Abstract
Software piracy, the illegal and unauthorized duplication, sale, or distribution of software, is a widespread and costly phenomenon. According to Business Software Alliance (2008), over 41% of the PC software packages installed worldwide were unauthorized copies. Software piracy behavior has been investigated for more than 30 years. However, after a review of the relevant literature, there appears to be two voids in this literature: a lack of studies in non-Western countries and a scarcity of process studies. This study contributes to literature by developing a software piracy model to better understand the decision-making process that underlies this unethical behavior. The model was tested using data collected from a sample of 323 undergraduate business students. Consistent with the Theory of Reasoned Action (TRA), attitudes toward software piracy and subjective norms were significant predictors of intention to pirate software. Also, the results suggested that ethical ideology, public self-consciousness, and low self-control moderated the effect of these variables on intention to pirate software. The results have important practical implications for the software industry and governments hoping to curtail software piracy. Limitations of the study and recommendations for future studies are discussed as well.
Similar content being viewed by others
References
Ajzen, I.: 1988, Attitudes, Personality, and Behavior,(Milton Keynes, England: Open University Press).
Ajzen, I.: 1991, ‘The Theory of Planned Behavior’, Organizational Behavior and Human Decision Processes 51(2), 179-211.
Al-Jabri, I., and A. Abdul-Gader: 1997, ‘Software Copyright Infringements: An Exploratory Study of the Effects of Individual and Peer Beliefs’, Omega 25(3), 335-344.
Al-Rafee, S., and T. P. Cronan: 2006, ‘Digital piracy: Factors that Influence Attitude Toward Behavior’, Journal of Business Ethics 63 , 237-259.
Anderson, J. C., and D. W. Gerbing: 1988, ‘Structural Equation Modeling in Practice: A Review and Recommended Two-Step Approach’, Psychological Bulletin 103(3), 411-423.
Ang, S. H., P. S. Cheng, E. A. C. Lim and K. Tambyah: 2001, ‘Spot the Differences: Consumer Responses Toward Counterfeit’, Journal of Consumer Marketing 18(3), 219-235.
Anonymous: 2007, ‘Business Software Sales Soar to $ 500m’, MEED: Middle East Economic Digest 51(40), 33.
Banduri, A.: 1991, ‘Social Cognitive Theory of Self-Regulation’, Organizational Behavior, and Human Decision Processes 50, 248-287.
Barnett, T., K. Bass and G. Brown: 1994, ‘Ethical Ideology and Ethical Judgment Regarding Ethical Issues in Business’, Journal of Business Ethics 13(6), 469-480.
Baron, R. M., and D. A. Kenny: 1986, ‘The Moderator-Mediator Variable Distinction in Social Psychological Research: Conceptual, Strategic, and Statistical Considerations’, Journal of Personality and Social Psychology 51, 1173–1182.
Beekun, R., I., Y. Stedham and J. H. Yamamura: 2003, ‘Business Ethics In Brazil And The U.S.: A Comparative Investigation’, Journal of Business Ethics 42(3), 267-279.
Bentler, P., M.: 1990, ‘Comparative Fit Indexes in Structural Models’, Psychological Bulletin 107, 238-246.
Bentler, P., M. and D. G. Bonett: 1980, ‘Significance Tests And Goodness of Fit in the Analysis of Covariance Structures’, Psychological Bulletin 88, 588-606.
Breckler, S. J.: 1990, ‘Applications of Covariance Structure Modeling in Psychology: Cause for Concern?’ Psychology Bulletin 107(2), 260-273.
Burkett, S. R.: 1993, ‘Perceived parents’ Religiosity, Friends’ Drinking, and Hellfire: A Panel Study of Adolescent Drinking’, Review of Religious Research 35(2), 134-154.
Business Software Alliance: 2008, Sixth Annual BSA-IDC Global Software Piracy Study. Retrieved April 15, 2008, from http://global.bsa.org/globalpiracy2008/studies/globalpiracy2008.pdf.
Byrne, B.M.: 2006, Structural Equation Modeling with EQS: Basic Concepts, Applications and Programming, 2nd ed, (Lawrence Erlbaum Associates, Mahwah, NJ).
Carlin, W., B., and K. C. Strong: 1995, ‘A Critique of Western Philosophical Ethics: Multidisciplinary Alternatives for Framing Ethical Dilemmas’, Journal of Business Ethics 14 (5), 387-396.
Carver, C. S., and M. F. Scheier: 1981, Attention and Self-Regulation: A Control-Theory Approach to Human Behavior, (Springer-Verlag, New York).
Chang, M. K.: 1998, ‘Predicting Unethical Behavior: A Comparison of The Theory of Reasoned Action and the Theory of Planned Behavior’, Journal of Business Ethics 17(16), 1825-1834.
Chang, L., and K. T. Hau: 2001, ‘The Effect Of Self-Consciousness on The Expression of Gender Views’, Journal of Applied Social Psychology 31(2), 340-351.
Chiou, j., C. Huang and H. Lee: 2005, ‘Antecedents of Music Piracy Attitudes and Intentions’, Journal of Business Ethics 57(2), 161-174.
Christensen, A. L., and M. Eining: 1991, ‘Factors Influencing Software Piracy: Implication for Accountants’, Journal of Information Systems 5(1), 67-80.
Cochran, J. K., P. B. Wood, C. S. Sellers,W. Wilkerson and M. B. Chamlin: 1998, ‘Academic Dishonesty and Low Self-Control: An Empirical Test of A General Theory of Crime’ Deviant Behavior: An Interdisciplinary Journal 19, 227-255.
Costarelli, S. and A. P. Colloca: 2007, ‘The Moderation of Ambivalence on Attitude–Intention Relations as Mediated by Attitude Importance’, European Journal of Social Psychology 37 , 923-933.
Crawford, L. A. and K. B. Novak: 2007, ‘Resisting Peer Pressure: Characteristics Associated With Other-Self Discrepancies in College Students’ Levels of Alcohol Consumption’, Journal of Alcohol and Drug Education 51(1), 35–62.
Cronan, T., P., and S. Al-Rafee: 2008, ‘Factors that Influence The Intention to Pirate Software and Media’, Journal of Business Ethics 78(4), 527–545.
D’Astous, A., F. O. Colbert and D. Montpetit: 2005, ‘Music Piracy on the Web-How Effective are Anti-Piracy Arguments? Evidence from the Theory of Planned Behavior’, Journal of Consumer Policy 28, 289-310.
De George, R. T.: 1986, ‘Theological Ethics and Business Ethics’, Journal of Business Ethics 5(6), 421-432.
Deci, E.L. and R.M. Ryan: 2002, Handbook of Self-Determination Research, (University of Rochester Press, New York).
Evans, T. D., F. T. Cullen, R. G. Dunaway and V. S. Burton: 1995, ‘Religion and Crime Reexamined: The Impact of Religion, Secular Controls, and Social Ecology on Adult Criminality’, Criminology 33(2), 195-224.
Fenigstein, A.: 1979, ‘Self-Consciousness, Self-Attention, and Social Interaction’, Journal of Personality and Social Psychology 37(1), 75-86.
Fenigstein, A., M. F. Scheier and A. H. Buss: 1975, ‘Public and Private Self-Consciousness: Assessment and Theory’, Journal of Consulting and Clinical Psychology 43(4), 522-527.
Ferrell, O.C. and L.G. Gresham: 1985, ‘A Contingency Framework for Understanding Ethical Decision Making in Marketing’, Journal of Marketing 49(3), 87-96.
Fishbein, M., and I. Ajzen: 1975, Beliefs, Attitude, Intention, and Behavior: An Introduction to Theory and Research. (Addison-Wesley, MA).
Forsyth, D. R.: 1980, ‘A taxonomy of Ethical Ideologies’, Journal of Personality and Social psychology 39(1), 175-184.
Forsyth, D., R.: 1992, ‘Judging die Morality of Business Practices: The Influence of Personal Moral Philosophies’, Journal of Business Ethics 11(5-6), 461-470.
Fraedrich, J. P., and O. C. Ferrell: 1992, ‘The Impact of Perceived Risk and Moral Philosophy on Ethical Decision Making in Business Organizations’, Journal of Business Research 24 , 283-295.
Froming, W. J., and C.S. Carver: 1981, ‘Divergent Influences of Private and Public Self-Consciousness in A Compliance Paradigm’, Journal of Research in Personality 15, 159-171.
Froming, W.J., E.B. Corley, and L. Rinker: 1990, ‘The Influence of Public Self-Consciousness and Audience’s Characteristics on Withdrawal from Embarrassing Situations’, Journal of Personality 58(4), 603-622.
Funder, D.C.: 1982, ‘On Assessing Social Psychological Theories Through the Study of Individual Differences: Template Matching and Forced Compliance’, Journal of Personality and Social Psychology 43(1), 100-110.
Funder, D.C. and D.J. Ozer: 1983, ‘Behavior as a Function of the Situation’, Journal of Personality and Social Psychology 44(1), 107-112.
Gan, L. L., and H. C. Koh: 2006, ‘An Empirical Study of Software Piracy Among Tertiary Institutions in Singapore’, Information and Management 43 , 640-649.
Gibson, C., and J. Wright: 2001, ‘Low Self-Control and Coworker Delinquency: A Research Note’, Journal of Criminal Justice 29 , 483-492.
Gottfredson, M. R., and T. Hirschi: 1990, A general Theory of Crime, (Stanford University press, Stanford, CA).
Grasmick H. G., C. R. Tittle and B. J. Arneklev: 1993, ‘Testing the Core Empirical Implications of Gottfredson and Hirschi’s General Theory of Crime’, Journal of Research in Crime and Delinquency 30 , 5-29.
Hair, J., W. Black, B. Babin, R., Anderson, R. Tatham: 2006, Multivariate Data Analysis. 6th ed, (Prentice Hall, New Jersey).
Hamid, P. N., J. C. Lai and S. Cheng: 2001, ‘Response bias and public and private self-consciousness in Chinese’, Social Behavior and Personality 29(8), 733-742.
Higgins, G. E.: 2005, ‘Can Low Self-Control Help With the Understanding of The Software Piracy Problem? Deviant Behavior 26(1), 1-24.
Higgins, G. E., B. D. Fell and A. L. Wilson: 2007, ‘Low Self-Control And Social Learning in Understanding Students’ Intention to Pirate Movies in the United State’, Social Science Computer Review 25(3), 339-357.
Higgins, G. E., and D. A. Makin: 2004, ‘Self-Control, Deviant Beer, and Software Piracy’, Psychological Reports 95, 921-931.
Hunt, S. D. and S. Vitell: 1986, ‘A general Theory Of Marketing Ethics’ Journal of Macromarketing 6, 5–16.
Karnes, A., J. Stemer, R. Welker and F. Wu: 1989, ‘A Bicultural Study of Independent Auditors’ Perceptions of Unethical Business Practices’ International Journal of Accounting 24, 29-41.
Kline, R., B.: 2005, Principles and Practices Of Structural Equation Modeling 2nd ed. (The Guilford Press, New York).
Kwong, T. C. H. and M. K. O. Lee: 2002, Behavioral Intention Model for the Exchange Mode Internet Music Piracy. Proceedings of the 35th Hawaii International Conference on System Science, pp. 2481–1490.
Kwong, K.K., O. H. Yau, J. S. Lee, L. Y. Sin and A. C. Tse: 2003, ‘The Effect of Attitudinal and Demographic Factors on Intention to Buy Pirated CDs: The Case of Chinese Consumers’ Journal of Business Ethics 47(3), 223-235.
Landis, R., S., D. J. Beal, E. Paul and P. E. Tesluk: 2000, ‘A comparison of Approaches to Forming Composite Measures in Structural Equation Models’, Organizational Research Methods 3(2), 186-207.
Lee, O. and M. Shin: 2004, ‘Addictive Consumption of Avatars in Cyberspace’, CyberPsychology & Behavior 7(4), 417-420.
Leonard, L.N.K., T.P. Cronan, and J. Kreie: 2004, ‘What Influences IT Ethical Behavior Intentions – Planned Behavior, Reasoned Action, Perceived Importance or Individual Characteristics?’, Information and Management 42, 143-158.
Liang, Z. and Z. Yan: 2005, ‘Software Piracy Among College Students: A Comprehensive Review of Contributing Factors, Underlying Process, and Tackling Strategies’ Journal of Educational Computing Research 33(2), 115-140.
Limayem, M., M. Khalifa and W. Chin: 2004, ‘Factors Motivating Software Piracy: A Longitudinal Study’, IEEE Transactions on Engineering Management 51(4), 414-425.
Liska, A. E.: 1984, ‘A Critical Examination of the Casual Structure of the Fishbein/Ajzen Attitude-Behavior Model’, Social Psychology Quarterly 47(1), 61-74.
Logsdon, J.M., J.K. Thompson, and R.A. Reid: 1994, ‘Software Piracy: Is It Related To Level Of Moral Judgment?’ Journal of Business Ethics 13(11), 849-857.
Mason, R. O.: 1986, ‘Four Ethical Issues of the Information Age’, MIS Quarterly 10(1), 4-12.
McDaniel, S. W., and J. Burnett: 1990, ‘Consumer Religiosity and Retail Store Evaluative Criteria’, Journal of the Academy of Marketing Science 18(2), 101-112.
Mishra, A., I. Akman and A. Yazici: 2006, ‘Software Piracy Among IT Professionals in Organizations’, International Journal of Information Management 26, 401-413.
Mithas, S., J. Jones and W. Mitchell: 2008, ‘Buyer Intention to Use Internet-Enabled Reverse Auctions: The Role of Asset Specificity, Product Specialization, and Non-Contractibility’ MIS Quarterly 32(4), 705-724.
Moores, T. and G. Dhillon: 2000, ‘Software Piracy: A View from Honk Kong’, Communications of ACM 23(12), 88-93.
Nasser, F., and J. Wisenbaker: 2003, ‘A Monte Carlo Study Investigating the Impact of Item Parceling on Measures of Fit in Confirmatory Factor Analysis’, Educational and Psychological Measurement 63(5), 729-757.
Pargament, K. I.: 2002, ‘The Bitter and the Sweet: An Evaluation of the Costs and Benefits of Religiousness’, Psychological Inquiry 13(3), 168–181.
Peace, A. G., D. F. Galletta and J. Y. Thong: 2003, ‘Software Piracy in the Workplace: A Model and Empirical Test’, Journal of Management Information Systems 20(1), 153-177.
Podsakoff, P. M., S. B. MacKenzie and J. Y. Lee: 2003, ‘Common Method Biases in Behavioral Research: A Critical Review of The Literature and Recommended Remedies’ Journal of Applied Psychology 88(5), 879-903.
Rahim, M., A. H. Seyal and N. A. Abd Rahman: 1999, ‘Software Piracy Among Computing Students: A Bruneian Scenario’, Computers and Education 32 , 301-321.
Raykov, T. and G. A. Marcoulides: 2006, A first course in structural equation modeling, (Lawrence Erlbaum Association, New Jersey).
Scheier M. F. and C. S. Carver: 1983, ‘Directed Attention And The Comparison Of Self With Standards’, Journal of Experimental Social Psychology 19(3), 205-222.
Shugan, S.M.: 2002, ‘Marketing Science, Models, Monopoly Models, and Why We Need Them’, Marketing Science 21(3), 223-228.
Siegfried, R. M. 2004.: ‘Student Attitudes on Software Piracy and Related Issues of Computer Ethics’ Ethics and Information Technology 6(4), 215-222.
Simpson, P. M., D. Banerjee and C. L. Simpson: 1994, ‘Soflifting: A model For Motivating Factors’, Journal of Business Ethics 13(6), 431-438.
Smith, A. and E.C. Hume: 2005, ‘Linking Culture and Ethics: A Comparison of Accountants’ Ethical Belief Systems in the Individualism/Collectivism and Power Distance Contexts’, Journal of Business Ethics 62(3), 209-220.
Sue, S.: 2006, ‘Cultural Differences in Determining the Ethical Perception of Decision-Making of Future Accounting Professionals: A Comparison Between Accounting Students from Taiwan and the United States’, The Journal of American Academy of Business, 9(1), 147-159.
Tan, J. and I. Chow: 2009, ‘Isolating Cultural and National Influence on Value and Ethics: A Test of Competing Hypotheses’, Journal of Business Ethics 88, 197-210.
Teoh, H.Y.D., P. Serang, and C.C. Lim: 1999, ‘Individualism-Collectivism Cultural Differences Affecting Perceptions of Unethical Practices: Some Evidence from Australian and Indonesian Accounting Students’, Teaching Business Ethics 3, 137-153.
Trevino, L.K.: 1986, ‘Ethical Decision Making in Organizations: A Person-Situation Interactionist Model’ Academy of Management Review 11, 601-617.
Triandis H. C., (1997), ‘A Cross-cultural Perspective on Social psychology’, in C. McGarty and S. A. Haslam (eds), The Message of Social Psychology, Cambridge, (MA: Blackwell, MA), pp. 342-354.
Vitell, S. J., J. G. Paolillo and J. J. Singh: 2006, ‘The Role of Money and Religiosity in Determining Consumers’ Ethical Beliefs’, Journal of Business Ethics 64 (2), pp. 117-124.
Wagner, S. C. and G. L. Sanders: 2001, ‘Consideration in Ethical Decision-Making and Software Piracy’, Journal of Business Ethics 29(1-2), 161-167.
Woolley, D J., and M. Eining: 2006, ‘Software Piracy Among Accounting Students: A Longitudinal Comparison of Changes and Sensitivity’, Journal of Information Systems 20(1), 49-63.
Yang, D., and M. Sonmez: 2007, ‘Economic and Cultural Impact on Intellectual Property Violation: A Study of Software Piracy’, Journal of World Trade 41(4), 731-750.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Aleassa, H., Pearson, J.M. & McClurg, S. Investigating Software Piracy in Jordan: An Extension of the Theory of Reasoned Action. J Bus Ethics 98, 663–676 (2011). https://doi.org/10.1007/s10551-010-0645-4
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10551-010-0645-4