Search results for "neutralization theory"

showing 3 items of 3 documents

Consumers’ neutralization strategies to counter normative pressure : The case of illegal downloading

2014

International audience; The process of neutralization of normative pressure by consumers, which allows the performance of deviant practices while maintaining the attachment to the norm, has not been sufficiently studied. Our analysis, in the case of illegal downloading, shows that consumers produce an autonomous discursive set, articulated around three defensive strategies (disempowerment as neutralizing, pragmatic neutralization, ideological neutralization) and accept internal contradiction.

Marketingconsumer resistanceconsumer deviancemedia_common.quotation_subject05 social sciences050109 social psychologyAdvertisingneutralization theoryConsumer resistance[SHS]Humanities and Social SciencesUploadPolitical science0502 economics and businessContradictionNormativeillegal downloading[SHS.GESTION]Humanities and Social Sciences/Business administration050211 marketing0501 psychology and cognitive sciencesIdeology[SHS] Humanities and Social SciencesinternetSet (psychology)[SHS.GESTION] Humanities and Social Sciences/Business administrationmedia_common
researchProduct

Music Piracy Neutralization and the Youth of the 2010's

2014

In this qualitative research, music piracy among the youth was studied by applying Sykes’ and Matza’s neutralization theory. The key objective of the study was to find out how youths view music piracy, and how they give accounts for it using techniques of neutralization. According to the conducted semi-structured interviews, youths do acknowledge the ethical and economic problems of music piracy. However, piracy is still exercised, and in order to justify this, multiple neutralization techniques are used. The most characteristic of the employed techniques was “claim of normalcy”, with “denial of victim” and “justification by comparison” also appearing frequently. In order to prevent piracy,…

music piracyinterviewnuoruusComputingMilieux_LEGALASPECTSOFCOMPUTINGneutralization theory
researchProduct

Revisiting neutralization theory and its underlying assumptions to inspire future information security research

2022

Over two decades ago, neutralization theory was introduced to information systems research from the field of criminology and is currently emerging as an influential foundation to both explain and solve the information security policy noncompliance problem. Much of what we know about the theory focuses exclusively on the neutralization techniques identified in the original as well as subsequent criminological writings. What is often left unexamined in IS research is the underlying assumptions about the theory’s core elements; assumptions about the actor, the act, the normative system, and the nature of neutralizing itself. The objective of this commentary is to revisit the origin of neutrali…

underlying assumptionsohjeettyöntekijättietoturvapolitiikkaneutralization theoryneutralointiteoriatietoturvakyberturvallisuusISP violationstietojärjestelmät
researchProduct