Switch to: References

Add citations

You must login to add citations.
  1. Theory of Planned Behavior and Ethics Theory in Digital Piracy: An Integrated Model. [REVIEW]Cheolho Yoon - 2011 - Journal of Business Ethics 100 (3):405 - 417.
    Since digital piracy has posed a significant threat to the development of the software industry and the growth of the digital media industry, it has, for the last decade, held considerable interest for researchers and practitioners. This article will propose an integrated model that combines the theory of planned behavior (TPB) and ethics theory, the two theories that are most often used in digital piracy studies. Data were obtained from university students in China, and the model was examined using the (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   20 citations  
  • Ethical consumer decision‐making: The role of need for cognition and affective responses.Omneya Mokhtar Yacout & Scott Vitell - 2018 - Business Ethics: A European Review 27 (2):178-194.
    Most of the academic research in the field of consumer ethics has focused on the cognitive antecedents and processes of unethical consumer behavior. However, the specific roles of discrete emotions such as fear have not yet been investigated thoroughly. This research examines the role of the need for cognition, the three affective responses—fear, power, and excitement—and perceived issue importance on moral intensity, ethical perceptions, and ethical intentions for four types of unethical consumer behaviors. A sample of consumers from the two (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   9 citations  
  • Untying Moral Efficacy and Meaningfulness in Promoting Students’ Social Entrepreneurial Intentions: The Mediating Role of Positive Reciprocity.Jian Xiang & Yanjun Zhang - 2022 - Frontiers in Psychology 13.
    This study chooses to describe social entrepreneurship as a social mission that enables business students to identify opportunities to launch start-ups and social enterprises by understanding the nature of social responsibility and fostering a reciprocal attitude to solve social issues. We collected data on students from different business schools in mainland China through a structured questionnaire and analyzed them through structural equation modeling. The results show that moral efficacy and meaningfulness are positively related to positive reciprocity, which leads to students’ (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  • The association of moral development and moral intensity with music piracy.Darryl J. Woolley - 2015 - Ethics and Information Technology 17 (3):211-218.
    Prior research has not found a meaningful relationship between digital piracy and moral development, possibly because students do not recognize digital piracy as a moral issue. Rather than measure moral development as an individual characteristic, this study tests which components of moral development are seen as relevant to digital piracy. If some of the stages of moral development are applicable to music piracy behavior, people are more likely to pirate than to engage in other more morally intense behaviors. Some of (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  • Pirate or Buy? The Moderating Effect of Idolatry.Chia-Chen Wang, Chin-ta Chen, Shu-Chen Yang & Cheng-Kiang Farn - 2009 - Journal of Business Ethics 90 (1):81-93.
    Due to the development of information technology, music piracy has become an escalating problem. This study attempts to employ the theory of planned behavior (TPB) and the social identity theory to investigate the antecedents of downloading pop music illegally from the Internet, the relationship between the intention to illegally download music and the intention to buy music, and the moderating effects of idolatry. Data were collected from 350 teenagers in Northern Taiwan through questionnaire interviews conducted in city centers where teenagers (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  • Exploring Factors Affecting Digital Piracy Using the Norm Activation and UTAUT Models: The Role of National Culture.Godwin Udo, Kallol Bagchi & Moutusy Maity - 2016 - Journal of Business Ethics 135 (3):517-541.
    We develop and use an integrated individual-level model to explain the driving forces behind digital piracy practice in two nations. The proposed model combines the Norm Activation model and Unified Theory of Acceptance and Use of Technology models. This study also explores the effect of culture on intention to practice DP in two nations: US and India. A survey instrument was used to collect data from 231 US and 331 Indian participants. Use of the integrated model proves to be a (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  • Comparing software piracy in South Africa and Zambia using social cognitive theory.Andrew Thatcher & Mary Matthews - 2012 - African Journal of Business Ethics 6 (1):1.
  • Do I want to pay to download movies.Sunghan Ryu & Byungho Park - 2018 - Journal of Information, Communication and Ethics in Society 16 (1):45-60.
    Purpose The purpose of this study is to understand the nature and characteristics of legal movie download services and to explore the factors that influence user acceptance of the services. Design/methodology/approach The authors analyzed the three aspects of legal movie download services and empirically examined how they affect the potential users’ behavioral intent to adopt the services based on the theory of reasoned action. An online survey of 142 respondents about a real legal movie download services, currently operated by a (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  • Illegal Downloading, Ethical Concern, and Illegal Behavior.Kirsten Robertson, Lisa McNeill, James Green & Claire Roberts - 2012 - Journal of Business Ethics 108 (2):215-227.
    Illegally downloading music through peer-topeer networks has persisted in spite of legal action to deter the behavior. This study examines the individual characteristics of downloaders which could explain why they are not dissuaded by messages that downloading is illegal. We compared downloaders to non-downloaders and examined whether downloaders were characterized by less ethical concern, engagement in illegal behavior, and a propensity toward stealing a CD from a music store under varying levels of risk. We also examined whether downloading or individual (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  • Examining intention of digital piracy: an integration of social norms and ethical ideologies.Namkee Park, Naewon Kang & Hyun Sook Oh - 2018 - Journal of Information, Communication and Ethics in Society 16 (2):157-172.
    Purpose This study aims to investigate the applicability of ethical ideologies reflected by two dimensions of moral idealism and relativism, together with social norms, to the context of digital piracy. Design/methodology/approach This study used data from a survey of college students and conducted a series of hierarchical regression analyses. Findings This study found that digital piracy intention was dissimilar among four different ethical groups. Injunctive norm was a critical factor that affected internet users’ intention of digital piracy, yet it was (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  • Does the Type of Cheating Influence Undergraduate Students' Perceptions of Cheating?Kathleen K. Molnar & Marilyn G. Kletke - 2012 - Journal of Academic Ethics 10 (3):201-212.
    There has been a plethora of studies outlying the various factors which may affect undergraduate student cheating, generally focusing on individual, situational and deterrent factors. But beyond these factors, does the type of cheating affect students’ perceptions of cheating? We found that there were differences in regards to gradable cheating such as cheating on homework, tests and papers versus non-gradable cheating such as illegally downloading software/music from the Internet or photocopying materials which violate the university’s academic integrity policy. Gender, discussion (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   9 citations  
  • How ethical and political identifications drive adaptive behavior in the digital piracy context.Dario Miocevic & Ivana Kursan Milakovic - 2022 - Business Ethics, the Environment and Responsibility 32 (1):256-273.
    Today, digital piracy remains a growing challenge for both legislators and businesses operating in the entertainment industry. This study explores when and why consumers make trade-offs between illegal and legal streaming services. By drawing on protection motivation theory, we find that consumers' threat and coping appraisals increase their adaptive behavior, i.e., lower intention to consume illegal and higher intention to consume legal streaming services. We also show that the strength of consumers' inherent ethical (relativism) and political (economic liberalism) identities conditions (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  • Predicting the Use of Pirated Software: A Contingency Model Integrating Perceived Risk with the Theory of Planned Behavior.Chechen Liao, Hong-Nan Lin & Yu-Ping Liu - 2010 - Journal of Business Ethics 91 (2):237-252.
    As software piracy continues to be a threat to the growth of national and global economies, understanding why people continue to use pirated software and learning how to discourage the use of pirated software are urgent and important issues. In addition to applying the theory of planned behavior (TPB) perspective to capture behavioral intention to use pirated software, this paper considers perceived risk as a salient belief influencing attitude and intention toward using pirated software. Four perceived risk components related to (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   18 citations  
  • Ethical Behavioral Intention in an Academic Setting: Models and Predictors.Lori N. K. Leonard, Cynthia K. Riemenschneider & Tracy S. Manly - 2017 - Journal of Academic Ethics 15 (2):141-166.
    This study examines the theory of planned behavior and the multidimensional ethics scale. Variables from both are included to determine which ones significantly correlate with student ethical behavioral intention in an academic setting. Using a survey, responses are collected from undergraduate business students from two southwestern universities in the United States using a scenario-based approach, looking at individual situations and group situations. SmartPLS was used to assess the results for four scenarios. From the theory of planned behavior, attitude was a (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  • Three-Level Mechanism of Consumer Digital Piracy: Development and Cross-Cultural Validation.Mateja Kos Koklic, Monika Kukar-Kinney & Irena Vida - 2016 - Journal of Business Ethics 134 (1):15-27.
    Digital piracy as a continuing problem significantly impacts various stakeholders, including consumers, enterprises, and countries. This study develops a three-level mechanism of determinants of consumer digital piracy behavior, with personal risk as an individual factor, susceptibility to interpersonal influence as an inter-personal factor, and moral intensity as a broad societal factor. Further, it explores the role of rationalization and future piracy intent as outcomes of past piracy behaviors. The authors use survey data from four countries in the European Union to (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  • Perceived risk and digital piracy: a moderated-moderation model.Kian Yeik Koay - 2023 - Journal of Information, Communication and Ethics in Society 21 (4):521-532.
    Purpose This study aims to examine the joint moderating effects of privacy risk and time risk on the relationship between financial risk and intentions to pirate digital products. Design/methodology/approach The author collected data from 247 participants using a survey method. Subsequently, PROCESS macro was used to evaluate the proposed hypotheses. Findings This study found that financial risk does not have a significant relationship with the consumer intention to pirate digital products. However, privacy risk moderates the negative relationship between financial risk (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  • Exploring antecedents of attitude and intention toward Internet piracy among college students in South Korea.Hyoungkoo Khang, Eyun-Jung Ki, In-Kon Park & Seon-Gi Baek - 2012 - Asian Journal of Business Ethics 1 (2):177 - 194.
    Abstracts This study aims to examine the predictors of attitude and intentions toward Internet piracy in South Korea. Also, it intends to suggest a model of Internet piracy demonstrating the casual effects of factors of individual attitude and intentions toward Internet piracy. The results demonstrated that moral obligations and subjective norms are significant predictors of an individual’s attitude toward Internet piracy. Moreover, three factors—moral obligation, perceived behavioral control, and attitude—are essential antecedents of an individual’s intention to engage in Internet piracy. (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  • E-textbook piracy behavior.Sri Rahayu Hijrah Hati, Rahma Fitriasih & Anya Safira - 2019 - Journal of Information, Communication and Ethics in Society 18 (1):105-123.
    Purpose The purpose of this paper is to examine the factors that influence the intention of students to pirate academic e-books by integrating three main theories: ethics theory, deterrence theory, and the theory of planned behavior. The study also examines the moderating role of past piracy behavior on the relationship between the factors in the previously mentioned theories and students’ piracy intention. Design/methodology/approach The data were collected using a convenience sample of 662 university students. Based on their past behaviors, the (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  • Enjoying music and movies without paying: examining factors affecting unauthorized downloading amongst young adults.Meenakshi Handa, Parul Ahuja & Swati Jain - 2022 - Journal of Information, Communication and Ethics in Society 20 (4):568-586.
    Purpose Along with their immense benefit, online channels of communication and information-sharing also present a myriad set of challenges. The unauthorized downloading and sharing of copyrighted content such as music and movies is one such issue. This study aims to examine the factors related to the unauthorized downloading of content amongst young internet users in an emerging market. Design/methodology/approach An online structured questionnaire was used to collect primary data from 219 internet users between 17 and 24 years of age. The (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  • Self-Service Technologies and e-Services Risks in Social Commerce Era.Mauricio S. Featherman & Nick Hajli - 2016 - Journal of Business Ethics 139 (2):251-269.
    Social commerce as a subset of e-commerce has been emerged in part due to the popularity of social networking sites. Social commerce brings new challenges to marketing activities. And social commerce transactions like e-commerce transactions can be dangerous and cause harmful losses to personal finances, time, and information privacy. This article examines ethical issues and consumer assessments of the risks of using an e-service and how risk affects consumer evaluations and usage of Internet-based services and self-service technologies. Results from two (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  • Morality Effects and Consumer Responses to Counterfeit and Pirated Products: A Meta-analysis.Martin Eisend - 2019 - Journal of Business Ethics 154 (2):301-323.
    Acquisition and purchase of counterfeit and pirated products are illicit and morally questionable consumer behaviors. Nonetheless, some consumers engage in such illicit behavior and seem to overcome the moral dilemma by justification strategies. The findings on morality effects on consumer responses to counterfeit and pirated products are diverse, and the underlying theories provide no clear picture of the process that explains how morality and justification lead to particular consumer responses or why consumers differ in their responses. This study presents a (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  • One Sail Fits All? A Psychographic Segmentation of Digital Pirates.Charlotte Emily De Corte & Patrick Van Kenhove - 2017 - Journal of Business Ethics 143 (3):441-465.
    This paper focuses on segmenting digital movie and TV series pirates and on investigating the effectiveness of piracy-combatting measures i.e., legal and educational strategies, in light of these segments. To address these research objectives, two online studies were conducted. First, 1277 valid responses were gathered with an online survey. Four pirate segments were found based on differing combinations of attitude toward piracy, ethical evaluation of piracy and feelings of guilt. The anti-pirate, conflicted pirate, cavalier pirate, and die-hard pirate can be (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  • Do You Need a Receipt? Exploring Consumer Participation in Consumption Tax Evasion as an Ethical Dilemma.Barbara Culiberg & Domen Bajde - 2014 - Journal of Business Ethics 124 (2):271-282.
    The paper focuses on the consumer side of consumption tax evasion (CTE), a subcategory of the shadow economy. The ethical dimensions of tax evasion have been effectively captured by the existent literature on tax morale, yet it fails to address the role consumers can play in CTE. Further, there is a shortage of tax morale studies that explore ethical decision making as a process composed of multiple steps and determinants. To bridge these gaps, we turned to the consumer ethics literature (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  • Further Understanding Factors that Explain Freshman Business Students’ Academic Integrity Intention and Behavior: Plagiarism and Sharing Homework.Timothy Paul Cronan, Jeffrey K. Mullins & David E. Douglas - 2018 - Journal of Business Ethics 147 (1):197-220.
    Academic integrity violations on college campuses continue to be a significant concern that draws public attention. Even though AI has been the subject of numerous studies offering explanations and recommendations, academic dishonesty persists. Consequently, this has rekindled interest in understanding AI behavior and its influencers. This paper focuses on the AI violations of plagiarism and sharing homework for freshman business students, examining the factors that influence a student’s intention to plagiarize or share homework with others. Using a sample of more (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  • Explaining the Misuse of Information Systems Resources in the Workplace: A Dual-Process Approach.Amanda M. Y. Chu, Patrick Y. K. Chau & Mike K. P. So - 2015 - Journal of Business Ethics 131 (1):209-225.
    The aim of this study is to gain an understanding of why employees misuse information systems resources in the workplace. Rather than consider “intention,” as existing behavioral research commonly does, this study investigates actual behavior and employs IS resource misuse as the dependent variable. Data from a web-based survey are analyzed using the partial least squares approach. In light of the dual-process approach and the theory of planned behavior, the findings suggest that IS resource misuse may be both an intentional (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  • Counterfeit Luxuries: Does Moral Reasoning Strategy Influence Consumers’ Pursuit of Counterfeits?Jie Chen, Lefa Teng & Yonghai Liao - 2018 - Journal of Business Ethics 151 (1):249-264.
    Morality, in the context of luxury counterfeit goods, has been widely discussed in existing literature as having a strong association with decreased purchase intention. However, drawing on moral disengagement theory, we argue that individuals are motivated to justify their immoral behaviors through guilt avoidance, thus increasing counterfeit purchase intention. This research demonstrates that consumers’ desire to purchase counterfeit luxuries hinges on two types of moral reasoning strategies: moral rationalization and moral decoupling. The empirical results show that each strategy increases purchase (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  • Towards Enforceable Bans on Illicit Businesses: From Moral Relativism to Human Rights.Edmund F. Byrne - 2014 - Journal of Business Ethics 119 (1):119-130.
    Many scholars and activists favor banning illicit businesses, especially given that such businesses constitute a large part of the global economy. But these businesses are commonly operated as if they are subject only to the ethical norms their management chooses to recognize, and as a result they sometimes harm innocent people. This can happen in part because there are no effective legal constraints on illicit businesses, and in part because it seems theoretically impossible to dispose definitively of arguments that support (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  • Ethical Decision Making in a Peer-to-Peer File Sharing Situation: The Role of Moral Absolutes and Social Consensus. [REVIEW]Connie R. Bateman, Sean Valentine & Terri Rittenburg - 2013 - Journal of Business Ethics 115 (2):229-240.
    Individuals are downloading copyrighted materials at escalating rates (Hill 2007; Siwek 2007). Since most materials shared within these networks are copyrighted works, providing, exchanging, or downloading files is considered to be piracy and a violation of intellectual property rights (Shang et al. 2008). Previous research indicates that personal moral philosophies rooted in moral absolutism together with social context may impact decision making in ethical dilemmas; however, it is yet unclear which motivations and norms contextually impact moral awareness in a peer-to-peer (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   11 citations  
  • Predicting Accounting Students’ Intentions to Engage in Software and Music Piracy.Philmore Alleyne, Sherlexis Soleyn & Terry Harris - 2015 - Journal of Academic Ethics 13 (4):291-309.
    The purpose of this study is to investigate the salient factors that influence accounting students to engage in software and music piracy. This study uses the theory of reasoned action and the theory of planned behavior, and extends these models to incorporate other variables to predict individuals’ behavioral intentions. Specifically, we hypothesize that attitudes toward the behavior, subjective norms, perceived behavioral control, moral obligation and perceived prosecution risk influence intentions to engage in software and music piracy. Data were obtained from (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  • Investigating Software Piracy in Jordan: An Extension of the Theory of Reasoned Action. [REVIEW]Hassan Aleassa, John Michael Pearson & Scott McClurg - 2011 - Journal of Business Ethics 98 (4):663-676.
    Software piracy, the illegal and unauthorized duplication, sale, or distribution of software, is a widespread and costly phenomenon. According to Business Software Alliance, over 41% of the PC software packages installed worldwide were unauthorized copies. Software piracy behavior has been investigated for more than 30 years. However, after a review of the relevant literature, there appears to be two voids in this literature: a lack of studies in non-Western countries and a scarcity of process studies. This study contributes to literature (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   9 citations