Skip to main content
Log in

Exploring Cognitive Moral Logics Using Grounded Theory: The Case of Software Piracy

  • Published:
Journal of Business Ethics Aims and scope Submit manuscript

Abstract

The article reports findings of a study conducted to explore the cognitive moral logics used for considering software piracy as ethical or unethical. Since the objective was to elicit the moral logics from the respondents, semi-structured in-depth interviews of 38 software professionals of India were conducted. The content of the interviews was analyzed using the grounded theory framework which does not begin with constructs and their interlinkages and then seek proof instead it begins with an area of study and allows them to emerge from that area of study. Given the objective of exploring moral logics, grounded theory seemed an appropriate choice. Results revealed that 21 respondents considered software piracy unethical whereas 17 did not. Though economic reasons formed the most fundamental logic in both the cases, an overall analysis revealed that the respondents mostly used moral justification (neutralization) for not considering software piracy unethical whereas those considering it unethical used normative (principled) logics. The interconnections among logics are analyzed and results are discussed along with the limitations of the study.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  • Ajzen I. 1989, Attitude Structure and Behavior, in A. R. Pratkanis, S. J. Breckler, A. G. Greenwald (eds.), Attitude Structure and Function, (Lawrence Erlbaum Associates, Hillsdale, NJ), pp. 241–274

    Google Scholar 

  • Ajzen I. 1991, The Theory of Planned Behavior, Organizational Behavior and Human Decision Processes 50, 179–211

    Article  Google Scholar 

  • Akaah I. 1997, Influence of Deontological and Teleological Factors on Research Ethics Evaluations, Journal of Business Research, 39(2), 71–80

    Article  Google Scholar 

  • Arthur H. B. 1984, Making Business Ethics Useful, Strategic Management Journal, 5, 319–313

    Article  Google Scholar 

  • Ashill N., J. Davies, M. Frederikson 2003, Strategic Marketing Planning: A Grounded Investigation, European Journal of Marketing, 37, 430–460

    Article  Google Scholar 

  • Banerjee D., T. P. Cronan, T. W. Jones 1998, Modeling IT Ethics: A Study in Situational Ethics, MIS Quarterly, 22(1), 31–60

    Article  Google Scholar 

  • Baskerville R., J. Pries-Heje 1999, Grounded Action Research: A Method for Understanding IT in Practice, Accounting Management and Information Technologies, 9(1), 1–23

    Article  Google Scholar 

  • Brady F. N., G. E. Wheeler 1996, An Empirical Study of Ethical Predispositions, Journal of Business Ethics, 15, 927–940

    Article  Google Scholar 

  • Brinkmann J. 2002, Business and Marketing Ethics: Concepts, Approaches and Typologies, Journal of Business Ethics, 41, 159–177

    Article  Google Scholar 

  • Business Software Alliance: 2006, Web-Page of Business Software Alliance, 15 Jan 2007. [www document]. URL http://www.bsa.org/

  • Casement, W.: 1983, ‹Values, Clarification, Kohlberg and Choosing’, Counseling & Values 27(3), 130–140

  • Corbin J., A. Strauss 1990, Grounded Theory Research: Procedures, Canons, and Evaluative Criteria, Qualitative Sociology, 13, 3–21

    Article  Google Scholar 

  • Diamantopoulos A., K. Inglis 1998, Identifying Differences Between High and Low Involvement Exporters, International Marketing Review, 5(2), 52–60

    Article  Google Scholar 

  • Eisenhardt K. 1989, Building Theories from Case Study Research, Academy of Management Review, 14, 532–550

    Article  Google Scholar 

  • Ferrell O. C., L. G. Gresham 1985, A Contingency Framework for Understanding Ethical Decision Making in Marketing, Journal of Marketing, 49, 87–96

    Article  Google Scholar 

  • Forsyth D. R. 1980, A Taxonomy of Ethical Ideologies, Journal of Personality and Social Psychology, 39(1), 175–184

    Article  Google Scholar 

  • Forsyth D. R. 1992, Judging the Morality of Business Practices: The Influence of Personal Moral Philosophies, Journal of Business Ethics, 11, 461–470

    Article  Google Scholar 

  • Fritzsche D. J., H. Becker 1984, Linking Management Behavior to Ethical Philosophy: An Empirical Investigation, Academy of Management Review, 27(1), 166–172

    Article  Google Scholar 

  • Gersick C. J. G. 1988, Time and Transition in Work Teams: Towards a New Model of Group Development, Academy of Management Journal, 31(1), 9–41

    Article  Google Scholar 

  • Glaser B. G. 1992, Emergence vs. Forcing: Basics of Grounded Theory Analysis, (Sociology Press, Mill Valley, CA)

    Google Scholar 

  • Glaser B. G., A. L. Strauss 1967, The Discovery of Grounded Theory: Strategies for Qualitative Research, (Aldine, New York)

    Google Scholar 

  • Glass R. S., A. W. Wood 1996, Situational Determinants of Software Piracy: An Equity Theory Perspective, Journal of Business Ethics, 15, 1189–1198

    Article  Google Scholar 

  • Gopal D. R., L. G. Sanders 1997, Preventive and Deterrent Controls for Software Piracy, Journal of Management Information Systems, 13(4), 29– 47

    Google Scholar 

  • Gopal D. R., L. G. Sanders 1998, International Software Piracy: Analysis of Key Issues and Impact, Information Systems Research, 9(4), 380–398

    Article  Google Scholar 

  • Gopal D. R., L. G. Sanders 2000, Global Software Piracy: You Cant Get Blood Out of a Turnip, Communications of the ACM, 43, 82—89

    Article  Google Scholar 

  • Hunt S. D., A. Z. Vasquez-Parrage 1993, Organizational Consequences, Marketing Ethics and Sales Force Supervision, Journal of Marketing Research, 21, 78–90

    Article  Google Scholar 

  • Hunt S. D., S. Vitell 1986, A General Theory of Marketing Ethics, Journal of Macromarketing, 5, 7–17

    Google Scholar 

  • Im, J. and P. Van Epps: 1991, Software Piracy and Software Security in Business Schools: An Ethical Perspective, The DATABASE for Advances in Information Systems, 15–21

  • Jones M. T. 1991, Ethical Decision Making by Individuals in Organizations: An Issue Contingent Model, Academy of Management Review, 16(2), 366–395

    Article  Google Scholar 

  • Kohlberg L. 1984, The Philosophy of Moral Development, (Harper and Row, San Francisco, CA)

    Google Scholar 

  • Laczniak G. R. 1983, Business Ethics: A Manager’s Primer, Business, 33, 23–29

    Google Scholar 

  • Laczniak G. R., P. E. Murphy 1991, Fostering Ethical Decision, Journal of Business Ethics, 10, 259–271

    Article  Google Scholar 

  • Loch K. D., S. Conger 1996, Evaluating Ethical Decision Making and Computer Use, Communication of the ACM, 39(7), 74–83

    Article  Google Scholar 

  • Mayo M. A., L. J. Marks 1990, An Empirical Investigation of a General Theory of Marketing Ethics, Journal of the Academy of Marketing Science, 18(2), 163–171

    Article  Google Scholar 

  • McDonald G., P. C. Pak 1996, It’s All Fair in Love and Business: Cognitive Philosophies in Ethical Decision-Making, Journal of Business Ethics, 15, 973–996

    Article  Google Scholar 

  • Miner M., A. Petocz 2003, Moral Theory in Ethical Decision Making: Problems, Clarifications and Recommendations from a Psychological Perspective, Journal of Business Ethics, 42(1), 11–25

    Article  Google Scholar 

  • Premeaux S. R., R. W. Mandy 1993, Linking Management Behavior to Ethical Philosophy, Journal of Business Ethics, 1, 349–357

    Article  Google Scholar 

  • Reid R., J. Thompson, J. Logsdon 1992, Knowledge and Attitude of Management Students Towards Software Piracy, Journal of Computing Information Systems, 33, 46–51

    Google Scholar 

  • Schminke M., M. L. Ambrose, T. W. Neel 1997, The Effect of Ethical Frameworks on Perception of Organizational Justice, Academy of Management Journal, 40(5), 1190–1207

    Article  Google Scholar 

  • Shim, J. P. and G.S. Taylor 1989, ‹‹Practicing Managers’ Perception/Attitudes Towards Illegal Software Copying’, OR/MS Today 16(4), 30–33

  • Simpson P. M., Banerjee D., Simpson C. L. Jr. (1994). Softlifting: A Model of Motivating Factors. Journal of Business Ethics, 13(6), 431–438

    Article  Google Scholar 

  • Solomon S., J. O’Brien 1990, The Effect of Demographic Factors on Attitudes Toward Software Piracy. Journal of Computer Information Systems, 31, 45–55

    Google Scholar 

  • Steiner, G. A. and J. E. Steiner: 1998, Business Government and Society: A Management Perspective, 4th Edition (Random House)

  • Strauss A., J. Corbin 1990, Basics of Qualitative Research: Grounded Theory Procedures and Techniques, (Newbury Park, CA, Sage)

    Google Scholar 

  • Strikwerda R. B., J. M. Ross 1992, Software and Ethical Softness, Collegiate Microcomputer, 3, 143–156

    Google Scholar 

  • Trevino L. K. 1986, Ethical Decision-Making in Organizations: A Person-Situation Interacionist Model, Academy of Management Review, 11, 601–617

    Article  Google Scholar 

  • Victor B., L. B. Trevine, D. L. Shapiro 1993, Peer Reporting of Unethical Behavior: The Influence of Justice Evaluations and Social Context Factors, Journal of Business Ethics, 12, 253–263

    Article  Google Scholar 

  • Vitell S. J., S. D. Hunt 1990, The General Theory of Marketing Ethics: A Partial Test of the Model, in J. N. Sheth, (ed.) Research in Marketing, Vol. 10 (JAI Press, Greenwich, CT) pp. 237–265

    Google Scholar 

  • Whetten D. A. 1989, What Constitutes a Theoretical Contribution, Academy of Management Review, 14, 490–495

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kanika Tandon Bhal.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Bhal, K.T., Leekha, N.D. Exploring Cognitive Moral Logics Using Grounded Theory: The Case of Software Piracy. J Bus Ethics 81, 635–646 (2008). https://doi.org/10.1007/s10551-007-9537-7

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10551-007-9537-7

Keywords

Navigation