Software Piracy: Neutralization Techniques that Circumvent Ethical Decision-makingUniversity of Minnesota, 2006 - 500 Seiten |
Inhalt
Piracy? | 22 |
ESSAY 1 | 31 |
Ethical DecisionMaking Framework | 59 |
Urheberrecht | |
6 weitere Abschnitte werden nicht angezeigt.
Häufige Begriffe und Wortgruppen
action ambiguity anti-piracy Appeal to Higher application Authority Ranking Bebeau behavior Business Software Alliance Cohen's Kappa Communal Sharing Components of Moral condone piracy content analysis cost counter-neutralization techniques Curley Denial of Injury Denial of Responsibility Denial of Victim digital products dissertation duplicate software duplication of software Equity Matching ethical decision ethical decision-making framework ethical decision-making processes ethical principles features of information Fiske Fiske's Furthermore Higher Loyalty Hunt and Vitell hypothesized impact individual decision-maker information technology intangibility intensity and neutralization interaction Jones laws magnitude of consequences mass media Matza's neutralization moral intensity neutralization and counter-neutralization neutralization framework neutralization techniques neutralization theory newspaper norms open-source software p-value paper pirates pro-piracy question situation questionnaire rationales relational models theory research question respondents scenario social consensus social construction software piracy Sykes and Matza's techniques of neutralization Thong and Yap type of neutralization unauthorized duplication unethical users variables Zamoon