What Motivates Software Piracy in China: Q-Methodology Perspective

논문상세정보
' What Motivates Software Piracy in China: Q-Methodology Perspective' 의 주제별 논문영향력
논문영향력 선정 방법
논문영향력 요약
주제
  • 행정학
동일주제 총논문수 논문피인용 총횟수 주제별 논문영향력의 평균
3,864 0

0.0%

' What Motivates Software Piracy in China: Q-Methodology Perspective' 의 참고문헌

  • 정부3.0의 문제점과 대응방안에 관한 인식유형 분석
    김찬우 한국사회와 행정연구 26 2 197-218 [2015]
  • 온라인 디지털 불법복제 단속이 불법복제 의도에 미치는 영향에 관한 연구
    최은지 계간 저작권 22 2 25-49 [2009]
  • 성범죄자의 성적 일탈경험과 자기합리화에 관한 연구
    조윤오 한국공안행정학회보 18 1 331-362 [2009]
  • 사행성 게임물과 과잉규제의 역설
    김창수 지방정부연구 12 2 201-227 [2008]
  • 베트남 사례를 통한 불법 소프트웨어 사용요인 연구
    유철우 e-비즈니스연구 9 1 237-258 [2008]
  • 규범학습을 통한 범죄예방 -고등학생의 규범의식조사를 바탕으로-
    윤용규 비교형사법연구 6 2-1 285-312 [2004]
  • The status of the software industry
    Jin, H. Y. Information and Communication Policy Institute, Focus 27 15 2015- [2015]
  • The effect of deterrence policy in software piracy
    Yoo, C. -W. Information and Development 30 4 342-357 [2011]
  • The conditions of effective implementation:A guide to accomplishing policy objectives
    Sabatier, Paul A. Policy Analysis 5 481-504 [1979]
  • The Study of Behavior: Q-technique And Its Methodology
    Stephenson, W. - [1953]
  • Strengthening the norms of trust through punishment
    Hong, Y. K. Law of Korea 77 301-356 [2015]
  • Status of efforts to ensure use of authorized software in China
    Son, H. K 16- [2012]
  • Software piracy: A view from Hong Kong
    Moores, T. Communications of the ACM 43 12 88-93 [2000]
  • Software piracy in ethical decision making
    Kim, K. Y. Information Policy 11 4 48-86 [2004]
  • Smart ecosystem diffusion and the software industry paradigm shift.
    Kang, H. Y. - [2012]
  • Representativeness and the study of political behavior: An application of Q technique to reactions to the Kent State incident
    Brown, S. R. Social Science Quarterly 51 3 514-526 [1970]
  • Q methodology: Science, philosophy, theory, analysis and application
    Kim, H. G. - [2008]
  • Q methodology and social science
    Kim, S. E. - [2007]
  • Q methodology and social science
    Kim, S. E. - [2016]
  • Q methodology
    Brown, S. R. Public Administration and Public Policy 71 599-638 [1999]
  • Political subjectivity: Applications of Q methodology in political science
    Brown, S. R. - [1980]
  • International software piracy: Analysis of key issues and impacts
    Gopal, R. D. Information Systems Research 9 4 380-397 [1998]
  • Influence Factors for Software Privacy in China: An integrated model analysis framework
    Lin, X. D. Journal of Shenzhen University 86-92 [2015]
  • How individual users and PC sellers perceive the illegal use of software
    Jo, U. S. [2010]
  • Global software piracy: You can’t get blood out of a turnip
    Gopal, R. D. Communications of the ACM 43 9 82-89 [2000]
  • Foundations of behavioral research
  • Fighting software piracy: Which governance tools matter for Africa?
    Andrés, A. R. Journal of Business Ethics 118 3 667-682 [2013]
  • Fighting Software Piracy: Some Global Conditional Policy Instruments
    Simplice A. Asongu Journal of Business Ethics - [2016]
  • Factors that interfere with the Intention to Use authorized general purpose office software in small and medium-sized enterprises.
    Lee, S. W. [2011]
  • Factors that influence software piracy:A view from Germany
    Nill, Alexander Communications of the ACM 53 6 131-134 [2010]
  • Equity perceptions as a deterrent to software piracy behavior
    Douglas, D. E. Information and Management 44 5 503-512 [2007]
  • Determinants of software piracy under risk aversion: A model with empirical evidence
    Driouchi, A. European Journal of Information Systems 24 5 519-530 [2015]
  • Criminal policy
    Park, S. K. - [2001]
  • Crime, punishment, and deterrence
    Gibbs, J. P. - [1975]
  • Bandura’s theory of moral development
    Song, S. J. Moral Education Research 3 85-109 [2002]
  • Analysis of types of perception of illegal software use
    Kim, C. W. Korean Society and Administration Research 26 4 219-244 [2016]
  • An application of deterrence theory to software piracy
    Higgins, G. E. Journal of Criminal Justice and Popular Culture 12 3 166-184 [2005]
  • A Review of the Determinants of Counterfeiting and Piracy and the Proposition for Future Research
    이승희 The Korean Journal of Policy Studies 24 1 1-38 [2009]
  • 2014 China regional entry strategy report