404
Views
10
CrossRef citations to date
0
Altmetric
Original Articles

The Roles of Awareness, Sanctions, and Ethics in Software Compliance

&

REFERENCES

  • Ajzen I. 1991. The theory of planned behavior. Organ. Behav. Hum. Decis. Process. 50:179–211.
  • Ajzen I, Albarracin D. 2007. Chapter 1: predicting and changing behavior: a reasoned action approach. In Prediction and change of health behavior: applying the reasoned action approach, Ajzen I, Albarracin D, Hornik R (Eds.), Hillsdale, NJ: Lawrence Erlbaum & Associates, 3–21.
  • Baron RM, Kenny DA. 1986. The moderator-mediator variable distinction in social psychological research – conceptual, strategic, and statistical considerations. J. Pers. Soc. Psychol. (51:6):1173–1182.
  • BSA. 2010. Seventh annual BSA and IDC global software piracy study. Business Software Alliance: http://portal.bsa.org/globalpiracy2009/index.html.
  • BSA. 2011. Piracy study. Business Software Alliance: http://portal.bsa.org/globalpiracy2011/, 2011.
  • Bulgurcu B, Cavusoglu H, Benbasat I. 2010. Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness. MIS Q. 34(3):523–548.
  • Chin WW. 1998. The partial least squares approach for structural equation modeling. In Marcoulides GA (Ed.), Modern methods for business research. Mahwah, NJ: Lawrence Erlbaum Associates, 295–336
  • Cohen J. 1992. A power primer. Psychol. Bull. (112:1):155–159.
  • Dinev T, Hu Q. 2007 The centrality of awareness in the formation of user behavioral intentions towards preventive technologies in the context of voluntary use. J. Assoc. Inf. Syst. (8:7):386–408.
  • Finegan J. 2000. The impact of person and organizational values on organizational commitment. J. Occup. Organ. Psychol. (73:2):149–169.
  • Fishbein, M, Ajzen I. 1975. Belief, attitude, intention and behavior: an introduction to theory and research. Reading, MA: Addison-Wesley.
  • Fornell C, Larcker DF. 1981. Evaluating structural equation models with unobservable variables and measurement error. J. Marketing Res. 18(1):39–50.
  • Gefen D, Straub DW, Boudreau M-C. 2000. Structural equation modeling and regression: guidelines for research practice. Commun. Assoc. Inf. Syst. 4:1–77.
  • Gefen, D. Straub D. 2005. A practical guide to factorial validity using PLS-graph: tutorial and annotated example. Commun. AIS 16:91–109.
  • Hair J, Hult G, Ringle C, Sarstedt M. 2014. A primer on partial least squares structural equation modeling (PLS-SEM). Washington, DC: Sage.
  • Hartwick J, Barki H. 1994. Explaining the role of user participation in information systemuse. Manage. Sci. (40:4):440–465.
  • Henseler J, Ringle C, Sarstedt M. 2014. A new criterion for assessing discriminant validity in variance-based structural equation modeling. J. Acad. Marketing Sci. online publication www.Springerlink.com.
  • Karahanna E, Straub DW, Chervany N. 1999. Information technology adoption across time: a cross-sectional comparison of pre-adoption and post-adoption beliefs. MIS Q. (23:2):183–213.
  • Liao C, Lin H-N, Liu Y-P. 2010. predicting the use of pirated software: a contingency model integrating perceived risk with the theory of planned behavior. J. Bus. Ethics (91:2):237–252.
  • McCabe D, Trevino L, Butterfield K. 1996. The influence of collegiate and corporate codes of conduct on ethics-related behavior in the workplace. Bus. Ethics Q. (6:4):461–476.
  • Moores TT, Chang JC-J. 2006. Ethical decision making in software piracy initial development and test of a four-component model. MIS Q. 30(1):167–180.
  • Moores T, Dhillon G. 2000. Software piracy: a view from hong kong. Commun. ACM 43(12):88–93.
  • Moores TT, Nill A, Rothenberger MA. 2009. Knowledge of software piracy as an antecedent to reducing pirating behavior. J. Comput. Inf. Syst. 50(1):82–89.
  • Nill A, Schibrowsky J, Peltier JW. 2010. Factors that influence software piracy: a view from Germany. Commun. ACM 53(6):131–134.
  • Nunnally J. 1978. Psychometric theory (2nd ed.). New York, NY: McGraw-Hill.
  • Palmer I. 2004. Are you on top of your software licensing? Financial Executive Jun 1; 47–49.
  • Peace GA, Galletta DF, Thong JY. 2003. Software piracy in the workplace: a model and empirical test. J. Manag. Inf. Syst. 20(1):153–177.
  • Podsakoff P, MacKenzie S, Lee J, Podsakoff N. 2003. Common method biases in behavioral research: a critical review of the literature and recommended remedies. J. Appl. Psychol. (88:5):879–903.
  • Ringle C, Wende S, Will A. 2005. SmartPLS 2.0 (beta). Hamburg, Germany.
  • Rogers RW. 1975. A protection motivation theory of fear appeals and attitude change. J. Psychol. 91(1):93–114.
  • Rogers RW. 1983. Cognitive and psychological processes in fear appeals and attitude change: a revised theory of protection motivation. In Cacioppo J, Petty R (Eds.), Social psychology. New York: Guilford Press.
  • Rogers E. 2003. Diffusion of innovations. New York: Free Press.
  • Taylor S, Todd P. 1995. Understanding information technology usage: a test ofcompeting models. Inf. Syst. Res. (6:2):144–176.
  • Thong JY, Yap C-S. 1998. Testing an ethical decision-making theory: the case of softlifting. J. Manage. Inf. Syst. 15(1):213–237.
  • Tittle C. 1980. Sanctions and social deviance: the question of deterrence. New York: Praeger.
  • Torres R, Johnson V, Imhonde B. 2014. The impact of content type and availability on ebook reader adoption. J. Comput. Inf. Syst. (in press).
  • Valentine S, Barnett T. 2003. Ethics code awareness, perceived ethical values, and organizational commitment. J. Pers. Selling Sales Manage. 23(4):359–367.
  • Van der Velde F, Van der Plight J. 1991. AIDS-related health behavior: coping, protection, motivation, and previous behavior. J. Behav. Med. 14(5):429–451.
  • Vance A, Siponen M, Pahnila S. 2012. Motivating IS security compliance: insights from habit and protection motivation theory. Inf. Manage. 49:190–198.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.