Software Piracy: Original Insights from a Criminological Perspective
暂无分享,去创建一个
[1] Hsing K. Cheng,et al. To Purchase or to Pirate Software: An Empirical Study , 1997, J. Manag. Inf. Syst..
[2] Galen B. Crow. Defining educational policy on software usage in the light of copyright law , 1989, SIGCSE '89.
[3] R. Stallman. Why software should be free , 1990 .
[4] Diane Lending,et al. Understanding differences in ethical beliefs and behaviors toward software copying: the effects of organization culture , 1999, SIGCPR '99.
[5] C. W. Moore,et al. Ethical attitudes of students and business professionals: A study of moral reasoning , 1988 .
[6] Donald G. Dutton,et al. Wife assaulter's explanations for assault: The neutralization of self-punishment. , 1986 .
[7] R. Kruger. Using copied software: your work product at risk , 1994, Proceedings of WESCON '94.
[8] Karl Dakin. Softlaw: What If There Were No Software Piracy? , 1997, IEEE Softw..
[9] T. Priest,et al. TECHNIQUES OF NEUTRALIZATION: YOUNG ADULT MARIJUANA SMOKERS , 1970 .
[10] Dennis F. Galletta,et al. Developing a Predictive Model of Software Piracy Behavior: An Empirical Study , 1996, ICIS.
[11] G. M. Shewan,et al. Criminology , 1896, The Indian medical gazette.
[12] Heith Copes,et al. societal attachments, offending frequency, and techniques of neutralization , 2003 .
[13] S.E. Goodman,et al. International software piracy , 1992, Computer.
[14] Lori N. K. Leonard,et al. Illegal, Inappropriate, And Unethical Behavior In An Information Technology Context: A Study To Explain Influences , 2001, J. Assoc. Inf. Syst..
[15] A. Reiss,,et al. An Empirical Test of Differential Association Theory* , 1964 .
[16] Susan M. Jaquith. ADOLESCENT MARIJUANA AND ALCOHOL USE , 1981 .
[17] G. C. Griffin,et al. Other People's Money , 2022, Filmmakers and Financing.
[18] D. Cornish,et al. Theory for Practice in Situational Crime Prevention , 2003 .
[19] Quint C. Thurman,et al. Neutralization and Tax Evasion: How Effective Would a Moral Appeal Be in Improving Compliance to Tax Laws? , 1984 .
[20] Lydia L. Gan,et al. An empirical study of software piracy among tertiary institutions in Singapore , 2006, Inf. Manag..
[21] M. Lynn. Hawaii International Conference on System Sciences , 1996 .
[22] D. Dabney,et al. Neutralization and deviance in the workplace: Theft of supplies and medicines by hospital nurses , 1995 .
[23] Gilbert Geis,et al. White Collar Crime: The Heavy Electrical Equipment Antitrust Case of 1961 , 1995 .
[24] Karen Heimer,et al. Race, Family Structure, and Delinquency: A Test of Differential Association and Social Control Theories. , 1987 .
[25] Helen Kelley,et al. Morality and Computers: Attitudes and Differences in Moral Judgments , 1999, Inf. Syst. Res..
[26] Barbara J. Costello. techniques of neutralization and self-esteem: a critical test of social control and neutralization theory , 2000 .
[27] G. A. Avanesov,et al. The Principles of Criminology , 1982 .
[28] Dennis F. Galletta,et al. Software Piracy in the Workplace: A Model and Empirical Test , 2003, J. Manag. Inf. Syst..
[29] Awais Rashid,et al. Software Engineering Ethics in a Digital World , 2009, Computer.
[30] Ram D. Gopal,et al. Global software piracy: you can't get blood out of a turnip , 2000, CACM.
[31] Ian W. Shields,et al. Neutralization and Delinquency among Teenagers , 1994 .
[32] Chee-Sing Yap,et al. Testing an Ethical Decision-Making Theory: The Case of Softlifting , 1998, J. Manag. Inf. Syst..
[33] R. Hollinger,et al. neutralizing in the workplace: an empirical analysis of property theft and production deviance , 1991, Work Place Sabotage.
[34] Jung P. Shim,et al. A Comparative Examination of Attitudes Toward Software Piracy Among Business Professors and Executives , 1993 .
[35] J. Skeem,et al. Criminal Justice and Behavior , 2006 .
[36] Gurpreet Dhillon,et al. Software piracy: a view from Hong Kong , 2000, CACM.
[37] Mark B. Johnson. Software piracy: stopping it before it stops you , 1988, SIGUCCS '88.
[38] R. Aseltine,et al. A reconsideration of parental and peer influences on adolescent deviance. , 1995, Journal of health and social behavior.
[39] E. Sutherland. Principles of criminology, 4th ed. , 1947 .
[40] Wynne W. Chin,et al. Factors motivating software piracy: a longitudinal study , 2004, IEEE Transactions on Engineering Management.
[41] J. D. Orcutt,et al. DIFFERENTIAL ASSOCIATION AND MARIJUANA USE: A CLOSER LOOK AT SUTHERLAND (WITH A LITTLE HELP FROM BECKER)* , 1987 .
[42] Ranjan B. Kini,et al. An exploratory study of moral intensity regarding software piracy of students in Thailand , 2003, Behav. Inf. Technol..
[43] Robert Jackall,et al. Moral mazes: The world of corporate managers , 1989 .
[44] R. Matsueda. Testing control theory and differential association: A causal modeling approach. , 1982 .
[45] John Weckert,et al. Computer and Information Ethics , 1997 .
[46] Wallace A. Wood,et al. Situational determinants of software piracy: An equity theory perspective , 1996 .
[47] I. Ajzen. The theory of planned behavior , 1991 .
[48] M. Chang. Predicting Unethical Behavior: A Comparison of the Theory of Reasoned Action and the Theory of Planned Behavior , 1998 .
[49] P. Simpson,et al. Softlifting: A model of motivating factors , 1994 .
[50] Paul F. Cromwell,et al. the devil made me do it: use of neutralizations by shoplifters , 2003 .
[51] B. Byers,et al. Bias Crime Motivation , 1999 .
[52] Gordon B. Davis,et al. User Acceptance of Information Technology: Toward a Unified View , 2003, MIS Q..
[53] Ivan P. L. Png,et al. Software pricing and copyright enforcement: private profit vis-a-vis social welfare , 1999, ICIS.
[54] W. W. Minor,et al. Techniques of Neutralization: a Reconceptualization and Empirical Examination , 1981 .
[55] A. Adam. Whatever happened to information systems ethics? Caught between the devil and the deep blue sea , 2004 .
[56] R. Homel. The Politics and Practice of Situational Crime Prevention , 1996 .
[57] James R. Rest. Background: theory and research , 1994 .
[58] Mikko T. Siponen,et al. The relevance of software rights: An anthology of the divergence of sociopolitical doctrines , 2005, AI & SOCIETY.
[59] Darryl A. Seale,et al. It's not really theft!: Personal and workplace ethics that enable software piracy , 1998, Behav. Inf. Technol..
[60] Patrick T. Macdonald,et al. Competing Theoretical Explanations of Cocaine Use: Differential Association Versus Control Theory , 1989 .
[61] Denise B. Kandel,et al. FRIENDSHIP NETWORKS, INTIMACY, AND ILLICIT DRUG USE IN YOUNG ADULTHOOD: A COMPARISON OF TWO COMPETING THEORIES* , 1991 .
[62] T. Gabor. Everybody Does It!: Crime by the Public , 1994 .
[63] D. Cornish. OPPORTUNITIES, PRECIPITATORS AND CRIMINAL DECISIONS: A REPLY TO WORTLEY'S CRITIQUE OF SITUATIONAL CRIME PREVENTION , 2003 .
[64] Robert Brame,et al. ON THE INITIATION AND CONTINUATION OF DELINQUENCY , 1994 .
[65] R. Wortley. Guilt, shame and situational crime prevention , 1996 .
[66] Michael B. Blankenship,et al. examining the role of differential association and techniques of neutralization in explaining corporate crime , 2005 .
[67] Gresham M. Sykes,et al. Techniques of neutralization: A theory of delinquency. , 1957 .
[68] George E. Higgins,et al. An Application of Deterrence Theory to Software Piracy , 2005 .
[69] R. A. Dodder,et al. techniques of neutralization used by deer poachers in the western united states: a research note , 1999 .
[70] Tung-Ching Lin,et al. An intention model-based study of software piracy , 1999, Proceedings of the 32nd Annual Hawaii International Conference on Systems Sciences. 1999. HICSS-32. Abstracts and CD-ROM of Full Papers.
[71] Richard M. Stallman,et al. The GNU manifesto , 1990 .
[72] Trevor T. Moores,et al. Ethical Decision Making in Software Piracy: Initial Development and a Test of a Four-Component Model , 2006, MIS Q..
[73] Ram D. Gopal,et al. Preventive and Deterrent Controls for Software Piracy , 1997, J. Manag. Inf. Syst..
[74] Michael L. Benson,et al. DENYING THE GUILTY MIND: ACCOUNTING FOR INVOLVEMENT IN A WHITE‐COLLAR CRIME* , 1985 .