Professional Documents
Culture Documents
Digital Piracy Ethical Decisi
Digital Piracy Ethical Decisi
This manuscript has been reproduced from the microfilm master. UMI films
the text directly from the original or copy submitted. Thus, some thesis and
dissertation copies are in typewriter face, while others may be from any type of
computer printer.
In the unlikely event that the author did not send UMI a complete manuscript
and there are missing pages, these will be noted. Also, if unauthorized
copyright material had to be removed, a note will indicate the deletion.
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Digital Piracy:
Ethical Decision Making
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Digital Piracy:
Ethical Decision Making
By
May, 2002
University o f Arkansas
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
UMI Number: 3055321
___ ®
UMI
UMI Microform 3055321
Copyright 2002 by ProQuest Information and Learning Company.
All rights reserved. This microform edition is protected against
unauthorized copying under Title 17, United States Code.
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
This Dissertation is approved for recommendation to the
Graduate Council
Dissertation Director:
Dissertation Committee:
U;,. J 2 H .&
Dr. Lou Glorfeld
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Acknowledgments
I would like to thank the people who supported me during the process o f writing
their time with me, and supported me during the whole process. Dr. Cronan was not only
my committee chair, he was also a friend and I owe him dearly for everything that he has
done for me. I would also like to express my gratitude and appreciation to Dr. Louis
Glorfeld, whom I’ve worked with extensively in the department. He is a good friend and
mentor. My thanks also goes to Dr. Molly Rapert, who joined the committee and
provided me with valuable feedback and support during my dissertation. I would also
like to thank other professors in the Computer Information Systems and Quantitative
Analysis that helped me and supported me during my Ph.D. work, and who made my
experience enjoyable at the University o f Arkansas. I would also like to thank all the
Ph.D. students that supported me during this phase and wish them the best o f luck in their
future life (in alphabetical order, Rick Brattin, Christine Davis, John Kidd, Lori Komp,
Melinda Korzaan, Novi Merchant, Paige Rutner, Wei Sha, and Ross Taylor). I was very
lucky to be around this gioup, it was a truly enjoyable group o f people. Also, I'd like to
thank other friends in Fayetteville, especially Connie Stave who is just a wonderful
person (if only more people like that existed in this world).
My family, I could never pay them back for everything that they have done for
me. I love them so much, and dedicate this dissertation to them. Starting with my wife
Eman and son Nassir, who endured many hours (months) at home (overseas) ju st waiting
for me. My thanks also goes to my mother, father, brothers, sisters, nieces and nephews
iii
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Table of Contents
1. Chapter 1: Introduction..................................................................................................1
1.1. Introduction..................................................................................................................... 1
1.2. IS Ethics.......................................................................................................................... I
1.3. The Piracy Problem........................................................................................................2
1.3.1. Digital Piracy..............................................................................................................3
1.3.2. The Start of Digital Piracy........................................................................................4
1.3.3. The Spread o f Software Piracy................................................................................ 6
1.3.4. Piracy is An Important Issue.....................................................................................7
1.3.5. Digital Piracy as an Information Technology (IT) Issue......................................8
1.4. Purpose o f This study.................................................................................................... 9
1.5. Organization of This study..........................................................................................10
iv
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
3.2.2. Determinants o f Attitude......................................................................................... 40
3.2.3. Determinants o f Intention....................................................................................... 46
3.2.4. Research M o d el........................................................................................................48
3.3. Research H ypotheses................................................................................................. 49
3.3.1. Gender (SEX)............................................................................................................ 50
3.3.2. Age (A G E )................................................................................................................ 50
3.3.3. Machiavellianism (M A C H )....................................................................................50
3.3.4. Perceived Importance (P I)...................................................................................... 51
3.3.5. Moral Judgment (M J )..............................................................................................51
3.3.6. Moral Obligation (M O )............................................................................................51
3.3.7. Cognitive Beliefs (C B )............................................................................................52
3.3.8. Affective Beliefs (A B ).............................................................................................52
3.3.9. Attitude (A TT).......................................................................................................... 52
3.3.10. Subjective Norms (S N )......................................................................................... 52
3.3.11. Perceived Behavioral Control (PB C ).................................................................. 53
3.3.12. Summary o f Research H ypotheses..................................................................... 53
3.4. Research M ethodology............................................................................................... 54
3.4.1. Instrument Construction.......................................................................................... 54
3.4.2. Hypotheses Testing.................................................................................................. 60
3.4.3. Sample........................................................................................................................ 62
3.4.4. Sample Size............................................................................................................... 62
3.4.5. Data C ollection.........................................................................................................63
3.5. Sum m ary....................................................................................................................... 63
4. Chapter 4: R esults........................................................................................................64
4.1. Introduction...................................................................................................................64
4.2. Questionnaire development and administration...................................................... 64
4.3. Descriptive information about the subjects..............................................................66
4.4. Missing Values............................................................................................................. 68
4.5. Construct V alidation...................................................................................................69
4.5.1. Unidimensionality.................................................................................................... 69
4.5.2. Reliability...................................................................................................................71
4.5.3. Convergent and discriminant validity............................................................. 75
4.5.4. Construct validity conclusion...........................................................................78
4.6. Hypotheses Testing..................................................................................................... 79
4.6.2. Dependent Variable: A ttitude...........................................................................80
4.6.3. Dependent variable: Intention...........................................................................91
4.6.4. Model sum m ary................................................................................................. 97
4.6.5. Structural Equation Modeling (SEM )........................................................... 100
4.7. Sum m ary.....................................................................................................................103
5. Chapter 5: Conclusion...............................................................................................104
5.1. Introduction.................................................................................................................104
5.2. Discussion...................................................................................................................104
5.2.1. Sex............................................................................................................................. 104
5.2.2. A ge............................................................................................................................ 105
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
5.2.3. Machiavellianism...................................................................................................106
5.2.4. Perceived importance.............................................................................................106
5.2.5. Moral Judgm ent.....................................................................................................107
5.2.6. Cognitive beliefs..................................................................................................108
5.2.7. Affective beliefs...................................................................................................109
5.2.8. Subjective norms..................................................................................................109
5.2.9. A ttitude................................................................................................................. 110
5.2.10. Perceived behavioral control.............................................................................111
5.2.11. Moral obligation.................................................................................................111
5.3. Fighting Digital Piracy...........................................................................................112
5.3.1. Digital media is overpriced................................................................................. 113
5.3.2. Getting caught...................................................................................................... 114
5.3.3. Easy to pirate digital m aterial.............................................................................114
5.3.4. Pirating digital media...........................................................................................116
5.4. Research Implications............................................................................................ 116
5.4.1. The role o f affect.................................................................................................. 117
5.4.2. Personal characteristics variables...................................................................... 117
5.4.3. Moral obligation................................................................................................... 117
5.4.4. TPB relationships................................................................................................. 118
5.5. Lim itations................................................................................................................. 118
5.5.1. Sample....................................................................................................................118
5.5.2. Measuring actual behavior...................................................................................119
5.6. Future research.......................................................................................................... 119
5.6.1. Study verification................................................................................................. 119
5.6.2. Ethical decision making....................................................................................... 120
5.6.3. Moral obligation................................................................................................... 120
5.6.4. Affective research................................................................................................121
5.6.5. Other research...................................................................................................... 121
5.7. Summary and conclusion....................................................................................... 122
vi
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Table of Figures
vii
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Table of Tables
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Chapter 1: Introduction
1.1. INTRODUCTION
During the last decade, much research has been dedicated to the study o f ethics in
business. Ethical situations arise often in many different areas o f business, and this has
been complicated by the integration o f Information Systems (IS) into business operations.
The integration of IS in business complicates ethics for many reasons (Weiss, 1990).
One main reason is the fact that information is available in electronic form, allowing
factors such as property rights, piracy, privacy, and security to have new dimensions o f
ethical issues in business. A study published in 1999 (Kreie et al.) concluded that
businesses and society. In a world where profit is the motive, unethical behavior within
organizations can impose a serious impact on that profit. Costs can range from financial
losses, loss o f a company’s good will, and affecting the relationship between customers
1.2. IS ETHICS
The extensive use o f IS has produced an added twist to ethical situations and has
spawned a growing area o f research concerned with the study o f ethics within IS. Recent
studies have concluded that research interest in ethics in the field o f IS has been
increasing significantly (Shim and Taylor, 1988; Cougar, 1989; Thong and Yap, 1998).
38, No. 12, 1995; Journal o f Management Information Systems, Vol. 15, No. 1, 1998)
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
have been dedicated to ethics. Most o f the ethical issues addressed in these studies
revolve around M ason’s (1986) four major ethical issues with IS: privacy (private
accessibility (information that individuals or organizations have the right to obtain), and
To illustrate the seriousness and the extent o f computer misuse and fraud, Saari
(1989) notes that only 1% o f all computer fraud is detected; o f those detected, only 1 in 8
One issue that has received much attention as o f late is intellectual property. O f
particular interest in this area is piracy. Most o f the studies have examined piracy as one
o f the ethical issues that is facing organizations and society. Straub (1991) identified
software piracy as a major problem facing the technology industry today. Anderson
(1993) examined piracy and intellectual property as some o f the top issues facing IS
professionals. Research examining piracy has appeared in all major IS journals (top S
piracy can be and is called different things. Other labels for software piracy include:
online piracy.
An independent study done by the Business Software Alliance (BSA) found that
software piracy was the software industry’s worst problem. The Software Publisher’s
Association (SPA) estimates that software piracy cost software publishers more than
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
$100 billion in the 1990s (http://www.spa.org). In 1998, while business PC application
software accounted for revenues o f around $18 billion worldwide, the SPA estimates that
as much as $12 billion in revenues was lost due to software piracy. Not only is this
harmful to organizations, but also to consumers as well in the form o f higher prices for
legitimate software. Rothken (1998) predicted that software piracy adds around 15% to
While software piracy is the most common form o f piracy, other forms do exist.
One common form o f piracy that has been receiving particular attention as o f late is the
piracy o f music using sound files available in MPEG (Motion Pictures Experts Group) 1
layer 3 (popularly known as MP3) format. Using the Internet, MP3 files can be shared
and distributed freely and easily between users. The Recording Industry Association o f
America (RIAA) estimates that it looses over $5 million a year due to music piracy o f
this type. The RIAA predicts that revenues lost due to Internet piracy will exceed all
losses due to other forms o f piracy combined in the near future (Das, 2000). Another
companies could lose up to $3.1 billion by 2005 through online piracy and digital
Other forms o f piracy have also been appearing as o f late. Using the Internet as
the medium, fully recorded Hollywood movies and video games are becoming freely
available for download. The entertainment industry has acknowledged this and has been
actively involved in litigation to stop this threat. Yet another form o f digital piracy is
taking place in the form o f digitizing and distributing published books over the Internet.
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
The Forrester research group predicts that book publishers will lose $1.5 billion by 2005.
Unfortunately for these industries, the Internet provides anonymity for pirates to roam
and do virtually anything they want to do without being identified. Pirates are uploading
and downloading copyrighted material from/to the Internet without any fear o f
identification or detection.
For the remainder o f this study, digital piracy will be referred to as representing
all kinds o f piracy (including software, music, video, and games). Based on that, digital
piracy is defined as: The illegal copying and/or downloading copyrighted software,
music, video, or other material (such as MP3s, Hollywood movies, and digital audio
This section will discuss how digital piracy (using mostly software piracy
research, since until a few years ago, it was the only available form o f digital piracy) is a
different and unique type compared to other forms o f piracy. According to Solomon
(1990), software piracy was not an issue before the introduction o f personal computers in
1982. Solomon’s claim was supported by the following arguments: Limited hardware
availability, limited software that can be used, not many individuals had home computers
(hence, no need to pirate). Most o f the software was written for specific organizations,
and finally the fact that there were not many people who were skilled enough to pirate the
software.
But shortly after 1982, software piracy started to spread. Features o f software
make it prone to software piracy (Cheng, 1997). Duplication o f software is very easy and
only requires simple commands to do so. Also, the quality o f the software does not
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
diminish when copied. Further, the widespread use o f computers into virtually every
house makes it difficult, if not impossible, to track individual software pirates and
enforce the copyright laws. To that, I would add the Internet and the anonymity it
the fear of being detected. I would also add the proliferation o f large and portable storage
devices (Zip drives, recordable CD-ROM s) that allow for inexpensive copying o f
software.
attractive to pirate. These qualities included: the ease o f replication, ease o f transmission
and multiple use, plasticity o f digital media (can be modified easily), equivalence o f
works in digital form (all digital files exist in one medium), compactness o f work in
digital form, and noniinearity (can be easily searched, unlike books and such).
targeted to managers. The study starts by emphasizing the importance o f this issue
(piracy in the workplace) and the fact that employees, managers, and executives can be
held responsible for piracy and can face litigation, fines and even imprisonment. A
survey done by the BSA found that 40% o f employees bring software to the workplace
from home, 24% download unauthorized copies from the Internet, and 24% share
16.178.phtml).
Mosley discusses four factors why software piracy has grown so much in the
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
1. Managers don’t take the time to educate employees about software piracy and
problem but also an international problem. Gopal (2000) examined this issue and found
many countries to have piracy rates o f 90%. According to the SPA, the cost o f software
To show the extent o f software piracy, the following statements reflect how
(http://whatis.com/piracy.htm)
1997)
3. There exists between two and ten copies o f illegal copies for every legitimate
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
4. In a survey about software piracy, 75% o f the Association to Advance
5. A survey done by the SPA on software auctions found that the number o f
only 138 out o f a total o f 13,000 auctions that included the sale o f commercial
software. As discussed previously, Rothken (1998) claimed that piracy ends up adding
15% to the price of legitimate software (as a result o f the lost sales and the cost o f the
for the effect on organizations, there is the obvious effect o f lost revenues due to the
piracy o f their products. Another threat to organizations comes from the legal area. It is
worthwhile to mention that employees put themselves and their organization at risk when
they commit digital piracy. Organizations can be held responsible for piracy (Hal Roach
Studios, Inc. vs. Richard Fiener, 1984) even if management didn’t know about it.
where piracy is rampant. In these countries, developers have little incentive to develop
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
We can start to reap many benefits when and if the piracy problem is solved. For
one, organizations will increase their revenue currently being lost due to piracy, resulting
legitimately. The industry will thrive economically and result in more competition and
thus better and cheaper products being delivered. Organizations will also not have to
worry about policing the actions o f their employees or about any legal problems related
to piracy.
Digital piracy is an issue related to IT. For one, technology is used to pirate
Disks (CDs), or digital scanning o f copyrighted material, it is all done through som e kind
o f technology. The solution to this problem might also include some form o f a
technology. Record companies have been working on a version o f music files that have
security features that protects music from being copied. Also, recent news report a push
in the technology world to create a standard that places digital piracy protection in
Also, from an educational point o f view, there has been a push for including
ethics education into the IT curriculum (Cougar, 1989). Mason (1986) had identified
intellectual property as one o f four major ethical issues with IT. The results o f this study
can be used to provide insights into how these courses would be taught.
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
1.4. PURPOSE OF THIS STUDY
To combat piracy, two popular methods are being used: preventives and
deterrents (Gopal and Sanders, 1997). Preventives impede the act o f piracy making it
very hard to do so. The idea is to make the pirates expend so much effort that it will wear
them down, and eventually they will not want to do it (again). Deterrents on the other
hand use the threat o f undesirable consequences (mostly legal sanctions) to prevent
piracy (Gopal and Sanders, 1997). Straub et al. (1990) examined computer abuse
controls (where internal system controls placed to specifically for detection purposes),
A review o f the piracy numbers discussed previously shows that preventives and
deterrents have not been successful in combating the piracy problem. Preventives (using
technical controls such as: copy-protected disks, hardware protection, and computer
codes) can be easily bypassed with the advent o f advanced tools that evade these
controls. Piracy deterrents are also hard to use for two main reasons: the pirates are not
easy to find because o f the anonymity available with the use o f the Internet, and secondly
the fact that most o f the pirates work alone and it would be too expensive to use the legal
As for detectives, studies (Saari, 1987; Straub, 1990) have pointed out that very
few instances (between 1% and 5%) o f computer abuse are detected. Thus, pirates have
little fear o f being detected (and a much lower chance o f being reported when detected
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Instead, looking at the factors that influence these individuals to pirate is a more
studies have suggested that individuals don’t see piracy as a crime or an unethical issue
(Im et al., 1991; Reid et al., 1992). Solomon and O ’Brien (1990) examined attitude
towards piracy among business students and found that they view piracy as socially and
ethically acceptable, and that piracy is widespread among business students. Christensen
and Eining (1991) also found that individuals don’t perceive piracy as inappropriate and
understanding o f this phenomenon and help us in combating digital piracy. The research
This study is divided into five chapters. The first chapter is basically an
introduction that explains what digital piracy is and what are its effects in the business
world. The chapter will also include the purpose o f this study and the research question
that we seek to answer in this study. The chapter will also include a section discussing
The second chapter will include a literature review o f previous studies that
examined piracy. Models and research related to behavior, ethics, and piracy will be
examined.
10
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
The third chapter will examine the research model used in this study. Theoretical
justifications for the model will be presented, as well as an outline o f the study method to
be employed (including sample information and data collection) and the statistical
Results from the statistical analyses are presented in chapter four, as well as
Study conclusion, research limitation, and future research are also discussed in detail.
11
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Chapter 2: Literature Review
2.1. INTRODUCTION
previous literature regarding digital piracy is necessary. In this chapter, previous research
related to behavior, ethics, and specifically piracy will be examined. This chapter is
ethics, and the fourth section will include a literature review o f piracy research.
The first section contains a review o f behavioral research. Specifically, Ajzen and
Fishbein’s behavioral research will be examined. The next section will examine various
fields within the ethics research. Specifically we will be looking at research that
examined factors effecting ethical decision-m aking in different forms. The third section
will include research done within the IS field regarding ethical decision-making. The
fourth and last section will include a look at previous research done concerning piracy.
The works o f Ajzen and Fishbein about behavior in the psychology literature are
some o f the most famous and validated research done to date. Their theories have been
used in predicting a wide range o f behavior (Sheppard et al., 1992; Madden et al., 1992).
Their work is based on the premise that intention causes behavior. The following is a
detailed discussion about the behavioral research done by Ajzen and Fishbein.
12
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
2.2.1. The Theory o f Reasoned Action
Fishbein and Ajzen first introduced the Theory o f Reasoned Action (TRA) in
1975. The theory isbased upon the noticn that human behavior is quite rational and
makes useo f the limited information available to individuals. The TRA asserts that two
determinants affect human behavior: one is personal in nature (attitude), and the other
unfavorableness for that behavior”. Subjective Norm (SN) was defined as “a person’s
perceptions o f that most people who are important to him think he should or should not
The theory posits that behavior (B) is a function o f intention (I). Intention is a
function o f attitude (A) towards the behavior and subjective norms (SN)- The model is
B = f(I) (I)
Attitude
Intention Behavior
Subjective
Norms
13
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
The TRA has been used extensively to predict a wide range o f behavior. It has
been used to predict turnover, education, and breast cancer examinations among other
making. Dubinsky used behavioral beliefs (belief that a specific behavior will lead to
subjective norm, the author used normative beliefs (an individual’s belief about how
referent others view performing the behavior) and motivation to comply (an individual’s
Figure 2 below shows Dubinsky’s depiction o f ethical decision-making using the TRA.
| Behavioral I
I B eliefs ,-----------------------,
i Attitude L
' O utcom e ^ ----------------------- 1
| Evaluations : ; ,-----------------------,
Ajzen in 1985. Ajzen contends that the TRA is insufficient because it does not consider
situations where the behavior is not under the individual’s control. That is, even if the
14
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
individual’s attitude and subjective norm was in favor o f committing the behavior, the
individual might not be able to perform the behavior. As Ajzen and Madden put it
(1986):
Perceived Behavioral Control (PBC). PBC is easily measured, and represents the
person’s belief on how easy or difficult it is to perform the behavior (Ajzen and Madden,
1986). The model posits that intention (I) is determined by attitude (A), subjective norm
(SN), and PBC. Subsequently, intention (I) is a determinant o f behavior (B). Two
B = f(I) (3)
B = f( I , PBC) (5)
Figure 3 below shows a picture o f the TPB, with the link between PBC and
15
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
A ttitu d e
In te n tio n B e h av io r
| S u b je c tiv e
j N o rm s
B e h a v io ra l
C o n tro l
As in the TRA, the TPB has been used extensively to predict behavior in a variety
research. Seminal ethics research will be examined and discussed in this section. The
studies examined here include Kohlberg’s stages o f moral development (1969), Rest’s
making (1986), Jones’ moral intensity (1991), and Rubin’s perceived importance o f
ethics (1996).
16
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
2.3.1. Kohlberg’s Stages of Moral Development
Kohlberg (1969) tried to explain how individuals reason moral situations through
moral situations differently, and propose a theory that explains different levels o f moral
reasoning. Kohlberg’s theory specifies six stages o f moral development, arranged within
three levels. Each o f the three levels contains two stages, and the levels are titled pre-
respectively.
behavior on the basis o f avoiding punishment or getting rewards. Stage one is where
individuals are obeying rules to avoid punishment; stage two is when individuals conform
to attain rewards. Kohlberg suggest that most residents o f this level are children aged 7
conform to societal beliefs. Stages three and four lie within this level. Stage three is
where individuals abide by laws and regulations to avoid any feelings o f disapproval
from others. Stage four is where confrontations with authority o r feelings o f guilt are
actions are guided towards conformity to shared standards, or duties other than from
and stage six actions are guided by self-principles (what the person believes in).
17
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Table 1 shows a brief description o f the levels, stages, and behavioral motivation
according to Kohlberg. Rest (1976) developed what is known as the Deciding Issues
Test (DIT) that assesses the level o f moral development for individuals.
_. i - i S t e i V . v A - •’- r - V r . >
To Avoid disapproval o f
Stage 3: Good-boy/Good-Girl
others
Level 2:
Conventional Morality To avoid feeling
Stage 4: Authority Orientation disapproval from
authorities
Actions guided by what is
Stage 5: Social Contract best for public welfare
Level 3: Orientation
PostConventional Morality
Stage 6: Ethical Principle Actions guided by self
Orientation chosen ethical principles
proposes that individuals follow certain steps when it comes to ethical decision-making:
recognizing that there is a moral issue, judging the issue to be either moral or not,
establishing behavioral intent, and finally performing the behavior. Figure 4 shows
18
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
R a co g n iz*
Moral Is s i m
| Mako Moral
J u d g m en t
! E sta b lish |
! Moral Intent i
Moral
B ehavior !
Bommer et al. (1986) identified and described a range o f factors that affect ethical
environment, and individual attributes. Bommer’s model has been frequently used in
predicting ethical/unethical behavior (Khazanchi, 1995; Terpstra etal., 1993; Reiss et al.,
one could ask, what does the society say should be done about this
behavior?
19
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
2) Government and Legal Environment: This factor is concerned with
respecting the laws and regulations o f the government. For example, one
could ask, what does the law say about this issue?
policies and corporate culture. For example, what does my managers and
o f the TRA and TPB. This includes the individual’s perception o f how
significant others (such as family and close friends) say about the issue or
behavior.
20
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Individual
Attributes
Personal
Environment
Work
Environment
Ethical
Judgm ent
Legal
j Environment
Social I
i Environment i
Professional i
Environment !
Jones (1991) argued that while there were many models trying to explain
contends that issue characteristics do play a part in effecting ethical decision-making and
situation” . For example, an issue related to taking office supplies home will not have the
o f the issue and not the individual or the organizational context. Jones also theorized that
21
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
MI would have an effect on all stages o f ethical decision-making (as categorized by Rest,
1986).
proposed behavior is evil (or good). The author compares the act o f
will happen and that it will cause harm (or benefit). Jones gives an
present and the time where the consequences (or benefits) would occur.
Jones provides an example o f giving out medicine that might have side
have more effect than the same harm done to some person in another
country.
22
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
6) Concentration o f Effect: According to Jones, this is “An inverse o f the
this is an indication o f how concentrated the effect is. The author gives an
each has a more concentrated effect than denying 10,000 people each with
a $10 claim.
Jones theorized that situations with high moral intensity would be recognized as
moral issues more than situations with low moral intensity, and that they will require
higher levels o f moral development than situations with low moral intensity. Figure 6
shows Jones’ MI and how it affects the stages o f ethical decision making according to
Rest.
I Recognize
C on seq u en ces
*, Moral Issue
Social Con
Make Moral
Judgm ent
Prob. o f Effect
Moral
Intensity
T e m p /^ \
V^Jmmediacy^y Establish j
Moral Intent i
Proximity
23
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
2.3.5. Rubin’s Perceived Importance o f Ethics
Robin et al. (1996) extends Jones (1991) MI construct with the introduction o f the
difference between these two constructs is that while MI represents the characteristics o f
the issue, PIE represents the individual’s perception o f the issue at hand. Robin argues
that PIE is an improvement over MI in that it can capture different perceptions o f the
same issue (mainly because the same issue can be perceived differently by different
Robin theorized (and empirically validated) that high levels o f PIE (“important”
issues) will correspond with more unethical judgments, and that high levels o f PIE will
Robin also proposed two propositions for the use o f PIE in ethical decision
making, the first being that PIE is a determinant o f ethical judgm ent and the second being
that PIE acts as a moderator between ethical judgment and behavioral intention. The
following diagram shows Robin’s depiction o f how PIE ties in with ethical behavior.
PIE
24
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
2.4. IS ETHICS RESEARCH
Ethics research has been a growing area o f research within the field o f IS. Recent
studies have concluded that research interest in ethics in the field o f IS has been
increasing significantly (Shim and Taylor, 1988; Cougar, 1989; Thong and Yap, 1998).
38, No. 12, 1995; Journal o f Management Information Systems, Vol. 15, No. 1, 1998)
have been dedicated to ethics. The following is a brief overview o f some o f the major
IS ethics research practically was launched in 1986 when Mason examined major
ethical issues with IS. Mason identified the ethical issues as privacy, accuracy,
erroneous information
Like Dubinksy (1989), Lock and Conger (1991) base their model on the TRA to
25
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
ownership, the authors develop a model o f ethical decision-making regarding computer
use. The model posits that self-image (how individuals characterize themselves),
literacy (individual’s knowledge about computers) affect ethical attitude; and thus social
norms and ethical attitude affect intentions; which in turn causes behavior.
deindividuation, literacy, and self image as antecedents to intention along with ethical
attitude and social norms) had a better fit. The modified model is shown below in figure
7.
i Ethical Attitude I
Social Norms
Self-Image Intention
; Deindividuation -
! Computer Literacy
In a series o f three articles, Kreie and Cronan (1998, 1999, 2000) examined
ethical decision-making concerning IS issue. For these studies, the authors used ten
factors that have been theorized to affect ethical decision-making. Seven factors were
26
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
used from Bommer’s model; three more factors were added that included personal
Individual
Attributes
Personal Values
; Legal Environment L
i Social Environment
Ethical |
Professional Judgment
Environment
Individual
Environment
B u sin ess
Environment
Moral Obligation
A w areness of
j C on seq u en ces
Figure 9: Factors Influencing Ethical Decision M aking (Kreie and Cronan, 1998,1999,2000)
Kreie and Cronan used different scenarios representing different ethical issues
with IS; used a questionnaire to assess whether an action is ethical or not, and to unearth
what factors affected one’s ethical decision m aking. The different scenarios generated
different factors that affected ethical decision-making, and in one study compared results
across genders.
27
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
2.4.4. Ethical Decision Making Within the IS Profession
Baneijee, Cronan, and Jones (1998) examined ethical decision making within the
IS profession. Their model is shown below in figure 9, and is based on the TRA.
1
Locus of ! Organizational
Ego Strength |
Control Ethical Climate
i
> ’f '
Moral
Judgment
Personal
Normative
Beliefs
The mode posits that moral judgment (the way a person reasons when faced with
beliefs (the personal obligation to perform an act or not) influence intention to perform a
behavior.
The authors also claimed that three variables acted as moderators. These
variables are ego strength (the individual’s self conviction), locus o f control (control of
own destiny), and organizational ethical climate (the ethical culture o f the organization).
The study, however, didn’t find any o f these moderators to be statistically significant.
28
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
2.5. PIRACY RESEARCH
piracy research had examined strategies for protecting (Conner and Rumlet, 1991),
deterring/preventing (Gopal and Sanders, 1991), and detecting software piracy (Straub,
Nance, 1990). The section will also examine research that introduced and tested general
software piracy models (Christensen and Eining, 1991; Simpson et al., 1994; Limayem et
Conner and Rumelt (1991) analyzed how individuals decide on whether to pirate
or not, and surprisingly, the findings suggest that in some cases, the best software piracy
protection strategy is not to have one at all. The authors argue, that in the presence o f
positive network externalities (the dynamics associated with the diffusion or adoption o f
a product), piracy will increase the user base o f the software, and thus creating a higher
program value (after purchase value, represented in the cost o f learning, customization,
and standardization) for the consumer. Increased protection might actually deter users o f
the software into forgoing the use o f the software and thus decreasing the total user-base.
Software companies are better off with a large user base (even if many are pirated)
because they would make extra income in the form o f post-purchase income (various
forms o f support, learning and customization, among others). The authors do suggest the
use o f some form o f protection strategies when network externalities are weak.
In a separate study affirming the conclusion o f the previous study, Givon et al.
(1995) tracked the spread o f software (specifically word processing, and spreadsheet
29
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
software) in the United Kingdom and found that although six in seven users were pirates,
these pirates had actually generated around %80 o f the total sales o f the actual software
over time.
Gopal and Sanders (1997) studied preventive and deterrent controls employed by
software companies to combat software piracy. The authors developed and examined an
analytical model that tests the implications o f the use o f these controls to limit software
piracy. Surprisingly, the authors found that while deterrent controls had a positive impact
increasing profitability.
Straub and Nance (1990) examined how organizations discover computer abuse in
their business settings. According to the authors, incidents o f computer abuse can be
were discovered this way), normal system controls (controls set up by the organization,
50% were discovered this way), or purposeful investigations (looking randomly for
abuses, accounted for about 16% o f abuses discovered). The authors surveyed over a
thousand organizations regarding this issue, and constructed a model (shown below in
30
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Proactive
Detective
Activities
Computer
Abuse Discover
Recovery ----- ► Punishment
of Abuse from Abuse
Accident
Reactive
Detective
Activities
Internal
Systems
Controls
The authors also provide the following suggestions on how to improve security
computer abuse
4. Punishment should be equal for abusers who abuse for personal gain,
In this section, research attem pting to explain software piracy is examined. Four
31
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
2.6.1. Factors Influencing Individuals with regard to Software Piracy
Starting with the earliest, Eining and Christensen (1991) developed a model o f
factors influencing individuals with regard to software piracy. Their model identified
five factors that influenced this behavior: computer attitudes, material consequences,
norms, social-legal attitudes, and effective factors. The factors are explained as follows:
3. Norms: subjective norms o f the individual and his/her family and close
friends
1 ! i i
I __________ !___________!__________ I__________ I
i
Intentions Behavior
32
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
2.6.2. Factors Influencing Softlifting
individuals for individual use). The authors identified five factors that influenced
decision-making, as follows:
2. Socio-cultural factor: social and cultural factors that influence the individual
among others
software or not.
Stimulus to Act
Socio-Cultural
Factor
Ethical Decision
Legal Factors Behavior
Process
i Personal Factors r
; Situation Factors
33
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
2.6 3 . Explaining Software Piracy
Limayem et al. (1999) based their model on Triandis’ behavioral model (1980) to
explain software piracy. The study used a longitudinal design to study piracy within
business students. The study used the following variables to explain the behavioral
process:
behavior
3. Habit: repeating behaviors that became automatic and done without much
reasoning
Habit
Affect
Piracy
-« Intention -
Behavior
Social
Factor*
; Facilitating !
Conditions
L
Figure 14: Factors Motivating Software Piracy, Limayem, Khalifa, and Chin (1999)
34
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
The model is presented in figure 11 above. Results o f the study indicated that
only social factors and consequences had an influence on the piracy behavior; On the
Thong and Yap (1998) also attempted to explain softlifting (software piracy done
by individuals) by using Hunt and VitelFs (1986) ethical decision-making theory. The
theory suggests that individuals are influenced by deontological (where rules define what
is ethical or not) and teleological (examine the consequences o f the behavior) evaluations
: Dsontologfcal Dsontotogicsl
: Norms Evaluation
Ethical Moral
Judgment Intention
Daontological !
Norms
^ Tslsological |
Evaluation
Dsontological
Norms
2.7. SUMMARY
This chapter reviewed and examined previous research related to the research
35
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
theories (specifically, the TRA and the TPB), explored ethics literature starting with
behavior. The next section discussed ethics research specific to IS and reviewed some
well-known models o f ethics in IS. The last section examined research specific to
3 will include a detailed explanation o f the steps needed to undertake this research and
explain digital piracy will be developed, and details about how the model will be
operationalized will be detailed in the next chapter. Statistical methods that are needed to
36
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Chapter 3: Research Method
3.1. INTRODUCTION
In the previous two chapters, we looked at the problem o f digital piracy, and
examined previous research undertaken regarding behavior, ethics, and computer misuse
(specifically software piracy). Digital piracy continues to be a big problem, and none o f
the methods suggested (deterrents and preventives) for combating piracy have been
successful. An understanding o f the factors that influence piracy might lead to better
behavior (Jones, 1991). Prior piracy research has examined different models with
different variables (see Chapter 2 for previous piracy research) to explain piracy with
limited success. To better explain (and hopefully influence) piracy, a closer look at the
reference disciplines is needed to better understand the piracy behavior and its
antecedents.
exhaustive and comprehensive examination o f the literature. The model is based on the
psychology and ethics literature. The model developed borrows from other disciplines
37
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
3.2. RESEARCH FRAMEWORK
As discussed in the last chapter, the TPB (which is an extension o f the Theory o f
Reasoned Action) has been used extensively in predicting different kinds o f behavior
(Flannery and May, 2000). The TPB posits that behavior is influenced by the individual's
intention to perform that behavior, and that three classes o f factors influence intention:
behavior
performing a behavior
The TPB is shown in the following figure (the figure includes the possible link
38
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Attitude
Intention Behavior !
j Subjective I
Norms [
i Perceived
I Behavioral
Control
Attitude has been long acknowledged as the most important construct in social
published in this area (Olson and Zanna, 1993; Petty, Wegener et al., 1997; Ajzen, 2001).
Attitude has also been found to be the most significant factor influencing behavioral
intention. A recent review by Trafimow and Finlay (1996) found that attitude was the
Another reason why attitude is so important is the fact that attitude can be
attitude change and persuasion exists in the psychology literature (Olson and Zanna,
1993). Since attitude is the most significant predictor o f intention (Beck and Ajzen,
39
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
1991) (which in turn, is the best predictor o f the actual behavior), then behavior can
From the previous discussion, it is obvious that while the TPB in general is
factor here. Based on that, while this study uses the TPB as a base for the research
model, special emphasis will be placed on attitude and its antecedents. In the next
In the following section, several factors that could possibly influence attitude are
examined as suggested in the literature. These factors are: cognitive beliefs, affective
beliefs, perceived importance o f the issue, moral judgment, and individual characteristics.
determined by the behavioral beliefs o f the individual (Ajzen, 1985). These beliefs are
usually elicited from a representative sample o f the population (see the instrument
construction section o f this chapter for a detailed example) and are used to predict
attitude.
These beliefs have been used as the dominant explanation for attitude and attitude
change in the psychology literature (Fishbein and Middlestadt, 1995), and have
historically been labeled as cognitive beliefs. Cognitive beliefs represent the individual's
(in terms o f outcomes o f a behavior). While early research on attitude has concentrated
40
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
on "only" cognitive beliefs (beliefs based on the object attributes or outcomes o f a
behavior) as determinants o f attitude, new research streams suggest that other non-
Several authors have established the impact o f affective beliefs (beliefs based on
beliefs, affective beliefs have been demonstrated as having direct influence on attitude
(Bodur, Brinberg et al., 2000). Holbrook and Batra (1987) established several affective
beliefs that influenced attitude. Haddock and Zanna (1998) found that both affective and
Trafimow and Sheeran (1998) examined affective and cognitive beliefs and found that
they are separate constructs that independently influenced attitude. Kempf (1999) found
that affective beliefs were separate and independent o f cognitive beliefs in his study
about product trials. Verplanken et al. (1998) also provided support for the affective-
cognitive model of attitude. Bodur's et al. (2000) study provided further evidence that
affect does influence attitude directly and independently o f cognitive beliefs. The
following diagram demonstrates the influence o f beliefs on attitude based on the research
Affective
Beliefs
Attitude
Cognitive
I Beliefs
41
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
3.2.2.2. Ethics Research
To get more insights about other factors that might influence attitude, a look at
other behavioral fields and disciplines is warranted. One area o f interest is the ethics
literature, where computer misuse and crime have been often looked into within an
ethical/unethical point o f view (Im and Koen, 1990; Simpson, Baneijee et al., 1994; Loch
and Conger, 1996; Baneijee, Cronan et al., 1998). The ethics literature provides us with
study.
Borrowing from the ethics literature might help to better understand the complex
behavioral relationships involving attitude and intention. Since the ethics literature often
justify extending the TPB with factors from the ethics literature.
The following section provides the justification for using factors from ethics
literature to use with this study. First, ethical behavior (studied in ethics) is one kind o f
general behavior that is usually studied using TPB. The attitude concept is the closest
match to ethical judgm ent in the TPB model (com pared to subjective norms, perceived
behavioral control, intention, or behavior). Both attitude and ethical judgment have been
used to explain intention/behavior, and the TPB has been used to explain ethical behavior
(Dubinsky and Loken, 1989; Randall and Gibson, 1991; Baneijee, Cronan et al., 1998;
Flannery and May, 2000). Both attitude and ethical judgm ent are some kind o f a
judgment or an evaluation about a behavior. A lso, both attitude and ethical judgment
lead to intention, which in turn leads to some kind o f behavior. Not to mention the fact
that ethical judgm ent has been also called ethical attitude and has been measured using
42
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
attitudinal measurements (Dubinsky and Loken, 1989; Baneijee, Cronan et al., 1998). It
is also argued that attitudinal judgment would be very similar to ethical judgment when
the behavior in question involves an ethical dilemma. Attitude and ethical judgment are
not the same thing, but what affects ethical decision making might also affect attitude.
for review). Going a step further, a list o f factors and variables influencing ethical
decision-making and ethical intention was put together. Along with that, a “mini” meta
analysis was performed to assess the results o f these studies to identify which factors
have been used repeatedly and were consistently found to be significant determinants o f
ethical decision-making. Based on this criterion, three factors were identified as follows:
Individual characteristics and attributes have been used frequently in the ethics
literature to predict ethical decision-making. Prior studies have found gender to influence
ethical decision-making (Khazanchi, 1995; Loch and Conger, 1996; Reiss and Mitra,
1998; Leonard and Cronan, 2001). Results from these studies suggested that females had
higher ethical standards than males (Ford and Richardson, 1994, Found that females had
higher ethical standards in 7 out o f 7 studies reviewed). Simpson et al. (1994) found that
piracy.
Attitude research has also examined the effect o f gender on attitude and found it
characteristics would have an influence on attitude. Two studies that examined cheating
43
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
behavior in school found that gender had an effect on attitude toward cheating (Whitley,
As for personal traits, there have been many traits/characteristics that have been
tested for effects on ethical decision-making. Examples include: locus o f control, ego
strength, and Machiavellianism. While previous studies had inconclusive results on locus
o f control and ego strength (Ford and Richardson, 1994; Baneijee, Cronan et al., 1998),
making (Hegarty and Sim, 1978; Hegarty and Sims, 1979; Singhapakdi and Vitell, 1992;
Kohlberg (1969) theorized that individuals reason out moral situations differently,
and proposed a theory that explained different levels o f moral reasoning (see Chapter 2).
Moral Judgment (MJ) is basically how an individual reasons when faced with an ethical
ethical/unethical judgment, its use has been a common occurrence in the ethics field
(Rest, 1986; Trevino, 1986; Leonard and Cronan, 2001; Wagner and Sanders, 2001).
Moral judgment is measured using Rest's (1986) Defining Issues Test (DIT), and will be
44
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
3.2.2.2.3. Perceived Importance
Another issue that has received attention in the ethics literature is what is referred
as "Situational Ethics". Situational ethics posits that each ethical situation (dilemma) has
its own unique characteristics, and these characteristics actually influence the ethical
decision-making process o f individuals (Ferrell and Gresham, 1985). The term was first
conceptualized by Jones (1991), using the term Moral Intensity, it consisted o f five
(PIE). Robin’s concept was an improvement over moral intensity in that PIE measured
the individual's perception o f the importance o f the issue (moral intensity measured
characteristics o f the issue, while PIE examined how important the issue is to
individuals). For the rest o f this study, we will refer to this factor as Perceived
Importance (PI).
There is also some evidence that suggests that subjective norms have an influence
on attitude (Shepherd and O'Keefe, 1984; Shimp and Kavas, 1984; Vallerand, Pelletier et
al., 1992; Chang, 1998). The ethics literature had examined this relationship in previous
studies (referred to as the relationship between significant others and ethical decision
making) (Bommer, Gratto et al., 1987; Kreie and Cronan, 2000). Since attitude is an
45
Reproduced with permission of the copyright owner. Further reproduction prohibited w ithout permission.
3.2.3. Factors Influencing Attitude
attitude as follows:
Moral
Judgment
Individual
Attributes
Affective
Beliefs
Attitude
| Cognitive
i Beliefs
Norms
perceived behavioral control. The following section examines these factors briefly and
46
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
3.2.3.1. Attitude
behavior (Fishbein and Ajzen, 1975). There is a great amount o f research done on
attitude and its influence on intentions and behaviors (Olson and Zanna, 1993; Petty,
Wegener et al., 1997; Ajzen, 2001). Attitude has mostly been studied as an independent
variable, and not much research has examined factors influencing attitude (other than
Subjective Norms (SN) are defined as “a person’s perceptions o f that most people
who are important to him think he should or should not perform the behavior in question”
(Ajzen, 1985). Subjective norms have been posited as determinants o f intention and have
difficult it is to perform a behavior (Ajzen, 1991). This factor addressed the issue o f not
being able to perform the behavior, even if the individual’s attitude and subjective norm
was in favor o f committing the behavior. PBC is usually are considered to be composed
o f difficulty and control factors (Ajzen, 2001). These two factors will be discussed in
Moral Obligation (MO) refers to the feeling o f guilt or the personal obligation to
perform or not to perform a behavior. Schwartz and Tessler (1972) indicated that moral
obligation would be a good predictor o f ethical/unethical intention. This factor has been
47
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
used in the literature to predict ethical intention (Randall and Gibson, 1991; Kurland,
1995; Baneijee, Cronan et al., 1998; Leonard and Cronan, 2001). This factor has also
been theorized as affecting intention in studies from the psychology field. Ajzen (1991)
indicated that moral obligation could possibly be added to the TPB as a separate
studies.
Moral
Judgment
Irnvidual
Attributes
Affective
Beliefs
Attitude
Cognitive
1 Beliefs
S u b jective
in ten tion
Perceived
Behavioral
Control
Moral
Obligation
48
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Based on the previous discussion, we can form a model o f factors influencing
intention as follows:
Moral Obligation)
The following table lists the factors and variables used in this study with a brief
Factor Description
Gender (SEX) Gender o f the subject
Age (AGE) Age o f the subject
Machiavellianism (MACH) How Machiavellian is the subject
Perceived Importance (PI) How important is the issue to the subject
Moral Judgment (MJ) How does the subject reason when faced with an ethical
dilemma
Moral Obligation (MO) The feeling o f guilt or moral obligation toward the
behavior
Cognitive Beliefs (CB) Beliefs based on the outcome o f the behavior
Affective Beliefs (AB) Beliefs based on emotions and feelings toward
performing the behavior
Attitude (ATT) The subject’s overall evaluation about the behavior
Subjective Norms (SN) What significant think about this behavior
Perceived Behavioral Control How easy or difficult it is to perform the behavior
(PBC)
Intention (INT) Behavioral intention to perform the behavior
Appendix A includes a comprehensive review o f the factors used in the study and
a brief summary of the results o f the study they were used in.
The purpose o f this study is to examine the relationships between different factors
and attitude/intention towards digital piracy. This section examines the nature o f these
49
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
3.3.1. Gender (SEX)
The ethics literature suggests that females have a higher ethical standard than
males (Ford and Richardson, 1994). Sims (1996) found that male students pirated
software more often than female students. Based on that, it is expected that females
would have a lower attitude (think it is unethical) towards digital piracy than males.
H I : Females will have a lower attitude towards digital piracy than males
The ethics literature suggests that older individuals have higher ethical standards
than younger individuals (Ford and Richardson, 1994). Based on that, it is expected that
older subjects would have a lower attitude (think it is unethical) towards digital piracy
H2: Older subjects will have a lower attitude towards digital piracy than younger
subjects
The literature suggests that individuals with a high Machiavellianism will not be
H3: Individual with high Machiavellianism will have a higher attitude towards
digital piracy
50
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
3.3.4. Perceived Importance (PI)
The literature suggests that the more important an issue is, the more likely that
individuals would view that issue as unethical; Thus, the higher the importance o f the
H4: The higher the importance o f the issue will be, the lower the attitude towards
digital piracy
Moral judgm ent is how a person reasons when faced with an ethical dilemma.
Individuals high in moral judgment (According to Kohlberg, 1969) would examine their
actions and compare them to the goodness o f the society and them as having high ethical
values. Based on that, the higher an individual's moral judgment, the lower their attitude
H5: Subjects with higher moral judgment will have a lower attitude towards
digital piracy
higher the moral obligation is, the less likely it is for individuals to perform the behavior.
H6: Subjects with higher moral obligation will have a lower intention to pirate
digital material
51
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
3.3.7. Cognitive Beliefs (CB)
Cognitive beliefs have been mostly used to determine attitude (Bodur, Brinberg et
al., 2000). Positive beliefs (and evaluation o f these beliefs) would correspond to higher
digital piracy
discussion).
H8: High excitement and happiness feelings should correspond with higher
attitude towards digital piracy, and high distress feelings would correspond with lower
Attitude has a positive relationship with intention. The higher the attitude is, the
H9: Higher attitude will correspond with higher intention to pirate digital material
Subjective norms has a positive relationship with intention. The higher the
evaluation o f subjective norms (significant others have a favorable opinion towards the
52
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
HlOa: Higher subjective norms will correspond with higher intention to pirate
digital material
Subjective norms are also theorized to influence attitude. The higher the
evaluation o f subjective norms (significant others have a favorable opinion towards the
HI Ob: Higher subjective norms will correspond with higher attitude towards
digital piracy
control. An individual who has perceived the behavior to be easy and under his control
(higher perceived behavioral control) would have a higher intention to perform the
behavior.
The following table provides a comprehensive listing o f the hypotheses that will
53
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Hypothesis Description
1 Females will have a lower attitude towards digital piracy than males
Older individuals will have a lower attitude towards digital piracy than
2
younger individuals
Individuals with high machiavellianism will have a higher attitude towards
3
digital piracy
The higher the importance o f the issue will be, the lower the attitude
4
towards digital piracy
Individual with higher moral judgm ent will have a lower attitude towards
5
digital piracy
Individual with higher moral obligation will have a lower intention to
6
pirating digital material
Positive/higher beliefs/evaluations will correspond to higher attitude
7
towards digital piracy
High excitement and happiness feelings should correspond with higher
8 attitude towards digital piracy, and high distress feelings would correspond
with lower attitude towards digital piracy
Higher attitude will correspond with higher intention to pirate digital
9
material
Higher subjective norms will correspond with higher intention to pirate
10a
digital material
Higher subjective norms will correspond with higher attitude towards
10b
digital piracy
Higher perceived behavioral control would correspond to higher intention to
11
pirate digital material
This section describes the research methodology undertaken to carry out this
study. This section will include information about instrument construction, the statistical
techniques used to examine the hypothesized relationships, and the sample used.
The following is a discussion o f the instrument used in this study and the sources
54
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
3.4.1.1. Gender (SEX) and Age (AGE)
Gender and age are single item questions eliciting the subject for his/her gender
and age.
Geis, 1970) scale. The scale is composed o f 20 items (10 items o f which are reverse
worded) that include questions addressing tactics, views, and morality. The items include
questions like "Most people are basically good and kind", and "Anyone who trusts
anyone is asking for trouble". Respondents are asked to indicate the extent o f their
agreement/disagreement with each o f the items using a seven-point Likert scale ranging
instrument is composed o f four items with questions related to the importance o f the issue
at hand. Respondents are asked to indicate their perception on the extent o f the
importance of the issue with each o f the items using a seven-point scale ranging from
Moral judgment is measured using the Defining Issues Test (DIT) developed by
Rest (1986). The DIT is composed o f 6 scenarios each involving a different moral
dilemma, each with several questions about the scenario (the short form includes the first
three scenarios). A recent book (Rest, Narvaez et al., 1999) examined over 400 published
55
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
articles that used the DIT and demonstrated validity and reliability o f the DIT instrument
Likert scale ranging from strongly agrees to strongly disagree. Example statements
include "Digital piracy goes against my principle" and "It would be morally wrong for me
To assess the cognitive structure o f these salient beliefs, a standard method has
been suggested (Fishbein and Ajzen, 1975) for collecting and obtaining these cognitive
beliefs. Keeping in mind, that these beliefs are different in the case o f b elief towards a
behavior versus the case o f beliefs towards an object. When eliciting beliefs toward a
behavior, these beliefs should be based upon the outcome/consequences o f the behavior.
Beliefs about an object on the other hand, require that beliefs should be based about the
questions regarding the behavior. These questions assess the respondent's beliefs about
the outcome o f the behavior (Fishbein and Ajzen, 1975). Specifically, respondents are
asked three questions regarding the behavior, as follows: "What are the advantages, if
any, o f Digital piracy", "What are the disadvantages, if any, o f Digital piracy", and "Is
there anything else you associate with Digital piracy". A Content analysis is performed
on the beliefs, and "very" similar beliefs are combined into one. Beliefs mentioned by at
least 10% o f the sample are selected for the scale (Fishbein and Middlestadt, 1995).
56
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
3.4.1.6. Affective Beliefs (AB)
Affective beliefs capture the emotions and feelings associated with the action.
calmness, quietness, boredom, unhappiness, and distress). Bodur et al. (2000) used four
categories (arousal, elation, pleasantness, and distress) to assess their affective beliefs
construct. Other researchers have used a two dim ensional structure based on pleasure
and arousal (See Bodur, Brinberg et al., 2000). In this study, three dimensional affective
structure will be used to measure affective beliefs; the three dimensions will be based on
arousal, pleasantness, and distress. Subjects are asked to express how they felt about the
pirating behavior on a seven-point scale ranging from "not at all" to "very much".
(1975), subjects are asked to respond to a question regarding the individual's attitude
towards the behavior. Respondents are presented with the sentence, "Overall, my attitude
towards Digital Piracy is:". Different semantic differential items are used to answer the
question and assess attitude. Different semantic differential items that have been used
wise/foolish among others (Madden, Ellen et al., 1992; Trafimow, 1996; Chang, 1998;
Bodur, Brinberg et al., 2000; Flannery and May, 2000). For this study, attitude will be
57
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
favorable/unfavorable) scored on a seven-point scale ranging from strongly agree to
strongly disagree.
others approve or disapprove the behavior in question. Items include questions such as
"Most people who are important to me think that I should not pirate digital content", and
"When considering digital piracy, I wish to do what most important people to me think",
and answered using a seven point Likert scale ranging from "strongly agree" to "strongly
disagree". In total, 3 items assessing subjective norms will be used in this study.
to perform the behavior in its original depiction by Ajzen (1985). Ajzen (2001)
recommends the use o f both a self-efficacy measure (whether individuals believe that
they have the skills and abilities to perform the behavior) and control (whether
individuals believe they have control over performing the behavior) measures. Measures
used in this study will be based on previous measures used in previous research regarding
perceived behavioral control that would capture both self-efficacy and control
pirate digital content, it would be" (very easy/very difficult), "If I wanted to, I could
easily pirate digital content" (strongly agree/strongly disagree), and "I believe I have the
measured also on a seven-point scale assessing "I have the resources necessary to pirate
digital content" (strongly agree/strongly disagree), "How much control do you have in
58
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
pirating digital content" (complete control/absolutely no control), and "It is mostly up to
three-item construct answered on a seven-point scale. The items include "I intend to
pirate digital content in the near future" (definitely do/definitely do not), "I will try to
pirate digital content in the near future" (definitely will/definitely will not), and "I will
make an effort to pirate digital content in the near future" (definitely true/definitely false).
Summary of Constructs
The following table provides a brief description o f the constructs used in this
study. Please see Appendix B for the complete instrument used in this study.
Factor Description
Gender (SEX) 1 item
Age (AGE) 1 item
Machiavellianism (MACH) 20-item instrument (Christie and Geis, 1970)
Perceived Importance (PI) 4-item instrument (Robin, Reidenbach et al., 1996)
Moral Judgment (MJ) DIT short form (Rest, 1986)
Moral Obligation (MO) 3 items
Cognitive Beliefs (CB) Will be determined in a later elicitation study (6-10
items)
Affective Beliefs (AB) 3 items
Attitude (ATT) 4 items
Subjective Norms (SN) 3 items
Perceived Behavioral Control 5 items (3 representing Self efficacy, 1 representing
(PBC) resources, 1 representing control)
Intention (INT) 3 items
59
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
3.4.2. Hypotheses Testing
Stepwise regression and Structural Equation Modeling (SEM) will be used to test
the hypotheses.
Since the model has two dependent variables with different independent variables,
a stepwise regression approach will be used to test out the individual hypothesis first.
multicollinearity.
techniques (Bagozzi and Fomell, 1982). Unlike linear regression, ANOVA, and other
multivariate statistical techniques, SEM allows researchers to analyze more than one
layer o f links between independent and dependent variables (Gefen, Straub et al., 2000)
which is the case in this study (where attitude is considered both a dependent and an
the model (testing relationships for statistical significance between variables) and an
evaluation o f the measurement model (where loadings o f items on their latent variable are
These features (and others) have resulted in an increased usage o f SEM tools in
the behavioral sciences (Hair, Anderson et al., 1998). There is also a growing interest in
the use o f SEM tools within IS research. A recent survey o f the empirical IS studies
found that 34% o f studies between 1994 and 1997 used SEM in two leading IS journals
(Information Systems Research and MIS Quarterly) (Gefen, Straub et al., 2000). This
study will utilize SEM tools to analyze the data collected and test the research model.
60
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
SEM assumptions are similar to assumptions found in regression analysis. These
include having and adequate sample size, normally distributed data, and linear
elimination o f outliers) (Tabachnick and Fidell, 1996). Also, since SEM is being used as
a confirmatory technique, then theoretical basis for the relationships must exist prior to
Construct validity and reliability will also be assessed. Construct validity deals
with whether the items used to measure constructs are consistent with a prior hypothesis
regarding the relationship between these items and constructs. This is done by using a
confirmatory factor analysis to examine the construct validity o f the data and checking
the factor loadings on each given construct. Geffen et al. (2000) suggests that item
constructs are usually comprised o f multiple items, these items should all correspond
together to measure the same construct. The most commonly used method to measure
reliability is by using Cronbach's alpha (Carmine and Zeller, 1979). Geffen et al. (2000)
As for testing the relationships between the model components, the SEM analysis
provides two means for analyzing the research model. The first is an indication o f the
overall fit o f the model (how well does the model fit the data). Geffen (2000)
recommends examining the Adjusted Goodness o f Fit Index (AGFI), Chi-Square, and
Normative Fit Index (NFI). The second indicator is related to the relationships between
61
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
the different factors in the model. Each relationship is tested by examining the beta
3.4 3 . Sample
The sample for this study will be based on a student sample from a business
college attending a university in the Midwest. The students will be a mix o f sophomore,
junior, and senior level students. Recent studies have suggested that students view piracy
as socially and ethically acceptable, and that piracy is widespread among business
have been used in ethics literature to explain ethical behavior (Rest, 1986; Khazanchi,
1995; Loch and Conger, 1996; Reiss and Mitra, 1998; Kreie and Cronan, 1999; Kreie and
Cronan, 1999; Kreie and Cronan, 2000; Leonard and Cronan, 2001) and software piracy
(Solomon and O'Brien, 1990; Eining and Christensen, 1991; Simpson, Baneijee et al.,
1994; Glass and Wood, 1996; Kuo and Hsu, 2001; Wagner and Sanders, 2001). Also,
students are the target populations, since a high proportion o f students have been shown
to pirate (Solomon and O'Brien, 1990; Im and Van Epps, 1991; Sims, Cheng et al., 1996)
analyze the results. The literature contains some guidelines regarding the appropriate
size o f the sample used in the study. Research studies have suggested having 5 to 15
cases for each variable measured (Bentler and Chou, 1987; Stevens, 1996). Boomsma
(1987) suggests using a sample size o f 200 as a simple rule o f thumb. Gefen et al. (2000)
62
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
recommends having a sample o f at least 100-150 cases. Authors have cautioned against
using sample sizes below 100 (Fomell, 1983; Kline, 1998). Loehlin (1992) recommends
at least 100 cases, and preferably 200. Based on literature, the study will utilize a
Data for this study will be gathered by a survey instrument (see instrument in
Appendix B). The survey will be administered to students and will gather information
related to the different factors examined in this chapter (see Table 3).
3.5. SUMMARY
presented along with justifications for the different components o f the model. The
research hypotheses to be tested are outlined, along with the instruments used to measure
these components. The sample needed to perform this study is discussed, as well as the
The next chapter (Chapter 4) will include the analysis o f the results o f this study
as well as any information regarding the sample. Chapter 5 would include a discussion o f
the statistical findings in Chapter 4, study conclusion, research limitations, and future
research.
63
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Chapter 4: Results
4.1. INTRODUCTION
presented. The different hypotheses put forward in Chapter 3 are tested using statistical
techniques outlined in the previous chapter. Section 4.2 includes a brief description o f
information about the subjects that participated in this study. Section 4.4 includes a
discussion about missing values and the analysis undertaken to resolve this problem.
Section 4.5 details different reliability and validity (construct validity) tests that were
performed on the data collected. In Section 4.6, a thorough examination o f the research
model (and the individual hypotheses) is outlined using regression and structural equation
ADMINISTRATION
developed using various instruments from previous research (see Chapter 3). An
elicitation study was conducted to elicit the salient beliefs subjects held with regard to
digital piracy. In addition to eliciting beliefs, the elicitation study served another
purpose. The elicitation study was also used to verify that subjects held the same salient
beliefs toward different kinds o f piracy (software piracy versus digital piracy).
64
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Appendix C contains the questionnaires used to elicit the beliefs, as well as a table
showing the results o f the elicitation study. 123 students (54 males, and 69 females) were
used in the elicitation study with an average age o f 21.6 years. The study verified that
subjects held the same beliefs towards different types o f piracy. The study also provided
the salient beliefs used in this study. A total o f 7 salient beliefs were identified (see
Chapter 3 for detailed discussion) and the following table identifies the salient beliefs.
Belief
Belief
Number
1 Saving money
2 Digital media is overpriced
3 Authors/developers lose money
4 Pirating is convenient
5 Might get caught
6 Might not work as well as the original/purchased version
7 Save time by pirating
Using previous (validated and reliable) instruments, the study questionnaire was
developed. The questionnaire contained reverse items to check for any inconsistencies in
the data collected. A pretest was conducted to check for ambiguous and vague items in
the questionnaire, and to check for any problems in the questionnaire. The questionnaire
was administered to a group o f faculty members and Ph.D. students. The group filled out
the questionnaire while examining it for any potential problems. After discussing the
items were modified that were somewhat ambiguous, and some cosmetic changes were
made to the questionnaire) and further tested again in a classroom setting. The
(regarding the clarity o f questions) were reported by the students, and the students
65
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
completed filling the questionnaire within 25 minutes. Preliminary data from this pilot
For the final sample, sophomore, junior, senior, and graduate classes were
selected for questionnaire administration. Faculty was contacted for permission to use
their class as subjects for this study. The questionnaire was administered throughout a
two week period at a business college in a university in the Midwest. The questionnaire
included an introduction section which described the digital piracy concept, and the
purpose o f this study, among other standard sections (see Appendix D for a copy o f the
administered questionnaire).
SUBJECTS
sophomore class, 7 junior classes, 2 senior classes, and 1 graduate class). A total o f 292
questionnaires were returned from these classes. In this section, a detailed demographical
The average age for the students was 23.5 years, with the youngest subject at 18,
and the eldest subject at 58. 171 (58.6%) male students and 121 (41.4%) female students
participated in the study. The students had an average GPA o f 3.1, and an average full
time work experience o f 2.3 years. The majority o f the students (76.7%) were either in
their junior or senior year. The following table shows a breakup o f the level o f students
66
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Frequency Percent
Freshman 16 5.5%
Sophomore 13 4.5%
Junior 106 36.3%
Senior 118 40.4%
Graduate 31 10.6%
Other 8 2.7%
Total 292 100.0%
The following table shows a breakup o f the subjects' majors as filled in the
questionnaire. More than half the students are majoring in information systems, and
Frequency Percent
Information Systems 157 53.8%
Marketing 53 18.2%
Finance 26 8.9%
General Business 21 7.2%
Accounting 12 4.1%
Management 6 2.1%
Other 17 5.8%
Total 292 100.0%
As expected, a majority (about 83%) o f the subjects in this study were single.
The following table shows a breakup o f the marital status o f the respondents as answered
in the questionnaire.
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
As for work experience, since the sample population was a student sample, most
students reported no full-time work experience (50.2%). The following table shows a
A total o f 292 questionnaires were collected for this study. 7 questionnaires were
questionnaires were discarded because one or more pages were left unanswered.
O f the remaining 285 questionnaires, there were also 23 questionnaires that had
missing data. These questionnaires had at least one missing value item (no more than 4
researchers have several options to pursue when faced with missing data. These options
include deleting variables, deleting cases, or estimating variables. Since the number o f
missing items was relatively low (1 to 4 items per questionnaire), and since all o f the
estimation dependent variables), a decision was made to estimate the missing variables.
According to Schwab (1999), mean estimating is the most popular way to estimate
68
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
missing scores. This is done by replacing the missing scores with the mean score for that
variable across the subjects. A total o f 45 missing scores were replaced in this study.
After dealing with missing values, a total o f 285 questionnaires were deemed
acceptable for use in this study. In the next section, an examination o f construct validity
4.5.1. Unidimensionality
single trait (and no other). One method o f checking unidimensionality is through the use
o f Exploratory Factor Analysis (EFA) (Pedhauzr and Schmelkin, 1991). EFA is applied
to each o f the constructs in this study and the factor structure o f each construct is
examined. The factor structure o f each constmct should correspond to one factor (or
more than one if the theory dictates that). The following paragraphs entail a detailed
The importance scale was made up o f four items (see Chapter 3). EFA extracted
1 factor accounting for 83.9% o f the variance. Appendix D shows the actual EFA output
69
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
4.5.1.2 Affective scale
The feelings scale was made up o f nine items (see Chapter 3). The first six items
are associated with happiness and excitement, while the latter three items are related to
distress. EFA extracted 2 factors accounting for 81.4% o f the variance. The first factor
extracted loaded on the first six items (happiness and excitement), and the second factor
extracted loaded on the last three items (distress). Appendix D shows the actual EFA
The attitude scale was made up o f four items (see Chapter 3). EFA extracted 1
factor accounting for 78.8% o f the variance. Appendix D shows the actual EFA output
The revised subjective norms scale was made up o f three items (see Chapter 3).
EFA extracted 1 factor accounting for 58.1% o f the variance. Appendix D shows the
The Machiavellianism scale was made up o f 20 items (see Chapter 3). According
to the scale developers (Christie and Geis, 1970), the scale is composed o f three different
factors (negativism, duplicity, and distrust). EFA extracted 3 factors accounting for
39.5% o f the variance. The loadings o f the individual items corresponded to the original
structure (as suggested by the authors) except for one item. The second item “The best
way to handle people is to tell them what they want to hear” had loaded on the
negativism scale instead of the duplicity scale (as suggested in the literature). W hile this
70
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
item is regarded as one representing deceiving people (duplicity), it can also be viewed as
was made to keep that item with the negativism factor. Appendix D shows the actual
The perceived behavioral control scale was made up o f five items (see Chapter 3).
EFA extracted 1 factor accounting for 68.1% o f the variance. Appendix D shows the
The moral obligation scale was made up o f three items (see Chapter 3). EFA
extracted 1 factor accounting for 78.8% o f the variance. Appendix D shows the actual
The intention scale was made up o f three items (see Chapter 3). EFA extracted 1
factor accounting for 96 .2 % o f the variance. Appendix D shows the actual EFA output
4.5.2. Reliability
A construct is reliable (hence the term reliability) if all the measures are
consistent, stable, and free o f random error (O'Leary-Kelly and Vokura, 1998).
Cronbach’s alpha has been commonly used as a measure o f reliability (Pedhauzr and
71
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Schmelkin, 1991), and an alpha value o f 0.7 and above has been used as a lower limit for
reliable measures (Nunnaly, 1978). To further increase the reliability o f the scales, any
problematic items (ones that decrease the reliability o f the scale) should be removed from
the scale.
The importance scale was made up o f four item s (see Chapter 3). Cronbach’s
alpha for this scale was 0.936. This value is acceptable and w ithin the recommended
guidelines (Nunnaly, 1978). No items were removed. Appendix D shows the actual
The feelings scale was made up o f nine items (see Chapter 3). The first six items
were associated with happiness and excitement, while the latter three items were related
to fear and nervousness (will be referred to as distress). C ronbach’s alpha for the first six
items scale was 0.943, and 0.91 for the last three items. C ronbach’s alpha for the full
scale was .863. These values are acceptable and w ithin the recommended guidelines
(Nunnaly, 1978). No items were removed. Appendix D shows the actual reliability
The Attitude scale was made up o f four items (see Chapter 3). Cronbach’s alpha
for this scale was 0.909. This value is acceptable and w ithin the recommended guidelines
(Nunnaly, 1978). No items were removed. Appendix D shows the actual reliability
72
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
4.5.2.4. Subjective norms scale
The Subjective Norms scale was made up o f three items (see Chapter 3).
Cronbach’s alpha for this scale was 0.637. This value was not acceptable. Taking a
closer look at the output, there seemed to be a problem with the second item. While the
first and third items were related to the opinion o f others toward digital piracy, item 2
was related to the degree o f compliance with these opinions. Item 2 was removed, and
the modified scale had a Cronbach’s alpha o f 0.757. Flannery and May (2000) reported
an alpha value o f .6 in their study, and reported that this measure has produced lower
reliabilities in other studies. However, this value is acceptable and within the
The Machiavellianism scale was made up o f twenty items (see Chapter 3).
Cronbach’s alpha for this scale was 0.717. To further improve this scale, a closer look at
the reliability analysis identified some problematic items that should be removed
(Pedhauzr and Schmelkin, 1991). Item 20 was removed, which increased the alpha value
to 0.722. Item 17 was removed, which increased the alpha value to 0.732. Item 3 was
removed, which increased the alpha value to 0.735. Item 19 was removed, which
increased the alpha value to 0.737. Item 15 was removed, which increased the alpha
value to 0.738. No other item’s removal would increase Cronbach’s alpha, and a
decision was made to stop at this point. This value is comparable with other findings that
reported the alpha value for this scale to be 0.62 (Singhapakdi and Vitell, 1992), 0.76
(Hunt and Chonko, 1987), and 0.79 (Christie and Geis, 1970). This final alpha value o f
73
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
0.738 is acceptable and within the recommended guidelines (Nunnaly, 1978). Appendix
To further verify our findings, we compared the Machiavellianism score from this
study with other similar studies. The average score for this scale was 90.5 in this study.
This is comparable to other studies which reported scores o f 84.5 (Christie and Geis,
1970), 85.7 (Hunt and Chonko, 1987), and 90.9 (Singhapakdi and Vitell, 1992). The
average score was based on summing the item scales, and adding a constant score o f 20
to the overall score as recommended by the scale developers (Christie and Geis, 1970).
The Perceived behavioral control scale was made up o f five items (see Chapter 3).
Cronbach’s alpha for this scale was 0.943. This value is acceptable and within the
The Moral obligation scale was made up o f three items (see Chapter 3).
Cronbach’s alpha for this scale was 0.76. This value is acceptable and within the
recommended guidelines (Nunnaly, 1978). Further, other studies have reported similar
values for their moral obligation scale (Beck and Ajzen, 1991, reported 0.71, 0.78, 0.79;
Kurland, 1995, reported 0.71; Flannery and May, 2000, reported 0.85). No items were
removed. Appendix D shows the actual reliability estimates for this scale.
The intention scale was made up o f three items (see Chapter 3). Cronbach’s alpha
for this scale was 0.979. This value is acceptable and within the recommended guidelines
74
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
(Nunnaly, 1978). No items were removed. Appendix D shows the actual reliability
Since the moral judgment scale (represented by the P-index) is a 1 item scale, no
reliability information can be obtained from this item. However, a comparison o f scores
in other studies would be an appropriate measure to check if these results are within the
normal scores. The average score for the P-index was 33.2. This is comparable to Rest
et al’s (1986) study where a score o f 33.7 was reported for college seniors.
Based on the previous discussion, the scales used in this questionnaire were found
to be reliable.
and discriminant validity. Convergent validity is a measure o f how well the items load
by checking the correlations between the factors, and whether they are significantly
As discussed earlier, convergent validity is a measure o f how well the items load
loadings on their corresponding factor (Confirmatory Factor Analysis, CFA) for each o f
the scales in the study (Pedhauzr and Schmelkin, 1991). The following is a discussion o f
75
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
4.5.3.1.1. Im portance scale
The importance scale was made up o f four items (see Chapter 3). Using CFA, all
o f the items loadings on the factor were found to be significant (with the lowest p-value
being 0.00). Appendix D shows the actual CFA test results for this scale.
The feelings scale was made up o f nine items (see Chapter 3). The first six items
are associated with happiness and excitement, while the latter three items are related to
distress. On both CFAs, all o f the items loadings on its factor were found to be
significant (with the lowest p-value being 0.00). Appendix D shows the actual CFA test
The attitude scale was made up o f four items (see Chapter 3). Using CFA, all o f
the items loadings on the factor were found to be significant (with the lowest p-value
being 0.00). Appendix D shows the actual CFA test results for this scale.
The subjective norms scale was made up o f two items (see Chapter 3, and
reliability analysis in the previous section). Using CFA, all o f the items loadings on the
factor were found to be significant (with the lowest p-value being 0.00). Appendix D
The revised Machiavellianism scale was made up o f 15 items (see Chapter 3, and
reliability analysis in the previous section). According to the scale developers, the scale
is composed o f three different factors (negativism, duplicity, and distrust). Running CFA
76
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
on each factor (with the corresponding items), each item’s loading on its factor was
significant (with the lowest p-value to be 0.00). Appendix D shows the actual CFA test
The perceived behavioral control scale was made up o f five items (see Chapter 3).
Using CFA, all o f the items loadings on the factor were found to be significant (with the
lowest p-value being 0.00). Appendix D shows the actual CFA test results for this scale.
The moral obligation scale was made up o f three items (see Chapter 3). Using
CFA, all o f the items loadings on the factor were found to be significant (with the lowest
p-value being 0.00). Appendix D shows the actual CFA test results for this scale.
The intention scale was made up o f three items (see Chapter 3). Using CFA, all
o f the items loadings on the factor were found to be significant (with the lowest p-value
being 0.00). Appendix D shows the actual CFA test results for this scale.
Based on the previous discussion, convergent validity has been established for the
approach with a two model comparison (Venkatraman, 1989), and an approach where the
correlations between the latent variables are tested and checked to see they are different
77
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
than 1 (Bagozzi and Phillips, 1991). The second approach was used to test for
discriminant validity.
Using Fisher’s Z-transform test, a test o f the correlations between the factors is
performed. According to Bagozzi and Phillips (1991), each correlation is tested against
the perfect correlation o f 1. For better reliability, the correlations tested in this study will
be tested against a stringent value o f 0.7 (all factor correlations were less than 0.6, so no
Package for the Social Sciences, version 10) software, the correlations were tested to be
equal to 0.7. The null hypothesis being tested was whether the correlation between each
factor is 0.7. For all o f the correlations, the null hypothesis was rejected (see table at
Appendix D) at the 0.00 level. None o f the correlations between the factors was found to
be highly correlated (at the 0.7 correlation). This demonstrates discriminant validity for
this questionnaire.
Based on the previous discussion, construct validation for the questionnaire has
been established. Because o f the many scales used in this study, the following table
summarizes the findings from the previous section (please refer to the previous section
78
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Scale Unidimensionality Reliability Convergent
3 Factors (as All items loaded
Machiavellianism
suggested by a = 7384 significantly on
(15 items)
literature) factor
All items loaded
Importance
1 Factor a = .936 significantly on
(4 items)
factor
2 Factors All items loaded
Affective
(happiness and a = .862 significantly on
(9 items)
fear) factor
All items loaded
Attitude
1 Factor a = .908 significantly on
(4 items)
factor
All items loaded
Subjective Norms
1 Factor a = .757 significantly on
(2 items)
factor
All items loaded
PBC
1 Factor a = .943 significantly on
(5 items)
factor
All items loaded
Moral Obligation
1 Factor a = .76 significantly on
(3 items)
factor
All items loaded
Intention
1 Factor a = .979 significantly on
(3 items)
factor
After establishing construct validity for the scales used in this study, the next step
Since there are two dependent variables (attitude and intention), this section will
examine the hypotheses relating to each dependent variable separately. For each
79
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Before looking at the results o f the study, a visit back to the research model is
warranted. The following diagram represents the research model for this study.
Moral
Judgment
Iravidual
Attributes
Affective
Beliefs
Cognitive
Beliefs
4 Behavior
Perceived
Behavioral
Control
The next section will examine the assumptions and results related to the
follows:
80
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Moral
Judgment
Individual
Attributes
Affective
Beliefs
A ttitude
Cognitive !
Beliefs !
Subjective
Norms
conducted.
Checking for normality entails checking a plot o f the predicted values versus the
residuals (Tabachnick and Fidell, 1996). The plot (shown in Appendix D) is random and
does exhibit normality. Another test to check for normality is done by administering the
Shapiro-Wilk normality test. The p-value for this test was 0.3 (see Appendix D for actual
output), meaning that we fail to reject the hypothesis that the residuals are not normally
distributed, and conclude that the normality assumption has been met.
81
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
4.6.1.1.2. H omogeneity o f variance
(1980) test has been commonly used to test for homogeneity o f variance. This was
tested using the SAS (version 8) program (with the /spec option). The p-value for the test
was 0.83 (see Appendix D for the complete output), thus, we reject the null hypothesis
and conclude that the error variances are not statistically different. Thus, the data
4.6.1.1.3. M ulticollinearity
which can cause problems with the regression model. Regression models with high
multicollinearity can cause insignificant results when they should be significant, and/or
One way to check for multicollinearity artifacts is done by examining the variance
inflation factors (VIF). VIF measure how much o f the variance in the predicted variables
is inflated because o f correlations between the variables. VIF values have been
The following table shows the VIF values for the different variables within the
attitude model.
82
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Variable VIF
Sex 1.074
Age 1.201
P-Index 1.029
Cognitive 1.220
Happiness & Excitement 1.283
Distress 1.379
Mach 1.100
Subjective Norms 1.420
Importance 1.156
indication o f multicollinearity, and VIF values between 5 and 10 are considered suspect
with regard to presence o f multicollinearity. Examining the table, none o f the variables
had a high VIF value (the highest VIF value was 1.42). This would indicate that the
possibly deleted because o f their statistical influence on the model. One way to detect
outliers, is through checking the standardized residuals for data points that fall outside 3
standard deviations (Tabachnick and Fidell, 1996). Three observations (outliers) were
influencing attitude (explaining attitude, and not predicting attitude). While there are
stepwise regression is considered to be the best o f the three (Tabachnick and Fidell,
83
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
1996). In stepwise regression, the regression model starts out with no independent
also be deleted for the model when it is no longer significantly (statistically) contributing
Using SPSS software, a stepwise regression was performed on the attitude model.
The following table shows the output o f the stepwise regression (significant and non
Standardized
t-value Significance
Coefficients
Subjective Norms .342 6.647 .000
Happiness & Excitement .290 5.863 .000
Importance -.165 -3.442 .001
Age -.115 -2.353 .019
Machiavellianism .086 1.821 .070
Cognitive .089 1.809 .072
Distress -.043 -.812 .417
P-Index -.040 -.870 .385
Sex .007 .158 .874
The following section details the results o f the individual hypotheses described in
Chapter 3.
4.6.1.1. Sex
Sex of the subject was hypothesized to affect attitude towards digital piracy.
Males were expected to have a higher (more favorable) attitude toward digital piracy than
H I: Females will have a low er attitude towards digital p ira cy than males
84
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Examining the results o f the stepwise regression, sex was not a significant
variable influencing attitude. The following table shows the result o f the stepwise
Standardized
t-value Significance
coefficient
Sex .008 .164 .870
The correlation between sex and attitude was -0.078. The correlation had a
negative value, indicating that males (scored as a 0) had a higher attitude (although small)
towards digital piracy than females (scored as a 1). Going further, a test o f the mean
attitude value was compared between males and females; the following table shows the
Standard
Sex Mean N
Deviation
Male 4.3553 162 1.42085
Female 4.1240 113 1.51025
Total 4.2603 285 1.46004
These results indicate that (as expected) males have a higher (more favorable)
attitude towards digital piracy than females (males had an attitude score o f 4.3S, while
females had an average attitude o f 4.12. A subsequent t-test was performed between the
two groups, and found that there was no significant differences between the two groups
While there were differences in the overall attitude between males and females,
these differences were not significant statistically. Based on this, w e reject the HI
85
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
hypothesis, and conclude that there are no differences between males and females
4.6.1.2. Age
Age o f the subject was hypothesized to affect attitude towards digital piracy.
Older subjects were expected to have a lower (less favorable) attitude toward digital
H 2: O lder subjects will have a low er attitude towards digital piracy than yo u nger
subjects
Examining the results o f the stepwise regression, age was a significant variable
influencing attitude. The following table shows the result o f the stepwise regression
Standardized
t-value Significance
Coefficients
Age -.115 -2.353 .019
Table IS: Age as a variable influencing attitude
The standardized beta value for age was -0.115. The beta had a negative value,
indicating that older subjects had a lower attitude towards digital piracy than younger
subjects. Going further, a test o f the mean attitude value was compared between different
age groups (used the cutoff of 25 years old), the following tables shows the results o f that
test.
Standard
Age N Mean
Deviation
C4
59 3.5413 1.66478
A
It
These results indicate that (as expected) younger subjects had a higher (and
86
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Based on the previous discussion, we accept the H2 hypothesis, and conclude that
older subjects have a lower (less favorable) attitude towards digital piracy than younger
subjects.
4.6.1.3. Machiavellianism
and a significant variable influencing attitude. The following table shows the result o f
Standardized
t-value Significance
Coefficients
Machiavellianism .086 1.821 .070
Machiavellianism was a significant variable affecting attitude (at the 0.1 level).
Perceived importance was hypothesized to affect attitude negatively. That is, the
higher the importance, the lower the attitude toward digital piracy. The hypothesis was
framed as follows:
H4: The higher the importance o f the issue w ill be, the lo w er the attitude towards
digital piracy
87
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Examining the results o f the stepwise regression, perceived importance was a
significant variable influencing attitude. The following table shows the result o f the
Standardized
t-value Significance
Coefficients
Importance -.165 -3.442 .001
higher the perception o f importance, the lower the attitude towards digital piracy would
be. Hypothesis 4 is then accepted, and we conclude that individuals tend to have a lower
attitude towards an ethical issue when they perceive the issue to be an important one.
Moral judgment is represented by the P-index score. This index has been
commonly used as an overall score o f moral judgment (Rest, Narvaez et al., 1999). The
P-index represents the percentage o f the time subjects make decisions based on high
moral judgment areas (level 5 or 6). Scores for this variable ranged from 0 to 85, with
H5: Subjects with higher m oral ju d g m e n t will have a low er attitude towards
digital piracy
Examining the results o f the stepwise regression, moral judgment was not a
significant variable influencing attitude. The following table shows the result o f the
Standardized
t-value Significance
coefficient
P-Index -.040 -.870 .385
88
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
While the direction of the relationship (-0.040) is negative (as predicted), the
relationship between moral judgment and attitude was found to be not significant. Thus,
H5 hypothesis is rejected.
Cognitive beliefs were hypothesized to affect attitude positively. That is, the
higher the beliefs, the higher the attitude toward digital piracy. The hypothesis was
framed as follows:
Examining the results of the stepwise regression, cognitive beliefs were found to
be significant in their effect on attitude. The following table shows the result o f the
Standardized
t-value Significance
Coefficients
Cognitive beliefs .089 1.809 .072
the higher/favorable the beliefs, the higher/favorable the attitude is towards digital piracy.
beliefs were supposed to affect attitude positively. The feeling o f distress was
H8: High excitem ent and happiness feelin g s sh o u ld correspond with higher
altitude towards digital piracy, a n d high distress fe e lin g s w ould correspond with
low er attitude tow ards digital p ira cy
89
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Examining the results o f the stepwise regression, excitement and happiness
feelings were a significant variable influencing attitude, but distress feelings were not.
The following table shows the result o f the stepwise regression analysis (with attitude as
a dependent variable).
Standardized
t-value Significance
Coefficients
Happiness & Excitement .290 5.863 .000
Distress -.043 .417
NJ
00
I
Table 21: Feelings as a variable influencing attitude
attitude. Individuals who feel happy/excited when pirating digital media tend to have a
higher/favorable attitude towards digital piracy. Distress, on the other hand, was not a
significant predictor o f attitude. Distress was, however, related negatively (although not
Subjective norms were hypothesized to affect attitude positively. That is, the
higher approval from important others regarding digital piracy, the higher the attitude
H I Ob: H igher subjective norms w ill correspond with higher attitude towards
digital p ira cy
Examining the results o f the stepwise regression, subjective norms were a highly
(at the 0.00 level) significant (and a positive) predictor o f attitude. The following table
shows the result o f the stepwise regression analysis (with attitude as a dependent
variable).
90
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Standardized
t-value Significance
Coefficients
Subjective Norms .342 6.647 .000
would imply that the opinion o f important others does affect one's attitude. Hypothesis
variables:
o f 0.436. Moral judgment, distress, and sex were not significant variables in the
regression model.
variables as follows:
91
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Attitude
Subjective
Norms
Intention Behavior
Perceived
Behavioral
Control
Moral
Obligation
related to regression analysis and an outlier analysis should be performed. For regression
4.6.2.1.1. Normality
Checking for normality entails checking a plot o f the predicted values versus the
residuals (Tabachnick and Fidell, 1996). The plot (shown in Appendix D) is random and
does exhibit normality. Another test to check for normality is done by administering the
Shapiro-Wilk normality test. The p-value for this test was tested as 0.38 (see Appendix
D for actual output), meaning that we fail to reject the hypothesis that the residuals are
not normally distributed, and conclude that the normality assumption has been met.
92
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
4.6.2.1.2. H om ogeneity o f variance
(1980) test has been commonly used to test for homogeneity o f variance. This was
tested using the SAS program (with the spec option). The p-value for the test was .62
(see Appendix D for the complete output), thus, we reject the null hypothesis and
4.6.2.1.3. M ulticollinearity
To check for multicollinearity artifacts, variance inflation factors (VEF) scores are
examined. VIF measure how much o f the variance in the predicted variables is inflated
because o f correlations between the variables. VIF values have been commonly used as a
The following table shows the VIF values for the different variables in the
intention model.
Variable VIF
Moral Obligation 1.903
Perceived Behavioral Control 1.224
Subjective Norms 1.885
Attitude 1.624
indication o f multicollinearity, and VIF values between 5 and 10 are considered suspect
with regard to presence o f multicollinearity. Examining the table, none o f the variables
had a high VDF value (the highest VIF value was 1.90). This would indicate that the
93
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
4.6.2.1.4. O utlier analysis
possibly deleted because o f their statistical influence on the model. One way to detect
outliers is through checking the standardized residuals for data points that fall outside 3
standard deviations (Tabachnick and Fidell, 1996). Based on that, two observations were
influencing attitude. Using SPSS software, the attitude model was tested using stepwise
regression. The following table shows the output o f the stepwise regression (all the
variables included).
Standardized
t-value Significance
Coefficients
Moral Obligation -.338 -6.316 .000
PBC .347 8.075 .000
Attitude .203 3.801 .000
Subjective Norms .105 2.127 .034
The following section details the results o f the individual hypotheses described in
Chapter 3.
4.6.2.2. Attitude
H9: H igher (m ore favorable) attitude w ill correspond with higher intention to
pira te digital media
94
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Examining the results of the stepwise regression, attitude was a significant
predictor o f intention. The following table shows the result of the stepwise regression
Standardized
t-value Significance
Coefficients
Attitude .203 3.801 .000
and we conclude that subjects with high (more favorable) attitude will tend to have a
HlOa: H igher subjective norms w ill correspond with higher intention towards
digital p ira cy
significant predictor o f intention. The following table shows the result o f the stepwise
Standardized
t-value Significance
Coefficients
Subjective norms .105 2.127 .034
As expected, there was a positive (and significant) relationship between subjective norms
95
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
intentions regarding digital piracy is positively affected by the approval o f significant
others.
was a significant predictor o f intention. The following table shows the result o f the
Standardized
t-value Significance
Coefficients
PBC .347 8.075 .000
expected, there was a positive relationship between perceived behavioral control and
intention. Hypothesis HI 1 is then accepted, and we conclude that subjects that have the
ability and resources to pirate digital media will tend to have a higher intention towards
H6: Individual with higher m oral obligation w ill have a low er intention to
perform ing a behavior
96
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Examining the results o f the stepwise regression, moral obligation was a
significant predictor o f intention. The following table shows the result o f the stepwise
Standardized
t-value Significance
Coefficients
Moral obligation -.338 -6.316 .000
Moral obligation was a highly (at the 0.00 level) significant variable negatively
obligation and intention. Hypothesis H6 is then accepted, and we conclude that subjects
with high moral obligation will tend to have a lower intention towards pirating digital
material.
variables:
All o f the variables in the models were significant in predicting and explaining
intention. Results o f the stepwise regression analysis resulted in a model with an overall
R2 o f 0.586.
In this section, a summary o f the findings is presented. For the attitude model, six
out o f the nine variables were found to be significant. The significant variables are as
97
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
subjective norms, and Machiavellianism. Moral judgment, distress, and sex were not
The following diagram shows the resulting attitude model that includes the actual
values from the statistical analysis (significant relationships are in bold, and the values on
the lines represent the beta value and its significance between parentheses).
Distress
o
o
•>1
Happiness and CO
Excitement
I Moral
i Judgment
! Importance • R2 = 43.6%
' Subjective
Norms
As for the intention model, all o f the variables were found to have a significant
relationship with intention. These variables are: attitude, subjective norms, perceived
behavioral control, and moral obligation. The following diagram shows the intention
model that includes the actual values from the analysis (significant relationships are in
bold, and the values on the lines represent the beta value and its significance between
parentheses).
98
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Attitude
Subjective
Norms
Intention
Behavioral
Control
R2 = 58.6%
Moral
Obligation
99
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Hypothesis Result P-Value
H I : Females will have a lower attitude towards digital
Rejected 0.870
piracy than males
H2: Older subjects will have a lower attitude towards
Accepted 0.019
digital piracy than younger subjects
H3: Individual with high Machiavellianism w ill have a
Accepted 0.070
higher attitude towards digital piracy
H4: The higher the importance o f the issue w ill be, the
Accepted 0.001
lower the attitude towards digital piracy
H5: Subjects with higher moral judgment will have a
Rejected 0.385
lower attitude towards digital piracy
H6: Individual with higher moral obligation will have a
Accepted 0.000
lower intention to performing a behavior
H7: Positive/Higher beliefs/evaluations will correspond
Accepted 0.072
to higher attitude towards digital piracy
H8: High excitement and happiness feelings should 0.000
correspond with higher attitude towards digital piracy, Partially (happiness)
and high distress feelings would correspond w ith lower Accepted and 0.417
attitude towards digital piracy (distress)
H9: Higher (more favorable) attitude will correspond
Accepted 0.000
with higher intention to pirate digital media
HlOa: Higher subjective norms will correspond with
Accepted 0.034
higher intention towards digital piracy
H I0b: Higher subjective norms will correspond with
Accepted 0.000
higher attitude towards digital piracy
HI 1: Higher perceived behavioral control would
Accepted 0.000
correspond to higher intention to pirate digital media
The next step of the analysis was to examine the model using SEM. Using the
AMOS SEM (version 4) package, a test o f the overall model is performed, and based on
the modification indices (that improve the model fit) suggested by the software, a new
Using the AMOS package, the model fit was tested with the data. Several
indicators are examined for fit. Gefen et al. (2000) introduced heuristics for SEM model
100
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
fit to be used in IS research. These heuristics include chi-square (x2), X2 / degrees o f
freedom, Goodness o f Fit Index (GFI), Adjusted Goodness o f Fit Index (AGFI), and
Normative Fit Index (NFI). The heuristics are compared to the actual results o f the
model fit as shown in the table below (see Appendix D for actual output o f the AMOS
software package).
While x 2 was significant, three o f the other indices were above the accepted
limits, and NFI was very close to the accepted limit (0.89 instead o f 0.9). Overall, given
that this research is exploratory in nature, the model fit seems to be acceptable.
Not only does an SEM package like AMOS allow us to assess model fit, it can
modification indices, relationships between the variables are altered in a way to increase
Based on the modification indices, a new model is formed (see Appendix D for
actual output o f the AMOS software package) as shown in the following diagram (only
101
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Happiness and
Cognitive Sex
Excitement
Age
. _ ! -.08 (.09 )
Importance j------------- 5— -
Attitude
.20 (. 00)
-.42 (.00 )
Intention
I Behavioral
i Control
Attitude R2 - 52.0%
Obligation
Intention R2 = 63.3%
The modified model had an R2 for attitude o f .52, and an R2 for intention o f .633.
As for the model fit, the following table examines the fit heuristics for this modified
model.
Again, the modified model had a good fit (4 out o f 5 indices met or exceeded
guidelines) and a better fit than the original model (as expected). As for the modified
predictor o f intention
102
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
• Cognitive beliefs were a significant predictor o f intention, instead o f attitude
intention
on intention
4.7. SUMMARY
The next section included demographical information about the subjects who participated
in the study. Missing value analysis was used to replace missing data from the
test o f the hypotheses from Chapter 3 was included in the next section using stepwise
regression analysis. The last section examined the model using SEM techniques, and a
modified model that had a better fit was examined based on the modification indices. In
the next and final chapter, a detailed discussion o f the results, implications o f this
research, limitations o f this study, and future research directions will be examined.
103
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Chapter 5: Conclusion
5.1. INTRODUCTION
In this chapter, the results o f the study will be examined and discussed in detail.
Based on the results o f this study, implications to the real world are discussed that will
implications are also discussed. Study limitation will be examined in detail in section 5.
Section 6 will include future research directions based on the results o f this study. This
chapter (and study) will conclude with a summary section that briefly describes the study
and results.
5.2. DISCUSSION
In this section, a discussion o f the results from the study is presented. The
questionnaire developed for this study has demonstrated strong construct validity (see
Chapter 4). The data was shown to be normally distributed, and checks for statistical
The next section will contain a detailed examination o f the results o f each
hypothesis tested in Chapter 4. Implication o f these results will also be presented in this
section.
5.2.1. Sex
Sex o f the subject was not found to be a significant predictor o f attitude. While
females had a lower attitude towards digital piracy as expected (see Chapter 4), that
104
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
difference was not statistically significant. In the ethics literature, different studies have
influencing ethical decision making (see Chapter 2 and 3). Researchers argue that this
might be an artifact o f the situation itself (Baneijee et al., 1998), and that different ethical
situations are affected by different variables which might be the case here. Other ethical
decision making studies could still find sex to be significant under different ethical
situations.
However, sex was found to be a significant predictor o f intention (in the modified
model based on the SEM analysis). That, however, could be attributed to the fact that sex
was correlated highly with PBC (males had a much higher PBC score than females),
5.2.2. Age
Age o f the subject, on the other hand, was a significant predictor o f attitude.
There was a negative relationship between age o f the subjects and their attitude towards
Standardized
t-value Significance
Coefficients
Age -.115 -2.353 .019
The correlation between age and attitude was a -0.34. Older subjects had a lower
attitude towards digital piracy. This is consistent with previous ethics research that found
that older subjects are usually more ethical than younger subjects (Ford and Richardson,
1994). Age also had a negative relationship with intention (although not as strong as the
105
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
5.2.3. Machiavellianism
effect on other variables as shown in table 23). Females had a lower machiavellianism
score than males (a significant correlation o f -.16). Younger subjects also exhibited
Also, highly machiavellian subjects had a higher subjective norms score that would imply
Machiavellianism had its biggest effect on moral obligation, where the correlation
was a significant -0.30. The implication is, that highly machiavellian individuals feel less
guilt towards performing unethical behavior than others, thus, having a higher intention
intention).
106
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
That is, subjects who viewed digital piracy as an important issue, had lower attitude
towards digital piracy than ones that viewed digital issue as an unimportant issue. This
finding is consistent with how Robin et al. (1996) envisioned this variable effect on
ethical decision-making. The following table shows the difference between subjects'
attitude according to how they perceived the importance o f digital piracy (on a scale
Clearly, there is a difference between the attitude means o f subjects who viewed
digital piracy as low versus high (p-value o f 0.00). Perceived importance also was highly
correlated to moral obligation (a correlation o f 0.34). Implying, that subjects that felt that
digital piracy was an important issue, had a higher feeling o f guilt towards performing the
behavior; And thus, effecting intention through its effect on moral obligation.
closer look at the data, the highest correlation with moral judgm ent was found to be with
moral obligation. This would make sense, as subjects with a high moral judgment would
107
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
5.2.6. Cognitive beliefs
Cognitive beliefs were significant predictors o f attitude (at the 0.1 level). The
salient beliefs consisted o f seven separate beliefs related to: saving money, saving time,
convenience, getting caught, functioning as well the original media, being overpriced,
and the fact that authors/developers are losing money because o f piracy. The following
table shows the means for the subjects' evaluation o f these beliefs (computed by
multiplying the probability o f the belief occurring times its importance, minimum score
Average
Belief (Belief x Importance)
Higher is better
Digital media is overpriced 35.5
Saving Money 33.5
Convenience 28.4
Developers/Authors losing money 22.9
Saving Time 20.3
Working as well as the original 17.5
Getting Caught 16.0
Examining the beliefs means, the highest two beliefs were related to money. The
most salient belief was related to the fact that subjects think that digital media is
overpriced (81.4% o f the subjects thought that digital media was overpriced). The
second most salient belief was the fact that digital piracy was a way to save money.
Digital piracy was also found to be convenient and easy to do. Subjects had a low fear of
getting caught and prosecuted (70.4% disagreed with the statement that they might get
caught). Also, subjects believed that their digital copies would work as well as the
108
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
original ones. These salient beliefs provide valuable insight into how individuals view
excitement formed one factor, with the other factor being distress. According to the data,
subjects did not distinguish between these two feelings (this might not be the case in
attitude.
Distress, on the other hand, was not found to be a significant predictor o f attitude.
This can be an indication that subjects didn't have any fears when pirating digital media
(this was consistent with the findings in the cognitive beliefs part regarding the fear o f
getting caught). The average distress feeling was 2.75 (with 7 being the highest emotion
o f distress), while the average value for happiness and excitement was a very high 6.21.
intention. The relationship was stronger between subjective norms and attitude than with
intention (.342 with attitude, versus .105 with intention). Overall, the average score for
subjective norms was 4.67 (on a scale between 1 and 7, with 7 representing high support
from significant others), indicating that the subjects view their significant ones as
109
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Subjective norms also had a strong relationship w ith moral judgment (r=0.S3). It
would seem like the opinion o f significant others would also affect one's moral obligation
toward a behavior.
5.2.9. Attitude
In this study, a major objective was to attempt to explain attitude, and try to
identify its antecedents. Re-examining the ethics literature, seven antecedents were
It was interesting to find that subjective norms accounted for the highest variance
in attitude. Also, when the SEM output was examined, a link was suggested between
moral obligation and attitude. Moral obligation was found to be a highly significant
predictor o f attitude, and when that link was added to the model, the model explained
It was also interesting to notice that attitude was not the best predictor of
intention. This might be because o f the high correlation between attitude and moral
obligation. When moral obligation was removed from the intention model (see Appendix
D for statistical output), the intention model did have a high explanatory power (R2 =
52.6%). Only then did attitude have the highest effect on intention (with a Beta o f .371).
110
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Standardized
t-value p-Value
Coefficients
Attitude .371 7.530 .000
PBC .369 8.065 .000
Subjective Norms .188 3.694 .000
PBC had the highest effect on intention (r=.347) in the original intention model.
That indicates that subjects who had the skills and resources to digital media, have a
higher intention o f pirating digital media. Further examining the data, subjects reported
that it was easy to pirate digital media. According to the data collected, 236 subjects
(84.3%) reported that it was easy or very easy to pirate digital media, and only 8 (0.3%)
found it hard or very hard to do. The average score for PBC was a high 5.5 (on a scale
It was interesting to see a large difference between males and females with regard
to PBC. The PBC score was a "very high" 5.8 (on a scale between 1 and 7, with 7
representing having high PBC)for males, and only 4.9 for females (on a scale between 1
subjects who felt guilt/moral obligation towards digital piracy had a lower intention o f
pirating digital media. The SEM analysis also found moral obligation to also affect
attitude (r=-0.54). The following table shows the correlation between moral judgment
Ill
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Correlation with
P-value
Moral obligation
Age 0.26 0.00
Attitude -0.65 0.00
Happiness & Excitement -0.31 0.00
Distress 0.39 0.00
Machiavellianism -0.30 0.00
Importance 0.34 0.00
Subjective Norms -0.53 0.00
Intention -0.64 0.00
Moral obligation was an interesting variable that was highly correlated with many
variables. Older subjects had a higher level o f moral obligation towards digital piracy.
Moral obligation significantly affected attitude negatively. That is, subjects who had a
feeling o f guilt/moral obligation had a lower attitude towards digital piracy. Moral
obligation was also strongly linked to the affective part (negatively towards happiness
and excitement and positively towards distress). Highly machiavellian subjects had less
feeling o f guilt (as expected). Also, significant others had a strong influence on moral
Moral obligation is an interesting variable that was highly correlated with other
variables in this study. Further investigation o f moral obligation will be discussed later in
this chapter.
In this section, several methods o f combating digital piracy in the real world are
presented. Obviously, a quick examination o f the cognitive beliefs subjects held as well
112
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
as other variables studied here would help provide us with means to better combat digital
The most salient belief was that subjects believed that they could save m oney by
pirating digital media. Another salient belief was that subjects believed that digital media
is overpriced. During a discussion with one group o f students in the sample, the issue
was raised that CDs cost less than a dollar to produce, but a music CD typically costs
around $20. While the students understand that there are royalties to be paid to the
artist/developer, they believed that the markup was way too high. This was also evident
in another belief (although not highly salient), that students believed that the
authors/developers made too much money, and that they will not get hurt if the students
copied their media. There has been a move recently to lower the price o f digital m edia to
curb piracy. By making the prices lower, pirates will reexamine the cost o f pirating
versus buying and hopefully tilt the balance towards buying versus pirating (Cheng et al.,
1997).
Another avenue that might be worthwhile pursuing is to better educate the public
on why these prices should be the way they are (by explaining the different costs
associated with making/promoting digital media). The RIAA (which has been leading
the fight against music piracy) does have a section on its web site to explain these costs
presented to the public, and not be hidden in a web site for the public to find.
113
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Obviously, an ideal method would be to use both o f these approaches. That is an
approach to lower prices, while explaining to the public why the costs are the way they
are.
Subjects believed that they would not get caught while pirating digital material.
This would obviously translate into lower deterrence towards pirating digital media
(Gopal and Sanders, 1997). While there have been some cases o f apprehending digital
were targeted at professional groups that copy and spread pirated material all over the
internet, and not the average digital pirate. Obviously, going after each individual pirate
One approach would be to expand the media coverage on these digital piracy
busts, and create new and tougher laws to combat against digital piracy. Another
approach would include using "smart digital media" software that would warn users
about the consequences of pirating when it detects an attempt to copy the media (thus,
Subjects believed that it was very easy to pirate digital material. That was
indicated in the PBC score (see discussion in section 5.2.10). Subjects believed that they
had both the skills and resources to pirate digital material. Subjects also found digital
piracy to be very convenient to do (the average score was 5.34 out o f 7). Every software
security mechanism used to prevent piracy has been breached (or will be eventually).
114
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
One method is to employ software protection within the operating system itself that could
controversial in nature, and plans to use them haven't been materialized yet
Digital Television Promotion Act) has been recently introduced to congress that would
make it illegal to manufacture any computer or electronic device that does not include
hardware protection mechanism within the system. If that bill is passed, it would mean
that all current computer and mp3 devices will be considered illegal
(http://www.wired.eom/news/politics/0,1283,51245,00.html).
The subjects also believed that they had the resources necessary to pirate digital
material (the average score was a high 5.5 out o f 7). CD burners are available at very
reasonable prices and blank CDs are even cheaper than computer floppy disks. One
option is to increase the cost/supply o f these resources needed for piracy. Germany, for
example, has started enforcing a charge on every CD burner that is sold to compensate
ap.html). By increasing the cost o f piracy and decreasing the cost o f the digital material,
Also, since students have access to high-speed internet access at their universities,
addition to the plethora o f peer-to-peer software that is used to exchange digital material
such as Napster, Audio galaxy, and morpheus among others. Universities have started to
115
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Many universities are now employing high-end firewalls to prevent the illegal trading o f
digital media. However, internet service providers that provide high speed internet
access (broadband) into homes are reluctant to block such software for fear o f losing
customers. Obviously, the next step would be to target ISPs and software makers (that
Subjects also didn't feel any guilt about pirating digital media. There was a low
level o f guilt (moral obligation) towards digital piracy. Significant others encouraged the
pirating act, and didn't believe it was wrong to do so. Subjects also didn't think that
authors/developers were losing money due to piracy, and they believed that
To combat these trends, society has to be informed o f how harmful piracy is. One
way is by using targeted ads like the ones targeting smoking in young teenagers.
Different harmful aspect o f piracy should be presented to consumers in the public opinion
court. Another way would be to enforce newer ethical codes o f conduct for information
systems professional that stress different types o f piracy (not just software) and its effect
the results o f the study. These include the role o f affect in determining attitude and
116
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
5.4.1. The role of affect
attitude and intention. One can also make the case that moral obligation (which is a
feeling o f guilt) is also one dimension o f affect. According to the results o f the study,
affect was found to be a strong predictor o f both attitude and intention. Previous studies
and Richardson, 1994). Affect should be studied m ore and included in future studies that
research has rarely employed such personal variables, and has mostly used
decision-making.
Moral obligation was the most interesting variable in this study. Not only was
this variable significantly associated with both attitude and intention, it was also highly
related to other variables in this study (see table 36). Future research should examine this
117
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
5.4.4. TPB relationships
One o f the interesting findings in this study was the strong relationship between
subjective norms and attitude. This was consistent with previous studies (see Chapter 3).
Based on the results o f this study (and others), further tests on the TPB should be done to
determine whether this link (between subjective norms and attitude) should added as an
integral part o f the TPB. Further studies should also examine whether this addition
would eliminate the relationship between subjective norms and intention or not.
5.5. LIMITATIONS
Limitations for this study are categorized within two categories, the sample itself,
5.5.1. Sample
The sample used was a student sample. While students are well known to be
digital pirates, there are pirates that are non-students. The sample was also somewhat
small, to fully undergo an SEM analysis, a larger sample size would have been needed.
Also, because the sample used was made out o f students, there was not much variation in
Another limitation regarding the sample was the fact that it was mostly made up
o f business students. Students in different colleges might well view digital piracy
differently than business students. Also, the majority o f the students in the sample were
information systems majors. Again, other non-IS students, might have a different
perception o f digital piracy and/or the factors that cause individuals to pirate digital
media (for example, IS majors are more technically advanced and might have a higher
118
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
self-efficacy towards digital piracy than other students). So, the generalizability o f this
Intention was used as a surrogate to the actual pirating behavior. While this
method has been commonly used in the literature (do to the difficultness o f measuring
actual behavior), measuring the actual behavior is possible with this type o f study. One
option, was to revisit the student sample after a specific amount o f time has passed, and
ask them if they have actually pirated digital media during that time (would have to
As is the case with any research, different and interesting results from this study
provide new directions for researchers to follow and examine. In this section, future
research directions are examined within these four areas: study verification, ethical
decision making, feelings research, and other variables that need to be examined further.
To verify the results study, it should be replicated with a larger and a possibly
different sample. There were some limitations with using SEM with a complex model
such this one, with a relatively small sample. Also, using a different sample would be
beneficial to see if these results would hold across different populations. A more diverse
sample might be appropriate, with different age groups, different cultures, and non
students as subjects.
119
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
5.6.2. Ethical decision making
Future research directions are also warranted in ethical decision making. One
research directions would be to further explain and understand the relationship between
ethical judgment and attitude. Are they the same thing? Does one cause the other? How
about moral obligation's effect on ethical judgment? What are the antecedents o f moral
obligation? The relationship between ethical judgment, attitude, intention, and moral
Another research venue would be to reexamine this model under other ethical
situations. The model might be different under different ethical situations. Some
stronger relationship with moral obligation). Future ethics research should try to
Moral obligation was a highly significant variable affecting both attitude and
intention. Further studies should study this variable further and examine its antecedents.
It was interesting to notice that when the relationship between moral obligation and
attitude was added to the model, several other variables (that were significant with
attitude) fell out o f the model. This might well mean that these variables could be
120
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
5.6.4. Affective research
The role o f affect was found to be a strong predictor o f both attitude and intention.
Future behavioral research should pay more attention to affect as a variable influencing
behavior. Affect seemed to influence ethical behavior in this study, which needs to be
verified in other ethical studies. Once that is verified, a further examination o f affect's
effect on different types o f behavior (and not ju st ethical behavior) should be examined.
Another stream o f research is to examine these affective feelings further (what are
the different types of affect?). Different types o f affect should be classified and
examined further in the literature (which o f the different types o f affect is more
influential than others?). Also, research regarding affecting these feelings should be
Some o f the other research ideas include further examination o f other variables
such as past behavior. While it has been found to be the best predictor (although not
explanatory in nature) of intention (Conner and Armitage, 1998), its relationship to other
Since it is possible (as explained previously), other studies should try to replicate
the findings o f this study and actually measure actual behavior instead o f intention. This
121
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
5.7. SUMMARY AND CONCLUSION
In this chapter, a detailed re-examination o f the results o f the study was discussed
in section 5.2. The next section contains some applications that can be followed based on
the results o f the study to combat digital piracy. Then, research implications and study
limitations were discussed. The last section contains future research directions that
decision-making.
ethical decision making. In Chapter 3, the research method for this study was detailed
and a questionnaire was developed to capture the data needed to undertake this study.
Chapter 4 included the statistical analysis o f the study, as well as a detailed test o f the
construct validity o f the scales used in this study. Chapter 5 included a detailed
reexamination o f the results, as well as implications for research and practice. Appendix
contains a copy o f the questionnaire used in this study to collect data. Appendix C
contains a list o f the behavioral beliefs collected from a student sample to form the
cognitive beliefs regarding digital piracy. Finally, Appendix D contains a listing o f the
122
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
REFERENCES
Anderson, R., D. Johnson, et al. (1993). "Using the New ACM Code o f Ethics in
Decision Making." Communications o f the ACM 36(2): 98-107.
123
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Baxter, G. and C. Rarick (1987). "Education for the Moral Development o f
Managers: Kohlberg's Stages o f Moral Development and Integrative Education." Journal
o f Business Ethics 6: 243-248.
Beck, L. and I. Ajzen (1991). "Predicting Dishonest Actions Using the Theory o f
Planned Behavior." Journal of Research in Personality 25(3): 285-301.
Bodur, H., D. Brinberg, et al. (2000). "Belief, Affect, and Attitude: Alternative
Models o f the Determinants o f Attitude." Journal o f Consumer Psychology 9(1): 17-28.
Bommer, M., C. Gratto, et al. (1987). "A Behavioral Model o f Ethical and
Unethical Decision Making,." Journal o f Business Ethics 6(4): 265-280.
Breusch, T. and A. Pagan (1980). "The LM Test and Its Applications to Model
Specification in Econometrics." Review o f Economic Studies/January): 153-177.
Cabom, A. (1997). "Are You a Software Thief, But You Don’t Know It."
Management Todav: 108-110.
124
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Co., H. R. S. i. v. R. F. (1984). Copyright Law Decisions (CCH). para. 25: 709.
Das, S. (2000). "The Availability o f the Fair Use Defense in Music Piracy and
Internet Technology." Federal Communications Law Journal. Los Angeles 52(3): 727-
748.
Eagly, A., A. Mladinic, et al. (1994). "Cognitive and Affective Bases o f Attitude
Toward Social Groups and Social Policies." Journal o f Experimental Social Psychology
30: 113-137.
125
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Fishbein, M. and S. Middlestadt (1995). "Noncognitive Effects on Attitude
Formation and Change: Fact or Artifact?" Journal o f Consumer Psychology 4(2): 181-
202.
Givon, M., M. Vijay, et al. (1995). "Software Piracy: Estimation o f Lost Sales and
the Impact on software Diffusion." Journal o f Marketing: 29-37.
Gopal, R. and L. Sanders (1997). "Preventive and Deterrent Controls for Software
Piracy." Journal o f Management Information Svstems(4V. 29-47.
Gopal, R. and L. Sanders (2000). "Global Software Piracy: You Can't Get Blood
Out o f A Turnip." Communications o f the ACM 43(9): 82-89.
Hair, J., R. Anderson, et al. (1998). Multivariate Data Analysis with Readings.
Englewood Cliffs, NJ, Prentice Hall.
Hal Roach Studios, inc. vs. Richard Fiener & Co. (1984) Copyright Law
Decisions (CCH). para. 25, 709, S.D.N.Y.
126
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Hegarty, W. H. and H. P. Sims, Jr. (1979). "Organizational Philosophy, Policies,
and Objectives Related to Unethical Decision Behavior: A Laboratory Experiment."
Journal o f Applied Psychology 64(June): 331.
Hunt, S. and S. Vitell (1986). "A General Theory o f Marketing Ethics." Journal o f
Micromarketing 6: 5-16.
Kreie, J. and P. Cronan (1999). "Copyright, piracy, privacy, and security issues:
Acceptable or unacceptable actions for end users?" Journal o f End User Computing
11(2): 13-21.
127
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Kreie, J. and P. Cronan (2000). "Making Ethical Decisions." Communications o f
the ACM 43(12): 66-72.
Kreie, J. and T. Cronan (1999). "How Men and Women View Ethics."
Communications o f the ACM 4119k 70-76.
Kurland, N. (1995). "Ethical Intentions and the Theories o f Reasoned Action and
Planned Behavior." Journal o f Applied Social Psychology 25(4): 297-313.
Madden, T., P. Ellen, et al. (1992). "A Comparison o f the Theory o f Planned
Behavior and the Theory o f Reasoned Action." Personality and Social Psychology
Bulletin! 18): 3-9.
128
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Neter, J., W. Wasserman, et al. (1985). Applied Linear Statistical Models.
Homewood, IL, Irwin.
Olson, J. and M. Zanna (1993). "Attitudes and Attitude Change." Annual Review
o f Psychology 44: 117-154.
Petty, R., D. Wegener, et al. (1997). "Attitudes and Attitude Change." Annual
Review o f Psychology 48: 609-647.
Rest, J., D. Narvaez, et al. (1999). "DIT2: Devising and Testing a Revised
Instrument o f Moral Judgment." Journal o f Educational Psychology 91(4): 644-659.
129
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Rothken, I. (1998). "Are You a Software Pirate." Home Office Computing 16(7):
122-123.
Schwartz, S. and R. Tessler (1972). "A Test o f a Model for Reducing Measured
Attitude-Behavior Discrepancies." Journal o f Personality and Social Psychology 42(2):
225-236.
130
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Sparks, P., C. Guthrie, et al. (1997). "The Dimensional Structure o f the Perceived
Behavioral Control Construct." Journal o f Applied Social Psychology 27: 418-438.
131
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Verplanken, B., G. Hofstee, et al. (1998). "Accessebility o f Affective Versus
Cognitive Components o f Attitude." European Journal o f Social Psychology 28: 23-35.
Weiss, E., D. Parker, et al. (1990). "The XXII Self-Assessment: The Ethics O f
Computing." Communications o f the ACM 33(11): 110-132.
132
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
APPENDIX A: FACTORS USED IN THIS
STUDY
133
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Factor Description Study
Leonard and Cronan (2001): Gender was a
significant variable influencing ethical
decision making
Salter et al. (2001), Whitley B. et al. (1999):
Gender had an effect on attitude towards
classroom cheating
Reiss and Mitra (1998): Gender had an effect
on whether an individual considered a
behavior as ethical or unethical
Loch and Conger (1996): There are
Gender o f the
Gender (SEX) difference >between how men and women
subject
evaluated ethical decision making
Khazanchi (1995): Significant differences
between genders in recognizing ethical issues
related to IS
Simpson et al. (1994): Gender was a
significant variable affecting ethical decision
making regarding software piracy
Randall (1989): Demographical variables are
theorized to be determinants o f
beliefs/attitude
Wagner and Sanders (2001): Was found to be
a determinant o f ethical judgment regarding
software piracy
How an individual Leonard and Cronan (2001): D-Score
Moral
reasons when component was significant in affecting ethical
Development
faced with an decision making
(MD)
ethical dilemma Trevino (1986): Theorized to be a
determinant o f ethical/unethical behavior
Rest et al. (1974): MD was a significant
predictor o f Attitude
Moral obligation Leonard and Cronan (2001): MO found to be
Moral Obligation
to perform/not significant in affecting ethical decision
(MO)
perform a making
behavior Baneijee et al. (1998): Found to be a
significant variable related to behavioral
intention
Conner and Armitage (1998): MO was found
to be a significant determinant o f both attitude
and intention in a number o f studies
134
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Kurland (1995): MO was the most significant
predictor o f behavioral intention
Ajzen (1991): M O are expected to influence
intentions
Randall and Gibson (1991): MO was a
significant variable affecting ethical
behavioral intention
135
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Simpson et al. (1994): Situational variables
were found to be significant in affecting
ethical decision-making regarding software
piracy
Ferrell and Gresham (1985): Characteristics
o f the ethical issue will influence an
individual’s ethical decision making
Leonard and Cronan (2001): A significant
variable in predicting ethical behavioral
intention
Ajzen (1991): Found Attitude to be
significant in predicting intention in 19 out o f
19 studies
Attitude towards Dubinsky and Loken (1989): Attitude was a
Attitude (AT)
the behavior significant determinant o f intention to engage
in an ethical/unethical behavior
... .
Limayem et al. (1999): Social factors were
significant determinants o f Intention to pirate
software
Loch and Conger (1996): Was a significant
variable in determining Intention to
Social pressures
performing a behavior
on the individual
Subjective Eining and Christensen (1991): SN was the
to perform or not
Norms (SN) strongest factor that affected the intention to
to perform a
pirate software
behavior
Ajzen (1991): Found SN to be significant in
predicting intention in 15 out o f 19 studies
Dubinsky and Loken (1989): SN were a
significant determinant o f intention to engage
in an ethical/unethical behavior
Loch and Conger (1996): Used computer
The individual’s
literacy to measure PBC, was a significant
perception on
Perceived variable in predicting computer misuse
whether a
Behavioral Ajzen (1991): Found PBC to be significant in
behavior is easy or
Control (PBC) predicting intention in 19 out o f 19 studies
difficult to
perform Ajzen and Madden (1986): Found PBC to be
a significant determinant affecting intention
Machiavellianism Bass et al. (1999): There is a direct link
One that is
(MACH) n n n n n n n r 1^ ^ . »>«♦!« 1 between MACH and ethical decision making
136
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
unconcerned with Jones and Kavanagh (1996): MACH had a
the morality o f the significant effect on unethical decision
behavior as long making_______________________________
as it will lead to Singhapakdi and Vitell (1990):
the desired Machiavellianism managers found ethical
outcome problems as less serious________________
Hegarty and Sims (1978, 1979):
Machiavellianism was significant in
explaining ethical behavior______________
137
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
APPENDIX B: THE QUESTIONNAIRE
138
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
B <•« y Sam M»
dLWALTON
»Aiy^sAs *B college usiness
Benefits and Risks: Your participation in this study will help contribute to the understanding of
digital piracy behavior (i.e. why do individuals pirate digital material). There are no risks
associated with this research as no penalties are assigned to your responses.
Procedure: The instrument will be administered to university students by your instructor and the
results collected. Students will be asked to return the questionnaire.
Informed Consent: I have read the above description, including the nature and purpose o f the
study, the benefits, confidentiality statement, and the right to withdraw from the study at any
time. The investigator/instructor has answered my questions regarding the study, and I believe I
understand what is involved. My participation indicates that I freely agree to participate in this
study.
1. A g e : _______ 2. S ex: □ M a le □ F e m a le
4. M a jo r : 5. O v e ra ll G P A : __________
139
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Please indicate your agreement or disagreement with the following statements:
I
Strongly Somewhat Somewhat Strongly
Disagree Neutral Agree
disagree disagree agree agree
140
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Overall, my attitude towards digital piracy is (that digital piracy is):
(Check a box fo r each line}
---- ,
j F a v o ra b le □ □ □ □ □ □ □ U n fa v o ra b le j
H arm fu l □ □ □ □ □ □ □ B en efic ial
| F o o lish □ □ □ □ □ □ □ W is e |
; G ood □ □ □ □ □ □ □ B ad
Questions relating to the opinions of significant others (friends and family) regarding
digital piracy
Ethical O O O O o o o Unethical
141
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
The following set of questions is related to your intention to pirate digital material
Issue is o f considerable
Concern
o o o o o 0 D Issue is o f no concern
The following set of questions is related to your feelings when pirating digital material
(Or ifyou haven i pirated digital material, how would you expect to feel ifyou did so)
142
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
The following set of questions is related to your beliefs towards digital piracy
i I believe that there is a chance o f getting caught while pirating digital media
Strongly agree 0 0 0 0 0 0 0 Strongly disagree
' I believe that the pirated digital material will not work as well as the original
; work
Strongly agree o o o o o o o Strongly disagree
: How important is it that the digital material would not work as the original
j Very important O O O O O D O Not important at all 1
143
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
For rest o f the questionnaire, please read the paragraph on top o f each page and answer the
questions related to the paragraph
Escaped Prisoner
Should Mrs. Jones report Mr. Thompson to the police and have him sent back to prison? (Check
one)
_________ S h o u ld re p o rt h im C a n ’t d e c id e S h o u ld no t re p o rt h im
M o st Im p o rta n t
S e c o n d M o s t Im p o rta n t
T h ird M o st Im p o rtan t
F o u rth M o st Im p o rta n t
144
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Heinz and the drug
S h o u ld H e in z s te a l th e d r u g ? ( C h e c k o n e )
S h o u ld S te a l it C a n ’t D ecid e S h o u ld n o t stea l it
M o st Im p o rta n t
S e c o n d M o st Im p o rtan t
T h ird M o st Im p o rta n t
F o u rth M o st Im p o rta n t
145
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
The Doctor’s Dilemma
A la d y w as d y in g o f c a n c e r w h ic h c o u ld n o t b e c u re d a n d sh e h a d o n ly a b o u t six m o n th s to live. S h e w as
in te rrib le p a in , b u t sh e w as so w e a k th a t a g o o d d o se o f p a in -k ille r lik e m o rp h in e w o u ld m ak e h e r die
so o n e r. S h e w as d e lirio u s a n d a lm o st c ra z y w ith p ain , a n d in h e r c a lm p e rio d s, sh e w o u ld a sk th e d o c to r to
g iv e h e r e n o u g h m o rp h in e to k ill her. S h e sa id sh e c o u ld n ’t sta n d th e p a in a n d th a t sh e w as g o in g to d ie in
a few m o n th s anyw ay.
1. W h e th e r th e w o m a n ’s fa m ily is in fa v o r o f g iv in g h e r th e j i j
o v e rd o s e o r n o t. j !
i '
2 . Is th e d o c to r o b lig a te d b y th e sa m e law s a s e v e ry b o d y e ls e i f > ; :
g iv in g h e r a n o v e rd o s e w ill k ill h er.
3 . W h e th e r p e o p le w o u ld b e m u c h b e tte r o f f w ith o u t s o c ie ty ; j
re g im e n tin g th e ir liv e s a n d e v e n th e ir d e a th s. j j | !
4 . W h e th e r th e d o c to r c o u ld m ak e it a p p e a r lik e an accid en t.
9 . W h e th e r o n ly G o d sh o u ld d e c id e w h e n a p e rs o n 's life s h o u ld 1 ; j
end. j j !
10. W h a t v a lu e s th e d o c to r h a s s e t fo r h im s e lf in h is ow n
p e rs o n a l c o d e o f b eh av io r.
M o st Im p o rta n t
S e c o n d M o s t Im p o rta n t
T h ird M o st Im p o rtan t
F o u rth M o st Im p o rta n t
146
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
APPENDIX C: SUBJECTS' BELIEFS
147
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Salient beliefs elicited from subjects, and the reported
percentage for each belief
Belief % reported
Authors lose money 54.2%
Benefit outweighs the cost 3.7%
Can bypass age screening 2.7%
Can get others in trouble 1.9%
Cant be stopped/There will always be a way 2.3%
Convenient 20.0%
Cost outweighs the benefit 3.8%
Don’t need to buy a whole CD 8.1%
Don’t pay for something you rarely use 1.9%
Don't get manuals/support/extra stuff 6.5%
Drive prices down 2.7%
Everyone is doing it 7.3%
Everyone would have the latest stuff 2.9%
Expands creativity 2.9%
Find rare music 3.7%
Get the newest out there 7.3%
Get live music 2.7%
Get more entertainment/at home 9.8%
Get Music not out yet 5.0%
Hacking 3.2%
Hurts specially small companies/unknown groups 2.7%
If you buy it, and distribute it, then you will lose 2.9%
It’s a stupid thing to do 2.9%
Its available, so why not do it? 6.2%
Its bad for the Industry - No one will bother making things again 5.0%
Its cheap to do so 3.5%
Its expensive to do 4.3%
Its fun to do 4.4%
Its hard to do 3.8%
Its not a big deal 1.9%
148
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Its Not a crime/illegal 1.9%
Its not nice 1.9%
Its not wrong 5.5%
Its risky 5.8%
Knowing that you can do it 2.9%
Like a little crime 4.2%
Make multiple copies 2.7%
Make Your own music 4.3%
Makes me nervous 2.3%
May drive prices up 6.5%
Might get caught 33.2%
Might not work As well as the original/purchased version 24.8%
More efficient 2.7%
More people would use computers because o f it 2.8%
More punishing Laws will be created as a result 2.9%
Need it to succeed 1.9%
Needs resources to do 2.7%
Only get caught when selling it 2.7%
Only people who know can do This 5.9%
Others might not like you 2.4%
Overpriced 13.5%
People are used to it now 2.7%
Promotes anti-social behavior 3.2%
Risky for your company 1.9%
Save money 88.5%
Save time 21.2%
Sell it to make money 5.8%
Sense o f ownership 2.7%
Share it to people when they need it 8.9%
Should not be Illegal 7.0%
Spread the word to others about the New Music, so they might buy 8.0%
Stay competitive with others 7.7%
Staying up to date with software 2.5%
149
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Take a long time 6.3%
The thrill o f doing something illegal 3.3%
They make too much money 7.6%
They Will get their money anyway like it or hate it/They will not get 5.4%
affected
Use it for my personal business 1.9%
Using technology the Wrong way 3.7%
Watch missed TV shows 2.7%
Will not get caught 3.2%
150
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Questionnaire used to elicit beliefs
Thank you for participating in this study. This study should take about 10-IS minutes. Please
indicate the answer in the provided tables. Please try to answer at least 3 items for each question
(if you need more space, please use the back of this sheet). When done, tear off the bottom part
and present it (separately) with this paper to your instructor for the purpose of anonymity.
The behavior in question is the act of illegally copying and/or downloading software (software
piracy).
2. What do you believe are the advantages of your performing this behavior?
# Advantage
1
2
3
4
5
6
3. What do you believe are the disadvantages of your performing this behaviorl
# Disadvantage
1
2
3
4
5
6
4. Is there anything else you can associate with performing this behavior?
1
2
3
4
5
6
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Digital Piracy Study
Thank you for participating in this study. This study should take about 10-15 minutes. Please
indicate the answer in the provided tables. Please try to answer at least 3 items for each question
(if you need more space, please use the back of this sheet). When done, tear off the bottom part
and present it (separately) with this paper to your instructor for the purpose of anonymity.
2. What do you believe are the advantages of your performing this behavior?
n Advantage
i
2
3
4
5
6
3. What do you believe are the disadvantages of your performing this behavior?
# Disadvantage
1
2
3
4
5
6
4. Is there anything else you can associate with performing this behavior?
1
2
3
4
5
6
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Digital Piracy Study
Thank you for participating in this study. This study should take about 10-15 minutes. Please
indicate the answer in the provided tables. Please try to answer at least 3 items for each question
(if you need more space, please use the back of this sheet). When done, tear off the bottom part
and present it (separately) with this paper to your instructor for the purpose of anonymity.
2. What do you believe are the advantages of your performing this behavior?
# Advantage
1
2
3
4
5
6
3. What do you believe are the disadvantages of your performing this behavior?
# Disadvantage
1
2
3
4
5
6
4. Is there anything else you can associate with performing this behavior?
1
2
3
4
5
6
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
APPENDIX D: STATISTICAL OUTPUT
154
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Descriptive Statistics for the subjects
Descriptive Statistics
Std.
N Minimum Maximum Mean Deviation
Age 292 18 56 23.52 6.046
GPA 272 1.90 4.00 3.1646 .49675
Experience 292 0 25 2.30 4.021
Valid N (listwise) 272
155
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Factor Analysis for Mach scale
Communalities
Initial
MACH1 1.000
MACH2 1.000
MACH3R 1.000
MACH4R 1.000
MACH5 1.000
MACH6R 1.000
MACH7R 1.000
MACH8 1.000
MACH9R 1.000
MACH 10R 1.000
MACH11R 1.000
MACH12 1.000
MACH13 1.000
MACH14R 1.000
MACH 15 1.000
MACH16R 1.000
MACH17R 1.000
MACH18 1.000
MACH 19 1.000
MACH20 1.000
Extraction Method: Principal Component Analysis.
156
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Total Variance Explained
Initial Eigenvalues Rotation
%of
Component Total Variance Cumulative % Total
1 3.530 17.650 17.650 2.990
2 2.110 10.550 28.199 2.785
3 1.539 7.695 35.894 1.786
4 1.293 6.465 42.359
5 1.104 5.519 47.878
6 1.037 5.187 53.064
7 .988 4.941 58.006
8 .947 4.737 62.742
9 .873 4.363 67.105
10 .840 4.199 71.304
11 .799 3.995 75.299
12 .723 3.614 78.913
13 .672 3.359 82.272
14 .653 3.264 85.536
15 .564 2.821 88.357
16 .552 2.762 91.119
17 .519 2.593 93.712
18 .473 2.364 96.076
19 .451 2.254 98.330
20 .334 1.670 100.000
Extraction Method: Principal Component Analysis.
a. When components are correlated, sums of squared loadings
cannot be added to obtain a total variance.
Component Matrix*
a. 3 components extracted.
157
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Pattern Matrix*
Component
1 2 3
MACH1 .559
MACH? .661
MACH3R .504
MACH4R .601
MACH5 .557
MACH6R .774
MACH7R .765
MACH8 .654
MACH9R .558
MACH 10R .534
MACH11R .495
MACH12 .491
MACH13 .558
MACH14R .621
MACH15 .475 -.474
MACH16R .468
MACH17R
MACH18 .412
MACH 19 .407
MACH20
Extraction Method: Principal Component Analysis.
Rotation Method: Promax with Kaiser Normalization.
a. Rotation converged in 6 iterations.
158
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Structure Matrix
Component
1 2 3
MACH1 .580
MACH2 .659
MACH3R .469
MACH4R .634
MACH5 .570
MACH6R .771
MACH7R .771
MACH8 .625
MACH9R .605
MACH 10R .561
MACH11R .502
MACH12 .523
MACH13 .567
MACH14R .643
MACH15 .423
MACH16R .472
MACH17R
MACH18 .443
MACH 19 .414
MACH20
Extraction Method: Principal Component Analysis.
Rotation Method: Promax with Kaiser Normalization.
Component 1 2 3
1 1.000 .181 .154
2 .181 1.000 5.49E-02
3 .154 5.49E-02 1.000
Extraction Method: Principal Component Analysis.
Rotation Method: Promax with Kaiser Normalization.
159
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Factor Analysis for Importance scale
Communalities
Initial Extraction
IMP1R 1.000 .873
IMP2R 1.000 .907
IMP3R 1.000 .867
IMP4R 1.000 .709
Extraction Method: Principal Component Analysis.
Component Matrix*
Compone
nt
1
IMP1R .935
IMP2R .953
IMP3R .931
IMP4R .842
Extraction Method: Principal Component Analysis,
a. 1 components extracted.
160
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Factor Analysis for Feelings scale
Communalities
Initial Extraction
FEEL1 1.000 .614
FEEL2 1.000 .805
FEEL3 1.000 .812
FEEL4 1.000 .843
FEEL5 1.000 .862
FEEL6 1.000 .814
FEEL7 1.000 .724
FEEL8 1.000 .924
FEEL9 1.000 .928
Extraction Method: Principal Component Analysis.
Component Matrix*
Component
1 2
FEEL1 .782
FEEL2 .896
FEEL3 .901
FEEL4 .903
FEEL5 .907
FEEL6 .869
FEEL7 .781
FEEL8 .951
FEEL9 .956
Extraction Method: Principal Component Analysis,
a. 2 components extracted.
161
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Factor Analysis for Attitude
Communalities
Initial Extraction
ATT1R 1.000 .794
ATT2 1.000 .760
ATT3 1.000 .769
ATT4R 1.000 .828
Extraction Method: Principal Component Analysis.
Component Matrix*
Compone
nt
1
ATT1R .891
ATT2 .872
ATT3 .877
ATT4R .910
Extraction Method: Principal Component Analysis,
a. 1 components extracted.
162
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Factor Analysis for Subjective Norms
Communalities
Initial Extraction
&N1R 1.000 .790
SN2R 1.000 .281
SN3 1.000 .672
Extraction Method: Principal Component Analysis.
Component Matrix*
Compone
nt
1
SN1R .889
SN2R .531
SN3 .820
Extraction Method: Principal Component Analysis,
a. 1 components extracted.
163
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Factor Analysis for PBC scale
Communalities
Initial Extraction
PBC1R 1.000 .843
PBC2R 1.000 .871
PBC3R 1.000 .856
PBC4R 1.000 .824
PBC5R 1.000 .678
Extraction Method: Principal Component Analysis.
Component Matrix"
Compone
nt
1
PBC1R .918
PBC2R .933
PBC3R .925
PBC4R .908
PBC5R .823
Extraction Method: Principal Component Analysis,
a. 1 components extracted.
164
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Factor Analysis for Moral Obligation scale
Communalities
Initial Extraction
MOI 1.000 .498
M02R 1.000 .786
M03R 1.000 .759
Extraction Method: Principal Component Analysis.
Component Matrix*
Compone
nt
1
MOI .705
M02R .887
MQ3R .871
Extraction Method: Principal Component Analysis,
a. 1 components extracted.
165
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Factor Analysis for Intention scale
Communalities
Initial Extraction
INT1R 1.000 .951
INT2R 1.000 .975
INT3R 1.000 .959
Extraction Method: Principal Component Analysis.
Component Matrix*
Compone
nt
1
INT1R .975
INT2R .987
INT3R .979
Extraction Method: Principal Component Analysis,
a. 1 components extracted.
166
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Factor Analysis for factors affecting Attitude
Communalities
Initial Extraction
MACH1 1.000 .423
MACH2 1.000 .534
MACH4R 1.000 .544
MACH5 1.000 .418
MACH6R 1.000 .672
MACH7R 1.000 .670
MACH8 1.000 .553
MACH9R 1.000 .477
MACH10R 1.000 .466
MACH11R 1.000 .433
MACH12 1.000 .296
MACH13 1.000 .405
MACH14R 1.000 .525
MACH16R 1.000 .363
MACH18 1.000 .393
SN1R 1.000 .662
SN3 1.000 .683
IMP1R 1.000 .878
IMP2R 1.000 .908
IMP3R 1.000 .857
IMP4R 1.000 .724
FEEL1 1.000 .640
FEEL2 1.000 .816
FEEL3 1.000 .827
FEEL4 1.000 .844
FEEL5 1.000 .868
FEEL6 1.000 .812
FEEL7 1.000 .741
FEEL8 1.000 .902
FEEL9 1.000 .893
Extraction Method: Principal Component Analysis.
167
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Total Variance Explained
Initial Eigenvalues action Sums of Sguared Loadi ation Sums of Sguared Loadii
% of % of % of
Compont Total Variance umulative 9 Total Variance umulative °/ Total Variance Emulative ‘
1 5.240 17.468 17.468 5.240 17.468 17.468 4.789 15.965 15.965
2 4.534 15.115 32.582 4.534 15.115 32.582 3.512 11.706 27.671
3 2.935 9.783 42.366 2.935 9.783 42.366 2.690 8.965 36.636
4 2.265 7.549 49.914 2.265 7.549 49.914 2.530 8.434 45.070
5 1.838 6.128 56.042 1.838 6.128 56.042 2.444 8.147 53.216
6 1.332 4.442 60.484 1.332 4.442 60.484 1.708 5.692 58.908
7 1.083 3.612 64.096 1.083 3.612 64.096 1.556 5.187 64.096
8 .957 3.191 67.286
9 .949 3.163 70.449
10 .927 3.091 73.540
11 .816 2.719 76.259
12 .782 2.607 78.866
13 .731 2.436 81.302
14 .689 2.297 83.599
15 .596 1.988 85.587
16 .586 1.955 87.542
17 .545 1.815 89.357
18 .498 1.659 91.015
19 .461 1.536 92.551
20 .404 1.345 93.896
21 .331 1.105 95.001
22 .314 1.047 96.048
23 .263 .876 96.924
24 .237 .789 97.713
25 .175 .582 98.295
26 .149 .498 98.793
27 .140 .468 99.261
28 .101 .338 99.599
29 26E-02 .242 99.841
30 77E-02 .159 100.000
Extraction Method: Principal Component Analysis.
168
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Component Matrix1
Component
1 2 3 4 5 6 7
MACH1 .426
MACH2 .490
MACH4R .518
MACH5 .390 -.414
MACH6R .523
MACH7R .480
MACH8 .391 -.538
MACH9R .523
MACH10R .448 .380
MACH11R .450
MACH12 .389
MACH13
MACH14R .404 .497
MACH16R
MACH18 .428
SN1R .486
SN3 .477
IMP1R .755 .509
IMP2R .744 .557
IMP3R .778 .467
IMP4R .748 .392
FEEL1 .680
FEEL2 .833
FEEL3 .817
FEEL4 .870
FEEL5 .870
FEEL6 .847
FEEL7 .569 -.477
FEEL8 .690 -.500
FEEL9 .666 -.522
Extraction Method: Principal Component Analysis,
a. 7 components extracted.
169
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Rotated Component Matrbf
Component
1 2 3 4 5 6 7
MACH1 .595
MACH2 .663
MACH4R .636
MACH5 .607
MACH6R .771
MACH7R .754
MACH8 .631
MACH9R .604
MACH10R .644
MACH11R .414
MACH12 .441
MACH13 .575
MACH14R .699
MACH16R .516
MACH18 .394
SN1R .693
SN3 .737
IMP1R .926
IMP2R .948
IMP3R .910
IMP4R .816
FEEL1 .765
FEEL2 .891
FEEL3 .887
FEEL4 .905
FEEL5 .916
FEEL6 .884
FEEL7 .824
FEEL8 .906
FEEL9 .907
Extraction Method: Principal Component Analysis.
Rotation Method: Varimax with Kaiser Normalization.
a. Rotation converged in 7 iterations.
170
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Component Transformation Matrix
Component 1 2 3 4 5 6 7
1 .890 .287
o
o
V*
-.020 .267 -.196 .071
2 .241 .734 .530 -.094 -.155 .280 -.110
3 -.333 .105 .257 .628 .514 .160 .357
4 -.073 .646 -.620 -.088 .302 -.303 .043
5
CO
.001 .260 -.649 .699 .042 -.029
6 .014 .038 .200 -.254 -.245 -.382 .829
7 .182 -.032 -.402 -.146 -.023 .786 .406
Extraction Method: Principal Component Analysis.
Rotation Method: Varimax with Kaiser Normalization.
171
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Factor Analysis for factors affecting Intention
Communalities
Initial Extraction
ATT1R 1.000 .790
ATT2 1.000 .758
ATT3 1.000 .781
ATT4R 1.000 .829
SN1R 1.000 .770
SN3 1.000 .870
PBC1R 1.000 .839
PBC2R 1.000 .867
PBC3R 1.000 .854
PBC4R 1.000 .825
PBC5R 1.000 .699
M01 1.000 .491
M02R 1.000 .821
M03R 1.000 .810
Extraction Method: Principal Component Analysis.
Initial Eiqenvalues action Sums of Sauared Loadii tation Sums of Sauared Loadir
% of % 0f % of
Compone Total Variance Emulative °/ Total Variance :umulative °/ Total Variance lumulative 1
1 6.272 44.801 44.801 6.272 44.801 44.801 4.180 29.858 29.858
2 2.844 20.313 65.114 2.844 20.313 65.114 3.247 23.193 53.051
3 1.070 7.645 72.759 1.070 7.645 72.759 2.031 14.505 67.557
4 .817 5.836 78.595 .817 5.836 78.595 1.545 11.038 78.595
5 .615 4.391 82.986
6 .473 3.381 86.367
7 .354 2.532 88.899
8 .320 2.288 91.187
9 .284 2.029 93.216
10 .266 1.896 95.113
11 .230 1.645 96.758
12 .207 1.478 98.236
13 .163 1.167 99.403
14 .36E-02 .597 100.000
Extraction Method: Principal Component Analysis.
172
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Component Matrix*
Component
1 2 3 4
ATT1R .719 -.441
ATT2 .665 -.481
ATT3 .665 -.439
ATT4R .704 -.468
SN1R -.686 .413
SN3 -.586 .408 -.594
PBC1R .733 .542
PBC2R .731 .565
PBC3R .708 .585
PBC4R .704 .568
PBC5R .600 .577
M01 -.651
M02R -.610 .417
M03R -.580 .428 .409
Extraction Method: Principal Component Analysis.
a. 4 components extracted.
Component
1 2 3 4
ATT1R .819
ATT2 .816
ATT3 .851
ATT4R .862
SN1R .719
SN3 .881
PBC1R .889
PBC2R .910
PBC3R .905
PBC4R .890
PBC5R .819
M01 .490
M02R .834
M03R .839
Extraction Method: Principal Component Analysis.
Rotation Method: Varimax with Kaiser Normalization.
a. Rotation converged in 5 iterations.
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Component Transformation Matrix
Component 1 2 3 4
1
1
.635 .564 -.404
o
£
2 .756 -.546 .348 .094
3 .113 .607 .556 .557
4
in
CM
N.
-.109 .126 .638
»*
Extraction Method: Principal Component Analysis.
Rotation Method: Varimax with Kaiser Normalization.
174
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Reliability Analysis for Mach Scale -1
R E L I A B I L I T Y A N A L Y S IS - S C A L E (ALP
Item-total Statistics
Reliability Coefficients
Alpha = .7176
175
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Reliability Analysis for Mach Scale - 2
R E L I A B I L I T Y A N A L Y S I S - S C A L E (ALPHA)
Item-total Statistics
Reliability Coefficients
Alpha = .7226
176
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Reliability Analysis for Mach Scale - 3
R E L I A B I L I T Y A N A L Y S IS - S C A L E (ALP
item-total Statistics
Reliability Coefficients
Alpha = .7324
177
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Reliability Reliability Analysis for Mach Scale - 4
R E L I A B I L I T Y A N A L Y S IS - S C A L E (ALP
Item-total Statistics
Reliability Coefficients
Alpha = .7349
178
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Reliability Analysis for Mach Scale - 5
R E L I A B I L I T Y A N A L Y S I S - S C A L E (ALPHA)
Item-total Statistics
Reliability Coefficients
Alpha = .7374
179
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Reliability Analysis for Mach Scale - 6
R E L I A B I L I T Y A N A L Y S I S - S C A L E (ALPHA)
Item-total Statistics
Reliability Coefficients
Alpha = .7384
180
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Reliability for Importance Scale
R E L I A B I L I T Y A N A L Y S IS - S C A L E (ALP
Item-total Statistics
Reliability Coefficients
Alpha = .9361
181
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Reliability for Feelings Scale (all types)
R E L I A B I L I T Y A N A L Y S IS - S C A L E (ALP
Item-total Statistics
Reliability Coefficients
Alpha = .8627
182
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Reliability for Feelings Scale (Excitement and pleasantness)
R E L I A B I L I T Y A N A L Y S IS - S C A L E (ALP
Reliability Coefficients
Alpha = .9433
183
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Reliability for feelings Scale (Fear and nervousness)
R E L I A B I L I T Y A N A L Y S I S - S C A L E (ALPHA)
Reliability Coefficients
Alpha = .9106
184
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Reliability for Attitude Scale
R E L I A B I L I T Y A N A L Y S I S - S C A L E (ALPHA)
Item-total Statistics
Reliability Coefficients
Alpha = .9088
185
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Reliability for Subjective Norms Scale -1
R E L I A B I L I T Y A N A L Y S IS - S C A L E (ALP
Item-total Statistics
Reliability Coefficients
Alpha = .6377
186
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Reliability for Subjective Norms Scale - 2
R E L I A B I L I T Y A N A L Y S I S S C A L E (ALPHA)
Item-total Statistics
Reliability Coefficients
Alpha = .7566
187
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Reliability for PBC scale
R E L I A B I L I T Y A N A L Y S I S - S C A L E (ALPHA)
Item-total Statistics
Reliability Coefficients
Alpha = .9428
188
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Reliability for Moral Obligation Scale
R E L I A B I L I T Y A N A L Y S IS - S C A L E (ALP
Item-total Statistics
Reliability Coefficients
Alpha = .7605
189
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Reliability for Intention
R E L I A B I L I T Y A N A L Y S I S - S C A L E (ALPHA)
Item-total Statistics
Reliability Coefficients
Alpha = .9799
190
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Correlations for factors (testing for discriminant validity)
191
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Fisher’s Z-Transformation test for correlations between factors
(with a correlation of 0.7)
Test
between Correlation P-Value Result
components
1 2 0.242 0.00 Reject null hypothesis that they are equal
1 3 0.330 0.00 Reject null hypothesis that they are equal
1 4 0.056 0.00 Reject null hypothesis that they are equal
1 5 0.084 0.00 Reject null hypothesis that they are equal
1 6 0.375 0.00 Reject null hypothesis that they are equal
1 7 0.150 0.00 Reject null hypothesis that they are equal
I 8 0.145 0.00 Reject null hypothesis that they are equal
1 9 0.049 0.00 Reject null hypothesis that they are equal
1 10 -0.034 0.00 Reject null hypothesis that they are equal
1 11 0.009 0.00 Reject null hypothesis that they are equal
2 3 0.224 0.00 Reject null hypothesis that they are equal
2 4 0.010 0.00 Reject null hypothesis that they are equal
2 5 -0.255 0.00 Reject null hypothesis that they are equal
2 6 0.461 0.00 Reject null hypothesis that they are equal
2 7 0.091 0.00 Reject null hypothesis that they are equal
2 8 -0.081 0.00 Reject null hypothesis that they are equal
2 9 0.120 0.00 Reject null hypothesis that they are equal
2 10 -0.061 0.00 Reject null hypothesis that they are equal
2 11 0.033 0.00 Reject null hypothesis that they are equal
3 4 -0.282 0.00 Reject null hypothesis that they are equal
3 5 -0.317 0.00 Reject null hypothesis that they are equal
3 6 0.564 0.00 Reject null hypothesis that they are equal
3 7 0.079 0.00 Reject null hypothesis that they are equal
3 8 0.224 0.00 Reject null hypothesis that they are equal
3 9 0.290 0.00 Reject null hypothesis that they are equal
3 10 0.045 0.00 Reject null hypothesis that they are equal
3 11 0.033 0.00 Reject null hypothesis that they are equal
4 5 0.289 0.00 Reject null hypothesis that they are equal
4 6 -0.205 0.00 Reject null hypothesis that they are equal
4 7 0.033 0.00 Reject null hypothesis that they are equal
4 8 -0.121 0.00 Reject null hypothesis that they are equal
4 9 -0.187 0.00 Reject null hypothesis that they are equal
4 10 0.007 0.00 Reject null hypothesis that they are equal
4 11 0.020 0.00 Reject null hypothesis that they are equal
5 6 -0.385 0.00 Reject null hypothesis that they are equal
5 7 0.031 0.00 Reject null hypothesis that they are equal
5 8 0.048 0.00 Reject null hypothesis that they are equal
5 9 -0.367 0.00 Reject null hypothesis that they are equal
192
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
5 10 0.069 0.00 Reject null hypothesis that they are equal
5 11 0.114 0.00 Reject null hypothesis that they are equal
6 7 0.065 0.00 Reject null hypothesis that they are equal
6 8 0.162 0.00 Reject null hypothesis that they are equal
6 9 0.321 0.00 Reject null hypothesis that they are equal
6 10 0.047 0.00 Reject null hypothesis that they are equal
6 11 0.035 0.00 Reject null hypothesis that they are equal
7 8 0.344 0.00 Reject null hypothesis that they are equal
7 9 0.059 0.00 Reject null hypothesis that they are equal
7 10 0.077 0.00 Reject null hypothesis that they are equal
7 11 -0.169 0.00 Reject null hypothesis that they are equal
8 9 -0.001 0.00 Reject null hypothesis that they are equal
8 10 0.129 0.00 Reject null hypothesis that they are equal
8 11 0.078 0.00 Reject null hypothesis that they are equal
9 10 -0.055 0.00 Reject null hypothesis that they are equal
9 11 -0.148 0.00 Reject null hypothesis that they are equal
10 11 0.135 0.00 Reject null hypothesis that they are equal
193
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Confirmatory Factor Analysis for Attitude Scale
Regression Weights
Estimate S.E. C.R. P
ATT1R<-- Attitude 1.502 0 .086 17.550 0.000
ATT2 <-- Attitude 1.331 0 .082 16.191 0.000
ATT3 <-- Attitude 1.199 0 .073 16.533 0.000
ATT4R<-- Attitude 1.534 0 .082 18.768 0.000
194
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Confirmatory Factor Analysis for Importance Scale
Regression Weights
Estimate S.E. C.R. P
IMPlRc-- Importance 1.632 0.079 20.630 0.000
IMP2R<-- Importance 1.686 0.076 22.114 0.000
IMP3R<-- Importance 1.539 0.080 19.207 0.000
IMP4R<-- Importance 1.160 0.080 14.573 0.000
195
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Confirmatory Factor Analysis for Feelings Scale (happiness and
excitement)
Regression Weights
Estimate S.E. C.R. P
FEELl <-- Feelings 1.147 0.086 13.358 0 .000
FEEL2 <-- Feelings 1.480 0.084 17.669 0.000
FEEL3 Feelings 1.467 0.082 17.871 0.000
FEEL4 <-- Feelings 1.606 0.081 19.805 0 .000
FEEL5 <-- Feelings 1.677 0.082 20.522 0 .000
FEEL6 <-- Feelings 1.618 0.086 18.902 0 .000
196
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Confirmatory Factor Analysis for Feelings Scale (fear and
nervousness)
Regression Weights
Estimate S.E. C.R. P
FEEL7 <-- Feelings 1.234 0.091 13.579 0.000
FEEL8 <-- Feelings 1.729 0.079 21.915 0.000
FEEL9 <-- Feelings 1.752 0.080 21.913 0.000
197
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Confirmatory Factor Analysis for Subjective Norms Scale
Regression Weights
Estimate S.E. C.R. P
SN1R <-- SNorms 2.030 0.295 6.885 0. ooo
SN3 <-- SNorms 1.030 0.179 5.742 0. ooo
SN2R <-- SNorms 0.507 0.123 4.112 0. ooo
198
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Confirmatory Factor Analysis for Perceived Behavioral Control
Scale
Regression Weights
Estimate S.E. C.R. P
PBC1R <-- PCB 1.776 0 .087 20.485 0.000
PBC2R <-- PCB 1.747 0 .082 21.197 0.000
PBC3R <-- PCB 1.610 0.083 19.376 0.000
PBC4R <-- PCB 1.567 0.088 17.887 0.000
PBC5R <-- PCB 1.257 0 .088 14.296 0.000
199
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Confirmatory Factor Analysis for Intention Scale
Regression Weights
Estimate S.E. C.R. P
INT1R <-- Intention 1.973 0.091 21.760 0 ooo
INT2R <-- Intention 2.021 0.087 23.356 0 ooo
INT3R <-- Intention 1.986 0.089 22.266 0 ooo
200
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Confirmatory Factor Analysis for Machiavellianism Scale
Regression Weights
Estimate S.E. C.R. P
MACH4R<-- Machiav 1 0.686 0.141 4.877 0.000
MACH11R<-- Machiav 1 0.510 0.134 3.798 0.000
MACH14R<-- Machiav 1 0 .727 0.138 5 .271 0.000
MACH16R<-- Machiav l 0.537 0.140 3 .841 0.000
Regression Weights
Estimate S.E. C.R. P
MACH6R<-- Machiav 2 1.217 0.101 12.058 0.000
MACH7R<-- Machiav 2 1.292 0.104 12.362 0.000
M ACH9R<-- Machiav 2 0.577 0.076 7.555 0.000
MACHlORc-- Machiav 2 0.562 0.080 7.045 0.000
Regression Weights
Estimate S.E. C.R. p
MACH1 <-- Machiav 3 0.848 0.108 7.860 0.000
MACH2 <-- Machiav 3 0.935 0.109 8 .606 0.000
MACH5 <-- Machiav 3 0.774 0.103 7.482 0.000
MACH8 <-- Machiav 3 0.806 0.105 7.674 0.000
MACH12<-- Machiav 3 0.597 0.105 5.685 0 .000
MACH13<-- Machiav 3 0.696 0.099 7.026 0.000
MACH18<-- Machiav 3 0.568 0 .104 5.452 0.000
201
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Test for Normality
202
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Test for Homogeneity of Variance
For attitude model
53 42.99 0.8353
14 11.74 0.6273
203
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Regression output for Attitude model
Model Summary9
Mode Adjusted Std. Error of
1 R R Square R Square the Estimate
1 .527a .278 .275 4.89154
2 .613b .376 .372 4.55428
3 .640° .409 .403 4.43956
4 .649d .422 .413 4.40031
5 .656® .430 .419 4.37777
6 .661f .436 .424 4.35973
a. Predictors: (Constant), Subjective Norms
b. Predictors: (Constant), Subjective Norms, Happiness
& Excitement
c. Predictors: (Constant), Subjective Norms, Happiness
& Excitement, Importance
d. Predictors: (Constant), Subjective Norms, Happiness
& Excitement, Importance, Age
e. Predictors: (Constant), Subjective Norms, Happiness
& Excitement, Importance, Age, Mach
f- Predictors: (Constant), Subjective Norms, Happiness
& Excitement, Importance, Age, Mach, Cognitive
g. Dependent Variable: Attitude
204
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
ANOVA®
Mode Sum of Mean
1 Squares df Sauare F Sig.
1 Regression 2556.127 1 2556.127 106.829 .OOO3
Residual 6651.755 278 23.927
Total 9207.883 279
2 Regression 3462.504 2 1731.252 83.468 .000b
Residual 5745.379 277 20.741
Total 9207.883 279
3 Regression 3768.006 3 1256.002 63.725 .000c
Residual 5439.876 276 19.710
Total 9207.883 279
4 Regression 3883.121 4 970.780 50.136 .000d
Residual 5324.762 275 19.363
Total 9207.883 279
5 Regression 3956.711 5 791.342 41.291 .000®
Residuai 5251.172 274 19.165
Total 9207.883 279
6 Regression 4018.893 6 35.240
o
o
O
669.816
Residual 5188.989 273 19.007
Total 9207.883 279
a. Predictors: (Constant), Subjective Norms
b. Predictors: (Constant), Subjective Norms, Happiness & Excitement
c. Predictors: (Constant), Subjective Norms, Happiness & Excitement, Importance
d. Predictors: (Constant), Subjective Norms, Happiness & Excitement, Importance,
Age
e. Predictors: (Constant), Subjective Norms, Happiness & Excitement, Importance,
Age, Mach
f- Predictors: (Constant), Subjective Norms, Happiness & Excitement, Importance,
Age, Mach, Cognitive
g. Dependent Variable: Attitude
205
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Coefficients*
Unstandardized Standardized
Coefficients Coefficients
Model B Std. Error Beta t Sig.
1 (Constant) 23.051 .657 35.106 .000
Subjective Norms- -.912 .088 -.527 -10.336 .000
2 (Constant) 18.454 .926 19.930 .000
00
Subjective Norms- -9.241 .000
1
.085 -.451
Happiness & Excitement .200 .030 .323 6.611 .000
3 (Constant) 20.012 .986 20.305 .000
It*
Subjective Norms- -.695 .085 -8.148 .000
o
i
Happiness & Excitement .212 .030 .344 7.174 .000
Importance -.174 .044 -.189 -3.937 .000
4 (Constant) 22.371 1.375 16.272 .000
Subjective Norms- -.642 .087 -.371 -7.365 .000
Happiness & Excitement .201 .030 .324 6.740 .000
Importance -.159 .044 -.172 -3.586 .000
Age -.115 .047 -.121 -2.438 .015
5 (Constant) 19.586 1.972 9.931 .000
Subjective Norms- -.628 .087 -.363 -7.210 .000
Happiness & Excitement .192 .030 .310 6.408 .000
Importance -.150 .044 -.162 -3.374 .001
Age -.111 .047 -.116 -2.363 .019
Mach 5.07E-02 .026 .092 1.960 .051
6 (Constant) 18.001 2.151 8.370 .000
Subjective Norms- -.592 .089 -.342 -6.647 .000
Happiness & Excitement .179 .031 .290 5.863 .000
importance -.152 .044 -.165 -3.442 .001
Age -.110 .047 -.115 -2.353 .019
Mach 4.70E-02 .026 .086 1.821 .070
Cognitive 1.24E-02 .007 .089 1.809 .072
a. Dependent Variable: Attitude
206
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Excluded Variable#
Collinearity
Mode Partial Statistics
1 Beta In t Sig. Correlation Tolerance
1 Sex -.038a -.750 .454 -.045 .992
Age -.192a -3.638 .000 -.214 .897
P-lndex *.094a -1.844 .066 -.110 1.000
Cognitive .169® 3.215 .001 .190 .912
Happiness & Excitemer
,323a 6.611 .000 .369 .945
Distress -.027a -.497 .620 -.030 .852
Mach .161a 3.164 .002 .187 .972
Importance -,151a -2.911 .004 -.172 .943
2 Sex -.006b -.116 .908 -.007 .981
Age -.146b -2.915 .004 -.173 .877
00
P-lndex .991
1
-,064b -1.346 .179
o
Cognitive .094b 1.833 .068 .110 .857
Distress -.106b -2.030 .043 -.121 .812
Mach .117b 2.432 .016 .145 .952
Importance -.189b -3.937 .000 -.231 .932
3 Sex .001° .016 .987 .001 .980
Age -.121c -2.438 .015 -.145 .859
P-lndex -.056° -1.196 .233 -.072 .989
Cognitive .098° 1.965 .050 .118 .856
Distress -.068° -1.303 .194 -.078 .779
Mach .097° 2.047 .042 .123 .939
4 Sex -.008d -.166 .868 -.010 .975
P-lndex -.048d -1.033 .302 -.062 .983
Cognitive -096d 1.948 .052 .117 .856
Distress -.055d -1.043 .298 -.063 .769
Mach .092d 1.960 .051 .118 .937
5 Sex .005® .100 .921 .006 .957
P-lndex -.043® -.937 .350 -.057 .981
Cognitive .089® 1.809 .072 .109 .851
Distress -.059® -1.133 .258 -.068 .768
6 Sex .007* .158 .874 .010 .956
00
P-lndex .979
«
207
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Residuals Statistics*
Std.
Minimum Maximum Mean Deviation N
Predicted Value 4.1286 25.7373 16.9743 3.79534 280
Residual -11.5908 12.7107 .0000 4.31260 280
Std. Predicted
Value -3.385 2.309 .000 1.000 280
Std. Residual -2.659 2.915 .000 .989 280
Charts
Normal P-P Plot of R egression Standar
.75
.50
.25-
UJ 0.00
0.00 .25 .50 .75 1.00
208
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Partial Regression Plot
a
a
10
-10 a
a °
Attitude
-20
-20 -10 0 10 20 30 40
Age
10
„ ° ° ® Q„ D
_ n* o
0
OOqO
-10
Attitude
-20
-200 -100 0 100 200
Cognitive
209
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Partial Regression Plot
o i
_ a “n
a•
i°a
-10
a>
■a
3
S
<
-30 -20 -10 0 10 20 30
•o
a
3 Sf* %a
» O* “o
-10
■a
3
'&
<
-30 -20 -10 0 10 20 30 40
Mach
210
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Partial Regression Plot
PTE
„o
□abW,
• . %® a ° D
-10 □O
Attitude
-20
-20 -10 0 10 20
Importance
go o
on
t*j °o# m 4
Ji
°a
-10
Attitude
-20
Subjective Norms
211
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Regression output for Intention model
Modal Summary*
Mode Adjusted Std. Error of
1 R R Square R Square the Estimate
1 .638a .407 .404 4.64828
2 ,741b .549 .546 4.05967
3 .761° .579 .575 3.92869
4 .765d .586 .580 3.90384
a. Predictors: (Constant), Moral Obligation
b. Predictors: (Constant), Moral Obligation, PBC
c. Predictors: (Constant), Moral Obligation, PBC. Attitude
d. Predictors: (Constant), Moral Obligation, PBC,
Attitude, Subjective Norms
e. Dependent Variable: Intention
ANOVA*
Mode Sum of Mean
I Squares df Square F Sig.
1 Regression 4114.594 1 4114.594 190.433 .000a
Residual 6006.602 278 21.606
Total 10121.20 279
2 Regression 5555.982 2 2777.991 168.558 .000b
Residual 4565.214 277 16.481
Total 10121.20 279
3 Regression 5861.246 3 1953.749 126.582 ,000c
Residual 4259.950 276 15.435
Total 10121.20 279
4 Regression 5930.209 4 1482.552 97.281 .000d
Residual 4190.987 275 15.240
Total 10121.20 279
a. Predictors: (Constant), Moral Obligation
b. Predictors: (Constant), Moral Obligation, PBC
c. Predictors: (Constant), Moral Obligation, PBC, Attitude
d. Predictors: (Constant), Moral Obligation, PBC, Attitude, Subjective Norms
e. Dependent Variable: Intention
212
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Coefficients*
Unstandardized Standardized
Mode Coefficients Coefficients
1 B Std. Error Beta t Sig.
1 (Constant) 21.578 .727 29.672 .000
Moral Obligation -.859 .062 -.638 -13.800 .000
2 (Constant) 11.717 1.231 9.518 .000
Moral Obligation -.685 .057 -.509 -11.929 .000
PBC .292 .031 .399 9.352 .000
3 (Constant) 6.145 1.729 3.555 .000
Moral Obligation -.496 .070 -.368 -7.092 .000
PBC .271 .031 .370 8.856 .000
Attitude .242 .054 .231 4.447 .000
4 (Constant) 4.893 1.816 2.694 .007
Moral Obligation -.456 .072 -.338 -6.316 .000
PBC .254 .031 .347 8.075 .000
Attitude .212 .056 .203 3.801 .000
Subjective Norms
.191 .090 .105 2.127 .034
Excluded Variables'1
Collinearity
Mode Partial Statistics
I Beta In t Sig. Correlation Tolerance
1 Subjective Norms
ft
.293 .715
CM
<0
h*
5.106 .000
Attitude .302a 5.210 .000 .299 .580
PBC .399* 9.352 .000 .490 .895
2 Subjective Norms .657
.152b 3.104 .002 .184
Attitude .231b 4.447 .000 .259 .566
tno
3 Subjective Norms
2.127 .034 .127 .616
o
Residuals Statistics*
Std.
Minimum Maximum Mean Deviation N
Predicted Value -2.1743 21.0225 12.3036 4.61034 280
Residual -11.3439 11.6423 .0000 3.87575 280
Std. Predicted
-3.140 1.891 .000 1.000 280
Value
Std. Residual -2.906 2.982 .000 .993 280
Charts
213
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Normal P-P Plot of Regression Standar
.75
.50
2
Q.
E
I -
£o
&
UJ 0.00.
0.00 .25 .50 .75 1.00
- 10-
£ -20
-10 -8 -6 -4 ■2 0 2 4 6 8
Subjective Norms
214
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Partial Regression Plot
t i ■r ■ ■ i l
-20 -10 0 10 20
Attitude
Qfi a •
mrf
-10
eo
c
2c
-10 0 10
Moral Obligation
215
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Partial Regression Plot
216
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
AMOS output for original model
Title
EA unobserved exogenous
El unobserved exogenous
Summary of Parameters
Fixed 2 0 0 2
Labeled 0 0 0 0
Unlabeled 13 26 13 52
Total: 15 26 13 54
NOTE:
The model is recursive.
Degrees of freedom: 39
217
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
4e 04. 6e+001 O.OOOOe+OOO 3.28e-001 1.17262640055e+002 1 1.18e+000
5e 0 S .9e+001 O.OOOOe+OOO 1.59e-001 1.15330824010e+002 1 1.09e+000
6e 0 6.2e+001 O.OOOOe+OOO 3.01e-002 1.15281514796e+002 1 1.02e+000
7e 06.1e+001 O.OOOOe+OOO 9.86e-004 1.15281460907e+002 1 l.OOe+OOO
Chi-square = 115.281
Degrees of freedom = 3 9
Probability level = 0.000
ATT 0.422
INT 0.570
PBC 66.697
218
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
MO -10.240 19.342
SN_13 -9.960 7.469 10.791
MACH 0.000 -7.749 0.000 108.816
IMP 0.000 9.015 4 .779 0 .000 38.598
FEEL79 -12.769 8.855 6.200 0.000 8.139 23.204
FEEL16 20.229 -13.286 -7.898 0.000 0.000 0.000 84 . 0 0 1
COG_NEW 108.280 -48.674 -38.175 0 .000 0.000 -45.141 115 .160
P 0 .000 0.000 0.000 0.000 0.000 0.000 0. 0 0 0
AGE 0.000 4.969 5.058 0.000 7.555 4.788 -9 .384
SEX -0.904 0.000 0.000 -0.926 0.000 0.000 0. 0 0 0
ATT 11.139 -15.793 -9.611 5.052 -9.531 -6.991 22 .504
INT 25.850 -16.188 -10.030 4 .603 -7.043 -9.941 17 .470
COG_NEW 1727.201
P 0.000 17.693
AGE 0.000 0 .000 36.696
SEX 0.000 0.000 0.000 0 .245
ATT 65.363 -0.237 -9.754 0 .024 31.915
INT 70.807 -0.050 -5.300 -0.224 18.632 34.771
S u m m a r y of models
Model NCP LO 90 HI 90
Model FMIN F0 LO 90 HI 90
219
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Independence model 3 .777 3 .497 3.13S 3.886
HOELTER HOELTER
Model .05 .01
220
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
AMOS output for modified model
Title
EA unobserved exogenous
El unobserved exogenous
Summary of Parameters
Fixed 2 0 0 2
Labeled 0 0 0 0
Unlabeled 17 25 13 55
Total: 19 25 13 57
NOTE:
The model is recursive.
M o d e l : Default model
Degrees of freedom: 36
221
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
2e 0 2.3e+001 0 OOOOe+OOO 5.22e-001 1.43696919447e+002 2 O.OOe+OOO
3e 0 2.7e+001 0 OOOOe+OOO 4 . 15e-001 8 .24244760705e+001 1 1.21e+000
4e 0 4 .le+ooi 0 OOOOe+OOO 3 . 12e-001 6 . 9S433216672e+001 1 1.16e+000
5e 0 4.9e+001 0 OOOOe+OOO 1.32e-001 6.83999971085e+001 1 1.07e+000
6e 0 5.2e+001 0 OOOOe+OOO 1 . 89e-002 6.83824150208e+001 1 1.Ole+OOO
7e 0 5.4e+001 0 OOOOe+OOO 3 . 68e-004 6.83824082046e+001 1 l.OOe+OOO
Chi-square = 68.382
Degrees of freedom = 3 6
Probability level = 0.001
Summary of models
222
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Default model 55 68.382 36 0.001 1.900
Saturated model 91 0.000 0
Independence model 13 1053.673 78 0.000 13.509
Model NCP LO 90 HI 90
Model FMIN F0 LO 90 HI 90
223
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
HOELTER HOELTER
Model .05 .01
224
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Intention Model without Moral Obligation
Variables Entered/Removed *
Variables Variables
Model Entered Removed Method
1 Stepwise
(Criteria:
Probabilit
y-of-F-to-
enter <=
Attitude
.050,
Probabilit
y-of-F-to-r
emove >=
.100).
2 Stepwise
(Criteria:
Probabilit
y-of-F-to-
PBC enter <=
.050,
Probabilit
y-of-F-to-r
emove >=
.100).
3 Stepwise
(Criteria:
Probabilit
y-of-F-to-
Subjective enter <=
Norms .050,
Probabilit
y-of-F-to-r
emove >=
.100).
a. Dependent Variable: Intention
Model Summary
Adjusted Std. Error of
Model R R Square R Square the Estimate
1 .589a .346 .344 4.87830
2 ,709b .502 .499 4.26394
3 .725° .526 .521 4.16983
a. Predictors: (Constant), Attitude
b. Predictors: (Constant), Attitude, PBC
c. Predictors: (Constant), Attitude, PBC. Subjective
Norms
225
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
ANOVA*
Sum of
Model Squares df Mean Square F Sig.
1 Regression 3505.411 1 3505.411 147.300 .000*
Residual 6615.785 278 23.798
Total 10121.20 279
2 Regression 5084.997 2 2542.499 139.842 ,000b
Residual 5036.199 277 18.181
Total 10121.20 279
3 Regression 5322.247 3 1774.082 102.032 .000°
Residual 4798.949 276 17.387
Total 10121.20 279
a. Predictors: (Constant), Attitude
b. Predictors: (Constant), Attitude, PBC
c. Predictors: (Constant), Attitude, PBC, Subjective Norms
d. Dependent Variable: Intention
Coefficients*
Unstandardized Standardized
Coefficients Coefficients
Model B Std. Error Beta t Sig.
1 (Constant) 1.830 .911 2.009 .045
Attitude .617 .051 .589 12.137 .000
2 (Constant) -4.138 1.022 -4.050 .000
Attitude .476 .047 .454 10.153 .000
PBC .305 .033 .417 9.321 .000
3 (Constant) -4.868 1.019 -4.780 .000
Attitude .389 .052 .371 7.530 .000
PBC .270 .033 .369 8.065 .000
Subjective Norms .341 .092 .188 3.694 .000
a. Dependent Variable: Intention
Excluded Variables0
Collinearity
Partial Statistics
Model Beta In t Sig. Correlation Tolerance
1 PBC .417a 9.321 .000 .489 .897
Subjective Norms .306* 5.660 .000 .322 .722
2 Subjective Norms .188b 3.694 .000 .217 .663
a. Predictors in the Model: (Constant). Attitude
b. Predictors in the Model: (Constant), Attitude, PBC
c. Dependent Variable: Intention
226
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Digital Piracy:
Ethical Decision Making
By
May, 2002
University o f Arkansas
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
This abstract is approved by:
Dissertation Director:
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Software piracy issues have received much interest in the literature (with an
estimated $12 billion in lost revenues in 1998 according to the Software Publishers
Association). Other forms o f piracy have been emerging, such as video and music
piracy. Referred to as digital piracy, it is defined as: “The illegal copying and/or
Hollywood movies, and digital audio books among others)”. According to industry
America, and the Business Software Alliance), digital piracy caused loses o f about $20
In this research study, a model is developed that would help better explain and
understand digital piracy. Using the Theory o f Planned Behavior (TPB) as a basis, we
extend existing IT ethical behavior models with additional factors based on ethical
Results o f statistical analyses provided general support for the research model (10 out o f
attributes and feelings, importance o f the issue, attitude, subjective norms, perceived
behavioral control, and moral obligation. The results o f the study, as well as limitations,
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.