메뉴 건너뛰기




Volumn 11, Issue 4, 2008, Pages 391-398

Deindividuation and internet software piracy

Author keywords

[No Author keywords available]

Indexed keywords

ARTICLE; COMPUTER PROGRAM; HYPOTHESIS; INFORMATION PROCESSING; INTERNET; MEDICAL RESEARCH; SOCIAL ENVIRONMENT; SOCIAL PSYCHOLOGY;

EID: 50149114170     PISSN: 10949313     EISSN: None     Source Type: Journal    
DOI: 10.1089/cpb.2007.0048     Document Type: Article
Times cited : (48)

References (46)
  • 3
    • 0032245475 scopus 로고    scopus 로고
    • International software piracy: Analysis of key issues and impacts
    • Gopal RD, Sanders GL. International software piracy: analysis of key issues and impacts. Information Systems Research; 1998, 9:380-97.
    • (1998) Information Systems Research , vol.9 , pp. 380-397
    • Gopal, R.D.1    Sanders, G.L.2
  • 4
    • 84973219762 scopus 로고    scopus 로고
    • United Nations manual on the prevention and control of computer-related crime, accessed June 20, 1999
    • United Nations. International review of criminal policy: United Nations manual on the prevention and control of computer-related crime. www.ifs.univie.ac.at/~pr2gq1/rev4344.html (accessed June 20, 1999).
    • International review of criminal policy
  • 5
    • 30344460323 scopus 로고    scopus 로고
    • Digital piracy: Factors that influence attitude toward behavior
    • Al-Rafee S, Cronan TP. Digital piracy: factors that influence attitude toward behavior. Journal of Business Ethics 2006; 63:237-59.
    • (2006) Journal of Business Ethics , vol.63 , pp. 237-259
    • Al-Rafee, S.1    Cronan, T.P.2
  • 8
    • 0011664858 scopus 로고
    • Why people copy software and create computer viruses: Individual characteristics or situational factors?
    • Harrington SJ. Why people copy software and create computer viruses: individual characteristics or situational factors? Information Resources Management Journal 1989; 2:28-37.
    • (1989) Information Resources Management Journal , vol.2 , pp. 28-37
    • Harrington, S.J.1
  • 9
    • 0001865968 scopus 로고
    • Factors influencing software piracy: Implications for accountants
    • Christensen AL, Eining MM. Factors influencing software piracy: implications for accountants. Journal of Information Systems 1991; 5:67-80.
    • (1991) Journal of Information Systems , vol.5 , pp. 67-80
    • Christensen, A.L.1    Eining, M.M.2
  • 10
    • 0011655037 scopus 로고
    • Software piracy and software security in business schools: An ethical perspective
    • Im JH, Van Epps PD. Software piracy and software security in business schools: an ethical perspective. Data Base 1991; 22:15-21.
    • (1991) Data Base , vol.22 , pp. 15-21
    • Im, J.H.1    Van Epps, P.D.2
  • 11
    • 0007461850 scopus 로고
    • Information systems majors/non-majors and computer ethics
    • Kievit K. Information systems majors/non-majors and computer ethics. Journal of Computer Information 1991; 32:43-49.
    • (1991) Journal of Computer Information , vol.32 , pp. 43-49
    • Kievit, K.1
  • 12
    • 11144295174 scopus 로고
    • How do we teach computer ethics? A short study done in Hong Kong
    • Wong EYH. How do we teach computer ethics? A short study done in Hong Kong. Computers and Education 1995; 25:179-91.
    • (1995) Computers and Education , vol.25 , pp. 179-191
    • Wong, E.Y.H.1
  • 14
    • 0035637388 scopus 로고    scopus 로고
    • Shaping of moral intensity regarding software piracy in university students: Immediate community effects
    • Ramakrishna HV, Kini RB, Vijayaraman BS. Shaping of moral intensity regarding software piracy in university students: immediate community effects. Journal of Computer Information Systems 2001; 41:47-51.
    • (2001) Journal of Computer Information Systems , vol.41 , pp. 47-51
    • Ramakrishna, H.V.1    Kini, R.B.2    Vijayaraman, B.S.3
  • 15
    • 0030295452 scopus 로고    scopus 로고
    • Situational determinants of software piracy: An equity theory perspective
    • Glass RS, Wood WA. Situational determinants of software piracy: an equity theory perspective. Journal of Business Ethics 1996; 15:1189.
    • (1996) Journal of Business Ethics , vol.15 , pp. 1189
    • Glass, R.S.1    Wood, W.A.2
  • 16
    • 0032223746 scopus 로고    scopus 로고
    • Testing an ethical decision-making theory: The case of softlifting
    • Thong JL, Yap CS. Testing an ethical decision-making theory: the case of softlifting. Journal of Management Information Systems 1998; 15:213-37.
    • (1998) Journal of Management Information Systems , vol.15 , pp. 213-237
    • Thong, J.L.1    Yap, C.S.2
  • 18
    • 0026712064 scopus 로고
    • Another view of computer science ethics: Patterns of responses among computer scientists
    • Leventhal LM, Instone KE, Chilson DW. Another view of computer science ethics: patterns of responses among computer scientists. Journal of System Software 1992; 17:49-60.
    • (1992) Journal of System Software , vol.17 , pp. 49-60
    • Leventhal, L.M.1    Instone, K.E.2    Chilson, D.W.3
  • 19
    • 0011597674 scopus 로고
    • College students believe piracy is acceptable
    • Cohen E, Cornwell L. College students believe piracy is acceptable. CIS Educator Forum 1989; 1:2-5.
    • (1989) CIS Educator Forum , vol.1 , pp. 2-5
    • Cohen, E.1    Cornwell, L.2
  • 20
    • 11144230997 scopus 로고    scopus 로고
    • Can low self-control help with the understanding of the software piracy problem?
    • Higgins GE. Can low self-control help with the understanding of the software piracy problem? Deviant Behavior 2005; 26:1-24.
    • (2005) Deviant Behavior , vol.26 , pp. 1-24
    • Higgins, G.E.1
  • 21
    • 85044912937 scopus 로고    scopus 로고
    • Digital piracy: Assessing the contributions of an integrated self-control theory and social learning theory using structural equation modeling
    • Higgins GE, Fell BD, Wilson AL. Digital piracy: assessing the contributions of an integrated self-control theory and social learning theory using structural equation modeling. Criminal Justice Studies 2006; 19:3-22.
    • (2006) Criminal Justice Studies , vol.19 , pp. 3-22
    • Higgins, G.E.1    Fell, B.D.2    Wilson, A.L.3
  • 22
    • 36949001461 scopus 로고    scopus 로고
    • Low self-control, moral beliefs, and social learning theory in university students' intentions to pirate software
    • Higgins GE, Wilson AL. Low self-control, moral beliefs, and social learning theory in university students' intentions to pirate software. Security Journal 2006; 19:75-92.
    • (2006) Security Journal , vol.19 , pp. 75-92
    • Higgins, G.E.1    Wilson, A.L.2
  • 23
    • 36949000761 scopus 로고    scopus 로고
    • Swashbuckling students: An exploratory study of Internet piracy
    • Hohn DA, Muftic LR, Wolf K. Swashbuckling students: an exploratory study of Internet piracy. Security Journal 2006; 19:110-27.
    • (2006) Security Journal , vol.19 , pp. 110-127
    • Hohn, D.A.1    Muftic, L.R.2    Wolf, K.3
  • 24
    • 0030668250 scopus 로고    scopus 로고
    • A social learning theory analysis of computer crime among college students
    • Skinner BF, Fream AM. A social learning theory analysis of computer crime among college students. Journal of Research in Crime and Delinquency 1997; 34:495-518.
    • (1997) Journal of Research in Crime and Delinquency , vol.34 , pp. 495-518
    • Skinner, B.F.1    Fream, A.M.2
  • 26
    • 0001346123 scopus 로고    scopus 로고
    • Hiltz SR, Turoff M, Johnson K. Experiments in group decision making, 3: disinhibition, deindividuation, and group process in pen name and real name computer conferences. Decision Support Systems 1989;5:217-32.
    • Hiltz SR, Turoff M, Johnson K. Experiments in group decision making, 3: disinhibition, deindividuation, and group process in pen name and real name computer conferences. Decision Support Systems 1989;5:217-32.
  • 27
    • 0003014639 scopus 로고
    • Deindividuation: The absence of self-awareness and self-regulation in group members
    • Paulus PB, ed, Hillsdale, NJ: Erlbaum, pp
    • Diener E. (1980) Deindividuation: the absence of self-awareness and self-regulation in group members. In Paulus PB, ed. The psychology of group influence. Hillsdale, NJ: Erlbaum, pp. 209-42.
    • (1980) The psychology of group influence , pp. 209-242
    • Diener, E.1
  • 28
    • 0032221839 scopus 로고    scopus 로고
    • Breaking or building social barriers: A SIDE analysis of computer-mediated communication
    • Postmes T, Spears R, Lea M. Breaking or building social barriers: a SIDE analysis of computer-mediated communication. Communication Research 1998; 25:689-715.
    • (1998) Communication Research , vol.25 , pp. 689-715
    • Postmes, T.1    Spears, R.2    Lea, M.3
  • 33
    • 50149107514 scopus 로고    scopus 로고
    • Journal of Online Law www, accessed March 21, 2002
    • Froomkin AM. Anonymity and its enmities. Journal of Online Law www.law.cornell.edu/jol/froomkin.htm (accessed March 21, 2002).
    • Anonymity and its enmities
    • Froomkin, A.M.1
  • 34
    • 1642287919 scopus 로고    scopus 로고
    • Anonymity, privacy, and cyberspace
    • Paper presented at Electronic Datasets and Access to Legal Information, Coventry, England
    • Rowland D. Anonymity, privacy, and cyberspace. Paper presented at 15th BILETA Conference: Electronic Datasets and Access to Legal Information, Coventry, England, 2000.
    • (2000) 15th BILETA Conference
    • Rowland, D.1
  • 35
    • 50149120467 scopus 로고
    • Anonymity has its place
    • Ubois J. Anonymity has its place. MIDRANGE Systems 1995; 8:28.
    • (1995) MIDRANGE Systems , vol.8 , pp. 28
    • Ubois, J.1
  • 37
    • 12744275983 scopus 로고    scopus 로고
    • Trends and patterns among software pirates
    • Hinduja S. Trends and patterns among software pirates. Ethics and Information Technology 2003; 5:49-61.
    • (2003) Ethics and Information Technology , vol.5 , pp. 49-61
    • Hinduja, S.1
  • 38
    • 0002630250 scopus 로고
    • A psycho-social model of software piracy: The development of a test model
    • Dejoie R, Fowler G, Paradice D, eds, Boston: Boyd & Fraser, pp
    • Eining MM, Christensen AL. (1991) A psycho-social model of software piracy: the development of a test model. In Dejoie R, Fowler G, Paradice D, eds. Ethical issues in information systems. Boston: Boyd & Fraser, pp. 134-40.
    • (1991) Ethical issues in information systems , pp. 134-140
    • Eining, M.M.1    Christensen, A.L.2
  • 39
    • 0000460271 scopus 로고
    • Software piracy and software security measures in business schools
    • Im JH, Van Epps PD. Software piracy and software security measures in business schools. Information & Management 1992; 23:193-203.
    • (1992) Information & Management , vol.23 , pp. 193-203
    • Im, J.H.1    Van Epps, P.D.2
  • 41
    • 0007350161 scopus 로고
    • A study of unauthorized software copying among post-secondary students in Hong Kong
    • Wong G, Kong A, Ngai S. A study of unauthorized software copying among post-secondary students in Hong Kong. Australian Computer Journal 1990; 22:114-22.
    • (1990) Australian Computer Journal , vol.22 , pp. 114-122
    • Wong, G.1    Kong, A.2    Ngai, S.3
  • 44
    • 0019037404 scopus 로고
    • Effects of deindividuating situational cues and aggressive models on subjective deindividuation and aggression
    • Prentice-Dunn S, Rogers RW. Effects of deindividuating situational cues and aggressive models on subjective deindividuation and aggression. Journal of Personality and Social Psychology 1980; 39:104-13.
    • (1980) Journal of Personality and Social Psychology , vol.39 , pp. 104-113
    • Prentice-Dunn, S.1    Rogers, R.W.2
  • 45
    • 0018510745 scopus 로고
    • Deindividuation and valence of cues: Effects on prosocial and antisocial behavior
    • Johnson RD, Downing LL. Deindividuation and valence of cues: effects on prosocial and antisocial behavior. Journal of Personality and Social Psychology 1979; 37:1532-8.
    • (1979) Journal of Personality and Social Psychology , vol.37 , pp. 1532-1538
    • Johnson, R.D.1    Downing, L.L.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.