메뉴 건너뛰기




Volumn 65, Issue 2, 2006, Pages 173-201

What motivates software crackers?

Author keywords

Neutralisation; Personal motivation; Social justification; Software piracy

Indexed keywords


EID: 33646542629     PISSN: 01674544     EISSN: 15730697     Source Type: Journal    
DOI: 10.1007/s10551-005-4709-9     Document Type: Article
Times cited : (40)

References (100)
  • 3
    • 0031161643 scopus 로고    scopus 로고
    • Software Copyright Infringements: An Exploratory Study of the Effects of Individual and Peer Beliefs
    • AJ-Jabri, I. and A. Abdul-Gader: 1997, 'Software Copyright Infringements: An Exploratory Study of the Effects of Individual and Peer Beliefs', Omega, International Journal of Management Science 25(3), 335.
    • (1997) Omega, International Journal of Management Science , vol.25 , Issue.3 , pp. 335
    • Aj-Jabri, I.1    Abdul-Gader, A.2
  • 6
    • 0003010471 scopus 로고
    • Social identity theory and the organization
    • Ashforth, B. E. and F. Mael: 1989, 'Social Identity Theory and the Organization', The Academy of Management Review 14(1), 20-39.
    • (1989) The Academy of Management Review , vol.14 , Issue.1 , pp. 20-39
    • Ashforth, B.E.1    Mael, F.2
  • 7
    • 33646563519 scopus 로고    scopus 로고
    • Hackers profiled - Who are they and what are their motivations?
    • Barber, R.: 2001, 'Hackers Profiled - Who Are They and What Are Their Motivations?', Computer Fraud & Security 2001(2), 14-17.
    • (2001) Computer Fraud & Security , vol.2001 , Issue.2 , pp. 14-17
    • Barber, R.1
  • 8
    • 0041025045 scopus 로고    scopus 로고
    • Motivation sources inventory: Development and validation of new scales to measure an integrative taxonomy of motivation
    • Barbuto, J. E. and R. W. Scholl: 1998, 'Motivation Sources Inventory: Development and Validation of New Scales to Measure an Integrative Taxonomy of Motivation', Psychological Reports 82, 1011-1022.
    • (1998) Psychological Reports , vol.82 , pp. 1011-1022
    • Barbuto, J.E.1    Scholl, R.W.2
  • 10
    • 33646574705 scopus 로고    scopus 로고
    • Leader of software theft ring sentenced
    • 17 August
    • Cambanis, T.: 2002, 'Leader of Software Theft Ring Sentenced' The Boston Globe. 17 August.
    • (2002) The Boston Globe
    • Cambanis, T.1
  • 11
    • 0009619742 scopus 로고    scopus 로고
    • Targeting audiences on the internet
    • Cheyne, T. L. and F. E. Ritter: 2001, 'Targeting Audiences on the Internet', Communications of the ACM 44(4), 94-98.
    • (2001) Communications of the ACM , vol.44 , Issue.4 , pp. 94-98
    • Cheyne, T.L.1    Ritter, F.E.2
  • 12
    • 0001020817 scopus 로고
    • Software piracy: An analysis of protection strategies
    • Conner, K. R. and R. P. Rumelt: 1991, 'Software Piracy: An Analysis of Protection Strategies', Management Science 37(2), 125-39.
    • (1991) Management Science , vol.37 , Issue.2 , pp. 125-139
    • Conner, K.R.1    Rumelt, R.P.2
  • 13
    • 0030548714 scopus 로고    scopus 로고
    • The kindness of strangers: The usefulness of electronic weak ties for technical advice
    • Constant, D., L. Sproull and S. Kiesler: 1996, 'The Kindness of Strangers: The Usefulness of Electronic Weak Ties for Technical Advice', Organization Science 7(2), 119-135.
    • (1996) Organization Science , vol.7 , Issue.2 , pp. 119-135
    • Constant, D.1    Sproull, L.2    Kiesler, S.3
  • 15
    • 21844494611 scopus 로고
    • Neutralization and deviance in the workplace: Theft of supplies and medicines by hospital nurses
    • Dabney, D.: 1995, 'Neutralization and Deviance in the Workplace: Theft of Supplies and Medicines by Hospital Nurses', Deviant Behavior 16, 313-321.
    • (1995) Deviant Behavior , vol.16 , pp. 313-321
    • Dabney, D.1
  • 16
    • 0006100376 scopus 로고    scopus 로고
    • Collecting 'Sensitive' data in business ethics research: A case for the Unmatched Count Technique (UCT)
    • Dalton, D. R., C. M. Daily and J. C. Wimbush: 1997, 'Collecting 'Sensitive' Data in Business Ethics Research: A Case for the Unmatched Count Technique (UCT)', Journal of Business Ethics 16(10), 1049-1058.
    • (1997) Journal of Business Ethics , vol.16 , Issue.10 , pp. 1049-1058
    • Dalton, D.R.1    Daily, C.M.2    Wimbush, J.C.3
  • 17
    • 84936823933 scopus 로고
    • User acceptance of computer technology: A comparison of two theoretical models
    • Davis, F. D.: 1989, 'User Acceptance of Computer Technology: A Comparison of Two Theoretical Models', Management Science 35(8), 982-1003.
    • (1989) Management Science , vol.35 , Issue.8 , pp. 982-1003
    • Davis, F.D.1
  • 18
    • 0024207303 scopus 로고
    • The indignant page: Techniques of neutralization in the publications of paedophile organizations
    • De Young, M.: 1988, 'The Indignant Page: Techniques of Neutralization in the Publications of Paedophile Organizations', Child Abuse & Neglect 12(4), 583-591.
    • (1988) Child Abuse & Neglect , vol.12 , Issue.4 , pp. 583-591
    • De Young, M.1
  • 19
    • 85008852506 scopus 로고    scopus 로고
    • Collision or collusion? A discussion and case study of the unplanned triangulation of quantitative and qualitative research methods
    • Deacon, D., A. Bryman and N. Fenton: 1998, 'Collision or Collusion? A Discussion and Case Study of the Unplanned Triangulation of Quantitative and Qualitative Research Methods', International Journal of Social Research Methodolog 1(1), 47-63.
    • (1998) International Journal of Social Research Methodolog , vol.1 , Issue.1 , pp. 47-63
    • Deacon, D.1    Bryman, A.2    Fenton, N.3
  • 24
    • 0002630250 scopus 로고
    • A psycho-social model of software piracy: The development and test of a model
    • R. Dejoie, G. Fowler and D. Paradice (eds.) (Boyd & Fraser, Boston)
    • Eining, M. M. and A. L. Christensen: 1991, 'A Psycho-Social Model of Software Piracy: The Development and Test of a Model', in R. Dejoie, G. Fowler and D. Paradice (eds.), Ethical Issues in Information Systems (Boyd & Fraser, Boston), pp. 182-188.
    • (1991) Ethical Issues in Information Systems , pp. 182-188
    • Eining, M.M.1    Christensen, A.L.2
  • 27
    • 0004257475 scopus 로고
    • Sage Publications, Newbury Park
    • Ford, M. E.: 1992, Motivating Humans (Sage Publications, Newbury Park).
    • (1992) Motivating Humans
    • Ford, M.E.1
  • 28
    • 0031197353 scopus 로고    scopus 로고
    • Social judgments and technological innovation: Adolescents' understanding of property, privacy, and electronic information
    • Friedman, B.: 1997, 'Social Judgments and Technological Innovation: Adolescents' Understanding of Property, Privacy, and Electronic Information', Computers in Human Behavior 13(3), 327-351.
    • (1997) Computers in Human Behavior , vol.13 , Issue.3 , pp. 327-351
    • Friedman, B.1
  • 30
    • 0035539969 scopus 로고    scopus 로고
    • Professional lapses: Occupational deviance and neutralization techniques in veterinary medical practice
    • Gauthier, D. K.: 2001, 'Professional Lapses: Occupational Deviance and Neutralization Techniques in Veterinary Medical Practice', Deviant Behavior 22(6), 467-490.
    • (2001) Deviant Behavior , vol.22 , Issue.6 , pp. 467-490
    • Gauthier, D.K.1
  • 32
    • 77953283315 scopus 로고
    • Software piracy: Estimation of lost sales and the impact 011 software diffusion
    • Givon, M., V. Mahajan and E. Muller: 1995, 'Software Piracy: Estimation of Lost Sales and the Impact 011 Software Diffusion', Journal of Marketing 59(1), 29-38.
    • (1995) Journal of Marketing , vol.59 , Issue.1 , pp. 29-38
    • Givon, M.1    Mahajan, V.2    Muller, E.3
  • 33
    • 0030295452 scopus 로고    scopus 로고
    • Situational determinants of software piracy: An equity theory perspective
    • Glass, R. S. and W. A. Wood: 1996, 'Situational Determinants of Software Piracy: An Equity Theory Perspective', Journal of Business Ethics 15(11), 1189-1198.
    • (1996) Journal of Business Ethics , vol.15 , Issue.11 , pp. 1189-1198
    • Glass, R.S.1    Wood, W.A.2
  • 35
    • 0032245475 scopus 로고    scopus 로고
    • International software piracy: Analysis of key issues and impacts
    • Gopal, R. D. and G. L. Sanders: 1998, 'International Software Piracy: Analysis of Key Issues and Impacts', Information Systems Research 9(4), 380-397.
    • (1998) Information Systems Research , vol.9 , Issue.4 , pp. 380-397
    • Gopal, R.D.1    Sanders, G.L.2
  • 36
    • 0002481588 scopus 로고    scopus 로고
    • Global software piracy: You can't get blood from a turnip
    • Gopal, R. D. and G. L. Sanders: 2000, 'Global Software Piracy: You Can't Get Blood From A Turnip', Communications of the ACM 43(9), 82-89.
    • (2000) Communications of the ACM , vol.43 , Issue.9 , pp. 82-89
    • Gopal, R.D.1    Sanders, G.L.2
  • 37
    • 0011188325 scopus 로고
    • Analyzing methodological rigor of MIS survey research from 1980-1989
    • Grover, V., C. Lee and D. Durand: 1994, 'Analyzing Methodological Rigor of MIS Survey Research From 1980-1989', Information & Management 24(6), 305-318.
    • (1994) Information & Management , vol.24 , Issue.6 , pp. 305-318
    • Grover, V.1    Lee, C.2    Durand, D.3
  • 38
    • 0037370954 scopus 로고    scopus 로고
    • The good mother: Neutralization techniques used by pageant mothers
    • Heltsley, M. and T. C. Calhoun: 2003, 'The Good Mother: Neutralization Techniques Used by Pageant Mothers', Deviant Behavior 24(2), 81-100.
    • (2003) Deviant Behavior , vol.24 , Issue.2 , pp. 81-100
    • Heltsley, M.1    Calhoun, T.C.2
  • 40
    • 12744275983 scopus 로고    scopus 로고
    • Trends and patterns among online software pirates
    • Hinduja, S.: 2003, 'Trends and Patterns Among Online Software Pirates', Ethics and Information Technology 5(1), 49-61.
    • (2003) Ethics and Information Technology , vol.5 , Issue.1 , pp. 49-61
    • Hinduja, S.1
  • 41
    • 84928836007 scopus 로고
    • Neutralizing in the workplace: An empirical analysis of property theft and production deviance
    • Hollinger, R. C.: 1991, 'Neutralizing in the Workplace: An Empirical Analysis of Property Theft and Production Deviance', Deviant Behavior 12, 169-202.
    • (1991) Deviant Behavior , vol.12 , pp. 169-202
    • Hollinger, R.C.1
  • 42
    • 0033176621 scopus 로고    scopus 로고
    • Social desirability, anonymity and internet-based questionnaires behavior research methods
    • Joinson, A.: 1999, 'Social Desirability, Anonymity and Internet-Based Questionnaires Behavior Research Methods', Instruments and Computers 31, 433-438.
    • (1999) Instruments and Computers , vol.31 , pp. 433-438
    • Joinson, A.1
  • 44
    • 0001946339 scopus 로고    scopus 로고
    • A set of principles for conducting and evaluating interpretive field studies in information systems
    • Klein, H. K. and M. D. Myers: 1999, 'A Set of Principles for Conducting and Evaluating Interpretive Field Studies in Information Systems', MIS Quarterly 23(1), 67-93.
    • (1999) MIS Quarterly , vol.23 , Issue.1 , pp. 67-93
    • Klein, H.K.1    Myers, M.D.2
  • 45
    • 1242263532 scopus 로고    scopus 로고
    • Why there aren't more information security research studies
    • Kotulic, A. G. and J. G. Clark: 2004, 'Why There Aren't More Information Security Research Studies', Information & Management 41(5), 597-607.
    • (2004) Information & Management , vol.41 , Issue.5 , pp. 597-607
    • Kotulic, A.G.1    Clark, J.G.2
  • 46
    • 0347931701 scopus 로고    scopus 로고
    • The effects of attitudmal and demographic factors on intention to buy pirated CDs: The case of Chinese consumers
    • Kwong, K. K., O. H. M. Yau, J. S. Y. Lee, L. Y. M. Sin and A. C. B. Tse: 2003, 'The Effects of Attitudmal and Demographic Factors on Intention to Buy Pirated CDs: The Case of Chinese Consumers', Journal of Business Ethics 47(3), 223-235.
    • (2003) Journal of Business Ethics , vol.47 , Issue.3 , pp. 223-235
    • Kwong, K.K.1    Yau, O.H.M.2    Lee, J.S.Y.3    Sin, L.Y.M.4    Tse, A.C.B.5
  • 47
    • 84951398823 scopus 로고
    • The assignment of numbers to rank order categories
    • Labovitz, S.: 1970, 'The Assignment of Numbers to Rank Order Categories', American Sociological Review 35(3), 515-524.
    • (1970) American Sociological Review , vol.35 , Issue.3 , pp. 515-524
    • Labovitz, S.1
  • 48
    • 0002329570 scopus 로고    scopus 로고
    • A review on the use of action research in information systems and qualitative research
    • L. A. Liebenau and J. Degross. London
    • Lau, F.: 1997, 'A Review on the Use of Action Research in Information Systems and Qualitative Research'. Information Systems and Qualitative Research. L. A. Liebenau and J. Degross. London. 31-68.
    • (1997) Information Systems and Qualitative Research , pp. 31-68
    • Lau, F.1
  • 50
    • 84887040062 scopus 로고    scopus 로고
    • Pirates on the web, spoils on the street
    • 11 July 2002
    • Lee, J.: 2002, 'Pirates on the Web, Spoils on the Street' The New York Times. 11 July 2002: 1.
    • (2002) The New York Times , pp. 1
    • Lee, J.1
  • 52
    • 0037096996 scopus 로고    scopus 로고
    • A public verifiable copy protection technique for still images
    • Lee, W. B. and T. H. Chen: 2002, 'A Public Verifiable Copy Protection Technique for Still Images', Journal of Systems and Software 62(3), 195-204.
    • (2002) Journal of Systems and Software , vol.62 , Issue.3 , pp. 195-204
    • Lee, W.B.1    Chen, T.H.2
  • 53
    • 0001859044 scopus 로고
    • A technique for the measurement of attitudes
    • Likert, R.: 1932, 'A Technique for the Measurement of Attitudes', Archives of Psychology 140(June), 5-53.
    • (1932) Archives of Psychology , vol.140 , Issue.JUNE , pp. 5-53
    • Likert, R.1
  • 54
    • 0142123338 scopus 로고    scopus 로고
    • The IT way of loafing on the job: Cyberloafing, neutralizing and organizational justice
    • Lim, V. K. G.: 2002, 'The IT Way of Loafing on the Job: Cyberloafing, Neutralizing and Organizational Justice', Journal of Organizationl Behavior 23, 675-694.
    • (2002) Journal of Organizationl Behavior , vol.23 , pp. 675-694
    • Lim, V.K.G.1
  • 56
    • 0030194196 scopus 로고    scopus 로고
    • Evaluating ethical decision making and computer use
    • Loch, K. D. and S. Conger: 1996, 'Evaluating Ethical Decision Making and Computer Use', Communications of the ACM 39(7), 74-83.
    • (1996) Communications of the ACM , vol.39 , Issue.7 , pp. 74-83
    • Loch, K.D.1    Conger, S.2
  • 58
    • 3242671556 scopus 로고
    • Software piracy: Is it related to level of moral judgement?
    • Logsdon, J. M., J. K. Thompson and R. A. Reid: 1994, 'Software Piracy: Is It Related to Level of Moral Judgement?', Journal of Business Ethics 13, 849-857.
    • (1994) Journal of Business Ethics , vol.13 , pp. 849-857
    • Logsdon, J.M.1    Thompson, J.K.2    Reid, R.A.3
  • 60
    • 33646557413 scopus 로고    scopus 로고
    • Jail for US pirate
    • Mackenzie, K.: 2002, 'Jail for US Pirate', The Australian 16(July), 26.
    • (2002) The Australian , vol.16 , Issue.JULY , pp. 26
    • Mackenzie, K.1
  • 61
    • 0032115861 scopus 로고    scopus 로고
    • An assessment of survey research in POM: From constructs to theory
    • Malhotra, M. K. and V. Grover: 1998, 'An Assessment of Survey Research in POM: From Constructs to Theory', Journal of Operations Managment 16(4), 407-425.
    • (1998) Journal of Operations Managment , vol.16 , Issue.4 , pp. 407-425
    • Malhotra, M.K.1    Grover, V.2
  • 62
    • 58149425798 scopus 로고
    • A theory of human motivation
    • Maslow, A. H.: 1943, 'A Theory of Human Motivation', Psychological Review 50, 370-396.
    • (1943) Psychological Review , vol.50 , pp. 370-396
    • Maslow, A.H.1
  • 63
    • 9744223901 scopus 로고
    • MIS experiments: A pragmatic perspective the information systems research challenge
    • I. Benbasat (ed.) (Harvard Business School Press, Boston)
    • Mason, R. L.: 1989, 'MIS Experiments: A Pragmatic Perspective The Information Systems Research Challenge', in I. Benbasat (ed.), Experimental Research Methods 2 (Harvard Business School Press, Boston), pp. 3-20.
    • (1989) Experimental Research Methods , vol.2 , pp. 3-20
    • Mason, R.L.1
  • 64
    • 84973746114 scopus 로고
    • Why triangulate?
    • Mathison, S.: 1988, 'Why Triangulate?', Educational Research 17(2), 13-17.
    • (1988) Educational Research , vol.17 , Issue.2 , pp. 13-17
    • Mathison, S.1
  • 65
    • 0021494484 scopus 로고
    • Hardware protection against software piracy
    • Maude, T. and D. Maude: 1984, 'Hardware Protection Against Software Piracy', Communications of the ACM 27(9). 950-959.
    • (1984) Communications of the ACM , vol.27 , Issue.9 , pp. 950-959
    • Maude, T.1    Maude, D.2
  • 67
    • 0019495519 scopus 로고
    • Techniques of neutralization: A reconceptualizadon and empirical examination
    • Minor, W. W.: 1981, 'Techniques of Neutralization: A Reconceptualizadon and Empirical Examination', Journal of Research in Crime and Delinquency 18 (2), 295-318.
    • (1981) Journal of Research in Crime and Delinquency , vol.18 , Issue.2 , pp. 295-318
    • Minor, W.W.1
  • 68
    • 33646541458 scopus 로고    scopus 로고
    • Steal this disk: Copy protection, consumers' rights, and the digital millennium copyright act
    • Moore, P.: 2003, 'Steal This Disk: Copy Protection, Consumers' Rights, and the Digital Millennium Copyright Act', Northwestern University Law Review 97(3), 1437-1470.
    • (2003) Northwestern University Law Review , vol.97 , Issue.3 , pp. 1437-1470
    • Moore, P.1
  • 69
    • 4344702911 scopus 로고    scopus 로고
    • A reversed context analysis of software piracy issues in Singapore
    • Moores, T. T. and J. Dhaliwal: 2004, 'A Reversed Context Analysis of Software Piracy Issues in Singapore', Information & Management 41(8), 1037-1042.
    • (2004) Information & Management , vol.41 , Issue.8 , pp. 1037-1042
    • Moores, T.T.1    Dhaliwal, J.2
  • 70
    • 0042223455 scopus 로고    scopus 로고
    • Software piracy: A view from Hong Kong
    • Moores, T. and G. Dhillon: 2000, 'Software Piracy: A View From Hong Kong', Communications of the ACM 3(12), 88-92.
    • (2000) Communications of the ACM , vol.3 , Issue.12 , pp. 88-92
    • Moores, T.1    Dhillon, G.2
  • 71
    • 0036206308 scopus 로고    scopus 로고
    • E-research: Ethics, security, design, and control in psychological research on the internet
    • Nosek, B. A., M.R. Banaji and A. G. Greenwald: 2002, 'E-research: Ethics, Security, Design, and Control in Psychological Research on the Internet', Journal of Social Issues 58(1), 161-176.
    • (2002) Journal of Social Issues , vol.58 , Issue.1 , pp. 161-176
    • Nosek, B.A.1    Banaji, M.R.2    Greenwald, A.G.3
  • 72
    • 0038388990 scopus 로고    scopus 로고
    • Neutralization theory and the denial of risk: Some evidence from cannabis use among French adolescents
    • Peretti-Watel, P.: 2003, 'Neutralization Theory and the Denial of Risk: Some Evidence From Cannabis Use Among French Adolescents', British Journal of Sociology 54(1), 21-42.
    • (2003) British Journal of Sociology , vol.54 , Issue.1 , pp. 21-42
    • Peretti-Watel, P.1
  • 73
    • 33646564146 scopus 로고    scopus 로고
    • Law enforcement targets warez sites
    • Piazza, P.: 2002, 'Law Enforcement Targets Warez Sites', Security Management 46(3), 34.
    • (2002) Security Management , vol.46 , Issue.3 , pp. 34
    • Piazza, P.1
  • 74
    • 0030121915 scopus 로고    scopus 로고
    • Computer ethics: The role of personal, informal, and formal codes
    • Pierce, M. A. and J. W. Henry: 1996, 'Computer Ethics: The Role of Personal, Informal, and Formal Codes', Journal of Business Ethics 15, 425-437.
    • (1996) Journal of Business Ethics , vol.15 , pp. 425-437
    • Pierce, M.A.1    Henry, J.W.2
  • 76
    • 33646555537 scopus 로고
    • Software theft and copy protection
    • Rosenberg, V.: 1989, 'Software Theft and Copy Protection', Library Journal 114(2), 46-47.
    • (1989) Library Journal , vol.114 , Issue.2 , pp. 46-47
    • Rosenberg, V.1
  • 77
    • 0345813428 scopus 로고    scopus 로고
    • Copy-protection system for photographic paper
    • Schildkraut, J. S. and J. Gasper: 2000, 'Copy-Protection System for Photographic Paper', Journal of Electronic Imaging 9(4), 556-563.
    • (2000) Journal of Electronic Imaging , vol.9 , Issue.4 , pp. 556-563
    • Schildkraut, J.S.1    Gasper, J.2
  • 79
    • 0040035862 scopus 로고
    • A comparative study of unauthorized software copying: Information systems faculty members' vs practicing managers' perceptions
    • R. Dejoie, G. Fowler and D. Paradice (eds.) (Boyd & Fraser, Boston)
    • Shim, J. P. and G. S. Taylor: 1991, 'A Comparative Study of Unauthorized Software Copying: Information Systems Faculty Members' vs Practicing Managers' Perceptions', in R. Dejoie, G. Fowler and D. Paradice (eds.), Ethical Issues in Information Systems (Boyd & Fraser, Boston), pp. 189-199.
    • (1991) Ethical Issues in Information Systems , pp. 189-199
    • Shim, J.P.1    Taylor, G.S.2
  • 80
    • 0023777074 scopus 로고
    • Ethical and professional dimensions of socially sensitive research
    • Sieber, J. E. and B. Stanley: 1988, 'Ethical and Professional Dimensions of Socially Sensitive Research', American Psychologist 43, 49-55.
    • (1988) American Psychologist , vol.43 , pp. 49-55
    • Sieber, J.E.1    Stanley, B.2
  • 82
    • 0030215265 scopus 로고    scopus 로고
    • Toward a profile of student software piraters
    • Sims, R. R., H. K. Cheng and H. Teegen: 1996, 'Toward a Profile of Student Software Piraters', Journal of Business Ethics 15(8), 839-849.
    • (1996) Journal of Business Ethics , vol.15 , Issue.8 , pp. 839-849
    • Sims, R.R.1    Cheng, H.K.2    Teegen, H.3
  • 83
    • 0005568298 scopus 로고    scopus 로고
    • The electronic survey technique: An integration and assessment
    • Simsek, Z. and J. F. Veiga: 2000, 'The Electronic Survey Technique: An Integration and Assessment', Organizational Research Methods 3(1), 93-115.
    • (2000) Organizational Research Methods , vol.3 , Issue.1 , pp. 93-115
    • Simsek, Z.1    Veiga, J.F.2
  • 84
    • 0001040385 scopus 로고    scopus 로고
    • A primer on internet organizational surveys
    • Simsek, Z. and J. F. Veiga: 2001, 'A Primer on Internet Organizational Surveys', Organizational Research Methods 4(3), 218-235.
    • (2001) Organizational Research Methods , vol.4 , Issue.3 , pp. 218-235
    • Simsek, Z.1    Veiga, J.F.2
  • 85
    • 0000256820 scopus 로고    scopus 로고
    • Virtual subjects: Using the internet as an alternative source of subjects and research environment
    • Smith, M. A. and B. Leigh: 1997, 'Virtual Subjects: Using the Internet as an Alternative Source of Subjects and Research Environment', Behavior Research Methods, Instruments and Computers 29, 496-505.
    • (1997) Behavior Research Methods, Instruments and Computers , vol.29 , pp. 496-505
    • Smith, M.A.1    Leigh, B.2
  • 87
    • 0003235710 scopus 로고
    • The effect of demographic factors on attitudes toward software piracy
    • R. Dejoie, G. Fowler and D. Paradice (eds.) (Boyd & Fraser, Boston)
    • Solomon, S. L. and J. A. O'Brien: 1991, 'The Effect of Demographic Factors on Attitudes Toward Software Piracy', in R. Dejoie, G. Fowler and D. Paradice (eds.), Ethical Issues in Information Systems (Boyd & Fraser, Boston), pp. 168-181.
    • (1991) Ethical Issues in Information Systems , pp. 168-181
    • Solomon, S.L.1    O'Brien, J.A.2
  • 89
    • 55249123249 scopus 로고
    • Validating instruments in MIS research
    • Straub, D. W.: 1989, 'Validating Instruments in MIS Research', MIS Quarterly 13(2), 147-169.
    • (1989) MIS Quarterly , vol.13 , Issue.2 , pp. 147-169
    • Straub, D.W.1
  • 90
    • 38149146955 scopus 로고
    • How consumers may justify inappropriate behavior in market settings: An application on the techniques of neutralization
    • Strutton, D., S. J. Vitell and L. E. Pelton: 1994, 'How Consumers May Justify Inappropriate Behavior in Market Settings: An Application on the Techniques of Neutralization', Journal of Business Research 30(3), 253-z260.
    • (1994) Journal of Business Research , vol.30 , Issue.3
    • Strutton, D.1    Vitell, S.J.2    Pelton, L.E.3
  • 91
    • 0001155759 scopus 로고
    • Techniques of neutralization: A theory of delinquency
    • Sykes, G. M. and D. Matza: 1957, 'Techniques of Neutralization: A Theory of Delinquency', American Sociological Review 22(6), 664-670.
    • (1957) American Sociological Review , vol.22 , Issue.6 , pp. 664-670
    • Sykes, G.M.1    Matza, D.2
  • 92
    • 0001835067 scopus 로고
    • Social identification and psychological group formation
    • H. Tajfel (ed.) (Cambridge University Press, Cambridge)
    • Turner, J. C.: 1984, 'Social Identification and Psychological Group Formation', in H. Tajfel (ed.), The Social Dimension: European Developments in Social Psychology (Cambridge University Press, Cambridge).
    • (1984) The Social Dimension: European Developments in Social Psychology
    • Turner, J.C.1
  • 93
    • 33646589092 scopus 로고
    • Software piracy - Only one per customer
    • Tyler, M.: 1984, 'Software Piracy - Only One Per Customer', Datamation 30(5), 49.
    • (1984) Datamation , vol.30 , Issue.5 , pp. 49
    • Tyler, M.1
  • 95
    • 0039862666 scopus 로고
    • Cambridge-University Press, Cambridge
    • Vernon, M. D.: 1969, Human Motivation (Cambridge-University Press, Cambridge).
    • (1969) Human Motivation
    • Vernon, M.D.1
  • 97
    • 0035475210 scopus 로고    scopus 로고
    • Copy protection technology is doomed
    • Wallach, D. S.: 2001, 'Copy Protection Technology is Doomed', Computer 34(10), 48-49.
    • (2001) Computer , vol.34 , Issue.10 , pp. 48-49
    • Wallach, D.S.1
  • 98
    • 0029482292 scopus 로고
    • Living on the street - Social-organization and gender relations of Australian street kids
    • Winchester, H. P. M. and L. N. Costello: 1995, 'Living on the Street - Social-Organization and Gender Relations of Australian Street Kids', Environment and Planning D-Society & Space 13(3), 329-348.
    • (1995) Environment and Planning D-society & Space , vol.13 , Issue.3 , pp. 329-348
    • Winchester, H.P.M.1    Costello, L.N.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.