You are on page 1of 18

Journal of Research in Interactive Marketing

Predicting consumer digital piracy behavior: The role of rationalization and perceived
consequences
Irena Vida Mateja Kos Kokli# Monika Kukar-Kinney Elfriede Penz

Article information:

Downloaded by IQRA UNIVERSITY At 22:29 22 June 2015 (PT)

To cite this document:


Irena Vida Mateja Kos Kokli# Monika Kukar-Kinney Elfriede Penz, (2012),"Predicting consumer digital
piracy behavior", Journal of Research in Interactive Marketing, Vol. 6 Iss 4 pp. 298 - 313
Permanent link to this document:
http://dx.doi.org/10.1108/17505931211282418
Downloaded on: 22 June 2015, At: 22:29 (PT)
References: this document contains references to 57 other documents.
To copy this document: permissions@emeraldinsight.com
The fulltext of this document has been downloaded 1054 times since 2012*

Users who downloaded this article also downloaded:


Steven A. Taylor, (2012),"Implicit attitudes and digital piracy", Journal of Research in Interactive Marketing,
Vol. 6 Iss 4 pp. 281-297 http://dx.doi.org/10.1108/17505931211282409
Mahalia Jackman, Troy Lorde, (2014),"Why buy when we can pirate? The role of intentions and willingness
to pay in predicting piracy behavior", International Journal of Social Economics, Vol. 41 Iss 9 pp. 801-819
http://dx.doi.org/10.1108/IJSE-04-2013-0104
Steven A. Taylor, (2012),"Evaluating digital piracy intentions on behaviors", Journal of Services Marketing,
Vol. 26 Iss 7 pp. 472-483 http://dx.doi.org/10.1108/08876041211266404

Access to this document was granted through an Emerald subscription provided by emerald-srm:546149 []

For Authors
If you would like to write for this, or any other Emerald publication, then please use our Emerald for
Authors service information about how to choose which publication to write for and submission guidelines
are available for all. Please visit www.emeraldinsight.com/authors for more information.

About Emerald www.emeraldinsight.com


Emerald is a global publisher linking research and practice to the benefit of society. The company
manages a portfolio of more than 290 journals and over 2,350 books and book series volumes, as well as
providing an extensive range of online products and additional customer resources and services.
Emerald is both COUNTER 4 and TRANSFER compliant. The organization is a partner of the Committee
on Publication Ethics (COPE) and also works with Portico and the LOCKSS initiative for digital archive
preservation.
*Related content and download information correct at time of download.

The current issue and full text archive of this journal is available at
www.emeraldinsight.com/2040-7122.htm

JRIM
6,4

298
Received 15 February 2012
Revised 7 May 2012,
18 June 2012
Accepted 6 July 2012

Predicting consumer
digital piracy behavior
The role of rationalization and perceived
consequences
Irena Vida and Mateja Kos Koklic
Marketing Department, University of Ljubljana, Ljubljana, Slovenia

Monika Kukar-Kinney

Downloaded by IQRA UNIVERSITY At 22:29 22 June 2015 (PT)

Marketing Department, University of Richmond, Richmond, Virginia, USA and


University of Ljubljana, Ljubljana, Slovenia, and

Elfriede Penz
International Marketing Management, Wirtschaftsuniversitat Wien,
Vienna, Austria
Abstract
Purpose The purpose of this paper is to investigate consumer perceptions of personal risk and benefits
of digital piracy behavior as determinants of ones justification for such behavior and the consequent future
piracy intention. Temporal effects of rationalization in shaping future piracy intent are also addressed.
Design/methodology/approach A conceptual model was developed using counterfeiting and
piracy literature. Data were gathered via mail and online survey of adults in five European Union
countries. The model was tested on pooled sample using confirmatory factor analysis and structural
equation modeling.
Findings Rationalization mediates the relationship between perceived benefits and piracy
intention, but not between perceived risk and intention. Both perceived risk and benefits affect piracy
intent, with risk reducing it and benefits increasing it. Rationalization of past behavior increases future
digital piracy intent.
Research limitations/implications Risk measure was limited to technical problems, thus future
studies should examine a wider scope of risk dimensions. The cross-sectional design of the study also
creates some limitations. A longitudinal methodology could provide a better insight into sequencing of
rationalization.
Social implications Marketing communications should increase public awareness of risks and
reduce perceived piracy benefits to reduce future piracy intent. Public persuasion activities should
counter the arguments consumers use to rationalize their piracy behavior.
Originality/value This research fills in a void in knowledge on how expected consequences drive
rationalization techniques, particularly with respect to future piracy intent. A realistic data set drawn
from adult population in five countries is used, enhancing external validity.

Journal of Research in Interactive


Marketing
Vol. 6 No. 4, 2012
pp. 298-313
q Emerald Group Publishing Limited
2040-7122
DOI 10.1108/17505931211282418

Keywords Digital piracy, Consequences, Risk, Benefits, Rationalization, Piracy intent,


Digital technology, Consumer behaviour, European Union
Paper type Research paper

Data collection for this study was supported by the Commission of European Community,
contract no. 217514 (EU 7th Framework Programme). Authors gratefully acknowledge
contributions of research partners from all countries participating in this research project.

Downloaded by IQRA UNIVERSITY At 22:29 22 June 2015 (PT)

1. Introduction
With rapid advances in technology and the increasing global availability and
accessibility of digital channels for information/media distribution, illicit behavior
regarding digital goods continues to perplex practitioners and researchers alike. Digital
piracy represents a growing threat to the welfare of both producers and consumers
(Phau and Ng, 2010; Sinha et al., 2010). While the exact loss for the supply side remains
inconclusive, industry antipiracy group BASCAP (2011) estimated the income loss to
range from $30 to $75 billion in digitally pirated music, movies and software industries
alone, rising up to $240 billion by 2015. Some researchers question these estimates,
seeking a more balanced approach by identifying both positive and negative effects for
the producers (Bhattacharjee et al., 2006; Mattelart, 2009). Similarly, mixed effects have
been recognized for the consumers as stakeholders taking part in digital piracy: both
gains or benefits (such as price benefits) and losses or risks (such as a threat of computer
virus) (Hennig-Thurau et al., 2007; Phau and Ng, 2010; Sirkeci and Magnusdottir, 2011).
Undeniably, industries, policy makers and consumers are faced with the challenging
environment and omnipotent institutional regime of existing digital copyright
management. Current efforts aimed at curtailing digital piracy have left various
stakeholders disgruntled due to either financial losses or by impinging on ideology of
consumer rights, free access and creativity expression (Goles et al., 2008; Mattelart,
2009). Given the interdisciplinary nature of the problem, researchers in the areas of
marketing, ethics, computer systems and criminology examined both the supply and the
demand sides of the issue. Yet, several voids remain in the literature before adequate
solutions can be identified.
This study offers empirical insights into factors underlying consumer illicit
behavior in the context of downloading, sharing and using digital products (e.g. music,
software, movie files) across five European Union (EU) countries. We aim to examine
consumer perceptions of expected personal consequences (e.g. perceived risk and
benefits) as drivers of an individuals justifications for illicit behavior regarding digital
goods and behavioral intention to engage in such activities. Moreover, by applying
neutralization theory, we investigate the temporal effects of rationalization behavior in
shaping future piracy intent. When knowingly engaging in ethically questionable
behaviors, individuals tend to resort to rationalization, a common method of reducing
negative feelings by offering justification of their fraud, while still believing in their
ethical values (Dacin and Murphy, 2011).
The contribution of this study is threefold. First, we provide a balanced view by
examining both expected gains and losses associated with digital piracy intent and
rationalization of past piracy behavior. While previous studies acknowledged that
expected consequences of the action may affect an individuals choice of behavior (Yoon,
2011), far less attention has been focused on ways in which such perceptions drive
rationalization techniques and thought processes behind digital piracy (McGregor,
2008). Insights into the drivers of rationalization, i.e. perceived risks and benefits, have
important implications for antipiracy communication campaigns, particularly due to the
low efficacy of existing appeals focusing mostly on adverse effects, such as emphasizing
guilt appeals (Lysonski and Durvasula, 2008; Zamoon and Curley, 2008). Second, we test
our conceptual model in a cross-national context using five EU countries. While
this region is one of the largest free-trade areas in the world, most existing piracy
research to date has been limited to the US and Asia (Aleassa et al., 2011; Eisend and

Consumer digital
piracy behavior

299

JRIM
6,4

Downloaded by IQRA UNIVERSITY At 22:29 22 June 2015 (PT)

300

Schuchert-Gueler, 2006). Third, we use realistic data sets drawn from adult computer
users across the five countries in the EU using multiple methods of data collection.
Previous empirical studies of the demand-side of piracy tend to rely on student samples
rather than general public. This threatens generalizability as the illicit digital behavior is
by no means limited to university settings (Williams et al., 2010; Yoon, 2011).
The paper is structured as follows. First, we briefly review the existing literature on
digital piracy. Then, we develop a conceptual framework which serves as the basis for
the construction of the hypotheses. Next, we report on the measures used, the data
collection methodology and the analytical procedures. Finally, we present the findings
of the study and discuss their implications and future research avenues.
2. Conceptual model and hypotheses
Researchers delving into the demand-side of digital piracy have utilized different
methodological approaches and applied various theoretical frameworks to explain
unauthorized consumer activities on the internet. While this is not surprising given
the interdisciplinary nature of the problem (e.g. business ethics, marketing and
information systems), research community has yet to establish consistent theoretical
frameworks to guide empirical efforts on digital piracy (Eisend and Schuchert-Gueler,
2006; Williams et al., 2010). The two most prominent theoretical approaches to
studying illicit digital behavior have been the expectancy-value theories (e.g. the theory
of reasoned action), and the theories of ethical decision making (e.g. Hunt and Vitells
model of ethical decision making). Both of these are established on the fundamental
premise that individuals intentions are mostly consistent with the underlying
attitudes (Chatzidakis et al., 2007).
However, consumers attitudes do not always translate into purchase intentions and
consequently behavior. For example, even though unauthorized downloading of digital
products is treated as an illegal activity in most countries, many computer users,
particularly among the youth and in the university settings, exhibit lenience and
acceptance of such activities (Harris and Dumas, 2009; Hinduja, 2007; Kini et al., 2003).
An illustration is provided by a software piracy study among computer science
students, which found that while future information system professionals recognize the
consequences of such behavior for the industry and others, and even admit to its
immoral character, such cognizance does not discourage them from illicit computer
behaviors (Konstantakis et al., 2010). An explanatory framework for this discrepancy
can be found in the neutralization theory, which explains individuals attempts to
minimize the negative feelings related to their norm-violating behavior based upon their
self-concept and the perceptions by others (Grove and Vitell 1989; Shields and Whitehall,
1994). In their seminal work, Skyes and Matza (1957) developed five neutralization
techniques: denial of responsibility (its not my fault), denial of injury (no harm
resulted from my actions), denial of victim (nobody got hurt), condemning the
condemners (how dare they judge me when they are just as corrupt or hypocritical) and
appeal to higher loyalties (there is a greater cause).
Neutralization theorists suggest individuals may employ these techniques both
before committing fraud, in order to avoid the negative affect (i.e. feelings of guilt or
shame), or after committing fraud, in order to reduce or neutralize the negative affect.
This means that neutralization occurs as an after-the-fact rationalization that may
create conditions for future behavior (Harris and Dumas, 2009; Higgins et al., 2008).

Downloaded by IQRA UNIVERSITY At 22:29 22 June 2015 (PT)

Employing neutralization techniques helps individuals reassure themselves of the


appropriateness of their choices, and demonstrates their acceptability to others
(Hinduja, 2007). The rationalization ( justification or neutralization) theory has been
used when investigating digital piracy (Morris and Higgins, 2009), software piracy
(Hinduja, 2007; Phau and Ng, 2010), music piracy (Ingram and Hinduja, 2008) and
online misbehavior in general (Harris and Dumas, 2009).
Based on the overview of the digital piracy literature, a lack of studies exploring
determinants of neutralization has been recognized. Some authors suggest that
information and knowledge are the main influencing variables (DAstous and Legendre,
2009; Nicholls and Lee, 2006). With respect to information, the most significant impact
is the difference in perception of positive and negative message framing. More
specifically, a message conveying information about negative consequences plays a
different role in the decision making than a message about positive consequences
(Block and Keller, 1995; Chang, 2008). Along these lines, perceived risk can be regarded
as a consumers belief in negative consequences, while perceived benefits can be
described as a consumers belief in positive consequences (Yoon, 2011).
Our synthesis of counterfeiting and piracy literature provided the basis for
development of a conceptual model for the study (Figure 1). In the model, we explore the
role of perceived risk and perceived benefits in shaping two focal constructs:
rationalization of past behavior and future piracy intent. To shed more light on the
attitude-intention discrepancy (Chatzidakis et al., 2007; Phau et al., 2009), we also examine
the effect of rationalization on future piracy intent. The proposed conceptual model,
including the construct definitions and rationale for the hypotheses, is discussed next.

Consumer digital
piracy behavior

301

2.1 Determinants of rationalization


The first set of hypotheses focuses on the determinants of rationalization. In our study,
we define rationalization as a consumers technique to counter feelings of guilt
associated with the past engagement in digital piracy (Moore and McMullan, 2009).
Perceived risk refers to the probability that using illegally downloaded files would
result in technical problems with the computer. The concept of perceived risk has been
previously investigated in the piracy context, suggesting that it plays an important role
in curtailing the digital piracy phenomenon (Sinha and Mandel, 2008). We base our
prediction on the framing effect literature, which contends there are substantial
differences in how we process negatively and positively framed information.
Specifically, since negative framing evokes comparison to internal norms or
standards (Block and Keller, 1995), we expect that perceived risk as negatively
Perceived
risk

H3

H1

Rationalization

H5

Piracy
intention

H4
H2
Perceived
benefits

Figure 1.
Conceptual model

JRIM
6,4

Downloaded by IQRA UNIVERSITY At 22:29 22 June 2015 (PT)

302

framed information will reduce the extent to which an individual employs


rationalization techniques as a means to justify norm-violating behavior. Thus, the
more intensely an individual reviews his/her internal norms, the less likely s/he is to
justify his or her past behavior:
H1. The greater the perceived technical risk of digital piracy for consumers, the
lower the extent of their rationalization for the past digital piracy behavior.
Perceived benefits or the extent to which consumers believe that illegally downloading
files will result in certain positive consequences have been scarcely explored in the
piracy context (Hennig-Thurau et al., 2007; Yoon, 2011). As in H1, we formulate our
prediction of the impact of perceived benefits on rationalization based on the framing
effect theory. Contrary to perceived technical risk (H1), perceived benefits lead an
individual to review his/her internal norms and standards less intensely, thus increasing
the extent to which consumers use rationalization (Block and Keller, 1995). Therefore, we
expect that perceived benefits of illegally downloading files will result in an increased
use of rationalization techniques:
H2. The greater the perceived benefits of digital piracy for consumers, the greater
the extent of their rationalization for the past digital piracy behavior.
2.2 Determinants of future digital piracy intention
The second set of hypotheses focuses on the antecedents of future digital piracy
intention, defined as the likelihood that consumers will illegally download files from the
internet in the future. Existing studies offer contradictory findings with respect to the role
of perceived risks or adverse effects in shaping future piracy intention. For example, while
perceived risk of getting caught downloading illegally (i.e. legal risk) is a strong deterrent
for certain consumers, it can actually increase piracy tendencies for others (Sinha and
Mandel, 2008). On the other hand, Hennig-Thurau et al. (2007) provide empirical evidence
of the impact of perceived risk on consumers actual behavior. They conclude that
while search and moral risks provide hurdles for obtaining illegal copies, technical risks
directly reduce the probability of watching such copies. Since perception of adverse
effects as determinants of piracy intentions and behaviors has been operationalized in
various ways and produced conflicting results, the testing of the hypotheses stated below
provides an opportunity to resolve this controversy. We predict that:
H3. The greater the perceived technical risk of digital piracy for consumers, the
lower the consumers future piracy intent.
Another hypothesized driver of consumer intentions to pirate digital goods is perceived
benefits. The underlying rationale is that a consumer intends to engage in digital
piracy because of certain preferred outcomes, i.e. perceived benefits. This relationship
has been empirically supported in several studies. For example, Yoon (2011) shows
that perceived benefits have a positive impact on an individuals intention to commit
digital piracy. Similarly, Hennig-Thurau et al. (2007) demonstrate a significant causal
link between two specific benefits, illegal copies as collectibles and anti-industry
utility, and obtaining of illegal copies. Likewise, Lysonski and Durvasula (2008) find a
significant positive correlation between social benefits of dissemination and intention
to illegally download. To provide additional evidence of this relationship in a novel
setting, we hypothesize:

H4. The greater the perceived benefits of digital piracy for consumers, the greater
the consumers future piracy intent.

Downloaded by IQRA UNIVERSITY At 22:29 22 June 2015 (PT)

Future piracy intent is also shaped by consumers use of neutralization techniques.


Neutralization techniques as an after-the fact rationalization may create conditions for
future piracy behavior (Higgins et al., 2008). This link has been previously tested by
several researchers. Ingram and Hinduja (2008) find that greater acceptance of the
neutralization techniques significantly predicts moderate to high levels of piracy
participation. Likewise, Morris and Higgins (2009) show that neutralization was a
significant determinant of the expected counts of various forms of digital piracy. This
relationship was strongest for music and video, and less so for software piracy. Thus, the
more the consumer rationalizes his downloading files illegally from the internet in the
past, the more likely s/he will continue to pirate digital content. In this case, rationalization
for the past digital piracy behavior serves as neutralization for future behavior:
H5. The greater the consumers rationalization for their past digital piracy
behavior, the greater the consumers future piracy intent.
3. Methodology
In order to test the conceptual model for the study, a self-administered survey was
conducted in EU. To ensure a broad representation of different parts of the EU, five
countries representing various geographic regions of the EU were included in data
collection: Austria, Italy, Slovenia, Sweden and UK. We used mixed method sampling and
data collection techniques using both probability (mail survey) and purposive sampling
strategies (online survey). For our mail survey, a sample representative of general adult
population in terms of age and gender was drawn in each country. The mailing lists were
obtained from local research institutions. In case of online survey, we recruited
participants by posting the link to the survey on various web pages. We also sent the link
to our acquaintances via e-mail and asked them to recruit future subjects from among
their acquaintances. The decision to use mixed methods was guided mostly by the
motivation to increase generalizability and increase inference quality (Kemper et al., 2003).
The overall response rates for the mail survey ranged between 10 percent to just over
13 percent across countries. A raffle with various prizes was offered as an incentive. The
data set used in this study was part of a large research project investigating EU consumer
attitudes and behaviors regarding both counterfeiting and piracy. Hence, the original data
set was first reduced by including merely respondents having reported to use computers,
and have actually engaged in digital piracy in the past, which yield a sample of
6,666 respondents from five countries. Second, such large sample size is deemed too large
considering the use of covariance analysis in testing our hypotheses. Therefore, we
reduced the overall sample for use in the analysis by randomly selecting respondents
within the countries. In total, the final sample comprised of 1,213 respondents, including
215 from Austria, 244 from Italy, 250 from each Slovenia and Sweden, and 254 from the
UK. Slightly over 77 percent of the total sample used in this study was derived from the
mail survey and almost 23 percent from the online survey.
Overall, our sample consisted of more male than female respondents (52.9 percent
males). Across countries, the proportion of males ranged from 43.4 percent in Slovenia to
57.9 percent in Italy (UK 53.6 percent, Austria 53.7 percent, Sweden 56 percent).
The average age of respondents in the sample was 36.4 years (standard deviation of 14.3),

Consumer digital
piracy behavior

303

JRIM
6,4

Downloaded by IQRA UNIVERSITY At 22:29 22 June 2015 (PT)

304

with the lowest mean in the Slovene subsample (32.5 years), and the highest mean in the
Italian subsample (39.6 years) (Austria 33.8, UK 37.7, Sweden 38.2). The majority of the
respondents attained at least university education (43.6 percent), similar but slightly
lower proportion completed college (41.7 percent), and less than 15 percent completed
primary or vocational school. Country-wise, the highest proportion of respondents with
this education was in Italy (23.2 percent of the Italian subsample) and the lowest in
Austria (3.7 percent) (Sweden 16.6, UK 21.2, Slovenia 8.0). The proportion of
college-educated respondents ranged from 57.4 percent in Slovenia, 51.5 percent in Italy,
38.9 percent in Sweden, 38 percent in the UK, to 20 percent in Austria. The Austrian
subsample consisted of the highest share of people with university degree or more
(76.3 percent), followed by the Swedish (44.5 percent), the UK (40.8 percent), the Slovene
(34.5 percent), and the Italian subsample (25.3 percent).
All construct measures were either directly taken or adapted from existing literature.
The perceived technical risk associated with digital piracy or the potential technical
damage to the consumers computer was measured with six items, adapted from
Hennig-Thurau et al. (2007). The perceived benefits of digital piracy behavior were
measured with five statements, tapping into various specific benefits, such as collection
and technical benefits (Hennig-Thurau et al., 2007). Five statements, adapted from Skyes
and Matzas five neutralization techniques (1957), measured the consumers
rationalization of their past piracy behavior. To measure the future digital piracy
intention, two items from Taylor and Todd (1995) research were used. All measures,
individual statements used, standardized factor loadings from the confirmatory factor
analysis, and construct reliabilities are reported in Table I.
Measures used in this study were carefully adapted to the different linguistic and
cultural contexts with the additional testing of reliability. As per guidelines for conducting
cross-national consumer research (Craig and Douglas, 2000; de Jong et al., 2009),
the process of developing the survey instrument and modifying the scale items included:
.
elimination of items with limited conceptual equivalence;
.
ensuring the translation is decentered from a literal language translation; and
.
careful pretesting of the research instrument on a convenience sample of relevant
individuals in each country, along with the subsequent modification of
individual items in our measures.
4. Analysis and findings
Even though our goal was not focused on comparing different countries within the EU,
we assessed invariance of measures across the countries included in our sample. First,
we evaluated configural invariance of measures to see whether the same pattern of
zero and non-zero factor loadings exists in different countries (Horn et al., 1983). Using
confirmatory factor analysis, all salient factor loadings were substantially and
significantly different from zero and the factor inter-correlations were significantly
below unity in all five counties. Thus, the measures achieved the configural invariance.
Next, we assessed metric invariance or the requirement of equal metrics or scales
(Rock et al., 1978). Metric invariance allows a meaningful comparison of ratings or
difference scores across countries, with these differences indicative of similar
cross-national difference in the underlying construct (Steenkamp and Baumgartner,
1998). To test for metric invariance, we constrained all factor loadings to be the same

Downloaded by IQRA UNIVERSITY At 22:29 22 June 2015 (PT)

Constructs and construct items


Perceived risk (adapted from Hennig-Thurau et al.
(2007))
Illegally downloading files is risky because
They might not work properly
You might have your internet access terminated
They might infect your computer with a virus or
malware
It could allow access to your data, files or passwords
They might enable your identity to be stolen
They might damage your computer
Perceived benefits (adapted from Hennig-Thurau et al.
(2007))
Illegally downloading files offers a real bargain
Illegally downloaded files work as well as the legal
ones
Illegally downloading files increases my ability to
collect music/films/games
Illegally downloading files allows me to have files
that I would not be able to afford
Illegal downloading helps me get music/films/games
faster compared to legal channels
Rationalization (Skyes and Matza, 1957)
I couldnt help myself; I had to illegally download the
files
Its no big deal as no one was hurt
Its the industrys own fault they were taken
advantage of
I was only doing what others do all the time
I wouldnt have bought the legal ones anyway
Piracy intention (Taylor and Todd, 1995)
I intend to illegally download files from the internet
in the future
If the need or opportunity arises within the next
month, I would illegally download files

Reliabilities
(Cronbach a)

Stand. factor loadings

Consumer digital
piracy behavior

0.89
0.57
0.60

305

0.76
0.91
0.89
0.82
0.82
0.71
0.61
0.77
0.71
0.69
0.76
0.56
0.73
0.61
0.64
0.58
0.88
0.89
0.90

across the five countries. The full metric invariance model fit the data as well as the
configural model and achieved even a slight decrease in the value of x 2 per degree of
freedom. Therefore, the measures exhibited cross-national metric invariance. Next,
we proceeded with evaluation of the pooled sample.
To assess the adequacy of measures in the pooled sample, confirmatory factor
analysis in AMOS was conducted. As the x 2-statistic is sample size dependent, other fit
indices better serve as indicators of the model fit (Bagozzi and Yi, 1988). The fit of the
confirmatory factor model with the data was good (x 2 790 df 129; NFI 0.93;
IFI 0.94; CFI 0.94; RMSEA 0.065). All construct reliabilities exceeded the
recommended 0.70 (Table I). Discriminant validity was checked by constraining the
covariance in any set of two constructs (Anderson and Gerbing, 1988) and then
performing a x 2 difference test on the values obtained for the constrained and
unconstrained models. Since the unconstrained models had significantly lower x 2 values,

Table I.
Constructs, construct
items, reliabilities and
standardized factor
loadings

JRIM
6,4

Downloaded by IQRA UNIVERSITY At 22:29 22 June 2015 (PT)

306

it can be concluded that the measures exhibit acceptable discriminant validity. Next, the
conceptual model was tested using structural equation modeling in AMOS. Structural
model provided a good fit with the data (x 2(df) 790 (129); NFI 0.93; IFI 0.94;
CFI 0.94; RMSEA 0.065). Individual hypotheses test statistics and results are
displayed in Table II and are discussed next. Because the hypotheses were directional,
one-sided hypotheses tests were employed.
H1 predicted that the perceived technical risk of digital piracy will be negatively
associated with the consumers rationalization of their past piracy behavior. The
findings do not provide support for this hypothesis, as the standardized regression
coefficient of the proposed structural path was not significantly different from zero
(b 0.05, t 1.58, p 0.11). H1 is thus rejected. H2 proposed that the perceived
benefits of digital piracy will be positively related with the consumers rationalization of
piracy behavior. According to the analysis, as perceptions of benefits of piracy increased,
so did the rationalization for the behavior (b 0.778, t 14.88, p 0.000), providing
support for H2. In addition to predicting an indirect effect of perceived technical risk and
perceived benefits through rationalization, we anticipated that both the perceived
technical risk and the perceived benefits will also directly influence consumers future
piracy intent (H3 and H4). The findings show that, as the perceived technical risk
increased, the consumers intent to digitally pirate decreased (b 2 0.13, t 2 5.14,
p 0.000), supporting H3. In addition, as the perceived benefits increased, so did the
intent to digitally pirate in the future (b 0.41, t 7.71, p 0.000), supporting H4.
Lastly, we predicted that the extent of consumers rationalization for their past piracy
will be positively associated with their future piracy intent. Indeed, as the extent of
rationalization increased, so did the respondents future piracy intent (b 0.38, t 6.92,
p 0.000). Thus, H5 is also supported. Based on the squared correlations in the final
model, approximately 59 percent of variance in rationalization can be explained by
perceived benefits and perceived technical risk, and 61 percent of variance in piracy
intention by perceived benefits, perceived technical risk, and rationalization.
5. Discussion of findings
In developing and empirically evaluating our conceptual model, we first investigated
determinants of consumers use of rationalization for past piracy behavior
Hypothesis:
direction
H1.: 2
H2.:
H3.: 2
H4.:
H5.:

Table II.
Testing the
conceptual model

Std. regr.
coefficient

Structural path
Perceived
risk ! rationalization
Perceived
benefits ! rationalization
Perceived risk ! piracy
intention
Perceived
benefits ! piracy intention
Rationalization ! piracy
intention

Notes: x 2 (df) 790


n (sample size) 1,213

(129);

NFI 0.93;

t-statistics

p-value

Hypothesis
outcome

0.05

1.58

0.11

Rejected

0.78

14.88

0.000

Supported

20.13

2 5.14

0.000

Supported

0.41

7.71

0.000

Supported

0.38

6.92

0.000

Supported

IFI 0.94;

CFI 0.94;

RMSEA 0.065;

Downloaded by IQRA UNIVERSITY At 22:29 22 June 2015 (PT)

(i.e. perceived technical risk and perceived benefits), and second, the antecedents of
consumers future piracy intent (i.e. perceived technical risk, perceived benefits and
rationalization of past piracy behavior). All proposed hypotheses were supported with
an exception of the effect of perceived technical risk of digital piracy on consumers
rationalization of their past piracy behavior (H1). We anticipated a negative
association between the two constructs, but the effect was not significant. Similarly,
although in a somewhat different context of ethical consumption, Sander (2010) failed
to provide empirical evidence for a significant impact of negatively framed information
(such as perceived risk) on the use of neutralization techniques, and used sensitivity of
the topic as a possible explanation. This reasoning may also be applicable to our study.
In addition, given the focus of the perceived risk measure on technical damage
associated with digital piracy, another plausible explanation is that other types of
risks, such as those tapping into the ethics or morality (e.g. prosecution risk), may more
prominently shape the use of rationalization techniques. Research on attitudes and
behaviors finds similar gaps and suggests that the specificity of measures might
interfere with the predictability of behavior. In addition, perceived technical risk and
rationalization of past behavior may not be cognitively related. Perceived technical
problems might be salient when actually performing the behavior, while rationalizing
ones past behavior focuses on the positive effects and the risk is not relevant anymore.
This points towards a distinction between performing a behavior (e.g. using a service,
such as downloading files), where certain risks occur, and evaluating ones own
behavior retrospectively, where the benefits of the behavior are more salient.
This explanation seems likely, particularly in the light of support found for H2.
With respect to expected positive consequences of digital piracy, we find that
perceived benefits have a significant and relatively large effect on the consumers
rationalization for their piracy behavior (H2). Although we do not explicitly address
the mechanisms of this impact, we suggest that the more benefits consumers expect
from illegally downloading files, the less they adhere to their norms. Instead, in order to
reap those benefits, consumers resort to rationalization techniques, thus providing
excuses for their behavior.
All three hypotheses regarding the antecedents of an individuals intention to engage
in future digital piracy (H3, H4, and H5) were empirically supported. Specifically,
perceived technical risk, perceived benefits and rationalization proved to be significant
predictors of consumers intention to illegally download files in the future. Although
previous results with respect to the relationship between risk and intention are
somewhat equivocal (Sinha and Mandel, 2008), our research findings are unambiguous,
indicating an inverse relationship between perceived technical risk and consumers
intention to engage in digital piracy (H3). This is consistent with several other empirical
studies (Hennig-Thurau et al., 2007; Lysonski and Durvasula, 2008; Yoon, 2011).
The results of our study further support the positive effect of perceived benefits on
digital piracy intention (H4). This corresponds to Hunt and Vitells (1986) contention
that an individual veers toward a certain type of behavior directly because of certain
preferred consequences. The third significant predictor of consumers intention to
illegally download files identified in this study is consumers use of rationalization for
past piracy behavior (H5), corroborating existing research findings (Ingram and
Hinduja, 2008; Morris and Higgins, 2009). This finding can be also explained by the
effect of past behavior on future behavior intentions. The more positive one perceives

Consumer digital
piracy behavior

307

JRIM
6,4

Downloaded by IQRA UNIVERSITY At 22:29 22 June 2015 (PT)

308

his/her own behavior to be (through rationalizing it and thus making it more positive),
the more confident the person might be to perform the same behavior in the future.
An interesting finding, although not the primary objective of this study, is the
relative importance of the three determinants of future piracy intention. Our results
suggest that the strongest driver of ones piracy intent is his/her perception of benefits,
closely followed by the use of rationalization techniques. Perception of technical risk is
the weakest predictor of behavioral piracy intention. It appears that the negative
factors (risks) and positive drivers (benefits) have a different role in affecting future
behavior. Perceived benefits seem to strengthen the piracy intent, while the risks might
reduce the magnitude of the behavior, but not fully eliminate the intention to actually
perform the behavior.
These empirical findings add to the limited body of knowledge pertaining to
neutralization and rationalization techniques previously rather neglected in
customer-focused studies (Harris and Dumas, 2009). Although the study was
cross-sectional and the measures of intention were gathered concurrently with
rationalization, the study provides evidence that rationalization occurs after piracy
behavior takes place, which potentially enhances continuity in future behavior.
6. Implications, limitations and future research
The present research offers useful implications for marketing communications and
public policy strategies as well as for academic research. Digital piracy importantly
affects various stakeholders, including recorded music, movie and software
industries, distributors and consumers. So far, the efforts to curtail this practice
included mostly promoting public awareness through consumer education and
protecting intellectual property rights through legal threats and actions against
individuals and operators of networks facilitating digital piracy activities. However,
such deterrent strategies tend to be ineffective (Bhattacharjee et al., 2006; Sinha and
Mandel, 2008).
Instead, emphasizing preventive strategies is more strongly encouraged (Gopal et al.,
2004; Sinha and Mandel, 2008). Our findings provide a roadmap to guide marketers
and policy makers in meeting the challenge of digital piracy by focusing attention on
three areas to directly impinge on individuals piracy intent: perceptions of specific
benefits from downloading, consumers perceptions of technical risk, and justifications
for their past actions. In more practical terms, this means first, perceived benefits
should be lessened. Second, perceived technical risks should be emphasized and, third,
the acceptance and the impact of rationalization arguments need to be weakened so
that they do not serve as a way out anymore. Hence, marketing communications
centering on public awareness of personal consequences of digital piracy should be
effective in deterring future piracy intention. Such strategies could include using the
social context of consumers rather than communication by institutions, governments
or firms for communicating risks rather than benefits of piracy. For instance, in online
forum discussions, the perception of technical risks could be attenuated instead of
overemphasizing the benefits of piracy. Marketers role in this context could be to turn
attention to consumers benefits of legally obtaining products rather than using pirated
alternatives in their communication and product policy. Social media and discussion
forums could be used to understand the influence of the social environment on
consumers perception of risk and benefit, which helps in framing marketing messages.

Downloaded by IQRA UNIVERSITY At 22:29 22 June 2015 (PT)

In the general public, the image of piracy as heroic acts needs to be transferred into
a perception of piracy as less acceptable behavior (e.g. by stressing the loss for
independent artists rather than stressing losses for big corporations). Our findings
reveal that perceived benefits have the strongest impact on both rationalization and
piracy intent. If illegal downloading provides fewer benefits than legal downloading,
then perceptions of risks might prevail, consequently reducing rationalization and
future piracy intent. For instance, these could include beliefs that legal options are
equally inexpensive and meet consumers needs at a convenient time, or that illegal
sources are difficult to find and do not offer a full range of options.
Rationalization can be seen as a cognitive mechanism which prevails if internal
standards and norms are less strongly reviewed by individuals. In other words, to
overcome the obligation to behave according to (learned) norms and standards,
individuals use commonly accepted arguments that are, for instance, brought forward
in informal communication among peers and are used in the mass media as well
(piracy is a peccadillo). Rationalization seems to be an effective way of achieving
distance to internal standards and could help in establishing a certain state of balance
between internal norms and standards and ones behavior even if or because the
behavior violates existing norms. As long as rationalization arguments are personally
and socially accepted, individuals will use them for norm-violating behavior. A way to
reduce their effectiveness is to make arguments more difficult to accept, i.e. providing
counterarguments to rationalization arguments, or more difficult to build new ones.
For public policy makers, the results of this study can facilitate an understanding that
how individuals review their past behavior impacts their future intent. This could
mean that the review process (rationalization) could be controlled by educational and
consumer protection-related efforts. In other words, challenging the publicly accepted
arguments of piracy as peccadillo through projects in which key actors present
multiple views and consequences of piracy could be a way to counter the issue.
Based on the knowledge of how consumers use rationalization/neutralization
techniques to justify digital piracy, marketing communications and persuasion
activities can be designed to counter the arguments that consumers use. Nonetheless,
designing these activities requires some caution, as it is also possible that instead of
adapting their behavior by reducing and/or eliminating piracy behaviors consumers
might invent new neutralizing beliefs (Minor, 1981).
In summary, this study provides three target constructs, i.e. benefits, risk, and
rationalization, on which to focus in the development of preventive-based appeals of
persuasion (e.g. intentions, attitudes). From an academic perspective, our findings reveal
the importance of perceived benefit as antecedent for rationalization strategies and
subsequently its impact on future piracy intent. It shows also that perceived technical
risk is less influential on cognitive processes, but has a negative influence on future
piracy intent. This extends previous research on predictors for piracy intent and behavior
in that perceived gains rather than losses drive rationalization of past piracy behavior.
The findings and contributions of this study are constrained by certain limitations of
our empirical effort, in turn suggesting potentially fruitful avenues for future research.
First, our measure of perceived adverse consequences was limited to technical aspect
of risk. Examining a wider scope of risk dimensions, such as prosecution risk or other
types of psychological risks (Chiou et al., 2005; Liao et al., 2010) may offer a more
comprehensive insight into this concept. Second, the cross-sectional design of the study

Consumer digital
piracy behavior

309

JRIM
6,4

Downloaded by IQRA UNIVERSITY At 22:29 22 June 2015 (PT)

310

creates some limitations. Although rarely applied in the piracy research (Williams et al.,
2010), a longitudinal methodology could provide a stronger inference, particularly with
respect to the sequencing of rationalization. What is more, experimental designs could
help determining the causality of rationalization and perceived benefit and risk. This
topic has been recognized as an under-researched area needing further investigation
(Harris and Dumas, 2009). Third, while precautions have been taken in the sampling and
data collection process across five countries to ensure reliable data, the use of constructs
of potentially sensitive nature (i.e. aberrant behavior) in self-reported surveys may
have been impacted by socially desirable responding (Steenkamp et al., 2010). This
limitation is more likely present in a non-student population. Students and other
younger consumers, who have grown up with easy access to free content on the internet,
have a more liberal view of sharing content and may fail to recognize piracy as a
transgression of social norms (Sinha and Mandel, 2008).
References
Aleassa, H., Pearson, J.M. and McClurg, S. (2011), Investigating software piracy in Jordan: an
extension of the theory of reasoned action, Journal of Business Ethics, Vol. 98 No. 4,
pp. 663-76.
Anderson, J.C. and Gerbing, D. (1988), Structural equation modeling in practice: a review and
recommended two-step approach, Psychological Bulletin, Vol. 103 No. 3, pp. 411-23.
BASCAP (2011), Estimating the Global Economic and Social Impacts of Counterfeiting and
Piracy, Business Action to Stop Counterfeiting and Piracy, Paris, available at:
www.iccwbo.org/uploadedFiles/BASCAP/Pages/Global%20Impacts%20-%20Final.pdf
(accessed 3 October).
Bagozzi, R.P. and Yi, Y. (1988), On the evaluation of structural equation models, Journal of the
Academy of Marketing Science, Vol. 16 No. 1, pp. 74-94.
Bhattacharjee, S., Gopal, R., Lertwachara, K. and Marsden, J.R. (2006), Whatever happened to
payola? An empirical analysis of online music sharing, Decision Support Systems, Vol. 42
No. 1, pp. 104-20.
Block, L.G. and Keller, P.A. (1995), When to accentuate the negative: the effects of perceived
efficacy and message framing on intentions to perform a health-related behavior, Journal
of Marketing Research, Vol. 32 No. 2, pp. 192-203.
Chang, C. (2008), Ad framing effects for consumption products: an affect priming process,
Psychology & Marketing, Vol. 25 No. 1, pp. 24-46.
Chatzidakis, A., Hibbert, S. and Smith, A.P. (2007), Why people dont take their concerns about
fair trade to the supermarket: the role of neutralization, Journal of Business Ethics, Vol. 74
No. 1, pp. 89-100.
Chiou, J.-S., Huang, C. and Lee, H. (2005), The antecedents of music piracy attitudes and
intentions, Journal of Business Ethics, Vol. 57 No. 2, pp. 161-74.
Craig, C.S. and Douglas, S.P. (2000), International Marketing Research, Wiley, New York, NY.
Dacin, T. and Murphy, P.R. (2011), Psychological pathways to fraud: understanding
and preventing fraud in organizations, Journal of Business Research, Vol. 101 No. 4,
pp. 601-18.
DAstous, A. and Legendre, A. (2009), Understanding consumers ethical justifications: a scale
for appraising consumers reasons for not behaving ethically, Journal of Business Ethics,
Vol. 87 No. 2, pp. 255-68.

Downloaded by IQRA UNIVERSITY At 22:29 22 June 2015 (PT)

de Jong, M.G., Steenkamp, J.-B.E.M. and Veldkamp, B.P. (2009), A model for the construction of
country-specific, yet internationally comparable short-form marketing scales, Marketing
Science, Vol. 28 No. 4, pp. 674-89.
Eisend, M. and Schuchert-Gueler, P. (2006), Explaining counterfeit purchases a review and
preview, Academy of Marketing Science Review, Vol. 6 No. 12, pp. 1-25.
Goles, T., Jayatilaka, B., George, B., Parsons, L., Chambers, V., Taylor, D. and Brune, R. (2008),
Softlifting: exploring determinants of attitude, Journal of Business Ethics, Vol. 77 No. 4,
pp. 481-99.
Gopal, R.D., Sanders, G.L., Bhattacharjee, S., Agrawal, M. and Wagner, S.C. (2004), A behavioral
model of digital music piracy, Journal of Organizational Computing and Electronic
Commerce, Vol. 14 No. 2, pp. 89-105.
Grove, S.J. and Vitell, S.J. (1989), Non-normative consumer behavior and the techniques of
neutralization, in Bagozzi, R. and Peter, J. (Eds), Proceedings of the 1989 AMA Winter
Educators Conference, American Marketing Association, Chicago, IL, pp. 131-5.
Harris, L.C. and Dumas, A. (2009), Online consumer misbehaviour: an application of
neutralization theory, Marketing Theory, Vol. 9 No. 4, pp. 379-402.
Hennig-Thurau, T., Henning, V. and Sattler, H. (2007), Consumer file sharing of motion
pictures, Journal of Marketing, Vol. 71 No. 4, pp. 1-18.
Higgins, G.E., Wolfe, S.E. and Marcum, C.D. (2008), Music piracy and neutralization:
a preliminary trajectory analysis from short-term longitudinal data, International Journal
of Cyber Criminology, Vol. 2 No. 2, pp. 324-36.
Hinduja, S. (2007), Neutralization theory and online software piracy: an empirical analysis,
Ethics and Information Technology, Vol. 9 No. 3, pp. 187-204.
Horn, J.L., McArdle, J.J. and Mason, R. (1983), When is invariance not invariant: a practical
scientists look at the ethereal concept of factor invariance, The Southern Psychologist,
Vol. 1 No. 4, pp. 179-88.
Hunt, S.D. and Vitell, S. (1986), A general theory of marketing ethics, Journal of
Macromarketing, Vol. 6 No. 1, pp. 5-16.
Ingram, J. and Hinduja, S. (2008), Neutralizing music piracy: an empirical examination,
Deviant Behavior, Vol. 29 No. 4, pp. 334-66.
Kemper, E., Stringfield, S. and Teddlie, C. (2003), Mixed methods sampling strategies in social
science research, in Tashakkori, A. and Teddlie, C. (Eds), Handbook of Mixed Methods in
Social & Behavioral Research, Sage, Thousand Oaks, CA, pp. 273-96.
Kini, R.B., Ramakrishna, H.V. and Vijayaraman, B.S. (2003), Shaping of moral intensity
regarding software piracy: a comparison between Thailand and US students, Journal of
Business Ethics, Vol. 49 No. 1, pp. 91-104.
Konstantakis, N.I., Palaigeorgiou, G.E., Siozos, P.D. and Tsoukalas, I.A. (2010), What do
computer science students think about software piracy?, Behavior & Information
Technology, Vol. 29 No. 3, pp. 277-85.
Liao, C., Lin, H.-N. and Liu, Y.-P. (2010), Predicting the use of pirated software: a contingency
model integrating perceived risk with the theory of planned behavior, Journal of Business
Ethics, Vol. 91 No. 2, pp. 237-52.
Lysonski, S. and Durvasula, S. (2008), Digital piracy of MP3s: consumer and ethical
predispositions, Journal of Consumer Marketing, Vol. 25 No. 3, pp. 167-78.
McGregor, S.L.T. (2008), Conceptualizing immoral and unethical consumption using
neutralization theory, Family and Consumer Sciences Research Journal, Vol. 36 No. 3,
pp. 261-76.

Consumer digital
piracy behavior

311

JRIM
6,4

Downloaded by IQRA UNIVERSITY At 22:29 22 June 2015 (PT)

312

Mattelart, T. (2009), Audio-visual piracy: towards a study of the underground networks of


cultural globalization, Global Media and Communication, Vol. 5 No. 3, pp. 308-26.
Minor, W.W. (1981), Techniques of neutralization: a reconceptualization an empirical
examination, Journal of Research in Crime and Delinquency, Vol. 18, pp. 295-318.
Moore, R. and McMullan, E. (2009), Neutralization and rationalization of digital piracy:
a qualitative analysis of university students, International Journal of Cyber Criminology,
Vol. 3 No. 1, pp. 441-51.
Morris, R.G. and Higgins, G.E. (2009), Neutralizing potential and self-reported digital piracy:
a multitheoretical exploration among college undergraduates, Criminal Justice Review,
Vol. 34 No. 2, pp. 173-95.
Nicholls, A. and Lee, N. (2006), Purchase decision-making in fair trade and the ethical purchase
gap: is there a fair trade twix?, Journal of Strategic Marketing, Vol. 14 No. 4, pp. 369-86.
Phau, I. and Ng, J. (2010), Predictors of usage intentions of pirated software, Journal of Business
Ethics, Vol. 94 No. 1, pp. 23-37.
Phau, I., Sequeira, M. and Dix, S. (2009), Consumers willingness to knowingly purchase
counterfeit products, Direct Marketing: An International Journal, Vol. 3 No. 4, pp. 262-81.
Rock, D.A., Werts, C.E. and Flaughter, R.E. (1978), The use of analysis in covariance structures
for comparing psychometric properties of multiple variables across populations,
Multivariate Behavioral Research, Vol. 13 No. 4, pp. 403-18.
Sander, A. (2010), An empirical study on decision-making, neutralization theory and
information framing in the context of ethical consumption, Master thesis, Maastricht
University, Maastricht.
Shields, I.W. and Whitehall, G.C. (1994), Neutralization and delinquency among teenagers,
Criminal Justice and Behavior, Vol. 21 No. 2, pp. 223-35.
Sinha, R.K. and Mandel, N. (2008), Preventing digital music piracy: the carrot or the stick?,
Journal of Marketing, Vol. 72 No. 1, pp. 1-15.
Sinha, R.K., Machado, F.S. and Sellman, C. (2010), Dont think twice, its all right: music piracy
and pricing in a DRM-free environment, Journal of Marketing, Vol. 74, pp. 40-54.
Sirkeci, I. and Magnusdottir, L.B. (2011), Understanding illegal music downloading in the UK:
a multi-attribute model, Journal of Research in Interactive Marketing, Vol. 5 No. 1,
pp. 90-110.
Skyes, G. and Matza, D. (1957), Techniques of neutralization: a theory of delinquency,
American Sociological Review, Vol. 22 No. 6, pp. 664-70.
Steenkamp, J.-B.E.M. and Baumgartner, H. (1998), Assessing measurement invariance in
cross-national consumer research, Journal of Consumer Research, Vol. 15 No. 1, pp. 78-90.
Steenkamp, J.-B.E.M., de Jong, M.G. and Baumgartner, H. (2010), Socially desirable response
tendencies in survey research, Journal of Marketing Research, Vol. 47, April, pp. 199-214.
Taylor, S. and Todd, P. (1995), Assessing IT usage: the role of prior experience, MIS Quarterly,
Vol. 19 No. 4, pp. 561-70.
Williams, P., Nicholas, D. and Rowlands, I. (2010), The attitudes and behaviours of illegal
downloaders, Aslib Proceedings: New Information Perspectives, Vol. 62 No. 3, pp. 283-301.
Yoon, C. (2011), Theory of planned behavior and ethics theory in digital piracy: an integrated
model, Journal of Business Ethics, Vol. 100 Nos 3/4, pp. 405-17.
Zamoon, S. and Curley, S. (2008), Ripped from the headlines: what can the popular press teach
us about software piracy?, Journal of Business Ethics, Vol. 83 No. 3, pp. 515-33.

Downloaded by IQRA UNIVERSITY At 22:29 22 June 2015 (PT)

Further reading
Ang, S.H., Cheng, P.S., Lim, A.A.C. and Tambyah, S.K. (2001), Spot the difference: consumer
responses towards counterfeits, Journal of Consumer Marketing, Vol. 18 No. 3, pp. 219-35.
Coyle, J.R., Gould, S.J., Gupta, P. and Gupta, R. (2009), To buy or to pirate: the matrix of music
consumers acquisition-mode decision-making, Journal of Business Research, Vol. 62
No. 10, pp. 1031-7.
Dacin, T. and Murphy, P.R. (2009), Understanding and preventing unethical conduct in
organizations: a situation- and affect-based fraud framework, available at: http://ssrn.
com/abstract1492765
DAstous, A., Colbert, F. and Montpetit, D. (2005), Music piracy on the web how effective are
anti-piracy arguments? Evidence from the theory of planned behaviour, Journal of
Consumer Policy, Vol. 28 No. 3, pp. 289-310.
Glass, S. and Wood, A. (1996), Situational determinants of software piracy: an equity theory
perspective, Journal of Business Ethics, Vol. 15 No. 11, pp. 1189-98.
Simpson, P.M., Banerjee, D. and Simpson, C.L. (1994), Softlifting: a model of motivating factors,
Journal of Business Ethics, Vol. 13 No. 6, pp. 431-8.
Staake, T., Thiese, F. and Fleish, E. (2009), The emergence of counterfeit trade: a literature
review, European Journal of Marketing, Vol. 43 Nos 3/4, pp. 320-49.
About the authors
Irena Vida is a Professor of Marketing at Faculty of Economics at the University of Ljubljana.
Her research focus is on application of consumer behaviour theories and models in cross-cultural
settings and on strategic issues in international marketing. She published articles in various
journals such as Journal of Business Research, European Journal of Marketing, Journal of
International Marketing, International Marketing Review and International Business Review.
Irena Vida is the corresponding author and can be contacted at: irena.vida@ef.uni-lj.si
Mateja Kos Koklic is an Assistant Professor of Marketing at the Faculty of Economics,
University of Ljubljana in Slovenia. Her research focuses on topics such as consumer behaviour
and consumer decision making, especially with respect to counterfeiting and piracy, as well as
perceived risk in different purchasing situations. She has published her findings in journals, such
as International Journal of Consumer Studies and Managing Global Transitions.
Monika Kukar-Kinney is Associate Professor of Marketing in the Robins School of Business,
University of Richmond, Richmond, Virginia and a Visiting Professor at the University of
Ljubljana, Faculty of Economics, Slovenia. Her research focuses on compulsive buying,
behavioral pricing, retailing and electronic commerce. Her work has appeared in journals such as
the Journal of the Academy of Marketing Science, Journal of Consumer Research, Journal of
Retailing, and Journal of Business Research, among others.
Elfriede Penz is Associate Professor at the Institute for International Marketing Management
at the Wirtschaftsuniversitat Wien in Austria. Her research includes consumer behaviour, both
in online and offline contexts, the interplay between consumers and organisations (power)
as well as methodological issues in international marketing and management. She has published
in refereed international journals: Psychology & Marketing, Journal of Economic Psychology,
Management International Review and International Marketing Review.

To purchase reprints of this article please e-mail: reprints@emeraldinsight.com


Or visit our web site for further details: www.emeraldinsight.com/reprints

Consumer digital
piracy behavior

313

This article has been cited by:

Downloaded by IQRA UNIVERSITY At 22:29 22 June 2015 (PT)

1. Godwin Udo, Kallol Bagchi, Moutusy Maity. 2014. Exploring Factors Affecting Digital Piracy Using
the Norm Activation and UTAUT Models: The Role of National Culture. Journal of Business Ethics .
[CrossRef]
2. Mateja Kos Koklic, Monika Kukar-Kinney, Irena Vida. 2014. Three-Level Mechanism of Consumer
Digital Piracy: Development and Cross-Cultural Validation. Journal of Business Ethics . [CrossRef]

You might also like