DOI QR코드

DOI QR Code

A Study on Intention to Pirate Digital Video by an Integrated Model of TPB, TIB, and Neutralization

TPB, TIB 및 중화기술의 통합적 모형에 의한 디지털 영상물 불법복제 의도에 관한 연구

  • 노경수 (금오공과대학교 경영학과) ;
  • 심완준 (금오공과대학교 경영학과) ;
  • 신호균 (금오공과대학교 경영학과)
  • Received : 2014.12.14
  • Accepted : 2014.12.22
  • Published : 2014.12.30

Abstract

Despite of continuous efforts to crack down on piracy using penalties and regulations, this unauthorized piracy market is still enormous. Since the moral hazard about this phenomenon is pervasive and continually upsets the major intellectual property markets, an alternative plan is required. The purpose of this study is to provide an objective insight for factors that affect people's digital video piracy behavior. The following two research propositions were the focus: what psychological factors affect piracy behavior and how are these factors related to one another? In order to accomplish the research aims, we reviewed literatures on the current state of piracy in South Korea, characteristics of digital contents, studies on criminal psychology and behavioral theories. Previous research in the fields of criminal theory indicated that neutralization, a form of rationalization, would help explain digital piracy intentions. Thus, this study developed a model that explains effects of neutralization techniques and tested the possibility of an integrated model with other behavioral theory such as TPB and TIB. Empirical results of the study(368 sample collected) showed that all the factors in TPB including Attitude to Piracy(+), Subjective Norm(-), Perceived Behavioral Control(+) had a significant impact on Piracy Intention. Moreover, two neutralization techniques, Condemn the Condemners(+) and Appeal to Higher Loyalties(+), had a significant effect on Piracy Intention. In addition, Past Behavior had strong impacts on Attitude(+), Perceived Behavioral Control(+) and Piracy Intention(+). In terms of Expected Profit, it had an impact on Attitude to Piracy positively. These findings suggest implications for protecting the current intellectual property markets, with many stakeholders in movies and media industries. There are some limitations as followed: first, the study did not consider other neutralization techniques, low level of deterrence and the other expected results despite the possibility of their effects. Second, the study needs improvements through longitudinal research because the cross-sectional research could not rule out the alternative explanations.

Keywords

References

  1. 구본희, 최무진, "인터넷 중독과 정보윤리에 영향을 미치는 요인에 관한 연구 - 자아 특성 및 인터넷 인지 특성을 중심으로," 정보시스템연구, 제15권, 제3호, 2006, pp. 233-252.
  2. 김경희, 김태웅, "디지털 콘텐츠 저작권 침해의도에 관한 영향요인 연구," 한국컴퓨터 교육학회 논문지, 제16권, 제1호, 2013, pp. 63-71.
  3. 김상현, 박현선, "사이버윤리 준수인식과 행동 의도에 영향을 미치는 사용자의 내.외적요인." 정보시스템연구, 제23권, 제1호, 2014, pp. 111-138. https://doi.org/10.5859/KAIS.2014.23.1.111
  4. 김중한, "소프트웨어 불법복제 의도에 미치는 영향요인에 관한 연구," 한국IT서비스학회지, 제12권, 제2호, 2013, pp. 131-152. https://doi.org/10.9716/KITS.2013.12.2.131
  5. 문화체육관광부(한국문화관광연구원), "콘텐츠불법복제 감소가 국가경제에 미치는 경제적 파급효과에 관한 연구," 2011.
  6. 이성식, "대학생의 인터넷 저작권 침해행위에 있어 중화의 작용과 이론들의 검증," 한국사회학, 제46권, 제5호, 2012, pp. 211-232.
  7. 장향란, 심민우, 김광용, "디지털콘텐츠 불법복제 행동에 관한 연구," 한국IT서비스학회지, 제10권, 2008, pp. 165-191.
  8. 저작권보호센터(한국저작권단체연합회), "2014 저작권보호 연차 보고서", 2014.
  9. 전진환, 김종기, "대학생들의 S/W 불법복제 의도에 영향을 미치는 요인에 관한 연구," 정보보호학회논문지, 제19권, 제2호, 2009, pp. 127-140.
  10. 한정희, 장활식, "인터넷에서의 디지털 음악 저작권 침해 행동에 관한 연구," 정보시스템연구, 제16권, 제1호, 2007, pp. 135-158.
  11. Ajzen, I., "From Intentions to Behavior: A Theory of Planned Behavior," in J. Kuhi & J. Beckmann (eds.), Action-Control: From Cognition to Behavior, pp. 11-39, Spinger, Heidelberg, 1985.
  12. Ajzen, I., and Madden, T., "Perceived Goal-Directed Behavior: Attitudes, Dimensions, and Perceived Behavioral Control," Journal of Experimental Social Psychology, Vol. 22, 1986, pp. 453-474. https://doi.org/10.1016/0022-1031(86)90045-4
  13. Ajzen, I., "The Theory of Planned Behavior," Organizational Behavior and Human Decision Processes, Vol. 50, No. 2, 1991, pp. 179-211. https://doi.org/10.1016/0749-5978(91)90020-T
  14. Ajzen, I., "Perceived Behavioral Control, Self Efficacy, Locus of Control, and the Theory of Planned Behavior," Journal of Applied Social Psychology, Vol. 32, No. 4, 2002a, pp. 665-683. https://doi.org/10.1111/j.1559-1816.2002.tb00236.x
  15. Ajzen, I., "Residual Effects of Past on Later Behavior: Habituation and reasoned Action Perspectives," Personality and Social Psychology Review, Vol. 6, No. 2, 2002b, pp. 107-122. https://doi.org/10.1207/S15327957PSPR0602_02
  16. Al-Rafee, S., and Cronan, T. P., "Digital Piracy: Factors that Influence Attitude toward Behavior," Journal of Business Ethics, Vol. 63, 2006, pp. 237-259. https://doi.org/10.1007/s10551-005-1902-9
  17. Anderson, J. C., and Gerbing D. W., "Structural Equation Modeling in Practice : A Review and Recommended Two-step Approach," Psychological Bulletin, Vol. 103, No. 3, 1988, p. 411. https://doi.org/10.1037/0033-2909.103.3.411
  18. Bamberg, S., and Schmidt, P., "Incentives, Morality, or Habit? : Predicting Students' Car Use for University Routes With the Models of Ajzen, Schwartz, and Triandis," Environment and Behavior, Vol. 35, No. 2, 2003, pp. 264-285. https://doi.org/10.1177/0013916502250134
  19. Beck, L., and Ajzen, I., "Predicting Dishonest Actions Using the Theory of Planned Behavior," Journal of Research in Personality, Vol. 25, No. 3., 1991, pp. 285-301. https://doi.org/10.1016/0092-6566(91)90021-H
  20. Bhattacharjee, S., Gopal, R. D., and Sanders, G. L., "Digital Music and Online Sharing: Software Piracy 2.0," Communication of the ACM, Vol. 46, No. 7, 2003, pp. 107-111. https://doi.org/10.1145/792704.792707
  21. Bhattarcharjee, S., Gopal, R. D., Lertwachara, K., and Marsden, J. R., "Impact of Legal Threats on Online Music Sharing Activity: An Analysis of Music Industry Legal Actions," Journal of Law and Economics, Vol. 49, 2006, pp. 91-114. https://doi.org/10.1086/501085
  22. Cromwell, P., and Thurman, Q., "The Devil Made Me Do It: Use of Neutralizations by Shoplifters," Deviant Behavior, Vol. 24, 2003, pp. 535-550. https://doi.org/10.1080/713840271
  23. Cronan, T. P., and Al-Rafee, S., "Factors that Influence the Intention to Pirate Software and Media," Journal of Business Ethics, Vol. 78, No. 4, 2008, pp. 527-545. https://doi.org/10.1007/s10551-007-9366-8
  24. Fishbein, M., and Ajzen, I., "Attitude, Intention, and Behavior: An Introduction to Theory and Research," Reading, MA, 1975.
  25. Gottfredson, M., and Hirschi, T., "A general theory of crime," Stanford University Press, 1990.
  26. Hair, J. F., Black, W. C., Babin, B. J., and Anderson, R. E., Multivariate Data Analysis, 7th ed., Prentice Hall, New Jersey, 2009.
  27. Higgins, G. E., S. E. Wolfe, and Marcum, C. D., "Digital Piracy : An Examination of Three Measurements of Self-Control," Deviant Behavior, Vol. 29, No. 5, 2008, pp. 440-460. https://doi.org/10.1080/01639620701598023
  28. Hilbert, M., and Lopez, P., "The World's Technological Capacity to Store," Communicate and Compute Information, Science, Vol. 332, 2011, pp. 60-65.
  29. Hinduja, S., and Ingram, J. R., "Self-control and Ethical Beliefs on the Social Learning of Intellectual Property theft," Western Criminology Review, Vol. 9, 2008, pp. 52-72.
  30. LaRose, R. and Kim J., "Share, Steal or Buy? A Social Cognitive Perspective of Music Downloading", Cyberpsychology and behavior, Vol. 10, No. 2, 2007, pp. 267-277. https://doi.org/10.1089/cpb.2006.9959
  31. Limayem, M., Khalifa, M., and Chin, W. W., "Factors Motivating Software Piracy : A Longitudinal Study," IEEE Transactions on Engineering Management, Vol. 51, No. 4, 2004, pp. 414-425. https://doi.org/10.1109/TEM.2004.835087
  32. Madden, T., Ellen, P., and Ajzen, I., "A Comparison of the Theory of Planned Behavior and the Theory of Reasoned Action," Personality and Social Psychology Bulletin, Vol. 18, 1992, pp. 3-9. https://doi.org/10.1177/0146167292181001
  33. Marcum, C. D., Higgins, G. E., Wolfe, S. E., and Ricketts, M. L., "Examining the Intersection of Self-control, Peer Association, and Neutralization in Explaining Digital Piracy," Western Criminology Review, Vol. 12, No. 3, 2011, pp. 60-74.
  34. Morris, R., and Higgins, G., "Exploration among College Undergraduates Neutralizing Potential and Self-reported Digital piracy: A Multitheoretical Exploration Among College Indergraduates," Criminal Justice Review, Vol. 32, 2009, pp. 173-195.
  35. Olson, J., and Zanna, M., "Attitudes and Attitude Change," Annual Review of Psychology, Vol. 44, 1993, pp. 117-154. https://doi.org/10.1146/annurev.ps.44.020193.001001
  36. Phau, I., Aaron, L., Johan, L., and Lwin, M., "Engaging in Digital Piracy of Movies: A Theory of Planned Behavior Approach," Internet Research, Vol. 24, No. 2, 2014, pp. 246-266. https://doi.org/10.1108/IntR-11-2012-0243
  37. Phau, I., Teah, M., and Lwin, M., "Pirating Pirates of the Caribbean: The Curse of Cyberspace," Journal of Marketing Management, Vol. 30, No. 3-4, 2014, pp. 312-333. https://doi.org/10.1080/0267257X.2013.811280
  38. Peace, A. G., Galletta, D. F., and Thong, J. Y. L., "Software Piracy in the Workplace : A Model and Empirical Test" Journal of Management Information Systems, Vol. 20, No. 1, 2003, pp. 153-177. https://doi.org/10.1080/07421222.2003.11045759
  39. Piquero, A. R., and Bouffard, A., "Something Old, Something New : A Preliminary Investigation of Hirschi's Redefined Self-control," Justice Quarterly, Vol. 24, No. l, 2007, pp. l-27.
  40. Ruud, S. J., Heuvelman, A., Tan, M., and Peters, O., "Digital Movie Piracy : A Perspective on Downloading Behavior through Social Cognitive Theory," Computers in Human Behavior, Vol. 28, 2012, pp. 958-967. https://doi.org/10.1016/j.chb.2011.12.017
  41. Shepherd, G., and O'Keefe, D., "Separability of Attitudinal and Normative Influences on Behavioral Intentions in the Fishbein-Ajzen Model," The Journal of Social Psychology, Vol. 122, 1984, pp. 287-288. https://doi.org/10.1080/00224545.1984.9713496
  42. Siponen, M., Vance, A., and Williams R., "New Insights into the Problem of Software Piracy: The Effects of Neutralization, Shame, and Moral beliefs," Information and Management, Vol. 49, 2012, pp. 334-341. https://doi.org/10.1016/j.im.2012.06.004
  43. Sykes, G. M., and Matza, D., "Techniques of Neutralization : A Theory of Delinquency," American Sociological Review, Vol. 22, No. 6, 1957, pp. 664-670. https://doi.org/10.2307/2089195
  44. Taylor, S. A., Ishida, C., and Wallace, D. W., "Intention to Engage in Digital Piracy: A Conceptual Model and Empirical Test," Journal of Service Research, Vol. 11, No. 3, 2009, pp. 246-262. https://doi.org/10.1177/1094670508328924
  45. Thurman, Q., "Deviance and the Neutralization of Moral Commitment: An Empirical Analysis," Deviant Behavior, Vol. 5, 1984, pp. 291-304. https://doi.org/10.1080/01639625.1984.9967646
  46. Trafimow, D., "The Importance of Attitudes in the Prediction of College Students' Intention to Drink," Journal of Applied Social Psychology, Vol. 26 No. 24, 1996, pp. 2167-2188. https://doi.org/10.1111/j.1559-1816.1996.tb01794.x
  47. Triandis, H. C., "Values, Attitudes, and Interpersonal Behavior," in Nebraska symposium on motivation, Vol. 27, 1980, pp.195-259.
  48. Williams, K. R.. and Hawkins, R., "Perceptual Research on General Deterrence : A Critical Review," Law and Society Review, Vol. 20, 1986, p. 545. https://doi.org/10.2307/3053466
  49. Williams, P., Nicholas, D., and Rowlands, I., "The Attitudes and Behaviours of Illegal Downloaders," Aslib Proceedings, Vol. 62 No. 3, 2010, pp. 283-301. https://doi.org/10.1108/00012531011046916