2
Views
4
CrossRef citations to date
0
Altmetric
Articles

Knowledge and Attitudes of Management Students toward Software Piracy

, &
Pages 46-51 | Published online: 01 Feb 2016

References

  • Buckeley, W.M. “Software Makers are Pursuing Pirates Around the Globe with Fleets of Lawyers,” Wall Street Journal, December 13, 1990, pp. B1 & B4.
  • Cohen, E. and L. Cornwell. “College Students Believe Piracy is Acceptable,” CIS Educator Forum, March 1989, pp. 2–5.
  • Conner, K.R. and R.P. Rumelt. “Software Piracy: An Analysis of Protection Strategies,” Management Science, 37:2, February 1991, pp. 125–139.
  • Friedman, H.H. and L.W. Friedman. “Myths, Unethical Practices, Personnel Requirements: What Do Computer Industry Professionals Really Believe?,” Journal of Systems and Software, 10:2, September 1989, pp. 151–153.
  • Goldstein, P. “Intellectual Property Rights in an Age of Electronics and Information,” U.S. Government Printing Office, (Office of Technology Assessment), Washington, DC, April 1986.
  • Helm, V.M. “Software Quality and Copyright: Issues in Computer-aided Instruction,” Association for Educational Communications and Technology, Washington, DC, 1984.
  • Lee, S.M. and J.P. Shim. “A Note on Microcomputer Applications in Decision Sciences,” Interfaces, 14:3, 1984, pp. 22–27.
  • Mason, J. “Crackdown on Software Pirates,” Computerworld, February 5, 1990, pp. 107–115.
  • Parker, R. “Publishers Take on Software Piracy in Academia,” Infoworld, October 19, 1987, p. 49.
  • Paulhus, D.L. “Measurement and Control of Response Bias,” in Robinson, Shaver, and Wrightsman (eds.), Measures of Social-Psychological Attitudes, Academic Press, 1990.
  • Randall, D.M. and A.M. Gibson. “Methodology in Business Ethics Research: A Review and Critical Assessment,” Journal of Business Ethics, 9:6, 1990, pp. 457–471.
  • Render, B. and R.M. Stair. “Microcomputer Technology in Schools of Business,” Interfaces, 17:5, 1987, pp. 92–102.
  • Solomon, S.L. and J.A. O'Brien. “The Effects of Demographic Factors on Attitudes Toward Software Piracy,” The Journal of Computer Information Systems, Spring 1990, pp. 40–46.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.