2006
DOI: 10.2307/25148722
|View full text |Cite
|
Sign up to set email alerts
|

Ethical Decision Making in Software Piracy: Initial Development and Test of a Four-Component Model

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

10
167
3
5

Year Published

2008
2008
2024
2024

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 233 publications
(185 citation statements)
references
References 44 publications
10
167
3
5
Order By: Relevance
“…Based on the data gathered from surveys of 226 distance computing students, Van Der Merwe (2006) found that younger distance computing students softlift more than older distance comput-ing students. Moores and Chang (2006) studied 243 students and found significant differences in the ethical decision making in software piracy process based on age. Results of a study conducted by Peslak (2007) showed that older individuals more readily follow ethical norms regarding copying others' software.…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…Based on the data gathered from surveys of 226 distance computing students, Van Der Merwe (2006) found that younger distance computing students softlift more than older distance comput-ing students. Moores and Chang (2006) studied 243 students and found significant differences in the ethical decision making in software piracy process based on age. Results of a study conducted by Peslak (2007) showed that older individuals more readily follow ethical norms regarding copying others' software.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Even though the majority of the studies found that male students are more likely to pirate software than female students, some studies didn't find the same result. For example, Moores and Chang (2006) found that male and female students interpret the act of software piracy similarly. Van der Byl and Van Belle (2008) didn't find statistically significant relationship between gender and digital piracy.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Many of the factors identified in their work have been included in follow-up research to suggest strategies to enhance customer retention by addressing intentions to use legal software [57,79,101]. These strategies include pricing, communication, and legal actions, among others, to mitigate piracy [30,77]. We experimentally test advice as an educational strategy in our paper, moving beyond conjecture in the prior literature.…”
Section: Related Digital Piracy Literaturementioning
confidence: 99%
“…In the text, works are cited as follows: author's last name and year, without comma, in parentheses. For example: one author, (Parenty 2007); two authors, (Moores and Chang 2006); three or more authors, (Kulatilaka et al 1999); more than one work cited, (Parenty 2007;Moores and Chang 2006); with two works by the same author(s), (Baiman andRajan 2002a, 2002b). 2.…”
Section: Data Availabilitymentioning
confidence: 99%