57 research outputs found

    Gender Differences in Identity-Based Social Influence: An Experimental Examination of Software Piracy Behavior

    Get PDF
    Software piracy is the unauthorized copying, sharing, or using the software. It can be a profitable endeavor for individuals and a tremendous loss for the industry. According to Gulf News, Software piracy losses in the Arabian Gulf states in 2015 was 897$ million (AED 3.29 billion). Therefore, it is critical to understand as much as possible about the phenomenon and investigate the factors that influence subjects’ piracy behavior. Driven by gaps in previously published literature, the study presented here is an experimental investigation into the gender differences in identity-based social influence. In essence, the study examined if males or females are more likely to influence a group of their peers to either pirate or abstain from pirating a piece of software. While this topic is previously unstudied in the field of software piracy, it could be potentially useful in such areas as anti-piracy advertising. Further, as most of the published studies in software piracy are inclined to social desirability bias (as these studies traditionally rely on surveys and responses to paper-based scenarios), the study presented herein has been designed with the specific objective of avoiding social desirability bias by having real money at stake in an experimental setting

    Digital behaviours and cognitions of individuals convicted of online child pornography offences

    Get PDF
    BACKGROUND: Modern Child Sexual Exploitation Material (CSEM) offences predominantly occur within a technological ecosystem. The behaviours and cognitions of CSEM offenders influence, and are influenced by, their choice of facilitative technologies that form that ecosystem. OBJECTIVES: This thesis will review the prior research on cognitive distortions present in and technology usage by CSEM offenders, and present a new theory, Lawless Space Theory (LST), to explain those interactions. The cognitions and technical behaviours of previously convicted CSEM offenders will be examined in a psychosocial context and recommendations for deterrence, investigative, and treatment efforts made. PARTICIPANTS AND SETTING: Data was collected using an online survey collected from two samples, one from a reference population of the general public (n=524) and one from a population of previously convicted CSEM offenders (n=78), both of which were composed of adults living in the United States. METHODS: Two reviews were conducted using a PRISMA methodology - a systematic review of the cognitive distortions of CSEM offenders and an integrative review of their technology usage. A theoretical basis for LST was developed, and then seven investigations of the survey data were conducted evaluating the public’s endorsement of lawless spaces; the public’s perceptions of CSEM offenders; the self-perceptions of CSEM offenders; the suicidality of the offender sample; the use of technology and countermeasures by the offender sample; the collecting and viewing behaviours of the offender sample; and the idiographic profiles of the offender sample. RESULTS: The reviews found that the endorsement of traditional child contact offender cognitive distortions by CSEM offenders was low, and that they continued to use technology beyond its normative lifecycle. LST was developed to explain these behaviours, and the view of the Internet as generally lawless was endorsed by the reference and offender samples. The public sample showed biased beliefs that generally overestimated the prevalence of, and risk associated with, CSEM offending when compared to the offender sample. Offenders were found to have viewed investigators as having a lack of understanding and compassion, and they exhibited very high suicidal ideation following their interaction with law enforcement. Offenders exhibited similar technical abilities and lower technophilia than the reference sample, chose technologies to both reduce psychological strain and for utility purposes, and many exhibited cyclic deletions of their collections as part of a guilt/shame cycle. CONCLUSIONS AND IMPLICATIONS: Understanding CSEM offenders’ technological behaviours and cognitions can inform more effective investigative, deterrence, and treatment efforts. Law enforcement showing compassion during investigations may generate more full disclosures while facilitating offender engagement with resources to reduce suicidality. Deterrence efforts focused on establishing capable guardianship and reducing perceived lawlessness provide the potential to reduce offending. Treatment of criminogenic needs for the majority of CSEM offenders is not supported by evidence, but non-criminogenic treatment warrants broader consideration

    Assessing Canada\u27s Copyright Law in the Digital Context: Digital Locks, Open Licenses, and the Limits of Legislative Change

    Get PDF
    This dissertation examines Canadas copyright law reform in the information age. The overarching theme of my research underscores the importance of considering the purpose(s) of copyright law and the public interest while navigating the copyright law reform process. Additionally, I advocate that in regulating the influence of technology in the copyright system, the default approach should aim to objectively balance the interests of stakeholders to the extent possible. Ultimately, recognizing that stakeholders will continue to develop pragmatic responses to the changing landscape through private contracting and technological measures, I suggest that embracing regulatory pluralism is the most promising path towards achieving balanced copyright in the digital age. I develop these arguments over six chapters

    Inquiry: The University of Arkansas Undergraduate Research Journal - Volume 5 - Fall 2004

    Get PDF
    • …
    corecore