-
1
-
-
0035633454
-
Research commentary: Introducing a third dimension in information systems design-the case for incentive alignment
-
Ba, S., Stallaert, J. and Whinston, A.B. (2001), “Research commentary: introducing a third dimension in information systems design-the case for incentive alignment”, Information Systems Research, Vol. 12 No. 3, pp. 225-239.
-
(2001)
Information Systems Research
, vol.12
, Issue.3
, pp. 225-239
-
-
Ba, S.1
Stallaert, J.2
Whinston, A.B.3
-
2
-
-
0034188746
-
Cracking the code of change
-
Beer, M. and Nohria, N. (2000), “Cracking the code of change”, Harvard Business Review, Vol. 8 No. 3, pp. 133-141.
-
(2000)
Harvard Business Review
, vol.8
, Issue.3
, pp. 133-141
-
-
Beer, M.1
Nohria, N.2
-
4
-
-
84872920550
-
Sense of virtual community and knowledge contribution in a P3 virtual community: Motivation and experience
-
Chen, G.L., Yang, S.C. and Tang, S.M. (2013), “Sense of virtual community and knowledge contribution in a P3 virtual community: motivation and experience”, Internet Research, Vol. 23 No. 1, pp. 4-26.
-
(2013)
Internet Research
, vol.23
, Issue.1
, pp. 4-26
-
-
Chen, G.L.1
Yang, S.C.2
Tang, S.M.3
-
5
-
-
22544447362
-
An analysis of online gaming crime characteristics
-
Chen, Y.C., Chen, P.S., Hwang, J.J., Korba, L., Song, R. and Yee, G. (2005), “An analysis of online gaming crime characteristics”, Internet Research, Vol. 21 No. 4, pp. 246-261.
-
(2005)
Internet Research
, vol.21
, Issue.4
, pp. 246-261
-
-
Chen, Y.C.1
Chen, P.S.2
Hwang, J.J.3
Korba, L.4
Song, R.5
Yee, G.6
-
6
-
-
0031288383
-
To purchase or to pirate software: An empirical study
-
Cheng, H.K., Sims, R.R. and Teegen, H. (1997), “To purchase or to pirate software: an empirical study”, Journal of Management Information Systems, Vol. 13 No. 4, pp. 49-60.
-
(1997)
Journal of Management Information Systems
, vol.13
, Issue.4
, pp. 49-60
-
-
Cheng, H.K.1
Sims, R.R.2
Teegen, H.3
-
7
-
-
70349666406
-
-
PhD dissertation, The University of Texas, Arlington, TX
-
Chennamaneni, A. (2006), “Determinants of knowledge sharing behaviors: developing and testing an integrated theoretical model”, PhD dissertation, The University of Texas, Arlington, TX.
-
(2006)
Determinants of Knowledge Sharing Behaviors: Developing and Testing an Integrated Theoretical Model
-
-
Chennamaneni, A.1
-
8
-
-
0005654339
-
The kindness of strangers: On the usefulness of electronic weak ties for technical advice
-
in Kielser, S. (Ed.), Lawrence Erlbaum Associates, Mahwah, NJ
-
Constant, D., Sproull, L. and Kiesler, S. (1997), “The kindness of strangers: on the usefulness of electronic weak ties for technical advice”, in Kielser, S. (Ed.), Culture of the Internet, Lawrence Erlbaum Associates, Mahwah, NJ, pp. 303-322.
-
(1997)
Culture of the Internet
, pp. 303-322
-
-
Constant, D.1
Sproull, L.2
Kiesler, S.3
-
9
-
-
33646542629
-
What motivates software crackers?
-
Goode, S. and Cruise, S. (2006), “What motivates software crackers?”, Journal of Business Ethics, Vol. 65 No. 2, pp. 173-201.
-
(2006)
Journal of Business Ethics
, vol.65
, Issue.2
, pp. 173-201
-
-
Goode, S.1
Cruise, S.2
-
10
-
-
84986146468
-
The impact of knowledge repositories on power and control in the workplace
-
Gray, P.H. (2001), “The impact of knowledge repositories on power and control in the workplace”, Information Technology and People, Vol. 14 No. 4, pp. 368-384.
-
(2001)
Information Technology and People
, vol.14
, Issue.4
, pp. 368-384
-
-
Gray, P.H.1
-
11
-
-
0003506109
-
-
7th ed., Prentice Hall, Englewood Cliffs, NJ
-
Hair, J.F., Black, W.C., Babin, B.J. and Anderson, R.E. (2009), Multivariate Data Analysis, 7th ed., Prentice Hall, Englewood Cliffs, NJ.
-
(2009)
Multivariate Data Analysis
-
-
Hair, J.F.1
Black, W.C.2
Babin, B.J.3
Anderson, R.E.4
-
12
-
-
0347035589
-
Software piracy: Are robin hood and responsibility denial at work?
-
in Khosrowpour, M. (Ed.), Idea Group Publishing, Hershey, PA
-
Harrington, S.J. (2000), “Software piracy: are robin hood and responsibility denial at work?”, in Khosrowpour, M. (Ed.), Challenges of Information Technology Management in the 21st Century, Idea Group Publishing, Hershey, PA, pp. 83-87.
-
(2000)
Challenges of Information Technology Management in the 21St Century
, pp. 83-87
-
-
Harrington, S.J.1
-
14
-
-
0030307377
-
A motivational model of microcomputer usage
-
Igbaria, M., Parasraman, S. and Baroudi, J.J. (1996), “A motivational model of microcomputer usage”, Journal of Management Information Systems, Vol. 13 No. 1, pp. 127-143.
-
(1996)
Journal of Management Information Systems
, vol.13
, Issue.1
, pp. 127-143
-
-
Igbaria, M.1
Parasraman, S.2
Baroudi, J.J.3
-
15
-
-
28744434462
-
Contributing knowledge to electronic knowledge repositories: An empirical investigation
-
Kankanhalli, A., Tan, B. and Wei, K.K. (2005), “Contributing knowledge to electronic knowledge repositories: an empirical investigation”, MIS Quarterly, Vol. 29 No. 1, pp. 113-143.
-
(2005)
MIS Quarterly
, vol.29
, Issue.1
, pp. 113-143
-
-
Kankanhalli, A.1
Tan, B.2
Wei, K.K.3
-
16
-
-
80052559898
-
Effects of virtual-experience combinations on consumer-related ‘sense of virtual community'
-
Keng, C.J., Ting, H.Y. and Chen, Y.T. (2011), “Effects of virtual-experience combinations on consumer-related ‘sense of virtual community'”, Internet Research, Vol. 21 No. 4, pp. 408-434.
-
(2011)
Internet Research
, vol.21
, Issue.4
, pp. 408-434
-
-
Keng, C.J.1
Ting, H.Y.2
Chen, Y.T.3
-
18
-
-
80255139539
-
Robin Hood versus the bullies: Software piracy and developing countries
-
Kopczynski, M. (2007), “Robin Hood versus the bullies: software piracy and developing countries”, Rutgers Computer and Technology Law Journal, Vol. 33 No. 2, pp. 299-329.
-
(2007)
Rutgers Computer and Technology Law Journal
, vol.33
, Issue.2
, pp. 299-329
-
-
Kopczynski, M.1
-
19
-
-
27744589568
-
Sharing or piracy? An exploration of downloading behavior
-
LaRose, R., Lai, Y.J., Lange, R., Love, B. and Wu, Y. (2005), “Sharing or piracy? An exploration of downloading behavior”, Journal of Computer-Mediated Communication, Vol. 11 No. 1, pp. 1-21.
-
(2005)
Journal of Computer-Mediated Communication
, vol.11
, Issue.1
, pp. 1-21
-
-
Larose, R.1
Lai, Y.J.2
Lange, R.3
Love, B.4
Wu, Y.5
-
20
-
-
0034899118
-
Towards a theory of knowledge reuse: Types of knowledge reuse situations and factors in reuse success
-
Markus, ML. (2001), “Towards a theory of knowledge reuse: types of knowledge reuse situations and factors in reuse success”, Journal ofManagement Information Systems, Vol. 18 No. 1, pp. 57-94.
-
(2001)
Journal Ofmanagement Information Systems
, vol.18
, Issue.1
, pp. 57-94
-
-
Markus, M.L.1
-
21
-
-
34547161383
-
The value of reciprocity
-
Molm, L.D., Schaefer, D.R. and Collett, J.L. (2007), “The value of reciprocity”, Social Psychology Quarterly, Vol. 70 No. 2, pp. 199-217.
-
(2007)
Social Psychology Quarterly
, vol.70
, Issue.2
, pp. 199-217
-
-
Molm, L.D.1
Schaefer, D.R.2
Collett, J.L.3
-
22
-
-
84937285788
-
The theory of heroic defeats: A mixed motivation approach
-
Olberg, D. (1995), “The theory of heroic defeats: a mixed motivation approach”, Sociological Theory, Vol. 13 No. 2, pp. 178-196.
-
(1995)
Sociological Theory
, vol.13
, Issue.2
, pp. 178-196
-
-
Olberg, D.1
-
23
-
-
77953537218
-
Predictors of usage intentions of pirated software
-
Phau, I. and Ng, J. (2010), “Predictors of usage intentions of pirated software”, Journal of Business Ethics, Vol. 94 No. 1, pp. 23-37.
-
(2010)
Journal of Business Ethics
, vol.94
, Issue.1
, pp. 23-37
-
-
Phau, I.1
Ng, J.2
-
24
-
-
0344943983
-
How many pirates should a software firm tolerate?: An analysis of piracy protection on the diffusion of software
-
Prasad, A. and Mahajan, V. (2003), “How many pirates should a software firm tolerate?: An analysis of piracy protection on the diffusion of software”, International Journal of Research in Marketing, Vol. 20 No. 4, pp. 337-353.
-
(2003)
International Journal of Research in Marketing
, vol.20
, Issue.4
, pp. 337-353
-
-
Prasad, A.1
Mahajan, V.2
-
25
-
-
46749101020
-
(Un)ethical consumer behavior: Robin Hoods or plain hoods?
-
Shoham, A., Ruvio, A. and Davidow, M. (2008), “(Un)ethical consumer behavior: Robin Hoods or plain hoods?”, Journal ofConsumer Marketing, Vol. 25 No. 4, pp. 200-210.
-
(2008)
Journal Ofconsumer Marketing
, vol.25
, Issue.4
, pp. 200-210
-
-
Shoham, A.1
Ruvio, A.2
Davidow, M.3
-
27
-
-
0347035583
-
Understanding consumer ethical decision making with respect to purchase of pirated software
-
Tan, B. (2002), “Understanding consumer ethical decision making with respect to purchase of pirated software”, Journal ofConsumer Marketing, Vol. 19 No. 2, pp. 96-111.
-
(2002)
Journal Ofconsumer Marketing
, vol.19
, Issue.2
, pp. 96-111
-
-
Tan, B.1
-
28
-
-
24144482419
-
Why should I share? Examining social capital and knowledge contribution in electronic networks of practice
-
Wasko, M.M. and Faraj, S. (2005), “Why should I share? Examining social capital and knowledge contribution in electronic networks of practice”, MIS Quarterly, Vol. 29 No. 1, pp. 35-57.
-
(2005)
MIS Quarterly
, vol.29
, Issue.1
, pp. 35-57
-
-
Wasko, M.M.1
Faraj, S.2
-
29
-
-
0000330269
-
Communities of practice: the organizational frontier
-
Wenger, E. and Snyder, W. (2000), “Communities of practice: the organizational frontier”, Harvard Business Review, Vol. 78 No. 1, pp. 139-145.
-
(2000)
Harvard Business Review
, vol.78
, Issue.1
, pp. 139-145
-
-
Wenger, E.1
Snyder, W.2
-
30
-
-
55549103021
-
Ripped from the headlines: What can the popular press teach us about software piracy?
-
Zamoon, S. and Curley, S.P. (2008), “Ripped from the headlines: what can the popular press teach us about software piracy?”, Journal of Business Ethics, Vol. 83 No. 3, pp. 515-533.
-
(2008)
Journal of Business Ethics
, vol.83
, Issue.3
, pp. 515-533
-
-
Zamoon, S.1
Curley, S.P.2
|