Skip to main content
Log in

Softlifting: A model of motivating factors

  • Published:
Journal of Business Ethics Aims and scope Submit manuscript

Abstract

Softlifting (software piracy by individuals) is an unethical behavior that pervades today's computer dependent society. Since a better understanding of underlying considerations of the behavior may provide a basis for remedy, a model of potential determinants of softlifting behavior is developed and tested. The analysis provides some support for the hypothesized model, specifically situational variables, such as delayed acquisition times, and personal gain variables, such as the challenge of copying, affect softlifting behavior. Most importantly, the analysis indicated that ethical perception of softlifting has no significant affect on softlifting behavior. These findings suggest major implications for both software manufacturers and academicians attempting to reduce piracy behavior through ethics instruction.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  • Aiken, R. M.: 1988, ‘Reflection on Teaching Computer Ethics’, Paper presented at the Fourteenth SIGCSE Technical Symposium on Computer Science Education, pp. 8–11.

  • Ajzen, I. and M. Fishbein: 1977, ‘Attitude-Behavior Relations: A Theoretical Analysis and Review of Empirical Research’,Psychological Bulletin 84(5), 888–918.

    Article  Google Scholar 

  • Akers, J. F.: 1984, ‘SMR FORUM: A Responsible Future — An Address to the Computer Industry’,Sloan Management Review 26(1), 53–57.

    Google Scholar 

  • Athey, S.: 1991, ‘A Preliminary Investigation into the Impact of a Strong Software Copying Policy’,Decision Sciences Institute, Proceedings of the 1991 Annual Meeting, pp. 790–792.

  • Athey, T. and R. W. Zmud: 1987,Computers and Information Systems (Scott, Foresman and Company, Glenview, Il).

    Google Scholar 

  • Banerjee, D.: 1992, ‘Ethical Behavior of IS Personnel: In Search of a Behavioral Model’, Unpublished doctoral dissertation, University of Arkansas, Fayetteville, Arkansas.

  • Banerjee, D., C. L. Simpson, P. M. Simpson and R. Thorn: 1992, ‘A Statistical Analysis of Motivators for Softlifting’, working papers at Northwestern State University.

  • Baxter, G. D. and C. A. Rarick: 1987, ‘Education for the Moral Development of Managers: Kohlberg's Stages of Moral Development and Integrative Education’,Journal of Business Ethics 6, 243–248.

    Google Scholar 

  • Belk, R. W.: 1975, ‘Situational Variables and Consumer Behavior’,Journal of Consumer Behavior, 157–164.

  • Bommer, M., C. Gratto, J. Gravander and M. Tuttle: 1987, ‘A Behavioral Model of Ethical and Unethical Decision Making’,Journal of Business Ethics 6, 265–280.

    Google Scholar 

  • Brow, T. J.: 1986, ‘Where Will College Students Learn Business Ethics?’,Your Computer Career, May, 6–7.

  • Business Week: 1991, ‘Keelhauling Software Pirates’,18, 122H.

  • Cohen E. and L. Cornwell: 1989, ‘A Question of Ethics: Developing Information Systems Ethics’,Journal of Business Ethics 8, 431–437.

    Google Scholar 

  • Cohen, E. B., L. Cornwell and E. C. Boyd: 1992, ‘Moral Development and the Teaching of Ethics in Information Systems’, in theProceedings for the International Assocation for Computer Information Systems held in New Orleans, La. August, pp. 53–61.

  • Conner, K. R. and R. P. Rumelt: 1991, ‘Software Piracy: An Analysis of Protection Strategies’,Management Science 37, 125–139.

    Google Scholar 

  • Couger, J. D.: 1989, ‘Preparing IS Students to Deal with Ethical Issues’,MIS Quarterly 13(2), 211–218.

    Google Scholar 

  • Dejoie, R. M., G. C. Fowler and D. B. Paradice: 1991, ‘A Framework for Study of Information Systems and Ethical Decision-Making Processes’, in R. Dejoie, G. Fowler and D. Paradice (eds.),Ethical Issues in Information Systems (Boyd & Fraser Publishing Company, Boston, MA).

    Google Scholar 

  • DeLoughry, T. J.: 1988, ‘Failure of Colleges to Teach Computer Ethics is Called Oversight with Potentially Catastropic Consequences’,The Chronicle of Higher Education, February 24, A15.

  • Eining, M. M. and A. L. Christensen: 1991, ‘A Psycho-Social Model of Software Piracy: The Development and Test of a Model’, in R. Dejoie, G. Fowler and D. Paradice (eds.),Ethical Issues in Information Systems (Boyd & Fraser Publishing Company, Boston, MA).

    Google Scholar 

  • Ferrell, O. C. and L. G. Gresham: 1985, ‘A Contingency Framework for Understanding Ethical Decision Making in Marketing’,Journal of Marketing 49, 87–96.

    Google Scholar 

  • Forcht, K. A., R. O. Mason and F. W. McFarlan (Panelists): 1989, ‘Ethical Use of Computers: An International Perspective’,Proceedings of the Tenth International Conference on Information Systems, pp. 408.

  • Forcht, K. A., J. K. Pierson and B. M. Bauman (Panelists): 1988, ‘Developing Awareness of Computer Ethics’,Proceedings of the Ninth International Conference on Information Systems, pp. 341–343.

  • Heide, D. and J. K. Hightower: 1988, ‘Teaching Ethics in the Information Sciences Curricula’, inProceedings of the 1988 Annual Meeting of the Decision Sciences Institute 1, 198–200.

    Google Scholar 

  • Mason, R. O.: 1986, ‘Four Ethical Issues of the Information Age’,MIS Quarterly 10(1), 4–12.

    Google Scholar 

  • Meldman, J. A.: 1982, ‘SMR Forum: Educating Toward Ethical Responsibility in MIS’,Sloan Management Review, 73–75.

  • Nunnally, J.: 1978,Psychometric Methods (McGraw Hill Book Co., New York).

    Google Scholar 

  • Oz, E.: 1990, ‘The Attitude of Managers-To-Be Toward Software Piracy’,OR/MS Today 17(4), 24–26.

    Google Scholar 

  • Paradice, D. B. and R. M. Dejoie: 1991, ‘The Ethical Decision-Making Process of Information Systems Workers’,Journal of Business Ethics 10, 57–77.

    Google Scholar 

  • Shim J. P. and G. S. Taylor: 1990, ‘A Comparative Study of Unauthorized Software Copying: Information Systems Faculty Members' vs. Practicing Managers' Perceptions’, in R. Dejoie, G. Fowler and D. Paradice (eds.),Ethical Issues in Information Systems (Boyd & Fraser Publishing Company, Boston, MA).

    Google Scholar 

  • Simpson, C. L., Jr. and R. G. Thorn: 1989, ‘Everybody Does It: Motivations for Softlifting’, in the proceedings ofAnnual National Conference of the Association for Computer Educators held in Denver, Colorado, pp. 105–117.

  • Solomon, S. L. and J. A. O'Brien: 1990, ‘The Effect of Demographic Factors on Attitudes Toward Software Piracy’,Journal of Information Systems 30(3), 40–46.

    Google Scholar 

  • Swinyard, W. R., H. Rinne and A. Keng Kau: 1990, ‘The Morality of Software Piracy: A Cross-Cultural Analysis’,Journal of Business Ethics 9, 655–664.

    Google Scholar 

  • Wong, K.: 1985, ‘Computer Crime — Risk Management and Computer Security’,Computer and Security 4, 287–295.

    Google Scholar 

  • Zimmerman, M. R.: 1990, ‘FBI Seizes PC's in Crackdown on Illegal Software Distribution’,PC Week, 13.

Download references

Author information

Authors and Affiliations

Authors

Additional information

Penny Simpson is an assistant professor of marketing at Northwestern State University in Natchitoches, Louisiana. She has published articles in several regional and national proceedings.

Debasish Banerjee is an assistant professor of computer information system at Northwestern State University. He has published several articles in national and regional proceedings and is currently working on several articles concerning ethics and computing personnel.

Claude Simpson is an associate professor of computer information systems at Northwestern State University. He has published numerous articles in journals and proceedings, several monographs, and is currently working on his third textbook.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Simpson, P.M., Banerjee, D. & Simpson, C.L. Softlifting: A model of motivating factors. J Bus Ethics 13, 431–438 (1994). https://doi.org/10.1007/BF00881451

Download citation

  • Issue Date:

  • DOI: https://doi.org/10.1007/BF00881451

Keywords

Navigation