-
1
-
-
0007392273
-
-
Statistical Department, Brunei Darussalam
-
Anonymous (1994), Statistical Year Book of Brunei, Statistical Department, Brunei Darussalam.
-
(1994)
Statistical Year Book of Brunei
-
-
-
4
-
-
0007351092
-
Software piracy costs $11.4b
-
18 June
-
Asia Business (1998), "Software piracy costs $11.4b", Borneo Bulletin, 18 June, p. 22.
-
(1998)
Borneo Bulletin
, pp. 22
-
-
-
5
-
-
0000535664
-
Professional ethics: Business students perceptions
-
Davis, J.R. and Welton, R.E. (1991), "Professional ethics: business students perceptions", Journal of Business Ethics, Vol. 10, pp. 451-63.
-
(1991)
Journal of Business Ethics
, vol.10
, pp. 451-463
-
-
Davis, J.R.1
Welton, R.E.2
-
6
-
-
0002630250
-
A psycho-social model of software piracy: The development and test of a model
-
Boyd & Fraser Publishing Company, Boston, MA
-
Eining, M.M. and Christensen, A.L. (1991), "A psycho-social model of software piracy: the development and test of a model", Ethical Issues in Information Systems, Boyd & Fraser Publishing Company, Boston, MA, pp. 182-8.
-
(1991)
Ethical Issues in Information Systems
, pp. 182-188
-
-
Eining, M.M.1
Christensen, A.L.2
-
7
-
-
0003551671
-
-
Addison-Wesley, Reading, MA
-
Fishbein, M. and Ajzen, I. (1975), Belief, Attitude, Intenstion, and Behaviour: An Introduction to the Theory and Research, Addison-Wesley, Reading, MA.
-
(1975)
Belief, Attitude, Intenstion, and Behaviour: An Introduction to the Theory and Research
-
-
Fishbein, M.1
Ajzen, I.2
-
9
-
-
6744219555
-
Software piracy and responsibilities of educational institutions
-
Im, J.H. and Koen, C. (1990), "Software piracy and responsibilities of educational institutions", Information & Management, Vol. 20, pp. 189-94.
-
(1990)
Information & Management
, vol.20
, pp. 189-194
-
-
Im, J.H.1
Koen, C.2
-
10
-
-
0000460271
-
Software piracy and software security in business schools
-
Im, J.H. and Van Epps, P.D. (1992), "Software piracy and software security in business schools". Information & Management, Vol. 23 No. 4, pp. 193-203.
-
(1992)
Information & Management
, vol.23
, Issue.4
, pp. 193-203
-
-
Im, J.H.1
Van Epps, P.D.2
-
11
-
-
6744260749
-
Software industry groups set sail against pirates and academe
-
9 December
-
Karon, P. (1986), "Software industry groups set sail against pirates and academe", PC Week, 9 December, p. 62.
-
(1986)
PC Week
, pp. 62
-
-
Karon, P.1
-
12
-
-
0000123715
-
Computer ethics and computer abuse: A study of Swedish and Canadian university data processing students
-
Kowalski, S. and Kowalski, H. (1991), "Computer ethics and computer abuse: a study of Swedish and Canadian university data processing students", Information Age, Vol. 12 No. 4, pp. 206-12.
-
(1991)
Information Age
, vol.12
, Issue.4
, pp. 206-212
-
-
Kowalski, S.1
Kowalski, H.2
-
13
-
-
6744255771
-
Steal this program
-
LaRue, J. (1985), "Steal this program", Library Software Review, Vol. 4 No. 5, pp. 298-301.
-
(1985)
Library Software Review
, vol.4
, Issue.5
, pp. 298-301
-
-
Larue, J.1
-
14
-
-
0030194196
-
Evaluating ethical decision making and computer use
-
Loch, K.D. and Conger, S. (1996), "Evaluating ethical decision making and computer use", Communications of the ACM, Vol. 39 No. 7, pp. 74-83.
-
(1996)
Communications of the ACM
, vol.39
, Issue.7
, pp. 74-83
-
-
Loch, K.D.1
Conger, S.2
-
15
-
-
0346263093
-
The copyright fight
-
12 February
-
Machrone, B. (1987), "The copyright fight", PC Magazine, 12 February, pp. 81-2.
-
(1987)
PC Magazine
, pp. 81-82
-
-
Machrone, B.1
-
17
-
-
0003554931
-
-
Gower Publishing, New York, NY
-
Moser, C. A. and Kalton, G. (1985), Survey Methods in Social Investigation, Gower Publishing, New York, NY.
-
(1985)
Survey Methods in Social Investigation
-
-
Moser, C.A.1
Kalton, G.2
-
18
-
-
77953283315
-
Software piracy: Estimation of lost sales and the impact on software diffusion
-
Moshe, G. and Vijay, M. (1995), øSoftware piracy: estimation of lost sales and the impact on software diffusion", Journal of Marketing, January, pp. 29-37.
-
(1995)
Journal of Marketing
, vol.JANUARY
, pp. 29-37
-
-
Moshe, G.1
Vijay, M.2
-
19
-
-
0347485721
-
Acceptable protection of software intellectual property: A survey of software developers and lawyers
-
Oz, E. (1998), "Acceptable protection of software intellectual property: a survey of software developers and lawyers", Information & Management, Vol. 34, pp. 161-73.
-
(1998)
Information & Management
, vol.34
, pp. 161-173
-
-
Oz, E.1
-
20
-
-
0002103996
-
The attitude of managers-to-be toward software piracy
-
Oz, T.J. (1990), "The attitude of managers-to-be toward software piracy", OR/MS Today, Vol. 27 No. 4, pp. 24-6.
-
(1990)
OR/MS Today
, vol.27
, Issue.4
, pp. 24-26
-
-
Oz, T.J.1
-
21
-
-
0001857619
-
Perceptions of initiatory and retaliatory cheating behaviour
-
Pereira, L.B. and Kanekar, S. (1984), "Perceptions of initiatory and retaliatory cheating behaviour", Indian Psychologist, Vol. 3 No. 1, pp. 17-20.
-
(1984)
Indian Psychologist
, vol.3
, Issue.1
, pp. 17-20
-
-
Pereira, L.B.1
Kanekar, S.2
-
22
-
-
6744240475
-
Student attitudes towards software piracy: A preliminary study
-
Rahim, M.M., Abdullah, S.C., Seyal, A.H. and Rahman, M.N. (1996), "Student attitudes towards software piracy: a preliminary study", Jurnal Teknnlogi Maklumat, Vol. 8 No. 1, pp. 22-31.
-
(1996)
Jurnal Teknnlogi Maklumat
, vol.8
, Issue.1
, pp. 22-31
-
-
Rahim, M.M.1
Abdullah, S.C.2
Seyal, A.H.3
Rahman, M.N.4
-
23
-
-
0010932036
-
Business faculty members' perceptions of unauthorised software copying
-
Shim, J.P. and Taylor, G.S. (1988), "Business faculty members' perceptions of unauthorised software copying", OR/MS Today, Vol. 15 No. 5, pp. 30-1.
-
(1988)
OR/MS Today
, vol.15
, Issue.5
, pp. 30-31
-
-
Shim, J.P.1
Taylor, G.S.2
-
24
-
-
0001550607
-
Softlifting: A model of motivating factors
-
Simpson, P.M., Banerjee, D. and Simpson, C.L. (1994), "Softlifting: a model of motivating factors", Journal of Business Ethics, Vol. 13, pp. 431-8.
-
(1994)
Journal of Business Ethics
, vol.13
, pp. 431-438
-
-
Simpson, P.M.1
Banerjee, D.2
Simpson, C.L.3
-
25
-
-
0030215265
-
Toward a profile of student software piraters
-
Sims, R.R., Cheng, H.K. and Teegen, H. (1996), "Toward a profile of student software piraters", Journal of Business Ethics, Vol. 15, pp. 839-49.
-
(1996)
Journal of Business Ethics
, vol.15
, pp. 839-849
-
-
Sims, R.R.1
Cheng, H.K.2
Teegen, H.3
-
26
-
-
0002961010
-
The effect of demographics factors on attitudes toward software piracy
-
Solomon, S.L. and O'Brien, J.A. (1990), "The effect of demographics factors on attitudes toward software piracy", Journal of Computer Information Systems, Vol. 30 No. 3, pp. 40-6.
-
(1990)
Journal of Computer Information Systems
, vol.30
, Issue.3
, pp. 40-46
-
-
Solomon, S.L.1
O'Brien, J.A.2
-
27
-
-
84973740128
-
A comparative examination of attitudes toward software piracy among business professors and executives
-
Taylor, G.S. and Shim, J.P. (1993), "A comparative examination of attitudes toward software piracy among business professors and executives", Human Relations, Vol. 46 No. 4, pp. 419-33.
-
(1993)
Human Relations
, vol.46
, Issue.4
, pp. 419-433
-
-
Taylor, G.S.1
Shim, J.P.2
-
28
-
-
3042915322
-
A survey of faculty attitudes toward personal computer software copying
-
Wickham, M., Plotnicki, J. and Athey, S. (1992), "A survey of faculty attitudes toward personal computer software copying", The Journal of Computer Information Systems, Summer, pp. 47-52.
-
(1992)
The Journal of Computer Information Systems
, vol.SUMMER
, pp. 47-52
-
-
Wickham, M.1
Plotnicki, J.2
Athey, S.3
-
29
-
-
34250083303
-
Gender roles, computer attitudes and dyadic computer interaction: Performance in college students
-
Williams, S.W., Ogletree, S.M., Woodburne, W. and Raffeld, P. (1994), "Gender roles, computer attitudes and dyadic computer interaction: performance in college students", Sex Roles and Journal of Research, Vol. 5 No. 3, pp. 515-26.
-
(1994)
Sex Roles and Journal of Research
, vol.5
, Issue.3
, pp. 515-526
-
-
Williams, S.W.1
Ogletree, S.M.2
Woodburne, W.3
Raffeld, P.4
-
30
-
-
0022178828
-
Computer crime - Risk management and computer security
-
Wong, K. (1985), "Computer crime - risk management and computer security", Computer and Security, Vol. 4, pp. 287-95.
-
(1985)
Computer and Security
, vol.4
, pp. 287-295
-
-
Wong, K.1
-
31
-
-
0007350161
-
A study of unauthorised software copying among postsecondary students in Hong Kong
-
Wong, G., Kong, A. and Ngai, S. (1990), "A study of unauthorised software copying among postsecondary students in Hong Kong", The Australian Computer Journal, Vol. 22 No. 4, pp. 114-22.
-
(1990)
The Australian Computer Journal
, vol.22
, Issue.4
, pp. 114-122
-
-
Wong, G.1
Kong, A.2
Ngai, S.3
|