Skip to main content
Log in

One Sail Fits All? A Psychographic Segmentation of Digital Pirates

  • Published:
Journal of Business Ethics Aims and scope Submit manuscript

Abstract

This paper focuses on segmenting digital movie and TV series pirates and on investigating the effectiveness of piracy-combatting measures i.e., legal and educational strategies, in light of these segments. To address these research objectives, two online studies were conducted. First, 1277 valid responses were gathered with an online survey. Four pirate segments were found based on differing combinations of attitude toward piracy, ethical evaluation of piracy and feelings of guilt. The anti-pirate, conflicted pirate, cavalier pirate, and die-hard pirate can be placed on a continuum of increasing pirating frequency, subjective norm, pirating self-efficacy, habit, and decreasing in perceived harm, respectively. The segments also differ in deontological and teleological orientations. Second, in an experimental mixed design, we find that the educational strategy is more effective than the legal strategy in lowering pirating intentions for the conflicted and cavalier pirate. However, both strategies fail at lowering intentions of the die-hard pirate, although perceived harm and perceived impunity were significantly influenced. These findings offer a more profound understanding of pirate segments and how they react differently to piracy-combatting measures. As a result, better strategies can be developed to control digital piracy.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

Notes

  1. Involvement of minors Minors below age 16 were involved in both studies 1 and 2. The ethical protocol of the authors’ university with respect to scientific research involving minors states that research including minors may be conducted only if the involvement of minors is relevant to the research issue and only on the conditions that (a) the stress imposed on the minor is minimal, (b) informed consent is given by either the minor’s parents or legal guardian or, if the research activities take place at or via the minor’s educational institution or another entity with which the minor is affiliated, that institution grants written permission for participation in the study, and (c) the minor participates willingly and has the freedom to withdraw from the study at any time. As the study wishes to investigate whether age differences exist in piracy behavior, the inclusion of minors is relevant to the research issue. This study complies with all guidelines imposed by the ethical protocol and has been approved by the university’s ethical committee. The authors were advised to enclose a message at the end of the questionnaire informing the minor about the illegal nature of torrent downloading, the dangers and risks involved, and appropriate online behavior in general. The message concluded by stating that, if the minor had any questions regarding the content of the questionnaire or online behavior in general, he or she should contact the researchers or talk to parents, teachers, or counselors.

References

  • Ajzen, I. (1989). Attitude structure and behavior. Hillsdale, NJ: Lawrence Erlbaum Associates.

    Google Scholar 

  • Ajzen, I. (1991). The theory of planned behavior. Organizational Behavior and Human Decision Processes, 50, 179–211.

    Article  Google Scholar 

  • Al-Rafee, S., & Cronan, T. P. (2006). Digital piracy: Factors that influence attitude toward behavior. Journal of Business Ethics, 63(3), 237–259.

    Article  Google Scholar 

  • Altschuller, S., & Benbunan-Fich, R. (2009). Is music downloading the new prohibition? What students reveal through an ethical dilemma. Ethics and Information Technology, 11(1), 49–56.

    Article  Google Scholar 

  • Ang, S. H., Cheng, P. S., Lim, E. A. C., & Tambyah, S. K. (2001). Spot the difference: Consumer responses towards counterfeits. Journal of Consumer Marketing, 18(3), 219–235.

    Article  Google Scholar 

  • Antonetti, P., & Maklan, S. (2014). Feelings that make a difference: How guilt and pride convince consumers of the effectiveness of sustainable consumption choices. Journal of Business Ethics, 124(1), 117–134.

    Article  Google Scholar 

  • Bandura, A. (1986). Social foundations of thought and action. Engelwood Cliffs, NJ: Prentice Hall.

    Google Scholar 

  • Bandura, A. (1991). Social cognitive theory of self-regulation. Organizational Behavior and Human Decision Processes, 50(2), 248–287.

    Article  Google Scholar 

  • Bandura, A. (1997). Self-efficacy: The exercise of control. New York: W.H. Freeman.

    Google Scholar 

  • Bandura, A. (2006). Guide for constructing self-efficacy scales. In F. P. T. Urdan (Ed.), Self-efficacy beliefs of adolescents (Vol. 5, pp. 307–337). Greenwich, CT: Information Age Publishing.

    Google Scholar 

  • Beck, L., & Ajzen, I. (1991). Predicting dishonest actions using the theory of planned behavior. Journal of Research in Personality, 25(3), 285–301.

    Article  Google Scholar 

  • Bergkvist, L., & Rossiter, J. R. (2007). The predictive validity of multiple-item versus single-item measures of the same constructs. Journal of Marketing Research, 44(2), 175–184.

    Article  Google Scholar 

  • Bhattacharjee, S., Gopal, R. D., Lertwachara, K., & Marsden, J. R. (2006). Impact of legal threats on online music sharing activity: An analysis of music industry legal actions. Journal of Law and Economics, 49(1), 91–114.

    Article  Google Scholar 

  • Bhattacharjee, S., Gopal, R. D., & Sanders, L. G. (2003). Digital music and online sharing: software piracy 2.0? Communications of the ACM, 46(7), 107–111.

    Article  Google Scholar 

  • Bialik, C. (2013). Putting a price tag on film piracy. The Wall Street Journal.

  • Bonner, S., & O’Higgins, E. (2010). Music piracy: Ethical perspectives. Management Decision, 48(9), 1341–1354.

    Article  Google Scholar 

  • Chaudhry, P. E., Chaudhry, S. S., Stumpf, S. A., & Sudler, H. (2011). Piracy in cyber space: Consumer complicity, pirates and enterprise enforcement. Enterprise Information Systems, 5(2), 255–271.

    Article  Google Scholar 

  • Chiang, E., & Assane, D. (2002). Software copyright infringement among college students. Applied Economics, 34(2), 157–166.

    Article  Google Scholar 

  • Chiou, J. S., Huang, C. Y., & Lee, H. H. (2005). The antecedents of music piracy attitudes and intentions. Journal of Business Ethics, 57(2), 161–174.

    Article  Google Scholar 

  • Chiu, H.-C., Lin, Y.-M., Lee, M., Nieh, M.-E., & Chen, H.-C. (2008). How to discourage online music piracy. International Journal of Management and Enterprise Development, 5(6), 723–738.

    Article  Google Scholar 

  • Chun-Yao, H. (2003). File sharing as a form of music consumption. International Journal of Electronic Commerce, 9(4), 37–55.

    Google Scholar 

  • Cockrill, A., & Goode, M. M. H. (2012). DVD pirating intentions: Angels, devils, chancers and receivers. Journal of Consumer Behaviour, 11(1), 1–10.

    Article  Google Scholar 

  • Conner, M., & Armitage, C. J. (1998). Extending the theory of planned behavior: A review and avenues for further research. Journal of Applied Social Psychology, 28(15), 1429–1464.

    Article  Google Scholar 

  • Coyle, J. R., Gould, S. J., Gupta, P., & Gupta, R. (2009). “To buy or to pirate”: The matrix of music consumers’ acquisition-mode decision-making. Journal of Business Research, 62(10), 1031–1037.

    Article  Google Scholar 

  • Cronan, T. P., & Al-Rafee, S. (2007). Factors that influence the intention to pirate software and media. Journal of Business Ethics, 78(4), 527–545.

    Article  Google Scholar 

  • d’Astous, A., Colbert, F., & Montpetit, D. (2005). Music piracy on the Web—How effective are anti-piracy arguments? Evidence from the theory of planned behaviour. Journal of Consumer Policy, 28(3), 289–310.

    Article  Google Scholar 

  • Drolet, A. L., & Morrison, D. G. (2001). Rejoinder to Grapentine. Journal of Service Research, 4(2), 159–160.

    Article  Google Scholar 

  • Eger, K., Hossfeld, T., Binzenhofer, A., & Kunzmann, G. (2007). Efficient simulation of large-scale p2p networks: packet-level vs. flow-level simulations. Monterey, CA: ACM Upgrade-CN.

  • Electronic Frontier Foundation. (2008). RIAA v. The people: Five years later. https://www.eff.org/wp.

  • Ernesto. (2014). 35% of all pirate bay uploads are porn. https://torrentfreak.com/35-of-all-pirate-bay-uploads-are-porn-140124/.

  • Freestone, O., & Mitchell, V. W. (2004). Generation Y attitudes towards E-ethics and Internet-related misbehaviours. Journal of Business Ethics, 54(2), 121–128.

    Article  Google Scholar 

  • Fuchs, C., & Diamantopoulos, A. (2009). Using single-item measures for construct measurement in management research. Conceptual issues and application guidelines. Die Betriebswirtschaft, 69(2), 195–210.

    Google Scholar 

  • Fullerton, S., Kerch, K. B., & Dodge, H. R. (1996). Consumer ethics: An assessment of individual behavior in the market place. Journal of Business Ethics, 15(7), 805–814.

    Article  Google Scholar 

  • Gopal, R. D., & Sanders, L. G. (1997). Preventive and deterrent controls for software piracy. Journal of Management Information Systems, 13(4), 29–47.

    Article  Google Scholar 

  • Gopal, R. D., Sanders, L. G., Bhattacharjee, S., Agrawal, M., & Wagner, S. C. (2004). A behavioral model of digital music piracy. Journal of Organizational Computing and Electronic Commerce, 14(2), 89–105.

    Article  Google Scholar 

  • Grimm, P. (2010). Social desirability bias. In J. Sheth & N. Malhotra (Eds.), Wiley international encyclopedia of marketing. Chichester: Wiley.

    Google Scholar 

  • Hair, J. F. J., Black, W. C., Babin, B. J., & Anderson, R. E. (2010). Multivariate data analysis (7th ed.). Upper Saddle City, NJ: Prentice Hall.

    Google Scholar 

  • Higgins, G. E., Wilson, A. L., & Fell, B. D. (2005). An application of deterrence theory to software piracy. Journal of Criminal Justice and Popular Culture, 3(12), 166–184.

    Google Scholar 

  • Hinduja, S. (2003). Trends and patterns among online software pirates. Ethics and Information Technology, 5(1), 49–61.

    Article  Google Scholar 

  • Hinduja, S., & Higgins, G. E. (2011). Trends and patterns among music pirates. Deviant Behavior, 32(7), 563–588.

    Article  Google Scholar 

  • Holt, T. J., & Copes, H. (2010). Transferring subcultural knowledge on-line: Practices and beliefs of persistent digital pirates. Deviant Behavior, 31(7), 625–654.

    Article  Google Scholar 

  • Hunt, S. D., & Vitell, S. J. (1986). A general theory of marketing ethics. Journal of Macromarketing, 6, 5–15.

    Article  Google Scholar 

  • Hunt, S. D., & Vitell, S. J. (2006). The general theory of marketing ethics: A revision and three questions. Journal of Macromarketing, 26(2), 143–153.

    Article  Google Scholar 

  • Jacobs, R. S., Heuvelman, A., Tan, M., & Peters, O. (2012). Digital movie piracy: A perspective on downloading behavior through social cognitive theory. Computers in Human Behavior, 28(3), 958–967.

    Article  Google Scholar 

  • Jambon, M. M., & Smetana, J. G. (2012). College students’ moral evaluations of illegal music downloading. Journal of Applied Developmental Psychology, 33(1), 31–39.

    Article  Google Scholar 

  • Jeong, B. K., & Khouja, M. (2013). Analysis of the effectiveness of preventive and deterrent piracy control strategies: Agent-based modeling approach. Computers in Human Behavior, 29(6), 2744–2755.

    Article  Google Scholar 

  • Johns, A. (2009). Piracy: The intellectual property wars from Gutenberg to Gates. Chicago: The University of Chicago Press.

    Book  Google Scholar 

  • Johnston, K., & Johal, P. (1999). The Internet as a “virtual cultural region”: Are extant cultural classification schemes appropriate? Internet Research—Electronic Networking Applications and Policy, 9(3), 178–186.

    Article  Google Scholar 

  • Ketchen, D. J., & Shook, C. L. (1996). The application of cluster analysis in strategic management research: An analysis and critique. Strategic Management Journal, 17(6), 441–458.

    Article  Google Scholar 

  • Kuo, F.-Y., & Hsu, M.-H. (2001). Development and validation of ethical computer self-efficacy measure: The case of softlifting. Journal of Business Ethics, 32(4), 299–315.

    Article  Google Scholar 

  • Kwong, T., & Lee, M. (2002). Behavioral intention model for the exchange mode internet music piracy. Paper presented at the Proceedings of the 35th annual Hawaii international conference on system sciences (HICSS’02) (Vol. 7).

  • LaRose, R., & Kim, J. (2007). Share, steal, or buy? A social cognitive perspective of music downloading. Cyberpsychology & Behavior, 10(2), 267–277.

    Article  Google Scholar 

  • Lau, E. K. W. (2003). An empirical study of software piracy. Business Ethics: A European Review, 12(3), 233–245.

    Article  Google Scholar 

  • LEK. (2006). The cost of movie piracy. http://austg.com/include/downloads/PirateProfile.pdf.

  • Levin, A. M., Dato-on, M. C., & Manolis, C. (2007). Deterring illegal downloading: The effects of threat appeals, past behavior, subjective norms, and attributions of harm. Journal of Consumer Behaviour, 6(2–3), 111–122.

    Article  Google Scholar 

  • Levin, A. M., Dato-on, M. C., & Rhee, K. (2004). Money for nothing and hits for free: The ethics of downloading music from peer-to-peer websites. Journal of Marketing Theory and Practice, 12(1), 48–60.

    Article  Google Scholar 

  • Liao, C., Lin, H.-N., & Liu, Y.-P. (2009). Predicting the use of pirated software: A contingency model integrating perceived risk with the theory of planned behavior. Journal of Business Ethics, 91(2), 237–252.

    Article  Google Scholar 

  • Lysonski, S., & Durvasula, S. (2008). Digital piracy of MP3s: Consumer and ethical predispositions. Journal of Consumer Marketing, 25(3), 167–178.

    Article  Google Scholar 

  • Madden, M., & Lenhart, A. (2003). Music downloading, file-sharing and copyright. http://www.pewinternet.org/~/media//Files/Reports/2003/PIP_Copyright_Memo.pdf.pdf.

  • Mandel, P., & Süssmuth, B. (2010). A re-examination of the role of gender in determining digital piracy behavior. Working Paper, Leipzig University.

  • Moon, B., McCluskey, J. D., & McCluskey, C. P. (2010). A general theory of crime and computer crime: An empirical test. Journal of Criminal Justice, 38(4), 767–772.

    Article  Google Scholar 

  • Moores, T. T., & Chang, J. C.-J. (2006). Ethical decision making in software piracy: Initial development and test of a fourcomponent model. MIS Quarterly, 30(1), 167–180.

    Google Scholar 

  • Morrison, P. (1994). Computer ethics: Cautionary tales and ethical dilemmas in computing. Cambridge: MIT Press.

    Google Scholar 

  • Nagin, D. S., & Pogarsky, G. (2003). An experimental investigation of deterrence: Cheating, self-serving bias, and impulsivity. Criminology, 41(1), 167–193.

    Article  Google Scholar 

  • Nagin, D. S., & Pogarsky, G. (2004). Time and punishment: Delayed consequences and criminal behavior. Journal of Quantitative Criminology, 20(4), 295–317.

    Article  Google Scholar 

  • Nagy, M. S. (2002). Using a single-item approach to measure facet job satisfaction. Journal of Occupational and Organizational Psychology, 75(1), 77–86.

    Article  Google Scholar 

  • Nunes, J. C., Hsee, C. K., & Weber, E. U. (2004). Why are people so prone to steal software the effect of cost structure on consumer purchase and payment intentions. Journal of Public Policy & Marketing, 23(1), 43.

    Article  Google Scholar 

  • Orme, T. (2014). The short- and long-term effectiveness of anti-piracy laws and enforcement actions. Journal of Cultural Economics, 38(4), 351–368.

    Article  Google Scholar 

  • Papies, D., Eggers, F., & Wlömert, N. (2010). Music for free? How free ad-funded downloads affect consumer choice. Journal of the Academy of Marketing Science, 39(5), 777–794.

    Article  Google Scholar 

  • Paternoster, R. (1987). The deterrent effect of the perceived certainty and severity of punishment: A review of the evidence and issues. Justice Quarterly, 4(2), 173–217.

    Article  Google Scholar 

  • Patwardhan, A. M., Keith, M. E., & Vitell, S. J. (2012). Religiosity, attitude toward business, and ethical beliefs: Hispanic consumers in the United States. Journal of Business Ethics, 110(1), 61–70.

    Article  Google Scholar 

  • Peace, A. G., Galletta, D. F., & Thong, J. Y. L. (2003). Software piracy in the workplace: A model and empirical test. Journal of Management Information Systems, 20(1), 153–177.

    Article  Google Scholar 

  • Plowman, S., & Goode, S. (2009). Factors affecting the intention to download music: Quality perceptions and downloading intensity. Journal of Computer Information Systems, 49(4), 84–97.

    Google Scholar 

  • Plumer, B. (2012). SOPA: How much does online piracy really cost the economy? http://www.washingtonpost.com/blogs/wonkblog/post/how-much-does-online-piracy-really-cost-the-economy/2012/01/05/gIQAXknNdP_blog.html.

  • RIAA. (2014). http://www.riaa.com/faq.php.

  • Robert, M. S. (2004). Student attitudes on software piracy and related issues of computer ethics. Ethics and Information Technology, 6(4), 215–222.

    Article  Google Scholar 

  • Robertson, K., McNeill, L., Green, J., & Roberts, C. (2011). illegal downloading, ethical concern, and illegal behavior. Journal of Business Ethics, 108(2), 215–227.

    Article  Google Scholar 

  • Russell, S. S., Spitzmuller, C., Lin, L. F., Stanton, J. M., Smith, P. C., & Ironson, G. H. (2004). Shorter can also be better: The abridged job in general scale. Educational and Psychological Measurement, 64(5), 878–893.

    Article  Google Scholar 

  • Scott, J. F. (1971). Internalization of norms: A sociological theory of moral commitment. Englewood Cliffs: Prentice-Hall.

    Google Scholar 

  • Shanahan, K. J., & Hyman, M. R. (2010). Motivators and enablers of SCOURing: A study of online piracy in the US and UK. Journal of Business Research, 63(9–10), 1095–1102.

    Article  Google Scholar 

  • Shang, R.-A., Chen, Y.-C., & Chen, P.-C. (2007). Ethical decisions about sharing music files in the P2P environment. Journal of Business Ethics, 80(2), 349–365.

    Article  Google Scholar 

  • Simpson, P., Banerjee, D., & Simpson, C. J. (1994). Softlifting: A model of motivating factors. Journal of Business Ethics, 13(6), 431–438.

    Article  Google Scholar 

  • Sinha, R. K., Machado, F. S., & Sellman, C. (2010). Don’t think twice, it’s all Right: music piracy and pricing in a DRM-free environment. Journal of Marketing, 74(2), 40–54.

    Article  Google Scholar 

  • Sinha, R. K., & Mandel, N. (2008). Preventing digital music piracy: The carrot or the stick? Journal of Marketing, 72(1), 1–15.

    Article  Google Scholar 

  • Siwek, S. E. (2007). The true cost of sound recording piracy to the U.S. economy. Lewiston, TX: Institute for Policy Innovation.

    Google Scholar 

  • Stanton, J. M., Sinar, E. F., Balzer, W. K., Julian, A. L., Thoresen, P., Aziz, S., et al. (2002). Development of a compact measure of job satisfaction: The abridged Job Descriptive Index. Educational and Psychological Measurement, 62(1), 173–191.

    Article  Google Scholar 

  • Svensson, M., Larsson, S., & Kaminski, M. (2014). The Research Bay—Studying the global file sharing community. In W. T. Gallagher & D. Halbert (Eds.), Law and society perspectives on intellectual property law. Cambridge: Cambridge University Press.

    Google Scholar 

  • Sykes, G. M., & Matza, D. (1957). Techniques of neutralization—A theory of delinquency. American Sociological Review, 22(6), 664–670.

    Article  Google Scholar 

  • Tan, B. (2002). Understanding consumer ethical decision making with respect to purchase of pirated software. Journal of Consumer Marketing, 19(2), 96–111.

    Article  Google Scholar 

  • Tangney, J. P., & Dearing, R. L. (2002). Shame and guilt. New York: The Guilford Press.

    Book  Google Scholar 

  • Tanner, C., Medin, D. L., & Iliev, R. (2008). Influence of deontological versus consequentialist orientations on act choices and framing effects: When principles are more important than consequences. European Journal of Social Psychology, 38(5), 757–769. doi:10.1002/ejsp.493.

    Article  Google Scholar 

  • Thong, J. Y. L., & Chee-Sing, Y. (1998). Testing an ethical decision-making theory: The case of softlifting. Journal of Management Information Systems, 15(1), 213–237.

    Article  Google Scholar 

  • Trafimow, D., & Finlay, K. A. (1996). The importance of subjective norms for a minority of people: Between-subjects and within-subjects analyses. Personality and Social Psychology Bulletin, 22(8), 820–828.

    Article  Google Scholar 

  • Trafimow, D., Sheeran, P., Conner, M., & Finlay, K. A. (2002). Evidence that perceived behavioural control is a multidimensional construct: Perceived control and perceived difficulty. British Journal of Social Psychology, 41, 101–121.

    Article  Google Scholar 

  • Vany, A., & Walls, W. D. (2007). Estimating the effects of movie piracy on box-office revenue. Review of Industrial Organization, 30(4), 291–301.

    Article  Google Scholar 

  • Vermunt, J. K., & Magidson, J. (2005a). Latent Gold 4.0 User’s Guide. Belmont, MA: Statistical Innovations Inc.

  • Vermunt, J. K., & Magidson, J. (2005b). Latent Gold Choice 4.0 User’s guide. Belmont, MA: Statistical Innovations Inc.

  • Vermunt, J. K., & Magidson, J. (2005c). Technical guide for Latent GOLD 4.0: Basic and advanced. Belmont, MA: Statistical Innovations Inc.

  • Vitell, S. J., & Muncy, J. (1992). Consumer ethics: An empirical investigation of factors influencing ethical judgments of the final consumer. Journal of Business Ethics, 11(8), 585–597.

    Article  Google Scholar 

  • Vitell, S. J., Singh, J. J., & Paolillo, J. (2007). Consumers’ ethical beliefs: The roles of money, religiosity and attitude toward business. Journal of Business Ethics, 73(4), 369–379.

    Article  Google Scholar 

  • Wagner, S. C., & Sanders, L. G. (2001). Considerations in ethical decision-making and software piracy. Journal of Business Ethics, 29(1–2), 161–167.

    Article  Google Scholar 

  • Wang, X., & McClung, S. R. (2012). The immorality of illegal downloading: The role of anticipated guilt and general emotions. Computers in Human Behavior, 28(1), 153–159.

    Article  Google Scholar 

  • Williams, K. R., & Hawkins, R. (1986). Perceptual research on general deterrence—A critical review. Law & Society Review, 20(4), 545–572.

    Article  Google Scholar 

  • Wingrove, T., Korpas, A. L., & Weisz, V. (2010). Why were millions of people not obeying the law? Motivational influences on non-compliance with the law in the case of music piracy. Psychology, Crime & Law, 17(3), 261–276.

    Article  Google Scholar 

  • Yu, J., & Liska, A. E. (1993). The certainty of punishment: A reference group effect and its functional form. Criminology, 31(3), 447–464.

    Article  Google Scholar 

Download references

Acknowledgments

The authors thank an anonymous reviewer for this valuable suggestion.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Charlotte Emily De Corte.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Appendices

Appendix 1: Glossary

Term

Definition

Digital piracy

The illegal procurement of infringed copyrighted digital media files. In this study, it refers to procuring infringed movies and TV shows by use of BitTorrent downloading

Digital media

Digitized music and video files in various formats such as .MP3, .WAV, .WMA, .MP4, .AVI,…

Peer-to-peer (P2P) network

A computer network wherein each connected computer can act as a server (i.e., seeder) as well as a client (i.e., leecher) for other computers in the network (i.e., peers) without the use of a central infrastructure

(Bit) Torrent

(Bit) Torrent downloading

(Bit)torrent is the dominant P2P file-sharing protocol and generally operates by splitting content (i.e., files) into several small pieces that can each be downloaded by and from different peers. Information about the files to be shared (i.e., metadata) and information about the tracker are called (Bit)Torrents

(Bit) Torrent client

A BitTorrent client is any program that implements the bit torrent protocol. Every client is capable of requesting and transmitting any kind of computer file over the network using the protocol. Examples include Vuze Inc. and BitTorrent Inc

(Bit) Torrent tracker

Trackers contain information about all peers that currently possess pieces of a particular file. Trackers coordinate the downloads but do not contain any content. Examples include The Pirate Bay, Demonoid, and Sumotracker

(Bit) Torrent index site

Websites that contain an index of torrent files and act as search engines through which torrents can be downloaded are called torrent sites. Examples include The Pirate Bay, KickassTorrents, Torrentz, and Mininova (which offers only legally redistributable media)

Streaming

Streaming is a media delivery method. During streaming, a part of the data is buffered so the file can be played. This way the audiovisual media can be consumed without downloading the entire file. Examples of streaming websites include Spotify and Netflix

Appendix 2: Ethical Dilemma

“A promising yet very experimental treatment for cancer is being developed, but has severe side-effects. In order to test the treatment you have to conduct tests that can make the participants very sick and could lead to premature death. What do you do?”

  1. A.

    I test the treatment

  2. B.

    I do not test the treatment

Appendix 3: Stimuli

Legal strategy (translated from Dutch)

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

De Corte, C.E., Van Kenhove, P. One Sail Fits All? A Psychographic Segmentation of Digital Pirates. J Bus Ethics 143, 441–465 (2017). https://doi.org/10.1007/s10551-015-2789-8

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10551-015-2789-8

Keywords

Navigation