Skip to main content

Advertisement

Log in

Causes and Prevention of Intellectual Property Crime

  • Studies
  • Published:
Trends in Organized Crime Aims and scope Submit manuscript

Abstract

Intellectual property refers to the ownership and rights to use creative work that result from intellectual activity. Although there are four recognized categories of intellectual property (patents, trademarks, trade secrets, and copyright), copyright violations have garnered much attention of late because of the copying of software, movies, videogames, and music that deny publishers and authors' economic returns on their property. In order to understand this growing form of theft and the costs and consequences of such actions, the current research has three foci. First, the types of activities that fall under the rubric of intellectual property are identified and defined. Second, the causes or theoretical arguments developed to understand intellectual property theft are identified and discussed. Third, prevention techniques are examined in order to understand what is currently being done to control and prevent the misuse and theft of intellectual property. A research agenda outlining data collection efforts is also presented.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  • Adams, J.S. (1963). “Toward an Understanding of Inequity,” Journal of Abnormal and Social Psychology, 67, 422–436.

    Article  Google Scholar 

  • Ajzen, I. (1991). “The Theory of Behavior,” Organizational Behavior and Human Decision Processes, 50, 179–211.

    Article  Google Scholar 

  • Ajzen, I., and Fishbein, M. (1980). Understanding Attitudes and Predicting Social Behaviour. Englewood Cliffs, NJ: Prentice Hall.

    Google Scholar 

  • Akers, R.L. (1985). Deviant Behavior: A Social Learning Approach (3rd ed.). Belmont, CA: Wadsworth.

    Google Scholar 

  • Akers, R.L. (1998). Social Learning and Social Structure: A General Theory of Crime and Deviance. Boston, MA: Northeastern University Press.

    Google Scholar 

  • Akers, R.L. (2000). Criminological Theories: Introduction, Evaluation, and Application (3rd ed.). Los Angeles, CA: Roxbury Publishing Company.

    Google Scholar 

  • Akers, R.L., Krohn, M.D., Lanza-Kaduce, L., and Radosevich, M. (1979). “Social Learning and Deviant Behavior: A Specific Test of a General Theory,” American Sociological Review, 44, 635–655.

    Article  Google Scholar 

  • Beccaria, C. (1963). On Crimes and Punishment. New York: MacMillan Publishing.

    Google Scholar 

  • Bentham, J. (1967). A Fragment on Government and an Introduction to the Principal of Morals and Legislation. Oxford: Basil Blackwell.

    Google Scholar 

  • Burgess, R.L., and Akers, R.L. (1966). “A Different Association-Reinforcement Theory of Criminal Behaviors.” Social Problems, 14, 128–147.

    Google Scholar 

  • Carruthers, B.G., and Ariovich, L. (2004). “The Sociology of Property Sights. Annual Review of Sociology, 30, 23–46.

    Article  Google Scholar 

  • Cheng, H.K., Sims, R.R., and Teegen, H. (1997). “To Purchase or to Pirate Software: An Empirical Study,” Journal of Management Information Systems, 13, 49–60.

    Google Scholar 

  • Christensen, A.L., and Eining, M.M. (1991). “Factors Influencing Software Piracy: Implication for Accountants.” Journal of Information Systems, Spring, 67–80.

  • Cohen, L.E., and Felson, M. (1979). “Social Change and Crime Rate Trends: A Routine Activities Approach.” American Sociological Review, 44, 588–608.

    Article  Google Scholar 

  • Cohen, E., and Cornwell, L. (1989). “A Question of Ethics: Developing Information Systems Ethics. Journal of Business Ethics, 8, 431–437.

    Article  Google Scholar 

  • Davis, J.R., and Welton, R.E. (1991). “Professional Ethics: Business Students Perceptions.” Journal of Business Ethics, 10, 451–463.

    Article  Google Scholar 

  • Dusollier, S. (2003). “Open Source and Copyleft: Authorship Reconsidered?” Columbia Journal of Law and the Arts, 26, 281–296.

    Google Scholar 

  • Eckhoff, T. (1974). Justice: Its Determinants in Social Interaction. Rotterdam, Netherlands: Rotterdam University Press.

    Google Scholar 

  • Eining, M.M., and Christensen, A.L. (1991). “A Psycho-Social Model of Software Piracy: The Development and Test of a Model,” In R.M. Dejoie, G.C. Fowler, and D.B. Paradice (Eds.), Ethical Issues in Information Systems (pp. 182–188). Boston, MA: Boyd and Fraser.

    Google Scholar 

  • Endeshaw, A. (2002). “The Paradox of Intellectual Property Lawmaking in the New Millennium: Universal Templates as Terms of Surrender for the Non-Industrial Nations; Piracy as an Offshoot,” Cardozo Journal of International and Comparative Law, 10, 47–77.

    Google Scholar 

  • Gasaway, L.N. (2003). “America's Cultural Record: A Thing of the Past?” Houston Law Review, 40, 643–671.

    Google Scholar 

  • Gibbs, J. (1975). Crime, Punishment, and Deterrence. New York: Elsevier.

    Google Scholar 

  • Gilligan, C. (1982). In a Different Voice: Psychological Theory and Women's Development. Cambridge, MA: Harvard University Press.

    Google Scholar 

  • Glass, R.S., and Wood, W. A. (1996). “Situational Determinants of Software Piracy: An Equity Theory Perspective,” Journal of Business Ethics, 15, 1189–1198.

    Article  Google Scholar 

  • Gopal, R.D., and Sanders, G.L. (1997). “Preventive and Deterrent Controls for Software Piracy,” Journal of Management Information Systems, 13, 29–47.

    Google Scholar 

  • Gottfredson, M., and Hirschi, T. (1990). A General Theory of Crime. Palo Alto, CA: Stanford University Press.

    Google Scholar 

  • Hagan, J., and Kay, F. (1990). “Gender and Delinquency in White-Collar Families: A Power-Control Perspective,” Crime and Delinquency, 36, 391–407.

    Article  Google Scholar 

  • Harrington, S. (1989). “Why People Copy Software and Create Computer Viruses: Individual Characteristics or Situational Factors,” Information Resource Management Journal, 28–37.

  • Hinduja, S. (2001). “Correlates of Internet Software Piracy,” Journal of Contemporary Criminal Justice, 17,369–382.

    Article  Google Scholar 

  • Hollinger, R.C. (1993). “Crime by Computer: Correlates of Software Piracy and Unauthorized Account Access,” Security Journal, 2, 2–12.

    Google Scholar 

  • Hollinger, R.C., and Lanza-Kaduce, L. (1988). “The Process of Criminalization: The Case of Computer Crime Laws,” Criminology, 26, 101–126.

    Article  Google Scholar 

  • IFPI. (2003). The Record Industry Commercial Piracy Report, 2003. London: IFPI.

    Google Scholar 

  • Jones, T.M. (1991). “Ethical Decision Making by Individuals in Organizations: An Issue-Contingent Model,” Academy of Management Review, 16, 366–395.

    Article  Google Scholar 

  • Lessig, L. (2001). The Future of Ideas: The Fate of the Commons in a Connected World. New York: Random House.

    Google Scholar 

  • Luckenbill, D.F., and Miller, S.L. (1998). “Defending Intellectual Property: State Efforts to Protect Creative Works,” Justice Quarterly, 15, 93–120.

    Article  Google Scholar 

  • Maher, M.K., and Thomson, J.M. (2002). “Intellectual Property Crimes,” American Criminal Law Review, 39, 763–816.

    Google Scholar 

  • Moohr, G.S. (2003). “The Crime of Copyright Infringement: An Inquiry Based on Morality, Harm, and Criminal Theory,” Bos ton University Law Review, 83, 731–783.

    Google Scholar 

  • MPA. (2003). 2003 Piracy Fact Sheets: US Overview. MPA Worldwide Market Research.

  • Nagin, D., and Klepper, S. (1989). “Tax Compliance and Perceptions of the Risks of Detection and Criminal Prosecution,” Law and Society Review, 23, 209–240.

    Article  Google Scholar 

  • Nagin, D., and Paternoster, R. (1993). “Enduring Individual Differences and Rational Choice Theories of Crime,” Law and Society Review, 27, 467–496.

    Article  Google Scholar 

  • Oz, E. (1990). “The Attitude of Managers-To-Be toward Software Piracy,” OR/MS Today, August, 24–26.

  • Parker, D.B. (1976). Crime by Computer. New York: Charles Scribner and Sons.

    Google Scholar 

  • Parry, W. (2003). The United States and International Copyright Law: From Berne to Eldred. Houston Law Review, 40, 749–762.

    Google Scholar 

  • Piquero, A., and Tibbetts, S. (1996). “Specifying the Direct and Indirect Effects of Low Self-Control and Situational Factors in Offenders' Decision Making: Toward a More Complete Model of Rational Offending,” Justice Quarterly, 13, 481–510.

    Article  Google Scholar 

  • Poltorak, A.I., and Lerner, P.J. (2002). Essentials of Intellectual Property. New York: John Wiley and Sons, Inc.

    Google Scholar 

  • Reid, R.A., Thompson, J.K., and Logsdon, J.M. (1992). “Knowledge and Attitudes of Management Students toward Software Piracy,” Journal of Computer Information Systems, 33, 46–51.

    Google Scholar 

  • Reiss, Jr., A. J. (1984). “Selecting Strategies of Social Control over Organizational Life,” In K. Hawkins and J.M. Thomas (Eds.), Enforcing Regulation (pp. 23–35). Boston, MA: Kluwer-Nijoff Publishing.

    Google Scholar 

  • Ronkainen, I.A., and Guerrero-Cusumano, J. (2001). “Correlates of Intellectual Property Violations,” Multinational Business Review, 9, 59–65.

    Google Scholar 

  • Sacco, VF., and Zureik, E. (1990). “Correlates of Computer Misuse: Data from a Self-Reporting Sample,” Behaviour and Information Technology, 9, 353–369.

    Article  Google Scholar 

  • Seale, D.A., Polakowski, M., and Schneider, S. (1998). “It's Not Really Theft!: Personal and Workplace Ethics That Enable Software Piracy,” Behaviour and Information Technology, 17, 27–40.

    Article  Google Scholar 

  • Shim, J.P., and Taylor, G.S. (1989). “Practicing Manager's Perception/Attitude toward Illegal Software Copying,” OR/MS Today, 16, 30–33.

    Google Scholar 

  • Simpson, S.S., and Piquero, N.L. (2002). “Low Self-Control, Organizational Offending, and Cotporate Crime,” Law and Society Review, 36, 509–547.

    Article  Google Scholar 

  • Simpson, P.M., Banerjee, D., and Simpson, Jr., C.L. (1994). “Softlifting: A Model of Motivating Factors,” Journal of Business Ethics, 13, 431–438.

    Article  Google Scholar 

  • Sims, R.R., Cheng, H.K., and Teegen, H. (1996). “Toward a Profile of Student Software Pirates,” Journal of Business Ethics, 15, 839–849.

    Article  Google Scholar 

  • Skinner, W., and Fream, A.M. (1997). “A Social Learning Analysis of Computer Crime among College Students,” Journal of Research in Crime and Delinquency, 34, 495–522.

    Article  Google Scholar 

  • Solomon, S.L., and O'Brien, J.A. (1990). “The Effect of Demographic Factors on Attitudes toward Software Piracy,” Journal of Information Systems, 30, 40–46.

    Google Scholar 

  • Stim, R. (2000). Intellectual Property: Patents, Trademarks, and Copyrights (2nd ed.). Albany, NY: West Thomas Learning.

    Google Scholar 

  • Story, A. (2003). “Burn Berne: Why the Leading International Copyright Convention Must Be Repealed,” Houston Law Review, 40, 763–801.

    Google Scholar 

  • Sutherland, E. (1947). Principles of Criminology. Philadelphia, PA: Lippincott.

    Google Scholar 

  • Swinyard, W.R., Rinne, H., and Keng Kau, A. (1990). “The Morality of Software Piracy: A Cross-Cultural Analysis,” Journal of Business Ethics, 9, 655–664.

    Article  Google Scholar 

  • Taylor, G.S., and Shim, J.P. (1993). “A Comparative Examination of Attitudes toward Software Piracy among Business Professors and Executives,” Human Relations, 46, 419–433.

    Article  Google Scholar 

  • Thong, J.Y.L., and Yap, C. (1998). “Testing an Ethical Decision-Making Theory: The Case of Softlifting,” Journal of Management Information Systems, 15, 213–237.

    Google Scholar 

  • Tsalikis, J., and Ortiz-Buonafina, M. (1990). “Ethical Beliefs' Differences of Males and Females,” Journal of Business Ethics, 9, 509–517.

    Article  Google Scholar 

  • USTR. (2004). 003 Special 301 Report. Washington, D.C.: Office of the U.S. Trade Representative.

    Google Scholar 

  • Volokh, E. (2003). “Freedom of Speech and Intellectual Property: Some Thoughts after Eldred, 44 Liquormart, and Bartnicki,” Houston Law Review, 40, 697–748.

    Google Scholar 

  • WIPO (2001) WIPO Intellectual Property Handbook: Policy, Law, and Use. Geneva, Switzerland. WIPO Publication. No. 489(E).

    Google Scholar 

  • Yen, A.C. (2003). “Eldred, the First Amendment, and Aggressive Copyright Claims,” Houston Law Review, 40, 673–695.

    Google Scholar 

  • Zeithaml, V. (1988). “Consumer Perceptions of Price, Quality, and Value: A Means-End Model and Synthesis of Evidence.” Journal of Marketing, 52, 2–22.

    Article  Google Scholar 

Download references

Authors

Rights and permissions

Reprints and permissions

About this article

Cite this article

Piquero, N.L. Causes and Prevention of Intellectual Property Crime. Trends Organ Crim 8, 40–61 (2005). https://doi.org/10.1007/s12117-005-1013-0

Download citation

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12117-005-1013-0

Keywords

Navigation