Advertisement

Journal of Business Ethics

, Volume 63, Issue 3, pp 237–259 | Cite as

Digital Piracy: Factors that Influence Attitude Toward Behavior

  • Sulaiman Al-RafeeEmail author
  • Timothy Paul Cronan
Article

Abstract

A new form of software piracy known as digital piracy has taken the spotlight. Lost revenues due to digital piracy could reach $5 billion by the end of 2005.Preventives and deterrents do not seem to be working – losses are increasing. This study examines factors that influence an individual’s attitude toward pirating digital material. The results of this study suggest that attitude toward digital pirating is influenced by beliefs about the outcome of behavior (cognitive beliefs), happiness and excitement (affective beliefs), age, the perceived importance of the issue, the influence of significant others (subjective norms), and machiavellianism. Given these results, measures can be developed which could alter attitudes toward digital piracy.

Keywords

attitude toward digital piracy ethical behavior 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Eighth Annual BSA Global Software Piracy Study. Washington DC, Business Software Alliance, 2003Google Scholar
  2. Ajzen, I. 1985’From Intentions to Behavior: A Theory of Planned Behavior’Kuhl, J.Beckman, J. eds. Action-Control: From Cognition to BehaviorSpringerHeidelberg1139Google Scholar
  3. Ajzen, I. 1991‘The Theory of Planned Behavior’Organizational Behavior and Human Decision Processes50179211Google Scholar
  4. Ajzen, I. 2001‘Nature and Operations of Attitudes’Annual Review of Psychology522758CrossRefGoogle Scholar
  5. Allport, G. 1935AttitudesMurchison, C. eds. Handbook of Social PsychologyClark University PressWorcester, MA798844Google Scholar
  6. Auerbach, J. A. and J. C. Welsh: 1994, Aging and Competition: Rebuilding the U.S. workforce. National Council on the Aging-National Planning Association Symposium. Washington DC, ISBN: 0890681287Google Scholar
  7. Bagozzi, R., Phillips, L. 1991‘Assessing Construct Validity in Organizational Research’Administrative Sciences Quarterly36421458Google Scholar
  8. Banerjee, D., Cronan, T. P. 1998‘Modeling IT Ethics: A Study in Situational Ethics’MIS Quarterly223160Google Scholar
  9. Barger, R. N., W. N. Kubitschek and J. C. Barger: 1998, Do Philosophical Tendencies Correlate with Personality Types? Annual Meeting of the American Educational Research Association, San Diego, CA, April 13–17Google Scholar
  10. Bass, K., Barnett, T. 1999‘Individual Difference Variables, Ethical Judgments and Ethical Behavioral Intentions’Business Ethics Quarterly9183205Google Scholar
  11. Beck, L., Ajzen, I. 1991‘Predicting Dishonest Actions Using the Theory of Planned Behavior’Journal of Research in Personality25285301CrossRefGoogle Scholar
  12. Bhattacharjee, S., Gopal, R. 2003‘Digital Music and Online Sharing: Software Piracy 2.0?’Communication of the ACM46107111CrossRefGoogle Scholar
  13. Bodur, H., Brinberg, D. 2000‘Belief, Affect, and Attitude: Alternative Models of the Determinants of Attitude’Journal of Consumer Psychology91728CrossRefGoogle Scholar
  14. Bommer, M., Gratto, C. 1987‘A Behavioral Model of Ethical and Unethical Decision Making’Journal of Business Ethics6265280CrossRefGoogle Scholar
  15. Borkowski, S., Ugras, Y. 1998‘Business Students and Ethics: a Meta-Analysis’Journal of Business Ethics1711171127Google Scholar
  16. Breusch, T. and A. Pagan: 1980, ‘The LM Test and Its Applications to Model Specification in Econometrics’, Review of Economic Studies (January), 153–177Google Scholar
  17. Chang, M. 1998‘Predicting Unethical Behavior: A Comparison of the Theory of Reasoned Action and the Theory of Planned Behavior’Journal of Business Ethics1718251834CrossRefGoogle Scholar
  18. Cheng, H., Sims, R. 1997‘To Purchase or to Pirate Software: An Empirical Study’Journal of Management Information Systems44960Google Scholar
  19. Christensen, A., Fining, M. 1991‘Factors Influencing Software Piracy: Implications for Accountants’Journal of Information Systems56750Google Scholar
  20. Christie, R., Geis, F. 1970Studies in MachiavellianismAcademic PressNew YorkGoogle Scholar
  21. Conner, K., Rumlet, R. 1991‘Software Piracy: An Analysis of Protection Strategies’Management Science37125139CrossRefGoogle Scholar
  22. Conner, M., Armitage, C. 1998‘Extending the Theory of Planned Behavior: A Review and Avenues for Further Research’Journal of Applied Social Psychology2814291464Google Scholar
  23. Coombe, K., Newman, L. 1997‘Ethics in Early Childhood Field Experiences’Journal of Australian Research in Early Childhood Education119Google Scholar
  24. Dawson, L. 1997‘Ethical Differences Between Men and Women in The Sales Profession’Journal of Business Ethics1611431152CrossRefGoogle Scholar
  25. Digman, J. 1990‘Personality Structure: An Emergence of the Five-Factor Model’The Annual Review of Psychology41417440Google Scholar
  26. Dubinsky, A., Loken, B. 1989‘Analyzing Ethical Decision Making in Marketing’Journal of Business Research1983107CrossRefGoogle Scholar
  27. Eining, M., Christensen, A. 1991‘A Psycho-Social Model of Software Piracy: The Development and Test of a Model’Dejorie, R.Fowler, G.Paradice, D. eds. Ethical Issues in Information SystemsBoyd and FraserBoston, MAGoogle Scholar
  28. Fishbein, M., Ajzen, I. 1975Attitude, Intention, and Behavior: An Introduction to Theory and ResearchAddison-WesleyReading, MAGoogle Scholar
  29. Fishbein, M., Middlestadt, S. 1995‘Noncognitive Effects on Attitude Formation and Change: Fact or Artifact?’Journal of Consumer Psychology4181202CrossRefGoogle Scholar
  30. Flannery, B., May, D. 2000‘Environmental Ethical Decision Making in the U.S. Metal-Finishing Industry’Academy of Management Journal43642662Google Scholar
  31. Ford, R., Richardson, W. 1994‘Ethical Decision Making: A Review of the Empirical Literature’Journal of Business Ethics13(March)205Google Scholar
  32. Glass, R., Wood, W. 1996‘Situational Determinants of Software Piracy: An Equity Theory Perspective’Journal of Business Ethics1511891198CrossRefGoogle Scholar
  33. Gopal, R., Sanders, L. 1997‘Preventive and Deterrent Controls for Software Piracy’Journal of Management Information Systems132947Google Scholar
  34. Haddock, G., Zanna, M. 1998‘Assessing the Impact of Affective and Cognitive Information in Predicting Attitudes toward Capital Punishment’Law and Human Behavior22325339CrossRefGoogle Scholar
  35. Hegarty, W. H., Sim, H. P.,Jr. 1978‘Some Determinants of Unethical Decision Behavior: An Experiment’Journal of Applied Psychology63451Google Scholar
  36. Hegarty, W. H., Sims, H. P.,Jr. 1979‘Organizational Philosophy, Policies, and Objectives Related to Unethical Decision Behavior: A Laboratory Experiment’Journal of Applied Psychology64331Google Scholar
  37. Holbrook, M., Batra, R. 1987‘Assessing the Role of Emotions as Mediators of Consumer Responses to Advertising’Journal of Consumer Research14404420Google Scholar
  38. Hunt, S., Vitell, S. 1986‘A General Theory of Marketing Ethics’Journal of Micromarketing6516Google Scholar
  39. Im, J. and P. Van Epps: 1991, ‘Software Piracy and Software Security in Business Schools: An Ethical Perspective’, The DATABASE for Advances in Information Systems (Summer), 15–21Google Scholar
  40. Jones, G., Kavanagh, M. 1996‘An Experimental Examination of the Effects of individual and situational fact that is on Unethical Behavioral Intentions in the Workplace’Journal of Business Ethics15511523CrossRefGoogle Scholar
  41. Kempf, D. 1999‘Attitude Formation from Product Trials: Distinct Roles of Cognition and Affect for Hedonic and Functional Products’Psychology and Marketing163550CrossRefGoogle Scholar
  42. Khazanchi, D. 1995‘Unethical Behavior in Information-Systems – The Gender Factor’Journal of Business Ethics14741749CrossRefGoogle Scholar
  43. Kohlberg, L. 1969Stages and Sequence: The Cognitive-Developmental Approach to SocializationGrosling,  D. eds. Handbook of Socialization Theory and ResearchRand McnallyChicagoGoogle Scholar
  44. Kreie, J., Cronan, P. 1999a‘Copyright, Piracy, Privacy, and Security Issues: Acceptable or Unacceptable Actions for End Users?’Journal of End User Computing111321Google Scholar
  45. Kreie, J., Cronan, P. 1999b‘How Men and Women View Ethics’Communications of the ACM417076Google Scholar
  46. Kreie, J., Cronan, P. 2000‘Making Ethical Decisions’Communications of the ACM436672CrossRefGoogle Scholar
  47. Kuo, F., Hsu, M. 2001‘Development and Validation of Ethical Computer Self-Efficacy Measure: The Case of Softlifting’Journal of Business Ethics32299315CrossRefGoogle Scholar
  48. Lau, E. 2003‘An Empirical Study of Software Piracy’Business Ethics12233245CrossRefGoogle Scholar
  49. Leonard, L., Cronan, T. P. 2001‘Illegal, Inappropriate, and Unethical Behavior in an Information Technology Contexts: A Study to explain Influence’Journal of the Association for Information Systems1131Google Scholar
  50. Limayem, M. and M. Khalifa, et al.: 1999, ‘Factors Motivating Software Piracy: A Longitudinal Study’, Proceedings of the International Conference on Information Systems, pp. 124–131Google Scholar
  51. Loch, K., Conger, S. 1996‘Evaluating Ethical Decision Making and Computer Use’Communications of the ACM397483CrossRefGoogle Scholar
  52. Madden, T., Ellen, P. 1992‘A Comparison of the Theory of Planned Behavior and the Theory of Reasoned Action’Personality and Social Psychology Bulletin1839Google Scholar
  53. Moseley, O. and R. Whitis: 1995, ‘Preventing Software Piracy’, Management Accounting (December), 42–47Google Scholar
  54. Neter, J., Wasserman, W. 1985Applied Linear Statistical ModelsIrwinHomewood, ILGoogle Scholar
  55. Nunnaly, J. 1978Psychometric TheoryMcGraw-HillNYGoogle Scholar
  56. O’Leary-Kelly, S., Vokura, R. 1998‘The Empirical Assessment of Construct Validity’Journal of Operations Management16387405Google Scholar
  57. Olson, J., Zanna, M. 1993‘Attitudes and Attitude Change’Annual Review of Psychology44117154CrossRefGoogle Scholar
  58. Peace, A., Gallette, D. 2003‘Software Piracy in the Workplace: A Model and Empirical Test’Journal of Management Information Systems20153177Google Scholar
  59. Pedhauzr, E., Schmelkin, L. 1991Measurement, Design, and Analysis: An Integrated ApproachLawrence Erlbaum Associates, PublishersHillsdale, NJGoogle Scholar
  60. Petty, R., Wegener, D. 1997‘Attitudes and Attitude Change’Annual Review of Psychology48609647CrossRefGoogle Scholar
  61. Randall, D., Gibson, A. 1991‘Ethical Decision Making in the Medical Profession: An Application of the Theory of Planned Behavior’Journal of Business Ethics10111122Google Scholar
  62. Reid, R., Thompson, J. 1992‘Knowledge and Attitudes of Management Students Toward Software Piracy’Journal of Computer Information Systems334651Google Scholar
  63. Reiss, M., Mitra, K. 1998‘The Effects Of Individual Difference Factors On The Acceptability Of Ethical And Unethical Workplace Behaviors’Journal of Business Ethics1715811593CrossRefGoogle Scholar
  64. Report 2003, Thoughts On The Digital Future Of Movies, The Threat Of Piracy, The Hope Of Redemption. Encino, CA, Motion Picture Association of AmericaGoogle Scholar
  65. Rest, J. 1986Moral Development: Advances in Research and TheoryPraegerNew YorkGoogle Scholar
  66. Rest, J., Narvaez, D. 1999aPostconventional Moral Thinking: A Neo-Kohlbergian ApproachLawrence ErlbaumMahwan, NJGoogle Scholar
  67. Rest, J., Narvaez, D. 1999b‘DIT2: Devising and Testing a Revised Instrument of Moral Judgment’Journal of Educational Psychology91644659CrossRefGoogle Scholar
  68. Robertson, C., Crittenden, W.,  et al. 2002‘Situational Ethics Across Borders: A Multicultural Examination’Journal of Business Ethics38327339CrossRefGoogle Scholar
  69. Robin, D., Reidenbach, R. 1996‘The Perceived Importance of an Ethical Issues as an Influence on the Ethical Decision-Making of Ad Managers’Journal of Business Research351728CrossRefGoogle Scholar
  70. Shepherd, G., O’Keefe, D. 1984‘Separability of Attitudinal and Normative Influences on Behavioral Intentions in the Fishbein–Ajzen Model’The Journal of Social Psychology122287288CrossRefGoogle Scholar
  71. Shimp, T. A., Kavas, A. 1984‘The Theory of Reasoned Action Applied to Coupon Usage’Journal of Consumer Research11795Google Scholar
  72. Simpson, P., Banerjee, D. 1994‘Softlifting: A Model of Motivating Factors’Journal of Business Ethics13431438CrossRefGoogle Scholar
  73. Sims, R., Cheng, H.,  et al. 1996‘Toward a Profile of Student Software Piraters’Journal of Business Ethics15839849CrossRefGoogle Scholar
  74. Singhapakdi, A., Vitell, S. J. 1992‘Marketing Ethics: Sales Professionals Versus Other Marketing Professionals’The Journal of Personal Selling & Sales Management12(Spring)27Google Scholar
  75. Solomon, S., O’Brien, J. 1990‘The Effect of Demographic Factors on Attitudes Toward Software Piracy’The Journal of Computer Information Systems304545Google Scholar
  76. Tabachnick, B., Fidell, L. 1996Using Multivariate StatisticsHyper Collins PublishersNew YorkGoogle Scholar
  77. Tan, B. 2002‘Understanding Consumer Ethical Decision Making with Respect to Purchase of Pirated Software’The Journal of Consumer Marketing1996111Google Scholar
  78. Thong, J., Yap, C. 1998‘Testing an Ethical Decision-Making Theory: The Case of Softlifting’Journal of Management Information Systems15213237Google Scholar
  79. Trafimow, D. 1996‘The Importance of Attitudes in the Prediction of College Students’ Intention to Drink’Journal of Applied Social Psychology2621672188Google Scholar
  80. Trafimow, D., Finlay, K. 1996‘The Importance of Subjective Norms for a Minority of People: Between-subjects and Within-subjects Analyses’Personality & Social Psychology Bulletin22820829Google Scholar
  81. Trafimow, D., Sheeran, P. 1998‘Some Tests of the Distinction between Cognitive and Affective Beliefs’Journal of Experimental Social Psychology34378397CrossRefGoogle Scholar
  82. Triandis, C.: 1980, ‘Values, Attitudes and Interpersonal Behavior’, Nebraska Symposium on Motivation, 1979: Beliefs, Attitudes, and Values (University of Nebraska Press, Lincoln, NE) pp. 159–295Google Scholar
  83. Vallerand, R. J., Pelletier, L. G. 1992‘Ajzen and Fishbein’s Theory of Reasoned Action as Applied to Moral Behavior: A Confirmatory Analysis’Journal of Personality and Social Psychology6298Google Scholar
  84. Verplanken, B., Hofstee, G. 1998‘Accessibility of Affective Versus Cognitive Components of Attitude’European Journal of Social Psychology282335CrossRefGoogle Scholar
  85. Wagner, S., Sanders, G. 2001‘Considerations in Ethical Decision-Making and Software Piracy’Journal of Business Ethics29161167CrossRefGoogle Scholar

Copyright information

© Springer 2006

Authors and Affiliations

  1. 1.College of Business AdministrationKuwait UniversitySafatKuwait
  2. 2.Walton College of Business 204University of ArkansasFayetteville

Personalised recommendations