Peer Group Association Promotes Digital Piracy

  • Sanjeev P. Sahni
  • Indranath Gupta


In the context of digital piracy, observations through different studies have shown that social environment plays a significant role in determining the attitude and behavior of an individual. This chapter starts with a closer look at the nature of peer associations and how peer relationship can change the behavior in schools, universities, and workplaces. It looks at the nature of peer associations through the review of literature of the theories of behavioral science with legal reasoning of peer-to-peer (P2P) networking and landmark decisions.


Neutralization Techniques of neutralization Denial of responsibility Peer-to-peer networking 


  1. A&M Records v Napster. (2001). 239 F.3d 1004 (9th Cir.).Google Scholar
  2. Akers, R. L., & Jensen, G. F. (2009). Advances in criminological theory. New Brunswick: Transaction Publishers.Google Scholar
  3. Al-Rafee, S., & Cronan, T. P. (2006). Digital piracy: Factors that influence attitude toward behavior. Journal of Business Ethics, 63(3), 237–259.Google Scholar
  4. Bagchi, K., Kirs, P., & Creveny, R. (2006). Global software piracy: Can economic factors alone explain the trend? Communications of the ACM, 49(6), 70–75.Google Scholar
  5. Baron, R. A., Byrne, D. E., & Hopkins, Y. (1984). Social psychology: Understanding human interaction. Boston: Allyn and Bacon.Google Scholar
  6. Blake, R. H., & Kyper, E. S. (2013). An investigation of the intention to share media files over peer-to-peer networks. Behaviour & Information Technology, 32(4), 410–422.Google Scholar
  7. Duboff, A. (2011). BPI digital music nation – Pirate wars. Ent LR, 85.Google Scholar
  8. Fink, C., Maskus, K. E., & Qian, Y. (2016). The economic effects of counterfeiting and piracy: A review and implications for developing countries. World Bank Research Observer, 31(1), 1–28.Google Scholar
  9. Garland, D. (1991). Punishment and culture: The symbolic dimension of criminal justice. Studies in Law, Politics, and Society, 11, 191–222.Google Scholar
  10. Givon, M., Mahajan, V., & Muller, E. (1995). Software piracy: Estimation of lost sales and the impact of software diffusion. The Journal of Marketing, 59, 29–37.Google Scholar
  11. Glass, R. S., & Wood, W. (1996). A situational determinants of software piracy: An equity theory perspective. Journal of Business Ethics, 15, 1189–1198.Google Scholar
  12. Gopal, R. D., & Sanders, G. L. (1997). Preventive and deterrent controls for software piracy. Journal of Management Information Systems, 13(4), 29–47.Google Scholar
  13. Gunter, W. D. (2009). Internet scallywags: A comparative analysis of multiple forms and measurements of digital piracy. Western Criminology Review, 10(1), 15–28.Google Scholar
  14. Harris, J. (1995). Where is the child’s environment? A group of socialization theory of development. Psychological Review, 102, 458–489.Google Scholar
  15. Hetcher, S. A. (2004). The music industry’s failed attempt to influence file sharing norms. Vanderbilt Journal of Entertainment Law & Practice, 7, 10.Google Scholar
  16. Higgins, G. E., & Makin, D. A. (2004). Does social learning theory condition the effects of low self-control on college students’ software piracy. Journal of Economic Crime Management, 2(2), 1–22.Google Scholar
  17. Higgins, G. E., Wilson, A. L., & Fell, B. D. (2005). An application of deterrence theory to software piracy. Journal of Criminal Justice and Popular Culture, 12(3), 166–184.Google Scholar
  18. Higgins, G. E., Fell, B. D., & Wilson, A. L. (2006). Digital piracy: Assessing the contributions of an integrated self-control theory and social learning theory using structural equation modeling. Criminal Justice Studies, 19(1), 3–22.Google Scholar
  19. Higgins, G. E., Marcum, C. D., Freiburger, T. L., & Ricketts, M. L. (2012). Examining the role of peer influence and self-control on downloading behavior. Deviant Behavior, 33(5), 412–423.Google Scholar
  20. Hinduja, S. (2001). Correlates of internet software piracy. Journal of Contemporary Criminal Justice, 17(4), 369–382.Google Scholar
  21. Hinduja, S. (2003). Trends and patterns among online software pirates. Ethics and Information Technology, 5(1), 49–61.Google Scholar
  22. Hinduja, S. (2006). Music piracy and crime theory (p. 16). New York: LFB Scholarly Pub. LLC.Google Scholar
  23. Hinduja, S., & Ingram, J. R. (2009). Social learning theory and music piracy: The differential role of online and offline peer influences. Criminal Justice Studies, 22(4), 405–420.Google Scholar
  24. Hollinger, R. C. (1993). Crime by computer: Correlates of software piracy and unauthorized account access. Security Journal, 4(1), 2–12.Google Scholar
  25. Hsu, J. L., & Shiue, C. W. (2008). Consumers’ willingness to pay for non-pirated software. Journal of Business Ethics, 81(4), 715–732.Google Scholar
  26. Jaisingh, J. (2007). Piracy on file-sharing networks: Strategies for recording companies. Journal of Organizational Computing and Electronic Commerce, 17(4), 329–348.Google Scholar
  27. James, W. (1890). The principles of psychology (Vol. I). New York: Henry Hol J and Company.Google Scholar
  28. Kini, R. B., Ramakrishna, H. V., & Vijayaraman, B. S. (2003). An exploratory study of moral intensity regarding software piracy of students in Thailand. Behaviour & Information Technology, 22(1), 63–70.Google Scholar
  29. Konstantakis, N. I., Palaigeorgiou, G. E., Siozos, P. D., & Tsoukalas, I. A. (2010). What do computer science students think about software piracy? Behaviour & Information Technology, 29(3), 277–285.Google Scholar
  30. Lau, E. K. W. (2003). An empirical study of software piracy. Business Ethics: A European Review, 12(3), 233–245.Google Scholar
  31. Limayem, M., Khalifa, M., & Chin, W. W. (2004). Factors motivating software piracy: A longitudinal study. IEEE Transactions on Engineering Management, 51(4), 414–425.Google Scholar
  32. Marcum, C. D., Higgins, G. E., Wolfe, S. E., & Ricketts, M. L. (2011). Examining the intersection of self-control, peer association and neutralization in explaining digital piracy. Western Criminology Review, 12(3), 60.Google Scholar
  33. Marron, D. B., & Steel, D. G. (2000). Which countries protect intellectual property? The case of software piracy. Economic Inquiry, 38(2), 159–174.Google Scholar
  34. Maruna, S., & Copes, H. (2005). What have we learned from five decades of neutralization research? Crime and Justice, 32, 221–320.Google Scholar
  35. Merriam Webster. (2018). Available at Accessed on 20 June 2018.
  36. MGM Studios Inc. v Grokester LTD. (2005). 545 U.S.913.Google Scholar
  37. Moir, A. (2011). High court orders BT to block its customers from accessing an unlawful file sharing site: Twentieth Century Fox Film Corp v. British Telecommunication Plc. European Intellectual Property Law Review., 2011, 3(11), 736–738.Google Scholar
  38. Moores, T. T. (2008). An analysis of the impact of economic wealth and national culture on the rise and fall of software piracy rates. Journal of Business Ethics, 81(1), 39–51.Google Scholar
  39. Oberholzer-Gee, F., & Strumpf, K. (2010). Innovation policy and the economy. The University of Chicago Press on behalf of the The National Bureau of Economic Research, 10(1), 19–55.Google Scholar
  40. Robbennolt, J. K., Darley, J. M., & MacCoun, R. J. (2002). Symbolism and incommensurability in civil sanctioning: Decision makers as goal managers. Brooklyn Law Review, 68, 1121.Google Scholar
  41. Seale, D., Polakowski, M., & Schneider, S. (1998). It’s not really theft: Personal and workplace ethics that enable software piracy. Behavior & Information Technology, 17(1), 27–40.Google Scholar
  42. Sheehan, B., Tsao, J., & Yang, S. (2010). Motivations for gratifications of digital music piracy among college students. Atlantic Journal of Communication, 18(5), 241–258.Google Scholar
  43. Shin, S. K., Gopal, R. D., Sanders, G. L., & Whinston, A. B. (2004). Global software piracy revisited. Communications of the ACM, 47(1), 103–107.Google Scholar
  44. Siegfried, R. M. (2004). Student attitudes on software piracy and related issues of computer ethics. Ethics and Information Technology, 6(4), 215–222.Google Scholar
  45. Siponen, M. T., & Vartiainen, T. (2005). Attitudes to and factors affecting unauthorized copying of computer software in Finland. Behaviour & Information Technology, 24(4), 249–257.Google Scholar
  46. Skinner, W. F., & Fream, A. M. (1997). A social learning theory analysis of computer crime among college students. Journal of Research in Crime and Delinquency, 34(4), 495–518.Google Scholar
  47. Sutherland, E. H. (1947). Principles of criminology: A sociological theory of criminal behavior (4th ed., p. 643). Chicago: J. B. Lippincott Co.Google Scholar
  48. Swinyard, W. R., Rinne, H., & Kau, A. K. (1990). The morality of software piracy: A cross-cultural analysis. Journal of Business Ethics, 9(8), 655–664.Google Scholar
  49. Tavris, C. (1989). Anger: The misunderstood emotion. New York: Simon and Schuster.Google Scholar
  50. Twentieth Century Fox Film Corporation & Anor v Newzbin Ltd England and Wales High Court (Chancery Division), 29 March 2010.Google Scholar
  51. Wertheimer, R. (1998). Constraining condemning. Ethics, 108(3), 489–501.Google Scholar
  52. Wolfe, S. E., & Higgins, G. E. (2009). Explaining deviant peer associations: An examination of low self-control, ethical predispositions, definitions, and digital piracy. Western Criminology Review, 10, 43.Google Scholar
  53. Wood, W., & Glass, R. (1996). Sex as a determinant of software piracy. Journal of Computer Information Systems, 36(2), 37–43.Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  • Sanjeev P. Sahni
    • 1
  • Indranath Gupta
    • 2
  1. 1.Jindal Institute of Behavioural SciencesOP Jindal Global UniversitySonipatIndia
  2. 2.Jindal Global Law SchoolOP Jindal Global UniversitySonipatIndia

Personalised recommendations