An Exploratory Analysis of the Characteristics of Ideologically Motivated Cyberattacks