Switch to: References

Add citations

You must login to add citations.
  1. Comparing software piracy in South Africa and Zambia using social cognitive theory.Andrew Thatcher & Mary Matthews - 2012 - African Journal of Business Ethics 6 (1):1.
  • Three-Level Mechanism of Consumer Digital Piracy: Development and Cross-Cultural Validation.Mateja Kos Koklic, Monika Kukar-Kinney & Irena Vida - 2016 - Journal of Business Ethics 134 (1):15-27.
    Digital piracy as a continuing problem significantly impacts various stakeholders, including consumers, enterprises, and countries. This study develops a three-level mechanism of determinants of consumer digital piracy behavior, with personal risk as an individual factor, susceptibility to interpersonal influence as an inter-personal factor, and moral intensity as a broad societal factor. Further, it explores the role of rationalization and future piracy intent as outcomes of past piracy behaviors. The authors use survey data from four countries in the European Union to (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  • Perceived risk and digital piracy: a moderated-moderation model.Kian Yeik Koay - 2023 - Journal of Information, Communication and Ethics in Society 21 (4):521-532.
    Purpose This study aims to examine the joint moderating effects of privacy risk and time risk on the relationship between financial risk and intentions to pirate digital products. Design/methodology/approach The author collected data from 247 participants using a survey method. Subsequently, PROCESS macro was used to evaluate the proposed hypotheses. Findings This study found that financial risk does not have a significant relationship with the consumer intention to pirate digital products. However, privacy risk moderates the negative relationship between financial risk (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  • Morality Effects and Consumer Responses to Counterfeit and Pirated Products: A Meta-analysis.Martin Eisend - 2019 - Journal of Business Ethics 154 (2):301-323.
    Acquisition and purchase of counterfeit and pirated products are illicit and morally questionable consumer behaviors. Nonetheless, some consumers engage in such illicit behavior and seem to overcome the moral dilemma by justification strategies. The findings on morality effects on consumer responses to counterfeit and pirated products are diverse, and the underlying theories provide no clear picture of the process that explains how morality and justification lead to particular consumer responses or why consumers differ in their responses. This study presents a (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  • An ethical framework in information systems decision making using normative theories of business ethics.Utpal Bose - 2012 - Ethics and Information Technology 14 (1):17-26.
    As business environments become more complex and reliant on information systems, the decisions made by managers affect a growing number of stakeholders. This paper proposes a framework based on the application of normative theories in business ethics to facilitate the evaluation of IS related ethical dilemmas and arrive at fair and consistent decisions. The framework is applied in the context of an information privacy dilemma to demonstrate the decision making process. The ethical dilemma is analyzed using each one of the (...)
    Direct download (9 more)  
     
    Export citation  
     
    Bookmark   2 citations