Pirating Pirates of the Caribbean: The curse of cyberspace
暂无分享,去创建一个
Ian Phau | Min Teah | Michael Lwin | I. Phau | Min Teah | Michael Lwin
[1] Ian Phau,et al. Targeting buyers of counterfeits of luxury brands: A study on attitudes of Singaporean consumers , 2009 .
[2] M. Sigala,et al. Information sharing and idea generation in peer to peer online communities: The case of `DIALOGOI' , 2008 .
[3] P. Simpson,et al. Softlifting: A model of motivating factors , 1994 .
[4] Gresham M. Sykes,et al. Techniques of neutralization: A theory of delinquency. , 1957 .
[5] C. Hill. Digital piracy: Causes, consequences, and strategic responses , 2007 .
[6] Sameer Hinduja,et al. Neutralization theory and online software piracy: An empirical analysis , 2007, Ethics and Information Technology.
[7] M. de Young. The indignant page: techniques of neutralization in the publications of pedophile organizations. , 1988, Child abuse & neglect.
[8] Byeng-Hee Chang,et al. Exploring Influential Factors on Music Piracy Across Countries , 2006 .
[9] Kelly L. Page,et al. How does the web make youth feel? Exploring the positive digital native rhetoric , 2010 .
[10] Johan Liang,et al. Downloading digital video games: predictors, moderators and consequences , 2012 .
[11] Alejandro Zentner,et al. Online Sales, Internet Use, File Sharing, and the Decline of Retail Music Specialty Stores , 2008, Inf. Econ. Policy.
[12] S. Hinduja,et al. Neutralizing Music Piracy: An Empirical Examination , 2008 .
[13] Ian Grant,et al. Communicating with Young People Through the Eyes of Marketing Practitioners , 2004 .
[14] S. Durvasula,et al. Digital piracy of MP3s: consumer and ethical predispositions , 2008 .
[15] W. William Minor. THE NEUTRALIZATION OF CRIMINAL OFFENSE , 1980 .
[16] Stephen J. Grove,et al. Marketing ethics and the techniques of neutralization , 1987 .
[17] Oz Shy,et al. Internet and peer-to-peer distributions in markets for digital products , 2003 .
[18] Ricky Y. K. Chan,et al. Counterfeit proneness: Conceptualisation and scale development , 2011 .
[19] Raquel Benbunan-Fich,et al. Is music downloading the new prohibition? What students reveal through an ethical dilemma , 2009, Ethics and Information Technology.
[20] Hsing K. Cheng,et al. To Purchase or to Pirate Software: An Empirical Study , 1997, J. Manag. Inf. Syst..
[21] Sudip Bhattacharjee,et al. Digital music and online sharing: software piracy 2.0? , 2003, CACM.
[22] Carl B. Klockars. The Professional Fence , 1975 .
[23] Robert LaRose,et al. Sharing or Piracy? An Exploration of Downloading Behavior , 2005, J. Comput. Mediat. Commun..
[24] T. P. Cronan,et al. Factors that Influence the Intention to Pirate Software and Media , 2008 .
[25] Jennifer Rowley,et al. Understanding digital content marketing , 2008 .
[26] V. Mitchell,et al. Generation Y Attitudes Towards E-ethics and Internet-related Misbehaviours , 2004 .
[27] Joan Oldman,et al. The Professional Fence , 1976 .
[28] Wynne W. Chin,et al. Factors motivating software piracy: a longitudinal study , 2004, IEEE Transactions on Engineering Management.
[29] Shu-Chen Yang,et al. Pirate or Buy? The Moderating Effect of Idolatry , 2009 .
[30] Matthew K. O. Lee,et al. Behavioral intention model for the exchange mode Internet music piracy , 2002, Proceedings of the 35th Annual Hawaii International Conference on System Sciences.
[31] Aron M. Levin,et al. Deterring illegal downloading: the effects of threat appeals, past behavior, subjective norms, and attributions of harm , 2007 .
[32] M. Chang. Predicting Unethical Behavior: A Comparison of the Theory of Reasoned Action and the Theory of Planned Behavior , 1998 .
[33] Jim Mitchell,et al. Types of neutralization and types of delinquency , 1983, Journal of youth and adolescence.
[34] Eric P. Chiang,et al. Music piracy among students on the university campus: Do males and females react differently? , 2008 .
[35] Y L ThongJames,et al. Software Piracy in the Workplace , 2003 .
[36] P. Waelbroeck,et al. Piracy and the Demand for Films: Analysis of Piracy Behavior in French Universities , 2006 .
[37] Jung P. Shim,et al. A Comparative Examination of Attitudes Toward Software Piracy Among Business Professors and Executives , 1993 .
[38] D. Shaw,et al. The Contribution of Ethical Obligation and Self-identity to the Theory of Planned Behaviour: An Exploration of Ethical Consumers , 2000 .
[39] Johan A. Pouwelse,et al. The Bittorrent P2P File-Sharing System: Measurements and Analysis , 2005, IPTPS.
[40] Alan Tse,et al. The Effects of Attitudinal and Demographic Factors on Intention to Buy Pirated CDs: The Case of Chinese Consumers , 2003 .
[41] Fang Wang,et al. Purchasing pirated software: an initial examination of Chinese consumers , 2005 .
[42] R. East,et al. Testing the market maven concept , 2008 .
[43] Elison Ai Ching Lim,et al. Spot the difference: consumer responses towards counterfeits , 2001 .
[44] Stuart Henry,et al. Degrees of Deviance: Student Accounts of Their Deviant Behavior , 1999 .
[45] Robert Agnew,et al. THE TECHNIQUES OF NEUTRALIZATION AND VIOLENCE , 1994 .
[46] Yu-Ping Liu,et al. Predicting the Use of Pirated Software: A Contingency Model Integrating Perceived Risk with the Theory of Planned Behavior , 2010 .
[47] H C Triandis,et al. Values, attitudes, and interpersonal behavior. , 1980, Nebraska Symposium on Motivation. Nebraska Symposium on Motivation.
[48] A. Wołk,et al. Factors influencing website traffic in the paid content market , 2007 .
[49] Jih-Hsin Tang,et al. The Effect of Interpersonal Influence on Softlifting Intention and Behaviour , 2005 .
[50] I. Phau,et al. Devil wears (counterfeit) Prada: a study of antecedents and outcomes of attitudes towards counterfeits of luxury brands , 2009 .
[51] George Christodoulides,et al. Antecedents of attitude and intention towards counterfeit symbolic and experiential products , 2011 .
[52] B. Husted. The Impact of National Culture on Software Piracy , 2000 .
[53] Lucille Ponte. Coming Attractions: Opportunities and Challenges in Thwarting Global Movie Piracy , 2008 .
[54] Piet Bakker. File-sharing--fight, ignore or compete: Paid download services vs. P2P-networks , 2005, Telematics Informatics.
[55] M. Aiken,et al. College student Internet use , 2003 .
[56] D. Shaw,et al. The contribution of ethical obligation and selfidentity to the theory of planned behaviour: an exploration of ethical consumers - a reflective comment , 2013 .
[57] I. Ajzen,et al. Attitude-behavior relations: A theoretical analysis and review of empirical research. , 1977 .
[58] Anthony R. Hendrickson,et al. Computer Aversion and Computer-Use Ethics in US and Asian Cultures , 1998 .
[59] Andrew B. Whinston,et al. Global software piracy revisited , 2004, CACM.
[60] I. Ajzen. The theory of planned behavior , 1991 .
[61] I. Phau,et al. Predictors of Usage Intentions of Pirated Software , 2010 .
[62] Jorgen P. Bansler,et al. Corporate Intranet Implementation: Managing Emergent Technologies and Organizational Practices , 2000, J. Assoc. Inf. Syst..
[63] Szde Yu,et al. College Students’ Justification for Digital Piracy , 2012 .
[64] T. P. Cronan,et al. Digital Piracy: Factors that Influence Attitude Toward Behavior , 2006 .
[65] Ming-Chuan Pan,et al. The Joint Moderating Impact of Moral Intensity and Moral Judgment on Consumer’s Use Intention of Pirated Software , 2009 .
[66] Eleanor O'Higgins,et al. Music piracy: ethical perspectives , 2010 .
[67] Nancy D. Albers-Miller. Consumer misbehavior: why people buy illicit goods , 1999 .
[68] Lorrie Faith Cranor,et al. Analysis of security vulnerabilities in the movie production and distribution process , 2003, DRM '03.
[69] Feng-Yang Kuo,et al. Development and Validation of Ethical Computer Self-Efficacy Measure: The Case of Softlifting , 2001 .
[70] H. Buchan. Ethical Decision Making in the Public Accounting Profession: An Extension of Ajzen’s Theory of Planned Behavior , 2005 .
[71] Robert G Grant,et al. A review of factors affecting online consumer search behaviour from an information value perspective , 2007 .
[72] M. D. Young. The indignant page: techniques of neutralization in the publications of pedophile organizations. , 1988 .
[73] Michael Z. Newman. Free TV , 2012 .
[74] Ainsworth Anthony Bailey,et al. Retail employee theft: a theory of planned behavior perspective , 2006 .
[75] S. Liebowitz. File Sharing: Creative Destruction or Just Plain Destruction?* , 2006, The Journal of Law and Economics.
[76] Dennis F. Galletta,et al. Software Piracy in the Workplace: A Model and Empirical Test , 2003, J. Manag. Inf. Syst..
[77] A. d’Astous,et al. Music Piracy on the Web – How Effective are Anti-Piracy Arguments? Evidence from the Theory of Planned Behaviour , 2005 .
[78] Sally Hibbert,et al. Virtue in Consumption? , 2004 .
[79] L. Harris,et al. Online consumer misbehaviour: an application of neutralization theory , 2009 .
[80] S. Curley,et al. Ripped from the Headlines: What can the Popular Press Teach us about Software Piracy? , 2008 .
[81] Sung Wook Ji,et al. Enforcement and Control of Piracy, Copying, and Sharing in the Movie Industry , 2007 .
[82] T. Heath,et al. (Mis)trust in marketing: a reflection on consumers' attitudes and perceptions , 2008 .
[83] Sylvain Dejean,et al. What can we learn from empirical studies about piracy , 2009 .
[84] J. Burn,et al. Softlifting and piracy: behavior across cultures , 2001 .
[85] V. Mitchell,et al. Investigating UK Consumers' Unethical Attitudes and Behaviours , 2002 .
[86] A. D. Vany,et al. Estimating the Effects of Movie Piracy on Box-office Revenue , 2007 .
[87] Lori N. K. Leonard,et al. Illegal, Inappropriate, And Unethical Behavior In An Information Technology Context: A Study To Explain Influences , 2001, J. Assoc. Inf. Syst..
[88] Charles W Petit. Universe. The gods must be crazy. , 2003, U.S. news & world report.
[89] Bandula Jayatilaka,et al. Softlifting: Exploring Determinants of Attitude , 2008 .
[90] Deborah Cohn,et al. A study of neutralisation theory's application to global consumer ethics: P2P file-trading of musical intellectual property on the internet , 2006 .
[91] D. Randall,et al. Ethical decision making in the medical profession: An application of the theory of planned behavior , 1991 .
[92] Shivendu Shivendu,et al. Economic Implications of Variable Technology Standards for Movie Piracy in a Global Context , 2003, J. Manag. Inf. Syst..
[93] R. Picard. A Note on Economic Losses Due to Theft, Infringement, and Piracy of Protected Works , 2004 .