Investigating Software Piracy in Jordan: An Extension of the Theory of Reasoned Action
Software piracy, the illegal and unauthorized duplication, sale, or distribution of software, is a widespread and costly phenomenon. According to Business Software Alliance (2008), over 41% of the PC software packages installed worldwide were unauthorized copies. Software piracy behavior has been in...
Saved in:
Published in | Journal of business ethics Vol. 98; no. 4; pp. 663 - 676 |
---|---|
Main Authors | , , |
Format | Journal Article |
Language | English |
Published |
Dordrecht
Springer
01.02.2011
Springer Netherlands Springer Nature B.V |
Series | Journal of Business Ethics |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | Software piracy, the illegal and unauthorized duplication, sale, or distribution of software, is a widespread and costly phenomenon. According to Business Software Alliance (2008), over 41% of the PC software packages installed worldwide were unauthorized copies. Software piracy behavior has been investigated for more than 30 years. However, after a review of the relevant literature, there appears to be two voids in this literature: a lack of studies in non-Western countries and a scarcity of process studies. This study contributes to literature by developing a software piracy model to better understand the decision-making process that underlies this unethical behavior. The model was tested using data collected from a sample of 323 undergraduate business students. Consistent with the Theory of Reasoned Action (TRA), attitudes toward software piracy and subjective norms were significant predictors of intention to pirate software. Also, the results suggested that ethical ideology, public self-consciousness, and low self-control moderated the effect of these variables on intention to pirate software. The results have important practical implications for the software industry and governments hoping to curtail software piracy. Limitations of the study and recommendations for future studies are discussed as well. |
---|---|
AbstractList | Software piracy, the illegal and unauthorized duplication, sale, or distribution of software, is a widespread and costly phenomenon. According to Business Software Alliance (2008), over 41% of the PC software packages installed worldwide were unauthorized copies. Software piracy behavior has been investigated for more than 30_years. However, after a review of the relevant literature, there appears to be two voids in this literature: a lack of studies in non-Western countries and a scarcity of process studies. This study contributes to literature by developing a software piracy model to better understand the decision-making process that underlies this unethical behavior. The model was tested using data collected from a sample of 323 undergraduate business students. Consistent with the Theory of Reasoned Action (TRA), attitudes toward software piracy and subjective norms were significant predictors of intention to pirate software. Also, the results suggested that ethical ideology, public self-consciousness, and low self-control moderated the effect of these variables on intention to pirate software. The results have important practical implications for the software industry and governments hoping to curtail software piracy. Limitations of the study and recommendations for future studies are discussed as well. Reprinted by permission of Springer Software piracy, the illegal and unauthorized duplication, sale, or distribution of software, is a widespread and costly phenomenon. According to Business Software Alliance (2008), over 41% of the PC software packages installed worldwide were unauthorized copies. Software piracy behavior has been investigated for more than 30 years. However, after a review of the relevant literature, there appears to be two voids in this literature: a lack of studies in non-Western countries and a scarcity of process studies. This study contributes to literature by developing a software piracy model to better understand the decision-making process that underlies this unethical behavior. The model was tested using data collected from a sample of 323 undergraduate business students. Consistent with the Theory of Reasoned Action (TRA), attitudes toward software piracy and subjective norms were significant predictors of intention to pirate software. Also, the results suggested that ethical ideology, public self-consciousness, and low self-control moderated the effect of these variables on intention to pirate software. The results have important practical implications for the software industry and governments hoping to curtail software piracy. Limitations of the study and recommendations for future studies are discussed as well. Software piracy, the illegal and unauthorized duplication, sale, or distribution of software, is a widespread and costly phenomenon. According to Business Software Alliance (2008), over 41% of the PC software packages installed worldwide were unauthorized copies. Software piracy behavior has been investigated for more than 30 years. However, after a review of the relevant literature, there appears to be two voids in this literature: a lack of studies in non-Western countries and a scarcity of process studies. This study contributes to literature by developing a software piracy model to better understand the decision-making process that underlies this unethical behavior. The model was tested using data collected from a sample of 323 undergraduate business students. Consistent with the Theory of Reasoned Action (TRA), attitudes toward software piracy and subjective norms were significant predictors of intention to pirate software. Also, the results suggested that ethical ideology, public self-consciousness, and low self-control moderated the effect of these variables on intention to pirate software. The results have important practical implications for the software industry and governments hoping to curtail software piracy. Limitations of the study and recommendations for future studies are discussed as well. Adapted from the source document. Software piracy, the illegal and unauthorized duplication, sale, or distribution of software, is a widespread and costly phenomenon. According to Business Software Alliance (2008), over 41% of the PC software packages installed worldwide were unauthorized copies. Software piracy behavior has been investigated for more than 30 years. However, after a review of the relevant literature, there appears to be two voids in this literature: a lack of studies in non-Western countries and a scarcity of process studies. This study contributes to literature by developing a software piracy model to better understand the decision-making process that underlies this unethical behavior. The model was tested using data collected from a sample of 323 undergraduate business students. Consistent with the Theory of Reasoned Action (TRA), attitudes toward software piracy and subjective norms were significant predictors of intention to pirate software. Also, the results suggested that ethical ideology, public self-consciousness, and low self-control moderated the effect of these variables on intention to pirate software. The results have important practical implications for the software industry and governments hoping to curtail software piracy. Limitations of the study and recommendations for future studies are discussed as well. [PUBLICATION ABSTRACT] Software piracy, the illegal and unauthorized duplication, sale, or distribution of software, is a widespread and costly phenomenon. According to Business Software Alliance (2008), over 41% of the PC software packages installed worldwide were unauthorized copies. Software piracy behavior has been investigated for more than 30 years. However, after a review of the relevant literature, there appears to be two voids in this literature: a lack of studies in non-Western countries and a scarcity of process studies. This study contributes to literature by developing a software piracy model to better understand the decision-making process that underlies this unethical behavior. The model was tested using data collected from a sample of 323 undergraduate business students. Consistent with the Theory of Reasoned Action (TRA), attitudes toward software piracy and subjective norms were significant predictors of intention to pirate software. Also, the results suggested that ethical ideology, public self-consciousness, and low self-control moderated the effect of these variables on intention to pirate software. The results have important practical implications for the software industry and governments hoping to curtail software piracy. Limitations of the study and recommendations for future studies are discussed as well. |
Author | Aleassa, Hassan Pearson, John Michael McClurg, Scott |
Author_xml | – sequence: 1 givenname: Hassan surname: Aleassa fullname: Aleassa, Hassan – sequence: 2 givenname: John Michael surname: Pearson fullname: Pearson, John Michael – sequence: 3 givenname: Scott surname: McClurg fullname: McClurg, Scott |
BackLink | http://econpapers.repec.org/article/kapjbuset/v_3a98_3ay_3a2011_3ai_3a4_3ap_3a663-676.htm$$DView record in RePEc |
BookMark | eNqFUU1rGzEUFCWFOml_QA8F0UtP2-rt6mPVmwlpPgg0pKZXIWu19rq2tJXkNP73eWZLCj20gtFDMDOax5ySkxCDJ-QtsI_AmPqUgQkBFQNWMclFxV-QGQjV4EurEzJjIFXFBeevyGnOG4ZHAJ-R79fhwecyrGwZwop-i335ZZOnd0Oy7kCHQG9i6mz4TOeBXjwWH_IQA409LWtPF2sf0-H4uvc2Y6KOzl1Bwmvysrfb7N_8nmdk8eVicX5V3X69vD6f31aOa10qwZx0vWxcp0AuhXI1551kvWAaWmtbVUNdd9YyAMeFhaVukat923rdoe6MfJhsxxR_7nEPsxuy89utDT7us2m1BMl5q_7PFE0N-CtD5vu_mJu4TwG3OJJkrbkAJMFEcinmnHxvxjTsbDoYYOZYiJkKMViIORZiOGpuJk3yo3fPgh923Cz32RfzYBqrW7wOiBp3xjEgOGJESNkYqaRZlx2a1ZNZRp-w8ulPyn8leDeJNrnE9JyAA1cShG6eANNRsJw |
CODEN | JBUEDJ |
CitedBy_id | crossref_primary_10_1111_ijcs_12443 crossref_primary_10_1108_MIP_09_2013_0149 crossref_primary_10_1108_JIMA_05_2014_0037 crossref_primary_10_1108_EJM_07_2017_0455 crossref_primary_10_1080_0267257X_2017_1364285 crossref_primary_10_1016_j_jwb_2014_05_001 crossref_primary_10_1108_YC_08_2016_00627 crossref_primary_10_1111_ijcs_12240 crossref_primary_10_1016_j_ijpsycho_2022_04_001 crossref_primary_10_1177_00076503221110156 crossref_primary_10_1080_0267257X_2018_1452278 crossref_primary_10_3390_systems10050162 crossref_primary_10_1002_mar_21386 crossref_primary_10_1080_13675567_2023_2235290 crossref_primary_10_1108_APJML_11_2015_0163 crossref_primary_10_1007_s10551_014_2075_1 crossref_primary_10_5392_JKCA_2014_14_12_723 crossref_primary_10_1016_j_proeng_2016_11_649 crossref_primary_10_1080_01639625_2014_977111 crossref_primary_10_1007_s10660_021_09527_3 crossref_primary_10_1108_JIMA_04_2021_0128 crossref_primary_10_1080_10496491_2016_1185491 crossref_primary_10_1007_s10551_015_2755_5 crossref_primary_10_14783_maruoneri_594966 crossref_primary_10_1080_0144929X_2012_753552 crossref_primary_10_1108_IJOEM_09_2020_1067 crossref_primary_10_1108_JCM_04_2016_1778 crossref_primary_10_1108_17505931211282418 crossref_primary_10_1007_s13520_017_0081_y crossref_primary_10_1016_j_heliyon_2023_e14720 crossref_primary_10_1016_j_chb_2022_107380 crossref_primary_10_1108_YC_10_2016_00641 crossref_primary_10_1108_ITP_12_2021_0937 crossref_primary_10_1108_JRIM_07_2018_0093 crossref_primary_10_1016_j_ijhm_2020_102679 crossref_primary_10_4102_sajim_v21i1_1081 crossref_primary_10_1108_EL_11_2012_0149 crossref_primary_10_1016_j_im_2021_103559 crossref_primary_10_1016_j_paid_2020_110340 crossref_primary_10_1108_17505931211282382 crossref_primary_10_1371_journal_pone_0127921 crossref_primary_10_1080_1540496X_2018_1480365 crossref_primary_10_1007_s10551_012_1394_3 crossref_primary_10_1108_GKMC_12_2019_0148 crossref_primary_10_1108_YC_05_2017_00697 crossref_primary_10_1016_j_chb_2017_02_014 crossref_primary_10_1002_mar_21164 crossref_primary_10_15388_Im_2021_91_53 crossref_primary_10_1016_j_chb_2016_04_024 crossref_primary_10_1007_s10551_015_2826_7 crossref_primary_10_1016_j_jcrimjus_2016_10_001 crossref_primary_10_1007_s10551_013_1892_y crossref_primary_10_1016_j_chb_2016_11_015 crossref_primary_10_1016_j_heliyon_2022_e09214 crossref_primary_10_1016_j_elerap_2014_12_003 crossref_primary_10_20525_ijrbs_v9i3_675 crossref_primary_10_1016_j_jretconser_2020_102075 crossref_primary_10_1016_j_techfore_2017_02_029 crossref_primary_10_1108_LR_09_2016_0082 |
Cites_doi | 10.1177/0013164403258228 10.1023/A:1022200702149 10.1007/s10676-004-3391-4 10.1037/0022-3514.43.1.100 10.1007/BF00872100 10.2307/25148868 10.1016/S0305-0483(96)00053-9 10.2308/jis.2006.20.1.49 10.1037/0022-3514.51.6.1173 10.2190/8M5U-HPQK-F2N5-B574 10.1007/BF00881451 10.1002/ejsp.403 10.1016/0749-5978(91)90022-L 10.1023/A:1009832018849 10.1007/s10551-004-5263-6 10.1016/0092-6566(81)90015-5 10.2307/3511780 10.1007/s10603-005-8489-5 10.1111/j.1467-6494.1990.tb00246.x 10.1016/0022-1031(83)90038-0 10.1023/A:1006415514200 10.1007/s10551-007-9366-8 10.1037/0033-2909.103.3.411 10.1037/0033-2909.88.3.588 10.1177/0894439307299934 10.1037/0033-2909.107.2.238 10.1007/BF02726426 10.2224/sbp.2001.29.8.733 10.1016/S0047-2352(01)00111-8 10.1007/BF00881456 10.1177/027614678600600103 10.1089/cpb.2004.7.417 10.1007/s10551-005-1901-x 10.1111/j.1559-1816.2001.tb00200.x 10.1108/07363760110392967 10.1007/s10551-005-1902-9 10.1177/109442810032003 10.1515/9781503621794 10.1177/0022427893030001002 10.1016/S0360-1315(99)00010-X 10.2307/258313 10.2307/3033889 10.1007/BF00380748 10.1007/s10551-005-4773-1 10.1080/01639620490497947 10.1037/0021-9010.88.5.879 10.1007/BF00870557 10.1080/01639625.1998.9968087 10.1007/s10551-008-9822-0 10.1111/j.1745-9125.1995.tb01176.x 10.1109/TEM.2004.835087 10.1207/S15327965PLI1303_02 10.1287/mksc.21.3.223.145 10.1037/0022-3514.39.1.175 10.1016/j.im.2006.03.005 10.1016/j.im.2003.12.008 10.2307/1251618 10.1016/0148-2963(92)90035-A 10.1080/07421222.2003.11045759 10.1037/0033-2909.107.2.260 10.1023/A:1005721401993 10.1037/0022-3514.44.1.107 10.1007/BF00871698 10.1007/978-1-4612-5887-2 10.2307/248873 10.1016/0749-5978(91)90020-T 10.1016/j.ijinfomgt.2006.01.004 10.1037/0022-3514.37.1.75 10.2466/PR0.95.7.921-931 10.1145/355112.355129 10.1037/h0076760 10.1023/A:1026269003472 |
ContentType | Journal Article |
Copyright | 2011 Springer Springer Science+Business Media B.V. 2010 Springer Science+Business Media B.V. 2011 |
Copyright_xml | – notice: 2011 Springer – notice: Springer Science+Business Media B.V. 2010 – notice: Springer Science+Business Media B.V. 2011 |
DBID | DKI X2L AAYXX CITATION 0-V 0U~ 1-H 3V. 7TQ 7WY 7WZ 7XB 87Z 88C 88G 88J 8AO 8BJ 8FI 8FJ 8FK 8FL 8G5 AABKS ABSDQ ABUWG AFKRA ALSLI AVQMV AZQEC BENPR BEZIV CCPQU DHY DON DPSOV DWQXO FQK FRNLG FYUFA F~G GHDGH GNUQQ GUQSH JBE K50 K60 K6~ K8~ KC- L.- L.0 M0C M0T M1D M2L M2M M2O M2R MBDVC PQBIZ PQBZA PQEST PQQKQ PQUKI PSYQQ Q9U S0X |
DOI | 10.1007/s10551-010-0645-4 |
DatabaseName | RePEc IDEAS RePEc CrossRef ProQuest Social Sciences Premium Collection【Remote access available】 Global News & ABI/Inform Professional Trade PRO ProQuest Central (Corporate) PAIS Index ABI/INFORM Collection ABI/INFORM Global (PDF only) ProQuest Central (purchase pre-March 2016) ABI/INFORM Collection Healthcare Administration Database (Alumni) Psychology Database (Alumni) Social Science Database (Alumni Edition) ProQuest Pharma Collection International Bibliography of the Social Sciences (IBSS) Hospital Premium Collection Hospital Premium Collection (Alumni Edition) ProQuest Central (Alumni) (purchase pre-March 2016) ABI/INFORM Collection (Alumni Edition) Research Library (Alumni Edition) Philosophy Collection Philosophy Database ProQuest Central (Alumni) ProQuest Central Social Science Premium Collection (Proquest) (PQ_SDU_P3) Arts Premium Collection ProQuest Central Essentials ProQuest Central ProQuest Business Premium Collection ProQuest One Community College PAIS International PAIS International (Ovid) Politics Collection ProQuest Central International Bibliography of the Social Sciences Business Premium Collection (Alumni) Health Research Premium Collection ABI/INFORM Global (Corporate) Health Research Premium Collection (Alumni) ProQuest Central Student Research Library Prep International Bibliography of the Social Sciences Art, Design and Architecture Collection ProQuest Business Collection (Alumni Edition) ProQuest Business Collection DELNET Management Collection ProQuest Politics Collection ABI/INFORM Professional Advanced ABI/INFORM Professional Standard ABI/INFORM Global (ProQuest) Healthcare Administration Database Arts & Humanities Database Political Science Database Psychology Database ProQuest research library Social Science Database Research Library (Corporate) One Business ProQuest One Business (Alumni) ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Academic ProQuest One Academic UKI Edition ProQuest One Psychology ProQuest Central Basic SIRS Editorial |
DatabaseTitle | CrossRef ProQuest Business Collection (Alumni Edition) ProQuest One Psychology Research Library Prep ProQuest Central Student ProQuest Central Essentials Trade PRO ABI/INFORM Complete Philosophy Collection Global News & ABI/Inform Professional Health Research Premium Collection Arts Premium Collection Business Premium Collection Social Science Premium Collection ABI/INFORM Global ProQuest Political Science ProQuest One Academic Eastern Edition ProQuest Hospital Collection Health Research Premium Collection (Alumni) ProQuest Business Collection ProQuest Hospital Collection (Alumni) ProQuest Social Science Journals ProQuest Social Sciences Premium Collection ProQuest One Academic UKI Edition PAIS International ProQuest Health Management (Alumni Edition) ProQuest DELNET Management Collection ProQuest Politics Collection Arts & Humanities Full Text ProQuest One Academic ABI/INFORM Global (Corporate) ProQuest One Business SIRS Editorial ProQuest Social Science Journals (Alumni Edition) ProQuest Central (Alumni Edition) ProQuest One Community College Research Library (Alumni Edition) Politics Collection ProQuest Pharma Collection ProQuest Central ABI/INFORM Professional Advanced International Bibliography of the Social Sciences (IBSS) ABI/INFORM Professional Standard ProQuest Central Korea ProQuest Research Library ProQuest Art, Design and Architecture Collection ABI/INFORM Complete (Alumni Edition) ABI/INFORM Global (Alumni Edition) ProQuest Central Basic ProQuest Health Management ProQuest Psychology Journals (Alumni) ProQuest Psychology Journals ProQuest One Business (Alumni) ProQuest Central (Alumni) Business Premium Collection (Alumni) Philosophy Database |
DatabaseTitleList | International Bibliography of the Social Sciences (IBSS) PAIS International ProQuest Business Collection (Alumni Edition) |
Database_xml | – sequence: 1 dbid: DKI name: RePEc IDEAS url: http://ideas.repec.org/ sourceTypes: Index Database – sequence: 2 dbid: BENPR name: AUTh Library subscriptions: ProQuest Central url: https://www.proquest.com/central sourceTypes: Aggregation Database |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Law Business Education Philosophy |
EISSN | 1573-0697 |
EndPage | 676 |
ExternalDocumentID | 2275299371 10_1007_s10551_010_0645_4 kapjbuset_v_3a98_3ay_3a2011_3ai_3a4_3ap_3a663_676_htm 41476159 |
GeographicLocations | Jordan (country) |
GeographicLocations_xml | – name: Jordan (country) |
GroupedDBID | -51 -5C -5G -BR -EM -W8 -~C -~X .86 .GO 0-V 06D 0R~ 0VY 199 1N0 203 29K 2J2 2JN 2JY 2KG 2KM 2LR 2VQ 2~H 30V 3V. 4.4 406 408 409 40D 40E 5GY 5VS 67Z 6NX 78A 7WY 8AO 8FI 8FJ 8FL 8FW 8G5 8TC 8UJ 8VB 95- 95. 95~ 96X AABHQ AABKS AAFGU AAGAY AAHNG AAIAL AAJKR AANZL AARHV AARTL AATNV AATVU AAUYE AAWCG AAYFA AAYIU AAYQN AAYTO ABBBX ABBHK ABBXA ABDZT ABECU ABECW ABFGW ABFTD ABFTV ABHLI ABHQN ABIVO ABJNI ABJOX ABKAS ABKCH ABKTR ABKVW ABLJU ABMNI ABMQK ABNWP ABQBU ABSDQ ABSRN ABSXP ABTEG ABTHY ABTKH ABTMW ABULA ABUWG ABWNU ABXPI ABXSQ ABYRZ ABYYQ ACAOD ACBMV ACBRV ACBXY ACBYP ACGFO ACGFS ACHQT ACHSB ACHXU ACIGE ACIHN ACIPQ ACKNC ACMDZ ACMLO ACNCT ACNXV ACOKC ACOMO ACREJ ACREN ACTTH ACVFL ACVWB ACWMK ACZOJ ADBBV ADGDI ADHHG ADHIR ADIMF ADINQ ADKNI ADKPE ADMDM ADMHP ADOXG ADPTO ADRFC ADTPH ADULT ADURQ ADYFF ADYOE ADZKW AEAQA AEBTG AEFTE AEGAL AEGNC AEJHL AEJRE AEKMD AEOHA AEPYU AESKC AESTI AETLH AEUPB AEVLU AEVTX AEXYK AFGCZ AFKRA AFLOW AFNRJ AFQWF AFWTZ AFYQB AFZKB AGAYW AGDGC AGGBP AGJBK AGMZJ AGQMX AGWIL AGWZB AGYKE AHAJD AHBYD AHEXP AHSBF AHYZX AIAKS AIIXL AILAN AIMYW AITGF AJBLW AJDOV AJRNO AJZVZ AKQUC AKVCP ALMA_UNASSIGNED_HOLDINGS ALSLI ALWAN AMKLP AMTXH AMXSW AMYLF AMYQR AOCGG AQUVI ARALO ARMRJ ASPBG AVQMV AVWKF AXYYD AYQZM AZFZN AZQEC AZRUE B-. BA0 BAPOH BDATZ BENPR BEZIV BGNMA BHNFS BKOMP BPHCQ BVXVI CAG CBXGM CCPQU CHNMF COF CS3 CSCUP CWXUR CZBKB D-I DDRTE DL5 DNIVK DPSOV DPUIP DU5 DWQXO E.L EBLON EBS EBU EHE EIOEI EJD ESBYG F5P FEDTE FERAY FFXSO FIGPU FINBP FNLPD FRNLG FRRFC FSGXE FWDCC FYUFA GGCAI GGRSB GJIRD GNUQQ GNWQR GQ6 GQ7 GQ8 GROUPED_ABI_INFORM_ARCHIVE GROUPED_ABI_INFORM_COMPLETE GROUPED_ABI_INFORM_RESEARCH GUQSH GXS HF~ HG5 HG6 HMJXF HQYDN HRMNR HVGLF HZ~ I09 IHE IJ- IKXTQ ITM IWAJR IXC IZIGR IZQ I~X I~Z J-C J0Z JAAYA JAB JBMMH JBSCW JBU JCJTX JENOY JHFFW JKQEH JLEZI JLXEF JPL JPPEU JSODD JST JZLTJ K1G K50 K60 K6~ K8~ KC- KDC KOV LAK LLZTM M0C M0T M1D M2L M2M M2O M2R M4Y MA- MQGED N2Q N9A NB0 NPVJJ NQJWS NU0 O9- O93 O9G O9I O9J OAM P19 P2P P9Q PF- PQBIZ PQQKQ PRG PROAC PSYQQ PT4 PT5 PZZ Q2X QF4 QM6 QM7 QN7 QO5 QOK QOS QWB R-Y R89 R9I RHV ROL RPX RSV S0X S16 S27 S3B SA0 SAP SDA SDH SDM SHS SHX SISQX SJYHP SNE SNPRN SNX SOHCF SOJ SPISZ SRMVM SSLCW STPWE SZN T13 TAE TH9 TN5 TSG TSK TSV TUC U2A U5U UG4 UHB UKHRP UNUBA UOJIU UTJUX UZXMN VC2 VFIZW VQA W23 W48 WH7 WIP WK8 XFK YLTOR YQT Z45 Z5O Z7R Z7S Z7U Z7V Z7W Z7X Z7Y Z7Z Z81 Z82 Z83 Z85 Z86 Z87 Z88 Z8M Z8N Z8O Z8P Z8Q Z8S Z8T Z8U Z8V Z8W Z8Z Z91 Z92 ZA5 ZL0 ZMTXR ~8M ~EX -Y2 1SB 2.D 28- 2P1 5QI 8H~ AAAHA AABYN AANTL AAXYU ABKTN ABTAH ACIOK ACVYN ACYUM ADMHC ADSWE AEAAH AEEQQ AEFIE AFEXP AFFNX AFMIJ AGGDS AHAVH AHKAY AI. AJUXI BBWZM ECVKH EGZRM GPZZG HECYW HYQOX H~9 KOW NDZJH NEJ O-F O-J OVD Q5E R4E RNI RNS RZC RZD RZK S1Z S26 S28 SCLPG T16 TEORI UBC VH1 VQP WHG WK6 YCJ YYP ZCG ZWUKE ZY4 ~OX ~OY ~OZ ~P- ~P. ~P0 ~P1 ~PQ ~P~ 08R 0R 1AW 51 5C 5G 8H 95 ABFLS BBAFP BR C DKI EM EX H13 HZ IPNFZ K6 K8 KSO LJ0 OX OY OZ O~O P P- P. P0 P1 PQ PQEST PQUKI PRINS RIG W8 X X2L XHC AACDK AAEOY AAHSB AAJBT AASML AAYXX ABAKF ACDTI ADACV AEFQL AEMSY AFBBN AGQEE AGRTI AGZLP AIGIU ALIPV CITATION EBE EBR IPSME LPU PQBZA 0U~ 1-H 7TQ 7XB 8BJ 8FK AAHCP AAYZH ACUHF ADMHG APTMU DHY DON FQK JBE L.- L.0 MBDVC Q9U |
ID | FETCH-LOGICAL-c499t-50c6cf63cd716b57c244d60f50918aa872122daa011c45a1b983cd9e88e9df63 |
IEDL.DBID | U2A |
ISSN | 0167-4544 |
IngestDate | Fri Oct 25 23:01:48 EDT 2024 Fri Oct 25 03:41:37 EDT 2024 Wed Nov 06 07:39:15 EST 2024 Thu Sep 26 19:09:28 EDT 2024 Wed Aug 18 03:51:24 EDT 2021 Sat Dec 16 12:01:17 EST 2023 Fri Feb 02 07:04:52 EST 2024 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 4 |
Keywords | low self-control software piracy religiosity public self-consciousness Theory of Reasoned Action developing countries ethical ideology Jordan |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c499t-50c6cf63cd716b57c244d60f50918aa872122daa011c45a1b983cd9e88e9df63 |
Notes | ObjectType-Article-2 SourceType-Scholarly Journals-1 ObjectType-Feature-1 content type line 23 ObjectType-Article-1 ObjectType-Feature-2 |
PQID | 853629451 |
PQPubID | 6472 |
PageCount | 14 |
ParticipantIDs | proquest_miscellaneous_896164487 proquest_miscellaneous_853210910 proquest_journals_853629451 crossref_primary_10_1007_s10551_010_0645_4 repec_primary_kapjbuset_v_3a98_3ay_3a2011_3ai_3a4_3ap_3a663_676_htm springer_journals_10_1007_s10551_010_0645_4 jstor_primary_41476159 |
PublicationCentury | 2000 |
PublicationDate | 2011-02-01 |
PublicationDateYYYYMMDD | 2011-02-01 |
PublicationDate_xml | – month: 02 year: 2011 text: 2011-02-01 day: 01 |
PublicationDecade | 2010 |
PublicationPlace | Dordrecht |
PublicationPlace_xml | – name: Dordrecht |
PublicationSeriesTitle | Journal of Business Ethics |
PublicationSubtitle | JBE |
PublicationTitle | Journal of business ethics |
PublicationTitleAbbrev | J Bus Ethics |
PublicationYear | 2011 |
Publisher | Springer Springer Netherlands Springer Nature B.V |
Publisher_xml | – name: Springer – name: Springer Netherlands – name: Springer Nature B.V |
References | ForsythD. R.Judging die Morality of Business Practices: The Influence of Personal Moral PhilosophiesJournal of Business Ethics1992115–646147010.1007/BF00870557 ChangM. K.Predicting Unethical Behavior: A Comparison of the Theory of Reasoned Action and the Theory of Planned BehaviorJournal of Business Ethics199817161825183410.1023/A:1005721401993 RahimM.SeyalA. H.Abd RahmanN. A.Software Piracy Among Computing Students: A Bruneian ScenarioComputers and Education19993230132110.1016/S0360-1315(99)00010-X KwongK. K.YauO. H.LeeJ. S.SinL. Y.TseA. C.The Effect of Attitudinal and Demographic Factors on Intention to Buy Pirated CDs: The Case of Chinese ConsumersJournal of Business Ethics200347322323510.1023/A:1026269003472 BarnettT.BassK.BrownG.Ethical Ideology and Ethical Judgment Regarding Ethical Issues in BusinessJournal of Business Ethics199413646948010.1007/BF00881456 GibsonC.WrightJ.Low Self-Control and Coworker Delinquency: A Research NoteJournal of Criminal Justice20012948349210.1016/S0047-2352(01)00111-8 SueS.Cultural Differences in Determining the Ethical Perception of Decision-Making of Future Accounting Professionals: A Comparison Between Accounting Students from Taiwan and the United StatesThe Journal of American Academy of Business200691147159 LandisR. S.BealD. J.PaulE.TeslukP. E.A Comparison of Approaches to Forming Composite Measures in Structural Equation ModelsOrganizational Research Methods20003218620710.1177/109442810032003 TrevinoL. K.Ethical Decision Making in Organizations: A Person-Situation Interactionist ModelAcademy of Management Review19861160161710.2307/258313 MithasS.JonesJ.MitchellW.Buyer Intention to Use Internet-Enabled Reverse Auctions: The Role of Asset Specificity, Product Specialization, and Non-Contractibility’MIS Quarterly2008324705724 BanduriA.Social Cognitive Theory of Self-RegulationOrganizational Behavior and Human Decision Processes19915024828710.1016/0749-5978(91)90022-L De GeorgeR. T.Theological Ethics and Business EthicsJournal of Business Ethics19865642143210.1007/BF00380748 BurkettS. R.Perceived Parents’ Religiosity, Friends’ Drinking, and Hellfire: A Panel Study of Adolescent DrinkingReview of Religious Research199335213415410.2307/3511780 FunderD. C.On Assessing Social Psychological Theories Through the Study of Individual Differences: Template Matching and Forced ComplianceJournal of Personality and Social Psychology198243110011010.1037/0022-3514.43.1.100 LiangZ.YanZ.Software Piracy Among College Students: A Comprehensive Review of Contributing Factors, Underlying Process, and Tackling StrategiesJournal of Educational Computing Research200533211514010.2190/8M5U-HPQK-F2N5-B574 GrasmickH. G.TittleC. R.ArneklevB. J.Testing the Core Empirical Implications of Gottfredson and Hirschi’s General Theory of CrimeJournal of Research in Crime and Delinquency19933052910.1177/0022427893030001002 HigginsG. E.Can Low Self-Control Help with the Understanding of the Software Piracy Problem?Deviant Behavior200526112410.1080/01639620490497947 FromingW. J.CorleyE. B.RinkerL.The Influence of Public Self-Consciousness and Audience’s Characteristics on Withdrawal from Embarrassing SituationsJournal of Personality199058460362210.1111/j.1467-6494.1990.tb00246.x PeaceA. G.GallettaD. F.ThongJ. Y.Software Piracy in the Workplace: A Model and Empirical TestJournal of Management Information Systems2003201153177 FraedrichJ. P.FerrellO. C.The Impact of Perceived Risk and Moral Philosophy on Ethical Decision Making in Business OrganizationsJournal of Business Research19922428329510.1016/0148-2963(92)90035-A BaronR. M.KennyD. A.The Moderator-Mediator Variable Distinction in Social Psychological Research: Conceptual, Strategic, and Statistical ConsiderationsJournal of Personality and Social Psychology1986511173118210.1037/0022-3514.51.6.1173 NasserF.WisenbakerJ.A Monte Carlo Study Investigating the Impact of Item Parceling on Measures of Fit in Confirmatory Factor AnalysisEducational and Psychological Measurement200363572975710.1177/0013164403258228 LiskaA. E.A Critical Examination of the Casual Structure of the Fishbein/Ajzen Attitude–Behavior ModelSocial Psychology Quarterly1984471617410.2307/3033889 FenigsteinA.ScheierM. F.BussA. H.Public and Private Self-Consciousness: Assessment and TheoryJournal of Consulting and Clinical Psychology197543452252710.1037/h0076760 ShuganS. M.Marketing Science, Models, Monopoly Models, and Why We Need ThemMarketing Science200221322322810.1287/mksc.21.3.223.145 CostarelliS.CollocaA. P.The Moderation of Ambivalence on Attitude–Intention Relations as Mediated by Attitude ImportanceEuropean Journal of Social Psychology20073792393310.1002/ejsp.403 TriandisH. C.McGartyC.HaslamS. A.A Cross-Cultural Perspective on Social PsychologyThe Message of Social Psychology1997Cambridge, MABlackwell MishraA.AkmanI.YaziciA.Software Piracy Among IT Professionals in OrganizationsInternational Journal of Information Management20062640141310.1016/j.ijinfomgt.2006.01.004 HairJ.BlackW.BabinB.AndersonR.Tatham R.Multivariate Data Analysis20066New JerseyPrentice Hall AjzenI.Attitudes, Personality, and Behavior1988Milton Keynes, EnglandOpen University Press Business Software Alliance: 2008, Sixth Annual BSA-IDC Global Software Piracy Study. Retrieved April 15, 2008, from http://global.bsa.org/globalpiracy2008/studies/globalpiracy2008.pdf. FishbeinM.AjzenI.Beliefs, Attitude, Intention, and Behavior: An Introduction to Theory and Research1975Reading, MAAddison-Wesley AjzenI.The Theory of Planned BehaviorOrganizational Behavior and Human Decision Processes199151217921110.1016/0749-5978(91)90020-T AndersonJ. C.GerbingD. W.Structural Equation Modeling in Practice: A Review and Recommended Two-Step ApproachPsychological Bulletin1988103341142310.1037/0033-2909.103.3.411 WoolleyD. J.EiningM.Software Piracy Among Accounting Students: A Longitudinal Comparison of Changes and SensitivityJournal of Information Systems2006201496310.2308/jis.2006.20.1.49 Anonymous: 2007, ‘Business Software Sales Soar to $ 500m’, MEED: Middle East Economic Digest51(40), 33. FunderD. C.OzerD. J.Behavior as a Function of the SituationJournal of Personality and Social Psychology198344110711210.1037/0022-3514.44.1.107 PargamentK. I.The Bitter and the Sweet: An Evaluation of the Costs and Benefits of ReligiousnessPsychological Inquiry200213316818110.1207/S15327965PLI1303_02 CarlinW. B.StrongK. C.A Critique of Western Philosophical Ethics: Multidisciplinary Alternatives for Framing Ethical DilemmasJournal of Business Ethics199514538739610.1007/BF00872100 KlineR. B.Principles and Practices of Structural Equation Modeling20052New YorkThe Guilford Press HigginsG. E.FellB. D.WilsonA. L.Low Self-Control and Social Learning in Understanding Students’ Intention to Pirate Movies in the United StateSocial Science Computer Review200725333935710.1177/0894439307299934 PodsakoffP. M.MacKenzieS. B.LeeJ. Y.Common Method Biases in Behavioral Research: A Critical Review of the Literature and Recommended RemediesJournal of Applied Psychology200388587990310.1037/0021-9010.88.5.879 RaykovT.MarcoulidesG. A.A First Course in Structural Equation Modeling2006New JerseyLawrence Erlbaum Association ChangL.HauK. T.The Effect of Self-Consciousness on the Expression of Gender ViewsJournal of Applied Social Psychology200131234035110.1111/j.1559-1816.2001.tb00200.x ChristensenA. L.EiningM.Factors Influencing Software Piracy: Implication for AccountantsJournal of Information Systems1991516780 GanL. L.KohH. C.An Empirical Study of Software Piracy Among Tertiary Institutions in SingaporeInformation and Management20064364064910.1016/j.im.2006.03.005 ScheierM. F.CarverC. S.Directed Attention and the Comparison of Self with StandardsJournal of Experimental Social Psychology198319320522210.1016/0022-1031(83)90038-0 Al-JabriI.Abdul-GaderA.Software Copyright Infringements: An Exploratory Study of the Effects of Individual and Peer BeliefsOmega199725333534410.1016/S0305-0483(96)00053-9 Al-RafeeS.CronanT. P.Digital Piracy: Factors that Influence Attitude Toward BehaviorJournal of Business Ethics20066323725910.1007/s10551-005-1902-9 SimpsonP. M.BanerjeeD.SimpsonC. L.Soflifting: A Model for Motivating FactorsJournal of Business Ethics199413643143810.1007/BF00881451 DeciE. L.RyanR. M.Handbook of Self-Determination Research2002New YorkUniversity of Rochester Press MasonR. O.Four Ethical Issues of the Information AgeMIS Quarterly198610141210.2307/248873 HuntS. D.VitellS.A General Theory of Marketing EthicsJournal of Macromarketing1986651610.1177/027614678600600103 LeeO.ShinM.Addictive Consumption of Avatars in CyberspaceCyberPsychology & Behavior20047441742010.1089/cpb.2004.7.417 BentlerP. M.Comparative Fit Indexes in Structural ModelsPsychological Bulletin199010723824610.1037/0033-2909.107.2.238 CrawfordL. A.NovakK. B.Resisting Peer Pressure: Characteristics Associated With Other-Self Discrepancies in College Students’ Levels of Alcohol ConsumptionJournal of Alcohol and Drug Education20075113562 ForsythD. R.A Taxonomy of Ethical IdeologiesJournal of Personality and Social psychology198039117518410.1037/0022-3514.39.1.175 TeohH. Y. D.SerangP.LimC. C.Individualism-Collectivism Cultural Differences Affecting Perceptions of Unethical Practices: Some Evidence from Australian and Indonesian Accounting StudentsTeaching Business Ethics1999313715310.1023/A:1009832018849 CronanT. P.Al-RafeeS.Factors that Influence the Intention to Pirate Software and MediaJournal of Business Ethics200878452754510.1007/s10551-007-9366-8 BentlerP. M.BonettD. G.Significance Tests and Goodness of Fit in the Analysis of Covariance StructuresPsychological Bulletin19808858860610.1037/0033-2909.88.3.588 ByrneB. M.Structural Equation Modeling with EQS: Basic Concepts, Applications and Programming20062Mahwah, NJLawrence Erlbaum Associates HamidP. N.LaiJ. C.ChengS.Response Bias and Public and Private Self-Consciousness in ChineseSocial Behavior and Personality200129873374210.2224/sbp.2001.29.8.733 BeekunR. I.StedhamY.YamamuraJ. H.Business Ethics in Brazil and the U.S.: A Compar C. Gibson (645_CR46) 2001; 29 T. Barnett (645_CR9) 1994; 13 P. M. Bentler (645_CR13) 1980; 88 R. S. Landis (645_CR59) 2000; 3 J. P. Fraedrich (645_CR40) 1992; 24 S. J. Vitell (645_CR88) 2006; 64 S. M. Shugan (645_CR79) 2002; 21 W. J. Froming (645_CR41) 1981; 15 L. L. Gan (645_CR45) 2006; 43 S. W. McDaniel (645_CR67) 1990; 18 A. Fenigstein (645_CR34) 1979; 37 R. M. Baron (645_CR10) 1986; 51 A. G. Peace (645_CR74) 2003; 20 S. Mithas (645_CR69) 2008; 32 J. Hair (645_CR49) 2006 G. E. Higgins (645_CR53) 2004; 95 I. Al-Jabri (645_CR4) 1997; 25 M. Fishbein (645_CR37) 1975 J. C. Anderson (645_CR6) 1988; 103 H. C. Triandis (645_CR87) 1997 A. E. Liska (645_CR64) 1984; 47 S. Al-Rafee (645_CR5) 2006; 63 P. N. Hamid (645_CR50) 2001; 29 K. I. Pargament (645_CR73) 2002; 13 L. A. Crawford (645_CR28) 2007; 51 O. Lee (645_CR60) 2004; 7 S. C. Wagner (645_CR89) 2001; 29 M. K. Chang (645_CR21) 1998; 17 T. Moores (645_CR70) 2000; 23 I. Ajzen (645_CR2) 1988 G. E. Higgins (645_CR52) 2007; 25 A. Karnes (645_CR55) 1989; 24 A. D’Astous (645_CR30) 2005; 28 T. Raykov (645_CR77) 2006 O. C. Ferrell (645_CR36) 1985; 49 B. M. Byrne (645_CR18) 2006 P. M. Bentler (645_CR12) 1990; 107 S. J. Breckler (645_CR15) 1990; 107 R. T. George De (645_CR31) 1986; 5 F. Nasser (645_CR72) 2003; 63 A. Smith (645_CR82) 2005; 62 D. Yang (645_CR91) 2007; 41 S. Costarelli (645_CR27) 2007; 37 L. Chang (645_CR22) 2001; 31 I. Ajzen (645_CR3) 1991; 51 Z. Liang (645_CR62) 2005; 33 R. M. Siegfried (645_CR80) 2004; 6 D. C. Funder (645_CR43) 1982; 43 P. M. Podsakoff (645_CR75) 2003; 88 H. Y. D. Teoh (645_CR85) 1999; 3 D. R. Forsyth (645_CR39) 1992; 11 K. K. Kwong (645_CR58) 2003; 47 S. H. Ang (645_CR7) 2001; 18 645_CR17 E. L. Deci (645_CR32) 2002 C. S. Carver (645_CR20) 1981 R. O. Mason (645_CR66) 1986; 10 645_CR57 J. K. Cochran (645_CR25) 1998; 19 A. Banduri (645_CR8) 1991; 50 R. I. Beekun (645_CR11) 2003; 42 L. K. Trevino (645_CR86) 1986; 11 D. J. Woolley (645_CR90) 2006; 20 A. Mishra (645_CR68) 2006; 26 S. R. Burkett (645_CR16) 1993; 35 P. M. Simpson (645_CR81) 1994; 13 M. Limayem (645_CR63) 2004; 51 M. F. Scheier (645_CR78) 1983; 19 A. L. Christensen (645_CR24) 1991; 5 D. R. Forsyth (645_CR38) 1980; 39 J. Tan (645_CR84) 2009; 88 T. D. Evans (645_CR33) 1995; 33 M. R. Gottfredson (645_CR47) 1990 H. G. Grasmick (645_CR48) 1993; 30 W. B. Carlin (645_CR19) 1995; 14 A. Fenigstein (645_CR35) 1975; 43 W. J. Froming (645_CR42) 1990; 58 L. N. K. Leonard (645_CR61) 2004; 42 G. E. Higgins (645_CR51) 2005; 26 M. Rahim (645_CR76) 1999; 32 645_CR1 J. Chiou (645_CR23) 2005; 57 D. C. Funder (645_CR44) 1983; 44 R. B. Kline (645_CR56) 2005 S. Sue (645_CR83) 2006; 9 S. D. Hunt (645_CR54) 1986; 6 T. P. Cronan (645_CR29) 2008; 78 J. M. Logsdon (645_CR65) 1994; 13 |
References_xml | – volume: 63 start-page: 729 issue: 5 year: 2003 ident: 645_CR72 publication-title: Educational and Psychological Measurement doi: 10.1177/0013164403258228 contributor: fullname: F. Nasser – volume: 42 start-page: 267 issue: 3 year: 2003 ident: 645_CR11 publication-title: Journal of Business Ethics doi: 10.1023/A:1022200702149 contributor: fullname: R. I. Beekun – volume: 6 start-page: 215 issue: 4 year: 2004 ident: 645_CR80 publication-title: Ethics and Information Technology doi: 10.1007/s10676-004-3391-4 contributor: fullname: R. M. Siegfried – volume: 43 start-page: 100 issue: 1 year: 1982 ident: 645_CR43 publication-title: Journal of Personality and Social Psychology doi: 10.1037/0022-3514.43.1.100 contributor: fullname: D. C. Funder – volume: 14 start-page: 387 issue: 5 year: 1995 ident: 645_CR19 publication-title: Journal of Business Ethics doi: 10.1007/BF00872100 contributor: fullname: W. B. Carlin – volume: 32 start-page: 705 issue: 4 year: 2008 ident: 645_CR69 publication-title: MIS Quarterly doi: 10.2307/25148868 contributor: fullname: S. Mithas – volume: 25 start-page: 335 issue: 3 year: 1997 ident: 645_CR4 publication-title: Omega doi: 10.1016/S0305-0483(96)00053-9 contributor: fullname: I. Al-Jabri – volume: 20 start-page: 49 issue: 1 year: 2006 ident: 645_CR90 publication-title: Journal of Information Systems doi: 10.2308/jis.2006.20.1.49 contributor: fullname: D. J. Woolley – volume: 51 start-page: 1173 year: 1986 ident: 645_CR10 publication-title: Journal of Personality and Social Psychology doi: 10.1037/0022-3514.51.6.1173 contributor: fullname: R. M. Baron – volume: 33 start-page: 115 issue: 2 year: 2005 ident: 645_CR62 publication-title: Journal of Educational Computing Research doi: 10.2190/8M5U-HPQK-F2N5-B574 contributor: fullname: Z. Liang – volume: 13 start-page: 431 issue: 6 year: 1994 ident: 645_CR81 publication-title: Journal of Business Ethics doi: 10.1007/BF00881451 contributor: fullname: P. M. Simpson – volume: 37 start-page: 923 year: 2007 ident: 645_CR27 publication-title: European Journal of Social Psychology doi: 10.1002/ejsp.403 contributor: fullname: S. Costarelli – volume: 50 start-page: 248 year: 1991 ident: 645_CR8 publication-title: Organizational Behavior and Human Decision Processes doi: 10.1016/0749-5978(91)90022-L contributor: fullname: A. Banduri – volume: 3 start-page: 137 year: 1999 ident: 645_CR85 publication-title: Teaching Business Ethics doi: 10.1023/A:1009832018849 contributor: fullname: H. Y. D. Teoh – volume-title: Handbook of Self-Determination Research year: 2002 ident: 645_CR32 contributor: fullname: E. L. Deci – volume-title: The Message of Social Psychology year: 1997 ident: 645_CR87 contributor: fullname: H. C. Triandis – volume: 57 start-page: 161 issue: 2 year: 2005 ident: 645_CR23 publication-title: Journal of Business Ethics doi: 10.1007/s10551-004-5263-6 contributor: fullname: J. Chiou – volume-title: A First Course in Structural Equation Modeling year: 2006 ident: 645_CR77 contributor: fullname: T. Raykov – ident: 645_CR17 – volume-title: Structural Equation Modeling with EQS: Basic Concepts, Applications and Programming year: 2006 ident: 645_CR18 contributor: fullname: B. M. Byrne – volume: 15 start-page: 159 year: 1981 ident: 645_CR41 publication-title: Journal of Research in Personality doi: 10.1016/0092-6566(81)90015-5 contributor: fullname: W. J. Froming – volume: 35 start-page: 134 issue: 2 year: 1993 ident: 645_CR16 publication-title: Review of Religious Research doi: 10.2307/3511780 contributor: fullname: S. R. Burkett – volume: 28 start-page: 289 year: 2005 ident: 645_CR30 publication-title: Journal of Consumer Policy doi: 10.1007/s10603-005-8489-5 contributor: fullname: A. D’Astous – volume: 58 start-page: 603 issue: 4 year: 1990 ident: 645_CR42 publication-title: Journal of Personality doi: 10.1111/j.1467-6494.1990.tb00246.x contributor: fullname: W. J. Froming – volume: 19 start-page: 205 issue: 3 year: 1983 ident: 645_CR78 publication-title: Journal of Experimental Social Psychology doi: 10.1016/0022-1031(83)90038-0 contributor: fullname: M. F. Scheier – volume: 29 start-page: 161 issue: 1–2 year: 2001 ident: 645_CR89 publication-title: Journal of Business Ethics doi: 10.1023/A:1006415514200 contributor: fullname: S. C. Wagner – volume: 78 start-page: 527 issue: 4 year: 2008 ident: 645_CR29 publication-title: Journal of Business Ethics doi: 10.1007/s10551-007-9366-8 contributor: fullname: T. P. Cronan – volume: 103 start-page: 411 issue: 3 year: 1988 ident: 645_CR6 publication-title: Psychological Bulletin doi: 10.1037/0033-2909.103.3.411 contributor: fullname: J. C. Anderson – volume: 88 start-page: 588 year: 1980 ident: 645_CR13 publication-title: Psychological Bulletin doi: 10.1037/0033-2909.88.3.588 contributor: fullname: P. M. Bentler – volume: 25 start-page: 339 issue: 3 year: 2007 ident: 645_CR52 publication-title: Social Science Computer Review doi: 10.1177/0894439307299934 contributor: fullname: G. E. Higgins – volume: 107 start-page: 238 year: 1990 ident: 645_CR12 publication-title: Psychological Bulletin doi: 10.1037/0033-2909.107.2.238 contributor: fullname: P. M. Bentler – volume: 41 start-page: 731 issue: 4 year: 2007 ident: 645_CR91 publication-title: Journal of World Trade contributor: fullname: D. Yang – volume: 18 start-page: 101 issue: 2 year: 1990 ident: 645_CR67 publication-title: Journal of the Academy of Marketing Science doi: 10.1007/BF02726426 contributor: fullname: S. W. McDaniel – volume: 29 start-page: 733 issue: 8 year: 2001 ident: 645_CR50 publication-title: Social Behavior and Personality doi: 10.2224/sbp.2001.29.8.733 contributor: fullname: P. N. Hamid – volume: 29 start-page: 483 year: 2001 ident: 645_CR46 publication-title: Journal of Criminal Justice doi: 10.1016/S0047-2352(01)00111-8 contributor: fullname: C. Gibson – volume: 13 start-page: 469 issue: 6 year: 1994 ident: 645_CR9 publication-title: Journal of Business Ethics doi: 10.1007/BF00881456 contributor: fullname: T. Barnett – volume: 6 start-page: 5 year: 1986 ident: 645_CR54 publication-title: Journal of Macromarketing doi: 10.1177/027614678600600103 contributor: fullname: S. D. Hunt – volume-title: Attitudes, Personality, and Behavior year: 1988 ident: 645_CR2 contributor: fullname: I. Ajzen – volume: 24 start-page: 29 year: 1989 ident: 645_CR55 publication-title: International Journal of Accounting contributor: fullname: A. Karnes – volume: 7 start-page: 417 issue: 4 year: 2004 ident: 645_CR60 publication-title: CyberPsychology & Behavior doi: 10.1089/cpb.2004.7.417 contributor: fullname: O. Lee – volume: 64 start-page: 117 issue: 2 year: 2006 ident: 645_CR88 publication-title: Journal of Business Ethics doi: 10.1007/s10551-005-1901-x contributor: fullname: S. J. Vitell – volume: 31 start-page: 340 issue: 2 year: 2001 ident: 645_CR22 publication-title: Journal of Applied Social Psychology doi: 10.1111/j.1559-1816.2001.tb00200.x contributor: fullname: L. Chang – volume: 18 start-page: 219 issue: 3 year: 2001 ident: 645_CR7 publication-title: Journal of Consumer Marketing doi: 10.1108/07363760110392967 contributor: fullname: S. H. Ang – volume: 63 start-page: 237 year: 2006 ident: 645_CR5 publication-title: Journal of Business Ethics doi: 10.1007/s10551-005-1902-9 contributor: fullname: S. Al-Rafee – volume: 3 start-page: 186 issue: 2 year: 2000 ident: 645_CR59 publication-title: Organizational Research Methods doi: 10.1177/109442810032003 contributor: fullname: R. S. Landis – volume-title: A General Theory of Crime year: 1990 ident: 645_CR47 doi: 10.1515/9781503621794 contributor: fullname: M. R. Gottfredson – volume: 9 start-page: 147 issue: 1 year: 2006 ident: 645_CR83 publication-title: The Journal of American Academy of Business contributor: fullname: S. Sue – volume: 30 start-page: 5 year: 1993 ident: 645_CR48 publication-title: Journal of Research in Crime and Delinquency doi: 10.1177/0022427893030001002 contributor: fullname: H. G. Grasmick – volume: 32 start-page: 301 year: 1999 ident: 645_CR76 publication-title: Computers and Education doi: 10.1016/S0360-1315(99)00010-X contributor: fullname: M. Rahim – volume: 11 start-page: 601 year: 1986 ident: 645_CR86 publication-title: Academy of Management Review doi: 10.2307/258313 contributor: fullname: L. K. Trevino – volume: 47 start-page: 61 issue: 1 year: 1984 ident: 645_CR64 publication-title: Social Psychology Quarterly doi: 10.2307/3033889 contributor: fullname: A. E. Liska – volume: 5 start-page: 421 issue: 6 year: 1986 ident: 645_CR31 publication-title: Journal of Business Ethics doi: 10.1007/BF00380748 contributor: fullname: R. T. George De – volume: 62 start-page: 209 issue: 3 year: 2005 ident: 645_CR82 publication-title: Journal of Business Ethics doi: 10.1007/s10551-005-4773-1 contributor: fullname: A. Smith – volume: 26 start-page: 1 issue: 1 year: 2005 ident: 645_CR51 publication-title: Deviant Behavior doi: 10.1080/01639620490497947 contributor: fullname: G. E. Higgins – volume: 88 start-page: 879 issue: 5 year: 2003 ident: 645_CR75 publication-title: Journal of Applied Psychology doi: 10.1037/0021-9010.88.5.879 contributor: fullname: P. M. Podsakoff – volume: 11 start-page: 461 issue: 5–6 year: 1992 ident: 645_CR39 publication-title: Journal of Business Ethics doi: 10.1007/BF00870557 contributor: fullname: D. R. Forsyth – ident: 645_CR57 – volume-title: Principles and Practices of Structural Equation Modeling year: 2005 ident: 645_CR56 contributor: fullname: R. B. Kline – volume: 19 start-page: 227 year: 1998 ident: 645_CR25 publication-title: Deviant Behavior: An Interdisciplinary Journal doi: 10.1080/01639625.1998.9968087 contributor: fullname: J. K. Cochran – volume-title: Beliefs, Attitude, Intention, and Behavior: An Introduction to Theory and Research year: 1975 ident: 645_CR37 contributor: fullname: M. Fishbein – volume: 88 start-page: 197 year: 2009 ident: 645_CR84 publication-title: Journal of Business Ethics doi: 10.1007/s10551-008-9822-0 contributor: fullname: J. Tan – volume: 33 start-page: 195 issue: 2 year: 1995 ident: 645_CR33 publication-title: Criminology doi: 10.1111/j.1745-9125.1995.tb01176.x contributor: fullname: T. D. Evans – volume: 51 start-page: 414 issue: 4 year: 2004 ident: 645_CR63 publication-title: IEEE Transactions on Engineering Management doi: 10.1109/TEM.2004.835087 contributor: fullname: M. Limayem – volume: 13 start-page: 168 issue: 3 year: 2002 ident: 645_CR73 publication-title: Psychological Inquiry doi: 10.1207/S15327965PLI1303_02 contributor: fullname: K. I. Pargament – volume: 21 start-page: 223 issue: 3 year: 2002 ident: 645_CR79 publication-title: Marketing Science doi: 10.1287/mksc.21.3.223.145 contributor: fullname: S. M. Shugan – ident: 645_CR1 – volume: 39 start-page: 175 issue: 1 year: 1980 ident: 645_CR38 publication-title: Journal of Personality and Social psychology doi: 10.1037/0022-3514.39.1.175 contributor: fullname: D. R. Forsyth – volume: 43 start-page: 640 year: 2006 ident: 645_CR45 publication-title: Information and Management doi: 10.1016/j.im.2006.03.005 contributor: fullname: L. L. Gan – volume: 42 start-page: 143 year: 2004 ident: 645_CR61 publication-title: Information and Management doi: 10.1016/j.im.2003.12.008 contributor: fullname: L. N. K. Leonard – volume: 49 start-page: 87 issue: 3 year: 1985 ident: 645_CR36 publication-title: Journal of Marketing doi: 10.2307/1251618 contributor: fullname: O. C. Ferrell – volume-title: Multivariate Data Analysis year: 2006 ident: 645_CR49 contributor: fullname: J. Hair – volume: 24 start-page: 283 year: 1992 ident: 645_CR40 publication-title: Journal of Business Research doi: 10.1016/0148-2963(92)90035-A contributor: fullname: J. P. Fraedrich – volume: 20 start-page: 153 issue: 1 year: 2003 ident: 645_CR74 publication-title: Journal of Management Information Systems doi: 10.1080/07421222.2003.11045759 contributor: fullname: A. G. Peace – volume: 107 start-page: 260 issue: 2 year: 1990 ident: 645_CR15 publication-title: Psychology Bulletin doi: 10.1037/0033-2909.107.2.260 contributor: fullname: S. J. Breckler – volume: 17 start-page: 1825 issue: 16 year: 1998 ident: 645_CR21 publication-title: Journal of Business Ethics doi: 10.1023/A:1005721401993 contributor: fullname: M. K. Chang – volume: 44 start-page: 107 issue: 1 year: 1983 ident: 645_CR44 publication-title: Journal of Personality and Social Psychology doi: 10.1037/0022-3514.44.1.107 contributor: fullname: D. C. Funder – volume: 13 start-page: 849 issue: 11 year: 1994 ident: 645_CR65 publication-title: Journal of Business Ethics doi: 10.1007/BF00871698 contributor: fullname: J. M. Logsdon – volume-title: Attention and Self-Regulation: A Control-Theory Approach to Human Behavior year: 1981 ident: 645_CR20 doi: 10.1007/978-1-4612-5887-2 contributor: fullname: C. S. Carver – volume: 10 start-page: 4 issue: 1 year: 1986 ident: 645_CR66 publication-title: MIS Quarterly doi: 10.2307/248873 contributor: fullname: R. O. Mason – volume: 51 start-page: 35 issue: 1 year: 2007 ident: 645_CR28 publication-title: Journal of Alcohol and Drug Education contributor: fullname: L. A. Crawford – volume: 51 start-page: 179 issue: 2 year: 1991 ident: 645_CR3 publication-title: Organizational Behavior and Human Decision Processes doi: 10.1016/0749-5978(91)90020-T contributor: fullname: I. Ajzen – volume: 26 start-page: 401 year: 2006 ident: 645_CR68 publication-title: International Journal of Information Management doi: 10.1016/j.ijinfomgt.2006.01.004 contributor: fullname: A. Mishra – volume: 37 start-page: 75 issue: 1 year: 1979 ident: 645_CR34 publication-title: Journal of Personality and Social Psychology doi: 10.1037/0022-3514.37.1.75 contributor: fullname: A. Fenigstein – volume: 95 start-page: 921 year: 2004 ident: 645_CR53 publication-title: Psychological Reports doi: 10.2466/PR0.95.7.921-931 contributor: fullname: G. E. Higgins – volume: 23 start-page: 88 issue: 12 year: 2000 ident: 645_CR70 publication-title: Communications of ACM doi: 10.1145/355112.355129 contributor: fullname: T. Moores – volume: 5 start-page: 67 issue: 1 year: 1991 ident: 645_CR24 publication-title: Journal of Information Systems contributor: fullname: A. L. Christensen – volume: 43 start-page: 522 issue: 4 year: 1975 ident: 645_CR35 publication-title: Journal of Consulting and Clinical Psychology doi: 10.1037/h0076760 contributor: fullname: A. Fenigstein – volume: 47 start-page: 223 issue: 3 year: 2003 ident: 645_CR58 publication-title: Journal of Business Ethics doi: 10.1023/A:1026269003472 contributor: fullname: K. K. Kwong |
SSID | ssj0000514 |
Score | 2.3060174 |
Snippet | Software piracy, the illegal and unauthorized duplication, sale, or distribution of software, is a widespread and costly phenomenon. According to Business... |
SourceID | proquest crossref repec springer jstor |
SourceType | Aggregation Database Index Database Publisher |
StartPage | 663 |
SubjectTerms | Action theory Alliances Attitudes Business Business and Management Business Ethics Computer software Consciousness Decision making Developing countries Education Ethical behavior ethical ideology Ethics Ideology Jordan LDCs low self-control Management Moral relativism Philosophy Piracy Pirates Professional ethics public self-consciousness Quality of Life Research Reason Religiosity Sales Self Self consciousness Self control Software Software industry Software piracy Students Studies Theft Theory of Reasoned Action |
SummonAdditionalLinks | – databaseName: Arts & Humanities Database dbid: M1D link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1Lb9QwEB7RVkJceBQqQgH5wAnkssn6kXBBq9KqqihCUFBvlj1xylKRDftQKb-esZPssiB64OBEUSZy7LHH33jGMwDPvJbKVbrgUnvNhUfP86FDjoTtiSkV5vFs1ck7dfRJHJ_Js843Z9a5VfYyMQrqcoJhj_wlLSsqK4RMXzffeUgaFYyrXQaNDdhKUx3n5Un6ZiWI10N7i96o2Z6cI6jAoyVYCcnF2rLUeiauYc6tqW88_mUujavQ4Z021eosBi8MzicXe4u528Off4R2_O8G3oXbHT5lo3ZA3YMbvt6Gm717_DZsvLWX9-Hzb-E56nP2kWT5pZ169n48tXjFxjU7JqXW1q_YqGYHP6KX_KRmk4oR3mRtPIDw9MFbwvu-ZKN4vOIBnB4enO4f8S5DA0fSlOZcDlBhpYZYktrlpEYCC6UaVAGF5NbmpF5mWWktCREU0qauyIm28Hnui5K-24HNmmp5CMzaFHWWW2mtEA7RSSKSQ0QhSAq5QQLPe_6Ypo3DYVYRlwMzDTHTBGYakcBO5OCSUqRCE3QrEtjt-950c3Vmlh2fAFu-pUkWLCe29pNFJMlCBNXBNSSFSoOuqxPYj2NlWfmFbb66xcyT7DBDW-R0uaISkBfdxlQElYYKoT-jtDJf5t8SeNGPtNWf_rPBj65t1y7canfCgxPOY9icTxf-CUGpuXsaJ8wvesUaIw priority: 102 providerName: ProQuest |
Title | Investigating Software Piracy in Jordan: An Extension of the Theory of Reasoned Action |
URI | https://www.jstor.org/stable/41476159 https://link.springer.com/article/10.1007/s10551-010-0645-4 http://econpapers.repec.org/article/kapjbuset/v_3a98_3ay_3a2011_3ai_3a4_3ap_3a663-676.htm https://www.proquest.com/docview/853629451 https://search.proquest.com/docview/853210910 https://search.proquest.com/docview/896164487 |
Volume | 98 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3db9MwED9tq4T2gqAwkQ0qP_AECmpS23F4C1vH2NhUjQ2NJ8t2HOgm3KprNfrf7-w07So-JB5sK8olTnw--3e-8xngtc0Y11WWxyyzWUytsbHoaRMbxPbIlMqIsLfq9IwfXdLjK3a1Aely6cLdvGsskmGgfrDXDSf3ONhuOWUx3YQW89HQsA9fpsVq9F2P500bS-afXrE2F9XuiGtAszWxY2t-s5GGqefwCTxeYEZS1Ex-ChvWteFR47Le9icvL7w02rD5Wd21YXvQnFAwfwZfH8TScN_JFxx479TEksFwosycDB05Rg1UufekcKT_K7i0jxwZVQTBIak37_urc6sQnNuSFGEvxHO4OOxf7B_Fi-MUYoNqzTRmXcNNxXumRB1Js8zgzF7ybuUhg1BKoC6YpqVSKPGGMpXoXCBtboWweYnP7cCWw1peAFEqMVkqFFOKUm2MZkjEesZQikOG7kbwpmlXOa6DZshVeGTPBIlMkJ4JkkawE1p-SUkTmiHOyiPYa1ghF4J1K7EanuaUJRGQ5V2UCG_mUM6OZoEk9eFOu_8gyXniFdMsgv3A42XlN2p8rWe3FgVd9lQuMJtj8jAJiyEmimmMCaGa5BmXP6Y_I3jb9JDVl_71h3f_i3oPtutlbO9B8xK2ppOZfYU4aKo70Co-fjvpY_mhfzY476BGcPIJ89PkoBOE4h6IiQDq |
link.rule.ids | 315,783,787,4016,11711,21400,27936,27937,33756,33757,36162,36163,41093,41535,42162,42604,43817,44392,52123,52246,74636,75246 |
linkProvider | Springer Nature |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV3db9MwED-xVQJeJhhMhPHhB55AFk3qj4QXVKZOZXTVNAram2U7DusQadYPjf33nJ2kpULswYmiXOT4bN_9znc-A7xxkgtTyIxy6SRlzjqa9oylFrE9dkph07C36nQsht_YyQW_aGJzFk1YZSsTg6DOZ9avkb9HtSKSjPH4Y3VN_aFR3rnanKCxAx2fqQptr86nwfjsfCOKt5N7s9atWe-dQ7BAgy9YME7ZlmKqYxO3UGdn7ipn_3GYBj10_Aj2GgBJ-nWPP4Z7rtyH-238-j7sjPTNE_j-V_6M8gf5isL2Rs8dOZvOtb0l05KcoNWpyw-kX5LB7xDGPivJrCAICEm9Yd8_nTuNgNzlpB_2PzyFyfFgcjSkzREK1KIps6S8a4UtRM_maBcZLi1q81x0Cw8TUq1TtP-SJNcaZ7llXMcmS5E2c2nqshy_O4DdEmt5BkTr2Mok1Vxrxoy1hiMR71nLGIoJ043gbcs-VdWJMtQmJbLntUJeK89rxSI4CAxeU7KYScRWWQSHLcdVM5kWat31EZD1W5wF3rWhSzdbBZLEpzjt3kGSidgbozKCo9CV68p_6urKrBYOJ7fq6SzFyy0WD43wNsXCsFRYEJ4pIYW6XP6K4F07EDZ_-t8GP7-zXa_hwXByOlKjz-Mvh_CwXrb2ETMvYHc5X7mXiHuW5lUzuv8AUk77wg |
linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1Lb9QwEB7RVqq48ChUDeXhAyeQ203Wj4QLWrVdldJWFRTUm2U7DmwrsmE3q1J-PWMn2WVB9MTBiaJM5IxmPP7GMx4DvHSSC1PIjHLpJGXOOpr2jaUWsT0KpbBp2Ft1cioOP7GjC37RlhSatmmVnU0MhjofW79GvovTikgyxuPdos2KONsfvq2-U3-AlA-0tqdprMCa5Anzyn4S7y-M8nKZb9YFOJtddAgbaIgKC8YpW5qimizFJfy5NnGVs3-FTsOMNLwPlx0vTSLK1c6sNjv25x9lHv8Lsw_gXotbyaBRtIdwx5UbsN6lzW_AyrG-fgSffyvbUX4hH9HGX-uJI2ejibY3ZFSSI3R2dfmGDEpy8CNkz49LMi4I4lDS1AnwTx-cRj_A5WQQtl08hvPhwfneIW1PbqAWPaia8p4VthB9m6M7Zri0CCJy0Ss8Okm1TtHtTJJcazQulnEdmyxF2sylqcty_G4TVkvsZQuI1rGVSaq51owZaw1HIt63ljG0TqYXwatOVqpq6nOoRSVmL1iFglVesIpFsBmkOadkMZMI6bIItjs5qHYMT9VcCBGQ-VscfD6ioks3ngWSxFdW7d1CkonY-8Aygr2gN_POr3R1aWZThzZF9XWW4uUGm0dkeBthY9gqbIgKlZBCfa2_RfC607rFn_6T4Se38vUC1lGt1PG70_fbcLdZLPd5Ok9htZ7M3DNEW7V5HsbRL24vJdg |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Investigating+software+piracy+in+Jordan%3A+an+extension+of+the+theory+of+reasoned+action&rft.jtitle=Journal+of+business+ethics&rft.au=Aleassa%2C+Hassan&rft.au=Pearson%2C+John+Michael&rft.au=McClurg%2C+Scott&rft.date=2011-02-01&rft.issn=0167-4544&rft.volume=98&rft.issue=4&rft.spage=663&rft.epage=676&rft_id=info:doi/10.1007%2Fs10551-010-0645-4&rft.externalDBID=NO_FULL_TEXT |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0167-4544&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0167-4544&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0167-4544&client=summon |