Online piracy, anonymity and social change

This article analyses current trends in the use of anonymity services among younger Swedes (15–25 years old) and focuses on individuals engaging in illegal file sharing in order to better understand the rationale behind both file sharing as well as online anonymity, especially in relation to enforcement of copyright. By comparing the findings of a survey conducted on three occasions (early 2009, late 2009 and early 2012), we measure the fluctuations in the use of anonymity services among approximately 1000 15–25-year-olds in Sweden, compare them with file sharing frequencies and, to some extent, trends within legal enforcement. The article also suggests that the key to understanding any relationship between copyright enforcement and fluctuations in online anonymity can be found in the law’s relationship to social norms in terms of legitimacy by showing a correlation between file sharing frequency and the use of anonymity services. The findings indicate that larger proportions of frequent file sharers (downloaders) also use anonymity services more often than those who file share less. However, in comparison to the earlier surveys, the strongest increase in the use of anonymity services is found in the groups where file sharing is less frequent, suggesting that reasons for actively making oneself less traceable online other than avoiding copyright enforcement have emerged since the initial two surveys in 2009. Further, the overall increase (from 8.6 per cent to 14.9 per cent) in using anonymity services found for the whole group of respondents suggests both that high file sharing frequency is a driver for less traceability, as well as a larger trend for online anonymity relating to factors other than mere file sharing of copyright infringing content – for example, increased governmental identification, data retention and surveillance in the online environment. The results are analysed in Merton’s terminology as file sharers and protocol architects adapting in terms of both innovation and rebellion in the sense that institutional means for achieving specific cultural goals are rejected. This means, to some extent, participating in or contributing to the construction of other means for reaching cultural goals.

[1]  S. Durvasula,et al.  Digital piracy of MP3s: consumer and ethical predispositions , 2008 .

[2]  Mathieu Deflem,et al.  Anomie and Strain: Context and Consequences of Merton's Two Theories , 2003 .

[3]  Roger I. Roots When Laws Backfire , 2004 .

[4]  Rong-An Shang,et al.  Ethical Decisions About Sharing Music Files in the P2P Environment , 2008 .

[5]  Jisuk Woo,et al.  The right not to be identified: privacy and anonymity in the interactive media environment , 2006, New Media Soc..

[6]  Matthew K. O. Lee,et al.  Behavioral intention model for the exchange mode Internet music piracy , 2002, Proceedings of the 35th Annual Hawaii International Conference on System Sciences.

[7]  Aron M. Levin,et al.  Deterring illegal downloading: the effects of threat appeals, past behavior, subjective norms, and attributions of harm , 2007 .

[8]  M. Wendy Hennequin,et al.  The Future of the Internet and How to Stop It , 2011 .

[9]  E. Durkheim,et al.  Rules of Sociological Method , 1964 .

[10]  Stefan Larsson,et al.  SOCIAL NORMS AND INTELLECTUAL PROPERTY. Online norms and the European legal development , 2009 .

[11]  C. M. Franks,et al.  Delinquent Boys , 1956, Mental Health.

[12]  J. Beekhuyzen A Critical Ethnography of an Online File Sharing Community: An Actor-Network Theory Perspective of Controversies in the Digital Music World , 2010 .

[13]  Roscoe Pound,et al.  The Limits of Effective Legal Action , 1917, The International Journal of Ethics.

[14]  Stefan Larsson,et al.  Law, norms, piracy and online anonymity: Practices of de‐identification in the global file sharing community , 2012 .

[15]  Stefan Larsson The Path Dependence of European Copyright , 2011 .

[16]  Robert F. House,et al.  Leadership training: Some dysfunctional consequences. , 1968 .

[17]  V. Ridgway Dysfunctional Consequences of Performance Measurements , 1956 .

[18]  S. Larsson,et al.  Compliance or Obscurity? Online Anonymity as a Consequence of Fighting Unauthorised File-sharing , 2010 .

[19]  J. Olsen,et al.  The European Commission , 2020, The European Union.

[20]  R. Merton Social Structure and Anomie , 1938 .

[21]  Eva Hemmungs Wirtén Cosmopolitan Copyright : Law and Language in the Translation Zone , 2011 .

[22]  C. Rojek P2P Leisure Exchange: Net Banditry and the Policing of Intellectual Property , 2005 .

[23]  Cass R. Sunstein,et al.  Political Equality and Unintended Consequences , 1994 .

[24]  J. Zittrain The Future of the Internet , 2008 .

[25]  Ian Rowlands,et al.  The attitudes and behaviours of illegal downloaders , 2010, Aslib Proc..

[26]  R. Aseltine,et al.  Life stress, anger and anxiety, and delinquency: an empirical test of general strain theory. , 2000, Journal of health and social behavior.

[27]  Stephen Budiansky,et al.  Battle of Wits: The Complete Story of Codebreaking in World War II , 2000 .

[28]  Simon Lindgren,et al.  The subpolitics of online piracy: A Swedish case study , 2012 .

[29]  Thomas A. Peters,et al.  Privacy on the line: The politics of wiretapping and encryption , 1998 .

[30]  Sameer Hinduja,et al.  Deindividuation and Internet Software Piracy , 2008, Cyberpsychology Behav. Soc. Netw..

[31]  David Spitz,et al.  Contested Codes: The Social Construction of Napster , 2005, Inf. Soc..

[32]  Lawrence Lessig,et al.  Code - version 2.0 , 2006 .

[33]  Laurie McAulay,et al.  Unintended consequences of computer-mediated communications , 2007, Behav. Inf. Technol..

[34]  Jenine P. Beekhuyzen,et al.  Underground Online Music Communities: Exploring Rules for Membership , 2011, Online Inf. Rev..

[35]  Jonathan L. Zittrain,et al.  A History of Online Gatekeeping , 2006 .

[36]  Lawrence Lessig,et al.  Remix: Making Art and Commerce Thrive in the Hybrid Economy , 2008 .

[37]  Lior Strahilevitz,et al.  Charismatic Code, Social Norms, and the Emergence of Cooperation on the File-Swapping Networks , 2003 .

[38]  Martina Gillen,et al.  Copyrights and Copywrongs: The Rise of Intellectual Property and How it Threatens Creativity , 2004, Int. J. Law Inf. Technol..

[39]  Bj Brown Latent effects of law : The defamation experience , 1992 .

[40]  Stefan Larsson,et al.  Den Stigberoende Upphovsrätten. Om konsekvenserna av rättslig inlåsning i en digital tid , 2011 .

[41]  Tomas A. Lipinski,et al.  The Privacy Advocates: Resisting the Spread of Surveillance , 2011 .

[42]  Stefan Larsson,et al.  Law, Deviation and Paradigmatic Change: Copyright and its Metaphors , 2010 .

[43]  R. Agnew Foundation for a General Strain Theory of Crime and Delinquency , 1992, Crime, Inequality and the State.

[44]  Jane L. Hsu,et al.  Consumers’ Willingness to Pay for Non-pirated Software , 2008 .

[45]  Stefan Larsson,et al.  Intellectual property law compliance in Europe: Illegal file sharing and the role of social norms , 2012, New Media Soc..

[46]  S. Larsson Metaphors and Norms - Understanding Copyright Law in a Digital Society , 2011 .

[47]  Mark Warschauer,et al.  The information age: Economy, society and culture. , 1998 .

[48]  J. Andersson,et al.  Piracy Cultures| The Quiet Agglomeration of Data: How Piracy is Made Mundane , 2012 .

[49]  S. Menard A Developmental Test of Mertonian Anomie Theory , 1995 .