Académique Documents
Professionnel Documents
Culture Documents
4, Summer 2005
addition to these private policing responsibilities, trade associations also allow the
industry to have a collective voice and more resources to help mobilize legal re-
sources against the pirating behavior. Trade associations can lobby for the interest
of the industry as a whole and in some instances have proven to be quite success-
ful. For example, the U.S. Senate Bill 893 (effective October 28, 1992) was created
as a response to the pressure of the software industry and increased the penalties
for copyright infringement (Cheng et al., 1997: 50).
The last strategy used to try and control the theft of intellectual property is by
means of lawsuits (both civil and criminal) and legal statutes in order to deter
pirating behavior. Enlisting the help of the government by means of legislative
action is an avenue that is being aggressively pursued. Many trade associations
have not only fought to get laws passed that prohibit the theft of intellectual prop-
erty rights but have also filed their own lawsuits against individuals. Many crimi-
nal statutes against theft of intellectual property are currently on the books with
many of the laws specific to certain forms of intellectual property. For example,
the Economic Espionage Act of 1996 makes the theft of trade secrets a federal
crime while the Trademark Counterfeiting Act of 1984 criminalizes the trafficking
of counterfeit goods and services (Maher and Thompson, 2002).
Unfortunately, while each of these strategies in isolation has been well docu-
mented and implemented in a number of arenas, there have been no outcome evalu-
ation efforts that have examined the effectiveness of each of the interventions. In
addition, we know almost nothing about the changes in intellectual property viola-
tions (both by amount and type) that have occurred in response to these prevention
and intervention efforts. This is unfortunate since many of these efforts are costly
in terms of both time and financial resources that are needed for proper implemen-
tation. A clear understanding of the impact of these efforts on intellectual property
violations is imperative to help guide public policies designed to combat piracy
and protect the rights of intellectual property owners.
As has been made clear, the current state of knowledge regarding the nature and
prevalence of intellectual property theft is scant. A three-pronged research effort is
suggested that may be ambitious--but always relevant in helping to begin to fill
some of the gaps that remain in the knowledge base regarding the theft of intellec-
tual property rights. These three priorities surround data collection efforts, theo-
retical tests, and cataloging and evaluating the knowledge base regarding the effects
of policy efforts.
First, just as the U.S. Bureau of Census together with the Bureau of Justice
Statistics conducts a nationwide survey of crime victims, efforts must be devel-
oped to initiate a nationwide data collection effort that targets information regard-
ing the prevalence of intellectual property theft with special attention made to include
Intellectual Property Crime 57
quickly so that the needed data can be collected and used to help inform the public
policy issues, discussions, and decisions that surround the theft of intellectual prop-
erty rights. Nowhere and at no time has this been as important o f an issue as it is in
today's digital age. If America wants to continue to be a world leader in the produc-
tion of intellectual property, a more complete understanding o f the prevalence and
causes o f the problem are needed as well as avenues which can help prevent the
theft from occurring.
References
Adams, J.S. (1963). "Toward an Understanding of Inequity," Journal of Abnormal and Social Psy-
chology, 67, 422--436.
Ajzen, I. (1991). "The Theory of Behavior," Organizational Behavior and Human Decision Pro-
cesses, 50, 179-211.
Ajzen, I., and Fishbein, M. (1980). Understanding Attitudes and Predicting Social Behaviour.
Englewood Cliffs, N J: Prentice Hall.
Akers, R.L. (1985). Deviant Behavior." A Social Learning Approach (3 rd ed.). Belmont, CA:
Wadsworth.
Akers, R.L. (1998). Social Learning and Social Structure: A General Theory of Crime and Devi-
ance. Boston, MA: Northeastern University Press.
Akers, R.L. (2000). Criminological Theories: Introduction, Evaluation, and Application (3~ded.).
Los Angeles, CA: Roxbury Publishing Company.
Akers, R.L., Krohn, M.D., Lanza-Kaduce, L., and Radosevich, M. (1979). "Social Learning and
Deviant Behavior: A Specific Test of a General Theory" American Sociological Review, 44, 635-
655.
Beccaria, C. (1963). On Crimes and Punishment. New York: MacMillan Publishing.
Bentham, J. (1967). A Fragment on Government and an Introduction to the Principal of Morals and
Legislation. Oxford: Basil Blackwell.
Burgess, R.L., and Akers, R.L. (1966). "A Different Association-Reinforcement Theory of Criminal
Behaviors." Social Problems, 14, 128-147.
Carruthers, B.G., and Ariovich, L. (2004). "The Sociology of Property Sights. Annual Review of
Sociology, 30, 23-46.
Cheng, H.K., Sims, R.R., and Teegen, H. (1997). "To Purchase or to Pirate Software: An Empirical
Study" Journal of Management Information Systems, 13, 49-60.
Christensen, A.L., and Eining, M.M. (1991). "Factors Influencing Software Piracy: Implication for
Accountants." Journal of Information Systems, Spring, 67-80.
Cohen, L.E., and Felson, M. (1979). "Social Change and Crime Rate Trends: A Routine Activities
Approach." American Sociological Review, 44, 588-608.
Cohen, E., and Cornwell, L. (1989). "A Question of Ethics: Developing Information Systems Eth-
ics. Journal of Business Ethics, 8, 431-437.
Davis, J.R., and Welton, R.E. (1991). "Professional Ethics: Business Students Perceptions." Journal
of Business Ethics, 10, 451-463.
Dusollier, S. (2003). "Open Source and Copyleft: Authorship Reconsidered?" Columbia Journal of
Law and the Arts, 26, 281-296.
Eckhoff, T. (1974). Justice: Its Determinants in Social Interaction. Rotterdam, Netherlands: Rotterdam
University Press.
Eining, M.M., and Christensen, A.L. (1991). "A Psycho-Social Model of Software Piracy: The De-
velopment and Test of a Model;' In R.M. Dejoie, G.C. Fowler, and D.B. Paradice (Eds.), Ethi-
cal lssues in Information Systems (pp. 182-188). Boston, MA: Boyd and Fraser.
Endeshaw, A. (2002). "The Paradox of Intellectual Property Lawmaking in the New Millennium:
Universal Templates as Terms of Surrender for the Non-Industrial Nations; Piracy as an Off-
shoot," Cardozo Journal of International and Comparative Law, 10, 47-77.