Skip to main content

Advertisement

Log in

Investigating Software Piracy in Jordan: An Extension of the Theory of Reasoned Action

  • Published:
Journal of Business Ethics Aims and scope Submit manuscript

Abstract

Software piracy, the illegal and unauthorized duplication, sale, or distribution of software, is a widespread and costly phenomenon. According to Business Software Alliance (2008), over 41% of the PC software packages installed worldwide were unauthorized copies. Software piracy behavior has been investigated for more than 30 years. However, after a review of the relevant literature, there appears to be two voids in this literature: a lack of studies in non-Western countries and a scarcity of process studies. This study contributes to literature by developing a software piracy model to better understand the decision-making process that underlies this unethical behavior. The model was tested using data collected from a sample of 323 undergraduate business students. Consistent with the Theory of Reasoned Action (TRA), attitudes toward software piracy and subjective norms were significant predictors of intention to pirate software. Also, the results suggested that ethical ideology, public self-consciousness, and low self-control moderated the effect of these variables on intention to pirate software. The results have important practical implications for the software industry and governments hoping to curtail software piracy. Limitations of the study and recommendations for future studies are discussed as well.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  • Ajzen, I.: 1988, Attitudes, Personality, and Behavior,(Milton Keynes, England: Open University Press).

    Google Scholar 

  • Ajzen, I.: 1991, ‘The Theory of Planned Behavior’, Organizational Behavior and Human Decision Processes 51(2), 179-211.

    Article  Google Scholar 

  • Al-Jabri, I., and A. Abdul-Gader: 1997, ‘Software Copyright Infringements: An Exploratory Study of the Effects of Individual and Peer Beliefs’, Omega 25(3), 335-344.

    Article  Google Scholar 

  • Al-Rafee, S., and T. P. Cronan: 2006, ‘Digital piracy: Factors that Influence Attitude Toward Behavior’, Journal of Business Ethics 63 , 237-259.

    Article  Google Scholar 

  • Anderson, J. C., and D. W. Gerbing: 1988, ‘Structural Equation Modeling in Practice: A Review and Recommended Two-Step Approach’, Psychological Bulletin 103(3), 411-423.

    Article  Google Scholar 

  • Ang, S. H., P. S. Cheng, E. A. C. Lim and K. Tambyah: 2001, ‘Spot the Differences: Consumer Responses Toward Counterfeit’, Journal of Consumer Marketing 18(3), 219-235.

    Article  Google Scholar 

  • Anonymous: 2007, ‘Business Software Sales Soar to $ 500m’, MEED: Middle East Economic Digest 51(40), 33.

  • Banduri, A.: 1991, ‘Social Cognitive Theory of Self-Regulation’, Organizational Behavior, and Human Decision Processes 50, 248-287.

    Article  Google Scholar 

  • Barnett, T., K. Bass and G. Brown: 1994, ‘Ethical Ideology and Ethical Judgment Regarding Ethical Issues in Business’, Journal of Business Ethics 13(6), 469-480.

    Article  Google Scholar 

  • Baron, R. M., and D. A. Kenny: 1986, ‘The Moderator-Mediator Variable Distinction in Social Psychological Research: Conceptual, Strategic, and Statistical Considerations’, Journal of Personality and Social Psychology 51, 1173–1182.

    Article  Google Scholar 

  • Beekun, R., I., Y. Stedham and J. H. Yamamura: 2003, ‘Business Ethics In Brazil And The U.S.: A Comparative Investigation’, Journal of Business Ethics 42(3), 267-279.

    Article  Google Scholar 

  • Bentler, P., M.: 1990, ‘Comparative Fit Indexes in Structural Models’, Psychological Bulletin 107, 238-246.

    Article  Google Scholar 

  • Bentler, P., M. and D. G. Bonett: 1980, ‘Significance Tests And Goodness of Fit in the Analysis of Covariance Structures’, Psychological Bulletin 88, 588-606.

    Article  Google Scholar 

  • Breckler, S. J.: 1990, ‘Applications of Covariance Structure Modeling in Psychology: Cause for Concern?’ Psychology Bulletin 107(2), 260-273.

    Article  Google Scholar 

  • Burkett, S. R.: 1993, ‘Perceived parents’ Religiosity, Friends’ Drinking, and Hellfire: A Panel Study of Adolescent Drinking’, Review of Religious Research 35(2), 134-154.

    Article  Google Scholar 

  • Business Software Alliance: 2008, Sixth Annual BSA-IDC Global Software Piracy Study. Retrieved April 15, 2008, from http://global.bsa.org/globalpiracy2008/studies/globalpiracy2008.pdf.

  • Byrne, B.M.: 2006, Structural Equation Modeling with EQS: Basic Concepts, Applications and Programming, 2nd ed, (Lawrence Erlbaum Associates, Mahwah, NJ).

    Google Scholar 

  • Carlin, W., B., and K. C. Strong: 1995, ‘A Critique of Western Philosophical Ethics: Multidisciplinary Alternatives for Framing Ethical Dilemmas’, Journal of Business Ethics 14 (5), 387-396.

    Article  Google Scholar 

  • Carver, C. S., and M. F. Scheier: 1981, Attention and Self-Regulation: A Control-Theory Approach to Human Behavior, (Springer-Verlag, New York).

    Google Scholar 

  • Chang, M. K.: 1998, ‘Predicting Unethical Behavior: A Comparison of The Theory of Reasoned Action and the Theory of Planned Behavior’, Journal of Business Ethics 17(16), 1825-1834.

    Article  Google Scholar 

  • Chang, L., and K. T. Hau: 2001, ‘The Effect Of Self-Consciousness on The Expression of Gender Views’, Journal of Applied Social Psychology 31(2), 340-351.

    Article  Google Scholar 

  • Chiou, j., C. Huang and H. Lee: 2005, ‘Antecedents of Music Piracy Attitudes and Intentions’, Journal of Business Ethics 57(2), 161-174.

    Article  Google Scholar 

  • Christensen, A. L., and M. Eining: 1991, ‘Factors Influencing Software Piracy: Implication for Accountants’, Journal of Information Systems 5(1), 67-80.

    Google Scholar 

  • Cochran, J. K., P. B. Wood, C. S. Sellers,W. Wilkerson and M. B. Chamlin: 1998, ‘Academic Dishonesty and Low Self-Control: An Empirical Test of A General Theory of Crime’ Deviant Behavior: An Interdisciplinary Journal 19, 227-255.

    Google Scholar 

  • Costarelli, S. and A. P. Colloca: 2007, ‘The Moderation of Ambivalence on Attitude–Intention Relations as Mediated by Attitude Importance’, European Journal of Social Psychology 37 , 923-933.

    Article  Google Scholar 

  • Crawford, L. A. and K. B. Novak: 2007, ‘Resisting Peer Pressure: Characteristics Associated With Other-Self Discrepancies in College Students’ Levels of Alcohol Consumption’, Journal of Alcohol and Drug Education 51(1), 35–62.

    Google Scholar 

  • Cronan, T., P., and S. Al-Rafee: 2008, ‘Factors that Influence The Intention to Pirate Software and Media’, Journal of Business Ethics 78(4), 527–545.

    Article  Google Scholar 

  • D’Astous, A., F. O. Colbert and D. Montpetit: 2005, ‘Music Piracy on the Web-How Effective are Anti-Piracy Arguments? Evidence from the Theory of Planned Behavior’, Journal of Consumer Policy 28, 289-310.

    Article  Google Scholar 

  • De George, R. T.: 1986, ‘Theological Ethics and Business Ethics’, Journal of Business Ethics 5(6), 421-432.

    Article  Google Scholar 

  • Deci, E.L. and R.M. Ryan: 2002, Handbook of Self-Determination Research, (University of Rochester Press, New York).

    Google Scholar 

  • Evans, T. D., F. T. Cullen, R. G. Dunaway and V. S. Burton: 1995, ‘Religion and Crime Reexamined: The Impact of Religion, Secular Controls, and Social Ecology on Adult Criminality’, Criminology 33(2), 195-224.

    Article  Google Scholar 

  • Fenigstein, A.: 1979, ‘Self-Consciousness, Self-Attention, and Social Interaction’, Journal of Personality and Social Psychology 37(1), 75-86.

    Article  Google Scholar 

  • Fenigstein, A., M. F. Scheier and A. H. Buss: 1975, ‘Public and Private Self-Consciousness: Assessment and Theory’, Journal of Consulting and Clinical Psychology 43(4), 522-527.

    Article  Google Scholar 

  • Ferrell, O.C. and L.G. Gresham: 1985, ‘A Contingency Framework for Understanding Ethical Decision Making in Marketing’, Journal of Marketing 49(3), 87-96.

    Article  Google Scholar 

  • Fishbein, M., and I. Ajzen: 1975, Beliefs, Attitude, Intention, and Behavior: An Introduction to Theory and Research. (Addison-Wesley, MA).

    Google Scholar 

  • Forsyth, D. R.: 1980, ‘A taxonomy of Ethical Ideologies’, Journal of Personality and Social psychology 39(1), 175-184.

    Article  Google Scholar 

  • Forsyth, D., R.: 1992, ‘Judging die Morality of Business Practices: The Influence of Personal Moral Philosophies’, Journal of Business Ethics 11(5-6), 461-470.

    Article  Google Scholar 

  • Fraedrich, J. P., and O. C. Ferrell: 1992, ‘The Impact of Perceived Risk and Moral Philosophy on Ethical Decision Making in Business Organizations’, Journal of Business Research 24 , 283-295.

    Article  Google Scholar 

  • Froming, W. J., and C.S. Carver: 1981, ‘Divergent Influences of Private and Public Self-Consciousness in A Compliance Paradigm’, Journal of Research in Personality 15, 159-171.

    Article  Google Scholar 

  • Froming, W.J., E.B. Corley, and L. Rinker: 1990, ‘The Influence of Public Self-Consciousness and Audience’s Characteristics on Withdrawal from Embarrassing Situations’, Journal of Personality 58(4), 603-622.

    Article  Google Scholar 

  • Funder, D.C.: 1982, ‘On Assessing Social Psychological Theories Through the Study of Individual Differences: Template Matching and Forced Compliance’, Journal of Personality and Social Psychology 43(1), 100-110.

    Article  Google Scholar 

  • Funder, D.C. and D.J. Ozer: 1983, ‘Behavior as a Function of the Situation’, Journal of Personality and Social Psychology 44(1), 107-112.

    Article  Google Scholar 

  • Gan, L. L., and H. C. Koh: 2006, ‘An Empirical Study of Software Piracy Among Tertiary Institutions in Singapore’, Information and Management 43 , 640-649.

    Article  Google Scholar 

  • Gibson, C., and J. Wright: 2001, ‘Low Self-Control and Coworker Delinquency: A Research Note’, Journal of Criminal Justice 29 , 483-492.

    Article  Google Scholar 

  • Gottfredson, M. R., and T. Hirschi: 1990, A general Theory of Crime, (Stanford University press, Stanford, CA).

    Google Scholar 

  • Grasmick H. G., C. R. Tittle and B. J. Arneklev: 1993, ‘Testing the Core Empirical Implications of Gottfredson and Hirschi’s General Theory of Crime’, Journal of Research in Crime and Delinquency 30 , 5-29.

    Article  Google Scholar 

  • Hair, J., W. Black, B. Babin, R., Anderson, R. Tatham: 2006, Multivariate Data Analysis. 6th ed, (Prentice Hall, New Jersey).

    Google Scholar 

  • Hamid, P. N., J. C. Lai and S. Cheng: 2001, ‘Response bias and public and private self-consciousness in Chinese’, Social Behavior and Personality 29(8), 733-742.

    Article  Google Scholar 

  • Higgins, G. E.: 2005, ‘Can Low Self-Control Help With the Understanding of The Software Piracy Problem? Deviant Behavior 26(1), 1-24.

    Article  Google Scholar 

  • Higgins, G. E., B. D. Fell and A. L. Wilson: 2007, ‘Low Self-Control And Social Learning in Understanding Students’ Intention to Pirate Movies in the United State’, Social Science Computer Review 25(3), 339-357.

    Article  Google Scholar 

  • Higgins, G. E., and D. A. Makin: 2004, ‘Self-Control, Deviant Beer, and Software Piracy’, Psychological Reports 95, 921-931.

    Google Scholar 

  • Hunt, S. D. and S. Vitell: 1986, ‘A general Theory Of Marketing Ethics’ Journal of Macromarketing 6, 5–16.

    Article  Google Scholar 

  • Karnes, A., J. Stemer, R. Welker and F. Wu: 1989, ‘A Bicultural Study of Independent Auditors’ Perceptions of Unethical Business Practices’ International Journal of Accounting 24, 29-41.

    Google Scholar 

  • Kline, R., B.: 2005, Principles and Practices Of Structural Equation Modeling 2nd ed. (The Guilford Press, New York).

    Google Scholar 

  • Kwong, T. C. H. and M. K. O. Lee: 2002, Behavioral Intention Model for the Exchange Mode Internet Music Piracy. Proceedings of the 35th Hawaii International Conference on System Science, pp. 2481–1490.

  • Kwong, K.K., O. H. Yau, J. S. Lee, L. Y. Sin and A. C. Tse: 2003, ‘The Effect of Attitudinal and Demographic Factors on Intention to Buy Pirated CDs: The Case of Chinese Consumers’ Journal of Business Ethics 47(3), 223-235.

    Article  Google Scholar 

  • Landis, R., S., D. J. Beal, E. Paul and P. E. Tesluk: 2000, ‘A comparison of Approaches to Forming Composite Measures in Structural Equation Models’, Organizational Research Methods 3(2), 186-207.

    Article  Google Scholar 

  • Lee, O. and M. Shin: 2004, ‘Addictive Consumption of Avatars in Cyberspace’, CyberPsychology & Behavior 7(4), 417-420.

    Article  Google Scholar 

  • Leonard, L.N.K., T.P. Cronan, and J. Kreie: 2004, ‘What Influences IT Ethical Behavior Intentions – Planned Behavior, Reasoned Action, Perceived Importance or Individual Characteristics?’, Information and Management 42, 143-158.

    Google Scholar 

  • Liang, Z. and Z. Yan: 2005, ‘Software Piracy Among College Students: A Comprehensive Review of Contributing Factors, Underlying Process, and Tackling Strategies’ Journal of Educational Computing Research 33(2), 115-140.

    Article  Google Scholar 

  • Limayem, M., M. Khalifa and W. Chin: 2004, ‘Factors Motivating Software Piracy: A Longitudinal Study’, IEEE Transactions on Engineering Management 51(4), 414-425.

    Article  Google Scholar 

  • Liska, A. E.: 1984, ‘A Critical Examination of the Casual Structure of the Fishbein/Ajzen Attitude-Behavior Model’, Social Psychology Quarterly 47(1), 61-74.

    Article  Google Scholar 

  • Logsdon, J.M., J.K. Thompson, and R.A. Reid: 1994, ‘Software Piracy: Is It Related To Level Of Moral Judgment?’ Journal of Business Ethics 13(11), 849-857.

    Article  Google Scholar 

  • Mason, R. O.: 1986, ‘Four Ethical Issues of the Information Age’, MIS Quarterly 10(1), 4-12.

    Article  Google Scholar 

  • McDaniel, S. W., and J. Burnett: 1990, ‘Consumer Religiosity and Retail Store Evaluative Criteria’, Journal of the Academy of Marketing Science 18(2), 101-112.

    Article  Google Scholar 

  • Mishra, A., I. Akman and A. Yazici: 2006, ‘Software Piracy Among IT Professionals in Organizations’, International Journal of Information Management 26, 401-413.

    Article  Google Scholar 

  • Mithas, S., J. Jones and W. Mitchell: 2008, ‘Buyer Intention to Use Internet-Enabled Reverse Auctions: The Role of Asset Specificity, Product Specialization, and Non-Contractibility’ MIS Quarterly 32(4), 705-724.

    Google Scholar 

  • Moores, T. and G. Dhillon: 2000, ‘Software Piracy: A View from Honk Kong’, Communications of ACM 23(12), 88-93.

    Article  Google Scholar 

  • Nasser, F., and J. Wisenbaker: 2003, ‘A Monte Carlo Study Investigating the Impact of Item Parceling on Measures of Fit in Confirmatory Factor Analysis’, Educational and Psychological Measurement 63(5), 729-757.

    Article  Google Scholar 

  • Pargament, K. I.: 2002, ‘The Bitter and the Sweet: An Evaluation of the Costs and Benefits of Religiousness’, Psychological Inquiry 13(3), 168–181.

    Article  Google Scholar 

  • Peace, A. G., D. F. Galletta and J. Y. Thong: 2003, ‘Software Piracy in the Workplace: A Model and Empirical Test’, Journal of Management Information Systems 20(1), 153-177.

    Google Scholar 

  • Podsakoff, P. M., S. B. MacKenzie and J. Y. Lee: 2003, ‘Common Method Biases in Behavioral Research: A Critical Review of The Literature and Recommended Remedies’ Journal of Applied Psychology 88(5), 879-903.

    Article  Google Scholar 

  • Rahim, M., A. H. Seyal and N. A. Abd Rahman: 1999, ‘Software Piracy Among Computing Students: A Bruneian Scenario’, Computers and Education 32 , 301-321.

    Article  Google Scholar 

  • Raykov, T. and G. A. Marcoulides: 2006, A first course in structural equation modeling, (Lawrence Erlbaum Association, New Jersey).

    Google Scholar 

  • Scheier M. F. and C. S. Carver: 1983, ‘Directed Attention And The Comparison Of Self With Standards’, Journal of Experimental Social Psychology 19(3), 205-222.

    Article  Google Scholar 

  • Shugan, S.M.: 2002, ‘Marketing Science, Models, Monopoly Models, and Why We Need Them’, Marketing Science 21(3), 223-228.

    Article  Google Scholar 

  • Siegfried, R. M. 2004.: ‘Student Attitudes on Software Piracy and Related Issues of Computer Ethics’ Ethics and Information Technology 6(4), 215-222.

    Article  Google Scholar 

  • Simpson, P. M., D. Banerjee and C. L. Simpson: 1994, ‘Soflifting: A model For Motivating Factors’, Journal of Business Ethics 13(6), 431-438.

    Article  Google Scholar 

  • Smith, A. and E.C. Hume: 2005, ‘Linking Culture and Ethics: A Comparison of Accountants’ Ethical Belief Systems in the Individualism/Collectivism and Power Distance Contexts’, Journal of Business Ethics 62(3), 209-220.

    Article  Google Scholar 

  • Sue, S.: 2006, ‘Cultural Differences in Determining the Ethical Perception of Decision-Making of Future Accounting Professionals: A Comparison Between Accounting Students from Taiwan and the United States’, The Journal of American Academy of Business, 9(1), 147-159.

    Google Scholar 

  • Tan, J. and I. Chow: 2009, ‘Isolating Cultural and National Influence on Value and Ethics: A Test of Competing Hypotheses’, Journal of Business Ethics 88, 197-210.

    Article  Google Scholar 

  • Teoh, H.Y.D., P. Serang, and C.C. Lim: 1999, ‘Individualism-Collectivism Cultural Differences Affecting Perceptions of Unethical Practices: Some Evidence from Australian and Indonesian Accounting Students’, Teaching Business Ethics 3, 137-153.

    Article  Google Scholar 

  • Trevino, L.K.: 1986, ‘Ethical Decision Making in Organizations: A Person-Situation Interactionist Model’ Academy of Management Review 11, 601-617.

    Article  Google Scholar 

  • Triandis H. C., (1997), ‘A Cross-cultural Perspective on Social psychology’, in C. McGarty and S. A. Haslam (eds), The Message of Social Psychology, Cambridge, (MA: Blackwell, MA), pp. 342-354.

    Google Scholar 

  • Vitell, S. J., J. G. Paolillo and J. J. Singh: 2006, ‘The Role of Money and Religiosity in Determining Consumers’ Ethical Beliefs’, Journal of Business Ethics 64 (2), pp. 117-124.

    Article  Google Scholar 

  • Wagner, S. C. and G. L. Sanders: 2001, ‘Consideration in Ethical Decision-Making and Software Piracy’, Journal of Business Ethics 29(1-2), 161-167.

    Article  Google Scholar 

  • Woolley, D J., and M. Eining: 2006, ‘Software Piracy Among Accounting Students: A Longitudinal Comparison of Changes and Sensitivity’, Journal of Information Systems 20(1), 49-63.

    Article  Google Scholar 

  • Yang, D., and M. Sonmez: 2007, ‘Economic and Cultural Impact on Intellectual Property Violation: A Study of Software Piracy’, Journal of World Trade 41(4), 731-750.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to John Michael Pearson.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Aleassa, H., Pearson, J.M. & McClurg, S. Investigating Software Piracy in Jordan: An Extension of the Theory of Reasoned Action. J Bus Ethics 98, 663–676 (2011). https://doi.org/10.1007/s10551-010-0645-4

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10551-010-0645-4

Keywords

Navigation