[PDF][PDF] Explaining counterfeit purchases: A review and preview
M Eisend, P Schuchert-Güler - Academy of Marketing Science …, 2006 - researchgate.net
Counterfeiting has become an economic problem of international importance and has led to
a variety of countermeasures based on lawful, political, administrative, or business …
a variety of countermeasures based on lawful, political, administrative, or business …
Nature or nurture? A meta-analysis of the factors that maximize the prediction of digital piracy by using social cognitive theory as a framework
Digital piracy has permeated virtually every country and costs the global economy many
billions of dollars annually. Digital piracy is the unauthorized and illegal digital copying or …
billions of dollars annually. Digital piracy is the unauthorized and illegal digital copying or …
[图书][B] Management information systems: Managing the digital firm
KC Laudon, JP Laudon - 2004 - books.google.com
Information systems knowledge is essential for creating competitive firms, managing global
corporations, and providing useful products and services to customers. This book introduces …
corporations, and providing useful products and services to customers. This book introduces …
[图书][B] Sistemas de información gerencial
KC Laudon, JP Laudon, SC Alegre - 2012 - academia.edu
Escribimos este libro para los estudiantes de escuelas de negocios que requieren un
análisis detallado sobre la forma en que las empresas contemporáneas utilizan las …
análisis detallado sobre la forma en que las empresas contemporáneas utilizan las …
Software piracy in the workplace: A model and empirical test
AG Peace, DF Galletta, JYL Thong - Journal of Management …, 2003 - Taylor & Francis
Theft of software and other intellectual property has become one of the most visible
problems in computing today. This paper details the development and empirical validation of …
problems in computing today. This paper details the development and empirical validation of …
Writeprints: A stylometric approach to identity-level identification and similarity detection in cyberspace
One of the problems often associated with online anonymity is that it hinders social
accountability, as substantiated by the high levels of cybercrime. Although identity cues are …
accountability, as substantiated by the high levels of cybercrime. Although identity cues are …
Purchasing pirated software: an initial examination of Chinese consumers
F Wang, H Zhang, H Zang, M Ouyang - Journal of consumer …, 2005 - emerald.com
Purpose–To analyze Chinese consumers in purchasing pirated software; to establish and
empirically validate a model for analyzing consumers in software piracy; and to help …
empirically validate a model for analyzing consumers in software piracy; and to help …
Factors motivating software piracy: a longitudinal study
The objective of this paper is to gain a better understanding of factors influencing software
piracy. A model explaining the contribution of different factors to software piracy intention …
piracy. A model explaining the contribution of different factors to software piracy intention …
The effects of attitudinal and demographic factors on intention to buy pirated CDs: The case of Chinese consumers
This study examines the impact of attitude toward piracy on intention to buy pirated CDs
using Chinese samples. Attitude toward piracy is measured by a multi-item scale that has …
using Chinese samples. Attitude toward piracy is measured by a multi-item scale that has …
[HTML][HTML] Determining consumer purchase intentions toward counterfeit luxury goods in Malaysia
This study adapted the Theory of Reasoned Action (TRA) to examine how social and
personality factors influence Malaysian consumer attitudes toward counterfeit luxury goods …
personality factors influence Malaysian consumer attitudes toward counterfeit luxury goods …