Software Piracy Research: A Cross-disciplinary Systematic Review
暂无分享,去创建一个
Jerald Hughes | Vishal Midha | Francis Kofi Andoh-Baidoo | Juan A. Chavarria | Juan A. Chavarria | V. Midha | Jerald Hughes | F. Andoh-Baidoo
[1] G. Lawrence Sanders,et al. Considerations in Ethical Decision-Making and Software Piracy , 2001 .
[2] George E. Higgins,et al. An Application of Deterrence Theory to Software Piracy , 2005 .
[3] Hsing K. Cheng,et al. To Purchase or to Pirate Software: An Empirical Study , 1997, J. Manag. Inf. Syst..
[4] Lynette Owen,et al. Piracy , 2001, Learn. Publ..
[5] Pei-Hsuan Hsieh. Does age matter? Students’ perspectives of unauthorized software copying under legal and ethical considerations. , 2012 .
[6] R. Mason. Four ethical issues of the information age , 1986 .
[7] Prashant Palvia,et al. Management Information Systems Research: What's There in a Methodology? , 2003, Commun. Assoc. Inf. Syst..
[8] Edgar H. Sibley,et al. A profile of information systems research published in Information & Management , 2007, Inf. Manag..
[9] Kar Yan Tam,et al. Research Note - Applying the Randomized Response Technique to Elicit Truthful Responses to Sensitive Questions in IS Research: The Case of Software Piracy Behavior , 2010, Inf. Syst. Res..
[10] D. Bernhardt,et al. Pirated for Profit , 1998 .
[11] R. Harrison,et al. A Meta-analysis of Multidisciplinary Research , 2012 .
[12] George E. Higgins,et al. Low Self-Control, Moral Beliefs, and Social Learning Theory in University Students’ Intentions to Pirate Software , 2006 .
[13] Vatcharaporn Esichaikul,et al. Socialization and Software Piracy: A Study , 2011, J. Comput. Inf. Syst..
[14] William R. Swinyard,et al. The morality of software piracy: A cross-cultural analysis , 1990 .
[15] K. R. Conner,et al. Software piracy: an analysis of protection strategies , 1991 .
[16] David G Steel,et al. Which Countries Protect Intellectual Property? The Case of Software Piracy , 2000 .
[17] William R. King,et al. External Validity in IS Survey Research , 2005, Commun. Assoc. Inf. Syst..
[18] Marton Gergely,et al. Schools of Thought in Software Piracy Research , 2013, AMCIS.
[19] Ram D. Gopal,et al. International Software Piracy: Analysis of Key Issues and Impacts , 1998, Inf. Syst. Res..
[20] Na Li,et al. The Intellectual Development of Human-Computer Interaction Research: A Critical Assessment of the MIS Literature (1990-2002) , 2005, J. Assoc. Inf. Syst..
[21] Venkataraman Ramesh,et al. Research in Information Systems: An Empirical Study of Diversity in the Discipline and Its Journals , 2002, J. Manag. Inf. Syst..
[22] T. Moores. An Analysis of the Impact of Economic Wealth and National Culture on the Rise and Fall of Software Piracy Rates , 2008 .
[23] M. L. Gibson,et al. Students as Surrogates for Managers in a Decision-Making Environment: An Experimental Study , 1991, J. Manag. Inf. Syst..
[24] Paul Stephens,et al. An Exploration of the Ideologies of Software Intellectual Property: The Impact on Ethical Decision Making , 2007 .
[25] Vijay Mahajan,et al. How many pirates should a software firm tolerate? An analysis of piracy protection on the diffusion of software , 2003 .
[26] Varun Grover,et al. Analyzing methodological rigor of MIS survey research from 1980-1989 , 1993, Inf. Manag..
[27] Detmar W. Straub,et al. Key information liability issues facing managers: software piracy, proprietary databases, and indi , 1990 .
[28] Helen Kelley,et al. Research Commentary - Generalizability of Information Systems Research Using Student Subjects - A Reflection on Our Practices and Recommendations for Future Research , 2012, Inf. Syst. Res..
[29] Josephine E. Olson,et al. Top-25-Business-School Professors Rate Journals in Operations Management and Related Fields , 2005, Interfaces.
[30] John F. Rockart,et al. Editor’s comments , 2005, MIS Q. Executive.
[31] Trevor T. Moores. The effect of national culture and economic wealth on global software piracy rates , 2003, CACM.
[32] Edward Bernroider,et al. Research in information systems: a study of diversity and inter-disciplinary discourse in the AIS basket journals between 1995 and 2011 , 2013, J. Inf. Technol..
[33] Ram D. Gopal,et al. Global software piracy: you can't get blood out of a turnip , 2000, CACM.
[34] Vijay Mahajan,et al. The Effect of Piracy on the Market Penetration of Subscription Software , 2004 .
[35] Alan R. Hevner,et al. POSITIONING AND PRESENTING DESIGN SCIENCE RESEARCH FOR MAXIMUM IMPACT 1 , 2013 .
[36] Detmar W. Straub,et al. Current and Future Uses of the Group Decision Support System Technology: Report on a Recent Empirical Study , 1988, J. Manag. Inf. Syst..
[37] Maurice Landry,et al. Can the field of MIS be disciplined? , 1989, CACM.
[38] Mikko T. Siponen,et al. New insights into the problem of software piracy: The effects of neutralization, shame, and moral beliefs , 2012, Inf. Manag..
[39] Peter B. Seddon,et al. OTHER-SETTINGS GENERALIZATION IN IS RESEARCH , 2006 .
[40] Shirley Gregor,et al. The Nature of Theory in Information Systems , 2006, MIS Q..
[41] B. Husted. The Impact of National Culture on Software Piracy , 2000 .
[42] A. Nederhof. Methods of coping with social desirability bias: A review. , 1985 .
[43] Ranjan B. Kini,et al. An exploratory study of moral intensity regarding software piracy of students in Thailand , 2003, Behav. Inf. Technol..
[44] Venkataraman Ramesh,et al. A unified classification system for research in the computing disciplines , 2005, Inf. Softw. Technol..
[45] I. Ajzen,et al. Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research , 1977 .
[46] Trevor T. Moores,et al. Knowledge of Software Piracy as an Antecedent to Reducing Pirating Behavior , 2009, J. Comput. Inf. Syst..
[47] Vijay Mahajan,et al. Software Piracy: Estimation of Lost Sales and the Impact on Software Diffusion , 1995 .
[48] Paul Belleflamme,et al. Digital Piracy: An Update , 2014 .
[49] Suzanne Rivard,et al. A Keyword Classification Scheme for IS Research Literature: An Update , 1993 .
[50] Jack Belzer,et al. Encyclopedia of Computer Science and Technology , 2002 .
[51] Alok Mishra,et al. Ethical behavior issues in software use: An analysis of public and private sectors , 2009, Comput. Hum. Behav..
[52] Erwin Fielt,et al. Exploring Shared Services from an IS Perspective: A Literature Review and Research Agenda , 2014, Commun. Assoc. Inf. Syst..
[53] Michael A. Nelson,et al. Determinants of software piracy: economics, institutions, and technology , 2009 .
[54] Michael A. Nelson,et al. Shadow economy and international software piracy , 2012 .
[55] Yogesh Kumar Dwivedi,et al. The beginnings of a new era: time to reflect on 17 years of the ISJ , 2008, Inf. Syst. J..
[56] Michael J. Ginzberg,et al. MIS and the behavioral sciences: research patterns and prescriptions , 1982, DATB.
[57] Lydia L. Gan,et al. An empirical study of software piracy among tertiary institutions in Singapore , 2006, Inf. Manag..
[58] Alok Mishra,et al. Software piracy among IT professionals in organizations , 2006, Int. J. Inf. Manag..
[59] J. R. Landis,et al. The measurement of observer agreement for categorical data. , 1977, Biometrics.
[60] Pamela Samuelson,et al. A Case Study on Computer Programs , 1993 .
[61] James W. Peltier,et al. Factors that influence software piracy , 2010, Commun. ACM.
[62] Byron Keating. Distribution Channels: Understanding and Managing Channels to Market , 2010 .
[63] Robert E. Crossler,et al. Privacy in the Digital Age: A Review of Information Privacy Research in Information Systems , 2011, MIS Q..
[64] D. O. Sears. College sophomores in the laboratory: Influences of a narrow data base on social psychology's view of human nature. , 1986 .
[65] J. Venable. Incorporating design science research and critical research into an introductory business research methods course , 2011 .
[66] B. Tan. Understanding consumer ethical decision making with respect to purchase of pirated software , 2002 .
[67] David C. Yen,et al. Software Asset Management: Analysis, Development and Implementation , 1999 .
[68] T. S. Raghu,et al. Strategic Analysis of Corporate Software Piracy Prevention and Detection , 2005, J. Organ. Comput. Electron. Commer..
[69] Liisa von Hellens,et al. Qualitative Research in Information Systems , 2007, Australas. J. Inf. Syst..
[70] Simplice Asongu,et al. Fighting Software Piracy: Which Governance Tools Matter in Africa? , 2012, Journal of Business Ethics.
[71] Viswanath Venkatesh,et al. Bridging the Qualitative-Quantitative Divide: Guidelines for Conducting Mixed Methods Research in Information Systems , 2013, MIS Q..
[72] Mark Srite,et al. The Role of Espoused National Cultural Values in Technology Acceptance , 2006, MIS Q..
[73] David Alan Grier. Long John Software and the Digital Jolly Roger , 2008, Computer.
[74] Richard A. Reid,et al. Software piracy: Is it related to level of moral judgment? , 1994 .
[75] Yi-Ching Hsieh,et al. How to Encourage Customers to Use Legal Software , 2008 .
[76] George E. Higgins. can low self-control help with the understanding of the software piracy problem? , 2004 .
[77] Paul Benjamin Lowry,et al. A Systematic Review of Social Networks Research in Information Systems: Building a Foundation for Exciting Future Research , 2015, Commun. Assoc. Inf. Syst..
[78] Alexander Nill,et al. Global software piracy: Trends and strategic considerations , 2009 .
[79] Kallol Kumar Bagchi,et al. Global software piracy , 2006, Commun. ACM.
[80] Sigi Goode,et al. Use, perceived deterrence and the role of software piracy in video game console adoption , 2012, Inf. Syst. Frontiers.
[81] Willie Breeze,et al. The Relationship of Theory and Research , 1993, AORN Journal.
[82] H C Triandis,et al. Values, attitudes, and interpersonal behavior. , 1980, Nebraska Symposium on Motivation. Nebraska Symposium on Motivation.
[83] Varun Grover,et al. The Effect of an IS Article's Structure on Its Impact , 2010, Commun. Assoc. Inf. Syst..
[84] Rajeev K. Goel,et al. Does Software Piracy Affect Economic Growth? Evidence Across Countries , 2012 .
[85] Wynne W. Chin,et al. Factors motivating software piracy: a longitudinal study , 2004, IEEE Transactions on Engineering Management.
[86] Jasbir Dhaliwal,et al. A reversed context analysis of software piracy issues in Singapore , 2004, Inf. Manag..
[87] Jia Lu,et al. Chinese culture and software copyright , 2009, New Media Soc..
[88] Ian Weber,et al. Internet Software Piracy in China: A User Analysis of Resistance to Global Software Copyright Enforcement , 2009 .
[89] Zheng Yan,et al. Software Piracy among College Students: A Comprehensive Review of Contributing Factors, Underlying Processes, and Tackling Strategies , 2005 .
[90] Wanda J. Orlikowski,et al. Studying Information Technology in Organizations: Research Approaches and Assumptions , 1991, Inf. Syst. Res..
[91] Tim Maude,et al. Hardware protection against software piracy , 1984, CACM.
[92] George E. Higgins. Gender Differences in Software Piracy: The Mediating Roles of Self-Control Theory and Social Learning Theory , 2006 .
[93] Alex Kigerl,et al. Infringing Nations: Predicting Software Piracy Rates, BitTorrent Tracker Hosting, and P2P File Sharing Client Downloads Between Countries , 2013 .
[94] Sameer Hinduja,et al. Neutralization theory and online software piracy: An empirical analysis , 2007, Ethics and Information Technology.
[95] Ranjan B. Kini,et al. Shaping of Moral Intensity regarding Software Piracy in University Students: Immediate Community Effects , 2001, J. Comput. Inf. Syst..
[96] Erwin Fielt,et al. The Impact Of Software-As-A-Service On Business Models Of Leading Software Vendors: Experiences From Three Exploratory Case Studies , 2011, PACIS.
[97] Rudy Hirschheim,et al. A paradigmatic and methodological examination of information systems research from 1991 to 2001 , 2004, Inf. Syst. J..
[98] Steven Downing,et al. Social Control in a Subculture of Piracy , 2010 .
[99] Gurpreet Dhillon,et al. Software piracy: a view from Hong Kong , 2000, CACM.
[100] Patricia Carlson,et al. A Review of MIS Research and Disciplinary Development , 1992, J. Manag. Inf. Syst..
[101] Yogesh Kumar Dwivedi,et al. Profile of IS research published in the European Journal of Information Systems , 2008, Eur. J. Inf. Syst..
[102] Atanu Lahiri. Revisiting the incentive to tolerate illegal distribution of software products , 2012, Decis. Support Syst..
[103] Andrew B. Whinston,et al. Global software piracy revisited , 2004, CACM.
[104] Chee-Sing Yap,et al. Testing an Ethical Decision-Making Theory: The Case of Softlifting , 1998, J. Manag. Inf. Syst..
[105] Jung P. Shim,et al. A Comparative Examination of Attitudes Toward Software Piracy Among Business Professors and Executives , 1993 .
[106] David A. Makin,et al. Does Social Learning Theory Condition the Effects of Low Self-Control on College Students' Software Piracy? , 2004 .
[107] Ron Honick. Software Piracy Exposed , 2005 .
[108] Ranjan B. Kini,et al. Shaping of Moral Intensity Regarding Software Piracy: A Comparison Between Thailand and U.S. Students , 2004 .
[109] Heng Xu,et al. Information Privacy Research: An Interdisciplinary Review , 2011, MIS Q..
[110] Ricky Y. K. Chan,et al. Does ethical ideology affect software piracy attitude and behaviour? An empirical investigation of computer users in China , 2011, Eur. J. Inf. Syst..
[111] Gerald E. Fryxell,et al. Global Software Piracy: Searching for Further Explanations , 2009 .
[112] Tero Vartiainen,et al. Unauthorized copying of software and levels of moral development: a literature analysis and its implications for research and practice , 2004, Inf. Syst. J..
[113] Hsing Kenneth Cheng,et al. Optimal software pricing in the presence of piracy and word-of-mouth effect , 2011, Decis. Support Syst..
[114] Detmar W. Straub,et al. Effective IS Security: An Empirical Study , 1990, Inf. Syst. Res..
[115] Clyde W. Holsapple,et al. Parameters for Software Piracy Research , 2008, Inf. Soc..
[116] A. Viera,et al. Understanding interobserver agreement: the kappa statistic. , 2005, Family medicine.
[117] Burton Grad,et al. A Personal Recollection: IBM's Unbundling of Software and Services , 2002, IEEE Ann. Hist. Comput..
[118] Detmar W. Straub,et al. Measuring Researcher-Production in Information Systems , 2002, J. Assoc. Inf. Syst..
[119] Malcolm McRoberts. Software Licensing in the Cloud Age , 2014, ArXiv.
[120] A. Andrés. Software piracy and income inequality , 2006 .
[121] Paul E. Ceruzzi,et al. A history of modern computing , 1999 .
[122] M. Saeed,et al. Enhancement of Software Engineering by Shifting From Software Product to Software Service , 2005, 2005 International Conference on Information and Communication Technologies.
[123] Trevor T. Moores. Untangling the Web of Relationships Between Wealth, Culture, and Global Software Piracy Rates: A Path Model , 2010, J. Glob. Inf. Manag..
[124] Hsing Kenneth Cheng,et al. Toward a profile of student software piraters , 1996 .
[125] Jane M. Carey,et al. The Intellectual Advancement of Human-Computer Interaction Research: A Critical Assessment of the MIS Literature (1990-2008) , 2009 .
[126] Shirley Gregor,et al. The Anatomy of a Design Theory , 2007, J. Assoc. Inf. Syst..
[127] P. Simpson,et al. Softlifting: A model of motivating factors , 1994 .
[128] Dirk Draheim,et al. Cloud-Aided Software Engineering: Evolving Viable Software Systems Through a Web of Views , 2013 .
[129] Dennis F. Galletta,et al. Software Piracy in the Workplace: A Model and Empirical Test , 2003, J. Manag. Inf. Syst..
[130] John Mingers,et al. Multimethodology: Towards a framework for mixing methodologies , 1997 .
[131] Jerry Fjermestad,et al. Electronic Commerce Customer Relationship Management: An Assessment of Research , 2001, Int. J. Electron. Commer..
[132] Dyuti S. Banerjee. On the sufficiency of regulatory enforcement in combating piracy , 2011 .
[133] D. Yang,et al. Alleviating piracy through open source strategy: An exploratory study of business software firms in China , 2009, J. Strateg. Inf. Syst..
[134] Deli Yang,et al. Economic and Cultural Impact on Intellectual Property Violations: A Study of Software Piracy , 2007 .
[135] David A. Makin,et al. Self-Control, Deviant Peers, and Software Piracy , 2004, Psychological reports.
[136] Wilfried R. Vanhonacker,et al. Optimal strategic pricing of reproducible consumer products , 1988 .
[137] Sigi Goode,et al. Exploring software piracy as a factor of video game console adoption , 2012, Behav. Inf. Technol..
[138] Trevor T. Moores,et al. Ethical Decision Making in Software Piracy: Initial Development and a Test of a Four-Component Model , 2006, MIS Q..
[139] Ram D. Gopal,et al. Preventive and Deterrent Controls for Software Piracy , 1997, J. Manag. Inf. Syst..
[140] 김정남. 고객과 지식 Marketing , 2003 .
[141] Venkataraman Ramesh,et al. Research in software engineering: an analysis of the literature , 2002, Inf. Softw. Technol..
[142] Victoria L. Crittenden,et al. Hard Facts About Software Piracy , 2007 .
[143] Venkataraman Ramesh,et al. An analysis of research in computing disciplines , 2004, CACM.
[144] Clifford M. Koen,et al. Software piracy and its legal implications , 1997, Inf. Manag..
[145] Alok Mishra,et al. Organizational software piracy: an empirical assessment , 2007, Behav. Inf. Technol..
[146] Ronald L. Graham. The legal protection of computer software , 1984, CACM.
[147] Prashant Palvia,et al. Research Methodologies in MIS: An Update , 2004, Commun. Assoc. Inf. Syst..
[148] Jukka Vuorinen,et al. Ethical codes in the digital world: comparisons of the proprietary, the open/free and the cracker system , 2007, Ethics and Information Technology.
[149] Sigi Goode,et al. Exploring the supply of pirate software for mobile devices: An analysis of software types and piracy groups , 2010, Inf. Manag. Comput. Secur..
[150] Yogesh Kumar Dwivedi,et al. The diffusion and use of institutional theory: a cross-disciplinary longitudinal literature survey , 2009, J. Inf. Technol..