메뉴 건너뛰기




Volumn , Issue , 2011, Pages 193-207

Change of music piracy and neutralization: An examination using short-term longitudinal data

Author keywords

[No Author keywords available]

Indexed keywords


EID: 84868576592     PISSN: None     EISSN: None     Source Type: Book    
DOI: None     Document Type: Chapter
Times cited : (1)

References (23)
  • 2
    • 0345475379 scopus 로고    scopus 로고
    • Missing data techniques for structural equation models
    • Allison, P. D. (2003). Missing data techniques for structural equation models. Journal of Abnormal Psychology, 112, 545-557.
    • (2003) Journal of Abnormal Psychology , vol.112 , pp. 545-557
    • Allison, P.D.1
  • 4
    • 0037217139 scopus 로고    scopus 로고
    • Missing data problems in criminological research: Two case studies
    • Brame, R., & Paternoster, R. (2003). Missing data problems in criminological research: Two case studies. Journal of Quantitative Criminology, 19, 55-78.
    • (2003) Journal of Quantitative Criminology , vol.19 , pp. 55-78
    • Brame, R.1    Paternoster, R.2
  • 5
    • 17444428885 scopus 로고    scopus 로고
    • The antecedents of music piracy: Attitudes and intentions
    • Chiou, J. S., Huang, C. Y., & Lee, H. H. (2005). The antecedents of music piracy: Attitudes and intentions. Journal of Business Ethics, 57, 161-174.
    • (2005) Journal of Business Ethics , vol.57 , pp. 161-174
    • Chiou, J.S.1    Huang, C.Y.2    Lee, H.H.3
  • 7
    • 33646542629 scopus 로고    scopus 로고
    • What motivates software crackers?
    • Goode, S., & Cruise, S. (2006). What motivates software crackers? Journal of Business Ethics, 65, 173-201.
    • (2006) Journal of Business Ethics , vol.65 , pp. 173-201
    • Goode, S.1    Cruise, S.2
  • 8
    • 34548292493 scopus 로고    scopus 로고
    • Digital piracy: An examination of low self-control and motivation using short-term longitudinal data
    • Higgins, G. E. (2007). Digital piracy: An examination of low self-control and motivation using short-term longitudinal data. CyberPsychology & Behavior, 10, 523-529.
    • (2007) CyberPsychology & Behavior , vol.10 , pp. 523-529
    • Higgins, G.E.1
  • 10
    • 12744275983 scopus 로고    scopus 로고
    • Trends and patterns among online software pirates
    • Hinduja, S. (2003). Trends and patterns among online software pirates. Ethics and Information Technology, 5, 49-61.
    • (2003) Ethics and Information Technology , vol.5 , pp. 49-61
    • Hinduja, S.1
  • 11
    • 8844253975 scopus 로고    scopus 로고
    • Perceptions of local and state law enforcement concerning the role of computer crime investigative teams
    • Hinduja, S. (2004). Perceptions of local and state law enforcement concerning the role of computer crime investigative teams. Policing: An International Journal of Police Strategies & Management, 27, 341-357.
    • (2004) Policing: An International Journal of Police Strategies & Management , vol.27 , pp. 341-357
    • Hinduja, S.1
  • 12
    • 36949037524 scopus 로고    scopus 로고
    • Neutralization theory and online software piracy: An empirical analysis
    • Hinduja, S. (2007). Neutralization theory and online software piracy: An empirical analysis. Ethics and Information Technology, 9(3), 187-204.
    • (2007) Ethics and Information Technology , vol.9 , Issue.3 , pp. 187-204
    • Hinduja, S.1
  • 13
    • 67650706330 scopus 로고    scopus 로고
    • Cutoff criteria for fit indexes in covariance structure analysis: Conventional criteria versus new alternatives
    • Hu, L. T., & Bentler, P. M. (1999). Cutoff criteria for fit indexes in covariance structure analysis: Conventional criteria versus new alternatives. Structural Equation Modeling , 6, 1-55.
    • (1999) Structural Equation Modeling , vol.6 , pp. 1-55
    • Hu, L.T.1    Bentler, P.M.2
  • 16
    • 0039686012 scopus 로고    scopus 로고
    • Software piracy and its legal implications
    • Koen, C. M., & Im, J. H. (1997). Software piracy and its legal implications. Security Journal, 31, 265-272.
    • (1997) Security Journal , vol.31 , pp. 265-272
    • Koen, C.M.1    Im, J.H.2
  • 18
    • 25144504209 scopus 로고    scopus 로고
    • Excuses, excuses: What have we learned from five decades of neutralization research?
    • M. J. Tonry (Eds.), Chicago, IL: University of Chicago Press.
    • Maruna, S., & Copes, H. (2004). Excuses, excuses: What have we learned from five decades of neutralization research? In M. J. Tonry (Eds.), Crime and justice 2004-2008 (pp. 1-100). Chicago, IL: University of Chicago Press.
    • (2004) Crime and justice 2004-2008 , pp. 1-100
    • Maruna, S.1    Copes, H.2
  • 19
    • 0345040656 scopus 로고    scopus 로고
    • How to use a Monte Carlo study to decide on sample size and determine power
    • Muthen, L. K., & Muthen, B. O. (2002). How to use a Monte Carlo study to decide on sample size and determine power. Structural Equation Modeling, 9, 599-620.
    • (2002) Structural Equation Modeling , vol.9 , pp. 599-620
    • Muthen, L.K.1    Muthen, B.O.2
  • 20
    • 0003753978 scopus 로고    scopus 로고
    • (3rd ed.). Los Angeles, CA: Muthen and Muthen.
    • Muthen, L. K., & Muthen, B. O. (1998-2004). Mplus users'guide (3rd ed.). Los Angeles, CA: Muthen and Muthen.
    • (1998) Mplus users'guide
    • Muthen, L.K.1    Muthen, B.O.2
  • 22
    • 0001155759 scopus 로고
    • Techniques of neutralization: A theory of delinquency
    • Sykes, G., & Matza, D. (1957). Techniques of neutralization: A theory of delinquency. American Sociological Review, 22, 664-670.
    • (1957) American Sociological Review , vol.22 , pp. 664-670
    • Sykes, G.1    Matza, D.2
  • 23
    • 84949564522 scopus 로고    scopus 로고
    • The Internet as a conduit for criminal activity
    • A. Pattavina (Ed.), Thousand Oaks, CA: Sage Publications.
    • Wall, D. S. (2005). The Internet as a conduit for criminal activity. In A. Pattavina (Ed.), Information technology and the criminal justice system (pp. 78-94). Thousand Oaks, CA: Sage Publications.
    • (2005) Information technology and the criminal justice system , pp. 78-94
    • Wall, D.S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.