Skip to main content

Role of Self-Efficacy and Ability Towards the Act of Digital Piracy

  • Chapter
  • First Online:
Book cover Piracy in the Digital Era

Abstract

Self-efficacy is the process through which change in behavior occurs. Motivation to perform a behavior is influenced by the expectancy of a desired outcome as well as the belief in one’s capability to perform actions to achieve that desired outcome. The chapter demonstrates the relationship between self-efficacy and digital piracy. In the context of the research findings, this chapter analyzes multiple self-efficacy theories and the existing research literature.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 54.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 69.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  • Ajzen, I. (1991). The theory of planned behavior. Organizational Behavior and Human Decision Processes, 50(2), 179–211.

    Google Scholar 

  • Al-Rafee, S., & Cronan, T. P. (2006). Digital piracy: Factors that influence attitude toward behavior. Journal of Business Ethics, 63(3), 237–259.

    Article  Google Scholar 

  • Bandura, A. (1977). Self-efficacy: Toward a unifying theory of behavioral change. Psychological Review, 84(2), 191.

    Article  Google Scholar 

  • Bandura, A. (1997). Self efficacy: The exercise of control. New York: Freeman.

    Google Scholar 

  • Bandura, A. (1986). Social foundations of thought and action: A social cognitive theory. Englewood Cliffs: Prentice-Hall.

    Google Scholar 

  • Bandura, A. (1998). Personal and collective efficacy in human adaptation and change. In J. G. Adair, D. Belanger, & K. L. Dion (Eds.), Advances in psychological science: Vol. 1. Personal, social and cultural aspects (pp. 51–71). Hove: Psychology Press.

    Google Scholar 

  • Brezina, T., & Topalli, V. (2012). Criminal self-efficacy: Exploring the correlates and consequences of a “Successful Criminal” identity. Criminal Justice and Behavior, 39(8), 1042–1062.

    Article  Google Scholar 

  • Cheung, C. K. (2013). Understanding factors associated with online piracy behavior of adolescents. International Journal of Adolescence and Youth, 18(2), 122–132.

    Google Scholar 

  • Coleman, P. K., & Karraker, K. H. (1998). Self-efficacy and parenting quality: Findings and future applications. Developmental Review, 18(1), 47–85.

    Article  Google Scholar 

  • d’Astous, A., Colbert, F., & Montpetit, D. (2005). Music piracy on the web – how effective are anti-piracy arguments? Evidence from the theory of planned behaviour. Journal of Consumer Policy, 28(3), 289–310.

    Article  Google Scholar 

  • DeCamp, Gunter, W. D., Higgins, G. E., & Gealt, R. E. (2010). Pirating youth: Examining the correlates of digital music piracy among adolescents. International Journal of Cyber Criminology, 4(1), 657–671.

    Google Scholar 

  • DiClemente, C. C. (1986). Self-efficacy and the addictive behaviors. Journal of Social and Clinical Psychology, 4(3), 302–315.

    Article  Google Scholar 

  • Dyer-Witheford, N., & de Peuter, G. (2009). Empire@Play: virtual games and global capitalism. CTheory.Net. Available at: www.ctheory.net/articles.aspx?id¼608. Accessed 5 Nov 2009.

    Google Scholar 

  • Feldman, D. B., & Kubota, M. (2015). Hope, self-efficacy, optimism, and academic achievement: Distinguishing constructs and levels of specificity in predicting college grade-point average. Learning and Individual Differences, 37, 210–216.

    Article  Google Scholar 

  • Gopal, R. D., & Sanders, G. L. (1998). International software piracy: Analysis of key issues and impacts. Information Systems Research, 9(4), 380–397.

    Article  Google Scholar 

  • Hartzler, B., Witkiewitz, K., Villarroel, N., & Donovan, D. (2011). Self-efficacy change as a mediator of associations between therapeutic bond and one-year outcomes in treatments for alcohol dependence. Psychology of Addictive Behaviors, 25(2), 269–278.

    Article  Google Scholar 

  • Hinduja, S. (2003). Trends and patterns among online software pirates. Ethics and Information Technology, 5, 49–63.

    Article  Google Scholar 

  • Hohn, D. A., Muftic, L. R., & Wolf, K. (2006). Swashbuckling students: An exploratory study of internet piracy. Security Journal, 19, 110–127.

    Article  Google Scholar 

  • Hollinger, R. C. (1988). Computer hackers follow a Guttman-like progression. Sociology and Social Research, 72, 199–200.

    Google Scholar 

  • Holt, T. J., & Morris, R. G. (2009). An exploration of the relationship between MP3 player ownership and digital piracy. Criminal Justice Studies, 22(4), 381–392.

    Article  Google Scholar 

  • Hyman, P. (2006). State of the industry: Video game piracy. Game Developer, 13(11), 13–18.

    Google Scholar 

  • Ingram, J. R., & Hinduja, S. (2008). Neutralizing music piracy: An empirical examination. Deviant Behavior, 29(4), 334–366.

    Article  Google Scholar 

  • Krueger, N., & Dickson, P. R. (1994). How believing in ourselves increases risk taking: Perceived self-efficacy and opportunity recognition. Decision Sciences, 25(3), 385–400. https://doi.org/10.1111/j.1540-5915.1994.tb00810.x.

    Article  Google Scholar 

  • Kuo, F. Y., & Hsu, M. H. (2001). Development and validation of ethical computer self-efficacy measure: The case of softlifting. Journal of Business Ethics, 32(4), 299–315.

    Article  Google Scholar 

  • LaRose, R., & Kim, J. (2006). Share, steal, or buy? A social cognitive perspective of music downloading. Cyber Psychology & Behavior, 10(2), 267–277.

    Article  Google Scholar 

  • LaMorte, W. W. (2016). The social cognitive theory. Retrieved from http://sphweb.bumc.bu.edu/otlt/MPH Modules/SB/BehavioralChangeTheories/BehavioralChangeTheories5.html

  • Myles, G., & Nusser, S. (2006). Content protection for games. IBM Systems Journal, 45(1), 119–143.

    Article  Google Scholar 

  • Ojeda-Zapata, J. (2004, February 5). Computer game makers lose increasing number of sales to online piracy. Knight Ridder Tribune Business News, p. 1.

    Google Scholar 

  • Phau, I., & Ng, J. (2010). Predictors of usage intentions of pirated software. Journal of Business Ethics, 94(1), 23–37.

    Article  Google Scholar 

  • Rhee, H., Belyea, M. J., Ciurzynski, S., & Brasch, J. (2009). Barriers to asthma self-management in adolescents: Relationships to psychosocial factors. Pediatric Pulmonology, 44(2), 183–191. https://doi.org/10.1002/ppul.20972.

    Article  Google Scholar 

  • Rumbough, T. B. (2001). Controversial uses of the internet by college students. Educause Quarterly, 24(4), 70–71.

    Google Scholar 

  • Selwyn, N. (2008). An investigation of differences in undergraduates’ academic use of the internet. Active Learning in Higher Education, 9, 11–22.

    Article  Google Scholar 

  • Skaalvik, E. M., & Skaalvik, S. (2014). Teacher self-efficacy and perceived autonomy: Relations with teacher engagement, job satisfaction, and emotional exhaustion. Psychological Reports, 114(1), 68–77.

    Article  Google Scholar 

  • Skinner, W. F., & Fream, A. M. (1997). A social learning theory analysis of computer crime among college students. Journal of Research in Crime and Delinquency, 34, 495–518.

    Article  Google Scholar 

  • Thong, J. Y. L., & Yap, C.-S. (1998). Testing an ethical decision-making theory: The case of softlifting. Journal of Management Information Systems, 15(1), 213–237.

    Article  Google Scholar 

  • Van der Bijl, J. J., & Shortridge-Baggett, L. M. (2001). The theory and measurement of the self-efficacy construct. Scholarly Inquiry for Nursing Practice: An International Journal, 15, 189–207.

    Google Scholar 

  • Wang, H., Hall, N. C., & Rahimi, S. (2015). Self-efficacy and causal attributions in teachers: Effects on burnout, job satisfaction, illness, and quitting intentions. Teaching and Teacher Education, 47, 120–130.

    Article  Google Scholar 

  • White, L. L., Cohen, M. Z., Berger, A. M., Kupzyk, K. A., Swore-Fletcher, B. A., & Bierman, P. J. (2017). Perceived self-efficacy: A concept analysis for symptom management in patients with cancer. Clinical Journal of Oncology Nursing, 21(6), E272–E279.

    Article  Google Scholar 

  • Wolfe, S., & Higgins, G. (2009). Explaining deviant peer associations: An examination of low self-control, ethical predispositions, definitions, and digital piracy. Western Criminology Review, 10(1), 43–55.

    Google Scholar 

  • Yoon, C. (2011). Theory of planned behavior and ethics theory in digital piracy: An integrated model. Journal of Business Ethics, 100(3), 405–417. Retrieved from http://www.jstor.org/stable/41475850.

    Article  Google Scholar 

  • Zhang, L., Smith, W., & McDowell, W. C. (2009). Examining digital piracy: self-control, punishment, and self-efficacy. Information Resources Management Journal, 22(1), 24–44.

    Article  Google Scholar 

  • Zimmerman, B. J., Bandura, A., & Martinez-Pons, M. (1992). Self-motivation for academic attainment: The role of self-efficacy beliefs and personal goal setting. American Educational Research Journal, 29(3), 663–676.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Sahni, S.P., Gupta, I. (2019). Role of Self-Efficacy and Ability Towards the Act of Digital Piracy. In: Piracy in the Digital Era. Springer, Singapore. https://doi.org/10.1007/978-981-13-7173-8_9

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-7173-8_9

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-7172-1

  • Online ISBN: 978-981-13-7173-8

  • eBook Packages: Law and CriminologyLaw and Criminology (R0)

Publish with us

Policies and ethics