Skip to main content
Top
Published in: Journal of Business Ethics 3/2017

28-07-2015

One Sail Fits All? A Psychographic Segmentation of Digital Pirates

Authors: Charlotte Emily De Corte, Patrick Van Kenhove

Published in: Journal of Business Ethics | Issue 3/2017

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

This paper focuses on segmenting digital movie and TV series pirates and on investigating the effectiveness of piracy-combatting measures i.e., legal and educational strategies, in light of these segments. To address these research objectives, two online studies were conducted. First, 1277 valid responses were gathered with an online survey. Four pirate segments were found based on differing combinations of attitude toward piracy, ethical evaluation of piracy and feelings of guilt. The anti-pirate, conflicted pirate, cavalier pirate, and die-hard pirate can be placed on a continuum of increasing pirating frequency, subjective norm, pirating self-efficacy, habit, and decreasing in perceived harm, respectively. The segments also differ in deontological and teleological orientations. Second, in an experimental mixed design, we find that the educational strategy is more effective than the legal strategy in lowering pirating intentions for the conflicted and cavalier pirate. However, both strategies fail at lowering intentions of the die-hard pirate, although perceived harm and perceived impunity were significantly influenced. These findings offer a more profound understanding of pirate segments and how they react differently to piracy-combatting measures. As a result, better strategies can be developed to control digital piracy.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Appendix
Available only for authorised users
Footnotes
1
Involvement of minors Minors below age 16 were involved in both studies 1 and 2. The ethical protocol of the authors’ university with respect to scientific research involving minors states that research including minors may be conducted only if the involvement of minors is relevant to the research issue and only on the conditions that (a) the stress imposed on the minor is minimal, (b) informed consent is given by either the minor’s parents or legal guardian or, if the research activities take place at or via the minor’s educational institution or another entity with which the minor is affiliated, that institution grants written permission for participation in the study, and (c) the minor participates willingly and has the freedom to withdraw from the study at any time. As the study wishes to investigate whether age differences exist in piracy behavior, the inclusion of minors is relevant to the research issue. This study complies with all guidelines imposed by the ethical protocol and has been approved by the university’s ethical committee. The authors were advised to enclose a message at the end of the questionnaire informing the minor about the illegal nature of torrent downloading, the dangers and risks involved, and appropriate online behavior in general. The message concluded by stating that, if the minor had any questions regarding the content of the questionnaire or online behavior in general, he or she should contact the researchers or talk to parents, teachers, or counselors.
 
Literature
go back to reference Ajzen, I. (1989). Attitude structure and behavior. Hillsdale, NJ: Lawrence Erlbaum Associates. Ajzen, I. (1989). Attitude structure and behavior. Hillsdale, NJ: Lawrence Erlbaum Associates.
go back to reference Ajzen, I. (1991). The theory of planned behavior. Organizational Behavior and Human Decision Processes, 50, 179–211.CrossRef Ajzen, I. (1991). The theory of planned behavior. Organizational Behavior and Human Decision Processes, 50, 179–211.CrossRef
go back to reference Al-Rafee, S., & Cronan, T. P. (2006). Digital piracy: Factors that influence attitude toward behavior. Journal of Business Ethics, 63(3), 237–259.CrossRef Al-Rafee, S., & Cronan, T. P. (2006). Digital piracy: Factors that influence attitude toward behavior. Journal of Business Ethics, 63(3), 237–259.CrossRef
go back to reference Altschuller, S., & Benbunan-Fich, R. (2009). Is music downloading the new prohibition? What students reveal through an ethical dilemma. Ethics and Information Technology, 11(1), 49–56.CrossRef Altschuller, S., & Benbunan-Fich, R. (2009). Is music downloading the new prohibition? What students reveal through an ethical dilemma. Ethics and Information Technology, 11(1), 49–56.CrossRef
go back to reference Ang, S. H., Cheng, P. S., Lim, E. A. C., & Tambyah, S. K. (2001). Spot the difference: Consumer responses towards counterfeits. Journal of Consumer Marketing, 18(3), 219–235.CrossRef Ang, S. H., Cheng, P. S., Lim, E. A. C., & Tambyah, S. K. (2001). Spot the difference: Consumer responses towards counterfeits. Journal of Consumer Marketing, 18(3), 219–235.CrossRef
go back to reference Antonetti, P., & Maklan, S. (2014). Feelings that make a difference: How guilt and pride convince consumers of the effectiveness of sustainable consumption choices. Journal of Business Ethics, 124(1), 117–134.CrossRef Antonetti, P., & Maklan, S. (2014). Feelings that make a difference: How guilt and pride convince consumers of the effectiveness of sustainable consumption choices. Journal of Business Ethics, 124(1), 117–134.CrossRef
go back to reference Bandura, A. (1986). Social foundations of thought and action. Engelwood Cliffs, NJ: Prentice Hall. Bandura, A. (1986). Social foundations of thought and action. Engelwood Cliffs, NJ: Prentice Hall.
go back to reference Bandura, A. (1991). Social cognitive theory of self-regulation. Organizational Behavior and Human Decision Processes, 50(2), 248–287.CrossRef Bandura, A. (1991). Social cognitive theory of self-regulation. Organizational Behavior and Human Decision Processes, 50(2), 248–287.CrossRef
go back to reference Bandura, A. (1997). Self-efficacy: The exercise of control. New York: W.H. Freeman. Bandura, A. (1997). Self-efficacy: The exercise of control. New York: W.H. Freeman.
go back to reference Bandura, A. (2006). Guide for constructing self-efficacy scales. In F. P. T. Urdan (Ed.), Self-efficacy beliefs of adolescents (Vol. 5, pp. 307–337). Greenwich, CT: Information Age Publishing. Bandura, A. (2006). Guide for constructing self-efficacy scales. In F. P. T. Urdan (Ed.), Self-efficacy beliefs of adolescents (Vol. 5, pp. 307–337). Greenwich, CT: Information Age Publishing.
go back to reference Beck, L., & Ajzen, I. (1991). Predicting dishonest actions using the theory of planned behavior. Journal of Research in Personality, 25(3), 285–301.CrossRef Beck, L., & Ajzen, I. (1991). Predicting dishonest actions using the theory of planned behavior. Journal of Research in Personality, 25(3), 285–301.CrossRef
go back to reference Bergkvist, L., & Rossiter, J. R. (2007). The predictive validity of multiple-item versus single-item measures of the same constructs. Journal of Marketing Research, 44(2), 175–184.CrossRef Bergkvist, L., & Rossiter, J. R. (2007). The predictive validity of multiple-item versus single-item measures of the same constructs. Journal of Marketing Research, 44(2), 175–184.CrossRef
go back to reference Bhattacharjee, S., Gopal, R. D., Lertwachara, K., & Marsden, J. R. (2006). Impact of legal threats on online music sharing activity: An analysis of music industry legal actions. Journal of Law and Economics, 49(1), 91–114.CrossRef Bhattacharjee, S., Gopal, R. D., Lertwachara, K., & Marsden, J. R. (2006). Impact of legal threats on online music sharing activity: An analysis of music industry legal actions. Journal of Law and Economics, 49(1), 91–114.CrossRef
go back to reference Bhattacharjee, S., Gopal, R. D., & Sanders, L. G. (2003). Digital music and online sharing: software piracy 2.0? Communications of the ACM, 46(7), 107–111.CrossRef Bhattacharjee, S., Gopal, R. D., & Sanders, L. G. (2003). Digital music and online sharing: software piracy 2.0? Communications of the ACM, 46(7), 107–111.CrossRef
go back to reference Bialik, C. (2013). Putting a price tag on film piracy. The Wall Street Journal. Bialik, C. (2013). Putting a price tag on film piracy. The Wall Street Journal.
go back to reference Bonner, S., & O’Higgins, E. (2010). Music piracy: Ethical perspectives. Management Decision, 48(9), 1341–1354.CrossRef Bonner, S., & O’Higgins, E. (2010). Music piracy: Ethical perspectives. Management Decision, 48(9), 1341–1354.CrossRef
go back to reference Chaudhry, P. E., Chaudhry, S. S., Stumpf, S. A., & Sudler, H. (2011). Piracy in cyber space: Consumer complicity, pirates and enterprise enforcement. Enterprise Information Systems, 5(2), 255–271.CrossRef Chaudhry, P. E., Chaudhry, S. S., Stumpf, S. A., & Sudler, H. (2011). Piracy in cyber space: Consumer complicity, pirates and enterprise enforcement. Enterprise Information Systems, 5(2), 255–271.CrossRef
go back to reference Chiang, E., & Assane, D. (2002). Software copyright infringement among college students. Applied Economics, 34(2), 157–166.CrossRef Chiang, E., & Assane, D. (2002). Software copyright infringement among college students. Applied Economics, 34(2), 157–166.CrossRef
go back to reference Chiou, J. S., Huang, C. Y., & Lee, H. H. (2005). The antecedents of music piracy attitudes and intentions. Journal of Business Ethics, 57(2), 161–174.CrossRef Chiou, J. S., Huang, C. Y., & Lee, H. H. (2005). The antecedents of music piracy attitudes and intentions. Journal of Business Ethics, 57(2), 161–174.CrossRef
go back to reference Chiu, H.-C., Lin, Y.-M., Lee, M., Nieh, M.-E., & Chen, H.-C. (2008). How to discourage online music piracy. International Journal of Management and Enterprise Development, 5(6), 723–738.CrossRef Chiu, H.-C., Lin, Y.-M., Lee, M., Nieh, M.-E., & Chen, H.-C. (2008). How to discourage online music piracy. International Journal of Management and Enterprise Development, 5(6), 723–738.CrossRef
go back to reference Chun-Yao, H. (2003). File sharing as a form of music consumption. International Journal of Electronic Commerce, 9(4), 37–55. Chun-Yao, H. (2003). File sharing as a form of music consumption. International Journal of Electronic Commerce, 9(4), 37–55.
go back to reference Cockrill, A., & Goode, M. M. H. (2012). DVD pirating intentions: Angels, devils, chancers and receivers. Journal of Consumer Behaviour, 11(1), 1–10.CrossRef Cockrill, A., & Goode, M. M. H. (2012). DVD pirating intentions: Angels, devils, chancers and receivers. Journal of Consumer Behaviour, 11(1), 1–10.CrossRef
go back to reference Conner, M., & Armitage, C. J. (1998). Extending the theory of planned behavior: A review and avenues for further research. Journal of Applied Social Psychology, 28(15), 1429–1464.CrossRef Conner, M., & Armitage, C. J. (1998). Extending the theory of planned behavior: A review and avenues for further research. Journal of Applied Social Psychology, 28(15), 1429–1464.CrossRef
go back to reference Coyle, J. R., Gould, S. J., Gupta, P., & Gupta, R. (2009). “To buy or to pirate”: The matrix of music consumers’ acquisition-mode decision-making. Journal of Business Research, 62(10), 1031–1037.CrossRef Coyle, J. R., Gould, S. J., Gupta, P., & Gupta, R. (2009). “To buy or to pirate”: The matrix of music consumers’ acquisition-mode decision-making. Journal of Business Research, 62(10), 1031–1037.CrossRef
go back to reference Cronan, T. P., & Al-Rafee, S. (2007). Factors that influence the intention to pirate software and media. Journal of Business Ethics, 78(4), 527–545.CrossRef Cronan, T. P., & Al-Rafee, S. (2007). Factors that influence the intention to pirate software and media. Journal of Business Ethics, 78(4), 527–545.CrossRef
go back to reference d’Astous, A., Colbert, F., & Montpetit, D. (2005). Music piracy on the Web—How effective are anti-piracy arguments? Evidence from the theory of planned behaviour. Journal of Consumer Policy, 28(3), 289–310.CrossRef d’Astous, A., Colbert, F., & Montpetit, D. (2005). Music piracy on the Web—How effective are anti-piracy arguments? Evidence from the theory of planned behaviour. Journal of Consumer Policy, 28(3), 289–310.CrossRef
go back to reference Drolet, A. L., & Morrison, D. G. (2001). Rejoinder to Grapentine. Journal of Service Research, 4(2), 159–160.CrossRef Drolet, A. L., & Morrison, D. G. (2001). Rejoinder to Grapentine. Journal of Service Research, 4(2), 159–160.CrossRef
go back to reference Eger, K., Hossfeld, T., Binzenhofer, A., & Kunzmann, G. (2007). Efficient simulation of large-scale p2p networks: packet-level vs. flow-level simulations. Monterey, CA: ACM Upgrade-CN. Eger, K., Hossfeld, T., Binzenhofer, A., & Kunzmann, G. (2007). Efficient simulation of large-scale p2p networks: packet-level vs. flow-level simulations. Monterey, CA: ACM Upgrade-CN.
go back to reference Freestone, O., & Mitchell, V. W. (2004). Generation Y attitudes towards E-ethics and Internet-related misbehaviours. Journal of Business Ethics, 54(2), 121–128.CrossRef Freestone, O., & Mitchell, V. W. (2004). Generation Y attitudes towards E-ethics and Internet-related misbehaviours. Journal of Business Ethics, 54(2), 121–128.CrossRef
go back to reference Fuchs, C., & Diamantopoulos, A. (2009). Using single-item measures for construct measurement in management research. Conceptual issues and application guidelines. Die Betriebswirtschaft, 69(2), 195–210. Fuchs, C., & Diamantopoulos, A. (2009). Using single-item measures for construct measurement in management research. Conceptual issues and application guidelines. Die Betriebswirtschaft, 69(2), 195–210.
go back to reference Fullerton, S., Kerch, K. B., & Dodge, H. R. (1996). Consumer ethics: An assessment of individual behavior in the market place. Journal of Business Ethics, 15(7), 805–814.CrossRef Fullerton, S., Kerch, K. B., & Dodge, H. R. (1996). Consumer ethics: An assessment of individual behavior in the market place. Journal of Business Ethics, 15(7), 805–814.CrossRef
go back to reference Gopal, R. D., & Sanders, L. G. (1997). Preventive and deterrent controls for software piracy. Journal of Management Information Systems, 13(4), 29–47.CrossRef Gopal, R. D., & Sanders, L. G. (1997). Preventive and deterrent controls for software piracy. Journal of Management Information Systems, 13(4), 29–47.CrossRef
go back to reference Gopal, R. D., Sanders, L. G., Bhattacharjee, S., Agrawal, M., & Wagner, S. C. (2004). A behavioral model of digital music piracy. Journal of Organizational Computing and Electronic Commerce, 14(2), 89–105.CrossRef Gopal, R. D., Sanders, L. G., Bhattacharjee, S., Agrawal, M., & Wagner, S. C. (2004). A behavioral model of digital music piracy. Journal of Organizational Computing and Electronic Commerce, 14(2), 89–105.CrossRef
go back to reference Grimm, P. (2010). Social desirability bias. In J. Sheth & N. Malhotra (Eds.), Wiley international encyclopedia of marketing. Chichester: Wiley. Grimm, P. (2010). Social desirability bias. In J. Sheth & N. Malhotra (Eds.), Wiley international encyclopedia of marketing. Chichester: Wiley.
go back to reference Hair, J. F. J., Black, W. C., Babin, B. J., & Anderson, R. E. (2010). Multivariate data analysis (7th ed.). Upper Saddle City, NJ: Prentice Hall. Hair, J. F. J., Black, W. C., Babin, B. J., & Anderson, R. E. (2010). Multivariate data analysis (7th ed.). Upper Saddle City, NJ: Prentice Hall.
go back to reference Higgins, G. E., Wilson, A. L., & Fell, B. D. (2005). An application of deterrence theory to software piracy. Journal of Criminal Justice and Popular Culture, 3(12), 166–184. Higgins, G. E., Wilson, A. L., & Fell, B. D. (2005). An application of deterrence theory to software piracy. Journal of Criminal Justice and Popular Culture, 3(12), 166–184.
go back to reference Hinduja, S. (2003). Trends and patterns among online software pirates. Ethics and Information Technology, 5(1), 49–61.CrossRef Hinduja, S. (2003). Trends and patterns among online software pirates. Ethics and Information Technology, 5(1), 49–61.CrossRef
go back to reference Hinduja, S., & Higgins, G. E. (2011). Trends and patterns among music pirates. Deviant Behavior, 32(7), 563–588.CrossRef Hinduja, S., & Higgins, G. E. (2011). Trends and patterns among music pirates. Deviant Behavior, 32(7), 563–588.CrossRef
go back to reference Holt, T. J., & Copes, H. (2010). Transferring subcultural knowledge on-line: Practices and beliefs of persistent digital pirates. Deviant Behavior, 31(7), 625–654.CrossRef Holt, T. J., & Copes, H. (2010). Transferring subcultural knowledge on-line: Practices and beliefs of persistent digital pirates. Deviant Behavior, 31(7), 625–654.CrossRef
go back to reference Hunt, S. D., & Vitell, S. J. (1986). A general theory of marketing ethics. Journal of Macromarketing, 6, 5–15.CrossRef Hunt, S. D., & Vitell, S. J. (1986). A general theory of marketing ethics. Journal of Macromarketing, 6, 5–15.CrossRef
go back to reference Hunt, S. D., & Vitell, S. J. (2006). The general theory of marketing ethics: A revision and three questions. Journal of Macromarketing, 26(2), 143–153.CrossRef Hunt, S. D., & Vitell, S. J. (2006). The general theory of marketing ethics: A revision and three questions. Journal of Macromarketing, 26(2), 143–153.CrossRef
go back to reference Jacobs, R. S., Heuvelman, A., Tan, M., & Peters, O. (2012). Digital movie piracy: A perspective on downloading behavior through social cognitive theory. Computers in Human Behavior, 28(3), 958–967.CrossRef Jacobs, R. S., Heuvelman, A., Tan, M., & Peters, O. (2012). Digital movie piracy: A perspective on downloading behavior through social cognitive theory. Computers in Human Behavior, 28(3), 958–967.CrossRef
go back to reference Jambon, M. M., & Smetana, J. G. (2012). College students’ moral evaluations of illegal music downloading. Journal of Applied Developmental Psychology, 33(1), 31–39.CrossRef Jambon, M. M., & Smetana, J. G. (2012). College students’ moral evaluations of illegal music downloading. Journal of Applied Developmental Psychology, 33(1), 31–39.CrossRef
go back to reference Jeong, B. K., & Khouja, M. (2013). Analysis of the effectiveness of preventive and deterrent piracy control strategies: Agent-based modeling approach. Computers in Human Behavior, 29(6), 2744–2755.CrossRef Jeong, B. K., & Khouja, M. (2013). Analysis of the effectiveness of preventive and deterrent piracy control strategies: Agent-based modeling approach. Computers in Human Behavior, 29(6), 2744–2755.CrossRef
go back to reference Johns, A. (2009). Piracy: The intellectual property wars from Gutenberg to Gates. Chicago: The University of Chicago Press.CrossRef Johns, A. (2009). Piracy: The intellectual property wars from Gutenberg to Gates. Chicago: The University of Chicago Press.CrossRef
go back to reference Johnston, K., & Johal, P. (1999). The Internet as a “virtual cultural region”: Are extant cultural classification schemes appropriate? Internet Research—Electronic Networking Applications and Policy, 9(3), 178–186.CrossRef Johnston, K., & Johal, P. (1999). The Internet as a “virtual cultural region”: Are extant cultural classification schemes appropriate? Internet Research—Electronic Networking Applications and Policy, 9(3), 178–186.CrossRef
go back to reference Ketchen, D. J., & Shook, C. L. (1996). The application of cluster analysis in strategic management research: An analysis and critique. Strategic Management Journal, 17(6), 441–458.CrossRef Ketchen, D. J., & Shook, C. L. (1996). The application of cluster analysis in strategic management research: An analysis and critique. Strategic Management Journal, 17(6), 441–458.CrossRef
go back to reference Kuo, F.-Y., & Hsu, M.-H. (2001). Development and validation of ethical computer self-efficacy measure: The case of softlifting. Journal of Business Ethics, 32(4), 299–315.CrossRef Kuo, F.-Y., & Hsu, M.-H. (2001). Development and validation of ethical computer self-efficacy measure: The case of softlifting. Journal of Business Ethics, 32(4), 299–315.CrossRef
go back to reference Kwong, T., & Lee, M. (2002). Behavioral intention model for the exchange mode internet music piracy. Paper presented at the Proceedings of the 35th annual Hawaii international conference on system sciences (HICSS’02) (Vol. 7). Kwong, T., & Lee, M. (2002). Behavioral intention model for the exchange mode internet music piracy. Paper presented at the Proceedings of the 35th annual Hawaii international conference on system sciences (HICSS’02) (Vol. 7).
go back to reference LaRose, R., & Kim, J. (2007). Share, steal, or buy? A social cognitive perspective of music downloading. Cyberpsychology & Behavior, 10(2), 267–277.CrossRef LaRose, R., & Kim, J. (2007). Share, steal, or buy? A social cognitive perspective of music downloading. Cyberpsychology & Behavior, 10(2), 267–277.CrossRef
go back to reference Lau, E. K. W. (2003). An empirical study of software piracy. Business Ethics: A European Review, 12(3), 233–245.CrossRef Lau, E. K. W. (2003). An empirical study of software piracy. Business Ethics: A European Review, 12(3), 233–245.CrossRef
go back to reference Levin, A. M., Dato-on, M. C., & Manolis, C. (2007). Deterring illegal downloading: The effects of threat appeals, past behavior, subjective norms, and attributions of harm. Journal of Consumer Behaviour, 6(2–3), 111–122.CrossRef Levin, A. M., Dato-on, M. C., & Manolis, C. (2007). Deterring illegal downloading: The effects of threat appeals, past behavior, subjective norms, and attributions of harm. Journal of Consumer Behaviour, 6(2–3), 111–122.CrossRef
go back to reference Levin, A. M., Dato-on, M. C., & Rhee, K. (2004). Money for nothing and hits for free: The ethics of downloading music from peer-to-peer websites. Journal of Marketing Theory and Practice, 12(1), 48–60.CrossRef Levin, A. M., Dato-on, M. C., & Rhee, K. (2004). Money for nothing and hits for free: The ethics of downloading music from peer-to-peer websites. Journal of Marketing Theory and Practice, 12(1), 48–60.CrossRef
go back to reference Liao, C., Lin, H.-N., & Liu, Y.-P. (2009). Predicting the use of pirated software: A contingency model integrating perceived risk with the theory of planned behavior. Journal of Business Ethics, 91(2), 237–252.CrossRef Liao, C., Lin, H.-N., & Liu, Y.-P. (2009). Predicting the use of pirated software: A contingency model integrating perceived risk with the theory of planned behavior. Journal of Business Ethics, 91(2), 237–252.CrossRef
go back to reference Lysonski, S., & Durvasula, S. (2008). Digital piracy of MP3s: Consumer and ethical predispositions. Journal of Consumer Marketing, 25(3), 167–178.CrossRef Lysonski, S., & Durvasula, S. (2008). Digital piracy of MP3s: Consumer and ethical predispositions. Journal of Consumer Marketing, 25(3), 167–178.CrossRef
go back to reference Mandel, P., & Süssmuth, B. (2010). A re-examination of the role of gender in determining digital piracy behavior. Working Paper, Leipzig University. Mandel, P., & Süssmuth, B. (2010). A re-examination of the role of gender in determining digital piracy behavior. Working Paper, Leipzig University.
go back to reference Moon, B., McCluskey, J. D., & McCluskey, C. P. (2010). A general theory of crime and computer crime: An empirical test. Journal of Criminal Justice, 38(4), 767–772.CrossRef Moon, B., McCluskey, J. D., & McCluskey, C. P. (2010). A general theory of crime and computer crime: An empirical test. Journal of Criminal Justice, 38(4), 767–772.CrossRef
go back to reference Moores, T. T., & Chang, J. C.-J. (2006). Ethical decision making in software piracy: Initial development and test of a fourcomponent model. MIS Quarterly, 30(1), 167–180. Moores, T. T., & Chang, J. C.-J. (2006). Ethical decision making in software piracy: Initial development and test of a fourcomponent model. MIS Quarterly, 30(1), 167–180.
go back to reference Morrison, P. (1994). Computer ethics: Cautionary tales and ethical dilemmas in computing. Cambridge: MIT Press. Morrison, P. (1994). Computer ethics: Cautionary tales and ethical dilemmas in computing. Cambridge: MIT Press.
go back to reference Nagin, D. S., & Pogarsky, G. (2003). An experimental investigation of deterrence: Cheating, self-serving bias, and impulsivity. Criminology, 41(1), 167–193.CrossRef Nagin, D. S., & Pogarsky, G. (2003). An experimental investigation of deterrence: Cheating, self-serving bias, and impulsivity. Criminology, 41(1), 167–193.CrossRef
go back to reference Nagin, D. S., & Pogarsky, G. (2004). Time and punishment: Delayed consequences and criminal behavior. Journal of Quantitative Criminology, 20(4), 295–317.CrossRef Nagin, D. S., & Pogarsky, G. (2004). Time and punishment: Delayed consequences and criminal behavior. Journal of Quantitative Criminology, 20(4), 295–317.CrossRef
go back to reference Nagy, M. S. (2002). Using a single-item approach to measure facet job satisfaction. Journal of Occupational and Organizational Psychology, 75(1), 77–86.CrossRef Nagy, M. S. (2002). Using a single-item approach to measure facet job satisfaction. Journal of Occupational and Organizational Psychology, 75(1), 77–86.CrossRef
go back to reference Nunes, J. C., Hsee, C. K., & Weber, E. U. (2004). Why are people so prone to steal software the effect of cost structure on consumer purchase and payment intentions. Journal of Public Policy & Marketing, 23(1), 43.CrossRef Nunes, J. C., Hsee, C. K., & Weber, E. U. (2004). Why are people so prone to steal software the effect of cost structure on consumer purchase and payment intentions. Journal of Public Policy & Marketing, 23(1), 43.CrossRef
go back to reference Orme, T. (2014). The short- and long-term effectiveness of anti-piracy laws and enforcement actions. Journal of Cultural Economics, 38(4), 351–368.CrossRef Orme, T. (2014). The short- and long-term effectiveness of anti-piracy laws and enforcement actions. Journal of Cultural Economics, 38(4), 351–368.CrossRef
go back to reference Papies, D., Eggers, F., & Wlömert, N. (2010). Music for free? How free ad-funded downloads affect consumer choice. Journal of the Academy of Marketing Science, 39(5), 777–794.CrossRef Papies, D., Eggers, F., & Wlömert, N. (2010). Music for free? How free ad-funded downloads affect consumer choice. Journal of the Academy of Marketing Science, 39(5), 777–794.CrossRef
go back to reference Paternoster, R. (1987). The deterrent effect of the perceived certainty and severity of punishment: A review of the evidence and issues. Justice Quarterly, 4(2), 173–217.CrossRef Paternoster, R. (1987). The deterrent effect of the perceived certainty and severity of punishment: A review of the evidence and issues. Justice Quarterly, 4(2), 173–217.CrossRef
go back to reference Patwardhan, A. M., Keith, M. E., & Vitell, S. J. (2012). Religiosity, attitude toward business, and ethical beliefs: Hispanic consumers in the United States. Journal of Business Ethics, 110(1), 61–70.CrossRef Patwardhan, A. M., Keith, M. E., & Vitell, S. J. (2012). Religiosity, attitude toward business, and ethical beliefs: Hispanic consumers in the United States. Journal of Business Ethics, 110(1), 61–70.CrossRef
go back to reference Peace, A. G., Galletta, D. F., & Thong, J. Y. L. (2003). Software piracy in the workplace: A model and empirical test. Journal of Management Information Systems, 20(1), 153–177.CrossRef Peace, A. G., Galletta, D. F., & Thong, J. Y. L. (2003). Software piracy in the workplace: A model and empirical test. Journal of Management Information Systems, 20(1), 153–177.CrossRef
go back to reference Plowman, S., & Goode, S. (2009). Factors affecting the intention to download music: Quality perceptions and downloading intensity. Journal of Computer Information Systems, 49(4), 84–97. Plowman, S., & Goode, S. (2009). Factors affecting the intention to download music: Quality perceptions and downloading intensity. Journal of Computer Information Systems, 49(4), 84–97.
go back to reference Robert, M. S. (2004). Student attitudes on software piracy and related issues of computer ethics. Ethics and Information Technology, 6(4), 215–222.CrossRef Robert, M. S. (2004). Student attitudes on software piracy and related issues of computer ethics. Ethics and Information Technology, 6(4), 215–222.CrossRef
go back to reference Robertson, K., McNeill, L., Green, J., & Roberts, C. (2011). illegal downloading, ethical concern, and illegal behavior. Journal of Business Ethics, 108(2), 215–227.CrossRef Robertson, K., McNeill, L., Green, J., & Roberts, C. (2011). illegal downloading, ethical concern, and illegal behavior. Journal of Business Ethics, 108(2), 215–227.CrossRef
go back to reference Russell, S. S., Spitzmuller, C., Lin, L. F., Stanton, J. M., Smith, P. C., & Ironson, G. H. (2004). Shorter can also be better: The abridged job in general scale. Educational and Psychological Measurement, 64(5), 878–893.CrossRef Russell, S. S., Spitzmuller, C., Lin, L. F., Stanton, J. M., Smith, P. C., & Ironson, G. H. (2004). Shorter can also be better: The abridged job in general scale. Educational and Psychological Measurement, 64(5), 878–893.CrossRef
go back to reference Scott, J. F. (1971). Internalization of norms: A sociological theory of moral commitment. Englewood Cliffs: Prentice-Hall. Scott, J. F. (1971). Internalization of norms: A sociological theory of moral commitment. Englewood Cliffs: Prentice-Hall.
go back to reference Shanahan, K. J., & Hyman, M. R. (2010). Motivators and enablers of SCOURing: A study of online piracy in the US and UK. Journal of Business Research, 63(9–10), 1095–1102.CrossRef Shanahan, K. J., & Hyman, M. R. (2010). Motivators and enablers of SCOURing: A study of online piracy in the US and UK. Journal of Business Research, 63(9–10), 1095–1102.CrossRef
go back to reference Shang, R.-A., Chen, Y.-C., & Chen, P.-C. (2007). Ethical decisions about sharing music files in the P2P environment. Journal of Business Ethics, 80(2), 349–365.CrossRef Shang, R.-A., Chen, Y.-C., & Chen, P.-C. (2007). Ethical decisions about sharing music files in the P2P environment. Journal of Business Ethics, 80(2), 349–365.CrossRef
go back to reference Simpson, P., Banerjee, D., & Simpson, C. J. (1994). Softlifting: A model of motivating factors. Journal of Business Ethics, 13(6), 431–438.CrossRef Simpson, P., Banerjee, D., & Simpson, C. J. (1994). Softlifting: A model of motivating factors. Journal of Business Ethics, 13(6), 431–438.CrossRef
go back to reference Sinha, R. K., Machado, F. S., & Sellman, C. (2010). Don’t think twice, it’s all Right: music piracy and pricing in a DRM-free environment. Journal of Marketing, 74(2), 40–54.CrossRef Sinha, R. K., Machado, F. S., & Sellman, C. (2010). Don’t think twice, it’s all Right: music piracy and pricing in a DRM-free environment. Journal of Marketing, 74(2), 40–54.CrossRef
go back to reference Sinha, R. K., & Mandel, N. (2008). Preventing digital music piracy: The carrot or the stick? Journal of Marketing, 72(1), 1–15.CrossRef Sinha, R. K., & Mandel, N. (2008). Preventing digital music piracy: The carrot or the stick? Journal of Marketing, 72(1), 1–15.CrossRef
go back to reference Siwek, S. E. (2007). The true cost of sound recording piracy to the U.S. economy. Lewiston, TX: Institute for Policy Innovation. Siwek, S. E. (2007). The true cost of sound recording piracy to the U.S. economy. Lewiston, TX: Institute for Policy Innovation.
go back to reference Stanton, J. M., Sinar, E. F., Balzer, W. K., Julian, A. L., Thoresen, P., Aziz, S., et al. (2002). Development of a compact measure of job satisfaction: The abridged Job Descriptive Index. Educational and Psychological Measurement, 62(1), 173–191.CrossRef Stanton, J. M., Sinar, E. F., Balzer, W. K., Julian, A. L., Thoresen, P., Aziz, S., et al. (2002). Development of a compact measure of job satisfaction: The abridged Job Descriptive Index. Educational and Psychological Measurement, 62(1), 173–191.CrossRef
go back to reference Svensson, M., Larsson, S., & Kaminski, M. (2014). The Research Bay—Studying the global file sharing community. In W. T. Gallagher & D. Halbert (Eds.), Law and society perspectives on intellectual property law. Cambridge: Cambridge University Press. Svensson, M., Larsson, S., & Kaminski, M. (2014). The Research Bay—Studying the global file sharing community. In W. T. Gallagher & D. Halbert (Eds.), Law and society perspectives on intellectual property law. Cambridge: Cambridge University Press.
go back to reference Sykes, G. M., & Matza, D. (1957). Techniques of neutralization—A theory of delinquency. American Sociological Review, 22(6), 664–670.CrossRef Sykes, G. M., & Matza, D. (1957). Techniques of neutralization—A theory of delinquency. American Sociological Review, 22(6), 664–670.CrossRef
go back to reference Tan, B. (2002). Understanding consumer ethical decision making with respect to purchase of pirated software. Journal of Consumer Marketing, 19(2), 96–111.CrossRef Tan, B. (2002). Understanding consumer ethical decision making with respect to purchase of pirated software. Journal of Consumer Marketing, 19(2), 96–111.CrossRef
go back to reference Tangney, J. P., & Dearing, R. L. (2002). Shame and guilt. New York: The Guilford Press.CrossRef Tangney, J. P., & Dearing, R. L. (2002). Shame and guilt. New York: The Guilford Press.CrossRef
go back to reference Tanner, C., Medin, D. L., & Iliev, R. (2008). Influence of deontological versus consequentialist orientations on act choices and framing effects: When principles are more important than consequences. European Journal of Social Psychology, 38(5), 757–769. doi:10.1002/ejsp.493.CrossRef Tanner, C., Medin, D. L., & Iliev, R. (2008). Influence of deontological versus consequentialist orientations on act choices and framing effects: When principles are more important than consequences. European Journal of Social Psychology, 38(5), 757–769. doi:10.​1002/​ejsp.​493.CrossRef
go back to reference Thong, J. Y. L., & Chee-Sing, Y. (1998). Testing an ethical decision-making theory: The case of softlifting. Journal of Management Information Systems, 15(1), 213–237.CrossRef Thong, J. Y. L., & Chee-Sing, Y. (1998). Testing an ethical decision-making theory: The case of softlifting. Journal of Management Information Systems, 15(1), 213–237.CrossRef
go back to reference Trafimow, D., & Finlay, K. A. (1996). The importance of subjective norms for a minority of people: Between-subjects and within-subjects analyses. Personality and Social Psychology Bulletin, 22(8), 820–828.CrossRef Trafimow, D., & Finlay, K. A. (1996). The importance of subjective norms for a minority of people: Between-subjects and within-subjects analyses. Personality and Social Psychology Bulletin, 22(8), 820–828.CrossRef
go back to reference Trafimow, D., Sheeran, P., Conner, M., & Finlay, K. A. (2002). Evidence that perceived behavioural control is a multidimensional construct: Perceived control and perceived difficulty. British Journal of Social Psychology, 41, 101–121.CrossRef Trafimow, D., Sheeran, P., Conner, M., & Finlay, K. A. (2002). Evidence that perceived behavioural control is a multidimensional construct: Perceived control and perceived difficulty. British Journal of Social Psychology, 41, 101–121.CrossRef
go back to reference Vany, A., & Walls, W. D. (2007). Estimating the effects of movie piracy on box-office revenue. Review of Industrial Organization, 30(4), 291–301.CrossRef Vany, A., & Walls, W. D. (2007). Estimating the effects of movie piracy on box-office revenue. Review of Industrial Organization, 30(4), 291–301.CrossRef
go back to reference Vermunt, J. K., & Magidson, J. (2005a). Latent Gold 4.0 User’s Guide. Belmont, MA: Statistical Innovations Inc. Vermunt, J. K., & Magidson, J. (2005a). Latent Gold 4.0 User’s Guide. Belmont, MA: Statistical Innovations Inc.
go back to reference Vermunt, J. K., & Magidson, J. (2005b). Latent Gold Choice 4.0 User’s guide. Belmont, MA: Statistical Innovations Inc. Vermunt, J. K., & Magidson, J. (2005b). Latent Gold Choice 4.0 User’s guide. Belmont, MA: Statistical Innovations Inc.
go back to reference Vermunt, J. K., & Magidson, J. (2005c). Technical guide for Latent GOLD 4.0: Basic and advanced. Belmont, MA: Statistical Innovations Inc. Vermunt, J. K., & Magidson, J. (2005c). Technical guide for Latent GOLD 4.0: Basic and advanced. Belmont, MA: Statistical Innovations Inc.
go back to reference Vitell, S. J., & Muncy, J. (1992). Consumer ethics: An empirical investigation of factors influencing ethical judgments of the final consumer. Journal of Business Ethics, 11(8), 585–597.CrossRef Vitell, S. J., & Muncy, J. (1992). Consumer ethics: An empirical investigation of factors influencing ethical judgments of the final consumer. Journal of Business Ethics, 11(8), 585–597.CrossRef
go back to reference Vitell, S. J., Singh, J. J., & Paolillo, J. (2007). Consumers’ ethical beliefs: The roles of money, religiosity and attitude toward business. Journal of Business Ethics, 73(4), 369–379.CrossRef Vitell, S. J., Singh, J. J., & Paolillo, J. (2007). Consumers’ ethical beliefs: The roles of money, religiosity and attitude toward business. Journal of Business Ethics, 73(4), 369–379.CrossRef
go back to reference Wagner, S. C., & Sanders, L. G. (2001). Considerations in ethical decision-making and software piracy. Journal of Business Ethics, 29(1–2), 161–167.CrossRef Wagner, S. C., & Sanders, L. G. (2001). Considerations in ethical decision-making and software piracy. Journal of Business Ethics, 29(1–2), 161–167.CrossRef
go back to reference Wang, X., & McClung, S. R. (2012). The immorality of illegal downloading: The role of anticipated guilt and general emotions. Computers in Human Behavior, 28(1), 153–159.CrossRef Wang, X., & McClung, S. R. (2012). The immorality of illegal downloading: The role of anticipated guilt and general emotions. Computers in Human Behavior, 28(1), 153–159.CrossRef
go back to reference Williams, K. R., & Hawkins, R. (1986). Perceptual research on general deterrence—A critical review. Law & Society Review, 20(4), 545–572.CrossRef Williams, K. R., & Hawkins, R. (1986). Perceptual research on general deterrence—A critical review. Law & Society Review, 20(4), 545–572.CrossRef
go back to reference Wingrove, T., Korpas, A. L., & Weisz, V. (2010). Why were millions of people not obeying the law? Motivational influences on non-compliance with the law in the case of music piracy. Psychology, Crime & Law, 17(3), 261–276.CrossRef Wingrove, T., Korpas, A. L., & Weisz, V. (2010). Why were millions of people not obeying the law? Motivational influences on non-compliance with the law in the case of music piracy. Psychology, Crime & Law, 17(3), 261–276.CrossRef
go back to reference Yu, J., & Liska, A. E. (1993). The certainty of punishment: A reference group effect and its functional form. Criminology, 31(3), 447–464.CrossRef Yu, J., & Liska, A. E. (1993). The certainty of punishment: A reference group effect and its functional form. Criminology, 31(3), 447–464.CrossRef
Metadata
Title
One Sail Fits All? A Psychographic Segmentation of Digital Pirates
Authors
Charlotte Emily De Corte
Patrick Van Kenhove
Publication date
28-07-2015
Publisher
Springer Netherlands
Published in
Journal of Business Ethics / Issue 3/2017
Print ISSN: 0167-4544
Electronic ISSN: 1573-0697
DOI
https://doi.org/10.1007/s10551-015-2789-8

Other articles of this Issue 3/2017

Journal of Business Ethics 3/2017 Go to the issue