Comparing software piracy in South Africa and Zambia using social cognitive theory
AbstractThis study examines cross-national differences in relation to software piracy between a Zambian and a South Africa student sample on components of Bandura’s Social Cognitive Theory. The sample was selected based on the vastly different software piracy rates between Zambia (82%) and South Africa (35%) and the fact that software piracy rates are higher amongst student groups. The questionnaire was composed of previously developed scales measuring attitudes, social norms, intentions, incen- tives, deterrents, self-efficacy, and moral disengagement within the context of software piracy. The sample was gathered from one University in Zambia (N = 69) and one in South Africa (N = 71) in the students’ final and penultimate years of study. Statistical differences were found between the two samples on the attitudes and social norms scales, with the South African sample having more posi- tive attitudes and more favourable social norms towards software piracy than the Zambian sample. In terms of the theoretical model, attitudes, social norms and self-efficacy predicted software piracy intentions in both samples.
Ajzen, I. (1991). The Theory of Planned Behavior. Organizational Behavior and Human Decision Processes, 50, 179-211.
Al-Jabri, I and Abdul-Gader, A. (1997). Software copyright infringements: An exploratory study of the effects of individual and peer beliefs. Omega International Journal of Management Science, 25, 335-344.
Al-Rafee. S. and Cronan, T.P. (2006). Digital piracy: Factors that influence attitude toward behavior. Journal of Business Ethics, 63, 237-259.
Bagchi, K., Kirs, P. and Cerveny, R. (2006). Global software piracy: Can economic factors alone explain the trend? Communications of the ACM, 49, 70-76.
Ballantine, P. (2000). Examining the effects of culture on perceptions of moral intensity: A comparison of future marketers from Malaysia and New Zealand. In the Proceedings of AMZMAC 2000 visionary marketing for 21st Century. Griffith University Gold Coast, Queensland, Australia, 28 November -1 December, 2000.
Bandura, A. (1986). Social foundations of thought and action. A social cognitive theory. Englewood Cliffs, NJ: Prentice-Hall.
Bandura, A. (2004). Health promotion by social cognitive means. Health Education and Behavior, 31, 143-164.
Bandura, A. (2006). Toward a psychology of human agency. Perspectives on Psychological Science, 1, 164-180.
Bandura, A. Barbaranelli, C., Caprara, G.V. and Pastorelli, C. (1996). Mechanisms of moral disengagement in the exercise of moral agency. Journal of Personality and Social Psychology, 71, 364-374.
Business Software Alliance (2011). Eighth annual BSA-IDC global software piracy study. May, 2011. http://portal.bsa.org/globalpiracy2010/. Accessed on 20 May 2011.
Chang, M.K. (1998). Predicting unethical behavior: A comparison of the theory of reasoned action and the theory of planned behavior. Journal of Business Ethics, 17, 1825-1834.
Cho, K. and Eining, M. (1997). Information ethics: An empirical investigation of Korea and the United States. In Proceedings of the American accounting association.
Crittenden, W., Roberston, C. and Crittenden, V. (2007). Hard facts about software piracy. Business Strategy Review, 18, 29-33
Cronan, T.P. and Al-Rafee. S. (2008). Factors that influence the intention to pirate software and media. Journal of Business Ethics, 78, 527-545.
Eining, M.M. and Christensen, A.L. (1991). A psycho-social model of software piracy: The development and test of a model. In R. Dejoie, G. Fowler and D. Paradice (Eds.). Ethical issues in information systems (pp. 182-188). Boston, MA: Boyd and Fraser.
Glass, R.S. and Wood, W.A. (1996). Situational determinants of software piracy: An equity theory perspective. Journal of Business Ethics, 16, 1189-1198.
Gopal, R.D. and Sanders, G.L. (1998). International software piracy: an analysis of key issues and impacts. Information Systems Research, 9, 380-397.
Gopal, R.D. and Sanders, G.L. (2000). Global software piracy: you can’t get blood out of a turnip. Communications of the ACM, 43, 83-89.
Gupta, P. B., Gould, S. I. and Pola, B. (2004). To pirate of not to pirate: a comparative study of the ethical versus other influences on the consumer’s software acquisition-mode decision. Journal of Business Ethics, 55, 255-274.
Higgins, G.E. and Makin, D.A. (2004). Does social learning theory condition the effects of low self-control on college students’ software piracy? Journal of Economic Crime Management, 2, 1-22.
Hinduja, S. (2003). Trends and patterns among online software pirates. Ethics and Information Technology, 5, 49-61.
Hinduja, S. (2007). Neutralization theory and online software piracy: An empirical analysis. Ethics and Information Technology, 9, 187-204.
Hinduja, S. (2008). Deindividuation and internet software piracy. Cyber Psychology and Behavior, 11, 391-398.
Huck, S.W. (2004). Reading statistics and research (4th ed.). Boston, United States of America: Pearson Education.
Husted, B.W. (2000). The impact of national culture on software piracy. Journal of Business Ethics, 26, 197-211.
International Data Corporation (2009). White Paper: How to reduce software piracy in the Middle East and Africa: The case of South Africa. November, 2009. http://www.bsa.org/country/Research%20and%20 Statistics/me/~/media/Files/White%20Papers/ReducePiracyMEA/IDC_ ReducePiracyMEA_enZA.ashx. Accessed 4 January 2011:
Kini, R.B., Ramakrishna, H.V. and Vijayaraman, B.S. (2003). An exploratory study of moral intensity regarding software piracy of students in Thailand. Behavior and Information Technology, 22, 63-70.
Kovacic, Z. (2007). Determinants of worldwide software piracy.
Proceedings of Informing Science and IT Education Conference, Ljubljana
(pp. 128-150), Slovenia, 22-25 June 2007.
LaRose, R. and Kim, J. (2007). Share, steal or buy? A social cognitive perspective of music downloading. CyberPsychology and Behavior, 10, 267-277.
LaRose, R., Lai, Y.J., Lange, R., Love, B. and Wu, Y. (2005). Sharing or piracy? An exploration of downloading behavior. Journal of Computer-Mediated Communication, 11, 1-21.
Lending, D. and Slaughter, S.A. (1999). Understanding differences in ethical beliefs and behaviors toward software copying: the effects of organisation culture. Proceedings of the 1999 ACM SIGCPR Conference on Computer Personnel Research, pp. 253-260, April 8-10, 1999, New Orleans, USA.
Liang, Z. and Yan, Z. (2005). Software piracy among college students: A comprehensive review of contributing factors, underlying processes, and tackling strategies. Journal of Educational Computing Research, 33, 115-140.
Mishra, A., Akman, I. and Yazici, A. (2007). Organizational software piracy: An empirical assessment. Behavior and Information Technology, 26, 437-444.
Moores, T. and Dhillon, G. (2000). Software piracy: A view from Hong Kong. Communications of the ACM, 43, 88-93.
Peace, A.G., Galletta, D.F. and Thong, J.Y.L. (2003). Software piracy in the workplace: A model and empirical test. Journal of Management Information Systems, 20, 153-177.
Png, I.P.L. (2010). On the reliability of software piracy statistics. Electronic Commerce Research and Applications, 9, 365-373.
Rahim, M.M., Seyal, A.H. and Rahman, M.N.A. (2001). Factors affecting softlifting intention of computing students: An empirical study. Journal of Educational Computing Research, 24, 385-405.
Robertson, C.J., Gilley, K.M., Crittenden, V. and Crittenden, W.F. (2008). An analysis of the predictors of software piracy within Latin America. Journal of Business Research, 61, 651-656.
Seale, D.A., Polakowski, M. and Schneider, S. (1998). It’s not really theft!: Personal and workplace ethics that enable software piracy. Behavior and Information Technology, 17, 27-40.
Shim, J.P. and Taylor, G.S. (1991). A comparative study of unauthorized software copying: Information systems faculty members’ vs. practicing managers’ perceptions. In R. Dejoie, G. Fowler and D. Paradice (Eds.). Ethical issues in information systems (pp. 189-198). Boston, MA: Boyd and Fraser.
Shin, S. K., Gopal, R. D. Sanders, G. L. and Whinston, A. B. (2004). Global software piracy revisited. Communications of the ACM, 47, 103-107.
Simpson, P.M., Bannerjee, D. and Simpson, C.L. (1994). Softlifting: A model of motivating factors. Journal of Business Ethics, 12, 431-439.
Sims, R.R., Cheng, H.K. and Teegen, H. (1996). Toward a profile of student software piraters. Journal of Business Ethics, 15, 839-849.
Siponen, M.T. and Variainen, T. (2005). Attitudes to and factors affecting unauthorized copying of software in Finland. Behavior and Information Technology, 24, 249-257.
Solomon, S.L. and O’Brien, J.A. (1991). The effect of demographic factors on attitudes towards software piracy. In R. Dejoie, G. Fowler and D. Paradice (Eds.). Ethical issues in information systems (pp. 168-181). Boston, MA: Boyd and Fraser.
Swinyard, W.R., Rinne, H. and Kau, K.A. (1990). The morality of software piracy: A cross-cultural analysis. Journal of Business Ethics, 9, 655-664.
Tang, J.H. and Farn, C.K. (2005). The effect of interpersonal influence on softlifting intention and behavior. Journal of Business Ethics, 56, 149-161.
Taylor, G.S. and Shim, J.P. (1993). A comparative examination of attitudes towards software piracy among business professors and executives. Human Relations, 46, 419-433.
Thong, J.Y.L. and Yap, C. (1998). Testing an ethical decision-making theory: The case of softlifting. Journal of Management Information Systems, 15, 213-237.
Traphagan, M. and Griffith, A. (1998). Software piracy and global competitiveness: Report on global software piracy. International Review of Law, Computers and Technology, 12, 431-451.
Triandis, C.H. (1977). Interpersonal Behavior. Monterey, California: Brooks/ Cole Publishing Company.
Van Belle, J., MacDonald, B. and Wilson, D. (2007). Determinants of digital piracy among youth in South Africa. Communications of the IIMA, 7, 47-63.
Wang, F., Zhang, H., Zang, H. and Ouyang, M. (2005). Purchasing pirated software: An initial examination of Chinese consumers. Journal of Consumer Marketing, 22, 340-351.
Woolley, D.J. and Eining, M.M. (2006). Software piracy among accounting students: A longitudinal comparison of changes and sensitivity. Journal of Information Systems, 20, 49-63.
This journal is an open access journal, and the authors and journal should be properly acknowledged, when works are cited.
Authors may use the publisher's version for teaching purposes, in books, theses, dissertations, conferences and conference papers.
A copy of the authors’ publisher's version may also be hosted on the following websites:
- Non-commercial personal homepage or blog.
- Institutional webpage.
- Authors Institutional Repository.
The following notice should accompany such a posting on the website: “This is an electronic version of an article published in the African Journal of Business Ethics, Volume XXX, number XXX, pages XXX–XXX”, DOI. Authors should also supply a hyperlink to the original paper or indicate where the original paper (http://ajobe.journals.ac.za/pub) may be found.
The following Creative Commons license applies:
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.