Browse > Article
http://dx.doi.org/10.9716/KITS.2014.13.2.019

A Study on Factors that Influence the Attitude to Pirate Smartphone Application  

Kim, Joong Han (경기대학교 경영정보학화)
Publication Information
Journal of Information Technology Services / v.13, no.2, 2014 , pp. 19-34 More about this Journal
Abstract
As the global smartphones market is growing at a brisk pace, their associated mobile applications are becoming increasingly ubiquitous in our daily life. The growth of mobile application business is explosive. Like other digital contents businesses, illegal downloads of copyrighted mobile applications become major obstacle in the future of the industry. In spite of anti-piracy efforts, the phenomenon has been getting worse. It is necessary to change the focus of current deterrence policies and strategies. This study investigates the factors influencing smartphone applications piracy behavior. For better understanding of illegal behavior, a research model of potential determinants for the piracy behavior is developed and empirically tested via path analysis using structural equation modeling. Findings show that social factors, beliefs concerning benefits from piracy, self-efficacy, and habit have significant effects on attitude toward smartphone application piracy. The result also shows perceived risks and facilitating conditions were not significantly related to their attitude. Implications for research and practice are discussed.
Keywords
Piracy; Smartphone Application; Unethical Behavioral Model; Illegal Downloading; Mobile Apps;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Phau, I. and J. Liang, "Downloading digital video games : predictors, moderators and consequences", Mark. Intell. Plan., Vol.30, No.7(2012), pp.740-756.   DOI   ScienceOn
2 Piquero, N. L. and A. R. Piquero, "Democracy and intellectual property : Examining trajectories of software piracy", Ann. Am. Acad. Pol. Soc. Sci., Vol.605, No.1(2006), pp. 104-127.   DOI
3 Randall, D. M. and A. M. Gibson, "Ethical decision making in the medical profession : An application of the theory of planned behavior", J. Bus. Ethics, Vol.10, No.2(1991), pp.111-122.   DOI   ScienceOn
4 Sykes, G. M. and D. Matza, "Techniques of neutralization : A theory of delinquency", Am. Sociol. Rev., Vol.22, No.6(1957), pp.664-670.   DOI   ScienceOn
5 Thong, J. Y. L. and C.-S. Yap, "Testing an Ethical Decision-Making Theory : The Case of Softlifting", J. Manag. Inf. Syst., Vol.15, No.1(1998), pp.213-237.   DOI
6 Triandis, H. C., "Values, attitudes, and interpersonal behavior", in Nebraska symposium on motivation, 1980.
7 van Kranenburg, H. and A. Hogenbirk, "Multimedia, entertainment, and business software copyright piracy : A cross-national study", J. media Econ., Vol.18, No.2(2005), pp.109-129.   DOI   ScienceOn
8 Vitell, S. J., J. J. Singh, and J. G. P. Paolillo, "Consumers'Ethical Beliefs : The Roles of Money, Religiosity and Attitude toward Business", J. Bus. Ethics, Vol.73, No.4(2007), pp.369-379.   DOI
9 Williams, K. R. and R. Hawkins, "Perceptual research on general deterrence : A critical review", Law Socy Rev., Vol.20(1986), p.545.   DOI   ScienceOn
10 Yoon, C., "Theory of Planned Behavior and Ethics Theory in Digital Piracy : An Integrated Model", J. Bus. Ethics, Vol.100, No.3 (2011), pp.405-417.   DOI   ScienceOn
11 Jeong, Y.-S., Y.-U. Park, J.-C. Moon, S.-J. Cho, D. Kim, and M. Park, "An anti-piracy mechanism based on class separation and dynamic loading for Android applications", in Proceedings of the 2012 ACM Research in Applied Computation Symposium, (2012), pp.328-332.
12 Ki, E. J. B. H. Chang, and H. Khang, "Exploring influential factors on music piracy across countries", J. Commun., Vol.56, No.2 (2006), pp.406-426.   DOI   ScienceOn
13 Kim, E., S. Kim, and J. Choi, "Detecting Illegally-Copied Apps on Android Devices", in IT Convergence and Security (ICITCS), International Conference on, (2013), pp.1-4.
14 Marcum, D., Catherine, G. E. Higgins, S. E. Wolfe, and L. Ricketts, Melissa, "Examining the Intersection of Self-control, Peer Association and Neutralization in Explaining Digital Piracy", West. Crim. Rev., Vol.12, No.3 (2011), pp.60-74.
15 Leonard, L. N. K. and T. P. Cronan, "Illegal, inappropriate, and unethical behavior in an information technology context : A study to explain influences", J. Assoc. Inf. Syst., Vol.1, No.12(2001), pp.1-31.
16 Limayem, M., M. Khalifa, and W. W. Chin, "Factors Motivating Software Piracy : A Longitudinal Study", IEEE Trans. Eng. Manag., Vol.51, No.4(2004), pp.414-425.   DOI   ScienceOn
17 Lin, T. M. H. Hsu, F. Kuo, and P. Sun, "An Intention Model-based Study of Software Piracy", in Proceedings of the 32nd Hawaii International Conference on System Sciences, Vol.30(1999).
18 Moon, B., J. D. McCluskey, and C. P. Mc-Cluskey, "A general theory of crime and computer crime : An empirical test", J. Crim. Justice, Vol.38, No.4(2010), pp.767-772.   DOI   ScienceOn
19 Moores, T. T., "An Analysis of the Impact of Economic Wealth and National Culture on the Rise and Fall of Software Piracy Rates", J. Bus. Ethics, Vol.81, No.1(2008), pp. 39-51.   DOI
20 Morris, R. G. and G. E. Higgins, "Neutralizing Potential and Self-Reported Digital Piracy : A Multitheoretical Exploration Among College Undergraduates", Crim. Justice Rev., Vol.34, No.2(2008), pp.173-195.
21 Nandedkar, A. and V. Midha, "It won't happen to me : An assessment of optimism bias in music piracy", Comput. Human Behav., Vol.28, No.1(2012), pp.41-48.   DOI   ScienceOn
22 Peace, A. G., D. F. Galletta, and J. Y. L. Thong, "Software Piracy in the Workplace : A Model and Empirical Test", J. Manag. Inf. Syst., Vol.20, No.1(2003), pp.153-177.   DOI
23 Forbes, "Google Play Catching Up To Apple's App Store", Forbes, 2013, [Online] Available : http://www.forbes.com/sites/chuckjones/2013/12/19/google-play-catching-up-to-apples-app-store.
24 Cronan, T. P. and S. Al-Rafee, "Factors that Influence the Intention to Pirate Software and Media", J. Bus. Ethics, Vol.78, No.4 (2008), pp.527-545.   DOI   ScienceOn
25 De Castro, J. O. D. B. Balkin, and D. A. Shepherd, "Can entrepreneurial firms benefit from product piracy?", J. Bus. Ventur., Vol.23, No.1(2008), pp.75-90.   DOI   ScienceOn
26 Depken, C. A. and L. C. Simmons, "Social construct and the propensity for software piracy", Appl. Econ. Lett., Vol.11, No.2(2004), pp.97-100.   DOI   ScienceOn
27 Fraedrich, J. P. and O. C. Ferrell, "The impact of perceived risk and moral philosophy type on ethical decision making in business organizations", J. Bus. Res., Vol.24, No.4 (1992), pp.283-295.   DOI   ScienceOn
28 Gartner, "Key Trends for the Mobile Industry", Gartner Conference Report, (2013), [Online] Available : http://www.gartner.com/newsroom/id/2592315.
29 Gopal, R. D. and G. L. Sanders, "Global software piracy : you can't get blood out of a turnip", Commun. ACM, Vol.43, No.9(2000), pp.82-89.
30 Gopal, R. D. and G. L. Sanders, "International software piracy : Analysis of key issues and impacts", Inf. Syst. Res., Vol.9, No.4 (1998), pp.380-397.   DOI   ScienceOn
31 Gottfredson, M. and T. Hirschi, A general theory of crime. Stanford University Press, 1990.
32 Hair, J. F., W. C. Black, B. J. Babin, and R. E. Anderson, Multivariate data analysis, 7th ed, New Jersey : Prentice Hall, 2009.
33 Anderson, J. C. and D. W. Gerbing, "Structural equation modeling in practice : A review and recommended two-step approach", Psychol. Bull., Vol.103, No.3(1988), p.411.   DOI
34 Hinduja, S., "Neutralization theory and online software piracy : An empirical analysis", Ethics Inf. Technol., Vol.9, No.3(2007), pp.187-204.   DOI
35 Hunt, S. D. and S. Vitell, "A general theory of marketing ethics", J. macromarketing, Vol.6, No.1(1986), pp.5-16.   DOI
36 Ingram, J. R. and S. Hinduja, "Neutralizing Music Piracy : An Empirical Examination", Deviant Behav., Vol.29, No.4(2008), pp.334-366.   DOI   ScienceOn
37 "Apple App Store Has Lost $450 Million To Piracy", 24/7 Wall Street, 2010[Online], Available : http://247wallst.com/apps-software/2010/01/13/apple-app-store-has-lost-450-million-to-piracy.
38 Bagchi, K., P. Kirs, and R. Cerveny, "Global Software Piracy : Can Economic Factors Along Explain the Trend?", Commun. ACM, Vol.49, No.6(2006), pp.70-75.   DOI   ScienceOn
39 Bandura, A., Social foundations of thought and action : A social cognitive theory, Prentice-Hall, Inc, 1986.
40 Beck, L. and I. Ajzen, "Predicting dishonest actions using the theory of planned behavior", J. Res. Pers., Vol.25, No.3(1991), pp.285-301.   DOI
41 Business Insider, "One In Every 5 People In The World Own A Smartphone", 2013[Online] Available : http://www.businessinsider.com/smartphone-and-tablet-penetration-2013-10#ixzz2y9qsuMDw.
42 Chen, Y.-C. R.-A. Shang, and A.-K. Lin, "The intention to download music files in a P2P environment : Consumption value, fashion, and ethical decision perspectives", Electron. Commer. Res. Appl., Vol.7, No.4(2008), pp.411-422.   DOI   ScienceOn
43 Compeau, D. R. and C. A. Higgins, "Computer self-efficacy : Development of a measure and initial test.", MIS Q., Vol.19, No.2 (1995).
44 Cheng, H. K., R. R. Sims, and H. Teegen, "To purchase or to pirate software : an empirical study", J. Manag. Inf. Syst., Vol.13, No.4(1997), pp.49-60.   DOI
45 CNET, "How piracy ruins it for paid apps", CNET, 2011, [Online] Available : http://www.cnet.com/news/how-piracy-ruins-it-forpaid-apps-inside-apps/, [Accessed : 12-Dec-2013].
46 CNN Money, "Mobile apps overtake PC Internet usage in U. S.", CNN Money, 2014, [Online] Available : http://money.cnn.com/2014/02/28/technology/mobile/mobile-appsinternet.
47 정상철(한국문화관경연구원), "(요약) 콘텐츠 불법복제 감소가 국가경제에 미치는 경제적 파급효과에 관한 연구", 2011.
48 한국저작권위원회, "스마트 기기를 통한 저작권 침해 실태조사 및 대응방안 연구", 2011.
49 Ajzen, I. and M. Fishbein, Belief, attitude, intention and behavior : An introduction to theory and research, Reading : Addison-Wesley, 1975.
50 Ajzen, I., "Perceived Behavioral Control, Self-Efficacy, Locus of Control, and the Theory of Planned Behavior", J. Appl. Soc. Psychol., Vol.32, No.4(2002), pp.665-683.   DOI   ScienceOn
51 Ajzen, I., "The theory of planned behavior", Organ. Behav. Hum. Decis. Process., Vol. 50, No.2(1991), pp.179-211.   DOI
52 Chiu, R. K., "Ethical Judgment and Whistleblowing Intention : Examining the Moderating Role of Locus of Control", J. Bus. Ethics, Vol.43(2003), pp.65-74.   DOI
53 D'Astous, A., F. Colbert, and D. Montpetit, "Music piracy on the web-how effective are anti-piracy arguments? Evidence from the theory of planned behaviour", J. Consum. Policy, Vol.28, No.3(2005), pp.289-310.   DOI   ScienceOn
54 Bezmen, T. L. and C. A. Depken, "Influences on software piracy : Evidence from the various United States", Econ. Lett., Vol.90, No.3 (2006), pp.356-361.   DOI   ScienceOn