Abstract
Self-efficacy is the process through which change in behavior occurs. Motivation to perform a behavior is influenced by the expectancy of a desired outcome as well as the belief in one’s capability to perform actions to achieve that desired outcome. The chapter demonstrates the relationship between self-efficacy and digital piracy. In the context of the research findings, this chapter analyzes multiple self-efficacy theories and the existing research literature.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Ajzen, I. (1991). The theory of planned behavior. Organizational Behavior and Human Decision Processes, 50(2), 179–211.
Al-Rafee, S., & Cronan, T. P. (2006). Digital piracy: Factors that influence attitude toward behavior. Journal of Business Ethics, 63(3), 237–259.
Bandura, A. (1977). Self-efficacy: Toward a unifying theory of behavioral change. Psychological Review, 84(2), 191.
Bandura, A. (1997). Self efficacy: The exercise of control. New York: Freeman.
Bandura, A. (1986). Social foundations of thought and action: A social cognitive theory. Englewood Cliffs: Prentice-Hall.
Bandura, A. (1998). Personal and collective efficacy in human adaptation and change. In J. G. Adair, D. Belanger, & K. L. Dion (Eds.), Advances in psychological science: Vol. 1. Personal, social and cultural aspects (pp. 51–71). Hove: Psychology Press.
Brezina, T., & Topalli, V. (2012). Criminal self-efficacy: Exploring the correlates and consequences of a “Successful Criminal” identity. Criminal Justice and Behavior, 39(8), 1042–1062.
Cheung, C. K. (2013). Understanding factors associated with online piracy behavior of adolescents. International Journal of Adolescence and Youth, 18(2), 122–132.
Coleman, P. K., & Karraker, K. H. (1998). Self-efficacy and parenting quality: Findings and future applications. Developmental Review, 18(1), 47–85.
d’Astous, A., Colbert, F., & Montpetit, D. (2005). Music piracy on the web – how effective are anti-piracy arguments? Evidence from the theory of planned behaviour. Journal of Consumer Policy, 28(3), 289–310.
DeCamp, Gunter, W. D., Higgins, G. E., & Gealt, R. E. (2010). Pirating youth: Examining the correlates of digital music piracy among adolescents. International Journal of Cyber Criminology, 4(1), 657–671.
DiClemente, C. C. (1986). Self-efficacy and the addictive behaviors. Journal of Social and Clinical Psychology, 4(3), 302–315.
Dyer-Witheford, N., & de Peuter, G. (2009). Empire@Play: virtual games and global capitalism. CTheory.Net. Available at: www.ctheory.net/articles.aspx?id¼608. Accessed 5 Nov 2009.
Feldman, D. B., & Kubota, M. (2015). Hope, self-efficacy, optimism, and academic achievement: Distinguishing constructs and levels of specificity in predicting college grade-point average. Learning and Individual Differences, 37, 210–216.
Gopal, R. D., & Sanders, G. L. (1998). International software piracy: Analysis of key issues and impacts. Information Systems Research, 9(4), 380–397.
Hartzler, B., Witkiewitz, K., Villarroel, N., & Donovan, D. (2011). Self-efficacy change as a mediator of associations between therapeutic bond and one-year outcomes in treatments for alcohol dependence. Psychology of Addictive Behaviors, 25(2), 269–278.
Hinduja, S. (2003). Trends and patterns among online software pirates. Ethics and Information Technology, 5, 49–63.
Hohn, D. A., Muftic, L. R., & Wolf, K. (2006). Swashbuckling students: An exploratory study of internet piracy. Security Journal, 19, 110–127.
Hollinger, R. C. (1988). Computer hackers follow a Guttman-like progression. Sociology and Social Research, 72, 199–200.
Holt, T. J., & Morris, R. G. (2009). An exploration of the relationship between MP3 player ownership and digital piracy. Criminal Justice Studies, 22(4), 381–392.
Hyman, P. (2006). State of the industry: Video game piracy. Game Developer, 13(11), 13–18.
Ingram, J. R., & Hinduja, S. (2008). Neutralizing music piracy: An empirical examination. Deviant Behavior, 29(4), 334–366.
Krueger, N., & Dickson, P. R. (1994). How believing in ourselves increases risk taking: Perceived self-efficacy and opportunity recognition. Decision Sciences, 25(3), 385–400. https://doi.org/10.1111/j.1540-5915.1994.tb00810.x.
Kuo, F. Y., & Hsu, M. H. (2001). Development and validation of ethical computer self-efficacy measure: The case of softlifting. Journal of Business Ethics, 32(4), 299–315.
LaRose, R., & Kim, J. (2006). Share, steal, or buy? A social cognitive perspective of music downloading. Cyber Psychology & Behavior, 10(2), 267–277.
LaMorte, W. W. (2016). The social cognitive theory. Retrieved from http://sphweb.bumc.bu.edu/otlt/MPH Modules/SB/BehavioralChangeTheories/BehavioralChangeTheories5.html
Myles, G., & Nusser, S. (2006). Content protection for games. IBM Systems Journal, 45(1), 119–143.
Ojeda-Zapata, J. (2004, February 5). Computer game makers lose increasing number of sales to online piracy. Knight Ridder Tribune Business News, p. 1.
Phau, I., & Ng, J. (2010). Predictors of usage intentions of pirated software. Journal of Business Ethics, 94(1), 23–37.
Rhee, H., Belyea, M. J., Ciurzynski, S., & Brasch, J. (2009). Barriers to asthma self-management in adolescents: Relationships to psychosocial factors. Pediatric Pulmonology, 44(2), 183–191. https://doi.org/10.1002/ppul.20972.
Rumbough, T. B. (2001). Controversial uses of the internet by college students. Educause Quarterly, 24(4), 70–71.
Selwyn, N. (2008). An investigation of differences in undergraduates’ academic use of the internet. Active Learning in Higher Education, 9, 11–22.
Skaalvik, E. M., & Skaalvik, S. (2014). Teacher self-efficacy and perceived autonomy: Relations with teacher engagement, job satisfaction, and emotional exhaustion. Psychological Reports, 114(1), 68–77.
Skinner, W. F., & Fream, A. M. (1997). A social learning theory analysis of computer crime among college students. Journal of Research in Crime and Delinquency, 34, 495–518.
Thong, J. Y. L., & Yap, C.-S. (1998). Testing an ethical decision-making theory: The case of softlifting. Journal of Management Information Systems, 15(1), 213–237.
Van der Bijl, J. J., & Shortridge-Baggett, L. M. (2001). The theory and measurement of the self-efficacy construct. Scholarly Inquiry for Nursing Practice: An International Journal, 15, 189–207.
Wang, H., Hall, N. C., & Rahimi, S. (2015). Self-efficacy and causal attributions in teachers: Effects on burnout, job satisfaction, illness, and quitting intentions. Teaching and Teacher Education, 47, 120–130.
White, L. L., Cohen, M. Z., Berger, A. M., Kupzyk, K. A., Swore-Fletcher, B. A., & Bierman, P. J. (2017). Perceived self-efficacy: A concept analysis for symptom management in patients with cancer. Clinical Journal of Oncology Nursing, 21(6), E272–E279.
Wolfe, S., & Higgins, G. (2009). Explaining deviant peer associations: An examination of low self-control, ethical predispositions, definitions, and digital piracy. Western Criminology Review, 10(1), 43–55.
Yoon, C. (2011). Theory of planned behavior and ethics theory in digital piracy: An integrated model. Journal of Business Ethics, 100(3), 405–417. Retrieved from http://www.jstor.org/stable/41475850.
Zhang, L., Smith, W., & McDowell, W. C. (2009). Examining digital piracy: self-control, punishment, and self-efficacy. Information Resources Management Journal, 22(1), 24–44.
Zimmerman, B. J., Bandura, A., & Martinez-Pons, M. (1992). Self-motivation for academic attainment: The role of self-efficacy beliefs and personal goal setting. American Educational Research Journal, 29(3), 663–676.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this chapter
Cite this chapter
Sahni, S.P., Gupta, I. (2019). Role of Self-Efficacy and Ability Towards the Act of Digital Piracy. In: Piracy in the Digital Era. Springer, Singapore. https://doi.org/10.1007/978-981-13-7173-8_9
Download citation
DOI: https://doi.org/10.1007/978-981-13-7173-8_9
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-7172-1
Online ISBN: 978-981-13-7173-8
eBook Packages: Law and CriminologyLaw and Criminology (R0)