Software Piracy among Information Technology Professionals in Thailand
Main Article Content
Abstract
The study investigated factors influencing ethical intentions in relation to the personal use of software among Information Technology (IT) professionals in Thailand. Factors expected to affect ethical intentions were derived from previous studies and used to formulate a theoretical model based on the theory of planned behavior, the Big Five personality traits, deterrent theory, and moral intensity. The model was tested and developed using data collected by questionnaire from 452 professionals working in various IT positions. The findings confirmed the importance of the effects of social norms and moral intensity on attitudes and the effects of agreeableness, openness, perceived behavioral control, moral intensity, punishment severity, and attitude on ethical intentions. New findings are presented concerned with the influence of gender on attitude as well as the influence of social norms, conscientiousness, neuroticism, and gender on ethical intentions. Practical actions are recommended for improving ethical intentions.
Downloads
Article Details
All rights reserved. Apart from citations for the purposes of research, private study, or criticism and review,no part of this publication may be reproduced, stored or transmitted in any other form without prior written permission by the publisher.
References
Ajzen, I. (1991) The Theory of Planned Behavior. Organizational Behavior and Human Decision Process 50 (2): 179-211.
Aleassa, H., Pearson, J. and Setterstrom, A. (2012) An ExploratoryExamination of Antecedents to Software Piracy: A Cross CulturalComparison. In Proceeding of Hawaii International Conference on System Science. Hawaii, USA
Aleassa, H. (2009) Investigating Consumer’s Software Piracy Using an Extended Theory of Reasoned Action. Dissertation and Theses,University of Southern Illinois, Carbondale, Illinois, United States.
Al-Rafee, S. and Rouibah,K. (2010) The Fight Against Digital Piracy.Telemetics and Informatics 27(1): 283-292.
Al-Rafee, S and Cronan, T. P. (2006) Digital Piracy: Factors that Influence Attitude toward Behaviour. Journal of Business Ethics 63 (1): 237-259.
Ariely, D. and Mazar, N. (2006) Dishonesty in Everyday Life and Its PolicyImplication. Journal of Public Policy and Marketing 25(1):117-12
Arunthari, S.and Hasan, H. (2005) A Grounded Study of ERP Adoption and Vendor Selection. In Thailand ACIS 2005 Proceedings, pp. 3.
BSA. (2011) Ninth Annual BSA and IDC Global Software Piracy Study. Washington, DC:
Business Software Alliance.
Buchan, H. (2005) Ethical Decision Making in the Public Accounting Profession: An Extension of Ajzen’s Theory of Planned Behaviour. Journal of Business Ethics 61(1): 165-181.
Chaterjee, S. (2008) Unethical Behaviour Using Information Technology. Dissertations, College of Business, Washington State University, Washington, United State.
Chen, Y., Shang, R. and Lin, A. (2008) The Intention to Download Music files in a P2P environment. Electronic Commerce Research and Application 7(1): 411-422
Chen, I. Y. L. (2009) Influencing Participants Knowledge SharingBehavior in Virtual Learning Community. Journal of Educational Technology and Society 12(1): 134-148.
Cohen, J. (1988) Statistical Power Analysis for the Behavioral Sciences, 2nd ed., New York: Academic Press.
Cohen, J. and Cohen, P. (1983) Applied Multiple Regression/Correlation Analysis for the Behavioral Sciences. 3rd ed., Mahwah, NJ: Erlbaum.
Costa, P. T. and McCrae, R. R. (1992) Normal Personality Assessmentin Clinical Practice: The NEO Personality Inventory. Psychological Assessment 4(1): 5-13.
Costa, P. T. and McCrae, R. R. (1995) Domains and Facets: Hierarchical Personality Assessment Using the Revised NEO PersonalityInventory. Journal of Personality Assessment 64(1): 21-50
De Read, B. and Schouwenburg, H. C. (1996) Personality in Learning and Education: A Review European Journal of Personality 10(1): 303-336.
Devaraj, S. and Easley, R. (2008) How Does Personality Matter? Relating the Five-Factor Model to Technology Acceptance and Use. Information Systems Research 19(1): 93-105.
Digman, J. (1990) Personality Structure: Emergence of the Five-FactorModel. Annual Review of Psychology 41: 417-440.
Dubinsky, A. J. and Loken, B. (1989) Analyzing Ethical Decision Making in Marketing. Journal of Business Research 19(1): 83-107.
Fishbein, M. and Ajzen, I. (1975) Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research. Reading, MA: Addison-Wesley.
Gibbs, J., Basinger, k. and Grime, R. (2007) Moral Judgment Development across Culture: Revisiting Kohlberg’s University Claims. Development Review 27(1): 443-500.
Haines, R. and Leonard, L. (2007) Individual Characteristics and Ethical Decision-making in an IT context. Industrial Marketing & Data
Hartmann, M. (2011) Personality and Ethical Decision: An Empirical Investigation of Personality Traits and Moral Philosophy. Dissertations,University of southern Illinois, Carbondale, United States.Systems 107(1): 5-20.
Jensen-Campbell L. A., Adams, R., Perry, D. G., Workman, K. A., Furdella, J. and Egan, S. K. (2002) Agreeableness, Extraversionand Peer Relations in Early Adolescence: Winning Friends and Deflecting Aggression. Journal of Research in Personality 36(3):224-251.
Jin, Y. (2009) Investigating the Role of Attitude in Technology Acceptance from an Attitude Strength Perspective. International Journal of Information Management 29(1): 67-72.
Jones, T. M. (1991) Ethical Decision Making by Individuals in Organization: An Issue Contingent Moral. The Academy of Management Review 16(2): 366-395.
Kelley, P. and Elm, C. (2003) The Effect of Context on Moral Intensity of Ethical Issues;
Revisiting Jone’s Issue-Contingent Model. Journal of Business Ethics 48(1): 139-154.
Kini, R. B., Ramakrisna, H. V. and Vijayaraman, B. S.(2003) An Exploratory Study of Moral Intensity Regarding Software Piracy of Students in Thailand. Behavioral and Information Technology 22(1): 63-70.
Kline, R. B. (2005) Principles and Practice of Structural Equation Modeling. London: Guilford Press
Legis, P. (2003) Why Do People Use Information Technology? A Critical View of the Technology Acceptance Model. Information and Management 40(1): 191-204
Lewis, D. (1969) Convention: A Philosophical Study. Cambridge, Massachusetts: Harvard University Press.
Madden, M. J., Ellen, P. S. and Ajzen, I. (1992) A Comparison of the Theoryof Planned Behavior and the Theory of Reasoned Action. Personality and Social Psychology Bulletin 18(1): 31-39.
McCrae, R. R. (1996) Social Consequences of Experiential Openness. Psychological Bulletin 120(3): 323-337.
Marta, J. K., Singhapakdi, A. and Lee, D. (2013) Perceptions About Ethics Institutionalization and Quality of Work Life: Thai versus American Marketing Manager.
Journal of Business Process 66(1): 381-389.
Peace, A. G., Galetta, D. F. and Thong, J. (2003) Software Piracy in the Workplace: A Model and Empirical Test. Journal of Management Information Systems 20(1): 153-177.
Reinig, B. and Plice, R. (2010) Modeling Software Piracy in Developed and Emerging Economies. In Proceeding of the 43rd Hawaii International Conference on System Science. January 5-8. Koloa, Kauai, Hawaii.
Riemenschneider, C. (2008) Students Ethical Decision Making in an Information Technology Context: A Theory of Planned BehaviorApproach. Journal of Information Systems Education 212(3): 203-214.
Sadullah, S. (2011) Do Personality Traits of Accountants Effect their Performance and Ethical Judgment?. Dissertations, School of Management, the University of Memphis, Memphis, United States
Sheppard, B. H., Hartwick, J. and Warshaw, P. R. (1988) The Theory of Reasoned Action: A Meta-analysis of Past Research with Recommendations for Modifications and Future Research. Journal of Consumer Research 15(1): 325-343.
Singhapakdi, A. (1999) Perceived Importance of Ethics and Ethical Decisionsin the Marketing. Journal of Business Research 45(1): 89-99
Singhapakdi, A., Vitell, S. and Kraft, K. (1996) Moral Intensity and Ethical Decision–Making of Marketing Professionals. Journal of Business Research 36(1): 245-255.
Siponen, M., Vance, A. and Willission, R. (2012) New Insights into the Problem of Software Piracy: the Effects of Neutralization, Shame and Moral Beliefs. Information & Management, 49(7): 334-341
Smithikrai, C. (2007) Personality Traits and Job Success: An Investigation in a Thai Sample. International Journal of Selection and Assessment 15(1): 134-139.
Song, S and Kwon, N. (2012) The Relationship between Personality Traits and Information Competency in Korean and American Students.Social Behavior and Personality 40(7): 1153-116-62.
Stone, W.C. (2009) Success through a Positive Mental Attitude. Englewood Cliffs, N. J.: Prentice-Hall, Inc.
Straub, D. W. and Nance, W. D. (1990) Discovering and Disciplining Computer Abuse in Organizations: A Field study. MIS Quarterly 14(1): 45-62
Wehrli, S. (2008) Personality on Social Network Sites: An Application of the Five Factor Model. ETH Zurich, Sociology Working, pp. 7.
Wooldridge, C. (2012) The Effects of Personality Traits and Cognitive Moral Development on Ethical Intention. Dissertations, School of Management, Trident International University, Cypress, California, United States.
Wolley, D. and Eining, J. (2006) Software Piracy among AccountingStudents. A Longtituditional Comparison of Changes and Sensitivity. Journal of Information Systems 20(1): 49-63.
Wu, W. and Yamg, H. (2009) An Empirical Investigation of the Relationship between Moral Intensity and Ethical Decision Making in Electronic Commerce. International Journal of
Organizational Innovation 2(1): 168-210