1 |
김찬우, 정광호, "불법 소프트웨어 이용에 대한 인식 유형 분석," 한국사회와 행정연구, 제26권, 제4호, 2016, pp. 219-244.
|
2 |
김헌수, "소프트웨어산업이 한국경제에 미치는 영향과 소프트웨어 불법복제 결정요인," 사회과학연구, 제10권, 제1호, 2004, pp. 107-122.
|
3 |
노경수, 심완준, 신호균, "TPB, TIB 및 중화기술의 통합적 모형에 의한 디지털 영상물 불법복제 의도에 관한 연구," 정보시스템연구, 제23권, 제4호, 2014, pp. 197-219.
|
4 |
유병국, "인터넷 불법복제에 따른 독점기업의 가격전략," 인터넷전자상거래연구, 제10권, 제2호, 2010, pp. 25-39.
|
5 |
전진환, 김종기, "소프트웨어 품질인지에 따른 불법복제에 대한 사용자 인지 비교," 인터넷전자상거래연구, 제9권, 제2호, 2009, pp. 1-23.
|
6 |
Peace, A.G., Galletta, D.F., and Thong, J.Y.L., "Software Piracy in the Workplace: A Model and Empirical Test," Journal of Management Information Systems, Vol. 20, No. 1, 2003, pp. 153-177.
DOI
|
7 |
Ronkainen, I.A., and Guerrero-Cusumano, J.-L., "Correlates of Intellectual Property Violation," Multinational Business Review, Vol. 9, No. 1, 2001, pp. 59-65.
|
8 |
강주희, 문태수, "소셜커머스의 경제적 가치와 정보품질이 재구매의도에 미치는 영향: 동기이론을 기반으로," 정보시스템연구, 제26권, 제2호, 2017, pp. 63-83.
|
9 |
김도영, 남재현, 전성훈, 정진화, "불법복제 감소의 경제적 효과," 한국경제연구, 제29권, 제1호, 2011, pp. 199-231.
|
10 |
김재전, 박경자, "디지털콘텐츠 저작권인식 및 지불의사의 영향요인: 기술적 규범의 조절효과를 중심으로," 인터넷전자상거래연구, 제17권, 제1호, 2017, pp. 259-277.
|
11 |
김종기, 전진환, "사회유대가 소프트웨어 불법복제에 미치는 영향에 관한 연구," 인터넷전자상거래연구, 제7권, 제4호, 2007, pp. 45-68.
|
12 |
김중한, "소프트웨어 불법복제 의도에 미치는 영향요인에 관한 연구," 한국IT서비스학회지, 제12권, 제2호, 2013, pp. 131-152.
DOI
|
13 |
최은지, 김광용, "온라인 디지털 불법복제 단속이 불법복제 의도에 미치는 영향에 관한 연구," 계간 저작권, 제22권, 제2호, 2009, pp. 25-49.
|
14 |
최은지, 한상호, 김광용, "S/W불법복제와 디지털 음반 불법복제의 행동 비교분석," 사회과학논총, 제10집, 2008, pp. 165-191.
|
15 |
한윤환, "소프트웨어 산업과 특허: 법적 진화와 경제적 쟁점," 한국산업정보학회논문지, 제15권, 제2호, 2010, pp. 99-113.
|
16 |
김중한, "PC소프트웨어 불법사용에 대한 태도와 습관이 스마트폰 앱 불법복제에 미치는 영향," 한국산업정보학회논문지, 제22권, 제3호, 2017, pp. 49-61.
DOI
|
17 |
Ajzen, I., "The Theory of Planned Behavior," Organizational Behavior and Human Decision Processes, Vol. 50, No. 2, 1991, pp. 179-211.
DOI
|
18 |
Bagchi, K., Kirs, P., and Cerveny, R., "Global Software Piracy: Can Economic Factors Alone Explain the Trend?" Communications of the ACM, Vol. 49, No. 6, 2006, pp. 70-75.
DOI
|
19 |
Bardhan, P., "Corruption and Development: A Review of Issues," Journal of Economic Literature, Vol. 35, No. 3, 1997, pp. 1320-1346.
|
20 |
BSA, Shadow Market: 2011 BSA Global Software Piracy Study, 2012, Available: http://globalstudy.bsa.org/2011/.
|
21 |
Cheng, H.K., Sims, R.R., and Teegen, H., "To Purchase or to Pirate Software: An Empirical Study," Journal of Management Information Systems, Vol. 13, No. 4, 1997, pp. 49-60.
DOI
|
22 |
Gopal, R.D., and Sanders, G.L., "Global Software Piracy: You Can't Get Blood Out of a Turnip," Communications of the ACM, Vol. 43, No. 9, 2000, pp. 83-89.
DOI
|
23 |
Cronan, T.P., and Al-Rafee, S., "Factors That Influence the Intention to Pirate Software and Media," Journal of Business Ethics, Vol. 78, No. 4, 2008, pp. 527-545.
DOI
|
24 |
Curtis, D., "Software Piracy and Copyright Protection," Proceedings of WESCON '94, Anaheim: CA, 1994, pp. 199-203.
|
25 |
Davis, F.D., Bagozzi, R.P., and Warshaw, P.R., "User Acceptance of Computer Technology: A Comparison of Two Theoretical Models," Management Science, Vol. 35, No. 8, 1989, pp. 982-1003.
DOI
|
26 |
Gopal, R.D., and Sanders, G.L., "International Software Piracy: Analysis of Key Issues and Impacts," Information Systems Research, Vol. 9, No. 4, 1998, pp. 380-397.
DOI
|
27 |
BSA, Seizing Opportunity through License Compliance: BSA Global Software Survey, 2016, Available: http://globalstudy.bsa.org/2016/index.html.
|
28 |
Hair, J.F., Black, W.C., Babin, B.J., and Anderson, R.E., Multivariate Data Analysis: A Global Perspective, 7th Ed., New Jersey, Pearson Prentice Hall, 2010.
|
29 |
Higgins, G.E., Wilson, A.L., and Fell, B.D., "An Application of Deterrence Theory to Software Piracy," Journal of Criminal Justice and Popular Culture, Vol. 12, No. 3, 2005, pp. 166-184.
|
30 |
INSEAD, Competitive Advantage: The Economic Impact of Properly Licensed Software, BSA, 2013, Available: http://portal.bsa.org/insead/index.html.
|
31 |
Mishra, A., Akman, I., and Yazici, A., "Organizational Software Piracy: An Empirical Assessment," Behaviour & Information Technology, Vol. 26, No. 5, 2007, pp. 437-444.
DOI
|
32 |
Leonard, L.N.K., and Cronan, T.P., "Illegal, Inappropriate, and Unethical Behavior in an Information Technology Context: A Study to Explain Influences," Journal of the Association for Information Systems, Vol. 1, No. 1, 2001, pp. 1-28.
|
33 |
Lin, T.-C., Hsu, M.H., Kuo, F.-Y., and Sun, P.-C., "An Intention Model-Based Study of Software Piracy," Proceedings of the 32nd Hawaii International Conference on System Sciences, Maui: HI, 1999, pp. 1-8.
|
34 |
Marron, D.B., and Steel, D.G., "Which Countries Protect Intellectual Property? The Case of Software Piracy," Economic Inquiry, Vol. 38, No. 2, 2000, pp. 159-174.
DOI
|
35 |
Moon, B., McCluskey, J.D., and McCluskey, C.P., "A General Theory of Crime and Computer Crime: An Empirical Test," Journal of Criminal Justice, Vol. 38, No. 4, 2010, pp. 767-772.
DOI
|
36 |
Moores, T., and Dhillon, G., "Software Piracy: A View from Hong Kong," Communications of the ACM, Vol. 43, No. 12, 2000, pp. 88-93.
DOI
|
37 |
Nill, A., Schibrowsky, J., and Peltier, J.W., "Factors That Influence Software Piracy: A View from Germany," Communications of the ACM, Vol. 53, No. 6, 2010, pp. 131-134.
DOI
|
38 |
Ostergard, R.L., "The Measurement of Intellectual Property Rights Protection," Journal of International Business Studies, Vol. 31, No. 2, 2000, pp. 349-360.
DOI
|
39 |
Siponen, M., Vance, A., and Willison, R., "New Insights into the Problem of Software Piracy: The Effects of Neutralization, Shame, and Moral Beliefs," Information & Management, Vol. 49, No. 7-8, 2012, pp. 334-341.
DOI
|
40 |
Shin, S.K., Gopal, R.D., Sanders, G.L., and Whinston, A.B., "Global Software Piracy Revisited," Communications of the ACM, Vol. 47, No. 1, 2004, pp. 103-107.
DOI
|
41 |
Swinyard, W.R., Rinne, H., and Kau, A.K., "The Morality of Software Piracy: A Cross-Cultural Analysis," Journal of Business Ethics, Vol. 9, No. 8, 1990, pp. 655-664.
DOI
|
42 |
Yang, D., "The Impact of Business Environments on Software Piracy," Technology in Society, Vol. 29, No. 1, 2007, pp. 121-141.
DOI
|
43 |
Yoon, C., "Theory of Planned Behavior and Ethics Theory in Digital Piracy: An Integrated Model," Journal of Business Ethics, Vol. 100, No. 3, 2011, pp. 405-417.
DOI
|