Nudging the Digital Pirate: Piracy and the Conversion of Pirates to Paying Customers

نویسنده

  • Matthew J. Hashim
چکیده

Hashim, Matthew J. Ph.D., Purdue University, December 2011. Nudging the Digital Pirate: Piracy and the Conversion of Pirates to Paying Customers. Major Professors: Karthik N. Kannan and Jackie M. Rees Ulmer. Digital piracy is a significant source of concern facing software developers, music labels, and movie production companies. The current legal and technological strate­ gies for mitigating the piracy problem have been largely unsuccessful, as firms continue to invest in litigation and digital rights management technologies to thwart piracy. Their e↵orts are quickly defeated by hackers and pirates, motivating the behavioral approach taken in this dissertation. In Chapter 2, we consider the common argument from digital media producers and government entities that there are victims of piracy, whereas pirates may perceive their actions to be victimless. Because of the victimless view, in certain circumstances, perceived moral obligations may become important determinants of piracy behavior. In particular, we theorize that attitudes and social norms could influence perceptions of moral obligation as a consequence of the desire to rationalize unethical behavior. We also identify circumstances under which exoge­ nous nudging from a software company can influence the impact of perceived moral obligations on intentions to pirate. Initial purchase and piracy conversion settings are compared to document when the salient constructs become relevant to the potential pirate. In Chapter 3, we explore the role of information targeting and its e↵ect on coor­ dination in a multi-threshold public goods game. We consider four treatments, three in which we give feedback about other member’s contributions to a subsample of group members, and another treatment in which feedback is not provided at all. Our three information treatments vary in whom receives the information, which can be given randomly, to those whose contributions are below the average of their group,

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Network externalities, price discrimination and profitable piracy

Recent papers have argued that a monopoly firm might be able to maximize its profit by allowing some customers to steal its product. In particular, with network externalities, it is claimed that allowing piracy can be profitable because it increases the user base of the product and raises the willingness-to-pay of other customers. In this paper we analyze these claims when the producer can free...

متن کامل

The Somali Piracy Problem: A Global Puzzle Necessitating A Global Solution

Over the past few years, piracy has exploded off the coast of Somalia. The Somali pirates congregate on a mother ship and then divide into smaller groups that sail out on tiny skiffs. Using potent weapons like AK-47’s and hand-propelled grenades, the Somali pirates then attack civilian ships carrying cargo through the Gulf of Aden, toward South Africa or Asia. Once they have overtaken the victi...

متن کامل

The Effect of Piracy Website Blocking on Consumer Behavior

Understanding the relationship between copyright policy and consumer behavior is an increasingly important topic for participants in digital media markets. In this paper we seek to study how consumer behavior changes when Internet Service Providers are required to block access to major piracy websites. We do this in the context of two court-ordered events affecting consumers in the UK: The bloc...

متن کامل

The Trade Consequences of Maritime Insecurity: Evidence from Somali Piracy∗

In the past decade, pirates from Somalia have carried out thousands of attacks on cargo ships sailing through the Gulf of Aden and the Indian Ocean, causing what others have identified as significant damage to maritime trade. In this paper, we use variations in the spread and intensity of Somali piracy to estimate its effect on the volume of international trade. By comparing trade volume change...

متن کامل

Traitor tracing scheme with constant ciphertext rate against powerful pirates

Traitor tracing schemes are used to fight piracy when distributing securely some data to multiple authorized receivers: if some receivers collude and share their decryption keys to build some pirate decoder, a tracing procedure should be able to find at least one of these “traitors” from the pirate decoder. In this paper, we consider powerful pirate decoders, which may sometimes refuse to decry...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012