A mixed methods project was devoted to understanding college students’ justification for digital piracy. The project consisted of two studies, a qualitative one and a quantitative one. Qualitative interviews were conducted to identify main themes in students’ justification for digital piracy, and then the findings were tested in a quantitative manner using a different sample. This project thus proposes a model in which quantitative measures are guided by qualitative findings, and qualitative findings are in turn reexamined based on quantitative findings. This project offers a mixed methods model for theory testing in criminology.

Aukerman, R., Mott, D. (2002). Selected factors in student evaluation of ethical and legal activities related to computer usage. Retrieved from http://www.iacis.org/iis/2002_iis/PDF%20Files/AukermanMott.pdf
Google Scholar
Bagchi, K., Kirs, P., Cerveny, R. (2006). Global software piracy: Can economic factors alone explain the trend? Communications of the ACM, 49(6), 70-75.
Google Scholar | Crossref | ISI
Bartol, A. M., Bartol, C. R. (2005). Criminal behavior: A psychological approach. Upper Saddle River, NJ: Pearson.
Google Scholar
Basinger, K. S., Gibbs, J. C., Fuller, D. (1995). Context and the measurement of moral judgement. International Journal of Behavioral Development, 18, 537-556.
Google Scholar | SAGE Journals | ISI
Blumstein, A. (1974). Seriousness weights in an index of crime. American Sociological Review, 39, 854-864.
Google Scholar | Crossref | ISI
Business Software Alliance . (2009). Internet piracy report 2009. Retrieved from http://global.bsa.org/internetreport2009/
Google Scholar
Chawki, M. (2006). Anonymity in cyberspace: Finding the balance. Retrieved from http://www.crime-research.org/articles/2110/
Google Scholar
Condry, I. (2004). Cultures of music piracy: An ethnographic comparison of the U.S. and Japan. International Journal of Cultural Studies, 7, 343-363.
Google Scholar | SAGE Journals
Gibbs, J. C., Basinger, K. S., Fuller, D. (1992). Moral maturity: Measuring the development of sociomoral reflection. Hillsdale, NJ: Erlbaum.
Google Scholar
Gopal, R. D., Sanders, G. L., Bhattacharjee, S., Agrawal, M. K., Wagner, S. C. (2002). A behavioral model of digital music piracy. Retrieved from http://ssrn.com/abstract=527344
Google Scholar
Higgins, G. E. (2009). Quantitative versus qualitative methods: Understanding why quantitative methods are predominant in criminology and criminal justice. Journal of Theoretical and Philosophical Criminology, 1(1), 23-37.
Google Scholar
Higgins, G. E., Fell, B. D., Wilson, A. L. (2007). Low self-control and social learning in understanding students’ intentions to pirate movies in the United States. Social Science Computer Review, 25, 339-357.
Google Scholar | SAGE Journals | ISI
Higgins, G. E., Wilson, A. L., Fell, B. D. (2005). An application of deterrence theory to software piracy. Journal of Criminal Justice and Popular Culture, 12, 166-184.
Google Scholar
Hinduja, S. (2001). Correlates of Internet software piracy. Journal of Contemporary Criminal Justice, 17, 369-382.
Google Scholar | SAGE Journals
Hinduja, S. (2006). Music piracy and crime theory. New York, NY: LFB Scholarly.
Google Scholar
Hinduja, S. (2007). Neutralization theory and online software piracy: An empirical analysis. Ethics and Information Technology, 9, 187-204.
Google Scholar | Crossref
Joinson, A. (1999). Social desirability, anonymity, and Internet-based questionnaires. Behavioral Methods, Instruments, & Computers, 31, 433-438.
Google Scholar | Crossref | Medline
Kabay, M. E. (1998). Anonymity and pseudonymity in cyberspace: Deindividuation, incilivity and lawlessness versus freedom and privacy. Retrieved from http://www.cs.wright.edu/~pmateti/InternetSecurity/Lectures/Privacy/Anonyity_Pseudonymity.PDF
Google Scholar
Kern, R. M., Pfeiffer, A. (2001). Personal computer software copyright violation: An unobtrusive analysis of Internet software piracy. Retrieved from http://www.sac.emich.edu/kernsmith/Personal%20Computer%20Software%Copyright%20Violation.pdf
Google Scholar
Liang, Z., Yan, Z. (2005). Software piracy among college students: A comprehensive review of contributing factors, underlying processes, and tackling strategies. Journal of Educational Computing Research, 33, 115-140.
Google Scholar | SAGE Journals
Logsdon, J. M., Thompson, J. K., Reid, R. A. (1994). Software piracy: Is it related to level of moral judgment? Journal of Business Ethics, 13, 849-857.
Google Scholar | Crossref | ISI
Maxwell, J. A. (2005). Qualitative research design: An interactive approach. Thousand Oaks, CA: Sage.
Google Scholar
Morris, R. G., Higgins, G. E. (2009). Neutralizing potential and self-reported digital piracy: A multitheoretical exploration among college undergraduates. Criminal Justice Review, 34, 173-195.
Google Scholar | SAGE Journals
Nederhof, A. J. (1984). Methods of coping with social desirability bias: A review. European Journal of Social Psychology, 15, 263-280.
Google Scholar | Crossref | ISI
Peace, A. G., Galletta, D. F., Thong, Y. L. (2003). Software piracy in the workplace: A model and empirical test. Journal of Management Information Systems, 20, 153-177.
Google Scholar | Crossref | ISI
Peace, K., Ireson, J., Thorpe, J. (1975). Modified crime indices for eight countries. Journal of Criminal Law and Criminology, 66, 209-214.
Google Scholar | Crossref | ISI
Ramakrishna, H. V., Kini, R. B., Vijayaraman, B. S. (2001). Shaping of moral intensity regarding software piracy in university students: Immediate community effects. Journal of Computer Information Systems, 41, 47-51.
Google Scholar | ISI
Recording Industry Association of America . (n.d.). Piracy: Online and on the street. Retrieved from http://www.riaa.com/physicalpiracy.php?content_selector=piracy_details_online
Google Scholar
Rossi, P. H., Waite, E., Bose, C. E., Berk, R. E. (1974). The seriousness of crimes: Normative structure and individual differences. American Sociological Review, 39, 224-237.
Google Scholar | Crossref | ISI
Roth, J. A. (1978). Prosecutor perceptions of crime seriousness. Journal of Criminal Law and Criminology, 69, 232-242.
Google Scholar | Crossref | ISI
Seale, D. A., Polakowski, M., Schnieder, S. (1998). It’s not really theft! Personal and workplace ethics that enable software piracy. Behavior & Information Technology, 17, 27-40.
Google Scholar | Crossref | ISI
Sellin, T., Wolfgang, M. E. (1964). The measurement of delinquency. New York, NY: Wiley.
Google Scholar
Siegfried, R. M. (2004). Student attitudes on software piracy and related issues of computer ethics. Ethics and Information Technology, 6, 215-222.
Google Scholar | Crossref
Siegfried, R. M., Ashley, A. S. (2006). Is it theft or sampling? Student attitudes on the copying of commercial software and music. Retrieved from http://isedj.org/isecon/2006/3334/ISECON.2006.Siegfried.pdf
Google Scholar
Siwek, S. E. (2007). The true cost of sound recording piracy to the U.S. economy. Retrieved from http://www.ipi.org/
Google Scholar
Skinner, W. F., Fream, A. M. (1997). A social learning theory analysis of computer crime among college students. Journal of Research in Crime and Delinquency, 34, 495-518.
Google Scholar | SAGE Journals | ISI
Spinello, R. A. (2001). Code and moral values in cyberspace. Ethics and Information Technology, 3, 137-150.
Google Scholar | Crossref
Stephens, J. M., Young, M. F., Calabrese, T. (2007). Does moral judgment go offline when students are online? A comparative analysis of undergraduates’ beliefs and behaviors related to conventional and digital cheating. Ethics & Behavior, 17, 233-254.
Google Scholar | Crossref | ISI
Stevenson, S. F., Hall, G., Innes, J. M. (2004). Rationalizing criminal behavior: The influences of criminal sentiments on socialmoral development in violence offenders and nonoffenders. International Journal of Offender Therapy and Comparative Criminology, 48, 161-174.
Google Scholar | SAGE Journals | ISI
Strahan, R., Gerbasi, K. C. (1972). Short, homogenous version of the Marlowe Crowne Social Desirability Scale. Journal of Clinical Psychology, 28, 191-193.
Google Scholar | Crossref | ISI
Stylianou, S. (2003). Measuring crime serious perceptions: What have we learned and what else do we want to know. Journal of Criminal Justice, 31, 37-56.
Google Scholar | Crossref | ISI
Sykes, G., Matza, D. (1957). Techniques of neutralization: A theory of delinquency. American Sociological Review, 22, 664-670.
Google Scholar | Crossref | ISI
Taylor, S. L. (2004). Music piracy: Differences in the ethical perceptions of business majors and music business majors. Journal of Education for Business, 79, 306-310.
Google Scholar | Crossref
Tewksbury, R. (2009). Qualitative versus quantitative methods: Understanding why qualitative methods are more superior for criminology and criminal justice. Journal of Theoretical and Philosophical Criminology, 1(1). Retrieved from http://www.jtpcrim.org/January_Articles/Qualitative_Vs_Quantitave_Richard_Tewksbury.pdf
Google Scholar
Thomas, J. (2005). The moral ambiguity of social control on cyberspace: A retro-assessment of the “golden age” of hacking. New Media & Society, 7, 599-624.
Google Scholar | SAGE Journals | ISI
Vold, G. B., Bernard, T. J., Snipes, J. B. (2002). Theoretical criminology. New York, NY: Oxford University Press.
Google Scholar
View access options

My Account

Welcome
You do not have access to this content.



Chinese Institutions / 中国用户

Click the button below for the full-text content

请点击以下获取该全文

Institutional Access

does not have access to this content.

Purchase Content

24 hours online access to download content

Your Access Options


Purchase

MMR-article-ppv for $36.00