题名

預測盜版軟體的使用:知覺風險、軟體成本、道德義務與計劃行為理論之整合模式

并列篇名

Predicting the Use of Pirated Software: Integrating Perceived Risk, Software Cost, and Moral Obligation with the Theory of Planned Behavior

DOI

10.6188/JEB.2011.13(1).04

作者

林鴻南(Hong-Nan Lin);廖則竣(Che-Chen Liao)

关键词

軟體盜版 ; 知覺風險 ; 軟體成本 ; 道德義務 ; 計劃行為理論 ; Software Piracy ; Perceived Risk ; Software Cost ; Moral Obligation ; Theory of Planned Behavior

期刊名称

電子商務學報

卷期/出版年月

13卷1期(2011 / 03 / 01)

页次

55 - 76

内容语文

繁體中文

中文摘要

當軟體盜版持續對國家及全球經濟的成長造成嚴重威脅之際,瞭解人們的盜版軟體使用行為並據以擬定出有效的策略以遏阻盜版軟體的使用已成為當務之急。本研究企圖將知覺風險、軟體成本與道德義務這三項因素與計劃行為理論整合,以發展一有效之理論模式來解釋與預測盜版軟體的使用行為。本研究採用網路問卷調查方法,蒐集到314份有效問卷,並以結構方程模式進行分析。研究結果發現知覺風險、軟體成本與道德義務皆是影響盜版軟體使用決策的重要因素。本研究並指出理論面與管理面可能的意涵與未來研究方向的建議。

英文摘要

While software piracy continues to be a big threat to the growth of national and global economies, understanding why people intend to use pirated software and how to deter the use of pirated software have become urgent and important issues. The proposed model integrates perceived risk, software cost, and moral obligation with the theory of planned behavior (TPB) to jointly predict individual attitude and intention toward using pirated software. Data were collected through an online survey of 314 participants. A structural equation modeling was employed to test hypotheses. The results showed that perceived risk, software cost, and moral obligation could have impacts on the decisions to use pirated software. Theoretical and managerial implications are discussed.

主题分类 人文學 > 人文學綜合
基礎與應用科學 > 資訊科學
基礎與應用科學 > 統計
社會科學 > 社會科學綜合
参考文献
  1. 商業軟體聯盟 (2008), "2007 年台灣軟體盜版率降至40%,Retrieved Aug. 2008, from http://w3.bsa.org/taiwan/press/newsreleases/globalstudypr.cfm
  2. 資策會FIND(2008), "2007年12月底止台灣上網人口" , Retrieved Aug. 2008, from http://www.find.org.tw/find/home.aspx?page=many&id=193
  3. Ajzen, T.(1991).The theory of planned behavior.Organizational Behavior and Human Decision Processes,50(2),179-211.
  4. Akaah, I. P.,Lund, D.(1994).The influence of personal and organizational values on marketing professions' ethical behavior.Journal of business ethics,13(6),417-430.
  5. Al-Rafee, S.,Cronan, T. P.(2006).Digital piracy: factors that influence attitude toward behavior.Journal of Business Ethics,63(3),237-259.
  6. Anderson, J. C.,Gerbing, D. W.(1988).Structural equation modeling in practice: a review and recommended two-step approach.Psychological Bulletin,103(3),411-423.
  7. Bauer, R. A.(1960).Consumer behavior as risk taking.Proceedings of the 43rd National Conference of the American Marketing Association
  8. Beck, L.,Ajzen, I.(1991).Predicting dishonest actions using the theory of planned behavior.Journal of Research in Personality,25,285-301.
  9. Campbell, M. C.,Goodstein, R. C.(2001).The moderating effect of perceived risk on consumers' evaluations of product incongruity: preference for the norm.Journal of Consumer Research,28(3),439-449.
  10. Chang, M. K.(1998).Predicting unethical behavior: a comparison of the theory of reasoned action and the theory of planned behavior.Journal of Business Ethics,17(16),1825-1834.
  11. Chen, Y.-C.,Shang, R.-A.,Lin, A.-K.(2008).The intention to download music files in a P2P environment: consumption value, fashion, and ethical decision perspectives.Electronic Commerce Research and Applications,7(4),411-422.
  12. Cheng, H. K.,Sims, R. R.,Teegen, H.(1997).To purchase or to pirate software: an empirical study.Journal of Management Information Systems,13(4),49-60.
  13. Chiou, J.-S.,Huang, C.-y.,Lee, H.-h.(2005).The antecedents of music piracy attitudes and intentions.Journal of Business Ethics,57(2),161-174.
  14. Cox, D. F.(ed.)(1967).Risk Taking and Information Handling in Consumer Behavior.Boston:Harvard University Press.
  15. Cronan, T. P.,Al-Rafee, S.(2008).Factors that influence the intention to pirate software and media.Journal of Business Ethics,78(4),527-545.
  16. Featherman, M. S.,Pavlou, P. A.(2003).Predicting c-services adoption: a perceived risk facets perspective.International Journal of Human-Computer Studies,59(4),451-474.
  17. Fishbein, M.,Ajzen, I.(1975).Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research.Reading, MA:Addison-Wesley.
  18. Fornell, C.,Larcker, D. F.(1981).Evaluating structural equation models with unobservable variables and measurement error.Journal of Marketing Research,18(1),39-50.
  19. Gefen, D.,Straub, D. W.,Boudreau, M.(2000).Structural equation modeling and regression: guidelines for research practice.Communications of the Association for Information Systems,4(7),1-70.
  20. Gopal, R. D.,Sanders, G. L.(1998).International software piracy: analysis of key issues and impacts.Information Systems Research,9(4),380-397.
  21. Gopal, R. D.,Sanders, G. L.(2000).Global software piracy: you can't get blood out of a turnip.Communications of the ACM,43(9),83-89.
  22. Gorsuch, R. L.,Ortberg, J.(1983).Moral obligation and attitudes: their relation to behavioral intentions.Journal of Personality and Social Psychology,44(5),1025-1028.
  23. Hair, J. F.,Anderson, R. E.,Tatham, R. L.,Black, W. C.(1998).Multivariate Data Analysis.Upper Saddle River, NJ:Prentice-Hall.
  24. Husted, B. W.(2000).The impact of national culture on software piracy.Journal of Business Ethics,26(3),197-211.
  25. Im, I.,Kim, Y.,Han, H.-J.(2008).The effects of perceived risk and technology type on users' acceptance of technologies.Information & Management,45(1),1-9.
  26. Jacoby, J.,Kaplan, L. B.(1972).The components of perceived risk.Proceedings of the 3rd Annual Conference, Association for Consumer Research,Chicago:
  27. Kuhl, J.(ed.),Beckman, J.(ed.)(1985).Action Control: From Cognition to Behavior.Heidelberg:Springer.
  28. Kwong, T. C. H.,Lee, M. K. O.(2002).Behavioral intention model for the exchange mode internet music piracy.Proceedings of the 35th Hawaii International Conference on System Sciences
  29. Lin, T.-C.,Hsu, M. H.,Kuo, F.-Y.,Sun, P.-C.(1999).An intention model-based study of software piracy.Proceedings of the 32nd Hawaii International Conference on System Sciences
  30. Mitchell, V.-W.(1999).Consumer perceived risk: conceptualisations and models.European Journal of Marketing,33(1/2),163-195.
  31. Mitchell, V.-W.(1992).Understanding consumers' behaviour: can perceived risk theory help?.Management Decision,30(3),26-31.
  32. Moores, T. T.,Dhaliwal, J.(2004).A reversed context analysis of software piracy issues in Singapore.Information & Management,41(8),1037-1042.
  33. Pavlou, P. A.(2003).Consumer acceptance of electronic commerce: integrating trust and risk with the technology acceptance model.International Journal of Electronic Commerce,7(3),101-134.
  34. Peace, A. G.,Galletta, D. F.,Thong, J. Y. L.(2003).Software piracy in the workplace: a model and empirical test.Journal of Management Information Systems,20(1),153-177.
  35. Raats, M. M.,Shepherd, R.,Sparks, P.(1995).Including moral dimensions of choice within the structure of the theory of planned behavior.Journal of Applied Social Psychology,25(6),484-494.
  36. Rest, J.(1986).Center for the Study of Ethical Development.Minneapolis, MN:University of Minnesota.
  37. Schoemaker, P. J.(1982).The expected utility model: its variants, purposes, evidence and limitations.Journal of Economic Literature,20(2),529-563.
  38. Schwartz, S. H.,Tessler, R. C.(1972).A test of a model for reducing measured attitude-behavior discrepancies.Journal of Personality and Social Psychology,24,225-236.
  39. Shaw, D.,Shiu, E.(2002).The role of ethical obligation and self-identity in ethical consumer choice.International Journal of Consumer Studies,26(2),109-116.
  40. Shaw, D.,Shiu, E.,Clarke, I.(2000).The contribution of ethical obligation and self-identity to the theory of planned behaviour: an exploration of ethical consumers.Journal of Marketing Management,16(8),879-894.
  41. Sheppard, B. H.,Hartwick, J.,Warshaw, P. R.(1988).The theory of reasoned action: a meta-analysis of past research with recommendations for modifications and future research.Journal of Consumer Research,15(3),325-343.
  42. Sitkin, S. B.,Weingart, L. R.(1995).Determinants of risky decision-making behavior: a test of the mediating role of risk perceptions and propensity.The Academy of Management Journal,38(6),1573-1592.
  43. Solomon, S. L.,O''Brien, J. A.(1990).The effect of demographic factors on attitudes toward software piracy.Journal of Computer Information Systems,30(3),40-46.
  44. Sparks, P.,Shepherd, R.,Frewer, L. J.(1995).Assessing and structuring attitudes toward the use of gene technology in food production: the role of perceived ethical obligation.Basic and Applied Social Psychology,16(3),267-285.
  45. Stone, R. N.,Gronhaug, K.(1993).Perceived risk: further considerations for the marketing discipline.European Journal of Marketing,27(3),39-50.
  46. Swinyard, W. R.,Rinne, H.,Kau, A. K.(1990).The morality of software piracy: a cross-cultural analysis.Journal of Business Ethics,9(8),655-664.
  47. Tan, B.(2002).Understanding consumer ethical decision making with respect to purchase of pirated software.The Journal of Consumer Marketing,19(2/3),96-111.
  48. Taylor, S.,Todd, P. A.(1995).Understanding information technology usage: a test of competing models.Information Systems Research,6(2),144-176.
  49. Venkatesh, V.,Morris, M. G.,Davis, G. B.,Davis, F. D.(2003).User acceptance of information technology: toward a unified view.MIS Quarterly,27(3),425-478.
被引用次数
  1. 蕭至惠、蔡進發、陳乃妤(2017)。發生食安負面報導餐廳真能毫髮無傷?檢視負面報導嚴重程度、公司信譽、知覺風險與再購意願之關係。觀光休閒學報,23(2),211-238。
  2. 顏信輝、張瑀珊、吳美奇(2016)。盈餘管理之行為意圖:代理情境、道德發展與計畫行為理論之解釋。臺大管理論叢,26(2),107-138。
  3. 楊心寧,陳應惠,杜佩蘭,呂曉媛(2019)。知覺風險對理財行為的影響-金門出生者與非金門出生者。運動休閒餐旅研究,14(2),15-41。
  4. (2014)。影響大學生侵犯軟體著作權行為因素模式建立之研究。教育學刊,42,267-308。