Initial findings of a gap analysis of the digital piracy literature: six undiscovered countries

Journal of Research in Interactive Marketing - Tập 6 Số 4 - Trang 238-259 - 2012
SigiGoode1
1School of Accounting and Business Information Systems, The Australian National University, Canberra, Australia

Tóm tắt

PurposeDigital piracy continues to be a problem for firms, industry lobby groups and regulators. The purpose of this paper is to report initial findings of a review of the digital piracy literature. To reduce conceptual overlap and duplicated effort, the author aims to identify gaps in understanding for future research.Design/methodology/approachThe paper reviews prior literature on digital piracy across disciplinary areas.FindingsSix gaps are identified, being the supply of pirate digital materials, piracy for non‐desktop environments, alternative distribution methods, the quality of pirate materials, the behaviour of piracy groups, and the benefits of digital piracy. These gaps constitute important undiscovered areas of knowledge.Research limitations/implicationsThe paper excludes working papers and practitioner articles, which may contain different insight. The paper reports initial findings only, and the ongoing analysis may shed new light on these findings.Originality/valueThe paper contributes by providing a multidisciplinary view of gaps in the literature. No prior study has yet reviewed prior literature with a view to identifying these opportunities for future work.

Từ khóa


Tài liệu tham khảo

Akman, I. and Mishra, A. (2009), “Ethical behavior issues in software use: an analysis of public and private sectors”, Computers in Human Behavior, Vol. 25, pp. 1251‐7.

Aleassa, H., Pearson, J. and McClurg, S. (2011), “Investigating software piracy in Jordan: an extension of the theory of reasoned action”, Journal of Business Ethics, Vol. 98, pp. 663‐76.

Al‐Jabri, I. and Abdul‐Gader, A. (1997), “Software copyright infringements: an exploratory study of the effects of individual and peer beliefs”, Omega, Vol. 25, pp. 335‐44.

Al‐Rafee, S. and Cronan, T. (2006), “Digital piracy: factors that influence attitude toward behavior”, Journal of Business Ethics, Vol. 63, pp. 237‐59.

Al‐Rafee, S. and Rouibah, K. (2010), “The fight against digital piracy: an experiment”, Telematics and Informatics, Vol. 27, pp. 283‐92.

Bekir, I., Harbi, S.E. and Grolleau, G. (2010), “Le Piratage Peut‐Il Être Profitable à la Firme Piratée?”, Revue Economique, Vol. 61, p. 793.

Belanger, F. and Crossler, R. (2011), “Privacy in the digital age: a review of information privacy research in information systems”, MIS Quarterly, Vol. 35, pp. 1017‐41.

Belleflamme, P. and Picard, P.M. (2007), “Piracy and competition”, Journal of Economics & Management Strategy, Vol. 16, pp. 351‐83.

Bernard, H.R. (2000), Social Research Methods: Qualitative and Quantitative Approaches, Sage, Thousand Oaks, CA.

Besen, S.M. (1986), “Private copying, reproduction costs, and the supply of intellectual property”, Information Economics and Policy, Vol. 2, pp. 5‐22.

Besen, S.M. and Raskind, L.J. (1991), “An introduction to the law and economics of intellectual property”, The Journal of Economic Perspectives, Vol. 5, pp. 3‐27.

Bhattacharjee, S., Gopal, R.D. and Sanders, G.L. (2003), “Digital music and online sharing: software piracy 2.0?”, Communications of the ACM, Vol. 46, pp. 107‐11.

Blake, R.H. and Kyper, E.S. (2011), “An investigation of the intention to share media files over peer‐to‐peer networks”, Behaviour & Information Technology, Vol. 30, pp. 1‐13.

Blankfield, S. and Stevenson, I. (2012), “Towards a digital spine: the technological methods that UK and US publishers are using to tackle the growing challenge of e‐book piracy”, Publishing Research Quarterly, Vol. 28, pp. 79‐92.

Brook, B.S. (1975), “Piracy and panacea in the dissemination of music in the late eighteenth century”, Proceedings of the Royal Musical Association, Vol. 102, pp. 13‐36.

Bump, M. Jr (1984), “A primer on software piracy cases in the courts”, Computers & Security, Vol. 3, pp. 123‐34.

Burt, T. (2002), “Piracy set to hit global music sales”, Financial Times, 11 November, p. 8.

Chaudhry, P.E., Chaudhry, S.S., Stumpf, S.A. and Sudler, H. (2011), “Piracy in cyber space: consumer complicity, pirates and enterprise enforcement”, Enterprise Information Systems, Vol. 5, pp. 255‐71.

Chen, M.‐F., Pan, C.‐T. and Pan, M.‐C. (2009), “The joint moderating impact of moral intensity and moral judgment on consumer's use intention of pirated software”, Journal of Business Ethics, Vol. 90, pp. 361‐73.

Cheng, H.K., Sims, R.R. and Teegen, H. (1997), “To purchase or to pirate software: an empirical study”, Journal of Management Information Systems, Vol. 13, pp. 49‐60.

Chiou, J.‐S., Huang, C. and Lee, H. (2005), “The antecedents of music piracy attitudes and intentions”, Journal of Business Ethics, Vol. 57, pp. 161‐74.

Choo, K.‐K. (2008), “Organised crime groups in cyberspace: a typology”, Trends in Organized Crime, Vol. 11, pp. 270‐95.

Clevenger, T.B., Ziegenfuss, D.E., Deck, A.B. and Clevenger, N.N. (1988), “Audit opportunities to control software piracy to reduce risk of liability”, The Internal Auditor, Vol. 45, p. 42.

Collberg, C.S. and Thomborson, C. (2002), “Watermarking, tamper‐proofing, and obfuscation – tools for software protection”, IEEE Transactions on Software Engineering, Vol. 28, pp. 735‐46.

Conner, K.R. and Rumelt, R.P. (1991), “Software piracy: an analysis of protection strategies”, Management Science, Vol. 37, pp. 125‐39.

Cook, D.A. and Wang, W. (2004), “Neutralizing the piracy of motion pictures: reengineering the industry's supply chain”, Technology in Society, Vol. 26, pp. 567‐83.

Cooper, J. and Harrison, D.M. (2001), “The social organization of audio piracy on the internet”, Media Culture Society, Vol. 23, pp. 71‐89.

Creswell, J.W. (2009), Research Design: Qualitative, Quantitative, and Mixed Methods Approaches, 3rd ed., Sage, Thousand Oaks, CA.

Cummings, A.S. (1909), “From monopoly to intellectual property: music piracy and the remaking of American copyright, 1909‐1971”, The Journal of American History, Vol. 97, pp. 659‐81.

Currah, A. (2006), “Hollywood versus the internet: the media and entertainment industries in a digital and networked economy”, Journal of Economic Geography, Vol. 6, pp. 439‐68.

d' Astous, A., Colbert, F. and Montpetit, D. (2005), “Music piracy on the web – how effective are anti‐piracy arguments? Evidence from the theory of planned behaviour”, Journal of Consumer Policy, Vol. 28, pp. 289‐310.

Décary‐Hétu, D., Morselli, C. and Leman‐Langlois, S. (2012), “Welcome to the scene: a study of social organization and recognition among warez hackers”, Journal of Research in Crime and Delinquency, Vol. 49, pp. 359‐82.

De Castro, J.O., Balkin, D.B. and Shepherd, D.A. (2008), “Can entrepreneurial firms benefit from product piracy?”, Journal of Business Venturing, Vol. 23, pp. 75‐90.

Demetris, J. (1990), “The challenge of introducing digital audio tape technology into consumer markets”, Technology in Society, Vol. 12, pp. 91‐100.

Depken, C.A. and Simmons, L.C. (2004), “Social construct and the propensity for software piracy”, Applied Economics Letters, Vol. 11, pp. 97‐100.

DiNacci, D. (1985), “Software piracy: is your company liable?”, Business, October.

Djekic, P. and Loebbecke, C. (2007), “Preventing application software piracy: an empirical investigation of technical copy protections”, The Journal of Strategic Information Systems, Vol. 16, pp. 173‐86.

Duchene, A. and Waelbroeck, P. (2005), “Peer‐to‐peer, piracy and the copyright law: implications for consumers and artists”, in Takeyama, L., Gordon, W.J. and Towse, R. (Eds), Developments in the Economics of Copyright: Research and Analysis, Edward Elgar, Cheltenham.

Easley, R.F., Michel, J.G. and Devaraj, S. (2003), “The MP3 open standard and the music industry's response to internet piracy”, Communications of the ACM, Vol. 46, pp. 90‐6.

Elsom, S. (1983), “Protecting software against piracy”, Data Processing, Vol. 25, pp. 6‐8.

Epstein, D.J. (1974), “Music publishing in the age of piracy: the board of music trade and its catalogue”, Notes, Vol. 31 No. 1, pp. 7‐29 (second series).

Feeney, M.J. and Miller, R. (1984), “Downloading: piracy or panacea?”, Journal of Information Science, Vol. 8, pp. 7‐11.

Fetscherin, M. (2002), “Present state and emerging scenarios of digital rights management systems”, International Journal on Media Management, Vol. 4, pp. 164‐71.

Fetscherin, M. (2005), “Movie piracy on peer‐to‐peer networks – the case of KaZaA”, Telematics and Informatics, Vol. 22, pp. 57‐70.

Foroughi, A., Albin, M. and Gillard, S. (2002), “Digital rights management: a delicate balance between protection and accessibility”, Journal of Information Science, Vol. 28, pp. 389‐95.

Freestone, O. and Mitchell, V.‐W. (2004), “Generation Y attitudes towards e‐ethics and internet‐related misbehaviours”, Journal of Business Ethics, Vol. 54, pp. 121‐8.

Gan, L.L. and Koh, H.C. (2006), “An empirical study of software piracy among tertiary institutions in Singapore”, Information & Management, Vol. 43, pp. 640‐9.

Gayer, A. and Shy, O. (2003), “Internet and peer‐to‐peer distributions in markets for digital products”, Economics Letters, Vol. 81, pp. 197‐203.

Gentry, J.W., Putrevu, S. and Shultz, C.J. (2006), “The effects of counterfeiting on consumer search”, Journal of Consumer Behaviour, Vol. 5, pp. 245‐56.

Givon, M., Mahajan, V. and Muller, E. (1995), “Software piracy: estimation of lost sales and the impact on software diffusion”, Journal of Marketing, Vol. 59, pp. 29‐37.

Glass, R.S. and Wood, W.A. (1996), “Situational determinants of software piracy: an equity theory perspective”, Journal of Business Ethics, Vol. 15, pp. 1189‐98.

Globerman, S. (1988), “Addressing international product piracy”, Journal of International Business Studies, Vol. 19, pp. 497‐504.

Goel, R. and Nelson, M. (2009), “Determinants of software piracy: economics, institutions, and technology”, The Journal of Technology Transfer, Vol. 34, pp. 637‐58.

Goode, S. (2010), “Exploring the supply of pirate software for mobile devices: an analysis of software types and piracy groups”, Information Management & Computer Security, Vol. 18, pp. 204‐25.

Goode, S. and Cruise, S. (2006), “What motivates software crackers?”, Journal of Business Ethics, Vol. 65, pp. 173‐201.

Gopal, R.D. and Sanders, G.L. (1997), “Preventive and deterrent controls for software piracy”, Journal of Management Information Systems, Vol. 13, pp. 29‐47.

Gopal, R.D. and Sanders, G.L. (1998), “International software piracy: analysis of key issues and impacts”, Information Systems Research, Vol. 9, pp. 380‐97.

Gopal, R.D., Bhattacharjee, S. and Sanders, G.L. (2006), “Do artists benefit from online music sharing?”, The Journal of Business, Vol. 79, pp. 1503‐33.

Gopal, R.D., Sanders, G.L., Bhattacharjee, S., Agrawal, M. and Wagner, S.C. (2004), “A behavioral model of digital music piracy”, Journal of Organizational Computing and Electronic Commerce, Vol. 14, pp. 89‐105.

Graham, G., Burnes, B., Lewis, G.J. and Langer, J. (2004), “The transformation of the music industry supply chain: a major label perspective”, International Journal of Operations & Production Management, Vol. 24, pp. 1087‐103.

Handke, C. (2012), “Digital copying and the supply of sound recordings”, Information Economics and Policy, Vol. 24, pp. 15‐29.

Hart, C. (1985), “Computer piracy: holding hostage”, Focus, p. 54.

Hennig‐Thurau, T., Henning, V. and Sattler, H. (2007), “Consumer file sharing of motion pictures”, Journal of Marketing, Vol. 71, pp. 1‐18.

Hettinger, E.C. (1989), “Justifying intellectual property”, Philosophy & Public Affairs, Vol. 18, pp. 31‐52.

Higgins, G.E. and Makin, D.A. (2004), “Self‐control, deviant peers, and software piracy”, Psychological Reports, Vol. 95, pp. 921‐31.

Higgins, G.E., Fell, B.D. and Wilson, A.L. (2006), “Digital piracy: assessing the contributions of an integrated self control theory and social learning theory using structural equation modeling”, Criminal Justice Studies, Vol. 19, pp. 3‐22.

Higgins, G.E., Wolfe, S.E. and Ricketts, M.L. (2009), “Digital piracy a latent class analysis”, Social Science Computer Review, Vol. 27, pp. 24‐40.

Higgins, G.E., Marcum, C.D., Freiburger, T.L. and Ricketts, M.L. (2012), “Examining the role of peer influence and self‐control on downloading behavior”, Deviant Behavior, Vol. 33, pp. 412‐23.

Hinduja, S. (2001), “Correlates of internet software piracy”, Journal of Contemporary Criminal Justice, Vol. 17, pp. 369‐82.

Hinduja, S. (2007), “Neutralization theory and online software piracy: an empirical analysis”, Ethics and Information Technology, Vol. 9, pp. 187‐204.

Hinduja, S. (2008), “Deindividuation and internet software piracy”, CyberPsychology & Behavior, Vol. 11, pp. 391‐8.

Hinduja, S. and Ingram, J.R. (2009), “Social learning theory and music piracy: the differential role of online and offline peer influences”, Criminal Justice Studies, Vol. 22, pp. 405‐20.

Ho, J. and Weinberg, C.B. (2011), “Segmenting consumers of pirated movies”, Journal of Consumer Marketing, Vol. 28, pp. 252‐60.

Holsapple, C.W., Iyengar, D., Jin, H. and Rao, S. (2008), “Parameters for software piracy research”, The Information Society, Vol. 24, pp. 199‐218.

Holt, T.J. and Morris, R.G. (2009), “An exploration of the relationship between MP3 player ownership and digital piracy”, Criminal Justice Studies, Vol. 22, pp. 381‐92.

Hoorebeek, M.V. (2003), “Napster clones turn their attention to academic e‐books”, New Library World, Vol. 104, pp. 142‐8.

Hsu, J. and Shiue, C. (2008), “Consumers' willingness to pay for non‐pirated software”, Journal of Business Ethics, Vol. 81, pp. 715‐32.

Hui, W., Yoo, B. and Tam, K.Y. (2008), “Economics of shareware: how do uncertainty and piracy affect shareware quality and brand premium?”, Decision Support Systems, Vol. 44, pp. 580‐94.

Jacobs, L., Samli, A.C. and Jedlik, T. (2001), “The nightmare of international product piracy: exploring defensive strategies”, Industrial Marketing Management, Vol. 30, pp. 499‐509.

Jacobs, R.S., Heuvelman, A., Tan, M. and Peters, O. (2012), “Digital movie piracy: a perspective on downloading behavior through social cognitive theory”, Computers in Human Behavior, Vol. 28, pp. 958‐67.

Jain, S. (2008), “Digital piracy: a competitive analysis”, Marketing Science, Vol. 27, pp. 610‐26.

Jaisingh, J. (2007), “Piracy on file‐sharing networks: strategies for recording companies”, Journal of Organizational Computing and Electronic Commerce, Vol. 17, pp. 329‐48.

Jeong, B.‐K., Khouja, M. and Zhao, K. (2012), “The impacts of piracy and supply chain contracts on digital music channel performance”, Decision Support Systems, Vol. 52, pp. 590‐603.

Kariithi, N.K. (2011), “Is the devil in the data? A literature review of piracy around the world”, The Journal of World Intellectual Property, Vol. 14, pp. 133‐54.

Kiema, I. (2008), “Commercial piracy and intellectual property policy”, Journal of Economic Behavior & Organization, Vol. 68, pp. 304‐18.

Kini, R.B., Ramakrishna, H.V. and Vijayaraman, B.S. (2004), “Shaping of moral intensity regarding software piracy: a comparison between Thailand and US students”, Journal of Business Ethics, Vol. 49, pp. 91‐104.

Kinsella, W. (2007), “Can the ‘long tail’ save the music industry?”, National Post, p. A18.

Konstantakis, N.I., Palaigeorgiou, G.E., Siozos, P.D. and Tsoukalas, I.A. (2010), “What do computer science students think about software piracy?”, Behaviour & Information Technology, Vol. 29, pp. 277‐85.

Kwan, S.S.K., Jaisingh, J. and Tam, K.Y. (2008), “Risk of using pirated software and its impact on software protection strategies”, Decision Support Systems, Vol. 45, pp. 504‐16.

Kwong, K.K., Yau, O.H.M., Lee, J.S.Y., Sin, L.Y.M. and Tse, A.C.B. (2003), “The effects of attitudinal and demographic factors on intention to buy pirated CDs: the case of Chinese consumers”, Journal of Business Ethics, Vol. 47, pp. 223‐35.

Langenderfer, J. and Cook, D.L. (2001), “Copyright policies and issues raised by A&M records v. Napster: the shot heard ‘round the world’ or ‘not with a bang but a whimper?’”, Journal of Public Policy & Marketing, Vol. 20, pp. 280‐8.

LaRose, R., Lai, Y.J., Lange, R., Love, B. and Wu, Y. (2005), “Sharing or piracy? An exploration of downloading behavior”, Journal of Computer‐Mediated Communication, Vol. 11, pp. 1‐21.

Lau, E.K. (2006), “Factors motivating people toward pirated software”, Qualitative Market Research: An International Journal, Vol. 9, pp. 404‐19.

Leonard, L.N.K., Cronan, T.P. and Kreie, J. (2004), “What influences IT ethical behavior intentions – planned behavior, reasoned action, perceived importance, or individual characteristics?”, Information & Management, Vol. 42, pp. 143‐58.

Liebowitz, S.J. (1985), “Copying and indirect appropriability: photocopying of journals”, Journal of Political Economy, Vol. 93, pp. 945‐57.

Lysonski, S. and Durvasula, S. (2008), “Digital piracy of MP3s: consumer and ethical predispositions”, Journal of Consumer Marketing, Vol. 25, pp. 167‐78.

McCorkle, D., Reardon, J., Dalenberg, D., Pryor, A. and Wicks, J. (2012), “Purchase or pirate: a model of consumer intellectual property theft”, The Journal of Marketing Theory and Practice, Vol. 20, pp. 73‐86.

McDonald, G. and Roberts, C. (1994), “Product piracy: the problem that will not go away”, Journal of Product & Brand Management, Vol. 3, pp. 55‐65.

Maude, T. and Maude, D. (1984), “Hardware protection against software piracy”, Communications of the ACM, Vol. 27, pp. 950‐9.

Mercedes, D. (1996), “Digital ethics: computers, photographs, and the manipulation of pixels”, Art Education, Vol. 49, pp. 44‐50.

Meredith, R. (2003), “Microsoft's long march”, Forbes, Vol. 171, pp. 78‐83.

Minniti, A. and Vergari, C. (2010), “Turning piracy into profits: a theoretical investigation”, Information Economics and Policy, Vol. 22, pp. 379‐90.

Mittelstaedt, J.D. and Mittelstaedt, R.A. (1997), “The protection of intellectual property: issues of origination and ownership”, Journal of Public Policy & Marketing, Vol. 16, pp. 14‐25.

Moores, T.T. (2003), “The effect of national culture and economic wealth on global software piracy rates”, Communications of the ACM, Vol. 46, pp. 207‐15.

Moores, T.T. (2008), “An analysis of the impact of economic wealth and national culture on the rise and fall of software piracy rates”, Journal of Business Ethics, Vol. 81, pp. 39‐51.

Moores, T.T. and Chang, J.C.‐J. (2006), “Ethical decision making in software piracy: initial development and test of a four‐component model”, MIS Quarterly, Vol. 30, pp. 167‐80.

Mortimer, J.H., Nosko, C. and Sorensen, A. (2012), “Supply responses to digital distribution: recorded music and live performances”, Information Economics and Policy, Vol. 24, pp. 3‐14.

Nascimento, F. and Vanhonacker, W.R. (1988), “Optimal strategic pricing of reproducible consumer products”, Management Science, Vol. 34, pp. 921‐37.

Naumovich, G. and Memon, N. (2003), “Preventing piracy, reverse engineering, and tampering”, Computer, Vol. 36, pp. 64‐71.

Noble, G. (1988), “The social significance of VCR technology: TV or not TV?”, The Information Society, Vol. 5, pp. 133‐46.

O'Hare, M. (1982), “Copyright and the protection of economic rights”, Journal of Cultural Economics, Vol. 6, pp. 33‐48.

Parthasarathy, M. and Mittelstaedt, R. (1995), “Illegal adoption of a new product: a model of software piracy behavior”, Advances in Consumer Research, Vol. 22, pp. 693‐8.

Peace, A.G., Galletta, D.F. and Thong, J.Y.L. (2003), “Software piracy in the workplace: a model and empirical test”, Journal of Management Information Systems, Vol. 20, pp. 153‐77.

Peitz, M. and Waelbroeck, P. (2006a), “Piracy of digital products: a critical review of the theoretical literature”, Information Economics and Policy, Vol. 18, pp. 449‐76.

Peitz, M. and Waelbroeck, P. (2006b), “Why the music industry may gain from free downloading – the role of sampling”, International Journal of Industrial Organization, Vol. 24, pp. 907‐13.

Pesserilo, I.M. (1978), “State anti‐sound piracy laws and a proposed model statute: a time to consolidate the victories against sound pirates”, Performing Arts Review, Vol. 8, pp. 1‐49.

Phau, I. and Ng, J. (2010), “Predictors of usage intentions of pirated software”, Journal of Business Ethics, Vol. 94, pp. 23‐37.

Phau, I. and Teah, M. (2009), “Devil wears (counterfeit) Prada: a study of antecedents and outcomes of attitudes towards counterfeits of luxury brands”, Journal of Consumer Marketing, Vol. 26, pp. 15‐27.

Phau, I., Sequeira, M. and Dix, S. (2009), “Consumers' willingness to knowingly purchase counterfeit products”, Direct Marketing: an International Journal, Vol. 3, pp. 262‐81.

Piller, C. (2006), “How piracy opens doors for windows”, Los Angeles Times.

Piolatto, A. and Schuett, F. (2012), “Music piracy: a case of ‘the rich get richer and the poor get poorer’”, Information Economics and Policy, Vol. 24, pp. 30‐9.

Plouffe, C.R. (2008), “Examining ‘peer‐to‐peer’ (P2P) systems as consumer‐to‐consumer (C2C) exchange”, European Journal of Marketing, Vol. 42, pp. 1179‐202.

Png, I.P.L. (2010), “On the reliability of software piracy statistics”, Electronic Commerce Research and Applications, Vol. 9, pp. 365‐73.

Prasad, A. and Mahajan, V. (2003), “How many pirates should a software firm tolerate? An analysis of piracy protection on the diffusion of software”, International Journal of Research in Marketing, Vol. 20, pp. 337‐53.

Prendergast, G., Chuen, L.H. and Phau, I. (2002), “Understanding consumer demand for non‐deceptive pirated brands”, Marketing Intelligence & Planning, Vol. 20, pp. 405‐16.

Rehn, A. (2004), “The politics of contraband: the honor economies of the warez scene”, Journal of Socio‐Economics, Vol. 33, pp. 359‐74.

Rich, M. (2010), “Print books are target of pirates on the web”, New York Times.

Root, J.E.I. (1980), “Protecting computer software in the 80s: practical guidelines for evolving needs”, Rutgers Computer & Technology Law Journal, Vol. 8, p. 205.

Samtani, A., Gok, Y.Y.J., Cue, B.S. and Tan, S.L.G. (2001), “Software piracy in Singapore”, The Journal of World Intellectual Property, Vol. 4, pp. 581‐604.

Samuelson, P. (2003), “DRM and, or, vs the law”, Communications of the ACM, Vol. 46, pp. 41‐5.

Sandulli, F.D. (2007), “CD music purchase behaviour of P2P users”, Technovation, Vol. 27, pp. 325‐34.

Schneck, P.B. (1999), “Persistent access control to prevent piracy of digital information”, Proceedings of the IEEE, Vol. 87 No. 7, pp. 1239‐50.

Selinger, M. (1999), “Area lost $1.4 billion to piracy, microsoft report says”, The Washington Times, B.7.

Shadlen, K.C., Schrank, A. and Kurtz, M.J. (2005), “The political economy of intellectual property protection: the case of software”, International Studies Quarterly, Vol. 49, pp. 45‐71.

Shanahan, K.J. and Hyman, M.R. (2010), “Motivators and enablers of SCOURing: a study of online piracy in the US and UK”, Journal of Business Research, Vol. 63, pp. 1095‐102.

Shapiro, C. and Varian, H.R. (1999), Information Rules: A Strategic Guide to the Network Economy, Harvard Business Press, Boston, MA.

Shore, B., Venkatachalam, A., Solorzano, E., Burn, J.M., Hassan, S.Z. and Janczewski, L.J. (2001), “Softlifting and piracy: behavior across cultures”, Technology in Society, Vol. 23, pp. 563‐81.

Shy, O. and Thisse, J.‐F. (1999), “A strategic approach to software protection”, Journal of Economics & Management Strategy, Vol. 8, pp. 163‐90.

Siegfried, R. (2004), “Student attitudes on software piracy and related issues of computer ethics”, Ethics and Information Technology, Vol. 6, pp. 215‐22.

Sims, R.R., Cheng, H.K. and Teegen, H. (1996), “Toward a profile of student software piraters”, Journal of Business Ethics, Vol. 15, pp. 839‐49.

Sinha, R.K., Machado, F.S. and Sellman, C. (2010), “Don't think twice, it's all right: music piracy and pricing in a DRM‐free environment”, Journal of Marketing, Vol. 74, pp. 40‐54.

Sirkeci, I. and Magnúsdóttir, L.B. (2011), “Understanding illegal music downloading in the UK: a multi‐attribute model”, Journal of Research in Interactive Marketing, Vol. 5, pp. 90‐110.

Skinner, W.F. and Fream, A.M. (1997), “A social learning theory analysis of computer crime among college students”, Journal of Research in Crime and Delinquency, Vol. 34, pp. 495‐518.

Slive, J. and Bernhardt, D. (1998), “Pirated for profit”, The Canadian Journal of Economics/Revue Canadienne d'Economique, Vol. 31, pp. 886‐99.

Smith, M.D. and Telang, R. (2009), “Competing with free: the impact of movie broadcasts on DVD sales and internet piracy”, MIS Quarterly, Vol. 33, pp. 321‐38.

Soat, J. (2004), “Quid pro quo and an online blitzkrieg”, Informationweek.

Staake, T., Thiesse, F. and Fleisch, E. (2009), “The emergence of counterfeit trade: a literature review”, European Journal of Marketing, Vol. 43, pp. 320‐49.

Stevans, L.K. and Sessions, D.N. (2005), “An empirical investigation into the effect of music downloading on the consumer expenditure of recorded music: a time series approach”, Journal of Consumer Policy, Vol. 28, pp. 311‐24.

Stone, K. (1971), “Music publishing today”, Performing Arts Review, Vol. 2, pp. 621‐33.

Straub, D.W. and Collins, R.W. (1990), “Key information liability issues facing managers: software piracy, proprietary databases, and individual rights to privacy”, MIS Quarterly, Vol. 14, pp. 143‐56.

Suter, T.A., Kopp, S.W. and Hardesty, D.M. (2004), “The relationship between general ethical judgments and copying behavior at work”, Journal of Business Ethics, Vol. 55, pp. 61‐70.

Swinyard, W.R., Rinne, H. and Kau, A.K. (1990), “The morality of software piracy: a cross‐cultural analysis”, Journal of Business Ethics, Vol. 9, pp. 655‐64.

Takeyama, L.N. (1994), “The welfare implications of unauthorized reproduction of intellectual property in the presence of demand network externalities”, The Journal of Industrial Economics, Vol. 42, pp. 155‐66.

Takeyama, L.N. (2009), “Copyright enforcement and product quality signaling in markets for computer software”, Information Economics and Policy, Vol. 21, pp. 291‐6.

Tan, B. (2002), “Understanding consumer ethical decision making with respect to purchase of pirated software”, Journal of Consumer Marketing, Vol. 19, pp. 96‐111.

Tang, P. (1998), “How electronic publishers are protecting against piracy: doubts about technical systems of protection”, The Information Society, Vol. 14, pp. 19‐31.

Taylor, G.S. and Shim, J.P. (1993), “A comparative examination of attitudes toward software piracy among business professors and executives”, Human Relations, Vol. 46, pp. 419‐33.

Traiman, S. (1999), “RIAA declares war on pirates”, Billboard, Vol. 111, pp. 54‐58+.

Traphagan, M. and Griffith, A. (1998), “Software piracy and global competitiveness: report on global software piracy”, International Review of Law, Computers & Technology, Vol. 12, pp. 431‐51.

USDoJ (2003), “Twelve ‘Operation Bandwidth’ software pirates enter into group guilty plea”, 18 December, US Department of Justice, Washington, DC.

USDoJ (2007), “Extradited software piracy ringleader pleads guilty”, US Department of Justice, Washington, DC, 20 April.

Urbas, G. (2006), “Cross‐national investigation and prosecution of intellectual property crimes: the example of ‘Operation Buccaneer’”, Crime, Law and Social Change, Vol. 46, pp. 207‐21.

Varian, H.R. (2000), “Buying, sharing and renting information goods”, The Journal of Industrial Economics, Vol. 48, pp. 473‐88.

Wang, S. and Zhu, J.J.H. (2003), “Mapping film piracy in China”, Theory Culture Society, Vol. 20, pp. 97‐125.

Wee, C.‐H., Ta, S.‐J. and Cheok, K.‐H. (1995), “Non‐price determinants of intention to purchase counterfeit goods: an exploratory study”, International Marketing Review, Vol. 12, pp. 19‐46.

Wilcox, K., Kim, H.M. and Sen, S. (2009), “Why do consumers buy counterfeit luxury brands?”, Journal of Marketing Research, Vol. 46, pp. 247‐59.

Wolfe, S.E. and Higgins, G.E. (2009), “Explaining deviant peer associations: an examination of low self‐control, ethical predispositions, definitions, and digital piracy”, Western Criminology Review, Vol. 10, p. 43.

Wolfe, S.E., Higgins, G.E. and Marcum, C.D. (2008), “Deterrence and digital piracy a preliminary examination of the role of viruses”, Social Science Computer Review, Vol. 26, pp. 317‐33.

Yang, D., Sonmez, M., Bosworth, D. and Fryxell, G. (2009), “Global software piracy: searching for further explanations”, Journal of Business Ethics, Vol. 87, pp. 269‐83.

Zentner, A. (2006), “Measuring the effect of file sharing on music purchases”, Journal of Law & Economics, Vol. 49, pp. 63‐90.

Zimerman, M. (2011), “E‐books and piracy: implications/issues for academic libraries”, New Library World, Vol. 112, pp. 67‐75.