Factors motivating software piracy: a longitudinal study

The objective of this paper is to gain a better understanding of factors influencing software piracy. A model explaining the contribution of different factors to software piracy intention and its subsequent effect on actual software piracy is constructed based on established theories of human behavior. The model is then tested empirically in a longitudinal study with a survey. Findings show that social factors and beliefs concerning consequences of software piracy have significant effects on software piracy intentions. The data also show that while habits and facilitating conditions were significantly related to actual piracy behavior, intentions did not necessarily lead to the actual act of software piracy. The implications of the findings to research and practice are discussed.

[1]  Ibrahim M. Al-Jabri,et al.  Software copyright infringements: an exploratory study of the effects of individual and peer beliefs , 1997 .

[2]  Richard A. Reid,et al.  Software piracy: Is it related to level of moral judgment? , 1994 .

[3]  Vijay Mahajan,et al.  Software Piracy: Estimation of Lost Sales and the Impact on Software Diffusion , 1995 .

[4]  Brian J. Reithel,et al.  The Software Piracy Dilemma in Public Administration: A Survey of University Software Policy Enforcement , 1994 .

[5]  Yucel Saygin,et al.  Value of Information Gained from Data Mining in the Context of Information Sharing , 2004 .

[6]  F. Bergeron,et al.  Understanding EIS use: an empirical test of a behavioral model , 1992, Proceedings of the Twenty-Fifth Hawaii International Conference on System Sciences.

[7]  Louis Raymond,et al.  Determinants of EIS use: Testing a behavioral model, , 1995, Decis. Support Syst..

[8]  Hsing K. Cheng,et al.  To Purchase or to Pirate Software: An Empirical Study , 1997, J. Manag. Inf. Syst..

[9]  Jane M. Howell,et al.  Influence of Experience on Personal Computer Utilization: Testing a Conceptual Model , 1994, J. Manag. Inf. Syst..

[10]  W ChinWynne,et al.  Adoption intention in GSS , 1995 .

[11]  Ram D. Gopal,et al.  The Effect of Preventive and Deterrent Software Piracy Strategies on Producer Profits , 1992, ICIS.

[12]  William R. Swinyard,et al.  The morality of software piracy: A cross-cultural analysis , 1990 .

[13]  Jin H. Im,et al.  Software piracy and software security measures in business schools , 1992, Inf. Manag..

[14]  Stewart Kowalski,et al.  Computer ethics and computer abuse: a study of Swedish and Canadian university data processing students , 1990 .

[15]  A. Kong,et al.  A Study of Unauthorised Software Copying Among Post-Secondary Students in Hong Kong , 1990, Aust. Comput. J..

[16]  I. Ajzen The theory of planned behavior , 1991 .

[17]  Deborah Compeau,et al.  Application of Social Cognitive Theory to Training for Computer Skills , 1995, Inf. Syst. Res..

[18]  Clifford M. Koen,et al.  Software piracy and responsibilities of educational institutions , 1990, Inf. Manag..

[19]  Timothy Paul Cronan,et al.  Modeling IT Ethics: A Study in Situational Ethics , 1998, MIS Q..

[20]  Wynne W. Chin,et al.  Adoption intention in GSS: relative importance of beliefs , 1995, DATB.

[21]  I. Ajzen,et al.  Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research , 1977 .

[22]  Wallace A. Wood,et al.  Situational determinants of software piracy: An equity theory perspective , 1996 .

[23]  A. Bandura Social Foundations of Thought and Action: A Social Cognitive Theory , 1985 .

[24]  James R. Davis,et al.  Professional ethics: Business students' perceptions , 1991 .

[25]  Detmar W. Straub,et al.  Discovering and Disciplining Computer Abuse in Organizations: A Field Study , 1990, MIS Q..

[26]  S. Hunt,et al.  A General Theory of Marketing Ethics , 1986 .

[27]  Wynne W. Chin,et al.  Extending the technology acceptance model: the influence of perceived user resources , 2001, DATB.

[28]  Ang Yang Ang,et al.  Piracy Attitudes of Tertiary Students in Australia , 1998 .

[29]  K. R. Conner,et al.  Software piracy: an analysis of protection strategies , 1991 .

[30]  Feng-Yang Kuo,et al.  Development and Validation of Ethical Computer Self-Efficacy Measure: The Case of Softlifting , 2001 .

[31]  Karen D. Loch,et al.  Evaluating ethical decision making and computer use , 1996, CACM.

[32]  Wynne W. Chin The partial least squares approach for structural equation modeling. , 1998 .

[33]  J HarringtonSusan The effect of codes of ethics and personal denial of responsibility on computer abuse judgements and intentions , 1996 .

[34]  Ranjan B. Kini,et al.  An exploratory study of moral intensity regarding software piracy of students in Thailand , 2003, Behav. Inf. Technol..

[35]  P. Simpson,et al.  Softlifting: A model of motivating factors , 1994 .

[36]  Larry W. Cornwell,et al.  A question of ethics: Developing information system ethics , 1989 .

[37]  Jane M. Howell,et al.  Personal Computing: Toward a Conceptual Model of Utilization , 1991, MIS Q..

[38]  Gurpreet Dhillon,et al.  Software piracy: a view from Hong Kong , 2000, CACM.

[39]  Ram D. Gopal,et al.  Preventive and Deterrent Controls for Software Piracy , 1997, J. Manag. Inf. Syst..

[40]  David F. Larcker,et al.  Structural Equation Models with Unobservable Variables and Measurement Error: Algebra and Statistics: , 1981 .

[41]  Margaret Anne Pierce,et al.  Computer ethics: The role of personal, informal, and formal codes , 1996 .

[42]  Ranjan B. Kini,et al.  An Empirical Study of Software Piracy and Moral Intensity among University Students , 2000 .

[43]  Tung-Ching Lin,et al.  An intention model-based study of software piracy , 1999, Proceedings of the 32nd Annual Hawaii International Conference on Systems Sciences. 1999. HICSS-32. Abstracts and CD-ROM of Full Papers.

[44]  K. Jöreskog,et al.  Intraclass Reliability Estimates: Testing Structural Assumptions , 1974 .

[45]  Dennis F. Galletta,et al.  Developing a Predictive Model of Software Piracy Behavior: An Empirical Study , 1996, ICIS.

[46]  Susan J. Harrington,et al.  The Effect of Codes of Ethics and Personal Denial of Responsibility on Computer Abuse Judgments and Intentions , 1996, MIS Q..

[47]  H C Triandis,et al.  Values, attitudes, and interpersonal behavior. , 1980, Nebraska Symposium on Motivation. Nebraska Symposium on Motivation.

[48]  Afzaal H. Seyal,et al.  Software piracy among academics: an empirical study in Brunei Darussalam , 2000, Inf. Manag. Comput. Secur..

[49]  James A. Senn,et al.  Challenges and strategies for research in systems development , 1992 .

[50]  Wynne W. Chin Issues and Opinion on Structural Equation Modeling by , 2009 .

[51]  Afzaal H. Seyal,et al.  Software piracy among computing students: a Bruneian scenario , 1999, Comput. Educ..

[52]  Susan J. Harrington,et al.  Why People Copy Software and Create Computer Viruses , 1989 .

[53]  Ram D. Gopal,et al.  International Software Piracy: Analysis of Key Issues and Impacts , 1998, Inf. Syst. Res..

[54]  Hsing Kenneth Cheng,et al.  Toward a profile of student software piraters , 1996 .

[55]  Viswanath Venkatesh,et al.  Gender and age differences in employee decisions about new technology: an extension to the theory of planned behavior , 2005, IEEE Transactions on Engineering Management.

[56]  Chee-Sing Yap,et al.  Testing an Ethical Decision-Making Theory: The Case of Softlifting , 1998, J. Manag. Inf. Syst..

[57]  Jung P. Shim,et al.  A Comparative Examination of Attitudes Toward Software Piracy Among Business Professors and Executives , 1993 .