-
1
-
-
0031161643
-
Software copyright infringement: An exploratory study of the effects of individual and peer beliefs
-
Al Jabri, I., and A. Gader. 1997. Software copyright infringement: An exploratory study of the effects of individual and peer beliefs. Omega: The International Journal of Management Science 25(3):335-344.
-
(1997)
Omega: The International Journal of Management Science
, vol.25
, Issue.3
, pp. 335-344
-
-
Al Jabri, I.1
Gader, A.2
-
2
-
-
30344460323
-
Digital piracy: Factors that influence attitudes toward behavior
-
Al-Rafee, S., and P. T. Cronan. 2006. Digital piracy: Factors that influence attitudes toward behavior. Journal of Business Ethics 63(3):237-259.
-
(2006)
Journal of Business Ethics
, vol.63
, Issue.3
, pp. 237-259
-
-
Al-Rafee, S.1
Cronan, P.T.2
-
3
-
-
31044447102
-
Online software distribution with out enforcing copy protection as a strategic weapon
-
Altinkemer, K., J. Guan, and A. Sahin. 2005. Online software distribution with out enforcing copy protection as a strategic weapon. Information Systems and e-Business Management 3(4):343-361.
-
(2005)
Information Systems and e-Business Management
, vol.3
, Issue.4
, pp. 343-361
-
-
Altinkemer, K.1
Guan, J.2
Sahin, A.3
-
4
-
-
32544440571
-
The relationship between copyright software protection and piracy: Evidence from Europe
-
Andres, A. R. 2006. The relationship between copyright software protection and piracy: Evidence from Europe. European Journal of Law and Economics 21(1):29-51.
-
(2006)
European Journal of Law and Economics
, vol.21
, Issue.1
, pp. 29-51
-
-
Andres, A.R.1
-
6
-
-
33745890312
-
Global software piracy: Can economic factors alone explain the trend?
-
Bagchi, K., P. Kirs, and P. Cerveny. 2006. Global software piracy: Can economic factors alone explain the trend? Communications of the ACM 40(6):70-77.
-
(2006)
Communications of the ACM
, vol.40
, Issue.6
, pp. 70-77
-
-
Bagchi, K.1
Kirs, P.2
Cerveny, P.3
-
7
-
-
32044442736
-
Lobbying and commercial software piracy
-
Banerjee, D. 2006. Lobbying and commercial software piracy. European Journal of Political Economy 22(1):139-155.
-
(2006)
European Journal of Political Economy
, vol.22
, Issue.1
, pp. 139-155
-
-
Banerjee, D.1
-
8
-
-
84867973099
-
Software piracy: A strategic analysis and policy instruments
-
Banerjee, D. 2003. Software piracy: A strategic analysis and policy instruments. International Journal of Industrial Organization 21(1): 197-217.
-
(2003)
International Journal of Industrial Organization
, vol.21
, Issue.1
, pp. 197-217
-
-
Banerjee, D.1
-
9
-
-
0000802810
-
Individual difference variables, ethical judgments, and ethical behavioral intentions
-
Bass, K., and T. Barnett. 1999. Individual difference variables, ethical judgments, and ethical behavioral intentions. Business Ethics Quarterly 9(2): 183-205.
-
(1999)
Business Ethics Quarterly
, vol.9
, Issue.2
, pp. 183-205
-
-
Bass, K.1
Barnett, T.2
-
10
-
-
33344466705
-
Influences on software piracy: Evidence from the various United States
-
Bezmen, T., and C. Depken. 2006. Influences on software piracy: Evidence from the various United States. Economics Letters 90(3):356-361.
-
(2006)
Economics Letters
, vol.90
, Issue.3
, pp. 356-361
-
-
Bezmen, T.1
Depken, C.2
-
11
-
-
33745847545
-
Impact of legal threats on online music sharing activity: An analysis of music industry legal actions
-
Bhattacharjee S., R. Gopal, K. Lertwachara, and J. R. Marsden. 2006. Impact of legal threats on online music sharing activity: An analysis of music industry legal actions. Journal of Law and Economics 49(1):91-114.
-
(2006)
Journal of Law and Economics
, vol.49
, Issue.1
, pp. 91-114
-
-
Bhattacharjee, S.1
Gopal, R.2
Lertwachara, K.3
Marsden, J.R.4
-
12
-
-
33745844686
-
Consumer search and retailer strategies in the presence of online music sharing
-
Bhattacharjee S., R. Gopal, K. Lertwachara, and J. R. Marsden. 2006. Consumer search and retailer strategies in the presence of online music sharing. Journal of Management Information Systems 23(1): 129-159.
-
(2006)
Journal of Management Information Systems
, vol.23
, Issue.1
, pp. 129-159
-
-
Bhattacharjee, S.1
Gopal, R.2
Lertwachara, K.3
Marsden, J.R.4
-
13
-
-
33747769915
-
Whateverhappened to Payola? An empirical analysis of online music sharing
-
Bhattacharjee S., R. Gopal, K. Lertwachara, and J. R. Marsden. 2004. Whateverhappened to Payola? An empirical analysis of online music sharing. Decision Support Systems 42(1): 104-120.
-
(2004)
Decision Support Systems
, vol.42
, Issue.1
, pp. 104-120
-
-
Bhattacharjee, S.1
Gopal, R.2
Lertwachara, K.3
Marsden, J.R.4
-
15
-
-
3042571365
-
A behavioral model of digital music piracy
-
Bhattacharjee, S., R. Gopal, L. Sanders, M. Agarwal, and S. Wagner. 2002. A behavioral model of digital music piracy. Journal of Organizational Computing and Electronic Commerce 14(2):89-105.
-
(2002)
Journal of Organizational Computing and Electronic Commerce
, vol.14
, Issue.2
, pp. 89-105
-
-
Bhattacharjee, S.1
Gopal, R.2
Sanders, L.3
Agarwal, M.4
Wagner, S.5
-
16
-
-
33745903123
-
Security through legality
-
Bono, S., A. Rubin, A. Stubbelfield, and M. Green. 2006. Security through legality. Communications of the ACM 40(6):41-45.
-
(2006)
Communications of the ACM
, vol.40
, Issue.6
, pp. 41-45
-
-
Bono, S.1
Rubin, A.2
Stubbelfield, A.3
Green, M.4
-
19
-
-
55849097846
-
-
BSA, accessed April 1, 2008
-
BSA. 2007. Fourth annual BSA & IDC global software piracy study. http://w3.bsa.org/globalstudy// upload/ 2007-Global-Piracy-Study-EN. pdf (accessed April 1, 2008).
-
(2007)
Fourth annual BSA & IDC global software piracy study
-
-
-
20
-
-
47949114340
-
-
BSA and IDC. 2004. First annual BSA & IDC global software piracy study.http://www.caast.com/resources/IDC_GlobaLSoftware -Piracy_Study_2004. pdf (accessed April 1, 2008).
-
BSA and IDC. 2004. First annual BSA & IDC global software piracy study.http://www.caast.com/resources/IDC_GlobaLSoftware -Piracy_Study_2004. pdf (accessed April 1, 2008).
-
-
-
-
21
-
-
85048668002
-
Are you a software thief, but don't know it
-
November 1, 1997, accessed April 1, 2008
-
Caborn, A. 1997. Are you a software thief, but don't know it. Management Today, November 1, 1997. http://www.managementtoday.co.uk /search/article/410979/uk-software-thief-dont-know-it/ (accessed April 1, 2008).
-
(1997)
Management Today
-
-
Caborn, A.1
-
22
-
-
33750922314
-
Ethics in information technology and software use
-
Calluzzo, V., and C. Cante. 2004. Ethics in information technology and software use. Journal of Business Ethics 51(3):301-312.
-
(2004)
Journal of Business Ethics
, vol.51
, Issue.3
, pp. 301-312
-
-
Calluzzo, V.1
Cante, C.2
-
23
-
-
29444441039
-
Managing piracy: Pricing and sampling strategies for digital experience goods in vertically segmented markets
-
Chellappa, R. K., and S. Shivendu. 2005. Managing piracy: pricing and sampling strategies for digital experience goods in vertically segmented markets. Information Systems Research, 16(4):400-417.
-
(2005)
Information Systems Research
, vol.16
, Issue.4
, pp. 400-417
-
-
Chellappa, R.K.1
Shivendu, S.2
-
25
-
-
17444428885
-
The antecedents of music piracy: Attitudes and intentions
-
Chiou, J., C. Huang, and H. Lee. 2005. The antecedents of music piracy: Attitudes and intentions. Journal of Business Ethics 57(2): 161-174.
-
(2005)
Journal of Business Ethics
, vol.57
, Issue.2
, pp. 161-174
-
-
Chiou, J.1
Huang, C.2
Lee, H.3
-
26
-
-
0001865968
-
Factors influencing software piracy: Implications for accountants
-
Christinsen, A., and M. Eining. 1991. Factors influencing software piracy: Implications for accountants. Journal of Information Systems 5(1):67-80.
-
(1991)
Journal of Information Systems
, vol.5
, Issue.1
, pp. 67-80
-
-
Christinsen, A.1
Eining, M.2
-
27
-
-
4043071717
-
Hot products: Understanding, anticipating and reducing the demand for stolen goods
-
Paper 112, accessed October 15, 2007
-
Clarke, R. 1999. Hot products: Understanding, anticipating and reducing the demand for stolen goods. United Kingdom Police Research Series (Paper 112). http://www.crimereduction.gov.uk /stolengoods1.htm (accessed October 15, 2007).
-
(1999)
United Kingdom Police Research Series
-
-
Clarke, R.1
-
28
-
-
47949093256
-
-
Clarke, R., and M. Felson. 1993. Criminology, routine activity and rational choice - An introduction. In Routine activity and rational choice, eds. R. Clarke and M. Felson, pp. 1-13. New Brunswick, NJ: Transaction.
-
Clarke, R., and M. Felson. 1993. Criminology, routine activity and rational choice - An introduction. In Routine activity and rational choice, eds. R. Clarke and M. Felson, pp. 1-13. New Brunswick, NJ: Transaction.
-
-
-
-
29
-
-
0001244215
-
Modeling offenders decisions: A framework for policy & research
-
eds. M. Tonry and N. Morris
-
Clarke, R. V., and D. B. Cornish. 1985. Modeling offenders decisions: A framework for policy & research. In Crime & justice: An annual review of research, eds. M. Tonry and N. Morris, vol. 6, pp. 147-185.
-
(1985)
Crime & justice: An annual review of research
, vol.6
, pp. 147-185
-
-
Clarke, R.V.1
Cornish, D.B.2
-
30
-
-
0000204509
-
Social change and crime rates: A routine activity approach
-
Cohen, L. E., and M. Felson. 1979. Social change and crime rates: A routine activity approach. American Sociological Review 44(4):588-608.
-
(1979)
American Sociological Review
, vol.44
, Issue.4
, pp. 588-608
-
-
Cohen, L.E.1
Felson, M.2
-
31
-
-
84934563431
-
Toward an integrated theory of white collar crime
-
Coleman, J. W. 1987. Toward an integrated theory of white collar crime. American Journal of Sociology 93(2):406-439.
-
(1987)
American Journal of Sociology
, vol.93
, Issue.2
, pp. 406-439
-
-
Coleman, J.W.1
-
32
-
-
0001020817
-
Software piracy: An analysis of protection strategies
-
Conner, K., and R. Rummelt. 1991. Software piracy: An analysis of protection strategies. Management Science 37(2):125-139.
-
(1991)
Management Science
, vol.37
, Issue.2
, pp. 125-139
-
-
Conner, K.1
Rummelt, R.2
-
34
-
-
33745903904
-
Computer piracy, crime and IS misuse at the university
-
Cronan, T., B. Foltz, and T. Jones. 2006. Computer piracy, crime and IS misuse at the university. Communications of the ACM 49(6):85-90.
-
(2006)
Communications of the ACM
, vol.49
, Issue.6
, pp. 85-90
-
-
Cronan, T.1
Foltz, B.2
Jones, T.3
-
35
-
-
0041006432
-
Anew scale of social desirability independent of psychopathology
-
Crowne, D. P., and D. Marlowe. 1960. Anew scale of social desirability independent of psychopathology. Journal of Consulting Psychology 24(4):349-354.
-
(1960)
Journal of Consulting Psychology
, vol.24
, Issue.4
, pp. 349-354
-
-
Crowne, D.P.1
Marlowe, D.2
-
36
-
-
1542756559
-
Social construct and the propensity for software piracy
-
Depken, C., and L. Simmons. 2004. Social construct and the propensity for software piracy. Applied Economics Letters 11(2):97-100.
-
(2004)
Applied Economics Letters
, vol.11
, Issue.2
, pp. 97-100
-
-
Depken, C.1
Simmons, L.2
-
37
-
-
0000245080
-
Ethical decision making: A review of empirical literature
-
Ford, R. C., and W. D. Richardson. 1994. Ethical decision making: A review of empirical literature. Journal of Business Ethics 13(3):205-221.
-
(1994)
Journal of Business Ethics
, vol.13
, Issue.3
, pp. 205-221
-
-
Ford, R.C.1
Richardson, W.D.2
-
38
-
-
33745932103
-
An empirical study of software piracy among tertiary institutions in Singapore
-
Gan, L., and H. Koh. 2006. An empirical study of software piracy among tertiary institutions in Singapore. Information and Management 43(5):640-649.
-
(2006)
Information and Management
, vol.43
, Issue.5
, pp. 640-649
-
-
Gan, L.1
Koh, H.2
-
39
-
-
0346403985
-
Copyright control over new technologies of dissemination
-
Ginsburg, J. C. 2001. Copyright control over new technologies of dissemination. Columbia Law Review 101(7):1613-1647.
-
(2001)
Columbia Law Review
, vol.101
, Issue.7
, pp. 1613-1647
-
-
Ginsburg, J.C.1
-
40
-
-
77953283315
-
Software piracy: Estimation of lost sales and the impact of software diffusion
-
Givon, M., V. Mahajan, and E. Muller. 1995. Software piracy: Estimation of lost sales and the impact of software diffusion. Journal of Marketing 59(1):29-37.
-
(1995)
Journal of Marketing
, vol.59
, Issue.1
, pp. 29-37
-
-
Givon, M.1
Mahajan, V.2
Muller, E.3
-
41
-
-
0003390231
-
Assessing the relationship between user-based market share and unit sales-based market share for pirated software brands in competitive markets
-
Givon, M., V. Mahajan, and, E. Muller. 1997. Assessing the relationship between user-based market share and unit sales-based market share for pirated software brands in competitive markets. Technological Forecasting & Social Change 55(2):131-144.
-
(1997)
Technological Forecasting & Social Change
, vol.55
, Issue.2
, pp. 131-144
-
-
Givon, M.1
Mahajan, V.2
Muller, E.3
-
42
-
-
0030295452
-
Situational determinants of software piracy: An equity theory perspective
-
Glass, R., and W. Wood. 1996. Situational determinants of software piracy: An equity theory perspective. Journal of Business Ethics 15(11):1189-1198.
-
(1996)
Journal of Business Ethics
, vol.15
, Issue.11
, pp. 1189-1198
-
-
Glass, R.1
Wood, W.2
-
43
-
-
33646542629
-
What motivates software crackers?
-
Goods, S., and S. Cruise. 2006. What motivates software crackers? Journal of Business Ethics 65(2):,173-201.
-
(2006)
Journal of Business Ethics
, vol.65
, Issue.2
, pp. 173-201
-
-
Goods, S.1
Cruise, S.2
-
45
-
-
0032245475
-
International software piracy: An analysis of key issues and impacts
-
Gopal, R., and L. Sanders. 1998. International software piracy: An analysis of key issues and impacts. Information Systems Research 9(4): 380-397.
-
(1998)
Information Systems Research
, vol.9
, Issue.4
, pp. 380-397
-
-
Gopal, R.1
Sanders, L.2
-
46
-
-
0002481588
-
Software piracy: You can't, get blood out of a turnip
-
Gopal, R., and L. Sanders. 2000. Software piracy: You can't, get blood out of a turnip. Communications of the ACM 43(9):84-89.
-
(2000)
Communications of the ACM
, vol.43
, Issue.9
, pp. 84-89
-
-
Gopal, R.1
Sanders, L.2
-
48
-
-
84935667238
-
Conscience, significant others and rational choice-Extending the deterrence model
-
Grasmick, H., and R. Bursik. 1990. Conscience, significant others and rational choice-Extending the deterrence model. Law and Society Review 24(3):837-862.
-
(1990)
Law and Society Review
, vol.24
, Issue.3
, pp. 837-862
-
-
Grasmick, H.1
Bursik, R.2
-
49
-
-
21844481351
-
The historical variability of the age-crime relationship
-
Greenberg, D. F. 1994. The historical variability of the age-crime relationship. Journal of Quantitative Criminology 10(4):361-373.
-
(1994)
Journal of Quantitative Criminology
, vol.10
, Issue.4
, pp. 361-373
-
-
Greenberg, D.F.1
-
50
-
-
12744267843
-
To pirate or not to pirate: A comparative study of the ethical versus other influences on consumer's software acquisition mode decision
-
Gupta, P., S. Gould, and B. Pola. 2004. To pirate or not to pirate: A comparative study of the ethical versus other influences on consumer's software acquisition mode decision. Journal of Business Ethics 55(3):255-274.
-
(2004)
Journal of Business Ethics
, vol.55
, Issue.3
, pp. 255-274
-
-
Gupta, P.1
Gould, S.2
Pola, B.3
-
51
-
-
1242308738
-
Computer crime and abuse by IS employees
-
Harrington, S. 1995. Computer crime and abuse by IS employees. Journal of Systems Management 46(2):6-11.
-
(1995)
Journal of Systems Management
, vol.46
, Issue.2
, pp. 6-11
-
-
Harrington, S.1
-
52
-
-
3042661790
-
The effect of piracy on the market penetration of subscription software
-
Haruvy, E., V. Mahajan, and A. Prasad 2004. The effect of piracy on the market penetration of subscription software. Journal of Business 77(2):581-609.
-
(2004)
Journal of Business
, vol.77
, Issue.2
, pp. 581-609
-
-
Haruvy, E.1
Mahajan, V.2
Prasad, A.3
-
54
-
-
84856980866
-
Piracy stats don't add up
-
November 7, 24897,20713160-15306,00. html accessed October 16, 2007
-
Hayes, S. 2006. Piracy stats don't add up. Australian IT, November 7, 2006. http://www.australianit.news.com.au/story/0,24897,20713160-15306,00. html (accessed October 16 2007).
-
(2006)
Australian IT
-
-
Hayes, S.1
-
55
-
-
85044912937
-
Digital piracy: Assessing the contributions of an integrated self control theory and social learning theory using structural equation modeling
-
Higgins G. E., B. D. Fell, and A. L. Wilson. 2006. Digital piracy: Assessing the contributions of an integrated self control theory and social learning theory using structural equation modeling. Criminal Justice Studies 19(1): 3-22.
-
(2006)
Criminal Justice Studies
, vol.19
, Issue.1
, pp. 3-22
-
-
Higgins, G.E.1
Fell, B.D.2
Wilson, A.L.3
-
56
-
-
11144230997
-
Can low self-control help with the understanding of the software piracy problem?
-
Higgins, G. E. 2004. Can low self-control help with the understanding of the software piracy problem? Deviant Behavior 26(1): 1-24.
-
(2004)
Deviant Behavior
, vol.26
, Issue.1
, pp. 1-24
-
-
Higgins, G.E.1
-
57
-
-
84996223978
-
Correlates of Internet, software piracy
-
Hinduja, S. 2001. Correlates of Internet, software piracy. Journal of Contemporary Criminal Justice 17(4):369-382.
-
(2001)
Journal of Contemporary Criminal Justice
, vol.17
, Issue.4
, pp. 369-382
-
-
Hinduja, S.1
-
58
-
-
12744275983
-
Trends and patterns among online software pirates
-
Hinduja, S. 2003. Trends and patterns among online software pirates. Ethics and Information Technology 5(1):49-61.
-
(2003)
Ethics and Information Technology
, vol.5
, Issue.1
, pp. 49-61
-
-
Hinduja, S.1
-
59
-
-
0003991890
-
-
first edition, Berkeley: University of California Press
-
Hirschi, T. 1969. Causes of delinquency (first edition). Berkeley: University of California Press.
-
(1969)
Causes of delinquency
-
-
Hirschi, T.1
-
60
-
-
85001578690
-
Software asset management: Analysis, development and implementation
-
Holsing, N., and D. Yen. 1999. Software asset management: Analysis, development and implementation. Information Resources Management Journal 12(3): 14-27.
-
(1999)
Information Resources Management Journal
, vol.12
, Issue.3
, pp. 14-27
-
-
Holsing, N.1
Yen, D.2
-
61
-
-
85008063188
-
Steal this software and this DVD...and this book, and this handbag, and this car [Intellectual property theft]
-
Hood, M. 2005. Steal this software and this DVD...and this book, and this handbag, and this car [Intellectual property theft]. Spectrum IEEE 42(6):52-53.
-
(2005)
Spectrum IEEE
, vol.42
, Issue.6
, pp. 52-53
-
-
Hood, M.1
-
62
-
-
0034238348
-
The impact of national culture on software piracy
-
Husted, B. 2000. The impact of national culture on software piracy. Journal of Business Ethics 26(3):197-211.
-
(2000)
Journal of Business Ethics
, vol.26
, Issue.3
, pp. 197-211
-
-
Husted, B.1
-
63
-
-
9144264974
-
-
International Planning and Research Corporation, Washington DC: Business Software Alliance
-
International Planning and Research Corporation. 2003. Eighth annual BSA global software piracy study. Washington DC: Business Software Alliance.
-
(2003)
Eighth annual BSA global software piracy study
-
-
-
64
-
-
0141503248
-
Network externalities, price discrimination and profitable piracy
-
King, S., and R. Lampe. 2003. Network externalities, price discrimination and profitable piracy. Information Economics and Policy 15(3):271-290.
-
(2003)
Information Economics and Policy
, vol.15
, Issue.3
, pp. 271-290
-
-
King, S.1
Lampe, R.2
-
65
-
-
4043076317
-
Shaping of moral intensity: A comparison between Thailand and US students
-
Kini, R., H. Ramakrishna, and B. Vijayaraman. 2004. Shaping of moral intensity: A comparison between Thailand and US students. Journal of Business Ethics 49(1):91-104.
-
(2004)
Journal of Business Ethics
, vol.49
, Issue.1
, pp. 91-104
-
-
Kini, R.1
Ramakrishna, H.2
Vijayaraman, B.3
-
66
-
-
0037276453
-
An exploratory study of moral intensity regarding software piracy of students in Thailand
-
Kini, R., H. Ramakrishna, and B. Vijayaraman. 2003. An exploratory study of moral intensity regarding software piracy of students in Thailand. Behavior and Information Technology 22(1):63-70.
-
(2003)
Behavior and Information Technology
, vol.22
, Issue.1
, pp. 63-70
-
-
Kini, R.1
Ramakrishna, H.2
Vijayaraman, B.3
-
67
-
-
23044520001
-
An empirical study of software piracy and moral intensity among university students
-
Kini, R., A. Rominger, and B. Vijayaraman. 2000. An empirical study of software piracy and moral intensity among university students. Journal of Computer Information Systems 40(3):62-73.
-
(2000)
Journal of Computer Information Systems
, vol.40
, Issue.3
, pp. 62-73
-
-
Kini, R.1
Rominger, A.2
Vijayaraman, B.3
-
68
-
-
0039686012
-
Software piracy and its legal implications
-
Kohen, C., and J. Im. 1997. Software piracy and its legal implications. Information and Management 31(5):265-272.
-
(1997)
Information and Management
, vol.31
, Issue.5
, pp. 265-272
-
-
Kohen, C.1
Im, J.2
-
69
-
-
0040436852
-
Development and validation of an ethical computer self efficacy measure: The case of softlifting
-
Kuo, F., and M. H. Hsu. 2001. Development and validation of an ethical computer self efficacy measure: The case of softlifting. Journal of Business Ethics 32(4):299-315.
-
(2001)
Journal of Business Ethics
, vol.32
, Issue.4
, pp. 299-315
-
-
Kuo, F.1
Hsu, M.H.2
-
70
-
-
30344465179
-
An empirical, study of software piracy
-
Lau, E. K. W. 2003. An empirical, study of software piracy. Business Ethics: A European Review 12(3):233-245.
-
(2003)
Business Ethics: A European Review
, vol.12
, Issue.3
, pp. 233-245
-
-
Lau, E.K.W.1
-
71
-
-
33644620505
-
How do hospitality and tourism students view software piracy?
-
Law, R., and D. Wong. 2005. How do hospitality and tourism students view software piracy? Asia Pacific Journal of Tourism Research 10(3):263-273.
-
(2005)
Asia Pacific Journal of Tourism Research
, vol.10
, Issue.3
, pp. 263-273
-
-
Law, R.1
Wong, D.2
-
72
-
-
47949125157
-
Iceland's net traffic plummets, following P2P raids
-
September 30, 2004, accessed 1 April, 2008
-
Leyden, J. 2004. Iceland's net traffic plummets, following P2P raids. The Register, September 30, 2004. http://www.theregister. co.uk/2004/09/30/p2p-raids_iceland/ (accessed 1 April, 2008).
-
(2004)
The Register
-
-
Leyden, J.1
-
74
-
-
0030194196
-
Evaluating ethical decision making and computer use
-
Loch, K. D., and S. Cogner. 1996. Evaluating ethical decision making and computer use. Communications of the ACM 39(7):74-83.
-
(1996)
Communications of the ACM
, vol.39
, Issue.7
, pp. 74-83
-
-
Loch, K.D.1
Cogner, S.2
-
75
-
-
3242671556
-
Software piracy: Is it related to the level of moral of judgment?
-
Longson, J., J. Thompson, and R. Reid. 1994. Software piracy: Is it related to the level of moral of judgment? Journal of Business Ethics 13(11):849-857.
-
(1994)
Journal of Business Ethics
, vol.13
, Issue.11
, pp. 849-857
-
-
Longson, J.1
Thompson, J.2
Reid, R.3
-
76
-
-
23044468066
-
Digitization, commodification, criminalization: The evolution of criminal copyright infringement and the importance of the willfulness requirement
-
Loren, L. P. 1999. Digitization, commodification, criminalization: The evolution of criminal copyright infringement and the importance of the willfulness requirement. Washington University Law Review 77:835-887.
-
(1999)
Washington University Law Review
, vol.77
, pp. 835-887
-
-
Loren, L.P.1
-
77
-
-
47949114633
-
-
Malhotra, Y. 1994. Controlling copyright infringements of intellectual property: The case of computer software. Journal of Systems Management 456/7, 32-25
-
Malhotra, Y. 1994. Controlling copyright infringements of intellectual property: The case of computer software. Journal of Systems Management 45(6/7): 32-25.
-
-
-
-
79
-
-
0034412999
-
Which countries protect intellectual property
-
Marron, D. and D. Steel. 2000. Which countries protect intellectual property. Economic Inquiry 38(2): 159-174.
-
(2000)
Economic Inquiry
, vol.38
, Issue.2
, pp. 159-174
-
-
Marron, D.1
Steel, D.2
-
80
-
-
55249097295
-
Four ethical issues of the information age
-
Mason, O. 1986. Four ethical issues of the information age. MIS Quarterly 10(1):5-12.
-
(1986)
MIS Quarterly
, vol.10
, Issue.1
, pp. 5-12
-
-
Mason, O.1
-
81
-
-
47949109744
-
Intellectual property theft and organized crime: The case of film piracy
-
McIllwain, S. J. 2005. Intellectual property theft and organized crime: The case of film piracy. Trends in Organized Crime 8(4): 15-39.
-
(2005)
Trends in Organized Crime
, vol.8
, Issue.4
, pp. 15-39
-
-
McIllwain, S.J.1
-
83
-
-
33845728874
-
Ethical decision making in software piracy: Initial development and test of a four component model
-
Moores, T., and C. Chang. 2006. Ethical decision making in software piracy: Initial development and test of a four component model. MIS Quarterly 30(1):167-180.
-
(2006)
MIS Quarterly
, vol.30
, Issue.1
, pp. 167-180
-
-
Moores, T.1
Chang, C.2
-
84
-
-
4344702911
-
A reversed context analysis of software piracy issues in Singapore
-
4.1
-
Moores, T., and J. Dhaliwal. 2004. A reversed context analysis of software piracy issues in Singapore. Information and Management 4.1(8): 1037-1042.
-
(2004)
Information and Management
, Issue.8
, pp. 1037-1042
-
-
Moores, T.1
Dhaliwal, J.2
-
85
-
-
33646049765
-
The effect of national culture and economic wealth on global software piracy rates
-
Moores, T. 2003. The effect of national culture and economic wealth on global software piracy rates. Communications of the ACM 46(9):205-215.
-
(2003)
Communications of the ACM
, vol.46
, Issue.9
, pp. 205-215
-
-
Moores, T.1
-
86
-
-
0042223455
-
Software piracy: A view from Hong Kong
-
Moores, T., and G. Dhillon. 2000. Software piracy: A view from Hong Kong. Communications of the ACM 43(12):88-93.
-
(2000)
Communications of the ACM
, vol.43
, Issue.12
, pp. 88-93
-
-
Moores, T.1
Dhillon, G.2
-
87
-
-
0002103996
-
The attitude of managers to be toward software piracy
-
Oz, E. 1990. The attitude of managers to be toward software piracy. ORMS Today 17(4):24-26.
-
(1990)
ORMS Today
, vol.17
, Issue.4
, pp. 24-26
-
-
Oz, E.1
-
88
-
-
0009947578
-
Software: Intellectual property protection alternatives
-
Oz, E. 1995. Software: Intellectual property protection alternatives. Journal of Systems Management 46(4):50-56.
-
(1995)
Journal of Systems Management
, vol.46
, Issue.4
, pp. 50-56
-
-
Oz, E.1
-
90
-
-
0000802230
-
The deterrent effect, and the perceived certainty and severity of punishment
-
Paternoster, R. 1987. The deterrent effect, and the perceived certainty and severity of punishment. Justice Quarterly 4(2):173-217.
-
(1987)
Justice Quarterly
, vol.4
, Issue.2
, pp. 173-217
-
-
Paternoster, R.1
-
91
-
-
47949087582
-
-
Paternoster, R., and S. Simpson. 1994. A rational choice theory of corporate crime. In Routine activity and rational clioice, eds. R. Clarke and M. Felson, pp. 37-58. New Brunswick, NJ: Transaction.
-
Paternoster, R., and S. Simpson. 1994. A rational choice theory of corporate crime. In Routine activity and rational clioice, eds. R. Clarke and M. Felson, pp. 37-58. New Brunswick, NJ: Transaction.
-
-
-
-
92
-
-
3042985713
-
Software piracy and computer using professionals: A survey
-
Peace, A. G. 1997. Software piracy and computer using professionals: A survey. Journal of Computer Information Systems 38(1):94-100.
-
(1997)
Journal of Computer Information Systems
, vol.38
, Issue.1
, pp. 94-100
-
-
Peace, A.G.1
-
94
-
-
1542673951
-
Gender and general strain theory: A preliminary test of Broidy and Agnew's Gender GST hypotheses
-
Piquero, N. L., and M. D. Sealock. 2004. Gender and general strain theory: A preliminary test of Broidy and Agnew's Gender GST hypotheses. Justice Quarterly 21(1):125-158.
-
(2004)
Justice Quarterly
, vol.21
, Issue.1
, pp. 125-158
-
-
Piquero, N.L.1
Sealock, M.D.2
-
95
-
-
33745700246
-
Piracy over peer-to-peer based on personal networks
-
221-23.1
-
Prasad, R. 2006. Piracy over peer-to-peer based on personal networks. Wireless Personal Communications 37(3-4):221-23.1.
-
(2006)
Wireless Personal Communications
, vol.37
, Issue.3-4
-
-
Prasad, R.1
-
96
-
-
0344943983
-
How many pirates should a software firm tolerate? An analysis of piracy protection on the diffusion of software
-
Prasad, A., and V. Mahajan. 2003. How many pirates should a software firm tolerate? An analysis of piracy protection on the diffusion of software. International Journal of Research in Marketing 20(4):337-353.
-
(2003)
International Journal of Research in Marketing
, vol.20
, Issue.4
, pp. 337-353
-
-
Prasad, A.1
Mahajan, V.2
-
98
-
-
0007391492
-
Software piracy among computing students-A Bruneian scenario
-
Rahim, M., A. Seyal, and M. N. A. Rahman. 1999. Software piracy among computing students-A Bruneian scenario. Computers and Education 32(4):301-321.
-
(1999)
Computers and Education
, vol.32
, Issue.4
, pp. 301-321
-
-
Rahim, M.1
Seyal, A.2
Rahman, M.N.A.3
-
99
-
-
0035637388
-
Shaping of moral intensity regarding software piracy among university students: Immediate community effects
-
Ramakrishna, H. V., R. B. Kini, and B. S. Vijayaraman. 2001. Shaping of moral intensity regarding software piracy among university students: Immediate community effects. Journal of Computer Information Systems 41(4):47-51.
-
(2001)
Journal of Computer Information Systems
, vol.41
, Issue.4
, pp. 47-51
-
-
Ramakrishna, H.V.1
Kini, R.B.2
Vijayaraman, B.S.3
-
100
-
-
1842661682
-
The politics of contraband: The honor economies of the warez scene
-
Renn, A. 2004. The politics of contraband: The honor economies of the warez scene. Journal of Socio Economics 33(3):359-374
-
(2004)
Journal of Socio Economics
, vol.33
, Issue.3
, pp. 359-374
-
-
Renn, A.1
-
101
-
-
0000342596
-
Delinquency as the failure of personal and social control
-
Reiss, A., Jr. 1951. Delinquency as the failure of personal and social control. American Sociological Review 16(2): 196-207.
-
(1951)
American Sociological Review
, vol.16
, Issue.2
, pp. 196-207
-
-
Reiss Jr., A.1
-
102
-
-
32844471836
-
Software piracy and income inequality
-
Rodriguez, A. 2006. Software piracy and income inequality. Applied Economics Letters 13(2): 101-105.
-
(2006)
Applied Economics Letters
, vol.13
, Issue.2
, pp. 101-105
-
-
Rodriguez, A.1
-
103
-
-
0011532430
-
Correlates of computer misuse: Data from a self reporting sample
-
Sacco, V. 1990. Correlates of computer misuse: Data from a self reporting sample. Behavior and Information Technology 9(5):353-369.
-
(1990)
Behavior and Information Technology
, vol.9
, Issue.5
, pp. 353-369
-
-
Sacco, V.1
-
104
-
-
0000627689
-
Intellectual property and the digital economy: Why the anti-circumvention regulations need to be revised
-
Samuelson, P. 1999. Intellectual property and the digital economy: Why the anti-circumvention regulations need to be revised. Berkeley Technology Law Journal 14(2):519-547.
-
(1999)
Berkeley Technology Law Journal
, vol.14
, Issue.2
, pp. 519-547
-
-
Samuelson, P.1
-
105
-
-
1942433797
-
Digital rights management (and, or, vs.) the law
-
Samuelson, P. 2003. Digital rights management (and, or, vs.) the law. Communications of the ACM 46(4):41-45.
-
(2003)
Communications of the ACM
, vol.46
, Issue.4
, pp. 41-45
-
-
Samuelson, P.1
-
106
-
-
0031630026
-
Its not really theft! Personal and workplace ethics that enable software piracy
-
Seale, D. A., Polakowski, M., and S. Schneider. 1998. Its not really theft! Personal and workplace ethics that enable software piracy. Behavior and Information Technology 17(1):27-40.
-
(1998)
Behavior and Information Technology
, vol.17
, Issue.1
, pp. 27-40
-
-
Seale, D.A.1
Polakowski, M.2
Schneider, S.3
-
107
-
-
4243054940
-
Global software piracy revisited
-
Shin, S. K., R. Gopal, G. L. Sanders, and A. Whinston. 2004. Global software piracy revisited. Communications of the ACM 47(1):103-107.
-
(2004)
Communications of the ACM
, vol.47
, Issue.1
, pp. 103-107
-
-
Shin, S.K.1
Gopal, R.2
Sanders, G.L.3
Whinston, A.4
-
108
-
-
0035513420
-
Softlifting and piracy: Behavior across cultures
-
Shore, B., A. Venkatachalam, E. Solorzano, J. Burn, S. Hassan, and L. Janczewski. 2001. Softlifting and piracy: Behavior across cultures. Technology in Society 23(4):563-581.
-
(2001)
Technology in Society
, vol.23
, Issue.4
, pp. 563-581
-
-
Shore, B.1
Venkatachalam, A.2
Solorzano, E.3
Burn, J.4
Hassan, S.5
Janczewski, L.6
-
109
-
-
47949094821
-
Student attitudes on software piracy and related issues of computer ethics
-
Siegfried, R. 2004. Student attitudes on software piracy and related issues of computer ethics. Ethics and Information Technology 6(4):215-222.
-
(2004)
Ethics and Information Technology
, vol.6
, Issue.4
, pp. 215-222
-
-
Siegfried, R.1
-
111
-
-
0030215265
-
Toward a profile of student software pirates
-
Sims, R., H. Cheng, and H. Teegen. 1996. Toward a profile of student software pirates. Journal of Business Ethics 15(8):839-849.
-
(1996)
Journal of Business Ethics
, vol.15
, Issue.8
, pp. 839-849
-
-
Sims, R.1
Cheng, H.2
Teegen, H.3
-
112
-
-
0002909731
-
Marketing ethics: Sales professionals versus other marketing professionals
-
Singhapakdi, A., and S. Vitell. 1992. Marketing ethics: Sales professionals versus other marketing professionals. Journal of Personal Selling and Sales Management 12(2):27-39.
-
(1992)
Journal of Personal Selling and Sales Management
, vol.12
, Issue.2
, pp. 27-39
-
-
Singhapakdi, A.1
Vitell, S.2
-
113
-
-
0002961010
-
The effect of demographic factors on attitudes toward software piracy
-
Solomon, S., and J. Obrien. 1990. The effect of demographic factors on attitudes toward software piracy. Journal of Computer Information Systems 30(3):45-55.
-
(1990)
Journal of Computer Information Systems
, vol.30
, Issue.3
, pp. 45-55
-
-
Solomon, S.1
Obrien, J.2
-
114
-
-
53349102510
-
Key information liability issues facing managers: Software piracy, proprietary databases, and individual rights to privacy
-
Straub, D. 1990. Key information liability issues facing managers: Software piracy, proprietary databases, and individual rights to privacy. MIQ Quarterly 14(2): 143-156.
-
(1990)
MIQ Quarterly
, vol.14
, Issue.2
, pp. 143-156
-
-
Straub, D.1
-
115
-
-
0001354192
-
The morality of software piracy: A cross cultural analysis
-
Swinyard, W., H. Rinne, and A. K. Kau. 1990. The morality of software piracy: A cross cultural analysis. Journal of Business Ethics 9(8): 655-664.
-
(1990)
Journal of Business Ethics
, vol.9
, Issue.8
, pp. 655-664
-
-
Swinyard, W.1
Rinne, H.2
Kau, A.K.3
-
116
-
-
0347035583
-
Understanding consumer ethical decision making with respect to purchase of pirated software
-
Tan, B. 2002. Understanding consumer ethical decision making with respect to purchase of pirated software. Journal of Consumer Marketing 19(2):96-111.
-
(2002)
Journal of Consumer Marketing
, vol.19
, Issue.2
, pp. 96-111
-
-
Tan, B.1
-
117
-
-
0032390710
-
How electronic publishers are protecting against piracy: Doubts about technical systems of protection
-
Tang, P. 1998. How electronic publishers are protecting against piracy: Doubts about technical systems of protection. The Information Society 14(1):19-31.
-
(1998)
The Information Society
, vol.14
, Issue.1
, pp. 19-31
-
-
Tang, P.1
-
118
-
-
21244497901
-
The effect of interpersonal influence on softlifting intention and behavior
-
Tang, J., and C. Farn. 2005. The effect of interpersonal influence on softlifting intention and behavior. Journal of Business Ethics 56(2): 149-161.
-
(2005)
Journal of Business Ethics
, vol.56
, Issue.2
, pp. 149-161
-
-
Tang, J.1
Farn, C.2
-
119
-
-
84973740128
-
A comparative examination of attitudes toward software piracy among business professors and executives
-
Taylor, G. S., and J. P. Shim. 1993. A comparative examination of attitudes toward software piracy among business professors and executives. Human Relations 46(4):419-433.
-
(1993)
Human Relations
, vol.46
, Issue.4
, pp. 419-433
-
-
Taylor, G.S.1
Shim, J.P.2
-
120
-
-
0032223746
-
Testing an ethical decision making theory: The case of softlifting
-
Thong, J., and C. S. Yap. 1998. Testing an ethical decision making theory: The case of softlifting. Journal of Management Information Systems 15(1):213-237.
-
(1998)
Journal of Management Information Systems
, vol.15
, Issue.1
, pp. 213-237
-
-
Thong, J.1
Yap, C.S.2
-
121
-
-
47949083158
-
-
U.S. Copyright Law. 1993. Copyright Law of the United States of America and related laws contained in article 17 of the United States Code-Circular 92. http://www.copyright.gov/title17/92chap10. html.
-
U.S. Copyright Law. 1993. Copyright Law of the United States of America and related laws contained in article 17 of the United States Code-Circular 92. http://www.copyright.gov/title17/92chap10. html.
-
-
-
-
122
-
-
0035217408
-
Considerations in ethical decision making and software piracy
-
Wagner, S., and L. Sanders. 2001. Considerations in ethical decision making and software piracy. Journal of Business Ethics 29(1-2) : 161-167.
-
(2001)
Journal of Business Ethics
, vol.29
, Issue.1-2
, pp. 161-167
-
-
Wagner, S.1
Sanders, L.2
-
124
-
-
25444485713
-
Purchasing pirated software: An initial examination of Chinese consumers
-
Wang, F., H. Zang, H. Zang, and M. Ouyang. 2005. Purchasing pirated software: An initial examination of Chinese consumers Journal of Consumer Marketing 22(6): 340-351.
-
(2005)
Journal of Consumer Marketing
, vol.22
, Issue.6
, pp. 340-351
-
-
Wang, F.1
Zang, H.2
Zang, H.3
Ouyang, M.4
-
125
-
-
0036897636
-
Dealing with piracy: Intellectual asset management in software and music
-
Wijk, J. V. 2002. Dealing with piracy: Intellectual asset management in software and music. European Management Journal 20(6):689-698.
-
(2002)
European Management Journal
, vol.20
, Issue.6
, pp. 689-698
-
-
Wijk, J.V.1
-
126
-
-
0007350161
-
A study of unauthorized software copying among post secondary students in Hong Kong
-
Wong, G. 1990. A study of unauthorized software copying among post secondary students in Hong Kong. Australian Computer Journal 22(4): 114-122.
-
(1990)
Australian Computer Journal
, vol.22
, Issue.4
, pp. 114-122
-
-
Wong, G.1
-
128
-
-
35449007383
-
Software piracy among accounting students: A longitudinal comparison of changes and sensitivity
-
Wooley, D., and M. Eining. 2006. Software piracy among accounting students: A longitudinal comparison of changes and sensitivity. Journal of Information Systems 20(1):49-63.
-
(2006)
Journal of Information Systems
, vol.20
, Issue.1
, pp. 49-63
-
-
Wooley, D.1
Eining, M.2
|