| 期刊論文1. | Thong, James Y. L.、Yap, Chee-Sing(1998)。Testing an Ethical Decision-making Theory: The Case of Softlifting。Journal of Management Information Systems,15(1),213-237。 | 2. | Moores, T. T.、Chang, J. C. J.(2006)。Ethical decision making in software piracy:initia l development and test of a four-component model。MIS Quarterly,30(1),167-180。 | 3. | Jacobs, R. S.、Heuvelman, A.、Tan, M.、Peters, O.(2012)。Digital Movie Piracy: A Perspective on Downloading Behavior through Social Cognitive Theory。Computers in Human Behavior,28(3),958-967。 | 4. | 吳建和、余靜媺(20031200)。大學生對著作權認知與侵權行為之研究。長榮大學學報,7(2),95-110。 延伸查詢 | 5. | Bhattacharjee, S. R.、Gopal, K. L.、Marsden, J. R.(2006)。Impact of legal threats on online music sharing activity: An analysis of music industry legal actions。Journal of Law and Economics,49(1),91-114。 | 6. | Chiang, E.、Assane, D.(2008)。Music piracy among students on the university campus: Do males and females react different?。The Journal of Socio-Economics,37,1371-1380。 | 7. | Grable, J. L.、O'Neill, R. B.(2004)。Projection bias and financial risk tolerance。Journal of Behavioral Finance,5,142-147。 | 8. | Im, J. H.、Van Epps, P. D.(1992)。Software piracy and software security in business school: An ethical perspective。The database for Advances in Information System,22(3),15-21。 | 9. | McCaffrey, M.(2004)。Cyber Ethics 101。School Library Journal,50(11),26。 | 10. | Snyder, M. G.(2004)。Cyber-Ethics: Pirates in the Classroom。Science Activities,41(3),3-4。 | 11. | Aleassa, H.、Pearson, J. M.、McClurg, S.(2011)。Investigating software piracy in Jordan: An extension of the theory of reasoned action。Journal of Business Ethics,98(4),663-676。 | 12. | Cohen, L. E.、Felson, M.(1979)。Social change and crime rates: A routine activity approach。American Sociological Review,44(4),588-608。 | 13. | Cronan, T. P.、Al-Rafee, S.(2008)。Factors that influence the intention tp pirate software and media。Journal of Business Ethics,78,527-545。 | 14. | Feuilherade, P.(2006)。An empirical study of software piracy among tertiary institutions in Singapore。Information & Management,43(5),640-649。 | 15. | Holsapple, C. W.、Iyengar, D.、Jin, H.、Rao, S.(2008)。Parameters for software piracy research。The Information Society,24,199-218。 | 16. | Leonard, L.、Cronan, T. P.(2001)。Illegal, inappropriate, and unethical behavior in an information technology contexts: A study to explain influence。Journal of the Association for Information Systems,1(12),1-31。 | 17. | Morris, R. G.、Higgins, G. E.(2010)。Criminological theory in the digital age: The case of social learning theory and digital piracy。Journal of Criminal Justice,38,470-480。 | 18. | Nill, A.、Schibrowsk, J.、Peltier, J. W.(2010)。Factors that influence software piracy: A view from Germany。Communications of the ACM,53(6),131-134。 | 19. | Reiss, M. C.、Mitra, K.(1998)。The effects of individual difference factors on the acceptability of ethical and unethical workplace behaviors。Journal of Business Ethics,17(14),1581-1593。 | 20. | Siponen, M.、Vance, A.、Willison, R.(2012)。New insights into the problem of software piracy: The effects of neutralization, shame, and moral beliefs。Information & Management,49(7/8),334-341。 | 21. | Swinyard, W. R.、Rinne, H.、Kau, K. A.(2013)。The morality of software piracy: A cross-cultural analysis。Advances in Business Ethics Research,2,565-578。 | 22. | Wall, W.、Harvey, P.(2006)。Digital pirates in practice: Analysis of market transactions in Hong Kongâs pirate software arcades。International Journal of Management,23(2),207-215。 | 23. | Wang, Y. S.、Yeh, C. H.、Liao, Y. W.(2013)。What drives purchase intention in the context of online content services? The moderating role of ethical selfefficacy for online piracy。International Journal of Information Management,33(1),199-208。 | 24. | Kuo, F. Y.、Hsu, M. H.(2001)。Development and Validation of Ethical Computer Self-Efficacy Measure: The Case of Softlifting。Journal of Business Ethics,32(4),299-315。 | 25. | Wagner, S. C.、Sanders, G. L.(2001)。Considerations in ethical decision-making and software piracy。Journal of Business Ethics,29(1/2),161-167。 | 26. | Kreie, J.、Cronan, P.(2000)。Making ethical decisions。Communications of the ACM,43(12),66-72。 | 27. | Simpson, P. M.、Banerjee, D.、Simpson, C. L.(1994)。Softlifting: a model of motivating factors。Journal of Business Ethics,13(6),431-438。 | 28. | Parrack, J. S.(2001)。Get the 411 on copyright and the internet。Reading Today,18(5),7。 | 29. | Dubinsky, Alan J.、Loken, Barbara(1989)。Analyzing Ethical Decision Making in Marketing。Journal of Business Research,19(2),83-107。 | 30. | Peace, A. G.、Galletta, D. F.、Thong, J. Y. L.(2003)。Software piracy in the workplace: a model and empirical test。Journal of Management Information Systems,20(1),153-177。 | 31. | 林鴻南、廖則竣(20110300)。預測盜版軟體的使用:知覺風險、軟體成本、道德義務與計劃行為理論之整合模式。電子商務學報,13(1),55-76。 延伸查詢 | 32. | Locke, Edwin A.、Zubritzky, Elizabeth、Lee, Cynthia、Bobko, Philip(1984)。The Effect of Self-efficacy, Goals, and Task Strategies on Task Performance。Journal of Applied Psychology,69(2),241-251。 | 33. | Banerjee, D.、Cronan, T. P.、Jones, T. W.(1998)。Modeling IT Ethics: A Study in Situational Ethics。MIS Quarterly,22(1),31-60。 | 34. | 陳鴻基、洪新原、張碩毅、陳韻如(20080900)。軟體盜版因素之研究:臺灣與美國學生之跨國比較。電子商務學報,10(3),643-664。 延伸查詢 | 35. | Hunt, Shelby D.、Vitell, Scott J.(1986)。A general theory of marketing ethics。Journal of Macromarketing,6(1),5-16。 | 36. | Compeau, Deborah R.、Higgins, Christopher A.(1995)。Computer self-efficacy: development of a measure and initial test。MIS Quarterly,19(2),189-211。 | 37. | 陳俊宏、呂豐足(20030600)。網路著作權的合理使用原則概觀。資訊、科技與社會學報,3(1)=4,107-125。 延伸查詢 | 38. | 陳萩卿、張景媛(20070900)。知識信念影響學習運作模式之驗證。教育心理學報,39(1),23-43。 延伸查詢 | 39. | Sanders, G. L.、Gopal, R. D.(1997)。Preventive and Deterrent Controls for Software Piracy。Journal of Management Information Systems,13(4),29-47。 | 40. | Sims, R. Ronald、Cheng, Hsing Kenneth、Teegen, Hildy(1996)。Toward a Profile of Student Software Piraters。Journal of Business Ethics,15(8),839-849。 | 41. | Randall, D. M.、Gibson, A. M.(1991)。Ethical Decision Making in the Medical Profession: An Application of the Theory of Planned Behavior。Journal of Business Ethics,10,111-122。 | 會議論文1. | 楊舒婷、周倩(2004)。大學生的網路盜版動機、行為、著作權態度之相關性初探。2004台灣網際網路研討會,台東大學 (會議日期: 93年10月)。臺東市。567-572。 延伸查詢 | 2. | Limayem, M.、Khalifa, M.(1999)。Factors motivating software piracy: A longitudinal study。international conference on informations systems,124-131。 | 3. | 紀潔芳、施永裕、劉可德(2001)。大專學生資訊倫理態度與實踐之探討。16屆全國技術及職業教育研討會。花蓮市。323-336。 延伸查詢 | 研究報告1. | 輔仁大學(2006)。大專學生使用網路下載、共享與複製的態度與行為。臺北市:輔仁大學媒體與教學資源中心。 延伸查詢 | 學位論文1. | 陳柏如(2008)。探討台灣大學生使用盜版軟體之內在歷程(碩士論文)。國立東華大學。 延伸查詢 | 2. | 徐百欽(2006)。以情境預防觀點探討台灣大學生軟體盜版之意志與非意志控制研究(碩士論文)。國立高雄大學。 延伸查詢 | 3. | 劉家儀(2008)。從創作經驗與自我規範探討軟體盜版之行為意圖(博士論文)。國立中山大學。 延伸查詢 | 4. | 方武祥(1995)。不同背景的大學生對電腦不道德行為觀念之研究(碩士論文)。大葉大學。 延伸查詢 | 5. | 周佐桑(2009)。大學生著作權認知及態度與著作權侵權相關性之研究--以北部一所醫學大學為例(碩士論文)。國立臺灣師範大學。 延伸查詢 | 6. | Villazon, C. H.(2004)。Software piracy: An empirical study of influencing factors(博士論文)。Nova Southeastern University,Ann Arbor, MI。 | 圖書1. | Clarke, R. V.(1999)。Hot product: Understanding, anticipating and reducing the demand for stolen goods。 | 2. | 黃芳銘(2010)。結構方程模式:理論與應用。臺北市:五南圖書出版股份有限公司。 延伸查詢 | 3. | 邱皓政(2007)。量化研究與統計分析:SPSS中文視窗版資料分析範例解析。臺北市:五南圖書出版股份有限公司。 延伸查詢 | 4. | Akers, Ronald L.(1998)。Social Learning and Social Structure: A General Theory of Crime and Deviance。Northeastern University Press。 | 5. | 余民寧(2006)。潛在變項模式:SIMPLIS的應用。高等教育。 延伸查詢 | 6. | 吳明隆(2009)。SPSS操作與應用:問卷統計分析實務。五南圖書出版股份有限公司。 延伸查詢 | 其他1. | (2010)。尊重軟體著作權檢舉盜版獎百萬,http:// marketing.chinatimes.com/ItemDetailPage/PDAFormat/PDAFContent. asp?MMContentNoID=63364。 延伸查詢 | 2. | 王皓政(20030304)。加強內控嚴防侵權。 延伸查詢 | 3. | Business Software Alliance(2010)。Seventh annual BSA and IDC global software piracy study: Taiwan,http://portal.bsa.org/globalpiracy2009/pr/pr_ taiwan.pdf。 | 4. | 教育部電子計算機中心(2012)。尊重網路智財權,http://www.edu.tw/moecc/content. aspx?site_content_sn=5257。 延伸查詢 | 5. | 智慧財產局(2012)。認識著作權,http://www.tipo.gov.tw/ch/。 延伸查詢 | 6. | Siwek, S. E.(2007)。The true cost of sound recording piracy to the US economy,http://www.ipi.org/ipi%5CIPIPublications.nsf/PublicationLoolupFullText/5C2EE3D2107A4C228625733E0053AlF4。 | 7. | 財團法人臺灣網路資訊中心(2012)。2012年臺灣寬頻網路使用調查報告,http://www.twnic.net.tw/download/200307/20120709d.pdf。 延伸查詢 | 8. | 聯合報系民意調查中心(20020501)。五成七電腦族:正版太貴盜版有理。 延伸查詢 | 圖書論文1. | Akers, R. L.、Jensen, G. F.(2006)。The empirical status of social learning theory of crime and deviance: The past, present and future。Taking Stock: The Status of Criminological Theory。New Brunswick, NJ:Transaction。 | 2. | Nissenbaum, H.(1995)。Should I copy my neighbor's software?。Computers, ethics, and social responsibility。Englewood Cliffs, NT:Prentice Hall。 | 3. | Johnson, D. G.(2004)。Proprietary rights in computer software: Individual and policy issues。Software ownership。Research Center on Computing & Society。 | 4. | Stallman, R.(1993)。Why software should be free。Software ownership。Research Center on Computing & Society。 | 5. | Eining, M. M.、Christensen, A. L.(1991)。A Psycho-Social Model of Software Piracy: The Development and Test of A Model。Ethical Issues in Information Systems。Boston, MA:Boyd and Fraser。 | |
| |