2,683
Views
4
CrossRef citations to date
0
Altmetric
Original Articles

Investigating the Factors Influencing Digital Movie Piracy

, &

References

  • AFACT (2007). Internet piracy. Retrieved from http://www.afact.org.au/moviethieves_internet.html/
  • Aiken, L. S., & West, S. G. (1991). Multiple regression: Testing and interpreting interactions. London, UK: Sage.
  • Aleassa, H., Pearson, J. M., & McClurg, S. (2011). Investigating software piracy in Jordan: An extension of the theory of reasoned action. Journal of Business Ethics, 98(4), 663–676.
  • Al-Rafee, S., & Cronan, T. P. (2006). Digital piracy: Factors that influence attitude towards behavior. Journal of Business Ethics, 63(3), 237–259.
  • Andres, A. R., & Goel, R. K. (2012). Does software piracy affect economic growth? Evidence across countries. Journal of Policy Modeling, 34(2), 284–295.
  • Ang, S. H., Cheng, P. S., Lim, E. A. C., & Tambyah, S. K. (2001). Spot the difference: Consumer responses towards counterfeits. Journal of Consumer Marketing, 18(3), 219–235.
  • d'Astous, A., Colbert, F., & Montpetit, D. (2005). Music piracy on the web—how effective are anti-piracy arguments? Evidence from the theory of planned behaviour. Journal of Consumer Policy, 28(3), 289–310.
  • Australian Federation Against Copyright Theft (AFACT). (2011). Economic consequences of movie piracy. Retrieved from http://www.afact.org.au/assets/research/IPSOS_Economic_Consequences_of_Movie_Piracy_-_Australia.pdf (accessed 20 November 2011).
  • Azjen, I. (1985). From intentions to actions: A theory of planned behavior. In J. Kuhl & J. Beckman (Eds.), Action-control: From cognition to behaviour (pp. 11–39). Heidelberg, Germany: Springer.
  • Azjen, I. (1991). The theory of planned behaviour. Organizational Behavior and Human Decision Processes, 50(2), 179–201.
  • Bandura, A. (1998). Health promotion from the perspective of social cognitive theory. Psychology and Health, 13(4), 623–649.
  • Banerjee, D., Cronan, T. P., & Jones, T. W. (1998). Modelling IT ethics: A study in situational ethics. MIS Quarterly, 22(1), 31–60.
  • Bhal, K. T., & Leekha, N. D. (2008). Exploring cognitive moral logics using grounded theory: The case of software piracy. Journal of Business Ethics, 81(3), 635–646.
  • Blasi, A. (1980). Bridging moral cognition and moral action: A critical review of the literature. Psychological Bulletin, 88(1), 1–45.
  • Bordoloi, B., Ilami, P., Mykytyn, P. P., & Mykytyn, K. (1996). Copyrighting computer software: The “look and feel” controversy and beyond. Information & Management, 30(5), 211–221.
  • Burruss, G. W., Bossler, A. M., & Holt, T. J. (2012). Assessing the mediation of a fuller social learning model on low self-control's influence on software piracy. Crime & Delinquency, 59(8), 1157–1184.
  • Caruana, R. (2007). Morality in consumption: Towards a multidisciplinary perspective. Journal of Marketing Management, 23(3–4), 207–225.
  • Caruana, A., Money, A. H., & Berthon, P. R. (2002). Service quality and satisfaction—the moderating role of value. Measuring Business Excellence, 6(1), 45.
  • Chaudhry, P. (2012). Curbing consumer complicity for counterfeits in a digital environment. Journal of Business & Technology Law, 7(1), 23–34.
  • Chaudhry, P., & Zimmerman, A. (2013). The use of antipiracy marketing techniques to educate the consumer. In P. Chaudhry & A. Zimmerman (Eds.), Protecting your intellectual property rights, management or professionals (pp. 85–104). New York, NY: Springer
  • Chen, M. F., Pan, C. T., & Pan, M. C. (2009). The joint moderating impact of moral intensity and moral judgment on consumer's use intention of pirated software. Journal of Business Ethics, 90(3), 361–373.
  • Cheng, H. K., Sims, R. R., & Teegen, H. (1997). To purchase or pirate software: An empirical study. Journal of Management Information Systems, 13(4), 49–60.
  • Chiu, H. C., Hsieh, Y. C., & Wang, M. C. (2008). How to encourage customers to use legal software. Journal of Business Ethics, 80(3), 583–595.
  • Coyle, J., Gould, S., & Gupta, P. (2009). To buy or pirate: The matrix of music consumers' acquisition-mode decision-making. Journal of Business Research, 62(10), 1031.
  • Cronan, T. P., & Al-Rafee, S. (2008). Factors that influence the intention to pirate software and media. Journal of Business Ethics, 78(4), 527–545.
  • Donner, C. M., Marcum, C. D., Jennings, W. G., Higgins, G. E., & Banfield, J. (2014). Low self-control and cybercrime: Exploring the utility of the general theory of crime beyond digital piracy. Computers in Human Behavior, 34(1), 165–172.
  • Donoghue, C. B. (2014). Death of the DVD market and the rise of digital piracy: Industrial shifts in the Spanish film market since the 2000s. Quarterly Review of Film and Video, 31(4), 350–363.
  • Edwards, L., Klein, B., Lee, D., Moss, G., & Philip, F. (2014). Discourse, justification and critique: Towards a legitimate digital copyright regime? International Journal of Cultural Policy, 21(1), 1–18.
  • Florence, L. (2014). Game of Throne sets piracy records as industry debates how to curb Australians' downloading habits. ABC News, September 17 2014. Retrieved from http://www.abc.net.au/news/2014-06-17/game-of-thrones-piracy-records-illegal-downloads-australia/5528770
  • Frazer, L., Merrilees, B., & Wright, O. (2007). Power and control in the franchise network: An investigation of ex-franchisees and brand piracy. Journal of Marketing Management, 23(9–10), 1037–1054.
  • Gan, L. L., & Koh, H. C. 2006. An empirical study of software piracy among tertiary institutions in Singapore. Information & Management, 43(5), 640–649.
  • Goel, R. K., & Nelson, M. A. (2009). Determinants of software piracy: Economics, institutions, and technology. Journal of Technology Transfer, 34(6), 637–658.
  • Goles, T., Jayatilaka, B., George, B., Parsons, L., Chambers, V., Taylor, D., & Brune, R. (2008). Softlifting: Exploring determinants of attitude. Journal of Business Ethics, 77(3), 481–499.
  • Gopal, R. D., Sanders, G. L., Bhattacharjee, S., Agrawal, M. K., & Wagner, S. C. (2004). A behavioral model of digital music piracy. Journal of Organizational Computing and Electronic Commerce, 14(2), 89–105.
  • Gottfredson, M. R., & Hirschi, T. (1990). A general theory of crime. Stanford, CA: Stanford University Press.
  • Gough, D. (2014). Most Australians have never pirated TV shows or movies, Choice survey finds. The Sydney Morning Herald, December 9 2014. Retrieved from http://www.smh.com.au/national/most-australians-have-never-pirated-tv-shows-or-movies-choice-survey-finds-20141208-12319x.html
  • Haines, R., & Leonard, L. N. K. (2007). Situational influences on ethical decision-making in an IT context. Information & Management, 44(3), 313–320.
  • Harris, L. C., & Daunt, K. L. (2011). Deviant customer behaviour: A study of techniques of neutralisation. Journal of Marketing Management, 27(7–8), 834–853.
  • Heffernan, M. (2014). $20 movie tickets the price of Australian wages say Village Roadshow. The Sydney Morning Herald, April 22 2014. Retrieved from http://www.smh.com.au/business/20-movie-tickets-the-price-of-australian-wages-says-village-roadshow-20140421-370ex.html
  • Henry, S. (1990). Degrees of deviance: Student accounts of their deviant behavior. Salem, WI: Sheffield.
  • Higgins, G. E., Fell, B. D., & Wilson, A. L. (2006). Digital piracy: Assessing the contributions of an integrated self-control theory and social learning theory using structural equation modeling. Criminal Justice Studies, 19(1), 3–22.
  • Higgins, G. E., Fell, B. D., & Wilson, A. L. (2007). Low self-control and social learning in understanding students' intentions to pirate movies in the United States. Social Science Computer Review, 25(3), 339–357.
  • Higgins, G. E., & Makin, D. A. (2004). Does social learning theory condition the effects of low self-control on college students' software piracy? Journal of Economic Crime Management, 2(2), 1–22.
  • Higgins, G. E., Wolfe, S., & Ricketts, M. (2009). Digital piracy: A latent class analysis. Social Science Computer Review, 27(1), 24.
  • Hinduja, S. (2007). Neutralization theory and online software piracy: An empirical analysis. Ethics and Information Technology, 9(3), 187–204.
  • Holm, P. (2014). Piracy on the simulated seas: The computer games industry's non-legal approaches to fighting illegal downloads of games. Information & Communications Technology Law, 32(1), 61–76.
  • IFPI. (2009). Australia—judge jails music pirate and warns “respect artists' livelihood.” Retrieved from http://www.ifpi.org/content/section_news/20090909.html (accessed 15 October 2011).
  • Im, J. H., & Van Epps, P. D. (1992). Software piracy and software security measures in business schools. Information & Management, 23(4), 193–203.
  • Ingram, J. R., & Hinduja, S. (2008). Neutralizing music piracy: An empirical examination. Deviant Behavior, 29(4), 334–366.
  • Introna, L. D. (2007). Singular justice and software piracy. Business Ethics: A European Review, 16(3), 264–277.
  • Jacobs, R. S., Heuvelman, A., Tan, M., & Peters O. (2012). Digital movie piracy: A perspective on downloading behavior through social cognitive theory. Computers in Human Behavior, 28(3), 958–967.
  • Karaganis, J. (2011). Media piracy in emerging economies. Retrieved from http://piracy.ssrc.org.
  • Kariithi, N. K. (2011). Is the devil in the data? A literature review of piracy around the world. The Journal of World Intellectual Property, 14(2), 133–154.
  • Klinger, M. R., & Greenwald, A. G. (1994). Preferences need no inferences? The cognitive basis of unconscious mere exposure effects. In P. M. Niedenthal, & S. Kitayama (Eds.), The heart's eye: Emotional influences in perception and attention (pp. 67–85). San Diego, CA: Academic Press.
  • Klockars, C. B. (1974). The professional fence. New York, NY: Free Press.
  • Koklic, M. K., Vida, I., Bajde, D., & Culiberg, B. (2014). The study of perceived adverse effects of digital piracy and involvement: Insights from adult computer users. Behaviour & Information Technology, 33(3), 225–236.
  • Krueger, N. Jr., & Dickson, P. R. (1994). How believing in ourselves increases risk taking: Perceived self-efficacy and opportunity recognition. Decision Science, 25(3), 385–400.
  • Kuo, F. Y., & Hsu, M. H. (2001). Development and validation of ethical computer self-efficacy measure: The case of softlifting. Journal of Business Ethics, 32(4), 299–315.
  • Lau, E. K. (2007). Interaction effects in software piracy. Business Ethics: A European Review, 16(1), 34–47.
  • Lewis, J. (2007). If you can't protect what you own, you don't own anything: Piracy, privacy, and public relations in 21st century Hollywood. Cinema Journal, 46(2), 145–150.
  • Liao, C., Lin, H. N., & Liu, Y. P. (2010). Predicting the use of pirated software: A contingency model integrating perceived risk with the theory of planned behavior. Journal of Business Ethics, 91(2), 237–252.
  • Limayem, M., Khalifa, M., & Chin, W. W. (2004). Factors motivating software piracy: A longitudinal study. IEEE Transactions on Engineering Management, 51(4), 414–425.
  • Lysonski, S., & Durvasula, S. (2008). Digital piracy of MP3s: Consumer and ethical predispositions. Journal of Consumer Marketing, 25(3), 167–178.
  • Macdonald, E. K., & Uncles, M. D. (2007). Consumer savvy: Conceptualisation and measurement. Journal of Marketing Management, 23(5–6), 497–517.
  • Mason, C. H., & Perreault, W. D. Jr. (1991). Collinearity, power, and interpretation of multiple regression analysis. Journal of Marketing Research, 28(3), 268–280.
  • Michaelidou, N., & Christodoulides, G. (2011). Antecedents of attitude and intention towards counterfeit symbolic and experiential products. Journal of Marketing Management, 27(9–10), 976–991.
  • Minor, W. W. (1981). Techniques of neutralization: A reconceptualization and empirical examination. Journal of Research in Crime and Delinquency, 18(2), 295–318.
  • Moore, R., & McMullan, E. C. (2009). Neutralizations and rationalizations of digital piracy: A qualitative analysis of university students. International Journal of Cyber Criminology, 3(1), 441–451.
  • Morris, R., & Higgins, G. (2009). Neutralizing potential and self-reported digital piracy: A multitheoretical exploration among college undergraduates. Criminal Justice Review, 34(2), 173.
  • Morton, N., & Koufteros, X. (2008). Intention to commit online music piracy and its antecedents: An empirical investigation. Structural Equation Modeling, 15(3), 491.
  • MPAA (Motion Picture Association of America). (2010). Theatrical market statistics. Retrieved from http://www.mpaa.org/Resources/93bbeb16-0e4d-4b7e-b085-3f41c459f9ac.pdf
  • Nandedkar, A., & Midha, V. (2012). It won't happen to me: An assessment of optimism bias in music piracy. Computer in Human Behavior, 28(1), 41–48.
  • Nill, A., & Shultz, C. J. (2009). Global software piracy: Trends and strategic considerations. Business Horizons, 52(3), 289–298.
  • Nunnally, J. C. (1978). Psychometric theory (2nd ed.). New York, NY: McGraw-Hill.
  • Ojeda-Zapata, J. (2004). Computer game makers lose increasing number of sales to online piracy. Knight Ridder Tribune Business News, 5(1), 1.
  • Peace, A., Galleta, D., & Thong, J. (2003). Software piracy in the workplace: A model and empirical test. Journal of Management Information Systems, 20(1), 153–177.
  • Phau, I., & Ng, J. (2010). Predictors of usage intentions of pirated software. Journal of Business Ethics, 94(1), 23–37.
  • Plowman, S., & Goode, S. (2009). Factors affecting the intention to download music: Quality perceptions and downloading intensity. The Journal of Computer Information Systems, 49(4), 84–97.
  • Ponte, L. M. (2008). Coming attractions: Opportunities and challenges in thwarting global movie piracy. American Business Law Journal, 45(2), 331–369.
  • Powell, R. (2014). Downloading movies and TV is not a crime. The Sydney Morning Herald. Retrieved from http://www.smh.com.au/digital-life/digital-life-news/downloading-movies-and-tv-is-not-a-crime-20141209-11uyie.html
  • Rahim, M. M., Seyal, A. H., & Rahman, N. A. (1999). Software piracy among computing students: A Bruneian scenario. Computer & Education, 32(3), 301–321.
  • Redondo, I., & Charron, J. P. (2013). The payment dilemma in movie and music downloads: An explanation through cognitive dissonance theory. Computers in Human Behavior, 29(5), 2037–2046.
  • Robertson, K., McNeill, L., Green, J., & Roberts, C. (2012). Illegal downloading, ethical concern, and illegal behavior. Journal of Business Ethics, 108(2), 215–227.
  • Shang, R. A., Chen, Y. C., & Chen, P. C. (2008). Ethical decisions about sharing music files in the P2P environment. Journal of Business Ethics, 80(2), 349–365.
  • Shin, S. K., Gopal, R. D., Sanders, G. L., & Whinston, A. B. (2004). Global software piracy revisited. Communication of the ACM, 47(1), 103–107.
  • Sudler, H. (2013). Effectiveness of anti-piracy technology: Finding appropriate solutions for evolving online piracy. Business Horizons, 56(2), 149–157.
  • Sykes, G., & Matza, D. (1957). Techniques of neutralization: A theory of delinquency. American Sociological Review, 22(6), 664–670.
  • Tan, B. (2002). Understanding consumer ethical decision making with respect to purchase of pirated software. The Journal of Consumer Marketing, 19(2–3), 96.
  • Taylor, L., & Connelly, C. (2012). FBI shuts down megaupload.com, Anonymous shut down FBI. Retrieved from http://www.news.com.au/technology/fbi-shuts-down-megauploadcom-charges-seven-with-online-piracy/story-e6frfro0-1226249114650
  • Taylor, S. A. (2012). Evaluating digital piracy intentions on behaviors. Journal of Services Marketing, 26(7), 472–483.
  • Teo, T.S.H. (2001). Demographic and motivation variables associated with Internet usage activities. Internet Research 11(2), 125–137.
  • Triandis, C. H. (1980). Values, attitudes and interpersonal behavior. In H. Howe & M. Page (Eds.), Proc. Nebraska symposium on motivation: Vol. 27: Beliefs, attitudes and values (pp. 195–259). Lincoln, NE: University of Nebraska Press.
  • Tunca, T. I., & Wu, Q. (2013). Fighting fire with fire: Commercial piracy and the role of file sharing on copyright protection policy for digital goods. Information Systems Research, 24(2), 436–453.
  • Turner, A. (2015). ISPs to dob in movie pirates under proposed three-strikes rule. The Sydney Morning Herald, February 21 2014. Retrieved from http://www.smh.com.au/digital-life/computers/gadgets-on-the-go/isps-to-dob-in-movie-pirates-under-proposed-threestrikes-rule-20150220-13kc2c.html
  • Walls, W. (2008). Cross-country analysis of movie piracy. Applied Economics, 40(5), 625.
  • Wang, C. C., Chen, C. T., Yang, S. C., & Farn, C. K. (2009). Pirate or buy? The moderating effect of idolatry. Journal of Business Ethics, 90(1), 81–93.
  • Wells, V. K., Ponting, C. A., & Peattie, K. (2011). Behaviour and climate change: Consumer perceptions of responsibility. Journal of Marketing Management, 27(7–8), 808–833.
  • Wolfe, S., & Higgins, G. (2009). Explaining deviant peer associations: An examination of low self-control, ethical predispositions, definitions, and digital piracy. Western Criminology Review, 10(1), 43–55.
  • Yang, D., Fryxell, G. E., & Sie, A. K. Y. (2008). Anti-piracy effectiveness and managerial confidence: Insights from multinationals in China. Journal of World Business, 43(3), 321–339.
  • Yar, M. (2008). The rhetorics and myths of anti-piracy campaigns: Criminalization, moral pedagogy and capitalist property relations in the classroom. New Media & Society, 10(4), 605–623.
  • Yoon, C. (2011). Theory of planned behavior and ethics theory in digital piracy: An integrated model. Journal of Business Ethics, 100(3), 405–417.
  • Yu, S. (2012). College students' justification for digital piracy: A mixed methods study. Journal of Mixed Methods Research, 6(4), 364–378.
  • Zajonc, R. B., & Rajecki, D. W. (1969). Exposure and affect: A field experiment. Psychonomic Science, 17(4), 216–217.
  • Zhang, L., Smith, W., & McDowell, W. C. (2009). Examining digital piracy: Self-control, punishment, and self-efficacy. Information Resources Management Journal, 22(1), 24–44.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.