SRM HRM A Group No. 01 Project Report
Transcript of SRM HRM A Group No. 01 Project Report
A Quantitative Research to
Determine the Factors Affecting
Intention to Commit Digital Piracy
Social Research Methods
HRM Section A - Group 1
Aaditya Narayan Chaudhary H13001 Aayush Goel H13002 Abhay Kumar Vasishtha H13003 Abhishek Saxena H13005 Akshay Maxim Sequeira H13009
1 | P a g e
Executive Summary
The main aim of conducting this research project is to understand the intention to commit digital
piracy among business school students in India. In order to study the final intention of a student to
commit digital piracy we have identified several independent variables such as attitude, moral
obligation, perceived behavioral control etc. and through a study on the relevant literature review
have designed a questionnaire which aims to capture the data about these constructs. It is our final
aim to narrow down on a few key independent variables that have maximum impact on a persons’
intention to commit digital piracy. We then can analyze the most appropriate corrective action that
can be taken to remedy the problem. After the data analysis of the survey, we found that intention
to commit digital piracy can be significantly impact by perceived behavioral control, overall attitude
towards piracy and perceived psychosocial risk. Thus, the best way to curb the malice of digital piracy
is to take measure to increase the perceived psychosocial risk among people while decreasing the
overall attitude towards piracy.
2 | P a g e
Contents
Introduction ......................................................................................................................................................... 3
Problem Setting ................................................................................................................................................... 6
Literature Review ................................................................................................................................................ 7
Conceptual Background for the Research Objectives ..................................................................................... 7
Attitude towards Digital Piracy .................................................................................................................... 7
Perceived Risk .............................................................................................................................................. 8
Perceived Behavioral Control ...................................................................................................................... 9
Moral Obligation .......................................................................................................................................... 9
Subjective Norms ....................................................................................................................................... 10
Intention to Commit Digital Piracy ............................................................................................................ 10
Social Desirability Bias ............................................................................................................................... 11
Computer Efficacy ..................................................................................................................................... 11
Major Hypotheses Used ................................................................................................................................ 12
Research Model ................................................................................................................................................. 13
Design ................................................................................................................................................................ 14
Questionnaire Design .................................................................................................................................... 14
Questionnaire Details .................................................................................................................................... 14
Source of the questionnaire .......................................................................................................................... 14
Questionnaire Wording ................................................................................................................................. 16
Response Choices .......................................................................................................................................... 16
Question Sequence ........................................................................................................................................ 16
Questionnaire Pretesting ............................................................................................................................... 16
Administering the Questionnaire - Sample Design and Response Rate ........................................................ 17
Analysis and Discussion of Results .................................................................................................................... 18
Implications of the Study Findings .................................................................................................................... 37
References ......................................................................................................................................................... 40
Appendix ............................................................................................................................................................ 43
3 | P a g e
Introduction
Digital piracy encompasses the illegal copying and/or downloading of copyrighted software or digital
materials such as music, movies, files and books. The practice of digital piracy has posed a significant
threat to the development of the software industry and the growth of the digital media industry.
Piracy is an impending problem for India’s media and entertainment industry causing losses of about
INR 20,000 crore every year due to copyright infringement. India’s digital music market is in the range
of INR 5,000 crore, but only 7 percent of it is legitimate. The commercial value of unlicensed software
installed on personal computers in India was estimated at $2.74 billion in 2010. The Indian Movie
Industry is facing a big problem in terms of piracy, with movie prints becoming available online within
a couple of days of the movies’ release and this has caused a huge loss to the distributors. The copy
of the film is also available in the grey market at a price that is ten times lesser than the original. Even
book piracy has reached an alarming level with publishers losing as high as 25% to piracy. The Torrent
downloader is popular among urban Indian youth, who access content such as films, music and
software “illegally” from across the world through this software.
IMI, an umbrella organization of over 140 music companies, including market leaders like Saregama,
Universal Music, Sony Music, Venus, and Tips have served notices to ISPs like Vodafone, Bharti Airtel
and Reliance Communications to immediately stop reproducing, distributing and transmitting sound
recordings which infringes on their copyrights. The Indian music industry is elated with the decision
of the Kolkata High Court that directs Internet Service Providers (ISPs) to block websites that allow
illegal downloading of songs.
Companies like Moser Baer, the world’s second largest manufacturer of optical storage media like
CDs and DVDs is constantly looking forward to fight piracy with unique distribution strategies,
aggressive marketing, competitive pricing and urging customers to “Kill Piracy”. The company adopts
a unique model wherein it picks up home video distribution rights of films from small distributors
who are willing to give away their films at lesser price and then sell these to customers at low prices.
It is also aggressively looking at collaborating for new releases and in one such deal valued at INR 250
million, it acquired home video release rights to UTV’s home video catalog which included 10 films.
Flipkart, India’s most successfulve-commerce company is also exploring options for selling
legitimately licensed digital music. Even Saavn.com, a digital distributor of music offers free streaming
with a catalog of over 200,000 songs in various Indian languages. Its mobile application can be used
in both the iPhone and Android formats and is a huge hit among music enthusiasts.
The India wing of the Business Software Alliance (BSA) has been a key agent in sensitizing the issue
on software piracy and assisting the police in conducting raids on pirates around the country. The
Motion Pictures Association (MPA) has been instrumental in keeping a check on film piracy in India.
In addition, major movie production houses ranging from Red Chillies Entertainment (owned by Shah
Rukh Khan), Yash Raj Films, UTV Motion Pictures have also formed coalitions to deal with piracy and
have sought assistance of former intelligence agents and police officers to curb the menace of digital
piracy by conducting raids all over the country. Leading producer Mr. Mukesh Bhatt mentioned that
for his movie 'Aashiqui 2', more than 40 percent of my revenue was lost to internet piracy. It is also
4 | P a g e
estimated that Vishal Bhardwaj’s Kaminey, was downloaded 350,000 times on Bit Torrent with about
2/3rds of downloaders being from India.
An article published in Mint has revealed some shocking facts that piracy and counterfeiting are
growing rapidly in India and have deprived the Indian entertainment industry of $4 billion and around
820,000 jobs. The big question that worries producers, software developers and the like is how to
change the mindset of the Indian customer who is so accustomed to pirate and distribute digital
material. Additionally, implementing the free streaming approach and the pay-for-download
approach have their own challenges. Downloads require users to have a credit card or electronically
transfer money into a digital wallet. To market this approach to the mass media is a big problem in
itself. Meanwhile, free ad-supported service faces the hurdle of attracting spending from Indian
marketers who are still quite satisfied advertising on TV and in newspapers.
Google is planning to launch a music service in India that will allow users to search for legal music
streams online and in this will help in curbing the already rampant practice of digital piracy. The users
will be able to search for and instantaneously listen to many songs which will be delivered by Google’s
partners in India. This service will be free of charge. Online book business by direct tie-ups with
publishers such as Pearson Education, Wiley India, Tata McGraw Hill and Penguin Books India will
help curb book piracy and promote the sale of original copies.
To accelerate the rate of decline in software piracy, there is a need to establish a strong enforcement
agency in the country that specializes in the subject of Intellectual Property Rights (IPRs) and to create
general awareness on issue of copyright, piracy and IP. In India, the Indian Copyright Act 1957
protects IP owners in a traditional infringement context which has been extended to digital and
online infringing activities, through provisions in the Information Technology Act 2000. The Copyright
Amendment Bill, 2010 is expected to remove operational difficulties in implementing intellectual
copyrights, and will address new issues concerning the digital world and the internet.
The 3 tables below show the prices of licit and illicit DVD prices in India, and the most popular
download categories from DCTorrent and DesiTorrents.
6 | P a g e
Problem Setting
The major concern in today’s leadership context is producing good, ethical leaders who can guide the
future towards a brighter direction. However, modern unethical practices among executives is
rampant and this phenomenon is only set to grow. As B-School students whose college espouses the
motto of integrity and excellence, we intend to find out whether future leaders in B-schools also
adhere to the philosophy of ethical integrity. To measure the same, we have used digital piracy as a
surrogate to determine the level of ethical inclination of B-school students. During the last decade,
much research has been dedicated to the study of ethics and ethical behavior in business. Ethical
situations arise often in many different areas of business, and this has been complicated by the
integration of Information Systems (IS) into business operations. One issue that has been in the news
lately is the issue of intellectual property and specifically, digital piracy. As a multi-billion dollar
industry, it is thriving on the hyper connected youth who demand for the latest products and services
either digitally or online and prefer to obtain pirated materials.
While software piracy has received much interest (with an estimated $ 13 billion in lost revenues in
2002) (Business Software Alliance, 2003), a new form of piracy has taken the piracy spotlight and
being called the next big piracy arena (Bhattacharjee et al., 2003). Referred to as Digital Piracy, and
defined in this paper as, "the illegal copying/downloading of copyrighted software and media files".
According to the Forrester research group (http://www.forrester.com), lost revenues due to digital
piracy could reach $5 billion alone from music and book publishers by the year 2005 (not counting
losses from software companies or cinema studios). The next big piracy target apparently will be
Hollywood, as the Motion Picture Association of American (MPAA) estimates that around 400,000
600,000 movies are being copied/downloaded on the Internet every day (MPAA Report, 2003).
The purpose of this study is to identify factors that influence an individual's intention to commit
digital piracy. While much of the previous research concentrated on the piracy behavior and how to
control it (Conner and Rumlet, 1991; Glass and Wood, 1996; Gopal and Sanders, 1997; Moseley and
Whitis, 1995), this study examines the factors that influence the intention regarding such a behavior.
By doing so, measures to alter those factors can be implemented (and thus influence behavior
indirectly) that would reduce digital piracy – a current problem. This is especially important since
many studies have suggested that individuals do not see piracy as a crime or an unethical issue. A
better understanding of these factors that influence intention toward digital piracy could prove to be
essential in our understanding of this phenomenon and help us combat digital piracy.
7 | P a g e
Literature Review
Conceptual Background for the Research Objectives
The main research objective of this project is to identify the critical parameters or the main
independent constructs that influence a persons’ intention to commit digital piracy. In order to
achieve this objective we needed to identify certain independent constructs through an extensive
research survey. The independent constructs that we have selected for our project are attitude,
moral obligation, subjective norms, perceived risk, computer efficacy and perceived behavioral
control. In order to operationalize these constructs we further tried to analyze them from our
knowledge of organizational behavior and with the help of existing research papers. For example:
from our study of organizational behavior we understand that attitudes are general evaluative
statements about a person makes about a particular behavior and to fully operationalize this
construct we further needed to understand its sub components. In this case we identified the three
parts as cognitive, affective and behavioral. This analysis helped us choose questions from existing
surveys to best design our model. This process was followed for all our independent constructs.
Attitude towards Digital Piracy
From our study of organizational behavior we understand that an attitude in general is an evaluative
statement either favorable or unfavorable about objects people or events. They reflect the way we
feel about something and it is important in our study of digital piracy behavior because attitude is
one of the independent variable that affect the intention to commit digital piracy. A lot of firms have
lost significant revenues to piracy. A major reason for studying attitude and considering it as one of
our independent constructs is that attitude can be changed through persuasion and other means.
Since attitude is one of the factors influencing the intention to commit digital piracy if we can find
that there is relationship between them it would be worth exploiting the fact that a change in attitude
towards digital piracy will go a long way in curbing people’s intention to commit piracy.
Again from our study of organizational behavior we understand that researchers have assumed that
attitudes have three components; cognition, affect and behavior. The cognitive component refers to
the opinion or belief segment of an attitude. The affective component measures the emotional or
feeling segment of an attitude. The behavioral component measures the tendency to behave in a
certain way toward someone or something. In order to effectively study the effect of attitude on the
intention to commit piracy we first need to measure the attitude in an effective manner. For the
purpose of our study, we will be considering attitude as an independent variable and examining its
effect on the intention to commit digital piracy.
We have hence based our literature review and study in a way that we could capture all the three
elements of attitude. The original theory of reasoned action (Fishbein and Ajzen, 1975) and the
theory of planned behavior (Ajzen, 1985) assert that intention is determined by attitude. Other
empirical studies confirm that attitude has a significant impact on intentions (see Ajzen,1991;
Sheppard et al., 1988 for reviews). It is a relatively straightforward leap of logic to conclude that this
relationship holds true for piracy. This gives us the basis for measuring the cognitive part of attitude
from the following three questions.
8 | P a g e
1. Using copied software is a bad idea
2. I dislike the idea of using copied software
3. Using copied software is a wise idea
The above questions are measured on a 7 point Likert scale (1 being strongly disagree and 7 being
strongly disagree).
The Affective Beliefs measure, Bodur et al. (2000), used four categories (arousal, elation,
pleasantness, and distress) to assess their affective beliefs construct. Other researchers have used a
two-dimensional structure based on pleasure and arousal (see Bodur et al., 2000). In our study, a
three-dimensional affective structure is used to measure affective beliefs - excitement (arousal),
happiness (pleasantness), and distress. Distress was also used since it is an element of
nervousness/fear when a subject downloads/ copies digital material illegally (as a result of the
illegality of the behavior or not knowing whether one was downloading a virus, for example). We
have adapted the construct on Attitude towards Piracy from Al-Rafee & Cronan (2006), Cronan & Al-
Rafee (2008) and Goles et al (2008) and the items included are associated with happiness,
excitement, fear and nervousness.
Perceived Risk
The concept of perceived risk was first introduced by Bauer (1960) when he characterized consumer
choice in terms of risk-taking or risk-reducing behavior (Tan, 2002). Bauer (1960) emphasizes that he
is concerned only with perceived risk (subjective risk) and not actual risk (objective risk) because
consumers are bounded rational actors that do not perform actual mathematical calculations of risk
(unlike actuaries or accountants) and rather form subjective risk beliefs based on internal and
external information (Featherman et al., 2006). According to Bauer (1960), a person's behavior
involves risk if the behavior will produce consequences that he or she cannot anticipate with anything
approximating cer tainty and some of which are likely to be unpleasant. In the marketing literature,
perceived risk is conceptualized as involving two elements: uncertainty and consequences (Campbell
and Goodstein, 2001; Conchar et al., 2004; Cunningham, 1967; Dowling and Staelin, 1994; Jacoby and
Kaplan, 1972; Laroche et al, 2005). Perceived risk arises when an individual is engaged in situations
where the outcomes are never totally certain and is concerned about the consequences of a poor or
wrong decision (Fraed rich and Ferrell, 1992; Havlena and DeSarbo, 1991). The perceptions of risk are
considered to be central to a person's evaluations, choices and behaviors (Campbell and Goodstein,
2001). In general, people are prone to avoid mistakes rather than maximize utility when engaging in
risky decision-making. Perceived risk is therefore a powerful tool to explain individual behavior
(Mitchell, 1999). There have been numerous studies, both theoretical and empirical , identifying risks
as critical factors influencing consumer decision making (e.g., Featherman and Pavlou, 2003;
Fraedrich and Ferrell, 1992; Jacoby and Kaplan, 1972; Mitchell, 1992; Pavlou, 2003). In recent studies
(e.g., Fraedrich and Ferrell, 1992; Tan, 2002), perceived risk is also considered a key variable in
determining ethical decision making. Although perceived risk reveals various meanings and
dimensions in different research contexts, most of the scholars view perceived risk as a multi-
dimensional construct. For example, Cunningham (1967) divided perceived risk into six risk facets
namely performance risk, financial risk, opportunity/time risk, psychological risk, social risk and
9 | P a g e
safety risk. Jacoby and Kaplan (1972) identified five risk dimensions including financial, performance,
physical, psychological and social risks and found that the five risk dimensions account for 61.5% of
the total variance in the overall risk measure. Other researchers have also suggested that time risk is
an important risk dimension (e.g., Roselius, 1971; Stone and Gronhaug, 1993). In addition, Tan (2002)
used prosecution risk instead of physical risk and proposed that performance, financial, social and
prosecution risks are the most important aspects of risk.
We have included the construct on Perceived Risk from Liao et al (2010).
Perceived Behavioral Control
The Theory of Reasoned Action (TRA) was formulated based on the premise that intention is the best predictor of behavior (Fishbein and Ajzen, 1975). The TRA is based on the notion that human behavior is rational and makes use of the limited information available to individuals. The TRA asserts that attitude and subjective norms are the two determinants that affect human behavior. The Theory of Planned Behavior (TPB) is an extension of the TRA, introduced by Ajzen in 1985. Ajzen explains that the TRA is insufficient because it does not consider situations where the behavior is not under the individual's control. To ensure accurate prediction of behavior over which individuals have only limited control, the estimate of the extent to which the individual is capable of exercising control over the behavior in question is also essential (Ajzen and Madden, 1986, p. 456). The model presented by Ajzen includes an additional determinant of intention, called Perceived Behavioral Control. Perceived behavioral control represents the person's belief of how easy or difficult it is to perform the behavior (Ajzen and Madden, 1986). Limayem et al. (1999) used a longitudinal design to study piracy within business students. The study included a variable viz. perceived consequences/ beliefs to explain the behavioral process. The results of the study indicated that only social factors and perceived consequences had an influence on the piracy behavior. We have included the construct on Perceived Behavioral Control from Cronan and Al-Rafee (2008).
Moral Obligation
Moral obligation as a deontological concept refers to the feeling of guilt or the personal obligation to
perform or not to perform a behavior (Cronan and Al-Rafee, 2008). This factor has been used in IT
ethics literature to predict moral intention (Haines and Leonard, 2007). Moral obligation has also
been proposed as an affecting intention in studies within the psychology field (see Ajzen, 1991).
Cronan and Al-Rafee (2008) state that moral obligation is significant predictor of intention in digital
piracy. Also, according to Fishbein and Ajzen (1975), subjective norms are a function of the product
of one’s normative beliefs and his/her motivation to comply with that referent. Moral obligation as
a normative ethical standard may play a role in forming personal normative beliefs as a basis.
Personal moral obligation is an individual’s moral stance about performing that behavior, or how the
individual feels about performing the behavior, as opposed to his evaluation of the outcomes of
performing the behavior (Beck and Azjen, 1991). Personal moral obligation reflects whether the
10 | P a g e
individual feels guilty because he violated an internalized norm, or does not feel guilty because the
behavior was consistent with the norm. This feeling of guilt (or lack thereof) may be particularly
relevant in cases of socially questionable activity (Grasmick and Scott, 1982; Peace and Galletta,
1996).
Moral Obligation (MO) refers to the feeling of guilt or the personal obligation to perform or not to
perform a behavior. This factor has been used in the research literature to predict ethical intention
(Randall and Gibson, 1991; Kurland, 1995; Banerjee et al., 1998; Leonard and Cronan, 2001). MO has
also been theorized as affecting intention in studies within the psychology field. Ajzen (1991)
indicated that moral obligation could possibly be added to the TPB as a separate determinant of
intention. In a review of TPB research, Conner and Armitage (1998) found that moral obligation was
a significant predictor of intention in a number of studies. The digital piracy case presents a situation
where individuals who are contemplating piracy could very well process guilt or personal obligation
to pirate/ not pirate digital material. Given the recent media exposure regarding the seriousness of
digital piracy and public awareness attempts, individuals could form intentions with a moral
obligation factor in mind. Once again, behavior could be based on reason with guilt or obligation
affecting the intention to pirate or not pirate. Research is needed to determine what effect (if any)
moral obligation has on the intention to pirate. We have adapted the construct on Moral Obligation
from Yoon, C. (2011), Goles et al (2008) and Cronan & Al-Rafee (2008).
Subjective Norms
There is evidence that suggests that subjective norms also influence intention to pirate (Chang, 1998;
Shepherd and O'Keefe, 1984; Shimp and Kavas, 1984; Vallerand et al., 1992). Since one's attitude (or
ethical attitude) towards a specific behavior is likely to be influenced by significant others (Bommer
et al., 1987; Kreie and Cronan, 1999a, b), Subjective norms are theorized to influence inclination
towards piracy. The higher the evaluation of subjective norms (significant others have a favorable
opinion towards the behavior, the higher the inclination to commit piracy). Subjective norms have
been assessed by asking subjects whether significant others approve or disapprove their behavior in
question. Items include questions such as "Most people who are important to me think that I should
not pirate digital content", and "When considering digital piracy, I wish to do what most important
people to me think" (Ajzen, 1991). We have adapted the construct on Subjective Norms from Cronan
& Al-Rafee (2008), Yoon, C. (2011) and Wang et al (2009).
Intention to Commit Digital Piracy
Fast Internet connections, availability of inexpensive high capacity storage, and underground peer-
to-peer networks on the Internet which are impossible to control have led to a mass increase in
piracy. Software Piracy 2.0 (Bhattacharjee et al., 2003) is an extended version of piracy that refers to
the recent phenomenon of pirating music, movies, and e-books in addition to software. This type of
piracy is referred to as "digital piracy" and defined as "the illegal copying/download of copyrighted
software and media files".
11 | P a g e
To better understand why digital piracy behavior occurs, researchers should determine what factors
that affect the intention to pirate. Straub and Collins (1990) identified software piracy as a major
problem facing the technology industry today and offered deterrents to piracy. Anderson et al. (1993)
examined piracy and intellectual property as some of the top issues facing IS professionals. Past
Behavior is one of the determinant of the intention to commit digital piracy (Bagozzi, et al., 1992;
Ajzen, 2002b; Hagger et al., 2002; Bamberg et al., 2003).
The research done by Bamberg et al. (2003, p. 186) states that past behavior is not always a good
predictor of future behavior. They suggest that only when circumstances are relatively stable, prior
behavior makes a significant contribution to the prediction of later behavior.
Conner and Armitage (1998) have theorized that past behavior as a predictor of intention. There may be situations in the digital piracy case where the action of piracy is routine and habits may or may not exist. Simpler technological initiatives, change in laws and regulations have led to a change as to how digital piracy is performed. We have included the construct on ‘Intention to Commit Digital Piracy’ from Cronan and Al-Rafee (2008) and the effect of independent determinants has been studied on this.
Social Desirability Bias
Social desirability is commonly thought of as the tendency of individuals to project favorable images
of themselves during social interaction. Short version of the questionnaire has been adapted from
Marlowe–Crowne Social Desirability Scale (Crowne & Marlowe, 1960).
Computer Efficacy
The concept of computer efficacy can be better understood by first understanding about an important construct in social psychology viz. self-efficacy-- the belief that one has the capability to perform a particular behavior. Self-efficacy perceptions have been found to influence decisions regarding what behaviors to undertake (e.g., Bandura, et al., 1977; Betz and Hackett, 1981), the effort exerted and the persistence in attempting those behaviors (e.g., Barling and Beattie, 1983; Brown and Inouye, 1978), the emotional responses of the individual performing the behaviors (e.g., Bandura, et al., 1977; Stumpf, et al.,1987), and the actual performance attainments of the individual with respect to the behavior (e.g., Barling and Beattie, 1983; Collins, 1985; Locke, et al., 1984; Schunk, 1981; Wood and Bandura, 1989). The relationship between self-efficacy (with respect to computers) and a variety of computer
behaviors have also been examined (Burkhardt and Brass, 1990; Gist, et al., 1989; Hill, et al., 1986;
1987; Webster and Martocchio, 1992; 1993). Having a reliable and valid measure of self-efficacy leads
to successful implementation of support, training and systems in organizations.
Computer efficacy refers to a person’s beliefs about his/her abilities to efficiently use computers.
Computer self-efficacy exerts a significant influence on an individuals' expectations about using
computers, their emotional reactions to computers (affect and anxiety), and their actual computer
use (Compeau and Higgins, 1995). This research paper also demonstrates that an individual's self-
efficacy and outcome expectations are positively influenced by the encouragement of others in their
work group and their use of computers.
12 | P a g e
The Theory of Reasoned Action (Fishbein and Ajzen, 1975) states that individuals would use
computers if they feel that there would be positive benefits/outcomes associated with using them.
There exists a relationship between self-efficacy and registration in computer courses at universities
(Hill, et al., 1987), innovations (Burkhardt and Brass, 1990), adoption of high technology products
(Hill, et al., 1986), and performance in software training (Gist, et al., 1989; Webster and Martocchio,
1992; 1993).
We have included the construct on Computer Efficacy from Compeau and Higgins (1995) and have
attempted to study the impact of computer efficacy on perceived behavioral control towards digital
piracy.
Major Hypotheses Used
The constructs adapted from various sources were subjected to Factor Analysis as a result of which
we extracted 11 components – 9 independent, 1 intermediate and 1 dependent. The following
hypotheses have been formed keeping in mind the literature review and the research gap that we
were able to uncover from the existing literature. These hypothesis aim to measure impact of certain
variables on the intention to commit digital piracy.
H1: Encouraging attitude to commit digital piracy has a positive impact on the intention to commit
digital piracy.
H2: Overall attitude to commit digital piracy results in an intention to commit digital piracy.
H3: Adverse attitude to commit digital piracy has a negative impact on the intention to commit digital
piracy.
H4: Perceived Psycho-social risk has a negative impact on the intention to commit digital piracy.
H5: Perceived Functional risk has a negative impact on the intention to commit digital piracy.
H6: Moral Obligations have a negative impact on the perceived behavioral control over digital piracy.
H7: Computer Efficacy has a positive impact on the perceived behavioral control over digital piracy.
H8: Perceived behavioral control has a negative impact on the intention to commit digital piracy.
H9: Music Piracy Subjective Norms have a negative impact on the intention to commit digital piracy.
H10: Digital Piracy Subjective Norms have a negative impact on the intention to commit digital piracy.
13 | P a g e
Research Model
-
-
- -
-
-
Encouraging Attitude to commit Piracy
Overall Attitude to commit Piracy
Adverse Attitude to commit Piracy
Attitude
Perceived Psycho-social Risk
Perceived Functional Risk
Perceived Risk
Music Piracy Subjective Norms
Digital Piracy Subjective Norms
Subjective Norms
Perceived Behavioral Control
Moral Obligation
Computer Efficacy
Intention to Commit Digital Piracy
+
+
-
14 | P a g e
Design
Questionnaire Design
After an exhaustive literature review, the various dependent and independent constructs that affect
the intention to commit digital piracy were obtained. The independent constructs identified were
attitude towards digital piracy, perceived risk, perceived behavioral control, moral obligation,
subjective norms and computer efficacy and these were found to be affecting the intention to
commit digital piracy. Standard questionnaires that had been used in previous research papers were
used for measuring the various constructs. The questions pertaining to respondent information were
about the age, gender, years of work experience, college, roll no., average downloading per month
and the major download category.
Questionnaire Details
Construct Scale Used for Measurement No. of Items
Attitude towards piracy 7 point Likert scale 16
Perceived Risk 5 point Likert scale 10
Perceived behavioral control 7 point Likert scale 5
Moral Obligation 7 point Likert scale 9
Subjective Norms 7 point Likert scale 11
Intention to commit digital piracy 7 point Likert scale except Q4 5
Social-Desirability Scale 5 point Likert scale 6
Computer Efficacy 10 point Likert scale 10
Total items in main body of the questionnaire: 73
Total items relating to respondent characteristics: 7
Total items in the questionnaire: 79
Source of the questionnaire
Subjective Norms
Cronan, T. P., & Al-Rafee, S. (2008). Factors that influence the intention to pirate software and
media. Journal of Business Ethics, 78(4), 527-545.
15 | P a g e
Yoon, C. (2011). Theory of planned behavior and ethics theory in digital piracy: An integrated
model. Journal of Business Ethics, 100(3), 405-417.
Wang, C. C., Chen, C. T., Yang, S. C., & Farn, C. K. (2009). Pirate or buy? The moderating effect of
idolatry. Journal of Business Ethics, 90(1), 81-93.
Perceived Behavioral Control
Cronan, T. P., & Al-Rafee, S. (2008). Factors that influence the intention to pirate software and media. Journal of Business Ethics, 78(4), 527-545.
Intention to commit digital piracy
Cronan, T. P., & Al-Rafee, S. (2008). Factors that influence the intention to pirate software and media. Journal of Business Ethics, 78(4), 527-545.
Computer Efficacy
Compeau, D. R., & Higgins, C. A. (1995). Computer self-efficacy: Development of a measure and initial test. MIS Quarterly, 19(2).
Moral Obligation
Yoon, C. (2011). Theory of planned behavior and ethics theory in digital piracy: An integrated model.
Journal of Business Ethics, 100(3), 405-417.
Goles, T., Jayatilaka, B., George, B., Parsons, L., Chambers, V., Taylor, D., & Brune, R. (2008).
Softlifting: Exploring Determinants of Attitude. Journal of Business Ethics, 77(4), 481-499.
doi:10.1007/s10551-007-9361-0
Cronan, T., & Al-Rafee, S. (2008). Factors that Influence the Intention to Pirate Software and Media.
Journal of Business Ethics, 78(4), 527-545. doi:10.1007/s10551-007-9366-8
Attitude towards piracy
Al-Rafee, S., & Cronan, T. P. (2006). Digital piracy: Factors that influence attitude toward
behavior. Journal of Business Ethics, 63(3), 237-259.
Cronan, T. P., & Al-Rafee, S. (2008). Factors that influence the intention to pirate software and
media. Journal of Business Ethics, 78(4), 527-545.
Goles, T., Jayatilaka, B., George, B., Parsons, L., Chambers, V., Taylor, D., & Brune, R. (2008).
Softlifting: exploring determinants of attitude. Journal of Business Ethics, 77(4), 481-499.
16 | P a g e
Perceived Risk
Liao, C., Lin, H. N., & Liu, Y. P. (2010). Predicting the use of pirated software: A contingency model
integrating perceived risk with the theory of planned behavior. Journal of Business Ethics, 91(2), 237-
252.
Social-Desirability Scale
Farrell, M. A., & Oczkowski, E. (2012). Organisational identification and leader member exchange
influences on customer orientation and organisational citizenship behaviors. Journal of Strategic
Marketing, 20(4), 365-377.
Questionnaire Wording
In some cases, questions that seemed alike but were worded differently were used. This was used as
a screening technique to filter out those respondents who had not filled the questionnaire with the
requisite seriousness or had misunderstood the meaning and intention of the questions. Also, care
was taken that questions covering two separate issues were not merged into one.
Response Choices
All the questions (except one asking for the roll number of the respondent) were closed-ended. The
advantage of using closed-ended questions is that they are simpler for the respondent to answer and
also easier to code and analyse. The scales or the number of response choices for each item were as
per the Likert scales used in the standard questionnaires. It was ensured that the response choices
were exhaustive and mutually exclusive. This includes non-substantive choices like ‘neither agree nor
disagree’ etc. Also, ranges were used instead of exact values for certain questions, especially where
personal data was being asked for as these questions are seen as sensitive by the respondents.
Question Sequence
The questionnaire was divided into two parts: the main body and respondent characteristics. The
part about the respondent characteristics was intentionally kept at the end so that respondents
would not abandon the questionnaire in the middle of the survey for fear of disclosing sensitive
information. In fact, as per the paper by Nicolaos E. Synodinos, if sensitive questions are kept towards
the end, they result in higher response rates. Care was also taken that items measuring a single
construct were grouped together.
Questionnaire Pretesting
Once the questionnaire was developed, it was pretested by the members of another group.
Pretesting is normally done to refine the questionnaire and the administration method. But in our
case, the pretesting did not generate any negative response. Hence, no iteration was done. The same
questionnaire was used as the final version.
17 | P a g e
Administering the Questionnaire - Sample Design and Response Rate
Having developed the questionnaire, the next step involved selecting the respondents and deciding
the questionnaire administration method. Since the topic of the research was to determine the
factors that affect the intention to commit digital piracy, the questionnaire was floated mainly to
students studying in the various B-schools across the country as the frequency of internet usage
among them is very high. Self-administered questionnaires were used for the survey. The
questionnaires were developed using Qualtrics software and sent to the respondents via e-mail. This
method of administering the questionnaire helped in reaching a larger pool of respondents. Also, it
provided the respondents with sufficient time to fill the questionnaires.
The questionnaires were sent to 185 students and the number of responses obtained was 153. This
resulted in a response rate of 82.7%.
18 | P a g e
Analysis and Discussion of Results
Data Analysis forms the crux of the research as analysis of the responses received through our survey
will reveal the findings of our study and possible implications for future. Data analysis will also help
us to assess validity of our hypothesis and will uncover any research gaps that may exist for future
researchers to study.
The data analysis for this research includes a sequence of steps which are to be performed one after the other. One can only move to the next step if it passes the previous one. Output of each stage represent one or more characteristics of the sample response data. The steps which have been followed are described in the following section.
1. Skewness and Kurtosis
In statistics, Skewness is a measure of the asymmetry of the probability distribution of a real-valued random variable about its mean. It quantifies how symmetrical the distribution is. It can take the following three kinds of values.
Skewness > 0 - Right skewed distribution - most values are concentrated on left of the mean, with extreme values to the right.
Skewness < 0 - Left skewed distribution - most values are concentrated on the right of the mean, with extreme values to the left.
Skewness = 0 - mean = median, the distribution is symmetrical around the mean.
In statistics, Kurtosis (from the Greek word kyrtos or kurtos, meaning curved, arching) is any measure of the peakedness of the probability distribution of a real-valued random variable. It quantifies whether the shape of the data distribution matches the Gaussian distribution. It measures the height and sharpness of the peak relative to the rest of the data. Higher values indicate a higher, sharper peak; lower values indicate a lower, less distinct peak. Various values of kurtosis signify different characteristics of data.
Kurtosis > 3 - Leptokurtic distribution, sharper than a Gaussian distribution, with values concentrated around the mean and thicker tails. This means high probability for extreme values.
Kurtosis < 3 - Platykurtic distribution, flatter than a Gaussian distribution with a wider peak. The probability for extreme values is less than for a Gaussian distribution, and the values are wider spread around the mean.
Kurtosis = 3 - Mesokurtic distribution - Gaussian distribution for example.
19 | P a g e
The two values for all the responses to each of our question are listed in the following tables.
Item Skewness Std. Error of Skewness Kurtosis Std. Error of Kurtosis
att1 -.145 .196 -.791 .39
att2 -.024 .196 -.907 .39
att3 -.21 .196 -.622 .39
att4 -.077 .196 -.671 .39
att5 .157 .196 -1.105 .39
att6 .073 .196 -.987 .39
att7 -.085 .196 -.976 .39
att8 .045 .196 -.887 .39
att9 .131 .196 -.875 .39
att10 .048 .196 -.899 .39
att11 .15 .196 -.845 .39
att12 .35 .196 -.827 .39
att13 .374 .196 -.963 .39
att14 .14 .196 -1.042 .39
att15 .171 .196 -1.15 .39
att16 -.007 .196 -.872 .39
risk1 -.074 .196 -.624 .390
risk2 .083 .196 -.448 .390
risk3 .150 .196 -.608 .390
risk4 .308 .196 -.717 .390
risk5 .437 .196 -.421 .390
risk6 .375 .196 -.663 .390
risk7 -.084 .196 -1.005 .390
risk8 .248 .196 -.745 .390
risk9 .310 .196 -.608 .390
risk10 .387 .196 -.506 .390
pbc1 .257 .196 -1.010 .390
pbc2 .403 .196 -.894 .390
pbc3 .340 .196 -.951 .390
pbc4 .354 .196 -.911 .390
pbc5 .545 .196 -.857 .390
mo1 .233 .196 -1.141 .390
mo2 .098 .196 -1.138 .390
mo3 .042 .196 -1.115 .390
mo4 .304 .196 -.685 .390
mo5 -.198 .196 -1.185 .390
mo6 .214 .196 -1.202 .390
mo7 .078 .196 -1.127 .390
mo8 .233 .196 -.885 .390
mo9 .019 .196 -1.141 .390
sn1 -.323 .196 -.907 .390
20 | P a g e
sn2 -.099 .196 -1.019 .390
sn3 -.054 .196 .333 .390
sn4 -.223 .196 -.504 .390
sn5 -.348 .196 -.526 .390
sn6 -.213 .196 -.872 .390
sn7 -.176 .196 -.777 .390
sn8 .245 .196 -.845 .390
sn9 .218 .196 -.746 .390
sn10 .470 .196 -.791 .390
sn11 .681 .196 -.383 .390
int1 .166 .196 -.919 .390
int2 .081 .196 -1.041 .390
int3 .290 .196 -.945 .390
int4 .532 .196 -1.739 .390
int5 .092 .302 -.701 .595
ce1 -.261 .196 -.851 .390
ce2 -.292 .196 -.824 .390
ce3 -.378 .196 -.736 .390
ce4 -.529 .196 -.828 .390
ce5 -.547 .196 -.685 .390
ce6 -.530 .196 -.637 .390
ce7 -.629 .196 -.399 .390
ce8 -.557 .196 -.461 .390
ce9 -.694 .196 -.519 .390
ce10 -.662 .196 -.541 .390
sdb1 -.053 .196 -1.253 .390
sdb2 -.269 .196 -.970 .390
sdb3 -.358 .196 -.654 .390
sdb4 -.316 .196 -.544 .390
sdb5 .189 .196 -.842 .390
sdb6 -.289 .196 -.701 .390
college -2.149 .196 2.801 .390
gender .913 .196 -1.183 .390
age 1.222 .196 .027 .390
workex .290 .196 -1.057 .390
freq .762 .196 -.690 .390
dcat .662 .196 -.221 .390
Interpretation
Almost all the items have skewness values as close to zero, therefore the response data for them is fairly distributed and not skewed to any particular direction. However for items like college and age, the skewness values are close to -2 and +1 respectively, thereby suggesting that their
21 | P a g e
responses are skewed in one particular direction. The possible explanation is that most of the respondents were from the same college and are in their mid-twenties.
Kurtosis values for all items lie within -2 and +3. Therefore the data is neither leptokurtic nor platykurtic. Hence the histogram of this data will neither be too sharper nor too flatter when compared to a Gaussian distribution.
In a liberal approach, the two values must lie between -12 and +12. Clearly, our data passes this test and we move to the next step.
2. Reverse Code Negatively worded items
15 items were identified as negatively worded and reverse coded using “Compute Variable”
instead of “Recode into different variable” method. The two methods produce same result when
the scale of the item is a Likert scale (an arithmetic progression is required). The details can be
found out in Appendix-1.
3. Factor Analysis
Factor analysis is a statistical method used to study the dimensionality of a set of variables. In
factor analysis, latent variables represent unobserved constructs and are referred to as factors or
dimensions.
Exploratory Factor Analysis (EFA)
Used to explore the dimensionality of a measurement instrument by finding the smallest
number of interpretable factors needed to explain the correlations among a set of variables
– exploratory in the sense that it places no structure on the linear relationships between the
observed variables and on the linear relationships between the observed variables and the
factors but only specifies the number of latent variables.
Confirmatory Factor Analysis (CFA)
Used to study how well a hypothesized factor model fits a new sample from the same
population or a sample from a different population – characterized by allowing restrictions
on the parameters of the model.
The output of this analysis produces three important statistic.
A. Kaiser-Meyer-Olkin (KMO): It compares the magnitude of observed correlation
coefficients with the magnitudes of partial correlation coefficients. Its value must be at
least 0.5 to proceed to the next step.
22 | P a g e
B. Communality: The sum of the squared factor loadings for all factors for a given variable
(row) is the variance in that variable accounted for by all the factors, and this is called the
communality. The communality measures the percent of variance in a given variable
explained by all the factors jointly and may be interpreted as the reliability of the
indicator. It must be greater than 0.3.
C. Eigen Values: The eigenvalue for a given factor measures the variance in all the variables
which is accounted for by that factor. Eigenvalues measure the amount of variation in the
total sample accounted for by each factor. It must be greater than 1.
D. Factor Loadings: The factor loadings, also called component loadings are the correlation
coefficients between the cases (rows) and factors (columns). It must be at least 0.4 for
each item.
Construct-wise Factor analysis results for the respondent data for our research are given below:
1) Attitude
KMO and Bartlett's Test
Kaiser-Meyer-Olkin Measure of Sampling Adequacy. .881
Bartlett's Test of Sphericity Approx. Chi-Square 2286.813
df 105
Sig. .000
Communalities
Initial Extraction
att1 1.000 .784
att2 1.000 .815
att3 1.000 .797
att4 1.000 .743
att5 1.000 .842
att6 1.000 .849
att7 1.000 .824
att8 1.000 .858
att9 1.000 .866
att10 1.000 .813
att11r 1.000 .827
att12r 1.000 .901
att13r 1.000 .877
att14r 1.000 .561
att15r 1.000 .576
Rotated Component Matrixa
Component
1 2 3
att1 .830
att2 .851
att3 .855
att4 .784
att5 .867
att6 .884
att7 .855
att8 .866
att9 .867
att10 .820
att11r .901
att12r .947
att13r .934
att14r .666
att15r .718
23 | P a g e
Item att16r was found to have a communality of <0.3 and hence was removed before the 2nd iteration. All loadings found were clear loadings. The three components identified are Encouraging Attitude, Overall Attitude and Adverse Attitude.
2) Perceived Risk
Item risk7 was found to be mis-loaded and was removed before the 2nd iteration. The components identified are Perceived Psychosocial Risk and Perceived Functional Risk.
3) Perceived Behavioral Control
Communalities
Initial Extraction
risk1 1.000 .780
risk2 1.000 .714
risk3 1.000 .803
risk4 1.000 .733
risk5 1.000 .792
risk6 1.000 .607
risk8 1.000 .581
Rotated Component Matrixa
Component
1 2
risk1 .865
risk2 .779
risk3 .882
risk4 .835
risk5 .883
risk6 .747
risk8 .683
KMO and Bartlett's Test
Kaiser-Meyer-Olkin Measure of Sampling Adequacy. .812
Bartlett's Test of Sphericity Approx. Chi-Square 486.059
df 21
Sig. .000
KMO and Bartlett's Test
Kaiser-Meyer-Olkin Measure of Sampling Adequacy. .877
Bartlett's Test of Sphericity Approx. Chi-Square 622.216
df 10
Sig. .000
24 | P a g e
All loadings found were clear loadings. The single component identified is Perceived Behavioral Control.
4) Moral Obligation
Item mo5r and mo7r were found to be mis-loaded and were removed before subsequent iterations. The single component identified is Moral Obligation.
Communalities
Initial Extraction
pbc1 1.000 .785
pbc2 1.000 .813
pbc3 1.000 .844
pbc4 1.000 .798
pbc5 1.000 .673
Rotated Component Matrixa
Component
1
pbc1 .886
pbc2 .901
pbc3 .919
pbc4 .893
pbc5 .820
Communalities
Initial Extraction
mo1 1.000 .704
mo2 1.000 .814
mo3 1.000 .786
mo4 1.000 .666
mo6 1.000 .692
mo8 1.000 .787
mo9 1.000 .776
Rotated Component Matrixa
Component
1
mo1 .839
mo2 .902
mo3 .887
mo4 .816
mo6 .832
mo8 .887
mo9 .881
KMO and Bartlett's Test
Kaiser-Meyer-Olkin Measure of Sampling Adequacy. .920
Bartlett's Test of Sphericity Approx. Chi-Square 906.855
df 21
Sig. .000
25 | P a g e
5) Subjective Norms
Item sn6 and sn3r were found to be cross-loaded and single-loaded respectively and were removed in subsequent iterations. The two components identified are Music Piracy Subjective Norms and Digital Piracy Subjective Norms.
6) Computer Efficacy
Communalities
Initial Extraction
sn1 1.000 .741
sn2 1.000 .494
sn4 1.000 .695
sn5 1.000 .673
sn7 1.000 .519
sn8r 1.000 .767
sn9r 1.000 .710
sn10r 1.000 .741
sn11r 1.000 .743
Rotated Component Matrixa
Component
1 2
sn1 .840
sn2 .696
sn4 .792
sn5 .787
sn7 .683
sn8r .861
sn9r .825
sn10r .847
sn11r .851
KMO and Bartlett's Test
Kaiser-Meyer-Olkin Measure of Sampling Adequacy. .816
Bartlett's Test of Sphericity Approx. Chi-Square 702.199
df 36
Sig. .000
KMO and Bartlett's Test
Kaiser-Meyer-Olkin Measure of Sampling Adequacy. .931
Bartlett's Test of Sphericity Approx. Chi-Square 1657.422
df 45
Sig. .000
26 | P a g e
All loadings found were clear loadings. The single component identified is Computer Efficacy.
7) Intention to Commit Digital Piracy
All loadings found were clear loadings. The single component identified is Intention to
Commit Digital Piracy.
Hence, after Factor Loading the components identified are:
I. Encouraging Attitude (Independent)
II. Overall Attitude (Independent)
III. Adverse Attitude (Independent)
Communalities
Initial Extraction
ce1recode 1.000 .661
ce2recode 1.000 .432
ce3recode 1.000 .714
ce4recode 1.000 .843
ce5recode 1.000 .818
ce6recode 1.000 .840
ce7recode 1.000 .808
ce8recode 1.000 .720
ce9recode 1.000 .757
ce10recode 1.000 .713
Rotated Component Matrixa
Component
1
ce1recode .813
ce2recode .657
ce3recode .845
ce4recode .918
ce5recode .904
ce6recode .917
ce7recode .899
ce8recode .849
ce9recode .870
ce10recode .844
Communalities
Initial Extraction
int1 1.000 .840
int2 1.000 .855
int3 1.000 .863
int5Reocode 1.000 .556
Rotated Component Matrixa
Component
1
int1 .917
int2 .925
int3 .929
int5Reocode .745
KMO and Bartlett's Test
Kaiser-Meyer-Olkin Measure of Sampling Adequacy. .820
Bartlett's Test of Sphericity Approx. Chi-Square 455.443
df 6
Sig. .000
27 | P a g e
IV. Perceived Psychosocial risk (Independent)
V. Perceived Functional risk (Independent)
VI. Perceived Behavioral Control (Intermediate)
VII. Moral Obligation (Independent)
VIII. Music Piracy Subjective Norms (Independent)
IX. Digital Piracy Subjective Norms (Independent)
X. Computer Efficacy (Independent)
XI. Intention to commit Digital Piracy (Dependent)
4. Reliability Analysis
Reliability is concerned with consistency, accuracy and predictability of the scale. It refers to the
extent to which a measurement process is free from random errors. It also measures the fact that
a scale should consistently reflect the construct. The split-half reliability method is used to assess
reliability of a dataset. The method uses Cronbach alpha coefficient () to measure reliability of
the dataset. Its value must be at least 0.7. In addition to this, only items with value of Corrected
Item-Total Correlation (CITC) at least 0.4 must be considered.
Reliability analysis for each component is as follows:
1) Encouraging Attitude
Reliability Statistics
Cronbach's Alpha N of Items
.961 6
Item-Total Statistics
Scale Mean if
Item Deleted
Scale Variance if
Item Deleted
Corrected Item-
Total Correlation
Cronbach's Alpha
if Item Deleted
att5 18.05 56.886 .875 .954
att6 17.78 55.460 .878 .954
att7 17.69 57.188 .867 .955
att8 17.77 56.112 .891 .952
att9 17.84 57.072 .897 .952
att10 17.57 55.971 .855 .956
28 | P a g e
2) Overall Attitude
3) Adverse Attitude
Reliability Statistics
Cronbach's Alpha N of Items
.914 6
Item-Total Statistics
Scale Mean if
Item Deleted
Scale Variance if
Item Deleted
Corrected Item-
Total Correlation
Cronbach's Alpha
if Item Deleted
att1 20.7320 42.974 .804 .892
att2 20.6797 42.588 .834 .888
att3 20.6078 44.095 .816 .891
att4 20.7190 44.940 .776 .897
att14r 20.6405 45.482 .667 .912
att15r 20.5425 44.474 .672 .912
Reliability Statistics
Cronbach's Alpha N of Items
.925 3
Item-Total Statistics
Scale Mean if
Item Deleted
Scale Variance if
Item Deleted
Corrected Item-
Total Correlation
Cronbach's Alpha
if Item Deleted
att11r 9.3856 10.607 .809 .922
att12r 9.0654 9.851 .882 .863
att13r 9.0784 9.770 .853 .887
29 | P a g e
4) Perceived Psychosocial risk
5) Perceived Functional Risk
Reliability Statistics
Cronbach's Alpha N of Items
.834 4
Item-Total Statistics
Scale Mean if
Item Deleted
Scale Variance if
Item Deleted
Corrected Item-
Total Correlation
Cronbach's Alpha
if Item Deleted
risk4 7.38 5.408 .704 .772
risk5 7.53 5.659 .751 .752
risk6 7.54 6.171 .610 .813
risk8 7.27 6.082 .597 .819
Reliability Statistics
Cronbach's Alpha N of Items
.843 3
Item-Total Statistics
Scale Mean if
Item Deleted
Scale Variance if
Item Deleted
Corrected Item-
Total Correlation
Cronbach's Alpha
if Item Deleted
risk1 5.78 3.056 .724 .768
risk2 5.82 3.041 .674 .815
risk3 5.88 2.886 .729 .761
30 | P a g e
6) Perceived Behavioral Control
7) Moral Obligation
Reliability Statistics
Cronbach's Alpha N of Items
.930 5
Item-Total Statistics
Scale Mean if
Item Deleted
Scale Variance if
Item Deleted
Corrected Item-
Total Correlation
Cronbach's Alpha
if Item Deleted
pbc1 14.03 35.907 .815 .914
pbc2 13.97 34.466 .838 .909
pbc3 14.01 33.829 .865 .904
pbc4 13.88 34.828 .830 .911
pbc5 14.07 35.949 .731 .930
Reliability Statistics
Cronbach's Alpha N of Items
.943 7
Item-Total Statistics
Scale Mean if
Item Deleted
Scale Variance if
Item Deleted
Corrected Item-
Total Correlation
Cronbach's Alpha
if Item Deleted
mo1 22.71 64.972 .782 .937
mo2 22.50 63.581 .860 .930
mo3 22.39 63.529 .840 .931
mo4 22.63 66.538 .751 .939
mo6 22.65 65.085 .772 .938
mo8 22.56 64.670 .840 .932
mo9 22.37 64.814 .831 .932
31 | P a g e
8) Music Piracy Subjective Norms
9) Digital Piracy Subjective Norms
Reliability Statistics
Cronbach's Alpha N of Items
.885 4
Item-Total Statistics
Scale Mean if
Item Deleted
Scale Variance if
Item Deleted
Corrected Item-
Total Correlation
Cronbach's Alpha
if Item Deleted
sn8r 14.1046 12.950 .762 .847
sn9r 14.1765 13.791 .715 .864
sn10r 13.9150 12.223 .748 .854
sn11r 13.8627 13.132 .777 .841
Reliability Statistics
Cronbach's Alpha N of Items
.835 5
Item-Total Statistics
Scale Mean if
Item Deleted
Scale Variance if
Item Deleted
Corrected Item-
Total Correlation
Cronbach's Alpha
if Item Deleted
sn1 17.60 18.241 .748 .768
sn2 17.64 21.298 .475 .846
sn4 17.34 19.371 .709 .782
sn5 17.54 19.447 .692 .786
sn7 17.30 20.264 .570 .820
32 | P a g e
10) Computer Efficacy
11) Intention to commit Digital Piracy
None of the items in all 11 constructs were found to be unreliable.
Reliability Statistics
Cronbach's Alpha N of Items
.957 10
Item-Total Statistics
Scale Mean if
Item Deleted
Scale Variance
if Item Deleted
Corrected Item-
Total Correlation
Cronbach's Alpha
if Item Deleted
ce1recode 60.2614 395.839 .780 .954
ce2recode 60.4706 409.672 .605 .961
ce3recode 60.1111 392.560 .812 .953
ce4recode 59.7908 384.193 .889 .950
ce5recode 59.6863 390.546 .874 .950
ce6recode 59.6667 390.500 .887 .950
ce7recode 59.6405 392.705 .866 .951
ce8recode 59.6536 401.557 .806 .953
ce9recode 59.5556 389.025 .828 .952
ce10recode 59.5163 390.593 .800 .953
Reliability Statistics
Cronbach's Alpha N of Items
.879 4
Item-Total Statistics
Scale Mean if
Item Deleted
Scale Variance
if Item Deleted
Corrected Item-
Total Correlation
Cronbach's Alpha
if Item Deleted
int1 7.7974 21.018 .802 .820
int2 8.6078 25.279 .835 .839
int3 8.0523 20.208 .844 .802
int5Reocode 9.8758 20.438 .606 .920
33 | P a g e
5. Regression Analysis
Regression analysis is a statistical process for estimating the relationships among variables. Regression analysis is also used to understand which among the independent variables are related to the dependent variable, and to explore the forms of these relationships. In restricted circumstances, regression analysis can be used to infer causal relationships between the independent and dependent variables. Multiple regression is an extension of simple linear regression. It is used when we want to predict the value of a variable based on the value of two or more other variables. The variable we want to predict is called the dependent variable (or sometimes, the outcome, target or criterion variable). The variables we are using to predict the value of the dependent variable are called the independent variables (or sometimes, the predictor, explanatory or regressor variables). Multiple regression also allows you to determine the overall fit (variance explained) of the model and the relative contribution of each of the predictors to the total variance explained. We have used multiple regression to find out overall impact of all independent variables on the dependent variable. Spss software also gives individual contribution of each variable in the overall impact. Before doing regression, we found out sum of reliable items for each construct so as to use those values for regression analysis.
Regression Analysis to measure impact of Moral Obligation and Computer Efficacy on Perceived Behavioral Control:
Model Summary
Model R R Square Adjusted R Square Std. Error of the Estimate
1 .645a .415 .408 5.64185 a. Predictors: (Constant), CE_tot, MO_tot
ANOVAa
Model Sum of Squares df Mean Square F Sig.
1 Regression 3393.662 2 1696.831 53.30
8
.000b
Residual 4774.573 150 31.830
Total 8168.235 152
a. Dependent Variable: PBC_tot b. Predictors: (Constant), CE_tot, MO_tot
Coefficientsa
Model Unstandardized Coefficients Standardized
Coefficients
t Sig.
B Std. Error Beta
1 (Constant) 9.580 2.171 4.413 .000
MO_tot .456 .050 .581 9.103 .000
CE_tot -.061 .021 -.184 -2.883 .005 a. Dependent Variable: PBC_tot
34 | P a g e
The items which are significant are shown in Green whereas the items which are not significant
(Sig > 0.05) are shown in Red.
The R2 value of .415 shown in the Model summary table imply 41.5% impact of the independent
variables on the dependent variable.
The coefficient table gives each independent variable’s individual coefficient in the regression
equation.
Regression Analysis to measure impact of:
Encouraging Attitude (Independent)
Overall Attitude (Independent)
Adverse Attitude (Independent)
Perceived Psychosocial risk (Independent)
Perceived Functional risk (Independent)
Perceived Behavioral Control (Independent)
Music Piracy Subjective Norms (Independent)
Digital Piracy Subjective Norms (Independent) on
Intention to commit Digital Piracy (Dependent)
Model Summary
Model R R Square Adjusted R Square Std. Error of the Estimate
1 .778a .605 .583 3.93360 a. Predictors: (Constant), DPSN_tot, AA_tot, PBC_tot, MPSN_tot, PFR_tot, EA_tot, PPSR_tot, OA_tot
ANOVAa
Model Sum of
Squares
df Mean
Square
F Sig.
1 Regression 3417.634 8 427.204 27.609 .000b
Residual 2228.144 144 15.473
Total 5645.778 152
a. Dependent Variable: Int_tot
b. Predictors: (Constant), DPSN_tot, AA_tot, PBC_tot, MPSN_tot, PFR_tot, EA_tot, PPSR_tot, OA_tot
35 | P a g e
Coefficientsa
Model Unstandardized
Coefficients
Standardized
Coefficients
t Sig.
B Std. Error Beta
1 (Constant) 5.191 3.768 1.378 .170
EA_tot .084 .051 .124 1.638 .104
OA_tot .248 .069 .321 3.598 .000
AA_tot -.017 .072 -.013 -.237 .813
PPSR_tot .294 .151 .151 1.942 .054
PFR_tot -.023 .171 -.009 -.132 .895
PBC_tot -.400 .057 -.482 -6.975 .000
MPSN_tot .053 .085 .041 .625 .533
DPSN_tot .085 .074 .076 1.138 .257
a. Dependent Variable: Int_tot
The items which are significant are shown in Green whereas the items which are not significant (Sig
> 0.05) are shown in Red.
The R2 value of .605 shown in the Model summary table imply 60.5% impact of the independent
variables on the dependent variable.
The coefficient table gives each independent variable’s individual coefficient in the regression
equation.
36 | P a g e
Final Research Model
Encouraging Attitude to commit Piracy
Overall Attitude to commit Piracy
Adverse Attitude to commit Piracy
Attitude
Perceived Psycho-social Risk
Perceived Functional Risk
Perceived Risk
Music Piracy Subjective Norms
Digital Piracy Subjective Norms
Subjective Norms
Perceived Behavioral Control
Moral Obligation
Computer Efficacy
Intention to Commit Digital Piracy
37 | P a g e
Implications of the Study Findings
We started out by trying to measure what factors influence an individual’s intention to commit digital
piracy. The research methodology followed was a survey and analysis of the data to relate various
constructs derived it to the intention to commit digital piracy. The major variables which were found
to have a significant impact on the intention to commit digital piracy are:
1. Overall Attitude towards Digital Piracy
The overall attitude towards digital piracy is a dimension of attitude towards digital piracy.
This construct was created after factor analysis of attitude towards digital piracy. This
construct contained questions which pertained to the general attitude of an individual
towards digital piracy. This construct is thus important to measure how any individual sees
digital piracy and thus has an affect towards piracy.
Attitude as defined by Carl Jung (Jung, 1921) is a “readiness of the psyche to act or react in a
certain way”. Attitude can be classified into explicit or implicit and it is formed over a period
of time due to past experiences. The ways in which attitude impacts actual action/behavior
was propounded by Fishben and Icek, (1975, 1980) in the theory of reasoned action. This
shows that any changes in attitude can lead to a corresponding change in behavioral
intentions. From our survey analysis results, we too can conclude that there is a significant
impact of overall attitude towards digital piracy on intention to commit digital piracy.
2. Perceived Behavioral Control
Perceived behavioral control is an individual's perceived ease or difficulty of performing the
particular behavior (Ajzen, 1991). It is assumed that perceived behavioral control is
determined by the total set of accessible control beliefs.
Control beliefs are an individual's beliefs about the presence of factors that may facilitate or
impede performance of the behavior (Ajzen, 2001). The concept of perceived behavioral
control is conceptually related to self-efficacy. Now in our model perceived behavioral control
is again impacted by moral obligation and computer efficacy. This will help narrow the
specifics of perceived behavioral control to the scope of our research.
From the survey analysis and results, we can conclude that both moral obligation and
computer efficacy have significant impact on perceived behavioral control. Perceived
behavioral control in turn has a significant impact on the intention to commit digital piracy.
As we have proved that these constructs are significant, we can now evaluate as to how to
manipulate them to ensure reduction in the intention to commit digital piracy.
3. Perceived Psychosocial risk
The perceived psycho-social risk is a dimension of perceived risk. This construct was created
after factor analysis of perceived risk. The actual psychosocial risk is defined by the risk which
a person experiences when the uncertainty of any situation he/she is in may have uncertain
38 | P a g e
outcomes on the psychological or social ends. The perceived psychosocial risk is a
combination of social and psychological risk as proposed by Jacoby and Kaplan (1972). As per
our model, this perceived psychosocial risk is a characteristic in which individuals will be
concerned about what they themselves and their immediate peers/loved ones will think of
them in case they are exposed to be indulging in digital piracy. This perception of risk, if found
to be high, inhibits most people from indulging in digital piracy.
Thus according to our results, people will be likely to change their intent to commit digital piracy if
there is a change in their overall attitude to digital piracy, their moral obligation and their perceived
psychosocial risk from piracy.
To combat piracy, two popular methods have been employed: preventives and deterrents.
Preventives impede the act of piracy by making it very hard to do so. The idea is to make the pirates
expend so much effort that it will wear them down, and eventually they will not want to do it.
Deterrents, on the other hand, use the threat of undesirable consequences (mostly legal sanctions)
to prevent piracy (Gopal and Sanders, 1997). Unfortunately, none of these strategies seem to be
working; this is evident by amount of losses published by the Business Software Alliance (BSA) in the
last few years (the Asia/Pacific area had piracy loses increase from $2.7 Billion in 1998 to $4.7 Billion
in 2001 according to the BSA) and the expected increases in non-software piracy.
Instead of relying solely on preventives and deterrents, knowing what might influence individuals to
pirate would be a more advantageous path. The most salient belief within cognitive beliefs was that
subjects believed that they could save money by pirating digital media. Another related and
significant salient belief was that subjects believed that digital media is overpriced. There has been a
move recently to lower the price of digital media to curb piracy. By lowering the prices, digital pirates
will reexamine the cost of pirating versus buying and hopefully tilt the balance towards buying versus
pirating (Cheng et al., 1997). Another avenue that might also be worthwhile pursuing is to better
educate the public on why these prices should be the way they are (by explaining the different costs
associated with making/promoting digital media).
First, this study reveals that moral obligation is one of the most influential factor on intention to
commit digital piracy. According to Reidenbach and Robin (1990), a popular understanding of these
normative beliefs comes to the general public. Therefore, it is desirable to enlighten people and
imprint into their minds the fact that pirating is morally wrong and it is bad behavior through
advertisements in the mass media, such as via TV broadcasting.
Second, perceived behavioral control is a more influential factor in pirating digital materials. It means
that individuals who have the skills and resources to pirate digital materials have a higher intention
of pirate digital materials. Therefore, in order to make pirating a much more difficult thing to
accomplish for such people, software and digital media industries should use technologies actively
to secure their digital materials, such as DRM (digital rights management).
Thirdly, overall attitude were also found to affect intention to commit digital piracy. This result
verifies the fact that the importance of attitude on actual behavior may vary depending on how long
an individual has been pirating software (Limayem et al., 2004). In order to break the habit of digital
39 | P a g e
pirating, it is desirable to enforce copyright laws and to increase individuals’ awareness of the
potential severity and certainty of punishment.
Finally, the above point and associated awareness among people that piracy is bad for the society’s
welfare will increase the perceived psychosocial risk among individuals. Thus, their overall intention
to commit digital piracy will come down significantly and this will lead to alleviation in the global
problem of digital piracy.
Now looking at the implications for a B-School where we saw intention to commit digital piracy as a
surrogate measure of ethical behavior. We find that since the actual intention to commit is moderate
(11/28 median) along with high computer efficacy scores of 69 (median) out of 100, we feel that
there is a moderate intention to commit digital piracy due to higher perceived behavioral control
(median is 17 out of max 35) due to moral obligation scores being higher (median is 26 out of max
49). Thus there is moderate possibility that the B-school will be showing some unethical behavior in
their lifetimes. However, piracy behavior can be curbed even in campuses by implementing the above
suggestions.
40 | P a g e
References
1. S.J Brecker , “Empirical Validation of affect, Behavior, and Cognition as distinct components
of attitude, ”Journal of Personality and Social Psychology, May 1984, pp. 1191-1205
2. Ajzen, I.: 1985, 'From Intentions to Behavior: A Theory of Planned Behavior', in J. Kuhl & J.
Beckman (eds.), Action-Control: From Cognition to Behavior (Springer, Heidelberg), pp. 11-39.
3. Ajzen, I.: 1991, 'The Theory of Planned Behavior', Organizational Behavior and Human
Decision Processes 50(1), 179-211
4. Ajzen, I.: 2001, 'Nature and Operations of Attitudes', Annual Review of Psychology 52, 27-58.
5. Bodur, H. and D. Brinberg: 2000, 'Belief, Affect, and Attitude: Alternative Models of the
Determinants of Attitude', journal of Consumer Psychology 9(1), 17-28.
6. Fishbein, M. and I. Ajzen: 1975, Attitude, Intention, and Behavior: An Introduction to Theory
and Research (Addison-Wesley, Reading, MA).
7. Cronan, T. P. and S. Al-Rafee: 2008, ‘Factors that Influence the Intention to Pirate Software
and Media’, Journal of Business Ethics 78(4), 527–545.
8. Haines, R. and L. N. K. Leonard: 2007, ‘Situational Influences on Ethical Decision-Making in an
IT Context’, Information and Management 44(3), 313–320.
9. Peace, G., D. Galletta and L. Thong: 2003, ‘Software Piracy in the Workplace: A Model and
Empirical Test’, Journal of Management Information Systems 20(1), 153–177.
10. Randall, D. and A. Gibson: 1991, _Ethical Decision Making in the Medical Profession: An
Application of the Theory of Planned Behavior, Journal of Business Ethics 10, 111–122.
11. Kurland, N.: 1995, _Ethical Intentions and the Theories of Reasoned Action and Planned
Behavior, Journal of Applied Social Psychology 25(4), 297–313.
12. Chen, Y., R. Shang and A. Lin: 2008, ‘The Intention to Download Music Files in a P2P
Environment: Consumption Value, Fashion, and Ethical Decision Perspectives’, Electronic
Commerce Research and Applications 7(4), 411–422.
13. Bauer, R.A.: 1960, 'Consumer Behavior as Risk Taking', in R. S. Hancock (ed.), Dynamic
Marketing for a Changing World. Proceedings of the 43rd National Conference of the
American Marketing Association, pp. 389-398. Business Software
14. Featherman, M. S., J. S. Valacich D. Wells: 2006, 'Is that Authentic or Artificial? Understanding
Consumer Perceptions of Risk in E-Service Encounters', Information Systems Journal 16(2),
107-134.
15. Campbell, M. C. and R. C. Goodstein: 2001, The Moderating Effect of Perceived Risk on
Consumers' Evaluations of Product Incongruity: Preference for the Norm', The Journal of
Consumer Research 28(3), 439 449.
16. Dowling, G. R. and R. Staelin: 1994, 'A Model of Perceived Risk and Intended Risk-Handling
Activity', The Journal of Consumer Research 21(1), 119-134.
17. Havlena, W. J. and W. S. DeSarbo: 1991, 'On the Measurement of Perceived Consumer Risk',
Decision Sciences 22(4), 927-939.
41 | P a g e
18. Fraedrich, J. P. and O. C. Ferrell: 1992, The Impact of Perceived Risk and Moral Philosophy
Type on Ethical Decision Making in Business Organizations', Journal of Business Research
24(4), 283-295.
19. Jacoby, J. and L. B. Kaplan: 1972, The Components of Perceived Risk. Proceedings of the 3rd
Annual Conference, Association for Consumer Research, pp. 382-393.
20. Tan, B.: 2002, 'Understanding Consumer Ethical Decision Making with Respect to Purchase of
Pirated Software', Journal of Consumer Marketing 19(2/3), 96-111.
21. Fishbein, M. and Ajzen, I. Belief, Attitude, Intention and Behavior: An Introduction to Theory
and Research, Addison-Wesley, Reading, MA, 1975.
22. Bandura, A., Adams, N.E., and Beyer, J. "Cognitive Processes Mediating Behavioral Change,"
Journal of Personality and Social Psychology (35:3), March 1977, pp. 125-139.
23. Betz, N.E. and Hackett, G. "The Relationships of Career-related Self-efficacy Expectations to
Perceived Career Options in College Women and Men," Journal of Counseling Psychology
(28:5), 1981, pp. 399-410.
24. Barling, J. and Beattie, R. "Self-efficacy Beliefs and Sales Performance," Journal of
Organizational Behavior Management (5), 1983, pp. 41-51.
25. Brown, I., Jr., and Inouye, D.K. "Learned Helplessness Through Modeling: The Role of
Perceived Similarity in Competence," Journal of Personality and Social Psychology (36:8),
1978, pp. 900-908.
26. Stumpf, S.A., Brief, A.P., and Hartman, K. "Self-efficacy Expectations and Coping with Career-
related Events," Journal of Vocational Behavior (31:2), 1987, pp. 91-108.
27. Collins, J.L. Self-efficacy and Ability in Achievement Behavior, unpublished doctoral
dissertation, Stanford University, Stanford, CA, 1985.
28. Taylor, M.S., Locke, E.A., Lee, C., and Gist, M.E. "Type A Behavior and Faculty Re-search
Productivity: What are the Mechanisms," Organizational Behavior and Human Performance
(34:3), 1984, pp. 402-418.
29. Schunk, D.H. "Modeling and Attributional Effects on Children's Achievement: A Self-efficacy
Analysis," Journal of Educational Psychology (73), 1981, pp. 93-105.
30. Wood, R. and Bandura, A. "Social Cognitive Theory of Organizational Management," Academy
of Management Review (14:3), 1989, pp. 361-384.
31. Burkhardt, M.E. and Brass, D.J. "Changing Patterns or Patterns of Change: The Effects of a
Change in Technology on Social Network Structure and Power," Administrative Science
Quarterly (35:1), March 1990, pp.104- 127.
32. Gist, M.E., Schwoerer, C.E., and Rosen, B. "Effects of Alternative Training Methods on Self-
efficacy and Performance in Computer Software Training," Journal of Applied Psychology
(74:6), 1989, pp. 884-891.
33. Hill, T., Smith, N.D., and Mann, M.F. "Communicating Innovations: Convincing Computer
Phobics to Adopt Innovative Technologies," in Advances in Consumer Research, Volume 13,
R.J. Lutz (ed.), Association for Consumer Research; Provo, UT, 1986, pp. 419-422.
34. Webster, J. and Martocchio, J.J. "Microcomputer Playfulness: Development of a Measure
With Workplace Implications," MIS Quarterly (16:2), June 1992, pp. 201-226.
42 | P a g e
35. Webster, J. and Martocchio, J.J. "Turning Work into Play: Implications for Microcomputer
Software Training," Journal of Management, March 1993.
36. Hill, T., Smith, N.D., and Mann, M.F. "Role of Efficacy Expectations in Predicting the Decision
to Use Advanced Technologies: The Case of Computers," Journal of Applied Psychology (72:2),
1987, pp. 307-313.
37. Tan (2002) proposed an integrative model that interrelates various behavioral theories related to software piracy and empirically tested the hypothesized relationships.
38. Limayem M., Khalifa M., et al.: 1999, 'Factors Motivating Software Piracy: A Longitudinal Study', Proceedings of the International Conference on Information Systems, pp 124-131.
39. Tan, B.: 2002, 'Understanding Consumer Ethical Decision Making with respect to Purchase of Pirated Software', The Journal of Consumer Marketing 19(2/3), 96-111.
40. Madden, T. and P. Ellen, et al.: 1992, 'A Comparison of the Theory of Planned Behavior and the Theory of Reasoned Action', Personality and Social Psychology Bulletin 18, 3-9.
41. Fishbein, M. and I. Ajzen: 1975, Attitude, Intention, and Behavior: An Introduction to Theory and Research (Reading, MA).
42. Bhattacharjee, S. and R. Gopal, et al.: 2003, 'Digital Music and Online Sharing: Software Piracy
2.0', Communication of the ACM 46(7), 107-111.
43. Straub, D. and R. Collins: 1990, 'Key Information Liability Issues Facing Managers: Software
Piracy, Proprietary Databases, and Individual Right to Privacy', MIS Quarterly June), 143-156.
44. Anderson, R. and D. Johnson, et al.: 1993, 'Using the New ACM Code of Ethics in Decision
Making', Communications of the ACM 36(2), 98-107.
45. Bagozzi, R., H. Baumgartner and L. Yi: 1992, 'State versus Action Orientation and the Theory
of Reasoned Action: An Application to Coupon Usage', Journal of Consumer Research 18(4),
505-517.
46. Hagger, M., N. Chatzisarantis and S. Biddle: 2002, 'A Meta-Analytic Review of the Theories of
reasoned Action and Planned Behavior in Physical Activity: Predictive Validity and the
Contribution of Additional Variables', Journal of Sport & Exercise Psychology 24, 3-32.
47. Bamberg, S., I. Ajzen and P. Schmidt: 2003, 'Choice of Travel Mode in the Theory of Planned
Behavior: The Roles of Past Behavior, Habit, and Reasoned Action', Basic and Applied Social
Psychology 25(3), 175-187.
48. Conner, M. and C. Armitage: 1998, 'Extending the Theory of Planned Behavior: A Review and
Avenues for Further Research', Journal of Applied Social Psychology 28(15), 1429-1464.
49. Crowne, Douglas P. and Marlowe, David: 1960, ‘A new scale of social desirability independent
of psychopathology’, Journal of Consulting Psychology, Vol 24(4), 349-354.
50. http://www.ats.ucla.edu/stat/seminars/muthen_08/part2.pdf 51. http://en.wikipedia.org/wiki/Skewness 52. http://en.wikipedia.org/wiki/Kurtosis 53. https://statistics.laerd.com/spss-tutorials/multiple-regression-using-spss-statistics.php 54. http://en.wikipedia.org/wiki/Regression_analysis
44 | P a g e
Appendix-2
Computer Efficacy items recoded to ceXXrecoded
Rule: Old Value=11, New Value=0;
ELSE Copy
Appendix-3
Int5 recoded to int5Recode and sum calculated for Regression
Rule: Old Value=SYSMIS, New Value=0;
Old Value=MISSING, New Value=0;
ELSE, Copy
46 | P a g e
Appendix-5
Questionnaire
Attitude towards piracy (7 point Likert scale)
1. Overall attitude towards digital piracy (Unfavorable……………………………….Favorable) 2. Overall attitude towards digital piracy (Harmful………………………………………….Beneficial) 3. Overall attitude towards digital piracy (Foolish………………………………..Wise) 4. Overall attitude towards digital piracy (Bad……………………………Good) 5. I feel elated when I pirate digital material (Not at all……………………………… Very much so) 6. I feel excited when I pirate digital material (Not at all……………………………… Very much so) 7. I feel active when I pirate digital material (Not at all……………………………… Very much so) 8. I feel happy when I pirate digital material (Not at all……………………………… Very much so) 9. I feel pleased when I pirate digital material (Not at all……………………………… Very much so) 10. I feel satisfied when I pirate digital material (Not at all……………………………… Very much so) 11. I feel anxious when I pirate digital material (Not at all……………………………… Very much so) 12. I feel fearful when I pirate digital material (Not at all……………………………… Very much so) 13. I feel nervous when I pirate digital material (Not at all……………………………… Very much so) 14. Using copied software is a bad idea (Strongly disagree …………….. strongly agree=7) 15. I dislike the idea of using copied software (Strongly disagree …………….. strongly agree=7) 16. Using copied software is a wise idea (Strongly disagree …………….. strongly agree=7)
Perceived Risk (5 point Likert scale)
1. What is the probability that pirated software will fail to work like the original one? (very
low/very high)
2. What is the probability that pirated software will malfunction or damage your computer
system? (very low/very high)
3. What is the probability that pirated software will fail to function? (very low/very high)
4. If your friends, relatives or associates are aware that you have used pirated software, what is
the probability that they will look down on you because they think that you cannot afford
original software? (very low/very high)
5. If your friends, relatives or associates are aware that you have used pirated software, what is
the probability that you will lose their respect because they will regard you as unethical? (very
low/very high)
6. If you have used pirated software, what is the probability that you will be caught for the
infringement of copy right law? (very low/very high)
7. You may be arrested for infringement of copyright law if you have used pirated software,
(strongly disagree/strongly agree)
8. Using pirated software makes me feel psychologically uncomfortable, (strongly
disagree/strongly agree)
9. Using pirated software gives me a feeling of unwanted anxiety, (strongly dis agree/strongly
agree)
10. Using pirated software causes me to experience unnecessary tension, (strongly dis
agree/strongly agree)
47 | P a g e
Perceived behavioral control (7 point Likert scale)
1. For me to pirate digital material, it would be (Very Easy to Very Difficult)
2. If I wanted to, I could easily pirate digital material (Strongly Agree to Strongly Disagree)
3. I believe that I have the ability to pirate digital material (Strongly Agree to Strongly Disagree)
4. I have the resources necessary to pirate digital material (Strongly Agree to Strongly
Disagree)
5. I can find digital material to pirate if I wanted to (Strongly Agree to Strongly Disagree)
Moral Obligation (7 point Likert scale)
1. I would feel guilty if I pirated digital products (Strongly disagree/ strongly agree)
2. To pirate digital products goes against my principles (Strongly disagree/ strongly agree)
3. It would be morally wrong for me to pirate digital products (Strongly disagree/ strongly
agree)
4. It is my obligation as a personal computer user not to copy software (Strongly disagree/
strongly agree)
5. I would not feel guilty if I used copied software (Strongly disagree/ strongly agree)
6. I would feel guilty if I copied software (Strongly disagree/ strongly agree)
7. I would not feel guilty if I pirated digital material (Strongly disagree/ strongly agree)
8. Digital piracy goes against my principles (Strongly disagree/ strongly agree)
9. It would be morally wrong to pirate digital material (Strongly disagree/ strongly agree)
Subjective Norms (7 point Likert scale)
1. Most people who are important to me think I should not pirate digital material (Strongly Agree/ Strongly Disagree)
2. When considering digital piracy, I wish to do what people who are important to me want me to do (Strongly Agree/ Strongly Disagree)
3. If I pirate digital material, then most people who are important to me would (Not Care/ Disapprove)
4. If I pirated digital products, most of the people who are important to me would disapprove (Strongly agree/ strongly disagree)
5. Most people who are important to me would look down on me if I pirated digital products (Strongly agree/ strongly disagree)
6. No one who is important to me thinks it is okay to commit digital piracy (Strongly agree/ strongly disagree)
7. My colleagues think digital piracy behavior is wrong (Strongly agree/ strongly disagree) 8. Most people who are important to me think that I should download music. (Strongly agree/
strongly disagree)
9. The people in my life whose opinions I value would think that I should download music
(Strongly agree/ strongly disagree)
48 | P a g e
10. Most people who are important to me often download music (Strongly agree/ strongly
disagree)
11. The people in my life whose opinions I value often download music (Strongly agree/ strongly
disagree)
Intention to commit digital piracy (7 point Likert scale except Q4)
1. I intend to pirate digital material in the near future (Definitely do not to Definitely do)
2. I will try to pirate digital material in the near future (Definitely will not to Definitely will)
3. I will make an effort to pirate digital material in the near future (Definitely False to Definitely
True)
4. I have pirated digital material in the past (Yes and No)
5. How much digital material did you pirate? (skip if you answered no in the last one) (Very Little to A lot)
Social-Desirability Scale (5 point Likert scale)
1. There have been occasions when I took advantage of someone.
2. I sometimes try to get even rather than forgive and forget.
3. At times I have really insisted on having things my own way.
4. I like to gossip at times.
5. I have never deliberately said something that hurt someone’s feelings.
6. I’m always willing to admit when I make a mistake.
Computer Efficacy (10 point Likert scale)
Often in our jobs we are told about software packages that are available to make work easier. For
the following questions, imagine that you were given a new software package for some aspect of
your work. It doesn't matter specifically what this software package does, only that it is intended to
make your job easier and that you have never used it before
I could complete the job using the software package...
1. ...if there was no one around to tell me what to do as I go.
2. ...if I had never used a package like it before.
3. ...if I had only the software manuals for reference.
4. ...if I had seen someone else using it before trying it myself.
5. ...if I could call someone for help if I got stuck.
6. ...if someone else had helped me get started.
7. ...if I had a lot of time to complete the job for which the software was provided.
8. ...if I had just the built-in help facility for assistance.
9. ...if someone showed me how to do it first.
10. ...if I had used similar packages before this one to do the same job.
49 | P a g e
Demographic Questions
College (If XLRI, mandatory Roll No, otherwise optional Roll No)
Age (<20, 21-25, 26-30, >30)
Gender
Download frequency per month (0-50 times, 51-100 times, 100-200 times, >200 times)
Major Download Category (Educational Materials, Movies, Songs, Software, Games, Others)
Years of full-time work experience (<1, 1-2, 2-3, >3)
Qualtrics Credentials
Username: [email protected]
Password: aaaaa12359
Survey Name: CompleteSurvey v2