首页    期刊浏览 2025年02月20日 星期四
登录注册

文章基本信息

  • 标题:Attitude- intention linkage: impact of Gunas on attitude & intention of piracy & privacy intrusion.
  • 作者:Debnath, Nivedita ; Bhal, Kanika T.
  • 期刊名称:Indian Journal of Industrial Relations
  • 印刷版ISSN:0019-5286
  • 出版年度:2008
  • 期号:July
  • 语种:English
  • 出版社:Shri Ram Centre for Industrial Relations and Human Resources
  • 关键词:Ethnic attitudes;Intention;Intention (Psychology);Software piracy

Attitude- intention linkage: impact of Gunas on attitude & intention of piracy & privacy intrusion.


Debnath, Nivedita ; Bhal, Kanika T.


The present paper looks at the ethical issues related to intrusion of privacy and software piracy, and tries to explore the relationship between attitude (perceived ethicality) and intention (likelihood) of indulging in these activities. The paper explores the impact of the personality factors that influence individual attitude, which, in turn, influences individual intention. The paper looks at a personality construct called Gunas, which has been identified, in traditional Indian literature as descriptive of ethical behaviour.

Introduction

We cannot ignore the freedom and flexibility given to us by Information Technology (IT), but we also cannot ignore the ethical issues that IT has given to our society. Issues of privacy and software piracy in organizations are two such issues. According to Mason (1986) privacy is what information about one's self or one's associations must a person reveal to others, under what conditions and with what safeguards? What things can people keep to them and not be forced to reveal to others?

Privacy is the condition of not having undocumented personal knowledge about one possessed by the other. A person's privacy is diminished exactly to the degree that others possess this kind of knowledge about him/her. Documented information is information that is found in the public record or is publicly available (Parent 1983). Privacy has been defined as the right of individuals to control the collection and use of personal information about themselves has been defined as the 'right of individuals to control the collection and use of personal information about themselves' (Henderson & Snyder 1999).

Two forces threaten our privacy. One is the growth of information technology, with its enhanced capacity for surveillance, communication, computation, storage and retrieval. The second and more insidious threat is the increased value of information in decision-making. Information is increasingly valuable to policy makers; they convert it even if acquiring it invades another's privacy (Mason 1986).

Another ethical issue that we have taken in the present study is software piracy. Software piracy is defined as an illegal act of copying software for many reasons, other than back up, without explicit permission from and compensation to the copyright holder (Gopal & Sanders 1998). Software piracy, which includes both the duplication of commercially available software to avoid fees and unauthorized copying of an organization's own internally, developed programs (Straub & Collins 1990). Piracy is claimed to be a major problem for the microcomputer software industry. It has been estimated that for every legitimate copy sold there are between two and ten illegal copies "bootlegged" from friends or colleagues (Conner & Rumelt 1991).

Unfortunately, this is not a widely recognized form of property, as shown by two studies. Vitell and Davis (1990) found software copying to be one of the most acceptable of 27 questionable consumer practices, while Soloman and Brien, (1997) reported that over half of the students surveyed admitted making unauthorized copies. They consider this to be a very conservative estimate of the proportion who copy. Such an attitude may lead to the feeling that other forms of "victimless" stealing also are acceptable. Pirating software is an "economic short-cut" in that a good is acquired without cost to the user or apparent harm to the original owner (Taylor & Shim 1993). Computer software is so readily copied and personal computer processing cycles are usually treated as a free resource (Green & Gilbert 1987).

The cognitive moral philosophies that individuals use for piracy and privacy invasion assume significance specially because the situations are relatively new and the societal norms are not crystallized. In this context the theory of planned behaviour (TPB) provides a volitional (intentional) self-regulating mechanism for cognitive processes.

Theory of Planned Behaviour (TPB)

Theory of Planned Behaviour (TPB) to predict and understand the causes of behaviour, believing that behaviour must be preceded by behavioural intentions, which in turn are affected by either the attitudes toward the behaviour, the subjective norms toward the behaviour, the perceived behavioural control, or all of them.

TPB is an improved version of TRA (theory of reasoned action) with the addition of perceived behavioural control as a new variable. According to TRA, the influence of attitude on behaviour is mediated through behavioural intentions that are a cornerstone of TRA (Fishbein & Ajzen 1975). TRA goes further than the inclusion of intention as a mediator of the attitude-behaviour relationship, it holds that attitude is only one determinant of intention and that social pressure is also likely to determine people's intentions. TPB believes that intention to act is determined by the individual's attitude and the perceived social pressure from significant others, subjective norms. Fishbein's (1967) work holds that individuals may possess a large number of beliefs about a particular behaviour that are likely to be salient at any one time. This model believes that both attitude and subjective norms are determined by salient underlying beliefs. But according to theory of planned behaviour human beings are quite rational and they make logical and systematic use of the information available to them. Glass and Wood (1996), in their study showed that variations in resources gained through the software exchange influence an individual's intentions to provide his or her legal copy of software to another for purpose of illegal copying.

Attitude

Attitude toward the behaviour refers to the degree to which the person has a favourable or unfavourable evaluation of the behaviour in question (Ajzen 1989). Early theorists tended to use the term affect to denote an attitude's valence, i.e., overall degree to favourability (Thurstone 1931). They defined attitude as affect for against psychological object. With this perspective, many social psychologists have used the terms affect (Zajonc 1993, Rosenberg 1956). To avoid confusion Ajzen and Fishbein proposed to use the term "attitude" to refer to the evaluation an object, concept, or behaviour along a dimension of favour or disfavour, good or bad, like or dislike. Examples of responses reflecting attitude are approval or disapproval of a policy or disliking of a person or group of people. Attitude in turn is likely to influence the intention of individual to act towards a particular act. The ability of attitudes to predict behavioural intentions is a major focus of theory and research. Many researches (Schultz & Oskamp 1996) in their studies have found that attitude leads to behavioural intentions. Prislin and Ouellette (1996) found that highly embedded attitudes towards preservation of the environment were more strongly related to an aggregate measure of behaviour intentions than were low embedded attitudes. In an IT ethical context, if individuals view stealing software as wrong, they are unlikely to intend to steal it. Ethical computing research has shown attitudes to be important predictors of individuals' ethical computing behaviours (Loch & Conger 1996). In another study Culnan and Milne (2001) found that if an individual believes that the advantage gained from the provision of false information over the Intent will help protect personal privacy, then individual's attitude towards fabricating information is likely to be positive.

Intention

Intention refers to the subjective probability of one's engagement in any behaviour (Fishbein & Ajzen 1975). The stronger behavioural intention, the more likely the execution. According to Fishbein and Ajzen, intention to act is determined by the individual's attitude and perceived social pressure from significant others. Glass and Wood (1996), in their study showed that variations in resource gained through the software exchange influence an individual's intentions to provide his or her legal copy of software to another for purpose of illegal copying.

What position people take on these issues is governed by many factors like social norms, personal norms, and the situation. Thus, the individual who is making a decision is an important element in this process. For this purpose, we look at the Indian personality construct of Gunas in relation to the attitude and intention of indulging in the issues of piracy and privacy. Next we look at the Gunas, that is an Indian personality construct, which literally translated, would mean inherent attributes.

The concept of Gunas

Personality is one such psychological term in English literature that comes closer to the concept of Gunas (character). The Sankhya school of Indian philosophy says that the entire physical Universe, including the human mind, is a manifestation of mula--prakriti (basic nature) or primordial prakriti (nature) (Hiriyanna, cited in Charaborty 1987). This prakriti (basic nature) has three constituents, namely Sattwa, Rajas and Tamas. All matters and empirical phenomena, including the mind, are matter--manifest in endless combinations of these three Gunas (Chokraborty 1987). There is no single word in English to translate these three Gunas, but certain suggestive words could be illumination for Sattwa, movement for Rajas, and obstruction for Tamas (Chokraborty 1985: 187-8). These Gunas are not mechanically placed. They constitute a unity in trinity, they coexist and cohere. Like a lamp flame sustained by fire, oil, and wick, empirical phenomena and the human mind are also a synthesis of Sattwa, Rajas and Tamas (Hiriyanna 1956:108).

The ancient Indian philosophy, embodied in a scripture, The Gita, is rich in prescriptions for daily life and ethical principles. In chapter XIV, verse 5, it is stated that the three modes (Gunas) Sattwa, Rajas and Tamas are born of nature and tie down a man to the material world. Gunas in The Gita are mainly used for ethical analysis, hence the terms goodness (for Sattwa), passion (for Rajas) and dullness (for Tamas) are used (Radhakrishnan 1948). It is for this reason that we explore the concept of Gunas while exploring the ethical issues involved in software piracy and privacy. The Gunas are the three tendencies that reflect human character. Further in verses 6, 7 & 8 of Chapter XIV it is explained that goodness (Sattwa) being pure causes illumination and health; passion (Rajas) causes desire, craving and attachments whereas dullness (Tamas) causes indolence, ignorance negligence and sleep. The manifestations of these concepts are dealt with in details in chapter XVII and XVIII of The Gita. The manifestations are in terms of lifestyle, nature of charity, austerity, and sacrifice, use of intellect and sources of happiness. In some broad sense the Gunas may have some parallel with Kohlberg's (1976) stages of moral development. Sattwa is enlightenment, which is beyond the sixth stage of moral development where the focus is on universal ethical principles orientation. Rajas is related to passion where the cognitive frameworks may be present but the ego is predominant and it may force one to indulge in unethical acts for the achievement of some immediate goals. Finally, Tamas is described as one that not only acts unethically but also perceives the unethical as ethical (dharma as adharma).

Methodology

Since the focus of the study was using Information Technology, it was assumed that the level of familiarity with IT was likely to influence the responses. To address this issue an attempt was made to choose a sample that was homogeneous in terms of familiarity with IT, the study was conducted on the software professionals. These organizations varied in terms of ownership and respondents from Indian multinational and government organizations were included in the study.

Participants

This study was conducted on professionals working in software organizations. Altogether 379 executives from 16 organizations constituted the sample for this study. The data was collected via questionnaires that were administered in the organizations. The employees were assured of confidentiality and were informed that the information would be used for academic and research purpose solely. The sample had mainly young professionals in the age group of 25 -30 years. It needs to be mentioned here that the age of the respondents is reflective of the actual age profile of the software professionals. However, the actual population probably has a larger share of female professionals as compared to this sample.

Further, an attempt was made to collect data from, the different parts of the country to make the finding more universally representative, 131, 142 and 106 respondents were from Western, Southern and Northern parts of India respectively. Respondents belonged to different types of organizations, 160 were from Indian private organizations, 189 were from multinationals and 30 were from government organizations.

Instruments Used

Based on Shore, Solarzone, Burn and Hussan (2001) three situations of software piracy were adopted. Two situations were related to soft-lifting (piracy for self) and one was related to corporate piracy (piracy for organization). The attitude and behavioural intention for each situation was measured by using 3 items each. Attitude was assessed in terms of perceived ethicality and intention through likelihood of indulging in the activity. Reliability (Cronobach's alpha) of attitude and intention for all the situations are reported in Table 1.

The situation for privacy intrusion has been adopted from Loch, Conger & Oz (1998) and has been changed according to our study. The situations were concerned with employee monitoring in the workplace by using IT. These situations too are followed by 3 items each of attitude and intention. Attitude was assessed in terms of perceived ethicality and intention through likelihood of indulging in the activity. Reliability (Cronbach's alpha) of perceived ethicality and likelihood for both situations are reported in Table 1.

Gunas

The scale for studying Gunas was adopted from (Bhal & Debnath 2006).

Attitude- Intention Linkage

To predict and understand the causes of behaviour, Ajzen (1985, 1989) proposes the TPB, believing that behaviour must be preceded by behavioural intentions, which in turn are affected by attitudes, subjective norms, perceived behavioural control or all of them. Thus it is important to test the attitude- intention linkage. Attitude is not towards an object, person or a situation; it's towards performing a particular act in a given situation. In our research, attitude is towards performing or not performing piracy and privacy intrusion. Intention refers to the subjective probability of one's engagement in any behaviour (Fishbein & Ajzen 1975). The stronger behavioural intention, the more likely the execution. We have measured attitude as the perceived ethicality of piracy and privacy intrusion situations and intention in terms of likelihood of indulging in piracy and privacy intrusion.

Testing attitude-intention linkage was one of our study objectives. Correlation test was conducted to study the relationship of attitude with intention for all the situations of piracy and privacy intrusion. Table 1 shows the result of correlation, means, standard deviations and reliability of study variables, for all the situations of piracy and privacy intrusion.

Thus, there is a very strong correlation between perceived ethicality of an act and the likelihood to indulge in it. The results provide a strong support for attitude- intention linkage.

Personality (Guasas) -Attitude-Intention Linkage

The individual personality traits related to ethical behaviour hold promise for understanding and predicting ethical behaviour at work. Though the individual personality is seen as an important predictor of ethical conduct, the ethicality has been related to existing personality constructs and the research is inconclusive about a set of personality constructs that can be used as good predictors of ethical conduct in general and in the workplace in particular. The role of cultural and social factors in ethics has been found relevant in the Indian context too (Beverly, Chatterjee & Lunquist 2002, Christie, Kwon, Stoeberl & Baumhart 2003, Worden 2003). The ethical and religious philosophy, developed in ancient India, provides a rich discussion on Gunas, which have been identified in Indian philosophy as personality constructs relevant for the study of virtue and ethical decision-making.

We tried to look at the influence of Gunas on attitude -intention linkage regarding piracy and privacy intrusion. To test this linkage we have tested structural equations. Essentially, 15 models were tested. The significant models are reported in Table 2.

Structural Equation Model (SEM)

A structural equation model is a regression-based technique, which has its root in path analysis and also termed as a causal modelling technique (Igbaria, Guimarares & Davis, 1995). The test of structural model consists of two evaluations: (1) model fitness and (2) casual evaluations of model variables. The evaluation of model fitness aims at evaluating the explanatory power of the model. The evaluation of causal relationship attempts to confirm the theoretical relationship among the model variables; that is it evaluates the significance of path in structural model (Lin et al 1999).

Several statistics were used to assess the relative fit between the obtained data and the proposed components of the model. Although the /2 for the models was significant, signalling a difference between the hypothesized and observed structures, this is often the case with large sample (Bentler & Bonett 1980). Thus, we used other recommended measures to determine the fit (Medsker, Williams & Holahan 1994). The fit indices that we have used in our study are GFI, AGFI and CFI.

* GFI, the Goodness of Fit Index varies from 0 to 1, but theoretically can yield meaningless negative values. By convention, GFI should be equal to or greater than .90 to accept the model.

* AGFI, the Adjusted Goodness of Fit Index is a variant of GFI which uses mean squares instead of total sums of squares in the numerator and denominator of 1-GFI. It, too, varies from 0 to 1, but theoretically can yield meaningless negative values. AGFI should also be at least .90.

* CFI is the comparative fit index, which varies from 0 to 1. CFI close to 1 indicates a very good fit, and values above .90 an acceptable fit.

Causal Relationship of Significant Models

The evaluation of causal relationship attempts to confirm the theoretical relationships among the model variables. The causal effect analysis of model variables aims at verifying if the causal effect among all model variables satisfies the anticipations of the research model. If the path coefficient does not reach the significant level (p< 0.05 and p<0.01), the proposed model does not satisfy our hypothesis. Table 2 shows the fit index of significant models. Now, we look at the causal relationship path diagram of all the significant models, given in Figure 1.

There are a few major trends that emerge from these results. To begin with, Sattwa Guna had negative influence on attitude towards both piracy and privacy, even though piracy is done purely for self interest, indicating that people high on this Guna are likely to have self regulatory mechanism to prevent both piracy and privacy intrusion. Dullness, on the other extreme predisposes individuals towards piracy for self, piracy for the organization and privacy intrusion for others. It shows maximum possible significant relationship.

Conclusion

In this paper our main objective was to find the linkage between attitude and intention to act for piracy and privacy intrusion as suggested by Fisbein and Ajzen (1975). Our results find full support with Fisbein and Ajzen's model, correlation analysis shows that there is a highly significant relationship between attitude and intention to act. This shows that if individuals perceive piracy and privacy intrusion as ethical they are likely to do it. Our next aim was to find out whether Gunas influence the attitude- intention linkage; for this we have conducted 15 structural equation modelling out of which 5 models find the full support alien with our hypothesis.

[FIGURE 1 OMITTED]

Sattwa is showing a negative significant relationship with attitude-intention linkage for both piracy and privacy intrusion situations. This shows that people high on Sattwa will perceive piracy and intrusion of privacy as unethical and they are not likely to indulge in this kind of activity. Sattwa is characterized by purity, security poise, calmness, altruism and contentment (Chakraborty 1985). The result is in line with our hypothesis.

Tamas is characterized by anger, greed, ignorance and brutality. In our study, Tamas is showing a positive significant path relationship with attitude and intention.

People high on Tamas are body and self-centric, they want to get the things easily and without effort. They always are likely to indulge in activities where they can satisfy their self interest.

Rajas is showing a positive significant relationship with attitude-intention linkage for piracy for organization and intrusion of privacy situation, where the individual is acting as an actor for the organization. Rajas thus predicts organizational need fulfilment. The characteristics of Rajas include love of fame, pride and display of power, which can be seen in modern day's managers (Chakraborty 1985). Rajas can be seen in individuals when they are doing something for organization. They are driven by need to succeed and hence are likely to do that to gain acceptance and credibility in the organization.

It is important to note that though the concept of Gunas is rooted in Indian ethical ideology, the description of the constructs is fairly universal. This assertion can be tested by conducting studies on different samples of respondents from different cultural/national backgrounds. Whatever small literature is available on the construct of Gunas, some probable relationships between the Gunas and other organizationally relevant variables are likely. Chakraborty (1985) suggested a relationship between Gunas and leadership. It has been argued that to be effective, it is necessary for a leader to develop an integrated personality which is possible by acquiring more and more Sattwa with a progressive diminution of Tamas, and an increasing discipline of Rajas.

References

Ajzen, I (1985), "From Intentions to Actions: A Theory of Planned Behavior" in J. Kuhul & J. Bechmann (Eds.), Action- control: From Cognition to Behavior. Heidelberg, Springer: 11- 39.

Ajzen, I (1988), Attitude, Personality and Behavior, Milton Keynes, UK, Open University Press.

Ajzen, I (1989), "Attitude Structure and Behavior", in A.R. Pratkanis, S.J. Breckler & A.G. Greenwald (Eds.), Attitude, Structure and Function, Lawrences Erlbaum Associates, Hillsdale, NJ: 241-74.

Ajzen, I (1991), "The Theory of Planned Behaviour", Organizational Behavior and Human Decision Processes, 50: 179- 211.

Ajzen, I & Fishbein, M (1980), Understanding Attitude and Predicting Social Behavior, Englewood Cliffs, NJ, Prentice- Hall.

Bentler, P.M & Bonett, D.G (1980), "Significance Tests and Goodness of Fit in the Analysis of Covariance Structures", Psychological Bulletin, 88: 588-606.

Beverly, K, Chatterjee, A& Lindquist A.R (2002), "Factors Related to the Cognitive Moral Development of Business Students and Business Professionals in India and the United States: Nationality Education, Sex and Gender", Journal of Business Ethics, 35: 255-69.

Bhal, Kanika. T & Debnath, Nivedita (2006), "Conceptualising and Measuring Gunas: Predictors of Workplace Ethics of Indian Professionals", International Journal of Cross Culture Management, 6 (2): 169- 88.

Chakraborty, S.K (1985), Human Response in Organizations: Towards the Indian Ethos, Calcutta: Vivekananda Nidhi.

Chakraborty, S.K (1987), Managerial Effectiveness and Quality of Work Life: Indian Insights, New Delhi: Tata McGraw Hill.

Christie, P.M.J, Kwon, LG, Stoeberl, P.A, & Baumbart, R (2003), "A Cross Culture Comparison of Ethical Attitudes of Business Managers: India, Korea and United States", Journal of Business Ethics, 46 (3): 263 -87.

Conner, R.K & Rumelt, P.R (1991), "Software Piracy: An Analysis of Protection Strategies", Management Science, 37 (2): 125-39.

Culnan, M.J & Milne, G.R (2001), "Culnan-Milne Survey on Consumers and Online Privacy Notices", Presented at the Interagency Workshop "Get Noticed," Washington, D.C., December.

Fishbein, M & Ajzen, 1(1975), Beliefs, Attitude, Intention and Behaviour: An Introduction to Theory and Research, Boston, MA: Addison- Wesley.

Fishbein, M (Ed.) (1967), Readings in Attitude Theory and Measurement, New York: John Wiley and Sons Inc.

Glass, R.S & Wood A.W (1996), "Situational Determinants of Software Piracy: An Equity Theory Perspective", Journal of Business Ethics, 15: 1189-98.

Gopal, D.R & Sander, L.G (1998), "International Software Piracy: Analysis of Key Issues and Impact," Information System Research, 9(4):380-398.

Green, K.C & Gilbert, SW (1987), "Software Piracy: Its Cost and Consequences", Change, Jan-Feb: 47-49.

Henderson, S.C & Snyder, A.C (1999), "Personal Information Privacy: Implication for MIS Managers", Information and Management, 36: 213-20.

Hiriyanna, M (1956), Essentials of Indian Philosophy, London: George Allen and Unwin.

Igbaria, M, Guimaraes, T & Davis, G.B (1995), "Testing the Determinants of Microcomputer Usage via a Structural Equation Model", Journal of Management Information System, 11(4): 87-114.

Kohlberg, L (1976), "Moralization: The Cognitive--Developmental Approach," in Likona Lin, T.C, Hsu, M.H. Kuo, F.Y. & Sun. P.C. (1999), An Intention Model Based Study of Software Piracy, Proceedings of the 32nd Hawaii International Conference on Systems Sciences: 1-10.

Kohlberg, L. (1976), "Moralization: The Cognitive--developmental Approach", In Likona T. (ed). Morality: Theory, research and social issues. New York: Holt, Rinehart & Winston.

Loch, K.D. & Conger, S (1996), "Evaluating Ethical Decision Making and Computer Use", Communication of the ACM, 39 (7): 74-83.

Loch, K.D, Conger, S & Oz, E (1998), "Ownership, Privacy and Monitoring in the Workplace: A Debate on Technology and Ethics", Journal of Business Ethics, 17: 653-63.

Mason, O. R (1986), "Four Ethical Issues of Information Age," MIS Quarterly, 10 (1): 4-12.

Medsker, GJ, Williams, L.J & Holahan, P.J (1994), "A Review of Current Practices for Evaluating Causal Models in Organizational Behaviour and Human Resources Management Research", Journal of Management, 20 :439 64.

Parent, W.A, (1983), "Privacy Morality and the Law", Philosophy and Public Affairs: 269-88.

Prislin, R. & Ouellette, J. A (1996), "When It Is Embedded, It Is Potent: Effects of General Attitude Embeddedness on Formation of Specific Attitudes and Behavioural Intentions", Personality and Social Psychology Bulletin, 22: 845-61

Radhakrishnan, S (1948),The Bhagavad-Gita, Great Britain: George Allen & Unwin Ltd.

Rosenberg, M.J (1956), "Cognitive Structure and Attitudinal Affect", Journal of Abnormal and Social Psychology, 22: 368-72.

Schultz, P. W & Oskamp, S (1996), "Effort as a Moderator of the Attitude-Behaviour Relationship: General Environmental Concern and Recycling," Social Psychology Quarterly, 59: 375-83.

Shore, B, Venkatachalam, A. R, Solorzane, E, Burn, M. J, Hussan, Z. S. & Janczewshi, J. L (2001), "Softlifting and Piracy: Behaviour across Culture", Technology in Society, 23: 563-81.

Soloman, S.L & LA O'Brien (1997), "The Effect of Demographic Factors on Attitudes towards Software Piracy", Journal of Computer Information Systems, 30 (3): 4046.

Straub, D. W & Collins, R. W (1990), "Key Information Liability Issues Facing Managers: Software Piracy, Proprietary Database and Individual Rights to Privacy", MIS Quarterly, 14: 143-56.

Taylor, S.G & Shim, LP (1993), "A Comparative Examination of Attitudes towards Software Piracy among Business Professors and Executives", Human Relations, 46(4): 419-33.

Thurstone, L.L (1931), "Measurement of Social Attitudes," Journal of Abnormal and Social Psychology, 26: 249-69.

Vitell, S. J & Davis, D. L (1990), "Ethical Beliefs of MIS Professionals: The Frequency and Opportunity for Unethical Behaviour", Journal of Business Ethics, 9: 63-70.

Worden, S (2003), "The Role of Religious and Nationalist Ethics in Strategic Leadership: The Case of J.N. Tata", Journal of Business Ethics, 47 (2):147-64.

Zajonc, A (1993), Catching the Light: The Entwined History of Light and Mind, Bantam Books.

Nivedita Debnath is Consultant (Strategy & Change) in IBM India Pvt Ltd. Kanika T. Bhal is Associate Professor in the Department of Management Studies, IIT (Delhi) 110016.
Table 1: Means, SDs, Correlations & Reliabilities
of the Study Variables.

Mean PES(1) LS(1) PES(2) LS(2) PEO(3)
(sd)

PES (1) 3.29
(1.16) .93
LS (1) 3.39
(1.08) .693 ** .88
PES (2) 3.50
(1.09) .650 ** .641 ** .92
LS (2) 3.47
(1.05) .604 ** .649 ** .746 ** .88
PEO (3) 3.08
(1.07) .301 ** .386 ** .367 ** .346 ** .89
LO (3) 3.02
(1.06) .260 ** .332 ** .279 ** .363 ** .636 **
PE (1) 3.74
(0.98) .307 ** .333 ** .303 ** .355 ** .194 **
L(1) 3.72
(0.90) .336 ** .365 ** .293 ** .344 ** .221 **
PE (2) 3.68
(1.00) .291 ** .323 ** .341 ** .343 ** .140 **
L(2) 3.72
(.894) .305 ** .336 ** .283 ** .350 ** .138 **
Sattwa 3.68
(.655) .004 .068 -.072 .085 .069
Tamas 2.65
(.743) .127 * .165 ** .099 .046 .115 *
Rajas 3.31
(.704) -.019 .061 .061 .096 .070

Mean LO(3) PE(1) L(1) PE(2) L(2)
(sd)

PES (1)
(1.16)
LS (1)
(1.08)
PES (2)
(1.09)
LS (2)
(1.05)
PEO (3)
(1.07)
LO (3)
(1.06) .87
PE (1)
(0.98) .240 ** .92
L(1)
(0.90) .267 ** .678 ** .85
PE (2)
(1.00) .196 ** .439 ** .460 ** .89
L(2)
(.894) .156 ** .404 ** .521 ** .684 ** .78
Sattwa
(.655) -.144 ** -.009 -.001 -.104 * -.092
Tamas
(.743) .185 ** .023 .018 .025 .028
Rajas
(.704) .078 .131 * .067 .066 .074

Mean Sattwa Tamas Rajas
(sd)

PES (1)
(1.16)
LS (1)
(1.08)
PES (2)
(1.09)
LS (2)
(1.05)
PEO (3)
(1.07)
LO (3)
(1.06)
PE (1)
(0.98)
L(1)
(0.90)
PE (2)
(1.00)
L(2)
(.894)
Sattwa
(.655) .55
Tamas
(.743) -.005 .81
Rajas
(.704) .063 .062 .74

Note: N = 379. Figure along the diagonal are reliability
coefficients (alpha). Abbreviation: PES (1), (2) and LS (1), (2) =
Perceived Ethicality and Likelihood of Piracy for Self (Situation 1
and 2); PEO (3) and LO (3) = Perceived Ethicality and Likelihood of
Piracy for Organization (Situation 3); PE (1), (2) and L (1), (2) =
Perceived Ethicality and Likelihood of Situation 1 and 2 of Privacy
Intrusion.

* Significant at .05% level

** Significant at .01% level

*** Significant at .001% level

Table 2: Assessing Model of Fitness (Piracy & Privacy Intrusion)

Gunas Fit Indices Goodness
 of Fit
 Index
 Situations (GIF) AGFI CFI

Sattwa Situation 1 piracy (self) .834 .503 .628
 Situation 2 Privacy Intrusion .849 .763 .789

Tamas Situation 1 piracy (self) .906 .719 .776
 Situation 1 piracy (self) .901 .732 .822
 Situation 2 piracy (org) .901 .704 .696

Rajas Situation 2 piracy (org) .885 .655 .623
 Situation 2 privacy intrusion .885 .656 .700
联系我们|关于我们|网站声明
国家哲学社会科学文献中心版权所有