Skip to main content
Top
Published in: Journal of Business Ethics 3/2016

09-12-2014

Exploring Factors Affecting Digital Piracy Using the Norm Activation and UTAUT Models: The Role of National Culture

Authors: Godwin Udo, Kallol Bagchi, Moutusy Maity

Published in: Journal of Business Ethics | Issue 3/2016

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

We develop and use an integrated individual-level model to explain the driving forces behind digital piracy (DP) practice in two nations. The proposed model combines the Norm Activation model and Unified Theory of Acceptance and Use of Technology models. This study also explores the effect of culture on intention (INT) to practice DP in two nations: US (individualistic) and India (collectivistic). A survey instrument was used to collect data from 231 US and 331 Indian participants. Use of the integrated model proves to be a powerful and a viable approach to understanding DP across cultures. In each nation, all 10 path coefficients on the research model are statistically significant thereby establishing the fact that personal norm, together with other factors, influences INT to engage in DP, which in turn, may influence the actual practice. The results reveal a support for cross-cultural generalizability and applicability of the proposed model. Culture clearly plays a strong moderating role in two out of the three paths tested. The implications of the findings are discussed.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Appendix
Available only for authorised users
Literature
go back to reference Abrahamse, W., Steg, L., Gifford, R., & Vlek, C. (2009). Factors influencing car use for commuting and the intention to reduce it: A question of self-interest or morality? Transportation Research Part F: Traffic Psychology and Behaviour, 12(4), 317–324.CrossRef Abrahamse, W., Steg, L., Gifford, R., & Vlek, C. (2009). Factors influencing car use for commuting and the intention to reduce it: A question of self-interest or morality? Transportation Research Part F: Traffic Psychology and Behaviour, 12(4), 317–324.CrossRef
go back to reference Ajzen, I. (2002). Residual effects of past on later behavior: Habituation and reasoned action perspectives’. Personality and Social Psychology Review, 6(2), 107–122.CrossRef Ajzen, I. (2002). Residual effects of past on later behavior: Habituation and reasoned action perspectives’. Personality and Social Psychology Review, 6(2), 107–122.CrossRef
go back to reference Al-Rafee, S., & Cronan, T. P. (2006). Digital piracy: Factors that influence attitude toward behavior. Journal of Business Ethics, 63, 237–259.CrossRef Al-Rafee, S., & Cronan, T. P. (2006). Digital piracy: Factors that influence attitude toward behavior. Journal of Business Ethics, 63, 237–259.CrossRef
go back to reference Al-Rafee, S., & Rouibah, K. (2010). The fight against digital piracy: An experiment. Telematics and Information, 27, 283–292.CrossRef Al-Rafee, S., & Rouibah, K. (2010). The fight against digital piracy: An experiment. Telematics and Information, 27, 283–292.CrossRef
go back to reference Anderson, J. C., & Gerbing, D. W. (1988). Structural equation modeling in practice: A review and recommended two-step approach. Psychological Bulletin, 103(3), 411–423.CrossRef Anderson, J. C., & Gerbing, D. W. (1988). Structural equation modeling in practice: A review and recommended two-step approach. Psychological Bulletin, 103(3), 411–423.CrossRef
go back to reference Bagchi, K., Kirs, P., & Cerveny, R. (2006). Global software piracy: Can economic factors alone explain the trend? Communications of the ACM, 49(6), 70–75.CrossRef Bagchi, K., Kirs, P., & Cerveny, R. (2006). Global software piracy: Can economic factors alone explain the trend? Communications of the ACM, 49(6), 70–75.CrossRef
go back to reference Bandura, A. (1986). Social foundations of thought and action: A social cognitive theory. Englewood Cliffs, NJ: Prentice-Hall. Bandura, A. (1986). Social foundations of thought and action: A social cognitive theory. Englewood Cliffs, NJ: Prentice-Hall.
go back to reference Banerjee, D., Cronan, T. P., et al. (1998). Modeling IT ethics: A study in situational ethics. MIS Quarterly, 22(1), 31–60.CrossRef Banerjee, D., Cronan, T. P., et al. (1998). Modeling IT ethics: A study in situational ethics. MIS Quarterly, 22(1), 31–60.CrossRef
go back to reference Baron, R. M., & Kenny, D. A. (1986). The moderator–mediator variable distinction in social psychological research: Conceptual strategic and statistical considerations. Journal of Personality and Social Psychology, 51, 1173–1182.CrossRef Baron, R. M., & Kenny, D. A. (1986). The moderator–mediator variable distinction in social psychological research: Conceptual strategic and statistical considerations. Journal of Personality and Social Psychology, 51, 1173–1182.CrossRef
go back to reference Batson, C., & Powell, A. A. (2003). Altruism and prosocial behavior. In T. Millon & M. J. Lerner (Eds.), Handbook of psychology: Personality and social psychology (Vol. 5, pp. 463–484). Hoboken, NJ: Wiley. Batson, C., & Powell, A. A. (2003). Altruism and prosocial behavior. In T. Millon & M. J. Lerner (Eds.), Handbook of psychology: Personality and social psychology (Vol. 5, pp. 463–484). Hoboken, NJ: Wiley.
go back to reference Bhattacharjee, S., Gopal, R. D., & Lertwachara, K. (2006). Consumer search and retailer strategies in the presence of online music sharing. Journal of Management Information Systems, 23(1), 129–159.CrossRef Bhattacharjee, S., Gopal, R. D., & Lertwachara, K. (2006). Consumer search and retailer strategies in the presence of online music sharing. Journal of Management Information Systems, 23(1), 129–159.CrossRef
go back to reference Bono, S., Rubin, A., Stubblefield, A., & Green, M. (2006). Security through legality. Communications of the ACM, 49(6), 41–43.CrossRef Bono, S., Rubin, A., Stubblefield, A., & Green, M. (2006). Security through legality. Communications of the ACM, 49(6), 41–43.CrossRef
go back to reference Carlo, G., Mestre, M. V., Samper, P., Tur, A., & Armenta, B. E. (2010). Feelings or cognitions? Moral cognitions and emotions as longitudinal predictors of prosocial and aggressive behaviors. Personality and Individual Differences, 48, 872–877.CrossRef Carlo, G., Mestre, M. V., Samper, P., Tur, A., & Armenta, B. E. (2010). Feelings or cognitions? Moral cognitions and emotions as longitudinal predictors of prosocial and aggressive behaviors. Personality and Individual Differences, 48, 872–877.CrossRef
go back to reference Castaneda, J. A., Munoz-Leiva, F., & Luque, T. (2007). Web acceptance model (WAM): Moderating effects of user experience. Information and Management, 44, 384–396.CrossRef Castaneda, J. A., Munoz-Leiva, F., & Luque, T. (2007). Web acceptance model (WAM): Moderating effects of user experience. Information and Management, 44, 384–396.CrossRef
go back to reference Chin, W., Marcolin, B., & Newsted, P. R. (1996) A partial least squares latent variable modeling approach for measuring interaction effects: Results from a Monte Carlo simulation study and voice mail emotion/adoption study. In Proceedings of ICIS (pp. 21–41). Chin, W., Marcolin, B., & Newsted, P. R. (1996) A partial least squares latent variable modeling approach for measuring interaction effects: Results from a Monte Carlo simulation study and voice mail emotion/adoption study. In Proceedings of ICIS (pp. 21–41).
go back to reference Compeau, D., Higgins, C. A., & Huff, S. (1999). Social cognitive theory and individual reactions to computing technology: A longitudinal study. MIS Quarterly, 23(2), 145–158.CrossRef Compeau, D., Higgins, C. A., & Huff, S. (1999). Social cognitive theory and individual reactions to computing technology: A longitudinal study. MIS Quarterly, 23(2), 145–158.CrossRef
go back to reference Conner, M., & Armitage, C. (1998). Extending the theory of planned behavior: A review and avenues for further research. Journal of Applied Social Psychology, 28(15), 1429–1464.CrossRef Conner, M., & Armitage, C. (1998). Extending the theory of planned behavior: A review and avenues for further research. Journal of Applied Social Psychology, 28(15), 1429–1464.CrossRef
go back to reference Corbett, J. (2005). Altruism, self-interest and the reasonable person model of environmentally responsible behavior. Science Communication, 26(4), 368–389.CrossRef Corbett, J. (2005). Altruism, self-interest and the reasonable person model of environmentally responsible behavior. Science Communication, 26(4), 368–389.CrossRef
go back to reference Cronan, T. P., & Al-Rafee, S. (2008). Factors that influence the intention to pirate software and media. Journal of Business Ethics, 78, 527–545.CrossRef Cronan, T. P., & Al-Rafee, S. (2008). Factors that influence the intention to pirate software and media. Journal of Business Ethics, 78, 527–545.CrossRef
go back to reference Cross, T. (2006). Academic freedom and the hacker ethic. Communications of the ACM, 49(6), 37–40.CrossRef Cross, T. (2006). Academic freedom and the hacker ethic. Communications of the ACM, 49(6), 37–40.CrossRef
go back to reference Davis, F. D. (1989). Perceived usefulness, perceived ease of use and user acceptance of information technology. MIS Quarterly, 13(3), 319–339.CrossRef Davis, F. D. (1989). Perceived usefulness, perceived ease of use and user acceptance of information technology. MIS Quarterly, 13(3), 319–339.CrossRef
go back to reference De Groot, J. I. M., & Steg, L. (2009). Morality and prosocial behavior: The role of awareness, responsibility and norms in the norm activation model. Journal of Social Psychology, 149, 425–449.CrossRef De Groot, J. I. M., & Steg, L. (2009). Morality and prosocial behavior: The role of awareness, responsibility and norms in the norm activation model. Journal of Social Psychology, 149, 425–449.CrossRef
go back to reference De Groot, J. I. M., & Steg, L. (2010). Morality and nuclear energy: Perceptions of risks and benefits, personal norms, and willingness to take action related to nuclear energy. Risk Analysis, 30(9), 1363–1373.CrossRef De Groot, J. I. M., & Steg, L. (2010). Morality and nuclear energy: Perceptions of risks and benefits, personal norms, and willingness to take action related to nuclear energy. Risk Analysis, 30(9), 1363–1373.CrossRef
go back to reference Depken, C. A., & Simmons, L. C. (2004). Social construct and the propensity for software piracy. Applied Economics Letters, 11(2), 97–100.CrossRef Depken, C. A., & Simmons, L. C. (2004). Social construct and the propensity for software piracy. Applied Economics Letters, 11(2), 97–100.CrossRef
go back to reference Eberl, M. (2010). Chapter 21: An application of PLS in multi-group analysis—The need for differentiated corporate-level marketing in the mobile communications industry. In V. Vinzi, W. Chin, J. Henseler & H. Wang (Eds.), Handbook of partial least squares: Concepts, methods and applications. Springer handbook of computational statistics (pp. 495–496). Heidelberg: Springer Eberl, M. (2010). Chapter 21: An application of PLS in multi-group analysis—The need for differentiated corporate-level marketing in the mobile communications industry. In V. Vinzi, W. Chin, J. Henseler & H. Wang (Eds.), Handbook of partial least squares: Concepts, methods and applications. Springer handbook of computational statistics (pp. 495–496). Heidelberg: Springer
go back to reference Eckhardt, A., Laumer, S., & Weitzel, T. (2009). Who influences whom? Analyzing workplace referents’ social influence on IT adoption and non-adoption. Journal of Information Technology, 24, 11–24.CrossRef Eckhardt, A., Laumer, S., & Weitzel, T. (2009). Who influences whom? Analyzing workplace referents’ social influence on IT adoption and non-adoption. Journal of Information Technology, 24, 11–24.CrossRef
go back to reference Eining, M., & Christensen, A. (1991). A psycho-social model of software piracy: The development and test of a model. In R. Dejorie, G. Fowler, & D. Paradice (Eds.), Ethical issues in information systems. Boston: Boyd and Fraser. Eining, M., & Christensen, A. (1991). A psycho-social model of software piracy: The development and test of a model. In R. Dejorie, G. Fowler, & D. Paradice (Eds.), Ethical issues in information systems. Boston: Boyd and Fraser.
go back to reference Ford, D. P., Connelly, C. E., & Meister, D. B. (2003). Information systems research and Hofstede’s culture’s consequences: An uneasy and incomplete partnership. IEEE Transactions on Engineering Management, 50(1), 8–25.CrossRef Ford, D. P., Connelly, C. E., & Meister, D. B. (2003). Information systems research and Hofstede’s culture’s consequences: An uneasy and incomplete partnership. IEEE Transactions on Engineering Management, 50(1), 8–25.CrossRef
go back to reference Garling, T., Fujii, S., Garling, A., & Jakobsson, C. (2003). Moderating effects of social value orientation on determinants of proenvironmental intention. Journal of Environmental Psychology, 23, 1–9.CrossRef Garling, T., Fujii, S., Garling, A., & Jakobsson, C. (2003). Moderating effects of social value orientation on determinants of proenvironmental intention. Journal of Environmental Psychology, 23, 1–9.CrossRef
go back to reference Gopal, R., & Sanders, G. L. (1997). Preventive and deterrent controls for software piracy. Journal of Management Information Systems, 13, 29–47.CrossRef Gopal, R., & Sanders, G. L. (1997). Preventive and deterrent controls for software piracy. Journal of Management Information Systems, 13, 29–47.CrossRef
go back to reference Gopal, R., Sanders, G. L., Bhattacharjee, S., Agrawal, M., & Wagner, S. (2004). A behavioral model of digital music piracy. Journal of Organizational Computing and Electronic Commerce, 14, 89–105.CrossRef Gopal, R., Sanders, G. L., Bhattacharjee, S., Agrawal, M., & Wagner, S. (2004). A behavioral model of digital music piracy. Journal of Organizational Computing and Electronic Commerce, 14, 89–105.CrossRef
go back to reference Gruzd, A., Staves, K., & Wilk, A. (2012). Connected scholars: Examining the role of social media in research practices of faculty using the UTAUT model. Computers in Human Behavior, 28(6), 2340–2350.CrossRef Gruzd, A., Staves, K., & Wilk, A. (2012). Connected scholars: Examining the role of social media in research practices of faculty using the UTAUT model. Computers in Human Behavior, 28(6), 2340–2350.CrossRef
go back to reference Hagger, M., Chatzisarantis, N., & Biddle, S. (2002). A meta-analytic review of the theories of reasoned action and planned behavior in physical activity: Predictive validity and contribution of additional variables. Journal of Sport and Exercise Psychology, 24, 3–32. Hagger, M., Chatzisarantis, N., & Biddle, S. (2002). A meta-analytic review of the theories of reasoned action and planned behavior in physical activity: Predictive validity and contribution of additional variables. Journal of Sport and Exercise Psychology, 24, 3–32.
go back to reference Harland, P., Staats, H., & Wilke, H. (1999). Explaining pro-environmental intention and behavior by personal norms and the theory of planned behavior. Journal of Applied Social Psychology, 29(12), 2505–2528.CrossRef Harland, P., Staats, H., & Wilke, H. (1999). Explaining pro-environmental intention and behavior by personal norms and the theory of planned behavior. Journal of Applied Social Psychology, 29(12), 2505–2528.CrossRef
go back to reference Harland, P., Staats, H., & Wilke, H. (2007). Situational and personality factors as direct or personal norm mediated predictors of pro-environmental behavior: Questions derived from norm-activation theory. Basic and Applied Social Psychology, 29(4), 323–334.CrossRef Harland, P., Staats, H., & Wilke, H. (2007). Situational and personality factors as direct or personal norm mediated predictors of pro-environmental behavior: Questions derived from norm-activation theory. Basic and Applied Social Psychology, 29(4), 323–334.CrossRef
go back to reference He, D., & Lu, Y. (2007). Consumers perceptions and acceptances towards mobile advertising: An empirical study in China. In Proceedings of International Conference Wireless Communications, Networking and Mobile Computing. He, D., & Lu, Y. (2007). Consumers perceptions and acceptances towards mobile advertising: An empirical study in China. In Proceedings of International Conference Wireless Communications, Networking and Mobile Computing.
go back to reference Henseler, J., & Fassot, G. (2010). Chapter 30: Testing moderating effects in PLS models: An illustration of available procedures. In V. Vinzi, W. Chin, J. Henseler & H. Wang (Eds.), Springer handbook of computational statistics (pp. 713–735). Heidelberg: Springer. Henseler, J., & Fassot, G. (2010). Chapter 30: Testing moderating effects in PLS models: An illustration of available procedures. In V. Vinzi, W. Chin, J. Henseler & H. Wang (Eds.), Springer handbook of computational statistics (pp. 713–735). Heidelberg: Springer.
go back to reference Higgins, G. E., Fell, B. D., & Wilson, A. L. (2007). Digital piracy: Assessing the contributions of an integrated self-control theory and social learning theory using structural equation modeling. Criminal Justice Studies, 19(1), 3–22.CrossRef Higgins, G. E., Fell, B. D., & Wilson, A. L. (2007). Digital piracy: Assessing the contributions of an integrated self-control theory and social learning theory using structural equation modeling. Criminal Justice Studies, 19(1), 3–22.CrossRef
go back to reference Higgins, G. E., Wilson, A. L., & Fell, B. D. (2005). An application of deterrence theory to software piracy. Journal of Criminal Justice and Popular Culture, 12, 166–194. Higgins, G. E., Wilson, A. L., & Fell, B. D. (2005). An application of deterrence theory to software piracy. Journal of Criminal Justice and Popular Culture, 12, 166–194.
go back to reference Hinduja, S. (2001). Trends and patterns among online software pirates. Ethics and Information Technology, 5, 49–61.CrossRef Hinduja, S. (2001). Trends and patterns among online software pirates. Ethics and Information Technology, 5, 49–61.CrossRef
go back to reference Hsu, C. L., & Lu, H. P. (2004). Why do people play on-line games? An extended TAM with social influences and flow experience. Information and Management, 41(7), 853–868.CrossRef Hsu, C. L., & Lu, H. P. (2004). Why do people play on-line games? An extended TAM with social influences and flow experience. Information and Management, 41(7), 853–868.CrossRef
go back to reference Huijts, N. M. A., De Groot, J. I. M., Molin, E. J. E., & van Wee, B. (2013). Intention to act towards a local hydrogen refueling facility: Moral considerations versus self-interest. Transportation Research A: Policy and Practice, 48, 63–74. Huijts, N. M. A., De Groot, J. I. M., Molin, E. J. E., & van Wee, B. (2013). Intention to act towards a local hydrogen refueling facility: Moral considerations versus self-interest. Transportation Research A: Policy and Practice, 48, 63–74.
go back to reference Husted, B. W. (2000). The impact of national culture on software piracy. Journal of Business Ethics, 26, 197–211.CrossRef Husted, B. W. (2000). The impact of national culture on software piracy. Journal of Business Ethics, 26, 197–211.CrossRef
go back to reference Igbaria, M. (1995). The effects of self-efficacy on computer usage. Omega, 23(6), 587–605.CrossRef Igbaria, M. (1995). The effects of self-efficacy on computer usage. Omega, 23(6), 587–605.CrossRef
go back to reference Jain, S. (2008). Digital piracy: A competitive analysis. Market Science, 27(4), 610–626.CrossRef Jain, S. (2008). Digital piracy: A competitive analysis. Market Science, 27(4), 610–626.CrossRef
go back to reference Kaiser, F. G., Hubner, G., & Bogner, F. X. (2005). Castrating the theory of planned behavior with the value–belief–norm model in explaining conservation behavior. Journal of Applied Social Psychology, 35, 2150–2170.CrossRef Kaiser, F. G., Hubner, G., & Bogner, F. X. (2005). Castrating the theory of planned behavior with the value–belief–norm model in explaining conservation behavior. Journal of Applied Social Psychology, 35, 2150–2170.CrossRef
go back to reference Keil, M., Tan, B. C. Y., Wei, K. K., Saarinen, T., Tuunainen, V., & Wassenaar, A. (2000). A cross-cultural study on escalation of commitment behavior in software projects. MIS Quarterly, 24(2), 299–325.CrossRef Keil, M., Tan, B. C. Y., Wei, K. K., Saarinen, T., Tuunainen, V., & Wassenaar, A. (2000). A cross-cultural study on escalation of commitment behavior in software projects. MIS Quarterly, 24(2), 299–325.CrossRef
go back to reference Kim, Y. J., Chun, J. U., & Song, J. (2009). Investigating the role of attitude in technology acceptance from an attitude strength perspective. International Journal of Information Management, 29(1), 67–77.CrossRef Kim, Y. J., Chun, J. U., & Song, J. (2009). Investigating the role of attitude in technology acceptance from an attitude strength perspective. International Journal of Information Management, 29(1), 67–77.CrossRef
go back to reference Kock, N. (2013). WarpPLS 4.0 user manual. Laredo, TX: ScriptWarp Systems. Kock, N. (2013). WarpPLS 4.0 user manual. Laredo, TX: ScriptWarp Systems.
go back to reference Kock, N. (2014). Advanced mediating effects tests, multi-group analyses, and measurement model assessments in PLS-based SEM. International Journal of E-Collaboration, 10(1), 1–13.CrossRef Kock, N. (2014). Advanced mediating effects tests, multi-group analyses, and measurement model assessments in PLS-based SEM. International Journal of E-Collaboration, 10(1), 1–13.CrossRef
go back to reference Kuisma, T., Laukkanen, T., & Hiltunen, M. (2007). Mapping the reasons for resistance to internet banking: A means-end approach. International Journal of Information Management, 27(2), 75–85.CrossRef Kuisma, T., Laukkanen, T., & Hiltunen, M. (2007). Mapping the reasons for resistance to internet banking: A means-end approach. International Journal of Information Management, 27(2), 75–85.CrossRef
go back to reference LaRose, R., Lai, Y. J., Lange, R., Love, B., & Wu, Y. (2005). Sharing or piracy? An exploration of downloading behavior. Journal of Computer Mediated Communication, 11(1), 1–21.CrossRef LaRose, R., Lai, Y. J., Lange, R., Love, B., & Wu, Y. (2005). Sharing or piracy? An exploration of downloading behavior. Journal of Computer Mediated Communication, 11(1), 1–21.CrossRef
go back to reference Lau, E. (2003). An empirical study of software piracy. Business Ethics, 12(3), 233–245.CrossRef Lau, E. (2003). An empirical study of software piracy. Business Ethics, 12(3), 233–245.CrossRef
go back to reference Leidner, D. E., & Kayworth, T. (2006). Review: A review of culture in information systems research: Toward a theory of information technology culture conflict. MIS Quarterly, 30(2), 357–399. Leidner, D. E., & Kayworth, T. (2006). Review: A review of culture in information systems research: Toward a theory of information technology culture conflict. MIS Quarterly, 30(2), 357–399.
go back to reference Lescevica, M., Ginters, E., & Mazza, R. (2013). Unified theory of acceptance and use of technology (UTAUT) for market analysis of FP7 CHOReOS products. Procedia Computer Science, 26, 51–68.CrossRef Lescevica, M., Ginters, E., & Mazza, R. (2013). Unified theory of acceptance and use of technology (UTAUT) for market analysis of FP7 CHOReOS products. Procedia Computer Science, 26, 51–68.CrossRef
go back to reference Liable, D., Eye, J., & Carlo, G. (2008). Dimensions of conscience in mid-adolescence. Link with social behavior, parenting, and temperament. Journal of Youth and Adolescence, 37, 875–887.CrossRef Liable, D., Eye, J., & Carlo, G. (2008). Dimensions of conscience in mid-adolescence. Link with social behavior, parenting, and temperament. Journal of Youth and Adolescence, 37, 875–887.CrossRef
go back to reference Liang, Z., & Yan, Z. (2005). Software piracy among college students: A comprehensive review of contributing factors, underlying processes, and tackling strategies. Journal of Educational Computing Research, 33, 115–140.CrossRef Liang, Z., & Yan, Z. (2005). Software piracy among college students: A comprehensive review of contributing factors, underlying processes, and tackling strategies. Journal of Educational Computing Research, 33, 115–140.CrossRef
go back to reference Lin, C. P., & Bhattacharjee, A. (2008). Learning online social support: An investigation of network information technology based on UTAUT. Cyber Psychology and Behavior, 11(3), 268–272.CrossRef Lin, C. P., & Bhattacharjee, A. (2008). Learning online social support: An investigation of network information technology based on UTAUT. Cyber Psychology and Behavior, 11(3), 268–272.CrossRef
go back to reference Lua, J., Yaob, J. E., & Yua, C. S. (2005). Personal innovativeness, social influences and adoption of wireless internet services via mobile technology. Journal of Strategic Information Systems, 14, 245–268.CrossRef Lua, J., Yaob, J. E., & Yua, C. S. (2005). Personal innovativeness, social influences and adoption of wireless internet services via mobile technology. Journal of Strategic Information Systems, 14, 245–268.CrossRef
go back to reference Miller, P. A., & Eisenberg, N. (1988). The relation of empathy to aggression and externalizing/antisocial behavior. Psychological Bulletin, 103, 324–344.CrossRef Miller, P. A., & Eisenberg, N. (1988). The relation of empathy to aggression and externalizing/antisocial behavior. Psychological Bulletin, 103, 324–344.CrossRef
go back to reference Moores, T. T. (2008). An analysis of the impact of economic wealth and national culture on the rise and fall of software piracy rates. Journal of Business Ethics, 81, 39–51.CrossRef Moores, T. T. (2008). An analysis of the impact of economic wealth and national culture on the rise and fall of software piracy rates. Journal of Business Ethics, 81, 39–51.CrossRef
go back to reference Moores, T. T. (2010). Untangling the web of relationships between wealth, culture, and global software piracy rates: A path model. Journal of Global Information Technology, 18(1), 1–14. Moores, T. T. (2010). Untangling the web of relationships between wealth, culture, and global software piracy rates: A path model. Journal of Global Information Technology, 18(1), 1–14.
go back to reference Nitse, P., Parker, K., Krumwiede, D., & Ottaway, T. (2004). The impact of color in the E-commerce marketing of fashions: An exploratory study. European Journal of Marketing, 38(7), 898–915.CrossRef Nitse, P., Parker, K., Krumwiede, D., & Ottaway, T. (2004). The impact of color in the E-commerce marketing of fashions: An exploratory study. European Journal of Marketing, 38(7), 898–915.CrossRef
go back to reference Onwezen, M. C., Antonides, G., & Bartels, J. (2013). The norm activation model: An exploration of the functions of anticipated pride and guilt in pro-environmental behavior. Journal of Economic Psychology, 39, 141–153.CrossRef Onwezen, M. C., Antonides, G., & Bartels, J. (2013). The norm activation model: An exploration of the functions of anticipated pride and guilt in pro-environmental behavior. Journal of Economic Psychology, 39, 141–153.CrossRef
go back to reference Peace, A. G., Galletta, D. F., & Thong, J. Y. L. (2003). Software piracy in the workplace: A model and empirical test. Journal of Management Information Systems, 20(1), 153–177. Peace, A. G., Galletta, D. F., & Thong, J. Y. L. (2003). Software piracy in the workplace: A model and empirical test. Journal of Management Information Systems, 20(1), 153–177.
go back to reference Perugini, M., & Bagozzi, R. P. (2001). The role of desires and anticipated emotions in goal-directed behaviours: Broadening and deepening the theory of planned behaviour. British Journal of Social Psychology, 40, 79–98.CrossRef Perugini, M., & Bagozzi, R. P. (2001). The role of desires and anticipated emotions in goal-directed behaviours: Broadening and deepening the theory of planned behaviour. British Journal of Social Psychology, 40, 79–98.CrossRef
go back to reference Peters, A., Cutscher, H., & Scholz, R. W. (2011). Psychological determinants of fuel consumption of purchased new cars. Transportation Research Part F: Traffic Psychology and Behaviour, 14, 229–239.CrossRef Peters, A., Cutscher, H., & Scholz, R. W. (2011). Psychological determinants of fuel consumption of purchased new cars. Transportation Research Part F: Traffic Psychology and Behaviour, 14, 229–239.CrossRef
go back to reference Piquero, N., & Piquero, A. (2006). Democracy and intellectual property: Examining trajectories of software piracy. The Annals of the American Academy of Political and Social Science, 605(1), 104–127.CrossRef Piquero, N., & Piquero, A. (2006). Democracy and intellectual property: Examining trajectories of software piracy. The Annals of the American Academy of Political and Social Science, 605(1), 104–127.CrossRef
go back to reference Rai, A., Lang, S. S., & Welker, R. B. (2002). Assessing the validity of IS success models: An empirical test and theoretical analysis. Information Systems Research, 13(1), 50–69.CrossRef Rai, A., Lang, S. S., & Welker, R. B. (2002). Assessing the validity of IS success models: An empirical test and theoretical analysis. Information Systems Research, 13(1), 50–69.CrossRef
go back to reference Rowley, J. (2006). An analysis of the E-service literature: Towards a research agenda. Internet Research, 16(3), 339–359.CrossRef Rowley, J. (2006). An analysis of the E-service literature: Towards a research agenda. Internet Research, 16(3), 339–359.CrossRef
go back to reference Sally, L. P. M. (2006). Prediction of Internet addiction for undergraduates in Hong Kong. Unpublished Degree'sThesis, Hong Kong Baptist University, Hong Kong. Sally, L. P. M. (2006). Prediction of Internet addiction for undergraduates in Hong Kong. Unpublished Degree'sThesis, Hong Kong Baptist University, Hong Kong.
go back to reference Schaupp, L. C., Carter, L., & McBride, M. E. (2010). E-file adoption: A study of U.S. taxpayers intentions. Computers in Human Behavior, 26(4), 636–644.CrossRef Schaupp, L. C., Carter, L., & McBride, M. E. (2010). E-file adoption: A study of U.S. taxpayers intentions. Computers in Human Behavior, 26(4), 636–644.CrossRef
go back to reference Schultz, P. W., Gouveia, V. V., Cameron, L. D., Tankha, G., Schmuck, P., & Franek, M. (2005). Value and their relationship to environmental concern and conservation behavior. Journal of Cross-Cultural Psychology, 36, 457–475.CrossRef Schultz, P. W., Gouveia, V. V., Cameron, L. D., Tankha, G., Schmuck, P., & Franek, M. (2005). Value and their relationship to environmental concern and conservation behavior. Journal of Cross-Cultural Psychology, 36, 457–475.CrossRef
go back to reference Schwartz, S. H. (1977). Normative influences on altruism. In L. Berkowitz (Ed.), Advances in experimental social psychology (Vol. 10, pp. 221–279). New York: Academic Press. Schwartz, S. H. (1977). Normative influences on altruism. In L. Berkowitz (Ed.), Advances in experimental social psychology (Vol. 10, pp. 221–279). New York: Academic Press.
go back to reference Schwartz, S. H., & Howard, J. A. (1980). Explanations of the moderating effect of responsibility denial on the personal norm–behavior relationship. Social Psychology Quarterly, 43, 441–446.CrossRef Schwartz, S. H., & Howard, J. A. (1980). Explanations of the moderating effect of responsibility denial on the personal norm–behavior relationship. Social Psychology Quarterly, 43, 441–446.CrossRef
go back to reference Shadlen, K. C. A., Schrank, A., & Kurtz, M. J. (2005). The political economy of intellectual property protection: The case of software. International Studies Quarterly, 49(1), 45–71.CrossRef Shadlen, K. C. A., Schrank, A., & Kurtz, M. J. (2005). The political economy of intellectual property protection: The case of software. International Studies Quarterly, 49(1), 45–71.CrossRef
go back to reference Shih, H. P. (2004). An empirical study on predicting user acceptance of E-shopping on the web. Information and Management, 41(3), 351–368.CrossRef Shih, H. P. (2004). An empirical study on predicting user acceptance of E-shopping on the web. Information and Management, 41(3), 351–368.CrossRef
go back to reference Shore, B., Venkatachalam, A. R., Solorzano, E., Burn, J. B., Hassan, S. Z., & Janczewski, L. J. (2001). Softlifting and piracy: Behavior across cultures. Technology in Society, 23, 563–581.CrossRef Shore, B., Venkatachalam, A. R., Solorzano, E., Burn, J. B., Hassan, S. Z., & Janczewski, L. J. (2001). Softlifting and piracy: Behavior across cultures. Technology in Society, 23, 563–581.CrossRef
go back to reference Sia, C. L., Lim, K. H., Leung, K., Lee, M. K. O., Huang, W. W., & Benbasat, I. (2009). Web strategies to promote internet shopping: Is cultural-customization needed? MIS Quarterly, 33(3), 491–512. Sia, C. L., Lim, K. H., Leung, K., Lee, M. K. O., Huang, W. W., & Benbasat, I. (2009). Web strategies to promote internet shopping: Is cultural-customization needed? MIS Quarterly, 33(3), 491–512.
go back to reference Simpson, P., Banerjee, D., & Simpson, C. L. (1994). Softlifting: A model of motivating factors. Journal of Business Ethics, 13, 431–438.CrossRef Simpson, P., Banerjee, D., & Simpson, C. L. (1994). Softlifting: A model of motivating factors. Journal of Business Ethics, 13, 431–438.CrossRef
go back to reference Steg, L., & de Groot, J. (2010). Explaining prosocial intentions: Testing causal relationships in the norm activation model. British Journal of Social Psychology, 49, 725–743.CrossRef Steg, L., & de Groot, J. (2010). Explaining prosocial intentions: Testing causal relationships in the norm activation model. British Journal of Social Psychology, 49, 725–743.CrossRef
go back to reference Steg, L., Dreijerink, L., & Abrahamse, W. (2005). Factors influencing the acceptability of energy policies: Testing VBN theory. Journal of Environmental Psychology, 25, 415–425.CrossRef Steg, L., Dreijerink, L., & Abrahamse, W. (2005). Factors influencing the acceptability of energy policies: Testing VBN theory. Journal of Environmental Psychology, 25, 415–425.CrossRef
go back to reference Stern, P. (2000). Toward a coherent theory of environmentally-significant behaviour. Journal of Social Issues, 56(3), 407–424.CrossRef Stern, P. (2000). Toward a coherent theory of environmentally-significant behaviour. Journal of Social Issues, 56(3), 407–424.CrossRef
go back to reference Swinyard, W. R., Rinne, H., & Kau, A. K. (1990). The morality of software piracy: A cross-cultural analysis. Journal of Business Ethics, 9, 655–664.CrossRef Swinyard, W. R., Rinne, H., & Kau, A. K. (1990). The morality of software piracy: A cross-cultural analysis. Journal of Business Ethics, 9, 655–664.CrossRef
go back to reference Taylor, S. A., Ishida, C., & Wallace, D. (2009). Intention to engage in digital piracy: A conceptual model and empirical test. Journal of Service Research, 11(3), 246–262.CrossRef Taylor, S. A., Ishida, C., & Wallace, D. (2009). Intention to engage in digital piracy: A conceptual model and empirical test. Journal of Service Research, 11(3), 246–262.CrossRef
go back to reference Thatcher, A., & Matthews, M. (2012). Comparing software piracy in South Africa and Zambia using social cognitive theory. African Journal of Business Ethics, 6(1), 1–12.CrossRef Thatcher, A., & Matthews, M. (2012). Comparing software piracy in South Africa and Zambia using social cognitive theory. African Journal of Business Ethics, 6(1), 1–12.CrossRef
go back to reference Thatcher, J. B., & Perrewe, P. L. (2002). An empirical examination of individual traits as antecedents to computer anxiety and computer self-efficacy. MIS Quarterly, 26(4), 381–396.CrossRef Thatcher, J. B., & Perrewe, P. L. (2002). An empirical examination of individual traits as antecedents to computer anxiety and computer self-efficacy. MIS Quarterly, 26(4), 381–396.CrossRef
go back to reference Thong, J., & Yap, C. (1998). Testing an ethical decision-making theory: The case of softlifting. Journal of Management Information Systems, 15(1), 213–237.CrossRef Thong, J., & Yap, C. (1998). Testing an ethical decision-making theory: The case of softlifting. Journal of Management Information Systems, 15(1), 213–237.CrossRef
go back to reference Udo, G. J., Bagchi, K. K., & Kirs, P. J. (2010). An assessment of customers’ E-service quality perception, satisfaction and intention. International Journal of Information Management, 30(6), 481–492.CrossRef Udo, G. J., Bagchi, K. K., & Kirs, P. J. (2010). An assessment of customers’ E-service quality perception, satisfaction and intention. International Journal of Information Management, 30(6), 481–492.CrossRef
go back to reference Venkatesh, V., & Morris, M. G. (2000). Why don’t men ever stop to ask for directions? Gender, social influence, and their role in technology acceptance and usage behavior. MIS Quarterly, 24(1), 115–139.CrossRef Venkatesh, V., & Morris, M. G. (2000). Why don’t men ever stop to ask for directions? Gender, social influence, and their role in technology acceptance and usage behavior. MIS Quarterly, 24(1), 115–139.CrossRef
go back to reference Venkatesh, V., Morris, M., Davis, G., & Davis, F. (2003). User acceptance of information technology: Toward a unified view. MIS Quarterly, 7(3), 425–478. Venkatesh, V., Morris, M., Davis, G., & Davis, F. (2003). User acceptance of information technology: Toward a unified view. MIS Quarterly, 7(3), 425–478.
go back to reference Vida, I., Koklic, M. K., Kukar-Kinney, M., & Penz, E. (2012). Predicting consumer digital piracy behavior: The role of rationalization and perceived consequences. Journal of Research in Interactive Marketing, 6(4), 298–313.CrossRef Vida, I., Koklic, M. K., Kukar-Kinney, M., & Penz, E. (2012). Predicting consumer digital piracy behavior: The role of rationalization and perceived consequences. Journal of Research in Interactive Marketing, 6(4), 298–313.CrossRef
go back to reference Wagner, S., & Sanders, G. (2001). Considerations in ethical decision-making and software piracy. Journal of Business Ethics, 29(1/2), 161–167.CrossRef Wagner, S., & Sanders, G. (2001). Considerations in ethical decision-making and software piracy. Journal of Business Ethics, 29(1/2), 161–167.CrossRef
go back to reference Wall, D. S. (2005). The internet as a conduct for criminal activity. In A. Pattavina (Ed.), Information technology and the criminal justice system (pp. 78–94). Thousand Oaks, CA: Sage Publications. Wall, D. S. (2005). The internet as a conduct for criminal activity. In A. Pattavina (Ed.), Information technology and the criminal justice system (pp. 78–94). Thousand Oaks, CA: Sage Publications.
go back to reference Wall, R., Devine-Wright, P., & Mill, G. A. (2007). Comparing and combining theories to explain pro-environmental intentions: The case of commuting-mode choice. Environment and Behavior, 39(6), 731–753.CrossRef Wall, R., Devine-Wright, P., & Mill, G. A. (2007). Comparing and combining theories to explain pro-environmental intentions: The case of commuting-mode choice. Environment and Behavior, 39(6), 731–753.CrossRef
go back to reference Walls, W., & Harvey, P. (2006). Digital pirates in practice: Analysis of market transactions in Hong Kong’s pirate software arcades. International Journal of Management, 23(2), 207–215. Walls, W., & Harvey, P. (2006). Digital pirates in practice: Analysis of market transactions in Hong Kong’s pirate software arcades. International Journal of Management, 23(2), 207–215.
go back to reference Wang, H. I., & Yang, H. L. (2005). The role of personality traits in UTAUT model under online stocking. Contemporary Management Research, 1(1), 69–82.CrossRef Wang, H. I., & Yang, H. L. (2005). The role of personality traits in UTAUT model under online stocking. Contemporary Management Research, 1(1), 69–82.CrossRef
go back to reference Wold, H. (1985). Encyclopedia of statistical science. New York: Wiley. Wold, H. (1985). Encyclopedia of statistical science. New York: Wiley.
go back to reference Wolfe, S. E., Higgins, G. E., & Marcum, C. D. (2008). Deterrence and digital piracy: A preliminary examination of the role of viruses. Social Science Computer Review, 26(3), 317–333.CrossRef Wolfe, S. E., Higgins, G. E., & Marcum, C. D. (2008). Deterrence and digital piracy: A preliminary examination of the role of viruses. Social Science Computer Review, 26(3), 317–333.CrossRef
go back to reference Wu, Y., Tao, Y., & Yang, P. (2008). The use of unified theory of acceptance and use of technology to confer the behavioral model of 3G mobile telecommunication users. Journal of Statistics and Management Systems, 11(5), 919–949.CrossRef Wu, Y., Tao, Y., & Yang, P. (2008). The use of unified theory of acceptance and use of technology to confer the behavioral model of 3G mobile telecommunication users. Journal of Statistics and Management Systems, 11(5), 919–949.CrossRef
go back to reference Wu, J. H., & Wang, S. C. (2005). What drives mobile commerce? An empirical evaluation of the revised technology acceptance model. Information and Management, 42, 719–729.CrossRef Wu, J. H., & Wang, S. C. (2005). What drives mobile commerce? An empirical evaluation of the revised technology acceptance model. Information and Management, 42, 719–729.CrossRef
go back to reference Wu, J. H., Wang, S. C., & Lin, L. M. (2006). Mobile computing acceptance factors in the healthcare industry: A structural equation model. International Journal of Medical Informatics, 76(1), 66–77.CrossRef Wu, J. H., Wang, S. C., & Lin, L. M. (2006). Mobile computing acceptance factors in the healthcare industry: A structural equation model. International Journal of Medical Informatics, 76(1), 66–77.CrossRef
go back to reference Yang, D., Sonmez, M., Bosworth, D., & Fryxell, G. (2008). Global software piracy: Searching for further explanations. Journal of Business Ethics, 87, 269–283.CrossRef Yang, D., Sonmez, M., Bosworth, D., & Fryxell, G. (2008). Global software piracy: Searching for further explanations. Journal of Business Ethics, 87, 269–283.CrossRef
go back to reference Yoon, C. (2009). The effects of national culture values on consumer acceptance of E-commerce: online shoppers in China. Information and Management, 45, 294–301.CrossRef Yoon, C. (2009). The effects of national culture values on consumer acceptance of E-commerce: online shoppers in China. Information and Management, 45, 294–301.CrossRef
go back to reference Yoon, C. (2011). Theory of planned behavior and ethics theory in digital piracy: An integrated model. Journal of Business Ethics, 100, 405–417.CrossRef Yoon, C. (2011). Theory of planned behavior and ethics theory in digital piracy: An integrated model. Journal of Business Ethics, 100, 405–417.CrossRef
go back to reference Zhang, L., Smith, W. W., & Mcdowell, W. C. (2009). Examining digital piracy: Self-control, punishment, and self-efficacy. Information Resources Management Journal, 22(1), 24–44.CrossRef Zhang, L., Smith, W. W., & Mcdowell, W. C. (2009). Examining digital piracy: Self-control, punishment, and self-efficacy. Information Resources Management Journal, 22(1), 24–44.CrossRef
Metadata
Title
Exploring Factors Affecting Digital Piracy Using the Norm Activation and UTAUT Models: The Role of National Culture
Authors
Godwin Udo
Kallol Bagchi
Moutusy Maity
Publication date
09-12-2014
Publisher
Springer Netherlands
Published in
Journal of Business Ethics / Issue 3/2016
Print ISSN: 0167-4544
Electronic ISSN: 1573-0697
DOI
https://doi.org/10.1007/s10551-014-2484-1

Other articles of this Issue 3/2016

Journal of Business Ethics 3/2016 Go to the issue

Premium Partner