Switch to: References

Add citations

You must login to add citations.
  1. Trade Liberalization, Corruption, and Software Piracy.Christopher Robertson, K. M. Gilley & William F. Crittenden - 2008 - Journal of Business Ethics 78 (4):623-634.
    As multinational firms explore new and promising national markets two of the most crucial elements in the strategic decision regarding market-entry are the level of corruption and existing trade barriers. One form of corruption that is crucially important to firms is the theft of intellectual property. In particular, software piracy has become a hotly debated topic due to the deep costs and vast levels of piracy around the world. The purpose of this paper is to assess how laissez-faire trade policies (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • Digital Piracy: Factors that Influence Attitude Toward Behavior.Sulaiman Al-Rafee & Timothy Paul Cronan - 2006 - Journal of Business Ethics 63 (3):237-259.
    A new form of software piracy known as digital piracy has taken the spotlight. Lost revenues due to digital piracy could reach $5 billion by the end of 2005.Preventives and deterrents do not seem to be working – losses are increasing. This study examines factors that influence an individual’s attitude toward pirating digital material. The results of this study suggest that attitude toward digital pirating is influenced by beliefs about the outcome of behavior (cognitive beliefs), happiness and excitement (affective beliefs), (...)
    Download  
     
    Export citation  
     
    Bookmark   33 citations  
  • “To Pirate or Not to Pirate”: A Comparative Study of the Ethical Versus Other Influences on the Consumer’s Software Acquisition-Mode Decision.Pola B. Gupta, Stephen J. Gould & Bharath Pola - 2004 - Journal of Business Ethics 55 (3):255-274.
    Consumers of software often face an acquisition-mode decision, namely whether to purchase or pirate that software. In terms of consumer welfare, consumers who pirate software may stand in opposition to those who purchase it. Marketers also face a decision whether to attempt to thwart that piracy or to ignore, if not encourage it as an aid to their software's diffusion, and policymakers face the decision whether to adopt interventionist policies, which are government-centric, or laissez faire policies, which are marketer-centric. Here (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  • Ethical Decision Making with Information Systems Students.Samer Alhawari & Amine Nehari Talet - 2011 - International Journal of Cyber Ethics in Education 1 (2):41-53.
    Information Technology is a new tool in education that continually changes and offers new opportunities for teaching and learning. In general, the effects of IT are complex and depend upon people’s decisions about development and use. This study investigates the ethical issues in education in terms of Information Systems students’ attitudes at Saudi universities towards digital piracy. The differences in the ethical decision-making process, ethical awareness, and intention to perform questionable acts is examined. The authors tested for differences in attitudes (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Toward an Analytical Model of Ethical Decision Making in Plagiarism.Gervas K. K. Lau, Allan H. K. Yuen & Jae Park - 2013 - Ethics and Behavior 23 (5):360-377.
    Plagiarism by students is a common and worldwide phenomenon with a significant impact on our society. Numerous studies on the pervasive nature of plagiarism among students have focused on the behavioral aspects of plagiarism and how to prevent it. Based on an empirical study of a sample of 463 eighth graders in Hong Kong, this article offers an analytical model to understand the ethical decision-making process in plagiarism among students. Using this model, students' plagiaristic behavior can be analyzed in terms (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  • The Effect of Organization-Based Self-Esteem and Deindividuation in Protecting Personal Information Privacy.Meng-Hsiang Hsu & Feng-Yang Kuo - 2003 - Journal of Business Ethics 42 (4):305 - 320.
    In this research we apply the Theory of Planned Behavior (TPB) to study decisions related to information privacy protection. A TPB-based model was proposed to investigate whether organization-based self-esteem and perceived deindividuation can be employed to measure the strength of the perceived behavioral control construct. In addition, we examined if the addition of a causal path linking subjective norms to attitudes and another causal path linking organization-based self-esteem to subjective norms enhanced our research model's predicting power. Our study shows that (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  • The grey and dark facets of online activities: a study of consumer perceptions.Meenakshi Handa & Parul Ahuja - 2022 - Journal of Information, Communication and Ethics in Society 20 (4):495-515.
    Purpose The internet has provided a gamut of benefits to consumers. The digital world, however, also provides space for various illegal or unethical consumer activities. Consumers may not always be fully aware of the unethical or illegal nature of some of the online activities that they engage in. This study aims to examine the questionable side of online consumer behaviour in an emerging market where internet penetration and smart phone accessibility is rapidly expanding. Using a third-person technique, this study attempts (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Exploring Cognitive Moral Logics Using Grounded Theory: The Case of Software Piracy.Kanika Tandon Bhal & Nivedita D. Leekha - 2008 - Journal of Business Ethics 81 (3):635-646.
    The article reports findings of a study conducted to explore the cognitive moral logics used for considering software piracy as ethical or unethical. Since the objective was to elicit the moral logics from the respondents, semi-structured in-depth interviews of 38 software professionals of India were conducted. The content of the interviews was analyzed using the grounded theory framework which does not begin with constructs and their interlinkages and then seek proof instead it begins with an area of study and allows (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • The impact of ethics code familiarity on manager behavior.Thomas R. Wotruba, Lawrence B. Chonko & Terry W. Loe - 2000 - Journal of Business Ethics 33 (1):59 - 69.
    Codes of ethics exist in many, if not the majority, of all large U.S. companies today. But how the impact of these written codes affect managerial attitudes and behavior is still not clearly documented or explained. This study takes a step in that direction by proposing that attention should shift from the codes themselves as the sources of ethical behavior to the persons whose behavior is the focus of these codes. In particular, this study investigates the role of code familiarity (...)
    Download  
     
    Export citation  
     
    Bookmark   54 citations  
  • Neutralization theory and online software piracy: An empirical analysis. [REVIEW]Sameer Hinduja - 2007 - Ethics and Information Technology 9 (3):187-204.
    Accompanying the explosive growth of information technology is the increasing frequency of antisocial and criminal behavior on the Internet. Online software piracy is one such behavior, and this study approaches the phenomenon through the theoretical framework of neutralization theory. The suitability and applicability of nine techniques of neutralization in determining the act is tested via logistic regression analyses on cross-sectional data collected from a sample of university students in the United States. Generally speaking, neutralization was found to be weakly related (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  • A Multifocal and Integrative View of the Influencers of Ethical Attitudes Using Qualitative Configurational Analysis.Nicole A. Celestine, Catherine Leighton & Chris Perryer - 2020 - Journal of Business Ethics 162 (1):103-122.
    Ethical attitudes and behaviour are complex. This complexity extends to the influencers operating at different levels both outside and within the organisation, and in different combinations for different individuals. There is hence a growing need to understand the proximal and distal influencers of ethical attitudes, and how these operate in concert at the individual, organisational, and societal levels. Few studies have attempted to combine these main research streams and systematically examine their combined impact. The minority of studies that have taken (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • Unauthorized copying of software: an empirical study of reasons for and against.Mikko T. Siponen & Tero Vartiainen - 2007 - Acm Sigcas Computers and Society 37 (1):30-43.
    Computer users copy computer software - this is well-known. However, less well-known are the reasons why some computer users choose to make unauthorized copies of computer software. Furthermore, the relationship linking the theory and the practice is unknown, i.e., how the attitudes of ordinary end-users correspond with the theoretical views of computer ethics scholars. In order to fill this gap in the literature, we investigated the moral attitudes of 249 Finnish computing students towards the unauthorized copying of computer software, and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Sharing personal genetic information: the impact of privacy concern and awareness of benefit.Don Heath, Ali Ardestani & Hamid Nemati - 2016 - Journal of Information, Communication and Ethics in Society 14 (3):288-308.
    Purpose Human genomic research demands very large pools of data to generate meaningful inference. Yet, the sharing of one’s genetic data for research is a voluntary act. The collection of data sufficient to fuel rapid advancement is contingent on individuals’ willingness to share. Privacy risks associated with sharing this unique and intensely personal data are significant. Genetic data are an unambiguous identifier. Public linkage of donor to their genetic data could reveal predisposition to diseases, behaviors, paternity, heredity, intelligence, etc. The (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Ethical Decisions About Sharing Music Files in the P2P Environment.Rong-An Shang, Yu-Chen Chen & Pin-Cheng Chen - 2008 - Journal of Business Ethics 80 (2):349-365.
    Digitized information and network have made an enormous impact on the music and movie industries. Internet piracy is popular and has greatly threatened the companies in these industries. This study tests Hunt-Vitell’s ethical decision model and attempts to understand why and how people share unauthorized music files with others in the peer-to-peer (P2P) network. The norm of anti-piracy, the ideology of free software, the norm of reciprocity, and the ideology of consumer rights are proposed as four deontological norms related to (...)
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
  • The Effects of Environmental Factors on the Behavior of Chinese Managers in the Information Age in China.Wing S. Chow, Jane P. Wu & Allan K. K. Chan - 2009 - Journal of Business Ethics 89 (4):629-639.
    This paper examines the effects of environmental factors on the ethical behavior of managers using computers at work in Mainland China. In this study, environmental factors refer to senior management, peer groups, company policies, professional practices, and legal considerations. Ethical behaviors include attitudes to disclosure, protection of privacy, conflict of interest, personal conduct, social responsibility, and integrity. A questionnaire survey was used for data collection, and 125 mainland Chinese managers participated in the study. The results show that peer groups, professional (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Predictors of Usage Intentions of Pirated Software.Ian Phau & James Ng - 2010 - Journal of Business Ethics 94 (1):23-37.
    The purpose of this study is to investigate the salient factors influencing consumers’ attitudes and usage intentions towards pirated software. Using the Theory of Planned Behaviour, this study investigates the relationships between three sets of factors, i.e. personal, social and perceived behavioural control onto attitudes towards pirated software. Through a multiple regression, only personal factors have shown significant relationship with attitudes towards software piracy. Further results from this study have supported that favourable attitudes towards pirated software is likely to result (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  • Softlifting: Exploring Determinants of Attitude.Tim Goles, Bandula Jayatilaka, Beena George, Linda Parsons, Valrie Chambers, David Taylor & Rebecca Brune - 2008 - Journal of Business Ethics 77 (4):481-499.
    Softlifting, or the illegal duplication of copyrighted software by individuals for personal use, is a serious and costly problem for software developers and distributors. Understanding the factors that determine attitude toward softlifting is important in order to ascertain what motivates individuals to engage in the behavior. We examine a number of factors, including personal moral obligation (PMO), perceived usefulness, and awareness of the laws and regulations governing software acquisition and use, along with facets of personal self-identity that may play a (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  • Do Cultural and Generational Cohorts Matter to Ideologies and Consumer Ethics? A Comparative Study of Australians, Indonesians, and Indonesian Migrants in Australia.Andre A. Pekerti & Denni Arli - 2017 - Journal of Business Ethics 143 (2):387-404.
    We explore the notion that culture influences people’s values, and their subsequent ideologies and ethical behaviors. We present the idea that culture itself changes with time, and explore the influence of culture and generational markers on consumer ethics by examining differences in these ethical dimensions between Australians, Indonesians, and Indonesian Migrants in Australia, as well as differences between Generation X versus Generations Y and Z. The present study addresses the need to investigate the role that culture plays in consumer ethics, (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  • What Motivates Software Crackers?Sigi Goode & Sam Cruise - 2006 - Journal of Business Ethics 65 (2):173-201.
    Software piracy is a serious problem in the software industry. Software authors and publishing companies lose revenue when pirated software rather than legally purchased software is used. Policy developers are forced to invest time and money into restricting software piracy. Much of the published research literature focuses on software piracy by end-users. However, end-users are only able to copy software once the copy protection has been removed by a ‘cracker’. This research aims to explore why, if copy protection is so (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • The Effect of Interpersonal Influence on Softlifting Intention and Behaviour.Jih-Hsin Tang & Cheng-Kiang Farn - 2005 - Journal of Business Ethics 56 (2):149-161.
    The purpose of this study is to investigate the effect of interpersonal influence on personal software piracy, also known as softlifting. A laboratory experiment with 54 subjects was conducted, in which each subject was told to participate in a software quality evaluation exercise. However, a ploy was carried out to measure the subjects intention in software piracy under different levels of group pressure and financial gains. The results are interesting. On the intention of softlifting, both group pressure and financial gains (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  • Exploring Factors Affecting Digital Piracy Using the Norm Activation and UTAUT Models: The Role of National Culture.Godwin Udo, Kallol Bagchi & Moutusy Maity - 2016 - Journal of Business Ethics 135 (3):517-541.
    We develop and use an integrated individual-level model to explain the driving forces behind digital piracy practice in two nations. The proposed model combines the Norm Activation model and Unified Theory of Acceptance and Use of Technology models. This study also explores the effect of culture on intention to practice DP in two nations: US and India. A survey instrument was used to collect data from 231 US and 331 Indian participants. Use of the integrated model proves to be a (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  • Counterfeit Luxuries: Does Moral Reasoning Strategy Influence Consumers’ Pursuit of Counterfeits?Jie Chen, Lefa Teng & Yonghai Liao - 2018 - Journal of Business Ethics 151 (1):249-264.
    Morality, in the context of luxury counterfeit goods, has been widely discussed in existing literature as having a strong association with decreased purchase intention. However, drawing on moral disengagement theory, we argue that individuals are motivated to justify their immoral behaviors through guilt avoidance, thus increasing counterfeit purchase intention. This research demonstrates that consumers’ desire to purchase counterfeit luxuries hinges on two types of moral reasoning strategies: moral rationalization and moral decoupling. The empirical results show that each strategy increases purchase (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  • Comparing software piracy in South Africa and Zambia using social cognitive theory.Andrew Thatcher & Mary Matthews - 2012 - African Journal of Business Ethics 6 (1):1.
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • Investigating Software Piracy in Jordan: An Extension of the Theory of Reasoned Action. [REVIEW]Hassan Aleassa, John Michael Pearson & Scott McClurg - 2011 - Journal of Business Ethics 98 (4):663-676.
    Software piracy, the illegal and unauthorized duplication, sale, or distribution of software, is a widespread and costly phenomenon. According to Business Software Alliance, over 41% of the PC software packages installed worldwide were unauthorized copies. Software piracy behavior has been investigated for more than 30 years. However, after a review of the relevant literature, there appears to be two voids in this literature: a lack of studies in non-Western countries and a scarcity of process studies. This study contributes to literature (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  • Shaping of moral intensity regarding software piracy: A comparison between thailand and U.s. Students. [REVIEW]Ranjan B. Kini, H. V. Ramakrishna & B. S. Vijayaraman - 2004 - Journal of Business Ethics 49 (1):91-104.
    Software piracy is a major global concern forbusinesses that generate their revenues throughsoftware products. Moral intensity regardingsoftware piracy has been argued to be relatedto the extent of software piracy. Anunderstanding of the development of moralintensity regarding software piracy inindividuals would aid businesses in developingand implementing policies that may help themreduce software piracy. In this research westudied the similarities and differences indevelopment of moral intensity regardingsoftware piracy among university students intwo different cultures, the U.S. and Thailand. In particular, we studied the (...)
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  • One Sail Fits All? A Psychographic Segmentation of Digital Pirates.Charlotte Emily De Corte & Patrick Van Kenhove - 2017 - Journal of Business Ethics 143 (3):441-465.
    This paper focuses on segmenting digital movie and TV series pirates and on investigating the effectiveness of piracy-combatting measures i.e., legal and educational strategies, in light of these segments. To address these research objectives, two online studies were conducted. First, 1277 valid responses were gathered with an online survey. Four pirate segments were found based on differing combinations of attitude toward piracy, ethical evaluation of piracy and feelings of guilt. The anti-pirate, conflicted pirate, cavalier pirate, and die-hard pirate can be (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • Factors that Influence the Intention to Pirate Software and Media.Timothy Paul Cronan & Sulaiman Al-Rafee - 2008 - Journal of Business Ethics 78 (4):527-545.
    This study focuses on one of the newer forms of software piracy, known as digital piracy, and uses the Theory of Planned Behavior (TPB) as a framework to attempt to determine factors that influence digital piracy (the illegal copying/downloading of copyrighted software and media files). This study examines factors, which could determine an individual’s intention to pirate digital material (software, media, etc.). Past piracy behavior and moral obligation, in addition to the prevailing theories of behavior (Theory of Planned Behavior), were (...)
    Download  
     
    Export citation  
     
    Bookmark   35 citations  
  • Theory of Planned Behavior and Ethics Theory in Digital Piracy: An Integrated Model. [REVIEW]Cheolho Yoon - 2011 - Journal of Business Ethics 100 (3):405 - 417.
    Since digital piracy has posed a significant threat to the development of the software industry and the growth of the digital media industry, it has, for the last decade, held considerable interest for researchers and practitioners. This article will propose an integrated model that combines the theory of planned behavior (TPB) and ethics theory, the two theories that are most often used in digital piracy studies. Data were obtained from university students in China, and the model was examined using the (...)
    Download  
     
    Export citation  
     
    Bookmark   20 citations  
  • Exploring antecedents of attitude and intention toward Internet piracy among college students in South Korea.Hyoungkoo Khang, Eyun-Jung Ki, In-Kon Park & Seon-Gi Baek - 2012 - Asian Journal of Business Ethics 1 (2):177 - 194.
    Abstracts This study aims to examine the predictors of attitude and intentions toward Internet piracy in South Korea. Also, it intends to suggest a model of Internet piracy demonstrating the casual effects of factors of individual attitude and intentions toward Internet piracy. The results demonstrated that moral obligations and subjective norms are significant predictors of an individual’s attitude toward Internet piracy. Moreover, three factors—moral obligation, perceived behavioral control, and attitude—are essential antecedents of an individual’s intention to engage in Internet piracy. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Enjoying music and movies without paying: examining factors affecting unauthorized downloading amongst young adults.Meenakshi Handa, Parul Ahuja & Swati Jain - 2022 - Journal of Information, Communication and Ethics in Society 20 (4):568-586.
    Purpose Along with their immense benefit, online channels of communication and information-sharing also present a myriad set of challenges. The unauthorized downloading and sharing of copyrighted content such as music and movies is one such issue. This study aims to examine the factors related to the unauthorized downloading of content amongst young internet users in an emerging market. Design/methodology/approach An online structured questionnaire was used to collect primary data from 219 internet users between 17 and 24 years of age. The (...)
    Download  
     
    Export citation  
     
    Bookmark