You are on page 1of 9

Journal of Computer Information Systems

ISSN: 0887-4417 (Print) 2380-2057 (Online) Journal homepage: http://www.tandfonline.com/loi/ucis20

Knowledge of Software Piracy as an Antecedent to


Reducing Pirating Behavior

Trevor T. Moores, Alexander Nill & Marcus A. Rothenberger

To cite this article: Trevor T. Moores, Alexander Nill & Marcus A. Rothenberger (2009)
Knowledge of Software Piracy as an Antecedent to Reducing Pirating Behavior, Journal of
Computer Information Systems, 50:1, 82-89

To link to this article: http://dx.doi.org/10.1080/08874417.2009.11645365

Published online: 11 Dec 2015.

Submit your article to this journal

Article views: 12

View related articles

Citing articles: 1 View citing articles

Full Terms & Conditions of access and use can be found at


http://www.tandfonline.com/action/journalInformation?journalCode=ucis20

Download by: [Ryerson University Library] Date: 18 October 2016, At: 08:34
Knowledge of Software Piracy as an
Antecedent to Reducing Pirating Behavior
TREVOR T. MOORES ALEXANDER NILL MARCUS A. ROTHENBERGER
Univ. of Nevada Las Vegas Univ. of Nevada Las Vegas Univ. of Nevada Las Vegas
Las Vegas, NV 89154-6034 Las Vegas, NV 89154-6010 Las Vegas, NV 89154-6034

ABSTRACT about Internet fraud, and audit tools for companies to ensure the
software on their servers are properly licensed. There is also a
We set out to answer the question: Can legislative and Newsroom link that reports the results of “sweeps week,” where
educational outreach programs reduce the level of software piracy? companies in a given area are raided, and also of the pursuit
Based on the Theory of Planned Behavior, we hypothesize that and conviction of Internet pirates. A Report Piracy link offers a
knowledge of software piracy promoted by these campaigns will reward of up to $1,000,000. The U.S. Chamber of Commerce also
lead to increased awareness of the legal consequences of engaging support a number of websites, such as TheTrueCosts.Org, that
in software piracy and the likelihood of being punished. These two outline the $200-250 billion and 750,000 job losses associated
constructs, in turn, will impact on one’s attitude towards software with all types of counterfeiting and piracy.
piracy, and hence, on the level of one’s pirating behavior. We The basic tenet behind all these programs is that if people
test the model using a sample of U.S. business students and understand software piracy is a crime and has harmful social
find strong support for the model, with an understanding of the and economic consequences, they will stop engaging in soft-
number of jobs lost due to software piracy being the dominant ware piracy. We set out to test that assumption. We suggest
factor. This suggests that decision makers in the software industry that if legislative and educational programs have had an effect,
need to refocus educational outreach programs from stressing the we should be able to relate a person’s level of knowledge of
illegality of copyright infringement to emphasizing the social software piracy to a heightened fear of punishment, and an
consequences of such behavior. understanding of the legal consequences of engaging in software
Keywords: Ethics, Knowledge, PLS, Software Piracy, Theory piracy. In turn, this should form a negative attitude towards
of Planned Behavior. software piracy and result in lower levels of piracy. Borrow-
ing from the Theory of Planned Behavior (TPB), we suggest
INTRODUCTION that subjective norms and perceived behavioral control may also
play a role.
Major software companies are losing 35-40% of their potential
retail revenue to software pirates around the world. Software piracy RESEARCH MODEL
involves the illegal copying, distribution, or sale of commercial
software without a license. It is estimated that between 2003 We propose a micro-level model of an individual’s software
and 2007 the global software piracy rate averaged 35.8% (BSA, pirating behavior, partially based on the Theory of Planned
2008), which means that nearly 36 out of every 100 copies of Behavior (TPB). The key exogenous variable is defined as
business software installed on computers around the world are knowledge of software piracy. We hypothesize that a successful
illegal copies. As a result, software vendors are estimated to have anti-piracy campaign must be successful in communicating
lost over $183.6 billion in sales over that period, averaging $36.7 knowledge about the nature and consequences of engaging in
billion a year. This money could have been used to fund further software piracy. Knowledge will impact on one’s perceived
R&D, expand markets, or hire new employees. likelihood of punishment, and generate a fear of the legal
The response of governments and vendor organizations, such consequences associated with engaging in software piracy. In
as the Business Software Alliance (BSA), is one of legislation, turn, these two constructs will affect one’s attitude towards the
education and enforcement. Legislation protecting intellectual act, and, along with subjective norms and perceived behavioral
property rights in the U.S. include the 1997 No Internet Theft control, will impact on the level of software piracy behavior. The
(NET) Act, which makes the unlicensed distribution of digital research model is shown in Figure 1.
goods illegal, even if no fee is involved, and the 1998 Digital
Millennium Copyright Act (DCMA), which makes it illegal Antecedents of Behavior
to circumvent digital rights management (DRM) controls.
International protection for intellectual property rights include The theory of planned behavior (TPB) (Ajzen, 1991) suggests
the World Trade Organization (WTO)’s 1995 Trade-Related that behavior is determined by intention, while intention is
Aspects of Intellectual Property Rights (TRIPs) Agreement, and determined by one’s personal (attitude), social (subjective norms),
the World Intellectual Property Organization (WIPO)’s 1996 and volitional (perceived behavioral control) beliefs. Attitude
“Internet Treaties,” which include the WIPO Copyright Treaty (ATT) refers to the degree to which a person has a favorable or
(WCT). unfavorable evaluation of the behavior. Attitudes develop from
Educational outreach programs have existed since the early- salient beliefs a person holds about a behavior. People tend to
1990s, with campaigns such as ‘Don’t Copy That Floppy’ favor behaviors that are believed to have desirable outcomes and
developed by the Software Publishers Alliance (SPA). On the form negative attitudes towards behavior that are associated with
BSA website (www.bsa.org) there are links for people worried undesirable outcomes.

82 Journal of Computer Information Systems Fall 2009


FIGURE 1 — Theoretical Model

KNOW = Knowledge of software piracy; PLP = Perceived likelihood of punishment; FLC = Fear
of legal consequences; ATT = Attitude; SN = Social norms; PBC = Perceived behavioral control;
BEHAV = Behavior (level of pirating software)

Subjective norms (SN) refer to the perceived peer or social 2008; Ramakrishna et al. 2001; Walstrom, 2006). In this case,
pressure to perform (or not perform) a specific behavior. If engaging in software piracy is often facilitated by a feeling that
important referent groups or individuals approve of a behavior, ‘everyone else is doing it, so it can’t be wrong.’ Therefore, we
the more likely a person will be to engage in that behavior. Finally, define subjective norms (SN) as the extent to which the individual
perceived behavioral control (PBC) refers to the perceived ease or believes that peers are also engaging in software piracy. Finally,
difficulty of performing a specific behavior. In other words, being perceived behavioral control (PBC) is defined in terms of the ease
able to successfully carry out the behavior is a joint function of of copyright violation, or the ease with which someone believes
motivation (ATT and SN) and actual ability (PBC). The theory they can find, make, or use pirated software.
is well supported (Armitage & Conner, 2001), and has been used Given that behavior is the key endogenous variable, and
to predict a number of different types of undesirable behavior, intention has sometimes been found to have a weak relationship
such as cheating on a test, shoplifting, and lying (Beck & Ajzen, to behavior (e.g., Kim & Malhotra, 2005; Limayem et al. 2004),
1991), drug use (McMillan & Conner, 2003), and faking positive we depart from TPB by relating ATT, SN, and PBC directly to
characteristics on admission tests (McFarland & Ryan, 2006). behavior (BEHAV). Therefore, we have:
When applied to software piracy, however, TPB has yielded
mixed results. In one study (Peace et al., 2003), punishment H1: A hostile attitude towards copyright violations (ATT)
severity and certainty negatively impacted on one’s attitude will positively determine one’s level of copyright
towards software piracy, suggesting that anti-piracy campaigns compliance (BEHAV).
that targeted these attributes would be effective at reducing the H2: The use of pirated software by one’s peers (SN)
level of software piracy. However, there was no measure of the will negatively determine one’s level of copyright
extent to which the respondents knew the legal ramifications compliance (BEHAV).
of software piracy. In other studies, awareness of the law was H3: The ease of engaging in copyright violations (PBC)
a weak predictor of attitude (Goles et al., 2008), with other will negatively determine one’s level of copyright
constructs such as moral obligation and habitual (past) behavior compliance (BEHAV).
being a better predictor of intention than TPB’s trio of attitude,
social norms, and perceived behavioral control (e.g., Cronan & Antecedents of Attitude
Al-Rafee, 2008).
In light of these problems, we will apply TPB to software We propose that in order to change a person’s attitude
piracy within a framework of understanding the social, legal, towards software piracy, the individual must understand what
and economic consequences of software piracy, brought about software piracy is, and be aware of the likelihood and severity of
by ongoing legislative and educational anti-piracy campaigns. punishment of engaging in software piracy. Other models have
Behavior (BEHAV) is defined in terms of copyright compliance, applied deterrence theory to suggest that punishment certainty
or the extent to which an individual maintains their personal and punishment severity will impact on attitude (Peace et al.
computer free of unlicensed or counterfeit software. Attitude 2003), while the perceived lack of censure has often been given as
(ATT) is defined as the extent to which an individual agrees a reason for engaging in an act that is known to be illegal (Moores
that copyright violations are wrong, and would support further & Chang, 2006; Moores & Dhaliwal, 2004).
legislation against piracy. Such an attitude would be hostile Therefore, we define two antecedent constructs that impact on
towards software piracy. attitude. The perceived likelihood of punishment (PLP) is defined
Given that moral acts are often defined in terms of what as the perception that anyone that engages in software piracy will
society expects of the individual, subjective norms is an be caught and prosecuted. The fear of legal consequences (FLC)
important element of the decision-making process (Lee et al. is defined as a fear of the potential legal consequences associated

Fall 2009 Journal of Computer Information Systems 83


with engaging in software piracy. The difference between the highest piracy rate, to the meaning of shareware. This variation is
two constructs is that although an individual may understand meant to capture the breadth and depth of a person’s knowledge
that software piracy is illegal, they may not believe they would of software piracy. Answering a question correctly received one
ever be caught, or they may not know or fear the severity of the point, answering incorrectly or Don’t Know received zero points.
punishment enacted by law. Therefore, we have: The final items are shown in the Appendix.
The target sample was business students at a large southwestern
H4: The perceived likelihood of punishment (PLP) for U.S. university. The U.S. is the largest software market in the
engaging in software piracy will positively determine world and accounts for 20% of the global losses due to software
a hostile attitude towards copyright violations (ATT). piracy. The survey instrument included an introduction that stated
H5: A fear of the legal consequences (FLC) for engaging participation is voluntary, responses are collected anonymously,
in software piracy will positively determine a hostile and confidentiality is guaranteed. In order to “cue” the respondents,
attitude towards copyright violations (ATT). a definition of software piracy as “the unauthorized production,
duplication, or use of a software product” was provided. The
The effectiveness of legislation as a deterrent is enhanced knowledge items were presented first, followed by the rest, with
when individuals are successfully prosecuted. For instance, the some of the items randomly scattered throughout the list in order
BSA posts a number of reports under their Newsroom link of to reduce common response bias. The demographic questions
companies making settlements for using unlicensed software, were placed at the end of the survey form.
including over $2 million from 19 companies during a “sweep’s The survey was distributed as a within-class exercise for
week” in July 2006. There are also numerous reports of individuals graduate and undergraduate business majors. Of 108 questionnaires
being convicted under the NET act. Some receive more than five distributed, all were returned. Five were incomplete, leaving
years in prison, and fines running into the millions of dollars. The a usable sample of 103. Given the 95% response rate, no non-
extent to which someone will respond to these threats of censure, response bias analysis is carried out. Demographic information
however, will depend on the extent to which they know what provided by the participants showed 52% were male, 48%
software piracy is, are aware of the likelihood of punishment, female, with an average age of 25.7 years, and 5.4 years of work
and the legal consequences involved. Our final two hypotheses, experience.
therefore, are:
RESULTS
H6: One’s level of knowledge of software piracy (KNOW)
will positively determine one’s perceived likelihood We use partial least squares (PLS-Graph 3.0 Build 1126) to
of punishment (PLP) for engaging in software piracy. analyze the relationships defined by the research model. Indicators
H7: One’s level of knowledge of software piracy (KNOW) for all the constructs except KNOW are defined as reflective, with
will positively determine one’s fear of the legal pathways from each latent variable (PLP, FLC, ATT, SN, PBC,
consequences (FLC) for engaging in software piracy. and BEHAV) leading outward to its manifest variable (LP1, LP2,
LP3, etc., etc.). Following previous literature (e.g., Yi & Davis,
METHODOLOGY 2003), we define KNOW as formative, because knowledge of
software piracy is an aggregate of component knowledge, with
Items were developed for each construct adapting from those each question capturing a different aspect of the problem (i.e.,
that exist and tested using a series of pilot studies with the aim of social and financial effects, copyright issues, etc.). In this case,
producing 3-5 items for each construct, with six items developed pathways from each manifest variable (KN1, KN2, etc.), lead
for the knowledge construct. The PLP items are reverse coded inward to the latent variable, KNOW.
to allow a more intuitive wording in which people engaging in
software piracy feel they will be not caught. A lack of censure is Measurement Model
often cited as a reason for engaging in software piracy (Moores
& Chang 2006). Given that software piracy involves buying as Convergent and discriminant reliability of reflective items
well as using, each scale include items that refer to installing can be shown by carrying out a PLS confirmatory factor analysis.
illegal copies of software products, as well as buying counterfeit Items should load with their a priori constructs with a loading
or unauthorized copies of software. of at least .6 and preferably greater than .7 (Chin 1998), with
The scale for knowledge of software piracy, KNOW, used a the remaining correlations indicating cross-loading. The results
set of six questions with a True, False, and Don’t Know scale. The (see Table 1), show that each set of items (shown in bold), have
Don’t Know response is designed to eliminate guesses and ensure loadings greater than .7, with the majority above .8, and no cross-
correct responses are strong cases of knowledge. The questions loadings above .6.
were designed to capture the different aspects of software piracy The significance of loadings can be tested using a bootstrap
often used in anti-piracy campaigns, such as the legal protection analysis, which involves resampling the original dataset with
given to software, and the major economic and social losses in the one data point replaced. The ratio of coefficient to the variance
U.S. associated with software piracy. This type of information is derived from the bootstrapping is treated as a t-statistic, with a
prominently featured in press releases and newspaper articles on ratio greater than 2 being significant. Although there is no strict
software piracy, and highlighted by vendor organizations such as rule, a bootstrap using at least 100 resamples is common. In this
BSA. If participants in this survey have read or heard anything case, using 100 resamples indicate that all items load significantly
about software piracy, they should be able to correctly answer on their respective constructs (p < .001).
one or more of these questions. Convergent and discriminant reliability of constructs can be
The questions were also designed to vary in terms of the level shown by calculating the composite reliability, average variance
of detail of information, from the particular country with the extracted, and inter-construct correlations. For convergent

84 Journal of Computer Information Systems Fall 2009


TABLE 1 — Loadings and Cross-Loadings for Reflective Measures
Item PLP FLC ATT SN PBC BEHAV
LP1 0.713 -0.198 -0.050 0.197 0.244 -0.119
LP2 0.740 -0.215 -0.043 0.204 0.304 -0.082
LP4 0.863 -0.433 -0.193 0.418 0.460 -0.381
LP5 0.856 -0.304 -0.182 0.292 0.428 -0.211
LP6 0.850 -0.403 -0.271 0.317 0.390 -0.308
LC1 -0.412 0.870 0.516 -0.301 -0.419 0.513
LC2 -0.396 0.911 0.600 -0.340 -0.471 0.523
LC3 -0.374 0.885 0.582 -0.412 -0.450 0.451
LC4 -0.295 0.886 0.550 -0.346 -0.399 0.412
AT1 -0.149 0.572 0.829 -0.405 -0.294 0.563
AT2 -0.143 0.574 0.803 -0.372 -0.310 0.462
AT3 -0.200 0.509 0.801 -0.455 -0.297 0.501
AT4 -0.108 0.447 0.846 -0.323 -0.218 0.377
AT5 -0.313 0.414 0.776 -0.253 -0.266 0.286
SN1 0.324 -0.338 -0.395 0.815 0.425 -0.393
SN2 0.421 -0.405 -0.449 0.864 0.468 -0.446
SN3 0.169 -0.208 -0.261 0.729 0.381 -0.442
BC1 0.403 -0.319 -0.241 0.537 0.807 -0.290
BC2 0.373 -0.426 -0.262 0.451 0.827 -0.341
BC3 0.452 -0.482 -0.330 0.400 0.850 -0.296
BC4 0.412 -0.466 -0.372 0.359 0.854 -0.321
BC5 0.304 -0.318 -0.217 0.441 0.784 -0.310
BH1 -0.229 0.500 0.457 -0.409 -0.390 0.863
BH2 -0.400 0.497 0.501 -0.502 -0.366 0.886
BH3 -0.258 0.486 0.508 -0.495 -0.336 0.941
BH4 -0.243 0.446 0.536 -0.504 -0.279 0.903
Note: Loadings shown in bold represent items loading on their a priori constructs. No cross-loadings exceed .6.

TABLE 2 — Convergent Reliability of Constructs


reliability, CR and AVE are expected to be above .7 and .5,
Construct CR AVE
respectively, while for discriminant reliability the square root of
PLP .903 .651 the AVE should exceed the inter-construct correlations (Hair et al.
FLC .937 .789 1998). The results obtained from bootstrapping (100 resamples)
ATT .906 .658 show that all constructs have a CR above .8 and AVE above .6
SN .846 .648 (see Table 2), while the square root of the AVE exceeds the inter-
construct correlations by at least .25 (see Table 3). The relatively
PBC .914 .680
low inter-construct correlations also suggest there is no evidence
BEHAV .944 .808 of a common method bias.

TABLE 3 — Discriminant Reliability of Constructs


KNOW PLP FLC ATT SN PBC BEHAV
KNOW n/a
PLP -.293 .807
FLC .519 -.417 .888
ATT .270 -.216 .632 .811
SN -.092 .379 -.394 -.458 .805
PBC -.149 .471 -.489 -.345 .529 .825
BEHAV .248 -.316 .535 .558 -.533 -.379 .899
Note: Square-root of the AVE on the diagonals, inter-construct correlations within the columns.

Fall 2009 Journal of Computer Information Systems 85


TABLE 4
Analysis of Formative Construct, Knowledge of Software Piracy (KNOW)
Item Num. answered correctly Weight Mean of subsamples Std. Err. t-Statistic
KN1 42 .961 .901 .131 7.315
KN2 8 -.215 -.176 .148 1.455
KN3 11 -.135 -.137 .187 .720
KN4 54 .089 .041 .172 .517
KN5 83 .175 .143 .125 1.409
KN6 51 .141 .134 .148 .954
Note: t-Statistics greater than 1.984 are significant at p < .05.

FIGURE 2 — Path Model


Note: *** p < .01. Figures in parentheses are t-scores.

KNOW = Knowledge of software piracy; PLP = Perceived likelihood of punishment; FLC = Fear of
legal consequences; ATT = Attitude; SN = Social norms; PBC = Perceived behavioral control; BEHAV
= Behavior (level of pirating software)

Given that KNOW is a formative construct, the weights and 41.4%, respectively, suggesting the model accounts for a
of the six items can be examined to determine which are substantial amount of variance in these constructs. This result
significantly impacting on the construct. The weights and re- provides support for hypotheses H1, H2, H5, and H7, but only
sults of bootstrapping (100 resamples) are given in Table 4. weak support for H6.
It can be seen that KN1, which relates to the estimated 100,000 We test the role of KNOW by adding paths from KNOW
jobs lost each year due to software piracy, is the dominant to ATT, SN, PBC, and BEHAV. The only significant pathway
item. In short, correctly answering this question accounts for is between KNOW and PBC (t = 2.021, p = .046), but the path
almost all of the variance in the construct and is responsible for coefficient is marginal (b = -.217), and the R2 is relatively low
the significant relationships detected between KNOW and PLP, (4.7%), suggesting a statistically significant but semantically
and FLC. unimportant relationship. The alternative pathways add nothing
to the original research model and confirms that KNOW is the
Structural Model key exogenous variable and acts through PLP and FLC.

The path coefficients obtained from PLS analysis is shown DISCUSSION


in Figure 2, with t-statistics derived from bootstrapping (100
resamples) in parentheses. Meaningful — as opposed to just The results of this study suggest the more people know about
statistically significant — path coefficients should be at least .2 software piracy and the social, legal, and economic consequences
and preferably greater than .3 (Chin 1998). All path coefficients of stealing software, the more they perceive the likelihood
are significant at p < .01, except for PLP to ATT, and PBC to exists that installing illegal software will result in some form of
BEHAV. Although the path from KNOW to PLP is significant, punishment, and the greater the fear of the legal consequences
the R2 is relatively low (8.6%), suggesting borderline importance. for doing so. The fear of legal consequences (FLC) is the prime
The R2 value for FLC, ATT, and BEHAV is 26.9%, 40.3%, motivating factor, impacting significantly on attitude towards

86 Journal of Computer Information Systems Fall 2009


software piracy (ATT), and consequently on behavior (BEHAV). process. For instance, arcades in Hong Kong selling pirated
Subjective norms (SN) also play a role, with a significant software include utilities to generate valid product keys and
relationship being found between SN and BEHAV. instructions on how to circumvent the online activation process
The lack of significance between PBC and BEHAV may be (Walls & Harvey, 2006). Pirating software is still very easy to
due in part to the relatively low incidence of software piracy do.
amongst the participants in this survey. On average, 35% of the
participants violated the compliance behavior items (answering Practical Implications
‘1’ or ‘2’ on the 5-point Likert scale), which is higher than the
software piracy rate for the U.S., which stood at 20% in 2007, but The knowledge items suggest that an understanding of the
much lower than other studies conducted in high piracy countries number of jobs that are lost due to software piracy had a significant
such as Hong Kong and Singapore (Moores & Chang 2006; impact on FLC, ATT, and BEHAV. While current campaigns
Moores & Dhaliwal 2004). In studies where more than 50% of focus on the legality of the issue and brow-beat individuals
the participants admitted to engaging in software piracy, PBC has into remembering that illegal copying is theft, none have
a strong influence on intention (Peace et al. 2003). highlighted an issue that is of great concern to all business
On the other hand, it would not be surprising to find that if students: their future careers. If worries over offshoring and
someone believed software piracy was wrong, the ease with the loss of entry-level positions has impacted on the psyche of
which software could be pirated would have no impact on their business students, persuading someone not to pirate software
behavior. This suggestion is supported by adding a path from PBC because it may impact on their future job prospects is likely to
to ATT and from PBC to SN. While the path from PBC to ATT is be a powerful message.
insignificant (b = -.077), the path from PBC to SN is found to be One area anti-piracy campaigns do seem to be successful in
strong (b = .537), significant (t = 6.651, p = .000), and accounts promoting is a fear of legal consequences (FLC), which plays a
for 28.9% of the variance in SN. It would appear, therefore, that a pivotal role between knowledge and attitude. While some sources
relative lack of difficulty in producing pirated software heightens suggest the BSA exaggerates the level of piracy in order to justify
the perception that ‘everyone else is doing it,’ but has no impact draconian legislation (e.g., The Economist 2005), a fear of
on those that believe it to be wrong. consequences clearly had an effect on a person’s attitude towards
software piracy. We do not suggest that further aggressive
Theoretical Contributions legislation is warranted; rather, it would appear the message has
gotten through and further education on the existing laws may be
While it seems a tautology to suggest that decision-making the most effective next step.
requires knowledge, a measure of a person’s understanding of The power of subjective norms to influence behavior may also
an act has not been previously introduced into models of ethical be enhanced by forming alliances with prominent, well-respected
decision-making. Both the theory of planned behavior (TPB) and figures to advocate the message that software piracy is wrong. For
the theory of reasoned action (TRA) assume that if someone has instance, Arnold Schwarzenegger and Jackie Chan participated
a positive attitude towards a behavior they will follow-through in an anti-piracy ad for the California Commission for Jobs and
with that behavior unless there are social (SN) or practical Economic Growth. Anti-piracy campaigns using movie stars, pop
(PBC) constraints. We have shown that one’s attitude towards singers, or sports stars would acquire the power of the voice of the
a behavior depends on understanding the consequences of that advocate. If the perceived likelihood of punishment is not enough
behavior (in this case, FLC and PLP), but understanding the to stop piracy, the wagging finger of a respected other may be
consequences depends on knowing something about the behavior more effective.
being considered.
Although the theory of planned behavior does include Limitations and Further Work
attitudinal beliefs about the positive (or negative) outcome
expectations of the act, this does not seem to capture enough of Whenever a survey asks about illegal behavior, such as soft-
the social aspect of software piracy. Ethical problems typically ware piracy, there is a possibility that participants will not answer
involve a tension between the needs and rights and one (person honestly. Furthermore, we do not determine the communication
or group) against another. In this case, there is a person’s desire channel through which knowledge about software piracy is
for a piece of software versus the cost of acquiring that software acquired. The information could be acquired by reading
legally. Attitudinal beliefs may conflict, therefore, where pirating newspapers, watching television, listening to the radio, browsing
software is good for the individual but bad for others (i.e., the the web, or by word-of-mouth. The model only assesses whether
software vendor). Our results suggest that if someone understands knowledge of software piracy, perceived likelihood of punishment,
the wider social impact of their selfish behavior they are more and fear of legal consequences significantly impact on attitude,
likely to develop a negative attitude towards software piracy. This and hence, behavior. It would be useful to know which channel is
is also the goal of anti-piracy campaigns. most effective, however, to facilitate a more effective anti-piracy
Furthermore, the lack of significance for perceived behavioral campaign. This would be an area of further work.
control (PBC) suggests that software piracy must be deemed a While the sample size is large enough to analyze the full
purely volitional act with no significant behavioral controls. The model, it is not large enough to conduct split-sample tests, look-
PBC construct attempts to explain actions that are intended but ing, say, at the effects of age and gender on the relationships
prevented by negative beliefs about ability. Although software defined by the model. Age is often found to have an impact on
vendors have introduced product keys and activation procedures ethical decision-making (Kini et al. 2000; O’Fallon et al. 2005),
to try and log installations and ensure the same software disk is not although gender is more controversial (Jaffee & Hyde 2000).
being installed across multiple computers, professional software With a larger sample, these moderating effects could have
pirates have always been one step ahead of the authentication been investigated.

Fall 2009 Journal of Computer Information Systems 87


Finally, the key knowledge construct defined here contained [8] Hair, Jr., J.F., Anderson, R.E., Tatham, R.L., and Black,
only six items, relating to the social, legal, and economic W.C. Multivariate Data Analysis with Readings (4th ed.),
consequences of software piracy. Although we believe these Prentice-Hall, Upper Saddle River, NJ, 1998.
are the most important aspects associated with understanding [9] Jaffee, S., and Hyde, J.S. “Gender differences in moral
the consequences of engaging in software piracy, a larger set of orientation: A meta-analysis,” Psychological Bulletin
items could have uncovered more elements of knowledge that (126:5), 2000, pp. 703-726.
impacted on the construct. Further studies could be conducted [10] Kim, S.S., and Malhotra, N.K. “Predicting system usage
to determine which other aspects have a significant impact on from intention and past use: Scale issues in the predictors,”
one’s understanding, and hence, should be communicated in any Decision Sciences (36:1), 2005, pp. 187-196.
campaign against software piracy. [11] Kini, R.B., Rominger, A., and Vijayaraman, B.S. “An
empirical study of software piracy and moral intensity among
CONCLUSIONS University students,” Journal of Computer Information
Systems (40:3), 2000, pp. 62-72.
We proposed that if any anti-software piracy campaign is to [12] Lee, S.M., Yoon, S.N., and Kim, J. “The role of pluralistic
be effective at reducing the levels of piracy, the social, legal, ignorance in internet abuse,” Journal of Computer
and economic consequences of stealing software must be clearly Information Systems (48:3), 2008, pp. 38-43.
communicated to the target audience, in this case, U.S. business [13] Limayem, M., Khalifa, M., and Chin, W.W. “Factors
students. We found that knowledge of software piracy led to an motivating software piracy: A longitudinal study,” IEEE
awareness of the punishments involved and a fear of the legal Transactions on Engineering Management (51:4), 2004, pp.
consequences. A fear of legal consequences impacts on attitude, 414-425.
and consequently, on behavior. The ethical nature of software [14] McFarland, L.A., and Ryan, A.M. “Toward an integrated
piracy is confirmed with a significant impact of subjective norms model of applicant faking behavior,” Journal of Applied
on behavior. Perceived behavioral control appears not to play a Social Psychology (36:4), 2006, pp. 979-1016.
role, perhaps because the ease of copying software is not an issue [15] McMillan, B., and Conner, M. “Applying an extended
if people believe piracy is wrong. version of the theory of planned behavior to illicit drug use
The dominant piece of knowledge involved an understanding among students,” Journal of Applied Social Psychology
of the tens of thousands of jobs estimated to be lost every year due (33:8), 2003, pp. 1662-1683.
to software piracy. This might explain why many of the current [16] Moores, T.T., and Chang, J.C.J. “Ethical decision-making
anti-piracy campaigns that focus on the fact that software piracy in software piracy: Initial development and test of a four-
is illegal have failed: people understand the legality of copyrights, component model,” MIS Quarterly (30:1), 2006, pp. 167-
but this does not impact on their behavior. We suggest instead 180.
that campaigns of the software industry refocus their message [17] Moores, T.T., and Dhaliwal, J. “A reversed context analysis
on the social consequences, namely, that stealing software might of software piracy issues in Singapore,” Information &
lead to someone they know losing their job. Management (41:8), 2004, pp. 1037-1042.
[18] O’Fallon, M.J., and Butterfield, K.D. “A review of the
REFERENCES empirical ethical decision-making literature: 1996-2003,”
Journal of Business Ethics (59:4), 2005, pp. 375-413.
[1] Ajzen, I. “The theory of planned behavior: Some unresolved [19] Peace, A.G., Galletta, D.F., and Thong, J.Y.L. “Software
issues,” Organizational Behavior and Human Decision piracy in the workplace: A model and empirical test,”
Processes (50:2), 1991, pp. 179-211. Journal of Management Information Systems (20:1), 2003,
[2] Armitage, C.J., and Conner, M. “Efficacy of the theory of pp. 153-177.
planned behaviour: A meta-analytic review,” British Journal [20] Ramakrishna, H.V., Kini, R.B., and Vijayaraman, B.S.
of Social Psychology (40:4), 2001, pp. 471-499. “Shaping of moral intensity regarding software piracy in
[3] Beck, L., and Ajzen, I. “Predicting dishonest actions using University students: Immediate community effects,” Journal
the theory of planned behavior,” Journal of Research in of Computer Information Systems (41:4), 2001, pp. 47-51.
Personality (25:3), 1991, pp. 285-301. [21] The Economist “Software piracy: BSA or just BS?” May 21,
[4] BSA. “Fifth Annual BSA and IDC Global Software Piracy 2005, pp. 78.
Study,” Washington, DC: Business Software Alliance, 2008 [22] Walls, W.D. and Harvey, P.J. “Digital pirates in practice:
(available online at http://www.bsa.org/globalstudy/). Analysis of market transactions in Hong Kong’s pirate
[5] Chin, W.W. “Issues and opinion on structural equation software arcades,” International Journal of Management
modeling,” MIS Quarterly (22:1), 1998, pp. vii-xvi. (23:2), 2006, pp. 207-215.
[6] Cronan, T.P., and Al-Rafee, S. “Factors that influence the [23] Walstrom, K.A. “Social and legal impacts on information
intention to pirate software and media,” Journal of Business ethics decision making,” Journal of Computer Information
Ethics (78:4), 2008, pp. 527-545. Systems (47:2), 2006, pp. 1-7.
[7] Goles, T., Jayatilaka, B., George, B., Parsons, L., Chambers, [24] Yi, M.Y., and Davis, F.D. “Developing and validating an
V., Taylor, D. and Brune, R. “Softlifting: Exploring observational learning model of computer software training
determinants of attitude,” Journal of Business Ethics (77:4), and skill acquisition,” Information Systems Research (14:2),
2008, pp. 481-499. 2003, pp. 146-169.

88 Journal of Computer Information Systems Fall 2009


APPENDIX
SURVEY ITEMS

Items are answered on a 5-point (1-Disagree, 5-Agree) Likert Scale, except KNOW, which is answered True, False, Don’t Know, with one
point awarded for a correct answer, and zero otherwise.

Knowledge of Software Piracy (KNOW)


KN1: More than 100,000 jobs are lost each year due to software piracy (True).
KN2: The country of Vietnam is the largest producer of pirated software products (False, the largest producer of pirated software is the
U.S.).
KN3: Shareware is software that you can download, but must pay for (False, shareware are trial versions that can be disseminated for
free).
KN4: U.S. businesses are losing more than $9.2 billion annually due to pirates (False, the actual sum is around $6.7 billion).
KN5: Most software is protected through copyrights (True).
KN6: Copyrights only protect the source code but not the idea or the feel of the software (True).

Perceived Likelihood of Punishment (PLP)


LP1: It is very unlikely that someone who illegally installed software would be caught and prosecuted.
LP2: It is very difficult for law enforcement authorities to identify users of unauthorized installations of software.
LP3: It is not likely that a buyer of counterfeit software would be caught and prosecuted.
LP4: It is very difficult for law enforcement authorities to identify buyers of counterfeit software.
LP5: I do not think that I would get caught if I bought counterfeit software for my computer.

Fear of Legal Consequences (FLC)


LC1: I do not use unauthorized copies of software, because I am afraid of the legal consequences.
LC2: I would not knowingly install illegal copies of a software product on my home computer, because I fear the potential legal
consequences.
LC3: I do not buy counterfeit software because I am afraid of the legal consequences.
LC4: I would not knowingly buy an unauthorized copies or reproductions of a software product for my home computer, because I fear
the potential legal consequences.

Attitude (ATT)
AT1: I am against the unauthorized installation of software.
AT2: I would support tougher legal penalties for the unauthorized use of software.
AT3: I am against the production of counterfeit software.
AT4: I would support tougher legal penalties for the unauthorized production of software.
AT5: The government should make more of an effort to stop the unauthorized production of software.

Subjective Norm (SN)


SN1: I know many people who use copies of software products that they do not legally own.
SN2: Many of my friends have unauthorized installations of software on their computers.
SN3: Many of my friends have installations of unauthorized copies or reproductions of software on their computers.

Perceived Behavioral Control (PBC)


BC1: It is easy to find someone who will let me make unauthorized copies of her/his software.
BC2: It is easy to find a copy of software I want to install but not pay for.
BC3: It is easy to use illegally copied software even without documentation or support.
BC4: Most unauthorized copies of software are as easy to use as the licensed version.
BC5: It is easy to obtain unauthorized copies or reproductions of software.

Behavior (BEHAV)
BH1: All the software on my computer has been legally installed.
BH2: I do not have any illegal copies of software.
BH3: I do not have any unauthorized copies or reproductions of a software product on my computer.
BH4: I do not own any unauthorized copies or reproductions of software.

Fall 2009 Journal of Computer Information Systems 89

You might also like