A Social Cultural Approach to Illegal Digital Contents Sharing

디지털콘텐츠 불법 파일공유에 관한 사회문화적 접근

  • 박경자 (순천대학교 중소기업경영연구소)
  • Received : 2016.10.10
  • Accepted : 2016.03.10
  • Published : 2016.03.31

Abstract

Why illegal digital contents sharing happens? This study pays attention to the fact that file sharing is an exchanging behavior between people and it is expanding despite of an illegal behavior and proposes that it is necessary for the phenomenon to be understood from social cultural point of view beyond a personal dimension. Based on the social exchange theory, this study demonstrates effects of file sharing attitudes and continuity, regarding 'group norm', 'popular demand', 'reciprocity' and 'social solidarity' as main factors. The main findings of this study are as followed;- First, it is shown that a tacit agreement of a group on file sharing is a determinant of positive attitude to file sharing and the intent of continual file sharing. Second, it is not found that the social relationship factors that are regarded as potential influential factors on file sharing attitude have effects on file sharing behavior, except for 'group norm'. Unlike previous studies, the results may come from the fact that this study deals with an illegal behavior. The third finding indicates a structural relationship between social relationship factors. When members of a group have more amicable attitude to file sharing including silence or a tacit agreement on file sharing, more people ask illegal sharing of files that they need. Such public demand creates expectation of reciprocity. As reciprocity maintains, social connectedness is strengthened. Then, strong social connectedness escalates the intent to maintain file sharing. It is important to notice that this study promotes understanding of how digital contents sharing happens by structuring and demonstrating influential relationship between characteristic factors of the social relationship.

Keywords

References

  1. 강민형, 이재남, 강민형, 이재남, "개인의 지식기여 선행요인 간 상호작용효과," 지식경영연구 (16:1), 2015, pp. 55-69. https://doi.org/10.15813/kmr.2015.16.1.003
  2. 김광용, "윤리적 의사결정 관점의 소프트웨어 불법복제에 관한 연구," 정보화정책 (11:4), 2004, pp. 48-86.
  3. 김보영, 이수진, "동료의 과업관련 도움요청과 이들의 특징이 지식공유에 미치는 영향에 관한 연구," 지식경영연구 (13:4), 2012, pp. 101-116.
  4. 김왕석, 성동규, 김민정, 김광협, "파일공유 서비스와 인터넷 음악 저작권의 인식에 대한 연구: 한국과 미국의 대학생들의 비교연구를 중심으로," 한국언론학보 (49:1), 2005, pp. 221-245.
  5. 김종기, 전진환, "사회유대가 소프트웨어 불법복제에 미치는 영향에 관한 탐색적 연구," 인터넷전자상거래연구 (7:4), 2007, pp. 45-68.
  6. 김중한, "소프트웨어 불법복제 의도에 미치는 영향요인에 관한 연구," 한국IT서비스학회 (12:2), 2013, pp. 131-152. https://doi.org/10.9716/KITS.2013.12.2.131
  7. 마은경, 김명숙, "공공기관 내 구성원간의 지식 공유에 관한 연구: 사회적 교환이론관점에서," Information System Review (17:1), 2005, pp. 195-217.
  8. 박경자, "디지털콘텐츠 불법복제의 상대적 편익과 비용이 불법복제태도 및 행동에 미치는 영향," 한국콘텐츠학회논문지 (15:7), 2015, pp. 489-499. https://doi.org/10.5392/JKCA.2015.15.07.489
  9. 박현정, 김상훈, "영화파일의 불법 다운로드를 결정하는 요인에 대한 연구," 소비문화연구 (14:4), 2011, pp. 1-20.
  10. 이서한, 이호, 김경규, "기업내 SNS가 지식공유 행위에 미치는 영향에 대한 연구: 사회심리학적 관점을 중심으로," 지식경영연구 (15:4), 2014, pp. 189-206. https://doi.org/10.15813/kmr.2014.15.4.010
  11. 안지혜, "인터넷 파일공유에 관한 담론 과정 분석과 저작권 제도에 관한 연구," 한국정책과학학회보 (14:3), 2010, pp. 107-132.
  12. 오현숙, 박남기, 강내원, "개인의 문화적 성향과 사회규범이 불법 다운로드 의도에 미치는 영향: 한국 대학생과 중국인 유학생 비교," 언론과학연구 (13:4), 2013, pp. 343-378.
  13. 전진환, 김종기, "대학생들의 S/W불법복제 의도에 영향을 미치는 요인에 관한 연구," 정보보호학논문지 (19:2), 2009, pp. 127-140.
  14. 전현규, 김민용, "온라인 채용시험정보 커뮤니티내에서 지식공유의도에 영향을 미치는 요인에 관한 연구," 지식경영연구 (14:2), 2013, pp. 72- 89.
  15. 전현규, 이건창, "긍정감정과 부정감정이 개인의 지식기여 및 활용 의도에 미치는 영향에 관한 실증연구," 지식경영연구 (16:1), 2015, pp. 21-54. https://doi.org/10.15813/kmr.2015.16.1.002
  16. 정재훤, 양성병, 김영걸, "온라인 지식네트워크 내에서의 지식기여 및 지식활용 활동에 영향을 미치는 요인," 한국경영과학회지 (34:3), 2009, pp. 1-27.
  17. Ajzen, I., "The theory of planned behavior," Organizational Behavior and Human Decision Processes (50), 1991, pp. 179-211. https://doi.org/10.1016/0749-5978(91)90020-T
  18. Al-Rafee, S. and Cronan, T.P., "Digital piracy: Factors that Influence attitude toward behavior," Journal of Business Ethics (63:3), 2006, pp. 237-259. https://doi.org/10.1007/s10551-005-1902-9
  19. Bagchi, K., Kirs, P. and Cerveny, R. "Global software piracy: Can economic factors alone explain the trend?," Communications of the ACM (49:6), 2006, pp. 70-75. https://doi.org/10.1145/1132469.1132470
  20. Blau, P.M. Exchange and Power in Social Life, New York: John Wiley, 1964.
  21. Bock, G.W., Zmud, R.W., Kim, Y.G. and Lee, J.N., "Behavioral intention formation in knowledge sharing: Examining the roles of extrinsic motivators, social-psychological forces, and organizational climate," MIS Quarterly (29:1), 2005, pp. 87-111. https://doi.org/10.2307/25148669
  22. Chen, Y.C., Shang, R.A. and Lin, A.K., "The Intention to download music files in a P2P environment: Consumption value, fashion, and ethical decision perspectives," Electronic Commerce Research and Applications (7:4), 2008, pp. 411-422. https://doi.org/10.1016/j.elerap.2008.02.001
  23. Constant, D., Sproull, L.S. and Kiesler, S., "The kindness of strangers: The usefulness of electronic weak ties for technical advice," Organization Science (7:2), 1996, pp. 119-135. https://doi.org/10.1287/orsc.7.2.119
  24. Cooper, T.L. and Coston, J., "Symposium on grassroots organizations in the public policy process," International Journal of Organization Theory and Behavior (2:1/2), 1999, pp. 107-140. https://doi.org/10.1108/IJOTB-02-01-02-1999-B005
  25. Fornell, C. and Larcker, D., "Evaluating structural equation models with unobservable variables and measurement errors," Journal of Marketing Research (18:1), 1981, pp. 39-50. https://doi.org/10.1177/002224378101800104
  26. Forsyth, D.R. Group Dynamics [International Student Edition], Belmont CA, Thomson Wadsworth Publishing, 2006.
  27. Gallegos, F., "Software piracy: Some facts, figures, and issues," Information Systems Security (8:4), 2000, pp. 34-56.
  28. Gilovich, T., Keltner, D. and Nisbett, R.E., Three dy namic aut hors br ing a fresh perspective to social psychology, Social Psychology (2th ed.), New York: Norton & Company, 2010.
  29. Glass, R.S. and Wood, W.A., "Situational determinants of software piracy: An equity, theory perspective," Journal of Business Ethics (15), 1996, pp. 1189-1198. https://doi.org/10.1007/BF00412817
  30. Hair, J.F., Black, W.C., Babin, B.J., Anderson, R.E. and Tatham, R.L., Multivariate data analysis(6th ed.), Upper Saddle River, New Jersey: Pearson Education, 2006.
  31. Hendricks, J., Exchange theory in aging, In G. Maddox (Eds.), The Encyclopedia of Aging (2nd eds.), New York: Springer, 1995.
  32. Higgins, G.E., Fell, B.D. and Wilson, A.L., "Digital piracy: Assessing the contributions of an integrated self-control theory and social learning theory using structural equation modeling, 2006, criminal justice studies," A Critical Journal of Crime Law, & Society (19), 2007, pp. 3-22.
  33. Homans, G.C., "Social behavior as exchange," American Journal of Sociology (63), 1958, pp. 597-606. https://doi.org/10.1086/222355
  34. Levin, D.Z. and Cross, R., "The Strength of weak ties you can trust: The mediating role of trust in effective knowledge transfer," Management Science (50:11), 2004, pp. 1477-1490. https://doi.org/10.1287/mnsc.1030.0136
  35. Liao, C., Lin, H.N. and Liu, Y.P., "Predicting the use of pirated software: A contingency model integrating perceived risk with the theory of planned behavior," Journal of Business Ethics (91:2), 2010, pp. 237-252. https://doi.org/10.1007/s10551-009-0081-5
  36. Lin, T., Hsu, M., Kuo, F. and Sun, P., "An Intention model-based study of software piracy," Proceedings of the 32nd Annual Hawaii International Conference on Systems Sciences, 1999, pp. 1-8.
  37. Noelle-Neuman, E., "The spiral of silence: A theory of public opinion," Journal of Communication (24), 1974, pp. 43-51. https://doi.org/10.1111/j.1460-2466.1974.tb00367.x
  38. Peace, A.G., Galletta, D.F. and Thong, J.Y.L., "Software piracy in the workplace: A model and empirical test," Journal of Management Information Systems (20:1), 2003, pp. 153-177. https://doi.org/10.1080/07421222.2003.11045759
  39. Siponen, M.T. and Vartiainen, T., "Attitudes to and factors af fecting unauthorized copying of computer software in Finland," Behaviour & Information Technology (24:4), 2005, pp. 249-257. https://doi.org/10.1080/01449290512331321857
  40. Steffes, E.M. and Burgee, L.E., "Social ties and online word of mouth," Internet Research (19:1), 2009, pp. 42-59.
  41. Tang, J. and Farn, C., "The Effect of interpersonal inf luence on softlifting," Journal of Business Ethics (56:2), 2005, pp. 149-161. https://doi.org/10.1007/s10551-004-2170-9
  42. Xiao, H., Li, W., Cao, X. and Tang, Z., "The online socia l net works on knowledge exchange: Online social identity, social tie and culture orientation," Journal of Global Information Techonology Management (15:2), 2012, pp. 4-24. https://doi.org/10.1080/1097198X.2012.11082753