1,386
Views
87
CrossRef citations to date
0
Altmetric
Original Articles

Transferring Subcultural Knowledge On-Line: Practices and Beliefs of Persistent Digital Pirates

&
Pages 625-654 | Received 19 Feb 2009, Accepted 16 May 2009, Published online: 25 Aug 2010

REFERENCES

  • Akers , Ronald L. 1998 . Social Learning and Social Structure: A General Theory of Crime and Deviance . Boston : Northeastern University Press .
  • Al-Rafee , Sulaiman and Timothy P. Cronan . 2006 . “Digital Piracy: Factors that Influence Attitude Toward Behavior.” Journal of Business Ethics 63 : 237 – 259 .
  • Bachman , Michael. 2007 . “Lesson Spurned? Reactions of Online Music Pirates to Legal Prosecutions by the RIAA.” International Journal of Cyber Criminology 1 : 213 – 227 .
  • Bainbridge , William S. 2000 . “Religious Ethnography on the World Wide Web.” Pp. 55 – 80 . In Religion and the Social Order: Religion on the Internet , edited by J. K. Hadden and D. E. Cowan .
  • Chiou , Jyh-Shen , Chien-yi Huang , and Hsin-hui Lee . 2005 . “The Antecedents of Music Piracy: Attitudes and Intentions.” Journal of Business Ethics 57 : 161 – 174 .
  • Cohen , Albert K. 1955 . Delinquent Boys: The Culture of the Gang . New York : Free Press .
  • Cooper , Jon and Daniel M. Harrison . 2001 . “The Social Organization of Audio Piracy on the Internet.” Media, Culture, and Society 23 : 71 – 89 .
  • Copes , Heith , Andy Hochstetler , and Patrick Williams . 2008 . “We Weren't Like No Regular Dope Fiends: Negotiating Hustler and Crackhead Identities.” Social Problems 55 : 254 – 270 .
  • Denzin , Norman K. 1999 . “Cybertalk and the Method of Instances.” Pp. 107 – 25 . In Doing Internet Research: Critical Issues and Methods for Examining the Net , edited by S. Jones . Thousand Oaks , CA : Sage .
  • DiMarco , Andrew D. and Heather DiMarco . 2003 . “Investigating Cybersociety: A Consideration of the Ethical and Practical Issues Surrounding Online Research in Chat Rooms.” Pp. 164 – 79 . In Dot.cons: Crime, Deviance, and Identity on the Internet , edited by Y. Jewkes . Portland , OR : Willan Publishing .
  • Fine , Gary and Sherryl Kleinman . 1979. “Rethinking Subculture: An Interactionist Analysis.” American Journal of Sociology 85:1–20.
  • Furnell , Steven. 2002 . Cybercrime: Vandalizing the Information Society . Boston , MA : Addison-Wesley .
  • Glaser , David. 1956 . “Criminality Theories and Behavioral Images.” American Journal of Sociology 61 : 433 – 444 .
  • Gross , Elisheva F. 2004 . “Adolescent Internet Use: What We Expect, What Teens Report.” Journal of Applied Developmental Psychology 25 : 633 – 649 .
  • Higgins , George E. 2005 . “Can Low Self-Control Help with the Understanding of the Software Piracy Problem?” Deviant Behavior 26 : 1 – 24 .
  • Higgins , George E. , Brian D. Fell , and Abby L. Wilson . 2006 . “Digital Piracy: Assessing the Contributions of an Integrated Self-Control Theory and Social Learning Theory Using Structural Equation Modeling.” Criminal Justice Studies 19 : 3 – 22 .
  • Higgins , George E. and David A. Makin . 2004 . “Self-Control, Deviant Peers, and Software Piracy.” Psychological Reports 95 : 921 – 931 .
  • Higgins , George E. , Scott E. Wolfe , and Catherine D. Marcum . 2008 . “Digital Piracy: An Examination of Three Measurements of Self-Control.” Deviant Behavior 29 : 440 – 460 .
  • Hinduja , Sameer. 2001 . “Correlates of Internet Software Piracy.” Journal of Contemporary Criminal Justice 17 : 369 – 382 .
  • ——— . 2003 . “Trends and Patterns among Software Pirates.” Ethics and Information Technology 5 : 49 – 61 .
  • ——— . 2007 . “Neutralization Theory and Online Software Piracy: An Empirical Analysis.” Ethics and Information Technology 9 : 187 – 204 .
  • Holt , Thomas J. 2007 . “Subcultural Evolution? Examining the Influence of On- and Off-Line Experiences on Deviant Subcultures.” Deviant Behavior 28 : 171 – 198 .
  • ———. In Press . “Exploring Strategies for Qualitative Criminological and Criminal Justice Inquiry Using On-line Data.” Journal of Criminal Justice Education .
  • Ingram , Jason and Sameer Hinduja . 2008 . “Neutralizing Music Piracy: An Empirical Examination.” Deviant Behavior 29 : 334 – 366 .
  • Jordan , Tim and Paul Taylor . 1998 . “A Sociology of Hackers.” The Sociological Review 46 : 757 – 780 .
  • Levy , Steven. 1984 . Hackers: Heroes of the Computer Revolution . New York : Dell .
  • Mann , David and Mike Sutton . 1998 . “Netcrime: More Changes in the Organisation of Thieving.” British Journal of Criminology 38 : 201 – 229 .
  • Maruna , Shadd and Heith Copes . 2005 . “What Have We Learned from Fifty Years of Neutralization Research?” Crime and Justice: A Review of Research 32 : 221 – 320 .
  • McCarthy , Bill. 1996. “The Attitudes and Actions of Others: Tutelage and Sutherland's Theory of Differential Association.” British Journal of Criminology 36:135–147.
  • Menchik , Daniel and Xiaoli Tian . 2008 . “Putting Social Context Into Text: The Semiotics of E-Mail Interaction.” American Journal of Sociology 114 : 332 – 370 .
  • Morris , Robert G. and George E. Higgins . 2009 . “Neutralizing Potential and Self-Reported Digital Piracy: A Multitheoretical Exploration among College Undergraduates.” Criminal Justice Review 34 : 173 – 195 .
  • Morselli , Carlo , Pierre Tremblay , and Bill McCarthy . 2006 . “Mentors and Criminal Achievement.” Criminology 44 : 17 – 43 .
  • Quinn , James F. and Craig J. Forsyth . 2005 . “Describing Sexual Behavior in the Era of the Internet: A Typology for Empirical Research.” Deviant Behavior 26 : 191 – 207 .
  • Rosecrance , John. 1986 . “The Stooper: A Professional Thief in the Sutherland Manner.” Criminology 24 : 29 – 40 .
  • Simms , Ronald R. , Hsing K. Cheng , and Hildy Teegen . 1996 . “Toward a Profile of Student Software Pirates.” Journal of Business Ethics 15 : 839 – 849 .
  • Skinner , William F. and Anne M. Fream . 1997 . “A Social Learning Theory Analysis of Computer Crime among College Students.” Journal of Research in Crime and Delinquency 34 : 495 – 518 .
  • Steffensmeier , Darrell J. and Jeffery T. Ulmer . 2005 . Confessions of a Dying Thief: Understanding Criminal Careers and Illegal Enterprise . New Brunswick , NJ : Aldine Transaction .
  • Sutherland , Edwin. 1937 . The Professional Thief . Chicago : University of Chicago Press .
  • ——— . 1947 . Principles of Criminology . Philadelphia : Lippincott .
  • Sykes , Gresham and David Matza . 1957 . “Techniques of Neutralization: A Theory of Delinquency.” American Sociological Review 22 : 664 – 670 .
  • Szor , Peter. 2005 . The Art of Computer Virus Research and Defense . Upper Saddle River , NJ : Addison Wesley .
  • Taylor , Robert W. , Tory J. Caeti , D. Kall Loper , Eric J. Fritsch , and John Liederbach . 2006 . Digital Crime and Digital Terrorism . Upper Saddle River , NJ : Pearson Prentice Hall .
  • Warr , Mark. 2002 . Companions in Crime: The Social Aspects of Criminal Conduct . New York : Cambridge University Press .
  • Williams , Patrick and Heith Copes . 2005 . “How Edge are You? Constructing Authentic Identities and Subcultural Boundaries in a Straightedge Internet Forum.” Symbolic Interaction 28 : 67 – 89 .
  • Wolfe , Scott , George Higgins , and Catherine Marcum . 2008 . “Deterrence and Digital Piracy: A Preliminary Examination of the Role of Viruses.” Social Science Computer Review 26 : 1 – 17 .

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.