2
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      Evaluation of Digital Piracy by Youths

      Future Internet
      MDPI AG

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          This paper sets out to explain how adolescents interpret piracy. Digital piracy is one of the most important risk behaviours mediated by new media to be found among adolescents. It is global, and changes dynamically due to the continued development of the information society. To explore the phenomena related to piracy among adolescent Internet users we need to apply qualitative research methods. The sample contained 1320 Polish respondents. The research used the technique of qualitative research. Data was collected using a form containing an open question. Adolescents will answer in the form how they interpret digital piracy. The categories characterize how piracy is perceived, and includes downloading various files—whether video or music files or even software (also games)—from unauthorized sources (P2P—Peer-to-peer ‘warez’ servers—websites which serve as repositories of illegal files). The qualitative data analysis allowed the identification of the following constructs in the perception of digital piracy by adolescents: ethical (giving value to the phenomenon), economical (showing profits and losses), legal (connected with punitive consequences and criminal liability), praxeological (facilitating daily life), technical (referring to the hardware necessary), social (the scale of the phenomenon and interpersonal relations), and personal benefits. The results fit into the discussion on the standard and hidden factors connected with piracy. The presented seven categories of the perception of piracy help us better understand the phenomenon of the infringement of intellectual property law and will help to develop appropriate preventive measures. Qualitative research makes it possible to understand the phenomenon of piracy from a deeper perspective, which can be translated into the design of effective educational measures. Preventive guidance on minimising risky behaviour is part of the development of one of the key competences, namely digital knowledge and skills. The research allowed us to enrich the theoretical knowledge on risky behaviours in cyberspace among adolescents (theoretical aim), to understand how to interpret risky behaviours in cyberspace (understanding of micro-worlds—cognitive aim), and to gather new knowledge that will be useful for prevention (practical aim).

          Related collections

          Most cited references77

          • Record: found
          • Abstract: not found
          • Article: not found

          Generation Y Attitudes Towards E-ethics and Internet-related Misbehaviours

            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            can low self-control help with the understanding of the software piracy problem?

              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found

              The Antecedents of Music Piracy Attitudes and Intentions

                Bookmark

                Author and article information

                Contributors
                (View ORCID Profile)
                Journal
                Future Internet
                Future Internet
                MDPI AG
                1999-5903
                January 2021
                January 04 2021
                : 13
                : 1
                : 11
                Article
                10.3390/fi13010011
                43defcac-c074-4e86-902e-7102c7657a40
                © 2021

                https://creativecommons.org/licenses/by/4.0/

                History

                Comments

                Comment on this article