Software Piracy: Original Insights from a Criminological Perspective

It is well known that software piracy is widespread. While the existing research on this subject has applied a number of theories in order to understand and prevent such an act, this text presents an alternative perspective by advancing two criminological theories. More specifically, a novel theoretical model is advanced, drawing on these theories entitled Techniques of 'Neutralization and Differential Association Theory. The former helps to explain how individuals are able to rationalize their criminal behaviour in a manner which absolves them of pressures from social norms and internal controls such as feelings of guilt and shame. The latter explains how criminality is developed through a learning process taking place in personal groups. While empirical research is needed to test the model further, it is argued that these theories offer both an alternative perspective on the intention to commit software piracy, but also potentially open up new avenues for preventing this crime.

[1]  Hsing K. Cheng,et al.  To Purchase or to Pirate Software: An Empirical Study , 1997, J. Manag. Inf. Syst..

[2]  Galen B. Crow Defining educational policy on software usage in the light of copyright law , 1989, SIGCSE '89.

[3]  R. Stallman Why software should be free , 1990 .

[4]  Diane Lending,et al.  Understanding differences in ethical beliefs and behaviors toward software copying: the effects of organization culture , 1999, SIGCPR '99.

[5]  C. W. Moore,et al.  Ethical attitudes of students and business professionals: A study of moral reasoning , 1988 .

[6]  Donald G. Dutton,et al.  Wife assaulter's explanations for assault: The neutralization of self-punishment. , 1986 .

[7]  R. Kruger Using copied software: your work product at risk , 1994, Proceedings of WESCON '94.

[8]  Karl Dakin Softlaw: What If There Were No Software Piracy? , 1997, IEEE Softw..

[9]  T. Priest,et al.  TECHNIQUES OF NEUTRALIZATION: YOUNG ADULT MARIJUANA SMOKERS , 1970 .

[10]  Dennis F. Galletta,et al.  Developing a Predictive Model of Software Piracy Behavior: An Empirical Study , 1996, ICIS.

[11]  G. M. Shewan,et al.  Criminology , 1896, The Indian medical gazette.

[12]  Heith Copes,et al.  societal attachments, offending frequency, and techniques of neutralization , 2003 .

[13]  S.E. Goodman,et al.  International software piracy , 1992, Computer.

[14]  Lori N. K. Leonard,et al.  Illegal, Inappropriate, And Unethical Behavior In An Information Technology Context: A Study To Explain Influences , 2001, J. Assoc. Inf. Syst..

[15]  A. Reiss,,et al.  An Empirical Test of Differential Association Theory* , 1964 .

[16]  Susan M. Jaquith ADOLESCENT MARIJUANA AND ALCOHOL USE , 1981 .

[17]  G. C. Griffin,et al.  Other People's Money , 2022, Filmmakers and Financing.

[18]  D. Cornish,et al.  Theory for Practice in Situational Crime Prevention , 2003 .

[19]  Quint C. Thurman,et al.  Neutralization and Tax Evasion: How Effective Would a Moral Appeal Be in Improving Compliance to Tax Laws? , 1984 .

[20]  Lydia L. Gan,et al.  An empirical study of software piracy among tertiary institutions in Singapore , 2006, Inf. Manag..

[21]  M. Lynn Hawaii International Conference on System Sciences , 1996 .

[22]  D. Dabney,et al.  Neutralization and deviance in the workplace: Theft of supplies and medicines by hospital nurses , 1995 .

[23]  Gilbert Geis,et al.  White Collar Crime: The Heavy Electrical Equipment Antitrust Case of 1961 , 1995 .

[24]  Karen Heimer,et al.  Race, Family Structure, and Delinquency: A Test of Differential Association and Social Control Theories. , 1987 .

[25]  Helen Kelley,et al.  Morality and Computers: Attitudes and Differences in Moral Judgments , 1999, Inf. Syst. Res..

[26]  Barbara J. Costello techniques of neutralization and self-esteem: a critical test of social control and neutralization theory , 2000 .

[27]  G. A. Avanesov,et al.  The Principles of Criminology , 1982 .

[28]  Dennis F. Galletta,et al.  Software Piracy in the Workplace: A Model and Empirical Test , 2003, J. Manag. Inf. Syst..

[29]  Awais Rashid,et al.  Software Engineering Ethics in a Digital World , 2009, Computer.

[30]  Ram D. Gopal,et al.  Global software piracy: you can't get blood out of a turnip , 2000, CACM.

[31]  Ian W. Shields,et al.  Neutralization and Delinquency among Teenagers , 1994 .

[32]  Chee-Sing Yap,et al.  Testing an Ethical Decision-Making Theory: The Case of Softlifting , 1998, J. Manag. Inf. Syst..

[33]  R. Hollinger,et al.  neutralizing in the workplace: an empirical analysis of property theft and production deviance , 1991, Work Place Sabotage.

[34]  Jung P. Shim,et al.  A Comparative Examination of Attitudes Toward Software Piracy Among Business Professors and Executives , 1993 .

[35]  J. Skeem,et al.  Criminal Justice and Behavior , 2006 .

[36]  Gurpreet Dhillon,et al.  Software piracy: a view from Hong Kong , 2000, CACM.

[37]  Mark B. Johnson Software piracy: stopping it before it stops you , 1988, SIGUCCS '88.

[38]  R. Aseltine,et al.  A reconsideration of parental and peer influences on adolescent deviance. , 1995, Journal of health and social behavior.

[39]  E. Sutherland Principles of criminology, 4th ed. , 1947 .

[40]  Wynne W. Chin,et al.  Factors motivating software piracy: a longitudinal study , 2004, IEEE Transactions on Engineering Management.

[41]  J. D. Orcutt,et al.  DIFFERENTIAL ASSOCIATION AND MARIJUANA USE: A CLOSER LOOK AT SUTHERLAND (WITH A LITTLE HELP FROM BECKER)* , 1987 .

[42]  Ranjan B. Kini,et al.  An exploratory study of moral intensity regarding software piracy of students in Thailand , 2003, Behav. Inf. Technol..

[43]  Robert Jackall,et al.  Moral mazes: The world of corporate managers , 1989 .

[44]  R. Matsueda Testing control theory and differential association: A causal modeling approach. , 1982 .

[45]  John Weckert,et al.  Computer and Information Ethics , 1997 .

[46]  Wallace A. Wood,et al.  Situational determinants of software piracy: An equity theory perspective , 1996 .

[47]  I. Ajzen The theory of planned behavior , 1991 .

[48]  M. Chang Predicting Unethical Behavior: A Comparison of the Theory of Reasoned Action and the Theory of Planned Behavior , 1998 .

[49]  P. Simpson,et al.  Softlifting: A model of motivating factors , 1994 .

[50]  Paul F. Cromwell,et al.  the devil made me do it: use of neutralizations by shoplifters , 2003 .

[51]  B. Byers,et al.  Bias Crime Motivation , 1999 .

[52]  Gordon B. Davis,et al.  User Acceptance of Information Technology: Toward a Unified View , 2003, MIS Q..

[53]  Ivan P. L. Png,et al.  Software pricing and copyright enforcement: private profit vis-a-vis social welfare , 1999, ICIS.

[54]  W. W. Minor,et al.  Techniques of Neutralization: a Reconceptualization and Empirical Examination , 1981 .

[55]  A. Adam Whatever happened to information systems ethics? Caught between the devil and the deep blue sea , 2004 .

[56]  R. Homel The Politics and Practice of Situational Crime Prevention , 1996 .

[57]  James R. Rest Background: theory and research , 1994 .

[58]  Mikko T. Siponen,et al.  The relevance of software rights: An anthology of the divergence of sociopolitical doctrines , 2005, AI & SOCIETY.

[59]  Darryl A. Seale,et al.  It's not really theft!: Personal and workplace ethics that enable software piracy , 1998, Behav. Inf. Technol..

[60]  Patrick T. Macdonald,et al.  Competing Theoretical Explanations of Cocaine Use: Differential Association Versus Control Theory , 1989 .

[61]  Denise B. Kandel,et al.  FRIENDSHIP NETWORKS, INTIMACY, AND ILLICIT DRUG USE IN YOUNG ADULTHOOD: A COMPARISON OF TWO COMPETING THEORIES* , 1991 .

[62]  T. Gabor Everybody Does It!: Crime by the Public , 1994 .

[63]  D. Cornish OPPORTUNITIES, PRECIPITATORS AND CRIMINAL DECISIONS: A REPLY TO WORTLEY'S CRITIQUE OF SITUATIONAL CRIME PREVENTION , 2003 .

[64]  Robert Brame,et al.  ON THE INITIATION AND CONTINUATION OF DELINQUENCY , 1994 .

[65]  R. Wortley Guilt, shame and situational crime prevention , 1996 .

[66]  Michael B. Blankenship,et al.  examining the role of differential association and techniques of neutralization in explaining corporate crime , 2005 .

[67]  Gresham M. Sykes,et al.  Techniques of neutralization: A theory of delinquency. , 1957 .

[68]  George E. Higgins,et al.  An Application of Deterrence Theory to Software Piracy , 2005 .

[69]  R. A. Dodder,et al.  techniques of neutralization used by deer poachers in the western united states: a research note , 1999 .

[70]  Tung-Ching Lin,et al.  An intention model-based study of software piracy , 1999, Proceedings of the 32nd Annual Hawaii International Conference on Systems Sciences. 1999. HICSS-32. Abstracts and CD-ROM of Full Papers.

[71]  Richard M. Stallman,et al.  The GNU manifesto , 1990 .

[72]  Trevor T. Moores,et al.  Ethical Decision Making in Software Piracy: Initial Development and a Test of a Four-Component Model , 2006, MIS Q..

[73]  Ram D. Gopal,et al.  Preventive and Deterrent Controls for Software Piracy , 1997, J. Manag. Inf. Syst..

[74]  Michael L. Benson,et al.  DENYING THE GUILTY MIND: ACCOUNTING FOR INVOLVEMENT IN A WHITE‐COLLAR CRIME* , 1985 .