DOI QR코드

DOI QR Code

The Effect of PC Software Piracy Attitude and Habit on Illegal Use of Smartphone App

PC소프트웨어 불법사용에 대한 태도와 습관이 스마트폰 앱 불법복제에 미치는 영향

  • Received : 2017.04.24
  • Accepted : 2017.05.31
  • Published : 2017.07.03

Abstract

Due to Proliferation of Mobile Devices, the Global Mobile Application (App) Market is Set to Continue its Impressive Growth Trajectory. However, like other Digital Contents, Prevalent Piracy of Smartphone Apps has Become One of the Major Obstacles to the Growth of the Newborn App Industry. The Objective of this Study is to Examine and Better Understand the Effects of Factors Which has been Known to Influence PC Software Piracy. A Research Model Explaining the Impact of Various Factors to Smartphone App Piracy Attitude and Intention is Constructed Based on Theories of Ethical Behavior. A Survey of College Students was Conducted to Test the Research Model. Findings Show that PC Software Piracy Habit and Attitude have Significant Effects on Smartphone Piracy Attitude and Intention. Beliefs Concerning Judicial and Performance Risks Due to Piracy have Little Effects on Smartphone App Piracy Attitude.

모바일 기기의 확산과 더불어 최근 모바일 애플리케이션 시장은 괄목할 만한 성장세를 보이고 있지만 다른 디지털 컨텐츠와 마찬가지로 불법복제의 폐해가 심각하다. 본 연구는 과거 PC환경에서의 불법행위에 대한 태도와 행위의도에 영향을 미치는 것으로 나타난 요인들이 새로운 컴퓨팅환경, 즉 모바일 기기에서도 그 영향력을 유지하는지 실증적으로 확인하고자 한다. 윤리적 의사결정 이론들을 바탕으로 설정된 연구모형은 대학생들을 대상으로 실시한 설문조사를 통해 수집한 자료를 구조방정식모형을 이용하여 실증적으로 검증하였다. PC환경에서의 불법행위 습관은 스마트폰 앱 불법복제에 대한 태도와 불법행위 의도에 영향을 미치는 것으로 나타났으며 PC소프트웨어 불법복제에 대한 태도는 스마트폰 앱의 불법적 사용에 대한 태도에 유의한 영향을 미쳤다. 불법행위에 따른 법적, 성능적 위험성에 대한 의식이 태도에 미치는 영향과 PC환경에서 불법행위 능력에 대한 자각이 불법행위 의도에 미치는 영향은 유의하지 않았다.

Keywords

References

  1. StatCounter, "Mobile and Tablet Internet u Sage Exceeds Desktop for First Time Worl Dwide," http://gs.statcounter.com/press/mobile-and-tablet-internet-usage-exceeds-desktop-for-first-time-worldwide. 2016.
  2. Newzoo, "Global Mobile Market Report: App Market to Gross $44.8BN This Year," https://newzoo.com/insights/articles/globalmobile-market-report-app-market-to-gross-44-8bn-this-year. 2016.
  3. AppFigures, "App Stores Start to Mature-2016 Year in Review," http://blog.appfigures.com/app-stores-start-to-mature-2016-year-in-review. 2017.
  4. Korea Copyright Commission, "Research on Status of Copyright Violations from Mobile Equipment and Setting Up Countermeasures," 2011.
  5. Business Software Alliance, "2016 BSA Global Software Survey," 2016.
  6. Korea Culture and Tourism Institute, "A Study on the Effect on Economical Effect of Decrease in Contents Piracy," 2011.
  7. Kubesch, A.S., and Wicker, S., “Digital Rights Management: The Cost to Consumers,” Proceedings of the IEEE, Vol. 103, No. 5, pp. 726-733, 2015. https://doi.org/10.1109/JPROC.2015.2418457
  8. Kim, E., S. Kim, and Choi, J., "Detecting Illegally-Copied Apps on Android Devices," in IT Convergence and Security (ICITCS), 2013 International Conference on IT Convergence and Security, pp. 1-4, 2013.
  9. Chae, D.K., Kim, S.W., Cho, S.J. and Kim, Y., "Effective and Efficient Detection of Software Theft via Dynamic API Authority Vectors," Journal of Systems and Software, Vol. 110, pp. 1-9, 2015. https://doi.org/10.1016/j.jss.2015.08.018
  10. Gopal, R.D., and Sanders, G.L., “International Software Piracy: Analysis of Key Issues and Impacts,” Information Systems Research, Vol. 9, No. 4, pp. 380-397, 1998. https://doi.org/10.1287/isre.9.4.380
  11. Depken, C.A., and Simmons, L.C., “Social Construct and the Propensity for Software Piracy,” Applied Economics Letters, Vol. 11, No. 2, pp. 97-100, 2004. https://doi.org/10.1080/1350485042000200187
  12. Ki, E.J., Chang, B.H., and Khang, H., “Exploring Influential Factors on Music Piracy Across Countries,” Journal of Communication, Vol. 56, No. 2, pp. 406-426, 2006. https://doi.org/10.1111/j.1460-2466.2006.00026.x
  13. Moores, T. T., “An Analysis of the Impact of Economic Wealth and National Culture on the Rise and Fall of Software Piracy Rates,” Journal of Business Ethics, Vol. 81, No. 1, pp. 39-51, Jul. 2008. https://doi.org/10.1007/s10551-007-9479-0
  14. Leonard, L.N.K., and Cronan, T.P., “Illegal, Inappropriate, and Unethical Behavior in an Information Technology Context: A study to Explain Influences,” Journal of the Association for Information Systems, Vol. 1, No. 12, pp. 1-31, 2001.
  15. Gopal, R.D., and Sanders, G.L., “Global Software Piracy: You Can’t Get Blood Out of a Turnip,” Communications of the ACM, Vol. 43, No. 9, pp. 82-89, 2000. https://doi.org/10.1145/348941.349002
  16. Randall, D.M., and Gibson, A.M., “Ethical Decision Making in the Medical Profession: An Application of the Theory of Planned Behavior,” Journal of Business Ethics, Vol. 10, No. 2, pp. 111-122, 1991. https://doi.org/10.1007/BF00383614
  17. Chiu, R. K., “Ethical Judgment and Whistleblowing Intention: Examining the Moderating Role of Locus of Control,” Journal of Business Ethics, Vol. 43, No. 1, pp. 65-74, 2003. https://doi.org/10.1023/A:1022911215204
  18. Vitell, S.J., Singh, J.J. and Paolillo, J.G.P., “Consumers’ Ethical Beliefs: The Roles of Money, Religiosity and Attitude toward Business,” Journal of Business Ethics, Vol. 73, No. 4, pp. 369-379, Dec. 2007. https://doi.org/10.1007/s10551-006-9212-4
  19. Gottfredson, M., and Hirschi, T., A General Theory of Crime. Stanford University Press, 1990.
  20. Higgins, G.E., Wolfe, S.E. and Marcum, C.D., “Digital Piracy: An Examination of Three Measurements of Self-Control,” Deviant Behavior, Vol. 29, No. 5, pp. 440-460, Jun. 2008. https://doi.org/10.1080/01639620701598023
  21. Marcum, Catherine, D., Higgins, G.E., Wolfe, S.E. and Ricketts, M.L., “Examining the Intersection of Self-control, Peer Association and Neutralization in Explaining Digital Piracy,” Western Criminology Review, Vol. 12, No. 3, pp. 60-74, 2011.
  22. Lee, S.Y., and Lee, Y.H., “Effect of Self-Control and Rational Choice on Online Digital Piracy,” Journal of Social Science, Vol. 23, No. 3, pp. 53-78, 2016.
  23. Moon, B., McCluskey, J.D. and McCluskey, C.P., “A General Theory of Crime and Computer Crime: An Empirical Test,” Journal of Criminal Justice, Vol. 38, No. 4, pp. 767-772, Jul. 2010. https://doi.org/10.1016/j.jcrimjus.2010.05.003
  24. Hinduja, S., “A critical Examination of the Digital Music Phenomenon,” Critical Criminology, Vol. 14, No. 4, pp. 387-409, 2006. https://doi.org/10.1007/s10612-006-9006-0
  25. Piquero, A.R., and Bouffard, J.A., “Something Old, Something New: A Preliminary Investigation of Hirschi’s Redefined Self-Control,” Justice Quarterly, Vol. 24, No. 1, pp. 1-27, 2007. https://doi.org/10.1080/07418820701200935
  26. Williams, K.R., and Hawkins, R., “Perceptual Research on General Deterrence: A Critical Review,” Law and Society Review, Vol. 20, No. 4, pp. 545-572, 1986. https://doi.org/10.2307/3053466
  27. Peace, A.G., Galletta, D.F. and Thong, J.Y.L., “Software Piracy in the Workplace: A Model and Empirical Test,” Journal of Management Information Systems, Vol. 20, No. 1, pp. 153-177, 2003. https://doi.org/10.1080/07421222.2003.11045759
  28. Hunt, S.D., and Vitell, S., “A General Theory of Marketing Ethics,” Journal of Macromarketing, Vol. 6, No. 1, pp. 5-16, 1986. https://doi.org/10.1177/027614678600600103
  29. Thong, J.Y.L., and Yap, C.S., “Testing an Ethical Decision-Making Theory: The Case of Softlifting,” Journal of Management Information Systems, Vol. 15, No. 1, pp. 213-237, 1998. https://doi.org/10.1080/07421222.1998.11518203
  30. Ajzen, I., and Fishbein, M., Belief, Attitude, Intention and Behavior: An Introduction to Theory and Research. Reading, MA: Addison-Wesley, 1975.
  31. Ajzen I., “The Theory of Planned Behavior,” Organizational Behavior and Human Decision Processes, Vol. 50, No. 2, pp. 179-211, Dec. 1991. https://doi.org/10.1016/0749-5978(91)90020-T
  32. D'Astous, A., Colbert, F., and Montpetit, D., “Music Piracy on the Web-How Effective Are Anti-Piracy Arguments? Evidence from the Theory of Planned Behaviour,” Journal of Consumer Policy, Vol. 28, No. 3, pp. 289-310, 2005. https://doi.org/10.1007/s10603-005-8489-5
  33. Lin, T., Hsu, M.H., Kuo, F., and Sun, P., "An Intention Model-based Study of Software Piracy," in Proceedings of the 32nd Hawaii International Conference on System Sciences, Vol. 30, No. c, pp. 1-8, 1999.
  34. Cronan, T.P., and Al-Rafee, S., “Factors that Influence the Intention to Pirate Software and Media,” Journal of Business Ethics, Vol. 78, No. 4, pp. 527-545, Mar. 2008. https://doi.org/10.1007/s10551-007-9366-8
  35. Yoon, C., “Theory of Planned Behavior and Ethics Theory in Digital Piracy: An Integrated Model,” Journal of Business Ethics, Vol. 100, No. 3, pp. 405-417, Nov. 2011. https://doi.org/10.1007/s10551-010-0687-7
  36. Triandis, H.C., "Values, Attitudes, and Interpersonal Behavior," in Nebraska symposium on motivation, pp. 195-259, 1979.
  37. Limayem, M., Khalifa, M., and Chin, W.W., “Factors Motivating Software Piracy: A Longitudinal Study,” IEEE Transactions on Engineering Management, Vol. 51, No. 4, pp. 414-425, Nov. 2004. https://doi.org/10.1109/TEM.2004.835087
  38. Wood, W., Labrecque, J.S., Lin, P.Y., and Runger, D., "Habits in Dual Process Models", In Dual Process Theories of the Social Mind, Guilford Press New York: NY, pp. 371-385, 2014.
  39. Nandedkar, A., and Midha, V., “It Won’t Happen to Me: An Assessment of Optimism Bias in Music Piracy,” Computers in Human Behavior, Vol. 28, No. 1, pp. 41-48, Jan. 2012. https://doi.org/10.1016/j.chb.2011.08.009
  40. Lysonski, S., and Durvasula, S., “Digital Piracy of MP3s: Consumer and Ethical Predispositions,” Journal of Consumer Marketing, Vol. 25, No. 3, pp. 167-178, 2008. https://doi.org/10.1108/07363760810870662
  41. Hennig-Thurau, T., Henning, V., and Sattler, H., "Consumer File Sharing of Motion Pictures", Journal of Marketing, Vol. 71, No. 4, pp. 1-18, 2007. https://doi.org/10.1509/jmkg.71.4.1
  42. Nill, A., Schibrowsky, J., and Peltier, J., "Factors That Influence Software Piracy: A View from Germany", Communications of the ACM, Vol. 53, No. 6, pp. 131-134, 2010. https://doi.org/10.1145/1743546.1743581
  43. Kim, J.H., "A Study on the Predictors of Intention to Pirate Software", Journal of the Korea Society of IT Services, Vol. 12, No. 2, pp. 131-152, 2013. https://doi.org/10.9716/KITS.2013.12.2.131
  44. Bagozzi, R.P., "Attitudes, Intentions, and Behavior: A Test of Some Key Hypotheses.", Journal of Personality and Social Psychology, Vol. 41, No. 4, pp. 607-627, 1981. https://doi.org/10.1037/0022-3514.41.4.607
  45. JHair, J.F., Black, W.C., Babin, B.J., and Anderson, R.E., Multivariate data analysis, 7th ed. New Jersey: Prentice Hall, 2009.
  46. Chin, W. W., "The Partial Least Squares Approach to Structural Equation Modeling", Modern Methods for Business Research, Vol. 295, No. 2, pp. 295-336, 1998.
  47. Higgins, G.E., Wilson, A.L., and Fell, B.D., "An Application of Deterrence Theory to Software Piracy", Journal of Criminal Justice and Popular Culture, Vol. 12, No. 3, pp. 166-184, 2005.

Cited by

  1. 소프트웨어 불법복제에 영향을 미치는 환경 요인에 기반한 국가 분류 vol.26, pp.4, 2017, https://doi.org/10.5859/kais.2017.26.4.227