IJISC
  • Indexed in

  • Latest News

    December 30, 2024
    Volume 13, Issue 2 of the International Journal of Information Security and Cybercrime was published
    July 1, 2024
    Volume 13, Issue 1 of the International Journal of Information Security and Cybercrime was published
    December 27, 2023
    Volume 12, Issue 2 of the International Journal of Information Security and Cybercrime was published
  • --- More News ---
  • Popular Articles

  • Public Attitudes and Justifications on Illegal Streaming Sites in South Korea: A Content Analysis


    Author(s): CHOI, Sinyong; JUNG, Bo Ra; PARK, Seong-Min

    Quick view | Full article | Citations | Views: 48


    Author(s) keywords: , , , ,


    Reference keywords: , ,


    Abstract:

    Illegal streaming services pose significant threats to intellectual property rights and creative industries, causing substantial economic losses. In South Korea, platforms like NooNoo TV exemplify the operational scale of digital video piracy, generating billions in illicit revenue. This study analyzes 1,125 YouTube comments on NooNoo TV news coverage to explore public attitudes and narratives justifying such activities. Content analysis reveals supportive (47.8%) and oppositional (52.2%) attitudes, with neutralization techniques identified, including relativizing norm violations (33%), reducing norms to facts (19%), and blaming limited options (40.8%). Findings highlight dissatisfaction with the legal streaming market, driven by high costs and fragmented content, alongside skepticism about enforcement effectiveness. While some view illegal streaming as addressing systemic issues, critics emphasize its ethical and economic harms, such as copyright violations and industry destabilization. Neutralization techniques reflect broader societal discontent, revealing how these operations exploit systemic vulnerabilities and shift public perceptions. The study underscores the need for comprehensive policies, including robust enforcement, affordable legal streaming reforms, and international collaboration using technologies like blockchain-based digital rights management. These insights provide actionable strategies for policymakers and industry stakeholders to combat digital piracy effectively.



    References:

    [1]. Ahadiat, Ayi & Maydiantoro, Albet. (2021). The Theory of Planned Behavior and Marketing Ethics Theory in Predicting Digital Piracy Intentions. WSEAS TRANSACTIONS ON BUSINESS AND ECONOMICS, 18, 679–702.
    [2]. Akbulut, Y., & Dönmez, O. (2018). Predictors of digital piracy among Turkish undergraduate students. Telematics and Informatics, 35(3), 529–540.
    [3]. Alshamrani, S., Abusnaina, A., & Mohaisen, D. (2020, November). Hiding in plain sight: A measurement and analysis of kids’ exposure to malicious urls on youtube. In 2020 IEEE/ACM Symposium on Edge Computing (SEC) (pp. 321-326). IEEE.
    [4]. Baek, B. (2023, June 18). Gov't expands moves to block resurfacing illegal streaming site. The Korea Times. Retrieved from https://www.koreatimes.co.kr/www/tech/2023/07/129_353178.html
    [5]. Baek, J. Y. (2023, Dec 20). "CDN 업체도 접속차단 의무화"…'누누티비 방지법' 국회 본회의 통과 ["CDN companies also required to block access"… 'Noonoo TV prevention law' passes National Assembly plenary session]. Digital Daily. Retrieved from https://m.ddaily.co.kr/page/view/2023122018142144661
    [6]. Eisend, M. (2019). Explaining digital piracy: A meta-analysis. Information Systems Research, 30(2), 636–664.
    [7]. Faria, R. G. (2023, April 14). Can Artificial Intelligence be leveraged to uncover illegal streaming vendors? Mobileum. Retrieved from https://blog.mobileum.com/can-artificial-intelligence-be-leveraged-to-uncover-illegal-streaming-vendors
    [8]. Gill J. K. (2024, December 9). Real-Time Video Streaming Applications | Complete Overview. XENONSTACK. Retrieved from https://www.xenonstack.com/blog/real-time-video-streaming-applications/
    [9]. Higgins, G. E. (2007). Digital piracy, self-control theory, and rational choice: An examination of the role of value. International Journal of Cyber Criminology, 1(1), 33–55.
    [10]. Higgins, G. E., & Wolfe, S. E. (2008). Digital piracy: A latent class analysis. Social Science Computer Review, 26(1), 24–45.
    [11]. Higgins, G. E., Wolfe, S. E., & Marcum, C. D. (2008). Digital piracy: An examination of three measurements of self-control. Deviant Behavior, 29(5), 440–460.
    [12]. Hinduja, Sameer. (2007). Neutralization theory and online software piracy: An empirical analysis. Ethics and Information Technology. 9. 187-204.
    [13]. Ihn, H. (2024, December 16). 차단 우회·타인 계정 도용·P2P...'누누티비'는 어떻게 법망 피해 돈 벌었나 [How 'Nunu TV' evaded the law and profited through blocking bypass, account theft, and P2P]. Hankook Ilbo. Retrieved from https://www.hankookilbo.com/News/Read/A2024121616430004078
    [14]. Indonesia, Korea, and INTERPOL cooperation shuts down illegal IPTV service (2023, December 21). INTERPOL. Retrieved from https://www.interpol.int/News-and-Events/News/2023/Indonesia-Korea-and-INTERPOL-cooperation-shuts-down-illegal-IPTV-service
    [15]. Kaptein, M., & Van Helvoort, M. (2019). A model of neutralization techniques. Deviant Behavior, 40(10), 1260–1285.
    [16]. Kim, & Chang. (2023). South Korea’s Copyright Act and legal measures.
    [17]. Kim, D., Park, K., & Bang, Y. (2022). The effect of TV drama piracy: An analysis of digital piracy users, internet buzz, and TV drama viewership, Information & Management, 59(2), https://doi.org/10.1016/j.im.2022.103599.
    [18]. Koay, K. Y., Tjiptono, F., & Sandhu, M. S. (2020). Digital piracy among consumers in a developing economy: A comparison of multiple theory-based models. Telematics and Informatics, 51, 101404.
    [19]. Lim, J. (2023, April 14). Illegal streaming site noonoo TV to end its service. Korea JoongAng Daily. Retrieved from https://koreajoongangdaily.joins.com/2023/04/14/entertainment/television/Korea-noonoo-TV-illegal/20230414115754899.html
    [20]. Lowry, P. B., Zhang, J., & Wu, T. (2017). Nature or nurture? A meta-analysis of the factors that maximize the prediction of digital piracy using social cognitive theory as a framework. Computers in Human Behavior, 68, 104–120.
    [21]. Lyu, Y., Xie, J., & Xie, B. (2020, March). The attitudes of Chinese online users towards movie piracy: A content analysis. In International Conference on Information (pp. 169-185). Cham: Springer International Publishing.
    [22]. Maruna, S., & Copes, H. (2005). What have we learned from five decades of neutralization research?. Crime and justice, 32, 221-320.
    [23]. Morris, R. G. (2011). Neutralizing potential and self-reported digital piracy: A multitheoretical exploration among college undergraduates. Deviant Behavior, 32(5), 455–476.
    [24]. Morris, R. G., & Higgins, G. E. (2010). Criminological theory in the digital age: The case of social learning theory and digital piracy. Journal of Criminal Justice, 38(4), 470–480.
    [25]. Nelhans, G., Maurin Söderholm, H., Nolin, J., Klang, M., & Lassi, M. (2013). Spontaneous reactions to an anti-piracy initiative: A Youtube clip micro analysis. iConference 2013 Proceedings (985-989). doi:10.9776/13507
    [26]. Park, S. H. (2023, May 3). ‘불법 스트리밍 사이트’ 문제를 어떻게 해결할 것인가? [How to solve the 'illegal streaming site' problem?]. Law Times. Retrieved from https://www.lawtimes.co.kr/opinion/187264
    [27]. Rozman, G. (2002). Modernization and tradition in East Asia: A comparative perspective. Stanford University Press.
    [28]. Ślęziak, T. (2013). The role of Confucianism in contemporary South Korean society. Rocznik Orientalistyczny, 66(1–2), 27–46.
    [29]. Smallridge, J.L. & Roberts, J.R. (2013). Crime specific neutralizations: An empirical examination of four types of digital piracy. International Journal of Cyber Criminology. 7. 125-140.
    [30]. Suchman, M. C. (1995). Managing legitimacy: Strategic and institutional approaches. Academy of Management Review, 20(3), 571–610.
    [31]. Sundqvist, A., Berget, G., Nolin, J., & Skjerdingstad, K. I. (2020). Sustainable digital communities. Paper presented at 15th international conference. iConference 2020, Boras, Sweden, 23–26 March 2020.
    [32]. Tamilselvan, N. (2024). Blockchain-Based Digital Rights Management for Enhanced Content Security in Digital Libraries. Technology (IJBT), 2(1), 1-8.
    [33]. Trung Pham, Q., Minh Dang, N., & Trung Nguyen, D. (2020). Factors affecting on the digital piracy behavior: an empirical study in Vietnam. Journal of theoretical and applied electronic commerce research, 15(2), 122-135.
    [34]. Van Rooij, B., Fine, A., Zhang, Y., & Wu, Y. (2018). Comparative compliance: Digital piracy, deterrence, social norms, and duty in China and the United States. Law & Policy, 40(2), 186–214.
    [35]. Vida, I., & Kokli, M. K. (2009). Predicting consumer digital piracy behavior: The role of rationalization and perceived consequences. Journal of Business Ethics, 90(4), 551–564.
    [36]. Yoon, C. (2014). Digital piracy justification: Asian students versus American students. Deviant Behavior, 35(4), 334–356.
    [37]. Yoon, S. (2024b, November 6). Korea, Philippine gov'ts arrest illegal streaming operator targeting Korean residents in Philippines. Korea JoongAng Daily. Retrieved from https://koreajoongangdaily.joins.com/news/2024-11-06/entertainment/movies/Korea-Philippine-govts-arrest-illegal-streaming-operator-targeting-Korean-residents-in-Philippines/2171751
    [38]. Yoon, S. (2024a, August 22). Korea involved in shutdown of Thai-based illegal streaming platform in landmark operation. Korea JoongAng Daily. Retrieved from https://koreajoongangdaily.joins.com/news/2024-08-22/business/industry/Korea-involved-in-shutdown-of-Thaibased-illegal-streaming-platform-in-landmark-operation/2118309
    [39]. Yu, S. (2010). Digital piracy and stealing: A comparison on criminal propensity. International Journal of Criminal Justice Sciences, 5, 239–250.
    [40]. Yu, S. (2013). College students’ justification for digital piracy: A mixed-methods study. Social Science Computer Review, 31(4), 439–457.
    [41]. Yu, S. (2013). Digital piracy justification: Asian students versus American students. Deviant Behavior, 35(4), 334–356.
    [42]. 누누티비 방지3법 [Three bills for the prevention of noonoo TV]. (2023, September 12). Danbi News. Retrieved from https://www.danbinews.com/news/articleView.html?idxno=24365
    [43]. 누누티비 방지법’ 국회 본회의 통과…“접속차단 기술 의무화” ['Noonoo TV prevention law' passes National Assembly plenary session… "Mandatory access blocking technology"]. (2023, December 20). Dong-A Ilbo. Retrieved from https://www.donga.com/news/Economy/article/all/20231220/122715489/1



    Additional Information

    Article Title: Public Attitudes and Justifications on Illegal Streaming Sites in South Korea: A Content Analysis
    Author(s): CHOI, Sinyong; JUNG, Bo Ra; PARK, Seong-Min
    Date of Publication: 2025-06-30
    Publication: International Journal of Information Security and Cybercrime
    ISSN: 2285-9225 e-ISSN: 2286-0096
    Digital Object Identifier: 10.19107/IJISC.2025.01.06
    Issue: Volume XIV, Issue 1, Year 2025
    Section: Cyber-Attacks Evolution and Cybercrime Trends
    Page Range: 88-106 (19 pages)



    Copyright ©2012-2025
    The International Journal of Information Security and Cybercrime (IJISC)

    All rights reserved
    The International Journal of Information Security and Cybercrime is a trademark of the Romanian Association for Information Security Assurance (RAISA).
    No part of this publication may be reproduced, stored in a retrieval system, photocopied, recorded or archived, without the written permission from RAISA. When authors submit their papers for publication, they agree that the copyright for their article be transferred to the Romanian Association for Information Security Assurance, if the articles are accepted for publication. The copyright covers the exclusive rights to reproduce and distribute the article, including reprints and translations.