Use, perceived deterrence and the role of software piracy in video game console adoption
暂无分享,去创建一个
[1] Andrew Huang,et al. Keeping Secrets in Hardware: The Microsoft Xbox™ Case Study , 2002, CHES.
[2] Terry L. Childers,et al. The Influence of Familial and Peer-Based Reference Groups on Consumer Decisions , 1992 .
[3] Shu-Hsun Ho,et al. Exploring success factors of video game communities in hierarchical linear modeling: The perspectives of members and leaders , 2009, Comput. Hum. Behav..
[4] Michael J. Leiber,et al. Reassessing the family-delinquency association: Do family type, family processes, and economic factors make a difference? , 2007 .
[5] David Matza,et al. Delinquency and Drift , 1966 .
[6] John D. Claxton,et al. The Nominal Group Technique: Its Potential for Consumer Research , 1980 .
[7] Aron M. Levin,et al. Money for Nothing and Hits for Free: The Ethics of Downloading Music from Peer-to-Peer Web Sites , 2004 .
[8] Kar Yan Tam,et al. Understanding the behavior of mobile data services consumers , 2008, Inf. Syst. Frontiers.
[9] Stephen Darwall. A Defense of the Kantian Interpretation , 1976, Ethics.
[10] Sudip Bhattacharjee,et al. Digital music and online sharing: software piracy 2.0? , 2003, CACM.
[11] Brian K. Payne,et al. Ancillary consequences of employee theft , 2004 .
[12] Hans-Peter Blossfeld,et al. Macro-sociology, rational choice theory, and time : A theoretical perspective on the empirical analysis of social processes , 1996 .
[13] Melissa A. Schilling. Technological Leapfrogging: Lessons from the U.S. Video Game Console Industry , 2003 .
[14] Feng-Yang Kuo,et al. The Effect of Organization-Based Self-Esteem and Deindividuation in Protecting Personal Information Privacy , 2003 .
[15] G. Soutar,et al. Consumer perceived value: The development of a multiple item scale , 2001 .
[16] Alexander Serenko,et al. User acceptance of hedonic digital artifacts: A theory of consumption values perspective , 2010, Inf. Manag..
[17] Rolph E. Anderson,et al. Nederlandse samenvatting en bewerking van 'Multivariate data analysis, 4th Edition, 1995' , 1998 .
[18] P. Kenhove,et al. ‘An Empirical Investigation of the Relationships among a Consumer’s Personal Values, Ethical Ideology and Ethical Beliefs’ , 2006 .
[19] Clyde W. Holsapple,et al. Building effective online game websites with knowledge-based trust , 2008, Inf. Syst. Frontiers.
[20] M. Gallagher,et al. The nominal group technique: a research tool for general practice? , 1993, Family practice.
[21] Mark D. Griffiths,et al. Online Data Collection from Video Game Players: Methodological Issues , 2004, Cyberpsychology Behav. Soc. Netw..
[22] David Trafimow,et al. Predicting behaviour from perceived behavioural control: tests of the accuracy assumption of the theory of planned behaviour. , 2003, The British journal of social psychology.
[23] Peter A. Todd,et al. Understanding Information Technology Usage: A Test of Competing Models , 1995, Inf. Syst. Res..
[24] Viswanath Venkatesh,et al. A Longitudinal Investigation of Personal Computers in Homes: Adoption Determinants and Emerging Challenges , 2001, MIS Q..
[25] Alessandro Narduzzo,et al. Playstation and the Power of Unexpected Consequences , 2003 .
[26] Patrick Waelbroeck,et al. Piracy of Digital Products: A Critical Review of the Theoretical Literature , 2006, Inf. Econ. Policy.
[27] Matthew K. O. Lee,et al. Behavioral intention model for the exchange mode Internet music piracy , 2002, Proceedings of the 35th Annual Hawaii International Conference on System Sciences.
[28] M. Silberman. Toward a theory of criminal deterrence. , 1976 .
[29] D GopalRam,et al. Global software piracy , 2000 .
[30] Ginger Myles,et al. Content protection for games , 2006, IBM Syst. J..
[31] Dennis F. Galletta,et al. Software Piracy in the Workplace: A Model and Empirical Test , 2003, J. Manag. Inf. Syst..
[32] Scott Gallagher,et al. Innovation and competition in standard-based industries: a historical analysis of the US home video game market , 2002, IEEE Trans. Engineering Management.
[33] C. Moore. Group Techniques for Idea Building , 1987 .
[34] M. Conner,et al. Extending the Theory of Planned Behavior: A Review and Avenues for Further Research , 1998 .
[35] Ethan Mollick,et al. Changing the Game: How Video Games Are Transforming the Future of Business , 2008 .
[36] Izak Benbasat,et al. Development of an Instrument to Measure the Perceptions of Adopting an Information Technology Innovation , 1991, Inf. Syst. Res..
[37] Thompson S. H. Teo,et al. Adoption of WAP-enabled mobile phones among Internet users , 2003 .
[38] David Matza. Delinquency and Drift , 1966 .
[39] Mara Lederman,et al. Software Exclusivity and the Scope of Indirect Network Effects in the U.S. Home Video Game Market , 2007 .
[40] Richard Swedberg,et al. Rational Choice, Empirical Research, and the Sociological Tradition , 1996 .
[41] I. Ajzen,et al. Understanding Attitudes and Predicting Social Behavior , 1980 .
[42] I. Ajzen,et al. Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research , 1977 .
[43] D. Lehmann,et al. Purchase Intentions and the Dimensions of Innovation: An Exploratory Model , 1990 .
[44] Kallol Kumar Bagchi,et al. Global software piracy , 2006, Commun. ACM.
[45] Stuart J. Barnes,et al. Why people buy virtual items in virtual worlds with real money , 2007, DATB.
[46] Terence A. Shimp,et al. The Theory of Reasoned Action Applied to Coupon Usage , 1984 .
[47] R. Bagozzi. Attitudes, intentions, and behavior: A test of some key hypotheses. , 1981 .
[48] J. Chiou,et al. The Antecedents of Music Piracy Attitudes and Intentions , 2005 .
[49] Stefan Wagner,et al. Outlaw Community Innovations ∗ , 2008 .
[50] Linda L. Price,et al. An Investigation into the Social Context of Early Adoption Behavior , 1992 .
[51] Lawrence E. Cohen,et al. Social Change and Crime Rate Trends: A Routine Activity Approach , 1979 .
[52] E. Rogers. Diffusion of Innovations , 1962 .
[53] A. d’Astous,et al. Music Piracy on the Web – How Effective are Anti-Piracy Arguments? Evidence from the Theory of Planned Behaviour , 2005 .
[54] Gordon B. Davis,et al. User Acceptance of Information Technology: Toward a Unified View , 2003, MIS Q..
[55] David Sheff. Game over : how Nintendo conquered the world , 1994 .
[56] R. Iman,et al. Modern business statistics , 1983 .
[57] J. Hair. Multivariate data analysis , 1972 .
[58] David H. Gustafson,et al. Group Techniques for Program Planning: A Guide to Nominal Group and Delphi Processes , 1976 .
[59] Venkatesh Shankar,et al. Network Effects and Competition: An Empirical Analysis of the Home Video Game Industry , 2002 .
[60] A. Blumstein,et al. Deterrence and incapacitation : estimating the effects of criminal sanctions on crime rates , 1980 .
[61] Timothy Paul Cronan,et al. Equity perceptions as a deterrent to software piracy behavior , 2007, Inf. Manag..
[62] Michael Mandler,et al. Incomplete preferences and rational intransitivity of choice , 2005, Games Econ. Behav..
[63] J. Huber,et al. Rational choice models in sociology , 1997 .
[64] L. G. Tornatzky,et al. Innovation characteristics and innovation adoption-implementation: A meta-analysis of findings , 1982, IEEE Transactions on Engineering Management.
[65] Jon A. Krosnick,et al. An introduction to survey research and data analysis, 2nd ed. , 1977 .
[66] Xiaojun Zhang,et al. Household technology adoption in a global marketplace: Incorporating the role of espoused cultural values , 2008, Inf. Syst. Frontiers.
[67] Kieran Mathieson,et al. Predicting User Intentions: Comparing the Technology Acceptance Model with the Theory of Planned Behavior , 1991, Inf. Syst. Res..
[68] Alex R. Piquero,et al. Differential Deterrence , 2012 .
[69] Clyde W. Holsapple,et al. Parameters for Software Piracy Research , 2008, Inf. Soc..
[70] Shirley Taylor,et al. Decomposition and crossover effects in the theory of planned behavior: A study of consumer adoption intentions , 1995 .
[71] Tung-Ching Lin,et al. An intention model-based study of software piracy , 1999, Proceedings of the 32nd Annual Hawaii International Conference on Systems Sciences. 1999. HICSS-32. Abstracts and CD-ROM of Full Papers.
[72] Icek Ajzen,et al. From Intentions to Actions: A Theory of Planned Behavior , 1985 .
[73] Sacha Plowman,et al. Factors Affecting the Intention to Download Music: Quality Perceptions and Downloading Intensity , 2009, J. Comput. Inf. Syst..
[74] J Kluger. The diabetes explosion. , 2000, Time.
[75] Viswanath Venkatesh,et al. Determinants of Perceived Ease of Use: Integrating Control, Intrinsic Motivation, and Emotion into the Technology Acceptance Model , 2000, Inf. Syst. Res..
[76] Donald R. Cooper,et al. Business Research Methods , 1980 .
[77] G. Powell-Cope,et al. Operationalizing the theory of planned behavior. , 1991, Research in nursing & health.
[78] Hun Choi,et al. An empirical study on the adoption of information appliances with a focus on interactive TV , 2003, Telematics Informatics.
[79] I. Ajzen. The theory of planned behavior , 1991 .