fullrecord |
[{"key": "dc.contributor.author", "value": "Riekkinen, Janne", "language": null, "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2013-01-23T10:51:17Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2013-01-23T10:51:17Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2012", "language": null, "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.other", "value": "oai:jykdok.linneanet.fi:1245093", "language": null, "element": "identifier", "qualifier": "other", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/40748", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "T\u00e4ss\u00e4 pro gradu -tutkielmassa tarkasteltiin 2010-luvun nuorten harjoittamaa\nmusiikkipiratismia soveltamalla Gresham Sykesin ja David Matzan neutralisaatioteoriaa.\nTutkielman keski\u00f6ss\u00e4 oli kysymys siit\u00e4, pit\u00e4v\u00e4tk\u00f6 niin kutsuttuun Z-sukupolveen\nkuuluvat t\u00e4m\u00e4n p\u00e4iv\u00e4n nuoret musiikki- tai muuta Internet-piratismia\neettisesti kest\u00e4v\u00e4n\u00e4 toimintamallina. Erityisen kiinnostuksen kohteina\nolivat neutralisaatioteorian k\u00e4sitteist\u00f6\u00f6n kuuluvat neutralisaation tekniikat ja\nniiden k\u00e4ytt\u00f6 musiikkipiratismin yhteydess\u00e4. Tutkielmassa sovellettiin laadullista\ntutkimusotetta: tutkimusmenetelmin\u00e4 k\u00e4ytettiin kirjallisuuskatsausta ja\npuolistrukturoituja haastatteluja.\nTutkimuksen perusteella Z-sukupolvi tunnistaa piratismiin liittyv\u00e4t eettiset\nja taloudelliset ongelmat. Haastateltavien puheissa esiintyi my\u00f6s neutralisaation\ntekniikoita, joista kaikkein tunnusomaisimpia olivat \u201dv\u00e4ite normaaliudesta\u201d,\n\u201duhrin kielt\u00e4minen\u201d ja \u201doikeutus vertailusta\u201d. Huomioitavaa oli \u201dvahingon\nkielt\u00e4misen\u201d harvinaisuus. Kokonaisuutena arvioiden neutralisaatiot esiintyiv\u00e4t\nhieman aiemmista tutkimuksista poikkeavalla tavalla. Havaintojen perusteella\nvoidaan sanoa, ett\u00e4 Sykesin ja Matzan neutralisaatioteoria osoittautui\ntoimivaksi menetelm\u00e4ksi my\u00f6s Z-sukupolven piratismin tutkimukseen.\nHaastateltavien vastausten perusteella tunnistettiin erilaisia piraattityyppej\u00e4.\nOsa vastaajista latasi p\u00e4\u00e4osin muita sis\u00e4lt\u00f6j\u00e4 kuin musiikkia, sill\u00e4 musiikin\nlaillinen tarjonta oli heid\u00e4n mielest\u00e4\u00e4n hyv\u00e4ll\u00e4 tasolla. Toiset taas latasivat yksinomaan\nmusiikkia, eiv\u00e4tk\u00e4 olleet valmiita k\u00e4ytt\u00e4m\u00e4\u00e4n rahaa ainakaan Internetiss\u00e4\ntoimiviin digitaalisen musiikin palveluihin. N\u00e4iden vastaajatyyppien\nerot n\u00e4kyiv\u00e4t osaltaan my\u00f6s k\u00e4ytetyiss\u00e4 neutralisaation tekniikoissa, mutta pidemm\u00e4lle\nmenevien johtop\u00e4\u00e4t\u00f6sten tekemiseksi ja toimivien piratismia ehk\u00e4isevien\nstrategioiden l\u00f6yt\u00e4miseksi aihetta tulisi tutkia my\u00f6s m\u00e4\u00e4r\u00e4llisesti. Tutkimuksen\nhavaintojen perusteella paras keino piratismin vastaisessa taistelussa\non palveluiden jatkuva kehitt\u00e4minen.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "In this Master's Thesis, music piracy among the youth of the 2010's was studied\nby applying Gresham Sykes and David Matza's neutralization theory. A key\nquestion in the thesis was whether the so called Generation Z youths view online\npiracy as an ethically sound form of behavior. Of particular interest were\ntechniques of neutralization and their uses in dealings with music piracy. The\nstudy was conducted with qualitative research approach: applied methodologies\nincluded a literature review and semi-structured interviews.\nAccording to the study, Generation Z youths identify the ethical and economic\nproblems of music piracy. Techniques of neutralization were also used,\nalbeit in a different manner than in studies conducted among older individuals.\nThe most characteristic of the employed techniques was \u201cclaim of normalcy\u201d,\nwith \u201cdenial of victim\u201d and \u201cjustification by comparison\u201d also appearing frequently.\n\u201cDenial of injury\u201d was notable for its infrequent usage. Based on these\nfindings, the study confirms that neutralization theory can be applied to Generation\nZ music piracy research.\nDifferent types of pirates were identified after analyzing the interview\ndata. Some respondents downloaded mainly non-music content, and felt that\nonline music services had eliminated the need to pirate music. Others, however,\nwere strictly music pirates and had little to no interest in downloading other\ncontent types or using money online. The groups appeared to differ slightly in\ntheir usage of neutralizations, but this issue has to be confirmed by quantitative\nstudies. Quantitative approach on Generation Z is also needed for designing effective\npiracy-deterring strategies. According to this study, the most effective\nway to deter piracy is the continuous development of services.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted using Plone Publishing form by Janne Riekkinen (japaheri) on 2013-01-23 10:51:17.020086. Form: Pro gradu -lomake (1 tekij\u00e4) (https://kirjasto.jyu.fi/julkaisut/julkaisulomakkeet/pro-gradu-lomake-1-tekijae). JyX data:", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by jyx lomake-julkaisija (jyx-julkaisija@noreply.fi) on 2013-01-23T10:51:17Z\nNo. of bitstreams: 2\nURN:NBN:fi:jyu-201301231104.pdf: 459848 bytes, checksum: aefc914110823934bc5b63e606d015ce (MD5)\nlicense.html: 5026 bytes, checksum: 4c8f27139960054101a5e4cee38930a1 (MD5)", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2013-01-23T10:51:17Z (GMT). No. of bitstreams: 2\nURN:NBN:fi:jyu-201301231104.pdf: 459848 bytes, checksum: aefc914110823934bc5b63e606d015ce (MD5)\nlicense.html: 5026 bytes, checksum: 4c8f27139960054101a5e4cee38930a1 (MD5)\n Previous issue date: 2012", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "66 s", "language": null, "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.format.mimetype", "value": "application/pdf", "language": null, "element": "format", "qualifier": "mimetype", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "z-sukupolvi", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Musiikkipiratismi 2010-luvun nuorten keskuudessa - erityispiirteet ja neutralisaatiot", "language": null, "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "master thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-201301231104", "language": null, "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Master\u2019s thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Pro gradu -tutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Tietojenk\u00e4sittelytieteiden laitos", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Department of Computer Science and Information Systems", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Information Systems Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietoj\u00e4rjestelm\u00e4tiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.method", "value": "Haastattelututkimus", "language": null, "element": "subject", "qualifier": "method", "schema": "dc"}, {"key": "dc.date.updated", "value": "2013-01-23T10:51:17Z", "language": null, "element": "date", "qualifier": "updated", "schema": "dc"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_bdcc", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": "fi", "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "masterThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": null, "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "piratismi", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "musiikki", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "neutralisaatioteoria", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "nuoret", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "asenteet", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.format.content", "value": "fulltext", "language": null, "element": "format", "qualifier": "content", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}, {"key": "dc.type.okm", "value": "G2", "language": null, "element": "type", "qualifier": "okm", "schema": "dc"}]
|