Skip to main content
Log in

Use, perceived deterrence and the role of software piracy in video game console adoption

  • Published:
Information Systems Frontiers Aims and scope Submit manuscript

Abstract

This paper is an exploratory study into the role of software piracy in the decision to adopt a video game console. The paper takes a rational choice perspective, where actors evaluate the deterrent cost of moral transgression before acting, to explore how users with different levels of video game usage intensity approach the adoption decision, on the grounds that more experienced users can better assess the costs and benefits of moral transgression. The study used focus groups and a literature review to develop a set of factors based on the Theory of Planned Behavior. The resulting factors were operationalized in an online survey of 285 subjects of a variety of ages and incomes. The ability to pirate console software was significant for adopters but not non-adopters. Perceived deterrence was associated with greater system use, as measured by hours of console use per week.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

Notes

  1. We are grateful to an anonymous reviewer for this observation.

References

  • Ajzen, I. (1985). From intentions to actions: a theory of planned behavior. In J. Kuhl & J. Beckman (Eds.), Action-control: From cognition to behavior. Heidelberg: Springer.

    Google Scholar 

  • Ajzen, I. (1991). The theory of planned behavior. Organizational Behavior and Human Decision Processes, 50, 179–211.

    Article  Google Scholar 

  • Ajzen, I., & Fishbein, M. (1980). Understanding attitudes and predicting social behavior. Inc, Englewood Cliffs, NJ: Prentice-Hall.

    Google Scholar 

  • Alvisi, A., Narduzzo, A., & Zamarian, M. (2003). Playstation and the power of unexpected consequences. Information, Communication and Society, 6, 608–627.

    Article  Google Scholar 

  • Bagchi, K., Kirs, P., & Cerveny, R. (2006). Global software piracy: can economic factors alone explain the trend? Communications of the ACM, 49, 70–76.

    Article  Google Scholar 

  • Bagozzi, R. P. (1981). Attitudes, intentions, and behavior: a test of some key hypotheses. Journal of Personality and Social Psychology, 41, 607–627.

    Article  Google Scholar 

  • Becker, D., (2004). Playing the convergence game, CNet News.

  • Bhattacharjee, S., Gopal, R. D., & Sanders, G. L. (2003). Digital music and online sharing: software piracy 2.0? Communications of the ACM, 46, 107–111.

    Article  Google Scholar 

  • Blakely, R. (2007). Halo 3 blows away rivals to set record. Times Online, October 4, 2007.

  • Blossfeld, H. P. (1996). Macro-sociology, rational choice theory, and time. European Sociological Review, 12, 181–206.

    Article  Google Scholar 

  • Blumstein, A., Cohen, J., & Nagin, D. (1978). Deterrence and incapacitation: Estimating the effects of criminal sanctions on crime rates. Washington, DC: National Academy of Sciences.

    Google Scholar 

  • Childers, T. L., & Rao, A. R. (1992). The influence of familial and peer-based reference groups on consumer decisions. Journal of Consumer Research, 19, 198–211.

    Article  Google Scholar 

  • Chiou, J., Huang, C., & Lee, H. (2005). The antecedents of music piracy attitudes and intentions. Journal of Business Ethics, 57, 161–174.

    Article  Google Scholar 

  • Choi, H., Choi, M., Kim, J., & Yu, H. (2003). An empirical study on the adoption of information appliances with a focus on interactive TV. Telematics and Informatics, 20, 161–183.

    Article  Google Scholar 

  • Chronis, G. T. (2003). Gamecube slashed to $99. Video Business, 23, 7.

    Google Scholar 

  • Clarke, R., Cornish, D., Paternoster, R., & Bachman, R. (2000). Rational choice. In R. Paternoster (Ed.), Explaining crime and criminals: Essays in contemporary criminological theory (pp. 27–41). Los Angeles: Roxbury Publishing Company.

    Google Scholar 

  • Clarke, R. V., & Felson, M. (1993). Criminology, routine activity, and rational choice. Advances in Theoretical Criminology: Routine Activity and Rational Choice, 5, 1–14.

    Google Scholar 

  • Claxton, J. D., Ritchie, J. R. B., & Zaichowsky, J. (1980). The nominal group technique: its potential for consumer research. Journal of Consumer Research, 7, 308–313.

    Article  Google Scholar 

  • Cohen, A. (2000). New game (PlayStation 2). Time, 156, 58–60.

    Google Scholar 

  • Cohen, L., & Felson, M. (1979). Social change and crime rate trends: a routine activity approach. American Sociological Review, 44, 588–608.

    Article  Google Scholar 

  • Conner, M., & Armitage, C. J. (1998). Extending the theory of planned behavior: a review and avenues for further research. Journal of Applied Social Psychology, 28, 1429–1464.

    Article  Google Scholar 

  • Cooper, D. R., & Schindler, P. S. (2008). Business research methods. New York: McGraw-Hill.

    Google Scholar 

  • Corts, K. S., & Lederman, M. (2009). Software exclusivity and the scope of indirect network effects in the U.S. home video game market. International Journal of Industrial Organization, 27, 121–136.

    Article  Google Scholar 

  • d’Astous, A., Colbert, F., & Montpetit, D. (2005). Music piracy on the web—how effective are anti-piracy arguments? Evidence from the theory of planned behavior. Journal of Consumer Policy, 28, 289–310.

    Article  Google Scholar 

  • Darwall, S. L. (1976). A defense of the Kantian interpretation. Ethics, 86, 164–170.

    Article  Google Scholar 

  • Delbecq, A. L., Van de Ven, A. H., & Gustafson, D. H. (1975). Group techniques for program planning: A guide to nominal group and delphi process. Illinois, USA: Scott-Foresman.

    Google Scholar 

  • Delbecq, A., Van de Ven, A., & Gustafson, D. (1986). Group techniques for program planning: A guide to nominal group and Delphi processes. Middleton, WI: Green Briar Press.

    Google Scholar 

  • Dewitt, P. E. (1993). The amazing video game boom. Time, September 27, 67–71.

    Google Scholar 

  • Douglas, D. E., Cronan, T. P., & Behel, J. D. (2007). Equity perceptions as a deterrent to software piracy behavior. Information and Management, 44, 503–512.

    Article  Google Scholar 

  • Edery, D., & Mollick, E. (2009). Changing the game: How video games are transforming the future of business. Pearson Education: FT Press, Upper Saddle River, NJ.

    Google Scholar 

  • Elkin, T. (2001). Sony pulling a 1–2 punch. Advertising Age, 72, 4.

    Google Scholar 

  • ESA (2008). Entertainment Software Association 2008 sales and genre data, Entertainment Software Association.

  • Fishbein, M. A., & Ajzen, I. (1975). Belief, attitude, intention and behavior: An introduction to theory and research. MA, Addison Wesley: Reading.

    Google Scholar 

  • Fisher, R. J., & Price, L. L. (1992). An investigation into the social context of early adoption behavior. Journal of Consumer Research, 19, 477–486.

    Article  Google Scholar 

  • Gallagher, S., & Park, S. (2002). Innovation and competition in standard-based industries: a historical analysis of the US home video game market. IEEE Transactions on Engineering Management, 49, 67–82.

    Article  Google Scholar 

  • Gallagher, M., Hares, T., Spencer, J., Bradshaw, C., & Webb, I. (1993). The nominal group technique: a research tool for general practice? Family Practice, 10, 76–81.

    Article  Google Scholar 

  • Guo, Y., & Barnes, S. (2007). Why people buy virtual items in virtual worlds with real money. DATA BASE for Advances in Information Systems, 38, 69–76.

    Article  Google Scholar 

  • Hair, J. F., Anderson, R. E., Tatham, R. L., & Black, W. C. (1998). Multivariate data analysis. Englewood Cliffs, NJ: Prentice-Hall.

    Google Scholar 

  • Hedström, P., & Swedberg, R. (1996). Rational choice, empirical research, and the sociological tradition. European Sociological Review, 12, 127–146.

    Article  Google Scholar 

  • Ho, S., & Huang, C. (2009). Exploring success factors of video game communities in hierarchical linear modeling: the perspectives of members and leaders. Computers in Human Behavior, 25, 761–769.

    Article  Google Scholar 

  • Holak, S. L., & Lehmann, D. R. (1990). Purchase intention and the dimensions of innovation: an exploratory model. Journal Product of Innovation Management, 7, 59–73.

    Article  Google Scholar 

  • Holsapple, C. W., & Wu, J. (2008). Building effective online game websites with knowledge-based trust. Information Systems Frontiers, 10, 47–60.

    Article  Google Scholar 

  • Holsapple, C. W., Iyengar, D., Jin, H., & Rao, S. (2008). Parameters for software piracy research. The Information Society, 24, 199–218.

    Article  Google Scholar 

  • Hong, S. J., Thong, J. Y. L., Moon, J. Y., & Tam, K. Y. (2008). Understanding the behavior of mobile data services consumers. Information Systems Frontiers, 10, 431–445.

    Article  Google Scholar 

  • Huang, A. (2003). Keeping secrets in hardware: the Microsoft Xbox™ case study. Lecture Notes in Computer Science, 2523(2003), 355–430.

    Google Scholar 

  • Huber, J. (1997). Rational choice models in sociology. The American Sociologist, 28, 42–53.

    Article  Google Scholar 

  • Iman, R. L., & Conover, W. J. (1989). Modern business statistics. New York: John Wiley & Sons.

    Google Scholar 

  • Kwong, T. C., & Lee, K. O. (2002). Behavioral intention model for the exchange mode internet music piracy, Proceedings of the 35 th Hawaii International Conference on System Sciences, IEEE Computer Society.

  • Levin, A. M., Dato-on, M. C., & Rhee, K. (2004). Money for nothing and hits for free: the ethics of downloading music from peer-to-peer web sites. Journal of Marketing Theory and Practice, 12, 48–60.

    Google Scholar 

  • Lin, T, Hsu, M., Kuo, F., & Sun, P. (1999). An intention model based study of software piracy, Proceedings of the 32nd Hawaii International Conference on System Sciences, IEEE Computer Society.

  • Loughran, T., Piquero, A., Fagan, J., & Mulvey, E. P. (2009). Differential deterrence: studying heterogeneity and changes in perceptual deterrence among serious youthful offenders. Crime & Delinquency, 20, 1–25.

    Google Scholar 

  • Mack, K. Y., Leiber, M. J., Featherstone, R. A., & Monserud, M. A. (2007). Reassessing the family-delinquency association: do family type, family processes, and economic factors make a difference? Journal of Criminal Justice, 35, 51–67.

    Article  Google Scholar 

  • Mandler, M. (2005). Incomplete preferences and rational intransitivity of choice. Games and Economic Behavior, 50, 255–277.

    Article  Google Scholar 

  • Mathieson, K. (1991). Predicting user intentions: comparing the technology acceptance model with the theory of planned behavior. Information Systems Research, 2, 173–191.

    Article  Google Scholar 

  • Matza, D. (1964). Delinquency and drift. New York: John Wiley and Sons, Inc.

    Google Scholar 

  • Meng-Hsiang, H., & Feng-Yang, K. (2003). The effect of organization-based self-esteem and deindividuation in protecting personal information privacy. Journal of Business Ethics, 42, 305–320.

    Article  Google Scholar 

  • Moore, C. M. (1987). Group techniques for idea building. Newbury Park: Sage Publishers.

    Google Scholar 

  • Moore, G. C., & Benbasat, I. (1991). Development of an instrument to measure the perceptions of adopting an information technology innovation. Information Systems Research, 2, 192–222.

    Article  Google Scholar 

  • Myles, G., & Nusser, S. (2006). Content protection for games. IBM Systems Journal, 45, 119–143.

    Article  Google Scholar 

  • Nunnally, J. C. (1967). Psychometric theory. New York: McGraw-Hill.

    Google Scholar 

  • Payne, B. K., & Gainey, R. R. (2004). Ancillary consequences of employee theft. Journal of Criminal Justice, 32, 63–73.

    Article  Google Scholar 

  • Peace, A. G., Galletta, D. E., & Thong, J. Y. (2003). Development and examination of a predictive model of software piracy behavior. Journal of Management Information Systems, 20, 153–178.

    Google Scholar 

  • Peitz, M., & Waelbroeck, P. (2006). Piracy of digital products: a critical review of the theoretical literature. Information Economics and Policy, 18, 449–476.

    Article  Google Scholar 

  • Plowman, S., & Goode, S. (2009). Factors affecting the intention to download music: quality perceptions and downloading intensity. Journal of Computer Information Systems, 49, 84–109.

    Google Scholar 

  • Rawls, J., (1971). A Theory of Justice, The Belknap Press of Harvard University Press.

  • Rogers, E. M. (2003). Diffusion of innovations (5th ed.). The Free Press: New York.

    Google Scholar 

  • Schilling, M. A. (2003). Technological leapfrogging: lessons from the US video game console industry. California Management Review, 45, 6–32.

    Google Scholar 

  • Schneider, A. L., & Ervin, L. (1990). Specific deterrence, rational choice, and decision heuristics: applications in juvenile justice. Social Science Quarterly, 71, 585–601.

    Google Scholar 

  • Schulz, C., & Wagner, S. (2008). Outlaw community innovations. International Journal of Innovation Management, 12, 399–418.

    Article  Google Scholar 

  • Shankar, V., & Bayus, B. L. (2003). Network effects and competition: an empirical analysis of the home video game industry. Strategic Management Journal, 24, 375–384.

    Article  Google Scholar 

  • Sheeran, P., Trafimow, D., & Armitage, C. J. (2003). Predicting behaviour from perceived behavioural control: tests of the accuracy assumption of the theory of planned behaviour. British Journal of Social Psychology, 42, 393–410.

    Article  Google Scholar 

  • Sheff, D. (1994). How Nintendo conquered the world. New York: Random House.

    Google Scholar 

  • Shimp, T. A., & Kavas, A. (1984). The theory of reasoned action applied to coupon usage. Journal of Consumer Research, 11, 795–809.

    Article  Google Scholar 

  • Silberman, M. (1976). Toward a theory of criminal deterrence. American Sociological Review, 41, 442–461.

    Article  Google Scholar 

  • Siwek, S. E., (2007). Video games in the 21st century: economic contributions of the U.S. entertainment software industry, The Entertainment Software Association.

  • Steenhaut, S., & van Kenhove, P. (2006). An empirical investigation of the relationships among a consumer’s personal values, ethical ideology and ethical beliefs. Journal of Business Ethics, 64, 137–155.

    Article  Google Scholar 

  • Sweeney, J. C., & Soutar, G. N. (2001). Consumer perceived value: the development of a multiple item scale. Journal of Retailing, 77, 203–220.

    Article  Google Scholar 

  • Taylor, S., & Todd, P. A. (1995a). Understanding information technology usage: a test of competing models. Information Systems Research, 6, 144–176.

    Article  Google Scholar 

  • Taylor, S., & Todd, P. A. (1995b). Decomposition and crossover effects in the theory of planned behavior: a study of consumer adoption intentions. International Journal of Research in Marketing, 12, 137–155.

    Article  Google Scholar 

  • Teo, T. S. H., & Pok, S. H. (2003). Adoption of WAP-enabled mobile phones among internet users. Omega, 31, 483–498.

    Article  Google Scholar 

  • Terdiman, D., (2009). Report: Microsoft bans 1 million Xbox Live players, CNN News, November 12, 2009.

  • Tornatzky, L. G., & Klein, K. J. (1982). Innovation characteristics and innovation adoption-implementation: a meta-analysis of findings. IEEE Transactions on Engineering Management, 19, 28–45.

    Google Scholar 

  • Turel, O., Serenko, A., & Bontis, N. (2010). User acceptance of hedonic digital artifacts: a theory of consumption values perspective. Information & Management, 47, 53–59.

    Article  Google Scholar 

  • Venkatesh, V. (2000). Determinants of perceived ease of use: integrating control, intrinsic motivation and emotion into the technology acceptance model. Information Systems Research, 11, 342–365.

    Article  Google Scholar 

  • Venkatesh, V., & Brown, S. A. (2001). A longitudinal investigation of personal computers in homes: adoption determinants and emerging challenges. MIS Quarterly, 25, 71–102.

    Article  Google Scholar 

  • Venkatesh, V., Morris, M. G., Davis, G. B., & Davis, F. D. (2003). User acceptance of information technology: toward a unified view. MIS Quarterly, 27, 425–478.

    Google Scholar 

  • Weisberg, H. F., & Bowen, B. D. (1977). An introduction to survey research and data analysis. San Francisco: Freeman Publishers.

    Google Scholar 

  • Wood, R. T. A., Griffiths, M. D., & Eatough, V. (2004). Online data collection from video game players: methodological issues. CyberPsychology & Behavior, 7, 511–518.

    Google Scholar 

  • Young, H., Lierman, L., Powell-Cope, G., Kasprzyk, D., & Benoliel, J. (1991). Operationalizing the theory of planned behavior. Research in Nursing & Health, 14, 137–144.

    Article  Google Scholar 

  • Zhang, X., & Maruping, L. M. (2008). Household technology adoption in a global marketplace: incorporating the role of espoused cultural values. Information Systems Frontiers, 10, 403–413.

    Article  Google Scholar 

Download references

Acknowledgment

The authors are grateful for the helpful advice of Neil Fargher, Mark Wilson and Alex Richardson during the development of this paper.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sigi Goode.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Kartas, A., Goode, S. Use, perceived deterrence and the role of software piracy in video game console adoption. Inf Syst Front 14, 261–277 (2012). https://doi.org/10.1007/s10796-010-9236-2

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10796-010-9236-2

Keywords

Navigation