TY - JOUR
T1 - Software Piracy: original insights from a criminological perspective
AU - Willison, Robert
AU - Siponen, Mikko
N1 - Paper presented at the 41st Annual Hawaii International Conference on System Sciences held at Waikoloa from 7-10 January 2008.
PY - 2008/1
Y1 - 2008/1
N2 - It is well known that software piracy is widespread.
While the existing research on this subject has applied a number of theories in order to understand and prevent such an act, this text presents an alternative perspective by advancing two criminological theories.
More specifically, a novel theoretical model is advanced, drawing on these theories entitled 'Techniques of Neutralization and Differential Association Theory'. The former helps to explain how individuals are able to rationalize their criminal behaviour in a manner which absolves them of pressures from social norms and internal controls such as feelings of guilt and shame. The latter explains how criminality is developed through a learning process taking place in personal groups. While empirical research is needed to test the model further, it is argued that these theories offer both an alternative perspective on the intention to commit software piracy, but also potentially open up new avenues for preventing this crime.
AB - It is well known that software piracy is widespread.
While the existing research on this subject has applied a number of theories in order to understand and prevent such an act, this text presents an alternative perspective by advancing two criminological theories.
More specifically, a novel theoretical model is advanced, drawing on these theories entitled 'Techniques of Neutralization and Differential Association Theory'. The former helps to explain how individuals are able to rationalize their criminal behaviour in a manner which absolves them of pressures from social norms and internal controls such as feelings of guilt and shame. The latter explains how criminality is developed through a learning process taking place in personal groups. While empirical research is needed to test the model further, it is argued that these theories offer both an alternative perspective on the intention to commit software piracy, but also potentially open up new avenues for preventing this crime.
U2 - 10.1109/HICSS.2008.357
DO - 10.1109/HICSS.2008.357
M3 - Article
SP - 266
JO - Proceedings of the 41st Annual Hawaii International Conference on System Sciences
JF - Proceedings of the 41st Annual Hawaii International Conference on System Sciences
ER -