Abstract
The article reports findings of a study conducted to explore the cognitive moral logics used for considering software piracy as ethical or unethical. Since the objective was to elicit the moral logics from the respondents, semi-structured in-depth interviews of 38 software professionals of India were conducted. The content of the interviews was analyzed using the grounded theory framework which does not begin with constructs and their interlinkages and then seek proof instead it begins with an area of study and allows them to emerge from that area of study. Given the objective of exploring moral logics, grounded theory seemed an appropriate choice. Results revealed that 21 respondents considered software piracy unethical whereas 17 did not. Though economic reasons formed the most fundamental logic in both the cases, an overall analysis revealed that the respondents mostly used moral justification (neutralization) for not considering software piracy unethical whereas those considering it unethical used normative (principled) logics. The interconnections among logics are analyzed and results are discussed along with the limitations of the study.
Similar content being viewed by others
References
Ajzen I. 1989, Attitude Structure and Behavior, in A. R. Pratkanis, S. J. Breckler, A. G. Greenwald (eds.), Attitude Structure and Function, (Lawrence Erlbaum Associates, Hillsdale, NJ), pp. 241–274
Ajzen I. 1991, The Theory of Planned Behavior, Organizational Behavior and Human Decision Processes 50, 179–211
Akaah I. 1997, Influence of Deontological and Teleological Factors on Research Ethics Evaluations, Journal of Business Research, 39(2), 71–80
Arthur H. B. 1984, Making Business Ethics Useful, Strategic Management Journal, 5, 319–313
Ashill N., J. Davies, M. Frederikson 2003, Strategic Marketing Planning: A Grounded Investigation, European Journal of Marketing, 37, 430–460
Banerjee D., T. P. Cronan, T. W. Jones 1998, Modeling IT Ethics: A Study in Situational Ethics, MIS Quarterly, 22(1), 31–60
Baskerville R., J. Pries-Heje 1999, Grounded Action Research: A Method for Understanding IT in Practice, Accounting Management and Information Technologies, 9(1), 1–23
Brady F. N., G. E. Wheeler 1996, An Empirical Study of Ethical Predispositions, Journal of Business Ethics, 15, 927–940
Brinkmann J. 2002, Business and Marketing Ethics: Concepts, Approaches and Typologies, Journal of Business Ethics, 41, 159–177
Business Software Alliance: 2006, Web-Page of Business Software Alliance, 15 Jan 2007. [www document]. URL http://www.bsa.org/
Casement, W.: 1983, ‹Values, Clarification, Kohlberg and Choosing’, Counseling & Values 27(3), 130–140
Corbin J., A. Strauss 1990, Grounded Theory Research: Procedures, Canons, and Evaluative Criteria, Qualitative Sociology, 13, 3–21
Diamantopoulos A., K. Inglis 1998, Identifying Differences Between High and Low Involvement Exporters, International Marketing Review, 5(2), 52–60
Eisenhardt K. 1989, Building Theories from Case Study Research, Academy of Management Review, 14, 532–550
Ferrell O. C., L. G. Gresham 1985, A Contingency Framework for Understanding Ethical Decision Making in Marketing, Journal of Marketing, 49, 87–96
Forsyth D. R. 1980, A Taxonomy of Ethical Ideologies, Journal of Personality and Social Psychology, 39(1), 175–184
Forsyth D. R. 1992, Judging the Morality of Business Practices: The Influence of Personal Moral Philosophies, Journal of Business Ethics, 11, 461–470
Fritzsche D. J., H. Becker 1984, Linking Management Behavior to Ethical Philosophy: An Empirical Investigation, Academy of Management Review, 27(1), 166–172
Gersick C. J. G. 1988, Time and Transition in Work Teams: Towards a New Model of Group Development, Academy of Management Journal, 31(1), 9–41
Glaser B. G. 1992, Emergence vs. Forcing: Basics of Grounded Theory Analysis, (Sociology Press, Mill Valley, CA)
Glaser B. G., A. L. Strauss 1967, The Discovery of Grounded Theory: Strategies for Qualitative Research, (Aldine, New York)
Glass R. S., A. W. Wood 1996, Situational Determinants of Software Piracy: An Equity Theory Perspective, Journal of Business Ethics, 15, 1189–1198
Gopal D. R., L. G. Sanders 1997, Preventive and Deterrent Controls for Software Piracy, Journal of Management Information Systems, 13(4), 29– 47
Gopal D. R., L. G. Sanders 1998, International Software Piracy: Analysis of Key Issues and Impact, Information Systems Research, 9(4), 380–398
Gopal D. R., L. G. Sanders 2000, Global Software Piracy: You Cant Get Blood Out of a Turnip, Communications of the ACM, 43, 82—89
Hunt S. D., A. Z. Vasquez-Parrage 1993, Organizational Consequences, Marketing Ethics and Sales Force Supervision, Journal of Marketing Research, 21, 78–90
Hunt S. D., S. Vitell 1986, A General Theory of Marketing Ethics, Journal of Macromarketing, 5, 7–17
Im, J. and P. Van Epps: 1991, Software Piracy and Software Security in Business Schools: An Ethical Perspective, The DATABASE for Advances in Information Systems, 15–21
Jones M. T. 1991, Ethical Decision Making by Individuals in Organizations: An Issue Contingent Model, Academy of Management Review, 16(2), 366–395
Kohlberg L. 1984, The Philosophy of Moral Development, (Harper and Row, San Francisco, CA)
Laczniak G. R. 1983, Business Ethics: A Manager’s Primer, Business, 33, 23–29
Laczniak G. R., P. E. Murphy 1991, Fostering Ethical Decision, Journal of Business Ethics, 10, 259–271
Loch K. D., S. Conger 1996, Evaluating Ethical Decision Making and Computer Use, Communication of the ACM, 39(7), 74–83
Mayo M. A., L. J. Marks 1990, An Empirical Investigation of a General Theory of Marketing Ethics, Journal of the Academy of Marketing Science, 18(2), 163–171
McDonald G., P. C. Pak 1996, It’s All Fair in Love and Business: Cognitive Philosophies in Ethical Decision-Making, Journal of Business Ethics, 15, 973–996
Miner M., A. Petocz 2003, Moral Theory in Ethical Decision Making: Problems, Clarifications and Recommendations from a Psychological Perspective, Journal of Business Ethics, 42(1), 11–25
Premeaux S. R., R. W. Mandy 1993, Linking Management Behavior to Ethical Philosophy, Journal of Business Ethics, 1, 349–357
Reid R., J. Thompson, J. Logsdon 1992, Knowledge and Attitude of Management Students Towards Software Piracy, Journal of Computing Information Systems, 33, 46–51
Schminke M., M. L. Ambrose, T. W. Neel 1997, The Effect of Ethical Frameworks on Perception of Organizational Justice, Academy of Management Journal, 40(5), 1190–1207
Shim, J. P. and G.S. Taylor 1989, ‹‹Practicing Managers’ Perception/Attitudes Towards Illegal Software Copying’, OR/MS Today 16(4), 30–33
Simpson P. M., Banerjee D., Simpson C. L. Jr. (1994). Softlifting: A Model of Motivating Factors. Journal of Business Ethics, 13(6), 431–438
Solomon S., J. O’Brien 1990, The Effect of Demographic Factors on Attitudes Toward Software Piracy. Journal of Computer Information Systems, 31, 45–55
Steiner, G. A. and J. E. Steiner: 1998, Business Government and Society: A Management Perspective, 4th Edition (Random House)
Strauss A., J. Corbin 1990, Basics of Qualitative Research: Grounded Theory Procedures and Techniques, (Newbury Park, CA, Sage)
Strikwerda R. B., J. M. Ross 1992, Software and Ethical Softness, Collegiate Microcomputer, 3, 143–156
Trevino L. K. 1986, Ethical Decision-Making in Organizations: A Person-Situation Interacionist Model, Academy of Management Review, 11, 601–617
Victor B., L. B. Trevine, D. L. Shapiro 1993, Peer Reporting of Unethical Behavior: The Influence of Justice Evaluations and Social Context Factors, Journal of Business Ethics, 12, 253–263
Vitell S. J., S. D. Hunt 1990, The General Theory of Marketing Ethics: A Partial Test of the Model, in J. N. Sheth, (ed.) Research in Marketing, Vol. 10 (JAI Press, Greenwich, CT) pp. 237–265
Whetten D. A. 1989, What Constitutes a Theoretical Contribution, Academy of Management Review, 14, 490–495
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Bhal, K.T., Leekha, N.D. Exploring Cognitive Moral Logics Using Grounded Theory: The Case of Software Piracy. J Bus Ethics 81, 635–646 (2008). https://doi.org/10.1007/s10551-007-9537-7
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10551-007-9537-7