Factors Motivating Software Piracy in Vietnam
暂无分享,去创建一个
[1] Malcolm Munro,et al. Information Technology Assessment and Adoption: A Field Study , 1985, MIS Q..
[2] Pamela S. Tolbert,et al. Institutional Sources of Change in the Formal Structure of Organizations: The Diffusion of Civil Service Reform, 1880-1935 , 1983 .
[3] R. Burt. Social Contagion and Innovation: Cohesion versus Structural Equivalence , 1987, American Journal of Sociology.
[4] Detmar W. Straub,et al. Key information liability issues facing managers: software piracy, proprietary databases, and indi , 1990 .
[5] Andrew J. Flanagin. Social pressures on organizational website adoption , 2000 .
[6] Ram D. Gopal,et al. International Software Piracy: Analysis of Key Issues and Impacts , 1998, Inf. Syst. Res..
[7] Hsing K. Cheng,et al. To Purchase or to Pirate Software: An Empirical Study , 1997, J. Manag. Inf. Syst..
[8] W. Powell,et al. The iron cage revisited institutional isomorphism and collective rationality in organizational fields , 1983 .
[9] Dennis F. Galletta,et al. Software Piracy in the Workplace: A Model and Empirical Test , 2003, J. Manag. Inf. Syst..
[10] K. Jöreskog,et al. Intraclass Reliability Estimates: Testing Structural Assumptions , 1974 .
[11] I. Ajzen. Nature and operation of attitudes. , 2001, Annual review of psychology.
[12] Arun Sundararajan,et al. Managing Digital Piracy: Pricing and Protection , 2004, Inf. Syst. Res..
[13] Gary J. Schaub. Deterrence, Compellence, and Prospect Theory , 2004 .
[14] Alexander Hars,et al. Web Based Knowledge Infrastructures for the Sciences: An Adaptive Document , 2000, Commun. Assoc. Inf. Syst..
[15] Gurpreet Dhillon,et al. Software piracy: a view from Hong Kong , 2000, CACM.
[16] I. Ehrlich. Crime, Punishment, and the Market for Offenses , 1996 .
[17] W. Powell,et al. The New Institutionalism in Organizational Analysis , 1992 .
[18] Lyne Bouchard,et al. Decision Criteria in the Adoption of EDI , 1993, ICIS.
[19] I. Ajzen. The theory of planned behavior , 1991 .
[20] Izak Benbasat,et al. Predicting Intention to Adopt Interorganizational Linkages: An Institutional Perspective , 2003, MIS Q..
[21] Detmar W. Straub,et al. Structural Equation Modeling and Regression: Guidelines for Research Practice , 2000, Commun. Assoc. Inf. Syst..
[22] K. R. Conner,et al. Software piracy: an analysis of protection strategies , 1991 .
[23] Sudip Bhattacharjee,et al. A Behavioral Model of Digital Music Piracy , 2004, J. Organ. Comput. Electron. Commer..
[24] Ram D. Gopal,et al. Global software piracy: you can't get blood out of a turnip , 2000, CACM.
[25] Vijay Mahajan,et al. Software Piracy: Estimation of Lost Sales and the Impact on Software Diffusion , 1995 .
[26] Wynne W. Chin. Issues and Opinion on Structural Equation Modeling by , 2009 .
[27] Clifford M. Koen,et al. Software piracy and its legal implications , 1997, Inf. Manag..
[28] Michael Parent,et al. Mimetic Isomorphism and Technology Evaluation: Does Imitation Transcend Judgment? , 2002, J. Assoc. Inf. Syst..
[29] Robert M. Davison,et al. SME adoption of IT: the case of electronic trading systems , 2006, IEEE Transactions on Engineering Management.
[30] Ram D. Gopal,et al. Preventive and Deterrent Controls for Software Piracy , 1997, J. Manag. Inf. Syst..
[31] Qing Hu,et al. The role of external and internal influences on information systems security - a neo-institutional perspective , 2007, J. Strateg. Inf. Syst..
[32] T. P. Cronan,et al. Digital Piracy: Factors that Influence Attitude Toward Behavior , 2006 .