Factors that Influence the Intention to Pirate Software and Media
暂无分享,去创建一个
[1] John D. McGregor,et al. Getting there from here: a roadmap for software product line adoption , 2006, CACM.
[2] Barry W. Boehm,et al. A quality-based cost estimation model for the product line life cycle , 2006, CACM.
[3] W. D. Walls,et al. Digital Pirates in Practice: Analysis of Market Transactions in Hong Kong's Pirate Software Arcades , 2006 .
[4] James R. Marsden,et al. Consumer Search and Retailer Strategies in the Presence of Online Music Sharing , 2006, J. Manag. Inf. Syst..
[5] Tom Cross. Academic freedom and the hacker ethic , 2006, Commun. ACM.
[6] Timothy Paul Cronan,et al. Piracy, computer crime, and IS misuse at the university , 2006, Commun. ACM.
[7] Matthew Green,et al. Security through legality , 2006, Commun. ACM.
[8] James R. Marsden,et al. Whatever happened to payola? An empirical analysis of online music sharing , 2005, Decis. Support Syst..
[9] Wynne W. Chin,et al. Factors motivating software piracy: a longitudinal study , 2004, IEEE Transactions on Engineering Management.
[10] Arun Sundararajan,et al. Managing Digital Piracy: Pricing and Protection , 2004, Inf. Syst. Res..
[11] E. K. Lau. An Empirical Study of Software Piracy , 2003 .
[12] Shivendu Shivendu,et al. Economic Implications of Variable Technology Standards for Movie Piracy in a Global Context , 2003, J. Manag. Inf. Syst..
[13] I. Ajzen,et al. Choice of Travel Mode in the Theory of Planned Behavior: The Roles of Past Behavior, Habit, and Reasoned Action , 2003 .
[14] Dennis F. Galletta,et al. Software Piracy in the Workplace: A Model and Empirical Test , 2003, J. Manag. Inf. Syst..
[15] Sudip Bhattacharjee,et al. Digital music and online sharing: software piracy 2.0? , 2003, CACM.
[16] Arun Sundararajan,et al. Managing Digital Piracy: Pricing, Protection and Welfare , 2003 .
[17] I. Ajzen. Residual Effects of Past on Later Behavior: Habituation and Reasoned Action Perspectives , 2002 .
[18] I. Ajzen. Perceived behavioral control, self-efficacy, locus of control, and the theory of planned behavior. , 2002 .
[19] B. Tan. Understanding consumer ethical decision making with respect to purchase of pirated software , 2002 .
[20] S. Biddle,et al. A Meta-Analytic Review of the Theories of Reasoned Action and Planned Behavior in Physical Activity: Predictive Validity and the Contribution of Additional Variables , 2002 .
[21] Bill C. Hardgrave,et al. Forums for information systems scholars: III , 2001, Inf. Manag..
[22] Feng-Yang Kuo,et al. Development and Validation of Ethical Computer Self-Efficacy Measure: The Case of Softlifting , 2001 .
[23] G. Lawrence Sanders,et al. Considerations in Ethical Decision-Making and Software Piracy , 2001 .
[24] Lori N. K. Leonard,et al. Illegal, Inappropriate, And Unethical Behavior In An Information Technology Context: A Study To Explain Influences , 2001, J. Assoc. Inf. Syst..
[25] Timothy Paul Cronan,et al. Making ethical decisions , 2000, CACM.
[26] Jorgen P. Bansler,et al. Corporate Intranet Implementation: Managing Emergent Technologies and Organizational Practices , 2000, J. Assoc. Inf. Syst..
[27] Brenda L. Flannery,et al. Environmental Ethical Decision Making in the U.S. Metal-Finishing Industry , 2000 .
[28] Eloise Coupey,et al. Belief, Affect, and Attitude: Alternative Models of the Determinants of Attitude , 2000 .
[29] Detmar W. Straub,et al. Structural Equation Modeling and Regression: Guidelines for Research Practice , 2000, Commun. Assoc. Inf. Syst..
[30] Timothy Paul Cronan,et al. Copyright, piracy, privacy, and security issues: acceptable or unacceptable actions for end users? , 1999 .
[31] Donald P. Schwab,et al. Research Methods for Organizational Studies , 1998 .
[32] Kaushik Mitra,et al. The Effects of Individual Difference Factors on the Acceptability of Ethical and Unethical Workplace Behaviors , 1998 .
[33] Timothy Paul Cronan,et al. How men and women view ethics , 1998, CACM.
[34] M. Conner,et al. Extending the Theory of Planned Behavior: A Review and Avenues for Further Research , 1998 .
[35] Robert J. Vokurka,et al. The empirical assessment of construct validity , 1998 .
[36] Timothy Paul Cronan,et al. Modeling IT Ethics: A Study in Situational Ethics , 1998, MIS Q..
[37] Chee-Sing Yap,et al. Testing an Ethical Decision-Making Theory: The Case of Softlifting , 1998, J. Manag. Inf. Syst..
[38] M. Chang. Predicting Unethical Behavior: A Comparison of the Theory of Reasoned Action and the Theory of Planned Behavior , 1998 .
[39] Hsing K. Cheng,et al. To Purchase or to Pirate Software: An Empirical Study , 1997, J. Manag. Inf. Syst..
[40] Ram D. Gopal,et al. Preventive and Deterrent Controls for Software Piracy , 1997, J. Manag. Inf. Syst..
[41] Duane T. Wegener,et al. Attitudes and attitude change. , 1997, Annual review of psychology.
[42] David Trafimow,et al. The Importance of Attitudes in the Prediction of College Students' Intentions to Drink , 1996 .
[43] Wallace A. Wood,et al. Situational determinants of software piracy: An equity theory perspective , 1996 .
[44] Hsing Kenneth Cheng,et al. Toward a profile of student software piraters , 1996 .
[45] Karen D. Loch,et al. Evaluating ethical decision making and computer use , 1996, CACM.
[46] Deepak Khazanchi,et al. Unethical behavior in information systems: The gender factor , 1995 .
[47] Nancy B. Kurland. Ethical Intentions and the Theories of Reasoned Action and Planned Behavior1 , 1995 .
[48] P. Simpson,et al. Softlifting: A model of motivating factors , 1994 .
[49] Donald Gotterbarn,et al. Using the new ACM code of ethics in decision making , 1993, CACM.
[50] M. Zanna,et al. Attitudes and Attitude Change , 1993 .
[51] R. Bagozzi,et al. State versus Action Orientation and the Theory of Reasoned Action: An Application to Coupon Usage , 1992 .
[52] I. Ajzen,et al. A Comparison of the Theory of Planned Behavior and the Theory of Reasoned Action , 1992 .
[53] R. Vallerand,et al. Ajzen and Fishbein's theory of reasoned action as applied to moral behavior: A confirmatory analysis. , 1992 .
[54] Elazar J. Pedhazur,et al. Measurement, Design, and Analysis: An Integrated Approach , 1994 .
[55] I. Ajzen. The theory of planned behavior , 1991 .
[56] I. Ajzen,et al. Predicting dishonest actions using the theory of planned behavior , 1991 .
[57] Richard P. Bagozzi,et al. Assessing Construct Validity in Organizational Research , 1991 .
[58] Jin H. Im,et al. Software piracy and software security in business schools: an ethical perspective , 1991, DATB.
[59] David B. Paradice,et al. Ethical Issues in Information Systems , 1991 .
[60] D. Randall,et al. Ethical decision making in the medical profession: An application of the theory of planned behavior , 1991 .
[61] Detmar W. Straub,et al. Key information liability issues facing managers: software piracy, proprietary databases, and indi , 1990 .
[62] Alan J. Dubinsky,et al. Analyzing ethical decision making in marketing , 1989 .
[63] Michael Bommer,et al. A behavioral model of ethical and unethical decision making , 1987 .
[64] I. Ajzen,et al. Prediction of goal directed behaviour: Attitudes, intentions and perceived behavioural control , 1986 .
[65] Rolph E. Anderson,et al. Multivariate data analysis with readings (2nd ed.) , 1986 .
[66] S. Hunt,et al. A General Theory of Marketing Ethics , 1986 .
[67] James R. Rest. Moral Development: Advances in Research and Theory , 1986 .
[68] Icek Ajzen,et al. From Intentions to Actions: A Theory of Planned Behavior , 1985 .
[69] Terence A. Shimp,et al. The Theory of Reasoned Action Applied to Coupon Usage , 1984 .
[70] Daniel J. O'Keefe,et al. Separability of Attitudinal and Normative Influences on Behavioral Intentions in the Fishbein-Ajzen Model , 1984 .
[71] H C Triandis,et al. Values, attitudes, and interpersonal behavior. , 1980, Nebraska Symposium on Motivation. Nebraska Symposium on Motivation.
[72] I. Ajzen,et al. Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research , 1977 .
[73] Shalom H. Schwartz,et al. A test of a model for reducing measured attitude-behavior discrepancies. , 1972 .
[74] S. Fiske,et al. The Handbook of Social Psychology , 1935 .