wh @ iea2014

54
Why is online piracy ethically different from theft? A vignette experiment. Wojciech Hardy, Michał Krawczyk, Joanna Tyrowicz Group for Research in APplied Economics

Upload: grape

Post on 16-Jun-2015

144 views

Category:

Internet


1 download

TRANSCRIPT

Page 1: WH @ IEA2014

Why is online piracy ethically different from theft? A vignette experiment.

Wojciech Hardy, Michał Krawczyk, Joanna Tyrowicz

Group for Research in APplied Economics

Page 2: WH @ IEA2014

Introduction: If you download you’re a thief!

„When you go online and download songs without permission, you are stealing. The illegal downloading of music is just as wrong as shoplifting from a local convenience store (…)”

---RIAA, Official stance on piracy (online until 2011)

3

„Piracy is theft, and pirates are thieves, plain and simple. Downloading a movie off of the Internet is the same as taking a DVD off a store shelf without paying for it.”

---MPAA, What is Internet piracy? (online until 2010)

Page 3: WH @ IEA2014

Introduction: If you download you’re a thief!

„When you go online and download songs without permission, you are stealing. The illegal downloading of music is just as wrong as shoplifting from a local convenience store (…)”

---RIAA, Official stance on piracy (online until 2011)

3

„It's as if we were advising people on how to steal from supermarkets (...) Everything's alright in the legal terms, but, without any doubts, this IS stealing from artists and - I repeat - is causing harm to culture.”

--- Bogusław Pluta, director of ZPAV (2012)

„Piracy is theft, and pirates are thieves, plain and simple. Downloading a movie off of the Internet is the same as taking a DVD off a store shelf without paying for it.”

---MPAA, What is Internet piracy? (online until 2010)

Page 4: WH @ IEA2014

And the views of the society?

Definitely not the same percentage of people that steal from shops (at least I hope so ).

So what is it that actually makes the difference?

4 Source: http://piracy.americanassembly.org/wp-content/uploads/2011/11/AA-Research-Note-Infringement-and-Enforcement-November-2011.pdf

Page 5: WH @ IEA2014

Common reasons for piracy:

5

Page 6: WH @ IEA2014

Common reasons for piracy:

5

There is no loss if you copy something.

Page 7: WH @ IEA2014

Common reasons for piracy:

5

There is no loss if you copy something.

Why not copy if there’s no available alternative.

Page 8: WH @ IEA2014

Common reasons for piracy:

5

There is no loss if you copy something.

Why not copy if there’s no available alternative.

They are just some big capitalist companies, who won’t receive my few dollars.

Page 9: WH @ IEA2014

Common reasons for piracy:

5

There is no loss if you copy something.

Why not copy if there’s no available alternative.

They are just some big capitalist companies, who won’t receive my few dollars.

DRMs are a nuisance to buyers, and pose no barrier to pirates.

Page 10: WH @ IEA2014

Common reasons for piracy:

5

There is no loss if you copy something.

Why not copy if there’s no available alternative.

They are just some big capitalist companies, who won’t receive my few dollars.

DRMs are a nuisance to buyers, and pose no barrier to pirates.

It’s much easier when you don’t have to look the victim in the eye.

Page 11: WH @ IEA2014

To address the question:

6

Which difference makes the difference?

Page 12: WH @ IEA2014

To address the question:

6

Which difference makes the difference?

Hypothetical stories about Johnny, who committed various, questionable acts to acquire a TV series.

Page 13: WH @ IEA2014

To address the question:

6

Which difference makes the difference?

Hypothetical stories about Johnny, who committed various, questionable acts to acquire a TV series.

Stories are based on six dimensions often mentioned in the debate around piracy: Loss, Physicality, Alternative, Peer, Sharing, Protection

Page 14: WH @ IEA2014

To address the question:

6

Which difference makes the difference?

Hypothetical stories about Johnny, who committed various, questionable acts to acquire a TV series.

Stories are based on six dimensions often mentioned in the debate around piracy: Loss, Physicality, Alternative, Peer, Sharing, Protection

Responders rate the stories’ acceptability.

Page 15: WH @ IEA2014

To address the question:

6

Which difference makes the difference?

Hypothetical stories about Johnny, who committed various, questionable acts to acquire a TV series.

Stories are based on six dimensions often mentioned in the debate around piracy: Loss, Physicality, Alternative, Peer, Sharing, Protection

Responders rate the stories’ acceptability.

Additional questions on personal behaviour and demographics.

Page 16: WH @ IEA2014

Let’s take a few things into account first

7

Vignette experiments

Page 17: WH @ IEA2014

Let’s take a few things into account first

7

Vignette experiments

Hypothetical situations that the responders judge, evaluate, etc.

Page 18: WH @ IEA2014

Let’s take a few things into account first

7

Vignette experiments

Hypothetical situations that the responders judge, evaluate, etc.

Very popular when analyzing controversial choices.

Page 19: WH @ IEA2014

Let’s take a few things into account first

7

Vignette experiments

Hypothetical situations that the responders judge, evaluate, etc.

Very popular when analyzing controversial choices.

Types of theft – Green (2012).

Page 20: WH @ IEA2014

Let’s take a few things into account first

7

Vignette experiments

Hypothetical situations that the responders judge, evaluate, etc.

Very popular when analyzing controversial choices.

Types of theft – Green (2012).

Sometimes on piracy, but mostly software and not culture.

On cultural goods piracy

Page 21: WH @ IEA2014

Let’s take a few things into account first

7

Vignette experiments

Hypothetical situations that the responders judge, evaluate, etc.

Very popular when analyzing controversial choices.

Types of theft – Green (2012).

Sometimes on piracy, but mostly software and not culture.

On cultural goods piracy

Music piracy vs shoplifting (difference explained by law

deterrence).

Page 22: WH @ IEA2014

Let’s take a few things into account first

7

Vignette experiments

Hypothetical situations that the responders judge, evaluate, etc.

Very popular when analyzing controversial choices.

Types of theft – Green (2012).

Sometimes on piracy, but mostly software and not culture.

On cultural goods piracy

Music piracy vs shoplifting (difference explained by law

deterrence).

Acquisition of a `test preparation tool’ (physicality and

exclusion).

Page 23: WH @ IEA2014

Let’s take a few things into account first

7

Vignette experiments

Hypothetical situations that the responders judge, evaluate, etc.

Very popular when analyzing controversial choices.

Types of theft – Green (2012).

Sometimes on piracy, but mostly software and not culture.

On cultural goods piracy

Music piracy vs shoplifting (difference explained by law

deterrence).

Acquisition of a `test preparation tool’ (physicality and

exclusion).

`Sharing’ (e.g. at a party) is more acceptable than downloading.

Page 24: WH @ IEA2014

8

Let’s take a few things into account first

How are pirates different?

Higher preference for risky behaviour

Less respect for the rules

BUT: willingness to pirate is unrelated to willingness to shoplifting

Individual judgement is often harsher than perceived social norms.

Although the latter may influence the former.

Is piracy considered an ethical problem?

Page 25: WH @ IEA2014

9

The questionnaire

Page 26: WH @ IEA2014

9

The questionnaire

Rewards offered as an encouragement.

Page 27: WH @ IEA2014

9

The questionnaire

Rewards offered as an encouragement.

18 stories that were built upon the six dimensions.

Page 28: WH @ IEA2014

9

The questionnaire

Rewards offered as an encouragement.

18 stories that were built upon the six dimensions.

Randomized order of screens and stories within.

Page 29: WH @ IEA2014

9

The questionnaire

Rewards offered as an encouragement.

18 stories that were built upon the six dimensions.

Randomized order of screens and stories within.

Treatments (random assignment):

Page 30: WH @ IEA2014

9

The questionnaire

Rewards offered as an encouragement.

18 stories that were built upon the six dimensions.

Randomized order of screens and stories within.

Treatments (random assignment):

Treatment I: Ethical Judgement (EJ)

Page 31: WH @ IEA2014

9

The questionnaire

Rewards offered as an encouragement.

18 stories that were built upon the six dimensions.

Randomized order of screens and stories within.

Treatments (random assignment):

Treatment I: Ethical Judgement (EJ)

Treatment II: Social Norms (SN)

Page 32: WH @ IEA2014

9

The questionnaire

Rewards offered as an encouragement.

18 stories that were built upon the six dimensions.

Randomized order of screens and stories within.

Treatments (random assignment):

Treatment I: Ethical Judgement (EJ)

Treatment II: Social Norms (SN)

Treatment III: Incentivized Social Norms (ISN) (Krupka-Weber, 2013)

Page 33: WH @ IEA2014

9

The questionnaire

Rewards offered as an encouragement.

18 stories that were built upon the six dimensions.

Randomized order of screens and stories within.

Treatments (random assignment):

Treatment I: Ethical Judgement (EJ)

Treatment II: Social Norms (SN)

Treatment III: Incentivized Social Norms (ISN) (Krupka-Weber, 2013)

Rating scale: 1 – Totaly unacceptable; 4 – Fully acceptable. Note that there is no interpretable middle.

Page 34: WH @ IEA2014

10

Story examples

A friend of Johnny's forgot to log out from his e-mail box, after using Johnny's computer. While closing the web browser, Johnny spotted that the mail currently displayed on his screen contained a one-use only access code for a payable site with TV series in High Definition. Johnny quickly copied the code, and after returning home used it on a season of a popular TV series.

Not physical; Loss; Peer; No alternative; No sharing; Protection

A new season of a popular, high budget, American TV series is available in kiosks as an add-on for a magazine priced 7.99 PLN. However, Johnny downloaded the series from another source, for free.

Not physical; No loss; Not a peer; Alternative; No sharing; No protection.

Page 35: WH @ IEA2014

Sample – Two studies

11

Study 1 Students of the University of Warsaw (around 50% Economics)

Young age (~24)

Balanced gender (~60% female)

N=338

Study 2

Facebook profiles of non-for-profit organizations

Slightly older than Study I (~28)

Mostly female (~68%)

N=129

Page 36: WH @ IEA2014

12

Methodology

Ordered logit regressions:

Answer = βDimensions + γControls + ε

1) Regressions by treatment groups.

2) (Non)downloaders and (non)uploaders.

3) Subsample of deeds commited online.

4) Robustness checks.

Page 37: WH @ IEA2014

Results: The treatments

13 Note: * p < 0.05; ** p < 0.01

Page 38: WH @ IEA2014

Results: The treatments

13 Note: * p < 0.05; ** p < 0.01

Page 39: WH @ IEA2014

Results: The groups (downloaders)

14 Note: * p < 0.05; ** p < 0.01

Page 40: WH @ IEA2014

Results: The groups (downloaders)

14 Note: * p < 0.05; ** p < 0.01

Page 41: WH @ IEA2014

Results: The groups (downloaders)

14 Note: * p < 0.05; ** p < 0.01

Page 42: WH @ IEA2014

Results: The groups (uploaders)

15 Note: * p < 0.05; ** p < 0.01

Page 43: WH @ IEA2014

Results: The groups (uploaders)

15 Note: * p < 0.05; ** p < 0.01

Page 44: WH @ IEA2014

Results: The groups (uploaders)

15 Note: * p < 0.05; ** p < 0.01

Page 45: WH @ IEA2014

16

Results (Internet only)

Note: * p < 0.05; ** p < 0.01

Page 46: WH @ IEA2014

16

Results (Internet only)

Note: * p < 0.05; ** p < 0.01

Page 47: WH @ IEA2014

16

Results (Internet only)

Note: * p < 0.05; ** p < 0.01

Page 48: WH @ IEA2014

17

Conclusions

Page 49: WH @ IEA2014

17

Conclusions

The importance of dimensions:

Physicality (Most important)

Loss

Protection

Peer

Sharing

Alternative (Insignificant)

Page 50: WH @ IEA2014

17

Conclusions

The importance of dimensions:

Physicality (Most important)

Loss

Protection

Peer

Sharing

Alternative (Insignificant)

Individual opinion is harsher than perceived social norms.

Page 51: WH @ IEA2014

17

Conclusions

The importance of dimensions:

Physicality (Most important)

Loss

Protection

Peer

Sharing

Alternative (Insignificant)

Individual opinion is harsher than perceived social norms.

Conscious/sensitive downloaders.

Page 52: WH @ IEA2014

17

Conclusions

The importance of dimensions:

Physicality (Most important)

Loss

Protection

Peer

Sharing

Alternative (Insignificant)

Individual opinion is harsher than perceived social norms.

Conscious/sensitive downloaders.

Same dimensions important online.

Page 53: WH @ IEA2014

17

Conclusions

The importance of dimensions:

Physicality (Most important)

Loss

Protection

Peer

Sharing

Alternative (Insignificant)

Individual opinion is harsher than perceived social norms.

Conscious/sensitive downloaders.

Same dimensions important online.

Policies should be focused on particular aspects of piracy.

Page 54: WH @ IEA2014

Thank you for your attention! Author: Wojciech Hardy e-mail: [email protected]

More about our research on:

http://grape.uw.edu.pl/ipiracy

Twitter: @GrapeUW