{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T16:13:27Z","timestamp":1772727207092,"version":"3.50.1"},"reference-count":55,"publisher":"Informa UK Limited","issue":"12","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Behaviour &amp; Information Technology"],"published-print":{"date-parts":[[2019,12,2]]},"DOI":"10.1080\/0144929x.2019.1583768","type":"journal-article","created":{"date-parts":[[2019,2,22]],"date-time":"2019-02-22T16:50:11Z","timestamp":1550854211000},"page":"1273-1289","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":15,"title":["Does opportunity make the thief? Abilities and moral disengagement in illegal downloading"],"prefix":"10.1080","volume":"38","author":[{"given":"Nadia","family":"Olivero","sequence":"first","affiliation":[{"name":"Department of Psychology, University of Milano Bicocca, Milano, Italy"}]},{"given":"Andrea","family":"Greco","sequence":"additional","affiliation":[{"name":"Department of Psychology, University of Milano Bicocca, Milano, Italy"}]},{"given":"Anna Maria","family":"Annoni","sequence":"additional","affiliation":[{"name":"Department of Psychology, University of Milano Bicocca, Milano, Italy"}]},{"given":"Patrizia","family":"Steca","sequence":"additional","affiliation":[{"name":"Department of Psychology, University of Milano Bicocca, Milano, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0187-5808","authenticated-orcid":false,"given":"Paul Benjamin","family":"Lowry","sequence":"additional","affiliation":[{"name":"Pamplin College of Business, Virginia Tech, Blacksburg, VA, USA"}]}],"member":"301","published-online":{"date-parts":[[2019,2,22]]},"reference":[{"key":"CIT0001","doi-asserted-by":"publisher","DOI":"10.1016\/0749-5978(91)90020-T"},{"key":"CIT0002","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.83.6.1423"},{"key":"CIT0003","doi-asserted-by":"publisher","DOI":"10.1016\/0749-5978(91)90022-L"},{"key":"CIT0004","doi-asserted-by":"publisher","DOI":"10.1207\/s15327957pspr0303_3"},{"key":"CIT0005","doi-asserted-by":"publisher","DOI":"10.1146\/annurev.psych.52.1.1"},{"key":"CIT0006","doi-asserted-by":"publisher","DOI":"10.1080\/0305724022014322"},{"key":"CIT0007","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.71.2.364"},{"issue":"1","key":"CIT0008","first-page":"83","author":"Bandura A.","year":"2006","journal-title":"Giornale Italiano Di Psicologia"},{"key":"CIT0009","doi-asserted-by":"publisher","DOI":"10.2307\/249677"},{"key":"CIT0010","doi-asserted-by":"publisher","DOI":"10.1016\/0092-6566(91)90021-H"},{"key":"CIT0011","doi-asserted-by":"publisher","DOI":"10.1145\/792704.792707"},{"key":"CIT0012","doi-asserted-by":"publisher","DOI":"10.1207\/s15327663jcp0901_2"},{"key":"CIT0013","doi-asserted-by":"publisher","DOI":"10.1108\/00251741011082099"},{"key":"CIT0014","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540-5915.2001.tb00978.x"},{"key":"CIT0015","doi-asserted-by":"publisher","DOI":"10.1007\/s10551-004-5263-6"},{"key":"CIT0016","volume-title":"Statistical Power Analysis for the Behavioral Sciences","author":"Cohen J.","year":"1988","edition":"2"},{"key":"CIT0017","doi-asserted-by":"publisher","DOI":"10.1177\/1367877904046412"},{"key":"CIT0018","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbusres.2008.05.002"},{"key":"CIT0019","doi-asserted-by":"publisher","DOI":"10.1007\/s10551-007-9366-8"},{"key":"CIT0020","doi-asserted-by":"publisher","DOI":"10.1007\/s10551-015-2789-8"},{"key":"CIT0021","doi-asserted-by":"publisher","DOI":"10.1016\/j.jretconser.2015.09.005"},{"key":"CIT0022","volume-title":"Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research","author":"Fishbein M.","year":"1975"},{"key":"CIT0023","doi-asserted-by":"publisher","DOI":"10.2307\/1556359"},{"key":"CIT0024","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2017.02.014"},{"key":"CIT0025","unstructured":"Go-Gulf. 2011. \u201cOnline Piracy in Numbers-Facts and Statistics.\u201d [Blog post]. December 29. Accessed March 1, 2018. https:\/\/www.go-gulf.com\/blog\/online-piracy\/."},{"key":"CIT0026","first-page":"1","volume":"2","author":"Hamrick K.","year":"2016","journal-title":"Student Scholarship \u2013 Computer Science"},{"key":"CIT0027","doi-asserted-by":"publisher","DOI":"10.1023\/A:1024910523384"},{"key":"CIT0028","doi-asserted-by":"publisher","DOI":"10.1037\/1082-989X.3.4.424"},{"key":"CIT0029","doi-asserted-by":"publisher","DOI":"10.1080\/10705519909540118"},{"key":"CIT0030","doi-asserted-by":"publisher","DOI":"10.1016\/j.joep.2004.03.002"},{"key":"CIT0031","doi-asserted-by":"publisher","DOI":"10.1007\/s13520-012-0017-5"},{"key":"CIT0032","doi-asserted-by":"publisher","DOI":"10.1111\/j.1559-1816.1995.tb02393.x"},{"key":"CIT0033","unstructured":"Kwak, K., and A. Bandura. 1997. Role of Perceived Self-Efficacy and Moral Disengagement in Antisocial Conduct. Unpublished manuscript, Osan College, Seoul, Korea."},{"key":"CIT0034","unstructured":"Kwong, T. C., and M. K. Lee. 2002. \u201cBehavioral Intention Model for the Exchange Mode Internet Music Piracy.\u201d Proceedings of the 35th Annual Hawaii International Conference on System Sciences (HICSS 2002), Big Island, HI, 7\u201310 January, IEEE, 2481\u20132490."},{"key":"CIT0035","doi-asserted-by":"publisher","DOI":"10.1089\/cpb.2006.9959"},{"key":"CIT0036","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00012"},{"key":"CIT0037","doi-asserted-by":"publisher","DOI":"10.7903\/ijecs.1191"},{"key":"CIT0038","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2016.11.015"},{"key":"CIT0039","doi-asserted-by":"publisher","DOI":"10.1177\/0146167292181001"},{"key":"CIT0040","volume-title":"Mplus User\u2019s Guide","author":"Muth\u00e9n L. K.","year":"1998","edition":"6"},{"key":"CIT0041","doi-asserted-by":"publisher","DOI":"10.1509\/jppm.23.1.43.30398"},{"key":"CIT0042","volume-title":"Psychometric Theory","author":"Nunnally J. C.","year":"1994","edition":"3"},{"key":"CIT0043","doi-asserted-by":"publisher","DOI":"10.1007\/BF00383614"},{"key":"CIT0044","doi-asserted-by":"publisher","DOI":"10.1007\/s10551-011-1079-3"},{"key":"CIT0045","doi-asserted-by":"publisher","DOI":"10.1177\/0038038508096938"},{"key":"CIT0046","doi-asserted-by":"publisher","DOI":"10.1016\/j.tele.2014.09.007"},{"key":"CIT0047","doi-asserted-by":"publisher","DOI":"10.1007\/s11948-014-9573-5"},{"key":"CIT0048","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2015.10.004"},{"key":"CIT0049","doi-asserted-by":"publisher","DOI":"10.1111\/j.1559-1816.1996.tb01794.x"},{"key":"CIT0050","doi-asserted-by":"publisher","DOI":"10.1111\/risa.12689"},{"key":"CIT0051","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0127921"},{"key":"CIT0052","first-page":"56","volume-title":"Structural Equation Modeling: Concepts, Issues, and Applications","author":"West S. G.","year":"1995"},{"key":"CIT0053","doi-asserted-by":"publisher","DOI":"10.1080\/10683160903179526"},{"key":"CIT0054","doi-asserted-by":"publisher","DOI":"10.1007\/s10551-010-0687-7"},{"key":"CIT0055","doi-asserted-by":"publisher","DOI":"10.1080\/0144929X.2011.602424"}],"container-title":["Behaviour &amp; Information Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/0144929X.2019.1583768","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,16]],"date-time":"2020-08-16T11:52:42Z","timestamp":1597578762000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/0144929X.2019.1583768"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,2,22]]},"references-count":55,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2019,12,2]]}},"alternative-id":["10.1080\/0144929X.2019.1583768"],"URL":"https:\/\/doi.org\/10.1080\/0144929x.2019.1583768","relation":{},"ISSN":["0144-929X","1362-3001"],"issn-type":[{"value":"0144-929X","type":"print"},{"value":"1362-3001","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,2,22]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tbit20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tbit20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2018-04-12","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-02-10","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-02-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}