References
- Ajzen , I. 1985 . “ From intentions to actions: a theory of planned behavior ” . In Action control: from cognition to behavior , Edited by: Kuhl , J. and Beckman , J. 11 – 39 . New York : Springer Verlag .
- Ajzen , I. 1991 . The theory of planned behavior . Organizational Behavior and Human Decision Processes , 50 ( 2 ) : 179 – 211 . (doi:10.1016/0749-5978(91)90020-T)
- Ajzen , I. and Fishbein , M. 1980 . Understanding attitudes andpredicting social behavior , Englewood Cliffs , NJ : Prentice-Hall .
- Anderson , N. 2008 . Oops: MPAA admits college piracy numbers grossly inflated Arstechnica new report. Available from: http://arstechnica.com/news.ars/post/20080122-oops-MPAA-admits-college-piracy-numbers-grossly-inflated.html [Accessed 3 November 2008]
- Bandura , A. 1982 . Self-efficacy mechanism in human agency . American Psychologist , 37 : 122 – 147 . (doi:10.1037/0003-066X.37.2.122)
- Bandura , A. 1991 . “ Social cognitive theory of moral thought and action ” . In Handbook of moral behavior and development , Edited by: Dienstbier , R. A. Vol. 1 , 45 – 104 . Lincoln, Nebraska : University of Nebraska Press .
- Bhattacharjee , S. 2006 . Impact of legal threats on online music sharing activity: an analysis of music industry legal actions . The Journal of Law and Economics , 49 ( 1 ) : 91 – 114 . (doi:10.1086/501085)
- Bhattacharjee , S. , Gopal , R. D. and Sanders , G. L. 2003 . Digital music and online sharing: software piracy 2.0? . Communications of the ACM , 46 ( 7 ) : 107 – 111 . (doi:10.1145/792704.792707)
- d'Astous , A. , Colbert , F. and Montpetit , D. 2005 . Music piracy on the Web – how effective are anti-piracy arguments? Evidence from the theory of planned behaviour . Journal of Consumer Policy , 28 ( 3 ) : 289 – 310 . (doi:10.1007/s10603-005-8489-5)
- Davis , F. D. 1989 . Perceived usefulness, perceived ease of use, and user acceptance of information technology . Management Information Systems Quarterly , 13 ( 3 ) : 319 – 340 . (doi:10.2307/249008)
- Davis , F. D. 1993 . User acceptance of information technology: system characteristics, user perceptions and behavioral impacts . International Journal of Man-Machine Studies , 38 ( 3 ) : 475 – 487 . (doi:10.1006/imms.1993.1022)
- Dejean , S. , Pénard , T. and Suire , R. 2010 . Une première évaluation des effets de la loi Hadopi sur les pratiques des Internautes français University of Rennes report. Retrieved December 18, 2010. Available from: http://www.marsouin.org/IMG/pdf/NoteHadopix.pdf
- Faulhaber , G. R. 2006 . File sharing, copyright, and the optimal production of music . Michigan Telecommunications and Technology Law Review , 13 : 77
- Fishbein , M. and Ajzen , I. 1975 . Belief, attitude, intention and behavior: an introduction to theory and research , Reading, MA : Addison-Wesley .
- Francis , J. J. 2004 . “ Constructing questionnaires based on the theory of planned behaviour ” . In A manual for health services researchers , Newcastle upon Tyne : Centre of Health Services Research, University of Newcastle upon Tyne .
- Gayer , A. and Shy , O. 2006 . Publishers, artists, and copyright enforcement . Information Economics and Policy , 18 ( 4 ) : 374 – 384 . (doi:10.1016/j.infoecopol.2006.03.003)
- Ghosemajumder , S. 2002 . Advanced peer-based technology business models [online] Sloan School of Management Working Paper, Cambridge, MA. Available from: http://shumans.com/p2p-business-models.pdf [Accessed 12 December 2010]
- Gopal , R. D. 2004 . A behavioral model of digital music piracy . Journal of Organizational Computing and Electronic Commerce , 14 ( 2 ) : 89 – 105 . (doi:10.1207/s15327744joce1402_01)
- Guevin , J. 2008 . FCC set to punish Comcast on P2P blocking CNET News. Available from: http://news.cnet.com/8301-1023_3-10000352-93.html [Accessed 20 July 2010]
- Hughes , J. , Lang , K. R. and Vragov , R. 2008 . An analytical framework for evaluating peer-to-peer business models . Electronic Commerce Research and Applications , 7 ( 1 ) : 105 – 118 . (doi:10.1016/j.elerap.2007.01.001)
- Hung , S. Y. and Chang , C. M. 2005 . User acceptance of WAP services: test of competing theories . Computer Standards & Interfaces , 27 ( 4 ) : 359 – 370 . (doi:10.1016/j.csi.2004.10.004)
- Konstantakis , N. 2010 . What do computer science students think about software piracy? . Behaviour and Information Technology , 29 ( 3 ) : 277 – 285 . (doi:10.1080/01449290902765076)
- LaRose , R. and Kim , J. 2007 . Share, steal, or buy? A social cognitive perspective of music downloading . Cyberpsychology, Behavior, and Social Networking , 10 ( 2 ) : 267 – 277 .
- LaRose , R. 2005 . Sharing or piracy? An exploration of downloading behavior . Journal of Computer Mediated Communication , 11 ( 1 ) : 1 – 21 . (doi:10.1111/j.1083-6101.2006.tb00301.x)
- Legris , P. , Ingham , J. and Collerette , P. 2003 . Why do people use information technology? A critical review of the technology acceptance model . Information & Management , 40 ( 3 ) : 191 – 204 . (doi:10.1016/S0378-7206(01)00143-4)
- Liang , J. 2005 . Pollution in P2P file sharing systems . In: Proceedings of the 24th annual joint conference of the IEEE computer and communications societies, Miami, FL. IEEE International Conference on Computer Communications (IEEE INFOCOM) , 2 : 1174 – 1185 .
- Lu , Y. , Deng , Z. and Wang , B. 2010 . Exploring factors affecting Chinese consumers’ usage of short message service for personal communication . Information Systems Journal , 20 ( 2 ) : 183 – 208 . (doi:10.1111/j.1365-2575.2008.00312.x)
- Madden , T. J. , Ellen , P. S. and Ajzen , I. 1992 . A comparison of the theory of planned behavior and the theory of reasoned action . Personality and Social Psychology Bulletin , 18 ( 1 ) : 3 – 9 . (doi:10.1177/0146167292181001)
- Mathieson , K. 1991 . Predicting user intentions: comparing the technology acceptance model with the theory of planned behavior . Information Systems Research , 2 ( 3 ) : 173 – 191 . (doi:10.1287/isre.2.3.173)
- Mathieson , K. and Keil , M. 1998 . Beyond the interface: ease of use and task/technology fit . Information & Management , 34 ( 4 ) : 221 – 230 . (doi:10.1016/S0378-7206(98)00058-5)
- Morton , N. and Koufteros , X. 2008 . Intention to commit online music piracy and its antecedents: an empirical investigation . Structural Equation Modeling , 15 : 491 – 512 . (doi:10.1080/10705510802154331)
- Multimedia Intelligence, Inc. 2008 . P2P: content's “bad boy”; Tomorrow's Distribution Channel Marketing Research Report. Available from: http://multimediaintelligence.com/index.php?option=com_content&view=article&id=133:p2p-traffic-to-grow-almost-400-over-the-next-5-years-as-legitimate-p2p-applications-become-a-meaningful-segment&catid=36:frontage&Itemid=215 [Accessed 2 December 2010]
- NPD Group . 2008 . Decline in U.S. CD sales drives down overall music demand by 2 percent in third quarter of 2008 NPD Report. Available from: http://www.npd.com/press/releases/press_081218.html [Accessed 10 December 2010]
- Oberholzer-Gee , F. and Strumpf , K. 2007 . The effect of file sharing on record sales: an empirical analysis . Journal of Political Economy , 115 ( 1 ) : 1 – 42 . (doi:10.1086/511995)
- Peoples , G. 2009 . Study: 86% would pay for legal P2P Billboard.biz. Available from: http://www.billboard.biz/bbbiz/content_display/industry/e3i4fc650632bff09ac1c703fa11ae848c8 [Accessed 5 December 2010]
- Sandvine Inc. 2010 . Global Broadband Phenomena 2010 Sandvine Intelligent Broadband Networks Report. Available from: http://www.sandvine.com/downloads/documents/2010%20Global%20Internet%20Phenomena%20Report.pdf [Accessed 7 December 2010]
- Shang , R. A. , Chen , Y. C. and Chen , P. C. 2008 . Ethical decisions about sharing music files in the P2P environment . Journal of Business Ethics , 80 : 349 – 365 . (doi:10.1007/s10551-007-9424-2)
- Simpson , P. 2009 . Anti-piracy law has little effect on internet use. The Local Sweden's news in English Available from: http://www.thelocal.se/25868/20100401/ [Accessed 8 December 2010]
- Sinha , R. K. 2010 . Digital rights management or discard restrictions on music? Don't think twice, it's all right: music piracy and pricing in a DRM-free environment . Journal of Marketing , 74 ( 2 ) : 40 – 54 . (doi:10.1509/jmkg.74.2.40)
- Taylor , S. , Ishida , C. and Wallace , D. 2009 . Intention to engage in digital piracy: a conceptual model and empirical test . Journal of Service Research , 11 ( 3 ) : 246 (doi:10.1177/1094670508328924)
- Taylor , S. and Todd , P. A. 1995 . Understanding information technology usage: a test of competing models . Information Systems Research , 6 ( 2 ) : 144 – 176 . (doi:10.1287/isre.6.2.144)
- Teo , T. S.H. and Pok , S. H. 2003 . Adoption of WAP-enabled mobile phones among Internet users . Omega , 31 ( 6 ) : 483 – 498 . (doi:10.1016/j.omega.2003.08.005)
- USA Today . 2003 . Elderly man, schoolgirl, professor among file-swapping defendants Available from: http://www.usatoday.com/tech/news/techpolicy/2003-09-09-riaa-defendants_x.htm [Accessed 9 December 2009]
- Vijayasarathy , L. R. 2004 . Predicting consumer intentions to use on-line shopping: the case for an augmented technology acceptance model . Information & Management , 41 ( 6 ) : 747 – 762 . (doi:10.1016/j.im.2003.08.011)
- Xu , H. 2009 . “ Trust in the social computing: the case of peer-to-peer (P2P) file sharing networks ” . In Proceedings of the Americas Conference on Information Systems (AMCIS) San Francisco, CA
- Yi , M. Y. 2006 . Understanding information technology acceptance by individual professionals: toward an integrative view . Information & Management , 43 ( 3 ) : 350 – 363 . (doi:10.1016/j.im.2005.08.006)