Software Piracy Among Employees in Australian University
|
|
- Clement Gallagher
- 8 years ago
- Views:
Transcription
1 Software Piracy Among Employees in Australian University N. Almazmomi, Department of Management, La Trobe University, S. Zyngier, Department of Management, La Trobe University, J. Spoor, Department of Management, La Trobe University and I. Alharbi, Department of Management, La Trobe University. Abstract Software piracy is a global problem that has resulted in huge economic losses worldwide. A report by the Business Software Alliance [1] noted that for the past five years worldwide, software piracy has hovered between 35% to 38%, and losses amounted to billions of dollars. The main purpose of this study is to investigate the relationship between the demographic variables of Australian university employees and their actual behavior in relation to software piracy. Data were obtained from a survey of 278 staff in a public university in Australia. The study found that overall, the actual behavior of university staff in relation to software piracy is affected by demographic variables and computer variables. Also, females were less likely to pirate software than males. Age and level of education negatively related to software piracy, whereas there was no identifiable relationship between either computer experience or Internet experience with software piracy. Also, income does not appear to be related to the level of software piracy. The findings of this paper are preliminary results of a larger research project. Keywords Software Piracy, Piracy, Australia, Survey, high education I. INTRODUCTION AND LITERATURE REVIEW High-speed Internet connections and the increased power of computing technologies have resulted in a growing trend towards software piracy. The prevalence and significant growth of software piracy has both attracted and warranted attention from researchers, educators, software developers, intellectual property advocators and software producers. Despite the use of deterrent and preventive measures to combat software piracy [2], this problem is unabated. Software piracy, defined as the unauthorized utilization, replication, and distribution of commercially available or copyrighted software [3], has been increasing years [1]. Additional definitions include the unauthorized use or copying of intellectual property (IP) and software, which are protected [4], [5]. As a result, global software piracy is a serious problem for consumers, policymakers, and businesses because of the loss of commercial profit [1] and consequently is also of interest to Academics. In this paper, employees acts of software piracy are examined in relation to demographic variables (e.g., gender, age, and education), and computer-related variables (e.g., computer experience, Internet experience and computer ownership). Demographic Factors in Software Piracy: In the extant literature, numbers of studies have attempted to interpret software piracy by developing a profile of individuals who would most likely engage in pirating software, focusing on such characteristics as age, gender, socioeconomic class, level of education, and level of computer experience [6], [7], [8], [9], [10], [11]. Many previous studies have shown that people of different gender, ages, levels of income, and levels of educational attainment tend to vary in their willingness to buy pirated software [12], [13], [14]. However, previous studies have reported inconsistent findings about the effects of age, income, and level of education on actual pirating behaviors. Tom et al. [15] found that customers who use pirated software tend to be younger, to earn less income, and to have received less education. Studies show that the propensity to pirate software does not depend on the age, [17], [18]., However, Oz [19], Shim and Taylor [20], found that no significant differences exist in software piracy in relation to different age groups. Some studies demonstrate that the younger generation shows more inclination towards software piracy as compared to the older generation [21], [22]. Moreover, Sims, Cheng and Teegan [25] hypothesized whether younger students pirate software more often than older students. Van Der Merwe found [23] that among distance education students, younger students pirated software more than older students. Similarly Gan and Koh, [24] found age is negatively related to software piracy. That older students overwhelmingly showed support to pirate more than younger students when asked to indicate the number of times in the past year older student copied software without buy it. Further, Sims et al., [25] found that older students pirated software more frequently than younger students. On the other hand, [6] did not find significant differences between older and younger students in pirating behavior. Gender is another important demographic factor that has been linked to software piracy. Contrary to the research findings of Oz [19], Davis and Welton [26] and Tsalikis and Ortiz- Buonafina [27] suggest that there were no differences between the genders and software piracy, and research by Pereira and Kanekar [28] suggests that females evidenced greater ethical sensitivity than did males. Sims et al, [25] extended their research by focusing on demographic factors and unethical behaviour in general, and software piracy in particular. Sims' study found a significant difference between males and females in terms of the extent to which they pirate software.
2 Several studies have suggested that male students are more likely to engage in software piracy than female students [25], [23], and male computer users may have more lenient attitudes toward pirated software than female users [29]. However, not all studies show this gender difference in software piracy. Based on a survey of students, faculty, and professionals, Peslak [30] found that females had a higher incidence of copying others software than males. Moores and Chang [31] found that male and female students interpret the act of software piracy similarly while van der Byl and van Belle [32] did not find a statistically significant relationship between gender and software piracy. Prior research has suggested that there is a significant relationship between an individual's level of education and software piracy. Wee et al. [14] found that the higher the education level of an individual, the higher the chance that he or she would to use pirated software. Also, it has been observed that countries that have literacy rates and that spend a large portion on national research and development tend to engage in less software piracy [41]. However, Ang et al. [12] clearly demonstrated that education is not related to one's intention to use pirated software. Sims et al, [25] identified two factors as significant to software piracy: software price and household income. While Rahim, Seyal and Rahman [33] found that the influence of family income did not appear to have an effect in relation to pirating software for personal gain, indicating that students who come from both higher and lower income groups tend to engage in software piracy. However, Marron and Steel [41] has been found that countries with high-income populations tend to engage in less software piracy [41]. Computer-Related Factors in Software Piracy: Personal computer (PC) experience is another potentially significant factor influencing on pirated. For instance, computer literate students may pirate software [33]. Van den Merwe [23] also found that the more personal computer experience distance-computing students had, the more likely they were to engage in more software piracy. Eining and Christensen [34] have also suggested that there is a relationship between software piracy and familiarity with computers. However, Rahim et al [33] found no significant relationship between PC ownership, PC experience and software piracy intention. Technical skill may be another essential factor in predicting software piracy. Two studies that tested the effect of technical skills found that it was a statistically insignificant predictor of computer crime [35], [36]. However, according to [37], both of these studies utilized measures of technical ability that did not capture the reality of what can be considered a high level of technological expertise linked with software piracy [38], [6], [37]. Hinduja and Ingram [39] tested Internet proficiency by asking respondents about their experience in conducting ten online activities, such as setting up mail server preferences and building a web page. These variables were merged into a scale representing Internet experience. Their results showed that a higher level of Internet experience is related with increased software piracy. Their study also indicated that faster Internet connectivity was linked with higher piracy rates [39]. It can be suggested that the Internet has enabled an increase in software piracy in recent years. Wall [40] argued that the Internet enables individuals to easily commit criminal activity for four reasons: it allows anonymous communication, it is relatively easy and it is transnational, it has created a shift in thinking from the ownership of physical property to the ownership of ideas. A rising proportion of individuals are using these dedicated connection from 5 million in 1999 to 12 million in 2000 equipped with cable modem, DSL, or ISDN (integrated services digital network a less prevalent and slower dedicated link) lines at home [38]. Thus, technological advances such as the improvement of media with bigger data storage capacity and a network infrastructure that allows for greater speeds in data transmission have redefined and broadened the pre-existing conception of software piracy. In addition to measuring Internet experience and variety of use, Hinduja and Ingram [39] found that users with high-speed Internet connections were more likely to engage in software piracy. Income and Internet connection variables were usually found to be significant [6], [37], [39], [41], [42]. II. RESEARCH METHOD This study used a quantitative method approach to investigate the relationships between the self-reported software piracy with demographic variables and computer use variables. In this study, a sequential mixed-mode survey has been selected as the data collection tool. A questionnaire was used to examine the factors that lead to software piracy. A total of 278 participants took part in this study from Australian university, 120 responding to the paper questionnaire and 156 responding to a web-based questionnaire.in the first step of the process, the researcher prepared a list of university employees, classified by faculty and department, and posted 800 paper questionnaires with the participant information sheet, consent form and a return envelope to the employees mailbox at the university. The researcher received about 120 completed questionnaires over the four months from 15 November 2012 to 15 March Due to the slow response to the paper questionnaire, the researcher started to send the URL link to the web-based questionnaire to the employees university address. The questionnaire was constructed on the basis of the extant literature, expert academic review prior research and similar empirical studies conducted in the past [21], [22] [36], [38], [41], [16], [45]. The questionnaire was used to obtain accurate, objective and context-specific information from university employees. The questionnaire consisted of two sections: the first section asked demographic questions, which will be discussed in this paper. Participants were asked to indicate whether they had ever pirated software. The second section of the survey investigates factors behind software piracy. Those factors will be further explored in future papers.
3 III. ANALYSIS AND RESULTS In this section, the analysis and the results of the study are presented in figures generated from SPSS V20 for each demographic variable and the degree of software piracy behaviors. The researchers used a split file technique to define the sample who pirated and those who did not pirate to obtain a deeper understanding of the staff s actual behavior in relation to software piracy. The objective of the analysis is to investigate the relationships between the demographic variables and computer use variables of respondents in relation to software piracy. The following figures provide data on the variables and the degree of software piracy of the participants. Fig. 1 shows that male respondents were more likely to say they had pirated software whereas female respondents were more likely to say they had not pirated software. This is consistent with Lau [29], who found that male computer users were more lenient in their attitudes toward pirated software than female users. Male Female % 20% 40% 60% 80% 100% Fig. 1. Gender and piracy behavior A previous study conducted by Gan and Koh [24] found that age is negatively related to software piracy. Results of a study conducted by Peslak [30] also showed that older individuals more readily follow ethical norms regarding copying others software. In this study, figure 2 shows the younger age groups and tends to pirate software more as compared to the older age groups with age 40 and above. Thus, as shown in figure 2 a significant relationship was found between actual behaviors of university staff towards software piracy age group Marron and Steel [43] found a strong negative correlation between piracy and education. From figure 3 below, it is clearly evident that employees who have completed bachelor degree are in greatest number who use pirated software as compared to other categories mentioned in level of education. On the contrary, university staff acquiring masters or professional education tend to use software piracy less and non-pirated software more. Doctoral/Professional Completed high school Not completed high Fig. 3. Level of Education and piracy behavior As Figure 4 below indicate that, participants in the sample who own a personal computer, 100% stated that they had pirated software. Further, the participants who did not own a personal computer, 97.2% also indicated that they had not pirated software. Thus, own a personal computer was identifiable relationship with software piracy. Not own Pc Graduate Diploma Own Pc Master degree Bachelor degree Diploma Figure 4: Personal Computer Ownership and Piracy Behavior As seen in Figure. 5 below, Sample population with experience of using computer for less than 6 months up to experience of computer use 9 years shows little or no involvement in piracy. Whereas, staffs who had pirated software, 97% reported having more than 10 years of experience and the staffs who had not pirated software, 96.1 reported having more than 10 years of experience. Thus, experience of using computer was identifiable relationship with software piracy No Pirated Software Fig. 2. Age and Piracy Behavior.
4 10 years and more 7-9 years 5-7 years 3-5 years 1-3 years 6-12 months Less than 6 months Fig. 5. Computer Use and Piracy Behavior As Fig. 6 shows that sample population with experience of using Internet for less than 6 months up to experience of 9 years shows little or no involvement in piracy. As Fig. 6 shows that sample population with experience of using Internet for less than 6 months up to experience of 9 years shows little or no involvement in piracy. Whereas, staffs who had pirated software, 88% reported having more than 10 years of experience and the staffs who had not pirated software, 86% reported having more than 10 years of experience. Experience of 10 years and 7 to 9 years are not that great but the result obtained is quite diverse so nothing can be concluded. Experience of 10 years and 7 to 9 years are not that great but the result obtained is quite diverse so nothing can be concluded. Dial up WiFi DSL Cable Fig. 7. Type of Internet Connection and Piracy Behavior Previous research also found that individuals with a low income were more likely to participate in software piracy. Income has also been used as a statistical control, however income and Internet connection variables were usually found to be significant [6], [37], [39], [41], [42]. The participants who earn income less than AU$ 2000 Per month are more involved in pirated software as compared to non-pirated software. People with income AU$ 2000 AU$ 2999 are more inclined towards using non-pirated software. People with income AU$ 3000 AU$ 3999 are more involved in pirated software as compared to non-pirated software. As figure 8 below shows, Income does not appear to be related to the level of software piracy. 10 years and more 7-9 years 5-7 years 3-5 years 1-3 years 6-12 months Less than 6 months More than AU $6,000 AU $ 4,000 AU $5,999 AU $ 4,000 AU $4,999 AU $ 3,000 AU $3,999 AU $ 2,000 AU$2,999 AU $ 1,000 AU $1,999 Less than AU $ Fig. 8. Personal Income and Piracy Behavior Fig. 6. Use of the Internet and Piracy Behavior The Fig. 7 below shows that the highest percentage of respondents who pirated software used a DSL and WiFi connection. This finding confirms previous research, for example, it has been found [39] that individuals with a highspeed Internet connection were more likely to participate in software piracy. In this study regarding the percentage of participants who use pirated software and use DSL were more than people who use Wi-Fi and cable as Internet connection. Therefore, the percentage of participant s uses DSL and WiFi have the greatest share in software piracy as compared to the ones who use slow Internet connections. IV. CONCLUSION Demographic characteristics and a technical factors such as familiarity with computers, experiences of internet use and high speed connection like those suggested by Highland [44] and those identified in this study are important in understanding factors associated with software piracy and allow software publishers and user organizations (e.g., universities and colleges) to enhance address the problem of software piracy. Software companies pass their loss of income from software piracy on to the users by charging higher prices to the users who actually purchase the software. Thus, the reduction of software piracy is significant for both developers and purchasers of software [34], [45]. The main aim of the present study, which is part of
5 ongoing research, was to explore the relationships between demographic characteristics of university staff and their actual behavior in relation to software piracy. The findings of this study show that the rate of software piracy of university staff was not affected by monthly income. Moreover, the result of this study found that the younger age groups, and 30-39, tend to pirate software more as compared to the older age group, age 40 and above. Also, the more personal computer experience and Internet experience the staff reported having similar result, that mean personal computer experience and Internet experience, is not associated with increased software piracy. In this research, level of education appears to be associated to the level of software piracy and it found that university staff acquiring masters or professional education tend to use software piracy less and non-pirated software more. Gender is another important demographic factor that has been linked to software piracy. Ford and Richardson [46] concluded that females are more ethical than males; therefore females will use pirated software less than males, as software piracy can be considered unethical. This research confirms that males are more likely to be software pirates. Thus, it can be said the female less pirate than male may because the female consider ethical issues and they are less risk takers than males. Universities need to ensure that their employees are required to explore, discuss and understand the issue of software piracy from several perspectives: managers who may have to set policies; software developers who may be asked to develop software; and software publishers who lose money from piracy and then pass the costs on to users to help them understand the full impact of software piracy. One step towards solving a software piracy problem among university staff, is the development and posting of a clearly stated software policy for students and staff. That these two groups be duly educated of the importance of adhering to the policies and the consequences for noncompliance. Students and staff should be requested to sign a consent form before being issued a computer account. An on-screen warning against software piracy might serve as a reminder when users log on or access any university software. In addition, universities can enhance monitoring of activities and work with software publishers while hiring internal auditors to conduct regular software inventory checks. The universities should continue to treat copyright infringement as a criminal offence and help deter or even prosecute offenders. For instance, universities should identify violators [3] and stop their computer account [47]. Future research can be conducted to additional factors, which may play important roles, including the effect of Neutralization techniques on software piracy, which may be extended to explore strategies to find a solution to address software piracy. REFERENCES [1] BSA, "Fifth Annual BSA and IDC Global Software Piracy Study," Business Software Alliance, Washington, DC., Retrieved December 11th [2] R. D. Gopal, G. L. Sanders, S. Bhattacharjee, M. Agrawal, and S. C. Wagner, "A behavioral model of digital music piracy," Journal of Organizational Computing and Electronic Commerce, vol. 14, pp , [3] D. Yang, M. Sonmez, D. Bosworth, and G. Fryxell, "Global software piracy: Searching for further explanations," Journal of Business Ethics, vol. 87, pp , [4] C. M. Koen and J. H. Im, "Software piracy and its legal implications," Information & management, vol. 31, pp , [5] D. W. Straub Jr and R. W. Collins, "Key information liability issues facing managers: Software piracy, proprietary databases, and individual rights to privacy," Mis Quarterly, pp , [6] S. Hinduja, "Trends and patterns among online software pirates," Ethics and Information Technology, vol. 5, pp , [7] A. G. Peace and D. Galletta, "Developing a predictive model of software piracy behavior: an empirical study," [8] M. M. Rahim, A. H. Seyal, and M. N. A. Rahman, "Software piracy among computing students: a Bruneian scenario," Computers & Education, vol. 32, pp , [9] R. A. Strikwerda and J. M. Ross, "Software and Ethical Softness," Collegiate Microcomputer, vol. 10, pp , [10] T. Moores and G. Dhillon, "Software piracy: a view from Hong Kong," Communications of the ACM, vol. 43, pp , [11] R. S. Glass and W. A. Wood, "Situational determinants of software piracy: An equity theory perspective," Journal of Business Ethics, vol. 15, pp , [12] S. H. Ang, P. S. Cheng, E. A. Lim, and S. K. Tambyah, "Spot the difference: consumer responses towards counterfeits," Journal of consumer Marketing, vol. 18, pp , [13] B. Tan, "Understanding consumer ethical decision making with respect to purchase of pirated software," Journal of consumer Marketing, vol. 19, pp , [14] C.-H. Wee, S.-J. Ta, and K.-H. Cheok, "Non-price determinants of intention to purchase counterfeit goods: an exploratory study," International Marketing Review, vol. 12, pp , [15] G. Tom, B. Garibaldi, Y. Zeng, and J. Pilcher, "Consumer demand for counterfeit goods," Psychology & Marketing, vol. 15, pp , [16] P. M. Simpson, D. Banerjee, and C. L. Simpson Jr, "Softlifting: a model of motivating factors," Journal of Business Ethics, vol. 13, pp , [17] G. S. Taylor and J. P. Shim, "A comparative examination of attitudes toward software piracy among business professors and executives," Human Relations, vol. 46, pp , [18] G. Wong, A. Kong, and S. Ngai, "A study of unauthorised software copying among post-secondary students in Hong Kong," Australian Computer Journal, vol. 22, pp , [19] E. Oz, "The attitude of managers-to-be toward software piracy," OR/MS Today, vol. 17, pp , [20] J. Shim and G. S. Taylor, "Practicing managers' perception/attitudes towards illegal software copying," OR/MS Today, vol. 16, pp , [21] R. D. Gopal and G. L. Sanders, "Preventive and deterrent controls for software piracy," Journal of Management Information Systems, vol. 13, pp , [22] A. Peace, "Software piracy and computer-using professionals: a survey," Journal of Computer Information Systems, vol. 38, pp , [23] T. Van Der Merwe, "A profile of the distance computing student softlifter," in Proceedings of In, [24] L. L. Gan and H. C. Koh, "An empirical study of software piracy among tertiary institutions in Singapore," Information & management, vol. 43, pp , [25] R. R. Sims, H. K. Cheng, and H. Teegen, "Toward a profile of student software piraters," Journal of Business Ethics, vol. 15, pp , [26] J. R. Davis and R. E. Welton, "Professional ethics: business students' perceptions," Journal of Business Ethics, vol. 10, pp , [27] J. Tsalikis and M. Ortiz-Buonafina, "Ethical beliefs' differences of males and females," Journal of Business Ethics, vol. 9, pp , [28] L. Pereira and S. Kanekar, "Perceptions of initiatory and retaliatory cheating behaviour," Indian Psychologist, vol. 3, pp , [29] E. K. W. Lau, "An empirical study of software piracy," Business Ethics: A European Review, vol. 12, pp , 2003.
6 [30] A. R. Peslak, "Ethics and Moral Intensity: An Analysis of Information Technology and General Education Students," Information Systems Education Journal, vol. 5, [31] T. T. Moores and J. C.-J. Chang, "Ethical decision making in software piracy: Initial development and test of a four-component model," Mis Quarterly, pp , [32] K. van der Byl and J.-P. Van Belle, "Factors Influencing South African Attitudes toward Digital Piracy," Communications, vol. 1, [33] M. Rahim, A. H. Seyal, and M. Rahman, "Factors affecting softlifting intention of computing students: An empirical study," Journal of Educational Computing Research, vol. 24, pp , [34] M. M. Eining and A. L. Christensen, "A psycho-social model of software piracy: the development and test of a model," Ethical issues in information systems, pp , [35] G. E. Higgins, B. D. Fell, and A. L. Wilson, "Digital piracy: Assessing the contributions of an integrated self control theory and social learning theory using structural equation modeling," Criminal Justice Studies, vol. 19, pp. 3-22, [36] G. E. Higgins and D. A. Makin, "Does social learning theory condition the effects of low self-control on college students software piracy," Journal of Economic Crime Management, vol. 2, pp. 1-22, [37] W. D. Gunter, "Internet scallywags: a comparative analysis of multiple forms and measurements of digital piracy," WrESTEdu CRMINOLOG, [38] S. Hinduja, "Correlates of Internet software piracy," Journal of Contemporary Criminal Justice, vol. 17, pp , [39] S. Hinduja and J. R. Ingram, "Social learning theory and music piracy: the differential role of online and offline peer influences," Criminal Justice Studies, vol. 22, pp , [40] D. Wall, "The Internet as a conduit for criminal activity," Information Technology and The Criminal Justice System, Pattavina, A., ed, pp , [41] G. E. Higgins, B. D. Fell, and A. L. Wilson, "Low self-control and social learning in understanding students' intentions to pirate movies in the United States," Social Science Computer Review, vol. 25, pp , [42] R. G. Morris and G. E. Higgins, "Neutralizing Potential and Self- Reported Digital Piracy A Multitheoretical Exploration Among College Undergraduates," Criminal Justice Review, vol. 34, pp , [43] D. B. Marron and D. G. Steel, "Which countries protect intellectual property? The case of software piracy," Economic inquiry, vol. 38, pp , [44] H. J. Highland, Protecting Your Microcomputer System: John Wiley & Sons, Inc., [45] A. L. Christensen and M. M. Eining, "Factors influencing software piracy: Implications for accountants," Journal of Information Systems, vol. 5, pp , [46] R. C. Ford and W. D. Richardson, "Ethical decision making: A review of the empirical literature," Journal of Business Ethics, vol. 13, pp , [47] D. Banerjee, T. P. Cronan, and T. W. Jones, "Modeling IT Ethics: A Study in Situational Ethics," MIS quarterly, vol. 22, 1998.
SOFTWARE PIRACY: EXPLORING AWARENESS OF THE LAW AS A DETERMINANT OF SOFTLIFTING ATTITUDE AND INTENTION
SOFTWARE PIRACY: EXPLORING AWARENESS OF THE LAW AS A DETERMINANT OF SOFTLIFTING ATTITUDE AND INTENTION Pamela A. Dupin-Bryant, Utah State University, pam.dupin-bryant@usu.edu ABSTRACT Software piracy,
More informationDigital Piracy and Stealing: A Comparison on Criminal Propensity
International Journal of Criminal Justice Sciences Vol 5 Issue 2 July December 2010 Copyright 2010 International Journal of Criminal Justice Sciences (IJCJS) Official Journal of the South Asian Society
More informationINFORMATION TECHNOLOGY INTELLECTUAL PROPERTY ETHICS: ISSUES AND ANALYSIS
INFORMATION TECHNOLOGY INTELLECTUAL PROPERTY ETHICS: ISSUES AND ANALYSIS Alan R. Peslak, Ph.D., Penn State University, arp14@psu.edu ABSTRACT Unethical information technology behavior is estimated to cost
More informationSOFTWARE PIRACY 2.0? ONLINE SHARING: DIGITAL MUSIC AND
DIGITAL MUSIC AND ONLINE SHARING: SOFTWARE PIRACY 2.0? Considering the similarities and unique characteristics of online file sharing and software piracy. Rapid advances in Internet connectivity and digital
More informationThe Influence of Consumers Moral Intensity, Perceived Risks and Moral Judgment in Purchasing Pirated Software
47 The Influence of Consumers Moral Intensity, Perceived Risks and Moral Judgment J.K. Ratnasingam, Western Digital, Kuala Lumpur, Malaysia, jeyaganesh.rajnasingam@wdc.com C.H. Ponnu, University of Malaya,
More informationSoftware piracy among IT professionals in organizations
International Journal of Information Management 26 (2006) 401 413 www.elsevier.com/locate/ijinfomgt Software piracy among IT professionals in organizations Alok Mishra a,, Ibrahim Akman a, Ali Yazici b
More informationAn Application of Deterrence Theory to Software Piracy. George E. Higgins Abby L. Wilson Brian D. Fell University of Louisville
An Application of Deterrence Theory to Software Piracy By George E. Higgins Abby L. Wilson Brian D. Fell University of Louisville Although the research on software piracy is growing, criminologists have
More informationFacilitating conditions and social factors as predictors of attitudes and intentions to illegally download
Page 1 of 8 ANZMAC 2009 Facilitating conditions and social factors as predictors of attitudes and intentions to illegally download Ian Phau, Curtin University of Technology, Ian.Phau@cbs.curtin.edu.au
More informationAn Empirical Study of an Extended Theory of Planned Behaviour Model for Pirated Software Purchase
An Empirical Study of an Extended Theory of Planned Behaviour Model for Pirated Software Purchase Syed Shah Alam*, Azhar Ahmad**, Mhd. Suhaimi Ahmad*** and Nik Mohd Hazrul Nik Hashim**** This study is
More informationMobile Stock Trading (MST) and its Social Impact: A Case Study in Hong Kong
Mobile Stock Trading (MST) and its Social Impact: A Case Study in Hong Kong K. M. Sam 1, C. R. Chatwin 2, I. C. Ma 3 1 Department of Accounting and Information Management, University of Macau, Macau, China
More informationEconomic Growth Centre Working Paper Series
Economic Growth Centre Working Paper Series The Profiles of Software Pirates among Tertiary Institutions in Singapore by Lydia L. GAN and Hian Chye KOH Economic Growth Centre Division of Economics School
More informationPermanent Link: http://espace.library.curtin.edu.au/r?func=dbin-jump-full&local_base=gen01-era02&object_id=144454
Citation: Phau, Ian. 2010. Pirated software: ethical attitudes and purchase behaviour of consumers, in Harry Timmermans (ed), Recent Advances in Retailing and Services Science Conference, Jul 2 2010. Istanbul:
More informationSECTION 1. Macroeconomic processes and regional economies management
SECTION 1. Macroeconomic processes and regional economies management Mastura Jaafar (Malaysia), Thurasamy Ramayah (Malaysia), Tee Wan Teng (Malaysia) The intention to use pirated software: a study of undergraduate
More informationONLINE COPYRIGHT INFRINGEMENT RESEARCH A MARKETING RESEARCH REPORT. Prepared For: DEPARTMENT OF COMMUNICATIONS 24 JUNE 2015
ONLINE COPYRIGHT INFRINGEMENT RESEARCH A MARKETING RESEARCH REPORT Prepared For: DEPARTMENT OF COMMUNICATIONS 263103193 24 JUNE 2015 TNS Level 1, 181 Miller Street North Sydney NSW 2060 t +61 2 9563 4200
More informationINFORMATION TECHNOLOGY ETHICS: A RESEARCH FRAMEWORK
INFORMATION TECHNOLOGY ETHICS: A RESEARCH FRAMEWORK Richard V. McCarthy, Quinnipiac University, richard.mccarthy@quinnipiac.edu Leila Halawi, Nova Southeastern University, lahalawi@nova.edu Jay E. Aronson,
More informationWhat are the Prospects for Stopping Software Piracy?
Repicky - p0 What are the Prospects for Stopping Software Piracy? A research paper written by Matthew Repicky in partial fulfillment of requirements for a course in computer-related crime at the Rochester
More informationTHE EFFECT OF JORDANIAN LAWS IN REDUCING SOFTWARE PIRACY
Volume 4, No. 7, July 2013 Journal of Global Research in Computer Science REVIEW ARTICLE Available Online at www.jgrcs.info THE EFFECT OF JORDANIAN LAWS IN REDUCING SOFTWARE PIRACY Essam Said Hanandeh
More informationChapter 1: Introduction
Chapter 1: Introduction Computer software comes with a licensed agreement stating how it can be used legally. Software piracy occurs when people, intentionally or unintentionally, make copies of the computer
More informationSHAMING AS A TECHNIQUE FOR INFORMATION SECURITY POLICY
SHAMING AS A TECHNIQUE FOR INFORMATION SECURITY POLICY AND TRAINING ADHERENCE Mark A. Harris University of South Carolina maharris@hrsm.sc.edu ABSTRACT Information security policy and information security
More informationTHE THEORY OF PLANNED BEHAVIOR AND ITS ROLE IN TECHNOLOGY ACCEPTANCE OF ELECTRONIC MEDICAL RECORDS IMPLEMENTATION
THE THEORY OF PLANNED BEHAVIOR AND ITS ROLE IN TECHNOLOGY ACCEPTANCE OF ELECTRONIC MEDICAL RECORDS IMPLEMENTATION Elaine Seeman, Department of Management Information Systems College of Business, East Carolina
More informationArticle Rate of Software Piracy Vs Value of Software Piracy
Article Rate of Software Piracy Vs Value of Software Piracy Abstract A number of studies conclude that there is a greater rate of software piracy by individuals from poorer compared to richer countries.
More informationHongxia Zhang and Hengjia Zang Guanghua School of Management, Peking University, Bejing, China, and
Purchasing pirated software: an initial examination of Chinese consumers Fang Wang School of Business and Economics, Wilfrid Laurier University, Waterloo, Canada Hongxia Zhang and Hengjia Zang Guanghua
More informationPREDICTING ACCEPTANCE OF ELECTRONIC MEDICAL RECORDS: WHAT FACTORS MATTER MOST?
PREDICTING ACCEPTANCE OF ELECTRONIC MEDICAL RECORDS: WHAT FACTORS MATTER MOST? Shanan G. Gibson & Elaine D. Seeman College of Business, East Carolina University gibsons@ecu.edu; seemane@ecu.edu ABSTRACT
More informationAre you a peer to peer pirate? Attitudes towards downloading movies and TV series through P2P networks
Page 1 of 8 ANZMAC 2009 Are you a peer to peer pirate? Attitudes towards downloading movies and TV series through P2P networks Ian Phau, Curtin University of Technology, Ian.Phau@cbs.curtin.edu.au Min
More informationKnowledge, Attitude and Practice of ICT Use in Teaching and Learning: In the Context of Bangladeshi Tertiary Education
ISSN (Online): 23197064 Knowledge, Attitude and Practice of ICT Use in Teaching and Learning: In the Context of Bangladeshi Tertiary Education Arifa Rahman 1, F. M. Arifur Rahman 2 1 Green University of
More informationDigital Piracy, Self-Control Theory, and Rational Choice: An Examination of the Role of Value
Digital Piracy, Self-Control Theory, and Rational Choice: An Examination of the Role of Value George E. Higgins 1 University of Louisville, USA Abstract To date, several researchers have shown that attitudes,
More informationA Study of the Factors that Influence the Acceptance of e-commerce in Developing Countries:
A Study of the Factors that Influence the Acceptance of e-commerce in Developing Countries: A Comparative Survey between Iran and United Arab Emirates Lotfollah Forouzandeh Dehkordi Assistant Professor
More informationStudent s Attitude towards Peer-to-Peer Music File Sharing and Downloading from Internet-A Cross Sectional Study of American and Moroccan Students
IBT Journal of Business Studies (Formerly Journal of Management & Social Sciences) Vol. 9, No. 1, (Spring 2014) 137-149 Student s Attitude towards Peer-to-Peer Music File Sharing and Downloading from Internet-A
More informationENFORCEMENT OF IP RIGHTS IN THE DIGITAL ENVIRONMENT CONCERNS, CHALLENGES AND ACTIONS REQUIRED FOR THE PROTECTION OF THE SINGLE MARKET.
ENFORCEMENT OF IP RIGHTS IN THE DIGITAL ENVIRONMENT CONCERNS, CHALLENGES AND ACTIONS REQUIRED FOR THE PROTECTION OF THE SINGLE MARKET GRUR Workshop Brussels March 7, 2007 Michael Keplinger* Overview: 1.
More informationCHARACTERISTICS AND EXPENDITURE PATTERNS OF AUSTRALIAN HOUSEHOLDS USING MOBILE PHONES. Farhat Yusuf and Mohammad B. Naseri Macquarie University
CHARACTERISTICS AND EXPENDITURE PATTERNS OF AUSTRALIAN HOUSEHOLDS USING MOBILE PHONES Farhat Yusuf and Mohammad B. Naseri Macquarie University Track: Entrepreneurship, Innovation, and large and Small Business
More informationSoftware Piracy: A Study of the Extent Of Coverage in Introductory MIS Textbooks
: A Study of the Extent Of Coverage in Introductory MIS Textbooks Laurie E. MacDonald Kenneth T. Fougere Bryant College Smithfield, RI 02917 ABSTRACT This research argues that although software piracy
More informationExploring the Antecedents of Electronic Service Acceptance: Evidence from Internet Securities Trading
Exploring the Antecedents of Electronic Service Acceptance: Evidence from Internet Securities Trading Siriluck Rotchanakitumnuai Department of Management Information Systems Faculty of Commerce and Accountancy
More informationBehavioural Aspects of ERP System of an Indian Steel Manufacturing Industry
10 Behavioural Aspects of ERP System of an Indian Steel Manufacturing Industry Dr. Shyam Prasad* Interaction between people, processes, data and technology is broadly referred to as Information System
More informationKey Findings ASIC Report 419. Australian Financial Attitudes and Behaviour Tracker Wave 1: March August 2014
ASIC Report 419 Wave 1: March August 2014 Australian Securities and Investments Commission December 2014 Contents INTRODUCTION 3 KEY FINDINGS 9 Financial attitudes 10 Keeping track of finances 11 Planning
More informationThe Impact of Management Information Systems on the Performance of Governmental Organizations- Study at Jordanian Ministry of Planning
The Impact of Management Information Systems on the Performance of Governmental Organizations- Study at Jordanian Ministry of Planning Dr. Shehadeh M.A.AL-Gharaibeh Assistant prof. Business Administration
More informationTechnology Complexity, Personal Innovativeness And Intention To Use Wireless Internet Using Mobile Devices In Malaysia
International Review of Business Research Papers Vol.4 No.5. October-November 2008. PP.1-10 Technology Complexity, Personal Innovativeness And Intention To Use Wireless Internet Using Mobile Devices In
More informationThe Effect of Demographics on Seamless Mobile Service Interface
The Effect of Demographics on Seamless Mobile Service Interface Mattila, Anssi; and Pento, Tapio Abstract The purpose of this paper is to demonstrate the effect of demographic variables on choice of a
More informationSOUTH LOS ANGELES YOUTH OFFENDER RE-ENTRY PROGRAM A GRANT PROPOSAL
SOUTH LOS ANGELES YOUTH OFFENDER RE-ENTRY PROGRAM A GRANT PROPOSAL www.campaignforyouthjustice.org Guadalupe Torres California State University, Long Beach May 2015 INTRODUCTION Arrest Rates In the City
More informationFIGHTING INTELLECTUAL PROPERTY FRAUD
FIGHTING INTELLECTUAL PROPERTY FRAUD Intellectual property frauds have become more and more organized and globalized. Developing innovative enforcement strategies and tactics through private-public partnership
More informationDundalk Institute of Technology. Acceptable Usage Policy. Version 1.0.1
Dundalk Institute of Technology Acceptable Usage Policy Version 1.0.1 1 Document Location..\DkIT_Policy_Documents\Policies Revision History Date of this revision: Date of next review: Version Revision
More informationACCOUNTING STUDENTS PERCEPTION OF ETHICAL DILLEMAS IN POLAND
Ewa Wanda Maruszewska University of Economics in Katowice, Poland ACCOUNTING STUDENTS PERCEPTION OF ETHICAL DILLEMAS IN POLAND Abstract The article presents the results of a survey performed in a public
More informationDoes Social Learning Theory Condition the Effects of Low Self-Control on College Students Software Piracy?
Does Social Learning Theory Condition the Effects of Low Self-Control on College Students Software Piracy? George E. Higgins and David A. Makin University of Louisville Abstract Although researchers have
More informationSurvey on cloud forensics and critical criteria for cloud forensic capability: A preliminary analysis
Survey on cloud forensics and critical criteria for cloud forensic capability: A preliminary analysis Keyun Ruan, Ibrahim Baggili (PhD), Prof Joe Carthy, Prof Tahar Kechadi University College Dublin, Zayed
More informationCloud Computing: A Comparison Between Educational Technology Experts' and Information Professionals' Perspectives
Noa Aharony 1 Cloud Computing: A Comparison Between Educational Technology Experts' and Information Professionals' Perspectives Noa Aharony Department of Information Science, Bar-Ilan University Noa.aharony@biu.ac.il
More informationONLINE SHOPPING PERCEPTIONS OF OFFLINE SHOPPERS
ONLINE SHOPPING PERCEPTIONS OF OFFLINE SHOPPERS Manouchehr Tabatabaei, Georgia Southern University, mtabatab@georgiasouthern.edu ABSTRACT Recent advancements in technology have facilitated commerce around
More informationFactors of Short Term Investment Decision Making
International Journal of Management & Organizational Studies Volume 2, Issue 4, 2013 ISSN: 2305-2600 Factors of Short Term Investment Decision Making Dr. Mohsin Bashir and Amir Nisar Author(s) Biography
More informationStudy into the Sales of Add-on General Insurance Products
Study into the Sales of Add-on General Insurance Quantitative Consumer Research Report Prepared For: Financial Conduct Authority (FCA) March, 2014 Authorised Contact Persons Frances Green Research Director
More informationT H E D A R K T R A D E. The Economics of Ideas. Activity #1: Identity Theft. 2 hours
ILLICIT LESSON PLAN GRADES 6-8 STANDARDS: GEOGRAPHY, 11, 16; ECONOMICS, 10; CIVICS, 22 The Economics of Ideas Overview: In today s global marketplace, intellectual property (IP) is a hot commodity. Under
More informationRelationship of Gender to Faculty Use of Online Educational Tools. Susan Lucas. The University of Alabama
Relationship of Gender to Faculty Use of Online Educational Tools Susan Lucas The University of Alabama Copyright Susan Lucas, 2003 This work is the intellectual property of the author. Permission is granted
More informationAsian Research Journal of Business Management
Asian Research Journal of Business Management FACTORS INFLUENCING ONLINE TRADING ADOPTION: A STUDY ON INVESTORS ATTITUDE IN GREATER VISAKHAPATNAM CITY Dr. Krishna Mohan Vaddadi 1 & Merugu Pratima 2 * 1
More informationEvaluating User Acceptance of Online Banking Information Systems: An Empirical Case of Pakistan Paper 18
Evaluating User Acceptance of Online Banking Information Systems: An Empirical Case of Pakistan Paper 18 Fida Hussain Chandio fida.chandio@brunel.ac.uk ABSTRACT Pakistan banking sector has gone through
More informationRehabilitation programs for young offenders: Towards good practice? Andrew Day. Forensic Psychology Research Group. University of South Australia
1 Rehabilitation programs for young offenders: Towards good practice? Andrew Day Forensic Psychology Research Group University of South Australia Andrew.day@unisa.edu.au Invited paper for the Understanding
More informationIssues in Information Systems Volume 15, Issue I, pp. 20-27, 2014
E-CHEATING: INCIDENCE AND TRENDS AMONG COLLEGE STUDENTS Darwin L. King, St. Bonaventure University, dking@sbu.edu Carl J. Case, St. Bonaventure University, ccase@sbu.edu ABSTRACT There has been substantial
More informationEmpirical Analysis of Software Usage to Drive Policy Recommendations. May 19, 2015 USCD Jared W. Ragland BSA The Software Alliance
Empirical Analysis of Software Usage to Drive Policy Recommendations May 19, 2015 USCD Jared W. Ragland BSA The Software Alliance Outline Introduction to BSA Global Studies and their Methodology 2014 BSA
More informationSoftware Piracy and Copyright - An Empirical Research Report
Copyright 2013 International Journal of Cyber Criminology (IJCC) ISSN: 0974 2891 January June 2013, Vol 7 (1): 62 80 This is an Open Access paper distributed under the terms of the Creative Commons Attribution-Non-
More informationAn Application of the UTAUT Model for Understanding Student Perceptions Using Course Management Software
An Application of the UTAUT Model for Understanding Student Perceptions Using Course Management Software Jack T. Marchewka Chang Liu Operations Management and Information Systems Department Northern Illinois
More informationrefers to an HKC-approved cable modem, power adaptor, splitter, Ethernet cable and coaxial
i-cable Broadband Operating Policy (English Version Only) 有 線 寬 頻 寬 頻 上 網 服 務 用 戶 守 則 只 提 供 英 文 版 本 I. General Overview Pursuant to the terms hereof and the General Terms and Conditions, i-cable agrees
More informationIf you have any questions about any of our policies, please contact the Customer Services Team.
Acceptable Use Policy (AUP) 1. Introduction Blue Monkee has created this Acceptable Use Policy (AUP) for hosting customers to protect our resources and the resources of our other customers and hosting
More informationNational Mental Health Survey of Doctors and Medical Students Executive summary
National Mental Health Survey of Doctors and Medical Students Executive summary www.beyondblue.org.au 13 22 4636 October 213 Acknowledgements The National Mental Health Survey of Doctors and Medical Students
More informationAssessing the quality of online courses from the students' perspective
Internet and Higher Education 9 (2006) 107 115 Assessing the quality of online courses from the students' perspective Andria Young, Chari Norgard 1 University of Houston-Victoria, 3007 N. Ben Wilson, Victoria,
More informationService Quality Value Alignment through Internal Customer Orientation in Financial Services An Exploratory Study in Indian Banks
Service Quality Value Alignment through Internal Customer Orientation in Financial Services An Exploratory Study in Indian Banks Prof. Tapan K.Panda* Introduction A high level of external customer satisfaction
More informationBates Technical College. Information Technology Acceptable Use Policy
Bates Technical College Information Technology Acceptable Use Policy Consistent with policy adopted by the Board of Trustees, Bates Technical College, hereinafter referred to as the College, has a commitment
More informationAn Empirical Analysis on the Performance Factors of Software Firm
, pp.121-132 http://dx.doi.org/10.14257/ijseia.2014.8.7,10 An Empirical Analysis on the Performance Factors of Software Firm Moon-Jong Choi, Jae-Won Song, Rock-Hyun Choi and Jae-Sung Choi #3-707, DGIST,
More informationDiploma of Criminology & Criminal Justice
Course Code: Course Name: 1010CCJ Introduction to Forensic Psychology Semester: Semester 3, 2015 Program: Diploma of Criminology & Criminal Justice Credit Points: 10 Course Coordinator: Bonnie Clough Document
More informationEFFECTIVENESS OF DETECTIVE AND PREVENTATIVE INFORMATION SECURITY CONTROLS IN INFORMATION SYSTEMS ORGANIZATIONS
SENRA Academic Publishers, British Columbia Vol. 8, No. 3, pp. 3125-3129, October 2014 Online ISSN: 1920-3853; Print ISSN: 1715-9997 EFFECTIVENESS OF DETECTIVE AND PREVENTATIVE INFORMATION SECURITY CONTROLS
More informationE-learning: Students perceptions of online learning in hospitality programs. Robert Bosselman Hospitality Management Iowa State University ABSTRACT
1 E-learning: Students perceptions of online learning in hospitality programs Sungmi Song Hospitality Management Iowa State University Robert Bosselman Hospitality Management Iowa State University ABSTRACT
More informationAn analysis on dynamics that lead to counterfeit purchasing behavior of ICT products among youths
IOSR Journal of Business and Management (IOSRJBM) eissn: 2278487X, pissn: 23197668. Volume 16, Issue 8. Ver. IV (Aug. 2014), PP 2129 An analysis on dynamics that lead to counterfeit purchasing behavior
More informationDEVELOPING AN EXTENDED TECHNOLOGY ACCEPTANCE MODEL: DOCTORS ACCEPTANCE OF ELECTRONIC MEDICAL RECORDS IN JORDAN
DEVELOPING AN EXTENDED TECHNOLOGY ACCEPTANCE MODEL: DOCTORS ACCEPTANCE OF ELECTRONIC MEDICAL RECORDS IN JORDAN INTRODUCTION Fauziah Baharom 1, Ola T. Khorma 2, Haslina Mohd 3, and Mahmood G. Bashayreh
More informationImpact of ICT on Teacher Engagement in Select Higher Educational Institutions in India
Impact of ICT on Teacher Engagement in Select Higher Educational Institutions in India Bushra S P Singh 1, Dr. Sanjay Kaushik 2 1 Research Scholar, University Business School, Arts Block 3, Panjab University,
More informationInternational Business & Economics Research Journal June 2013 Volume 12, Number 6
Establishing The Challenges Affecting South African SMEs Michael C. Cant, University of South Africa, South Africa Johannes A. Wiid, University of South Africa, South Africa ABSTRACT Cant and Ligthelm
More informationCURRICULUM VITA MATTHEW C. JOHNSON
1 CURRICULUM VITA MATTHEW C. JOHNSON Department of Criminal Justice East Carolina University 236 Rivers West Greenville, NC 27858 (252)737-2417 (Phone) johnsonmatt@ecu.edu Education Ph.D., August 2008:
More informationFACTORS INFLUENCING CONSUMER ETHICAL DECISION MAKING OF PURCHASING PIRATED SOFTWARE: STRUCTURAL EQUATION MODELING ON MALAYSIAN CONSUMER
FACTORS INFLUENCING CONSUMER ETHICAL DECISION MAKING OF PURCHASING PIRATED SOFTWARE: STRUCTURAL EQUATION MODELING ON MALAYSIAN CONSUMER Ahasanul Haque Faculty of Business Administration, International
More informationHow To Study The Academic Performance Of An Mba
Proceedings of the Annual Meeting of the American Statistical Association, August 5-9, 2001 WORK EXPERIENCE: DETERMINANT OF MBA ACADEMIC SUCCESS? Andrew Braunstein, Iona College Hagan School of Business,
More informationPerformance appraisal politics and employee turnover intention
Performance appraisal politics and employee turnover intention Rusli Ahmad Camelia Lemba Faculty of Cognitive Sciences and Human Development Universiti Malaysia Sarawak arusli@fcs.unimas.my Wan Khairuzzaman
More informationFactors affecting bachelor s degree completion among Black males with prior attrition
Factors affecting bachelor s degree completion among Black males with prior attrition ABSTRACT Rayna Matthews-Whetstone Richardson, Texas ISD Joyce A. Scott Texas A&M University-Commerce Black males lag
More informationOrganizational Commitment among Public and Private School Teachers
The International Journal of Indian Psychology ISSN 2348-5396 (e) ISSN: 2349-3429 (p) Volume 2, Issue 3, Paper ID: B00381V2I32015 http://www.ijip.in April to June 2015 ABSTRACT: Organizational Commitment
More informationConcepts. Economic psychology: from tax compliance and evading to psychological contract. Basic model of tax evasion. Economic theory of crime
Economic psychology: from tax compliance and evading to psychological contract Velli Parts, MSc Concepts tax avoidance - an attempt to reduce tax payments by legal means (e.g. by exploiting taxloopholes)
More information2.1 It is an offence under UK law to transmit, receive or store certain types of files.
Website Hosting Acceptable Use Policy 1. Introduction 1.1 Jarrett & Lam Consulting s Acceptable Use Policy for hosting customers to protect our resources, the resources of our customers and to ensure that
More informationThe Effect of National Culture and Economic Wealth on Global Software Piracy Rates
The Effect of National Culture and Economic Wealth on Global Software Piracy Rates Trevor T. Moores According to a recent survey on global software piracy [9], the Business Software Alliance estimated
More informationIdentifying Requirements of Agricultural Mobile Marketing from Experts Perception
, pp.113-118 http://dx.doi.org/10.14257/ijunesst.2014.7.1.11 Identifying Requirements of Agricultural Mobile Marketing from Experts Perception Maryam Omidi Najafabadi, Mahmood Ahmadi and Farhad Lashgarara
More informationThe Effect of Flexible Learning Schedule on Online Learners Learning, Application, and Instructional Perception
1060 The Effect of Flexible Learning Schedule on Online Learners Learning, Application, and Instructional Perception Doo H. Lim University of Tennessee Learning style has been an important area of study
More informatione-pirates of the Digital Age Copyright Issues in Software and Music
VEA Bringing Learning to Life Program Support Notes e-pirates of the Digital Age Copyright Issues in Software and Music Senior Secondary - TAFE 27mins Teacher Notes by Jorge Viega, B.Sci.(Chemical), Dip.Ed.,Associate
More informationCase 3:15-cv-02020-AC Document 1 Filed 10/27/15 Page 1 of 8
Case 3:15-cv-02020-AC Document 1 Filed 10/27/15 Page 1 of 8 Carl D. Crowell, OSB No. 982049 email: carl@crowell-law.com Drew P. Taylor, OSB 135974 email: drew@crowell-law.com CROWELL LAW P.O. Box 923 Salem,
More informationSo why is the head of a federal agency with jurisdiction over customs, immigration, and border crimes appearing at a
Remarks by Director John Morton U.S. Immigration and Customs Enforcement Department of Homeland Security State of the Net Conference Washington, D.C. January 18, 2011 Good morning, I am indeed John Morton,
More informationHow To Collect Data From A Large Group
Section 2: Ten Tools for Applying Sociology CHAPTER 2.6: DATA COLLECTION METHODS QUICK START: In this chapter, you will learn The basics of data collection methods. To know when to use quantitative and/or
More informationPEER-TO-PEER FILE SHARING POLICY
1.0 Overview The purpose of this Policy is to detail the University s plans to effectively combat the unauthorized distribution of copyrighted material by users of the Information Technology Resources,
More informationEDUCATION AND LAW ENFORCEMENT 1. Education and Law Enforcement: Final Version of Research Proposal. Ralphie Manzano
EDUCATION AND LAW ENFORCEMENT 1 Education and Law Enforcement: Final Version of Research Proposal Ralphie Manzano University of South Florida, Sarasota-Manatee EDUCATION AND LAW ENFORCEMENT 2 Abstract
More informationDRINK DRIVING. Report 1. Offences finalised in the Magistrates Court of South Australia, 1995. Jayne Marshall
DRINK DRIVING Report 1 Offences finalised in the Magistrates Court of South Australia, 1995 by Jayne Marshall A report jointly funded by the South Australian Attorney General s Department and Transport
More informationINDIVIDUAL AND SOCIAL REASONS BEHIND SOFTWARE PIRACY: AN ANALYSIS OF PREVIOUS STUDIES
INDIVIDUAL AND SOCIAL REASONS BEHIND SOFTWARE PIRACY: AN ANALYSIS OF PREVIOUS STUDIES Daha Önce Yapılmış Çalışmalar Işığında Korsan Yazılım Kullanımının Bireysel ve Sosyal Nedenleri Musa Karakaya* Bülent
More informationThe Effect of Questionnaire Cover Design in Mail Surveys
The Effect of Questionnaire Cover Design in Mail Surveys Philip Gendall It has been suggested that the response rate for a self administered questionnaire will be enhanced if the cover of the questionnaire
More informationPersonal Financial Knowledge and Attitude towards Credit Card Practices among Working Adults in Malaysia
International Journal of Business and Social Science Vol. 3 No. 7; April 2012 Personal Financial Knowledge and Attitude towards Credit Card Practices among Working Adults in Malaysia Zuroni Md Jusoh Lim
More informationProfessional development online: Ethics education for accountants and business managers
Professional development online: Ethics education for accountants and business managers Josie Fisher and Cathryn McCormack University of New England The teaching of business ethics is well-documented in
More informationTrust and Risk in Purchase Intention through Online Social Network: A Focus Group Study of Facebook in Thailand
Trust and Risk in Purchase Intention through Online Social Network: A Focus Group Study of Facebook in Thailand A. Leeraphong and A. Mardjo Abstract Objectives: Doing business through online social network
More informationFacilitators and Inhibitors for Deploying Businessto-Business E-Commerce Applications: A Multi- Method, Cross-Cultural Study
Association for Information Systems AIS Electronic Library (AISeL) ICIS 2001 Proceedings International Conference on Information Systems (ICIS) 12-31-2001 Facilitators and Inhibitors for Deploying Businessto-Business
More informationVIEWS OF STUDENTS IN THE DEPARTMENT OF RECREATION AND SPORT MANAGEMENT ON DISTANCE EDUCATION
VIEWS OF STUDENTS IN THE DEPARTMENT OF RECREATION AND SPORT MANAGEMENT ON DISTANCE EDUCATION Asst.Prof.Dr.Gülten Hergüner Sakarya University Physical Education and Sports Teaching Department herguner@sakarya.edu.tr
More informationComparing Blogs, Wikis, and Discussion Boards. as Collaborative Learning Tools
Collaborative Learning Tools 1 Running head: Collaborative Learning Tools Comparing Blogs, Wikis, and Discussion Boards as Collaborative Learning Tools Susan L Connell San Diego State University Collaborative
More informationPublic perceptions and information gaps in solar energy in Texas
SUPPLEMENTAL INFORMATION Public perceptions and information gaps in solar energy in Texas Varun Rai* 1,2 and Ariane L Beck 1 1 LBJ School of Public Affairs, The University of Texas at Austin, Austin, Texas,
More informationDeveloping and Validating Customer Relationship Management (CRM) Practices Construct
International Journal of Business and Behavioral Sciences Vol., No.; January 0 Developing and Validating Customer Relationship Management (CRM) Practices Construct Zuliana Zulkifli, *Izah Mohd Tahir Faculty
More informationHow To Promote Academic Integrity At St.Petersburg College
1 Toward Enhancing a Culture of Academic Integrity at St. Petersburg Community College by Dustin Gray Guinta 2 Introduction In 2007, due to evidence of a cheating scandal at St. Petersburg College, President
More information