Publication Cover
Criminal Justice Studies
A Critical Journal of Crime, Law and Society
Volume 22, 2009 - Issue 4: Cybercrime
1,872
Views
41
CrossRef citations to date
0
Altmetric
Articles

Social learning theory and music piracy: the differential role of online and offline peer influences

&
Pages 405-420 | Published online: 18 Dec 2009

References

  • A & M Records Inc. et al. v. Napster Inc. 2001 . No. 00‐16403 Retrieved February 12, 2001, from http://www.riaa.com/pdf/napsterdecision.pdf
  • Adams , M.S. 1996 . Labeling and differential association: Toward a general social learning theory of crime and deviance . American Journal of Criminal Justice , 20 (2) : 147 – 164 .
  • Agnew , R. 1998 . The approval of suicide: A social‐psychological model . Suicide and Life‐Threatening Behavior , 28 (2) : 205 – 225 .
  • Akers , R.L. 1985 . Deviant behavior: A social learning approach , (3rd ed.) , Belmont, CA : Wadsworth .
  • Akers , R.L. 1992 . Linking sociology and its specialties . Social Forces , 71 : 1 – 16 .
  • Akers , R.L. 1996 . Is differential association/social learning cultural deviance theory? . Criminology , 34 (2) : 229 – 256 .
  • Akers , R.L. 1998 . Social learning and social structure: A general theory of crime and deviance , Boston : Northeastern University Press .
  • Akers , R. 2009 . Social learning and social structure: A general theory of crime and deviance , Edison, NJ : Transaction .
  • Akers , R.L. and Cochran , J.K. 1985 . Adolescent marijuana use: A test of three theories of deviant behavior . Deviant Behavior , 6 (4) : 323 – 346 .
  • Akers , R.L. , Krohn , M.D. , Lanza‐Kaduce , L. and Radosevich , M. 1979 . Social learning and deviant behavior: A specific test of a general theory . American Sociological Review , 44 : 636 – 655 .
  • Akers , R.L. and Lee , G. 1996 . A longitudinal test of social learning theory: Adolescent smoking . Journal of Drug Issues , 26 (2) : 317 – 343 .
  • Bandura , A. 1969 . Principles of behavior modification , New York : Holt, Rinehart, Winston .
  • Bandura , A. 1973 . “ Aggression: A social learning analysis ” . Englewood Cliffs, NJ : Prentice Hall .
  • Bandura , A. 1977 . Social learning theory , Englewood Cliffs, NJ : Prentice Hall .
  • Bandura , A. and Walters , R. 1963 . Social learning and personality development , New York : Holt, Rinehart, Winston .
  • Brownfield , D. and Thompson , K. 1991 . Attachment to peers and delinquent behavior . Canadian Journal of Criminology , 33 : 45 – 60 .
  • Burgess , R. and Akers , R. 1966 . A differential association‐reinforcement theory of criminal behavior . Social Problems , 14 : 128 – 147 .
  • Catalano , R.F. , Kosterman , R. , Hawkins , J.D. , Newcomb , M.D. and Abbott , R.D. 1996 . Modeling the etiology of adolescent substance abuse: A test for the social development model . Journal of Drug Issues , 26 (2) : 429 – 455 .
  • Chantler , N. 1996 . Profile of a computer hacker , Florida : Infowar .
  • CNN.com . 2000a . MP3.com ordered to pay up to $250 million in music copyright case Retrieved October 3, 2001, from http://www.cnn.com/2000/LAW/09/06/mp3.lawsuit.01/index.html
  • CNN.com . 2000b . Napster heads to court Retrieved October 5, 2001, from http://www.cnnfn.cnn.com/2000/07/03/companies/napster/
  • Davis , M. 2003 . Penn State seeks out student piracy Retrieved May 1, 2003, from http://www.redandblack.com/vnews/display.v/ART/2003/05/01/3eb12b203a281
  • Denning , D. 1998 . Information warfare and security , Reading : Addison‐Wesley .
  • Etzioni , A.E.O. 1999 . Face‐to‐face and computer‐mediated communities, a comparative analysis . The Information Society , 15 : 241 – 248 .
  • Garner , B.A. , ed. 1999 . Black’s law dictionary , (7th ed.) , St Paul, MN : West Group .
  • Gopal , R.D. , Sanders , G.L. , Bhattacharjee , S. , Agrawal , M. and Wagner , S. 2004 . A behavioral model of digital music piracy . Journal of Organizational Computing and Electronic Commerce , 14 (2) : 89 – 105 .
  • Healy , J. 2003 . 4 pay steep price for free music Retrieved May 2, 2003, from http://www.latimes.com/la-fi-settle2may02,0,6007000.story
  • Higgins , G.E. , Fell , B.D. and Wilson , A.L. 2006 . Digital piracy: Assessing the contributions of an integrated self‐control theory and social learning theory using structural equation modeling . Criminal Justice Studies , 19 (1) : 3 – 22 .
  • Higgins , G.E. and Makin , D.A. 2004 . Does social learning theory condition the effects of low self‐control on college students’ software piracy? . Journal of Economic Crime Management , 2 (2) : 1 – 22 .
  • Higgins , G.E. and Wilson , A.L. 2006 . Low self‐control, moral beliefs, and social learning theory in university students’ intentions to pirate software . Security Journal , 19 (2) : 75 – 92 .
  • Higgins , G.E. , Wilson , A.L. and Fell , B.D. 2005 . An application of deterrence theory to software piracy . Journal of Criminal Justice and Popular Culture , 12 (3) : 166 – 184 .
  • Higgins , G.E. , Wilson , A.L. and Fell , B.D. 2007 . Low self‐control and social learning in understanding students’ intentions to pirate movies in the United States . Social Science Computer Review , 25 : 339 – 357 .
  • Higgins , G.E. , Wolfe , S.E. and Marcum , C.D. 2008 . Digital piracy: An examination of multiple conceptualizations and operationalizations of self‐control . Deviant Behavior , 29 : 440 – 460 .
  • Hinduja , S. 2001 . Correlates of Internet software piracy . Journal of Contemporary Criminal Justice , 17 (4) : 369 – 382 .
  • Hinduja , S. 2003 . Trends and patterns among software pirates . Ethics and Information Technology , 5 (1) : 49 – 61 .
  • Hinduja , S. 2006a . A critical examination of the digital music phenomenon . Critical Criminology , 14 (4) : 387 – 409 .
  • Hinduja , S. 2006b . Music piracy and crime theory , New York : LFB Scholarly .
  • Hinduja , S. 2008 . Deindividuation and Internet software piracy . CyberPsychology and Behavior , 11 (4) : 391 – 398 .
  • Hinduja , S. and Ingram , J. 2008 . Self‐control and ethical beliefs on the social learning of intellectual property theft . Western Criminology Review , 9 (2) : 52 – 72 .
  • IFPI . 2008 . Digital music report 2008 – Summary , London : International Federation of the Phonographic Industry .
  • Ingram , J. and Hinduja , S. 2008 . Neutralizing music piracy: An empirical examination . Deviant Behavior , 29 (4) : 334 – 366 .
  • Jones , C. 2000 . RIAA sues MP3.com Retrieved October 2, 2001, from http://www.wired.com/news/politics/0,1283,33634,00.html
  • Krohn , M.L. , Skiller , W.F. , Massey , J.L. and Akers , R. 1985 . Social learning theory and adolescent cigarette smoking: A longitudinal study . Social Problems , 32 (5) : 455 – 473 .
  • Lersch , K.M. 1999 . Social learning theory and academic honesty . International Journal of Comparative and Applied Criminal Justice , 23 (1) : 103 – 114 .
  • Lipton , B. 1998 . New music pirates face lawsuits Retrieved September 18, 2001, from http://www.news.com/News/Item/0,4,22060,00.html
  • Luckenbill , D.F. and Miller , S.L. 1998 . Defending intellectual property: State efforts to protect creative works . Justice Quarterly , 15 (1) : 93 – 120 .
  • Mendels , P. 1999 . University cracks down on MP3 trade Retrieved September 20, 2001, from http://www.ou.edu/archives/it-fyi/0723.html
  • Miller , J.K. and Gergen , K.J. 1998 . Life on the line: The therapeutic potentials of computer‐mediated conversation . Journal of Marital and Family Therapy , 24 (2) : 189 – 202 .
  • Mindenhall , C. 2000 . Music Pho the masses Retrieved January 27, 2000, from http://www.laweekly.com/ink/00/09/cyber-mindenhall.php
  • Morris , R.G. and Higgins , G.E. 2009 . Neutralizing potential and self‐reported digital piracy: A multi‐theoretical exploration among college undergraduates . Criminal Justice Review , 34 : 173 – 195 .
  • Patrizio , A. 1999 . DOJ cracks down on MP3 pirate Retrieved September 27, 2001, from http://www.wired.com/news/politics/0,1283,21391,00.html
  • Philipkoski , K. 1999a . The student jukebox sting Retrieved October 1, 2001, from http://www.wired.com/news/culture/0,1284,32444,00.html
  • Philipkoski , K. 1999b . University snoops for MP3s Retrieved October 2, 2001, from http://www.wired.com/news/MP3/0,1285,32478,00.html
  • Rahim , M.M. , Seyal , A.H. and Rahman , N.A. 1999 . Software piracy among computing students: A Bruneian scenario . Computers and Education , 32 : 301 – 321 .
  • RIAA . 2000 . Complaint for copyright infringement against mp3.com Retrieved October 10, 2001, from http://www.riaa.com/PDF/MP3_Complaint.pdf
  • Rogers , M.K. 2001 . A social learning theory and moral disengagement analysis of criminal computer behavior: An exploratory study , Winnipeg : University of Manitoba . Unpublished doctoral dissertation
  • Sims , R.R. , Cheng , H.K. and Teegen , H. 1996 . Toward a profile of student software piraters . Journal of Business Ethics , 15 (8) : 839
  • Skinner , B.F. 1953 . Science and human behavior , New York : Macmillan .
  • Skinner , B.F. 1957 . Verbal learning , New York : Appleton‐Century‐Crofts .
  • Skinner , B.F. 1971 . Beyond freedom and dignity , New York : Knopf .
  • Skinner , B.F. and Fream , A.M. 1997 . A social learning theory analysis of computer crime among college students . Journal of Research in Crime and Delinquency , 34 : 495 – 518 .
  • Spring , T. 2000 . Swap MP3s, go to jail? Retrieved October 12, 2001, from http://www.cnn.com/2000/TECH/computing/04/14/MP3.crackdown.idg/index.html
  • Sutherland , E. 1947 . Principles of criminology , (3rd ed.) , Philadelphia : J.B. Lippincott .
  • Sutherland , E. 1949a . White collar crime , New York : Holt, Rinehart, Winston .
  • Sutherland , E. , ed. 1949b . The white collar criminal , New York : Philosophical Library .
  • Sykes , G. and Matza , D. 1957 . Techniques of neutralization: A theory of delinquency . American Sociological Review , 22 : 664 – 670 .
  • Tarde , G. , ed. 1903 . Gabriel Tarde’s laws of imitation , New York : Henry Holt . (Original work published 1890)
  • Weisbard , E. 2000 . At Pho, a thousand e‐mails a month track the great digital debate: Keeping up with the Napsters Retrieved May 16, 2000, from http://www.villagevoice.com/issues/0019/weisbard.php

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.