Switch to: Citations

Add references

You must login to add references.
  1. A theory of human motivation.A. H. Maslow - 1943 - Psychological Review 50 (4):370-396.
    Download  
     
    Export citation  
     
    Bookmark   366 citations  
  • Theory Building.Robert Dubin - 1970 - Philosophy and Phenomenological Research 31 (2):309-310.
    Download  
     
    Export citation  
     
    Bookmark   19 citations  
  • The effects of attitudinal and demographic factors on intention to buy pirated CDs: The case of Chinese consumers.Kenneth K. Kwong, Oliver H. M. Yau, Jenny S. Y. Lee, Leo Y. M. Sin & C. B. Alan - 2003 - Journal of Business Ethics 47 (3):223-235.
    Download  
     
    Export citation  
     
    Bookmark   21 citations  
  • Toward a profile of student software piraters.Ronald R. Sims, Hsing K. Cheng & Hildy Teegen - 1996 - Journal of Business Ethics 15 (8):839 - 849.
    Efforts to counter software piracy are an increasing focus of software publishers. This study attempts to develop a profile of those who illegally copy software by looking at undergraduate and graduate students and the extent to which they pirate software. The data indicate factors that can be used to profile the software pirater. In particular, males were found to pirate software more frequently than females and older students more than younger students, based on self-reporting.
    Download  
     
    Export citation  
     
    Bookmark   37 citations  
  • Software piracy: Is it related to level of moral judgment?Jeanne M. Logsdon, Judith Kenner Thompson & Richard A. Reid - 1994 - Journal of Business Ethics 13 (11):849 - 857.
    The possible relationship between widespread unauthorized copying of microcomputer software (also known as software piracy) and level of moral judgment is examined through analysis of over 350 survey questionnaires that included the Defining Issues Test as a measure of moral development. It is hypothesized that the higher one''s level of moral judgment, the less likely that one will approve of or engage in unauthorized copying. Analysis of the data indicate a high level of tolerance toward unauthorized copying and limited support (...)
    Download  
     
    Export citation  
     
    Bookmark   31 citations  
  • Situational determinants of software piracy: An equity theory perspective. [REVIEW]Richard S. Glass & Wallace A. Wood - 1996 - Journal of Business Ethics 15 (11):1189 - 1198.
    Software piracy has become recognized as a major problem for the software industry and for business. One research approach that has provided a theoretical framework for studying software piracy has been to place the illegal copying of software within the domain of ethical decision making assumes that a person must be able to recognize software piracy as a moral issue. A person who fails to recognize a moral issue will fail to employ moral decision making schemata. There is substantial evidence (...)
    Download  
     
    Export citation  
     
    Bookmark   56 citations  
  • Softlifting: A model of motivating factors. [REVIEW]Penny M. Simpson, Debasish Banerjee & Claude L. Simpson - 1994 - Journal of Business Ethics 13 (6):431 - 438.
    Softlifting (software piracy by individuals) is an unethical behavior that pervades today''s computer dependent society. Since a better understanding of underlying considerations of the behavior may provide a basis for remedy, a model of potential determinants of softlifting behavior is developed and tested. The analysis provides some support for the hypothesized model, specifically situational variables, such as delayed acquisition times, and personal gain variables, such as the challenge of copying, affect softlifting behavior. Most importantly, the analysis indicated that ethical perception (...)
    Download  
     
    Export citation  
     
    Bookmark   42 citations  
  • Collecting "sensitive" data in business ethics research: A case for the unmatched count technique (UCT). [REVIEW]Dan R. Dalton, Catherine M. Daily & James C. Wimbush - 1997 - Journal of Business Ethics 16 (10):1049-1057.
    Some would argue that the more promising areas of business ethics research are "sensitive." In such areas, it would be expected that subjects, if inclined to respond at all, would be guarded in their responses, or respond inaccurately. We provide an introduction to an empirical approach -- the unmatched block count (UCT) -- for collecting these potentially sensitive data which provides absolute anonymity and confidentiality to subjects and "legal immunity" to the researcher. Interestingly, under UCT protocol researchers could not divulge (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  • Trends and patterns among online software pirates.Sameer Hinduja - 2003 - Ethics and Information Technology 5 (1):49-61.
    Computer crime on the Internet poses asignificant threat to the well-being ofbusinesses and individuals, and none are immunefrom the repercussions that can result. Onetype of this unethical and unlawful activity isonline software piracy. In this work, thesignificance of piracy as a topic for academicinquiry is first presented, followed by asummary of the conflicting stances on thisissue. Then, a review of scholarly literaturepreviously conducted in this area is given toprovide a backdrop for the current research. Univariate and bivariate findings from aquantitative (...)
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
  • The Effects of Attitudinal and Demographic Factors on Intention to Buy Pirated CDs: The Case of Chinese Consumers. [REVIEW]Kenneth Kwong, Oliver Yau, Jenny Lee, Leo Sin & Alan Tse - 2003 - Journal of Business Ethics 47 (3):223 - 235.
    This study examines the impact of attitude toward piracy on intention to buy pirated CDs using Chinese samples. Attitude toward piracy is measured by a multi-item scale that has been shown to have a consistent factor structure with four distinct components, namely, social cost of piracy, anti-big business attitude, social benefit of dissemination, and ethical belief. Our findings reveal that social benefit of dissemination and anti-big business attitude have a positive relationship with intention to buy pirated CDs while social cost (...)
    Download  
     
    Export citation  
     
    Bookmark   25 citations  
  • Computer ethics: The role of personal, informal, and formal codes. [REVIEW]Margaret Anne Pierce & John W. Henry - 1996 - Journal of Business Ethics 15 (4):425 - 437.
    Ethical decisions related to computer technology and computer use are subject to three primary influences: (1) the individual's own personal code (2) any informal code of ethical behavior that exists in the work place, and (3) exposure to formal codes of ethics. The relative importance of these codes, as well as factors influencing these codes, was explored in a nationwide survey of information system (IS) professionals. The implications of the findings are important to educators and employers in the development of (...)
    Download  
     
    Export citation  
     
    Bookmark   26 citations  
  • Collecting "Sensitive" Data in Business Ethics Research: A Case for the Unmatched Count Technique (UCT).D. R. Dalton, C. M. Daily & J. C. Wimbush - 1997 - Journal of Business Ethics 16 (10):1049-1057.
    Some would argue that the more promising areas of business ethics research are "sensitive." In such areas, it would be expected that subjects, if inclined to respond at all, would be guarded in their responses, or respond inaccurately. We provide an introduction to an empirical approach -- the unmatched block count (UCT) -- for collecting these potentially sensitive data which provides absolute anonymity and confidentiality to subjects and "legal immunity" to the researcher. Interestingly, under UCT protocol researchers could not divulge (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation