Neutralization Techniques: Means to Diffuse Responsibility

  • Sanjeev P. Sahni
  • Indranath Gupta


Even when individuals are aware of their illegal actions, they continue to indulge in piracy by taking umbrage under “moral holiday” and put forth various techniques to “neutralize” their guilt and justify their actions. It is not just lack of awareness of the consequences; instead, the chapter looks at general neutralization of the guilt when committing the act of piracy. The chapter clarifies the general beliefs and norms in connection with different theories that are used to explain and justify the act of piracy.


Neutralization Techniques of neutralization Denial of responsibility 


  1. Bagchi, K., Kirs, P., & Creveny, R. (2006). Global software piracy: Can economic factors alone explain the trend? Communications of the ACM, 49(6), 70–75.Google Scholar
  2. Bossler, A. M., & Burruss, G. W. (2011). The general theory of crime and computer hacking: Low self-control hackers? In T. J. Holt & B. H. Schell (Eds.),. 2011 Corporate hacking and technology-driven crime: Social dynamics and implications (pp. 38–67). Hershey: Information Science Reference.Google Scholar
  3. Coleman, J. W. (1994). The criminal elite. New York: St. Martin’s Press.Google Scholar
  4. Cromwell, P., & Thurman, Q. (2003). The devil made me do it: Use of neutralizations by shoplifters. Deviant Behavior, 24(6), 535–550.Google Scholar
  5. Foster, D. R., (2004). Can the general theory of crime account for computer offenders: Testing low self-control as a predictor of computer crime offenders. Masters thesis. University of Maryland Gemignani, M., 1989. Viruses and Criminal Law. Communications of the ACM, 32(6), 669–671.Google Scholar
  6. Gopal, R. D., Sanders, G. L., Bhattacharjee, S., Agrawal, M., & Wagner, S. C. (2004). A behavioral model of digital music piracy. Journal of Organizational Computing and Electronic Commerce, 14(2), 89–105.Google Scholar
  7. Harris, L. C., & Dumas, A. (2009). Online consumer misbehaviour: An application of neutralization theory. Marketing Theory, 9(4), 379–402.Google Scholar
  8. Higgins, G. E., & Makin, D. A. (2004a). Does social learning theory condition the effects of low self-control on college students’ software piracy? Journal of Economic Crime Management, 2(2), 1–22.Google Scholar
  9. Higgins, G. E., & Makin, D. A. (2004b). Self-control, deviant peers, and software piracy. Psychological Reports, 95, 921–931.Google Scholar
  10. Higgins, G. E., Wilson, A. L., & Fell, B. D. (2005). An application of deterrence theory to software piracy. Journal of Criminal Justice and Popular Culture, 12(3), 166–184.Google Scholar
  11. Higgins, G. E., Wolfe, S. E., & Marcum, C. D. (2008). Digital piracy: An examination of three measurements of self-control. Deviant Behavior, 29(5), 440–460.Google Scholar
  12. Higgins, G. E., Mahoney, M., & Ricketts, M. L. (2009). Nonsocial reinforcement of the nonmedical use of prescription drugs: A partial test of social learning and self-control theories. Journal of Drug Issues, 39(4), 949–963.Google Scholar
  13. Hinduja, S. (2007). Neutralization theory and online software piracy: An empirical analysis. Ethics and Information Technology, 9(3), 187–204.Google Scholar
  14. Ingram, J. R., & Hinduja, S. (2008). Neutralising music piracy: An empirical examination. Deviant Behaviour, 29(4), 334–366.Google Scholar
  15. Klockars, C. B. (1974). The professional fence. New York: The Free Press.Google Scholar
  16. Konstantakis, N. I., Palaigeorgiou, G. E., Siozos, P. D., & Tsoukalas, I. A. (2010). What do computer science students think about software piracy? Behaviour & Information Technology, 29(3), 277–285.Google Scholar
  17. Marcum, C. D., Higgins, G. E., Wolfe, S. E., & Ricketts, M. L. (2011). Examining the intersection of self-control, peer association and neutralization in explaining digital piracy. Western Criminology Review, 12(3), 60.Google Scholar
  18. Marron, D. B., & Steel, D. G. (2000). Which countries protect intellectual property. Economic Inquiry, 38(2), 159–174.Google Scholar
  19. Maruna, S., & Copes, H. (2005). What have we learned from five decades of neutralization research? Crime and Justice, 32, 221–320.Google Scholar
  20. Matza, D. (1964). Delinquency and drift. New Brunswick: Transaction.Google Scholar
  21. McCorkle, L. W., & Korn, R. (1954). Resocialization within walls. The Annals of the American Academy of Political and Social Science, 293(1), 88–98.Google Scholar
  22. Moon, B., McCluskey, J. D., & McCluskey, C. P. (2010). A general theory of crime and computer crime: An empirical test. Journal of Criminal Justice, 38, 767–772.Google Scholar
  23. Moore, R., & McMullan, E. C. (2009). Neutralizations and rationalizations of digital piracy: A qualitative analysis of university students. International Journal of Cyber Criminology, 3(1), 441–451.Google Scholar
  24. Moores, T. T. (2008). An analysis of the impact of economic wealth and national culture on the rise and fall of software piracy rates. Journal of Business Ethics, 81(1), 39–51.Google Scholar
  25. Morris, R. G. (2011). Computer hacking and the techniques of neutralization: An empirical assessment. In T. J. Holt & B. H. Schell (Eds.), Corporate hacking and technology-driven crime: Social dynamics and implications (pp. 1–17). Hershey: Information Science Reference.Google Scholar
  26. Morris, R. G., & Higgins, G. E. (2009). Neutralizing potential and self-reported digital piracy: A multitheoretical exploration among college undergraduates. Criminal Justice Review, 34(2), 173–195.Google Scholar
  27. Orwell, G. (1946). Dickens, Dali & others. New York: Harcourt, Brace & World.Google Scholar
  28. Sheehan, B., Tsao, J., & Yang, S. (2010). Motivations for gratifications of digital music piracy among college students. Atlantic Journal of Communication, 18(5), 241–258.Google Scholar
  29. Skinner, W. F., & Fream, A. M. (1997). A social learning theory analysis of computer crime among college students. Journal of Research in Crime and Delinquency, 34(4), 495–518.Google Scholar
  30. Smallridge, J. L., & Roberts, J. R. (2013). Crime specific neutralizations: An empirical examination of four types of digital piracy. International Journal of Cyber Criminology, 7(2), 125–140.Google Scholar
  31. Sutherland, E. H. (1955). Principles of criminology. Philadelphia: Lippincott.Google Scholar
  32. Swinyard, W. R., Rinne, H., & Kau, A. K. (1990). The morality of software piracy: A cross-cultural analysis. Journal of Business Ethics, 9(8), 655–664.Google Scholar
  33. Sykes, G., & Matza, D. (1957). Techniques of neutralization: A theory of delinquency. American Sociological Review, 22(6), 664–670.Google Scholar
  34. Ulsperger, J. S., Hodges, S. H., & Paul, J. (2010). Pirates on the plank: Neutralization theory and the criminal downloading of music among generation Y in the era of late modernity. Journal of Criminal Justice and Popular Culture, 17(1), 124–151.Google Scholar
  35. Walls, W. D. (2008). Cross-country analysis of movie piracy. Applied Economics, 40(5), 625–632.Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  • Sanjeev P. Sahni
    • 1
  • Indranath Gupta
    • 2
  1. 1.Jindal Institute of Behavioural SciencesOP Jindal Global UniversitySonipatIndia
  2. 2.Jindal Global Law SchoolOP Jindal Global UniversitySonipatIndia

Personalised recommendations