THESIS
2007
ix, 212 leaves : ill. ; 30 cm
Abstract
With rapid advances in networking and multimedia technologies, end-user digital piracy has caused more substantial impacts to firms producing digital contents as well as the society at large. In response to the phenomenon, three related research have been conducted. The first research proposes a contingency model to understand the decision making process of end-user digital piracy behavior. The model encompasses two distinct piracy behaviors, namely unauthorized copying and unauthorized sharing, and two distinct digital contents, namely software as well as movie and music. Empirical support of the proposed model is obtained by a large-scale online survey. While the first research mainly adopts a cognitive perspective, the second research considers affective factors involved in unauthori...[
Read more ]
With rapid advances in networking and multimedia technologies, end-user digital piracy has caused more substantial impacts to firms producing digital contents as well as the society at large. In response to the phenomenon, three related research have been conducted. The first research proposes a contingency model to understand the decision making process of end-user digital piracy behavior. The model encompasses two distinct piracy behaviors, namely unauthorized copying and unauthorized sharing, and two distinct digital contents, namely software as well as movie and music. Empirical support of the proposed model is obtained by a large-scale online survey. While the first research mainly adopts a cognitive perspective, the second research considers affective factors involved in unauthorized sharing that is seldom studied in previous literature. The third research focuses on response distortion that has been troubling many empirical studies on digital piracy. I propose an innovative method for structural equation modeling using data obtained by Randomized Response Technique (RRT) that is often mistaken as only suitable for univariate analysis. The usefulness and feasibility of this new method are supported by large-scale empirical studies on software piracy.
Post a Comment