{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,27]],"date-time":"2025-09-27T08:06:17Z","timestamp":1758960377348},"reference-count":54,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2015,9,1]],"date-time":"2015-09-01T00:00:00Z","timestamp":1441065600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Ethics Inf Technol"],"published-print":{"date-parts":[[2015,9]]},"DOI":"10.1007\/s10676-015-9376-7","type":"journal-article","created":{"date-parts":[[2015,9,2]],"date-time":"2015-09-02T08:09:51Z","timestamp":1441181391000},"page":"211-218","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["The association of moral development and moral intensity with music piracy"],"prefix":"10.1007","volume":"17","author":[{"given":"Darryl J.","family":"Woolley","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,9,3]]},"reference":[{"issue":"2","key":"9376_CR1","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1016\/0749-5978(91)90020-T","volume":"50","author":"I Ajzen","year":"1991","unstructured":"Ajzen, I. (1991). The theory of planned behavior. Organizational Behavior and Human Decision Processes, 50(2), 179\u2013211.","journal-title":"Organizational Behavior and Human Decision Processes"},{"issue":"3","key":"9376_CR2","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1007\/s10551-005-1902-9","volume":"63","author":"S Al-Rafee","year":"2006","unstructured":"Al-Rafee, S., & Cronan, T. (2006). Digital piracy: Factors that influence attitude toward behavior. Journal of Business Ethics, 63(3), 237\u2013259.","journal-title":"Journal of Business Ethics"},{"issue":"1","key":"9376_CR3","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1007\/s10676-008-9179-1","volume":"11","author":"S Altschuller","year":"2009","unstructured":"Altschuller, S., & Benbunan-fich, R. (2009). Is music downloading the new prohibition? What students reveal through an ethical dilemma. Ethics and Information Technology, 11(1), 49\u201356. doi: 10.1007\/s10676-008-9179-1 .","journal-title":"Ethics and Information Technology"},{"issue":"3","key":"9376_CR4","doi-asserted-by":"crossref","first-page":"309","DOI":"10.1007\/s10551-008-9772-6","volume":"85","author":"N Andreoli","year":"2009","unstructured":"Andreoli, N., & Lefkowitz, J. (2009). Individual and organizational antecedents of misconduct in organizations. Journal of Business Ethics, 85(3), 309\u2013332.","journal-title":"Journal of Business Ethics"},{"issue":"2","key":"9376_CR5","doi-asserted-by":"crossref","first-page":"159","DOI":"10.1006\/cpac.2001.0496","volume":"13","author":"D Bay","year":"2002","unstructured":"Bay, D. (2002). A critical evaluation of the use of the dit in accounting ethics research. Critical Perspectives on Accounting, 13(2), 159.","journal-title":"Critical Perspectives on Accounting"},{"issue":"3\/4","key":"9376_CR6","first-page":"157","volume":"84","author":"MT Bender","year":"2009","unstructured":"Bender, M. T., & Wang, Y. (2009). The impact of digital piracy on music sales: A cross-country analysis. International Social Science Review, 84(3\/4), 157\u2013170.","journal-title":"International Social Science Review"},{"key":"9376_CR7","unstructured":"BSA. (2011). http:\/\/www.bsa.org\/country\/Research%20and%20Statistics.aspx . Accessed June 7, 2011."},{"issue":"3","key":"9376_CR8","doi-asserted-by":"crossref","first-page":"361","DOI":"10.1007\/s10551-009-0046-8","volume":"90","author":"M-F Chen","year":"2009","unstructured":"Chen, M.-F., Pan, C.-T., & Pan, M.-C. (2009). The joint moderating impact of moral intensity and moral judgment on consumer\u2019s use intention of pirated software. Journal of Business Ethics, 90(3), 361\u2013373.","journal-title":"Journal of Business Ethics"},{"issue":"1","key":"9376_CR9","first-page":"67","volume":"5","author":"AL Christensen","year":"1991","unstructured":"Christensen, A. L., & Eining, M. M. (1991). Factors influencing software piracy: Implications for accountants. Journal of Information Systems, 5(1), 67\u201380.","journal-title":"Journal of Information Systems"},{"issue":"2","key":"9376_CR10","doi-asserted-by":"crossref","first-page":"125","DOI":"10.1287\/mnsc.37.2.125","volume":"37","author":"KR Conner","year":"1991","unstructured":"Conner, K. R., & Rumelt, R. P. (1991). Software piracy: An analysis of protection strategies. Management Science, 37(2), 125\u2013139.","journal-title":"Management Science"},{"key":"9376_CR11","doi-asserted-by":"crossref","first-page":"527","DOI":"10.1007\/s10551-007-9366-8","volume":"78","author":"T Cronan","year":"2008","unstructured":"Cronan, T., & Al-Rafee, S. (2008). Factors that influence the intention to pirate software and media. Journal of Business Ethics, 78, 527\u2013545.","journal-title":"Journal of Business Ethics"},{"key":"9376_CR12","volume-title":"Discovering statistcs using SPSS","author":"A Field","year":"2005","unstructured":"Field, A. (2005). Discovering statistcs using SPSS. London: Sage Publications."},{"key":"9376_CR13","volume-title":"Belief, attitude, intention and behavior","author":"M Fishbein","year":"1975","unstructured":"Fishbein, M., & Ajzen, I. (1975). Belief, attitude, intention and behavior. Reading, MA: Addison-Wsley."},{"key":"9376_CR14","first-page":"88","volume":"199","author":"M Garis","year":"2010","unstructured":"Garis, M. (2010). Meeting the challenges of digitalisation. Managing Intellectual Property, 199, 88\u201390.","journal-title":"Managing Intellectual Property"},{"issue":"1","key":"9376_CR15","doi-asserted-by":"crossref","first-page":"29","DOI":"10.2307\/1252012","volume":"59","author":"M Givon","year":"1995","unstructured":"Givon, M., Mahajan, V., & Muller, E. (1995). Software piracy: Estimation of lost sales and the impact on software diffusion. Journal of Marketing, 59(1), 29.","journal-title":"Journal of Marketing"},{"issue":"11","key":"9376_CR16","doi-asserted-by":"crossref","first-page":"1189","DOI":"10.1007\/BF00412817","volume":"15","author":"RS Glass","year":"1996","unstructured":"Glass, R. S., & Wood, W. A. (1996). Situational determinants of software piracy: An equity theory perspective. Journal of Business Ethics, 15(11), 1189\u20131198.","journal-title":"Journal of Business Ethics"},{"issue":"4","key":"9376_CR17","doi-asserted-by":"crossref","first-page":"481","DOI":"10.1007\/s10551-007-9361-0","volume":"77","author":"T Goles","year":"2008","unstructured":"Goles, T., Jayatilaka, B., George, B., Parsons, L., Chambers, V., Taylor, D., et al. (2008). Softlifting: Exploring determinants of attitude. Journal of Business Ethics, 77(4), 481\u2013499.","journal-title":"Journal of Business Ethics"},{"key":"9376_CR18","doi-asserted-by":"crossref","unstructured":"Goodman. (2007, June 14). Why media owners will never make DRM work. New Media Age, p. 10.","DOI":"10.11157\/medianz-vol10iss1id72"},{"key":"9376_CR19","first-page":"42","volume":"4082","author":"H Green","year":"2008","unstructured":"Green, H., & Rutledge, S. (2008). Does she look like a music pirate? BusinessWeek, 4082, 42\u201347.","journal-title":"BusinessWeek"},{"key":"9376_CR20","doi-asserted-by":"crossref","first-page":"291","DOI":"10.1207\/s15326926clp1003_2","volume":"10","author":"C Imfeld","year":"2005","unstructured":"Imfeld, C., & Ekstrand, V. S. (2005). The music industry and the legislative development of the Digital Millennium Copyright Act\u2019s online service provider provision. Communication Law and Policy, 10, 291\u2013312.","journal-title":"Communication Law and Policy"},{"issue":"2","key":"9376_CR21","doi-asserted-by":"crossref","first-page":"366","DOI":"10.5465\/amr.1991.4278958","volume":"16","author":"TM Jones","year":"1991","unstructured":"Jones, T. M. (1991). Ethical decision making by individuals in organizations: An issue-contingent model. Academy of Management Review, 16(2), 366\u2013395.","journal-title":"Academy of Management Review"},{"issue":"3","key":"9376_CR22","first-page":"93","volume":"17","author":"L Josien","year":"2013","unstructured":"Josien, L., & Broderick, B. (2013). Cheating in higher education: The case of multi-methods cheaters. Academy of Educational Leadership Journal, 17(3), 93\u2013105.","journal-title":"Academy of Educational Leadership Journal"},{"key":"9376_CR23","volume-title":"The philosophy of moral development: Moral stages and the idea of justice","author":"L Kohlberg","year":"1981","unstructured":"Kohlberg, L. (1981). The philosophy of moral development: Moral stages and the idea of justice. San Francisco: Harper & Row."},{"issue":"3","key":"9376_CR24","doi-asserted-by":"crossref","first-page":"277","DOI":"10.1080\/01449290902765076","volume":"29","author":"NI Konstantakis","year":"2010","unstructured":"Konstantakis, N. I., Palaigeorgiou, G. E., Siozos, P. D., & Tsoukalas, I. A. (2010). What do computer science students think about software piracy. Behavior & Information Technology, 29(3), 277\u2013285.","journal-title":"Behavior & Information Technology"},{"issue":"2","key":"9376_CR25","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1007\/s10551-009-0081-5","volume":"91","author":"C Liao","year":"2010","unstructured":"Liao, C., Lin, H.-N., & Liu, Y.-P. (2010). Predicting the use of pirated software: A contingency model integrating perceived risk with the Theory of Planned Behavior. Journal of Business Ethics, 91(2), 237\u2013252. doi: 10.1007\/s10551-009-0081-5 .","journal-title":"Journal of Business Ethics"},{"key":"9376_CR26","doi-asserted-by":"crossref","first-page":"537","DOI":"10.1007\/s10551-010-0605-z","volume":"90","author":"J Logsdon","year":"2009","unstructured":"Logsdon, J., & Patterson, K. (2009). Deception in business networks: Is it easier to lie online? Journal of Business Ethics, 90, 537\u2013549. doi: 10.1007\/s10551-010-0605-z .","journal-title":"Journal of Business Ethics"},{"issue":"11","key":"9376_CR27","doi-asserted-by":"crossref","first-page":"849","DOI":"10.1007\/BF00871698","volume":"13","author":"JM Logsdon","year":"1994","unstructured":"Logsdon, J. M., Thompson, J. K., & Reid, R. A. (1994). Software piracy: Is it related to level of moral judgment? Journal of Business Ethics, 13(11), 849\u2013857.","journal-title":"Journal of Business Ethics"},{"issue":"1","key":"9376_CR28","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10676-008-9165-7","volume":"11","author":"JM McMahon","year":"2009","unstructured":"McMahon, J. M., & Cohen, R. (2009). Lost in cyberspace: Ethical decision making in the online environment. Ethics and Information Technology, 11(1), 1\u201317. doi: 10.1007\/s10676-008-9165-7 .","journal-title":"Ethics and Information Technology"},{"issue":"2","key":"9376_CR29","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1007\/s10551-008-9765-5","volume":"85","author":"J Mencl","year":"2009","unstructured":"Mencl, J., & May, D. (2009). The effects of proximity and empathy on ethical decision-making: An exploratory investigation. Journal of Business Ethics, 85(2), 201\u2013226.","journal-title":"Journal of Business Ethics"},{"issue":"1","key":"9376_CR30","doi-asserted-by":"crossref","first-page":"1","DOI":"10.4018\/jgim.2010091101","volume":"18","author":"TT Moores","year":"2010","unstructured":"Moores, T. T. (2010). Untangling the web of relationships between wealth, culture, and global software piracy rates: A path model. Journal of Global Information Management, 18(1), 1\u201314.","journal-title":"Journal of Global Information Management"},{"issue":"1","key":"9376_CR31","doi-asserted-by":"crossref","first-page":"167","DOI":"10.2307\/25148722","volume":"30","author":"TT Moores","year":"2006","unstructured":"Moores, T. T., & Chang, J. C.-J. (2006). Ethical decision making in software piracy: Initial development and test of a four-component model. MIS Quarterly, 30(1), 167\u2013180.","journal-title":"MIS Quarterly"},{"key":"9376_CR32","volume-title":"Human inference: Strategies and shortcomings of social judgment","author":"RE Nisbett","year":"1980","unstructured":"Nisbett, R. E., & Ross, L. (1980). Human inference: Strategies and shortcomings of social judgment. Englewood Cliffs, NJ: Prentice-Hall."},{"issue":"1","key":"9376_CR33","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1080\/07421222.2003.11045759","volume":"20","author":"AG Peace","year":"2003","unstructured":"Peace, A. G., Galletta, D. F., & Thong, J. Y. L. (2003). Software piracy in the workplace: A model and empirical test. Journal of Management Information Systems, 20(1), 153\u2013177.","journal-title":"Journal of Management Information Systems"},{"key":"9376_CR34","volume-title":"The psychology of judgment and decision making","author":"S Plous","year":"1993","unstructured":"Plous, S. (1993). The psychology of judgment and decision making. Philadelphia: Temple University Press."},{"issue":"2","key":"9376_CR35","doi-asserted-by":"crossref","first-page":"180","DOI":"10.1080\/15332860802067664","volume":"7","author":"JS Podoshen","year":"2008","unstructured":"Podoshen, J. S. (2008). Why take tunes? An exploratory multinational look at student downloading. Journal of Internet Commerce, 7(2), 180\u2013202.","journal-title":"Journal of Internet Commerce"},{"issue":"3\/4","key":"9376_CR36","doi-asserted-by":"crossref","first-page":"239","DOI":"10.1016\/0361-3682(92)90023-L","volume":"17","author":"LA Ponemon","year":"1992","unstructured":"Ponemon, L. A. (1992). Ethical reasoning and selection-socialization in accounting. Accounting, Organizations and Society, 17(3\/4), 239\u2013258.","journal-title":"Accounting, Organizations and Society"},{"key":"9376_CR37","volume-title":"Development in judging moral issues","author":"JR Rest","year":"1979","unstructured":"Rest, J. R. (1979). Development in judging moral issues. Minneapolis: University of Minnesota Press."},{"key":"9376_CR38","volume-title":"Moral development: Advances in research and theory","author":"JR Rest","year":"1986","unstructured":"Rest, J. R. (1986). Moral development: Advances in research and theory. New York: Praeger."},{"key":"9376_CR39","doi-asserted-by":"crossref","DOI":"10.4324\/9781410603913","volume-title":"Postconventional moral thinking: A Neo-Kohlbergian approach","author":"JR Rest","year":"1999","unstructured":"Rest, J. R. (1999). Postconventional moral thinking: A Neo-Kohlbergian approach. Mahwah, NJ: L. Erlbaum Associates."},{"issue":"4","key":"9376_CR40","doi-asserted-by":"crossref","first-page":"644","DOI":"10.1037\/0022-0663.91.4.644","volume":"91","author":"JR Rest","year":"1999","unstructured":"Rest, J. R., & Narvaez, D. (1999). DIT2: Devising and testing a revised instrument of moral judgment. Journal of Educational Psychology, 91(4), 644.","journal-title":"Journal of Educational Psychology"},{"issue":"4","key":"9376_CR41","doi-asserted-by":"crossref","first-page":"291","DOI":"10.1023\/A:1022053215271","volume":"11","author":"JR Rest","year":"1999","unstructured":"Rest, J. R., Narvaez, D., Bebeau, M., & Thoma, S. (1999). A neo-Kohlbergian approach: The DIT and schema theory. Educational Psychology Review, 11(4), 291\u2013324.","journal-title":"Educational Psychology Review"},{"issue":"2","key":"9376_CR42","doi-asserted-by":"crossref","first-page":"225","DOI":"10.1111\/j.1467-6494.1969.tb01742.x","volume":"37","author":"JR Rest","year":"1969","unstructured":"Rest, J. R., Turiel, E., & Kohlberg, L. (1969). Level of moral development as a determinant of preference and comprehension of moral judgments made by others. Journal of Personality, 37(2), 225.","journal-title":"Journal of Personality"},{"key":"9376_CR43","unstructured":"RIAA. (2011). Scope of the problem. http:\/\/riaa.com\/physicalpiracy.php?content_selector=piracy-online-scope-of-the-problem . Accessed June 7, 2011."},{"issue":"4","key":"9376_CR44","doi-asserted-by":"crossref","first-page":"467","DOI":"10.2307\/1386857","volume":"31","author":"SP Richards","year":"1992","unstructured":"Richards, S. P., & Davison, M. L. (1992). Religious bias in moral development research: A psychometric investigation. Journal for the Scientific Study of Religion, 31(4), 467.","journal-title":"Journal for the Scientific Study of Religion"},{"key":"9376_CR45","unstructured":"Rosencrance, L. (2003). BSA survey: Campus attitudes invite software piracy. http:\/\/www.computerworld.com\/s\/article\/85017\/BSA_survey_Campus_attitudes_invite_software_piracy?taxonomyId=070 . Accessed June 7, 2011."},{"key":"9376_CR46","first-page":"651","volume":"21","author":"Mark F Schultz","year":"2006","unstructured":"Schultz, Mark F. (2006). Fear and norms & rock & roll: What Jambands can teach us about persuading people to obey copyright law. Berkeley Technology Law Journal, 21, 651\u2013728.","journal-title":"Berkeley Technology Law Journal"},{"key":"9376_CR47","unstructured":"Scott, M. (2008, February 25). Anti-piracy plan threatens free speech. Business Week Online, p. 18."},{"issue":"8","key":"9376_CR48","doi-asserted-by":"crossref","first-page":"839","DOI":"10.1007\/BF00381852","volume":"15","author":"RR Sims","year":"1996","unstructured":"Sims, R. R., Cheng, H. K., & Teegen, H. (1996). Toward a profile of student software piraters. Journal of Business Ethics, 15(8), 839\u2013849.","journal-title":"Journal of Business Ethics"},{"issue":"4","key":"9376_CR49","doi-asserted-by":"crossref","first-page":"387","DOI":"10.1111\/j.1365-2575.2004.00179.x","volume":"14","author":"M Siponen","year":"2004","unstructured":"Siponen, M., & Vartiainen, T. (2004). Unauthorized copying of software and levels of moral development: A literature analysis and its implications for research and practice. Information Systems Journal, 14(4), 387\u2013407. doi: 10.1111\/j.1365-2575.2004.00179.x .","journal-title":"Information Systems Journal"},{"issue":"2\/3","key":"9376_CR50","doi-asserted-by":"crossref","first-page":"96","DOI":"10.1108\/07363760210420531","volume":"19","author":"B Tan","year":"2002","unstructured":"Tan, B. (2002). Understanding consumer ethical decision making with respect to purchase of pirated software. Journal of Consumer Marketing, 19(2\/3), 96\u2013111.","journal-title":"Journal of Consumer Marketing"},{"issue":"4","key":"9376_CR51","doi-asserted-by":"crossref","first-page":"419","DOI":"10.1177\/001872679304600401","volume":"46","author":"CS Taylor","year":"1993","unstructured":"Taylor, C. S., & Shim, J. P. (1993). A comparative examination of attitudes toward software piracy among business professors and executives. Human Relations, 46(4), 419\u2013434.","journal-title":"Human Relations"},{"issue":"1","key":"9376_CR52","first-page":"31","volume":"13","author":"DJ Woolley","year":"2010","unstructured":"Woolley, D. J. (2010). The cynical pirate: How cynicism effects music piracy. Academy of Information and Management Sciences Journal, 13(1), 31\u201344.","journal-title":"Academy of Information and Management Sciences Journal"},{"issue":"1","key":"9376_CR53","doi-asserted-by":"crossref","first-page":"49","DOI":"10.2308\/jis.2006.20.1.49","volume":"20","author":"DJ Woolley","year":"2006","unstructured":"Woolley, D. J., & Eining, M. M. (2006). Software piracy among accounting students: A longitudinal comparison of changes and sensitivity. Journal of Information Systems, 20(1), 49\u201363.","journal-title":"Journal of Information Systems"},{"issue":"3","key":"9376_CR54","doi-asserted-by":"crossref","first-page":"405","DOI":"10.1007\/s10551-010-0687-7","volume":"100","author":"C Yoon","year":"2011","unstructured":"Yoon, C. (2011). Theory of planned behavior and ethics theory in digital piracy: An integrated model. Journal of Business Ethics, 100(3), 405\u2013417.","journal-title":"Journal of Business Ethics"}],"container-title":["Ethics and Information Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-015-9376-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10676-015-9376-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-015-9376-7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,30]],"date-time":"2019-08-30T02:49:50Z","timestamp":1567133390000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10676-015-9376-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,9]]},"references-count":54,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2015,9]]}},"alternative-id":["9376"],"URL":"https:\/\/doi.org\/10.1007\/s10676-015-9376-7","relation":{},"ISSN":["1388-1957","1572-8439"],"issn-type":[{"value":"1388-1957","type":"print"},{"value":"1572-8439","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,9]]}}}