An intention model-based study of software piracy

The illegal copying of software is commonly referred to as software piracy, which is considered to be one of the ethical issues of cyberspace. To this end, several measures have been tried to prevent and deter losses. One is to identify the factors that influence the piracy act. In this research, a theoretical model is developed to test the factors that would significantly affect piracy intention of information system (IS) professionals. The model is based on the Ajzen's (1985; 1989) theory of planned behavior (TPB), ethical decision making theory, self-efficacy theory, and M-O-P (Motivation-Object-Protect) criminal theory. Our study shows that that IS professional's piracy acts are directly influenced by their attitudes, subjective norms, and perceived deindividuation. It also shows that the attitude and subjective norms are, in turn, influenced by their ethical perception of piracy issues and organizational ethical climates.

[1]  O. C. Ferrell,et al.  A Contingency Framework for Understanding Ethical Decision Making in Marketing , 1985 .

[2]  G JohnsonDeborah,et al.  Using the new ACM code of ethics in decision making , 1993 .

[3]  Fred D. Davis,et al.  User Acceptance of Computer Technology: A Comparison of Two Theoretical Models , 1989 .

[4]  C. Fornell,et al.  Evaluating structural equation models with unobservable variables and measurement error. , 1981 .

[5]  R. A. Grant,et al.  Building and testing a causal model of an information technology's impact , 1989, ICIS '89.

[6]  Icek Ajzen,et al.  From Intentions to Actions: A Theory of Planned Behavior , 1985 .

[7]  T. Jones Ethical Decision Making by Individuals in Organizations: An Issue-Contingent Model , 1991 .

[8]  D. Parker,et al.  Ethical conflicts in information and computer science, technology, and business , 1990 .

[9]  I. Ajzen,et al.  Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research , 1977 .

[10]  P. Zimbardo The human choice: Individuation, reason, and order versus deindividuation, impulse, and chaos. , 1969 .

[11]  Bruce Christie,et al.  Face to File Communication: A Psychological Approach to Information Systems , 1981 .

[12]  David F. Larcker,et al.  Structural Equation Models with Unobservable Variables and Measurement Error: Algebra and Statistics: , 1981 .

[13]  Timothy Paul Cronan,et al.  Modeling IT Ethics: A Study in Situational Ethics , 1998, MIS Q..

[14]  Effy Oz,et al.  Ethical Standards for Information Systems Professionals: A Case for a Unified Code , 1992, MIS Q..

[15]  A. Bandura Self-efficacy mechanism in human agency , 2024, Psihologìâ ì suspìlʹstvo.

[16]  I. Ajzen,et al.  Intention, perceived control, and weight loss: an application of the theory of planned behavior. , 1985, Journal of personality and social psychology.

[17]  Robert C. Ford,et al.  Ethical decision making: A review of the empirical literature , 1994 .

[18]  Wynne W. Chin,et al.  On the use, usefulness, and ease of use of structural equation modeling in MIS research: a note of caution , 1995 .

[19]  R. Bagozzi,et al.  On the evaluation of structural equation models , 1988 .

[20]  Rolph E. Anderson,et al.  Multivariate Data Analysis with Readings , 1979 .

[21]  Donald Gotterbarn,et al.  Using the new ACM code of ethics in decision making , 1993, CACM.

[22]  Louise Biron,et al.  Crime and Everyday Life - Insight and Implications for Society; Partners in Crime Prevention: For a Safer Quebec , 1995 .

[23]  Deborah Compeau,et al.  Computer Self-Efficacy: Development of a Measure and Initial Test , 1995, MIS Q..

[24]  Rolph E. Anderson,et al.  Multivariate data analysis with readings (2nd ed.) , 1986 .

[25]  L. Treviño Ethical Decision Making in Organizations: A Person-Situation Interactionist Model , 1986 .

[26]  Charles D. Barrett Understanding Attitudes and Predicting Social Behavior , 1980 .

[27]  J. Beckmann,et al.  Action control : from cognition to behavior , 1985 .

[28]  D. Loch,et al.  Evaluating Ethical Decision Making , 1996 .

[29]  I. Ajzen Attitude structure and behavior. , 1989 .

[30]  Karl G. Jöreskog,et al.  LISREL 7: A guide to the program and applications , 1988 .

[31]  M. Fishbein A theory of reasoned action: some applications and implications. , 1980, Nebraska Symposium on Motivation. Nebraska Symposium on Motivation.

[32]  Gordon B. Davis,et al.  Testing the Determinants of Microcomputer Usage via a Structural Equation Model , 1995, J. Manag. Inf. Syst..

[33]  Bart Victor,et al.  The Organizational Bases of Ethical Work Climates , 1988 .

[34]  Robert C. MacCallum,et al.  Alternative Strategies for Cross-Validation of Covariance Structure Models. , 1994, Multivariate behavioral research.

[35]  J. Nunamaker Proceedings of the 53rd Hawaii International Conference on System Sciences , 1999 .

[36]  Henri Barki,et al.  Measuring User Participation, User Involvement, and User Attitude , 1994, MIS Q..

[37]  Kieran Mathieson,et al.  Predicting User Intentions: Comparing the Technology Acceptance Model with the Theory of Planned Behavior , 1991, Inf. Syst. Res..

[38]  B. Schneider Organizational Climates: An Essay. , 1975 .

[39]  Susan J. Harrington,et al.  The Effect of Codes of Ethics and Personal Denial of Responsibility on Computer Abuse Judgments and Intentions , 1996, MIS Q..

[40]  James R. Rest Moral Development: Advances in Research and Theory , 1986 .

[41]  E. B. Swanson,et al.  Measuring user attitudes in MIS research: a review , 1982 .

[42]  Richard O. Mason,et al.  Applying ethics to information technology issues , 1995, CACM.

[43]  I. Ajzen,et al.  Prediction of goal directed behaviour: Attitudes, intentions and perceived behavioural control , 1986 .

[44]  Anusorn Singhapakdi,et al.  Ethical perceptions of marketers: The interaction effects of machiavellianism and organizational ethical culture , 1993 .

[45]  Karen D. Loch,et al.  Evaluating ethical decision making and computer use , 1996, CACM.