Skip to main content
Log in

Predicting the Use of Pirated Software: A Contingency Model Integrating Perceived Risk with the Theory of Planned Behavior

  • Published:
Journal of Business Ethics Aims and scope Submit manuscript

Abstract

As software piracy continues to be a threat to the growth of national and global economies, understanding why people continue to use pirated software and learning how to discourage the use of pirated software are urgent and important issues. In addition to applying the theory of planned behavior (TPB) perspective to capture behavioral intention to use pirated software, this paper considers perceived risk as a salient belief influencing attitude and intention toward using pirated software. Four perceived risk components related to the use of pirated software (performance, social, prosecution and psychological risks) have been identified, measured and tested. Data were collected through an online survey of 305 participants. The results indicate that perceived prosecution risk has an impact on intention to use pirated software, and perceived psychological risk is a strong predictor of attitude toward using pirated software. In addition, attitude and perceived behavior control contribute significantly to the intended use of pirated software. However, the proposed direct relationship between subjective norm and intention to use pirated software is not supported. Implications for research and practice are discussed.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

References

  • Ajzen, I. 1985 ‹From Intentions to Actions: A theory of Planned Behavior’. in: J. Kuhl and J. Beckman (eds.). Action Control: From Cognition to Behavior. Springer, Heidelberg, pp. 11-39.

    Google Scholar 

  • Ajzen, I. (1991). The Theory of Planned Behavior. Organizational Behavior and Human Decision Processes, 50(2), 179–211. doi:10.1016/0749-5978(91)90020-T.

    Article  Google Scholar 

  • Ajzen, I. (2002). Perceived Behavioral Control, Self-Efficacy, Locus of Control, and the Theory of Planned Behavior. Journal of Applied Social Psychology, 32(4), 665–683. doi:10.1111/j.1559-1816.2002.tb00236.x.

    Article  Google Scholar 

  • Akaah, I.P., & Lund, D. (1994). ‹The Influence of Personal and Organizational Values on Marketing Professions’ Ethical Behavior’. Journal of Business Ethics, 13(6), 417–430. doi:10.1007/BF00881450.

    Article  Google Scholar 

  • Al-Rafee, S., & Cronan, T.P. (2006). Digital Piracy: Factors that Influence Attitude Toward Behavior. Journal of Business Ethics, 63(3), 237–259. doi:10.1007/s10551-005-1902-9.

    Article  Google Scholar 

  • Anderson, J.C., & Gerbing, D.W. (1988). Structural Equation Modeling in Practice: A Review and Recommended Two-step Approach. Psychological Bulletin, 103(3), 411–423. doi:10.1037/0033-2909.103.3.411.

    Article  Google Scholar 

  • Bauer, R.A.: 1960, ‹Consumer Behavior as Risk Taking’, in R. S. Hancock (ed.), Dynamic Marketing for a Changing World. Proceedings of the 43rd National Conference of the American Marketing Association, pp. 389–398

  • Business Software Alliance (BSA): 2008, ‹Study Finds Software Piracy Falling in Many Countries, But Challenge Shifting to Emerging, High-Growth Markets’, Retrieved May 14, 2008, from: http://www.bsa.org/country/News%20and%20Events/News%20Archives/en-05142008-globalstudy.aspx

  • Campbell, M.C., & Goodstein, R.C. (2001). ‹The Moderating Effect of Perceived Risk on Consumers’ Evaluations of Product Incongruity: Preference for the Norm’. The Journal of Consumer Research, 28(3), 439–449. doi:10.1086/323731.

    Article  Google Scholar 

  • Chang, M.K. (1998). Predicting Unethical Behavior: A Comparison of the Theory of Reasoned Action and the Theory of Planned Behavior. Journal of Business Ethics, 17(16), 1825–1834. doi:10.1023/A:1005721401993.

    Article  Google Scholar 

  • Chiou, J.-S., Huang, C.-Y., & Lee, H.-H. (2005). The Antecedents of Music Piracy Attitudes and Intentions. Journal of Business Ethics, 57(2), 161–174. doi:10.1007/s10551-004-5263-6.

    Article  Google Scholar 

  • Chiu, H.-C., Lin, Y.-M., Lee, M., Nieh, M.-E., & Chen, H.-C. (2008). How to Discourage Online Music Piracy. International Journal of Management and Enterprise Development, 5(6), 723–738. doi:10.1504/IJMED.2008.021192.

    Article  Google Scholar 

  • Conchar, M.P., Zinkhan, G.M., Peters, C., & Olavarrieta, S. (2004). ‹An Integrated Framework for the Conceptualization of Consumers’ Perceived-Risk Processing’. Journal of the Academy of Marketing Science, 32(4), 418–436. doi:10.1177/0092070304267551.

    Article  Google Scholar 

  • Cronan, T.P., & Al-Rafee, S. (2008). Factors that Influence the Intention to Pirate Software and Media. Journal of Business Ethics, 78(4), 527–545. doi:10.1007/s10551-007-9366-8.

    Article  Google Scholar 

  • Cunningham, S.M. 1967 ‹The Major Dimensions of Perceived Risk’. in: D. F. Cox (ed.). Risk Taking and Information Handling in Consumer Behavior. Harvard University Press, Boston, pp. 82-108.

    Google Scholar 

  • Davis, F.D., Bagozzi, R.P., & Warshaw, P.R. (1989). User Acceptance of Computer Technology: A Comparison of Two Theoretical Models. Management Science, 35(8), 982–1003. doi:10.1287/mnsc.35.8.982.

    Article  Google Scholar 

  • Dowling, G.R., & Staelin, R. (1994). A Model of Perceived Risk and Intended Risk-Handling Activity. The Journal of Consumer Research, 21(1), 119–134. doi:10.1086/209386.

    Article  Google Scholar 

  • Eagly, A.H., Chaiken, S. 1993. The Psychology of Attitudes. Harcourt Brace Jovanovich: Fort Worth TX.

    Google Scholar 

  • Featherman, M.S., & Pavlou, P.A. (2003). Predicting e-Services Adoption: A Perceived Risk Facets Perspective. International Journal of Human-Computer Studies, 59(4), 451–474. doi:10.1016/S1071-5819(03)00111-3.

    Article  Google Scholar 

  • Featherman, M.S., Valacich, J.S., & Wells, J.D. (2006). Is that Authentic or Artificial? Understanding Consumer Perceptions of Risk in e-Service Encounters. Information Systems Journal, 16(2), 107–134. doi:10.1111/j.1365-2575.2006.00211.x.

    Article  Google Scholar 

  • Festinger, L. 1957, A Theory of Cognitive Dissonance (Stanford University Press, Stanford).

    Google Scholar 

  • Fishbein, M., & Ajzen, I.1975, Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research (Addison-Wesley, Reading, MA).

    Google Scholar 

  • Fraedrich, J.P., & Ferrell, O.C. (1992). The Impact of Perceived Risk and Moral Philosophy Type on Ethical Decision Making in Business Organizations. Journal of Business Research, 24(4), 283–295. doi:10.1016/0148-2963(92)90035-A.

    Article  Google Scholar 

  • Gefen, D., Straub, D.W., & Boudreau, M. (2000). Structural Equation Modeling and Regression: Guidelines for Research Practice. Communications of the Association for Information Systems, 4(7), 1–70.

    Google Scholar 

  • Gopal, R.D., & Sanders, G.L. (1998). International Software Piracy: Analysis of Key Issues and Impacts. Information Systems Research, 9(4), 380–397. doi:10.1287/isre.9.4.380.

    Article  Google Scholar 

  • Gopal, R.D., & Sanders, G.L. (2000). ‹Software Piracy: You Can’t Get Blood out of a Turnip’. Communications of the ACM, 43(9), 83–89. doi:10.1145/348941.349002.

    Article  Google Scholar 

  • Hair, J.F., Anderson, R.E., Tatham, R.L., Black, W.C. 1998 Multivariate Data Analysis. Prentice Hall: Upper Saddle River New Jersey.

    Google Scholar 

  • Havlena, W.J., & DeSarbo, W.S. (1991). On the Measurement of Perceived Consumer Risk. Decision Sciences, 22(4), 927–939. doi:10.1111/j.1540-5915.1991.tb00372.x.

    Article  Google Scholar 

  • Husted, B.W. (2000). The Impact of National Culture on Software Piracy. Journal of Business Ethics, 26(3), 197–211. doi:10.1023/A:1006250203828.

    Article  Google Scholar 

  • Jacoby, J. and L. B. Kaplan: 1972, The Components of Perceived Risk. Proceedings of the 3rd Annual Conference, Association for Consumer Research, pp. 382–393

  • Kwong, T. C. H. and M. K. O. Lee: 2002, Behavioral Intention Model for the Exchange Mode Internet Music Piracy. Proceedings of the 35th Hawaii International Conference on System Sciences

  • Laroche, M., Yang, Z., McDougall, G.H.G., & Bergeron, J. (2005). Internet Versus Bricks-and-Mortar Retailers: An Investigation into Intangibility and its Consequences. Journal of Retailing, 81(4), 251–267. doi:10.1016/j.jretai.2004.11.002.

    Article  Google Scholar 

  • Lim, N. (2003). ‹Consumers’ Perceived Risk: Sources Versus Consequences’. Electronic Commerce Research and Applications, 2(3), 216–228. doi:10.1016/S1567-4223(03)00025-5.

    Article  Google Scholar 

  • Lim, H., & Dubinsky, A.J. (2005). The Theory of Planned Behavior in E-Commerce: Making a Case for Interdependencies between Salient Beliefs. Psychology and Marketing, 22(10), 833–855. doi:10.1002/mar.20086.

    Article  Google Scholar 

  • Lin, T.-C., M. H. Hsu, F.-Y. Kuo and P.-C. Sun: 1999, An Intention Model-Based Study of Software Piracy. Proceedings of the 32nd Hawaii International Conference on System Sciences

  • Lin, W.-B. (2008). ‹Investigation on the Model of Consumers’ Perceived Risk—Integrated Viewpoint’. Expert Systems with Applications, 34(2), 977–988. doi:10.1016/j.eswa.2006.10.042.

    Article  Google Scholar 

  • Miniard, P.W., & Cohen, J.B. (1981). ‹An Examination of the Fishbein-Ajzen Behavioral Intentions Model’s Concepts and Measures’. Journal of Experimental Social Psychology, 17, 309–339. doi:10.1016/0022-1031(81)90031-7.

    Article  Google Scholar 

  • Mitchell, V.-W. (1992). ‹Understanding Consumers’ Behaviour: Can Perceived Risk Theory Help?’. Management Decision, 30(3), 26–31. doi:10.1108/00251749210013050.

    Article  Google Scholar 

  • Mitchell, V.-W. (1999). Consumer Perceived Risk: Conceptualisations and Models. European Journal of Marketing, 33(1/2), 163–195. doi:10.1108/03090569910249229.

    Article  Google Scholar 

  • Mitchell, V.-W. (2001). Re-conceptualizing Consumer Store Image Processing Using Perceived Risk. Journal of Business Research, 54(2), 167–172. doi:10.1016/S0148-2963(99)00086-7.

    Article  Google Scholar 

  • Pavlou, P.A. (2003). Consumer Acceptance of Electronic Commerce: Integrating Trust and Risk with the Technology Acceptance Model. International Journal of Electronic Commerce, 7(3), 101–134.

    Google Scholar 

  • Peace, A.G., Galletta, D.F., & Thong, J.Y.L. (2003). Software Piracy in the Workplace: A Model and Empirical Test. Journal of Management Information Systems, 20(1), 153–177.

    Google Scholar 

  • Roselius, T. (1971). Consumer Rankings of Risk Reduction Methods. Journal of Marketing, 35(1), 56–61. doi:10.2307/1250565.

    Article  Google Scholar 

  • Sheppard, B.H., Hartwick, J., & Warshaw, P.R. (1988). The Theory of Reasoned Action: A Meta-Analysis of Past Research with Recommendations for Modifications and Future Research. The Journal of Consumer Research, 15(3), 325–343. doi:10.1086/209170.

    Article  Google Scholar 

  • Sinha, R.K., & Mandel, N. (2008). Preventing Digital Music Piracy: The Carrot or the Stick? Journal of Marketing, 72(1), 1–15. doi:10.1509/jmkg.72.1.1.

    Article  Google Scholar 

  • Sitkin, S.B., & Weingart, L.R. (1995). Determinants of Risky Decision-Making Behavior: A Test of the Mediating Role of Risk Perceptions and Propensity. Academy of Management Journal, 38(6), 1573–1592. doi:10.2307/256844.

    Article  Google Scholar 

  • Stone, R.N., & Gronhaug, K. (1993). Perceived Risk: Further Considerations for the Marketing Discipline. European Journal of Marketing, 27(3), 39–50. doi:10.1108/03090569310026637.

    Article  Google Scholar 

  • Swinyard, W.R., Rinne, H., & Kau, A.K. (1990). The Morality of Software Piracy: A Cross-Cultural Analysis. Journal of Business Ethics, 9(8), 655–664. doi:10.1007/BF00383392.

    Article  Google Scholar 

  • Tan, B. (2002). Understanding Consumer Ethical Decision Making with Respect to Purchase of Pirated Software. Journal of Consumer Marketing, 19(2/3), 96–111. doi:10.1108/07363760210420531.

    Article  Google Scholar 

  • Taylor, S., & Todd, P.A. (1995). Understanding Information Technology Usage: A Test of Competing Models. Information Systems Research, 6(2), 144–176. doi:10.1287/isre.6.2.144.

    Article  Google Scholar 

  • Venkatesh, V., Morris, M.G., Davis, G.B., & Davis, F.D. (2003). User Acceptance of Information Technology: Toward a Unified View. MIS Quarterly, 27(3), 425–478.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chechen Liao.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Liao, C., Lin, HN. & Liu, YP. Predicting the Use of Pirated Software: A Contingency Model Integrating Perceived Risk with the Theory of Planned Behavior. J Bus Ethics 91, 237–252 (2010). https://doi.org/10.1007/s10551-009-0081-5

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10551-009-0081-5

Keywords

Navigation