176
Views
0
CrossRef citations to date
0
Altmetric
Research Article

Password-Sharing on SVOD Platforms: An Examination Through the Lens of Piracy Neutralization

ORCID Icon, ORCID Icon & ORCID Icon
Received 24 Nov 2023, Accepted 01 Mar 2024, Published online: 22 Mar 2024

References

  • Akbulut, Y., & Dönmez, O. (2018). Predictors of digital piracy among Turkish undergraduate students. Telematics and Informatics, 35(5), 1324–1334. https://doi.org/10.1016/j.tele.2018.03.004
  • Ameri, M., Honka, E., & Xie, Y. (2019). Viewing modus and media franchise engagement [White paper]. https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2986395.
  • Bansal, G., Muzatko, S., & Shin, S. I. (2021). Information system security policy noncompliance: The role of situation-specific ethical orientation. Information Technology & People, 34(1), 250–296. https://doi.org/10.1108/ITP-03-2019-0109
  • Bossler, A. M. (2021). Neutralizing cyber attacks: Techniques of neutralization and willingness to commit cyber attacks. American Journal of Criminal Justice, 46(6), 911–934. https://doi.org/10.1007/s12103-021-09654-5
  • Cheng, R. J., & Fang, W. (2015). Blog intention based on fashion involvement and trust. International Journal of Electronic Commerce Studies, 6(1), 19–36. https://doi.org/10.7903/ijecs.1390
  • Chin, W. W., & Newsted, P. R. (1999). Structural equation modeling analysis with small samples using partial least squares. In R. H. Hoyle (Ed.), Statistical strategies for small sample research (vol. 1, issue no. 1, pp. 307–341). Sage.
  • Cho, H., Chung, S., & Filippova, A. (2015). Perceptions of social norms surrounding digital piracy: The effect of social projection and communication exposure on injunctive and descriptive social norms. Computers in Human Behavior, 48, 506–515. https://doi.org/10.1016/j.chb.2015.02.018
  • Cronan, T. P., & Al-Rafee, S. (2008). Factors that influence the intention to pirate software and media. Journal of Business Ethics, 78(4), 527–545. https://doi.org/10.1007/s10551-007-9366-8
  • Dinev, T., & Hart, P. (2006). An extended privacy calculus model for e-commerce transactions. Information Systems Research, 17(1), 61–80. https://doi.org/10.1287/isre.1060.0080
  • Eisend, M. (2019). Explaining digital piracy: A meta-analysis. Information Systems Research, 30(2), 636–664. https://doi.org/10.1287/isre.2018.0821
  • Fornell, C., & Larcker, D. F. (1981). Evaluating structural equation models with unobservable variables and measurement error. Journal of Marketing Research, 18(1), 39–50. https://doi.org/10.1177/002224378101800104
  • Gaus, A. (2020, January 11). How Netflix and Disney are dealing with the costly problem of password sharing. TheStreet. https://www.thestreet.com/investing/netflix-disney-costly-problem-of-password-sharing.
  • Gruenwedel, E. (2022, April, 11). Report: Password sharing costs streaming services $2.3 billion in annual lost membership revenue. Media Play News. https://www.mediaplaynews.com/report-password-sharing-costs-streaming-services-2-billion-in-annual-lost-membership-revenue/.
  • Happ, C., Melzer, A., & Steffgen, G. (2016). Trick with treat–reciprocity increases the willingness to communicate personal data. Computers in Human Behavior, 61, 372–377. https://doi.org/10.1016/j.chb.2016.03.026
  • Harman, H. H. (1976). Modern factor analysis. University of Chicago Press.
  • Hepburn, T. (2022). Survey: 33% of Netflix users admit to sharing passwords. https://cordcuttersnews.com/survey-33-of-netflix-users-admit-to-sharing-passwords/.
  • Herjanto, H., Bagozzi, R. P., & Gaur, S. S. (2021). The role of shame and virtues in the self-regulation of decisions to engage in digital piracy. Australasian Marketing Journal, 29(1), 15–28. https://doi.org/10.1177/1839334921998515
  • Higgins, G. E., Wolfe, S. E., & Marcum, C. D. (2008). Music piracy and neutralization: A preliminary trajectory analysis from short-term longitudinal data. International Journal of Cyber Criminology, 2(2), 324–336. https://www.cybercrimejournal.com/IJCC-July-December-2008-Vol2-No2.php
  • Hill, R. J., Fishbein, M., & Ajzen, I. (1977). Fishbein and Ajzen: Belief, attitude, intention and behavior: An introduction to theory and research (book review). Contemporary Sociology, 6(2), 244. https://doi.org/10.2307/2065853
  • Hinduja, S. (2007). Neutralization theory and online software piracy: An empirical analysis. Ethics and Information Technology, 9(3), 187–204. https://doi.org/10.1007/s10676-007-9143-5
  • Holt, T. J., & Copes, H. (2010). Transferring subcultural knowledge on-line: Practices and beliefs of persistent digital pirates. Deviant Behavior, 31(7), 625–654. https://doi.org/10.1080/01639620903231548
  • Holt, T. J., & Morris, R. G. (2009). An exploration of the relationship between MP3 player ownership and digital piracy. Criminal Justice Studies, 22(4), 381–392. https://doi.org/10.1080/14786010903358109
  • Hyllegard, H. K., Paff Ogle, J., & Yan, R. N. (2014). College students’ responses to prosocial marketing claims on apparel hang tags. Journal of Fashion Marketing and Management, 18(3), 269–283. https://doi.org/10.1108/JFMM-12-2012-0075
  • Ingram, J. R. (2014). Digital piracy. In J. S. Albanese (Eds.), Encyclopedia of criminology and criminal justice. Wiley Blackwell.
  • Ingram, J. R., & Hinduja, S. (2008). Neutralizing music piracy: An empirical examination. Deviant Behavior, 29(4), 334–366. https://doi.org/10.1080/01639620701588131
  • Jami, A., Kouchaki, M., & Gino, F. (2020). I own, so i help out: how psychological ownership increases prosocial behavior. Journal of Consumer Research, 47(5), 698–715. https://doi.org/10.1093/jcr/ucaa040
  • Kamleitner, B., & Mitchell, V. (2019). Your data is my data: A framework for addressing interdependent privacy infringements. Journal of Public Policy & Marketing, 38(4), 433–450. https://doi.org/10.1177/0743915619858924
  • Kim, M. S., & Hunter, J. E. (1993). Relationships among attitudes, behavioral intentions, and behavior: A meta-analysis of past research, part 2. Communication Research, 20(3), 331–364. https://doi.org/10.1177/009365093020003001
  • Kim, M. S., Kim, E., Hwang, S., Kim, J., & Kim, S. (2017). Willingness to pay for over-the-top services in China and Korea. Telecommunications Policy, 41(3), 197–207. https://doi.org/10.1016/j.telpol.2016.12.011
  • Kock, N., & Lynn, G, Texas A&M International University (2012). Lateral collinearity and misleading results in variance-based SEM: An illustration and recommendations. Journal of the Association for Information Systems, 13(7), 546–580. https://doi.org/10.17705/1jais.00302
  • Kwak, K. T., Oh, C. J., & Lee, S. W. (2021). Who uses paid over-the-top services and why? Cross-national comparisons of consumer demographics and values. Telecommunications Policy, 45(7), 102168. https://doi.org/10.1016/j.telpol.2021.102168
  • Leidner, D. E., & Kayworth, T. (2006). A review of culture in information systems research: Toward a theory of information technology culture conflict. MIS Quarterly, 30(2), 357–399. https://doi.org/10.2307/25148735
  • Li, Y. (2012). Theories in online information privacy research: A critical review and an integrated framework. Decision Support Systems, 54(1), 471–481. https://doi.org/10.1016/j.dss.2012.06.010
  • Loh, B. Y. H. (2019). “Do you have a link?”: The effects of piracy and online streaming services on the sharing practices of television content. SEARCH Journal of Media and Communication Research, 11(2), 41–55. https://fslmjournals.taylors.edu.my/do-you-have-a-link-the-effects-of-piracy-and-online-streaming-services-on-sharing-practices-of-television-media/
  • Lovely, S. (2022, April 11). Streaming subscription mooching in 2022. CordCutting. https://cordcutting.com/research/subscription-mooching/.
  • Lowry, P. B., Zhang, J., & Wu, T. (2017). Nature or nurture? A meta-analysis of the factors that maximize the prediction of digital piracy by using social cognitive theory as a framework. Computers in Human Behavior, 68, 104–120. https://doi.org/10.1016/j.chb.2016.11.015
  • Lu, S., Rajavi, K., & Dinner, I. (2021). The effect of over-the-top media services on piracy search: Evidence from a natural experiment. Marketing Science, 40(3), 548–568. https://doi.org/10.1287/mksc.2020.1256
  • Madnani, D., Fernandes, S., & Madnani, N. (2020). Analysing the impact of COVID-19 on over-the-top media platforms in India. International Journal of Pervasive Computing and Communications, 16(5), 457–475. https://doi.org/10.1108/IJPCC-07-2020-0083
  • Malhotra, N. K., Kim, S. S., & Agarwal, J. (2004). Internet users’ information privacy concerns (IUIPC): The construct, the scale, and a causal model. Information Systems Research, 15(4), 336–355. https://doi.org/10.1287/isre.1040.0032
  • Marcum, C. D., Higgins, G. E., Wolfe, S. E., & Ricketts, M. L. (2011). Examining the intersection of self-control, peer association and neutralization in explaining digital piracy. Western Criminology Review, 12(3), 60–74.https://westerncriminology.org/publications/western_criminology_review/
  • Matthews, T., Liao, K., Turner, A., Berkovich, M., Reeder, R., & Consolvo, S. (2016, May). She’ll just grab any device that’s closer” A study of everyday device & account sharing in households [Paper presentation]. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems (pp. 5921–5932). ACM.
  • McCluskey, M. (2022, October 20). Using someone else’s Netflix password? A crackdown is coming in ‘early 2023’. Time. https://time.com/6223415/netflix-password-sharing-crackdown/.
  • McIntyre, S. H., & Miller, C. M. (1992). Social utility and fashion behavior. Marketing Letters, 3(4), 371–382. https://doi.org/10.1007/BF00993921
  • Mills, P., & Groening, C. (2021). The role of social acceptability and guilt in unethical consumer behavior: Following the crowd or their own moral compass? Journal of Business Research, 136, 377–388. https://doi.org/10.1016/j.jbusres.2021.07.021
  • Moeller, S., & Wittkowski, K. (2010). The burdens of ownership: Reasons for preferring renting. Managing Service Quality, 20(2), 176–191. https://doi.org/10.1108/09604521011027598
  • Moore, R., & McMullan, E. C. (2009). Neutralizations and rationalizations of digital piracy: A qualitative analysis of university students. International Journal of Cyber Criminology, 3(1), 441–451. https://www.cybercrimejournal.com/IJCC-January-June%202009-Vol3-No1.php
  • Morris, R. G., & Higgins, G. E. (2009). Neutralizing potential and self-reported digital piracy: A multitheoretical exploration among college undergraduates. Criminal Justice Review, 34(2), 173–195. https://doi.org/10.1177/0734016808325034
  • Mulla, T. (2022). Assessing the factors influencing the adoption of over-the-top streaming platforms: A literature review from 2007 to 2021. Telematics and Informatics, 69, 101797. https://doi.org/10.1016/j.tele.2022.101797
  • Naderi, I. (2013). Beyond the fad: A critical review of consumer fashion involvement. International Journal of Consumer Studies, 37(1), 84–104. https://doi.org/10.1111/j.1470-6431.2011.01041.x
  • Pandey, S. (2023). Netflix’s market share decline continues in 2023: Analysis of leading streaming platforms. https://www.similarweb.com/blog/insights/media-entertainment-news/streaming-q1-2023/.
  • Perry, A. (2023, May 25). Netflix is cracking down on password sharing, but you can get around it. Mashable. https://mashable.com/article/netflix-password-sharing-crackdown-how-to-circumvent.
  • Pierce, J. L., & Jussila, I. (2011). Psychological ownership and the organizational context: Theory, research evidence, and application. Edward Elgar Publishing.
  • Pierce, J. L., Kostova, T., & Dirks, K. T. (2003). The state of psychological ownership: Integrating and extending a century of research. Review of General Psychology, 7(1), 84–107. https://doi.org/10.1037/1089-2680.7.1.84
  • Pu, Y., & Grossklags, J. (2016). Towards a model on the factors influencing social app users’ valuation of interdependent privacy. Proceedings on Privacy Enhancing Technologies, 2016(2), 61–81. https://doi.org/10.1515/popets-2016-0005
  • Shaw, L. (2022, July 19). Netflix tests another way to charge for password sharing. Bloomberg. https://www.bloomberg.com/news/articles/2022-07-18/netflix-tests-another-way-to-charge-for-password-sharing#xj4y7vzkg.
  • Siponen, M., & Vance, A. (2010). Neutralization: New insights into the problem of employee information systems security policy violations. MIS Quarterly, 34(3), 487–502. https://doi.org/10.2307/25750688
  • Siponen, M., Vance, A., & Willison, R. (2012). New insights into the problem of software piracy: The effects of neutralization, shame, and moral beliefs. Information & Management, 49(7–8), 334–341. https://doi.org/10.1016/j.im.2012.06.004
  • Smith, M. D., & Telang, R. (2009). Competing with free: The impact of movie broadcasts on DVD sales and internet piracy. MIS Quarterly, 33(2), 321–338. https://doi.org/10.2307/20650294
  • Statista. (2023a). Video streaming (SVoD). https://www.statista.com/outlook/dmo/digital-media/video-on-demand/video-streaming-svod/worldwide.
  • Statista. (2023b). Estimated loss in potential membership revenue of selected video streaming services due to password sharing in the United States in 2021 and 2022. https://www.statista.com/statistics/1247176/streaming-services-loss-us-password-sharing/.
  • Straub, D. W., Jr, & Collins, R. W. (1990). Key information liability issues facing managers: Software piracy, proprietary databases, and individual rights to privacy. MIS Quarterly, 14(2), 143–156. https://doi.org/10.2307/248772
  • Sun, C., Ji, Y., & Geng, X. (2023). Which enemy to dance with? A new role of software piracy in influencing antipiracy strategies. Information Systems Research, 34(4), 1711–1727. https://doi.org/10.1287/isre.2023.1219
  • Sundararajan, A. (2004). Managing digital piracy: Pricing and protection. Information Systems Research, 15(3), 287–308. https://doi.org/10.1287/isre.1040.0030
  • Sykes, G. M., & Matza, D. (1957). Techniques of neutralization: A theory of delinquency. American Sociological Review, 22(6), 664–670. https://doi.org/10.2307/2089195
  • Tan, X., Qin, L., Kim, Y., & Hsu, J. (2012). Impact of privacy concern in social networking web sites. Internet Research, 22(2), 211–233. https://doi.org/10.1108/10662241211214575
  • Tomczyk, Ł. (2021). Evaluation of digital piracy by youths. Future Internet, 13(1), 11–37. https://doi.org/10.3390/fi13010011
  • Wang, E. S. T. (2019). Effects of brand awareness and social norms on user-perceived cyber privacy risk. International Journal of Electronic Commerce, 23(2), 272–293. https://doi.org/10.1080/10864415.2018.1564553
  • Whitty, M., Doodson, J., Creese, S., & Hodges, D. (2015). Individual differences in cyber security behaviors: An examination of who is sharing passwords. Cyberpsychology, Behavior and Social Networking, 18(1), 3–7. https://doi.org/10.1089/cyber.2014.0179
  • Wilhelm, C. (2020). Investigating neutralization strategies in digital piracy: The role of content preferences and social norms. Journal of Broadcasting & Electronic Media, 64(2), 320–340. https://doi.org/10.1080/08838151.2020.1724008
  • Yoo, J., Lee, J., & Lee, D. (2020). A verification of motivations for over-the-top binge and short viewing of audio-visual content. New Review of Hypermedia and Multimedia, 26(3–4), 93–122. https://doi.org/10.1080/13614568.2020.1865464
  • Yu, S. (2013). Digital piracy justification: Asian students versus American students. International Criminal Justice Review, 23(2), 185–196. https://doi.org/10.1177/1057567713485416
  • Zamoon, S., & Curley, S. P. (2008). Ripped from the headlines: What can the popular press teach us about software piracy? Journal of Business Ethics, 83(3), 515–533. https://doi.org/10.1007/s10551-007-9636-5
  • Zhou, C., Li, K., & Zhang, X. (2022). Why do I take deviant disclosure behavior on internet platforms? An explanation based on the neutralization theory. Information Processing & Management, 59(1), 102785. https://doi.org/10.1016/j.ipm.2021.102785

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.