Abstract
This paper is an exploratory study into the role of software piracy in the decision to adopt a video game console. The paper takes a rational choice perspective, where actors evaluate the deterrent cost of moral transgression before acting, to explore how users with different levels of video game usage intensity approach the adoption decision, on the grounds that more experienced users can better assess the costs and benefits of moral transgression. The study used focus groups and a literature review to develop a set of factors based on the Theory of Planned Behavior. The resulting factors were operationalized in an online survey of 285 subjects of a variety of ages and incomes. The ability to pirate console software was significant for adopters but not non-adopters. Perceived deterrence was associated with greater system use, as measured by hours of console use per week.
Similar content being viewed by others
Notes
We are grateful to an anonymous reviewer for this observation.
References
Ajzen, I. (1985). From intentions to actions: a theory of planned behavior. In J. Kuhl & J. Beckman (Eds.), Action-control: From cognition to behavior. Heidelberg: Springer.
Ajzen, I. (1991). The theory of planned behavior. Organizational Behavior and Human Decision Processes, 50, 179–211.
Ajzen, I., & Fishbein, M. (1980). Understanding attitudes and predicting social behavior. Inc, Englewood Cliffs, NJ: Prentice-Hall.
Alvisi, A., Narduzzo, A., & Zamarian, M. (2003). Playstation and the power of unexpected consequences. Information, Communication and Society, 6, 608–627.
Bagchi, K., Kirs, P., & Cerveny, R. (2006). Global software piracy: can economic factors alone explain the trend? Communications of the ACM, 49, 70–76.
Bagozzi, R. P. (1981). Attitudes, intentions, and behavior: a test of some key hypotheses. Journal of Personality and Social Psychology, 41, 607–627.
Becker, D., (2004). Playing the convergence game, CNet News.
Bhattacharjee, S., Gopal, R. D., & Sanders, G. L. (2003). Digital music and online sharing: software piracy 2.0? Communications of the ACM, 46, 107–111.
Blakely, R. (2007). Halo 3 blows away rivals to set record. Times Online, October 4, 2007.
Blossfeld, H. P. (1996). Macro-sociology, rational choice theory, and time. European Sociological Review, 12, 181–206.
Blumstein, A., Cohen, J., & Nagin, D. (1978). Deterrence and incapacitation: Estimating the effects of criminal sanctions on crime rates. Washington, DC: National Academy of Sciences.
Childers, T. L., & Rao, A. R. (1992). The influence of familial and peer-based reference groups on consumer decisions. Journal of Consumer Research, 19, 198–211.
Chiou, J., Huang, C., & Lee, H. (2005). The antecedents of music piracy attitudes and intentions. Journal of Business Ethics, 57, 161–174.
Choi, H., Choi, M., Kim, J., & Yu, H. (2003). An empirical study on the adoption of information appliances with a focus on interactive TV. Telematics and Informatics, 20, 161–183.
Chronis, G. T. (2003). Gamecube slashed to $99. Video Business, 23, 7.
Clarke, R., Cornish, D., Paternoster, R., & Bachman, R. (2000). Rational choice. In R. Paternoster (Ed.), Explaining crime and criminals: Essays in contemporary criminological theory (pp. 27–41). Los Angeles: Roxbury Publishing Company.
Clarke, R. V., & Felson, M. (1993). Criminology, routine activity, and rational choice. Advances in Theoretical Criminology: Routine Activity and Rational Choice, 5, 1–14.
Claxton, J. D., Ritchie, J. R. B., & Zaichowsky, J. (1980). The nominal group technique: its potential for consumer research. Journal of Consumer Research, 7, 308–313.
Cohen, A. (2000). New game (PlayStation 2). Time, 156, 58–60.
Cohen, L., & Felson, M. (1979). Social change and crime rate trends: a routine activity approach. American Sociological Review, 44, 588–608.
Conner, M., & Armitage, C. J. (1998). Extending the theory of planned behavior: a review and avenues for further research. Journal of Applied Social Psychology, 28, 1429–1464.
Cooper, D. R., & Schindler, P. S. (2008). Business research methods. New York: McGraw-Hill.
Corts, K. S., & Lederman, M. (2009). Software exclusivity and the scope of indirect network effects in the U.S. home video game market. International Journal of Industrial Organization, 27, 121–136.
d’Astous, A., Colbert, F., & Montpetit, D. (2005). Music piracy on the web—how effective are anti-piracy arguments? Evidence from the theory of planned behavior. Journal of Consumer Policy, 28, 289–310.
Darwall, S. L. (1976). A defense of the Kantian interpretation. Ethics, 86, 164–170.
Delbecq, A. L., Van de Ven, A. H., & Gustafson, D. H. (1975). Group techniques for program planning: A guide to nominal group and delphi process. Illinois, USA: Scott-Foresman.
Delbecq, A., Van de Ven, A., & Gustafson, D. (1986). Group techniques for program planning: A guide to nominal group and Delphi processes. Middleton, WI: Green Briar Press.
Dewitt, P. E. (1993). The amazing video game boom. Time, September 27, 67–71.
Douglas, D. E., Cronan, T. P., & Behel, J. D. (2007). Equity perceptions as a deterrent to software piracy behavior. Information and Management, 44, 503–512.
Edery, D., & Mollick, E. (2009). Changing the game: How video games are transforming the future of business. Pearson Education: FT Press, Upper Saddle River, NJ.
Elkin, T. (2001). Sony pulling a 1–2 punch. Advertising Age, 72, 4.
ESA (2008). Entertainment Software Association 2008 sales and genre data, Entertainment Software Association.
Fishbein, M. A., & Ajzen, I. (1975). Belief, attitude, intention and behavior: An introduction to theory and research. MA, Addison Wesley: Reading.
Fisher, R. J., & Price, L. L. (1992). An investigation into the social context of early adoption behavior. Journal of Consumer Research, 19, 477–486.
Gallagher, S., & Park, S. (2002). Innovation and competition in standard-based industries: a historical analysis of the US home video game market. IEEE Transactions on Engineering Management, 49, 67–82.
Gallagher, M., Hares, T., Spencer, J., Bradshaw, C., & Webb, I. (1993). The nominal group technique: a research tool for general practice? Family Practice, 10, 76–81.
Guo, Y., & Barnes, S. (2007). Why people buy virtual items in virtual worlds with real money. DATA BASE for Advances in Information Systems, 38, 69–76.
Hair, J. F., Anderson, R. E., Tatham, R. L., & Black, W. C. (1998). Multivariate data analysis. Englewood Cliffs, NJ: Prentice-Hall.
Hedström, P., & Swedberg, R. (1996). Rational choice, empirical research, and the sociological tradition. European Sociological Review, 12, 127–146.
Ho, S., & Huang, C. (2009). Exploring success factors of video game communities in hierarchical linear modeling: the perspectives of members and leaders. Computers in Human Behavior, 25, 761–769.
Holak, S. L., & Lehmann, D. R. (1990). Purchase intention and the dimensions of innovation: an exploratory model. Journal Product of Innovation Management, 7, 59–73.
Holsapple, C. W., & Wu, J. (2008). Building effective online game websites with knowledge-based trust. Information Systems Frontiers, 10, 47–60.
Holsapple, C. W., Iyengar, D., Jin, H., & Rao, S. (2008). Parameters for software piracy research. The Information Society, 24, 199–218.
Hong, S. J., Thong, J. Y. L., Moon, J. Y., & Tam, K. Y. (2008). Understanding the behavior of mobile data services consumers. Information Systems Frontiers, 10, 431–445.
Huang, A. (2003). Keeping secrets in hardware: the Microsoft Xbox™ case study. Lecture Notes in Computer Science, 2523(2003), 355–430.
Huber, J. (1997). Rational choice models in sociology. The American Sociologist, 28, 42–53.
Iman, R. L., & Conover, W. J. (1989). Modern business statistics. New York: John Wiley & Sons.
Kwong, T. C., & Lee, K. O. (2002). Behavioral intention model for the exchange mode internet music piracy, Proceedings of the 35 th Hawaii International Conference on System Sciences, IEEE Computer Society.
Levin, A. M., Dato-on, M. C., & Rhee, K. (2004). Money for nothing and hits for free: the ethics of downloading music from peer-to-peer web sites. Journal of Marketing Theory and Practice, 12, 48–60.
Lin, T, Hsu, M., Kuo, F., & Sun, P. (1999). An intention model based study of software piracy, Proceedings of the 32nd Hawaii International Conference on System Sciences, IEEE Computer Society.
Loughran, T., Piquero, A., Fagan, J., & Mulvey, E. P. (2009). Differential deterrence: studying heterogeneity and changes in perceptual deterrence among serious youthful offenders. Crime & Delinquency, 20, 1–25.
Mack, K. Y., Leiber, M. J., Featherstone, R. A., & Monserud, M. A. (2007). Reassessing the family-delinquency association: do family type, family processes, and economic factors make a difference? Journal of Criminal Justice, 35, 51–67.
Mandler, M. (2005). Incomplete preferences and rational intransitivity of choice. Games and Economic Behavior, 50, 255–277.
Mathieson, K. (1991). Predicting user intentions: comparing the technology acceptance model with the theory of planned behavior. Information Systems Research, 2, 173–191.
Matza, D. (1964). Delinquency and drift. New York: John Wiley and Sons, Inc.
Meng-Hsiang, H., & Feng-Yang, K. (2003). The effect of organization-based self-esteem and deindividuation in protecting personal information privacy. Journal of Business Ethics, 42, 305–320.
Moore, C. M. (1987). Group techniques for idea building. Newbury Park: Sage Publishers.
Moore, G. C., & Benbasat, I. (1991). Development of an instrument to measure the perceptions of adopting an information technology innovation. Information Systems Research, 2, 192–222.
Myles, G., & Nusser, S. (2006). Content protection for games. IBM Systems Journal, 45, 119–143.
Nunnally, J. C. (1967). Psychometric theory. New York: McGraw-Hill.
Payne, B. K., & Gainey, R. R. (2004). Ancillary consequences of employee theft. Journal of Criminal Justice, 32, 63–73.
Peace, A. G., Galletta, D. E., & Thong, J. Y. (2003). Development and examination of a predictive model of software piracy behavior. Journal of Management Information Systems, 20, 153–178.
Peitz, M., & Waelbroeck, P. (2006). Piracy of digital products: a critical review of the theoretical literature. Information Economics and Policy, 18, 449–476.
Plowman, S., & Goode, S. (2009). Factors affecting the intention to download music: quality perceptions and downloading intensity. Journal of Computer Information Systems, 49, 84–109.
Rawls, J., (1971). A Theory of Justice, The Belknap Press of Harvard University Press.
Rogers, E. M. (2003). Diffusion of innovations (5th ed.). The Free Press: New York.
Schilling, M. A. (2003). Technological leapfrogging: lessons from the US video game console industry. California Management Review, 45, 6–32.
Schneider, A. L., & Ervin, L. (1990). Specific deterrence, rational choice, and decision heuristics: applications in juvenile justice. Social Science Quarterly, 71, 585–601.
Schulz, C., & Wagner, S. (2008). Outlaw community innovations. International Journal of Innovation Management, 12, 399–418.
Shankar, V., & Bayus, B. L. (2003). Network effects and competition: an empirical analysis of the home video game industry. Strategic Management Journal, 24, 375–384.
Sheeran, P., Trafimow, D., & Armitage, C. J. (2003). Predicting behaviour from perceived behavioural control: tests of the accuracy assumption of the theory of planned behaviour. British Journal of Social Psychology, 42, 393–410.
Sheff, D. (1994). How Nintendo conquered the world. New York: Random House.
Shimp, T. A., & Kavas, A. (1984). The theory of reasoned action applied to coupon usage. Journal of Consumer Research, 11, 795–809.
Silberman, M. (1976). Toward a theory of criminal deterrence. American Sociological Review, 41, 442–461.
Siwek, S. E., (2007). Video games in the 21st century: economic contributions of the U.S. entertainment software industry, The Entertainment Software Association.
Steenhaut, S., & van Kenhove, P. (2006). An empirical investigation of the relationships among a consumer’s personal values, ethical ideology and ethical beliefs. Journal of Business Ethics, 64, 137–155.
Sweeney, J. C., & Soutar, G. N. (2001). Consumer perceived value: the development of a multiple item scale. Journal of Retailing, 77, 203–220.
Taylor, S., & Todd, P. A. (1995a). Understanding information technology usage: a test of competing models. Information Systems Research, 6, 144–176.
Taylor, S., & Todd, P. A. (1995b). Decomposition and crossover effects in the theory of planned behavior: a study of consumer adoption intentions. International Journal of Research in Marketing, 12, 137–155.
Teo, T. S. H., & Pok, S. H. (2003). Adoption of WAP-enabled mobile phones among internet users. Omega, 31, 483–498.
Terdiman, D., (2009). Report: Microsoft bans 1 million Xbox Live players, CNN News, November 12, 2009.
Tornatzky, L. G., & Klein, K. J. (1982). Innovation characteristics and innovation adoption-implementation: a meta-analysis of findings. IEEE Transactions on Engineering Management, 19, 28–45.
Turel, O., Serenko, A., & Bontis, N. (2010). User acceptance of hedonic digital artifacts: a theory of consumption values perspective. Information & Management, 47, 53–59.
Venkatesh, V. (2000). Determinants of perceived ease of use: integrating control, intrinsic motivation and emotion into the technology acceptance model. Information Systems Research, 11, 342–365.
Venkatesh, V., & Brown, S. A. (2001). A longitudinal investigation of personal computers in homes: adoption determinants and emerging challenges. MIS Quarterly, 25, 71–102.
Venkatesh, V., Morris, M. G., Davis, G. B., & Davis, F. D. (2003). User acceptance of information technology: toward a unified view. MIS Quarterly, 27, 425–478.
Weisberg, H. F., & Bowen, B. D. (1977). An introduction to survey research and data analysis. San Francisco: Freeman Publishers.
Wood, R. T. A., Griffiths, M. D., & Eatough, V. (2004). Online data collection from video game players: methodological issues. CyberPsychology & Behavior, 7, 511–518.
Young, H., Lierman, L., Powell-Cope, G., Kasprzyk, D., & Benoliel, J. (1991). Operationalizing the theory of planned behavior. Research in Nursing & Health, 14, 137–144.
Zhang, X., & Maruping, L. M. (2008). Household technology adoption in a global marketplace: incorporating the role of espoused cultural values. Information Systems Frontiers, 10, 403–413.
Acknowledgment
The authors are grateful for the helpful advice of Neil Fargher, Mark Wilson and Alex Richardson during the development of this paper.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Kartas, A., Goode, S. Use, perceived deterrence and the role of software piracy in video game console adoption. Inf Syst Front 14, 261–277 (2012). https://doi.org/10.1007/s10796-010-9236-2
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10796-010-9236-2