-
3
-
-
0032245475
-
International software piracy: Analysis of key issues and impacts
-
Gopal RD, Sanders GL. International software piracy: analysis of key issues and impacts. Information Systems Research; 1998, 9:380-97.
-
(1998)
Information Systems Research
, vol.9
, pp. 380-397
-
-
Gopal, R.D.1
Sanders, G.L.2
-
4
-
-
84973219762
-
-
United Nations manual on the prevention and control of computer-related crime, accessed June 20, 1999
-
United Nations. International review of criminal policy: United Nations manual on the prevention and control of computer-related crime. www.ifs.univie.ac.at/~pr2gq1/rev4344.html (accessed June 20, 1999).
-
International review of criminal policy
-
-
-
5
-
-
30344460323
-
Digital piracy: Factors that influence attitude toward behavior
-
Al-Rafee S, Cronan TP. Digital piracy: factors that influence attitude toward behavior. Journal of Business Ethics 2006; 63:237-59.
-
(2006)
Journal of Business Ethics
, vol.63
, pp. 237-259
-
-
Al-Rafee, S.1
Cronan, T.P.2
-
8
-
-
0011664858
-
Why people copy software and create computer viruses: Individual characteristics or situational factors?
-
Harrington SJ. Why people copy software and create computer viruses: individual characteristics or situational factors? Information Resources Management Journal 1989; 2:28-37.
-
(1989)
Information Resources Management Journal
, vol.2
, pp. 28-37
-
-
Harrington, S.J.1
-
9
-
-
0001865968
-
Factors influencing software piracy: Implications for accountants
-
Christensen AL, Eining MM. Factors influencing software piracy: implications for accountants. Journal of Information Systems 1991; 5:67-80.
-
(1991)
Journal of Information Systems
, vol.5
, pp. 67-80
-
-
Christensen, A.L.1
Eining, M.M.2
-
10
-
-
0011655037
-
Software piracy and software security in business schools: An ethical perspective
-
Im JH, Van Epps PD. Software piracy and software security in business schools: an ethical perspective. Data Base 1991; 22:15-21.
-
(1991)
Data Base
, vol.22
, pp. 15-21
-
-
Im, J.H.1
Van Epps, P.D.2
-
11
-
-
0007461850
-
Information systems majors/non-majors and computer ethics
-
Kievit K. Information systems majors/non-majors and computer ethics. Journal of Computer Information 1991; 32:43-49.
-
(1991)
Journal of Computer Information
, vol.32
, pp. 43-49
-
-
Kievit, K.1
-
12
-
-
11144295174
-
How do we teach computer ethics? A short study done in Hong Kong
-
Wong EYH. How do we teach computer ethics? A short study done in Hong Kong. Computers and Education 1995; 25:179-91.
-
(1995)
Computers and Education
, vol.25
, pp. 179-191
-
-
Wong, E.Y.H.1
-
14
-
-
0035637388
-
Shaping of moral intensity regarding software piracy in university students: Immediate community effects
-
Ramakrishna HV, Kini RB, Vijayaraman BS. Shaping of moral intensity regarding software piracy in university students: immediate community effects. Journal of Computer Information Systems 2001; 41:47-51.
-
(2001)
Journal of Computer Information Systems
, vol.41
, pp. 47-51
-
-
Ramakrishna, H.V.1
Kini, R.B.2
Vijayaraman, B.S.3
-
15
-
-
0030295452
-
Situational determinants of software piracy: An equity theory perspective
-
Glass RS, Wood WA. Situational determinants of software piracy: an equity theory perspective. Journal of Business Ethics 1996; 15:1189.
-
(1996)
Journal of Business Ethics
, vol.15
, pp. 1189
-
-
Glass, R.S.1
Wood, W.A.2
-
16
-
-
0032223746
-
Testing an ethical decision-making theory: The case of softlifting
-
Thong JL, Yap CS. Testing an ethical decision-making theory: the case of softlifting. Journal of Management Information Systems 1998; 15:213-37.
-
(1998)
Journal of Management Information Systems
, vol.15
, pp. 213-237
-
-
Thong, J.L.1
Yap, C.S.2
-
18
-
-
0026712064
-
Another view of computer science ethics: Patterns of responses among computer scientists
-
Leventhal LM, Instone KE, Chilson DW. Another view of computer science ethics: patterns of responses among computer scientists. Journal of System Software 1992; 17:49-60.
-
(1992)
Journal of System Software
, vol.17
, pp. 49-60
-
-
Leventhal, L.M.1
Instone, K.E.2
Chilson, D.W.3
-
19
-
-
0011597674
-
College students believe piracy is acceptable
-
Cohen E, Cornwell L. College students believe piracy is acceptable. CIS Educator Forum 1989; 1:2-5.
-
(1989)
CIS Educator Forum
, vol.1
, pp. 2-5
-
-
Cohen, E.1
Cornwell, L.2
-
20
-
-
11144230997
-
Can low self-control help with the understanding of the software piracy problem?
-
Higgins GE. Can low self-control help with the understanding of the software piracy problem? Deviant Behavior 2005; 26:1-24.
-
(2005)
Deviant Behavior
, vol.26
, pp. 1-24
-
-
Higgins, G.E.1
-
21
-
-
85044912937
-
Digital piracy: Assessing the contributions of an integrated self-control theory and social learning theory using structural equation modeling
-
Higgins GE, Fell BD, Wilson AL. Digital piracy: assessing the contributions of an integrated self-control theory and social learning theory using structural equation modeling. Criminal Justice Studies 2006; 19:3-22.
-
(2006)
Criminal Justice Studies
, vol.19
, pp. 3-22
-
-
Higgins, G.E.1
Fell, B.D.2
Wilson, A.L.3
-
22
-
-
36949001461
-
Low self-control, moral beliefs, and social learning theory in university students' intentions to pirate software
-
Higgins GE, Wilson AL. Low self-control, moral beliefs, and social learning theory in university students' intentions to pirate software. Security Journal 2006; 19:75-92.
-
(2006)
Security Journal
, vol.19
, pp. 75-92
-
-
Higgins, G.E.1
Wilson, A.L.2
-
23
-
-
36949000761
-
Swashbuckling students: An exploratory study of Internet piracy
-
Hohn DA, Muftic LR, Wolf K. Swashbuckling students: an exploratory study of Internet piracy. Security Journal 2006; 19:110-27.
-
(2006)
Security Journal
, vol.19
, pp. 110-127
-
-
Hohn, D.A.1
Muftic, L.R.2
Wolf, K.3
-
26
-
-
0001346123
-
-
Hiltz SR, Turoff M, Johnson K. Experiments in group decision making, 3: disinhibition, deindividuation, and group process in pen name and real name computer conferences. Decision Support Systems 1989;5:217-32.
-
Hiltz SR, Turoff M, Johnson K. Experiments in group decision making, 3: disinhibition, deindividuation, and group process in pen name and real name computer conferences. Decision Support Systems 1989;5:217-32.
-
-
-
-
27
-
-
0003014639
-
Deindividuation: The absence of self-awareness and self-regulation in group members
-
Paulus PB, ed, Hillsdale, NJ: Erlbaum, pp
-
Diener E. (1980) Deindividuation: the absence of self-awareness and self-regulation in group members. In Paulus PB, ed. The psychology of group influence. Hillsdale, NJ: Erlbaum, pp. 209-42.
-
(1980)
The psychology of group influence
, pp. 209-242
-
-
Diener, E.1
-
28
-
-
0032221839
-
Breaking or building social barriers: A SIDE analysis of computer-mediated communication
-
Postmes T, Spears R, Lea M. Breaking or building social barriers: a SIDE analysis of computer-mediated communication. Communication Research 1998; 25:689-715.
-
(1998)
Communication Research
, vol.25
, pp. 689-715
-
-
Postmes, T.1
Spears, R.2
Lea, M.3
-
32
-
-
50149094983
-
-
Paper presented at European Institute for Computer Anti-virus Research EICAR, Munich, Germany
-
Kabay ME. Anonymity and pseudonymity in cyberspace: deindividuation, incivility, and lawlessness versus freedom and privacy. Paper presented at European Institute for Computer Anti-virus Research (EICAR), Munich, Germany, 1998.
-
(1998)
Anonymity and pseudonymity in cyberspace: Deindividuation, incivility, and lawlessness versus freedom and privacy
-
-
Kabay, M.E.1
-
33
-
-
50149107514
-
-
Journal of Online Law www, accessed March 21, 2002
-
Froomkin AM. Anonymity and its enmities. Journal of Online Law www.law.cornell.edu/jol/froomkin.htm (accessed March 21, 2002).
-
Anonymity and its enmities
-
-
Froomkin, A.M.1
-
34
-
-
1642287919
-
Anonymity, privacy, and cyberspace
-
Paper presented at Electronic Datasets and Access to Legal Information, Coventry, England
-
Rowland D. Anonymity, privacy, and cyberspace. Paper presented at 15th BILETA Conference: Electronic Datasets and Access to Legal Information, Coventry, England, 2000.
-
(2000)
15th BILETA Conference
-
-
Rowland, D.1
-
35
-
-
50149120467
-
Anonymity has its place
-
Ubois J. Anonymity has its place. MIDRANGE Systems 1995; 8:28.
-
(1995)
MIDRANGE Systems
, vol.8
, pp. 28
-
-
Ubois, J.1
-
37
-
-
12744275983
-
Trends and patterns among software pirates
-
Hinduja S. Trends and patterns among software pirates. Ethics and Information Technology 2003; 5:49-61.
-
(2003)
Ethics and Information Technology
, vol.5
, pp. 49-61
-
-
Hinduja, S.1
-
38
-
-
0002630250
-
A psycho-social model of software piracy: The development of a test model
-
Dejoie R, Fowler G, Paradice D, eds, Boston: Boyd & Fraser, pp
-
Eining MM, Christensen AL. (1991) A psycho-social model of software piracy: the development of a test model. In Dejoie R, Fowler G, Paradice D, eds. Ethical issues in information systems. Boston: Boyd & Fraser, pp. 134-40.
-
(1991)
Ethical issues in information systems
, pp. 134-140
-
-
Eining, M.M.1
Christensen, A.L.2
-
39
-
-
0000460271
-
Software piracy and software security measures in business schools
-
Im JH, Van Epps PD. Software piracy and software security measures in business schools. Information & Management 1992; 23:193-203.
-
(1992)
Information & Management
, vol.23
, pp. 193-203
-
-
Im, J.H.1
Van Epps, P.D.2
-
41
-
-
0007350161
-
A study of unauthorized software copying among post-secondary students in Hong Kong
-
Wong G, Kong A, Ngai S. A study of unauthorized software copying among post-secondary students in Hong Kong. Australian Computer Journal 1990; 22:114-22.
-
(1990)
Australian Computer Journal
, vol.22
, pp. 114-122
-
-
Wong, G.1
Kong, A.2
Ngai, S.3
-
44
-
-
0019037404
-
Effects of deindividuating situational cues and aggressive models on subjective deindividuation and aggression
-
Prentice-Dunn S, Rogers RW. Effects of deindividuating situational cues and aggressive models on subjective deindividuation and aggression. Journal of Personality and Social Psychology 1980; 39:104-13.
-
(1980)
Journal of Personality and Social Psychology
, vol.39
, pp. 104-113
-
-
Prentice-Dunn, S.1
Rogers, R.W.2
-
45
-
-
0018510745
-
Deindividuation and valence of cues: Effects on prosocial and antisocial behavior
-
Johnson RD, Downing LL. Deindividuation and valence of cues: effects on prosocial and antisocial behavior. Journal of Personality and Social Psychology 1979; 37:1532-8.
-
(1979)
Journal of Personality and Social Psychology
, vol.37
, pp. 1532-1538
-
-
Johnson, R.D.1
Downing, L.L.2
|