Equity perceptions as a deterrent to software piracy behavior
暂无分享,去创建一个
[1] Ram D. Gopal,et al. Preventive and Deterrent Controls for Software Piracy , 1997, J. Manag. Inf. Syst..
[2] Joseph W. Harder. Equity theory versus expectancy theory: The case of major league baseball free agents. , 1991 .
[3] David G Steel,et al. Which Countries Protect Intellectual Property? The Case of Software Piracy , 2000 .
[4] G. W. Walster,et al. New directions in equity research. , 1973 .
[5] R. Hoyle. Structural equation modeling: concepts, issues, and applications , 1997 .
[6] J. S. Adams,et al. Inequity In Social Exchange , 1965 .
[7] Margaret Anne Pierce,et al. Judgements about Computer Ethics: Do Individual, Co-worker, and Company Judgements Differ? Do Company Codes Make a Difference , 2000 .
[8] Sirkka L. Jarvenpaa,et al. Is Anybody Out There? Antecedents of Trust in Global Virtual Teams , 1998, J. Manag. Inf. Syst..
[9] Gordon B. Davis,et al. User Acceptance of Information Technology: Toward a Unified View , 2003, MIS Q..
[10] Anne Griffith,et al. Software Piracy and Global Competitiveness: Report on Global Software Piracy , 1998 .
[11] Jasbir Dhaliwal,et al. A reversed context analysis of software piracy issues in Singapore , 2004, Inf. Manag..
[12] Gilbert A. Churchill. A Paradigm for Developing Better Measures of Marketing Constructs , 1979 .
[13] Icek Ajzen,et al. Equity in Attitude Formation and Change , 1982 .
[14] Lori N. K. Leonard,et al. What influences IT ethical behavior intentions - planned behavior, reasoned action, perceived importance, or individual characteristics? , 2004, Inf. Manag..
[15] Jerald Greenberg,et al. The Justice Concept in Social Psychology , 1982 .
[16] T. Jones. Ethical Decision Making by Individuals in Organizations: An Issue-Contingent Model , 1991 .
[17] Gurpreet Dhillon,et al. Software piracy: a view from Hong Kong , 2000, CACM.
[18] Ranjan B. Kini,et al. Shaping of Moral Intensity regarding Software Piracy in University Students: Immediate Community Effects , 2001, J. Comput. Inf. Syst..
[19] Torstein Einang Eckhoff,et al. Justice: its determinants in social interaction , 1974 .
[20] Jin H. Im,et al. Software piracy and software security measures in business schools , 1992, Inf. Manag..
[21] B. Husted. The Impact of National Culture on Software Piracy , 2000 .
[22] Feng-Yang Kuo,et al. Development and Validation of Ethical Computer Self-Efficacy Measure: The Case of Softlifting , 2001 .
[23] Charles D. Barrett. Understanding Attitudes and Predicting Social Behavior , 1980 .
[24] Clifford M. Koen,et al. Software piracy and responsibilities of educational institutions , 1990, Inf. Manag..
[25] Kailash Joshi,et al. An Investigation of Equity as a Determinant of User Information Satisfaction , 1990 .
[26] Dennis F. Galletta,et al. Software Piracy in the Workplace: A Model and Empirical Test , 2003, J. Manag. Inf. Syst..
[27] G. Leventhal. What Should Be Done with Equity Theory? New Approaches to the Study of Fairness in Social Relationships. , 1976 .
[28] I. Ajzen,et al. Attitude-behavior relations: A theoretical analysis and review of empirical research. , 1977 .
[29] Susan J. Harrington,et al. Why People Copy Software and Create Computer Viruses , 1989 .
[30] Rolph E. Anderson,et al. Multivariate Data Analysis with Readings , 1979 .
[31] Ram D. Gopal,et al. International Software Piracy: Analysis of Key Issues and Impacts , 1998, Inf. Syst. Res..
[32] K. Mardia. Measures of multivariate skewness and kurtosis with applications , 1970 .
[33] Detmar W. Straub,et al. Structural Equation Modeling and Regression: Guidelines for Research Practice , 2000, Commun. Assoc. Inf. Syst..
[34] I. Ajzen,et al. A Comparison of the Theory of Planned Behavior and the Theory of Reasoned Action , 1992 .
[35] Chee-Sing Yap,et al. Testing an Ethical Decision-Making Theory: The Case of Softlifting , 1998, J. Manag. Inf. Syst..
[36] Daniel L. Sherrell,et al. Communications of the Association for Information Systems , 1999 .
[37] Timothy Paul Cronan,et al. Modeling IT Ethics: A Study in Situational Ethics , 1998, MIS Q..
[38] E. Berscheid,et al. When does a harm-doer compensate a victim? , 1967, Journal of personality and social psychology.
[39] G. Lawrence Sanders,et al. Considerations in Ethical Decision-Making and Software Piracy , 2001 .
[40] J. Traupmann,et al. Equity: Theory and Research , 1978 .
[41] I. Ajzen,et al. Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research , 1977 .
[42] Hsing Kenneth Cheng,et al. Toward a profile of student software piraters , 1996 .
[43] B. Tan. Understanding consumer ethical decision making with respect to purchase of pirated software , 2002 .
[44] G. Leventhal,et al. The Distribution of Rewards and Resources in Groups and Organizations , 1976 .
[45] J. Nunnally. Psychometric Theory (2nd ed), New York: McGraw-Hill. , 1978 .
[46] Wallace A. Wood,et al. Situational determinants of software piracy: An equity theory perspective , 1996 .
[47] S. Hunt,et al. A General Theory of Marketing Ethics , 1986 .