New insights into the problem of software piracy: The effects of neutralization, shame, and moral beliefs
暂无分享,去创建一个
Mikko T. Siponen | Robert Willison | Anthony Vance | M. Siponen | R. Willison | Anthony Vance | Robert Willison
[1] Mikko T. Siponen,et al. Information security management standards: Problems and solutions , 2009, Inf. Manag..
[2] Sang M. Lee,et al. An integrative model of computer abuse based on social control and general deterrence theories , 2004, Inf. Manag..
[3] R. Paternoster,et al. Sanction threats and appeals to morality : Testing a rational choice model of corporate crime , 1996 .
[4] Paul F. Cromwell,et al. the devil made me do it: use of neutralizations by shoplifters , 2003 .
[5] Sameer Hinduja,et al. Self-Control and Ethical Beliefs on the Social Learning of Intellectual Property Theft* , 2008 .
[6] S. Hinduja,et al. Neutralizing Music Piracy: An Empirical Examination , 2008 .
[7] George E. Higgins,et al. Neutralizing Potential and Self-Reported Digital Piracy , 2009 .
[8] Ed Buckner. Book Review: Anastaplo, G. (2005). The Constitutionalist: Notes on the First Amendment. Lanham, MD: Lexington Books. 826 pp., 79 pp. of prefaces and preliminary material , 2007 .
[9] D. Nagin,et al. Enduring individual differences and rational choice theories of crime , 1993 .
[10] Mikko T. Siponen,et al. IS Security Policy Violations: A Rational Choice Perspective , 2012, J. Organ. End User Comput..
[11] Timothy Paul Cronan,et al. Equity perceptions as a deterrent to software piracy behavior , 2007, Inf. Manag..
[12] Michael B. Blankenship,et al. examining the role of differential association and techniques of neutralization in explaining corporate crime , 2005 .
[13] Anat Hovav,et al. Applying an extended model of deterrence across cultures: An investigation of information systems misuse in the U.S. and South Korea , 2012, Inf. Manag..
[14] Tero Vartiainen,et al. Unauthorized copying of software and levels of moral development: a literature analysis and its implications for research and practice , 2004, Inf. Syst. J..
[15] Garry C. Gray,et al. The Regulation of Corporate Violations Punishment, Compliance, and the Blurring of Responsibility , 2006 .
[16] R. A. Dodder,et al. techniques of neutralization used by deer poachers in the western united states: a research note , 1999 .
[17] Gaby Odekerken-Schröder,et al. Using PLS path modeling for assessing hierarchial construct models: guidelines and impirical illustration , 2009 .
[18] Heith Copes,et al. streetlife and the rewards of auto theft , 2003 .
[19] Dennis F. Galletta,et al. User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach , 2009, Inf. Syst. Res..
[20] Dennis F. Galletta,et al. Software Piracy in the Workplace: A Model and Empirical Test , 2003, J. Manag. Inf. Syst..
[21] Mikko T. Siponen,et al. Neutralization: New Insights into the Problem of Employee Systems Security Policy Violations , 2010, MIS Q..
[22] Sally S. Simpson,et al. Informal Sanction Threats and Corporate Crime: Additive Versus Multiplicative Models , 1995 .
[23] Quint C. Thurman,et al. Deviance and the neutralization of moral commitment: An empirical analysis , 1984 .
[24] Lydia L. Gan,et al. An empirical study of software piracy among tertiary institutions in Singapore , 2006, Inf. Manag..
[25] Rhonda D. Evans,et al. the nature and frequency of medicare/medicaid fraud and neutralization techniques among speech, occupational, and physical therapists , 2005 .