Software Piracy Among Employees in Australian University

Size: px
Start display at page:

Download "Software Piracy Among Employees in Australian University"

Transcription

1 Software Piracy Among Employees in Australian University N. Almazmomi, Department of Management, La Trobe University, S. Zyngier, Department of Management, La Trobe University, J. Spoor, Department of Management, La Trobe University and I. Alharbi, Department of Management, La Trobe University. Abstract Software piracy is a global problem that has resulted in huge economic losses worldwide. A report by the Business Software Alliance [1] noted that for the past five years worldwide, software piracy has hovered between 35% to 38%, and losses amounted to billions of dollars. The main purpose of this study is to investigate the relationship between the demographic variables of Australian university employees and their actual behavior in relation to software piracy. Data were obtained from a survey of 278 staff in a public university in Australia. The study found that overall, the actual behavior of university staff in relation to software piracy is affected by demographic variables and computer variables. Also, females were less likely to pirate software than males. Age and level of education negatively related to software piracy, whereas there was no identifiable relationship between either computer experience or Internet experience with software piracy. Also, income does not appear to be related to the level of software piracy. The findings of this paper are preliminary results of a larger research project. Keywords Software Piracy, Piracy, Australia, Survey, high education I. INTRODUCTION AND LITERATURE REVIEW High-speed Internet connections and the increased power of computing technologies have resulted in a growing trend towards software piracy. The prevalence and significant growth of software piracy has both attracted and warranted attention from researchers, educators, software developers, intellectual property advocators and software producers. Despite the use of deterrent and preventive measures to combat software piracy [2], this problem is unabated. Software piracy, defined as the unauthorized utilization, replication, and distribution of commercially available or copyrighted software [3], has been increasing years [1]. Additional definitions include the unauthorized use or copying of intellectual property (IP) and software, which are protected [4], [5]. As a result, global software piracy is a serious problem for consumers, policymakers, and businesses because of the loss of commercial profit [1] and consequently is also of interest to Academics. In this paper, employees acts of software piracy are examined in relation to demographic variables (e.g., gender, age, and education), and computer-related variables (e.g., computer experience, Internet experience and computer ownership). Demographic Factors in Software Piracy: In the extant literature, numbers of studies have attempted to interpret software piracy by developing a profile of individuals who would most likely engage in pirating software, focusing on such characteristics as age, gender, socioeconomic class, level of education, and level of computer experience [6], [7], [8], [9], [10], [11]. Many previous studies have shown that people of different gender, ages, levels of income, and levels of educational attainment tend to vary in their willingness to buy pirated software [12], [13], [14]. However, previous studies have reported inconsistent findings about the effects of age, income, and level of education on actual pirating behaviors. Tom et al. [15] found that customers who use pirated software tend to be younger, to earn less income, and to have received less education. Studies show that the propensity to pirate software does not depend on the age, [17], [18]., However, Oz [19], Shim and Taylor [20], found that no significant differences exist in software piracy in relation to different age groups. Some studies demonstrate that the younger generation shows more inclination towards software piracy as compared to the older generation [21], [22]. Moreover, Sims, Cheng and Teegan [25] hypothesized whether younger students pirate software more often than older students. Van Der Merwe found [23] that among distance education students, younger students pirated software more than older students. Similarly Gan and Koh, [24] found age is negatively related to software piracy. That older students overwhelmingly showed support to pirate more than younger students when asked to indicate the number of times in the past year older student copied software without buy it. Further, Sims et al., [25] found that older students pirated software more frequently than younger students. On the other hand, [6] did not find significant differences between older and younger students in pirating behavior. Gender is another important demographic factor that has been linked to software piracy. Contrary to the research findings of Oz [19], Davis and Welton [26] and Tsalikis and Ortiz- Buonafina [27] suggest that there were no differences between the genders and software piracy, and research by Pereira and Kanekar [28] suggests that females evidenced greater ethical sensitivity than did males. Sims et al, [25] extended their research by focusing on demographic factors and unethical behaviour in general, and software piracy in particular. Sims' study found a significant difference between males and females in terms of the extent to which they pirate software.

2 Several studies have suggested that male students are more likely to engage in software piracy than female students [25], [23], and male computer users may have more lenient attitudes toward pirated software than female users [29]. However, not all studies show this gender difference in software piracy. Based on a survey of students, faculty, and professionals, Peslak [30] found that females had a higher incidence of copying others software than males. Moores and Chang [31] found that male and female students interpret the act of software piracy similarly while van der Byl and van Belle [32] did not find a statistically significant relationship between gender and software piracy. Prior research has suggested that there is a significant relationship between an individual's level of education and software piracy. Wee et al. [14] found that the higher the education level of an individual, the higher the chance that he or she would to use pirated software. Also, it has been observed that countries that have literacy rates and that spend a large portion on national research and development tend to engage in less software piracy [41]. However, Ang et al. [12] clearly demonstrated that education is not related to one's intention to use pirated software. Sims et al, [25] identified two factors as significant to software piracy: software price and household income. While Rahim, Seyal and Rahman [33] found that the influence of family income did not appear to have an effect in relation to pirating software for personal gain, indicating that students who come from both higher and lower income groups tend to engage in software piracy. However, Marron and Steel [41] has been found that countries with high-income populations tend to engage in less software piracy [41]. Computer-Related Factors in Software Piracy: Personal computer (PC) experience is another potentially significant factor influencing on pirated. For instance, computer literate students may pirate software [33]. Van den Merwe [23] also found that the more personal computer experience distance-computing students had, the more likely they were to engage in more software piracy. Eining and Christensen [34] have also suggested that there is a relationship between software piracy and familiarity with computers. However, Rahim et al [33] found no significant relationship between PC ownership, PC experience and software piracy intention. Technical skill may be another essential factor in predicting software piracy. Two studies that tested the effect of technical skills found that it was a statistically insignificant predictor of computer crime [35], [36]. However, according to [37], both of these studies utilized measures of technical ability that did not capture the reality of what can be considered a high level of technological expertise linked with software piracy [38], [6], [37]. Hinduja and Ingram [39] tested Internet proficiency by asking respondents about their experience in conducting ten online activities, such as setting up mail server preferences and building a web page. These variables were merged into a scale representing Internet experience. Their results showed that a higher level of Internet experience is related with increased software piracy. Their study also indicated that faster Internet connectivity was linked with higher piracy rates [39]. It can be suggested that the Internet has enabled an increase in software piracy in recent years. Wall [40] argued that the Internet enables individuals to easily commit criminal activity for four reasons: it allows anonymous communication, it is relatively easy and it is transnational, it has created a shift in thinking from the ownership of physical property to the ownership of ideas. A rising proportion of individuals are using these dedicated connection from 5 million in 1999 to 12 million in 2000 equipped with cable modem, DSL, or ISDN (integrated services digital network a less prevalent and slower dedicated link) lines at home [38]. Thus, technological advances such as the improvement of media with bigger data storage capacity and a network infrastructure that allows for greater speeds in data transmission have redefined and broadened the pre-existing conception of software piracy. In addition to measuring Internet experience and variety of use, Hinduja and Ingram [39] found that users with high-speed Internet connections were more likely to engage in software piracy. Income and Internet connection variables were usually found to be significant [6], [37], [39], [41], [42]. II. RESEARCH METHOD This study used a quantitative method approach to investigate the relationships between the self-reported software piracy with demographic variables and computer use variables. In this study, a sequential mixed-mode survey has been selected as the data collection tool. A questionnaire was used to examine the factors that lead to software piracy. A total of 278 participants took part in this study from Australian university, 120 responding to the paper questionnaire and 156 responding to a web-based questionnaire.in the first step of the process, the researcher prepared a list of university employees, classified by faculty and department, and posted 800 paper questionnaires with the participant information sheet, consent form and a return envelope to the employees mailbox at the university. The researcher received about 120 completed questionnaires over the four months from 15 November 2012 to 15 March Due to the slow response to the paper questionnaire, the researcher started to send the URL link to the web-based questionnaire to the employees university address. The questionnaire was constructed on the basis of the extant literature, expert academic review prior research and similar empirical studies conducted in the past [21], [22] [36], [38], [41], [16], [45]. The questionnaire was used to obtain accurate, objective and context-specific information from university employees. The questionnaire consisted of two sections: the first section asked demographic questions, which will be discussed in this paper. Participants were asked to indicate whether they had ever pirated software. The second section of the survey investigates factors behind software piracy. Those factors will be further explored in future papers.

3 III. ANALYSIS AND RESULTS In this section, the analysis and the results of the study are presented in figures generated from SPSS V20 for each demographic variable and the degree of software piracy behaviors. The researchers used a split file technique to define the sample who pirated and those who did not pirate to obtain a deeper understanding of the staff s actual behavior in relation to software piracy. The objective of the analysis is to investigate the relationships between the demographic variables and computer use variables of respondents in relation to software piracy. The following figures provide data on the variables and the degree of software piracy of the participants. Fig. 1 shows that male respondents were more likely to say they had pirated software whereas female respondents were more likely to say they had not pirated software. This is consistent with Lau [29], who found that male computer users were more lenient in their attitudes toward pirated software than female users. Male Female % 20% 40% 60% 80% 100% Fig. 1. Gender and piracy behavior A previous study conducted by Gan and Koh [24] found that age is negatively related to software piracy. Results of a study conducted by Peslak [30] also showed that older individuals more readily follow ethical norms regarding copying others software. In this study, figure 2 shows the younger age groups and tends to pirate software more as compared to the older age groups with age 40 and above. Thus, as shown in figure 2 a significant relationship was found between actual behaviors of university staff towards software piracy age group Marron and Steel [43] found a strong negative correlation between piracy and education. From figure 3 below, it is clearly evident that employees who have completed bachelor degree are in greatest number who use pirated software as compared to other categories mentioned in level of education. On the contrary, university staff acquiring masters or professional education tend to use software piracy less and non-pirated software more. Doctoral/Professional Completed high school Not completed high Fig. 3. Level of Education and piracy behavior As Figure 4 below indicate that, participants in the sample who own a personal computer, 100% stated that they had pirated software. Further, the participants who did not own a personal computer, 97.2% also indicated that they had not pirated software. Thus, own a personal computer was identifiable relationship with software piracy. Not own Pc Graduate Diploma Own Pc Master degree Bachelor degree Diploma Figure 4: Personal Computer Ownership and Piracy Behavior As seen in Figure. 5 below, Sample population with experience of using computer for less than 6 months up to experience of computer use 9 years shows little or no involvement in piracy. Whereas, staffs who had pirated software, 97% reported having more than 10 years of experience and the staffs who had not pirated software, 96.1 reported having more than 10 years of experience. Thus, experience of using computer was identifiable relationship with software piracy No Pirated Software Fig. 2. Age and Piracy Behavior.

4 10 years and more 7-9 years 5-7 years 3-5 years 1-3 years 6-12 months Less than 6 months Fig. 5. Computer Use and Piracy Behavior As Fig. 6 shows that sample population with experience of using Internet for less than 6 months up to experience of 9 years shows little or no involvement in piracy. As Fig. 6 shows that sample population with experience of using Internet for less than 6 months up to experience of 9 years shows little or no involvement in piracy. Whereas, staffs who had pirated software, 88% reported having more than 10 years of experience and the staffs who had not pirated software, 86% reported having more than 10 years of experience. Experience of 10 years and 7 to 9 years are not that great but the result obtained is quite diverse so nothing can be concluded. Experience of 10 years and 7 to 9 years are not that great but the result obtained is quite diverse so nothing can be concluded. Dial up WiFi DSL Cable Fig. 7. Type of Internet Connection and Piracy Behavior Previous research also found that individuals with a low income were more likely to participate in software piracy. Income has also been used as a statistical control, however income and Internet connection variables were usually found to be significant [6], [37], [39], [41], [42]. The participants who earn income less than AU$ 2000 Per month are more involved in pirated software as compared to non-pirated software. People with income AU$ 2000 AU$ 2999 are more inclined towards using non-pirated software. People with income AU$ 3000 AU$ 3999 are more involved in pirated software as compared to non-pirated software. As figure 8 below shows, Income does not appear to be related to the level of software piracy. 10 years and more 7-9 years 5-7 years 3-5 years 1-3 years 6-12 months Less than 6 months More than AU $6,000 AU $ 4,000 AU $5,999 AU $ 4,000 AU $4,999 AU $ 3,000 AU $3,999 AU $ 2,000 AU$2,999 AU $ 1,000 AU $1,999 Less than AU $ Fig. 8. Personal Income and Piracy Behavior Fig. 6. Use of the Internet and Piracy Behavior The Fig. 7 below shows that the highest percentage of respondents who pirated software used a DSL and WiFi connection. This finding confirms previous research, for example, it has been found [39] that individuals with a highspeed Internet connection were more likely to participate in software piracy. In this study regarding the percentage of participants who use pirated software and use DSL were more than people who use Wi-Fi and cable as Internet connection. Therefore, the percentage of participant s uses DSL and WiFi have the greatest share in software piracy as compared to the ones who use slow Internet connections. IV. CONCLUSION Demographic characteristics and a technical factors such as familiarity with computers, experiences of internet use and high speed connection like those suggested by Highland [44] and those identified in this study are important in understanding factors associated with software piracy and allow software publishers and user organizations (e.g., universities and colleges) to enhance address the problem of software piracy. Software companies pass their loss of income from software piracy on to the users by charging higher prices to the users who actually purchase the software. Thus, the reduction of software piracy is significant for both developers and purchasers of software [34], [45]. The main aim of the present study, which is part of

5 ongoing research, was to explore the relationships between demographic characteristics of university staff and their actual behavior in relation to software piracy. The findings of this study show that the rate of software piracy of university staff was not affected by monthly income. Moreover, the result of this study found that the younger age groups, and 30-39, tend to pirate software more as compared to the older age group, age 40 and above. Also, the more personal computer experience and Internet experience the staff reported having similar result, that mean personal computer experience and Internet experience, is not associated with increased software piracy. In this research, level of education appears to be associated to the level of software piracy and it found that university staff acquiring masters or professional education tend to use software piracy less and non-pirated software more. Gender is another important demographic factor that has been linked to software piracy. Ford and Richardson [46] concluded that females are more ethical than males; therefore females will use pirated software less than males, as software piracy can be considered unethical. This research confirms that males are more likely to be software pirates. Thus, it can be said the female less pirate than male may because the female consider ethical issues and they are less risk takers than males. Universities need to ensure that their employees are required to explore, discuss and understand the issue of software piracy from several perspectives: managers who may have to set policies; software developers who may be asked to develop software; and software publishers who lose money from piracy and then pass the costs on to users to help them understand the full impact of software piracy. One step towards solving a software piracy problem among university staff, is the development and posting of a clearly stated software policy for students and staff. That these two groups be duly educated of the importance of adhering to the policies and the consequences for noncompliance. Students and staff should be requested to sign a consent form before being issued a computer account. An on-screen warning against software piracy might serve as a reminder when users log on or access any university software. In addition, universities can enhance monitoring of activities and work with software publishers while hiring internal auditors to conduct regular software inventory checks. The universities should continue to treat copyright infringement as a criminal offence and help deter or even prosecute offenders. For instance, universities should identify violators [3] and stop their computer account [47]. Future research can be conducted to additional factors, which may play important roles, including the effect of Neutralization techniques on software piracy, which may be extended to explore strategies to find a solution to address software piracy. REFERENCES [1] BSA, "Fifth Annual BSA and IDC Global Software Piracy Study," Business Software Alliance, Washington, DC., Retrieved December 11th [2] R. D. Gopal, G. L. Sanders, S. Bhattacharjee, M. Agrawal, and S. C. Wagner, "A behavioral model of digital music piracy," Journal of Organizational Computing and Electronic Commerce, vol. 14, pp , [3] D. Yang, M. Sonmez, D. Bosworth, and G. Fryxell, "Global software piracy: Searching for further explanations," Journal of Business Ethics, vol. 87, pp , [4] C. M. Koen and J. H. Im, "Software piracy and its legal implications," Information & management, vol. 31, pp , [5] D. W. Straub Jr and R. W. Collins, "Key information liability issues facing managers: Software piracy, proprietary databases, and individual rights to privacy," Mis Quarterly, pp , [6] S. Hinduja, "Trends and patterns among online software pirates," Ethics and Information Technology, vol. 5, pp , [7] A. G. Peace and D. Galletta, "Developing a predictive model of software piracy behavior: an empirical study," [8] M. M. Rahim, A. H. Seyal, and M. N. A. Rahman, "Software piracy among computing students: a Bruneian scenario," Computers & Education, vol. 32, pp , [9] R. A. Strikwerda and J. M. Ross, "Software and Ethical Softness," Collegiate Microcomputer, vol. 10, pp , [10] T. Moores and G. Dhillon, "Software piracy: a view from Hong Kong," Communications of the ACM, vol. 43, pp , [11] R. S. Glass and W. A. Wood, "Situational determinants of software piracy: An equity theory perspective," Journal of Business Ethics, vol. 15, pp , [12] S. H. Ang, P. S. Cheng, E. A. Lim, and S. K. Tambyah, "Spot the difference: consumer responses towards counterfeits," Journal of consumer Marketing, vol. 18, pp , [13] B. Tan, "Understanding consumer ethical decision making with respect to purchase of pirated software," Journal of consumer Marketing, vol. 19, pp , [14] C.-H. Wee, S.-J. Ta, and K.-H. Cheok, "Non-price determinants of intention to purchase counterfeit goods: an exploratory study," International Marketing Review, vol. 12, pp , [15] G. Tom, B. Garibaldi, Y. Zeng, and J. Pilcher, "Consumer demand for counterfeit goods," Psychology & Marketing, vol. 15, pp , [16] P. M. Simpson, D. Banerjee, and C. L. Simpson Jr, "Softlifting: a model of motivating factors," Journal of Business Ethics, vol. 13, pp , [17] G. S. Taylor and J. P. Shim, "A comparative examination of attitudes toward software piracy among business professors and executives," Human Relations, vol. 46, pp , [18] G. Wong, A. Kong, and S. Ngai, "A study of unauthorised software copying among post-secondary students in Hong Kong," Australian Computer Journal, vol. 22, pp , [19] E. Oz, "The attitude of managers-to-be toward software piracy," OR/MS Today, vol. 17, pp , [20] J. Shim and G. S. Taylor, "Practicing managers' perception/attitudes towards illegal software copying," OR/MS Today, vol. 16, pp , [21] R. D. Gopal and G. L. Sanders, "Preventive and deterrent controls for software piracy," Journal of Management Information Systems, vol. 13, pp , [22] A. Peace, "Software piracy and computer-using professionals: a survey," Journal of Computer Information Systems, vol. 38, pp , [23] T. Van Der Merwe, "A profile of the distance computing student softlifter," in Proceedings of In, [24] L. L. Gan and H. C. Koh, "An empirical study of software piracy among tertiary institutions in Singapore," Information & management, vol. 43, pp , [25] R. R. Sims, H. K. Cheng, and H. Teegen, "Toward a profile of student software piraters," Journal of Business Ethics, vol. 15, pp , [26] J. R. Davis and R. E. Welton, "Professional ethics: business students' perceptions," Journal of Business Ethics, vol. 10, pp , [27] J. Tsalikis and M. Ortiz-Buonafina, "Ethical beliefs' differences of males and females," Journal of Business Ethics, vol. 9, pp , [28] L. Pereira and S. Kanekar, "Perceptions of initiatory and retaliatory cheating behaviour," Indian Psychologist, vol. 3, pp , [29] E. K. W. Lau, "An empirical study of software piracy," Business Ethics: A European Review, vol. 12, pp , 2003.

6 [30] A. R. Peslak, "Ethics and Moral Intensity: An Analysis of Information Technology and General Education Students," Information Systems Education Journal, vol. 5, [31] T. T. Moores and J. C.-J. Chang, "Ethical decision making in software piracy: Initial development and test of a four-component model," Mis Quarterly, pp , [32] K. van der Byl and J.-P. Van Belle, "Factors Influencing South African Attitudes toward Digital Piracy," Communications, vol. 1, [33] M. Rahim, A. H. Seyal, and M. Rahman, "Factors affecting softlifting intention of computing students: An empirical study," Journal of Educational Computing Research, vol. 24, pp , [34] M. M. Eining and A. L. Christensen, "A psycho-social model of software piracy: the development and test of a model," Ethical issues in information systems, pp , [35] G. E. Higgins, B. D. Fell, and A. L. Wilson, "Digital piracy: Assessing the contributions of an integrated self control theory and social learning theory using structural equation modeling," Criminal Justice Studies, vol. 19, pp. 3-22, [36] G. E. Higgins and D. A. Makin, "Does social learning theory condition the effects of low self-control on college students software piracy," Journal of Economic Crime Management, vol. 2, pp. 1-22, [37] W. D. Gunter, "Internet scallywags: a comparative analysis of multiple forms and measurements of digital piracy," WrESTEdu CRMINOLOG, [38] S. Hinduja, "Correlates of Internet software piracy," Journal of Contemporary Criminal Justice, vol. 17, pp , [39] S. Hinduja and J. R. Ingram, "Social learning theory and music piracy: the differential role of online and offline peer influences," Criminal Justice Studies, vol. 22, pp , [40] D. Wall, "The Internet as a conduit for criminal activity," Information Technology and The Criminal Justice System, Pattavina, A., ed, pp , [41] G. E. Higgins, B. D. Fell, and A. L. Wilson, "Low self-control and social learning in understanding students' intentions to pirate movies in the United States," Social Science Computer Review, vol. 25, pp , [42] R. G. Morris and G. E. Higgins, "Neutralizing Potential and Self- Reported Digital Piracy A Multitheoretical Exploration Among College Undergraduates," Criminal Justice Review, vol. 34, pp , [43] D. B. Marron and D. G. Steel, "Which countries protect intellectual property? The case of software piracy," Economic inquiry, vol. 38, pp , [44] H. J. Highland, Protecting Your Microcomputer System: John Wiley & Sons, Inc., [45] A. L. Christensen and M. M. Eining, "Factors influencing software piracy: Implications for accountants," Journal of Information Systems, vol. 5, pp , [46] R. C. Ford and W. D. Richardson, "Ethical decision making: A review of the empirical literature," Journal of Business Ethics, vol. 13, pp , [47] D. Banerjee, T. P. Cronan, and T. W. Jones, "Modeling IT Ethics: A Study in Situational Ethics," MIS quarterly, vol. 22, 1998.

SOFTWARE PIRACY: EXPLORING AWARENESS OF THE LAW AS A DETERMINANT OF SOFTLIFTING ATTITUDE AND INTENTION

SOFTWARE PIRACY: EXPLORING AWARENESS OF THE LAW AS A DETERMINANT OF SOFTLIFTING ATTITUDE AND INTENTION SOFTWARE PIRACY: EXPLORING AWARENESS OF THE LAW AS A DETERMINANT OF SOFTLIFTING ATTITUDE AND INTENTION Pamela A. Dupin-Bryant, Utah State University, pam.dupin-bryant@usu.edu ABSTRACT Software piracy,

More information

Digital Piracy and Stealing: A Comparison on Criminal Propensity

Digital Piracy and Stealing: A Comparison on Criminal Propensity International Journal of Criminal Justice Sciences Vol 5 Issue 2 July December 2010 Copyright 2010 International Journal of Criminal Justice Sciences (IJCJS) Official Journal of the South Asian Society

More information

INFORMATION TECHNOLOGY INTELLECTUAL PROPERTY ETHICS: ISSUES AND ANALYSIS

INFORMATION TECHNOLOGY INTELLECTUAL PROPERTY ETHICS: ISSUES AND ANALYSIS INFORMATION TECHNOLOGY INTELLECTUAL PROPERTY ETHICS: ISSUES AND ANALYSIS Alan R. Peslak, Ph.D., Penn State University, arp14@psu.edu ABSTRACT Unethical information technology behavior is estimated to cost

More information

SOFTWARE PIRACY 2.0? ONLINE SHARING: DIGITAL MUSIC AND

SOFTWARE PIRACY 2.0? ONLINE SHARING: DIGITAL MUSIC AND DIGITAL MUSIC AND ONLINE SHARING: SOFTWARE PIRACY 2.0? Considering the similarities and unique characteristics of online file sharing and software piracy. Rapid advances in Internet connectivity and digital

More information

The Influence of Consumers Moral Intensity, Perceived Risks and Moral Judgment in Purchasing Pirated Software

The Influence of Consumers Moral Intensity, Perceived Risks and Moral Judgment in Purchasing Pirated Software 47 The Influence of Consumers Moral Intensity, Perceived Risks and Moral Judgment J.K. Ratnasingam, Western Digital, Kuala Lumpur, Malaysia, jeyaganesh.rajnasingam@wdc.com C.H. Ponnu, University of Malaya,

More information

Software piracy among IT professionals in organizations

Software piracy among IT professionals in organizations International Journal of Information Management 26 (2006) 401 413 www.elsevier.com/locate/ijinfomgt Software piracy among IT professionals in organizations Alok Mishra a,, Ibrahim Akman a, Ali Yazici b

More information

An Application of Deterrence Theory to Software Piracy. George E. Higgins Abby L. Wilson Brian D. Fell University of Louisville

An Application of Deterrence Theory to Software Piracy. George E. Higgins Abby L. Wilson Brian D. Fell University of Louisville An Application of Deterrence Theory to Software Piracy By George E. Higgins Abby L. Wilson Brian D. Fell University of Louisville Although the research on software piracy is growing, criminologists have

More information

Facilitating conditions and social factors as predictors of attitudes and intentions to illegally download

Facilitating conditions and social factors as predictors of attitudes and intentions to illegally download Page 1 of 8 ANZMAC 2009 Facilitating conditions and social factors as predictors of attitudes and intentions to illegally download Ian Phau, Curtin University of Technology, Ian.Phau@cbs.curtin.edu.au

More information

An Empirical Study of an Extended Theory of Planned Behaviour Model for Pirated Software Purchase

An Empirical Study of an Extended Theory of Planned Behaviour Model for Pirated Software Purchase An Empirical Study of an Extended Theory of Planned Behaviour Model for Pirated Software Purchase Syed Shah Alam*, Azhar Ahmad**, Mhd. Suhaimi Ahmad*** and Nik Mohd Hazrul Nik Hashim**** This study is

More information

Mobile Stock Trading (MST) and its Social Impact: A Case Study in Hong Kong

Mobile Stock Trading (MST) and its Social Impact: A Case Study in Hong Kong Mobile Stock Trading (MST) and its Social Impact: A Case Study in Hong Kong K. M. Sam 1, C. R. Chatwin 2, I. C. Ma 3 1 Department of Accounting and Information Management, University of Macau, Macau, China

More information

Economic Growth Centre Working Paper Series

Economic Growth Centre Working Paper Series Economic Growth Centre Working Paper Series The Profiles of Software Pirates among Tertiary Institutions in Singapore by Lydia L. GAN and Hian Chye KOH Economic Growth Centre Division of Economics School

More information

Permanent Link: http://espace.library.curtin.edu.au/r?func=dbin-jump-full&local_base=gen01-era02&object_id=144454

Permanent Link: http://espace.library.curtin.edu.au/r?func=dbin-jump-full&local_base=gen01-era02&object_id=144454 Citation: Phau, Ian. 2010. Pirated software: ethical attitudes and purchase behaviour of consumers, in Harry Timmermans (ed), Recent Advances in Retailing and Services Science Conference, Jul 2 2010. Istanbul:

More information

SECTION 1. Macroeconomic processes and regional economies management

SECTION 1. Macroeconomic processes and regional economies management SECTION 1. Macroeconomic processes and regional economies management Mastura Jaafar (Malaysia), Thurasamy Ramayah (Malaysia), Tee Wan Teng (Malaysia) The intention to use pirated software: a study of undergraduate

More information

ONLINE COPYRIGHT INFRINGEMENT RESEARCH A MARKETING RESEARCH REPORT. Prepared For: DEPARTMENT OF COMMUNICATIONS 24 JUNE 2015

ONLINE COPYRIGHT INFRINGEMENT RESEARCH A MARKETING RESEARCH REPORT. Prepared For: DEPARTMENT OF COMMUNICATIONS 24 JUNE 2015 ONLINE COPYRIGHT INFRINGEMENT RESEARCH A MARKETING RESEARCH REPORT Prepared For: DEPARTMENT OF COMMUNICATIONS 263103193 24 JUNE 2015 TNS Level 1, 181 Miller Street North Sydney NSW 2060 t +61 2 9563 4200

More information

INFORMATION TECHNOLOGY ETHICS: A RESEARCH FRAMEWORK

INFORMATION TECHNOLOGY ETHICS: A RESEARCH FRAMEWORK INFORMATION TECHNOLOGY ETHICS: A RESEARCH FRAMEWORK Richard V. McCarthy, Quinnipiac University, richard.mccarthy@quinnipiac.edu Leila Halawi, Nova Southeastern University, lahalawi@nova.edu Jay E. Aronson,

More information

What are the Prospects for Stopping Software Piracy?

What are the Prospects for Stopping Software Piracy? Repicky - p0 What are the Prospects for Stopping Software Piracy? A research paper written by Matthew Repicky in partial fulfillment of requirements for a course in computer-related crime at the Rochester

More information

THE EFFECT OF JORDANIAN LAWS IN REDUCING SOFTWARE PIRACY

THE EFFECT OF JORDANIAN LAWS IN REDUCING SOFTWARE PIRACY Volume 4, No. 7, July 2013 Journal of Global Research in Computer Science REVIEW ARTICLE Available Online at www.jgrcs.info THE EFFECT OF JORDANIAN LAWS IN REDUCING SOFTWARE PIRACY Essam Said Hanandeh

More information

Chapter 1: Introduction

Chapter 1: Introduction Chapter 1: Introduction Computer software comes with a licensed agreement stating how it can be used legally. Software piracy occurs when people, intentionally or unintentionally, make copies of the computer

More information

SHAMING AS A TECHNIQUE FOR INFORMATION SECURITY POLICY

SHAMING AS A TECHNIQUE FOR INFORMATION SECURITY POLICY SHAMING AS A TECHNIQUE FOR INFORMATION SECURITY POLICY AND TRAINING ADHERENCE Mark A. Harris University of South Carolina maharris@hrsm.sc.edu ABSTRACT Information security policy and information security

More information

THE THEORY OF PLANNED BEHAVIOR AND ITS ROLE IN TECHNOLOGY ACCEPTANCE OF ELECTRONIC MEDICAL RECORDS IMPLEMENTATION

THE THEORY OF PLANNED BEHAVIOR AND ITS ROLE IN TECHNOLOGY ACCEPTANCE OF ELECTRONIC MEDICAL RECORDS IMPLEMENTATION THE THEORY OF PLANNED BEHAVIOR AND ITS ROLE IN TECHNOLOGY ACCEPTANCE OF ELECTRONIC MEDICAL RECORDS IMPLEMENTATION Elaine Seeman, Department of Management Information Systems College of Business, East Carolina

More information

Article Rate of Software Piracy Vs Value of Software Piracy

Article Rate of Software Piracy Vs Value of Software Piracy Article Rate of Software Piracy Vs Value of Software Piracy Abstract A number of studies conclude that there is a greater rate of software piracy by individuals from poorer compared to richer countries.

More information

Hongxia Zhang and Hengjia Zang Guanghua School of Management, Peking University, Bejing, China, and

Hongxia Zhang and Hengjia Zang Guanghua School of Management, Peking University, Bejing, China, and Purchasing pirated software: an initial examination of Chinese consumers Fang Wang School of Business and Economics, Wilfrid Laurier University, Waterloo, Canada Hongxia Zhang and Hengjia Zang Guanghua

More information

PREDICTING ACCEPTANCE OF ELECTRONIC MEDICAL RECORDS: WHAT FACTORS MATTER MOST?

PREDICTING ACCEPTANCE OF ELECTRONIC MEDICAL RECORDS: WHAT FACTORS MATTER MOST? PREDICTING ACCEPTANCE OF ELECTRONIC MEDICAL RECORDS: WHAT FACTORS MATTER MOST? Shanan G. Gibson & Elaine D. Seeman College of Business, East Carolina University gibsons@ecu.edu; seemane@ecu.edu ABSTRACT

More information

Are you a peer to peer pirate? Attitudes towards downloading movies and TV series through P2P networks

Are you a peer to peer pirate? Attitudes towards downloading movies and TV series through P2P networks Page 1 of 8 ANZMAC 2009 Are you a peer to peer pirate? Attitudes towards downloading movies and TV series through P2P networks Ian Phau, Curtin University of Technology, Ian.Phau@cbs.curtin.edu.au Min

More information

Knowledge, Attitude and Practice of ICT Use in Teaching and Learning: In the Context of Bangladeshi Tertiary Education

Knowledge, Attitude and Practice of ICT Use in Teaching and Learning: In the Context of Bangladeshi Tertiary Education ISSN (Online): 23197064 Knowledge, Attitude and Practice of ICT Use in Teaching and Learning: In the Context of Bangladeshi Tertiary Education Arifa Rahman 1, F. M. Arifur Rahman 2 1 Green University of

More information

Digital Piracy, Self-Control Theory, and Rational Choice: An Examination of the Role of Value

Digital Piracy, Self-Control Theory, and Rational Choice: An Examination of the Role of Value Digital Piracy, Self-Control Theory, and Rational Choice: An Examination of the Role of Value George E. Higgins 1 University of Louisville, USA Abstract To date, several researchers have shown that attitudes,

More information

A Study of the Factors that Influence the Acceptance of e-commerce in Developing Countries:

A Study of the Factors that Influence the Acceptance of e-commerce in Developing Countries: A Study of the Factors that Influence the Acceptance of e-commerce in Developing Countries: A Comparative Survey between Iran and United Arab Emirates Lotfollah Forouzandeh Dehkordi Assistant Professor

More information

Student s Attitude towards Peer-to-Peer Music File Sharing and Downloading from Internet-A Cross Sectional Study of American and Moroccan Students

Student s Attitude towards Peer-to-Peer Music File Sharing and Downloading from Internet-A Cross Sectional Study of American and Moroccan Students IBT Journal of Business Studies (Formerly Journal of Management & Social Sciences) Vol. 9, No. 1, (Spring 2014) 137-149 Student s Attitude towards Peer-to-Peer Music File Sharing and Downloading from Internet-A

More information

ENFORCEMENT OF IP RIGHTS IN THE DIGITAL ENVIRONMENT CONCERNS, CHALLENGES AND ACTIONS REQUIRED FOR THE PROTECTION OF THE SINGLE MARKET.

ENFORCEMENT OF IP RIGHTS IN THE DIGITAL ENVIRONMENT CONCERNS, CHALLENGES AND ACTIONS REQUIRED FOR THE PROTECTION OF THE SINGLE MARKET. ENFORCEMENT OF IP RIGHTS IN THE DIGITAL ENVIRONMENT CONCERNS, CHALLENGES AND ACTIONS REQUIRED FOR THE PROTECTION OF THE SINGLE MARKET GRUR Workshop Brussels March 7, 2007 Michael Keplinger* Overview: 1.

More information

CHARACTERISTICS AND EXPENDITURE PATTERNS OF AUSTRALIAN HOUSEHOLDS USING MOBILE PHONES. Farhat Yusuf and Mohammad B. Naseri Macquarie University

CHARACTERISTICS AND EXPENDITURE PATTERNS OF AUSTRALIAN HOUSEHOLDS USING MOBILE PHONES. Farhat Yusuf and Mohammad B. Naseri Macquarie University CHARACTERISTICS AND EXPENDITURE PATTERNS OF AUSTRALIAN HOUSEHOLDS USING MOBILE PHONES Farhat Yusuf and Mohammad B. Naseri Macquarie University Track: Entrepreneurship, Innovation, and large and Small Business

More information

Software Piracy: A Study of the Extent Of Coverage in Introductory MIS Textbooks

Software Piracy: A Study of the Extent Of Coverage in Introductory MIS Textbooks : A Study of the Extent Of Coverage in Introductory MIS Textbooks Laurie E. MacDonald Kenneth T. Fougere Bryant College Smithfield, RI 02917 ABSTRACT This research argues that although software piracy

More information

Exploring the Antecedents of Electronic Service Acceptance: Evidence from Internet Securities Trading

Exploring the Antecedents of Electronic Service Acceptance: Evidence from Internet Securities Trading Exploring the Antecedents of Electronic Service Acceptance: Evidence from Internet Securities Trading Siriluck Rotchanakitumnuai Department of Management Information Systems Faculty of Commerce and Accountancy

More information

Behavioural Aspects of ERP System of an Indian Steel Manufacturing Industry

Behavioural Aspects of ERP System of an Indian Steel Manufacturing Industry 10 Behavioural Aspects of ERP System of an Indian Steel Manufacturing Industry Dr. Shyam Prasad* Interaction between people, processes, data and technology is broadly referred to as Information System

More information

Key Findings ASIC Report 419. Australian Financial Attitudes and Behaviour Tracker Wave 1: March August 2014

Key Findings ASIC Report 419. Australian Financial Attitudes and Behaviour Tracker Wave 1: March August 2014 ASIC Report 419 Wave 1: March August 2014 Australian Securities and Investments Commission December 2014 Contents INTRODUCTION 3 KEY FINDINGS 9 Financial attitudes 10 Keeping track of finances 11 Planning

More information

The Impact of Management Information Systems on the Performance of Governmental Organizations- Study at Jordanian Ministry of Planning

The Impact of Management Information Systems on the Performance of Governmental Organizations- Study at Jordanian Ministry of Planning The Impact of Management Information Systems on the Performance of Governmental Organizations- Study at Jordanian Ministry of Planning Dr. Shehadeh M.A.AL-Gharaibeh Assistant prof. Business Administration

More information

Technology Complexity, Personal Innovativeness And Intention To Use Wireless Internet Using Mobile Devices In Malaysia

Technology Complexity, Personal Innovativeness And Intention To Use Wireless Internet Using Mobile Devices In Malaysia International Review of Business Research Papers Vol.4 No.5. October-November 2008. PP.1-10 Technology Complexity, Personal Innovativeness And Intention To Use Wireless Internet Using Mobile Devices In

More information

The Effect of Demographics on Seamless Mobile Service Interface

The Effect of Demographics on Seamless Mobile Service Interface The Effect of Demographics on Seamless Mobile Service Interface Mattila, Anssi; and Pento, Tapio Abstract The purpose of this paper is to demonstrate the effect of demographic variables on choice of a

More information

SOUTH LOS ANGELES YOUTH OFFENDER RE-ENTRY PROGRAM A GRANT PROPOSAL

SOUTH LOS ANGELES YOUTH OFFENDER RE-ENTRY PROGRAM A GRANT PROPOSAL SOUTH LOS ANGELES YOUTH OFFENDER RE-ENTRY PROGRAM A GRANT PROPOSAL www.campaignforyouthjustice.org Guadalupe Torres California State University, Long Beach May 2015 INTRODUCTION Arrest Rates In the City

More information

FIGHTING INTELLECTUAL PROPERTY FRAUD

FIGHTING INTELLECTUAL PROPERTY FRAUD FIGHTING INTELLECTUAL PROPERTY FRAUD Intellectual property frauds have become more and more organized and globalized. Developing innovative enforcement strategies and tactics through private-public partnership

More information

Dundalk Institute of Technology. Acceptable Usage Policy. Version 1.0.1

Dundalk Institute of Technology. Acceptable Usage Policy. Version 1.0.1 Dundalk Institute of Technology Acceptable Usage Policy Version 1.0.1 1 Document Location..\DkIT_Policy_Documents\Policies Revision History Date of this revision: Date of next review: Version Revision

More information

ACCOUNTING STUDENTS PERCEPTION OF ETHICAL DILLEMAS IN POLAND

ACCOUNTING STUDENTS PERCEPTION OF ETHICAL DILLEMAS IN POLAND Ewa Wanda Maruszewska University of Economics in Katowice, Poland ACCOUNTING STUDENTS PERCEPTION OF ETHICAL DILLEMAS IN POLAND Abstract The article presents the results of a survey performed in a public

More information

Does Social Learning Theory Condition the Effects of Low Self-Control on College Students Software Piracy?

Does Social Learning Theory Condition the Effects of Low Self-Control on College Students Software Piracy? Does Social Learning Theory Condition the Effects of Low Self-Control on College Students Software Piracy? George E. Higgins and David A. Makin University of Louisville Abstract Although researchers have

More information

Survey on cloud forensics and critical criteria for cloud forensic capability: A preliminary analysis

Survey on cloud forensics and critical criteria for cloud forensic capability: A preliminary analysis Survey on cloud forensics and critical criteria for cloud forensic capability: A preliminary analysis Keyun Ruan, Ibrahim Baggili (PhD), Prof Joe Carthy, Prof Tahar Kechadi University College Dublin, Zayed

More information

Cloud Computing: A Comparison Between Educational Technology Experts' and Information Professionals' Perspectives

Cloud Computing: A Comparison Between Educational Technology Experts' and Information Professionals' Perspectives Noa Aharony 1 Cloud Computing: A Comparison Between Educational Technology Experts' and Information Professionals' Perspectives Noa Aharony Department of Information Science, Bar-Ilan University Noa.aharony@biu.ac.il

More information

ONLINE SHOPPING PERCEPTIONS OF OFFLINE SHOPPERS

ONLINE SHOPPING PERCEPTIONS OF OFFLINE SHOPPERS ONLINE SHOPPING PERCEPTIONS OF OFFLINE SHOPPERS Manouchehr Tabatabaei, Georgia Southern University, mtabatab@georgiasouthern.edu ABSTRACT Recent advancements in technology have facilitated commerce around

More information

Factors of Short Term Investment Decision Making

Factors of Short Term Investment Decision Making International Journal of Management & Organizational Studies Volume 2, Issue 4, 2013 ISSN: 2305-2600 Factors of Short Term Investment Decision Making Dr. Mohsin Bashir and Amir Nisar Author(s) Biography

More information

Study into the Sales of Add-on General Insurance Products

Study into the Sales of Add-on General Insurance Products Study into the Sales of Add-on General Insurance Quantitative Consumer Research Report Prepared For: Financial Conduct Authority (FCA) March, 2014 Authorised Contact Persons Frances Green Research Director

More information

T H E D A R K T R A D E. The Economics of Ideas. Activity #1: Identity Theft. 2 hours

T H E D A R K T R A D E. The Economics of Ideas. Activity #1: Identity Theft. 2 hours ILLICIT LESSON PLAN GRADES 6-8 STANDARDS: GEOGRAPHY, 11, 16; ECONOMICS, 10; CIVICS, 22 The Economics of Ideas Overview: In today s global marketplace, intellectual property (IP) is a hot commodity. Under

More information

Relationship of Gender to Faculty Use of Online Educational Tools. Susan Lucas. The University of Alabama

Relationship of Gender to Faculty Use of Online Educational Tools. Susan Lucas. The University of Alabama Relationship of Gender to Faculty Use of Online Educational Tools Susan Lucas The University of Alabama Copyright Susan Lucas, 2003 This work is the intellectual property of the author. Permission is granted

More information

Asian Research Journal of Business Management

Asian Research Journal of Business Management Asian Research Journal of Business Management FACTORS INFLUENCING ONLINE TRADING ADOPTION: A STUDY ON INVESTORS ATTITUDE IN GREATER VISAKHAPATNAM CITY Dr. Krishna Mohan Vaddadi 1 & Merugu Pratima 2 * 1

More information

Evaluating User Acceptance of Online Banking Information Systems: An Empirical Case of Pakistan Paper 18

Evaluating User Acceptance of Online Banking Information Systems: An Empirical Case of Pakistan Paper 18 Evaluating User Acceptance of Online Banking Information Systems: An Empirical Case of Pakistan Paper 18 Fida Hussain Chandio fida.chandio@brunel.ac.uk ABSTRACT Pakistan banking sector has gone through

More information

Rehabilitation programs for young offenders: Towards good practice? Andrew Day. Forensic Psychology Research Group. University of South Australia

Rehabilitation programs for young offenders: Towards good practice? Andrew Day. Forensic Psychology Research Group. University of South Australia 1 Rehabilitation programs for young offenders: Towards good practice? Andrew Day Forensic Psychology Research Group University of South Australia Andrew.day@unisa.edu.au Invited paper for the Understanding

More information

Issues in Information Systems Volume 15, Issue I, pp. 20-27, 2014

Issues in Information Systems Volume 15, Issue I, pp. 20-27, 2014 E-CHEATING: INCIDENCE AND TRENDS AMONG COLLEGE STUDENTS Darwin L. King, St. Bonaventure University, dking@sbu.edu Carl J. Case, St. Bonaventure University, ccase@sbu.edu ABSTRACT There has been substantial

More information

Empirical Analysis of Software Usage to Drive Policy Recommendations. May 19, 2015 USCD Jared W. Ragland BSA The Software Alliance

Empirical Analysis of Software Usage to Drive Policy Recommendations. May 19, 2015 USCD Jared W. Ragland BSA The Software Alliance Empirical Analysis of Software Usage to Drive Policy Recommendations May 19, 2015 USCD Jared W. Ragland BSA The Software Alliance Outline Introduction to BSA Global Studies and their Methodology 2014 BSA

More information

Software Piracy and Copyright - An Empirical Research Report

Software Piracy and Copyright - An Empirical Research Report Copyright 2013 International Journal of Cyber Criminology (IJCC) ISSN: 0974 2891 January June 2013, Vol 7 (1): 62 80 This is an Open Access paper distributed under the terms of the Creative Commons Attribution-Non-

More information

An Application of the UTAUT Model for Understanding Student Perceptions Using Course Management Software

An Application of the UTAUT Model for Understanding Student Perceptions Using Course Management Software An Application of the UTAUT Model for Understanding Student Perceptions Using Course Management Software Jack T. Marchewka Chang Liu Operations Management and Information Systems Department Northern Illinois

More information

refers to an HKC-approved cable modem, power adaptor, splitter, Ethernet cable and coaxial

refers to an HKC-approved cable modem, power adaptor, splitter, Ethernet cable and coaxial i-cable Broadband Operating Policy (English Version Only) 有 線 寬 頻 寬 頻 上 網 服 務 用 戶 守 則 只 提 供 英 文 版 本 I. General Overview Pursuant to the terms hereof and the General Terms and Conditions, i-cable agrees

More information

If you have any questions about any of our policies, please contact the Customer Services Team.

If you have any questions about any of our policies, please contact the Customer Services Team. Acceptable Use Policy (AUP) 1. Introduction Blue Monkee has created this Acceptable Use Policy (AUP) for hosting customers to protect our resources and the resources of our other customers and hosting

More information

National Mental Health Survey of Doctors and Medical Students Executive summary

National Mental Health Survey of Doctors and Medical Students Executive summary National Mental Health Survey of Doctors and Medical Students Executive summary www.beyondblue.org.au 13 22 4636 October 213 Acknowledgements The National Mental Health Survey of Doctors and Medical Students

More information

Assessing the quality of online courses from the students' perspective

Assessing the quality of online courses from the students' perspective Internet and Higher Education 9 (2006) 107 115 Assessing the quality of online courses from the students' perspective Andria Young, Chari Norgard 1 University of Houston-Victoria, 3007 N. Ben Wilson, Victoria,

More information

Service Quality Value Alignment through Internal Customer Orientation in Financial Services An Exploratory Study in Indian Banks

Service Quality Value Alignment through Internal Customer Orientation in Financial Services An Exploratory Study in Indian Banks Service Quality Value Alignment through Internal Customer Orientation in Financial Services An Exploratory Study in Indian Banks Prof. Tapan K.Panda* Introduction A high level of external customer satisfaction

More information

Bates Technical College. Information Technology Acceptable Use Policy

Bates Technical College. Information Technology Acceptable Use Policy Bates Technical College Information Technology Acceptable Use Policy Consistent with policy adopted by the Board of Trustees, Bates Technical College, hereinafter referred to as the College, has a commitment

More information

An Empirical Analysis on the Performance Factors of Software Firm

An Empirical Analysis on the Performance Factors of Software Firm , pp.121-132 http://dx.doi.org/10.14257/ijseia.2014.8.7,10 An Empirical Analysis on the Performance Factors of Software Firm Moon-Jong Choi, Jae-Won Song, Rock-Hyun Choi and Jae-Sung Choi #3-707, DGIST,

More information

Diploma of Criminology & Criminal Justice

Diploma of Criminology & Criminal Justice Course Code: Course Name: 1010CCJ Introduction to Forensic Psychology Semester: Semester 3, 2015 Program: Diploma of Criminology & Criminal Justice Credit Points: 10 Course Coordinator: Bonnie Clough Document

More information

EFFECTIVENESS OF DETECTIVE AND PREVENTATIVE INFORMATION SECURITY CONTROLS IN INFORMATION SYSTEMS ORGANIZATIONS

EFFECTIVENESS OF DETECTIVE AND PREVENTATIVE INFORMATION SECURITY CONTROLS IN INFORMATION SYSTEMS ORGANIZATIONS SENRA Academic Publishers, British Columbia Vol. 8, No. 3, pp. 3125-3129, October 2014 Online ISSN: 1920-3853; Print ISSN: 1715-9997 EFFECTIVENESS OF DETECTIVE AND PREVENTATIVE INFORMATION SECURITY CONTROLS

More information

E-learning: Students perceptions of online learning in hospitality programs. Robert Bosselman Hospitality Management Iowa State University ABSTRACT

E-learning: Students perceptions of online learning in hospitality programs. Robert Bosselman Hospitality Management Iowa State University ABSTRACT 1 E-learning: Students perceptions of online learning in hospitality programs Sungmi Song Hospitality Management Iowa State University Robert Bosselman Hospitality Management Iowa State University ABSTRACT

More information

An analysis on dynamics that lead to counterfeit purchasing behavior of ICT products among youths

An analysis on dynamics that lead to counterfeit purchasing behavior of ICT products among youths IOSR Journal of Business and Management (IOSRJBM) eissn: 2278487X, pissn: 23197668. Volume 16, Issue 8. Ver. IV (Aug. 2014), PP 2129 An analysis on dynamics that lead to counterfeit purchasing behavior

More information

DEVELOPING AN EXTENDED TECHNOLOGY ACCEPTANCE MODEL: DOCTORS ACCEPTANCE OF ELECTRONIC MEDICAL RECORDS IN JORDAN

DEVELOPING AN EXTENDED TECHNOLOGY ACCEPTANCE MODEL: DOCTORS ACCEPTANCE OF ELECTRONIC MEDICAL RECORDS IN JORDAN DEVELOPING AN EXTENDED TECHNOLOGY ACCEPTANCE MODEL: DOCTORS ACCEPTANCE OF ELECTRONIC MEDICAL RECORDS IN JORDAN INTRODUCTION Fauziah Baharom 1, Ola T. Khorma 2, Haslina Mohd 3, and Mahmood G. Bashayreh

More information

Impact of ICT on Teacher Engagement in Select Higher Educational Institutions in India

Impact of ICT on Teacher Engagement in Select Higher Educational Institutions in India Impact of ICT on Teacher Engagement in Select Higher Educational Institutions in India Bushra S P Singh 1, Dr. Sanjay Kaushik 2 1 Research Scholar, University Business School, Arts Block 3, Panjab University,

More information

International Business & Economics Research Journal June 2013 Volume 12, Number 6

International Business & Economics Research Journal June 2013 Volume 12, Number 6 Establishing The Challenges Affecting South African SMEs Michael C. Cant, University of South Africa, South Africa Johannes A. Wiid, University of South Africa, South Africa ABSTRACT Cant and Ligthelm

More information

CURRICULUM VITA MATTHEW C. JOHNSON

CURRICULUM VITA MATTHEW C. JOHNSON 1 CURRICULUM VITA MATTHEW C. JOHNSON Department of Criminal Justice East Carolina University 236 Rivers West Greenville, NC 27858 (252)737-2417 (Phone) johnsonmatt@ecu.edu Education Ph.D., August 2008:

More information

FACTORS INFLUENCING CONSUMER ETHICAL DECISION MAKING OF PURCHASING PIRATED SOFTWARE: STRUCTURAL EQUATION MODELING ON MALAYSIAN CONSUMER

FACTORS INFLUENCING CONSUMER ETHICAL DECISION MAKING OF PURCHASING PIRATED SOFTWARE: STRUCTURAL EQUATION MODELING ON MALAYSIAN CONSUMER FACTORS INFLUENCING CONSUMER ETHICAL DECISION MAKING OF PURCHASING PIRATED SOFTWARE: STRUCTURAL EQUATION MODELING ON MALAYSIAN CONSUMER Ahasanul Haque Faculty of Business Administration, International

More information

How To Study The Academic Performance Of An Mba

How To Study The Academic Performance Of An Mba Proceedings of the Annual Meeting of the American Statistical Association, August 5-9, 2001 WORK EXPERIENCE: DETERMINANT OF MBA ACADEMIC SUCCESS? Andrew Braunstein, Iona College Hagan School of Business,

More information

Performance appraisal politics and employee turnover intention

Performance appraisal politics and employee turnover intention Performance appraisal politics and employee turnover intention Rusli Ahmad Camelia Lemba Faculty of Cognitive Sciences and Human Development Universiti Malaysia Sarawak arusli@fcs.unimas.my Wan Khairuzzaman

More information

Factors affecting bachelor s degree completion among Black males with prior attrition

Factors affecting bachelor s degree completion among Black males with prior attrition Factors affecting bachelor s degree completion among Black males with prior attrition ABSTRACT Rayna Matthews-Whetstone Richardson, Texas ISD Joyce A. Scott Texas A&M University-Commerce Black males lag

More information

Organizational Commitment among Public and Private School Teachers

Organizational Commitment among Public and Private School Teachers The International Journal of Indian Psychology ISSN 2348-5396 (e) ISSN: 2349-3429 (p) Volume 2, Issue 3, Paper ID: B00381V2I32015 http://www.ijip.in April to June 2015 ABSTRACT: Organizational Commitment

More information

Concepts. Economic psychology: from tax compliance and evading to psychological contract. Basic model of tax evasion. Economic theory of crime

Concepts. Economic psychology: from tax compliance and evading to psychological contract. Basic model of tax evasion. Economic theory of crime Economic psychology: from tax compliance and evading to psychological contract Velli Parts, MSc Concepts tax avoidance - an attempt to reduce tax payments by legal means (e.g. by exploiting taxloopholes)

More information

2.1 It is an offence under UK law to transmit, receive or store certain types of files.

2.1 It is an offence under UK law to transmit, receive or store certain types of files. Website Hosting Acceptable Use Policy 1. Introduction 1.1 Jarrett & Lam Consulting s Acceptable Use Policy for hosting customers to protect our resources, the resources of our customers and to ensure that

More information

The Effect of National Culture and Economic Wealth on Global Software Piracy Rates

The Effect of National Culture and Economic Wealth on Global Software Piracy Rates The Effect of National Culture and Economic Wealth on Global Software Piracy Rates Trevor T. Moores According to a recent survey on global software piracy [9], the Business Software Alliance estimated

More information

Identifying Requirements of Agricultural Mobile Marketing from Experts Perception

Identifying Requirements of Agricultural Mobile Marketing from Experts Perception , pp.113-118 http://dx.doi.org/10.14257/ijunesst.2014.7.1.11 Identifying Requirements of Agricultural Mobile Marketing from Experts Perception Maryam Omidi Najafabadi, Mahmood Ahmadi and Farhad Lashgarara

More information

The Effect of Flexible Learning Schedule on Online Learners Learning, Application, and Instructional Perception

The Effect of Flexible Learning Schedule on Online Learners Learning, Application, and Instructional Perception 1060 The Effect of Flexible Learning Schedule on Online Learners Learning, Application, and Instructional Perception Doo H. Lim University of Tennessee Learning style has been an important area of study

More information

e-pirates of the Digital Age Copyright Issues in Software and Music

e-pirates of the Digital Age Copyright Issues in Software and Music VEA Bringing Learning to Life Program Support Notes e-pirates of the Digital Age Copyright Issues in Software and Music Senior Secondary - TAFE 27mins Teacher Notes by Jorge Viega, B.Sci.(Chemical), Dip.Ed.,Associate

More information

Case 3:15-cv-02020-AC Document 1 Filed 10/27/15 Page 1 of 8

Case 3:15-cv-02020-AC Document 1 Filed 10/27/15 Page 1 of 8 Case 3:15-cv-02020-AC Document 1 Filed 10/27/15 Page 1 of 8 Carl D. Crowell, OSB No. 982049 email: carl@crowell-law.com Drew P. Taylor, OSB 135974 email: drew@crowell-law.com CROWELL LAW P.O. Box 923 Salem,

More information

So why is the head of a federal agency with jurisdiction over customs, immigration, and border crimes appearing at a

So why is the head of a federal agency with jurisdiction over customs, immigration, and border crimes appearing at a Remarks by Director John Morton U.S. Immigration and Customs Enforcement Department of Homeland Security State of the Net Conference Washington, D.C. January 18, 2011 Good morning, I am indeed John Morton,

More information

How To Collect Data From A Large Group

How To Collect Data From A Large Group Section 2: Ten Tools for Applying Sociology CHAPTER 2.6: DATA COLLECTION METHODS QUICK START: In this chapter, you will learn The basics of data collection methods. To know when to use quantitative and/or

More information

PEER-TO-PEER FILE SHARING POLICY

PEER-TO-PEER FILE SHARING POLICY 1.0 Overview The purpose of this Policy is to detail the University s plans to effectively combat the unauthorized distribution of copyrighted material by users of the Information Technology Resources,

More information

EDUCATION AND LAW ENFORCEMENT 1. Education and Law Enforcement: Final Version of Research Proposal. Ralphie Manzano

EDUCATION AND LAW ENFORCEMENT 1. Education and Law Enforcement: Final Version of Research Proposal. Ralphie Manzano EDUCATION AND LAW ENFORCEMENT 1 Education and Law Enforcement: Final Version of Research Proposal Ralphie Manzano University of South Florida, Sarasota-Manatee EDUCATION AND LAW ENFORCEMENT 2 Abstract

More information

DRINK DRIVING. Report 1. Offences finalised in the Magistrates Court of South Australia, 1995. Jayne Marshall

DRINK DRIVING. Report 1. Offences finalised in the Magistrates Court of South Australia, 1995. Jayne Marshall DRINK DRIVING Report 1 Offences finalised in the Magistrates Court of South Australia, 1995 by Jayne Marshall A report jointly funded by the South Australian Attorney General s Department and Transport

More information

INDIVIDUAL AND SOCIAL REASONS BEHIND SOFTWARE PIRACY: AN ANALYSIS OF PREVIOUS STUDIES

INDIVIDUAL AND SOCIAL REASONS BEHIND SOFTWARE PIRACY: AN ANALYSIS OF PREVIOUS STUDIES INDIVIDUAL AND SOCIAL REASONS BEHIND SOFTWARE PIRACY: AN ANALYSIS OF PREVIOUS STUDIES Daha Önce Yapılmış Çalışmalar Işığında Korsan Yazılım Kullanımının Bireysel ve Sosyal Nedenleri Musa Karakaya* Bülent

More information

The Effect of Questionnaire Cover Design in Mail Surveys

The Effect of Questionnaire Cover Design in Mail Surveys The Effect of Questionnaire Cover Design in Mail Surveys Philip Gendall It has been suggested that the response rate for a self administered questionnaire will be enhanced if the cover of the questionnaire

More information

Personal Financial Knowledge and Attitude towards Credit Card Practices among Working Adults in Malaysia

Personal Financial Knowledge and Attitude towards Credit Card Practices among Working Adults in Malaysia International Journal of Business and Social Science Vol. 3 No. 7; April 2012 Personal Financial Knowledge and Attitude towards Credit Card Practices among Working Adults in Malaysia Zuroni Md Jusoh Lim

More information

Professional development online: Ethics education for accountants and business managers

Professional development online: Ethics education for accountants and business managers Professional development online: Ethics education for accountants and business managers Josie Fisher and Cathryn McCormack University of New England The teaching of business ethics is well-documented in

More information

Trust and Risk in Purchase Intention through Online Social Network: A Focus Group Study of Facebook in Thailand

Trust and Risk in Purchase Intention through Online Social Network: A Focus Group Study of Facebook in Thailand Trust and Risk in Purchase Intention through Online Social Network: A Focus Group Study of Facebook in Thailand A. Leeraphong and A. Mardjo Abstract Objectives: Doing business through online social network

More information

Facilitators and Inhibitors for Deploying Businessto-Business E-Commerce Applications: A Multi- Method, Cross-Cultural Study

Facilitators and Inhibitors for Deploying Businessto-Business E-Commerce Applications: A Multi- Method, Cross-Cultural Study Association for Information Systems AIS Electronic Library (AISeL) ICIS 2001 Proceedings International Conference on Information Systems (ICIS) 12-31-2001 Facilitators and Inhibitors for Deploying Businessto-Business

More information

VIEWS OF STUDENTS IN THE DEPARTMENT OF RECREATION AND SPORT MANAGEMENT ON DISTANCE EDUCATION

VIEWS OF STUDENTS IN THE DEPARTMENT OF RECREATION AND SPORT MANAGEMENT ON DISTANCE EDUCATION VIEWS OF STUDENTS IN THE DEPARTMENT OF RECREATION AND SPORT MANAGEMENT ON DISTANCE EDUCATION Asst.Prof.Dr.Gülten Hergüner Sakarya University Physical Education and Sports Teaching Department herguner@sakarya.edu.tr

More information

Comparing Blogs, Wikis, and Discussion Boards. as Collaborative Learning Tools

Comparing Blogs, Wikis, and Discussion Boards. as Collaborative Learning Tools Collaborative Learning Tools 1 Running head: Collaborative Learning Tools Comparing Blogs, Wikis, and Discussion Boards as Collaborative Learning Tools Susan L Connell San Diego State University Collaborative

More information

Public perceptions and information gaps in solar energy in Texas

Public perceptions and information gaps in solar energy in Texas SUPPLEMENTAL INFORMATION Public perceptions and information gaps in solar energy in Texas Varun Rai* 1,2 and Ariane L Beck 1 1 LBJ School of Public Affairs, The University of Texas at Austin, Austin, Texas,

More information

Developing and Validating Customer Relationship Management (CRM) Practices Construct

Developing and Validating Customer Relationship Management (CRM) Practices Construct International Journal of Business and Behavioral Sciences Vol., No.; January 0 Developing and Validating Customer Relationship Management (CRM) Practices Construct Zuliana Zulkifli, *Izah Mohd Tahir Faculty

More information

How To Promote Academic Integrity At St.Petersburg College

How To Promote Academic Integrity At St.Petersburg College 1 Toward Enhancing a Culture of Academic Integrity at St. Petersburg Community College by Dustin Gray Guinta 2 Introduction In 2007, due to evidence of a cheating scandal at St. Petersburg College, President

More information