Three-Level Mechanism of Consumer Digital Piracy: Development and Cross-Cultural Validation
暂无分享,去创建一个
[1] Ian Phau,et al. Pirating Pirates of the Caribbean: The curse of cyberspace , 2014 .
[2] Mateja Kos Koklic,et al. The study of perceived adverse effects of digital piracy and involvement: insights from adult computer users , 2014, Behav. Inf. Technol..
[3] Moutaz Khouja,et al. Analysis of the effectiveness of preventive and deterrent piracy control strategies: Agent-based modeling approach , 2013, Comput. Hum. Behav..
[4] Connie R. Bateman,et al. Ethical Decision Making in a Peer-to-Peer File Sharing Situation: The Role of Moral Absolutes and Social Consensus , 2013 .
[5] Mikko T. Siponen,et al. New insights into the problem of software piracy: The effects of neutralization, shame, and moral beliefs , 2012, Inf. Manag..
[6] Sigi Goode. Initial findings of a gap analysis of the digital piracy literature: Six undiscovered countries , 2012 .
[7] Mateja Kos Koklic,et al. Predicting consumer digital piracy behavior , 2012 .
[8] Hsiao-chien Tsui,et al. Piracy and social norm of anti-piracy , 2012 .
[9] Seunghee Lee,et al. Asymmetrical effects of past experiences with genuine fashion luxury brands and their counterfeits on purchase intention of each , 2012 .
[10] Heith Copes,et al. Exploring the Temporal Dynamics of the Neutralization/Delinquency Relationship , 2012 .
[11] Szde Yu,et al. College Students’ Justification for Digital Piracy , 2012 .
[12] Szu-Yu Chou,et al. You do the service but they take the order , 2012 .
[13] Mark M.H. Goode,et al. DVD Pirating Intentions: Angels, Devils, Chancers and Receivers , 2012 .
[14] Yue Pan,et al. Predictors, consequence, and measurement of ethical judgments: Review and meta-analysis , 2012 .
[15] Stefan Schmid,et al. 50 years of research on international standardization and adaptation—From a systematic literature analysis to a theoretical framework , 2011 .
[16] Kate L. Daunt,et al. Customers acting badly: Evidence from the hospitality industry , 2011 .
[17] Kate L. Daunt,et al. Deviant customer behaviour: A study of techniques of neutralisation , 2011 .
[18] Suzannah Mirghani. The War on Piracy: Analyzing the Discursive Battles of Corporate and Government-Sponsored Anti-Piracy Media Campaigns , 2011 .
[19] Cheolho Yoon. Theory of Planned Behavior and Ethics Theory in Digital Piracy: An Integrated Model , 2011 .
[20] Hassan Aleassa,et al. Investigating Software Piracy in Jordan: An Extension of the Theory of Reasoned Action , 2011 .
[21] M. Dacin,et al. Psychological Pathways to Fraud: Understanding and Preventing Fraud in Organizations , 2011 .
[22] Kevin J. Shanahan,et al. Motivators and enablers of SCOURing: A study of online piracy in the US and UK , 2010 .
[23] T. Holt,et al. Transferring Subcultural Knowledge On-Line: Practices and Beliefs of Persistent Digital Pirates , 2010 .
[24] I. Phau,et al. Predictors of Usage Intentions of Pirated Software , 2010 .
[25] Yu-Ping Liu,et al. Predicting the Use of Pirated Software: A Contingency Model Integrating Perceived Risk with the Theory of Planned Behavior , 2010 .
[26] L. Harris,et al. Online consumer misbehaviour: an application of neutralization theory , 2009 .
[27] Trevor T. Moores,et al. Knowledge of Software Piracy as an Antecedent to Reducing Pirating Behavior , 2009, J. Comput. Inf. Syst..
[28] George E. Higgins,et al. Neutralizing Potential and Self-Reported Digital Piracy , 2009 .
[29] Whitney D. Gunter,et al. Internet Scallywags: A Comparative Analysis of Multiple Forms and Measurements of Digital Piracy , 2009 .
[30] Alexander Nill,et al. Global software piracy: Trends and strategic considerations , 2009 .
[31] Steven A. Taylor,et al. Intention to Engage in Digital Piracy , 2009 .
[32] S. Curley,et al. Ripped from the Headlines: What can the Popular Press Teach us about Software Piracy? , 2008 .
[33] Catherine D. Marcum,et al. Music Piracy and Neutralization: A Preliminary Trajectory Analysis from Short-Term Longitudinal Data , 2008 .
[34] Rong-An Shang,et al. Ethical Decisions About Sharing Music Files in the P2P Environment , 2008 .
[35] T. P. Cronan,et al. Factors that Influence the Intention to Pirate Software and Media , 2008 .
[36] Sue L.T. McGregor,et al. Conceptualizing Immoral and Unethical Consumption Using Neutralization Theory , 2008 .
[37] Bandula Jayatilaka,et al. Softlifting: Exploring Determinants of Attitude , 2008 .
[38] Rajiv K. Sinha,et al. Preventing Digital Music Piracy: The Carrot or the Stick? , 2008 .
[39] T. Hennig-Thurau,et al. Consumer File Sharing of Motion Pictures , 2007 .
[40] Sameer Hinduja,et al. Neutralization theory and online software piracy: An empirical analysis , 2007, Ethics and Information Technology.
[41] Sally Hibbert,et al. Why People Don’t Take their Concerns about Fair Trade to the Supermarket: The Role of Neutralisation , 2007 .
[42] Robert J. Harvey,et al. An Analysis of the Factor Structure of Jones’ Moral Intensity Construct , 2006 .
[43] A. d’Astous,et al. Music Piracy on the Web – How Effective are Anti-Piracy Arguments? Evidence from the Theory of Planned Behaviour , 2005 .
[44] J. Chiou,et al. The Antecedents of Music Piracy Attitudes and Intentions , 2005 .
[45] Shadd Maruna,et al. What Have We Learned from Five Decades of Neutralization Research? , 2005, Crime and Justice.
[46] Jih-Hsin Tang,et al. The Effect of Interpersonal Influence on Softlifting Intention and Behaviour , 2005 .
[47] Patrick Waelbroeck,et al. Piracy of Digital Products: A Critical Review of the Economics Literature , 2003, SSRN Electronic Journal.
[48] Elison Ai Ching Lim,et al. Spot the difference: consumer responses towards counterfeits , 2001 .
[49] N. J. Finkel. Not Fair!: The Typology of Commonsense Unfairness , 2001 .
[50] P. Homer,et al. Values, Susceptibility to Normative Influence, and Attribute Importance Weights: A Nomological Analysis , 2001 .
[51] L. Ferrell,et al. A Review of Empirical Studies Assessing Ethical Decision Making in Business , 2000 .
[52] J. Steenkamp,et al. Assessing Measurement Invariance in Cross-National Consumer Research , 1998 .
[53] Peter A. Todd,et al. Assessing IT usage: the role of prior experience , 1995 .
[54] R. Staelin,et al. A Model of Perceived Risk and Intended Risk-handling Activity , 1994 .
[55] R. MacCallum,et al. Model modifications in covariance structure analysis: the problem of capitalization on chance. , 1992, Psychological bulletin.
[56] I. Ajzen. The theory of planned behavior , 1991 .
[57] T. Jones. Ethical Decision Making by Individuals in Organizations: An Issue-Contingent Model , 1991 .
[58] Richard G. Netemeyer,et al. Measurement of Consumer Susceptibility to Interpersonal Influence , 1989 .
[59] James R. Rest. Moral Development: Advances in Research and Theory , 1986 .
[60] B. Weiner. An attributional theory of achievement motivation and emotion. , 1985, Psychological review.
[61] J. Beckmann,et al. Action control : from cognition to behavior , 1985 .
[62] Icek Ajzen,et al. From Intentions to Actions: A Theory of Planned Behavior , 1985 .
[63] Michael R. Gottfredson,et al. A general theory of crime. , 1992 .
[64] Gilbert A. Churchill. A Paradigm for Developing Better Measures of Marketing Constructs , 1979 .
[65] C. Werts,et al. The Use Of Analysis Of Covariance Structures For Comparing The Psychometric Properties Of Multiple Variables Across Populations. , 1978, Multivariate behavioral research.
[66] Gresham M. Sykes,et al. Techniques of neutralization: A theory of delinquency. , 1957 .