Pirating Pirates of the Caribbean: The curse of cyberspace

Abstract This study investigates the factors influencing the ‘illegal’ downloading of films and TV series through peer-to-peer (P2P) networks. Specifically, it examines how social and ethical orientations and attitudes towards downloading impact on downloading intentions. The neutralisation theory and theory of planned behaviour are used to underpin the research framework. The data analysis of 284 usable responses produced several significant relationships. Facilitating conditions, social factors, collectivism, and personal moral obligation were found to predict attitudes towards ‘illegal’ downloading. Social factors, collectivism, personal moral obligation, and attitudes towards ‘illegal’ downloading were also found to influence intentions to download. The findings derived from this study will provide marketers and policymakers with strategic and managerial initiatives to counteract this persistent problem.

[1]  Ian Phau,et al.  Targeting buyers of counterfeits of luxury brands: A study on attitudes of Singaporean consumers , 2009 .

[2]  M. Sigala,et al.  Information sharing and idea generation in peer to peer online communities: The case of `DIALOGOI' , 2008 .

[3]  P. Simpson,et al.  Softlifting: A model of motivating factors , 1994 .

[4]  Gresham M. Sykes,et al.  Techniques of neutralization: A theory of delinquency. , 1957 .

[5]  C. Hill Digital piracy: Causes, consequences, and strategic responses , 2007 .

[6]  Sameer Hinduja,et al.  Neutralization theory and online software piracy: An empirical analysis , 2007, Ethics and Information Technology.

[7]  M. de Young The indignant page: techniques of neutralization in the publications of pedophile organizations. , 1988, Child abuse & neglect.

[8]  Byeng-Hee Chang,et al.  Exploring Influential Factors on Music Piracy Across Countries , 2006 .

[9]  Kelly L. Page,et al.  How does the web make youth feel? Exploring the positive digital native rhetoric , 2010 .

[10]  Johan Liang,et al.  Downloading digital video games: predictors, moderators and consequences , 2012 .

[11]  Alejandro Zentner,et al.  Online Sales, Internet Use, File Sharing, and the Decline of Retail Music Specialty Stores , 2008, Inf. Econ. Policy.

[12]  S. Hinduja,et al.  Neutralizing Music Piracy: An Empirical Examination , 2008 .

[13]  Ian Grant,et al.  Communicating with Young People Through the Eyes of Marketing Practitioners , 2004 .

[14]  S. Durvasula,et al.  Digital piracy of MP3s: consumer and ethical predispositions , 2008 .

[15]  W. William Minor THE NEUTRALIZATION OF CRIMINAL OFFENSE , 1980 .

[16]  Stephen J. Grove,et al.  Marketing ethics and the techniques of neutralization , 1987 .

[17]  Oz Shy,et al.  Internet and peer-to-peer distributions in markets for digital products , 2003 .

[18]  Ricky Y. K. Chan,et al.  Counterfeit proneness: Conceptualisation and scale development , 2011 .

[19]  Raquel Benbunan-Fich,et al.  Is music downloading the new prohibition? What students reveal through an ethical dilemma , 2009, Ethics and Information Technology.

[20]  Hsing K. Cheng,et al.  To Purchase or to Pirate Software: An Empirical Study , 1997, J. Manag. Inf. Syst..

[21]  Sudip Bhattacharjee,et al.  Digital music and online sharing: software piracy 2.0? , 2003, CACM.

[22]  Carl B. Klockars The Professional Fence , 1975 .

[23]  Robert LaRose,et al.  Sharing or Piracy? An Exploration of Downloading Behavior , 2005, J. Comput. Mediat. Commun..

[24]  T. P. Cronan,et al.  Factors that Influence the Intention to Pirate Software and Media , 2008 .

[25]  Jennifer Rowley,et al.  Understanding digital content marketing , 2008 .

[26]  V. Mitchell,et al.  Generation Y Attitudes Towards E-ethics and Internet-related Misbehaviours , 2004 .

[27]  Joan Oldman,et al.  The Professional Fence , 1976 .

[28]  Wynne W. Chin,et al.  Factors motivating software piracy: a longitudinal study , 2004, IEEE Transactions on Engineering Management.

[29]  Shu-Chen Yang,et al.  Pirate or Buy? The Moderating Effect of Idolatry , 2009 .

[30]  Matthew K. O. Lee,et al.  Behavioral intention model for the exchange mode Internet music piracy , 2002, Proceedings of the 35th Annual Hawaii International Conference on System Sciences.

[31]  Aron M. Levin,et al.  Deterring illegal downloading: the effects of threat appeals, past behavior, subjective norms, and attributions of harm , 2007 .

[32]  M. Chang Predicting Unethical Behavior: A Comparison of the Theory of Reasoned Action and the Theory of Planned Behavior , 1998 .

[33]  Jim Mitchell,et al.  Types of neutralization and types of delinquency , 1983, Journal of youth and adolescence.

[34]  Eric P. Chiang,et al.  Music piracy among students on the university campus: Do males and females react differently? , 2008 .

[35]  Y L ThongJames,et al.  Software Piracy in the Workplace , 2003 .

[36]  P. Waelbroeck,et al.  Piracy and the Demand for Films: Analysis of Piracy Behavior in French Universities , 2006 .

[37]  Jung P. Shim,et al.  A Comparative Examination of Attitudes Toward Software Piracy Among Business Professors and Executives , 1993 .

[38]  D. Shaw,et al.  The Contribution of Ethical Obligation and Self-identity to the Theory of Planned Behaviour: An Exploration of Ethical Consumers , 2000 .

[39]  Johan A. Pouwelse,et al.  The Bittorrent P2P File-Sharing System: Measurements and Analysis , 2005, IPTPS.

[40]  Alan Tse,et al.  The Effects of Attitudinal and Demographic Factors on Intention to Buy Pirated CDs: The Case of Chinese Consumers , 2003 .

[41]  Fang Wang,et al.  Purchasing pirated software: an initial examination of Chinese consumers , 2005 .

[42]  R. East,et al.  Testing the market maven concept , 2008 .

[43]  Elison Ai Ching Lim,et al.  Spot the difference: consumer responses towards counterfeits , 2001 .

[44]  Stuart Henry,et al.  Degrees of Deviance: Student Accounts of Their Deviant Behavior , 1999 .

[45]  Robert Agnew,et al.  THE TECHNIQUES OF NEUTRALIZATION AND VIOLENCE , 1994 .

[46]  Yu-Ping Liu,et al.  Predicting the Use of Pirated Software: A Contingency Model Integrating Perceived Risk with the Theory of Planned Behavior , 2010 .

[47]  H C Triandis,et al.  Values, attitudes, and interpersonal behavior. , 1980, Nebraska Symposium on Motivation. Nebraska Symposium on Motivation.

[48]  A. Wołk,et al.  Factors influencing website traffic in the paid content market , 2007 .

[49]  Jih-Hsin Tang,et al.  The Effect of Interpersonal Influence on Softlifting Intention and Behaviour , 2005 .

[50]  I. Phau,et al.  Devil wears (counterfeit) Prada: a study of antecedents and outcomes of attitudes towards counterfeits of luxury brands , 2009 .

[51]  George Christodoulides,et al.  Antecedents of attitude and intention towards counterfeit symbolic and experiential products , 2011 .

[52]  B. Husted The Impact of National Culture on Software Piracy , 2000 .

[53]  Lucille Ponte Coming Attractions: Opportunities and Challenges in Thwarting Global Movie Piracy , 2008 .

[54]  Piet Bakker File-sharing--fight, ignore or compete: Paid download services vs. P2P-networks , 2005, Telematics Informatics.

[55]  M. Aiken,et al.  College student Internet use , 2003 .

[56]  D. Shaw,et al.  The contribution of ethical obligation and selfidentity to the theory of planned behaviour: an exploration of ethical consumers - a reflective comment , 2013 .

[57]  I. Ajzen,et al.  Attitude-behavior relations: A theoretical analysis and review of empirical research. , 1977 .

[58]  Anthony R. Hendrickson,et al.  Computer Aversion and Computer-Use Ethics in US and Asian Cultures , 1998 .

[59]  Andrew B. Whinston,et al.  Global software piracy revisited , 2004, CACM.

[60]  I. Ajzen The theory of planned behavior , 1991 .

[61]  I. Phau,et al.  Predictors of Usage Intentions of Pirated Software , 2010 .

[62]  Jorgen P. Bansler,et al.  Corporate Intranet Implementation: Managing Emergent Technologies and Organizational Practices , 2000, J. Assoc. Inf. Syst..

[63]  Szde Yu,et al.  College Students’ Justification for Digital Piracy , 2012 .

[64]  T. P. Cronan,et al.  Digital Piracy: Factors that Influence Attitude Toward Behavior , 2006 .

[65]  Ming-Chuan Pan,et al.  The Joint Moderating Impact of Moral Intensity and Moral Judgment on Consumer’s Use Intention of Pirated Software , 2009 .

[66]  Eleanor O'Higgins,et al.  Music piracy: ethical perspectives , 2010 .

[67]  Nancy D. Albers-Miller Consumer misbehavior: why people buy illicit goods , 1999 .

[68]  Lorrie Faith Cranor,et al.  Analysis of security vulnerabilities in the movie production and distribution process , 2003, DRM '03.

[69]  Feng-Yang Kuo,et al.  Development and Validation of Ethical Computer Self-Efficacy Measure: The Case of Softlifting , 2001 .

[70]  H. Buchan Ethical Decision Making in the Public Accounting Profession: An Extension of Ajzen’s Theory of Planned Behavior , 2005 .

[71]  Robert G Grant,et al.  A review of factors affecting online consumer search behaviour from an information value perspective , 2007 .

[72]  M. D. Young The indignant page: techniques of neutralization in the publications of pedophile organizations. , 1988 .

[73]  Michael Z. Newman Free TV , 2012 .

[74]  Ainsworth Anthony Bailey,et al.  Retail employee theft: a theory of planned behavior perspective , 2006 .

[75]  S. Liebowitz File Sharing: Creative Destruction or Just Plain Destruction?* , 2006, The Journal of Law and Economics.

[76]  Dennis F. Galletta,et al.  Software Piracy in the Workplace: A Model and Empirical Test , 2003, J. Manag. Inf. Syst..

[77]  A. d’Astous,et al.  Music Piracy on the Web – How Effective are Anti-Piracy Arguments? Evidence from the Theory of Planned Behaviour , 2005 .

[78]  Sally Hibbert,et al.  Virtue in Consumption? , 2004 .

[79]  L. Harris,et al.  Online consumer misbehaviour: an application of neutralization theory , 2009 .

[80]  S. Curley,et al.  Ripped from the Headlines: What can the Popular Press Teach us about Software Piracy? , 2008 .

[81]  Sung Wook Ji,et al.  Enforcement and Control of Piracy, Copying, and Sharing in the Movie Industry , 2007 .

[82]  T. Heath,et al.  (Mis)trust in marketing: a reflection on consumers' attitudes and perceptions , 2008 .

[83]  Sylvain Dejean,et al.  What can we learn from empirical studies about piracy , 2009 .

[84]  J. Burn,et al.  Softlifting and piracy: behavior across cultures , 2001 .

[85]  V. Mitchell,et al.  Investigating UK Consumers' Unethical Attitudes and Behaviours , 2002 .

[86]  A. D. Vany,et al.  Estimating the Effects of Movie Piracy on Box-office Revenue , 2007 .

[87]  Lori N. K. Leonard,et al.  Illegal, Inappropriate, And Unethical Behavior In An Information Technology Context: A Study To Explain Influences , 2001, J. Assoc. Inf. Syst..

[88]  Charles W Petit Universe. The gods must be crazy. , 2003, U.S. news & world report.

[89]  Bandula Jayatilaka,et al.  Softlifting: Exploring Determinants of Attitude , 2008 .

[90]  Deborah Cohn,et al.  A study of neutralisation theory's application to global consumer ethics: P2P file-trading of musical intellectual property on the internet , 2006 .

[91]  D. Randall,et al.  Ethical decision making in the medical profession: An application of the theory of planned behavior , 1991 .

[92]  Shivendu Shivendu,et al.  Economic Implications of Variable Technology Standards for Movie Piracy in a Global Context , 2003, J. Manag. Inf. Syst..

[93]  R. Picard A Note on Economic Losses Due to Theft, Infringement, and Piracy of Protected Works , 2004 .