Abstract
The purpose of this study is to investigate the salient factors that influence accounting students to engage in software and music piracy. This study uses the theory of reasoned action (TRA) and the theory of planned behavior (TPB), and extends these models to incorporate other variables (such as moral obligation and perceived prosecution risk) to predict individuals’ behavioral intentions. Specifically, we hypothesize that attitudes toward the behavior, subjective norms, perceived behavioral control, moral obligation and perceived prosecution risk influence intentions to engage in software and music piracy. Data were obtained from 237 university accounting students in a Caribbean university to assess the influence of the components of the theories and other modified and extended models. Findings reveal that attitudes, subjective norms, perceived behavioral control, moral obligation and perceived prosecution risk significantly influence intentions to engage in software and music piracy. These findings lend full support to the hypothesized relationships in our extended theory of planned behavior.
Similar content being viewed by others
Notes
In this paper, we use the term “software piracy” to include downloading of unauthorized software copies. Thus, the two terms are used interchangeably throughout the paper.
Some items in the measures of the variables in the questionnaire were reverse coded to assist in instrument reliability.
Our sample shows an uneven split between gender among participants. This is considered the norm in many accounting classrooms in universities today, where the female to male ratio tends to favor females being the majority (Curtis 2006). Sensitivity analysis is used to determine the influence of gender as an alternative explanation of the results. Table 2 shows that gender is only significantly related to software piracy. Our hierarchical results included gender as a control variable in step 1. We conducted separate tests by removing gender from the analysis. The tests show similar results, thus highlighting no significant impact.
References
Ajzen, I. (1991). The theory of planned behavior. Organizational Behavior and Human Decision Processes, 50(2), 179–211.
Ajzen, I., & Fishbein, M. (1977). Attitude-behavior relations: a theoretical analysis and review of empirical research. Psychological Bulletin, 84(5), 888–918.
Alleyne, P., & Phillips, K. (2011). Exploring academic dishonesty among university students in Barbados: an extension to the theory of planned behaviour. Journal of Academic Ethics, 9(4), 323–338.
Alleyne, P., Devonish, D., Nurse, J., & Cadogan-McClean, C. (2006). Perceptions of moral intensity among undergraduate accounting students in Barbados. Journal of Eastern Caribbean Studies, 31(3), 1–26.
Alleyne, P., Devonish, D., Allman, J., Charles-Soverall, W., & Young Marshall, A. (2010). Measuring ethical perceptions and intentions among undergraduate students in Barbados. The Journal of American Academy of Business, 15(2), 319–326.
Alleyne, P., Weekes-Marshall, D., Estwick, S., & Chaderton, R. (2014). Factors influencing ethical intentions among future accounting professionals. Journal of Academic Ethics, 12(2), 129–144.
Al-Rafee, S., & Cronan, T. P. (2006). Digital piracy: factors that influence attitude toward behaviour. Journal of Business Ethics, 63(3), 237–259.
Bagozzi, R. P. & Warshaw, P. R. (1990). Trying to consume. Journal of consumer research, 127–140.
Bandura, A. (1997). Self-efficacy. The exercise of control. NY: W.H. Freeman and Company.
Beck, L., & Ajzen, I. (1991). Predicting dishonest actions using the theory of planned behavior. Journal of Research in Personality, 25(3), 285–301.
Bommer, M., Gratto, C., Gravander, J., & Tuttle, M. (1987). A behavioral model of ethical and unethical decision making. Journal of Business Ethics, 6(4), 265–280.
Branscomb, W. A. (1994). Who owns information: from privacy to public access. New York: Basic Books.
Buchan, H. F. (2005). Ethical decision making in the public accounting profession: an extension of Ajzen’s theory of planned behavior. Journal of Business Ethics, 61(2), 165–181.
Cesareo, L., & Pastore, A. (2014). Consumers’ attitude and behavior towards online music piracy and subscription-based services. Journal of Consumer Marketing, 31(6/7), 515–525.
Chang, M. K. (1998). Predicting unethical behaviour: a comparison of the theory of reasoned action and the theory of planned behaviour. Journal of Business Ethics, 17(16), 1825–1834.
Cheng, H. K., Sims, R. R. & Teegen, H. (1997). To purchase or to pirate software: an empirical study. Journal of Management Information Systems, 46–50
Chiou, J., Huang, C., & Lee, H. (2005). The antecedents of music piracy attitudes and intentions. Journal of Business Ethics, 57(2), 161–174.
Christoph, R., Forcht, K. & Bilbrey, C. (1987). The development of information systems ethics, an analysis. Journal of Computer Information Systems, (Winter 1987/1988), 20–22.
Connor, M., & Armitage, C. (1998). Extending the theory of planned behavior: a review and avenues for further research. Journal of Applied Social Psychology, 28(15), 1429–1464.
Cronan, T. P., & Al-Rafee, S. (2008). Factors that influence the intention to pirate software and media. Journal of Business Ethics, 78(4), 527–545.
Curtis, M. (2006). Are audit-related ethical decisions dependent upon mood? Journal of Business Ethics, 68(2), 191–209.
Flynn, L. M. (2001). An empirical investigation of the impact of environment on individual ethical analysis by corporate accountants and human resource managers. Unpublished doctoral dissertation, Binghamton University.
Gibson, A. M., & Frakes, A. H. (1997). Truth or consequences: a study of critical issues and decision making in accounting. Journal of Business Ethics, 16, 161–171.
Glass, R. S., & Wood, W. A. (1996). Situational determinants of software piracy: an equity theory perspecttive. Journal of Business Ethics, 15(11), 1189–1198.
Graziano, M. & Rainie, L. (2001). The music downloading deluge. Pew Internet and American Life Project. [Online].Available: http://www.pewinternet.org/reports [Accessed 7 Sept. 2015.
Guernsey, G. (1995). Selection of students for veterinary medicine. The Canadian Veterinary Journal, 36(1), 8.
Gupta, P. B., Gould, S. J., & Pola, B. (2004). To pirate or not to pirate: a comparative study of the ethical versus other influences on the consumer’s software acquisition-mode decision. Journal of Business Ethics, 55(3), 255–274.
Harman, H. H. (1976). Modern factor analysis. 3rd rev. ed. Chicago: University of Chicago Press.
Higgins, G. E., Wilson, A. L., & Fell, B. D. (2005). An application of deterrence theory to software piracy. Journal of Criminal Justice and Popular Culture, 12(3), 166–184.
Hill, C. W. L. (2007). Digital piracy: causes, consequences and strategic responses. Asia Pacific Journal of Management, 24(1), 9–25.
Hsu, J. L., & Shiue, C. W. (2008). Consumer’s willingness to pay for non-pirated software. Journal of Business Ethics, 81(4), 715–732.
Jones, T. M. (1991). Ethical decision-making by individuals in organisations: an issue-contingent model. Academy of Management Review, 16(2), 366–395.
Kim, J. E., & Kim, J. (2015). Software piracy among Korean adolescents: lessons from panel data. Deviant Behavior, 36(9), 705–724.
King, B., & Thatcher, A. (2014). Attitudes towards software piracy in South Africa: knowledge of intellectual property laws as a moderator. Behaviour and Information Technology, 33(3), 210–224.
Kreie, J., & Cronan, T. P. (2000). Making ethical decisions: how companies might influence the choices one makes. Communications of the ACM, 43(12), 66–71.
Kurland, N. B. (1996). Sales agents and clients: ethics, incentives and a modified theory of planned behavior. Human Relations, 25(4), 297–313.
Lau, E. (2003). An empirical study of software piracy. Business Ethics: A European Review, 12(3), 233–245.
Leonard, L., & Cronan, T. P. (2001). Illegal, inappropriate, and unethical behavior in an information technology context: a study to explain influence. Journal of the Association for Information Systems, 1(12), 1–31.
Madden, T. J., Ellen, P. S., & Ajzen, I. (1992). A comparison of the theory of planned behavior and the theory of reasoned action. Personality and Social Psychology Bulletin, 18(1), 3–9.
Marron, B. D., & Steel, D. G. (2002). Which countries protect intellectual property? The case of software piracy. Economic Inquiry, 38(2), 159–174.
Moores, T., & Dhillon, G. (2000). Software piracy: a view from Hong Kong. Communications of the ACM, 43(12), 88–93.
Morris, R. G., & Higgins, G. E. (2009). Neutralizing potential and self-reported digital piracy. Criminal Justice Review, 34(2), 173–195.
Oksanen, V., & Välimäki, M. (2006). Free software and copyright enforcement - a tool for global copyright policy? Knowledge, Technology & Policy, 18(4), 101–112.
Phau, I., & Ng, J. (2010). Predictors of usage intentions of pirated software. Journal of Business Ethics, 94(1), 23–37.
Phau, I., Lim, A., Liang, J., & Lwin, M. (2014). Engaging in digital piracy of movies: a theory of planned behaviour approach. Internet Research, 24(2), 246–266.
Phukan, S. (2005). Using information technology ethically: new dimensions in the age of the internet. The Business Review, Cambridge, 4(1), 234–239.
Podsakoff, P. M., Mackenzie, S. B., Russell, S. S., & Mohr, D. C. (2003). Common method biases in behavioral research: a critical review of the literature and recommended remedies. Journal of Applied Psychology, 88(5), 879–903.
Siegfried, R. M. (2004). Student attitudes on software piracy and related issues of computer ethics. Ethics and Information Technology, 6(4), 215–222.
Sims, R. R., Cheng, H. K., & Teegen, H. (1996). Toward a profile of student software piraters. Journal of Business Ethics, 15(8), 839–849.
Solomon, L. S., & O’Brien, A. J. (1990). The effects of demographic factors on attitudes toward software piracy. Journal of Computer Information Systems, 30(3), 40–46.
Swinyard, W. R., Rinne, H., & Keng Kau, A. (1990). The morality of software piracy: a cross-cultural analysis. Journal of Business Ethics, 9(8), 655–664.
Tan, B. (2002). Understanding consumer ethical decision making with respect to purchase of pirated software. Journal of Consumer Marketing, 19(2), 96–111.
Taylor, G. S., & Shim, P. J. (1993). A comparative examination of attitudes toward software piracy among business professors and executives. Human Relations, 46(4), 419–434.
Tenisci, T., & Alexander, W. (1992). Software piracy. ACM SIGUCCS Newsletter, 22(3), 7–8.
Triandis, H. C. (1980). Values, attitudes, and interpersonal behavior. In H. E. Howe Jr. (Ed.), Nebraska symposium on motivation. 1979 (Vol. 27, pp. 195–259). Lincoln: University of Nebraska Press.
Yang, Z., & Wang, J. (2015). Differential effects of social influence sources on self-reported music piracy. Decision Support Systems, 69, 70–81.
Acknowledgments
We would like to thank the Editor and the anonymous reviewers for their constructive and helpful comments.
Author information
Authors and Affiliations
Corresponding author
Appendix
Appendix
Section I – Demographic Information
Section II – Software Piracy (Use or Download of Unauthorized (Pirated) Software)
Behavioural Intentions | ||||||||||
1 | I intend to make unauthorized software copies in the future | Extremely Improbable | 1 | 2 | 3 | 4 | 5 | 6 | 7 | Extremely probable |
2 | I will try to make unauthorized software copies in the future | Extremely Improbable | 1 | 2 | 3 | 4 | 5 | 6 | 7 | Extremely probable |
3 | I will make an effort to make unauthorized software copies in the future | Extremely Improbable | 1 | 2 | 3 | 4 | 5 | 6 | 7 | Extremely probable |
Attitudes | ||||||||||
4 | Overall, my attitude towards using unauthorized software copies is: | Unfavorable | 1 | 2 | 3 | 4 | 5 | 6 | 7 | Favorable |
5 | Overall, my attitude towards using unauthorized software copies is: | Harmful | 1 | 2 | 3 | 4 | 5 | 6 | 7 | Beneficial |
6 | Overall, my attitude towards using unauthorized software copies is: | Foolish | 1 | 2 | 3 | 4 | 5 | 6 | 7 | Wise |
7 | Overall, my attitude towards using unauthorized software copies is: | Bad | 1 | 2 | 3 | 4 | 5 | 6 | 7 | Good |
Subjective norms | ||||||||||
8 | Most people who are important to me think I should not use unauthorized software copies | Strongly Disagree | 1 | 2 | 3 | 4 | 5 | 6 | 7 | Strongly Agree |
9 | When considering using unauthorized software copies, I wish to do what people who are important to me want me to do | Strongly Disagree | 1 | 2 | 3 | 4 | 5 | 6 | 7 | Strongly Agree |
10 | If I use unauthorized software copies, then most people who are important to me would | Disapprove | 1 | 2 | 3 | 4 | 5 | 6 | 7 | Not Care |
Perceived behavioural control | ||||||||||
11 | I have complete control of making unauthorized software copies | Strongly Disagree | 1 | 2 | 3 | 4 | 5 | 6 | 7 | Strongly Agree |
12 | For me, to make unauthorized software copies is easy | Strongly Disagree | 1 | 2 | 3 | 4 | 5 | 6 | 7 | Strongly Agree |
13 | If I want to, I could easily make unauthorized software copies | Strongly Disagree | 1 | 2 | 3 | 4 | 5 | 6 | 7 | Strongly Agree |
Moral obligation | ||||||||||
14 | I would not feel guilty if I use unauthorized software copies | Strongly Disagree | 1 | 2 | 3 | 4 | 5 | 6 | 7 | Strongly Agree |
15 | Using unauthorized software copies goes against my principles | Strongly Disagree | 1 | 2 | 3 | 4 | 5 | 6 | 7 | Strongly Agree |
16 | It would be morally wrong to use unauthorized software copies | Strongly Disagree | 1 | 2 | 3 | 4 | 5 | 6 | 7 | Strongly Agree |
Perceived prosecution risk | ||||||||||
17 | If you have used unauthorized software copies, what is the probability that you will be caught for the infringement of copyright law? | Very Low | 1 | 2 | 3 | 4 | 5 | 6 | 7 | Very High |
18 | You would be arrested for infringement of copyright law if you have used unauthorized software copies | Strongly Disagree | 1 | 2 | 3 | 4 | 5 | 6 | 7 | Strongly Agree |
Section III – Music Piracy (Use or Download of Unauthorized (Pirated) Music on the Internet)
Behavioral Intentions | ||||||||||
1 | I intend to engage in music piracy over the internet in the future | Extremely Improbable | 1 | 2 | 3 | 4 | 5 | 6 | 7 | Extremely probable |
2 | I will try to engage in music piracy over the internet in the future | Extremely Improbable | 1 | 2 | 3 | 4 | 5 | 6 | 7 | Extremely probable |
3 | I will make an effort to engage in music piracy over the internet in the future | Extremely Improbable | 1 | 2 | 3 | 4 | 5 | 6 | 7 | Extremely probable |
Attitudes | ||||||||||
4 | Overall, my attitude towards engaging in music piracy over the internet is: | Unfavorable | 1 | 2 | 3 | 4 | 5 | 6 | 7 | Favorable |
5 | Overall, my attitude towards engaging in music piracy over the internet is: | Harmful | 1 | 2 | 3 | 4 | 5 | 6 | 7 | Beneficial |
6 | Overall, my attitude towards engaging in music piracy over the internet is: | Foolish | 1 | 2 | 3 | 4 | 5 | 6 | 7 | Wise |
7 | Overall, my attitude towards engaging in music piracy over the internet is: | Bad | 1 | 2 | 3 | 4 | 5 | 6 | 7 | Good |
Subjective norms | ||||||||||
8 | Most people who are important to me think that I should not engage in music piracy over the internet | Strongly Disagree | 1 | 2 | 3 | 4 | 5 | 6 | 7 | Strongly Agree |
9 | When considering to engage in music piracy over the internet, I wish to do what people who are important to me want me to do | Strongly Disagree | 1 | 2 | 3 | 4 | 5 | 6 | 7 | Strongly Agree |
10 | If I engage in music piracy over the internet, then most people who are important to me would | Disapprove | 1 | 2 | 3 | 4 | 5 | 6 | 7 | Not care |
Perceived behavioral control | ||||||||||
11 | I have complete control of engaging in music piracy over the internet | Strongly Disagree | 1 | 2 | 3 | 4 | 5 | 6 | 7 | Strongly Agree |
12 | For me, to engage in music piracy over the internet is easy | Strongly Disagree | 1 | 2 | 3 | 4 | 5 | 6 | 7 | Strongly Agree |
13 | If I want to, I could easily engage in music piracy over the internet | Strongly Disagree | 1 | 2 | 3 | 4 | 5 | 6 | 7 | Strongly Agree |
Moral obligation | ||||||||||
14 | I would not feel guilty if I engage in music piracy over the internet | Strongly Disagree | 1 | 2 | 3 | 4 | 5 | 6 | 7 | Strongly Agree |
15 | Engaging in music piracy over the internet goes against my principles | Strongly Disagree | 1 | 2 | 3 | 4 | 5 | 6 | 7 | Strongly Agree |
16 | It would be morally wrong to engage in music piracy over the internet | Strongly Disagree | 1 | 2 | 3 | 4 | 5 | 6 | 7 | Strongly Agree |
Perceived prosecution risk | ||||||||||
17 | If you have engaged in music piracy over the internet, what is the probability that you will be caught for the infringement of copyright law? | Very Low | 1 | 2 | 3 | 4 | 5 | 6 | 7 | Very High |
18 | You would be arrested for infringement of copyright law if you engage in music piracy over the internet | Strongly Disagree | 1 | 2 | 3 | 4 | 5 | 6 | 7 | Strongly Agree |
Rights and permissions
About this article
Cite this article
Alleyne, P., Soleyn, S. & Harris, T. Predicting Accounting Students’ Intentions to Engage in Software and Music Piracy. J Acad Ethics 13, 291–309 (2015). https://doi.org/10.1007/s10805-015-9241-7
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10805-015-9241-7