Internet Piracy among Business Students: An Application of Triandis Model

By Ramayah, T.; Chin, Lau Guek et al. | International Journal of Business and Management Science, July 2008 | Go to article overview

Internet Piracy among Business Students: An Application of Triandis Model


Ramayah, T., Chin, Lau Guek, Ahmad, Noor Hazlina, International Journal of Business and Management Science


INTRODUCTION

Internet is one of the most valuable technologies of the information age. As it was developed to make our daily life much more comfortable with faster and easier to access to available and useful information but it ha s also opened up a new dimension of misconduct such as internet piracy which is related to the down side of the technology. Internet piracy is a term used for the general use of the Internet to illegally copy or distribute counterfeit of other unauthorized software. Internet piracy occurs when the Internet is used to advertise, offer, acquire or distribute pirated software. Software, music and video theft and distribution threaten to undermine the tremendous innovation, job and revenue that the Internet promises. As the Internet continually gets easier, faster, and less expensive, Internet piracy has also moved in tandem. The Internet allows products to move from computer to computer, with no hard media transaction and with minimum risk. Due to its convenience and effectiveness, Internet piracy has be come widespread. (International Planning and Research Corporation's World Piracy Study)

Internet piracy is a global issue that everyone has to be concerned about. The reason being, it has a significant impact on the economy, costing the world billions of dollars a year in job losses, retail dollar losses and governmental tax losses. Internet piracy issue is crucial in Malaysia as for the year 2000 revenue losses for the United State software industry in Malaysia as a result of software theft were estimated to be almost US$ 95.9 million, reflecting a piracy rate of 66 percent. These losses continue to inflict significant damage not only to the software industry but also the entire Malaysians economy, robbing software publishers of their products and deterring local involvement in software development.

More recently, Lysonski and Durvasula (2008) reported that digital piracy (i.e. illegal downloading of music) was highly prevalent among college students in the US. The authors recommend that studies of this kind should be extended to university students in other countries to determine if such practices are common across cultures. Insights into this could assist in developing measures to curb piracy practices. Following that, the present research is conducted to identify the university students' intentions toward Internet piracy in the context of Malaysia. This research is essential as university students are the future knowledge workers and managers. The university curriculum has been stressing the ethical aspects of managerial decision making has that got through to our future managers? Also if there is a lack of awareness about the Internet piracy issue in their life, they might be the potential Internet pirates of the future.

LITERATURE REVIEW

Conceptual Foundation

Intention-based models are one of the perspectives to pr edict us age b y identifying the determinants of behavioral intentions of individual users. Theory of Reason Action--TRA (Fishbein and Ajzen, 1975; Ajzen and Fishbein, 1980), Theory of Planned Behavior--TPB (Ajzen, 1991), Technology Acceptance Model-TAM (Davis, 1989; Davis et al., 1989), and Triandis Model (Triandis, 1980) are examples of the intention-based models. In addition, Innovation Diffusion-based model such as Innovation Diffusion Technology Model-IDT (Agarwal and Prasad, 1997; Brancheau and Wetherbe 1990; Roger 1995) is another approach for Information Technology (IT) adoption research. Cho and Cheung (2003) had developed the Extended Technology Acceptance Model (ETAM) that examined the important factors affecting customers' intention to adopt an online legal services system. For the purpose of this study, Triandis model (1980) was adopted. The next section describes the details of the model.

Triandis Model

Triandis model was first proposed in 1971. The model argues that behavior is determined by w hat people would like to do (attitude), what they think they should do (social norms), what they usually do (habit), and by the expected consequences of their behavior. …

The rest of this article is only available to active members of Questia

Sign up now for a free, 1-day trial and receive full access to:

  • Questia's entire collection
  • Automatic bibliography creation
  • More helpful research tools like notes, citations, and highlights
  • Ad-free environment

Already a member? Log in now.

Notes for this article

Add a new note
If you are trying to select text to create highlights or citations, remember that you must now click or tap on the first word, and then click or tap on the last word.
One moment ...
Default project is now your active project.
Project items

Items saved from this article

This article has been saved
Highlights (0)
Some of your highlights are legacy items.

Highlights saved before July 30, 2012 will not be displayed on their respective source pages.

You can easily re-create the highlights by opening the book page or article, selecting the text, and clicking “Highlight.”

Citations (0)
Some of your citations are legacy items.

Any citation created before July 30, 2012 will labeled as a “Cited page.” New citations will be saved as cited passages, pages or articles.

We also added the ability to view new citations from your projects or the book or article where you created them.

Notes (0)
Bookmarks (0)

You have no saved items from this article

Project items include:
  • Saved book/article
  • Highlights
  • Quotes/citations
  • Notes
  • Bookmarks
Notes
Cite this article

Cited article

Style
Citations are available only to our active members.
Sign up now to cite pages or passages in MLA, APA and Chicago citation styles.

(Einhorn, 1992, p. 25)

(Einhorn 25)

1

1. Lois J. Einhorn, Abraham Lincoln, the Orator: Penetrating the Lincoln Legend (Westport, CT: Greenwood Press, 1992), 25, http://www.questia.com/read/27419298.

Cited article

Internet Piracy among Business Students: An Application of Triandis Model
Settings

Settings

Typeface
Text size Smaller Larger Reset View mode
Search within

Search within this article

Look up

Look up a word

  • Dictionary
  • Thesaurus
Please submit a word or phrase above.
Print this page

Print this page

Why can't I print more than one page at a time?

Full screen

matching results for page

Cited passage

Style
Citations are available only to our active members.
Sign up now to cite pages or passages in MLA, APA and Chicago citation styles.

"Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences." (Einhorn, 1992, p. 25).

"Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences." (Einhorn 25)

"Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences."1

1. Lois J. Einhorn, Abraham Lincoln, the Orator: Penetrating the Lincoln Legend (Westport, CT: Greenwood Press, 1992), 25, http://www.questia.com/read/27419298.

Cited passage

Thanks for trying Questia!

Please continue trying out our research tools, but please note, full functionality is available only to our active members.

Your work will be lost once you leave this Web page.

For full access in an ad-free environment, sign up now for a FREE, 1-day trial.

Already a member? Log in now.