-
3
-
-
78549286174
-
Examining the effects of culture on perceptions of moral intensity: A comparison of future marketers from Malaysia and New Zealand
-
Gold Coast, Queensland, Australia
-
Ballantine, P. (2000). Examining the effects of culture on perceptions of moral intensity: A comparison of future marketers from Malaysia and New Zealand. Proceedings of AMZMAC 2000 Visionary Marketing for 21st Century: Facing the Challenge, Gold Coast, Queensland, Australia.
-
(2000)
Proceedings of AMZMAC 2000 Visionary Marketing for 21st Century: Facing the Challenge
-
-
Ballantine, P.1
-
4
-
-
0011591891
-
Hacking, computer viruses, and software piracy: The implications of modem computer fraud for corporations
-
M. P. Spencer & R. Sims (Eds.), Quorum Books, Westport
-
Cheng, H. K. (1995). Hacking, computer viruses, and software piracy: The implications of modem computer fraud for corporations. In Corporate misconduct: The legal, societal and management issues, M. P. Spencer & R. Sims (Eds.), Quorum Books, Westport, pp. 125-147.
-
(1995)
Corporate Misconduct: The Legal, Societal and Management Issues
, pp. 125-147
-
-
Cheng, H.K.1
-
5
-
-
0031288383
-
To purchase or to pirate software: An empirical study
-
Cheng, H. K., Sims, R. R., & Teegen, H. (1997). To purchase or to pirate software: An empirical study. Journal of MS, 13(4), 49-60.
-
(1997)
Journal of MS
, vol.13
, Issue.4
, pp. 49-60
-
-
Cheng, H.K.1
Sims, R.R.2
Teegen, H.3
-
6
-
-
0001865968
-
Factors influencing software piracy: Implications for accountants
-
Christensen, A. L., & Eining, M. M. (1991). Factors influencing software piracy: Implications for accountants. Journal of Information Systems, 5(1), 67-80.
-
(1991)
Journal of Information Systems
, vol.5
, Issue.1
, pp. 67-80
-
-
Christensen, A.L.1
Eining, M.M.2
-
7
-
-
0011597674
-
College students believe piracy is acceptable
-
Cohen, E., & Cornwall, L. (1989). College students believe piracy is acceptable. CIS Educator Forum, 1(3), 2-5.
-
(1989)
CIS Educator Forum
, vol.1
, Issue.3
, pp. 2-5
-
-
Cohen, E.1
Cornwall, L.2
-
9
-
-
0002630250
-
A psycho-social model of software piracy: The development and test of a model
-
R. Dejoie, G. Fowler, and D. Paradice (Eds.). Boston, MA: Boyd & Fraser
-
Eining, M. M., & Christensen, A. L. (1991). A psycho-social model of software piracy: The development and test of a model. In R. Dejoie, G. Fowler, and D. Paradice (Eds.), Ethical Issues in Information Systems (pp. 182-188). Boston, MA: Boyd & Fraser.
-
(1991)
Ethical Issues in Information Systems
, pp. 182-188
-
-
Eining, M.M.1
Christensen, A.L.2
-
10
-
-
0000577656
-
Participation in illegitimate activities: A theoretical and empirical investigation
-
Ehrlich, I. (1973). Participation in illegitimate activities: A theoretical and empirical investigation. Journal of Political Economy, 81, 521-565.
-
(1973)
Journal of Political Economy
, vol.81
, pp. 521-565
-
-
Ehrlich, I.1
-
11
-
-
33744970157
-
Computer law - A primer on the law of software protection
-
Ellis, D. R. (1986). Computer law - a primer on the law of software protection. The Florida Bar Journal, 60(4), 81-84.
-
(1986)
The Florida Bar Journal
, vol.60
, Issue.4
, pp. 81-84
-
-
Ellis, D.R.1
-
12
-
-
0003551671
-
-
Reading, MA: Addison-Wesley
-
Fishbein, M., & Ajzen, I. (1975). Belief, attitude, intention and behavior: An introduction to theory and research. Reading, MA: Addison-Wesley.
-
(1975)
Belief, Attitude, Intention and Behavior: An Introduction to Theory and Research
-
-
Fishbein, M.1
Ajzen, I.2
-
13
-
-
0030295452
-
Situational determinants of software piracy: An equity theory perspective
-
Glass, R. S., & Wood, W. A. (1996). Situational determinants of software piracy: An equity theory perspective. Journal of Business Ethics, 15, 1189-1198.
-
(1996)
Journal of Business Ethics
, vol.15
, pp. 1189-1198
-
-
Glass, R.S.1
Wood, W.A.2
-
14
-
-
0031288375
-
Preventive and deterrent controls for software piracy
-
Gopal, R. D., & Sanders, G. L. (1997). Preventive and deterrent controls for software piracy. Journal of Management Information Systems, 13(4), 29-47.
-
(1997)
Journal of Management Information Systems
, vol.13
, Issue.4
, pp. 29-47
-
-
Gopal, R.D.1
Sanders, G.L.2
-
15
-
-
12744267843
-
"To pirate or not to pirate": A comparative study of the ethical versus other influences on the consumer's software acquisition-mode decision
-
Gupta, O. B., Gould, S. J., & Pola, B. (2004). "To pirate or not to pirate": A comparative study of the ethical versus other influences on the consumer's software acquisition-mode decision. Journal of Business Ethics, 55, 255-274.
-
(2004)
Journal of Business Ethics
, vol.55
, pp. 255-274
-
-
Gupta, O.B.1
Gould, S.J.2
Pola, B.3
-
16
-
-
0343001536
-
Crime by computer: Correlates of software piracy and unauthorized account access
-
Hollinger, R. C. (1993). Crime by computer: Correlates of software piracy and unauthorized account access. Security Journal, 4(1), 2-12.
-
(1993)
Security Journal
, vol.4
, Issue.1
, pp. 2-12
-
-
Hollinger, R.C.1
-
17
-
-
84970109540
-
A general theory of marketing ethics
-
Hunt, S. D., & Vitell, S. J. (1986). A general theory of marketing ethics. Journal of Macromarketing, 6(1), 5-16.
-
(1986)
Journal of Macromarketing
, vol.6
, Issue.1
, pp. 5-16
-
-
Hunt, S.D.1
Vitell, S.J.2
-
18
-
-
0034238348
-
The impact of national culture on software piracy
-
Husted, B. W. (2000). The impact of national culture on software piracy. Journal of Business Ethics, 26(3), 197-211.
-
(2000)
Journal of Business Ethics
, vol.26
, Issue.3
, pp. 197-211
-
-
Husted, B.W.1
-
19
-
-
0031161643
-
Software copyright infringements: An exploratory study of the effects of individual and peer beliefs
-
Im, A. J., & Ah, A. G. (1997). Software copyright infringements: An exploratory study of the effects of individual and peer beliefs. Omega, 25(3), 335-344.
-
(1997)
Omega
, vol.25
, Issue.3
, pp. 335-344
-
-
Im, A.J.1
Ah, A.G.2
-
20
-
-
6744219555
-
Software piracy and responsibilities of educational institutions
-
Im, J. H., & Koen, C. (1990). Software piracy and responsibilities of educational institutions. Information & Management, 18, 189-194.
-
(1990)
Information & Management
, vol.18
, pp. 189-194
-
-
Im, J.H.1
Koen, C.2
-
21
-
-
0039686012
-
Software piracy and its legal implications
-
Jr, K. M. C., & Im, H. J. (1997). Software piracy and its legal implications. Information & Management, 31, 265-272.
-
(1997)
Information & Management
, vol.31
, pp. 265-272
-
-
C. Jr., K.M.1
Im, H.J.2
-
22
-
-
23044520001
-
An empirical study of software piracy and moral intensity among university students
-
Kini, R. B., Rominger, A., & Vijayaraman, B. S. (2000). An empirical study of software piracy and moral intensity among university students. Journal of Computer Information Systems, 40(3), 62-72.
-
(2000)
Journal of Computer Information Systems
, vol.40
, Issue.3
, pp. 62-72
-
-
Kini, R.B.1
Rominger, A.2
Vijayaraman, B.S.3
-
23
-
-
0037276453
-
An exploratory study of moral intensity regarding software piracy of students in Thailand
-
Kini, R. B., Ramakrishna, H. V., & Vijayaraman, B. S. (2003). An exploratory study of moral intensity regarding software piracy of students in Thailand. Behavior & Information Technology, 22(1), 63-70.
-
(2003)
Behavior & Information Technology
, vol.22
, Issue.1
, pp. 63-70
-
-
Kini, R.B.1
Ramakrishna, H.V.2
Vijayaraman, B.S.3
-
24
-
-
4043076317
-
Shaping of moral intensity regarding software piracy: A comparison between Thailand and U.S. Students
-
Kini, R. B., Ramakrishna, H. V., & Vijayaraman, B. S. (2004). Shaping of moral intensity regarding software piracy: A comparison between Thailand and U.S. students. Journal of Business Ethics, 49, 91-104.
-
(2004)
Journal of Business Ethics
, vol.49
, pp. 91-104
-
-
Kini, R.B.1
Ramakrishna, H.V.2
Vijayaraman, B.S.3
-
25
-
-
0000123715
-
Computer ethics and computer abuse: A study of Swedish and Canadian university data processing students
-
Kowalski, S., & Kowalski, H. (1990). Computer ethics and computer abuse: A study of Swedish and Canadian university data processing students. Information Age, 12(4), 206-212.
-
(1990)
Information Age
, vol.12
, Issue.4
, pp. 206-212
-
-
Kowalski, S.1
Kowalski, H.2
-
26
-
-
0012039173
-
Factors motivating software piracy: A longitudinal study
-
Charlotte, NC
-
Limayem, M., Khalifa, M., & Chin, W. W. (1999). Factors motivating software piracy: A longitudinal study. Proceedings of the 20th international conference on information systems, pp. 124-131, Charlotte, NC.
-
(1999)
Proceedings of the 20th International Conference on Information Systems
, pp. 124-131
-
-
Limayem, M.1
Khalifa, M.2
Chin, W.W.3
-
27
-
-
0032715722
-
An intention model-based study of software piracy
-
Lin, T. C., Hsu, M. H., Kuo, F. Y., & Sun, P. C. (1999). An intention model-based study of software piracy. Proceedings of the 32nd Hawaii international conference on system sciences.
-
(1999)
Proceedings of the 32nd Hawaii International Conference on System Sciences
-
-
Lin, T.C.1
Hsu, M.H.2
Kuo, F.Y.3
Sun, P.C.4
-
28
-
-
33744977560
-
A brief history of trade secret law, part 1
-
October, 1-4
-
Linek, E. (2004). A brief history of trade secret law, part 1. BioProcess International, October, 1-4.
-
(2004)
BioProcess International
-
-
Linek, E.1
-
29
-
-
3242671556
-
Software piracy: Is it related to level of moral judgment?
-
Logsdon, M. J., Thompson, K. J., & Reid, A. R. (1994). Software piracy: Is it related to level of moral judgment? Journal of Business Ethics, 13, 849-857.
-
(1994)
Journal of Business Ethics
, vol.13
, pp. 849-857
-
-
Logsdon, M.J.1
Thompson, K.J.2
Reid, A.R.3
-
30
-
-
0012092773
-
Controlling copyright infringements of intellectual property: The case of computer software - Part one
-
Malhotra, Y. (1994a). Controlling copyright infringements of intellectual property: The case of computer software - part one. Journal of Systems Management, 45(6), 32-35.
-
(1994)
Journal of Systems Management
, vol.45
, Issue.6
, pp. 32-35
-
-
Malhotra, Y.1
-
31
-
-
0012092773
-
Controlling copyright infringements of intellectual property: The case of computer software - Part two
-
Malhotra, Y. (1994b). Controlling copyright infringements of intellectual property: The case of computer software - part two. Journal of Systems Management, 45(1), 12-17.
-
(1994)
Journal of Systems Management
, vol.45
, Issue.1
, pp. 12-17
-
-
Malhotra, Y.1
-
32
-
-
84935444559
-
Tailoring legal protection for computer software
-
Menell, P. S. (1987). Tailoring legal protection for computer software. Stanford Law Review, 39, 1351-1372.
-
(1987)
Stanford Law Review
, vol.39
, pp. 1351-1372
-
-
Menell, P.S.1
-
33
-
-
0042223455
-
Software piracy: A view from Hong Kong
-
Moores, T. T., & Dhillon, G. (2000). Software piracy: A view from Hong Kong. Communications of the ACM, 43(12), 88-93.
-
(2000)
Communications of the ACM
, vol.43
, Issue.12
, pp. 88-93
-
-
Moores, T.T.1
Dhillon, G.2
-
34
-
-
4344702911
-
A reversed context analysis of software piracy issues in Singapore
-
Moores, T. T., & Dhaliwal, J. (2004). A reversed context analysis of software piracy issues in Singapore. Information & Management, 41, 1037-1042.
-
(2004)
Information & Management
, vol.41
, pp. 1037-1042
-
-
Moores, T.T.1
Dhaliwal, J.2
-
35
-
-
0003467282
-
-
Committee on Intellectual Property Rights and the Emerging Information Infrastructure of the Computer Science and Telecommunications Board. National Academy Press, Washington, D.C
-
National Research Council (NRC). (2000). The digital dilemma. Intellectual property in the information age. Committee on Intellectual Property Rights and the Emerging Information Infrastructure of the Computer Science and Telecommunications Board. National Academy Press, Washington, D.C.
-
(2000)
The Digital Dilemma. Intellectual Property in the Information Age
-
-
-
38
-
-
0041426663
-
Software piracy in the workplace: A model and empirical test
-
Peace, A. G., Galletta, D. F., & Thong, J. Y. L. (2003). Software piracy in the workplace: A model and empirical test. Journal of Management Information Systems, 20(1), 153-177.
-
(2003)
Journal of Management Information Systems
, vol.20
, Issue.1
, pp. 153-177
-
-
Peace, A.G.1
Galletta, D.F.2
Thong, J.Y.L.3
-
39
-
-
0007391492
-
Software piracy among computing students: A Bruneian scenario
-
Rahim, M. M., Seyal, A. H., & Rahman, M. N. (1999a). Software piracy among computing students: A Bruneian scenario. Computers & Education, 32, 301-321.
-
(1999)
Computers & Education
, vol.32
, pp. 301-321
-
-
Rahim, M.M.1
Seyal, A.H.2
Rahman, M.N.3
-
40
-
-
33744968088
-
Software piracy among tertiary students in Brunei Darussalam: An empirical study
-
July, Lilydale
-
Rahim, M. M., Seyal, A. H., & Rahman, M. N. (1999b). Software piracy among tertiary students in Brunei Darussalam: An empirical study. Australian Institute of Computer Ethics Conference, July, Lilydale.
-
(1999)
Australian Institute of Computer Ethics Conference
-
-
Rahim, M.M.1
Seyal, A.H.2
Rahman, M.N.3
-
41
-
-
33744972708
-
Softlifting intention of students in academia: A normative model
-
Rahim, M. M., Rahman, M. N., & Seyal, A. H. (2000). Softlifting intention of students in academia: A normative model. Malaysian Journal of Computer Science, 13(1), 48-55.
-
(2000)
Malaysian Journal of Computer Science
, vol.13
, Issue.1
, pp. 48-55
-
-
Rahim, M.M.1
Rahman, M.N.2
Seyal, A.H.3
-
42
-
-
0035538544
-
Factors affecting softlifting intention of computing students: An empirical study
-
Rahim, M. M., Seyal, A. H., & Rahman, M. N. (2001). Factors affecting softlifting intention of computing students: An empirical study. Journal of Educational Computing Research, 24(4), 385-405.
-
(2001)
Journal of Educational Computing Research
, vol.24
, Issue.4
, pp. 385-405
-
-
Rahim, M.M.1
Seyal, A.H.2
Rahman, M.N.3
-
43
-
-
21144460295
-
Knowledge and attitudes of management students toward software piracy
-
Reid, R. A., Thompson, J. K., & Logsdon, J. M. (1992). Knowledge and attitudes of management students toward software piracy. Journal of Computer Information Systems, 33(1), 46-51.
-
(1992)
Journal of Computer Information Systems
, vol.33
, Issue.1
, pp. 46-51
-
-
Reid, R.A.1
Thompson, J.K.2
Logsdon, J.M.3
-
44
-
-
84869981479
-
The death of digital rights management?
-
Roush, W. (2002). The death of digital rights management? Technology Review, 105(2), 24-25.
-
(2002)
Technology Review
, vol.105
, Issue.2
, pp. 24-25
-
-
Roush, W.1
-
45
-
-
84881834137
-
The expected utility model: Its variants, purposes, evidence and limitations
-
June
-
Schoemaker, P. J. (1982). The expected utility model: Its variants, purposes, evidence and limitations. Journal of Economic Literature, 20, June, 529-563.
-
(1982)
Journal of Economic Literature
, vol.20
, pp. 529-563
-
-
Schoemaker, P.J.1
-
46
-
-
84857189122
-
-
Software and Information Industry Association, Washington, D.C.
-
Software Information Industry Association (SIIA). (2000). SIIA's report on global software piracy 2000. Software and Information Industry Association, Washington, D.C.
-
(2000)
SIIA's Report on Global Software Piracy 2000
-
-
-
47
-
-
0001550607
-
Softlifting: A model of motivating factors
-
Simpson, P. M., Banerjee, D., & Simpson, C. L. (1994). Softlifting: A model of motivating factors. Journal of Business Ethics, 13, 431-438.
-
(1994)
Journal of Business Ethics
, vol.13
, pp. 431-438
-
-
Simpson, P.M.1
Banerjee, D.2
Simpson, C.L.3
-
48
-
-
0030215265
-
Toward a profile of student software pirates
-
Sims, R. R., Cheng, H. K., & Teegen, H. (1996). Toward a profile of student software pirates. Journal of Business Ethics, 15, 839-849.
-
(1996)
Journal of Business Ethics
, vol.15
, pp. 839-849
-
-
Sims, R.R.1
Cheng, H.K.2
Teegen, H.3
-
49
-
-
0030668250
-
A social learning theory analysis of computer crime among college students
-
Skinner, W. F., & Fream, A. M. (1997). A social learning theory analysis of computer crime among college students. Journal of Research in Crime and Delinquency, 34(4), 495-518.
-
(1997)
Journal of Research in Crime and Delinquency
, vol.34
, Issue.4
, pp. 495-518
-
-
Skinner, W.F.1
Fream, A.M.2
-
50
-
-
0002961010
-
The effect of demographic factors on attitudes toward software piracy
-
R. Dejoie, G. Fowler, and D. Paradice (Eds.). Boston, MA: Boyd and Fraser
-
Solomon, L. S., & O'Brien, A. J. (1990). The effect of demographic factors on attitudes toward software piracy. In R. Dejoie, G. Fowler, and D. Paradice (Eds.), Ethical issues in IS. Boston, MA: Boyd and Fraser.
-
(1990)
Ethical Issues in IS
-
-
Solomon, L.S.1
O'Brien, A.J.2
-
53
-
-
0032223746
-
Testing an ethical decision-making theory: The case of softlifting
-
Thong, J. Y. L., & Yap, C. S. (1998). Testing an ethical decision-making theory: The case of softlifting. Journal of Management Information Systems, 15(1), 213-237.
-
(1998)
Journal of Management Information Systems
, vol.15
, Issue.1
, pp. 213-237
-
-
Thong, J.Y.L.1
Yap, C.S.2
-
55
-
-
0001938286
-
Software piracy and global competitiveness: Report on global software piracy
-
Traphagan, M., & Griffith, A. (1998). Software piracy and global competitiveness: Report on global software piracy. International Review of Law, Computers & Technology, 12(3), 431-447.
-
(1998)
International Review of Law, Computers & Technology
, vol.12
, Issue.3
, pp. 431-447
-
-
Traphagan, M.1
Griffith, A.2
-
56
-
-
0000530374
-
Values, attitudes and interpersonal behavior
-
Lincoln, NE: University of Nebraska Press
-
Triandis, C. H. (1980). Values, attitudes and interpersonal behavior. Nebraska symposium on motivation, 1979: Beliefs, attitudes and values, pp. 159-295. Lincoln, NE: University of Nebraska Press.
-
(1980)
Nebraska Symposium on Motivation, 1979: Beliefs, Attitudes and Values
, pp. 159-295
-
-
Triandis, C.H.1
-
58
-
-
0035217408
-
Considerations in ethical decision-making and software piracy
-
Wagner, S. C., & Sanders, G. L. (2001). Considerations in ethical decision-making and software piracy. Journal of Business Ethics, 29(1/2), 161-167.
-
(2001)
Journal of Business Ethics
, vol.29
, Issue.1-2
, pp. 161-167
-
-
Wagner, S.C.1
Sanders, G.L.2
-
59
-
-
0000658968
-
New directions in equity research
-
Walster, E., Berscheid, E., & Walster, W. (1973). New directions in equity research. Journal of Personality and Social Psychology, 25(2), 151-176.
-
(1973)
Journal of Personality and Social Psychology
, vol.25
, Issue.2
, pp. 151-176
-
-
Walster, E.1
Berscheid, E.2
Walster, W.3
-
60
-
-
0036897636
-
Dealing with piracy: Intellectual asset management in music and software
-
Wijk, J. V. (2002). Dealing with piracy: Intellectual asset management in music and software. European Management Journal, 20(6), 689-698.
-
(2002)
European Management Journal
, vol.20
, Issue.6
, pp. 689-698
-
-
Wijk, J.V.1
-
61
-
-
11144295174
-
How should we teach computer ethics? A short study done in Hong Kong
-
Wong, E. Y. W. (1995). How should we teach computer ethics? A short study done in Hong Kong. Computers and Education, 25(4), 179-191.
-
(1995)
Computers and Education
, vol.25
, Issue.4
, pp. 179-191
-
-
Wong, E.Y.W.1
-
62
-
-
0007350161
-
A study of unauthorized software copying among post-secondary students in Hong Kong
-
Wong, G., Kong, A., & Ngai, S. (1990). A study of unauthorized software copying among post-secondary students in Hong Kong. The Australian Computer Journal, 22(4), 114-122.
-
(1990)
The Australian Computer Journal
, vol.22
, Issue.4
, pp. 114-122
-
-
Wong, G.1
Kong, A.2
Ngai, S.3
-
63
-
-
3042976246
-
Sex as a determinant of software piracy
-
Wood, W., & Glass, R. (1996). Sex as a determinant of software piracy. Journal of Computer Information Systems, 36(2), 37-40.
-
(1996)
Journal of Computer Information Systems
, vol.36
, Issue.2
, pp. 37-40
-
-
Wood, W.1
Glass, R.2
|