{"title":"软件盗版:犯罪学视角下的原创见解","authors":"R. Willison, M. Siponen","doi":"10.1109/HICSS.2008.407","DOIUrl":null,"url":null,"abstract":"It is well known that software piracy is widespread. While the existing research on this subject has applied a number of theories in order to understand and prevent such an act, this text presents an alternative perspective by advancing two criminological theories. More specifically, a novel theoretical model is advanced, drawing on these theories entitled Techniques of 'Neutralization and Differential Association Theory. The former helps to explain how individuals are able to rationalize their criminal behaviour in a manner which absolves them of pressures from social norms and internal controls such as feelings of guilt and shame. The latter explains how criminality is developed through a learning process taking place in personal groups. While empirical research is needed to test the model further, it is argued that these theories offer both an alternative perspective on the intention to commit software piracy, but also potentially open up new avenues for preventing this crime.","PeriodicalId":328874,"journal":{"name":"Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"12","resultStr":"{\"title\":\"Software Piracy: Original Insights from a Criminological Perspective\",\"authors\":\"R. Willison, M. Siponen\",\"doi\":\"10.1109/HICSS.2008.407\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"It is well known that software piracy is widespread. While the existing research on this subject has applied a number of theories in order to understand and prevent such an act, this text presents an alternative perspective by advancing two criminological theories. More specifically, a novel theoretical model is advanced, drawing on these theories entitled Techniques of 'Neutralization and Differential Association Theory. The former helps to explain how individuals are able to rationalize their criminal behaviour in a manner which absolves them of pressures from social norms and internal controls such as feelings of guilt and shame. The latter explains how criminality is developed through a learning process taking place in personal groups. While empirical research is needed to test the model further, it is argued that these theories offer both an alternative perspective on the intention to commit software piracy, but also potentially open up new avenues for preventing this crime.\",\"PeriodicalId\":328874,\"journal\":{\"name\":\"Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008)\",\"volume\":\"24 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2008-01-07\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"12\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/HICSS.2008.407\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/HICSS.2008.407","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Software Piracy: Original Insights from a Criminological Perspective
It is well known that software piracy is widespread. While the existing research on this subject has applied a number of theories in order to understand and prevent such an act, this text presents an alternative perspective by advancing two criminological theories. More specifically, a novel theoretical model is advanced, drawing on these theories entitled Techniques of 'Neutralization and Differential Association Theory. The former helps to explain how individuals are able to rationalize their criminal behaviour in a manner which absolves them of pressures from social norms and internal controls such as feelings of guilt and shame. The latter explains how criminality is developed through a learning process taking place in personal groups. While empirical research is needed to test the model further, it is argued that these theories offer both an alternative perspective on the intention to commit software piracy, but also potentially open up new avenues for preventing this crime.