Search citation statements
Paper Sections
Citation Types
Year Published
Publication Types
Relationship
Authors
Journals
The lifestyle and consumption patterns of the current mobile generation (m‐generation), born after the Internet gained popularity, have changed dramatically. This study investigated university students' consumption attitude toward pop music and their behavior of illegally downloading such music by considering different law enforcement environments. In the first stage of our study, we designed and administered a questionnaire survey and collected 424 responses. The valid sample size was 394. On the basis of the sample, we developed a behavioral model that could be customized according to individual observation. In the second stage, we developed an agent‐based model for performing a simulation. This study divided law enforcement environments into combinations of the probability of being arrested engaging in illegal downloading behavior and the financial penalty after being caught. The results revealed that in an environment where the strength of law enforcement is increased, the agents' willingness to illegally download music in the model decreases. This empirical study highlighted that the deterrent effects in both the real world and simulated model were more sensitive to the probability of being caught primarily because of illegal downloading behavior. Therefore, the study suggests that for the m‐generation of the post‐Internet age, the most feasible approach to achieving instant results is through effective and certain law enforcement, which can effectively reduce the copyright infringement in the pop music industry caused by illegal downloading. Copyright © 2017 John Wiley & Sons, Ltd.
The lifestyle and consumption patterns of the current mobile generation (m‐generation), born after the Internet gained popularity, have changed dramatically. This study investigated university students' consumption attitude toward pop music and their behavior of illegally downloading such music by considering different law enforcement environments. In the first stage of our study, we designed and administered a questionnaire survey and collected 424 responses. The valid sample size was 394. On the basis of the sample, we developed a behavioral model that could be customized according to individual observation. In the second stage, we developed an agent‐based model for performing a simulation. This study divided law enforcement environments into combinations of the probability of being arrested engaging in illegal downloading behavior and the financial penalty after being caught. The results revealed that in an environment where the strength of law enforcement is increased, the agents' willingness to illegally download music in the model decreases. This empirical study highlighted that the deterrent effects in both the real world and simulated model were more sensitive to the probability of being caught primarily because of illegal downloading behavior. Therefore, the study suggests that for the m‐generation of the post‐Internet age, the most feasible approach to achieving instant results is through effective and certain law enforcement, which can effectively reduce the copyright infringement in the pop music industry caused by illegal downloading. Copyright © 2017 John Wiley & Sons, Ltd.
While hackers and viruses fuel the IS security concerns for organisations, the problems posed by employee computer crime should not be underestimated. Indeed, a growing number of IS security researchers have turned their attention to the 'insider' threat.However, to date, there has been a lack of insight into the relationship between the actual behaviour of offenders during the perpetration of computer crime, and the organisational context in which the behaviour takes place. To address this deficiency, this paper advances two criminological theories, which it is argued can be used to examine the stages an offender must go through in order for a crime to be committed. In addition, this paper illustrates how the two theories, entitled the Rational Choice Perspective and Situational Crime Prevention, can be applied to the IS domain, thereby offering a theoretical basis on which to analyse the offender/context relationship during the perpetration of computer crime. By so doing, practitioners may use these insights to inform and enhance the selection of safeguards in a bid to improve prevention programmes.
In order to deter cyber terrorism, it is important to identify the terrorists, since punishment may not deter them. The identification probability relies heavily on tracking cyber terrorists. However, there are legal and technical challenges to tracking terrorists. This paper proposes suggestions and insights on overcoming these challenges. Three types of infrastructures must be present in order to deter cyber terrorism: technical, policy, and legal. We list some of the key items that academics as well as practitioners need to focus on to improve cyber-terrorism deterrence.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.