Self-Control and Ethical Beliefs on the Social Learning of Intellectual Property Theft*

By Hinduja, Sameer; Ingram, Jason R. | Western Criminology Review, December 2008 | Go to article overview

Self-Control and Ethical Beliefs on the Social Learning of Intellectual Property Theft*


Hinduja, Sameer, Ingram, Jason R., Western Criminology Review


Abstract. Social learning theory has been identified as a strong predictor of various computer-related crimes, especially intellectual property theft (Higgins and Makin 2004; Hinduja 2006; Rogers 2001; Skinner and Fream 1997). Undoubtedly, the relationship is more complex, as other factors appear to affect one's proclivity to be influenced by the social learning components. The current study examined survey response data from over two thousand university students to clarify potential interactive effects that measures of an individual's self-control and ethical beliefs might have on the relationship between social learning and music piracy. The results indicated that self-control conditioned the effect that differential association and differential reinforcement had on levels of music piracy. In addition, ethical beliefs in piracy laws conditioned the effect that differential reinforcement and imitation had on levels of music piracy.

Keywords: piracy; intellectual property theft; crime; copyright; social learning; self-control; ethics; morality

Introduction

The tenets of Akers' (1977) social learning theory have been identified throughout the literature as important explanations for numerous types of deviant behavior. Recent research in the realm of intellectual property (IP) theft has produced similar results as the components of learning theory have been found to significantly predict participation in software piracy (Higgins and Makin 2004; Rogers 2001; Skinner and Fream 1997) and music piracy (Hinduja 2006).

The use of social learning theory as a framework for understanding participation in IP theft is a logical one. In order to commit such acts, one must obtain the necessary techniques, which usually requires learning from others some type of computer-related skill (Skinner and Fream 1997), as well as the motives, drives, and rationalizations to induce commission. Furthermore, specific forms of IP theft, such as software piracy and music piracy, allow the offender to receive tangible rewards (e.g., free software or songs) quickly and at minimal risk, further reinforcing that behavior (Higgins and Makin 2004; Hinduja 2003; Hinduja 2006). Imitation of other participants in IP theft that one sees or meets in cyberspace can take place as the actions of more experienced users are copied by those new to the scene through specific prescribed instruction or through emulation of methods to acquire or exchange unauthorized digital music files. Finally, definitions that characterize the activity as positive, beneficial, and commonly-accepted are very present in the textual interaction among members in online environments where music piracy occurs, and serve to strengthen or at least sustain participation.

Findings from research studies have spawned various policy implementations to change individual attitudes toward IP theft, and to deter individuals from continuing to engage in such acts. For example, the International Federation of the Phonographic Industry (IFPI) designed and implemented formal strategies involving educational components to raise individual awareness about the negative effects of music piracy (e.g., public awareness campaigns) and litigation components to forestall participation (Associated Press 2005; CNN.com 2004; IFPI 2002; IFPI 2005; Slashdot.org 2005). Although such strategies may reduce IP theft to a certain extent, critics argue that such strategies are "insufficient to gain widespread public compliance with the law" (Tyler 1996:224). While numerous possibilities exist as to why this might be the case, one potential reason is that stable traits and beliefs of individuals affect their proclivity to be influenced by the social learning components that guide these suggested policies.

Self-control and beliefs regarding the law are two factors that may play a conditioning role. Prior research has found that more stable characteristics of individuals interact with other social elements to produce differential effects on criminal behavior (Evans, Cullen, Burton, Dunaway, and Benson 1997), occupational delinquency (Gibson and Wright 2001), and software piracy (Higgins and Makin 2004). …

The rest of this article is only available to active members of Questia

Sign up now for a free, 1-day trial and receive full access to:

  • Questia's entire collection
  • Automatic bibliography creation
  • More helpful research tools like notes, citations, and highlights
  • Ad-free environment

Already a member? Log in now.

Notes for this article

Add a new note
If you are trying to select text to create highlights or citations, remember that you must now click or tap on the first word, and then click or tap on the last word.
One moment ...
Default project is now your active project.
Project items

Items saved from this article

This article has been saved
Highlights (0)
Some of your highlights are legacy items.

Highlights saved before July 30, 2012 will not be displayed on their respective source pages.

You can easily re-create the highlights by opening the book page or article, selecting the text, and clicking “Highlight.”

Citations (0)
Some of your citations are legacy items.

Any citation created before July 30, 2012 will labeled as a “Cited page.” New citations will be saved as cited passages, pages or articles.

We also added the ability to view new citations from your projects or the book or article where you created them.

Notes (0)
Bookmarks (0)

You have no saved items from this article

Project items include:
  • Saved book/article
  • Highlights
  • Quotes/citations
  • Notes
  • Bookmarks
Notes
Cite this article

Cited article

Style
Citations are available only to our active members.
Sign up now to cite pages or passages in MLA, APA and Chicago citation styles.

(Einhorn, 1992, p. 25)

(Einhorn 25)

1

1. Lois J. Einhorn, Abraham Lincoln, the Orator: Penetrating the Lincoln Legend (Westport, CT: Greenwood Press, 1992), 25, http://www.questia.com/read/27419298.

Cited article

Self-Control and Ethical Beliefs on the Social Learning of Intellectual Property Theft*
Settings

Settings

Typeface
Text size Smaller Larger Reset View mode
Search within

Search within this article

Look up

Look up a word

  • Dictionary
  • Thesaurus
Please submit a word or phrase above.
Print this page

Print this page

Why can't I print more than one page at a time?

Full screen

matching results for page

Cited passage

Style
Citations are available only to our active members.
Sign up now to cite pages or passages in MLA, APA and Chicago citation styles.

"Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences." (Einhorn, 1992, p. 25).

"Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences." (Einhorn 25)

"Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences."1

1. Lois J. Einhorn, Abraham Lincoln, the Orator: Penetrating the Lincoln Legend (Westport, CT: Greenwood Press, 1992), 25, http://www.questia.com/read/27419298.

Cited passage

Thanks for trying Questia!

Please continue trying out our research tools, but please note, full functionality is available only to our active members.

Your work will be lost once you leave this Web page.

For full access in an ad-free environment, sign up now for a FREE, 1-day trial.

Already a member? Log in now.