Abstract
The purpose of this study is to investigate the salient factors influencing consumers’ attitudes and usage intentions towards pirated software. Using the Theory of Planned Behaviour, this study investigates the relationships between three sets of factors, i.e. personal, social and perceived behavioural control onto attitudes towards pirated software. Through a multiple regression, only personal factors have shown significant relationship with attitudes towards software piracy. Further results from this study have supported that favourable attitudes towards pirated software is likely to result in stronger intentions to use pirated software. It was found that computer proficiency acts as a predictor for intentions towards pirated software, rather than a moderator as originally postulated.
Similar content being viewed by others
References
Ajzen, I.: 1991, “The Theory of Planned Behavior”, Organizational Behavior and Human Decision Processes 50, 179-201.
Ajzen, I. and Fishbein, M.: 1977, “Attitude-Behaviour Relations: A Theoretical Analysis and Review of Empirical Research”, Psychological Bulletin 84(5), 888-918.
Albers-Miller, N.D.: 1999, “Consumer Misbehavior: Why People Buy Illicit Goods”, Journal of Business Ethics 16(3), 273-287.
Anderson, C.H.: 1986, “Hierarchical Moderated Regression Analysis: A Useful Tool for Retail Management Decisions”, Journal of Retailing 62(2), 186- 204.
Andrews, P. and Kandel, D.B.: 1979, “Attitude and Behaviour: A Specification of the Contingent Consistency Hypothesis”, American Sociological Review 44, 298-310.
Ang, S.H., Cheng, P.S., Lim, A.C. and Tambyah, S.K.: 2001, “Spot the Difference: Consumer Responses towards Counterfeits”, Journal of Consumer Marketing 18(3), 219- 235.
Bagozzi, R.P. and Warshaw, P.R.: 1990, “Trying to Consume”, Journal of Consumer Research 17(2), 127 – 140.
Bearden, W.O., Netemeyer, R.G. and Teel, J.E.: 1989, “Measurement of Consumer Susceptibility to Interpersonal Influence”, Journal of Consumer Research 15, 473-481.
Bloch, P.H., Bush, R.F. and Campbell, L.: 1993, “Consumer “Accomplices” in Product Counterfeiting: A Demand-Side Investigation”, Journal of Consumer Marketing 10(4), 27-36.
BSA: 2007, ‘Fourth Annual BSA and IDC Global Software Piracy Study’, http://w3.bsa.org/globalstudy/.
Cohen, E. and L. Cornwell: 1989, ‘College Students Believe Piracy is Acceptable’, CIS Educators Forum 2–5.
Cole, C.A.: 1989, “Deterrence and Consumer Fraud”, Journal of Retailing 65(1), 107-120.
Cordell, V.V., Wongtada, N. and Kieschnick, R.L.: 1996, “Counterfeit Purchase Intentions: Role of Lawfulness Attitudes and Product Traits as Determinants”, Journal of Business Research 35, 41-53.
Crittenden, W.F. Robertson, C. and Crittenden V.: 2007, “Hard Facts about Software Piracy”, Business Strategy Review 18(4), 30 – 33.
Donthu, N., D. Gilliland: 1996, ‘The Infomercial Shopper’, Journal of Advertising Research 36: 69–76.
Eining, M.M. and Christensen, A.L.: 1991, “A Psycho-Social Model of Software Piracy: The Development and Test of a Model”, in R. Dejoie, G. Fowler and D. Paradice, (eds), Ethical Issues in Information Systems, Boston: Boyd and Fraser Publishing Company.
Feldman, M.P.: 1977, Criminal Behaviour: A Psychological Analysis (John Wiley and Sons, London).
Gentry, L. and Calatone, R.: 2002, “A Comparison of Three Models to Explain Shop-Bot Use on the Web”, Psychology and Marketing 19(11), 945-956.
Glass, R.S. and Wood, W.A.: 1996, “Situational Determinants of Software Piracy: An Equity Theory Perspective”, Journal of Business Ethics 15, 1189-1198.
Goles, T., Jayatilaka, B., George, B., Parsons, L., Chambers, V., Taylor, D. and Brune, R.: 2008, “Softlifting: Exploring Determinants of Attitude”, Journal of Business Ethics 77(4), 481 – 499.
Gopal, R.D. and Sanders, G.L.: 2000, “Global Software Piracy: You can’t get Blood out of a Turnip”, Communications of the ACM 43(9), 82-89.
Grasmick, H. and G. J. Bryjak: 1980, `Deterrence in the Workplace: Perceived Certainty, Perceived Severity, and Employee Theft', Social Forces 59(2), 471–491.
Gupta, P.B., Gould, S.J. and Pola, B.: 2004, “‘To Pirate or Not to Pirate’: A Comparative Study of the Ethical Versus Other Influences on the Consumer’s Software Acquisition-Mode Decision”, Journal of Business Ethics 55(3), 1-20.
Harrington, S.: 1989, Why People Copy Software and Create Computer Viruses: Individual Characteristics or Situational Factors. Information Resource Management Journal 2(3) 28–37.
Herndon, N. C.: 2001, ‘Some Key Elements Important for Increasing Stakeholders Perceptions of Corporate Social Responsibility’, in H. E. Spotts, H. L. Meadow and S. M. Smith (eds.), Proceedings of the Tenth Biennial World Marketing Congress.
Hinduja, S.: 2003, “Trends and Patterns among Online Software Pirates”, Ethics and Information Technology 5, 49-63.
Hollinger, R. C. and J. P. Clark: 1983, `Deterrence in the Workplace: Perceived Certainty, Perceived Severity, and Employee Theft', Social Forces 62, 398–418.
Jones, T.M.:1991, “Ethical Decision Making by Individuals in Organizations: An Issue Contingent Model”, Academy of Management Review 16(2), 366-395.
Kini, R.B., Ramakrishna, H.V., Vijayaraman B.S.: 2004, “Shaping of Moral Intensity Regarding Software Piracy: A Comparison Between Thailand and U.S. Students”, Journal of Business Ethics 49, 91-104.
Kini, R.B., Rominger, A. and Vijayaraman, B.S.: 2000, “An Empirical Study of Software Piracy and Moral Intensity among University Students”, Journal of Computer Information System 40(3), 62-72.
Kohlberg, L.: 1969, “Stages and Sequence: The Cognitive Developmental Approach to Socialization”, in D. Growling (ed.), Handbook of Socialization Theory and Research, Rand McNally.
Kuo, F.Y. and Hsu, M.H.: 2001, “Development and Validation of Ethical Computer Self- Efficacy Measure: The Case of Softlifting”, Journal of Business Ethics 32, 299 - 315.
Kwong, K.K., Yau, H.M., Lee, S.Y., Sin, Y.M. and Tse, C.B.: 2003, “The Effects of Attitudinal and Demographic Factors on Intention to Buy Pirated CDs: The case Of Chinese Consumers”, Journal of Business Ethics 47, 223-235.
Lane, P. L. and M. R. Lane: 1996, ‘Ethical Views and Behaviour Regarding Software: Undergraduate Business Students vs. MBA Students’, in Proceedings of the Annual Decision Sciences Institute Conference.
Langenderfer, J. and Cook, D.L.: 2001, “Copyright Policies and Issues Rose by A and M Records v. Napster: The Shot Heard ‘Round the World’ or ‘Not with a Bang but a Whimper?”, Journal of Public Policy and Marketing 20(2), 280- 288.
Lau, E.K.: 2007, “Interaction Effects on Software Piracy”, Business Ethics: A European Review 16(1), 34 – 47.
Lichtenstein, D.R., Netemeyer, R.G. and Burton, S.: 1990, “Distinguishing Coupon Proneness from Value Consciousness: An Acquisition-transaction Utility Theory Perspective”, Journal of Marketing 54, 54-67.
Logsdon, J.M., Thompson, J.K. and Reid, R.A.: 1994, “Software Piracy: Is it Related to Level of Moral Judgment?”, Journal of Business Ethics 13, 849-857.
Marron, D.B. and Steel, D.G.: 2000, “Which Countries Protect Intellectual Property? The Case of software piracy”, Economic Enquiry 38(2), 159-174.
Neil, H.: 1992, “Ethics: Software Piracy”, Management Accounting 73, 60.
Nunally, J.: 1978, Psychometric Theory 2nd ed. (McGraw-Hill, New York).
O’Keefe, D.J.: 1990, Persuasion: Theory and Research, (Sage California).
Oz, E.: 1990, “The Attitude of Managers-To-Be Toward Software Piracy”, OR/MS Today 17(4), 24-26.
Peace, A.G.: 1997, “Software Piracy and Computer-Using Professionals: A Survey”, Journal of Computer Information Systems 37(3), 94-99.
Phau, I. and Teah, M.: 2009, “Devil wears (counterfeit) Prada: A Study of Antecedents and Outcomes of Attitudes towards Counterfeits of Luxury Brands”, Journal of Consumer Marketing 16(1), 15 – 27.
Putrevu, K. and Lord, K. R.: 1994, Comparative and Noncomparative Advertising: Attitudinal Effects Under Cognitive and Affective Involvement Conditions. Journal of Advertising 23: 77–90.
Shim, J.P. and Taylor, G.S.: 1993, “A Comparative Examination of Attitudes toward Software Piracy Among Business Professors and Executives”, Human Relations 46(4), 419-434.
Shore, B. Venkatachalam A.R. Solorzano E. Burn J.M. Hassan S.Z. Jacczewski L.J.: 2001, “Softlifting and Piracy: Behaviour Across Cultures”, Technology in Society 23, 563- 581.
SIIA: 2004, “What is Piracy?”, http://www.siia.net/piracy/whatis.asp.
Simpson, P.M., Banerjee, D. and Simpson Jr., C.L.: 1994, “Softlifting: A Model of Motivating Factors”, Journal of Business Ethics 13(6), 431-438.
Sims, R.R., Cheng, H.K. and Teegen, H.: 1996, “Toward a Profile of Student Software Pirates”, Journal of Business Ethics 15(8), 839-849.
Solomon, S.L. and O’Brien, J.A.: 1990, “The Effect of Demographic Factors on Attitudes toward Software Piracy”, Journal of Computer Information Systems 30(3), 40-46.
Strikwerda, R.B. and Ross, J.M.: 1992, “Software and Ethical Softness”, Collegiate Microcomputer X 3, 129-136.
Swinyard, W.R., Rinne, H. and Kau, A.K.: 1990, “The Morality of Software Piracy: A Cross-Cultural Analysis”, Journal of Business Ethics 56(2), 149-161.
Sykes, G.M. and Matza, D.: 1957, “Techniques of Neutralization: A Theory of Delinquency”, American Sociological Review 22, 664-670.
Takeyama, L.: 1997, “The Intertemporal Consequences of Unauthorized Reproduction of Intellectual Property”, Journal of Law and Economics 40(2), 511-522.
Tang, J. H. and C. K. Farn: 2004, ‘The Effect of Interpersonal Influence on Softlifting Intention and Behaviour’, Journal of Business Ethics 56(2), 149–161.
Vinson, D.E., Munson, J.M. and Nakanishi, M.: 1977, “An Investigation of the Rokeach Value Survey for Consumer Research Applications”, in Perreault W.E. (ed.), Advances in Consumer Research, 4, (The Association for Consumer Research, Provo, UT), 247-252.
Wagner, S.C. and Sanders, G.L.: 2001, “Considerations in Ethical Decision-Making and Software Piracy”, Journal of Business Ethics 29, 161-167.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Phau, I., Ng, J. Predictors of Usage Intentions of Pirated Software. J Bus Ethics 94, 23–37 (2010). https://doi.org/10.1007/s10551-009-0247-1
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10551-009-0247-1