Read “Cybercrime Deterrence and International Legislation: Evidence From Distributed Denial of Service Attacks,” located within the required readings. The authors make assertions about attackers in cyberspace and their related motivations and strategies for choosing a target. Do you agree or disagree with these assertions? Why or why not? Provide your rationale.