An Affective Model for Unauthorized Sharing of Software
نویسندگان
چکیده
Software piracy has been studied by academics, software firms, law enforcement agents and policy makers for many years. Previous research in software piracy either did not differentiate between unauthorized copying and unauthorized sharing, or focused only on unauthorized copying. We believe the motivating factors behind the two behaviors are quite different because beneficiaries of the behaviors are different. In this paper, we consider unauthorized sharing as a kind of helping behavior and draw on relevant literature to see if the motivations behind unauthorized sharing can be better appreciated from an affective perspective. We tested the affective model of unauthorized sharing based on empirical data obtained from a large-scale survey. We found from the survey that both perceived affordability and perceived convenience could arouse sympathy or annoyance with the unauthorized copier, and their effects were mediated by perceived controllability of the need of unauthorized copying. Our results support the strong effects of affective factors on the moral obligation of unauthorized sharing.
منابع مشابه
Proposing a Model of Co-Creative Participation in Tourism Market
Objective There is a growing interest in the customers’ innovation in the realm of tourism studies. In the new global business ecosystem where individuals, organizations, governments and economy work together as an integrated network, we need a new innovation model. The model should be set at a level in which internal, external, cooperative and co-creative ideas can converge to create organiza...
متن کاملDeveloping a causal model for organizational factors effecting on knowledge sharing (Case: The National Iranian South Oil Company)
The existence of transformative leaders who are able to create an atmosphere of trust and rearrange the organizational culture in order to foster organizational citizenship behaviors which in turn can encourage the employees to willingly share knowledge within the organization is valuable in any organization. The purpose of the present study was to investigate the role of transformational le...
متن کاملoverview of ways to enhance the security of video surveillance networks using blockchain
In recent decades, video surveillance systems have an increasing development that are used to prevent crime and manage facilities with rapid diffusion of (CCTV)cameras to prevent crime and manage facilities. The video stored in the video surveillance system should be managed comfortably, but sometimes the movies are leaking out to unauthorized people or by unauthorized people, thus violating i...
متن کاملAn Analysis of Security Vulnerabilities in the Movie Production and Distribution Process
Unauthorized copying of movies is a major concern for the motion picture industry. While unauthorized copies of movies have been distributed via portable physical media for some time, low-cost, high-bandwidth Internet connections and peer-to-peer file sharing networks provide highly efficient distribution media. Many movies are showing up on file sharing networks shortly after, and in some case...
متن کاملINVENTORY MODEL FOR DETERIORATING ITEMS WITH REVENUE SHARING ON PRESERVATION TECHNOLOGY INVESTMENT UNDER PRICE SENSITIVE STOCK DEPENDENT DEMAND
The objective of this research is to tackle the emerging problem of jointly determining theoptimal retail price, the replenishment cycle, and the cost of preservation technology investment from an integrated perspective among the supplier and the manufacturer. This paper deals an integrated single-manufacturer single-retailer supply chain model for deteriorating items under revenue sharing on p...
متن کامل