An Empirical Study: Influencing Factors of Normative Susceptibility, Collectivism, Novelty, Value Consciousness on Consumer’s Attitude towards Pirated Software in Bangkok, Thailand
Keywords:
Normative susceptibility, Collectivism, Novelty seeking, Value consciousness, Attitude towards pirated softwareAbstract
Abstract
This study aimed to find a relationship between normative susceptibility, collectivism, novelty seeking, value consciousness, and consumers’ attitude towards pirated software. The researcher collected the data from customers who has experienced to purchase pirated software from two locations in Bangkok metropolis. The final data were 369 respondents. Non-probability was used to find sampling unit by using quota and convenience sampling. All hypotheses were tested using Structural Equation Model (SEM). The adequate quality of model was measure by measurement model in order to use discriminant validity, convergence validity, and goodness-of-fit. The results of this study, the researcher found that normative susceptibility and collectivism were significant relationship with consumers’ attitude towards pirated software. The results of novelty seeking and value consciousness were not statistical significant relationship with consumers’ attitude towards pirated software.
References
References
Albers-Miller, N. (1999). Consumer misbehavior: why people buy illicit good. Journal of
Consumer Marketing, 16(3), 273-287
Allport, G. (1935). Attitudes, in C. Murchison: Handbook of Social Psychology, Clark
University Press, Worcester MA), 798–844.
Anderson, J.C. and Gerbing, D.W. (1988). Structural Equation Modeling in Practice: A
Review and Recommendation Two-Step Approach. Psychological Bulletin, 103(3),
-423.
Ang, S.H., Cheng, P.S., Lim, E.A.C. and Tambyah, S.K. (2001). Spot the difference: consumer
responses towards counterfeits. Journal of Consumer Marketing, 18(3), 219-35
Arbuckle (2012). Structural Equation Modeling Using AMOS: An Introduction.
https://stat.utexas.edu/images/SSC/Site/AMOS_Tutorial.pdf
Arli, D. and Leo, C. (2017). Why do good people do bad things? The effect of ethical ideology,
guilt proneness, and self-control on consumer ethics. Asia Pacific Journal of Marketing and Logistics, 29(5), 1055-1078
Awang, Z. (2012). Introduction to Structural Equation Modeling. https://www.researchgate.net/
Bacon, L.D. (1997), SPSS White Paper: Using Amos for Structural Equation Modeling in Marketing Research, Marketing Department, SPSS Inc.
Bloch, P.H., Bush, R.F. and Campbell, L. (1993). Consumer ‘accomplices’ in product
counterfeiting: a demand-side investigation. Journal of Consumer Marketing, 10(4),
-36
Bommer, M. and Gratto, C. (1987). ÔA Behavioral Model of Ethical and Unethical Decision
MakingÕ. Journal of Business Ethics, 6(4), 265–280.
Burnkrant, R.E. and Cousineau, A. (1975). Informative and Normative Social Influence in
Buyer Behavior. Journal of Consumer Research, 2(December), 202-215.
Burton, S., Lichtenstein, D.R., Netemeyer, R.G. and Garretson, J.A. (1998). A Scale for
Measuring Attitude toward Private Label Products and An Examination of Its
Psychological and Behavioral Correlates. Journal of the Academy of Marketing
Science, 26(4), 293-306.
Byrne, B. M. (1998). Structural Equation Modeling with LISREL, PRELIS and SIMPLIS: Basic Concepts, Applications and Programming. Mahwah, New Jersey: Lawrence Erlbaum Associates
Chaipoopirutana, S. (2018). Mixed Methods Research and Structural Equation Model:
Measurement and Structural Model. Assumption University of Thailand
Chang, M.K. (1998). Predicting Unethical Behavior: A Comparison of the Theory of
Reasoned Action of the Theory of Planned Behavior. Journal of Business Ethics,
(4), 1825-33.
Cheng, H.K., Sims, R.R. and Teegen, H. (1997). To Purchase or to Pirated Software: An
Empirical Study. Journal of Management Information Systems, 13(4),
-60.
Cordell, V. V., Wongtada, N. and Kieschnick, R. (1996). Counterfeit purchase
intentions: Role of lawfulness attitudes and product traits as determinants. Journal of Business Research, 35(1), 41-53
Dillon, W., and Goldstein, M. (1984). Multivariate analysis: Methods and applications. New York:Wiley.
Eisend, M., and Schuchert-Guler, P. (2006). Explaining counterfeit purchases: A review and preview. Academy of Marketing Science Review, 12, 1-22.
Fornell, C. and Larcker, F.D. (1981). Evaluating Structural Equation Models with Unobservable Variables and Measurement Error. Journal of Marketing Research, 18(1), 39-50.
Garretson, J.A., Fisher, D. and Burton, S. (2002). Antecedents of Private Label Attitude and
National Brand Promotion Attitude: Similarities and Differences. Journal of
Retailing, 78, 91-99.
Garson, D. G. (2009) Structural Equation Modeling,
http://faculty.chass.ncsu.edu/garson/PA765/structur.htm
Goff, M. (2016). Thoughts on the May 2016 BSA Global Software Survey. www.revulytics.com
Gopal, R. and Sanders, G. (1997). Preventive and Deterrent Controls for Software Piracy.
Journal of Management Information Systems, 13, 29-47
Grossman, M.G. and Shapiro (2988). Foreign Counterfeiting of Status Goods. The Quartery Journal of Economics, 103(1), 79-100
Hair, J.F., Jr., Anderson, R. E., Tatham, R. L., and Black, W. C. (1998). Multivariate data analysis. Englewood Cliffs, NJ: Prentice-Hall.
Hair, J. F., Black, W. C., Barry J. B., Anderson, R. E. and Tatham, R .L. (2006). Multivariate
Data Analysis, 6th ed., Upper Saddle River: Pearson Prentice hall
Hair, J.F., Black, W.C., Babin, B.J., and Anderson, R.E. (2010). Multivariate Data Analysis. Seventh Edition. Prentice Hall, Upper Saddle River, New Jersey.
Hawkins, D.I., Coney, K.A. and Best, R.J. (1980). Consumer Behavior: Implications for
Marketing Strategy. Business Publications, Dallas, TX.
Hofstede, G. (2001). Culture’s Consequences, 2nd Edition, Sage, Thousand Oaks, CA.
Hu, L.T, and Bentler, P. M. (1999). Cutoff criteria for fit indexes in covariance structure analysis: onventional criteria versus new alternatives. Structural Equation Modeling, 6, 1-55.
Hui, C.H., Triandis, H.C. and Yee, C. (1991) Cultural differences in reward allocation: is collectivism the explanation?. British Journal of Social Psychology, 30(2), 145-157.
Husted, B.W. (2000). The impact of national culture on software piracy. Journal of Business
Ethics, 26(3), 197-211
Kreie, J. and Cronan, T.P. (1999). Copyright, Piracy, Privacy, and Security Issues:
Acceptable Or Unacceptable Actions For End Users? Journal of End User
Computing, 11(2), 13-20
Lee, C. and Green, R.T. (1991). Cross-Cultural Examination of the Fishbein Behavioral
Intention Model. Journal of International Business Studies, 2nd Quarter, 289-
Lichtenstin, D.R., Netemeyer, R.G. and Burton, S. (1990). Distinguishing coupon proneness
from value consciousness: an acquisition-transaction utility theory perspective. Journal
of Marketing, 54 (July), 54-67
Mahalanobis, P.C. (1936). On the generalised distance in statistics, Proceedings of the National Institute of Sciences of India, 2, 49-55.
Marron, D.B. and Steel, D.G. (2000). Which countries protect intellectual property? The case
of software piracy. Economic Inquiry, 38 (2), 159-74
Marsh, H.W. and Hocevar, D. (1985). Application of confirmatory factor analysis to the
study of self-concept: First- and higher-order factor models and their invariance
across groups. Psychological Bulletin, 97, 562–582.
McAlister, L. and Pessemier, E. (1982). Variety Seeking Behavior: An Interdisciplinary
Review. Journal of Consumer Research, 9(December), 311-322.
McDonald, G. and Roberts. C. (1994), Product piracy: the problems that will not go away.
The Journal of Product and Brand Management, 3 (4), 55-65.
Nunnally, J.C. (1978). Psychometric Theory, 2nd edition, McGraw-Hill, New York.
Nunnally, J.C. and Bernstein, I.H. (1994). Psychometric Theory, 3rd edition, McGraw-Hill,
New York.
Pavlou, P.A. (2003). Consumer Acceptance of Electronic Commerce: Integrating Trust and
Risk with the Technology Acceptance Model, International Journal of Electronic Commerce, 7(3), 101-134.
Penz, E. and Stottinger, B. (2005). Forget the ‘Real’ Thing – Take the Copy! An
Explanatory Model for the Volitional Purchase of Counterfeit Products. Advances in
Consumer Research, 32, 568-575.
Pickard, J. (2007). Research Methods in Information, Facet Publishing, London, England.
Prior, B. (2018). Microsoft test shows most new PCs in Asia have pirated software. The Economic
Times, (5 November, 2018) https://mybroadband.co.za/news/software/283383
Schumacker, R. and Lomax, R. (1996). A Beginner’s Guide to Structural Equation Modeling,
Lawrence Erlbaum.
Schumacker, R. E. and Lomax, G.R. (2004), A Beginner’s Guide to Structural Equation
Modeling, 2nd ed., Mahwah, NJ: Lawrence Erlbaum Associates.
Segars, A. and Grover, V. (1993). Re-Examining Perceived Ease of Use and Usefulness: A
Confirmatory Factor Analysis, MIS Quarterly, 17(December), 517-525.
Shafique, N.M., Ahmad, N., Abbass, S. and Khurshid, M.M. (2015). Consumer Willingness
toward Counterfeit Products in Pakistan: An Exploratory Study. Journal of Marketing
and Consumer Research, 9
Shepherd, G. and O’Keefe, D. (1984). ÔSeparability of Attitudinal and Normative Influences
on Behavioral Intentions in the Fishbein–Ajzen ModelÕ, The Journal of Social Psychology 122, 287–288.
Shin, S.K. Gopal, R.D., Sanders, G.L. and Whinston, A.B. (2004). Global Software Piracy
Revisited. Communication of the ACM, 47(1), 103-107.
Shimp, T. A. and Kavas, A. (1984). ÔThe Theory of Reasoned Action Applied to Coupon
UsageÕ. Journal of Consumer Research, 11(December), 795.
Steiger, J.H., and Lind, J.C. (1980). Statistically based tests for the number of common factors. Paper presented at the annual meeting of the Psychometric Society, Iowa City, IA.
Swinyard, W.R., Rinne, H. and Kau, A.K. (1990). The morality of software piracy: a cross-
cultural analysis. Journal of Business Ethics, 9(8), 655-64
Tom, G., Garibaldi, B., Zeng, Y. and Pilcher, J. (1998). Consumer Demand for Counterfeit
Goods. Psychology and Marketing, 15(5), 405-421
Ullman, J. B. (2001). Structural Equation Modeling. In Tabachnick, B.G., & Fidell, L.S. (2001).
Using Multivariate Statistics, 4th ed., 653-771.
Vallerand, R.J., Deshaies, P., Cuerrier, J., Pelletier, L.G. and Mongeau, C. (1992). Ajzen
and Fishbein’s Theory of Reasoned Action as Applied to Moral Behavior. Journal of
Personality and Social Psychology, 62, 98-109.
Wang, F., Zhang, H., Zang, H. and Ouyang, M. (2005). Purchasing pirated software: an initial
examination of Chinese consumers. Journal of Consumer Marketing, 22(6), 340-351
Wee, C.-H., Tan, S.-J. and Cheok, K.-H. (1995). Non-price determinants of intention to
purchase counterfeit goods. International Marketing Review, 12(6), 19-46
Wheaton, B., and Muthen, B. (1977), Sociological Methodology,San Francisco: Jossey-Bass
Yoou, C. (20011). Theory of planned behavior and ethics theory in digital piracy: an integrated model.
Journal of Business Ethics, 100(3), 405-417