메뉴 건너뛰기




Volumn 9, Issue 3, 2007, Pages 187-204

Neutralization theory and online software piracy: An empirical analysis

Author keywords

Computer crime; Cybercrime; Intellectual property theft; Internet; Neutralization theory; Software piracy

Indexed keywords

CYBERCRIME; EMPIRICAL ANALYSIS; EXPLOSIVE GROWTH; LOGISTIC REGRESSION ANALYSIS; NEUTRALIZATION THEORY; ON-LINE SOFTWARES; THEORETICAL FRAMEWORK; UNIVERSITY STUDENTS;

EID: 36949037524     PISSN: 13881957     EISSN: 15728439     Source Type: Journal    
DOI: 10.1007/s10676-007-9143-5     Document Type: Article
Times cited : (123)

References (93)
  • 1
    • 84984287155 scopus 로고
    • The Techniques of Neutralization and Violence
    • Agnew R. (1994) The Techniques of Neutralization and Violence. Criminology, 32(4): 555-580
    • (1994) Criminology , vol.32 , Issue.4 , pp. 555-580
    • Agnew, R.1
  • 2
    • 0009021911 scopus 로고
    • The Techniques of Neutralization: An Analysis of Predisposing and Situational Factors
    • Agnew R., A.A.R. Peters (1986) The Techniques of Neutralization: An Analysis of Predisposing and Situational Factors. Criminal Justice and Behavior, 13(1): 81-97
    • (1986) Criminal Justice and Behavior , vol.13 , Issue.1 , pp. 81-97
    • Agnew, R.1    Peters, A.A.R.2
  • 3
    • 30344460323 scopus 로고    scopus 로고
    • Digital Piracy: Factors that Influence Attitude Toward Behavior
    • Al-Rafee S., T.P. Cronan (2006) Digital Piracy: Factors that Influence Attitude Toward Behavior. Journal of Business Ethics, 63: 237-259
    • (2006) Journal of Business Ethics , vol.63 , pp. 237-259
    • Al-Rafee, S.1    Cronan, T.P.2
  • 4
    • 0003111483 scopus 로고
    • A Comparison of Experts' and High Tech Students' Ethical Beliefs in Computer Related Situations
    • Athey S. (1993) A Comparison of Experts' and High Tech Students' Ethical Beliefs in Computer Related Situations. Journal of Business Ethics, 12(5): 359
    • (1993) Journal of Business Ethics , vol.12 , Issue.5 , pp. 359
    • Athey, S.1
  • 5
    • 0013241791 scopus 로고
    • Would the Software Police Find Your Company Guilty?
    • S. Athey and J. Plotnicki. Would the Software Police Find Your Company Guilty? Journal of Systems Management, 45(10): 32-38, 1994.
    • (1994) Journal of Systems Management , vol.45 , Issue.10 , pp. 32-38
    • Athey, S.1    Plotnicki, J.2
  • 7
    • 84965428155 scopus 로고
    • An Empirical Exploration of Neutralization Theory
    • Ball R.A. (1966) An Empirical Exploration of Neutralization Theory. Criminologica, 4(2): 22-32
    • (1966) Criminologica , vol.4 , Issue.2 , pp. 22-32
    • Ball, R.A.1
  • 8
    • 0040366933 scopus 로고
    • Juvenile Delinquency in a Rurban County
    • Ball R.A., J.R. Lilly (1971) Juvenile Delinquency in a Rurban County. Criminology, 9(1): 69-85
    • (1971) Criminology , vol.9 , Issue.1 , pp. 69-85
    • Ball, R.A.1    Lilly, J.R.2
  • 11
    • 36949011502 scopus 로고    scopus 로고
    • BSA Business Software Alliance
    • BSA, Software Piracy and U.S. Law. Business Software Alliance, 1998a.
    • (1998) Software Piracy and U.S. Law
  • 12
    • 36949025095 scopus 로고    scopus 로고
    • BSA Business Software Alliance
    • BSA, Warez: Myth vs. Fact. Business Software Alliance, 1998b.
    • (1998) Warez: Myth Vs. Fact
  • 13
    • 0007035529 scopus 로고    scopus 로고
    • An investigation into the dimensions of unethical behavior
    • Buckley M.R., D.S. Wiese, M.G. Harvey (1998) An investigation into the dimensions of unethical behavior. Journal of Business Education, 73(5): 284-290
    • (1998) Journal of Business Education , vol.73 , Issue.5 , pp. 284-290
    • Buckley, M.R.1    Wiese, D.S.2    Harvey, M.G.3
  • 14
    • 84886765763 scopus 로고    scopus 로고
    • HR 1761, Copyright Damages Improvement Act
    • D. Carney. HR 1761, Copyright Damages Improvement Act. Tech Law Journal, 1999.
    • (1999) Tech Law Journal
    • Carney, D.1
  • 18
    • 0011597674 scopus 로고
    • College Students Believe Piracy is Acceptable
    • Cohen E., L. Cornwell (1989) College Students Believe Piracy is Acceptable. CIS Educator Forum, 1(3): 2-5
    • (1989) CIS Educator Forum , vol.1 , Issue.3 , pp. 2-5
    • Cohen, E.1    Cornwell, L.2
  • 20
    • 0032507316 scopus 로고    scopus 로고
    • Learning from the Literature on Collegiate Cheating: A Review of Empirical Research
    • Crown D.F., M.S. Spiller (1998) Learning from the Literature on Collegiate Cheating: A Review of Empirical Research. Journal of Business Ethics, 17(6): 683-700
    • (1998) Journal of Business Ethics , vol.17 , Issue.6 , pp. 683-700
    • Crown, D.F.1    Spiller, M.S.2
  • 22
    • 0002630250 scopus 로고
    • A Psycho-social Model of Software Piracy: The Development of a Test Model
    • In R. Dejoie, G. Fowler, D Paradice (Eds.) Boston: Boyd & Fraser
    • Eining M.M., A.L. Christensen (1991) A Psycho-social Model of Software Piracy: The Development of a Test Model. In R. Dejoie, G. Fowler, D Paradice (Eds.) Ethical Issues in Information Systems. Boston: Boyd & Fraser
    • (1991) Ethical Issues in Information Systems
    • Eining, M.M.1    Christensen, A.L.2
  • 23
    • 33744970157 scopus 로고
    • Computer law - A Primer on the Law of Software Protection
    • D.R. Ellis. Computer law - a Primer on the Law of Software Protection. The Florida Bar Journal, 1986
    • (1986) The Florida Bar Journal
    • Ellis, D.R.1
  • 24
    • 0030295452 scopus 로고    scopus 로고
    • Situational Determinants of Software Piracy: An Equity Theory Perspective
    • Glass R.S., W.A. Wood (1996) Situational Determinants of Software Piracy: An Equity Theory Perspective. Journal of Business Ethics, 15(11): 1189
    • (1996) Journal of Business Ethics , vol.15 , Issue.11 , pp. 1189
    • Glass, R.S.1    Wood, W.A.2
  • 25
    • 0032245475 scopus 로고    scopus 로고
    • International Software Piracy: Analysis of Key Issues and Impacts
    • Gopal R.D., G.L. Sanders (1998) International Software Piracy: Analysis of Key Issues and Impacts. Information Systems Research, 9(4): 380-397
    • (1998) Information Systems Research , vol.9 , Issue.4 , pp. 380-397
    • Gopal, R.D.1    Sanders, G.L.2
  • 28
    • 0011664858 scopus 로고
    • Why People Copy Software and Create Computer Viruses: Individual Characteristics or Situational Factors?
    • S.J. Harrington, Why People Copy Software and Create Computer Viruses: Individual Characteristics or Situational Factors? Information Resources Management Journal, 2(3): 28-37, 1989.
    • (1989) Information Resources Management Journal, , vol.2 , Issue.3 , pp. 28-37
    • Harrington, S.J.1
  • 30
    • 11144230997 scopus 로고    scopus 로고
    • Can Low Self-control Help with the Understanding of the Software Piracy Problem?
    • Higgins G.E. (2005) Can Low Self-control Help with the Understanding of the Software Piracy Problem? Deviant Behavior, 26(1): 1-24
    • (2005) Deviant Behavior , vol.26 , Issue.1 , pp. 1-24
    • Higgins, G.E.1
  • 31
    • 29444457666 scopus 로고    scopus 로고
    • Does Social Learning Theory Condition the Effects of Low Self-control on College Students' Software Piracy?
    • G.E. Higgins and D.A. Makin. Does Social Learning Theory Condition the Effects of Low Self-control on College Students' Software Piracy? Journal of Economic Crime Management, 2(2): 1-2, 2004.
    • (2004) Journal of Economic Crime Management , vol.2 , Issue.2 , pp. 1-2
    • Higgins, G.E.1    Makin, D.A.2
  • 32
    • 36949001461 scopus 로고    scopus 로고
    • Low Self-control, Moral Beliefs, and Social Learning Theory in University Students' Intentions to Pirate Software
    • Higgins G.E., A.L. Wilson (2006) Low Self-control, Moral Beliefs, and Social Learning Theory in University Students' Intentions to Pirate Software. Security Journal, 19: 75-92
    • (2006) Security Journal , vol.19 , pp. 75-92
    • Higgins, G.E.1    Wilson, A.L.2
  • 33
    • 85044912937 scopus 로고    scopus 로고
    • Digital Piracy: Assessing the Contributions of an Integrated Self-control Theory and Social Learning Theory using Structural Equation Modeling
    • Higgins G.E., B.D. Fell, A.L. Wilson (2006) Digital Piracy: Assessing the Contributions of an Integrated Self-control Theory and Social Learning Theory using Structural Equation Modeling. Criminal Justice Studies, 19(1): 3-22
    • (2006) Criminal Justice Studies , vol.19 , Issue.1 , pp. 3-22
    • Higgins, G.E.1    Fell, B.D.2    Wilson, A.L.3
  • 35
    • 85040939661 scopus 로고
    • The Commitment of Delinquents to their Misdeeds: Do Delinquents Drift?
    • Hindelang M.J. (1970) The Commitment of Delinquents to their Misdeeds: Do Delinquents Drift? Social Problems, 17: 502-509
    • (1970) Social Problems , vol.17 , pp. 502-509
    • Hindelang, M.J.1
  • 36
    • 84925885428 scopus 로고
    • Moral Evaluation of Illegal Behaviors
    • Hindelang M.J. (1974) Moral Evaluation of Illegal Behaviors. Social Problems, 21: 370-385
    • (1974) Social Problems , vol.21 , pp. 370-385
    • Hindelang, M.J.1
  • 37
  • 38
    • 12744275983 scopus 로고    scopus 로고
    • Trends and Patterns among Software Pirates
    • Hinduja S. (2003) Trends and Patterns among Software Pirates. Ethics and Information Technology, 5(1): 49-61
    • (2003) Ethics and Information Technology , vol.5 , Issue.1 , pp. 49-61
    • Hinduja, S.1
  • 39
    • 33750840328 scopus 로고    scopus 로고
    • Critical Theory and Music Piracy
    • Hinduja S. (2006a) Critical Theory and Music Piracy. Critical Criminology, 14(4): 387-409
    • (2006) Critical Criminology , vol.14 , Issue.4 , pp. 387-409
    • Hinduja, S.1
  • 41
    • 0003991890 scopus 로고
    • Berkeley: University of California Press
    • Hirschi T. (1969) Causes of Delinquency. Berkeley: University of California Press
    • (1969) Causes of Delinquency
    • Hirschi, T.1
  • 42
    • 36949000761 scopus 로고    scopus 로고
    • Swashbuckling Students: An Exploratory Study of Internet Piracy
    • Hohn D.A., L.R. Muftic, K. Wolf (2006) Swashbuckling Students: An Exploratory Study of Internet Piracy. Security Journal, 19: 110-127
    • (2006) Security Journal , vol.19 , pp. 110-127
    • Hohn, D.A.1    Muftic, L.R.2    Wolf, K.3
  • 43
    • 84928836007 scopus 로고
    • Neutralizing in the Workplace: An Empirical Analysis of Property Theft and Production Deviance
    • Hollinger R.C. (1991) Neutralizing in the Workplace: An Empirical Analysis of Property Theft and Production Deviance. Deviant Behavior, 12: 169-202
    • (1991) Deviant Behavior , vol.12 , pp. 169-202
    • Hollinger, R.C.1
  • 44
    • 0011655037 scopus 로고
    • Software Piracy and Software Security in Business Schools: An Ethical Perspective
    • Im J.H., P.D. Van Epps (1991) Software Piracy and Software Security in Business Schools: An Ethical Perspective. Data Base, 22(3): 15-21
    • (1991) Data Base , vol.22 , Issue.3 , pp. 15-21
    • Im, J.H.1    Van Epps, P.D.2
  • 45
    • 0000460271 scopus 로고
    • Software Piracy and Software Security Measures in Business Schools
    • Im J.H., P.D. Van Epps (1992) Software Piracy and Software Security Measures in Business Schools. Information & Management, 23(4): 193-203
    • (1992) Information & Management , vol.23 , Issue.4 , pp. 193-203
    • Im, J.H.1    Van Epps, P.D.2
  • 46
    • 6744219555 scopus 로고
    • Software Piracy and Responsibilities of Educational Institutions
    • J.H. Im and C. Koen. Software Piracy and Responsibilities of Educational Institutions. Information & Management, 18(4): 189-194, 1990
    • (1990) Information & Management , vol.18 , Issue.4 , pp. 189-194
    • Im, J.H.1    Koen, C.2
  • 47
    • 0007461850 scopus 로고
    • Information Systems Majors/Non-majors and Computer Ethics
    • Kievit K. (1991) Information Systems Majors/Non-majors and Computer Ethics. Journal of Computer Information, 32(1): 43-49
    • (1991) Journal of Computer Information , vol.32 , Issue.1 , pp. 43-49
    • Kievit, K.1
  • 48
    • 23044520001 scopus 로고    scopus 로고
    • An Empirical Study of Software Piracy and Moral Intensity Among University Students
    • Kini R.B., A. Rominger, B.S. Vijayaraman (2000) An Empirical Study of Software Piracy and Moral Intensity Among University Students. Journal of Computer Information Systems, 40(3): 62-72
    • (2000) Journal of Computer Information Systems , vol.40 , Issue.3 , pp. 62-72
    • Kini, R.B.1    Rominger, A.2    Vijayaraman, B.S.3
  • 49
    • 4043076317 scopus 로고    scopus 로고
    • Shaping of Moral Intensity Regarding Software Piracy: A Comparison between Thailand and U.S. Students
    • Kini R.B., H.V. Ramakrishna B.S. Vijayaraman (2004) Shaping of Moral Intensity Regarding Software Piracy: A Comparison between Thailand and U.S. Students. Journal of Business Ethics, 49: 91-104
    • (2004) Journal of Business Ethics , vol.49 , pp. 91-104
    • Kini, R.B.1    Ramakrishna, H.V.2    Vijayaraman, B.S.3
  • 51
    • 21344487851 scopus 로고
    • Delinquent Values and Victim Damage: Exploring the Limits of Neutralization Theory
    • Landsheer J.A., H. Hart, W. Kox (1994) Delinquent Values and Victim Damage: Exploring the Limits of Neutralization Theory. British Journal of Criminology, 34(1): 44-53
    • (1994) British Journal of Criminology , vol.34 , Issue.1 , pp. 44-53
    • Landsheer, J.A.1    Hart, H.2    Kox, W.3
  • 52
    • 0026712064 scopus 로고
    • Another View of Computer Science Ethics: Patterns of Responses among Computer Scientists
    • Leventhal L.M., K.E. Instone, D.W. Chilson (1992) Another View of Computer Science Ethics: Patterns of Responses among Computer Scientists. Journal of System Software, 17: 49-60
    • (1992) Journal of System Software , vol.17 , pp. 49-60
    • Leventhal, L.M.1    Instone, K.E.2    Chilson, D.W.3
  • 56
    • 85024144258 scopus 로고    scopus 로고
    • Defending Intellectual Property: State Efforts to Protect Creative Works
    • Luckenbill D.F., S.L. Miller (1998) Defending Intellectual Property: State Efforts to Protect Creative Works. Justice Quarterly, 15(1): 93-120
    • (1998) Justice Quarterly , vol.15 , Issue.1 , pp. 93-120
    • Luckenbill, D.F.1    Miller, S.L.2
  • 57
    • 0012092773 scopus 로고
    • Controlling Copyright Infringements of Intellectual Property: The Cause of Computer Software-Part One
    • Y. Malhotra. Controlling Copyright Infringements of Intellectual Property: The Cause of Computer Software-Part One. Journal of Systems Management 45: 32-35, 1994
    • (1994) Journal of Systems Management , vol.45 , pp. 32-35
    • Malhotra, Y.1
  • 58
    • 79957894131 scopus 로고
    • New York: John Wiley and Sons, Inc
    • Matza D. (1964) Delinquency and Drift. New York: John Wiley and Sons, Inc
    • (1964) Delinquency and Drift
    • Matza, D.1
  • 59
    • 0001191711 scopus 로고    scopus 로고
    • Linking Exposure to Strain with Anger: An Investigation of Deviant Adaptations
    • Mazerolle P., A. Piquero (1998) Linking Exposure to Strain with Anger: An Investigation of Deviant Adaptations. Journal of Criminal Justice, 26(3): 195-211
    • (1998) Journal of Criminal Justice , vol.26 , Issue.3 , pp. 195-211
    • Mazerolle, P.1    Piquero, A.2
  • 63
    • 0019303515 scopus 로고
    • The Neutralization of the Criminal Offense
    • Minor W.W. (1980) The Neutralization of the Criminal Offense. Criminology, 18(1): 103-120
    • (1980) Criminology , vol.18 , Issue.1 , pp. 103-120
    • Minor, W.W.1
  • 64
    • 0019495519 scopus 로고
    • Techniques of Neutralization: A Reconceptualization and Empirical Examination
    • Minor W.W. (1981) Techniques of Neutralization: A Reconceptualization and Empirical Examination. Journal of Research in Crime and Delinquency, 18(1): 295-318
    • (1981) Journal of Research in Crime and Delinquency , vol.18 , Issue.1 , pp. 295-318
    • Minor, W.W.1
  • 65
    • 0013332223 scopus 로고
    • Types of Neutralization and Types of Delinquency
    • Mitchell J., R. Dodder (1983) Types of Neutralization and Types of Delinquency. Journal of Youth and Adolescence, 12(4): 307-318
    • (1983) Journal of Youth and Adolescence , vol.12 , Issue.4 , pp. 307-318
    • Mitchell, J.1    Dodder, R.2
  • 66
    • 85050412654 scopus 로고
    • Enduring Individual Differences and Rational Choice Theories of Crime
    • D.S. Nagin and R. Paternoster. Enduring Individual Differences and Rational Choice Theories of Crime. Law & Society Review, 27: 467-496, 1993.
    • (1993) Law & Society Review , vol.27 , pp. 467-496
    • Nagin, D.S.1    Paternoster, R.2
  • 68
    • 0002103996 scopus 로고
    • The Attitude of Mangers-to-be Toward Software Piracy
    • Oz E. (1990) The Attitude of Mangers-to-be Toward Software Piracy. OR/MS Today, 17(4): 24-26
    • (1990) OR/MS Today , vol.17 , Issue.4 , pp. 24-26
    • Oz, E.1
  • 69
    • 4544387878 scopus 로고
    • Ethical Attitudes of Entry-level MIS Personnel
    • Paradice D.J. (1990) Ethical Attitudes of Entry-level MIS Personnel. Information & Management, 18(3): 143-151
    • (1990) Information & Management , vol.18 , Issue.3 , pp. 143-151
    • Paradice, D.J.1
  • 70
    • 3042972237 scopus 로고
    • A Predictive Model of Software Piracy Behaviour: An Empirical Validation
    • Unpublished Doctoral Dissertation, University of Pittsburg
    • A.G. Peace A Predictive Model of Software Piracy Behaviour: An Empirical Validation. Unpublished Doctoral Dissertation, University of Pittsburg, 1995
    • (1995)
    • Peace, A.G.1
  • 71
    • 3042985713 scopus 로고    scopus 로고
    • Software Piracy and Computer-using Professionals: A Survey
    • Peace A.G. (1997) Software Piracy and Computer-using Professionals: A Survey. Journal of Computer Information Systems, 38(1): 94-99
    • (1997) Journal of Computer Information Systems , vol.38 , Issue.1 , pp. 94-99
    • Peace, A.G.1
  • 73
    • 0007391492 scopus 로고    scopus 로고
    • Software Piracy among Computing Students: A Bruneian Scenario
    • Rahim M.M., A.H. Seyal, N.A. Rahman (1999) Software Piracy among Computing Students: A Bruneian Scenario. Computers and Education, 32: 301-321
    • (1999) Computers and Education , vol.32 , pp. 301-321
    • Rahim, M.M.1    Seyal, A.H.2    Rahman, N.A.3
  • 74
    • 0035637388 scopus 로고    scopus 로고
    • Shaping of Moral Intensity Regarding Software Piracy in University Students: Immediate Community Effects
    • Ramakrishna H.V., R.B. Kini, B.S. Vijayaraman (2001) Shaping of Moral Intensity Regarding Software Piracy in University Students: Immediate Community Effects. Journal of Computer Information Systems, 41(4): 47-51
    • (2001) Journal of Computer Information Systems , vol.41 , Issue.4 , pp. 47-51
    • Ramakrishna, H.V.1    Kini, R.B.2    Vijayaraman, B.S.3
  • 76
    • 33750805978 scopus 로고    scopus 로고
    • RIAA Recording Industry Association of America
    • RIAA, The NET Act. Recording Industry Association of America, 2000.
    • (2000) The NET Act
  • 77
    • 0011532430 scopus 로고
    • Correlates of Computer Misuse: Data from a Self-Reporting Sample
    • Sacco V.F., E. Zureik (1990) Correlates of Computer Misuse: Data from a Self-Reporting Sample. Behavior and Information Technology, 9: 353-359
    • (1990) Behavior and Information Technology , vol.9 , pp. 353-359
    • Sacco, V.F.1    Zureik, E.2
  • 78
    • 84886765777 scopus 로고    scopus 로고
    • It's Not Really Theft! Personal and Workplace Ethics that Enable Software Piracy
    • D.A. Seale, M. Polakowski, and S. Schneider. It's Not Really Theft! Personal and Workplace Ethics that Enable Software Piracy. Communication Abstracts, 21(4), 1998.
    • (1998) Communication Abstracts , vol.21 , Issue.4
    • Seale, D.A.1    Polakowski, M.2    Schneider, S.3
  • 79
    • 36949039512 scopus 로고    scopus 로고
    • SIIA Software & Information Industry Association
    • SIIA, Classification of Software. Software & Information Industry Association, 1999.
    • (1999) Classification of Software
  • 82
    • 0030668250 scopus 로고    scopus 로고
    • A Social Learning Theory Analysis of Computer Crime among College Students
    • Skinner B.F., Anne M. Fream (1997) A Social Learning Theory Analysis of Computer Crime among College Students. Journal of Research in Crime and Delinquency, 34: 495-518
    • (1997) Journal of Research in Crime and Delinquency , vol.34 , pp. 495-518
    • Skinner, B.F.1    Fream, A.M.2
  • 83
    • 0002961010 scopus 로고
    • The Effect of Demographic Factors on Attitudes Toward Software Piracy
    • S. Solomon and J.A. O'Brien. The Effect of Demographic Factors on Attitudes Toward Software Piracy. Journal of Computer Information Systems, 30(3): 40-46, 1990.
    • (1990) Journal of Computer Information Systems , vol.30 , Issue.3 , pp. 40-46
    • Solomon, S.1    O'Brien, J.A.2
  • 84
    • 0001354192 scopus 로고
    • The Morality of Software Piracy: A Cross-cultural Analysis
    • W.R. Swinyard, H. Rinne, and A. Keng Kau. The Morality of Software Piracy: A Cross-cultural Analysis. Journal of Business Ethics, 9: 655-664, 1990.
    • (1990) Journal of Business Ethics , vol.9 , pp. 655-664
    • Swinyard, W.R.1    Rinne, H.2    Keng Kau, A.3
  • 85
    • 0001155759 scopus 로고
    • Techniques of Neutralization: A Theory of Delinquency
    • Sykes G., D. Matza (1957) Techniques of Neutralization: A Theory of Delinquency. American Sociological Review, 22: 664-670
    • (1957) American Sociological Review , vol.22 , pp. 664-670
    • Sykes, G.1    Matza, D.2
  • 86
    • 84973740128 scopus 로고
    • A Comparative Examination of Attitudes Toward Software Piracy among Business Professors and Executives
    • Taylor G. Stephen, J.P. Shim (1993) A Comparative Examination of Attitudes Toward Software Piracy among Business Professors and Executives. Human Relations, 46(4): 419-433
    • (1993) Human Relations , vol.46 , Issue.4 , pp. 419-433
    • Stephen Taylor, G.1    Shim, J.P.2
  • 87
    • 0032223746 scopus 로고    scopus 로고
    • Testing an Ethical Decision-making Theory: The Case of Softlifting
    • Thong J.L., C.S. Yap (1998) Testing an Ethical Decision-making Theory: The Case of Softlifting. Journal of Management Information Systems, 15(1): 213-237
    • (1998) Journal of Management Information Systems , vol.15 , Issue.1 , pp. 213-237
    • Thong, J.L.1    Yap, C.S.2
  • 88
    • 84926279405 scopus 로고
    • Deviance and the Neutralization of Moral Commitment: An Empirical Analysis
    • Q.C. Thurman, Deviance and the Neutralization of Moral Commitment: An Empirical Analysis. Deviant Behavior, 5: 291-304, 1984.
    • (1984) Deviant Behavior , vol.5 , pp. 291-304
    • Thurman, Q.C.1
  • 89
    • 0042223455 scopus 로고    scopus 로고
    • Software Piracy: A View from Hong Kong. Association for Computing Machinery
    • Trevor M., D. Gurpreet (2000) Software Piracy: A View from Hong Kong. Association for Computing Machinery. Communications of the ACM, 43(12): 88
    • (2000) Communications of the ACM , vol.43 , Issue.12 , pp. 88
    • Trevor, M.1    Gurpreet, D.2
  • 90
    • 79955018926 scopus 로고    scopus 로고
    • Compliance with Intellectual Property Laws: A Psychological Perspective
    • Tyler T.R. (1996) Compliance with Intellectual Property Laws: A Psychological Perspective. International Law and Politics, 29: 219-235
    • (1996) International Law and Politics , vol.29 , pp. 219-235
    • Tyler, T.R.1
  • 91
    • 11144295174 scopus 로고
    • How Do We Teach Computer Ethics? A Short Study done in Hong Kong
    • Wong E.Y.H. (1995) How Do We Teach Computer Ethics? A Short Study done in Hong Kong. Computers and Education, 25(4): 179-191
    • (1995) Computers and Education , vol.25 , Issue.4 , pp. 179-191
    • Wong, E.Y.H.1
  • 92
    • 0007350161 scopus 로고
    • A Study of Unauthorized Software Copying among Post-secondary Students in Hong Kong
    • Wong G., A. Kong, S. Ngai (1990) A Study of Unauthorized Software Copying among Post-secondary Students in Hong Kong. The Australian Computer Journal, 22(4): 114-122
    • (1990) The Australian Computer Journal , vol.22 , Issue.4 , pp. 114-122
    • Wong, G.1    Kong, A.2    Ngai, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.