TY - GEN
T1 - Software piracy
T2 - 41st Annual Hawaii International Conference on System Sciences 2008, HICSS
AU - Willison, Robert
AU - Siponen, Mikko
PY - 2008
Y1 - 2008
N2 - It is well known that software piracy is widespread. While the existing research on this subject has applied a number of theories in order to understand and prevent such an act, this text presents an alternative perspective by advancing two criminological theories. More specifically, a novel theoretical model is advanced, drawing on these theories entitled Techniques of Neutralization and Differential Association Theory. The former helps to explain how individuals are able to rationalize their criminal behaviour in a manner which absolves them of pressures from social norms and internal controls such as feelings of guilt and shame. The latter explains how criminality is developed through a learning process taking place in personal groups. While empirical research is needed to test the model further, it is argued that these theories offer both an alternative perspective on the intention to commit software piracy, but also potentially open up new avenues for preventing this crime.
AB - It is well known that software piracy is widespread. While the existing research on this subject has applied a number of theories in order to understand and prevent such an act, this text presents an alternative perspective by advancing two criminological theories. More specifically, a novel theoretical model is advanced, drawing on these theories entitled Techniques of Neutralization and Differential Association Theory. The former helps to explain how individuals are able to rationalize their criminal behaviour in a manner which absolves them of pressures from social norms and internal controls such as feelings of guilt and shame. The latter explains how criminality is developed through a learning process taking place in personal groups. While empirical research is needed to test the model further, it is argued that these theories offer both an alternative perspective on the intention to commit software piracy, but also potentially open up new avenues for preventing this crime.
UR - http://www.scopus.com/inward/record.url?scp=51449111316&partnerID=8YFLogxK
U2 - 10.1109/HICSS.2008.407
DO - 10.1109/HICSS.2008.407
M3 - Conference Proceeding
AN - SCOPUS:51449111316
SN - 0769530753
SN - 9780769530758
T3 - Proceedings of the Annual Hawaii International Conference on System Sciences
BT - Proceedings of the 41st Annual Hawaii International Conference on System Sciences 2008, HICSS
Y2 - 7 January 2008 through 10 January 2008
ER -