Online and physical appropriation: evidence from a vignette experiment on copyright infringement

ABSTRACT In this study, we use a vignette experiment to inquire which features of online piracy make it ethically discernible from traditional theft. We find that the actual loss incurred by a victim, and especially a loss of a physical object have particularly strong bearing on ethical evaluation. Interestingly, in contrast to the claims that norms are inherently rotten in computer-mediated interaction, the patterns of ethical judgment in the online and offline contexts are very similar. These are mostly the characteristics of the deed themselves that explain differences in ethical judgment and not a different perception of these characteristics in the online context. We interpret these findings in the context of legal regulations and the design of anti-piracy campaigns.

[1]  Sergio L. Toral Marín,et al.  An empirical study of the driving forces behind online communities , 2009, Internet Res..

[2]  Shalom H. Schwartz,et al.  A test of a model for reducing measured attitude-behavior discrepancies. , 1972 .

[3]  F. Barnaby Drone warfare: killing by remote control , 2014 .

[4]  Herman Aguinis,et al.  Best Practice Recommendations for Designing and Implementing Experimental Vignette Methodology Studies , 2014 .

[5]  Tilman Steinert,et al.  Legal provisions and practice in the management of violent patients. A case vignette study in 16 European countries , 2009, European Psychiatry.

[6]  Lucas D. Introna,et al.  Singular Justice and Software Piracy , 2007 .

[7]  R. Posner,et al.  An Economic Analysis of Copyright Law , 1989, The Journal of Legal Studies.

[8]  Ian Phau,et al.  Pirating Pirates of the Caribbean: The curse of cyberspace , 2014 .

[9]  Robert LaRose,et al.  Sharing or Piracy? An Exploration of Downloading Behavior , 2005, J. Comput. Mediat. Commun..

[10]  Matthew B. Kugler,et al.  Community Perceptions of Theft Seriousness: A Challenge to Model Penal Code and English Theft Act Consolidation , 2010 .

[11]  Stephen J. Gould,et al.  “To Pirate or Not to Pirate”: A Comparative Study of the Ethical Versus Other Influences on the Consumer’s Software Acquisition-Mode Decision , 2004 .

[12]  N. Schoenberg,et al.  Using vignettes in awareness and attitudinal research , 2000 .

[13]  E. Ostrom Collective action and the evolution of social norms , 2000, Journal of Economic Perspectives.

[14]  C. Sunstein,et al.  On the Expressive Function of Law , 1996 .

[15]  P. E. Mudrack,et al.  Dilemmas, Conspiracies, and Sophie’s Choice: Vignette Themes and Ethical Judgments , 2013 .

[16]  Adams Js Towards an understanding of inequity , 1963 .

[17]  Twila Wingrove,et al.  Why were millions of people not obeying the law? Motivational influences on non-compliance with the law in the case of music piracy , 2011 .

[18]  John Hasnas,et al.  Ethics and the Problem of White Collar Crime , 2005 .

[19]  Wallace A. Wood,et al.  Situational determinants of software piracy: An equity theory perspective , 1996 .

[20]  A. Abbey,et al.  Alcohol-related sexual assault: a common problem among college students. , 2002, Journal of studies on alcohol. Supplement.

[21]  Robert F. Easley Ethical Issues in the Music Industry Response to Innovation and Piracy , 2005 .

[22]  Ahmed A. El-Masry,et al.  Development and validation of an instrument to measure online retailing ethics: Consumers' perspective , 2016, Internet Res..

[23]  Johan Liang,et al.  Comparison of attitudes towards digital piracy between downloaders and non-downloaders , 2012 .

[24]  Jih-Hsin Tang,et al.  The Effect of Interpersonal Influence on Softlifting Intention and Behaviour , 2005 .

[25]  Dyuti Banerjee Software piracy: a strategic analysis and policy instruments , 2003 .

[26]  Xiao Wang,et al.  The immorality of illegal downloading: The role of anticipated guilt and general emotions , 2012, Comput. Hum. Behav..

[27]  Matthew K. O. Lee,et al.  The impact of electronic word-of-mouth: The adoption of online opinions in online customer communities , 2008, Internet Res..

[28]  Varun Gauria,et al.  Organizational Behavior and Human Decision Processes , 2019 .

[29]  S. Hunt,et al.  A General Theory of Marketing Ethics , 1986 .

[30]  Stuart P. Green Thirteen Ways to Steal a Bicycle: Theft Law in the Information Age , 2012 .

[31]  Trevor T. Moores,et al.  Ethical Decision Making in Software Piracy: Initial Development and a Test of a Four-Component Model , 2006, MIS Q..

[32]  Edward C. S. Ku Beyond Price, How Does Trust Encourage Online Group's Buying Intention? , 2012, Internet Res..

[33]  T. P. Cronan,et al.  Digital Piracy: Factors that Influence Attitude Toward Behavior , 2006 .

[34]  Robert M. Siegfried,et al.  Student Attitudes on Software Piracy and Related Issues of Computer Ethics , 2004, Ethics and Information Technology.

[35]  Rong-An Shang,et al.  Ethical Decisions About Sharing Music Files in the P2P Environment , 2008 .

[36]  K. R. Conner,et al.  Software piracy: an analysis of protection strategies , 1991 .

[37]  Michael L. Benson,et al.  DENYING THE GUILTY MIND: ACCOUNTING FOR INVOLVEMENT IN A WHITE‐COLLAR CRIME* , 1985 .

[38]  I. Ajzen The theory of planned behavior , 1991 .

[39]  Mark F. Schultz Copynorms: Copyright and Social Norms , 2006 .

[40]  Tung-Ching Lin,et al.  An intention model-based study of software piracy , 1999, Proceedings of the 32nd Annual Hawaii International Conference on Systems Sciences. 1999. HICSS-32. Abstracts and CD-ROM of Full Papers.

[41]  Bandula Jayatilaka,et al.  Softlifting: Exploring Determinants of Attitude , 2008 .

[42]  Petter Gottschalk,et al.  Criminal entrepreneurship, white‐collar criminality, and neutralization theory , 2011 .

[43]  G. C. Homans,et al.  Social Behavior: Its Elementary Forms. , 1975 .

[44]  Hsiu-Fen Lin,et al.  The role of online and offline features in sustaining virtual communities: an empirical study , 2007, Internet Res..

[45]  Eric K W Lau,et al.  Interaction effects in software piracy. , 2007 .

[46]  Emma Banister,et al.  A cultural exploration of consumers’ interactions and relationships with celebrities , 2014 .

[47]  C. Hill Digital piracy: Causes, consequences, and strategic responses , 2007 .

[48]  Sameer Hinduja,et al.  Deindividuation and Internet Software Piracy , 2008, Cyberpsychology Behav. Soc. Netw..

[49]  Janice Denegri-Knott,et al.  Sinking the Online ?Music Pirates: ? Foucault, Power and Deviance on the Web , 2006, J. Comput. Mediat. Commun..

[50]  Connie R. Bateman,et al.  Ethical Decision Making in a Peer-to-Peer File Sharing Situation: The Role of Moral Absolutes and Social Consensus , 2013 .

[51]  Raquel Benbunan-Fich,et al.  Public contributions to private-collective systems: the case of social bookmarking , 2013, Internet Res..

[52]  Gresham M. Sykes,et al.  Techniques of neutralization: A theory of delinquency. , 1957 .

[53]  George E. Higgins,et al.  An Application of Deterrence Theory to Software Piracy , 2005 .

[54]  Raquel Benbunan-Fich,et al.  Is music downloading the new prohibition? What students reveal through an ethical dilemma , 2009, Ethics and Information Technology.

[55]  Joel Waldfogel,et al.  Movie piracy and sales displacement in two samples of Chinese consumers , 2012, Inf. Econ. Policy.

[56]  J. Elster Social Norms and Economic Theory , 1989, Handbook of Monetary Policy.

[57]  Ian Rowlands,et al.  The attitudes and behaviours of illegal downloaders , 2010, Aslib Proc..

[58]  Kirsten Robertson,et al.  Illegal Downloading, Ethical Concern, and Illegal Behavior , 2012 .

[59]  David A. Rettinger,et al.  Evaluating the Motivation of Other Students to Cheat: A Vignette Experiment , 2004 .

[60]  Jay Pil Choi,et al.  A model of piracy , 2006, Inf. Econ. Policy.

[61]  Erin L. Krupka,et al.  Identifying Social Norms Using Coordination Games: Why Does Dictator Game Sharing Vary? Identifying Social Norms Using Coordination Games: Why Does Dictator Game Sharing Vary? Identifying Social Norms Using Coordination Games: Why Does Dictator Game Sharing Vary? , 2022 .

[62]  Wei Wang,et al.  Understanding User Satisfaction With Instant Messaging: An Empirical Survey Study , 2012, Int. J. Hum. Comput. Interact..

[63]  T. Holt,et al.  Transferring Subcultural Knowledge On-Line: Practices and Beliefs of Persistent Digital Pirates , 2010 .

[64]  J. Stolte,et al.  The Context of Satisficing in Vignette Research , 1994 .