-
1
-
-
84984287155
-
The Techniques of Neutralization and Violence
-
Agnew R. (1994) The Techniques of Neutralization and Violence. Criminology, 32(4): 555-580
-
(1994)
Criminology
, vol.32
, Issue.4
, pp. 555-580
-
-
Agnew, R.1
-
2
-
-
0009021911
-
The Techniques of Neutralization: An Analysis of Predisposing and Situational Factors
-
Agnew R., A.A.R. Peters (1986) The Techniques of Neutralization: An Analysis of Predisposing and Situational Factors. Criminal Justice and Behavior, 13(1): 81-97
-
(1986)
Criminal Justice and Behavior
, vol.13
, Issue.1
, pp. 81-97
-
-
Agnew, R.1
Peters, A.A.R.2
-
3
-
-
30344460323
-
Digital Piracy: Factors that Influence Attitude Toward Behavior
-
Al-Rafee S., T.P. Cronan (2006) Digital Piracy: Factors that Influence Attitude Toward Behavior. Journal of Business Ethics, 63: 237-259
-
(2006)
Journal of Business Ethics
, vol.63
, pp. 237-259
-
-
Al-Rafee, S.1
Cronan, T.P.2
-
4
-
-
0003111483
-
A Comparison of Experts' and High Tech Students' Ethical Beliefs in Computer Related Situations
-
Athey S. (1993) A Comparison of Experts' and High Tech Students' Ethical Beliefs in Computer Related Situations. Journal of Business Ethics, 12(5): 359
-
(1993)
Journal of Business Ethics
, vol.12
, Issue.5
, pp. 359
-
-
Athey, S.1
-
5
-
-
0013241791
-
Would the Software Police Find Your Company Guilty?
-
S. Athey and J. Plotnicki. Would the Software Police Find Your Company Guilty? Journal of Systems Management, 45(10): 32-38, 1994.
-
(1994)
Journal of Systems Management
, vol.45
, Issue.10
, pp. 32-38
-
-
Athey, S.1
Plotnicki, J.2
-
7
-
-
84965428155
-
An Empirical Exploration of Neutralization Theory
-
Ball R.A. (1966) An Empirical Exploration of Neutralization Theory. Criminologica, 4(2): 22-32
-
(1966)
Criminologica
, vol.4
, Issue.2
, pp. 22-32
-
-
Ball, R.A.1
-
8
-
-
0040366933
-
Juvenile Delinquency in a Rurban County
-
Ball R.A., J.R. Lilly (1971) Juvenile Delinquency in a Rurban County. Criminology, 9(1): 69-85
-
(1971)
Criminology
, vol.9
, Issue.1
, pp. 69-85
-
-
Ball, R.A.1
Lilly, J.R.2
-
11
-
-
36949011502
-
-
BSA Business Software Alliance
-
BSA, Software Piracy and U.S. Law. Business Software Alliance, 1998a.
-
(1998)
Software Piracy and U.S. Law
-
-
-
12
-
-
36949025095
-
-
BSA Business Software Alliance
-
BSA, Warez: Myth vs. Fact. Business Software Alliance, 1998b.
-
(1998)
Warez: Myth Vs. Fact
-
-
-
14
-
-
84886765763
-
HR 1761, Copyright Damages Improvement Act
-
D. Carney. HR 1761, Copyright Damages Improvement Act. Tech Law Journal, 1999.
-
(1999)
Tech Law Journal
-
-
Carney, D.1
-
18
-
-
0011597674
-
College Students Believe Piracy is Acceptable
-
Cohen E., L. Cornwell (1989) College Students Believe Piracy is Acceptable. CIS Educator Forum, 1(3): 2-5
-
(1989)
CIS Educator Forum
, vol.1
, Issue.3
, pp. 2-5
-
-
Cohen, E.1
Cornwell, L.2
-
20
-
-
0032507316
-
Learning from the Literature on Collegiate Cheating: A Review of Empirical Research
-
Crown D.F., M.S. Spiller (1998) Learning from the Literature on Collegiate Cheating: A Review of Empirical Research. Journal of Business Ethics, 17(6): 683-700
-
(1998)
Journal of Business Ethics
, vol.17
, Issue.6
, pp. 683-700
-
-
Crown, D.F.1
Spiller, M.S.2
-
22
-
-
0002630250
-
A Psycho-social Model of Software Piracy: The Development of a Test Model
-
In R. Dejoie, G. Fowler, D Paradice (Eds.) Boston: Boyd & Fraser
-
Eining M.M., A.L. Christensen (1991) A Psycho-social Model of Software Piracy: The Development of a Test Model. In R. Dejoie, G. Fowler, D Paradice (Eds.) Ethical Issues in Information Systems. Boston: Boyd & Fraser
-
(1991)
Ethical Issues in Information Systems
-
-
Eining, M.M.1
Christensen, A.L.2
-
23
-
-
33744970157
-
Computer law - A Primer on the Law of Software Protection
-
D.R. Ellis. Computer law - a Primer on the Law of Software Protection. The Florida Bar Journal, 1986
-
(1986)
The Florida Bar Journal
-
-
Ellis, D.R.1
-
24
-
-
0030295452
-
Situational Determinants of Software Piracy: An Equity Theory Perspective
-
Glass R.S., W.A. Wood (1996) Situational Determinants of Software Piracy: An Equity Theory Perspective. Journal of Business Ethics, 15(11): 1189
-
(1996)
Journal of Business Ethics
, vol.15
, Issue.11
, pp. 1189
-
-
Glass, R.S.1
Wood, W.A.2
-
25
-
-
0032245475
-
International Software Piracy: Analysis of Key Issues and Impacts
-
Gopal R.D., G.L. Sanders (1998) International Software Piracy: Analysis of Key Issues and Impacts. Information Systems Research, 9(4): 380-397
-
(1998)
Information Systems Research
, vol.9
, Issue.4
, pp. 380-397
-
-
Gopal, R.D.1
Sanders, G.L.2
-
28
-
-
0011664858
-
Why People Copy Software and Create Computer Viruses: Individual Characteristics or Situational Factors?
-
S.J. Harrington, Why People Copy Software and Create Computer Viruses: Individual Characteristics or Situational Factors? Information Resources Management Journal, 2(3): 28-37, 1989.
-
(1989)
Information Resources Management Journal,
, vol.2
, Issue.3
, pp. 28-37
-
-
Harrington, S.J.1
-
30
-
-
11144230997
-
Can Low Self-control Help with the Understanding of the Software Piracy Problem?
-
Higgins G.E. (2005) Can Low Self-control Help with the Understanding of the Software Piracy Problem? Deviant Behavior, 26(1): 1-24
-
(2005)
Deviant Behavior
, vol.26
, Issue.1
, pp. 1-24
-
-
Higgins, G.E.1
-
31
-
-
29444457666
-
Does Social Learning Theory Condition the Effects of Low Self-control on College Students' Software Piracy?
-
G.E. Higgins and D.A. Makin. Does Social Learning Theory Condition the Effects of Low Self-control on College Students' Software Piracy? Journal of Economic Crime Management, 2(2): 1-2, 2004.
-
(2004)
Journal of Economic Crime Management
, vol.2
, Issue.2
, pp. 1-2
-
-
Higgins, G.E.1
Makin, D.A.2
-
32
-
-
36949001461
-
Low Self-control, Moral Beliefs, and Social Learning Theory in University Students' Intentions to Pirate Software
-
Higgins G.E., A.L. Wilson (2006) Low Self-control, Moral Beliefs, and Social Learning Theory in University Students' Intentions to Pirate Software. Security Journal, 19: 75-92
-
(2006)
Security Journal
, vol.19
, pp. 75-92
-
-
Higgins, G.E.1
Wilson, A.L.2
-
33
-
-
85044912937
-
Digital Piracy: Assessing the Contributions of an Integrated Self-control Theory and Social Learning Theory using Structural Equation Modeling
-
Higgins G.E., B.D. Fell, A.L. Wilson (2006) Digital Piracy: Assessing the Contributions of an Integrated Self-control Theory and Social Learning Theory using Structural Equation Modeling. Criminal Justice Studies, 19(1): 3-22
-
(2006)
Criminal Justice Studies
, vol.19
, Issue.1
, pp. 3-22
-
-
Higgins, G.E.1
Fell, B.D.2
Wilson, A.L.3
-
35
-
-
85040939661
-
The Commitment of Delinquents to their Misdeeds: Do Delinquents Drift?
-
Hindelang M.J. (1970) The Commitment of Delinquents to their Misdeeds: Do Delinquents Drift? Social Problems, 17: 502-509
-
(1970)
Social Problems
, vol.17
, pp. 502-509
-
-
Hindelang, M.J.1
-
36
-
-
84925885428
-
Moral Evaluation of Illegal Behaviors
-
Hindelang M.J. (1974) Moral Evaluation of Illegal Behaviors. Social Problems, 21: 370-385
-
(1974)
Social Problems
, vol.21
, pp. 370-385
-
-
Hindelang, M.J.1
-
38
-
-
12744275983
-
Trends and Patterns among Software Pirates
-
Hinduja S. (2003) Trends and Patterns among Software Pirates. Ethics and Information Technology, 5(1): 49-61
-
(2003)
Ethics and Information Technology
, vol.5
, Issue.1
, pp. 49-61
-
-
Hinduja, S.1
-
39
-
-
33750840328
-
Critical Theory and Music Piracy
-
Hinduja S. (2006a) Critical Theory and Music Piracy. Critical Criminology, 14(4): 387-409
-
(2006)
Critical Criminology
, vol.14
, Issue.4
, pp. 387-409
-
-
Hinduja, S.1
-
41
-
-
0003991890
-
-
Berkeley: University of California Press
-
Hirschi T. (1969) Causes of Delinquency. Berkeley: University of California Press
-
(1969)
Causes of Delinquency
-
-
Hirschi, T.1
-
42
-
-
36949000761
-
Swashbuckling Students: An Exploratory Study of Internet Piracy
-
Hohn D.A., L.R. Muftic, K. Wolf (2006) Swashbuckling Students: An Exploratory Study of Internet Piracy. Security Journal, 19: 110-127
-
(2006)
Security Journal
, vol.19
, pp. 110-127
-
-
Hohn, D.A.1
Muftic, L.R.2
Wolf, K.3
-
43
-
-
84928836007
-
Neutralizing in the Workplace: An Empirical Analysis of Property Theft and Production Deviance
-
Hollinger R.C. (1991) Neutralizing in the Workplace: An Empirical Analysis of Property Theft and Production Deviance. Deviant Behavior, 12: 169-202
-
(1991)
Deviant Behavior
, vol.12
, pp. 169-202
-
-
Hollinger, R.C.1
-
44
-
-
0011655037
-
Software Piracy and Software Security in Business Schools: An Ethical Perspective
-
Im J.H., P.D. Van Epps (1991) Software Piracy and Software Security in Business Schools: An Ethical Perspective. Data Base, 22(3): 15-21
-
(1991)
Data Base
, vol.22
, Issue.3
, pp. 15-21
-
-
Im, J.H.1
Van Epps, P.D.2
-
45
-
-
0000460271
-
Software Piracy and Software Security Measures in Business Schools
-
Im J.H., P.D. Van Epps (1992) Software Piracy and Software Security Measures in Business Schools. Information & Management, 23(4): 193-203
-
(1992)
Information & Management
, vol.23
, Issue.4
, pp. 193-203
-
-
Im, J.H.1
Van Epps, P.D.2
-
46
-
-
6744219555
-
Software Piracy and Responsibilities of Educational Institutions
-
J.H. Im and C. Koen. Software Piracy and Responsibilities of Educational Institutions. Information & Management, 18(4): 189-194, 1990
-
(1990)
Information & Management
, vol.18
, Issue.4
, pp. 189-194
-
-
Im, J.H.1
Koen, C.2
-
47
-
-
0007461850
-
Information Systems Majors/Non-majors and Computer Ethics
-
Kievit K. (1991) Information Systems Majors/Non-majors and Computer Ethics. Journal of Computer Information, 32(1): 43-49
-
(1991)
Journal of Computer Information
, vol.32
, Issue.1
, pp. 43-49
-
-
Kievit, K.1
-
48
-
-
23044520001
-
An Empirical Study of Software Piracy and Moral Intensity Among University Students
-
Kini R.B., A. Rominger, B.S. Vijayaraman (2000) An Empirical Study of Software Piracy and Moral Intensity Among University Students. Journal of Computer Information Systems, 40(3): 62-72
-
(2000)
Journal of Computer Information Systems
, vol.40
, Issue.3
, pp. 62-72
-
-
Kini, R.B.1
Rominger, A.2
Vijayaraman, B.S.3
-
49
-
-
4043076317
-
Shaping of Moral Intensity Regarding Software Piracy: A Comparison between Thailand and U.S. Students
-
Kini R.B., H.V. Ramakrishna B.S. Vijayaraman (2004) Shaping of Moral Intensity Regarding Software Piracy: A Comparison between Thailand and U.S. Students. Journal of Business Ethics, 49: 91-104
-
(2004)
Journal of Business Ethics
, vol.49
, pp. 91-104
-
-
Kini, R.B.1
Ramakrishna, H.V.2
Vijayaraman, B.S.3
-
51
-
-
21344487851
-
Delinquent Values and Victim Damage: Exploring the Limits of Neutralization Theory
-
Landsheer J.A., H. Hart, W. Kox (1994) Delinquent Values and Victim Damage: Exploring the Limits of Neutralization Theory. British Journal of Criminology, 34(1): 44-53
-
(1994)
British Journal of Criminology
, vol.34
, Issue.1
, pp. 44-53
-
-
Landsheer, J.A.1
Hart, H.2
Kox, W.3
-
52
-
-
0026712064
-
Another View of Computer Science Ethics: Patterns of Responses among Computer Scientists
-
Leventhal L.M., K.E. Instone, D.W. Chilson (1992) Another View of Computer Science Ethics: Patterns of Responses among Computer Scientists. Journal of System Software, 17: 49-60
-
(1992)
Journal of System Software
, vol.17
, pp. 49-60
-
-
Leventhal, L.M.1
Instone, K.E.2
Chilson, D.W.3
-
56
-
-
85024144258
-
Defending Intellectual Property: State Efforts to Protect Creative Works
-
Luckenbill D.F., S.L. Miller (1998) Defending Intellectual Property: State Efforts to Protect Creative Works. Justice Quarterly, 15(1): 93-120
-
(1998)
Justice Quarterly
, vol.15
, Issue.1
, pp. 93-120
-
-
Luckenbill, D.F.1
Miller, S.L.2
-
57
-
-
0012092773
-
Controlling Copyright Infringements of Intellectual Property: The Cause of Computer Software-Part One
-
Y. Malhotra. Controlling Copyright Infringements of Intellectual Property: The Cause of Computer Software-Part One. Journal of Systems Management 45: 32-35, 1994
-
(1994)
Journal of Systems Management
, vol.45
, pp. 32-35
-
-
Malhotra, Y.1
-
58
-
-
79957894131
-
-
New York: John Wiley and Sons, Inc
-
Matza D. (1964) Delinquency and Drift. New York: John Wiley and Sons, Inc
-
(1964)
Delinquency and Drift
-
-
Matza, D.1
-
59
-
-
0001191711
-
Linking Exposure to Strain with Anger: An Investigation of Deviant Adaptations
-
Mazerolle P., A. Piquero (1998) Linking Exposure to Strain with Anger: An Investigation of Deviant Adaptations. Journal of Criminal Justice, 26(3): 195-211
-
(1998)
Journal of Criminal Justice
, vol.26
, Issue.3
, pp. 195-211
-
-
Mazerolle, P.1
Piquero, A.2
-
63
-
-
0019303515
-
The Neutralization of the Criminal Offense
-
Minor W.W. (1980) The Neutralization of the Criminal Offense. Criminology, 18(1): 103-120
-
(1980)
Criminology
, vol.18
, Issue.1
, pp. 103-120
-
-
Minor, W.W.1
-
64
-
-
0019495519
-
Techniques of Neutralization: A Reconceptualization and Empirical Examination
-
Minor W.W. (1981) Techniques of Neutralization: A Reconceptualization and Empirical Examination. Journal of Research in Crime and Delinquency, 18(1): 295-318
-
(1981)
Journal of Research in Crime and Delinquency
, vol.18
, Issue.1
, pp. 295-318
-
-
Minor, W.W.1
-
65
-
-
0013332223
-
Types of Neutralization and Types of Delinquency
-
Mitchell J., R. Dodder (1983) Types of Neutralization and Types of Delinquency. Journal of Youth and Adolescence, 12(4): 307-318
-
(1983)
Journal of Youth and Adolescence
, vol.12
, Issue.4
, pp. 307-318
-
-
Mitchell, J.1
Dodder, R.2
-
66
-
-
85050412654
-
Enduring Individual Differences and Rational Choice Theories of Crime
-
D.S. Nagin and R. Paternoster. Enduring Individual Differences and Rational Choice Theories of Crime. Law & Society Review, 27: 467-496, 1993.
-
(1993)
Law & Society Review
, vol.27
, pp. 467-496
-
-
Nagin, D.S.1
Paternoster, R.2
-
68
-
-
0002103996
-
The Attitude of Mangers-to-be Toward Software Piracy
-
Oz E. (1990) The Attitude of Mangers-to-be Toward Software Piracy. OR/MS Today, 17(4): 24-26
-
(1990)
OR/MS Today
, vol.17
, Issue.4
, pp. 24-26
-
-
Oz, E.1
-
69
-
-
4544387878
-
Ethical Attitudes of Entry-level MIS Personnel
-
Paradice D.J. (1990) Ethical Attitudes of Entry-level MIS Personnel. Information & Management, 18(3): 143-151
-
(1990)
Information & Management
, vol.18
, Issue.3
, pp. 143-151
-
-
Paradice, D.J.1
-
70
-
-
3042972237
-
A Predictive Model of Software Piracy Behaviour: An Empirical Validation
-
Unpublished Doctoral Dissertation, University of Pittsburg
-
A.G. Peace A Predictive Model of Software Piracy Behaviour: An Empirical Validation. Unpublished Doctoral Dissertation, University of Pittsburg, 1995
-
(1995)
-
-
Peace, A.G.1
-
71
-
-
3042985713
-
Software Piracy and Computer-using Professionals: A Survey
-
Peace A.G. (1997) Software Piracy and Computer-using Professionals: A Survey. Journal of Computer Information Systems, 38(1): 94-99
-
(1997)
Journal of Computer Information Systems
, vol.38
, Issue.1
, pp. 94-99
-
-
Peace, A.G.1
-
73
-
-
0007391492
-
Software Piracy among Computing Students: A Bruneian Scenario
-
Rahim M.M., A.H. Seyal, N.A. Rahman (1999) Software Piracy among Computing Students: A Bruneian Scenario. Computers and Education, 32: 301-321
-
(1999)
Computers and Education
, vol.32
, pp. 301-321
-
-
Rahim, M.M.1
Seyal, A.H.2
Rahman, N.A.3
-
74
-
-
0035637388
-
Shaping of Moral Intensity Regarding Software Piracy in University Students: Immediate Community Effects
-
Ramakrishna H.V., R.B. Kini, B.S. Vijayaraman (2001) Shaping of Moral Intensity Regarding Software Piracy in University Students: Immediate Community Effects. Journal of Computer Information Systems, 41(4): 47-51
-
(2001)
Journal of Computer Information Systems
, vol.41
, Issue.4
, pp. 47-51
-
-
Ramakrishna, H.V.1
Kini, R.B.2
Vijayaraman, B.S.3
-
76
-
-
33750805978
-
-
RIAA Recording Industry Association of America
-
RIAA, The NET Act. Recording Industry Association of America, 2000.
-
(2000)
The NET Act
-
-
-
77
-
-
0011532430
-
Correlates of Computer Misuse: Data from a Self-Reporting Sample
-
Sacco V.F., E. Zureik (1990) Correlates of Computer Misuse: Data from a Self-Reporting Sample. Behavior and Information Technology, 9: 353-359
-
(1990)
Behavior and Information Technology
, vol.9
, pp. 353-359
-
-
Sacco, V.F.1
Zureik, E.2
-
78
-
-
84886765777
-
It's Not Really Theft! Personal and Workplace Ethics that Enable Software Piracy
-
D.A. Seale, M. Polakowski, and S. Schneider. It's Not Really Theft! Personal and Workplace Ethics that Enable Software Piracy. Communication Abstracts, 21(4), 1998.
-
(1998)
Communication Abstracts
, vol.21
, Issue.4
-
-
Seale, D.A.1
Polakowski, M.2
Schneider, S.3
-
79
-
-
36949039512
-
-
SIIA Software & Information Industry Association
-
SIIA, Classification of Software. Software & Information Industry Association, 1999.
-
(1999)
Classification of Software
-
-
-
82
-
-
0030668250
-
A Social Learning Theory Analysis of Computer Crime among College Students
-
Skinner B.F., Anne M. Fream (1997) A Social Learning Theory Analysis of Computer Crime among College Students. Journal of Research in Crime and Delinquency, 34: 495-518
-
(1997)
Journal of Research in Crime and Delinquency
, vol.34
, pp. 495-518
-
-
Skinner, B.F.1
Fream, A.M.2
-
83
-
-
0002961010
-
The Effect of Demographic Factors on Attitudes Toward Software Piracy
-
S. Solomon and J.A. O'Brien. The Effect of Demographic Factors on Attitudes Toward Software Piracy. Journal of Computer Information Systems, 30(3): 40-46, 1990.
-
(1990)
Journal of Computer Information Systems
, vol.30
, Issue.3
, pp. 40-46
-
-
Solomon, S.1
O'Brien, J.A.2
-
85
-
-
0001155759
-
Techniques of Neutralization: A Theory of Delinquency
-
Sykes G., D. Matza (1957) Techniques of Neutralization: A Theory of Delinquency. American Sociological Review, 22: 664-670
-
(1957)
American Sociological Review
, vol.22
, pp. 664-670
-
-
Sykes, G.1
Matza, D.2
-
86
-
-
84973740128
-
A Comparative Examination of Attitudes Toward Software Piracy among Business Professors and Executives
-
Taylor G. Stephen, J.P. Shim (1993) A Comparative Examination of Attitudes Toward Software Piracy among Business Professors and Executives. Human Relations, 46(4): 419-433
-
(1993)
Human Relations
, vol.46
, Issue.4
, pp. 419-433
-
-
Stephen Taylor, G.1
Shim, J.P.2
-
87
-
-
0032223746
-
Testing an Ethical Decision-making Theory: The Case of Softlifting
-
Thong J.L., C.S. Yap (1998) Testing an Ethical Decision-making Theory: The Case of Softlifting. Journal of Management Information Systems, 15(1): 213-237
-
(1998)
Journal of Management Information Systems
, vol.15
, Issue.1
, pp. 213-237
-
-
Thong, J.L.1
Yap, C.S.2
-
88
-
-
84926279405
-
Deviance and the Neutralization of Moral Commitment: An Empirical Analysis
-
Q.C. Thurman, Deviance and the Neutralization of Moral Commitment: An Empirical Analysis. Deviant Behavior, 5: 291-304, 1984.
-
(1984)
Deviant Behavior
, vol.5
, pp. 291-304
-
-
Thurman, Q.C.1
-
89
-
-
0042223455
-
Software Piracy: A View from Hong Kong. Association for Computing Machinery
-
Trevor M., D. Gurpreet (2000) Software Piracy: A View from Hong Kong. Association for Computing Machinery. Communications of the ACM, 43(12): 88
-
(2000)
Communications of the ACM
, vol.43
, Issue.12
, pp. 88
-
-
Trevor, M.1
Gurpreet, D.2
-
90
-
-
79955018926
-
Compliance with Intellectual Property Laws: A Psychological Perspective
-
Tyler T.R. (1996) Compliance with Intellectual Property Laws: A Psychological Perspective. International Law and Politics, 29: 219-235
-
(1996)
International Law and Politics
, vol.29
, pp. 219-235
-
-
Tyler, T.R.1
-
91
-
-
11144295174
-
How Do We Teach Computer Ethics? A Short Study done in Hong Kong
-
Wong E.Y.H. (1995) How Do We Teach Computer Ethics? A Short Study done in Hong Kong. Computers and Education, 25(4): 179-191
-
(1995)
Computers and Education
, vol.25
, Issue.4
, pp. 179-191
-
-
Wong, E.Y.H.1
-
92
-
-
0007350161
-
A Study of Unauthorized Software Copying among Post-secondary Students in Hong Kong
-
Wong G., A. Kong, S. Ngai (1990) A Study of Unauthorized Software Copying among Post-secondary Students in Hong Kong. The Australian Computer Journal, 22(4): 114-122
-
(1990)
The Australian Computer Journal
, vol.22
, Issue.4
, pp. 114-122
-
-
Wong, G.1
Kong, A.2
Ngai, S.3
|