Use, perceived deterrence and the role of software piracy in video game console adoption

This paper is an exploratory study into the role of software piracy in the decision to adopt a video game console. The paper takes a rational choice perspective, where actors evaluate the deterrent cost of moral transgression before acting, to explore how users with different levels of video game usage intensity approach the adoption decision, on the grounds that more experienced users can better assess the costs and benefits of moral transgression. The study used focus groups and a literature review to develop a set of factors based on the Theory of Planned Behavior. The resulting factors were operationalized in an online survey of 285 subjects of a variety of ages and incomes. The ability to pirate console software was significant for adopters but not non-adopters. Perceived deterrence was associated with greater system use, as measured by hours of console use per week.

[1]  Andrew Huang,et al.  Keeping Secrets in Hardware: The Microsoft Xbox™ Case Study , 2002, CHES.

[2]  Terry L. Childers,et al.  The Influence of Familial and Peer-Based Reference Groups on Consumer Decisions , 1992 .

[3]  Shu-Hsun Ho,et al.  Exploring success factors of video game communities in hierarchical linear modeling: The perspectives of members and leaders , 2009, Comput. Hum. Behav..

[4]  Michael J. Leiber,et al.  Reassessing the family-delinquency association: Do family type, family processes, and economic factors make a difference? , 2007 .

[5]  David Matza,et al.  Delinquency and Drift , 1966 .

[6]  John D. Claxton,et al.  The Nominal Group Technique: Its Potential for Consumer Research , 1980 .

[7]  Aron M. Levin,et al.  Money for Nothing and Hits for Free: The Ethics of Downloading Music from Peer-to-Peer Web Sites , 2004 .

[8]  Kar Yan Tam,et al.  Understanding the behavior of mobile data services consumers , 2008, Inf. Syst. Frontiers.

[9]  Stephen Darwall A Defense of the Kantian Interpretation , 1976, Ethics.

[10]  Sudip Bhattacharjee,et al.  Digital music and online sharing: software piracy 2.0? , 2003, CACM.

[11]  Brian K. Payne,et al.  Ancillary consequences of employee theft , 2004 .

[12]  Hans-Peter Blossfeld,et al.  Macro-sociology, rational choice theory, and time : A theoretical perspective on the empirical analysis of social processes , 1996 .

[13]  Melissa A. Schilling Technological Leapfrogging: Lessons from the U.S. Video Game Console Industry , 2003 .

[14]  Feng-Yang Kuo,et al.  The Effect of Organization-Based Self-Esteem and Deindividuation in Protecting Personal Information Privacy , 2003 .

[15]  G. Soutar,et al.  Consumer perceived value: The development of a multiple item scale , 2001 .

[16]  Alexander Serenko,et al.  User acceptance of hedonic digital artifacts: A theory of consumption values perspective , 2010, Inf. Manag..

[17]  Rolph E. Anderson,et al.  Nederlandse samenvatting en bewerking van 'Multivariate data analysis, 4th Edition, 1995' , 1998 .

[18]  P. Kenhove,et al.  ‘An Empirical Investigation of the Relationships among a Consumer’s Personal Values, Ethical Ideology and Ethical Beliefs’ , 2006 .

[19]  Clyde W. Holsapple,et al.  Building effective online game websites with knowledge-based trust , 2008, Inf. Syst. Frontiers.

[20]  M. Gallagher,et al.  The nominal group technique: a research tool for general practice? , 1993, Family practice.

[21]  Mark D. Griffiths,et al.  Online Data Collection from Video Game Players: Methodological Issues , 2004, Cyberpsychology Behav. Soc. Netw..

[22]  David Trafimow,et al.  Predicting behaviour from perceived behavioural control: tests of the accuracy assumption of the theory of planned behaviour. , 2003, The British journal of social psychology.

[23]  Peter A. Todd,et al.  Understanding Information Technology Usage: A Test of Competing Models , 1995, Inf. Syst. Res..

[24]  Viswanath Venkatesh,et al.  A Longitudinal Investigation of Personal Computers in Homes: Adoption Determinants and Emerging Challenges , 2001, MIS Q..

[25]  Alessandro Narduzzo,et al.  Playstation and the Power of Unexpected Consequences , 2003 .

[26]  Patrick Waelbroeck,et al.  Piracy of Digital Products: A Critical Review of the Theoretical Literature , 2006, Inf. Econ. Policy.

[27]  Matthew K. O. Lee,et al.  Behavioral intention model for the exchange mode Internet music piracy , 2002, Proceedings of the 35th Annual Hawaii International Conference on System Sciences.

[28]  M. Silberman Toward a theory of criminal deterrence. , 1976 .

[29]  D GopalRam,et al.  Global software piracy , 2000 .

[30]  Ginger Myles,et al.  Content protection for games , 2006, IBM Syst. J..

[31]  Dennis F. Galletta,et al.  Software Piracy in the Workplace: A Model and Empirical Test , 2003, J. Manag. Inf. Syst..

[32]  Scott Gallagher,et al.  Innovation and competition in standard-based industries: a historical analysis of the US home video game market , 2002, IEEE Trans. Engineering Management.

[33]  C. Moore Group Techniques for Idea Building , 1987 .

[34]  M. Conner,et al.  Extending the Theory of Planned Behavior: A Review and Avenues for Further Research , 1998 .

[35]  Ethan Mollick,et al.  Changing the Game: How Video Games Are Transforming the Future of Business , 2008 .

[36]  Izak Benbasat,et al.  Development of an Instrument to Measure the Perceptions of Adopting an Information Technology Innovation , 1991, Inf. Syst. Res..

[37]  Thompson S. H. Teo,et al.  Adoption of WAP-enabled mobile phones among Internet users , 2003 .

[38]  David Matza Delinquency and Drift , 1966 .

[39]  Mara Lederman,et al.  Software Exclusivity and the Scope of Indirect Network Effects in the U.S. Home Video Game Market , 2007 .

[40]  Richard Swedberg,et al.  Rational Choice, Empirical Research, and the Sociological Tradition , 1996 .

[41]  I. Ajzen,et al.  Understanding Attitudes and Predicting Social Behavior , 1980 .

[42]  I. Ajzen,et al.  Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research , 1977 .

[43]  D. Lehmann,et al.  Purchase Intentions and the Dimensions of Innovation: An Exploratory Model , 1990 .

[44]  Kallol Kumar Bagchi,et al.  Global software piracy , 2006, Commun. ACM.

[45]  Stuart J. Barnes,et al.  Why people buy virtual items in virtual worlds with real money , 2007, DATB.

[46]  Terence A. Shimp,et al.  The Theory of Reasoned Action Applied to Coupon Usage , 1984 .

[47]  R. Bagozzi Attitudes, intentions, and behavior: A test of some key hypotheses. , 1981 .

[48]  J. Chiou,et al.  The Antecedents of Music Piracy Attitudes and Intentions , 2005 .

[49]  Stefan Wagner,et al.  Outlaw Community Innovations ∗ , 2008 .

[50]  Linda L. Price,et al.  An Investigation into the Social Context of Early Adoption Behavior , 1992 .

[51]  Lawrence E. Cohen,et al.  Social Change and Crime Rate Trends: A Routine Activity Approach , 1979 .

[52]  E. Rogers Diffusion of Innovations , 1962 .

[53]  A. d’Astous,et al.  Music Piracy on the Web – How Effective are Anti-Piracy Arguments? Evidence from the Theory of Planned Behaviour , 2005 .

[54]  Gordon B. Davis,et al.  User Acceptance of Information Technology: Toward a Unified View , 2003, MIS Q..

[55]  David Sheff Game over : how Nintendo conquered the world , 1994 .

[56]  R. Iman,et al.  Modern business statistics , 1983 .

[57]  J. Hair Multivariate data analysis , 1972 .

[58]  David H. Gustafson,et al.  Group Techniques for Program Planning: A Guide to Nominal Group and Delphi Processes , 1976 .

[59]  Venkatesh Shankar,et al.  Network Effects and Competition: An Empirical Analysis of the Home Video Game Industry , 2002 .

[60]  A. Blumstein,et al.  Deterrence and incapacitation : estimating the effects of criminal sanctions on crime rates , 1980 .

[61]  Timothy Paul Cronan,et al.  Equity perceptions as a deterrent to software piracy behavior , 2007, Inf. Manag..

[62]  Michael Mandler,et al.  Incomplete preferences and rational intransitivity of choice , 2005, Games Econ. Behav..

[63]  J. Huber,et al.  Rational choice models in sociology , 1997 .

[64]  L. G. Tornatzky,et al.  Innovation characteristics and innovation adoption-implementation: A meta-analysis of findings , 1982, IEEE Transactions on Engineering Management.

[65]  Jon A. Krosnick,et al.  An introduction to survey research and data analysis, 2nd ed. , 1977 .

[66]  Xiaojun Zhang,et al.  Household technology adoption in a global marketplace: Incorporating the role of espoused cultural values , 2008, Inf. Syst. Frontiers.

[67]  Kieran Mathieson,et al.  Predicting User Intentions: Comparing the Technology Acceptance Model with the Theory of Planned Behavior , 1991, Inf. Syst. Res..

[68]  Alex R. Piquero,et al.  Differential Deterrence , 2012 .

[69]  Clyde W. Holsapple,et al.  Parameters for Software Piracy Research , 2008, Inf. Soc..

[70]  Shirley Taylor,et al.  Decomposition and crossover effects in the theory of planned behavior: A study of consumer adoption intentions , 1995 .

[71]  Tung-Ching Lin,et al.  An intention model-based study of software piracy , 1999, Proceedings of the 32nd Annual Hawaii International Conference on Systems Sciences. 1999. HICSS-32. Abstracts and CD-ROM of Full Papers.

[72]  Icek Ajzen,et al.  From Intentions to Actions: A Theory of Planned Behavior , 1985 .

[73]  Sacha Plowman,et al.  Factors Affecting the Intention to Download Music: Quality Perceptions and Downloading Intensity , 2009, J. Comput. Inf. Syst..

[74]  J Kluger The diabetes explosion. , 2000, Time.

[75]  Viswanath Venkatesh,et al.  Determinants of Perceived Ease of Use: Integrating Control, Intrinsic Motivation, and Emotion into the Technology Acceptance Model , 2000, Inf. Syst. Res..

[76]  Donald R. Cooper,et al.  Business Research Methods , 1980 .

[77]  G. Powell-Cope,et al.  Operationalizing the theory of planned behavior. , 1991, Research in nursing & health.

[78]  Hun Choi,et al.  An empirical study on the adoption of information appliances with a focus on interactive TV , 2003, Telematics Informatics.

[79]  I. Ajzen The theory of planned behavior , 1991 .