Abstract
As software piracy continues to be a threat to the growth of national and global economies, understanding why people continue to use pirated software and learning how to discourage the use of pirated software are urgent and important issues. In addition to applying the theory of planned behavior (TPB) perspective to capture behavioral intention to use pirated software, this paper considers perceived risk as a salient belief influencing attitude and intention toward using pirated software. Four perceived risk components related to the use of pirated software (performance, social, prosecution and psychological risks) have been identified, measured and tested. Data were collected through an online survey of 305 participants. The results indicate that perceived prosecution risk has an impact on intention to use pirated software, and perceived psychological risk is a strong predictor of attitude toward using pirated software. In addition, attitude and perceived behavior control contribute significantly to the intended use of pirated software. However, the proposed direct relationship between subjective norm and intention to use pirated software is not supported. Implications for research and practice are discussed.
Article PDF
Avoid common mistakes on your manuscript.
References
Ajzen, I. 1985 ‹From Intentions to Actions: A theory of Planned Behavior’. in: J. Kuhl and J. Beckman (eds.). Action Control: From Cognition to Behavior. Springer, Heidelberg, pp. 11-39.
Ajzen, I. (1991). The Theory of Planned Behavior. Organizational Behavior and Human Decision Processes, 50(2), 179–211. doi:10.1016/0749-5978(91)90020-T.
Ajzen, I. (2002). Perceived Behavioral Control, Self-Efficacy, Locus of Control, and the Theory of Planned Behavior. Journal of Applied Social Psychology, 32(4), 665–683. doi:10.1111/j.1559-1816.2002.tb00236.x.
Akaah, I.P., & Lund, D. (1994). ‹The Influence of Personal and Organizational Values on Marketing Professions’ Ethical Behavior’. Journal of Business Ethics, 13(6), 417–430. doi:10.1007/BF00881450.
Al-Rafee, S., & Cronan, T.P. (2006). Digital Piracy: Factors that Influence Attitude Toward Behavior. Journal of Business Ethics, 63(3), 237–259. doi:10.1007/s10551-005-1902-9.
Anderson, J.C., & Gerbing, D.W. (1988). Structural Equation Modeling in Practice: A Review and Recommended Two-step Approach. Psychological Bulletin, 103(3), 411–423. doi:10.1037/0033-2909.103.3.411.
Bauer, R.A.: 1960, ‹Consumer Behavior as Risk Taking’, in R. S. Hancock (ed.), Dynamic Marketing for a Changing World. Proceedings of the 43rd National Conference of the American Marketing Association, pp. 389–398
Business Software Alliance (BSA): 2008, ‹Study Finds Software Piracy Falling in Many Countries, But Challenge Shifting to Emerging, High-Growth Markets’, Retrieved May 14, 2008, from: http://www.bsa.org/country/News%20and%20Events/News%20Archives/en-05142008-globalstudy.aspx
Campbell, M.C., & Goodstein, R.C. (2001). ‹The Moderating Effect of Perceived Risk on Consumers’ Evaluations of Product Incongruity: Preference for the Norm’. The Journal of Consumer Research, 28(3), 439–449. doi:10.1086/323731.
Chang, M.K. (1998). Predicting Unethical Behavior: A Comparison of the Theory of Reasoned Action and the Theory of Planned Behavior. Journal of Business Ethics, 17(16), 1825–1834. doi:10.1023/A:1005721401993.
Chiou, J.-S., Huang, C.-Y., & Lee, H.-H. (2005). The Antecedents of Music Piracy Attitudes and Intentions. Journal of Business Ethics, 57(2), 161–174. doi:10.1007/s10551-004-5263-6.
Chiu, H.-C., Lin, Y.-M., Lee, M., Nieh, M.-E., & Chen, H.-C. (2008). How to Discourage Online Music Piracy. International Journal of Management and Enterprise Development, 5(6), 723–738. doi:10.1504/IJMED.2008.021192.
Conchar, M.P., Zinkhan, G.M., Peters, C., & Olavarrieta, S. (2004). ‹An Integrated Framework for the Conceptualization of Consumers’ Perceived-Risk Processing’. Journal of the Academy of Marketing Science, 32(4), 418–436. doi:10.1177/0092070304267551.
Cronan, T.P., & Al-Rafee, S. (2008). Factors that Influence the Intention to Pirate Software and Media. Journal of Business Ethics, 78(4), 527–545. doi:10.1007/s10551-007-9366-8.
Cunningham, S.M. 1967 ‹The Major Dimensions of Perceived Risk’. in: D. F. Cox (ed.). Risk Taking and Information Handling in Consumer Behavior. Harvard University Press, Boston, pp. 82-108.
Davis, F.D., Bagozzi, R.P., & Warshaw, P.R. (1989). User Acceptance of Computer Technology: A Comparison of Two Theoretical Models. Management Science, 35(8), 982–1003. doi:10.1287/mnsc.35.8.982.
Dowling, G.R., & Staelin, R. (1994). A Model of Perceived Risk and Intended Risk-Handling Activity. The Journal of Consumer Research, 21(1), 119–134. doi:10.1086/209386.
Eagly, A.H., Chaiken, S. 1993. The Psychology of Attitudes. Harcourt Brace Jovanovich: Fort Worth TX.
Featherman, M.S., & Pavlou, P.A. (2003). Predicting e-Services Adoption: A Perceived Risk Facets Perspective. International Journal of Human-Computer Studies, 59(4), 451–474. doi:10.1016/S1071-5819(03)00111-3.
Featherman, M.S., Valacich, J.S., & Wells, J.D. (2006). Is that Authentic or Artificial? Understanding Consumer Perceptions of Risk in e-Service Encounters. Information Systems Journal, 16(2), 107–134. doi:10.1111/j.1365-2575.2006.00211.x.
Festinger, L. 1957, A Theory of Cognitive Dissonance (Stanford University Press, Stanford).
Fishbein, M., & Ajzen, I.1975, Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research (Addison-Wesley, Reading, MA).
Fraedrich, J.P., & Ferrell, O.C. (1992). The Impact of Perceived Risk and Moral Philosophy Type on Ethical Decision Making in Business Organizations. Journal of Business Research, 24(4), 283–295. doi:10.1016/0148-2963(92)90035-A.
Gefen, D., Straub, D.W., & Boudreau, M. (2000). Structural Equation Modeling and Regression: Guidelines for Research Practice. Communications of the Association for Information Systems, 4(7), 1–70.
Gopal, R.D., & Sanders, G.L. (1998). International Software Piracy: Analysis of Key Issues and Impacts. Information Systems Research, 9(4), 380–397. doi:10.1287/isre.9.4.380.
Gopal, R.D., & Sanders, G.L. (2000). ‹Software Piracy: You Can’t Get Blood out of a Turnip’. Communications of the ACM, 43(9), 83–89. doi:10.1145/348941.349002.
Hair, J.F., Anderson, R.E., Tatham, R.L., Black, W.C. 1998 Multivariate Data Analysis. Prentice Hall: Upper Saddle River New Jersey.
Havlena, W.J., & DeSarbo, W.S. (1991). On the Measurement of Perceived Consumer Risk. Decision Sciences, 22(4), 927–939. doi:10.1111/j.1540-5915.1991.tb00372.x.
Husted, B.W. (2000). The Impact of National Culture on Software Piracy. Journal of Business Ethics, 26(3), 197–211. doi:10.1023/A:1006250203828.
Jacoby, J. and L. B. Kaplan: 1972, The Components of Perceived Risk. Proceedings of the 3rd Annual Conference, Association for Consumer Research, pp. 382–393
Kwong, T. C. H. and M. K. O. Lee: 2002, Behavioral Intention Model for the Exchange Mode Internet Music Piracy. Proceedings of the 35th Hawaii International Conference on System Sciences
Laroche, M., Yang, Z., McDougall, G.H.G., & Bergeron, J. (2005). Internet Versus Bricks-and-Mortar Retailers: An Investigation into Intangibility and its Consequences. Journal of Retailing, 81(4), 251–267. doi:10.1016/j.jretai.2004.11.002.
Lim, N. (2003). ‹Consumers’ Perceived Risk: Sources Versus Consequences’. Electronic Commerce Research and Applications, 2(3), 216–228. doi:10.1016/S1567-4223(03)00025-5.
Lim, H., & Dubinsky, A.J. (2005). The Theory of Planned Behavior in E-Commerce: Making a Case for Interdependencies between Salient Beliefs. Psychology and Marketing, 22(10), 833–855. doi:10.1002/mar.20086.
Lin, T.-C., M. H. Hsu, F.-Y. Kuo and P.-C. Sun: 1999, An Intention Model-Based Study of Software Piracy. Proceedings of the 32nd Hawaii International Conference on System Sciences
Lin, W.-B. (2008). ‹Investigation on the Model of Consumers’ Perceived Risk—Integrated Viewpoint’. Expert Systems with Applications, 34(2), 977–988. doi:10.1016/j.eswa.2006.10.042.
Miniard, P.W., & Cohen, J.B. (1981). ‹An Examination of the Fishbein-Ajzen Behavioral Intentions Model’s Concepts and Measures’. Journal of Experimental Social Psychology, 17, 309–339. doi:10.1016/0022-1031(81)90031-7.
Mitchell, V.-W. (1992). ‹Understanding Consumers’ Behaviour: Can Perceived Risk Theory Help?’. Management Decision, 30(3), 26–31. doi:10.1108/00251749210013050.
Mitchell, V.-W. (1999). Consumer Perceived Risk: Conceptualisations and Models. European Journal of Marketing, 33(1/2), 163–195. doi:10.1108/03090569910249229.
Mitchell, V.-W. (2001). Re-conceptualizing Consumer Store Image Processing Using Perceived Risk. Journal of Business Research, 54(2), 167–172. doi:10.1016/S0148-2963(99)00086-7.
Pavlou, P.A. (2003). Consumer Acceptance of Electronic Commerce: Integrating Trust and Risk with the Technology Acceptance Model. International Journal of Electronic Commerce, 7(3), 101–134.
Peace, A.G., Galletta, D.F., & Thong, J.Y.L. (2003). Software Piracy in the Workplace: A Model and Empirical Test. Journal of Management Information Systems, 20(1), 153–177.
Roselius, T. (1971). Consumer Rankings of Risk Reduction Methods. Journal of Marketing, 35(1), 56–61. doi:10.2307/1250565.
Sheppard, B.H., Hartwick, J., & Warshaw, P.R. (1988). The Theory of Reasoned Action: A Meta-Analysis of Past Research with Recommendations for Modifications and Future Research. The Journal of Consumer Research, 15(3), 325–343. doi:10.1086/209170.
Sinha, R.K., & Mandel, N. (2008). Preventing Digital Music Piracy: The Carrot or the Stick? Journal of Marketing, 72(1), 1–15. doi:10.1509/jmkg.72.1.1.
Sitkin, S.B., & Weingart, L.R. (1995). Determinants of Risky Decision-Making Behavior: A Test of the Mediating Role of Risk Perceptions and Propensity. Academy of Management Journal, 38(6), 1573–1592. doi:10.2307/256844.
Stone, R.N., & Gronhaug, K. (1993). Perceived Risk: Further Considerations for the Marketing Discipline. European Journal of Marketing, 27(3), 39–50. doi:10.1108/03090569310026637.
Swinyard, W.R., Rinne, H., & Kau, A.K. (1990). The Morality of Software Piracy: A Cross-Cultural Analysis. Journal of Business Ethics, 9(8), 655–664. doi:10.1007/BF00383392.
Tan, B. (2002). Understanding Consumer Ethical Decision Making with Respect to Purchase of Pirated Software. Journal of Consumer Marketing, 19(2/3), 96–111. doi:10.1108/07363760210420531.
Taylor, S., & Todd, P.A. (1995). Understanding Information Technology Usage: A Test of Competing Models. Information Systems Research, 6(2), 144–176. doi:10.1287/isre.6.2.144.
Venkatesh, V., Morris, M.G., Davis, G.B., & Davis, F.D. (2003). User Acceptance of Information Technology: Toward a Unified View. MIS Quarterly, 27(3), 425–478.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Liao, C., Lin, HN. & Liu, YP. Predicting the Use of Pirated Software: A Contingency Model Integrating Perceived Risk with the Theory of Planned Behavior. J Bus Ethics 91, 237–252 (2010). https://doi.org/10.1007/s10551-009-0081-5
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10551-009-0081-5