IDEAS home Printed from https://ideas.repec.org/a/vrs/wrolae/v14y2024i2p37-57n1002.html
   My bibliography  Save this article

Neutralising the practice of digital piracy – a case of Poland

Author

Listed:
  • Marcinkowski Jakub

    (Wroclaw University of Economics and Business, Wroclaw, Poland)

  • Czetwertyński Sławomir

    (Wroclaw University of Economics and Business, Wroclaw, Poland)

  • Markowska Małgorzata

    (Wroclaw University of Economics and Business, Wroclaw, Poland)

  • Sokołowski Andrzej

    (Andrzej Frycz Modrzewski University in Cracow, Cracow, Poland)

Abstract

Digital piracy, file-sharing, and generally unauthorised copying of digital information goods is a significant problem for the film, music and publishing industries. In the internet age, it has gained a massive and global character. The scale of this problem is surprising, mainly because digital piracy is commonly considered negative or illegal. That raises the question, how is it possible that although some unauthorised copying practices are illegal, the phenomenon is widespread, especially in the context of personal preferences and rationalization? This article attempts to answer this question in the case of Poland, based on the theory of neutralisation, which explains how people justify their actions to free themselves from the feeling of shame related to violating the law or immoral activity. In order to be able to answer the above-formulated research question, it was decided to conduct a survey on a sample of 1,000 adult Poles. The research material was collected in August 2020 using a Computer-Assisted Web Interview. Exploratory Factor Analysis has shown that people claiming to use unauthorised (“pirate”) sources of access to information goods such as movies, music, or books justify it by claiming that it is not very harmful and nobody gets hurt. As a result, it is plausible to argue that the neutralisation theory explains some practices involving unauthorised copying in Poland, including pirating.

Suggested Citation

  • Marcinkowski Jakub & Czetwertyński Sławomir & Markowska Małgorzata & Sokołowski Andrzej, 2024. "Neutralising the practice of digital piracy – a case of Poland," Wroclaw Review of Law, Administration & Economics, Sciendo, vol. 14(2), pages 37-57.
  • Handle: RePEc:vrs:wrolae:v:14:y:2024:i:2:p:37-57:n:1002
    DOI: 10.2478/wrlae-2024-0006
    as

    Download full text from publisher

    File URL: https://doi.org/10.2478/wrlae-2024-0006
    Download Restriction: no

    File URL: https://libkey.io/10.2478/wrlae-2024-0006?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    References listed on IDEAS

    as
    1. Besen, Stanley M., 1986. "Private copying, reproduction costs, and the supply of intellectual property," Information Economics and Policy, Elsevier, vol. 2(1), pages 5-22.
    2. Shy,Oz, 2001. "The Economics of Network Industries," Cambridge Books, Cambridge University Press, number 9780521800952, May.
    3. Johnson, William R, 1985. "The Economics of Copying," Journal of Political Economy, University of Chicago Press, vol. 93(1), pages 158-174, February.
    4. Krawczyk, Michał & Tyrowicz, Joanna & Kukla-Gryz, Anna & Hardy, Wojciech, 2015. "“Piracy is not theft!” Is it just students who think so?," Journal of Behavioral and Experimental Economics (formerly The Journal of Socio-Economics), Elsevier, vol. 54(C), pages 32-39.
    5. Joseph Heath, 2008. "Business Ethics and Moral Motivation: A Criminological Perspective," Journal of Business Ethics, Springer, vol. 83(4), pages 595-614, December.
    6. Edwin H. Sutherland, 1941. "Crime and Business," The ANNALS of the American Academy of Political and Social Science, , vol. 217(1), pages 112-118, September.
    7. Liebowitz, S J, 1985. "Copying and Indirect Appropriability: Photocopying of Journals," Journal of Political Economy, University of Chicago Press, vol. 93(5), pages 945-957, October.
    8. Henry Kaiser, 1958. "The varimax criterion for analytic rotation in factor analysis," Psychometrika, Springer;The Psychometric Society, vol. 23(3), pages 187-200, September.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Yoon, Kiho, 2002. "The optimal level of copyright protection," Information Economics and Policy, Elsevier, vol. 14(3), pages 327-348, September.
    2. Gürtler, Oliver, 2006. "Software Piracy in the Video Game Market," Bonn Econ Discussion Papers 20/2006, University of Bonn, Bonn Graduate School of Economics (BGSE).
    3. Jean-Jacques Herings, P. & Peeters, Ronald & Yang, Michael S., 2010. "Competition against peer-to-peer networks," Information Economics and Policy, Elsevier, vol. 22(4), pages 315-331, December.
    4. Kinokuni, Hiroshi, 2005. "Compensation for copying and bargaining," Information Economics and Policy, Elsevier, vol. 17(3), pages 349-364, July.
    5. Gayer, Amit & Shy, Oz, 2003. "Copyright protection and hardware taxation," Information Economics and Policy, Elsevier, vol. 15(4), pages 467-483, December.
    6. Gürtler, Oliver, 2005. "On Strategic Enabling of Product Piracy in the Market for Video Games," Bonn Econ Discussion Papers 36/2005, University of Bonn, Bonn Graduate School of Economics (BGSE).
    7. Issman-Weit, Einat & Shy, Oz, 2003. "Pricing of library subscriptions with applications to scientific journals," Journal of Economics and Business, Elsevier, vol. 55(2), pages 197-218.
    8. Carlos M. Fernández‐Márquez & Francisco J. Vázquez & Richard Watt, 2020. "Social influence on software piracy," Managerial and Decision Economics, John Wiley & Sons, Ltd., vol. 41(7), pages 1211-1224, October.
    9. Holm, Håkan, 2000. "The Computer Generation's Willingness to Pay for Originals when Pirates are Present – A CV study," Working Papers 2000:9, Lund University, Department of Economics, revised 16 Mar 2001.
    10. David, Paul A., 2001. "Tragedy of the Public Knowledge 'Commons'? Global Science, Intellectual Property and the Digital Technology Boomerang," Research Memorandum 003, Maastricht University, Maastricht Economic Research Institute on Innovation and Technology (MERIT).
    11. Jen-Te Yao, 2005. "Counterfeiting and an Optimal Monitoring Policy," European Journal of Law and Economics, Springer, vol. 19(1), pages 95-114, January.
    12. Jin-Hyuk Kim, 2013. "A simple model of copyright levies: implications for harmonization," International Tax and Public Finance, Springer;International Institute of Public Finance, vol. 20(6), pages 992-1013, December.
    13. Arun Sundararajan, 2003. "Managing Digital Piracy: Pricing, Protection and Welfare," Law and Economics 0307001, University Library of Munich, Germany.
    14. Minniti, Antonio & Vergari, Cecilia, 2010. "Turning Piracy into Profits: a Theoretical Investigation," Information Economics and Policy, Elsevier, vol. 22(4), pages 379-390, December.
    15. Ming-Fang Tsai & Jiunn-Rong Chiou, 2012. "Counterfeiting, enforcement and social welfare," Journal of Economics, Springer, vol. 107(1), pages 1-21, September.
    16. Sanjay Jain, 2008. "Digital Piracy: A Competitive Analysis," Marketing Science, INFORMS, vol. 27(4), pages 610-626, 07-08.
    17. Jin-Hyuk Kim, 2008. "Digital Rights Management and Technological Tying," Working Papers 08-05, NET Institute, revised Sep 2008.
    18. Waters, James, 2013. "Pricing information goods with piracy and heterogeneous consumers," MPRA Paper 46918, University Library of Munich, Germany.
    19. Yeh-ning Chen & Ivan Png, 2003. "Information Goods Pricing and Copyright Enforcement: Welfare Analysis," Information Systems Research, INFORMS, vol. 14(1), pages 107-123, March.
    20. Rob, Rafael & Waldfogel, Joel, 2006. "Piracy on the High C's: Music Downloading, Sales Displacement, and Social Welfare in a Sample of College Students," Journal of Law and Economics, University of Chicago Press, vol. 49(1), pages 29-62, April.

    More about this item

    Keywords

    ;
    ;
    ;
    ;
    ;

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:vrs:wrolae:v:14:y:2024:i:2:p:37-57:n:1002. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Peter Golla (email available below). General contact details of provider: https://www.sciendo.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.