{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,11]],"date-time":"2025-07-11T10:23:35Z","timestamp":1752229415594,"version":"3.37.3"},"reference-count":79,"publisher":"Springer Science and Business Media LLC","issue":"9","license":[{"start":{"date-parts":[[2022,6,7]],"date-time":"2022-06-07T00:00:00Z","timestamp":1654560000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,6,7]],"date-time":"2022-06-07T00:00:00Z","timestamp":1654560000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Educ Inf Technol"],"published-print":{"date-parts":[[2022,11]]},"DOI":"10.1007\/s10639-022-11142-0","type":"journal-article","created":{"date-parts":[[2022,6,7]],"date-time":"2022-06-07T07:02:43Z","timestamp":1654585363000},"page":"12743-12771","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Analysis of awareness of academicians and graduate students about digital product copyrights with chi-squared automatic interaction detector"],"prefix":"10.1007","volume":"27","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3730-2363","authenticated-orcid":false,"given":"\u015eebnem","family":"KOLTAN YILMAZ","sequence":"first","affiliation":[]},{"given":"Arzu","family":"DEVEC\u0130 TOPAL","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,6,7]]},"reference":[{"issue":"4","key":"11142_CR1","first-page":"79","volume":"7","author":"AO Adebayo","year":"2019","unstructured":"Adebayo, A. O., & Chaubey, M. S. (2019). Data mining classification techniques on the analysis of student\u2019s performance. Global Scientific Journal GSJ, 7(4), 79\u201395","journal-title":"Global Scientific Journal GSJ"},{"key":"11142_CR2","doi-asserted-by":"crossref","unstructured":"Agarwal, S., Pandey, G. N., & Tiwari, M. D. (2012). Data mining in education: data classification and decision tree approach. International Journal of e-Education, e-Business, E-Management and e-Learning, 2(2), 140\u2013144","DOI":"10.7763\/IJEEEE.2012.V2.97"},{"key":"11142_CR3","unstructured":"Aggarwal, C. C. (2015). An introduction to data classification. (Edited by Aggarwal, C. C.) Data Classification Algorithms and Applications. IBM T. J. Watson Research Center Yorktown Heights, New York, USA Taylor & Francis Group"},{"issue":"1","key":"11142_CR4","first-page":"31","volume":"14","author":"AS Albayrak","year":"2009","unstructured":"Albayrak, A. S., & Koltan Y\u0131lmaz, S. (2009). Data mining: Decision tree algorithms and an application on ise data. Suleyman Demirel University The Journal of Faculty of Economics and Administrative Sciences, 14(1), 31\u201352","journal-title":"Suleyman Demirel University The Journal of Faculty of Economics and Administrative Sciences"},{"key":"11142_CR5","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1007\/s10551-005-1902-9","volume":"63","author":"S Al-Rafee","year":"2006","unstructured":"Al-Rafee, S., & Cronan, T. P. (2006). Digital piracy: Factors that influence attitude toward behavior. Journal Of Business Ethics, 63, 237\u2013259. https:\/\/doi.org\/10.1007\/s10551-005-1902-9","journal-title":"Journal Of Business Ethics"},{"issue":"3","key":"11142_CR6","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1016\/j.tele.2009.12.002","volume":"27","author":"S Al-Rafee","year":"2010","unstructured":"Al-Rafee, S., & Rouibah, K. (2010). The fight against digital piracy: An experiment. Telematics and Informatics, 27(3), 283\u2013292. https:\/\/doi.org\/10.1016\/j.tele.2009.12.002","journal-title":"Telematics and Informatics"},{"key":"11142_CR7","unstructured":"American University Library (2010). What faculty need to know about copyright for teaching. https:\/\/www.american.edu\/library\/documents\/upload\/copyright_for_teaching.pdf, 18.04.2022."},{"issue":"8","key":"11142_CR8","first-page":"51","volume":"4","author":"AB Annasaheb","year":"2016","unstructured":"Annasaheb, A. B., & Verma, V. K. (2016). Data mining classification techniques: A recent survey. International Journal of Emerging Technologies in Engineering Research (IJETER), 4(8), 51\u201354","journal-title":"International Journal of Emerging Technologies in Engineering Research (IJETER)"},{"issue":"1","key":"11142_CR9","first-page":"13","volume":"1","author":"I Atanasova","year":"2019","unstructured":"Atanasova, I. (2019). Copyright infringement in digital environment. Economics & Law, 1(1), 13\u201322","journal-title":"Economics & Law"},{"key":"11142_CR11","first-page":"261","volume":"23","author":"I Begum","year":"2018","unstructured":"Begum, I., & Sharma, H. K. (2018). Piracy: A threat to academicians and publishers. Journal of Intellectual Property Rights, 23, 261\u2013269","journal-title":"Journal of Intellectual Property Rights"},{"key":"11142_CR12","unstructured":"Besimo\u011flu, C. (2007). The differences between disciplines in the academisians usage of electronic journals. Unpublished master thesis. Hacettepe University, Social Science Institute, Ankara"},{"key":"11142_CR13","unstructured":"Butland, N. C., & Sullivan, J. J. (2018). Pirate tales from the deep [Web]: An exploration of online copyright infringement in the digital age.University of Massachusetts Law Review, 13 (1), Article 2."},{"key":"11142_CR14","volume-title":"Structural equation modeling with lisrel, prelis and simlis: Basic concepts, aplications and programming","author":"BM Byrne","year":"1998","unstructured":"Byrne, B. M. (1998). Structural equation modeling with lisrel, prelis and simlis: Basic concepts, aplications and programming. Mahwah, NJ: Lawrence Erlbaum Associates"},{"key":"11142_CR15","unstructured":"\u00c7elik, A. (2018). Investigation levels about of faculty of education students\u2019 awareness copyright issues in relation to digital products. Unpublished master thesis. Hacettepe University, Institute of Education Science, Ankara"},{"issue":"1","key":"11142_CR16","doi-asserted-by":"crossref","first-page":"140","DOI":"10.29137\/umagd.763490","volume":"13","author":"Z \u00c7etinkaya","year":"2021","unstructured":"\u00c7etinkaya, Z., & Horasan, F. (2021). Decision trees in large data sets. UMAGD, 13(1), 140\u2013151","journal-title":"UMAGD"},{"key":"11142_CR17","unstructured":"Chaouch, K. (2018). Digital copyright issues in Moroccan scientific research and higher education: The need for up-to-date legislation. (Editors: Taubman, A. et. al.) Research papers from the 2018 regional wipo-wto colloquium for ip teachers and scholars in Africa, 168\u2013183. WIPO Academy and the WTO Intellectual Property, Government Procurement and Competition Division"},{"issue":"2","key":"11142_CR18","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1080\/000368400110034253","volume":"34","author":"E Chiang","year":"2002","unstructured":"Chiang, E., & Assane, D. (2002). Software copyright infringement among college students. Applied Economics, 34(2), 157\u2013166. DOI: https:\/\/doi.org\/10.1080\/000368400110034253","journal-title":"Applied Economics"},{"key":"11142_CR19","unstructured":"Copyleft.org (2021). What is copyleft? https:\/\/copyleft.org\/ access date: 17.6.2021"},{"issue":"4","key":"11142_CR20","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1080\/0194262X.2016.1224994","volume":"35","author":"PH Dawson","year":"2016","unstructured":"Dawson, P. H., & Yang, S. Q. (2016). Institutional repositories, open access and copyright: What are the practices and implications? Science & Technology Libraries, 35(4), 279\u2013294. DOI:https:\/\/doi.org\/10.1080\/0194262X.2016.1224994","journal-title":"Science & Technology Libraries"},{"key":"11142_CR21","doi-asserted-by":"publisher","first-page":"29","DOI":"10.4236\/jss.2018.612003","volume":"6","author":"AP Dela Cruz","year":"2018","unstructured":"Dela Cruz, A. P. (2018). Predicting the relapse category in patients with tuberculosis: A Chi-Square Automatic Interaction Detector (CHAID) decision tree analysis. Open Journal of Social Sciences, 6, 29\u201336. https:\/\/doi.org\/10.4236\/jss.2018.612003","journal-title":"Open Journal of Social Sciences"},{"key":"11142_CR22","unstructured":"Demirtel, H., & Sa\u011f\u0131ro\u011flu, \u015e. (2011). Copylefted software: What and how secure are they? T\u00dcBAV Journal of Science, 4(1), 52\u201363. Retrieved from https:\/\/dergipark.org.tr\/en\/pub\/tubav\/issue\/21522\/230954"},{"key":"11142_CR23","doi-asserted-by":"publisher","unstructured":"Di Valentino, L. (2015). Awareness and perception of copyright among teaching faculty at Canadian universities. Partnership: The Canadian Journal of Library and Information Practice and Research, 10(2), 1\u201316. https:\/\/doi.org\/10.21083\/partnership.v10i2.3556","DOI":"10.21083\/partnership.v10i2.3556"},{"key":"11142_CR24","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1016\/j.jdmm.2016.01.006","volume":"5","author":"FM D\u00edaz-Perez","year":"2016","unstructured":"D\u00edaz-Perez, F. M., & Bethencourt-Cejas, B. (2016). CHAID algorithm as an appropriate analytical method for tourism market segmentation. Journal of Destination Marketing & Management, 5, 275\u2013282","journal-title":"Journal of Destination Marketing & Management"},{"key":"11142_CR25","first-page":"43","volume":"77","author":"J Dryden","year":"2014","unstructured":"Dryden, J. (2014). Just let it go? Controlling reuse of online holdings. Archivaria, 77, 43\u201371","journal-title":"Archivaria"},{"issue":"3","key":"11142_CR26","doi-asserted-by":"publisher","first-page":"453","DOI":"10.24136\/oc.2019.022","volume":"10","author":"M Durica","year":"2019","unstructured":"Durica, M., Frnda, J., & Svabova, L. (2019). Decision tree based model of business failure prediction for Polish companies. Oeconomia Copernicana, 10(3), 453\u2013469. 10.24136\/ oc.2019.022","journal-title":"Oeconomia Copernicana"},{"key":"11142_CR27","doi-asserted-by":"crossref","unstructured":"Elsayad, A. M., Al-Dhaifallah, M., & Nassef, A. M. (2018). Analysis and Diagnosis of Erythemato-Squamous Diseases using CHAID Decision Trees. 15th International Multi-Conference on Systems, Signals & Devices (SSD), 252\u2013262","DOI":"10.1109\/SSD.2018.8570553"},{"key":"11142_CR28","unstructured":"Federal Ministry of Education and Research (2020). Copyright in Academic Work - An Overview for Research, Teaching and Libraries. https:\/\/ctnr.med.uni-rostock.de\/fileadmin\/Zentren\/ctnr\/Download\/Handreichung_UrhWissG_eng.pdf, 01.04.2022"},{"key":"11142_CR29","unstructured":"Fitriasih, R., Hati, S. R. H., & Achyar, A. (2019). Piracy behavior among university students. In: Education excellence and innovation management through vision 2020, 6930\u20136941. 33rd International-Business-Information-Management-Association (IBIMA), Conference, Granada, SPAIN"},{"key":"11142_CR30","unstructured":"Free Software Foundation (2021). What is free software? https:\/\/www.fsf.org\/about\/what-is-free-software access date:17.6.2021"},{"issue":"5","key":"11142_CR31","doi-asserted-by":"publisher","first-page":"640","DOI":"10.1016\/j.im.2006.03.005","volume":"43","author":"LL Gan","year":"2006","unstructured":"Gan, L. L., & Koh, H. C. (2006). An empirical study of software piracy among tertiary institutions in Singapore. Information & Management, 43(5), 640\u2013649. https:\/\/doi.org\/10.1016\/j.im.2006.03.005","journal-title":"Information & Management"},{"issue":"1","key":"11142_CR32","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1177\/0266666919895550","volume":"37","author":"AK Ge\u00e7er","year":"2021","unstructured":"Ge\u00e7er, A. K., & Topal, A. D. (2021). Academic and postgraduate student awareness of digital product copyright issues. Information Development, 37(1), 90\u2013104","journal-title":"Information Development"},{"key":"11142_CR33","unstructured":"Go, & Globe (2021). Online Piracy in Numbers \u2013 Facts and Statistics [Infographic]. https:\/\/www.go-globe.com\/online-piracy\/"},{"key":"11142_CR34","doi-asserted-by":"publisher","first-page":"6728","DOI":"10.3390\/app11156728","volume":"11","author":"MA Hafeez","year":"2021","unstructured":"Hafeez, M. A., Rashid, M., Tariq, H., Abideen, Z. U., Alotaibi, S. S., & Sinky, M. H. (2021). Performance improvement of decision tree: A Robust classifier using Tabu Search algorithm. Appl Sci, 11, 6728","journal-title":"Appl Sci"},{"key":"11142_CR35","volume-title":"Data mining concepts and techniques","author":"J Han","year":"2012","unstructured":"Han, J., Kamber, M., & Pei, J. (2012). Data mining concepts and techniques. Waltham, USA: Morgan Kaufmann Publishers is an imprint of Elsevier, Third Edition"},{"key":"11142_CR36","unstructured":"He, C., & Lu, K. (2018). Risk management in SMEs with financial and nonfinancial indicators using business intelligence methods. Integrated Economy and Society: Diversity, Creativity and Technology MakeLearn and TIIM International Conference, 16\u201318 May, Naples, Italy"},{"key":"11142_CR37","unstructured":"Horava, T. (2011). Copyright discourse in the academy: Values, policies, and technology. Academic Matters Journal. https:\/\/academicmatters.ca\/copyright-discourse-in-the-academy-values-policies-and-technology\/"},{"key":"11142_CR38","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1177\/0047287507299571","volume":"46","author":"HC Hsu","year":"2007","unstructured":"Hsu, H. C., & Kang, S. K. (2007). CHAID- based segmentation: International visitors\u05f3 trip characteristics and perceptions. Journal of Travel Research, 46, 207\u2013216. DOI: https:\/\/doi.org\/10.1177\/0047287507299571","journal-title":"Journal of Travel Research"},{"issue":"4","key":"11142_CR39","first-page":"273","volume":"1","author":"A Is\u0131","year":"2014","unstructured":"Is\u0131, A., \u00d6zaydin, \u00d6., & Cemrek, F. (2014). Determination of factors affecting individuals\u2019 investment behaviour using CHAID analysis. Journal of Economics Finance and Accounting, 1(4), 273\u2013284","journal-title":"Journal of Economics Finance and Accounting"},{"key":"11142_CR40","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1007\/s11192-017-2291-4","volume":"112","author":"HR Jamali","year":"2017","unstructured":"Jamali, H. R. (2017). Copyright compliance and infringement in ResearchGate full-text journal articles. Scientometrics, 112, 241\u2013254. https:\/\/doi.org\/10.1007\/s11192-017-2291-4","journal-title":"Scientometrics"},{"key":"11142_CR41","unstructured":"Jing, L. (2021). Why is piracy such a problem in Europe? Red points. https:\/\/www.redpoints.com\/blog\/piracy-in-europe\/"},{"issue":"2","key":"11142_CR42","first-page":"119","volume":"29","author":"GV Kass","year":"1980","unstructured":"Kass, G. V. (1980). An exploratory technique for investigating large quantities of categorical data. Journal of the Royal Statistical Society Series C (Applied Statistics), 29(2), 119\u2013127","journal-title":"Journal of the Royal Statistical Society Series C (Applied Statistics)"},{"key":"11142_CR43","unstructured":"Kavcar, G. T\u00fcrkiye\u2019de Telif Haklar\u0131 Hukuku Ba\u011flam\u0131nda \u0130nternet Ortam\u0131nda Telif Haklar\u0131n\u0131n Korunmas\u0131 (Protection of Copyrights on the Internet in the Context of Copyright Law in Turkey). K\u0131l\u0131n\u00e7 Law, & Consulting (2020). https:\/\/kilinclaw.com.tr\/telif-haklari-hukukunda-internet-ortaminda-telif-haklarinin-korunmasi\/"},{"key":"11142_CR44","doi-asserted-by":"crossref","unstructured":"Kesavaraj, G., & Sukumaran, S. (2013). A Study on Classification Techniques in Data Mining. 4th ICCCNT, July 4\u20136, Tiruchengode, India","DOI":"10.1109\/ICCCNT.2013.6726842"},{"key":"11142_CR45","unstructured":"Kline, R. B. (1998). Principles and practice of structural equation modeling. NY: Guilford Press; 1998"},{"issue":"3","key":"11142_CR46","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1080\/01449290902765076","volume":"29","author":"NI Konstantakis","year":"2010","unstructured":"Konstantakis, N. I., Palaigeorgiou, G. E., Siozos, P. D., & Tsoukalas, I. A. (2010). What do computer science students think about software piracy? Behaviour & Information Technology, 29(3), 277\u2013285. Doi: https:\/\/doi.org\/10.1080\/01449290902765076","journal-title":"Behaviour & Information Technology"},{"key":"11142_CR47","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1007\/s10824-020-09390-4","volume":"45","author":"A KuklaGryz","year":"2021","unstructured":"KuklaGryz, A., Tyrowicz, J., & Krawczyk, M. (2021). Digital piracy and the perception of price fairness: evidence from a field experiment. Journal of Cultural Economics, 45, 105\u2013131","journal-title":"Journal of Cultural Economics"},{"issue":"4","key":"11142_CR48","doi-asserted-by":"publisher","first-page":"47","DOI":"10.15798\/kaici.10.4.200812.47","volume":"10","author":"WI Kwak","year":"2008","unstructured":"Kwak, W. I., & Choi, W. I. (2008). An exploratory study on the antecedent factors to the piracy of the digital copyrights. International Commerce and Information Review, 10(4), 47\u201362","journal-title":"International Commerce and Information Review"},{"key":"11142_CR49","unstructured":"Lagola, K. (2021). A Teacher\u2019s Guide to Copyright and Fair Use. George Lucas Educational Foundation, https:\/\/www.edutopia.org\/article\/teachers-guide-copyright-and-fair-use"},{"key":"11142_CR50","doi-asserted-by":"publisher","first-page":"359","DOI":"10.1016\/j.tourman.2014.07.011","volume":"46","author":"P Legoh\u00e9rel","year":"2015","unstructured":"Legoh\u00e9rel, P., Hsu, C. H. C., & Dauc\u00e9, B. (2015). Variety-seeking: Using the CHAID segmentation approach in analyzing the international traveler market. Tourism Management, 46, 359\u2013366","journal-title":"Tourism Management"},{"issue":"2","key":"11142_CR51","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1037\/1082-989X.1.2.130","volume":"1","author":"B MacCallum","year":"1996","unstructured":"MacCallum, B., Sugawara, MacCallum, R. C., Browne, M. W., & Sugawara, H. M. (1996). Power analysis and determination of sample size for covariance structure modeling.Psychological Methods, 1(2):130\u2013149. doi: https:\/\/doi.org\/10.1037\/1082-989X.1.2.130.","journal-title":"Psychological Methods"},{"key":"11142_CR52","doi-asserted-by":"publisher","unstructured":"Micunovic, M., & Balkovi\u0107, L. (2016). Author\u2019s rights in the digital age: How Internet and peer-to-peer file sharing technology shape the perception of copyrights and copywrongs. Libellarium: journal for the research of writing, books, and cultural heritage institutions, [S.l.], 8(2), 27\u201364. doi:https:\/\/doi.org\/10.15291\/libellarium.v0i0.232","DOI":"10.15291\/libellarium.v0i0.232"},{"issue":"4","key":"11142_CR53","doi-asserted-by":"publisher","first-page":"563","DOI":"10.1515\/ethemes-2016-0029","volume":"54","author":"M Milanovi\u0107","year":"2016","unstructured":"Milanovi\u0107, M., & Stamenkovi\u0107, M. (2016). CHAID Decision Tree: Methodological frame and application. Economic Themes, 54(4), 563\u2013586","journal-title":"Economic Themes"},{"key":"11142_CR54","unstructured":"Mishra, A., Gupta, B. B., Perakovi\u0107, D., & Pe\u00f1alvo, F. J. G. (2021). A Survey on Data mining classification approaches. International Conference on Smart Systems and Advanced Computing (Syscom-2021), December 25\u201326, 2021"},{"issue":"4","key":"11142_CR55","doi-asserted-by":"publisher","first-page":"735","DOI":"10.35808\/ersj\/1241","volume":"21","author":"VA Oganyan","year":"2018","unstructured":"Oganyan, V. A., Vinogradova, M. V., & Volkov, D. V. (2018). Internet piracy and vulnerability of digital content. European Research Studies Journal, 21(4), 735\u2013743","journal-title":"European Research Studies Journal"},{"issue":"4","key":"11142_CR56","doi-asserted-by":"publisher","first-page":"608","DOI":"10.13189\/ujer.2017.050410","volume":"5","author":"E \u00d6nder","year":"2017","unstructured":"\u00d6nder, E., & Uyar, \u015e. (2017). CHAID Analysis to determine socioeconomic variables that explain students\u2019 academic success. Universal Journal of Educational Research, 5(4), 608\u2013619. DOI: https:\/\/doi.org\/10.13189\/ujer.2017.050410. http:\/\/www.hrpub.org","journal-title":"Universal Journal of Educational Research"},{"key":"11142_CR57","unstructured":"Opensource.com (2021). What is open source? https:\/\/opensource.com\/resources\/what-open-source access date:17.6.2021"},{"key":"11142_CR58","unstructured":"Padil, H. M., Azmi, F., Ahmad, N. L., Shariffuddin, N., Nudin, N. A., & Razak, F. A. (2020). Awareness on Copyright Among Students. International Invention, Innovative & Creative (InIIC) Conference, Series 1\/2020, eISBN: 978-967-17324-8-9, MNNF Publisher"},{"issue":"2","key":"11142_CR59","doi-asserted-by":"publisher","first-page":"325","DOI":"10.24912\/jm.v20i2.51","volume":"20","author":"P Palus","year":"2016","unstructured":"Palus, P., & Haryanto, J. O. (2016). Consumer behavior prediction analysis based on rationalism and understanding about consequences towards pirated digital products. Jurnal Manajemen, 20(2), 325\u2013337. https:\/\/doi.org\/10.24912\/jm.v20i2.51","journal-title":"Jurnal Manajemen"},{"issue":"2","key":"11142_CR60","doi-asserted-by":"publisher","first-page":"122","DOI":"10.4067\/S0718-18762020000200108","volume":"15","author":"QT Pham","year":"2020","unstructured":"Pham, Q. T., Dang, N. M., & Nguyen, D. T. (2020). Factors affecting on the digital piracy behavior: An empirical study in Vietnam. Journal of Theoretical and Applied Electronic Commerce Research, 15(2), 122\u2013135","journal-title":"Journal of Theoretical and Applied Electronic Commerce Research"},{"key":"11142_CR61","unstructured":"Ramsey, C., & McCaughey, M. (2012). Copyright for Academics in the Digital Age. Academe 98(5), 10\u201317."},{"key":"11142_CR62","unstructured":"Rana, S. U. (2018). Copyrights infringement control awareness and practices in advertising agencies in Pakistan. Master degree project. University of Sk\u00f6vde. Pakistan"},{"issue":"6S2","key":"11142_CR63","first-page":"901","volume":"7","author":"AS Rao","year":"2019","unstructured":"Rao, A. S., Ramana, A. V., & Ramakrishna, S. (2019). Implementing the data mining approaches to classify the images with visual words. International Journal of Recent Technology and Engineering (IJRTE), 7(6S2), 901\u2013909","journal-title":"International Journal of Recent Technology and Engineering (IJRTE)"},{"key":"11142_CR64","first-page":"48","volume-title":"Contemporary Issues in Exploratory Data Mining in Behavioral Sciences","author":"G Ritschard","year":"2013","unstructured":"Ritschard, G. (2013). CHAID and Earlier Supervised Tree. In J. J. Methods, McArdle, & G. Ritschard (Eds.), Contemporary Issues in Exploratory Data Mining in Behavioral Sciences (pp. 48\u201374). New York: Routeledge"},{"key":"11142_CR65","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-25465-X_9","volume-title":"Data Mining and Knowledge Discovery Handbook","author":"L Rokach","year":"2005","unstructured":"Rokach, L., & Maimon, O. (2005). Decision Trees. In O. Maimon, & L. Rokach (Eds.), Data Mining and Knowledge Discovery Handbook. Boston, MA: Springer. https:\/\/doi.org\/10.1007\/0-387-25465-X_9"},{"issue":"5","key":"11142_CR66","doi-asserted-by":"publisher","first-page":"797","DOI":"10.51542\/ijscia.v2i5.22","volume":"2","author":"MNO Sadiku","year":"2021","unstructured":"Sadiku, M. N. O., Ashaolu, T. J., Ajayi-Majebi, A., & Musa, S. M. (2021). Digital piracy. International Journal of Scientific Advances, 2(5), 797\u2013800","journal-title":"International Journal of Scientific Advances"},{"issue":"19","key":"11142_CR67","first-page":"2589","volume":"7","author":"RR Shelke","year":"2020","unstructured":"Shelke, R. R., Archana, B., & Deshpande, S. A. (2020). Classification technique for super market dataset using mobile devices. Journal of Critical Reviews, 7(19), 2589\u20132592","journal-title":"Journal of Critical Reviews"},{"issue":"13","key":"11142_CR68","first-page":"1","volume":"13","author":"D Singh","year":"2013","unstructured":"Singh, D., Choudhary, N., & Samota, J. (2013). Analysis of data mining classification with decision tree technique. Global Journal of Computer Science and Technology Software & Data Engineering, 13(13), 1\u20135","journal-title":"Global Journal of Computer Science and Technology Software & Data Engineering"},{"issue":"2","key":"11142_CR69","doi-asserted-by":"publisher","first-page":"130","DOI":"10.11919\/j.issn.1002-0829.215044]","volume":"27","author":"Y Song","year":"2005","unstructured":"Song, Y., & Lu, Y. (2005). Decision tree methods: applications for classification and prediction. Shanghai Arch Psychiatry, 27(2), 130\u2013135. doi: https:\/\/doi.org\/10.11919\/j.issn.1002-0829.215044]","journal-title":"Shanghai Arch Psychiatry"},{"key":"11142_CR70","unstructured":"Stim, R. (2019). Copyright and Fair Use Overview (in Getting Permission 7th Edition) https:\/\/www.nolo.com\/"},{"issue":"5","key":"11142_CR71","doi-asserted-by":"publisher","first-page":"604","DOI":"10.17705\/1jais.00545","volume":"20","author":"KY Tam","year":"2019","unstructured":"Tam, K. Y., Feng, K. Y., & Kwan, S. (2019). The role of morality in digital piracy: Understanding the deterrent and motivational effects of moral reasoning in different piracy contexts. Journal of the Association for Information Systems, 20(5), 604\u2013628. DOI: https:\/\/doi.org\/10.17705\/1jais.00545","journal-title":"Journal of the Association for Information Systems"},{"key":"11142_CR72","unstructured":"Thongmak, M. (2014). Youth\u2019s intention to pirate digital products: Antecedents and consequences. UK Academy for Information Systems Conference Proceedings, 6. http:\/\/aisel.aisnet.org\/ukais2014\/"},{"key":"11142_CR73","doi-asserted-by":"publisher","first-page":"20","DOI":"10.38094\/jastt20165","volume":"02","author":"BT Tijo","year":"2021","unstructured":"Tijo, B. T., & Abdulazeez, A. M. (2021). Classification based on decision tree algorithm for machine learning. Journal of Applied Science and Technology Trends, 02, 01, 20\u201328","journal-title":"Journal of Applied Science and Technology Trends"},{"key":"11142_CR74","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/fi13010011","volume":"13","author":"\u0141 Tomczyk","year":"2021","unstructured":"Tomczyk, \u0141. (2021). Evaluation of digital piracy by youths. Future Internet, 13, 11, 1\u201326","journal-title":"Future Internet"},{"key":"11142_CR75","unstructured":"US, & Copyright Office, What is Copyright? https:\/\/www.copyright.gov\/what-is-copyright\/ access date: 17.6.2021"},{"issue":"61","key":"11142_CR76","first-page":"451","volume":"19","author":"N Uzg\u00f6ren","year":"2015","unstructured":"Uzg\u00f6ren, N., Kara, H., & Uzg\u00f6ren, E. (2015). Review of submissive acts tendencies of managers by CHAID analysis: A research on manager candidate student. EKEV Akademi Dergisi, 19(61), 451\u2013462","journal-title":"EKEV Akademi Dergisi"},{"issue":"8","key":"11142_CR77","doi-asserted-by":"publisher","first-page":"814","DOI":"10.1016\/j.is.2005.03.002","volume":"31","author":"M Van Diepen","year":"2006","unstructured":"Van Diepen, M., & Franses, P. H. (2006). Evaluating Chi-Squared Automatic Interaction Detection. Information Systems, 31(8), 814\u2013831","journal-title":"Information Systems"},{"issue":"4","key":"11142_CR78","doi-asserted-by":"publisher","first-page":"298","DOI":"10.1108\/17505931211282418","volume":"6","author":"I Vida","year":"2012","unstructured":"Vida, I., Kos Kokli\u010d, M., Kukar-Kinney, M., & Penz, E. (2012). Predicting consumer digital piracy behavior: The role of rationalization and perceived consequences. Journal of Research in Interactive Marketing, 6(4), 298\u2013313. https:\/\/doi.org\/10.1108\/17505931211282418","journal-title":"Journal of Research in Interactive Marketing"},{"key":"11142_CR79","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1016\/j.sbspro.2014.11.058","volume":"164","author":"H Wulandari","year":"2014","unstructured":"Wulandari, H. (2014). Economy and technology as influential factors for digital piracy sustainability: An Indonesian case. Procedia-Social and Behavioral Sciences, 164, 112\u2013117","journal-title":"Procedia-Social and Behavioral Sciences"},{"key":"11142_CR80","doi-asserted-by":"publisher","first-page":"405","DOI":"10.1007\/s10551-010-0687-7","volume":"100,","author":"C Yoon","year":"2011","unstructured":"Yoon, C. (2011). Theory of planned behavior and ethics theory in digital piracy: An integrated model. Journal Of Business Ethics, 100,, 405\u2013417. https:\/\/doi.org\/10.1007\/s10551-010-0687-7","journal-title":"Journal Of Business Ethics"}],"container-title":["Education and Information Technologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10639-022-11142-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10639-022-11142-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10639-022-11142-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,22]],"date-time":"2023-11-22T19:23:26Z","timestamp":1700681006000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10639-022-11142-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,7]]},"references-count":79,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2022,11]]}},"alternative-id":["11142"],"URL":"https:\/\/doi.org\/10.1007\/s10639-022-11142-0","relation":{},"ISSN":["1360-2357","1573-7608"],"issn-type":[{"type":"print","value":"1360-2357"},{"type":"electronic","value":"1573-7608"}],"subject":[],"published":{"date-parts":[[2022,6,7]]},"assertion":[{"value":"24 January 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 May 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 June 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 July 2022","order":4,"name":"change_date","label":"Change Date","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Update","order":5,"name":"change_type","label":"Change Type","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Springer Nature\u2019s version of this paper was updated: In the pdf version, Section numbers and placement of Figures 7-9 were revised.","order":6,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no competing interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}