , 27-28.
Yadav, P., & Gupta, G. (2013). Depleting Clouds. International Journal of Engineering , 2 (4).