{"id":"https://openalex.org/W4415870355","doi":"https://doi.org/10.1145/3757232.3757262","title":"Piracy in Perspective: Exploring Drivers of Digital Piracy Intention in Nigeria","display_name":"Piracy in Perspective: Exploring Drivers of Digital Piracy Intention in Nigeria","publication_year":2025,"publication_date":"2025-11-04","ids":{"openalex":"https://openalex.org/W4415870355","doi":"https://doi.org/10.1145/3757232.3757262"},"language":null,"primary_location":{"id":"doi:10.1145/3757232.3757262","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3757232.3757262","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Fifth Biennial African Human-Computer Interaction Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1145/3757232.3757262","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5067847917","display_name":"Oluwafemi Osho","orcid":"https://orcid.org/0000-0001-8406-9467"},"institutions":[{"id":"https://openalex.org/I8078737","display_name":"Clemson University","ror":"https://ror.org/037s24f05","country_code":"US","type":"education","lineage":["https://openalex.org/I8078737"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Oluwafemi Osho","raw_affiliation_strings":["Clemson University, Clemson, USA"],"affiliations":[{"raw_affiliation_string":"Clemson University, Clemson, USA","institution_ids":["https://openalex.org/I8078737"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5064968773","display_name":"Victor Yisa","orcid":"https://orcid.org/0000-0001-6606-7660"},"institutions":[{"id":"https://openalex.org/I129902397","display_name":"Dalhousie University","ror":"https://ror.org/01e6qks80","country_code":"CA","type":"education","lineage":["https://openalex.org/I129902397"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Victor Yisa","raw_affiliation_strings":["Dalhousie University, Halifax, Canada"],"affiliations":[{"raw_affiliation_string":"Dalhousie University, Halifax, Canada","institution_ids":["https://openalex.org/I129902397"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5064669839","display_name":"Polra Victor Falade","orcid":"https://orcid.org/0000-0003-2457-5020"},"institutions":[{"id":"https://openalex.org/I33783412","display_name":"Nigerian Defence Academy","ror":"https://ror.org/02nt7a109","country_code":"NG","type":"education","lineage":["https://openalex.org/I33783412"]}],"countries":["NG"],"is_corresponding":false,"raw_author_name":"Polra Victor Falade","raw_affiliation_strings":["Nigerian Defence Academy, Kaduna, Nigeria"],"affiliations":[{"raw_affiliation_string":"Nigerian Defence Academy, Kaduna, Nigeria","institution_ids":["https://openalex.org/I33783412"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5112654717","display_name":"Andi Jaya Wardanah Yusuf","orcid":"https://orcid.org/0009-0000-3799-0659"},"institutions":[{"id":"https://openalex.org/I4210159381","display_name":"Celator Pharmaceuticals (Canada)","ror":"https://ror.org/04ahd9r49","country_code":"CA","type":"company","lineage":["https://openalex.org/I4210159381"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Augustine Yusuf","raw_affiliation_strings":["Celero Solutions, Calgary, Canada"],"affiliations":[{"raw_affiliation_string":"Celero Solutions, Calgary, Canada","institution_ids":["https://openalex.org/I4210159381"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5051374958","display_name":"Solomon Adelowo Adepoju","orcid":"https://orcid.org/0000-0002-1128-4753"},"institutions":[{"id":"https://openalex.org/I76661892","display_name":"Federal University of Technology Minna","ror":"https://ror.org/0568y3j03","country_code":"NG","type":"education","lineage":["https://openalex.org/I76661892"]}],"countries":["NG"],"is_corresponding":false,"raw_author_name":"Solomon Adepoju","raw_affiliation_strings":["Federal University of Technology, Minna, Nigeria"],"affiliations":[{"raw_affiliation_string":"Federal University of Technology, Minna, Nigeria","institution_ids":["https://openalex.org/I76661892"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5034768623","display_name":"Rita Orji","orcid":"https://orcid.org/0000-0001-6152-8034"},"institutions":[{"id":"https://openalex.org/I129902397","display_name":"Dalhousie University","ror":"https://ror.org/01e6qks80","country_code":"CA","type":"education","lineage":["https://openalex.org/I129902397"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Rita Orji","raw_affiliation_strings":["Dalhousie University, Halifax, Canada"],"affiliations":[{"raw_affiliation_string":"Dalhousie University, Halifax, Canada","institution_ids":["https://openalex.org/I129902397"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5067847917"],"corresponding_institution_ids":["https://openalex.org/I8078737"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.43294204,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"301","last_page":"310"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11769","display_name":"Copyright and Intellectual Property","score":0.8190000057220459,"subfield":{"id":"https://openalex.org/subfields/1406","display_name":"Marketing"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T11769","display_name":"Copyright and Intellectual Property","score":0.8190000057220459,"subfield":{"id":"https://openalex.org/subfields/1406","display_name":"Marketing"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T13867","display_name":"Economic Growth and Development","score":0.06750000268220901,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.009399999864399433,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.5845999717712402},{"id":"https://openalex.org/keywords/moral-obligation","display_name":"Moral obligation","score":0.5740000009536743},{"id":"https://openalex.org/keywords/deterrence-theory","display_name":"Deterrence theory","score":0.5260999798774719},{"id":"https://openalex.org/keywords/structural-equation-modeling","display_name":"Structural equation modeling","score":0.5037999749183655},{"id":"https://openalex.org/keywords/obligation","display_name":"Obligation","score":0.4546999931335449},{"id":"https://openalex.org/keywords/developing-country","display_name":"Developing country","score":0.3702000081539154},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.3528999984264374}],"concepts":[{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.5845999717712402},{"id":"https://openalex.org/C2777107957","wikidata":"https://www.wikidata.org/wiki/Q2648051","display_name":"Moral obligation","level":2,"score":0.5740000009536743},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.5295000076293945},{"id":"https://openalex.org/C60643870","wikidata":"https://www.wikidata.org/wiki/Q1949683","display_name":"Deterrence theory","level":2,"score":0.5260999798774719},{"id":"https://openalex.org/C71104824","wikidata":"https://www.wikidata.org/wiki/Q1476639","display_name":"Structural equation modeling","level":2,"score":0.5037999749183655},{"id":"https://openalex.org/C2778447849","wikidata":"https://www.wikidata.org/wiki/Q2648051","display_name":"Obligation","level":2,"score":0.4546999931335449},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.45089998841285706},{"id":"https://openalex.org/C39549134","wikidata":"https://www.wikidata.org/wiki/Q133080","display_name":"Public relations","level":1,"score":0.3995000123977661},{"id":"https://openalex.org/C83864248","wikidata":"https://www.wikidata.org/wiki/Q177323","display_name":"Developing country","level":2,"score":0.3702000081539154},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.3528999984264374},{"id":"https://openalex.org/C2780982575","wikidata":"https://www.wikidata.org/wiki/Q332142","display_name":"Deterrence (psychology)","level":2,"score":0.3521000146865845},{"id":"https://openalex.org/C2776185967","wikidata":"https://www.wikidata.org/wiki/Q112945","display_name":"Technology acceptance model","level":3,"score":0.3393000066280365},{"id":"https://openalex.org/C198477413","wikidata":"https://www.wikidata.org/wiki/Q7647069","display_name":"Survey data collection","level":2,"score":0.3352999985218048},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.29829999804496765},{"id":"https://openalex.org/C121087249","wikidata":"https://www.wikidata.org/wiki/Q546395","display_name":"Emerging markets","level":2,"score":0.2863999903202057},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.2806999981403351},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.27129998803138733},{"id":"https://openalex.org/C112698675","wikidata":"https://www.wikidata.org/wiki/Q37038","display_name":"Advertising","level":1,"score":0.26589998602867126},{"id":"https://openalex.org/C89785696","wikidata":"https://www.wikidata.org/wiki/Q2290753","display_name":"Theory of planned behavior","level":3,"score":0.2621999979019165},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.2597000002861023},{"id":"https://openalex.org/C123269153","wikidata":"https://www.wikidata.org/wiki/Q1897038","display_name":"Theory of reasoned action","level":2,"score":0.2556999921798706},{"id":"https://openalex.org/C17632256","wikidata":"https://www.wikidata.org/wiki/Q1076968","display_name":"Digital media","level":2,"score":0.2531999945640564},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.25119999051094055}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3757232.3757262","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3757232.3757262","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Fifth Biennial African Human-Computer Interaction Conference","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3757232.3757262","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3757232.3757262","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Fifth Biennial African Human-Computer Interaction Conference","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":40,"referenced_works":["https://openalex.org/W1496783311","https://openalex.org/W1591013228","https://openalex.org/W1607916742","https://openalex.org/W1978200200","https://openalex.org/W1997522411","https://openalex.org/W2081973090","https://openalex.org/W2097827892","https://openalex.org/W2099697766","https://openalex.org/W2100379340","https://openalex.org/W2111051912","https://openalex.org/W2118016181","https://openalex.org/W2138273524","https://openalex.org/W2144473041","https://openalex.org/W2157480092","https://openalex.org/W2503387234","https://openalex.org/W2554603492","https://openalex.org/W2580118294","https://openalex.org/W2587822182","https://openalex.org/W2789522919","https://openalex.org/W2898367167","https://openalex.org/W2905811773","https://openalex.org/W2942745531","https://openalex.org/W2952265677","https://openalex.org/W2977552036","https://openalex.org/W3036668067","https://openalex.org/W3042628696","https://openalex.org/W3081599431","https://openalex.org/W3093137467","https://openalex.org/W3120729413","https://openalex.org/W3122877168","https://openalex.org/W3125365482","https://openalex.org/W3153408212","https://openalex.org/W4211160265","https://openalex.org/W4235678817","https://openalex.org/W4281572758","https://openalex.org/W4285551567","https://openalex.org/W4385482180","https://openalex.org/W4386292838","https://openalex.org/W4396943213","https://openalex.org/W4401805389"],"related_works":[],"abstract_inverted_index":{"Given":[0],"the":[1,18,46,116],"global":[2],"proliferation":[3],"of":[4,92,119],"digital":[5,28,54],"piracy":[6,29,80],"and":[7,12,64,67,85,96],"its":[8],"persistence":[9],"despite":[10],"legal":[11,97],"technological":[13],"measures,":[14],"our":[15],"research":[16],"addresses":[17],"gap":[19],"in":[20,31,36,53],"understanding":[21],"how":[22],"psychological,":[23],"behavioral,":[24],"ethical":[25],"factors":[26,47],"influence":[27,49],"behavior":[30],"a":[32],"non-WEIRD":[33,120],"context,":[34],"specifically":[35],"Nigeria.":[37],"Using":[38],"an":[39],"integrated":[40],"model":[41],"approach,":[42],"this":[43],"study":[44],"examines":[45],"that":[48,76],"intention":[50],"to":[51,115],"engage":[52],"piracy.":[55],"Data":[56],"was":[57],"collected":[58],"from":[59],"276":[60],"participants":[61],"via":[62],"online":[63],"paper-based":[65],"surveys":[66],"analyzed":[68],"using":[69],"structural":[70],"equation":[71],"modeling.":[72],"The":[73,90],"findings":[74],"show":[75],"moral":[77],"obligation":[78],"decreases":[79],"intention,":[81],"while":[82],"favorable":[83],"attitudes":[84],"perceived":[86,93],"benefits":[87],"increase":[88],"it.":[89],"effects":[91],"equitable":[94],"relationship":[95],"deterrence":[98],"are":[99,106],"fully":[100],"mediated":[101],"by":[102],"attitude.":[103],"These":[104],"insights":[105],"crucial":[107],"for":[108],"developing":[109],"more":[110],"effective":[111],"anti-piracy":[112],"strategies":[113],"tailored":[114],"specific":[117],"context":[118],"countries.":[121]},"counts_by_year":[],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-11-04T00:00:00"}
