Upload
jane-l-hsu
View
214
Download
2
Embed Size (px)
Citation preview
Consumers’ Willingness to Pay
for Non-pirated SoftwareJane L. Hsu
Charlene W. Shiue
ABSTRACT. This study analyzed consumers’ willing-
ness to pay (WTP) for non-pirated computer software
and examined how attitudes toward intellectual property
rights and perceived risk affect WTPs. Two commonly
used software products, Microsoft Windows and Microsoft
Office, were used in the study as objects to reveal con-
sumer assessed values. A consumer survey was adminis-
tered in Taiwan and the total valid samples were 799.
Respondents in this study included students from senior
high schools, colleges, and graduate schools, and general
consumers who were no longer full-time students. The
estimated average WTP for Windows was USD 58.55 and
for Office was USD 53.49, much lower than the respective
suggested retail prices in the market. Social norms had
strong positive influences on willingness-to-pay for soft-
ware products. The prosecution risk did not significantly
increase WTPs for software products due to the reason
that individuals who used pirated software were not at a
high risk of being prosecuted. Performance risk was
positively correlated to WTPs for software products. The
respondents segmented into the low-WTP cluster were
more likely to use pirated software than those in the high-
WTP segment. Source reliability, legitimacy, technical
support, and customer service were emphasized in deci-
sions of respondents in the high-WTP segment and could
be used in marketing strategies.
KEY WORDS: software piracy, willingness to pay,
intellectual property rights, perceived risk
Introduction
Usage of pirated software is a serious problem
worldwide and has become difficult to deal with due
to the easiness in duplicating copyrighted products.
McDonald and Roberts (1994) mentioned that
piracy was a problem of persistency. Piracy would
not disappear or lessen if nothing had done to pre-
vent consumers from using unauthorized software
(Business Software Alliance, 2006). Users of unau-
thorized software often lack respect for intellectual
property rights. The misuse of copyrighted software
not only affects the benefits of copyright holders, but
also weakens the intentions of manufacturers in
making investment in research and development.
The problem of software piracy will not diminish as
long as users have intentions to use unauthorized
software products. Would there be factors influ-
encing consumers’ decisions about choosing autho-
rized products? How much are consumers willing to
pay for the usage of authorized software products? In
order to quantify the willingness-to-pay (WTP) of
consumers in using authorized software, this study
selects two commonly used commercial software
products, Microsoft Windows and Microsoft Office, to
examine consumers’ usage patterns of unauthorized
software in addition to evaluating the dollar
amount of willingness-to-pay for these two software
products.
With advances in technology, individual users are
able to make and distribute unauthorized software.
The key issue in this matter is that the supply of
pirated software exists as long as there is a demand in
the market. For software piracy, legislation and
education may lessen the seriousness of the problem,
but may not stop users from using, reproducing,
sharing, and distributing unauthorized software.
Tang and Farn (2005) suggested assessing perceived
value of software products in order to generalize
prices in the market.
The objective of this study is to examine the
behavioral usage of pirated software products in
Dr. Jane Lu Hsu is Professor in Department of Marketing at
National Chung Hsing University in Taiwan.
Charlene Wan-Yun Shiue was a former Research Assistant in
the Department of Marketing at National Chung Hsing
University in Taiwan.
Journal of Business Ethics (2008) 81:715–732 � Springer 2007DOI 10.1007/s10551-007-9543-9
Taiwan. The willingness-to-pay measures are esti-
mated for authorized copies of Microsoft Windows and
Microsoft Office to reveal values consumers assess these
two commonly used software products. The results
of this study provide new insights into usage of
pirated software and are useful for the software
industry to apply price differentiation to segment
consumer markets.
Literature review
Piracy
Swinyard et al. (1990) indicated that computer soft-
ware was the first merchandise duplicated electroni-
cally on a large scale. Software piracy has become a
phenomenon even with the efforts software pro-
ducers have devoted to anti-piracy technology
development. Consequently, it is essential to examine
the software piracy problem from the demand side in
order to have a good understanding of the issue
(Block et al., 1993; McDonald and Roberts, 1994).
Consumers select counterfeits due to price
advantages (Alberts-Miller, 1999; Block et al.,
1993). Cheng et al. (1997) stated that relatively high
market price of authorized software was the main
reason of software piracy. Chen and Png (1999)
concluded, it would be better off to deal with end-
user piracy through strategies of pricing than mon-
itoring. Price reduction could have effects of easing
the establishments of authorized products like soft-
ware in product penetration and distribution in a
legitimate market (Cheng et al., 1997; Moores and
Dhillon, 2000; Papadopoulos, 2004). Cheng et al.
(1997) indicated that increases in consumer reser-
vation prices and ethical costs could reduce intention
of pirated software usage. Moores and Dhillon
(2000) suggested raising censure for using pirated
software.
Attitudes toward intellectual property rights
Consumer ethical attitudes toward software usage
had been identified as crucial factors influencing
software piracy (Eining and Christensen, 1991;
Logsdon et al., 1994; Swinyard et al., 1990; Taylor
and Shim, 1993). Swinyard et al. (1990) compared
attitudes of U.S. and Singapore students toward
software piracy and pointed out that Singapore
students had more casual attitudes toward software
piracy than U.S. students had. Similar results were
found in the study of Whiteman et al. (1998) that
Hong Kong and Singapore students had more per-
missive attitudes regarding the moral standards
toward computer usage than U.S. students had.
Leonard and Cronan (2005) concluded that uneth-
ical behavior in computer usage was more unac-
ceptable to females than males.
Ang et al. (2001) found that two social
dimensions (informative susceptibility and norma-
tive susceptibility) and three personality character-
istics (value conscious, integrity, and personal
gratification) affected attitudes toward piracy.
Wang et al. (2005) augmented the influential
dimensions of piracy in Ang et al. (2001) by
adding two new constructs, collectivism and
novelty seeking.
Perceived risk
Risk perception was found to influence decision-
making (Taylor, 1974), and was an important issue
in consumer behavior studies (Peter and Ryan,
1976). Retting and Rawson (1963) indicated that
perceived risk was an antecedent to ethical behavior.
Perceived risk was found to have impacts on ethical
decisions in addition to moral philosophy (Fraedrich
and Ferrell, 1992). Chiou et al. (2005) stated that
consumer piracy decisions were influenced by per-
ceived risk. Purchasing counterfeit products could
be risky to consumers once considering financial
risk, performance and functional risk, or social risk
(Wee et al., 1995). Wee et al. (1995) found that
higher income consumers were less likely to buy
counterfeit products, opposite of findings in the
study of Roselius (1971).
Tan (2002) applied performance, financial, social,
and prosecution dimensions in examining risk in
software piracy. Chiou et al. (2005) focused on the
relationship between prosecution risk and attitudes
toward music piracy due limited financial risk in
purchasing pirated CD or downloading music files.
Advanced technology assured the quality of pirated
music close to the originals with low performance
risk.
716 J. L. Hsu and C. W. Shiue
Willingness-to-pay measurements
WTP has been utilized by economists, psychologists,
and marketing researchers in evaluating demand for
goods and services as well as in measuring optimal
market prices (Wertenbroch and Skiera, 2002). Fu
et al. (1999) concluded that WTP was positively
related to household income levels, and those con-
sumers who were more concerned with pesticide
risk and had stronger preferences in health had
higher WTP. The findings in Boccaletti and Nard-
ella (2000) showed that WTP was positively related
to income and risk concerns. Skuras and Vakrou
(2002) found consumers’ WTP was positively re-
lated to educational levels. Homburg et al. (2005)
found that as customer satisfaction judgment chan-
ged from transaction-specific viewpoint to cumula-
tive prospect, the positive relationships between
customer satisfaction and WTP became stronger.
Krystallis and Chryssohoidis (2005) indicated when
consumers did not have confidences in certain
products, the WTP would be minimized, no matter
what the product category was.
Recent studies applied this method to measure
WTP to a variety of products and services, but mea-
suring WTP for authorized software products seems
to be lacking in the literature. WTP method is applied
in this study to examine the dollar amount consumers
are willing to pay for non-pirated software products.
Research design
Research hypotheses
Influences of various dimensions of attitudes toward
intellectual property rights and consumer perceived
risk are considered in the research framework in
measuring WTP for non-pirated software as pre-
sented in Figure 1. Based on findings in Ang et al.
(2001) and Wang et al. (2005), normative suscepti-
bility, value conscious, and novelty seeking are
considered in the framework and are expected to
influence WTP for non-pirated software positively
as indicated in the following hypotheses.
H1: Normative susceptibility dimension is posi-
tively related to consumers’ WTP for non-
pirated software.
H2: Value conscious dimension is positively related
to consumers’ WTP for non-pirated software.H3: Novelty seeking dimension is positively related
to consumers’ WTP for non-pirated software.
Based on the findings of Chiou et al. (2005), Tan
(2002), Wang (2005), and Wee et al. (1995), three
risk-related dimensions, performance risk, social risk,
and prosecution risk, are expected to influence WTP
for non-pirated software positively as indicated in
the following hypotheses.
H4: Performance risk dimension is positively re-
lated to consumers’ WTP for non-pirated
software.H5: Social risk dimension is positively related to
consumers’ WTP for non-pirated software.H6: Prosecution risk dimension is positively related
to consumers’ WTP for non-pirated software.
Questionnaire and survey
A consumer survey was administered to collect data
of consumers’ WTP for two commercial software
products while evaluating consumers’ perceived risk
and attitudes toward intellectual property rights.
Wang et al. (2005) used survey data collected from
two universities in China to examine whether sur-
Attitudes toward Intellectual Property Rights
Normative Value NoveltySusceptibility Conscious Seeking
H2 (+)H3 (+)H1 (+)
WTP for Non-pirated
SoftwareH4 (+) H6 (+)
H5 (+)
ProsecutionRisk
SocialPerformanceRiskRisk
Perceived Risk
Attitudes toward Intellectual Property Rights
Normative Value NoveltySusceptibility Conscious Seeking
H2 (+)H3 (+)H1 (+)
WTP for
SoftwareH4 (+)
H6 (+)
H5 (+)
ProsecutionRisk
SocialPerformanceRiskRisk
Perceived Risk
Non-pirated
Figure 1. Research framework.
Consumers’ Willingness to Pay for Non-pirated Software 717
veyed students had purchased pirated software and
their attitudes toward software piracy. Siegfried
(2004) analyzed students’ attitudes on software
piracy using survey data. Siegfried (2004) believed
surveyed students were likely to be more candid
without identifying information in questionnaires.
Tang and Farn (2005) studied the effect of inter-
personal influences on illegitimate usage of software
using survey data conducted in universities. In the
literature, surveys were administered to reveal soft-
ware piracy issues, and student surveys were used
widely to examine the illegal usage of software
products (Wang et al., 2005).
In this study, a questionnaire was designed based
on findings in the literature and discussions with
individuals who used pirated software. A trial survey
was conducted on January 16, 2006, in urban areas
of Taipei prior to the formal survey. Questionnaires
were modified based on suggestions from respon-
dents participated in the trial survey.
In the questionnaire, computer usage patterns like
average daily hours using computers on weekdays
and on weekends, commonly used pirated software
products, and channels used to obtain pirated soft-
ware products were questioned. Statements used to
measure attitudes toward intellectual property rights
were four-point Likert scales, with one indicating
the most disagreeable and four indicating the most
agreeable. For perceived risk measurements, uncer-
tainty and severity were measured separately using
four-point Likert scales, from very much impossible
to very much possible for uncertainty, and the least
severe to the most severe for severity. The willing-
ness-to-pay was measured using the payment card
method, and Microsoft Windows and Office were
objects used for respondents to assess WTP values.
Ranges of WTP were provided for each software
product, covering the recommended market price of
the software and equally divided into 20 smaller
price ranges for respondents to choose from. An
additional question was added to ask for respondents
to write down the exact dollar amount of WTP for
the software within the chosen price range. Other
questions like currently using authorized or pirated
software of Windows and of Office, considering fac-
tors while purchasing computer software products,
and possibilities of purchasing authorized copies for
the next purchase were asked. Socio-demographic
characteristics of respondents were also questioned.
Each respondent needed to have at least one
personal computer used on a regular basis, and had
installed software in that computer by himself/her-
self to be qualified to participate the survey.
Respondents were not required to have authorized
software purchase experiences for the survey. The
rationale behind this was to obtain data of pirated
software users. However, limitation of the survey
was that purchasing prices of authorized software
products could not be revealed. Respondents in this
study included students from senior high schools,
colleges, and graduate schools, and consumers who
were no longer full-time students. The formal survey
was conducted from January 20 to February 28,
2006, in Taipei, Taiwan.
This study surveyed high school students, college
students, graduate students, and general consumers
who were not currently enrolled as full-time stu-
dents in order to include respondents of various age
and educational levels. Five senior high schools were
randomly selected to administer the survey.
Administrative offices of selected high schools were
contacted for the official consent prior to the survey.
Upon receiving consent from high school adminis-
trators, questionnaires with instructions were mailed
to administrators of selected high schools, and then
several classes in each school were randomly selected
to conduct the survey. Completed questionnaires
were mailed back from administrative offices with-
out identifications of respondents. Valid samples of
high school students were 200. Four universities
were randomly selected, and trained surveyors
intercepted college and graduate students at the
entrances or in front of student unions to conduct
the survey. Valid samples of college students were
200, of graduate students were 199. For respondents
who were no longer full-time students, the survey
was administered at two memorial halls and Taipei
Main Station. Valid samples of general consumers
were 200. Total valid samples were 799. Since dif-
ferent sampling methods were applied in this study,
research findings need to be interpreted with care.
In answering the questions of unauthorized soft-
ware usage, respondents were assured the ques-
tionnaires were strict anonymous and data were used
for research only. Personal information would not
be revealed under any circumstance. While con-
ducting surveys in person, very few respondents
questioned reasons or purposes of getting data of
718 J. L. Hsu and C. W. Shiue
pirated software usage. The respondents were as-
sured by surveyors that the piracy issue was
important and honest answers would help
researchers to realize the situation in reality. Based
on feedback of surveyors, the vast majority of
respondents did not hesitate to answer questions of
pirated software usage. Some respondents would be
willing to talk about how and where they obtained
unauthorized copies of software products.
Analytical methods
Descriptive statistics were used in this study to
describe behavioral patterns of respondents in
general. Cronbach’s alpha coefficient was measured
to reveal reliabilities of scales. Factor analysis was
utilized to extract the underlying dimensions of
attitudes toward intellectual property rights and of
consumer perceived risk. Pearson correlation anal-
ysis was employed to test whether six hypotheses
could be supported. Cluster analysis was used to
segment the respondents into groups of different
WTP values.
Empirical results
Descriptive results of respondents
The total valid samples in this research were 799,
including 200 senior high school students, 200 col-
lege students, 199 graduate students, and 200 con-
sumers who were no longer full-time students. In
each sub-dataset, about half of respondents were male
(Table I). The average age of high school students,
college students, graduate students, and non-student
consumers was 16.9, 20.4, 24.8, and 30.7, respec-
tively. The educational levels of respondents were
relatively high that 72.46% of them were with edu-
cational levels of college or above. The majority of
student respondents were not married, while 29.59%
of non-students were married. In occupation of non-
student respondents, relatively more respondents
were in the sector of public/military/education
(26.26%), services (22.73%), and business sector
(22.22%).
The survey data indicated that piracy level of
operating system was 48.19%, and of word
processing software was 50.19%. The piracy level for
business software in Taiwan was 43% in 2005 and
41% in 2006 as estimated by International Intellec-
tual Property Alliance (2007). The piracy levels
calculated based on survey data were higher than
published piracy levels. These findings indicated that
information of piracy usage revealed in survey data
reflecting the situation to a certain level.
For the average monthly personal expenditure,
high school respondents had the lowest monthly
expenditure (USD 77), followed by college
respondents (USD 197) and graduate students
(USD 249). Non-student respondents had the
highest monthly expenditure (USD 383) on aver-
age. The average WTP for Microsoft Windows was
USD 58.55 and for Microsoft Office was USD
53.49. In general, respondents’ WTP for Windows
were higher than those for Office except the non-
student respondents. Among students, high school
students were willing to pay more money for
Microsoft Windows and for Office, while the graduate
students had relatively lower WTP measures. For
non-student respondents, although monthly per-
sonal expenditure was about fivefold of high
school students’ monthly personal expenditure, the
WTP measures were at similar levels. College and
graduate students had relatively low WTP mea-
sures. Due to the sampling methods applied in this
study, willingness-to-pay of high school students
was considered as an approximate measure of
young students since financial constraints of fami-
lies were greatly faced by parents rather than by
young generations while still studying in high
schools. Since parents of high school students were
not surveyed to match their WTP measures and
those of high school students, the results of rela-
tively high WTPs for Microsoft Windows and for
Office of high school students need to be explained
with caution. WTPs for Microsoft Windows and for
Office were not inversely related to educational
levels.
Differences in demographical characteristics
among four groups of respondents were tested. All of
the variables were statistically different at 1% signif-
icance level except for the gender difference. This
result revealed that demographical characteristics
among subgroups were distinct. WTP measures of
Microsoft Windows and Office are statistically different
among respondents in subgroups.
Consumers’ Willingness to Pay for Non-pirated Software 719
TA
BLE
I
Dem
ogra
phic
alch
arac
teri
stic
sof
resp
onden
tsan
dW
TP
mea
sure
s
Hig
hsc
hool
studen
t
(n=
200)
Colleg
est
uden
t
(n=
200)
Gra
duat
est
uden
t
(n=
199)
Non-s
tuden
t
(n=
200)
All
(n=
799)
WT
Pfo
rW
indo
ws
(USD
)69.9
151.7
242.9
064.2
758.5
5
WT
Pfo
rO
ffice
(USD
)61.0
845.4
440.0
364.5
653.4
9
Gen
der
(%m
ale)
50.0
050.0
049.7
550.0
049.9
4
Mar
riag
e(%
mar
ried
)0.5
00.5
02.0
129.5
98.0
6
Aver
age
age
(yea
rs)
16.8
620.4
224.8
230.7
223.2
1
Month
lyper
sonal
expen
diture
(USD
)77.4
6197.1
5249.4
3383.2
5226.5
1
Edu
cation
alle
vel
(%)
Junio
rhig
hsc
hool
or
less
––
–0.5
00.1
3
Sen
ior
hig
hsc
hool
100.0
0–
–9.5
027.4
1
Colleg
e–
100.0
0–
66.0
041.5
5
Gra
duat
esc
hool
––
100.0
024.0
030.9
1
Exch
ange
rate
NT
D32.1
07
=U
SD
1(a
ver
age
month
lyex
chan
ge
rate
inJa
n.2006),
and
NT
D32.3
71
=U
SD
1(a
ver
age
month
lyex
chan
ge
rate
inFeb
.2006),
Cen
tral
Ban
kof
Chin
a,T
aiw
an
720 J. L. Hsu and C. W. Shiue
TA
BLE
II
Fac
tors
of
attitu
des
tow
ard
inte
llec
tual
pro
per
tyri
ghts
Item
sN
orm
ativ
e
susc
eptibility
Novel
ty
seek
ing
Val
ue
consc
iousn
ess
1.
Ifgover
nm
ent
pro
mulg
ates
the
import
ance
of
using
auth
ori
zed
soft-
war
e,I
will
choose
auth
ori
zed
softw
are
0.8
516
0.0
660
0.1
220
2.
Ifso
ftw
are
com
pan
ies
disse
min
ate
info
rmat
ion
of
the
import
ance
of
using
auth
ori
zed
softw
are,
Iw
ill
choose
auth
ori
zed
softw
are
0.7
845
0.0
841
0.1
289
3.
Ifm
yfa
mily
and
frie
ndsar
eaw
are
ofw
het
her
Iuse
auth
ori
zed
softw
are,
Iw
ill
choose
auth
ori
zed
softw
are
0.7
828
0.0
041
0.2
058
4.
Ifm
yfa
mily
and
frie
nds
pre
fer
using
auth
ori
zed
softw
are,
Iw
illch
oose
auth
ori
zed
softw
are
asw
ell
0.7
673
)0.0
504
0.2
017
5.
IfI
can
be
accr
edited
by
oth
ers
from
using
auth
ori
zed
softw
are,
Iw
ill
choose
auth
ori
zed
softw
are
0.7
497
0.1
099
0.0
816
6.
Ilike
totr
ydiffe
rent
kin
ds
of
new
softw
are
)0.1
603
0.7
887
)0.1
318
7.
Itis
extr
aord
inar
yto
try
new
lyissu
edau
thori
zed
softw
are
0.0
554
0.7
609
0.1
394
8.
Ilike
totr
yth
ela
test
ver
sion
of
new
lyissu
edau
thori
zed
softw
are
0.2
621
0.7
397
0.2
217
9.
Iin
tend
topurc
has
eau
thori
zed
softw
are
aslo
ng
asth
eco
stis
within
my
budget
0.0
689
0.0
461
0.7
996
10.
Ibel
ieve
auth
ori
zed
softw
are
isw
ort
hto
buy
0.2
343
0.0
058
0.7
382
11.
Ife
eldel
ighte
dto
purc
has
enew
lyissu
edau
thori
zed
softw
are
0.2
694
0.3
668
0.5
475
Var
iance
expla
ined
0.3
617
0.1
674
0.1
014
Cro
nbac
h’s
a0.8
636
0.6
710
0.5
939
Cum
ula
tive
var
iance
is63.0
5%
Consumers’ Willingness to Pay for Non-pirated Software 721
Results of factor analysis
Results of factorized attitudes toward intellectual
property rights are listed in Table II. Three factors
were considered to be appropriate to explain
respondents’ attitudes toward intellectual property
rights based on the results of scree plots and eigen-
values using principal components analysis. The
attitudes toward intellectual property rights could be
expressed in dimensions of normative susceptibility
(five variables), novelty seeking (three variables), and
value consciousness (three variables). Total variance
explained in three dimensions was 63.05%. For those
items with loadings less than 0.3 were excluded from
the analysis (two of novelty seeking and two of value
consciousness), and the underlying dimensions were
re-analyzed to get results that coincided with the
dimensional structure of intellectual property rights
in the literature. The reliability coefficient, Cron-
bach’s alpha, was utilized to measure the internal
consistency of the dimensions. The reliability coef-
ficients of normative susceptibility and of novelty
seeking were above or close to recommended level of
0.7, but of value consciousness was lower than 0.7.
Factors of respondents’ perceived risk are listed in
Table III. Three factors were considered to be
suitable to explain respondents’ perceived risk based
on the results of scree plots and eigenvalues using
principal components analysis. The consumer per-
ceived risk could be expressed in dimensions of
prosecution risk (five variables), performance risk
(five variables), and social risk (five variables). None
of the original statements developed in the ques-
tionnaire was deleted in factor analysis of consumer
perceived risk. Total variance explained in the three
dimensions was 73.98%. The value of Cronbach’s
alpha coefficient of each dimension was above 0.7,
indicating acceptable reliability on dimensions of
perceived risk in this study.
Results of Pearson correlation analysis
This research utilized Pearson correlation analysis to
test whether six hypotheses (H1–H6) could be
supported. Pearson correlation coefficients were
listed in Table IV. Results revealed that only nor-
mative susceptibility was statistically significant in all
subgroups. Hence, H1 (normative susceptibility
dimension is positively related to consumers’ WTP
for non-pirated software) was full supported.
The sensitivity of social norms seemed to have
strong positive influences on willingness-to-pay for
software products. The implication of significant
positive relationship between the factor of normative
susceptibility and WTP was that individuals’
behavior seemed to be affected by thoughts and
deeds of other people in the environment. When
friends and family members believed using pirated
software was not appropriate, respondents tended to
have relatively high WTPs.
The dimension of prosecution risk was statistically
insignificant at 10% significance level in all subgroups.
Consequently, H6 (prosecution risk dimension is
positively related to consumers’ WTP for non-pirated
software) was not supported. The risk of being pros-
ecuted upon using pirated software did not have sig-
nificant influences on willingness-to-pay for
authorized software products. The rationale behind
the insignificant relationship between the factor of
prosecution risk and WTP was that individuals who
used pirated software were not at a high risk of being
prosecuted. Firms who were fined for using pirated
software upon software authorization check-ups were
occasionally revealed in media. Individuals who were
fined due to pirated software installations were less
commonly happened. This result along with signifi-
cant positive normative susceptibility indicated that
social norms rather than prosecution risks were influ-
ential in respondents’ WTPs for software products.
For students (high school, college, and graduate
students), dimension of value consciousness posi-
tively influenced WTP for software products. For
non-student respondents, value consciousness did
not significantly increase WTP for software prod-
ucts. This result revealed that students who felt
authorized software products were valuable would
have relatively high WTPs. For respondents who
were not full-time students, the WTP of authorized
software was not significantly related to value con-
sciousness. Marketing strategies emphasizing product
value of authorized software could not significantly
increase WTP of non-student respondents.
Hypothesis H2 (value conscious dimension is posi-
tively related to consumers’ WTP for non-pirated
software) was partially supported in this study.
Dimension of novelty seeking measured how
innovative respondents were in purchasing and using
722 J. L. Hsu and C. W. Shiue
TA
BLE
III
Fac
tors
of
consu
mer
per
ceiv
edri
sk
Var
iable
sPro
secu
tion
risk
Per
form
ance
risk
Soci
al
risk
1.
Those
who
use
pir
ated
softw
are
may
be
pro
secu
ted
0.9
332
0.1
165
0.1
788
2.
Those
who
use
pir
ated
softw
are
may
be
fined
0.8
950
0.1
376
0.1
366
3.
Those
who
use
pir
ated
softw
are
may
be
arre
sted
0.8
868
0.1
009
0.1
571
4.
Those
who
use
pir
ated
softw
are
may
be
punished
acco
rdin
gto
law
san
dre
gula
tions
0.8
148
0.1
901
0.1
689
5.
Those
who
use
pir
ated
softw
are
may
be
agai
nst
law
san
dre
gula
tions
of
inte
llec
tual
pro
per
ty
rights
0.6
708
0.2
447
0.1
372
6.
Qual
ity
of
pir
ated
softw
are
isnot
good
0.1
128
0.8
679
0.1
701
7.
Pir
ated
softw
are
does
not
oper
ate
pro
per
ly0.1
298
0.8
172
0.0
593
8.
Pir
ated
softw
are
does
not
hav
eal
lfu
nct
ions
of
auth
ori
zed
softw
are
0.1
563
0.7
816
0.1
528
9.
Pir
ated
softw
are
cannot
be
repai
red
ifdam
aged
0.1
565
0.6
923
0.1
722
10.
Pir
ated
softw
are
cause
sco
mpute
rsnotw
ork
ing
pro
per
lydue
toitsin
com
pat
ibility
with
oth
er
softw
are
0.1
472
0.6
660
0.1
588
11.
My
fam
ily
and
frie
nds
will
hav
eneg
ativ
evie
ws
on
me
ifth
eyfind
out
that
Iuse
pir
ated
softw
are
0.1
143
0.1
675
0.9
190
12.
My
fam
ily
and
frie
nds
willbel
ieve
that
my
beh
avio
ris
agai
nst
the
soci
alnorm
ifth
eyfind
out
that
Iuse
pir
ated
softw
are
0.0
967
0.1
590
0.8
638
13.
My
fam
ily
and
frie
nds
will
kee
pm
ein
dista
nce
ifth
eyfind
out
that
Iuse
pir
ated
softw
are
0.0
736
0.0
769
0.8
032
14.
My
super
iors
will
talk
tom
ean
das
km
enot
toif
they
find
out
that
Iuse
pir
ated
softw
are
0.2
229
0.1
718
0.5
899
15.
Iw
ill
not
let
oth
ers
know
ifI
use
pir
ated
softw
are
0.2
357
0.1
521
0.5
890
Var
iance
expla
ined
0.4
173
0.1
680
0.1
545
Cro
nbac
h’s
a0.9
404
0.8
927
0.8
892
Cum
ula
tive
var
iance
is73.9
8%
Consumers’ Willingness to Pay for Non-pirated Software 723
TA
BLE
IV
Pea
rson
corr
elat
ion
coef
fici
ents
of
fact
ors
and
WT
Pm
easu
res
Norm
ativ
esu
scep
tibility
Novel
tyse
ekin
gV
alue
consc
iousn
ess
Pro
secu
tion
risk
Per
form
ance
risk
Soci
alri
sk
All
resp
onde
nts
WT
Pfo
rW
indo
ws
0.2
348
<0.0
001***
0.0
848
0.0
176**
0.2
020
<0.0
001***
)0.0
017
0.9
628
0.1
911
<0.0
001***
0.1
693
<0.0
001***
WT
Pfo
rO
ffice
0.2
667
<0.0
001***
0.0
858
0.0
162**
0.2
038
<0.0
001***
0.0
050
0.8
878
0.2
118
<0.0
001***
0.1
790
<0.0
001***
Hig
hsc
hool
stude
nts
WT
Pfo
rW
indo
ws
0.1
774
0.0
141**
0.0
980
0.1
772
0.2
700
0.0
002***
0.0
907
0.2
062
0.0
586
0.4
144
0.1
677
0.0
188**
WT
Pfo
rO
ffice
0.2
800
<0.0
001***
0.0
755
0.2
968
0.2
370
0.0
009***
0.0
938
0.1
888
0.0
858
0.2
293
0.1
743
0.0
141**
Col
lege
stude
nts
WT
Pfo
rW
indo
ws
0.1
921
0.0
070***
0.0
604
0.4
001
0.2
272
0.0
014***
0.0
229
0.7
477
0.3
110
<0.0
001***
0.1
599
0.0
237**
WT
Pfo
rO
ffice
0.2
216
0.0
018***
0.0
228
0.7
510
0.2
592
0.0
002***
)0.0
083
0.9
072
0.3
388
<0.0
001***
0.1
366
0.0
538*
Gra
duat
esc
hool
stude
nts
WT
Pfo
rW
indo
ws
0.3
138
<0.0
001***
)0.0
543
0.4
461
0.1
207
0.0
895*
0.0
408
0.5
668
0.1
851
0.0
088***
0.1
490
0.0
357**
WT
Pfo
rO
ffice
0.2
487
0.0
004***
)0.0
444
0.5
339
0.1
346
0.0
580*
0.0
611
0.3
912
0.2
277
0.0
012***
0.1
282
0.0
712*
Non
-stu
dents
WT
Pfo
rW
indo
ws
0.2
460
0.0
005***
0.1
040
0.1
467
0.0
791
0.2
702
)0.1
167
0.1
026
0.2
051
0.0
038***
0.1
078
0.1
316
WT
Pfo
rO
ffice
0.2
098
0.0
031***
0.1
921
0.0
068***
0.0
795
0.2
670
)0.1
010
0.1
567
0.1
953
0.0
058***
0.1
212
0.0
891*
***
Indic
ates
the
stat
istica
lly
signifi
cant
at1%
signifi
cance
level
;**
indic
ates
the
stat
istica
lly
signifi
cant
at5%
signifi
cance
level
;*
indic
ates
the
stat
istica
lly
signifi
cant
at10%
signifi
cance
level
724 J. L. Hsu and C. W. Shiue
new software products. Although novelty seeking
was positively related to WTPs of software products
for all respondents, the correlation coefficients were
relatively small (about .08). This result indicated that
even for those respondents who would be attracted
by innovativeness of software products, the WTPs
might not be significantly increased. For non-stu-
dent respondents, WTP for Microsoft Office was
positively correlated to novelty seeking. The inno-
vativeness of Microsoft Office that was attracted to
non-student respondents may reflect the multi-
purpose designs of Microsoft Office fulfilled the need
of novelty seeking of users who were no longer full-
time students. Students mainly use Microsoft Office for
assignments and may not be willing to pay for
innovativeness of the software products. Hypothesis
H3 (novelty seeking dimension is positively related
to consumers’ WTP for non-pirated software) was
partially supported.
Dimensions of performance risk significantly in-
creased WTPs for software products except for high
school students. For respondents who felt pirated
software did not function as well as authorized
products, the WTPs would be significantly higher.
High school students had not used software products
as long as college or graduate students and might not
take performance risk seriously. For non-student
respondents, performance of software products may
affect personal usage of computers and work. Hence,
performance risk was positively correlated to WTPs
for non-student respondents. Hypothesis H4 (per-
formance risk dimension is positively related to
consumers’ WTP for non-pirated software) was not
totally supported in this study.
Social risk would increase WTPs of software
products. For non-student respondents, the correla-
tion coefficients of social risk and WTPs for software
products were relatively small in magnitudes. Stu-
dents seemed to be affected by social risk and would
be willing to pay more for authorized software
products. Hypothesis H5 (social risk dimension is
positively related to consumers’ WTP for non-pi-
rated software) was generally supported in this study.
Cluster analysis of WTP for non-pirated software
This research utilized cluster analysis to segment
respondents into high-WTP and low-WTP clusters
in order to examine how dimensions of attitudes
toward intellectual property rights and consumer
perceived risk affected respondents’ willingness to
pay for non-pirated software. Factors of attitudes
toward intellectual property rights (normative sus-
ceptibility, novelty seeking, and value consciousness)
and of consumer perceived risk (prosecution risk,
performance risk, and social risk), and WTP mea-
sures for Windows and Office were used in clustering
procedure. The number of Cubic Clustering
Criteria (CCC) of the two-cluster solution was
31.48. Since CCC was higher than three, the two-
cluster solution was considered suitable for grouping
respondents into clusters.
The mean values of WTP in sub-datasets of dif-
ferent clusters were listed in Table V. Mean values of
WTP measures in the high-WTP cluster were sig-
nificantly higher than those measures of low-WTP
cluster at 1% significance level. More high school
students and non-student respondents were included
in the high-WTP cluster if sub-datasets were taken
into considerations. Low-WTP cluster included
more college and graduate students. While consid-
ering respondents in sub-datasets, high school
students in the high-WTP cluster had the highest
WTP measures, followed by college students and
non-student respondents. However, even for
respondents in the high-WTP cluster, the WTP
measures were much lower than the suggested retail
prices of USD 214.59 for Microsoft Windows and of
USD 170.99 for Microsoft Office. These results needed
to be explained with caution. High school respon-
dents surveyed in this study were consumers who
had not taken full financial responsibilities. The
reason high school students’ WTP measures higher
than college and graduate students could be due to
the fact that certain universities in Taiwan provided
funding for site license for current students to install
in personal computers. The real prices of Microsoft
Windows and of Microsoft Office faced by college and
graduate students would not be as high as suggested
retail prices.
More respondents were grouped in the second
cluster of low-WTP (452) than those in the first
cluster of high-WTP (347) as indicated in Table VI.
Slightly more respondents in the high-WTP cluster
were male and married than those in the low-WTP
cluster. The average age and monthly personal
expenditure among two clusters were not statistically
Consumers’ Willingness to Pay for Non-pirated Software 725
significant. Educational levels of respondents in the
low-WTP cluster were higher with more than
three-fourths of them with college education or
above. Since about three-fourths of respondents
were full-time students (high school, college, and
graduate students) by the time the survey was
administered, the occupations of respondents in two
clusters consisted of relatively high percentages of
students.
The willingness-to-pay for software products was
significantly higher for respondents in the high-
WTP cluster than those in the low-WTP cluster.
For those respondents in the high-WTP cluster who
installed pirated copies of Microsoft Windows or
Microsoft Office, their willingness-to-pay was lower
than it of those respondents in the same cluster using
copyrighted versions. Respondents in the low-WTP
cluster would be willing to pay limited amount of
money for software products, for those using either
copyrighted or pirated versions. In sum, willingness-
to-pay for Microsoft Windows and Microsoft Office was
relatively low, partly reflected that in the market,
pirated software products were easy to obtain and
users seemed to be reluctant to pay for the copy-
righted software products at full prices even they had
once purchased and installed copyrighted versions.
Due to sampling methods used in this study, high
school students may not reveal personal WTPs while
taking personal financial constraints into consider-
ations. Further analysis was done to examine WTPs
in high- and low-clusters without respondents of
high school respondents. The results are listed in
appendix table. Compared to WTP measures of all
respondents, deleting respondents of high school
students did not change WTPs at a large extent.
Reduction of WTPs in high-WTP cluster was larger
than reduction of WTPs in low-WTP cluster from
deleting respondents of high school students.
Factor means of normative susceptibility, novelty
seeking, value consciousness, prosecution risk, per-
formance risk, and social risk for respondents in
high-WTP cluster were significantly higher than
respective factor means in low-WTP cluster. The
results revealed that for those respondents who were
less affected by social norms and risk factors would
be willing to pay less for authorized versions of
software products.
Computer software usage patterns of respondents
in two clusters are listed in Table VII. Respondents
segmented into the low-WTP cluster were more
likely to use pirated software than those in high-
WTP group. In the high-WTP cluster, more than
70% of respondents had tendencies to purchase non-
pirated software (above 50% in purchasing inten-
tions, 48.70 + 15.56 + 9.51 = 73.77), and over
60% of respondents used non-pirated Windows and
Office at the time survey was conducted (76.37% and
61.16%, respectively). In the low-WTP cluster,
TABLE V
Mean values of WTP for Windows and Office
Variables High WTP cluster Low WTP cluster
High School Students (n = 102) (n = 98)
Mean WTP for Windows 109.82 30.00
Mean WTP for Office 94.75 26.72
College Students (n = 71) (n = 129)
Mean WTP for Windows 97.71 26.41
Mean WTP for Office 85.30 23.51
Graduate Students (n = 58) (n = 141)
Mean WTP for Windows 78.79 28.14
Mean WTP for Office 71.00 27.30
Non-students (n = 116) (n = 84)
Mean WTP for Windows 88.32 31.64
Mean WTP for Office 86.50 34.53
Exchange rate NTD 32.107 = USD1 (average monthly exchange rate in Jan. 2006), and NTD 32.371 = USD 1 (average
monthly exchange rate in Feb. 2006), Central Bank of China, Taiwan
726 J. L. Hsu and C. W. Shiue
close to 70% of respondents revealed that they
did not have intentions to choose non-pirated
software (below 50% in purchasing intentions,
18.14 + 24.34 + 26.77 = 69.25), and less than half
of respondents in this cluster currently used
non-pirated software. Less than 10% and 2% of
respondents in high-WTP and low-WTP, respec-
tively, indicated that they would purchase non-pi-
rated software for sure. The results revealed that
respondents would use pirated software products to
substitute copyrighted products. The higher the
intention to purchase non-pirated software for the
next purchase, the lower the substitution of pirated
to copyrighted software products.
TABLE VI
Demographic characteristics and WTP measures by clusters
High-WTP cluster
(n = 347)
Low-WTP cluster
(n = 452)
Test p-value
WTP for Windows 94.78 28.71 24.1400a 0.0001***
For those who installed copyrighted version 98.40 30.01 18.5800a 0.0001***
For those who installed pirated version 83.35 27.48 10.5500 a 0.0001***
WTP for Office 85.98 27.44 24.8200a 0.0001***
For those who installed copyrighted version 92.77 28.74 17.2100a 0.0001***
For those who installed pirated version 75.91 26.68 14.4700a 0.0001***
Factor means (standardized)
Normative susceptibility 0.56 )0.42 15.6100a 0.0001***
Novelty seeking 0.12 )0.09 3.0300a 0.0025***
Value consciousness 0.32 )0.24 8.1300a 0.0001***
Prosecution risk 0.12 )0.09 3.0200a 0.0026***
Performance risk 0.36 )0.28 9.9900a 0.0001***
Social risk 0.41 )0.32 11.4100a 0.0001***
Gender (% of male) 55.09 43.23 11.0462b 0.0009***
Marriage (% of married) 11.01 5.79 7.1840b 0.0074***
Average age 23.63 22.88 1.6100a 0.1068
Monthly personal expenditure (USD) 229.70 224.01 0.4000a 0.6896
Educational level (%) 31.1600b 0.0006***
Junior high school or less 0.29 0.00 – –
Senior high school 33.72 22.57 – –
College 41.21 41.81 – –
Graduate school 24.78 35.62 - -
Occupation (%) 30.4538b 0.0002***
Public/Military/Education 8.93 4.65 – –
Industry 2.31 2.43 – –
Business 7.78 3.76 – –
Housewife 1.44 0.22 – –
Self-employed 1.44 1.55 – –
Services 7.78 3.98 – –
Students 66.57 81.42 – –
Unemployed 0.29 0.88 – –
Others 3.46 1.11 – –
Monthly personal expenditure and WTP measures for Windows and for Office are in USD
The exchange rate (NTD/USD) was 32.107 in January, 2006 and 32.371 in February, 2006a t-test statistics; bChi-square statistics
*** indicates the statistically significant at 1% significance level; ** indicates the statistically significant at 5% significance
level; * indicates the statistically significant at 10% significance level
Consumers’ Willingness to Pay for Non-pirated Software 727
TABLE VII
Computer software usage patterns of respondents by clusters
High WTP Low WTP v2 test p-value
Usage preferences: Pirated software (%) 40.29 75.66 102.3172 0.0001***
Non-pirated software purchasing intention (%) 170.3246 0.0001***
0% 2.31 18.14 – –
20% 9.51 24.33 – –
40% 14.41 26.77 – –
60% 48.70 26.11 – –
80% 15.56 2.88 – –
100% 9.51 1.77 – –
Software installed (%)
Non-pirated Windows 76.37 49.67 58.9267 0.0001***
Non-pirated Office 61.16 34.44 56.1009 0.0001***
Types of pirated software commonly used (%)
OS 34.58 58.63 45.4617 0.0001***
Editing software 40.35 57.74 23.7664 0.0001***
Web design 9.22 11.95 1.5176 0.2180
System development 1.15 6.42 13.7332 0.0002***
Graphic design 21.90 32.52 11.0039 0.0009***
Anti-virus 27.38 48.00 35.1063 0.0001***
Language translation 20.75 28.98 7.0209 0.0081***
Statistics 4.03 10.62 11.8919 0.0006***
Game/Entertainment 49.86 52.88 0.7169 0.3972
Multimedia 20.75 34.07 17.1735 0.0001***
Communications 9.22 16.15 8.2556 0.0041***
Others 0.58 3.54 7.8287 0.0051***
Channels (%)
Family and friends 66.57 73.23 4.1543 0.0415**
Download via Internet 55.23 71.68 23.1030 0.0001***
Internet auction 1.45 2.21 0.6085 0.4354
Road side stand/night markets 6.10 3.54 2.8992 0.0886*
Shops 4.36 2.43 2.2953 0.1298
Others 0.58 1.33 1.0927 0.2959
Considering factors in choosing software (%)
Price 82.13 83.41 0.2245 0.6357
Convenience 63.11 68.14 2.2112 0.1370
Source reliability 43.22 23.67 34.4035 0.0001***
Up-to-date 26.80 29.42 0.6661 0.4144
Legitimacy 40.63 17.70 51.6045 0.0001***
Technological support 60.80 51.99 6.1862 0.0129**
Free update 62.25 65.04 0.6649 0.4148
Customer service 61.67 40.04 36.7314 0.0001***
Gifts 8.93 11.73 1.6265 0.2022
Others 1.72 3.09 1.5058 0.2198
*** indicates the statistically significant at 1% significance level; ** indicates the statistically significant at 5% significance
level; * indicates the statistically significant at 10% significance level
728 J. L. Hsu and C. W. Shiue
For a variety of software, more respondents in the
low-WTP cluster used pirated software. Popular
pirated software includes OS, editing software,
graphic design, anti-virus, game/entertainment, and
multimedia. The vest majority of respondents
obtained pirated software from family and friends as
well as through Internet downloading.
Price seemed to be the most important factor for
respondents in software purchasing decisions that
more than 80% of respondents would consider it,
either in high-WTP or low-WTP clusters. In gen-
eral, price is a factor that cannot be ignored in
consumer purchasing decisions. The results of hav-
ing insignificant differences of the price factor be-
tween respondents in low-WTP and in high-WTP
indicated that price was important overall but was
not the factor that could be used to distinguish
respondents of low-WTP or high-WTP clusters.
Source reliability, legitimacy, technical support, and
customer service were emphasized by respondents in
the high-WTP cluster, but did not seem to be
important for respondents in the low-WTP cluster.
In sum, software piracy has become a phenomenon
in Taiwan. Consumers used a variety of pirated
software and less than 10% of respondents indicated
they would purchase non-pirated software for the
next purchases for sure. The WTP of respondents
for Microsoft Windows and Office were much lower
than the suggested retail prices in the market.
Enhancing consumers’ attitudes toward intellectual
property rights and perceived risk would increase the
dollar amount of WTP for Microsoft Windows and
Office. However, due to the easiness of downloading
pirated software from Internet and sharing with
others, software piracy issue could be hard to resolve.
Conclusion remarks
Conclusion
Usage of pirated software is a serious problem
worldwide and has become more difficult to deal
with due to the easiness in duplicating copyrighted
products. This study analyzed factors affecting
consumers’ willingness to pay for non-pirated
computer software. The willingness-to-pay was
estimated for authorized copies of Microsoft Win-
dows and Microsoft Office to reveal the value con-
sumers assessed these two commonly used software
products. Surveys were administered in Taipei,
Taiwan, and respondents were senior high school
students, college students, graduate students, and
general consumers who were no longer full-time
students.
Results of this study revealed that average WTPs
for software products were much lower than sug-
gested retail prices, indicating that users did not
value authorized software products as high as
market price. Social norms had strong positive
influences on willingness-to-pay for software
products. Individuals’ behavior of pirated product
usage seemed to be affected by beliefs of other
people in the environment. Respondents tended to
have relatively high WTPs when they thought
friends and family members would consider using
pirated software inappropriate. Students who were
affected by social risk would be willing to pay more
for authorized software products. The prosecution
risk did not significantly increase WTPs for soft-
ware products due to the reason that individuals
who used pirated software were not at a high risk
of being prosecuted in reality. Performance risk was
positively correlated to WTPs for software prod-
ucts. Furthermore, innovativeness of software
products did not increase WTPs for software
products at a large extent.
Respondents were segmented into high-WTP
and low-WTP clusters in order to examine differ-
ences in respondents’ willingness to pay for non-
pirated software. Respondents in the high-WTP
cluster were influenced by factors of normative
susceptibility, novelty seeking, value consciousness,
prosecution risk, performance risk, and social risk at
a larger extent than respondents in low-WTP clus-
ter. However, even for respondents in the high-
WTP cluster, the WTPs were much lower than
suggested retail prices of software products. For
those respondents in the high-WTP cluster who
installed pirated copies of Microsoft Windows or
Microsoft Office, the WTPs were lower than it of
respondents in the same cluster using copyrighted
versions. More than 70% of respondents in the high-
WTP cluster had tendencies to purchase non-pirated
software. In the low-WTP cluster, close to 70% of
respondents revealed that they did not have inten-
tions to choose non-pirated software.
Consumers’ Willingness to Pay for Non-pirated Software 729
The vast majority of respondents indicated price
was the factor while choosing software products.
Source reliability, legitimacy, technical support, and
customer service were emphasized by respondents in
the high-WTP cluster but not for respondents in the
low-WTP cluster. Due to the easiness of obtaining
pirated software and limited willingness to pay for
authorized software products, software piracy issue
could be persistent in Taiwan.
Implications
The willingness-to-pay measures of Microsoft Win-
dows and Office provided an estimation of values
consumers assess these two commonly used soft-
ware products. Four subgroups of respondents
(high school students, college students, graduate
students, and non-student consumers) were sur-
veyed in this study to reduce the limitations of
research applicability. Managerial implications based
on the findings of this study are listed in the fol-
lowing:
1. Software firms may need to cooperate with
government administration to establish edu-
cational programs to emphasize importance
and legitimacy of using authorized software.
Long-term consumer education is essential in
enhancing positive attitudes toward copy-
righted software products.
2. The market prices seem to be much higher
than what consumers value these two prod-
ucts. Lowering prices may be a way to re-
duce piracy levels in addition to applying
price discrimination in segmented markets.
An alternative that software companies could
utilize is to issue trial versions for users at
limited time. Since performance risk could
be emphasized in marketing authorized soft-
ware products, users who have tried non-pi-
rated software may be willing to pay for full-
version software.
3. Source reliability and customer services are
what consumers of relatively high willing-
ness-to-pay for software products emphasize.
Computer firms may utilize information
marketing strategies to strengthen the reli-
ability of copyrighted products as well as
quality customer services to increase the
willingness-to-pay for authorized software
products.
Limitations and further research
Limitations of this study are that only one particular
product category, computer software, is included as
research objects, and only the payment card method
is applied to measure WTPs for software products.
Certain biasedness may be introduced due to the
sampling methods and clandestine issue respondents
had to face in surveys. Further research needs to
broaden product selections to include other pirated
products as well as using other contingent valuation
methods in measuring willingness-to-pay for
authorized products.
A certain percentage of respondents did not
have purchase experiences of authorized software
product. Hence, the purchasing prices of autho-
rized software could not be revealed. This limits
the applicability of the research findings. The
suggested retail prices could only be compared
with WTP measures, but not with real purchased
prices of software products paid by respondents.
Further research may need to find out the dollar
amount respondents paid for software products to
be used as a measure of costs for the software
product usage.
Cultural values can be influential in decisions of
whether to use pirated software. According to Wang
et al. (2005), collectivism could have impacts on
usage of pirated products. Further research may need
to incorporate distinct dimensions of cultural values
in measuring WTP to reveal cultural influences on
software piracy. In this study, the survey was con-
ducted in Taiwan. Further research may need to
conduct surveys in different countries to examine
cross-cultural differences in WTP measures and pi-
rated software usage patterns.
Acknowledgements
This research was partially supported by Grant (NSC
94-2416-H-005-005) from National Science Council in
Taiwan.
730 J. L. Hsu and C. W. Shiue
References
Alberts-Miller, N. D.: 1999, ‘Consumer Misbehavior:
Why People Buy Illicit Goods’, Journal of Consumer
Marketing 16, 273–287.
Ang, S. H., P. S. Cheng, E. A. C. Lim and S. K.
Tambyah: 2001, ‘Spot the Difference: Consumer
Responses Towards Counterfeits’, Journal of Consumer
Marketing 18, 219–235.
Block, P. H., R. F. Bush and L. Campbell: 1993,
‘Consumer ‘‘Accomplices’’ in Product Counterfeiting:
A Demand-Side Investigation’, Journal of Consumer
Marketing 10, 27–36.
Boccaletti, S. and M. Nardella: 2000, ‘Consumer Will-
ingness to Pay for Pesticide-Free Fresh Fruit and
Vegetable in Italy’, International Food and Agribusiness
Management Review 3, 297–310.
Business Software Alliance: 2006, http://www.bsa.org/
[On-line].
Central Bank of China, Taiwan: 2006, http://
www.cbc.gov.tw/default.asp [On-line].
Chen, Y. and I. Png: 1999, ‘Software Pricing and
Copyright Enforcement: Private Profit vis-a-vis Social
Welfare’, Proceedings of the Twentieth International
Conference on Information Systems, (Association for
Information Systems, North Carolina), pp. 119–123.
Cheng, H. K., R. R. Sims and H. Teegen: 1997, ‘To
Purchase or to Pirate Software: An Empirical Study’,
Journal of Management Information Systems 13, 49–60.
Chiou, J.-S., C. Huang and H. Lee: 2005, ‘The Ante-
cedents of Music Piracy Attitudes and Intentions’,
Journal of Business Ethics 57, 161–174.
Eining, M. M. and A. L. Christensen: 1991, ‘A Psycho-
social Model of Software Piracy: The Development
and Test of a Model’, in R. Dejoie, G. Fowler and D.
Paradice (eds.), Ethical Issues in Information Systems
(Boyd Boston Fraser Publishing Company, Massa-
chusetts), pp. 182–188.
Fraedrich, J. P. and O. C. Ferrell: 1992, ‘The Impact of
Perceived Risk and Moral Philosophy Type on Ethical
Decision Making in Business Organizations’, Journal of
Business Research 24, 283–295.
Fu, T.-T., J.-T. Liu and J. K. Hammitt: 1999, ‘Consumer
Willingness to Pay for Low-Pesticide Fresh Produce in
Taiwan’, Journal of Agricultural Economics 50, 220–233.
Homburg, C., N. Koschate and W. D. Hoyer: 2005,
‘Do Satisfied Customers Really Pay More? A Study
of the Relationship Between Customer Satisfaction
and Willingness to Pay’, Journal of Marketing 69, 84–
96.
International Intellectual Property Alliance, 2007 Special
301 Report, Taiwan, http://www.iipa.com/rbc/2007/
2007SPEC301TAIWAN.pdf [On-line].
Krystallis, A. and G. Chryssohoidis: 2005, ‘Consumers’
Willingness to Pay for Organic Food: Factors that
Affect It and Variation per Organic Product Type’,
British Food Journal 107, 320–343.
Leonard, L. N. K. and T. P. Cronan: 2005, ‘Attitude
Toward Ethical Behavior in Computer Use: A Shifting
Model’, Industrial Management & Data Systems 105,
1150–1171.
Logsdon, J. M., J. K. Thompson and R. A. Reid: 1994,
‘Software Piracy: Is It Related to Level of Moral
Judgment?’, Journal of Business Ethics 13, 849–857.
Appendix
TABLE
WTP measures by clusters without respondents of high school students
High-WTP cluster
(n = 244)
Low-WTP cluster
(n = 355)
t test p-value
WTP for Windows 89.24 28.10 18.3800 0.0001***
For those who installed copyrighted version 92.20 29.16 15.3200 0.0001***
For those who installed pirated version 80.47 27.19 9.9100 0.0001***
WTP for Office 82.78 27.46 19.1700 0.0001***
For those who installed copyrighted version 87.78 27.58 14.1500 0.0001***
For those who installed pirated version 75.95 27.31 13.2100 0.0001***
Monthly personal expenditure and WTP measures for Windows and for Office are in USD
The exchange rate (NTD/USD) was 32.107 in January, 2006 and 32.371 in February, 2006
*** p < 0.01, ** p < 0.05, * p < 0.1
Consumers’ Willingness to Pay for Non-pirated Software 731
McDonald, G. and C. Roberts: 1994, ‘Product Piracy:
The Problem that Will not Go Away’, Journal of Product
and Brand Management 3, 55–65.
Moores, T. and G. Dhillon: 2000, ‘Software Piracy: A
View from Hong Kong’, Communications of the ACM
43, 88–93.
Papadopoulos, T.: 2004, ‘Pricing and Pirate Product
Market Formation’, Journal of Product and Brand
Management 13, 56–63.
Peter, J. P. and M. J. Ryan: 1976, ‘An Investigation of
Perceived Risk at the Brand Level’, Journal of Marketing
Research 13, 184–188.
Retting, S. and H. E. Rawson: 1963, ‘The Hypothesis in
Predictive Judgments of Unethical Behavior’, Journal of
Abnormal and Social Psychology 66, 243–248.
Roselius, T.: 1971, ‘Consumer Rankings of Risk
Reduction Methods’, Journal of Marketing 35, 56–61.
Siegfried, R. M.: 2004, ‘Student Attitudes on Software
Piracy and Related Issues of Computer Ethics’, Ethics
and Information Technology 6, 215–222.
Skuras, D. and A. Vakrou: 2002, ‘Consumers’ Willing-
ness to Pay for Origin Labelled Wine: A Greek Case
Study’, British Food Journal 104, 898–912.
Swinyard, W. R., H. Rinne and A. K. Kau: 1990, ‘The
Morality of Software Piracy: A Cross-Cultural Anal-
ysis’, Journal of Business Ethics 9, 655–664.
Tan, B.: 2002, ‘Understanding Consumer Ethical Deci-
sion Making with Respect to Purchase of Pirated
Software’, Journal of Consumer Marketing 19, 96–111.
Tang, J.-H. and C.-K. Farn: 2005, ‘The Effect of Inter-
personal Influence on Softlifting Intention and
Behaviour’, Journal of Business Ethics 56, 149–161.
Taylor, J. W.: 1974, ‘The Role of Risk in Consumer
Behavior’, Journal of Marketing 38, 54–60.
Taylor, G. S. and J. P. Shim: 1993, ‘A Comparative
Examination of Attitudes Toward Software Piracy
among Business Professors and Executives’, Human
Relations 46, 419–433.
Wang, C.-C.: 2005, ‘Factors that Influence the Piracy of
DVD/VCD Motion Pictures’, Journal of American
Academy of Business 6, 231–237.
Wang, F., H. Zhang, H. Zang and M. Ouyang: 2005,
‘Purchasing Pirated Software: An Initial Examination
of Chinese Consumers’, Journal of Consumer Marketing
22, 340–351.
Wee, C.-H., S.-J. Tan and K.-H. Cheok: 1995, ‘Non-
price Determinants of Intention to Purchase Coun-
terfeit Goods: An Exploratory Study’, International
Marketing Review 12, 19–46.
Wertenbroch, K. and B. Skiera: 2002, ‘Measuring Con-
sumers’ Willingness to Pay at the Point of Purchase’,
Journal of Marketing Research 39, 228–241.
Whiteman, M. E., A. M. Townsend, A. R. Hendrickson
and R. B. Rensvold: 1998, ‘Computer Aversion and
Computer-Use Ethics in U.S. and Asian Cultures’,
Journal of Computer Information Systems 38, 19–24.
Jane L. Hsu and Charlene W. Shiue
Department of Marketing,
National Chung Hsing University,
250 Kuo Kuang Road, Taichung, 40227, Taiwan,
Republic of China
E-mail: [email protected]
732 J. L. Hsu and C. W. Shiue