SlideShare una empresa de Scribd logo
1 de 39
Downloading as
             Deviance
            MassComm Seminar: 15th Oct 2010




Jason.Rutter@soc.kuleuven.be
Discourses of piracy
Problems for researchers
 Methodological issues
Ask about ways forward
Piracy is

Making digital content for which the user
 does not have the legal permission to
  distribute available on the internet

 Downloading of copying those files by
another person who does not have legal
             permission
Piracy is a Crime campaign
Piracy is a Crime campaign
“There is no
 difference with
going into a store
  and stealing
  Pringles or a
  handbag and
taking this stuff”
   James Murdoch
Consumption without
          Purchase

 •Downloader as thief
 •Stealing physical goods = copying
  digital ones
 •Downloading is like crime against
  the person

Piracy does not remove goods but he control
       over the selling of those goods
Knock Off Nigel campaign
Knock Off Nigel campaign
Downloaders as Bad People

•‘a grubby little man’
•‘a real creep’
•‘steals money from whip ‘rounds’
•‘does things on the cheap’
•‘scrounges his drinks’
•‘He’d rob his own gran’
Knock Off Nigel campaign
Knock Off Nigel campaign
But this is just good
business...
...surely academic
researchers don’t
see it the same
way.


They are clever and critical...
Piracy is:
                                ‘unethical’
         (Mitchell et al., 2009; Cohn & Vaccaro, 2006; Hinduja, 2003)




                 ‘misbehaviour’
                        (Albers-Miller, 1999; Harris & Dumas, 2009)



                     ‘questionable’
                         (Freestone & Mitchell, 2004; Hinduja, 2008)



                           ‘corruption’           (Coyle et al., 2009)



                                  ‘aberrant’
                                        (Freestone & Mitchell, 2004)
Lacking in moral substance
      or self-control
   (Morris and Higgins, 2009; Malin and Fowers, 2009)
Money
Morality
 Harm
Downloading

              Loss in Sales

            Loss in Revenue

            Economic Harm


A wilfully harmful act is an unethical act
Physical          Digital            Total Sales


          160


          128


           96
Million




           64


           32


            0
             2002     2003     2004   2005      2006   2007     2008   2009


                               UK Singles Sales
                                                                       Source BPI
Physical Units         Digital Units         Total Units

          2000



          1500
Million




          1000



           500



             0
              1997 1998 1999 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009


                                   USA Music Sales
                                                                             Source RIAA
Economics is:
‘free from any
ideological,
theological, or
moral philosophy’
(Alvey, 1999, p.53)
Downloading
    illegal
 content is a
   rational
action rather
   than an
 ethical one
“Both motives and actions very
often originate not from within
but from the situation in which
 individuals finds themselves.”
    (Mannheim quoted in Mills, 1940)
“A satisfactory or adequate motive is one
that satisfies the questioners of an act or
            program” (Mills, 1940)
‘The differing
reasons men [sic]
   give for their
  actions are not
    themselves
 without reasons’
    (Mills, 1940)
‘If power is about ownership of
    products (the means and
    meanings of production),
 authority is about the right to
 claim ownership of a product
       and its meanings.’
         (Laughley, 2010)
Techniques of
Neutralization
Techniques of
     Neutralization
•Denial of responsibility
Techniques of
     Neutralization
•Denial of responsibility
•Denial of injury
Techniques of
     Neutralization
•Denial of responsibility
•Denial of injury
•Denial of the victim
Techniques of
    Neutralization
•Denial of responsibility
•Denial of injury
•Denial of the victim
•Condemnation of the condemners
Techniques of
    Neutralization
•Denial of responsibility
•Denial of injury
•Denial of the victim
•Condemnation of the condemners
•Appeal to higher loyalties
Techniques of
    Neutralization
•Denial of responsibility
•Denial of injury
•Denial of the victim
•Condemnation of the condemners
•Appeal to higher loyalties
               (Sykes and Matza,1957)
Are techniques of
neutralization a
    view into
     personal
motivations or a
  response to a
    dominant
    ideology?
What abo
              ut the
     context o
                  f
   consumpt
               ion?
     The socia
                 l
  backgrou
             nd to
      items
  download
              ed?
The role o
           f digital
     media?
What happens when:



 Ethics, morality, deviance
and misbehaviour merge into
  ‘dysfunctional consumer
        behaviour’?
Slides available at:
http://www.slideshare.net/Jasieboy

        Paper available at:
http://www.scribd.com/jason_rutter
IT Crowd’s Piracy is a Crime campaign
IT Crowd’s Piracy is a Crime campaign

Más contenido relacionado

Destacado

Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentationBijay Bhandari
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityDipesh Waghela
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.pptAeman Khan
 
Cyber security
Cyber securityCyber security
Cyber securitySiblu28
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security pptLipsita Behera
 

Destacado (6)

Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 

Similar a Dowloading as Deviance

Digital Responsibility: towards a new world order ?
Digital Responsibility: towards a new world order ?Digital Responsibility: towards a new world order ?
Digital Responsibility: towards a new world order ?University of Geneva
 
Use & Abuse of Social Media
Use & Abuse of Social MediaUse & Abuse of Social Media
Use & Abuse of Social MediaMathias Klang
 
Week 4: Social Media Ecologies
Week 4: Social Media EcologiesWeek 4: Social Media Ecologies
Week 4: Social Media EcologiesRay Brannon
 
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...Hackito Ergo Sum
 
Cybersecurity Strategies - time for the next generation
Cybersecurity Strategies - time for the next generationCybersecurity Strategies - time for the next generation
Cybersecurity Strategies - time for the next generationHinne Hettema
 
A Sample College Application Essay. Online assignment writing service.
A Sample College Application Essay. Online assignment writing service.A Sample College Application Essay. Online assignment writing service.
A Sample College Application Essay. Online assignment writing service.Trisha Anderson
 
Med332 Digital disruption in the music industry
Med332 Digital disruption in the music industryMed332 Digital disruption in the music industry
Med332 Digital disruption in the music industryRob Jewitt
 
Social Media: Week Four - Social Media Ecologies - Revised 4/12
Social Media: Week Four - Social Media Ecologies - Revised 4/12Social Media: Week Four - Social Media Ecologies - Revised 4/12
Social Media: Week Four - Social Media Ecologies - Revised 4/12Ray Brannon
 
AAPAE 2018 Dayo Sowunmi II - Beyond The Selfie Paradox Sep2018
AAPAE 2018   Dayo Sowunmi II - Beyond The Selfie Paradox Sep2018AAPAE 2018   Dayo Sowunmi II - Beyond The Selfie Paradox Sep2018
AAPAE 2018 Dayo Sowunmi II - Beyond The Selfie Paradox Sep2018Dayo Sowunmi II, GAICD
 
Privacy in social media: so what?
Privacy in social media: so what?Privacy in social media: so what?
Privacy in social media: so what?Mathias Klang
 
Internet Privacy: Does it Truly Exist?
Internet Privacy: Does it Truly Exist?Internet Privacy: Does it Truly Exist?
Internet Privacy: Does it Truly Exist?Kristen_T
 
Motivations behind Software Piracy: Relevance to Computer Ethics Theories
Motivations behind Software Piracy: Relevance to Computer Ethics Theories Motivations behind Software Piracy: Relevance to Computer Ethics Theories
Motivations behind Software Piracy: Relevance to Computer Ethics Theories Saptarshi Ghosh
 
Cultivating Millennial Donors
Cultivating Millennial DonorsCultivating Millennial Donors
Cultivating Millennial DonorsDanielle Brigida
 
Counterfeits Funding Terrorism Transcript1Counterfeits.docx
Counterfeits Funding Terrorism Transcript1Counterfeits.docxCounterfeits Funding Terrorism Transcript1Counterfeits.docx
Counterfeits Funding Terrorism Transcript1Counterfeits.docxfaithxdunce63732
 

Similar a Dowloading as Deviance (20)

Digital Responsibility: towards a new world order ?
Digital Responsibility: towards a new world order ?Digital Responsibility: towards a new world order ?
Digital Responsibility: towards a new world order ?
 
Use & Abuse of Social Media
Use & Abuse of Social MediaUse & Abuse of Social Media
Use & Abuse of Social Media
 
Gen z
Gen zGen z
Gen z
 
Week 4: Social Media Ecologies
Week 4: Social Media EcologiesWeek 4: Social Media Ecologies
Week 4: Social Media Ecologies
 
nullcon 2010 - Underground Economy
nullcon 2010 - Underground Economynullcon 2010 - Underground Economy
nullcon 2010 - Underground Economy
 
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...
 
Ethics
EthicsEthics
Ethics
 
Media power
Media powerMedia power
Media power
 
Cybersecurity Strategies - time for the next generation
Cybersecurity Strategies - time for the next generationCybersecurity Strategies - time for the next generation
Cybersecurity Strategies - time for the next generation
 
A Sample College Application Essay. Online assignment writing service.
A Sample College Application Essay. Online assignment writing service.A Sample College Application Essay. Online assignment writing service.
A Sample College Application Essay. Online assignment writing service.
 
whistle blowing.
whistle blowing.whistle blowing.
whistle blowing.
 
Med332 Digital disruption in the music industry
Med332 Digital disruption in the music industryMed332 Digital disruption in the music industry
Med332 Digital disruption in the music industry
 
Social Media: Week Four - Social Media Ecologies - Revised 4/12
Social Media: Week Four - Social Media Ecologies - Revised 4/12Social Media: Week Four - Social Media Ecologies - Revised 4/12
Social Media: Week Four - Social Media Ecologies - Revised 4/12
 
AAPAE 2018 Dayo Sowunmi II - Beyond The Selfie Paradox Sep2018
AAPAE 2018   Dayo Sowunmi II - Beyond The Selfie Paradox Sep2018AAPAE 2018   Dayo Sowunmi II - Beyond The Selfie Paradox Sep2018
AAPAE 2018 Dayo Sowunmi II - Beyond The Selfie Paradox Sep2018
 
Privacy in social media: so what?
Privacy in social media: so what?Privacy in social media: so what?
Privacy in social media: so what?
 
Internet Privacy: Does it Truly Exist?
Internet Privacy: Does it Truly Exist?Internet Privacy: Does it Truly Exist?
Internet Privacy: Does it Truly Exist?
 
Motivations behind Software Piracy: Relevance to Computer Ethics Theories
Motivations behind Software Piracy: Relevance to Computer Ethics Theories Motivations behind Software Piracy: Relevance to Computer Ethics Theories
Motivations behind Software Piracy: Relevance to Computer Ethics Theories
 
Cultivating Millennial Donors
Cultivating Millennial DonorsCultivating Millennial Donors
Cultivating Millennial Donors
 
Counterfeits Funding Terrorism Transcript1Counterfeits.docx
Counterfeits Funding Terrorism Transcript1Counterfeits.docxCounterfeits Funding Terrorism Transcript1Counterfeits.docx
Counterfeits Funding Terrorism Transcript1Counterfeits.docx
 
2008 earth intelligence network at hope
2008 earth intelligence network at hope2008 earth intelligence network at hope
2008 earth intelligence network at hope
 

Más de Jason Rutter

Blag your way in Qualitative Research
Blag your way in Qualitative ResearchBlag your way in Qualitative Research
Blag your way in Qualitative ResearchJason Rutter
 
Approaches to analysing Twitter
Approaches to analysing TwitterApproaches to analysing Twitter
Approaches to analysing TwitterJason Rutter
 
Finding Gamers in 140 Characters: Talk of Games on Twitter
Finding Gamers in 140 Characters: Talk of Games on TwitterFinding Gamers in 140 Characters: Talk of Games on Twitter
Finding Gamers in 140 Characters: Talk of Games on TwitterJason Rutter
 
Qualitative Methods Workshop Day 1
Qualitative Methods Workshop Day 1Qualitative Methods Workshop Day 1
Qualitative Methods Workshop Day 1Jason Rutter
 
Qualitative Methods Workshop Day 2
Qualitative Methods Workshop Day 2Qualitative Methods Workshop Day 2
Qualitative Methods Workshop Day 2Jason Rutter
 
Moral Panics and Games
Moral Panics and GamesMoral Panics and Games
Moral Panics and GamesJason Rutter
 
Playing with Moral Panics
Playing with Moral PanicsPlaying with Moral Panics
Playing with Moral PanicsJason Rutter
 
PPI Conference: Open Access in Academia
PPI Conference: Open Access in AcademiaPPI Conference: Open Access in Academia
PPI Conference: Open Access in AcademiaJason Rutter
 

Más de Jason Rutter (8)

Blag your way in Qualitative Research
Blag your way in Qualitative ResearchBlag your way in Qualitative Research
Blag your way in Qualitative Research
 
Approaches to analysing Twitter
Approaches to analysing TwitterApproaches to analysing Twitter
Approaches to analysing Twitter
 
Finding Gamers in 140 Characters: Talk of Games on Twitter
Finding Gamers in 140 Characters: Talk of Games on TwitterFinding Gamers in 140 Characters: Talk of Games on Twitter
Finding Gamers in 140 Characters: Talk of Games on Twitter
 
Qualitative Methods Workshop Day 1
Qualitative Methods Workshop Day 1Qualitative Methods Workshop Day 1
Qualitative Methods Workshop Day 1
 
Qualitative Methods Workshop Day 2
Qualitative Methods Workshop Day 2Qualitative Methods Workshop Day 2
Qualitative Methods Workshop Day 2
 
Moral Panics and Games
Moral Panics and GamesMoral Panics and Games
Moral Panics and Games
 
Playing with Moral Panics
Playing with Moral PanicsPlaying with Moral Panics
Playing with Moral Panics
 
PPI Conference: Open Access in Academia
PPI Conference: Open Access in AcademiaPPI Conference: Open Access in Academia
PPI Conference: Open Access in Academia
 

Último

Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
Unraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptxUnraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptx
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptxDhatriParmar
 
Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operationalssuser3e220a
 
4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptxmary850239
 
Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1GloryAnnCastre1
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmStan Meyer
 
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxBIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxSayali Powar
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxlancelewisportillo
 
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Association for Project Management
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxVanesaIglesias10
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
week 1 cookery 8 fourth - quarter .pptx
week 1 cookery 8  fourth  -  quarter .pptxweek 1 cookery 8  fourth  -  quarter .pptx
week 1 cookery 8 fourth - quarter .pptxJonalynLegaspi2
 
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxGrade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxkarenfajardo43
 
Mythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWMythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWQuiz Club NITW
 
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQ-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQuiz Club NITW
 
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptxMan or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptxDhatriParmar
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfPatidar M
 

Último (20)

Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
Unraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptxUnraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptx
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
 
Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operational
 
4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx
 
Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and Film
 
Paradigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTAParadigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTA
 
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxBIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
 
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
 
prashanth updated resume 2024 for Teaching Profession
prashanth updated resume 2024 for Teaching Professionprashanth updated resume 2024 for Teaching Profession
prashanth updated resume 2024 for Teaching Profession
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptx
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
week 1 cookery 8 fourth - quarter .pptx
week 1 cookery 8  fourth  -  quarter .pptxweek 1 cookery 8  fourth  -  quarter .pptx
week 1 cookery 8 fourth - quarter .pptx
 
Mattingly "AI & Prompt Design: Large Language Models"
Mattingly "AI & Prompt Design: Large Language Models"Mattingly "AI & Prompt Design: Large Language Models"
Mattingly "AI & Prompt Design: Large Language Models"
 
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxGrade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
 
Mythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWMythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITW
 
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQ-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
 
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptxMan or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdf
 

Dowloading as Deviance

  • 1. Downloading as Deviance MassComm Seminar: 15th Oct 2010 Jason.Rutter@soc.kuleuven.be
  • 2. Discourses of piracy Problems for researchers Methodological issues Ask about ways forward
  • 3. Piracy is Making digital content for which the user does not have the legal permission to distribute available on the internet Downloading of copying those files by another person who does not have legal permission
  • 4. Piracy is a Crime campaign
  • 5. Piracy is a Crime campaign
  • 6. “There is no difference with going into a store and stealing Pringles or a handbag and taking this stuff” James Murdoch
  • 7. Consumption without Purchase •Downloader as thief •Stealing physical goods = copying digital ones •Downloading is like crime against the person Piracy does not remove goods but he control over the selling of those goods
  • 8. Knock Off Nigel campaign
  • 9. Knock Off Nigel campaign
  • 10. Downloaders as Bad People •‘a grubby little man’ •‘a real creep’ •‘steals money from whip ‘rounds’ •‘does things on the cheap’ •‘scrounges his drinks’ •‘He’d rob his own gran’
  • 11. Knock Off Nigel campaign
  • 12. Knock Off Nigel campaign
  • 13. But this is just good business...
  • 14. ...surely academic researchers don’t see it the same way. They are clever and critical...
  • 15. Piracy is: ‘unethical’ (Mitchell et al., 2009; Cohn & Vaccaro, 2006; Hinduja, 2003) ‘misbehaviour’ (Albers-Miller, 1999; Harris & Dumas, 2009) ‘questionable’ (Freestone & Mitchell, 2004; Hinduja, 2008) ‘corruption’ (Coyle et al., 2009) ‘aberrant’ (Freestone & Mitchell, 2004)
  • 16. Lacking in moral substance or self-control (Morris and Higgins, 2009; Malin and Fowers, 2009)
  • 18. Downloading Loss in Sales Loss in Revenue Economic Harm A wilfully harmful act is an unethical act
  • 19. Physical Digital Total Sales 160 128 96 Million 64 32 0 2002 2003 2004 2005 2006 2007 2008 2009 UK Singles Sales Source BPI
  • 20. Physical Units Digital Units Total Units 2000 1500 Million 1000 500 0 1997 1998 1999 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 USA Music Sales Source RIAA
  • 21. Economics is: ‘free from any ideological, theological, or moral philosophy’ (Alvey, 1999, p.53)
  • 22. Downloading illegal content is a rational action rather than an ethical one
  • 23. “Both motives and actions very often originate not from within but from the situation in which individuals finds themselves.” (Mannheim quoted in Mills, 1940)
  • 24. “A satisfactory or adequate motive is one that satisfies the questioners of an act or program” (Mills, 1940)
  • 25. ‘The differing reasons men [sic] give for their actions are not themselves without reasons’ (Mills, 1940)
  • 26. ‘If power is about ownership of products (the means and meanings of production), authority is about the right to claim ownership of a product and its meanings.’ (Laughley, 2010)
  • 28. Techniques of Neutralization •Denial of responsibility
  • 29. Techniques of Neutralization •Denial of responsibility •Denial of injury
  • 30. Techniques of Neutralization •Denial of responsibility •Denial of injury •Denial of the victim
  • 31. Techniques of Neutralization •Denial of responsibility •Denial of injury •Denial of the victim •Condemnation of the condemners
  • 32. Techniques of Neutralization •Denial of responsibility •Denial of injury •Denial of the victim •Condemnation of the condemners •Appeal to higher loyalties
  • 33. Techniques of Neutralization •Denial of responsibility •Denial of injury •Denial of the victim •Condemnation of the condemners •Appeal to higher loyalties (Sykes and Matza,1957)
  • 34. Are techniques of neutralization a view into personal motivations or a response to a dominant ideology?
  • 35. What abo ut the context o f consumpt ion? The socia l backgrou nd to items download ed? The role o f digital media?
  • 36. What happens when: Ethics, morality, deviance and misbehaviour merge into ‘dysfunctional consumer behaviour’?
  • 37. Slides available at: http://www.slideshare.net/Jasieboy Paper available at: http://www.scribd.com/jason_rutter
  • 38. IT Crowd’s Piracy is a Crime campaign
  • 39. IT Crowd’s Piracy is a Crime campaign

Notas del editor