Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
article

Research Note---Applying the Randomized Response Technique to Elicit Truthful Responses to Sensitive Questions in IS Research: The Case of Software Piracy Behavior

Published: 01 December 2010 Publication History

Abstract

Research on software piracy often relies on self-reports by individual users and thus suffers from possible response distortion attributable to a variety of human motivations. Conclusions drawn directly from distorted self-reports may misguide managerial and policy decisions. The randomized response technique (RRT) was proposed as a remedy to response distortion. In this paper, a model based on RRT was used to illustrate how truthful responses to sensitive questions can be empirically estimated. The model was tested in two empirical studies on software piracy. Consistent with our expectations, respondents responding to RRT were more willing to disclose sensitive information about their attitudes, intentions, and behaviors on software piracy. Nontrivial distortions were demonstrated in causal relationships involving sensitive and nonsensitive variables. The study extends RRT to multivariate analysis and illustrates the feasibility and usefulness of the method in studying sensitive behavioral issues in the information systems (IS) domain.

References

[1]
Armacost, R. L., Hosseini, J. C., Morris, S. A. and Rehbein, K. A., "An empirical comparison of direct questioning, scenario, and randomized response methods for obtaining sensitive business information," Decision Sci., v22, pp. 1073-1090, 1991.
[2]
Bagozzi, R. P. and Yi, Y., "On the evaluation of structural equation models," J. Acad. Marketing Sci., v16, pp. 74-94, 1988.
[3]
Browne, M. W., Cudeck, R., Bollen, K. A. and Long, J. S., "Alternative ways of assessing model fit," Testing Structural Equation Models, Sage Publishing, Newbury Park, CA, pp. 136-162, 1993.
[4]
5th Annual BSA and IDC Global Software Piracy Study, 2007.
[5]
Cheng, H. K., Sims, R. R. and Teegen, H., "To purchase or to pirate software: An empirical study," J. Management Inform. Systems, v13, pp. 49-60, 1997.
[6]
Christensen, A. L. and Eining, V., "Factors influencing software piracy: Implications for accountants," J. Inform. Systems, v5, pp. 67-80, 1991.
[7]
Cohen, J., Statistical Power Analysis for the Behavioral Sciences, Lawrence Erlbaum Associates, Hillsdale, NJ, 1988.
[8]
Diamantopoulos, A. and Siguaw, J. A., Introducing LISREL, Sage Publications, Newbury Park, CA, 2000.
[9]
Fox, J. A. and Tracy, P. E., "Measuring associations with randomized response," Soc. Sci. Res., v13, pp. 188-197, 1984.
[10]
Fox, J. A. and Tracy, P. E., Randomized Response: A Method for Sensitive Surveys, Sage Publications, Newbury Park, CA, 1986.
[11]
Gefen, D., Straub, D. W. and Boudreau, M. C., "Structural equation modeling and regression: Guidelines for research practice," Comm. Assoc. Inform. Systems, v4, 2000.
[12]
Greenberg, B. G., Abul-Ela, A. A., Simmons, W. R. and Horvitz, D. G., "The unrelated question randomized response model: Theoretical framework," J. Amer. Statist. Assoc., v64, pp. 520-539, 1969.
[13]
Greenberg, B. G., Kuebler, R. R., Abernathy, J. R. and Horvitz, D. G., "Application of the randomized response technique in obtaining quantitative data," J. Amer. Statist. Assoc., v66, pp. 243-250, 1971.
[14]
Himmelfarb, S., Eagly, A. H. and Chaiken, S., "The measurement of attitudes," The Psychology of Attitudes, Wadsworth Publishing, Florence, KY, pp. 23-87, 1993.
[15]
Himmelfarb, S. and Lickteig, C., "Social desirability and the randomized response technique," J. Personality Soc. Psych., v43, pp. 710-717, 1982.
[16]
Hosseini, J. C. and Armacost, R. L., "Gathering sensitive information in organizations," Amer. Behavioral Scientist, v36, pp. 443-471, 1993.
[17]
Hu, L. T. and Bentler, P. M., "Cutoff criteria for fit indexes in covariance structure analysis: Conventional criteria versus new alternatives," Structural Equation Model, v6, pp. 1-55, 1999.
[18]
Lensvelt-Mulders, G. J. L. M., Hox, J. J., van der Heijden, P. G. M. and Maas, C. J. M., "Meta-analysis of randomized response research: Thirty-five years of validation," Sociol. Methods Res., v33, pp. 319-348, 2005.
[19]
Limayem, M., Khalifa, M. and Chin, W. W., "Factors motivating software piracy: A longitudinal study," IEEE Trans. Engrg. Management, v50, pp. 414-425, 2004.
[20]
Locander, W., Sudman, S. and Blackburn, N., "An investigation of interview method, threat and response distortion," J. Amer. Statist. Assoc., v71, pp. 269-275, 1976.
[21]
MacCallum, R. C., Browne, M. W. and Sugawara, H. M., "Power analysis and determination of sample size for covariance structure modeling," Psych. Methods, v1, pp. 130-149, 1996.
[22]
Mason, R. O., "Four ethical issues of the information age," MIS Quart., v10, pp. 5-12, 1986.
[23]
Moores, T. and Chang, J., "Ethical decision making in software piracy: Initial development and test of a four-component model," MIS Quart., v30, pp. 167-180, 2006.
[24]
Paulhus, D. L., Robinson, J. P., Shaver, P. R. and Wrightsman, L. S., "Measurement and control of response bias," Measures of Personality and Social Psychological Attitudes, Academic Press, San Diego, pp. 17-59, 1991.
[25]
Peace, A. G., Galletta, D. F. and Thong, J. Y. L., "Software piracy in the workplace: A model and empirical test," J. Management Inform. Systems, v20, pp. 153-177, 2003.
[26]
Podsakoff, P. M., MacKenzie, S. B., Lee, J. Y. and Podsakoff, N. P., "Common method biases in behavioral research: A critical review of the literature and recommended remedies," J. Appl. Psych., v88, pp. 879-903, 2003.
[27]
Scheers, N. J., "A review of randomized response techniques," Measurement Eval. Counseling Development, v25, pp. 27-41, 1992.
[28]
Seale, D. A. and Salehnia, A., "Why do we do it if we know it's wrong? A structural model of software piracy," Ethical Issues of Information Systems, IRM Press, Hershey, PA, pp. 120-144, 2002.
[29]
Sims, R. R., Cheng, H. K. and Teegen, H., "Toward a profile of student software piraters," J. Bus. Ethics, v15, pp. 839-849, 1996.
[30]
Steiger, J. H., Shapiro, A. and Browne, M. W., "On the multivariate asymptotic distribution of sequential chi-square statistics," Psychometrika, v50, pp. 253-263, 1985.
[31]
Sudman, S. and Bradburn, N. M., Asking Questions: A Practical Guide to Questionnaire Design, Jossey-Bass, San Francisco, 1982.
[32]
Taylor, G. S. and Shim, J. P., "A comparative examination of attitudes toward software piracy among business professors and executives," Human Relations, v46, pp. 419-433, 1993.
[33]
Umesh, U. N. and Peterson, R. A., "A critical evaluation of the randomized response method: Applications, validation, and research agenda," Sociol. Methods Res., v20, pp. 104-138, 1991.
[34]
van der Heijden, P. G. M., van Gils, G., Bouts, J. and Hox, J. J., "A comparison of randomized response, computer-assisted self-interview, and face-to-face direct questioning: Eliciting sensitive information in the context of welfare and unemployment benefit," Sociol. Methods Res., v28, pp. 505-537, 2000.
[35]
Warner, S. L., "Randomized response: A survey technique for eliminating evasive answer bias," J. Amer. Statist. Assoc., v60, pp. 63-69, 1965.
[36]
Wothke, W., Bollen, K. A. and Long, J. S., "Nonpositive definite matrices in structural modeling," Testing Structural Equation Models, Sage Publications, Newbury Park, CA, pp. 256-293, 1993.

Cited By

View all
  • (2015)Differential effects of social influence sources on self-reported music piracyDecision Support Systems10.1016/j.dss.2014.11.00769:C(70-81)Online publication date: 1-Jan-2015
  • (2014)Development and validation of instruments of information security deviant behaviorDecision Support Systems10.1016/j.dss.2014.06.00866:C(93-101)Online publication date: 1-Oct-2014

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Information Systems Research
Information Systems Research  Volume 21, Issue 4
December 2010
350 pages

Publisher

INFORMS

Linthicum, MD, United States

Publication History

Published: 01 December 2010
Received: 15 November 2006

Author Tags

  1. method of moments
  2. randomized response technique
  3. response distortion
  4. socially desirable responding
  5. software piracy
  6. structural equation modeling
  7. unrelated question design

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 14 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2015)Differential effects of social influence sources on self-reported music piracyDecision Support Systems10.1016/j.dss.2014.11.00769:C(70-81)Online publication date: 1-Jan-2015
  • (2014)Development and validation of instruments of information security deviant behaviorDecision Support Systems10.1016/j.dss.2014.06.00866:C(93-101)Online publication date: 1-Oct-2014

View Options

View options

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media