Advertisement

Information Systems Frontiers

, Volume 14, Issue 2, pp 261–277 | Cite as

Use, perceived deterrence and the role of software piracy in video game console adoption

  • Anastasiou Kartas
  • Sigi GoodeEmail author
Article

Abstract

This paper is an exploratory study into the role of software piracy in the decision to adopt a video game console. The paper takes a rational choice perspective, where actors evaluate the deterrent cost of moral transgression before acting, to explore how users with different levels of video game usage intensity approach the adoption decision, on the grounds that more experienced users can better assess the costs and benefits of moral transgression. The study used focus groups and a literature review to develop a set of factors based on the Theory of Planned Behavior. The resulting factors were operationalized in an online survey of 285 subjects of a variety of ages and incomes. The ability to pirate console software was significant for adopters but not non-adopters. Perceived deterrence was associated with greater system use, as measured by hours of console use per week.

Keywords

Console Computer games Adoption determinants Piracy Rational choice 

Notes

Acknowledgment

The authors are grateful for the helpful advice of Neil Fargher, Mark Wilson and Alex Richardson during the development of this paper.

References

  1. Ajzen, I. (1985). From intentions to actions: a theory of planned behavior. In J. Kuhl & J. Beckman (Eds.), Action-control: From cognition to behavior. Heidelberg: Springer.Google Scholar
  2. Ajzen, I. (1991). The theory of planned behavior. Organizational Behavior and Human Decision Processes, 50, 179–211.CrossRefGoogle Scholar
  3. Ajzen, I., & Fishbein, M. (1980). Understanding attitudes and predicting social behavior. Inc, Englewood Cliffs, NJ: Prentice-Hall.Google Scholar
  4. Alvisi, A., Narduzzo, A., & Zamarian, M. (2003). Playstation and the power of unexpected consequences. Information, Communication and Society, 6, 608–627.CrossRefGoogle Scholar
  5. Bagchi, K., Kirs, P., & Cerveny, R. (2006). Global software piracy: can economic factors alone explain the trend? Communications of the ACM, 49, 70–76.CrossRefGoogle Scholar
  6. Bagozzi, R. P. (1981). Attitudes, intentions, and behavior: a test of some key hypotheses. Journal of Personality and Social Psychology, 41, 607–627.CrossRefGoogle Scholar
  7. Becker, D., (2004). Playing the convergence game, CNet News. Google Scholar
  8. Bhattacharjee, S., Gopal, R. D., & Sanders, G. L. (2003). Digital music and online sharing: software piracy 2.0? Communications of the ACM, 46, 107–111.CrossRefGoogle Scholar
  9. Blakely, R. (2007). Halo 3 blows away rivals to set record. Times Online, October 4, 2007.Google Scholar
  10. Blossfeld, H. P. (1996). Macro-sociology, rational choice theory, and time. European Sociological Review, 12, 181–206.CrossRefGoogle Scholar
  11. Blumstein, A., Cohen, J., & Nagin, D. (1978). Deterrence and incapacitation: Estimating the effects of criminal sanctions on crime rates. Washington, DC: National Academy of Sciences.Google Scholar
  12. Childers, T. L., & Rao, A. R. (1992). The influence of familial and peer-based reference groups on consumer decisions. Journal of Consumer Research, 19, 198–211.CrossRefGoogle Scholar
  13. Chiou, J., Huang, C., & Lee, H. (2005). The antecedents of music piracy attitudes and intentions. Journal of Business Ethics, 57, 161–174.CrossRefGoogle Scholar
  14. Choi, H., Choi, M., Kim, J., & Yu, H. (2003). An empirical study on the adoption of information appliances with a focus on interactive TV. Telematics and Informatics, 20, 161–183.CrossRefGoogle Scholar
  15. Chronis, G. T. (2003). Gamecube slashed to $99. Video Business, 23, 7.Google Scholar
  16. Clarke, R., Cornish, D., Paternoster, R., & Bachman, R. (2000). Rational choice. In R. Paternoster (Ed.), Explaining crime and criminals: Essays in contemporary criminological theory (pp. 27–41). Los Angeles: Roxbury Publishing Company.Google Scholar
  17. Clarke, R. V., & Felson, M. (1993). Criminology, routine activity, and rational choice. Advances in Theoretical Criminology: Routine Activity and Rational Choice, 5, 1–14.Google Scholar
  18. Claxton, J. D., Ritchie, J. R. B., & Zaichowsky, J. (1980). The nominal group technique: its potential for consumer research. Journal of Consumer Research, 7, 308–313.CrossRefGoogle Scholar
  19. Cohen, A. (2000). New game (PlayStation 2). Time, 156, 58–60.Google Scholar
  20. Cohen, L., & Felson, M. (1979). Social change and crime rate trends: a routine activity approach. American Sociological Review, 44, 588–608.CrossRefGoogle Scholar
  21. Conner, M., & Armitage, C. J. (1998). Extending the theory of planned behavior: a review and avenues for further research. Journal of Applied Social Psychology, 28, 1429–1464.CrossRefGoogle Scholar
  22. Cooper, D. R., & Schindler, P. S. (2008). Business research methods. New York: McGraw-Hill.Google Scholar
  23. Corts, K. S., & Lederman, M. (2009). Software exclusivity and the scope of indirect network effects in the U.S. home video game market. International Journal of Industrial Organization, 27, 121–136.CrossRefGoogle Scholar
  24. d’Astous, A., Colbert, F., & Montpetit, D. (2005). Music piracy on the web—how effective are anti-piracy arguments? Evidence from the theory of planned behavior. Journal of Consumer Policy, 28, 289–310.CrossRefGoogle Scholar
  25. Darwall, S. L. (1976). A defense of the Kantian interpretation. Ethics, 86, 164–170.CrossRefGoogle Scholar
  26. Delbecq, A. L., Van de Ven, A. H., & Gustafson, D. H. (1975). Group techniques for program planning: A guide to nominal group and delphi process. Illinois, USA: Scott-Foresman.Google Scholar
  27. Delbecq, A., Van de Ven, A., & Gustafson, D. (1986). Group techniques for program planning: A guide to nominal group and Delphi processes. Middleton, WI: Green Briar Press.Google Scholar
  28. Dewitt, P. E. (1993). The amazing video game boom. Time, September 27, 67–71.Google Scholar
  29. Douglas, D. E., Cronan, T. P., & Behel, J. D. (2007). Equity perceptions as a deterrent to software piracy behavior. Information and Management, 44, 503–512.CrossRefGoogle Scholar
  30. Edery, D., & Mollick, E. (2009). Changing the game: How video games are transforming the future of business. Pearson Education: FT Press, Upper Saddle River, NJ.Google Scholar
  31. Elkin, T. (2001). Sony pulling a 1–2 punch. Advertising Age, 72, 4.Google Scholar
  32. ESA (2008). Entertainment Software Association 2008 sales and genre data, Entertainment Software Association.Google Scholar
  33. Fishbein, M. A., & Ajzen, I. (1975). Belief, attitude, intention and behavior: An introduction to theory and research. MA, Addison Wesley: Reading.Google Scholar
  34. Fisher, R. J., & Price, L. L. (1992). An investigation into the social context of early adoption behavior. Journal of Consumer Research, 19, 477–486.CrossRefGoogle Scholar
  35. Gallagher, S., & Park, S. (2002). Innovation and competition in standard-based industries: a historical analysis of the US home video game market. IEEE Transactions on Engineering Management, 49, 67–82.CrossRefGoogle Scholar
  36. Gallagher, M., Hares, T., Spencer, J., Bradshaw, C., & Webb, I. (1993). The nominal group technique: a research tool for general practice? Family Practice, 10, 76–81.CrossRefGoogle Scholar
  37. Guo, Y., & Barnes, S. (2007). Why people buy virtual items in virtual worlds with real money. DATA BASE for Advances in Information Systems, 38, 69–76.CrossRefGoogle Scholar
  38. Hair, J. F., Anderson, R. E., Tatham, R. L., & Black, W. C. (1998). Multivariate data analysis. Englewood Cliffs, NJ: Prentice-Hall.Google Scholar
  39. Hedström, P., & Swedberg, R. (1996). Rational choice, empirical research, and the sociological tradition. European Sociological Review, 12, 127–146.CrossRefGoogle Scholar
  40. Ho, S., & Huang, C. (2009). Exploring success factors of video game communities in hierarchical linear modeling: the perspectives of members and leaders. Computers in Human Behavior, 25, 761–769.CrossRefGoogle Scholar
  41. Holak, S. L., & Lehmann, D. R. (1990). Purchase intention and the dimensions of innovation: an exploratory model. Journal Product of Innovation Management, 7, 59–73.CrossRefGoogle Scholar
  42. Holsapple, C. W., & Wu, J. (2008). Building effective online game websites with knowledge-based trust. Information Systems Frontiers, 10, 47–60.CrossRefGoogle Scholar
  43. Holsapple, C. W., Iyengar, D., Jin, H., & Rao, S. (2008). Parameters for software piracy research. The Information Society, 24, 199–218.CrossRefGoogle Scholar
  44. Hong, S. J., Thong, J. Y. L., Moon, J. Y., & Tam, K. Y. (2008). Understanding the behavior of mobile data services consumers. Information Systems Frontiers, 10, 431–445.CrossRefGoogle Scholar
  45. Huang, A. (2003). Keeping secrets in hardware: the Microsoft Xbox™ case study. Lecture Notes in Computer Science, 2523(2003), 355–430.Google Scholar
  46. Huber, J. (1997). Rational choice models in sociology. The American Sociologist, 28, 42–53.CrossRefGoogle Scholar
  47. Iman, R. L., & Conover, W. J. (1989). Modern business statistics. New York: John Wiley & Sons.Google Scholar
  48. Kwong, T. C., & Lee, K. O. (2002). Behavioral intention model for the exchange mode internet music piracy, Proceedings of the 35 th Hawaii International Conference on System Sciences, IEEE Computer Society.Google Scholar
  49. Levin, A. M., Dato-on, M. C., & Rhee, K. (2004). Money for nothing and hits for free: the ethics of downloading music from peer-to-peer web sites. Journal of Marketing Theory and Practice, 12, 48–60.Google Scholar
  50. Lin, T, Hsu, M., Kuo, F., & Sun, P. (1999). An intention model based study of software piracy, Proceedings of the 32nd Hawaii International Conference on System Sciences, IEEE Computer Society.Google Scholar
  51. Loughran, T., Piquero, A., Fagan, J., & Mulvey, E. P. (2009). Differential deterrence: studying heterogeneity and changes in perceptual deterrence among serious youthful offenders. Crime & Delinquency, 20, 1–25.Google Scholar
  52. Mack, K. Y., Leiber, M. J., Featherstone, R. A., & Monserud, M. A. (2007). Reassessing the family-delinquency association: do family type, family processes, and economic factors make a difference? Journal of Criminal Justice, 35, 51–67.CrossRefGoogle Scholar
  53. Mandler, M. (2005). Incomplete preferences and rational intransitivity of choice. Games and Economic Behavior, 50, 255–277.CrossRefGoogle Scholar
  54. Mathieson, K. (1991). Predicting user intentions: comparing the technology acceptance model with the theory of planned behavior. Information Systems Research, 2, 173–191.CrossRefGoogle Scholar
  55. Matza, D. (1964). Delinquency and drift. New York: John Wiley and Sons, Inc.Google Scholar
  56. Meng-Hsiang, H., & Feng-Yang, K. (2003). The effect of organization-based self-esteem and deindividuation in protecting personal information privacy. Journal of Business Ethics, 42, 305–320.CrossRefGoogle Scholar
  57. Moore, C. M. (1987). Group techniques for idea building. Newbury Park: Sage Publishers.Google Scholar
  58. Moore, G. C., & Benbasat, I. (1991). Development of an instrument to measure the perceptions of adopting an information technology innovation. Information Systems Research, 2, 192–222.CrossRefGoogle Scholar
  59. Myles, G., & Nusser, S. (2006). Content protection for games. IBM Systems Journal, 45, 119–143.CrossRefGoogle Scholar
  60. Nunnally, J. C. (1967). Psychometric theory. New York: McGraw-Hill.Google Scholar
  61. Payne, B. K., & Gainey, R. R. (2004). Ancillary consequences of employee theft. Journal of Criminal Justice, 32, 63–73.CrossRefGoogle Scholar
  62. Peace, A. G., Galletta, D. E., & Thong, J. Y. (2003). Development and examination of a predictive model of software piracy behavior. Journal of Management Information Systems, 20, 153–178.Google Scholar
  63. Peitz, M., & Waelbroeck, P. (2006). Piracy of digital products: a critical review of the theoretical literature. Information Economics and Policy, 18, 449–476.CrossRefGoogle Scholar
  64. Plowman, S., & Goode, S. (2009). Factors affecting the intention to download music: quality perceptions and downloading intensity. Journal of Computer Information Systems, 49, 84–109.Google Scholar
  65. Rawls, J., (1971). A Theory of Justice, The Belknap Press of Harvard University Press.Google Scholar
  66. Rogers, E. M. (2003). Diffusion of innovations (5th ed.). The Free Press: New York.Google Scholar
  67. Schilling, M. A. (2003). Technological leapfrogging: lessons from the US video game console industry. California Management Review, 45, 6–32.Google Scholar
  68. Schneider, A. L., & Ervin, L. (1990). Specific deterrence, rational choice, and decision heuristics: applications in juvenile justice. Social Science Quarterly, 71, 585–601.Google Scholar
  69. Schulz, C., & Wagner, S. (2008). Outlaw community innovations. International Journal of Innovation Management, 12, 399–418.CrossRefGoogle Scholar
  70. Shankar, V., & Bayus, B. L. (2003). Network effects and competition: an empirical analysis of the home video game industry. Strategic Management Journal, 24, 375–384.CrossRefGoogle Scholar
  71. Sheeran, P., Trafimow, D., & Armitage, C. J. (2003). Predicting behaviour from perceived behavioural control: tests of the accuracy assumption of the theory of planned behaviour. British Journal of Social Psychology, 42, 393–410.CrossRefGoogle Scholar
  72. Sheff, D. (1994). How Nintendo conquered the world. New York: Random House.Google Scholar
  73. Shimp, T. A., & Kavas, A. (1984). The theory of reasoned action applied to coupon usage. Journal of Consumer Research, 11, 795–809.CrossRefGoogle Scholar
  74. Silberman, M. (1976). Toward a theory of criminal deterrence. American Sociological Review, 41, 442–461.CrossRefGoogle Scholar
  75. Siwek, S. E., (2007). Video games in the 21st century: economic contributions of the U.S. entertainment software industry, The Entertainment Software Association.Google Scholar
  76. Steenhaut, S., & van Kenhove, P. (2006). An empirical investigation of the relationships among a consumer’s personal values, ethical ideology and ethical beliefs. Journal of Business Ethics, 64, 137–155.CrossRefGoogle Scholar
  77. Sweeney, J. C., & Soutar, G. N. (2001). Consumer perceived value: the development of a multiple item scale. Journal of Retailing, 77, 203–220.CrossRefGoogle Scholar
  78. Taylor, S., & Todd, P. A. (1995a). Understanding information technology usage: a test of competing models. Information Systems Research, 6, 144–176.CrossRefGoogle Scholar
  79. Taylor, S., & Todd, P. A. (1995b). Decomposition and crossover effects in the theory of planned behavior: a study of consumer adoption intentions. International Journal of Research in Marketing, 12, 137–155.CrossRefGoogle Scholar
  80. Teo, T. S. H., & Pok, S. H. (2003). Adoption of WAP-enabled mobile phones among internet users. Omega, 31, 483–498.CrossRefGoogle Scholar
  81. Terdiman, D., (2009). Report: Microsoft bans 1 million Xbox Live players, CNN News, November 12, 2009.Google Scholar
  82. Tornatzky, L. G., & Klein, K. J. (1982). Innovation characteristics and innovation adoption-implementation: a meta-analysis of findings. IEEE Transactions on Engineering Management, 19, 28–45.Google Scholar
  83. Turel, O., Serenko, A., & Bontis, N. (2010). User acceptance of hedonic digital artifacts: a theory of consumption values perspective. Information & Management, 47, 53–59.CrossRefGoogle Scholar
  84. Venkatesh, V. (2000). Determinants of perceived ease of use: integrating control, intrinsic motivation and emotion into the technology acceptance model. Information Systems Research, 11, 342–365.CrossRefGoogle Scholar
  85. Venkatesh, V., & Brown, S. A. (2001). A longitudinal investigation of personal computers in homes: adoption determinants and emerging challenges. MIS Quarterly, 25, 71–102.CrossRefGoogle Scholar
  86. Venkatesh, V., Morris, M. G., Davis, G. B., & Davis, F. D. (2003). User acceptance of information technology: toward a unified view. MIS Quarterly, 27, 425–478.Google Scholar
  87. Weisberg, H. F., & Bowen, B. D. (1977). An introduction to survey research and data analysis. San Francisco: Freeman Publishers.Google Scholar
  88. Wood, R. T. A., Griffiths, M. D., & Eatough, V. (2004). Online data collection from video game players: methodological issues. CyberPsychology & Behavior, 7, 511–518.Google Scholar
  89. Young, H., Lierman, L., Powell-Cope, G., Kasprzyk, D., & Benoliel, J. (1991). Operationalizing the theory of planned behavior. Research in Nursing & Health, 14, 137–144.CrossRefGoogle Scholar
  90. Zhang, X., & Maruping, L. M. (2008). Household technology adoption in a global marketplace: incorporating the role of espoused cultural values. Information Systems Frontiers, 10, 403–413.CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC 2010

Authors and Affiliations

  1. 1.School of Accounting and Business Information Systems, College of Business and EconomicsThe Australian National UniversityCanberraAustralia

Personalised recommendations