$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

디지털 콘텐츠 불법복제 행동에 대한 통합적 분석: 태도, 개인규범, 습관을 중심으로
Integrative Analysis on Digital Piracy: Focused on Attitude, Personal Norm, and Habit 원문보기

한국전자거래학회지 = The Journal of Society for e-Business Studies, v.23 no.3, 2018년, pp.85 - 109  

최병구 (College of Business Administration, Kookmin University)

초록
AI-Helper 아이콘AI-Helper

정보통신 기술의 급격한 발전으로 인해 사람들은 디지털 콘텐츠불법복제를 보다 쉽고 빠르게 할 수 있게 되었다. 이에 따라 왜 사람들이 불법복제 행위를 하는가에 대한 많은 연구가 이루어져 왔다. 그러나 아직까지 불법복제 행위에 대한 체계적이고 통합적인 연구는 거의 이루어지지 않고 있다. 본 연구는 계획된 행위이론, 규범활성화 모형, 습관 등을 통합함으로써 기존 연구의 한계를 극복하고자 하였다. 이러한 목적을 달성하기 위해 태도, 개인규범, 습관 등이 불법복제 행위의도에 미치는 영향을 설명하는 9개의 가설을 수립하고 337명으로부터 수집한 자료를 통해 이를 검증하였다. 분석한 결과 태도, 지각된 행위통제, 개인규범, 습관은 불법복제 행위의도에 유의한 영향을 미치는 것으로 나타났다. 반면 주관적 규범은 행위의도에 직접적인 영향을 미치는 것이 아니라 개인규범을 통해 행위의도에 간접적인 영향을 미치지 않는 것으로 나타났다. 나아가 습관은 태도에도 유의한 영향을 미치는 것으로 나타났다. 본 연구는 태도, 개인규범, 습관은 불법복제 행위의도 간의 관계를 파악함으로써 기존 연구의 확장에 기여하였다는 점에서 그 의의가 있다.

Abstract AI-Helper 아이콘AI-Helper

The rapid development of information and communication technology has made it for people to pirate digital contents easily and quickly. Although many studies have investigated the underlying factors that lead to an individual engaging in digital piracy, few studies have provided holistic and integra...

주제어

표/그림 (8)

질의응답

핵심어 질문 논문에서 추출한 답변
디지털 콘텐츠 불법복제란 무엇인가? 디지털 콘텐츠 불법복제란 “저작권 소유자의 명시적 허가 및 보상 없이 백업 이외의 어떤 이유에서든지 디지털 제품, 소프트웨어, 디지털 문서, 디지털 오디오(음악 및 음성 포함), 디지털 비디오를 복사하는 불법행위([67], p.438)”를 의미한다.
불법복제와 관련된 연구를 진행한 다양한 이론에는 어떤것들이 있는가? 지금까지 다양한 이론을 기반으로 디지털 콘텐츠 불법복제와 관련된 많은 연구가 진행되어 왔다. 예를 들면, 기존 연구는 인간상호간 행위이론(theory of interpersonal behavior)[42, 49], 사회인지이론(social cognitive theory)[44, 50], 윤리적 의사결정 이론(ethical decisionmaking theory)[29, 69], 억제이론(deterrence theory)[58, 74], 중화이론(neutralization theory)[52, 62], 사회학습이론(social learning theory)[33], 공평이론(equity theory)[24], 합리적 행위이론(theory of reasoned action)[40], 기술수용 모형(technology acceptance model)[11] 등을 활용하여 디지털 콘텐츠 불법복제 행위를 설명하고자 하였다.
디지털 콘텐츠 불법복제 관련 기존 연구들이 가장 많이 활용한 이론은 무엇인가? 디지털 콘텐츠 불법복제 행동을 이해하기 위해 기존 연구들이 가장 많이 활용한 이론은 계획된 행위이론(theory of planned behavior)이다[73]. Lowry et al.
질의응답 정보가 도움이 되었나요?

참고문헌 (74)

  1. Ajzen, I., "The Theory of Planned Behavior," Organizational Behavior and Human Decision Processes, Vol. 50, No. 2, pp. 179-211, 1991. 

  2. Akbulut, Y., "Exploration of the Antecedents of Digital Piracy through a Structural Equation Model," Computers & Education, Vol. 78, No. 1, pp. 294-305, 2014. 

  3. Al-Rafee, S. and Cronan, T. P., "Digital Piracy: Factors That Influence Attitude toward Behavior," Journal of Business Ethics, Vol. 63, No. 3, pp. 237-259, 2006. 

  4. Al-Rafee, S. and Dashti, A. E., "A Cross Cultural Comparison of the Extended TPB: The Case of Digital Piracy," Journal of Global Information Technology Management, Vol. 15, No. 1, pp. 5-24, 2012. 

  5. An, Y., "The Amount of Illegal Copying Loss Was 2.5 Trillion Won," ETNEWS, 2018, http://www.etnews.com/20171016000410. 

  6. Armitage, C. J. and Conner, M., "Efficacy of the Theory of Planned Behavior: A Meta-Analytic Review," British Journal of Social Psychology, Vol. 40, No. 4, pp. 471-499, 2001. 

  7. Bamberg, S. and Schmidt, P., "Changing Travel-Mode as Rational Choice," Rationality and Society, Vol. 10, No. 2, pp. 223-252, 1998. 

  8. Bamberg, S. and Schmidt, P., "Incentives, Morality, or Habit? Predicting Students' Car Use for University Routes with the Models of Ajzen, Schwartz, and Triandis," Environment and Behavior, Vol. 35, No. 2, pp. 264-285, 2003. 

  9. Batson, C. and Powell, A. A., "Altruism and Prosocial Behavior," Handbook of Psychology: Personality and Social Psychology, 5, T. Millon and M. J. Lerner, eds., pp. 463-484, Wiley, Hoboken, NJ, 2003. 

  10. Beck, L. and Ajzen, I., "Predicting Dishonest Actions Using the Theory of Planned Behavior," Journal of Research in Personality, Vol. 25, No. 3, pp. 285-301, 1991. 

  11. Bounagui, M. and Nel, J., "Towards Understanding Intention to Purchase Online Music Downloads," Management Dynamics, Vol. 18, No. 1, pp. 15-26, 2009. 

  12. Browne, M. W. and Cudeck, R., "Alternative Ways of Assessing Model Fit," Testing Structural Equation Models, K. A. Bollen and J. S. Long, eds., pp. 136-162, Sage, Newbury Park, CA, 1993. 

  13. Chan, R. Y. K. and Lai, J. W. M., "Does Ethical Ideology Affect Software Piracy Attitude and Behaviour? An Empirical Investigation of Computer Users in China," European Journal of Information Systems, Vol. 20, No. 6, pp. 659-673, 2011. 

  14. Chan, R. Y. K., Ma, K. H. Y., and Wong, Y. H., "The Software Piracy Decision- Making Process of Chinese Computer Users," The Information Society: An International Journal, Vol. 29, No. 4, pp. 203-218, 2013. 

  15. Chiang, E. P. and Assane, D., "Music Piracy among Students on the University Campus: Do Males and Females React Differently?," Journal of Social Economics, Vol. 37, No. 4, pp. 1371-1380, 2008. 

  16. Conner, M. and Armitage, C. J., "Extending the Theory of Planned Behavior: A Review and Avenues for Further Research," Journal of Applied Psychology, Vol. 28, No. 15, pp. 1429-1464, 1998. 

  17. Cox, J. and Collins, A., "Sailing in the Same Ship? Differences in Factors Motivating Piracy of Music and Movie Content," Journal of Behavioral and Experimental Economics, Vol. 50, pp. 70-76, 2014. 

  18. Cronan, T. P. and Al-Rafee, S., "Factors That Influence the Intention to Pirate Software and Media," Journal of Business Ethics, Vol. 78, No. 4, pp. 527-545, 2008. 

  19. d'Astous, A., Colbert, F., and Montpetit, D., "Music Piracy on the Web-How Effective Are Anti-Piracy Arguments? Evidence from the Theory of Planned Behaviour," Journal of Consumer Policy, Vol. 28, pp. 289-310, 2005. 

  20. Das, S., Mukhopadhyay, A., and Bagchi, K. K., "National-Level Determinants of Global Music Piracy and Online Music Sales: An Exploratory Study," Journal of Global Information Technology Management, Vol. 17, No. 1, pp. 6-25, 2014. 

  21. De Groot, J. I. and Steg, L., "Morality and Prosocial Behavior: The Role of Awareness, Responsibility, and Norms in the Norm Activation Model," Journal of Social Psychology, Vol. 149, No. 4, pp. 425-449, 2009. 

  22. Do, K.-H. and Jun, M.-S., "SDRM: The Design and Analysis of Secure DRM Systems Based on PKI Using Steganography," The Journal of Society for e-Business Studies, Vol. 8, No. 4, pp. 167-181, 2003. 

  23. Doran, R. and Larsen, S., "The Relative Importance of Social and Personal Norms in Explaining Intentions to Choose Eco-Friendly Travel Options," International Journal of Tourism Research, Vol. 18, No. 2, pp. 159-166, 2016. 

  24. Douglas, D. E., Cronan, T. P., and Behel, J. D., "Equity Perceptions as a Deterrent to Software Piracy Behavior," Information & Management, Vol. 44, No. 5, pp. 503-512, 2007. 

  25. Garling, T., Fujii, S., Garling, A., and Jakobsson, C., "Moderating Effects of Social Value Orientation on Determinants of Proenvironmental Behavior Intention," Journal of Environmental Psychology, Vol. 23, pp. 1-10, 2003. 

  26. Gefen, D., Straub, D., and Boudreau, M., "Structural Equation Modeling Techniques and Regression: Guidelines for Research Practice," Communications of AIS, Vol. 7, No. 7, pp. 1-78, 2000. 

  27. Godin, G., Valois, P., and Lepage, L., "The Pattern of Influence of Perceived Behavioral Control Upon Exercising Behavioran Application of Ajzen's Theory of Planned Behavior," Journal of Behavioral Medicine, Vol. 16, No. 1, pp. 81-102, 1993. 

  28. Goles, T., Jayatilaka, B., George, B., Parsons, L., Chambers, V., Taylor, D., and Brune, R., "Softlifting: Exploring Determinants of Attitude," Journal of Business Ethics, Vol. 77, No. 4, pp. 481-499, 2008. 

  29. Gopal, R. D., Sanders, G. L., Bhattacharjee, S., Agrawal, M., and Wagner, S. C., "A Behavioral Model of Digital Music Piracy," Journal of Organizational Computing and Electronic Commerce, Vol. 14, No. 2, pp. 89-105, 2004. 

  30. Hair, J. F., Black, B., Babin, B., Anderson, R. E., and Tatham, R. L., Multivariate Data Analysis, 6th ed., Prentice Hall, Upper Saddle River, NJ, 2005. 

  31. Han, H. and Hyun, S. S., "Drivers of Customer Decision to Visit an Environmentally Responsible Museum: Merging the Theory of Planned Behavior and Norm Activation Theory," Journal of Travel & Tourism Marketing, Vol. 34, No. 9, pp. 1155-1168, 2017. 

  32. Helberger, N., Loos, M. B. M., Guibault, L., Mak, C., and Pessers, L., "Digital Content Contracts for Consumers," Journal of Consumer Policy, Vol. 36, No. 1, pp. 37-57, 2013. 

  33. Higgins, G. E., Fell, B. D., and Wilson, A. L., "Digital Piracy: Assessing the Contributions of an Integrated Self-Control Theory and Social Learning Theory Using Structural Equation Modeling," Criminal Justice Studies, Vol. 19, No. 1, pp. 3-22, 2006. 

  34. Hunecke, M., Blobaum, A., Matthies, E., and Hoger, R., "Responsibility and Environment: Ecological Norm Orientation and External Factors in the Domain of Travel Mode Choice Behavior," Environment and Behavior, Vol. 33, pp. 830-852, 2001. 

  35. Hunt, S. D. and Vitell, S. J., "A General Theory of Marketing Ethics," Journal oj Macromarketing, Vol. 6, No. 1, pp. 5-16, 1986. 

  36. Jacobs, R. S., Heuvelman, A., Tan, M., and Peters, O., "Digital Movie Piracy: A Perspective on Downloading Behavior through Social Cognitive Theory," Computers in Human Behavior, Vol. 28, No. 3, pp. 958-967, 2012. 

  37. Jain, S., "Digital Piracy: A Competitive Analysis," Marketing Science, Vol. 27, No. 4, pp. 610-626, 2008. 

  38. Khang, H., Ki, E.-J., Park, I.-K., and Baek, S.-G., "Exploring Antecedents of Attitude and Intention toward Internet Piracy among College Students in South Korea," Asian Journal of Business Ethics, Vol. 1, No. 2, pp. 177-194, 2012. 

  39. Kim, M. R. and Kim, T. U., "A Study on the Effect of Ethical Orientation on Digital Piracy," The Journal of Korean Association of Computer Education, Vol. 19, No. 1, pp. 77-86, 2016. 

  40. King, B. and Thatcher, A., "Attitudes Towards Software Piracy in South Africa: Knowledge of Intellectual Property Laws as a Moderator," Behaviour & Information Technology, Vol. 33, No. 3, pp. 209-223, 2014. 

  41. Kini, R. B., Ramakrishna, H. V., and Vijayaraman, B. S., "An Exploratory Study of Moral Intensity Regarding Software Piracy of Students in Thailand," Behaviour & Information Technology, Vol. 22, No. 1, pp. 63-70, 2003. 

  42. KoKlic, M. K., "Digital Piracy among Adults in Slovenia: An Application of the Theory of Interpersonal Behavior," Economic and Business Review, Vol. 18, No. 2, pp. 135-150, 2016. 

  43. Lahiri, A. and Dey, D., "Effects of Piracy on Quality of Information Goods," Management Science, Vol. 59, No. 1, pp. 245-264, 2013. 

  44. LaRose, R. and Kim, J., "Share, Steal or Buy? A Social Cognitive Perspective of Music Downloading," CyberPsychology & Behavior, Vol. 10, No. 2, pp. 267-277, 2007. 

  45. LaRose, R., Lin, C. A., and Eastin, M. S., "Unregulated Internet Usage: Addiction, Habit, or Deficient Self-Regulation," Media Psychology, Vol. 5, pp. 225-253, 2003. 

  46. Lee, Y. and Lee, J., "The Effect of Self Identity and Social Identity on Technology Acceptance," in Twenty-Second International Conference on Information Systems, 2001. 

  47. Liao, C., Lin, H.-N., and Liu, Y.-P., "Predicting the Use of Pirated Software: A Contingency Model Integrating Perceived Risk with the Theory of Planned Behavior," Journal of Business Ethics, Vol. 91, No. 2, pp. 237-252, 2010. 

  48. Limayem, M. and Hirt, S. G., "Force of Habit and Information Systems Usage: Theory and Initial Validation," Journal of the Association for Information Systems, Vol. 4, pp. 65-97, 2003. 

  49. Limayem, M., Khalifa, M., and Chin, W. W., "Factors Motivating Software Piracy: A Longitudinal Study," IEEE Transactions on Engineering Management, Vol. 51, No. 4, pp. 414-425, 2004. 

  50. Lowry, P. B., Zhang, J., and Wu, T., "Nature or Nurture? A Meta-Analysis of the Factors That Maximize the Prediction of Digital Piracy by Using Social Cognitive Theory as a Framework," Computers in Human Behavior, Vol. 68, pp. 104-120, 2017. 

  51. Ma, L., Montgomery, A. L., Singh, P. V., and Smith, M. D., "An Empirical Analysis of the Impact of Pre-Release Movie Piracy on Box Office Revenue," Information Systems Research, Vol. 25, No. 3, pp. 590-603, 2014. 

  52. Marcum, C. D., Higgins, G. E., Wolfe, S. E., and Ricketts, M. L., "Examining the Intersection of Self-Control, Peer Association and Neutralization in Explaining Digital Piracy," Western Criminology Review, Vol. 12, No. 3, pp. 60-67, 2011. 

  53. Morton, N. A. and Koufteros, X., "Intention to Commit Online Music Piracy and Its Antecedents: An Empirical Investigation," Structural Equation Modeling: A Multidisciplinary Journal, Vol. 15, No. 3, pp. 491-512, 2008. 

  54. Nandedkar, A. and Midha, V., "It Won't Happen to Me: An Assessment of Optimism Bias in Music Piracy," Computers in Human Behavior, Vol. 28, No. 1, pp. 41-48, 2012. 

  55. NIPA, Survey on the Status of Digital Contensts Industry, 2016. 

  56. Park, K.-J., "A Study on Effects of Relative Benefits and Costs of Piracy of Digital Contents on Attitudes and Behaviors of Illegal Duplication," Journal of the Korea Contents Association, Vol. 15, No. 7, pp. 489-499, 2015. 

  57. Pavlou, P. A. and Fygenson, M., "Understanding and Predicting Electronic Commerce Adoption: An Extension of the Theory of Planned Behavior," MIS Quarterly, Vol. 30, No. 1, pp. 115-143, 2006. 

  58. Peace, A. G., Galletta, D. F., and Thong, J. Y. L., "Software Piracy in the Workplace: A Model and Empirical Test," Journal of Management Information Systems, Vol. 20, No. 1, pp. 153-177, 2003. 

  59. Pelsmacker, P. D. and Janssens, W., "The Effects of Norms, Attitudes and Habits on Speeding Behavior: Scale Development and Model Building and Estimation," Accident Analysis & Prevention, Vol. 39, pp. 6-15, 2007. 

  60. Schwartz, S. H., Normative Influences on Altruism, Academic Press, Inc., New York, 1977. 

  61. Shin, Y. H., Im, J., Jung, S. E., and Severt, K., "The Theory of Planned Behavior and the Norm Activation Model Approach to Consumer Behavior Regarding Organic Menus," International Journal of Hospitality Management, Vol. 69, pp. 21-29, 2018. 

  62. Siponen, M., Vance, A., and Willison, R., "New Insights into the Problem of Software Piracy: The Effects of Neutralization, Shame, and Moral Beliefs," Information & Management, Vol. 49, No. 7-8, pp. 334-341, 2012. 

  63. Statista. Global Online Tv and Movie Revenue Lost through Piracy from 2010 to 2022 (in Billion U.S. Dollars), 2018, https://www.statista.com/statistics/778338/global-online-tv-movie-revenue-loss-piracy/. 

  64. Steg, L. and De Groot, J. I., "Explaining Prosocial Intentions: Testing Causal Relationships in the Norm Activation Model," British Journal of Social Psychology, Vol. 49, No. 4, pp. 725-743, 2010. 

  65. Sutton, S., "The Past Predicts the Future: Interpreting Behaviour Relationships in Social Psychological Models of Health Behaviour," Social Psychology and Health: European Perspectives, D. R. Rutter and L. Quine, eds., pp. 71-88, Avebury, Aldershot, UK, 1994. 

  66. Taylor, S. A., Ishida, C., and Melton, H., "A Meta-Analytic Investigation of the Antecedents of Digital Piracy," Handbook of Service Marketing Research, R. T. Rust and M.-H. Huang, eds., pp. 437-464, Edward Elgar, Cheltenham, UK, 2014. 

  67. Taylor, S. and Todd, P. A., "Understanding Information Technology Usage: A Test of Competing Models," Information Systems Research, Vol. 6, No. 2, pp. 144-176, 1995. 

  68. Thogersen, J., "Norms for Environmentally Responsible Behaviour: An Extended Taxonomy," Journal of Environmental Psychology, Vol. 26, No. 4, pp. 247-261, 2006. 

  69. Thong, J. Y. L. and Chee-Sing, Y., "Testing an Ethical Decision-Making Theory: The Case of Softlifting," Journal of Management Information Systems, Vol. 15, No. 1, pp. 213-237, 1998. 

  70. Triandis, H. C., Interpersonal Behavior, Brooks/Cole, Monterey, CA, 1977. 

  71. Venkatesh, V., Morris, M. G., Davis, G. B., and Davis, F. D., "User Acceptance of Information Technology: Toward a Unified View," MIS Quarterly, Vol. 27, No. 3, pp. 425-478, 2003. 

  72. Wang, X. and McClung, S. R., "The Immorality of Illegal Downloading: The Role of Anticipated Guilt and General Emotions," Computers in Human Behavior, Vol. 28, No. 1, pp. 153-159, 2012. 

  73. Yoon, C., "Theory of Planned Behavior and Ethics Theory in Digital Piracy: An Integrated Model," Journal of Business Ethics, Vol. 100, No. 3, pp. 405-417, 2011. 

  74. Zhang, L., Smith, W. W., and McDowell, W. C., "Examining Digital Piracy: Self- Control, Punishment, and Self-Efficacy," Information Resources Management Journal, Vol. 22, No. 1, pp. 24-44, 2009. 

저자의 다른 논문 :

섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로