-
2
-
-
0035999319
-
Perceived behavioral control, self-efficacy, locus of control, and the theory of planned behavior
-
Ajzen, I. Perceived behavioral control, self-efficacy, locus of control, and the theory of planned behavior. Journal of Applied Social Psychology, 32, 4 (2002), 665-683.
-
(2002)
Journal of Applied Social Psychology
, vol.32
, Issue.4
, pp. 665-683
-
-
Ajzen, I.1
-
3
-
-
33646391331
-
Attitude-behavior relation: A theoretical analysis and review of empirical research
-
Ajzen, I., and Fishbein, M. Attitude-behavior relation: A theoretical analysis and review of empirical research. Psychological Bulletin, 84, 5 (1977), 888-918.
-
(1977)
Psychological Bulletin
, vol.84
, Issue.5
, pp. 888-918
-
-
Ajzen, I.1
Fishbein, M.2
-
4
-
-
37249036235
-
Prediction of goal-directed behavior: Attitudes, intentions and perceived behavioral control
-
Ajzen, I., and Madden, T.J. Prediction of goal-directed behavior: Attitudes, intentions and perceived behavioral control. Journal of Experimental Social Psychology, 22, 5 (1986), 453-474.
-
(1986)
Journal of Experimental Social Psychology
, vol.22
, Issue.5
, pp. 453-474
-
-
Ajzen, I.1
Madden, T.J.2
-
5
-
-
0035753278
-
The theory of planned behavior
-
Armitage, C.J., and Conner, M. The theory of planned behavior. British Journal of Social Psychology, 40, 4 (2001), 471-499.
-
(2001)
British Journal of Social Psychology
, vol.40
, Issue.4
, pp. 471-499
-
-
Armitage, C.J.1
Conner, M.2
-
6
-
-
0003258063
-
The partial least squares approach to causal modeling: Personal computer adoption and use as an illustration
-
Barclay, D.; Higgins, C.; and Thompson, R. The partial least squares approach to causal modeling: Personal computer adoption and use as an illustration. Technology Studies, 2, 2 (1995), 285-309.
-
(1995)
Technology Studies
, vol.2
, Issue.2
, pp. 285-309
-
-
Barclay, D.1
Higgins, C.2
Thompson, R.3
-
7
-
-
28844460781
-
Predicting dishonest actions using the theory of planned behavior
-
Beck, L., and Ajzen, I. Predicting dishonest actions using the theory of planned behavior. Journal of Research in Personality, 25, 3 (1991), 285-301.
-
(1991)
Journal of Research in Personality
, vol.25
, Issue.3
, pp. 285-301
-
-
Beck, L.1
Ajzen, I.2
-
9
-
-
0041707319
-
-
Washington, DC: Business Software Alliance
-
Business Software Alliance. 2000 Global Software Piracy Report. Washington, DC: Business Software Alliance, 2001.
-
(2001)
2000 Global Software Piracy Report
-
-
-
10
-
-
0038685310
-
Software pricing and copyright enforcement: Private vis-à-vis social welfare
-
P. De and J. DeGross (eds.). Atlanta: AIS (available at aisel.isworld.org)
-
Chen, Y., and Png, I.P.L. Software pricing and copyright enforcement: Private vis-à-vis social welfare. In P. De and J. DeGross (eds.), Proceedings of the Twentieth International Conference on Information Systems. Atlanta: AIS, 1999, pp. 119-123 (available at aisel.isworld.org).
-
(1999)
Proceedings of the Twentieth International Conference on Information Systems
, pp. 119-123
-
-
Chen, Y.1
Png, I.P.L.2
-
11
-
-
0031288383
-
To purchase or to pirate software: An empirical study
-
Spring
-
Cheng, H.; Sims, R.; and Teegen, H. To purchase or to pirate software: An empirical study. Journal of Management Information Systems, 13, 4 (Spring 1997), 49-60.
-
(1997)
Journal of Management Information Systems
, vol.13
, Issue.4
, pp. 49-60
-
-
Cheng, H.1
Sims, R.2
Teegen, H.3
-
12
-
-
0003095695
-
The partial least squares approach for structural equation modeling
-
G.A. Marcoulides (ed.). Mahwah, NJ: Lawrence Erlbaum
-
Chin, W.W. The partial least squares approach for structural equation modeling. In G.A. Marcoulides (ed.), Modern Methods for Business Research. Mahwah, NJ: Lawrence Erlbaum, 1998, pp. 295-336.
-
(1998)
Modern Methods for Business Research
, pp. 295-336
-
-
Chin, W.W.1
-
13
-
-
0001865968
-
Factors influencing software piracy: Implications for accountants
-
Christensen, A., and Eining, M. Factors influencing software piracy: Implications for accountants. Journal of Information Systems, 5, 1 (1991), 67-80.
-
(1991)
Journal of Information Systems
, vol.5
, Issue.1
, pp. 67-80
-
-
Christensen, A.1
Eining, M.2
-
14
-
-
0001020817
-
Software piracy: An analysis of protection strategies
-
Conner, K.R., and Rumelt, R.P. Software piracy: An analysis of protection strategies. Management Science, 3, 2 (1991), 125-139.
-
(1991)
Management Science
, vol.3
, Issue.2
, pp. 125-139
-
-
Conner, K.R.1
Rumelt, R.P.2
-
15
-
-
0001960725
-
Test validation
-
R.L. Thomdike (ed.) Washington, DC: American Council on Education
-
Cronbach, L. Test validation. In R.L. Thomdike (ed.), Educational Measurement, 2d ed. Washington, DC: American Council on Education, 1971.
-
(1971)
Educational Measurement, 2d Ed.
-
-
Cronbach, L.1
-
16
-
-
84936823933
-
User acceptance of computer technology: A comparison of two theoretical models
-
Davis, F.D.; Bagozzi, R.P.; and Warshaw, P.R. User acceptance of computer technology: A comparison of two theoretical models. Management Science, 35, 8 (1989), 982-1003.
-
(1989)
Management Science
, vol.35
, Issue.8
, pp. 982-1003
-
-
Davis, F.D.1
Bagozzi, R.P.2
Warshaw, P.R.3
-
17
-
-
0000577656
-
Participation in illegitimate activities: A theoretical and empirical investigation
-
Ehrlich, I. Participation in illegitimate activities: A theoretical and empirical investigation. Journal of Political Economy, 81, 3 (1973), 521-565.
-
(1973)
Journal of Political Economy
, vol.81
, Issue.3
, pp. 521-565
-
-
Ehrlich, I.1
-
18
-
-
0001985405
-
Crime, punishment, and the market for offenses
-
Winter
-
Ehrlich, I. Crime, punishment, and the market for offenses. Journal of Economic Perspectives, 10, 1 (Winter 1996), 43-67.
-
(1996)
Journal of Economic Perspectives
, vol.10
, Issue.1
, pp. 43-67
-
-
Ehrlich, I.1
-
19
-
-
0002630250
-
A psycho-social model of software piracy: The development and test of a model
-
R. Dejoie, G. Fowler, and D. Paradice (eds.). Boston: Boyd & Fraser
-
Eining, M., and Christensen, A. A psycho-social model of software piracy: The development and test of a model. In R. Dejoie, G. Fowler, and D. Paradice (eds.), Ethical Issues in Information Systems. Boston: Boyd & Fraser, 1991, pp. 182-187.
-
(1991)
Ethical Issues in Information Systems
, pp. 182-187
-
-
Eining, M.1
Christensen, A.2
-
21
-
-
0003551671
-
Belief, attitude, intention and behavior: An introduction to theory and research
-
Reading, MA: Addison-Wesley
-
Fishbein, M., and Ajzen, I. Belief, Attitude, Intention and Behavior: An Introduction to Theory and Research. Reading, MA: Addison-Wesley, 1975.
-
1975
-
-
Fishbein, M.1
Ajzen, I.2
-
23
-
-
0000009769
-
Structural equation models with unobservable variables and measurement errors
-
Fornell, C., and Larcker, D.F. Structural equation models with unobservable variables and measurement errors. Journal of Marketing Research, 18, 1 (1981), 39-50.
-
(1981)
Journal of Marketing Research
, vol.18
, Issue.1
, pp. 39-50
-
-
Fornell, C.1
Larcker, D.F.2
-
24
-
-
77953283315
-
Software piracy: Estimation of lost sales and impact on software diffusion
-
Givon, M.; Mahajan, V.; and Muller, E. Software piracy: Estimation of lost sales and impact on software diffusion. Journal of Marketing, 59, 1 (1995), 29-37.
-
(1995)
Journal of Marketing
, vol.59
, Issue.1
, pp. 29-37
-
-
Givon, M.1
Mahajan, V.2
Muller, E.3
-
25
-
-
0031288375
-
Preventive and deterrent controls for software piracy
-
Spring
-
Gopal, R., and Sanders, G. Preventive and deterrent controls for software piracy. Journal of Management Information Systems, 13, 4 (Spring 1997), 29-47.
-
(1997)
Journal of Management Information Systems
, vol.13
, Issue.4
, pp. 29-47
-
-
Gopal, R.1
Sanders, G.2
-
26
-
-
0032245475
-
International software piracy: Analysis of key issues and impacts
-
Gopal, R., and Sanders, G. International software piracy: Analysis of key issues and impacts. Information Systems Research, 9, 4 (1998), 380-397.
-
(1998)
Information Systems Research
, vol.9
, Issue.4
, pp. 380-397
-
-
Gopal, R.1
Sanders, G.2
-
27
-
-
0002481588
-
Global software piracy: You can't get blood out of a turnip
-
Gopal, R., and Sanders, G. Global software piracy: You can't get blood out of a turnip. Communications of the ACM, 43, 9 (2000), 83-89.
-
(2000)
Communications of the ACM
, vol.43
, Issue.9
, pp. 83-89
-
-
Gopal, R.1
Sanders, G.2
-
28
-
-
0003506109
-
-
Upper Saddle River, NJ: Prentice Hall
-
Hair, J.F., Jr.; Anderson, R.E.; Tatham, R.L.; and Black, W.C. Multivariate Data Analysis with Readings, 4th ed. Upper Saddle River, NJ: Prentice Hall, 1995.
-
(1995)
Multivariate Data Analysis with Readings, 4th Ed.
-
-
Hair J.F., Jr.1
Anderson, R.E.2
Tatham, R.L.3
Black, W.C.4
-
29
-
-
0000917858
-
The effect of codes of ethics and personal denial of responsibility on computer abuse judgments and intentions
-
Harrington, S.J. The effect of codes of ethics and personal denial of responsibility on computer abuse judgments and intentions. MIS Quarterly, 20, 3 (1996), 257-278.
-
(1996)
MIS Quarterly
, vol.20
, Issue.3
, pp. 257-278
-
-
Harrington, S.J.1
-
31
-
-
0007461850
-
Information systems majors/non-majors and computer ethics
-
Fall
-
Kievit, K.A. Information systems majors/non-majors and computer ethics. Journal of Computer Information Systems, 32, 1 (Fall 1991), 43-49.
-
(1991)
Journal of Computer Information Systems
, vol.32
, Issue.1
, pp. 43-49
-
-
Kievit, K.A.1
-
32
-
-
0001851459
-
Stage and sequence: The cognitive development approach to socialization
-
D.A. Goslin (ed.). New York: Rand McNally
-
Kohlberg, L. Stage and sequence: The cognitive development approach to socialization. In D.A. Goslin (ed.), Handbook of Socialization Theory and Research. New York: Rand McNally, 1969, pp. 347-480.
-
(1969)
Handbook of Socialization Theory and Research
, pp. 347-480
-
-
Kohlberg, L.1
-
33
-
-
0030194196
-
Evaluating ethical decision making and computer use
-
Loch, K., and Conger, S. Evaluating ethical decision making and computer use. Communications of the ACM, 39, 1 (1996), 74-83.
-
(1996)
Communications of the ACM
, vol.39
, Issue.1
, pp. 74-83
-
-
Loch, K.1
Conger, S.2
-
34
-
-
3242671556
-
Software piracy: Is it related to level of moral judgement?
-
Logsdon, J.M.; Thompson, J.K.; and Reid, R.A. Software piracy: Is it related to level of moral judgement? Journal of Business Ethics, 13, 11 (1994), 849-857.
-
(1994)
Journal of Business Ethics
, vol.13
, Issue.11
, pp. 849-857
-
-
Logsdon, J.M.1
Thompson, J.K.2
Reid, R.A.3
-
35
-
-
55249097295
-
Four ethical issues of the information age
-
Mason, R.O. Four ethical issues of the information age. MIS Quarterly, 10, 1 (1986), 5-12.
-
(1986)
MIS Quarterly
, vol.10
, Issue.1
, pp. 5-12
-
-
Mason, R.O.1
-
36
-
-
73549114871
-
Predicting user intentions: Comparing the technology acceptance model with the theory of planned behavior
-
Mathieson, K. Predicting user intentions: Comparing the technology acceptance model with the theory of planned behavior. Information Systems Research, 2, 3 (1991), 173-191.
-
(1991)
Information Systems Research
, vol.2
, Issue.3
, pp. 173-191
-
-
Mathieson, K.1
-
37
-
-
0042223455
-
Software piracy: A view from Hong Kong
-
Moores, T., and Dhillon, G. Software piracy: A view from Hong Kong. Communications of the ACM, 43, 12 (2000), 88-93.
-
(2000)
Communications of the ACM
, vol.43
, Issue.12
, pp. 88-93
-
-
Moores, T.1
Dhillon, G.2
-
39
-
-
0002103996
-
The attitude of managers-to-be toward software piracy
-
Oz, E. The attitude of managers-to-be toward software piracy. OR/MS Today, 17,4 (1990), 24-26.
-
(1990)
OR/MS Today
, vol.17
, Issue.4
, pp. 24-26
-
-
Oz, E.1
-
40
-
-
4544387878
-
Ethical attitudes of entry-level MIS personnel
-
Paradice, D.J. Ethical attitudes of entry-level MIS personnel. Information & Management, 18, 3 (1990), 143-151.
-
(1990)
Information & Management
, vol.18
, Issue.3
, pp. 143-151
-
-
Paradice, D.J.1
-
41
-
-
3042985713
-
Software piracy and computer-using professionals: A survey
-
Peace, A.G. Software piracy and computer-using professionals: A survey. Journal of Computer Information Systems, 38, 1 (1997), 94-99.
-
(1997)
Journal of Computer Information Systems
, vol.38
, Issue.1
, pp. 94-99
-
-
Peace, A.G.1
-
42
-
-
0043209977
-
Judgements about computer ethics: Do individual, co-worker, and company judgements differ? Do company codes make a difference?
-
Pierce, M.A., and Henry, J.W. Judgements about computer ethics: Do individual, co-worker, and company judgements differ? Do company codes make a difference? Journal of Business Ethics. 28, 4 (2000), 307-322.
-
(2000)
Journal of Business Ethics
, vol.28
, Issue.4
, pp. 307-322
-
-
Pierce, M.A.1
Henry, J.W.2
-
43
-
-
0035637388
-
Shaping of moral intensity regarding software piracy in university students: Immediate community effect
-
Ramakrishna, H.V.; Kini, R.B.; and Vijayaraman, B.S. Shaping of moral intensity regarding software piracy in university students: Immediate community effect. Journal of Computer Information Systems, 41, 4 (2001), 47-51.
-
(2001)
Journal of Computer Information Systems
, vol.41
, Issue.4
, pp. 47-51
-
-
Ramakrishna, H.V.1
Kini, R.B.2
Vijayaraman, B.S.3
-
45
-
-
0022117792
-
Intention, perceived control and weight loss: An application of the theory of planned behavior
-
Schifter, D.B., and Ajzen, I. Intention, perceived control and weight loss: An application of the theory of planned behavior. Journal of Personality and Social Psychology, 49, 3 (1985), 843-851.
-
(1985)
Journal of Personality and Social Psychology
, vol.49
, Issue.3
, pp. 843-851
-
-
Schifter, D.B.1
Ajzen, I.2
-
46
-
-
84881834137
-
The expected utility model: Its variants, purposes, evidence and limitations
-
Schoemaker, P.J. The expected utility model: Its variants, purposes, evidence and limitations. Journal of Economic Literature, 20, 2 (1982), 529-563.
-
(1982)
Journal of Economic Literature
, vol.20
, Issue.2
, pp. 529-563
-
-
Schoemaker, P.J.1
-
47
-
-
84936823564
-
The theory of reasoned action: A metaanalysis of past research with recommendations for modifications and future research
-
Sheppard, B.H.; Hartwick, J.; and Warshaw, P.R. The theory of reasoned action: A metaanalysis of past research with recommendations for modifications and future research. Journal of Consumer Research, 15, 3 (1988), 325-343.
-
(1988)
Journal of Consumer Research
, vol.15
, Issue.3
, pp. 325-343
-
-
Sheppard, B.H.1
Hartwick, J.2
Warshaw, P.R.3
-
48
-
-
0010932036
-
Business faculty members' perceptions of unauthorized software copying
-
Shim, J.P., and Taylor, O.S. Business faculty members' perceptions of unauthorized software copying. OR/MS Today, 15, 5 (1988), 30-31.
-
(1988)
OR/MS Today
, vol.15
, Issue.5
, pp. 30-31
-
-
Shim, J.P.1
Taylor, O.S.2
-
49
-
-
0002546745
-
Practicing managers' perception/attitudes toward illegal software copying
-
Shim, J.P., and Taylor, G.S. Practicing managers' perception/attitudes toward illegal software copying. OR/MS Today, 16, 4 (1989), 30-33.
-
(1989)
OR/MS Today
, vol.16
, Issue.4
, pp. 30-33
-
-
Shim, J.P.1
Taylor, G.S.2
-
50
-
-
0030215265
-
Toward a profile of student software piraters
-
Sims, R.R.; Cheng, H.K.; and Teegen, H. Toward a profile of student software piraters. Journal of Business Ethics, 15, 8 (1996), 839-849.
-
(1996)
Journal of Business Ethics
, vol.15
, Issue.8
, pp. 839-849
-
-
Sims, R.R.1
Cheng, H.K.2
Teegen, H.3
-
51
-
-
0002961010
-
The effect of demographic factors on attitudes toward software piracy
-
Solomon, S.L., and O'Brien, J.A. The effect of demographic factors on attitudes toward software piracy. Journal of Computer Information Systems, 30, 3 (1990), 40-46.
-
(1990)
Journal of Computer Information Systems
, vol.30
, Issue.3
, pp. 40-46
-
-
Solomon, S.L.1
O'Brien, J.A.2
-
52
-
-
55249123249
-
Validating instruments in MIS research
-
Straub, D. Validating instruments in MIS research. MIS Quarterly, 13, 2 (1989), 147-169.
-
(1989)
MIS Quarterly
, vol.13
, Issue.2
, pp. 147-169
-
-
Straub, D.1
-
53
-
-
0000280419
-
Effective IS security: An empirical study
-
Straub, D. Effective IS security: An empirical study. Information Systems Research, 1, 3 (1990), 255-276.
-
(1990)
Information Systems Research
, vol.1
, Issue.3
, pp. 255-276
-
-
Straub, D.1
-
54
-
-
53349102510
-
Key information issues facing managers: Software piracy, proprietary databases, and individual rights to privacy
-
Straub, D., and Collins, R.W. Key information issues facing managers: Software piracy, proprietary databases, and individual rights to privacy. MIS Quarterly, 14, 2 (1990), 143-156.
-
(1990)
MIS Quarterly
, vol.14
, Issue.2
, pp. 143-156
-
-
Straub, D.1
Collins, R.W.2
-
55
-
-
0000703119
-
Assessing IT usage: The role of prior experience
-
Taylor, S., and Todd, P.A. Assessing IT usage: The role of prior experience. MIS Quarterly, 19, 4 (1995), 561-570.
-
(1995)
MIS Quarterly
, vol.19
, Issue.4
, pp. 561-570
-
-
Taylor, S.1
Todd, P.A.2
-
56
-
-
73549120882
-
Understanding information technology usage: A test of competing models
-
Taylor, S., and Todd, P.A. Understanding information technology usage: A test of competing models. Information Systems Research, 6, 2 (1995), 144-176.
-
(1995)
Information Systems Research
, vol.6
, Issue.2
, pp. 144-176
-
-
Taylor, S.1
Todd, P.A.2
-
57
-
-
0032223746
-
Testing an ethical decision-making theory: The case of softlifting
-
Summer
-
Thong, J.Y.L., and Yap, C.S. Testing an ethical decision-making theory: The case of softlifting. Journal of Management Information Systems, 15, 1 (Summer 1998), 213-237.
-
(1998)
Journal of Management Information Systems
, vol.15
, Issue.1
, pp. 213-237
-
-
Thong, J.Y.L.1
Yap, C.S.2
-
59
-
-
0001936184
-
Experimental approaches to studying ethical-unethical behavior in organizations
-
Trevino, L.K. Experimental approaches to studying ethical-unethical behavior in organizations. Business Ethics Quarterly, 2, 2 (1992), 121-136.
-
(1992)
Business Ethics Quarterly
, vol.2
, Issue.2
, pp. 121-136
-
-
Trevino, L.K.1
-
60
-
-
0035217408
-
Considerations in ethical decision-making and software piracy
-
Wagner, S., and Sanders, G.L. Considerations in ethical decision-making and software piracy. Journal of Business Ethics, 29, 1-2 (2001), 161-167.
-
(2001)
Journal of Business Ethics
, vol.29
, Issue.1-2
, pp. 161-167
-
-
Wagner, S.1
Sanders, G.L.2
|