SlideShare a Scribd company logo
1 of 16
Download to read offline
Predicting consumer
digital piracy behavior
The role of rationalization and perceived
consequences
Irena Vida and Mateja Kos Koklič
Marketing Department, University of Ljubljana, Ljubljana, Slovenia
Monika Kukar-Kinney
Marketing Department, University of Richmond, Richmond, Virginia, USA and
University of Ljubljana, Ljubljana, Slovenia, and
Elfriede Penz
International Marketing Management, Wirtschaftsuniversität Wien,
Vienna, Austria
Abstract
Purpose – Thepurpose of thispaper isto investigateconsumer perceptionsof personal risk and benefits
ofdigitalpiracybehaviorasdeterminantsofone’sjustificationforsuchbehaviorandtheconsequentfuture
piracy intention. Temporal effects of rationalization in shaping future piracy intent are also addressed.
Design/methodology/approach – A conceptual model was developed using counterfeiting and
piracy literature. Data were gathered via mail and online survey of adults in five European Union
countries. The model was tested on pooled sample using confirmatory factor analysis and structural
equation modeling.
Findings – Rationalization mediates the relationship between perceived benefits and piracy
intention, but not between perceived risk and intention. Both perceived risk and benefits affect piracy
intent, with risk reducing it and benefits increasing it. Rationalization of past behavior increases future
digital piracy intent.
Research limitations/implications – Risk measure was limited to technical problems, thus future
studies should examine a wider scope of risk dimensions. The cross-sectional design of the study also
creates some limitations. A longitudinal methodology could provide a better insight into sequencing of
rationalization.
Social implications – Marketing communications should increase public awareness of risks and
reduce perceived piracy benefits to reduce future piracy intent. Public persuasion activities should
counter the arguments consumers use to rationalize their piracy behavior.
Originality/value – This research fills in a void in knowledge on how expected consequences drive
rationalization techniques, particularly with respect to future piracy intent. A realistic data set drawn
from adult population in five countries is used, enhancing external validity.
Keywords Digital piracy, Consequences, Risk, Benefits, Rationalization, Piracy intent,
Digital technology, Consumer behaviour, European Union
Paper type Research paper
The current issue and full text archive of this journal is available at
www.emeraldinsight.com/2040-7122.htm
Data collection for this study was supported by the Commission of European Community,
contract no. 217514 (EU – 7th Framework Programme). Authors gratefully acknowledge
contributions of research partners from all countries participating in this research project.
JRIM
6,4
298
Received 15 February 2012
Revised 7 May 2012,
18 June 2012
Accepted 6 July 2012
Journal of Research in Interactive
Marketing
Vol. 6 No. 4, 2012
pp. 298-313
q Emerald Group Publishing Limited
2040-7122
DOI 10.1108/17505931211282418
1. Introduction
With rapid advances in technology and the increasing global availability and
accessibility of digital channels for information/media distribution, illicit behavior
regarding digital goods continues to perplex practitioners and researchers alike. Digital
piracy represents a growing threat to the welfare of both producers and consumers
(Phau and Ng, 2010; Sinha et al., 2010). While the exact loss for the supply side remains
inconclusive, industry antipiracy group BASCAP (2011) estimated the income loss to
range from $30 to $75 billion in digitally pirated music, movies and software industries
alone, rising up to $240 billion by 2015. Some researchers question these estimates,
seeking a more balanced approach by identifying both positive and negative effects for
the producers (Bhattacharjee et al., 2006; Mattelart, 2009). Similarly, mixed effects have
been recognized for the consumers as stakeholders taking part in digital piracy: both
gains or benefits (such as price benefits) and losses or risks (such as a threat of computer
virus) (Hennig-Thurau et al., 2007; Phau and Ng, 2010; Sirkeci and Magnúsdóttir, 2011).
Undeniably, industries, policy makers and consumers are faced with the challenging
environment and omnipotent institutional regime of existing digital copyright
management. Current efforts aimed at curtailing digital piracy have left various
stakeholders disgruntled due to either financial losses or by impinging on ideology of
consumer rights, free access and creativity expression (Goles et al., 2008; Mattelart,
2009). Given the interdisciplinary nature of the problem, researchers in the areas of
marketing, ethics, computer systems and criminology examined both the supply and the
demand sides of the issue. Yet, several voids remain in the literature before adequate
solutions can be identified.
This study offers empirical insights into factors underlying consumer illicit
behavior in the context of downloading, sharing and using digital products (e.g. music,
software, movie files) across five European Union (EU) countries. We aim to examine
consumer perceptions of expected personal consequences (e.g. perceived risk and
benefits) as drivers of an individual’s justifications for illicit behavior regarding digital
goods and behavioral intention to engage in such activities. Moreover, by applying
neutralization theory, we investigate the temporal effects of rationalization behavior in
shaping future piracy intent. When knowingly engaging in ethically questionable
behaviors, individuals tend to resort to rationalization, a common method of reducing
negative feelings by offering justification of their fraud, while still believing in their
ethical values (Dacin and Murphy, 2011).
The contribution of this study is threefold. First, we provide a balanced view by
examining both expected gains and losses associated with digital piracy intent and
rationalization of past piracy behavior. While previous studies acknowledged that
expected consequences of the action may affect an individual’s choice of behavior (Yoon,
2011), far less attention has been focused on ways in which such perceptions drive
rationalization techniques and thought processes behind digital piracy (McGregor,
2008). Insights into the drivers of rationalization, i.e. perceived risks and benefits, have
important implications for antipiracy communication campaigns, particularly due to the
low efficacy of existing appeals focusing mostly on adverse effects, such as emphasizing
guilt appeals (Lysonski and Durvasula, 2008; Zamoon and Curley, 2008). Second, we test
our conceptual model in a cross-national context using five EU countries. While
this region is one of the largest free-trade areas in the world, most existing piracy
research to date has been limited to the US and Asia (Aleassa et al., 2011; Eisend and
Consumer digital
piracy behavior
299
Schuchert-Gueler, 2006). Third, we use realistic data sets drawn from adult computer
users across the five countries in the EU using multiple methods of data collection.
Previous empirical studies of the demand-side of piracy tend to rely on student samples
rather than generalpublic. This threatens generalizability as the illicit digitalbehavior is
by no means limited to university settings (Williams et al., 2010; Yoon, 2011).
The paper is structured as follows. First, we briefly review the existing literature on
digital piracy. Then, we develop a conceptual framework which serves as the basis for
the construction of the hypotheses. Next, we report on the measures used, the data
collection methodology and the analytical procedures. Finally, we present the findings
of the study and discuss their implications and future research avenues.
2. Conceptual model and hypotheses
Researchers delving into the demand-side of digital piracy have utilized different
methodological approaches and applied various theoretical frameworks to explain
unauthorized consumer activities on the internet. While this is not surprising given
the interdisciplinary nature of the problem (e.g. business ethics, marketing and
information systems), research community has yet to establish consistent theoretical
frameworks to guide empirical efforts on digital piracy (Eisend and Schuchert-Gueler,
2006; Williams et al., 2010). The two most prominent theoretical approaches to
studying illicit digital behavior have been the expectancy-value theories (e.g. the theory
of reasoned action), and the theories of ethical decision making (e.g. Hunt and Vitell’s
model of ethical decision making). Both of these are established on the fundamental
premise that individual’s intentions are mostly consistent with the underlying
attitudes (Chatzidakis et al., 2007).
However, consumers’ attitudes do not always translate into purchase intentions and
consequently behavior. For example, even though unauthorized downloading of digital
products is treated as an illegal activity in most countries, many computer users,
particularly among the youth and in the university settings, exhibit lenience and
acceptance of such activities (Harris and Dumas, 2009; Hinduja, 2007; Kini et al., 2003).
An illustration is provided by a software piracy study among computer science
students, which found that while future information system professionals recognize the
consequences of such behavior for the industry and others, and even admit to its
immoral character, such cognizance does not discourage them from illicit computer
behaviors (Konstantakis et al., 2010). An explanatory framework for this discrepancy
can be found in the neutralization theory, which explains individuals’ attempts to
minimize the negative feelings related to their norm-violating behavior based upon their
self-concept and the perceptions by others (Grove and Vitell 1989; Shields and Whitehall,
1994). In their seminal work, Skyes and Matza (1957) developed five neutralization
techniques: denial of responsibility (“it’s not my fault”), denial of injury (“no harm
resulted from my actions”), denial of victim (“nobody got hurt”), condemning the
condemners (“how darethey judge me when they are just as corruptor hypocritical”) and
appeal to higher loyalties (“there is a greater cause”).
Neutralization theorists suggest individuals may employ these techniques both
before committing fraud, in order to avoid the negative affect (i.e. feelings of guilt or
shame), or after committing fraud, in order to reduce or neutralize the negative affect.
This means that neutralization occurs as an after-the-fact rationalization that may
create conditions for future behavior (Harris and Dumas, 2009; Higgins et al., 2008).
JRIM
6,4
300
Employing neutralization techniques helps individuals reassure themselves of the
appropriateness of their choices, and demonstrates their acceptability to others
(Hinduja, 2007). The rationalization (justification or neutralization) theory has been
used when investigating digital piracy (Morris and Higgins, 2009), software piracy
(Hinduja, 2007; Phau and Ng, 2010), music piracy (Ingram and Hinduja, 2008) and
online misbehavior in general (Harris and Dumas, 2009).
Based on the overview of the digital piracy literature, a lack of studies exploring
determinants of neutralization has been recognized. Some authors suggest that
information and knowledge are the main influencing variables (D’Astous and Legendre,
2009; Nicholls and Lee, 2006). With respect to information, the most significant impact
is the difference in perception of positive and negative message framing. More
specifically, a message conveying information about negative consequences plays a
different role in the decision making than a message about positive consequences
(Block and Keller, 1995; Chang, 2008). Along these lines, perceived risk can be regarded
as a consumer’s belief in negative consequences, while perceived benefits can be
described as a consumer’s belief in positive consequences (Yoon, 2011).
Our synthesis of counterfeiting and piracy literature provided the basis for
development of a conceptual model for the study (Figure 1). In the model, we explore the
role of perceived risk and perceived benefits in shaping two focal constructs:
rationalization of past behavior and future piracy intent. To shed more light on the
attitude-intention discrepancy (Chatzidakiset al., 2007;Phauet al., 2009),we also examine
the effect of rationalization on future piracy intent. The proposed conceptual model,
including the construct definitions and rationale for the hypotheses, is discussed next.
2.1 Determinants of rationalization
The first set of hypotheses focuses on the determinants of rationalization. In our study,
we define “rationalization” as a consumer’s technique to counter feelings of guilt
associated with the past engagement in digital piracy (Moore and McMullan, 2009).
“Perceived risk” refers to the probability that using illegally downloaded files would
result in technical problems with the computer. The concept of perceived risk has been
previously investigated in the piracy context, suggesting that it plays an important role
in curtailing the digital piracy phenomenon (Sinha and Mandel, 2008). We base our
prediction on the framing effect literature, which contends there are substantial
differences in how we process negatively and positively framed information.
Specifically, since negative framing evokes comparison to internal norms or
standards (Block and Keller, 1995), we expect that perceived risk as negatively
Figure 1.
Conceptual model
H1
Perceived
risk
Perceived
benefits
Rationalization Piracy
intention
H2
H5
H3
H4
Consumer digital
piracy behavior
301
framed information will reduce the extent to which an individual employs
rationalization techniques as a means to justify norm-violating behavior. Thus, the
more intensely an individual reviews his/her internal norms, the less likely s/he is to
justify his or her past behavior:
H1. The greater the perceived technical risk of digital piracy for consumers, the
lower the extent of their rationalization for the past digital piracy behavior.
“Perceived benefits” or the extent to which consumers believe that illegally downloading
files will result in certain positive consequences have been scarcely explored in the
piracy context (Hennig-Thurau et al., 2007; Yoon, 2011). As in H1, we formulate our
prediction of the impact of perceived benefits on rationalization based on the framing
effect theory. Contrary to perceived technical risk (H1), perceived benefits lead an
individual to review his/her internal norms and standards less intensely, thus increasing
the extent to which consumers use rationalization (Block and Keller, 1995). Therefore, we
expect that perceived benefits of illegally downloading files will result in an increased
use of rationalization techniques:
H2. The greater the perceived benefits of digital piracy for consumers, the greater
the extent of their rationalization for the past digital piracy behavior.
2.2 Determinants of future digital piracy intention
The second set of hypotheses focuses on the antecedents of “future digital piracy
intention”, defined as the likelihood that consumers will illegally download files from the
internet in the future. Existing studies offer contradictory findings with respect to the role
ofperceivedrisksoradverseeffectsinshapingfuturepiracyintention.For example,while
perceived risk of getting caught downloading illegally (i.e. legal risk) is a strong deterrent
for certain consumers, it can actually increase piracy tendencies for others (Sinha and
Mandel, 2008). On the other hand, Hennig-Thurau et al. (2007) provide empirical evidence
of the impact of perceived risk on consumer’s actual behavior. They conclude that
while search and moral risks provide hurdles for obtaining illegal copies, technical risks
directly reduce the probability of watching such copies. Since perception of adverse
effects as determinants of piracy intentions and behaviors has been operationalized in
various ways and produced conflicting results, the testing of the hypotheses stated below
provides an opportunity to resolve this controversy. We predict that:
H3. The greater the perceived technical risk of digital piracy for consumers, the
lower the consumers’ future piracy intent.
Another hypothesized driver of consumer intentions to pirate digital goods is perceived
benefits. The underlying rationale is that a consumer intends to engage in digital
piracy because of certain preferred outcomes, i.e. perceived benefits. This relationship
has been empirically supported in several studies. For example, Yoon (2011) shows
that perceived benefits have a positive impact on an individual’s intention to commit
digital piracy. Similarly, Hennig-Thurau et al. (2007) demonstrate a significant causal
link between two specific benefits, illegal copies as collectibles and anti-industry
utility, and obtaining of illegal copies. Likewise, Lysonski and Durvasula (2008) find a
significant positive correlation between social benefits of dissemination and intention
to illegally download. To provide additional evidence of this relationship in a novel
setting, we hypothesize:
JRIM
6,4
302
H4. The greater the perceived benefits of digital piracy for consumers, the greater
the consumers’ future piracy intent.
Future piracy intent is also shaped by consumer’s use of neutralization techniques.
Neutralization techniques as an after-the fact rationalization may create conditions for
future piracy behavior (Higgins et al., 2008). This link has been previously tested by
several researchers. Ingram and Hinduja (2008) find that greater acceptance of the
neutralization techniques significantly predicts moderate to high levels of piracy
participation. Likewise, Morris and Higgins (2009) show that neutralization was a
significant determinant of the expected counts of various forms of digital piracy. This
relationship was strongest for music and video, and less so for software piracy. Thus, the
more the consumer rationalizes his downloading files illegally from the internet in the
past, the more likely s/he will continue to piratedigital content. In thiscase, rationalization
for the past digital piracy behavior serves as neutralization for future behavior:
H5. The greater the consumers’ rationalization for their past digital piracy
behavior, the greater the consumers’ future piracy intent.
3. Methodology
In order to test the conceptual model for the study, a self-administered survey was
conducted in EU. To ensure a broad representation of different parts of the EU, five
countries representing various geographic regions of the EU were included in data
collection: Austria, Italy,Slovenia, Sweden andUK.We used mixed method sampling and
data collection techniques using both probability (mail survey) and purposive sampling
strategies (online survey). For our mail survey, a sample representative of general adult
population in terms of age and gender was drawn in each country. The mailing lists were
obtained from local research institutions. In case of online survey, we recruited
participants by posting the link to the survey on various web pages. We also sent the link
to our acquaintances via e-mail and asked them to recruit future subjects from among
their acquaintances. The decision to use mixed methods was guided mostly by the
motivationtoincreasegeneralizabilityandincreaseinferencequality (Kemperetal.,2003).
The overall response rates for the mail survey ranged between 10 percent to just over
13 percent across countries. A raffle with various prizes was offered as an incentive. The
data set used in this study was part of a large research project investigating EU consumer
attitudes andbehaviors regardingboth counterfeiting andpiracy. Hence,the originaldata
set was first reduced by including merely respondents having reported to use computers,
and have actually engaged in digital piracy in the past, which yield a sample of
6,666 respondents from five countries. Second, such large sample size is deemed too large
considering the use of covariance analysis in testing our hypotheses. Therefore, we
reduced the overall sample for use in the analysis by randomly selecting respondents
within the countries. In total, the final sample comprised of 1,213 respondents, including
215 from Austria, 244 from Italy, 250 from each Slovenia and Sweden, and 254 from the
UK. Slightly over 77 percent of the total sample used in this study was derived from the
mail survey and almost 23 percent from the online survey.
Overall, our sample consisted of more male than female respondents (52.9 percent
males). Across countries, the proportion of males ranged from 43.4 percent in Slovenia to
57.9 percent in Italy (UK 53.6 percent, Austria 53.7 percent, Sweden 56 percent).
Theaverageageofrespondentsinthesamplewas 36.4years(standarddeviation of14.3),
Consumer digital
piracy behavior
303
with the lowest mean in the Slovene subsample (32.5 years), and the highest mean in the
Italian subsample (39.6 years) (Austria 33.8, UK 37.7, Sweden 38.2). The majority of the
respondents attained at least university education (43.6 percent), similar but slightly
lower proportion completed college (41.7 percent), and less than 15 percent completed
primary or vocational school. Country-wise, the highest proportion of respondents with
this education was in Italy (23.2 percent of the Italian subsample) and the lowest in
Austria (3.7 percent) (Sweden 16.6, UK 21.2, Slovenia 8.0). The proportion of
college-educated respondents ranged from 57.4 percent in Slovenia, 51.5 percent in Italy,
38.9 percent in Sweden, 38 percent in the UK, to 20 percent in Austria. The Austrian
subsample consisted of the highest share of people with university degree or more
(76.3 percent), followed by the Swedish (44.5 percent), the UK (40.8 percent), the Slovene
(34.5 percent), and the Italian subsample (25.3 percent).
All construct measures were either directly taken or adapted from existing literature.
The perceived technical risk associated with digital piracy or the potential technical
damage to the consumer’s computer was measured with six items, adapted from
Hennig-Thurau et al. (2007). The perceived benefits of digital piracy behavior were
measured with five statements, tapping into various specific benefits, such as collection
and technical benefits (Hennig-Thurau et al., 2007). Five statements, adapted from Skyes
and Matza’s five neutralization techniques (1957), measured the consumers’
rationalization of their past piracy behavior. To measure the future digital piracy
intention, two items from Taylor and Todd (1995) research were used. All measures,
individual statements used, standardized factor loadings from the confirmatory factor
analysis, and construct reliabilities are reported in Table I.
Measures used in this study were carefully adapted to the different linguistic and
culturalcontextswiththeadditionaltestingofreliability.Asperguidelinesforconducting
cross-national consumer research (Craig and Douglas, 2000; de Jong et al., 2009),
the process of developing the survey instrument and modifying the scale items included:
.
elimination of items with limited conceptual equivalence;
.
ensuring the translation is decentered from a literal language translation; and
.
careful pretesting of the research instrument on a convenience sample of relevant
individuals in each country, along with the subsequent modification of
individual items in our measures.
4. Analysis and findings
Even though our goal was not focused on comparing different countries within the EU,
we assessed invariance of measures across the countries included in our sample. First,
we evaluated “configural invariance” of measures to see whether the same pattern of
zero and non-zero factor loadings exists in different countries (Horn et al., 1983). Using
confirmatory factor analysis, all salient factor loadings were substantially and
significantly different from zero and the factor inter-correlations were significantly
below unity in all five counties. Thus, the measures achieved the configural invariance.
Next, we assessed “metric invariance” or the requirement of equal metrics or scales
(Rock et al., 1978). Metric invariance allows a meaningful comparison of ratings or
difference scores across countries, with these differences indicative of similar
cross-national difference in the underlying construct (Steenkamp and Baumgartner,
1998). To test for metric invariance, we constrained all factor loadings to be the same
JRIM
6,4
304
across the five countries. The full metric invariance model fit the data as well as the
configural model and achieved even a slight decrease in the value of x 2
per degree of
freedom. Therefore, the measures exhibited cross-national metric invariance. Next,
we proceeded with evaluation of the pooled sample.
To assess the adequacy of measures in the pooled sample, confirmatory factor
analysis in AMOS was conducted. As the x 2
-statistic is sample size dependent, other fit
indices better serve as indicators of the model fit (Bagozzi and Yi, 1988). The fit of the
confirmatory factor model with the data was good (x 2
¼ 790 df ¼ 129; NFI ¼ 0.93;
IFI ¼ 0.94; CFI ¼ 0.94; RMSEA ¼ 0.065). All construct reliabilities exceeded the
recommended 0.70 (Table I). Discriminant validity was checked by constraining the
covariance in any set of two constructs (Anderson and Gerbing, 1988) and then
performing a x 2
difference test on the values obtained for the constrained and
unconstrainedmodels.Sincetheunconstrainedmodelshadsignificantlylowerx 2
values,
Constructs and construct items
Reliabilities
(Cronbach a) Stand. factor loadings
Perceived risk (adapted from Hennig-Thurau et al.
(2007)) 0.89
Illegally downloading files is risky because
They might not work properly 0.57
You might have your internet access terminated 0.60
They might infect your computer with a virus or
malware 0.76
It could allow access to your data, files or passwords 0.91
They might enable your identity to be stolen 0.89
They might damage your computer 0.82
Perceivedbenefits(adaptedfromHennig-Thurauetal.
(2007)) 0.82
Illegally downloading files offers a real bargain 0.71
Illegally downloaded files work as well as the legal
ones 0.61
Illegally downloading files increases my ability to
collect music/films/games 0.77
Illegally downloading files allows me to have files
that I would not be able to afford 0.71
Illegal downloading helps me get music/films/games
faster compared to legal channels 0.69
Rationalization (Skyes and Matza, 1957) 0.76
I couldn’t help myself; I had to illegally download the
files 0.56
It’s no big deal as no one was hurt 0.73
It’s the industry’s own fault they were taken
advantage of 0.61
I was only doing what others do all the time 0.64
I wouldn’t have bought the legal ones anyway 0.58
Piracy intention (Taylor and Todd, 1995) 0.88
I intend to illegally download files from the internet
in the future 0.89
If the need or opportunity arises within the next
month, I would illegally download files 0.90
Table I.
Constructs, construct
items, reliabilities and
standardized factor
loadings
Consumer digital
piracy behavior
305
it can be concluded that the measures exhibit acceptable discriminant validity. Next, the
conceptual model was tested using structural equation modeling in AMOS. Structural
model provided a good fit with the data (x 2
(df) ¼ 790 (129); NFI ¼ 0.93; IFI ¼ 0.94;
CFI ¼ 0.94; RMSEA ¼ 0.065). Individual hypotheses test statistics and results are
displayed in Table II and are discussed next. Because the hypotheses were directional,
one-sided hypotheses tests were employed.
H1 predicted that the perceived technical risk of digital piracy will be negatively
associated with the consumers’ rationalization of their past piracy behavior. The
findings do not provide support for this hypothesis, as the standardized regression
coefficient of the proposed structural path was not significantly different from zero
(b ¼ 0.05, t ¼ 1.58, p ¼ 0.11). H1 is thus rejected. H2 proposed that the perceived
benefits of digital piracy will be positively related with the consumers’ rationalization of
piracy behavior. According to the analysis, as perceptions of benefits of piracy increased,
so did the rationalization for the behavior (b ¼ 0.778, t ¼ 14.88, p ¼ 0.000), providing
support for H2. In addition to predicting an indirect effect of perceived technical risk and
perceived benefits through rationalization, we anticipated that both the perceived
technical risk and the perceived benefits will also directly influence consumers’ future
piracy intent (H3 and H4). The findings show that, as the perceived technical risk
increased, the consumers’ intent to digitally pirate decreased (b ¼ 20.13, t ¼ 25.14,
p ¼ 0.000), supporting H3. In addition, as the perceived benefits increased, so did the
intent to digitally pirate in the future (b ¼ 0.41, t ¼ 7.71, p ¼ 0.000), supporting H4.
Lastly, we predicted that the extent of consumers’ rationalization for their past piracy
will be positively associated with their future piracy intent. Indeed, as the extent of
rationalization increased, so did the respondents’ future piracy intent (b ¼ 0.38, t ¼ 6.92,
p ¼ 0.000). Thus, H5 is also supported. Based on the squared correlations in the final
model, approximately 59 percent of variance in rationalization can be explained by
perceived benefits and perceived technical risk, and 61 percent of variance in piracy
intention by perceived benefits, perceived technical risk, and rationalization.
5. Discussion of findings
In developing and empirically evaluating our conceptual model, we first investigated
determinants of consumers’ use of rationalization for past piracy behavior
Hypothesis:
direction Structural path
Std. regr.
coefficient t-statistics p-value
Hypothesis
outcome
H1.: 2 Perceived
risk ! rationalization
0.05 1.58 0.11 Rejected
H2.: þ Perceived
benefits ! rationalization
0.78 14.88 0.000 Supported
H3.: 2 Perceived risk ! piracy
intention
20.13 25.14 0.000 Supported
H4.: þ Perceived
benefits ! piracy intention
0.41 7.71 0.000 Supported
H5.: þ Rationalization ! piracy
intention
0.38 6.92 0.000 Supported
Notes: x 2
(df) ¼ 790 (129); NFI ¼ 0.93; IFI ¼ 0.94; CFI ¼ 0.94; RMSEA ¼ 0.065;
n (sample size) ¼ 1,213
Table II.
Testing the
conceptual model
JRIM
6,4
306
(i.e. perceived technical risk and perceived benefits), and second, the antecedents of
consumers’ future piracy intent (i.e. perceived technical risk, perceived benefits and
rationalization of past piracy behavior). All proposed hypotheses were supported with
an exception of the effect of perceived technical risk of digital piracy on consumers’
rationalization of their past piracy behavior (H1). We anticipated a negative
association between the two constructs, but the effect was not significant. Similarly,
although in a somewhat different context of ethical consumption, Sander (2010) failed
to provide empirical evidence for a significant impact of negatively framed information
(such as perceived risk) on the use of neutralization techniques, and used sensitivity of
the topic as a possible explanation. This reasoning may also be applicable to our study.
In addition, given the focus of the perceived risk measure on technical damage
associated with digital piracy, another plausible explanation is that other types of
risks, such as those tapping into the ethics or morality (e.g. prosecution risk), may more
prominently shape the use of rationalization techniques. Research on attitudes and
behaviors finds similar gaps and suggests that the specificity of measures might
interfere with the predictability of behavior. In addition, perceived technical risk and
rationalization of past behavior may not be cognitively related. Perceived technical
problems might be salient when actually performing the behavior, while rationalizing
one’s past behavior focuses on the positive effects and the risk is not relevant anymore.
This points towards a distinction between performing a behavior (e.g. using a service,
such as downloading files), where certain risks occur, and evaluating one’s own
behavior retrospectively, where the benefits of the behavior are more salient.
This explanation seems likely, particularly in the light of support found for H2.
With respect to expected positive consequences of digital piracy, we find that
perceived benefits have a significant and relatively large effect on the consumers’
rationalization for their piracy behavior (H2). Although we do not explicitly address
the mechanisms of this impact, we suggest that the more benefits consumers expect
from illegally downloading files, the less they adhere to their norms. Instead, in order to
reap those benefits, consumers resort to rationalization techniques, thus providing
excuses for their behavior.
All three hypotheses regarding the antecedents of an individual’s intention to engage
in future digital piracy (H3, H4, and H5) were empirically supported. Specifically,
perceived technical risk, perceived benefits and rationalization proved to be significant
predictors of consumer’s intention to illegally download files in the future. Although
previous results with respect to the relationship between risk and intention are
somewhat equivocal (Sinha and Mandel, 2008), our research findings are unambiguous,
indicating an inverse relationship between perceived technical risk and consumer’s
intention to engage in digital piracy (H3). This is consistent with several other empirical
studies (Hennig-Thurau et al., 2007; Lysonski and Durvasula, 2008; Yoon, 2011).
The results of our study further support the positive effect of perceived benefits on
digital piracy intention (H4). This corresponds to Hunt and Vitell’s (1986) contention
that an individual veers toward a certain type of behavior directly because of certain
preferred consequences. The third significant predictor of consumer’s intention to
illegally download files identified in this study is consumer’s use of rationalization for
past piracy behavior (H5), corroborating existing research findings (Ingram and
Hinduja, 2008; Morris and Higgins, 2009). This finding can be also explained by the
effect of past behavior on future behavior intentions. The more positive one perceives
Consumer digital
piracy behavior
307
his/her own behavior to be (through rationalizing it and thus making it more positive),
the more confident the person might be to perform the same behavior in the future.
An interesting finding, although not the primary objective of this study, is the
relative importance of the three determinants of future piracy intention. Our results
suggest that the strongest driver of one’s piracy intent is his/her perception of benefits,
closely followed by the use of rationalization techniques. Perception of technical risk is
the weakest predictor of behavioral piracy intention. It appears that the negative
factors (risks) and positive drivers (benefits) have a different role in affecting future
behavior. Perceived benefits seem to strengthen the piracy intent, while the risks might
reduce the magnitude of the behavior, but not fully eliminate the intention to actually
perform the behavior.
These empirical findings add to the limited body of knowledge pertaining to
neutralization and rationalization techniques previously rather neglected in
customer-focused studies (Harris and Dumas, 2009). Although the study was
cross-sectional and the measures of intention were gathered concurrently with
rationalization, the study provides evidence that rationalization occurs after piracy
behavior takes place, which potentially enhances continuity in future behavior.
6. Implications, limitations and future research
The present research offers useful implications for marketing communications and
public policy strategies as well as for academic research. Digital piracy importantly
affects various stakeholders, including recorded music, movie and software
industries, distributors and consumers. So far, the efforts to curtail this practice
included mostly promoting public awareness through consumer education and
protecting intellectual property rights through legal threats and actions against
individuals and operators of networks facilitating digital piracy activities. However,
such deterrent strategies tend to be ineffective (Bhattacharjee et al., 2006; Sinha and
Mandel, 2008).
Instead, emphasizing preventive strategies is more strongly encouraged (Gopal et al.,
2004; Sinha and Mandel, 2008). Our findings provide a roadmap to guide marketers
and policy makers in meeting the challenge of digital piracy by focusing attention on
three areas to directly impinge on individual’s piracy intent: perceptions of specific
benefits from downloading, consumers’ perceptions of technical risk, and justifications
for their past actions. In more practical terms, this means first, perceived benefits
should be lessened. Second, perceived technical risks should be emphasized and, third,
the acceptance and the impact of rationalization arguments need to be weakened so
that they do not serve as a way out anymore. Hence, marketing communications
centering on public awareness of personal consequences of digital piracy should be
effective in deterring future piracy intention. Such strategies could include using the
social context of consumers rather than communication by institutions, governments
or firms for communicating risks rather than benefits of piracy. For instance, in online
forum discussions, the perception of technical risks could be attenuated instead of
overemphasizing the benefits of piracy. Marketers’ role in this context could be to turn
attention to consumers’ benefits of legally obtaining products rather than using pirated
alternatives in their communication and product policy. Social media and discussion
forums could be used to understand the influence of the social environment on
consumers’ perception of risk and benefit, which helps in framing marketing messages.
JRIM
6,4
308
In the general public, the image of piracy as heroic acts needs to be transferred into
a perception of piracy as less acceptable behavior (e.g. by stressing the loss for
independent artists rather than stressing losses for big corporations). Our findings
reveal that perceived benefits have the strongest impact on both rationalization and
piracy intent. If illegal downloading provides fewer benefits than legal downloading,
then perceptions of risks might prevail, consequently reducing rationalization and
future piracy intent. For instance, these could include beliefs that legal options are
equally inexpensive and meet consumers’ needs at a convenient time, or that illegal
sources are difficult to find and do not offer a full range of options.
Rationalization can be seen as a cognitive mechanism which prevails if internal
standards and norms are less strongly reviewed by individuals. In other words, to
overcome the obligation to behave according to (learned) norms and standards,
individuals use commonly accepted arguments that are, for instance, brought forward
in informal communication among peers and are used in the mass media as well
(“piracy is a peccadillo”). Rationalization seems to be an effective way of achieving
distance to internal standards and could help in establishing a certain state of balance
between internal norms and standards and one’s behavior even if or because the
behavior violates existing norms. As long as rationalization arguments are personally
and socially accepted, individuals will use them for norm-violating behavior. A way to
reduce their effectiveness is to make arguments more difficult to accept, i.e. providing
counterarguments to rationalization arguments, or more difficult to build new ones.
For public policy makers, the results of this study can facilitate an understanding that
how individuals review their past behavior impacts their future intent. This could
mean that the review process (rationalization) could be controlled by educational and
consumer protection-related efforts. In other words, challenging the publicly accepted
arguments of piracy as peccadillo through projects in which key actors present
multiple views and consequences of piracy could be a way to counter the issue.
Based on the knowledge of how consumers use rationalization/neutralization
techniques to justify digital piracy, marketing communications and persuasion
activities can be designed to counter the arguments that consumers use. Nonetheless,
designing these activities requires some caution, as it is also possible that – instead of
adapting their behavior by reducing and/or eliminating piracy behaviors – consumers
might invent new neutralizing beliefs (Minor, 1981).
In summary, this study provides three target constructs, i.e. benefits, risk, and
rationalization, on which to focus in the development of preventive-based appeals of
persuasion (e.g. intentions, attitudes). From an academic perspective, our findings reveal
the importance of perceived benefit as antecedent for rationalization strategies and
subsequently its impact on future piracy intent. It shows also that perceived technical
risk is less influential on cognitive processes, but has a negative influence on future
piracy intent.Thisextendspreviousresearchon predictorsforpiracyintentandbehavior
in that perceived gains rather than losses drive rationalization of past piracy behavior.
The findings and contributions of this study are constrained by certain limitations of
our empirical effort, in turn suggesting potentially fruitful avenues for future research.
First, our measure of perceived adverse consequences was limited to technical aspect
of risk. Examining a wider scope of risk dimensions, such as prosecution risk or other
types of psychological risks (Chiou et al., 2005; Liao et al., 2010) may offer a more
comprehensive insight into this concept. Second, the cross-sectional design of the study
Consumer digital
piracy behavior
309
creates some limitations. Although rarely applied in the piracy research (Williams et al.,
2010), a longitudinal methodology could provide a stronger inference, particularly with
respect to the sequencing of rationalization. What is more, experimental designs could
help determining the causality of rationalization and perceived benefit and risk. This
topic has been recognized as an under-researched area needing further investigation
(Harris and Dumas, 2009). Third, while precautions have been taken in the sampling and
data collection process across five countries to ensure reliable data, the use of constructs
of potentially sensitive nature (i.e. aberrant behavior) in self-reported surveys may
have been impacted by socially desirable responding (Steenkamp et al., 2010). This
limitation is more likely present in a non-student population. Students and other
younger consumers, who have grown up with easy access to free content on the internet,
have a more liberal view of sharing content and may fail to recognize piracy as a
transgression of social norms (Sinha and Mandel, 2008).
References
Aleassa, H., Pearson, J.M. and McClurg, S. (2011), “Investigating software piracy in Jordan: an
extension of the theory of reasoned action”, Journal of Business Ethics, Vol. 98 No. 4,
pp. 663-76.
Anderson, J.C. and Gerbing, D. (1988), “Structural equation modeling in practice: a review and
recommended two-step approach”, Psychological Bulletin, Vol. 103 No. 3, pp. 411-23.
BASCAP (2011), Estimating the Global Economic and Social Impacts of Counterfeiting and
Piracy, Business Action to Stop Counterfeiting and Piracy, Paris, available at:
www.iccwbo.org/uploadedFiles/BASCAP/Pages/Global%20Impacts%20-%20Final.pdf
(accessed 3 October).
Bagozzi, R.P. and Yi, Y. (1988), “On the evaluation of structural equation models”, Journal of the
Academy of Marketing Science, Vol. 16 No. 1, pp. 74-94.
Bhattacharjee, S., Gopal, R., Lertwachara, K. and Marsden, J.R. (2006), “Whatever happened to
payola? An empirical analysis of online music sharing”, Decision Support Systems, Vol. 42
No. 1, pp. 104-20.
Block, L.G. and Keller, P.A. (1995), “When to accentuate the negative: the effects of perceived
efficacy and message framing on intentions to perform a health-related behavior”, Journal
of Marketing Research, Vol. 32 No. 2, pp. 192-203.
Chang, C. (2008), “Ad framing effects for consumption products: an affect priming process”,
Psychology & Marketing, Vol. 25 No. 1, pp. 24-46.
Chatzidakis, A., Hibbert, S. and Smith, A.P. (2007), “Why people don’t take their concerns about
fair trade to the supermarket: the role of neutralization”, Journal of Business Ethics, Vol. 74
No. 1, pp. 89-100.
Chiou, J.-S., Huang, C. and Lee, H. (2005), “The antecedents of music piracy attitudes and
intentions”, Journal of Business Ethics, Vol. 57 No. 2, pp. 161-74.
Craig, C.S. and Douglas, S.P. (2000), International Marketing Research, Wiley, New York, NY.
Dacin, T. and Murphy, P.R. (2011), “Psychological pathways to fraud: understanding
and preventing fraud in organizations”, Journal of Business Research, Vol. 101 No. 4,
pp. 601-18.
D’Astous, A. and Legendre, A. (2009), “Understanding consumers’ ethical justifications: a scale
for appraising consumers’ reasons for not behaving ethically”, Journal of Business Ethics,
Vol. 87 No. 2, pp. 255-68.
JRIM
6,4
310
de Jong, M.G., Steenkamp, J.-B.E.M. and Veldkamp, B.P. (2009), “A model for the construction of
country-specific, yet internationally comparable short-form marketing scales”, Marketing
Science, Vol. 28 No. 4, pp. 674-89.
Eisend, M. and Schuchert-Gueler, P. (2006), “Explaining counterfeit purchases – a review and
preview”, Academy of Marketing Science Review, Vol. 6 No. 12, pp. 1-25.
Goles, T., Jayatilaka, B., George, B., Parsons, L., Chambers, V., Taylor, D. and Brune, R. (2008),
“Softlifting: exploring determinants of attitude”, Journal of Business Ethics, Vol. 77 No. 4,
pp. 481-99.
Gopal, R.D., Sanders, G.L., Bhattacharjee, S., Agrawal, M. and Wagner, S.C. (2004), “A behavioral
model of digital music piracy”, Journal of Organizational Computing and Electronic
Commerce, Vol. 14 No. 2, pp. 89-105.
Grove, S.J. and Vitell, S.J. (1989), “Non-normative consumer behavior and the techniques of
neutralization”, in Bagozzi, R. and Peter, J. (Eds), Proceedings of the 1989 AMA Winter
Educator’s Conference, American Marketing Association, Chicago, IL, pp. 131-5.
Harris, L.C. and Dumas, A. (2009), “Online consumer misbehaviour: an application of
neutralization theory”, Marketing Theory, Vol. 9 No. 4, pp. 379-402.
Hennig-Thurau, T., Henning, V. and Sattler, H. (2007), “Consumer file sharing of motion
pictures”, Journal of Marketing, Vol. 71 No. 4, pp. 1-18.
Higgins, G.E., Wolfe, S.E. and Marcum, C.D. (2008), “Music piracy and neutralization:
a preliminary trajectory analysis from short-term longitudinal data”, International Journal
of Cyber Criminology, Vol. 2 No. 2, pp. 324-36.
Hinduja, S. (2007), “Neutralization theory and online software piracy: an empirical analysis”,
Ethics and Information Technology, Vol. 9 No. 3, pp. 187-204.
Horn, J.L., McArdle, J.J. and Mason, R. (1983), “When is invariance not invariant: a practical
scientist’s look at the ethereal concept of factor invariance”, The Southern Psychologist,
Vol. 1 No. 4, pp. 179-88.
Hunt, S.D. and Vitell, S. (1986), “A general theory of marketing ethics”, Journal of
Macromarketing, Vol. 6 No. 1, pp. 5-16.
Ingram, J. and Hinduja, S. (2008), “Neutralizing music piracy: an empirical examination”,
Deviant Behavior, Vol. 29 No. 4, pp. 334-66.
Kemper, E., Stringfield, S. and Teddlie, C. (2003), “Mixed methods sampling strategies in social
science research”, in Tashakkori, A. and Teddlie, C. (Eds), Handbook of Mixed Methods in
Social & Behavioral Research, Sage, Thousand Oaks, CA, pp. 273-96.
Kini, R.B., Ramakrishna, H.V. and Vijayaraman, B.S. (2003), “Shaping of moral intensity
regarding software piracy: a comparison between Thailand and US students”, Journal of
Business Ethics, Vol. 49 No. 1, pp. 91-104.
Konstantakis, N.I., Palaigeorgiou, G.E., Siozos, P.D. and Tsoukalas, I.A. (2010), “What do
computer science students think about software piracy?”, Behavior & Information
Technology, Vol. 29 No. 3, pp. 277-85.
Liao, C., Lin, H.-N. and Liu, Y.-P. (2010), “Predicting the use of pirated software: a contingency
model integrating perceived risk with the theory of planned behavior”, Journal of Business
Ethics, Vol. 91 No. 2, pp. 237-52.
Lysonski, S. and Durvasula, S. (2008), “Digital piracy of MP3s: consumer and ethical
predispositions”, Journal of Consumer Marketing, Vol. 25 No. 3, pp. 167-78.
McGregor, S.L.T. (2008), “Conceptualizing immoral and unethical consumption using
neutralization theory”, Family and Consumer Sciences Research Journal, Vol. 36 No. 3,
pp. 261-76.
Consumer digital
piracy behavior
311
Mattelart, T. (2009), “Audio-visual piracy: towards a study of the underground networks of
cultural globalization”, Global Media and Communication, Vol. 5 No. 3, pp. 308-26.
Minor, W.W. (1981), “Techniques of neutralization: a reconceptualization an empirical
examination”, Journal of Research in Crime and Delinquency, Vol. 18, pp. 295-318.
Moore, R. and McMullan, E. (2009), “Neutralization and rationalization of digital piracy:
a qualitative analysis of university students”, International Journal of Cyber Criminology,
Vol. 3 No. 1, pp. 441-51.
Morris, R.G. and Higgins, G.E. (2009), “Neutralizing potential and self-reported digital piracy:
a multitheoretical exploration among college undergraduates”, Criminal Justice Review,
Vol. 34 No. 2, pp. 173-95.
Nicholls, A. and Lee, N. (2006), “Purchase decision-making in fair trade and the ethical purchase
‘gap’: ‘is there a fair trade twix?’”, Journal of Strategic Marketing, Vol. 14 No. 4, pp. 369-86.
Phau, I. and Ng, J. (2010), “Predictors of usage intentions of pirated software”, Journal of Business
Ethics, Vol. 94 No. 1, pp. 23-37.
Phau, I., Sequeira, M. and Dix, S. (2009), “Consumers’ willingness to knowingly purchase
counterfeit products”, Direct Marketing: An International Journal, Vol. 3 No. 4, pp. 262-81.
Rock, D.A., Werts, C.E. and Flaughter, R.E. (1978), “The use of analysis in covariance structures
for comparing psychometric properties of multiple variables across populations”,
Multivariate Behavioral Research, Vol. 13 No. 4, pp. 403-18.
Sander, A. (2010), “An empirical study on decision-making, neutralization theory and
information framing in the context of ethical consumption”, Master thesis, Maastricht
University, Maastricht.
Shields, I.W. and Whitehall, G.C. (1994), “Neutralization and delinquency among teenagers”,
Criminal Justice and Behavior, Vol. 21 No. 2, pp. 223-35.
Sinha, R.K. and Mandel, N. (2008), “Preventing digital music piracy: the carrot or the stick?”,
Journal of Marketing, Vol. 72 No. 1, pp. 1-15.
Sinha, R.K., Machado, F.S. and Sellman, C. (2010), “Don’t think twice, it’s all right: music piracy
and pricing in a DRM-free environment”, Journal of Marketing, Vol. 74, pp. 40-54.
Sirkeci, I. and Magnúsdóttir, L.B. (2011), “Understanding illegal music downloading in the UK:
a multi-attribute model”, Journal of Research in Interactive Marketing, Vol. 5 No. 1,
pp. 90-110.
Skyes, G. and Matza, D. (1957), “Techniques of neutralization: a theory of delinquency”,
American Sociological Review, Vol. 22 No. 6, pp. 664-70.
Steenkamp, J.-B.E.M. and Baumgartner, H. (1998), “Assessing measurement invariance in
cross-national consumer research”, Journal of Consumer Research, Vol. 15 No. 1, pp. 78-90.
Steenkamp, J.-B.E.M., de Jong, M.G. and Baumgartner, H. (2010), “Socially desirable response
tendencies in survey research”, Journal of Marketing Research, Vol. 47, April, pp. 199-214.
Taylor, S. and Todd, P. (1995), “Assessing IT usage: the role of prior experience”, MIS Quarterly,
Vol. 19 No. 4, pp. 561-70.
Williams, P., Nicholas, D. and Rowlands, I. (2010), “The attitudes and behaviours of illegal
downloaders”, Aslib Proceedings: New Information Perspectives, Vol. 62 No. 3, pp. 283-301.
Yoon, C. (2011), “Theory of planned behavior and ethics theory in digital piracy: an integrated
model”, Journal of Business Ethics, Vol. 100 Nos 3/4, pp. 405-17.
Zamoon, S. and Curley, S. (2008), “Ripped from the headlines: what can the popular press teach
us about software piracy?”, Journal of Business Ethics, Vol. 83 No. 3, pp. 515-33.
JRIM
6,4
312
Further reading
Ang, S.H., Cheng, P.S., Lim, A.A.C. and Tambyah, S.K. (2001), “Spot the difference: consumer
responses towards counterfeits”, Journal of Consumer Marketing, Vol. 18 No. 3, pp. 219-35.
Coyle, J.R., Gould, S.J., Gupta, P. and Gupta, R. (2009), “To buy or to pirate: the matrix of music
consumers’ acquisition-mode decision-making”, Journal of Business Research, Vol. 62
No. 10, pp. 1031-7.
Dacin, T. and Murphy, P.R. (2009), “Understanding and preventing unethical conduct in
organizations: a situation- and affect-based fraud framework”, available at: http://ssrn.
com/abstract¼1492765
D’Astous, A., Colbert, F. and Montpetit, D. (2005), “Music piracy on the web – how effective are
anti-piracy arguments? Evidence from the theory of planned behaviour”, Journal of
Consumer Policy, Vol. 28 No. 3, pp. 289-310.
Glass, S. and Wood, A. (1996), “Situational determinants of software piracy: an equity theory
perspective”, Journal of Business Ethics, Vol. 15 No. 11, pp. 1189-98.
Simpson, P.M., Banerjee, D. and Simpson, C.L. (1994), “Softlifting: a model of motivating factors”,
Journal of Business Ethics, Vol. 13 No. 6, pp. 431-8.
Staake, T., Thiese, F. and Fleish, E. (2009), “The emergence of counterfeit trade: a literature
review”, European Journal of Marketing, Vol. 43 Nos 3/4, pp. 320-49.
About the authors
Irena Vida is a Professor of Marketing at Faculty of Economics at the University of Ljubljana.
Her research focus is on application of consumer behaviour theories and models in cross-cultural
settings and on strategic issues in international marketing. She published articles in various
journals such as Journal of Business Research, European Journal of Marketing, Journal of
International Marketing, International Marketing Review and International Business Review.
Irena Vida is the corresponding author and can be contacted at: irena.vida@ef.uni-lj.si
Mateja Kos Koklič is an Assistant Professor of Marketing at the Faculty of Economics,
University of Ljubljana in Slovenia. Her research focuses on topics such as consumer behaviour
and consumer decision making, especially with respect to counterfeiting and piracy, as well as
perceived risk in different purchasing situations. She has published her findings in journals, such
as International Journal of Consumer Studies and Managing Global Transitions.
Monika Kukar-Kinney is Associate Professor of Marketing in the Robins School of Business,
University of Richmond, Richmond, Virginia and a Visiting Professor at the University of
Ljubljana, Faculty of Economics, Slovenia. Her research focuses on compulsive buying,
behavioral pricing, retailing and electronic commerce. Her work has appeared in journals such as
the Journal of the Academy of Marketing Science, Journal of Consumer Research, Journal of
Retailing, and Journal of Business Research, among others.
Elfriede Penz is Associate Professor at the Institute for International Marketing Management
at the Wirtschaftsuniversität Wien in Austria. Her research includes consumer behaviour, both
in online and offline contexts, the interplay between consumers and organisations (power)
as well as methodological issues in international marketing and management. She has published
in refereed international journals: Psychology & Marketing, Journal of Economic Psychology,
Management International Review and International Marketing Review.
To purchase reprints of this article please e-mail: reprints@emeraldinsight.com
Or visit our web site for further details: www.emeraldinsight.com/reprints
Consumer digital
piracy behavior
313

More Related Content

Similar to 10-1108_17505931211282418.pdf

A review of cyberbullying and cyber threats in education 2
A review of cyberbullying and cyber threats in education 2A review of cyberbullying and cyber threats in education 2
A review of cyberbullying and cyber threats in education 2
IAEME Publication
 
Investigating and Prosecuting Cyber Crime - Forensic Dependencies and Barrier...
Investigating and Prosecuting Cyber Crime - Forensic Dependencies and Barrier...Investigating and Prosecuting Cyber Crime - Forensic Dependencies and Barrier...
Investigating and Prosecuting Cyber Crime - Forensic Dependencies and Barrier...
Cameron Brown
 
Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11
Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11
Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11
DaliaCulbertson719
 
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...
Konstantinos Demertzis
 

Similar to 10-1108_17505931211282418.pdf (20)

A REVIEW OF CYBERBULLYING AND CYBER THREATS IN EDUCATION
A REVIEW OF CYBERBULLYING AND CYBER THREATS IN EDUCATIONA REVIEW OF CYBERBULLYING AND CYBER THREATS IN EDUCATION
A REVIEW OF CYBERBULLYING AND CYBER THREATS IN EDUCATION
 
A REVIEW OF CYBERBULLYING AND CYBER THREATS IN EDUCATION 2
A REVIEW OF CYBERBULLYING AND CYBER THREATS IN EDUCATION 2A REVIEW OF CYBERBULLYING AND CYBER THREATS IN EDUCATION 2
A REVIEW OF CYBERBULLYING AND CYBER THREATS IN EDUCATION 2
 
A review of cyberbullying and cyber threats in education 2
A review of cyberbullying and cyber threats in education 2A review of cyberbullying and cyber threats in education 2
A review of cyberbullying and cyber threats in education 2
 
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATIONBEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
 
Behavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationBehavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics Application
 
Behavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationBehavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics Application
 
Artificial Intelligence Technology And Social Problem Solving
Artificial Intelligence Technology And Social Problem SolvingArtificial Intelligence Technology And Social Problem Solving
Artificial Intelligence Technology And Social Problem Solving
 
Identity Management Policy Seminar
Identity Management Policy SeminarIdentity Management Policy Seminar
Identity Management Policy Seminar
 
Deepening the knowledge on information security management in developing coun...
Deepening the knowledge on information security management in developing coun...Deepening the knowledge on information security management in developing coun...
Deepening the knowledge on information security management in developing coun...
 
Investigating and Prosecuting Cyber Crime - Forensic Dependencies and Barrier...
Investigating and Prosecuting Cyber Crime - Forensic Dependencies and Barrier...Investigating and Prosecuting Cyber Crime - Forensic Dependencies and Barrier...
Investigating and Prosecuting Cyber Crime - Forensic Dependencies and Barrier...
 
Attitudes and the_digital_divide_attitude_measurem
Attitudes and the_digital_divide_attitude_measuremAttitudes and the_digital_divide_attitude_measurem
Attitudes and the_digital_divide_attitude_measurem
 
Personal factors as predictors of content specific use of the internet by aja...
Personal factors as predictors of content specific use of the internet by aja...Personal factors as predictors of content specific use of the internet by aja...
Personal factors as predictors of content specific use of the internet by aja...
 
Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11
Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11
Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11
 
Intrusion detection using incremental
Intrusion detection using incrementalIntrusion detection using incremental
Intrusion detection using incremental
 
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...
 
Interactive media usage among millennial consumer
Interactive media usage among millennial consumerInteractive media usage among millennial consumer
Interactive media usage among millennial consumer
 
Visual Analytics for Cime e aprendizado de maquina
Visual    Analytics    for     Cime e aprendizado de maquinaVisual    Analytics    for     Cime e aprendizado de maquina
Visual Analytics for Cime e aprendizado de maquina
 
Consumer_Perception_Of_Electronic-commerce.pdf
Consumer_Perception_Of_Electronic-commerce.pdfConsumer_Perception_Of_Electronic-commerce.pdf
Consumer_Perception_Of_Electronic-commerce.pdf
 
Philosophical Aspects of Big Data
Philosophical Aspects of Big DataPhilosophical Aspects of Big Data
Philosophical Aspects of Big Data
 
It ethics undergraduates’ perception based on their awareness
It ethics undergraduates’ perception based on their awarenessIt ethics undergraduates’ perception based on their awareness
It ethics undergraduates’ perception based on their awareness
 

Recently uploaded

How To Structure Your Web3 Website For Max Visibility In The Bull Market🚀
How To Structure Your Web3 Website For Max Visibility In The Bull Market🚀How To Structure Your Web3 Website For Max Visibility In The Bull Market🚀
How To Structure Your Web3 Website For Max Visibility In The Bull Market🚀
Victoria Olsina
 
Top Abortion Clinic in Muscat +918761049707!!!!!!!!!!! Get Cytotec kit availa...
Top Abortion Clinic in Muscat +918761049707!!!!!!!!!!! Get Cytotec kit availa...Top Abortion Clinic in Muscat +918761049707!!!!!!!!!!! Get Cytotec kit availa...
Top Abortion Clinic in Muscat +918761049707!!!!!!!!!!! Get Cytotec kit availa...
ahmedjiabur940
 
WA | 0821-8888-6412 | Apotik Jual Obat Aborsi Cytotec Asli Di Pasuruan
WA | 0821-8888-6412 | Apotik Jual Obat Aborsi Cytotec Asli Di PasuruanWA | 0821-8888-6412 | Apotik Jual Obat Aborsi Cytotec Asli Di Pasuruan
WA | 0821-8888-6412 | Apotik Jual Obat Aborsi Cytotec Asli Di Pasuruan
infoobataborsi24
 
Klinik Jual Obat Aborsi Di Bandung wa 0851/7541/5434 Misoprostol 200mcg Pfize...
Klinik Jual Obat Aborsi Di Bandung wa 0851/7541/5434 Misoprostol 200mcg Pfize...Klinik Jual Obat Aborsi Di Bandung wa 0851/7541/5434 Misoprostol 200mcg Pfize...
Klinik Jual Obat Aborsi Di Bandung wa 0851/7541/5434 Misoprostol 200mcg Pfize...
Spesialis Kandungan Resmi BPOM
 

Recently uploaded (20)

Digital PR & Content Marketing Lecture for Advanced Digital & Social Media St...
Digital PR & Content Marketing Lecture for Advanced Digital & Social Media St...Digital PR & Content Marketing Lecture for Advanced Digital & Social Media St...
Digital PR & Content Marketing Lecture for Advanced Digital & Social Media St...
 
Unit 3 - Liberalization, Privatization & Globalization
Unit 3 - Liberalization, Privatization & GlobalizationUnit 3 - Liberalization, Privatization & Globalization
Unit 3 - Liberalization, Privatization & Globalization
 
How To Structure Your Web3 Website For Max Visibility In The Bull Market🚀
How To Structure Your Web3 Website For Max Visibility In The Bull Market🚀How To Structure Your Web3 Website For Max Visibility In The Bull Market🚀
How To Structure Your Web3 Website For Max Visibility In The Bull Market🚀
 
youtube_marketing_partner_vling_service_introduction
youtube_marketing_partner_vling_service_introductionyoutube_marketing_partner_vling_service_introduction
youtube_marketing_partner_vling_service_introduction
 
Valor Review – AI Transforms Any ClickBank Account Into a Money-Making Machin...
Valor Review – AI Transforms Any ClickBank Account Into a Money-Making Machin...Valor Review – AI Transforms Any ClickBank Account Into a Money-Making Machin...
Valor Review – AI Transforms Any ClickBank Account Into a Money-Making Machin...
 
Top Abortion Clinic in Muscat +918761049707!!!!!!!!!!! Get Cytotec kit availa...
Top Abortion Clinic in Muscat +918761049707!!!!!!!!!!! Get Cytotec kit availa...Top Abortion Clinic in Muscat +918761049707!!!!!!!!!!! Get Cytotec kit availa...
Top Abortion Clinic in Muscat +918761049707!!!!!!!!!!! Get Cytotec kit availa...
 
Digital marketing guide complete guide for beginners
Digital marketing guide complete guide for beginnersDigital marketing guide complete guide for beginners
Digital marketing guide complete guide for beginners
 
The Majestic Salar de Uyuni A Natural Wonder of Bolivia.pptx
The Majestic Salar de Uyuni A Natural Wonder of Bolivia.pptxThe Majestic Salar de Uyuni A Natural Wonder of Bolivia.pptx
The Majestic Salar de Uyuni A Natural Wonder of Bolivia.pptx
 
Impacts Of Smart Watch & Wearable Technology On Daily Life
Impacts Of Smart Watch & Wearable Technology On Daily LifeImpacts Of Smart Watch & Wearable Technology On Daily Life
Impacts Of Smart Watch & Wearable Technology On Daily Life
 
Beyond Silos: How Holistic B2B Digital Strategy Drives Pipeline
Beyond Silos: How Holistic B2B Digital Strategy Drives PipelineBeyond Silos: How Holistic B2B Digital Strategy Drives Pipeline
Beyond Silos: How Holistic B2B Digital Strategy Drives Pipeline
 
WA | 0821-8888-6412 | Apotik Jual Obat Aborsi Cytotec Asli Di Pasuruan
WA | 0821-8888-6412 | Apotik Jual Obat Aborsi Cytotec Asli Di PasuruanWA | 0821-8888-6412 | Apotik Jual Obat Aborsi Cytotec Asli Di Pasuruan
WA | 0821-8888-6412 | Apotik Jual Obat Aborsi Cytotec Asli Di Pasuruan
 
Key Social Media Marketing Trends for 2024
Key Social Media Marketing Trends for 2024Key Social Media Marketing Trends for 2024
Key Social Media Marketing Trends for 2024
 
Using GA 4 to to Prove Value - Greg Jarboe - Aug 8, 2023.pptx
Using GA 4 to to Prove Value - Greg Jarboe - Aug 8, 2023.pptxUsing GA 4 to to Prove Value - Greg Jarboe - Aug 8, 2023.pptx
Using GA 4 to to Prove Value - Greg Jarboe - Aug 8, 2023.pptx
 
Generating Leads with Analyst Content Webinar Slides_SJN Final.pdf
Generating Leads with Analyst Content Webinar Slides_SJN Final.pdfGenerating Leads with Analyst Content Webinar Slides_SJN Final.pdf
Generating Leads with Analyst Content Webinar Slides_SJN Final.pdf
 
Tea Gobec, Kako pluti po morju tehnoloških sprememb, Innovatif.pdf
Tea Gobec, Kako pluti po morju tehnoloških sprememb, Innovatif.pdfTea Gobec, Kako pluti po morju tehnoloških sprememb, Innovatif.pdf
Tea Gobec, Kako pluti po morju tehnoloških sprememb, Innovatif.pdf
 
Klinik Jual Obat Aborsi Di Bandung wa 0851/7541/5434 Misoprostol 200mcg Pfize...
Klinik Jual Obat Aborsi Di Bandung wa 0851/7541/5434 Misoprostol 200mcg Pfize...Klinik Jual Obat Aborsi Di Bandung wa 0851/7541/5434 Misoprostol 200mcg Pfize...
Klinik Jual Obat Aborsi Di Bandung wa 0851/7541/5434 Misoprostol 200mcg Pfize...
 
Killer Packaging | PrintAction
Killer Packaging | PrintActionKiller Packaging | PrintAction
Killer Packaging | PrintAction
 
Best Digital Expert Corporation of India
Best Digital Expert Corporation of IndiaBest Digital Expert Corporation of India
Best Digital Expert Corporation of India
 
Fantasy Cricket Apps: A New Viewpoint for Online Cricket Betting Apps
Fantasy Cricket Apps: A New Viewpoint for Online Cricket Betting AppsFantasy Cricket Apps: A New Viewpoint for Online Cricket Betting Apps
Fantasy Cricket Apps: A New Viewpoint for Online Cricket Betting Apps
 
The Future Normal - DIGGIT - Henry Coutinho-Mason.pdf
The Future Normal - DIGGIT - Henry Coutinho-Mason.pdfThe Future Normal - DIGGIT - Henry Coutinho-Mason.pdf
The Future Normal - DIGGIT - Henry Coutinho-Mason.pdf
 

10-1108_17505931211282418.pdf

  • 1. Predicting consumer digital piracy behavior The role of rationalization and perceived consequences Irena Vida and Mateja Kos Koklič Marketing Department, University of Ljubljana, Ljubljana, Slovenia Monika Kukar-Kinney Marketing Department, University of Richmond, Richmond, Virginia, USA and University of Ljubljana, Ljubljana, Slovenia, and Elfriede Penz International Marketing Management, Wirtschaftsuniversität Wien, Vienna, Austria Abstract Purpose – Thepurpose of thispaper isto investigateconsumer perceptionsof personal risk and benefits ofdigitalpiracybehaviorasdeterminantsofone’sjustificationforsuchbehaviorandtheconsequentfuture piracy intention. Temporal effects of rationalization in shaping future piracy intent are also addressed. Design/methodology/approach – A conceptual model was developed using counterfeiting and piracy literature. Data were gathered via mail and online survey of adults in five European Union countries. The model was tested on pooled sample using confirmatory factor analysis and structural equation modeling. Findings – Rationalization mediates the relationship between perceived benefits and piracy intention, but not between perceived risk and intention. Both perceived risk and benefits affect piracy intent, with risk reducing it and benefits increasing it. Rationalization of past behavior increases future digital piracy intent. Research limitations/implications – Risk measure was limited to technical problems, thus future studies should examine a wider scope of risk dimensions. The cross-sectional design of the study also creates some limitations. A longitudinal methodology could provide a better insight into sequencing of rationalization. Social implications – Marketing communications should increase public awareness of risks and reduce perceived piracy benefits to reduce future piracy intent. Public persuasion activities should counter the arguments consumers use to rationalize their piracy behavior. Originality/value – This research fills in a void in knowledge on how expected consequences drive rationalization techniques, particularly with respect to future piracy intent. A realistic data set drawn from adult population in five countries is used, enhancing external validity. Keywords Digital piracy, Consequences, Risk, Benefits, Rationalization, Piracy intent, Digital technology, Consumer behaviour, European Union Paper type Research paper The current issue and full text archive of this journal is available at www.emeraldinsight.com/2040-7122.htm Data collection for this study was supported by the Commission of European Community, contract no. 217514 (EU – 7th Framework Programme). Authors gratefully acknowledge contributions of research partners from all countries participating in this research project. JRIM 6,4 298 Received 15 February 2012 Revised 7 May 2012, 18 June 2012 Accepted 6 July 2012 Journal of Research in Interactive Marketing Vol. 6 No. 4, 2012 pp. 298-313 q Emerald Group Publishing Limited 2040-7122 DOI 10.1108/17505931211282418
  • 2. 1. Introduction With rapid advances in technology and the increasing global availability and accessibility of digital channels for information/media distribution, illicit behavior regarding digital goods continues to perplex practitioners and researchers alike. Digital piracy represents a growing threat to the welfare of both producers and consumers (Phau and Ng, 2010; Sinha et al., 2010). While the exact loss for the supply side remains inconclusive, industry antipiracy group BASCAP (2011) estimated the income loss to range from $30 to $75 billion in digitally pirated music, movies and software industries alone, rising up to $240 billion by 2015. Some researchers question these estimates, seeking a more balanced approach by identifying both positive and negative effects for the producers (Bhattacharjee et al., 2006; Mattelart, 2009). Similarly, mixed effects have been recognized for the consumers as stakeholders taking part in digital piracy: both gains or benefits (such as price benefits) and losses or risks (such as a threat of computer virus) (Hennig-Thurau et al., 2007; Phau and Ng, 2010; Sirkeci and Magnúsdóttir, 2011). Undeniably, industries, policy makers and consumers are faced with the challenging environment and omnipotent institutional regime of existing digital copyright management. Current efforts aimed at curtailing digital piracy have left various stakeholders disgruntled due to either financial losses or by impinging on ideology of consumer rights, free access and creativity expression (Goles et al., 2008; Mattelart, 2009). Given the interdisciplinary nature of the problem, researchers in the areas of marketing, ethics, computer systems and criminology examined both the supply and the demand sides of the issue. Yet, several voids remain in the literature before adequate solutions can be identified. This study offers empirical insights into factors underlying consumer illicit behavior in the context of downloading, sharing and using digital products (e.g. music, software, movie files) across five European Union (EU) countries. We aim to examine consumer perceptions of expected personal consequences (e.g. perceived risk and benefits) as drivers of an individual’s justifications for illicit behavior regarding digital goods and behavioral intention to engage in such activities. Moreover, by applying neutralization theory, we investigate the temporal effects of rationalization behavior in shaping future piracy intent. When knowingly engaging in ethically questionable behaviors, individuals tend to resort to rationalization, a common method of reducing negative feelings by offering justification of their fraud, while still believing in their ethical values (Dacin and Murphy, 2011). The contribution of this study is threefold. First, we provide a balanced view by examining both expected gains and losses associated with digital piracy intent and rationalization of past piracy behavior. While previous studies acknowledged that expected consequences of the action may affect an individual’s choice of behavior (Yoon, 2011), far less attention has been focused on ways in which such perceptions drive rationalization techniques and thought processes behind digital piracy (McGregor, 2008). Insights into the drivers of rationalization, i.e. perceived risks and benefits, have important implications for antipiracy communication campaigns, particularly due to the low efficacy of existing appeals focusing mostly on adverse effects, such as emphasizing guilt appeals (Lysonski and Durvasula, 2008; Zamoon and Curley, 2008). Second, we test our conceptual model in a cross-national context using five EU countries. While this region is one of the largest free-trade areas in the world, most existing piracy research to date has been limited to the US and Asia (Aleassa et al., 2011; Eisend and Consumer digital piracy behavior 299
  • 3. Schuchert-Gueler, 2006). Third, we use realistic data sets drawn from adult computer users across the five countries in the EU using multiple methods of data collection. Previous empirical studies of the demand-side of piracy tend to rely on student samples rather than generalpublic. This threatens generalizability as the illicit digitalbehavior is by no means limited to university settings (Williams et al., 2010; Yoon, 2011). The paper is structured as follows. First, we briefly review the existing literature on digital piracy. Then, we develop a conceptual framework which serves as the basis for the construction of the hypotheses. Next, we report on the measures used, the data collection methodology and the analytical procedures. Finally, we present the findings of the study and discuss their implications and future research avenues. 2. Conceptual model and hypotheses Researchers delving into the demand-side of digital piracy have utilized different methodological approaches and applied various theoretical frameworks to explain unauthorized consumer activities on the internet. While this is not surprising given the interdisciplinary nature of the problem (e.g. business ethics, marketing and information systems), research community has yet to establish consistent theoretical frameworks to guide empirical efforts on digital piracy (Eisend and Schuchert-Gueler, 2006; Williams et al., 2010). The two most prominent theoretical approaches to studying illicit digital behavior have been the expectancy-value theories (e.g. the theory of reasoned action), and the theories of ethical decision making (e.g. Hunt and Vitell’s model of ethical decision making). Both of these are established on the fundamental premise that individual’s intentions are mostly consistent with the underlying attitudes (Chatzidakis et al., 2007). However, consumers’ attitudes do not always translate into purchase intentions and consequently behavior. For example, even though unauthorized downloading of digital products is treated as an illegal activity in most countries, many computer users, particularly among the youth and in the university settings, exhibit lenience and acceptance of such activities (Harris and Dumas, 2009; Hinduja, 2007; Kini et al., 2003). An illustration is provided by a software piracy study among computer science students, which found that while future information system professionals recognize the consequences of such behavior for the industry and others, and even admit to its immoral character, such cognizance does not discourage them from illicit computer behaviors (Konstantakis et al., 2010). An explanatory framework for this discrepancy can be found in the neutralization theory, which explains individuals’ attempts to minimize the negative feelings related to their norm-violating behavior based upon their self-concept and the perceptions by others (Grove and Vitell 1989; Shields and Whitehall, 1994). In their seminal work, Skyes and Matza (1957) developed five neutralization techniques: denial of responsibility (“it’s not my fault”), denial of injury (“no harm resulted from my actions”), denial of victim (“nobody got hurt”), condemning the condemners (“how darethey judge me when they are just as corruptor hypocritical”) and appeal to higher loyalties (“there is a greater cause”). Neutralization theorists suggest individuals may employ these techniques both before committing fraud, in order to avoid the negative affect (i.e. feelings of guilt or shame), or after committing fraud, in order to reduce or neutralize the negative affect. This means that neutralization occurs as an after-the-fact rationalization that may create conditions for future behavior (Harris and Dumas, 2009; Higgins et al., 2008). JRIM 6,4 300
  • 4. Employing neutralization techniques helps individuals reassure themselves of the appropriateness of their choices, and demonstrates their acceptability to others (Hinduja, 2007). The rationalization (justification or neutralization) theory has been used when investigating digital piracy (Morris and Higgins, 2009), software piracy (Hinduja, 2007; Phau and Ng, 2010), music piracy (Ingram and Hinduja, 2008) and online misbehavior in general (Harris and Dumas, 2009). Based on the overview of the digital piracy literature, a lack of studies exploring determinants of neutralization has been recognized. Some authors suggest that information and knowledge are the main influencing variables (D’Astous and Legendre, 2009; Nicholls and Lee, 2006). With respect to information, the most significant impact is the difference in perception of positive and negative message framing. More specifically, a message conveying information about negative consequences plays a different role in the decision making than a message about positive consequences (Block and Keller, 1995; Chang, 2008). Along these lines, perceived risk can be regarded as a consumer’s belief in negative consequences, while perceived benefits can be described as a consumer’s belief in positive consequences (Yoon, 2011). Our synthesis of counterfeiting and piracy literature provided the basis for development of a conceptual model for the study (Figure 1). In the model, we explore the role of perceived risk and perceived benefits in shaping two focal constructs: rationalization of past behavior and future piracy intent. To shed more light on the attitude-intention discrepancy (Chatzidakiset al., 2007;Phauet al., 2009),we also examine the effect of rationalization on future piracy intent. The proposed conceptual model, including the construct definitions and rationale for the hypotheses, is discussed next. 2.1 Determinants of rationalization The first set of hypotheses focuses on the determinants of rationalization. In our study, we define “rationalization” as a consumer’s technique to counter feelings of guilt associated with the past engagement in digital piracy (Moore and McMullan, 2009). “Perceived risk” refers to the probability that using illegally downloaded files would result in technical problems with the computer. The concept of perceived risk has been previously investigated in the piracy context, suggesting that it plays an important role in curtailing the digital piracy phenomenon (Sinha and Mandel, 2008). We base our prediction on the framing effect literature, which contends there are substantial differences in how we process negatively and positively framed information. Specifically, since negative framing evokes comparison to internal norms or standards (Block and Keller, 1995), we expect that perceived risk as negatively Figure 1. Conceptual model H1 Perceived risk Perceived benefits Rationalization Piracy intention H2 H5 H3 H4 Consumer digital piracy behavior 301
  • 5. framed information will reduce the extent to which an individual employs rationalization techniques as a means to justify norm-violating behavior. Thus, the more intensely an individual reviews his/her internal norms, the less likely s/he is to justify his or her past behavior: H1. The greater the perceived technical risk of digital piracy for consumers, the lower the extent of their rationalization for the past digital piracy behavior. “Perceived benefits” or the extent to which consumers believe that illegally downloading files will result in certain positive consequences have been scarcely explored in the piracy context (Hennig-Thurau et al., 2007; Yoon, 2011). As in H1, we formulate our prediction of the impact of perceived benefits on rationalization based on the framing effect theory. Contrary to perceived technical risk (H1), perceived benefits lead an individual to review his/her internal norms and standards less intensely, thus increasing the extent to which consumers use rationalization (Block and Keller, 1995). Therefore, we expect that perceived benefits of illegally downloading files will result in an increased use of rationalization techniques: H2. The greater the perceived benefits of digital piracy for consumers, the greater the extent of their rationalization for the past digital piracy behavior. 2.2 Determinants of future digital piracy intention The second set of hypotheses focuses on the antecedents of “future digital piracy intention”, defined as the likelihood that consumers will illegally download files from the internet in the future. Existing studies offer contradictory findings with respect to the role ofperceivedrisksoradverseeffectsinshapingfuturepiracyintention.For example,while perceived risk of getting caught downloading illegally (i.e. legal risk) is a strong deterrent for certain consumers, it can actually increase piracy tendencies for others (Sinha and Mandel, 2008). On the other hand, Hennig-Thurau et al. (2007) provide empirical evidence of the impact of perceived risk on consumer’s actual behavior. They conclude that while search and moral risks provide hurdles for obtaining illegal copies, technical risks directly reduce the probability of watching such copies. Since perception of adverse effects as determinants of piracy intentions and behaviors has been operationalized in various ways and produced conflicting results, the testing of the hypotheses stated below provides an opportunity to resolve this controversy. We predict that: H3. The greater the perceived technical risk of digital piracy for consumers, the lower the consumers’ future piracy intent. Another hypothesized driver of consumer intentions to pirate digital goods is perceived benefits. The underlying rationale is that a consumer intends to engage in digital piracy because of certain preferred outcomes, i.e. perceived benefits. This relationship has been empirically supported in several studies. For example, Yoon (2011) shows that perceived benefits have a positive impact on an individual’s intention to commit digital piracy. Similarly, Hennig-Thurau et al. (2007) demonstrate a significant causal link between two specific benefits, illegal copies as collectibles and anti-industry utility, and obtaining of illegal copies. Likewise, Lysonski and Durvasula (2008) find a significant positive correlation between social benefits of dissemination and intention to illegally download. To provide additional evidence of this relationship in a novel setting, we hypothesize: JRIM 6,4 302
  • 6. H4. The greater the perceived benefits of digital piracy for consumers, the greater the consumers’ future piracy intent. Future piracy intent is also shaped by consumer’s use of neutralization techniques. Neutralization techniques as an after-the fact rationalization may create conditions for future piracy behavior (Higgins et al., 2008). This link has been previously tested by several researchers. Ingram and Hinduja (2008) find that greater acceptance of the neutralization techniques significantly predicts moderate to high levels of piracy participation. Likewise, Morris and Higgins (2009) show that neutralization was a significant determinant of the expected counts of various forms of digital piracy. This relationship was strongest for music and video, and less so for software piracy. Thus, the more the consumer rationalizes his downloading files illegally from the internet in the past, the more likely s/he will continue to piratedigital content. In thiscase, rationalization for the past digital piracy behavior serves as neutralization for future behavior: H5. The greater the consumers’ rationalization for their past digital piracy behavior, the greater the consumers’ future piracy intent. 3. Methodology In order to test the conceptual model for the study, a self-administered survey was conducted in EU. To ensure a broad representation of different parts of the EU, five countries representing various geographic regions of the EU were included in data collection: Austria, Italy,Slovenia, Sweden andUK.We used mixed method sampling and data collection techniques using both probability (mail survey) and purposive sampling strategies (online survey). For our mail survey, a sample representative of general adult population in terms of age and gender was drawn in each country. The mailing lists were obtained from local research institutions. In case of online survey, we recruited participants by posting the link to the survey on various web pages. We also sent the link to our acquaintances via e-mail and asked them to recruit future subjects from among their acquaintances. The decision to use mixed methods was guided mostly by the motivationtoincreasegeneralizabilityandincreaseinferencequality (Kemperetal.,2003). The overall response rates for the mail survey ranged between 10 percent to just over 13 percent across countries. A raffle with various prizes was offered as an incentive. The data set used in this study was part of a large research project investigating EU consumer attitudes andbehaviors regardingboth counterfeiting andpiracy. Hence,the originaldata set was first reduced by including merely respondents having reported to use computers, and have actually engaged in digital piracy in the past, which yield a sample of 6,666 respondents from five countries. Second, such large sample size is deemed too large considering the use of covariance analysis in testing our hypotheses. Therefore, we reduced the overall sample for use in the analysis by randomly selecting respondents within the countries. In total, the final sample comprised of 1,213 respondents, including 215 from Austria, 244 from Italy, 250 from each Slovenia and Sweden, and 254 from the UK. Slightly over 77 percent of the total sample used in this study was derived from the mail survey and almost 23 percent from the online survey. Overall, our sample consisted of more male than female respondents (52.9 percent males). Across countries, the proportion of males ranged from 43.4 percent in Slovenia to 57.9 percent in Italy (UK 53.6 percent, Austria 53.7 percent, Sweden 56 percent). Theaverageageofrespondentsinthesamplewas 36.4years(standarddeviation of14.3), Consumer digital piracy behavior 303
  • 7. with the lowest mean in the Slovene subsample (32.5 years), and the highest mean in the Italian subsample (39.6 years) (Austria 33.8, UK 37.7, Sweden 38.2). The majority of the respondents attained at least university education (43.6 percent), similar but slightly lower proportion completed college (41.7 percent), and less than 15 percent completed primary or vocational school. Country-wise, the highest proportion of respondents with this education was in Italy (23.2 percent of the Italian subsample) and the lowest in Austria (3.7 percent) (Sweden 16.6, UK 21.2, Slovenia 8.0). The proportion of college-educated respondents ranged from 57.4 percent in Slovenia, 51.5 percent in Italy, 38.9 percent in Sweden, 38 percent in the UK, to 20 percent in Austria. The Austrian subsample consisted of the highest share of people with university degree or more (76.3 percent), followed by the Swedish (44.5 percent), the UK (40.8 percent), the Slovene (34.5 percent), and the Italian subsample (25.3 percent). All construct measures were either directly taken or adapted from existing literature. The perceived technical risk associated with digital piracy or the potential technical damage to the consumer’s computer was measured with six items, adapted from Hennig-Thurau et al. (2007). The perceived benefits of digital piracy behavior were measured with five statements, tapping into various specific benefits, such as collection and technical benefits (Hennig-Thurau et al., 2007). Five statements, adapted from Skyes and Matza’s five neutralization techniques (1957), measured the consumers’ rationalization of their past piracy behavior. To measure the future digital piracy intention, two items from Taylor and Todd (1995) research were used. All measures, individual statements used, standardized factor loadings from the confirmatory factor analysis, and construct reliabilities are reported in Table I. Measures used in this study were carefully adapted to the different linguistic and culturalcontextswiththeadditionaltestingofreliability.Asperguidelinesforconducting cross-national consumer research (Craig and Douglas, 2000; de Jong et al., 2009), the process of developing the survey instrument and modifying the scale items included: . elimination of items with limited conceptual equivalence; . ensuring the translation is decentered from a literal language translation; and . careful pretesting of the research instrument on a convenience sample of relevant individuals in each country, along with the subsequent modification of individual items in our measures. 4. Analysis and findings Even though our goal was not focused on comparing different countries within the EU, we assessed invariance of measures across the countries included in our sample. First, we evaluated “configural invariance” of measures to see whether the same pattern of zero and non-zero factor loadings exists in different countries (Horn et al., 1983). Using confirmatory factor analysis, all salient factor loadings were substantially and significantly different from zero and the factor inter-correlations were significantly below unity in all five counties. Thus, the measures achieved the configural invariance. Next, we assessed “metric invariance” or the requirement of equal metrics or scales (Rock et al., 1978). Metric invariance allows a meaningful comparison of ratings or difference scores across countries, with these differences indicative of similar cross-national difference in the underlying construct (Steenkamp and Baumgartner, 1998). To test for metric invariance, we constrained all factor loadings to be the same JRIM 6,4 304
  • 8. across the five countries. The full metric invariance model fit the data as well as the configural model and achieved even a slight decrease in the value of x 2 per degree of freedom. Therefore, the measures exhibited cross-national metric invariance. Next, we proceeded with evaluation of the pooled sample. To assess the adequacy of measures in the pooled sample, confirmatory factor analysis in AMOS was conducted. As the x 2 -statistic is sample size dependent, other fit indices better serve as indicators of the model fit (Bagozzi and Yi, 1988). The fit of the confirmatory factor model with the data was good (x 2 ¼ 790 df ¼ 129; NFI ¼ 0.93; IFI ¼ 0.94; CFI ¼ 0.94; RMSEA ¼ 0.065). All construct reliabilities exceeded the recommended 0.70 (Table I). Discriminant validity was checked by constraining the covariance in any set of two constructs (Anderson and Gerbing, 1988) and then performing a x 2 difference test on the values obtained for the constrained and unconstrainedmodels.Sincetheunconstrainedmodelshadsignificantlylowerx 2 values, Constructs and construct items Reliabilities (Cronbach a) Stand. factor loadings Perceived risk (adapted from Hennig-Thurau et al. (2007)) 0.89 Illegally downloading files is risky because They might not work properly 0.57 You might have your internet access terminated 0.60 They might infect your computer with a virus or malware 0.76 It could allow access to your data, files or passwords 0.91 They might enable your identity to be stolen 0.89 They might damage your computer 0.82 Perceivedbenefits(adaptedfromHennig-Thurauetal. (2007)) 0.82 Illegally downloading files offers a real bargain 0.71 Illegally downloaded files work as well as the legal ones 0.61 Illegally downloading files increases my ability to collect music/films/games 0.77 Illegally downloading files allows me to have files that I would not be able to afford 0.71 Illegal downloading helps me get music/films/games faster compared to legal channels 0.69 Rationalization (Skyes and Matza, 1957) 0.76 I couldn’t help myself; I had to illegally download the files 0.56 It’s no big deal as no one was hurt 0.73 It’s the industry’s own fault they were taken advantage of 0.61 I was only doing what others do all the time 0.64 I wouldn’t have bought the legal ones anyway 0.58 Piracy intention (Taylor and Todd, 1995) 0.88 I intend to illegally download files from the internet in the future 0.89 If the need or opportunity arises within the next month, I would illegally download files 0.90 Table I. Constructs, construct items, reliabilities and standardized factor loadings Consumer digital piracy behavior 305
  • 9. it can be concluded that the measures exhibit acceptable discriminant validity. Next, the conceptual model was tested using structural equation modeling in AMOS. Structural model provided a good fit with the data (x 2 (df) ¼ 790 (129); NFI ¼ 0.93; IFI ¼ 0.94; CFI ¼ 0.94; RMSEA ¼ 0.065). Individual hypotheses test statistics and results are displayed in Table II and are discussed next. Because the hypotheses were directional, one-sided hypotheses tests were employed. H1 predicted that the perceived technical risk of digital piracy will be negatively associated with the consumers’ rationalization of their past piracy behavior. The findings do not provide support for this hypothesis, as the standardized regression coefficient of the proposed structural path was not significantly different from zero (b ¼ 0.05, t ¼ 1.58, p ¼ 0.11). H1 is thus rejected. H2 proposed that the perceived benefits of digital piracy will be positively related with the consumers’ rationalization of piracy behavior. According to the analysis, as perceptions of benefits of piracy increased, so did the rationalization for the behavior (b ¼ 0.778, t ¼ 14.88, p ¼ 0.000), providing support for H2. In addition to predicting an indirect effect of perceived technical risk and perceived benefits through rationalization, we anticipated that both the perceived technical risk and the perceived benefits will also directly influence consumers’ future piracy intent (H3 and H4). The findings show that, as the perceived technical risk increased, the consumers’ intent to digitally pirate decreased (b ¼ 20.13, t ¼ 25.14, p ¼ 0.000), supporting H3. In addition, as the perceived benefits increased, so did the intent to digitally pirate in the future (b ¼ 0.41, t ¼ 7.71, p ¼ 0.000), supporting H4. Lastly, we predicted that the extent of consumers’ rationalization for their past piracy will be positively associated with their future piracy intent. Indeed, as the extent of rationalization increased, so did the respondents’ future piracy intent (b ¼ 0.38, t ¼ 6.92, p ¼ 0.000). Thus, H5 is also supported. Based on the squared correlations in the final model, approximately 59 percent of variance in rationalization can be explained by perceived benefits and perceived technical risk, and 61 percent of variance in piracy intention by perceived benefits, perceived technical risk, and rationalization. 5. Discussion of findings In developing and empirically evaluating our conceptual model, we first investigated determinants of consumers’ use of rationalization for past piracy behavior Hypothesis: direction Structural path Std. regr. coefficient t-statistics p-value Hypothesis outcome H1.: 2 Perceived risk ! rationalization 0.05 1.58 0.11 Rejected H2.: þ Perceived benefits ! rationalization 0.78 14.88 0.000 Supported H3.: 2 Perceived risk ! piracy intention 20.13 25.14 0.000 Supported H4.: þ Perceived benefits ! piracy intention 0.41 7.71 0.000 Supported H5.: þ Rationalization ! piracy intention 0.38 6.92 0.000 Supported Notes: x 2 (df) ¼ 790 (129); NFI ¼ 0.93; IFI ¼ 0.94; CFI ¼ 0.94; RMSEA ¼ 0.065; n (sample size) ¼ 1,213 Table II. Testing the conceptual model JRIM 6,4 306
  • 10. (i.e. perceived technical risk and perceived benefits), and second, the antecedents of consumers’ future piracy intent (i.e. perceived technical risk, perceived benefits and rationalization of past piracy behavior). All proposed hypotheses were supported with an exception of the effect of perceived technical risk of digital piracy on consumers’ rationalization of their past piracy behavior (H1). We anticipated a negative association between the two constructs, but the effect was not significant. Similarly, although in a somewhat different context of ethical consumption, Sander (2010) failed to provide empirical evidence for a significant impact of negatively framed information (such as perceived risk) on the use of neutralization techniques, and used sensitivity of the topic as a possible explanation. This reasoning may also be applicable to our study. In addition, given the focus of the perceived risk measure on technical damage associated with digital piracy, another plausible explanation is that other types of risks, such as those tapping into the ethics or morality (e.g. prosecution risk), may more prominently shape the use of rationalization techniques. Research on attitudes and behaviors finds similar gaps and suggests that the specificity of measures might interfere with the predictability of behavior. In addition, perceived technical risk and rationalization of past behavior may not be cognitively related. Perceived technical problems might be salient when actually performing the behavior, while rationalizing one’s past behavior focuses on the positive effects and the risk is not relevant anymore. This points towards a distinction between performing a behavior (e.g. using a service, such as downloading files), where certain risks occur, and evaluating one’s own behavior retrospectively, where the benefits of the behavior are more salient. This explanation seems likely, particularly in the light of support found for H2. With respect to expected positive consequences of digital piracy, we find that perceived benefits have a significant and relatively large effect on the consumers’ rationalization for their piracy behavior (H2). Although we do not explicitly address the mechanisms of this impact, we suggest that the more benefits consumers expect from illegally downloading files, the less they adhere to their norms. Instead, in order to reap those benefits, consumers resort to rationalization techniques, thus providing excuses for their behavior. All three hypotheses regarding the antecedents of an individual’s intention to engage in future digital piracy (H3, H4, and H5) were empirically supported. Specifically, perceived technical risk, perceived benefits and rationalization proved to be significant predictors of consumer’s intention to illegally download files in the future. Although previous results with respect to the relationship between risk and intention are somewhat equivocal (Sinha and Mandel, 2008), our research findings are unambiguous, indicating an inverse relationship between perceived technical risk and consumer’s intention to engage in digital piracy (H3). This is consistent with several other empirical studies (Hennig-Thurau et al., 2007; Lysonski and Durvasula, 2008; Yoon, 2011). The results of our study further support the positive effect of perceived benefits on digital piracy intention (H4). This corresponds to Hunt and Vitell’s (1986) contention that an individual veers toward a certain type of behavior directly because of certain preferred consequences. The third significant predictor of consumer’s intention to illegally download files identified in this study is consumer’s use of rationalization for past piracy behavior (H5), corroborating existing research findings (Ingram and Hinduja, 2008; Morris and Higgins, 2009). This finding can be also explained by the effect of past behavior on future behavior intentions. The more positive one perceives Consumer digital piracy behavior 307
  • 11. his/her own behavior to be (through rationalizing it and thus making it more positive), the more confident the person might be to perform the same behavior in the future. An interesting finding, although not the primary objective of this study, is the relative importance of the three determinants of future piracy intention. Our results suggest that the strongest driver of one’s piracy intent is his/her perception of benefits, closely followed by the use of rationalization techniques. Perception of technical risk is the weakest predictor of behavioral piracy intention. It appears that the negative factors (risks) and positive drivers (benefits) have a different role in affecting future behavior. Perceived benefits seem to strengthen the piracy intent, while the risks might reduce the magnitude of the behavior, but not fully eliminate the intention to actually perform the behavior. These empirical findings add to the limited body of knowledge pertaining to neutralization and rationalization techniques previously rather neglected in customer-focused studies (Harris and Dumas, 2009). Although the study was cross-sectional and the measures of intention were gathered concurrently with rationalization, the study provides evidence that rationalization occurs after piracy behavior takes place, which potentially enhances continuity in future behavior. 6. Implications, limitations and future research The present research offers useful implications for marketing communications and public policy strategies as well as for academic research. Digital piracy importantly affects various stakeholders, including recorded music, movie and software industries, distributors and consumers. So far, the efforts to curtail this practice included mostly promoting public awareness through consumer education and protecting intellectual property rights through legal threats and actions against individuals and operators of networks facilitating digital piracy activities. However, such deterrent strategies tend to be ineffective (Bhattacharjee et al., 2006; Sinha and Mandel, 2008). Instead, emphasizing preventive strategies is more strongly encouraged (Gopal et al., 2004; Sinha and Mandel, 2008). Our findings provide a roadmap to guide marketers and policy makers in meeting the challenge of digital piracy by focusing attention on three areas to directly impinge on individual’s piracy intent: perceptions of specific benefits from downloading, consumers’ perceptions of technical risk, and justifications for their past actions. In more practical terms, this means first, perceived benefits should be lessened. Second, perceived technical risks should be emphasized and, third, the acceptance and the impact of rationalization arguments need to be weakened so that they do not serve as a way out anymore. Hence, marketing communications centering on public awareness of personal consequences of digital piracy should be effective in deterring future piracy intention. Such strategies could include using the social context of consumers rather than communication by institutions, governments or firms for communicating risks rather than benefits of piracy. For instance, in online forum discussions, the perception of technical risks could be attenuated instead of overemphasizing the benefits of piracy. Marketers’ role in this context could be to turn attention to consumers’ benefits of legally obtaining products rather than using pirated alternatives in their communication and product policy. Social media and discussion forums could be used to understand the influence of the social environment on consumers’ perception of risk and benefit, which helps in framing marketing messages. JRIM 6,4 308
  • 12. In the general public, the image of piracy as heroic acts needs to be transferred into a perception of piracy as less acceptable behavior (e.g. by stressing the loss for independent artists rather than stressing losses for big corporations). Our findings reveal that perceived benefits have the strongest impact on both rationalization and piracy intent. If illegal downloading provides fewer benefits than legal downloading, then perceptions of risks might prevail, consequently reducing rationalization and future piracy intent. For instance, these could include beliefs that legal options are equally inexpensive and meet consumers’ needs at a convenient time, or that illegal sources are difficult to find and do not offer a full range of options. Rationalization can be seen as a cognitive mechanism which prevails if internal standards and norms are less strongly reviewed by individuals. In other words, to overcome the obligation to behave according to (learned) norms and standards, individuals use commonly accepted arguments that are, for instance, brought forward in informal communication among peers and are used in the mass media as well (“piracy is a peccadillo”). Rationalization seems to be an effective way of achieving distance to internal standards and could help in establishing a certain state of balance between internal norms and standards and one’s behavior even if or because the behavior violates existing norms. As long as rationalization arguments are personally and socially accepted, individuals will use them for norm-violating behavior. A way to reduce their effectiveness is to make arguments more difficult to accept, i.e. providing counterarguments to rationalization arguments, or more difficult to build new ones. For public policy makers, the results of this study can facilitate an understanding that how individuals review their past behavior impacts their future intent. This could mean that the review process (rationalization) could be controlled by educational and consumer protection-related efforts. In other words, challenging the publicly accepted arguments of piracy as peccadillo through projects in which key actors present multiple views and consequences of piracy could be a way to counter the issue. Based on the knowledge of how consumers use rationalization/neutralization techniques to justify digital piracy, marketing communications and persuasion activities can be designed to counter the arguments that consumers use. Nonetheless, designing these activities requires some caution, as it is also possible that – instead of adapting their behavior by reducing and/or eliminating piracy behaviors – consumers might invent new neutralizing beliefs (Minor, 1981). In summary, this study provides three target constructs, i.e. benefits, risk, and rationalization, on which to focus in the development of preventive-based appeals of persuasion (e.g. intentions, attitudes). From an academic perspective, our findings reveal the importance of perceived benefit as antecedent for rationalization strategies and subsequently its impact on future piracy intent. It shows also that perceived technical risk is less influential on cognitive processes, but has a negative influence on future piracy intent.Thisextendspreviousresearchon predictorsforpiracyintentandbehavior in that perceived gains rather than losses drive rationalization of past piracy behavior. The findings and contributions of this study are constrained by certain limitations of our empirical effort, in turn suggesting potentially fruitful avenues for future research. First, our measure of perceived adverse consequences was limited to technical aspect of risk. Examining a wider scope of risk dimensions, such as prosecution risk or other types of psychological risks (Chiou et al., 2005; Liao et al., 2010) may offer a more comprehensive insight into this concept. Second, the cross-sectional design of the study Consumer digital piracy behavior 309
  • 13. creates some limitations. Although rarely applied in the piracy research (Williams et al., 2010), a longitudinal methodology could provide a stronger inference, particularly with respect to the sequencing of rationalization. What is more, experimental designs could help determining the causality of rationalization and perceived benefit and risk. This topic has been recognized as an under-researched area needing further investigation (Harris and Dumas, 2009). Third, while precautions have been taken in the sampling and data collection process across five countries to ensure reliable data, the use of constructs of potentially sensitive nature (i.e. aberrant behavior) in self-reported surveys may have been impacted by socially desirable responding (Steenkamp et al., 2010). This limitation is more likely present in a non-student population. Students and other younger consumers, who have grown up with easy access to free content on the internet, have a more liberal view of sharing content and may fail to recognize piracy as a transgression of social norms (Sinha and Mandel, 2008). References Aleassa, H., Pearson, J.M. and McClurg, S. (2011), “Investigating software piracy in Jordan: an extension of the theory of reasoned action”, Journal of Business Ethics, Vol. 98 No. 4, pp. 663-76. Anderson, J.C. and Gerbing, D. (1988), “Structural equation modeling in practice: a review and recommended two-step approach”, Psychological Bulletin, Vol. 103 No. 3, pp. 411-23. BASCAP (2011), Estimating the Global Economic and Social Impacts of Counterfeiting and Piracy, Business Action to Stop Counterfeiting and Piracy, Paris, available at: www.iccwbo.org/uploadedFiles/BASCAP/Pages/Global%20Impacts%20-%20Final.pdf (accessed 3 October). Bagozzi, R.P. and Yi, Y. (1988), “On the evaluation of structural equation models”, Journal of the Academy of Marketing Science, Vol. 16 No. 1, pp. 74-94. Bhattacharjee, S., Gopal, R., Lertwachara, K. and Marsden, J.R. (2006), “Whatever happened to payola? An empirical analysis of online music sharing”, Decision Support Systems, Vol. 42 No. 1, pp. 104-20. Block, L.G. and Keller, P.A. (1995), “When to accentuate the negative: the effects of perceived efficacy and message framing on intentions to perform a health-related behavior”, Journal of Marketing Research, Vol. 32 No. 2, pp. 192-203. Chang, C. (2008), “Ad framing effects for consumption products: an affect priming process”, Psychology & Marketing, Vol. 25 No. 1, pp. 24-46. Chatzidakis, A., Hibbert, S. and Smith, A.P. (2007), “Why people don’t take their concerns about fair trade to the supermarket: the role of neutralization”, Journal of Business Ethics, Vol. 74 No. 1, pp. 89-100. Chiou, J.-S., Huang, C. and Lee, H. (2005), “The antecedents of music piracy attitudes and intentions”, Journal of Business Ethics, Vol. 57 No. 2, pp. 161-74. Craig, C.S. and Douglas, S.P. (2000), International Marketing Research, Wiley, New York, NY. Dacin, T. and Murphy, P.R. (2011), “Psychological pathways to fraud: understanding and preventing fraud in organizations”, Journal of Business Research, Vol. 101 No. 4, pp. 601-18. D’Astous, A. and Legendre, A. (2009), “Understanding consumers’ ethical justifications: a scale for appraising consumers’ reasons for not behaving ethically”, Journal of Business Ethics, Vol. 87 No. 2, pp. 255-68. JRIM 6,4 310
  • 14. de Jong, M.G., Steenkamp, J.-B.E.M. and Veldkamp, B.P. (2009), “A model for the construction of country-specific, yet internationally comparable short-form marketing scales”, Marketing Science, Vol. 28 No. 4, pp. 674-89. Eisend, M. and Schuchert-Gueler, P. (2006), “Explaining counterfeit purchases – a review and preview”, Academy of Marketing Science Review, Vol. 6 No. 12, pp. 1-25. Goles, T., Jayatilaka, B., George, B., Parsons, L., Chambers, V., Taylor, D. and Brune, R. (2008), “Softlifting: exploring determinants of attitude”, Journal of Business Ethics, Vol. 77 No. 4, pp. 481-99. Gopal, R.D., Sanders, G.L., Bhattacharjee, S., Agrawal, M. and Wagner, S.C. (2004), “A behavioral model of digital music piracy”, Journal of Organizational Computing and Electronic Commerce, Vol. 14 No. 2, pp. 89-105. Grove, S.J. and Vitell, S.J. (1989), “Non-normative consumer behavior and the techniques of neutralization”, in Bagozzi, R. and Peter, J. (Eds), Proceedings of the 1989 AMA Winter Educator’s Conference, American Marketing Association, Chicago, IL, pp. 131-5. Harris, L.C. and Dumas, A. (2009), “Online consumer misbehaviour: an application of neutralization theory”, Marketing Theory, Vol. 9 No. 4, pp. 379-402. Hennig-Thurau, T., Henning, V. and Sattler, H. (2007), “Consumer file sharing of motion pictures”, Journal of Marketing, Vol. 71 No. 4, pp. 1-18. Higgins, G.E., Wolfe, S.E. and Marcum, C.D. (2008), “Music piracy and neutralization: a preliminary trajectory analysis from short-term longitudinal data”, International Journal of Cyber Criminology, Vol. 2 No. 2, pp. 324-36. Hinduja, S. (2007), “Neutralization theory and online software piracy: an empirical analysis”, Ethics and Information Technology, Vol. 9 No. 3, pp. 187-204. Horn, J.L., McArdle, J.J. and Mason, R. (1983), “When is invariance not invariant: a practical scientist’s look at the ethereal concept of factor invariance”, The Southern Psychologist, Vol. 1 No. 4, pp. 179-88. Hunt, S.D. and Vitell, S. (1986), “A general theory of marketing ethics”, Journal of Macromarketing, Vol. 6 No. 1, pp. 5-16. Ingram, J. and Hinduja, S. (2008), “Neutralizing music piracy: an empirical examination”, Deviant Behavior, Vol. 29 No. 4, pp. 334-66. Kemper, E., Stringfield, S. and Teddlie, C. (2003), “Mixed methods sampling strategies in social science research”, in Tashakkori, A. and Teddlie, C. (Eds), Handbook of Mixed Methods in Social & Behavioral Research, Sage, Thousand Oaks, CA, pp. 273-96. Kini, R.B., Ramakrishna, H.V. and Vijayaraman, B.S. (2003), “Shaping of moral intensity regarding software piracy: a comparison between Thailand and US students”, Journal of Business Ethics, Vol. 49 No. 1, pp. 91-104. Konstantakis, N.I., Palaigeorgiou, G.E., Siozos, P.D. and Tsoukalas, I.A. (2010), “What do computer science students think about software piracy?”, Behavior & Information Technology, Vol. 29 No. 3, pp. 277-85. Liao, C., Lin, H.-N. and Liu, Y.-P. (2010), “Predicting the use of pirated software: a contingency model integrating perceived risk with the theory of planned behavior”, Journal of Business Ethics, Vol. 91 No. 2, pp. 237-52. Lysonski, S. and Durvasula, S. (2008), “Digital piracy of MP3s: consumer and ethical predispositions”, Journal of Consumer Marketing, Vol. 25 No. 3, pp. 167-78. McGregor, S.L.T. (2008), “Conceptualizing immoral and unethical consumption using neutralization theory”, Family and Consumer Sciences Research Journal, Vol. 36 No. 3, pp. 261-76. Consumer digital piracy behavior 311
  • 15. Mattelart, T. (2009), “Audio-visual piracy: towards a study of the underground networks of cultural globalization”, Global Media and Communication, Vol. 5 No. 3, pp. 308-26. Minor, W.W. (1981), “Techniques of neutralization: a reconceptualization an empirical examination”, Journal of Research in Crime and Delinquency, Vol. 18, pp. 295-318. Moore, R. and McMullan, E. (2009), “Neutralization and rationalization of digital piracy: a qualitative analysis of university students”, International Journal of Cyber Criminology, Vol. 3 No. 1, pp. 441-51. Morris, R.G. and Higgins, G.E. (2009), “Neutralizing potential and self-reported digital piracy: a multitheoretical exploration among college undergraduates”, Criminal Justice Review, Vol. 34 No. 2, pp. 173-95. Nicholls, A. and Lee, N. (2006), “Purchase decision-making in fair trade and the ethical purchase ‘gap’: ‘is there a fair trade twix?’”, Journal of Strategic Marketing, Vol. 14 No. 4, pp. 369-86. Phau, I. and Ng, J. (2010), “Predictors of usage intentions of pirated software”, Journal of Business Ethics, Vol. 94 No. 1, pp. 23-37. Phau, I., Sequeira, M. and Dix, S. (2009), “Consumers’ willingness to knowingly purchase counterfeit products”, Direct Marketing: An International Journal, Vol. 3 No. 4, pp. 262-81. Rock, D.A., Werts, C.E. and Flaughter, R.E. (1978), “The use of analysis in covariance structures for comparing psychometric properties of multiple variables across populations”, Multivariate Behavioral Research, Vol. 13 No. 4, pp. 403-18. Sander, A. (2010), “An empirical study on decision-making, neutralization theory and information framing in the context of ethical consumption”, Master thesis, Maastricht University, Maastricht. Shields, I.W. and Whitehall, G.C. (1994), “Neutralization and delinquency among teenagers”, Criminal Justice and Behavior, Vol. 21 No. 2, pp. 223-35. Sinha, R.K. and Mandel, N. (2008), “Preventing digital music piracy: the carrot or the stick?”, Journal of Marketing, Vol. 72 No. 1, pp. 1-15. Sinha, R.K., Machado, F.S. and Sellman, C. (2010), “Don’t think twice, it’s all right: music piracy and pricing in a DRM-free environment”, Journal of Marketing, Vol. 74, pp. 40-54. Sirkeci, I. and Magnúsdóttir, L.B. (2011), “Understanding illegal music downloading in the UK: a multi-attribute model”, Journal of Research in Interactive Marketing, Vol. 5 No. 1, pp. 90-110. Skyes, G. and Matza, D. (1957), “Techniques of neutralization: a theory of delinquency”, American Sociological Review, Vol. 22 No. 6, pp. 664-70. Steenkamp, J.-B.E.M. and Baumgartner, H. (1998), “Assessing measurement invariance in cross-national consumer research”, Journal of Consumer Research, Vol. 15 No. 1, pp. 78-90. Steenkamp, J.-B.E.M., de Jong, M.G. and Baumgartner, H. (2010), “Socially desirable response tendencies in survey research”, Journal of Marketing Research, Vol. 47, April, pp. 199-214. Taylor, S. and Todd, P. (1995), “Assessing IT usage: the role of prior experience”, MIS Quarterly, Vol. 19 No. 4, pp. 561-70. Williams, P., Nicholas, D. and Rowlands, I. (2010), “The attitudes and behaviours of illegal downloaders”, Aslib Proceedings: New Information Perspectives, Vol. 62 No. 3, pp. 283-301. Yoon, C. (2011), “Theory of planned behavior and ethics theory in digital piracy: an integrated model”, Journal of Business Ethics, Vol. 100 Nos 3/4, pp. 405-17. Zamoon, S. and Curley, S. (2008), “Ripped from the headlines: what can the popular press teach us about software piracy?”, Journal of Business Ethics, Vol. 83 No. 3, pp. 515-33. JRIM 6,4 312
  • 16. Further reading Ang, S.H., Cheng, P.S., Lim, A.A.C. and Tambyah, S.K. (2001), “Spot the difference: consumer responses towards counterfeits”, Journal of Consumer Marketing, Vol. 18 No. 3, pp. 219-35. Coyle, J.R., Gould, S.J., Gupta, P. and Gupta, R. (2009), “To buy or to pirate: the matrix of music consumers’ acquisition-mode decision-making”, Journal of Business Research, Vol. 62 No. 10, pp. 1031-7. Dacin, T. and Murphy, P.R. (2009), “Understanding and preventing unethical conduct in organizations: a situation- and affect-based fraud framework”, available at: http://ssrn. com/abstract¼1492765 D’Astous, A., Colbert, F. and Montpetit, D. (2005), “Music piracy on the web – how effective are anti-piracy arguments? Evidence from the theory of planned behaviour”, Journal of Consumer Policy, Vol. 28 No. 3, pp. 289-310. Glass, S. and Wood, A. (1996), “Situational determinants of software piracy: an equity theory perspective”, Journal of Business Ethics, Vol. 15 No. 11, pp. 1189-98. Simpson, P.M., Banerjee, D. and Simpson, C.L. (1994), “Softlifting: a model of motivating factors”, Journal of Business Ethics, Vol. 13 No. 6, pp. 431-8. Staake, T., Thiese, F. and Fleish, E. (2009), “The emergence of counterfeit trade: a literature review”, European Journal of Marketing, Vol. 43 Nos 3/4, pp. 320-49. About the authors Irena Vida is a Professor of Marketing at Faculty of Economics at the University of Ljubljana. Her research focus is on application of consumer behaviour theories and models in cross-cultural settings and on strategic issues in international marketing. She published articles in various journals such as Journal of Business Research, European Journal of Marketing, Journal of International Marketing, International Marketing Review and International Business Review. Irena Vida is the corresponding author and can be contacted at: irena.vida@ef.uni-lj.si Mateja Kos Koklič is an Assistant Professor of Marketing at the Faculty of Economics, University of Ljubljana in Slovenia. Her research focuses on topics such as consumer behaviour and consumer decision making, especially with respect to counterfeiting and piracy, as well as perceived risk in different purchasing situations. She has published her findings in journals, such as International Journal of Consumer Studies and Managing Global Transitions. Monika Kukar-Kinney is Associate Professor of Marketing in the Robins School of Business, University of Richmond, Richmond, Virginia and a Visiting Professor at the University of Ljubljana, Faculty of Economics, Slovenia. Her research focuses on compulsive buying, behavioral pricing, retailing and electronic commerce. Her work has appeared in journals such as the Journal of the Academy of Marketing Science, Journal of Consumer Research, Journal of Retailing, and Journal of Business Research, among others. Elfriede Penz is Associate Professor at the Institute for International Marketing Management at the Wirtschaftsuniversität Wien in Austria. Her research includes consumer behaviour, both in online and offline contexts, the interplay between consumers and organisations (power) as well as methodological issues in international marketing and management. She has published in refereed international journals: Psychology & Marketing, Journal of Economic Psychology, Management International Review and International Marketing Review. To purchase reprints of this article please e-mail: reprints@emeraldinsight.com Or visit our web site for further details: www.emeraldinsight.com/reprints Consumer digital piracy behavior 313