DOI QR코드

DOI QR Code

A Study on Factors that Influence the Attitude to Pirate Smartphone Application

스마트폰 애플리케이션 불법적 사용 태도에 미치는 요인 연구

  • 김중한 (경기대학교 경영정보학화)
  • Received : 2014.04.27
  • Accepted : 2014.06.16
  • Published : 2014.06.30

Abstract

As the global smartphones market is growing at a brisk pace, their associated mobile applications are becoming increasingly ubiquitous in our daily life. The growth of mobile application business is explosive. Like other digital contents businesses, illegal downloads of copyrighted mobile applications become major obstacle in the future of the industry. In spite of anti-piracy efforts, the phenomenon has been getting worse. It is necessary to change the focus of current deterrence policies and strategies. This study investigates the factors influencing smartphone applications piracy behavior. For better understanding of illegal behavior, a research model of potential determinants for the piracy behavior is developed and empirically tested via path analysis using structural equation modeling. Findings show that social factors, beliefs concerning benefits from piracy, self-efficacy, and habit have significant effects on attitude toward smartphone application piracy. The result also shows perceived risks and facilitating conditions were not significantly related to their attitude. Implications for research and practice are discussed.

References

  1. Phau, I. and J. Liang, "Downloading digital video games : predictors, moderators and consequences", Mark. Intell. Plan., Vol.30, No.7(2012), pp.740-756. https://doi.org/10.1108/02634501211273832
  2. Piquero, N. L. and A. R. Piquero, "Democracy and intellectual property : Examining trajectories of software piracy", Ann. Am. Acad. Pol. Soc. Sci., Vol.605, No.1(2006), pp. 104-127. https://doi.org/10.1177/0002716206287015
  3. Randall, D. M. and A. M. Gibson, "Ethical decision making in the medical profession : An application of the theory of planned behavior", J. Bus. Ethics, Vol.10, No.2(1991), pp.111-122. https://doi.org/10.1007/BF00383614
  4. Sykes, G. M. and D. Matza, "Techniques of neutralization : A theory of delinquency", Am. Sociol. Rev., Vol.22, No.6(1957), pp.664-670. https://doi.org/10.2307/2089195
  5. Thong, J. Y. L. and C.-S. Yap, "Testing an Ethical Decision-Making Theory : The Case of Softlifting", J. Manag. Inf. Syst., Vol.15, No.1(1998), pp.213-237. https://doi.org/10.1080/07421222.1998.11518203
  6. Triandis, H. C., "Values, attitudes, and interpersonal behavior", in Nebraska symposium on motivation, 1980.
  7. van Kranenburg, H. and A. Hogenbirk, "Multimedia, entertainment, and business software copyright piracy : A cross-national study", J. media Econ., Vol.18, No.2(2005), pp.109-129. https://doi.org/10.1207/s15327736me1802_3
  8. Vitell, S. J., J. J. Singh, and J. G. P. Paolillo, "Consumers'Ethical Beliefs : The Roles of Money, Religiosity and Attitude toward Business", J. Bus. Ethics, Vol.73, No.4(2007), pp.369-379. https://doi.org/10.1007/s10551-006-9212-4
  9. Williams, K. R. and R. Hawkins, "Perceptual research on general deterrence : A critical review", Law Socy Rev., Vol.20(1986), p.545. https://doi.org/10.2307/3053466
  10. Yoon, C., "Theory of Planned Behavior and Ethics Theory in Digital Piracy : An Integrated Model", J. Bus. Ethics, Vol.100, No.3 (2011), pp.405-417. https://doi.org/10.1007/s10551-010-0687-7
  11. Jeong, Y.-S., Y.-U. Park, J.-C. Moon, S.-J. Cho, D. Kim, and M. Park, "An anti-piracy mechanism based on class separation and dynamic loading for Android applications", in Proceedings of the 2012 ACM Research in Applied Computation Symposium, (2012), pp.328-332.
  12. Ki, E. J. B. H. Chang, and H. Khang, "Exploring influential factors on music piracy across countries", J. Commun., Vol.56, No.2 (2006), pp.406-426. https://doi.org/10.1111/j.1460-2466.2006.00026.x
  13. Kim, E., S. Kim, and J. Choi, "Detecting Illegally-Copied Apps on Android Devices", in IT Convergence and Security (ICITCS), International Conference on, (2013), pp.1-4.
  14. Leonard, L. N. K. and T. P. Cronan, "Illegal, inappropriate, and unethical behavior in an information technology context : A study to explain influences", J. Assoc. Inf. Syst., Vol.1, No.12(2001), pp.1-31.
  15. Limayem, M., M. Khalifa, and W. W. Chin, "Factors Motivating Software Piracy : A Longitudinal Study", IEEE Trans. Eng. Manag., Vol.51, No.4(2004), pp.414-425. https://doi.org/10.1109/TEM.2004.835087
  16. Lin, T. M. H. Hsu, F. Kuo, and P. Sun, "An Intention Model-based Study of Software Piracy", in Proceedings of the 32nd Hawaii International Conference on System Sciences, Vol.30(1999).
  17. Marcum, D., Catherine, G. E. Higgins, S. E. Wolfe, and L. Ricketts, Melissa, "Examining the Intersection of Self-control, Peer Association and Neutralization in Explaining Digital Piracy", West. Crim. Rev., Vol.12, No.3 (2011), pp.60-74.
  18. Moon, B., J. D. McCluskey, and C. P. Mc-Cluskey, "A general theory of crime and computer crime : An empirical test", J. Crim. Justice, Vol.38, No.4(2010), pp.767-772. https://doi.org/10.1016/j.jcrimjus.2010.05.003
  19. Moores, T. T., "An Analysis of the Impact of Economic Wealth and National Culture on the Rise and Fall of Software Piracy Rates", J. Bus. Ethics, Vol.81, No.1(2008), pp. 39-51. https://doi.org/10.1007/s10551-007-9479-0
  20. Morris, R. G. and G. E. Higgins, "Neutralizing Potential and Self-Reported Digital Piracy : A Multitheoretical Exploration Among College Undergraduates", Crim. Justice Rev., Vol.34, No.2(2008), pp.173-195.
  21. Nandedkar, A. and V. Midha, "It won't happen to me : An assessment of optimism bias in music piracy", Comput. Human Behav., Vol.28, No.1(2012), pp.41-48. https://doi.org/10.1016/j.chb.2011.08.009
  22. Peace, A. G., D. F. Galletta, and J. Y. L. Thong, "Software Piracy in the Workplace : A Model and Empirical Test", J. Manag. Inf. Syst., Vol.20, No.1(2003), pp.153-177. https://doi.org/10.1080/07421222.2003.11045759
  23. Cronan, T. P. and S. Al-Rafee, "Factors that Influence the Intention to Pirate Software and Media", J. Bus. Ethics, Vol.78, No.4 (2008), pp.527-545. https://doi.org/10.1007/s10551-007-9366-8
  24. D'Astous, A., F. Colbert, and D. Montpetit, "Music piracy on the web-how effective are anti-piracy arguments? Evidence from the theory of planned behaviour", J. Consum. Policy, Vol.28, No.3(2005), pp.289-310. https://doi.org/10.1007/s10603-005-8489-5
  25. De Castro, J. O. D. B. Balkin, and D. A. Shepherd, "Can entrepreneurial firms benefit from product piracy?", J. Bus. Ventur., Vol.23, No.1(2008), pp.75-90. https://doi.org/10.1016/j.jbusvent.2005.07.003
  26. Depken, C. A. and L. C. Simmons, "Social construct and the propensity for software piracy", Appl. Econ. Lett., Vol.11, No.2(2004), pp.97-100. https://doi.org/10.1080/1350485042000200187
  27. Forbes, "Google Play Catching Up To Apple's App Store", Forbes, 2013, [Online] Available : http://www.forbes.com/sites/chuckjones/2013/12/19/google-play-catching-up-to-apples-app-store.
  28. Fraedrich, J. P. and O. C. Ferrell, "The impact of perceived risk and moral philosophy type on ethical decision making in business organizations", J. Bus. Res., Vol.24, No.4 (1992), pp.283-295. https://doi.org/10.1016/0148-2963(92)90035-A
  29. Gartner, "Key Trends for the Mobile Industry", Gartner Conference Report, (2013), [Online] Available : http://www.gartner.com/newsroom/id/2592315.
  30. Gopal, R. D. and G. L. Sanders, "Global software piracy : you can't get blood out of a turnip", Commun. ACM, Vol.43, No.9(2000), pp.82-89.
  31. Gopal, R. D. and G. L. Sanders, "International software piracy : Analysis of key issues and impacts", Inf. Syst. Res., Vol.9, No.4 (1998), pp.380-397. https://doi.org/10.1287/isre.9.4.380
  32. Gottfredson, M. and T. Hirschi, A general theory of crime. Stanford University Press, 1990.
  33. Hair, J. F., W. C. Black, B. J. Babin, and R. E. Anderson, Multivariate data analysis, 7th ed, New Jersey : Prentice Hall, 2009.
  34. Hinduja, S., "Neutralization theory and online software piracy : An empirical analysis", Ethics Inf. Technol., Vol.9, No.3(2007), pp.187-204. https://doi.org/10.1007/s10676-007-9143-5
  35. Hunt, S. D. and S. Vitell, "A general theory of marketing ethics", J. macromarketing, Vol.6, No.1(1986), pp.5-16. https://doi.org/10.1177/027614678600600103
  36. Ingram, J. R. and S. Hinduja, "Neutralizing Music Piracy : An Empirical Examination", Deviant Behav., Vol.29, No.4(2008), pp.334-366. https://doi.org/10.1080/01639620701588131
  37. Anderson, J. C. and D. W. Gerbing, "Structural equation modeling in practice : A review and recommended two-step approach", Psychol. Bull., Vol.103, No.3(1988), p.411. https://doi.org/10.1037/0033-2909.103.3.411
  38. "Apple App Store Has Lost $450 Million To Piracy", 24/7 Wall Street, 2010[Online], Available : http://247wallst.com/apps-software/2010/01/13/apple-app-store-has-lost-450-million-to-piracy.
  39. Bagchi, K., P. Kirs, and R. Cerveny, "Global Software Piracy : Can Economic Factors Along Explain the Trend?", Commun. ACM, Vol.49, No.6(2006), pp.70-75. https://doi.org/10.1145/1132469.1132470
  40. Bandura, A., Social foundations of thought and action : A social cognitive theory, Prentice-Hall, Inc, 1986.
  41. Beck, L. and I. Ajzen, "Predicting dishonest actions using the theory of planned behavior", J. Res. Pers., Vol.25, No.3(1991), pp.285-301. https://doi.org/10.1016/0092-6566(91)90021-H
  42. Bezmen, T. L. and C. A. Depken, "Influences on software piracy : Evidence from the various United States", Econ. Lett., Vol.90, No.3 (2006), pp.356-361. https://doi.org/10.1016/j.econlet.2005.08.029
  43. Business Insider, "One In Every 5 People In The World Own A Smartphone", 2013[Online] Available : http://www.businessinsider.com/smartphone-and-tablet-penetration-2013-10#ixzz2y9qsuMDw.
  44. Chen, Y.-C. R.-A. Shang, and A.-K. Lin, "The intention to download music files in a P2P environment : Consumption value, fashion, and ethical decision perspectives", Electron. Commer. Res. Appl., Vol.7, No.4(2008), pp.411-422. https://doi.org/10.1016/j.elerap.2008.02.001
  45. Cheng, H. K., R. R. Sims, and H. Teegen, "To purchase or to pirate software : an empirical study", J. Manag. Inf. Syst., Vol.13, No.4(1997), pp.49-60. https://doi.org/10.1080/07421222.1997.11518142
  46. Chiu, R. K., "Ethical Judgment and Whistleblowing Intention : Examining the Moderating Role of Locus of Control", J. Bus. Ethics, Vol.43(2003), pp.65-74. https://doi.org/10.1023/A:1022911215204
  47. CNET, "How piracy ruins it for paid apps", CNET, 2011, [Online] Available : http://www.cnet.com/news/how-piracy-ruins-it-forpaid-apps-inside-apps/, [Accessed : 12-Dec-2013].
  48. CNN Money, "Mobile apps overtake PC Internet usage in U. S.", CNN Money, 2014, [Online] Available : http://money.cnn.com/2014/02/28/technology/mobile/mobile-appsinternet.
  49. Compeau, D. R. and C. A. Higgins, "Computer self-efficacy : Development of a measure and initial test.", MIS Q., Vol.19, No.2 (1995).
  50. 정상철(한국문화관경연구원), "(요약) 콘텐츠 불법복제 감소가 국가경제에 미치는 경제적 파급효과에 관한 연구", 2011.
  51. 한국저작권위원회, "스마트 기기를 통한 저작권 침해 실태조사 및 대응방안 연구", 2011.
  52. Ajzen, I. and M. Fishbein, Belief, attitude, intention and behavior : An introduction to theory and research, Reading : Addison-Wesley, 1975.
  53. Ajzen, I., "Perceived Behavioral Control, Self-Efficacy, Locus of Control, and the Theory of Planned Behavior", J. Appl. Soc. Psychol., Vol.32, No.4(2002), pp.665-683. https://doi.org/10.1111/j.1559-1816.2002.tb00236.x
  54. Ajzen, I., "The theory of planned behavior", Organ. Behav. Hum. Decis. Process., Vol. 50, No.2(1991), pp.179-211. https://doi.org/10.1016/0749-5978(91)90020-T