72
Views
0
CrossRef citations to date
0
Altmetric
Research Article

Identifying Interdisciplinary Intersections Through Analytics: Software Piracy Case

, &

References

  • Agarwal R, Dhar V. Big data, data science, and analytics: The opportunity and challenge for IS research. Inf Syst Res. 2014;25(3):443–448. doi:10.1287/isre.2014.0546.
  • Nunamaker JF, Twyman NW, Giboney JS, Briggs RO. Creating high-value real-world impact through systematic programs of research. MIS Q. 2017;41(2):335–51. doi:10.25300/MISQ/2017/41.2.01.
  • Tarafdar M, Davison RM. Research in information systems: intra-disciplinary and inter-disciplinary approaches. J Assoc Inf Syst. 2018;19(6):2. doi:10.17705/1jais.00500.
  • Özköse H, Ozyurt O, Ayaz A. Management information systems research: a topic modeling based bibliometric analysis. J Comput Inf Syst. 2022;63(5):1–17. doi:10.1080/08874417.2022.2132429.
  • Chavarria JA, Andoh-Baidoo FK, Midha V, Hughes J. Software piracy research: a cross-disciplinary systematic review. Commun Assoc Inf Syst. 2016;38:624–69. doi:10.17705/1CAIS.03831.
  • Wu L-C, Wu L-H. Service engineering: an interdisciplinary framework. J Comput Inf Syst. 2010;51:14–23.
  • Pratt JA, Chen L, Kishel HF, Nahm AY. Information systems and operations/supply chain management: a systematic literature review. J Comput Inf Syst. 2023;63(2):334–50. doi:10.1080/08874417.2022.2065649.
  • Oh W, Choi JN, Kim K. Coauthorship dynamics and knowledge capital: the patterns of cross-disciplinary collaboration in information systems research. J Manage Inf Syst. 2005;22(3):266–92. doi:10.2753/MIS0742-1222220309.
  • Pratt JA, Hauser K, Sugimoto CR. Cross-disciplinary communities or knowledge islands: examining business disciplines. J Comput Inf Syst. 2012;53:9–21.
  • Jiang LA, Zhu N, Yang Z, Xu S, Jun M. The relationships between distance factors and international collaborative research outcomes: a bibliometric examination. J Informetr. 2018;12(3):618–30. doi:10.1016/j.joi.2018.04.004.
  • McDermott R, Hatemi PK. Emerging models of collaboration in political science: changes, benefits, and challenges. PS Polit Sci Polit. 2010;43(1):49–58. doi:10.1017/S1049096510990811.
  • Roschelle J, Teasley SD. The construction of shared knowledge in collaborative problem solving. In: O’Malley C, editor. Computer supported collaborative learning. Vol. 128. Berlin (Heidelberg): Springer; 1995. p. 69–97. doi:10.1007/978-3-642-85098-1_5.
  • Chiu C-M, Hsu M-H, Wang ET. Understanding knowledge sharing in virtual communities: an integration of social capital and social cognitive theories. Decis Support Syst. 2006;42(3):1872–88. doi:10.1016/j.dss.2006.04.001.
  • Wasko MM, Faraj S. Why should I share? Examining social capital and knowledge contribution in electronic networks of practice. MIS Q. 2005;29(1):35. doi:10.2307/25148667.
  • O’Sullivan PS, Stoddard HA, Kalishman S. Collaborative research in medical education: a discussion of theory and practice. Med Edu. 2010;44(12):1175–84. doi:10.1111/j.1365-2923.2010.03768.x.
  • Baker KS, Jackson SJ, Wanetick JR, editors. Strategies supporting heterogeneous data and interdisciplinary collaboration: towards an ocean informatics environment. In: Proceedings of the 38th Annual Hawaii International Conference on System Sciences. Big Island (HI, USA): IEEE; 2005. p. 219b–219b. doi:10.1109/HICSS.2005.565.
  • Holsapple CW, Iyengar D, Jin H, Rao S. Parameters for software piracy research. Inf Soc. 2008;24(4):199–218. doi:10.1080/01972240802189468.
  • Siponen MT, Vartiainen T. Unauthorized copying of software and levels of moral development: a literature analysis and its implications for research and practice. Inform Syst J. 2004;14(4):387–407. doi:10.1111/j.1365-2575.2004.00179.x.
  • Liang Z, Yan Z. Software piracy among college students: a comprehensive review of contributing factors, underlying processes, and tackling strategies. J Educ Comput Res. 2005;33(2):115–40. doi:10.2190/8M5U-HPQK-F2N5-B574.
  • Ou S, Khoo C-G, Goh DH. Design and development of a concept-based multi-document summarization system for research abstracts. J Inf Sci. 2008;34(3):308–26. doi:10.1177/0165551507084630.
  • Dunne C, Shneiderman B, Gove R, Klavans J, Dorr B. Rapid understanding of scientific paper collections: integrating statistics, text analytics, and visualization. J Am Soc Inf Sci Technol. 2012;63(12):2351–69. doi:10.1002/asi.22652.
  • Joorabchi A, Mahdi AE. An unsupervised approach to automatic classification of scientific literature utilizing bibliographic metadata. J Inf Sci. 2011;37(5):499–514. doi:10.1177/0165551511417785.
  • Kimbrough SO, Chou C, Chen Y-T, Lin H. On developing indicators with text analytics: exploring concept vectors applied to English and Chinese texts. Inf Syst E-Bus Manag. 2014;12(3):385–415. doi:10.1007/s10257-013-0228-x.
  • Pennebaker JW, Mehl MR, Niederhoffer KG. Psychological aspects of natural language use: our words, our selves. Ann Rev Psychol. 2003;54(1):547–77. doi:10.1146/annurev.psych.54.101601.145041.
  • August T, Tunca TI. Let the pirates patch? An economic analysis of software security patch restrictions. Inf Syst Res. 2008;19(1):48–70. doi:10.1287/isre.1070.0142.
  • Leung TC. What is the true loss due to piracy? Evidence from Microsoft Office in Hong Kong. Rev Econ Stat. 2013;95(3):1018–29. doi:10.1162/REST_a_00290.
  • Higgins GT. Can low self control help with the understanding of the software piracy problem? Deviant Behav. 2005;26:1–24. doi:10.1080/01639620490497947.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.