Digital piracy: Causes, consequences, and strategic responses

[1]  Klaus E. Meyer,et al.  Asian management research needs more self-confidence , 2006 .

[2]  S. Liebowitz File Sharing: Creative Destruction or Just Plain Destruction?* , 2006, The Journal of Law and Economics.

[3]  A. d’Astous,et al.  Music Piracy on the Web – How Effective are Anti-Piracy Arguments? Evidence from the Theory of Planned Behaviour , 2005 .

[4]  Rosalie L. Tung Perspectives—New Era, New Realities: Musings on a New Research Agenda… from an Old Timer , 2005 .

[5]  Mike W. Peng Perspectives—From China Strategy to Global Strategy , 2005 .

[6]  Stephen J. Gould,et al.  “To Pirate or Not to Pirate”: A Comparative Study of the Ethical Versus Other Influences on the Consumer’s Software Acquisition-Mode Decision , 2004 .

[7]  Vijay Mahajan,et al.  The Effect of Piracy on the Market Penetration of Subscription Software , 2004 .

[8]  S. Hinduja Trends and patterns among online software pirates , 2003, Ethics and Information Technology.

[9]  Ranjan B. Kini,et al.  Shaping of Moral Intensity Regarding Software Piracy: A Comparison Between Thailand and U.S. Students , 2004 .

[10]  Dale A. Stirling,et al.  Information rules , 2003, SGMD.

[11]  B. Tan Understanding consumer ethical decision making with respect to purchase of pirated software , 2002 .

[12]  Clayton M. Christensen The Innovator's Dilemma , 1997 .

[13]  Wallace A. Wood,et al.  Situational determinants of software piracy: An equity theory perspective , 1996 .

[14]  Hsing Kenneth Cheng,et al.  Toward a profile of student software piraters , 1996 .

[15]  Vijay Mahajan,et al.  Software Piracy: Estimation of Lost Sales and the Impact on Software Diffusion , 1995 .

[16]  Richard A. Reid,et al.  Software piracy: Is it related to level of moral judgment? , 1994 .

[17]  T. Jones Ethical Decision Making by Individuals in Organizations: An Issue-Contingent Model , 1991 .

[18]  B. Kabanoff Equity, Equality, Power, and Conflict , 1991 .

[19]  K. R. Conner,et al.  Software piracy: an analysis of protection strategies , 1991 .

[20]  Kailash Joshi,et al.  An Investigation of Equity as a Determinant of User Information Satisfaction , 1990 .

[21]  Susan J. Harrington,et al.  Why People Copy Software and Create Computer Viruses , 1989 .

[22]  W. Arthur,et al.  INCREASING RETURNS AND LOCK-IN BY HISTORICAL EVENTS , 1989 .

[23]  Eli B. Cohen,et al.  College Students Believe Piracy is Acceptable , 1989, J. Inf. Syst. Educ..

[24]  Goslin,et al.  Handbook of socialization theory and research , 1969 .

[25]  L. Kohlberg Stage and sequence: The cognitive-developmental approach to socialization , 1969 .

[26]  Adams Js Towards an understanding of inequity , 1963 .

[27]  E. Rogers,et al.  Diffusion of Innovations , 1964 .