Predicting consumer digital piracy behavior

Purpose – The purpose of this paper is to investigate consumer perceptions of personal risk and benefits of digital piracy behavior as determinants of one's justification for such behavior and the consequent future piracy intention. Temporal effects of rationalization in shaping future piracy intent are also addressed.Design/methodology/approach – A conceptual model was developed using counterfeiting and piracy literature. Data were gathered via mail and online survey of adults in five European Union countries. The model was tested on pooled sample using confirmatory factor analysis and structural equation modeling.Findings – Rationalization mediates the relationship between perceived benefits and piracy intention, but not between perceived risk and intention. Both perceived risk and benefits affect piracy intent, with risk reducing it and benefits increasing it. Rationalization of past behavior increases future digital piracy intent.Research limitations/implications – Risk measure was limited to technica...

[1]  Hassan Aleassa,et al.  Investigating Software Piracy in Jordan: An Extension of the Theory of Reasoned Action , 2011 .

[2]  Wallace A. Wood,et al.  Situational determinants of software piracy: An equity theory perspective , 1996 .

[3]  A. d’Astous,et al.  Music Piracy on the Web – How Effective are Anti-Piracy Arguments? Evidence from the Theory of Planned Behaviour , 2005 .

[4]  Robert Moore,et al.  Neutralizations and Rationalizations of Digital Piracy: A Qualitative Analysis of University Students , 2009 .

[5]  W. W. Minor,et al.  Techniques of Neutralization: a Reconceptualization and Empirical Examination , 1981 .

[6]  Bernard P. Veldkamp,et al.  A Model for the Construction of Country-Specific Yet Internationally Comparable Short-Form Marketing Scales , 2009, Mark. Sci..

[7]  James C. Anderson,et al.  STRUCTURAL EQUATION MODELING IN PRACTICE: A REVIEW AND RECOMMENDED TWO-STEP APPROACH , 1988 .

[8]  T. Staake,et al.  The emergence of counterfeit trade: a literature review , 2009 .

[9]  P. Simpson,et al.  Softlifting: A model of motivating factors , 1994 .

[10]  R. Bagozzi,et al.  On the evaluation of structural equation models , 1988 .

[11]  Sue L.T. McGregor,et al.  Conceptualizing Immoral and Unethical Consumption Using Neutralization Theory , 2008 .

[12]  I. Phau,et al.  Consumers' willingness to knowingly purchase counterfeit products , 2009 .

[13]  Lauren G. Block,et al.  When to Accentuate the Negative: The Effects of Perceived Efficacy and Message Framing on Intentions to Perform a Health-Related Behavior , 1995 .

[14]  S. Hunt,et al.  A General Theory of Marketing Ethics , 1986 .

[15]  Cheolho Yoon Theory of Planned Behavior and Ethics Theory in Digital Piracy: An Integrated Model , 2011 .

[16]  Gresham M. Sykes,et al.  Techniques of neutralization: A theory of delinquency. , 1957 .

[17]  Rajiv K. Sinha,et al.  Don't Think Twice, It's All Right: Music Piracy and Pricing in a DRM-Free Environment , 2010 .

[18]  Ian W. Shields,et al.  Neutralization and Delinquency among Teenagers , 1994 .

[19]  Pola B. Gupta,et al.  “To buy or to pirate”: The matrix of music consumers' acquisition-mode decision-making , 2009 .

[20]  Elison Ai Ching Lim,et al.  Spot the difference: consumer responses towards counterfeits , 2001 .

[21]  Sameer Hinduja,et al.  Neutralization theory and online software piracy: An empirical analysis , 2007, Ethics and Information Technology.

[22]  A. d’Astous,et al.  Understanding Consumers’ Ethical Justifications: A Scale for Appraising Consumers’ Reasons for Not Behaving Ethically , 2009 .

[23]  L. Harris,et al.  Online consumer misbehaviour: an application of neutralization theory , 2009 .

[24]  S. Curley,et al.  Ripped from the Headlines: What can the Popular Press Teach us about Software Piracy? , 2008 .

[25]  Rajiv K. Sinha,et al.  Preventing Digital Music Piracy: The Carrot or the Stick? , 2008 .

[26]  Martijn G. de Jong,et al.  Socially Desirable Response Tendencies in Survey Research , 2010 .

[27]  George E. Higgins,et al.  Neutralizing Potential and Self-Reported Digital Piracy , 2009 .

[28]  Peter A. Todd,et al.  Assessing IT usage: the role of prior experience , 1995 .

[29]  Chingching Chang Ad framing effects for consumption products: An affect priming process , 2008 .

[30]  I. Phau,et al.  Predictors of Usage Intentions of Pirated Software , 2010 .

[31]  C. Craig,et al.  International Marketing Research , 1983 .

[32]  S. Durvasula,et al.  Digital piracy of MP3s: consumer and ethical predispositions , 2008 .

[33]  Ranjan B. Kini,et al.  Shaping of Moral Intensity Regarding Software Piracy: A Comparison Between Thailand and U.S. Students , 2004 .

[34]  Yu-Ping Liu,et al.  Predicting the Use of Pirated Software: A Contingency Model Integrating Perceived Risk with the Theory of Planned Behavior , 2010 .

[35]  Tristan Mattelart Audio-visual piracy: towards a study of the underground networks of cultural globalization , 2009 .

[36]  Bandula Jayatilaka,et al.  Softlifting: Exploring Determinants of Attitude , 2008 .

[37]  Nick Lee,et al.  Purchase Decision-Making in Fair Trade and the “Ethical Gap" , 2006 .

[38]  J. Chiou,et al.  The Antecedents of Music Piracy Attitudes and Intentions , 2005 .

[39]  Sally Hibbert,et al.  Why People Don’t Take their Concerns about Fair Trade to the Supermarket: The Role of Neutralisation , 2007 .

[40]  Sudip Bhattacharjee,et al.  A Behavioral Model of Digital Music Piracy , 2004, J. Organ. Comput. Electron. Commer..

[41]  Martin Eisend,et al.  Explaining Counterfeit Purchases – A Review and Preview , 2006 .

[42]  J. Steenkamp,et al.  Assessing Measurement Invariance in Cross-National Consumer Research , 1998 .

[43]  S. Hinduja,et al.  Neutralizing Music Piracy: An Empirical Examination , 2008 .

[44]  James R. Marsden,et al.  Whatever happened to payola? An empirical analysis of online music sharing , 2005, Decis. Support Syst..

[45]  Ian Rowlands,et al.  The attitudes and behaviours of illegal downloaders , 2010, Aslib Proc..

[46]  M. Dacin,et al.  Psychological Pathways to Fraud: Understanding and Preventing Fraud in Organizations , 2011 .

[47]  Catherine D. Marcum,et al.  Music Piracy and Neutralization: A Preliminary Trajectory Analysis from Short-Term Longitudinal Data , 2008 .

[48]  George Palaigeorgiou,et al.  What do computer science students think about software piracy? , 2010, Behav. Inf. Technol..

[49]  Ibrahim Sirkeci,et al.  Understanding illegal music downloading in the UK: a multi‐attribute model , 2011 .

[50]  T. Hennig-Thurau,et al.  Consumer File Sharing of Motion Pictures , 2007 .

[51]  C. Werts,et al.  The Use Of Analysis Of Covariance Structures For Comparing The Psychometric Properties Of Multiple Variables Across Populations. , 1978, Multivariate behavioral research.