{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,12]],"date-time":"2024-08-12T17:52:25Z","timestamp":1723485145154},"reference-count":75,"publisher":"Wiley","issue":"3","license":[{"start":{"date-parts":[[2015,3,18]],"date-time":"2015-03-18T00:00:00Z","timestamp":1426636800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Information Systems Journal"],"published-print":{"date-parts":[[2015,5]]},"abstract":"Abstract<\/jats:title>This paper presents a new conceptualisation of online communities by exploring how an online community forms and is maintained. Many stakeholders in the music industry rightly point out that unauthorised file sharing is illegal, so why do so many people feel it is acceptable to download music without paying? Our study found highly cohesive, well\u2010organised groups that were motivated by scarcity and the lack of high quality music files. Our ethnographic research provides insight into the values and beliefs of music file sharers: their demands are not currently being met. Using Actor\u2010network theory, we are able to propose that the file sharers represent a growing potential market in the music industry and that music distribution systems should be developed accordingly to meet the demands of this user group. Therefore, this study can serve as a springboard for understanding unauthorised file sharing and perhaps other deviant behaviours using technology.<\/jats:p>","DOI":"10.1111\/isj.12069","type":"journal-article","created":{"date-parts":[[2015,3,18]],"date-time":"2015-03-18T16:22:15Z","timestamp":1426695735000},"page":"171-192","source":"Crossref","is-referenced-by-count":12,"title":["Illuminating the underground: the reality of unauthorised file sharing"],"prefix":"10.1111","volume":"25","author":[{"given":"Jenine","family":"Beekhuyzen","sequence":"first","affiliation":[{"name":"Institute for Integrated and Intelligent Systems Griffith University Brisbane Queensland 4111 Australia"}]},{"given":"Liisa","family":"von Hellens","sequence":"additional","affiliation":[{"name":"Institute for Integrated and Intelligent Systems Griffith University Brisbane Queensland 4111 Australia"}]},{"given":"Sue","family":"Nielsen","sequence":"additional","affiliation":[{"name":"Institute for Integrated and Intelligent Systems Griffith University Brisbane Queensland 4111 Australia"}]}],"member":"311","published-online":{"date-parts":[[2015,3,18]]},"reference":[{"key":"e_1_2_9_2_1","first-page":"205","volume-title":"Shaping Technology\/Building Society","author":"Akrich M.","year":"1992"},{"key":"e_1_2_9_3_1","first-page":"259","volume-title":"Shaping Technology\/Building Society","author":"Akrich M.","year":"1992"},{"key":"e_1_2_9_4_1","doi-asserted-by":"publisher","DOI":"10.1177\/017084068400500301"},{"key":"e_1_2_9_5_1","doi-asserted-by":"publisher","DOI":"10.4135\/9781849208918"},{"key":"e_1_2_9_6_1","volume-title":"The Impact of Music Downloads and P2P File\u2010Sharing on the Purchase of Music: A Study for Industry Canada","author":"Andersen B.","year":"2007"},{"key":"e_1_2_9_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1132469.1132470"},{"key":"e_1_2_9_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/280324.280330"},{"key":"e_1_2_9_9_1","doi-asserted-by":"publisher","DOI":"10.2307\/2392767"},{"key":"e_1_2_9_10_1","doi-asserted-by":"publisher","DOI":"10.1177\/017084069701800106"},{"key":"e_1_2_9_11_1","unstructured":"Beekhuyzen J. vonHellens L. Nielsen S.(2012)Insights from the underground: using ANT to understand practices and motivations for file sharing in online communities. Proceedings of the European Conference on Information Systems (ECIS) Barcelona Spain 11\u201013 June. Winner of the Claudio Ciborra award for Innovation in Research"},{"key":"e_1_2_9_12_1","unstructured":"Beekhuyzen J. Nielsen S.&Hellens von L.(2012)The high seas (C's) of music piracy in information systems: cost convenience and choice. Presented at the Proceedings of the 23rd Australasian Conference on Information Systems Geelong Australia."},{"key":"e_1_2_9_13_1","doi-asserted-by":"publisher","DOI":"10.1046\/j.1365-2575.2001.00111.x"},{"key":"e_1_2_9_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/353360.353371"},{"key":"e_1_2_9_15_1","doi-asserted-by":"crossref","unstructured":"Biddle P. England P. Peinado M.&Willman B.(2002)The darknet and the future of content distribution. Proceedings of the ACM Workshop on Digital Rights Management Washington DC USA: Association for Computing Machinery.","DOI":"10.1007\/978-3-540-44993-5_10"},{"key":"e_1_2_9_16_1","first-page":"196","volume-title":"Power, action and belief: a new sociology of knowledge?","author":"Callon M.","year":"1986"},{"key":"e_1_2_9_17_1","first-page":"277","volume-title":"Advances in Social Theory and Methodology: Toward an Integration of Micro and Macro Sociologies","author":"Callon M.","year":"1981"},{"key":"e_1_2_9_18_1","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-349-07408-2","volume-title":"Mapping the Dynamics of Science and Technology: Sociology of Science in the Teal World","author":"Callon M.","year":"1986"},{"key":"e_1_2_9_19_1","unstructured":"Cannatella J.&Geoghegan S.J.(2009)Phat: a P2p history analysis tool. Proceedings of the Consortium for Computing Sciences in Colleges."},{"key":"e_1_2_9_20_1","doi-asserted-by":"publisher","DOI":"10.5153\/sro.88"},{"key":"e_1_2_9_21_1","first-page":"3","volume-title":"Online Gaming in Context: The Social and Cultural Significance of Online Games","author":"Crawford G.","year":"2011"},{"key":"e_1_2_9_22_1","volume-title":"Qualitative Inquiry and Research Design: Choosing Among Five Approaches","author":"Creswell J.W.","year":"2007"},{"key":"e_1_2_9_23_1","first-page":"7","volume-title":"Actor\u2010Network Theory and Organizing","author":"Czarniawska B.","year":"2005"},{"key":"e_1_2_9_24_1","volume-title":"Ethnography: Theory and Applications in Health Research","author":"Laine M.","year":"1997"},{"key":"e_1_2_9_25_1","doi-asserted-by":"publisher","DOI":"10.1080\/02683960210145986"},{"key":"e_1_2_9_26_1","unstructured":"Faul M.&Karoub J.(2012)Rodriguez seeks lost royalties from albums sold overseas while he lived in obscurity.Huffington Post February23. pp.1\u20134."},{"key":"e_1_2_9_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2135.2138"},{"key":"e_1_2_9_28_1","volume-title":"The Interpretation of Cultures","author":"Geertz C.","year":"1973"},{"key":"e_1_2_9_29_1","doi-asserted-by":"crossref","DOI":"10.1177\/0306312702032001005","volume-title":"Methadone: Six Effects in Search of a Substance","author":"Gomart E.","year":"2002"},{"key":"e_1_2_9_30_1","doi-asserted-by":"crossref","first-page":"521","DOI":"10.17705\/1jais.00342","article-title":"The role of restrictiveness of use in determining ethical and legal awareness of unauthorized file sharing","volume":"14","author":"Hansen J.H.","year":"2013","journal-title":"Journal of the Association for Information Systems"},{"key":"e_1_2_9_31_1","first-page":"112","volume-title":"Actor\u2010Network Theory and Organizing","author":"Hernes T.","year":"2005"},{"key":"e_1_2_9_32_1","volume-title":"Virtual Methods: Issues in Social Research on the Internet","author":"Hine C.","year":"2005"},{"key":"e_1_2_9_33_1","doi-asserted-by":"publisher","DOI":"10.1515\/LIBR.2001.129"},{"key":"e_1_2_9_34_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444808096250"},{"key":"e_1_2_9_35_1","doi-asserted-by":"publisher","DOI":"10.1080\/13691180802459930"},{"key":"e_1_2_9_36_1","first-page":"67","volume-title":"Actor\u2010Network Theory and Organizing","author":"Lanzara G.F.","year":"2005"},{"key":"e_1_2_9_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/381641.381658"},{"key":"e_1_2_9_38_1","volume-title":"Science in Action: How to Follow Scientists and Engineers Through Society","author":"Latour B.","year":"1987"},{"key":"e_1_2_9_39_1","volume-title":"We Have Never Been Modern (C. Potter, Trans.)","author":"Latour B.","year":"1993"},{"key":"e_1_2_9_40_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-954X.1999.tb03480.x"},{"key":"e_1_2_9_41_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF01059830"},{"key":"e_1_2_9_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/606272.606300"},{"key":"e_1_2_9_43_1","unstructured":"Lessig L.(2004)Free culture: how big media uses technology and the law to lock down culture and control creativity fromhttp:\/\/www\u2010bib.hive.no\/tekster\/ekstern\/lessig\/freeculture.pdf[Accessed 30\/4\/10]"},{"key":"e_1_2_9_44_1","volume-title":"Fabricated: The New World of 3D Printing","author":"Lipson M.","year":"2013"},{"key":"e_1_2_9_45_1","unstructured":"Mao J.\u2010Y.&Zhang X.(2008)End\u2010to\u2010end user participation in information systems development: a case study based on a control perspective.Proceedings of the International Conference on Information Systems ICIS Paris France. 14\u201017 December."},{"key":"e_1_2_9_46_1","doi-asserted-by":"publisher","DOI":"10.1080\/019722498128809"},{"key":"e_1_2_9_47_1","doi-asserted-by":"publisher","DOI":"10.1509\/jmkr.45.6.633"},{"key":"e_1_2_9_48_1","doi-asserted-by":"crossref","first-page":"148","DOI":"10.1093\/oso\/9780198297345.003.0009","volume-title":"From Control to Drift. The Dynamics of Corporate Information Infrastructure","author":"Monteiro E.","year":"2000"},{"key":"e_1_2_9_49_1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.17705\/1CAIS.00223","article-title":"Investigating information systems with ethnographic research. [Internet]","volume":"2","author":"Myers M.D.","year":"1999","journal-title":"Communications of the Association for Information Systems"},{"key":"e_1_2_9_50_1","doi-asserted-by":"crossref","first-page":"523","DOI":"10.2307\/4134401","article-title":"Creating the new ecological order? Elias and actor\u2010network theory","volume":"27","author":"Newton T.J.","year":"2002","journal-title":"Academy of Management Review"},{"key":"e_1_2_9_51_1","doi-asserted-by":"crossref","first-page":"61","DOI":"10.17705\/1jais.00222","article-title":"Social networks and information systems: ongoing and future research streams","volume":"11","author":"Oinas\u2010Kukkonen H.","year":"2010","journal-title":"Journal of the Association of Information Systems"},{"key":"e_1_2_9_52_1","volume-title":"Qualitative Research and Evaluation Methods","author":"Patton M.Q.","year":"1990"},{"key":"e_1_2_9_53_1","first-page":"14","volume-title":"Actor\u2010Network Theory and Organizing","author":"Porsander L.","year":"2005"},{"key":"e_1_2_9_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/903893.903899"},{"key":"e_1_2_9_55_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444808089417"},{"key":"e_1_2_9_56_1","doi-asserted-by":"publisher","DOI":"10.1108\/09593840910937481"},{"key":"e_1_2_9_57_1","volume-title":"Homesteading the Noosphere","author":"Raymond E.S.","year":"1999"},{"key":"e_1_2_9_58_1","first-page":"133","article-title":"Socio\u2010theoretic accounts of IS: the problem of agency. [Comparision between ST and ANT]","volume":"17","author":"Rose J.","year":"2005","journal-title":"Scandinavian Journal of lnformation Systems"},{"key":"e_1_2_9_59_1","volume-title":"Proceedings of ACM Ethics in the Computer Age Conference Gatlinburg, Tennessee","author":"Rubin R.","year":"1996"},{"key":"e_1_2_9_60_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1040.0030"},{"key":"e_1_2_9_61_1","unstructured":"Shoib G. Nandhakumar J.&Jones M.(2006)Using social theory in information systems research: a reflexive account in quality and impact of qualitative research.Proceedings of the QualIT2006 Conference: Quality and Impact of Qualitative Research Brisbane Australia."},{"key":"e_1_2_9_62_1","unstructured":"Sidorova A.&Sarker S.(2000)Unearthing some causes of BPR failure: an actor\u2010network theory perspective.Proceedings of the Americas Conference on Information Systems (AMCIS) Long Beach California."},{"key":"e_1_2_9_63_1","doi-asserted-by":"publisher","DOI":"10.1080\/17493460600658318"},{"key":"e_1_2_9_64_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1365-2575.2007.00232.x"},{"key":"e_1_2_9_65_1","doi-asserted-by":"crossref","DOI":"10.3726\/978-1-4539-1450-2","volume-title":"Culture + Technology: A Primer","author":"Slack J.","year":"2007"},{"key":"e_1_2_9_66_1","doi-asserted-by":"publisher","DOI":"10.2307\/2392246"},{"key":"e_1_2_9_67_1","doi-asserted-by":"publisher","DOI":"10.2307\/20650294"},{"key":"e_1_2_9_68_1","volume-title":"A Sociology of Monsters: Essays on Power, Technology and Domination","author":"Star S.L.","year":"1991"},{"key":"e_1_2_9_69_1","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511808418"},{"key":"e_1_2_9_70_1","doi-asserted-by":"publisher","DOI":"10.4135\/9781412983945"},{"key":"e_1_2_9_71_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-35309-8_23"},{"key":"e_1_2_9_72_1","unstructured":"vanBuskirk E.(2012)The most\u2010downloaded legal music on BitTorrent pp.1\u20132. Retrieved fromhttp:\/\/www.huffingtonpost.com\/eliot\u2010van\u2010buskirk\/the\u2010mostdownloaded\u2010legal\u2010_b_1923146.html [Accessed 30\/1\/14]"},{"key":"e_1_2_9_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/1022594.1022613"},{"key":"e_1_2_9_74_1","volume-title":"Writing up qualitative research","author":"Wolcott H.F.","year":"1990"},{"key":"e_1_2_9_75_1","volume-title":"Transforming Qualitative Data: Description, Analysis, and Interpretation","author":"Wolcott H.F.","year":"1994"},{"key":"e_1_2_9_76_1","doi-asserted-by":"publisher","DOI":"10.1177\/0163443705055723"}],"container-title":["Information Systems Journal"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1111%2Fisj.12069","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1111\/isj.12069","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,7]],"date-time":"2024-06-07T22:28:58Z","timestamp":1717799338000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1111\/isj.12069"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,3,18]]},"references-count":75,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2015,5]]}},"alternative-id":["10.1111\/isj.12069"],"URL":"https:\/\/doi.org\/10.1111\/isj.12069","archive":["Portico"],"relation":{},"ISSN":["1350-1917","1365-2575"],"issn-type":[{"value":"1350-1917","type":"print"},{"value":"1365-2575","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,3,18]]}}}