Skip to main content

Neutralization Techniques: Means to Diffuse Responsibility

  • Chapter
  • First Online:
  • 462 Accesses

Abstract

Even when individuals are aware of their illegal actions, they continue to indulge in piracy by taking umbrage under “moral holiday” and put forth various techniques to “neutralize” their guilt and justify their actions. It is not just lack of awareness of the consequences; instead, the chapter looks at general neutralization of the guilt when committing the act of piracy. The chapter clarifies the general beliefs and norms in connection with different theories that are used to explain and justify the act of piracy.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   54.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   69.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  • Bagchi, K., Kirs, P., & Creveny, R. (2006). Global software piracy: Can economic factors alone explain the trend? Communications of the ACM, 49(6), 70–75.

    Article  Google Scholar 

  • Bossler, A. M., & Burruss, G. W. (2011). The general theory of crime and computer hacking: Low self-control hackers? In T. J. Holt & B. H. Schell (Eds.),. 2011 Corporate hacking and technology-driven crime: Social dynamics and implications (pp. 38–67). Hershey: Information Science Reference.

    Chapter  Google Scholar 

  • Coleman, J. W. (1994). The criminal elite. New York: St. Martin’s Press.

    Google Scholar 

  • Cromwell, P., & Thurman, Q. (2003). The devil made me do it: Use of neutralizations by shoplifters. Deviant Behavior, 24(6), 535–550.

    Article  Google Scholar 

  • Foster, D. R., (2004). Can the general theory of crime account for computer offenders: Testing low self-control as a predictor of computer crime offenders. Masters thesis. University of Maryland Gemignani, M., 1989. Viruses and Criminal Law. Communications of the ACM, 32(6), 669–671.

    Google Scholar 

  • Gopal, R. D., Sanders, G. L., Bhattacharjee, S., Agrawal, M., & Wagner, S. C. (2004). A behavioral model of digital music piracy. Journal of Organizational Computing and Electronic Commerce, 14(2), 89–105.

    Article  Google Scholar 

  • Harris, L. C., & Dumas, A. (2009). Online consumer misbehaviour: An application of neutralization theory. Marketing Theory, 9(4), 379–402.

    Article  Google Scholar 

  • Higgins, G. E., & Makin, D. A. (2004a). Does social learning theory condition the effects of low self-control on college students’ software piracy? Journal of Economic Crime Management, 2(2), 1–22.

    Google Scholar 

  • Higgins, G. E., & Makin, D. A. (2004b). Self-control, deviant peers, and software piracy. Psychological Reports, 95, 921–931.

    Article  Google Scholar 

  • Higgins, G. E., Wilson, A. L., & Fell, B. D. (2005). An application of deterrence theory to software piracy. Journal of Criminal Justice and Popular Culture, 12(3), 166–184.

    Google Scholar 

  • Higgins, G. E., Wolfe, S. E., & Marcum, C. D. (2008). Digital piracy: An examination of three measurements of self-control. Deviant Behavior, 29(5), 440–460.

    Article  Google Scholar 

  • Higgins, G. E., Mahoney, M., & Ricketts, M. L. (2009). Nonsocial reinforcement of the nonmedical use of prescription drugs: A partial test of social learning and self-control theories. Journal of Drug Issues, 39(4), 949–963.

    Article  Google Scholar 

  • Hinduja, S. (2007). Neutralization theory and online software piracy: An empirical analysis. Ethics and Information Technology, 9(3), 187–204.

    Article  Google Scholar 

  • Ingram, J. R., & Hinduja, S. (2008). Neutralising music piracy: An empirical examination. Deviant Behaviour, 29(4), 334–366.

    Article  Google Scholar 

  • Klockars, C. B. (1974). The professional fence. New York: The Free Press.

    Google Scholar 

  • Konstantakis, N. I., Palaigeorgiou, G. E., Siozos, P. D., & Tsoukalas, I. A. (2010). What do computer science students think about software piracy? Behaviour & Information Technology, 29(3), 277–285.

    Article  Google Scholar 

  • Marcum, C. D., Higgins, G. E., Wolfe, S. E., & Ricketts, M. L. (2011). Examining the intersection of self-control, peer association and neutralization in explaining digital piracy. Western Criminology Review, 12(3), 60.

    Google Scholar 

  • Marron, D. B., & Steel, D. G. (2000). Which countries protect intellectual property. Economic Inquiry, 38(2), 159–174.

    Article  Google Scholar 

  • Maruna, S., & Copes, H. (2005). What have we learned from five decades of neutralization research? Crime and Justice, 32, 221–320.

    Article  Google Scholar 

  • Matza, D. (1964). Delinquency and drift. New Brunswick: Transaction.

    Google Scholar 

  • McCorkle, L. W., & Korn, R. (1954). Resocialization within walls. The Annals of the American Academy of Political and Social Science, 293(1), 88–98.

    Article  Google Scholar 

  • Moon, B., McCluskey, J. D., & McCluskey, C. P. (2010). A general theory of crime and computer crime: An empirical test. Journal of Criminal Justice, 38, 767–772.

    Article  Google Scholar 

  • Moore, R., & McMullan, E. C. (2009). Neutralizations and rationalizations of digital piracy: A qualitative analysis of university students. International Journal of Cyber Criminology, 3(1), 441–451.

    Google Scholar 

  • Moores, T. T. (2008). An analysis of the impact of economic wealth and national culture on the rise and fall of software piracy rates. Journal of Business Ethics, 81(1), 39–51.

    Article  Google Scholar 

  • Morris, R. G. (2011). Computer hacking and the techniques of neutralization: An empirical assessment. In T. J. Holt & B. H. Schell (Eds.), Corporate hacking and technology-driven crime: Social dynamics and implications (pp. 1–17). Hershey: Information Science Reference.

    Google Scholar 

  • Morris, R. G., & Higgins, G. E. (2009). Neutralizing potential and self-reported digital piracy: A multitheoretical exploration among college undergraduates. Criminal Justice Review, 34(2), 173–195.

    Article  Google Scholar 

  • Orwell, G. (1946). Dickens, Dali & others. New York: Harcourt, Brace & World.

    Google Scholar 

  • Sheehan, B., Tsao, J., & Yang, S. (2010). Motivations for gratifications of digital music piracy among college students. Atlantic Journal of Communication, 18(5), 241–258.

    Article  Google Scholar 

  • Skinner, W. F., & Fream, A. M. (1997). A social learning theory analysis of computer crime among college students. Journal of Research in Crime and Delinquency, 34(4), 495–518.

    Article  Google Scholar 

  • Smallridge, J. L., & Roberts, J. R. (2013). Crime specific neutralizations: An empirical examination of four types of digital piracy. International Journal of Cyber Criminology, 7(2), 125–140.

    Google Scholar 

  • Sutherland, E. H. (1955). Principles of criminology. Philadelphia: Lippincott.

    Google Scholar 

  • Swinyard, W. R., Rinne, H., & Kau, A. K. (1990). The morality of software piracy: A cross-cultural analysis. Journal of Business Ethics, 9(8), 655–664.

    Article  Google Scholar 

  • Sykes, G., & Matza, D. (1957). Techniques of neutralization: A theory of delinquency. American Sociological Review, 22(6), 664–670.

    Article  Google Scholar 

  • Ulsperger, J. S., Hodges, S. H., & Paul, J. (2010). Pirates on the plank: Neutralization theory and the criminal downloading of music among generation Y in the era of late modernity. Journal of Criminal Justice and Popular Culture, 17(1), 124–151.

    Google Scholar 

  • Walls, W. D. (2008). Cross-country analysis of movie piracy. Applied Economics, 40(5), 625–632.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Sahni, S.P., Gupta, I. (2019). Neutralization Techniques: Means to Diffuse Responsibility. In: Piracy in the Digital Era. Springer, Singapore. https://doi.org/10.1007/978-981-13-7173-8_5

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-7173-8_5

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-7172-1

  • Online ISBN: 978-981-13-7173-8

  • eBook Packages: Law and CriminologyLaw and Criminology (R0)

Publish with us

Policies and ethics