DOI QR코드

DOI QR Code

A Study on Factors that Influence the Attitude to Pirate Smartphone Application

스마트폰 애플리케이션 불법적 사용 태도에 미치는 요인 연구

  • 김중한 (경기대학교 경영정보학화)
  • Received : 2014.04.27
  • Accepted : 2014.06.16
  • Published : 2014.06.30

Abstract

As the global smartphones market is growing at a brisk pace, their associated mobile applications are becoming increasingly ubiquitous in our daily life. The growth of mobile application business is explosive. Like other digital contents businesses, illegal downloads of copyrighted mobile applications become major obstacle in the future of the industry. In spite of anti-piracy efforts, the phenomenon has been getting worse. It is necessary to change the focus of current deterrence policies and strategies. This study investigates the factors influencing smartphone applications piracy behavior. For better understanding of illegal behavior, a research model of potential determinants for the piracy behavior is developed and empirically tested via path analysis using structural equation modeling. Findings show that social factors, beliefs concerning benefits from piracy, self-efficacy, and habit have significant effects on attitude toward smartphone application piracy. The result also shows perceived risks and facilitating conditions were not significantly related to their attitude. Implications for research and practice are discussed.

References

  1. 정상철(한국문화관경연구원), "(요약) 콘텐츠 불법복제 감소가 국가경제에 미치는 경제적 파급효과에 관한 연구", 2011.
  2. 한국저작권위원회, "스마트 기기를 통한 저작권 침해 실태조사 및 대응방안 연구", 2011.
  3. Ajzen, I. and M. Fishbein, Belief, attitude, intention and behavior : An introduction to theory and research, Reading : Addison-Wesley, 1975.
  4. Ajzen, I., "Perceived Behavioral Control, Self-Efficacy, Locus of Control, and the Theory of Planned Behavior", J. Appl. Soc. Psychol., Vol.32, No.4(2002), pp.665-683. https://doi.org/10.1111/j.1559-1816.2002.tb00236.x
  5. Ajzen, I., "The theory of planned behavior", Organ. Behav. Hum. Decis. Process., Vol. 50, No.2(1991), pp.179-211. https://doi.org/10.1016/0749-5978(91)90020-T
  6. Anderson, J. C. and D. W. Gerbing, "Structural equation modeling in practice : A review and recommended two-step approach", Psychol. Bull., Vol.103, No.3(1988), p.411. https://doi.org/10.1037/0033-2909.103.3.411
  7. "Apple App Store Has Lost $450 Million To Piracy", 24/7 Wall Street, 2010[Online], Available : http://247wallst.com/apps-software/2010/01/13/apple-app-store-has-lost-450-million-to-piracy.
  8. Bagchi, K., P. Kirs, and R. Cerveny, "Global Software Piracy : Can Economic Factors Along Explain the Trend?", Commun. ACM, Vol.49, No.6(2006), pp.70-75. https://doi.org/10.1145/1132469.1132470
  9. Bandura, A., Social foundations of thought and action : A social cognitive theory, Prentice-Hall, Inc, 1986.
  10. Beck, L. and I. Ajzen, "Predicting dishonest actions using the theory of planned behavior", J. Res. Pers., Vol.25, No.3(1991), pp.285-301. https://doi.org/10.1016/0092-6566(91)90021-H
  11. Bezmen, T. L. and C. A. Depken, "Influences on software piracy : Evidence from the various United States", Econ. Lett., Vol.90, No.3 (2006), pp.356-361. https://doi.org/10.1016/j.econlet.2005.08.029
  12. Business Insider, "One In Every 5 People In The World Own A Smartphone", 2013[Online] Available : http://www.businessinsider.com/smartphone-and-tablet-penetration-2013-10#ixzz2y9qsuMDw.
  13. Chen, Y.-C. R.-A. Shang, and A.-K. Lin, "The intention to download music files in a P2P environment : Consumption value, fashion, and ethical decision perspectives", Electron. Commer. Res. Appl., Vol.7, No.4(2008), pp.411-422. https://doi.org/10.1016/j.elerap.2008.02.001
  14. Cheng, H. K., R. R. Sims, and H. Teegen, "To purchase or to pirate software : an empirical study", J. Manag. Inf. Syst., Vol.13, No.4(1997), pp.49-60. https://doi.org/10.1080/07421222.1997.11518142
  15. Chiu, R. K., "Ethical Judgment and Whistleblowing Intention : Examining the Moderating Role of Locus of Control", J. Bus. Ethics, Vol.43(2003), pp.65-74. https://doi.org/10.1023/A:1022911215204
  16. CNET, "How piracy ruins it for paid apps", CNET, 2011, [Online] Available : http://www.cnet.com/news/how-piracy-ruins-it-forpaid-apps-inside-apps/, [Accessed : 12-Dec-2013].
  17. CNN Money, "Mobile apps overtake PC Internet usage in U. S.", CNN Money, 2014, [Online] Available : http://money.cnn.com/2014/02/28/technology/mobile/mobile-appsinternet.
  18. Compeau, D. R. and C. A. Higgins, "Computer self-efficacy : Development of a measure and initial test.", MIS Q., Vol.19, No.2 (1995).
  19. Cronan, T. P. and S. Al-Rafee, "Factors that Influence the Intention to Pirate Software and Media", J. Bus. Ethics, Vol.78, No.4 (2008), pp.527-545. https://doi.org/10.1007/s10551-007-9366-8
  20. D'Astous, A., F. Colbert, and D. Montpetit, "Music piracy on the web-how effective are anti-piracy arguments? Evidence from the theory of planned behaviour", J. Consum. Policy, Vol.28, No.3(2005), pp.289-310. https://doi.org/10.1007/s10603-005-8489-5
  21. De Castro, J. O. D. B. Balkin, and D. A. Shepherd, "Can entrepreneurial firms benefit from product piracy?", J. Bus. Ventur., Vol.23, No.1(2008), pp.75-90. https://doi.org/10.1016/j.jbusvent.2005.07.003
  22. Depken, C. A. and L. C. Simmons, "Social construct and the propensity for software piracy", Appl. Econ. Lett., Vol.11, No.2(2004), pp.97-100. https://doi.org/10.1080/1350485042000200187
  23. Forbes, "Google Play Catching Up To Apple's App Store", Forbes, 2013, [Online] Available : http://www.forbes.com/sites/chuckjones/2013/12/19/google-play-catching-up-to-apples-app-store.
  24. Fraedrich, J. P. and O. C. Ferrell, "The impact of perceived risk and moral philosophy type on ethical decision making in business organizations", J. Bus. Res., Vol.24, No.4 (1992), pp.283-295. https://doi.org/10.1016/0148-2963(92)90035-A
  25. Gartner, "Key Trends for the Mobile Industry", Gartner Conference Report, (2013), [Online] Available : http://www.gartner.com/newsroom/id/2592315.
  26. Gopal, R. D. and G. L. Sanders, "Global software piracy : you can't get blood out of a turnip", Commun. ACM, Vol.43, No.9(2000), pp.82-89.
  27. Gopal, R. D. and G. L. Sanders, "International software piracy : Analysis of key issues and impacts", Inf. Syst. Res., Vol.9, No.4 (1998), pp.380-397. https://doi.org/10.1287/isre.9.4.380
  28. Gottfredson, M. and T. Hirschi, A general theory of crime. Stanford University Press, 1990.
  29. Hair, J. F., W. C. Black, B. J. Babin, and R. E. Anderson, Multivariate data analysis, 7th ed, New Jersey : Prentice Hall, 2009.
  30. Hinduja, S., "Neutralization theory and online software piracy : An empirical analysis", Ethics Inf. Technol., Vol.9, No.3(2007), pp.187-204. https://doi.org/10.1007/s10676-007-9143-5
  31. Hunt, S. D. and S. Vitell, "A general theory of marketing ethics", J. macromarketing, Vol.6, No.1(1986), pp.5-16. https://doi.org/10.1177/027614678600600103
  32. Ingram, J. R. and S. Hinduja, "Neutralizing Music Piracy : An Empirical Examination", Deviant Behav., Vol.29, No.4(2008), pp.334-366. https://doi.org/10.1080/01639620701588131
  33. Jeong, Y.-S., Y.-U. Park, J.-C. Moon, S.-J. Cho, D. Kim, and M. Park, "An anti-piracy mechanism based on class separation and dynamic loading for Android applications", in Proceedings of the 2012 ACM Research in Applied Computation Symposium, (2012), pp.328-332.
  34. Ki, E. J. B. H. Chang, and H. Khang, "Exploring influential factors on music piracy across countries", J. Commun., Vol.56, No.2 (2006), pp.406-426. https://doi.org/10.1111/j.1460-2466.2006.00026.x
  35. Kim, E., S. Kim, and J. Choi, "Detecting Illegally-Copied Apps on Android Devices", in IT Convergence and Security (ICITCS), International Conference on, (2013), pp.1-4.
  36. Leonard, L. N. K. and T. P. Cronan, "Illegal, inappropriate, and unethical behavior in an information technology context : A study to explain influences", J. Assoc. Inf. Syst., Vol.1, No.12(2001), pp.1-31.
  37. Limayem, M., M. Khalifa, and W. W. Chin, "Factors Motivating Software Piracy : A Longitudinal Study", IEEE Trans. Eng. Manag., Vol.51, No.4(2004), pp.414-425. https://doi.org/10.1109/TEM.2004.835087
  38. Lin, T. M. H. Hsu, F. Kuo, and P. Sun, "An Intention Model-based Study of Software Piracy", in Proceedings of the 32nd Hawaii International Conference on System Sciences, Vol.30(1999).
  39. Marcum, D., Catherine, G. E. Higgins, S. E. Wolfe, and L. Ricketts, Melissa, "Examining the Intersection of Self-control, Peer Association and Neutralization in Explaining Digital Piracy", West. Crim. Rev., Vol.12, No.3 (2011), pp.60-74.
  40. Moon, B., J. D. McCluskey, and C. P. Mc-Cluskey, "A general theory of crime and computer crime : An empirical test", J. Crim. Justice, Vol.38, No.4(2010), pp.767-772. https://doi.org/10.1016/j.jcrimjus.2010.05.003
  41. Moores, T. T., "An Analysis of the Impact of Economic Wealth and National Culture on the Rise and Fall of Software Piracy Rates", J. Bus. Ethics, Vol.81, No.1(2008), pp. 39-51. https://doi.org/10.1007/s10551-007-9479-0
  42. Morris, R. G. and G. E. Higgins, "Neutralizing Potential and Self-Reported Digital Piracy : A Multitheoretical Exploration Among College Undergraduates", Crim. Justice Rev., Vol.34, No.2(2008), pp.173-195.
  43. Nandedkar, A. and V. Midha, "It won't happen to me : An assessment of optimism bias in music piracy", Comput. Human Behav., Vol.28, No.1(2012), pp.41-48. https://doi.org/10.1016/j.chb.2011.08.009
  44. Peace, A. G., D. F. Galletta, and J. Y. L. Thong, "Software Piracy in the Workplace : A Model and Empirical Test", J. Manag. Inf. Syst., Vol.20, No.1(2003), pp.153-177. https://doi.org/10.1080/07421222.2003.11045759
  45. Phau, I. and J. Liang, "Downloading digital video games : predictors, moderators and consequences", Mark. Intell. Plan., Vol.30, No.7(2012), pp.740-756. https://doi.org/10.1108/02634501211273832
  46. Piquero, N. L. and A. R. Piquero, "Democracy and intellectual property : Examining trajectories of software piracy", Ann. Am. Acad. Pol. Soc. Sci., Vol.605, No.1(2006), pp. 104-127. https://doi.org/10.1177/0002716206287015
  47. Randall, D. M. and A. M. Gibson, "Ethical decision making in the medical profession : An application of the theory of planned behavior", J. Bus. Ethics, Vol.10, No.2(1991), pp.111-122. https://doi.org/10.1007/BF00383614
  48. Sykes, G. M. and D. Matza, "Techniques of neutralization : A theory of delinquency", Am. Sociol. Rev., Vol.22, No.6(1957), pp.664-670. https://doi.org/10.2307/2089195
  49. Thong, J. Y. L. and C.-S. Yap, "Testing an Ethical Decision-Making Theory : The Case of Softlifting", J. Manag. Inf. Syst., Vol.15, No.1(1998), pp.213-237. https://doi.org/10.1080/07421222.1998.11518203
  50. Triandis, H. C., "Values, attitudes, and interpersonal behavior", in Nebraska symposium on motivation, 1980.
  51. van Kranenburg, H. and A. Hogenbirk, "Multimedia, entertainment, and business software copyright piracy : A cross-national study", J. media Econ., Vol.18, No.2(2005), pp.109-129. https://doi.org/10.1207/s15327736me1802_3
  52. Vitell, S. J., J. J. Singh, and J. G. P. Paolillo, "Consumers'Ethical Beliefs : The Roles of Money, Religiosity and Attitude toward Business", J. Bus. Ethics, Vol.73, No.4(2007), pp.369-379. https://doi.org/10.1007/s10551-006-9212-4
  53. Williams, K. R. and R. Hawkins, "Perceptual research on general deterrence : A critical review", Law Socy Rev., Vol.20(1986), p.545. https://doi.org/10.2307/3053466
  54. Yoon, C., "Theory of Planned Behavior and Ethics Theory in Digital Piracy : An Integrated Model", J. Bus. Ethics, Vol.100, No.3 (2011), pp.405-417. https://doi.org/10.1007/s10551-010-0687-7