Examining the Intersection of Self-Control, Peer Association and Neutralization in Explaining Digital Piracy

By Marcum, Catherine D.; Higgins, George E. et al. | Western Criminology Review, November 2011 | Go to article overview

Examining the Intersection of Self-Control, Peer Association and Neutralization in Explaining Digital Piracy


Marcum, Catherine D., Higgins, George E., Wolfe, Scott E., Ricketts, Melissa L., Western Criminology Review


Abstract: Digital piracy is becoming a common criminal behavior. However, criminologists do not have a firm understanding of how self-control, peer association, and neutralization come together to explain digital piracy. Using data from college students' responses to hypothetical scenarios, the present study determines if self-control, peer association, and neutralization interact to provide an explanation of the digital piracy in a manner that was previously unexplored. The findings from this study indicated that each type of measure individually provides an explanation of digital piracy, but also that peer association and neutralization interact together to explain the behavior. This contribution to the literature by validating the past hypothesis that neutralization does have a positive link to the commencement of digital piracy.

Keywords: digital piracy, computer crime, neutralization, self-control

INTRODUCTION

Adler and Adler (2006) argued that the dramatic growth of the Internet has provided a haven for deviance and crime. For instance, individuals are able to find, copy, and use intellectual property without providing payment (i.e., pirate intellectual property). One form of intellectual property piracy that is occurring more frequently is digital piracy. Digital piracy is defined as the illegal act of copying digital goods, software, digital documents, digital audio (including music and voice), and digital video without explicit permission from and compensation to the copyright holder (Gopal et al. 2004; Higgins, Fell, and Wilson, 2006). We point out that digital piracy has been used in several ways. Some have focused on specific form of digital piracy (Gopal et al., 2004; Higgins, 2005), and others have used multiple forms of digital piracy (Higgins et al., 2006) under this definition. Thus, this definition of digital piracy is a broad and usable definition of the behavior. The easy accessibility of the Internet has facilitated an increase in digital piracy in recent years. Wall (2005) argued that the Internet enables individuals to commit criminal activity easily for four reasons: it allows anonymous communication; it is transnational; it has created a shift in thinking from the ownership of physical property to the ownership of ideas; and it is relatively easy. Additionally, Wall (2005) contends that the Internet facilitates piracy because it allows the offense to take place away from the copyright holder; it provides the offender with the perception that the act is victimless. However, this behavior is not victimless.

In the United States, intellectual property that includes digital media is protected by copyright laws. The illegal copying and distribution of copyrighted materials over the Internet was made a felony offense by The No Electronic Theft Act (17 U.S.C. §§ 506 & 507) (see Im and Koen 1990 for the complete details of this legislation). These pieces of legislation are instrumental in making digital piracy a crime.

Multiple studies have investigated predictors and preventative behaviors of piracy (Chiang and Assane 2002; Cronan and Al-Rafee 2008; Ramikrishna, Kini, and Vijayaraman 2001). For example, Liao, Lin, and Lin (2009) found that perceived prosecution risk and behavior control affected the user's intention to participate in digital piracy. However, some researchers have used criminological theories (i.e., neutralization, differential association and self-control) to gain an understanding of digital piracy (Higgins, Wolfe, and Marcum 2008; Hinduja 2007; Ingram and Hinduja 2008; Morris and Higgins 2009). These studies do not provide an understanding of how these three theories come together to explain digital piracy. Therefore, a gap is left in understanding the link between self-control and digital piracy in the literature, as well as other potential theoretical explanations of digital piracy.

The purpose of the present study is to gain a better understanding of the choice to participate in digital piracy by examining how neutralization, differential association, and self-control theory work together. …

The rest of this article is only available to active members of Questia

Already a member? Log in now.

Notes for this article

Add a new note
If you are trying to select text to create highlights or citations, remember that you must now click or tap on the first word, and then click or tap on the last word.
One moment ...
Default project is now your active project.
Project items

Items saved from this article

This article has been saved
Highlights (0)
Some of your highlights are legacy items.

Highlights saved before July 30, 2012 will not be displayed on their respective source pages.

You can easily re-create the highlights by opening the book page or article, selecting the text, and clicking “Highlight.”

Citations (0)
Some of your citations are legacy items.

Any citation created before July 30, 2012 will labeled as a “Cited page.” New citations will be saved as cited passages, pages or articles.

We also added the ability to view new citations from your projects or the book or article where you created them.

Notes (0)
Bookmarks (0)

You have no saved items from this article

Project items include:
  • Saved book/article
  • Highlights
  • Quotes/citations
  • Notes
  • Bookmarks
Notes
Cite this article

Cited article

Style
Citations are available only to our active members.
Buy instant access to cite pages or passages in MLA, APA and Chicago citation styles.

(Einhorn, 1992, p. 25)

(Einhorn 25)

1. Lois J. Einhorn, Abraham Lincoln, the Orator: Penetrating the Lincoln Legend (Westport, CT: Greenwood Press, 1992), 25, http://www.questia.com/read/27419298.

Cited article

Examining the Intersection of Self-Control, Peer Association and Neutralization in Explaining Digital Piracy
Settings

Settings

Typeface
Text size Smaller Larger Reset View mode
Search within

Search within this article

Look up

Look up a word

  • Dictionary
  • Thesaurus
Please submit a word or phrase above.
Print this page

Print this page

Why can't I print more than one page at a time?

Help
Full screen

matching results for page

    Questia reader help

    How to highlight and cite specific passages

    1. Click or tap the first word you want to select.
    2. Click or tap the last word you want to select, and you’ll see everything in between get selected.
    3. You’ll then get a menu of options like creating a highlight or a citation from that passage of text.

    OK, got it!

    Cited passage

    Style
    Citations are available only to our active members.
    Buy instant access to cite pages or passages in MLA, APA and Chicago citation styles.

    "Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences." (Einhorn, 1992, p. 25).

    "Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences." (Einhorn 25)

    "Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences."1

    1. Lois J. Einhorn, Abraham Lincoln, the Orator: Penetrating the Lincoln Legend (Westport, CT: Greenwood Press, 1992), 25, http://www.questia.com/read/27419298.

    Cited passage

    Thanks for trying Questia!

    Please continue trying out our research tools, but please note, full functionality is available only to our active members.

    Your work will be lost once you leave this Web page.

    Buy instant access to save your work.

    Already a member? Log in now.

    Author Advanced search

    Oops!

    An unknown error has occurred. Please click the button below to reload the page. If the problem persists, please try again in a little while.