메뉴 건너뛰기




Volumn 24, Issue 4, 2008, Pages 199-218

Parameters for software piracy research

Author keywords

Guardianship; Piracy parameters; Rational choice theory; Routine activities theory; Software; Software piracy; Theoretical framework

Indexed keywords


EID: 47949112808     PISSN: 01972243     EISSN: 10876537     Source Type: Journal    
DOI: 10.1080/01972240802189468     Document Type: Article
Times cited : (27)

References (129)
  • 1
    • 0031161643 scopus 로고    scopus 로고
    • Software copyright infringement: An exploratory study of the effects of individual and peer beliefs
    • Al Jabri, I., and A. Gader. 1997. Software copyright infringement: An exploratory study of the effects of individual and peer beliefs. Omega: The International Journal of Management Science 25(3):335-344.
    • (1997) Omega: The International Journal of Management Science , vol.25 , Issue.3 , pp. 335-344
    • Al Jabri, I.1    Gader, A.2
  • 2
    • 30344460323 scopus 로고    scopus 로고
    • Digital piracy: Factors that influence attitudes toward behavior
    • Al-Rafee, S., and P. T. Cronan. 2006. Digital piracy: Factors that influence attitudes toward behavior. Journal of Business Ethics 63(3):237-259.
    • (2006) Journal of Business Ethics , vol.63 , Issue.3 , pp. 237-259
    • Al-Rafee, S.1    Cronan, P.T.2
  • 3
    • 31044447102 scopus 로고    scopus 로고
    • Online software distribution with out enforcing copy protection as a strategic weapon
    • Altinkemer, K., J. Guan, and A. Sahin. 2005. Online software distribution with out enforcing copy protection as a strategic weapon. Information Systems and e-Business Management 3(4):343-361.
    • (2005) Information Systems and e-Business Management , vol.3 , Issue.4 , pp. 343-361
    • Altinkemer, K.1    Guan, J.2    Sahin, A.3
  • 4
    • 32544440571 scopus 로고    scopus 로고
    • The relationship between copyright software protection and piracy: Evidence from Europe
    • Andres, A. R. 2006. The relationship between copyright software protection and piracy: Evidence from Europe. European Journal of Law and Economics 21(1):29-51.
    • (2006) European Journal of Law and Economics , vol.21 , Issue.1 , pp. 29-51
    • Andres, A.R.1
  • 6
    • 33745890312 scopus 로고    scopus 로고
    • Global software piracy: Can economic factors alone explain the trend?
    • Bagchi, K., P. Kirs, and P. Cerveny. 2006. Global software piracy: Can economic factors alone explain the trend? Communications of the ACM 40(6):70-77.
    • (2006) Communications of the ACM , vol.40 , Issue.6 , pp. 70-77
    • Bagchi, K.1    Kirs, P.2    Cerveny, P.3
  • 7
    • 32044442736 scopus 로고    scopus 로고
    • Lobbying and commercial software piracy
    • Banerjee, D. 2006. Lobbying and commercial software piracy. European Journal of Political Economy 22(1):139-155.
    • (2006) European Journal of Political Economy , vol.22 , Issue.1 , pp. 139-155
    • Banerjee, D.1
  • 8
    • 84867973099 scopus 로고    scopus 로고
    • Software piracy: A strategic analysis and policy instruments
    • Banerjee, D. 2003. Software piracy: A strategic analysis and policy instruments. International Journal of Industrial Organization 21(1): 197-217.
    • (2003) International Journal of Industrial Organization , vol.21 , Issue.1 , pp. 197-217
    • Banerjee, D.1
  • 9
    • 0000802810 scopus 로고    scopus 로고
    • Individual difference variables, ethical judgments, and ethical behavioral intentions
    • Bass, K., and T. Barnett. 1999. Individual difference variables, ethical judgments, and ethical behavioral intentions. Business Ethics Quarterly 9(2): 183-205.
    • (1999) Business Ethics Quarterly , vol.9 , Issue.2 , pp. 183-205
    • Bass, K.1    Barnett, T.2
  • 10
    • 33344466705 scopus 로고    scopus 로고
    • Influences on software piracy: Evidence from the various United States
    • Bezmen, T., and C. Depken. 2006. Influences on software piracy: Evidence from the various United States. Economics Letters 90(3):356-361.
    • (2006) Economics Letters , vol.90 , Issue.3 , pp. 356-361
    • Bezmen, T.1    Depken, C.2
  • 11
    • 33745847545 scopus 로고    scopus 로고
    • Impact of legal threats on online music sharing activity: An analysis of music industry legal actions
    • Bhattacharjee S., R. Gopal, K. Lertwachara, and J. R. Marsden. 2006. Impact of legal threats on online music sharing activity: An analysis of music industry legal actions. Journal of Law and Economics 49(1):91-114.
    • (2006) Journal of Law and Economics , vol.49 , Issue.1 , pp. 91-114
    • Bhattacharjee, S.1    Gopal, R.2    Lertwachara, K.3    Marsden, J.R.4
  • 13
    • 33747769915 scopus 로고    scopus 로고
    • Whateverhappened to Payola? An empirical analysis of online music sharing
    • Bhattacharjee S., R. Gopal, K. Lertwachara, and J. R. Marsden. 2004. Whateverhappened to Payola? An empirical analysis of online music sharing. Decision Support Systems 42(1): 104-120.
    • (2004) Decision Support Systems , vol.42 , Issue.1 , pp. 104-120
    • Bhattacharjee, S.1    Gopal, R.2    Lertwachara, K.3    Marsden, J.R.4
  • 14
    • 1342264325 scopus 로고    scopus 로고
    • Digital music and online sharing: Software piracy 2.0?
    • Bhattacharjee S., R. Gopal, and L. Sanders. 2003. Digital music and online sharing: Software piracy 2.0? Communications of the ACM 46(7): 107-111.
    • (2003) Communications of the ACM , vol.46 , Issue.7 , pp. 107-111
    • Bhattacharjee, S.1    Gopal, R.2    Sanders, L.3
  • 18
  • 19
    • 55849097846 scopus 로고    scopus 로고
    • BSA, accessed April 1, 2008
    • BSA. 2007. Fourth annual BSA & IDC global software piracy study. http://w3.bsa.org/globalstudy// upload/ 2007-Global-Piracy-Study-EN. pdf (accessed April 1, 2008).
    • (2007) Fourth annual BSA & IDC global software piracy study
  • 20
    • 47949114340 scopus 로고    scopus 로고
    • BSA and IDC. 2004. First annual BSA & IDC global software piracy study.http://www.caast.com/resources/IDC_GlobaLSoftware -Piracy_Study_2004. pdf (accessed April 1, 2008).
    • BSA and IDC. 2004. First annual BSA & IDC global software piracy study.http://www.caast.com/resources/IDC_GlobaLSoftware -Piracy_Study_2004. pdf (accessed April 1, 2008).
  • 21
    • 85048668002 scopus 로고    scopus 로고
    • Are you a software thief, but don't know it
    • November 1, 1997, accessed April 1, 2008
    • Caborn, A. 1997. Are you a software thief, but don't know it. Management Today, November 1, 1997. http://www.managementtoday.co.uk /search/article/410979/uk-software-thief-dont-know-it/ (accessed April 1, 2008).
    • (1997) Management Today
    • Caborn, A.1
  • 22
    • 33750922314 scopus 로고    scopus 로고
    • Ethics in information technology and software use
    • Calluzzo, V., and C. Cante. 2004. Ethics in information technology and software use. Journal of Business Ethics 51(3):301-312.
    • (2004) Journal of Business Ethics , vol.51 , Issue.3 , pp. 301-312
    • Calluzzo, V.1    Cante, C.2
  • 23
    • 29444441039 scopus 로고    scopus 로고
    • Managing piracy: Pricing and sampling strategies for digital experience goods in vertically segmented markets
    • Chellappa, R. K., and S. Shivendu. 2005. Managing piracy: pricing and sampling strategies for digital experience goods in vertically segmented markets. Information Systems Research, 16(4):400-417.
    • (2005) Information Systems Research , vol.16 , Issue.4 , pp. 400-417
    • Chellappa, R.K.1    Shivendu, S.2
  • 25
    • 17444428885 scopus 로고    scopus 로고
    • The antecedents of music piracy: Attitudes and intentions
    • Chiou, J., C. Huang, and H. Lee. 2005. The antecedents of music piracy: Attitudes and intentions. Journal of Business Ethics 57(2): 161-174.
    • (2005) Journal of Business Ethics , vol.57 , Issue.2 , pp. 161-174
    • Chiou, J.1    Huang, C.2    Lee, H.3
  • 26
    • 0001865968 scopus 로고
    • Factors influencing software piracy: Implications for accountants
    • Christinsen, A., and M. Eining. 1991. Factors influencing software piracy: Implications for accountants. Journal of Information Systems 5(1):67-80.
    • (1991) Journal of Information Systems , vol.5 , Issue.1 , pp. 67-80
    • Christinsen, A.1    Eining, M.2
  • 27
    • 4043071717 scopus 로고    scopus 로고
    • Hot products: Understanding, anticipating and reducing the demand for stolen goods
    • Paper 112, accessed October 15, 2007
    • Clarke, R. 1999. Hot products: Understanding, anticipating and reducing the demand for stolen goods. United Kingdom Police Research Series (Paper 112). http://www.crimereduction.gov.uk /stolengoods1.htm (accessed October 15, 2007).
    • (1999) United Kingdom Police Research Series
    • Clarke, R.1
  • 28
    • 47949093256 scopus 로고    scopus 로고
    • Clarke, R., and M. Felson. 1993. Criminology, routine activity and rational choice - An introduction. In Routine activity and rational choice, eds. R. Clarke and M. Felson, pp. 1-13. New Brunswick, NJ: Transaction.
    • Clarke, R., and M. Felson. 1993. Criminology, routine activity and rational choice - An introduction. In Routine activity and rational choice, eds. R. Clarke and M. Felson, pp. 1-13. New Brunswick, NJ: Transaction.
  • 29
    • 0001244215 scopus 로고
    • Modeling offenders decisions: A framework for policy & research
    • eds. M. Tonry and N. Morris
    • Clarke, R. V., and D. B. Cornish. 1985. Modeling offenders decisions: A framework for policy & research. In Crime & justice: An annual review of research, eds. M. Tonry and N. Morris, vol. 6, pp. 147-185.
    • (1985) Crime & justice: An annual review of research , vol.6 , pp. 147-185
    • Clarke, R.V.1    Cornish, D.B.2
  • 30
    • 0000204509 scopus 로고
    • Social change and crime rates: A routine activity approach
    • Cohen, L. E., and M. Felson. 1979. Social change and crime rates: A routine activity approach. American Sociological Review 44(4):588-608.
    • (1979) American Sociological Review , vol.44 , Issue.4 , pp. 588-608
    • Cohen, L.E.1    Felson, M.2
  • 31
    • 84934563431 scopus 로고
    • Toward an integrated theory of white collar crime
    • Coleman, J. W. 1987. Toward an integrated theory of white collar crime. American Journal of Sociology 93(2):406-439.
    • (1987) American Journal of Sociology , vol.93 , Issue.2 , pp. 406-439
    • Coleman, J.W.1
  • 32
    • 0001020817 scopus 로고
    • Software piracy: An analysis of protection strategies
    • Conner, K., and R. Rummelt. 1991. Software piracy: An analysis of protection strategies. Management Science 37(2):125-139.
    • (1991) Management Science , vol.37 , Issue.2 , pp. 125-139
    • Conner, K.1    Rummelt, R.2
  • 34
    • 33745903904 scopus 로고    scopus 로고
    • Computer piracy, crime and IS misuse at the university
    • Cronan, T., B. Foltz, and T. Jones. 2006. Computer piracy, crime and IS misuse at the university. Communications of the ACM 49(6):85-90.
    • (2006) Communications of the ACM , vol.49 , Issue.6 , pp. 85-90
    • Cronan, T.1    Foltz, B.2    Jones, T.3
  • 35
    • 0041006432 scopus 로고
    • Anew scale of social desirability independent of psychopathology
    • Crowne, D. P., and D. Marlowe. 1960. Anew scale of social desirability independent of psychopathology. Journal of Consulting Psychology 24(4):349-354.
    • (1960) Journal of Consulting Psychology , vol.24 , Issue.4 , pp. 349-354
    • Crowne, D.P.1    Marlowe, D.2
  • 36
    • 1542756559 scopus 로고    scopus 로고
    • Social construct and the propensity for software piracy
    • Depken, C., and L. Simmons. 2004. Social construct and the propensity for software piracy. Applied Economics Letters 11(2):97-100.
    • (2004) Applied Economics Letters , vol.11 , Issue.2 , pp. 97-100
    • Depken, C.1    Simmons, L.2
  • 37
    • 0000245080 scopus 로고
    • Ethical decision making: A review of empirical literature
    • Ford, R. C., and W. D. Richardson. 1994. Ethical decision making: A review of empirical literature. Journal of Business Ethics 13(3):205-221.
    • (1994) Journal of Business Ethics , vol.13 , Issue.3 , pp. 205-221
    • Ford, R.C.1    Richardson, W.D.2
  • 38
    • 33745932103 scopus 로고    scopus 로고
    • An empirical study of software piracy among tertiary institutions in Singapore
    • Gan, L., and H. Koh. 2006. An empirical study of software piracy among tertiary institutions in Singapore. Information and Management 43(5):640-649.
    • (2006) Information and Management , vol.43 , Issue.5 , pp. 640-649
    • Gan, L.1    Koh, H.2
  • 39
    • 0346403985 scopus 로고    scopus 로고
    • Copyright control over new technologies of dissemination
    • Ginsburg, J. C. 2001. Copyright control over new technologies of dissemination. Columbia Law Review 101(7):1613-1647.
    • (2001) Columbia Law Review , vol.101 , Issue.7 , pp. 1613-1647
    • Ginsburg, J.C.1
  • 40
    • 77953283315 scopus 로고
    • Software piracy: Estimation of lost sales and the impact of software diffusion
    • Givon, M., V. Mahajan, and E. Muller. 1995. Software piracy: Estimation of lost sales and the impact of software diffusion. Journal of Marketing 59(1):29-37.
    • (1995) Journal of Marketing , vol.59 , Issue.1 , pp. 29-37
    • Givon, M.1    Mahajan, V.2    Muller, E.3
  • 41
    • 0003390231 scopus 로고    scopus 로고
    • Assessing the relationship between user-based market share and unit sales-based market share for pirated software brands in competitive markets
    • Givon, M., V. Mahajan, and, E. Muller. 1997. Assessing the relationship between user-based market share and unit sales-based market share for pirated software brands in competitive markets. Technological Forecasting & Social Change 55(2):131-144.
    • (1997) Technological Forecasting & Social Change , vol.55 , Issue.2 , pp. 131-144
    • Givon, M.1    Mahajan, V.2    Muller, E.3
  • 42
    • 0030295452 scopus 로고    scopus 로고
    • Situational determinants of software piracy: An equity theory perspective
    • Glass, R., and W. Wood. 1996. Situational determinants of software piracy: An equity theory perspective. Journal of Business Ethics 15(11):1189-1198.
    • (1996) Journal of Business Ethics , vol.15 , Issue.11 , pp. 1189-1198
    • Glass, R.1    Wood, W.2
  • 43
    • 33646542629 scopus 로고    scopus 로고
    • What motivates software crackers?
    • Goods, S., and S. Cruise. 2006. What motivates software crackers? Journal of Business Ethics 65(2):,173-201.
    • (2006) Journal of Business Ethics , vol.65 , Issue.2 , pp. 173-201
    • Goods, S.1    Cruise, S.2
  • 44
  • 45
    • 0032245475 scopus 로고    scopus 로고
    • International software piracy: An analysis of key issues and impacts
    • Gopal, R., and L. Sanders. 1998. International software piracy: An analysis of key issues and impacts. Information Systems Research 9(4): 380-397.
    • (1998) Information Systems Research , vol.9 , Issue.4 , pp. 380-397
    • Gopal, R.1    Sanders, L.2
  • 46
    • 0002481588 scopus 로고    scopus 로고
    • Software piracy: You can't, get blood out of a turnip
    • Gopal, R., and L. Sanders. 2000. Software piracy: You can't, get blood out of a turnip. Communications of the ACM 43(9):84-89.
    • (2000) Communications of the ACM , vol.43 , Issue.9 , pp. 84-89
    • Gopal, R.1    Sanders, L.2
  • 48
    • 84935667238 scopus 로고
    • Conscience, significant others and rational choice-Extending the deterrence model
    • Grasmick, H., and R. Bursik. 1990. Conscience, significant others and rational choice-Extending the deterrence model. Law and Society Review 24(3):837-862.
    • (1990) Law and Society Review , vol.24 , Issue.3 , pp. 837-862
    • Grasmick, H.1    Bursik, R.2
  • 49
    • 21844481351 scopus 로고
    • The historical variability of the age-crime relationship
    • Greenberg, D. F. 1994. The historical variability of the age-crime relationship. Journal of Quantitative Criminology 10(4):361-373.
    • (1994) Journal of Quantitative Criminology , vol.10 , Issue.4 , pp. 361-373
    • Greenberg, D.F.1
  • 50
    • 12744267843 scopus 로고    scopus 로고
    • To pirate or not to pirate: A comparative study of the ethical versus other influences on consumer's software acquisition mode decision
    • Gupta, P., S. Gould, and B. Pola. 2004. To pirate or not to pirate: A comparative study of the ethical versus other influences on consumer's software acquisition mode decision. Journal of Business Ethics 55(3):255-274.
    • (2004) Journal of Business Ethics , vol.55 , Issue.3 , pp. 255-274
    • Gupta, P.1    Gould, S.2    Pola, B.3
  • 51
    • 1242308738 scopus 로고
    • Computer crime and abuse by IS employees
    • Harrington, S. 1995. Computer crime and abuse by IS employees. Journal of Systems Management 46(2):6-11.
    • (1995) Journal of Systems Management , vol.46 , Issue.2 , pp. 6-11
    • Harrington, S.1
  • 52
    • 3042661790 scopus 로고    scopus 로고
    • The effect of piracy on the market penetration of subscription software
    • Haruvy, E., V. Mahajan, and A. Prasad 2004. The effect of piracy on the market penetration of subscription software. Journal of Business 77(2):581-609.
    • (2004) Journal of Business , vol.77 , Issue.2 , pp. 581-609
    • Haruvy, E.1    Mahajan, V.2    Prasad, A.3
  • 54
    • 84856980866 scopus 로고    scopus 로고
    • Piracy stats don't add up
    • November 7, 24897,20713160-15306,00. html accessed October 16, 2007
    • Hayes, S. 2006. Piracy stats don't add up. Australian IT, November 7, 2006. http://www.australianit.news.com.au/story/0,24897,20713160-15306,00. html (accessed October 16 2007).
    • (2006) Australian IT
    • Hayes, S.1
  • 55
    • 85044912937 scopus 로고    scopus 로고
    • Digital piracy: Assessing the contributions of an integrated self control theory and social learning theory using structural equation modeling
    • Higgins G. E., B. D. Fell, and A. L. Wilson. 2006. Digital piracy: Assessing the contributions of an integrated self control theory and social learning theory using structural equation modeling. Criminal Justice Studies 19(1): 3-22.
    • (2006) Criminal Justice Studies , vol.19 , Issue.1 , pp. 3-22
    • Higgins, G.E.1    Fell, B.D.2    Wilson, A.L.3
  • 56
    • 11144230997 scopus 로고    scopus 로고
    • Can low self-control help with the understanding of the software piracy problem?
    • Higgins, G. E. 2004. Can low self-control help with the understanding of the software piracy problem? Deviant Behavior 26(1): 1-24.
    • (2004) Deviant Behavior , vol.26 , Issue.1 , pp. 1-24
    • Higgins, G.E.1
  • 57
  • 58
    • 12744275983 scopus 로고    scopus 로고
    • Trends and patterns among online software pirates
    • Hinduja, S. 2003. Trends and patterns among online software pirates. Ethics and Information Technology 5(1):49-61.
    • (2003) Ethics and Information Technology , vol.5 , Issue.1 , pp. 49-61
    • Hinduja, S.1
  • 59
    • 0003991890 scopus 로고
    • first edition, Berkeley: University of California Press
    • Hirschi, T. 1969. Causes of delinquency (first edition). Berkeley: University of California Press.
    • (1969) Causes of delinquency
    • Hirschi, T.1
  • 60
    • 85001578690 scopus 로고    scopus 로고
    • Software asset management: Analysis, development and implementation
    • Holsing, N., and D. Yen. 1999. Software asset management: Analysis, development and implementation. Information Resources Management Journal 12(3): 14-27.
    • (1999) Information Resources Management Journal , vol.12 , Issue.3 , pp. 14-27
    • Holsing, N.1    Yen, D.2
  • 61
    • 85008063188 scopus 로고    scopus 로고
    • Steal this software and this DVD...and this book, and this handbag, and this car [Intellectual property theft]
    • Hood, M. 2005. Steal this software and this DVD...and this book, and this handbag, and this car [Intellectual property theft]. Spectrum IEEE 42(6):52-53.
    • (2005) Spectrum IEEE , vol.42 , Issue.6 , pp. 52-53
    • Hood, M.1
  • 62
    • 0034238348 scopus 로고    scopus 로고
    • The impact of national culture on software piracy
    • Husted, B. 2000. The impact of national culture on software piracy. Journal of Business Ethics 26(3):197-211.
    • (2000) Journal of Business Ethics , vol.26 , Issue.3 , pp. 197-211
    • Husted, B.1
  • 63
    • 9144264974 scopus 로고    scopus 로고
    • International Planning and Research Corporation, Washington DC: Business Software Alliance
    • International Planning and Research Corporation. 2003. Eighth annual BSA global software piracy study. Washington DC: Business Software Alliance.
    • (2003) Eighth annual BSA global software piracy study
  • 64
    • 0141503248 scopus 로고    scopus 로고
    • Network externalities, price discrimination and profitable piracy
    • King, S., and R. Lampe. 2003. Network externalities, price discrimination and profitable piracy. Information Economics and Policy 15(3):271-290.
    • (2003) Information Economics and Policy , vol.15 , Issue.3 , pp. 271-290
    • King, S.1    Lampe, R.2
  • 65
    • 4043076317 scopus 로고    scopus 로고
    • Shaping of moral intensity: A comparison between Thailand and US students
    • Kini, R., H. Ramakrishna, and B. Vijayaraman. 2004. Shaping of moral intensity: A comparison between Thailand and US students. Journal of Business Ethics 49(1):91-104.
    • (2004) Journal of Business Ethics , vol.49 , Issue.1 , pp. 91-104
    • Kini, R.1    Ramakrishna, H.2    Vijayaraman, B.3
  • 66
    • 0037276453 scopus 로고    scopus 로고
    • An exploratory study of moral intensity regarding software piracy of students in Thailand
    • Kini, R., H. Ramakrishna, and B. Vijayaraman. 2003. An exploratory study of moral intensity regarding software piracy of students in Thailand. Behavior and Information Technology 22(1):63-70.
    • (2003) Behavior and Information Technology , vol.22 , Issue.1 , pp. 63-70
    • Kini, R.1    Ramakrishna, H.2    Vijayaraman, B.3
  • 67
    • 23044520001 scopus 로고    scopus 로고
    • An empirical study of software piracy and moral intensity among university students
    • Kini, R., A. Rominger, and B. Vijayaraman. 2000. An empirical study of software piracy and moral intensity among university students. Journal of Computer Information Systems 40(3):62-73.
    • (2000) Journal of Computer Information Systems , vol.40 , Issue.3 , pp. 62-73
    • Kini, R.1    Rominger, A.2    Vijayaraman, B.3
  • 68
    • 0039686012 scopus 로고    scopus 로고
    • Software piracy and its legal implications
    • Kohen, C., and J. Im. 1997. Software piracy and its legal implications. Information and Management 31(5):265-272.
    • (1997) Information and Management , vol.31 , Issue.5 , pp. 265-272
    • Kohen, C.1    Im, J.2
  • 69
    • 0040436852 scopus 로고    scopus 로고
    • Development and validation of an ethical computer self efficacy measure: The case of softlifting
    • Kuo, F., and M. H. Hsu. 2001. Development and validation of an ethical computer self efficacy measure: The case of softlifting. Journal of Business Ethics 32(4):299-315.
    • (2001) Journal of Business Ethics , vol.32 , Issue.4 , pp. 299-315
    • Kuo, F.1    Hsu, M.H.2
  • 70
    • 30344465179 scopus 로고    scopus 로고
    • An empirical, study of software piracy
    • Lau, E. K. W. 2003. An empirical, study of software piracy. Business Ethics: A European Review 12(3):233-245.
    • (2003) Business Ethics: A European Review , vol.12 , Issue.3 , pp. 233-245
    • Lau, E.K.W.1
  • 71
    • 33644620505 scopus 로고    scopus 로고
    • How do hospitality and tourism students view software piracy?
    • Law, R., and D. Wong. 2005. How do hospitality and tourism students view software piracy? Asia Pacific Journal of Tourism Research 10(3):263-273.
    • (2005) Asia Pacific Journal of Tourism Research , vol.10 , Issue.3 , pp. 263-273
    • Law, R.1    Wong, D.2
  • 72
    • 47949125157 scopus 로고    scopus 로고
    • Iceland's net traffic plummets, following P2P raids
    • September 30, 2004, accessed 1 April, 2008
    • Leyden, J. 2004. Iceland's net traffic plummets, following P2P raids. The Register, September 30, 2004. http://www.theregister. co.uk/2004/09/30/p2p-raids_iceland/ (accessed 1 April, 2008).
    • (2004) The Register
    • Leyden, J.1
  • 74
    • 0030194196 scopus 로고    scopus 로고
    • Evaluating ethical decision making and computer use
    • Loch, K. D., and S. Cogner. 1996. Evaluating ethical decision making and computer use. Communications of the ACM 39(7):74-83.
    • (1996) Communications of the ACM , vol.39 , Issue.7 , pp. 74-83
    • Loch, K.D.1    Cogner, S.2
  • 75
    • 3242671556 scopus 로고
    • Software piracy: Is it related to the level of moral of judgment?
    • Longson, J., J. Thompson, and R. Reid. 1994. Software piracy: Is it related to the level of moral of judgment? Journal of Business Ethics 13(11):849-857.
    • (1994) Journal of Business Ethics , vol.13 , Issue.11 , pp. 849-857
    • Longson, J.1    Thompson, J.2    Reid, R.3
  • 76
    • 23044468066 scopus 로고    scopus 로고
    • Digitization, commodification, criminalization: The evolution of criminal copyright infringement and the importance of the willfulness requirement
    • Loren, L. P. 1999. Digitization, commodification, criminalization: The evolution of criminal copyright infringement and the importance of the willfulness requirement. Washington University Law Review 77:835-887.
    • (1999) Washington University Law Review , vol.77 , pp. 835-887
    • Loren, L.P.1
  • 77
    • 47949114633 scopus 로고    scopus 로고
    • Malhotra, Y. 1994. Controlling copyright infringements of intellectual property: The case of computer software. Journal of Systems Management 456/7, 32-25
    • Malhotra, Y. 1994. Controlling copyright infringements of intellectual property: The case of computer software. Journal of Systems Management 45(6/7): 32-25.
  • 78
    • 0023366168 scopus 로고
    • Electronic markets and electronic hierarchies
    • Malone, T., J. Yates, and R. Benjamin. 1987. Electronic markets and electronic hierarchies. Communications of the ACM 30(6):485-497.
    • (1987) Communications of the ACM , vol.30 , Issue.6 , pp. 485-497
    • Malone, T.1    Yates, J.2    Benjamin, R.3
  • 79
    • 0034412999 scopus 로고    scopus 로고
    • Which countries protect intellectual property
    • Marron, D. and D. Steel. 2000. Which countries protect intellectual property. Economic Inquiry 38(2): 159-174.
    • (2000) Economic Inquiry , vol.38 , Issue.2 , pp. 159-174
    • Marron, D.1    Steel, D.2
  • 80
    • 55249097295 scopus 로고
    • Four ethical issues of the information age
    • Mason, O. 1986. Four ethical issues of the information age. MIS Quarterly 10(1):5-12.
    • (1986) MIS Quarterly , vol.10 , Issue.1 , pp. 5-12
    • Mason, O.1
  • 81
    • 47949109744 scopus 로고    scopus 로고
    • Intellectual property theft and organized crime: The case of film piracy
    • McIllwain, S. J. 2005. Intellectual property theft and organized crime: The case of film piracy. Trends in Organized Crime 8(4): 15-39.
    • (2005) Trends in Organized Crime , vol.8 , Issue.4 , pp. 15-39
    • McIllwain, S.J.1
  • 83
    • 33845728874 scopus 로고    scopus 로고
    • Ethical decision making in software piracy: Initial development and test of a four component model
    • Moores, T., and C. Chang. 2006. Ethical decision making in software piracy: Initial development and test of a four component model. MIS Quarterly 30(1):167-180.
    • (2006) MIS Quarterly , vol.30 , Issue.1 , pp. 167-180
    • Moores, T.1    Chang, C.2
  • 84
    • 4344702911 scopus 로고    scopus 로고
    • A reversed context analysis of software piracy issues in Singapore
    • 4.1
    • Moores, T., and J. Dhaliwal. 2004. A reversed context analysis of software piracy issues in Singapore. Information and Management 4.1(8): 1037-1042.
    • (2004) Information and Management , Issue.8 , pp. 1037-1042
    • Moores, T.1    Dhaliwal, J.2
  • 85
    • 33646049765 scopus 로고    scopus 로고
    • The effect of national culture and economic wealth on global software piracy rates
    • Moores, T. 2003. The effect of national culture and economic wealth on global software piracy rates. Communications of the ACM 46(9):205-215.
    • (2003) Communications of the ACM , vol.46 , Issue.9 , pp. 205-215
    • Moores, T.1
  • 86
    • 0042223455 scopus 로고    scopus 로고
    • Software piracy: A view from Hong Kong
    • Moores, T., and G. Dhillon. 2000. Software piracy: A view from Hong Kong. Communications of the ACM 43(12):88-93.
    • (2000) Communications of the ACM , vol.43 , Issue.12 , pp. 88-93
    • Moores, T.1    Dhillon, G.2
  • 87
    • 0002103996 scopus 로고
    • The attitude of managers to be toward software piracy
    • Oz, E. 1990. The attitude of managers to be toward software piracy. ORMS Today 17(4):24-26.
    • (1990) ORMS Today , vol.17 , Issue.4 , pp. 24-26
    • Oz, E.1
  • 88
    • 0009947578 scopus 로고
    • Software: Intellectual property protection alternatives
    • Oz, E. 1995. Software: Intellectual property protection alternatives. Journal of Systems Management 46(4):50-56.
    • (1995) Journal of Systems Management , vol.46 , Issue.4 , pp. 50-56
    • Oz, E.1
  • 90
    • 0000802230 scopus 로고
    • The deterrent effect, and the perceived certainty and severity of punishment
    • Paternoster, R. 1987. The deterrent effect, and the perceived certainty and severity of punishment. Justice Quarterly 4(2):173-217.
    • (1987) Justice Quarterly , vol.4 , Issue.2 , pp. 173-217
    • Paternoster, R.1
  • 91
    • 47949087582 scopus 로고    scopus 로고
    • Paternoster, R., and S. Simpson. 1994. A rational choice theory of corporate crime. In Routine activity and rational clioice, eds. R. Clarke and M. Felson, pp. 37-58. New Brunswick, NJ: Transaction.
    • Paternoster, R., and S. Simpson. 1994. A rational choice theory of corporate crime. In Routine activity and rational clioice, eds. R. Clarke and M. Felson, pp. 37-58. New Brunswick, NJ: Transaction.
  • 92
    • 3042985713 scopus 로고    scopus 로고
    • Software piracy and computer using professionals: A survey
    • Peace, A. G. 1997. Software piracy and computer using professionals: A survey. Journal of Computer Information Systems 38(1):94-100.
    • (1997) Journal of Computer Information Systems , vol.38 , Issue.1 , pp. 94-100
    • Peace, A.G.1
  • 94
    • 1542673951 scopus 로고    scopus 로고
    • Gender and general strain theory: A preliminary test of Broidy and Agnew's Gender GST hypotheses
    • Piquero, N. L., and M. D. Sealock. 2004. Gender and general strain theory: A preliminary test of Broidy and Agnew's Gender GST hypotheses. Justice Quarterly 21(1):125-158.
    • (2004) Justice Quarterly , vol.21 , Issue.1 , pp. 125-158
    • Piquero, N.L.1    Sealock, M.D.2
  • 95
    • 33745700246 scopus 로고    scopus 로고
    • Piracy over peer-to-peer based on personal networks
    • 221-23.1
    • Prasad, R. 2006. Piracy over peer-to-peer based on personal networks. Wireless Personal Communications 37(3-4):221-23.1.
    • (2006) Wireless Personal Communications , vol.37 , Issue.3-4
    • Prasad, R.1
  • 96
    • 0344943983 scopus 로고    scopus 로고
    • How many pirates should a software firm tolerate? An analysis of piracy protection on the diffusion of software
    • Prasad, A., and V. Mahajan. 2003. How many pirates should a software firm tolerate? An analysis of piracy protection on the diffusion of software. International Journal of Research in Marketing 20(4):337-353.
    • (2003) International Journal of Research in Marketing , vol.20 , Issue.4 , pp. 337-353
    • Prasad, A.1    Mahajan, V.2
  • 98
    • 0007391492 scopus 로고    scopus 로고
    • Software piracy among computing students-A Bruneian scenario
    • Rahim, M., A. Seyal, and M. N. A. Rahman. 1999. Software piracy among computing students-A Bruneian scenario. Computers and Education 32(4):301-321.
    • (1999) Computers and Education , vol.32 , Issue.4 , pp. 301-321
    • Rahim, M.1    Seyal, A.2    Rahman, M.N.A.3
  • 99
    • 0035637388 scopus 로고    scopus 로고
    • Shaping of moral intensity regarding software piracy among university students: Immediate community effects
    • Ramakrishna, H. V., R. B. Kini, and B. S. Vijayaraman. 2001. Shaping of moral intensity regarding software piracy among university students: Immediate community effects. Journal of Computer Information Systems 41(4):47-51.
    • (2001) Journal of Computer Information Systems , vol.41 , Issue.4 , pp. 47-51
    • Ramakrishna, H.V.1    Kini, R.B.2    Vijayaraman, B.S.3
  • 100
    • 1842661682 scopus 로고    scopus 로고
    • The politics of contraband: The honor economies of the warez scene
    • Renn, A. 2004. The politics of contraband: The honor economies of the warez scene. Journal of Socio Economics 33(3):359-374
    • (2004) Journal of Socio Economics , vol.33 , Issue.3 , pp. 359-374
    • Renn, A.1
  • 101
    • 0000342596 scopus 로고
    • Delinquency as the failure of personal and social control
    • Reiss, A., Jr. 1951. Delinquency as the failure of personal and social control. American Sociological Review 16(2): 196-207.
    • (1951) American Sociological Review , vol.16 , Issue.2 , pp. 196-207
    • Reiss Jr., A.1
  • 102
    • 32844471836 scopus 로고    scopus 로고
    • Software piracy and income inequality
    • Rodriguez, A. 2006. Software piracy and income inequality. Applied Economics Letters 13(2): 101-105.
    • (2006) Applied Economics Letters , vol.13 , Issue.2 , pp. 101-105
    • Rodriguez, A.1
  • 103
    • 0011532430 scopus 로고
    • Correlates of computer misuse: Data from a self reporting sample
    • Sacco, V. 1990. Correlates of computer misuse: Data from a self reporting sample. Behavior and Information Technology 9(5):353-369.
    • (1990) Behavior and Information Technology , vol.9 , Issue.5 , pp. 353-369
    • Sacco, V.1
  • 104
    • 0000627689 scopus 로고    scopus 로고
    • Intellectual property and the digital economy: Why the anti-circumvention regulations need to be revised
    • Samuelson, P. 1999. Intellectual property and the digital economy: Why the anti-circumvention regulations need to be revised. Berkeley Technology Law Journal 14(2):519-547.
    • (1999) Berkeley Technology Law Journal , vol.14 , Issue.2 , pp. 519-547
    • Samuelson, P.1
  • 105
    • 1942433797 scopus 로고    scopus 로고
    • Digital rights management (and, or, vs.) the law
    • Samuelson, P. 2003. Digital rights management (and, or, vs.) the law. Communications of the ACM 46(4):41-45.
    • (2003) Communications of the ACM , vol.46 , Issue.4 , pp. 41-45
    • Samuelson, P.1
  • 106
    • 0031630026 scopus 로고    scopus 로고
    • Its not really theft! Personal and workplace ethics that enable software piracy
    • Seale, D. A., Polakowski, M., and S. Schneider. 1998. Its not really theft! Personal and workplace ethics that enable software piracy. Behavior and Information Technology 17(1):27-40.
    • (1998) Behavior and Information Technology , vol.17 , Issue.1 , pp. 27-40
    • Seale, D.A.1    Polakowski, M.2    Schneider, S.3
  • 109
    • 47949094821 scopus 로고    scopus 로고
    • Student attitudes on software piracy and related issues of computer ethics
    • Siegfried, R. 2004. Student attitudes on software piracy and related issues of computer ethics. Ethics and Information Technology 6(4):215-222.
    • (2004) Ethics and Information Technology , vol.6 , Issue.4 , pp. 215-222
    • Siegfried, R.1
  • 111
    • 0030215265 scopus 로고    scopus 로고
    • Toward a profile of student software pirates
    • Sims, R., H. Cheng, and H. Teegen. 1996. Toward a profile of student software pirates. Journal of Business Ethics 15(8):839-849.
    • (1996) Journal of Business Ethics , vol.15 , Issue.8 , pp. 839-849
    • Sims, R.1    Cheng, H.2    Teegen, H.3
  • 112
    • 0002909731 scopus 로고
    • Marketing ethics: Sales professionals versus other marketing professionals
    • Singhapakdi, A., and S. Vitell. 1992. Marketing ethics: Sales professionals versus other marketing professionals. Journal of Personal Selling and Sales Management 12(2):27-39.
    • (1992) Journal of Personal Selling and Sales Management , vol.12 , Issue.2 , pp. 27-39
    • Singhapakdi, A.1    Vitell, S.2
  • 113
    • 0002961010 scopus 로고
    • The effect of demographic factors on attitudes toward software piracy
    • Solomon, S., and J. Obrien. 1990. The effect of demographic factors on attitudes toward software piracy. Journal of Computer Information Systems 30(3):45-55.
    • (1990) Journal of Computer Information Systems , vol.30 , Issue.3 , pp. 45-55
    • Solomon, S.1    Obrien, J.2
  • 114
    • 53349102510 scopus 로고
    • Key information liability issues facing managers: Software piracy, proprietary databases, and individual rights to privacy
    • Straub, D. 1990. Key information liability issues facing managers: Software piracy, proprietary databases, and individual rights to privacy. MIQ Quarterly 14(2): 143-156.
    • (1990) MIQ Quarterly , vol.14 , Issue.2 , pp. 143-156
    • Straub, D.1
  • 115
    • 0001354192 scopus 로고
    • The morality of software piracy: A cross cultural analysis
    • Swinyard, W., H. Rinne, and A. K. Kau. 1990. The morality of software piracy: A cross cultural analysis. Journal of Business Ethics 9(8): 655-664.
    • (1990) Journal of Business Ethics , vol.9 , Issue.8 , pp. 655-664
    • Swinyard, W.1    Rinne, H.2    Kau, A.K.3
  • 116
    • 0347035583 scopus 로고    scopus 로고
    • Understanding consumer ethical decision making with respect to purchase of pirated software
    • Tan, B. 2002. Understanding consumer ethical decision making with respect to purchase of pirated software. Journal of Consumer Marketing 19(2):96-111.
    • (2002) Journal of Consumer Marketing , vol.19 , Issue.2 , pp. 96-111
    • Tan, B.1
  • 117
    • 0032390710 scopus 로고    scopus 로고
    • How electronic publishers are protecting against piracy: Doubts about technical systems of protection
    • Tang, P. 1998. How electronic publishers are protecting against piracy: Doubts about technical systems of protection. The Information Society 14(1):19-31.
    • (1998) The Information Society , vol.14 , Issue.1 , pp. 19-31
    • Tang, P.1
  • 118
    • 21244497901 scopus 로고    scopus 로고
    • The effect of interpersonal influence on softlifting intention and behavior
    • Tang, J., and C. Farn. 2005. The effect of interpersonal influence on softlifting intention and behavior. Journal of Business Ethics 56(2): 149-161.
    • (2005) Journal of Business Ethics , vol.56 , Issue.2 , pp. 149-161
    • Tang, J.1    Farn, C.2
  • 119
    • 84973740128 scopus 로고
    • A comparative examination of attitudes toward software piracy among business professors and executives
    • Taylor, G. S., and J. P. Shim. 1993. A comparative examination of attitudes toward software piracy among business professors and executives. Human Relations 46(4):419-433.
    • (1993) Human Relations , vol.46 , Issue.4 , pp. 419-433
    • Taylor, G.S.1    Shim, J.P.2
  • 120
    • 0032223746 scopus 로고    scopus 로고
    • Testing an ethical decision making theory: The case of softlifting
    • Thong, J., and C. S. Yap. 1998. Testing an ethical decision making theory: The case of softlifting. Journal of Management Information Systems 15(1):213-237.
    • (1998) Journal of Management Information Systems , vol.15 , Issue.1 , pp. 213-237
    • Thong, J.1    Yap, C.S.2
  • 121
    • 47949083158 scopus 로고    scopus 로고
    • U.S. Copyright Law. 1993. Copyright Law of the United States of America and related laws contained in article 17 of the United States Code-Circular 92. http://www.copyright.gov/title17/92chap10. html.
    • U.S. Copyright Law. 1993. Copyright Law of the United States of America and related laws contained in article 17 of the United States Code-Circular 92. http://www.copyright.gov/title17/92chap10. html.
  • 122
    • 0035217408 scopus 로고    scopus 로고
    • Considerations in ethical decision making and software piracy
    • Wagner, S., and L. Sanders. 2001. Considerations in ethical decision making and software piracy. Journal of Business Ethics 29(1-2) : 161-167.
    • (2001) Journal of Business Ethics , vol.29 , Issue.1-2 , pp. 161-167
    • Wagner, S.1    Sanders, L.2
  • 124
    • 25444485713 scopus 로고    scopus 로고
    • Purchasing pirated software: An initial examination of Chinese consumers
    • Wang, F., H. Zang, H. Zang, and M. Ouyang. 2005. Purchasing pirated software: An initial examination of Chinese consumers Journal of Consumer Marketing 22(6): 340-351.
    • (2005) Journal of Consumer Marketing , vol.22 , Issue.6 , pp. 340-351
    • Wang, F.1    Zang, H.2    Zang, H.3    Ouyang, M.4
  • 125
    • 0036897636 scopus 로고    scopus 로고
    • Dealing with piracy: Intellectual asset management in software and music
    • Wijk, J. V. 2002. Dealing with piracy: Intellectual asset management in software and music. European Management Journal 20(6):689-698.
    • (2002) European Management Journal , vol.20 , Issue.6 , pp. 689-698
    • Wijk, J.V.1
  • 126
    • 0007350161 scopus 로고
    • A study of unauthorized software copying among post secondary students in Hong Kong
    • Wong, G. 1990. A study of unauthorized software copying among post secondary students in Hong Kong. Australian Computer Journal 22(4): 114-122.
    • (1990) Australian Computer Journal , vol.22 , Issue.4 , pp. 114-122
    • Wong, G.1
  • 128
    • 35449007383 scopus 로고    scopus 로고
    • Software piracy among accounting students: A longitudinal comparison of changes and sensitivity
    • Wooley, D., and M. Eining. 2006. Software piracy among accounting students: A longitudinal comparison of changes and sensitivity. Journal of Information Systems 20(1):49-63.
    • (2006) Journal of Information Systems , vol.20 , Issue.1 , pp. 49-63
    • Wooley, D.1    Eining, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.