Software Piracy among Accounting Students: A Longitudinal Comparison of Changes and Sensitivity

A 1991 survey found that a large proportion of accounting students pirate software. Since 1991, however, the rate of software piracy within the United States has decreased. Using the Theory of Reasoned Action (TRA), this paper analyzes whether the frequency and the underlying antecedents of software piracy also have changed among accounting students. The results indicate that students' understanding and knowledge of copyright laws have increased, but this knowledge has not influenced software piracy rates. This paper also investigates respondents' willingness to answer honestly questions dealing with software piracy. The randomized response technique allows for an evaluation of the honesty of responses to a sensitive question (i.e., software theft). In contrast to other ethics issues about which individuals have been found to be dishonest, the results indicate that participants honestly answered most questions about their piracy behavior.

[1]  K. R. Conner,et al.  Software piracy: an analysis of protection strategies , 1991 .

[2]  Ram D. Gopal,et al.  Global software piracy: you can't get blood out of a turnip , 2000, CACM.

[3]  B. Husted The Impact of National Culture on Software Piracy , 2000 .

[4]  Bernard Wong-On-Wing,et al.  A comparative examination of auditor premature sign-offs using the direct and the randomized response methods , 1997 .

[5]  Dennis F. Galletta,et al.  Software Piracy in the Workplace: A Model and Empirical Test , 2003, J. Manag. Inf. Syst..

[6]  Paul E. Tracy,et al.  The Validity of Randomized Response for Sensitive Measurements , 1981 .

[7]  G. A. Miller,et al.  Book Review Nisbett, R. , & Ross, L.Human inference: Strategies and shortcomings of social judgment.Englewood Cliffs, N.J.: Prentice-Hall, 1980. , 1982 .

[8]  Ram D. Gopal,et al.  International Software Piracy: Analysis of Key Issues and Impacts , 1998, Inf. Syst. Res..

[9]  Ram D. Gopal,et al.  Preventive and Deterrent Controls for Software Piracy , 1997, J. Manag. Inf. Syst..

[10]  William R. Swinyard,et al.  The morality of software piracy: A cross-cultural analysis , 1990 .

[11]  Jin H. Im,et al.  Software piracy and software security measures in business schools , 1992, Inf. Manag..

[12]  Chee-Sing Yap,et al.  Testing an Ethical Decision-Making Theory: The Case of Softlifting , 1998, J. Manag. Inf. Syst..

[13]  Gary S. Monroe,et al.  Exploring Social Desirability Bias , 2003 .

[14]  T. Jones Ethical Decision Making by Individuals in Organizations: An Issue-Contingent Model , 1991 .

[15]  Ranjan B. Kini,et al.  Shaping of Moral Intensity regarding Software Piracy in University Students: Immediate Community Effects , 2001, J. Comput. Inf. Syst..

[16]  Vijay Mahajan,et al.  Software Piracy: Estimation of Lost Sales and the Impact on Software Diffusion , 1995 .

[17]  Hsing Kenneth Cheng,et al.  Toward a profile of student software piraters , 1996 .

[18]  Thomas A. Buchman,et al.  Obtaining Responses To Sensitive Questions - Conventional Questionnaire Versus Randomized-Response Technique , 1982 .

[19]  Manson P. Dillaway,et al.  Strengthening the ethics content of accounting courses , 1989 .

[20]  S L Warner,et al.  Randomized response: a survey technique for eliminating evasive answer bias. , 1965, Journal of the American Statistical Association.

[21]  Alan J. Dubinsky,et al.  Analyzing ethical decision making in marketing , 1989 .

[22]  Wallace A. Wood,et al.  Situational determinants of software piracy: An equity theory perspective , 1996 .

[23]  Richard G. Lomax,et al.  A Beginner's Guide to Structural Equation Modeling , 2022 .

[24]  Christian S. Collberg,et al.  Watermarking, Tamper-Proofing, and Obfuscation-Tools for Software Protection , 2002, IEEE Trans. Software Eng..

[25]  Charles W Petit Universe. The gods must be crazy. , 2003, U.S. news & world report.

[26]  L. Ross,et al.  Human Inference: Strategies and Shortcomings of Social Judgment. , 1981 .

[27]  I. Ajzen,et al.  Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research , 1977 .

[28]  Hsing K. Cheng,et al.  To Purchase or to Pirate Software: An Empirical Study , 1997, J. Manag. Inf. Syst..

[29]  Detmar W. Straub,et al.  Key information liability issues facing managers: software piracy, proprietary databases, and indi , 1990 .

[30]  D. Horvitz,et al.  Application of the Randomized Response Technique in Obtaining Quantitative Data , 1971 .

[31]  Ilkka A. Ronkainen,et al.  Correlates of Intellectual Property Violation , 2001 .