-
3
-
-
0031161643
-
Software Copyright Infringements: An Exploratory Study of the Effects of Individual and Peer Beliefs
-
AJ-Jabri, I. and A. Abdul-Gader: 1997, 'Software Copyright Infringements: An Exploratory Study of the Effects of Individual and Peer Beliefs', Omega, International Journal of Management Science 25(3), 335.
-
(1997)
Omega, International Journal of Management Science
, vol.25
, Issue.3
, pp. 335
-
-
Aj-Jabri, I.1
Abdul-Gader, A.2
-
5
-
-
0004285650
-
-
West Publishing Co., New York, USA
-
Anderson, D. R., D. J. Sweeney and T. A. Williams: 1987, Statistics for Business and Economics 3(West Publishing Co., New York, USA).
-
(1987)
Statistics for Business and Economics
, vol.3
-
-
Anderson, D.R.1
Sweeney, D.J.2
Williams, T.A.3
-
6
-
-
0003010471
-
Social identity theory and the organization
-
Ashforth, B. E. and F. Mael: 1989, 'Social Identity Theory and the Organization', The Academy of Management Review 14(1), 20-39.
-
(1989)
The Academy of Management Review
, vol.14
, Issue.1
, pp. 20-39
-
-
Ashforth, B.E.1
Mael, F.2
-
7
-
-
33646563519
-
Hackers profiled - Who are they and what are their motivations?
-
Barber, R.: 2001, 'Hackers Profiled - Who Are They and What Are Their Motivations?', Computer Fraud & Security 2001(2), 14-17.
-
(2001)
Computer Fraud & Security
, vol.2001
, Issue.2
, pp. 14-17
-
-
Barber, R.1
-
8
-
-
0041025045
-
Motivation sources inventory: Development and validation of new scales to measure an integrative taxonomy of motivation
-
Barbuto, J. E. and R. W. Scholl: 1998, 'Motivation Sources Inventory: Development and Validation of New Scales to Measure an Integrative Taxonomy of Motivation', Psychological Reports 82, 1011-1022.
-
(1998)
Psychological Reports
, vol.82
, pp. 1011-1022
-
-
Barbuto, J.E.1
Scholl, R.W.2
-
10
-
-
33646574705
-
Leader of software theft ring sentenced
-
17 August
-
Cambanis, T.: 2002, 'Leader of Software Theft Ring Sentenced' The Boston Globe. 17 August.
-
(2002)
The Boston Globe
-
-
Cambanis, T.1
-
11
-
-
0009619742
-
Targeting audiences on the internet
-
Cheyne, T. L. and F. E. Ritter: 2001, 'Targeting Audiences on the Internet', Communications of the ACM 44(4), 94-98.
-
(2001)
Communications of the ACM
, vol.44
, Issue.4
, pp. 94-98
-
-
Cheyne, T.L.1
Ritter, F.E.2
-
12
-
-
0001020817
-
Software piracy: An analysis of protection strategies
-
Conner, K. R. and R. P. Rumelt: 1991, 'Software Piracy: An Analysis of Protection Strategies', Management Science 37(2), 125-39.
-
(1991)
Management Science
, vol.37
, Issue.2
, pp. 125-139
-
-
Conner, K.R.1
Rumelt, R.P.2
-
13
-
-
0030548714
-
The kindness of strangers: The usefulness of electronic weak ties for technical advice
-
Constant, D., L. Sproull and S. Kiesler: 1996, 'The Kindness of Strangers: The Usefulness of Electronic Weak Ties for Technical Advice', Organization Science 7(2), 119-135.
-
(1996)
Organization Science
, vol.7
, Issue.2
, pp. 119-135
-
-
Constant, D.1
Sproull, L.2
Kiesler, S.3
-
15
-
-
21844494611
-
Neutralization and deviance in the workplace: Theft of supplies and medicines by hospital nurses
-
Dabney, D.: 1995, 'Neutralization and Deviance in the Workplace: Theft of Supplies and Medicines by Hospital Nurses', Deviant Behavior 16, 313-321.
-
(1995)
Deviant Behavior
, vol.16
, pp. 313-321
-
-
Dabney, D.1
-
16
-
-
0006100376
-
Collecting 'Sensitive' data in business ethics research: A case for the Unmatched Count Technique (UCT)
-
Dalton, D. R., C. M. Daily and J. C. Wimbush: 1997, 'Collecting 'Sensitive' Data in Business Ethics Research: A Case for the Unmatched Count Technique (UCT)', Journal of Business Ethics 16(10), 1049-1058.
-
(1997)
Journal of Business Ethics
, vol.16
, Issue.10
, pp. 1049-1058
-
-
Dalton, D.R.1
Daily, C.M.2
Wimbush, J.C.3
-
17
-
-
84936823933
-
User acceptance of computer technology: A comparison of two theoretical models
-
Davis, F. D.: 1989, 'User Acceptance of Computer Technology: A Comparison of Two Theoretical Models', Management Science 35(8), 982-1003.
-
(1989)
Management Science
, vol.35
, Issue.8
, pp. 982-1003
-
-
Davis, F.D.1
-
18
-
-
0024207303
-
The indignant page: Techniques of neutralization in the publications of paedophile organizations
-
De Young, M.: 1988, 'The Indignant Page: Techniques of Neutralization in the Publications of Paedophile Organizations', Child Abuse & Neglect 12(4), 583-591.
-
(1988)
Child Abuse & Neglect
, vol.12
, Issue.4
, pp. 583-591
-
-
De Young, M.1
-
19
-
-
85008852506
-
Collision or collusion? A discussion and case study of the unplanned triangulation of quantitative and qualitative research methods
-
Deacon, D., A. Bryman and N. Fenton: 1998, 'Collision or Collusion? A Discussion and Case Study of the Unplanned Triangulation of Quantitative and Qualitative Research Methods', International Journal of Social Research Methodolog 1(1), 47-63.
-
(1998)
International Journal of Social Research Methodolog
, vol.1
, Issue.1
, pp. 47-63
-
-
Deacon, D.1
Bryman, A.2
Fenton, N.3
-
24
-
-
0002630250
-
A psycho-social model of software piracy: The development and test of a model
-
R. Dejoie, G. Fowler and D. Paradice (eds.) (Boyd & Fraser, Boston)
-
Eining, M. M. and A. L. Christensen: 1991, 'A Psycho-Social Model of Software Piracy: The Development and Test of a Model', in R. Dejoie, G. Fowler and D. Paradice (eds.), Ethical Issues in Information Systems (Boyd & Fraser, Boston), pp. 182-188.
-
(1991)
Ethical Issues in Information Systems
, pp. 182-188
-
-
Eining, M.M.1
Christensen, A.L.2
-
27
-
-
0004257475
-
-
Sage Publications, Newbury Park
-
Ford, M. E.: 1992, Motivating Humans (Sage Publications, Newbury Park).
-
(1992)
Motivating Humans
-
-
Ford, M.E.1
-
28
-
-
0031197353
-
Social judgments and technological innovation: Adolescents' understanding of property, privacy, and electronic information
-
Friedman, B.: 1997, 'Social Judgments and Technological Innovation: Adolescents' Understanding of Property, Privacy, and Electronic Information', Computers in Human Behavior 13(3), 327-351.
-
(1997)
Computers in Human Behavior
, vol.13
, Issue.3
, pp. 327-351
-
-
Friedman, B.1
-
30
-
-
0035539969
-
Professional lapses: Occupational deviance and neutralization techniques in veterinary medical practice
-
Gauthier, D. K.: 2001, 'Professional Lapses: Occupational Deviance and Neutralization Techniques in Veterinary Medical Practice', Deviant Behavior 22(6), 467-490.
-
(2001)
Deviant Behavior
, vol.22
, Issue.6
, pp. 467-490
-
-
Gauthier, D.K.1
-
32
-
-
77953283315
-
Software piracy: Estimation of lost sales and the impact 011 software diffusion
-
Givon, M., V. Mahajan and E. Muller: 1995, 'Software Piracy: Estimation of Lost Sales and the Impact 011 Software Diffusion', Journal of Marketing 59(1), 29-38.
-
(1995)
Journal of Marketing
, vol.59
, Issue.1
, pp. 29-38
-
-
Givon, M.1
Mahajan, V.2
Muller, E.3
-
33
-
-
0030295452
-
Situational determinants of software piracy: An equity theory perspective
-
Glass, R. S. and W. A. Wood: 1996, 'Situational Determinants of Software Piracy: An Equity Theory Perspective', Journal of Business Ethics 15(11), 1189-1198.
-
(1996)
Journal of Business Ethics
, vol.15
, Issue.11
, pp. 1189-1198
-
-
Glass, R.S.1
Wood, W.A.2
-
35
-
-
0032245475
-
International software piracy: Analysis of key issues and impacts
-
Gopal, R. D. and G. L. Sanders: 1998, 'International Software Piracy: Analysis of Key Issues and Impacts', Information Systems Research 9(4), 380-397.
-
(1998)
Information Systems Research
, vol.9
, Issue.4
, pp. 380-397
-
-
Gopal, R.D.1
Sanders, G.L.2
-
36
-
-
0002481588
-
Global software piracy: You can't get blood from a turnip
-
Gopal, R. D. and G. L. Sanders: 2000, 'Global Software Piracy: You Can't Get Blood From A Turnip', Communications of the ACM 43(9), 82-89.
-
(2000)
Communications of the ACM
, vol.43
, Issue.9
, pp. 82-89
-
-
Gopal, R.D.1
Sanders, G.L.2
-
37
-
-
0011188325
-
Analyzing methodological rigor of MIS survey research from 1980-1989
-
Grover, V., C. Lee and D. Durand: 1994, 'Analyzing Methodological Rigor of MIS Survey Research From 1980-1989', Information & Management 24(6), 305-318.
-
(1994)
Information & Management
, vol.24
, Issue.6
, pp. 305-318
-
-
Grover, V.1
Lee, C.2
Durand, D.3
-
38
-
-
0037370954
-
The good mother: Neutralization techniques used by pageant mothers
-
Heltsley, M. and T. C. Calhoun: 2003, 'The Good Mother: Neutralization Techniques Used by Pageant Mothers', Deviant Behavior 24(2), 81-100.
-
(2003)
Deviant Behavior
, vol.24
, Issue.2
, pp. 81-100
-
-
Heltsley, M.1
Calhoun, T.C.2
-
40
-
-
12744275983
-
Trends and patterns among online software pirates
-
Hinduja, S.: 2003, 'Trends and Patterns Among Online Software Pirates', Ethics and Information Technology 5(1), 49-61.
-
(2003)
Ethics and Information Technology
, vol.5
, Issue.1
, pp. 49-61
-
-
Hinduja, S.1
-
41
-
-
84928836007
-
Neutralizing in the workplace: An empirical analysis of property theft and production deviance
-
Hollinger, R. C.: 1991, 'Neutralizing in the Workplace: An Empirical Analysis of Property Theft and Production Deviance', Deviant Behavior 12, 169-202.
-
(1991)
Deviant Behavior
, vol.12
, pp. 169-202
-
-
Hollinger, R.C.1
-
42
-
-
0033176621
-
Social desirability, anonymity and internet-based questionnaires behavior research methods
-
Joinson, A.: 1999, 'Social Desirability, Anonymity and Internet-Based Questionnaires Behavior Research Methods', Instruments and Computers 31, 433-438.
-
(1999)
Instruments and Computers
, vol.31
, pp. 433-438
-
-
Joinson, A.1
-
44
-
-
0001946339
-
A set of principles for conducting and evaluating interpretive field studies in information systems
-
Klein, H. K. and M. D. Myers: 1999, 'A Set of Principles for Conducting and Evaluating Interpretive Field Studies in Information Systems', MIS Quarterly 23(1), 67-93.
-
(1999)
MIS Quarterly
, vol.23
, Issue.1
, pp. 67-93
-
-
Klein, H.K.1
Myers, M.D.2
-
45
-
-
1242263532
-
Why there aren't more information security research studies
-
Kotulic, A. G. and J. G. Clark: 2004, 'Why There Aren't More Information Security Research Studies', Information & Management 41(5), 597-607.
-
(2004)
Information & Management
, vol.41
, Issue.5
, pp. 597-607
-
-
Kotulic, A.G.1
Clark, J.G.2
-
46
-
-
0347931701
-
The effects of attitudmal and demographic factors on intention to buy pirated CDs: The case of Chinese consumers
-
Kwong, K. K., O. H. M. Yau, J. S. Y. Lee, L. Y. M. Sin and A. C. B. Tse: 2003, 'The Effects of Attitudmal and Demographic Factors on Intention to Buy Pirated CDs: The Case of Chinese Consumers', Journal of Business Ethics 47(3), 223-235.
-
(2003)
Journal of Business Ethics
, vol.47
, Issue.3
, pp. 223-235
-
-
Kwong, K.K.1
Yau, O.H.M.2
Lee, J.S.Y.3
Sin, L.Y.M.4
Tse, A.C.B.5
-
47
-
-
84951398823
-
The assignment of numbers to rank order categories
-
Labovitz, S.: 1970, 'The Assignment of Numbers to Rank Order Categories', American Sociological Review 35(3), 515-524.
-
(1970)
American Sociological Review
, vol.35
, Issue.3
, pp. 515-524
-
-
Labovitz, S.1
-
48
-
-
0002329570
-
A review on the use of action research in information systems and qualitative research
-
L. A. Liebenau and J. Degross. London
-
Lau, F.: 1997, 'A Review on the Use of Action Research in Information Systems and Qualitative Research'. Information Systems and Qualitative Research. L. A. Liebenau and J. Degross. London. 31-68.
-
(1997)
Information Systems and Qualitative Research
, pp. 31-68
-
-
Lau, F.1
-
49
-
-
84896939898
-
The illegal copy protection using hidden agent
-
Lee D., Lee I., Ahn J., Kong Y.: 2002, 'The Illegal Copy Protection Using Hidden Agent'. Eurasia-ICT 2002: Information and Communication Technology, Proceedings. 832-841.
-
(2002)
Eurasia-ICT 2002: Information and Communication Technology, Proceedings
, pp. 832-841
-
-
Lee, D.1
Lee, I.2
Ahn, J.3
Kong, Y.4
-
50
-
-
84887040062
-
Pirates on the web, spoils on the street
-
11 July 2002
-
Lee, J.: 2002, 'Pirates on the Web, Spoils on the Street' The New York Times. 11 July 2002: 1.
-
(2002)
The New York Times
, pp. 1
-
-
Lee, J.1
-
52
-
-
0037096996
-
A public verifiable copy protection technique for still images
-
Lee, W. B. and T. H. Chen: 2002, 'A Public Verifiable Copy Protection Technique for Still Images', Journal of Systems and Software 62(3), 195-204.
-
(2002)
Journal of Systems and Software
, vol.62
, Issue.3
, pp. 195-204
-
-
Lee, W.B.1
Chen, T.H.2
-
53
-
-
0001859044
-
A technique for the measurement of attitudes
-
Likert, R.: 1932, 'A Technique for the Measurement of Attitudes', Archives of Psychology 140(June), 5-53.
-
(1932)
Archives of Psychology
, vol.140
, Issue.JUNE
, pp. 5-53
-
-
Likert, R.1
-
54
-
-
0142123338
-
The IT way of loafing on the job: Cyberloafing, neutralizing and organizational justice
-
Lim, V. K. G.: 2002, 'The IT Way of Loafing on the Job: Cyberloafing, Neutralizing and Organizational Justice', Journal of Organizationl Behavior 23, 675-694.
-
(2002)
Journal of Organizationl Behavior
, vol.23
, pp. 675-694
-
-
Lim, V.K.G.1
-
56
-
-
0030194196
-
Evaluating ethical decision making and computer use
-
Loch, K. D. and S. Conger: 1996, 'Evaluating Ethical Decision Making and Computer Use', Communications of the ACM 39(7), 74-83.
-
(1996)
Communications of the ACM
, vol.39
, Issue.7
, pp. 74-83
-
-
Loch, K.D.1
Conger, S.2
-
58
-
-
3242671556
-
Software piracy: Is it related to level of moral judgement?
-
Logsdon, J. M., J. K. Thompson and R. A. Reid: 1994, 'Software Piracy: Is It Related to Level of Moral Judgement?', Journal of Business Ethics 13, 849-857.
-
(1994)
Journal of Business Ethics
, vol.13
, pp. 849-857
-
-
Logsdon, J.M.1
Thompson, J.K.2
Reid, R.A.3
-
60
-
-
33646557413
-
Jail for US pirate
-
Mackenzie, K.: 2002, 'Jail for US Pirate', The Australian 16(July), 26.
-
(2002)
The Australian
, vol.16
, Issue.JULY
, pp. 26
-
-
Mackenzie, K.1
-
61
-
-
0032115861
-
An assessment of survey research in POM: From constructs to theory
-
Malhotra, M. K. and V. Grover: 1998, 'An Assessment of Survey Research in POM: From Constructs to Theory', Journal of Operations Managment 16(4), 407-425.
-
(1998)
Journal of Operations Managment
, vol.16
, Issue.4
, pp. 407-425
-
-
Malhotra, M.K.1
Grover, V.2
-
62
-
-
58149425798
-
A theory of human motivation
-
Maslow, A. H.: 1943, 'A Theory of Human Motivation', Psychological Review 50, 370-396.
-
(1943)
Psychological Review
, vol.50
, pp. 370-396
-
-
Maslow, A.H.1
-
63
-
-
9744223901
-
MIS experiments: A pragmatic perspective the information systems research challenge
-
I. Benbasat (ed.) (Harvard Business School Press, Boston)
-
Mason, R. L.: 1989, 'MIS Experiments: A Pragmatic Perspective The Information Systems Research Challenge', in I. Benbasat (ed.), Experimental Research Methods 2 (Harvard Business School Press, Boston), pp. 3-20.
-
(1989)
Experimental Research Methods
, vol.2
, pp. 3-20
-
-
Mason, R.L.1
-
64
-
-
84973746114
-
Why triangulate?
-
Mathison, S.: 1988, 'Why Triangulate?', Educational Research 17(2), 13-17.
-
(1988)
Educational Research
, vol.17
, Issue.2
, pp. 13-17
-
-
Mathison, S.1
-
65
-
-
0021494484
-
Hardware protection against software piracy
-
Maude, T. and D. Maude: 1984, 'Hardware Protection Against Software Piracy', Communications of the ACM 27(9). 950-959.
-
(1984)
Communications of the ACM
, vol.27
, Issue.9
, pp. 950-959
-
-
Maude, T.1
Maude, D.2
-
67
-
-
0019495519
-
Techniques of neutralization: A reconceptualizadon and empirical examination
-
Minor, W. W.: 1981, 'Techniques of Neutralization: A Reconceptualizadon and Empirical Examination', Journal of Research in Crime and Delinquency 18 (2), 295-318.
-
(1981)
Journal of Research in Crime and Delinquency
, vol.18
, Issue.2
, pp. 295-318
-
-
Minor, W.W.1
-
68
-
-
33646541458
-
Steal this disk: Copy protection, consumers' rights, and the digital millennium copyright act
-
Moore, P.: 2003, 'Steal This Disk: Copy Protection, Consumers' Rights, and the Digital Millennium Copyright Act', Northwestern University Law Review 97(3), 1437-1470.
-
(2003)
Northwestern University Law Review
, vol.97
, Issue.3
, pp. 1437-1470
-
-
Moore, P.1
-
69
-
-
4344702911
-
A reversed context analysis of software piracy issues in Singapore
-
Moores, T. T. and J. Dhaliwal: 2004, 'A Reversed Context Analysis of Software Piracy Issues in Singapore', Information & Management 41(8), 1037-1042.
-
(2004)
Information & Management
, vol.41
, Issue.8
, pp. 1037-1042
-
-
Moores, T.T.1
Dhaliwal, J.2
-
70
-
-
0042223455
-
Software piracy: A view from Hong Kong
-
Moores, T. and G. Dhillon: 2000, 'Software Piracy: A View From Hong Kong', Communications of the ACM 3(12), 88-92.
-
(2000)
Communications of the ACM
, vol.3
, Issue.12
, pp. 88-92
-
-
Moores, T.1
Dhillon, G.2
-
71
-
-
0036206308
-
E-research: Ethics, security, design, and control in psychological research on the internet
-
Nosek, B. A., M.R. Banaji and A. G. Greenwald: 2002, 'E-research: Ethics, Security, Design, and Control in Psychological Research on the Internet', Journal of Social Issues 58(1), 161-176.
-
(2002)
Journal of Social Issues
, vol.58
, Issue.1
, pp. 161-176
-
-
Nosek, B.A.1
Banaji, M.R.2
Greenwald, A.G.3
-
72
-
-
0038388990
-
Neutralization theory and the denial of risk: Some evidence from cannabis use among French adolescents
-
Peretti-Watel, P.: 2003, 'Neutralization Theory and the Denial of Risk: Some Evidence From Cannabis Use Among French Adolescents', British Journal of Sociology 54(1), 21-42.
-
(2003)
British Journal of Sociology
, vol.54
, Issue.1
, pp. 21-42
-
-
Peretti-Watel, P.1
-
73
-
-
33646564146
-
Law enforcement targets warez sites
-
Piazza, P.: 2002, 'Law Enforcement Targets Warez Sites', Security Management 46(3), 34.
-
(2002)
Security Management
, vol.46
, Issue.3
, pp. 34
-
-
Piazza, P.1
-
74
-
-
0030121915
-
Computer ethics: The role of personal, informal, and formal codes
-
Pierce, M. A. and J. W. Henry: 1996, 'Computer Ethics: The Role of Personal, Informal, and Formal Codes', Journal of Business Ethics 15, 425-437.
-
(1996)
Journal of Business Ethics
, vol.15
, pp. 425-437
-
-
Pierce, M.A.1
Henry, J.W.2
-
75
-
-
33646537561
-
-
Australian Institute of Computer Ethics Conference, Swinburne University of Technology, Melbourne, Australia
-
Rahim, M. M., A. H. Seyal and M. N. A. Rahman: 1999, 'Software Piracy Among Tertiary Students In Brunei Darnssalam: An Empirical Study' (Australian Institute of Computer Ethics Conference, Swinburne University of Technology, Melbourne, Australia).
-
(1999)
Software Piracy among Tertiary Students in Brunei Darnssalam: An Empirical Study
-
-
Rahim, M.M.1
Seyal, A.H.2
Rahman, M.N.A.3
-
76
-
-
33646555537
-
Software theft and copy protection
-
Rosenberg, V.: 1989, 'Software Theft and Copy Protection', Library Journal 114(2), 46-47.
-
(1989)
Library Journal
, vol.114
, Issue.2
, pp. 46-47
-
-
Rosenberg, V.1
-
77
-
-
0345813428
-
Copy-protection system for photographic paper
-
Schildkraut, J. S. and J. Gasper: 2000, 'Copy-Protection System for Photographic Paper', Journal of Electronic Imaging 9(4), 556-563.
-
(2000)
Journal of Electronic Imaging
, vol.9
, Issue.4
, pp. 556-563
-
-
Schildkraut, J.S.1
Gasper, J.2
-
79
-
-
0040035862
-
A comparative study of unauthorized software copying: Information systems faculty members' vs practicing managers' perceptions
-
R. Dejoie, G. Fowler and D. Paradice (eds.) (Boyd & Fraser, Boston)
-
Shim, J. P. and G. S. Taylor: 1991, 'A Comparative Study of Unauthorized Software Copying: Information Systems Faculty Members' vs Practicing Managers' Perceptions', in R. Dejoie, G. Fowler and D. Paradice (eds.), Ethical Issues in Information Systems (Boyd & Fraser, Boston), pp. 189-199.
-
(1991)
Ethical Issues in Information Systems
, pp. 189-199
-
-
Shim, J.P.1
Taylor, G.S.2
-
80
-
-
0023777074
-
Ethical and professional dimensions of socially sensitive research
-
Sieber, J. E. and B. Stanley: 1988, 'Ethical and Professional Dimensions of Socially Sensitive Research', American Psychologist 43, 49-55.
-
(1988)
American Psychologist
, vol.43
, pp. 49-55
-
-
Sieber, J.E.1
Stanley, B.2
-
81
-
-
0001550607
-
Softlifting: A model of motivating factors
-
Simpson, P. M., D. Banerjee and C. L. Simpson: 1994, 'Softlifting: A Model of Motivating Factors', Journal of Business Ethics 13, 431-438.
-
(1994)
Journal of Business Ethics
, vol.13
, pp. 431-438
-
-
Simpson, P.M.1
Banerjee, D.2
Simpson, C.L.3
-
82
-
-
0030215265
-
Toward a profile of student software piraters
-
Sims, R. R., H. K. Cheng and H. Teegen: 1996, 'Toward a Profile of Student Software Piraters', Journal of Business Ethics 15(8), 839-849.
-
(1996)
Journal of Business Ethics
, vol.15
, Issue.8
, pp. 839-849
-
-
Sims, R.R.1
Cheng, H.K.2
Teegen, H.3
-
83
-
-
0005568298
-
The electronic survey technique: An integration and assessment
-
Simsek, Z. and J. F. Veiga: 2000, 'The Electronic Survey Technique: An Integration and Assessment', Organizational Research Methods 3(1), 93-115.
-
(2000)
Organizational Research Methods
, vol.3
, Issue.1
, pp. 93-115
-
-
Simsek, Z.1
Veiga, J.F.2
-
84
-
-
0001040385
-
A primer on internet organizational surveys
-
Simsek, Z. and J. F. Veiga: 2001, 'A Primer on Internet Organizational Surveys', Organizational Research Methods 4(3), 218-235.
-
(2001)
Organizational Research Methods
, vol.4
, Issue.3
, pp. 218-235
-
-
Simsek, Z.1
Veiga, J.F.2
-
85
-
-
0000256820
-
Virtual subjects: Using the internet as an alternative source of subjects and research environment
-
Smith, M. A. and B. Leigh: 1997, 'Virtual Subjects: Using the Internet as an Alternative Source of Subjects and Research Environment', Behavior Research Methods, Instruments and Computers 29, 496-505.
-
(1997)
Behavior Research Methods, Instruments and Computers
, vol.29
, pp. 496-505
-
-
Smith, M.A.1
Leigh, B.2
-
87
-
-
0003235710
-
The effect of demographic factors on attitudes toward software piracy
-
R. Dejoie, G. Fowler and D. Paradice (eds.) (Boyd & Fraser, Boston)
-
Solomon, S. L. and J. A. O'Brien: 1991, 'The Effect of Demographic Factors on Attitudes Toward Software Piracy', in R. Dejoie, G. Fowler and D. Paradice (eds.), Ethical Issues in Information Systems (Boyd & Fraser, Boston), pp. 168-181.
-
(1991)
Ethical Issues in Information Systems
, pp. 168-181
-
-
Solomon, S.L.1
O'Brien, J.A.2
-
89
-
-
55249123249
-
Validating instruments in MIS research
-
Straub, D. W.: 1989, 'Validating Instruments in MIS Research', MIS Quarterly 13(2), 147-169.
-
(1989)
MIS Quarterly
, vol.13
, Issue.2
, pp. 147-169
-
-
Straub, D.W.1
-
90
-
-
38149146955
-
How consumers may justify inappropriate behavior in market settings: An application on the techniques of neutralization
-
Strutton, D., S. J. Vitell and L. E. Pelton: 1994, 'How Consumers May Justify Inappropriate Behavior in Market Settings: An Application on the Techniques of Neutralization', Journal of Business Research 30(3), 253-z260.
-
(1994)
Journal of Business Research
, vol.30
, Issue.3
-
-
Strutton, D.1
Vitell, S.J.2
Pelton, L.E.3
-
91
-
-
0001155759
-
Techniques of neutralization: A theory of delinquency
-
Sykes, G. M. and D. Matza: 1957, 'Techniques of Neutralization: A Theory of Delinquency', American Sociological Review 22(6), 664-670.
-
(1957)
American Sociological Review
, vol.22
, Issue.6
, pp. 664-670
-
-
Sykes, G.M.1
Matza, D.2
-
92
-
-
0001835067
-
Social identification and psychological group formation
-
H. Tajfel (ed.) (Cambridge University Press, Cambridge)
-
Turner, J. C.: 1984, 'Social Identification and Psychological Group Formation', in H. Tajfel (ed.), The Social Dimension: European Developments in Social Psychology (Cambridge University Press, Cambridge).
-
(1984)
The Social Dimension: European Developments in Social Psychology
-
-
Turner, J.C.1
-
93
-
-
33646589092
-
Software piracy - Only one per customer
-
Tyler, M.: 1984, 'Software Piracy - Only One Per Customer', Datamation 30(5), 49.
-
(1984)
Datamation
, vol.30
, Issue.5
, pp. 49
-
-
Tyler, M.1
-
95
-
-
0039862666
-
-
Cambridge-University Press, Cambridge
-
Vernon, M. D.: 1969, Human Motivation (Cambridge-University Press, Cambridge).
-
(1969)
Human Motivation
-
-
Vernon, M.D.1
-
97
-
-
0035475210
-
Copy protection technology is doomed
-
Wallach, D. S.: 2001, 'Copy Protection Technology is Doomed', Computer 34(10), 48-49.
-
(2001)
Computer
, vol.34
, Issue.10
, pp. 48-49
-
-
Wallach, D.S.1
-
98
-
-
0029482292
-
Living on the street - Social-organization and gender relations of Australian street kids
-
Winchester, H. P. M. and L. N. Costello: 1995, 'Living on the Street - Social-Organization and Gender Relations of Australian Street Kids', Environment and Planning D-Society & Space 13(3), 329-348.
-
(1995)
Environment and Planning D-society & Space
, vol.13
, Issue.3
, pp. 329-348
-
-
Winchester, H.P.M.1
Costello, L.N.2
-
99
-
-
84973751500
-
Drug history and prisonization - Toward understanding variations in inmate institutional adaptations
-
Winfree, L. T., G. L. Mays, J. E. Crowley and B. J. Peat: 1994, 'Drug History and Prisonization - Toward Understanding Variations in Inmate Institutional Adaptations', International Journal of Offender Therapy and Comparative Criminology 38(4), 281-296.
-
(1994)
International Journal of Offender Therapy and Comparative Criminology
, vol.38
, Issue.4
, pp. 281-296
-
-
Winfree, L.T.1
Mays, G.L.2
Crowley, J.E.3
Peat, B.J.4
|