Finders, keepers, stealers, reapers: an experimental examination of three antecedents of software piracy behavior
dc.contributor.advisor | Rao, V. Srinivasan (Chino) | |
dc.contributor.author | Gergely, Marton | |
dc.contributor.committeeMember | Keating, Jerome | |
dc.contributor.committeeMember | Liu, Charles | |
dc.contributor.committeeMember | Walz, Diane | |
dc.date.accessioned | 2024-02-09T21:11:21Z | |
dc.date.available | 2024-02-09T21:11:21Z | |
dc.date.issued | 2015 | |
dc.description | This item is available only to currently enrolled UTSA students, faculty or staff. To download, navigate to Log In in the top right-hand corner of this screen, then select Log in with my UTSA ID. | |
dc.description.abstract | Software piracy has been a problematic issue for several decades. While there is a significant body of research attempting to identify reasons why individuals pirate software, a complete understanding of the factors influencing software piracy has yet to emerge. Further, a concern with the results of software piracy studies reported by past researchers is the likelihood of social desirability bias. In the current research, two separate studies were conducted. In the first study, three antecedents (salience of ethicality, deterrence, and social influence) of software piracy behavior were examined in an experimental setting with actual money at stake. This allowed subject behavior to be observed rather than inferred from subject reports. In the second study, the behavior of subjects in one of the treatments of the first study was compared to subject self-report and peer-report responses to a hypothetical scenario that paralleled the experiment. For the self-report, the response was whether the subject would pirate. For the peer-report, the subject reported whether his/her peers would pirate. A comparison of behavior when money was at stake, to subject reports of likely behavior, helped examine the influence of social desirability bias in subject reports. Perceived salience of ethicality was significantly related to software piracy behavior in the experimental study, while perceived deterrence and perceived social influence were not. Self-report surveys exhibited high levels of social desirability bias. The peer-report survey method was found to exhibit far less social desirability bias, and provide a statistically equivalent piracy level as found in the experiment. | |
dc.description.department | Information Systems and Cyber Security | |
dc.format.extent | 244 pages | |
dc.format.mimetype | application/pdf | |
dc.identifier.isbn | 9781339034256 | |
dc.identifier.uri | https://hdl.handle.net/20.500.12588/3528 | |
dc.language | en | |
dc.subject | Digital Media | |
dc.subject | Information System Ethics | |
dc.subject | Intellectual Property Theft | |
dc.subject | Social Desirability Bias | |
dc.subject | Software Piracy | |
dc.subject.classification | Information technology | |
dc.subject.lcsh | Software piracy | |
dc.subject.lcsh | Computer software -- Moral and ethical aspects | |
dc.title | Finders, keepers, stealers, reapers: an experimental examination of three antecedents of software piracy behavior | |
dc.type | Thesis | |
dc.type.dcmi | Text | |
dcterms.accessRights | pq_closed | |
thesis.degree.department | Information Systems and Cyber Security | |
thesis.degree.grantor | University of Texas at San Antonio | |
thesis.degree.level | Doctoral | |
thesis.degree.name | Doctor of Philosophy |
Files
Original bundle
1 - 1 of 1
No Thumbnail Available
- Name:
- Gergely_utsa_1283D_11665.pdf
- Size:
- 11.67 MB
- Format:
- Adobe Portable Document Format