Three-Level Mechanism of Consumer Digital Piracy: Development and Cross-Cultural Validation

[1]  Ian Phau,et al.  Pirating Pirates of the Caribbean: The curse of cyberspace , 2014 .

[2]  Mateja Kos Koklic,et al.  The study of perceived adverse effects of digital piracy and involvement: insights from adult computer users , 2014, Behav. Inf. Technol..

[3]  Moutaz Khouja,et al.  Analysis of the effectiveness of preventive and deterrent piracy control strategies: Agent-based modeling approach , 2013, Comput. Hum. Behav..

[4]  Connie R. Bateman,et al.  Ethical Decision Making in a Peer-to-Peer File Sharing Situation: The Role of Moral Absolutes and Social Consensus , 2013 .

[5]  Mikko T. Siponen,et al.  New insights into the problem of software piracy: The effects of neutralization, shame, and moral beliefs , 2012, Inf. Manag..

[6]  Sigi Goode Initial findings of a gap analysis of the digital piracy literature: Six undiscovered countries , 2012 .

[7]  Mateja Kos Koklic,et al.  Predicting consumer digital piracy behavior , 2012 .

[8]  Hsiao-chien Tsui,et al.  Piracy and social norm of anti-piracy , 2012 .

[9]  Seunghee Lee,et al.  Asymmetrical effects of past experiences with genuine fashion luxury brands and their counterfeits on purchase intention of each , 2012 .

[10]  Heith Copes,et al.  Exploring the Temporal Dynamics of the Neutralization/Delinquency Relationship , 2012 .

[11]  Szde Yu,et al.  College Students’ Justification for Digital Piracy , 2012 .

[12]  Szu-Yu Chou,et al.  You do the service but they take the order , 2012 .

[13]  Mark M.H. Goode,et al.  DVD Pirating Intentions: Angels, Devils, Chancers and Receivers , 2012 .

[14]  Yue Pan,et al.  Predictors, consequence, and measurement of ethical judgments: Review and meta-analysis , 2012 .

[15]  Stefan Schmid,et al.  50 years of research on international standardization and adaptation—From a systematic literature analysis to a theoretical framework , 2011 .

[16]  Kate L. Daunt,et al.  Customers acting badly: Evidence from the hospitality industry , 2011 .

[17]  Kate L. Daunt,et al.  Deviant customer behaviour: A study of techniques of neutralisation , 2011 .

[18]  Suzannah Mirghani The War on Piracy: Analyzing the Discursive Battles of Corporate and Government-Sponsored Anti-Piracy Media Campaigns , 2011 .

[19]  Cheolho Yoon Theory of Planned Behavior and Ethics Theory in Digital Piracy: An Integrated Model , 2011 .

[20]  Hassan Aleassa,et al.  Investigating Software Piracy in Jordan: An Extension of the Theory of Reasoned Action , 2011 .

[21]  M. Dacin,et al.  Psychological Pathways to Fraud: Understanding and Preventing Fraud in Organizations , 2011 .

[22]  Kevin J. Shanahan,et al.  Motivators and enablers of SCOURing: A study of online piracy in the US and UK , 2010 .

[23]  T. Holt,et al.  Transferring Subcultural Knowledge On-Line: Practices and Beliefs of Persistent Digital Pirates , 2010 .

[24]  I. Phau,et al.  Predictors of Usage Intentions of Pirated Software , 2010 .

[25]  Yu-Ping Liu,et al.  Predicting the Use of Pirated Software: A Contingency Model Integrating Perceived Risk with the Theory of Planned Behavior , 2010 .

[26]  L. Harris,et al.  Online consumer misbehaviour: an application of neutralization theory , 2009 .

[27]  Trevor T. Moores,et al.  Knowledge of Software Piracy as an Antecedent to Reducing Pirating Behavior , 2009, J. Comput. Inf. Syst..

[28]  George E. Higgins,et al.  Neutralizing Potential and Self-Reported Digital Piracy , 2009 .

[29]  Whitney D. Gunter,et al.  Internet Scallywags: A Comparative Analysis of Multiple Forms and Measurements of Digital Piracy , 2009 .

[30]  Alexander Nill,et al.  Global software piracy: Trends and strategic considerations , 2009 .

[31]  Steven A. Taylor,et al.  Intention to Engage in Digital Piracy , 2009 .

[32]  S. Curley,et al.  Ripped from the Headlines: What can the Popular Press Teach us about Software Piracy? , 2008 .

[33]  Catherine D. Marcum,et al.  Music Piracy and Neutralization: A Preliminary Trajectory Analysis from Short-Term Longitudinal Data , 2008 .

[34]  Rong-An Shang,et al.  Ethical Decisions About Sharing Music Files in the P2P Environment , 2008 .

[35]  T. P. Cronan,et al.  Factors that Influence the Intention to Pirate Software and Media , 2008 .

[36]  Sue L.T. McGregor,et al.  Conceptualizing Immoral and Unethical Consumption Using Neutralization Theory , 2008 .

[37]  Bandula Jayatilaka,et al.  Softlifting: Exploring Determinants of Attitude , 2008 .

[38]  Rajiv K. Sinha,et al.  Preventing Digital Music Piracy: The Carrot or the Stick? , 2008 .

[39]  T. Hennig-Thurau,et al.  Consumer File Sharing of Motion Pictures , 2007 .

[40]  Sameer Hinduja,et al.  Neutralization theory and online software piracy: An empirical analysis , 2007, Ethics and Information Technology.

[41]  Sally Hibbert,et al.  Why People Don’t Take their Concerns about Fair Trade to the Supermarket: The Role of Neutralisation , 2007 .

[42]  Robert J. Harvey,et al.  An Analysis of the Factor Structure of Jones’ Moral Intensity Construct , 2006 .

[43]  A. d’Astous,et al.  Music Piracy on the Web – How Effective are Anti-Piracy Arguments? Evidence from the Theory of Planned Behaviour , 2005 .

[44]  J. Chiou,et al.  The Antecedents of Music Piracy Attitudes and Intentions , 2005 .

[45]  Shadd Maruna,et al.  What Have We Learned from Five Decades of Neutralization Research? , 2005, Crime and Justice.

[46]  Jih-Hsin Tang,et al.  The Effect of Interpersonal Influence on Softlifting Intention and Behaviour , 2005 .

[47]  Patrick Waelbroeck,et al.  Piracy of Digital Products: A Critical Review of the Economics Literature , 2003, SSRN Electronic Journal.

[48]  Elison Ai Ching Lim,et al.  Spot the difference: consumer responses towards counterfeits , 2001 .

[49]  N. J. Finkel Not Fair!: The Typology of Commonsense Unfairness , 2001 .

[50]  P. Homer,et al.  Values, Susceptibility to Normative Influence, and Attribute Importance Weights: A Nomological Analysis , 2001 .

[51]  L. Ferrell,et al.  A Review of Empirical Studies Assessing Ethical Decision Making in Business , 2000 .

[52]  J. Steenkamp,et al.  Assessing Measurement Invariance in Cross-National Consumer Research , 1998 .

[53]  Peter A. Todd,et al.  Assessing IT usage: the role of prior experience , 1995 .

[54]  R. Staelin,et al.  A Model of Perceived Risk and Intended Risk-handling Activity , 1994 .

[55]  R. MacCallum,et al.  Model modifications in covariance structure analysis: the problem of capitalization on chance. , 1992, Psychological bulletin.

[56]  I. Ajzen The theory of planned behavior , 1991 .

[57]  T. Jones Ethical Decision Making by Individuals in Organizations: An Issue-Contingent Model , 1991 .

[58]  Richard G. Netemeyer,et al.  Measurement of Consumer Susceptibility to Interpersonal Influence , 1989 .

[59]  James R. Rest Moral Development: Advances in Research and Theory , 1986 .

[60]  B. Weiner An attributional theory of achievement motivation and emotion. , 1985, Psychological review.

[61]  J. Beckmann,et al.  Action control : from cognition to behavior , 1985 .

[62]  Icek Ajzen,et al.  From Intentions to Actions: A Theory of Planned Behavior , 1985 .

[63]  Michael R. Gottfredson,et al.  A general theory of crime. , 1992 .

[64]  Gilbert A. Churchill A Paradigm for Developing Better Measures of Marketing Constructs , 1979 .

[65]  C. Werts,et al.  The Use Of Analysis Of Covariance Structures For Comparing The Psychometric Properties Of Multiple Variables Across Populations. , 1978, Multivariate behavioral research.

[66]  Gresham M. Sykes,et al.  Techniques of neutralization: A theory of delinquency. , 1957 .