Skip to main content
Log in

Predictors of Usage Intentions of Pirated Software

  • Published:
Journal of Business Ethics Aims and scope Submit manuscript

Abstract

The purpose of this study is to investigate the salient factors influencing consumers’ attitudes and usage intentions towards pirated software. Using the Theory of Planned Behaviour, this study investigates the relationships between three sets of factors, i.e. personal, social and perceived behavioural control onto attitudes towards pirated software. Through a multiple regression, only personal factors have shown significant relationship with attitudes towards software piracy. Further results from this study have supported that favourable attitudes towards pirated software is likely to result in stronger intentions to use pirated software. It was found that computer proficiency acts as a predictor for intentions towards pirated software, rather than a moderator as originally postulated.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Similar content being viewed by others

References

  • Ajzen, I.: 1991, “The Theory of Planned Behavior”, Organizational Behavior and Human Decision Processes 50, 179-201.

    Article  Google Scholar 

  • Ajzen, I. and Fishbein, M.: 1977, “Attitude-Behaviour Relations: A Theoretical Analysis and Review of Empirical Research”, Psychological Bulletin 84(5), 888-918.

    Article  Google Scholar 

  • Albers-Miller, N.D.: 1999, “Consumer Misbehavior: Why People Buy Illicit Goods”, Journal of Business Ethics 16(3), 273-287.

    Google Scholar 

  • Anderson, C.H.: 1986, “Hierarchical Moderated Regression Analysis: A Useful Tool for Retail Management Decisions”, Journal of Retailing 62(2), 186- 204.

    Google Scholar 

  • Andrews, P. and Kandel, D.B.: 1979, “Attitude and Behaviour: A Specification of the Contingent Consistency Hypothesis”, American Sociological Review 44, 298-310.

    Article  Google Scholar 

  • Ang, S.H., Cheng, P.S., Lim, A.C. and Tambyah, S.K.: 2001, “Spot the Difference: Consumer Responses towards Counterfeits”, Journal of Consumer Marketing 18(3), 219- 235.

    Article  Google Scholar 

  • Bagozzi, R.P. and Warshaw, P.R.: 1990, “Trying to Consume”, Journal of Consumer Research 17(2), 127 – 140.

    Article  Google Scholar 

  • Bearden, W.O., Netemeyer, R.G. and Teel, J.E.: 1989, “Measurement of Consumer Susceptibility to Interpersonal Influence”, Journal of Consumer Research 15, 473-481.

    Article  Google Scholar 

  • Bloch, P.H., Bush, R.F. and Campbell, L.: 1993, “Consumer “Accomplices” in Product Counterfeiting: A Demand-Side Investigation”, Journal of Consumer Marketing 10(4), 27-36.

    Article  Google Scholar 

  • BSA: 2007, ‘Fourth Annual BSA and IDC Global Software Piracy Study’, http://w3.bsa.org/globalstudy/.

  • Cohen, E. and L. Cornwell: 1989, ‘College Students Believe Piracy is Acceptable’, CIS Educators Forum 2–5.

  • Cole, C.A.: 1989, “Deterrence and Consumer Fraud”, Journal of Retailing 65(1), 107-120.

    Google Scholar 

  • Cordell, V.V., Wongtada, N. and Kieschnick, R.L.: 1996, “Counterfeit Purchase Intentions: Role of Lawfulness Attitudes and Product Traits as Determinants”, Journal of Business Research 35, 41-53.

    Article  Google Scholar 

  • Crittenden, W.F. Robertson, C. and Crittenden V.: 2007, “Hard Facts about Software Piracy”, Business Strategy Review 18(4), 30 – 33.

    Article  Google Scholar 

  • Donthu, N., D. Gilliland: 1996, ‘The Infomercial Shopper’, Journal of Advertising Research 36: 69–76.

    Google Scholar 

  • Eining, M.M. and Christensen, A.L.: 1991, “A Psycho-Social Model of Software Piracy: The Development and Test of a Model”, in R. Dejoie, G. Fowler and D. Paradice, (eds), Ethical Issues in Information Systems, Boston: Boyd and Fraser Publishing Company.

    Google Scholar 

  • Feldman, M.P.: 1977, Criminal Behaviour: A Psychological Analysis (John Wiley and Sons, London).

    Google Scholar 

  • Gentry, L. and Calatone, R.: 2002, “A Comparison of Three Models to Explain Shop-Bot Use on the Web”, Psychology and Marketing 19(11), 945-956.

    Article  Google Scholar 

  • Glass, R.S. and Wood, W.A.: 1996, “Situational Determinants of Software Piracy: An Equity Theory Perspective”, Journal of Business Ethics 15, 1189-1198.

    Article  Google Scholar 

  • Goles, T., Jayatilaka, B., George, B., Parsons, L., Chambers, V., Taylor, D. and Brune, R.: 2008, “Softlifting: Exploring Determinants of Attitude”, Journal of Business Ethics 77(4), 481 – 499.

    Article  Google Scholar 

  • Gopal, R.D. and Sanders, G.L.: 2000, “Global Software Piracy: You can’t get Blood out of a Turnip”, Communications of the ACM 43(9), 82-89.

    Article  Google Scholar 

  • Grasmick, H. and G. J. Bryjak: 1980, `Deterrence in the Workplace: Perceived Certainty, Perceived Severity, and Employee Theft', Social Forces 59(2), 471–491.

    Google Scholar 

  • Gupta, P.B., Gould, S.J. and Pola, B.: 2004, “‘To Pirate or Not to Pirate’: A Comparative Study of the Ethical Versus Other Influences on the Consumer’s Software Acquisition-Mode Decision”, Journal of Business Ethics 55(3), 1-20.

    Article  Google Scholar 

  • Harrington, S.: 1989, Why People Copy Software and Create Computer Viruses: Individual Characteristics or Situational Factors. Information Resource Management Journal 2(3) 28–37.

    Google Scholar 

  • Herndon, N. C.: 2001, ‘Some Key Elements Important for Increasing Stakeholders Perceptions of Corporate Social Responsibility’, in H. E. Spotts, H. L. Meadow and S. M. Smith (eds.), Proceedings of the Tenth Biennial World Marketing Congress.

  • Hinduja, S.: 2003, “Trends and Patterns among Online Software Pirates”, Ethics and Information Technology 5, 49-63.

    Article  Google Scholar 

  • Hollinger, R. C. and J. P. Clark: 1983, `Deterrence in the Workplace: Perceived Certainty, Perceived Severity, and Employee Theft', Social Forces 62, 398–418.

    Google Scholar 

  • Jones, T.M.:1991, “Ethical Decision Making by Individuals in Organizations: An Issue Contingent Model”, Academy of Management Review 16(2), 366-395.

    Article  Google Scholar 

  • Kini, R.B., Ramakrishna, H.V., Vijayaraman B.S.: 2004, “Shaping of Moral Intensity Regarding Software Piracy: A Comparison Between Thailand and U.S. Students”, Journal of Business Ethics 49, 91-104.

    Article  Google Scholar 

  • Kini, R.B., Rominger, A. and Vijayaraman, B.S.: 2000, “An Empirical Study of Software Piracy and Moral Intensity among University Students”, Journal of Computer Information System 40(3), 62-72.

    Google Scholar 

  • Kohlberg, L.: 1969, “Stages and Sequence: The Cognitive Developmental Approach to Socialization”, in D. Growling (ed.), Handbook of Socialization Theory and Research, Rand McNally.

    Google Scholar 

  • Kuo, F.Y. and Hsu, M.H.: 2001, “Development and Validation of Ethical Computer Self- Efficacy Measure: The Case of Softlifting”, Journal of Business Ethics 32, 299 - 315.

    Article  Google Scholar 

  • Kwong, K.K., Yau, H.M., Lee, S.Y., Sin, Y.M. and Tse, C.B.: 2003, “The Effects of Attitudinal and Demographic Factors on Intention to Buy Pirated CDs: The case Of Chinese Consumers”, Journal of Business Ethics 47, 223-235.

    Article  Google Scholar 

  • Lane, P. L. and M. R. Lane: 1996, ‘Ethical Views and Behaviour Regarding Software: Undergraduate Business Students vs. MBA Students’, in Proceedings of the Annual Decision Sciences Institute Conference.

  • Langenderfer, J. and Cook, D.L.: 2001, “Copyright Policies and Issues Rose by A and M Records v. Napster: The Shot Heard ‘Round the World’ or ‘Not with a Bang but a Whimper?”, Journal of Public Policy and Marketing 20(2), 280- 288.

    Article  Google Scholar 

  • Lau, E.K.: 2007, “Interaction Effects on Software Piracy”, Business Ethics: A European Review 16(1), 34 – 47.

    Article  Google Scholar 

  • Lichtenstein, D.R., Netemeyer, R.G. and Burton, S.: 1990, “Distinguishing Coupon Proneness from Value Consciousness: An Acquisition-transaction Utility Theory Perspective”, Journal of Marketing 54, 54-67.

    Article  Google Scholar 

  • Logsdon, J.M., Thompson, J.K. and Reid, R.A.: 1994, “Software Piracy: Is it Related to Level of Moral Judgment?”, Journal of Business Ethics 13, 849-857.

    Article  Google Scholar 

  • Marron, D.B. and Steel, D.G.: 2000, “Which Countries Protect Intellectual Property? The Case of software piracy”, Economic Enquiry 38(2), 159-174.

    Google Scholar 

  • Neil, H.: 1992, “Ethics: Software Piracy”, Management Accounting 73, 60.

    Google Scholar 

  • Nunally, J.: 1978, Psychometric Theory 2nd ed. (McGraw-Hill, New York).

    Google Scholar 

  • O’Keefe, D.J.: 1990, Persuasion: Theory and Research, (Sage California).

    Google Scholar 

  • Oz, E.: 1990, “The Attitude of Managers-To-Be Toward Software Piracy”, OR/MS Today 17(4), 24-26.

    Google Scholar 

  • Peace, A.G.: 1997, “Software Piracy and Computer-Using Professionals: A Survey”, Journal of Computer Information Systems 37(3), 94-99.

    Google Scholar 

  • Phau, I. and Teah, M.: 2009, “Devil wears (counterfeit) Prada: A Study of Antecedents and Outcomes of Attitudes towards Counterfeits of Luxury Brands”, Journal of Consumer Marketing 16(1), 15 – 27.

    Article  Google Scholar 

  • Putrevu, K. and Lord, K. R.: 1994, Comparative and Noncomparative Advertising: Attitudinal Effects Under Cognitive and Affective Involvement Conditions. Journal of Advertising 23: 77–90.

    Google Scholar 

  • Shim, J.P. and Taylor, G.S.: 1993, “A Comparative Examination of Attitudes toward Software Piracy Among Business Professors and Executives”, Human Relations 46(4), 419-434.

    Article  Google Scholar 

  • Shore, B. Venkatachalam A.R. Solorzano E. Burn J.M. Hassan S.Z. Jacczewski L.J.: 2001, “Softlifting and Piracy: Behaviour Across Cultures”, Technology in Society 23, 563- 581.

    Article  Google Scholar 

  • SIIA: 2004, “What is Piracy?”, http://www.siia.net/piracy/whatis.asp.

  • Simpson, P.M., Banerjee, D. and Simpson Jr., C.L.: 1994, “Softlifting: A Model of Motivating Factors”, Journal of Business Ethics 13(6), 431-438.

    Article  Google Scholar 

  • Sims, R.R., Cheng, H.K. and Teegen, H.: 1996, “Toward a Profile of Student Software Pirates”, Journal of Business Ethics 15(8), 839-849.

    Article  Google Scholar 

  • Solomon, S.L. and O’Brien, J.A.: 1990, “The Effect of Demographic Factors on Attitudes toward Software Piracy”, Journal of Computer Information Systems 30(3), 40-46.

    Google Scholar 

  • Strikwerda, R.B. and Ross, J.M.: 1992, “Software and Ethical Softness”, Collegiate Microcomputer X 3, 129-136.

    Google Scholar 

  • Swinyard, W.R., Rinne, H. and Kau, A.K.: 1990, “The Morality of Software Piracy: A Cross-Cultural Analysis”, Journal of Business Ethics 56(2), 149-161.

    Article  Google Scholar 

  • Sykes, G.M. and Matza, D.: 1957, “Techniques of Neutralization: A Theory of Delinquency”, American Sociological Review 22, 664-670.

    Article  Google Scholar 

  • Takeyama, L.: 1997, “The Intertemporal Consequences of Unauthorized Reproduction of Intellectual Property”, Journal of Law and Economics 40(2), 511-522.

    Article  Google Scholar 

  • Tang, J. H. and C. K. Farn: 2004, ‘The Effect of Interpersonal Influence on Softlifting Intention and Behaviour’, Journal of Business Ethics 56(2), 149–161.

    Google Scholar 

  • Vinson, D.E., Munson, J.M. and Nakanishi, M.: 1977, “An Investigation of the Rokeach Value Survey for Consumer Research Applications”, in Perreault W.E. (ed.), Advances in Consumer Research, 4, (The Association for Consumer Research, Provo, UT), 247-252.

    Google Scholar 

  • Wagner, S.C. and Sanders, G.L.: 2001, “Considerations in Ethical Decision-Making and Software Piracy”, Journal of Business Ethics 29, 161-167.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ian Phau.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Phau, I., Ng, J. Predictors of Usage Intentions of Pirated Software. J Bus Ethics 94, 23–37 (2010). https://doi.org/10.1007/s10551-009-0247-1

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10551-009-0247-1

Keywords

Navigation