1,210
Views
18
CrossRef citations to date
0
Altmetric
Articles

Pirating Pirates of the Caribbean: The curse of cyberspace

, &

References

  • Agnew, R. (1994). The techniques of neutralization and violence. Criminology, 32, 555–580. doi: 10.1111/j.1745-9125.1994.tb01165.x
  • Aiken, M., Vanjani, M., Ray, B., & Martin, J. (2003). College student Internet use. Campus-Wide Information Systems, 20, 182–185. doi: 10.1108/10650740310507371
  • Ajzen, I. (1991). The theory of planned behavior. Organizational Behavior and Human Decision Processes, 50, 179–211. doi: 10.1016/0749-5978(91)90020-T
  • Ajzen, I., & Fishbein, M. (1977). Attitude–behavior relations: A theoretical analysis and review of empirical research. Psychological Bulletin, 84, 888–918. doi: 10.1037/0033-2909.84.5.888
  • Albers-Miller, N. D. (1999). Consumer misbehavior: Why people buy illicit goods. Journal of Consumer Marketing, 16, 273–287. doi: 10.1108/07363769910271504
  • Al-Rafee, S., & Cronan, T. P. (2006). Digital piracy: Factors that influence attitude toward behavior. Journal of Business Ethics, 63, 237–259. doi: 10.1007/s10551-005-1902-9
  • Altschuller, S., & Benbunan-Fich, R. (2009). Is music downloading the new prohibition? What students reveal through an ethical dilemma. Ethics and Information Technology, 11, 49–56. doi: 10.1007/s10676-008-9179-1
  • Ang, S. H., Cheng, P. S., Lim, E. A. C., & Tambyah, S. K. (2001). Spot the difference: Consumer responses towards counterfeits. Journal of Consumer Marketing, 18, 219–235. doi: 10.1108/07363760110392967
  • Bailey, A. A. (2006). Retail employee theft: A theory of planned behavior perspective. International Journal of Retail & Distribution Management, 34, 802–816. doi: 10.1108/09590550610710219
  • Bakker, P. (2005). File-sharing – Fight, ignore or compete: Paid download services vs. P2P-networks. Telematics and Informatics, 22, 41–55. doi: 10.1016/j.tele.2004.06.004
  • Bhattacharjee, S., Gopal, R. D., & Sanders, G. L. (2003). Digital music and online sharing: Software piracy 2.0? Considering the similarities and unique characteristics of online file sharing and software piracy. Communications of the ACM, 46(7), 107–111. doi: 10.1145/792704.792707
  • Bonner, S., & O’Higgins, E. (2010). Music piracy: Ethical perspectives. Management Decision, 48, 1341–1354. doi: 10.1108/00251741011082099
  • Bounie, D., Bourreau, M., & Waelbroeck, P. (2006). Piracy and the demand for films: Analysis of piracy behaviour in French universities. Review of Economic Research on Copyright Issues, 3(2), 15–27. doi: 10.2139/ssrn.936049
  • Buchan, H. F. (2005). Ethical decision making in the public accounting profession: An extension of Ajzen’s theory of planned behavior. Journal of Business Ethics, 61, 165–181. doi: 10.1007/s10551-005-0277-2
  • Byers, S., Cranor, L. F., Cronin, E., Korman, D., & McDaniel, P. (2004). An analysis of security vulnerabilities in the movie production and distribution process. Telecommunications Policy, 28, 619–644. doi: 10.1016/j.telpol.2004.05.007
  • Chalkiti, K., & Sigala, M. (2008). Information sharing and idea generation in peer to peer online communities: The case of ‘DIALOGOI’. Journal of Vacation Marketing, 14, 121–132. doi: 10.1177/1356766707087520
  • Chang, M. K. (1998). Predicting unethical behavior: A comparison of the theory of reasoned action and the theory of planned behavior. Journal of Business Ethics, 17, 1825–1834. doi: 10.1023/A:1005721401993
  • Chatzidakis, A., Hibbert, S., Mittusis, D., & Smith, A. (2004). Virtue in consumption? Journal of Marketing Management, 20, 527–544. doi: 10.1362/0267257041323972
  • Chellapa, R. K., & Shivendu, S. (2003). Economics implications of variable technology standards for movie piracy in a global context. Journal of Management Information Systems, 20(2), 137–168. doi: 32AY456
  • Cheng, H. K., Sims, R. R., & Teegen, H. (1997). To purchase or to pirate software: An empirical study. Journal of Management Information Systems, 13(4), 49–60. Retrieved from http://dl.acm.org/citation.cfm?id=1195828
  • Chen, M.-F., Pan, C.-T., & Pan, M.-C. (2009). The joint moderating impact of moral intensity and moral judgment on consumers’ use intention of pirated software. Journal of Business Ethics, 90, 361–373. doi: 10.1007/s10551-009-0046-8
  • Chiang, E. P., & Assane, D. (2008). Music piracy among students on the university campus: Do males and females react differently? Journal of Socio-Economics, 37, 1371–1380. doi: 10.1016/j.socec.2007.08.011
  • Cohn, D. Y., & Vaccaro, V. L. (2006). A study of neutralization theory’s application to global consumer ethics: P2P file-trading of musical intellectual property on the Internet. International Journal of Internet Marketing and Advertising, 3, 68–88. doi: 10.1504/IJIMA.2006.008975
  • Coleman, J. W. (1994). Neutralization theory: An empirical application and assessment (Unpublished doctoral thesis). Oklahoma State University, Stillwater, US.
  • Cronan, T. P., & Al-Rafee, S. (2008). Factors that influence the intention to pirate software and media. Journal of Business Ethics, 78, 527–545. doi: 10.1007/s10551-007-9366-8
  • d’Astous, A., Colbert, F., & Montpetit, D. (2005). Music piracy on the web – How effective are anti-piracy arguments? Evidence from the theory of planned behavior. Journal of Consumer Policy, 28, 289–310. doi: 10.1007/s10603-005-8489-5
  • Dejean, S. (2009). What can we learn from empirical studies about piracy? CESifo Economic Studies, 55, 326–352. doi: 10.2139/ssrn.1219442
  • De Kosnik, A. (2010). Piracy is the future of television. Convergence Culture Consortium. Retrieved from http://convergenceculture.org/research/c3-piracy_future_television-full.pdf
  • De Vany, A. S., & Walls, W. D. (2007). Estimating the effects of movie piracy on box-office revenue. Review of Industrial Organization, 30, 291–301. doi: 10.1007/s11151-007-9141-0
  • De Young, M. (1988). The indignant page: Techniques of neutralization in the publications of paedophile organizations. Child Abuse & Neglect, 12, 583–591. doi: 10.1016/0145-2134(88)90076-2
  • Freestone, O., & Mitchell, V.-W. (2004). Generation Y attitudes towards E-ethics and Internet-related misbehaviours. Journal of Business Ethics, 54, 121–128. doi: 10.1007/s10551-004-1571-0
  • Gayer, A., & Shy, O. (2003). Internet and peer-to-peer distributions in markets for digital products. Economic Letters, 81, 197–203. doi: 10.1016/S0165-1765(03)00170-8
  • Goodey, C., & East, R. (2008). Testing the market maven concept. Journal of Marketing Management, 24, 265–282. doi: 10.1362/026725708X306095
  • Goles, T., Jayatilaka, B., George, B., Parsons, L., Chambers, V., Taylor, D., & Brune, R. (2008). Softlifting: Exploring determinants of attitude. Journal of Business Ethics, 77, 481–499. doi: 10.1007/s10551-007-9361-0
  • Grant, I. C. (2004). Communicating with young people through the eyes of marketing practitioners. Journal of Marketing Management, 20, 591–606. doi: 10.1362/0267257041323963
  • Grant, R., Clarke, R. J., & Kyriazis, E. (2007). A review of factors affecting online consumer search behaviour from an information value perspective. Journal of Marketing Management, 23, 519–533. doi: 10.1362/026725707X212801
  • Harris, L. C., & Dumas, A. (2009). Online consumer misbehaviour: An application of neutralization theory. Marketing Theory, 9, 379–402. doi: 10.1177/1470593109346895
  • Heath, M. T. P., & Heath, M. (2008). (Mis)trust in marketing: A reflection on consumers’ attitudes and perceptions. Journal of Marketing Management, 24, 1025–1039. doi: 10.1362/026725708X382037
  • Henry, S., & Eaton, R. (Eds.). (1990). Degrees of deviance: Student accounts of their deviant behavior. Salem, WI: Sheffield.
  • Hill, C. W. L. (2007). Digital piracy: Causes, consequences, and strategic responses. Asia Pacific Journal of Management, 24, 9–25. doi: 10.1007/s10490-006-9025-0
  • Hinduja, S. (2007). Neutralization theory and online software piracy: An empirical analysis. Ethics and Information Technology, 9, 187–204. doi: 10.1007/s10676-007-9143-5
  • Hofstede, G. (1983). Dimensions of national cultures in fifty countries and three regions. In J. B. Deregowski, S. Dziurawiec, & R. C. Annis (Eds.), Expiscations in cross-cultural psychology (pp. 335–355). Lisse: Swets & Zeitlinger.
  • Husted, B. W. (2000). The impact of national culture on software piracy. Journal of Business Ethics, 26, 198–211. doi: 10.1023/A:1006250203828
  • Ingram, J. R., & Hinduja, S. (2008). Neutralizing music piracy: An empirical examination. Deviant Behavior, 29, 334–366. doi: 10.1080/01639620701588131
  • Jones, K. C. (2008, January 23). MPAA overstated students’ role in losses due to piracy. http://www.informationweek.com/news/internet/showArticle.jhtml?articleID=205917178
  • Ki, E.-J., Chang, B.-H., & Khang, H. (2006). Exploring influential factors on music piracy across countries. Journal of Communication, 56, 406–426. doi: 10.1111/j.1460-2466.2006.00026.x
  • Klockars, C. B. (1974). The professional fence. New York, NY: Free Press.
  • Kuo, F.-Y., & Hsu, M.-H. (2001). Development and validation of ethical computer self-efficacy measure: The case of softlifting. Journal of Business Ethics, 32, 299–315. doi: 10.1023/A:1010715504824
  • Kwong, K. K., Yau, O. H. M., Lee, J. S. Y., Sin, L. Y. M., & Tse, A. C. B. (2003). The effects of attitudinal and demographic factors on intention to buy pirated CDs: The case of Chinese consumers. Journal of Business Ethics, 47, 223–235. doi: 10.1023/A:1026269003472
  • Kwong, T. C. H., & Lee, M. K. O. (2002). Behavioral intention model for the exchange mode Internet music piracy. In R. H. Sprague, Jr., S. Laney, & E. Dennis (Eds.), 35th Hawaii International Conference on System Sciences (HICSS-35 2002), proceedings, 7–10 January 2002, Big Island, HI, USA (Track 7, pp. 191–201). Washington, DC: IEEE Computer Society.
  • LaRose, R., Lai, Y.-J., Lange, R., Love, B., & Wu, Y. (2006). Sharing or piracy? An exploration of downloading behavior. Journal of Computer-Mediated Communication, 11, 1–21. doi: 10.1111/j.1083-6101.2006.tb00301.x
  • Leonard, L. N. K., & Cronan, T. P. (2001). Illegal, inappropriate, and unethical behavior in an information technology context: A study to explain influence. Journal of the Association for Information Systems, 1(12), 1–31. Retrieved from http://aisel.aisnet.org/jais/vol1/iss1/12
  • Levin, A. M., Dato-on, M. C., & Manolis, C. (2007). Deterring illegal downloading: The effects of threat appeals, past behavior, subjective norms, and attributions of harm. Journal of Consumer Behaviour, 6, 111–122. doi: 10.1002/cb.211
  • Liao, C., Lin, H.-N., & Liu, Y.-P. (2010). Predicting the use of pirated software: A contingency model integrating perceived risk with the theory of planned behavior. Journal of Business Ethics, 91, 237–252. doi: 10.1007/s10551-009-0081-5
  • Liebowitz, S. J. (2006). File sharing: Creative destruction or just plain destruction? The Journal of Law and Economics, 49, 1–28. doi: 10.1086/503518
  • Limayem, M., Khalifa, M., & Chin, W. W. (1999). Factors motivating software piracy: A longitudinal study. In P. De & J. I. DeGross (Eds.), Proceedings of the Twentieth International Conference on Information Systems, ICIS 1999, Charlotte, North Carolina, USA, December 13–15, 1999 (pp. 124–131). Atlanta, GA: AIS.
  • Limayem, M., Khalifa, M., & Chin, W. W. (2004). Factors motivating software piracy: A longitudinal study. IEEE Transactions on Engineering Management, 51, 414–425. doi: 10.1109/TEM.2004.835087
  • Lysonski, S., & Durvasula, S. (2008). Digital piracy of MP3s: Consumer and ethical predispositions. Journal of Consumer Marketing, 25, 167–178. doi: 10.1108/07363760810870662
  • Michaelidou, N., & Christodoulides, G. (2011). Antecedents of attitude and intention towards counterfeit symbolic and experiential products. Journal of Marketing Management, 27, 71–89. doi: 10.1080/0267257X.2010.549189
  • Minor, W. W. (1980). The neutralization of the criminal offense. Criminology, 18, 103–120. doi: 10.1111/j.1745-9125.1980.tb01351.x
  • Mitchell, J., & Dodder, R. A. (1983). Types of neutralization and types of delinquency. Journal of Youth and Adolescence, 12, 307–318. doi: 10.1007/BF02088729
  • Mitchell, V.-W., & Chan, J. K. L. (2002). Investigating UK consumers’ unethical attitudes and behaviours. Journal of Marketing Management, 18, 5–26. doi: 10.1362/0267257022775873
  • Newman, M. Z. (2012). Free TV: File sharing and the value of television. Television & New Media, 13, 463–479. doi: 10.1177/1527476411421350
  • Organisation for Economic Co-Operation and Development (OECD). (2007). The economic impact of counterfeiting and piracy. OECD. Retrieved from http://www.oecd.org/dataoecd/13/12/38707619.pdf
  • Page, K., DK, & Mapstone, M. (2011). How does the web make youth feel? Exploring the positive digital native rhetoric. Journal of Marketing Management, 26, 1345–1366. doi: 10.1080/0267257X.2010.523709
  • Peace, A. G., Galletta, D. F., & Thong, J. Y. L. (2003). Software piracy in the workplace: A model and empirical test. Journal of Management Information Systems, 20(1), 153–177. Retrieved from http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1976963
  • Phau, I., & Liang, J. (2012). Downloading games: The predictors, moderators and consequences. Marketing Intelligence & Planning, 30, 740–756. doi: 10.1108/02634501211273832
  • Phau, I., & Ng, J. (2010). Predictors of usage intentions of pirated software. Journal of Business Ethics, 94, 23–37. doi: 10.1007/s10551-009-0247-1
  • Phau, I., & Teah, M. (2009). Devil wears (counterfeit) Prada: A study of antecedents and outcomes of attitudes towards counterfeits of luxury brands. Journal of Consumer Marketing, 26, 15–27. doi: 10.1108/07363760910927019
  • Phau, I., Teah, M., & Lee, A. (2009). Targeting buyers of counterfeits of luxury brands: A study on attitudes of Singapore consumers. Journal of Targeting, Measurement and Analysis for Marketing, 17, 3–15. doi: 10.1057/jt.2008.25
  • Picard, R. G. (2004). A note on economic losses due to theft, infringement, and piracy of protected works. Journal of Media Economics, 17, 207–217. doi: 10.1207/s15327736me1703_6
  • Ponte, L. M. (2008). Coming attractions: Opportunities and challenges in thwarting global movie piracy. American Business Law Journal, 45, 331–369. doi: 10.1111/j.1744-1714.2008.00057.x
  • Pouwelse, J., Garbacki, P., Epema, D., & Sips, H. (2005). The Bittorrent P2P file-sharing system: Measurements and analysis. In M. Castro & R. van Renesse (Eds.), Peer-to-Peer Systems IV: 4th International Workshop, IPTPS 2005, Ithaca, NY, USA, February 24–25, 2005. Revised selected papers (Lecture Notes in Computer Science, Vol. 3460, pp. 205–216). Berlin: Springer.
  • Proserpio, L., Salvemini, S., & Ghiringhelli, V. (2005). Entertainment pirates: Determinants of piracy in the software, music and movie industries. International Journal of Arts Management, 8(1), 33–47. Retrieved from http://www.jstor.org/stable/41064861
  • Randall, D. M., & Gibson, A. M. (1991). Ethical decision making in the medical profession: An application of the theory of planned behavior. Journal of Business Ethics, 10, 111–122. doi: 10.1007/BF00383614
  • Rob, R., & Waldfogel, J. (2006). Piracy on the high C’s: Music downloading, sales displacement, and social welfare in a sample of college students. The Journal of Law and Economics, 49, 29–62. doi: 10.1086/430809
  • Rowley, J. (2008). Understanding digital content marketing. Journal of Marketing Management, 24, 517–540. doi: 10.1362/026725708X325977
  • Sharma, P., & Chan, R. Y. K. (2011). Counterfeit proneness: Conceptualisation and scale development. Journal of Marketing Management, 27, 602–626. doi: 10.1080/0267257X.2010.489829
  • Shaw, D., Shiu, E., & Clarke, I. (2000). The contribution of ethical obligation and self-identity to the theory of planned behavior: An exploration of ethical consumers. Journal of Marketing Management, 16, 879–894. doi: 10.1362/026725700784683672
  • Shin, S. K., Gopal, R. D., Sanders, G. L., & Whinston, A. B. (2004). Global software piracy revisited. Communications of the ACM, 47(1), 103–107. doi: 10.1145/962081.962088
  • Shore, B., Venkatachalam, A. R., Solorzano, E., Urn, J. M., Hassan, S. Z., & Janczewski, L. J. (2001). Softlifting and piracy: Behaviour across cultures. Technology in Society, 23, 563–581. doi: 10.1016/S0160-791X(01)00037-9
  • Simpson, P. M., Banerjee, D., & Simpson, C. L. (1994). Softlifting: A model of motivating factors. Journal of Business Ethics, 15, 431–438. doi: 10.1007/BF00881451
  • Sykes, G. M., & Matza, D. (1957). Techniques of neutralization: A theory of delinquency. American Sociological Review, 22, 664–670. doi: 10.2307/2089195
  • Tang, J.-H., & Farn, C.-K. (2005). The effect of interpersonal influence on softlifting intention and behaviour. Journal of Business Ethics, 56, 149–161. doi: 10.1007/s10551-004-2170-9
  • Taylor, G. S., & Shim, J. P. (1993). A comparative examination of attitudes toward software piracy among business professors and executives. Human Relations, 46, 419–433. doi: 10.1177/001872679304600401
  • Terrell, K., & Rosen, S. (2003, July 6). A nation of pirates: Panicked by digital plunder, the entertainment industry fights back. U.S. News and World Report, 135(1), pp. 40–42.
  • Triandis, C. (1980). Values, attitudes and interpersonal behavior. In H. E. Howe, Jr. & M. M. Page (Eds.), Nebraska Symposium on Motivation, 1979: Attitudes, values, and beliefs (Vol. 27, pp. 159–295). Lincoln, NE: University of Nebraska Press.
  • Vitell, S. J., & Grove, S. J. (1987). Marketing ethics and the techniques of neutralization. Journal of Business Ethics, 6, 433–438. doi: 10.1007/BF00383285
  • Wang, C.-C., Chen, C.-T., Yang, S.-C., & Farn, C.-K. (2009). Pirate or buy? The moderating effect of idolatry. Journal of Business Ethics, 90, 81–93. doi: 10.1007/s10551-009-0027-y
  • Wang, F., Zhang, H., Zang, H., & Ouyang, M. (2005). Purchasing pirated software: An initial examination of Chinese consumers. Journal of Consumer Marketing, 22, 340–351. doi: 10.1108/07363760510623939
  • Waterman, D., Ji, S. W., & Rochet, L. R. (2007). Enforcement and control of piracy, copying and sharing in the movie industry. Review of Industrial Organization, 30, 255–289. doi: 10.1007/s11151-007-9136-x
  • Whitman, M. E., Townsend, A. M., Hendrickson, A. R., & Rensvold, R. B. (1998). Computer aversion and computer-use ethics in U.S. and Asian cultures. Journal of Computer Information Systems, 38(4), 19–24. Retrieved from http://digitalcommons.kennesaw.edu/facpubs/1424/
  • Wolk, A., & Theysohn, S. (2007). Factors influencing website traffic in the paid content market. Journal of Marketing Management, 23, 769–796. doi: 10.1362/026725707X230036
  • Yu, S. (2012). College students’ justification for digital piracy: A mixed methods study. Journal of Mixed Methods Research, 6, 364–378. doi: 10.1177/1558689812451790
  • Zamoon, S., & Curley, S. P. (2008). Ripped from the headlines: What can the popular press teach us about software piracy? Journal of Business Ethics, 83, 515–533. doi: 10.1007/s10551-007-9636-5
  • Zentner, A. (2008). Online sales, Internet use, file-sharing, and the decline of retail music specialty stores. Information Economics and Policy, 20, 288–300. doi: 10.1016/j.infoecopol.2008.06.006

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.