Software Piracy among Accounting Students: A Longitudinal Comparison of Changes and Sensitivity
暂无分享,去创建一个
[1] K. R. Conner,et al. Software piracy: an analysis of protection strategies , 1991 .
[2] Ram D. Gopal,et al. Global software piracy: you can't get blood out of a turnip , 2000, CACM.
[3] B. Husted. The Impact of National Culture on Software Piracy , 2000 .
[4] Bernard Wong-On-Wing,et al. A comparative examination of auditor premature sign-offs using the direct and the randomized response methods , 1997 .
[5] Dennis F. Galletta,et al. Software Piracy in the Workplace: A Model and Empirical Test , 2003, J. Manag. Inf. Syst..
[6] Paul E. Tracy,et al. The Validity of Randomized Response for Sensitive Measurements , 1981 .
[7] G. A. Miller,et al. Book Review Nisbett, R. , & Ross, L.Human inference: Strategies and shortcomings of social judgment.Englewood Cliffs, N.J.: Prentice-Hall, 1980. , 1982 .
[8] Ram D. Gopal,et al. International Software Piracy: Analysis of Key Issues and Impacts , 1998, Inf. Syst. Res..
[9] Ram D. Gopal,et al. Preventive and Deterrent Controls for Software Piracy , 1997, J. Manag. Inf. Syst..
[10] William R. Swinyard,et al. The morality of software piracy: A cross-cultural analysis , 1990 .
[11] Jin H. Im,et al. Software piracy and software security measures in business schools , 1992, Inf. Manag..
[12] Chee-Sing Yap,et al. Testing an Ethical Decision-Making Theory: The Case of Softlifting , 1998, J. Manag. Inf. Syst..
[13] Gary S. Monroe,et al. Exploring Social Desirability Bias , 2003 .
[14] T. Jones. Ethical Decision Making by Individuals in Organizations: An Issue-Contingent Model , 1991 .
[15] Ranjan B. Kini,et al. Shaping of Moral Intensity regarding Software Piracy in University Students: Immediate Community Effects , 2001, J. Comput. Inf. Syst..
[16] Vijay Mahajan,et al. Software Piracy: Estimation of Lost Sales and the Impact on Software Diffusion , 1995 .
[17] Hsing Kenneth Cheng,et al. Toward a profile of student software piraters , 1996 .
[18] Thomas A. Buchman,et al. Obtaining Responses To Sensitive Questions - Conventional Questionnaire Versus Randomized-Response Technique , 1982 .
[19] Manson P. Dillaway,et al. Strengthening the ethics content of accounting courses , 1989 .
[20] S L Warner,et al. Randomized response: a survey technique for eliminating evasive answer bias. , 1965, Journal of the American Statistical Association.
[21] Alan J. Dubinsky,et al. Analyzing ethical decision making in marketing , 1989 .
[22] Wallace A. Wood,et al. Situational determinants of software piracy: An equity theory perspective , 1996 .
[23] Richard G. Lomax,et al. A Beginner's Guide to Structural Equation Modeling , 2022 .
[24] Christian S. Collberg,et al. Watermarking, Tamper-Proofing, and Obfuscation-Tools for Software Protection , 2002, IEEE Trans. Software Eng..
[25] Charles W Petit. Universe. The gods must be crazy. , 2003, U.S. news & world report.
[26] L. Ross,et al. Human Inference: Strategies and Shortcomings of Social Judgment. , 1981 .
[27] I. Ajzen,et al. Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research , 1977 .
[28] Hsing K. Cheng,et al. To Purchase or to Pirate Software: An Empirical Study , 1997, J. Manag. Inf. Syst..
[29] Detmar W. Straub,et al. Key information liability issues facing managers: software piracy, proprietary databases, and indi , 1990 .
[30] D. Horvitz,et al. Application of the Randomized Response Technique in Obtaining Quantitative Data , 1971 .
[31] Ilkka A. Ronkainen,et al. Correlates of Intellectual Property Violation , 2001 .