Difference between revisions of "Zamoon and Curley (2008)"

From Copyright EVIDENCE
m (1 revision imported)
Line 1: Line 1:
 
{{MainSource
 
{{MainSource
|Dataset={{Dataset
 
|Sample Size=192
 
|Level of Aggregation=Newspaper Articles,
 
|Data Material Year=3 January 1989 - 31 December 2004
 
}}
 
 
|Source={{Source
 
|Source={{Source
 
|Name of Study=Zamoon and Curley (2008)
 
|Name of Study=Zamoon and Curley (2008)
Line 38: Line 33:
 
|Description of Data=Using the search term 'software piracy,' the authors collected 192 articles from USA Today, the Wall Street Journal, the New York Times, the Los Angeles Times, and the Washington Post: the five daily papers with the highest circulation in the United States.  
 
|Description of Data=Using the search term 'software piracy,' the authors collected 192 articles from USA Today, the Wall Street Journal, the New York Times, the Los Angeles Times, and the Washington Post: the five daily papers with the highest circulation in the United States.  
 
The time limit of the search ran from January 3, 1989 - December 31, 2004.
 
The time limit of the search ran from January 3, 1989 - December 31, 2004.
|Data Year=Not stated
+
|Data Year=1989-2004
 
|Data Type=Secondary data
 
|Data Type=Secondary data
 
|Data Source=USA Today; The Wall Street Journal; The New York Times; The Los Angeles Times; The Washington Post;
 
|Data Source=USA Today; The Wall Street Journal; The New York Times; The Los Angeles Times; The Washington Post;
Line 47: Line 42:
 
|Cross-country=No
 
|Cross-country=No
 
|Comparative=No
 
|Comparative=No
 +
|Government or policy=No
 +
|Literature review=No
 
|Funded By=Institute for Research in Marketing, Carlson School of Management, University of Minnesota.;
 
|Funded By=Institute for Research in Marketing, Carlson School of Management, University of Minnesota.;
 +
}}
 +
|Dataset={{Dataset
 +
|Sample Size=192
 +
|Level of Aggregation=Newspaper Articles,
 +
|Data Material Year=1989-2004
 
}}
 
}}
 
}}
 
}}

Revision as of 14:35, 8 October 2016

Advertising Architectural Publishing of books, periodicals and other publishing Programming and broadcasting Computer programming Computer consultancy Creative, arts and entertainment Cultural education Libraries, archives, museums and other cultural activities

Film and motion pictures Sound recording and music publishing Photographic activities PR and communication Software publishing Video game publishing Specialised design Television programmes Translation and interpretation

1. Relationship between protection (subject matter/term/scope) and supply/economic development/growth/welfare 2. Relationship between creative process and protection - what motivates creators (e.g. attribution; control; remuneration; time allocation)? 3. Harmony of interest assumption between authors and publishers (creators and producers/investors) 4. Effects of protection on industry structure (e.g. oligopolies; competition; economics of superstars; business models; technology adoption) 5. Understanding consumption/use (e.g. determinants of unlawful behaviour; user-generated content; social media)

A. Nature and Scope of exclusive rights (hyperlinking/browsing; reproduction right) B. Exceptions (distinguish innovation and public policy purposes; open-ended/closed list; commercial/non-commercial distinction) C. Mass digitisation/orphan works (non-use; extended collective licensing) D. Licensing and Business models (collecting societies; meta data; exchanges/hubs; windowing; crossborder availability) E. Fair remuneration (levies; copyright contracts) F. Enforcement (quantifying infringement; criminal sanctions; intermediary liability; graduated response; litigation and court data; commercial/non-commercial distinction; education and awareness)

Source Details

Zamoon and Curley (2008)
Title: Ripped from the headlines: What can the popular press teach us about software piracy?
Author(s): Zamoon, S., Curley, S.
Year: 2008
Citation: Zamoon, S., & Curley, S. P. (2008). Ripped from the headlines: What can the popular press teach us about software piracy?. Journal of business ethics, 83(3), 515-533.
Link(s): Definitive , Open Access
Key Related Studies:
Discipline:
Linked by:
About the Data
Data Description: Using the search term 'software piracy,' the authors collected 192 articles from USA Today, the Wall Street Journal, the New York Times, the Los Angeles Times, and the Washington Post: the five daily papers with the highest circulation in the United States.

The time limit of the search ran from January 3, 1989 - December 31, 2004.

Data Type: Secondary data
Secondary Data Sources:
Data Collection Methods:
Data Analysis Methods:
Industry(ies):
Country(ies):
Cross Country Study?: No
Comparative Study?: No
Literature review?: No
Government or policy study?: No
Time Period(s) of Collection:
  • 1989-2004
Funder(s):
  • Institute for Research in Marketing, Carlson School of Management, University of Minnesota.

Abstract

Software piracy is an instance of unauthorized duplication of information goods where laws and norms are not agreed-upon. This article presents a content analysis of articles from the five highest circulating U.S. newspapers 1989–2004 as evidence of the prevailing social environment surrounding software piracy. The rationales in the news articles are analyzed as evidence of the social and psychological underpinnings of attitudes toward software piracy. An expanded version of Sykes and Matza’s (American Sociological Review 22, 664–670, 1957); Zamoon and Curley (Working paper, Kuwait University, Kuwait, 2007) neutralization framework is applied to analyze the content of the articles. We found that rationales condoning piracy showed a more balanced use of neutralization approaches, and less moral intensity toward the behavior. In contrast, rationales condemning piracy mostly promoted the injury aspect of software piracy, and suggested higher moral intensity. The discrepancies have practical implica- tions as a barrier to the ability to connect the two sides of the debate concerning software piracy.

Main Results of the Study

The main results of the study are:

  • Excluding the editorials (which were infrequent), the distribution of rationales (pro vs. anti piracy) significantly differed depending on article type (v2(1) = 5.65, p = 0.018). News reports tended to have more anti-piracy arguments (151/278 of the rationales in reports) and news columns tended to present more pro-piracy arguments (115/203 of the rationales in columns).
  • Most of this asymmetry arose from the presence of monetary rationales.
  • Out of the 192 articles coded, 122 gave rationales for piracy and they included 252 rationales. These rationales were an accumulation of statements from pirates, prosecutors, and reporters’ commentaries on piracy issues. The three leading reason categories for condoning piracy were reducing monetary expenditures, justifications based on features of piracy processes, and deficiencies in law enforcement, each accounting for 43/252 (17.1%) of the cited rationales.
  • Of the 192 articles coded, 156 gave rationales against piracy providing 248 rationales. The leading reason category, capturing 132/249 (53.2%) of the citations, was the economic hardships that piracy causes for software producers. This general pattern, of greater unanimity among rationales against piracy compared to those favoring piracy, will arise again in subsequent analyses.
  • The data reveal a disjoint in the public conversation surrounding software piracy, where pro-piracy and anti-piracy rationales tend to approach the issue from differing perspectives.

Policy Implications as Stated By Author

Policy implications:

  • The fact that justifications for and against unauthorized duplication are arguing the issue from different perspectives can mean that it will take a long time to come to consensus around the issue. For example, the anti-piracy strategy of arguing based on economic concerns is likely to have minimal impact.
  • In understanding rationales for and against the unauthorized duplication of information goods, businesses can better educate their staff and thus protect themselves from intentional or unintentional violations of property right laws.
  • Using the results of this study and similar works can help our understanding of unauthorized duplication and help businesses evolve policies and procedures based on agreed standards of exchange.



Coverage of Study

Coverage of Fundamental Issues
Issue Included within Study
Relationship between protection (subject matter/term/scope) and supply/economic development/growth/welfare
Relationship between creative process and protection - what motivates creators (e.g. attribution; control; remuneration; time allocation)?
Harmony of interest assumption between authors and publishers (creators and producers/investors)
Effects of protection on industry structure (e.g. oligopolies; competition; economics of superstars; business models; technology adoption)
Understanding consumption/use (e.g. determinants of unlawful behaviour; user-generated content; social media)
Green-tick.png
Coverage of Evidence Based Policies
Issue Included within Study
Nature and Scope of exclusive rights (hyperlinking/browsing; reproduction right)
Exceptions (distinguish innovation and public policy purposes; open-ended/closed list; commercial/non-commercial distinction)
Mass digitisation/orphan works (non-use; extended collective licensing)
Licensing and Business models (collecting societies; meta data; exchanges/hubs; windowing; crossborder availability)
Fair remuneration (levies; copyright contracts)
Enforcement (quantifying infringement; criminal sanctions; intermediary liability; graduated response; litigation and court data; commercial/non-commercial distinction; education and awareness)
Green-tick.png

Datasets

Sample size: 192
Level of aggregation: Newspaper Articles
Period of material under study: 1989-2004