Skip to main content
Log in

Three-Level Mechanism of Consumer Digital Piracy: Development and Cross-Cultural Validation

  • Published:
Journal of Business Ethics Aims and scope Submit manuscript

Abstract

Digital piracy as a continuing problem significantly impacts various stakeholders, including consumers, enterprises, and countries. This study develops a three-level mechanism of determinants of consumer digital piracy behavior, with personal risk as an individual factor, susceptibility to interpersonal influence as an inter-personal factor, and moral intensity as a broad societal factor. Further, it explores the role of rationalization and future piracy intent as outcomes of past piracy behaviors. The authors use survey data from four countries in the European Union to test the system of structural relationships. With an exception of the effect of consumers’ susceptibility to interpersonal influence on piracy behavior, the conceptual model receives remarkably consistent support across the four countries. Specifically, perception of personal risk and moral intensity negatively affected the reported piracy behavior in all four countries. The results further support the negative influence of moral intensity and the positive influence of past digital piracy behavior on consumers’ use of rationalization. Lastly, personal risk, rationalization, and past digital piracy behavior directly influenced consumers’ intention to engage in digital piracy in the future. The study also discusses implications of the findings and identifies areas of future research.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1

Similar content being viewed by others

Notes

  1. We thank the thoughtful reviewer for pointing this out and for the suggestion to examine the effects of general versus domain (context)-specific measure of consumers’ susceptibility to interpersonal influence in a follow-up study.

  2. Correlation between the two measures was .54 (p < .01), suggesting strong, but not perfect correlation. More detailed results of the additional study are available upon request.

References

  • Ajzen, I. (1985). From intentions to actions: A theory of planned behavior. In J. Kuhl & J. Beckman (Eds.), Action-control: From cognition to behavior. Heidelberg: Springer.

  • Ajzen, I. (1991). The theory of planned behavior. Organizational Behavior and Human Decision Processes, 50(2), 179–211.

    Article  Google Scholar 

  • Aleassa, H., Pearson, J. M., & McClurg, S. (2011). Investigating software piracy in Jordan: An extension of the theory of reasoned action. Journal of Business Ethics, 98(4), 663–676.

    Article  Google Scholar 

  • Ang, S. H., Cheng, P. S., Lim, E. A. C., & Tambyah, S. K. (2001). Spot the difference: Consumer responses towards counterfeits. Journal of Consumer Marketing, 18(3), 219–235.

    Article  Google Scholar 

  • Ballantine, P. (2000). Examining the effects of culture on perceptions of moral intensity: A comparison of future marketers from Malaysia and New Zealand. In Proceedings of ANZMAC, (pp. 56–60).

  • BASCAP—Business Action to Stop Counterfeiting and Piracy. (2011). Estimating the global economic and social impacts of counterfeiting and piracy. Retrieved October 3, 2012 from http://www.iccwbo.org/uploadedFiles/BASCAP/Pages/Global%20Impacts%20-%20Final.pdf.

  • Bateman, C. R., Valentine, S., & Rittenburg, T. (2012). Ethical decision making in a peer-to-peer file sharing situation: The role of moral absolutes and social consensus. Journal of Business Ethics, 115(2), 229–240.

    Article  Google Scholar 

  • Batra, R., Homer, P. M., & Kahle, L. R. (2001). Values, susceptibility to normative influence, and attribute importance weights: A nomological analysis. Journal of Consumer Psychology, 11(2), 115–128.

    Article  Google Scholar 

  • Bearden, W. O., Netemeyer, R. G., & Teel, J. E. (1989). Measurement of consumer susceptibility to interpersonal influence. Journal of Consumer Research, 15(4), 473–481.

    Article  Google Scholar 

  • BSA—Business Software Alliance. (2013). Competitive advantage: The economic impact of properly licensed software. Retrieved September 10, 2013 from http://portal.bsa.org/insead/assets/studies/2013softwarevaluestudy_en.pdf.

  • Chatzidakis, A., Hibbert, S., & Smith, A. P. (2007). Why people don’t take their concerns about fair trade to the supermarket: The role of neutralization. Journal of Business Ethics, 74(1), 89–100.

    Article  Google Scholar 

  • Chiou, J.-S., Huang, C., & Lee, H. (2005). The antecedents of music piracy attitudes and intentions. Journal of Business Ethics, 57(2), 161–174.

    Article  Google Scholar 

  • Chiou, J.-S., Wu, L.-Y., & Chou, S.-Y. (2012). You do the service but they take the order. Journal of Business Research, 65(7), 883–889.

    Article  Google Scholar 

  • Churchill, G. A, Jr. (1979). A paradigm for developing better measures of marketing constructs. Journal of Marketing Research, 16(2), 64–73.

    Article  Google Scholar 

  • Cockrill, A., & Goode, M. M. H. (2012). DVD pirating intentions: Angels, devils, chancers and receivers. Journal of Consumer Behaviour, 11(1), 1–10.

    Article  Google Scholar 

  • Cronan, T. P., & Al-Rafee, S. (2008). Factors that influence the intention to pirate software and media. Journal of Business Ethics, 78(4), 527–545.

    Article  Google Scholar 

  • D’Astous, A., Colbert, F., & Montpetit, D. (2005). Music piracy on the web—how effective are anti-piracy arguments? Evidence from the theory of planned behaviour. Journal of Consumer Policy, 28(3), 289–310.

    Article  Google Scholar 

  • Dacin, T., & Murphy, P. R. (2011). Psychological pathways to fraud: Understanding and preventing fraud in organizations. Journal of Business Ethics, 101(4), 601–618.

    Article  Google Scholar 

  • Daunt, K. L., & Harris, L. C. (2011). Customers acting badly: Evidence from the hospitality industry. Journal of Business Research, 64(10), 1034–1042.

    Article  Google Scholar 

  • Dowling, G. R., & Staelin, R. (1994). A model of perceived risk and intended risk-handling activity. Journal of Consumer Research, 21(1), 119–134.

    Article  Google Scholar 

  • Finkel, N. J. (2001). Not fair! The typology of commonsense unfairness. Washington, DC: American Psychological Association.

    Book  Google Scholar 

  • Goles, T., Jayatilaka, B., George, B., Parsons, L., Chambers, V., Taylor, D., et al. (2008). Softlifting: Exploring determinants of attitude. Journal of Business Ethics, 77(4), 481–499.

    Article  Google Scholar 

  • Goode, S. (2012). Initial findings of a gap analysis of the digital piracy literature: Six uncovered countries. Journal of Research in Interactive Marketing, 6(4), 238–3259.

    Article  Google Scholar 

  • Gottfredson, M. R., & Hirschi, T. (1990). A general theory of crime. Stanford, CA: Stanford University Press.

    Google Scholar 

  • Grove, S. J., Vitell, S. J., & Strutton, D. (1989). Non-normative consumer behavior and the techniques of neutralization. In R. Bagozzi & J. P. Peter (Eds.), Proceedings of the AMA Winter Educators Conference, (pp. 131–135). Chicago: American Marketing Association.

  • Gunter, W. D. (2009). Internet scallywags: A comparative analysis of multiple forms and measurements of digital piracy. Western Criminology Review, 10(1), 15–28.

    Google Scholar 

  • Harris, L. C., & Daunt, K. L. (2011). Deviant customer behaviour: A study of techniques of neutralization. Journal of Marketing Management, 27(7–8), 834–853.

    Article  Google Scholar 

  • Harris, L. C., & Dumas, A. (2009). Online consumer misbehaviour: An application of neutralization theory. Marketing Theory, 9(4), 379–402.

    Article  Google Scholar 

  • Hennig-Thurau, T., Henning, V., & Sattler, H. (2007). Consumer file sharing of motion pictures. Journal of Marketing, 71(4), 1–18.

    Article  Google Scholar 

  • Higgins, G., Wolfe, S., & Marcum, C. (2008). Music piracy and neutralization: A preliminary trajectory analysis from short-term longitudinal data. International Journal of Cyber Criminology, 2(2), 324–336.

    Google Scholar 

  • Hinduja, S. (2007). Neutralization theory and online software piracy: An empirical analysis. Ethics and Information Technology, 9(3), 187–204.

    Article  Google Scholar 

  • Holt, T. J., & Copes, H. (2010). Transferring subcultural knowledge on-line: Practices and beliefs of persistent digital pirates. Deviant Behavior, 31(7), 625–654.

    Article  Google Scholar 

  • Horn, J. L., McArdle, J. J., & Mason, R. (1983). When is invariance not invariant: A practical scientist’s look at the ethereal concept of factor invariance. Southern Psychologist, 1(4), 179–188.

    Google Scholar 

  • IFPI—International Federation of the Phonographic Industry. (2012). Digital Music Report 2012, Retrieved September 10, 2013 from http://www.ifpi.org/content/library/DMR2012.pdf.

  • Jeong, B.-K., & Khouja, M. (2013). Analysis of the effectiveness of preventive and deterrent piracy control strategies: Agent-based modeling approach. Computers in Human Behavior, 29(6), 2744–2755.

    Article  Google Scholar 

  • Jones, T. M. (1991). Ethical decision making by individuals in organizations: An issue-contingent model. Academy of Management Review, 16(2), 366–395.

    Google Scholar 

  • Kos Koklic, M., Vida, I., Bajde, D., & Culiberg, B. (2013). The study of perceived adverse effects of digital piracy and involvement: Insights from adult computer users. Behavior and Information Technology. doi:10.1080/0144929X.2012.753552.

  • Liao, C., Lin, H. N., & Liu, Y. P. (2010). Predicting the use of pirated software: A contingency model integrating perceived risk with the theory of planned behaviour. Journal of Business Ethics, 91(2), 237–252.

    Article  Google Scholar 

  • Loe, T. W., Ferrell, L., & Mansfield, P. (2000). A review of empirical studies assessing ethical decision making in business. Journal of Business Ethics, 25(3), 185–204.

    Article  Google Scholar 

  • MacCallum, R. C., Roznowski, R., & Necowitz, L. B. (1992). Model modifications in covariance structure analysis: The problem of capitalization on chance. Psychological Bulletin, 111(3), 490–504.

    Article  Google Scholar 

  • Maruna, S., & Copes, H. (2005). What have we learned from fifty years of neutralization research? Crime and Justice: A Review of Research, 32, 221–320.

    Article  Google Scholar 

  • McGregor, S. L. T. (2008). Conceptualizing immoral and unethical consumption using neutralization theory. Family and Consumer Sciences Research Journal, 36(3), 261–276.

    Article  Google Scholar 

  • McMahon, J. M., & Harvey, R. J. (2006). An analysis of the factor structure of Jones’ moral intensity construct. Journal of Business Ethics, 64(4), 381–404.

    Article  Google Scholar 

  • Mirghani, S. (2011). The war on piracy: Analyzing the discursive battles of corporate and government-sponsored anti-piracy media campaigns. Critical Studies in Media communication, 28(2), 113–134.

    Article  Google Scholar 

  • Moores, T. M., Nill, A., & Rothenberger, M. C. (2009). Knowledge of software piracy as an antecedent to reducing pirating behavior. Journal of Computer Information Systems, 50(1), 82–89.

    Google Scholar 

  • Morris, R. G., & Copes, H. (2012). Exploring the temporal dynamics of the neutralization/delinquency relationship. Criminal Justice Review, 37(4), 442–460.

    Article  Google Scholar 

  • Morris, R. G., & Higgins, G. E. (2009). Neutralizing potential and self-reported digital piracy: A multitheoretical exploration among college undergraduates. Criminal Justice Review, 34(2), 173–195.

    Article  Google Scholar 

  • Nill, A., & Shultz, C. (2009). Global software piracy: Trends and strategic considerations. Business Horizons, 52(3), 289–298.

    Article  Google Scholar 

  • Pan, Y., & Sparks, J. R. (2012). Predictors, consequence and measurement ethnical judgments: Review and meta-analysis. Journal of Business Research, 65(1), 84–91.

    Article  Google Scholar 

  • Peitz, M., & Waelbroeck, P. (2003). Piracy of digital products: A critical review of the economics literature. CESifo Working Paper Series No. 1071.

  • Phau, I., & Ng, J. (2010). Predictors of usage intentions of pirated software. Journal of Business Ethics, 94(1), 23–37.

    Article  Google Scholar 

  • Phau, I., Teach, M., & Lwin, M. (2013). Pirating pirates of the Caribbean: The curse of cyberspace. Journal of Marketing Management, 1–22. doi:10.1080/0267257X.2013.811280.

  • Rest, J. R., Bebeau, M., & Vokler, J. (1986). An overview of the psychology of morality. In J. R. Rest (Ed.), Moral development: Advances in research and theory (pp. 1–27). New York: Praeger.

    Google Scholar 

  • Rock, D. A., Werts, C. E., & Flaughter, R. E. (1978). The use of analysis in covariance structures for comparing psychometric properties of multiple variables across populations. Multivariate Behavioral Research, 13(4), 403–418.

    Article  Google Scholar 

  • Schmid, S., & Kotulla, T. (2011). 50 years of research on international standardization and adaptation—from systematic literature analysis to a theoretical framework. International Business Review, 20(5), 491–507.

    Article  Google Scholar 

  • Shanahan, K. J., & Hyman, M. R. (2010). Motivators and enablers of SCOURing: A study of online piracy in the US and UK. Journal of Business Research, 63(9–10), 1095–1102.

    Article  Google Scholar 

  • Shang, R.-A., Chen, Y.-C., & Chen, P.-C. (2008). Ethical decisions about sharing music files in the P2P environment. Journal of Business Ethics, 80(2), 349–365.

    Article  Google Scholar 

  • Sinha, R. K., & Mandel, N. (2008). Preventing digital music piracy: The carrot or the stick? Journal of Marketing, 72(1), 1–15.

    Article  Google Scholar 

  • Siponen, M., Vance, A., & Willison, R. (2012). New insights into the problem of software piracy: The effects of neutralization, shame, and moral beliefs. Information & Management, 49(7–8), 334–341.

    Article  Google Scholar 

  • Skyes, G. M., & Matza, D. (1957). Techniques of neutralization: A theory of delinquency. American Sociological Review, 22(6), 664–670.

    Article  Google Scholar 

  • Steenkamp, J.-B. E. M., & Baumgartner, H. (1998). Assessing measurement invariance in cross-national consumer research. Journal of Consumer Research, 25(1), 78–90.

    Article  Google Scholar 

  • Tang, J. H., & Farn, C. K. (2005). The effect of interpersonal influence on softlifting intention and behaviour. Journal of Business Ethics, 56(2), 149–161.

    Article  Google Scholar 

  • Taylor, S. A., Ishida, C., & Wallace, D. A. (2009). Intention to engage in digital piracy: A conceptual model and empirical test. Journal of Service Research, 11(3), 246–262.

    Article  Google Scholar 

  • Taylor, S., & Todd, P. (1995). Assessing IT usage: The role of prior experience. MIS Quarterly, 19(4), 561–570.

    Article  Google Scholar 

  • TERA Consultants. (2010). Building a digital economy: The importance of saving jobs in the EU’s creative industries. Retrieved September 10, 2013 from http://www.iccwbo.org/uploadedFiles/BASCAP/Pages/Building%20a%20Digital%20Economy%20-%20TERA(1).pdf.

  • Tsui, H.-S., & Wang, T.-M. (2012). Piracy and social norm of anti-piracy. International Journal of Social Economics, 39(12), 922–932.

    Article  Google Scholar 

  • Vida, I., Kos Koklic, M., Kukar-Kinney, M., & Penz, E. (2012). Predicting consumer digital piracy behavior: The role of rationalization and perceived consequences. Journal of Research in Interactive Marketing, 6(4), 298–313.

    Article  Google Scholar 

  • Weiner, B. (1985). An attributional theory of achievement motivation and emotion. Psychological Review, 92(4), 548–573.

    Article  Google Scholar 

  • Yoo, B., & Lee, S.-H. (2012). Asymmetrical effects of past experience with genuine fashion luxury brands and their counterfeits on purchase intention of each. Journal of Business Research, 65(10), 1507–1515.

    Article  Google Scholar 

  • Yoon, C. (2011). Theory of planned behavior and ethics theory in digital piracy: An integrated model. Journal of Business Ethics, 100(3), 405–417.

    Article  Google Scholar 

  • Yu, S. (2012). College students’ justification for digital piracy: A mixed methods study. Journal of Mixed Methods Research, 6(4), 364–378.

    Article  Google Scholar 

  • Zamoon, S., & Curley, S. P. (2008). Ripped from the headlines: What can the popular press teach us about software piracy? Journal of Business Ethics, 83(3), 515–533.

    Article  Google Scholar 

Download references

Acknowledgments

Data collection for this study was supported by the Commission of European Community, contract no. 217514 (EU - 7th Framework Programme). Authors gratefully acknowledge contributions of research partners from all countries participating in this research project, especially Dr Jo Bryce and Dr Elfriede Penz.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mateja Kos Koklic.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Kos Koklic, M., Kukar-Kinney, M. & Vida, I. Three-Level Mechanism of Consumer Digital Piracy: Development and Cross-Cultural Validation. J Bus Ethics 134, 15–27 (2016). https://doi.org/10.1007/s10551-014-2075-1

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10551-014-2075-1

Keywords

Navigation