18 research outputs found

    The Use of Text Analytics to Investigate Concepts in Intra- and Inter-disciplinary Software Piracy Research Inter-disciplinary Software Piracy Research

    Get PDF
    IS research has linked collaborators from diverse domains. IS research requires selecting and addressing an appropriate intradisciplinary or interdisciplinary scope. Identifying gaps in the current literature and deciding when and how collaborations among different disciplines may be fruitful poses challenges. We propose a process to analyze a corpus of documents from any topic, to identify potential collaboration areas. A text analytics process is used to find areas of commonality and exclusivity among questions addressed in existing IS work by analyzing abstracts in papers from multiple disciplines studying \u27software piracy.\u27 We use term-term co-occurrence to find all the terms used in close proximity to the topic. We identify which terms are most prominent in each discipline, show quantitatively how these usages coincide or diverge across disciplines, measure the overlap between pairs of disciplines, and identify clusters of terms shared among disciplines. Specific findings from this case of software piracy are presented

    The Use of Text Analytics to Investigate Concepts in Intra- and Inter-disciplinary Software Piracy Research

    Get PDF
    IS research has linked collaborators from diverse domains. IS research requires selecting and addressing an appropriate intradisciplinary or interdisciplinary scope. Identifying gaps in the current literature and deciding when and how collaborations among different disciplines may be fruitful poses challenges. We propose a process to analyze a corpus of documents from any topic, to identify potential collaboration areas. A text analytics process is used to find areas of commonality and exclusivity among questions addressed in existing IS work by analyzing abstracts in papers from multiple disciplines studying \u27software piracy.\u27 We use term-term co-occurrence to find all the terms used in close proximity to the topic. We identify which terms are most prominent in each discipline, show quantitatively how these usages coincide or diverge across disciplines, measure the overlap between pairs of disciplines, and identify clusters of terms shared among disciplines. Specific findings from this case of software piracy are presented

    Cyber-crime Science = Crime Science + Information Security

    Get PDF
    Cyber-crime Science is an emerging area of study aiming to prevent cyber-crime by combining security protection techniques from Information Security with empirical research methods used in Crime Science. Information security research has developed techniques for protecting the confidentiality, integrity, and availability of information assets but is less strong on the empirical study of the effectiveness of these techniques. Crime Science studies the effect of crime prevention techniques empirically in the real world, and proposes improvements to these techniques based on this. Combining both approaches, Cyber-crime Science transfers and further develops Information Security techniques to prevent cyber-crime, and empirically studies the effectiveness of these techniques in the real world. In this paper we review the main contributions of Crime Science as of today, illustrate its application to a typical Information Security problem, namely phishing, explore the interdisciplinary structure of Cyber-crime Science, and present an agenda for research in Cyber-crime Science in the form of a set of suggested research questions

    Music Piracy and Its Criminalization: Understanding the Napster Era (1999) to Present Through Donald Black\u27s Theory of Moral Time

    Get PDF
    In the year 1999 Napster, a provider of music downloading software, broke news headlines around the world when copyright infringement lawsuits were filed against the company. Ever since then internet music piracy has been a very controversial topic and a target for criminalization efforts. In the field of criminology there have been few attempts to apply theory to the topic of internet music piracy. Theorization of internet music piracy has mainly focused on the illegal behavior of music piracy, explaining the motivations and knowledge behind it. Something that has been neglected in theoretical work of online music piracy is its criminalization. This thesis topic is significant in that it is a theoretical application test of Donald Black\u27s newest theory, Moral Time. Black, a sociologist from the University of Virginia, who is well known for his works The Behavior of Law and Sociological Justice introduced this new theory in 2011. The Moral Time theory is a theory of why conflicts occur and why some conflicts are worse than others. Using this theory, four key stages of criminalization efforts taken by the music industry are examined and elaborated upon as a means to identify why the music industry chose to take the actions it did against online music piracy

    A Theoretical Relationship Between Guardianship and Techniques of Neutralization: A Qualitative Analysis of Digital Piracy

    Get PDF
    This research is a qualitative analysis of digital piracy at the height of Napster in 1999. The findings support the notion that technology has given rise to several new techniques of neutralization. In some cases these techniques are completely new and in others they are 21st century updates to traditional techniques. Furthermore, this research uses forum posts from USENET to determine that guardianship as created by Cohen and Felson\u27s Routine Activities Theory is uniquely connected to neutralization based on two unique guardianship qualities, authority and capacity

    Essays on applied economic theory : primary data collection, endogenous piracy of intellectual property and R&D investments under heterogeneous climate damage exposure

    Get PDF
    This thesis contains three essays in applied economic theory. In the first, we study the strategic interaction between a statistics institute and a survey respondent (a firm or household). The latter must decide whether to access the data required by the former and thus to incur the cost associated with it. After receiving the report from the respondent, the institute decides whether to audit it. The novelty of our model is to assume that there is a two-sided asymmetric information, such that both the cost of acquiring the information and the cost of auditing are private information. In the baseline case, we show that, in equilibrium (Bayesian), there is substitutability between the punishment for misreporting (its magnitude) and the probability of auditing. When we add a second respondent, a strategic interaction between them emerges, which may generate the free-rider problem. Our approach allows us to perform both positive and normative analysis of the problem of collecting information by statistics institute. In the second essay, I explore the conflict that occurs between an intellectual property (IP) owner and a pirate group, in which the latter attempts to make the first pirate version available to the end-users, free of charge. As the current piracy literature usually assumes that pirate versions simply exist, the novelty of the paper is to implement this strategic interaction by endogenizing the pirate group’s activity. In the baseline model, where the pirate’s objective is to simply obtain success in generating a pirate version, we show that investments in anti-piracy measures by the IP owner is directly related to the ratio of expected profit gains in blocking piracy and the cost of additional protection. If this ratio is sufficiently high, the optimal investment in anti-piracy measures by the IP owner is able to completely inhibit the pirates attack. We then extend the pirate’s objective function to also include prestige, that is, pirate’s who seek challenge, such as facing an difficult protection mechanism. As the pirate’s sensitivity to challenge grows, there are lesser incentives for the IP owner to invest in anti-piracy measures, as any further investments would be met by attacks of increasing strength, hinting that in some cases, the IP owners could focus on different business strategies instead of focusing on technological protection mechanisms. In the third essay, I design a non-cooperative R&D investment game into climate-friendly technologies. The novelty of this paper is the implementation of asymmetric characteristics of the countries involved, more specifically the fact that they can be heterogeneously exposed to climate damage. On the baseline model, which consists of two countries, we show that both countries will only invest in R&D if their climate exposure is sufficiently close. As the R&D spillover parameter increases, the more homogeneous the countries must be in order for both countries to invest. If one of the countries has a sufficiently higher exposure, it will not engage in research, as the payoffs of the R&D investments are offset by increases in local climate damages. We also show that there are no free-riding incentives to the country when it does not invest in technologies. Finally, as we consider a three-country case, we identify the formation of a non-cooperative research club, where countries with similar exposure to climate damage simultaneously invest in research.Esta tese apresenta três ensaios em teoria econômica aplicada. No primeiro, exploramos a interação estratégica entre um instituto de estatística e um entrevistado (uma empresa ou domicílio, por exemplo). O entrevistado deve decidir se paga os custos para adquirir a informação exigida pelo instituto. Após receber a informação do respondente, o instituto decide se audita ou não a informação. Uma particularidade do modelo é assumir que há informação assimétrica de ambos os lados, ou seja, tanto o custo de aquisição das informações quanto o custo da auditoria são informações privadas. No modelo básico, mostramos que no equilíbrio pode haver substituição entre o valor da multa e a probabilidade de auditoria. Quando expandimos o modelo e adicionamos um segundo respondente, há uma interação estratégica entre eles, o que pode ocasionar um problema de free-rider. O modelo proposto nos permite realizar análises tanto positivas quanto normativas sobre o problema da coleta de informações primários enfrentados por institutos de estatísticas. No segundo ensaio, analiso o conflito que ocorre entre um detentor de propriedade intelectual (PI) e um grupo pirata, onde este tenta disponibilizar a primeira versão pirata para os usuários finais, de forma gratuita. A literatura de pirataria atual geralmente assume que as versões piratas existem espontaneamente, tal que a contribuição do artigo é implementar essa camada de interação estratégica endogenizando a atividade do grupo pirata. No modelo básico, onde o objetivo do pirata é simplesmente obter sucesso na geração de uma versão pirata, mostramos que os investimentos em medidas antipirataria pelo detentor do PI estão diretamente relacionados com a proporção do lucro potencial em impedir a pirataria e o custo de implementar a proteção. Se essa proporção for suficientemente alta, o investimento ótimo em medidas antipirataria tal que desmotiva o ataque dos grupos piratas. Em seguida, exploramos uma função objetivo do grupo que pirata que também inclui um efeito prestígio, ou seja, piratas que preferem desafios, como enfrentar uma proteção mais complexa. À medida que o parâmetro de sensibilidade por desafios cresce, há um menor incentivos para que o detentor da PI invista em medidas antipirataria, ora que investimentos adicionais seriam acompanhados por ataques de força crescente. Esse efeito indica que, em alguns casos, os detentores da PI poderiam diversificar suas diferentes estratégias de proteção em vez de se concentrá-las em mecanismos de proteção puramente tecnológicos. No terceiro ensaio, implementei um jogo de investimento em P&D não cooperativo em tecnologias de energia menos nocivas ao meio ambiente. A contribuição deste artigo é a explorar o efeito de características assimétricas dos países envolvidos, mais especificamente o fato de que eles podem ser expostos de forma distinta aos danos climáticos. No modelo básico, composto por dois países, mostramos que ambos os países só investirão em P&D se sua exposição climática for suficientemente próxima. À medida que o parâmetro de spillover da P&D aumenta, mais homogêneos os países precisam ser para que ambos simultaneamente invistam. Se um dos países apresentar uma exposição suficientemente maior, não realizará pesquisa, uma vez que os benefícios do investimento são mais que compensados por aumentos nos danos climáticos regionais. Também mostramos que não há incentivos de comportamento de free-rider quando um país deixa de investir em tecnologias. Ao considerarmos um modelo com três países, identificamos a possibilidade de formação de clubes de pesquisa não cooperativos, onde países com exposição semelhante a danos climáticos investem de forma similar em pesquisas

    ”Det är något som du vill ha, som är gratis, som kan hämtas, som ingen kan spåra” En kvalitativ studie om vilka anledningar personer som fildelar ger sina handlingar och hur dessa motiverar sina handlingar

    Get PDF
    Illegal fildelning är en utav de mest genomgripande formerna av brott som sker över internet idag. Under det senaste decenniet har den enorma tillgången till internet och användande av datorer lett till stor ökning av fildelning och undersökningar tyder på att många människor fildelar i Sverige. I detta arbete är syftet att få djupare förståelse för fenomenet illegal fildelning, med fokus på att undersöka vilka anledningar personer som fildelar ger av sin illegala aktivitet och hur de motiverar sitt handlande. Arbetet genomfördes med ett kvalitativt arbetssätt där fem personer som fildelar illegal intervjuades. Intervjuerna genomfördes med en mer flexibel intervjuteknik för att uppmuntra till fritt berättande men med några fasta frågor. Sociologiska/ kriminologiska teorier användes som verktyg för att förstå och analysera intervjumaterialet. Studien visar på att det ges olika anledningar till fildelande, såsom möjligheten och enkelheten att fildela, bristande ekonomi och att det inte finns någon större risk för att upptäckas och straffas. Intervjupersonerna motiverar sitt handlande genom att hävda att fildelandet inte skadar någon, att det inte har någon inverkan på film- och musikindustrin och att film-och musikindustrin får skylla sig själva

    Mapping South African internet user's opinions about the use of peer-to-peer file sharing technology to infringe on copyrighted films and/or television series content

    Get PDF
    The aim of this study was to investigate the various reasons consumers continue to infringe on copyrighted content, specifically in the South African context, even if the law forbids it. This investigation is two-fold since it also recognises that there are many individuals who do not infringe on copyrighted content even though they have access to peer-to-peer file sharing technology. This information could prove valuable since it can then be used to find comprehensive market-led solutions to the problem that targets the end-user. This study adopted a mixed method approach in order to cross validate findings and to reveal aspects of empirical reality. The target population for this study consisted of 100 adult South Africans who have access to the internet. Data was collected through an online, self-administered questionnaire. Quantitative data was analysed through descriptive statistics, while qualitative data was analysed through thematic analysis. The results show that there are variety of factors that influence respondents’ attitudes towards copyright infringement of films and/or television series through peer-to-peer file sharing technology, each of which is discussed in detail. The study concluded by identifying 24 factors that favourably influence people’s attitudes towards copyright infringement, including high prices of legitimate goods, historical inequality in South Africa, and perceived low risk of being caught and punished. Based on the conclusion above, the study recommends that policy makers such as government officials, boards of directors, managers, committees, and executives use the results of the study when making decisions and determining policies, especially in the South African context.Communication ScienceM.A. (Communication Science
    corecore