In recent years, the opportunities for content creation and distribution afforded by Web 2.0 have been widely embraced by an increasingly online, computerliterate population. They have also resulted in widespread copyright infringement, which corporate and government regulatory bodies have sought to constrain with legislative changes, court actions, public education campaigns, and technological protection measures. These approaches are informed by theories of perceptual deterrence, and are not working.
This paper offers evidence supporting an alternative, processbased approach to understanding online copyright infringement; an approach focussed on factors that encourage voluntary deference, cooperation and compliance, rather than attempting to induce it with threats of punishment.
In recent years, a convergence of online technologies and services has enabled computerliterate citizens to exert greater control over the flow of media in their lives, and play a more active role in its creation and development. These technologies have been pivotal in the emergence of a readwrite Internet, which Lawrence Lessig (2005a) contrasts with the consumptionfocused, topdown Internet of the late 1990s, and a possible readonly Internet — the Internet that appears to be favoured by many large media interests of the future.
Lasica (2005) similarly refers to the passing of the couch potato era of forcefed mass media , which he contrasts with a growing participatory, decentralised, bottomup culture emerging online. Like Lessig (2005a), he is also concerned about the ongoing viability of this participatory culture in the face of a formidable technological and legal opposition.
Technology publisher Tim O’Reilly (2005) views such citizen participation as a fundamental feature of Web 2.0, a growing cluster of online developments that share several important commonalities, and are qualitatively distinguishable from the dominant technologies and services of the retroactively named Web 1.0 era.
Web 2.0 can be a fuzzy concept (see Alexander, 2006; Madden and Fox, 2006) with oftentimes rubbery boundaries, at least part of which is attributable to hype, marketing and the attraction of hip Internet memes to venture capitalists. Nevertheless, O’Reillys (2005) identification of a series of systematic differences between the Internet circa 2006/7 and the Internet during the dotcom boom of the late 1990s does appear valid, and has garnered substantial support.
Unlike Web 1.0 technologies, O’Reilly (2005; see also Levy, 2005) argues, Web 2.0 technologies (a) harness/exploit the collective wisdom and effort of their users (i.e., user participation and collaboration add value to the service); (b) trust and respect users, and treat them as codevelopers rather than consumers; and, (c) are open to — and encourage remixing, hacking and sharing, with permissive licensing, open standards and programming languages, freely available application programming interfaces (APIs), and so forth.
Protypical Web 2.0 technologies, services, and activities include Flickr!, Del.icio.us, Digg, Wikipedia, YouTube, MySpace, blogging, podcasting, peertopeer file sharing, and the creation of mashups. For the uninitiated, each of these is briefly described in this paper’s Appendix.
These innovations, in addition to what C. Anderson (2005) refers to as the democratisation of the tools of production (e.g., personal computers, software, digital cameras etc.), distribution (e.g., Internet infrastructure), and communication (including smart search engines and community forums [that] let peers collaborate and exchange ideas in ways that were once available only to insiders or those who took expensive training courses; ) , are facilitating an Internet-wide shift away from passive consumption, and towards participation, creation and collaboration. Commensurate with this is a shift in the balance of power, away from established voices, towards the community at large. A move towards what Lasica refers to as the participatory Web, and Gillmor (2004) calls the conversation. A move that Lasica argues is throwing the old rules into disarray. 
On Digg and Del.icio.us, users collectively determine (and annotate) what is newsworthy. On Flickr! and YouTube, members decide which photographs and videos should rise to prominence by favouriting, linking and commenting. Open APIs and RSS (really simple syndication) allow users to syndicate, customise and remix content in increasingly diverse ways. Free and simple content management (or blogging) tools enable virtually anyone to become a citizen journalist (Gillmor, 2004), and to contribute to the conversation. With a personal computer and the BitTorrent peertopeer protocol, record label backing is no longer a necessary ingredient in a hit record. DJ Danger Mouse learned this with the Grey Album, which was produced in his home studio in less than three weeks, and downloaded over 1.25 million times between January and April 2004 alone (An Atlas of the Free, 2004).
The available data indicates that people are enthusiastically embracing these new technologies, and the opportunities for participation and expression they provide. For example, MySpace has remained ranked within Alexa’s top10 most trafficked English language Web sites since January 2006. There are currently some 200 million MySpace user accounts/profiles, well over 20 million of which are updated at least monthly (Hempel and Lehman, 2005).
The blogosphere is also expanding rapidly and, until recently, was doubling in size every five to seven months (Sifry, 2006b). By March 2007, Technorati, a realtime blog tracking service, was indexing 70 million blogs, over four million of which were being updated at least weekly. When aggregated, these updates amount to over 58,000 new posts per hour (comScore Media Metrix, 2005; Sifry, 2006a; 2006b; 2007). Pew Internet and American Life data indicates that 19 percent of online teens  in the U.S. have created their own blog. Eight percent of adult Internet users have reported doing similar (Lenhart and Fox, 2006; Lenhart and Madden, 2005).
Peertopeer filesharing is a relatively widespread activity, that continues to grow in popularity. During the first half of 2004, CacheLogic estimated that, at any given time, around eight million people were connected to the four main filesharing networks (Parker, 2004). By the end of 2004, as much as 60 percent of all Internet traffic was peertopeer, mainly on the BitTorrent and eDonkey networks (Parker, 2005; Thompson, 2005). More recently collected survey data published by Entertainment Media Research (2007) offers no reason to suppose that the popularity of peertopeer has declined during the past three years.
Finally, Pew data collected at the end of 2004 indicated that about 19 percent of online teens in the U.S. (i.e., around four million people), and 18 percent of online adults, had remixed content gathered from other sources into a new creation (Lenhart and Madden, 2005). No doubt, some of this content featured in the videos uploaded to sites like YouTube by 16 million U.S. adults so others can watch [them] , and in the podcasts downloaded by more than 24 million U.S. adults prior to August 2006 (Madden, 2006).
Many commentators enthuse about a revolution resulting from this convergence of technologies. For example, Dan Gillmor quit his job as a columnist for the San Jose Mercury News at the end of 2004 to spearhead a citizens media movement based on the idea that anyone with something to say could use increasingly powerful and decreasingly expensive tools to say it, potentially for a global audience.  Meanwhile, Lessig writes and speaks regularly about how the Internet is used to create and remix culture. 
While many see the possibilities afforded by Web 2.0 as positive, others have expressed reservations. For example, the ease with which anyone can create a MySpace profile, and then fill it with content of their choosing, has raised a number of privacy and safety concerns, especially when those profiles belong to children (Lenhart and Madden, 2007; Stafford, 2006; Zeller, 2006).
Second, these new tools of mass, pseudoanonymous expression raise concerns about the ongoing relevance of the professional, and what some have been calling the cult of the amateur (Carr, 2005). These concerns spread from the blogosphere and into the mainstream media after a series of highprofile incidents involving Wikipedia in late 2005 (Giles, 2005; Johnson, 2006; McHenry, 2005; Seigenthaler, 2005).
Third, and most importantly with respect to this paper, are concerns voiced about the extent to which relatively unregulated online expression and digital creativity result in widespread copyright infringement. As Lessig (2002, 2004b) and others note, innovation and creativity build on the past, and mass culture provides the building blocks for the stuff we create , today and into the future. This quickly becomes apparent when browsing MySpace (where users decorate their profiles with copied songs, pictures and text), YouTube (where remixing abounds, and one of the most popular genres involves the video’s protagonist dancing to a wellknown pop song), or any popular torrent tracker (where the vast majority of material available for download is clearly not being shared by individuals legally permitted to do so). Similarly, blogging (which often involves liberal quoting) and mashups (which combine published media into new, derivative creations) also rely heavily on the ctrlc (copy) and ctrlv (paste) keyboard shortcuts.
Regardless of whether these uses are considered fair (a reasonably well established concept in U.S. law, with no direct parallel in Australia), they have created a substantial degree of tension between the content publishing industries  (who regard much of this behaviour as infringement, piracy or theft), and those appropriating, remixing and redistributing copyrighted elements of their cultural milieu. This tension has come to a head in recent years, as tools of (re)production and distribution have become increasingly available, and the space in which these behaviours are occurring, increasingly public.
Indeed, major players in the content publishing industry regard the losses attributable to these copyright infringements as substantial , and also claim concern about a culture of contempt for intellectual property, and for the rights of others generally ... .  To redress these concerns, many in the content industry have sought to markedly increase the control they have over the reproduction and use of all intellectual products (Lessig, 2001, 2004b; Litman, 2001; Stallman, 2002b; Vaidhyanathan, 2001, 2004). This control has been sought through (a) lobbying for legislative changes; (b) court actions; (c) education and propaganda campaigns; and, (d) technological means.
Copyright law is complex (the Australian Copyright Act 1968 currently exceeds 600 pages), often counterintuitive, in a near constant state of flux, and can vary substantially across jurisdictions (Litman, 2001). Litman (e.g., 2000) attributes much of this flux to the success of publishing industry lobby groups who, over the last half century, have been instrumental in shifting the dominant copyright metaphor from that of a bargain, to a set of incentives, to a system of controls.
These shifts have necessitated numerous improvements to copyright legislation including, most notably, the U.S. Copyright Term Extension Act 1998, which increased the duration of copyrights — for the 11th time since 1962 by a further 20 years (to the life of the author plus 70 years), and the U.S. Digital Millennium Copyright Act (DMCA) 1998. The DMCA contains, within a package of measures ostensibly aimed at strengthening copyrights, a set of broad provisions prohibiting (a) the act of circumventing technological measures used to control how published works are accessed and used; as well as (b) developing, or distributing tools that can be used to defeat such measures. In practical terms, the DMCA has made it illegal to use or develop hardware or software that circumvents, for example, the digital rights management (DRM) software bundled with many popular audio CDs, so their contents can be copied onto an iPod or equivalent portable audio player, a use which is widely considered to be fair within the United States (Electronic Frontier Foundation [EFF], 2006).
The Australian Copyright Amendment (Digital Agenda) Act 2000, the Copyright Legislation Amendment Act 2004 and the recent Copyright Legislation Amendment Act 2006 have been passed into law to harmonise Australian copyright laws with those of the United States, and thus enable the full implementation of the AustraliaUnited States Free Trade Agreement (AUSFTA; Davies, 2004; Varghese, 2004).
As new legislation has been introduced into law, publishing industry members and representatives have been quick to exploit its provisions. They have also taken advantage of existing laws, and the confusion and uncertainty surrounding their interpretation.
Since A&M Records, et al. v. Napster Inc. was filed in December 1999 (Menn, 2003), numerous lawsuits have been brought against developers and owners of technologies that can be used to trade infringing content, and against organisations alleged to facilitate, or induce such trade. Two of the more recent and high-profile actions include Universal Music Australia Pty Ltd., et al. v. Sharman License Holdings Ltd., et al. in the Australian Federal Court, which began with a series of wellpublicised raids in February 2004 (Montgomery and Warne, 2004) and appears to have recently ended with a $US115 million settlement in Universal’s favour (Pfanner, 2006); and, MetroGoldwynMayer Studios Inc., et al. v. Grokster Ltd., et al., which was decided by the U.S. Supreme Court in 2005.
In addition to these high profile cases, dozens more civil and criminal actions have been brought against Web sites allegedly linking to infringing material (for e.g., see Cullen, 2004; Hiestand, 2004; Jardin, 2004a; MPAA, 2004), members of organised warez trading groups (Goldman, 2004; Sullivan, 2004), and individual filesharers (for e.g., see Borland, 2004; Graham, 2004; Hollywood Sues, 2004). Indeed, by mid2007 the RIAA alone had filed more than 20,000 lawsuits against individual filesharers (EFF, 2007), and was still filing at a rate of several hundred per month.
Although the majority of these actions have been initiated in the U.S., their impact has been felt worldwide. Peertopeer file indexing Web sites have been closed down across Europe (Cullen, 2004; Hiestand, 2004; Jardin, 2004a). Hundreds of citizens in the U.K., Denmark, Austria and elsewhere have been threatened with lawsuits for copyright violation (UK Music to Sue, 2004). Even Australians — like Queensland man Stephen Cooper (who was found by Australian Federal Court Justice Brian Tamberlin to have violated Australian copyright laws by hyperlinking to Web sites hosting infringing material; Deare, 2005) have become embroiled in what many commentators refer to as Hollywood’s war on piracy (e.g., Lasica, 2005; Lessig, 2004b).
In addition to filing lawsuits against those involved in the straight reproduction and transmission of copyrighted works, industry groups and individual copyright holders have also targeted individuals making unauthorised derivative works based on their property. These derivative works are often referred to as mashups, because they combine (i.e., mash up) audio, visual and textual data from a range of sources into new creative works. One early highprofile mashup that provoked the ire of the music industry was the Grey Album, by Brian Burton (aka DJ Danger Mouse). The Grey Album combines vocals from JayZ’s Black Album with music from the Beatles White Album, and was the subject of an EMI Records issued ceaseanddesist order in February 2004 . The public reaction to EMIs actions against Burton was strong, and is discussed later in this paper (An Atlas of the Free, 2004; FrereJones, 2005; Glaister, 2004; Wolk, 2004).
Similarly, legal pressure has been placed on emerging online communities of anime music video (AMV) creators and fans (Lessig, 2005a), artists remixing subway maps (Doctorow, 2006a, 2006c), MMORPG (massively multiplayer online roleplaying game) players who have based their online personae on popular comic superheroes (von Lohmann, 2004a), hobbyists developing extra actions for robotic dogs (EFF, 2003), and even the creators and distributors of animated parodies (Baio, 2006; L. Miller, 2006).
In addition to lobbying for legislative change and launching successive waves of legal actions, members of the content industry have also embarked on a series of aggressive education campaigns. Thus far, these campaigns have been less about disseminating information and stimulating critical discourse than they have been about promoting the agendas of large media corporations. Examples include materials provided to schools by organisations like the BSA and the MPAA (see Dean, 2004); booklets recommending the implementation and enforcement of specific ICT usage policies distributed to corporate leaders by the MPAA and RIAA (2003); and numerous web campaigns such as the MPAA’s respectcopyrights.org, and the IFPIs (International Federation of the Phonographic Industry) promusic.org.
These campaigns have sought not only to modify behaviour directly, but also indirectly through manipulation of the language used to frame issues and shape debate. For example, terms such as piracy and stealing are used to shape the tone of public discourse about what is, essentially, any use not expressly authorised by owners of the copyrighted property . As Litman (2000) illustrates:
Piracy used to be about folks who made and sold large numbers of counterfeit copies. Today, the term piracy seems to describe any unlicensed activity, especially if the person engaging in it is a male teenager. The content industry calls some things that are unquestionably legal piracy. 
The effects of such framing and metaphor use are well documented in cognitive linguistics (e.g., Lakoff, 2005), and elsewhere (see Dzidic, 2005).
Under the premise of keeping honest people honest , digital rights management (DRM) is one of several technologybased strategies employed by content publishers to enhance their control over consumers’ use of digital media. Although there are many specific flavours of DRM, they all share the common purpose of preventing (or attempting to prevent) any uses of protected media that are beyond those expressly authorised by a rights holder. DRM can make it impossible for consumers to sample, remix or reproduce content, even to the extent permitted by law, and its deployment is criticised on several grounds. These criticisms include:
(a) DRM, coupled with anticircumvention legislation (as written in the U.S. DMCA 1998 and the Australian Copyright Amendment Act 2006) not only restricts fair/legal use while a work is protected by copyright, but also prevents free access to the work after it has been transferred into the public domain (Lessig, 2004b).
(b) Thus far, DRM has a history of frustrating consumers with compatibility problems, unreasonable restrictions on how legally acquired digital media can be consumed (McBride, 2005), and by exposing them to serious security and privacy risks  on more than one occasion.
(c) DRM does not prevent determined hackers from copying protected media, nor prevent that media ending up on peertopeer networks and Usenet (Biddle, et al., 2002). Indeed, all DRM systems implemented thus far have been quickly circumvented/cracked, and any media for which there is sufficient demand appears on peertopeer networks immediately upon its release (if not before), regardless of the DRM used to protect it (N. Anderson, 2006; Halderman and Felten, 2006; Seife, 2000; Wolfe, 2007).
Other technologybased strategies have involved employing third parties to flood popular peertopeer networks with fake files that play antipiracy messages or bombard the user with popup advertising when opened (Brendt and Dahl, 2004; Needham, 2004b; Wingfield, 2002); and even talk of software that, when installed on an enduser’s computer, will find and delete all infringing media (Hollywood Sues, 2004).
Each of the approaches described above is based on the assumption that people are rational actors  who make choices and select actions aimed primarily at maximising utility. Thus, a course of action is taken when its expected benefits exceed its anticipated costs by a greater margin than that estimated for the next most profitable alternative (Herrnstein, 1990; Putwain and Sammons, 2002). As the anticipated costs of an action increase (or its expected benefits decrease), alternative courses of action become more attractive, and thus more likely to be taken.
For example, if the perceived risks associated with downloading an mp3 file increase when tough new criminal copyright laws are introduced, alternatives should become more probable. Such alternatives may include downloading the song from a licensed online vendor, purchasing the CD, or simply going without. A similar shift should occur when the relative benefits of downloading the mp3 decrease, perhaps due to an increase in disposable income, or a greater understanding of digital audio compression tradeoffs.
Within this rational choice paradigm, there has been a considerable focus on deterrence or, more specifically, perceptual deterrence . Perpetual deterrence theory posits an inverse relationship between perceived punishment certainty and severity, and undesired behaviour (Paternoster, 1987). Institutions engaged in social regulation frequently employ deterrencebased strategies when seeking public cooperation/compliance with the rules or laws over which they claim jurisdiction. Tom Tyler and his colleagues (e.g., Huo and Tyler, 2000; Tyler, 1990; 2001b; 2001c; Tyler and Darley, 2000; Tyler and Huo, 2002) cite the pervasiveness of this approach throughout the U.S. criminal justice system (i.e., in policing; in court etc.). It also features heavily in U.S. drug policy (MacCoun, 1993), and the Australian Taxation Office’s (ATO) approach to curbing taxavoidance behaviour (Murphy, 2002a; 2002b). Furthermore, it is regularly witnessed in a variety of educational (e.g., Crown and Spiller, 1998; Galles, et al., 2003) and occupational settings (Tyler and Blader, 2000).
Despite their popularity, deterrencebased strategies of social regulation are — at least over the longer term not terribly effective (Tyler and Huo, 2002). For example, after reviewing the available literature, Paternoster (1987) concluded that the effects of punishment certainty and severity on deviant and criminal behaviour are negligible , at best. He further noted that the deterrence effects observed in crosssectional, bivariate research are largely spurious, and tend to disappear when studied longitudinally, alongside other factors known to influence deviant and criminal behaviour.
Others have found that deterrence does play a small, yet reliable, role in shaping rulebreaking behaviour, but that its effect is primarily attributable to punishment certainty, and not severity (e.g., Paternoster and Iovanni, 1986). For example, in a review of strategies informing U.S. drug policy, MacCoun (1993) concluded that the effects of perceived severity are generally unreliable and, when observed, usually quite small , and that perceived certainty accounts for most of the five percent of the variance in marijuana use typically attributable to deterrence factors.
Finally, Tyler’s research often demonstrates how deterrence provides a poor explanation for why people generally obey the law. For example, when basic demographic factors like age and gender were statistically controlled, perceived certainty accounted for just one percent of the variability in the selfreported lawbreaking behaviour (such as speeding, littering and shoplifting) of his Chicago sample (Tyler, 1990). This research did not consider perceived severity.
In addition to their limited effectiveness, deterrence-based strategies are resource intensive, and can promote longterm ill will, resentment and mistrust towards both the authorities applying them (Tyler and Huo, 2002), and institutional authorities more generally. These consequences were clearly evident in the zerotolerance policing environment of New York City throughout the 1990s (Cunneen, 1999; D. Dixon, 1998; Grabosky, 1999), and can similarly be seen in the content industry’s war against piracy.
In New York, an additional 10,000 police officers were recruited between 1990 and 1999 to help enforce the City’s new zerotolerance policies (Cunneen, 1999). This swelling of around 25 percent came at a substantial financial cost to the City. Search, arrest, trial and incarceration rates, each carrying an additional set of costs, also increased sharply during this time, as the police cracked down on relatively minor offences, dubbed quality of life crimes.
Like zerotolerance policing, or the seemingly endless war on drugs (Humphreys and Rappaport, 1993; U.S. Office of National Drug Control Policy, 2007), launching an intensive, deterrencebased crackdown on piracy is not a cheap endeavour. At a minimum, it requires teams of technology specialists to track the online behaviour of millions of Internet users; hundreds of lawyers to pursue thousands of lawsuits through courts in numerous countries, including the U.S. Supreme Court; and, dozens of political lobbyists, positioned in political centres worldwide, armed with persuasive arguments and deep pockets .
Looking beyond financial costs, aggressively pursuing large groups of basically lawabiding people with threats of punishment also carries many less tangible costs. Like the mistrust and animosity towards the NYPD that increased during zerotolerance (Cunneen, 1999), the content industry has also experienced a considerable public backlash and erosion of goodwill over the last few years.
Numerous activist groups have formed in opposition to industry associations like the RIAA, and have encouraged their memberships to participate in various acts of protest. One visible example is the stickering campaign jointly coordinated by Downhill Battle and RIAA Radar. Participating in this particular campaign involves ordering adhesive labels printed with WARNING! Buying this CD funds lawsuits against children and families or WARNING! This record label pays radio stations to keep independent music off the air from Downhill Battle (or making one’s own), then covertly attaching them to CDs published by RIAA members and retailing in the music departments of major chain stores like Target and Walmart (Downhill Battle, 2003).
The RIAA (along with the MPAA, ARIA, and other industry associations) have also been the subject of a string of critiques that have appeared in online and print publications aimed at a general readership. For example, Australian journalists Steve Cannane (2004) and Peter Martin (2003, 2004), and former industry lawyer Alex Malik (2004, 2005; Needham, 2004a) have all examined the manner in which ARIA reports sales data, arguing that the association deliberately misrepresents the state of the industry through selective reporting and emphasis. Lessig frequently used his monthly column in Wired to discuss aspects of U.S. copyright law which, he argues, is often misused to maintain/increase the profit margins of established interests by stifling innovation and chilling dissent (e.g., Lessig, 2004a, 2004c, 2005b). Furthermore, dozens of articles (e.g., G. Dixon, 2005; Hamilton, 2004; Hellweg, 2004; Jardin, 2004b; Kulash, 2005; Orlowski, 2004), and books (e.g., Fisher, 2004; Lessig, 2001, 2004b; Litman, 2001; Vaidhyanathan, 2001, 2004) have systematically critiqued the content industry’s attitude and approach towards digital copyright and related issues.
On a more proactive note, many writers, musicians, filmmakers and photographers are electing to publish their work under more permissive licences than those preferred by the content industry and governments. Examples of such licences include those developed by the Creative Commons (CC) group (Goetz, 2004; Lessig, 2004b), and the GNU Free Documentation License (Free Software Foundation [FSF], 2000).
The reasons authors cite for using these licenses and/or distributing their work online gratis range from philosophical to deeply pragmatic. For example, Richard Stallman has long advocated the social and scientific benefits derived from transparent sharing and collaboration in the development of software. These values underpin the free software ideology that has driven the development of the GNU/Linux operating systems, as well as many other applications (Stallman, 2002a).
Inspired by Stallman’s work with the FSF, and recognising the need for a layer of reasonable, flexible copyright in the face of increasingly restrictive default rules, , Lawrence Lessig and colleagues founded CC in 2001 (Lessig, 2004b). CC, and the some rights reserved approach to copyright they advocate, is based on the notion that innovation and creativity always build on the past; and when building on the past is too tightly controlled (or prohibited altogether), creativity and innovation suffer. Thus, they promote the importance of maintaining and expanding a rich cultural commons that can be freely drawn on in the creation of new works. In the spirit of CC, Lessig published his 2004 book, Free culture, with a CC AttributionNonCommerical license, and provides links to numerous remixes of it on his freeculture.org Web site.
Of course, not every author is guided solely by such lofty principles when opting for some rather than all rights reserved. Indeed, many have recognised that, in today’s crowded marketplace, getting your work seen/heard by allowing fans to mirror and trade it (and, in some instances, make derivative works based on it) can make good business sense . For example, science fiction writer Cory Doctorow has published a number of books under various CC licenses (e.g., Doctorow, 2003, 2004, 2005a), giving his readers the choice of freely downloading and redistributing the electronic copies available on his Web site, or purchasing hard copies from traditional book vendors. When asked about the motives guiding this decision, he replied, I didnt do this because Im a bighearted slob ... . I did it because I saw an opportunity to make more money.  Doctorow (2005a) elaborates on this point in his third novel, Somebody comes to town, somebody leaves town:
Why do I do this? ... In the short term, I’m generating more sales of my printed books. Sure, giving away ebooks displaces the occasional sale, when a downloader reads the book and decides not to buy it. But its far more common for a reader to download the book, read some or all of it, and decide to buy the print edition ... . Digital and print editions are intensely complimentary, so acquiring one increases your need for the other. Ive given away more than half a million digital copies of my awardwinning first novel, Down and out in the Magic Kingdom, and that sucker has blown through five print editions (yeeHAW!), so Im not worried that giving away books is hurting my sales. 
Similar sentiments have been expressed by Wilco, who believe that giving away many of their recordings as downloadable mp3s has made a substantial contribution to their current level of success (Jardin, 2004b). Like Doctorow, they argue that allowing people to download and share their music increases, rather than displaces sales. In the words of Wilco’s Jeff Tweedy, I dont want potential fans to be blocked because the choice to check out our music becomes a financial decision for them. 
Like the musicians, authors, and activists previously described, ordinary consumers also appear to be thumbing their noses at the content publishing industry. For example, almost twothirds of the active music downloaders in a February 2004 Pew survey reported that they did not care much about whether the music they download is copyrighted (Rainie, et al., 2004b).
Finally, it appears that the general public continue to embrace filesharing at unprecedented (or close to unprecedented) levels. Pew researchers have observed a gradual increase in filesharing since the brief mid2003 dip (Madden and Rainie, 2005; Rainie, et al., 2004a; 2004b). These findings are consistent with data collected by CacheLogic (Parker, 2004), BigChampagne (Toll, 2004; see also EFF, 2007), BayTSP (Ishikawa, 2004) and Karagiannis, et al. (2004) who reported that P2P [peertopeer] traffic volume has not dropped since 2003  at a 2004 IEEE GLOBECOM conference. It appears that, in the words of Biddle and colleagues (2002), the darknetgenie will not be put back into the bottle.  Not easily anyway.
Australian Bureau of Statistics (ABS) data indicate that broadband adoption is increasing steadily, and now accounts for around twothirds of all household Internet subscriptions (ABS, 2007). The amount of data being downloaded is also on the increase. In the three months to March 2007, the average home broadband subscriber downloaded over 7,800 MB (megabytes) of data, compared to just 750 MB per home dialup subscriber. In total, Australian home Internet users downloaded over 31,200 million MB of data during the March 2007 quarter; more than triple their consumption from just two years prior (ABS, 2005, 2006, 2007).
Although the ABS does not look specifically at how this bandwidth is used, it is reasonable to assume that a fair proportion of it (and probably the majority) is peertopeer filesharing, and that the vast majority of this filesharing infringes copyrights. At least three factors support this assumption. First, CacheLogic’s widely cited research indicates that at least 50 percent of global Internet traffic is generated by peertopeer applications. This figure could be as high as 80 percent in some regions of the world (Parker, 2004). Second, one of the key motivations for adopting broadband is the ability to download large files (e.g., music files) from peertopeer networks (Hellweg, 2003; Mulligan, et al., 2003). Third, although filesharing technologies are both capable of substantial noninfringing uses , and used in noninfringing ways (e.g., for large Linux distributions, public domain materials, media released under various CC licenses, etc.), they are primarily used in ways that do infringe copyrights. In MGM v. Grokster the plaintiffs alleged that over 70 percent of the files exchanged through peertopeer networks infringe on their copyrights, and another 20 percent infringe on copyrights held by others. Circuit Judge Thomas did not dispute this claim .
In addition to the costs and consequences outlined above, deterrencebased approaches do not foster selfregulation. That is, any behavioural changes that do result from a crackdown are unlikely to last once media attention dies down, and authorities begin shifting their limited resources to other priority areas. This is illustrated in Ross and LaFree’s (1986) review of several largescale deterrencebased legal interventions targeting drunk driving behaviour. These interventions have typically focussed on increasing the objective — and thus perceived certainty of punishment by increasing road patrols, introducing random breath testing programs, and implementing Scandinaviantype laws based on the measurement of blood alcohol concentration levels. Despite their significant shortterm impacts, these interventions rarely have any lasting effects on overall levels of drunk driving.
It seems reasonable to propose that any effects the content industry’s deterrencebased efforts may have on the general publics behaviour will be similarly shortlived. Indeed, data from several Pew tracking surveys indicate that both music downloading and general filesharing behaviour did decrease after the RIAA announced, and then began filing lawsuits against individuals accused of infringing copyrights held by its members. However, it was only a matter of months before the prevalence of these behaviours began to rise again (Madden and Rainie, 2005; Rainie, et al., 2004b). This reversal can be attributed to at least two factors: (1) decreasing media attention with each new round of lawsuits (EFF, 2005); and, (2) the increasing realisation amongst Internet users that their chances of being caught and punished for downloading or uploading copyrighted files are very slim.
Internet users’ low estimates of their chances of being caught and punished for copyright infringing behaviours are most likely based on a number of related sources. First, the content industry has publicised each round of lawsuits filed against alleged copyright infringers. Such attempts to manipulate/increase perceived certainty estimates are a doubleedged sword, as they also allow people to easily calculate the actual probability of sanctions. For example, in an October 2007 interview the RIAAs director of communications reported that the association had filed over 26,000 lawsuits against U.S. filesharers since September 2003 (Stodghill, 2007). Although this figure may initially seem high, it soon pales in comparison to the 15 million U.S. households estimated to have used peertopeer technologies to download music files during 2006 (NPD Group, 2007). Indeed, after a few quick calculations, one can conclude that the chances of getting sued for such behaviour are less than 1/5th of one percent (i.e., extremely unlikely). Such a low probability is well below the reasonably high ... . threshold level of risk at which researchers typically begin observing the threat of sanctions having some influence on behaviour .
Second, the RIAA and MPAA have indicated that they will only pursue substantial or egregious filetraders, and people/groups facilitating widespread copyright infringement (Graham, 2003b; Hiestand, 2004; Hollywood Bid, 2004; Jardin, 2004a; Lyman, 2004; MPAA, 2004; RIAA, 2003; RIAA: We’ll Spare, 2003). ARIA have gone even further, indicating (and thus far demonstrating in legal actions) that they will focus their attention on individuals and groups facilitating or deriving some commercial gain from infringement, rather than individual filetraders (N. Miller, 2003; Montgomery, 2005; Needham, 2003; 2004b). Meanwhile, the BPI have indicated that they will only pursue and prosecute individuals engaged in certain types of copyright infringement, but not others (UK Music Fans, 2006). Such statements can provide casual users with an even greater sense of invulnerability; of feeling confident that, if they keep their behaviour in check, they will be able to exist under the radar indefinitely.
Moderating behaviour to avoid unwanted attention is one way the experienced Internet users in West and Burkell’s (2004) research maintained a sense of anonymity online. For these users, this subjective experience of anonymity existed alongside knowledge that true anonymity (i.e., being untraceable) in an online environment is rare, if not completely impossible. This suggests that people make anonymity estimates on a sliding scale, and that one can feel anonymous even when ones reallife identity can be unearthed with relative ease. As perceived anonymity encourages disinhibited behaviour both off and online (Joinson, 2003), it can be hypothesised that participants in West and Burkells research — and, indeed, Internet users generally would be most likely to engage in certain risky behaviours (such as self-disclosure, information or goods seeking) when feeling most anonymous. Indeed, this does appear to be the case, with a number of researchers indicating a direct relationship between perceived anonymity and a range of disinhibited online behaviours (see Joinson, 1998, 2003). Likewise, it can be suggested that file-sharers will feel most disinhibited when they feel most anonymous, and that they can (and do) enhance and maintain their sense of online anonymity by limiting and modifying their filetrading behaviours in response to the latest news about content industry targets.
The point being articulated is that rational choice theories can provide, at best, an extremely limited account of the online copyright infringing behaviour being observed. This point is perhaps most obvious in the Pew survey data on formerdownloaders. For example, in their March 2005 memo, Madden and Rainie reported that 11 percent of all Internet users identify themselves as formerdownloaders . When asked about why they stopped acquiring files online, around 28 percent indicated it was due to a fear of getting into trouble, or because they had heard about the RIAA lawsuits. In other words, by the beginning of 2005, about three percent of American Internet users had given up downloading and attributed that decision to rational choice/deterrence factors. This is hardly a glowing testament to the efficacy of deterrencebased approaches to largescale behaviour modification!
Knowing that deterrencebased strategies of social regulation are resource intensive, tend to carry a range of lesstangible costs, and are not particularly effective, researchers have looked elsewhere in an effort to understand why people do and do not comply with the rules and directives of authorities. One such line of research has taken a processbased, rather than outcomebased, approach to social regulation; an approach focused on factors that encourage voluntary deference, cooperation and compliance, rather than attempting to induce compliance with threats of punishment.
Tyler and his colleagues (e.g., Tyler, 1990; Tyler and Huo, 2002) have examined how process factors influence people’s reactions to both voluntary and involuntary contact with legal authorities in the United States. Although most of this research has specifically focussed on the publics interpersonal experiences with the police and courts system, he does stress that its findings also address the broader issues involved in shaping peoples behavior in their interactions with all regulatory authorities, because each instance of regulation involves a key question: How can people be motivated to follow the laws and rules that define appropriate conduct? [emphasis added] 
The processbased approach advanced by Tyler comprises three key elements: procedural justice, motivebased trust, and legitimacy. That is, people are more likely to accept a decision or comply with a directive (even one that will result in an unfavourable or unfair outcome) when they feel that the processes involved in arriving at that decision are fair, the decisionmaker’s motives are benevolent and trustworthy, and the decisionmaker is entitled to make such decisions and ought to be obeyed (Tyler and Huo, 2002).
Early laboratorybased research by Thibaut and Walker (1975) found that satisfaction with thirdparty decisions made during disputeresolution was enhanced by the use of decisionmaking procedures perceived to be fair. Furthermore, this enhanced satisfaction was achieved without any increase in the real outcomes available for distribution.  That is, the procedural justice effects observed in Thibaut and Walker’s research were independent of any distributive justice effects (which are also real; people are typically more satisfied with favourable outcomes). These findings have since been widely replicated and extended, and have been used to predict behaviour in both laboratory and fieldbased studies (Lind and Tyler, 1988).
For example, when Tyler interviewed people living in Oakland and Los Angeles about their most recent personal experience with the police or courts, he found that procedural justice evaluations  were considerably stronger predictors of voluntary decision acceptance and satisfaction with the decision maker(s) than outcome fairness and favourability (Tyler and Huo, 2002). These procedural justice effects were comparable across the four types of experiences sampled (i.e., voluntary or involuntary contact with either the police or courts), and were particularly salient when contact with the authorities was involuntary. Furthermore, process considerations dominated participants’ reactions regardless of whether they were White, Black or Hispanic (Huo and Tyler, 2000).
Also looking at the U.S. justice system, Lind, et al. (1993) found that individual and corporate litigants’ decisions about whether to accept or reject an award arrived at through courtordered arbitration were better predicted by perceived procedural fairness than subjective outcome evaluations and actual/objective outcomes combined. Litigants seeing the arbitration procedure as fair were considerably less likely to exercise their right to reject the award in favour of a full trial.
In the large Milwaukee Domestic Violence Experiment (Paternoster, et al., 1997), spouse abuse suspects arrested in a manner they perceived as procedurally fair (i.e., the police took the time to listen to their side of the story and acted impartially) were no more likely to reoffend than those let off with a warning, and considerably less likely to reoffend than those who saw their treatment as procedurally unfair. That is, the positive procedural justice effects were reflected in the respondents’ behaviour over an extended period of time (Tyler, 2000).
In an industrial/organisational context, Kim and Mauborgne’s (1993) research indicated that subsidiary top managers in multinational corporations were more likely to comply with the strategic decisions of head office when they felt those decisions were made in ways they considered procedurally fair. Procedural fairness further influenced compliance indirectly, through its influence on organisational commitment, trust in head office management, and outcome satisfaction. These effects were generally stronger for subsidiaries operating in industries classified as global. 
Finally, Tyler and Degoey (1995) found that during the 1991 water shortage in California, which they described as a naturally occurring social dilemma, procedural justice played a key role in residents’ reported willingness to voluntarily restrict their water use if asked to do so by the Public Utilities Commission. Furthermore, perceived fairness predicted participants willingness to empower the Commission with the ongoing authority to manage the water shortage in a range of noncoercive ways. These effects were largest amongst residents reporting a strong sense of pride in their community, and did not diminish as estimates of the current and future severity of the shortage increased.
As highlighted by attribution theory, we are motivated to understand why people act as they do (Kelley and Michela, 1980; Michener, et al., 2004). We use this understanding to inform our own behaviour, as well as to predict the future behaviour of others. However, we cannot directly observe the motivations guiding the actions of others, so must infer them based on what we can observe — behaviour. As Tyler and Huo (2002) note, one central motive attribution that people seek to make is whether the person they are dealing with is ‘trustworthy’ , a characteristic they refer to as motivebased trust.
Motivebased trust is distinct from, and more complex than, instrumental trust. Instead of focussing on the predictability of behaviour, it involves inferences about the intentions and motives behind an action, and thus — by extension about the character or nature of the actor. Knowing someone’s character informs us about how they will probably act towards us in the future (Tyler, 1998; Tyler and Huo, 2002). That is, will their actions be benevolent or malevolent? Do they have our best interests at heart? Will they try to do what is right? Motivebased trust develops over time and repeated encounters. Furthermore, as it is concerned with whether someone is acting with good intentions, it is not undermined if a mistake or poor decision is made (Tyler and Huo, 2002).
In Tyler and Huo’s (2002) large Californian sample, the influence that evaluations of the trustworthiness of the motives of the decision makers (police officers and judges) had on voluntary acceptance and satisfaction was substantial. Indeed, when motivebased trust was entered into a series of hierarchical multiple regression models before the instrumental factors, the contribution of the latter to both acceptance and satisfaction was trivial. Furthermore, this basic pattern of results was observed regardless of whether the participants experiences were voluntary or involuntary, and regardless of whether they were with the police or courts. Finally, Tyler and Huo found that motivebased trust interacted with each of the instrumental factors surveyed. More specifically, its influence on reactions (acceptance and satisfaction) was most prominent when outcomes became more negative, less predictable, and less expected.
In Tyler and Huo’s (2002) research, and especially in Tyler and Degoeys (1996) studies in family and workplace contexts (also reported in Tyler, 1998), motivebased trust was used to successfully predict reactions to the decisions and directives of authorities with whom the participants had (daily, in the case of Tyler and Degoey) facetoface contact. Research has shown that motivebased trust also predicts reactions towards decisions made by more distant authorities, with which most people will never have any direct contact. For example, Tyler and Mitchell (1994) interviewed a random sample of U.S. citizens living in the San Francisco Bay area about the Supreme Court and abortion rights. The interviews were conducted after the controversial appointment of Supreme Court Justice Clarence Thomas in late 1991 (for e.g., see Cohn, 1992), but before the court published its 1992 Planned Parenthood of Southern Pennsylvania v. Casey decision . Tyler and Mitchell found that trust in the motives of the Supreme Court justices was a key predictor of whether or not respondents were willing to empower the court to make decisions about the scope and nature of abortion rights and, as they argue, empowerment is of central concern because it represents the willingness [of citizens] to defer to legal authorities.  Further research by Tyler and Degoey indicated that trustworthiness was also a significant predictor of whether or not participants felt obligated to abide by the decisions made by the Supreme Court.
Similarly, when Murphy (2002a) looked at reasons underlying taxpayers’ widespread noncompliance with the ATOs demands that they immediately pay back  the tax they had previously avoided by investing in massmarketed taxeffective schemes, she found that trust in the ATO  was a stronger predictor of resistance towards the ATO than outcome favourability and a range of demographic variables. Furthermore, the best predictors of trust were procedural (e.g., whether or not the ATO is neutral, fair, respects citizens rights, treats citizens as trustworthy and consults widely).
As noted previously, social regulation through coercion is inefficient and not terribly effective, particularly over the longer term. Consequently, social theorists have looked towards factors that foster widespread voluntary compliance. One such factor is perceived legitimacy (Tyler, 2006).
A legitimate authority is one that ought to be supported and obeyed; one that is entitled to have its decisions accepted and its rules followed. As such, the ability to develop and maintain legitimacy is a key feature of effective authorities.  Research indicates that legitimacy is a consequence of procedural justice (Tyler, 1990). That is, authorities and institutions are viewed as more legitimate and, therefore, their decisions and rules are more willingly accepted when they exercise their authority through procedures that people experience as being fair. 
Research indicates that legitimacy promotes everyday compliance with the law (Tyler, 1990). In other words, individuals who believe they ought to follow the directives of legal authorities (e.g., the police and courts) are more likely to do so. Furthermore, because this compliance is voluntary, it is selfregulated. That is, it is maintained even when the chances of punishment for noncompliance are virtually nonexistent (Tyler, 2001a).
Beyond its impact on general lawabidingness, the influence of legitimacy has been observed in a range of circumstances, where it has predicted compliance with, and support for individuals and institutions in both public and private spheres. For example, Sunshine and Tyler (2003) found that higher perceptions of police legitimacy were significantly related to (a) a willingness to cooperate with, and assist the police; and, (b) a willingness to empower the police with the authority to, for example, do whatever they think is needed to fight crime. 
Legitimacy also plays an important role in organisational settings, as demonstrated by Tyler and Blader (2005), who observed that employees who saw their supervisors and employer as legitimate authorities reported higher levels of compliance with, and greater deference to the rules and policies of their workplace. Similar effects were observed when supervisor ratings (rather than selfreports) of employee compliance and deference were used as outcome variables. In each case, legitimacy was a stronger predictor of employee rule-following than instrumental factors such as the likelihood and extrinsic consequences of detection (Tyler and Blader, 2005).
Finally, in addition to individuals and specific institutions, legitimacy can also be used to understand public support for certain values and behaviours through to entire industries and systems of social and political organisation (Kelman, 2001; D.N. Smith, 1998; Zimmerman and Zeitz, 2002). For example, Kelman describes the rapid delegitimisation of smoking during the last few decades, as scientific and medical evidence about the health risks associated with tobacco use has accumulated. Concurrently, the tobacco industry saw its legitimacy decline sharply, as details of deceptive, manipulative and harmful business practices became public knowledge (Metzler, 2001).
Fairness, trust, legitimacy, and copyright
Just as these processbased factors have been used to understand people’s interactions with a range of regulatory authorities, they may also prove useful when examining the publics widespread disregard for copyright rules and those seeking their enforcement. Indeed, a body of evidence is accumulating in support of the contention that the copyright industry (which includes content publishers as well as agencies lobbying on their behalf) is behaving in a manner that is not procedurally just, and is not guided by benevolent or trustworthy motives. Furthermore, the industrys legitimacy has been substantially undermined by this behaviour, along with the agendas it seeks to promote. I will use three specific examples to illustrate.
First, the SonyBMG CD DRM episode. On 31 October 2005, Mark Russinovich published a blog post that eventually led to the recall of over four million compact discs, and a series of class actions against SonyBMG in courts across the U.S. and elsewhere (Graham, 2005; Hesseldahl, 2005). In the post, Russinovich (2005b) described how he uncovered a rootkit on one of his computers while performing some routine software testing. As he explained:
Rootkits are cloaking technologies that hide files, Registry keys, and other system objects from diagnostic and security software, and they are usually employed by malware attempting to keep their implementation hidden ... . Given the fact that I’m careful in my surfing habits and only install software from reputable sources I had no idea how Id picked up a real rootkit ... . 
Russinovich (2005b) did some investigating, and eventually determined that the rootkit was a part of the DRM software used to protect the content of an audio CD he had recently purchased, and played on the PC. Further investigations by Russinovich revealed that the end user license agreement (EULA) bundled with the CD did not refer to the installation of any software; that the rootkit could not be easily uninstalled; that simply deleting the cloaked files (an obvious step to take in the absence of an uninstaller) would cripple [the] computer ; and that the software phoned home each time the CD was played (Russinovich, 2005a).
As stories about Russinovich’s findings spread across the blogosphere (e.g., Doctorow, 2005b) and into the mainstream press (e.g., Ward, 2005), Sony found itself at the centre of a public relations disaster. The company responded by attempting to downplay the significance of the story  and by releasing an uninstaller that (a) decloaked, but did not actually uninstall the DRM software; and, (b) installed a number of additional files, which opened a range of new serious security holes  on users systems. Furthermore, actually accessing the uninstaller involved navigating through a bewildering array of hoops and privacy concerns.
Eventually, Sony acquiesced to public pressure and announced the recall of several million disks (Sony Recalls, 2005), but not before numerous antivirus software vendors classified the DRM software as malware and developed tools for its removal; several class actions were announced; and, ironically, it was revealed that the DRM software itself possibly violated the terms of the Lesser GPL (DVD Jon’s Code, 2005). After watching these events unfold, influential blogger Cory Doctorow (2005b) remarked that Sonys actions show[ed] jawdropping contempt for their customers, for copyright law, for fair trading and for the public interest. 
Second, the Sonny Bono Copyright Term Extension Act (CTEA). In 1998 — for the eleventh time in 40 years the U.S. Congress extended the terms of copyright for existing works. As a consequence of this decision, works created between 1923 and 1942 will now not pass into the public domain in the United States until at least 2019. It is estimated that less than two percent of these works have any continuing commercial value (Lessig, 2004b).
The 1998 CTEA has been widely criticised on a number of grounds, and is often referred to as the Mickey Mouse Protection Act , due to its apparent purpose and the manner in which it became law. As Lessig (2004b) explains:
Ten of the thirteen original sponsors of the Act in the House received the maximum contribution from Disney’s political action committee ... . The RIAA and the MPAA are estimated to have spent over $1.5 million lobbying in the 1998 election cycle. They paid out more than $200,000 in campaign donations. Disney is estimated to have contributed more than $800,000 to reelection campaigns in the 1998 cycle. 
In other words, when you’re member of Congress, extending copyright terms pays.  Lessig (2004b) goes on to argue that:
There [is] no plausible claim that extending the terms of existing copyrights [does] anything to increase incentives to create. Such extensions [are] nothing more than ‘rentseeking’. 
Of course, such rentseeking not only prevents Mickey and the rest of the two percent from becoming public domain (which, many would argue, was part of the bargain under which Walt Disney originally created and published the cartoon), but also the remaining 98 percent of works published around the same time. Works which are not famous, not commercially exploited, and generally not available for public consumption. Works which now cannot be reused, remixed or built upon until — at least 2019. This, argues Lessig , is nothing less than piracy of the public domain.
Third, the RIAA lawsuits. By mid2007 the RIAA had filed more than 20,000 lawsuits against alleged copyright infringing filesharers, and was still filing at a rate of several hundred per month (EFF, 2007). The indiscriminate manner in which these cases have been filed has raised many eyebrows.
For example, caught up in the very first round of lawsuits was Brianna Lahara, a 12yearold honour student living with her single mother in NYC public housing, who was forced to settle the case with a public apology and US$2,000 cash  (Dean, 2003; NotSoJolly Rogers, 2003); and a retired school teacher and Macintosh user from Massachusetts, whom the RIAA accused of downloading hardcore rap music with the Windowsonly application, Kazaa (Schwartz, 2003). In response to these cases, an RIAA spokesperson reportedly said, when you fish with a net, you sometimes are going to catch a few dolphin. 
These episodes — when considered alongside tales of off and online pricefixing (e.g., Federal Trade Commission, 2000; E. Smith, 2006), payola (Leeds and Story, 2005), the worksforhire amendment (Boehlert, 2000), forced settlements for whatever the accused happens to have in his or her bank account (Graham, 2003a; Harmon, 2003), spoofing (Wingfield, 2002), attempts at suing the dead (Dead Woman, 2005), contradictory claims about what is, and is not fair use (von Lohmann, 2006), senators suggesting that the computers of filesharers be remotely destroyed (Kahney, 2003), political candidates developing policy around the requirements of entertainment industry donors (Doctorow, 2006b; Geist, 2006a; 2006b; 2006c), recording industry associations signing petitions supporting retrospective copyright term extensions on behalf of deceased musicians (Lessig, 2006) whilst simultaneously lobbying to lower the royalty rates paid to the estates of these (and living) musicians (Block, 2006), and so on paint a picture of a selfserving industry that (a) does not treat its artists, customers, or the public at large with much respect (or fairness); and, (b) does not appear to have their best interests at heart. Until these issues are addressed, and at least some of industry’s former legitimacy is restored, the infringement will continue, largely unabated.
This paper illustrates how an understanding of the psychology of deterrence, fairness, trust and legitimacy can be used to begin to make sense of the copyright infringing behaviours that, as a consequence of Web 2.0, are becoming increasingly mainstream to an ever increasing proportion of our community. It argues that compliance with copyright regulations is more effectively achieved through efforts focussed on encouraging voluntary deference and cooperation, than by attempting to induce it with threats of punishment that, as a growing body of case and research examples demonstrates, simply does not work.
About the author
Peter Allen is a PhD candidate and Associate Lecturer in the School of Psychology at Curtin University of Technology, Perth, Western Australia. His PhD research aims to develop a grounded theory of the psychology of noncommercial online copyright infringing behaviour. He is a long way from achieving this aim.
Email: p [dot] allen [at] curtin [dot] edu [dot] au
Examples of Web 2.0esque technologies, services and activities Name and URL Description Flickr!:
A photosharing service. Users publish photographs to their Flickr! stream and annotate them with notes and tags, and can invite others to do likewise. Del.icio.us:
The first of several social bookmarking services (Norton, 2006). Users maintain a collection of bookmarks pointing to places of interest on the Web. Tagging enables categorisation and organisation. Digg:
One of several popular, userdriven news/link aggregation Web sites. Wikipedia:
A reference site to which anyone can contribute. Contributions may be in the form of adding content, editing content, or engaging in discussions about quality of information in Wikipedia. YouTube:
A video sharing service. Users upload video clips, tag them, and invite others to offer comments and feedback. MySpace:
Popular social networking service. Users establish a MySpace profile, which they can customise or pimp (Reiss, 2006) in numerous ways. The typical user will incorporate photographs, music, video clips, and a blog into their profile, and will provide a forum where viewers can leave comments. Blogging Blogs (or weblogs) can be distinguished from static Web sites in several ways. They are typically updated with much greater frequency; take the form of set of posts presented in reverse chronological order; and, are maintained with content management systems that enable rapid updating without an intimate knowledge of HTML (hypertext markup language). Other common blog features include tools that enable readers to comments on individual posts; the use of stable URLs (uniform resource locators, referred to as permalinks), which allow for ease of citation; trackback facilities that show where and when these citations are occurring; and, RSS feeds that visitors can subscribe to (Drezner and Farrell, 2006; Lenhart and Fox, 2006; O’Reilly, 2005). Podcasting An audio or video file made available via RSS. Like a blog feed, Internet users can also subscribe to podcast feeds with a range of applications (Rainie and Madden, 2005). Peertopeer filesharing A peer-topeer protocol harnesses the collective bandwidth of its user base to distribute files quickly and cheaply. In a peertopeer network, everyone is both a client and a server (Izal, et al., 2004; O’Reilly, 2005; Thompson, 2005). Mashups Creating a mashup (or remix) involves combining previously published audio and visual media into a new derivative work.
1. Lasica, 2005, p. 12.
2. Lasica, 2005, p. 13.
3. See also, the demystification of the process of authorship and creativity; Rojas, 2002, § 5.
4. Lasica, 2005, p. 2.
5. At the time this statistic was reported, 87 percent of the U.S. teenage population was defined as online (Lenhart and Madden, 2005). This figure has since increased to 93 percent (Lenhart and Madden, 2007).
6. Madden, 2007, p. 3.
7. Gillmor, 2006, § 1.
8. The Second Life, 2006, § 14.
9. Lasica, 2005, p. 14.
10. The term content publishing industry is used to refer to the major commercial interests in international publishing, as represented by trade associations like the Motion Picture Association (MPA) and the Motion Picture Association of America (MPAA), the Recording Industry Association of America (RIAA), the British Phonographic Industry (BPI), the Australian Record Industry Association (ARIA), the Business Software Alliance (BSA), the International Publishers Association (IPA), and the Association of American Publishers (AAP).
11. E.g., up to several billion dollars annually, according to the brief filed by motion picture studio and recording company petitioners for MGM v Grokster, before the U.S. Supreme Court, No. 04480, 2005, p. 13.
13. EMI hold the copyrights to the White Album.
14. For example, in testimony before the Duluth Division of the U.S. District Court in Capitol Records, et al. v. Jammie Thomas (Case No.: 06cv1497MJD/RLE) Jennifer Pariser, Senior Council for Sony BMG, repeatedly described the act of making a single reproduction of a legally purchased audio track as stealing (Bangeman, 2007).
15. Litman, 2000, pp. 78.
16. von Lohmann, 2004b, p. 5.
17. Halderman and Felten, 2006, p. 1.
18. Rationality is the subject of considerable debate. Even if people do in fact choose behaviours that maximise their selfinterest, they make such choices in a context of imperfect information, and with often limited time at their disposal (Putwain and Sammons, 2002).
19. The term perceptual deterrence emphasises how perceived risks and rewards are much better predictors of behaviour than actual/objective risks and rewards (Grasmick and Green, 1980; Paternoster, 1987).
20. Paternoster, 1987, p. 186.
21. MacCoun, 1993, p. 501.
22. For example, data collated by the Center for Responsive Politics indicates that candidates in U.S. federal elections have received campaign donations of over US$200 million from the entertainment industry since 1990.
23. Creative Commons, § 3.
24. But, see McDonald (2006), who argues that as they stand, the [CC] licenses are generally likely to undermine, rather than enhance a creator’s ability to operate professionally (p. 223).
25. Raskin, 2004, § 12.
26. Doctorow, 2005a, p. 1.
27. Jardin, 2004b, § 29.
28. Karagiannis, et al., 2004, p. 1.
29. Biddle, et al., 2002, p. 1.
30. To quote Circuit Judge Thomas’ written opinion for MGM v. Grokster in the U.S. Court of Appeals for the Ninth Circuit, 2004, 19 August, p. 11737.
31. Neither did U.S. Supreme Court Justice Souter who, in that Court’s opinion on MGM v. Grokster (No. 04480, 2005, 29 June, p. 5), wrote that the vast majority of users downloads [on the FastTrack and Gnutella peertopeer networks] are acts of infringement, and that the probable scope of [this] copyright infringement is staggering.
32. Tyler, 1997, p. 222.
33. The Pew surveys do not distinguish between infringing and noninfringing downloading behaviour.
34. Tyler and Huo, 2002, p. 8.
35. Lind and Tyler, 1988, p. 29.
36. Specifically, perceived quality and fairness of treatment, and perceived quality and fairness of decisionmaking.
37. See Kim and Mauborgne, 1993, pp. 504506.
38. Tyler and Huo, 2002, p. 59.
39. The decision essentially reaffirmed Roe v. Wade, the 1973 U.S. Supreme Court ruling which provides constitutional protection for limited abortion rights (Tyler and Mitchell, 1994, p. 705).
40. Tyler and Mitchell, 1994, p. 787.
41. Murphy, 2002a, p. 3.
42. Indexed by items such as the Tax Office has acted in the interests of all Australians and the Tax Office is open and honest in its dealings with citizens (Murphy, 2002a).
43. Tyler, 2001a, p. 419.
44. Tyler, 2006, p. 379.
45. Sunshine and Tyler, 2003, p. 542.
46. Russinovich, 2005b, § 12.
47. Russinovich, 2005b, § 21.
48. In an interview soon after the news broke, Sony’s Global Digital Business President Thomas Hesse remarked that most people, I think, dont even know what a rootkit is, so why should they care about it? (Mook, 2005, § 1).
49. Halderman and Felten, 2006, p. 2.
50. Doctorow, 2005b, § 1.
51. Much like the previous 10 copyright extensions granted by the U.S. Congress, the 1998 CTEA saved Mickey Mouse from the public domain. Ironically, Steamboat Willie — the first Mickey Mouse cartoon borrowed heavily from Buster Keaton’s Steamboat Bill, and could probably not have been made if todays copyright laws had existed in the 1920s (Lessig, 2002).
52. Lessig, 2004b, p. 218.
53. Lessig, 2004b, p. 216.
54. Lessig, 2004b, p. 232.
55. Lessig, 2004b, p. 220.
56. This case, and many like it, seems particularly galling in light of recent admissions by Edgar Bronfman (CEO of the Warner Music Group, one of the plaintiffs in the lawsuit against Lahara) that his own children received nothing more than a lecture from their father for engaging in essentially identical behaviour (MacMillan, 2006).
57. Roddy, 2003, § 13.
B. Alexander, 2006. Web 2.0: A new wave of innovation for teaching and Learning? EDUCAUSE Review, volume 41, number 2, pp. 3244, and at http://www.educause.edu/ir/library/pdf/erm0621.pdf, accessed 2 August 2006.
C. Anderson, 2005. A 4th long tail business category: Tools, Long Tail (28 July), at http://www.thelongtail.com/the_long_tail/2005/07/a_4th_long_tail.html, accessed 29 July 2005.
N. Anderson, 2006. Hacking digital rights management, ARS Technica (18 July), at http://arstechnica.com/articles/culture/drmhacks.ars, accessed 19 July 2006.
An Atlas of the Free & the Unfree, 2004. Wired, volume 12, number 6 (June), pp. 146155, and at http://www.wired.com/wired/archive/12.06/free.html, accessed 20 August 2008.
Australian Bureau of Statistics, 2007. Internet activity, Australia, March 2007. ABS publication, number 8153.0, at AusStats database, accessed 5 September 2007.
Australian Bureau of Statistics, 2006. June 2006 Internet activity, Australia. ABS publication, number 8153.0, at AusStats database, accessed 7 February 2007.
Australian Bureau of Statistics, 2005. March 2005 Internet activity, Australia. ABS publication, number 8153.0, at AusStats database, accessed 27 August 2006.
A. Baio, 2006. Litigation Cosby threatens Waxy, you see! WAXY.org (3 March), at http://www.waxy.org/archive/2006/03/03/litigati.shtml, accessed 12 March 2006.
E. Bangeman, 2007. Sony BMG’s chief antipiracy lawyer: ‘Copying music you own is stealing, ARS Technica (2 October), at http://arstechnica.com/news.ars/post/20071002-sony-bmgs-chief-anti-piracy-lawyer-copying-music-you-own-is-stealing.html, accessed 3 October 2007.
P. Biddle, P. England, M. Peinado, and B. Willman, 2002. The Darknet and the future of content distribution, Digital Rights Management: Proceedings of the 2002 ACM Workshop on Digital Rights Management (18 November, Washington, D.C.). In: Lecture Notes in Computer Science, volume 2696, pp. 155176, and at http://crypto.stanford.edu/DRM2002/darknet5.doc, accessed 27 April 2004.
G. Block, 2006. RIAA petitions judges to lower artist royalties, IGN (7 December), at http://au.gear.ign.com/articles/749/749883p1.html, accessed 12 December 2006.
E. Boehlert, 2000. Four little words, Salon.com (28 August), at http://archive.salon.com/ent/music/feature/2000/08/28/work_for_hire/index.html, accessed 1 September 2006.
J. Borland, 2004. RIAA targets students in new fileswapping suits, CNet News (29 October), at http://www.zdnetasia.com/news/business/0,39044229,39199262,00.htm, accessed 13 December 2007.
A. Brendt and E. Dahl, 2004. Risk your PC’s health for a song? PC World (29 December), at http://www.pcworld.com/article/id,119016-page,1/article.html, accessed 7 January 2005.
S. Cannane, 2004. Music industry way off track with song and dance about falling sales, Sydney Morning Herald (29 March), at http://www.smh.com.au/articles/2004/03/28/1080412234274.html, accessed 5 April 2004.
N. Carr, 2005. The amorality of Web 2.0, Rough Type (3 October), at http://www.roughtype.com/archives/2005/10/the_amorality_o.php, accessed 5 October 2005.
Center for Responsive Politics. TV/movies/music: Longterm contribution trends, at http://www.opensecrets.org/industries/indus.asp?Ind=B02, accessed 3 October 2007.
B. Cohn, 1992. Dirt trail, New Republic, volume 206, numbers 1/2, pp. 1618.
comScore Media Metrix, 2005. Behaviors of the blogosphere: Understanding the scale, composition and activities of Weblog audiences. Reston, Va.: comScore Networks, and at http://www.comscore.com/blogreport/comScoreBlogReport.pdf, accessed 13 December 2007.
Creative Commons. ‘Some Rights Reserved’: Building a layer of reasonable copyright," at http://creativecommons.org/about/history/, accessed 7 August 2005.
A.F. Crown and M.S. Spiller, 1998. Learning from the literature on collegiate cheating: A review of empirical research, Journal of Business Ethics, volume 17, pp. 683700.
D. Cullen, 2004. Finnish police raid BitTorrent site, Arrest 34, Register (13 December), at http://www.theregister.co.uk/2004/12/14/finnish_police_raid_bittorrent_site/, accessed 15 December 2004.
C. Cunneen, 1999. Zero tolerance policing and the experiences of New York City, Current Issues in Criminal Justice, volume 10, pp. 299313.
B. Davies, 2004. The United States/Australian Free Trade Agreement and its implications for copyright and communications, Dissent (Summer), pp. 3438.
Dead woman, who didn’t have computer, sued for music trading, 2005. WFTV.com (4 February), at http://www.wftv.com/irresistible/4164623/detail.html, accessed 4 February 2005, and at http://web.archive.org/web/20050205232655/http://www.wftv.com/irresistible/4164623/detail.html, accessed 13 December 2007.
K. Dean, 2004. Copyright crusaders hit schools, Wired News (13 August), at http://www.wired.com/entertainment/music/news/2004/08/64543, accessed 13 December 2007.
K. Dean, 2003. Schoolgirl settles with RIAA, Wired News (10 September), at http://www.wired.com/entertainment/music/news/2003/09/60366, accessed 13 December 2007.
S. Deare, 2005. Judge: MP3 site, ISP breached copyright, ZDNet Australia (14 July), at http://www.zdnet.com.au/news/communications/0,2000061791,39202379,00.htm, accessed 14 July 2005.
D. Dixon, 1998. Broken windows, zero tolerance, and the New York miracle, Current Issues in Criminal Justice, volume 10, pp. 96106.
G. Dixon, 2005. How copyright could be killing culture, Globe and Mail (17 January), at http://www.theglobeandmail.com/servlet/ArticleNews/TPStory/LAC/20050117/DOCS17/TPEntertainment/Film, accessed 18 January 2005.
C. Doctorow, 2006a. Toronto Transit Commission censors humorous subway map remix, BoingBoing.net (25 February), at http://www.boingboing.net/2006/02/25/toronto_transit_comm.html, accessed 26 February 2006.
C. Doctorow, 2006b. Trademark political shenanigans, Toronto Star (15 January), at http://www.thestar.com/, accessed 1 September 2006, and at http://web.archive.org/web/20060425080039/http://www.thestar.com/NASApp/cs/ContentServer?pagename=thestar/Layout/Article_Type1&call_pageid=971358637177&c=Article&cid=1137279034770, accessed 13 December 2007.
C. Doctorow, 2006c. Transport for London censors anagram tube map, BoingBoing.net (22 February), at http://www.boingboing.net/2006/02/22/transport_for_london.html, accessed 23 February 2006.
C. Doctorow, 2005a. Someone comes to town, someone leaves town. New York: Tor Books, and at http://craphound.com/someone/download.php, accessed 5 August 2005.
C. Doctorow, 2005b. Sony anticustomer technology roundup and timeline, BoingBoing.net (14 November), at http://www.boingboing.net/2005/11/14/sony_anticustomer_te.html, accessed 30 August 2006.
C. Doctorow, 2004. Eastern standard tribe. New York: Tor Books, and at http://craphound.com/est/download.php, accessed 5 August 2005.
C. Doctorow, 2003. Down and out in the magic kingdom. New York: Tor Books, and at http://craphound.com/down/download.php, accessed 5 August 2005.
Downhill Battle, 2003. RIAA Information Awareness Activism (RIAA), at http://www.downhillbattle.org/riaa/index.html, accessed 3 October 2007.
D.W. Drezner and H. Farrell, 2006. Web of influence, Foreign Policy (November/December), at http://www.foreignpolicy.com/story/cms.php?story_id=2707, accessed 12 December 2005.
DVD Jon’s code in Sony rootkit? 2005. Slashdot.org (17 November), at http://yro.slashdot.org/yro/05/11/17/1350209.shtml?tid=188&tid=158, accessed 30 August 2006.
P.L. Dzidic, 2005. A discursive deconstruction of socialpsychological impacts of land degradation management: The footprints of paradoxes [PhD candidacy proposal]. Perth, Western Australia: School of Psychology, Curtin University of Technology.
Electronic Frontier Foundation (EFF), 2007. RIAA v. The People: Four years later, at http://www.eff.org/IP/P2P/riaa_at_four.pdf, accessed 4 September 2007.
Electronic Frontier Foundation (EFF), 2006. Unintended consequences: Seven years under the DMCA (v. 4), at http://www.eff.org/wp/unintended-consequences-seven-years-under-dmca, accessed 13 December 2007.
Electronic Frontier Foundation (EFF), 2005. RIAA v. The People: Two years later, at http://www.eff.org/IP/P2P/RIAAatTWO_FINAL.pdf, accessed 3 April 2006.
Electronic Frontier Foundation (EFF), 2003. Unintended consequences: Five years under the DMCA (v. 3), at http://www.eff.org/IP/DMCA/unintended_consequences.php, accessed 17 October 2005.
Entertainment Media Research (in association with Olswang), 2007. The 2007 digital music survey, at http://www.entertainmentmediaresearch.com/reports/EMR_Digital_Music_Survey2007.pdf, accessed 2 August 2007.
Federal Trade Commission, 2000. Record companies settle FTC charges of restrainingcCompetition in CD music market [press release]. Washington, D.C.: Federal Trade Commission, and at http://www.ftc.gov/opa/2000/05/cdpres.htm, accessed 1 September 2006.
W.W. Fisher, III., 2004. Promises to keep: Technology, law, and the future of entertainment. Stanford, Calif.: Stanford University Press.
Free Software Foundation, 2000. GNU free documentation license (version 1.1). Boston, Mass.: Free Software Foundation.
S. FrereJones, 2005. 1+1+1=1: The new math of mashups, New Yorker (10 January), at http://www.newyorker.com/critics/music/?050110crmu_music, accessed 29 January 2006.
E. Galles, P.E. Graves, R.L. Sexton, and S.M. Walton, 2003. Monitoring costs and tolerance levels for classroom cheating, American Journal of Economics and Sociology, volume 62, pp. 713719.http://dx.doi.org/10.1111/1536-7150.00242
M. Geist, 2006a. A cloud over broadcast policy, Toronto Star (13 November), at http://www.thestar.com/article/153999, accessed 13 December 2007.
M. Geist, 2006b. Campaign contributions, Michaelgeist.ca (3 January), at http://www.michaelgeist.ca/content/view/1058/125/, accessed 13 December 2007.
M. Geist, 2006c. The final tally from the Drake, Michaelgeist.ca (12 September), at http://www.michaelgeist.ca/content/view/1428/125/, accessed 13 September 2006.
J. Giles, 2005. Internet encyclopaedias go head to head, Nature, volume 438, number 7070 (14 December), at http://www.nature.com/nature/journal/v438/n7070/full/438900a.html, accessed 13 December 2007.
D. Gillmor, 2006. From Dan: A letter to the bayosphere community, Bayosphere.com (24 January), at http://www.bayosphere.com/blog/dan_gillmor/20060124/from_dan_a_letter_to_the_bayosphere_community, accessed 25 January 2006, and at http://web.archive.org/web/20060202011201/http://bayosphere.com/blog/dan_gillmor/20060124/from_dan_a_letter_to_the_bayosphere_community, accessed 13 December 2007.
D. Gillmor, 2004. We the media: Grassroots journalism for the people, by the people. Sebastopol, Calif.: O’Reilly Media, and at http://www.oreilly.com/catalog/wemedia/book/index.csp, accessed 13 December 2007.
D. Glaister, 2004. The mousetrap, Guardian (1 March), at http://www.guardian.co.uk/g2/story/0,3604,1159042,00.html, accessed 25 June 2004.
T. Goetz, 2004. Sample the future, Wired, volume 12, number 11 (November), pp. 181183, and at http://www.wired.com/wired/archive/12.11/sample.html, accessed 20 August 2008.
E. Goldman, 2004. Warez trading and criminal copyright infringement, Social Science Research Network, at http://ssrn.com/, accessed 25 April 2004.
P.N. Grabosky, 1999. Zero tolerance policing, Trends & Issues in Crime and Criminal Justice, Paper number 102. Canberra, Australia: Australian Institute of Criminology, and at http://www.aic.gov.au/publications/tandi/tandi102.html, accessed 29 January 2005.
J. Graham, 2005. Sony to pull controversial CDs, offer swap, USA Today (14 November), at http://www.usatoday.com/tech/news/computersecurity/2005-11-14-sony-cds_x.htm, accessed 30 August 2006.
J. Graham, 2004. Movie swappers put on notice, USA Today (5 November), at http://www.usatoday.com/money/media/2004-11-05-glickman_x.htm, accessed 6 November 2004.
J. Graham, 2003a. Students paying for playing, USA Today (5 May), at http://www.usatoday.com/tech/news/2003-05-04-students_x.htm, accessed 13 December 2007.
J. Graham, 2003b. What do the RIAA’s lawsuits mean? USA Today (9 September), at http://www.usatoday.com/tech/news/techpolicy/2003-09-08-riaa-questions_x.htm, accessed 25 July 2005.
H.G. Grasmick and D.E. Green, 1980. Legal punishment, social disapproval and internalization as inhibitors of illegal behavior, Journal of Criminal Law & Criminology, volume 71, pp. 325335.http://dx.doi.org/10.2307/1142704
A. Halderman and E. Felten, 2006. Lessons from the Sony CD DRM episode. Princeton, N.J.: Center for Information Technology Policy, Department of Computer Science, Princeton University, and at http://itpolicy.princeton.edu/pub/sonydrm-ext.pdf, accessed 17 February 2006.
T. Hamilton, 2004. Music industry hit all wrong notes in court, Toronto Star (5 April), p. D1.
A. Harmon, 2003. Suit settled for students downloading music online, New York Times (2 May), p. A22.
E. Hellweg, 2004. Is ‘fair use’ in Peril? Technology Review (19 November), at http://www.technologyreview.com/Biztech/13904/, accessed 13 December 2007.
E. Hellweg, 2003. The Kazaa conundrum, CNN Money (10 September), at http://money.cnn.com/2003/09/10/technology/techinvestor/hellweg/index.htm, accessed 1 February 2005.
J. Hempel and P. Lehman, 2005. The MySpace generation, Business Week (12 December), at http://www.businessweek.com/magazine/content/05_50/b3963001.htm, accessed 13 December 2005.
R.J. Herrnstein, 1990. Rational choice theory: Necessary but not sufficient, American Psychologist, volume 45, pp. 356367.http://dx.doi.org/10.1037/0003-066X.45.3.356
A. Hesseldahl, 2005. Spitzer gets on Sony BMG’s case, Business Week (29 November), at http://businessweek.com/technology/content/nov2005/tc20051128_573560.htm, accessed 20 August 2006.
J. Hiestand, 2004. Hollywood fights illegal downloads by targeting servers, Reuters (14 December), at http://www.reuters.co.uk/, accessed 14 December 2004.
Hollywood bid to cripple eDonkey, BitTorrent, 2004. The Age (15 December), at http://www.theage.com.au/news/Breaking/Hollywood-bid-to-cripple-eDonkey-BitTorrent/2004/12/15/1102787118053.html, accessed 15 December 2004.
Hollywood sues alleged file swappers, 2004. MSNBC.com (16 November), at http://www.msnbc.msn.com/id/6504024/, accessed 17 November 2004.
K. Humphreys and J. Rappaport, 1993. From the community mental health movement to the war on drugs: A study in the definition of social problems, American Psychologist, volume 48, pp. 892910.http://dx.doi.org/10.1037/0003-066X.48.8.892
Y.J. Huo and T.R. Tyler, 2000. How different ethnic groups react to legal authority. San Francisco, Calif.: Public Policy Institute of California, and at http://www.ppic.org/main/publication.asp?i=89, accessed 22 July 2004.
M. Izal, G. UrvoyKeller, E.W. Biersack, P.A. Felber, A. Al Hamra, and L. GarcesErice, 2004. Dissecting BitTorrent: Five months in a Torrent’s lifetime, Proceedings of the 5th Passive and Active Measurement Workshop (1920 April, Antibes JuanlesPins, France), at http://www.pam2004.org/papers/148.pdf, accessed 14 January 2005.
X. Jardin, 2004a. Hollywood wants BitTorrent dead, Wired News (14 December), at http://www.wired.com/entertainment/music/news/2004/12/66034, accessed 13 December 2007.
X. Jardin, 2004b. ‘Music is not a loaf of bread’, Wired News (15 November), at http://www.wired.com/culture/lifestyle/news/2004/11/65688, accessed 13 December 2007.
G. Johnson, 2006. The nitpicking of the masses vs. the authority of experts, New York Times (3 January), at http://www.nytimes.com/2006/01/03/science/03comm.html, accessed 13 December 2007.
A.N. Joinson, 2003. Understanding the psychology of Internet behaviour. Basingstoke, Hampshire, U.K.: Palgrave Macmillan.
A.N. Joinson, 1998. Causes and implications of disinhibited behavior on the Internet, In: J. Gackenbach (editor). The psychology of the Internet. New York: Academic Press, pp. 4360.
L. Kahney, 2003. Orrin Hatch, software pirate? Wired News (19 June), at http://www.wired.com/politics/law/news/2003/06/59305, accessed 13 December 2007.
T. Karagiannis, A. Broido, N. Brownlee, K. Claffy, and M. Faloutsos, 2004. Is P2P dying or just hiding? Proceedings of IEEE GLOBECOM 2004: Emerging Technologies Applications and Services (29 November3 December, Dallas, Texas), at http://www.caida.org/outreach/papers/2004/p2p-dying/, accessed 2 November 2004.
H.H. Kelley and J.L. Michela, 1980. Attribution theory and research, Annual Review of Psychology, volume 31, pp. 457501.http://dx.doi.org/10.1146/annurev.ps.31.020180.002325
H.C. Kelman, 2001. Reflections on social and psychological processes of legitimization and delegitimization, In: J.T. Jost and B. Major (editors). The psychology of legitimacy: Emerging perspectives on ideology, justice, and intergroup relations. Cambridge: Cambridge University Press, pp. 5473.
W.C. Kim and R.A. Mauborgne, 1993. Procedural justice, attitudes, and subsidiary top management compliance with multinationals’ corporate strategic decisions, Academy of Management Journal, volume 36, pp. 502526.http://dx.doi.org/10.2307/256590
D. Kulash, Jr., 2005. Buy, play, trade, repeat, New York Times (6 December), at http://www.nytimes.com/2005/12/06/opinion/06kulash.html, accessed 13 December 2007.
G. Lakoff, 2005. Don’t think of an elephant! Know your values and frame the debate. Carlton North, Victoria, Australia: Scribe.
J.D. Lasica, 2005. Darknet: Hollywood’s war against the digital generation. Hoboken, N.J.: Wiley.
J. Leeds and L. Story, 2005. Radio payoffs are described as Sony settles, New York Times (26 July), at http://www.nytimes.com/2005/07/26/business/26music.html, accessed 13 December 2007.
A. Lenhart and S. Fox, 2006. Bloggers: A portrait of the Internet’s new storytellers. Washington, D.C.: Pew Internet & American Life Project, and at http://www.pewinternet.org/PPF/r/186/report_display.asp, accessed 19 July 2006.
A. Lenhart and M. Madden, 2007. Teens, privacy & online social networks: How teens manage their online identities and personal information in the age of MySpace. Washington, D.C.: Pew Internet & American Life Project, and at http://www.pewinternet.org/PPF/r/211/report_display.asp, accessed 20 April 2007.
A. Lenhart and M. Madden, 2005. Teen content creators and consumers. Washington, D.C.: Pew Internet & American Life Project, and at http://www.pewinternet.org/report_display.asp?r=166, accessed 8 November 2005.
L. Lessig, 2006. Ok, so I’m wrong, Lessig.org (8 December), at http://www.lessig.org/blog/archives/003628.shtml, accessed 11 December 2006.
L. Lessig, 2005a. Creatives face a closed net, Financial Times (28 December), at http://news.ft.com/cms/s/d55dfe52-77d2-11da-9670-0000779e2340.html, accessed 29 December 2005.
L. Lessig, 2005b. They’re not worthy, Wired, volume 13, number 1 (January), at http://www.wired.com/wired/archive/13.01/view.html?pg=5, accessed 10 February 2007.
L. Lessig, 2004a. Copyrighting the President: Does big media have a vested interest in protecting Bush? You betcha, Wired, volume 12, number 8 (August), at http://www.wired.com/wired/archive/12.08/view.html?pg=5, accessed 21 August 2004.
L. Lessig, 2004b. Free culture: How big media uses technology and the law to lock down culture and control creativity. New York: Penguin.
L. Lessig, 2004c. Some like it hot, Wired, volume 12, number 3, pp. 102103.L. Lessig, 2002. <Free culture>, Proceedings of the O’Reilly Open Source Convention (2226 July, San Diago, Calif.), at http://randomfoo.net/oscon/2002/lessig/, accessed 23 June 2004.
L. Lessig, 2001. The future of ideas: The fate of the commons in a connected world. New York: Vintage.
S. Levy, 2005. The trend spotter, Wired, volume 13, number 10 (October), at http://www.wired.com/wired/archive/13.10/oreilly.html, accessed 1 August 2006.
E.A. Lind, C.T. Kulik, M. Ambrose, and M.V. de Vera Park, 1993. Individual and corporate dispute resolution: Using procedural fairness as a decision heuristic, Administrative Science Quarterly, volume 38, pp. 224251.http://dx.doi.org/10.2307/2393412
E.A. Lind and T.R. Tyler, 1988. The social psychology of procedural justice. New York: Plenum Press.
J. Litman, 2001. Digital copyright. New York: Prometheus Books.
J. Litman, 2000. The demonization of piracy, Proceedings of CFP 2000: Challenging the Assumptions. The Tenth Conference on Computers, Freedom & Privacy (6 April, Toronto, Canada), at http://www-personal.umich.edu/~jdlitman/papers/demon.pdf, accessed 13 December 2007.
J. Lyman, 2004. RIAA details subpoena strategy, MacNewsWorld.com (19 August), at http://www.macnewsworld.com/story/31372.html, accessed 26 July 2005.
R.J. MacCoun, 1993. Drugs and the law: A psychological analysis of drug prohibition, Psychological Bulletin, volume 113, pp. 497512.http://dx.doi.org/10.1037/0033-2909.113.3.497
R. MacMillan, 2006. The most dangerous download of all, Reuters (1 December), at http://blogs.reuters.com/2006/12/01/the-most-dangerous-download-of-all/, accessed 11 December 2006.
M. Madden, 2007. Online video: 57% of Internet users have watched videos online and most of them share what they find with others. Washington, D.C.: Pew Internet & American Life Project, and at http://www.pewinternet.org/PPF/r/219/report_display.asp, accessed 28 July 2007.
M. Madden, 2006. Podcast downloading. Washington, D.C.: Pew Internet & American Life Project, and at http://www.pewinternet.org/PPF/r/193/report_display.asp, accessed 7 January 2007.
M. Madden and S. Fox, 2006. Riding the waves of Web 2.0 [Pew Internet Project Backgrounder]. Washington, D.C.: Pew Internet & American Life Project, and at http://www.pewinternet.org/pdfs/PIP_Web_2.0.pdf, accessed 11 January 2007.
M. Madden and L. Rainie, 2005. Music and video downloading moves beyond P2P [Pew Internet Project Data Memo]. Washington, D.C.: Pew Internet & American Life Project, and at http://www.pewinternet.org/pdfs/PIP_Filesharing_March05.pdf, accessed 24 July 2005.
A. Malik, 2005. How the spin doctors spun a tale about peer to peer file sharing and piracy, Themusic.com.au (11 January), at http://www.themusic.com.au/, accessed 13 December 2007.
A. Malik, 2004. Thank you for the music — Everyone can be a winner in ARIA vs Kazaa, Canberra Times (28 December), at http://canberra.yourguide.com.au/news/opinion/opinion/thank-you-for-the-music-everyone-can-be-a-winner-in-aria-vs-kazaa/360427.html, accessed 13 December 2007.
P. Martin, 2004. Forget the spin! It’s a record record, Petermartin.blogspot.com (18 March), at http://petermartin.blogspot.com/2004/03/forget-spin-its-record-record.html, accessed 13 December 2007.
P. Martin, 2003. Forget the spin, taping is not killing music, Sydney Morning Herald (31 December), at http://www.smh.com.au/articles/2003/12/30/1072546532286.html, accessed 5 April 2004.
S. McBride, 2005. Can’t we all just get along? Consumers of digital entertainment face a fundamental problem: Incompatibility, Wall Street Journal (18 July), p. R9.
I. McDonald, 2006. Creative Commons: Just say ‘CC’? Copyright Reporter, volume 24, pp. 223234, and at http://www.copyright.org.au/pdf/acc/articles_pdf/a06n13.pdf, accessed 13 December 2007.
R. McHenry, 2005. The faithbased encyclopedia blinks, TCS Daily (14 December), at http://www.tcsdaily.com/article.aspx?id=121305E, accessed 20 August 2006.
J. Menn, 2003. All the rave: The rise and fall of Shawn Fanning’s Napster. New York: Crown Business.
M.S. Metzler, 2001. Responding to the legitimacy problems of big tobacco: An analysis of the ‘People of Philip Morris’ image advertising campaign, Communication Quarterly, volume 49, pp. 366381.http://dx.doi.org/10.1080/01463370109385636
H.A. Michener, J.D. DeLamater, and D.J. Myers, 2004. Social psychology. Fifth edition. Belmont, Calif.: Thomson/Wadsworth.
L. Miller, 2006. Cosby’s lawyers see no flattery in an imitation, New York Times (6 March), at http://www.nytimes.com/2006/03/06/business/06cosby.html, accessed 13 December 2007.
N. Miller, 2003. Music pirates in clear, West Australian (12 September), at http://www.thewest.com.au/20030912/news/state/tw-news-state-home-sto112395.html, accessed 25 July 2005.
G. Montgomery, 2005. Daily dispatch (opinion): Kazaagate Day 18 — Part 1, APCmag.com (29 March), at http://www.apcmag.com/apc/v3.nsf/0/F717BFD1324A3466CA256FD30003CD6A, accessed 25 July 2005, and at http://126.96.36.199/apc/v3.nsf/0/F717BFD1324A3466CA256FD30003CD6A, accessed 13 December 2007.
G. Montgomery and D. Warne, 2004. Inside the Kazaa raid, APC: Australian Personal Computer (May), pp. 2026.
N. Mook, 2005. Sony President: Rootkit of no concern, BetaNews.com (8 November), at http://www.betanews.com/article/Sony_President_Rootkit_of_No_Concern/1131475197, accessed 30 August 2006.
Motion Picture Association of America (MPAA), 2004. MPAA studios take actions against major P2P server operators to stem global movie piracy [press release], at http://www.mpaa.org/CurrentReleases/2004_12_14_WwdeP2PActions.pdf, accessed 15 December 2004, and at http://www.ifpi.org/content/section_news/20041214a.html, accessed 13 December 2007.
Motion Picture Association of America (MPAA) and Recording Industry Association of America (RIAA), 2003. A corporate policy guide to copyright use and security on the Internet, at http://www.mpaa.org/Anti-piracy/press/2003/2003_02_13.pdf, accessed 11 July 2004, and at http://web.archive.org/web/20030707144855/http://mpaa.org/Anti-piracy/press/2003/2003_02_13.pdf, accessed 13 December 2007.
M. Mulligan, D. Card, J. Laszio, and A. Peach, 2003. European broadband strategies: Reducing subscriber churn and adding consumer value with digital music services [Jupiter European Market Forecasts, number EUF03V02]. New York: Jupiter Research.
K. Murphy, 2002a. The role of trust in nurturing compliance: A study of tax scheme investors, Proceedings of the Current Issues In Regulation: Enforcement and Compliance Conference (23 September, Melbourne, Australia), at http://www.aic.gov.au/conferences/regulation/murphy.pdf, accessed 22 June 2004.
K. Murphy, 2002b. ‘Trust me, I’m the taxman: The role of trust in nurturing compliance [Centre for Tax System Integrity Working Paper, number 43]. Canberra, Australian Capital Territory: Centre for Tax System Integrity, Research School of Social Sciences, Australian National University.
K. Needham, 2004a. CD retailers advocate nice‘n’Safe, Sydney Morning Herald (30 December), at http://smh.com.au/news/Music/CD-retailers-advocate-nicensafe/2004/12/29/1103996608131.html, accessed 24 January 2005.
K. Needham, 2004b. Spies trace music swappers, Sydney Morning Herald (3 December), at http://www.smh.com.au/articles/2004/12/02/1101923273799.html, accessed 3 December 2004.
K. Needham, 2003. Last blast for the music moguls, Sydney Morning Herald (13 September), at http://www.smh.com.au/articles/2003/09/12/1063341773271.html, accessed 25 July 2005.
Q. Norton, 2006. ‘I want to build something that grows’, Guardian (26 January), at http://www.guardian.co.uk/media/2006/jan/26/newmedia.technology1, accessed 13 December 2007.
NotSoJolly Rogers, 2003. Economist/Global Agenda (10 September), p. 1.
NPD Group, 2007. The NPD Group: Legal music downloads were fastest growing digital music category in 2006 [press release], at http://www.npd.com/press/releases/press_0703141.html, accessed 3 October 2007.
T. O’Reilly, 2005. What is Web 2.0? Design patterns and business models for the next generation of software, at http://www.oreillynet.com/pub/a/oreilly/tim/news/2005/09/30/what-is-web-20.html, accessed 23 February 2006.
A. Orlowski, 2004. Why wireless will end ‘piracy’ and doom DRM and TCPA — Jim Griffin, Register (11 February), at http://www.theregister.co.uk/2004/02/11/why_wireless_will_end_piracy/, accessed 5 May 2004.
A. Parker, 2005. P2P in 2005, at http://www.cachelogic.com/research/p2p2005.php, accessed 7 February 2006.
A. Parker, 2004. The true picture of peertopeer filesharing, at http://www.cachelogic.com/research/index.php, accessed 1 February 2005.
R. Paternoster, 1987. The deterrent effect of the perceived certainty and severity of punishment: A review of the evidence and issues, Justice Quarterly, volume 4, pp. 173217.http://dx.doi.org/10.1080/07418828700089271
R. Paternoster, R. Brame, R. Bachman, and L.W. Sherman, 1997. Do fair procedures matter? The effect of procedural justice on spouse assault, Law & Society Review, volume 31, pp. 163204.http://dx.doi.org/10.2307/3054098
R. Paternoster and L. Iovanni, 1986. The deterrent effect of perceived severity: A reexamination, Social Forces, volume 64, pp. 751777.http://dx.doi.org/10.1093/sf/64.3.751
E. Pfanner, 2006. Kazaa forced to play a new tune, Sydney Morning Herald (29 July), at http://www.smh.com.au/news/business/kazaa-forced-to-play-a-new-tune/2006/07/28/1153816379723.html, accessed 1 August 2006.
D. Putwain and A. Sammons, 2002. Psychology and crime. Hove, East Sussex, U.K.: Routledge.
L. Rainie and M. Madden, 2005. Podcasting. Washington, D.C.: Pew Internet & American Life Project, and at http://www.pewinternet.org/PPF/r/154/report_display.asp, accessed 30 April 2005.
L. Rainie, M. Madden, D. Hess, and G. Mudd, 2004a. The impact of recording industry suits against music file swappers [Pew Internet Project and comScore Media Metrix Data Memo]. Washington, D.C.: Pew Internet & American Life Project, and at http://www.pewinternet.org/pdfs/PIP_File_Swapping_Memo_0104.pdf, accessed 21 January 2004.
L. Rainie, M. Madden, D. Hess, and G. Mudd, 2004b. The state of music downloading and filesharing online [Pew Internet Project and comScore Media Metrix Data Memo]. Washington, D.C.: Pew Internet & American Life Project, and at http://www.pewinternet.org/pdfs/PIP_Filesharing_April_04.pdf, accessed 6 May 2004.
A. Raskin, 2004. Giving it away (for fun and profit), Business 2.0 (May), at http://money.cnn.com/magazines/business2/business2_archive/2004/05/01/368240/index.htm, accessed 13 December 2007.
S. Reiss, 2006. His space, Wired, volume 14, number 7 (July), pp. 142147, 164.
Recording Industry Association of America (RIAA), 2003. Recording industry to begin collecting evidence and preparing lawsuits against file ‘sharers’ who illegally offer music online [press release], at http://www.riaa.com/newsitem.php?id=2B9DA905-4A0D-8439-7EE1-EC9953A22DB9, accessed 13 December 2007.
RIAA: We’ll spare the small fry, 2003. Wired News (19 August), at http://www.wired.com/entertainment/music/news/2003/08/60092, accessed 13 December 2007.
D. Roddy, 2003. The song remains the same, Pittsburgh PostGazette (14 September), at http://www.post-gazette.com/columnists/20030914edroddy0914p1.asp, accessed 31 August 2006.
P. Rojas, 2002. Bootleg culture, Salon.com (1 August), at http://dir.salon.com/story/tech/feature/2002/08/01/bootlegs/index.html, accessed 13 December 2007.
H.L. Ross and G.D. LaFree, 1986. Deterrence in criminology and social policy, In: N.J. Smelser and D.R. Gerstein (editors). Behavioral and social science: Fifty years of discovery. Washington, D.C.: National Academy Press, pp. 129152.
M. Russinovich, 2005a. More on Sony: Dangerous decloaking patch, EULAs and phoning home, Mark’s Blog (4 November), at http://www.sysinternals.com/blog/2005/11/more-on-sony-dangerous-decloaking.html, accessed 30 August 2006, and at http://blogs.technet.com/markrussinovich/archive/2005/11/04/more-on-sony-dangerous-decloaking-patch-eulas-and-phoning-home.aspx, accessed 13 December 2007.
M. Russinovich, 2005b. Sony, rootkits and digital rights management gone too far, Mark’s Blog (31 October), at http://www.sysinternals.com/blog/2005/10/sony-rootkits-and-digital-rights.html, accessed 1 November 2005, and at http://blogs.technet.com/markrussinovich/archive/2005/10/31/sony-rootkits-and-digital-rights-management-gone-too-far.aspx, accessed 13 December 2007.
J. Schwartz, 2003. She says she’s no music pirate. no snoop fan, either, New York Times (25 September), p. C1.
C. Seife, 2000. Digital music safeguard may need returning, Science, volume 290, number 5493 (3 November), pp. 917918.
J. Seigenthaler, 2005. A false Wikipedia ‘biography’, USA Today (29 November), at http://www.usatoday.com/news/opinion/editorials/2005-11-29-wikipedia-edit_x.htm, accessed 30 November 2005.
D. Sifry, 2007. The state of the live Web, April 2007, Sifry’s Alerts (5 April), at http://www.sifry.com/alerts/archives/000493.html, accessed 4 May 2007.
D. Sifry, 2006a. State of the blogosphere, April 2006, part 1: On blogosphere growth, Sifry’s Alerts (17 April), at http://www.sifry.com/alerts/archives/000432.html, accessed 17 April 2006.
D. Sifry, 2006b. State of the blogosphere, August 2006, Sifry’s Alerts (7 August), at http://www.sifry.com/alerts/archives/000436.html, accessed 8 August 2006.
D.N. Smith, 1998. The psychocultural roots of genocide: Legitimacy and crisis in Rwanda, American Psychologist, volume 53, pp. 743753.http://dx.doi.org/10.1037/0003-066X.53.7.743
E. Smith, 2006. U.S. opens probe of pricing of online music by four firms, Wall Street Journal (3 March), p. A12.
Sony recalls copyprotected CDs, 2005. (16 November), at http://news.bbc.co.uk/2/hi/technology/4441928.stm, accessed 30 August 2006.
R. Stafford, 2006. Why parents must mind MySpace, MSNBC.com (27 January), at http://www.msnbc.msn.com/id/11064451/, accessed 29 January 2006.
R.M. Stallman, 2002a. Free software definition, In: J. Gay (editor). Free software, free society: Selected essays of Richard M. Stallman. Boston, Mass.: Free Software Foundation, pp. 4143.
R.M. Stallman, 2002b. Misinterpreting copyright — A series of errors, In: J. Gay (editor). Free software, free society: Selected essays of Richard M. Stallman. Boston, Mass.: Free Software Foundation, pp. 7788.
M. Stodghill, 2007. Duluth court to host first jury trial over music file sharing, Duluth News Tribune (2 October), at http://www.duluthnewstribune.com/articles/index.cfm?id=51388, accessed 3 October 2007.
A. Sullivan, 2004. Police seize computers in global piracy crackdown, Reuters (22 April), at http://www.reuters.com/, accessed 24 April 2004.
J. Sunshine and T.R. Tyler, 2003. The role of procedural justice and legitimacy in shaping public support for policing, Law & Society Review, volume 37, pp. 513548.http://dx.doi.org/10.1111/1540-5893.3703002
The second life of Lawrence Lessig, part 1, 2006. On New World Notes [transcript of inworld interview with Phillip Linden at the Pooley Auditorium, Second Life, 18 January], at http://secondlife.blogs.com/nwn/2006/01/the_second_life.html, accessed 25 January 2006.
J. Thibaut and L. Walker, 1975. Procedural justice: A psychological analysis. Hillsdale, N.J.: Lawrence Erlbaum.
C. Thompson, 2005. The BitTorrent effect, Wired, volume 13, number 1 (January), pp. 150153, 178179, and at http://www.wired.com/wired/archive/13.01/bittorrent_pr.html, accessed 20 August 2008.
A. Toll, 2004. Peertopeer filesharing technology: Consumer protection issues and competition issues public workshop, Proceedings of the Federal Trade Commission PeertoPeer FileSharing Technology: Consumer Protection and Competition Issues Workshop (1516 December, Washington, D.C.), at http://www.ftc.gov/bcp/workshops/filesharing/presentations/toll.pdf, accessed 1 February 2005.
T. R. Tyler, 2006. Psychological perspectives on legitimacy and legitimation, Annual Review of Psychology, volume 57, pp. 375400.http://dx.doi.org/10.1146/annurev.psych.57.102904.190038
T.R. Tyler, 2001a. A psychological perspective on the legitimacy of institutions and authorities, In: J.T. Jost and B. Major (editors). The psychology of legitimacy: Emerging perspectives on ideology, justice, and intergroup relations. Cambridge: Cambridge University Press, pp. 416436.
T.R. Tyler, 2001b. Obeying the law in America: Procedural justice and the sense of fairness, Issues of Democracy, volume 6, number 1 (July), and at http://usinfo.state.gov/journals/itdhr/0701/ijde/tyler.htm, accessed 21 June 2004.
T.R. Tyler, 2001c. Trust and lawabidingness: A proactive model of social regulation [Centre for Tax System Integrity, Working Paper number 16]. Canberra, Australian Capital Territory: Australian National University, Centre for Tax System Integrity, and at http://ctsi.anu.edu.au/publications/WP/16.pdf, accessed 13 December 2007.
T.R. Tyler, 2000. Social justice: Outcome and procedure, International Journal of Psychology, volume 35, pp. 117125.http://dx.doi.org/10.1080/002075900399411
T.R. Tyler, 1998. Trust and democratic governance, In: V. Braithwaite and M. Levi (editors). Trust and governance. New York: Russell Sage Foundation, pp. 269294.
T.R. Tyler, 1997. Compliance with intellectual property laws: A psychological perspective, New York University Journal of International Law and Politics, volume 29, pp. 219235.
T.R. Tyler, 1990. Why people obey the law. New Haven, Conn.: Yale University Press.
T.R. Tyler and S.L. Blader, 2005. Can businesses effectively regulate employee conduct? The antecedents of rule following in work settings, Academy of Management Journal, volume 48, pp. 11431158.http://dx.doi.org/10.5465/AMJ.2005.19573114
T.R. Tyler and S.L. Blader, 2000. Cooperation in groups: Procedural justice, social identity, and behavioral engagement. Philadelphia: Psychology Press.
T.R. Tyler and J. Darley, 2000. Building a lawabiding society: Taking public views about morality and the legitimacy of legal authorities into account when formulating substantive law, Hofstra Law Review, volume 28, pp. 707739.
T.R. Tyler and P. Degoey, 1996. Trust in organizational authorities: The influence of motive attributions on willingness to accept decisions, In: R.M. Kramer and T.R. Tyler (editors). Trust in organizations: Frontiers of theory and research. Thousand Oaks, Calif.: Sage, pp. 331356.
T.R. Tyler and P. Degoey, 1995. Collective restraint in social dilemmas: Procedural justice and social identification effects on support for authorities, Journal of Personality and Social Psychology, volume 69, pp. 482497.http://dx.doi.org/10.1037/0022-35188.8.131.522
T.R. Tyler and Y.J. Huo, 2002. Trust in the law: Encouraging public cooperation with the police and courts. New York: Russell Sage Foundation.
T.R. Tyler and G. Mitchell, 1994. Legitimacy and the empowerment of discretionary legal authority: The United States Supreme Court and abortion rights, Duke Law Journal, volume 43, pp. 703815.http://dx.doi.org/10.2307/1372774
UK music fans can copy own tracks, 2006. BBC News (6 June), at http://news.bbc.co.uk/1/hi/entertainment/5053658.stm, accessed 6 June 2006.
UK music to sue online ‘pirates’, 2004. BBC News (7 October), at http://news.bbc.co.uk/2/hi/entertainment/3722428.stm, accessed 23 August 2006.
U.S. Office of National Drug Control Policy, 2007. National drug control strategy: FY 2008 budget summary. Washington, D.C.: U.S. Office of National Drug Control Policy, at http://www.whitehousedrugpolicy.gov/publications/policy/08budget/, accessed 3 October 2007.
S. Vaidhyanathan, 2004. The anarchist in the library: How the clash between freedom and control is hacking the real world and crashing the system. New York: Basic Books.
S. Vaidhyanathan, 2001. Copyrights and copywrongs: The rise of intellectual property and how it threatens creativity. New York: New York University Press.
J. Varghese, 2004. Copyright Legislation Amendment Bill 2004 [Bill Digest number 71]. Canberra, Australia: Department of Parliamentary Services, Parliament of Australia, and at http://www.aph.gov.au/library/pubs/bd/2004-05/05bd071.pdf, accessed 31 December 2007.
F. von Lohmann, 2006. RIAA says ripping CDs to your iPod is not fair use, Electronic Frontier Foundation: Deeplinks Blog (15 February), at http://www.eff.org/deeplinks/2006/02/riaa-says-ripping-cds-your-ipod-not-fair-use, accessed 13 December 2007.
F. von Lohmann, 2004a. Et tu, Marvel? Law.com (3 December), at http://www.law.com/jsp/ltn/pubArticleLTN.jsp?id=1101738495797, accessed 14 December 2004.
F. von Lohmann, 2004b. Measuring the Digital Millennium Copyright Act Against the Darknet: Implications for the regulation of technological protection measures, Loyola of Los Angeles Entertainment Law Review, volume 635, pp. 115, and at http://www.eff.org/IP/DMCA/DMCA_against_the_darknet.pdf, accessed 19 February 2006.
M. Ward, 2005. Sony slated over antipiracy CD, BBC News (3 November), at http://news.bbc.co.uk/2/hi/technology/4400148.stm, accessed 30 August 2006.
P. West and J. Burkell, 2005. Names, nyms, addresses and reputations: The experience of anonymity in the wired world. London, Ontario, Canada: University of Western Ontario, at http://idtrail.org/content/view/117/42/, accessed 13 December 2007.
N. Wingfield, 2002. Behind the fake music: Record industry plants decoys to foil fans of free Web tunes; Sheryl Crow gets spoofed, Wall Street Journal (11 June), p. D1.
A. Wolfe, 2007. DRM scorecard: Hackers batting 1000, Industry zero, Information Week (1 August), at http://www.informationweek.com/blog/main/archives/2007/08/drm_scorecard_h.html, accessed 2 August 2007.
D. Wolk, 2004. A touch of grey, Village Voice (39 March), at http://www.villagevoice.com/issues/0409/soti.php, accessed 25 June 2004.
T. Zeller, Jr., 2006. A lesson for parents on ‘MySpace Madness’, New York Times (26 June), at http://www.nytimes.com/2006/06/26/technology/26link.html, accessed 8 August 2006.
M.A. Zimmerman and G.J. Zeitz, 2002. Beyond survival: Achieving new venture growth by building legitimacy, Academy of Management Review, volume 27, pp. 414431.
Paper received 16 December 2007; accepted 19 August 2008.
This paper is licensed under a Creative Commons AttributionNoncommercialNo Derivative Works 3.0 Unported License.
Rip, mix, burn ... sue ... ad infinitum: The effects of deterrence vs. voluntary cooperation on noncommercial online copyright infringing behaviour
by Peter J. Allen
First Monday, Volume 13 Number 9 - 1 September 2008
A Great Cities Initiative of the University of Illinois at Chicago University Library.
© First Monday, 1995-2015.