REFERENCES
- Ajzen I. 1991. The theory of planned behavior. Organ. Behav. Hum. Decis. Process. 50:179–211.
- Ajzen I, Albarracin D. 2007. Chapter 1: predicting and changing behavior: a reasoned action approach. In Prediction and change of health behavior: applying the reasoned action approach, Ajzen I, Albarracin D, Hornik R (Eds.), Hillsdale, NJ: Lawrence Erlbaum & Associates, 3–21.
- Baron RM, Kenny DA. 1986. The moderator-mediator variable distinction in social psychological research – conceptual, strategic, and statistical considerations. J. Pers. Soc. Psychol. (51:6):1173–1182.
- BSA. 2010. Seventh annual BSA and IDC global software piracy study. Business Software Alliance: http://portal.bsa.org/globalpiracy2009/index.html.
- BSA. 2011. Piracy study. Business Software Alliance: http://portal.bsa.org/globalpiracy2011/, 2011.
- Bulgurcu B, Cavusoglu H, Benbasat I. 2010. Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness. MIS Q. 34(3):523–548.
- Chin WW. 1998. The partial least squares approach for structural equation modeling. In Marcoulides GA (Ed.), Modern methods for business research. Mahwah, NJ: Lawrence Erlbaum Associates, 295–336
- Cohen J. 1992. A power primer. Psychol. Bull. (112:1):155–159.
- Dinev T, Hu Q. 2007 The centrality of awareness in the formation of user behavioral intentions towards preventive technologies in the context of voluntary use. J. Assoc. Inf. Syst. (8:7):386–408.
- Finegan J. 2000. The impact of person and organizational values on organizational commitment. J. Occup. Organ. Psychol. (73:2):149–169.
- Fishbein, M, Ajzen I. 1975. Belief, attitude, intention and behavior: an introduction to theory and research. Reading, MA: Addison-Wesley.
- Fornell C, Larcker DF. 1981. Evaluating structural equation models with unobservable variables and measurement error. J. Marketing Res. 18(1):39–50.
- Gefen D, Straub DW, Boudreau M-C. 2000. Structural equation modeling and regression: guidelines for research practice. Commun. Assoc. Inf. Syst. 4:1–77.
- Gefen, D. Straub D. 2005. A practical guide to factorial validity using PLS-graph: tutorial and annotated example. Commun. AIS 16:91–109.
- Hair J, Hult G, Ringle C, Sarstedt M. 2014. A primer on partial least squares structural equation modeling (PLS-SEM). Washington, DC: Sage.
- Hartwick J, Barki H. 1994. Explaining the role of user participation in information systemuse. Manage. Sci. (40:4):440–465.
- Henseler J, Ringle C, Sarstedt M. 2014. A new criterion for assessing discriminant validity in variance-based structural equation modeling. J. Acad. Marketing Sci. online publication www.Springerlink.com.
- Karahanna E, Straub DW, Chervany N. 1999. Information technology adoption across time: a cross-sectional comparison of pre-adoption and post-adoption beliefs. MIS Q. (23:2):183–213.
- Liao C, Lin H-N, Liu Y-P. 2010. predicting the use of pirated software: a contingency model integrating perceived risk with the theory of planned behavior. J. Bus. Ethics (91:2):237–252.
- McCabe D, Trevino L, Butterfield K. 1996. The influence of collegiate and corporate codes of conduct on ethics-related behavior in the workplace. Bus. Ethics Q. (6:4):461–476.
- Moores TT, Chang JC-J. 2006. Ethical decision making in software piracy initial development and test of a four-component model. MIS Q. 30(1):167–180.
- Moores T, Dhillon G. 2000. Software piracy: a view from hong kong. Commun. ACM 43(12):88–93.
- Moores TT, Nill A, Rothenberger MA. 2009. Knowledge of software piracy as an antecedent to reducing pirating behavior. J. Comput. Inf. Syst. 50(1):82–89.
- Nill A, Schibrowsky J, Peltier JW. 2010. Factors that influence software piracy: a view from Germany. Commun. ACM 53(6):131–134.
- Nunnally J. 1978. Psychometric theory (2nd ed.). New York, NY: McGraw-Hill.
- Palmer I. 2004. Are you on top of your software licensing? Financial Executive Jun 1; 47–49.
- Peace GA, Galletta DF, Thong JY. 2003. Software piracy in the workplace: a model and empirical test. J. Manag. Inf. Syst. 20(1):153–177.
- Podsakoff P, MacKenzie S, Lee J, Podsakoff N. 2003. Common method biases in behavioral research: a critical review of the literature and recommended remedies. J. Appl. Psychol. (88:5):879–903.
- Ringle C, Wende S, Will A. 2005. SmartPLS 2.0 (beta). Hamburg, Germany.
- Rogers RW. 1975. A protection motivation theory of fear appeals and attitude change. J. Psychol. 91(1):93–114.
- Rogers RW. 1983. Cognitive and psychological processes in fear appeals and attitude change: a revised theory of protection motivation. In Cacioppo J, Petty R (Eds.), Social psychology. New York: Guilford Press.
- Rogers E. 2003. Diffusion of innovations. New York: Free Press.
- Taylor S, Todd P. 1995. Understanding information technology usage: a test ofcompeting models. Inf. Syst. Res. (6:2):144–176.
- Thong JY, Yap C-S. 1998. Testing an ethical decision-making theory: the case of softlifting. J. Manage. Inf. Syst. 15(1):213–237.
- Tittle C. 1980. Sanctions and social deviance: the question of deterrence. New York: Praeger.
- Torres R, Johnson V, Imhonde B. 2014. The impact of content type and availability on ebook reader adoption. J. Comput. Inf. Syst. (in press).
- Valentine S, Barnett T. 2003. Ethics code awareness, perceived ethical values, and organizational commitment. J. Pers. Selling Sales Manage. 23(4):359–367.
- Van der Velde F, Van der Plight J. 1991. AIDS-related health behavior: coping, protection, motivation, and previous behavior. J. Behav. Med. 14(5):429–451.
- Vance A, Siponen M, Pahnila S. 2012. Motivating IS security compliance: insights from habit and protection motivation theory. Inf. Manage. 49:190–198.