THE IMPLEMENTATION OF SOCIAL 
COGNITIVE THEORY IN THE 
UNDERSTANDING OF THE 
UNAUTHORISED COPYING OF 
SOFTWARE 
 
 
 
Alethea Wentzell 
0205317T 
March 2008 
 
 
 
A Research Report submitted to the Faculty of Humanities, University of the 
Witwatersrand, Johannesburg, in partial fulfilment of the requirements for the 
degree Master of Arts by Coursework and Research Report in the Field of 
Industrial Psychology. 
ii 
 
DECLARATION 
 
I hereby declare that this research report is my own unaided work, except where due 
acknowledgement is made to others. It is being submitted in partial fulfillment for the degree 
of Master of Arts by Coursework and Research Report in the field of Industrial Psychology at 
the University of the Witwatersrand, Johannesburg. It has not been submitted for any degree 
or examination to any other university. 
 
 
 
 
 
 
 
 
_____________________________________ 
 
Alethea Wentzell 
 
________________________________________ 
Date 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
iii 
 
ABSTRACT 
 
Bandura?s (1986) Social Cognitive Theory (SCT) embraces an interactional model of 
causation in which environmental events, personal factors and behaviour all operate as 
interacting determinants of each other. This study aims to develop a model that predicts and 
explains incidents of unauthorised copying of software using SCT. To do this, the current 
study explored the relationship between attitudes, self-efficacy and social norms, with an 
individual?s intention to copy software illegally. In addition, moral disengagement was 
considered as a mediator of the relationship.  
 
The study was conducted within one medium-sized South African Information Technology 
(IT) organisation, and one department of a large South African production organisation, 
within the surrounding Johannesburg area. In addition, a sample was also collected from four 
Zambian banking industries. The researcher received responses from 217 participants from 
across the organisations.  
 
Firstly the relationship between attitudes, self-efficacy and social norms with regard to 
intentions were analysed, by using correlations. The results of the correlation indicated that 
there is a significant positive relationship between each of the variables and intention to the 
unauthorised copying of software. The model predicted by the researcher is then tested 
empirically according to Structural Equation Modelling (SEM). The results of the SEM 
presented the researcher with four models, which will each be discussed independently, as 
well as suggesting the model that best fits the data. A discussion of the findings is presented, 
in addition to the limitations of the study and possible recommendations for improvement. 
 
iv 
 
AKNOWLEDGEMENTS 
 
I would like to express my thanks and appreciation to the following people: 
 
My supervisor, Professor Andrew Thatcher, for his unconditional support, guidance and 
patience he has shown me throughout the year. 
 
And to my family, for giving me the opportunity to pursue my dreams. Thanks for all your 
love and support. I love you all!  
 
My ?Boo?, thank you for being a source of encouragement and comfort when things seemed 
out of my control.  
 
All the people in the organisations, especially Patrick Jarvis, who made the distribution and 
collection of my questionnaires possible, as well as the people who took the time to complete 
them. 
 
And finally sincere thanks to my friend Bernadette King, your encouragement and craziness 
kept me going. 
 
 
 
 
 
 
 
 
 
v 
 
TABLE OF CONTENTS 
          
                                      PAGE 
 
DECLARATION......................................................................................................................ii 
ABSTRACT.............................................................................................................................iii 
ACKNOWLEDGEMENTS....................................................................................................iv 
TABLE OF CONTENTS.........................................................................................................v 
LIST OF TABLES AND FIGURES....................................................................................viii 
 
CHAPTER ONE 
 INTRODUCTION..........................................................................................................1 
 
 
CHAPTER TWO 
 LITERATURE REVIEW...............................................................................................6 
 2.1. Past Research in the Unauthorised Copying of Software........................................8 
 2.2. Social Cognitive Theory (SCT).............................................................................11 
 2.3. Self-Efficacy..........................................................................................................15 
 2.4. Moral Disengagement...........................................................................................18 
 2.5. Research Questions...............................................................................................30 
 
 
CHAPTER THREE 
 METHODS...................................................................................................................32 
 3.1. Research Design....................................................................................................32 
 3.2. Sample...................................................................................................................33 
 3.3. Procedures.............................................................................................................42 
 3.4. Instruments and Measures 
 3.4.1. General Biographical Questionnaire...........................................................43 
 3.4.2. Attitudes towards the Unauthorised Copying of Software Scale................43 
vi 
 
 3.4.3. Self-Efficacy in the Unauthorised Copying of Software Scale..................45 
 3.4.4. Social Norms in the Unauthorised Copying of Software Scale.................46 
 3.4.5. Intentions in the Unauthorised Copying of Software Scale.......................47 
 3.4.6. Moral Disengagement to the Unauthorised Copying of Software Scale...48 
 3.5. Analysis 
 3.5.1. Preliminary Analysis..................................................................................49 
 3.5.2. Exploratory Analysis...................................................................................50 
 3.6. Ethical Considerations...........................................................................................54 
 
 
CHAPTER FOUR 
 ANALYSIS..................................................................................................................55 
 4.1. Preliminary Analysis 
 4.1.1. Means, Frequencies and Internal Reliability Analysis................................55 
 4.2. Exploratory Analysis 
 4.2.1. Correlations.................................................................................................57 
 4.2.2. Exploratory Factor Analysis........................................................................60 
 4.2.3. Structural Equation Modelling (SEM)........................................................66 
 
 
CHAPTER FIVE 
 DISCUSSION 
 5.1. Discussion of Results............................................................................................77 
 5.2. Limitations.............................................................................................................86 
 5.3. Directions for Future Research..............................................................................90 
 
 
CHAPTER SIX 
 CONCLUSION............................................................................................................91 
 
 
REFERENCE LIST...............................................................................................................92 
 
 
vii 
 
APPENDIX 1- ORGANISATIONAL INFORMATION SHEET........................................101 
APPENDIX 2- PARTICIPANT INFORMATION SHEET.................................................102 
APPENDIX 3- QUESTIONNAIRE......................................................................................103 
SECTION 1 - BIOGRAPHICAL QUESTIONNAIRE 
SECTION 2 - MORAL DISENGAGEMENT 
SECTION 3 - SELF-EFFICACY 
SECTION 4 - INTENTIONS 
SECTION 5 - SOCIAL NORMS 
SECTION 6 ? ATTITUDES 
APPENDIX 4- SELF-EFFICACY IN THE UNAUTHORISED COPYING OF  
SOFTWARE SCALE WITH THREE DIMENSIONS..................................110 
APPENDIX 5- MORAL DISENGAGEMENT TO UNAUTHORISED COPYING OF 
  SOFTWARE SCALE.....................................................................................111 
 
  
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
viii 
 
LIST OF FIGURES AND TABLES          PAGE 
 
FIGURE 1: Determinants in Triadic Reciprocal Determinism............................................12 
FIGURE 2: Mechanisms of Moral Disengagement.............................................................20 
FIGURE 3: Standard Mediation Model................................................................................28 
FIGURE 4: Proposed Theoretical Model Presented for the Study.......................................29 
FIGURE 5: Structural Equation Model 1.............................................................................69  
FIGURE 6: Structural Equation Model 2.............................................................................71 
FIGURE 7: Structural Equation Model 3.............................................................................73 
FIGURE 8: Structural Equation Model 4.............................................................................75 
TABLE 1: Frequencies and Percentages of Participants? Age Group................................36 
TABLE 2: Frequencies and Percentages of Participants? Gender, Race, 
Education, Occupation and Department............................................................39 
TABLE 3: Frequencies and Percentages of Participants? Computer Usage.......................41 
TABLE 4: Mean, Standard Deviation, Minimum and Maximum, Skewness and  
 Kurtosis and Internal Consistency Reliabilities of Instruments........................56 
TABLE 5: Pearson?s Correlations for IV?s, DV and Mediating Variables........................59 
TABLE 6: Factor Analysis of Attitude Measure................................................................61 
TABLE 7: Factor Analysis of Self-Efficacy Measure........................................................62 
TABLE 8: Factor Analysis of Moral Disengagement Measure..........................................64 
TABLE 9: Indicators of Goodness of Fit for Models.........................................................67 
    
1 
 
CHAPTER 1 
INTRODUCTION 
 
Societies of today are undergoing extraordinary informational, social and technological 
transformations and growth. Social changes and growth are not new over the course of 
history, but what is new is their enormity and accelerated pace. Rapid cycles of drastic 
change require continuous personal and social renewal (Bandura, 1997). One such societal 
growth is Information Technology, in particular, the software industry which is at the cutting 
edge of the information age and a major player in the global market (Gopal & Sanders, 1998).  
Gattiker and Kelly (1999, p. 233) have noted that ?during the past two decades, society has 
witnessed a rapid evolution in and adoption of computer technologies and the Internet?. 
These advances have brought forth many great accomplishments in many aspects of society, 
however, along with this development, it has ?spawned new ethical dilemmas for computer 
users? (Simpson, Banerjee & Simpson, 1994, p. 431). 
 
Software products or intellectual property is often the most valuable corporate asset in an 
increasingly information intensive economy, and is therefore particularly vulnerable to theft 
(Lending & Slaughter, 1999). The explosive growth of the Internet and other technologies 
has accentuated the software piracy problem (Lending & Slaughter, 1999).  In South Africa 
there has been a proliferation of computer use, computer technology, and the introduction of 
new technology and the Internet. This has made the illegal reproduction and distribution of 
protected software material much easier to accomplish and more difficult to control, as it can 
be done with the click of a button (Beruk, 2000; Lending & Slaughter, 1999).  
 
2 
 
 The unauthorised copying of software, which is better known as software piracy or 
softlifting, has become an increasing concern to businesses and software developers 
throughout the world (Beruk, 2000), especially in developing countries, where the 
unauthorised copying of software is extremely high (Gopal & Sanders, 1998). In these 
countries the demand for software is usually being met by piracy, and not by publishers. 
Software publishers are unable to compete with counterfeit operations that duplicate their 
programmes and distribute them directly to consumers throughout the world at cut-throat 
prices (Traphagan & Griffith, 1998). 
 
In addition, the unauthorised copying of software is a major drain on the global economy, as 
losses of $200 billion are expected worldwide in a four year period (Business Software 
Alliance, 2006). The BSA estimated that in 2005 the worldwide software piracy rate was 
unchanged since 2004, with a rate of 35 % (BSA, 2007). However, the losses due to the 
unauthorised copying of software have increased from 2004 to 2005 by over $ 1.6 billion, to 
an estimated total of $34 billion. South Africa is one of the countries with the lowest piracy 
rates, but it still exceeds the world average rate. In 2004 South Africa had a piracy rate of 
37%. This decreased to 36% for 2005 (BSA, 2007). Even though the piracy rate dropped by 
one percent the losses due to the unauthorised copied software increased dramatically as the 
losses for South Africa during 2004 were estimated around $196 million. This total has 
increased to $212 million for 2005 (BSA, 2007).  
 
The BSA (2007, p. 1) stated that for ?every two dollars? worth of software purchased 
legitimately, one dollar?s worth was obtained illegally?. Other than creating a significant 
drain on the economy it impedes the continued growth of the software publishing industry 
3 
 
(Software Piracy Report, 1997). It is suggested that by lowering the piracy rates, countries are 
able to gain more economically, as more jobs and businesses are created (BSA, 2007). 
 
Although some caution is necessary in interpreting the statistics provided by BSA, it is 
obvious that piracy is an increasingly important problem that educational institutions and 
companies are required to deal with (Limayem, Khalifa & Chin, 2004). Gopal and Sanders 
(1998) suggested that the unauthorised copying of software is by far the worst problem 
threatening the software industry; it is for this reason that it is important to understand why 
individuals choose to copy software illegally. This understanding could lead to more effective 
strategies for preventing the unauthorised copying of software (Lending & Slaughter, 1999). 
 
The unauthorised copying of software is considered a prevalent problem in companies, 
academic institutions, and among individuals (Cheng, Sims & Teegen, 1997), as such there 
have been increased efforts to identify and prosecute these individuals. The fact that the 
unauthorised copying of software cost manufacturers billions yearly is one reason why 
manufacturers continuously seek new ways of discouraging these practises (Simpson, 
Banerjee & Simpson, 1994). Manufacturers and educators alike have implemented various 
policies, and examined a variety of influencing factors as a means to reduce the piracy 
problem. Despite these efforts to dampen the proliferation of piracy, the problem continues 
unabated (Simpson, Banerjee & Simpson, 1994). According to Forester and Morrison (1990), 
unauthorised copying of software is a widespread social problem that is here to stay. 
 
Questions arise around what motivates people to copy software illegally. Many theorists have 
given answers to these questions, such as costs, economics and ease of copying, however, 
4 
 
considering the apparent failure of previous efforts to reduce software piracy, a new approach 
must be adopted. In particular, the purpose of the current research is to expand on the 
minimal research performed on Social Cognitive Theory (SCT) and the unauthorised copying 
of software. SCT embraces an interactional model of causation in which environmental 
events, personal factors and behaviour all operate as interacting determinants of each other 
(Bandura, 1986). SCT suggests that people are not only knowers and performers; they are 
also self-reactors with a capacity for self-direction. An individual?s self-regulation of their 
motivation and action operates partly through their internal standards and evaluative reactions 
to their own performances (Bandura, 1996). 
 
An important aim for this study is to develop a model that both predicts and explains 
incidents of unauthorised software copying.  To do this, the current study will explore the 
possibility of a relationship between attitudes, self-efficacy and social norms of individuals to 
copy software illegally with an individual?s intention to copy software. Further, one variable 
in particular, that is, moral disengagement will be considered as a mediator of the 
relationship. Moral disengagement however has not been empirically examined in terms of its 
capacity as a mediator in such a relationship. In addition, moral disengagement has been the 
focus of many studies focusing on violence and inhumanities towards individuals, with no 
focus on unauthorised copying of software. This limited focus tends to convey the impression 
that selective disengagement of moral self-sanctions occur only under extraordinary 
circumstances (Bandura, 1991; Bandura, 2000). However, this is quite the opposite as ?such 
mechanisms operate in everyday situations in which decent people routinely perform 
activities that further their own interests but have injurious human effects? (Bandura, 1990, p. 
162). In doing so, the current research is important to further the literature on information 
5 
 
technology and computer ethics, as it may lead to valuable theoretical insights into 
individuals? perspective on the unauthorised copying of software. 
 
The outline of this report is as follows: The second chapter of the study will present the 
Social Cognitive Theory (SCT), the variables underlying it such as moral disengagement and 
self-efficacy. In addition, the past research completed on intentions, social norms and 
attitudes towards the unauthorised copying of software and the relationship of each of these 
concepts will be discussed. Chapter three will outline the method of the study, with particular 
reference to the research design adopted, the details of the sample and procedures, as well as 
the measuring instruments that were used for collecting the data. Chapter four will present the 
statistical results and findings, with relevant tables and graphs. Chapter five will discuss the 
result obtained from the previous chapter, as well as the limitations of the current study and 
future recommendations. Chapter six will be the concluding chapter, which will highlight the 
most important points of the research. 
 
 
 
 
 
 
 
 
 
 
 
6 
 
CHAPTER 2 
LITERATURE REVIEW 
As long as the personal computer has existed, unauthorised copying of software has been an 
important issue (Swineyard, Rinne & Kau, 1990). The BSA (2007) has established that 
unauthorised copied software is being used on desktops, laptops and ultra-portables. Firstly it 
is necessary to define software. Software is defined as ?the set of instructions which tell a 
computer what to do? (Forester & Morrison, 1990, p. 27), thus without software, a computer 
is useless. Software is therefore an important asset, as all computers need it to function. 
Software categories include operating systems, systems software such as databases and 
security packages, applications software such as office automation packages, finance and tax 
packages, computer games, and industry specific applications (BSA, 2007). 
 
Partly as a result, the unauthorised copying of computer programmes has become a major 
growth industry (Forester & Morrison, 1990).  The unauthorised copying of software, better 
known as software piracy or softlifting, is the ?making of unauthorised copies of software by 
individuals or businesses for resale or to use in the workplace, school or home? (Kini, 
Rominger & Vijayaran, 2001, p. 1). Gupta, Gould and Pola (2004) have taken their definition 
a step further by suggesting that it involves the copying and, or distribution of copyrighted 
software without the permission of the software manufacturer. The only exception is the 
user?s right to make a single backup copy for archival purposes.  
 
The unauthorised copying of software can be committed in a wide variety of ways, such as, 
the unauthorised temporary rental of software for monetary use, and installing unauthorised 
copies of software onto the hard disks of personal computers, which is often an incentive for 
the end user to buy the hardware from that unauthorised dealer (Beruk, 2000). Softlifting for 
7 
 
one is described as the purchasing of a single licensed copy of software and then distributing 
it amongst friends, co-workers and others (Beruk, 2000). This ?sharing? of software is the 
most pervasive form of unauthorised copying of software encountered and is estimated to be 
responsible for more than half the total revenues lost by the industry (Beruk, 2000).  
 
The unauthorised duplication and distribution of software, are other forms designed to make 
pirated software appear to be legitimate. This is seen as software counterfeiting (Beruk, 
2000). The inherent features of personal computers make the prevention of unauthorised 
copying of software a unique and difficult problem, as the duplication of most software 
packages requires only simple commands and mouse manipulations, and in addition, the 
quality of the duplicated software is high (Cheng, Sims & Teegen, 1997).  
 
The Internet and other communication technologies has come a long way since its inception, 
creating various avenues of how one transfers data over the Internet, such as, Web sites, e-
 mail, online chat and file transfer protocols (FTP) (Beruk, 2000). Although this may be good 
for developing the Internet into a global information centre, it is not so good for preventing 
unauthorised copying of software from taking place, as these avenues create ways for piracy 
to thrive, and as such accentuate the piracy problem (Lending & Slaughter, 1999). This is due 
to the fact that ways of making unauthorised copies of software are available to others by 
electronic means, and the problem is likely to worsen with the further spread and 
development of these infrastructures (Beruk, 2000, Lending & Slaughter, 1999).  
 
Today people use Internet Relay Chat (IRC) to discuss just about any subject with anyone, 
anywhere, in real-time. Software pirates use IRC to create chat rooms in which they can 
come together and discuss anything about software piracy (Beruk, 2000). They confer in 
8 
 
relation to the terms for breaking software program codes, and the serial numbers of software 
programmes, as well as where to find the software free or for an extremely discounted price 
(Beruk, 2000). Software pirates however do not only distribute amongst themselves; they are 
now selling unauthorised copies of software on illegal online auction sites to the general 
public.  
 
These programmes are sold for a fraction of the original price (Beruk, 2000). In addition, 
software pirates are setting up their own Web sites allowing illegal distribution of software 
and digital content, either by allowing the public to download software illegally from a 
Website, or software pirates sell the illegally manufactured software copies that they have 
recorded to blank recordable CDs, via e-mails (Beruk, 2000). The ease of duplication, 
coupled with the ease of downloads from the Internet through DSL and cable modem 
connections, means that law enforcement agencies are faced with various new and 
challenging avenues of trafficking pirated software (Beruk, 2000). 
 
2.1. PAST RESEARCH WITHIN THE FIELD OF UNAUTHORISED SOFTWARE 
COPYING 
In order to understand the relevance of this research and the impact it may have on future 
research, it is important to examine previous studies that report correlates of unauthorised 
software behaviour. Many studies approached this unauthorised software copying behaviour 
as dimensions of demographic factors, such as gender, career orientation, age and computer 
use (Gopal & Sanders, 1997; Seale, Polakowski & Schneider, 1998; Siponen & Vartainen, 
2005; Solomon & O?Brian, 1991). These earlier research attempts aimed specifically at 
understanding unauthorised software copying, despite being valuable, provide somewhat 
limited theoretical direction. Recognising that this behaviour may hinge on moral, ethical or 
9 
 
attitudinal concerns, researchers turned to popular theories to explain the motivation behind 
the unauthorised copying of software. To date, the theory on which this line of research is 
frequently based is the Theory of Reasoned Action (TRA), proposed by Ajzen and Fishbein 
(1980). However, it is important to note that this study is not approaching the unauthorised 
copying of software from a TRA or Theory of Planned Behaviour (TPB) perspective. The 
study is focusing on the main concepts, such as attitudes, social norms and intentions within 
these theories as a means to apply them in Social Cognitive Theory.  
  
The TRA relates an individual?s attitudes and social norms to intentions to act (Al-Rafee & 
Cronan, 2006; Lending & Slaughter, 1999; Limayem, Khalifa & Chin, 2004; Vallerand, 
Cuerrier, Pelletier & Mongeau, 1992). Intentions are believed to capture the sum of an 
individual?s intention to perform a given behaviour; they are indicators of planned effort, or 
how hard a person is willing to work to perform certain behaviour.  There are two main 
determinants of intention: attitudes and social norms (Seale, Polakowski & Schneider, 1998). 
 
Attitudes for one are defined as ?enduring, learned predispositions toward responses directed 
at some object, person, or group? (Loch & Conger, 1996, p. 75). Attitudes are a function of 
the salient beliefs a person holds regarding the perceived consequences of performing a 
behaviour and the evaluation of these consequences (Seale, Polakowski & Schneider, 1998). 
It is suggested that if an individual views the unauthorised copying of software as wrong, 
they are unlikely to intend to steal it. According to Al-Rafee and Cronan (2006), attitude is 
seen to be the best predictor of intention. Social norms on the other hand are defined as 
?perceived social pressure to an individuals? perception of whether most people important to 
them think that the behaviour should be performed or not? (Limayem, Khalifa & Chin, 2004, 
p. 416). Thus, it is seen as the norms and values at the societal level that are conveyed 
10 
 
through interactions with friends, colleagues and family members (Limayem, Khalifa & 
Chin, 2004). As attitudes and social norms become more favourable, the likelihood of 
performing certain behaviour increases (Seale, Polakowski & Schneider, 1998). Intentions 
indicate ?how hard a person is willing to try, and how much effort he or she plans to exert, in 
order to perform a behaviour? (Rahim, Seyal & Rahman, 2001). Thus, the stronger the intent 
to perform a behaviour, the greater the likelihood that an individual will engage in that 
behaviour. Azjen and Fishbein (1980) postulated that an individual will behave in accordance 
with his or her intention, therefore, within the context of the unauthorised copying of 
software, if an individual intends to pirate software, he or she is likely to carry out the actual 
behaviour, unless something intervenes. 
  
Loch and Conger (1996) found that attitudes and social norms significantly affect intentions 
to perform unauthorised software copying. Trafimow and Finlay (1996) found that attitudes 
are the most significant predictor of intention to pirate software compared to social norms. 
However, social norms account for a significant proportion of variance in intentions. In 
addition, many theorists have employed TPB towards the unauthorised copying of software 
(Al-Rafee & Cronan, 2006; Lending & Slaughter, 1999; Limayem, Khalifa & Chin, 
2004).The TPB is an extension of the TRA, whereby a third construct, perceived behavioural 
control (PBC) is added to the original TRA. PBC refers to the ?perceived control over a given 
behaviour or behavioural goals? (Ajzen, 1989, p. 105).  
 
However, the appropriateness of TRA and TPB in the line of unauthorised software copying 
has been questioned by researchers. Loch and Conger (1996) believe that unauthorised 
copying of software involves complexities and other factors that cannot be captured in their 
entirety by just focusing on two concepts, namely, attitudes and social norms. In addition, it 
11 
 
is believed that, the perceived behavioural control construct within TPB is not well defined, 
and as such, could be a problematic construct, based on the principle of compatibility (Kuo & 
Hsu, 2001). 
 
The purpose of this research is to develop a model, based on Bandura?s SCT to serve as an 
additional avenue to focus on unauthorised copying of software. Concepts such as social 
norms, attitudes, self-efficacy and intentions towards the unauthorised copying of software 
will be taken into consideration. The relative importance of these concepts in predicting 
behaviour is important to the current research, therefore from the above discussion, will be 
included in the study. In doing so, the current research is important to further the literature on 
Information Technology and computer ethics, as it will hopefully lead to valuable theoretical 
insights into individuals? perspective on the unauthorised copying of software. 
 
2.1. SOCIAL COGNITIVE THEORY (SCT) 
Bandura (1986) advanced the view of human functioning that accords a central role to 
cognitive, self-regulatory and self-reflective processes in human adaptation and change. 
People are viewed as self-organizing, proactive, self-reflecting and self-regulating rather than 
as reactive organisms shaped and driven by environmental forces, or motivated by hidden 
inner impulses (Bandura, 1986: Bandura, 1997). From this theoretical perspective, human 
functioning is viewed as the product of a dynamic interplay of personal, behavioural, and 
environmental influences. This is the foundation of Bandura?s (1986) conception of 
interaction, based on triadic reciprocality, as seen in Figure 1.  
 
In this transactional view of self and society, internal personal factors in the form of 
cognitive, affective and biological events; behaviour and environmental events, all function 
12 
 
as interacting determinants that influence one another bidirectionally (Bandura, 1986; 
Bandura, 1997). For example, how people interpret the results of their own behaviour informs 
and alters their environments and the personal factors they posses, which in turn, inform and 
alter subsequent behaviour.  
 
 
 
 
 
 
 
FIGURE 1: The relationship between the three major classes of determinants in triadic 
reciprocal determinism. (Adapted from Bandura, 1986, p. 263) 
 
Social cognitive theory is rooted in the view of human agency, in which individuals are 
agents proactively engaged in their own development and can make things happen by their 
actions (Bandura, 1991). Bandura (1986) suggested that desire and intention alone, do not 
have much effect if people lack the capability for exercising influence over their own 
motivation and behaviour. Through agentic action, people devise ways of adapting flexibly to 
remarkably diverse social environments; individuals figure out ways to circumvent physical 
and environmental constraints; redesign and construct environments to their liking; and create 
styles of behaviour that enable them to acquire desired  outcomes (Bandura, 2001).  
 
This multifaceted self-directedness operates through self-regulatory processes that link 
thought to action (Bandura, 2001). In this self-regulatory process, individuals engage in a 
Behaviour Environmental 
Factors 
Personal Factors 
13 
 
number of cognitive functions by monitoring their behaviour and the environmental 
conditions under which it occurs; judging their actions in relation to their moral standards and 
perceived circumstances; and regulating their actions anticipatorily by the consequences they 
would apply to themselves (Bandura, 1999; Osofsky, Bandura & Zimbardo, 2005).  
 
In SCT, transgressive conduct is regulated by both social sanctions and internalised self-
 sanctions that operate concurrently and anticipatorily. In control arising from social 
sanctions, people refrain from transgressing because they anticipate that such conduct will 
bring them self-censure and other adverse consequences (Bandura, 1991). In self-reactive 
control, they behave prosocially out of self-satisfaction and self-respect and they refrain from 
transgressing because such conduct will give rise to self-reproof (Bandura, 1991). Thus, 
anticipatory self-sanctions keeps conduct in line with internal standards. It is through this 
ongoing process of self influence that moral conduct is motivated and regulated (Bandura, 
Barbaranelli, Caprara & Pastorelli, 1996). Individuals can therefore choose to behave other 
than in unfavourable ways (Jackson & Sparr, 2005). Such self-regulatory processes can 
operate inhibitively or proactively. Bandura (1999) suggests that abstaining from 
unfavourable behaviour represents the inhibitive form of moral agency, whereas behaving in 
an unfavourable manner reflects the proactive form.  
 
However, one important factor in the effect of self-regulation is the need to activation. The 
self-regulatory functions do not create an invariant control system within a person, as these 
self-reactive influences do not operate unless they are activated, and there are many 
psychosocial processes by which self-sanctions can be disengaged from unfavourable 
behaviour (Bandura, 1990; Bandura, 1991). Selective activation and disengagement of 
internal control permits different types of conduct with the same moral standards (Bandura, 
14 
 
1986). If self-sanctions are not activated to some extent or fail to be activated completely, 
they do not come into play (Jackson & Sparr, 2005). As such, they become disengaged from 
unfavourable behaviour which can be shown without the negative consequences on one?s 
self, such as guilt (Caprara & Capanna, 2004).  
 
Social norms, as well as intentions play a prominent role in the self-regulation of behaviour, 
which is an integral part of SCT (Bandura, 1986). Norms according to LaRose and Kim 
(2007), act through the judgemental process component of the self-regulatory mechanism, 
whereby individuals are constantly observing their behaviour and judging its appropriateness 
compared to the norms of appropriate conduct. If an individual finds his behaviour 
inconsistent with the norm then he or she may apply self-reactive incentives to modify their 
behaviour (LaRose & Kim, 2007). These incentives might include indulging feelings of guilt 
or providing themselves with rewards for improved behaviour, that would bring the 
individual back to norm compliance. In TPB, social norms are believed to act directly on 
behavioural intentions, rather than through intermediate processes of self-regulation, as SCT 
would suggest (LaRose & Kim, 2007).  
 
As discussed earlier, individuals can choose to behave accommodatively or, behave 
otherwise through the exercise of self-influence (Bandura, 2001). Intentions according to 
Bandura (1986) are seen as the determination of a person to perform certain activities or to 
bring about a certain future state of affairs. Thus, Bandura (2001) speaks of intentions 
grounded in self-motivations affecting the likelihood of actions at a future point in time. Self-
 regulatory systems lie at the heart of causal processes, they not only mediate the effects of 
most external influences but also provide the very basis for purposeful action (Bandura, 
1997). Most behaviour however is seen as being purposeful, and thus regulated by 
forethought. Individuals form beliefs about what they can do, they anticipate the likely 
15 
 
consequences of prospective actions, and set goals for themselves, and they otherwise plan 
courses of action that are likely to produce desired outcomes. Intentions are mediated by self-
 influences, whereby individuals seek self-satisfaction from fulfilling valued standards and are 
prompted to intensify their efforts by discontent with substandard performances (Bandura, 
1997). 
 
Self-regulation also encompasses the self-efficacy mechanism, which plays a central role in 
the exercise of personal agency by its strong impact on thought, affect, motivation and action 
(Bandura, 1991; Bandura, 1997). 
 
2.3. SELF-EFFICACY 
People are not only agents, but self examiners of their own functioning, whereby they are 
able to reflect upon themselves and the adequacy of their thoughts and actions. Individuals 
evaluate their motivation, values and the meaning of their pursuits (Bandura, 2001). Among 
the mechanisms of personal agency, none is more central or pervasive than an individual?s 
beliefs in their capability to exercise some control over their own functioning and over 
environmental beliefs (Bandura, 1991). Unless people believe they can produce desired 
results and prevent detrimental ones by their actions, they have little incentive to act or to 
persevere with difficult or unfavourable situations. Self-efficacy refers to an individual?s 
convictions (or confidence) about their abilities to mobilise cognitive resources and courses 
of action needed to execute a task successfully within a given context (Bandura, 1989; 
Bandura, 1991).  
 
Bandura?s (1997, p. 2) key argument regarding the role of self-efficacy beliefs is that 
?people?s level of motivation, affective states, and actions are based more on what they 
16 
 
believe than on what is objectively true?. SCT suggests that people base their behaviour on 
both the effects of contingent reinforcement and their self-efficacy judgments of how well 
they can perform the behaviours necessary to achieve the consequences. An important 
theoretical property of self-efficacy is that it is concerned not with the skills a person has but 
with "judgments of what one can do with whatever skills he or she possesses" (Bandura, 
1986, p. 391). That is, it is necessary to distinguish between one's component skills e.g. 
driving a motorcar. An individual would use component skills such as steering, braking and 
signalling. In addition, his or her ability to organize and execute courses of action e.g. while 
driving a motorcar, an individual would accomplish certain behaviours like driving in traffic 
or navigating through winding mountain roads (Bandura, 1986). 
 
Individuals tend to select tasks and activities in which they feel competent and confident and 
avoid those in which they are not, thus when an individual has high self-efficacy, they feel 
confident that they can execute the responses necessary to earn reinforcers (Bandura, 1997). 
When self-efficacy is low, individuals worry that the necessary responses may be beyond 
their abilities. In addition, the higher the sense of self-efficacy, the greater the effort, 
persistence and resilience will be in the face of adverse or difficult situations (Bandura, 1986; 
Bandura, 1997) As such, self-efficacy influences the choices and courses of action 
individuals pursue, and how much effort an individual will expend on an activity.  
 
Individuals operate collectively as well as individually; therefore self-efficacy is both a 
personal and a social construct (Pajares, 2002).  The stronger the perceived self-regulatory 
efficacy, the more perseverant people are in their self-controlling efforts and the greater is 
their success in resisting social pressures to behave in ways that violate their standards. 
17 
 
Conversely, a low sense of self-regulatory efficacy heightens vulnerability to social pressures 
for illegal conduct (Bandura, 1991). 
 
Efficacy beliefs play a key role in influencing the types of activities and environments people 
choose to get into (Bandura, 2001). The rapid growth of informational, social and 
technological change is placing a premium on personal efficacy for self-development and 
self-renewal throughout the life course (Bandura, 2001). Today, the Internet provides vast 
opportunities for individuals to access unauthorised copied software, which is unrestricted by 
time and place. 
 
Bandura (1986) suggested that self-efficacy beliefs play an important role in mediating a 
person?s goal-setting, thought patterns, strategies and actions chosen for the exercise of 
human agency and behaviour. This statement would suggest that the more capable 
individuals judge themselves to be, the higher the goals they set for themselves and the more 
firmly committed they remain to them (Bandura, 1991). In addition, even highly self-
 efficacious individuals may choose not to behave in concert with their beliefs and abilities, 
because they simply lack the incentive to do so, because they lack the necessary resources or, 
they perceive social constraints in their envisioned path or outcome. As such, efficacy will 
fail to predict performance, as individuals may feel capable, but do not act, due to feeling 
impeded by real or imaginary constraints (Pajares, 2002).   
 
Much research has been conducted in applying self-efficacy to research human behaviour 
(Bandura, 1997; Compeau & Higgins, 1995). Bandura and Wood (1989) found self-efficacy 
perceptions to influence decisions on what behaviours to undertake, and the level of 
commitment and persistence in attempting those behaviours (Hollenbeck & Brief, 1987). In 
18 
 
general, researchers have established that self-efficacy is an excellent and more consistent 
predictor of behavioural outcomes than any other motivational construct (Graham & Weiner, 
1996). Compeau and Higgins (1995) discussed the importance of self-efficacy on an 
individuals? reaction towards computer technology, and as such created the construct of 
computer self-efficacy. This term is defined as ?an individual judgement of one?s capability 
to use a computer? (Compeau & Higgins, 1995, p. 192). As such, in a study conducted by 
Kuo and Hsu (2001), using a sample of 243 students, they found that self-efficacy was an 
important aspect in the unauthorised copying of software, as individuals with higher levels of 
self-efficacy were more likely to engage in illegal software copying. 
 
2.3. MORAL DISENGAGEMENT 
?Morality is concerned with the behaviour of individuals who choose, implement, and bear 
the consequences of their actions? (Gattiker & Kelley, 1999, p. 235). Morality is seen to exert 
an objective restriction on the pursuit of individual interests in the face of societal objectives 
and, as such, provide an individual with the necessary constraints to function in society 
(Gattiker & Kelley, 1999). Clear-cut moral issues have become more difficult to define in a 
society in which technological change occurs at an increasing rate, and where national 
boundaries are becoming more obscure (Gattiker & Kelley, 1999). Bandura (1999) describes 
morality as the mechanisms that help people live in agreement with their moral standards. 
These moral standards are adopted during the course of socialisation, from information 
expressed by direct guidance, evaluative social reactions to one?s behaviour, and exposure to 
the self-evaluative standards represented by others. In addition, these moral standards act as 
guidelines for behaviour (Bandura, Barbaranelli, Caprara & Pastorelli, 1996).  
 
19 
 
Bandura (1999) views moral disengagement as the cognitive mechanism that allows the 
restructuring of malign behaviour into benign behaviour. According to Bandura (1999), when 
people become morally disengaged they are able to justify illegal acts with a clear 
conscience. Moral disengagement has been examined most extensively in the area of political 
and military violence (Bandura, 1990). This limited focus tends to convey the impression that 
selective disengagement of moral self-sanctions occurs only under extraordinary 
circumstances. However, these mechanisms operate in everyday situations in which normal 
people routinely perform activities that further their interests but have negative effects on 
others (Bandura, 1990). Gabor (1994) for one, documents the pervasiveness of moral 
disengagement by people of all statuses in all walks of life. 
 
The Processes of Moral Disengagement 
Mechanisms of moral disengagement, specifically, the psychological manoeuvres by which 
moral self-sanctions get disengaged giving free way to a variety of transgressions without 
carrying any moral concern, have been originally investigated in relation to aggression and 
inhumane conduct leading to the identification of eight mechanisms (Bandura, 1986). They 
are moral justification, euphemistic labelling, advantageous comparison, displacement of 
responsibility, diffusion of responsibility, distortion of consequences, dehumanisation and the 
attribution of blame (Bandura, 1986).   
 
Bandura (1986; 1999) (See Figure 2) identified four major points in the self-regulatory 
system, at which internal moral control can be disengaged from transgressive behaviour. The 
disengagement may centre on the conduct itself so it is not viewed as immoral; the operation 
of the agency of action so that the perpetrators can minimize their role in causing harm; in the 
20 
 
consequences that flow from actions; or on how the victims of maltreatment are regarded 
(Bandura, 1999). 
 
 
 
 
 
 
                                                                                               
 
REPREHENSIBLE           DETRIMENTAL   VICTIM 
     CONDUCT     EFFECTS 
 
 
 
 
 
 
 
 
FIGURE 2: Mechanisms through which internal control is selectively activated or 
disengaged from conduct at different points in the self-regulatory process (Bandura, 1986, 
p. 376). 
 
 
 
Moral Justification 
 
Euphemistic Labelling 
 
Advantageous Comparison
 Minimising, Ignoring, or
  
Misconstruing the  
 
Consequences 
Attribution of Blame 
 
Dehumanisation 
 
 
Displacement of Responsibility
  
Diffusion of responsibility 
21 
 
Conduct as the focus of moral disengagement 
Negative and immoral actions cannot simply be conducted without negative consequences for 
the self. Therefore the behaviour itself needs to be reconstructed (Jackson & Sparr, 2005). 
Functioning at the behaviour locus are three separate disengagement mechanisms that convert 
the construal of injurious conduct into righteous conduct (Osofsky, Bandura & Zimbardo, 
2005), namely, moral justification, euphemistic labelling and advantageous comparisons 
(Bandura, 1986). 
 
People do not ordinarily engage in reprehensible conduct until they have justified to 
themselves the morality of their actions (Bandura, 1999). Moral justification describes how 
harmful behaviour is portrayed as serving morally right, acceptable or even desirable 
outcomes and purposes (Bandura, Caprara & Zsolnai, 2000). In this process transgressive 
behaviour is made personally and socially acceptable by portraying it as righteous, or even a 
necessity for reaching desirable goals (Jackson & Sparr, 2005). 
 
Language shapes people?s thought patterns on which they base many of their actions 
(Bandura, Barbaranelli, Caprara & Pastorelli, 1996). Activities can take on markedly 
different appearances depending on what they are called. Euphemistic labelling thus provides 
a convenient tool for masking reprehensible behaviour or even conferring a respectable status 
upon them (Bandura, 1986). Words with negative connotations are avoided or replaced by 
paraphrases or images with positive implications (Bandura, 1999). Passively phrased 
passages also serve the purpose of sanitizing language by suggesting an action is agentless 
(Bolinger, cited in Bandura, 1999). By doing this the transgressive behaviour is made benign 
and those who engage in it are relieved a sense of personal agency (Bandura, 1986). 
 
22 
 
Behaviour can also assume very different qualities depending on what it is contrasted with 
(Bandura, Barbaranelli, Caprara & Pastorelli, 1996). Advantageous comparison, as the third 
disengagement mechanism on the conduct-level, describes the tendency to contrast negative 
or harmful behaviour against even greater atrocities or wrongdoings. In that way, 
reprehensible conduct can be turned into acceptable, righteous behaviour (Bandura, 1986; 
Jackson & Sparr, 2005). The more deliberate the contrasted activities, the more likely it is 
that one?s own injurious conduct will appear insignificant or even benevolent (Bandura, 
Caprara & Zsolnai, 2000). 
 
Cognitive restructuring of behaviour through moral justification and advantageous 
comparison is the most effective self-disinhibitor because it not only eradicates self-generated 
restraints but engages self-reward in the service of transgressive enterprises. What was once 
morally unacceptable becomes a source of self-pride (Bandura, 1986). 
 
The agentic role of action as the focus of moral disengagement 
The second set of disengagement mechanisms operates at the agency locus by obscuring or 
minimizing the perpetrator?s agentic role in the transgressive behaviour (Osofsky, Bandura & 
Zimbardo, 2005). A necessity for moral control is the acknowledgement of one?s own 
wrongdoings. If, however, the responsibility for the harm one causes is reduced or obscured, 
the possibility of acknowledgement of responsibility and self-control is lessened. Two 
disengagement mechanisms operate through disavowal of personal agency in the harm one 
causes. This is achieved by diffusion and displacement of responsibility (McAlister, Bandura 
& Owen, 2006). 
 
23 
 
Displacement of responsibility allows reprehensible conduct, as a person?s behaviour is 
merely seen as simply following orders (Bandura, 1986; 2002). Thus, people do not feel 
personally responsible for their actions, and as such they are spared self-prohibiting reactions 
(Bandura, 1986). Consequently, they are willing to behave in ways they normally renounce if 
a legitimate authority accepts responsibility for the effects of their actions (Bandura, Caprara 
& Zsolnai, 2000). 
 
The exercise of moral control is also weakened when personal agency is obscured by 
diffusion of responsibility for negative behaviour (Bandura, Barbaranelli, Caprara & 
Pastorelli, 1996). Responsibility can be diffused in three ways; by division of labour, group 
decision-making and collective action. Division of labour for tasks is the means by which 
different members perform subdivided tasks that seem harmless in themselves but harmful in 
its entirety (Bandura, Caprara & Zsolnai, 2000; Osofsky, Bandura & Zimbardo, 2005). Group 
decision-making is another common practice, one that enables otherwise considerate people 
to behave in a disapproving manner, as any harm done by a group can always be attributed 
largely to the behaviour of others, thereby releasing any individual from feeling personally 
responsible (Bandura, 1986). Lastly, stemming from the prior argument, it suggests that by 
engaging in collective action, it provides some degree of personal anonymity while 
minimizing individual accountability (McAlister, Bandura & Owen, 2006). Bandura (1999, p. 
198) stated that diffusion of responsibility could be explained by one statement, ?When 
everyone is responsible, nobody feels responsible?. 
 
The effects of action as the focus of moral disengagement 
For self-censure and self-sanctions to take place, not only the action itself and responsibility 
for the action have to be accepted, but also the negative effects of detrimental behaviour have 
24 
 
to be recognized, and therefore perceived as such (Jackson & Sparr, 2005). The third set of 
disengagement mechanisms looks at the outcome locus, which is achieved by minimizing or 
disregarding the harmful consequences of one?s action, this is called distortion of 
consequences (Bandura, 1999).  
 
Distortion of consequences is when people pursue transgressive activities that are harmful to 
others for personal gain, or because of social pressures. Thus, by doing this they avoid facing 
the harm they cause or they minimize it (Bandura, Caprara & Zsolnai, 2000). As long as the 
negative outcomes are ignored, minimized, or disbelieved there is little reason for moral self-
 regulation to be activated (Bandura, 1986; Osofsky, Bandura & Zimbardo, 2005).  
 
The victim as the focus of moral disengagement 
The final set of moral disengagement mechanisms operates at the locus of the recipients? 
consequences. The strength of self-evaluative reactions partly depends on how the 
perpetrators view the people toward whom the behaviour is directed (Bandura, 1986).  
Transgressive behaviour is therefore morally disengaged through dehumanisation and 
attribution of blame (Bandura, 1999). Dehumanisation refers to the process of divesting 
people of human qualities or attributes bestial qualities, thus viewing them as subhuman 
objects (Bandura, 1986). When this happens, it becomes possible to discriminate against 
individuals, and deprive them of their basic rights and opportunities (Jackson & Sparr, 2005). 
 
Blaming one?s adversaries or circumstances is still another manoeuvre that can serve self-
 exonerative purposes. In attribution of blame, people view themselves as flawless victims 
motivated to injurious conduct by forcible provocation (Bandura, Barbaranelli, Caprara & 
Pastorelli, 1996). Victims are therefore blamed for bringing the transgressive behaviour onto 
25 
 
themselves (Bandura, 1986). Forcing the blame on others or on circumstances, not only 
excuses the individual?s own transgressive behaviour, but it could also result in feelings of 
self-righteousness in the process (Bandura, Caprara & Zsolnai, 2000).  
 
Moral disengagement can affect transgressive behaviour both directly and indirectly 
(Bandura, 2002). People have little reason to be troubled by guilt or to feel any need to make 
amends for harmful conduct if they reconstruct it as serving worthy purposes or if they 
disown personal agency for it. High moral disengagement is accompanied by low guilt, thus 
weakening anticipatory self-restraints against engagement in negative behaviour (Bandura, 
Caprara & Zsolnai, 2000). Morally disengaged people assign high precedence to self-
 enhanced ideals. As such, they are constantly seen as pursuing their own relative success, 
while they do not take others into consideration because their interests are more important 
(Bandura, 2002). 
 
Likely, similar self-exonerative manoeuvres operate to justify reprehensible behaviours and 
rule violations other than aggression and violence (Caprara & Capanna, 2004). It is not 
difficult to evoke behaviours that attest to mechanisms of moral disengagement, not only in 
the sphere of aggression, violence and inhumane conduct. Likely moral thought and 
behaviour can dissociate from each other in the service of self-interest in a variety of contexts 
like the family, the work setting, and the school (Caprara & Capanna, 2004). For this reason, 
moral disengagement could be viewed within the research context of unauthorised software 
copying. 
 
Lucidi, Zelli, Mallia, Grano, Russo and Violani (2008) assessed social cognitive mechanisms 
on the use of doping substances among students. Their data showed that individuals? 
26 
 
intention to use substances increased with stronger attitudes about substance use, stronger 
beliefs that significant others would approve of their use, a stronger conviction that doping 
could be justified, and a lowered capacity to resist social pressures. In turn, stronger 
intentions and moral disengagement contributed to a greater use of substances. 
 
In terms of SCT there is no available past research with regard to the unauthorised copying of 
software. One study did focus on SCT in music downloading (LaRose & Kim, 2006), 
however, this research paper presented many problems. Firstly it should be noted that the 
sample used in LaRose and Kim?s (2006) study consisted of 134 participants of a proposed 
600 individuals, suggesting a low response rate. Additionally, 70% of the sample was below 
the age of 21. The participants were recruited via campus email invitation, which did not 
result in a representative sample, even if computer ownership was a prerequisite for each 
student attending the University. In addition, these participants can be viewed as volunteers, 
suggesting that volunteers are more likely to be high risk seekers (Rosnow & Rosenthal, 
1991), and as such more inclined to the unauthorised copying of software. Thus the sample is 
not representative of the population. With regard to the measuring instruments, it is suggested 
by Terre Blanche and Durrheim (1999) that .75 is seen as an acceptable cut off point for an 
alpha coefficient. However, internal reliability for half the scales were below average and 
unacceptable, (e.g. subjective norms .63, download intention .66, economic outcomes .64, 
moral justification .69, and self-efficacy .71) (LaRose & Kim, 2006, p.  274). In addition, the 
design of the study was cross sectional, which does not allow for causal interpretations.   
 
LaRose and Kim (2006) took moral justification into consideration in their study. They 
proposed that moral justification is a predictor of intentions to continue illegal downloading. 
However from the results, the researchers found weak correlations between moral 
27 
 
justification with regard to self-efficacy (r= 0.38; p ? 0.01), with intention (r= 0.32; p ? 0.01), 
and subjective norms (r= - 0.21; p ? 0.05). In addition, from the structural equation model the 
researchers presented, they found the path between moral justification and intentions to 
continue downloading music to be nonsignificant.  
 
These results could be due to the fact that the researchers used a structural equation model 
(SEM) to analyze the data on 134 participants, which is not feasible, as SEM is very sensitive 
to sample size, and a minimum of 200 participants is required (Hardy & Bryman, 2004). 
Yuan and Bentler (1999) suggested that if a sample size is not large enough it could lead to 
the rejection of an apparently well-fitting model. In addition, the model is only fitted 
according to three indices such as CFI, RMSEA and ??, which is not sufficient. As such, the 
model presented by LaRose and Kim (2006) is questionable.   
 
Model Proposed for this Study 
A mediator is a ?variable that stands causally between a predictor and some variable on 
which it has an effect, and that account, in whole or in part, for that effect? (Cohen, Cohen, 
West & Aiken, 2003, p. 676). Figure 3 depicts a simple standard mediation, which will be 
used to clarify the meaning of mediation. 
 
 
 
 
 
 
 
28 
 
 
 
 
                                                                                             
     
 
 
 
 
 
 
 
FIGURE 3: Simple and Standard Mediation Model (adapted from Baron & Kenny, 1986). 
 
 
 
The model assumes a three-variable system, creating two paths feeding into the outcome 
variable (DV). The direct impact of the independent variable (predictor) on the outcome 
variable (Path c), and the impact of the mediator on the outcome variable (Path b), in addition 
there is also a path from the independent variable (predictor) to the mediator (Path a) (Baron 
& Kenny, 1986). According to Iacobucci, Saldanha and Deng (2006), some extent of 
mediation is indicated when both of the relationships between predictor (IV) and mediator, 
and mediator and outcome (DV) coefficients are significant. 
 
A model developed by the researcher is presented in Figure 4. The model tied together three 
predictor variables (i.e. self-efficacy, social norms and attitudes), and a mediator (moral 
disengagement) with the outcome variable (intentions).  
 
ba
 Predictor 
Variable 
(IV) 
Outcome 
Variable 
(DV) 
Mediator
 (M) 
c
29 
 
 
   
 
 
 
            
 
 
 
  
 
 
 
 
FIGURE 4: Theoretical model of Moral Disengagement as a mediator for the 
relationship between the predictors (i.e. attitudes, social norms and self-efficacy) 
with an individuals? intention to the unauthorised copying of software. 
 
 
Moral disengagement for one has not been empirically examined in terms of its capacity as a 
mediator in such a relationship. It is predicted that if an individual is involved in the 
unauthorised copying of software, he or she will show higher levels of moral disengagement 
compared to those individuals who do not copy software illegally. In addition, it is also 
predicted that positive attitudes, social norms and self-efficacy beliefs towards the 
unauthorised copying of software, would show higher levels of moral disengagement, 
compared to individuals who do not favour illegal software copying. It is also predicted that 
moral disengagement positively relates to intentions to unauthorised copying of software, 
since individuals with strong intentions to unauthorised copying of software may disengage 
to maintain their behaviour as being innocent. If this is the case, then the researcher expects 
Self-Efficacy 
(IV) 
Moral 
Disengagement
 (Mediator) 
Intentions 
(DV) 
Social Norms 
(IV) 
Attitudes 
(IV) 
30 
 
moral disengagement to mediate the relationship between attitudes, social norms and self-
 efficacy, with an individual?s intention to unauthorised copying of software.  
   
This mediation could effect this relationship in numerous ways. For one, social norms act 
through the judgemental process component of the self-regulatory mechanism, whereby 
individuals are constantly observing their behaviour and judging its appropriateness 
compared to what is morally right. Thus if an individual views important others as 
participating in the unauthorised copying of software, they have low self-efficacy, and they 
have favourable attitudes towards the unauthorised copying of software, they are likely to 
perform the act of illegal software copying. However, this act is strengthened as the 
individual will morally disengage themselves from this transgressive conduct, so they would 
not feel guilty or self-censure. Thus, moral disengagement is included as a mediator in 
attempting to explain the basic relationship. 
 
2.4. RESEARCH QUESTIONS 
From the above discussion it is clear that there could be possible relationships between these 
variables. The study intends to provide a greater understanding and a more in-depth 
description of the relationship between these variables, as well as providing a model which 
could build on SCT within the area of unauthorised software copying. The aim of the 
research is twofold: Firstly, to use SCT in the elaboration of a model that can identify key 
factors influencing software piracy. This model should also explain the relationship between 
individuals? intentions to pirate software and individuals? attitude, social norms and self-
 efficacy of software piracy. Secondly, the research is considering moral disengagement as a 
mediator within the developed model. Moral disengagement for one has not been empirically 
examined in terms of its capacity as a mediator in such a relationship. 
31 
 
As such, the research questions for the current study are: 
1. There is a positive relationship between attitudes and intentions to unauthorised 
copying of software. 
2. There is a positive relationship between self-efficacy and intentions to unauthorised 
copying of software. 
3. There is a positive relationship between social pressures and intentions to 
unauthorised copying of software. 
4. Moral disengagement mediates the relationship between self-efficacy, attitudes and 
social norms; and intention to unauthorised copying of software. 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
32 
 
 
CHAPTER 3 
METHOD 
This chapter provides information on the methods used and procedures followed in 
completing the current research. The purpose for this is to indicate that the methods and 
procedures used are plausible and reliable, and generalizable to the population. The chapter 
includes a detailed description of the research design and sample, the data collection 
procedures, the instruments and measures that were utilised, and the analysis techniques that 
were carried out in the research.  
3.1. RESEARCH DESIGN 
Terre Blanche and Durrheim (p. 483, 1999) describe a research design as ?a strategic 
framework or plan that guides research activity to ensure that sound conclusions are 
reached?. As such, a research design attempts to answer the research questions, by employing 
different combinations of methods and procedures, such as the types of measurements, 
sampling, data-collection and data-analysis methods that were employed in the current study, 
as well as the sequence in which they were employed (Babbie & Mouton, 2004). The current 
study adopted a quantitative, non-experimental, exploratory, cross-sectional, correlational 
research design. 
 
The current research is exploratory in nature, as the subject of study is relatively new (Babbie 
& Mouton, 2004). The relationship between certain aspects of  Social Cognitive Theory, such 
as moral justification, self-efficacy, social norms and intentions to unauthorised copying of 
software have been given some attention, however no previous attempts have been made to 
intentionally explore Moral Disengagement as a Mediator. As such, this research attempts to 
establish the nature of the relationship between attitudes, self-efficacy, social norms and an 
33 
 
individual?s intention to unauthorised copying of software and to examine Moral 
Disengagement as a Mediator of the relationship between attitudes, self-efficacy, social 
norms and intentions to unauthorised copying of software. 
 
The design is non-experimental as there is no control or manipulation of the independent 
variable. In addition to this, there is no control group or random assignment (Leedy, 1993). 
Non-experimental research is the most logical, practical analysis from which inferences about 
the relationship between variables can be made, rather than cause and effect relationships 
(Kerlinger, 1986). 
 
As this research involves the observation of the variables at a single point in time, it is cross-
 sectional in nature (Babbie & Mouton, 2004; Rosnow & Rosenthal, 1991). Finally, in 
attempting to describe relationships and associations that exist between the variables, the 
current research is correlational in nature (Rosnow & Rosenthal, 1991; Terre Blanche & 
Durrheim, 1999).  
 
3.2. SAMPLE 
The selection of participants for the study presented a considerable challenge, as the number 
of computer-users within South Africa and organisations have increased at a considerable 
rate. It is therefore difficult to select a representative sample, for this reason the researcher 
felt that using probability sampling would not be appropriate or feasible for the current study, 
as such, the researcher focused on organisations where computer use was a fundamental 
feature in the job design. Non-probability sampling was utilised as the sampling procedure 
within the current study, in particular, purposive or judgemental sampling.  
 
34 
 
Non-probability samples are not selected according to the principle of statistical randomness, 
but rather, it was selected according to its convenience or accessibility (Terre Blanche & 
Durrheim, 1999). This creates two problems for the researcher, firstly, that there is no way to 
estimate the probability of each element being included in the sample, and secondly, no 
guarantee that each element has some chance of being included (Babbie & Mouton, 2004). 
Purposive sampling suggests that the researcher selects a sample with a ?specific purpose in 
mind? (Terre Blanche & Durrheim, p. 281, 1999). The organisations selected were those that 
have certain characteristics and could provide useful information for the purpose of the study, 
i.e. these organisations use computers and software programmes on a regular basis, which is 
an important aspect in the study. 
 
The study was conducted within one medium-sized South African Information Technology 
(IT) organisation, and one department of a large South African production organisation. In 
addition, a sample was also collected from four Zambian banking industries. The Zambian 
banking industries were included in the study as this African country is one of the top twenty 
countries with the highest piracy rates, compared to South Africa, which was one of the 
countries with the lowest piracy rates (BSA, 2007). Due to confidentiality purposes their 
names will not be mentioned. All of the individuals in these organisations rely heavily on 
computers as a part of their daily work routine and thus, utilise a variety of software. The 
sample comprised of 43% (n=94) from the production industry, 29% (n=62) from IT 
industry, and 28% (n=61) from the banking industry. 
 
Of the 125 questionnaires distributed in the production industry, 111 were returned. This 
represents an 88% response rate. Of those returned, 31 questionnaires were spoilt, as a result 
of the questionnaires being incomplete, and were omitted from the study. This represents a 
35 
 
usability rate of 80% for the production industry. In the IT industry 102 questionnaires were 
distributed of which 71 were returned to the researcher, this represents a response rate of 
71%. Of those returned however, 9 were identified as incomplete and omitted from the study, 
which represents a usability rate of 61% for the IT industry.  
 
Within the Zambian banking industries, 30 questionnaires were distributed in each of the four 
banking industries. In the first bank 18 questionnaires were returned, with a response rate of 
60%, of which 16 were usable. This represents a usability rate of 53%. The second bank 22 
questionnaires were returned, with a response rate of 73%, of which 19 were usable. This 
represents a usability rate of 63%. The third bank, 14 questionnaires were returned, with a 
response rate of 46%, of which all the questionnaires were usable. The fourth bank 12 
questionnaires were returned, with a response rate of 40%, of which all the questionnaires 
were usable.    
 
A total of 217 responses were used in the study. The overall response rate was 71%, and the 
overall usability rate was 63% for all the organisations. The good response rate can be as a 
result of the interesting nature of the study as well as the media attention that unauthorised 
copying of software has gained over the last few years. Those individuals that did not return 
their questionnaires or left them blank could be due to the contentious nature of the research, 
as we were examining at moral behaviour, and how people felt about the unauthorised 
copying of software. 
 
The ages of the participants (See Table 1) were divided into six groupings, with ten years 
between each grouping. The first grouping, 18-28 years of age, n=86 (40%), the second 
grouping, 29-38 years of age, n=78 (36%). The third grouping, 39-48 years of age, n=32 with 
36 
 
14%, and the fourth grouping, 49-59 years of age, n=14 (7%). The fifth grouping, 60 and 
above years of age, n=5 with 2%. The largest proportion of the sample fell between the first 
grouping of 18-28 years. There were considerably fewer participants over the age of 49. Two 
participants did not indicate their age grouping. In the table provided (Table 2), it is evident 
that the sample consisted of 55% male (n=118), and 45% (n=96) females. Three participants 
did not identify their gender. 
 
 
 
TABLE 1: Frequency and Percentages of Participants Age Groups 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
Variable         N              %  
      
Age: 
 18-28        86       40   
29-38        78        36   
39-48        32                   15          
 48-59        14          7          
             60+          5          2        
  
37 
 
Racially, the sample is composed of Black, White, Coloured, Indian and Other participants 
(See Table 2). The majority of the participants were White (n=96, 45%), followed closely by 
African (n=94, 43%). The rest of the sample, 6% (n=13) were Indian, 5% (n=11) were 
Coloured, and finally 1% (n=2) were identified as Other. The racial composition of the 
sample is not representative of the broader South African population, where Whites are a 
minority.  
 
With regard to education level (See Table 2), the sample ranged from participants with a 
High School education to those with a Postgraduate Degree. The table shows that only 1% 
(n=3) had some form of High School education, 9% (n=20) had obtained a Matric Certificate, 
33% (n=71) had completed a Diploma Course, 27% (n=57) had completed undergraduate 
degrees, and 30% (n=63) had completed postgraduate degrees. This is in line with the nature 
of the industries and occupations, which make use of qualified individuals.  
 
It is evident from Table 2 that participant?s occupation ranged from 78% (n=169) employed 
professionals, 13% (n=29) semi-employed professionals, while the remainder of the sample 
consisted of, 4% (n=9) part-time working students, 4% (n=8) self-employed, and one retired 
participant, these participants made up a very small proportion of the overall total. In relation 
to generalisability, this sample is not typical of the public at large. With regard to the 
departments the participants work in (See Table 2), the sample comprised of 36% (n=75) 
from the IT department, 25% (n=53) from sales and marketing, 13% (n=27) in the financial 
department, 10% (n=21) in HR, 5% (n=10) in a technical department, and 4% (n=9) in 
consulting. Within the smaller proportion of the sample, 1% (n=2) were from a legal 
38 
 
department, 2% (n=3) education, and 3% (n=6) only specified their department as other. 
Eleven participants did not indicate which department they were from. 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
39 
 
TABLE 2: Frequencies and Percentages of Participants Gender, Race, Education, 
Occupation and Department. 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
Variable        N                            %  
            
Gender: 
 Male      118               55          
Female       96               45        
Race: 
 African      94      43         
 Indian       13      6       
 Coloured      11      5       
 White       96    45       
 Other         2      1             
  
Education: 
 Primary School       0       0           
 High School        3       1           
 Matric       20       9         
 Diploma      71     33         
 Undergraduate     57     27         
 Postgraduate      63     30       
 
Occupation: 
 Student        9       4        
Employed/ Professional  169     78        
Employed Semi/ Professional    29      13        
Self-Employed       8       4        
Unemployed        0       0        
Retired        1                  1      
 
Department: 
 IT      75       36          
 Legal        2       1        
 Sales & Marketing    53     26        
 Technical     10        5       
 Consulting       9        4        
 Education       3       2        
 Engineering       0                  0        
 Financial     27     13        
 Government       0       0        
 HR      21      10        
 Other        6                  3      
40 
 
In addition to this, participants were asked (See Table 3) the number of years and hours of 
computer use, as well as how frequently in a week they use programming packages, office 
programs, technical software, computer games and the Internet. This was done as a means of 
gaining a greater insight into the participants? computer usage. It is suggested that the more 
computer experience an individual has, the higher their literacy and knowledge of certain 
computer programmes, and the more likely that individual is to copy software illegally 
(Rahim & Seyal, 2001).  
 
From Table 3, it is apparent that the average years for computer usage was between 10-15 
years (n=76, 35%). This is followed by those who had 5-10 years with 28% (n=61). With 
regard to the number of hours a day that participants use a computer, 66% (n=142) used 
computers between 5-10 hours a day. In addition, the average numbers of participants do not 
use programming packages such as C++, Java, Perl etc., as 52% (n=111) indicated that they 
do not use this type of software. With regard to office program use, such as word processing, 
spreadsheet etc., 42% (n=90) of the participants use this type of software 2-8 hours a day.  
 
The same can be said for technical software usage such as DTP, CAD, SAP and other 
statistical and accounting applications, as (n=77, 36%) of the participants do not use this type 
of software. Participants using computer games followed the same trend as 50% (n=112) of 
the participants did not use computer games. The average weekly Internet use by participants 
is once to a few times a week (n=92, 43%). Participants in the research were all moderate 
computer users, however a large proportion of these participants do not use most of the 
software packages presented in the questionnaire. 
 
 
41 
 
TABLE 3: Frequencies and Percentages of Participants Computer Usage. 
 
 
  
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
Table 5: Frequencies and Percentages of Participants Internet Usage. 
 
 
 
Variable         N               %  
               
Years of computer use: 
 Less one year         4                             2         
            1-5 yrs        21               10   
5-10yrs       61                              28                       
10-15yrs       76    35       
15-20yrs       40    19       
20+ yrs       14        6     
Hours of computer use (per day): 
 1-5 hrs        55                25       
 5-10hrs     142     66       
 15-20hrs       17         8       
 20+ hrs         1         1     
Programming package use (weekly): 
 Never      111     52   
 Less once a week      43     20       
 Once to few times      21      10       
 Up to 2hrs a day        6          3       
 2-8 hrs a day       19                     9      
 More 40+ hrs       14          6     
Office program use (weekly):  
 Never          2          1        
 Less once a week        4           2        
 Once to few times      45      21       
 Up to 2hrs a day      35      16       
 2-8 hrs a day       90        42      
 More 40+ hrs       39      18     
Technical software use (weekly): 
 Never        77      36       
 Less once a week      35      16       
 Once to few times      40      19       
 Up to 2hrs a day      19          9       
 2-8 hrs a day       34           16      
 More 40+ hrs         9         4     
Computer game use (weekly): 
 Never      112      52       
 Less once a week      58     27       
 Once to few times      36      16   
 Up to 2hrs a day        6          3       
 2-8 hrs a day         4            2      
 More 40+ hrs         0         0     
Internet usage (we kly):            
 Never          3          1         
 Less once a week      11          5       
 Once to few times      92                43       
 Up to 2hrs a day      49                23       
 2-8 hrs a day       47                   22      
 More 40+ hrs       14           6     
42 
 
3.3. PROCEDURE 
Permission to conduct this study was obtained from Human Resource Managers from the 
various organisations in the Johannesburg and Lusaka areas. These organisations were 
approached by the researcher via the researcher?s contacts in the various organisations; this 
was done by providing the contacts with an Organisation Participant Information Sheet for 
each of the Human Resource Managers (See Appendix 1), which briefly explained the aim 
and nature of the research. The researcher contacted the Human Resource Managers within 
each of the organisations and arrangements were made to distribute and collect the 
questionnaires. Members of these organisations were then addressed by their Human 
Resource Managers and informed about the research, so that employees were made aware 
that the study was being conducted entirely independently of the organisation. 
 
In addition to this a participant information sheet (See Appendix 2) was attached to the 
questionnaires which briefly explained the aim and nature of the research. Individuals were 
made aware that they would not be advantaged or disadvantaged in any way if they chose to 
complete or not complete the questionnaire. In addition to this, it was stated that the 
completed questionnaires were to be regarded as informed consent from individuals to 
participate in the study. Participants were asked to complete the questionnaires voluntarily, 
and place the completed questionnaire in the accompanying envelope, and seal it. The 
participants were then asked to place the envelopes in a sealed box, which was left in the 
reception areas of the aforesaid organisations. This would ensure that no one but the 
researcher would have access to the completed questionnaires, which on the completion of 
the research, would be destroyed. Additionally, the participant information sheet stated that 
anonymity and confidentiality would be assured in all instances as participants were not 
asked to provide any identifying information. 
43 
 
A time limit of one week was given to participants to return the questionnaires, which were 
collected from the organisation by the researcher. Once all the completed questionnaires were 
collected by the researcher, the data was captured and subsequently analysed. 
 
3.4. MEASURING INSTRUMENTS 
The questionnaire that was administered was a self-report, structured questionnaire, whereby 
participants were asked to read and respond to questions themselves, by selecting a particular 
choice to describe their own actions (Rosnow & Rosenthal, 1991). The researcher utilized the 
following instruments in order to answer the research questions: biographical, attitude, self-
 efficacy, social norms, moral disengagement and intention instruments. 
 
3.4.1. BIOGRAPHICAL INFROMATION SHEET 
A biographical blank (See Appendix 3) was designed in order to collect data regarding 
demographic information, the following variables were seen as being relevant within the 
context of the present study: age, gender, race, education, occupation, department, years of 
computer use, hours of computer use, programming package use, use of office programmes, 
use of technical software, use of computer games, and use of the Internet. It is suggested that 
the more computer experience an individual has, the higher his literacy and knowledge of 
certain computer programmes, and the more likely that individual is to copy software 
illegally (Rahim & Seyal, 2001). 
 
3.4.2. ATTITUDES TO UNAUTHORISED COPYING OF SOFTWARE SCALE 
The attitudes scale is adapted from a study conducted by Swinyard, Rinne and Kau (1990) 
and investigates attitudes to unauthorised copying of software. Reliability and validity scores 
were not reported in the original study.  Statements were measured on a 5-point Likert scale 
44 
 
(1= Strongly Disagree, 2= Somewhat Disagree, 3= Neutral, 4= Somewhat Agree, 5= Strongly 
Agree). A high score therefore would mean that an individual has a positive attitude towards 
the unauthorised copying of software. Participants were asked to indicate their view towards 
these statements:  
1. I would feel guilty about being in possession of unauthorised copies of software. 
(Reversed Scored) 
2. I would not feel badly about making unauthorised copies of software. 
3. I would feel guilty about giving my close friends unauthorised copies of copyrighted 
software. (Reversed Scored) 
4. I feel that making unauthorised copies of software is fine. 
5. The benefits of unauthorised copying of software outweigh the possible 
consequences. 
  
The first three statements were taken from the Swinyard, et al. (1990) study and the fourth 
and fifth statements were self-developed. The fourth statement was developed as the original 
question dealt with individual?s actual unauthorised copying of software behaviour; therefore 
due to ethical considerations it was rephrased. The fifth statement was developed as the 
original questionnaire did not take into account important aspects, such as the perceived 
consequences of performing certain behaviours, as discussed in the theory. Attitudes towards 
a behaviour actually stem from salient beliefs, that performing the behaviour will lead to 
certain consequences. Thus, if an individual feels that there is more to be gained than lost by 
the unauthorised copying of software, they would have more favourable attributes towards 
software piracy ( Rahin, Seyal & Rahman, 2001; Randall, 1989). The total scale consisted of 
5 items, of which items one and three were reversed scored. 
45 
 
3.4.3. SELF-EFFICACY TO UNAUTHORISED COPYING OF SOFTWARE SCALE 
The self-efficacy scale (See Appendix 4) was constructed by Kuo and Hsu (2001), which is 
based on Bandura?s SCT, and examines participants? conduct towards unauthorised copying 
of software. The self-efficacy scale consists of 12 items, revealing three dimensions within 
the construct. These dimensions are termed ?use and keep? (do not use or keep unauthorised 
copied software), ?distribution? (do not distribute unauthorised copied software) and 
?persuasion? (persuade others not to commit unauthorised copying of software). Of these 12 
items, 6 items measured use and keep self-efficacy, 3 items measured distribution self-
 efficacy and persuasion self-efficacy respectively. Kuo and Hsu (2001) reported a Cronbach 
alpha of .70. 
 
Statements were measured on a 5-point Likert scale (1= Not at All Confident, 2=Not Very 
Confident, 3= Neutral, 4= Relatively Confident, 5= Extremely Confident). A high score 
therefore would mean that an individual has the ability to sanction themselves against making 
difficult ethical-violation decisions. Thus an individual with high self-efficacy might not use, 
keep or distribute unauthorised copied software; in addition, they might persuade others not 
to commit unauthorised copying of software, than those individuals with lower judgements of 
self-efficacy. 
 
For the purpose of the study all 12 items were reverse scored, as a means to circumvent the 
use of negative correlations, as all the other measurement instruments favour the 
unauthorised copying of software, whereas self-efficacy does not. Therefore if an individual 
scores high on self-efficacy, they are more likely to use, keep or distribute unauthorised 
copied software, in addition, they would be more likely to try and persuade others to commit 
46 
 
unauthorised copying of software, than those individuals with higher judgements of self-
 efficacy. 
 
3.4.4. SOCIAL NORMS TO UNAUTHORISED COPYING OF SOFTWARE SCALE 
The subjective norms scale is adapted from a study conducted by Povey, Conner, Sparks, 
James and Shephard (2000), to investigate societal norms to unauthorised copying of 
software. The scale was adapted by changing certain words in the questions to suite the 
current study, as Povey et al. (2000) examined social norms with regards to dietary behaviour 
(e.g. Most of the people I know eat a low-fat diet). Cronbach alpha of .74 was reported in the 
original study. Statements were measured on a 5-point Likert scale (1= Strongly Disagree, 2= 
Disagree, 3= Neutral, 4= Agree, 5= Strongly Agree). A high score therefore would mean that 
an individual has a positive regard towards the unauthorised copying of software, i.e. if 
important others view unauthorised copying of software as appropriate behaviour, these 
individuals would usually comply with this behaviour (Seale, Polakowski & Schneider, 
1998). Participants were asked to indicate their view towards these statements:  
1. Most people I know make unauthorised copies of software. 
2. People who are important to me think I should not make unauthorised copies of 
software. (Reversed Scored) 
3. People who are important to me would approve of my making unauthorised copies of 
software. 
4. People who are important to me want me to make unauthorised copies of software. 
5. I feel under social pressure to make unauthorised copies of software. 
6. People who are important to me do not influence my decision to make unauthorised 
copies of software. (Reversed Scored) 
7. My work colleagues would approve of my making unauthorised software copies. 
47 
 
8. My manager would think that I should not make unauthorised software copies. 
(Reverse Scored) 
9. My organisation does not support making unauthorised software copies. 
 
The first 6 statements were taken from Povey, et al. (2000), which only addressed social 
norms with regard to important social figures. The last three statements were self-developed. 
These statements were added as the original questionnaire did not take organisational norms 
with regards to colleagues, managers and organisational views, into consideration. The total 
scale consists of 9 items, of which items 2, 8 and 9 were reversed scored. 
 
3.4.5. INTENTIONS TO UNAUTHORISED COPYING OF SOFTWARE SCALE 
The intention scale was also adapted from the study conducted by Povey, et al. (2000), to 
investigate an individuals? intent to unauthorised copying of software. The scale was adapted 
by changing certain words in the questions to suite the current study, as Povey et al. (2000) 
examined intentions with regards to dietary behaviour (e.g. I intend to eat a low-fat diet).  A 
Cronbach alpha of .95 was reported. Subjects were asked to indicate their view towards these 
statements:  
1. I intend to make unauthorised software copies in the future. 
2. I plan to make unauthorised software copies in the future. 
3. I am tempted to make unauthorised software copies in the future. 
 
These items where rephrased to fit the current study. Statements were measured on a 5-point 
Likert scale (1= Strongly Disagree, 2= Disagree, 3= Neutral, 4= Agree, 5= Strongly Agree). 
A high score therefore would mean that an individuals? intent to engage in unauthorised 
software copying would be greater. 
48 
 
3.4.6. MORAL DISENGAGEMENT TO UNAUTHORISED COPYING OF 
SOFTWARE SCALE 
This moral disengagement scale was developed by the researcher in her previous year of 
study (Wentzell, 2006), as a means to measure moral disengagement in the exercise of 
unauthorised copying of software. It is assumed that moral disengagement, which takes place 
in a person over time, manifests itself in an attitude, which in turn can be measured by 
strength of agreement with a statement (Jackson & Sparr, 2005). For instance, repeated 
exposure or engagement in moral justification should lead to accepting and agreeing with 
arguments reflecting this mechanism more often (Bandura, 1986).  
 
The items developed in the research corresponded to the various mechanisms of moral 
disengagement namely, moral justification, euphemistic labelling, advantageous comparison, 
displacement of responsibility, diffusion of responsibility, distortion of consequences, 
attribution of blame and dehumanisation. The questionnaire contains eight subscales, each 
one measuring a different moral disengagement mechanism. The original questionnaire 
represented each mechanism with 5 items. The total scale consisted of 40 items. A Cronbach 
Alpha of .92 was reported.  
 
Items within the mechanisms were correlated; those that did not correlate within the 
subscales were deleted from the questionnaire. The moral disengagement statements were 
measured on a 5-point Likert scale (1= Strongly Disagree, 2= Somewhat Disagree, 3= 
Indifferent, 4= Somewhat Agree, 5= Strongly Agree). The final adapted questionnaire 
consisted of 20 items (See Appendix 5). 
 
 
 
 
49 
 
3.5. STATISTICAL ANALYSIS 
The following section details the statistical techniques utilised in the analysis of the results. 
This consisted of both preliminary and exploratory statistics. 
 
3.5.1. PRELIMINARY STATISTICS 
Basic descriptive analysis is usually conducted and necessary to make results meaningful, 
and are used to describe the characteristics of a sample, and the relationship among the 
variables in a sample (Babbie & Mouton, 2004). To conduct the preliminary analysis, the 
researcher examined the means and frequencies of the variables, as well as the internal 
reliabilities of the scales. The frequencies and percentages of the sample can be found in 
Table 2 (p. 37).  
 
Internal Reliability Analysis 
Reliability refers to the extent to which the scale is consistently measuring the instrument at 
hand (Anastasi, 1976). Internal reliability measures assess the homogeneity of test items 
(DeVellis, 1991), or the extent to which items on a given scale correlate with each other 
(Rosenthal & Rosnow, 1991). The higher the inter-item correlation, the more consistently the 
scale is measuring the same construct (Murphy & Davidshofer, 2001). The internal 
reliabilities of the scale and sub scales used in the current research were calculated using 
Cronbach?s alpha. A Cronbach?s alpha coefficient of 0.60 and above is regarded by some 
theorists as acceptable for the Social Sciences (McKennell, 1970), while others maintain that 
0.75 is a more suitable cut off point (Terre Blanche & Durrheim, 1999). 
 
 
 
50 
 
3.5.2. EXPLORATORY STATISTICS  
The secondary analysis consists of a Pearson?s Correlation Coefficient to test research 
questions one, two and three. This is conducted before the structural equation modelling to 
see whether the variables do correlate with one another respectively. Structural equation 
modelling is used to answer the final question. 
 
Correlations 
Correlations indicate the degree to which two variables are related (Howell, 2004). Rosnow 
and Rosenthal (1991) describe a linear relationship as one where a fixed change in one 
variable is always associated with a fixed change in another variable. A correlational analysis 
is a technique that allows for the directionality and a degree of linear relationships between 
two variables to be established (Terre Blanche & Durrheim, 1999). A correlation coefficient 
is a number from ?1.00 through to +1.00, which reflects the nature of the linear relationship. 
A 0.00 correlation indicates no relationship, with ?1.00 reflecting a perfect negative 
relationship and +1.00 perfect positive one (Howell, 2004).  
 
Correlation analyses, using the Pearson? Product Moment Correlation Coefficient, were 
conducted in order to establish whether associations existed between the IVs (attitudes, self-
 efficacy and social norms) and the DV (intentions). In addition, correlations were done 
between all variables, including the mediating variable. Baron and Kenny (1989) suggested 
that associations need to be established between IVs, DV and mediator before proceeding 
with the mediational analysis. 
 
 
 
51 
 
Structural Equation Modelling (SEM) 
Structural equation modelling (SEM) is a set of statistical procedures for estimating the 
relationship between underlying constructs (latent variables) and measured variables (the 
measurement model), and among both measured variables and the latent variables themselves 
(the structural model) (Cohen, Cohen, West & Aiken, 2003; Hardy & Bryman, 2004). SEM is 
a widely used approach to testing for mediated relationships among constructs or variables 
particularly when multiple items have been measured to capture the focal construct 
(Iacobucci, Saldanha & Deng, 2007). 
 
The structural equation model centres around two steps: validating the measurement model 
and fitting the structural model. The former is accomplished through exploratory factor 
analysis, and latter, primarily through path analysis with latent variables (Garson, 1998).  
 
Latent (or unobserved and factor) variables are estimated by factor analytic methods (Cohen, 
Cohen, West & Aiken, 2003). Validity refers to the extent to which a scale measures what it 
is supposed to measure (Murphy & Davidshofer, 2001). Construct validity is the extent to 
which the scale actually captures the theoretical construct or trait that it is supposed to 
measure (Rosenthal & Rosnow, 1991). Factor analysis is one of the most common statistical 
measures of construct validity. The purpose of factor analysis is to describe relationships 
among many variables in terms of a few underlying quantities termed factors (DeVellis, 
1991; Johnson & Wichern, 1998).  
 
A factor is a grouping of variables that have a high correlation with one another but a low 
correlation with variables in another group. As such, it is argued that each group of variables 
represents a single underlying construct (Johnson & Wichern, 1998). Each variable in the 
52 
 
model is conceptualised as a latent one, measured by multiple manifest (or observed, 
measured and indicator) variables. As such, manifests (indicators) are developed for each 
model, with at least three per latent variable (Garson, 1998). Factor analysis is thus utilised in 
the study to establish if the manifest variables seem to measure the corresponding latent 
variables, represented by the factors and to group manifest variables into parcels if the theory 
did not specify this. 
 
Path analysis is fundamental to SEM, as this step allows the researcher to diagram the 
hypothesized set of relationships (i.e. the model), including the estimation of the parameters 
of the model, as well as model fit (Hardy & Bryman, 2004). The diagram presents the 
theoretical constructs in the study and represents all latent variables as ovals and circles, and 
manifest variables are represented as rectangles (Cohen, Cohen, West & Aiken, 2003; 
Garson, 1998; Hardy & Bryman, 2004). 
 
 The estimation of parameters, takes the potential relationships, and the direction of effect, as 
well as significant paths between each pair of variables (latent and manifest) into 
consideration (Hardy & Bryman, 2003). Model fit on the other hand determines if the model 
being tested should be accepted or rejected, this is accomplished through fit tests (Garson, 
1998). Standards for adequate fit in SEM require that certain indices fit certain criteria. The 
goodness of fit measures used in this study is the Goodness of Fit Index (GFI), Adjusted GFI 
(AGFI), Bentler and Bonett?s (1980) Non-Normed Fit Index (NNFI), Bentler?s Comparative 
Fit Index (CFI), Root Mean Square Error of Approximation (RMSEA), Root Mean Square 
(RMR), Probability of Close Fit and Hoelter?s (1983) Critical N. 
 
53 
 
The assumptions of a structural equation model are (Garson, 1998; Cohen, Cohen, West & 
Aiken, 2003): 
? Normality- Each variable in the model should be normally distributed.  
? Linearity- SEM assumes linear relationships between variables. 
? Modelling error- This requires that there should be three or more measures for each 
latent variable in the model, to prevent underidentification and lower measurement 
error. 
? Measurement error- measured variables should be measured without error. 
? Homogeneity- SEM is sensitive to sample size; therefore a minimum of 200 
participants in needed for central limit theorem to have ensured that coefficients will 
be good estimates.  
? Multicollinearity- Complete multicollinearity is assumed to be absent. 
 
 
 
 
 
 
 
 
 
 
 
54 
 
 
 
3.6 ETHICAL CONSIDERATIONS 
Participation in the research entailed completing a questionnaire. This questionnaire did not 
entail individuals answering any questions based on their unauthorised copying of software 
behaviour. A participant information sheet was attached to each questionnaire, which 
presented a complete, non-technical and comprehensible explanation of the intended research 
and the tasks expected from the participants. This is done with the intention that participants 
can make an informed choice to participate voluntarily in the research. No identifying 
information, such as the respondent?s name was asked for, and as such the participant 
remained anonymous. Confidentiality and anonymity was guaranteed as participants placed 
their completed questionnaires in the accompanying envelope, and placed in a sealed box, 
which was left at the organisation?s reception areas for the researcher to collect. Only the 
researcher saw the completed questionnaire with no identifying information on it. 
Participation was voluntary, and no individual was advantaged or disadvantaged in any way 
for choosing to complete or not complete the questionnaire. The analysis only reported 
general trends and differences between groups, not individual perceptions. A summary of end 
results was reported to the organisation; in addition, the results were also posted within the 
organisation for all participants who participated in the research to give them feedback.  
 
 
 
 
 
 
 
55 
 
 
 
CHAPTER 4 
RESULTS 
The following chapter presents the results of the statistical analysis. The raw data were 
analysed using SAS Enterprise Guide Version 5. First the researcher examined at the means 
and frequencies of the demographic variables, as well as the internal reliabilities of the 
measuring instruments. This will be followed by correlation analysis and Structural equation 
modelling (SEM) (using PROC CALIS, a SAS procedure) to analyse the data. 
 
4.1 PRELIMINARY ANALYSIS RESULTS 
MEAN, FREQUENCIES AND INTERNAL RELIABILITY 
The demographic information of the sample was presented in Table 2 (Chapter 3, p. 39); this 
information is of importance to understand the sample used within the current study. The 
table below reflects the means, standard deviation, maximum and minimum scores, skewness 
and kurtosis, as well as the internal consistency reliability coefficients for each of the scales 
used within the study. Where appropriate missing data were replaced with mean values. 
 
The results from Table 4 show that the intentions scale ranged from a minimum of 3 to a 
maximum score of 15. The mean was 6.94 and the standard deviation 3.41. The skewness 
was 0.46 and kurtosis ?0.82. The results suggest that the mean of the intentions scale is 
slightly skewed to the right, and platykurtic (i.e. flat unimodal symmetric distribution), thus 
resulting in people having positive intentions towards the unauthorised copying of software. 
With regard to attitudes the scores range from 5 to 25, with a mean of 12.82, standard 
deviation of 4.52, skewness of 0.26 and kurtosis of 0.04. This mean reveals a slight skewness 
56 
 
to the right and platykurtic, thus resulting in more participants having a positive attitude 
towards unauthorised copying of software. 
TABLE 4: Means, Standard Deviations, Minimum and Maximum, Skewness and Kurtosis, 
and Internal Consistency Reliabilities of Measuring Instruments. 
 
 
 
The social norms scale ranged from 10 to 39, with a mean score of 22.47, standard deviation 
of 5.41, skewness of 0.09 and kurtosis of -0.11. These scores reflect a slight skewness to the 
right, and platykurtic, suggesting that participant? social norms are positive towards the 
unauthorised copying of software. With regard to self-efficacy the scale scores ranged from 
12 to 60, with a mean score of 34.73 and standard deviation of 12.40, skewness of -0.06 and 
kurtosis of -0.56. These scores reflect a slightly skewed distribution to the left, and 
platykurtic, suggesting that participants? self-efficacy is negative towards the unauthorised 
copying of software. The moral disengagement scale ranged from 19 to 98, with a mean score 
of 48.37, standard deviation 16.02, skewness of 0.25 and kurtosis of 0.08. The mean reveals a 
slight skewness to the right, and platykurtic, which suggests that participants? moral 
disengagement is positive towards unauthorised copying of software.  
 
Variable N Mean Std. 
 
Min Max Skewness Kurtosis Reliability
 INTENTIONS 217 6.93 3.41 3 15 0.46 -0.82 .91 
ATTITUDES 217 12.83 4.52 5 25 0.26 0.04 .81 
SOCIAL NORMS 217 22.47 5.41 10 39 0.09 -0.11 .79 
SELF-EFFICACY 217 34.73 12.40 12 60 -0.06 -0.56 .93 
MORAL 
DISENGAGEMENT
 217 48.37 16.02 19 98 0.25 0.08 .94 
57 
 
From the Table it is also evident that Intentions, self-efficacy and moral disengagement have 
high alpha values of .91, .93 and .94 respectively. This is followed by attitudes with a 
moderately high alpha value of .81. Social norms had an original low but satisfactory alpha of 
.73. However, item 6 (i.e. People who are important to me do not influence my decision to 
make unauthorised copies of software) did not correlate with the rest of the items in the scale. 
This could be due to the fact that the question was double-barrelled, and consequently the 
item was deleted from the study. This presented a higher alpha value of .79 for the social 
norm scale. 
 
4.2. EXPLORATORY ANALYSIS RESULTS 
4.2.1. PEARSON?S PRODUCT MOMENT CORRELATION COEFFICIENT 
RESULTS 
Pearson Product Moment Correlation was used to test the degree of association between the 
independent variables and the dependent variable. The correlation analysis is answering 
questions: 
 1. There is a positive relationship between attitudes and intentions to unauthorised copying 
of software. 
2. There is a positive relationship between self-efficacy and intentions to unauthorised 
copying of software. 
3. There is a positive relationship between social norms and intentions to unauthorised 
copying of software. 
 
In addition, correlations were done between all variables, including the mediating variable, to 
see if there were associations, before the structural equation model could be undertaken. 
Results of the correlation analysis are presented in Table 5. 
58 
 
 
Firstly with regard to question 1: There is a positive relationship between attitudes and 
intentions to unauthorised copying of software; there is a strong positive correlation (r=0.75, 
p ? 0.05) between these variables. Thus suggesting, that the higher an individuals? attitude 
towards the unauthorised copying of software, the higher his intention would be to copy 
software illegally. Secondly the results for question 2: There is a positive relationship 
between self-efficacy and intentions to unauthorised copying of software; was a moderate 
positive correlation (r= 0.64; p ? 0.05). This would suggest that the lower an individuals? self-
 efficacy is (i.e. they are willing to copy software illegally) the more likely their intentions 
would be to the unauthorised copying of software. With regards to the third question: There is 
a positive relationship between social norms and intentions to the unauthorised copying of 
software, had a strong positive correlation (r=0.72; p ? 0.05). This would suggest that if 
important others favoured unauthorised copying of software, an individuals? intention to copy 
software illegally would be high.  
 
With regard to the relationship between all the IVs and the DV with the mediator, it is evident 
that the mediating variable, moral disengagement has a moderate positive correlation with 
attitudes (r= 0.69; p ? 0.05), with social norms (r=0.58; p ? 0.05), with intentions (r=0.62; p ? 
0.05), and lastly self-efficacy (r= 0.58; p ? 0.05). This would suggest that if an individual has 
disengaged their behaviour, their attitude and intention towards the unauthorised copying of 
software would be high. If an individual has disengaged their behaviour they are more likely 
to follow social norms. In addition to this, if a person has low self-efficacy towards 
unauthorised copying of software (i.e. they are more likely to copy software illegally), they 
are more willing to use these disengagement mechanisms.  
 
59 
 
 
 
 
TABLE 5: Pearson?s Correlations for Independent, Dependent and Mediating Variables. 
Scale SELF-
 EFFICACY
 2 3 4 5 
2. ATTITUDES 0.65*     
3. SOCIAL NORMS 0.57* 0.71*    
4. INTENTIONS 0.64* 0.75* 0.72*   
5. MORAL 
DISENGAGEMENT
 0.58* 0.69* 0.58* 0.62*  
* Correlation is significant at ? 0.05 level. 
 
With regard to the IVs, self-efficacy and its relationship between attitudes and social norms, 
it is clear from the above table, that there is a positive moderate relationship (r= 0.65; p ? 
0.05) with attitudes and a positive moderate relationship (r= 0.57; p ? 0.05) with social norms 
respectively. This would suggest that an individual with low self-efficacy is more likely to 
have a positive attitude towards unauthorised copying of software, as well as being more 
likely to follow social norms if they favour the unauthorised copying of software. This would 
suggest that there is some degree of mediation, as there is an association between predictors 
(IVs) and the mediator, and between the mediator and the outcome variable (DV). Therefore 
the researcher could continue with structural equation modelling (SEM). 
 
4.2.2. STRUCTURAL EQUATION MODELLING (SEM) RESULTS 
60 
 
The structural equation model results are presented in two steps: first, validating the 
measurement model and then fitting the structural model. The former is accomplished 
through factor analysis, and latter, primarily through path analysis with latent variables.  
 
 
Exploratory Factor Analysis 
Each variable in the model is conceptualised as a latent one, measured by multiple manifest 
(or observed, measured and indicator) variables, as such manifests (indicators) are developed 
for each model, with at least three per latent variable. Factor analysis is thus utilised in the 
study to establish if the manifest variables seem to measure the corresponding latent 
variables, represented by the factors, as stated by the theory. 
 
With regard to the attitudes of unauthorised software copying (See Table 9), two measures 
suggesting that ?not feeling guilty? about unauthorised copying of software had high loadings 
of .88 and .82 on factor 1 respectively. These two items were placed together as a ?guilty 
attitude? manifest variable. In addition,  two measures suggesting that unauthorised software 
copying is fine, and the individual would not feel badly for taking part in such behaviour, had 
a high loading of .94 and a low loading of .55 on factor 2 respectively. These two items were 
placed as ?feeling towards unauthorised copying of software? manifest variable. Finally, one 
measure suggesting the benefits of unauthorised software copying, had a high loading of .94 
on factor 3. This item was placed as the ?benefit? manifest variable for attitudes. Convergent 
validity refers to the extent to which multiple measures of the construct agree with one 
another, strong evidence is achieved when the factor loading is greater than .50. As shown in 
Table 9, factor loadings for all items were greater than .55. The manifest variables for the 
latent attitude variable were presented as follows in the path analysis: guilty attitude (GT); 
61 
 
Feelings towards unauthorised software copying (FT), and finally benefit to unauthorised 
software copying (BT). 
 
 
TABLE 6: Exploratory Factor Analysis with Varimax Rotation Method of Attitude 
Measures. 
Attitude    
 Factor 1 Factor 2 Factor 3 
1. I would not feel guilty about being in 
possession of unauthorised copies of software. 
 
0.88   
2. I would not feel badly about making 
unauthorised copies of software. 
 
 0.94  
3. I would not feel guilty about giving my close 
friends unauthorised copies of copyrighted 
software. 
 
0.82   
4. I feel that making unauthorised copies of 
software is fine. 
 
 0.55  
5. The benefits of unauthorised software 
copying outweigh the possible consequences. 
 
  0.94 
 
 
With regard to self-efficacy, the theory suggested that there are three dimensions to the 
construct, use and keep, distribution and persuasion to the unauthorised copying of software. 
From Table 7, the expected outcomes were categorised as, use and keep, distribution and 
persuasion, which is consistent with the theory. Distribution self-efficacy presented high 
loadings of .80, .75 and .74 on factor 1; in addition persuasion self-efficacy also presented 
high loadings of .70, .82 and .80 respectively on factor 3. However, three items within use 
and keep self-efficacy had loadings on factor 1 and factor 2. Strong evidence of convergent 
62 
 
validity is achieved as all factor loadings are greater than .51. The manifest variables for the 
latent self-efficacy variable were presented as follows in the path analysis: use and keep self-
 efficacy (UT); distribution self-efficacy (DT), and finally persuasion self-efficacy (PT). 
 
TABLE 7: Exploratory Factor Analysis with Varimax Rotation Method of Self-efficacy 
Measure.  
Self-Efficacy    
 Factor 1 Factor 2 Factor 3 
Use and Keep Self-Efficacy.    
1. When you badly need a software program 
but you feel it is too expensive, how confident 
are you to use an illegal copy of that software. 
 
 0.76  
2. When you badly need a software program 
but do not have the time to purchase a copy, 
how confident are you to use an illegal copy of 
that software. 
 
 0.81  
3. When you badly need a software program 
and have the opportunity to obtain an illegal 
copy without anybody else?s knowing, how 
confident are you to take advantage of it. 
 
 0.64  
4. When you badly need a software program 
and have seen other colleagues use an illegal 
copy, how confident are you to take advantage 
of it.  
 
0.67 0.60  
5. When you badly need an illegal copy of a 
software program to benefit your work, how 
confident are you to take advantage of it. 
 
0.60 0.55  
6. If a colleague has a software program that 
you like very much, how confident are you to 
ask for an illegal copy of it. 
 
0.67 0.51  
Distribution Self-Efficacy.    
7.  If a good friend badly needs a software 
program, how confident are you to make an 
illegal copy for him or her. 
 
0.80   
63 
 
8. If a good friend badly needs a software 
program and is asking for your help to obtain 
an illegal copy, how confident are you to accept 
that request. 
 
0.75   
9. If a good friend badly needs a software 
program that you own and is asking you for a 
copy, how confident are you to grant the 
request. 
 
0.74   
Persuasion Self-Efficacy.    
10. If you see colleagues using an illegal copy of 
a software program, how confident are you to 
try and persuade them to using it. 
 
  0.70 
11. If you see colleagues selling an illegal copy 
of a software program for profit, how 
confident are you to try and talk him or her 
not to give it up. 
  0.82 
12. If you see colleagues attempting to make an 
illegal copy of a software program, how 
confident are you to not try to talk him or her 
out of it. 
 
  0.80 
 
With regard to moral disengagement, the theory would suggest that there are four major 
points in the self-regulatory process, representing each of the mechanisms of moral 
disengagement i.e. The disengagement may centre on the reprehensible conduct itself; the 
operation of the agency of action; in the consequences (effects) that flow from actions; or on 
how the victims of maltreatment are regarded. From the factor analysis (See Table 8) it is 
evident that reprehensible conduct (i.e. moral justification and advantageous comparison) and 
the agency of action (displacement of responsibility and diffusion of responsibility) have 
loadings on factor 1, excluding euphemistic labelling, which loaded on factor 3. In addition, 
the consequences or effects of the actions (i.e. distortion of consequences) and the victim 
(attribution of blame and dehumanisation) have loadings on factor 2. There is evidence of 
convergent validity as all factor loadings are greater than .53. The manifest variables for the 
latent moral disengagement variable were presented as follows in the path analysis: 
64 
 
reprehensible conduct and agency of action (CA); consequences or effects and victim (VT), 
and finally euphemistic labelling (EL). 
 
TABLE 8: Exploratory Factor Analysis with Varimax Rotation Method of Moral 
Disengagement Measures  
Moral Disengagement    
 Factor 1 Factor 2 Factor 3 
Reprehensible Conduct:    
1. There is nothing wrong in using 
unauthorised copied software if it is needed for 
the success of a social responsibility project 
(MJ). 
 
0.57   
2. It is ok to use unauthorised copied software 
if it will improve an individual?s computer 
literacy (MJ). 
 
0.68   
3. The unauthorised copying of software is like 
playing a trick on the software company (EL). 
 
  0.81 
4. Copying someone else?s software is just a 
cheaper way of getting the product (EL). 
 
  0.57 
5. The unauthorised copying of software is 
inventive (EL). 
 
0.69   
6. The unauthorised copying of software is not 
too serious compared to those people who use 
spyware to steal money from people?s bank 
accounts (AC). 
 
0.53   
7. Individuals who copy software illegally 
should not be prosecuted because they are 
actually saving software companies on 
distribution costs (AC). 
 
0.64   
Agentic Role:    
8.  Individuals who cannot afford software 
products cannot be held responsible for the 
unauthorised copying of it (DS). 
 
0.76   
9. A manager is not culpable for the 
unauthorised copying of software as a request 
from his boss to save the company some money 
(DS). 
0.68   
65 
 
 
10. There is no sense in worrying about those 
few individuals who copy software illegally 
since there is a big community of people 
copying software (DF). 
0.79   
11. Individuals should not feel guilty for the 
unauthorised copying of software if they only 
contributed towards it in a very small way 
(DF). 
 
0.78   
12. There is no sense in blaming a few 
individuals for the unauthorised copying of 
software when everybody else does the same 
thing (DF). 
 
0.74   
Effect of Conduct:    
13. The unauthorised copying of software does 
not really have a significant adverse effect on 
the software industry as they make lots of 
money anyway (DC). 
 
0.61   
14. The unauthorised copying of software is 
okay as software companies can afford these 
losses (DC). 
 
 0.57  
15. The unauthorised copying of software is a 
way of convincing the software companies to 
drop their prices (DC). 
 
 0.63  
Victim:    
16. Software companies are to blame for the 
unauthorised copying of software as they make 
it too easy for individuals to copy software 
(AB). 
 
 0.79  
17. The unauthorised copying of software 
happens when people are given no other means 
to get access to the software (AB). 
 
 0.63  
18. The unauthorised copying of software is not 
the individuals fault as software companies do 
not adequately protect their software (AB). 
 
 0.79  
19. The software companies are corporate 
bloodsuckers who drain companies? finances 
(DH). 
 
 0.57  
20. The software companies are a bunch of 
frauds who deserve to have their products 
copied illegally (DH). 
0.55   
66 
 
Key: 
MJ: Moral Justification, EL: Euphemistic Labelling, AC: Advantageous Comparisons, DS: Displacement of 
Responsibility, DF: Diffusion of Responsibility, DC: Distortion of Consequences, AB: Attribution of Blame, 
DH: Dehumanisation. 
With regard to social norms and intentions, the adapted scales had no underlying attributes. In 
addition, a factor analysis conducted on social norms only presented two factors for 
extraction. This however, is problematic for structural equation modelling, as it is suggested 
that a minimum of three manifest variables are needed for each latent variable (Hardy & 
Bryman, 2004). For this reason, items were randomly assigned to manifest variables. The 
first manifest variable consisted of items three and five of the social norms scale. The second 
manifest variable consisted of items 1, 4 and 8 of the social norms scale. The final manifest 
variable consisted of items 2, 7 and 9 of the social norms scale. Intentions however were only 
measured with three statements. Therefore each intention statement presented a manifest 
variable. 
 
Path Analysis 
Path analysis is the next step in SEM, as this step allows the researcher to diagram the 
hypothesized set of relationships (i.e. the model), including the estimation of the parameters 
of the model, as well as model fit. In doing so, the researcher is attempting to answer research 
question four: Moral disengagement mediates the relationship between self-efficacy, attitudes 
and social norms; and intention to unauthorised copying of software. Four different models 
are presented by the researcher, as a means of presenting possible model opportunities that 
the researcher encountered, in addition to providing the best model to predict and explain 
unauthorised software coping within the social cognitive framework. The models, with 
results will be discussed separately, as well as the researcher rationale for the inclusion of 
each model. 
 
67 
 
Model fit will be discussed as a means to determine if the model being tested should be 
accepted or rejected, this is accomplished through fit tests. Standards for adequate fit in SEM 
require that certain indices to fit certain criteria, these are presented in Table 9. Goodness of 
Fit Index (GFI), Adjusted GFI (AGFI), Bentler and Bonett?s (1980) Non-Normed Fit Index 
(NNFI) and Bentler?s Comparative Fit Index CFI), scores above 0.90 provide reliable 
evidence of acceptable fit. While a value below 0.06 means a good fit of the model in case of 
the Root Mean Square Error of Approximation (RMSEA) and the Root Mean Square (RMR), 
and an average fit with values between 0.08 and 0.10, a value above 0.1 is a poor fit 
(MacCallum, Brown & Sugawara, 1996). Probability of Close Fit, must be non-significant at 
?  0.05, in addition Hoelter?s (1983) Critical N should have a value of less than 75 for the 
model to be adequate. 
 
TABLE 9: Indicators for Goodness of Fit, and the Goodness of Fit Indicators for the all 
Four Unauthorised Copying of Software Models. 
Index Value Model 1 Model 2 Model 3 Model 4 
1. Goodness of Fit Index (GFI) ? 0.9 0.91* 0.93* 0.88 0.82 
2. Adjusted GFI (AGFI) ? 0.9 0.87 0.90* 0.83 0.72 
3. Bentler and Bonett?s (1980) Non-
 Normed Fit Index (NNFI) 
? 0.9 0.95* 0.97* 0.92* 0.73 
4. Bentler Comparative Fit Index (CFI) ? 0.9 0.96* 0.97* 0.94* 0.80 
5. Root Mean Square Error of 
Approximation (RMSEA) 
? 0.06  0.07 0.06* 0.09 0.18 
6. Root Mean Square (RMR) ? 0.06 0.44 0.53 0.47 7.52 
7. Hoelter?s (1983) Critical N ? 75 134 149 98 36* 
8. Probability of Close Fit Must be 
non-
 significant 
0.01 0.07* 0.00 0.00 
68 
 
* Indices presenting good fit within each model. 
 
In terms of Figure 5, the model presented is testing moral disengagement as a mediator in the 
relationship between attitudes, social norms and self-efficacy; with the intention to the 
unauthorised copying of software. Accordingly, Model 1, showed an acceptable fit to the 
model (See Table 9), with GFI= .91, CFI= .96, NNFI= .95, and a moderate RMSEA of 0.07, 
however, AGFI= 0.87, which is somewhat low but marginally acceptable. Further, the model 
did not fit according to the following indicators, Hoelter?s Critical N= 134 and the probability 
of close fit was significant at 0.01. In sum, the fit statistics presented an acceptable model.  
 
The structural equation describes the relationships and paths among the factors being 
examined. In Model 1 (See Figure 5), all the hypothesized paths in the model did not present 
the expected signs, and some the paths were not significant with low t-values. For one, social 
norms and self-efficacy had a negative relationship with moral disengagement (?= -0.32, t= -
 1.85, p  0.05) and (?= -0.001, t= -0.009 p  0.05), respectively, in addition, these paths 
were not significant. Moral disengagement also had a negative relationship with intentions 
(?= -0.25, t= -2.18, p  0.05), however this path was significant. The path between attitudes 
and moral disengagement was positive and significant with a high t-value (?= 1.09, t= 4.89, p 
 0.05), in addition, attitudes had a direct positive and significant path towards intentions (?= 
1. 09, t= 7.89, p  0.05).  
 
The Lagrange Multiplier, however did not present any sensible paths to improve the model. 
However, attitudes were seen as being the greatest predictor of intention, due to the direct 
path towards intentions and as such were removed from the model to test Model 2.   
 
69 
 
 
 
Figure 5: Maximum Likelihood Estimates and Standardized Estimates for Moral 
Disengagement as a Mediator in the Relationship between, social norms, attitudes, self-
 efficacy, with the intention to unauthorised copying of software. 
 
 
 
 
 
 
 A 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
Model 1:  
*Significant paths in the model. 
 
(t= -0.009) 0.80
 0.94
 0.93
 0.73 
0.87 
0.72 
0.760.800.98
 0.74 
0.83 
0.67 
0.78 
0.71 
0.91 
-0.32
 1.09
 Attitude 
Social 
Norms 
Self-
 Efficacy 
Moral 
Disengag
 ement 
3 
2 
1
 ELVECA
 3 
2
 1
 FT 
BT 
GT 
PT 
DT 
UT 
-0.001 -0.25
 1.094 (t= 7.89) *
 (t= -2.18) *
 (t= 4.89) *
 (t= - 1.85)
 Intentions 
70 
 
The summary results of path Model 1 as indicated by LISREL: GFI= 0.91, AGFI= 0.87, RMSEA= 0.07, CFI= 
0.96, NFI= 0.93. All the paths in the model are statistically significant at t  2, except two paths from self-
 efficacy to moral disengagement, and from social norms to moral disengagement. 
In terms of Figure 6, the model presented is testing moral disengagement as a mediator in the 
relationship between, social norms and self-efficacy; with the intention to the unauthorised 
copying of software. Accordingly, Model 2, showed an acceptable fit to the model (See Table 
9), with GFI= .93, AGFI= 0.90, CFI= .97, NNFI= .97, and a good RMSEA of 0.06, and the 
probability of close fit was nonsignificant at 0.07. The model however, did not fit according 
to the Hoelter?s Critical N= 149. In sum, the fit statistics presented an acceptable and good 
model, compared to Model 1.  
 
The structural equation describes the relationships and paths among the factors being 
examined. In Model 2 (See Figure 6), all the hypothesized paths in the model present the 
expected signs, and all the paths were significant with high t-values. There was a significant 
positive relationship between the self-efficacy and moral disengagement path (?= 0.35, t= 
3.57, p  0.05), and a significant positive relationship between social norms and moral 
disengagement (?= 0.4, t= 4.05, p  0.05). The path between moral disengagement and 
intentions to the unauthorised copying of software was positive and significant (?= 0.21, t= 
2.98, p  0.05). In addition, there is a direct positive significant path between social norms 
and the intentions to the unauthorised copying of software (?= 0.67, t= 7.75, p  0.05).   
 
The Lagrange Multiplier, however did not present any sensible paths to improve the model. 
However, according to theory presented earlier within the study, it was suggested by Bandura 
(1986) that self-efficacy is a strong mediator in predicting behaviour. As such Model 3 is 
presented.   
 
71 
 
 
 
 
Figure 6: Maximum Likelihood Estimates and Standardized Estimates for Moral 
Disengagement as a Mediator in the Relationship between, social norms and self-efficacy, 
with the intention to the unauthorised copying of software. 
 
 
 
 
 
 
 
  
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
Model 2:  
*Significant paths in the model. 
 
The summary results of path Model 2 (without attitude variable) as indicated by LISREL: GFI= 0.93, AGFI= 
0.91, RMSEA= 0.07, CFI= 0.96, NFI= 0.93. All the paths in the model are statistically significant at t  2. 
0.67
 0.35
 0.81
 0.94
 0.93
 0.73 
0.87 
0.72 
0.760.800.98
 0.73 
0.84 
0.91 
0.40
 Social 
Norms 
Self-
 Efficacy
 Intentions Moral 
Disengag
 ement 
3
 2 
1
 ELVECA
 3 
2
 1
 PT 
DT 
UT 
0.21
 (t= 3.75) *
 (t= 4.05) *
 (t= 2.98)*
 (t= 7.75) *
72 
 
 
 
In terms of Figure 7, the model presented is testing moral disengagement and self-efficacy as 
a mediator in the relationship between, social norms and attitudes; with the intention to the 
unauthorised copying of software. Accordingly, Model 3, presented a poor fit to the model 
(See Table 9 pg. 67), with GFI= .88, AGFI= 0.83, Hoelter?s Critical N= 98, and an average 
RMSEA 0f 0.09, and the probability of close fit was significant at 0.00. The model did fit 
according to the following indicators, CFI= .94 and NNFI= .92. In sum, the fit statistics 
presented a poor model, compared to Model 1 and Model 2.  
 
The structural equation describes the relationships and paths among the factors being 
examined. In Model 3 (See Figure 7), all the hypothesized paths in the model present the 
expected signs, and all the paths were significant with high t-values, except for social norms. 
There was a significant positive path between attitudes and moral disengagement (?= 1.107, 
t= 4.60, p  0.05), and a significant positive path between attitudes and self-efficacy (?= 
0.74, t= 4.15, p  0.05). In addition there is a positive significant path between moral 
disengagement and intentions (?= 0.32, t= 4.32, p  0.05), and self- efficacy and intentions to 
the unauthorised copying of software (?= 0.53, t= 6.65, p  0.05). However, there is a 
negative and non significant path between social norms and moral disengagement (?= -0.31, 
t= -1.37, p  0.05), and a positive non significant path between social norms and self-
 efficacy (?= 0.08, t= 0.47, p  0.05), respectively.  
 
The Lagrange Multiplier, however suggested alternative paths to improve the model. Firstly a 
path between intentions and attitudes (??= 57.71), and secondly a path between intentions and 
73 
 
social norms (??= 44.72). However, this model did not make sense theoretically, in addition 
presented a bad fit, and consequently was not presented in the study.   
 
Figure 7: Maximum Likelihood Estimates and Standardized Estimates for Moral 
Disengagement and Self-Efficacy as Mediators in the Relationship between attitudes and 
the intention to the unauthorised copying of software. 
 
 
 
 
 
 
 
 
 
 A 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
Model 3: 
*Significant paths in the model. 
(t= 4.15)*
 (t= -1.37)
 0.74
 0.08
 0.32
 0.80
 0.94
 0.93
 0.730.910.84
 0.76
 0.800.98
 0.72 
0.73 
0.67 
0.78 
0.71 
0.87 -1.37
 1.10
 Attitude 
Self- 
Efficacy
 Social 
Norms 
Intentions 
Moral 
Disengag
 ement 
PTDTUT
 ELVECA
 3 
2
 1
 FT 
BT 
GT 
3 
2 
1 
0.52
 (t= 4.32) *
 (t= 0.47)
 (t= 6.65) *
 (t= 4.60) *
74 
 
The summary results of path Model 3 (moral disengagement and self-efficacy as mediators) as indicated by 
LISREL: GFI= 0.88, AGFI= 0.83, RMSEA= 0.09, CFI= 0.94, NNFI= 0.92. All the paths in the model are 
statistically significant at t  2, except two paths from social norms to self-efficacy, and social norms to moral 
disengagement. 
In terms of Figure 8, the model presented is testing moral disengagement and self-efficacy as 
a mediator in the relationship between, attitudes; with the intention to the unauthorised 
copying of software. This Model is presented to permit a model test, by removing the non 
significant paths of social norms. Accordingly, Model 4, presented a poor fit to the model 
(See Table 9), with GFI= .82, AGFI= 0.72, CFI= .80, NNFI= .73 and a poor RMSEA 0f 0.18. 
The model did fit according to the following indicators, Hoelter?s Critical N= 36, and the 
probability of close fit was not significant. In sum, the fit statistics presented a poor model, 
compared to Model 2.  
 
In Model 4 (See Figure 8), all the hypothesized paths in the model did not present the 
expected signs, and all the paths were not significant with high t-values. There was a 
significant negative path between attitudes and moral disengagement (?= -1.01, t= -16.1, p  
0.05), and a significant positive path between attitudes and self-efficacy (?= 0.76, t= 1092.9, 
p  0.05). In addition, there is a negative non significant path between moral disengagement 
and intentions (?= -0.81, t= -0.82, p  0.05), and a positive non significant path between self- 
efficacy and intentions to the unauthorised copying of software (?= 0.065, t= 1.13, p  0.05). 
This model also presented the manifest variables CA and VT of the latent moral 
disengagement to be negative and non significant. The Lagrange Multiplier, however did not 
present any sensible paths to improve the model. 
 
 
 
75 
 
 
 
 
Figure 8: Maximum Likelihood Estimates and Standardized Estimates for Moral 
Disengagement and Self-Efficacy as Mediators in the Relationship between social norms 
and the intention to the unauthorised copying of software. 
 
 
 
 
 
 
 
 
 
 
 
  
 
 
 
 
 
 
 
 
 
 
 
 
 
Model 4:  
*Significant paths in the model. 
 
(t=1092.9 ) *
 (t= -16.1)*
 0.76
 -1.01 
-0.81
 0.80 
0.94
 0.93
 0.730.91
 0.84
    -0.67 -0.65 0.98
 0.67 
0.78 
0.71 
Attitude
 Self- 
Efficacy
 Intentions 
Moral 
Disengag
 ement 
PTDTUT
 ELVECA
 3
 2
 1
 FT 
BT 
GT 
0.065
 (t= - 1.8 )
 (t= 1.13)
76 
 
The summary results of path Model 4 (without social norms variable) as indicated by LISREL: GFI= 0.82, 
AGFI= 0.72, RMSEA= 0.18, CFI= 0.80, NFI= 0.78. All the paths in the model are statistically significant at t  
2, except two paths from self-efficacy to intention, and from moral disengagement to intention of unauthorised 
copying of software. 
No further significant improvement could be achieved by freeing substantive parameters of 
Model 2. Therefore Model 2 was deemed to be the most adequate model for the unauthorised 
software copying. This conclusion was substantiated by the incremental fit index shown in 
Table 9. 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
77 
 
 
 
 
CHAPTER 5 
5.1. DISCUSSION 
This chapter will discuss the findings of the current research as presented in Chapter 4, and 
explain and relate these findings to the literature. These results were obtained from the 
research questions and the scales that were administered to measure the variables. In addition, 
this section will be followed by a discussion of the limitations of this study and proposed 
directions for future research.  
 
The primary focus of the section is to provide possible explanations for the results obtained, 
and link this study to past literature. However, it should be noted that although studies have 
been done on this topic before, there is no other study that has specifically focused on moral 
disengagement towards unauthorised copying of software, (i.e. in terms of moral 
disengagement as a mediator between attitudes, social norms and self-efficacy, with the 
intention to the unauthorised copying of software). This combination of variables is a 
significant tool with which to assess the unauthorised copying of software. 
 
First, the researcher will examine results within a Theory of Planned Behaviour (TPB) 
framework. As discussed in the literature review, it is important to consider the concepts such 
as attitudes, social norms and the intentions towards the unauthorised copying of software, 
although it is important to note that this current study is not taking a TPB or TRA perspective 
to answering the hypotheses. The results of the study show that there is a strong positive and 
78 
 
significant relationship (r=0.75; p  0.05) between attitudes and intentions to the 
unauthorised copying of software. This would suggest and confirm the results presented by 
Vallerand, Cuerrier, Pelletier and Mongeau, (1992), Lending and Slaughter (1999), Loch and 
Conger (1996) and, Al-Rafee and Cronan, (2006). The more an individual favours the 
unauthorised copying of software, the more likely they would intend to copy software 
illegally. In addition, there was a strong positive and significant relationship (r= 0.72; p 
0.05) between social norms and the intention to unauthorised copying of software. This 
confirms the results of Loch and Conger (1996), which suggests that if important others, such 
as family, friends or colleagues favour unauthorised copying of software, an individual?s 
intention to copy software illegally would be high. Trafimow and Finlay (1996) established 
that attitudes are the most significant predictor of the unauthorised copying of software 
compared to social norms. The results of this study were consistent with that of Trafimow 
and Finlay (1996), as social norms did account for a part of the variation in intentions.  
 
With regard to self-efficacy, the results presented a moderate positive and significant 
relationship (r= 0.64; p  0.05) towards the intention to the unauthorised copying of 
software. Within TPB, self-efficacy was found to be an important determinant of a person?s 
intention to perform a behaviour. In this case, the lower an individual?s self-efficacy, the 
more likely they are to participate in illegal software copying, either by using and keeping 
unauthorised copied software, distributing it, and to persuade others to use unauthorised 
copied software. Graham and Weiner (1996), established that self-efficacy is the most 
consistent predictor of behaviour than any other motivational construct. However, from this 
study, it is evident that attitudes have the strongest relationship with regards to intention to 
the unauthorised copying of software. 
 
79 
 
With regard to moral disengagement, there is a moderate positive and significant correlation 
with attitudes (r= 0.69; p ? 0.05), with social norms (r= 0.58; p ? 0.05), with intentions 
(r=0.62; p ? 0.05), and lastly self-efficacy (r= 0.58; p ? 0.05). This would suggest that if an 
individual has disengaged their behaviour, their attitude and intention towards the 
unauthorised copying of software would be high. If an individual has disengaged their 
behaviour they are more likely to follow social norms. In addition to this, if a person has low 
self-efficacy towards the unauthorised copying of software, they are more likely to use, keep, 
distribute or persuade others to participate in the unauthorised copying of software, they are 
more willing to use these disengagement mechanisms. 
 
As moral disengagement increases, so an individual?s attitudes towards the negative conduct 
increases. This is better explained by examining the theory of moral disengagement. In the 
self-regulating process, individuals have the choice to disengage from negative behaviour, 
such as the unauthorised copying of software. As we have noted, when individuals disengage 
their behaviour, they try to justify this negative behaviour by applying any one of the eight 
moral disengagement mechanisms, and as such try and make it legitimate. Disengagement 
practises will not instantly transform law-abiding citizens into mass unauthorised copiers of 
software; rather, this change is achieved by progressive disengagement of self-censure 
(Bandura, 2002). Initially individuals perform these acts to a small extent, which they can 
tolerate with some discomfort. However, through repeated enactments, the level of the 
negative conduct increases, until eventually acts originally regarded as undesirable can be 
performed with little distress or self-censure. As such this behaviour becomes routinised 
(Bandura, 2002). Thus by using moral justification on a continuous basis as a means to justify 
negative conduct, the less guilty an individual will feel about that behaviour, and the more 
likely they are to participate in this conduct. 
80 
 
  
With regard to the IVs, self-efficacy and its relationship between attitudes and social norms, 
there is a positive moderate and significant relationship (r= 0.65; p ? 0.05) with attitudes and 
a positive moderate and significant relationship (r= 0.57; p ? 0.05) with social norms 
respectively. This would suggest that an individual with low self-efficacy is more likely to 
have a positive attitude towards unauthorised copying of software, as well as being more 
likely to follow social norms if they favour the unauthorised copying of software. This would 
suggest that there is some degree of mediation, as there is an association between predictors 
(IV?s) and the mediator, and between the mediator and the outcome variable (DV).  
  
In relation to the moderate correlations with attitudes, it could be suggested that the 
environment or setting the participants work in, plays a great role in their behaviour. A part of 
the sample is from a banking sector. Individuals that do work in these sectors might be 
selected by their organisation on fitting a particular ethical and moral profile, and should not 
favour the unauthorised copying of software. However, from the above discussion, two points 
should be noted regarding the construct validity of TRA. Firstly, that attitudes and social 
norms are direct determinants of intention, and secondly, attitudes proved to be a more 
important predictor of behaviour than social norms. This could be due to the fact that an 
attitude focuses directly on the consequences of action, whereas social norms deal with the 
perceptions of what others think a person should do (Vallerand, Cuerrier, Pelletier & 
Mongeau, 1992). 
 
Bandura?s (1986) theoretical and dynamic interplay of personal, behavioural and 
environmental influences, of which individuals interpret the results their own behaviour, 
informs and alters their environment and the personal factors they posses, which in turn, 
81 
 
informs and alters subsequent behaviour. As such, SCT explicitly acknowledges the existence 
of a continuous reciprocal interaction. Of more immediate and pragmatic concern for this 
study is the fact that the reciprocal nature of the relationships between the concepts (self-
 efficacy, moral disengagement, social norms and intentions) makes drawing conclusions 
more difficult. In any research, without longitudinal separation of hypothesized causes from 
effects, it is difficult to draw conclusions about the causal implications of the relationships 
observed (Rosnow & Rothenthal, 1991). Given the reciprocal relationships posed by Social 
Cognitive Theory, this problem is magnified.  
 
On this note, the present study also explored moral disengagement as a mediator of the 
relationship between attitudes, social norms and self-efficacy with the intention to the 
unauthorised copying of software. A structural equation modelling was performed to predict 
whether this was indeed the case. The researcher presented four possible models. These will 
be discussed separately. 
 
The structural equation describes the relationships and paths among the factors being 
examined. In Model 1 (See Figure 5), all the hypothesized paths in the model did not present 
the expected theoretical predictions, and some the paths were not significant with low t-
 values. For one, social norms and self-efficacy had a negative relationship with moral 
disengagement and these paths were found to be non significant. As such it could be said that 
moral disengagement does not mediate the relationship between these two concepts and the 
intention to the unauthorised copying of software. Attitudes on the other hand, had a direct 
positive relationship with the intention to the unauthorised copying of software. In addition, 
attitudes preceded moral disengagement as a predictor of intentions to unauthorised copying 
82 
 
of software. The direct path between attitudes and intentions was significantly greater than 
using moral disengagement as a mediator within this relationship. The path between moral 
disengagement and the intention to the unauthorised copying of software is negative (inverse 
relationship) and significant, this is however not what the theoretical model predicted. This 
would suggest that an individual used moral disengagement mechanisms would not intend to 
copy software illegally. Therefore, attitudes and intentions are related, but attitudes also 
predispose individuals to activate moral disengagement mechanisms to ?justify? their actions, 
which in turn precipitates the intention not to copy software illegally. However, it is also 
important to note that if moral disengagement mechanisms are activated, it would be 
expected that those individuals will copy software illegally, irrespective of their feelings. 
 
This model however, was problematic, as some of the outcomes presented were not sensible, 
such as the negative relationship between moral disengagement and intention to unauthorised 
copying of software. In addition, attitudes were seen as being the greatest predictor of 
intention, due to the direct path towards intentions, and the fact that it is the dominant 
predictor, causing other variables not to surface, and as such was removed from the model to 
test Model 2 as a possible improvement to the above model.   
 
In terms of Figure 6, the model presented is testing moral disengagement as a mediator in the 
relationship between, social norms and self-efficacy; with the intention to the unauthorised 
copying of software. Accordingly, Model 2, showed an acceptable fit, compared to Model 1. 
All the hypothesized paths in the model presented the expected theoretical predictions, and all 
the paths were significant with high t-values. There was a significant positive relationship 
between self-efficacy and moral disengagement path (?= 0.35, t= 3.57, p  0.05), and a 
significant positive relationship between social norms and moral disengagement (?= 0.4, t= 
83 
 
4.05, p  0.05). The path between moral disengagement and intentions to the unauthorised 
copying of software was positive and significant (?= 0.21, t= 2.98, p  0.05). In addition, 
there is a direct positive significant path between social norms and the intentions to the 
unauthorised copying of software (?= 0.67, t= 7.75, p  0.05).  
 
This is however, what the theoretical model predicted. With regard to Model 2, it is suggested 
that, self-efficacy and social norms predispose individuals to activate moral disengagement 
mechanisms to ?justify? their illegal actions, which in turn precipitates the intention to copy 
software illegally. This model presents moral disengagement as a mediator in this 
relationship. The direct relationship presented between social norms and intention could be 
explained by the fact that with the elimination of attitudes this has created a direct path to 
intention, as it is suggested by theorists and discussed earlier within this section, that social 
norms are the second best predictor of intentions. 
 
However, according to theory presented earlier within the study, it was suggested by Bandura 
(1986) that self-efficacy is a strong mediator in predicting behaviour. As such Model 3 is 
presented. In terms of Figure 7, the model presented is testing moral disengagement and self-
 efficacy as a mediator in the relationship between, social norms and attitudes; with the 
intention to the unauthorised copying of software. Model 3, presented a poor fit to the model, 
compared to Model 1 and Model 2, with regard to model fit indices which were borderline 
(See Table 9). In Model 3 all the hypothesized paths in the model present the expected signs, 
and all the paths were significant with high t-values, except for social norms. There was a 
significant positive path between attitudes and moral disengagement (?= 1.107, t= 4.60, p  
0.05), and a significant positive path between attitudes and self-efficacy (?= 0.74, t= 4.15, p 
 0.05).In addition there was a positive significant path between moral disengagement and 
84 
 
intentions (?= 0.32, t= 4.32, p  0.05), and self- efficacy and intentions to the unauthorised 
copying of software (?= 0.53, t= 6.65, p  0.05). 
 
With regard to the above results, attitudes predispose individuals to activate moral 
disengagement mechanisms to ?justify? their illegal actions which in turn precipitate the 
intention to copy software illegally. This model presents moral disengagement as a mediator 
in this relationship. In addition, attitudes predispose individuals to violate their standards, as 
they have low self-efficacy, and as such use, keep or distributing illegal software copies, 
which in turn precipitate the intention to the unauthorised copying of software, and per se, 
presenting self-efficacy as a mediator in the relationship. However, the path between attitudes 
and moral disengagement explains more of the variation compared to the path between 
attitudes and self-efficacy. In addition, the path between self-efficacy and intention explains 
more of the variation compared to the path between moral disengagement and intention to the 
unauthorised copying of software.  
 
Social norms however, were found to have no effect in the model. In terms of Figure 8, the 
model presented is testing moral disengagement and self-efficacy as a mediator in the 
relationship between, attitudes; with the intention to the unauthorised copying of software. 
This Model is presented to permit a model test, by removing the non significant paths of 
social norms. Accordingly, Model 4 presented a poor fit. The hypothesized paths in the 
model did not present the expected theoretical predictions; in addition, most of the paths were 
nonsignificant with low t-values. For one, there was a significant negative path between 
attitudes and moral disengagement (?= -1.01, t= -16.1, p  0.05), and a significant positive 
path between attitudes and self-efficacy (?= 0.76, t= 1092.9, p  0.05). In addition, there is a 
negative non significant path between moral disengagement and intentions, and a positive 
85 
 
non significant path between self- efficacy and intentions to the unauthorised copying of 
software. Within this model there is no path towards intentions, and the results are not 
predictive of intentions. This can also be seen in the negative (inverse relationship) path 
presented between attitudes and moral disengagement, which would suggest, if an individual 
has a positive attitude towards the unauthorised copying of software, they would not morally 
disengage from this negative conduct.  
 
From the above discussion, it is clear that Model 2 is the best fitting model, and as such will 
be discussed further, in conjunction with the theory. Moral disengagement from transgressive 
behaviour is seen to mediate the relationship between self-efficacy and social norms with the 
intention to the unauthorised copying of software. Social norms act through the judgemental 
process component of the self-regulatory mechanism, whereby individuals are constantly 
observing their behaviour and judging its appropriateness compared to what is morally right. 
Thus if an individual views important others as participating in the unauthorised copying of 
software, and they have low self-efficacy, they are likely to perform the act of illegal 
software copying. However, this act is strengthened as the individual will morally disengage 
themselves from this transgressive conduct, so they would not feel guilty or self-censure. It is 
also important to note that according to TPB, social norms are believed to act directly on 
intentions, which is presented with the direct path between the two variables (this path 
explained more variation, than the path between social norms and moral disengagement). 
With regard to high self-efficacy, the more confident a person is in their beliefs that 
unauthorised copying is in violation of their standards, the more likely an individual will 
persist in not doing it.  
 
86 
 
Attitudes, although not a predictor in the best fitting model (Model 2), still plays an important 
role within the unauthorised copying of software. Attitudes, however does have an indirect 
effect on intentions through moral disengagement, but this effect is not as strong as the direct 
effect on the intention to unauthorised software copying. Therefore the findings of Al-Rafee 
and Cronan (2006), have been supported, attitude is seen to be the best predictor of intention. 
Consequently, these findings have provided a more in-depth exploratory analysis of the 
relationship between attitudes, self-efficacy, social norms and the intention to unauthorised 
copying of software, as well as providing a framework in Social Cognitive Theory on which 
to build on the unauthorised copying of software. It is however important to note that the 
current study is exploratory in nature and as such is attempting to establish this area of 
research as worthy for future attention. 
 
5.2. LIMITATIONS 
Particular attention has been paid to the content, method and statistical analysis of the study. 
However, a number of limitations can be identified. Firstly, some of the major 
methodological issues will be discussed, in terms of the research design, sample, procedures, 
measuring instruments, and the data analysis. 
 
The study makes use of a non-experimental, correlational and cross-sectional design. 
Although it is easy to implement, time and cost efficient, it has many limitations. This design 
has no control group (can only associate between variables), no manipulation of IV (no 
directionality can be established), no random assignment (non-spuriousness cannot be 
demonstrated and many threats to internal validity), and it also does not allow for causal 
inferences (Terre Blanche & Durrheim, 1999). In addition to this, the cross-sectional design 
87 
 
only enables associations to be made and does not allow for causation to be established 
(Wadee, 2001, p. 25). Lastly, by conducting research within a quantitative paradigm, it makes 
it difficult to tap into the context of unauthorised copying of software, as individuals are 
selecting replies, which might not be an accurate reflection of their thoughts. It would be 
advised to use a multi-method approach, as this would be more beneficial to provide the 
researcher with in-depth material. 
 
The current study used a non-probability sampling method, due to its convenience and 
accessibility. This created two problems for the researcher, firstly, that there is no way to 
estimate the probability of each element being included in the sample, and secondly, no 
guarantee that each element has some chance of being included (Babbie & Mouton, 2004). 
Thus generalisability may be reduced. Purposive sampling was used to obtain the sample, as 
the organisations selected were those who have certain characteristics and could provide 
useful information for the purpose of the study, i.e. these organisations use computers and 
software programmes on a regular basis, which is an important aspect in the study. However, 
although these organisations and participants would certainly be a prime target for the study 
of unauthorised copying of software, other consumers might also engage in software piracy. 
 
Although the questionnaires were distributed throughout the organisations, and individuals 
agreed to participate, the response rate was comparatively poor. There might have been some 
reason why certain individuals agreed to participate while others did not, this could be due to 
the contentious nature of the study. However, there might be some volunteer bias present, 
which is described as ?the systematic error resulting when participants who volunteer, 
respond differently from those in the general population would have? (Rosnow & Rosenthal, 
1991, p. 632), which might have influenced the results of the study. 
88 
 
The sample was slightly biased towards men and educated individuals, as many participants 
had a diploma, degree or postgraduate degree. This however limits the extent to which the 
findings can be generalized to other computer users. A further limitation to the study is its 
sample size. Although the sample size was adequate for the statistical procedures, a larger 
sample would have been more adequate for the use of SEM, as this statistical procedure is 
very sensitive to sample size; and the power of the test, i.e. the smaller the sample the lower 
the power of the test. In addition, due to not having a large enough sample size it could have 
lead to the rejection of an apparently well-fitting model. Thus it would be beneficial for 
future studies to use a larger sample size. 
 
The questions in the questionnaire might have been seen as repetitive by many participants, 
although the questions measured different aspects. This redundancy could have caused 
individuals to answer all the questions in a similar fashion, as there was a tendency for 
participants to respond all positively or all negatively to items. A further limitation of the 
study involves the reliance on self-report data. While this is an easy and time effective 
method, there may have been biases in individual responses. Terre Blanche and Durrheim 
(1999) describe social desirability bias, which may have caused participants to try and present 
themselves in a favourable light, particularly in relation to the way they feel and perceive the 
unauthorised copying of software, as this is viewed as a criminal offence. Lastly, there could 
be good subject effect, where participants may provide answers they feel the researcher 
would want to find (Rosnow & Rosenthal, 1991).  
 
There are certain limitations related to the instruments used to measure the constructs in the 
study. Most of the questionnaires used were adapted from other studies, whereby words were 
changed to fit the current study, which could have had an impact on how the participants 
89 
 
understood the questions, therefore a pilot study could have been conducted at the onset of 
the study. In addition, the instruments that were used lacked certain psychometric 
information, such as test-retest reliability, and convergent and discriminant validity. Despite 
these limitations, the good reliabilities of the scales that were obtained, would suggest that 
there is some consistency.  
 
 The factor analysis presented that certain constructs did not load on the desired and predicted 
underlying variables as presented in the theory, such as moral disengagement and self-
 efficacy. However, these instruments are newly developed and have not been administered in 
wider contexts. These measures however need to be applied to more contexts, to mend this 
problem. 
 
When interpreting the results of the study, it is important to note that SEM provides a strong 
indication about directionality of relationships. However, the researcher applied SEM to 
cross-sectional data, and thus no definite conclusions about causality can be drawn. In 
addition, the models presented adequate fit, and as such need improvement. SCT, in contrast, 
explicitly acknowledges the existence of a continuous reciprocal interaction and causation 
between the environment in which an individual operates, his or her cognitive perceptions 
(self-efficacy and outcome expectations), and behaviour (Bandura 1986). Thus there is 
indeed a likelihood of reciprocal causation among the variables in the current study. 
 
Despite the weaknesses, this study plays an important role in the study of unauthorised 
copying of software. This study helped validate previous studies in this area, and as such 
allows for better conceptualisation of the motivation behind the unauthorised copying of 
software. In addition, the models proposed here are not meant to be definitive, but need to be 
90 
 
refined and tested with other populations, thus this research is meant to be a starting point for 
further work in this important and developing area. 
 
5.3. DIRECTIONS FOR FUTURE RESEARCH 
The research presented sheds some light on variables that play a role in the unauthorised 
copying of software. However, future research is needed in these areas to help validate the 
study, and to allow for better conceptualisations of the models presented. The limitations of 
this study, as discussed above, indicate possible future directions for research. Studies with 
samples of different profiles, as well as studies with larger samples are warranted, such 
studies would also enhance the generalisability of the results.  
 
In addition, the current research is exploratory in nature, and as such is attempting to 
establish this area of research as worthy for future attention, thus more research is needed 
within this area. Longitudinal studies, for one are needed for the establishment of causation. 
Future research should also adopt a longitudinal design to Social Cognitive Theory and its 
underlying concepts in the exercise of the unauthorised copying of software, as a means of 
producing a deeper understanding of the relationships between these variables. 
 
 
 
 
 
 
 
91 
 
CHAPTER 6 
CONCLUSION 
 
The present study attempted to provide further support for literature presented on the 
unauthorised copying of software, and in addition, to set out and delve into untamed waters, 
with regard to Social Cognitive Theory and the unauthorised copying of software. 
 
The unauthorised copying of software is no doubt one of the most important issues 
confronting today?s society. It is complicated, as it involves complex personal, environmental 
and behavioural factors that reciprocally determine one another. Successful research in this 
area requires researchers to constantly untangle the seemingly unlimited issues related to the 
environment, individual and behaviour. Thus the concept of Social Cognitive Theory and its 
underlying aspects can be useful in this regard. 
 
Results from the current study revealed that: 
? An individual?s intention to copy software illegally increased with stronger attitudes 
about the unauthorised copying of software. 
? Strong beliefs that significant others would approve of the unauthorised copying of 
software, lead to increased intention to copy software illegally. 
? The lower an individual?s self-efficacy beliefs, the more likely an individual would be 
to copy software illegally.  
? Moral disengagement mediates the relationship between social norms and self-
 efficacy with the intention to the unauthorised copying of software. 
 
92 
 
REFERENCE LIST 
 
Ajzen, I. & Fishbein, M. (1980). Understanding Attitudes and Predicting Social Behaviour. 
Englewood Cliffs, NJ: Prentice-Hall. 
 
Al-Rafee, S. & Cronan, T.P. (2006). Digital Piracy: Factors that Influence Attitude Toward 
Behaviour. Journal of Business Ethics, 63, 237-259. 
 
Anastasi, A. (1976). Psychological Testing (4th Ed.). New York: McMillan Publishing 
Company, Inc. 
 
Babbie, E. & Mouton, J. (2004). The Practice of Social Research. New York: Oxford 
University Press. 
 
Bandura, A. (1986). Social Foundations of Thought and Action: A Social Cognitive Theory. 
Englewood Cliffs, New Jersey, Prentice-Hall, Inc. 
 
Bandura, A. (1990). Mechanisms of Moral Disengagement. In W. Reich (Ed.). Origins of 
Terrorism: Psychologies, ideologies, theologies, states of mind. Cambridge University 
press. 
 
Bandura, A. (1991). Social Cognitive Theory of Self-Regulation. Organisational Behaviour 
and Human Decision Processes, 50, 248-287. 
 
Bandura, A. (1997). Self-Efficacy: The Exercise of Control. New York: Freeman. 
 
93 
 
Bandura, A. (1999). Moral Disengagement in the Perception of Inhumanities. Personality 
and Social Psychology Review, 3, 193-209. 
 
Bandura, A. (2000). Selective Moral Disengagement in the Exercise of Moral Agency. 
Journal of Moral education, 31 (2), 101-119. 
 
Bandura, A. (2001). Social Cognitive Theory: An Agentive Perspective. Annual Review of 
Psychology, 52, 1-26. 
  
Bandura, A., Barbaranelli, C., Caprara, G. V. & Pastorelli, C. (1996). Mechanisms of Moral 
Disengagement in the Exercise of Moral Agency. Journal of Personality and Social 
Psychology 71 (2), 364-374. 
 
Bandura, A., Caprara, G. V. & Zsolnai, L. (2000). Corporate Transgressions Through Moral 
Disengagement. Journal of Human Values, 1, 57-64. 
 
Baron, R.M. & Kenny, D.A. (1986). The Moderator-Mediator Variable Distinction in Social 
Psychological Research: Conceptual, Strategic and Statistical Considerations. Journal of 
Personality and Social Psychology, 51(6), 1173-1182. 
 
Beruk, P. (2000). SIIA?s Report on Global Software Piracy 2000. Software and Industry 
Information Association. Downloaded  July, 15, 2006 from www.siia.co.za.  
 
BSA (2007). Fourth Annual BSA and IDC Global Software Piracy Study. Downloaded 
August, 23, 2007 from www.bsa.co.za. 
94 
 
Caprara, G. V. & Capanna, C. (2004). Moral Disengagement in the Exercise of Civic-ness. 
(Unpublished). Italy: Rome. 
 
Cheng, H. K., Sims, R. R. & Teegen, H. (1997). To Purchase or to Pirate Software: An 
Empirical Study. Journal of Management Information Systems, 13 (4), 49-60 . 
 
Cohen, J., Cohen, P., West, S. G. & Aikem, L. S. (2003). Applied Multiple Regression/ 
Correlation Analysis for the Behavioural Sciences (3rd Ed.).  Laurence Erlbaum 
Associates Inc. Mauwah, New Jersey. 
 
Compeau, D. & Higgins, C. (1995). Computer Self-Efficacy: Development of a Measure and 
Initial Test. MIS Quarterly, 19 (2), 189-211. 
 
DeVellis, R. F. (1991). Scale Development: Theory and Applications. Applied Social 
Research Methods Series, 26. London: Sage publications Inc. 
 
Forester, T. & Morrison, P. (1990). Computer Ethics: Cautionary Tales and Ethical 
Dilemmas in Computing. Oxford: Basil Blackwell Ltd. 
 
Gabor, T. (1994). Everyone Does It: Crime by the Public. University of Toronto Press: 
Toronto. 
 
Garson, G. D. (1998). Structural equation Modelling.  Downloaded December, 15, 2007, 
Notes from North Carolina State University retrieved from the Web site: 
http://www2.chass.ncsu.edu/garson/pa765/structur.htm.  
95 
 
 
Gattiker, U. E. & Kelley, H. (1999). Morality and Computers: Attitudes and Differences in 
Moral Judgement. Information Systems Research, 10 (3), 233-254. 
 
Gopal, R. D. & Sanders, G. L. (1998). International Software Piracy: Analysis of Key Issues 
and Impacts. Information Systems research, 9 (4), 380-397. 
 
Graham, S. & Weiner, B. (1996). Theories and Principles of Motivation. In D. C. Berlinger & 
R. C. Calfee (Eds.). Handbook of Educational Psychology. New York: Simon & Schuster 
MacMillan. 
 
Gupta, P. B., Gould, S. J. & Pola, B. (2004). ?To Pirate or Not to Pirate?: A Comparative 
Study of the Ethical Versus Other Influences on the Consumer?s Software Acquisition-
 Mode Decision. Journal of Business Ethics, 55, 255-274.  
 
Hardy, M. & Bryman, A. (2004). Handbook of data Analysis. Sage Publications Ltd. 
Thousand Oaks, California. 
 
Hollenbeck, J. R. & Brief, A. P. (1987). The Effects of Individual Differences and Goal 
Origin on Goal Setting and Performance. Organisational Behaviour and Human Decision 
Processes, 40, 392-414. 
 
Howell, D. C. (2004). Fundamental Statistics for the Behavioural Sciences (5th Ed.). U.S.A.: 
Brooks/ Cole, Thompson Learning, Inc. 
 
96 
 
Iacobucci, D., Saldanha, N. & Deng, X. (2007). A Mediation on Mediation: Evidence that 
Structural Equations Models Perform Better than Regression. Journal of Consumer 
Psychology, 17 (2), 139-153. 
 
Jackson, L. E. & Sparr, J. L. (2005). Introducing a New Scale for the Measurement of Moral 
Disengagement in Peace and Conflict Research. Conflict and Communication Online, 4 
(2), 1-16. Downloaded July, 25, 2006, from Web site: http://www.cco.regener-
 online.de/2005_2/pdf_2005-2/es.pdf. 
 
Johnson, R. A. & Wichern, D. W. (1998). Applied Multivariate Statistical Analysis (4th Ed.). 
New Jersey: Prentice Hall. 
 
Kerlinger, F. N. (1986). Foundations of Behavioural Research (3rd Ed.). U.S.A.: Holt, 
Rinehart & Winston, Inc. 
 
Kuo, F. & Hsu, M. (2001). Development and Validation of Ethical Computer Self-Efficacy 
Measure: The Case of Softlifting. Journal of Business ethics, 32, 299-315. 
 
LaRose, R. & Kim, J. (2007). Share, Steal, or Buy? A Social Cognitive Perspective of Music 
Downloading. Cyber Psychology and Behaviour, 10 (2), 267-277. 
 
Leedy, P. (1993). Practical research Design and Planning. New York: McMillan Publishing 
Company. 
 
97 
 
Lending, D. & Slaughter, S. A. (1999). Understanding Differences in Ethical Beliefs and 
Behaviours Towards Software Copying: The Effects of Organisation Culture. Special 
Interest Group on Computer Personnel research Annual Conference. Proceedings of the 
1999 ACM SIGCPR Conference on Computer Personnel Research. U.S.A. New York, 
ACM Press, 253-260. 
 
Limayem, M. Khalifa, M. & Chin, W. (2004). Factors Motivating Software Piracy: A 
Longitudinal Study. IEEE Transactions on Engineering Management, 51 (4), 414-425. 
 
Loch, K.D. & Conger, S. (1986). Evaluating Ethical Decision-Making and Computer Use. 
Communications of the ACM, 39 (7), 74-83. 
 
Lucidi, F., Zelli, A., Mallia, L., Grano, C., Russo, P. M. & Violani, C. (2008). The Sociol 
Cognitive Mechanisms Regulating adolescents? use of Doping Substances. Journal of 
Sports Science, 26 (5), 447-456. 
 
MacCallum, R. C., Browne, M. W., & Sugawara, H. M. (1996). Power Analysis and 
Determination of Sample Size for Covariance Structure Modelling. Psychological 
Methods, 1, 130-149. 
 
McAlister, A. L., Bandura, A. & Owen, S. V. (2006). Mechanisms of Moral Disengagement 
in Support of Military Force: The Impact of Sept. 11. Journal of Social and Clinical 
Psychology, 25 (2), 141-166. 
 
98 
 
McKennel, R. (1970). Attitudinal Measurement: Use of Coefficient Alpha with a Cluster or 
Factor Analysis, Sociology, 4, 227-247. 
 
Murphy, K. R. & Davidshofer, C. O. (2001). Psychological Testing: Principles and 
Applications (5th Ed.). New Jersey: Prentice-Hall, Inc. 
 
Osofsky, M. J., Bandura, A. & Zimbardo, P. G. (2005). The Role of Moral Disengagement in 
the Execution Process. Law and Human Behaviour, 29 (4), 371-393. 
 
Pajares, F. (2002). Overview of Social Cognitive Theory and Self-Efficacy. Downloaded 
October, 17, 2007, from Web site:  http://www.emory.edu/EDUCATION/mfp/eff.html. 
 
Povey, R., Conner, M., Sparks, P., James, R. & Shepherd, R. (2000). Application of theory of 
planned behaviour to two dietary behaviours: Roles of perceived control and self-
 efficacy. British Journal of Health Psychology, 5, 121-139. 
 
Rahim, M., Seyal, A.H. & Rahman, M.N. (2001). Factors Affecting Softlifting intention of 
computing students: An empirical study. Journal of Educational Computing Research, 
24(4), 385-405. 
 
Ramakrishna, H.V., Kini, R.B. & Vijayaraman, B.S. (2001). Shaping of moral intensity 
regarding software piracy in university students: Immediate community effects. The 
Journal of Computer Information Systems, 41 (4), 47-52. 
 
99 
 
Rosenthal, R. & Rosnow, R.L. (1991). Essentials of Behavioural Research: Methods and 
data Analysis (2nd ED.). New York: McGraw Hill. 
 
Seale, D.A., Polakowski, M. & Schneider, S. (1998). It's not really theft! Personal workplace 
ethics that enable software piracy. Behaviour and Information Technology, 17 (1), 27-40. 
 
Simpson, P. M., Banerjee, D. & Simpson, C. L. (1994). Softlifting: A Model of Motivating 
Factors. Journal of Business Ethics, 13 (6), 431-439. 
 
Siponen, M.T. & Vartainen, T. (2005). Attitudes to and Factors affecting unauthorised 
copying of software in Finland. Behaviour & Information Technology, 24(4), 249-257. 
 
Solomon, S. & O?Brien, J. (1990). The Effects of Demographic Factors on Attitudes Toward 
Software Piracy. Journal of Computer Information Systems, 30 (3), 40-46. 
 
Software Piracy Report (1997). Software Piracy and Global Competitiveness: Report on 
Global Software Piracy. International Review of Law, Computers & Technology, 12 (3), 
431-451. 
 
Swinyard, W. R., Rinne, H. & Kau, A. K. (1990). The Morality of Software Piracy: A Cross-
 Cultural Analysis. Journal of Business Ethics, 9 (8), 655-664. 
 
Terre Blanche, M. & Durrheim, K. (2004). Research in Practice: Applied Methods for the 
Social Sciences. Cape Town: UCT Press. 
 
100 
 
Trafimow, D. & Finlay, K. (1996). The Importance of Subjective Norms for a Minority of 
People: Between-subjects and Within-subjects Analysis. Personality and Social 
Psychology Bulletin 22, 820-829. 
 
Traphagan, M. & Griffith, A. (1998). Software Piracy and Global Competitiveness: Report 
on Global Software Piracy.  International Review of Law Computers and Technology, 12 
(3), 431-451. 
 
Vallerand, R. J., Cuerrier, P. D., Pelletier, L. G. & Mongeau, C. (1992). Ajzen and Fishbein?s 
Theory of Reasoned Action as Applied to Moral Behaviour: A Confirmatory Analysis.  
Journal of Personality and Social Psychology, 62 (1), 98-109. 
 
Yuan, K. H. & Bentler, P. M. (1999). F Tests for Mean and Covariance Structure Analysis.  
Journal of Educational and Behavioural Statistics, 24, 225-243. 
 
Wadee, F. (2002).  Affective Commitment as a Moderator of the Tenure-Burnout 
Relationship. (Unpublished Dissertation). Johannesburg: Wits. 
 
Wentzell, A. (2006). The Development of a New Scale for Moral Disengagement in the 
exercise of Unauthorised Copying of Software. Unpublished Honours Research Report. 
 
 
 
 
 
 
 
101 
 
APPENDIX 1 
ORGANISATIONAL INFORMATION SHEET 
            School of Human and Community Development 
       Private Bag 3, Wits 2050, Johannesburg, South Africa 
       Tel: (011) 717-4500  Fax: (011) 717-4559 
       Email: 018lucy@muse.wits.ac.za 
Dear Sir/ Madam 
 
My name is Alethea Wentzell, and I am conducting research for the purpose of obtaining my masters 
degree in Industrial Psychology at the University of the Witwatersrand. My area of focus is on the 
unauthorised copying of software, and how individuals try to give good reasons for doing this and not 
feeling guilty. Part of the research aims to explore how individuals? attitudes and beliefs as well as 
how societal views affect their understanding of unauthorised copying of software. I would like to 
invite your organisation to participate in this research. Your organisation will remain anonymous. 
 
Participation in this research will entail employees completing a questionnaire. Participation is 
voluntary, and no individual will be advantaged or disadvantaged in any way for choosing to 
complete or not complete the questionnaire. At no point are employees required to submit their name 
or any other identifying information, as such they will remain anonymous. The completed 
questionnaire will not be seen by anyone other than the researcher at any time. Responses will only be 
looked at in relation to all other responses. This means that feedback will be in the form of group 
responses and not individual perceptions. As such employees? answers will be confidential. 
 
If you choose to participate in the study, employees will be asked to please complete the following 
questionnaire as carefully and honestly as possible, as there are no right or wrong answers. This will 
take approximately 20 minutes. Once employees have answered the questions, they will be asked to 
place the questionnaires in the envelope provided and deposit it in the sealed box in the reception area 
of the organisation. I will collect the questionnaires from the box at regular intervals. This will ensure 
that no one will have access to the completed questionnaires, and will further ensure employees 
anonymity and confidentiality. If employees do complete and submit their questionnaires, it will be 
considered consent to participate in the study.  
 
Your participation in this study would be greatly appreciated. This research will contribute both to a 
larger body of knowledge on moral disengagement in unauthorised copying of software. A summary 
of end results will be posted on the notice board of the organisation for all participants who 
participated in the research to receive feedback. 
 
Kind Regards 
______________ 
Alethea Wentzell 
alethea_wentzell@hotmail.com 
 
 
102 
 
APPENDIX 2 
PARTICIPANT INFORMATION SHEET 
            School of Human and Community Development 
       Private Bag 3, Wits 2050, Johannesburg, South Africa 
       Tel: (011) 717-4500  Fax: (011) 717-4559 
       Email: 018lucy@muse.wits.ac.za 
Dear Sir/ Madam 
 
My name is Alethea Wentzell, and I am conducting research for the purpose of obtaining my masters 
degree in Industrial Psychology at the University of the Witwatersrand. My area of focus is on the 
unauthorised copying of software, and how individuals try to give good reasons for doing this and not 
feeling guilty. Part of the research aims to explore how individuals? attitudes and beliefs as well as 
how societal views affect their understanding of unauthorised copying of software. I would like to 
invite you to participate in this research.  
 
Participation in this research will entail completing the following questionnaire. Participation is 
voluntary, and no individual will be advantaged or disadvantaged in any way for choosing to 
complete or not complete the questionnaire. At no point are you required to submit their name or any 
other identifying information, as such they will remain anonymous. Your completed questionnaire 
will not be seen by anyone other than the researcher at any time. Responses will only be looked at in 
relation to all other responses. This means that feedback will be in the form of group responses and 
not individual perceptions. As such your answers will be confidential. 
 
If you choose to participate in the study, please complete the following questionnaire as carefully and 
honestly as possible, as there are no right or wrong answers. This will take approximately 20 minutes. 
Once you have answered the questions, place the questionnaires in the envelope provided and deposit 
it in the sealed box in the reception area of the organisation. I will collect the questionnaires from the 
box at regular intervals. This will ensure that no one will have access to the completed questionnaires, 
and will further ensure your anonymity and confidentiality. If you do complete and submit their 
questionnaires, it will be considered consent to participate in the study.  
 
Your participation in this study would be greatly appreciated. This research will contribute both to a 
larger body of knowledge on moral disengagement in unauthorised copying of software. A summary 
of end results will be posted on the notice board of the organisation for all participants who 
participated in the research to receive feedback. 
 
Kind Regards 
______________ 
Alethea Wentzell 
alethea_wentzell@hotmail.com 
 
 
103 
 
APPENDIX 3 
QUESTIONNIARE 
UNAUTHORISED COPYING OF SOFTWARE QUESTIONNAIRE 
SECTION 1: Biographical Questions. 
 
These questions are used for descriptive purposes only.  Please mark the box that best describes 
you: 
  
What is your gender? 
                                                                                                                                                           
Male Female 
 
What is your age in years? 
 
18-28 29-38 39-49 49-59 60+ 
 
What is your race? 
 
African Indian Coloured White Other
  
What is your highest level of education? 
 
Primary School High School Matric Diploma course Undergraduate Postgraduate 
 
What is your current occupation? 
 
Student/Pupil Employed/  
Professional 
 
Employed 
Semi/ Professional
 Self- 
Employed
 Unemployed Retired 
 
What department do you work in? 
 
IT Legal Sales & 
Marketing
 Technical Consulting Education Engineering Financial Government HR
  
If other, please specify ________________________ 
 
Approximate years of computer use? 
 
Less than 1 year 1-5 years 5-10 years 10-15 years 15-20 years More than 20 years 
 
How many hours a day do you use a computer? 
 
1-5 hours 5-10 hours 15-20 hours 20+ hours
  
How frequently (per week) do you use programming packages (e.g. C++, Java, Perl, etc)? 
 
Not applicable 
or never 
Less than 
once a week 
Once to a few 
times a week 
Up to 2 hours 
every day 
2-8 hours 
every day 
More than 40 
hours every week
  
104 
 
How frequently (per week) do you use office programs (e.g. word processing, spreadsheet, etc. 
applications)? 
 
Not applicable 
or never 
Less than 
once a week 
Once to a few 
times a week 
Up to 2 hours 
every day 
2-8 hours 
every day 
More than 40 
hours every week
 How frequently (per week) do you use technical software (e.g. statistical, accounting, DTP, CAD, 
SAP, etc. applications)? 
 
Not applicable 
or never 
Less than 
once a week 
Once to a few 
times a week 
Up to 2 hours 
every day 
2-8 hours 
every day 
More than 40 
hours every week
  
How frequently do you use computer games (e.g. Quake, Warcraft, etc)? 
 
Not applicable 
or never 
Less than 
once a week 
Once to a few 
times a week 
Up to 2 hours 
every day 
2-8 hours 
every day 
More than 40 
hours every week
  
How frequently (per week) do you use the Internet? 
 
Not applicable 
or never 
Less than 
once a week 
Once to a few 
times a week 
Up to 2 hours 
every day 
2-8 hours 
every day 
More than 40 
hours every week
  
 
 
SECTION 2: 
 
For the following questions please indicate your degree of confidence for the following 
statements: 
 
1. When you badly need a 
software programme but feel it 
is too expensive, how confident 
are you to refuse to use an 
illegal copy of that software 
Not at all 
confident 
Not very 
confident Neutral
 Relatively 
confident 
Extremely 
confident 
2. When you badly need a 
software programme but do not 
have time to purchase a copy, 
how confident are you to refuse 
to use an illegal copy of that 
software 
Not at all 
confident 
Not very 
confident Neutral
 Relatively 
confident 
Extremely 
confident 
3. When you badly need a 
software program and have the 
opportunity to obtain an illegal 
copy without anybody else 
knowing, how confident are you 
not to take advantage of it 
Not at all 
confident 
Not very 
confident Neutral
 Relatively 
confident 
Extremely 
confident 
4. When you badly need a 
software program and have seen 
other colleagues use an illegal, 
Not at all 
confident 
Not very 
confident Neutral
 Relatively 
confident 
Extremely 
confident 
105 
 
how confident are you not to 
take advantage of it 
5. When you badly need an illegal 
copy of a software program to 
benefit your work, how 
confident are you not to take 
advantage of it 
Not at all 
confident 
Not very 
confident Neutral
 Relatively 
confident 
Extremely 
confident 
6. If a colleague has a software 
program that you like very 
much, how confident are you 
not to ask for an illegal copy of 
it 
Not at all 
confident 
Not very 
confident Neutral
 Relatively 
confident 
Extremely 
confident 
7. If a good friend badly needs a 
software program, how 
confident are you not to make 
an illegal copy for him or her 
Not at all 
confident 
Not very 
confident Neutral
 Relatively 
confident 
Extremely 
confident 
8. If a good friend badly needs a 
software program and is asking 
for your help to obtain an illegal 
copy, how confident are you to 
refuse to accept that request 
Not at all 
confident 
Not very 
confident Neutral
 Relatively 
confident 
Extremely 
confident 
9. If a good friend badly needs a 
software program that you own 
and is asking you for a copy, 
how confident are you to refuse 
to grant the request 
Not at all 
confident 
Not very 
confident Neutral
 Relatively 
confident 
Extremely 
confident 
10. If you see colleagues using an 
illegal copy of a software 
program, how confident are you 
to try to dissuade them from 
using it 
 
Not at all 
confident 
Not very 
confident Neutral
 Relatively 
confident 
Extremely 
confident 
11. If you see a colleague selling an 
illegal copy of a software 
program for profit, how 
confident are you to try to talk 
him or her to give it up 
Not at all 
confident 
Not very 
confident Neutral
 Relatively 
confident 
Extremely 
confident 
12. If you see a colleague 
attempting to make an illegal 
copy of a software program, 
how confident are you to try to 
Not at all 
confident 
Not very 
confident Neutral
 Relatively 
confident 
Extremely 
confident 
106 
 
talk him or her out of it 
 
 
SECTION 3: 
 
For the following questions please indicate your degree of agreement or disagreement with the 
following statements: 
 
13. There is nothing wrong in using 
unauthorised copied software if it 
is needed for the success of a 
social responsibility project 
Strongly 
Disagree Disagree Neutral Agree 
Strongly 
Agree 
14. It is okay to use unauthorised 
copied software if it will improve 
an individual?s computer literacy 
Strongly 
Disagree Disagree Neutral Agree 
Strongly 
Agree 
15. The unauthorised copying of 
software is like playing a trick on 
the software company 
Strongly 
Disagree Disagree Neutral Agree 
Strongly 
Agree 
16. Copying someone else?s software 
is just a cheaper way of getting 
the product 
Strongly 
Disagree Disagree Neutral Agree 
Strongly 
Agree 
17. The unauthorised copying of 
software is inventive 
Strongly 
Disagree Disagree Neutral Agree 
Strongly 
Agree 
18. The unauthorised copying of 
software is not too serious 
compared to those people who use 
spyware to steal money from 
people?s bank accounts 
Strongly 
Disagree Disagree Neutral Agree 
Strongly 
Agree 
19. Individuals who copy software 
illegally should not be prosecuted 
because they are actually saving 
software companies on 
distribution costs 
Strongly 
Disagree Disagree Neutral Agree 
Strongly 
Agree 
20. Individuals who cannot afford 
software products cannot be held 
responsible for the unauthorised 
copying of it 
Strongly 
Disagree Disagree Neutral Agree 
Strongly 
Agree 
21. A manager is not culpable for the 
unauthorised copying of software 
as a request from his boss to save 
the company some money 
Strongly 
Disagree Disagree Neutral Agree 
Strongly 
Agree 
107 
 
22. There is no sense in worrying 
about those few individuals who 
copy software illegally since there 
is a big community of people 
copying software 
Strongly 
Disagree Disagree Neutral Agree 
Strongly 
Agree 
23. Individuals should not feel guilty 
for the unauthorised copying of 
software if they only contributed 
towards it in a very small way 
Strongly 
Disagree Disagree Neutral Agree 
Strongly 
Agree 
24. There is no sense in blaming a 
few individuals for the 
unauthorised copying of software 
when everybody else does the 
same thing 
Strongly 
Disagree Disagree Neutral Agree 
Strongly 
Agree 
25. The unauthorised copying of 
software does not really have a 
significant adverse effect on the 
software industry as they make 
lots of money anyway 
Strongly 
Disagree Disagree Neutral Agree 
Strongly 
Agree 
26. The unauthorised copying of 
software is okay as software 
companies can afford these losses 
Strongly 
Disagree Disagree Neutral Agree 
Strongly 
Agree 
27. The unauthorised copying of 
software is a way of convincing 
the software companies to drop 
their prices 
Strongly 
Disagree Disagree Neutral Agree 
Strongly 
Agree 
28. Software companies are to blame 
for the unauthorised copying of 
software as they make it too easy 
for individuals to copy software 
Strongly 
Disagree Disagree Neutral Agree 
Strongly 
Agree 
29. The unauthorised copying of 
software happens when people are 
given no other means to get 
access to the software 
Strongly 
Disagree Disagree Neutral Agree 
Strongly 
Agree 
30. The unauthorised copying of 
software is not the individuals 
fault as software companies do 
not adequately protect their 
software 
Strongly 
Disagree Disagree Neutral Agree 
Strongly 
Agree 
31. The software companies are 
corporate bloodsuckers who drain Strongly 
Disagree Neutral Agree Strongly 
108 
 
companies? finances Disagree Agree 
32. The software companies are a 
bunch of frauds who deserve to 
have their products copied 
illegally 
Strongly 
Disagree Disagree Neutral Agree 
Strongly 
Agree 
 
 
SECTION 4: 
 
For the following questions please indicate your degree of agreement or disagreement with the 
following statements: 
 
 
33. I intend to make unauthorized 
software copy in the future 
Strongly 
Disagree Disagree Neutral Agree 
Strongly 
Agree 
34. I plan to make unauthorized 
software copy in the future 
Strongly 
Disagree Disagree Neutral Agree 
Strongly 
Agree 
35. I am tempted to make unauthorized 
software copy in the future  
Strongly 
Disagree Disagree Neutral Agree 
Strongly 
Agree 
 
 
 
SECTION 5: 
For the following questions please indicate your degree of agreement or disagreement with the 
following statements: 
 
36. 
I would feel guilty about being in 
possession of unauthorised copies of 
software 
Strongly 
Disagree Disagree Neutral Agree 
Strongly 
Agree 
37. I would not feel badly about making 
unauthorised copies of software  
Strongly 
Disagree Disagree Neutral Agree 
Strongly 
Agree 
38. I would feel guilty about giving my 
close friends unauthorised copies of 
copyrighted software 
Strongly 
Disagree Disagree Neutral Agree 
Strongly 
Agree 
39. I feel that making unauthorised copies 
of software is fine  
Strongly 
Disagree Disagree Neutral Agree 
Strongly 
Agree 
40. The benefits of unauthorised software 
copying outweigh the possible 
consequences 
Strongly 
Disagree Disagree Neutral Agree 
Strongly 
Agree 
109 
 
SECTION 6: 
 
For the following questions please indicate your degree of agreement or disagreement with the 
following statements: 
 
 
41. Most people I know make unauthorised 
copies of software  
Strongly 
Disagree Disagree Neutral Agree 
Strongly 
Agree 
42. People who are important to me think I 
should not make unauthorised copies of 
software 
Strongly 
Disagree Disagree Neutral Agree 
Strongly 
Agree 
43. People who are important to me would 
approve of my making unauthorised 
copies of software 
Strongly 
Disagree Disagree Neutral Agree 
Strongly 
Agree 
44. People who are important to me want 
me to make unauthorised copies of 
software 
Strongly 
Disagree Disagree Neutral Agree 
Strongly 
Agree 
45. I feel under social pressure to make 
unauthorised copies of software 
Strongly 
Disagree Disagree Neutral Agree 
Strongly 
Agree 
46. People who are important to me do not 
influence my decision to make 
unauthorised software copies 
Strongly 
Disagree Disagree Neutral Agree 
Strongly 
Agree 
47. My work colleagues would approve of 
my making unauthorised software 
copies  
Strongly 
Disagree Disagree Neutral Agree 
Strongly 
Agree 
48. My manager would think that I should 
not make unauthorised software copies 
Strongly 
Disagree Disagree Neutral Agree 
Strongly 
Agree 
49. My organisation does not support 
making unauthorised software copies   
Strongly 
Disagree Disagree Neutral Agree 
Strongly 
Agree 
 
 
 
 
 
 
 
 
 
 
 
 
 
110 
 
APPENDIX 4 
SELF-EFFICACY TO UNAUTHORISED COPYING OF SOFTWARE SCALE 
Items of Use and Keep Self-Efficacy: 
1. When you badly need a software program but feel it is too expensive, how confident are 
you to refuse to use an illegal copy of that software. 
2. When you badly need a software program but do not have the time to purchase a copy, 
how confident are you to refuse to use an illegal copy of that software. 
3. When you badly need a software program and have the opportunity to obtain an illegal 
copy without anybody else knowing, how confident are you not to take advantage of it. 
4. When you badly need a software program and have seen other colleagues use an illegal 
copy, how confident are you not to take advantage of it. 
5. When you badly need an illegal copy of a software program to benefit your work, how 
confident are you not to take advantage of it. 
6.  If a colleague has a software program that you like very much, how confident are you not 
to ask for an illegal copy of it. 
Items of Distribution Self-Efficacy: 
1. If a good friend badly needs a software program, how confident are you not to make an 
illegal copy for him or her. 
2. If a good friend badly needs a software program and is asking for your help to obtain an 
illegal copy, how confident are you to refuse to accept that request. 
3. If a good friend badly needs a software program that you own and is asking you for a 
copy, how confident are you to refuse to grant the request. 
Items of Persuasion Self-Efficacy: 
1. If you see colleagues using an illegal copy of a software program, how confident are you 
to try to dissuade them from using it. 
2. If you see a colleague selling an illegal copy of software program for profit, how 
confident are you to try to talk him or her to give it up. 
3. If you see a colleague attempting to make an illegal copy of a software program, how 
confident are you to try to talk him or her out of it. 
111 
 
APPENDIX 5 
MORAL DISENGAGEMENT TO THE UNAUTHORISED COPYING OF 
SOFTWARE SCALE 
 
 
 
 
 
 
Moral Justification: 
1. There is nothing wrong in using unauthorised copied software if it is needed for the success of a 
social responsibility project. 
2. It is okay to use unauthorised copied software if it will improve an individual?s computer 
literacy. 
Euphemistic Labelling: 
1. The unauthorised copying of software is like playing a trick on the software company. 
2. Copying someone else?s software is just a cheaper way of getting the product. 
3. The unauthorised copying of software is inventive. 
Advantageous Comparisons: 
1. The unauthorised copying of software is not too serious compared to those people who use 
spyware to steal money from people?s bank accounts. 
2. Individuals who copy software illegally should not be prosecuted because they are actually 
saving software companies on distribution costs. 
Displacement of Responsibility: 
1. Individuals who cannot afford software products cannot be held responsible for the unauthorised 
copying of it. 
2. A manager is not culpable for the unauthorised copying of software as a request from his boss to 
save the company some money. 
Diffusion of Responsibility: 
1. There is no sense in worrying about those few individuals who copy software illegally since there 
is a big community of people copying software. 
2. Individuals should not feel guilty for the unauthorised copying of software if they only 
contributed towards it in a very small way. 
3. There is no sense in blaming a few individuals for the unauthorised copying of software when 
everybody else does the same thing. 
Distortion of Consequences: 
1. The unauthorised copying of software does not really have a significant adverse effect on the 
software industry as they make lots of money anyway. 
2. The unauthorised copying of software is okay as software companies can afford these losses. 
3. The unauthorised copying of software is a way of convincing the software companies to drop 
their prices. 
Attribution of Blame: 
1.    Software companies are to blame for the unauthorised copying of software as they make it too 
easy for individuals to copy software. 
2. The unauthorised copying of software happens when people are given no other means to get 
access to the software. 
3. The unauthorised copying of software is not the individuals fault as software companies do not 
adequately protect their software. 
Dehumanisation: 
1.   The software companies are corporate bloodsuckers who drain companies? finances. 
2.   The software companies are a bunch of frauds who deserve to have their products copied illegally.