An Empirical Study: Influencing Factors of Normative Susceptibility, Collectivism, Novelty, Value Consciousness on Consumer’s Attitude towards Pirated Software in Bangkok, Thailand

Sirion Chaipoopirutana

Abstract


Abstract

This study aimed to find a relationship between normative susceptibility, collectivism,  novelty seeking, value consciousness, and consumers’ attitude towards pirated software. The researcher collected the data from customers who has experienced to purchase pirated software from two locations in Bangkok metropolis. The final data were 369 respondents. Non-probability was used to find sampling unit by using quota and convenience sampling. All hypotheses were tested using Structural Equation Model (SEM). The adequate quality of model was measure by measurement model in order to use discriminant validity, convergence validity, and goodness-of-fit. The results of this study, the researcher found that normative susceptibility and collectivism were significant relationship with consumers’ attitude towards pirated software.  The results of novelty seeking and value consciousness were not statistical significant relationship with consumers’ attitude towards pirated software.


Keywords


Normative susceptibility, Collectivism, Novelty seeking, Value consciousness, Attitude towards pirated software

Full Text:

PDF

References


References

Albers-Miller, N. (1999). Consumer misbehavior: why people buy illicit good. Journal of

Consumer Marketing, 16(3), 273-287

Allport, G. (1935). Attitudes, in C. Murchison: Handbook of Social Psychology, Clark

University Press, Worcester MA), 798–844.

Anderson, J.C. and Gerbing, D.W. (1988). Structural Equation Modeling in Practice: A

Review and Recommendation Two-Step Approach. Psychological Bulletin, 103(3),

-423.

Ang, S.H., Cheng, P.S., Lim, E.A.C. and Tambyah, S.K. (2001). Spot the difference: consumer

responses towards counterfeits. Journal of Consumer Marketing, 18(3), 219-35

Arbuckle (2012). Structural Equation Modeling Using AMOS: An Introduction.

https://stat.utexas.edu/images/SSC/Site/AMOS_Tutorial.pdf

Arli, D. and Leo, C. (2017). Why do good people do bad things? The effect of ethical ideology,

guilt proneness, and self-control on consumer ethics. Asia Pacific Journal of Marketing and Logistics, 29(5), 1055-1078

Awang, Z. (2012). Introduction to Structural Equation Modeling. https://www.researchgate.net/

Bacon, L.D. (1997), SPSS White Paper: Using Amos for Structural Equation Modeling in Marketing Research, Marketing Department, SPSS Inc.

Bloch, P.H., Bush, R.F. and Campbell, L. (1993). Consumer ‘accomplices’ in product

counterfeiting: a demand-side investigation. Journal of Consumer Marketing, 10(4),

-36

Bommer, M. and Gratto, C. (1987). ÔA Behavioral Model of Ethical and Unethical Decision

MakingÕ. Journal of Business Ethics, 6(4), 265–280.

Burnkrant, R.E. and Cousineau, A. (1975). Informative and Normative Social Influence in

Buyer Behavior. Journal of Consumer Research, 2(December), 202-215.

Burton, S., Lichtenstein, D.R., Netemeyer, R.G. and Garretson, J.A. (1998). A Scale for

Measuring Attitude toward Private Label Products and An Examination of Its

Psychological and Behavioral Correlates. Journal of the Academy of Marketing

Science, 26(4), 293-306.

Byrne, B. M. (1998). Structural Equation Modeling with LISREL, PRELIS and SIMPLIS: Basic Concepts, Applications and Programming. Mahwah, New Jersey: Lawrence Erlbaum Associates

Chaipoopirutana, S. (2018). Mixed Methods Research and Structural Equation Model:

Measurement and Structural Model. Assumption University of Thailand

Chang, M.K. (1998). Predicting Unethical Behavior: A Comparison of the Theory of

Reasoned Action of the Theory of Planned Behavior. Journal of Business Ethics,

(4), 1825-33.

Cheng, H.K., Sims, R.R. and Teegen, H. (1997). To Purchase or to Pirated Software: An

Empirical Study. Journal of Management Information Systems, 13(4),

-60.

Cordell, V. V., Wongtada, N. and Kieschnick, R. (1996). Counterfeit purchase

intentions: Role of lawfulness attitudes and product traits as determinants. Journal of Business Research, 35(1), 41-53

Dillon, W., and Goldstein, M. (1984). Multivariate analysis: Methods and applications. New York:Wiley.

Eisend, M., and Schuchert-Guler, P. (2006). Explaining counterfeit purchases: A review and preview. Academy of Marketing Science Review, 12, 1-22.

Fornell, C. and Larcker, F.D. (1981). Evaluating Structural Equation Models with Unobservable Variables and Measurement Error. Journal of Marketing Research, 18(1), 39-50.

Garretson, J.A., Fisher, D. and Burton, S. (2002). Antecedents of Private Label Attitude and

National Brand Promotion Attitude: Similarities and Differences. Journal of

Retailing, 78, 91-99.

Garson, D. G. (2009) Structural Equation Modeling,

http://faculty.chass.ncsu.edu/garson/PA765/structur.htm

Goff, M. (2016). Thoughts on the May 2016 BSA Global Software Survey. www.revulytics.com

Gopal, R. and Sanders, G. (1997). Preventive and Deterrent Controls for Software Piracy.

Journal of Management Information Systems, 13, 29-47

Grossman, M.G. and Shapiro (2988). Foreign Counterfeiting of Status Goods. The Quartery Journal of Economics, 103(1), 79-100

Hair, J.F., Jr., Anderson, R. E., Tatham, R. L., and Black, W. C. (1998). Multivariate data analysis. Englewood Cliffs, NJ: Prentice-Hall.

Hair, J. F., Black, W. C., Barry J. B., Anderson, R. E. and Tatham, R .L. (2006). Multivariate

Data Analysis, 6th ed., Upper Saddle River: Pearson Prentice hall

Hair, J.F., Black, W.C., Babin, B.J., and Anderson, R.E. (2010). Multivariate Data Analysis. Seventh Edition. Prentice Hall, Upper Saddle River, New Jersey.

Hawkins, D.I., Coney, K.A. and Best, R.J. (1980). Consumer Behavior: Implications for

Marketing Strategy. Business Publications, Dallas, TX.

Hofstede, G. (2001). Culture’s Consequences, 2nd Edition, Sage, Thousand Oaks, CA.

Hu, L.T, and Bentler, P. M. (1999). Cutoff criteria for fit indexes in covariance structure analysis: onventional criteria versus new alternatives. Structural Equation Modeling, 6, 1-55.

Hui, C.H., Triandis, H.C. and Yee, C. (1991) Cultural differences in reward allocation: is collectivism the explanation?. British Journal of Social Psychology, 30(2), 145-157.

Husted, B.W. (2000). The impact of national culture on software piracy. Journal of Business

Ethics, 26(3), 197-211

Kreie, J. and Cronan, T.P. (1999). Copyright, Piracy, Privacy, and Security Issues:

Acceptable Or Unacceptable Actions For End Users? Journal of End User

Computing, 11(2), 13-20

Lee, C. and Green, R.T. (1991). Cross-Cultural Examination of the Fishbein Behavioral

Intention Model. Journal of International Business Studies, 2nd Quarter, 289-

Lichtenstin, D.R., Netemeyer, R.G. and Burton, S. (1990). Distinguishing coupon proneness

from value consciousness: an acquisition-transaction utility theory perspective. Journal

of Marketing, 54 (July), 54-67

Mahalanobis, P.C. (1936). On the generalised distance in statistics, Proceedings of the National Institute of Sciences of India, 2, 49-55.

Marron, D.B. and Steel, D.G. (2000). Which countries protect intellectual property? The case

of software piracy. Economic Inquiry, 38 (2), 159-74

Marsh, H.W. and Hocevar, D. (1985). Application of confirmatory factor analysis to the

study of self-concept: First- and higher-order factor models and their invariance

across groups. Psychological Bulletin, 97, 562–582.

McAlister, L. and Pessemier, E. (1982). Variety Seeking Behavior: An Interdisciplinary

Review. Journal of Consumer Research, 9(December), 311-322.

McDonald, G. and Roberts. C. (1994), Product piracy: the problems that will not go away.

The Journal of Product and Brand Management, 3 (4), 55-65.

Nunnally, J.C. (1978). Psychometric Theory, 2nd edition, McGraw-Hill, New York.

Nunnally, J.C. and Bernstein, I.H. (1994). Psychometric Theory, 3rd edition, McGraw-Hill,

New York.

Pavlou, P.A. (2003). Consumer Acceptance of Electronic Commerce: Integrating Trust and

Risk with the Technology Acceptance Model, International Journal of Electronic Commerce, 7(3), 101-134.

Penz, E. and Stottinger, B. (2005). Forget the ‘Real’ Thing – Take the Copy! An

Explanatory Model for the Volitional Purchase of Counterfeit Products. Advances in

Consumer Research, 32, 568-575.

Pickard, J. (2007). Research Methods in Information, Facet Publishing, London, England.

Prior, B. (2018). Microsoft test shows most new PCs in Asia have pirated software. The Economic

Times, (5 November, 2018) https://mybroadband.co.za/news/software/283383

Schumacker, R. and Lomax, R. (1996). A Beginner’s Guide to Structural Equation Modeling,

Lawrence Erlbaum.

Schumacker, R. E. and Lomax, G.R. (2004), A Beginner’s Guide to Structural Equation

Modeling, 2nd ed., Mahwah, NJ: Lawrence Erlbaum Associates.

Segars, A. and Grover, V. (1993). Re-Examining Perceived Ease of Use and Usefulness: A

Confirmatory Factor Analysis, MIS Quarterly, 17(December), 517-525.

Shafique, N.M., Ahmad, N., Abbass, S. and Khurshid, M.M. (2015). Consumer Willingness

toward Counterfeit Products in Pakistan: An Exploratory Study. Journal of Marketing

and Consumer Research, 9

Shepherd, G. and O’Keefe, D. (1984). ÔSeparability of Attitudinal and Normative Influences

on Behavioral Intentions in the Fishbein–Ajzen ModelÕ, The Journal of Social Psychology 122, 287–288.

Shin, S.K. Gopal, R.D., Sanders, G.L. and Whinston, A.B. (2004). Global Software Piracy

Revisited. Communication of the ACM, 47(1), 103-107.

Shimp, T. A. and Kavas, A. (1984). ÔThe Theory of Reasoned Action Applied to Coupon

UsageÕ. Journal of Consumer Research, 11(December), 795.

Steiger, J.H., and Lind, J.C. (1980). Statistically based tests for the number of common factors. Paper presented at the annual meeting of the Psychometric Society, Iowa City, IA.

Swinyard, W.R., Rinne, H. and Kau, A.K. (1990). The morality of software piracy: a cross-

cultural analysis. Journal of Business Ethics, 9(8), 655-64

Tom, G., Garibaldi, B., Zeng, Y. and Pilcher, J. (1998). Consumer Demand for Counterfeit

Goods. Psychology and Marketing, 15(5), 405-421

Ullman, J. B. (2001). Structural Equation Modeling. In Tabachnick, B.G., & Fidell, L.S. (2001).

Using Multivariate Statistics, 4th ed., 653-771.

Vallerand, R.J., Deshaies, P., Cuerrier, J., Pelletier, L.G. and Mongeau, C. (1992). Ajzen

and Fishbein’s Theory of Reasoned Action as Applied to Moral Behavior. Journal of

Personality and Social Psychology, 62, 98-109.

Wang, F., Zhang, H., Zang, H. and Ouyang, M. (2005). Purchasing pirated software: an initial

examination of Chinese consumers. Journal of Consumer Marketing, 22(6), 340-351

Wee, C.-H., Tan, S.-J. and Cheok, K.-H. (1995). Non-price determinants of intention to

purchase counterfeit goods. International Marketing Review, 12(6), 19-46

Wheaton, B., and Muthen, B. (1977), Sociological Methodology,San Francisco: Jossey-Bass

Yoou, C. (20011). Theory of planned behavior and ethics theory in digital piracy: an integrated model.

Journal of Business Ethics, 100(3), 405-417


Refbacks

  • There are currently no refbacks.