1,390
Views
21
CrossRef citations to date
0
Altmetric
Articles

Central Role of Moral Obligations in Determining Intentions to Engage in Digital Piracy

References

  • Ajzen, I. From Intentions to Actions: A Theory of Planned Behavior. In: Kuhl J., Beckmann J. (eds) Action Control. SSSP Springer Series in Social Psychology. Springer, Berlin, Heidelberg, (1985).
  • Ajzen, I. The theory of planned behavior. Organizational Behavior and Human Decision Processes, 50, 2 (1991), 179–211.
  • Ajzen, I.; and Fishbein, M. Understanding Attitudes and Predicting Social Behavior. Englewood Cliffs: Prentice-Hall, 1980.
  • Al-Rafee, S.; and Cronan, T.P. Digital piracy: Factors that influence attitude toward behavior. Journal of Business Ethics, 63, 3 (2006), 237–259.
  • Armitage, C.J.; and Conner, M. Efficacy of the theory of planned behaviour: A meta-analytic review. British Journal of Social Psychology, 40, 4 (2001), 471–499.
  • Aronson, E. The theory of cognitive dissonance: A current perspective. Advances in Experimental Social Psychology, 4, C (1969), 1–34.
  • Aronson, E. Review: Back to the future: Retrospective review of Leon Festinger’s “A theory of cognitive dissonance.” The American Journal of Psychology, 110, 1 (1997), 127–137.
  • Bagozzi, R.P. Measurement and meaning in information systems and organizational research: Methodological and philosophical foundations. MIS Quarterly, 35, 2 (2011), 261–292.
  • Bandura, A.; Barbaranelli, C.; Caprara, G.V.; and Pastorelli, C. Mechanisms of moral disengagement in the exercise of moral agency. Journal of Personality and Social Psychology, 71, 2 (1996), 364–374.
  • Beck, L.; and Ajzen, I. Predicting dishonest actions using the theory of planned behavior. Journal of Research in Personality, 25, 3 (1991), 285–301.
  • Bhattacharjee, S.; Gopal, R.; Marsden, J.R.; Sankaranarayanan, R.; and Telang, R. To theme or not to theme: Can theme strength be the music industry’s “killer app”? Decision Support Systems, 48, 1 (2009), 141–149.
  • Bhattacharjee, S.; Gopal, R.D.; and Sanders, G.L. Digital music and online sharing: Software piracy 2.0? Communications of the ACM, 46, 7 (2003), 107–111.
  • Business Software Alliance. Seventh annual BSA/IDC global software: 09 piracy study. 2010.
  • Business Software Alliance. The compliance gap: BSA global software survey. 2014.
  • Campbell, R.; and Kumar, V. Moral reasoning on the ground. Ethics, 122, 2 (2012), 273–312.
  • Carmel, R.; and Gabler, K. 90%. 2D Boy, 2008. Accessed on September 19, 2010. http://2dboy.com/2008/11/13/90/.
  • Chang, M.K. Predicting unethical behavior: A comparison of the theory of reasoned action and the theory of planned behavior. Journal of Business Ethics, 17, 16 (1998), 1825–1834.
  • Chatterjee, S.; Sarker, S.; and Valacich, J.S. The behavioral roots of information systems security: Exploring key factors related to unethical IT use. Journal of Management Information Systems, 31, 4 (2015), 49–87.
  • Chellappa, R.K.; and Shivendu, S. Economic implications of variable technology standards for movie piracy in a global context. Journal of Management Information Systems, 20, 2 (2003), 137–168.
  • Chellappa, R.K.; and Shivendu, S. Managing piracy: Pricing and sampling strategies for digital experience goods in vertically segmented markets. Information Systems Research, 16, 4 (2005), 400–417.
  • Chen, M.-F.; Pan, C.-T.; and Pan, M.-C. The joint moderating impact of moral intensity and moral judgment on consumer’s use intention of pirated software. Journal of Business Ethics, 90, 3 (2009), 361–373.
  • Cheng, H.K.; Sims, R.R.; and Teegen, H. To purchase or pirate software: An empirical study. Journal of Management Information Systems, 13, 4 (1997), 49–60.
  • Chin, W.W. Issues and opinion on structural equation modeling. MIS Quarterly, 22, 1 (1998), vii–xvi.
  • Chin, W.W.; Marcelin, B.L.; and Newsted, P.R. A partial least squares latent variable modeling approach for measuring interaction effects: Results from a Monte Carlo simulation study and an electronic-mail emotion/adoption study. Information Systems Research, 14, 2 (2003), 189–217.
  • Chin, W.W.; Thatcher, J.B.; Wright, R.T.; and Steel, D. Controlling for Common Method Variance in PLS Analysis: The Measured Latent Marker Variable Approach. Springer Proceedings in Mathematics and Statistics, 56, (2013), 231–239.
  • Cialdini, R.B. Influence: The Psychology of Persuasion. New York: William Morrow and Company, 1993.
  • Cohen, J. Statistical Power Analysis for the Behavioral Sciences. Hillsdale: Lawrence Erlbaum, 1988.
  • Cronan, T.P.; and Al-Rafee, S. Factors that influence the intention to pirate software and media. Journal of Business Ethics, 78, 4 (2008), 527–545.
  • Ćwiakowski, P.; Giergiczny, M.; and Krawczk, M. Pirates in the lab: Using incentivized choice experiments to explore preference for (un)authorized content. MIS Quarterly, 40, 3 (2016), 709–715.
  • D’Arcy, J.; and Devaraj, S. Employee misuse of information technology resources: Testing a contemporary deterrence model. Decision Sciences, 43, 6 (2012), 1091–1124.
  • D’Arcy, J.; Hovav, A.; and Galletta, D. User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach. Information Systems Research, 20, 1 (2009), 79–98.
  • De Corte, C.E.; and Van Kenhove, P. One sail fits all? A psychographic segmentation of digital pirates. Journal of Business Ethics, 143, 3 (2017), 441–465.
  • Detert, J.R.; Treviño, L.K.; and Sweitzer, V.L. Moral disengagement in ethical decision making: A study of antecedents and outcomes. Journal of Applied Psychology, 93, 2 (2008), 374–391.
  • Douglas, D.E.; Cronan, T.P.; and Behel, J.D. Equity perceptions as a deterrent to software piracy behavior. Information and Management, 44, 5 (2007), 503–512.
  • Festinger, L. A Theory of Cognitive Dissonance. Evanston: Row Peterson, 1957.
  • Festinger, L.; and Carlsmith, J.M. Cognitive consequences of forced compliance. Journal of Abnormal and Social Psychology, 58, 2 (1959), 203–210.
  • Fornell, C.; and Larcker, D.F. Evaluating structural equation models with unobservable variables and measurement error. Journal of Marketing Research, 18, 1 (1981), 39–50.
  • Freedman, J.L.; and Fraser, S.C. Compliance without pressure: The foot-in-the-door technique. Journal of Personality and Social Psychology, 4, 2 (1966), 195–202.
  • Gefen, D.; and Straub, D. A practical guide to factorial validity using PLS-Graph: Tutorial and annotated example. Communications of the AIS, 16, (2005), 91–109.
  • Geng, X.; and Lee, Y.-J. Competing with piracy: A multichannel sequential search approach. Journal of Management Information Systems, 30, 2 (2013), 159–184.
  • Goles, T.; Jayatilaka, B.; George, B.; Parsons, L., Chambers, V., Taylor, D., and Brune, R. Softlifting: Exploring determinants of attitude. Journal of Business Ethics, 77, 4 (2008), 481–499.
  • Gopal, R.D.; and Sanders, G.L. Preventive and deterrent controls for software piracy. Journal of Management Information Systems, 13, 4 (1997), 29–47.
  • Gorsuch, R.L.; and Ortberg, J. Moral obligation and attitudes: Their relation to behavioral intentions. Journal of Personality and Social Psychology, 44, 5 (1983), 1025–1028.
  • Gunter, W.D.; Higgins, G.E.; and Gealt, R.E. Pirating youth: Examining the correlates of digital music piracy among adolescents. International Journal of Cyber Criminology, 4, 1 and 2 (2010), 657–671.
  • Hair, J.F.; Ringle, C.M.; and Sarstedt, M. PLS-SEM: Indeed a silver bullet. Journal of Marketing Theory and Practice, 19, 2 (2011), 139–151.
  • Hashim, M.J.; Kannan, K.N.; Maximiano, S.; and Ulmer, J.R. Digital piracy, teens, and the source of advice: An experimental study. Journal of Management Information Systems, 31, 2 (2014), 211–244.
  • Heider, F. The Psychology of Interpersonal Relations. Hillsdale: Lawrence Erlbaum, 1958.
  • Higgins, G.E.; Wolfe, S.E.; and Marcum, C.D. Digital piracy: An examination of three measurements of self-control. Deviant Behavior, 29, 5 (2008), 440–460.
  • Ingram, J.R.; and Hinduja, S. Neutralizing music piracy: An empirical examination. Deviant Behavior, 29, (2008), 334–366.
  • International Federation of the Phonographic Industry. Digital music report 2009. Accessed on January 3, 2012. http://www.ifpi.org/content/library/DMR2009-real.pdf.
  • International Federation of the Phonographic Industry. Tackling music piracy. 2017. Accessed on April 12, 2017. http://www.ifpi.org/music-piracy.php.
  • Jeong, B.-K.; Zhao, K.; and Khouja, M. Consumer piracy risk: Conceptualization and measurement in music sharing. International Journal of Electronic Commerce, 16, 3 (2012), 89–118.
  • John, P.; Smith, G.; and Stoker, G. Nudge nudge, think think: Two strategies for changing civic behaviour. Political Quarterly, 80, 3 (2009), 361–370.
  • Kahan, D.M. Gentle nudges vs. hard shoves: Solving the sticky norms problem. University of Chicago Law Review, 67, 3 (2000), 607.
  • Khouja, M.; and Park, S. Optimal pricing of digital experience goods under piracy. Journal of Management Information Systems, 24, 3 (2007), 109–141.
  • Kim, D.J.; Ferrin, D.L.; and Rao, H.R. A trust-based consumer decision-making model in electronic commerce: The role of trust, perceived risk, and their antecedents. Decision Support Systems, 44, 2 (2008), 544–564.
  • Knopper, S. Rock and Roll: RIAA’s campus crackdown. Rolling Stone, 2007, 15.
  • Kock, N. Advanced mediating effects tests, multi-group analyses, and measurement model assessments in PLS-based SEM. International Journal of e-Collaboration, 10, 1 (2014), 1–13.
  • Levin, D. Guest Column: Rick Chazan on music piracy. Mess+Noise, 2011. Accessed on September 22, 2011. http://www.messandnoise.com/features/4172775.
  • Limayem, M.; Khalifa, M.; and Chin, W.W. Factors motivating software piracy: A longitudinal study. IEEE Transactions on Engineering Management, 51, 4 (2004), 414–425.
  • Liu, Y.; Cheng, H.K.; Tang, Q.C.; and Eryarsoy, E. Optimal software pricing in the presence of piracy and word-of-mouth effect. Decision Support Systems, 51, 1 (2011), 99–107.
  • Logsdon, J.M.; Thompson, J.K.; and Reid, R.A. Software piracy: Is it related to level of moral judgment? Journal of Business Ethics, 13, 11 (1994), 849–857.
  • Lowery, D. Letter to Emily White at NPR all songs considered. The Trichordist, 2012. Accessed on April 12, 2017. https://thetrichordist.com/2012/06/18/letter-to-emily-white-at-npr-all-songs-considered/.
  • Lowry, P.B.; Zhang, J.; and Wu, T. Nature or nurture? A meta-analysis of the factors that maximize the prediction of digital piracy by using social cognitive theory as a framework. Computers in Human Behavior, 68, (2017), 104–120.
  • Lysonski, S.; and Durvasula, S. Digital piracy of MP3s: Consumer and ethical predispositions. Journal of Consumer Marketing, 25, 3 (2008), 167–178.
  • Marcoulides, G.A.; Chin, W.W.; and Saunders, C. A critical look at partial least squares modeling. MIS Quarterly, 33, 1 (2009), 171–176.
  • Marcoulides, G.A.; and Saunders, C. PLS: A silver bullet? MIS Quarterly, 30, 2 (2006), III–IV.
  • Marshall, A. Causes, effects and solutions of piracy in the computer software market. Review of Economic Research on Copyright Issues, 4, 1 (2007), 63–86.
  • Mazar, N.; Amir, O.; and Ariely, D. The dishonesty of honest people: A theory of self-concept maintenance. Journal of Marketing Research, 45, 6 (2008), 633–644.
  • Melcher, J.M.; and Schooler, J.W. The misremembrance of wines past: Verbal and perceptual expertise differentially mediate verbal overshadowing of taste memory. Journal of Memory and Language, 35, 2 (1996), 231–245.
  • Moores, T.T.; and Chang, J.C.-J. Ethical decision making in software piracy: Initial development and test of a four-component model. MIS Quarterly, 30, 1 (2006), 167–180.
  • Offutt, S. Insights Gained from Efforts to Quantify the Effects of Counterfeit and Pirated Goods in the U.S. Economy. Washington, DC: United States Government Accountability Office, 2013.
  • Paternoster, R.; and Simpson, S. Sanction threats and appeals to morality: Testing a rational choice model of corporate crime. Law and Society Review, 30, 3 (1996), 549–583.
  • Pavlou, P.A.; Liang, H.; and Xue, Y. Understanding and mitigating uncertainty in online exchange relationships: A principal-agent perspective. MIS Quarterly, 31, 1 (2007), 105–135.
  • Peace, A.G.; Galletta, D.F.; and Thong, J.Y.L. Software piracy in the workplace: A model and empirical test. Journal of Management Information Systems, 20, 1 (2003), 153–177.
  • Piquero, N.L.; Tibbetts, S.G.; and Blankenship, M.B. Examining the role of differential association and techniques of neutralization in explaining corporate crime. Deviant Behavior, 26, 2 (2005), 159–188.
  • Pyyny, P. MPAA to fund anti-piracy education in schools. AfterDawn, 2003. Accessed on January 3, 2011 http://www.afterdawn.com/news/article.cfm/2003/10/24/mpaa_to_fund_anti-piracy_education_in_schools.
  • Rest, J.R. Development in Judging Moral Issues. Minneapolis: University of Minnesota Press, 1979.
  • Ringle, C.M.; Wende, S.; and Will, A. SmartPLS 2.0 (M3) Beta. Hamburg, Germany: University of Hamburg, 2005.
  • Rivis, A.; Sheeran, P.; and Armitage, C.J. Expanding the affective and normative components of the theory of planned behavior: A meta-analysis of anticipated affect and moral norms. Journal of Applied Social Psychology, 39, 12 (2009), 2985–3019.
  • Rogers, J.W.; and Buffalo, M.D. Neutralization techniques: Toward a simplified measurement scale. Sociological Perspectives, 17, 3 (1974), 313–331.
  • Schooler, J.W. Verbalization produces a transfer inappropriate processing shift. Applied Cognitive Psychology, 16, 8 (2002), 989–997.
  • Schwartz, S.H. Normative influences on altruism. Advances in Experimental Social Psychology, 10, C (1977), 221–279.
  • Sinclair, G.; and Green, T. Download or stream? Steal or buy? Developing a typology of today’s music consumer. Journal of Consumer Behaviour, 15, 1 (2016), 3–14.
  • Sinha, R.K.; Machado, F.S.; and Sellman, C. Don’t think twice, it’s all right: Music piracy and pricing in a DRM-free environment. Journal of Marketing, 74, 2 (2010), 40–54.
  • Siponen, M.; Vance, A.; and Willison, R. New insights into the problem of software piracy: The effects of neutralization, shame, and moral beliefs. Information and Management, 49, 7–8 (2012), 334–341.
  • Smith, E.; and Benoit, D. Nine movie sites busted in pirating crackdown. The Wall Street Journal, 2010. http://online.wsj.com/article/SB10001424052748703426004575339120611859094.html.
  • Smith, N.C.; Simpson, S.S.; and Huang, C.-Y. Why managers fail to do the right thing: An empirical study of unethical and illegal conduct. Business Ethics Quarterly, 17, 4 (2007), 633–667. Accessed on September 19, 2010.
  • Sykes, G.M.; and Matza, D. Techniques of neutralization: A theory of delinquency. In Thomas G. Blomberg, Francis T. Cullen, Christoffer Carlsson, Cheryl Lero Jonson (Eds.,) Delinquency and Drift Revisited: The Criminology of David Matza and Beyond, 2017, pp. 33–41.
  • Tan, B. Understanding consumer ethical decision making with respect to purchase of pirated software. Journal of Consumer Marketing, 19, 2 (2002), 96–111.
  • Thong, J.Y.L.; and Yap, C.-S. Testing an ethical decision-making theory: The case of softlifting. Journal of Management Information Systems, 15, 1 (1998), 213–237.
  • Treviño, L.K.; Weaver, G.R.; and Reynolds, S.J. Behavioral ethics in organizations: A review. Journal of Management, 32, 6 (2006), 951–990.
  • Van’t Veer, A.E.; Stel, M.; and van Beest, I. Limited capacity to lie: Cognitive load interferes with being dishonest. Judgment and Decision Making, 9, 3 (2014), 199–206.
  • Wang, J.; Yang, Z.; and Bhattacharjee, S. Same coin, different sides: Differential impact of social learning on two facets of music piracy. Journal of Management Information Systems, 28, 3 (2011), 343–384.
  • Wetzels, M.; Odekerken-Schröder, G.; and Van Oppen, C. Using PLS path modeling for assessing hierarchical construct models: Guidelines and empirical illustration. MIS Quarterly, 33, 1 (2009), 177–196.
  • White, E. I never owned any music to begin with. NPR music, 2012. Accessed on April 12, 2017. http://www.npr.org/sections/allsongs/2012/06/16/154863819/i-never-owned-any-music-to-begin-with.
  • Yager, L. Observations on efforts to quantify the economic effects of counterfeit and pirated goods. Washington, DC: United States Government Accountability Office, 2010.
  • Yang, Z.; and Wang, J. Differential effects of social influence sources on self-reported music piracy. Decision Support Systems, 69, (2015), 70–81.
  • Yoon, C. Theory of planned behavior and ethics theory in digital piracy: An integrated model. Journal of Business Ethics, 100, 3 (2011), 405–417.
  • Yoon, C. Digital piracy intention: A comparison of theoretical models. Behaviour and Information Technology, 31, 6 (2012), 565–576.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.