SlideShare uma empresa Scribd logo
1 de 82
Baixar para ler offline
Why is online piracy ethically different from
theft?
A vignette experiment.
Wojciech Hardy, Michał Krawczyk, Joanna Tyrowicz
Group for Research in APplied Economics
Introduction: If you download you’re a thief!
2
Introduction: If you download you’re a thief!
„When you go online and download songs without permission, you
are stealing. The illegal downloading of music is just as wrong as
shoplifting from a local convenience store (…)”
---RIAA, Official stance on piracy (until 2011)
[1]
2
Introduction: If you download you’re a thief!
„When you go online and download songs without permission, you
are stealing. The illegal downloading of music is just as wrong as
shoplifting from a local convenience store (…)”
---RIAA, Official stance on piracy (until 2011)
[1]
2
„Piracy is theft, and pirates are thieves, plain and simple.
Downloading a movie off of the Internet is the same as taking a
DVD off a store shelf without paying for it.”
---MPAA, What is Internet piracy? (until 2010)
[2]
Introduction: If you download you’re a thief!
„When you go online and download songs without permission, you
are stealing. The illegal downloading of music is just as wrong as
shoplifting from a local convenience store (…)”
---RIAA, Official stance on piracy (until 2011)
[1]
2
„It's as if we were advising people on how to steal from
supermarkets (...) Everything's alright in the legal terms, but,
without any doubts, this IS stealing from artists and - I repeat - is
causing harm to culture.”
--- Bogusław Pluta, director of ZPAV (2012) [3]
„Piracy is theft, and pirates are thieves, plain and simple.
Downloading a movie off of the Internet is the same as taking a
DVD off a store shelf without paying for it.”
---MPAA, What is Internet piracy? (until 2010)
[2]
And the views of the society?
3
And the views of the society?
3
Source: http://piracy.americanassembly.org/wp-content/uploads/2011/11/AA-Research-Note-Infringement-and-
Enforcement-November-2011.pdf
And the views of the society?
Definitely not the same percentage of people that steal from shops
(at least I hope so ).
So what is it that actually makes the difference?
3
Source: http://piracy.americanassembly.org/wp-content/uploads/2011/11/AA-Research-Note-Infringement-and-
Enforcement-November-2011.pdf
Common reasons for piracy:
4





Common reasons for piracy:
4
 There is no loss if you copy something. [4] [5]




Common reasons for piracy:
4
 There is no loss if you copy something. [4] [5]
 Why not copy if there’s no available alternative. [6]



Common reasons for piracy:
4
 There is no loss if you copy something. [4] [5]
 Why not copy if there’s no available alternative. [6]
 They are just some big capitalist companies, who won’t receive my few dollars.[6] [7]


Common reasons for piracy:
4
 There is no loss if you copy something. [4] [5]
 Why not copy if there’s no available alternative. [6]
 They are just some big capitalist companies, who won’t receive my few dollars.[6] [7]
 It requires no effort at all to make a copy. [8] [9]

Common reasons for piracy:
4
 There is no loss if you copy something. [4] [5]
 Why not copy if there’s no available alternative. [6]
 They are just some big capitalist companies, who won’t receive my few dollars.[6] [7]
 It requires no effort at all to make a copy. [8] [9]
 It’s much easier when you don’t have to look the victim in the eye. [10]
To address the question:
5
What is the difference that makes the difference?











To address the question:
5
What is the difference that makes the difference?
 We tell hypothetical stories about one Johnny, who committed
various, questionable acts to acquire a TV series.










To address the question:
5
What is the difference that makes the difference?
 We tell hypothetical stories about one Johnny, who committed
various, questionable acts to acquire a TV series.
 The stories’ design is based on six dimensions that cover
important factors raised in the debate around piracy.









To address the question:
5
What is the difference that makes the difference?
 We tell hypothetical stories about one Johnny, who committed
various, questionable acts to acquire a TV series.
 The stories’ design is based on six dimensions that cover
important factors raised in the debate around piracy.
 These are:








To address the question:
5
What is the difference that makes the difference?
 We tell hypothetical stories about one Johnny, who committed
various, questionable acts to acquire a TV series.
 The stories’ design is based on six dimensions that cover
important factors raised in the debate around piracy.
 These are:
 Loss







To address the question:
5
What is the difference that makes the difference?
 We tell hypothetical stories about one Johnny, who committed
various, questionable acts to acquire a TV series.
 The stories’ design is based on six dimensions that cover
important factors raised in the debate around piracy.
 These are:
 Loss
 Physicality






To address the question:
5
What is the difference that makes the difference?
 We tell hypothetical stories about one Johnny, who committed
various, questionable acts to acquire a TV series.
 The stories’ design is based on six dimensions that cover
important factors raised in the debate around piracy.
 These are:
 Loss
 Physicality
 Alternative





To address the question:
5
What is the difference that makes the difference?
 We tell hypothetical stories about one Johnny, who committed
various, questionable acts to acquire a TV series.
 The stories’ design is based on six dimensions that cover
important factors raised in the debate around piracy.
 These are:
 Loss
 Physicality
 Alternative
 Peer




To address the question:
5
What is the difference that makes the difference?
 We tell hypothetical stories about one Johnny, who committed
various, questionable acts to acquire a TV series.
 The stories’ design is based on six dimensions that cover
important factors raised in the debate around piracy.
 These are:
 Loss
 Physicality
 Alternative
 Peer
 Sharing



To address the question:
5
What is the difference that makes the difference?
 We tell hypothetical stories about one Johnny, who committed
various, questionable acts to acquire a TV series.
 The stories’ design is based on six dimensions that cover
important factors raised in the debate around piracy.
 These are:
 Loss
 Physicality
 Alternative
 Peer
 Sharing
 Protection


To address the question:
5
What is the difference that makes the difference?
 We tell hypothetical stories about one Johnny, who committed
various, questionable acts to acquire a TV series.
 The stories’ design is based on six dimensions that cover
important factors raised in the debate around piracy.
 These are:
 Loss
 Physicality
 Alternative
 Peer
 Sharing
 Protection
 Responders are asked to rate the stories.

To address the question:
5
What is the difference that makes the difference?
 We tell hypothetical stories about one Johnny, who committed
various, questionable acts to acquire a TV series.
 The stories’ design is based on six dimensions that cover
important factors raised in the debate around piracy.
 These are:
 Loss
 Physicality
 Alternative
 Peer
 Sharing
 Protection
 Responders are asked to rate the stories.
 Additional questions on personal behaviour and demographics.
Let’s take a few things into account first
6
Vignette experiments








Let’s take a few things into account first
6
Vignette experiments
 Hypothetical situations that the responders judge, evaluate, etc. [11]







Let’s take a few things into account first
6
Vignette experiments
 Hypothetical situations that the responders judge, evaluate, etc. [11]
 Very popular when analyzing controversial choices, like: violence in
patient-doctor relationship
[12]
, alcohol related sexual abuse
[13]
,
classroom cheating
[14]
, or types of theft
[15]
).






Let’s take a few things into account first
6
Vignette experiments
 Hypothetical situations that the responders judge, evaluate, etc. [11]
 Very popular when analyzing controversial choices, like: violence in
patient-doctor relationship
[12]
, alcohol related sexual abuse
[13]
,
classroom cheating
[14]
, or types of theft
[15]
).
 Types of theft – Green (2012)
[15]
.





Let’s take a few things into account first
6
Vignette experiments
 Hypothetical situations that the responders judge, evaluate, etc. [11]
 Very popular when analyzing controversial choices, like: violence in
patient-doctor relationship
[12]
, alcohol related sexual abuse
[13]
,
classroom cheating
[14]
, or types of theft
[15]
).
 Types of theft – Green (2012)
[15]
.
 Sometimes on piracy, but mostly software and not culture
[16] [17]
.
On cultural goods piracy



Let’s take a few things into account first
6
Vignette experiments
 Hypothetical situations that the responders judge, evaluate, etc. [11]
 Very popular when analyzing controversial choices, like: violence in
patient-doctor relationship
[12]
, alcohol related sexual abuse
[13]
,
classroom cheating
[14]
, or types of theft
[15]
).
 Types of theft – Green (2012)
[15]
.
 Sometimes on piracy, but mostly software and not culture
[16] [17]
.
On cultural goods piracy
 Music piracy vs shoplifting (difference explained by law deterrence)
[18]
.


Let’s take a few things into account first
6
Vignette experiments
 Hypothetical situations that the responders judge, evaluate, etc. [11]
 Very popular when analyzing controversial choices, like: violence in
patient-doctor relationship
[12]
, alcohol related sexual abuse
[13]
,
classroom cheating
[14]
, or types of theft
[15]
).
 Types of theft – Green (2012)
[15]
.
 Sometimes on piracy, but mostly software and not culture
[16] [17]
.
On cultural goods piracy
 Music piracy vs shoplifting (difference explained by law deterrence)
[18]
.
 Acquisition of a `test preparation tool’ (physicality and exclusion)
[15]
.

Let’s take a few things into account first
6
Vignette experiments
 Hypothetical situations that the responders judge, evaluate, etc. [11]
 Very popular when analyzing controversial choices, like: violence in
patient-doctor relationship
[12]
, alcohol related sexual abuse
[13]
,
classroom cheating
[14]
, or types of theft
[15]
).
 Types of theft – Green (2012)
[15]
.
 Sometimes on piracy, but mostly software and not culture
[16] [17]
.
On cultural goods piracy
 Music piracy vs shoplifting (difference explained by law deterrence)
[18]
.
 Acquisition of a `test preparation tool’ (physicality and exclusion)
[15]
.
 `Sharing’ (e.g. at a party) is more acceptable than downloading
[19]
.
7
Let’s take a few things into account first
How are pirates different?






7
Let’s take a few things into account first
How are pirates different?
Higher preference for risky behaviour
[20]





7
Let’s take a few things into account first
How are pirates different?
Higher preference for risky behaviour
[20]
Less respect for the rules
[20]




7
Let’s take a few things into account first
How are pirates different?
Higher preference for risky behaviour
[20]
Less respect for the rules
[20]
BUT: willingness to pirate is unrelated to willingness to
shoplifting
[21]



7
Let’s take a few things into account first
How are pirates different?
Higher preference for risky behaviour
[20]
Less respect for the rules
[20]
BUT: willingness to pirate is unrelated to willingness to
shoplifting
[21]
Individual judgement is often harsher than perceived social
norms.
 Although the latter may influence the former.

7
Let’s take a few things into account first
How are pirates different?
Higher preference for risky behaviour
[20]
Less respect for the rules
[20]
BUT: willingness to pirate is unrelated to willingness to
shoplifting
[21]
Individual judgement is often harsher than perceived social
norms.
 Although the latter may influence the former.
Is piracy considered an ethical problem?
[22]
8
The questionnaire









8
The questionnaire
 Rewards offered as an encouragement.








8
The questionnaire
 Rewards offered as an encouragement.
 18 stories that were built upon the six dimensions.







8
The questionnaire
 Rewards offered as an encouragement.
 18 stories that were built upon the six dimensions.
 Two studies.






8
The questionnaire
 Rewards offered as an encouragement.
 18 stories that were built upon the six dimensions.
 Two studies.
Treatments:





8
The questionnaire
 Rewards offered as an encouragement.
 18 stories that were built upon the six dimensions.
 Two studies.
Treatments:
 Treatment I: Ethical Judgement (EJ)




8
The questionnaire
 Rewards offered as an encouragement.
 18 stories that were built upon the six dimensions.
 Two studies.
Treatments:
 Treatment I: Ethical Judgement (EJ)
 Treatment II: Social Norms (SN)



8
The questionnaire
 Rewards offered as an encouragement.
 18 stories that were built upon the six dimensions.
 Two studies.
Treatments:
 Treatment I: Ethical Judgement (EJ)
 Treatment II: Social Norms (SN)
 Treatment III: Incentivized Social Norms (ISN) [23]


8
The questionnaire
 Rewards offered as an encouragement.
 18 stories that were built upon the six dimensions.
 Two studies.
Treatments:
 Treatment I: Ethical Judgement (EJ)
 Treatment II: Social Norms (SN)
 Treatment III: Incentivized Social Norms (ISN) [23]
 Rating scale: 1 – Totaly unacceptable; 4 – Fully acceptable.
 Note that there is no interpretable middle.
9
Story examples
 A friend of Johnny's forgot to log out from his e-mail box, after
using Johnny's computer. While closing the web browser, Johnny
spotted that the mail currently displayed on his screen contained a
one-use only access code for a payable site with TV series in High
Denition. Johnny quickly copied the code, and after returning
home used it on a season of a popular TV series.



9
Story examples
 A friend of Johnny's forgot to log out from his e-mail box, after
using Johnny's computer. While closing the web browser, Johnny
spotted that the mail currently displayed on his screen contained a
one-use only access code for a payable site with TV series in High
Denition. Johnny quickly copied the code, and after returning
home used it on a season of a popular TV series.
 Not physical; Loss; Peer; No alternative; No sharing; Protection


9
Story examples
 A friend of Johnny's forgot to log out from his e-mail box, after
using Johnny's computer. While closing the web browser, Johnny
spotted that the mail currently displayed on his screen contained a
one-use only access code for a payable site with TV series in High
Denition. Johnny quickly copied the code, and after returning
home used it on a season of a popular TV series.
 Not physical; Loss; Peer; No alternative; No sharing; Protection
 A new season of a popular, high budget, American TV series is
available in kiosks as an add-on for a magazine priced 7.99 PLN.
However, Johnny downloaded the series from another source, for
free.

9
Story examples
 A friend of Johnny's forgot to log out from his e-mail box, after
using Johnny's computer. While closing the web browser, Johnny
spotted that the mail currently displayed on his screen contained a
one-use only access code for a payable site with TV series in High
Denition. Johnny quickly copied the code, and after returning
home used it on a season of a popular TV series.
 Not physical; Loss; Peer; No alternative; No sharing; Protection
 A new season of a popular, high budget, American TV series is
available in kiosks as an add-on for a magazine priced 7.99 PLN.
However, Johnny downloaded the series from another source, for
free.
 Not physical; No loss; Not a peer; Alternative; No sharing; No protection.
Sample – Study 1
10
 Students of the University of Warsaw (around 50% Economics)
 Young age (~24)
 Balanced gender (~60% female)
 N=338
Sample – Study 1
10
The Survey Bay[24]:
Responders’ age
 Students of the University of Warsaw (around 50% Economics)
 Young age (~24)
 Balanced gender (~60% female)
 N=338
11
Sample – Study 2
Second:
Followers of Facebook profiles of organizations promoting
legal acquisition of culture (note what’s legal in Poland).
Slightly older than Study I (~28)
Mostly female (~68%)
N=129
12
Methodology
To tackle the question, we estimate ordered logit regressions:
Answer = β1Dimensions + β2Controls + ε








12
Methodology
To tackle the question, we estimate ordered logit regressions:
Answer = β1Dimensions + β2Controls + ε
 1) The baseline regression and robustness.
 Robust to duration of the answers and controversial questions.
 Therefore, I do not report this in this presentation.





12
Methodology
To tackle the question, we estimate ordered logit regressions:
Answer = β1Dimensions + β2Controls + ε
 1) The baseline regression and robustness.
 Robust to duration of the answers and controversial questions.
 Therefore, I do not report this in this presentation.
 2) Regressions by treatment groups. Is there a difference?




12
Methodology
To tackle the question, we estimate ordered logit regressions:
Answer = β1Dimensions + β2Controls + ε
 1) The baseline regression and robustness.
 Robust to duration of the answers and controversial questions.
 Therefore, I do not report this in this presentation.
 2) Regressions by treatment groups. Is there a difference?
 3) Internet-user groups. Does the judgement differ if you’re a
(non)downloader? Do the dimension coefficients?



12
Methodology
To tackle the question, we estimate ordered logit regressions:
Answer = β1Dimensions + β2Controls + ε
 1) The baseline regression and robustness.
 Robust to duration of the answers and controversial questions.
 Therefore, I do not report this in this presentation.
 2) Regressions by treatment groups. Is there a difference?
 3) Internet-user groups. Does the judgement differ if you’re a
(non)downloader? Do the dimension coefficients?
 4) Regressions with interactions.
 Physical*Protection (DRM), Sharing*Peer (Promotion), Peer*Loss (Major/Minor)
 Insignificant and therefore not reported.
Results: The treatments
13Note: * p < 0.05; ** p < 0.01
Results: The groups (downloaders)
14Note: * p < 0.05; ** p < 0.01
Results: The groups (downloaders)
14Note: * p < 0.05; ** p < 0.01
Results: The groups (downloaders)
14Note: * p < 0.05; ** p < 0.01
Results: The groups (uploaders)
15Note: * p < 0.05; ** p < 0.01
Results: The groups (uploaders)
15Note: * p < 0.05; ** p < 0.01
16
Conclusions











16
Conclusions
The importance of dimensions:
 Physicality (Most important)
 Loss
 Protection
 Peer
 Sharing
 Alternative (Insignificant)




16
Conclusions
The importance of dimensions:
 Physicality (Most important)
 Loss
 Protection
 Peer
 Sharing
 Alternative (Insignificant)
Individual opinion is harsher than perceived social norms.
 Incentives do not change the results (much).


16
Conclusions
The importance of dimensions:
 Physicality (Most important)
 Loss
 Protection
 Peer
 Sharing
 Alternative (Insignificant)
Individual opinion is harsher than perceived social norms.
 Incentives do not change the results (much).
More frequent downloaders are possibly more conscious of
the dimensions, and are more sensitive to some of them. This
may reflect higher knowledge of the subject.

16
Conclusions
The importance of dimensions:
 Physicality (Most important)
 Loss
 Protection
 Peer
 Sharing
 Alternative (Insignificant)
Individual opinion is harsher than perceived social norms.
 Incentives do not change the results (much).
More frequent downloaders are possibly more conscious of
the dimensions, and are more sensitive to some of them. This
may reflect higher knowledge of the subject.
Policies should be focused on particular aspects of piracy.
17
Not fully explored data












17
Not fully explored data
Gender
Age










17
Not fully explored data
Gender
Age
Uploading for friends
Downloading from authorized sources
Downloading from unauthorized (with or without payment)







17
Not fully explored data
Gender
Age
Uploading for friends
Downloading from authorized sources
Downloading from unauthorized (with or without payment)
(Only study 1) types of studies






17
Not fully explored data
Gender
Age
Uploading for friends
Downloading from authorized sources
Downloading from unauthorized (with or without payment)
(Only study 1) types of studies
(Only study 2) information on Facebook `likes’ of:
 Unauthorized streaming services
 Authorized streaming services
 Institutions
(Only study 2) Level of education (no variation in study 1)
(Only study 2) Labour market status
18
Bibliography
[1] RIAA, Frequently Asked Questions, archived version from 2011:
http://web.archive.org/web/20110123180931/http://www.riaa.com/faq.php
[2] MPAA, What is Internet Piracy?, archived version from 2010:
http://web.archive.org/web/20100327204736/http://www.mpaa.org/piracy_internet.asp
[3] Jacek Kowalski (2012), ZPAV ostro o kampanii społecznej `Prawo kultury’: To zachęcanie
do złodziejstwa, accessed on 28-03-2014 at
http://m.wyborcza.pl/wyborcza/1,105226,13112726,ZPAV_ostro_o_kampanii_spolecznej_
_Prawo_kultury__.html
[4] Larsson, S., 2011. Piracy is not theft: Problems of a nonsense metaphor. Accessed 2014-
03-04. URL https://torrentfreak.com/piracy-is-not-theft-111104/
[5] Persson, M., 2011. Minecraft creator says `no such thing as a lost sale'. Accessed 2014-
03-04. URL http://www.techdirt.com/articles/20110303/02203613336/minecraft-creator-
says-no-such-thing-as-lost-sale.shtml
[6] Hart, R., 2012. Top 10 reasons people use to justify pirating digital content (and why
they're wrong). Accessed 2014-03-04. URL http://litreactor.com/columns/top-10-reasons-
people-use-to-justify-pirating-digital-content-and-why-theyre-wrong
19
Bibliography - continued
[7] Wilson, M., 2013. Piracy isn't theft, but its eects are wide and far-reaching. Accessed
2014-03-04. URL http://betanews.com/2013/09/16/piracy-isnt-theft-but-its-effects-are-
wide-and-far-reaching/
[8] Tassi, P., 2012. You will never kill piracy, and piracy will never kill you. Accessed 2014-
03-04. URL http://www.forbes.com/sites/insertcoin/2012/02/03/you-will-never-kill-piracy-
and-piracy-will-never-kill-you/2/
[9] James, G., 2013. Why piracy is never okay. Accessed 2014-03-04. URL
http://amazingstoriesmag.com/2013/02/why-piracy-is-never-okay/
[10] Goessl, L., 2007. Music piracy is downloading music ethical { no. Accessed 2014-03-04.
URL http://www.entertainmentscene360.com/index.php/music-piracy-is-downloading-
music-ethical-no-18-44608/
[11] Schoenberg, N. E., Ravdal, H., 2000. Using vignettes in awareness and attitudinal
research. International Journal of Social Research Methodology 3 (1), 63{74.
[12] Steinert, T., Lepping, P., 2009. Legal provisions and practice in the management of
violent patients. a case vignette study in 16 european countries. European Psychiatry 24
(2), 135{141.
20
Bibliography - continued
[13] Abbey, A., 2002. Alcohol-related sexual assault: A common problem among college
students. Journal of Studies on Alcohol and Drugs (14), 118.
[14] Rettinger, D. A., Jordan, A. E., Peschiera, F., 2004. Evaluating the motivation of other
students to cheat: A vignette experiment. Research in Higher Education 45 (8), 873{890.
[15] Green, S. P., 2012. Thirteen Ways to Steal a Bicycle: Theft Law in the Information Age.
Harvard University Press.
[16] Lin, T.-C., Hsu, M. H., Kuo, F.-Y., Sun, P.-C., 1999. An intention model-based study of
software piracy. In: System Sciences, 1999. HICSS-32. Proceedings of the 32nd Annual
Hawaii International Conference on. IEEE, pp. 8{pp.
[17] Higgins, G. E., Wilson, A. L., Fell, B. D., 2005. An application of deterrence theory to
software piracy. Journal of Criminal Justice and Popular Culture 12 (3), 166{184.
[18] Wingrove, T., Korpas, A. L., Weisz, V., 2011. Why were millions of people not obeying
the law? Motivational influences on non-compliance with the law in the case of music
piracy. Psychology, crime & law 17 (3), 261{276.
21
Bibliography - continued
[19] Altschuller, S., Benbunan-Fich, R., 2009. Is music downloading the new
prohibition? what students reveal through an ethical dilemma. Ethics and
Information Technology 11 (1), 49{56.
[20] Robertson, K., McNeill, L., Green, J., Roberts, C., 2012. Illegal downloading,
ethical concern, and illegal behavior. Journal of Business Ethics 108 (2), 215{227.
[21] Hill, C. W., 2007. Digital piracy: Causes, consequences, and strategic
responses. Asia Pacic Journal of Management 24 (1), 9{25.
[22] Bateman, C. R., Valentine, S., Rittenburg, T., 2013. Ethical decision making in
a peer-to-peer filesharing situation: The role of moral absolutes and social
consensus. Journal of Business Ethics 115 (2), 229{240.
[23] Krupka, E. L., Weber, R. A., 2013. Identifying social norms using coordination
games: Why does dictator game sharing vary? Journal of the European Economic
Association 11 (3), 495{524.
[24] The Survey Bay: www.thesurveybay.com; accessed on 28-03-2014.
Thank you for your attention!
More info: grape.uw.edu.pl/ipiracy/research-seminar
Author: Wojciech Hardy
e-mail: whardy@wne.uw.edu.pl
More about our research on:
http://grape.uw.edu.pl/ipiracy
facebook.com/ipiracy
Twitter: @GrapeUW

Mais conteúdo relacionado

Mais procurados

Analysis of results in survey
Analysis of results in surveyAnalysis of results in survey
Analysis of results in surveygeorgia morrell
 
Internet piracy and book sales. A field experiment.
Internet piracy and book sales. A field experiment.Internet piracy and book sales. A field experiment.
Internet piracy and book sales. A field experiment.GRAPE
 
Critical Evaluation Question 3
Critical Evaluation Question 3Critical Evaluation Question 3
Critical Evaluation Question 3SaiyaraMedia
 
What have you learned from your audience feedback
What have you learned from your audience feedbackWhat have you learned from your audience feedback
What have you learned from your audience feedbackhaiyeee
 
Video Games and Gendered development powerpoint
Video Games and Gendered development powerpointVideo Games and Gendered development powerpoint
Video Games and Gendered development powerpointbcomputerconsulting
 
Questionnaire Results Analysis
Questionnaire Results AnalysisQuestionnaire Results Analysis
Questionnaire Results Analysiselliotbrownnn
 
A Review of “Counterfactual thinking and the first instinct fallacy” by Kruge...
A Review of “Counterfactual thinking and the first instinct fallacy” by Kruge...A Review of “Counterfactual thinking and the first instinct fallacy” by Kruge...
A Review of “Counterfactual thinking and the first instinct fallacy” by Kruge...Richard Thripp
 
Is censorship a good or bad idea?
Is censorship a good or bad idea?Is censorship a good or bad idea?
Is censorship a good or bad idea?PJG123
 

Mais procurados (12)

Analysis of results in survey
Analysis of results in surveyAnalysis of results in survey
Analysis of results in survey
 
O Behave! Issue 22
O Behave! Issue 22O Behave! Issue 22
O Behave! Issue 22
 
Internet piracy and book sales. A field experiment.
Internet piracy and book sales. A field experiment.Internet piracy and book sales. A field experiment.
Internet piracy and book sales. A field experiment.
 
Critical Evaluation Question 3
Critical Evaluation Question 3Critical Evaluation Question 3
Critical Evaluation Question 3
 
Gender powerpoint
Gender powerpointGender powerpoint
Gender powerpoint
 
What have you learned from your audience feedback
What have you learned from your audience feedbackWhat have you learned from your audience feedback
What have you learned from your audience feedback
 
Video Games and Gendered development powerpoint
Video Games and Gendered development powerpointVideo Games and Gendered development powerpoint
Video Games and Gendered development powerpoint
 
Questionnaire Results Analysis
Questionnaire Results AnalysisQuestionnaire Results Analysis
Questionnaire Results Analysis
 
Pornography essay
Pornography essayPornography essay
Pornography essay
 
A Review of “Counterfactual thinking and the first instinct fallacy” by Kruge...
A Review of “Counterfactual thinking and the first instinct fallacy” by Kruge...A Review of “Counterfactual thinking and the first instinct fallacy” by Kruge...
A Review of “Counterfactual thinking and the first instinct fallacy” by Kruge...
 
Propaganda techniques overgeneralizing lesson by Dean Berry
Propaganda techniques  overgeneralizing lesson by Dean BerryPropaganda techniques  overgeneralizing lesson by Dean Berry
Propaganda techniques overgeneralizing lesson by Dean Berry
 
Is censorship a good or bad idea?
Is censorship a good or bad idea?Is censorship a good or bad idea?
Is censorship a good or bad idea?
 

Destaque

Pirat tez czlowiek
Pirat tez czlowiekPirat tez czlowiek
Pirat tez czlowiekGRAPE
 
Internet Piracy and Book Sales
Internet Piracy and Book SalesInternet Piracy and Book Sales
Internet Piracy and Book SalesGRAPE
 
Podsumowanie Badań iPiracy, 2012-2015
Podsumowanie Badań iPiracy, 2012-2015Podsumowanie Badań iPiracy, 2012-2015
Podsumowanie Badań iPiracy, 2012-2015GRAPE
 
‟If I can set my own price for tonight’s show I will pay more after watching ...
‟If I can set my own price for tonight’s show I will pay more after watching ...‟If I can set my own price for tonight’s show I will pay more after watching ...
‟If I can set my own price for tonight’s show I will pay more after watching ...GRAPE
 
The strength of ‟anchoring effect” on Pay What You Want payments: Evidence fr...
The strength of ‟anchoring effect” on Pay What You Want payments: Evidence fr...The strength of ‟anchoring effect” on Pay What You Want payments: Evidence fr...
The strength of ‟anchoring effect” on Pay What You Want payments: Evidence fr...GRAPE
 
Leading by example: Evidence from PWYW
Leading by example: Evidence from PWYWLeading by example: Evidence from PWYW
Leading by example: Evidence from PWYWGRAPE
 
Week 5 discussion
Week 5 discussionWeek 5 discussion
Week 5 discussionpejansen
 
The problem of online piracy
The problem of online piracyThe problem of online piracy
The problem of online piracyKyle Taksar
 
Video piracy and its Impact on indian film industry
Video piracy and its Impact on indian film industryVideo piracy and its Impact on indian film industry
Video piracy and its Impact on indian film industryVivek Dhupdale
 
Copyright issues in digital media
Copyright issues in digital mediaCopyright issues in digital media
Copyright issues in digital mediaAltacit Global
 
Google's Effort to Fight Content Piracy
Google's Effort to Fight Content PiracyGoogle's Effort to Fight Content Piracy
Google's Effort to Fight Content PiracyThe Hacker News
 
How google fights piracy 2016
How google fights piracy 2016How google fights piracy 2016
How google fights piracy 2016Greg Sterling
 
A journey of porn, piracy and digital art
A journey of porn, piracy and digital artA journey of porn, piracy and digital art
A journey of porn, piracy and digital artDomenico Barra
 

Destaque (13)

Pirat tez czlowiek
Pirat tez czlowiekPirat tez czlowiek
Pirat tez czlowiek
 
Internet Piracy and Book Sales
Internet Piracy and Book SalesInternet Piracy and Book Sales
Internet Piracy and Book Sales
 
Podsumowanie Badań iPiracy, 2012-2015
Podsumowanie Badań iPiracy, 2012-2015Podsumowanie Badań iPiracy, 2012-2015
Podsumowanie Badań iPiracy, 2012-2015
 
‟If I can set my own price for tonight’s show I will pay more after watching ...
‟If I can set my own price for tonight’s show I will pay more after watching ...‟If I can set my own price for tonight’s show I will pay more after watching ...
‟If I can set my own price for tonight’s show I will pay more after watching ...
 
The strength of ‟anchoring effect” on Pay What You Want payments: Evidence fr...
The strength of ‟anchoring effect” on Pay What You Want payments: Evidence fr...The strength of ‟anchoring effect” on Pay What You Want payments: Evidence fr...
The strength of ‟anchoring effect” on Pay What You Want payments: Evidence fr...
 
Leading by example: Evidence from PWYW
Leading by example: Evidence from PWYWLeading by example: Evidence from PWYW
Leading by example: Evidence from PWYW
 
Week 5 discussion
Week 5 discussionWeek 5 discussion
Week 5 discussion
 
The problem of online piracy
The problem of online piracyThe problem of online piracy
The problem of online piracy
 
Video piracy and its Impact on indian film industry
Video piracy and its Impact on indian film industryVideo piracy and its Impact on indian film industry
Video piracy and its Impact on indian film industry
 
Copyright issues in digital media
Copyright issues in digital mediaCopyright issues in digital media
Copyright issues in digital media
 
Google's Effort to Fight Content Piracy
Google's Effort to Fight Content PiracyGoogle's Effort to Fight Content Piracy
Google's Effort to Fight Content Piracy
 
How google fights piracy 2016
How google fights piracy 2016How google fights piracy 2016
How google fights piracy 2016
 
A journey of porn, piracy and digital art
A journey of porn, piracy and digital artA journey of porn, piracy and digital art
A journey of porn, piracy and digital art
 

Semelhante a Why is online piracy ethically different from theft? A vignette experiment.

Argumentative Essay For Animal Farm
Argumentative Essay For Animal FarmArgumentative Essay For Animal Farm
Argumentative Essay For Animal FarmRosa Williams
 
Sample Board Resolution Meeting Agenda Template,
Sample Board Resolution Meeting Agenda Template,Sample Board Resolution Meeting Agenda Template,
Sample Board Resolution Meeting Agenda Template,Lisa Riley
 
How To Cite Documents In Dbq Essay
How To Cite Documents In Dbq EssayHow To Cite Documents In Dbq Essay
How To Cite Documents In Dbq EssayLydia Jana
 
Christmas Present Writing Template (Teacher Made)
Christmas Present Writing Template (Teacher Made)Christmas Present Writing Template (Teacher Made)
Christmas Present Writing Template (Teacher Made)Joaquin Hamad
 
How To Write A Great Essay. Online assignment writing service.
How To Write A Great Essay. Online assignment writing service.How To Write A Great Essay. Online assignment writing service.
How To Write A Great Essay. Online assignment writing service.Jessica Henderson
 
Blank Handwriting Worksheets For Kindergart
Blank Handwriting Worksheets For KindergartBlank Handwriting Worksheets For Kindergart
Blank Handwriting Worksheets For KindergartJasmine Culbreth
 
The Corporal Works Of Mercy
The Corporal Works Of MercyThe Corporal Works Of Mercy
The Corporal Works Of MercyRick Vogel
 
016 Essay Example Apa Research Paper Outline
016 Essay Example Apa Research Paper Outline016 Essay Example Apa Research Paper Outline
016 Essay Example Apa Research Paper OutlineNicole Jones
 
Leonardo Da Vinci Essay Thesis. Online assignment writing service.
Leonardo Da Vinci Essay Thesis. Online assignment writing service.Leonardo Da Vinci Essay Thesis. Online assignment writing service.
Leonardo Da Vinci Essay Thesis. Online assignment writing service.Brittany Harper
 
National Flag Essay In Tamil
National Flag Essay In TamilNational Flag Essay In Tamil
National Flag Essay In TamilJamie Jackson
 
22 Of The Most Creative College Essay Questions From 2013
22 Of The Most Creative College Essay Questions From 201322 Of The Most Creative College Essay Questions From 2013
22 Of The Most Creative College Essay Questions From 2013Natasha Hopper
 
22 Of The Most Creative College Essay Questions From 2013
22 Of The Most Creative College Essay Questions From 201322 Of The Most Creative College Essay Questions From 2013
22 Of The Most Creative College Essay Questions From 2013Tracy Drey
 
22 Of The Most Creative College Essay Questions From 2013
22 Of The Most Creative College Essay Questions From 201322 Of The Most Creative College Essay Questions From 2013
22 Of The Most Creative College Essay Questions From 2013Beth Hall
 
Dragons Writing Paper
Dragons Writing PaperDragons Writing Paper
Dragons Writing PaperAngela Baxter
 
Schizophrenia Essay Research Paper
Schizophrenia Essay Research PaperSchizophrenia Essay Research Paper
Schizophrenia Essay Research PaperEbony Harris
 
How To Write A Great Persuasive Essay
How To Write A Great Persuasive EssayHow To Write A Great Persuasive Essay
How To Write A Great Persuasive EssayPamela Adams
 
How To Do A Proper Essay Title Page
How To Do A Proper Essay Title PageHow To Do A Proper Essay Title Page
How To Do A Proper Essay Title PageChristina Roy
 
500 Word Essay Scholarships. 20 Easy 5. Online assignment writing service.
500 Word Essay Scholarships. 20 Easy 5. Online assignment writing service.500 Word Essay Scholarships. 20 Easy 5. Online assignment writing service.
500 Word Essay Scholarships. 20 Easy 5. Online assignment writing service.Shannon Green
 
Essay On IndiaS Population In Hindi
Essay On IndiaS Population In HindiEssay On IndiaS Population In Hindi
Essay On IndiaS Population In HindiAmanda Cote
 

Semelhante a Why is online piracy ethically different from theft? A vignette experiment. (20)

Argumentative Essay For Animal Farm
Argumentative Essay For Animal FarmArgumentative Essay For Animal Farm
Argumentative Essay For Animal Farm
 
Sample Board Resolution Meeting Agenda Template,
Sample Board Resolution Meeting Agenda Template,Sample Board Resolution Meeting Agenda Template,
Sample Board Resolution Meeting Agenda Template,
 
How To Cite Documents In Dbq Essay
How To Cite Documents In Dbq EssayHow To Cite Documents In Dbq Essay
How To Cite Documents In Dbq Essay
 
Christmas Present Writing Template (Teacher Made)
Christmas Present Writing Template (Teacher Made)Christmas Present Writing Template (Teacher Made)
Christmas Present Writing Template (Teacher Made)
 
How To Write A Great Essay. Online assignment writing service.
How To Write A Great Essay. Online assignment writing service.How To Write A Great Essay. Online assignment writing service.
How To Write A Great Essay. Online assignment writing service.
 
Blank Handwriting Worksheets For Kindergart
Blank Handwriting Worksheets For KindergartBlank Handwriting Worksheets For Kindergart
Blank Handwriting Worksheets For Kindergart
 
The Corporal Works Of Mercy
The Corporal Works Of MercyThe Corporal Works Of Mercy
The Corporal Works Of Mercy
 
016 Essay Example Apa Research Paper Outline
016 Essay Example Apa Research Paper Outline016 Essay Example Apa Research Paper Outline
016 Essay Example Apa Research Paper Outline
 
Leonardo Da Vinci Essay Thesis. Online assignment writing service.
Leonardo Da Vinci Essay Thesis. Online assignment writing service.Leonardo Da Vinci Essay Thesis. Online assignment writing service.
Leonardo Da Vinci Essay Thesis. Online assignment writing service.
 
National Flag Essay In Tamil
National Flag Essay In TamilNational Flag Essay In Tamil
National Flag Essay In Tamil
 
22 Of The Most Creative College Essay Questions From 2013
22 Of The Most Creative College Essay Questions From 201322 Of The Most Creative College Essay Questions From 2013
22 Of The Most Creative College Essay Questions From 2013
 
22 Of The Most Creative College Essay Questions From 2013
22 Of The Most Creative College Essay Questions From 201322 Of The Most Creative College Essay Questions From 2013
22 Of The Most Creative College Essay Questions From 2013
 
22 Of The Most Creative College Essay Questions From 2013
22 Of The Most Creative College Essay Questions From 201322 Of The Most Creative College Essay Questions From 2013
22 Of The Most Creative College Essay Questions From 2013
 
Dragons Writing Paper
Dragons Writing PaperDragons Writing Paper
Dragons Writing Paper
 
Dragons Writing Paper
Dragons Writing PaperDragons Writing Paper
Dragons Writing Paper
 
Schizophrenia Essay Research Paper
Schizophrenia Essay Research PaperSchizophrenia Essay Research Paper
Schizophrenia Essay Research Paper
 
How To Write A Great Persuasive Essay
How To Write A Great Persuasive EssayHow To Write A Great Persuasive Essay
How To Write A Great Persuasive Essay
 
How To Do A Proper Essay Title Page
How To Do A Proper Essay Title PageHow To Do A Proper Essay Title Page
How To Do A Proper Essay Title Page
 
500 Word Essay Scholarships. 20 Easy 5. Online assignment writing service.
500 Word Essay Scholarships. 20 Easy 5. Online assignment writing service.500 Word Essay Scholarships. 20 Easy 5. Online assignment writing service.
500 Word Essay Scholarships. 20 Easy 5. Online assignment writing service.
 
Essay On IndiaS Population In Hindi
Essay On IndiaS Population In HindiEssay On IndiaS Population In Hindi
Essay On IndiaS Population In Hindi
 

Mais de GRAPE

Gender board diversity and firm performance: evidence from European data
Gender board diversity and firm performance: evidence from European dataGender board diversity and firm performance: evidence from European data
Gender board diversity and firm performance: evidence from European dataGRAPE
 
Demographic transition and the rise of wealth inequality
Demographic transition and the rise of wealth inequalityDemographic transition and the rise of wealth inequality
Demographic transition and the rise of wealth inequalityGRAPE
 
(Gender) tone at the top: the effect of board diversity on gender inequality
(Gender) tone at the top: the effect of board diversity on gender inequality(Gender) tone at the top: the effect of board diversity on gender inequality
(Gender) tone at the top: the effect of board diversity on gender inequalityGRAPE
 
Gender board diversity spillovers and the public eye
Gender board diversity spillovers and the public eyeGender board diversity spillovers and the public eye
Gender board diversity spillovers and the public eyeGRAPE
 
Wage Inequality and women's self-employment
Wage Inequality and women's self-employmentWage Inequality and women's self-employment
Wage Inequality and women's self-employmentGRAPE
 
Contracts with Interdependent Preferences (2)
Contracts with Interdependent Preferences (2)Contracts with Interdependent Preferences (2)
Contracts with Interdependent Preferences (2)GRAPE
 
Empathy in risky choices on behalf of others
Empathy in risky choices on behalf of othersEmpathy in risky choices on behalf of others
Empathy in risky choices on behalf of othersGRAPE
 
Contracts with Interdependent Preferences
Contracts with Interdependent PreferencesContracts with Interdependent Preferences
Contracts with Interdependent PreferencesGRAPE
 
Tone at the top: the effects of gender board diversity on gender wage inequal...
Tone at the top: the effects of gender board diversity on gender wage inequal...Tone at the top: the effects of gender board diversity on gender wage inequal...
Tone at the top: the effects of gender board diversity on gender wage inequal...GRAPE
 
Gender board diversity spillovers and the public eye
Gender board diversity spillovers and the public eyeGender board diversity spillovers and the public eye
Gender board diversity spillovers and the public eyeGRAPE
 
The European Unemployment Puzzle: implications from population aging
The European Unemployment Puzzle: implications from population agingThe European Unemployment Puzzle: implications from population aging
The European Unemployment Puzzle: implications from population agingGRAPE
 
ENTIME_GEM___GAP.pdf
ENTIME_GEM___GAP.pdfENTIME_GEM___GAP.pdf
ENTIME_GEM___GAP.pdfGRAPE
 
POSTER_EARHART.pdf
POSTER_EARHART.pdfPOSTER_EARHART.pdf
POSTER_EARHART.pdfGRAPE
 
Boston_College Slides.pdf
Boston_College Slides.pdfBoston_College Slides.pdf
Boston_College Slides.pdfGRAPE
 
Presentation_Yale.pdf
Presentation_Yale.pdfPresentation_Yale.pdf
Presentation_Yale.pdfGRAPE
 
Presentation_Columbia.pdf
Presentation_Columbia.pdfPresentation_Columbia.pdf
Presentation_Columbia.pdfGRAPE
 
Presentation.pdf
Presentation.pdfPresentation.pdf
Presentation.pdfGRAPE
 
Presentation.pdf
Presentation.pdfPresentation.pdf
Presentation.pdfGRAPE
 
Presentation.pdf
Presentation.pdfPresentation.pdf
Presentation.pdfGRAPE
 
Slides.pdf
Slides.pdfSlides.pdf
Slides.pdfGRAPE
 

Mais de GRAPE (20)

Gender board diversity and firm performance: evidence from European data
Gender board diversity and firm performance: evidence from European dataGender board diversity and firm performance: evidence from European data
Gender board diversity and firm performance: evidence from European data
 
Demographic transition and the rise of wealth inequality
Demographic transition and the rise of wealth inequalityDemographic transition and the rise of wealth inequality
Demographic transition and the rise of wealth inequality
 
(Gender) tone at the top: the effect of board diversity on gender inequality
(Gender) tone at the top: the effect of board diversity on gender inequality(Gender) tone at the top: the effect of board diversity on gender inequality
(Gender) tone at the top: the effect of board diversity on gender inequality
 
Gender board diversity spillovers and the public eye
Gender board diversity spillovers and the public eyeGender board diversity spillovers and the public eye
Gender board diversity spillovers and the public eye
 
Wage Inequality and women's self-employment
Wage Inequality and women's self-employmentWage Inequality and women's self-employment
Wage Inequality and women's self-employment
 
Contracts with Interdependent Preferences (2)
Contracts with Interdependent Preferences (2)Contracts with Interdependent Preferences (2)
Contracts with Interdependent Preferences (2)
 
Empathy in risky choices on behalf of others
Empathy in risky choices on behalf of othersEmpathy in risky choices on behalf of others
Empathy in risky choices on behalf of others
 
Contracts with Interdependent Preferences
Contracts with Interdependent PreferencesContracts with Interdependent Preferences
Contracts with Interdependent Preferences
 
Tone at the top: the effects of gender board diversity on gender wage inequal...
Tone at the top: the effects of gender board diversity on gender wage inequal...Tone at the top: the effects of gender board diversity on gender wage inequal...
Tone at the top: the effects of gender board diversity on gender wage inequal...
 
Gender board diversity spillovers and the public eye
Gender board diversity spillovers and the public eyeGender board diversity spillovers and the public eye
Gender board diversity spillovers and the public eye
 
The European Unemployment Puzzle: implications from population aging
The European Unemployment Puzzle: implications from population agingThe European Unemployment Puzzle: implications from population aging
The European Unemployment Puzzle: implications from population aging
 
ENTIME_GEM___GAP.pdf
ENTIME_GEM___GAP.pdfENTIME_GEM___GAP.pdf
ENTIME_GEM___GAP.pdf
 
POSTER_EARHART.pdf
POSTER_EARHART.pdfPOSTER_EARHART.pdf
POSTER_EARHART.pdf
 
Boston_College Slides.pdf
Boston_College Slides.pdfBoston_College Slides.pdf
Boston_College Slides.pdf
 
Presentation_Yale.pdf
Presentation_Yale.pdfPresentation_Yale.pdf
Presentation_Yale.pdf
 
Presentation_Columbia.pdf
Presentation_Columbia.pdfPresentation_Columbia.pdf
Presentation_Columbia.pdf
 
Presentation.pdf
Presentation.pdfPresentation.pdf
Presentation.pdf
 
Presentation.pdf
Presentation.pdfPresentation.pdf
Presentation.pdf
 
Presentation.pdf
Presentation.pdfPresentation.pdf
Presentation.pdf
 
Slides.pdf
Slides.pdfSlides.pdf
Slides.pdf
 

Último

BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...Pooja Nehwal
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...anjaliyadav012327
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 

Último (20)

BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 

Why is online piracy ethically different from theft? A vignette experiment.

  • 1. Why is online piracy ethically different from theft? A vignette experiment. Wojciech Hardy, Michał Krawczyk, Joanna Tyrowicz Group for Research in APplied Economics
  • 2. Introduction: If you download you’re a thief! 2
  • 3. Introduction: If you download you’re a thief! „When you go online and download songs without permission, you are stealing. The illegal downloading of music is just as wrong as shoplifting from a local convenience store (…)” ---RIAA, Official stance on piracy (until 2011) [1] 2
  • 4. Introduction: If you download you’re a thief! „When you go online and download songs without permission, you are stealing. The illegal downloading of music is just as wrong as shoplifting from a local convenience store (…)” ---RIAA, Official stance on piracy (until 2011) [1] 2 „Piracy is theft, and pirates are thieves, plain and simple. Downloading a movie off of the Internet is the same as taking a DVD off a store shelf without paying for it.” ---MPAA, What is Internet piracy? (until 2010) [2]
  • 5. Introduction: If you download you’re a thief! „When you go online and download songs without permission, you are stealing. The illegal downloading of music is just as wrong as shoplifting from a local convenience store (…)” ---RIAA, Official stance on piracy (until 2011) [1] 2 „It's as if we were advising people on how to steal from supermarkets (...) Everything's alright in the legal terms, but, without any doubts, this IS stealing from artists and - I repeat - is causing harm to culture.” --- Bogusław Pluta, director of ZPAV (2012) [3] „Piracy is theft, and pirates are thieves, plain and simple. Downloading a movie off of the Internet is the same as taking a DVD off a store shelf without paying for it.” ---MPAA, What is Internet piracy? (until 2010) [2]
  • 6. And the views of the society? 3
  • 7. And the views of the society? 3 Source: http://piracy.americanassembly.org/wp-content/uploads/2011/11/AA-Research-Note-Infringement-and- Enforcement-November-2011.pdf
  • 8. And the views of the society? Definitely not the same percentage of people that steal from shops (at least I hope so ). So what is it that actually makes the difference? 3 Source: http://piracy.americanassembly.org/wp-content/uploads/2011/11/AA-Research-Note-Infringement-and- Enforcement-November-2011.pdf
  • 9. Common reasons for piracy: 4     
  • 10. Common reasons for piracy: 4  There is no loss if you copy something. [4] [5]    
  • 11. Common reasons for piracy: 4  There is no loss if you copy something. [4] [5]  Why not copy if there’s no available alternative. [6]   
  • 12. Common reasons for piracy: 4  There is no loss if you copy something. [4] [5]  Why not copy if there’s no available alternative. [6]  They are just some big capitalist companies, who won’t receive my few dollars.[6] [7]  
  • 13. Common reasons for piracy: 4  There is no loss if you copy something. [4] [5]  Why not copy if there’s no available alternative. [6]  They are just some big capitalist companies, who won’t receive my few dollars.[6] [7]  It requires no effort at all to make a copy. [8] [9] 
  • 14. Common reasons for piracy: 4  There is no loss if you copy something. [4] [5]  Why not copy if there’s no available alternative. [6]  They are just some big capitalist companies, who won’t receive my few dollars.[6] [7]  It requires no effort at all to make a copy. [8] [9]  It’s much easier when you don’t have to look the victim in the eye. [10]
  • 15. To address the question: 5 What is the difference that makes the difference?           
  • 16. To address the question: 5 What is the difference that makes the difference?  We tell hypothetical stories about one Johnny, who committed various, questionable acts to acquire a TV series.          
  • 17. To address the question: 5 What is the difference that makes the difference?  We tell hypothetical stories about one Johnny, who committed various, questionable acts to acquire a TV series.  The stories’ design is based on six dimensions that cover important factors raised in the debate around piracy.         
  • 18. To address the question: 5 What is the difference that makes the difference?  We tell hypothetical stories about one Johnny, who committed various, questionable acts to acquire a TV series.  The stories’ design is based on six dimensions that cover important factors raised in the debate around piracy.  These are:        
  • 19. To address the question: 5 What is the difference that makes the difference?  We tell hypothetical stories about one Johnny, who committed various, questionable acts to acquire a TV series.  The stories’ design is based on six dimensions that cover important factors raised in the debate around piracy.  These are:  Loss       
  • 20. To address the question: 5 What is the difference that makes the difference?  We tell hypothetical stories about one Johnny, who committed various, questionable acts to acquire a TV series.  The stories’ design is based on six dimensions that cover important factors raised in the debate around piracy.  These are:  Loss  Physicality      
  • 21. To address the question: 5 What is the difference that makes the difference?  We tell hypothetical stories about one Johnny, who committed various, questionable acts to acquire a TV series.  The stories’ design is based on six dimensions that cover important factors raised in the debate around piracy.  These are:  Loss  Physicality  Alternative     
  • 22. To address the question: 5 What is the difference that makes the difference?  We tell hypothetical stories about one Johnny, who committed various, questionable acts to acquire a TV series.  The stories’ design is based on six dimensions that cover important factors raised in the debate around piracy.  These are:  Loss  Physicality  Alternative  Peer    
  • 23. To address the question: 5 What is the difference that makes the difference?  We tell hypothetical stories about one Johnny, who committed various, questionable acts to acquire a TV series.  The stories’ design is based on six dimensions that cover important factors raised in the debate around piracy.  These are:  Loss  Physicality  Alternative  Peer  Sharing   
  • 24. To address the question: 5 What is the difference that makes the difference?  We tell hypothetical stories about one Johnny, who committed various, questionable acts to acquire a TV series.  The stories’ design is based on six dimensions that cover important factors raised in the debate around piracy.  These are:  Loss  Physicality  Alternative  Peer  Sharing  Protection  
  • 25. To address the question: 5 What is the difference that makes the difference?  We tell hypothetical stories about one Johnny, who committed various, questionable acts to acquire a TV series.  The stories’ design is based on six dimensions that cover important factors raised in the debate around piracy.  These are:  Loss  Physicality  Alternative  Peer  Sharing  Protection  Responders are asked to rate the stories. 
  • 26. To address the question: 5 What is the difference that makes the difference?  We tell hypothetical stories about one Johnny, who committed various, questionable acts to acquire a TV series.  The stories’ design is based on six dimensions that cover important factors raised in the debate around piracy.  These are:  Loss  Physicality  Alternative  Peer  Sharing  Protection  Responders are asked to rate the stories.  Additional questions on personal behaviour and demographics.
  • 27. Let’s take a few things into account first 6 Vignette experiments        
  • 28. Let’s take a few things into account first 6 Vignette experiments  Hypothetical situations that the responders judge, evaluate, etc. [11]       
  • 29. Let’s take a few things into account first 6 Vignette experiments  Hypothetical situations that the responders judge, evaluate, etc. [11]  Very popular when analyzing controversial choices, like: violence in patient-doctor relationship [12] , alcohol related sexual abuse [13] , classroom cheating [14] , or types of theft [15] ).      
  • 30. Let’s take a few things into account first 6 Vignette experiments  Hypothetical situations that the responders judge, evaluate, etc. [11]  Very popular when analyzing controversial choices, like: violence in patient-doctor relationship [12] , alcohol related sexual abuse [13] , classroom cheating [14] , or types of theft [15] ).  Types of theft – Green (2012) [15] .     
  • 31. Let’s take a few things into account first 6 Vignette experiments  Hypothetical situations that the responders judge, evaluate, etc. [11]  Very popular when analyzing controversial choices, like: violence in patient-doctor relationship [12] , alcohol related sexual abuse [13] , classroom cheating [14] , or types of theft [15] ).  Types of theft – Green (2012) [15] .  Sometimes on piracy, but mostly software and not culture [16] [17] . On cultural goods piracy   
  • 32. Let’s take a few things into account first 6 Vignette experiments  Hypothetical situations that the responders judge, evaluate, etc. [11]  Very popular when analyzing controversial choices, like: violence in patient-doctor relationship [12] , alcohol related sexual abuse [13] , classroom cheating [14] , or types of theft [15] ).  Types of theft – Green (2012) [15] .  Sometimes on piracy, but mostly software and not culture [16] [17] . On cultural goods piracy  Music piracy vs shoplifting (difference explained by law deterrence) [18] .  
  • 33. Let’s take a few things into account first 6 Vignette experiments  Hypothetical situations that the responders judge, evaluate, etc. [11]  Very popular when analyzing controversial choices, like: violence in patient-doctor relationship [12] , alcohol related sexual abuse [13] , classroom cheating [14] , or types of theft [15] ).  Types of theft – Green (2012) [15] .  Sometimes on piracy, but mostly software and not culture [16] [17] . On cultural goods piracy  Music piracy vs shoplifting (difference explained by law deterrence) [18] .  Acquisition of a `test preparation tool’ (physicality and exclusion) [15] . 
  • 34. Let’s take a few things into account first 6 Vignette experiments  Hypothetical situations that the responders judge, evaluate, etc. [11]  Very popular when analyzing controversial choices, like: violence in patient-doctor relationship [12] , alcohol related sexual abuse [13] , classroom cheating [14] , or types of theft [15] ).  Types of theft – Green (2012) [15] .  Sometimes on piracy, but mostly software and not culture [16] [17] . On cultural goods piracy  Music piracy vs shoplifting (difference explained by law deterrence) [18] .  Acquisition of a `test preparation tool’ (physicality and exclusion) [15] .  `Sharing’ (e.g. at a party) is more acceptable than downloading [19] .
  • 35. 7 Let’s take a few things into account first How are pirates different?      
  • 36. 7 Let’s take a few things into account first How are pirates different? Higher preference for risky behaviour [20]     
  • 37. 7 Let’s take a few things into account first How are pirates different? Higher preference for risky behaviour [20] Less respect for the rules [20]    
  • 38. 7 Let’s take a few things into account first How are pirates different? Higher preference for risky behaviour [20] Less respect for the rules [20] BUT: willingness to pirate is unrelated to willingness to shoplifting [21]   
  • 39. 7 Let’s take a few things into account first How are pirates different? Higher preference for risky behaviour [20] Less respect for the rules [20] BUT: willingness to pirate is unrelated to willingness to shoplifting [21] Individual judgement is often harsher than perceived social norms.  Although the latter may influence the former. 
  • 40. 7 Let’s take a few things into account first How are pirates different? Higher preference for risky behaviour [20] Less respect for the rules [20] BUT: willingness to pirate is unrelated to willingness to shoplifting [21] Individual judgement is often harsher than perceived social norms.  Although the latter may influence the former. Is piracy considered an ethical problem? [22]
  • 42. 8 The questionnaire  Rewards offered as an encouragement.        
  • 43. 8 The questionnaire  Rewards offered as an encouragement.  18 stories that were built upon the six dimensions.       
  • 44. 8 The questionnaire  Rewards offered as an encouragement.  18 stories that were built upon the six dimensions.  Two studies.      
  • 45. 8 The questionnaire  Rewards offered as an encouragement.  18 stories that were built upon the six dimensions.  Two studies. Treatments:     
  • 46. 8 The questionnaire  Rewards offered as an encouragement.  18 stories that were built upon the six dimensions.  Two studies. Treatments:  Treatment I: Ethical Judgement (EJ)    
  • 47. 8 The questionnaire  Rewards offered as an encouragement.  18 stories that were built upon the six dimensions.  Two studies. Treatments:  Treatment I: Ethical Judgement (EJ)  Treatment II: Social Norms (SN)   
  • 48. 8 The questionnaire  Rewards offered as an encouragement.  18 stories that were built upon the six dimensions.  Two studies. Treatments:  Treatment I: Ethical Judgement (EJ)  Treatment II: Social Norms (SN)  Treatment III: Incentivized Social Norms (ISN) [23]  
  • 49. 8 The questionnaire  Rewards offered as an encouragement.  18 stories that were built upon the six dimensions.  Two studies. Treatments:  Treatment I: Ethical Judgement (EJ)  Treatment II: Social Norms (SN)  Treatment III: Incentivized Social Norms (ISN) [23]  Rating scale: 1 – Totaly unacceptable; 4 – Fully acceptable.  Note that there is no interpretable middle.
  • 50. 9 Story examples  A friend of Johnny's forgot to log out from his e-mail box, after using Johnny's computer. While closing the web browser, Johnny spotted that the mail currently displayed on his screen contained a one-use only access code for a payable site with TV series in High Denition. Johnny quickly copied the code, and after returning home used it on a season of a popular TV series.   
  • 51. 9 Story examples  A friend of Johnny's forgot to log out from his e-mail box, after using Johnny's computer. While closing the web browser, Johnny spotted that the mail currently displayed on his screen contained a one-use only access code for a payable site with TV series in High Denition. Johnny quickly copied the code, and after returning home used it on a season of a popular TV series.  Not physical; Loss; Peer; No alternative; No sharing; Protection  
  • 52. 9 Story examples  A friend of Johnny's forgot to log out from his e-mail box, after using Johnny's computer. While closing the web browser, Johnny spotted that the mail currently displayed on his screen contained a one-use only access code for a payable site with TV series in High Denition. Johnny quickly copied the code, and after returning home used it on a season of a popular TV series.  Not physical; Loss; Peer; No alternative; No sharing; Protection  A new season of a popular, high budget, American TV series is available in kiosks as an add-on for a magazine priced 7.99 PLN. However, Johnny downloaded the series from another source, for free. 
  • 53. 9 Story examples  A friend of Johnny's forgot to log out from his e-mail box, after using Johnny's computer. While closing the web browser, Johnny spotted that the mail currently displayed on his screen contained a one-use only access code for a payable site with TV series in High Denition. Johnny quickly copied the code, and after returning home used it on a season of a popular TV series.  Not physical; Loss; Peer; No alternative; No sharing; Protection  A new season of a popular, high budget, American TV series is available in kiosks as an add-on for a magazine priced 7.99 PLN. However, Johnny downloaded the series from another source, for free.  Not physical; No loss; Not a peer; Alternative; No sharing; No protection.
  • 54. Sample – Study 1 10  Students of the University of Warsaw (around 50% Economics)  Young age (~24)  Balanced gender (~60% female)  N=338
  • 55. Sample – Study 1 10 The Survey Bay[24]: Responders’ age  Students of the University of Warsaw (around 50% Economics)  Young age (~24)  Balanced gender (~60% female)  N=338
  • 56. 11 Sample – Study 2 Second: Followers of Facebook profiles of organizations promoting legal acquisition of culture (note what’s legal in Poland). Slightly older than Study I (~28) Mostly female (~68%) N=129
  • 57. 12 Methodology To tackle the question, we estimate ordered logit regressions: Answer = β1Dimensions + β2Controls + ε        
  • 58. 12 Methodology To tackle the question, we estimate ordered logit regressions: Answer = β1Dimensions + β2Controls + ε  1) The baseline regression and robustness.  Robust to duration of the answers and controversial questions.  Therefore, I do not report this in this presentation.     
  • 59. 12 Methodology To tackle the question, we estimate ordered logit regressions: Answer = β1Dimensions + β2Controls + ε  1) The baseline regression and robustness.  Robust to duration of the answers and controversial questions.  Therefore, I do not report this in this presentation.  2) Regressions by treatment groups. Is there a difference?    
  • 60. 12 Methodology To tackle the question, we estimate ordered logit regressions: Answer = β1Dimensions + β2Controls + ε  1) The baseline regression and robustness.  Robust to duration of the answers and controversial questions.  Therefore, I do not report this in this presentation.  2) Regressions by treatment groups. Is there a difference?  3) Internet-user groups. Does the judgement differ if you’re a (non)downloader? Do the dimension coefficients?   
  • 61. 12 Methodology To tackle the question, we estimate ordered logit regressions: Answer = β1Dimensions + β2Controls + ε  1) The baseline regression and robustness.  Robust to duration of the answers and controversial questions.  Therefore, I do not report this in this presentation.  2) Regressions by treatment groups. Is there a difference?  3) Internet-user groups. Does the judgement differ if you’re a (non)downloader? Do the dimension coefficients?  4) Regressions with interactions.  Physical*Protection (DRM), Sharing*Peer (Promotion), Peer*Loss (Major/Minor)  Insignificant and therefore not reported.
  • 62. Results: The treatments 13Note: * p < 0.05; ** p < 0.01
  • 63. Results: The groups (downloaders) 14Note: * p < 0.05; ** p < 0.01
  • 64. Results: The groups (downloaders) 14Note: * p < 0.05; ** p < 0.01
  • 65. Results: The groups (downloaders) 14Note: * p < 0.05; ** p < 0.01
  • 66. Results: The groups (uploaders) 15Note: * p < 0.05; ** p < 0.01
  • 67. Results: The groups (uploaders) 15Note: * p < 0.05; ** p < 0.01
  • 69. 16 Conclusions The importance of dimensions:  Physicality (Most important)  Loss  Protection  Peer  Sharing  Alternative (Insignificant)    
  • 70. 16 Conclusions The importance of dimensions:  Physicality (Most important)  Loss  Protection  Peer  Sharing  Alternative (Insignificant) Individual opinion is harsher than perceived social norms.  Incentives do not change the results (much).  
  • 71. 16 Conclusions The importance of dimensions:  Physicality (Most important)  Loss  Protection  Peer  Sharing  Alternative (Insignificant) Individual opinion is harsher than perceived social norms.  Incentives do not change the results (much). More frequent downloaders are possibly more conscious of the dimensions, and are more sensitive to some of them. This may reflect higher knowledge of the subject. 
  • 72. 16 Conclusions The importance of dimensions:  Physicality (Most important)  Loss  Protection  Peer  Sharing  Alternative (Insignificant) Individual opinion is harsher than perceived social norms.  Incentives do not change the results (much). More frequent downloaders are possibly more conscious of the dimensions, and are more sensitive to some of them. This may reflect higher knowledge of the subject. Policies should be focused on particular aspects of piracy.
  • 73. 17 Not fully explored data            
  • 74. 17 Not fully explored data Gender Age          
  • 75. 17 Not fully explored data Gender Age Uploading for friends Downloading from authorized sources Downloading from unauthorized (with or without payment)       
  • 76. 17 Not fully explored data Gender Age Uploading for friends Downloading from authorized sources Downloading from unauthorized (with or without payment) (Only study 1) types of studies      
  • 77. 17 Not fully explored data Gender Age Uploading for friends Downloading from authorized sources Downloading from unauthorized (with or without payment) (Only study 1) types of studies (Only study 2) information on Facebook `likes’ of:  Unauthorized streaming services  Authorized streaming services  Institutions (Only study 2) Level of education (no variation in study 1) (Only study 2) Labour market status
  • 78. 18 Bibliography [1] RIAA, Frequently Asked Questions, archived version from 2011: http://web.archive.org/web/20110123180931/http://www.riaa.com/faq.php [2] MPAA, What is Internet Piracy?, archived version from 2010: http://web.archive.org/web/20100327204736/http://www.mpaa.org/piracy_internet.asp [3] Jacek Kowalski (2012), ZPAV ostro o kampanii społecznej `Prawo kultury’: To zachęcanie do złodziejstwa, accessed on 28-03-2014 at http://m.wyborcza.pl/wyborcza/1,105226,13112726,ZPAV_ostro_o_kampanii_spolecznej_ _Prawo_kultury__.html [4] Larsson, S., 2011. Piracy is not theft: Problems of a nonsense metaphor. Accessed 2014- 03-04. URL https://torrentfreak.com/piracy-is-not-theft-111104/ [5] Persson, M., 2011. Minecraft creator says `no such thing as a lost sale'. Accessed 2014- 03-04. URL http://www.techdirt.com/articles/20110303/02203613336/minecraft-creator- says-no-such-thing-as-lost-sale.shtml [6] Hart, R., 2012. Top 10 reasons people use to justify pirating digital content (and why they're wrong). Accessed 2014-03-04. URL http://litreactor.com/columns/top-10-reasons- people-use-to-justify-pirating-digital-content-and-why-theyre-wrong
  • 79. 19 Bibliography - continued [7] Wilson, M., 2013. Piracy isn't theft, but its eects are wide and far-reaching. Accessed 2014-03-04. URL http://betanews.com/2013/09/16/piracy-isnt-theft-but-its-effects-are- wide-and-far-reaching/ [8] Tassi, P., 2012. You will never kill piracy, and piracy will never kill you. Accessed 2014- 03-04. URL http://www.forbes.com/sites/insertcoin/2012/02/03/you-will-never-kill-piracy- and-piracy-will-never-kill-you/2/ [9] James, G., 2013. Why piracy is never okay. Accessed 2014-03-04. URL http://amazingstoriesmag.com/2013/02/why-piracy-is-never-okay/ [10] Goessl, L., 2007. Music piracy is downloading music ethical { no. Accessed 2014-03-04. URL http://www.entertainmentscene360.com/index.php/music-piracy-is-downloading- music-ethical-no-18-44608/ [11] Schoenberg, N. E., Ravdal, H., 2000. Using vignettes in awareness and attitudinal research. International Journal of Social Research Methodology 3 (1), 63{74. [12] Steinert, T., Lepping, P., 2009. Legal provisions and practice in the management of violent patients. a case vignette study in 16 european countries. European Psychiatry 24 (2), 135{141.
  • 80. 20 Bibliography - continued [13] Abbey, A., 2002. Alcohol-related sexual assault: A common problem among college students. Journal of Studies on Alcohol and Drugs (14), 118. [14] Rettinger, D. A., Jordan, A. E., Peschiera, F., 2004. Evaluating the motivation of other students to cheat: A vignette experiment. Research in Higher Education 45 (8), 873{890. [15] Green, S. P., 2012. Thirteen Ways to Steal a Bicycle: Theft Law in the Information Age. Harvard University Press. [16] Lin, T.-C., Hsu, M. H., Kuo, F.-Y., Sun, P.-C., 1999. An intention model-based study of software piracy. In: System Sciences, 1999. HICSS-32. Proceedings of the 32nd Annual Hawaii International Conference on. IEEE, pp. 8{pp. [17] Higgins, G. E., Wilson, A. L., Fell, B. D., 2005. An application of deterrence theory to software piracy. Journal of Criminal Justice and Popular Culture 12 (3), 166{184. [18] Wingrove, T., Korpas, A. L., Weisz, V., 2011. Why were millions of people not obeying the law? Motivational influences on non-compliance with the law in the case of music piracy. Psychology, crime & law 17 (3), 261{276.
  • 81. 21 Bibliography - continued [19] Altschuller, S., Benbunan-Fich, R., 2009. Is music downloading the new prohibition? what students reveal through an ethical dilemma. Ethics and Information Technology 11 (1), 49{56. [20] Robertson, K., McNeill, L., Green, J., Roberts, C., 2012. Illegal downloading, ethical concern, and illegal behavior. Journal of Business Ethics 108 (2), 215{227. [21] Hill, C. W., 2007. Digital piracy: Causes, consequences, and strategic responses. Asia Pacic Journal of Management 24 (1), 9{25. [22] Bateman, C. R., Valentine, S., Rittenburg, T., 2013. Ethical decision making in a peer-to-peer filesharing situation: The role of moral absolutes and social consensus. Journal of Business Ethics 115 (2), 229{240. [23] Krupka, E. L., Weber, R. A., 2013. Identifying social norms using coordination games: Why does dictator game sharing vary? Journal of the European Economic Association 11 (3), 495{524. [24] The Survey Bay: www.thesurveybay.com; accessed on 28-03-2014.
  • 82. Thank you for your attention! More info: grape.uw.edu.pl/ipiracy/research-seminar Author: Wojciech Hardy e-mail: whardy@wne.uw.edu.pl More about our research on: http://grape.uw.edu.pl/ipiracy facebook.com/ipiracy Twitter: @GrapeUW