DOI QR코드

DOI QR Code

소프트웨어 사용자 집단에 따른 불법복제 의도에 미치는 요인 비교 연구

A Comparative Study of Factors Influencing Software Piracy : Focused on Different Software User Groups

  • 김중환 (경기대학교 경영정보학과)
  • 투고 : 2015.04.22
  • 심사 : 2015.06.20
  • 발행 : 2015.06.30

초록

Software piracy is widespread throughout the world. It has negative effects on the software industry and the intellectual property market. Despite various deterrent policies, the phenomenon has been getting severe. The current study investigated the antecedents of software piracy attitudes and intention. In order to identify factors and their relationship, a research model for illegal piracy behavior was developed and empirically examined through a path analysis using structural equation model. Also, this study employed a multiple group structural equation model to investigate differences in structural weights across PC software user group and smartphone application user group. It was revealed that perceived benefit, habit, social factor, self-efficacy had positive effect on attitude toward software piracy, whereas perceived risk had a decreasing influence on attitude. Relationships between piracy attitudes and intentions were significant as well. Furthermore, the cross validation between two groups showed the path coefficients of habit to attitude and attitude to intention were significantly different. Implications for research and practice are discussed.

키워드

참고문헌

  1. Ajzen, I. and M. Fishbein, Belief, Attitude, Intention and Behavior : An Introduction to Theory and Research, 1975.
  2. Bagchi, K., P. Kirs, and R. Cerveny, "Global Software Piracy : Can Economic Factors Along Explain the Trend?", Communications of the ACM, Vol.49, No.6, 2006, 70-75. https://doi.org/10.1145/1132469.1132470
  3. Bandura, A., Social Foundations of Thought and Action : A Social Cognitive Theory, Prentice-Hall, Inc, 1986.
  4. Beck, L. and I. Ajzen, "Predicting Dishonest Actions Using the Theory of Planned Behavior", Journal of Research in Personality, Vol.25, No.3, 1991, 285-301. https://doi.org/10.1016/0092-6566(91)90021-H
  5. Bezmen, T.L. and C.A. Depken, "Influences on Software Piracy : Evidence from the Various United States", Economics Letters, Vol.90, No.3, 2006, 356-361. https://doi.org/10.1016/j.econlet.2005.08.029
  6. Bohner, G. and N. Dickel, "Attitudes and Attitude Change", Annual Review of Psychology, Vol.62, No.1, 2011, 391-417. https://doi.org/10.1146/annurev.psych.121208.131609
  7. Business Software Alliance, The Compliance Gap : BSA Global Software Survey, 2014.
  8. Byrne, B.M., Structural Equation Modeling with AMOS : Basic Concepts, Applications, and Programming, 2nd ed. Lawrence Erlbaum Associates, Mahwah, NJ, 2010.
  9. Cheng, H.K., R.R. Sims, and H. Teegen, "To Purchase or to Pirate Software : An Empirical Study", Journal of Management Information Systems, Vol.13, No.4, 1997, 49-60. https://doi.org/10.1080/07421222.1997.11518142
  10. Cheung, G.W. and R.B. Rensvold, "Evaluating Goodness-of-Fit Indexes for Testing Measurement Invariance", Structural Equation Modeling : A Multidisciplinary Journal, Vol.9, No.2, 2002, 233-255. https://doi.org/10.1207/S15328007SEM0902_5
  11. Chiu, R.K., "Ethical Judgment and Whistleblowing Intention : Examining the Moderating Role of Locus of Control", Journal of Business Ethics, Vol.43, 2003, 65-74. https://doi.org/10.1023/A:1022911215204
  12. Christensen, A.L. and M.M. Eining, "Factors Influencing Software Piracy : Implications for Accountants", Journal of Information Systems, Vol.5, No.1, 1991, 67-80.
  13. Compeau, D.R. and C.A. Higgins, "Computer Self-Efficacy : Development of a Measure and Initial Test", MIS Quarterly, Vol.19, No.2, 1995, 189-211. https://doi.org/10.2307/249688
  14. Cronan, T.P. and S. Al-Rafee, "Factors That Influence the Intention to Pirate Software and Media", Journal of Business Ethics, Vol.78, No.4, 2008, 527-545. https://doi.org/10.1007/s10551-007-9366-8
  15. D'Astous, A., F. Colbert, and D. Montpetit, "Music Piracy on the Web-How Effective Are Anti-Piracy Arguments? Evidence from the Theory of Planned Behaviour", Journal of Consumer Policy, Vol.28, No.3, 2005, 289-310. https://doi.org/10.1007/s10603-005-8489-5
  16. Depken, C.A. and L.C. Simmons, "Social Construct and the Propensity for Software Piracy", Applied Economics Letters, Vol.11, No.2, 2004, 97-100. https://doi.org/10.1080/1350485042000200187
  17. Digieco Report, Tap On The Door of Mobile First World, 2015.
  18. Engadget, "Monument Valley Dev : 5% of Android Players Paid to Play", 2015. Available at http://www.engadget.com/2015/01/06/monument-valley-dev-5-of-android-players-paid-to-play/(Accessed January 6, 2015).
  19. Gopal, R.D., G.L. Sanders, S. Bhattacharjee, M. Agrawal, and S.C. Wagner, "A Behavioral Model of Digital Music Piracy", Journal of Organizational Computing and Electronic Commerce, Vol.14, No.2, 2004, 89-105. https://doi.org/10.1207/s15327744joce1402_01
  20. Gopal, R.D. and G.L. Sanders, "International Software Piracy : Analysis of Key Issues and Impacts", Information Systems Research, Vol.9, No.4, 1998, 380-397. https://doi.org/10.1287/isre.9.4.380
  21. Gopal, R.D. and G.L. Sanders, "Global Software Piracy : You Can't Get Blood out of a Turnip", Communications of the ACM, Vol.43, No.9, 2000, 82-89. https://doi.org/10.1145/348941.349002
  22. Gottfredson, M. and T. Hirschi, A General Theory of Crime, Stanford University Press, 1990.
  23. Hair, J.F., W.C. Black, B.J. Babin, and R.E. Anderson, Multivariate Data Analysis, 7th ed. New Jersey : Prentice Hall, 2009.
  24. Hennig-Thurau, T., V. Henning, and H. Sattler, "Consumer File Sharing of Motion Pictures", Journal of Marketing, Vol.71, No.4, 2007, 1-18. https://doi.org/10.1509/jmkg.71.4.1
  25. Higgins, G.E., "Can Low Self-Control Help With the Understanding of the Software Piracy Problem?", Deviant Behavior, Vol.26, No.1, 2004, 1-24. https://doi.org/10.1080/01639620490497947
  26. Hinduja, S., "Neutralization Theory and Online Software Piracy : An Empirical Analysis", Ethics and Information Technology, Vol.9, No.3, 2007, 187-204. https://doi.org/10.1007/s10676-007-9143-5
  27. Hunt, S.D. and S. Vitell, "A General Theory of Marketing Ethics", Journal of Macromarketing, Vol.6, No.1, 1986, 5-16. https://doi.org/10.1177/027614678600600103
  28. Ingram, J.R. and S. Hinduja, "Neutralizing Music Piracy : An Empirical Examination", Deviant Behavior, Vol.29, No.4, 2008, 334-366. https://doi.org/10.1080/01639620701588131
  29. INSEAD, Competitive Advantage : The Economic Impact of Properly Licensed Software, 2013.
  30. Ki, E.J., B.H. Chang, and H. Khang, "Exploring Influential Factors on Music Piracy across Countries", Journal of Communication, Vol. 56, No.2, 2006, 406-426. https://doi.org/10.1111/j.1460-2466.2006.00026.x
  31. Kim, J.H., "A Study on the Predictors of Intention to Pirate Software", Journal of the Korea Society of IT Services, Vol.12, No.2, 2013, 131-152. (김중한, "소프트웨어 불법복제 의도에 미치는 영향 요인에 관한 연구", 한국IT서비스학회지, 제12권, 제2호, 2013, 131-152.) https://doi.org/10.9716/KITS.2013.12.2.131
  32. Korea Copyright Commission, Research on Status of Copyright Violations from Mobile Equipment and Setting up Countermeasures, 2011. (한국저작권위원회, "스마트 기기를 통한 저작권 침해 실태조사 및 대응방안 연구", 2011.)
  33. Korea Federation of Copyright Organizations, Annual Report on Copyright Protection, 2014. (한국저작권단체연합회, "저작권 보호 연차보고서", 2014.)
  34. Leonard, L.N.K. and T.P. Cronan, "Illegal, Inappropriate, and Unethical Behavior in an Information Technology Context : A Study to Explain Influences", Journal of the Association for Information Systems, Vol.1, No. 12, 2001, 1-31.
  35. Limayem, M., M. Khalifa, and W.W. Chin, "Factors Motivating Software Piracy : A Longitudinal Study", IEEE Transactions on Engineering Management, Vol.51, No.4, 2004, 414-425. https://doi.org/10.1109/TEM.2004.835087
  36. Lin, T., M.H. Hsu, F. Kuo, and P. Sun, "An Intention Model-Based Study of Software Piracy", In Proceedings of the 32nd Hawaii International Conference on System Sciences, 1999.
  37. Lysonski, S. and S. Durvasula, "Digital Piracy of MP3s : Consumer and Ethical Predispositions", Journal of Consumer Marketing, Vol.25, No.3, 2008, 167-178. https://doi.org/10.1108/07363760810870662
  38. Ministry of Knowledge Economy, 2011 Employment Trends Report, 2012. (지식경제부, "2011년 정보통신부문 인력동향 보고서", 2012.)
  39. Moon, B., J.D. McCluskey, and C.P. McCluskey, "A General Theory of Crime and Computer Crime : An Empirical Test", Journal of Criminal Justice, Vol.38, No.4, 2010, 767-772. https://doi.org/10.1016/j.jcrimjus.2010.05.003
  40. Moores, T.T., "An Analysis of the Impact of Economic Wealth and National Culture on the Rise and Fall of Software Piracy Rates", Journal of Business Ethics, Vol.81, No.1, 2008, 39-51. https://doi.org/10.1007/s10551-007-9479-0
  41. Morris, R.G. and G.E. Higgins, "Neutralizing Potential and Self-Reported Digital Piracy : A Multitheoretical Exploration Among College Undergraduates", Criminal Justice Review, Vol.34, No.2, 2008, 173-195. https://doi.org/10.1177/0734016808325034
  42. Nandedkar, A. and V. Midha, "It Won't Happen to Me : An Assessment of Optimism Bias in Music Piracy", Computers in Human Behavior, Vol.28, No.1, 2012, 41-48. https://doi.org/10.1016/j.chb.2011.08.009
  43. Peace, A.G., D.F. Galletta, and J.Y.L. Thong, "Software Piracy in the Workplace : A Model and Empirical Test", Journal of Management Information Systems, Vol.20, No.1, 2003, 153-177. https://doi.org/10.1080/07421222.2003.11045759
  44. Piquero, N.L. and A.R. Piquero, "Democracy and Intellectual Property : Examining Trajectories of Software Piracy", The ANNALS of the American Academy of Political and Social Science, Vol.605, No.1, 2006, 104-127. https://doi.org/10.1177/0002716206287015
  45. Randall, D.M. and A.M. Gibson, "Ethical Decision Making in the Medical Profession : An Application of the Theory of Planned Behavior", Journal of Business Ethics, Vol.10, No.2, 1991, 111-122. https://doi.org/10.1007/BF00383614
  46. Sinha, R.K. and N. Mandel, "Preventing Digital Music Piracy : The Carrot or the Stick?", Journal of Marketing, Vol.72, No.1, 2008, 1-15. https://doi.org/10.1509/jmkg.72.1.1
  47. Sykes, G.M. and D. Matza, "Techniques of Neutralization : A Theory of Delinquency", American Sociological Review, Vol.22, No. 6, 1957, 664-70. https://doi.org/10.2307/2089195
  48. Thong, J.Y.L. and C.S. Yap, "Testing an Ethical Decision-Making Theory : The Case of Softlifting", Journal of Management Information Systems, Vol.15, No.1, 1998, 213-37. https://doi.org/10.1080/07421222.1998.11518203
  49. Triandis, H.C., "Values, Attitudes, and Interpersonal Behavior", In Nebraska Symposium on Motivation, 1979.
  50. Van Kranenburg, H. and A. Hogenbirk, "Multimedia, Entertainment, and Business Software Copyright Piracy : A Cross-National Study", Journal of Media Economics, Vol. 18, No.2, 2005, 109-129. https://doi.org/10.1207/s15327736me1802_3
  51. Vitell, S.J., J.J. Singh, and J.G.P. Paolillo, "Consumers' Ethical Beliefs : The Roles of Money, Religiosity and Attitude toward Business", Journal of Business Ethics, Vol.73, No.4, 2007, 369-379. https://doi.org/10.1007/s10551-006-9212-4
  52. Williams, K.R. and R. Hawkins, "Perceptual Research on General Deterrence : A Critical Review", Law and Society Review, Vol.20, 1986, 545-572. https://doi.org/10.2307/3053466
  53. Yoon, C., "Theory of Planned Behavior and Ethics Theory in Digital Piracy : An Integrated Model", Journal of Business Ethics, Vol. 100, No.3, 2011, 405-417. https://doi.org/10.1007/s10551-010-0687-7
  54. Zhang, X., M. Shim, and G. Gim, "An Empirical Study of the Piracy Behavior on Digital Content", Journal of Korea IT Service, Vol.9, No.4, 2010, 37-55. (장향란, 심민우, 김광용, "디지털콘텐츠 불법복제 행동에 관한 연구", 한국IT서비스학회지, 제9권, 제4호, 2010, 37-55.)