Abstract
A mixed methods project was devoted to understanding college students’ justification for digital piracy. The project consisted of two studies, a qualitative one and a quantitative one. Qualitative interviews were conducted to identify main themes in students’ justification for digital piracy, and then the findings were tested in a quantitative manner using a different sample. This project thus proposes a model in which quantitative measures are guided by qualitative findings, and qualitative findings are in turn reexamined based on quantitative findings. This project offers a mixed methods model for theory testing in criminology.
Keywords digital piracy, justification, qualitative, quantitative
|
Aukerman, R., Mott, D. (2002). Selected factors in student evaluation of ethical and legal activities related to computer usage. Retrieved from http://www.iacis.org/iis/2002_iis/PDF%20Files/AukermanMott.pdf Google Scholar | |
|
Bagchi, K., Kirs, P., Cerveny, R. (2006). Global software piracy: Can economic factors alone explain the trend? Communications of the ACM, 49(6), 70-75. Google Scholar | Crossref | ISI | |
|
Bartol, A. M., Bartol, C. R. (2005). Criminal behavior: A psychological approach. Upper Saddle River, NJ: Pearson. Google Scholar | |
|
Basinger, K. S., Gibbs, J. C., Fuller, D. (1995). Context and the measurement of moral judgement. International Journal of Behavioral Development, 18, 537-556. Google Scholar | SAGE Journals | ISI | |
|
Blumstein, A. (1974). Seriousness weights in an index of crime. American Sociological Review, 39, 854-864. Google Scholar | Crossref | ISI | |
|
Business Software Alliance . (2009). Internet piracy report 2009. Retrieved from http://global.bsa.org/internetreport2009/ Google Scholar | |
|
Chawki, M. (2006). Anonymity in cyberspace: Finding the balance. Retrieved from http://www.crime-research.org/articles/2110/ Google Scholar | |
|
Condry, I. (2004). Cultures of music piracy: An ethnographic comparison of the U.S. and Japan. International Journal of Cultural Studies, 7, 343-363. Google Scholar | SAGE Journals | |
|
Gibbs, J. C., Basinger, K. S., Fuller, D. (1992). Moral maturity: Measuring the development of sociomoral reflection. Hillsdale, NJ: Erlbaum. Google Scholar | |
|
Gopal, R. D., Sanders, G. L., Bhattacharjee, S., Agrawal, M. K., Wagner, S. C. (2002). A behavioral model of digital music piracy. Retrieved from http://ssrn.com/abstract=527344 Google Scholar | |
|
Higgins, G. E. (2009). Quantitative versus qualitative methods: Understanding why quantitative methods are predominant in criminology and criminal justice. Journal of Theoretical and Philosophical Criminology, 1(1), 23-37. Google Scholar | |
|
Higgins, G. E., Fell, B. D., Wilson, A. L. (2007). Low self-control and social learning in understanding students’ intentions to pirate movies in the United States. Social Science Computer Review, 25, 339-357. Google Scholar | SAGE Journals | ISI | |
|
Higgins, G. E., Wilson, A. L., Fell, B. D. (2005). An application of deterrence theory to software piracy. Journal of Criminal Justice and Popular Culture, 12, 166-184. Google Scholar | |
|
Hinduja, S. (2001). Correlates of Internet software piracy. Journal of Contemporary Criminal Justice, 17, 369-382. Google Scholar | SAGE Journals | |
|
Hinduja, S. (2006). Music piracy and crime theory. New York, NY: LFB Scholarly. Google Scholar | |
|
Hinduja, S. (2007). Neutralization theory and online software piracy: An empirical analysis. Ethics and Information Technology, 9, 187-204. Google Scholar | Crossref | |
|
Joinson, A. (1999). Social desirability, anonymity, and Internet-based questionnaires. Behavioral Methods, Instruments, & Computers, 31, 433-438. Google Scholar | Crossref | Medline | |
|
Kabay, M. E. (1998). Anonymity and pseudonymity in cyberspace: Deindividuation, incilivity and lawlessness versus freedom and privacy. Retrieved from http://www.cs.wright.edu/~pmateti/InternetSecurity/Lectures/Privacy/Anonyity_Pseudonymity.PDF Google Scholar | |
|
Kern, R. M., Pfeiffer, A. (2001). Personal computer software copyright violation: An unobtrusive analysis of Internet software piracy. Retrieved from http://www.sac.emich.edu/kernsmith/Personal%20Computer%20Software%Copyright%20Violation.pdf Google Scholar | |
|
Liang, Z., Yan, Z. (2005). Software piracy among college students: A comprehensive review of contributing factors, underlying processes, and tackling strategies. Journal of Educational Computing Research, 33, 115-140. Google Scholar | SAGE Journals | |
|
Logsdon, J. M., Thompson, J. K., Reid, R. A. (1994). Software piracy: Is it related to level of moral judgment? Journal of Business Ethics, 13, 849-857. Google Scholar | Crossref | ISI | |
|
Maxwell, J. A. (2005). Qualitative research design: An interactive approach. Thousand Oaks, CA: Sage. Google Scholar | |
|
Morris, R. G., Higgins, G. E. (2009). Neutralizing potential and self-reported digital piracy: A multitheoretical exploration among college undergraduates. Criminal Justice Review, 34, 173-195. Google Scholar | SAGE Journals | |
|
Nederhof, A. J. (1984). Methods of coping with social desirability bias: A review. European Journal of Social Psychology, 15, 263-280. Google Scholar | Crossref | ISI | |
|
Peace, A. G., Galletta, D. F., Thong, Y. L. (2003). Software piracy in the workplace: A model and empirical test. Journal of Management Information Systems, 20, 153-177. Google Scholar | Crossref | ISI | |
|
Peace, K., Ireson, J., Thorpe, J. (1975). Modified crime indices for eight countries. Journal of Criminal Law and Criminology, 66, 209-214. Google Scholar | Crossref | ISI | |
|
Ramakrishna, H. V., Kini, R. B., Vijayaraman, B. S. (2001). Shaping of moral intensity regarding software piracy in university students: Immediate community effects. Journal of Computer Information Systems, 41, 47-51. Google Scholar | ISI | |
|
Recording Industry Association of America . (n.d.). Piracy: Online and on the street. Retrieved from http://www.riaa.com/physicalpiracy.php?content_selector=piracy_details_online Google Scholar | |
|
Rossi, P. H., Waite, E., Bose, C. E., Berk, R. E. (1974). The seriousness of crimes: Normative structure and individual differences. American Sociological Review, 39, 224-237. Google Scholar | Crossref | ISI | |
|
Roth, J. A. (1978). Prosecutor perceptions of crime seriousness. Journal of Criminal Law and Criminology, 69, 232-242. Google Scholar | Crossref | ISI | |
|
Seale, D. A., Polakowski, M., Schnieder, S. (1998). It’s not really theft! Personal and workplace ethics that enable software piracy. Behavior & Information Technology, 17, 27-40. Google Scholar | Crossref | ISI | |
|
Sellin, T., Wolfgang, M. E. (1964). The measurement of delinquency. New York, NY: Wiley. Google Scholar | |
|
Siegfried, R. M. (2004). Student attitudes on software piracy and related issues of computer ethics. Ethics and Information Technology, 6, 215-222. Google Scholar | Crossref | |
|
Siegfried, R. M., Ashley, A. S. (2006). Is it theft or sampling? Student attitudes on the copying of commercial software and music. Retrieved from http://isedj.org/isecon/2006/3334/ISECON.2006.Siegfried.pdf Google Scholar | |
|
Siwek, S. E. (2007). The true cost of sound recording piracy to the U.S. economy. Retrieved from http://www.ipi.org/ Google Scholar | |
|
Skinner, W. F., Fream, A. M. (1997). A social learning theory analysis of computer crime among college students. Journal of Research in Crime and Delinquency, 34, 495-518. Google Scholar | SAGE Journals | ISI | |
|
Spinello, R. A. (2001). Code and moral values in cyberspace. Ethics and Information Technology, 3, 137-150. Google Scholar | Crossref | |
|
Stephens, J. M., Young, M. F., Calabrese, T. (2007). Does moral judgment go offline when students are online? A comparative analysis of undergraduates’ beliefs and behaviors related to conventional and digital cheating. Ethics & Behavior, 17, 233-254. Google Scholar | Crossref | ISI | |
|
Stevenson, S. F., Hall, G., Innes, J. M. (2004). Rationalizing criminal behavior: The influences of criminal sentiments on socialmoral development in violence offenders and nonoffenders. International Journal of Offender Therapy and Comparative Criminology, 48, 161-174. Google Scholar | SAGE Journals | ISI | |
|
Strahan, R., Gerbasi, K. C. (1972). Short, homogenous version of the Marlowe Crowne Social Desirability Scale. Journal of Clinical Psychology, 28, 191-193. Google Scholar | Crossref | ISI | |
|
Stylianou, S. (2003). Measuring crime serious perceptions: What have we learned and what else do we want to know. Journal of Criminal Justice, 31, 37-56. Google Scholar | Crossref | ISI | |
|
Sykes, G., Matza, D. (1957). Techniques of neutralization: A theory of delinquency. American Sociological Review, 22, 664-670. Google Scholar | Crossref | ISI | |
|
Taylor, S. L. (2004). Music piracy: Differences in the ethical perceptions of business majors and music business majors. Journal of Education for Business, 79, 306-310. Google Scholar | Crossref | |
|
Tewksbury, R. (2009). Qualitative versus quantitative methods: Understanding why qualitative methods are more superior for criminology and criminal justice. Journal of Theoretical and Philosophical Criminology, 1(1). Retrieved from http://www.jtpcrim.org/January_Articles/Qualitative_Vs_Quantitave_Richard_Tewksbury.pdf Google Scholar | |
|
Thomas, J. (2005). The moral ambiguity of social control on cyberspace: A retro-assessment of the “golden age” of hacking. New Media & Society, 7, 599-624. Google Scholar | SAGE Journals | ISI | |
|
Vold, G. B., Bernard, T. J., Snipes, J. B. (2002). Theoretical criminology. New York, NY: Oxford University Press. Google Scholar |

