Switch to: Citations

Add references

You must login to add references.
  1. Factors that Influence the Intention to Pirate Software and Media.Timothy Paul Cronan & Sulaiman Al-Rafee - 2008 - Journal of Business Ethics 78 (4):527-545.
    This study focuses on one of the newer forms of software piracy, known as digital piracy, and uses the Theory of Planned Behavior (TPB) as a framework to attempt to determine factors that influence digital piracy (the illegal copying/downloading of copyrighted software and media files). This study examines factors, which could determine an individual’s intention to pirate digital material (software, media, etc.). Past piracy behavior and moral obligation, in addition to the prevailing theories of behavior (Theory of Planned Behavior), were (...)
    Download  
     
    Export citation  
     
    Bookmark   34 citations  
  • An attributional theory of achievement motivation and emotion.Bernard Weiner - 1985 - Psychological Review 92 (4):548-573.
    Download  
     
    Export citation  
     
    Bookmark   156 citations  
  • Predictors of Usage Intentions of Pirated Software.Ian Phau & James Ng - 2010 - Journal of Business Ethics 94 (1):23-37.
    The purpose of this study is to investigate the salient factors influencing consumers’ attitudes and usage intentions towards pirated software. Using the Theory of Planned Behaviour, this study investigates the relationships between three sets of factors, i.e. personal, social and perceived behavioural control onto attitudes towards pirated software. Through a multiple regression, only personal factors have shown significant relationship with attitudes towards software piracy. Further results from this study have supported that favourable attitudes towards pirated software is likely to result (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  • Predicting the Use of Pirated Software: A Contingency Model Integrating Perceived Risk with the Theory of Planned Behavior.Chechen Liao, Hong-Nan Lin & Yu-Ping Liu - 2010 - Journal of Business Ethics 91 (2):237-252.
    As software piracy continues to be a threat to the growth of national and global economies, understanding why people continue to use pirated software and learning how to discourage the use of pirated software are urgent and important issues. In addition to applying the theory of planned behavior (TPB) perspective to capture behavioral intention to use pirated software, this paper considers perceived risk as a salient belief influencing attitude and intention toward using pirated software. Four perceived risk components related to (...)
    Download  
     
    Export citation  
     
    Bookmark   18 citations  
  • Motivators and enablers of SCOURing: A study of online piracy in the US and UK.K. J. Shanahan & M. R. Hyman - 2010 - Journal of Business Research 63 (9):1095--1102.
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • The Antecedents of Music Piracy Attitudes and Intentions.Jyh-Shen Chiou, Chien-yi Huang & Hsin-hui Lee - 2005 - Journal of Business Ethics 57 (2):161-174.
    Piracy is the greatest threat facing the music industry worldwide today. This study developed and empirically tested a model examining the antecedents of consumer attitude and behavioral intention toward music piracy behavior. Two types of music piracy behavior, unauthorized duplication/download and pirated music product purchasing, were examined. Based on a field survey in Taiwan, the results showed that attributive satisfaction, perceived prosecution risk, magnitude of consequence, and social consensus are very important in influencing customers attitude and behavioral intention toward two (...)
    Download  
     
    Export citation  
     
    Bookmark   30 citations  
  • Ethical Decision Making in a Peer-to-Peer File Sharing Situation: The Role of Moral Absolutes and Social Consensus. [REVIEW]Connie R. Bateman, Sean Valentine & Terri Rittenburg - 2013 - Journal of Business Ethics 115 (2):229-240.
    Individuals are downloading copyrighted materials at escalating rates (Hill 2007; Siwek 2007). Since most materials shared within these networks are copyrighted works, providing, exchanging, or downloading files is considered to be piracy and a violation of intellectual property rights (Shang et al. 2008). Previous research indicates that personal moral philosophies rooted in moral absolutism together with social context may impact decision making in ethical dilemmas; however, it is yet unclear which motivations and norms contextually impact moral awareness in a peer-to-peer (...)
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
  • A review of empirical studies assessing ethical decision making in business. [REVIEW]Terry W. Loe, Linda Ferrell & Phylis Mansfield - 2000 - Journal of Business Ethics 25 (3):185 - 204.
    This article summarizes the multitude of empirical studies that test ethical decision making in business and suggests additional research necessary to further theory in this area. The studies are categorized and related to current theoretical ethical decision making models. The studies are related to awareness, individual and organizational factors, intent, and the role of moral intensity in ethical decision making. Summary tables provide a quick reference for the sample, findings, and publication outlet. This review provides insights for understanding organizational ethical (...)
    Download  
     
    Export citation  
     
    Bookmark   251 citations  
  • Why People Don’t Take their Concerns about Fair Trade to the Supermarket: The Role of Neutralisation.Andreas Chatzidakis, Sally Hibbert & Andrew P. Smith - 2007 - Journal of Business Ethics 74 (1):89-100.
    This article explores how neutralisation can explain people's lack of commitment to buying Fair Trade products, even when they identify FT as an ethical concern. It examines the theoretical tenets of neutralisation theory and critically assesses its applicability to the purchase of FT products. Exploratory research provides illustrative examples of neutralisation techniques being used in the FT consumer context. A conceptual framework and research propositions delineate the role of neutralisation in explaining the attitude-behaviour discrepancies evident in relation to consumers' FT (...)
    Download  
     
    Export citation  
     
    Bookmark   40 citations  
  • The Effect of Interpersonal Influence on Softlifting Intention and Behaviour.Jih-Hsin Tang & Cheng-Kiang Farn - 2005 - Journal of Business Ethics 56 (2):149-161.
    The purpose of this study is to investigate the effect of interpersonal influence on personal software piracy, also known as softlifting. A laboratory experiment with 54 subjects was conducted, in which each subject was told to participate in a software quality evaluation exercise. However, a ploy was carried out to measure the subjects intention in software piracy under different levels of group pressure and financial gains. The results are interesting. On the intention of softlifting, both group pressure and financial gains (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  • Theory of Planned Behavior and Ethics Theory in Digital Piracy: An Integrated Model. [REVIEW]Cheolho Yoon - 2011 - Journal of Business Ethics 100 (3):405 - 417.
    Since digital piracy has posed a significant threat to the development of the software industry and the growth of the digital media industry, it has, for the last decade, held considerable interest for researchers and practitioners. This article will propose an integrated model that combines the theory of planned behavior (TPB) and ethics theory, the two theories that are most often used in digital piracy studies. Data were obtained from university students in China, and the model was examined using the (...)
    Download  
     
    Export citation  
     
    Bookmark   20 citations  
  • Psychological Pathways to Fraud: Understanding and Preventing Fraud in Organizations. [REVIEW]Pamela R. Murphy & M. Tina Dacin - 2011 - Journal of Business Ethics 101 (4):601-618.
    In response to calls for more research on how to prevent or detect fraud (ACAP, Final Report of the Advisory Committee on the Auditing Profession, United States Department of the Treasury, Washington, DC, 2008 ; AICPA, SAS No. 99: Consideration of Fraud in a Financial Statement Audit, New York, NY, 2002 ; Carcello et al., Working Paper, University of Tennessee, Bentley University and Kennesaw State University, 2008 ; Wells, Journal of Accountancy, 2004 ), we develop a framework that identifies three (...)
    Download  
     
    Export citation  
     
    Bookmark   28 citations  
  • Why People Don’t Take their Concerns about Fair Trade to the Supermarket: The Role of Neutralisation. [REVIEW]Andreas Chatzidakis, Sally Hibbert & Andrew P. Smith - 2007 - Journal of Business Ethics 74 (1):89 - 100.
    This article explores how neutralisation can explain people's lack of commitment to buying Fair Trade (FT) products, even when they identify FT as an ethical concern. It examines the theoretical tenets of neutralisation theory and critically assesses its applicability to the purchase of FT products. Exploratory research provides illustrative examples of neutralisation techniques being used in the FT consumer context. A conceptual framework and research propositions delineate the role of neutralisation in explaining the attitude-behaviour discrepancies evident in relation to consumers' (...)
    Download  
     
    Export citation  
     
    Bookmark   40 citations  
  • Softlifting: Exploring Determinants of Attitude.Tim Goles, Bandula Jayatilaka, Beena George, Linda Parsons, Valrie Chambers, David Taylor & Rebecca Brune - 2008 - Journal of Business Ethics 77 (4):481-499.
    Softlifting, or the illegal duplication of copyrighted software by individuals for personal use, is a serious and costly problem for software developers and distributors. Understanding the factors that determine attitude toward softlifting is important in order to ascertain what motivates individuals to engage in the behavior. We examine a number of factors, including personal moral obligation (PMO), perceived usefulness, and awareness of the laws and regulations governing software acquisition and use, along with facets of personal self-identity that may play a (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  • Neutralization theory and online software piracy: An empirical analysis. [REVIEW]Sameer Hinduja - 2007 - Ethics and Information Technology 9 (3):187-204.
    Accompanying the explosive growth of information technology is the increasing frequency of antisocial and criminal behavior on the Internet. Online software piracy is one such behavior, and this study approaches the phenomenon through the theoretical framework of neutralization theory. The suitability and applicability of nine techniques of neutralization in determining the act is tested via logistic regression analyses on cross-sectional data collected from a sample of university students in the United States. Generally speaking, neutralization was found to be weakly related (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  • Ripped from the Headlines: What can the Popular Press Teach us about Software Piracy?Shariffah Zamoon & Shawn P. Curley - 2008 - Journal of Business Ethics 83 (3):515-533.
    Software piracy is an instance of unauthorized duplication of information goods where laws and norms are not agreed-upon. This article presents a content analysis of articles from the five highest circulating U.S. newspapers 1989-2004 as evidence of the prevailing social environment surrounding software piracy. The rationales in the news articles are analyzed as evidence of the social and psychological underpinnings of attitudes toward software piracy. An expanded version of Sykes and Matza's (American Sociological Review 22, 664-670, 1957); Zamoon and Curley (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Ethical Decisions About Sharing Music Files in the P2P Environment.Rong-An Shang, Yu-Chen Chen & Pin-Cheng Chen - 2008 - Journal of Business Ethics 80 (2):349-365.
    Digitized information and network have made an enormous impact on the music and movie industries. Internet piracy is popular and has greatly threatened the companies in these industries. This study tests Hunt-Vitell’s ethical decision model and attempts to understand why and how people share unauthorized music files with others in the peer-to-peer (P2P) network. The norm of anti-piracy, the ideology of free software, the norm of reciprocity, and the ideology of consumer rights are proposed as four deontological norms related to (...)
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
  • Investigating Software Piracy in Jordan: An Extension of the Theory of Reasoned Action. [REVIEW]Hassan Aleassa, John Michael Pearson & Scott McClurg - 2011 - Journal of Business Ethics 98 (4):663-676.
    Software piracy, the illegal and unauthorized duplication, sale, or distribution of software, is a widespread and costly phenomenon. According to Business Software Alliance, over 41% of the PC software packages installed worldwide were unauthorized copies. Software piracy behavior has been investigated for more than 30 years. However, after a review of the relevant literature, there appears to be two voids in this literature: a lack of studies in non-Western countries and a scarcity of process studies. This study contributes to literature (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  • An Analysis of the Factor Structure of Jones’ Moral Intensity Construct.Joan M. McMahon & Robert J. Harvey - 2006 - Journal of Business Ethics 64 (4):381-404.
    In 1991, Jones developed an issue-contingent model of ethical decision making in which moral intensity is posited to affect the four stages of Rest's 1986 model. Jones claimed that moral intensity, which is "the extent of issue-related moral imperative in a situation", consists of six characteristics: magnitude of consequences, social consensus, probability of effect, temporal immediacy, proximity, and concentration of effect. This article reports the findings of two studies that analyzed the factor structure of moral intensity, operationalized by a 12-item (...)
    Download  
     
    Export citation  
     
    Bookmark   43 citations