What is it about?

Digital piracy is one of the most popular forms of intellectual property theft and is currently recognized as a crime in several countries. This begs the question, if persons are fully informed that digital file sharing is a crime and, if caught, can be legally prosecuted, why do individuals opt to engage in such criminal behaviour? The purpose of the paper is to determine the psychological, social and economic factors influencing digital piracy. Understanding the social and psychological features of digital pirates is necessary if effected strategies are to be developed to deter the practice of digital piracy.

Featured Image

Why is it important?

To the best of the knowledge, no other study has combined notions from attitude/values/behaviour with that of willingness to pay. Yet, the literature would suggest that they both have significant impacts on the quantity of digital goods that are pirated. It is possible that not modelling their joint impact could have resulted in loss of vital information. The results suggest that intentions and willingness to pay (WTP) both have a significant impact on digital piracy. Intentions are in turn influenced by the pirate’s attitude, perceived consequences, ethics, education level and environment. Finally, a facilitating environment and perceived importance of the piracy issue help to predict’ WTP for digital products.

Perspectives

This article takes a look at an action that many persons do not view as a crime, i.e., something that does not harm anyone. Most actions to reduce digital piracy have not had the intended effect, possibly because they have not examined more carefully the underlying reasons regarding why persons pirate. It is an issue that touches everyone and I hope persons find the article thought provoking.

Prof Troy Lorde
University of the West Indies

Read the Original

This page is a summary of: Why buy when we can pirate? The role of intentions and willingness to pay in predicting piracy behavior, International Journal of Social Economics, September 2014, Emerald,
DOI: 10.1108/ijse-04-2013-0104.
You can read the full text:

Read

Contributors

The following have contributed to this page