IDEAS home Printed from https://ideas.repec.org/a/kap/jbuset/v135y2016i3d10.1007_s10551-014-2484-1.html
   My bibliography  Save this article

Exploring Factors Affecting Digital Piracy Using the Norm Activation and UTAUT Models: The Role of National Culture

Author

Listed:
  • Godwin Udo

    (University of Texas at El Paso)

  • Kallol Bagchi

    (University of Texas at El Paso)

  • Moutusy Maity

    (Indian Institute of Management Lucknow)

Abstract

We develop and use an integrated individual-level model to explain the driving forces behind digital piracy (DP) practice in two nations. The proposed model combines the Norm Activation model and Unified Theory of Acceptance and Use of Technology models. This study also explores the effect of culture on intention (INT) to practice DP in two nations: US (individualistic) and India (collectivistic). A survey instrument was used to collect data from 231 US and 331 Indian participants. Use of the integrated model proves to be a powerful and a viable approach to understanding DP across cultures. In each nation, all 10 path coefficients on the research model are statistically significant thereby establishing the fact that personal norm, together with other factors, influences INT to engage in DP, which in turn, may influence the actual practice. The results reveal a support for cross-cultural generalizability and applicability of the proposed model. Culture clearly plays a strong moderating role in two out of the three paths tested. The implications of the findings are discussed.

Suggested Citation

  • Godwin Udo & Kallol Bagchi & Moutusy Maity, 2016. "Exploring Factors Affecting Digital Piracy Using the Norm Activation and UTAUT Models: The Role of National Culture," Journal of Business Ethics, Springer, vol. 135(3), pages 517-541, May.
  • Handle: RePEc:kap:jbuset:v:135:y:2016:i:3:d:10.1007_s10551-014-2484-1
    DOI: 10.1007/s10551-014-2484-1
    as

    Download full text from publisher

    File URL: http://link.springer.com/10.1007/s10551-014-2484-1
    File Function: Abstract
    Download Restriction: Access to full text is restricted to subscribers.

    File URL: https://libkey.io/10.1007/s10551-014-2484-1?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. Sanjay Jain, 2008. "Digital Piracy: A Competitive Analysis," Marketing Science, INFORMS, vol. 27(4), pages 610-626, 07-08.
    2. Onwezen, Marleen C. & Antonides, Gerrit & Bartels, Jos, 2013. "The Norm Activation Model: An exploration of the functions of anticipated pride and guilt in pro-environmental behaviour," Journal of Economic Psychology, Elsevier, vol. 39(C), pages 141-153.
    3. Timothy Cronan & Sulaiman Al-Rafee, 2008. "Factors that Influence the Intention to Pirate Software and Media," Journal of Business Ethics, Springer, vol. 78(4), pages 527-545, April.
    4. Arun Rai & Sandra S. Lang & Robert B. Welker, 2002. "Assessing the Validity of IS Success Models: An Empirical Test and Theoretical Analysis," Information Systems Research, INFORMS, vol. 13(1), pages 50-69, March.
    5. Igbaria, M. & Iivari, J., 1995. "The effects of self-efficacy on computer usage," Omega, Elsevier, vol. 23(6), pages 587-605, December.
    6. Lixuan Zhang & Wayne W. Smith & William C. McDowell, 2009. "Examining Digital Piracy: Self-Control, Punishment, and Self-Efficacy," Information Resources Management Journal (IRMJ), IGI Global, vol. 22(1), pages 24-44, January.
    7. Huijts, N.M.A. & De Groot, J.I.M. & Molin, E.J.E. & van Wee, B., 2013. "Intention to act towards a local hydrogen refueling facility: Moral considerations versus self-interest," Transportation Research Part A: Policy and Practice, Elsevier, vol. 48(C), pages 63-74.
    8. C. A. Depken & L. C. Simmons, 2004. "Social construct and the propensity for software piracy," Applied Economics Letters, Taylor & Francis Journals, vol. 11(2), pages 97-100.
    9. Trevor Moores, 2008. "An Analysis of the Impact of Economic Wealth and National Culture on the Rise and Fall of Software Piracy Rates," Journal of Business Ethics, Springer, vol. 81(1), pages 39-51, August.
    10. Cheolho Yoon, 2011. "Theory of Planned Behavior and Ethics Theory in Digital Piracy: An Integrated Model," Journal of Business Ethics, Springer, vol. 100(3), pages 405-417, May.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Žigić, Krešimir & Střelický, Jiří & Kúnin, Michael, 2023. "Copyright and firms’ own IPR protection in a software market: Monopoly versus duopoly," Economic Modelling, Elsevier, vol. 123(C).
    2. Dan Wu & Guofang Nan & Minqiang Li, 2020. "Optimal Piracy Control: Should a Firm Implement Digital Rights Management?," Information Systems Frontiers, Springer, vol. 22(4), pages 947-960, August.
    3. Kos Koklic, Mateja & Kukar-Kinney, Monika & Vida, Irena, 2022. "Consumers’ de-ownership as a predictor of dark-side digital acquisition behavior: Moderating role of moral intensity and collectivism," Journal of Business Research, Elsevier, vol. 138(C), pages 108-116.
    4. He, Ke & Zhang, Junbiao & Zeng, Yangmei, 2018. "Rural households' willingness to accept compensation for energy utilization of crop straw in China," Energy, Elsevier, vol. 165(PA), pages 562-571.
    5. Malgorzata Ciesielska & Dariusz Jemielniak, 2022. "Fairness in digital sharing legal professional attitudes toward digital piracy and digital commons," Journal of the Association for Information Science & Technology, Association for Information Science & Technology, vol. 73(7), pages 899-912, July.
    6. José Roberto Díaz-Reza & Jorge Luis García-Alcaraz & José Roberto Mendoza-Fong & Valeria Martínez-Loya & Emilio Jiménez Macías & Julio Blanco-Fernández, 2017. "Interrelations among SMED Stages: A Causal Model," Complexity, Hindawi, vol. 2017, pages 1-10, August.
    7. Ahmad, Wasim & Kim, Woo Gon & Choi, Hyung-Min & Haq, Junaid Ul, 2021. "Modeling behavioral intention to use travel reservation apps: A cross-cultural examination between US and China," Journal of Retailing and Consumer Services, Elsevier, vol. 63(C).
    8. Kresimir Zigic & Jiri Strelicky & Michal Kunin, 2020. "Private and Public IPR Protection in a Vertically Differentiated Software Duopoly," CERGE-EI Working Papers wp671, The Center for Economic Research and Graduate Education - Economics Institute, Prague.
    9. Chanhee Kwak & Junyeong Lee & Heeseok Lee, 2022. "Could You Ever Forget Me? Why People Want to be Forgotten Online," Journal of Business Ethics, Springer, vol. 179(1), pages 25-42, August.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Ciprian-Marcel Pop & Andreea–Ioana Romonti-Maniu & Monica-Maria Zaharie, 2017. "Opportunistic Consumer Behaviour in the Context of Digital Piracy," MIC 2017: Managing the Global Economy; Proceedings of the Joint International Conference, Monastier di Treviso, Italy, 24–27 May 2017,, University of Primorska Press.
    2. Wojciech Hardy, 2020. "Consumer switching costs in a market with legal and pirate providers," IBS Working Papers 08/2020, Instytut Badan Strukturalnych.
    3. Simplice A. Asongu & Antonio R. Andrés, 2017. "The impact of software piracy on inclusive human development: evidence from Africa," International Review of Applied Economics, Taylor & Francis Journals, vol. 31(5), pages 585-607, September.
    4. Sharath Sasidharan & Radhika Santhanam & Daniel J. Brass & Vallabh Sambamurthy, 2012. "The Effects of Social Network Structure on Enterprise Systems Success: A Longitudinal Multilevel Analysis," Information Systems Research, INFORMS, vol. 23(3-part-1), pages 658-678, September.
    5. Huang, Yeu-Shiang & Huang, Wei-Jeh & Fang, Chih-Chiang, 2018. "Coordination for distribution of motion pictures in the context of piracy," Journal of Business Research, Elsevier, vol. 85(C), pages 209-225.
    6. Dan Wu & Guofang Nan & Minqiang Li, 2020. "Optimal Piracy Control: Should a Firm Implement Digital Rights Management?," Information Systems Frontiers, Springer, vol. 22(4), pages 947-960, August.
    7. Casidy, Riza & Phau, Ian & Lwin, Michael, 2016. "The role of religious leaders on digital piracy attitude and intention," Journal of Retailing and Consumer Services, Elsevier, vol. 32(C), pages 244-252.
    8. Mauricio S. Featherman & Nick Hajli, 2016. "Self-Service Technologies and e-Services Risks in Social Commerce Era," Journal of Business Ethics, Springer, vol. 139(2), pages 251-269, December.
    9. Barbara Culiberg & Domen Bajde, 2014. "Do You Need a Receipt? Exploring Consumer Participation in Consumption Tax Evasion as an Ethical Dilemma," Journal of Business Ethics, Springer, vol. 124(2), pages 271-282, October.
    10. Izzatul Jannah & Muamar Nur Kholid, 2020. "Ethics theory and theory of reasoned action in e-book piracy: An empirical study of accounting students," International Journal of Research in Business and Social Science (2147-4478), Center for the Strategic Studies in Business and Finance, vol. 9(3), pages 114-122, April.
    11. Wang, Yi-Shun & Yeh, Ching-Hsuan & Liao, Yi-Wen, 2013. "What drives purchase intention in the context of online content services? The moderating role of ethical self-efficacy for online piracy," International Journal of Information Management, Elsevier, vol. 33(1), pages 199-208.
    12. Soha Abutaleb & Noha El-Bassiouny & Sara Hamed, 2023. "Using norm activation theory to understand intentions for collaborative consumption," International Review on Public and Nonprofit Marketing, Springer;International Association of Public and Non-Profit Marketing, vol. 20(1), pages 245-268, March.
    13. Amanda Chu & Patrick Chau & Mike So, 2015. "Explaining the Misuse of Information Systems Resources in the Workplace: A Dual-Process Approach," Journal of Business Ethics, Springer, vol. 131(1), pages 209-225, September.
    14. Mateja Kos Koklic & Monika Kukar-Kinney & Irena Vida, 2016. "Three-Level Mechanism of Consumer Digital Piracy: Development and Cross-Cultural Validation," Journal of Business Ethics, Springer, vol. 134(1), pages 15-27, March.
    15. Sheng-Hsiung Chang & Ching-Hsien Chou, 2018. "Consumer Intention toward Bringing Your Own Shopping Bags in Taiwan: An Application of Ethics Perspective and Theory of Planned Behavior," Sustainability, MDPI, vol. 10(6), pages 1-14, May.
    16. Lee, Byung & Paek, Seung Yeop & Fenoff, Roy, 2018. "Factors associated with digital piracy among early adolescents," Children and Youth Services Review, Elsevier, vol. 86(C), pages 287-295.
    17. Young Mee Shin & Seung Chang Lee & Bongsik Shin & Ho Geun Lee, 2010. "Examining influencing factors of post-adoption usage of mobile internet: Focus on the user perception of supplier-side attributes," Information Systems Frontiers, Springer, vol. 12(5), pages 595-606, November.
    18. Barbara Culiberg & Hichang Cho & Mateja Kos Koklic & Vesna Zabkar, 2023. "The Role of Moral Foundations, Anticipated Guilt and Personal Responsibility in Predicting Anti-consumption for Environmental Reasons," Journal of Business Ethics, Springer, vol. 182(2), pages 465-481, January.
    19. Koay, Kian Yeik & Tjiptono, Fandy & Sandhu, Manjit Singh, 2020. "Digital piracy among consumers in a developing economy: A comparison of multiple theory-based models," Journal of Retailing and Consumer Services, Elsevier, vol. 55(C).
    20. Luis Aguiar & Jörg Claussen & Christian Peukert, 2018. "Catch Me If You Can: Effectiveness and Consequences of Online Copyright Enforcement," Information Systems Research, INFORMS, vol. 29(3), pages 656-678, September.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:kap:jbuset:v:135:y:2016:i:3:d:10.1007_s10551-014-2484-1. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Sonal Shukla or Springer Nature Abstracting and Indexing (email available below). General contact details of provider: http://www.springer.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.