Investigating Software Piracy in Jordan: An Extension of the Theory of Reasoned Action

Software piracy, the illegal and unauthorized duplication, sale, or distribution of software, is a widespread and costly phenomenon. According to Business Software Alliance (2008), over 41% of the PC software packages installed worldwide were unauthorized copies. Software piracy behavior has been in...

Full description

Saved in:
Bibliographic Details
Published inJournal of business ethics Vol. 98; no. 4; pp. 663 - 676
Main Authors Aleassa, Hassan, Pearson, John Michael, McClurg, Scott
Format Journal Article
LanguageEnglish
Published Dordrecht Springer 01.02.2011
Springer Netherlands
Springer Nature B.V
SeriesJournal of Business Ethics
Subjects
Online AccessGet full text

Cover

Loading…
Abstract Software piracy, the illegal and unauthorized duplication, sale, or distribution of software, is a widespread and costly phenomenon. According to Business Software Alliance (2008), over 41% of the PC software packages installed worldwide were unauthorized copies. Software piracy behavior has been investigated for more than 30 years. However, after a review of the relevant literature, there appears to be two voids in this literature: a lack of studies in non-Western countries and a scarcity of process studies. This study contributes to literature by developing a software piracy model to better understand the decision-making process that underlies this unethical behavior. The model was tested using data collected from a sample of 323 undergraduate business students. Consistent with the Theory of Reasoned Action (TRA), attitudes toward software piracy and subjective norms were significant predictors of intention to pirate software. Also, the results suggested that ethical ideology, public self-consciousness, and low self-control moderated the effect of these variables on intention to pirate software. The results have important practical implications for the software industry and governments hoping to curtail software piracy. Limitations of the study and recommendations for future studies are discussed as well.
AbstractList Software piracy, the illegal and unauthorized duplication, sale, or distribution of software, is a widespread and costly phenomenon. According to Business Software Alliance (2008), over 41% of the PC software packages installed worldwide were unauthorized copies. Software piracy behavior has been investigated for more than 30_years. However, after a review of the relevant literature, there appears to be two voids in this literature: a lack of studies in non-Western countries and a scarcity of process studies. This study contributes to literature by developing a software piracy model to better understand the decision-making process that underlies this unethical behavior. The model was tested using data collected from a sample of 323 undergraduate business students. Consistent with the Theory of Reasoned Action (TRA), attitudes toward software piracy and subjective norms were significant predictors of intention to pirate software. Also, the results suggested that ethical ideology, public self-consciousness, and low self-control moderated the effect of these variables on intention to pirate software. The results have important practical implications for the software industry and governments hoping to curtail software piracy. Limitations of the study and recommendations for future studies are discussed as well. Reprinted by permission of Springer
Software piracy, the illegal and unauthorized duplication, sale, or distribution of software, is a widespread and costly phenomenon. According to Business Software Alliance (2008), over 41% of the PC software packages installed worldwide were unauthorized copies. Software piracy behavior has been investigated for more than 30 years. However, after a review of the relevant literature, there appears to be two voids in this literature: a lack of studies in non-Western countries and a scarcity of process studies. This study contributes to literature by developing a software piracy model to better understand the decision-making process that underlies this unethical behavior. The model was tested using data collected from a sample of 323 undergraduate business students. Consistent with the Theory of Reasoned Action (TRA), attitudes toward software piracy and subjective norms were significant predictors of intention to pirate software. Also, the results suggested that ethical ideology, public self-consciousness, and low self-control moderated the effect of these variables on intention to pirate software. The results have important practical implications for the software industry and governments hoping to curtail software piracy. Limitations of the study and recommendations for future studies are discussed as well.
Software piracy, the illegal and unauthorized duplication, sale, or distribution of software, is a widespread and costly phenomenon. According to Business Software Alliance (2008), over 41% of the PC software packages installed worldwide were unauthorized copies. Software piracy behavior has been investigated for more than 30 years. However, after a review of the relevant literature, there appears to be two voids in this literature: a lack of studies in non-Western countries and a scarcity of process studies. This study contributes to literature by developing a software piracy model to better understand the decision-making process that underlies this unethical behavior. The model was tested using data collected from a sample of 323 undergraduate business students. Consistent with the Theory of Reasoned Action (TRA), attitudes toward software piracy and subjective norms were significant predictors of intention to pirate software. Also, the results suggested that ethical ideology, public self-consciousness, and low self-control moderated the effect of these variables on intention to pirate software. The results have important practical implications for the software industry and governments hoping to curtail software piracy. Limitations of the study and recommendations for future studies are discussed as well. Adapted from the source document.
Software piracy, the illegal and unauthorized duplication, sale, or distribution of software, is a widespread and costly phenomenon. According to Business Software Alliance (2008), over 41% of the PC software packages installed worldwide were unauthorized copies. Software piracy behavior has been investigated for more than 30 years. However, after a review of the relevant literature, there appears to be two voids in this literature: a lack of studies in non-Western countries and a scarcity of process studies. This study contributes to literature by developing a software piracy model to better understand the decision-making process that underlies this unethical behavior. The model was tested using data collected from a sample of 323 undergraduate business students. Consistent with the Theory of Reasoned Action (TRA), attitudes toward software piracy and subjective norms were significant predictors of intention to pirate software. Also, the results suggested that ethical ideology, public self-consciousness, and low self-control moderated the effect of these variables on intention to pirate software. The results have important practical implications for the software industry and governments hoping to curtail software piracy. Limitations of the study and recommendations for future studies are discussed as well. [PUBLICATION ABSTRACT]
Software piracy, the illegal and unauthorized duplication, sale, or distribution of software, is a widespread and costly phenomenon. According to Business Software Alliance (2008), over 41% of the PC software packages installed worldwide were unauthorized copies. Software piracy behavior has been investigated for more than 30 years. However, after a review of the relevant literature, there appears to be two voids in this literature: a lack of studies in non-Western countries and a scarcity of process studies. This study contributes to literature by developing a software piracy model to better understand the decision-making process that underlies this unethical behavior. The model was tested using data collected from a sample of 323 undergraduate business students. Consistent with the Theory of Reasoned Action (TRA), attitudes toward software piracy and subjective norms were significant predictors of intention to pirate software. Also, the results suggested that ethical ideology, public self-consciousness, and low self-control moderated the effect of these variables on intention to pirate software. The results have important practical implications for the software industry and governments hoping to curtail software piracy. Limitations of the study and recommendations for future studies are discussed as well.
Author Aleassa, Hassan
Pearson, John Michael
McClurg, Scott
Author_xml – sequence: 1
  givenname: Hassan
  surname: Aleassa
  fullname: Aleassa, Hassan
– sequence: 2
  givenname: John Michael
  surname: Pearson
  fullname: Pearson, John Michael
– sequence: 3
  givenname: Scott
  surname: McClurg
  fullname: McClurg, Scott
BackLink http://econpapers.repec.org/article/kapjbuset/v_3a98_3ay_3a2011_3ai_3a4_3ap_3a663-676.htm$$DView record in RePEc
BookMark eNqFUU1rGzEUFCWFOml_QA8F0UtP2-rt6mPVmwlpPgg0pKZXIWu19rq2tJXkNP73eWZLCj20gtFDMDOax5ySkxCDJ-QtsI_AmPqUgQkBFQNWMclFxV-QGQjV4EurEzJjIFXFBeevyGnOG4ZHAJ-R79fhwecyrGwZwop-i335ZZOnd0Oy7kCHQG9i6mz4TOeBXjwWH_IQA409LWtPF2sf0-H4uvc2Y6KOzl1Bwmvysrfb7N_8nmdk8eVicX5V3X69vD6f31aOa10qwZx0vWxcp0AuhXI1551kvWAaWmtbVUNdd9YyAMeFhaVukat923rdoe6MfJhsxxR_7nEPsxuy89utDT7us2m1BMl5q_7PFE0N-CtD5vu_mJu4TwG3OJJkrbkAJMFEcinmnHxvxjTsbDoYYOZYiJkKMViIORZiOGpuJk3yo3fPgh923Cz32RfzYBqrW7wOiBp3xjEgOGJESNkYqaRZlx2a1ZNZRp-w8ulPyn8leDeJNrnE9JyAA1cShG6eANNRsJw
CODEN JBUEDJ
CitedBy_id crossref_primary_10_1111_ijcs_12443
crossref_primary_10_1108_MIP_09_2013_0149
crossref_primary_10_1108_JIMA_05_2014_0037
crossref_primary_10_1108_EJM_07_2017_0455
crossref_primary_10_1080_0267257X_2017_1364285
crossref_primary_10_1016_j_jwb_2014_05_001
crossref_primary_10_1108_YC_08_2016_00627
crossref_primary_10_1111_ijcs_12240
crossref_primary_10_1016_j_ijpsycho_2022_04_001
crossref_primary_10_1177_00076503221110156
crossref_primary_10_1080_0267257X_2018_1452278
crossref_primary_10_3390_systems10050162
crossref_primary_10_1002_mar_21386
crossref_primary_10_1080_13675567_2023_2235290
crossref_primary_10_1108_APJML_11_2015_0163
crossref_primary_10_1007_s10551_014_2075_1
crossref_primary_10_5392_JKCA_2014_14_12_723
crossref_primary_10_1016_j_proeng_2016_11_649
crossref_primary_10_1080_01639625_2014_977111
crossref_primary_10_1007_s10660_021_09527_3
crossref_primary_10_1108_JIMA_04_2021_0128
crossref_primary_10_1080_10496491_2016_1185491
crossref_primary_10_1007_s10551_015_2755_5
crossref_primary_10_14783_maruoneri_594966
crossref_primary_10_1080_0144929X_2012_753552
crossref_primary_10_1108_IJOEM_09_2020_1067
crossref_primary_10_1108_JCM_04_2016_1778
crossref_primary_10_1108_17505931211282418
crossref_primary_10_1007_s13520_017_0081_y
crossref_primary_10_1016_j_heliyon_2023_e14720
crossref_primary_10_1016_j_chb_2022_107380
crossref_primary_10_1108_YC_10_2016_00641
crossref_primary_10_1108_ITP_12_2021_0937
crossref_primary_10_1108_JRIM_07_2018_0093
crossref_primary_10_1016_j_ijhm_2020_102679
crossref_primary_10_4102_sajim_v21i1_1081
crossref_primary_10_1108_EL_11_2012_0149
crossref_primary_10_1016_j_im_2021_103559
crossref_primary_10_1016_j_paid_2020_110340
crossref_primary_10_1108_17505931211282382
crossref_primary_10_1371_journal_pone_0127921
crossref_primary_10_1080_1540496X_2018_1480365
crossref_primary_10_1007_s10551_012_1394_3
crossref_primary_10_1108_GKMC_12_2019_0148
crossref_primary_10_1108_YC_05_2017_00697
crossref_primary_10_1016_j_chb_2017_02_014
crossref_primary_10_1002_mar_21164
crossref_primary_10_15388_Im_2021_91_53
crossref_primary_10_1016_j_chb_2016_04_024
crossref_primary_10_1007_s10551_015_2826_7
crossref_primary_10_1016_j_jcrimjus_2016_10_001
crossref_primary_10_1007_s10551_013_1892_y
crossref_primary_10_1016_j_chb_2016_11_015
crossref_primary_10_1016_j_heliyon_2022_e09214
crossref_primary_10_1016_j_elerap_2014_12_003
crossref_primary_10_20525_ijrbs_v9i3_675
crossref_primary_10_1016_j_jretconser_2020_102075
crossref_primary_10_1016_j_techfore_2017_02_029
crossref_primary_10_1108_LR_09_2016_0082
Cites_doi 10.1177/0013164403258228
10.1023/A:1022200702149
10.1007/s10676-004-3391-4
10.1037/0022-3514.43.1.100
10.1007/BF00872100
10.2307/25148868
10.1016/S0305-0483(96)00053-9
10.2308/jis.2006.20.1.49
10.1037/0022-3514.51.6.1173
10.2190/8M5U-HPQK-F2N5-B574
10.1007/BF00881451
10.1002/ejsp.403
10.1016/0749-5978(91)90022-L
10.1023/A:1009832018849
10.1007/s10551-004-5263-6
10.1016/0092-6566(81)90015-5
10.2307/3511780
10.1007/s10603-005-8489-5
10.1111/j.1467-6494.1990.tb00246.x
10.1016/0022-1031(83)90038-0
10.1023/A:1006415514200
10.1007/s10551-007-9366-8
10.1037/0033-2909.103.3.411
10.1037/0033-2909.88.3.588
10.1177/0894439307299934
10.1037/0033-2909.107.2.238
10.1007/BF02726426
10.2224/sbp.2001.29.8.733
10.1016/S0047-2352(01)00111-8
10.1007/BF00881456
10.1177/027614678600600103
10.1089/cpb.2004.7.417
10.1007/s10551-005-1901-x
10.1111/j.1559-1816.2001.tb00200.x
10.1108/07363760110392967
10.1007/s10551-005-1902-9
10.1177/109442810032003
10.1515/9781503621794
10.1177/0022427893030001002
10.1016/S0360-1315(99)00010-X
10.2307/258313
10.2307/3033889
10.1007/BF00380748
10.1007/s10551-005-4773-1
10.1080/01639620490497947
10.1037/0021-9010.88.5.879
10.1007/BF00870557
10.1080/01639625.1998.9968087
10.1007/s10551-008-9822-0
10.1111/j.1745-9125.1995.tb01176.x
10.1109/TEM.2004.835087
10.1207/S15327965PLI1303_02
10.1287/mksc.21.3.223.145
10.1037/0022-3514.39.1.175
10.1016/j.im.2006.03.005
10.1016/j.im.2003.12.008
10.2307/1251618
10.1016/0148-2963(92)90035-A
10.1080/07421222.2003.11045759
10.1037/0033-2909.107.2.260
10.1023/A:1005721401993
10.1037/0022-3514.44.1.107
10.1007/BF00871698
10.1007/978-1-4612-5887-2
10.2307/248873
10.1016/0749-5978(91)90020-T
10.1016/j.ijinfomgt.2006.01.004
10.1037/0022-3514.37.1.75
10.2466/PR0.95.7.921-931
10.1145/355112.355129
10.1037/h0076760
10.1023/A:1026269003472
ContentType Journal Article
Copyright 2011 Springer
Springer Science+Business Media B.V. 2010
Springer Science+Business Media B.V. 2011
Copyright_xml – notice: 2011 Springer
– notice: Springer Science+Business Media B.V. 2010
– notice: Springer Science+Business Media B.V. 2011
DBID DKI
X2L
AAYXX
CITATION
0-V
0U~
1-H
3V.
7TQ
7WY
7WZ
7XB
87Z
88C
88G
88J
8AO
8BJ
8FI
8FJ
8FK
8FL
8G5
AABKS
ABSDQ
ABUWG
AFKRA
ALSLI
AVQMV
AZQEC
BENPR
BEZIV
CCPQU
DHY
DON
DPSOV
DWQXO
FQK
FRNLG
FYUFA
F~G
GHDGH
GNUQQ
GUQSH
JBE
K50
K60
K6~
K8~
KC-
L.-
L.0
M0C
M0T
M1D
M2L
M2M
M2O
M2R
MBDVC
PQBIZ
PQBZA
PQEST
PQQKQ
PQUKI
PSYQQ
Q9U
S0X
DOI 10.1007/s10551-010-0645-4
DatabaseName RePEc IDEAS
RePEc
CrossRef
ProQuest Social Sciences Premium Collection【Remote access available】
Global News & ABI/Inform Professional
Trade PRO
ProQuest Central (Corporate)
PAIS Index
ABI/INFORM Collection
ABI/INFORM Global (PDF only)
ProQuest Central (purchase pre-March 2016)
ABI/INFORM Collection
Healthcare Administration Database (Alumni)
Psychology Database (Alumni)
Social Science Database (Alumni Edition)
ProQuest Pharma Collection
International Bibliography of the Social Sciences (IBSS)
Hospital Premium Collection
Hospital Premium Collection (Alumni Edition)
ProQuest Central (Alumni) (purchase pre-March 2016)
ABI/INFORM Collection (Alumni Edition)
Research Library (Alumni Edition)
Philosophy Collection
Philosophy Database
ProQuest Central (Alumni)
ProQuest Central
Social Science Premium Collection (Proquest) (PQ_SDU_P3)
Arts Premium Collection
ProQuest Central Essentials
ProQuest Central
ProQuest Business Premium Collection
ProQuest One Community College
PAIS International
PAIS International (Ovid)
Politics Collection
ProQuest Central
International Bibliography of the Social Sciences
Business Premium Collection (Alumni)
Health Research Premium Collection
ABI/INFORM Global (Corporate)
Health Research Premium Collection (Alumni)
ProQuest Central Student
Research Library Prep
International Bibliography of the Social Sciences
Art, Design and Architecture Collection
ProQuest Business Collection (Alumni Edition)
ProQuest Business Collection
DELNET Management Collection
ProQuest Politics Collection
ABI/INFORM Professional Advanced
ABI/INFORM Professional Standard
ABI/INFORM Global (ProQuest)
Healthcare Administration Database
Arts & Humanities Database
Political Science Database
Psychology Database
ProQuest research library
Social Science Database
Research Library (Corporate)
One Business
ProQuest One Business (Alumni)
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Academic
ProQuest One Academic UKI Edition
ProQuest One Psychology
ProQuest Central Basic
SIRS Editorial
DatabaseTitle CrossRef
ProQuest Business Collection (Alumni Edition)
ProQuest One Psychology
Research Library Prep
ProQuest Central Student
ProQuest Central Essentials
Trade PRO
ABI/INFORM Complete
Philosophy Collection
Global News & ABI/Inform Professional
Health Research Premium Collection
Arts Premium Collection
Business Premium Collection
Social Science Premium Collection
ABI/INFORM Global
ProQuest Political Science
ProQuest One Academic Eastern Edition
ProQuest Hospital Collection
Health Research Premium Collection (Alumni)
ProQuest Business Collection
ProQuest Hospital Collection (Alumni)
ProQuest Social Science Journals
ProQuest Social Sciences Premium Collection
ProQuest One Academic UKI Edition
PAIS International
ProQuest Health Management (Alumni Edition)
ProQuest DELNET Management Collection
ProQuest Politics Collection
Arts & Humanities Full Text
ProQuest One Academic
ABI/INFORM Global (Corporate)
ProQuest One Business
SIRS Editorial
ProQuest Social Science Journals (Alumni Edition)
ProQuest Central (Alumni Edition)
ProQuest One Community College
Research Library (Alumni Edition)
Politics Collection
ProQuest Pharma Collection
ProQuest Central
ABI/INFORM Professional Advanced
International Bibliography of the Social Sciences (IBSS)
ABI/INFORM Professional Standard
ProQuest Central Korea
ProQuest Research Library
ProQuest Art, Design and Architecture Collection
ABI/INFORM Complete (Alumni Edition)
ABI/INFORM Global (Alumni Edition)
ProQuest Central Basic
ProQuest Health Management
ProQuest Psychology Journals (Alumni)
ProQuest Psychology Journals
ProQuest One Business (Alumni)
ProQuest Central (Alumni)
Business Premium Collection (Alumni)
Philosophy Database
DatabaseTitleList International Bibliography of the Social Sciences (IBSS)

PAIS International
ProQuest Business Collection (Alumni Edition)

Database_xml – sequence: 1
  dbid: DKI
  name: RePEc IDEAS
  url: http://ideas.repec.org/
  sourceTypes: Index Database
– sequence: 2
  dbid: BENPR
  name: AUTh Library subscriptions: ProQuest Central
  url: https://www.proquest.com/central
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Law
Business
Education
Philosophy
EISSN 1573-0697
EndPage 676
ExternalDocumentID 2275299371
10_1007_s10551_010_0645_4
kapjbuset_v_3a98_3ay_3a2011_3ai_3a4_3ap_3a663_676_htm
41476159
GeographicLocations Jordan (country)
GeographicLocations_xml – name: Jordan (country)
GroupedDBID -51
-5C
-5G
-BR
-EM
-W8
-~C
-~X
.86
.GO
0-V
06D
0R~
0VY
199
1N0
203
29K
2J2
2JN
2JY
2KG
2KM
2LR
2VQ
2~H
30V
3V.
4.4
406
408
409
40D
40E
5GY
5VS
67Z
6NX
78A
7WY
8AO
8FI
8FJ
8FL
8FW
8G5
8TC
8UJ
8VB
95-
95.
95~
96X
AABHQ
AABKS
AAFGU
AAGAY
AAHNG
AAIAL
AAJKR
AANZL
AARHV
AARTL
AATNV
AATVU
AAUYE
AAWCG
AAYFA
AAYIU
AAYQN
AAYTO
ABBBX
ABBHK
ABBXA
ABDZT
ABECU
ABECW
ABFGW
ABFTD
ABFTV
ABHLI
ABHQN
ABIVO
ABJNI
ABJOX
ABKAS
ABKCH
ABKTR
ABKVW
ABLJU
ABMNI
ABMQK
ABNWP
ABQBU
ABSDQ
ABSRN
ABSXP
ABTEG
ABTHY
ABTKH
ABTMW
ABULA
ABUWG
ABWNU
ABXPI
ABXSQ
ABYRZ
ABYYQ
ACAOD
ACBMV
ACBRV
ACBXY
ACBYP
ACGFO
ACGFS
ACHQT
ACHSB
ACHXU
ACIGE
ACIHN
ACIPQ
ACKNC
ACMDZ
ACMLO
ACNCT
ACNXV
ACOKC
ACOMO
ACREJ
ACREN
ACTTH
ACVFL
ACVWB
ACWMK
ACZOJ
ADBBV
ADGDI
ADHHG
ADHIR
ADIMF
ADINQ
ADKNI
ADKPE
ADMDM
ADMHP
ADOXG
ADPTO
ADRFC
ADTPH
ADULT
ADURQ
ADYFF
ADYOE
ADZKW
AEAQA
AEBTG
AEFTE
AEGAL
AEGNC
AEJHL
AEJRE
AEKMD
AEOHA
AEPYU
AESKC
AESTI
AETLH
AEUPB
AEVLU
AEVTX
AEXYK
AFGCZ
AFKRA
AFLOW
AFNRJ
AFQWF
AFWTZ
AFYQB
AFZKB
AGAYW
AGDGC
AGGBP
AGJBK
AGMZJ
AGQMX
AGWIL
AGWZB
AGYKE
AHAJD
AHBYD
AHEXP
AHSBF
AHYZX
AIAKS
AIIXL
AILAN
AIMYW
AITGF
AJBLW
AJDOV
AJRNO
AJZVZ
AKQUC
AKVCP
ALMA_UNASSIGNED_HOLDINGS
ALSLI
ALWAN
AMKLP
AMTXH
AMXSW
AMYLF
AMYQR
AOCGG
AQUVI
ARALO
ARMRJ
ASPBG
AVQMV
AVWKF
AXYYD
AYQZM
AZFZN
AZQEC
AZRUE
B-.
BA0
BAPOH
BDATZ
BENPR
BEZIV
BGNMA
BHNFS
BKOMP
BPHCQ
BVXVI
CAG
CBXGM
CCPQU
CHNMF
COF
CS3
CSCUP
CWXUR
CZBKB
D-I
DDRTE
DL5
DNIVK
DPSOV
DPUIP
DU5
DWQXO
E.L
EBLON
EBS
EBU
EHE
EIOEI
EJD
ESBYG
F5P
FEDTE
FERAY
FFXSO
FIGPU
FINBP
FNLPD
FRNLG
FRRFC
FSGXE
FWDCC
FYUFA
GGCAI
GGRSB
GJIRD
GNUQQ
GNWQR
GQ6
GQ7
GQ8
GROUPED_ABI_INFORM_ARCHIVE
GROUPED_ABI_INFORM_COMPLETE
GROUPED_ABI_INFORM_RESEARCH
GUQSH
GXS
HF~
HG5
HG6
HMJXF
HQYDN
HRMNR
HVGLF
HZ~
I09
IHE
IJ-
IKXTQ
ITM
IWAJR
IXC
IZIGR
IZQ
I~X
I~Z
J-C
J0Z
JAAYA
JAB
JBMMH
JBSCW
JBU
JCJTX
JENOY
JHFFW
JKQEH
JLEZI
JLXEF
JPL
JPPEU
JSODD
JST
JZLTJ
K1G
K50
K60
K6~
K8~
KC-
KDC
KOV
LAK
LLZTM
M0C
M0T
M1D
M2L
M2M
M2O
M2R
M4Y
MA-
MQGED
N2Q
N9A
NB0
NPVJJ
NQJWS
NU0
O9-
O93
O9G
O9I
O9J
OAM
P19
P2P
P9Q
PF-
PQBIZ
PQQKQ
PRG
PROAC
PSYQQ
PT4
PT5
PZZ
Q2X
QF4
QM6
QM7
QN7
QO5
QOK
QOS
QWB
R-Y
R89
R9I
RHV
ROL
RPX
RSV
S0X
S16
S27
S3B
SA0
SAP
SDA
SDH
SDM
SHS
SHX
SISQX
SJYHP
SNE
SNPRN
SNX
SOHCF
SOJ
SPISZ
SRMVM
SSLCW
STPWE
SZN
T13
TAE
TH9
TN5
TSG
TSK
TSV
TUC
U2A
U5U
UG4
UHB
UKHRP
UNUBA
UOJIU
UTJUX
UZXMN
VC2
VFIZW
VQA
W23
W48
WH7
WIP
WK8
XFK
YLTOR
YQT
Z45
Z5O
Z7R
Z7S
Z7U
Z7V
Z7W
Z7X
Z7Y
Z7Z
Z81
Z82
Z83
Z85
Z86
Z87
Z88
Z8M
Z8N
Z8O
Z8P
Z8Q
Z8S
Z8T
Z8U
Z8V
Z8W
Z8Z
Z91
Z92
ZA5
ZL0
ZMTXR
~8M
~EX
-Y2
1SB
2.D
28-
2P1
5QI
8H~
AAAHA
AABYN
AANTL
AAXYU
ABKTN
ABTAH
ACIOK
ACVYN
ACYUM
ADMHC
ADSWE
AEAAH
AEEQQ
AEFIE
AFEXP
AFFNX
AFMIJ
AGGDS
AHAVH
AHKAY
AI.
AJUXI
BBWZM
ECVKH
EGZRM
GPZZG
HECYW
HYQOX
H~9
KOW
NDZJH
NEJ
O-F
O-J
OVD
Q5E
R4E
RNI
RNS
RZC
RZD
RZK
S1Z
S26
S28
SCLPG
T16
TEORI
UBC
VH1
VQP
WHG
WK6
YCJ
YYP
ZCG
ZWUKE
ZY4
~OX
~OY
~OZ
~P-
~P.
~P0
~P1
~PQ
~P~
08R
0R
1AW
51
5C
5G
8H
95
ABFLS
BBAFP
BR
C
DKI
EM
EX
H13
HZ
IPNFZ
K6
K8
KSO
LJ0
OX
OY
OZ
O~O
P
P-
P.
P0
P1
PQ
PQEST
PQUKI
PRINS
RIG
W8
X
X2L
XHC
AACDK
AAEOY
AAHSB
AAJBT
AASML
AAYXX
ABAKF
ACDTI
ADACV
AEFQL
AEMSY
AFBBN
AGQEE
AGRTI
AGZLP
AIGIU
ALIPV
CITATION
EBE
EBR
IPSME
LPU
PQBZA
0U~
1-H
7TQ
7XB
8BJ
8FK
AAHCP
AAYZH
ACUHF
ADMHG
APTMU
DHY
DON
FQK
JBE
L.-
L.0
MBDVC
Q9U
ID FETCH-LOGICAL-c499t-50c6cf63cd716b57c244d60f50918aa872122daa011c45a1b983cd9e88e9df63
IEDL.DBID U2A
ISSN 0167-4544
IngestDate Fri Oct 25 23:01:48 EDT 2024
Fri Oct 25 03:41:37 EDT 2024
Wed Nov 06 07:39:15 EST 2024
Thu Sep 26 19:09:28 EDT 2024
Wed Aug 18 03:51:24 EDT 2021
Sat Dec 16 12:01:17 EST 2023
Fri Feb 02 07:04:52 EST 2024
IsPeerReviewed true
IsScholarly true
Issue 4
Keywords low self-control
software piracy
religiosity
public self-consciousness
Theory of Reasoned Action
developing countries
ethical ideology
Jordan
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c499t-50c6cf63cd716b57c244d60f50918aa872122daa011c45a1b983cd9e88e9df63
Notes ObjectType-Article-2
SourceType-Scholarly Journals-1
ObjectType-Feature-1
content type line 23
ObjectType-Article-1
ObjectType-Feature-2
PQID 853629451
PQPubID 6472
PageCount 14
ParticipantIDs proquest_miscellaneous_896164487
proquest_miscellaneous_853210910
proquest_journals_853629451
crossref_primary_10_1007_s10551_010_0645_4
repec_primary_kapjbuset_v_3a98_3ay_3a2011_3ai_3a4_3ap_3a663_676_htm
springer_journals_10_1007_s10551_010_0645_4
jstor_primary_41476159
PublicationCentury 2000
PublicationDate 2011-02-01
PublicationDateYYYYMMDD 2011-02-01
PublicationDate_xml – month: 02
  year: 2011
  text: 2011-02-01
  day: 01
PublicationDecade 2010
PublicationPlace Dordrecht
PublicationPlace_xml – name: Dordrecht
PublicationSeriesTitle Journal of Business Ethics
PublicationSubtitle JBE
PublicationTitle Journal of business ethics
PublicationTitleAbbrev J Bus Ethics
PublicationYear 2011
Publisher Springer
Springer Netherlands
Springer Nature B.V
Publisher_xml – name: Springer
– name: Springer Netherlands
– name: Springer Nature B.V
References ForsythD. R.Judging die Morality of Business Practices: The Influence of Personal Moral PhilosophiesJournal of Business Ethics1992115–646147010.1007/BF00870557
ChangM. K.Predicting Unethical Behavior: A Comparison of the Theory of Reasoned Action and the Theory of Planned BehaviorJournal of Business Ethics199817161825183410.1023/A:1005721401993
RahimM.SeyalA. H.Abd RahmanN. A.Software Piracy Among Computing Students: A Bruneian ScenarioComputers and Education19993230132110.1016/S0360-1315(99)00010-X
KwongK. K.YauO. H.LeeJ. S.SinL. Y.TseA. C.The Effect of Attitudinal and Demographic Factors on Intention to Buy Pirated CDs: The Case of Chinese ConsumersJournal of Business Ethics200347322323510.1023/A:1026269003472
BarnettT.BassK.BrownG.Ethical Ideology and Ethical Judgment Regarding Ethical Issues in BusinessJournal of Business Ethics199413646948010.1007/BF00881456
GibsonC.WrightJ.Low Self-Control and Coworker Delinquency: A Research NoteJournal of Criminal Justice20012948349210.1016/S0047-2352(01)00111-8
SueS.Cultural Differences in Determining the Ethical Perception of Decision-Making of Future Accounting Professionals: A Comparison Between Accounting Students from Taiwan and the United StatesThe Journal of American Academy of Business200691147159
LandisR. S.BealD. J.PaulE.TeslukP. E.A Comparison of Approaches to Forming Composite Measures in Structural Equation ModelsOrganizational Research Methods20003218620710.1177/109442810032003
TrevinoL. K.Ethical Decision Making in Organizations: A Person-Situation Interactionist ModelAcademy of Management Review19861160161710.2307/258313
MithasS.JonesJ.MitchellW.Buyer Intention to Use Internet-Enabled Reverse Auctions: The Role of Asset Specificity, Product Specialization, and Non-Contractibility’MIS Quarterly2008324705724
BanduriA.Social Cognitive Theory of Self-RegulationOrganizational Behavior and Human Decision Processes19915024828710.1016/0749-5978(91)90022-L
De GeorgeR. T.Theological Ethics and Business EthicsJournal of Business Ethics19865642143210.1007/BF00380748
BurkettS. R.Perceived Parents’ Religiosity, Friends’ Drinking, and Hellfire: A Panel Study of Adolescent DrinkingReview of Religious Research199335213415410.2307/3511780
FunderD. C.On Assessing Social Psychological Theories Through the Study of Individual Differences: Template Matching and Forced ComplianceJournal of Personality and Social Psychology198243110011010.1037/0022-3514.43.1.100
LiangZ.YanZ.Software Piracy Among College Students: A Comprehensive Review of Contributing Factors, Underlying Process, and Tackling StrategiesJournal of Educational Computing Research200533211514010.2190/8M5U-HPQK-F2N5-B574
GrasmickH. G.TittleC. R.ArneklevB. J.Testing the Core Empirical Implications of Gottfredson and Hirschi’s General Theory of CrimeJournal of Research in Crime and Delinquency19933052910.1177/0022427893030001002
HigginsG. E.Can Low Self-Control Help with the Understanding of the Software Piracy Problem?Deviant Behavior200526112410.1080/01639620490497947
FromingW. J.CorleyE. B.RinkerL.The Influence of Public Self-Consciousness and Audience’s Characteristics on Withdrawal from Embarrassing SituationsJournal of Personality199058460362210.1111/j.1467-6494.1990.tb00246.x
PeaceA. G.GallettaD. F.ThongJ. Y.Software Piracy in the Workplace: A Model and Empirical TestJournal of Management Information Systems2003201153177
FraedrichJ. P.FerrellO. C.The Impact of Perceived Risk and Moral Philosophy on Ethical Decision Making in Business OrganizationsJournal of Business Research19922428329510.1016/0148-2963(92)90035-A
BaronR. M.KennyD. A.The Moderator-Mediator Variable Distinction in Social Psychological Research: Conceptual, Strategic, and Statistical ConsiderationsJournal of Personality and Social Psychology1986511173118210.1037/0022-3514.51.6.1173
NasserF.WisenbakerJ.A Monte Carlo Study Investigating the Impact of Item Parceling on Measures of Fit in Confirmatory Factor AnalysisEducational and Psychological Measurement200363572975710.1177/0013164403258228
LiskaA. E.A Critical Examination of the Casual Structure of the Fishbein/Ajzen Attitude–Behavior ModelSocial Psychology Quarterly1984471617410.2307/3033889
FenigsteinA.ScheierM. F.BussA. H.Public and Private Self-Consciousness: Assessment and TheoryJournal of Consulting and Clinical Psychology197543452252710.1037/h0076760
ShuganS. M.Marketing Science, Models, Monopoly Models, and Why We Need ThemMarketing Science200221322322810.1287/mksc.21.3.223.145
CostarelliS.CollocaA. P.The Moderation of Ambivalence on Attitude–Intention Relations as Mediated by Attitude ImportanceEuropean Journal of Social Psychology20073792393310.1002/ejsp.403
TriandisH. C.McGartyC.HaslamS. A.A Cross-Cultural Perspective on Social PsychologyThe Message of Social Psychology1997Cambridge, MABlackwell
MishraA.AkmanI.YaziciA.Software Piracy Among IT Professionals in OrganizationsInternational Journal of Information Management20062640141310.1016/j.ijinfomgt.2006.01.004
HairJ.BlackW.BabinB.AndersonR.Tatham R.Multivariate Data Analysis20066New JerseyPrentice Hall
AjzenI.Attitudes, Personality, and Behavior1988Milton Keynes, EnglandOpen University Press
Business Software Alliance: 2008, Sixth Annual BSA-IDC Global Software Piracy Study. Retrieved April 15, 2008, from http://global.bsa.org/globalpiracy2008/studies/globalpiracy2008.pdf.
FishbeinM.AjzenI.Beliefs, Attitude, Intention, and Behavior: An Introduction to Theory and Research1975Reading, MAAddison-Wesley
AjzenI.The Theory of Planned BehaviorOrganizational Behavior and Human Decision Processes199151217921110.1016/0749-5978(91)90020-T
AndersonJ. C.GerbingD. W.Structural Equation Modeling in Practice: A Review and Recommended Two-Step ApproachPsychological Bulletin1988103341142310.1037/0033-2909.103.3.411
WoolleyD. J.EiningM.Software Piracy Among Accounting Students: A Longitudinal Comparison of Changes and SensitivityJournal of Information Systems2006201496310.2308/jis.2006.20.1.49
Anonymous: 2007, ‘Business Software Sales Soar to $ 500m’, MEED: Middle East Economic Digest51(40), 33.
FunderD. C.OzerD. J.Behavior as a Function of the SituationJournal of Personality and Social Psychology198344110711210.1037/0022-3514.44.1.107
PargamentK. I.The Bitter and the Sweet: An Evaluation of the Costs and Benefits of ReligiousnessPsychological Inquiry200213316818110.1207/S15327965PLI1303_02
CarlinW. B.StrongK. C.A Critique of Western Philosophical Ethics: Multidisciplinary Alternatives for Framing Ethical DilemmasJournal of Business Ethics199514538739610.1007/BF00872100
KlineR. B.Principles and Practices of Structural Equation Modeling20052New YorkThe Guilford Press
HigginsG. E.FellB. D.WilsonA. L.Low Self-Control and Social Learning in Understanding Students’ Intention to Pirate Movies in the United StateSocial Science Computer Review200725333935710.1177/0894439307299934
PodsakoffP. M.MacKenzieS. B.LeeJ. Y.Common Method Biases in Behavioral Research: A Critical Review of the Literature and Recommended RemediesJournal of Applied Psychology200388587990310.1037/0021-9010.88.5.879
RaykovT.MarcoulidesG. A.A First Course in Structural Equation Modeling2006New JerseyLawrence Erlbaum Association
ChangL.HauK. T.The Effect of Self-Consciousness on the Expression of Gender ViewsJournal of Applied Social Psychology200131234035110.1111/j.1559-1816.2001.tb00200.x
ChristensenA. L.EiningM.Factors Influencing Software Piracy: Implication for AccountantsJournal of Information Systems1991516780
GanL. L.KohH. C.An Empirical Study of Software Piracy Among Tertiary Institutions in SingaporeInformation and Management20064364064910.1016/j.im.2006.03.005
ScheierM. F.CarverC. S.Directed Attention and the Comparison of Self with StandardsJournal of Experimental Social Psychology198319320522210.1016/0022-1031(83)90038-0
Al-JabriI.Abdul-GaderA.Software Copyright Infringements: An Exploratory Study of the Effects of Individual and Peer BeliefsOmega199725333534410.1016/S0305-0483(96)00053-9
Al-RafeeS.CronanT. P.Digital Piracy: Factors that Influence Attitude Toward BehaviorJournal of Business Ethics20066323725910.1007/s10551-005-1902-9
SimpsonP. M.BanerjeeD.SimpsonC. L.Soflifting: A Model for Motivating FactorsJournal of Business Ethics199413643143810.1007/BF00881451
DeciE. L.RyanR. M.Handbook of Self-Determination Research2002New YorkUniversity of Rochester Press
MasonR. O.Four Ethical Issues of the Information AgeMIS Quarterly198610141210.2307/248873
HuntS. D.VitellS.A General Theory of Marketing EthicsJournal of Macromarketing1986651610.1177/027614678600600103
LeeO.ShinM.Addictive Consumption of Avatars in CyberspaceCyberPsychology & Behavior20047441742010.1089/cpb.2004.7.417
BentlerP. M.Comparative Fit Indexes in Structural ModelsPsychological Bulletin199010723824610.1037/0033-2909.107.2.238
CrawfordL. A.NovakK. B.Resisting Peer Pressure: Characteristics Associated With Other-Self Discrepancies in College Students’ Levels of Alcohol ConsumptionJournal of Alcohol and Drug Education20075113562
ForsythD. R.A Taxonomy of Ethical IdeologiesJournal of Personality and Social psychology198039117518410.1037/0022-3514.39.1.175
TeohH. Y. D.SerangP.LimC. C.Individualism-Collectivism Cultural Differences Affecting Perceptions of Unethical Practices: Some Evidence from Australian and Indonesian Accounting StudentsTeaching Business Ethics1999313715310.1023/A:1009832018849
CronanT. P.Al-RafeeS.Factors that Influence the Intention to Pirate Software and MediaJournal of Business Ethics200878452754510.1007/s10551-007-9366-8
BentlerP. M.BonettD. G.Significance Tests and Goodness of Fit in the Analysis of Covariance StructuresPsychological Bulletin19808858860610.1037/0033-2909.88.3.588
ByrneB. M.Structural Equation Modeling with EQS: Basic Concepts, Applications and Programming20062Mahwah, NJLawrence Erlbaum Associates
HamidP. N.LaiJ. C.ChengS.Response Bias and Public and Private Self-Consciousness in ChineseSocial Behavior and Personality200129873374210.2224/sbp.2001.29.8.733
BeekunR. I.StedhamY.YamamuraJ. H.Business Ethics in Brazil and the U.S.: A Compar
C. Gibson (645_CR46) 2001; 29
T. Barnett (645_CR9) 1994; 13
P. M. Bentler (645_CR13) 1980; 88
R. S. Landis (645_CR59) 2000; 3
J. P. Fraedrich (645_CR40) 1992; 24
S. J. Vitell (645_CR88) 2006; 64
S. M. Shugan (645_CR79) 2002; 21
W. J. Froming (645_CR41) 1981; 15
L. L. Gan (645_CR45) 2006; 43
S. W. McDaniel (645_CR67) 1990; 18
A. Fenigstein (645_CR34) 1979; 37
R. M. Baron (645_CR10) 1986; 51
A. G. Peace (645_CR74) 2003; 20
S. Mithas (645_CR69) 2008; 32
J. Hair (645_CR49) 2006
G. E. Higgins (645_CR53) 2004; 95
I. Al-Jabri (645_CR4) 1997; 25
M. Fishbein (645_CR37) 1975
J. C. Anderson (645_CR6) 1988; 103
H. C. Triandis (645_CR87) 1997
A. E. Liska (645_CR64) 1984; 47
S. Al-Rafee (645_CR5) 2006; 63
P. N. Hamid (645_CR50) 2001; 29
K. I. Pargament (645_CR73) 2002; 13
L. A. Crawford (645_CR28) 2007; 51
O. Lee (645_CR60) 2004; 7
S. C. Wagner (645_CR89) 2001; 29
M. K. Chang (645_CR21) 1998; 17
T. Moores (645_CR70) 2000; 23
I. Ajzen (645_CR2) 1988
G. E. Higgins (645_CR52) 2007; 25
A. Karnes (645_CR55) 1989; 24
A. D’Astous (645_CR30) 2005; 28
T. Raykov (645_CR77) 2006
O. C. Ferrell (645_CR36) 1985; 49
B. M. Byrne (645_CR18) 2006
P. M. Bentler (645_CR12) 1990; 107
S. J. Breckler (645_CR15) 1990; 107
R. T. George De (645_CR31) 1986; 5
F. Nasser (645_CR72) 2003; 63
A. Smith (645_CR82) 2005; 62
D. Yang (645_CR91) 2007; 41
S. Costarelli (645_CR27) 2007; 37
L. Chang (645_CR22) 2001; 31
I. Ajzen (645_CR3) 1991; 51
Z. Liang (645_CR62) 2005; 33
R. M. Siegfried (645_CR80) 2004; 6
D. C. Funder (645_CR43) 1982; 43
P. M. Podsakoff (645_CR75) 2003; 88
H. Y. D. Teoh (645_CR85) 1999; 3
D. R. Forsyth (645_CR39) 1992; 11
K. K. Kwong (645_CR58) 2003; 47
S. H. Ang (645_CR7) 2001; 18
645_CR17
E. L. Deci (645_CR32) 2002
C. S. Carver (645_CR20) 1981
R. O. Mason (645_CR66) 1986; 10
645_CR57
J. K. Cochran (645_CR25) 1998; 19
A. Banduri (645_CR8) 1991; 50
R. I. Beekun (645_CR11) 2003; 42
L. K. Trevino (645_CR86) 1986; 11
D. J. Woolley (645_CR90) 2006; 20
A. Mishra (645_CR68) 2006; 26
S. R. Burkett (645_CR16) 1993; 35
P. M. Simpson (645_CR81) 1994; 13
M. Limayem (645_CR63) 2004; 51
M. F. Scheier (645_CR78) 1983; 19
A. L. Christensen (645_CR24) 1991; 5
D. R. Forsyth (645_CR38) 1980; 39
J. Tan (645_CR84) 2009; 88
T. D. Evans (645_CR33) 1995; 33
M. R. Gottfredson (645_CR47) 1990
H. G. Grasmick (645_CR48) 1993; 30
W. B. Carlin (645_CR19) 1995; 14
A. Fenigstein (645_CR35) 1975; 43
W. J. Froming (645_CR42) 1990; 58
L. N. K. Leonard (645_CR61) 2004; 42
G. E. Higgins (645_CR51) 2005; 26
M. Rahim (645_CR76) 1999; 32
645_CR1
J. Chiou (645_CR23) 2005; 57
D. C. Funder (645_CR44) 1983; 44
R. B. Kline (645_CR56) 2005
S. Sue (645_CR83) 2006; 9
S. D. Hunt (645_CR54) 1986; 6
T. P. Cronan (645_CR29) 2008; 78
J. M. Logsdon (645_CR65) 1994; 13
References_xml – volume: 63
  start-page: 729
  issue: 5
  year: 2003
  ident: 645_CR72
  publication-title: Educational and Psychological Measurement
  doi: 10.1177/0013164403258228
  contributor:
    fullname: F. Nasser
– volume: 42
  start-page: 267
  issue: 3
  year: 2003
  ident: 645_CR11
  publication-title: Journal of Business Ethics
  doi: 10.1023/A:1022200702149
  contributor:
    fullname: R. I. Beekun
– volume: 6
  start-page: 215
  issue: 4
  year: 2004
  ident: 645_CR80
  publication-title: Ethics and Information Technology
  doi: 10.1007/s10676-004-3391-4
  contributor:
    fullname: R. M. Siegfried
– volume: 43
  start-page: 100
  issue: 1
  year: 1982
  ident: 645_CR43
  publication-title: Journal of Personality and Social Psychology
  doi: 10.1037/0022-3514.43.1.100
  contributor:
    fullname: D. C. Funder
– volume: 14
  start-page: 387
  issue: 5
  year: 1995
  ident: 645_CR19
  publication-title: Journal of Business Ethics
  doi: 10.1007/BF00872100
  contributor:
    fullname: W. B. Carlin
– volume: 32
  start-page: 705
  issue: 4
  year: 2008
  ident: 645_CR69
  publication-title: MIS Quarterly
  doi: 10.2307/25148868
  contributor:
    fullname: S. Mithas
– volume: 25
  start-page: 335
  issue: 3
  year: 1997
  ident: 645_CR4
  publication-title: Omega
  doi: 10.1016/S0305-0483(96)00053-9
  contributor:
    fullname: I. Al-Jabri
– volume: 20
  start-page: 49
  issue: 1
  year: 2006
  ident: 645_CR90
  publication-title: Journal of Information Systems
  doi: 10.2308/jis.2006.20.1.49
  contributor:
    fullname: D. J. Woolley
– volume: 51
  start-page: 1173
  year: 1986
  ident: 645_CR10
  publication-title: Journal of Personality and Social Psychology
  doi: 10.1037/0022-3514.51.6.1173
  contributor:
    fullname: R. M. Baron
– volume: 33
  start-page: 115
  issue: 2
  year: 2005
  ident: 645_CR62
  publication-title: Journal of Educational Computing Research
  doi: 10.2190/8M5U-HPQK-F2N5-B574
  contributor:
    fullname: Z. Liang
– volume: 13
  start-page: 431
  issue: 6
  year: 1994
  ident: 645_CR81
  publication-title: Journal of Business Ethics
  doi: 10.1007/BF00881451
  contributor:
    fullname: P. M. Simpson
– volume: 37
  start-page: 923
  year: 2007
  ident: 645_CR27
  publication-title: European Journal of Social Psychology
  doi: 10.1002/ejsp.403
  contributor:
    fullname: S. Costarelli
– volume: 50
  start-page: 248
  year: 1991
  ident: 645_CR8
  publication-title: Organizational Behavior and Human Decision Processes
  doi: 10.1016/0749-5978(91)90022-L
  contributor:
    fullname: A. Banduri
– volume: 3
  start-page: 137
  year: 1999
  ident: 645_CR85
  publication-title: Teaching Business Ethics
  doi: 10.1023/A:1009832018849
  contributor:
    fullname: H. Y. D. Teoh
– volume-title: Handbook of Self-Determination Research
  year: 2002
  ident: 645_CR32
  contributor:
    fullname: E. L. Deci
– volume-title: The Message of Social Psychology
  year: 1997
  ident: 645_CR87
  contributor:
    fullname: H. C. Triandis
– volume: 57
  start-page: 161
  issue: 2
  year: 2005
  ident: 645_CR23
  publication-title: Journal of Business Ethics
  doi: 10.1007/s10551-004-5263-6
  contributor:
    fullname: J. Chiou
– volume-title: A First Course in Structural Equation Modeling
  year: 2006
  ident: 645_CR77
  contributor:
    fullname: T. Raykov
– ident: 645_CR17
– volume-title: Structural Equation Modeling with EQS: Basic Concepts, Applications and Programming
  year: 2006
  ident: 645_CR18
  contributor:
    fullname: B. M. Byrne
– volume: 15
  start-page: 159
  year: 1981
  ident: 645_CR41
  publication-title: Journal of Research in Personality
  doi: 10.1016/0092-6566(81)90015-5
  contributor:
    fullname: W. J. Froming
– volume: 35
  start-page: 134
  issue: 2
  year: 1993
  ident: 645_CR16
  publication-title: Review of Religious Research
  doi: 10.2307/3511780
  contributor:
    fullname: S. R. Burkett
– volume: 28
  start-page: 289
  year: 2005
  ident: 645_CR30
  publication-title: Journal of Consumer Policy
  doi: 10.1007/s10603-005-8489-5
  contributor:
    fullname: A. D’Astous
– volume: 58
  start-page: 603
  issue: 4
  year: 1990
  ident: 645_CR42
  publication-title: Journal of Personality
  doi: 10.1111/j.1467-6494.1990.tb00246.x
  contributor:
    fullname: W. J. Froming
– volume: 19
  start-page: 205
  issue: 3
  year: 1983
  ident: 645_CR78
  publication-title: Journal of Experimental Social Psychology
  doi: 10.1016/0022-1031(83)90038-0
  contributor:
    fullname: M. F. Scheier
– volume: 29
  start-page: 161
  issue: 1–2
  year: 2001
  ident: 645_CR89
  publication-title: Journal of Business Ethics
  doi: 10.1023/A:1006415514200
  contributor:
    fullname: S. C. Wagner
– volume: 78
  start-page: 527
  issue: 4
  year: 2008
  ident: 645_CR29
  publication-title: Journal of Business Ethics
  doi: 10.1007/s10551-007-9366-8
  contributor:
    fullname: T. P. Cronan
– volume: 103
  start-page: 411
  issue: 3
  year: 1988
  ident: 645_CR6
  publication-title: Psychological Bulletin
  doi: 10.1037/0033-2909.103.3.411
  contributor:
    fullname: J. C. Anderson
– volume: 88
  start-page: 588
  year: 1980
  ident: 645_CR13
  publication-title: Psychological Bulletin
  doi: 10.1037/0033-2909.88.3.588
  contributor:
    fullname: P. M. Bentler
– volume: 25
  start-page: 339
  issue: 3
  year: 2007
  ident: 645_CR52
  publication-title: Social Science Computer Review
  doi: 10.1177/0894439307299934
  contributor:
    fullname: G. E. Higgins
– volume: 107
  start-page: 238
  year: 1990
  ident: 645_CR12
  publication-title: Psychological Bulletin
  doi: 10.1037/0033-2909.107.2.238
  contributor:
    fullname: P. M. Bentler
– volume: 41
  start-page: 731
  issue: 4
  year: 2007
  ident: 645_CR91
  publication-title: Journal of World Trade
  contributor:
    fullname: D. Yang
– volume: 18
  start-page: 101
  issue: 2
  year: 1990
  ident: 645_CR67
  publication-title: Journal of the Academy of Marketing Science
  doi: 10.1007/BF02726426
  contributor:
    fullname: S. W. McDaniel
– volume: 29
  start-page: 733
  issue: 8
  year: 2001
  ident: 645_CR50
  publication-title: Social Behavior and Personality
  doi: 10.2224/sbp.2001.29.8.733
  contributor:
    fullname: P. N. Hamid
– volume: 29
  start-page: 483
  year: 2001
  ident: 645_CR46
  publication-title: Journal of Criminal Justice
  doi: 10.1016/S0047-2352(01)00111-8
  contributor:
    fullname: C. Gibson
– volume: 13
  start-page: 469
  issue: 6
  year: 1994
  ident: 645_CR9
  publication-title: Journal of Business Ethics
  doi: 10.1007/BF00881456
  contributor:
    fullname: T. Barnett
– volume: 6
  start-page: 5
  year: 1986
  ident: 645_CR54
  publication-title: Journal of Macromarketing
  doi: 10.1177/027614678600600103
  contributor:
    fullname: S. D. Hunt
– volume-title: Attitudes, Personality, and Behavior
  year: 1988
  ident: 645_CR2
  contributor:
    fullname: I. Ajzen
– volume: 24
  start-page: 29
  year: 1989
  ident: 645_CR55
  publication-title: International Journal of Accounting
  contributor:
    fullname: A. Karnes
– volume: 7
  start-page: 417
  issue: 4
  year: 2004
  ident: 645_CR60
  publication-title: CyberPsychology & Behavior
  doi: 10.1089/cpb.2004.7.417
  contributor:
    fullname: O. Lee
– volume: 64
  start-page: 117
  issue: 2
  year: 2006
  ident: 645_CR88
  publication-title: Journal of Business Ethics
  doi: 10.1007/s10551-005-1901-x
  contributor:
    fullname: S. J. Vitell
– volume: 31
  start-page: 340
  issue: 2
  year: 2001
  ident: 645_CR22
  publication-title: Journal of Applied Social Psychology
  doi: 10.1111/j.1559-1816.2001.tb00200.x
  contributor:
    fullname: L. Chang
– volume: 18
  start-page: 219
  issue: 3
  year: 2001
  ident: 645_CR7
  publication-title: Journal of Consumer Marketing
  doi: 10.1108/07363760110392967
  contributor:
    fullname: S. H. Ang
– volume: 63
  start-page: 237
  year: 2006
  ident: 645_CR5
  publication-title: Journal of Business Ethics
  doi: 10.1007/s10551-005-1902-9
  contributor:
    fullname: S. Al-Rafee
– volume: 3
  start-page: 186
  issue: 2
  year: 2000
  ident: 645_CR59
  publication-title: Organizational Research Methods
  doi: 10.1177/109442810032003
  contributor:
    fullname: R. S. Landis
– volume-title: A General Theory of Crime
  year: 1990
  ident: 645_CR47
  doi: 10.1515/9781503621794
  contributor:
    fullname: M. R. Gottfredson
– volume: 9
  start-page: 147
  issue: 1
  year: 2006
  ident: 645_CR83
  publication-title: The Journal of American Academy of Business
  contributor:
    fullname: S. Sue
– volume: 30
  start-page: 5
  year: 1993
  ident: 645_CR48
  publication-title: Journal of Research in Crime and Delinquency
  doi: 10.1177/0022427893030001002
  contributor:
    fullname: H. G. Grasmick
– volume: 32
  start-page: 301
  year: 1999
  ident: 645_CR76
  publication-title: Computers and Education
  doi: 10.1016/S0360-1315(99)00010-X
  contributor:
    fullname: M. Rahim
– volume: 11
  start-page: 601
  year: 1986
  ident: 645_CR86
  publication-title: Academy of Management Review
  doi: 10.2307/258313
  contributor:
    fullname: L. K. Trevino
– volume: 47
  start-page: 61
  issue: 1
  year: 1984
  ident: 645_CR64
  publication-title: Social Psychology Quarterly
  doi: 10.2307/3033889
  contributor:
    fullname: A. E. Liska
– volume: 5
  start-page: 421
  issue: 6
  year: 1986
  ident: 645_CR31
  publication-title: Journal of Business Ethics
  doi: 10.1007/BF00380748
  contributor:
    fullname: R. T. George De
– volume: 62
  start-page: 209
  issue: 3
  year: 2005
  ident: 645_CR82
  publication-title: Journal of Business Ethics
  doi: 10.1007/s10551-005-4773-1
  contributor:
    fullname: A. Smith
– volume: 26
  start-page: 1
  issue: 1
  year: 2005
  ident: 645_CR51
  publication-title: Deviant Behavior
  doi: 10.1080/01639620490497947
  contributor:
    fullname: G. E. Higgins
– volume: 88
  start-page: 879
  issue: 5
  year: 2003
  ident: 645_CR75
  publication-title: Journal of Applied Psychology
  doi: 10.1037/0021-9010.88.5.879
  contributor:
    fullname: P. M. Podsakoff
– volume: 11
  start-page: 461
  issue: 5–6
  year: 1992
  ident: 645_CR39
  publication-title: Journal of Business Ethics
  doi: 10.1007/BF00870557
  contributor:
    fullname: D. R. Forsyth
– ident: 645_CR57
– volume-title: Principles and Practices of Structural Equation Modeling
  year: 2005
  ident: 645_CR56
  contributor:
    fullname: R. B. Kline
– volume: 19
  start-page: 227
  year: 1998
  ident: 645_CR25
  publication-title: Deviant Behavior: An Interdisciplinary Journal
  doi: 10.1080/01639625.1998.9968087
  contributor:
    fullname: J. K. Cochran
– volume-title: Beliefs, Attitude, Intention, and Behavior: An Introduction to Theory and Research
  year: 1975
  ident: 645_CR37
  contributor:
    fullname: M. Fishbein
– volume: 88
  start-page: 197
  year: 2009
  ident: 645_CR84
  publication-title: Journal of Business Ethics
  doi: 10.1007/s10551-008-9822-0
  contributor:
    fullname: J. Tan
– volume: 33
  start-page: 195
  issue: 2
  year: 1995
  ident: 645_CR33
  publication-title: Criminology
  doi: 10.1111/j.1745-9125.1995.tb01176.x
  contributor:
    fullname: T. D. Evans
– volume: 51
  start-page: 414
  issue: 4
  year: 2004
  ident: 645_CR63
  publication-title: IEEE Transactions on Engineering Management
  doi: 10.1109/TEM.2004.835087
  contributor:
    fullname: M. Limayem
– volume: 13
  start-page: 168
  issue: 3
  year: 2002
  ident: 645_CR73
  publication-title: Psychological Inquiry
  doi: 10.1207/S15327965PLI1303_02
  contributor:
    fullname: K. I. Pargament
– volume: 21
  start-page: 223
  issue: 3
  year: 2002
  ident: 645_CR79
  publication-title: Marketing Science
  doi: 10.1287/mksc.21.3.223.145
  contributor:
    fullname: S. M. Shugan
– ident: 645_CR1
– volume: 39
  start-page: 175
  issue: 1
  year: 1980
  ident: 645_CR38
  publication-title: Journal of Personality and Social psychology
  doi: 10.1037/0022-3514.39.1.175
  contributor:
    fullname: D. R. Forsyth
– volume: 43
  start-page: 640
  year: 2006
  ident: 645_CR45
  publication-title: Information and Management
  doi: 10.1016/j.im.2006.03.005
  contributor:
    fullname: L. L. Gan
– volume: 42
  start-page: 143
  year: 2004
  ident: 645_CR61
  publication-title: Information and Management
  doi: 10.1016/j.im.2003.12.008
  contributor:
    fullname: L. N. K. Leonard
– volume: 49
  start-page: 87
  issue: 3
  year: 1985
  ident: 645_CR36
  publication-title: Journal of Marketing
  doi: 10.2307/1251618
  contributor:
    fullname: O. C. Ferrell
– volume-title: Multivariate Data Analysis
  year: 2006
  ident: 645_CR49
  contributor:
    fullname: J. Hair
– volume: 24
  start-page: 283
  year: 1992
  ident: 645_CR40
  publication-title: Journal of Business Research
  doi: 10.1016/0148-2963(92)90035-A
  contributor:
    fullname: J. P. Fraedrich
– volume: 20
  start-page: 153
  issue: 1
  year: 2003
  ident: 645_CR74
  publication-title: Journal of Management Information Systems
  doi: 10.1080/07421222.2003.11045759
  contributor:
    fullname: A. G. Peace
– volume: 107
  start-page: 260
  issue: 2
  year: 1990
  ident: 645_CR15
  publication-title: Psychology Bulletin
  doi: 10.1037/0033-2909.107.2.260
  contributor:
    fullname: S. J. Breckler
– volume: 17
  start-page: 1825
  issue: 16
  year: 1998
  ident: 645_CR21
  publication-title: Journal of Business Ethics
  doi: 10.1023/A:1005721401993
  contributor:
    fullname: M. K. Chang
– volume: 44
  start-page: 107
  issue: 1
  year: 1983
  ident: 645_CR44
  publication-title: Journal of Personality and Social Psychology
  doi: 10.1037/0022-3514.44.1.107
  contributor:
    fullname: D. C. Funder
– volume: 13
  start-page: 849
  issue: 11
  year: 1994
  ident: 645_CR65
  publication-title: Journal of Business Ethics
  doi: 10.1007/BF00871698
  contributor:
    fullname: J. M. Logsdon
– volume-title: Attention and Self-Regulation: A Control-Theory Approach to Human Behavior
  year: 1981
  ident: 645_CR20
  doi: 10.1007/978-1-4612-5887-2
  contributor:
    fullname: C. S. Carver
– volume: 10
  start-page: 4
  issue: 1
  year: 1986
  ident: 645_CR66
  publication-title: MIS Quarterly
  doi: 10.2307/248873
  contributor:
    fullname: R. O. Mason
– volume: 51
  start-page: 35
  issue: 1
  year: 2007
  ident: 645_CR28
  publication-title: Journal of Alcohol and Drug Education
  contributor:
    fullname: L. A. Crawford
– volume: 51
  start-page: 179
  issue: 2
  year: 1991
  ident: 645_CR3
  publication-title: Organizational Behavior and Human Decision Processes
  doi: 10.1016/0749-5978(91)90020-T
  contributor:
    fullname: I. Ajzen
– volume: 26
  start-page: 401
  year: 2006
  ident: 645_CR68
  publication-title: International Journal of Information Management
  doi: 10.1016/j.ijinfomgt.2006.01.004
  contributor:
    fullname: A. Mishra
– volume: 37
  start-page: 75
  issue: 1
  year: 1979
  ident: 645_CR34
  publication-title: Journal of Personality and Social Psychology
  doi: 10.1037/0022-3514.37.1.75
  contributor:
    fullname: A. Fenigstein
– volume: 95
  start-page: 921
  year: 2004
  ident: 645_CR53
  publication-title: Psychological Reports
  doi: 10.2466/PR0.95.7.921-931
  contributor:
    fullname: G. E. Higgins
– volume: 23
  start-page: 88
  issue: 12
  year: 2000
  ident: 645_CR70
  publication-title: Communications of ACM
  doi: 10.1145/355112.355129
  contributor:
    fullname: T. Moores
– volume: 5
  start-page: 67
  issue: 1
  year: 1991
  ident: 645_CR24
  publication-title: Journal of Information Systems
  contributor:
    fullname: A. L. Christensen
– volume: 43
  start-page: 522
  issue: 4
  year: 1975
  ident: 645_CR35
  publication-title: Journal of Consulting and Clinical Psychology
  doi: 10.1037/h0076760
  contributor:
    fullname: A. Fenigstein
– volume: 47
  start-page: 223
  issue: 3
  year: 2003
  ident: 645_CR58
  publication-title: Journal of Business Ethics
  doi: 10.1023/A:1026269003472
  contributor:
    fullname: K. K. Kwong
SSID ssj0000514
Score 2.3060174
Snippet Software piracy, the illegal and unauthorized duplication, sale, or distribution of software, is a widespread and costly phenomenon. According to Business...
SourceID proquest
crossref
repec
springer
jstor
SourceType Aggregation Database
Index Database
Publisher
StartPage 663
SubjectTerms Action theory
Alliances
Attitudes
Business
Business and Management
Business Ethics
Computer software
Consciousness
Decision making
Developing countries
Education
Ethical behavior
ethical ideology
Ethics
Ideology
Jordan
LDCs
low self-control
Management
Moral relativism
Philosophy
Piracy
Pirates
Professional ethics
public self-consciousness
Quality of Life Research
Reason
Religiosity
Sales
Self
Self consciousness
Self control
Software
Software industry
Software piracy
Students
Studies
Theft
Theory of Reasoned Action
SummonAdditionalLinks – databaseName: Arts & Humanities Database
  dbid: M1D
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1Lb9QwEB7RVkJceBQqQgH5wAnkssn6kXBBq9KqqihCUFBvlj1xylKRDftQKb-esZPssiB64OBEUSZy7LHH33jGMwDPvJbKVbrgUnvNhUfP86FDjoTtiSkV5vFs1ck7dfRJHJ_Js843Z9a5VfYyMQrqcoJhj_wlLSsqK4RMXzffeUgaFYyrXQaNDdhKUx3n5Un6ZiWI10N7i96o2Z6cI6jAoyVYCcnF2rLUeiauYc6tqW88_mUujavQ4Z021eosBi8MzicXe4u528Off4R2_O8G3oXbHT5lo3ZA3YMbvt6Gm717_DZsvLWX9-Hzb-E56nP2kWT5pZ169n48tXjFxjU7JqXW1q_YqGYHP6KX_KRmk4oR3mRtPIDw9MFbwvu-ZKN4vOIBnB4enO4f8S5DA0fSlOZcDlBhpYZYktrlpEYCC6UaVAGF5NbmpF5mWWktCREU0qauyIm28Hnui5K-24HNmmp5CMzaFHWWW2mtEA7RSSKSQ0QhSAq5QQLPe_6Ypo3DYVYRlwMzDTHTBGYakcBO5OCSUqRCE3QrEtjt-950c3Vmlh2fAFu-pUkWLCe29pNFJMlCBNXBNSSFSoOuqxPYj2NlWfmFbb66xcyT7DBDW-R0uaISkBfdxlQElYYKoT-jtDJf5t8SeNGPtNWf_rPBj65t1y7canfCgxPOY9icTxf-CUGpuXsaJ8wvesUaIw
  priority: 102
  providerName: ProQuest
Title Investigating Software Piracy in Jordan: An Extension of the Theory of Reasoned Action
URI https://www.jstor.org/stable/41476159
https://link.springer.com/article/10.1007/s10551-010-0645-4
http://econpapers.repec.org/article/kapjbuset/v_3a98_3ay_3a2011_3ai_3a4_3ap_3a663-676.htm
https://www.proquest.com/docview/853629451
https://search.proquest.com/docview/853210910
https://search.proquest.com/docview/896164487
Volume 98
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3db9MwED9tq4T2gqAwkQ0qP_AECmpS23F4C1vH2NhUjQ2NJ8t2HOgm3KprNfrf7-w07So-JB5sK8olTnw--3e-8xngtc0Y11WWxyyzWUytsbHoaRMbxPbIlMqIsLfq9IwfXdLjK3a1Aely6cLdvGsskmGgfrDXDSf3ONhuOWUx3YQW89HQsA9fpsVq9F2P500bS-afXrE2F9XuiGtAszWxY2t-s5GGqefwCTxeYEZS1Ex-ChvWteFR47Le9icvL7w02rD5Wd21YXvQnFAwfwZfH8TScN_JFxx479TEksFwosycDB05Rg1UufekcKT_K7i0jxwZVQTBIak37_urc6sQnNuSFGEvxHO4OOxf7B_Fi-MUYoNqzTRmXcNNxXumRB1Js8zgzF7ybuUhg1BKoC6YpqVSKPGGMpXoXCBtboWweYnP7cCWw1peAFEqMVkqFFOKUm2MZkjEesZQikOG7kbwpmlXOa6DZshVeGTPBIlMkJ4JkkawE1p-SUkTmiHOyiPYa1ghF4J1K7EanuaUJRGQ5V2UCG_mUM6OZoEk9eFOu_8gyXniFdMsgv3A42XlN2p8rWe3FgVd9lQuMJtj8jAJiyEmimmMCaGa5BmXP6Y_I3jb9JDVl_71h3f_i3oPtutlbO9B8xK2ppOZfYU4aKo70Co-fjvpY_mhfzY476BGcPIJ89PkoBOE4h6IiQDq
link.rule.ids 315,783,787,4016,11711,21400,27936,27937,33756,33757,36162,36163,41093,41535,42162,42604,43817,44392,52123,52246,74636,75246
linkProvider Springer Nature
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV3db9MwED-xVQJeJhhMhPHhB55AFk3qj4QXVKZOZXTVNAram2U7DusQadYPjf33nJ2kpULswYmiXOT4bN_9znc-A7xxkgtTyIxy6SRlzjqa9oylFrE9dkph07C36nQsht_YyQW_aGJzFk1YZSsTg6DOZ9avkb9HtSKSjPH4Y3VN_aFR3rnanKCxAx2fqQptr86nwfjsfCOKt5N7s9atWe-dQ7BAgy9YME7ZlmKqYxO3UGdn7ipn_3GYBj10_Aj2GgBJ-nWPP4Z7rtyH-238-j7sjPTNE_j-V_6M8gf5isL2Rs8dOZvOtb0l05KcoNWpyw-kX5LB7xDGPivJrCAICEm9Yd8_nTuNgNzlpB_2PzyFyfFgcjSkzREK1KIps6S8a4UtRM_maBcZLi1q81x0Cw8TUq1TtP-SJNcaZ7llXMcmS5E2c2nqshy_O4DdEmt5BkTr2Mok1Vxrxoy1hiMR71nLGIoJ043gbcs-VdWJMtQmJbLntUJeK89rxSI4CAxeU7KYScRWWQSHLcdVM5kWat31EZD1W5wF3rWhSzdbBZLEpzjt3kGSidgbozKCo9CV68p_6urKrBYOJ7fq6SzFyy0WD43wNsXCsFRYEJ4pIYW6XP6K4F07EDZ_-t8GP7-zXa_hwXByOlKjz-Mvh_CwXrb2ETMvYHc5X7mXiHuW5lUzuv8AUk77wg
linkToPdf http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1Lb9QwEB7RVqq48ChUDeXhAyeQ203Wj4QLWrVdldJWFRTUm2U7DmwrsmE3q1J-PWMn2WVB9MTBiaJM5IxmPP7GMx4DvHSSC1PIjHLpJGXOOpr2jaUWsT0KpbBp2Ft1cioOP7GjC37RlhSatmmVnU0MhjofW79GvovTikgyxuPdos2KONsfvq2-U3-AlA-0tqdprMCa5Anzyn4S7y-M8nKZb9YFOJtddAgbaIgKC8YpW5qimizFJfy5NnGVs3-FTsOMNLwPlx0vTSLK1c6sNjv25x9lHv8Lsw_gXotbyaBRtIdwx5UbsN6lzW_AyrG-fgSffyvbUX4hH9HGX-uJI2ejibY3ZFSSI3R2dfmGDEpy8CNkz49LMi4I4lDS1AnwTx-cRj_A5WQQtl08hvPhwfneIW1PbqAWPaia8p4VthB9m6M7Zri0CCJy0Ss8Okm1TtHtTJJcazQulnEdmyxF2sylqcty_G4TVkvsZQuI1rGVSaq51owZaw1HIt63ljG0TqYXwatOVqpq6nOoRSVmL1iFglVesIpFsBmkOadkMZMI6bIItjs5qHYMT9VcCBGQ-VscfD6ioks3ngWSxFdW7d1CkonY-8Aygr2gN_POr3R1aWZThzZF9XWW4uUGm0dkeBthY9gqbIgKlZBCfa2_RfC607rFn_6T4Se38vUC1lGt1PG70_fbcLdZLPd5Ok9htZ7M3DNEW7V5HsbRL24vJdg
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Investigating+software+piracy+in+Jordan%3A+an+extension+of+the+theory+of+reasoned+action&rft.jtitle=Journal+of+business+ethics&rft.au=Aleassa%2C+Hassan&rft.au=Pearson%2C+John+Michael&rft.au=McClurg%2C+Scott&rft.date=2011-02-01&rft.issn=0167-4544&rft.volume=98&rft.issue=4&rft.spage=663&rft.epage=676&rft_id=info:doi/10.1007%2Fs10551-010-0645-4&rft.externalDBID=NO_FULL_TEXT
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0167-4544&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0167-4544&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0167-4544&client=summon