Journal of Business Ethics

, Volume 80, Issue 2, pp 349–365 | Cite as

Ethical Decisions About Sharing Music Files in the P2P Environment

Article

Abstract

Digitized information and network have made an enormous impact on the music and movie industries. Internet piracy is popular and has greatly threatened the companies in these industries. This study tests Hunt-Vitell’s ethical decision model and attempts to understand why and how people share unauthorized music files with others in the peer-to-peer (P2P) network. The norm of anti-piracy, the ideology of free software, the norm of reciprocity, and the ideology of consumer rights are proposed as four deontological norms related to using P2P systems. The model is tested using a scenario survey with four alternatives; the results indicate that the deontological norm of anti-piracy is not a main factor in affecting P2P users’ ethical considerations regarding sharing files with others. This finding suggests that to protect their property rights, record companies should try to realize the consumer benefits brought via new digital and network technology, instead of simply declaring their intellectual property and resisting the innovations resulting from new technologies.

Keywords

peer-to-peer systems ethical decision model computer ethics music industry consumer ethics 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ajzen I. (1991) The Theory of Planned Behavior. Organizational Behavior and Human Decision Process 50:179–211CrossRefGoogle Scholar
  2. Ajzen I., Fishbein M. (1980) Understanding Attitudes and Predicting Social Behavior. Prentice-Hall, Englewood Cliffs, NJGoogle Scholar
  3. Ang S. H., Cheng P. S., Lim E. A. C., Tambyah S. K. (2001) Spot the Difference: Consumer Responses Towards Counterfeit. Journal of Consumer Marketing 18(3):219–235CrossRefGoogle Scholar
  4. Asvanund A., Clay K., Krishnan R., Smith M. D. (2004) An Empirical Analysis of Network Externalities in Peer-To-Peer Music Sharing Networks. Information Systems Research 15(2):155–174CrossRefGoogle Scholar
  5. Bergquist M., Ljungberg J. (2001) The Power of Gifts: Organizing Social Relationships in Open Source Communities. Information Systems Journal 11(4):305–320CrossRefGoogle Scholar
  6. Bhattacharjee S., Gopal R. D., Sanders G. L. (2003) Digital Music and Online Sharing: Software Piracy 2.0. Communications of the ACM 46(7):107–111CrossRefGoogle Scholar
  7. Blau P. M. (1964) Exchange and Power in Social Life. John Wiley and Sons, New York, NYGoogle Scholar
  8. Chatzidakis A., Hibbert S., Mittusis D., Smith A. (2004) Virtue in Consumption?. Journal of Marketing Management 20:527–544CrossRefGoogle Scholar
  9. Chiou J. S., Huang C. Y., Lee H. H. (2005) The Antecedents of Music Piracy Attitudes and Intentions. Journal of Business Ethics 57(2):161–174CrossRefGoogle Scholar
  10. Clemons E. K., Gu B., Lang K. R. (2002) Newly Vulnerable Markets in an Age of Pure Information Products: An Analysis of Online Music and Online News. Journal of Management Information Systems 19(3):417–441Google Scholar
  11. Cole D., Sirgy M. J., Bird M. M. (2000) How Do Managers Make Teleological Evaluations in Ethical Dilemmas? Testing Part of and Extending the Hunt–Vitell Model. Journal of Business Ethics 26(3):259–269CrossRefGoogle Scholar
  12. Denegri-Knott, J.: 2004, ‚Sinking the Online “Music Pirates”: Foucault, Power and Deviance on the Web’, Journal of Computer Mediated Communication http: //jcmc.indiana.edu/vol9/issue4/denegri_knott.htmlGoogle Scholar
  13. Di Norcia V. (2002) The Knowledge Economy and Moral Community. Journal of Business Ethics 38(1–2):167–177CrossRefGoogle Scholar
  14. Ferrell O. C., Gresham L. G. (1985) A Contingency Framework for Understanding Ethical Decision Making Marketing. Journal of Marketing 49(Summer):87–96CrossRefGoogle Scholar
  15. Gopal R. D., Sanders G. L., Bhattacharjee S., Agrawal M., Wagner S. C. (2004) A Behavior Model of Digital Music Piracy. Journal of Organizational Computing and Electronic Commerce 14(2):89–105CrossRefGoogle Scholar
  16. Hunt S. D., Vitell S. J. (1986) A General Theory of Market Ethics. Journal of Macromarketing 6:5–16CrossRefGoogle Scholar
  17. Hunt S. D., Vasquez-Parraga A. Z. (1993) Organizational Consequences, Marketing Ethics and Salesforce Supervision. Journal of Marketing Research 30(1):78–90CrossRefGoogle Scholar
  18. Ki E. J., Chang B. H., Khang H. (2006) Exploring Influential Factors on Music Piracy Across Countries. Journal of Communication 56(2):406–426CrossRefGoogle Scholar
  19. Kiesler S., Siegel J., McGuire T. W. (1984) Social Psychological Aspects of Computer Mediated Communication. American Psychologist 39:1123–1134CrossRefGoogle Scholar
  20. Kline R. B. (1998) Principles and Practice of Structural Equation Modeling. Guilford Press, New York, NYGoogle Scholar
  21. Krishnan R., Smith M. D., Telang R. (2003) The Economics of Peer-To-Peer Networks. Journal on Information Technology Theory and Applications 5(3):31–44Google Scholar
  22. Krishnan, R., M. D. Smith, Z. Tang and R. Telang: 2004, ‚The Impact of Free-Riding on Peer-to-Peer Networks’, Proceedings of the 37th Hawaii International Conference on System Science (CD-ROM), Hawaii, USAGoogle Scholar
  23. Kwong, T. C. H. and M. K. O. Lee: 2002, ‚Behavioral Intention Model for the Exchange Mode Internet Music Piracy’, Proceedings of the 35th Hawaii International Conference on System Science (CD-ROM), Hawaii, USAGoogle Scholar
  24. Kwong K. K., Yau O. H. M., Lee J. S. Y., Sin L. Y. M., Tse A. C. B. (2003) The Effects of Attitudinal and Demographic Factors on Intention to Buy Pirated CDs: The Case of Chinese Consumers. Journal of Business Ethics 47(3):223–235CrossRefGoogle Scholar
  25. Lessig L. (2002) The Future of Ideas. Vintage Books, New York, NYGoogle Scholar
  26. Liebowitz S. (2002) Re-thinking the Network Economy: The True Forces that Drive the Digital Marketplace. Amacom, New York, NYGoogle Scholar
  27. Liebowitz S. (2006) File Sharing: Creative Destruction or Just Plain Destruction?. The Journal of Law and Economics 49(1):1–28CrossRefGoogle Scholar
  28. Loch K. D., Conger S. (1996) Evaluating Ethical Decision Making and Computer Use. Communications of the ACM 39(7):74–83CrossRefGoogle Scholar
  29. Logsdon J. M., Thompson J. K., Reid R. A. (1994) Software Piracy: Is It Related to Level of Moral Judgment? Journal of Business Ethics 13(11):849–857CrossRefGoogle Scholar
  30. Mason R. O. (1986) Four Ethical Issues of the Information Age. MIS Quarterly 10(1):5–12CrossRefGoogle Scholar
  31. Mayo M. A., Marks L. J. (1990) An Empirical Investigation of a General Theory of Marketing Ethics. Journal of the Academy of Marketing Science 18(2):163–171CrossRefGoogle Scholar
  32. Mengüç B. (1998) Organizational Consequences, Marketing Ethics ad Saleforce Supervision: Further Empirical Evidence. Journal of Business Ethics 17(4):333–352CrossRefGoogle Scholar
  33. Moores T. T., Chang J. C. J. (2006) Ethical Decision Making in Software Piracy: Initial Development and Test of a Four-Component Model. MIS Quarterly 30(1):167–180Google Scholar
  34. Muncy J., Vitell S. J. (1992) Consumer Ethics: An Investigation of the Ethical Beliefs of the Final Consumer. Journal of Business Research 24(4):297–311CrossRefGoogle Scholar
  35. Murphy P. E., Laczniak G. R. (1981) Marketing Ethics: A Review with Implications For Managers, Educators and Researchers. In Enis B. M., Roering K. J. (eds). Review of Marketing. American Marketing Association, Chicago, IL, pp 251–266Google Scholar
  36. Pallister J., Nancarrow C., Brace I. (1999) Navigating the Righteous Course: A Quality Issue. International Journal of Market Research 41(3):327–343Google Scholar
  37. Peitz M., Waelbroeck P. (2006) Why the Music Industry may Gain from Free Downloading − The Role of Sampling. International Journal of Industrial Organization 24:907–913CrossRefGoogle Scholar
  38. Prentice-Dunn S., Rogers R. W. (1982) Effects of Public and Private Self-awareness on Deindividuation and Aggression. Journal of Personality and Social Psychology 43(3):503–513CrossRefGoogle Scholar
  39. Raymond, E. S.: 2000, ‚Homesteading the Noosphere’, in The Cathedral and the Bazaar: Musings on Linux and Open Source by an Accidental Revolutionary (O’Reilly and Associates, Sebastopol, CA), http://www.catb.org/∼esr/writings/cathedral-bazaar
  40. Rutter D. R. (1984) Looking and Seeing: The Role of Visual Communication in Social Interaction. Wiley, Chichester, UKGoogle Scholar
  41. Shneidman, J. and D. C. Parkes: 2003, ‚Rationality and Self-Interest in Peer to Peer Networks’ in F. Kaashoek and I. Stoica (eds.), Peer-to-Peer System II: Second International Workshop (IPTPS 2003, LNCS 2735, Springer), pp. 139–148Google Scholar
  42. Short J. A., William E., Christie B. (1976) The Social Psychology of Telecommunication. Wiley, Chichester, UKGoogle Scholar
  43. Simpson P. M., Banerjee D., Simpson C. L. (1994) Softlifting: A Model of Motivating Factors. Journal of Business Ethics 13(6):431–438CrossRefGoogle Scholar
  44. Siponen M., Vartianen T. (2004) Unauthorized Copying of Software and Levels of Moral Development: A Literature Analysis and Its Implications for Research and Practice. Information Systems Journal 14:387–407CrossRefGoogle Scholar
  45. Spitz, D. and S. Hunter: 2003, ‚The Social Construction of Napster’, MIT Sloan Working Paper No. 4445-03, http://ssrn.com/abstract=469283
  46. Stallman R. (1995) Why Software should be Free. In Johnson D. G., Nissenbaum H. (eds). Ethics and Social Values. Prentice Hall, NJ, pp. 190–200Google Scholar
  47. Strutton D., Vitell S. J., Pelton L. E. (1994) How Consumers May Justify Inappropriate Behavior in Market Settings: An Application on the Techniques of Neutralization. Journal of Business Research 30:253–260CrossRefGoogle Scholar
  48. Strutton D., Pelton L. E., Ferrell O. C. (1997) Ethical Behavior in Retail Settings: Is There a Generation Gap? Journal of Business Ethics 16:87–105CrossRefGoogle Scholar
  49. Sykes G. M., Matza D. (1957) Techniques of Neutralization: A Theory of Delinquency. American Sociological Review 22(6):664–670CrossRefGoogle Scholar
  50. Thong J. Y., Yap C. (1998) Testing an Ethical Decision-Making Theory: The Case of Softlifting. Journal of Management Information Systems 15(1):213–237Google Scholar
  51. Tiwana, A. and A. Bush: 2000, ‚Peer-to-Peer Valuation as a Mechanism for Reinforcing Active Learning in Virtual Communities: Actualizing Social Exchange Theory’, Proceedings of the 33rd Hawaii International Conference on System Sciences (CD-ROM), Hawaii, USAGoogle Scholar
  52. Trevino L. K. (1986) Ethical Decision Making in Organizations: A Person-Situation Interactionist Model. Academy of Management Review 11(3):601–617CrossRefGoogle Scholar
  53. Vitell S. J. (2003) Consumer Ethics Research: Review, Synthesis and Suggestions for the Future. Journal of Business Ethics 43(1/2):33–47CrossRefGoogle Scholar
  54. Vitell S. J., Davis D. L. (1990) Ethical Beliefs of MIS Professional: The Frequency and Opportunity for Unethical Behavior. Journal of Business Ethics 9(1):63–70CrossRefGoogle Scholar
  55. Vitell S. J., Ho F. N. (1997) Ethical Decision Making in Marketing: A Synthesis and Evaluation of Scales Measuring the Various Components of Decision Making in Ethical Situations. Journal of Business Ethics 16(7):699–717CrossRefGoogle Scholar
  56. Vitell S. J., Muncy J. (1992) Consumer Ethics: An Empirical Investigation of Factors Influencing Ethical Judgments of the Final Consumer. Journal of Business Ethics 11(8):585–597CrossRefGoogle Scholar
  57. Vitell S. J., Singhapakdi A., Thomas J. (2001) Consumer Ethics: An Application and Empirical Testing of the Hunt–Vitell Theory of Ethics. Journal of Consumer Marketing 18(2):153–178CrossRefGoogle Scholar
  58. Von Lohmann F. (2003) Peer-to-Peer File Sharing and Copyright Law: A Primer for Developers. In Kaashoek F., Stoica I. (eds). Peer-to-Peer System II: Second International Workshop. IPTPS 2003, LNCS 2735, Springer, pp. 108–117Google Scholar
  59. Zimbardo P. G. (1969) The Human Choice: Individuation, Reason and Order versus Deindividuation, Impulse and Chaos. In Arnold N. J., Levine D. (eds). Nebraska Symposium on Motivation. University of Nebraska Press, Lincoln, pp. 237–307Google Scholar

Copyright information

© Springer Science+Business Media B.V. 2007

Authors and Affiliations

  1. 1.Department of Business AdministrationSoochow UniversityTaipeiTaiwan
  2. 2.Product Marketing and Management DepartmentZyXEL Communications CorporationHsin-ChuTaiwan

Personalised recommendations