Intrinsic and Extrinsic Factors Impacting Individuals` Cyber Ethics Awareness and Behavior Intention

[1]  R. Mason Four ethical issues of the information age , 1986 .

[2]  Nancy B. Kurland Ethical Intentions and the Theories of Reasoned Action and Planned Behavior1 , 1995 .

[3]  T. P. Cronan,et al.  Digital Piracy: Factors that Influence Attitude Toward Behavior , 2006 .

[4]  I. Ajzen The theory of planned behavior , 1991 .

[5]  Lori N. K. Leonard,et al.  What influences IT ethical behavior intentions - planned behavior, reasoned action, perceived importance, or individual characteristics? , 2004, Inf. Manag..

[6]  Susan J. Harrington,et al.  A Test of a Person -- Issue Contingent Model of Ethical Decision Making in Organizations , 1997 .

[7]  Traci Carte,et al.  In Pursuit of Moderation: Nine Common Errors and Their Solutions , 2003, MIS Q..

[8]  Kallol Kumar Bagchi,et al.  Global software piracy , 2006, Commun. ACM.

[9]  Cheolho Yoon Theory of Planned Behavior and Ethics Theory in Digital Piracy: An Integrated Model , 2011 .

[10]  Hui-Ling Yang,et al.  A comparative study of college students’ ethical perception concerning internet piracy , 2011, Quality & Quantity.

[11]  D. Mann,et al.  NETCRIME More Change in the Organization of Thieving , 1998 .

[12]  M. Chang Predicting Unethical Behavior: A Comparison of the Theory of Reasoned Action and the Theory of Planned Behavior , 1998 .

[13]  Hwal-Sik Chang,et al.  The Behavioral Model of Digital Music Piracy on the Web , 2007 .

[14]  Detmar W. Straub,et al.  Effective IS Security: An Empirical Study , 1990, Inf. Syst. Res..

[15]  W. Mischel,et al.  The nature of adolescent competencies predicted by preschool delay of gratification. , 1988, Journal of personality and social psychology.

[16]  Wynne W. Chin,et al.  A Partial Least Squares Latent Variable Modeling Approach for Measuring Interaction Effects: Results from a Monte Carlo Simulation Study and an Electronic - Mail Emotion/Adoption Study , 2003, Inf. Syst. Res..

[17]  L. Treviño Ethical Decision Making in Organizations: A Person-Situation Interactionist Model , 1986 .

[18]  Goo Bon-Hee,et al.  Factors Influencing Internet Addiction and Information Ethics : Centering on Self Characteristics and Cognitive Characteristics toward Internet , 2006 .

[19]  Timothy Paul Cronan,et al.  Modeling IT Ethics: A Study in Situational Ethics , 1998, MIS Q..

[20]  John T. Scholz Enforcement Policy and Corporate Misconduct: The Changing Perspective of Deterrence Theory , 1997 .

[21]  Meng Hsiang Hsu,et al.  An investigation of volitional control in information ethics , 2003, ICIS.

[22]  Dennis F. Galletta,et al.  Software Piracy in the Workplace: A Model and Empirical Test , 2003, J. Manag. Inf. Syst..

[23]  Timothy Paul Cronan,et al.  Copyright, piracy, privacy, and security issues: acceptable or unacceptable actions for end users? , 1999 .

[24]  Lori N. K. Leonard,et al.  Attitude toward ethical behavior in computer use: a shifting model , 2005, Ind. Manag. Data Syst..

[25]  C. Fornell,et al.  Evaluating structural equation models with unobservable variables and measurement error. , 1981 .