Abstract
Digital piracy as a continuing problem significantly impacts various stakeholders, including consumers, enterprises, and countries. This study develops a three-level mechanism of determinants of consumer digital piracy behavior, with personal risk as an individual factor, susceptibility to interpersonal influence as an inter-personal factor, and moral intensity as a broad societal factor. Further, it explores the role of rationalization and future piracy intent as outcomes of past piracy behaviors. The authors use survey data from four countries in the European Union to test the system of structural relationships. With an exception of the effect of consumers’ susceptibility to interpersonal influence on piracy behavior, the conceptual model receives remarkably consistent support across the four countries. Specifically, perception of personal risk and moral intensity negatively affected the reported piracy behavior in all four countries. The results further support the negative influence of moral intensity and the positive influence of past digital piracy behavior on consumers’ use of rationalization. Lastly, personal risk, rationalization, and past digital piracy behavior directly influenced consumers’ intention to engage in digital piracy in the future. The study also discusses implications of the findings and identifies areas of future research.
Similar content being viewed by others
Notes
We thank the thoughtful reviewer for pointing this out and for the suggestion to examine the effects of general versus domain (context)-specific measure of consumers’ susceptibility to interpersonal influence in a follow-up study.
Correlation between the two measures was .54 (p < .01), suggesting strong, but not perfect correlation. More detailed results of the additional study are available upon request.
References
Ajzen, I. (1985). From intentions to actions: A theory of planned behavior. In J. Kuhl & J. Beckman (Eds.), Action-control: From cognition to behavior. Heidelberg: Springer.
Ajzen, I. (1991). The theory of planned behavior. Organizational Behavior and Human Decision Processes, 50(2), 179–211.
Aleassa, H., Pearson, J. M., & McClurg, S. (2011). Investigating software piracy in Jordan: An extension of the theory of reasoned action. Journal of Business Ethics, 98(4), 663–676.
Ang, S. H., Cheng, P. S., Lim, E. A. C., & Tambyah, S. K. (2001). Spot the difference: Consumer responses towards counterfeits. Journal of Consumer Marketing, 18(3), 219–235.
Ballantine, P. (2000). Examining the effects of culture on perceptions of moral intensity: A comparison of future marketers from Malaysia and New Zealand. In Proceedings of ANZMAC, (pp. 56–60).
BASCAP—Business Action to Stop Counterfeiting and Piracy. (2011). Estimating the global economic and social impacts of counterfeiting and piracy. Retrieved October 3, 2012 from http://www.iccwbo.org/uploadedFiles/BASCAP/Pages/Global%20Impacts%20-%20Final.pdf.
Bateman, C. R., Valentine, S., & Rittenburg, T. (2012). Ethical decision making in a peer-to-peer file sharing situation: The role of moral absolutes and social consensus. Journal of Business Ethics, 115(2), 229–240.
Batra, R., Homer, P. M., & Kahle, L. R. (2001). Values, susceptibility to normative influence, and attribute importance weights: A nomological analysis. Journal of Consumer Psychology, 11(2), 115–128.
Bearden, W. O., Netemeyer, R. G., & Teel, J. E. (1989). Measurement of consumer susceptibility to interpersonal influence. Journal of Consumer Research, 15(4), 473–481.
BSA—Business Software Alliance. (2013). Competitive advantage: The economic impact of properly licensed software. Retrieved September 10, 2013 from http://portal.bsa.org/insead/assets/studies/2013softwarevaluestudy_en.pdf.
Chatzidakis, A., Hibbert, S., & Smith, A. P. (2007). Why people don’t take their concerns about fair trade to the supermarket: The role of neutralization. Journal of Business Ethics, 74(1), 89–100.
Chiou, J.-S., Huang, C., & Lee, H. (2005). The antecedents of music piracy attitudes and intentions. Journal of Business Ethics, 57(2), 161–174.
Chiou, J.-S., Wu, L.-Y., & Chou, S.-Y. (2012). You do the service but they take the order. Journal of Business Research, 65(7), 883–889.
Churchill, G. A, Jr. (1979). A paradigm for developing better measures of marketing constructs. Journal of Marketing Research, 16(2), 64–73.
Cockrill, A., & Goode, M. M. H. (2012). DVD pirating intentions: Angels, devils, chancers and receivers. Journal of Consumer Behaviour, 11(1), 1–10.
Cronan, T. P., & Al-Rafee, S. (2008). Factors that influence the intention to pirate software and media. Journal of Business Ethics, 78(4), 527–545.
D’Astous, A., Colbert, F., & Montpetit, D. (2005). Music piracy on the web—how effective are anti-piracy arguments? Evidence from the theory of planned behaviour. Journal of Consumer Policy, 28(3), 289–310.
Dacin, T., & Murphy, P. R. (2011). Psychological pathways to fraud: Understanding and preventing fraud in organizations. Journal of Business Ethics, 101(4), 601–618.
Daunt, K. L., & Harris, L. C. (2011). Customers acting badly: Evidence from the hospitality industry. Journal of Business Research, 64(10), 1034–1042.
Dowling, G. R., & Staelin, R. (1994). A model of perceived risk and intended risk-handling activity. Journal of Consumer Research, 21(1), 119–134.
Finkel, N. J. (2001). Not fair! The typology of commonsense unfairness. Washington, DC: American Psychological Association.
Goles, T., Jayatilaka, B., George, B., Parsons, L., Chambers, V., Taylor, D., et al. (2008). Softlifting: Exploring determinants of attitude. Journal of Business Ethics, 77(4), 481–499.
Goode, S. (2012). Initial findings of a gap analysis of the digital piracy literature: Six uncovered countries. Journal of Research in Interactive Marketing, 6(4), 238–3259.
Gottfredson, M. R., & Hirschi, T. (1990). A general theory of crime. Stanford, CA: Stanford University Press.
Grove, S. J., Vitell, S. J., & Strutton, D. (1989). Non-normative consumer behavior and the techniques of neutralization. In R. Bagozzi & J. P. Peter (Eds.), Proceedings of the AMA Winter Educators Conference, (pp. 131–135). Chicago: American Marketing Association.
Gunter, W. D. (2009). Internet scallywags: A comparative analysis of multiple forms and measurements of digital piracy. Western Criminology Review, 10(1), 15–28.
Harris, L. C., & Daunt, K. L. (2011). Deviant customer behaviour: A study of techniques of neutralization. Journal of Marketing Management, 27(7–8), 834–853.
Harris, L. C., & Dumas, A. (2009). Online consumer misbehaviour: An application of neutralization theory. Marketing Theory, 9(4), 379–402.
Hennig-Thurau, T., Henning, V., & Sattler, H. (2007). Consumer file sharing of motion pictures. Journal of Marketing, 71(4), 1–18.
Higgins, G., Wolfe, S., & Marcum, C. (2008). Music piracy and neutralization: A preliminary trajectory analysis from short-term longitudinal data. International Journal of Cyber Criminology, 2(2), 324–336.
Hinduja, S. (2007). Neutralization theory and online software piracy: An empirical analysis. Ethics and Information Technology, 9(3), 187–204.
Holt, T. J., & Copes, H. (2010). Transferring subcultural knowledge on-line: Practices and beliefs of persistent digital pirates. Deviant Behavior, 31(7), 625–654.
Horn, J. L., McArdle, J. J., & Mason, R. (1983). When is invariance not invariant: A practical scientist’s look at the ethereal concept of factor invariance. Southern Psychologist, 1(4), 179–188.
IFPI—International Federation of the Phonographic Industry. (2012). Digital Music Report 2012, Retrieved September 10, 2013 from http://www.ifpi.org/content/library/DMR2012.pdf.
Jeong, B.-K., & Khouja, M. (2013). Analysis of the effectiveness of preventive and deterrent piracy control strategies: Agent-based modeling approach. Computers in Human Behavior, 29(6), 2744–2755.
Jones, T. M. (1991). Ethical decision making by individuals in organizations: An issue-contingent model. Academy of Management Review, 16(2), 366–395.
Kos Koklic, M., Vida, I., Bajde, D., & Culiberg, B. (2013). The study of perceived adverse effects of digital piracy and involvement: Insights from adult computer users. Behavior and Information Technology. doi:10.1080/0144929X.2012.753552.
Liao, C., Lin, H. N., & Liu, Y. P. (2010). Predicting the use of pirated software: A contingency model integrating perceived risk with the theory of planned behaviour. Journal of Business Ethics, 91(2), 237–252.
Loe, T. W., Ferrell, L., & Mansfield, P. (2000). A review of empirical studies assessing ethical decision making in business. Journal of Business Ethics, 25(3), 185–204.
MacCallum, R. C., Roznowski, R., & Necowitz, L. B. (1992). Model modifications in covariance structure analysis: The problem of capitalization on chance. Psychological Bulletin, 111(3), 490–504.
Maruna, S., & Copes, H. (2005). What have we learned from fifty years of neutralization research? Crime and Justice: A Review of Research, 32, 221–320.
McGregor, S. L. T. (2008). Conceptualizing immoral and unethical consumption using neutralization theory. Family and Consumer Sciences Research Journal, 36(3), 261–276.
McMahon, J. M., & Harvey, R. J. (2006). An analysis of the factor structure of Jones’ moral intensity construct. Journal of Business Ethics, 64(4), 381–404.
Mirghani, S. (2011). The war on piracy: Analyzing the discursive battles of corporate and government-sponsored anti-piracy media campaigns. Critical Studies in Media communication, 28(2), 113–134.
Moores, T. M., Nill, A., & Rothenberger, M. C. (2009). Knowledge of software piracy as an antecedent to reducing pirating behavior. Journal of Computer Information Systems, 50(1), 82–89.
Morris, R. G., & Copes, H. (2012). Exploring the temporal dynamics of the neutralization/delinquency relationship. Criminal Justice Review, 37(4), 442–460.
Morris, R. G., & Higgins, G. E. (2009). Neutralizing potential and self-reported digital piracy: A multitheoretical exploration among college undergraduates. Criminal Justice Review, 34(2), 173–195.
Nill, A., & Shultz, C. (2009). Global software piracy: Trends and strategic considerations. Business Horizons, 52(3), 289–298.
Pan, Y., & Sparks, J. R. (2012). Predictors, consequence and measurement ethnical judgments: Review and meta-analysis. Journal of Business Research, 65(1), 84–91.
Peitz, M., & Waelbroeck, P. (2003). Piracy of digital products: A critical review of the economics literature. CESifo Working Paper Series No. 1071.
Phau, I., & Ng, J. (2010). Predictors of usage intentions of pirated software. Journal of Business Ethics, 94(1), 23–37.
Phau, I., Teach, M., & Lwin, M. (2013). Pirating pirates of the Caribbean: The curse of cyberspace. Journal of Marketing Management, 1–22. doi:10.1080/0267257X.2013.811280.
Rest, J. R., Bebeau, M., & Vokler, J. (1986). An overview of the psychology of morality. In J. R. Rest (Ed.), Moral development: Advances in research and theory (pp. 1–27). New York: Praeger.
Rock, D. A., Werts, C. E., & Flaughter, R. E. (1978). The use of analysis in covariance structures for comparing psychometric properties of multiple variables across populations. Multivariate Behavioral Research, 13(4), 403–418.
Schmid, S., & Kotulla, T. (2011). 50 years of research on international standardization and adaptation—from systematic literature analysis to a theoretical framework. International Business Review, 20(5), 491–507.
Shanahan, K. J., & Hyman, M. R. (2010). Motivators and enablers of SCOURing: A study of online piracy in the US and UK. Journal of Business Research, 63(9–10), 1095–1102.
Shang, R.-A., Chen, Y.-C., & Chen, P.-C. (2008). Ethical decisions about sharing music files in the P2P environment. Journal of Business Ethics, 80(2), 349–365.
Sinha, R. K., & Mandel, N. (2008). Preventing digital music piracy: The carrot or the stick? Journal of Marketing, 72(1), 1–15.
Siponen, M., Vance, A., & Willison, R. (2012). New insights into the problem of software piracy: The effects of neutralization, shame, and moral beliefs. Information & Management, 49(7–8), 334–341.
Skyes, G. M., & Matza, D. (1957). Techniques of neutralization: A theory of delinquency. American Sociological Review, 22(6), 664–670.
Steenkamp, J.-B. E. M., & Baumgartner, H. (1998). Assessing measurement invariance in cross-national consumer research. Journal of Consumer Research, 25(1), 78–90.
Tang, J. H., & Farn, C. K. (2005). The effect of interpersonal influence on softlifting intention and behaviour. Journal of Business Ethics, 56(2), 149–161.
Taylor, S. A., Ishida, C., & Wallace, D. A. (2009). Intention to engage in digital piracy: A conceptual model and empirical test. Journal of Service Research, 11(3), 246–262.
Taylor, S., & Todd, P. (1995). Assessing IT usage: The role of prior experience. MIS Quarterly, 19(4), 561–570.
TERA Consultants. (2010). Building a digital economy: The importance of saving jobs in the EU’s creative industries. Retrieved September 10, 2013 from http://www.iccwbo.org/uploadedFiles/BASCAP/Pages/Building%20a%20Digital%20Economy%20-%20TERA(1).pdf.
Tsui, H.-S., & Wang, T.-M. (2012). Piracy and social norm of anti-piracy. International Journal of Social Economics, 39(12), 922–932.
Vida, I., Kos Koklic, M., Kukar-Kinney, M., & Penz, E. (2012). Predicting consumer digital piracy behavior: The role of rationalization and perceived consequences. Journal of Research in Interactive Marketing, 6(4), 298–313.
Weiner, B. (1985). An attributional theory of achievement motivation and emotion. Psychological Review, 92(4), 548–573.
Yoo, B., & Lee, S.-H. (2012). Asymmetrical effects of past experience with genuine fashion luxury brands and their counterfeits on purchase intention of each. Journal of Business Research, 65(10), 1507–1515.
Yoon, C. (2011). Theory of planned behavior and ethics theory in digital piracy: An integrated model. Journal of Business Ethics, 100(3), 405–417.
Yu, S. (2012). College students’ justification for digital piracy: A mixed methods study. Journal of Mixed Methods Research, 6(4), 364–378.
Zamoon, S., & Curley, S. P. (2008). Ripped from the headlines: What can the popular press teach us about software piracy? Journal of Business Ethics, 83(3), 515–533.
Acknowledgments
Data collection for this study was supported by the Commission of European Community, contract no. 217514 (EU - 7th Framework Programme). Authors gratefully acknowledge contributions of research partners from all countries participating in this research project, especially Dr Jo Bryce and Dr Elfriede Penz.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Kos Koklic, M., Kukar-Kinney, M. & Vida, I. Three-Level Mechanism of Consumer Digital Piracy: Development and Cross-Cultural Validation. J Bus Ethics 134, 15–27 (2016). https://doi.org/10.1007/s10551-014-2075-1
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10551-014-2075-1