References
- StatCounter, "Mobile and Tablet Internet u Sage Exceeds Desktop for First Time Worl Dwide," http://gs.statcounter.com/press/mobile-and-tablet-internet-usage-exceeds-desktop-for-first-time-worldwide. 2016.
- Newzoo, "Global Mobile Market Report: App Market to Gross $44.8BN This Year," https://newzoo.com/insights/articles/globalmobile-market-report-app-market-to-gross-44-8bn-this-year. 2016.
- AppFigures, "App Stores Start to Mature-2016 Year in Review," http://blog.appfigures.com/app-stores-start-to-mature-2016-year-in-review. 2017.
- Korea Copyright Commission, "Research on Status of Copyright Violations from Mobile Equipment and Setting Up Countermeasures," 2011.
- Business Software Alliance, "2016 BSA Global Software Survey," 2016.
- Korea Culture and Tourism Institute, "A Study on the Effect on Economical Effect of Decrease in Contents Piracy," 2011.
- Kubesch, A.S., and Wicker, S., “Digital Rights Management: The Cost to Consumers,” Proceedings of the IEEE, Vol. 103, No. 5, pp. 726-733, 2015. https://doi.org/10.1109/JPROC.2015.2418457
- Kim, E., S. Kim, and Choi, J., "Detecting Illegally-Copied Apps on Android Devices," in IT Convergence and Security (ICITCS), 2013 International Conference on IT Convergence and Security, pp. 1-4, 2013.
- Chae, D.K., Kim, S.W., Cho, S.J. and Kim, Y., "Effective and Efficient Detection of Software Theft via Dynamic API Authority Vectors," Journal of Systems and Software, Vol. 110, pp. 1-9, 2015. https://doi.org/10.1016/j.jss.2015.08.018
- Gopal, R.D., and Sanders, G.L., “International Software Piracy: Analysis of Key Issues and Impacts,” Information Systems Research, Vol. 9, No. 4, pp. 380-397, 1998. https://doi.org/10.1287/isre.9.4.380
- Depken, C.A., and Simmons, L.C., “Social Construct and the Propensity for Software Piracy,” Applied Economics Letters, Vol. 11, No. 2, pp. 97-100, 2004. https://doi.org/10.1080/1350485042000200187
- Ki, E.J., Chang, B.H., and Khang, H., “Exploring Influential Factors on Music Piracy Across Countries,” Journal of Communication, Vol. 56, No. 2, pp. 406-426, 2006. https://doi.org/10.1111/j.1460-2466.2006.00026.x
- Moores, T. T., “An Analysis of the Impact of Economic Wealth and National Culture on the Rise and Fall of Software Piracy Rates,” Journal of Business Ethics, Vol. 81, No. 1, pp. 39-51, Jul. 2008. https://doi.org/10.1007/s10551-007-9479-0
- Leonard, L.N.K., and Cronan, T.P., “Illegal, Inappropriate, and Unethical Behavior in an Information Technology Context: A study to Explain Influences,” Journal of the Association for Information Systems, Vol. 1, No. 12, pp. 1-31, 2001.
- Gopal, R.D., and Sanders, G.L., “Global Software Piracy: You Can’t Get Blood Out of a Turnip,” Communications of the ACM, Vol. 43, No. 9, pp. 82-89, 2000. https://doi.org/10.1145/348941.349002
- Randall, D.M., and Gibson, A.M., “Ethical Decision Making in the Medical Profession: An Application of the Theory of Planned Behavior,” Journal of Business Ethics, Vol. 10, No. 2, pp. 111-122, 1991. https://doi.org/10.1007/BF00383614
- Chiu, R. K., “Ethical Judgment and Whistleblowing Intention: Examining the Moderating Role of Locus of Control,” Journal of Business Ethics, Vol. 43, No. 1, pp. 65-74, 2003. https://doi.org/10.1023/A:1022911215204
- Vitell, S.J., Singh, J.J. and Paolillo, J.G.P., “Consumers’ Ethical Beliefs: The Roles of Money, Religiosity and Attitude toward Business,” Journal of Business Ethics, Vol. 73, No. 4, pp. 369-379, Dec. 2007. https://doi.org/10.1007/s10551-006-9212-4
- Gottfredson, M., and Hirschi, T., A General Theory of Crime. Stanford University Press, 1990.
- Higgins, G.E., Wolfe, S.E. and Marcum, C.D., “Digital Piracy: An Examination of Three Measurements of Self-Control,” Deviant Behavior, Vol. 29, No. 5, pp. 440-460, Jun. 2008. https://doi.org/10.1080/01639620701598023
- Marcum, Catherine, D., Higgins, G.E., Wolfe, S.E. and Ricketts, M.L., “Examining the Intersection of Self-control, Peer Association and Neutralization in Explaining Digital Piracy,” Western Criminology Review, Vol. 12, No. 3, pp. 60-74, 2011.
- Lee, S.Y., and Lee, Y.H., “Effect of Self-Control and Rational Choice on Online Digital Piracy,” Journal of Social Science, Vol. 23, No. 3, pp. 53-78, 2016.
- Moon, B., McCluskey, J.D. and McCluskey, C.P., “A General Theory of Crime and Computer Crime: An Empirical Test,” Journal of Criminal Justice, Vol. 38, No. 4, pp. 767-772, Jul. 2010. https://doi.org/10.1016/j.jcrimjus.2010.05.003
- Hinduja, S., “A critical Examination of the Digital Music Phenomenon,” Critical Criminology, Vol. 14, No. 4, pp. 387-409, 2006. https://doi.org/10.1007/s10612-006-9006-0
- Piquero, A.R., and Bouffard, J.A., “Something Old, Something New: A Preliminary Investigation of Hirschi’s Redefined Self-Control,” Justice Quarterly, Vol. 24, No. 1, pp. 1-27, 2007. https://doi.org/10.1080/07418820701200935
- Williams, K.R., and Hawkins, R., “Perceptual Research on General Deterrence: A Critical Review,” Law and Society Review, Vol. 20, No. 4, pp. 545-572, 1986. https://doi.org/10.2307/3053466
- Peace, A.G., Galletta, D.F. and Thong, J.Y.L., “Software Piracy in the Workplace: A Model and Empirical Test,” Journal of Management Information Systems, Vol. 20, No. 1, pp. 153-177, 2003. https://doi.org/10.1080/07421222.2003.11045759
- Hunt, S.D., and Vitell, S., “A General Theory of Marketing Ethics,” Journal of Macromarketing, Vol. 6, No. 1, pp. 5-16, 1986. https://doi.org/10.1177/027614678600600103
- Thong, J.Y.L., and Yap, C.S., “Testing an Ethical Decision-Making Theory: The Case of Softlifting,” Journal of Management Information Systems, Vol. 15, No. 1, pp. 213-237, 1998. https://doi.org/10.1080/07421222.1998.11518203
- Ajzen, I., and Fishbein, M., Belief, Attitude, Intention and Behavior: An Introduction to Theory and Research. Reading, MA: Addison-Wesley, 1975.
- Ajzen I., “The Theory of Planned Behavior,” Organizational Behavior and Human Decision Processes, Vol. 50, No. 2, pp. 179-211, Dec. 1991. https://doi.org/10.1016/0749-5978(91)90020-T
- D'Astous, A., Colbert, F., and Montpetit, D., “Music Piracy on the Web-How Effective Are Anti-Piracy Arguments? Evidence from the Theory of Planned Behaviour,” Journal of Consumer Policy, Vol. 28, No. 3, pp. 289-310, 2005. https://doi.org/10.1007/s10603-005-8489-5
- Lin, T., Hsu, M.H., Kuo, F., and Sun, P., "An Intention Model-based Study of Software Piracy," in Proceedings of the 32nd Hawaii International Conference on System Sciences, Vol. 30, No. c, pp. 1-8, 1999.
- Cronan, T.P., and Al-Rafee, S., “Factors that Influence the Intention to Pirate Software and Media,” Journal of Business Ethics, Vol. 78, No. 4, pp. 527-545, Mar. 2008. https://doi.org/10.1007/s10551-007-9366-8
- Yoon, C., “Theory of Planned Behavior and Ethics Theory in Digital Piracy: An Integrated Model,” Journal of Business Ethics, Vol. 100, No. 3, pp. 405-417, Nov. 2011. https://doi.org/10.1007/s10551-010-0687-7
- Triandis, H.C., "Values, Attitudes, and Interpersonal Behavior," in Nebraska symposium on motivation, pp. 195-259, 1979.
- Limayem, M., Khalifa, M., and Chin, W.W., “Factors Motivating Software Piracy: A Longitudinal Study,” IEEE Transactions on Engineering Management, Vol. 51, No. 4, pp. 414-425, Nov. 2004. https://doi.org/10.1109/TEM.2004.835087
- Wood, W., Labrecque, J.S., Lin, P.Y., and Runger, D., "Habits in Dual Process Models", In Dual Process Theories of the Social Mind, Guilford Press New York: NY, pp. 371-385, 2014.
- Nandedkar, A., and Midha, V., “It Won’t Happen to Me: An Assessment of Optimism Bias in Music Piracy,” Computers in Human Behavior, Vol. 28, No. 1, pp. 41-48, Jan. 2012. https://doi.org/10.1016/j.chb.2011.08.009
- Lysonski, S., and Durvasula, S., “Digital Piracy of MP3s: Consumer and Ethical Predispositions,” Journal of Consumer Marketing, Vol. 25, No. 3, pp. 167-178, 2008. https://doi.org/10.1108/07363760810870662
- Hennig-Thurau, T., Henning, V., and Sattler, H., "Consumer File Sharing of Motion Pictures", Journal of Marketing, Vol. 71, No. 4, pp. 1-18, 2007. https://doi.org/10.1509/jmkg.71.4.1
- Nill, A., Schibrowsky, J., and Peltier, J., "Factors That Influence Software Piracy: A View from Germany", Communications of the ACM, Vol. 53, No. 6, pp. 131-134, 2010. https://doi.org/10.1145/1743546.1743581
- Kim, J.H., "A Study on the Predictors of Intention to Pirate Software", Journal of the Korea Society of IT Services, Vol. 12, No. 2, pp. 131-152, 2013. https://doi.org/10.9716/KITS.2013.12.2.131
- Bagozzi, R.P., "Attitudes, Intentions, and Behavior: A Test of Some Key Hypotheses.", Journal of Personality and Social Psychology, Vol. 41, No. 4, pp. 607-627, 1981. https://doi.org/10.1037/0022-3514.41.4.607
- JHair, J.F., Black, W.C., Babin, B.J., and Anderson, R.E., Multivariate data analysis, 7th ed. New Jersey: Prentice Hall, 2009.
- Chin, W. W., "The Partial Least Squares Approach to Structural Equation Modeling", Modern Methods for Business Research, Vol. 295, No. 2, pp. 295-336, 1998.
- Higgins, G.E., Wilson, A.L., and Fell, B.D., "An Application of Deterrence Theory to Software Piracy", Journal of Criminal Justice and Popular Culture, Vol. 12, No. 3, pp. 166-184, 2005.
Cited by
- 소프트웨어 불법복제에 영향을 미치는 환경 요인에 기반한 국가 분류 vol.26, pp.4, 2017, https://doi.org/10.5859/kais.2017.26.4.227