{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T01:59:06Z","timestamp":1760061546804,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642217920"},{"type":"electronic","value":"9783642217937"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-21793-7_34","type":"book-chapter","created":{"date-parts":[[2011,6,26]],"date-time":"2011-06-26T14:48:21Z","timestamp":1309099701000},"page":"301-310","source":"Crossref","is-referenced-by-count":1,"title":["Modelling Social Cognitive Theory to Explain Software Piracy Intention"],"prefix":"10.1007","author":[{"given":"Ameetha","family":"Garbharran","sequence":"first","affiliation":[]},{"given":"Andrew","family":"Thatcher","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"34_CR1","unstructured":"Business Software Alliance, \n                    \n                      http:\/\/www.bsa.org\/country.aspx?sc_lang=en-ZA"},{"issue":"4","key":"34_CR2","doi-asserted-by":"publisher","first-page":"380","DOI":"10.1287\/isre.9.4.380","volume":"9","author":"R.D. Gopal","year":"1998","unstructured":"Gopal, R.D., Sanders, G.L.: International software piracy: Analysis of key issues and impacts. Info. Sys. Research\u00a09(4), 380\u2013397 (1998)","journal-title":"Info. Sys. Research"},{"key":"34_CR3","first-page":"182","volume-title":"Ethical Issues in information systems","author":"M.M. Eining","year":"1991","unstructured":"Eining, M.M., Christensen, A.L.: A psycho-social model of software piracy: the development and test of a model. In: Dejoie, R., Fowler, G., Paradice, D. (eds.) Ethical Issues in information systems, pp. 182\u2013188. Boyd & Fraser, Boston (1991)"},{"issue":"1","key":"34_CR4","first-page":"49","volume":"20","author":"D.J. Woolley","year":"2006","unstructured":"Woolley, D.J., Eining, M.M.: Software piracy among accounting students: A longitudinal comparison of changes and sensitivity. J. Info. Sys.\u00a020(1), 49\u201363 (2006)","journal-title":"J. Info. Sys."},{"key":"34_CR5","doi-asserted-by":"publisher","first-page":"1825","DOI":"10.1023\/A:1005721401993","volume":"17","author":"M.K. Chang","year":"1998","unstructured":"Chang, M.K.: Predicting unethical behavior: A comparison of the theory of reasoned action and the theory of planned behavior. J. Bus. Eth.\u00a017, 1825\u20131834 (1998)","journal-title":"J. Bus. Eth."},{"issue":"1","key":"34_CR6","first-page":"153","volume":"20","author":"A.G. Peace","year":"2003","unstructured":"Peace, A.G., Galletta, D.F., Thong, J.Y.L.: Software piracy in the workplace: A model and empirical test. J. Mngt. Info. Sys.\u00a020(1), 153\u2013177 (2003)","journal-title":"J. Mngt. Info. Sys."},{"key":"34_CR7","doi-asserted-by":"publisher","first-page":"527","DOI":"10.1007\/s10551-007-9366-8","volume":"78","author":"T.P. Cronan","year":"2008","unstructured":"Cronan, T.P., Al-Rafee, S.: Factors that influence the intention to pirate software and media. J. Bus. Eth.\u00a078, 527\u2013545 (2008)","journal-title":"J. Bus. Eth."},{"key":"34_CR8","doi-asserted-by":"publisher","first-page":"414","DOI":"10.1109\/TEM.2004.835087","volume":"51","author":"M. Limayem","year":"2004","unstructured":"Limayem, M., Khalifa, M., Chin, W.W.: Factors motivating software piracy: a longitudinal study. IEEE Trans. Eng. Mngt.\u00a051, 414\u2013425 (2004)","journal-title":"IEEE Trans. Eng. Mngt."},{"issue":"2","key":"34_CR9","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1089\/cpb.2006.9959","volume":"10","author":"R. LaRose","year":"2007","unstructured":"LaRose, R., Kim, J.: Share, steal or buy? A social cognitive perspective of music downloading. CyberPsych. & Beh.\u00a010(2), 267\u2013277 (2007)","journal-title":"CyberPsych. & Beh."},{"key":"34_CR10","volume-title":"Social foundations of thought and action: A social cognitive theory","author":"A. Bandura","year":"1986","unstructured":"Bandura, A.: Social foundations of thought and action: A social cognitive theory. Prentice-Hall, Englewood Cliffs (1986)"},{"key":"34_CR11","volume-title":"Self-efficacy: The exercise of control","author":"A. Bandura","year":"1997","unstructured":"Bandura, A.: Self-efficacy: The exercise of control. W.H. Freeman and Company, New York (1997)"},{"issue":"2","key":"34_CR12","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1177\/1090198104263660","volume":"31","author":"A. Bandura","year":"2004","unstructured":"Bandura, A.: Health promotion by social cognitive means. Health Educ. & Beh.\u00a031(2), 143\u2013164 (2004)","journal-title":"Health Educ. & Beh."},{"key":"34_CR13","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1016\/0749-5978(91)90020-T","volume":"50","author":"I. Ajzen","year":"1991","unstructured":"Ajzen, I.: The theory of planned behavior. Org. Beh. & Hum. Proc.\u00a050, 179\u2013211 (1991)","journal-title":"Org. Beh. & Hum. Proc."},{"issue":"2","key":"34_CR14","first-page":"87","volume":"7","author":"A. Garbharran","year":"2009","unstructured":"Garbharran, A., Thatcher, A.: A case for using a social cognitive model to explain intention to pirate software. J. eHealth Tech. & App.\u00a07(2), 87\u201398 (2009)","journal-title":"J. eHealth Tech. & App."},{"key":"34_CR15","unstructured":"Garbharran, A., Thatcher, A. (under review): Predicting software piracy intentions in organisations: Does organisation size matter? J. Bus. Eth. (2010)"},{"key":"34_CR16","doi-asserted-by":"publisher","first-page":"364","DOI":"10.1037\/0022-3514.71.2.364","volume":"71","author":"A. Bandura","year":"1996","unstructured":"Bandura, A., Barbaranelli, C., Caprara, G.V., Pastorelli, C.: Mechanisms of moral disengagement in the exercise of moral agency. J. Pers. & Soc. Psych.\u00a071, 364\u2013374 (1996)","journal-title":"J. Pers. & Soc. Psych."},{"key":"34_CR17","unstructured":"Matthews, M.S.: Bandura\u2019s social cognitive theory in a cross-nation study of software piracy. Unpublished masters research report. University of the Witwatersrand, Johannesburg, South Africa (2009)"},{"key":"34_CR18","unstructured":"Wentzell, A.: The implementation of social cognitive theory in the understanding of the unauthorised copying of software. Unpublished masters research report. University of the Witwatersrand, Johannesburg, South Africa (2008)"},{"key":"34_CR19","volume-title":"Confirmatory Factor Analysis for Applied Research","author":"T.A. Brown","year":"2006","unstructured":"Brown, T.A.: Confirmatory Factor Analysis for Applied Research. The Guilford Press, New York (2006)"}],"container-title":["Lecture Notes in Computer Science","Human Interface and the Management of Information. Interacting with Information"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-21793-7_34","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,22]],"date-time":"2020-02-22T22:46:47Z","timestamp":1582411607000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-21793-7_34"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642217920","9783642217937"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-21793-7_34","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}