Abstract
In the context of digital piracy, observations through different studies have shown that social environment plays a significant role in determining the attitude and behavior of an individual. This chapter starts with a closer look at the nature of peer associations and how peer relationship can change the behavior in schools, universities, and workplaces. It looks at the nature of peer associations through the review of literature of the theories of behavioral science with legal reasoning of peer-to-peer (P2P) networking and landmark decisions.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
A&M Records v Napster. (2001). 239 F.3d 1004 (9th Cir.).
Akers, R. L., & Jensen, G. F. (2009). Advances in criminological theory. New Brunswick: Transaction Publishers.
Al-Rafee, S., & Cronan, T. P. (2006). Digital piracy: Factors that influence attitude toward behavior. Journal of Business Ethics, 63(3), 237–259.
Bagchi, K., Kirs, P., & Creveny, R. (2006). Global software piracy: Can economic factors alone explain the trend? Communications of the ACM, 49(6), 70–75.
Baron, R. A., Byrne, D. E., & Hopkins, Y. (1984). Social psychology: Understanding human interaction. Boston: Allyn and Bacon.
Blake, R. H., & Kyper, E. S. (2013). An investigation of the intention to share media files over peer-to-peer networks. Behaviour & Information Technology, 32(4), 410–422.
Duboff, A. (2011). BPI digital music nation – Pirate wars. Ent LR, 85.
Fink, C., Maskus, K. E., & Qian, Y. (2016). The economic effects of counterfeiting and piracy: A review and implications for developing countries. World Bank Research Observer, 31(1), 1–28.
Garland, D. (1991). Punishment and culture: The symbolic dimension of criminal justice. Studies in Law, Politics, and Society, 11, 191–222.
Givon, M., Mahajan, V., & Muller, E. (1995). Software piracy: Estimation of lost sales and the impact of software diffusion. The Journal of Marketing, 59, 29–37.
Glass, R. S., & Wood, W. (1996). A situational determinants of software piracy: An equity theory perspective. Journal of Business Ethics, 15, 1189–1198.
Gopal, R. D., & Sanders, G. L. (1997). Preventive and deterrent controls for software piracy. Journal of Management Information Systems, 13(4), 29–47.
Gunter, W. D. (2009). Internet scallywags: A comparative analysis of multiple forms and measurements of digital piracy. Western Criminology Review, 10(1), 15–28.
Harris, J. (1995). Where is the child’s environment? A group of socialization theory of development. Psychological Review, 102, 458–489.
Hetcher, S. A. (2004). The music industry’s failed attempt to influence file sharing norms. Vanderbilt Journal of Entertainment Law & Practice, 7, 10.
Higgins, G. E., & Makin, D. A. (2004). Does social learning theory condition the effects of low self-control on college students’ software piracy. Journal of Economic Crime Management, 2(2), 1–22.
Higgins, G. E., Wilson, A. L., & Fell, B. D. (2005). An application of deterrence theory to software piracy. Journal of Criminal Justice and Popular Culture, 12(3), 166–184.
Higgins, G. E., Fell, B. D., & Wilson, A. L. (2006). Digital piracy: Assessing the contributions of an integrated self-control theory and social learning theory using structural equation modeling. Criminal Justice Studies, 19(1), 3–22.
Higgins, G. E., Marcum, C. D., Freiburger, T. L., & Ricketts, M. L. (2012). Examining the role of peer influence and self-control on downloading behavior. Deviant Behavior, 33(5), 412–423.
Hinduja, S. (2001). Correlates of internet software piracy. Journal of Contemporary Criminal Justice, 17(4), 369–382.
Hinduja, S. (2003). Trends and patterns among online software pirates. Ethics and Information Technology, 5(1), 49–61.
Hinduja, S. (2006). Music piracy and crime theory (p. 16). New York: LFB Scholarly Pub. LLC.
Hinduja, S., & Ingram, J. R. (2009). Social learning theory and music piracy: The differential role of online and offline peer influences. Criminal Justice Studies, 22(4), 405–420.
Hollinger, R. C. (1993). Crime by computer: Correlates of software piracy and unauthorized account access. Security Journal, 4(1), 2–12.
Hsu, J. L., & Shiue, C. W. (2008). Consumers’ willingness to pay for non-pirated software. Journal of Business Ethics, 81(4), 715–732.
Jaisingh, J. (2007). Piracy on file-sharing networks: Strategies for recording companies. Journal of Organizational Computing and Electronic Commerce, 17(4), 329–348.
James, W. (1890). The principles of psychology (Vol. I). New York: Henry Hol J and Company.
Kini, R. B., Ramakrishna, H. V., & Vijayaraman, B. S. (2003). An exploratory study of moral intensity regarding software piracy of students in Thailand. Behaviour & Information Technology, 22(1), 63–70.
Konstantakis, N. I., Palaigeorgiou, G. E., Siozos, P. D., & Tsoukalas, I. A. (2010). What do computer science students think about software piracy? Behaviour & Information Technology, 29(3), 277–285.
Lau, E. K. W. (2003). An empirical study of software piracy. Business Ethics: A European Review, 12(3), 233–245.
Limayem, M., Khalifa, M., & Chin, W. W. (2004). Factors motivating software piracy: A longitudinal study. IEEE Transactions on Engineering Management, 51(4), 414–425.
Marcum, C. D., Higgins, G. E., Wolfe, S. E., & Ricketts, M. L. (2011). Examining the intersection of self-control, peer association and neutralization in explaining digital piracy. Western Criminology Review, 12(3), 60.
Marron, D. B., & Steel, D. G. (2000). Which countries protect intellectual property? The case of software piracy. Economic Inquiry, 38(2), 159–174.
Maruna, S., & Copes, H. (2005). What have we learned from five decades of neutralization research? Crime and Justice, 32, 221–320.
Merriam Webster. (2018). Available at https://www.merriam-webster.com/. Accessed on 20 June 2018.
MGM Studios Inc. v Grokester LTD. (2005). 545 U.S.913.
Moir, A. (2011). High court orders BT to block its customers from accessing an unlawful file sharing site: Twentieth Century Fox Film Corp v. British Telecommunication Plc. European Intellectual Property Law Review., 2011, 3(11), 736–738.
Moores, T. T. (2008). An analysis of the impact of economic wealth and national culture on the rise and fall of software piracy rates. Journal of Business Ethics, 81(1), 39–51.
Oberholzer-Gee, F., & Strumpf, K. (2010). Innovation policy and the economy. The University of Chicago Press on behalf of the The National Bureau of Economic Research, 10(1), 19–55.
Robbennolt, J. K., Darley, J. M., & MacCoun, R. J. (2002). Symbolism and incommensurability in civil sanctioning: Decision makers as goal managers. Brooklyn Law Review, 68, 1121.
Seale, D., Polakowski, M., & Schneider, S. (1998). It’s not really theft: Personal and workplace ethics that enable software piracy. Behavior & Information Technology, 17(1), 27–40.
Sheehan, B., Tsao, J., & Yang, S. (2010). Motivations for gratifications of digital music piracy among college students. Atlantic Journal of Communication, 18(5), 241–258.
Shin, S. K., Gopal, R. D., Sanders, G. L., & Whinston, A. B. (2004). Global software piracy revisited. Communications of the ACM, 47(1), 103–107.
Siegfried, R. M. (2004). Student attitudes on software piracy and related issues of computer ethics. Ethics and Information Technology, 6(4), 215–222.
Siponen, M. T., & Vartiainen, T. (2005). Attitudes to and factors affecting unauthorized copying of computer software in Finland. Behaviour & Information Technology, 24(4), 249–257.
Skinner, W. F., & Fream, A. M. (1997). A social learning theory analysis of computer crime among college students. Journal of Research in Crime and Delinquency, 34(4), 495–518.
Sutherland, E. H. (1947). Principles of criminology: A sociological theory of criminal behavior (4th ed., p. 643). Chicago: J. B. Lippincott Co.
Swinyard, W. R., Rinne, H., & Kau, A. K. (1990). The morality of software piracy: A cross-cultural analysis. Journal of Business Ethics, 9(8), 655–664.
Tavris, C. (1989). Anger: The misunderstood emotion. New York: Simon and Schuster.
Twentieth Century Fox Film Corporation & Anor v Newzbin Ltd England and Wales High Court (Chancery Division), 29 March 2010.
Wertheimer, R. (1998). Constraining condemning. Ethics, 108(3), 489–501.
Wolfe, S. E., & Higgins, G. E. (2009). Explaining deviant peer associations: An examination of low self-control, ethical predispositions, definitions, and digital piracy. Western Criminology Review, 10, 43.
Wood, W., & Glass, R. (1996). Sex as a determinant of software piracy. Journal of Computer Information Systems, 36(2), 37–43.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this chapter
Cite this chapter
Sahni, S.P., Gupta, I. (2019). Peer Group Association Promotes Digital Piracy. In: Piracy in the Digital Era. Springer, Singapore. https://doi.org/10.1007/978-981-13-7173-8_6
Download citation
DOI: https://doi.org/10.1007/978-981-13-7173-8_6
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-7172-1
Online ISBN: 978-981-13-7173-8
eBook Packages: Law and CriminologyLaw and Criminology (R0)