The association of moral development and moral intensity with music piracy
- 890 Downloads
Prior research has not found a meaningful relationship between digital piracy and moral development, possibly because students do not recognize digital piracy as a moral issue. Rather than measure moral development as an individual characteristic, this study tests which components of moral development are seen as relevant to digital piracy. If some of the stages of moral development are applicable to music piracy behavior, people are more likely to pirate than to engage in other more morally intense behaviors. Some of the stages of moral development are found to be associated with moral development. Proximity to the victim reduces the acceptability of music piracy.
KeywordsDefined issues test Moral development Moral intensity Music piracy
- Bender, M. T., & Wang, Y. (2009). The impact of digital piracy on music sales: A cross-country analysis. International Social Science Review, 84(3/4), 157–170.Google Scholar
- BSA. (2011). http://www.bsa.org/country/Research%20and%20Statistics.aspx. Accessed June 7, 2011.
- Christensen, A. L., & Eining, M. M. (1991). Factors influencing software piracy: Implications for accountants. Journal of Information Systems, 5(1), 67–80.Google Scholar
- Field, A. (2005). Discovering statistcs using SPSS. London: Sage Publications.Google Scholar
- Fishbein, M., & Ajzen, I. (1975). Belief, attitude, intention and behavior. Reading, MA: Addison-Wsley.Google Scholar
- Garis, M. (2010). Meeting the challenges of digitalisation. Managing Intellectual Property, 199, 88–90.Google Scholar
- Goodman. (2007, June 14). Why media owners will never make DRM work. New Media Age, p. 10.Google Scholar
- Green, H., & Rutledge, S. (2008). Does she look like a music pirate? BusinessWeek, 4082, 42–47.Google Scholar
- Jones, T. M. (1991). Ethical decision making by individuals in organizations: An issue-contingent model. Academy of Management Review, 16(2), 366–395.Google Scholar
- Josien, L., & Broderick, B. (2013). Cheating in higher education: The case of multi-methods cheaters. Academy of Educational Leadership Journal, 17(3), 93–105.Google Scholar
- Kohlberg, L. (1981). The philosophy of moral development: Moral stages and the idea of justice. San Francisco: Harper & Row.Google Scholar
- Moores, T. T., & Chang, J. C.-J. (2006). Ethical decision making in software piracy: Initial development and test of a four-component model. MIS Quarterly, 30(1), 167–180.Google Scholar
- Nisbett, R. E., & Ross, L. (1980). Human inference: Strategies and shortcomings of social judgment. Englewood Cliffs, NJ: Prentice-Hall.Google Scholar
- Peace, A. G., Galletta, D. F., & Thong, J. Y. L. (2003). Software piracy in the workplace: A model and empirical test. Journal of Management Information Systems, 20(1), 153–177.Google Scholar
- Plous, S. (1993). The psychology of judgment and decision making. Philadelphia: Temple University Press.Google Scholar
- Rest, J. R. (1979). Development in judging moral issues. Minneapolis: University of Minnesota Press.Google Scholar
- Rest, J. R. (1986). Moral development: Advances in research and theory. New York: Praeger.Google Scholar
- Rest, J. R. (1999). Postconventional moral thinking: A Neo-Kohlbergian approach. Mahwah, NJ: L. Erlbaum Associates.Google Scholar
- RIAA. (2011). Scope of the problem. http://riaa.com/physicalpiracy.php?content_selector=piracy-online-scope-of-the-problem. Accessed June 7, 2011.
- Rosencrance, L. (2003). BSA survey: Campus attitudes invite software piracy. http://www.computerworld.com/s/article/85017/BSA_survey_Campus_attitudes_invite_software_piracy?taxonomyId=070. Accessed June 7, 2011.
- Schultz, Mark F. (2006). Fear and norms & rock & roll: What Jambands can teach us about persuading people to obey copyright law. Berkeley Technology Law Journal, 21, 651–728.Google Scholar
- Scott, M. (2008, February 25). Anti-piracy plan threatens free speech. Business Week Online, p. 18.Google Scholar
- Woolley, D. J. (2010). The cynical pirate: How cynicism effects music piracy. Academy of Information and Management Sciences Journal, 13(1), 31–44.Google Scholar