362
Views
0
CrossRef citations to date
0
Altmetric
Articles

A Study on the Risk of Prosecution and Perceived Proximity on State University Undergraduates' Behavioural Intention for e-Book Piracy

References

  • Adegbola, G. (2008). Publishers intercept N30m pirated books in Lagos. Nigerian News. Retrieved from http//www.nigeriandailynews.com.
  • Ahmad, I. H., & Mohamed, N. (2016). Social and technical perspective of individual's intention to purchase mobile application. In Geospatial research: Concepts, methodologies, tools, and applications (pp. 1484–1511). Hershey, PA: IGI Global.
  • Akinwumi, K. (2003). Publishing, book piracy and copyrights‖. Nigerian Tribune 2 March, 7.
  • Al-Darwbi, M., & Al-Awami, L. (2019). November). A mechanism for copyright protection under information-centric networking. In 2019 2nd IEEE Middle East and North Africa COMMunications Conference (MENACOMM) (pp. 1–6). IEEE. doi:10.1109/MENACOMM46666.2019.8988556
  • Al-Rafee, S., & Cronan, T. P. (2006). Digital Piracy: Factors that Influence Attitude Toward Behavior. Journal of Business Ethics, 63(3), 237–259. doi:10.1007/s10551-005-1902-9
  • Anctil, E. (2002). Copyright and book piracy: The bookwarez phenomenon and beyond. Available from http://sis-webspace.mcgill.ca/marginal/mar9-2/bookwarez.htm.
  • Anele, K. K. (2021). The potential impact of piracy on the ACFTA: A Nigerian perspective. The Journal of Territorial and Maritime Studies, 8, 5.
  • Ang, S. H., Cheng, P. S., Lim, E. A. C., & Tambyah, S. K. (2001). Spot the difference: Consumer responses towards counterfeits. Journal of Consumer Marketing, 18(3), 219–235. doi:10.1108/07363760110392967
  • Ariyaratna, B. A. R. R., & Wijesinghe Arachchilage, S. S. W. (2018). Protecting copyrights and related rights in the digital dilemma: Some challenges. Journal of Business Management and Economic Research, 2(2), 44–55. doi:10.29226/TR1001.2018.20
  • Armitage, C. J., & Conner, M. (2001). Efficacy of the theory of planned behaviour: A meta-analytic review. The British Journal of Social Psychology, 40(Pt 4), 471–499. doi:10.1348/014466601164939
  • Arum, B. U. (2021). Hacking and cyber security in Nigeria telecommunication industry: Implication for teaching and learning. SIST Journal of Religion and Humanities, 1(1), 121–136.
  • Auer, N. J., & Krupar, E. M. (2001). Mouse click plagiarism: The role of technology in plagiarism and the librarian's role in combating it. Library Trends, 49(3), 15–32.
  • Bagozzi, R. P. (1982). A field investigation of causal relations among cognitions, affect, intentions, and behavior. Journal of Marketing Research, 19(4), 562–584. doi:10.1177/002224378201900415
  • Balázs, B. (2011). Coda: A short history of book piracy. Media piracy in emerging economies, 399.
  • Bashir, S., & Khan, G. (2016). Book piracy and legal lacunae in Khyber Pakhtunkhwa: Some legal professionals’ viewpoint. Journal of Law & Society, 48(68), 105–114.
  • Bauer, R. A. (1960). Consumer behavior as risk taking. In R. S. Hancock (Ed.), Dynamic marketing for a changing world. Proceedings of the 43rd National Conference of the American Marketing Association (pp. 389–398).
  • Berne Convention. (1971). Berne Convention for the Protection of Literary and Artistic Works treaty. http://www.wipo.int/export/sites/www/treaties/en/ip/berne/pdf/trtdocs_wo001.pdf
  • Betz, M., O'Connell, L., & Shepard, J. M. (1989). Gender Differences in Proclivity for Unethical Behavior. Journal of Business Ethics, 8(5), 321–324. doi:10.1007/BF00381722
  • Blackwell, B. S. (2000). Perceived sanction threats, gender, and crime: A test and elaboration of power-control theory. Criminology, 38(2), 439–488. doi:10.1111/j.1745-9125.2000.tb00896.x
  • Bodo, B., Antal, D., & Puha, Z. (2020). Can scholarly pirate libraries bridge the knowledge access gap? An empirical study on the structural conditions of book piracy in global and European academia. PLoS One, 15(12), e0242509. doi:10.1371/journal.pone.0242509
  • Breeding, M. (2016). Issues and technologies related to privacy and security. Library Technology Reports, 52(4), 5.
  • Burgess, R. L., & Akers, R. L. (1966). A differential association-reinforcement theory of criminal behavior. Social Problems, 14(2), 128–147. doi:10.2307/798612
  • Camarero, C., Antón, C., & Rodríguez, J. (2014). Technological and ethical antecedents of e-book piracy and price acceptance. The Electronic Library, 32(4), 542–566. doi:10.1108/EL-11-2012-0149
  • Campbell, M. C., & Goodstein, R. C. (2001). The moderating effect of perceived risk on consumers' evaluations of product incongruity: Preference for the norm. Journal of Consumer Research, 28(3), 439–449. doi:10.1086/323731
  • Carmichael, S., Langton, L., Pendel, G., Reitzel, J. D., & Piquero, A. R. (2005). Do the experiential and deterrent effect operate differently across gender? Journal of Criminal Justice, 33(3), 267–276. doi:10.1016/j.jcrimjus.2005.02.006
  • Chakraborty, G. A., Allred Sukhdial, A. A., & Bristol, T. (2007). Use of negative cues to reduce demand for counterfeit products. Advances in Consumer Research, 24(1), 345–349.
  • Chan, R. Y. K., Ma, K. H. Y., & Wong, Y. H. (2013). The software piracy decision-making process of Chinese computer users. The Information Society, 29(4), 203–218. doi:10.1080/01972243.2013.792302
  • Chaudhry, P. E., & Zimmerman, A. (2012). Protecting your intellectual property rights: Understanding the role of management, governments, consumers and pirates. New York: Springer Science & Business Media.
  • Chen, M. F., Pan, C. T., & Pan, M. C. (2009). The joint moderating impact of moral intensity and moral judgment on consumer’s use intention of pirated software. Journal of Business Ethics, 90(3), 361–373. doi:10.1007/s10551-009-0046-8
  • Chiou, J. S., Huang, C. Y., & Lee, H. H. (2005). The antecedents of music piracy attitudes and intentions. Journal of Business Ethics, 57(2), 161–174. doi:10.1007/s10551-004-5263-6
  • Christensen, A. L., & Eining, M. M. (1991). Factors influencing software piracy: Implications for accountants. Journal of Information Systems, 5(1), 67–80.
  • Conchar, M. P., Zinkhan, G. M., & Olavariette, S. (2004). An integrated framework for the conceptualisation of consumers' perceived-risk processing. Journal of the Academy of Marketing Science, 32(4), 418–436. doi:10.1177/0092070304267551
  • Cordell, V. V., Wongtada, N., & Kieschnick, R. L. (1996). Counterfeit purchase intentions: Role of lawfulness attitudes and product traits as determinants. Journal of Business Research, 35(1), 41–53. doi:10.1016/0148-2963(95)00009-7
  • De Corte, C. E., & Van Kenhove, P. (2017). One sail fits all? A psychographic segmentation of digital pirates. Journal of Business Ethics, 143(3), 441–465. doi:10.1007/s10551-015-2789-8
  • Dimock, R. E., & Punniyamoorthy, S. (2006). Digital technology: Its impact on copyright law and practice in North America. Journal of Intellectual Property Law & Practice, 1(13), 839–849. doi:10.1093/jiplp/jpl174
  • Edwards, T., & Bossler, A. (2018). Criminology’s contribution to the study of digital piracy. In Digital piracy (pp. 229–249). London: Routledge.
  • Enang, U., & Umoh, M. O. (2013). Effect of piracy on publishing and spread of knowledge in Nigeria. World Journal of Library Administration, 1(1), 06–14.
  • Fitriasih, R., Hati, S. R. H., & Achyar, A. (2019, January). Piracy behavior among university students. In 33rd International Business Information Management Association Conference: Education Excellence and Innovation Management through Vision 2020, IBIMA 2019 (pp. 6930–6941). International Business Information Management Association, IBIMA.
  • Foong, C. (2018). The making available right: Problems with “the public”. In J. Gilchrist &, B. Fitzgerald. (Eds.), Copyright, Property and the Social Contract, 265–285. Cham: Springer.
  • Grasmick, H. G., & Bursik, R. J. Jr, (1990). Conscience, significant others, and rational choice: Extending the deterrence model. Law & Society Review, 24(3), 837–861. doi:10.2307/3053861
  • Hampton-Sosa, W. (2017). The impact of creativity and community facilitation on music streaming adoption and digital piracy. Computers in Human Behavior, 69, 444–453. doi:10.1016/j.chb.2016.11.055
  • Heitzman, S., & Klasa, S. (2021). Informed trading reactions to new private information: Evidence from nonpublic merger negotiations. Management Science, 67(4), 2630–2656. doi:10.1287/mnsc.2020.3629
  • Higgins, G. E., & Makin, D. A. (2004a). Does social learning theory condition the effects of low self-control on college students’ software piracy? Journal of Economic Crime Management, 2, 1–22.
  • Higgins, G. E., & Makin, D. A. (2004b). Self-control, deviant peers, and software piracy. Psychological Reports, 95(3 Pt 1), 921–931. doi:10.2466/PR0.95.7.921-931
  • Higgins, G. E., Wilson, A. L., & Fell, B. D. (2005). An application of deterrence theory to software piracy. Journal of Criminal Justice and Popular Culture, 12(3), 166–184.
  • Hollinger, R. C., & Lanza-Kaduce, L. (1988). The process of criminalisation: The case of computer crime laws. Criminology, 26(1), 101–126. doi:10.1111/j.1745-9125.1988.tb00834.x
  • Holt, T. J., Brewer, R., & Goldsmith, A. (2019). Digital drift and the “sense of injustice”: Counter-productive policing of youth cybercrime. Deviant Behavior, 40(9), 1144–1156. doi:10.1080/01639625.2018.1472927
  • Igbaria, M. (1993). User acceptance of microcomputer technology: An empirical test. Omega, 21(1), 73–90. doi:10.1016/0305-0483(93)90040-R
  • James, J. (2020). The Impact of Smart Feature Phones on Development: Internet, Literacy and Digital Skills. Cham: Springer Nature.
  • Jannah, I., & Kholid, M. N. (2020). Ethics theory and theory of reasoned action in e-book piracy: An empirical study of accounting students. International Journal of Research in Business and Social Science (2147- 4478), 9(3), 114–122. doi:10.20525/ijrbs.v9i3.675
  • Jones, T. M. (1991). Ethical decision making by individuals in organisations: An issue-contingent model. Academy of Management Review, 16(2), 366–395. doi:10.5465/amr.1991.4278958
  • Khan, G., & Bashir, S. (2019). The Dilemma of Book Piracy in Pakistan. Journal of Law and Society, 50, 31–74.
  • Khan, M. D., Habib, R. I., Mehmood, A., & Basit, A. (2019). Intellectual Property Rights and Creative Economy; Way Forward for Pakistan. Review of Economics and Development Studies, 5(3), 469–478. doi:10.26710/reads.v5i3.697
  • Kilis, S., & Uzun, A. M. (2018). Teaching information and communication technology ethics with case-based instruction: Effectiveness and preservice teachers ‘perspectives. MOJES: Malaysian Online Journal of Educational Sciences, 6(4), 32–47.
  • Kwong, K. K., Yau, O. H. M., Lee, J. S. Y., Sin, L. Y. M., & Tse, A. C. B. (2003). The effects of attitudinal and demographic factors on intention to buy Pirated CDs: The case of Chinese consumers. Journal of Business Ethics, 47(3), 223–235. doi:10.1023/A:1026269003472
  • Laroche, M., Kim, C., & Zhou, L. (1996). Brand familiarity and confidence as determinants of purchase intention: An empirical test in a multiple brand context. Journal of Business Research, 37(2), 115–120. doi:10.1016/0148-2963(96)00056-2
  • Lea, R. (2016, October 20). Most UK authors’ annual incomes still well below minimum wage, survey shows. The Guardian, 19. Retrieved from https://www.theguardian.com/books/2016/oct/19/uk-authors-annual-incomes-below-minimum-wage-survey-average-earnings
  • Lee, B., Fenoff, R., & Paek, S. Y. (2019a). Correlates of participation in e-book piracy on campus. The Journal of Academic Librarianship, 45(3), 299–304. doi:10.1016/j.acalib.2019.04.002
  • Lee, B., Jeong, S., & Paek, S. Y. (2019b). Determinants of digital piracy using deterrence, social learning and neutralization perspectives. International Journal of Comparative and Applied Criminal Justice, 43(4), 295–308. doi:10.1080/01924036.2019.1625793
  • Lee, J., & Lee, Y. (2002). A holistic model of computer abuses within organisations. Information Management & Computer Security, 10(2), 57–63. doi:10.1108/09685220210424104
  • Lee, D. G., Lee, I. Y., Ahn, J. K., & Kong, Y. H. (2002, October). The illegal copy protection using hidden agent. In Eurasian Conference on Information and Communication Technology (pp. 832–841). Berlin, Heidelberg: Springer.
  • Li, C., Zhou, M. Y., Liu, X. Y., & Wang, T. X. (2019, July). Usability study of electronic sphygmomanometers based on perceived ease of use and affordance. In International Conference on Human-Computer Interaction (pp. 421–430). Springer, Cham.
  • Liang, Z., & Yan, Z. (2005). Software piracy among college students: A comprehensive review of contributing factors, underlying processes, and tackling strategies. Journal of Educational Computing Research, 33(2), 115–140. doi:10.2190/8M5U-HPQK-F2N5-B574
  • Liebenberg, J., & Benadé, T. (2020). October). Computing students' views on ethics. In Proceedings of the 9th Computer Science Education Research Conference (pp. 1–7).
  • Lipton, J. (2020). Mass digitization in the ebook market: Copyright protections and exceptions. In Research handbook on intellectual property and digital technologies. Massachusetts: Edward Elgar Publishing.
  • Liu, H. (2018). In the shadow of criminalisation: Intellectual property criminal law, enforcement institutions and practices in China and the United States. Information & Communications Technology Law, 27(2), 185–220. doi:10.1080/13600834.2018.1458451
  • Mason, R. (1986). Four ethical issues of the information age. MIS Quarterly, 5(12). doi:10.2307/248873
  • Marron, D. B., & Steel, D. G. (2000). Which countries protect intellectual property? The case of product piracy. Economic Inquiry, 38(2), 159–174. doi:10.1111/j.1465-7295.2000.tb00011.x
  • Morris, S. A., & McDonald, R. A. (1995). The role of moral intensity in moral judgments: An empirical investigation. Journal of Business Ethics, 14(9), 715–726. doi:10.1007/BF00872325
  • Morton, N. A., & Koufteros, X. (2008). Intention to commit online music piracy and its antecedents: An empirical investigation. Structural Equation Modeling: A Multidisciplinary Journal, 15(3), 491–512. doi:10.1080/10705510802154331
  • Moses, L. B., & Chan, J. (2018). Using big data and data analytics in criminological research. In V. Jupp, P. Davies, & P. Francis (Eds.), Doing Criminological Research (pp. 251–270). London: SAGE.
  • Nagin, D. S., & Pogarsky, G. (2003). An experimental investigation of deterrence: Cheating, self‐serving bias, and impulsivity. Criminology, 41(1), 167–194. doi:10.1111/j.1745-9125.2003.tb00985.x
  • Nagin, D. S., & Pogarsky, G. (2004). Time and punishment: Delayed consequences and criminal behavior. Journal of Quantitative Criminology, 20(4), 295–317. doi:10.1007/s10940-004-5866-1
  • Nguyen, O. T. (2020). Factors affecting the intention to use digital banking in Vietnam. The Journal of Asian Finance, Economics and Business, 7(3), 303–310. doi:10.13106/jafeb.2020.vol7.no3.303
  • Nkiko, C. (2014). Perspectives on book piracy in Nigeria: issues and strategies. The Journal of Academic Librarianship, 40(3-4), 394–398. doi:10.1016/j.acalib.2013.09.005
  • Nugrahini, D. E., & Alfian, A. H. (2021, July). The impact of Covid-19 pandemic on continuance adoption of mobile payments: A conceptual framework. In Conference on Complex, Intelligent, and Software Intensive Systems (pp. 338–346). Springer, Cham.
  • Osborn, D., Cutter, A. & Ullah, F. (2015). Universal Sustainable Development Goals: Understanding the Transformational Challenge for Developed Countries. Stakeholders forum. Retrieved from www.stakeholderforum.org.
  • Peace, A. G., Galletta, D. F., & Thong, J. Y. (2003). Software piracy in the workplace: A model and empirical test. Journal of Management Information Systems, 20(1), 153–177.
  • Pereira, R., & Franco, M. (2020). Library as a consortium perspective: A systematic literature review. Journal of Librarianship and Information Science, 52(4), 1126–1136. doi:10.1177/0961000620904754
  • Piquero, A., & Tibbetts, S. (1996). Specifying the direct and indirect effects of low selfcontrol and situational factors in offenders’ decision making: Toward a more complete model of rational offending. Justice Quarterly, 13(3), 481–510. doi:10.1080/07418829600093061
  • Prendergast, G., Chuen, L. H., & Phau, I. (2002). Understanding consumer demand for non-deceptive pirated brands. Marketing Intelligence & Planning, 20(7), 405–416. doi:10.1108/02634500210450846
  • Quackenbush, S. L. (2017). Empirical Analyses of Deterrence. In Oxford Research Encyclopedia of Politics 1 (pp. 682–701). New York: Oxford University Press. doi:10.1093/acrefore/9780190228637.013.313
  • Ramirez-Thompson, E. R. (2020). Theft of intellectual property neutralization techniques within an era of computerization (Doctoral dissertation). University of Illinois at Chicago.
  • Rest, J. R. (1979). Developing in judging moral issues. Minnesota: University of Minnesota Press Minneapolis MN.
  • Rogers, M. K. (2001). A social learning theory and moral disengagement analysis of criminal computer behavior: An exploratory study (Unpublished doctoral dissertation University of Manitoba Winnipeg).
  • Rutto, D., & Yudah, O. (2018). E-books in university libraries in Kenya: Trends, usage, and intellectual property issues. In Handbook of Research on Managing Intellectual Property in Digital Libraries (pp. 120–141). Hershey, PA: IGI Global.
  • Safner, R. (2015). Pirate thy neighbor: The protectionist roots of international copyright available at SSRN 2564232. Reterived from https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2564232.
  • Sambo, A. S., & Ojei, L. N. (2018). Undergraduate Student's Perspective of Copyright Infringement: A Study of Federal University of Petroleum Resources Library, Warri, Nigeria. Pearl: A Journal of Library and Information Science, 12(4), 410–419.
  • Shah, A. K. (2005). The world trips over Berne. Intellectual property LW 556 USTR (2018). Special 301 Report. Retrieved from https://ustr.gov/sites/default/files/files/Press/Reports/2018%20Special%20301.pdf.
  • Shah, O. (2009). Pirate boarding parties leap on publishers: Illegal downloads have hit music and film; books are the next target writes Oliver Shah. Weblog available at: www.lexisnexis.com. (accessed 24 March 2020).
  • Skinner, W. F., & Fream, A. M. (1997). A social learning theory analysis of computer crime among college students. Journal of Research in Crime and Delinquency, 34(4), 495–518. doi:10.1177/0022427897034004005
  • Spajić, D. J. (2021). Piracy is back: piracy statistics for 2021. DataPort. Retrieved from https://dataprot.net/statistics/piracy-statistics/#:∼:text=Entertainment%20piracy%20statistics%20show%20that,the%2030%2D44%20age%20bracket.
  • Steine, A. (2018). The increased problem of textbook piracy in educational publishing. Retrieved from https://medium.com/@17072902/educational-publishing-and-textbook-piracy-b3d2de3725e3.
  • Straub, D. W., Jr,., & Nance, W. D. (1990, March). Discovering and disciplining computer abuse in organisations: A field study. MIS Quarterly, 14(1), 45–60. doi:10.2307/249307
  • Strauss, V. (2014). 17/09/14, More students are illegally downloading college textbooks for free, Washington Post, Retrieved from at: https://www.washingtonpost.com/news/answer-sheet/wp/2014/09/17/more-students-are-illegally-downloading-college-textbooks-for-free/?utm_term=.768839c07972.
  • Sutopo, B. (2011). Illegal digital media usage: Based on moral judgment and legal awareness. KINERJA, 15(1), 1–14.
  • Tam, K. Y., Feng, K. Y., & Kwan, S. (2019). The role of morality in digital piracy: Understanding the deterrent and motivational effects of moral reasoning in different piracy contexts. Journal of the Association for Information Systems, 20(5), 3.
  • Tan, B. (2002). Understanding consumer ethical decision making with respect to purchase of pirated software. Journal of Consumer Marketing, 19(2), 96–111. doi:10.1108/07363760210420531
  • Tang, K. L., Ooi, C. K., & Chong, J. B. (2020). Perceived Risk Factors Affect Intention to Use FinTech. Journal of Accounting and Finance in Emerging Economies, 6(2), 453–463. doi:10.26710/jafee.v6i2.1101
  • Taplin, R. (2020). Cyber Risk, Intellectual Property Theft and Cyberwarfare: Asia, Europe and the USA. London: Routledge.
  • The Buzz (2008). Introduction. School Library Journal, 54(2), 22–23.
  • Thongmak, M. (2017). Ethics, neutralization, and digital piracy. International Journal of Electronic Commerce Studies, 8(1), 1–24. doi:10.7903/ijecs.1436
  • Thornton, A. J. (2012). Investigating sex differences in, and predictors of, violent and nonviolent offending behaviour (Doctoral dissertation). University of Central Lancashire.
  • Tibbetts, S. G., & Herz, D. C. (1996). Gender differences in factors of social control and rational choice. Deviant Behavior, 17(2), 183–208. doi:10.1080/01639625.1996.9968022
  • Tom, G., Garibaldi, B., Zeng, Y., & Pilcher, J. (1998). Consumer demand for counterfeit goods. Psychology and Marketing, 15(5), 405–421. doi:10.1002/(SICI)1520-6793(199808)15:5<405::AID-MAR1>3.0.CO;2-B
  • Veloutsou, C., & Bian, X. (2008). A cross-national examination of consumer perceived risk in the context of non-deceptive counterfeit brands. Journal of Consumer Behaviour, 7(1), 3–20. doi:10.1002/cb.231
  • Wang, Q., & Sun, X. (2019). Exploring Chinese design business owners’attitudes towards intellectual property rights. International Journal of Innovation Management, 23(06), 1950059. doi:10.1142/S1363919619500592
  • Wee, C. ‐H., Ta, S. ‐J., & Cheok, K. ‐H. (1995). Non‐price determinants of intention to purchase counterfeit goods: An exploratory study. International Marketing Review, 12(6), 19–46. doi:10.1108/02651339510102949
  • Wenqi, F., & Lingnan, Y. (2016). Study on the effect of academic e-book publishers on resources construction and service of high-level university library. Library and Information Service, 2016(19), 12.
  • Winston, M. D. (2007). Ethical leadership and ethical decision making: A meta-analysis of research related to ethics education. Library & Information Science Research, 29(2), 230–251. doi:10.1016/j.lisr.2007.04.002
  • Wischenbart, R., Carrenho, C., Celaya, J. K. M., & Mallya, V. (2015). The global ebook report 2015. Rüdiger Wischenbart Content and Consulting.
  • Yeboah, A., Owusu-Prempeh, V., & Adjei, S. (2018). Perceived risk influence on brand made in Ghana consumer decision making towards non-perishable products category. International Journal of Business and Management, 13(5), 137. doi:10.5539/ijbm.v13n5p137
  • Zhang, Y., & Yang, Q. (2019). Assessing hotel decision-making of disabled guests: Satisfaction correlation study between online comments’ credibility and perceived risk. Electronic Commerce Research. Advance online publication. doi:10.1007/s10660-019-09343-w

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.