1,013
Views
7
CrossRef citations to date
0
Altmetric
Research Article

Investigating Neutralization Strategies in Digital Piracy: The Role of Content Preferences and Social Norms

References

  • Arli, D., Tjiptono, F., Casidy, R., & Phau, I. (2018). Investigating the impact of young consumers’ religiosity on digital piracy. International Journal of Consumer Studies, 42(6), 792–803. doi:10.1111/ijcs.12443
  • Bhal, K. T., & Leekha, N. D. (2008). Exploring cognitive moral logics using grounded theory: The case of software piracy. Journal of Business Ethics, 81(3), 635–646. doi:10.1007/s10551-007-9537-7
  • Bowman, N. D., Joeckel, S., & Dogruel, L. (2012). A question of morality? The influence of moral salience and nationality on media preferences. Communications, 37(4), 345–369. doi:10.1515/commun-2012-0020
  • Brewer, R., Cale, J., Goldsmith, A., & Holt, T. (2018). Young people, the internet, and emerging pathways into criminality: A study of Australian adolescents. International Journal of Cyber Criminology, 12(1). doi:10.5281/zenodo.1467853
  • Caldwell Brown, S. (2016). Where do beliefs about music piracy come from and how are they shared? International Journal of Cyber Criminology, 10(1), 21–39. doi:10.5281/zenodo.58518
  • Cho, H., Chung, S., & Filippova, A. (2015). Perceptions of social norms surrounding digital piracy: The effect of social projection and communication exposure on injunctive and descriptive norms. Computers in Human Behavior, 48, 506–515. doi:10.1016/j.chb.2015.02.018
  • Cialdini, R. B., Kallgren, C. A., & Reno, R. R. (1991). A focus theory of normative conduct: A theoretical refinement and reevaluation of the role of norms in human behavior. Advances in Experimental Social Psychology, 24, 201–234. doi:10.1016/S0065-2601(08)60330-5
  • Cialdini, R. B., Reno, R. R., & Kallgren, C. A. (1990). A focus theory of normative conduct: Recycling the concept of norms to reduce littering in public places. Journal of Personality and Social Psychology, 58(6), 1015–1026. doi:10.1037/0022-3514.58.6.1015
  • Danaher, B., & Smith, M. D. (2016). Digital piracy, film quality, and social welfare. George Mason Law Review, 24, 923.
  • Eisend, M. (2019). Morality effects and consumer responses to counterfeit and pirated products: A meta-analysis. Journal of Business Ethics, 154(2), 301–323. doi:10.1007/s10551-016-3406-1
  • Festinger, L. (1957). A theory of cognitive dissonance. Stanford, CA: Stanford University Press.
  • Hair, J. F., Hult, G. T. M., Ringle, C., & Sarstedt, M. (2016). A primer on partial least squares structural equation modeling (PLS-SEM). Thousand Oaks, CA: Sage.
  • Harris, L. C., & Daunt, K. L. (2011). Deviant customer behaviour: A study of techniques of neutralisation. Journal of Marketing Management, 27(7–8), 834–853. doi:10.1080/0267257X.2010.498149
  • Harris, L. C., & Dumas, A. (2009). Online consumer misbehavior: An application of neutralization theory. Marketing Theory, 9(4), 379–402. doi:10.1177/1470593109346895
  • Hashim, M. J., Kannan, K. N., & Wegener, D. (2018). A central role of moral obligations in determining intentions to engage in digital piracy. Retrieved from SSRN: https://ssrn.com/abstract=3114508 doi:10.2139/ssrn.3114508
  • Heider, F. (1946). Attitudes and cognitive organization. The Journal of Psychology, 21(1), 107–112. doi:10.1080/00223980.1946.9917275
  • Hennig-Thurau, T., Henning, V., & Sattler, H. (2007). Consumer file sharing of motion pictures. Journal of Marketing, 71(4), 1–18. doi:10.1509/jmkg.71.4.001
  • Henry, S. (2009). Social deviance. Cambridge, UK: Polity Press.
  • Hinduja, S. (2007). Neutralization theory and online software piracy: An empirical analysis. Ethics and Information Technology, 9(3), 187–204. doi:10.1007/s10676-007-9143-5
  • Holt, T. J., & Bossler, A. M. (2014). An assessment of the current state of cybercrime scholarship. Deviant Behavior, 35, 20–40. doi:10.1080/01639625.2013.822209
  • Ingram, J. R., & Hinduja, S. (2008). Neutralizing music piracy: An empirical examination. Deviant Behavior, 29(4), 334–366. doi:10.1080/01639620701588131
  • Katz, D. (1960). The functional approach to the study of attitudes. Public Opinion Quarterly, 24(2), 163–204. doi:10.1086/266945
  • Kirwan, G., & Power, A. (2013). Cybercrime: The psychology of online offenders. Cambridge, UK: Cambridge University Press.
  • Lapinski, M. K., & Rimal, R. V. (2005). An explication of social norms. Communication Theory, 15(2), 127–147. doi:10.1111/j.1468-2885.2005.tb00329.x
  • LaRose, R., & Kim, J. (2007). Share, steal or buy? A social cognitive perspective of music downloading. Cyberpsychology and Human Behavior, 10(2), 267–277. doi:10.1089/cpb.2006.9959
  • Liao, C., Lin, H.-N., & Liu, Y.-P. (2010). Predicting the use of pirated software: A contingency model integrating perceived risk with the theory of planned behavior. Journal of Business Ethics, 91(2), 237–252. doi:10.1007/s10551-009-0081-5
  • Malin, J., & Fowers, B. J. (2009). Adolescent self-control and music and movie piracy. Computers in Human Behavior, 25(3), 718–722. doi:10.1016/j.chb.2008.12.029
  • Maruna, S., & Copes, H. (2005). What have we learned from five decades of neutralization research? Crime and Justice, 32, 221–320. doi:10.1086/655355
  • Mastro, D., Enriquez, M., & Bowman, N. D. (2012). Morality subcultures and media production: How Hollywood minds the morals of its audience. In R. Tamborini (Ed.), Media and the moral mind (pp. 99–116). New York, NY: Routledge.
  • Morris, R. G., & Higgins, G. E. (2009). Neutralizing potential and self-reported digital piracy. A multitheoretical exploration among college undergraduates. Criminal Justice Review, 34(2), 173–195. doi:10.1177/0734016808325034
  • Newman, M. Z. (2012). Free TV: File-sharing and the value of television. Television & New Media, 13(6), 463–479. doi:10.1177/1527476411421350
  • Olivero, N., Greco, A., Annoni, A. M., Steca, P., & Lowry, P. B. (2019). Does opportunity make the thief? Abilities and moral disengagement in illegal downloading. Behavior & Information Technology, 38, 1273–1289. doi:10.1080/0144929X.2019.1583768
  • Park, Y. J. (2018). Explicating net diversity in trend assessment. Communication Research, 45(5), 783–809. doi:10.1177/0093650215601883
  • Petrescu, M., Gironda, J. T., & Korgaonkar, P. K. (2018). Online piracy in the context of routine activities and subjective norms. Journal of Marketing Management, 34(3–4), 314–346. doi:10.1080/0267257X.2018.1452278
  • Peukert, C., Claussen, J., & Kretschmer, T. (2017). Piracy and box office movie revenues: Evidence from Megaupload. International Journal of Industrial Organization, 52, 188–215. doi:10.1016/j.ijindorg.2016.12.006
  • Phau, I., Lim, A., Liang, J., & Lwin, M. (2014). Engaging in digital piracy of movies: A theory of planned behaviour approach. Internet Research, 24(2), 246–266. doi:10.1108/IntR-11-2012-0243
  • Sardanelli, D., Vollero, A., Siano, A., & Bottoni, G. (2019). Lowering the pirate flag: A TPB study of the factors influencing the intention to pay for movie streaming services. Electronic Commerce Research, 19(3), 549–574. doi:10.1007/s10660-019-09346-7
  • Stroud, N. J. (2017). Selective exposure theories. In K. Kenski & K. H. Jamieson (Eds.), The Oxford handbook of political communication (pp. 531–548). New York, NY: Oxford University Press.
  • Suler, J. (2004). The online disinhibition effect. Cyberpsychology & Behavior, 7, 321–326. doi:10.1089/1094931041291295
  • Sykes, G., & Matza, D. (1957). Techniques of neutralization: A theory of delinquency. American Sociological Review, 22, 664–670. doi:10.2307/2089195
  • Tamborini, R., Weber, R., Bowman, N. D., Eden, A., & Skalski, P. (2013). “Violence is a many-splintered thing”: The importance of realism, justification, and graphicness in understanding perceptions of and preferences for violent films and video games. Projections, 7(1), 100–118. doi:10.3167/proj.2013.070108
  • Wang, X., & McClung, S. R. (2011). Toward a detailed understanding of illegal digital downloading intentions: An extended theory of planned behavior approach. New Media & Society, 13(4), 663–677. doi:10.1177/1461444810378225

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.