共查询到20条相似文献,搜索用时 15 毫秒
1.
Bernadette King 《Behaviour & Information Technology》2014,33(3):210-224
The aims of the study were to describe the relationship between all three of Kohlberg's levels of moral development and attitudes towards software piracy as well as to determine if an individual's Knowledge of Intellectual Property Laws moderated this relationship. The research exploring moral development and attitudes towards software piracy is limited in that the results are inconclusive and often do not assess higher levels of moral development. In this study, we explore some of the early antecedent relationships in the theory of reasoned action. An exploratory, non-experimental, cross-sectional survey design was used and a questionnaire containing three scales (attitudes towards software piracy, levels of moral development and Knowledge of Intellectual Property Laws) were obtained from a sample of 402 respondents from three medium-sized South African organisations and from an online survey on a prominent South African online information technology magazine. The results indicated that there is a significant positive relationship between the respondents’ attitudes to software piracy and levels of moral development. Additionally, there are significant relationships between attitudes towards software piracy and each of the levels of moral development. Level 2 moral development predicted the most amount of variance in attitudes towards software piracy. The moderated multiple linear regression revealed that the Knowledge of Intellectual Property Laws did not have a moderating effect on the relationship between attitudes towards software piracy and moral development. These findings provide a more in-depth analysis of the relationship between attitudes and levels of moral development with respect to software piracy. 相似文献
2.
Peter Holm 《Information & Communications Technology Law》2014,23(1):61-76
The computer games industry suffers from high rates of piracy, with many people downloading illegal copies of games. People in the industry are aware of the problem, and the gravity of it has been acknowledged and commented on by many publishers and developers. Yet unlike the Recording Industry Association of America, Motion Picture Association of America, independent movie studios, and other rights holders, computer game developers and publishers have shied away from attempting to sue pirates or otherwise enforce their rights through the legal system. Instead, the industry has looked to a variety of self-help remedies, a fact that has largely not been commented on by legal scholars. This paper examines the successes and pitfalls of these varied non-legal approaches, broadly classifying them into four categories: digital rights management, online-only offerings, making legal easier, and community engagement. 相似文献
3.
《Behaviour & Information Technology》2012,31(6):570-583
The purpose of this study is to understand factors that affect continuance intention of a popular hedonic information system, blogs. The expectation-confirmation theory (ECT) is adapted with perceived enjoyment, habit and user involvement. Data was collected via an online survey. A total of 430 valid responses were collected. The research model was assessed by structural equation modelling (SEM). The results show that continuance intention of blog use was predicted collectively by user involvement, satisfaction and perceived enjoyment. Habit, however, exhibited no strong relationship with satisfaction and use intention. Users' satisfaction with blog use was predicted primarily by perceived enjoyment, followed by users' confirmation of expectation and user involvement. Perceived enjoyment was predicted by users' involvement and users' confirmation of expectation. Blogging time significantly moderates the effect of habit on perceived enjoyment, but not on satisfaction and continuance intention. The integrated model explains 65% of the satisfaction and 57% of continuance intention. The results suggest that integrating perceived enjoyment and user involvement into the ECT provides better insights into continuous use in the blog context. 相似文献
4.
Recent studies have applied Grottfredson and Hirschi’s General Theory of Crime to investigate whether college students’ inclinations toward internet software piracy is related to low self-control and opportunity (i.e., computer ownership). Given the widespread use of the internet to illegally obtain copies of music and movies, it is important to understand the factors in this form of piracy as well. This study applied the self-control perspective to examine the attitudes of high school students toward the internet piracy of music and movies. Attitudes toward the internet piracy of music and movies were related to self-control, biological sex, internet experience, affiliation with deviant peers, and grade level in this study of high school students. This information is important because studies of internet piracy had not yet confirmed the presence and predictability of internet piracy in high school students. This study also suggests that piracy prevention efforts may be most appropriately focused on high school age individuals and directed toward increasing self-control. 相似文献
5.
Kan-Min Lin 《Behaviour & Information Technology》2016,35(9):693-705
As social networks’ popularity has increased, so have the attendant problems. The purpose of this study is to identify the important problems by exploring the determinants of Facebook continuance intention from a negative perspective. A questionnaire survey and interview method is used to provide a deep understanding of both the problems and their causes. The research hypotheses are empirically evaluated using the responses from a field survey of 555 undergraduates. The results indicate that previous usage behaviour is the most important determinate of continuance intention. There is a positive causal relationship between perceived privacy self-protection and usage behaviour. In addition to a common privacy issue, this study discovers some problems such as underestimating the potential risks, having misconceptions and lacking legal and information security knowledge. Moreover, this study presents a diagnostic system that administrators can use to detect students’ key problems and understand the reasons behind students’ behaviour. 相似文献
6.
Alexander Pelaez Chi-Wen Chen Yan Xian Chen 《Journal of Computer Information Systems》2019,59(1):73-84
This article conducts a meta-analysis to determine the effect of perceived risk on intention to purchase in e-commerce settings. The literature generally favors the negative relationship between the two variables; however, some studies have found this relationship to be not significant or even positive. Thirty-five studies were examined, representing 39 overall samples across multiple contexts with a total sample size of 13779 and overall weighted effect size (Pearson’s r) for all studies of ?0.362 (95% CI: ?.432, ?.286), a significant medium effect, with a stronger effect in B2C than B2B contexts. Major IS journals rarely report non-significant results and reflect publication bias, posing a problem for a comprehensive meta-analysis. Due to the reluctance to report or accept, studies showing non-significant results represent a significant challenge for IS research. Our aim is to encourage more meta-analysis in IS literature and utilize this methodology to analyze previously held theories. 相似文献
7.
This paper compares two common risk‐modeling approaches and then uses them to analyze the risk of incorporating solar photovoltaic (PV) systems into a commercial electric power grid. It uses procedures from both approaches such as Hierarchical Holographic Models, frequency and severity normalization, and avoiding numerical skewing by rare but serious events: It describes the benefits and limitations of these approaches. Then, this paper summarizes the main risks associated with incorporating Solar PV panel systems into a commercial electric power grid, presents a what‐if analysis for extreme scenarios, and explains mitigation strategies to ameliorate these risks. Finally, the paper points out some possible unintended consequences of incorporating Solar PV systems into a commercial electric power grid. 相似文献
8.
Ya-Ching Lee 《Journal of Computer Information Systems》2019,59(1):61-72
Cloud computing is an advanced technology that firms can use to reduce costs and increase efficiency. However, most firms hesitate to adopt cloud computing. This study investigates the perceived risk of cloud-computing adoption at the firm level and whether cloud-computing knowledge affects adoption intention and decreases risk perceptions. We demonstrate that the knowledge of cloud computing decreases perceived risk, positively affecting the intention of adopting these services. In addition, this study demonstrates that finance, security, technique, and user risks can negatively affect the adoption intention for cloud computing. Finally, this study provides academic and practical advice. 相似文献
9.
本文借助文件及文件夹相关属性的一些特性,对计算机防盗版技术和防伪密钥的实现技术进行了初步探索,并给出了vbasic6.0编程实现的解决方案。 相似文献
10.
《Behaviour & Information Technology》2012,31(3):277-285
Today, software piracy is an issue of global importance. Computer science students are the future information and communication technologies professionals and it is important to study the way they approach this issue. In this article, we attempt to study attitudes, behaviours and the corresponding reasoning of computer science students in Greece regarding software piracy. The statements taken in 56 semi-structured interviews with students indicate that computer science students in Greece make intensive use of pirated software, mention as main reason for their practice the cost of genuine software, and blame the academic environment, coincidental stereotypes and their student status for this behaviour. They acknowledge the immoral character of their actions, as well as the fact that others are affected by software piracy, but they pay little attention to this action and they practically don't care. While keeping distance from software development companies, when specifically asked, they easily adopt the role of a software developer and attempt to substantiate their current and eventually future attitude out of hand. They consider software copyright laws to be inapplicable and unrealistic and fail to argue against intellectual property rights for mere digital products, such as software. 相似文献
11.
《Behaviour & Information Technology》2012,31(10):1021-1032
Online computer gaming is growing at a rapid pace. However, this phenomenon is stigmatised by many negative connotations. This study investigated the influence of intangibility on perceived risks (social, time, financial, physical, performance and psychology) among online gamers. The self-completed market survey questionnaire employs the Intangibility and Perceived Risk scales. Data were gathered in Taipei city, the biggest metropolitan areain Taiwan. Both public (1018) and online (400) voluntary interviews were conducted. The collected data were analysed with a structural equation model. There is a significant positive relationship between intangibility and alldimensions of perceived risk. The findings have managerial implications and future research is suggested. 相似文献
12.
Security concerns have thwarted the widespread adoption of mobile banking in India. To respond to the concerns of Indian banks and their customers, we present in this paper our exploratory attempts to understand how the levels of security affect perceived risk and control and ultimately, adoption of mobile banking by Indian customers. This study also examines the moderating influence of the type of city on the relationship between security levels and risk/control perceptions associated with mobile banking. Using a scenario-based experiment, we classified security-enhancing approaches into three categories and examined their effectiveness in decreasing Indian customers’ perceived risk, increasing their perceived control, and then in turn, facilitating mobile banking adoption. Our findings reveal the important role of perceived risk and control in influencing customers’ intention to adopt mobile banking. Moreover, perceived risk and control significantly influenced mobile banking adoption by customers in urban areas, but only perceived control significantly influenced mobile banking adoption by metropolitan customers. Additional analyses show that customers’ risk and control perceptions differ according to the level of security; however, these perceptions do not have a significant influence on risk and control. 相似文献
13.
The present exploratory study sought to address a gap in the current literature on problematic Internet use by investigating the relationship between Internet addiction and digital piracy. The main research question guiding this study was whether IA was correlated with digital piracy. The expectation was that IA would indeed be correlated with digital piracy and increase odds of perpetration. Secondly, taking into account that previous literature on both IA and digital piracy emphasizes the importance of online relationships (Acier and Kern, 2011, Fitzpatrick, 2008, Marcum et al., 2011), it was expected that deviant peer association would increase the odds of pirating. Finally, taking into account that previous research on both IA and digital piracy has largely shown that these problems affect a greater proportion of males (Andreou and Svoli, 2013, Gunter et al., 2010, Hinduja, 2012, Lam et al., 2009, Shaw and Black, 2008), it was expected that being male would increase the odds of pirating. 相似文献
14.
ABSTRACTThis study modeled use of social media as a tool to select tourism destinations. The findings revealed that perceived usefulness, perceived ease of use, perceived risk, and electronic word-of-mouth (e-WOM) directly influenced the attitude and has an indirect effect on intention with the presence of attitude. The development of tourism marketing and communication strategies should focus on the online context as the factors which are capable of influencing tourists’ behavior in a more efficient way. 相似文献
15.
Research on continued use of mobile payment services is scarce. To address part of this research gap, we examine a research model, derived from IT continuance, risk-trust, and affect-cognition literature. The results show that user satisfaction with mobile payment services has a substantive positive impact on continuance intention with such services; the disconfirmation of preadoption perceived usefulness about mobile payment services positively impacts user satisfaction and postadoption perceived usefulness; the disconfirmation of preadoption perceived risk about mobile payment services negatively impacts user satisfaction and positively impacts postadoption perceived risk; postadoption perceived usefulness is positively associated with continuance intention; user satisfaction positively impacts both institution-based trust in mobile payment technologies and trust beliefs in service providers; institution-based trust shows a positive impact on postadoption perceived usefulness and a negative impact on postadoption perceived risk. 相似文献
16.
Strong encryption is an urgent need for e-commerce development, as it allows the privacy and secure transactions of the financial data. International regulations must allow the spreading of e-commerce and the associated encryption products, in order to establish a secure e-commerce environment that customers can trust and allowing an international deployment of e-commerce solutions without restrictions. 相似文献
17.
《Behaviour & Information Technology》2012,31(6):565-576
Digital piracy intention research has yielded different sets of piracy intention determinants based on various theoretical models. In this study, we reviewed the digital piracy literature and empirically compared two theoretical models, which are the models most often used: the theory of planned behaviour (TPB) and the Hunt–Vitell ethical decision model. Data were obtained from university students in South Korea, and structural equation modelling (SEM) was employed to examine and compare the two competing theoretical models in terms of explanatory power, overall model fit and paths' significance. The findings of this study revealed that the TPB is a more appropriate model for predicting digital piracy than the Hunt–Vitell ethical decision model. 相似文献
18.
This study aimed to examine the effects of perceived risk, perceived benefits, and trust on consumers’ intention to use mobile payment, or m‐payment. In addition, different effects of some demographic factors (e.g., income, age, education) on m‐payment usage were examined. The sample of 457 respondents was used to analyze the causal relationships between the variables and the mean differences of demographic factors in consumer intention to use m‐payment. The results supported the negative relationship between perceived risk, trust, and consumer intention to use m‐payment. A positive relationship between perceived benefits and trust was found. This study revealed that trust mediated consumer intention to use m‐payment. In individual differences of m‐payment adoption, education influenced the relationship between perceived risk and intention to use m‐payments as well as the relationship between trust and intention to use m‐payment. This study provided insights into consumer differences regarding m‐payment adoption and the mediating role of trust between perceived benefits, perceived risk, and intention to use m‐payment. 相似文献
19.
Mauricio S. Featherman Joseph S. Valacich & John D. Wells 《Information Systems Journal》2006,16(2):107-134
Abstract. As companies race to digitize physical-based service processes repackaging them as online e-services, it becomes increasingly important to understand how consumers perceive the digitized e-service alternative. We theorize that consumers often perceive e-services as being artificial and non-authentic, and that consumers must perform this assessment when deciding whether new e-services are viable alternatives to traditional service methods. This research investigates whether consumer perceptions of artificiality increase perceptions of e-service risk, which has been shown to hamper consumer acceptance in a variety of online settings. An empirical study operationalized perceived artificiality (PA) within a controlled laboratory experiment that manipulated the risk of a specific e-service class (e-payments). For a specific e-service brand, PA is reduced when the web interface is viewed as easy to use; alternatively, PA is increased when consumers have relatively high risk perceptions about the overall e-service class. Furthermore, consumers who were rated as information technology innovators had lower overall artificiality perceptions, however, exposure to negatively framed e-service efficacy information removed this artificiality reducing effect. The theoretical linkages between PA and perceived risk, and the two antecedents – ease of use and e-service class risk – were confirmed by survey results. The implications of these results for future research as well as the design and marketing of e-services are examined. 相似文献
20.
当前互联网电子信息产品盗版现象严重,为了解决这一问题,我们开发了新型数字信息安全传播平台。该平台基于海南大学信息学院顾建教授两项专利技术,即《任意周期可控复杂度满足公设的随机序列方法和系统》和《同一信道独立授权的数字信息安全传输方法和系统》。通过该平台,对电子信息产品版权起到很好的保护作用。 相似文献