IDEAS home Printed from https://ideas.repec.org/a/kap/jbuset/v77y2008i4p481-499.html
   My bibliography  Save this article

Softlifting: Exploring Determinants of Attitude

Author

Listed:
  • Tim Goles
  • Bandula Jayatilaka
  • Beena George
  • Linda Parsons
  • Valrie Chambers
  • David Taylor
  • Rebecca Brune

Abstract

No abstract is available for this item.

Suggested Citation

  • Tim Goles & Bandula Jayatilaka & Beena George & Linda Parsons & Valrie Chambers & David Taylor & Rebecca Brune, 2008. "Softlifting: Exploring Determinants of Attitude," Journal of Business Ethics, Springer, vol. 77(4), pages 481-499, February.
  • Handle: RePEc:kap:jbuset:v:77:y:2008:i:4:p:481-499
    DOI: 10.1007/s10551-007-9361-0
    as

    Download full text from publisher

    File URL: http://hdl.handle.net/10.1007/s10551-007-9361-0
    Download Restriction: Access to full text is restricted to subscribers.

    File URL: https://libkey.io/10.1007/s10551-007-9361-0?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. Ajzen, Icek, 1991. "The theory of planned behavior," Organizational Behavior and Human Decision Processes, Elsevier, vol. 50(2), pages 179-211, December.
    2. Susan J. Harrington, 1989. "Why People Copy Software and Create Computer Viruses," Information Resources Management Journal (IRMJ), IGI Global, vol. 2(3), pages 28-38, July.
    3. Fred D. Davis & Richard P. Bagozzi & Paul R. Warshaw, 1989. "User Acceptance of Computer Technology: A Comparison of Two Theoretical Models," Management Science, INFORMS, vol. 35(8), pages 982-1003, August.
    4. Grasmick, Harold G. & Scott, Wilbur J., 1982. "Tax evasion and mechanisms of social control: A comparison with grand and petty theft," Journal of Economic Psychology, Elsevier, vol. 2(3), pages 213-230, September.
    5. Weber, James, 1991. "Adapting Kohlberg to Enhance the Assessment of Managers’ Moral Reasoning," Business Ethics Quarterly, Cambridge University Press, vol. 1(3), pages 293-318, July.
    6. Kathleen Reavis Conner & Richard P. Rumelt, 1991. "Software Piracy: An Analysis of Protection Strategies," Management Science, INFORMS, vol. 37(2), pages 125-139, February.
    7. Sheppard, Blair H & Hartwick, Jon & Warshaw, Paul R, 1988. "The Theory of Reasoned Action: A Meta-analysis of Past Research with Recommendations for Modifications and Future Research," Journal of Consumer Research, Journal of Consumer Research Inc., vol. 15(3), pages 325-343, December.
    8. David A. Harrison & Peter P. Mykytyn & Cynthia K. Riemenschneider, 1997. "Executive Decisions About Adoption of Information Technology in Small Business: Theory and Empirical Tests," Information Systems Research, INFORMS, vol. 8(2), pages 171-195, June.
    9. Shirley Taylor & Peter A. Todd, 1995. "Understanding Information Technology Usage: A Test of Competing Models," Information Systems Research, INFORMS, vol. 6(2), pages 144-176, June.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Piotr Ćwiakowski & Marek Giergiczny & Michał Krawczyk, 2013. "Pirates in the lab. Using incentivized choice experiments to explore preference for (un)authorized content," Working Papers 2013-25, Faculty of Economic Sciences, University of Warsaw.
    2. Mandel Philipp & Süssmuth Bernd, 2012. "Determinants of Digital Piracy: A Re-examination of Results," Journal of Economics and Statistics (Jahrbuecher fuer Nationaloekonomie und Statistik), De Gruyter, vol. 232(4), pages 394-413, August.
    3. Gui Ye & Hongzhe Yue & Jingjing Yang & Hongyang Li & Qingting Xiang & Yuan Fu & Can Cui, 2020. "Understanding the Sociocognitive Process of Construction Workers’ Unsafe Behaviors: An Agent-Based Modeling Approach," IJERPH, MDPI, vol. 17(5), pages 1-33, March.
    4. Wojciech Hardy & Michał Krawczyk & Joanna Tyrowicz, 2013. "Why is online piracy ethically different from theft? A vignette experiment," Working Papers 2013-24, Faculty of Economic Sciences, University of Warsaw.
    5. Garg, Aashish & Goel, Pooja & Sharma, Anuj & Rana, Nripendra P., 2022. "As you sow, so shall you reap: Assessing drivers of socially responsible investment attitude and intention," Technological Forecasting and Social Change, Elsevier, vol. 184(C).
    6. Martin Eisend, 2019. "Morality Effects and Consumer Responses to Counterfeit and Pirated Products: A Meta-analysis," Journal of Business Ethics, Springer, vol. 154(2), pages 301-323, January.
    7. Kos Koklic, Mateja & Kukar-Kinney, Monika & Vida, Irena, 2022. "Consumers’ de-ownership as a predictor of dark-side digital acquisition behavior: Moderating role of moral intensity and collectivism," Journal of Business Research, Elsevier, vol. 138(C), pages 108-116.
    8. Ian Phau & James Ng, 2010. "Predictors of Usage Intentions of Pirated Software," Journal of Business Ethics, Springer, vol. 94(1), pages 23-37, June.
    9. Mateja Kos Koklic & Monika Kukar-Kinney & Irena Vida, 2016. "Three-Level Mechanism of Consumer Digital Piracy: Development and Cross-Cultural Validation," Journal of Business Ethics, Springer, vol. 134(1), pages 15-27, March.
    10. Cheolho Yoon, 2011. "Theory of Planned Behavior and Ethics Theory in Digital Piracy: An Integrated Model," Journal of Business Ethics, Springer, vol. 100(3), pages 405-417, May.
    11. Martin Eisend, 2019. "Explaining Digital Piracy: A Meta-Analysis," Information Systems Research, INFORMS, vol. 30(2), pages 636-664, June.
    12. Michal Krawczyk & Joanna Tyrowicz & Wojciech Hardy, 2020. "Online and physical appropriation: evidence from a vignette experiment on copyright infringement," Behaviour and Information Technology, Taylor & Francis Journals, vol. 39(4), pages 481-496, April.
    13. Kirsten Robertson & Lisa McNeill & James Green & Claire Roberts, 2012. "Illegal Downloading, Ethical Concern, and Illegal Behavior," Journal of Business Ethics, Springer, vol. 108(2), pages 215-227, June.
    14. Koay, Kian Yeik & Tjiptono, Fandy & Sandhu, Manjit Singh, 2020. "Digital piracy among consumers in a developing economy: A comparison of multiple theory-based models," Journal of Retailing and Consumer Services, Elsevier, vol. 55(C).

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Viswanath Venkatesh, 2000. "Determinants of Perceived Ease of Use: Integrating Control, Intrinsic Motivation, and Emotion into the Technology Acceptance Model," Information Systems Research, INFORMS, vol. 11(4), pages 342-365, December.
    2. Yogesh K. Dwivedi & Nripendra P. Rana & Anand Jeyaraj & Marc Clement & Michael D. Williams, 2019. "Re-examining the Unified Theory of Acceptance and Use of Technology (UTAUT): Towards a Revised Theoretical Model," Information Systems Frontiers, Springer, vol. 21(3), pages 719-734, June.
    3. Ofir Turel & Yufei Yuan, 2007. "User Acceptance of Web-Based Negotiation Support Systems: The Role of Perceived Intention of the Negotiating Partner to Negotiate Online," Group Decision and Negotiation, Springer, vol. 16(5), pages 451-468, September.
    4. Paul Juinn Bing Tan, 2013. "Applying the UTAUT to Understand Factors Affecting the Use of English E-Learning Websites in Taiwan," SAGE Open, , vol. 3(4), pages 21582440135, October.
    5. Venkatesh, Viswanath & Morris, Michael G. & Ackerman, Phillip L., 2000. "A Longitudinal Field Investigation of Gender Differences in Individual Technology Adoption Decision-Making Processes," Organizational Behavior and Human Decision Processes, Elsevier, vol. 83(1), pages 33-60, September.
    6. Borhan, Muhamad Nazri & Ibrahim, Ahmad Nazrul Hakimi & Miskeen, Manssour A. Abdulasalm, 2019. "Extending the theory of planned behaviour to predict the intention to take the new high-speed rail for intercity travel in Libya: Assessment of the influence of novelty seeking, trust and external inf," Transportation Research Part A: Policy and Practice, Elsevier, vol. 130(C), pages 373-384.
    7. Tsourela Maria & Roumeliotis Manos, 2017. "Technology-Based Services Adoption: A Comparison of the Major Applications," International Journal of Innovation and Technology Management (IJITM), World Scientific Publishing Co. Pte. Ltd., vol. 14(03), pages 1-24, June.
    8. Christopher R. Plouffe & John S. Hulland & Mark Vandenbosch, 2001. "Research Report: Richness Versus Parsimony in Modeling Technology Adoption Decisions—Understanding Merchant Adoption of a Smart Card-Based Payment System," Information Systems Research, INFORMS, vol. 12(2), pages 208-222, June.
    9. Sung S. Kim & Naresh K. Malhotra, 2005. "A Longitudinal Model of Continued IS Use: An Integrative View of Four Mechanisms Underlying Postadoption Phenomena," Management Science, INFORMS, vol. 51(5), pages 741-755, May.
    10. Haider Ali Abbasi & Satirenjit Kaur Johl & Zullina Bt Hussain Shaari & Wajiha Moughal & Muhammad Mazhar & Muhammad Ali Musarat & Waqas Rafiq & Asaad Salam Farooqi & Alexey Borovkov, 2021. "Consumer Motivation by Using Unified Theory of Acceptance and Use of Technology towards Electric Vehicles," Sustainability, MDPI, vol. 13(21), pages 1-22, November.
    11. Nedra, Bahri-Ammari & Hadhri, Walid & Mezrani, Mariem, 2019. "Determinants of customers' intentions to use hedonic networks: The case of Instagram," Journal of Retailing and Consumer Services, Elsevier, vol. 46(C), pages 21-32.
    12. Venkatesh, Viswanath & Maruping, Likoebe M. & Brown, Susan A., 2006. "Role of time in self-prediction of behavior," Organizational Behavior and Human Decision Processes, Elsevier, vol. 100(2), pages 160-176, July.
    13. Lu, Chin-Shan & Lai, Kee-hung & Cheng, T.C.E., 2007. "Application of structural equation modeling to evaluate the intention of shippers to use Internet services in liner shipping," European Journal of Operational Research, Elsevier, vol. 180(2), pages 845-867, July.
    14. Konietzny, Jirka & Caruana, Albert & Cassar, Mario L., 2018. "Fun and fair, and I don’t care: The role of enjoyment, fairness and subjective norms on online gambling intentions," Journal of Retailing and Consumer Services, Elsevier, vol. 44(C), pages 91-99.
    15. Syed Shah Alam & Maisarah Ahmad & Abdullah Sanusi Othman & Zullina Bt Hussain Shaari & Mohammad Masukujjaman, 2021. "Factors Affecting Photovoltaic Solar Technology Usage Intention among Households in Malaysia: Model Integration and Empirical Validation," Sustainability, MDPI, vol. 13(4), pages 1-20, February.
    16. Grandón, Elizabeth E. & Nasco, Suzanne A. & Mykytyn Jr., Peter P., 2011. "Comparing theories to explain e-commerce adoption," Journal of Business Research, Elsevier, vol. 64(3), pages 292-298, March.
    17. Jaeki Song & Fatemeh Mariam Zahedi, 2005. "A Theoretical Approach to Web Design in E-Commerce: A Belief Reinforcement Model," Management Science, INFORMS, vol. 51(8), pages 1219-1235, August.
    18. Sanjeev Verma, 2015. "Harnessing the Benefit of Social Networking Sites for Intentional Social Action: Determinants and Challenges," Vision, , vol. 19(2), pages 104-111, June.
    19. Muhammad Ali & Syed Ali Raza & Chin-Hong Puah & Mohd Zaini Abd Karim, 2017. "Islamic home financing in Pakistan: a SEM-based approach using modified TPB model," Housing Studies, Taylor & Francis Journals, vol. 32(8), pages 1156-1177, November.
    20. Chua Chang Jin & Lim Chee Seong & Aye Aye Khin, 2019. "Factors Affecting the Consumer Acceptance towards Fintech Products and Services in Malaysia," International Journal of Asian Social Science, Asian Economic and Social Society, vol. 9(1), pages 59-65, January.

    More about this item

    Keywords

    softlifting; ethics; piracy; attitude;
    All these keywords.

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:kap:jbuset:v:77:y:2008:i:4:p:481-499. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Sonal Shukla or Springer Nature Abstracting and Indexing (email available below). General contact details of provider: http://www.springer.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.