Shariffah Zamoon and Shawn Curley Last Revised: January 31, 2006 Ripped from the Headlines: What Can Popular Press Teach us about Software Piracy? Abstract Technological advances have outpaced the development of laws and norms to govern their acquisition and use. Software piracy is an instance of unauthorized duplication where laws and norms are not agreed upon. Although many articles have been written around the issue of software piracy, few have taken into consideration social and psychological aspects of the process. One barometer of the social environment is media coverage. This paper presents a content analysis (including actual quotes) of the five highest circulating U.S. newspapers 1989-2004 as evidence of the prevailing social environment surrounding software piracy. We classified the rationales for and against piracy using Fiske’s (1991) structures for social interaction and found that those who condone piracy mostly evoke authority ranking and market pricing models, whereas those who condemn piracy mostly evoke market pricing models. Furthermore, not all the rationales given for/ against software piracy fit neatly into Sykes and Matza (1957) neutralization framework. Page 1 of 50 Shariffah Zamoon and Shawn Curley Last Revised: January 31, 2006 1.0 Introduction The development of technologies has outpaced the development of laws and norms that regulate their acquisition and use. The unauthorized duplication of digital products is an instance of this problem. Digital products are information that “can be digitized— encoded as a stream of bits” (Shapiro and Varian 1999, p.3). Digital products are compact, portable, and can be used virtually anywhere. However, the unauthorized duplication of digital products has created a gray area in the ethical landscape, where some condone the practice as legitimate while others condemn the practice as outright theft. Software, as an instance of a digital product exemplifies this situation well. Software piracy is defined as any reproduction of software that is in violation of its licensing agreement. The very term expresses a moral position, that espoused by the software industry. According to this view, piracy is stealing, it is a crime, and it is unethical. This is also the position expressed by the movie industry in ads against downloading films, another digital product. As ads on some currently sold DVDs state in subsequent frames and graphically: “You wouldn’t steal a car/ handbag/ television/ DVD.” The ads follow sequentially with “Downloading pirated films is stealing…Stealing is against the law…Piracy is a crime.” In opposition are those who question the immorality of software piracy, as well as its illegality. The question even arises as to whether software piracy is rightfully considered a moral issue at all. The research reflects this moral ambiguity as well. Advocates of digital property rights like the Business Software Alliance (BSA) claim that “under the U.S. Copyright Law, anyone who reproduces a software program in violation of a license agreement is guilty of committing infringement [a.k.a. piracy]” (Majors 2005). Advocates of digital property rights maintain that digital piracy costs billions of dollars in revenues, wages, jobs, and taxes for the U.S.A. alone ( Serafini 2001; AutoDesk 2002; Plagiarism.org; Business Software Alliance 2004). Evidence like this has led some researchers to construe piracy as a problem (Vitell and Davis 1990) and has led to proposed technical solutions to remedy its occurrences (Herzberg and Pinter 1987; Potlapally 2002; Naumovich and Memon 2003). This normative approach is also grounded in the legal argument that it is Page 2 of 50 Shariffah Zamoon and Shawn Curley Last Revised: January 31, 2006 unacceptable to copy software without authorization because it violates the rights of the software creator who does not sell ownership of the software but merely licenses its use. On the other side of the issue, some literature has questioned the economic impacts of software piracy by arguing it can be beneficial for a producer to allow piracy for users who have a low willingness to pay (Takeyama 1994; Slive and Bernhardt 1998; Harbaugh and Khemka 2001; Jiang and Sarkar 2003.). People who do not pay (in monetary terms) for software benefit the software producer by increasing the total number of users, thereby encouraging potential users (because of compatibility issues) to legally purchase the software product. Copying materials may also be acceptable because the consequences of the action have benefits in terms of knowledge sharing and societal advancement (Swinyard, Rinne and Kau 1990; Thong and Yap 1998). Unlike stealing of material goods, private individuals and law enforcement show a relatively high tolerance for software piracy1. The practice is also prevalent among certain subgroups. For example, according to Solomon and O’Brien (1991), piracy is blessed with high acceptance among at least some students and, e.g. : “nearly half of the students had never heard a faculty member speak against illegal copying…a quarter of the sampled students had heard a faculty member condone the copying of protected software” (p. 174). The moral ambiguity of software piracy is further highlighted by the research of Strikwerda and Ross (1992), Logsdon, Thompson and Reid (1994), and Glass and Wood (1996) who have shown that piracy is not viewed as an ethical issue by some. Individuals may approach duplication as a preference choice, with no principles, norms, or values being brought to bear on the decision (Glass and Wood 1996). Because there are no agreed upon standards or norms to govern the acquisition and use of software, individuals are left to their own decision-making processes which vary significantly. To decide the issue of software duplication, an individual might consult the legal system (Laczniak 1983), review academic findings, or look for input from public opinion on the subject (Blasi 1980). 1 See discussion on “corruption” by Braithwait (1989) and Leaf (2002) in Ashforth and Anand 2003, p. 6. Page 3 of 50 Shariffah Zamoon and Shawn Curley Last Revised: January 31, 2006 The first potential guide for ethical behavior is the legal perspective. However, the legal perspective is ambiguous in this area: “While the law in most countries is confusing and out of date…the legal position in the United States, for example, has been confused further by the widely varying judgments handed down by U.S. courts” (Forester and Morrison 1994, p. 7). The following excerpt of a law review details a few of the legal ambiguities. The peculiar nature of computer software is such that it eludes legal classification as a good or an intangible… the peculiar technology of the software industry is that many arrangements for the transfer of software resemble service contracts or are not structured as traditional sales… Software is unique because it has both tangible and intangible elements (Some aspects of computer software—such as written or printed program copies are printed forms of object and source code—clearly appear to be tangible. Other aspects of software—programmer’s function, internal design, and machine readable binary form stored in computer memory in the form of electrical signals or magnetization—seem to be intangible)…The current legal status of computer software is confusing and ambiguous and threatens to become even more so as new technology develops and computer use becomes more widespread. (Horovitz 1985, p. 130-144). In the absence of a clear, unified legal guideline (Burk 2004), an individual might look to academic findings on the subject. One approach taken in academic studies of piracy has been to implicitly adopt the corporate view: focusing on modeling the piracy behavior (Takeyama 1994; Slive and Bernhardt 1998), exploring individual differences (Doesn’t Everybody do it? 2001), and proposing technical solutions to reduce the behavior (Herzberg and Pinter 1987; Potlapally 2002; Naumovich and Memon 2003) including the development of pricing strategies that minimize piracy’s effect (Sundararajan 2003). Other research has been open to other perspectives, e.g., studying the disparity in copyright enforcement between groups and individuals (Harbaugh and Khemka 2001), and the possibility that piracy may be beneficial to software manufacturers (Conner and Rumelt 1991; Jiang and Sarkar 2003). Thus, the moral ambiguity of software manifests itself in both the legal arena and the academic literature. Before discussing the third prospective guide to ethical behavior, we also note that academic literature uncovers a need for a general understanding of the social and Page 4 of 50 Shariffah Zamoon and Shawn Curley Last Revised: January 31, 2006 psychological drivers to piracy. Why do people copy software products? How do people defend their decision to or not to duplicate software? The current research addresses these questions while approaching the moral outlook of software piracy from the third perspective: public opinion on the subject. Thus, the overarching purpose of the paper is to analyze reports of piracy in the press as a reflection of public opinion. We employ content analysis to press reports of software piracy, analyzing the text of articles to reveal rationales cited for and against unauthorized software duplication. This method is grounded in the theory of the social construction of reality (Burger and Luckmann 1967). Newspapers, as a societal communication outlet, reflect software piracy’s social construction, how it is created and agreed upon in the public’s mind. Being a decision with social underpinnings, we use two social theories in the analysis of these rationales. First, social relations theory (Fiske 1991) provides a basis for describing different perspectives underlying the rationales. Second, since there exists a clearly predominant corporate position that unauthorized duplication of software is not acceptable, the rationales could be organized relative to this position. Consequently, we investigate the application of Sykes and Matza’s (1957) theory of neutralization, which was developed to explain rationalizations to socially unacceptable behaviors, in this more ethically ambiguous situation of software piracy. In the theory, techniques of neutralization are argument(s) or rationalizations used to explain circumstances for the temporary removal or suspension of an otherwise accepted norm (or, in this case hypothetically the corporate position), to legitimize one’s actions in order to rebut accusations of wrongdoing. The methodology used, content analysis of newspaper articles detailing piracy occurrences, is an application of an existing investigation method in a new technologyenabled area. The specific objectives of applying this methodology are: 1) to describe instances of software piracy and analyze the rationales for and against; 2) to apply Fiske’s (1991) social relation theory to understand the differences for and against software Page 5 of 50 Shariffah Zamoon and Shawn Curley Last Revised: January 31, 2006 piracy; and 3) to examine the application of Sykes and Matza’s (1957) neutralization framework in a more morally ambiguous situation, one in which there is a clear corporate position but no generally agreed societal norm. In doing so, our research will contribute to a better understanding of the reasoning and justifications surrounding piracy acts. The paper is organized as follows: Section 2 highlights relevant literature in developing the research questions; Section 3 explains the content analysis methodology; an analysis of findings is presented in Section 4; and Section 5 contains conclusions and directions for future research. 2.0 Literature and Research Questions The theoretical background in this section draws on literature from ethical decisionmaking, social construction, and neutralization. Zamoon and Curley (2005) provide a more complete descriptive theory of the ethical decision-making processes involving technology. This section highlights the key points of that account as it relates to the current study. Software piracy involves individuals making ethical decisions. Ethical decision-making “involves moral justification of the decision” (Miner and Petocz 2003, p. 12)2. Research focused on ethical decision-making has highlighted three key points. First, ethical decision-making relies on applying principled reasoning to the question situation. Second, ethical decision-making carries consequences for others than the decision maker (i.e. there is a social aspect). Third, ethical decision-making will not be activated unless an individual recognizes the moral component of the situation. The theoretical bases in this section are organized around these three features of ethical decision-making. 2 In this paper the words ethical and moral are used interchangeably. Page 6 of 50 Shariffah Zamoon and Shawn Curley Last Revised: January 31, 2006 2.1 Applying Principled Reasoning The first distinguishing feature of ethical decision-making is the use of principled reasoning. In an ethical decision-making process, an individual brings forth norms and principles to assess the degree of right or wrong as a guide to action. “Right” and “wrong” are social constructs that are heavily bound to locale and time (Berger and Luckmann 1967). In the case of software duplication these social constructions are illdefined in the present time. It is not clear how individuals are making decisions, or what principles are being brought to bear on the situation. This leads to our general research question. General Research Question: What are the rationales cited for and against software piracy? This research question motivates the methodology applied in the study. We perform a content analysis of newspaper articles that argue for and/ or against unauthorized duplication of software. The newspaper rationales are understood to mirror the prevailing views on software piracy (their use is further explicated in Section 3). As such, the reported reasons stated for and against software piracy provide a useful aid for understanding social attitudes surrounding this issue of ambiguous moral standing. To provide a more precise and theoretically grounded analysis of these rationales, two theories are applied. These arise from the two other features of ethical decision-making and are introduced in the next two sections. 2.2 Realizing Social Component(s) The second distinguishing feature of ethical decision-making is its social component. Ethical decision-making carries consequences for other than the decision maker (Rest, Bebeau, and Volker 1986). Since key points of ethical decision-making have ties to a social component, an approach grounded in social construction is suggested. The social construction of reality as articulated by Berger and Luckmann means that reality is what a group of people agree that it is and is real in its consequences (Berger and Luckmann Page 7 of 50 Shariffah Zamoon and Shawn Curley Last Revised: January 31, 2006 1967; Kunz and Jaehne 1983). Indeed, ethics (or morality) itself is a social construction, because “morality is not constructed in the mind of any one individual—as individual cognitive operation—but negotiated among individuals, deliberated, and arrived at through agreement” (Rest, Narvaez, Bebeau and Thoma 1999, p. 301). Social problems are “what people think they are” (Fuller and Myers 1941, p. 321). They are socially constructed (Schneider 1985), and they emerge as a collective definition of the problem is built and legitimized through social influence (Schoenfeld, Meier, and Griffin 1979; Schneider 1985). As the product of a social construction, rationales for and against software piracy arise from the social worldview that is applied to their construction. This observation motivates the application of Fiske’s (1991) social relation theory to these rationales. Fiske’s theory posits that there are four basic social models by which people understand and respond to each other’s actions. Those models are: communal sharing (CS), authority ranking (AR), equity matching (EM), and market pricing (MP). Communal Sharing is a model in which no one participant is distinguished from another in the group. Membership is duty-based having a sense of altruism, consensus, and kinship. Benefits are distributed among members based upon need. A member who sets out to distinguish him/herself from others in the group is considered wrong. The punishment for such an act is (for example) excommunication to signal the member’s defilement. Authority Ranking is a hierarchical model of interaction that values the charismatic leader and obedience to him/her. Privilege is used to distribute benefits according to a chain of command. In AR, it is wrong to defy the hierarchy. Privileges are further reduced and distance between subordinate and leader are increased as punishment. Equity Matching is characterized by distinct peer members that contribute and take turns in interactions. Reciprocity is valued and it is wrong to unequally distribute benefits or harms. Market Pricing is characterized by a rational system of exchange to coordinate interactions. In this market, values are determined by (for example) price and utility. Agreement is considered important. Taking advantage through violating proportional equality is wrong. Page 8 of 50 Shariffah Zamoon and Shawn Curley Last Revised: January 31, 2006 In explaining models of interaction Fiske stated that “Language is an important medium for the conduct of relationships” (cited in Haslam 2004, p. 12). Fiske’s assertion lends further credence to the content analysis investigative method. In Fiske’s theory, culture can influence which model of social interaction is prevalent in a particular domain and how that model is manifested in daily life. In the U.S. (for example) labor interactions are usually dominated by MP models, in which negotiation and mutual agreement are reached. Whereas EM is the model of choice for sporting events, because both teams have an equal number of players and who goes first is determined by drawing straws or a coin toss. Fiske also maintains that models of social interaction are arranged along a continuum. Bases for the order along the continuum are the tradeoffs between the degree of flexibility (precision of coordination) versus “the differential costs of collecting and storing information necessary to use each model, the differential costs of making the calculations necessary to use each model” (Haslam 2004, p. 23). The model with the most flexibility and least tracking of information/ calculations is CS followed by AR and EM each having increasingly less flexibility and requiring more mental involvement. The model of least flexibility (i.e. having most precision) and requiring most information and mental accounting is MP. As this paper strives to describe the complete phenomenon of software piracy (as presented by American popular press), it is necessary to compare rationales from both positions on the issue to answer the following research question. Research Question (1): Are proponents on both sides of the piracy issue arguing their position using similar types of arguments with respect to Fiske’s (1991) models? The answer to this question can reveal if people are arguing the same point. For example if the focus of the difference is from a single market pricing position, then solutions Page 9 of 50 Shariffah Zamoon and Shawn Curley Last Revised: January 31, 2006 focusing on the economic factor can be pursued. If, however, there is a disconnect where one side is arguing from (say) a market pricing standpoint and the other position deals with communal sharing perspective, then more research may be required in order to bring all interested parties into the same area for collaboration. Relying on Fiske’s interpretation of interaction models, we make the following predictions. On the one hand, we expect those who condone piracy to have mostly communal sharing rationales in an effort to achieve the most flexibility. On the other hand, we expect those who condemn piracy to strive for more control and hence have more market pricing rationales. We expect those who condone piracy to rely on CS because community members may feel a duty to help other members of their group due to feelings of cooperation and generosity. Reasons for condoning piracy should decrease along Fiske’s continuum as individuals who condone piracy are more likely to value flexibility most and be least concerned with keeping track of usage. Those who condemn piracy are expected to view unauthorized duplication as an unfair system of exchange which violated proportional equality (i.e. they are not being paid fairly for their work). The trend along Fiske’s continuum is expected to be increasing as those who condemn piracy are interested in retaining control over their products and preserving their rights (i.e. knowing who has or has not paid for using the product). 2.3 Recognizing a Moral Issue The third feature of ethical decision-making is recognition of a moral issue. For an individual to apply principled reasoning to a decision situation, an individual must activate ethical decision-making processes. Moral intensity of an issue, which is “the extent of issue-related moral imperative” (Jones 1991, p. 372), is one way of classifying situational features that impact whether the individual invokes ethical principles in the decision-making process. Even though the moral intensity of a situation may push an individual to activate ethical decision-making schema, neutralization techniques may counter that force. Neutralization techniques are arguments or rationalizations used to explain circumstances for the temporary removal of an otherwise accepted norm, and/ or Page 10 of 50 Shariffah Zamoon and Shawn Curley Last Revised: January 31, 2006 qualify its suspension to legitimize one’s actions in order to rebut accusations of wrongdoing (Sykes and Matza 1957). Whether considered as part of the decision process or as a post-rationalization, neutralization techniques serve to reduce the moral intensity of the situation. This theory thus provides a tool for analyzing both pro and con rationales as reflecting the accepted moral intensity. Sykes and Matza organized neutralization techniques into a framework of 5 types: denial of responsibility, denial of injury, denial of victim, condemnation of the condemners, and appeal to higher loyalty. In denial of responsibility the perpetrator exploits society’s distinction between intentional and unintentional outcomes, where being forced to do something by other people or circumstances can reduce culpability. Example statements may include “I didn’t mean it.” In denial of injury the perpetrator proclaims that no harm is done, so no consequences should be exacted. Example statements may include “I didn’t really hurt anybody.” In denial of victim the perpetrator describes the negative action as a due punishment. Example statements may include “They had it coming to them.” In condemnation of condemners the perpetrator shifts focus from the negative act to the behaviors and motives of those who disapprove. Example statements may include “Everybody is picking on me.” In appeal to higher loyalty the perpetrator maintains the negative action was in compliance with another norm that outweighs the violated one. Example statements may include “I didn’t do it for myself.” In 2005 Zamoon and Curley theoretically expanded Sykes and Matza’s (1957) work by showing that for each neutralization technique there exists a counter neutralization technique that could amplify the moral intensity of a situation. Counter neutralization techniques include: accepted accountability, expectation of injury, fairness of system, equality of condemnation, and reduction to self interest. In accepted accountability the perpetrator is challenged on the basis of his/ her choice and the existence of alternatives. Example statements may include “You are responsible, you did mean it. There were alternatives you chose not to pursue.” In expectation of injury the perpetrator is challenged on the logical expectation of injury. Example statements may include “You Page 11 of 50 Shariffah Zamoon and Shawn Curley Last Revised: January 31, 2006 did hurt somebody.” In fairness of system the perpetrator is challenged on the basis of the appropriateness of the existing system. Example statements may include “Law, not vigilantism, is fair.” In equality of condemnation the perpetrator is challenged based upon equal application of the system. Example statements may include “Everybody is equally picked on.” Finally, in reduction to self interest the perpetrator is challenged based on the higher loyalty claimed to be served. Example statements may include “You did this for yourself, the higher loyalty is not justified as people are worse off because of your action.” This paper is the first where neutralization and counter neutralization have been applied to technology enabled actions. Compared to other applications of neutralization theory, software piracy is a problem with three unique characteristics that provide additional interest to their potential application in this context. First, norms surrounding software acquirement and use are not obvious/ strong/ rigid, and full monitoring of software duplication is not possible at this time. These circumstances, according to Robinson and Kraatz (1998), contribute to the ability to neutralize. Second, software duplication usually occurs at a distance from the owner’s site. According to Sama and Shoaf (2002), when decision-makers are removed “psychically and physically from the very stakeholders their decisions impact,” the perceived harm can be minimized (p. 94). The third feature is particularly important for the application of neutralization theory in our methodology: Software piracy does not carry a stigmatizing criminal concept. Established social problems whose values have been codified into law carry consequences not only in the possible fines and incarcerations they exact, but in creating a stigmatizing criminal concept (Minor 1981). Software piracy differs from other types of value violations where neutralization theory has been applied because of its moral ambiguity. The original framework was developed around delinquent acts in the physical world at a time when technology was not as pervasive in daily interactions, and for situations where clear norms existed to judge the appropriateness of an action. As such, the second research question investigates the application of Sykes and Matza’s neutralization framework to this new area. Page 12 of 50 Shariffah Zamoon and Shawn Curley Last Revised: January 31, 2006 Research Question (2a): Do piracy rationales fit into Sykes and Matza’s (1957) framework? Here we specifically expect to find techniques of denial of injury and condemnation of the condemners heavily used by those who condone piracy. Since software can exist in two (or more) places at once, there is no obvious depravation when an unauthorized copy is made. The fact that there is no apparent loss in value (as opposed to taking a physical object that cannot exist in two places at once) explains the denial of injury expectation. Condemnation of the condemner is expected because of the prevailing culture of the Internet, where everyone is perceived as engaging in the culture of “sharing” via making unauthorized copies of digital materials. For those who condemn piracy we expect a counter neutralization of expectation of injury to emerge. We believe that those who condemn piracy will argue that pirates commit unauthorized duplication knowing that producers will lose money. We also expect representation in the reduction to self interest counter neutralization, because those who condemn piracy will not be convinced by the appeal to higher loyalty arguments. It is not only important to recount instances of neutralization and counter neutralization, but to compare the discourse using that framework. This leads to our final research question for this paper. Research Question (2b): Are proponents on both sides of the piracy issue arguing their position from similar neutralization techniques? We expect neutralization and counter neutralization techniques to be slightly mismatched around the public discourse surrounding piracy. We believe that those who condone piracy will favor denial of injury and condemnation of the condemners, whereas those who condemn piracy will favor expectation of injury and reduction to self interest. Page 13 of 50 Shariffah Zamoon and Shawn Curley Last Revised: January 31, 2006 3.0 Methodology Ethical decision-making relies on applying norms that are socially constructed and agreed upon. As such, the very social nature of ethical decision-making points to the viability of using media coverage as a data source, where problems garner for attention and legitimization. Printed media are selected for their prevalence, their availability, and their previous use in such analysis. As Adelman and Verbrugge (2000) explain “Newspapers are an accessible, non-transient form of media. They are inexpensive, have broad public use and can be read and reread” (347). News media not only construct the problem and build the needed support (Blumer 1971; Schoenfeld, Meier, and Griffin 1979; Schneider 1985, Yankelovich 1991/ 1992), but also politicians and social advocates “use their newsmaking power to channel the coverage to social problems into a definite direction” (from Molotch and Lester 1974 cited in Fishman 1978, p. 541). Because the purpose of this paper is to describe the social construction of piracy emphasizing its underpinnings at the societal level, it is natural to analyze how newspapers present such a topic3. Precedence for this type of newspaper analysis is found in many fields, including management, political science, healthcare, and criminology. In a study of organizational failure, an analysis of newspaper and scholastic articles was used to support interviews (Northrup 1990). Another study used newspaper articles to research the friction between U.S. and Japan (Budner and Krauss 1995). Adelman and Verbrugge (2000) analyzed newspaper articles to show a lifecycle of disease coverage that matched trends in the diseases’ mortality, pervasiveness, and frequency. Newspaper analysis has long been employed to uncover trends in and perception on crime and social unrest (e.g. Inverarity 1976; Sheley and Ashkins 1981; Pritchard 1986; Olzak 1989; Stallings 1990; Kruger and Pischke 1997), as well as define new problems (e.g. Schoenfeld, Meier, and Griffin 1979). In this vein, such analysis is particularly relevant in the present context. How does a society construct a problem and decide its (ethical) solution? 3 In this analysis we do not delve into processes of news creation, selection, or how owners of media outlets can influence what is published (Schudson 1989; Gamson, Croteau, Hoynes, and Sasson 1992; Lau 2004). Page 14 of 50 Shariffah Zamoon and Shawn Curley Last Revised: January 31, 2006 3.1 Data Sources and Collection Procedures The “newspaper that is not read ceases to be an influence in the community. The power of the press may be roughly measured by the number of people who read it” (Park 1923, p. 274). Hence, to begin the analysis we used the World Almanac and Book of Facts for the years 1991-2003 to find the top U.S.4 daily newspapers by circulation. Except for 1989, the top five newspapers were consistently: USA Today, the Wall Street Journal, the New York Times, the Los Angeles Times, and the Washington Post. For most years, the Wall Street Journal had the largest circulation (until 2001) followed by USA Today, the New York Times, the Los Angeles Times, and finally the Washington Post. The next step was to decide on a search engine and identify the search term. The five newspapers were not listed with a single academic search engine; so, the search for articles was split into two sub-searches. Articles from USA Today, the New York Times, and the Washington Post were identified and retrieved using the Lexis Nexis5 Academic Search Engine. The Wall Street Journal and the Los Angeles Times articles were identified and retrieved using the ProQuest6 Online Information Service. Upon reviewing the publication coverage period for each newspaper, it was clear the researchable timeframe could begin no earlier than January 3, 1989. We also elected to limit our search by an upper bound of December 31, 2004. Having decided the publications to include and the timeframe of study, we identified the search term of “software piracy” to be entered as an autonomous search item into both Lexis Nexis and ProQuest. We were careful to select only articles with full text within our timeframe. According to the automated search of publications, the first appearance of the term “software piracy” in the popular press was in the Washington Post on May 16, 1983. We have considered this article the public’s first exposure to the piracy issue. As the Washington Post had 3 software piracy articles or less per year between 1983 and 1989, we consider this a validation of our research timeframe. Automated search engines 4 Previous research has shown that piracy has ties to cultural context (e.g. Swinyard, Rinne and Kau 1990; Whitman, Townsend, Hendrickson, and Rensvold 1998; Kwong, Yau, Lee, Sin, and Tse 2003). Consequently, we have limited the context of this research to the culture of the U.S.A. 5 Available at http://web.lexis-nexis.com/universe/ 6 Available at http://www.il.proquest.com/proquest/ Page 15 of 50 Shariffah Zamoon and Shawn Curley Last Revised: January 31, 2006 identified a total of 432 articles from the five newspapers. Of those articles 37 were discarded due their “Information Bank Abstracts” source7, which was not one of the five newspapers being analyzed. A further 3 articles were discarded because each was a duplicate (appearing in the same publication on the same date and page)8 of an article already included in the analysis. Figure 1 shows a cumulative graph of frequencies of software piracy articles by year. Figure 1: Frequencies of Software Piracy Articles by Year. Number of Software Piracy Articles Jan 1989- Dec 2003 50 45 40 35 30 25 20 15 10 5 0 1988 1990 1992 1994 1996 1998 2000 2002 2004 2006 Year Adelman and Verbrugge (2000) contended that media reports (concerning disease) followed an emergence, maturation, decline, and death lifecycle. Emergence represented when a disease is first defined; maturation represented when a disease was taken for granted; and death / decline represented when the epidemiological rates (as well as newspaper coverage) fell unless there was resurgence. Looking at the aggregated figures of piracy coverage in our selected coverage window (Figure 1), it appears that the late 7 Lexis Nexis was unable to identify the source of the error. Articles that were a full or partial reproduction of an existing article appearing on a different day or page were analyzed as a new exposure to the software piracy topic. 8 Page 16 of 50 Shariffah Zamoon and Shawn Curley Last Revised: January 31, 2006 1980s and early 1990 were the emergence period for piracy coverage in newspapers. In 1990s the topic of piracy matures with the number of overall citations peaking in 1995. Review of the analysis pool of articles revealed: 86 instances where piracy was not a focus of the article (irrelevant mention), 93 articles that gave no rationales, and 20 retrievals that were not articles but summary or index pages. The rightmost column of Table 1 shows the number of articles included in content analysis by publication. The final dataset consisted of 193 articles for coding. Table 1: Articles Analyzed for Piracy Rationales by Publication Publication Articles identified by Search Engine Incorrect Source or Duplicate Summary Page Irrelevant Mention No Rationale Net Coded Articles Wall Street Journal 44 - - 10 6 28 USA Today 51 - - 15 19 17 New York Times 197 39 19 32 34 73 Los Angeles Times 39 1 - 4 8 26 Washington Post 101 - 1 25 26 49 3.2 Data Coding We coded both rationales for piracy and rationales against piracy. Categorizing procedures included parsing the text and assigning it to categories of meaning, which were then tied to theoretical underpinnings and emergent themes. As such, before constructing categories we read approximately 25% of the newspaper articles (with representation from each publication) to get a sense of relevant themes. This provided a stability check for saturation of the categories. We constructed parsimonious categories that reflected the research purpose /questions, were based on the data, were independent, mutually exclusive and exhaustive, and that connected to theoretical underpinnings (see Page 17 of 50 Shariffah Zamoon and Shawn Curley Last Revised: January 31, 2006 Appendix A for ties of the constructed categories to existing literature). We also incorporated a catch-all category at the end of both sets of rationales in case there were elements of the articles that related to social perceptions of piracy that were deemed significant though not within the constructed categories. The coding goals and approach was based upon several methodological approaches to content analysis (Cohen 1960; Holsti 1969; Hill, Thompson and Williams 1997; Marshall and Rossman 1999), from which we developed the following four step categorizing procedure: 1) We separated utterance or sentence segments in the newspaper article for coding. 2) We identified rationales for and against piracy using cue words to parse newspaper sentences9. In parsing the text, we looked for reasons the author, interviewee, or any entity gave for justifying decisions to or not to duplicate software (either explicit mention of key words, or implicitly inferred from surrounding subject). 3) We used three levels of analysis in applying the coding (Appendix A). For each level counts of articles were calculated. At the top level was the overall number of articles that cited one or more rationales for piracy, and the number of articles that cited rationales against piracy. At the intermediate level were frequencies of rationales that fit into the two digit categories. At the lowest level, we used the three digit subcategories to count frequencies of occurrences. For example, an article may cite making $20 from each copy of software, that it is “cool” to be able to crack piracy prevention mechanisms, that pirates compete to see who has the best cracking skills, and that a pirate becomes “king” among peers after cracking a difficult protection mechanism. The following explains how such a passage was coded for its pro-piracy rationales. The first level of analysis is a count of the number of articles in the pool that cited justifications for piracy, regardless of the type of or number of justifications. For this passage, that would be a count of one. The second level of analysis groups rationales for piracy into 9 Cue words include: because, when, although + but, which is why, reason, claim…etc. Excluded were words that indicated general possibility like: could, might, and possible. Page 18 of 50 Shariffah Zamoon and Shawn Curley Last Revised: January 31, 2006 the major headings. Here, the passage indicates one set of economic (1.3 category) reasons (making the $20) and one set of group dynamics (1.4 category) reasons (piracy is “cool”, competition, and the pirate becomes “king”). The third level of analysis utilizes the within-category classifications. For the passage this means a count of one to be added to monetary gains (1.3.1 subcategory) rationales under the economic heading, and a count of one to be added to the self efficacy (1.4.2 subcategory) rationales under group dynamics, and a count of one to be added to the feelings gained with respect to others (1.4.3 subcategory) rationales under group dynamics heading. 4) We redistributed subcategories of the coding scheme (i.e. the 3-digit subcategories from Appendix A) into the appropriate social interaction mode and neutralization techniques. See Appendix B for grouping of subcategories according to Fiske’s (1991) structures, and Appendix C for grouping of subcategories according to neutralization and counter neutralization techniques. 3.3 Reliability Analysis Procedures Reliability is confirmed through the use of external judges who categorize the data. It is a function of the clarity of categories and categorization instructions, as well as the degree of ambiguity in the wording of the article itself. The extent of agreement between coders was computed by Cohen’s (1960) Kappa coefficient representing the proportion of agreement after chance is removed from consideration. Generally a Cohen’s Kappa of 70% is considered satisfactory. Alternatively, Holsti (1969) used a coefficient of reliability, reflecting the average number of codes in agreement, for which a value of 7580% is considered satisfactory. To check the reliability of the categories, another set of articles was obtained so as not to contaminate the original data set. The articles came from the Chicago Tribune, Houston Chronicle, and New York Daily10. In instruction sessions, each coder received a copy of the coding scheme and sample articles. Coders used the categories and discussed results 10 Both LexisNexis and ProQuest search engines were used. Page 19 of 50 Shariffah Zamoon and Shawn Curley Last Revised: January 31, 2006 with the researcher, where disagreements were resolved by negotiation. The initial reliability ratings were less than optimal (having a coefficient of reliability at 17.04%). The reformulation of categorization instructions and selection of a new judge (Judge B) led to a coefficient of reliability of 67.5% and Cohen’s Kappa of 33.23% in the first round. After meeting with Judge B and discussing cases of categorization disagreement, the coefficient of reliability increased to 89.52% and Cohen’s Kappa to 78.63%, both well within acceptable range. Intra-rater reliability coefficient is the code-recode agreement of the researcher over a random sample of articles (Miles and Huber 1984). The researcher recoded 20 articles (over 10% of the analysis pool, having representation from all publications) 6 weeks after initial coding. Intra-coder reliability was approximately 91% using Cohen’s Kappa, and over 95% using Holsti’s coefficient of reliability. 4.0 Results Of the 193 articles coded, 122 gave rationales for piracy. These rationales were an accumulation of statements from pirates, prosecutors, and even commentaries on piracy issues. The single leading reason for condoning piracy was reducing monetary expenditures, which accounted for over 17% of the cited rationales. Of the 193 articles coded 156 gave rationales against piracy. The leading reason given, capturing over 53% of the citations was the economic hardships that piracy leaves on software producers. In the remainder of this section we present our findings ordered by research question. Research Question (1): Are proponents on both sides of the piracy issue arguing their position using similar types of arguments with respect to Fiske’s (1991) social interaction models? In order to assess how different groups condone or condemn piracy, we compare their arguments using Fiske’s relational models. Generally, rationales against piracy better fir Page 20 of 50 Shariffah Zamoon and Shawn Curley Last Revised: January 31, 2006 into Fiske’s relational models that rationales for piracy. Figure 2 shows how the two groups compare. Figure 2: Comparing Rationales For and Against Piracy Using Fiske's (1991) Social Structures Rationales For Rationales Against 53.23 Percentage of Use in Piracy Articles (1989-2004) 46.83 25.00 17.06 17.06 11.29 10.32 10.08 8.73 0.40 Communal Sharing Authority Ranking Equity Matching Market Pricing Other Social Structures In Communal Sharing those who argued for the unauthorized duplication of software supported their claims using a plethora of reasons, whereas those who argued against the unauthorized duplication heavily relied on one type of rationale to support their argument. Authority Ranking and Equity Matching models were more evenly represented on both sides of the issue. Market Pricing, however, was more often used by those who condemn unauthorized duplication. Although we expected those who condone piracy to have mostly Communal Sharing rationales, Authority Ranking and Market Pricing rationales were more prevalent. Our Page 21 of 50 Shariffah Zamoon and Shawn Curley Last Revised: January 31, 2006 expectation that those who condemn piracy would favor Market Pricing rationales is confirmed. Surprisingly, there are neither descending trends along Fiske’s continuum for those who condone piracy nor ascending trends on the continuum for those who condemn piracy. Now that we have reviewed our general findings on the types of rationales used to defend decisions not/ to duplicate software without authorization, we investigate how these rationales match up on both sides of the issue. Communal Sharing People who argue for the unauthorized duplication of software may invoke Communal Sharing. According to Fiske’s (1991) interpretation the claim here is: since there is a need and we are a community, the need must be filled. There is a strong sense of a compassionate caring morality and wanting to belong. People operating using this model of social interaction can claim they are sharing software in order to benefit one or more people who are currently underprivileged, but who the actor has no specific connection with. A type of Robin Hood rationale emerges where (for example): “ ‘The argument we hear from the pirates is that they are helping the Polish population make contact with the cultures of the world,’ … an argument can be made that homegrown pirates of Western culture were key actors in the collapse of communism …” (Washington Post, Oct 21, 1991) A different type of sharing attitude can occur when the duplicator has a connection with the recipient of the software, and values that relationship stating “A person’s feelings of closeness to a friend take priority over some abstract ethical principle,” (New York Times, Jul 27, 1992) Another example of sharing is where the actor claims that sharing actually helps the producer: “Basically, if it wasn’t for us, you would never see this piece of software” (New York Times, Jul 11, 2002) Page 22 of 50 Shariffah Zamoon and Shawn Curley Last Revised: January 31, 2006 A final exemplar in this Communal Sharing type of social interaction is one that values community aspects of sharing higher than the ownership value of the copyright holder. “to maintain their access [and to be promoted] they [pirates] were required to upload, or provide new copyrighted files, to the library. They could then download files provided by other users” (New York Times, May 5, 2000) People who argue that unauthorized duplication is wrong employ CS by sharing items that were created with that philosophy in mind. For example: “adoption of open-source software will significantly aid in reducing the amount of software piracy” (New York Times, Dec 31, 2001) Authority Ranking The driving force here (according to Fiske 1991) is the need to obey, where it is the responsibility of persons in authority to uphold order so as to protect others. Since there is no enforcement of rules, individuals who condone piracy feel justified in duplicating software without authorization. “Because it lacks any central authority, the Internet is particularly difficult for law-enforcement agencies to monitor for piracy. Some software publishers have taking to calling it the ‘home shoplifting network’ ” (New York Times, Jan 8, 1996) “ ‘Look, if we [IRC administrators] find one channel and close it, they move to another,’ he said. ‘It’s been like this for years. You really can’t stop it.’ ” (New York Times, May 6, 2004) An extreme case of this type of reasoning involves challenging the legitimacy of the law (proposed hierarchy) itself. “publishers provide no legal way for gamers to get older games; the market is too small to justify the effort. So gamers feel justified in making vintage games available [through piracy], despite legal risks” (New York Times, May 18, 2000) Those who condemn piracy feel a need/ responsibility to enforce the rules in two main ways. 1) By pursuing pirates: “Beyond relying on an automated Web crawler that scours the Internet for unauthorized files, alliance investigators also try to snare pirates by gradually building relationships with them, using assumed identities” (New York Times, Jan 19, 2004); 2) By upholding the legitimacy of the rules: “copyright infringement is illegal” (Los Angeles Times Jul 26, 1998) Page 23 of 50 Shariffah Zamoon and Shawn Curley Last Revised: January 31, 2006 It is interesting that those who condone piracy do not obey the copyright law hierarchy, but do obey so called pirate law. One reason to duplicate software without authorization is to maintain a type of raking, where the actor can be revered as the top perpetrator of illegal action. “Many of the pirates say they were motivated less by money than by a sense of competition, prestige … form of bravado that could gain them acceptance in a hierarchical social sphere… ‘It’s all about stature’ … ‘They are just trying to make a name for themselves for no reason other than self-gratification’ … secure their reputations by releasing thousands of free movies, games, music and software programs on the Internet … Warez involve frenzied competition … Couriers are ranked in groups and as individuals with a scoring system ” (New York Times, Jul 11, 2002) Equity Matching The overarching need here is for justice and balance to prevail in interactions (Fiske 1991). On the one hand, some see piracy as legitimate. Here, those who condone piracy maintain that: 1) Software is not a real item, hence taking it is not unjust. “they [software] just don’t quite seem like real things. … belief that products consisting purely of information are somehow different from those you can hold in your hand … if it [piracy] is a crime at all – is one committed in an imaginary realm. The loot is no more real to the takers than the simulated treasure chest in a video game” (New York Times, Dec 16, 2001) 2) There is no loss in value (no harm done), so unauthorized duplication is permissible. “There’s no way on earth I would shell out $60 for LucasArts’ ‘TIE FIGHTER’ game, but if I could get it for free, sure I’d try give it a try. Since I never would have bought it in the first place, my ‘pirated’ copy of ‘TIE FIGHTER’ would actually represent a net loss to LucasArts of $0” (Los Angeles Times, Nov 17, 1994) 3) There is no way to distinguish those who are unjust from those that are just, so unauthorized duplication is permissible. “’It’s very easy to be anonymous on the Internet because there are so many points of entry,’ Mr. Fancher said. Although each transaction into and out of a bulletin board is recorded by the system, he said: ‘even if you trace it back, it’s not like a phone number. You can’t determine the user’s identity because all you can know is the point of entry’ ” (New York Times, Apr 9, 1994) 4) Since everyone is participating in the injustice, it is permissible. “everyone was doing it [pirating software]” (Washington Post, Dec 23, 1999) Page 24 of 50 Shariffah Zamoon and Shawn Curley Last Revised: January 31, 2006 On the other hand, some see piracy as an unequal treatment or distribution of benefits where some do not pay for products they use. By not paying, it is not a fair deal. It’s not fair to the software producer because non-paying consumers are denying payment in the present as well as detracting from future products. It is not fair to non-paying consumers because they are not getting a fully working product. “copying software and selling it or giving it to somebody else amounts to stealing. … ‘It is outright theft’ ” (Washington Post, Aug 23, 1995) “ ‘When software companies are hurt by pirates, they are less likely to innovate, depriving consumers of new innovations.’ … ‘Every dollar used to combat piracy is a dollar not spent on the development of new products’ ” (Washington Post, Dec 12, 2001) “if professional people use unlicensed software, they are just silly. They need the manuals and technical support you get if you purchase the license” (Los Angeles Times, Jul 23, 1998) “any second-hand or bootlegged software might well contain a virus or other contamination that can interfere with normal operation of the computer” (Washington Post, Mar 14, 1992) “much of the fake software is bug-ridden” (USA Today, Aug 1, 2001) “ ‘Software is not just the code that comes with it,’ said Ms. Slocum of Macromedia. ‘Software is also the technical support, the customer service, the upgrades’ – extras that are largely unavailable to users of illegal versions ” (New York Times, Jan 19, 2004) Market Pricing The focus of MP is agreement upon proportional contribution. Those who condone piracy claim that not having enough money to pay for the product, or the product’s unnecessarily high price excuses the action. “problem stems from lack of government funds appropriated specifically to buy legal software … It is unrealistic for government agencies to invest large amounts to buy legal software” (Los Angeles Times, Jul 12, 1995) To those who disagree with piracy, getting a pirated product is not a bargain, it is theft. 1) It costs money to produce software. “cost U.S. hardware and software companies nearly $3 billion in lost wages, tax revenues and retail sales last year” (LA Times, Jul 24, 1999) 2) Piracy influences an entire industry. Page 25 of 50 Shariffah Zamoon and Shawn Curley Last Revised: January 31, 2006 “The widespread piracy doesn’t just hurt big companies such as Microsoft; China’s own fledgling software industry can’t grow if companies’ efforts are stolen and distributed by pirates … lost market share on the mainland ” (Wall Street Journal, Oct 27, 1995) 3) Piracy amounts to a loss of assets. “There is a growing recognition {in the government} of the importance of intellectual property to our economy and general way of life” (LA Times, Jul 24, 1999) Other A group of rationales condoning piracy did not fit into Fiske’s social interaction models. Among other elements were deflecting responsibility, non-complicated nature of the process, and location where the act of duplication was committed. Another group of rationales cited against piracy did not fit into Fiske’s models of social interaction. This group included acknowledgment that unauthorized duplication is immoral, and that the action of piracy can have links to organized crime and even national security implications for sensitive application software. Research Question (2a): Do piracy rationales fit into Sykes and Matza’s (1957) framework? We expected to find techniques of denial of injury and condemnation of the condemners heavily used by those who condone piracy. While condemnation of the condemners is confirmed to have the most representation, denial of injury was surprisingly low (lower than both appeal to higher loyalty and denial of responsibility even!). For those who condemn piracy we expected counter neutralizations of expectation of injury and reduction to self interest to emerge. Expectation of injury and equality of condemnation had the most representation, while reduction to self interest had relatively low representation. Denial of Responsibility Vs. Acceptance of Accountability Neutralizations Here, persons defended software piracy by blaming others for their actions. Rationales included: blaming software producers for not including anti-copy mechanisms, and Page 26 of 50 Shariffah Zamoon and Shawn Curley Last Revised: January 31, 2006 blaming organizations for either not having tracked illegal copies of software or not providing the means to purchase legitimate software. For example: “We’re a rapidly growing company so the control is probably not what it should have been” (Los Angeles Times, Nov 15, 1996) “their salespeople were tricked into giving away the unlicensed software” (Los Angeles Times, Oct 31, 1995) “It was essentially an oversight by the data processing personnel who were not at all paying attention to the duplication of software” (New York Times, Jul 16, 1997) Counter Neutralizations Those who disagree with software piracy point out that there are alternatives to unauthorized duplication. For example: “adoption of open-source software will significantly aid in reducing the amount of software piracy” (New York Times, Dec 31, 2001) Denial of Injury Vs. Expectation of Injury Neutralizations Because more blame is assigned to people whose action result in more severe outcomes than those with lower consequences (Daley and Zane 1982), some articles highlighted the fact that software piracy caused no real damage. That is, the individual wouldn’t have bought the program (regardless of the cost), and software producers make plenty of money. Some articles even acknowledged that piracy may be considered inappropriate, but contended there was no profit from the activity. Such articles seemed to suggest that since there was no monetary gain for them, the act was not/ should not be considered offensive. For example: “Software liberationists contend that the crime is victimless” (New York Times, Dec 16, 2001) “claimed [hacking] was an effort to point out security flaws” (Washington Post, Jul 31, 1995) “defended ‘ware zing’ expensive software as a way to try it out before purchasing a legitimate copy” (New York Times, Dec 16, 2001) Page 27 of 50 Shariffah Zamoon and Shawn Curley Last Revised: January 31, 2006 Counter Neutralizations Those who condemn acts of software piracy maintain that unauthorized duplication is harmful to manufacturers and copyright holders in two ways. 1) In terms of lost revenues. For example: “piracy costs the software industry $13 billion a year worldwide in lost revenue.” (Washington Post, Aug 29, 2003) 2) In terms of software industry growth (or lack thereof). For example: “digital pirates ‘put the livelihoods of millions of hardworking Americans at risk and damage our economy’ [said Attorney General John Ashcroft]” (USA Today, Aug 26, 2004) Denial of Victim Vs. Fairness of System This was the least frequent of the neutralization techniques. We might theorize that the reason denial of victim has such a low representation is the fact that people don’t perceive there to be anyone impacted by their unauthorized copying. Neutralizations Neutralization techniques for this type focused upon taking revenge against a villain. For example: “freeing software is a blow against an Evil Empire whose Darth Vader is Bill Gates” (New York Times, Dec 16, 2001) Counter Neutralizations Theoretically, this category should capture utterances that portrayed the current system of copyright and licensing of software as fair. However, no rationales were coded in this category (i.e. the issue of piracy is not argued from this position). Condemnation of the Condemners Vs. Equality of Condemnation Neutralizations The fact the software piracy is described as being common was evident in our content analysis. This could be construed in a manner similar to the condemnation of condemners’ neutralization technique. If everyone is acting in an offensive manner, why Page 28 of 50 Shariffah Zamoon and Shawn Curley Last Revised: January 31, 2006 are only certain individuals being questioned about/ punished for their actions. In that sense it is understood that the reasons for singling one person out are suspect. Some blamed judicial processes for the proliferation of unauthorized duplication. For example: “if downloading has become more popular … that’s because ‘the courts move slower than the criminals’ ” (USA Today, May 14, 2002) “There is also the challenge for law-enforcement agencies of having to interpret copyright and counterfeiting laws written before the arrival of a high-speed communications network. ‘None of our laws were written with the Internet in mind’ ” (NYT, Jan 8, 1996) “federal law is murky on how to treat people who copy and distribute software for free” (WP, Dec 30, 1994) Others blamed inconsistencies of anti-piracy laws. For example: “the company’s e-book decryption software was legal is Russia” (New York Times, Dec 18, 2002) “Italian laws permits copying for personal use and says that applies to corporations.” (Wall Street Journal, Dec 13, 1990) “China has no copyright law of its own and has refused to join the International Copyright Convention. Victims of Chinese piracy thus virtually powerless to stop attacks, and they find little solace in Chinese courts.” (Washington Post, Jan 14, 1989) Still others portrayed unauthorized duplication as a standard behavior. “Everybody else is doing it” (USA Today, Oct 15, 2002) Counter Neutralizations For those who disagree with piracy, condemnation of pirates is justified because piracy laws are equally applied to all, and not everybody pirates software. Examples of equal condemnation include: “[Software Publisher’s Association] will pursue and audit companies that don’t pay for the software they use” (New York Times, Jul 6, 1998) Furthermore, those who condemn piracy see the act as both illegal and immoral. “Just as it’s wrong to walk into blockbuster video, take a movie off the shelf and stick it in your pocket, it is also a crime to download a pirated copy of a movie” (Washington Post, May 18, 2002) Page 29 of 50 Shariffah Zamoon and Shawn Curley Last Revised: January 31, 2006 “It’s just as wrong [as stealing a car]” (USA Today, Aug 15, 1995) Appeal to Higher Loyalty Vs. Reduction to Self Interest Neutralizations Here, some perpetrators seem to place a higher value on membership to a piracy ring than they do on rules that are supposed to govern the acquisition and use of software. This social membership rationale is akin to that discussed in Sykes and Matza where (most often) social membership comprises being part of a gang. The Robin Hood ideology seems to be another instance where perpetrators are driven to commit piracy (or at least allow it) based upon an ideal. In the same spirit, aiding a person in need takes precedence (according to some) over the rules governing software acquisition and use. Following are example excerpts: “pirates accused of trafficking in ‘warez’ …Internet slang for software that has been ‘liberated’ from the protective encryption imposed by its makers and posted free for the taking. Seeing themselves as more Robin Hood than Capital Hook…motivated by ideology” (New York Times, Dec 16, 2001) “A pirate program in China is often referred to as ‘patriotic software,’ out of a belief that it speeds the nation’s modernization at little or no cost.” (Aug 23, 1995) “copied programs to share with friends” (Washington Post, Dec 30, 1994 “elite file-sharing networks typically limit access to savvy hackers who must prove their stripes by contributing hard-to-get material” (USA Today, Aug 26, 2004) Counter Neutralizations For those who believe piracy is wrong, the alternative to the appeal to higher loyalty is that the action is based on self interest. People are worse off because of the action, and the higher loyalty is not recognized/ justified. According to those who condemn piracy, pirates create a multitude of problems. For example: “Pirated programs are more likely to have viruses and flaws than legal software” (New York Times, Aug 24, 1995) “much of the fake software is bug-ridden” (USA Today, Aug 1, 2001) Page 30 of 50 Shariffah Zamoon and Shawn Curley Last Revised: January 31, 2006 “Every copy of bootlegged software shifts profits from legitimate software producers and hinders their ability to invest in new applications” (Los Angeles Times Jul 26, 1998) Ambiguous: Some of the items we coded for do not fit neatly into Sykes’s and Matza’s definition of neutralization techniques. For those who argued for unauthorized duplication the category capturing monetary gains was not placed in any of Sykes and Matza’s techniques. For those who argued against unauthorized duplication issues of who software ownership and copyright as a valuable asset to a software producer. Not Applicable: Some of the items we coded are inapplicable to neutralization and counter neutralization techniques. For example: the process of duplication is not complicated, that proceeds from piracy can support terrorism, that piracy can be committed because of euphoric feelings (among others), there is no technical support with pirated software, and that certain software are restricted by “rogue” nation status (among others). Now that we have reviewed neutralization and counter neutralization techniques, we compare frequencies of the two sets to answer the following question. Research Question (2b): Are proponents on both sides of the piracy issue arguing their position from similar neutralization techniques? To determine to what degree the rationales match up along neutralization and counter neutralization techniques, we refer to Figure 3. Page 31 of 50 Shariffah Zamoon and Shawn Curley Last Revised: January 31, 2006 Figure 3: Neutralizations Counter Neutralizations Percentage of Use in Piracy Articles (1989-2004) 51.61 42.06 27.42 16.67 15.87 10.89 8.73 7.94 7.54 5.24 1.19 0.40 Denial of Responsibility Denial of Injury 4.44 0.00 Denial of Victim Condemnation of the Condemner Appeal to Higher Loyalty Amiguous (doesn't fit neatly) Not Applicable Sykes and Matza's (1957) Techniques of Neutralization Based on Figure 3, we note the mismatch in frequencies of neutralization and counter neutralization types of arguments in the public discourse surrounding software piracy. In fact appeal to higher loyalty vs. reduction to self interest and denial of victim vs. fairness of system are the closest in terms of equal arguments frequencies. Arguments surrounding denial of injury vs. expectation of injury are least matched. 5.0 Conclusions Ethical decisions have been distinguished from other decisions on the bases of the use of principled justifications and of the social nature of ethical decisions. The first of these features leads to the need to examine the arguments used to condone piracy. The second feature leads to grounding the analysis in theories of social construction. The focus of this work was on understanding how piracy is perceived by the public. We deliberately selected piracy as the focus of our study due to its ambiguous moral nature. Page 32 of 50 Shariffah Zamoon and Shawn Curley Last Revised: January 31, 2006 Summary of Findings An analysis of mainstream newspaper articles dealing with software piracy was performed as an indicator of how people within American society think and feel about this subject. Some clear results emerge from our analysis. One of which is the degree of variety surrounding rationales given for/ against software piracy. We recounted instances of rationales for and against the unauthorized duplication of software. We classified the rationales for and against piracy using Fiske’s (1991) structures for social interaction and found that those who condone piracy mostly evoke authority ranking and market pricing models, whereas those who condemn piracy mostly evoke market pricing. The mismatch between the types of rationales points to a disjoint in the public conversation surrounding the issue of software piracy. With respect to Sykes and Matza’s theory of neutralization, it is also clear that not all the rationales given for/ against software piracy fit neatly into Sykes and Matza (1957) framework. Specifically the denial of victim is not addressed. Furthermore, there is a mismatch between neutralizations and counter neutralizations. One of the most interesting findings of this paper has to do with a belief maintained by those who condone piracy that they are not only “not hurting anybody” but that they are in fact “doing good or helping.” Ashforth and Anand (2003) can help us to understand this stance explaining that “ideologies help distance individuals and groups from the aberrant moral stance implied by their actions and perhaps even forge ‘a moral inversion, in which the bad becomes good’.” (Adams and Balfour 1988 cited in Ash forth and Anand 2003 p. 16). Limitations Here, we describe decisions made about how we conducted the research and the issues that resulted. In selecting newspaper articles as the target of our investigation, we note that the media’s role is not merely to report what goes on, but to determine which topics are published and to provide spin that can impact people’s thought processes. Previous academic works have stated that newspapers “not wholly a rational product” (Park 1923, p. 273), and that “Journalists simultaneously create and perpetuate an image of reality when they assemble news products” (Stallings 1990, p. 87). It is also important to state that newspapers reflect [not only the world out there but] practices of those whom have Page 33 of 50 Shariffah Zamoon and Shawn Curley Last Revised: January 31, 2006 power (Schudson 1989). As such, a publication supported by (for example) Microsoft will have an interest in presenting a particular view point of the software piracy issue. Aside from news production, individuals bring their own set of experiences when trying to construct meaning from newspaper articles, where the “relative importance of media discourse depends on how readily available meaning-generating experiences are in people’s everyday lives” (Gamson and Modigliani 1989, p. 9). With the pervasiveness of software piracy, we assume that readers of newspaper articles are already familiar with unauthorized duplication of software as a concept. In that sense, there is a role for the reader of the article such that “people are not ‘cultural dopes,’ passively reading tests as the producers intended” (Gamson, Croteau, Hoynes, and Sasson 1992, p. 388). In selecting content analysis as an investigation tool, we run the risk of span of inferential reasoning (Marshall and Rossman 1999). Here, coders can delve deeply into each sentence searching for possible effects of piracy and thinking of the issue from multiple perspectives. We have controlled for inferential reasoning by targeting the literal surface meaning of the text for coding. Contributions This paper comprises potential contributions for academics and practitioners alike. For academics the paper represents an empirical link between ethical decision-making and neutralization theory. Previous research has shown that neutralization techniques are offense specific (Sykes and Matza 1957; Mitchell and Dodder 1980; Mitchell and Dodder 1983; Agnew 1994; McCarthy and Stewart 1998; Copes 2003). Techniques of neutralization have, for the most part, been applied to serious and violent offences (e.g. Brennan 1974; Minor 1980; Agnew 1994; Alvarez 1997) and the research has been biased towards incarcerated or convicted persons. Neutralization theory has not previously been applied to software piracy, and “reasons why such illegal behavior continues to occur are lacking” (Harrington 2000, p. 83). The closest research has come to examining techniques of neutralization in the information technology field was in an article on cyber loafing (where employees use the Internet for non-business work during Page 34 of 50 Shariffah Zamoon and Shawn Curley Last Revised: January 31, 2006 business hours) (Lim 2002); related is the examination of Neumann and Simpson (1997) about bootlegging music. This took a different approach by searching for closeness to an artist, development of music, and capture of time (infatuation and fetish were also addressed). Furthermore, conflicting results in previous neutralization research can be attributed to: over-reliance on quantitative techniques, where the “dynamic cognitive nature of neutralization suggest that qualitative methods are well suited to test the theory” (Copes 2003, p. 106). As there are no previous studies of software piracy and Sykes and Matza’s techniques of neutralization11 there is no baseline for comparison, hence our qualitative research yields a more complete picture of software piracy. As such, our content analysis of newspaper articles detailing piracy occurrences is an application of an existing method in a new technology-enabled area. In addition, our paper provides actual excerpts of the rationales. In studying the rationales given for piracy researchers can develop and test counter arguments to the justifications for committing piracy, which may help individuals begin to evoke ethical decision making processes and principles when approaching the subject. We believe this paper will help understand tolerance for piracy, and advance understanding for how moral universes are constructed for goods and services that do not fit traditional descriptions. Practitioner contributions include implications for management and law. For example, understanding and challenging12 piracy neutralizations may reduce their acceptance, thereby evolving norms and laws to govern digital technologies; or, based on the neutralizations invoked by users, technology-producing industries may revise pricing structures, protection mechanisms, or create new products. Extensions and Directions for Future Research Using the current data set and noting that there isn’t consistent media coverage for the issue of software piracy, we could use the Department of Justice’s copyright enforcement 11 12 Harrington’s (2000) study used only “Robin Hood” and “responsibility denial” techniques. Gorta 1998 Page 35 of 50 Shariffah Zamoon and Shawn Curley Last Revised: January 31, 2006 records as a secondary confirmatory resource against which to validate the chronological trend analysis13. Another viable extension would be to plot newspaper articles against stages of the social problem14. Alternatively, since it is the awareness of key individuals that makes an otherwise unnoticed situation become defined as a problem (Fuller and Myers 1941), we might address how mass media can spotlight both the people and norms surrounding software piracy. We could also compare media messages across all 5 news sources. As Husted, Dozier, McMahon, and Kattan 1996 argued that cross-national carriers of ethics (such as news media, business education, and travel experience) could alter attitudes about questionable business practices, another use of this data might be to examine how US produced media messages about software piracy are viewed crossnationally. Independent of the current data set, researchers might conduct a content analysis of blogs or other online sources to see if the rationales presented there differ from what we have found in traditional media (Protess, Leff, Brooks, and Gordon 1985). This will particularly be interesting given that, In the e-commerce revolution, millions of dollars are being tossed about. Rules have yet to be written, and those that have aren’t always enforced. No wonder the instances of unethical, even criminal behavior are growing exponentially (Seglin, 2000). In general media research has been shown to impact public opinion (Page, Shapiro, Dempsey 1987; Jordan and Page 1992). Specifically research has confirmed that newspaper coverage can affect policy preferences (Jordan 1993). Hence, another possibility for extending this work includes researching ties of copyright prosecutions and media agenda setting for policies and how those impact public opinion. A final direction for expanding this body of work is to study the rationales given for piracy in order to determine the degree of acceptance of such rationales. 13 14 Technique adapted from Adelman and Verbrugge (2000). Technique from Schoenfeld, Meier, and Griffin (1979). Page 36 of 50 Shariffah Zamoon and Shawn Curley Last Revised: January 31, 2006 6.0 Appendices Appendix A: Theoretical Underpinnings for Coding Categories Rationales FOR copying/ duplicating 1.1 Criminal 1.1.1 Revenge 1.1.2 Facilitator of more serious crimes (Kling 1995; Kwong, Yau, Lee, Sin, and Tse 2003) (Kwong, Yau, Lee, Sin, and Tse 2003) 1.1.3 Supports Terrorism 1.2 Piracy Process Characteristics 1.2.1 Non-complicated 1.2.2 Common (Forester and Morrison 1994; Sama and Shoaf 2002; Kwong, Yau, Lee, Sin, and Tse 2003) 1.2.3 No depravation 1.2.4 Masks identity of perpetrator (Strikwerda and Ross 1992; Allen 1999; Harrington 2000) (Harrington 1989) 1.2.5 Hard to stop 1.3 Economic 1.3.1 Monetary gains 1.3.2 Legally expensive to pursue (Harrington 1989; Forester and Morrison 1994; Kling 1995; Glass and Wood 1996; Shapiro and Varian 1999; Harrington 2000; Nunes, Hsee, and Weber 2004) 1.4 Group Dynamics 1.4.1 Cultural and community aspects 1.4.2 Self efficacy (Neumann and Simpson 1997) (Katz 1988; Kling 1995; Neumann and Simpson 1997) 1.4.3 Feelings gained with respect to others (Kling 1995) 1.5 Helping 1.5.1 Advertising/ Promoting 1.5.3 Helping someone (Takeyama 1994; Slive and Bernhardt 1998; Harbaugh and Khemka 2001; Jiang and Sarkar 2003) 1.5.2 Robin Hood/ taking from rich employers so software can be available to poor (Swinyard, Rinne and Kau 1990; Harrington 2000; Kwong, Yau, Lee, Sin, and Tse 2003) 1.6 Characteristics of Digital Goods 1.6.1 Not real/ intangibility (Thong and Yap 1998; Allen 1999) 1.6.2 Original/ Copy Indistinguishable (Shapiro and Varian 1999; Kwong, Yau, Lee, Sin, and Tse 2003) 1.7 Deficiencies of Law and Enforcement 1.7.1 Judicial Processes (Harrington 1989; Glass and Wood 1996; Ashforth and Anand 2003; Burk 2004) 1.7.3 Restrictions on copying/ no way to legally obtain copies/ 1.8 Miscellaneous 1.8.1 Deflect Responsibility (Harrington 2000; Lim 2002) 1.8.3 Sharing w/ no future purchasing 1.9 Other (Rationale doesn’t fit anywhere else) Page 37 of 50 1.7.2 Location of offense 1.7.4 Ignorance 1.8.2 Sharing w/ future purchasing 1.8.4 Unintentional Shariffah Zamoon and Shawn Curley Last Revised: January 31, 2006 Rationales AGAINST copying/ duplicating 2.1 Economic 2.1.1 Monetary terms (Strikwerda and Ross 1992; Kwong, Yau, Lee, Sin, and Tse 2003) 2.1.3 Foster industry growth (Kwong, Yau, Lee, Sin, and Tse 2003) 2.1.2 Copyrights as Assets 2.2 Alternatives to stealing 2.2.1 Free ware/ Open source software 2.2.2 Other 2.3 Crackdown on Piracy 2.3.1 Pursuing pirates 2.3.2 Links to terrorism/ organized crime 2.3.3 National security 2.4 Effects of piracy 2.4.1 Buggy/ damaged goods/ no quality 2.4.3 Not authentic product 2.4.5 No technical support 2.4.2 Lower innovation (Strikwerda and Ross 1992; Kwong, Yau, Lee, Sin, and Tse 2003) 2.4.4 Hacking/ Viruses 2.5 Illegal and Unethical 2.5.1 Issue of Ownership 2.5.2 Illegal (Swinyard, Rinne and Kau 1990) 2.5.3 Immoral: violation of a value/ unethical/ wrong/ cheating 2.6 Other Rationale doesn’t fit anywhere else Page 38 of 50 Shariffah Zamoon and Shawn Curley Last Revised: January 31, 2006 Appendix B: Grouping Coding Categories According to Fiske’s (1991) Structures of Social Interaction Structure of Social Interaction Communal Sharing Authority Ranking Equity Matching Coding Categories of Rationales FOR Piracy 1.4.1 Cultural and community aspects 1.5.1 Advertising/ Promoting 1.5.2 Robin Hood/ taking from rich employers so software can be available to poor 1.5.3 Helping someone 1.2.5 Hard to stop 1.4.3 Feelings gained with respect to others 1.7.1 Judicial Processes 1.7.3 Restrictions on copying/ no way to legally obtain copies/ 1.2.2 Common 1.2.3 No depravation 1.2.4 Masks identity of perpetrator 1.6.1 Not real/ intangibility Market Pricing 1.3.1 Monetary gains 1.3.2 Legally expensive to pursue Other 1.1.1 Revenge 1.1.2 Facilitator of more serious crimes 1.1.3 Supports Terrorism 1.2.1 Non-complicated 1.4.2 Self efficacy 1.6.2 Original/ Copy Indistinguishable 1.7.2 Location of offense 1.7.4 Ignorance 1.8.1 Deflect Responsibility 1.8.2 Sharing w/ future purchasing 1.8.3 Sharing w/ no future purchasing 1.8.4 Unintentional 1.9 Other (Rationale doesn’t fit anywhere else) Page 39 of 50 Coding Categories of Rationales AGIANST Piracy 2.2.1 Free ware/ Open source software 2.3.1 Pursuing pirates 2.5.2 Illegal 2.4.1 Buggy/ damaged goods/ no quality 2.4.2 Lower innovation 2.4.3 Not authentic product 2.4.4 Hacking/ Viruses 2.4.5 No technical support 2.5.1 Issue of Ownership 2.1.1 Monetary terms 2.1.2 Copyrights as Assets 2.1.3 Foster industry growth 2.3.2 Links to terrorism/ organized crime 2.3.3 National security 2.5.3 Immoral: violation of a value/ unethical/ wrong/ cheating 2.6 Other (Rationale doesn’t fit anywhere else) Shariffah Zamoon and Shawn Curley Last Revised: January 31, 2006 Appendix C: Grouping Coding Categories According to Neutralization and Counter Neutralization Techniques Neutralization Techniques Denial of Responsibility Example and Explanation: I didn’t mean it. 1.7.3 Restrictions on copying/ no way to legally obtain copies/ 1.8.1 Deflect Responsibility 1.8.4 Unintentional Perpetrator exploits society’s distinction between intentional and unintentional outcomes, where being forced to do something by other people or circumstances can reduce culpability. Denial of Injury Example and Explanation: Counter Neutralization Techniques Accepted Accountability Example and Explanation: You are responsible, you did mean it. There were alternatives you chose not to pursue Perpetrator is challenged on the basis of his/ her choice and the existence of alternatives. 1.2.3 No depravation 1.5.1 Advertising/ Promoting 1.8.2 Sharing w/ future purchasing Expectation of Injury You hurt somebody. Perpetrator proclaims that no harm is done, so no consequences should be exacted. Perpetrator is challenged on the logical expectation of injury. 1.1.1 Revenge 2.1.1 Monetary terms 2.1.3 Foster industry growth Example and Explanation: I didn’t really hurt anybody. Denial of Victim 2.2.1 Free ware/ Open source software Fairness of System Example and Explanation: Example and Explanation: They had it coming to them. Law, not vigilantism, is fair. Perpetrator describes the negative action as a due punishment. Perpetrator is challenged on the basis of the appropriateness of the existing system. Page 40 of 50 -- Shariffah Zamoon and Shawn Curley Last Revised: January 31, 2006 Condemnation of the Condemners 1.2.2 Common 1.7.1 Judicial Processes 1.7.2 Location of offense Equality of Condemnation Example and Explanation: Everybody is equally picked on. Example and Explanation: 2.3.1 Pursuing pirates 2.5.2 Illegal 2.5.3 Immoral: violation of a value/ unethical/ wrong/ cheating Everybody is picking on me. Perpetrator is challenged based upon equal application of the system. Perpetrator shifts focus from the negative act to the behaviors and motives of those who disapprove. Appeal to Higher Loyalty Example and Explanation: I didn’t do it for myself. 1.4.1 Cultural and community aspects 1.5.2 Robin Hood/ taking from rich employers so software can be available to poor 1.5.3 Helping someone Perpetrator maintains the negative action was in compliance with another norm that outweighs the violated one. Reduction to Self Interest Example and Explanation: You did this for yourself, the higher loyalty is not justified as people are worse off because of your action. Perpetrator challenged based on the higher loyalty claimed to be served. Ambiguous 1.3.1 Monetary gains 2.1.2 Copyrights as Assets 2.5.1 Issue of Ownership Not Applicable 1.1.2 Facilitator of more serious crimes 1.1.3 Supports Terrorism 1.2.1 Non-complicated 1.2.4 Masks identity of perpetrator 1.2.5 Hard to stop 1.3.2 Legally expensive to pursue 1.4.2 Self efficacy 1.4.3 Feelings gained with respect to others 1.6.1 Not real/ intangibility 1.6.2 Original/ Copy Indistinguishable 1.7.4 Ignorance 1.8.3 Sharing w/ no future purchasing 2.3.2 Links to terrorism/ organized crime 2.3.3 National security 2.4.3 Not authentic product 2.4.5 No technical support Page 41 of 50 2.4.1 Buggy/ damaged goods/ no quality 2.4.2 Lower innovation 2.4.4 Hacking/ Viruses Shariffah Zamoon and Shawn Curley Last Revised: January 31, 2006 References Adelman, R. C., and Verbrugge, L. M. (September 2000). “Death Makes News: The Social Impact of Disease on Newspaper Coverage,” Journal of Health and Social Behavior, 41, 347-367. Agnew, R. (1994). “The Techniques of Neutralization and Violence,” Criminology, 32(4), 555-580. Allen GN. (May, 1999). Software Piracy: Why Honest People Cheat. Working paper (Submitted to Academy of Management Meeting). Alvarez, A. (1997). “Adjusting to Genocide: The Techniques of Neutralization and the Holocaust,” Social Science History, 21(2), 139-187. Ashforth, B. E., and Anand, V. (2003). “The Normalization of Corruption in Organizations,” Research in Organizational Behavior, 25(X), 1-52. AutoDesk Piracy Prevention Fact Sheet http://www3.autodesk.com/adsk/files/2203299_Autodesk_Piracy_Prevention_Fact_Sheet .doc Bandura, A. (1990). “Selective Activation and Disengagement of Moral Control,” Journal of Social Issues, 46(1), 27-46. Bandura, A, Barbaranelli, C., Caprara, G. V., and Pastorelli, C. (1996). “Mechanisms for Moral Disengagement in the Exercise of Moral Agency,” Journal of Personality and Social Psychology, 71(2), 364-374. Belk, R. W., and Pollay, R. W. (March, 1985). “Images of Ourselves: The Good Life in Twentieth Century Advertising,” The Journal of Consumer Research, 4, 887-897. Bennett, R., and Blaney, R. (2002). “Social Consensus, Moral Intensity and Willingness to Pay to Address a Farm Animal Welfare Issue,” Journal of Economic Psychology, 24(4), 501-520. Berger, P. L., and Luckmann, T. (1967). The Social Construction of Reality: A Treatise in the Sociology of Knowledge. Anchor Books. Garden City, New York. Blasi, A. (1980). “Bridging Moral Cognition and Moral Action: A Critical Review of the Literature,” Psychological Bulletin, 88, 1-45. Blumer, H. (1971). “Social Problems as Collective Behavior,” Social Problems, 18 (3), 298-306. Page 42 of 50 Shariffah Zamoon and Shawn Curley Last Revised: January 31, 2006 Brannon, S. (Computer Crime and Intellectual Property Section from the Department of Justice). Personal Interview. May 6, 2004. Brehmer, B. (1990). Strategies in Real-Time, Dynamic Decision Making. In Robin M. Hogart (Ed.) Insights in Decision Making (Ch. 11). The University of Chicago Press, Chicago, IL. Brehmer, B. (1992). Dynamic Decision Making: Human Control of Complex Systems. Acta Psychological, 81, 211-241. Brennan, W. C. (1974). “Abortion and the Techniques of Neutralization,” Journal of Health and Social Behavior, 15(4), 358-365. Bunder, S., and Krauss, E. S. (April 1995). “Newspaper Coverage of U.S.-Japan Frictions: Balance and Objectivity,” Asian Survey, 35, 336-356. Burk, D. L. (Professor of Law University of Minnesota). Personal correspondence November 4, 2004. Business Software Alliance. Information Packet. www.bsa.org Chia, A., and Mee, L. S. (2000). “The Effect of Issue Characteristics on the Recognition of Moral Issues,” Journal of Business Ethics, 27(3), 255-269. Christensen, A.L., and Eining, M.M. (1991). “Factors Influencing Software Piracy: Implications for Accountants,” Journal of Information Systems, 5 (Spring), 67-80. Cohen, J. (1960). “A Coefficient of Agreement for Nominal Scales,” Educational and Psychological Measurement, 20(1), 37-46. Conner, K. R., and Rumelt, R. P. (February, 1991). “Software Piracy: An Analysis of Protection Strategies,” Management Science, 37, 125-139. Copes, H. (2003). “Societal Attachments, Offending Frequency, and Techniques of Neutralization,” Deviant Behavior, 24(2), 101-127. Darley, J. M., and Zanna, M. P. (1982). “Making Moral Judgments,” American Scientist, 70(5), 515-521. D’Aveni, R., and MacMillan, I. C. (December, 1990). “Crisis and the Content of Managerial Communications: A Study of the Focus of Attention of Top Managers in Surviving and Failing Firms,” Administrative Science Quarterly, 35, 634-657. Doesn't Everybody Do It? Internet Piracy Attitudes and Behaviors: A report on a survey of end-user attitudes Page 43 of 50 Shariffah Zamoon and Shawn Curley Last Revised: January 31, 2006 toward software and content use (and piracy), conducted by SIIA and KPMG — Fall 2001 Report available at: http://www.siia.net/divisions/content/pubs/kmpg.pdf Eining, M.M., and Christensen, A.L. (1991). “A Psycho-Social Model of Software Piracy: The Development and Test of a Model” in R. Dejoie, G. Fowler, and D. Paradice (Eds). Ethical Issues in Information Systems. p 182-188. Boyd and Fraser. Boston, Massachusetts. Fishman, M. (1978). “Crime Waves as Ideology,” Social Problems, 25(5), 531-543. Forester, T.G., and Morrison, P. (1994). Computer Ethics: Cautionary Tales and Ethical Dilemmas in Computing (2nd ed). Cambridge, MA: MIT Press. Fuller, R. C., and Myers, R. R. (1941). “The Natural History of a Social Problem,” American Sociological Review, 6(3), 320-329. Gamson, W. A., Croteau, D., Hoynes, W., and Sasson, T. (1992). “Media Images and the Social Construction of Reality,” Annual Review of Sociology, 18, 373-393. Gamson, W. A., and Modigliani, A. (1989). “Media Discourse and Public Opinion on Nuclear Power: A Constructionalist Approach,” The American Journal of Sociology, 95(1), 1-37. Glass, R. S., and Wood, W. A. (1996). “Situational Determinants of Software Piracy: An Equity Theory Perspective,” Journal of Business Ethics, 15, 1189-1198. Gorta, A. (1998). “Minimizing Corruption: Applying Lessons from the Crime Prevention Literature,” Crime, Law, and Social Change, 30(1), 67-87. Harbaugh, R., and Khemka, R. “Does Copyright Enforcement Encourage Piracy?” Claremont Colleges Working Papers in Economics, August 2001, 1-23. Harrington S. J. (1989). “Why People Copy Software and Create Computer Viruses: Individual Characteristics or Situational Factors?” Information Resources Management Journal, 2, 28-37. Harrington, S. J. (2000). “Software Piracy: Are Robin Hood and Responsibility Denial at Work?,” In M. Khosrowpour (ed.), Challenges of Information Technology Management in the 21st Century. Ideas Group Publishing, Hershey, PA. 83-87. Haslam, N. (ed.) (2004). Relational models theory: A contemporary overview. Mahwah, NJ: Lawrence Erlbaum & Associates. Herzberg, A., and Pinter, S. S. (October, 1987). “Public Protection of Software” ACM Transactions on Computer Systems (TOCS), 5, 371-393. Page 44 of 50 Shariffah Zamoon and Shawn Curley Last Revised: January 31, 2006 Hill, C. E., Thompson, B. J., and Williams, E. N. (1997). “A Guide to Conducting Consensual Qualitative Research. The Counseling Psychologist, 25(4), 517-572. Holsti, O. R. (1969). Content Analysis for the Social Sciences and Humanities. Reading, Mass.: Addison-Wesley Publishing Company. Horovitz, B. L. (1985). "Computer software as a good under the uniform commercial code: Taking a byte out of the intangibility myth," Boston University Law Review, 65, pp. 129–164. Husted, B. W., Dozier, J. B., McMahon, J. T., and Kattan, M. W. (1996). “The Impact of Cross-National Carriers of Business Ethics on Attitudes about Questionable Practices and form of Moral Reasoning,” Journal of International Business Studies, 27(2), 391411. Inverarity, J. M. (April 1976). “Populism and Lynching in Louisiana, 1889-1896: A Test of Erikson’s Theory of the Relationship between Boundary Crises and Repressive Justice,” American Sociological Review, 41, 262-280. Jiang, Z., and Sarkar, S. “Free Software Offer and Software Diffusion: The Monopolist Case” Proceedings of the Twenty-Fourth International Conference of Information Systems, December 14-17, 2003, Seattle, Washington, 881-887. Jones TM. (1991). “Ethical Decision Making by Individuals in Organizations: An IssueContingent Model,” Academy of Management Review, 16, 366-395. Jordan, D. L. (1993). “Newspaper Effects on Policy Preferences,” The Public Opinion Quarterly, 57, 191-204. Jordan, D. L., and Page, B. I. (June 1992). “Shaping Foreign Policy Opinions: The Role of TV News,” The Journal of Conflict Resolution, 36, 227-241. Katz, J. (1988). Seductions of Crime: Moral and Sensual Attractions in Doing Evil. New York, New York: Basic Books. Kling, R. (1995). “Beyond Outlaws, Hackers, and Pirates: Ethical Issues in the Work of Information and Computer Science Professionals,” in Computerization and Controversy: Value Conflict and Social Choices., (2nd ed.) Kling, Rob., (Ed.), San Diego: Academic Press. P. 848-869. Kolbe, R. H., and Burnett, M. S. (September, 1991). “Content-Analysis Research: An Examination of Applications with Directives for Improving Research Reliability and Objectivity,” The Journal of Consumer Research, 2, 243-250. Page 45 of 50 Shariffah Zamoon and Shawn Curley Last Revised: January 31, 2006 Krueger, A. B., and Pischke, J. S. (1997). “A Statistical Analysis of Crime against Foreigners in Unified Germany,” The Journal of Human Resources, 32, 182-209. Kunz, P. R., and Jaehne, E. M. (1983). A Sociological Approach to Morality. Lanham, MD: University Press of America, Inc. Kwong, K. K., Yau, O. H. M., Lee, J. S. Y., Sin, L. Y. M., Tse, A. C. B. (2003). “The Effects of Attitudinal and Demographic Factors on Intention to Buy Pirated CDs: The Case of Chinese Consumers,” Journal of Business Ethics, 47(3), 223-235. Laczniak, G. R. (1983). “Framework for Analyzing Marketing Ethics,” Journal of Macromarketing, 5 (Spring), 7-17. Lau, R. W. K. (2004). “Critical Realism and News Production,” Media Culture and Society, 26(5), 693-711. Lim, V. K. G. (2002). “The IT Way of Loafing on the Job: Cyberloafing, neutralization and organizational justice,” Journal of Organizational Behavior, 23(5), 675-694. Logsdon, J. M, Thompson, J. K., and Reid, R. A. (1994). “Software Piracy: Is it Related to Level of Moral Development?” Journal of Business Ethics, 13, 849-857. Majors, D. (Business Software Alliance). Personal correspondence February 8, 2005. Major Study Finds 36 percent of Software in Use Worldwide is Pirated: $29 Billion in Losses Last Year http://www.bsa.org/usa/press/newsreleases/Major-Study-Finds-36-Percent-of-Softwarein-Use-Worldwide-is-Pirated.cfm Marshall, C., and Rossman, G. B. (1999). Designing Qualitative Research (3rd ed). Sage Publications, Thousand Oaks, CA. McCarthy, J. G., and Stewart, A. L. (1998). “Neutralisation as a Process of Graduated Desensitisation: Moral Values of Offenders,” International Journal of Offender Therapy and Comparative Criminology, 42 (4), 278-290. Meloy, J. M. (1994). Writing the Qualitative Dissertation: Understanding by Doing. Hillsdale, New Jersey: Lawrence Erlbaum Associates. Miles, M. B., and Huberman, A. M. (1984). Qualitative Data Analysis: A Sourcebook of New Methods. Sage Publications, Beverly Hills, California. Miles, M. B., and Huberman, A. M. (1994). Qualitative Data Analysis: An Expanded Sourcebook (2nd ed.). Sage Publications, Thousand Oaks, California. Page 46 of 50 Shariffah Zamoon and Shawn Curley Last Revised: January 31, 2006 Miner, M., and Petocz, A. (2003). “Moral Theory in Ethical Decision Making: Problems, Clarifications and Recommendations from a Psychological Perspective,” Journal of Business Ethics, 42, 11-25. Minor, W. W. (1980). “The Neutralization of Criminal Offenses,” Criminology, 18(1), 103-120. Minor, W. W. (1981). “Techniques of Neutralization: A Reconceptualization and Empirical Examination,” Journal of Research in Crime and Delinquency, 18, 295-318. Mitchell, J., and Dodder, R. A. (1980). “An Examination of Types of Delinquency Through Path Analysis,” Journal of Youth and Adolescence, 9(3), 239-248. Mitchell, J., and Dodder, R. A. (1983). “Types of Neutralization and Types of Delinquency,” Journal of Youth and Adolescence, 12(4), 307-318. Naumovichm G., and Memon, N. (July 2003). “Preventing Piracy, Reverse Engineering, and Tampering,” Computer, 36, 64-71. Neumann, M., Simpson, T. A. (1997). “Smuggled Sound: Bootleg Recording and the Pursuit of Popular Memory,” Symbolic Interaction, 20(4), 319-341. Newspapers-Dailies-Top U.S., Canadian. (1991-2004). The World Almanac and Book of Facts. World Almanac Books. Mahwah, New Jersey. Top 100 Daily Newspapers in the United States. http://www.infoplease.com/ipea/A0004420.html Northrup, H. R. (July, 1990). “The AFL-CIO Blue Cross-Blue Shield Campaign: A Study of Organizational Failure,” Industrial and Labor Relations Review, 43, 525-541. Nunes, J. C., Hsee, C. K., and Weber, E. U. (2004). “Why people are So Prone to Steal Software? The Effect of Cost Structure on Consumer Purchase and Payment Intentions,” Journal of Public Policy and Marketing, 23(1), 43-53. Olzak, S. (May 1989). “Labor Unrest, Immigration, and Ethnic Conflict in Urban America, 1880-1914,” The American Journal of Sociology, 94, 1303-1333. Page, B. I., Shapiro, R. Y., and Dempsey, G. R. (March 1987). “What moves Public Opinion?” The American Political Science Review, 81, 23-44. Park, R. E. (1923). “The Natural History of the Newspaper,” The American Journal of Sociology, 29(3), 273-289. Plagiarism. org http://www.plagiarism.org/plagiarism_stats.html Page 47 of 50 Shariffah Zamoon and Shawn Curley Last Revised: January 31, 2006 Potlapally, N. R. (March, 2002). “Optical Fingerprinting to Protect Data: a Proposal,” Computer, 35, 23-28. Pritchard, D. (1986). “Homicide and Bargained Justice: The Agenda-Setting Effect of Crime News,” The Public Opinion Quarterly, 50, 143-159. Protess, D. L., Leff, D. R., Brooks, S. C., and Gordon, M. T. (1985). “Uncovering Rape: The Watchdog Press and the Limits of Agenda Setting,” The Public Opinion Quarterly, 19-37. Rest, J. R., Bebeau, M., and Volker, J. (1986). “An Overview of the Psychology of Morality” in J. R. Rest (Ed.) Moral Development: Advances in Research and Theory. Praeger. New York, New York. Rest, J. R., Narvaez, D., Bebeau, M., and Thoma, S. (1999). “A Neo-Kohlbergian Approach to Moral Judgment: An Overview of Defining Issues Test Research,” Educational Psychology Review, 11(4), 291-324. Robinson, S. L., and Kraatz, M. S. (1998). “Constructing the Reality of Normative Behavior: The Use of Neutralization Strategies by Organizational Deviants,” in R. W Griffin, A. O’Leary-Kelly, and J. M. Collins (Eds) Dysfunctional Behavior in Organizations: Violent and Deviant Behavior (Part B), 203-220. Sama, L. M., and Shoaf, V. (2002). “Ethics on the Web: Applying Moral DecisionMaking to the New Media,” Journal of Business Ethics, 36, 93-103. Schneider, J. W. (1985). “Social Problems Theory: The Constructionist View,” Annual Review of Sociology, 11, 209-229. Schoenfeld, C. A., Meier, R. F., and Griffin, R. J. (1979). “Constructing a Social Problem: The Press and the Environment,” Social Problems, 27(2), 38-61. Schudson, M. (1989). “The Sociology of News Production,” Media, Culture and Society, 11, 263-282. Seglin, J. L. (2000). “Dot.Con,” http://www.forbes.com/asap/2000/0221/135.html Serafini, D. DVD Piracy in the US becomes an Industry http://www.videoageinternational.com/2003/articles/March/piracy.htm Shapiro, C., and Varian, H. R. (1999). Information Rules: A Strategic Guide to the Network Economy. Harvard Business School Press. Boston, Massachusetts. Sheley, J. F., and Ashkins, C. D. (1981). “Crime, Crime News, and Crime Views,” The Public Opinion Quarterly, 45, 492-506. Page 48 of 50 Shariffah Zamoon and Shawn Curley Last Revised: January 31, 2006 Simpson, P.M., Banerjee, D., and Simpson, C.I. (1994). “Softlifting: A Model of Motivating Factors,” Journal of Business Ethics, 13(6), 431-438. Slive, J., and Bernhardt, D. “Pirated for Profit,” The Canadian Journal of Economics, 31, 4 (October 1998), 886-899. Solomon, S. L., and O’Brien, J. A. “The Effect of Demographic Factors on Attitudes Towar Software Piracy” in R. Dejoie, G. Fowler, and D. Paradice (Eds.) Ethical Issues in Information Systems. (1991). 168-181. Boston, Massachusets: Boyd & Fraser Publishing Company. Spiggle, S. (June, 1986). “Measuring Social Values: A Content Analysis of Sunday Comics and Underground Comix,” The Journal of Consumer Research, 1, 100-113. Stallings, R. A. (1990). “Media Discourse and the Social Construction of Risk,” Social Problems, 37(1), 80-95. Strauss, A., and Corbin, J. (1998). Basics of Qualitative Research: Techniques and Procedures for Developing Grounded Theory. Sage Publications, Thousand Oaks, California. Strikwerda, R. A., and Ross, J. M. (1992). “Software and Ethical Softness,” Collegiate Microcomputer, 10, 129-136. Stone, D. M. Software Piracy http://lrs.ed.uiuc.edu/wp/crime/piracy.htm Sundararajan. A. (2003). “Managing Digital Piracy: Pricing, Protection and Welfare,” Working paper (#IS-03-05) Center for Digital Economy Research, Stern School of Business. Swinyard W.R., Rinne H and Kau A.K. (1990). “The Morality of Software Piracy: A Cross-Cultural Analysis,” Journal of Business Ethics, 9, 655-664. Sykes, G. M., and Matza, D. (1957). “Techniques of Neutralization: A Theory of Delinquency,” American Sociological Review, 22, 664-670. Takeyama, L. N. “The Welfare Implications of Unauthorized Reproduction of Intellectual Property in the Presence of Demand Network Externalities” The Journal of Industrial Economics, 42, 2 (June 1994), 155-166. Thong, J. Y. L., and Yap, C. S. (1998). “Testing an Ethical Decision-Making Theory: the Case of Softlifting,” Journal of Management Information Systems, 15, 213-237. Tuckett, A. G. (2004). “Truth-Telling in Clinical Practice and the Arguments for and against: A Review of the Literature,” Nursing Ethics, 11(5), 500-513. Page 49 of 50 Shariffah Zamoon and Shawn Curley Last Revised: January 31, 2006 U.S. Department of Justice. Annual Report of the Attorney General of the United States, 1994-2003. http://www.usdoj.gov/ag/annualreports.html Ursic, A. C., Ursic, M. L., and Ursic, V. L. (June, 1986). “A Longitudinal Study on the Use of the Elderly in Magazine Advertising,” The Journal of Consumer Research, 13, 131-133. Vitell, S., and Davis, D. (1990). “Ethical Beliefs of MIS Professionals: The Frequency and Opportunity for Unethical Behavior,” Journal of Business Ethics, 9, 63-70. Whitman M. E., Townsend A. M., Hendrickson, A. R., and Rensvold, R. B. (1998). “Computer Aversion and Computer-Use Ethics in U.S. and Asian Cultures,” The Journal of Computer Information Systems, 4, 19-24. Worldwide Business Software Piracy Losses Estimated At Nearly $11 Billion In 1998 http://www.siia.net/sharedcontent/press/1999/5-25-99a.html Yankelovich, D. (1991). Coming to Public Judgment: Making Democracy Work in a Complex World. Syracuse University Press, Syracuse, New York. Yankelovich, D. (1992). “How Public Opinion Really Works,” Fortune, 126(7), 102104,108. Zamoon, S., and Curley, S. (2005). “Silencing Jiminy Cricket: the Role of Neutralization Techniques in Ethical Decision-Making,” (Working Paper). Page 50 of 50