Abstract
This paper focuses on segmenting digital movie and TV series pirates and on investigating the effectiveness of piracy-combatting measures i.e., legal and educational strategies, in light of these segments. To address these research objectives, two online studies were conducted. First, 1277 valid responses were gathered with an online survey. Four pirate segments were found based on differing combinations of attitude toward piracy, ethical evaluation of piracy and feelings of guilt. The anti-pirate, conflicted pirate, cavalier pirate, and die-hard pirate can be placed on a continuum of increasing pirating frequency, subjective norm, pirating self-efficacy, habit, and decreasing in perceived harm, respectively. The segments also differ in deontological and teleological orientations. Second, in an experimental mixed design, we find that the educational strategy is more effective than the legal strategy in lowering pirating intentions for the conflicted and cavalier pirate. However, both strategies fail at lowering intentions of the die-hard pirate, although perceived harm and perceived impunity were significantly influenced. These findings offer a more profound understanding of pirate segments and how they react differently to piracy-combatting measures. As a result, better strategies can be developed to control digital piracy.
Similar content being viewed by others
Notes
Involvement of minors Minors below age 16 were involved in both studies 1 and 2. The ethical protocol of the authors’ university with respect to scientific research involving minors states that research including minors may be conducted only if the involvement of minors is relevant to the research issue and only on the conditions that (a) the stress imposed on the minor is minimal, (b) informed consent is given by either the minor’s parents or legal guardian or, if the research activities take place at or via the minor’s educational institution or another entity with which the minor is affiliated, that institution grants written permission for participation in the study, and (c) the minor participates willingly and has the freedom to withdraw from the study at any time. As the study wishes to investigate whether age differences exist in piracy behavior, the inclusion of minors is relevant to the research issue. This study complies with all guidelines imposed by the ethical protocol and has been approved by the university’s ethical committee. The authors were advised to enclose a message at the end of the questionnaire informing the minor about the illegal nature of torrent downloading, the dangers and risks involved, and appropriate online behavior in general. The message concluded by stating that, if the minor had any questions regarding the content of the questionnaire or online behavior in general, he or she should contact the researchers or talk to parents, teachers, or counselors.
References
Ajzen, I. (1989). Attitude structure and behavior. Hillsdale, NJ: Lawrence Erlbaum Associates.
Ajzen, I. (1991). The theory of planned behavior. Organizational Behavior and Human Decision Processes, 50, 179–211.
Al-Rafee, S., & Cronan, T. P. (2006). Digital piracy: Factors that influence attitude toward behavior. Journal of Business Ethics, 63(3), 237–259.
Altschuller, S., & Benbunan-Fich, R. (2009). Is music downloading the new prohibition? What students reveal through an ethical dilemma. Ethics and Information Technology, 11(1), 49–56.
Ang, S. H., Cheng, P. S., Lim, E. A. C., & Tambyah, S. K. (2001). Spot the difference: Consumer responses towards counterfeits. Journal of Consumer Marketing, 18(3), 219–235.
Antonetti, P., & Maklan, S. (2014). Feelings that make a difference: How guilt and pride convince consumers of the effectiveness of sustainable consumption choices. Journal of Business Ethics, 124(1), 117–134.
Bandura, A. (1986). Social foundations of thought and action. Engelwood Cliffs, NJ: Prentice Hall.
Bandura, A. (1991). Social cognitive theory of self-regulation. Organizational Behavior and Human Decision Processes, 50(2), 248–287.
Bandura, A. (1997). Self-efficacy: The exercise of control. New York: W.H. Freeman.
Bandura, A. (2006). Guide for constructing self-efficacy scales. In F. P. T. Urdan (Ed.), Self-efficacy beliefs of adolescents (Vol. 5, pp. 307–337). Greenwich, CT: Information Age Publishing.
Beck, L., & Ajzen, I. (1991). Predicting dishonest actions using the theory of planned behavior. Journal of Research in Personality, 25(3), 285–301.
Bergkvist, L., & Rossiter, J. R. (2007). The predictive validity of multiple-item versus single-item measures of the same constructs. Journal of Marketing Research, 44(2), 175–184.
Bhattacharjee, S., Gopal, R. D., Lertwachara, K., & Marsden, J. R. (2006). Impact of legal threats on online music sharing activity: An analysis of music industry legal actions. Journal of Law and Economics, 49(1), 91–114.
Bhattacharjee, S., Gopal, R. D., & Sanders, L. G. (2003). Digital music and online sharing: software piracy 2.0? Communications of the ACM, 46(7), 107–111.
Bialik, C. (2013). Putting a price tag on film piracy. The Wall Street Journal.
Bonner, S., & O’Higgins, E. (2010). Music piracy: Ethical perspectives. Management Decision, 48(9), 1341–1354.
Chaudhry, P. E., Chaudhry, S. S., Stumpf, S. A., & Sudler, H. (2011). Piracy in cyber space: Consumer complicity, pirates and enterprise enforcement. Enterprise Information Systems, 5(2), 255–271.
Chiang, E., & Assane, D. (2002). Software copyright infringement among college students. Applied Economics, 34(2), 157–166.
Chiou, J. S., Huang, C. Y., & Lee, H. H. (2005). The antecedents of music piracy attitudes and intentions. Journal of Business Ethics, 57(2), 161–174.
Chiu, H.-C., Lin, Y.-M., Lee, M., Nieh, M.-E., & Chen, H.-C. (2008). How to discourage online music piracy. International Journal of Management and Enterprise Development, 5(6), 723–738.
Chun-Yao, H. (2003). File sharing as a form of music consumption. International Journal of Electronic Commerce, 9(4), 37–55.
Cockrill, A., & Goode, M. M. H. (2012). DVD pirating intentions: Angels, devils, chancers and receivers. Journal of Consumer Behaviour, 11(1), 1–10.
Conner, M., & Armitage, C. J. (1998). Extending the theory of planned behavior: A review and avenues for further research. Journal of Applied Social Psychology, 28(15), 1429–1464.
Coyle, J. R., Gould, S. J., Gupta, P., & Gupta, R. (2009). “To buy or to pirate”: The matrix of music consumers’ acquisition-mode decision-making. Journal of Business Research, 62(10), 1031–1037.
Cronan, T. P., & Al-Rafee, S. (2007). Factors that influence the intention to pirate software and media. Journal of Business Ethics, 78(4), 527–545.
d’Astous, A., Colbert, F., & Montpetit, D. (2005). Music piracy on the Web—How effective are anti-piracy arguments? Evidence from the theory of planned behaviour. Journal of Consumer Policy, 28(3), 289–310.
Drolet, A. L., & Morrison, D. G. (2001). Rejoinder to Grapentine. Journal of Service Research, 4(2), 159–160.
Eger, K., Hossfeld, T., Binzenhofer, A., & Kunzmann, G. (2007). Efficient simulation of large-scale p2p networks: packet-level vs. flow-level simulations. Monterey, CA: ACM Upgrade-CN.
Electronic Frontier Foundation. (2008). RIAA v. The people: Five years later. https://www.eff.org/wp.
Ernesto. (2014). 35% of all pirate bay uploads are porn. https://torrentfreak.com/35-of-all-pirate-bay-uploads-are-porn-140124/.
Freestone, O., & Mitchell, V. W. (2004). Generation Y attitudes towards E-ethics and Internet-related misbehaviours. Journal of Business Ethics, 54(2), 121–128.
Fuchs, C., & Diamantopoulos, A. (2009). Using single-item measures for construct measurement in management research. Conceptual issues and application guidelines. Die Betriebswirtschaft, 69(2), 195–210.
Fullerton, S., Kerch, K. B., & Dodge, H. R. (1996). Consumer ethics: An assessment of individual behavior in the market place. Journal of Business Ethics, 15(7), 805–814.
Gopal, R. D., & Sanders, L. G. (1997). Preventive and deterrent controls for software piracy. Journal of Management Information Systems, 13(4), 29–47.
Gopal, R. D., Sanders, L. G., Bhattacharjee, S., Agrawal, M., & Wagner, S. C. (2004). A behavioral model of digital music piracy. Journal of Organizational Computing and Electronic Commerce, 14(2), 89–105.
Grimm, P. (2010). Social desirability bias. In J. Sheth & N. Malhotra (Eds.), Wiley international encyclopedia of marketing. Chichester: Wiley.
Hair, J. F. J., Black, W. C., Babin, B. J., & Anderson, R. E. (2010). Multivariate data analysis (7th ed.). Upper Saddle City, NJ: Prentice Hall.
Higgins, G. E., Wilson, A. L., & Fell, B. D. (2005). An application of deterrence theory to software piracy. Journal of Criminal Justice and Popular Culture, 3(12), 166–184.
Hinduja, S. (2003). Trends and patterns among online software pirates. Ethics and Information Technology, 5(1), 49–61.
Hinduja, S., & Higgins, G. E. (2011). Trends and patterns among music pirates. Deviant Behavior, 32(7), 563–588.
Holt, T. J., & Copes, H. (2010). Transferring subcultural knowledge on-line: Practices and beliefs of persistent digital pirates. Deviant Behavior, 31(7), 625–654.
Hunt, S. D., & Vitell, S. J. (1986). A general theory of marketing ethics. Journal of Macromarketing, 6, 5–15.
Hunt, S. D., & Vitell, S. J. (2006). The general theory of marketing ethics: A revision and three questions. Journal of Macromarketing, 26(2), 143–153.
Jacobs, R. S., Heuvelman, A., Tan, M., & Peters, O. (2012). Digital movie piracy: A perspective on downloading behavior through social cognitive theory. Computers in Human Behavior, 28(3), 958–967.
Jambon, M. M., & Smetana, J. G. (2012). College students’ moral evaluations of illegal music downloading. Journal of Applied Developmental Psychology, 33(1), 31–39.
Jeong, B. K., & Khouja, M. (2013). Analysis of the effectiveness of preventive and deterrent piracy control strategies: Agent-based modeling approach. Computers in Human Behavior, 29(6), 2744–2755.
Johns, A. (2009). Piracy: The intellectual property wars from Gutenberg to Gates. Chicago: The University of Chicago Press.
Johnston, K., & Johal, P. (1999). The Internet as a “virtual cultural region”: Are extant cultural classification schemes appropriate? Internet Research—Electronic Networking Applications and Policy, 9(3), 178–186.
Ketchen, D. J., & Shook, C. L. (1996). The application of cluster analysis in strategic management research: An analysis and critique. Strategic Management Journal, 17(6), 441–458.
Kuo, F.-Y., & Hsu, M.-H. (2001). Development and validation of ethical computer self-efficacy measure: The case of softlifting. Journal of Business Ethics, 32(4), 299–315.
Kwong, T., & Lee, M. (2002). Behavioral intention model for the exchange mode internet music piracy. Paper presented at the Proceedings of the 35th annual Hawaii international conference on system sciences (HICSS’02) (Vol. 7).
LaRose, R., & Kim, J. (2007). Share, steal, or buy? A social cognitive perspective of music downloading. Cyberpsychology & Behavior, 10(2), 267–277.
Lau, E. K. W. (2003). An empirical study of software piracy. Business Ethics: A European Review, 12(3), 233–245.
LEK. (2006). The cost of movie piracy. http://austg.com/include/downloads/PirateProfile.pdf.
Levin, A. M., Dato-on, M. C., & Manolis, C. (2007). Deterring illegal downloading: The effects of threat appeals, past behavior, subjective norms, and attributions of harm. Journal of Consumer Behaviour, 6(2–3), 111–122.
Levin, A. M., Dato-on, M. C., & Rhee, K. (2004). Money for nothing and hits for free: The ethics of downloading music from peer-to-peer websites. Journal of Marketing Theory and Practice, 12(1), 48–60.
Liao, C., Lin, H.-N., & Liu, Y.-P. (2009). Predicting the use of pirated software: A contingency model integrating perceived risk with the theory of planned behavior. Journal of Business Ethics, 91(2), 237–252.
Lysonski, S., & Durvasula, S. (2008). Digital piracy of MP3s: Consumer and ethical predispositions. Journal of Consumer Marketing, 25(3), 167–178.
Madden, M., & Lenhart, A. (2003). Music downloading, file-sharing and copyright. http://www.pewinternet.org/~/media//Files/Reports/2003/PIP_Copyright_Memo.pdf.pdf.
Mandel, P., & Süssmuth, B. (2010). A re-examination of the role of gender in determining digital piracy behavior. Working Paper, Leipzig University.
Moon, B., McCluskey, J. D., & McCluskey, C. P. (2010). A general theory of crime and computer crime: An empirical test. Journal of Criminal Justice, 38(4), 767–772.
Moores, T. T., & Chang, J. C.-J. (2006). Ethical decision making in software piracy: Initial development and test of a fourcomponent model. MIS Quarterly, 30(1), 167–180.
Morrison, P. (1994). Computer ethics: Cautionary tales and ethical dilemmas in computing. Cambridge: MIT Press.
Nagin, D. S., & Pogarsky, G. (2003). An experimental investigation of deterrence: Cheating, self-serving bias, and impulsivity. Criminology, 41(1), 167–193.
Nagin, D. S., & Pogarsky, G. (2004). Time and punishment: Delayed consequences and criminal behavior. Journal of Quantitative Criminology, 20(4), 295–317.
Nagy, M. S. (2002). Using a single-item approach to measure facet job satisfaction. Journal of Occupational and Organizational Psychology, 75(1), 77–86.
Nunes, J. C., Hsee, C. K., & Weber, E. U. (2004). Why are people so prone to steal software the effect of cost structure on consumer purchase and payment intentions. Journal of Public Policy & Marketing, 23(1), 43.
Orme, T. (2014). The short- and long-term effectiveness of anti-piracy laws and enforcement actions. Journal of Cultural Economics, 38(4), 351–368.
Papies, D., Eggers, F., & Wlömert, N. (2010). Music for free? How free ad-funded downloads affect consumer choice. Journal of the Academy of Marketing Science, 39(5), 777–794.
Paternoster, R. (1987). The deterrent effect of the perceived certainty and severity of punishment: A review of the evidence and issues. Justice Quarterly, 4(2), 173–217.
Patwardhan, A. M., Keith, M. E., & Vitell, S. J. (2012). Religiosity, attitude toward business, and ethical beliefs: Hispanic consumers in the United States. Journal of Business Ethics, 110(1), 61–70.
Peace, A. G., Galletta, D. F., & Thong, J. Y. L. (2003). Software piracy in the workplace: A model and empirical test. Journal of Management Information Systems, 20(1), 153–177.
Plowman, S., & Goode, S. (2009). Factors affecting the intention to download music: Quality perceptions and downloading intensity. Journal of Computer Information Systems, 49(4), 84–97.
Plumer, B. (2012). SOPA: How much does online piracy really cost the economy? http://www.washingtonpost.com/blogs/wonkblog/post/how-much-does-online-piracy-really-cost-the-economy/2012/01/05/gIQAXknNdP_blog.html.
RIAA. (2014). http://www.riaa.com/faq.php.
Robert, M. S. (2004). Student attitudes on software piracy and related issues of computer ethics. Ethics and Information Technology, 6(4), 215–222.
Robertson, K., McNeill, L., Green, J., & Roberts, C. (2011). illegal downloading, ethical concern, and illegal behavior. Journal of Business Ethics, 108(2), 215–227.
Russell, S. S., Spitzmuller, C., Lin, L. F., Stanton, J. M., Smith, P. C., & Ironson, G. H. (2004). Shorter can also be better: The abridged job in general scale. Educational and Psychological Measurement, 64(5), 878–893.
Scott, J. F. (1971). Internalization of norms: A sociological theory of moral commitment. Englewood Cliffs: Prentice-Hall.
Shanahan, K. J., & Hyman, M. R. (2010). Motivators and enablers of SCOURing: A study of online piracy in the US and UK. Journal of Business Research, 63(9–10), 1095–1102.
Shang, R.-A., Chen, Y.-C., & Chen, P.-C. (2007). Ethical decisions about sharing music files in the P2P environment. Journal of Business Ethics, 80(2), 349–365.
Simpson, P., Banerjee, D., & Simpson, C. J. (1994). Softlifting: A model of motivating factors. Journal of Business Ethics, 13(6), 431–438.
Sinha, R. K., Machado, F. S., & Sellman, C. (2010). Don’t think twice, it’s all Right: music piracy and pricing in a DRM-free environment. Journal of Marketing, 74(2), 40–54.
Sinha, R. K., & Mandel, N. (2008). Preventing digital music piracy: The carrot or the stick? Journal of Marketing, 72(1), 1–15.
Siwek, S. E. (2007). The true cost of sound recording piracy to the U.S. economy. Lewiston, TX: Institute for Policy Innovation.
Stanton, J. M., Sinar, E. F., Balzer, W. K., Julian, A. L., Thoresen, P., Aziz, S., et al. (2002). Development of a compact measure of job satisfaction: The abridged Job Descriptive Index. Educational and Psychological Measurement, 62(1), 173–191.
Svensson, M., Larsson, S., & Kaminski, M. (2014). The Research Bay—Studying the global file sharing community. In W. T. Gallagher & D. Halbert (Eds.), Law and society perspectives on intellectual property law. Cambridge: Cambridge University Press.
Sykes, G. M., & Matza, D. (1957). Techniques of neutralization—A theory of delinquency. American Sociological Review, 22(6), 664–670.
Tan, B. (2002). Understanding consumer ethical decision making with respect to purchase of pirated software. Journal of Consumer Marketing, 19(2), 96–111.
Tangney, J. P., & Dearing, R. L. (2002). Shame and guilt. New York: The Guilford Press.
Tanner, C., Medin, D. L., & Iliev, R. (2008). Influence of deontological versus consequentialist orientations on act choices and framing effects: When principles are more important than consequences. European Journal of Social Psychology, 38(5), 757–769. doi:10.1002/ejsp.493.
Thong, J. Y. L., & Chee-Sing, Y. (1998). Testing an ethical decision-making theory: The case of softlifting. Journal of Management Information Systems, 15(1), 213–237.
Trafimow, D., & Finlay, K. A. (1996). The importance of subjective norms for a minority of people: Between-subjects and within-subjects analyses. Personality and Social Psychology Bulletin, 22(8), 820–828.
Trafimow, D., Sheeran, P., Conner, M., & Finlay, K. A. (2002). Evidence that perceived behavioural control is a multidimensional construct: Perceived control and perceived difficulty. British Journal of Social Psychology, 41, 101–121.
Vany, A., & Walls, W. D. (2007). Estimating the effects of movie piracy on box-office revenue. Review of Industrial Organization, 30(4), 291–301.
Vermunt, J. K., & Magidson, J. (2005a). Latent Gold 4.0 User’s Guide. Belmont, MA: Statistical Innovations Inc.
Vermunt, J. K., & Magidson, J. (2005b). Latent Gold Choice 4.0 User’s guide. Belmont, MA: Statistical Innovations Inc.
Vermunt, J. K., & Magidson, J. (2005c). Technical guide for Latent GOLD 4.0: Basic and advanced. Belmont, MA: Statistical Innovations Inc.
Vitell, S. J., & Muncy, J. (1992). Consumer ethics: An empirical investigation of factors influencing ethical judgments of the final consumer. Journal of Business Ethics, 11(8), 585–597.
Vitell, S. J., Singh, J. J., & Paolillo, J. (2007). Consumers’ ethical beliefs: The roles of money, religiosity and attitude toward business. Journal of Business Ethics, 73(4), 369–379.
Wagner, S. C., & Sanders, L. G. (2001). Considerations in ethical decision-making and software piracy. Journal of Business Ethics, 29(1–2), 161–167.
Wang, X., & McClung, S. R. (2012). The immorality of illegal downloading: The role of anticipated guilt and general emotions. Computers in Human Behavior, 28(1), 153–159.
Williams, K. R., & Hawkins, R. (1986). Perceptual research on general deterrence—A critical review. Law & Society Review, 20(4), 545–572.
Wingrove, T., Korpas, A. L., & Weisz, V. (2010). Why were millions of people not obeying the law? Motivational influences on non-compliance with the law in the case of music piracy. Psychology, Crime & Law, 17(3), 261–276.
Yu, J., & Liska, A. E. (1993). The certainty of punishment: A reference group effect and its functional form. Criminology, 31(3), 447–464.
Acknowledgments
The authors thank an anonymous reviewer for this valuable suggestion.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no conflict of interest.
Appendices
Appendix 1: Glossary
Term | Definition |
---|---|
Digital piracy | The illegal procurement of infringed copyrighted digital media files. In this study, it refers to procuring infringed movies and TV shows by use of BitTorrent downloading |
Digital media | Digitized music and video files in various formats such as .MP3, .WAV, .WMA, .MP4, .AVI,… |
Peer-to-peer (P2P) network | A computer network wherein each connected computer can act as a server (i.e., seeder) as well as a client (i.e., leecher) for other computers in the network (i.e., peers) without the use of a central infrastructure |
(Bit) Torrent (Bit) Torrent downloading | (Bit)torrent is the dominant P2P file-sharing protocol and generally operates by splitting content (i.e., files) into several small pieces that can each be downloaded by and from different peers. Information about the files to be shared (i.e., metadata) and information about the tracker are called (Bit)Torrents |
(Bit) Torrent client | A BitTorrent client is any program that implements the bit torrent protocol. Every client is capable of requesting and transmitting any kind of computer file over the network using the protocol. Examples include Vuze Inc. and BitTorrent Inc |
(Bit) Torrent tracker | Trackers contain information about all peers that currently possess pieces of a particular file. Trackers coordinate the downloads but do not contain any content. Examples include The Pirate Bay, Demonoid, and Sumotracker |
(Bit) Torrent index site | Websites that contain an index of torrent files and act as search engines through which torrents can be downloaded are called torrent sites. Examples include The Pirate Bay, KickassTorrents, Torrentz, and Mininova (which offers only legally redistributable media) |
Streaming | Streaming is a media delivery method. During streaming, a part of the data is buffered so the file can be played. This way the audiovisual media can be consumed without downloading the entire file. Examples of streaming websites include Spotify and Netflix |
Appendix 2: Ethical Dilemma
“A promising yet very experimental treatment for cancer is being developed, but has severe side-effects. In order to test the treatment you have to conduct tests that can make the participants very sick and could lead to premature death. What do you do?”
-
A.
I test the treatment
-
B.
I do not test the treatment
Appendix 3: Stimuli
Legal strategy (translated from Dutch)
Rights and permissions
About this article
Cite this article
De Corte, C.E., Van Kenhove, P. One Sail Fits All? A Psychographic Segmentation of Digital Pirates. J Bus Ethics 143, 441–465 (2017). https://doi.org/10.1007/s10551-015-2789-8
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10551-015-2789-8