An investigation of the intention to share media files over peer-to-peer networks

File-sharing over peer-to-peer (P2P) networks once consisted largely of music files, which, when shared, were infringements of copyrights. For this reason, studies of the behavioural intentions (BIs) to share files over P2P networks have often focused on the piracy of music files. However, with improved technology and increased bandwidth, large files such as videos are routinely shared. As industry-led efforts may have had some success stemming illegal file-sharing, and as new and legitimate applications of P2P file-sharing are emerging, it is important to include media files of all types and consider file-sharing that is both legitimate and that which constitutes piracy within the scope of our study. To study the intention to share media files over P2P networks, we evaluate two alternative models. The theory of planned behaviour (TPB) is the underlying theory for both models, one of which is based on the original TPB and one on the decomposed TPB. We test both models using previously validated instruments and find that both models can explain a significant portion of the variance in the intentions to share media files over P2P networks. However, the model based on the decomposed TPB can explain more of the variance. A second advantage of this model is that it can be more readily translated to managerial actions, which are also explored.

[1]  Robert LaRose,et al.  Sharing or Piracy? An Exploration of Downloading Behavior , 2005, J. Comput. Mediat. Commun..

[2]  Sudip Bhattacharjee,et al.  A Behavioral Model of Digital Music Piracy , 2004, J. Organ. Comput. Electron. Commer..

[3]  John Ingham,et al.  Why do people use information technology? A critical review of the technology acceptance model , 2003, Inf. Manag..

[4]  Rakesh Kumar,et al.  Pollution in P2P file sharing systems , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[5]  Karl Reiner Lang,et al.  An Analytical Framework for Evaluating Peer-to-Peer Business Models , 2008, Electron. Commer. Res. Appl..

[6]  George Palaigeorgiou,et al.  What do computer science students think about software piracy? , 2010, Behav. Inf. Technol..

[7]  Hao Wang,et al.  Trust in the Social Computing: The Case of Peer-to-Peer (P2P) File Sharing Networks , 2009, AMCIS.

[8]  J. Grimshaw,et al.  Constructing questionnaires based on the theory of planned behaviour: A manual for health services researchers , 2004 .

[9]  J. Marsden,et al.  Impact of Legal Threats on Online Music Sharing Activity: An Analysis of Music Industry Legal Actions* , 2006, The Journal of Law and Economics.

[10]  A. Tenbrunsel,et al.  Organizational Behavior and Human Decision Processes , 2013 .

[11]  Steven A. Taylor,et al.  Intention to Engage in Digital Piracy , 2009 .

[12]  Sudip Bhattacharjee,et al.  Digital music and online sharing: software piracy 2.0? , 2003, CACM.

[13]  Rajiv K. Sinha,et al.  Don't Think Twice, It's All Right: Music Piracy and Pricing in a DRM-Free Environment , 2010 .

[14]  Thompson S. H. Teo,et al.  Adoption of WAP-enabled mobile phones among Internet users , 2003 .

[15]  Charles D. Barrett Understanding Attitudes and Predicting Social Behavior , 1980 .

[16]  Fred D. Davis User Acceptance of Information Technology: System Characteristics, User Perceptions and Behavioral Impacts , 1993, Int. J. Man Mach. Stud..

[17]  Felix Oberholzer-Gee,et al.  The Effect of File Sharing on Record Sales: An Empirical Analysis , 2007, Journal of Political Economy.

[18]  Fred D. Davis Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology , 1989, MIS Q..

[19]  Robert LaRose,et al.  Share, Steal, or Buy? A Social Cognitive Perspective of Music Downloading , 2007, Cyberpsychology Behav. Soc. Netw..

[20]  Kieran Mathieson,et al.  Predicting User Intentions: Comparing the Technology Acceptance Model with the Theory of Planned Behavior , 1991, Inf. Syst. Res..

[21]  A. d’Astous,et al.  Music Piracy on the Web – How Effective are Anti-Piracy Arguments? Evidence from the Theory of Planned Behaviour , 2005 .

[22]  Mun Y. Yi,et al.  Understanding information technology acceptance by individual professionals: Toward an integrative view , 2006, Inf. Manag..

[23]  Oz Shy,et al.  Publishers, artists, and copyright enforcement , 2006, Inf. Econ. Policy.

[24]  A. Bandura Social cognitive theory of moral thought and action. , 1991 .

[25]  Peter A. Todd,et al.  Understanding Information Technology Usage: A Test of Competing Models , 1995, Inf. Syst. Res..

[26]  Leo R. Vijayasarathy,et al.  Predicting consumer intentions to use on-line shopping: the case for an augmented technology acceptance model , 2004, Inf. Manag..

[27]  Shuman Ghosemajumder Advanced peer-based technology business models , 2002 .

[28]  Kieran Mathieson,et al.  Beyond the interface: Ease of use and task/technology fit , 1998, Inf. Manag..

[29]  I. Ajzen The theory of planned behavior , 1991 .

[30]  X. Koufteros,et al.  Intention to Commit Online Music Piracy and Its Antecedents: An Empirical Investigation , 2008 .

[31]  I. Ajzen,et al.  A Comparison of the Theory of Planned Behavior and the Theory of Reasoned Action , 1992 .

[32]  Icek Ajzen,et al.  From Intentions to Actions: A Theory of Planned Behavior , 1985 .

[33]  Zhaohua Deng,et al.  Exploring factors affecting Chinese consumers' usage of short message service for personal communication , 2010, Inf. Syst. J..

[34]  I. Ajzen,et al.  Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research , 1977 .

[35]  Rong-An Shang,et al.  Ethical Decisions About Sharing Music Files in the P2P Environment , 2008 .

[36]  A. Bandura Self-efficacy mechanism in human agency , 2024, Psihologìâ ì suspìlʹstvo.

[37]  Gerald R. Faulhaber File Sharing, Copyright, and the Optimal Production of Music , 2006 .

[38]  I. Ajzen,et al.  Understanding Attitudes and Predicting Social Behavior , 1980 .

[39]  Shin-Yuan Hung,et al.  User acceptance of WAP services: test of competing theories , 2005, Comput. Stand. Interfaces.