메뉴 건너뛰기




Volumn 33, Issue 2, 2005, Pages 115-140

Software piracy among college students: A comprehensive review of contributing factors, underlying processes, and tackling strategies

Author keywords

[No Author keywords available]

Indexed keywords


EID: 33744985551     PISSN: 07356331     EISSN: None     Source Type: Journal    
DOI: 10.2190/8M5U-HPQK-F2N5-B574     Document Type: Review
Times cited : (27)

References (63)
  • 3
    • 78549286174 scopus 로고    scopus 로고
    • Examining the effects of culture on perceptions of moral intensity: A comparison of future marketers from Malaysia and New Zealand
    • Gold Coast, Queensland, Australia
    • Ballantine, P. (2000). Examining the effects of culture on perceptions of moral intensity: A comparison of future marketers from Malaysia and New Zealand. Proceedings of AMZMAC 2000 Visionary Marketing for 21st Century: Facing the Challenge, Gold Coast, Queensland, Australia.
    • (2000) Proceedings of AMZMAC 2000 Visionary Marketing for 21st Century: Facing the Challenge
    • Ballantine, P.1
  • 4
    • 0011591891 scopus 로고
    • Hacking, computer viruses, and software piracy: The implications of modem computer fraud for corporations
    • M. P. Spencer & R. Sims (Eds.), Quorum Books, Westport
    • Cheng, H. K. (1995). Hacking, computer viruses, and software piracy: The implications of modem computer fraud for corporations. In Corporate misconduct: The legal, societal and management issues, M. P. Spencer & R. Sims (Eds.), Quorum Books, Westport, pp. 125-147.
    • (1995) Corporate Misconduct: The Legal, Societal and Management Issues , pp. 125-147
    • Cheng, H.K.1
  • 5
    • 0031288383 scopus 로고    scopus 로고
    • To purchase or to pirate software: An empirical study
    • Cheng, H. K., Sims, R. R., & Teegen, H. (1997). To purchase or to pirate software: An empirical study. Journal of MS, 13(4), 49-60.
    • (1997) Journal of MS , vol.13 , Issue.4 , pp. 49-60
    • Cheng, H.K.1    Sims, R.R.2    Teegen, H.3
  • 6
    • 0001865968 scopus 로고
    • Factors influencing software piracy: Implications for accountants
    • Christensen, A. L., & Eining, M. M. (1991). Factors influencing software piracy: Implications for accountants. Journal of Information Systems, 5(1), 67-80.
    • (1991) Journal of Information Systems , vol.5 , Issue.1 , pp. 67-80
    • Christensen, A.L.1    Eining, M.M.2
  • 7
    • 0011597674 scopus 로고
    • College students believe piracy is acceptable
    • Cohen, E., & Cornwall, L. (1989). College students believe piracy is acceptable. CIS Educator Forum, 1(3), 2-5.
    • (1989) CIS Educator Forum , vol.1 , Issue.3 , pp. 2-5
    • Cohen, E.1    Cornwall, L.2
  • 9
    • 0002630250 scopus 로고
    • A psycho-social model of software piracy: The development and test of a model
    • R. Dejoie, G. Fowler, and D. Paradice (Eds.). Boston, MA: Boyd & Fraser
    • Eining, M. M., & Christensen, A. L. (1991). A psycho-social model of software piracy: The development and test of a model. In R. Dejoie, G. Fowler, and D. Paradice (Eds.), Ethical Issues in Information Systems (pp. 182-188). Boston, MA: Boyd & Fraser.
    • (1991) Ethical Issues in Information Systems , pp. 182-188
    • Eining, M.M.1    Christensen, A.L.2
  • 10
    • 0000577656 scopus 로고
    • Participation in illegitimate activities: A theoretical and empirical investigation
    • Ehrlich, I. (1973). Participation in illegitimate activities: A theoretical and empirical investigation. Journal of Political Economy, 81, 521-565.
    • (1973) Journal of Political Economy , vol.81 , pp. 521-565
    • Ehrlich, I.1
  • 11
    • 33744970157 scopus 로고
    • Computer law - A primer on the law of software protection
    • Ellis, D. R. (1986). Computer law - a primer on the law of software protection. The Florida Bar Journal, 60(4), 81-84.
    • (1986) The Florida Bar Journal , vol.60 , Issue.4 , pp. 81-84
    • Ellis, D.R.1
  • 13
    • 0030295452 scopus 로고    scopus 로고
    • Situational determinants of software piracy: An equity theory perspective
    • Glass, R. S., & Wood, W. A. (1996). Situational determinants of software piracy: An equity theory perspective. Journal of Business Ethics, 15, 1189-1198.
    • (1996) Journal of Business Ethics , vol.15 , pp. 1189-1198
    • Glass, R.S.1    Wood, W.A.2
  • 15
    • 12744267843 scopus 로고    scopus 로고
    • "To pirate or not to pirate": A comparative study of the ethical versus other influences on the consumer's software acquisition-mode decision
    • Gupta, O. B., Gould, S. J., & Pola, B. (2004). "To pirate or not to pirate": A comparative study of the ethical versus other influences on the consumer's software acquisition-mode decision. Journal of Business Ethics, 55, 255-274.
    • (2004) Journal of Business Ethics , vol.55 , pp. 255-274
    • Gupta, O.B.1    Gould, S.J.2    Pola, B.3
  • 16
    • 0343001536 scopus 로고
    • Crime by computer: Correlates of software piracy and unauthorized account access
    • Hollinger, R. C. (1993). Crime by computer: Correlates of software piracy and unauthorized account access. Security Journal, 4(1), 2-12.
    • (1993) Security Journal , vol.4 , Issue.1 , pp. 2-12
    • Hollinger, R.C.1
  • 17
    • 84970109540 scopus 로고
    • A general theory of marketing ethics
    • Hunt, S. D., & Vitell, S. J. (1986). A general theory of marketing ethics. Journal of Macromarketing, 6(1), 5-16.
    • (1986) Journal of Macromarketing , vol.6 , Issue.1 , pp. 5-16
    • Hunt, S.D.1    Vitell, S.J.2
  • 18
    • 0034238348 scopus 로고    scopus 로고
    • The impact of national culture on software piracy
    • Husted, B. W. (2000). The impact of national culture on software piracy. Journal of Business Ethics, 26(3), 197-211.
    • (2000) Journal of Business Ethics , vol.26 , Issue.3 , pp. 197-211
    • Husted, B.W.1
  • 19
    • 0031161643 scopus 로고    scopus 로고
    • Software copyright infringements: An exploratory study of the effects of individual and peer beliefs
    • Im, A. J., & Ah, A. G. (1997). Software copyright infringements: An exploratory study of the effects of individual and peer beliefs. Omega, 25(3), 335-344.
    • (1997) Omega , vol.25 , Issue.3 , pp. 335-344
    • Im, A.J.1    Ah, A.G.2
  • 20
    • 6744219555 scopus 로고
    • Software piracy and responsibilities of educational institutions
    • Im, J. H., & Koen, C. (1990). Software piracy and responsibilities of educational institutions. Information & Management, 18, 189-194.
    • (1990) Information & Management , vol.18 , pp. 189-194
    • Im, J.H.1    Koen, C.2
  • 21
    • 0039686012 scopus 로고    scopus 로고
    • Software piracy and its legal implications
    • Jr, K. M. C., & Im, H. J. (1997). Software piracy and its legal implications. Information & Management, 31, 265-272.
    • (1997) Information & Management , vol.31 , pp. 265-272
    • C. Jr., K.M.1    Im, H.J.2
  • 22
    • 23044520001 scopus 로고    scopus 로고
    • An empirical study of software piracy and moral intensity among university students
    • Kini, R. B., Rominger, A., & Vijayaraman, B. S. (2000). An empirical study of software piracy and moral intensity among university students. Journal of Computer Information Systems, 40(3), 62-72.
    • (2000) Journal of Computer Information Systems , vol.40 , Issue.3 , pp. 62-72
    • Kini, R.B.1    Rominger, A.2    Vijayaraman, B.S.3
  • 23
    • 0037276453 scopus 로고    scopus 로고
    • An exploratory study of moral intensity regarding software piracy of students in Thailand
    • Kini, R. B., Ramakrishna, H. V., & Vijayaraman, B. S. (2003). An exploratory study of moral intensity regarding software piracy of students in Thailand. Behavior & Information Technology, 22(1), 63-70.
    • (2003) Behavior & Information Technology , vol.22 , Issue.1 , pp. 63-70
    • Kini, R.B.1    Ramakrishna, H.V.2    Vijayaraman, B.S.3
  • 24
    • 4043076317 scopus 로고    scopus 로고
    • Shaping of moral intensity regarding software piracy: A comparison between Thailand and U.S. Students
    • Kini, R. B., Ramakrishna, H. V., & Vijayaraman, B. S. (2004). Shaping of moral intensity regarding software piracy: A comparison between Thailand and U.S. students. Journal of Business Ethics, 49, 91-104.
    • (2004) Journal of Business Ethics , vol.49 , pp. 91-104
    • Kini, R.B.1    Ramakrishna, H.V.2    Vijayaraman, B.S.3
  • 25
    • 0000123715 scopus 로고
    • Computer ethics and computer abuse: A study of Swedish and Canadian university data processing students
    • Kowalski, S., & Kowalski, H. (1990). Computer ethics and computer abuse: A study of Swedish and Canadian university data processing students. Information Age, 12(4), 206-212.
    • (1990) Information Age , vol.12 , Issue.4 , pp. 206-212
    • Kowalski, S.1    Kowalski, H.2
  • 28
    • 33744977560 scopus 로고    scopus 로고
    • A brief history of trade secret law, part 1
    • October, 1-4
    • Linek, E. (2004). A brief history of trade secret law, part 1. BioProcess International, October, 1-4.
    • (2004) BioProcess International
    • Linek, E.1
  • 29
    • 3242671556 scopus 로고
    • Software piracy: Is it related to level of moral judgment?
    • Logsdon, M. J., Thompson, K. J., & Reid, A. R. (1994). Software piracy: Is it related to level of moral judgment? Journal of Business Ethics, 13, 849-857.
    • (1994) Journal of Business Ethics , vol.13 , pp. 849-857
    • Logsdon, M.J.1    Thompson, K.J.2    Reid, A.R.3
  • 30
    • 0012092773 scopus 로고
    • Controlling copyright infringements of intellectual property: The case of computer software - Part one
    • Malhotra, Y. (1994a). Controlling copyright infringements of intellectual property: The case of computer software - part one. Journal of Systems Management, 45(6), 32-35.
    • (1994) Journal of Systems Management , vol.45 , Issue.6 , pp. 32-35
    • Malhotra, Y.1
  • 31
    • 0012092773 scopus 로고
    • Controlling copyright infringements of intellectual property: The case of computer software - Part two
    • Malhotra, Y. (1994b). Controlling copyright infringements of intellectual property: The case of computer software - part two. Journal of Systems Management, 45(1), 12-17.
    • (1994) Journal of Systems Management , vol.45 , Issue.1 , pp. 12-17
    • Malhotra, Y.1
  • 32
    • 84935444559 scopus 로고
    • Tailoring legal protection for computer software
    • Menell, P. S. (1987). Tailoring legal protection for computer software. Stanford Law Review, 39, 1351-1372.
    • (1987) Stanford Law Review , vol.39 , pp. 1351-1372
    • Menell, P.S.1
  • 33
    • 0042223455 scopus 로고    scopus 로고
    • Software piracy: A view from Hong Kong
    • Moores, T. T., & Dhillon, G. (2000). Software piracy: A view from Hong Kong. Communications of the ACM, 43(12), 88-93.
    • (2000) Communications of the ACM , vol.43 , Issue.12 , pp. 88-93
    • Moores, T.T.1    Dhillon, G.2
  • 34
    • 4344702911 scopus 로고    scopus 로고
    • A reversed context analysis of software piracy issues in Singapore
    • Moores, T. T., & Dhaliwal, J. (2004). A reversed context analysis of software piracy issues in Singapore. Information & Management, 41, 1037-1042.
    • (2004) Information & Management , vol.41 , pp. 1037-1042
    • Moores, T.T.1    Dhaliwal, J.2
  • 35
    • 0003467282 scopus 로고    scopus 로고
    • Committee on Intellectual Property Rights and the Emerging Information Infrastructure of the Computer Science and Telecommunications Board. National Academy Press, Washington, D.C
    • National Research Council (NRC). (2000). The digital dilemma. Intellectual property in the information age. Committee on Intellectual Property Rights and the Emerging Information Infrastructure of the Computer Science and Telecommunications Board. National Academy Press, Washington, D.C.
    • (2000) The Digital Dilemma. Intellectual Property in the Information Age
  • 39
    • 0007391492 scopus 로고    scopus 로고
    • Software piracy among computing students: A Bruneian scenario
    • Rahim, M. M., Seyal, A. H., & Rahman, M. N. (1999a). Software piracy among computing students: A Bruneian scenario. Computers & Education, 32, 301-321.
    • (1999) Computers & Education , vol.32 , pp. 301-321
    • Rahim, M.M.1    Seyal, A.H.2    Rahman, M.N.3
  • 41
    • 33744972708 scopus 로고    scopus 로고
    • Softlifting intention of students in academia: A normative model
    • Rahim, M. M., Rahman, M. N., & Seyal, A. H. (2000). Softlifting intention of students in academia: A normative model. Malaysian Journal of Computer Science, 13(1), 48-55.
    • (2000) Malaysian Journal of Computer Science , vol.13 , Issue.1 , pp. 48-55
    • Rahim, M.M.1    Rahman, M.N.2    Seyal, A.H.3
  • 42
    • 0035538544 scopus 로고    scopus 로고
    • Factors affecting softlifting intention of computing students: An empirical study
    • Rahim, M. M., Seyal, A. H., & Rahman, M. N. (2001). Factors affecting softlifting intention of computing students: An empirical study. Journal of Educational Computing Research, 24(4), 385-405.
    • (2001) Journal of Educational Computing Research , vol.24 , Issue.4 , pp. 385-405
    • Rahim, M.M.1    Seyal, A.H.2    Rahman, M.N.3
  • 44
    • 84869981479 scopus 로고    scopus 로고
    • The death of digital rights management?
    • Roush, W. (2002). The death of digital rights management? Technology Review, 105(2), 24-25.
    • (2002) Technology Review , vol.105 , Issue.2 , pp. 24-25
    • Roush, W.1
  • 45
    • 84881834137 scopus 로고
    • The expected utility model: Its variants, purposes, evidence and limitations
    • June
    • Schoemaker, P. J. (1982). The expected utility model: Its variants, purposes, evidence and limitations. Journal of Economic Literature, 20, June, 529-563.
    • (1982) Journal of Economic Literature , vol.20 , pp. 529-563
    • Schoemaker, P.J.1
  • 46
    • 84857189122 scopus 로고    scopus 로고
    • Software and Information Industry Association, Washington, D.C.
    • Software Information Industry Association (SIIA). (2000). SIIA's report on global software piracy 2000. Software and Information Industry Association, Washington, D.C.
    • (2000) SIIA's Report on Global Software Piracy 2000
  • 49
    • 0030668250 scopus 로고    scopus 로고
    • A social learning theory analysis of computer crime among college students
    • Skinner, W. F., & Fream, A. M. (1997). A social learning theory analysis of computer crime among college students. Journal of Research in Crime and Delinquency, 34(4), 495-518.
    • (1997) Journal of Research in Crime and Delinquency , vol.34 , Issue.4 , pp. 495-518
    • Skinner, W.F.1    Fream, A.M.2
  • 50
    • 0002961010 scopus 로고
    • The effect of demographic factors on attitudes toward software piracy
    • R. Dejoie, G. Fowler, and D. Paradice (Eds.). Boston, MA: Boyd and Fraser
    • Solomon, L. S., & O'Brien, A. J. (1990). The effect of demographic factors on attitudes toward software piracy. In R. Dejoie, G. Fowler, and D. Paradice (Eds.), Ethical issues in IS. Boston, MA: Boyd and Fraser.
    • (1990) Ethical Issues in IS
    • Solomon, L.S.1    O'Brien, A.J.2
  • 53
    • 0032223746 scopus 로고    scopus 로고
    • Testing an ethical decision-making theory: The case of softlifting
    • Thong, J. Y. L., & Yap, C. S. (1998). Testing an ethical decision-making theory: The case of softlifting. Journal of Management Information Systems, 15(1), 213-237.
    • (1998) Journal of Management Information Systems , vol.15 , Issue.1 , pp. 213-237
    • Thong, J.Y.L.1    Yap, C.S.2
  • 55
    • 0001938286 scopus 로고    scopus 로고
    • Software piracy and global competitiveness: Report on global software piracy
    • Traphagan, M., & Griffith, A. (1998). Software piracy and global competitiveness: Report on global software piracy. International Review of Law, Computers & Technology, 12(3), 431-447.
    • (1998) International Review of Law, Computers & Technology , vol.12 , Issue.3 , pp. 431-447
    • Traphagan, M.1    Griffith, A.2
  • 58
    • 0035217408 scopus 로고    scopus 로고
    • Considerations in ethical decision-making and software piracy
    • Wagner, S. C., & Sanders, G. L. (2001). Considerations in ethical decision-making and software piracy. Journal of Business Ethics, 29(1/2), 161-167.
    • (2001) Journal of Business Ethics , vol.29 , Issue.1-2 , pp. 161-167
    • Wagner, S.C.1    Sanders, G.L.2
  • 60
    • 0036897636 scopus 로고    scopus 로고
    • Dealing with piracy: Intellectual asset management in music and software
    • Wijk, J. V. (2002). Dealing with piracy: Intellectual asset management in music and software. European Management Journal, 20(6), 689-698.
    • (2002) European Management Journal , vol.20 , Issue.6 , pp. 689-698
    • Wijk, J.V.1
  • 61
    • 11144295174 scopus 로고
    • How should we teach computer ethics? A short study done in Hong Kong
    • Wong, E. Y. W. (1995). How should we teach computer ethics? A short study done in Hong Kong. Computers and Education, 25(4), 179-191.
    • (1995) Computers and Education , vol.25 , Issue.4 , pp. 179-191
    • Wong, E.Y.W.1
  • 62
    • 0007350161 scopus 로고
    • A study of unauthorized software copying among post-secondary students in Hong Kong
    • Wong, G., Kong, A., & Ngai, S. (1990). A study of unauthorized software copying among post-secondary students in Hong Kong. The Australian Computer Journal, 22(4), 114-122.
    • (1990) The Australian Computer Journal , vol.22 , Issue.4 , pp. 114-122
    • Wong, G.1    Kong, A.2    Ngai, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.