참고문헌
- 정상철(한국문화관경연구원), "(요약) 콘텐츠 불법복제 감소가 국가경제에 미치는 경제적 파급효과에 관한 연구", 2011.
- 한국저작권위원회, "스마트 기기를 통한 저작권 침해 실태조사 및 대응방안 연구", 2011.
- Ajzen, I. and M. Fishbein, Belief, attitude, intention and behavior : An introduction to theory and research, Reading : Addison-Wesley, 1975.
- Ajzen, I., "Perceived Behavioral Control, Self-Efficacy, Locus of Control, and the Theory of Planned Behavior", J. Appl. Soc. Psychol., Vol.32, No.4(2002), pp.665-683. https://doi.org/10.1111/j.1559-1816.2002.tb00236.x
- Ajzen, I., "The theory of planned behavior", Organ. Behav. Hum. Decis. Process., Vol. 50, No.2(1991), pp.179-211. https://doi.org/10.1016/0749-5978(91)90020-T
- Anderson, J. C. and D. W. Gerbing, "Structural equation modeling in practice : A review and recommended two-step approach", Psychol. Bull., Vol.103, No.3(1988), p.411. https://doi.org/10.1037/0033-2909.103.3.411
- "Apple App Store Has Lost $450 Million To Piracy", 24/7 Wall Street, 2010[Online], Available : http://247wallst.com/apps-software/2010/01/13/apple-app-store-has-lost-450-million-to-piracy.
- Bagchi, K., P. Kirs, and R. Cerveny, "Global Software Piracy : Can Economic Factors Along Explain the Trend?", Commun. ACM, Vol.49, No.6(2006), pp.70-75. https://doi.org/10.1145/1132469.1132470
- Bandura, A., Social foundations of thought and action : A social cognitive theory, Prentice-Hall, Inc, 1986.
- Beck, L. and I. Ajzen, "Predicting dishonest actions using the theory of planned behavior", J. Res. Pers., Vol.25, No.3(1991), pp.285-301. https://doi.org/10.1016/0092-6566(91)90021-H
- Bezmen, T. L. and C. A. Depken, "Influences on software piracy : Evidence from the various United States", Econ. Lett., Vol.90, No.3 (2006), pp.356-361. https://doi.org/10.1016/j.econlet.2005.08.029
- Business Insider, "One In Every 5 People In The World Own A Smartphone", 2013[Online] Available : http://www.businessinsider.com/smartphone-and-tablet-penetration-2013-10#ixzz2y9qsuMDw.
- Chen, Y.-C. R.-A. Shang, and A.-K. Lin, "The intention to download music files in a P2P environment : Consumption value, fashion, and ethical decision perspectives", Electron. Commer. Res. Appl., Vol.7, No.4(2008), pp.411-422. https://doi.org/10.1016/j.elerap.2008.02.001
- Cheng, H. K., R. R. Sims, and H. Teegen, "To purchase or to pirate software : an empirical study", J. Manag. Inf. Syst., Vol.13, No.4(1997), pp.49-60. https://doi.org/10.1080/07421222.1997.11518142
- Chiu, R. K., "Ethical Judgment and Whistleblowing Intention : Examining the Moderating Role of Locus of Control", J. Bus. Ethics, Vol.43(2003), pp.65-74. https://doi.org/10.1023/A:1022911215204
- CNET, "How piracy ruins it for paid apps", CNET, 2011, [Online] Available : http://www.cnet.com/news/how-piracy-ruins-it-forpaid-apps-inside-apps/, [Accessed : 12-Dec-2013].
- CNN Money, "Mobile apps overtake PC Internet usage in U. S.", CNN Money, 2014, [Online] Available : http://money.cnn.com/2014/02/28/technology/mobile/mobile-appsinternet.
- Compeau, D. R. and C. A. Higgins, "Computer self-efficacy : Development of a measure and initial test.", MIS Q., Vol.19, No.2 (1995).
- Cronan, T. P. and S. Al-Rafee, "Factors that Influence the Intention to Pirate Software and Media", J. Bus. Ethics, Vol.78, No.4 (2008), pp.527-545. https://doi.org/10.1007/s10551-007-9366-8
- D'Astous, A., F. Colbert, and D. Montpetit, "Music piracy on the web-how effective are anti-piracy arguments? Evidence from the theory of planned behaviour", J. Consum. Policy, Vol.28, No.3(2005), pp.289-310. https://doi.org/10.1007/s10603-005-8489-5
- De Castro, J. O. D. B. Balkin, and D. A. Shepherd, "Can entrepreneurial firms benefit from product piracy?", J. Bus. Ventur., Vol.23, No.1(2008), pp.75-90. https://doi.org/10.1016/j.jbusvent.2005.07.003
- Depken, C. A. and L. C. Simmons, "Social construct and the propensity for software piracy", Appl. Econ. Lett., Vol.11, No.2(2004), pp.97-100. https://doi.org/10.1080/1350485042000200187
- Forbes, "Google Play Catching Up To Apple's App Store", Forbes, 2013, [Online] Available : http://www.forbes.com/sites/chuckjones/2013/12/19/google-play-catching-up-to-apples-app-store.
- Fraedrich, J. P. and O. C. Ferrell, "The impact of perceived risk and moral philosophy type on ethical decision making in business organizations", J. Bus. Res., Vol.24, No.4 (1992), pp.283-295. https://doi.org/10.1016/0148-2963(92)90035-A
- Gartner, "Key Trends for the Mobile Industry", Gartner Conference Report, (2013), [Online] Available : http://www.gartner.com/newsroom/id/2592315.
- Gopal, R. D. and G. L. Sanders, "Global software piracy : you can't get blood out of a turnip", Commun. ACM, Vol.43, No.9(2000), pp.82-89.
- Gopal, R. D. and G. L. Sanders, "International software piracy : Analysis of key issues and impacts", Inf. Syst. Res., Vol.9, No.4 (1998), pp.380-397. https://doi.org/10.1287/isre.9.4.380
- Gottfredson, M. and T. Hirschi, A general theory of crime. Stanford University Press, 1990.
- Hair, J. F., W. C. Black, B. J. Babin, and R. E. Anderson, Multivariate data analysis, 7th ed, New Jersey : Prentice Hall, 2009.
- Hinduja, S., "Neutralization theory and online software piracy : An empirical analysis", Ethics Inf. Technol., Vol.9, No.3(2007), pp.187-204. https://doi.org/10.1007/s10676-007-9143-5
- Hunt, S. D. and S. Vitell, "A general theory of marketing ethics", J. macromarketing, Vol.6, No.1(1986), pp.5-16. https://doi.org/10.1177/027614678600600103
- Ingram, J. R. and S. Hinduja, "Neutralizing Music Piracy : An Empirical Examination", Deviant Behav., Vol.29, No.4(2008), pp.334-366. https://doi.org/10.1080/01639620701588131
- Jeong, Y.-S., Y.-U. Park, J.-C. Moon, S.-J. Cho, D. Kim, and M. Park, "An anti-piracy mechanism based on class separation and dynamic loading for Android applications", in Proceedings of the 2012 ACM Research in Applied Computation Symposium, (2012), pp.328-332.
- Ki, E. J. B. H. Chang, and H. Khang, "Exploring influential factors on music piracy across countries", J. Commun., Vol.56, No.2 (2006), pp.406-426. https://doi.org/10.1111/j.1460-2466.2006.00026.x
- Kim, E., S. Kim, and J. Choi, "Detecting Illegally-Copied Apps on Android Devices", in IT Convergence and Security (ICITCS), International Conference on, (2013), pp.1-4.
- Leonard, L. N. K. and T. P. Cronan, "Illegal, inappropriate, and unethical behavior in an information technology context : A study to explain influences", J. Assoc. Inf. Syst., Vol.1, No.12(2001), pp.1-31.
- Limayem, M., M. Khalifa, and W. W. Chin, "Factors Motivating Software Piracy : A Longitudinal Study", IEEE Trans. Eng. Manag., Vol.51, No.4(2004), pp.414-425. https://doi.org/10.1109/TEM.2004.835087
- Lin, T. M. H. Hsu, F. Kuo, and P. Sun, "An Intention Model-based Study of Software Piracy", in Proceedings of the 32nd Hawaii International Conference on System Sciences, Vol.30(1999).
- Marcum, D., Catherine, G. E. Higgins, S. E. Wolfe, and L. Ricketts, Melissa, "Examining the Intersection of Self-control, Peer Association and Neutralization in Explaining Digital Piracy", West. Crim. Rev., Vol.12, No.3 (2011), pp.60-74.
- Moon, B., J. D. McCluskey, and C. P. Mc-Cluskey, "A general theory of crime and computer crime : An empirical test", J. Crim. Justice, Vol.38, No.4(2010), pp.767-772. https://doi.org/10.1016/j.jcrimjus.2010.05.003
- Moores, T. T., "An Analysis of the Impact of Economic Wealth and National Culture on the Rise and Fall of Software Piracy Rates", J. Bus. Ethics, Vol.81, No.1(2008), pp. 39-51. https://doi.org/10.1007/s10551-007-9479-0
- Morris, R. G. and G. E. Higgins, "Neutralizing Potential and Self-Reported Digital Piracy : A Multitheoretical Exploration Among College Undergraduates", Crim. Justice Rev., Vol.34, No.2(2008), pp.173-195.
- Nandedkar, A. and V. Midha, "It won't happen to me : An assessment of optimism bias in music piracy", Comput. Human Behav., Vol.28, No.1(2012), pp.41-48. https://doi.org/10.1016/j.chb.2011.08.009
- Peace, A. G., D. F. Galletta, and J. Y. L. Thong, "Software Piracy in the Workplace : A Model and Empirical Test", J. Manag. Inf. Syst., Vol.20, No.1(2003), pp.153-177. https://doi.org/10.1080/07421222.2003.11045759
- Phau, I. and J. Liang, "Downloading digital video games : predictors, moderators and consequences", Mark. Intell. Plan., Vol.30, No.7(2012), pp.740-756. https://doi.org/10.1108/02634501211273832
- Piquero, N. L. and A. R. Piquero, "Democracy and intellectual property : Examining trajectories of software piracy", Ann. Am. Acad. Pol. Soc. Sci., Vol.605, No.1(2006), pp. 104-127. https://doi.org/10.1177/0002716206287015
- Randall, D. M. and A. M. Gibson, "Ethical decision making in the medical profession : An application of the theory of planned behavior", J. Bus. Ethics, Vol.10, No.2(1991), pp.111-122. https://doi.org/10.1007/BF00383614
- Sykes, G. M. and D. Matza, "Techniques of neutralization : A theory of delinquency", Am. Sociol. Rev., Vol.22, No.6(1957), pp.664-670. https://doi.org/10.2307/2089195
- Thong, J. Y. L. and C.-S. Yap, "Testing an Ethical Decision-Making Theory : The Case of Softlifting", J. Manag. Inf. Syst., Vol.15, No.1(1998), pp.213-237. https://doi.org/10.1080/07421222.1998.11518203
- Triandis, H. C., "Values, attitudes, and interpersonal behavior", in Nebraska symposium on motivation, 1980.
- van Kranenburg, H. and A. Hogenbirk, "Multimedia, entertainment, and business software copyright piracy : A cross-national study", J. media Econ., Vol.18, No.2(2005), pp.109-129. https://doi.org/10.1207/s15327736me1802_3
- Vitell, S. J., J. J. Singh, and J. G. P. Paolillo, "Consumers'Ethical Beliefs : The Roles of Money, Religiosity and Attitude toward Business", J. Bus. Ethics, Vol.73, No.4(2007), pp.369-379. https://doi.org/10.1007/s10551-006-9212-4
- Williams, K. R. and R. Hawkins, "Perceptual research on general deterrence : A critical review", Law Socy Rev., Vol.20(1986), p.545. https://doi.org/10.2307/3053466
- Yoon, C., "Theory of Planned Behavior and Ethics Theory in Digital Piracy : An Integrated Model", J. Bus. Ethics, Vol.100, No.3 (2011), pp.405-417. https://doi.org/10.1007/s10551-010-0687-7