{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T17:22:29Z","timestamp":1743096149901,"version":"3.40.3"},"publisher-location":"Cham","reference-count":35,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030436865"},{"type":"electronic","value":"9783030436872"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-43687-2_13","type":"book-chapter","created":{"date-parts":[[2020,3,19]],"date-time":"2020-03-19T00:03:53Z","timestamp":1584576233000},"page":"169-185","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["The Attitudes of Chinese Online Users Towards Movie Piracy: A Content Analysis"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3962-4868","authenticated-orcid":false,"given":"Yao","family":"Lyu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7233-5788","authenticated-orcid":false,"given":"Juan","family":"Xie","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1573-6075","authenticated-orcid":false,"given":"Bingbing","family":"Xie","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,3,19]]},"reference":[{"issue":"3","key":"13_CR1","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1007\/s10551-005-1902-9","volume":"63","author":"S Al-Rafee","year":"2006","unstructured":"Al-Rafee, S., Cronan, T.P.: Digital piracy: factors that influence attitude toward behavior. J. Bus. Ethics 63(3), 237\u2013259 (2006). \nhttps:\/\/doi.org\/10.1007\/s10551-005-1902-9","journal-title":"J. Bus. Ethics"},{"issue":"4","key":"13_CR2","doi-asserted-by":"publisher","first-page":"449","DOI":"10.1016\/j.infoecopol.2006.06.005","volume":"18","author":"M Peitz","year":"2006","unstructured":"Peitz, M., Waelbroeck, P.: Piracy of digital products: a critical review of the theoretical literature. Inf. Econ. Policy 18(4), 449\u2013476 (2006)","journal-title":"Inf. Econ. Policy"},{"key":"13_CR3","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1016\/j.chb.2016.11.015","volume":"68","author":"PB Lowry","year":"2017","unstructured":"Lowry, P.B., Zhang, J., Wu, T.: Nature or nurture? A meta-analysis of the factors that maximize the prediction of digital piracy by using social cognitive theory as a framework. Comput. Hum. Behav. 68, 104\u2013120 (2017)","journal-title":"Comput. Hum. Behav."},{"issue":"3","key":"13_CR4","doi-asserted-by":"publisher","first-page":"379","DOI":"10.1111\/j.1467-6451.2007.00316.x","volume":"55","author":"R Rob","year":"2007","unstructured":"Rob, R., Waldfogel, J.: Piracy on the silver screen. J. Ind. Econ. 55(3), 379\u2013395 (2007)","journal-title":"J. Ind. Econ."},{"issue":"1","key":"13_CR5","first-page":"5","volume":"15","author":"S Al-Rafee","year":"2014","unstructured":"Al-Rafee, S., Dashti, A.E.: A cross cultural comparison of the extended TPB: the case of digital piracy. J. Glob. Inf. Technol. Manag. 15(1), 5\u201324 (2014)","journal-title":"J. Glob. Inf. Technol. Manag."},{"issue":"3","key":"13_CR6","doi-asserted-by":"publisher","first-page":"958","DOI":"10.1016\/j.chb.2011.12.017","volume":"28","author":"RS Jacobs","year":"2012","unstructured":"Jacobs, R.S., Heuvelman, A., Tan, M., Peters, O.: Digital movie piracy: a perspective on downloading behavior through social cognitive theory. Comput. Hum. Behav. 28(3), 958\u2013967 (2012)","journal-title":"Comput. Hum. Behav."},{"issue":"5","key":"13_CR7","doi-asserted-by":"publisher","first-page":"637","DOI":"10.1080\/10496491.2016.1185491","volume":"22","author":"I Phau","year":"2016","unstructured":"Phau, I., Teah, M., Liang, J.: Investigating the factors influencing digital movie piracy. J. Promot. Manag. 22(5), 637\u2013664 (2016)","journal-title":"J. Promot. Manag."},{"issue":"5","key":"13_CR8","doi-asserted-by":"publisher","first-page":"2037","DOI":"10.1016\/j.chb.2013.04.015","volume":"29","author":"I Redondo","year":"2013","unstructured":"Redondo, I., Charron, J.-P.: The payment dilemma in movie and music downloads: an explanation through cognitive dissonance theory. Comput. Hum. Behav. 29(5), 2037\u20132046 (2013)","journal-title":"Comput. Hum. Behav."},{"key":"13_CR9","doi-asserted-by":"publisher","first-page":"535","DOI":"10.1016\/j.chb.2017.02.014","volume":"72","author":"P Fleming","year":"2017","unstructured":"Fleming, P., Watson, S.J., Patouris, E., Bartholomew, K.J., Zizzo, D.J.: Why do people file share unlawfully? A systematic review, meta-analysis and panel study. Comput. Hum. Behav. 72, 535\u2013548 (2017)","journal-title":"Comput. Hum. Behav."},{"issue":"1","key":"13_CR10","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1108\/EMJB-03-2018-0016","volume":"14","author":"S Urbonavicius","year":"2019","unstructured":"Urbonavicius, S., Dikcius, V., Adomaviciute, K., Urbonavicius, I.: Movie piracy: how novelty-seeking relates to illegal downloading. EuroMed J. Bus. 14(1), 21\u201330 (2019)","journal-title":"EuroMed J. Bus."},{"issue":"1","key":"13_CR11","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1504\/IJICBM.2015.070253","volume":"11","author":"PK Gupta","year":"2015","unstructured":"Gupta, P.K., Venkataramani, B.: Evaluation of movie piracy using an integrated approach of interpretive structural modelling and MICMAC analysis. Int. J. Indian Cult. Bus. Manag. 11(1), 43\u201358 (2015)","journal-title":"Int. J. Indian Cult. Bus. Manag."},{"issue":"3","key":"13_CR12","doi-asserted-by":"publisher","first-page":"339","DOI":"10.1177\/0894439307299934","volume":"25","author":"GE Higgins","year":"2007","unstructured":"Higgins, G.E., Fell, B.D., Wilson, A.L.: Low self-control and social learning in understanding students\u2019 intentions to pirate movies in the United States. Soc. Sci. Comput. Rev. 25(3), 339\u2013357 (2007)","journal-title":"Soc. Sci. Comput. Rev."},{"issue":"3","key":"13_CR13","doi-asserted-by":"publisher","first-page":"718","DOI":"10.1016\/j.chb.2008.12.029","volume":"25","author":"J Malin","year":"2009","unstructured":"Malin, J., Fowers, B.J.: Adolescent self-control and music and movie piracy. Comput. Hum. Behav. 25(3), 718\u2013722 (2009)","journal-title":"Comput. Hum. Behav."},{"unstructured":"Lin, X., Qiu, Z., Li, J., Cheng, L.: The influencing factors of viewing network pirate film in China. In: 12th International Conference on Service Systems and Service Management (ICSSSM), pp. 1\u20134. IEEE (2015)","key":"13_CR14"},{"key":"13_CR15","doi-asserted-by":"publisher","DOI":"10.4324\/9781315129587","volume-title":"Social Learning and Social Structure: A General Theory of Crime and Deviance","author":"R Akers","year":"2017","unstructured":"Akers, R.: Social Learning and Social Structure: A General Theory of Crime and Deviance. Routledge, New York (2017)"},{"key":"13_CR16","volume-title":"Social Foundations of Thought and Action","author":"A Bandura","year":"1986","unstructured":"Bandura, A.: Social Foundations of Thought and Action. Prentice Hall, Englewood Cliffs (1986)"},{"issue":"12","key":"13_CR17","doi-asserted-by":"publisher","first-page":"1084","DOI":"10.1002\/asi.20061","volume":"55","author":"E Batlle","year":"2004","unstructured":"Batlle, E., Neuschmied, H., Uray, P., Ackermann, G.: Recognition and analysis of audio for copyright protection: the RAA project. J. Am. Soc. Inform. Sci. Technol. 55(12), 1084\u20131091 (2004)","journal-title":"J. Am. Soc. Inform. Sci. Technol."},{"unstructured":"Xin Hua Daily Finance. \nhttp:\/\/www.xhfmedia.com\/newsdetail.htm?id=1902140050\n\n. Accessed 14 Sept 2019","key":"13_CR18"},{"issue":"10","key":"13_CR19","doi-asserted-by":"publisher","first-page":"2313","DOI":"10.1002\/asi.23902","volume":"68","author":"M Sanfilippo","year":"2017","unstructured":"Sanfilippo, M., Yang, S., Fichman, P.: Trolling here, there, and everywhere: perceptions of trolling behaviors in context. J. Assoc. Inf. Sci. Technol. 68(10), 2313\u20132327 (2017)","journal-title":"J. Assoc. Inf. Sci. Technol."},{"issue":"1","key":"13_CR20","doi-asserted-by":"publisher","first-page":"478","DOI":"10.1002\/pra2.2018.14505501052","volume":"55","author":"H Sun","year":"2018","unstructured":"Sun, H., Fichman, P.: Chinese collective trolling. Proc. Assoc. Inf. Sci. Technol. 55(1), 478\u2013485 (2018)","journal-title":"Proc. Assoc. Inf. Sci. Technol."},{"issue":"1","key":"13_CR21","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1002\/cb.357","volume":"11","author":"A Cockrill","year":"2012","unstructured":"Cockrill, A., Goode, M.M.: DVD pirating intentions: angels, devils, chancers and receivers. J. Consum. Behav. 11(1), 1\u201310 (2012)","journal-title":"J. Consum. Behav."},{"issue":"3","key":"13_CR22","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1080\/10508422.2011.570163","volume":"21","author":"JS Chiou","year":"2011","unstructured":"Chiou, J.S., Cheng, H.I., Huang, C.Y.: The effects of artist adoration and perceived risk of getting caught on attitude and intention to pirate music in the United States and Taiwan. Ethics Behav. 21(3), 182\u2013196 (2011)","journal-title":"Ethics Behav."},{"issue":"1","key":"13_CR23","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1080\/01639625.2012.707536","volume":"34","author":"KF Steinmetz","year":"2013","unstructured":"Steinmetz, K.F., Tunnell, K.D.: Under the pixelated jolly roger: a study of on-line pirates. Deviant Behav. 34(1), 53\u201367 (2013)","journal-title":"Deviant Behav."},{"key":"13_CR24","doi-asserted-by":"publisher","first-page":"506","DOI":"10.1016\/j.chb.2015.02.018","volume":"48","author":"H Cho","year":"2015","unstructured":"Cho, H., Chung, S., Filippova, A.: Perceptions of social norms surrounding digital piracy: the effect of social projection and communication exposure on injunctive and descriptive social norms. Comput. Hum. Behav. 48, 506\u2013515 (2015)","journal-title":"Comput. Hum. Behav."},{"issue":"7\u20138","key":"13_CR25","doi-asserted-by":"publisher","first-page":"334","DOI":"10.1016\/j.im.2012.06.004","volume":"49","author":"M Siponen","year":"2012","unstructured":"Siponen, M., Vance, A., Willison, R.: New insights into the problem of software piracy: the effects of neutralization, shame, and moral beliefs. Inf. Manag. 49(7\u20138), 334\u2013341 (2012)","journal-title":"Inf. Manag."},{"issue":"1","key":"13_CR26","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1007\/s12109-008-9049-z","volume":"24","author":"Z Tong","year":"2018","unstructured":"Tong, Z., Yan, F., Hao, J.: Digital copyright protection in China. Publ. Res. Q. 24(1), 48\u201353 (2018). \nhttps:\/\/doi.org\/10.1007\/s12109-008-9049-z","journal-title":"Publ. Res. Q."},{"issue":"4","key":"13_CR27","doi-asserted-by":"publisher","first-page":"587","DOI":"10.1111\/j.1468-2958.2002.tb00826.x","volume":"28","author":"M Lombard","year":"2002","unstructured":"Lombard, M., Snyder-Duch, J., Bracken, C.C.: Content analysis in mass communication: assessment and reporting of intercoder reliability. Hum. Commun. Res. 28(4), 587\u2013604 (2002)","journal-title":"Hum. Commun. Res."},{"issue":"1","key":"13_CR28","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1177\/1748048517742785","volume":"80","author":"J Gu","year":"2018","unstructured":"Gu, J.: From divergence to convergence: institutionalization of copyright and the decline of online video piracy in China. Int. Commun. Gaz. 80(1), 60\u201386 (2018)","journal-title":"Int. Commun. Gaz."},{"issue":"04","key":"13_CR29","doi-asserted-by":"publisher","first-page":"259","DOI":"10.4236\/chnstd.2018.74023","volume":"07","author":"X Liu","year":"2018","unstructured":"Liu, X., Zha, Y.: Copyright protection of digital movies using the coalition of technology and law in China. Chin. Stud. 07(04), 259\u2013276 (2018)","journal-title":"Chin. Stud."},{"issue":"3","key":"13_CR30","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1111\/j.1468-2958.1993.tb00305.x","volume":"19","author":"JD Johnson","year":"1993","unstructured":"Johnson, J.D., Meischke, H.: A comprehensive model of cancer-related information seeking applied to magazines. Hum. Commun. Res. 19(3), 343\u2013367 (1993)","journal-title":"Hum. Commun. Res."},{"issue":"C","key":"13_CR31","doi-asserted-by":"publisher","first-page":"294","DOI":"10.1016\/j.compedu.2014.06.016","volume":"78","author":"Y Akbulut","year":"2014","unstructured":"Akbulut, Y.: Exploration of the antecedents of digital piracy through a structural equation model. Comput. Educ. 78(C), 294\u2013305 (2014)","journal-title":"Comput. Educ."},{"issue":"2","key":"13_CR32","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1016\/j.obhdp.2005.03.002","volume":"97","author":"ME Brown","year":"2005","unstructured":"Brown, M.E., Trevino, L.K., Harrison, D.A.: Ethical leadership: a social learning perspective for construct development and testing. Organ. Behav. Hum. Decis. Process. 97(2), 117\u2013134 (2005)","journal-title":"Organ. Behav. Hum. Decis. Process."},{"issue":"1","key":"13_CR33","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1007\/s10551-014-2075-1","volume":"134","author":"M Kos Koklic","year":"2016","unstructured":"Kos Koklic, M., Kukar-Kinney, M., Vida, I.: Three-level mechanism of consumer digital piracy: development and cross-cultural validation. J. Bus. Ethics 134(1), 15\u201327 (2016). \nhttps:\/\/doi.org\/10.1007\/s10551-014-2075-1","journal-title":"J. Bus. Ethics"},{"issue":"3","key":"13_CR34","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1080\/01972243.2017.1294125","volume":"33","author":"K Jetha","year":"2017","unstructured":"Jetha, K., Berente, N., King, J.L.: Digital and analog logics: an analysis of the discourse on property rights and information goods. Inf. Soc. 33(3), 119\u2013132 (2017)","journal-title":"Inf. Soc."},{"key":"13_CR35","volume-title":"Culture\u2019s Consequences: Comparing Values, Behaviors, Institutions, and Organizations Across Nations","author":"G Hofstede","year":"2001","unstructured":"Hofstede, G.: Culture\u2019s Consequences: Comparing Values, Behaviors, Institutions, and Organizations Across Nations. Sage Publications, Thousand Oaks (2001)"}],"container-title":["Lecture Notes in Computer Science","Sustainable Digital Communities"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-43687-2_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,19]],"date-time":"2020-03-19T18:03:40Z","timestamp":1584641020000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-43687-2_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030436865","9783030436872"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-43687-2_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"19 March 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"None.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declaration of Interest"}},{"value":"iConference","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Boras","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sweden","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 March 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 March 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iconference2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ischools.org\/iConference\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"ConfTool","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"178","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"27","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"48","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"15% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.8","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1.3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}