Professional Documents
Culture Documents
Predicting consumer digital piracy behavior: The role of rationalization and perceived
consequences
Irena Vida Mateja Kos Kokli# Monika Kukar-Kinney Elfriede Penz
Article information:
Access to this document was granted through an Emerald subscription provided by emerald-srm:546149 []
For Authors
If you would like to write for this, or any other Emerald publication, then please use our Emerald for
Authors service information about how to choose which publication to write for and submission guidelines
are available for all. Please visit www.emeraldinsight.com/authors for more information.
The current issue and full text archive of this journal is available at
www.emeraldinsight.com/2040-7122.htm
JRIM
6,4
298
Received 15 February 2012
Revised 7 May 2012,
18 June 2012
Accepted 6 July 2012
Predicting consumer
digital piracy behavior
The role of rationalization and perceived
consequences
Irena Vida and Mateja Kos Koklic
Marketing Department, University of Ljubljana, Ljubljana, Slovenia
Monika Kukar-Kinney
Elfriede Penz
International Marketing Management, Wirtschaftsuniversitat Wien,
Vienna, Austria
Abstract
Purpose The purpose of this paper is to investigate consumer perceptions of personal risk and benefits
of digital piracy behavior as determinants of ones justification for such behavior and the consequent future
piracy intention. Temporal effects of rationalization in shaping future piracy intent are also addressed.
Design/methodology/approach A conceptual model was developed using counterfeiting and
piracy literature. Data were gathered via mail and online survey of adults in five European Union
countries. The model was tested on pooled sample using confirmatory factor analysis and structural
equation modeling.
Findings Rationalization mediates the relationship between perceived benefits and piracy
intention, but not between perceived risk and intention. Both perceived risk and benefits affect piracy
intent, with risk reducing it and benefits increasing it. Rationalization of past behavior increases future
digital piracy intent.
Research limitations/implications Risk measure was limited to technical problems, thus future
studies should examine a wider scope of risk dimensions. The cross-sectional design of the study also
creates some limitations. A longitudinal methodology could provide a better insight into sequencing of
rationalization.
Social implications Marketing communications should increase public awareness of risks and
reduce perceived piracy benefits to reduce future piracy intent. Public persuasion activities should
counter the arguments consumers use to rationalize their piracy behavior.
Originality/value This research fills in a void in knowledge on how expected consequences drive
rationalization techniques, particularly with respect to future piracy intent. A realistic data set drawn
from adult population in five countries is used, enhancing external validity.
Data collection for this study was supported by the Commission of European Community,
contract no. 217514 (EU 7th Framework Programme). Authors gratefully acknowledge
contributions of research partners from all countries participating in this research project.
1. Introduction
With rapid advances in technology and the increasing global availability and
accessibility of digital channels for information/media distribution, illicit behavior
regarding digital goods continues to perplex practitioners and researchers alike. Digital
piracy represents a growing threat to the welfare of both producers and consumers
(Phau and Ng, 2010; Sinha et al., 2010). While the exact loss for the supply side remains
inconclusive, industry antipiracy group BASCAP (2011) estimated the income loss to
range from $30 to $75 billion in digitally pirated music, movies and software industries
alone, rising up to $240 billion by 2015. Some researchers question these estimates,
seeking a more balanced approach by identifying both positive and negative effects for
the producers (Bhattacharjee et al., 2006; Mattelart, 2009). Similarly, mixed effects have
been recognized for the consumers as stakeholders taking part in digital piracy: both
gains or benefits (such as price benefits) and losses or risks (such as a threat of computer
virus) (Hennig-Thurau et al., 2007; Phau and Ng, 2010; Sirkeci and Magnusdottir, 2011).
Undeniably, industries, policy makers and consumers are faced with the challenging
environment and omnipotent institutional regime of existing digital copyright
management. Current efforts aimed at curtailing digital piracy have left various
stakeholders disgruntled due to either financial losses or by impinging on ideology of
consumer rights, free access and creativity expression (Goles et al., 2008; Mattelart,
2009). Given the interdisciplinary nature of the problem, researchers in the areas of
marketing, ethics, computer systems and criminology examined both the supply and the
demand sides of the issue. Yet, several voids remain in the literature before adequate
solutions can be identified.
This study offers empirical insights into factors underlying consumer illicit
behavior in the context of downloading, sharing and using digital products (e.g. music,
software, movie files) across five European Union (EU) countries. We aim to examine
consumer perceptions of expected personal consequences (e.g. perceived risk and
benefits) as drivers of an individuals justifications for illicit behavior regarding digital
goods and behavioral intention to engage in such activities. Moreover, by applying
neutralization theory, we investigate the temporal effects of rationalization behavior in
shaping future piracy intent. When knowingly engaging in ethically questionable
behaviors, individuals tend to resort to rationalization, a common method of reducing
negative feelings by offering justification of their fraud, while still believing in their
ethical values (Dacin and Murphy, 2011).
The contribution of this study is threefold. First, we provide a balanced view by
examining both expected gains and losses associated with digital piracy intent and
rationalization of past piracy behavior. While previous studies acknowledged that
expected consequences of the action may affect an individuals choice of behavior (Yoon,
2011), far less attention has been focused on ways in which such perceptions drive
rationalization techniques and thought processes behind digital piracy (McGregor,
2008). Insights into the drivers of rationalization, i.e. perceived risks and benefits, have
important implications for antipiracy communication campaigns, particularly due to the
low efficacy of existing appeals focusing mostly on adverse effects, such as emphasizing
guilt appeals (Lysonski and Durvasula, 2008; Zamoon and Curley, 2008). Second, we test
our conceptual model in a cross-national context using five EU countries. While
this region is one of the largest free-trade areas in the world, most existing piracy
research to date has been limited to the US and Asia (Aleassa et al., 2011; Eisend and
Consumer digital
piracy behavior
299
JRIM
6,4
300
Schuchert-Gueler, 2006). Third, we use realistic data sets drawn from adult computer
users across the five countries in the EU using multiple methods of data collection.
Previous empirical studies of the demand-side of piracy tend to rely on student samples
rather than general public. This threatens generalizability as the illicit digital behavior is
by no means limited to university settings (Williams et al., 2010; Yoon, 2011).
The paper is structured as follows. First, we briefly review the existing literature on
digital piracy. Then, we develop a conceptual framework which serves as the basis for
the construction of the hypotheses. Next, we report on the measures used, the data
collection methodology and the analytical procedures. Finally, we present the findings
of the study and discuss their implications and future research avenues.
2. Conceptual model and hypotheses
Researchers delving into the demand-side of digital piracy have utilized different
methodological approaches and applied various theoretical frameworks to explain
unauthorized consumer activities on the internet. While this is not surprising given
the interdisciplinary nature of the problem (e.g. business ethics, marketing and
information systems), research community has yet to establish consistent theoretical
frameworks to guide empirical efforts on digital piracy (Eisend and Schuchert-Gueler,
2006; Williams et al., 2010). The two most prominent theoretical approaches to
studying illicit digital behavior have been the expectancy-value theories (e.g. the theory
of reasoned action), and the theories of ethical decision making (e.g. Hunt and Vitells
model of ethical decision making). Both of these are established on the fundamental
premise that individuals intentions are mostly consistent with the underlying
attitudes (Chatzidakis et al., 2007).
However, consumers attitudes do not always translate into purchase intentions and
consequently behavior. For example, even though unauthorized downloading of digital
products is treated as an illegal activity in most countries, many computer users,
particularly among the youth and in the university settings, exhibit lenience and
acceptance of such activities (Harris and Dumas, 2009; Hinduja, 2007; Kini et al., 2003).
An illustration is provided by a software piracy study among computer science
students, which found that while future information system professionals recognize the
consequences of such behavior for the industry and others, and even admit to its
immoral character, such cognizance does not discourage them from illicit computer
behaviors (Konstantakis et al., 2010). An explanatory framework for this discrepancy
can be found in the neutralization theory, which explains individuals attempts to
minimize the negative feelings related to their norm-violating behavior based upon their
self-concept and the perceptions by others (Grove and Vitell 1989; Shields and Whitehall,
1994). In their seminal work, Skyes and Matza (1957) developed five neutralization
techniques: denial of responsibility (its not my fault), denial of injury (no harm
resulted from my actions), denial of victim (nobody got hurt), condemning the
condemners (how dare they judge me when they are just as corrupt or hypocritical) and
appeal to higher loyalties (there is a greater cause).
Neutralization theorists suggest individuals may employ these techniques both
before committing fraud, in order to avoid the negative affect (i.e. feelings of guilt or
shame), or after committing fraud, in order to reduce or neutralize the negative affect.
This means that neutralization occurs as an after-the-fact rationalization that may
create conditions for future behavior (Harris and Dumas, 2009; Higgins et al., 2008).
Consumer digital
piracy behavior
301
H3
H1
Rationalization
H5
Piracy
intention
H4
H2
Perceived
benefits
Figure 1.
Conceptual model
JRIM
6,4
302
H4. The greater the perceived benefits of digital piracy for consumers, the greater
the consumers future piracy intent.
Consumer digital
piracy behavior
303
JRIM
6,4
304
with the lowest mean in the Slovene subsample (32.5 years), and the highest mean in the
Italian subsample (39.6 years) (Austria 33.8, UK 37.7, Sweden 38.2). The majority of the
respondents attained at least university education (43.6 percent), similar but slightly
lower proportion completed college (41.7 percent), and less than 15 percent completed
primary or vocational school. Country-wise, the highest proportion of respondents with
this education was in Italy (23.2 percent of the Italian subsample) and the lowest in
Austria (3.7 percent) (Sweden 16.6, UK 21.2, Slovenia 8.0). The proportion of
college-educated respondents ranged from 57.4 percent in Slovenia, 51.5 percent in Italy,
38.9 percent in Sweden, 38 percent in the UK, to 20 percent in Austria. The Austrian
subsample consisted of the highest share of people with university degree or more
(76.3 percent), followed by the Swedish (44.5 percent), the UK (40.8 percent), the Slovene
(34.5 percent), and the Italian subsample (25.3 percent).
All construct measures were either directly taken or adapted from existing literature.
The perceived technical risk associated with digital piracy or the potential technical
damage to the consumers computer was measured with six items, adapted from
Hennig-Thurau et al. (2007). The perceived benefits of digital piracy behavior were
measured with five statements, tapping into various specific benefits, such as collection
and technical benefits (Hennig-Thurau et al., 2007). Five statements, adapted from Skyes
and Matzas five neutralization techniques (1957), measured the consumers
rationalization of their past piracy behavior. To measure the future digital piracy
intention, two items from Taylor and Todd (1995) research were used. All measures,
individual statements used, standardized factor loadings from the confirmatory factor
analysis, and construct reliabilities are reported in Table I.
Measures used in this study were carefully adapted to the different linguistic and
cultural contexts with the additional testing of reliability. As per guidelines for conducting
cross-national consumer research (Craig and Douglas, 2000; de Jong et al., 2009),
the process of developing the survey instrument and modifying the scale items included:
.
elimination of items with limited conceptual equivalence;
.
ensuring the translation is decentered from a literal language translation; and
.
careful pretesting of the research instrument on a convenience sample of relevant
individuals in each country, along with the subsequent modification of
individual items in our measures.
4. Analysis and findings
Even though our goal was not focused on comparing different countries within the EU,
we assessed invariance of measures across the countries included in our sample. First,
we evaluated configural invariance of measures to see whether the same pattern of
zero and non-zero factor loadings exists in different countries (Horn et al., 1983). Using
confirmatory factor analysis, all salient factor loadings were substantially and
significantly different from zero and the factor inter-correlations were significantly
below unity in all five counties. Thus, the measures achieved the configural invariance.
Next, we assessed metric invariance or the requirement of equal metrics or scales
(Rock et al., 1978). Metric invariance allows a meaningful comparison of ratings or
difference scores across countries, with these differences indicative of similar
cross-national difference in the underlying construct (Steenkamp and Baumgartner,
1998). To test for metric invariance, we constrained all factor loadings to be the same
Reliabilities
(Cronbach a)
Consumer digital
piracy behavior
0.89
0.57
0.60
305
0.76
0.91
0.89
0.82
0.82
0.71
0.61
0.77
0.71
0.69
0.76
0.56
0.73
0.61
0.64
0.58
0.88
0.89
0.90
across the five countries. The full metric invariance model fit the data as well as the
configural model and achieved even a slight decrease in the value of x 2 per degree of
freedom. Therefore, the measures exhibited cross-national metric invariance. Next,
we proceeded with evaluation of the pooled sample.
To assess the adequacy of measures in the pooled sample, confirmatory factor
analysis in AMOS was conducted. As the x 2-statistic is sample size dependent, other fit
indices better serve as indicators of the model fit (Bagozzi and Yi, 1988). The fit of the
confirmatory factor model with the data was good (x 2 790 df 129; NFI 0.93;
IFI 0.94; CFI 0.94; RMSEA 0.065). All construct reliabilities exceeded the
recommended 0.70 (Table I). Discriminant validity was checked by constraining the
covariance in any set of two constructs (Anderson and Gerbing, 1988) and then
performing a x 2 difference test on the values obtained for the constrained and
unconstrained models. Since the unconstrained models had significantly lower x 2 values,
Table I.
Constructs, construct
items, reliabilities and
standardized factor
loadings
JRIM
6,4
306
it can be concluded that the measures exhibit acceptable discriminant validity. Next, the
conceptual model was tested using structural equation modeling in AMOS. Structural
model provided a good fit with the data (x 2(df) 790 (129); NFI 0.93; IFI 0.94;
CFI 0.94; RMSEA 0.065). Individual hypotheses test statistics and results are
displayed in Table II and are discussed next. Because the hypotheses were directional,
one-sided hypotheses tests were employed.
H1 predicted that the perceived technical risk of digital piracy will be negatively
associated with the consumers rationalization of their past piracy behavior. The
findings do not provide support for this hypothesis, as the standardized regression
coefficient of the proposed structural path was not significantly different from zero
(b 0.05, t 1.58, p 0.11). H1 is thus rejected. H2 proposed that the perceived
benefits of digital piracy will be positively related with the consumers rationalization of
piracy behavior. According to the analysis, as perceptions of benefits of piracy increased,
so did the rationalization for the behavior (b 0.778, t 14.88, p 0.000), providing
support for H2. In addition to predicting an indirect effect of perceived technical risk and
perceived benefits through rationalization, we anticipated that both the perceived
technical risk and the perceived benefits will also directly influence consumers future
piracy intent (H3 and H4). The findings show that, as the perceived technical risk
increased, the consumers intent to digitally pirate decreased (b 2 0.13, t 2 5.14,
p 0.000), supporting H3. In addition, as the perceived benefits increased, so did the
intent to digitally pirate in the future (b 0.41, t 7.71, p 0.000), supporting H4.
Lastly, we predicted that the extent of consumers rationalization for their past piracy
will be positively associated with their future piracy intent. Indeed, as the extent of
rationalization increased, so did the respondents future piracy intent (b 0.38, t 6.92,
p 0.000). Thus, H5 is also supported. Based on the squared correlations in the final
model, approximately 59 percent of variance in rationalization can be explained by
perceived benefits and perceived technical risk, and 61 percent of variance in piracy
intention by perceived benefits, perceived technical risk, and rationalization.
5. Discussion of findings
In developing and empirically evaluating our conceptual model, we first investigated
determinants of consumers use of rationalization for past piracy behavior
Hypothesis:
direction
H1.: 2
H2.:
H3.: 2
H4.:
H5.:
Table II.
Testing the
conceptual model
Std. regr.
coefficient
Structural path
Perceived
risk ! rationalization
Perceived
benefits ! rationalization
Perceived risk ! piracy
intention
Perceived
benefits ! piracy intention
Rationalization ! piracy
intention
(129);
NFI 0.93;
t-statistics
p-value
Hypothesis
outcome
0.05
1.58
0.11
Rejected
0.78
14.88
0.000
Supported
20.13
2 5.14
0.000
Supported
0.41
7.71
0.000
Supported
0.38
6.92
0.000
Supported
IFI 0.94;
CFI 0.94;
RMSEA 0.065;
(i.e. perceived technical risk and perceived benefits), and second, the antecedents of
consumers future piracy intent (i.e. perceived technical risk, perceived benefits and
rationalization of past piracy behavior). All proposed hypotheses were supported with
an exception of the effect of perceived technical risk of digital piracy on consumers
rationalization of their past piracy behavior (H1). We anticipated a negative
association between the two constructs, but the effect was not significant. Similarly,
although in a somewhat different context of ethical consumption, Sander (2010) failed
to provide empirical evidence for a significant impact of negatively framed information
(such as perceived risk) on the use of neutralization techniques, and used sensitivity of
the topic as a possible explanation. This reasoning may also be applicable to our study.
In addition, given the focus of the perceived risk measure on technical damage
associated with digital piracy, another plausible explanation is that other types of
risks, such as those tapping into the ethics or morality (e.g. prosecution risk), may more
prominently shape the use of rationalization techniques. Research on attitudes and
behaviors finds similar gaps and suggests that the specificity of measures might
interfere with the predictability of behavior. In addition, perceived technical risk and
rationalization of past behavior may not be cognitively related. Perceived technical
problems might be salient when actually performing the behavior, while rationalizing
ones past behavior focuses on the positive effects and the risk is not relevant anymore.
This points towards a distinction between performing a behavior (e.g. using a service,
such as downloading files), where certain risks occur, and evaluating ones own
behavior retrospectively, where the benefits of the behavior are more salient.
This explanation seems likely, particularly in the light of support found for H2.
With respect to expected positive consequences of digital piracy, we find that
perceived benefits have a significant and relatively large effect on the consumers
rationalization for their piracy behavior (H2). Although we do not explicitly address
the mechanisms of this impact, we suggest that the more benefits consumers expect
from illegally downloading files, the less they adhere to their norms. Instead, in order to
reap those benefits, consumers resort to rationalization techniques, thus providing
excuses for their behavior.
All three hypotheses regarding the antecedents of an individuals intention to engage
in future digital piracy (H3, H4, and H5) were empirically supported. Specifically,
perceived technical risk, perceived benefits and rationalization proved to be significant
predictors of consumers intention to illegally download files in the future. Although
previous results with respect to the relationship between risk and intention are
somewhat equivocal (Sinha and Mandel, 2008), our research findings are unambiguous,
indicating an inverse relationship between perceived technical risk and consumers
intention to engage in digital piracy (H3). This is consistent with several other empirical
studies (Hennig-Thurau et al., 2007; Lysonski and Durvasula, 2008; Yoon, 2011).
The results of our study further support the positive effect of perceived benefits on
digital piracy intention (H4). This corresponds to Hunt and Vitells (1986) contention
that an individual veers toward a certain type of behavior directly because of certain
preferred consequences. The third significant predictor of consumers intention to
illegally download files identified in this study is consumers use of rationalization for
past piracy behavior (H5), corroborating existing research findings (Ingram and
Hinduja, 2008; Morris and Higgins, 2009). This finding can be also explained by the
effect of past behavior on future behavior intentions. The more positive one perceives
Consumer digital
piracy behavior
307
JRIM
6,4
308
his/her own behavior to be (through rationalizing it and thus making it more positive),
the more confident the person might be to perform the same behavior in the future.
An interesting finding, although not the primary objective of this study, is the
relative importance of the three determinants of future piracy intention. Our results
suggest that the strongest driver of ones piracy intent is his/her perception of benefits,
closely followed by the use of rationalization techniques. Perception of technical risk is
the weakest predictor of behavioral piracy intention. It appears that the negative
factors (risks) and positive drivers (benefits) have a different role in affecting future
behavior. Perceived benefits seem to strengthen the piracy intent, while the risks might
reduce the magnitude of the behavior, but not fully eliminate the intention to actually
perform the behavior.
These empirical findings add to the limited body of knowledge pertaining to
neutralization and rationalization techniques previously rather neglected in
customer-focused studies (Harris and Dumas, 2009). Although the study was
cross-sectional and the measures of intention were gathered concurrently with
rationalization, the study provides evidence that rationalization occurs after piracy
behavior takes place, which potentially enhances continuity in future behavior.
6. Implications, limitations and future research
The present research offers useful implications for marketing communications and
public policy strategies as well as for academic research. Digital piracy importantly
affects various stakeholders, including recorded music, movie and software
industries, distributors and consumers. So far, the efforts to curtail this practice
included mostly promoting public awareness through consumer education and
protecting intellectual property rights through legal threats and actions against
individuals and operators of networks facilitating digital piracy activities. However,
such deterrent strategies tend to be ineffective (Bhattacharjee et al., 2006; Sinha and
Mandel, 2008).
Instead, emphasizing preventive strategies is more strongly encouraged (Gopal et al.,
2004; Sinha and Mandel, 2008). Our findings provide a roadmap to guide marketers
and policy makers in meeting the challenge of digital piracy by focusing attention on
three areas to directly impinge on individuals piracy intent: perceptions of specific
benefits from downloading, consumers perceptions of technical risk, and justifications
for their past actions. In more practical terms, this means first, perceived benefits
should be lessened. Second, perceived technical risks should be emphasized and, third,
the acceptance and the impact of rationalization arguments need to be weakened so
that they do not serve as a way out anymore. Hence, marketing communications
centering on public awareness of personal consequences of digital piracy should be
effective in deterring future piracy intention. Such strategies could include using the
social context of consumers rather than communication by institutions, governments
or firms for communicating risks rather than benefits of piracy. For instance, in online
forum discussions, the perception of technical risks could be attenuated instead of
overemphasizing the benefits of piracy. Marketers role in this context could be to turn
attention to consumers benefits of legally obtaining products rather than using pirated
alternatives in their communication and product policy. Social media and discussion
forums could be used to understand the influence of the social environment on
consumers perception of risk and benefit, which helps in framing marketing messages.
In the general public, the image of piracy as heroic acts needs to be transferred into
a perception of piracy as less acceptable behavior (e.g. by stressing the loss for
independent artists rather than stressing losses for big corporations). Our findings
reveal that perceived benefits have the strongest impact on both rationalization and
piracy intent. If illegal downloading provides fewer benefits than legal downloading,
then perceptions of risks might prevail, consequently reducing rationalization and
future piracy intent. For instance, these could include beliefs that legal options are
equally inexpensive and meet consumers needs at a convenient time, or that illegal
sources are difficult to find and do not offer a full range of options.
Rationalization can be seen as a cognitive mechanism which prevails if internal
standards and norms are less strongly reviewed by individuals. In other words, to
overcome the obligation to behave according to (learned) norms and standards,
individuals use commonly accepted arguments that are, for instance, brought forward
in informal communication among peers and are used in the mass media as well
(piracy is a peccadillo). Rationalization seems to be an effective way of achieving
distance to internal standards and could help in establishing a certain state of balance
between internal norms and standards and ones behavior even if or because the
behavior violates existing norms. As long as rationalization arguments are personally
and socially accepted, individuals will use them for norm-violating behavior. A way to
reduce their effectiveness is to make arguments more difficult to accept, i.e. providing
counterarguments to rationalization arguments, or more difficult to build new ones.
For public policy makers, the results of this study can facilitate an understanding that
how individuals review their past behavior impacts their future intent. This could
mean that the review process (rationalization) could be controlled by educational and
consumer protection-related efforts. In other words, challenging the publicly accepted
arguments of piracy as peccadillo through projects in which key actors present
multiple views and consequences of piracy could be a way to counter the issue.
Based on the knowledge of how consumers use rationalization/neutralization
techniques to justify digital piracy, marketing communications and persuasion
activities can be designed to counter the arguments that consumers use. Nonetheless,
designing these activities requires some caution, as it is also possible that instead of
adapting their behavior by reducing and/or eliminating piracy behaviors consumers
might invent new neutralizing beliefs (Minor, 1981).
In summary, this study provides three target constructs, i.e. benefits, risk, and
rationalization, on which to focus in the development of preventive-based appeals of
persuasion (e.g. intentions, attitudes). From an academic perspective, our findings reveal
the importance of perceived benefit as antecedent for rationalization strategies and
subsequently its impact on future piracy intent. It shows also that perceived technical
risk is less influential on cognitive processes, but has a negative influence on future
piracy intent. This extends previous research on predictors for piracy intent and behavior
in that perceived gains rather than losses drive rationalization of past piracy behavior.
The findings and contributions of this study are constrained by certain limitations of
our empirical effort, in turn suggesting potentially fruitful avenues for future research.
First, our measure of perceived adverse consequences was limited to technical aspect
of risk. Examining a wider scope of risk dimensions, such as prosecution risk or other
types of psychological risks (Chiou et al., 2005; Liao et al., 2010) may offer a more
comprehensive insight into this concept. Second, the cross-sectional design of the study
Consumer digital
piracy behavior
309
JRIM
6,4
310
creates some limitations. Although rarely applied in the piracy research (Williams et al.,
2010), a longitudinal methodology could provide a stronger inference, particularly with
respect to the sequencing of rationalization. What is more, experimental designs could
help determining the causality of rationalization and perceived benefit and risk. This
topic has been recognized as an under-researched area needing further investigation
(Harris and Dumas, 2009). Third, while precautions have been taken in the sampling and
data collection process across five countries to ensure reliable data, the use of constructs
of potentially sensitive nature (i.e. aberrant behavior) in self-reported surveys may
have been impacted by socially desirable responding (Steenkamp et al., 2010). This
limitation is more likely present in a non-student population. Students and other
younger consumers, who have grown up with easy access to free content on the internet,
have a more liberal view of sharing content and may fail to recognize piracy as a
transgression of social norms (Sinha and Mandel, 2008).
References
Aleassa, H., Pearson, J.M. and McClurg, S. (2011), Investigating software piracy in Jordan: an
extension of the theory of reasoned action, Journal of Business Ethics, Vol. 98 No. 4,
pp. 663-76.
Anderson, J.C. and Gerbing, D. (1988), Structural equation modeling in practice: a review and
recommended two-step approach, Psychological Bulletin, Vol. 103 No. 3, pp. 411-23.
BASCAP (2011), Estimating the Global Economic and Social Impacts of Counterfeiting and
Piracy, Business Action to Stop Counterfeiting and Piracy, Paris, available at:
www.iccwbo.org/uploadedFiles/BASCAP/Pages/Global%20Impacts%20-%20Final.pdf
(accessed 3 October).
Bagozzi, R.P. and Yi, Y. (1988), On the evaluation of structural equation models, Journal of the
Academy of Marketing Science, Vol. 16 No. 1, pp. 74-94.
Bhattacharjee, S., Gopal, R., Lertwachara, K. and Marsden, J.R. (2006), Whatever happened to
payola? An empirical analysis of online music sharing, Decision Support Systems, Vol. 42
No. 1, pp. 104-20.
Block, L.G. and Keller, P.A. (1995), When to accentuate the negative: the effects of perceived
efficacy and message framing on intentions to perform a health-related behavior, Journal
of Marketing Research, Vol. 32 No. 2, pp. 192-203.
Chang, C. (2008), Ad framing effects for consumption products: an affect priming process,
Psychology & Marketing, Vol. 25 No. 1, pp. 24-46.
Chatzidakis, A., Hibbert, S. and Smith, A.P. (2007), Why people dont take their concerns about
fair trade to the supermarket: the role of neutralization, Journal of Business Ethics, Vol. 74
No. 1, pp. 89-100.
Chiou, J.-S., Huang, C. and Lee, H. (2005), The antecedents of music piracy attitudes and
intentions, Journal of Business Ethics, Vol. 57 No. 2, pp. 161-74.
Craig, C.S. and Douglas, S.P. (2000), International Marketing Research, Wiley, New York, NY.
Dacin, T. and Murphy, P.R. (2011), Psychological pathways to fraud: understanding
and preventing fraud in organizations, Journal of Business Research, Vol. 101 No. 4,
pp. 601-18.
DAstous, A. and Legendre, A. (2009), Understanding consumers ethical justifications: a scale
for appraising consumers reasons for not behaving ethically, Journal of Business Ethics,
Vol. 87 No. 2, pp. 255-68.
de Jong, M.G., Steenkamp, J.-B.E.M. and Veldkamp, B.P. (2009), A model for the construction of
country-specific, yet internationally comparable short-form marketing scales, Marketing
Science, Vol. 28 No. 4, pp. 674-89.
Eisend, M. and Schuchert-Gueler, P. (2006), Explaining counterfeit purchases a review and
preview, Academy of Marketing Science Review, Vol. 6 No. 12, pp. 1-25.
Goles, T., Jayatilaka, B., George, B., Parsons, L., Chambers, V., Taylor, D. and Brune, R. (2008),
Softlifting: exploring determinants of attitude, Journal of Business Ethics, Vol. 77 No. 4,
pp. 481-99.
Gopal, R.D., Sanders, G.L., Bhattacharjee, S., Agrawal, M. and Wagner, S.C. (2004), A behavioral
model of digital music piracy, Journal of Organizational Computing and Electronic
Commerce, Vol. 14 No. 2, pp. 89-105.
Grove, S.J. and Vitell, S.J. (1989), Non-normative consumer behavior and the techniques of
neutralization, in Bagozzi, R. and Peter, J. (Eds), Proceedings of the 1989 AMA Winter
Educators Conference, American Marketing Association, Chicago, IL, pp. 131-5.
Harris, L.C. and Dumas, A. (2009), Online consumer misbehaviour: an application of
neutralization theory, Marketing Theory, Vol. 9 No. 4, pp. 379-402.
Hennig-Thurau, T., Henning, V. and Sattler, H. (2007), Consumer file sharing of motion
pictures, Journal of Marketing, Vol. 71 No. 4, pp. 1-18.
Higgins, G.E., Wolfe, S.E. and Marcum, C.D. (2008), Music piracy and neutralization:
a preliminary trajectory analysis from short-term longitudinal data, International Journal
of Cyber Criminology, Vol. 2 No. 2, pp. 324-36.
Hinduja, S. (2007), Neutralization theory and online software piracy: an empirical analysis,
Ethics and Information Technology, Vol. 9 No. 3, pp. 187-204.
Horn, J.L., McArdle, J.J. and Mason, R. (1983), When is invariance not invariant: a practical
scientists look at the ethereal concept of factor invariance, The Southern Psychologist,
Vol. 1 No. 4, pp. 179-88.
Hunt, S.D. and Vitell, S. (1986), A general theory of marketing ethics, Journal of
Macromarketing, Vol. 6 No. 1, pp. 5-16.
Ingram, J. and Hinduja, S. (2008), Neutralizing music piracy: an empirical examination,
Deviant Behavior, Vol. 29 No. 4, pp. 334-66.
Kemper, E., Stringfield, S. and Teddlie, C. (2003), Mixed methods sampling strategies in social
science research, in Tashakkori, A. and Teddlie, C. (Eds), Handbook of Mixed Methods in
Social & Behavioral Research, Sage, Thousand Oaks, CA, pp. 273-96.
Kini, R.B., Ramakrishna, H.V. and Vijayaraman, B.S. (2003), Shaping of moral intensity
regarding software piracy: a comparison between Thailand and US students, Journal of
Business Ethics, Vol. 49 No. 1, pp. 91-104.
Konstantakis, N.I., Palaigeorgiou, G.E., Siozos, P.D. and Tsoukalas, I.A. (2010), What do
computer science students think about software piracy?, Behavior & Information
Technology, Vol. 29 No. 3, pp. 277-85.
Liao, C., Lin, H.-N. and Liu, Y.-P. (2010), Predicting the use of pirated software: a contingency
model integrating perceived risk with the theory of planned behavior, Journal of Business
Ethics, Vol. 91 No. 2, pp. 237-52.
Lysonski, S. and Durvasula, S. (2008), Digital piracy of MP3s: consumer and ethical
predispositions, Journal of Consumer Marketing, Vol. 25 No. 3, pp. 167-78.
McGregor, S.L.T. (2008), Conceptualizing immoral and unethical consumption using
neutralization theory, Family and Consumer Sciences Research Journal, Vol. 36 No. 3,
pp. 261-76.
Consumer digital
piracy behavior
311
JRIM
6,4
312
Further reading
Ang, S.H., Cheng, P.S., Lim, A.A.C. and Tambyah, S.K. (2001), Spot the difference: consumer
responses towards counterfeits, Journal of Consumer Marketing, Vol. 18 No. 3, pp. 219-35.
Coyle, J.R., Gould, S.J., Gupta, P. and Gupta, R. (2009), To buy or to pirate: the matrix of music
consumers acquisition-mode decision-making, Journal of Business Research, Vol. 62
No. 10, pp. 1031-7.
Dacin, T. and Murphy, P.R. (2009), Understanding and preventing unethical conduct in
organizations: a situation- and affect-based fraud framework, available at: http://ssrn.
com/abstract1492765
DAstous, A., Colbert, F. and Montpetit, D. (2005), Music piracy on the web how effective are
anti-piracy arguments? Evidence from the theory of planned behaviour, Journal of
Consumer Policy, Vol. 28 No. 3, pp. 289-310.
Glass, S. and Wood, A. (1996), Situational determinants of software piracy: an equity theory
perspective, Journal of Business Ethics, Vol. 15 No. 11, pp. 1189-98.
Simpson, P.M., Banerjee, D. and Simpson, C.L. (1994), Softlifting: a model of motivating factors,
Journal of Business Ethics, Vol. 13 No. 6, pp. 431-8.
Staake, T., Thiese, F. and Fleish, E. (2009), The emergence of counterfeit trade: a literature
review, European Journal of Marketing, Vol. 43 Nos 3/4, pp. 320-49.
About the authors
Irena Vida is a Professor of Marketing at Faculty of Economics at the University of Ljubljana.
Her research focus is on application of consumer behaviour theories and models in cross-cultural
settings and on strategic issues in international marketing. She published articles in various
journals such as Journal of Business Research, European Journal of Marketing, Journal of
International Marketing, International Marketing Review and International Business Review.
Irena Vida is the corresponding author and can be contacted at: irena.vida@ef.uni-lj.si
Mateja Kos Koklic is an Assistant Professor of Marketing at the Faculty of Economics,
University of Ljubljana in Slovenia. Her research focuses on topics such as consumer behaviour
and consumer decision making, especially with respect to counterfeiting and piracy, as well as
perceived risk in different purchasing situations. She has published her findings in journals, such
as International Journal of Consumer Studies and Managing Global Transitions.
Monika Kukar-Kinney is Associate Professor of Marketing in the Robins School of Business,
University of Richmond, Richmond, Virginia and a Visiting Professor at the University of
Ljubljana, Faculty of Economics, Slovenia. Her research focuses on compulsive buying,
behavioral pricing, retailing and electronic commerce. Her work has appeared in journals such as
the Journal of the Academy of Marketing Science, Journal of Consumer Research, Journal of
Retailing, and Journal of Business Research, among others.
Elfriede Penz is Associate Professor at the Institute for International Marketing Management
at the Wirtschaftsuniversitat Wien in Austria. Her research includes consumer behaviour, both
in online and offline contexts, the interplay between consumers and organisations (power)
as well as methodological issues in international marketing and management. She has published
in refereed international journals: Psychology & Marketing, Journal of Economic Psychology,
Management International Review and International Marketing Review.
Consumer digital
piracy behavior
313
1. Godwin Udo, Kallol Bagchi, Moutusy Maity. 2014. Exploring Factors Affecting Digital Piracy Using
the Norm Activation and UTAUT Models: The Role of National Culture. Journal of Business Ethics .
[CrossRef]
2. Mateja Kos Koklic, Monika Kukar-Kinney, Irena Vida. 2014. Three-Level Mechanism of Consumer
Digital Piracy: Development and Cross-Cultural Validation. Journal of Business Ethics . [CrossRef]