메뉴 건너뛰기




Volumn 31, Issue 7, 2010, Pages 625-654

Transferring subcultural knowledge on-line: Practices and beliefs of persistent digital pirates

Author keywords

[No Author keywords available]

Indexed keywords


EID: 77956038407     PISSN: 01639625     EISSN: 15210456     Source Type: Journal    
DOI: 10.1080/01639620903231548     Document Type: Article
Times cited : (102)

References (45)
  • 2
    • 30344460323 scopus 로고    scopus 로고
    • Digital Piracy: Factors that Influence Attitude Toward Behavior
    • Al-Rafee, Sulaiman and Timothy P. Cronan. 2006. "Digital Piracy: Factors that Influence Attitude Toward Behavior." Journal of Business Ethics 63:237-259.
    • (2006) Journal of Business Ethics , vol.63 , pp. 237-259
    • Al-Rafee, S.1    Cronan, T.P.2
  • 3
    • 77956054664 scopus 로고    scopus 로고
    • Lesson Spurned? Reactions of Online Music Pirates to Legal Prosecutions by the RIAA
    • Bachman, Michael. 2007. "Lesson Spurned? Reactions of Online Music Pirates to Legal Prosecutions by the RIAA." International Journal of Cyber Criminology 1:213-227.
    • (2007) International Journal of Cyber Criminology , vol.1 , pp. 213-227
    • Bachman, M.1
  • 4
    • 0042225181 scopus 로고    scopus 로고
    • In Religion and the Social Order: Religion on the Internet, edited by J. K. Hadden and D. E. Cowan
    • Bainbridge, William S. 2000. "Religious Ethnography on the World Wide Web." Pp. 55-80. In Religion and the Social Order: Religion on the Internet, edited by J. K. Hadden and D. E. Cowan.
    • (2000) Religious Ethnography On the World Wide Web , pp. 55-80
    • Bainbridge, W.S.1
  • 5
    • 17444428885 scopus 로고    scopus 로고
    • The Antecedents of Music Piracy: Attitudes and Intentions
    • Chiou, Jyh-Shen, Chien-yi Huang, and Hsin-hui Lee. 2005. "The Antecedents of Music Piracy: Attitudes and Intentions." Journal of Business Ethics 57:161-174.
    • (2005) Journal of Business Ethics , vol.57 , pp. 161-174
    • Chiou, J.1    Huang, C.2    Lee, H.3
  • 7
    • 23044524781 scopus 로고    scopus 로고
    • The Social Organization of Audio Piracy on the Internet
    • Cooper, Jon and Daniel M. Harrison. 2001. "The Social Organization of Audio Piracy on the Internet." Media, Culture, and Society 23:71-89.
    • (2001) Media, Culture, and Society , vol.23 , pp. 71-89
    • Cooper, J.1    Harrison, D.M.2
  • 8
    • 43149118762 scopus 로고    scopus 로고
    • We Weren't Like No Regular Dope Fiends: Negotiating Hustler and Crackhead Identities
    • Copes, Heith, Andy Hochstetler, and Patrick Williams. 2008. "We Weren't Like No Regular Dope Fiends: Negotiating Hustler and Crackhead Identities." Social Problems 55:254-270.
    • (2008) Social Problems , vol.55 , pp. 254-270
    • Copes, H.1    Hochstetler, A.2    Williams, P.3
  • 10
    • 84925795794 scopus 로고    scopus 로고
    • Investigating Cyber-society: A Consideration of the Ethical and Practical Issues Surrounding Online Research in Chat Rooms
    • edited by Y. Jewkes. Portland, OR: Willan Publishing
    • DiMarco, Andrew D. and Heather DiMarco. 2003. "Investigating Cyber-society: A Consideration of the Ethical and Practical Issues Surrounding Online Research in Chat Rooms." Pp. 164-79. In Dot.cons: Crime, Deviance, and Identity on the Internet, edited by Y. Jewkes. Portland, OR: Willan Publishing.
    • (2003) Dot.cons: Crime, Deviance, and Identity On the Internet , pp. 164-179
    • Dimarco, A.D.1    Dimarco, H.2
  • 11
    • 84877002332 scopus 로고
    • Rethinking Subculture: An Interactionist Analysis
    • Fine, Gary and Sherryl Kleinman. 1979. "Rethinking Subculture: An Interactionist Analysis." American Journal of Sociology 85:1-20.
    • (1979) American Journal of Sociology , vol.85 , pp. 1-20
    • Fine, G.1    Kleinman, S.2
  • 13
    • 84934000488 scopus 로고
    • Criminality Theories and Behavioral Images
    • Glaser, David. 1956. "Criminality Theories and Behavioral Images." American Journal of Sociology 61:433-444.
    • (1956) American Journal of Sociology , vol.61 , pp. 433-444
    • Glaser, D.1
  • 14
    • 10944267724 scopus 로고    scopus 로고
    • Adolescent Internet Use: What We Expect, What Teens Report
    • Gross, Elisheva F. 2004. "Adolescent Internet Use: What We Expect, What Teens Report." Journal of Applied Developmental Psychology 25:633-649.
    • (2004) Journal of Applied Developmental Psychology , vol.25 , pp. 633-649
    • Gross, E.F.1
  • 15
    • 11144230997 scopus 로고    scopus 로고
    • Can Low Self-Control Help with the Understanding of the Software Piracy Problem?"
    • Higgins, George E. 2005. "Can Low Self-Control Help with the Understanding of the Software Piracy Problem?" Deviant Behavior 26:1-24.
    • (2005) Deviant Behavior , vol.26 , pp. 1-24
    • Higgins, G.E.1
  • 16
    • 85044912937 scopus 로고    scopus 로고
    • Digital Piracy: Assessing the Contributions of an Integrated Self-Control Theory and Social Learning Theory Using Structural Equation Modeling
    • Higgins, George E., Brian D. Fell, and Abby L. Wilson. 2006. "Digital Piracy: Assessing the Contributions of an Integrated Self-Control Theory and Social Learning Theory Using Structural Equation Modeling." Criminal Justice Studies 19:3-22.
    • (2006) Criminal Justice Studies , vol.19 , pp. 3-22
    • Higgins, G.E.1    Fell, B.D.2    Wilson, A.L.3
  • 17
    • 12344305644 scopus 로고    scopus 로고
    • Self-Control, Deviant Peers, and Software Piracy
    • Higgins, George E. and David A. Makin. 2004. "Self-Control, Deviant Peers, and Software Piracy." Psychological Reports 95:921-931.
    • (2004) Psychological Reports , vol.95 , pp. 921-931
    • Higgins, G.E.1    Makin, D.A.2
  • 18
    • 46349084062 scopus 로고    scopus 로고
    • Digital Piracy: An Examination of Three Measurements of Self-Control
    • Higgins, George E., Scott E. Wolfe, and Catherine D. Marcum. 2008. "Digital Piracy: An Examination of Three Measurements of Self-Control." Deviant Behavior 29:440-460.
    • (2008) Deviant Behavior , vol.29 , pp. 440-460
    • Higgins, G.E.1    Wolfe, S.E.2    Marcum, C.D.3
  • 20
    • 12744275983 scopus 로고    scopus 로고
    • Trends and Patterns among Software Pirates
    • Hinduja, Sameer. 2003. "Trends and Patterns among Software Pirates." Ethics and Information Technology 5:49-61.
    • (2003) Ethics and Information Technology , vol.5 , pp. 49-61
    • Hinduja, S.1
  • 21
    • 36949037524 scopus 로고    scopus 로고
    • Neutralization Theory and Online Software Piracy: An Empirical Analysis
    • Hinduja, Sameer. 2007. "Neutralization Theory and Online Software Piracy: An Empirical Analysis." Ethics and Information Technology 9:187-204.
    • (2007) Ethics and Information Technology , vol.9 , pp. 187-204
    • Hinduja, S.1
  • 22
    • 33847270657 scopus 로고    scopus 로고
    • Subcultural Evolution? Examining the Influence of On- and Off-Line Experiences on Deviant Subcultures
    • Holt, Thomas J. 2007. "Subcultural Evolution? Examining the Influence of On- and Off-Line Experiences on Deviant Subcultures." Deviant Behavior 28:171-198.
    • (2007) Deviant Behavior , vol.28 , pp. 171-198
    • Holt, T.J.1
  • 23
    • 77958509140 scopus 로고    scopus 로고
    • Exploring Strategies for Qualitative Criminological and Criminal Justice Inquiry Using On-line Data
    • In Press
    • Holt, Thomas J. In Press. "Exploring Strategies for Qualitative Criminological and Criminal Justice Inquiry Using On-line Data." Journal of Criminal Justice Education.
    • Journal of Criminal Justice Education
    • Holt, T.J.1
  • 24
    • 45949086382 scopus 로고    scopus 로고
    • Neutralizing Music Piracy: An Empirical Examination
    • Ingram, Jason and Sameer Hinduja. 2008. "Neutralizing Music Piracy: An Empirical Examination." Deviant Behavior 29:334-366.
    • (2008) Deviant Behavior , vol.29 , pp. 334-366
    • Ingram, J.1    Hinduja, S.2
  • 27
    • 0032376197 scopus 로고    scopus 로고
    • Netcrime: More Changes in the Organisation of Thieving
    • Mann, David and Mike Sutton. 1998. "Netcrime: More Changes in the Organisation of Thieving." British Journal of Criminology 38:201-229.
    • (1998) British Journal of Criminology , vol.38 , pp. 201-229
    • Mann, D.1    Sutton, M.2
  • 28
    • 33645465637 scopus 로고    scopus 로고
    • What Have We Learned from Fifty Years of Neutralization Research?"
    • Maruna, Shadd and Heith Copes. 2005. "What Have We Learned from Fifty Years of Neutralization Research?" Crime and Justice: A Review of Research 32:221-320.
    • (2005) Crime and Justice: A Review of Research , vol.32 , pp. 221-320
    • Maruna, S.1    Copes, H.2
  • 29
    • 0030557714 scopus 로고    scopus 로고
    • The Attitudes and Actions of Others: Tutelage and Sutherland's Theory of Differential Association
    • McCarthy, Bill. 1996. "The Attitudes and Actions of Others: Tutelage and Sutherland's Theory of Differential Association." British Journal of Criminology 36:135-147.
    • (1996) British Journal of Criminology , vol.36 , pp. 135-147
    • McCarthy, B.1
  • 30
    • 54349123858 scopus 로고    scopus 로고
    • Putting Social Context Into Text: The Semiotics of E-Mail Interaction
    • Menchik, Daniel and Xiaoli Tian. 2008. "Putting Social Context Into Text: The Semiotics of E-Mail Interaction." American Journal of Sociology 114:332-370.
    • (2008) American Journal of Sociology , vol.114 , pp. 332-370
    • Menchik, D.1    Tian, X.2
  • 31
    • 65649098362 scopus 로고    scopus 로고
    • Neutralizing Potential and Self-Reported Digital Piracy: A Multitheoretical Exploration among College Undergraduates
    • Morris, Robert G. and George E. Higgins. 2009. "Neutralizing Potential and Self-Reported Digital Piracy: A Multitheoretical Exploration among College Undergraduates." Criminal Justice Review 34:173-195.
    • (2009) Criminal Justice Review , vol.34 , pp. 173-195
    • Morris, R.G.1    Higgins, G.E.2
  • 32
    • 33645081699 scopus 로고    scopus 로고
    • Mentors and Criminal Achievement
    • Morselli, Carlo, Pierre Tremblay, and Bill McCarthy. 2006. "Mentors and Criminal Achievement." Criminology 44:17-43.
    • (2006) Criminology , vol.44 , pp. 17-43
    • Morselli, C.1    Tremblay, P.2    McCarthy, B.3
  • 33
    • 18444388003 scopus 로고    scopus 로고
    • Describing Sexual Behavior in the Era of the Internet: A Typology for Empirical Research
    • Quinn, James F. and Craig J. Forsyth. 2005. "Describing Sexual Behavior in the Era of the Internet: A Typology for Empirical Research." Deviant Behavior 26:191-207.
    • (2005) Deviant Behavior , vol.26 , pp. 191-207
    • Quinn, J.F.1    Forsyth, C.J.2
  • 34
    • 84984350422 scopus 로고
    • The Stooper: A Professional Thief in the Sutherland Manner
    • Rosecrance, John. 1986. "The Stooper: A Professional Thief in the Sutherland Manner." Criminology 24:29-40.
    • (1986) Criminology , vol.24 , pp. 29-40
    • Rosecrance, J.1
  • 35
  • 36
    • 0030668250 scopus 로고    scopus 로고
    • A Social Learning Theory Analysis of Computer Crime among College Students
    • Skinner, William F. and Anne M. Fream. 1997. "A Social Learning Theory Analysis of Computer Crime among College Students." Journal of Research in Crime and Delinquency 34:495-518.
    • (1997) Journal of Research In Crime and Delinquency , vol.34 , pp. 495-518
    • Skinner, W.F.1    Fream, A.M.2
  • 37
    • 77956026505 scopus 로고    scopus 로고
    • Confessions of a Dying Thief: Understanding Criminal Careers and Illegal Enterprise
    • NJ: Aldine Transaction
    • Steffensmeier, Darrell J. and Jeffery T. Ulmer. 2005. Confessions of a Dying Thief: Understanding Criminal Careers and Illegal Enterprise. New Brunswick, NJ: Aldine Transaction.
    • (2005) New Brunswick
    • Steffensmeier, D.J.1    Ulmer, J.T.2
  • 40
    • 0001155759 scopus 로고
    • Techniques of Neutralization: A Theory of Delinquency
    • Sykes, Gresham and David Matza. 1957. "Techniques of Neutralization: A Theory of Delinquency." American Sociological Review 22:664-670.
    • (1957) American Sociological Review , vol.22 , pp. 664-670
    • Sykes, G.1    Matza, D.2
  • 41
    • 33646414637 scopus 로고    scopus 로고
    • The Art of Computer Virus Research and Defense
    • NJ: Addison Wesley
    • Szor, Peter. 2005. The Art of Computer Virus Research and Defense. Upper Saddle River, NJ: Addison Wesley.
    • (2005) Upper Saddle River
    • Szor, P.1
  • 44
    • 18144381963 scopus 로고    scopus 로고
    • How Edge are You? Constructing Authentic Identities and Subcultural Boundaries in a Straightedge Internet Forum
    • Williams, Patrick and Heith Copes. 2005. "How Edge are You? Constructing Authentic Identities and Subcultural Boundaries in a Straightedge Internet Forum." Symbolic Interaction 28:67-89.
    • (2005) Symbolic Interaction , vol.28 , pp. 67-89
    • Williams, P.1    Copes, H.2
  • 45
    • 47249099793 scopus 로고    scopus 로고
    • Deterrence and Digital Piracy: A Preliminary Examination of the Role of Viruses
    • Wolfe, Scott, George Higgins, and Catherine Marcum. 2008. "Deterrence and Digital Piracy: A Preliminary Examination of the Role of Viruses." Social Science Computer Review 26:1-17.
    • (2008) Social Science Computer Review , vol.26 , pp. 1-17
    • Wolfe, S.1    Higgins, G.2    Marcum, C.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.