{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,12,30]],"date-time":"2024-12-30T19:10:25Z","timestamp":1735585825151},"reference-count":64,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2022,12,3]],"date-time":"2022-12-03T00:00:00Z","timestamp":1670025600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,12,3]],"date-time":"2022-12-03T00:00:00Z","timestamp":1670025600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Inf Syst Front"],"published-print":{"date-parts":[[2023,12]]},"DOI":"10.1007\/s10796-022-10358-2","type":"journal-article","created":{"date-parts":[[2022,12,3]],"date-time":"2022-12-03T11:02:49Z","timestamp":1670065369000},"page":"2377-2392","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Understanding Online Music Piracy Behavior via Private Communication Channels"],"prefix":"10.1007","volume":"25","author":[{"given":"Soomin","family":"Park","sequence":"first","affiliation":[]},{"given":"Junghoon","family":"Moon","sequence":"additional","affiliation":[]},{"given":"Cheul","family":"Rhee","sequence":"additional","affiliation":[]},{"given":"Young-Chan","family":"Choe","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,12,3]]},"reference":[{"issue":"2","key":"10358_CR1","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1016\/0749-5978(91)90020-T","volume":"50","author":"I Ajzen","year":"1991","unstructured":"Ajzen, I. (1991). The theory of planned behavior. Organizational Behavior and Human Decision Processes, 50(2), 179\u2013211.","journal-title":"Organizational Behavior and Human Decision Processes"},{"issue":"3","key":"10358_CR2","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1007\/s10551-005-1902-9","volume":"63","author":"S Al-Rafee","year":"2006","unstructured":"Al-Rafee, S., & Cronan, T. P. (2006). Digital piracy: factors that influence attitude toward behavior. Journal of Business Ethics, 63(3), 237\u2013259.","journal-title":"Journal of Business Ethics"},{"issue":"1","key":"10358_CR3","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1016\/S0883-9026(01)00068-4","volume":"18","author":"A Ardichvili","year":"2003","unstructured":"Ardichvili, A., Cardozo, R., & Ray, S. (2003). A theory of entrepreneurial opportunity identification and development. Journal of Business Venturing, 18(1), 105\u2013123.","journal-title":"Journal of Business Venturing"},{"issue":"2","key":"10358_CR4","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1002\/dir.10006","volume":"16","author":"RP Bagozzi","year":"2002","unstructured":"Bagozzi, R. P., & Dholakia, U. M. (2002). Intentional social action in virtual communities. Journal of Interactive Marketing, 16(2), 2\u201321.","journal-title":"Journal of Interactive Marketing"},{"issue":"2","key":"10358_CR5","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1207\/s1532785xmep0802_3","volume":"8","author":"RP Bagozzi","year":"2006","unstructured":"Bagozzi, R. P., Dholakia, U. M., & Mookerjee, A. (2006). Individual and group bases of social influence in online environments. Media Psychology, 8(2), 95\u2013126.","journal-title":"Media Psychology"},{"issue":"1","key":"10358_CR6","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1080\/15213260709336804","volume":"9","author":"RP Bagozzi","year":"2007","unstructured":"Bagozzi, R. P., Dholakia, U. M., & Pearo, L. R. K. (2007). Antecedents and consequences of online social interactions. Media Psychology, 9(1), 77\u2013114.","journal-title":"Media Psychology"},{"key":"10358_CR7","doi-asserted-by":"crossref","unstructured":"Batson, C. D., & Powell, A. A. (1998). Altruism and prosocial behavior. In T. Millon, & M. J. Lerner (Eds.), Handbook of psychology: personality and social psychology (5 vol., pp. 463\u2013484). Wiley.","DOI":"10.1002\/0471264385.wei0519"},{"key":"10358_CR8","unstructured":"Baumeister, R. F. (1998). The self. In R. F. Baumeister, & E. J. Finkel (Eds.), Advanced social psychology: the state of the science (pp. 139\u2013175). Oxford University Press."},{"issue":"1","key":"10358_CR9","doi-asserted-by":"publisher","first-page":"31","DOI":"10.2307\/249677","volume":"22","author":"Debasish Banerjee","year":"1998","unstructured":"Banerjee, D., Cronan, T. P.,& Jones, T. W. (1998). Modeling IT ethics: a study in situational ethics. MIS\nQuarterly, 22(1), 31\u201360.","journal-title":"MIS Quarterly"},{"issue":"3","key":"10358_CR10","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1111\/isj.12069","volume":"25","author":"J Beekhuyzen","year":"2015","unstructured":"Beekhuyzen, J., von Hellens, L., & Nielsen, S. (2015). Illuminating the underground: the reality of unauthorised file sharing. Information Systems Journal, 25(3), 171\u2013192.","journal-title":"Information Systems Journal"},{"issue":"4","key":"10358_CR11","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1007\/s10796-009-9202-z","volume":"12","author":"B Begier","year":"2010","unstructured":"Begier, B. (2010). Users\u2019 involvement may help respect social and ethical values and improve software quality. Information Systems Frontiers, 12(4), 389\u2013397.","journal-title":"Information Systems Frontiers"},{"issue":"4","key":"10358_CR12","doi-asserted-by":"publisher","first-page":"555","DOI":"10.1348\/014466600164633","volume":"39","author":"Massimo Bergami","year":"2000","unstructured":"Bergami, M., & Bagozzi, R. P. (2000) Self-categorization affective commitment and group self-esteem as distinct aspects of social identity in the organization. British Journal of Social Psychology, 39(4), 555\u2013577.","journal-title":"British Journal of Social Psychology"},{"key":"10358_CR13","doi-asserted-by":"publisher","unstructured":"Bhattacharjee, S., Gopal, R. D., Lertwachara, K., & Marsden, J. R. (2003). Economic of online music. Proceedings of the 5th international conference on Electronic commerce, 300\u2013309. https:\/\/doi.org\/10.1145\/948005.948045","DOI":"10.1145\/948005.948045"},{"issue":"1","key":"10358_CR14","doi-asserted-by":"publisher","first-page":"87","DOI":"10.2307\/25148669","volume":"29","author":"GW Bock","year":"2005","unstructured":"Bock, G. W., Zmud, R. W., Kim, Y. G., & Lee, J. N. (2005). Behavioral intention formation in knowledge sharing: examining the roles of extrinsic motivators, social-psychological forces, and organizational climate. MIS Quarterly, 29(1), 87\u2013111.","journal-title":"MIS Quarterly"},{"key":"10358_CR15","unstructured":"Chatterley, A. (2022). 2021 MUSO Discover priacy by industry data review. https:\/\/f.hubspotusercontent40.net\/hubfs\/6347345\/2021%20MUSO%20Discover%20Piracy%20by%20Industry%20Data%20Review.pdf."},{"issue":"2","key":"10358_CR16","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1287\/isre.14.2.189.16018","volume":"14","author":"W Chin","year":"2003","unstructured":"Chin, W., Marcolin, B., & Newsted, P. (2003). A partial least squares latent variable modeling approach for measuring interaction effects: results from a Monte Carlo simulation study and an electronic-mail emotion\/adoption study. Information Systems Research, 14(2), 189\u2013217.","journal-title":"Information Systems Research"},{"issue":"1","key":"10358_CR17","first-page":"vii","volume":"22","author":"WW Chin","year":"1998","unstructured":"Chin, W. W. (1998). Commentary: issues and opinion on structural equation modeling. MIS quarterly, 22(1), vii\u2013xvi.","journal-title":"MIS quarterly"},{"issue":"2","key":"10358_CR18","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/s10551-004-5263-6","volume":"57","author":"JS Chiou","year":"2005","unstructured":"Chiou, J. S., Huang, C., & Lee, H. (2005). The antecedents of music piracy attitudes and intentions. Journal of Business Ethics, 57(2), 161\u2013174.","journal-title":"Journal of Business Ethics"},{"key":"10358_CR19","doi-asserted-by":"publisher","first-page":"591","DOI":"10.1146\/annurev.psych.55.090902.142015","volume":"55","author":"RB Cialdini","year":"2004","unstructured":"Cialdini, R. B., & Goldstein, N. J. (2004). Social influence: compliance and conformity. Annual Review of Psychology, 55, 591\u2013621.","journal-title":"Annual Review of Psychology"},{"issue":"3","key":"10358_CR20","first-page":"2","volume":"1","author":"E Cohen","year":"1989","unstructured":"Cohen, E., & Cornwell, L. (1989). College students believe piracy is acceptable. Journal of Information Systems Education, 1(3), 2\u20135.","journal-title":"Journal of Information Systems Education"},{"issue":"2","key":"10358_CR21","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1287\/orsc.7.2.119","volume":"7","author":"D Constant","year":"1996","unstructured":"Constant, D., Sproull, L., & Kiesler, S. (1996). The kindness of strangers: the usefulness of electronic weak ties for technical advice. Organization Science, 7(2), 119\u2013135.","journal-title":"Organization Science"},{"issue":"1","key":"10358_CR22","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1287\/isre.1070.0160","volume":"20","author":"J D\u2019Arcy","year":"2009","unstructured":"D\u2019Arcy, J., Hovav, A., & Galletta, D. (2009). User awareness of security countermeasures and its impact on information systems misuse: a deterrence approach. Information Systems Research, 20(1), 79\u201398.","journal-title":"Information Systems Research"},{"issue":"2","key":"10358_CR23","first-page":"177","volume":"10","author":"M Fishbein","year":"1977","unstructured":"Fishbein, M., & Ajzen, I. (1977). Belief, attitude, intention, and behavior: an introduction to theory and research. Philosophy and Rhetoric, 10(2), 177\u2013188.","journal-title":"Philosophy and Rhetoric"},{"key":"10358_CR24","doi-asserted-by":"publisher","first-page":"91","DOI":"10.17705\/1CAIS.01605","volume":"16","author":"D Gefen","year":"2005","unstructured":"Gefen, D., & Straub, D. (2005). A practical guide to factorial validity using PLS-Graph: Tutorial and annotated example. Communications of the Association for Information Systems, 16, 91\u2013109.","journal-title":"Communications of the Association for Information Systems"},{"issue":"4","key":"10358_CR25","first-page":"515","volume":"48","author":"JP Gibbs","year":"1968","unstructured":"Gibbs, J. P. (1968). Crime, punishment, and deterrence. The Southwestern Social Science Quarterly, 48(4), 515\u2013530.","journal-title":"The Southwestern Social Science Quarterly"},{"issue":"4","key":"10358_CR26","doi-asserted-by":"publisher","first-page":"417","DOI":"10.2307\/249550","volume":"22","author":"PS Goodman","year":"1998","unstructured":"Goodman, P. S., & Darr, E. D. (1998). Computer-aided systems and communities: mechanisms for organizational learning in distributed environments. MIS Quarterly, 22(4), 417\u2013440.","journal-title":"MIS Quarterly"},{"issue":"4","key":"10358_CR27","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1080\/07421222.1997.11518141","volume":"13","author":"RD Gopal","year":"1997","unstructured":"Gopal, R. D., & Sanders, G. L. (1997). Preventive and deterrent controls for software piracy. Journal of Management Information Systems, 13(4), 29\u201347.","journal-title":"Journal of Management Information Systems"},{"issue":"4","key":"10358_CR28","doi-asserted-by":"publisher","first-page":"380","DOI":"10.1287\/isre.9.4.380","volume":"9","author":"RD Gopal","year":"1998","unstructured":"Gopal, R. D., & Sanders, G. L. (1998). International software piracy: analysis of key issues and impacts. Information systems research, 9(4), 380\u2013397.","journal-title":"Information systems research"},{"issue":"2","key":"10358_CR29","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1207\/s15327744joce1402_01","volume":"14","author":"RD Gopal","year":"2004","unstructured":"Gopal, R. D., Sanders, G. L., Bhattacharjee, S., Agrawal, M., & Wagner, S. C. (2004). A behavioral model of digital music piracy. Journal of Organizational Computing and Electronic commerce, 14(2), 89\u2013105.","journal-title":"Journal of Organizational Computing and Electronic commerce"},{"issue":"2","key":"10358_CR30","doi-asserted-by":"publisher","first-page":"161","DOI":"10.2307\/2092623","volume":"25","author":"AW Gouldner","year":"1960","unstructured":"Gouldner, A. W. (1960). The norm of reciprocity: a preliminary statement. American Sociological Review, 25(2), 161\u2013178.","journal-title":"American Sociological Review"},{"issue":"4","key":"10358_CR31","doi-asserted-by":"publisher","first-page":"368","DOI":"10.1108\/09593840110411167","volume":"14","author":"PH Gray","year":"2001","unstructured":"Gray, P. H. (2001). The impact of knowledge repositories on power and control in the workplace. Information Technology & People, 14(4), 368\u2013384.","journal-title":"Information Technology & People"},{"issue":"1","key":"10358_CR32","doi-asserted-by":"publisher","first-page":"121","DOI":"10.2307\/259266","volume":"25","author":"MA Hogg","year":"2000","unstructured":"Hogg, M. A., & Terry, D. J. (2000). Social identity and self-categorization processes in organizational contexts. The Academy of Management Review, 25(1), 121\u2013140.","journal-title":"The Academy of Management Review"},{"key":"10358_CR33","unstructured":"Jo, S., Moon, J., Garrity, E., & Sanders, G. L. (2007). Massively multiplayer online role-playing games (MMORPGs) and commitment behavior: an integrated model. AMCIS 2007 Proceedings, 70. http:\/\/aisel.aisnet.org\/amcis2007\/70"},{"issue":"2","key":"10358_CR34","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1007\/s10796-010-9236-2","volume":"14","author":"A Kartas","year":"2012","unstructured":"Kartas, A., & Goode, S. (2012). Use, perceived deterrence and the role of software piracy in video game console adoption. Information Systems Frontiers, 14(2), 261\u2013277.","journal-title":"Information Systems Frontiers"},{"issue":"3","key":"10358_CR35","doi-asserted-by":"publisher","first-page":"109","DOI":"10.2753\/MIS0742-1222240304","volume":"24","author":"M Khouja","year":"2007","unstructured":"Khouja, M., & Park, S. (2007). Optimal pricing of digital experience goods under piracy. Journal of Management Information Systems, 24(3), 109\u2013141.","journal-title":"Journal of Management Information Systems"},{"key":"10358_CR36","unstructured":"Kollock, P. (1999). The economies of online cooperation. In P. Kollock & M. A. Smith (Eds.), Communities in Cyberspace\u00a0(Ch. 5, pp. 221\u2013240). Routledge."},{"key":"10358_CR37","unstructured":"Kwan, S. S. K., & Tam, K. Y. (2010). An affective model for unauthorized sharing of software. Pacific Asia Conference on Information Systems 2010 Proceedings, 35. https:\/\/aisel.aisnet.org\/pacis2010\/35"},{"issue":"5","key":"10358_CR38","doi-asserted-by":"publisher","first-page":"716","DOI":"10.1108\/14684521111176462","volume":"35","author":"D Lee","year":"2011","unstructured":"Lee, D., Park, J. Y., Kim, J., Kim, J., & Moon, J. (2011). Understanding music sharing behaviour on social network services. Online Information Review, 35(5), 716\u2013733.","journal-title":"Online Information Review"},{"issue":"1","key":"10358_CR39","first-page":"1","volume":"24","author":"SH Lee","year":"2009","unstructured":"Lee, S. H., & Yoo, B. H. (2009). A review of the determinants of counterfeiting and piracy and the proposition for future research. Journal of Policy Studies, 24(1), 1\u201338.","journal-title":"Journal of Policy Studies"},{"issue":"2","key":"10358_CR40","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1007\/BF01173486","volume":"16","author":"H Leventhal","year":"1992","unstructured":"Leventhal, H., Diefenbach, M., & Leventhal, E. A. (1992). Illness cognition: using common sense to understand treatment adherence and affect cognition interactions. Cognitive Therapy and Research, 16(2), 143\u2013163.","journal-title":"Cognitive Therapy and Research"},{"issue":"4","key":"10358_CR41","doi-asserted-by":"publisher","first-page":"710","DOI":"10.1037\/0021-9010.90.4.710","volume":"90","author":"SB MacKenzie","year":"2005","unstructured":"MacKenzie, S. B., Podsakoff, P. M., & Jarvis, C. B. (2005). The problem of measurement model misspecification in behavioral and organizational research and some recommended solutions. Journal of Applied Psychology, 90(4), 710.","journal-title":"Journal of Applied Psychology"},{"key":"10358_CR42","unstructured":"Madden, M., & Rainie, L. (2005). Music and video downloading moves beyond P2P. Retrieved from www.pewinternet.org\/pdfs\/PIP_Filesharing_March05.pdf."},{"issue":"1","key":"10358_CR43","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1080\/07421222.2001.11045671","volume":"18","author":"ML Markus","year":"2001","unstructured":"Markus, M. L. (2001). Toward a theory of knowledge reuse: types of knowledge reuse situations and factors in reuse success. Journal of Management Information Systems, 18(1), 57\u201393.","journal-title":"Journal of Management Information Systems"},{"issue":"2","key":"10358_CR44","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1023\/B:ISFI.0000025781.53966.57","volume":"6","author":"JH Matsuura","year":"2004","unstructured":"Matsuura, J. H. (2004). An overview of leading current legal issues affecting information technology professionals. Information Systems Frontiers, 6(2), 153\u2013160.","journal-title":"Information Systems Frontiers"},{"issue":"2","key":"10358_CR45","first-page":"191","volume":"48","author":"LP Milton","year":"2005","unstructured":"Milton, L. P., & Westphal, J. D. (2005). Identity confirmation networks and cooperation in work groups. The Academy of Management Journal, 48(2), 191\u2013212.","journal-title":"The Academy of Management Journal"},{"issue":"3","key":"10358_CR46","doi-asserted-by":"publisher","first-page":"491","DOI":"10.1080\/10705510802154331","volume":"15","author":"NA Morton","year":"2008","unstructured":"Morton, N. A., & Koufteros, X. (2008). Intention to commit online music piracy and its antecedents: an empirical investigation. Structural Equation Modeling: A Multidisciplinary Journal, 15(3), 491\u2013512.","journal-title":"Structural Equation Modeling: A Multidisciplinary Journal"},{"key":"10358_CR47","unstructured":"Music Business Worldwide (2018). Music piracy: It\u2019s time to acknowledge the unlicensed elephant in the room. Music business worldwide. https:\/\/www.musicbusinessworldwide.com\/music-piracy-its-time-to-acknowledge-the-unlicensed-elephant-in-the-room\/"},{"issue":"1","key":"10358_CR48","doi-asserted-by":"publisher","first-page":"23","DOI":"10.2307\/25148827","volume":"32","author":"F Olivera","year":"2008","unstructured":"Olivera, F., Goodman, P. S., & Tan, S. S. L. (2008). Contribution behaviors in distributed environments. MIS Quarterly, 32(1), 23\u201342.","journal-title":"MIS Quarterly"},{"key":"10358_CR49","doi-asserted-by":"crossref","unstructured":"Payne, J. W., Bettman, J. R., & Johnson, E. J. (1993). The adaptive decision maker. Cambridge University Press.","DOI":"10.1017\/CBO9781139173933"},{"issue":"1","key":"10358_CR50","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1080\/07421222.2003.11045759","volume":"20","author":"AG Peace","year":"2003","unstructured":"Peace, A. G., Galletta, D. F., & Thong, J. Y. L. (2003). Software piracy in the workplace: a model and empirical test. Journal of Management Information Systems, 20(1), 153\u2013177.","journal-title":"Journal of Management Information Systems"},{"key":"10358_CR51","doi-asserted-by":"publisher","first-page":"100847","DOI":"10.1016\/j.infoecopol.2019.100847","volume":"50","author":"R Savelkoul","year":"2020","unstructured":"Savelkoul, R. (2020). Superstars vs the long tail: how does music piracy affect digital song sales for different segments of the industry? Information Economics and Policy, 50, 100847.","journal-title":"Information Economics and Policy"},{"issue":"1","key":"10358_CR52","doi-asserted-by":"publisher","first-page":"103559","DOI":"10.1016\/j.im.2021.103559","volume":"59","author":"A Serenko","year":"2022","unstructured":"Serenko, A. (2022). Antecedents and consequences of explicit and implicit attitudes toward digital piracy. Information & Management, 59(1), 103559.","journal-title":"Information & Management"},{"key":"10358_CR53","unstructured":"Subramani, M. R., & Peddibhotla, N. (2003). Contributing to document repositories-An examination of prosocial behavior. Information and Decision Sciences Department, University of Minnesota."},{"key":"10358_CR54","doi-asserted-by":"crossref","unstructured":"Tajfel, H., & Turner, J. C. (1979). An integrative theory of intergroup conflict. In M. J. Hatch, & M. Schultz (Eds.), Organizational identity\u00a0(ch. 4, pp. 56\u201365). Oxford University Press.","DOI":"10.1093\/oso\/9780199269464.003.0005"},{"issue":"3","key":"10358_CR55","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1348\/014466699164149","volume":"38","author":"DJ Terry","year":"1999","unstructured":"Terry, D. J., Hogg, M. A., & White, K. M. (1999). The theory of planned behaviour: self-identity, social identity and group norms. British Journal of Social Psychology, 38(3), 225\u2013244.","journal-title":"British Journal of Social Psychology"},{"issue":"5","key":"10358_CR56","doi-asserted-by":"publisher","first-page":"512","DOI":"10.1177\/009365087014005004","volume":"14","author":"BK Thorn","year":"1987","unstructured":"Thorn, B. K., & Connolly, T. (1987). Discretionary data bases: a theory and some experimental findings. Communication Research, 14(5), 512\u2013528.","journal-title":"Communication Research"},{"key":"10358_CR57","unstructured":"Tittle, C. R. (1980). Sanctions and social deviance: The question of deterrence. Praeger New York."},{"issue":"6","key":"10358_CR58","doi-asserted-by":"publisher","first-page":"1265","DOI":"10.1007\/s10796-019-09956-4","volume":"21","author":"S Trang","year":"2019","unstructured":"Trang, S., & Brendel, B. (2019). A meta-analysis of deterrence theory in information security policy compliance research. Information Systems Frontiers, 21(6), 1265\u20131284.","journal-title":"Information Systems Frontiers"},{"issue":"3","key":"10358_CR59","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1177\/1368430201004003003","volume":"4","author":"TR Tyler","year":"2001","unstructured":"Tyler, T. R., & Blader, S. L. (2001). Identity and cooperative behavior in groups. Group Processes & Intergroup Relations, 4(3), 207.","journal-title":"Group Processes & Intergroup Relations"},{"key":"10358_CR60","unstructured":"Vroom, V. H. (1964). Work and motivation. Wiley and Sons, New York."},{"key":"10358_CR61","doi-asserted-by":"publisher","first-page":"545","DOI":"10.2307\/3053466","volume":"20","author":"KR Williams","year":"1986","unstructured":"Williams, K. R., & Hawkins, R. (1986). Perceptual research on general deterrence: a critical review. Law & Society Review, 20, 545.","journal-title":"Law & Society Review"},{"issue":"3","key":"10358_CR62","doi-asserted-by":"publisher","first-page":"400","DOI":"10.1016\/j.ijresmar.2019.01.007","volume":"36","author":"N Wl\u00f6mert","year":"2019","unstructured":"Wl\u00f6mert, N., & Papies, D. (2019). International heterogeneity in the associations of new business models and broadband internet with music revenue and piracy. International Journal of Research in Marketing, 36(3), 400\u2013419.","journal-title":"International Journal of Research in Marketing"},{"issue":"3","key":"10358_CR63","doi-asserted-by":"publisher","first-page":"405","DOI":"10.1007\/s10551-010-0687-7","volume":"100","author":"C Yoon","year":"2011","unstructured":"Yoon, C. (2011). Theory of planned behavior and ethics theory in digital piracy: an integrated model. Journal of Business Ethics, 100(3), 405\u2013417.","journal-title":"Journal of Business Ethics"},{"key":"10358_CR64","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-021-10189-7","author":"X Zhang","year":"2021","unstructured":"Zhang, X., Zhang, X., Luo, X., & Yue, W. T. (2021). The impact of revenue models on anti-counterfeiting measures for online intermediaries. Information Systems Frontiers. https:\/\/doi.org\/10.1007\/s10796-021-10189-7","journal-title":"Information Systems Frontiers"}],"container-title":["Information Systems Frontiers"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10796-022-10358-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10796-022-10358-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10796-022-10358-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,24]],"date-time":"2023-11-24T09:14:09Z","timestamp":1700817249000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10796-022-10358-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,3]]},"references-count":64,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2023,12]]}},"alternative-id":["10358"],"URL":"https:\/\/doi.org\/10.1007\/s10796-022-10358-2","relation":{},"ISSN":["1387-3326","1572-9419"],"issn-type":[{"value":"1387-3326","type":"print"},{"value":"1572-9419","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,12,3]]},"assertion":[{"value":"10 November 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 December 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"We have no conflicts of interest to report.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}}]}}