Factors motivating software piracy: a longitudinal study
暂无分享,去创建一个
[1] Ibrahim M. Al-Jabri,et al. Software copyright infringements: an exploratory study of the effects of individual and peer beliefs , 1997 .
[2] Richard A. Reid,et al. Software piracy: Is it related to level of moral judgment? , 1994 .
[3] Vijay Mahajan,et al. Software Piracy: Estimation of Lost Sales and the Impact on Software Diffusion , 1995 .
[4] Brian J. Reithel,et al. The Software Piracy Dilemma in Public Administration: A Survey of University Software Policy Enforcement , 1994 .
[5] Yucel Saygin,et al. Value of Information Gained from Data Mining in the Context of Information Sharing , 2004 .
[6] F. Bergeron,et al. Understanding EIS use: an empirical test of a behavioral model , 1992, Proceedings of the Twenty-Fifth Hawaii International Conference on System Sciences.
[7] Louis Raymond,et al. Determinants of EIS use: Testing a behavioral model, , 1995, Decis. Support Syst..
[8] Hsing K. Cheng,et al. To Purchase or to Pirate Software: An Empirical Study , 1997, J. Manag. Inf. Syst..
[9] Jane M. Howell,et al. Influence of Experience on Personal Computer Utilization: Testing a Conceptual Model , 1994, J. Manag. Inf. Syst..
[10] W ChinWynne,et al. Adoption intention in GSS , 1995 .
[11] Ram D. Gopal,et al. The Effect of Preventive and Deterrent Software Piracy Strategies on Producer Profits , 1992, ICIS.
[12] William R. Swinyard,et al. The morality of software piracy: A cross-cultural analysis , 1990 .
[13] Jin H. Im,et al. Software piracy and software security measures in business schools , 1992, Inf. Manag..
[14] Stewart Kowalski,et al. Computer ethics and computer abuse: a study of Swedish and Canadian university data processing students , 1990 .
[15] A. Kong,et al. A Study of Unauthorised Software Copying Among Post-Secondary Students in Hong Kong , 1990, Aust. Comput. J..
[16] I. Ajzen. The theory of planned behavior , 1991 .
[17] Deborah Compeau,et al. Application of Social Cognitive Theory to Training for Computer Skills , 1995, Inf. Syst. Res..
[18] Clifford M. Koen,et al. Software piracy and responsibilities of educational institutions , 1990, Inf. Manag..
[19] Timothy Paul Cronan,et al. Modeling IT Ethics: A Study in Situational Ethics , 1998, MIS Q..
[20] Wynne W. Chin,et al. Adoption intention in GSS: relative importance of beliefs , 1995, DATB.
[21] I. Ajzen,et al. Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research , 1977 .
[22] Wallace A. Wood,et al. Situational determinants of software piracy: An equity theory perspective , 1996 .
[23] A. Bandura. Social Foundations of Thought and Action: A Social Cognitive Theory , 1985 .
[24] James R. Davis,et al. Professional ethics: Business students' perceptions , 1991 .
[25] Detmar W. Straub,et al. Discovering and Disciplining Computer Abuse in Organizations: A Field Study , 1990, MIS Q..
[26] S. Hunt,et al. A General Theory of Marketing Ethics , 1986 .
[27] Wynne W. Chin,et al. Extending the technology acceptance model: the influence of perceived user resources , 2001, DATB.
[28] Ang Yang Ang,et al. Piracy Attitudes of Tertiary Students in Australia , 1998 .
[29] K. R. Conner,et al. Software piracy: an analysis of protection strategies , 1991 .
[30] Feng-Yang Kuo,et al. Development and Validation of Ethical Computer Self-Efficacy Measure: The Case of Softlifting , 2001 .
[31] Karen D. Loch,et al. Evaluating ethical decision making and computer use , 1996, CACM.
[32] Wynne W. Chin. The partial least squares approach for structural equation modeling. , 1998 .
[33] J HarringtonSusan. The effect of codes of ethics and personal denial of responsibility on computer abuse judgements and intentions , 1996 .
[34] Ranjan B. Kini,et al. An exploratory study of moral intensity regarding software piracy of students in Thailand , 2003, Behav. Inf. Technol..
[35] P. Simpson,et al. Softlifting: A model of motivating factors , 1994 .
[36] Larry W. Cornwell,et al. A question of ethics: Developing information system ethics , 1989 .
[37] Jane M. Howell,et al. Personal Computing: Toward a Conceptual Model of Utilization , 1991, MIS Q..
[38] Gurpreet Dhillon,et al. Software piracy: a view from Hong Kong , 2000, CACM.
[39] Ram D. Gopal,et al. Preventive and Deterrent Controls for Software Piracy , 1997, J. Manag. Inf. Syst..
[40] David F. Larcker,et al. Structural Equation Models with Unobservable Variables and Measurement Error: Algebra and Statistics: , 1981 .
[41] Margaret Anne Pierce,et al. Computer ethics: The role of personal, informal, and formal codes , 1996 .
[42] Ranjan B. Kini,et al. An Empirical Study of Software Piracy and Moral Intensity among University Students , 2000 .
[43] Tung-Ching Lin,et al. An intention model-based study of software piracy , 1999, Proceedings of the 32nd Annual Hawaii International Conference on Systems Sciences. 1999. HICSS-32. Abstracts and CD-ROM of Full Papers.
[44] K. Jöreskog,et al. Intraclass Reliability Estimates: Testing Structural Assumptions , 1974 .
[45] Dennis F. Galletta,et al. Developing a Predictive Model of Software Piracy Behavior: An Empirical Study , 1996, ICIS.
[46] Susan J. Harrington,et al. The Effect of Codes of Ethics and Personal Denial of Responsibility on Computer Abuse Judgments and Intentions , 1996, MIS Q..
[47] H C Triandis,et al. Values, attitudes, and interpersonal behavior. , 1980, Nebraska Symposium on Motivation. Nebraska Symposium on Motivation.
[48] Afzaal H. Seyal,et al. Software piracy among academics: an empirical study in Brunei Darussalam , 2000, Inf. Manag. Comput. Secur..
[49] James A. Senn,et al. Challenges and strategies for research in systems development , 1992 .
[50] Wynne W. Chin. Issues and Opinion on Structural Equation Modeling by , 2009 .
[51] Afzaal H. Seyal,et al. Software piracy among computing students: a Bruneian scenario , 1999, Comput. Educ..
[52] Susan J. Harrington,et al. Why People Copy Software and Create Computer Viruses , 1989 .
[53] Ram D. Gopal,et al. International Software Piracy: Analysis of Key Issues and Impacts , 1998, Inf. Syst. Res..
[54] Hsing Kenneth Cheng,et al. Toward a profile of student software piraters , 1996 .
[55] Viswanath Venkatesh,et al. Gender and age differences in employee decisions about new technology: an extension to the theory of planned behavior , 2005, IEEE Transactions on Engineering Management.
[56] Chee-Sing Yap,et al. Testing an Ethical Decision-Making Theory: The Case of Softlifting , 1998, J. Manag. Inf. Syst..
[57] Jung P. Shim,et al. A Comparative Examination of Attitudes Toward Software Piracy Among Business Professors and Executives , 1993 .