References
- 김광용, "윤리적 의사결정 관점의 소프트웨어 불법복제에 관한 연구", 정보화정책, 제11권, 제4호(2004), pp.48-86.
- 사무용소프트웨어연합회한국소프트웨어저작권협회, "소프트웨어 및 콘텐츠 산업에서 불법복제 감소의 경제적 효과", 2010.
- 이성식, "대학생의 인터넷 저작권침해행위에 있어 중화의 작용과 이론들의 검증", 한국사회학, 제46권, 제5호(2012), pp.211-233.
- 저작권보호센터(한국저작권단체연합회), "2012 저작권 보호 연차보고서", 2012.
- 정상철(한국문화관경연구원), "(요약) 콘텐츠 불법복제 감소가 국가경제에 미치는 경제적 파급효과에 관한 연구", 2011.
- Ajzen, I. and M. Fishbein, Belief, attitude, intention and behavior : An introduction to theory and research. Reading : Addison-Wesley, 1975.
- Ajzen, I., "From intentions to actions : A theory of planned behavior. J. Kuhl, and J. Beckman(Eds.), Action-control : From cognition to behavior (pp.11-39)", Heidelberg : Springer, 1985.
- Ajzen, I., "Perceived Behavioral Control, Self-Efficacy, Locus of Control, and the Theory of Planned Behavior", Journal of Applied Social Psychology, Vol.32, No.4(2002), pp.665-683. https://doi.org/10.1111/j.1559-1816.2002.tb00236.x
- Ajzen, I., "The theory of planned behavior", Organizational Behavior and Human Decision Processes, Vol.50, No.2(1991), pp.179-211. https://doi.org/10.1016/0749-5978(91)90020-T
- Anderson, J. C. and D. W. Gerbing, "Structural equation modeling in practice : A review and recommended two-step approach", Psychological bulletin, Vol.103, No.3 (1988), p.411. https://doi.org/10.1037/0033-2909.103.3.411
- Bamberg, S. and P. Schmidt, "Incentives, Morality, Or Habit? : Predicting Students' Car Use for University Routes With the Models of Ajzen, Schwartz, and Triandis", Environment and Behavior, Vol.35, No.2 (2003), pp.264-285. https://doi.org/10.1177/0013916502250134
- Bandura, A., Social foundations of thought and action : A social cognitive theory, Prentice-Hall, Inc, 1986.
- Barnett, T. and S. Valentine, "Issue contingencies and marketers' recognition of ethical issues, ethical judgments and behavioral intentions", Journal of Business Research, Vol.57, No.4(2004), pp.338-346. https://doi.org/10.1016/S0148-2963(02)00365-X
- Baron, R. M., D. A. Kenny, and others, "The moderator-mediator variable distinction in social psychological research : Conceptual, strategic, and statistical considerations", Journal of personality and social psychology, Vol.51, No.6(1986), pp.1173-1182. https://doi.org/10.1037/0022-3514.51.6.1173
- Beck, L. and I. Ajzen, "Predicting dishonest actions using the theory of planned behavior", Journal of Research in Personality, Vol.25, No.3(1991), pp.285-301. https://doi.org/10.1016/0092-6566(91)90021-H
- Business Software Alliance, "2011 BSA Global Software Piracy Study", 2012.
- Byrne, B. M., Structural Equation Modeling with AMOS : Basic Concepts, Applications, and Programming, 2nd ed. Lawrence Erlbaum Associates, Mahwah, NJ, 2010.
- Chen, Y.-C., R.-A. Shang, and A.-K. Lin, "The intention to download music files in a P2P environment : Consumption value, fashion, and ethical decision perspectives", Electronic Commerce Research and Applications, Vol.7, No.4(2008), pp.411-422. https://doi.org/10.1016/j.elerap.2008.02.001
- Cheng, H. K., R. R. Sims, and H. Teegen, "To purchase or to pirate software : an empirical study", Journal of Management Information Systems, Vol.13, No.4(1997), pp. 49-60. https://doi.org/10.1080/07421222.1997.11518142
- Chiu, R. K., "Ethical Judgment and Whistleblowing Intention : Examining the Moderating Role of Locus of Control", Journal of Business Ethics, Vol.43(2003), pp.65-74. https://doi.org/10.1023/A:1022911215204
- Conner, M. and C. J. Armitage, "Extending the theory of planned behavior : A review and avenues for further research", Journal of applied social psychology, Vol.28, No.15 (1998), pp.1429-1464. https://doi.org/10.1111/j.1559-1816.1998.tb01685.x
- Cronan, T. P. and S. Al-Rafee, "Factors that Influence the Intention to Pirate Software and Media", Journal of Business Ethics, Vol.78, No.4(2008), pp.527-545. https://doi.org/10.1007/s10551-007-9366-8
- D'Astous, A., F. Colbert, and D. Montpetit, "Music piracy on the web-how effective are anti-piracy arguments? Evidence from the theory of planned behaviour", Journal of Consumer Policy, Vol.28, No.3(2005), pp. 289-310. https://doi.org/10.1007/s10603-005-8489-5
- Fraedrich, J. P. and O. C. Ferrell, "The impact of perceived risk and moral philosophy type on ethical decision making in business organizations", Journal of Business Research, Vol.24, No.4(1992), pp.283-295. https://doi.org/10.1016/0148-2963(92)90035-A
- Gayer, A. and O. Shy, "Internet and peerto-peer distributions in markets for digital products", Economics Letters, Vol.81, No.2 (2003), pp.197-203. https://doi.org/10.1016/S0165-1765(03)00170-8
- Goles, T., B. Jayatilaka, B. George, L. Parsons, V. Chambers, D. Taylor, and R. Brune, "Softlifting : Exploring Determinants of Attitude", Journal of Business Ethics, Vol.77, No.4(2008), pp.481-499. https://doi.org/10.1007/s10551-007-9361-0
- Gopal, R. D. and G. L. Sanders, "Global software piracy : you can't get blood out of a turnip", Communications of the ACM, Vol.43, No.9(2000), pp.82-89.
- Gottfredson, M. and T. Hirschi, A general theory of crime. Stanford University Press, 1990.
- Hair, J. F., W. C. Black, B. J. Babin, and R. E. Anderson, Multivariate data analysis, 7th ed. New Jersey : Prentice Hall, 2009.
- Higgins, G. E., A. L. Wilson, and B. D. Fell, "An application of deterrence theory to software piracy", Journal of Criminal Justice and Popular Culture, Vol.12, No.3(2005), pp. 166-184.
- Higgins, G. E., S. E. Wolfe, and C. D. Marcum, "Digital Piracy : An Examination of Three Measurements of Self-Control", Deviant Behavior, Vol.29, No.5(2008), pp.440-460. https://doi.org/10.1080/01639620701598023
- Hinduja, S., "Neutralization theory and online software piracy : An empirical analysis", Ethics and Information Technology, Vol.9, No.3(2007), pp.187-204. https://doi.org/10.1007/s10676-007-9143-5
- Hunt, S. D. and S. Vitell, "A general theory of marketing ethics", Journal of macromarketing, Vol.6, No.1(1986), pp.5-16. https://doi.org/10.1177/027614678600600103
- Ingram, J. R. and S. Hinduja, "Neutralizing Music Piracy : An Empirical Examination", Deviant Behavior, Vol.29, No.4(2008), pp. 334-366. https://doi.org/10.1080/01639620701588131
- LaRose, R. and J. Kim, "Share, steal, or buy? A social cognitive perspective of music downloading", Cyberpsychology and behavior, Vol.10, No.2(2007), pp.267-77. https://doi.org/10.1089/cpb.2006.9959
- Leonard, L. N. K. and T. P. Cronan, "Illegal, inappropriate, and unethical behavior in an information technology context : A study to explain influences", Journal of the Association for Information Systems, Vol.1, No.12 (2001), pp.1-31.
- Limayem, M., M. Khalifa, and W. W. Chin, "Factors Motivating Software Piracy : A Longitudinal Study", IEEE Transactions on Engineering Management, Vol.51, No.4(2004), pp.414-425. https://doi.org/10.1109/TEM.2004.835087
- Liao, C., H.-N. Lin, and Y.-P. Liu, "Predicting the Use of Pirated Software : A Contingency Model Integrating Perceived Risk with the Theory of Planned Behavior", Journal of Business Ethics, Vol.91, No.2(2009), pp.237-252.
- Lin, T., M. H. Hsu, F. Kuo, and P. Sun, "An Intention Model-based Study of Software Piracy", in Proceedings of the 32nd Hawaii International Conference on System Sciences, Vol.30(1999).
- Malin, J. and B. J. Fowers, "Adolescent selfcontrol and music and movie piracy", Computers in Human Behavior, Vol.25, No.3 (2009), pp.718-722. https://doi.org/10.1016/j.chb.2008.12.029
- Marcum, D., Catherine, G. E. Higgins, S. E. Wolfe, and L. Ricketts, Melissa, "Examining the Intersection of Self-control, Peer Association and Neutralization in Explaining Digital Piracy", Western Criminology Review, Vol.12, No.3(2011), pp.60-74.
- McDonald, R. P. and M.-H. R. Ho, "Principles and practice in reporting structural equation analyses", Psychological methods, Vol.7, No.1(2002), p.64. https://doi.org/10.1037/1082-989X.7.1.64
- Moon, B., J. D. McCluskey, and C. P. Mc-Cluskey, "A general theory of crime and computer crime : An empirical test", Journal of Criminal Justice, Vol.38, No.4(2010), pp.767-772. https://doi.org/10.1016/j.jcrimjus.2010.05.003
- Morris, R. G. and G. E. Higgins, "Neutralizing Potential and Self-Reported Digital Piracy : A Multitheoretical Exploration Among College Undergraduates", Criminal Justice Review, Vol.34, No.2(2008), pp.173-195.
- Nandedkar, A. and V. Midha, "It won't happen to me : An assessment of optimism bias in music piracy", Computers in Human Behavior, Vol.28, No.1(2012), pp.41-48. https://doi.org/10.1016/j.chb.2011.08.009
- Ouellette, J. A. and W. Wood, "Habit and intention in everyday life : The multiple processes by which past behavior predicts future behavior", Psychological Bulletin, Vol.124, No.1(1998), pp.54-74. https://doi.org/10.1037/0033-2909.124.1.54
- Peace, A. G., D. F. Galletta, and J. Y. L. Thong, "Software Piracy in the Workplace : A Model and Empirical Test", Journal of Management Information Systems, Vol.20, No.1(2003), pp.153-177. https://doi.org/10.1080/07421222.2003.11045759
- Phau, I. and J. Liang, "Downloading digital video games : predictors, moderators and consequences", Marketing Intelligence and Planning, Vol.30, No.7(2012), pp.740-756. https://doi.org/10.1108/02634501211273832
- Piquero, A. R. and J. A. Bouffard, "Something old, something new : A preliminary investigation of Hirschi's redefined selfcontrol", Justice Quarterly, Vol.24, No.1 (2007), pp.1-27. https://doi.org/10.1080/07418820701200935
- Randall, D. M. and A. M. Gibson, "Ethical decision making in the medical profession : An application of the theory of planned behavior", Journal of Business Ethics, Vol.10, No.2(1991), pp.111-122. https://doi.org/10.1007/BF00383614
- Sauro, J. and J. R. Lewis, "When designing usability questionnaires, does it hurt to be positive?", in Proceedings of the 2011 annual conference on Human factors in computing systems, (2011), pp.2215-2224.
- Siegfried, R. M., "Student Attitudes on Software Piracy and Related Issues of Computer Ethics", Ethics and Information Technology, Vol.6, No.4(2005), pp.215-222.
- Siponen, M., A. Vance, and R. Willison, "New insights into the problem of software piracy : The effects of neutralization, shame, and moral beliefs", Information and Management, Vol.49, No.7/8(2012), pp.334-341. https://doi.org/10.1016/j.im.2012.06.004
- Sykes, G. M. and D. Matza, "Techniques of neutralization : A theory of delinquency", American sociological review, Vol.22, No.6 (1957), pp.664-670. https://doi.org/10.2307/2089195
- Thong, J. Y. L. and C.-S. Yap, "Testing an Ethical Decision-Making Theory : The Case of Softlifting", Journal of Management Information Systems, Vol.15, No.1(1998), pp. 213-237. https://doi.org/10.1080/07421222.1998.11518203
- Triandis, H. C., "Values, attitudes, and interpersonal behavior", in Nebraska symposium on motivation, 1980.
- Vitell, S. J., J. J. Singh, and J. G. P. Paolillo, "Consumers' Ethical Beliefs : The Roles of Money, Religiosity and Attitude toward Business", Journal of Business Ethics, Vol. 73, No.4(2007), pp.369-379. https://doi.org/10.1007/s10551-006-9212-4
- Williams, K. R. and R. Hawkins, "Perceptual research on general deterrence : A critical review", Law and Soc'y Rev., Vol.20 (1986), p.545. https://doi.org/10.2307/3053466
- Yoon, C., "Digital piracy intention : a comparison of theoretical models", Behaviour and Information Technology, Vol.31, No.6 (2012), pp.565-576. https://doi.org/10.1080/0144929X.2011.602424
- Yoon, C., "Theory of Planned Behavior and Ethics Theory in Digital Piracy : An Integrated Model", Journal of Business Ethics, Vol.100, No.3(2011), pp.405-417. https://doi.org/10.1007/s10551-010-0687-7