Abstract
Intellectual property refers to the ownership and rights to use creative work that result from intellectual activity. Although there are four recognized categories of intellectual property (patents, trademarks, trade secrets, and copyright), copyright violations have garnered much attention of late because of the copying of software, movies, videogames, and music that deny publishers and authors' economic returns on their property. In order to understand this growing form of theft and the costs and consequences of such actions, the current research has three foci. First, the types of activities that fall under the rubric of intellectual property are identified and defined. Second, the causes or theoretical arguments developed to understand intellectual property theft are identified and discussed. Third, prevention techniques are examined in order to understand what is currently being done to control and prevent the misuse and theft of intellectual property. A research agenda outlining data collection efforts is also presented.
Similar content being viewed by others
References
Adams, J.S. (1963). “Toward an Understanding of Inequity,” Journal of Abnormal and Social Psychology, 67, 422–436.
Ajzen, I. (1991). “The Theory of Behavior,” Organizational Behavior and Human Decision Processes, 50, 179–211.
Ajzen, I., and Fishbein, M. (1980). Understanding Attitudes and Predicting Social Behaviour. Englewood Cliffs, NJ: Prentice Hall.
Akers, R.L. (1985). Deviant Behavior: A Social Learning Approach (3rd ed.). Belmont, CA: Wadsworth.
Akers, R.L. (1998). Social Learning and Social Structure: A General Theory of Crime and Deviance. Boston, MA: Northeastern University Press.
Akers, R.L. (2000). Criminological Theories: Introduction, Evaluation, and Application (3rd ed.). Los Angeles, CA: Roxbury Publishing Company.
Akers, R.L., Krohn, M.D., Lanza-Kaduce, L., and Radosevich, M. (1979). “Social Learning and Deviant Behavior: A Specific Test of a General Theory,” American Sociological Review, 44, 635–655.
Beccaria, C. (1963). On Crimes and Punishment. New York: MacMillan Publishing.
Bentham, J. (1967). A Fragment on Government and an Introduction to the Principal of Morals and Legislation. Oxford: Basil Blackwell.
Burgess, R.L., and Akers, R.L. (1966). “A Different Association-Reinforcement Theory of Criminal Behaviors.” Social Problems, 14, 128–147.
Carruthers, B.G., and Ariovich, L. (2004). “The Sociology of Property Sights. Annual Review of Sociology, 30, 23–46.
Cheng, H.K., Sims, R.R., and Teegen, H. (1997). “To Purchase or to Pirate Software: An Empirical Study,” Journal of Management Information Systems, 13, 49–60.
Christensen, A.L., and Eining, M.M. (1991). “Factors Influencing Software Piracy: Implication for Accountants.” Journal of Information Systems, Spring, 67–80.
Cohen, L.E., and Felson, M. (1979). “Social Change and Crime Rate Trends: A Routine Activities Approach.” American Sociological Review, 44, 588–608.
Cohen, E., and Cornwell, L. (1989). “A Question of Ethics: Developing Information Systems Ethics. Journal of Business Ethics, 8, 431–437.
Davis, J.R., and Welton, R.E. (1991). “Professional Ethics: Business Students Perceptions.” Journal of Business Ethics, 10, 451–463.
Dusollier, S. (2003). “Open Source and Copyleft: Authorship Reconsidered?” Columbia Journal of Law and the Arts, 26, 281–296.
Eckhoff, T. (1974). Justice: Its Determinants in Social Interaction. Rotterdam, Netherlands: Rotterdam University Press.
Eining, M.M., and Christensen, A.L. (1991). “A Psycho-Social Model of Software Piracy: The Development and Test of a Model,” In R.M. Dejoie, G.C. Fowler, and D.B. Paradice (Eds.), Ethical Issues in Information Systems (pp. 182–188). Boston, MA: Boyd and Fraser.
Endeshaw, A. (2002). “The Paradox of Intellectual Property Lawmaking in the New Millennium: Universal Templates as Terms of Surrender for the Non-Industrial Nations; Piracy as an Offshoot,” Cardozo Journal of International and Comparative Law, 10, 47–77.
Gasaway, L.N. (2003). “America's Cultural Record: A Thing of the Past?” Houston Law Review, 40, 643–671.
Gibbs, J. (1975). Crime, Punishment, and Deterrence. New York: Elsevier.
Gilligan, C. (1982). In a Different Voice: Psychological Theory and Women's Development. Cambridge, MA: Harvard University Press.
Glass, R.S., and Wood, W. A. (1996). “Situational Determinants of Software Piracy: An Equity Theory Perspective,” Journal of Business Ethics, 15, 1189–1198.
Gopal, R.D., and Sanders, G.L. (1997). “Preventive and Deterrent Controls for Software Piracy,” Journal of Management Information Systems, 13, 29–47.
Gottfredson, M., and Hirschi, T. (1990). A General Theory of Crime. Palo Alto, CA: Stanford University Press.
Hagan, J., and Kay, F. (1990). “Gender and Delinquency in White-Collar Families: A Power-Control Perspective,” Crime and Delinquency, 36, 391–407.
Harrington, S. (1989). “Why People Copy Software and Create Computer Viruses: Individual Characteristics or Situational Factors,” Information Resource Management Journal, 28–37.
Hinduja, S. (2001). “Correlates of Internet Software Piracy,” Journal of Contemporary Criminal Justice, 17,369–382.
Hollinger, R.C. (1993). “Crime by Computer: Correlates of Software Piracy and Unauthorized Account Access,” Security Journal, 2, 2–12.
Hollinger, R.C., and Lanza-Kaduce, L. (1988). “The Process of Criminalization: The Case of Computer Crime Laws,” Criminology, 26, 101–126.
IFPI. (2003). The Record Industry Commercial Piracy Report, 2003. London: IFPI.
Jones, T.M. (1991). “Ethical Decision Making by Individuals in Organizations: An Issue-Contingent Model,” Academy of Management Review, 16, 366–395.
Lessig, L. (2001). The Future of Ideas: The Fate of the Commons in a Connected World. New York: Random House.
Luckenbill, D.F., and Miller, S.L. (1998). “Defending Intellectual Property: State Efforts to Protect Creative Works,” Justice Quarterly, 15, 93–120.
Maher, M.K., and Thomson, J.M. (2002). “Intellectual Property Crimes,” American Criminal Law Review, 39, 763–816.
Moohr, G.S. (2003). “The Crime of Copyright Infringement: An Inquiry Based on Morality, Harm, and Criminal Theory,” Bos ton University Law Review, 83, 731–783.
MPA. (2003). 2003 Piracy Fact Sheets: US Overview. MPA Worldwide Market Research.
Nagin, D., and Klepper, S. (1989). “Tax Compliance and Perceptions of the Risks of Detection and Criminal Prosecution,” Law and Society Review, 23, 209–240.
Nagin, D., and Paternoster, R. (1993). “Enduring Individual Differences and Rational Choice Theories of Crime,” Law and Society Review, 27, 467–496.
Oz, E. (1990). “The Attitude of Managers-To-Be toward Software Piracy,” OR/MS Today, August, 24–26.
Parker, D.B. (1976). Crime by Computer. New York: Charles Scribner and Sons.
Parry, W. (2003). The United States and International Copyright Law: From Berne to Eldred. Houston Law Review, 40, 749–762.
Piquero, A., and Tibbetts, S. (1996). “Specifying the Direct and Indirect Effects of Low Self-Control and Situational Factors in Offenders' Decision Making: Toward a More Complete Model of Rational Offending,” Justice Quarterly, 13, 481–510.
Poltorak, A.I., and Lerner, P.J. (2002). Essentials of Intellectual Property. New York: John Wiley and Sons, Inc.
Reid, R.A., Thompson, J.K., and Logsdon, J.M. (1992). “Knowledge and Attitudes of Management Students toward Software Piracy,” Journal of Computer Information Systems, 33, 46–51.
Reiss, Jr., A. J. (1984). “Selecting Strategies of Social Control over Organizational Life,” In K. Hawkins and J.M. Thomas (Eds.), Enforcing Regulation (pp. 23–35). Boston, MA: Kluwer-Nijoff Publishing.
Ronkainen, I.A., and Guerrero-Cusumano, J. (2001). “Correlates of Intellectual Property Violations,” Multinational Business Review, 9, 59–65.
Sacco, VF., and Zureik, E. (1990). “Correlates of Computer Misuse: Data from a Self-Reporting Sample,” Behaviour and Information Technology, 9, 353–369.
Seale, D.A., Polakowski, M., and Schneider, S. (1998). “It's Not Really Theft!: Personal and Workplace Ethics That Enable Software Piracy,” Behaviour and Information Technology, 17, 27–40.
Shim, J.P., and Taylor, G.S. (1989). “Practicing Manager's Perception/Attitude toward Illegal Software Copying,” OR/MS Today, 16, 30–33.
Simpson, S.S., and Piquero, N.L. (2002). “Low Self-Control, Organizational Offending, and Cotporate Crime,” Law and Society Review, 36, 509–547.
Simpson, P.M., Banerjee, D., and Simpson, Jr., C.L. (1994). “Softlifting: A Model of Motivating Factors,” Journal of Business Ethics, 13, 431–438.
Sims, R.R., Cheng, H.K., and Teegen, H. (1996). “Toward a Profile of Student Software Pirates,” Journal of Business Ethics, 15, 839–849.
Skinner, W., and Fream, A.M. (1997). “A Social Learning Analysis of Computer Crime among College Students,” Journal of Research in Crime and Delinquency, 34, 495–522.
Solomon, S.L., and O'Brien, J.A. (1990). “The Effect of Demographic Factors on Attitudes toward Software Piracy,” Journal of Information Systems, 30, 40–46.
Stim, R. (2000). Intellectual Property: Patents, Trademarks, and Copyrights (2nd ed.). Albany, NY: West Thomas Learning.
Story, A. (2003). “Burn Berne: Why the Leading International Copyright Convention Must Be Repealed,” Houston Law Review, 40, 763–801.
Sutherland, E. (1947). Principles of Criminology. Philadelphia, PA: Lippincott.
Swinyard, W.R., Rinne, H., and Keng Kau, A. (1990). “The Morality of Software Piracy: A Cross-Cultural Analysis,” Journal of Business Ethics, 9, 655–664.
Taylor, G.S., and Shim, J.P. (1993). “A Comparative Examination of Attitudes toward Software Piracy among Business Professors and Executives,” Human Relations, 46, 419–433.
Thong, J.Y.L., and Yap, C. (1998). “Testing an Ethical Decision-Making Theory: The Case of Softlifting,” Journal of Management Information Systems, 15, 213–237.
Tsalikis, J., and Ortiz-Buonafina, M. (1990). “Ethical Beliefs' Differences of Males and Females,” Journal of Business Ethics, 9, 509–517.
USTR. (2004). 003 Special 301 Report. Washington, D.C.: Office of the U.S. Trade Representative.
Volokh, E. (2003). “Freedom of Speech and Intellectual Property: Some Thoughts after Eldred, 44 Liquormart, and Bartnicki,” Houston Law Review, 40, 697–748.
WIPO (2001) WIPO Intellectual Property Handbook: Policy, Law, and Use. Geneva, Switzerland. WIPO Publication. No. 489(E).
Yen, A.C. (2003). “Eldred, the First Amendment, and Aggressive Copyright Claims,” Houston Law Review, 40, 673–695.
Zeithaml, V. (1988). “Consumer Perceptions of Price, Quality, and Value: A Means-End Model and Synthesis of Evidence.” Journal of Marketing, 52, 2–22.
Rights and permissions
About this article
Cite this article
Piquero, N.L. Causes and Prevention of Intellectual Property Crime. Trends Organ Crim 8, 40–61 (2005). https://doi.org/10.1007/s12117-005-1013-0
Issue Date:
DOI: https://doi.org/10.1007/s12117-005-1013-0