Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
…
16 pages
1 file
Abstract : Studies have argued that misbehavior of consumers is becoming increasingly prevalent in certain sectors. However, online consumer misbehavior is comparatively under-researched. The focus of the current study is peer-to-peer activities, including copying music, movies, software or video games: a phenomenon which affects the entertainment sector as a whole and costs the industry billions of pounds each year. Neutralization theory provides a potentially fruitful perspective from which to explore consumer justifications and rationalizations for their online misbehavior. The aim of this paper is to explore the extent to which peer-to-peer users employ techniques of neutralization to justify prior-to behavior or rationalize their activities post behavior. First, a review of online customer misbehavior is provided, followed by an overview of existing research into the techniques of neutralization. Following a discussion of the research methods employed, findings regarding the peer-to-peer online misbehaviors and neutralization techniques are presented. Data analysis reveals that peer-to-peer file sharers employ (often multiple) techniques of neutralization in order to pre-justify or post-event rationalize their activities, including: denial of victim; denial of injury; denial of responsibility; claim of normality; claim of relative acceptability; justification by comparison; and appeal to higher loyalties. The paper concludes with a series of implications for both theory and practice.
Accompanying the explosive growth of information technology is the increasing frequency of antisocial and criminal behavior on the Internet. Online software piracy is one such behavior, and this study approaches the phenomenon through the theoretical framework of neutralization theory. The suitability and applicability of nine techniques of neutralization in determining the act is tested via logistic regression analyses on cross-sectional data collected from a sample of university students in the United States. Generally speaking, neutralization was found to be weakly related to experience with online software piracy; other elements which appear more salient are suggested and discussed in conclusion.
2010 43rd Hawaii International Conference on System Sciences, 2010
Software piracy continues to be a major economic concern for organizations. Given the widespread nature of the problem, software piracy has received attention from IS scholars. Previous research indicates that neutralization-a form of rationalization-can help to explain software piracy intentions. However, a knowledge gap exists in our understanding about which techniques of neutralization contributes most to software piracy intentions. To address this gap, we advance a model that explains the effects of neutralization techniques on software piracy intentions. For greater explanatory power, we also include formal sanctions, shame, and moral beliefs in our model. Empirical results (n=183) show that neutralization techniques "appeal to higher loyalties" and "condemnation of the condemners" strongly predict software piracy intentions. In addition, shame and moral beliefs are also strong predictors. These findings suggest that anti-piracy efforts should involve educational interventions aimed at addressing these two neutralization techniques, rather than relying on formal sanctions.
This study applied neutralisation techniques from neutralisation theory (Sykes and Matza, 1957) to consumer perceptions to justify unethical distribution and acquisition of unauthorised free digital music on the internet. A two-stage multimethod and qualitative study was performed. One qualitative data set was developed with written protocols in 2000 at the start of the Napster phenomenon with a sample of consumers from nine nations. The second research phase was done in 2004 with a netnographic approach to studying weblogs. Results supported the Marks and Mayo (1991) extension of Hunt and Vitell's (1986) General Theory of Marketing Ethics model and Fukukawa's (2002) Framework for Ethically Questionable Behaviour in Consumption. The first stage of cross-cultural analysis revealed nations' differences in neutralisation techniques used by subjects to justify unethical file-trading behaviour. Results from both research phases indicated global similarities among consumer values.
Hertfordshire Law Journal, 2007
The ongoing battle between file sharers and the entertainment industries is one which has been largely approached from the point of view of the latter parties with the reasoning that the law should be invoked to clamp down on the distribution of unauthorised copies of works through peer to peer networks. This paper argues that the industries, with the assistance of the legislature in certain circumstances, should be focussing their attentions not on limiting the natural evolution being brought about in the digital age, but by recognising that many of the parties labelled as scurrilous pirates are actually a rich market which can be tapped into through alternative means. An analysis of various theories relating to the routes, impacts and effects of file sharing is applied to a digital distribution model. The model is then expanded to encompass the Efficient Distribution Theory which argues that, through the application of measures which can be cheaply and easily implemented by the entertainment industries, a number of factors can mitigate any negative effects file sharing may cause to the extent that widely distributing digital copies can be directly beneficial to the industries. The analysis and theory is supported by the results of a research study carried out by the author in February 2007, which are presented in this paper. The findings of the research indicate that those who engage in cyber piracy not only financially spend more on authorised products proliferated by the entertainment industries compared to those who do not engage in piracy, but are also willing to move away from committing tortious acts of copyright infringement if the industries can provide a viable alternative means of digital delivery, inter alia.
Recherche et Applications en Marketing, 2014
Research suggests that those individuals engaging in music piracy have little concern for the potentially negative consequences of engaging in this illegal activity. This study aims to build on previous research which finds that sub-cultural piracy knowledge is effectively transmitted online. Explicitly, this study aims to observe the various justifications people forward to rationalise engagement in music piracy, in accordance with Sykes and Matza’s (1957) widely researched neutralization theory, and if techniques used to rationalize behaviours are shared amongst those individuals found to be discussing and engaging in music piracy online. The research examines naturally occurring discourse across three online settings, finding a widespread perception that there is ‘no harm done’ and that tips to work around web-blocking are exchanged online, including in public spaces such as Twitter. However, differences were found in the beliefs and attitudes of the sample. The study raises key conceptual issues about the theory used.
Information & Management, 2012
The process of neutralization of normative pressure by consumers, which allows the performance of deviant practices while maintaining the attachment to the norm, has not been sufficiently studied. Our analysis, in the case of illegal downloading, shows that consumers produce an autonomous discursive set, articulated around three defensive strategies (disempowerment as neutralizing, pragmatic neutralization, ideological neutralization) and accept internal contradiction.
Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008), 2008
It is well known that software piracy is widespread. While the existing research on this subject has applied a number of theories in order to understand and prevent such an act, this text presents an alternative perspective by advancing two criminological theories. More specifically, a novel theoretical model is advanced, drawing on these theories entitled Techniques of Neutralization and Differential Association Theory. The former helps to explain how individuals are able to rationalize their criminal behaviour in a manner which absolves them of pressures from social norms and internal controls such as feelings of guilt and shame. The latter explains how criminality is developed through a learning process taking place in personal groups. While empirical research is needed to test the model further, it is argued that these theories offer both an alternative perspective on the intention to commit software piracy, but also potentially open up new avenues for preventing this crime.
Journal of Consumer Behaviour, 2007
I • The study employs two experiments to examine the effectiveness of various strategies used to dissuade consumers from downloading music illegally. The research investigates two specific strategies that the recording industry has used: (l)fear or threat appeals (e.g., the threat of punishment, such as fines and/or jail time), and (2) attrihution of harm (informing consumers of the harm caused by the illegal downloading of music, such as financial loss to either the artist or the recording company). The study also considers whether past illegal downloading behavior reduces the effectiveness of these disincentive strategies. Finally, the impact of subjective norms (i.e., whether subjects think their friends would approve of downloading music) was also investigated. • A3 (level of threat: low, moderate, or high) X 2 (who is harmed by illegal downloading: artist or recording company) experimental design was employed for study one. Undergraduate students (n = 388) participated in the study. Study two expanded on the design of the first study by adding a variable of subjective norms and by including previous downloading behavior in the model. Undergraduate students (n = l\l) also participated in the second experiment. • Findings indicate a significant effect of threat appeal such that stronger threat appeals were found to be more effective than weaker threat appeals in reducing illegal downloading. The first study also showed that prior illegal downloading behavior does not curtail the ejects of threat appeals aimed at reducing illegal downloading. In addition, results reveal no differences in downloading behavior in terms of attribution of harm deterrent strategy (harm to either the recording artist or company). The most interesting finding from the second study is that subjective norms appear to equalize low versus high past downloaders, but only under conditions of weak fear. • The current manuscript is the first to examine the impact of four different variables (threat appeals, attribution of harm, subjective norms, and previous downloading 'Correspondence to: 112 Aron M. Levin et aL behavior) on stibjects' likelihood to iUegalfy dotvrUoad music in thefiiture. In particular, this research illuminates the potential importance of social norms in discouraging a type of undesirable consumer behavior hut shows that this occurs only under a restricted set of conditions: when threat is low and the consumer is not a habitually high doumloader. It should be ofinterest to those infields where intellectual property can be pirated on the Internet
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.
Behaviour & Information Technology (BIT), 2019
Deviant Behavior, 2008
Review of Law & Economics, 2000
Journal of Management Information Systems, 2018
International Journal of Research in Business and Social Science (2147- 4478), 2020
Aslib Proceedings, 2010
Computers in Human Behavior, 2017
Enterprise Information Systems, 2011
Journal of Business Research, 2018
Lecture Notes in Computer Science, 2011
Information Resources Management Journal, 2009
WSEAS TRANSACTIONS ON BUSINESS AND ECONOMICS, 2021
IEEE European Symposium on Security and Privacy 2023 (WACCO), 2023
Economic Research-Ekonomska Istraživanja, 2012
Information Systems Frontiers, 2020