{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,4]],"date-time":"2025-11-04T13:53:56Z","timestamp":1762264436521,"version":"build-2065373602"},"publisher-location":"New York, NY, USA","reference-count":54,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,11,4]]},"DOI":"10.1145\/3757232.3757262","type":"proceedings-article","created":{"date-parts":[[2025,11,4]],"date-time":"2025-11-04T12:13:01Z","timestamp":1762258381000},"page":"301-310","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Piracy in Perspective: Exploring Drivers of Digital Piracy Intention in Nigeria"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8406-9467","authenticated-orcid":false,"given":"Oluwafemi","family":"Osho","sequence":"first","affiliation":[{"name":"Clemson University, Clemson, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6606-7660","authenticated-orcid":false,"given":"Victor","family":"Yisa","sequence":"additional","affiliation":[{"name":"Dalhousie University, Halifax, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2457-5020","authenticated-orcid":false,"given":"Polra Victor","family":"Falade","sequence":"additional","affiliation":[{"name":"Nigerian Defence Academy, Kaduna, Nigeria"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-3799-0659","authenticated-orcid":false,"given":"Augustine","family":"Yusuf","sequence":"additional","affiliation":[{"name":"Celero Solutions, Calgary, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1128-4753","authenticated-orcid":false,"given":"Solomon","family":"Adepoju","sequence":"additional","affiliation":[{"name":"Federal University of Technology, Minna, Nigeria"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6152-8034","authenticated-orcid":false,"given":"Rita","family":"Orji","sequence":"additional","affiliation":[{"name":"Dalhousie University, Halifax, Canada"}]}],"member":"320","published-online":{"date-parts":[[2025,11,4]]},"reference":[{"key":"e_1_3_3_2_2_2","first-page":"155","volume-title":"Human Settlement Planning in Nigeria: A Festschrift in Honour of Professor Waheed Bolanle Wahab","author":"Adejube Samuel\u00a0A.","year":"2024","unstructured":"Samuel\u00a0A. Adejube, Kayode\u00a0M. Samuel, and Duro\u00a0A. Adeleke. 2024. Entertainment Modes in Nigerian Settlement: Past, Present and Future. In Human Settlement Planning in Nigeria: A Festschrift in Honour of Professor Waheed Bolanle Wahab, U.\u00a0J. Jimoh, O.\u00a0Ipingbemi, and S.\u00a0A. Adejumo (Eds.). Department of Urban and Regional Planning, Faculty of Environmental Design and Management, University of Ibadan, Ibadan, Nigeria, Chapter\u00a08, 155\u2013174."},{"key":"e_1_3_3_2_3_2","unstructured":"O.\u00a0T. Afolayan. 2021. Piracy and the Nigerian Copyright Law: A Re-Appraisal. Library Philosophy and Practice (2021) 1\u201321."},{"key":"e_1_3_3_2_4_2","doi-asserted-by":"publisher","unstructured":"Ayi Ahadiat Albet\u00a0Albet Maydiantoro and F. Kesumah. 2021. The Theory of Planned Behavior and Marketing Ethics Theory in Predicting Digital Piracy Intentions. 18 (2021) 679\u2013702. 10.37394\/23207.2021.18.68","DOI":"10.37394\/23207.2021.18.68"},{"key":"e_1_3_3_2_5_2","doi-asserted-by":"crossref","unstructured":"Icek Ajzen. 1991. The Theory of planned behavior. Organizational Behavior and Human Decision Processes 50 (1991) 179\u2013211.","DOI":"10.1016\/0749-5978(91)90020-T"},{"key":"e_1_3_3_2_6_2","doi-asserted-by":"publisher","unstructured":"L. Amodu C. Isiguzoro O. Omojola B. Adeyeye and L. Ajakaiye. 2020. Assessing audience\u2019s willingness to curb digital piracy: A gender perspective. Cogent Social Sciences 6 1 (2020) 1\u201314. 10.1080\/23311886.2020.1823602","DOI":"10.1080\/23311886.2020.1823602"},{"key":"e_1_3_3_2_7_2","doi-asserted-by":"publisher","unstructured":"D.\u00a0R. Andembubto J.\u00a0I. Apuru and S.\u00a0D. Ezra. 2020. Software Piracy in Nigeria. Asian Journal of Research in Computer Science 6 1 (2020) 1\u201313. 10.9734\/AJRCOS\/2020\/v6i130148","DOI":"10.9734\/AJRCOS\/2020\/v6i130148"},{"key":"e_1_3_3_2_8_2","doi-asserted-by":"crossref","unstructured":"Richard\u00a0P Bagozzi and Youjae Yi. 1988. On the evaluation of structural equation models. Journal of the academy of marketing science 16 (1988) 74\u201394.","DOI":"10.1177\/009207038801600107"},{"key":"e_1_3_3_2_9_2","doi-asserted-by":"publisher","unstructured":"George\u00a0C. Banks Deirdre\u00a0J. Knapp Li Lin Chanda\u00a0S. Sanders and James\u00a0A. Grand. 2022. Ethical decision making in the 21st century: A useful framework for industrial-organizational psychologists. Industrial and Organizational Psychology 15 2 (2022) 220\u2013235. 10.1017\/iop.2021.143","DOI":"10.1017\/iop.2021.143"},{"key":"e_1_3_3_2_10_2","doi-asserted-by":"publisher","unstructured":"Francesco\u00a0La Barbera and I. Ajzen. 2020. Control Interactions in the Theory of Planned Behavior: Rethinking the Role of Subjective Norm. Europe\u2019s Journal of Psychology 16 (2020) 401 \u2013 417. 10.5964\/ejop.v16i3.2056","DOI":"10.5964\/ejop.v16i3.2056"},{"key":"e_1_3_3_2_11_2","doi-asserted-by":"publisher","unstructured":"Ricky Y.\u00a0K. Chan Katherine H.\u00a0Y. Ma and Y. Wong. 2013. The Software Piracy Decision-Making Process of Chinese Computer Users. The Information Society 29 (2013) 203 \u2013 218. 10.1080\/01972243.2013.792302","DOI":"10.1080\/01972243.2013.792302"},{"key":"e_1_3_3_2_12_2","doi-asserted-by":"crossref","unstructured":"Timothy\u00a0Paul Cronan and Sulaiman Al-Rafee. 2008. Factors that influence the intention to pirate software and media. Journal of business ethics 78 (2008) 527\u2013545.","DOI":"10.1007\/s10551-007-9366-8"},{"key":"e_1_3_3_2_13_2","doi-asserted-by":"publisher","unstructured":"Debabrata Dey Antino Kim and Atanu Lahiri. 2019. Online Piracy and the \"Longer Arm\" of Enforcement. Manag. Sci. 65 (2019) 1173\u20131190. 10.1287\/mnsc.2017.2984","DOI":"10.1287\/mnsc.2017.2984"},{"key":"e_1_3_3_2_14_2","doi-asserted-by":"crossref","unstructured":"Martin Eisend. 2019. Explaining digital piracy: A meta-analysis. Information Systems Research 30 2 (2019) 636\u2013664.","DOI":"10.1287\/isre.2018.0821"},{"key":"e_1_3_3_2_15_2","doi-asserted-by":"publisher","unstructured":"O.\u00a0F.\u00a0A. Enujiugha. 2020. Piracy and its burden on copyright in Nigeria: Challenges and solutions. J World Intellect Prop. (2020) 1\u201317. 10.1111\/jwip.12158","DOI":"10.1111\/jwip.12158"},{"key":"e_1_3_3_2_16_2","unstructured":"Martin Fishbein. 1975. Intention and behavior: An introduction to theory and research. Reading\/Addison-Wesley Pub. Co (1975)."},{"key":"e_1_3_3_2_17_2","doi-asserted-by":"crossref","unstructured":"Claes Fornell and David\u00a0F Larcker. 1981. Evaluating structural equation models with unobservable variables and measurement error. Journal of marketing research 18 1 (1981) 39\u201350.","DOI":"10.1177\/002224378101800104"},{"key":"e_1_3_3_2_18_2","doi-asserted-by":"crossref","unstructured":"David Gefen and Detmar Straub. 2005. A practical guide to factorial validity using PLS-Graph: Tutorial and annotated example. Communications of the Association for Information systems 16 1 (2005) 5.","DOI":"10.17705\/1CAIS.01605"},{"key":"e_1_3_3_2_19_2","doi-asserted-by":"publisher","unstructured":"R. Gopal and G. Sanders. 1998. International Software Piracy: Analysis of Key Issues and Impacts. Inf. Syst. Res. 9 (1998) 380\u2013397. 10.1287\/ISRE.9.4.380","DOI":"10.1287\/ISRE.9.4.380"},{"key":"e_1_3_3_2_20_2","doi-asserted-by":"publisher","unstructured":"M. Hagger M. Cheung I. Ajzen and K. Hamilton. 2022. Perceived behavioral control moderating effects in the theory of planned behavior: A meta-analysis. Health psychology : official journal of the Division of Health Psychology American Psychological Association (2022). 10.1037\/hea0001153","DOI":"10.1037\/hea0001153"},{"key":"e_1_3_3_2_21_2","doi-asserted-by":"crossref","unstructured":"Joseph\u00a0F Hair Jeffrey\u00a0J Risher Marko Sarstedt and Christian\u00a0M Ringle. 2019. When to use and how to report the results of PLS-SEM. European business review 31 1 (2019) 2\u201324.","DOI":"10.1108\/EBR-11-2018-0203"},{"key":"e_1_3_3_2_22_2","doi-asserted-by":"crossref","unstructured":"Joe\u00a0F Hair\u00a0Jr Marko Sarstedt Lucas Hopkins and Volker\u00a0G Kuppelwieser. 2014. Partial least squares structural equation modeling (PLS-SEM): An emerging tool in business research. European business review 26 2 (2014) 106\u2013121.","DOI":"10.1108\/EBR-10-2013-0128"},{"key":"e_1_3_3_2_23_2","doi-asserted-by":"publisher","unstructured":"E. Hatfield M. Salmon and R.L. Rapson. 2011. Equity theory and social justice. Journal of Management Spirituality & Religion 8 (2011) 101\u2013121. 10.1080\/14766086.2011.581818","DOI":"10.1080\/14766086.2011.581818"},{"key":"e_1_3_3_2_24_2","doi-asserted-by":"publisher","unstructured":"S. Hati Rahma Fitriasih and Anya Safira. 2019. E-textbook piracy behavior. J. Inf. Commun. Ethics Soc. 18 (2019) 105\u2013123. 10.1108\/JICES-11-2018-0081","DOI":"10.1108\/JICES-11-2018-0081"},{"key":"e_1_3_3_2_25_2","doi-asserted-by":"publisher","DOI":"10.1108\/S1474-7979(2009)0000020014"},{"key":"e_1_3_3_2_26_2","doi-asserted-by":"crossref","unstructured":"Ikenna\u00a0U Ibe and Noel\u00a0N Udeoji. 2019. The Challenges and Prospects of Nigeria Copyright Administration in a Digital Artificial Intelligence Age. ABUAD Private and Business Law Journal 3 1 (2019) 110\u2013132.","DOI":"10.53982\/apblj.2019.0301.06-j"},{"key":"e_1_3_3_2_27_2","unstructured":"N. Itanyi. 2022. The Concept of Piracy in the Film Industry in Nigeria: Taking a Cue from Other Countries. European Journal of Law and Technology 13 1 (2022)."},{"key":"e_1_3_3_2_28_2","doi-asserted-by":"publisher","unstructured":"Sunday Jattu. 2021. A Review of Intellectual Property Rights in Nigeria: Online Piracy and the Legal Panacea. 10.2139\/ssrn.4110490Accessed January 28 2025.","DOI":"10.2139\/ssrn.4110490"},{"key":"e_1_3_3_2_29_2","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2002.994187"},{"key":"e_1_3_3_2_30_2","doi-asserted-by":"publisher","unstructured":"Byung Lee S. Paek and Roy Fenoff. 2018. Factors associated with digital piracy among early adolescents. Children and Youth Services Review 86 (2018) 287\u2013295. 10.1016\/J.CHILDYOUTH.2018.02.002","DOI":"10.1016\/J.CHILDYOUTH.2018.02.002"},{"key":"e_1_3_3_2_31_2","doi-asserted-by":"crossref","unstructured":"Paul\u00a0Benjamin Lowry Jun Zhang and Tailai Wu. 2017. Nature or nurture? A meta-analysis of the factors that maximize the prediction of digital piracy by using social cognitive theory as a framework. Computers in Human Behavior 68 (2017) 104\u2013120.","DOI":"10.1016\/j.chb.2016.11.015"},{"key":"e_1_3_3_2_32_2","doi-asserted-by":"publisher","unstructured":"Heungki Min and Y. Jeon. 2023. Pros and Cons of Deterrence Theory. Korean Association of Public Safety and Criminal Justice (2023). 10.21181\/kjpc.2023.32.2.375","DOI":"10.21181\/kjpc.2023.32.2.375"},{"key":"e_1_3_3_2_33_2","doi-asserted-by":"crossref","unstructured":"Armin Monecke and Friedrich Leisch. 2012. semPLS: structural equation modeling using partial least squares. Journal of statistical software 48 (2012) 1\u201332.","DOI":"10.18637\/jss.v048.i03"},{"key":"e_1_3_3_2_34_2","unstructured":"S.\u00a0N. Nnamani. 2016. Effects of Music Piracy on the Nigerian Public: A Case Study of Enugu Urban. Journal of Educational Studies 2 3 (2016) 35\u201340."},{"key":"e_1_3_3_2_35_2","unstructured":"Mary Imelda\u00a0Obianuju Nwogu. 2015. Copyright law and the menace of piracy in Nigeria. JL Pol\u2019y & Globalization 34 (2015) 113."},{"key":"e_1_3_3_2_36_2","unstructured":"O.\u00a0M. Nwogu. 2022. The protection of digital works under the Nigerian copyright law. International Journal of Civil Law and Legal Research 2 1 (2022) 80\u201384."},{"key":"e_1_3_3_2_37_2","doi-asserted-by":"crossref","unstructured":"Tiago Oliveira Matilde Alhinho Paulo Rita and Gurpreet Dhillon. 2017. Modelling and testing consumer trust dimensions in e-commerce. Computers in Human Behavior 71 (2017) 153\u2013164.","DOI":"10.1016\/j.chb.2017.01.050"},{"key":"e_1_3_3_2_38_2","unstructured":"A.\u00a0U. Omiagbo J.\u00a0K. Opele and O.\u00a0K. Adebayo. 2020. Assessing the causes of piracy among practitioners in Nigeria. Journal of Pedagogical Thought (2020) 189\u2013199."},{"key":"e_1_3_3_2_39_2","doi-asserted-by":"crossref","unstructured":"Oluwafemi Osho and Benjamin\u00a0MO Eneche. 2018. Market Dealers or Perpetrators of Cybercrimes? Investigating Cybercriminal Activities in Information Technology Markets in Nigeria. i-Manager\u2019s Journal on Information Technology 8 1 (2018) 11\u201319.","DOI":"10.26634\/jit.8.1.15715"},{"key":"e_1_3_3_2_40_2","unstructured":"R. Oveh F. Imala and M. Atenaga. 2018. Software Piracy Perception and Framework: The Case of Nigeria. Computing Information Systems Development and Allied Research Journals 9 1 (2018) 111\u2013115."},{"key":"e_1_3_3_2_41_2","unstructured":"Abiola\u00a0Oluwaseunfunmi OYEWO. 2022. Digital media and Copyright Protection Laws in Nigeria: A Complementary Approach. Owena Journal of Library and Information Science 9 1 (2022)."},{"key":"e_1_3_3_2_42_2","doi-asserted-by":"publisher","unstructured":"Quoc\u00a0Trung Pham N.\u00a0M. Dang and Duc\u00a0Trung Nguyen. 2020. Factors Affecting on the Digital Piracy Behavior: An Empirical Study in Vietnam. J. Theor. Appl. Electron. Commer. Res. 15 (2020). 10.4067\/s0718-18762020000200108","DOI":"10.4067\/s0718-18762020000200108"},{"key":"e_1_3_3_2_43_2","volume-title":"SmartPLS 4","author":"Ringle Christian\u00a0M.","year":"2024","unstructured":"Christian\u00a0M. Ringle, Sven Wende, and Jan-Michael Becker. 2024. SmartPLS 4. SmartPLS, B\u00f6nningstedt. https:\/\/www.smartpls.com\/"},{"key":"e_1_3_3_2_44_2","doi-asserted-by":"crossref","unstructured":"Godwin\u00a0Iretomiwa Simon. 2024. \u2018They are now pocket videos not home videos\u2019: Streaming and reconfiguration of video consumption in Nigeria. International Journal of Cultural Studies 27 1 (2024) 82\u201398.","DOI":"10.1177\/13678779231197697"},{"key":"e_1_3_3_2_45_2","doi-asserted-by":"crossref","unstructured":"Sandra Streukens and Sara Leroi-Werelds. 2016. Bootstrapping and PLS-SEM: A step-by-step guide to get more out of your bootstrap results. European management journal 34 6 (2016) 618\u2013632.","DOI":"10.1016\/j.emj.2016.06.003"},{"key":"e_1_3_3_2_46_2","unstructured":"Oludayo Tade and Babatunde Akinleye. 2012. \u2019We are Promoters not Pirates\u2019: A Qualitative Analysis of Artistes and Pirates on Music Piracy in Nigeria. International Journal of Cyber Criminology 6 2 (2012) 1014."},{"key":"e_1_3_3_2_47_2","doi-asserted-by":"publisher","unstructured":"O. Tade and O.\u00a0P. Mmahi. 2017. Movie Piracy Networks at Alaba International Market Lagos. International Journal of Offender Therapy and Comparative Criminology 62 1 (2017) 274\u2013285. 10.1177\/0306624X17692208","DOI":"10.1177\/0306624X17692208"},{"key":"e_1_3_3_2_48_2","doi-asserted-by":"publisher","unstructured":"L. Tomczyk. 2021. Evaluation of Digital Piracy by Youths. Future Internet 13 (2021) 11. 10.3390\/fi13010011","DOI":"10.3390\/fi13010011"},{"key":"e_1_3_3_2_49_2","unstructured":"L. Ume. 2021. Technological countermeasures of copyright piracy enforcement in Nigeria: An alternative to creative works owners\u2019 livelihood in a monolithic economy post COVID-19. Library Philosophy and Practice (2021) 1\u20139."},{"key":"e_1_3_3_2_50_2","doi-asserted-by":"crossref","unstructured":"Jean-Paul Van\u00a0Belle Brandon Macdonald and David Wilson. 2007. Determinants of digital piracy among youth in South Africa. Communications of the IIMA 7 3 (2007) 5.","DOI":"10.58729\/1941-6687.1045"},{"key":"e_1_3_3_2_51_2","unstructured":"Kimi Van\u00a0der Byl and Jean-Paul Van\u00a0Belle. 2008. Factors influencing South African attitudes toward digital piracy. Communications of the IBIMA 1 1 (2008) 202\u2013211."},{"key":"e_1_3_3_2_52_2","doi-asserted-by":"crossref","unstructured":"Viswanath Venkatesh Michael\u00a0G Morris Gordon\u00a0B Davis and Fred\u00a0D Davis. 2003. User acceptance of information technology: Toward a unified view. MIS quarterly (2003) 425\u2013478.","DOI":"10.2307\/30036540"},{"key":"e_1_3_3_2_53_2","doi-asserted-by":"crossref","unstructured":"Paul\u00a0Musili Wambua. 2012. The jurisdictional challenges to the prosecution of piracy cases in Kenya: mixed fortunes for a perfect model in the global war against piracy. WMU Journal of Maritime Affairs 11 1 (2012) 95\u2013113.","DOI":"10.1007\/s13437-012-0021-6"},{"key":"e_1_3_3_2_54_2","doi-asserted-by":"crossref","unstructured":"Victor Yisa and Rita Orji. 2024. Hidden desires echoed distress: Dissecting Nigeria\u2019s sexting landscape and its ties to depression. Computers in Human Behavior 161 (2024) 108420.","DOI":"10.1016\/j.chb.2024.108420"},{"key":"e_1_3_3_2_55_2","doi-asserted-by":"crossref","unstructured":"Cheolho Yoon. 2011. Theory of planned behavior and ethics theory in digital piracy: An integrated model. Journal of business ethics 100 (2011) 405\u2013417.","DOI":"10.1007\/s10551-010-0687-7"}],"event":{"name":"Africhi 2025: The 5th Biennial African Human Computer Interaction Conference","acronym":"Africhi 2025","location":"Cairo Egypt"},"container-title":["Proceedings of the Fifth Biennial African Human-Computer Interaction Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3757232.3757262","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,4]],"date-time":"2025-11-04T13:48:44Z","timestamp":1762264124000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3757232.3757262"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,4]]},"references-count":54,"alternative-id":["10.1145\/3757232.3757262","10.1145\/3757232"],"URL":"https:\/\/doi.org\/10.1145\/3757232.3757262","relation":{},"subject":[],"published":{"date-parts":[[2025,11,4]]},"assertion":[{"value":"2025-11-04","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}