138
Views
18
CrossRef citations to date
0
Altmetric
Original Articles

Attitudes to and factors affecting unauthorized copying of computer software in Finland

&
Pages 249-257 | Published online: 03 Feb 2007

References

References

  • Brady , FN and Wheeler , GE . 1996 . An Empirical Study of Ethical Predispositions . Journal of Business Ethics , 15 : pp. 927 – 40
  • Cheng , HK , Sims , RR and Teegen , H . 1997 . To purchase or to pirate software: an empirical study . Journal of Management Information Systems , 13 : pp. 49 – 51
  • Conner , KR and Rumelt , RP . 1991 . Software Piracy: an analysis of protection strategies . Management Science , 37 : pp. 125 – 39
  • Dakin , K . 1997 . What if there were no software piracy? . IEEE Software , 14 : pp. 20 – 21
  • Davidson D 1971 How is weakness of will possible In Weakness of Will, G. Mortimore (Ed.), (London: Macmillan)
  • Gilligan C 1982 In a Different Voice: Psychological Theory and Women's Development (Cambridge, MA: Harward University Press)
  • Glass , RS and Wood , WA . 1996 . Situational determinants of software piracy: an equity theory perspective . Journal of Business Ethics , 15 : pp. 1189 – 198
  • Gopal , RD and Sanders , GL . 1997 . Preventive and deterrent controls for software piracy . Journal of Management Information Systems , 14 : pp. 29 – 47
  • Gopal , RD and Sanders , GL . 1998 . International software piracy: analysis of key issues and impacts . Information Systems Research , 9 : pp. 380 – 95
  • Gopal , RD and Sanders , L . 2000 . Global software piracy: you can't get blood out of a turnip . Commun. ACM , September, 43
  • Grow GB 1989 Defining educational policy on software usage in light of copyright law Proceedings of the twentieth SIGCSE technical symposium on Computer Science Education pp. 47 – 51
  • Hare RM 1963 Freedom and Reason (Oxford: Oxford University Press)
  • Horsburgh HJN 1971 The criteria of assent a moral rule In Weakness of Will, G. Mortimore (Ed.), (London: Macmillan)
  • Johnson DG 2000 Computer Ethics 3rd Edn, (Upper Saddle River, New Jersey, USA: Prentice Hall)
  • Kallman E Grillo J 1993 Ethical Decision Making and Information Technology (New York, US: McGraw-Hill)
  • Kreie , J and Cronan , TP . 1998 . How men and women view ethics . Communications of ACM , September, 41
  • Ladd , J . 1997 . Ethics and the computer world: a new challenge for philosophers . Computers & Society , 27 : pp. 8 – 13
  • Limayem M Khalifa M Wynne WC 1999 Factors motivating software piracy: a longitudinal study Proceedings of the 20th international conference on Information Systems pp. 124 – 31
  • Lending D Slaughter SA 1999 Understanding differences in ethical beliefs and behaviors toward software copying: the effects of organization culture Proceedings of the 1999 ACM SIGCPR conference on Computer personnel research pp. 253 – 260
  • Leonard , LNK and Cronan , TP . 2001 . Illegal, inappropriate, and unethical behavior in an information technology . Journal of Association for Information Systems , 1
  • Lin TC Hsu MH Kuo FY Sun P-C 1999 An intention model-based study of software piracy Proceedings of the 32nd Annual Hawaii International Conference on Systems Sciences
  • Lukes S 1971 Moral weakness In Weakness of Will, G. Mortimore (Ed.), (London: Macmillan)
  • Moor , JH . 1985 . What is computer ethics? . Metaphilosophy , 16 : pp. 266 – 75
  • Moores T Dhillon G 2000 Software piracy: a view from Hong Kong Communications of the ACM 43 December pp. 88 – 93
  • Nissenbaum H 1995 Should I copy my neighbours' software In Computers, Ethics & Social Values, D.G. Johnson and H. Nissenbaum (Eds), (New Jersey, US: Prentice Hall)
  • Prior , M , Rogerson , S and Fairweather , B . 2002 . The ethical attitudes of information systems professionals: outcomes of an initial survey . Telematics and Informatics , 19 : pp. 21 – 36
  • Seale , DA , Polakowski , M and Schneider , S . 1998 . It's not really theft: personal and workplace ethics that enable software piracy . Behaviour and Information Technology , 17 : pp. 27 – 40
  • Sidgwick H 1893 Unreasonable action Mind 2
  • Simpson , PM , Banerjee , D and Simpson , CL . 1994 . Softlifting: a model of motivating factors . Journal of Business Ethics , 13 : p. 431
  • Siponen , MT . 2001 . The relevance of software rights: an anthology of the divergence of sociopolitical doctrines . AI & Society , 15 : pp. 128 – 48
  • Solomon SL O'Brien JA 1991 The effect of demographic factors on attitudes towards software piracy In Ethical Issues in Information Systems, R. Dejoie, G. Fowler and D. Paradice (Eds), pp. 168 – 81, (MA, USA: Boyd & Fraser)
  • Stallman R 1995 Why software should be free In Computers, Ethics & Social Values, D.G. Johnson and H. Nissenbaum (Eds), (New Jersey, USA: Prentice Hall)
  • Stallman R 1997 The GNU Manifesto In Computers, Ethics and Society, M. D. Ermann, M. B. Williams and M. S. Shauf (Eds), 2nd Edn, (Oxford: Oxford University Press)
  • Taylor , GS and Shim , JPA . 1993 . Comparative examination of attitudes towards piracy among business professors and executives . Human Relations , 46 : pp. 419 – 33
  • Thong JYL Yap C-S 1998 Testing an ethical decision-making theory: the case of softlifting, Journal of Management Information Systems 15 pp. 213 – 37
  • Traphagan , M and Griffith , A . 1998 . Software piracy and global competitiveness: report on global software piracy . International Review of Law, Computers & Technology , 12 : pp. 431 – 51
  • Weckert J 1997 Intellectual property rights and computer software Business Ethics 6 April
  • Weckert J Adeney D 1997 Computer and Information Ethics (Westport, Connecticut: Greenwook Press)
  • Weisband , SP and Goodman , SE . 1992 . International software piracy . IEEE Computer , 25 : pp. 87 – 90

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.