Intrinsic and Extrinsic Factors Impacting Individuals` Cyber Ethics Awareness and Behavior Intention
暂无分享,去创建一个
[1] R. Mason. Four ethical issues of the information age , 1986 .
[2] Nancy B. Kurland. Ethical Intentions and the Theories of Reasoned Action and Planned Behavior1 , 1995 .
[3] T. P. Cronan,et al. Digital Piracy: Factors that Influence Attitude Toward Behavior , 2006 .
[4] I. Ajzen. The theory of planned behavior , 1991 .
[5] Lori N. K. Leonard,et al. What influences IT ethical behavior intentions - planned behavior, reasoned action, perceived importance, or individual characteristics? , 2004, Inf. Manag..
[6] Susan J. Harrington,et al. A Test of a Person -- Issue Contingent Model of Ethical Decision Making in Organizations , 1997 .
[7] Traci Carte,et al. In Pursuit of Moderation: Nine Common Errors and Their Solutions , 2003, MIS Q..
[8] Kallol Kumar Bagchi,et al. Global software piracy , 2006, Commun. ACM.
[9] Cheolho Yoon. Theory of Planned Behavior and Ethics Theory in Digital Piracy: An Integrated Model , 2011 .
[10] Hui-Ling Yang,et al. A comparative study of college students’ ethical perception concerning internet piracy , 2011, Quality & Quantity.
[11] D. Mann,et al. NETCRIME More Change in the Organization of Thieving , 1998 .
[12] M. Chang. Predicting Unethical Behavior: A Comparison of the Theory of Reasoned Action and the Theory of Planned Behavior , 1998 .
[13] Hwal-Sik Chang,et al. The Behavioral Model of Digital Music Piracy on the Web , 2007 .
[14] Detmar W. Straub,et al. Effective IS Security: An Empirical Study , 1990, Inf. Syst. Res..
[15] W. Mischel,et al. The nature of adolescent competencies predicted by preschool delay of gratification. , 1988, Journal of personality and social psychology.
[16] Wynne W. Chin,et al. A Partial Least Squares Latent Variable Modeling Approach for Measuring Interaction Effects: Results from a Monte Carlo Simulation Study and an Electronic - Mail Emotion/Adoption Study , 2003, Inf. Syst. Res..
[17] L. Treviño. Ethical Decision Making in Organizations: A Person-Situation Interactionist Model , 1986 .
[18] Goo Bon-Hee,et al. Factors Influencing Internet Addiction and Information Ethics : Centering on Self Characteristics and Cognitive Characteristics toward Internet , 2006 .
[19] Timothy Paul Cronan,et al. Modeling IT Ethics: A Study in Situational Ethics , 1998, MIS Q..
[20] John T. Scholz. Enforcement Policy and Corporate Misconduct: The Changing Perspective of Deterrence Theory , 1997 .
[21] Meng Hsiang Hsu,et al. An investigation of volitional control in information ethics , 2003, ICIS.
[22] Dennis F. Galletta,et al. Software Piracy in the Workplace: A Model and Empirical Test , 2003, J. Manag. Inf. Syst..
[23] Timothy Paul Cronan,et al. Copyright, piracy, privacy, and security issues: acceptable or unacceptable actions for end users? , 1999 .
[24] Lori N. K. Leonard,et al. Attitude toward ethical behavior in computer use: a shifting model , 2005, Ind. Manag. Data Syst..
[25] C. Fornell,et al. Evaluating structural equation models with unobservable variables and measurement error. , 1981 .