참고문헌
- Ajzen, I. and M. Fishbein, Belief, Attitude, Intention and Behavior : An Introduction to Theory and Research, 1975.
- Bagchi, K., P. Kirs, and R. Cerveny, "Global Software Piracy : Can Economic Factors Along Explain the Trend?", Communications of the ACM, Vol.49, No.6, 2006, 70-75. https://doi.org/10.1145/1132469.1132470
- Bandura, A., Social Foundations of Thought and Action : A Social Cognitive Theory, Prentice-Hall, Inc, 1986.
- Beck, L. and I. Ajzen, "Predicting Dishonest Actions Using the Theory of Planned Behavior", Journal of Research in Personality, Vol.25, No.3, 1991, 285-301. https://doi.org/10.1016/0092-6566(91)90021-H
- Bezmen, T.L. and C.A. Depken, "Influences on Software Piracy : Evidence from the Various United States", Economics Letters, Vol.90, No.3, 2006, 356-361. https://doi.org/10.1016/j.econlet.2005.08.029
- Bohner, G. and N. Dickel, "Attitudes and Attitude Change", Annual Review of Psychology, Vol.62, No.1, 2011, 391-417. https://doi.org/10.1146/annurev.psych.121208.131609
- Business Software Alliance, The Compliance Gap : BSA Global Software Survey, 2014.
- Byrne, B.M., Structural Equation Modeling with AMOS : Basic Concepts, Applications, and Programming, 2nd ed. Lawrence Erlbaum Associates, Mahwah, NJ, 2010.
- Cheng, H.K., R.R. Sims, and H. Teegen, "To Purchase or to Pirate Software : An Empirical Study", Journal of Management Information Systems, Vol.13, No.4, 1997, 49-60. https://doi.org/10.1080/07421222.1997.11518142
- Cheung, G.W. and R.B. Rensvold, "Evaluating Goodness-of-Fit Indexes for Testing Measurement Invariance", Structural Equation Modeling : A Multidisciplinary Journal, Vol.9, No.2, 2002, 233-255. https://doi.org/10.1207/S15328007SEM0902_5
- Chiu, R.K., "Ethical Judgment and Whistleblowing Intention : Examining the Moderating Role of Locus of Control", Journal of Business Ethics, Vol.43, 2003, 65-74. https://doi.org/10.1023/A:1022911215204
- Christensen, A.L. and M.M. Eining, "Factors Influencing Software Piracy : Implications for Accountants", Journal of Information Systems, Vol.5, No.1, 1991, 67-80.
- Compeau, D.R. and C.A. Higgins, "Computer Self-Efficacy : Development of a Measure and Initial Test", MIS Quarterly, Vol.19, No.2, 1995, 189-211. https://doi.org/10.2307/249688
- Cronan, T.P. and S. Al-Rafee, "Factors That Influence the Intention to Pirate Software and Media", Journal of Business Ethics, Vol.78, No.4, 2008, 527-545. https://doi.org/10.1007/s10551-007-9366-8
- D'Astous, A., F. Colbert, and D. Montpetit, "Music Piracy on the Web-How Effective Are Anti-Piracy Arguments? Evidence from the Theory of Planned Behaviour", Journal of Consumer Policy, Vol.28, No.3, 2005, 289-310. https://doi.org/10.1007/s10603-005-8489-5
- Depken, C.A. and L.C. Simmons, "Social Construct and the Propensity for Software Piracy", Applied Economics Letters, Vol.11, No.2, 2004, 97-100. https://doi.org/10.1080/1350485042000200187
- Digieco Report, Tap On The Door of Mobile First World, 2015.
- Engadget, "Monument Valley Dev : 5% of Android Players Paid to Play", 2015. Available at http://www.engadget.com/2015/01/06/monument-valley-dev-5-of-android-players-paid-to-play/(Accessed January 6, 2015).
- Gopal, R.D., G.L. Sanders, S. Bhattacharjee, M. Agrawal, and S.C. Wagner, "A Behavioral Model of Digital Music Piracy", Journal of Organizational Computing and Electronic Commerce, Vol.14, No.2, 2004, 89-105. https://doi.org/10.1207/s15327744joce1402_01
- Gopal, R.D. and G.L. Sanders, "International Software Piracy : Analysis of Key Issues and Impacts", Information Systems Research, Vol.9, No.4, 1998, 380-397. https://doi.org/10.1287/isre.9.4.380
- Gopal, R.D. and G.L. Sanders, "Global Software Piracy : You Can't Get Blood out of a Turnip", Communications of the ACM, Vol.43, No.9, 2000, 82-89. https://doi.org/10.1145/348941.349002
- Gottfredson, M. and T. Hirschi, A General Theory of Crime, Stanford University Press, 1990.
- Hair, J.F., W.C. Black, B.J. Babin, and R.E. Anderson, Multivariate Data Analysis, 7th ed. New Jersey : Prentice Hall, 2009.
- Hennig-Thurau, T., V. Henning, and H. Sattler, "Consumer File Sharing of Motion Pictures", Journal of Marketing, Vol.71, No.4, 2007, 1-18. https://doi.org/10.1509/jmkg.71.4.1
- Higgins, G.E., "Can Low Self-Control Help With the Understanding of the Software Piracy Problem?", Deviant Behavior, Vol.26, No.1, 2004, 1-24. https://doi.org/10.1080/01639620490497947
- Hinduja, S., "Neutralization Theory and Online Software Piracy : An Empirical Analysis", Ethics and Information Technology, Vol.9, No.3, 2007, 187-204. https://doi.org/10.1007/s10676-007-9143-5
- Hunt, S.D. and S. Vitell, "A General Theory of Marketing Ethics", Journal of Macromarketing, Vol.6, No.1, 1986, 5-16. https://doi.org/10.1177/027614678600600103
- Ingram, J.R. and S. Hinduja, "Neutralizing Music Piracy : An Empirical Examination", Deviant Behavior, Vol.29, No.4, 2008, 334-366. https://doi.org/10.1080/01639620701588131
- INSEAD, Competitive Advantage : The Economic Impact of Properly Licensed Software, 2013.
- Ki, E.J., B.H. Chang, and H. Khang, "Exploring Influential Factors on Music Piracy across Countries", Journal of Communication, Vol. 56, No.2, 2006, 406-426. https://doi.org/10.1111/j.1460-2466.2006.00026.x
- Kim, J.H., "A Study on the Predictors of Intention to Pirate Software", Journal of the Korea Society of IT Services, Vol.12, No.2, 2013, 131-152. (김중한, "소프트웨어 불법복제 의도에 미치는 영향 요인에 관한 연구", 한국IT서비스학회지, 제12권, 제2호, 2013, 131-152.) https://doi.org/10.9716/KITS.2013.12.2.131
- Korea Copyright Commission, Research on Status of Copyright Violations from Mobile Equipment and Setting up Countermeasures, 2011. (한국저작권위원회, "스마트 기기를 통한 저작권 침해 실태조사 및 대응방안 연구", 2011.)
- Korea Federation of Copyright Organizations, Annual Report on Copyright Protection, 2014. (한국저작권단체연합회, "저작권 보호 연차보고서", 2014.)
- Leonard, L.N.K. and T.P. Cronan, "Illegal, Inappropriate, and Unethical Behavior in an Information Technology Context : A Study to Explain Influences", Journal of the Association for Information Systems, Vol.1, No. 12, 2001, 1-31.
- Limayem, M., M. Khalifa, and W.W. Chin, "Factors Motivating Software Piracy : A Longitudinal Study", IEEE Transactions on Engineering Management, Vol.51, No.4, 2004, 414-425. https://doi.org/10.1109/TEM.2004.835087
- Lin, T., M.H. Hsu, F. Kuo, and P. Sun, "An Intention Model-Based Study of Software Piracy", In Proceedings of the 32nd Hawaii International Conference on System Sciences, 1999.
- Lysonski, S. and S. Durvasula, "Digital Piracy of MP3s : Consumer and Ethical Predispositions", Journal of Consumer Marketing, Vol.25, No.3, 2008, 167-178. https://doi.org/10.1108/07363760810870662
- Ministry of Knowledge Economy, 2011 Employment Trends Report, 2012. (지식경제부, "2011년 정보통신부문 인력동향 보고서", 2012.)
- Moon, B., J.D. McCluskey, and C.P. McCluskey, "A General Theory of Crime and Computer Crime : An Empirical Test", Journal of Criminal Justice, Vol.38, No.4, 2010, 767-772. https://doi.org/10.1016/j.jcrimjus.2010.05.003
- Moores, T.T., "An Analysis of the Impact of Economic Wealth and National Culture on the Rise and Fall of Software Piracy Rates", Journal of Business Ethics, Vol.81, No.1, 2008, 39-51. https://doi.org/10.1007/s10551-007-9479-0
- Morris, R.G. and G.E. Higgins, "Neutralizing Potential and Self-Reported Digital Piracy : A Multitheoretical Exploration Among College Undergraduates", Criminal Justice Review, Vol.34, No.2, 2008, 173-195. https://doi.org/10.1177/0734016808325034
- Nandedkar, A. and V. Midha, "It Won't Happen to Me : An Assessment of Optimism Bias in Music Piracy", Computers in Human Behavior, Vol.28, No.1, 2012, 41-48. https://doi.org/10.1016/j.chb.2011.08.009
- Peace, A.G., D.F. Galletta, and J.Y.L. Thong, "Software Piracy in the Workplace : A Model and Empirical Test", Journal of Management Information Systems, Vol.20, No.1, 2003, 153-177. https://doi.org/10.1080/07421222.2003.11045759
- Piquero, N.L. and A.R. Piquero, "Democracy and Intellectual Property : Examining Trajectories of Software Piracy", The ANNALS of the American Academy of Political and Social Science, Vol.605, No.1, 2006, 104-127. https://doi.org/10.1177/0002716206287015
- Randall, D.M. and A.M. Gibson, "Ethical Decision Making in the Medical Profession : An Application of the Theory of Planned Behavior", Journal of Business Ethics, Vol.10, No.2, 1991, 111-122. https://doi.org/10.1007/BF00383614
- Sinha, R.K. and N. Mandel, "Preventing Digital Music Piracy : The Carrot or the Stick?", Journal of Marketing, Vol.72, No.1, 2008, 1-15. https://doi.org/10.1509/jmkg.72.1.1
- Sykes, G.M. and D. Matza, "Techniques of Neutralization : A Theory of Delinquency", American Sociological Review, Vol.22, No. 6, 1957, 664-70. https://doi.org/10.2307/2089195
- Thong, J.Y.L. and C.S. Yap, "Testing an Ethical Decision-Making Theory : The Case of Softlifting", Journal of Management Information Systems, Vol.15, No.1, 1998, 213-37. https://doi.org/10.1080/07421222.1998.11518203
- Triandis, H.C., "Values, Attitudes, and Interpersonal Behavior", In Nebraska Symposium on Motivation, 1979.
- Van Kranenburg, H. and A. Hogenbirk, "Multimedia, Entertainment, and Business Software Copyright Piracy : A Cross-National Study", Journal of Media Economics, Vol. 18, No.2, 2005, 109-129. https://doi.org/10.1207/s15327736me1802_3
- Vitell, S.J., J.J. Singh, and J.G.P. Paolillo, "Consumers' Ethical Beliefs : The Roles of Money, Religiosity and Attitude toward Business", Journal of Business Ethics, Vol.73, No.4, 2007, 369-379. https://doi.org/10.1007/s10551-006-9212-4
- Williams, K.R. and R. Hawkins, "Perceptual Research on General Deterrence : A Critical Review", Law and Society Review, Vol.20, 1986, 545-572. https://doi.org/10.2307/3053466
- Yoon, C., "Theory of Planned Behavior and Ethics Theory in Digital Piracy : An Integrated Model", Journal of Business Ethics, Vol. 100, No.3, 2011, 405-417. https://doi.org/10.1007/s10551-010-0687-7
- Zhang, X., M. Shim, and G. Gim, "An Empirical Study of the Piracy Behavior on Digital Content", Journal of Korea IT Service, Vol.9, No.4, 2010, 37-55. (장향란, 심민우, 김광용, "디지털콘텐츠 불법복제 행동에 관한 연구", 한국IT서비스학회지, 제9권, 제4호, 2010, 37-55.)