Investigating Software Piracy in Jordan: An Extension of the Theory of Reasoned Action

Software piracy, the illegal and unauthorized duplication, sale, or distribution of software, is a widespread and costly phenomenon. According to Business Software Alliance (2008), over 41% of the PC software packages installed worldwide were unauthorized copies. Software piracy behavior has been in...

Full description

Saved in:
Bibliographic Details
Published inJournal of business ethics Vol. 98; no. 4; pp. 663 - 676
Main Authors Aleassa, Hassan, Pearson, John Michael, McClurg, Scott
Format Journal Article
LanguageEnglish
Published Dordrecht Springer 01.02.2011
Springer Netherlands
Springer Nature B.V
SeriesJournal of Business Ethics
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:Software piracy, the illegal and unauthorized duplication, sale, or distribution of software, is a widespread and costly phenomenon. According to Business Software Alliance (2008), over 41% of the PC software packages installed worldwide were unauthorized copies. Software piracy behavior has been investigated for more than 30 years. However, after a review of the relevant literature, there appears to be two voids in this literature: a lack of studies in non-Western countries and a scarcity of process studies. This study contributes to literature by developing a software piracy model to better understand the decision-making process that underlies this unethical behavior. The model was tested using data collected from a sample of 323 undergraduate business students. Consistent with the Theory of Reasoned Action (TRA), attitudes toward software piracy and subjective norms were significant predictors of intention to pirate software. Also, the results suggested that ethical ideology, public self-consciousness, and low self-control moderated the effect of these variables on intention to pirate software. The results have important practical implications for the software industry and governments hoping to curtail software piracy. Limitations of the study and recommendations for future studies are discussed as well.
Bibliography:ObjectType-Article-2
SourceType-Scholarly Journals-1
ObjectType-Feature-1
content type line 23
ObjectType-Article-1
ObjectType-Feature-2
ISSN:0167-4544
1573-0697
DOI:10.1007/s10551-010-0645-4