Parameters for Software Piracy Research
暂无分享,去创建一个
Clyde W. Holsapple | Shashank Rao | Deepak Iyengar | Haihao Jin | C. Holsapple | Shashank Rao | Deepak Iyengar | Haihao Jin
[1] L. Loren. Digitization, Commodification, Criminalization: the Evolution of Criminal Copyright Infringement and the Importance of the Willfulness Requirement , 1999 .
[2] Trevor T. Moores. The effect of national culture and economic wealth on global software piracy rates , 2003, CACM.
[3] J. Burn,et al. Softlifting and piracy: behavior across cultures , 2001 .
[4] A. Rehn,et al. The Politics of Contraband - The Honor Economies of the Warez Scene , 2004 .
[5] Clifford M. Koen,et al. Software piracy and its legal implications , 1997, Inf. Manag..
[6] Vijay Mahajan,et al. Software Piracy: Estimation of Lost Sales and the Impact on Software Diffusion , 1995 .
[7] J. Marsden,et al. Impact of Legal Threats on Online Music Sharing Activity: An Analysis of Music Industry Legal Actions* , 2006, The Journal of Law and Economics.
[8] Dusten R. Hollist,et al. Causes of Delinquency , 1950, Juvenile Justice.
[9] Ibrahim M. Al-Jabri,et al. Software copyright infringements: an exploratory study of the effects of individual and peer beliefs , 1997 .
[10] Pamela Samuelson,et al. DRM {and, or, vs.} the law , 2003, CACM.
[11] Feng-Yang Kuo,et al. Development and Validation of Ethical Computer Self-Efficacy Measure: The Case of Softlifting , 2001 .
[12] Rajiv Kohli,et al. Introduction to the Special Issue: Measuring the Business Value of Information Technology in e-Business Environments , 2004, Int. J. Electron. Commer..
[13] Joseph N. Symons. Delinquency as the Failure of Personal and Social Controls: Discussion , 1951 .
[14] Lydia L. Gan,et al. An empirical study of software piracy among tertiary institutions in Singapore , 2006, Inf. Manag..
[15] P. Simpson,et al. Softlifting: A model of motivating factors , 1994 .
[16] R. Ford,et al. Ethical decision making: A review of the empirical literature , 1994 .
[17] Sanjay Jain,et al. Editors' Introduction , 2005, ALT.
[18] Sigi Goode,et al. What Motivates Software Crackers? , 2006 .
[19] A. Reiss,. Delinquency as the Failure of Personal and Social Controls , 1951 .
[20] Dennis F. Galletta,et al. Software Piracy in the Workplace: A Model and Empirical Test , 2003, J. Manag. Inf. Syst..
[21] J. Braithwaite. Crime, shame and reintegration: Contents , 1989 .
[22] Ranjan B. Kini,et al. An Empirical Study of Software Piracy and Moral Intensity among University Students , 2000, Journal of Computer Information Systems.
[23] Timothy Paul Cronan,et al. Piracy, computer crime, and IS misuse at the university , 2006, Commun. ACM.
[24] George E. Higgins,et al. Digital Piracy: Assessing the Contributions of an Integrated Self‐Control Theory and Social Learning Theory Using Structural Equation Modeling , 2006 .
[25] Hsing Kenneth Cheng,et al. Toward a profile of student software piraters , 1996 .
[26] Stephen J. Gould,et al. “To Pirate or Not to Pirate”: A Comparative Study of the Ethical Versus Other Influences on the Consumer’s Software Acquisition-Mode Decision , 2004 .
[27] Karen D. Loch,et al. Evaluating ethical decision making and computer use , 1996, CACM.
[28] J. Chiou,et al. The Antecedents of Music Piracy Attitudes and Intentions , 2005 .
[29] D. Greenberg. The historical variability of the age-crime relationship , 1994 .
[30] D. Marlowe,et al. A new scale of social desirability independent of psychopathology. , 1960, Journal of consulting psychology.
[31] Trevor T. Moores,et al. Ethical Decision Making in Software Piracy: Initial Development and a Test of a Four-Component Model , 2006, MIS Q..
[32] Ram D. Gopal,et al. Preventive and Deterrent Controls for Software Piracy , 1997, J. Manag. Inf. Syst..
[33] T. P. Cronan,et al. Digital Piracy: Factors that Influence Attitude Toward Behavior , 2006 .
[34] W StraubDetmar,et al. Key information liability issues facing managers: software piracy, proprietary databases, and individual rights to privacy , 1990 .
[35] Lawrence E. Cohen,et al. Social Change and Crime Rate Trends: A Routine Activity Approach , 1979 .
[36] David S. Wall,et al. Crime and the Internet , 2001 .
[37] R. Agnew,et al. Gender and Crime: A General Strain Theory Perspective , 1997 .
[38] Vijay Mahajan,et al. Assessing the relationship between the user-based market share and unit sales-based market share for pirated software brands in competitive markets , 1997 .
[39] M. Hood. Steal this software and this DVD, and this book, and this handbag, and this car... [intellectual property] , 2005, IEEE Spectrum.
[40] Wallace A. Wood,et al. Situational determinants of software piracy: An equity theory perspective , 1996 .
[41] Ranjan B. Kini,et al. Shaping of Moral Intensity regarding Software Piracy in University Students: Immediate Community Effects , 2001, J. Comput. Inf. Syst..
[42] B. Tan. Understanding consumer ethical decision making with respect to purchase of pirated software , 2002 .
[43] David C. Yen,et al. Software Asset Management: Analysis, Development and Implementation , 1999 .
[44] Puay Tang. How Electronic Publishers are Protecting agains Privacy: Doubts about Technical Systems of Protection , 1998, Inf. Soc..
[45] Kallol Kumar Bagchi,et al. Global software piracy , 2006, Commun. ACM.
[46] James R. Marsden,et al. Consumer Search and Retailer Strategies in the Presence of Online Music Sharing , 2006, J. Manag. Inf. Syst..
[47] Stephen P. King,et al. Network externalities, price discrimination and profitable piracy , 2003, Inf. Econ. Policy.
[48] Martha M. Eining,et al. Software Piracy among Accounting Students: A Longitudinal Comparison of Changes and Sensitivity , 2006, J. Inf. Syst..
[49] Amos H. Hawley,et al. Human Ecology: A Theory of Community Structure , 1950 .
[50] Darryl A. Seale,et al. It's not really theft!: Personal and workplace ethics that enable software piracy , 1998, Behav. Inf. Technol..
[51] Sameer Hinduja,et al. Correlates of Internet Software Piracy , 2001 .
[52] T. S. Raghu,et al. Strategic Analysis of Corporate Software Piracy Prevention and Detection , 2005, J. Organ. Comput. Electron. Commer..
[53] Richard A. Reid,et al. Software piracy: Is it related to level of moral judgment? , 1994 .
[54] Trevor T. Moores,et al. A reversed context analysis of software piracy issues in Singapore , 2004, Inf. Manag..
[55] Afzaal H. Seyal,et al. Software piracy among academics: an empirical study in Brunei Darussalam , 2000, Inf. Manag. Comput. Secur..
[56] George E. Higgins. can low self-control help with the understanding of the software piracy problem? , 2004 .
[57] Gurpreet Dhillon,et al. Software piracy: a view from Hong Kong , 2000, CACM.
[58] G. Lawrence Sanders,et al. Considerations in Ethical Decision-Making and Software Piracy , 2001 .
[59] Vincent J. Calluzzo,et al. Ethics in Information Technology and Software Use , 2004 .
[60] William R. Swinyard,et al. The morality of software piracy: A cross-cultural analysis , 1990 .
[61] Dyuti S. Banerjee. Lobbying and commercial software piracy , 2006 .
[62] R. Clarke,et al. Modeling Offenders' Decisions: A Framework for Research and Policy , 1985, Crime and Justice.
[63] Ron Honick. Software Piracy Exposed , 2005 .
[64] Pamela Samuelson. Digital Rights Management {and, or, vs.} the Law , 2003 .
[65] Oz Shy,et al. A strategic approach to software protection , 1999 .
[66] Ranjan B. Kini,et al. Shaping of Moral Intensity Regarding Software Piracy: A Comparison Between Thailand and U.S. Students , 2004 .
[67] S. Hinduja. Trends and patterns among online software pirates , 2003, Ethics and Information Technology.
[68] Matthew Green,et al. Security through legality , 2006, Commun. ACM.
[69] Fang Wang,et al. Purchasing pirated software: an initial examination of Chinese consumers , 2005 .
[70] A. Andrés. The relationship between copyright software protection and piracy: Evidence from europe , 2006 .
[71] Jane C. Ginsburg,et al. Copyright and Control Over New Technologies of Dissemination , 2001 .
[73] Jeffrey Scott Mclllwain. Intellectual Property Theft and Organized Crime: The Case of Film Piracy , 2005 .
[74] R. Clarke. Hot Products : understanding , anticipating and reducing demand for stolen goods , 1999 .
[75] A. Andrés. Software piracy and income inequality , 2006 .
[76] Andrew B. Whinston,et al. Global software piracy revisited , 2004, CACM.
[77] Chee-Sing Yap,et al. Testing an Ethical Decision-Making Theory: The Case of Softlifting , 1998, J. Manag. Inf. Syst..
[78] Jung P. Shim,et al. A Comparative Examination of Attitudes Toward Software Piracy Among Business Professors and Executives , 1993 .
[79] Gene Brown,et al. Individual Difference Variables, Ethical Judgments, and Ethical Behavioral Intentions , 1999, Business Ethics Quarterly.
[80] C. Depken,et al. Social construct and the propensity for software piracy , 2004 .
[81] JoAnne Yates,et al. Electronic markets and electronic hierarchies , 1987, CACM.
[82] Afzaal H. Seyal,et al. Software piracy among computing students: a Bruneian scenario , 1999, Comput. Educ..
[83] R. Paternoster,et al. The deterrent effect of the perceived certainty and severity of punishment: A review of the evidence and issues , 1987 .
[84] Miriam D. Sealock,et al. Gender and general strain theory: A preliminary test of Broidy and Agnew's gender/GST hypotheses , 2004 .
[85] Ram D. Gopal,et al. International Software Piracy: Analysis of Key Issues and Impacts , 1998, Inf. Syst. Res..
[86] James William Coleman,et al. Toward an Integrated Theory of White-Collar Crime , 1987, American Journal of Sociology.
[87] Vijay Mahajan,et al. How many pirates should a software firm tolerate? An analysis of piracy protection on the diffusion of software , 2003 .
[88] K. R. Conner,et al. Software piracy: an analysis of protection strategies , 1991 .
[89] Sudip Bhattacharjee,et al. A Behavioral Model of Digital Music Piracy , 2004, J. Organ. Comput. Electron. Commer..
[90] Ram D. Gopal,et al. Global software piracy: you can't get blood out of a turnip , 2000, CACM.
[91] Vijay Mahajan,et al. The Effect of Piracy on the Market Penetration of Subscription Software , 2004 .
[92] B. Husted. The Impact of National Culture on Software Piracy , 2000 .
[93] Elia Zureik,et al. Correlates of computer misuse: data from a self-reporting sample , 1990 .
[94] Pamela Samuelson,et al. Why the Anti-Circumvention Regulations Need to be Revised , 1999 .
[95] Sudip Bhattacharjee,et al. Digital music and online sharing: software piracy 2.0? , 2003, CACM.
[96] James R. Marsden,et al. Whatever happened to payola? An empirical analysis of online music sharing , 2005, Decis. Support Syst..
[97] Jay Pil Choi,et al. A model of piracy , 2006, Inf. Econ. Policy.
[98] Kemal Altinkemer,et al. Online software distribution without enforcing copy protection as a strategic weapon , 2005, Inf. Syst. E Bus. Manag..
[99] Shivendu Shivendu,et al. Managing Piracy: Pricing and Sampling Strategies for Digital Experience Goods in Vertically Segmented Markets , 2003, Inf. Syst. Res..
[100] Craig A. Depken,et al. Influences on software piracy: Evidence from the various United States , 2006 .
[101] E. K. Lau. An Empirical Study of Software Piracy , 2003 .
[102] Ranjan B. Kini,et al. An exploratory study of moral intensity regarding software piracy of students in Thailand , 2003, Behav. Inf. Technol..
[103] Wynne W. Chin,et al. Factors motivating software piracy: a longitudinal study , 2004, IEEE Transactions on Engineering Management.
[104] Harold G. Grasmick,et al. Conscience, significant others, and rational choice: Extending the deterrence model. , 1990 .
[105] David G Steel,et al. Which Countries Protect Intellectual Property? The Case of Software Piracy , 2000 .
[106] Jih-Hsin Tang,et al. The Effect of Interpersonal Influence on Softlifting Intention and Behaviour , 2005 .
[107] A. Kong,et al. A Study of Unauthorised Software Copying Among Post-Secondary Students in Hong Kong , 1990, Aust. Comput. J..
[108] Dyuti Banerjee. Software piracy: a strategic analysis and policy instruments , 2003 .
[109] Daniel S. Nagin,et al. THE DETERRENT EFFECT OF PERCEIVED CERTAINTY AND SEVERITY OF PUNISHMENT REVISITED , 1989 .
[110] Rajeev Prasad. Piracy Over Peer-To-Peer Based on Personal Network , 2006, Wirel. Pers. Commun..
[111] Hsing K. Cheng,et al. To Purchase or to Pirate Software: An Empirical Study , 1997, J. Manag. Inf. Syst..
[112] Robert M. Siegfried,et al. Student Attitudes on Software Piracy and Related Issues of Computer Ethics , 2004, Ethics and Information Technology.
[113] R. Mason. Four ethical issues of the information age , 1986 .
[114] Jeroen van Wijk,et al. Dealing with Piracy:: Intellectual Asset Management in Music and Software , 2002 .