New insights into the problem of software piracy: The effects of neutralization, shame, and moral beliefs

Software piracy is a major economic concern for organizations. Previous research indicates that neutralization, a form of rationalization, can help explain software piracy intentions. However, a knowledge gap exists in our understanding of which neutralization techniques most influence software piracy intention. To address this gap, we developed a model that explains the effects of neutralization techniques on software piracy intention. We included different types of deterrents (formal sanctions, shame, and moral belief) in our model because individuals may use neutralization techniques to mitigate feelings of guilt and shame, which, subsequently, reduce the deterrent effect. Our empirical results (for 183 people surveyed) showed that appeal to higher loyalties and condemn the condemners strongly predict software piracy intentions. In addition, informal deterrents such as shame and moral beliefs are strong predictors. These findings suggest that anti-piracy efforts should involve educational intervention aimed at addressing these two neutralization techniques rather than relying on formal sanctions.

[1]  Mikko T. Siponen,et al.  Information security management standards: Problems and solutions , 2009, Inf. Manag..

[2]  Sang M. Lee,et al.  An integrative model of computer abuse based on social control and general deterrence theories , 2004, Inf. Manag..

[3]  R. Paternoster,et al.  Sanction threats and appeals to morality : Testing a rational choice model of corporate crime , 1996 .

[4]  Paul F. Cromwell,et al.  the devil made me do it: use of neutralizations by shoplifters , 2003 .

[5]  Sameer Hinduja,et al.  Self-Control and Ethical Beliefs on the Social Learning of Intellectual Property Theft* , 2008 .

[6]  S. Hinduja,et al.  Neutralizing Music Piracy: An Empirical Examination , 2008 .

[7]  George E. Higgins,et al.  Neutralizing Potential and Self-Reported Digital Piracy , 2009 .

[8]  Ed Buckner Book Review: Anastaplo, G. (2005). The Constitutionalist: Notes on the First Amendment. Lanham, MD: Lexington Books. 826 pp., 79 pp. of prefaces and preliminary material , 2007 .

[9]  D. Nagin,et al.  Enduring individual differences and rational choice theories of crime , 1993 .

[10]  Mikko T. Siponen,et al.  IS Security Policy Violations: A Rational Choice Perspective , 2012, J. Organ. End User Comput..

[11]  Timothy Paul Cronan,et al.  Equity perceptions as a deterrent to software piracy behavior , 2007, Inf. Manag..

[12]  Michael B. Blankenship,et al.  examining the role of differential association and techniques of neutralization in explaining corporate crime , 2005 .

[13]  Anat Hovav,et al.  Applying an extended model of deterrence across cultures: An investigation of information systems misuse in the U.S. and South Korea , 2012, Inf. Manag..

[14]  Tero Vartiainen,et al.  Unauthorized copying of software and levels of moral development: a literature analysis and its implications for research and practice , 2004, Inf. Syst. J..

[15]  Garry C. Gray,et al.  The Regulation of Corporate Violations Punishment, Compliance, and the Blurring of Responsibility , 2006 .

[16]  R. A. Dodder,et al.  techniques of neutralization used by deer poachers in the western united states: a research note , 1999 .

[17]  Gaby Odekerken-Schröder,et al.  Using PLS path modeling for assessing hierarchial construct models: guidelines and impirical illustration , 2009 .

[18]  Heith Copes,et al.  streetlife and the rewards of auto theft , 2003 .

[19]  Dennis F. Galletta,et al.  User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach , 2009, Inf. Syst. Res..

[20]  Dennis F. Galletta,et al.  Software Piracy in the Workplace: A Model and Empirical Test , 2003, J. Manag. Inf. Syst..

[21]  Mikko T. Siponen,et al.  Neutralization: New Insights into the Problem of Employee Systems Security Policy Violations , 2010, MIS Q..

[22]  Sally S. Simpson,et al.  Informal Sanction Threats and Corporate Crime: Additive Versus Multiplicative Models , 1995 .

[23]  Quint C. Thurman,et al.  Deviance and the neutralization of moral commitment: An empirical analysis , 1984 .

[24]  Lydia L. Gan,et al.  An empirical study of software piracy among tertiary institutions in Singapore , 2006, Inf. Manag..

[25]  Rhonda D. Evans,et al.  the nature and frequency of medicare/medicaid fraud and neutralization techniques among speech, occupational, and physical therapists , 2005 .