It is well known that software piracy is widespread. While the existing research on this subject has applied a number of theories in order to understand and prevent such an act, this text presents an alternative perspective by advancing two criminological theories. More specifically, a novel theoretical model is advanced, drawing on these theories entitled 'Techniques of Neutralization and Differential Association Theory'. The former helps to explain how individuals are able to rationalize their criminal behaviour in a manner which absolves them of pressures from social norms and internal controls such as feelings of guilt and shame. The latter explains how criminality is developed through a learning process taking place in personal group...
Computer crime has become a global issue and continues to rapidly grow; however, few studies had exa...
Although researchers have examined software piracy using several correlates and theories, it is not ...
Over the last decade, criminological scholarship has primarily used measures derived from Akers (199...
Software piracy continues to be a major economic concern for organizations. Given the widespread nat...
Software piracy, the illegal and unauthorized duplication, sale, or distribution of software, is a w...
Advances in Internet and other digital technologies have opened up new channels and methods for onli...
Abstract: Internet-based digital piracy has recently become a widespread occurrence. Despite this gr...
Why do mainstream consumers who would not typically engage in illegal behaviour routinely resort to ...
Computer crimes are a major problem for today\u27s society. This thesis ascertains the extent and di...
This book builds an empirical basis towards creating broader prevention and intervention programs in...
Theft of software and other intellectual property has become one of the most visible problems in com...
Theft of software and other intellectual property has become one of the most visible problems in com...
Researchers have explored the empirical validity of linking key concepts from Gottfredson and Hirsch...
[[abstract]]The illegal copying of software is commonly referred to as software piracy, which has co...
This study is partial replication of (Siponen et al., 2012)study on the effects of neutralization, s...
Computer crime has become a global issue and continues to rapidly grow; however, few studies had exa...
Although researchers have examined software piracy using several correlates and theories, it is not ...
Over the last decade, criminological scholarship has primarily used measures derived from Akers (199...
Software piracy continues to be a major economic concern for organizations. Given the widespread nat...
Software piracy, the illegal and unauthorized duplication, sale, or distribution of software, is a w...
Advances in Internet and other digital technologies have opened up new channels and methods for onli...
Abstract: Internet-based digital piracy has recently become a widespread occurrence. Despite this gr...
Why do mainstream consumers who would not typically engage in illegal behaviour routinely resort to ...
Computer crimes are a major problem for today\u27s society. This thesis ascertains the extent and di...
This book builds an empirical basis towards creating broader prevention and intervention programs in...
Theft of software and other intellectual property has become one of the most visible problems in com...
Theft of software and other intellectual property has become one of the most visible problems in com...
Researchers have explored the empirical validity of linking key concepts from Gottfredson and Hirsch...
[[abstract]]The illegal copying of software is commonly referred to as software piracy, which has co...
This study is partial replication of (Siponen et al., 2012)study on the effects of neutralization, s...
Computer crime has become a global issue and continues to rapidly grow; however, few studies had exa...
Although researchers have examined software piracy using several correlates and theories, it is not ...
Over the last decade, criminological scholarship has primarily used measures derived from Akers (199...