Open Access
Subscription Access
Open Access
Subscription Access
Purchasing Behavior for Pirated Products
Subscribe/Renew Journal
The purpose of this study is to explore the factors influencing the Bangladeshi consumers' perception toward purchasing pirated products. To explore these factors, this study had conducted a survey among the Bangladeshi consumers'. The data analysis was conducted through exploratory factor analysis, confirmatory factor analysis and structural equation modeling to test the hypotheses. Among the four variables, individual personalities and economic conditions are the most significant followed by social influences and pricing of pirated products. The outcome of this research showed a comprehensively integrated framework for policy maker and business enterprise to understand the dynamic relationships among dimensions of social influence, pricing, economy, and personality to understand the consumers' perception toward purchasing pirated products. Further research is needed to examine these factors with additional samples before generalization can be made.
Keywords
Pirated Products, Social Influence, Purchasing Behavior
User
Information
- Altinkemer, Kemal and Guan, Junwei (2003), Analyzing Protection Strategies for Online Software Distribution, Journal of Electronic Commerce Research, 4(1): 34-48.
- Ang, S. H., Cheng, P. S., Lim, E. A. C. and Tambyah, S. K. (2001), Spot the Difference: Consumer Responses Towards Counterfeits, Journal of Consumer Marketing, 18(3): 219-35.
- Atallah, M., O’Rourke, M., Mason, M. and Wade, J. (2008), Steal this Article: Battening Down the Digital Hatches, Risk Management, May: 26-35.
- Bearden, W. O., Netemeyer, R. G. and Teel, J. E. (1989), Measurement of Consumer Susceptibility to Interpersonal Influence, Journal of Consumer Research, 15(March): 473-81.
- Bentler, P. M. (1990), Comparative Fit Indexes in Structural Models, Psychological Bulletin, 107: 238-246.
- Byrne, B. M. (2001), Structural Equation Modeling with AMOS: Basic Concepts, Applications and Programming, Laurence Erlbaum Associates.
- Chaudhry, P., Cordell, V. and Zimmerman, A. (2005), Modeling Anti-counterfeiting Strategies in Response to Protecting Intellectual Property Rights in a Global Environment, Marketing Review, 5(1): 59-72.
- Cheng, H. K., Sims, R. R. and Teegen, H. (1997), To Purchase or to Pirate Software: An Empirical Study, Journal of Management Information Systems, 13(4): 49-60.
- Cordell, V., Wongtada, N. and Kieschnick, R. L. Jr (1996), Counterfeit Purchase Intentions: Role of Lawfulness Attitudes and Product Traits as Determinants, Journal of Business Research, 35(1): 41-53.
- Davis and Cosenza, (1988), Business Research for Decision Making (2nd Ed.), PWS Kent, Boston
- Dodge, H. R., Edwards, E. A. and Fullerton, S. (1996), Consumer Transgressions in the Marketplace: Consumers’ Perspectives, Psychology & Marketing, 13(8): 821-35.
- Flowers, S. (2008), Harnessing the Hackers: The Emergence and Exploitation of Outlaw Innovation’, Research Policy, 37(2): 177-93.
- Horn, P., Maxwell, E. and Crawford, S. (2004), Promoting Innovation and Economic Growth: The Special Problem of Digital Intellectual Property, A Report by the Digital Connections Council of the Committee for Economic Development (CED). Downloaded on January 28, 2005, from http://www.ced.org/docs/report/report_dcc_v2.pdf.
- Ha’aretz (2004), 410 Million Songs are Downloaded from the Internet Every Day by 7.4 Million Surfers Worldwide, Ha’aretz, June 23: 14.
- Hofstede, G. (1980), Culture’s Consequences: International Differences in Work-Related Values, Sage, Beverly Hills, CA
- Husted, B. W. (2000), The Impact of National Culture on Software Piracy, Journal of Business Ethics, 26: 197-211.
- Huang, J. H., Lee, B. C. Y. and Ho, S. H. (2004), Consumer Attitude toward Gray Market Goods, International Marketing Review, 21(6): 598-614.
- Hu, L. and Bentler, P. M. (1999), Cutoff Criteria for Fit Indexes in Covariance Structure Analysis: Conventional Criteria versus New Alternatives, Structural Equation Modeling, 6: 1-55.
- International Anticounterfeiting Coalition (2005), Facts on Fakes. Downloaded on November 30, 2005, from www.iacc.org/Facts.html.
- International Intellectual Property Institute (2003), Counterfeit Goods and the Public’s Health and Safety. Downloaded on November 30, 2005, from www.iacc.org/IIPI.pdf.
- IIPA (2002), USTR Special 301 Decision and IIPA Estimated US Trade Losses Due to Copyright Piracy, July. Available at: www.iipa.com/pdf/2002_jul11_USTRLOSSES.pdf.
- Johnson, D. G. (1995), Computer Ethics (2nd Ed), Prentice Hall, Englewood Cliffs, NJ.
- Lau, E. K. (2006), Factors Motivating People toward Pirated Software, Qualitative Market Research: An International Journal, 9(4): 404-419.
- Lichtenstein, D. R., Netemeyer, R. G. and Burton, S. (1990), Distinguishing Coupon Proneness from Value Consciousness: An Acquisition-transaction Utility Theory Perspective, Journal of Marketing, 54(July): 54-67.
- Logsdon, J. M., Thompson, J. K. and Reid, R. A. (1994), Software Piracy: Is It Related to Level of Moral Judgment, Journal of Business Ethics, 13: 849-57.
- Matos, C. A., Ituassu, C. T. and Rossi, V. A. C. (2007), Consumer Attitudes toward Counterfeits: A Review and Extension, Journal of Consumer Marketing, 24(1): 36–47.
- Mariano, G. (2002), Using Tax Dollars to Combat Piracy, CjNet, April 24, available at: http://news.com.com/2100-1023-891521.html.
- McDonald, G. and Roberts, C. (1994), Product Piracy: The Problem that Will not Go Away, Journal of Product & Brand Management, 3(4): 55-65.
- Miles, S. and Kanellos, M. (1999), DVD Piracy Program Propagates on the Net, CjNet, November 4, available at: http://news.com.com/2100-1040-232485.htm.
- Moor, J. H. (1985), What is Computer Ethics, Metaphilosophy, 16(4): 266-75.
- Raykov, T. and Marcoulides, G. A. (2000), A Method for Comparing Completely Standardized Solutions in Multiple Groups, Structural Equation Modeling, 7: 292-308.
- SCMP (1991), Copyright Warning, South China Morning Post, June 14.
- SCMP (1993), Anti-piracy Talks Fail, South China Morning Post, March 11.
- Simpson, P. M., Banerjee, D. and Simpson, C. L. Jr (1994), Softlifting: A Model of Motivating Factors, Journal of Business Ethics, 13: 431-8.
- Sims, R. R., Cheng, H. K. and Teegen, H. (1996), Toward a Profile of Student Software Piraters, Journal of Business Ethics, 15: 839-49.
- Smith, J. (2003), Software Piracy Costs Business Billions, USA Today, March 7, available at: www.usatoday.com/tech/columnist/ccjoel026.htm.
- Swee, H. A., Cheng, P. S., Lim, E. and Tambyah, S. K. (2001), Spot the Difference: Consumer Responses towards Counterfeits, Journal of Consumer Marketing, 18(3): 219-35.
- Swinyard, W. R., Rinne, H. and Kau, A. K. (1990), The Morality of Software Piracy: A Cross-cultural Analysis, Journal of Business Ethics, 9: 655-64.
- Wang, F., Zhang, H., Zang, H. and Ouyang, M. (2005), Purchasing Pirated Software: An Initial Examination of Chinese Consumers, Journal of Consumer Marketing, 22(6): 340–351.
- Wilson, S., Kambil, A., Schwartz, J., Levin, E., Pisano, G. and Bevilacqua, M. J. (2008), Open Source: Salvation or Suicide?, Harvard Business Review, 86(4).
Abstract Views: 387
PDF Views: 1