1 |
Phau, I. and J. Liang, "Downloading digital video games : predictors, moderators and consequences", Mark. Intell. Plan., Vol.30, No.7(2012), pp.740-756.
DOI
ScienceOn
|
2 |
Piquero, N. L. and A. R. Piquero, "Democracy and intellectual property : Examining trajectories of software piracy", Ann. Am. Acad. Pol. Soc. Sci., Vol.605, No.1(2006), pp. 104-127.
DOI
|
3 |
Randall, D. M. and A. M. Gibson, "Ethical decision making in the medical profession : An application of the theory of planned behavior", J. Bus. Ethics, Vol.10, No.2(1991), pp.111-122.
DOI
ScienceOn
|
4 |
Sykes, G. M. and D. Matza, "Techniques of neutralization : A theory of delinquency", Am. Sociol. Rev., Vol.22, No.6(1957), pp.664-670.
DOI
ScienceOn
|
5 |
Thong, J. Y. L. and C.-S. Yap, "Testing an Ethical Decision-Making Theory : The Case of Softlifting", J. Manag. Inf. Syst., Vol.15, No.1(1998), pp.213-237.
DOI
|
6 |
Triandis, H. C., "Values, attitudes, and interpersonal behavior", in Nebraska symposium on motivation, 1980.
|
7 |
van Kranenburg, H. and A. Hogenbirk, "Multimedia, entertainment, and business software copyright piracy : A cross-national study", J. media Econ., Vol.18, No.2(2005), pp.109-129.
DOI
ScienceOn
|
8 |
Vitell, S. J., J. J. Singh, and J. G. P. Paolillo, "Consumers'Ethical Beliefs : The Roles of Money, Religiosity and Attitude toward Business", J. Bus. Ethics, Vol.73, No.4(2007), pp.369-379.
DOI
|
9 |
Williams, K. R. and R. Hawkins, "Perceptual research on general deterrence : A critical review", Law Socy Rev., Vol.20(1986), p.545.
DOI
ScienceOn
|
10 |
Yoon, C., "Theory of Planned Behavior and Ethics Theory in Digital Piracy : An Integrated Model", J. Bus. Ethics, Vol.100, No.3 (2011), pp.405-417.
DOI
ScienceOn
|
11 |
Jeong, Y.-S., Y.-U. Park, J.-C. Moon, S.-J. Cho, D. Kim, and M. Park, "An anti-piracy mechanism based on class separation and dynamic loading for Android applications", in Proceedings of the 2012 ACM Research in Applied Computation Symposium, (2012), pp.328-332.
|
12 |
Ki, E. J. B. H. Chang, and H. Khang, "Exploring influential factors on music piracy across countries", J. Commun., Vol.56, No.2 (2006), pp.406-426.
DOI
ScienceOn
|
13 |
Kim, E., S. Kim, and J. Choi, "Detecting Illegally-Copied Apps on Android Devices", in IT Convergence and Security (ICITCS), International Conference on, (2013), pp.1-4.
|
14 |
Marcum, D., Catherine, G. E. Higgins, S. E. Wolfe, and L. Ricketts, Melissa, "Examining the Intersection of Self-control, Peer Association and Neutralization in Explaining Digital Piracy", West. Crim. Rev., Vol.12, No.3 (2011), pp.60-74.
|
15 |
Leonard, L. N. K. and T. P. Cronan, "Illegal, inappropriate, and unethical behavior in an information technology context : A study to explain influences", J. Assoc. Inf. Syst., Vol.1, No.12(2001), pp.1-31.
|
16 |
Limayem, M., M. Khalifa, and W. W. Chin, "Factors Motivating Software Piracy : A Longitudinal Study", IEEE Trans. Eng. Manag., Vol.51, No.4(2004), pp.414-425.
DOI
ScienceOn
|
17 |
Lin, T. M. H. Hsu, F. Kuo, and P. Sun, "An Intention Model-based Study of Software Piracy", in Proceedings of the 32nd Hawaii International Conference on System Sciences, Vol.30(1999).
|
18 |
Moon, B., J. D. McCluskey, and C. P. Mc-Cluskey, "A general theory of crime and computer crime : An empirical test", J. Crim. Justice, Vol.38, No.4(2010), pp.767-772.
DOI
ScienceOn
|
19 |
Moores, T. T., "An Analysis of the Impact of Economic Wealth and National Culture on the Rise and Fall of Software Piracy Rates", J. Bus. Ethics, Vol.81, No.1(2008), pp. 39-51.
DOI
|
20 |
Morris, R. G. and G. E. Higgins, "Neutralizing Potential and Self-Reported Digital Piracy : A Multitheoretical Exploration Among College Undergraduates", Crim. Justice Rev., Vol.34, No.2(2008), pp.173-195.
|
21 |
Nandedkar, A. and V. Midha, "It won't happen to me : An assessment of optimism bias in music piracy", Comput. Human Behav., Vol.28, No.1(2012), pp.41-48.
DOI
ScienceOn
|
22 |
Peace, A. G., D. F. Galletta, and J. Y. L. Thong, "Software Piracy in the Workplace : A Model and Empirical Test", J. Manag. Inf. Syst., Vol.20, No.1(2003), pp.153-177.
DOI
|
23 |
Forbes, "Google Play Catching Up To Apple's App Store", Forbes, 2013, [Online] Available : http://www.forbes.com/sites/chuckjones/2013/12/19/google-play-catching-up-to-apples-app-store.
|
24 |
Cronan, T. P. and S. Al-Rafee, "Factors that Influence the Intention to Pirate Software and Media", J. Bus. Ethics, Vol.78, No.4 (2008), pp.527-545.
DOI
ScienceOn
|
25 |
De Castro, J. O. D. B. Balkin, and D. A. Shepherd, "Can entrepreneurial firms benefit from product piracy?", J. Bus. Ventur., Vol.23, No.1(2008), pp.75-90.
DOI
ScienceOn
|
26 |
Depken, C. A. and L. C. Simmons, "Social construct and the propensity for software piracy", Appl. Econ. Lett., Vol.11, No.2(2004), pp.97-100.
DOI
ScienceOn
|
27 |
Fraedrich, J. P. and O. C. Ferrell, "The impact of perceived risk and moral philosophy type on ethical decision making in business organizations", J. Bus. Res., Vol.24, No.4 (1992), pp.283-295.
DOI
ScienceOn
|
28 |
Gartner, "Key Trends for the Mobile Industry", Gartner Conference Report, (2013), [Online] Available : http://www.gartner.com/newsroom/id/2592315.
|
29 |
Gopal, R. D. and G. L. Sanders, "Global software piracy : you can't get blood out of a turnip", Commun. ACM, Vol.43, No.9(2000), pp.82-89.
|
30 |
Gopal, R. D. and G. L. Sanders, "International software piracy : Analysis of key issues and impacts", Inf. Syst. Res., Vol.9, No.4 (1998), pp.380-397.
DOI
ScienceOn
|
31 |
Gottfredson, M. and T. Hirschi, A general theory of crime. Stanford University Press, 1990.
|
32 |
Hair, J. F., W. C. Black, B. J. Babin, and R. E. Anderson, Multivariate data analysis, 7th ed, New Jersey : Prentice Hall, 2009.
|
33 |
Anderson, J. C. and D. W. Gerbing, "Structural equation modeling in practice : A review and recommended two-step approach", Psychol. Bull., Vol.103, No.3(1988), p.411.
DOI
|
34 |
Hinduja, S., "Neutralization theory and online software piracy : An empirical analysis", Ethics Inf. Technol., Vol.9, No.3(2007), pp.187-204.
DOI
|
35 |
Hunt, S. D. and S. Vitell, "A general theory of marketing ethics", J. macromarketing, Vol.6, No.1(1986), pp.5-16.
DOI
|
36 |
Ingram, J. R. and S. Hinduja, "Neutralizing Music Piracy : An Empirical Examination", Deviant Behav., Vol.29, No.4(2008), pp.334-366.
DOI
ScienceOn
|
37 |
"Apple App Store Has Lost $450 Million To Piracy", 24/7 Wall Street, 2010[Online], Available : http://247wallst.com/apps-software/2010/01/13/apple-app-store-has-lost-450-million-to-piracy.
|
38 |
Bagchi, K., P. Kirs, and R. Cerveny, "Global Software Piracy : Can Economic Factors Along Explain the Trend?", Commun. ACM, Vol.49, No.6(2006), pp.70-75.
DOI
ScienceOn
|
39 |
Bandura, A., Social foundations of thought and action : A social cognitive theory, Prentice-Hall, Inc, 1986.
|
40 |
Beck, L. and I. Ajzen, "Predicting dishonest actions using the theory of planned behavior", J. Res. Pers., Vol.25, No.3(1991), pp.285-301.
DOI
|
41 |
Business Insider, "One In Every 5 People In The World Own A Smartphone", 2013[Online] Available : http://www.businessinsider.com/smartphone-and-tablet-penetration-2013-10#ixzz2y9qsuMDw.
|
42 |
Chen, Y.-C. R.-A. Shang, and A.-K. Lin, "The intention to download music files in a P2P environment : Consumption value, fashion, and ethical decision perspectives", Electron. Commer. Res. Appl., Vol.7, No.4(2008), pp.411-422.
DOI
ScienceOn
|
43 |
Compeau, D. R. and C. A. Higgins, "Computer self-efficacy : Development of a measure and initial test.", MIS Q., Vol.19, No.2 (1995).
|
44 |
Cheng, H. K., R. R. Sims, and H. Teegen, "To purchase or to pirate software : an empirical study", J. Manag. Inf. Syst., Vol.13, No.4(1997), pp.49-60.
DOI
|
45 |
CNET, "How piracy ruins it for paid apps", CNET, 2011, [Online] Available : http://www.cnet.com/news/how-piracy-ruins-it-forpaid-apps-inside-apps/, [Accessed : 12-Dec-2013].
|
46 |
CNN Money, "Mobile apps overtake PC Internet usage in U. S.", CNN Money, 2014, [Online] Available : http://money.cnn.com/2014/02/28/technology/mobile/mobile-appsinternet.
|
47 |
정상철(한국문화관경연구원), "(요약) 콘텐츠 불법복제 감소가 국가경제에 미치는 경제적 파급효과에 관한 연구", 2011.
|
48 |
한국저작권위원회, "스마트 기기를 통한 저작권 침해 실태조사 및 대응방안 연구", 2011.
|
49 |
Ajzen, I. and M. Fishbein, Belief, attitude, intention and behavior : An introduction to theory and research, Reading : Addison-Wesley, 1975.
|
50 |
Ajzen, I., "Perceived Behavioral Control, Self-Efficacy, Locus of Control, and the Theory of Planned Behavior", J. Appl. Soc. Psychol., Vol.32, No.4(2002), pp.665-683.
DOI
ScienceOn
|
51 |
Ajzen, I., "The theory of planned behavior", Organ. Behav. Hum. Decis. Process., Vol. 50, No.2(1991), pp.179-211.
DOI
|
52 |
Chiu, R. K., "Ethical Judgment and Whistleblowing Intention : Examining the Moderating Role of Locus of Control", J. Bus. Ethics, Vol.43(2003), pp.65-74.
DOI
|
53 |
D'Astous, A., F. Colbert, and D. Montpetit, "Music piracy on the web-how effective are anti-piracy arguments? Evidence from the theory of planned behaviour", J. Consum. Policy, Vol.28, No.3(2005), pp.289-310.
DOI
ScienceOn
|
54 |
Bezmen, T. L. and C. A. Depken, "Influences on software piracy : Evidence from the various United States", Econ. Lett., Vol.90, No.3 (2006), pp.356-361.
DOI
ScienceOn
|