参考文献
|
-
商業軟體聯盟 (2008), "2007 年台灣軟體盜版率降至40%,Retrieved Aug. 2008, from http://w3.bsa.org/taiwan/press/newsreleases/globalstudypr.cfm
-
資策會FIND(2008), "2007年12月底止台灣上網人口" , Retrieved Aug. 2008, from http://www.find.org.tw/find/home.aspx?page=many&id=193
-
Ajzen, T.(1991).The theory of planned behavior.Organizational Behavior and Human Decision Processes,50(2),179-211.
-
Akaah, I. P.,Lund, D.(1994).The influence of personal and organizational values on marketing professions' ethical behavior.Journal of business ethics,13(6),417-430.
-
Al-Rafee, S.,Cronan, T. P.(2006).Digital piracy: factors that influence attitude toward behavior.Journal of Business Ethics,63(3),237-259.
-
Anderson, J. C.,Gerbing, D. W.(1988).Structural equation modeling in practice: a review and recommended two-step approach.Psychological Bulletin,103(3),411-423.
-
Bauer, R. A.(1960).Consumer behavior as risk taking.Proceedings of the 43rd National Conference of the American Marketing Association
-
Beck, L.,Ajzen, I.(1991).Predicting dishonest actions using the theory of planned behavior.Journal of Research in Personality,25,285-301.
-
Campbell, M. C.,Goodstein, R. C.(2001).The moderating effect of perceived risk on consumers' evaluations of product incongruity: preference for the norm.Journal of Consumer Research,28(3),439-449.
-
Chang, M. K.(1998).Predicting unethical behavior: a comparison of the theory of reasoned action and the theory of planned behavior.Journal of Business Ethics,17(16),1825-1834.
-
Chen, Y.-C.,Shang, R.-A.,Lin, A.-K.(2008).The intention to download music files in a P2P environment: consumption value, fashion, and ethical decision perspectives.Electronic Commerce Research and Applications,7(4),411-422.
-
Cheng, H. K.,Sims, R. R.,Teegen, H.(1997).To purchase or to pirate software: an empirical study.Journal of Management Information Systems,13(4),49-60.
-
Chiou, J.-S.,Huang, C.-y.,Lee, H.-h.(2005).The antecedents of music piracy attitudes and intentions.Journal of Business Ethics,57(2),161-174.
-
Cox, D. F.(ed.)(1967).Risk Taking and Information Handling in Consumer Behavior.Boston:Harvard University Press.
-
Cronan, T. P.,Al-Rafee, S.(2008).Factors that influence the intention to pirate software and media.Journal of Business Ethics,78(4),527-545.
-
Featherman, M. S.,Pavlou, P. A.(2003).Predicting c-services adoption: a perceived risk facets perspective.International Journal of Human-Computer Studies,59(4),451-474.
-
Fishbein, M.,Ajzen, I.(1975).Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research.Reading, MA:Addison-Wesley.
-
Fornell, C.,Larcker, D. F.(1981).Evaluating structural equation models with unobservable variables and measurement error.Journal of Marketing Research,18(1),39-50.
-
Gefen, D.,Straub, D. W.,Boudreau, M.(2000).Structural equation modeling and regression: guidelines for research practice.Communications of the Association for Information Systems,4(7),1-70.
-
Gopal, R. D.,Sanders, G. L.(1998).International software piracy: analysis of key issues and impacts.Information Systems Research,9(4),380-397.
-
Gopal, R. D.,Sanders, G. L.(2000).Global software piracy: you can't get blood out of a turnip.Communications of the ACM,43(9),83-89.
-
Gorsuch, R. L.,Ortberg, J.(1983).Moral obligation and attitudes: their relation to behavioral intentions.Journal of Personality and Social Psychology,44(5),1025-1028.
-
Hair, J. F.,Anderson, R. E.,Tatham, R. L.,Black, W. C.(1998).Multivariate Data Analysis.Upper Saddle River, NJ:Prentice-Hall.
-
Husted, B. W.(2000).The impact of national culture on software piracy.Journal of Business Ethics,26(3),197-211.
-
Im, I.,Kim, Y.,Han, H.-J.(2008).The effects of perceived risk and technology type on users' acceptance of technologies.Information & Management,45(1),1-9.
-
Jacoby, J.,Kaplan, L. B.(1972).The components of perceived risk.Proceedings of the 3rd Annual Conference, Association for Consumer Research,Chicago:
-
Kuhl, J.(ed.),Beckman, J.(ed.)(1985).Action Control: From Cognition to Behavior.Heidelberg:Springer.
-
Kwong, T. C. H.,Lee, M. K. O.(2002).Behavioral intention model for the exchange mode internet music piracy.Proceedings of the 35th Hawaii International Conference on System Sciences
-
Lin, T.-C.,Hsu, M. H.,Kuo, F.-Y.,Sun, P.-C.(1999).An intention model-based study of software piracy.Proceedings of the 32nd Hawaii International Conference on System Sciences
-
Mitchell, V.-W.(1999).Consumer perceived risk: conceptualisations and models.European Journal of Marketing,33(1/2),163-195.
-
Mitchell, V.-W.(1992).Understanding consumers' behaviour: can perceived risk theory help?.Management Decision,30(3),26-31.
-
Moores, T. T.,Dhaliwal, J.(2004).A reversed context analysis of software piracy issues in Singapore.Information & Management,41(8),1037-1042.
-
Pavlou, P. A.(2003).Consumer acceptance of electronic commerce: integrating trust and risk with the technology acceptance model.International Journal of Electronic Commerce,7(3),101-134.
-
Peace, A. G.,Galletta, D. F.,Thong, J. Y. L.(2003).Software piracy in the workplace: a model and empirical test.Journal of Management Information Systems,20(1),153-177.
-
Raats, M. M.,Shepherd, R.,Sparks, P.(1995).Including moral dimensions of choice within the structure of the theory of planned behavior.Journal of Applied Social Psychology,25(6),484-494.
-
Rest, J.(1986).Center for the Study of Ethical Development.Minneapolis, MN:University of Minnesota.
-
Schoemaker, P. J.(1982).The expected utility model: its variants, purposes, evidence and limitations.Journal of Economic Literature,20(2),529-563.
-
Schwartz, S. H.,Tessler, R. C.(1972).A test of a model for reducing measured attitude-behavior discrepancies.Journal of Personality and Social Psychology,24,225-236.
-
Shaw, D.,Shiu, E.(2002).The role of ethical obligation and self-identity in ethical consumer choice.International Journal of Consumer Studies,26(2),109-116.
-
Shaw, D.,Shiu, E.,Clarke, I.(2000).The contribution of ethical obligation and self-identity to the theory of planned behaviour: an exploration of ethical consumers.Journal of Marketing Management,16(8),879-894.
-
Sheppard, B. H.,Hartwick, J.,Warshaw, P. R.(1988).The theory of reasoned action: a meta-analysis of past research with recommendations for modifications and future research.Journal of Consumer Research,15(3),325-343.
-
Sitkin, S. B.,Weingart, L. R.(1995).Determinants of risky decision-making behavior: a test of the mediating role of risk perceptions and propensity.The Academy of Management Journal,38(6),1573-1592.
-
Solomon, S. L.,O''Brien, J. A.(1990).The effect of demographic factors on attitudes toward software piracy.Journal of Computer Information Systems,30(3),40-46.
-
Sparks, P.,Shepherd, R.,Frewer, L. J.(1995).Assessing and structuring attitudes toward the use of gene technology in food production: the role of perceived ethical obligation.Basic and Applied Social Psychology,16(3),267-285.
-
Stone, R. N.,Gronhaug, K.(1993).Perceived risk: further considerations for the marketing discipline.European Journal of Marketing,27(3),39-50.
-
Swinyard, W. R.,Rinne, H.,Kau, A. K.(1990).The morality of software piracy: a cross-cultural analysis.Journal of Business Ethics,9(8),655-664.
-
Tan, B.(2002).Understanding consumer ethical decision making with respect to purchase of pirated software.The Journal of Consumer Marketing,19(2/3),96-111.
-
Taylor, S.,Todd, P. A.(1995).Understanding information technology usage: a test of competing models.Information Systems Research,6(2),144-176.
-
Venkatesh, V.,Morris, M. G.,Davis, G. B.,Davis, F. D.(2003).User acceptance of information technology: toward a unified view.MIS Quarterly,27(3),425-478.
|