{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,2]],"date-time":"2026-05-02T16:20:12Z","timestamp":1777738812321,"version":"3.51.4"},"reference-count":93,"publisher":"Informa UK Limited","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Journal of Management Information Systems"],"published-print":{"date-parts":[[2011,12]]},"DOI":"10.2753\/mis0742-1222280310","type":"journal-article","created":{"date-parts":[[2012,2,21]],"date-time":"2012-02-21T02:12:18Z","timestamp":1329790338000},"page":"343-384","source":"Crossref","is-referenced-by-count":24,"title":["Same Coin, Different Sides: Differential Impact of Social Learning on Two Facets of Music Piracy"],"prefix":"10.1080","volume":"28","author":[{"given":"Jingguo","family":"Wang","sequence":"first","affiliation":[{"name":"a University of Texas at Arlington"}]},{"given":"Zhiyong","family":"Yang","sequence":"additional","affiliation":[{"name":"a University of Texas at Arlington"}]},{"given":"Sudip","family":"Bhattacharjee","sequence":"additional","affiliation":[{"name":"b School of Business, University of Connecticut"}]}],"member":"301","published-online":{"date-parts":[[2014,12,9]]},"reference":[{"key":"1","volume-title":"Attitudes, Personality, and Behavior","author":"I. Ajzen","year":"1988"},{"key":"2","volume-title":"Understanding Attitudes and Predicting Social Behavior","author":"I. Ajzen","year":"1980"},{"key":"3","volume-title":"Social Learning and Social Structure: A General Theory of Crime and Deviance","author":"R. Akers","year":"1998"},{"key":"4","first-page":"37","volume-title":"Taking Stock: The Status of Criminological Theory","author":"R. Akers","year":"2006"},{"issue":"4","key":"5","doi-asserted-by":"crossref","first-page":"636","DOI":"10.2307\/2094592","article-title":"Social learning and deviant behavior: A specific test of a general theory","volume":"44","author":"R. Akers","year":"1979","journal-title":"American Sociological Review"},{"issue":"4","key":"6","doi-asserted-by":"crossref","first-page":"511","DOI":"10.1002\/ejsp.324","article-title":"Power, optimism, and risk-taking","volume":"36","author":"C. Anderson","year":"2006","journal-title":"European Journal of Social Psychology"},{"key":"7","first-page":"1","volume-title":"Advanced Methods of Marketing Research","author":"R. Bagozzi","year":"1994"},{"key":"8","volume-title":"Social Learning Theory","author":"A. Bandura","year":"1977"},{"issue":"3","key":"9","doi-asserted-by":"crossref","first-page":"797","DOI":"10.2307\/2118364","article-title":"A simple model of herd behavior","volume":"107","author":"A. Banerjee","year":"1992","journal-title":"Quarterly Journal of Economics"},{"issue":"2","key":"10","first-page":"285","article-title":"The partial least squares approach to causal modeling: Personal computer adoption and use as an illustration","volume":"2","author":"D. Barclay","year":"1995","journal-title":"Technology Studies"},{"issue":"1","key":"11","doi-asserted-by":"crossref","first-page":"3","DOI":"10.2307\/3150395","article-title":"Firm effects and industry effects in the analysis of industry structure and profitability","volume":"15","author":"F. Bass","year":"1978","journal-title":"Journal of Marketing Research"},{"issue":"1","key":"12","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1207\/s15327736me1901_2","article-title":"Dynamics of illegal participation in peer-to-peer networks\u2014Why do people illegally share media files?","volume":"19","author":"J. Becker","year":"2006","journal-title":"Journal of Media Economics"},{"issue":"7","key":"13","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1145\/792704.792707","article-title":"Digital music and online sharing: Software piracy 2.0?","volume":"46","author":"S. Bhattacharjee","year":"2003","journal-title":"Communications of the ACM"},{"issue":"1","key":"14","doi-asserted-by":"crossref","first-page":"129","DOI":"10.2753\/MIS0742-1222230104","article-title":"Consumer search and retailer strategies in the presence of online music sharing","volume":"23","author":"S. Bhattacharjee","year":"2006","journal-title":"Journal of Management Information Systems"},{"issue":"1","key":"15","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1086\/501085","article-title":"Impact of legal threats on online music sharing activity: An analysis of music industry legal actions","volume":"49","author":"S. Bhattacharjee","year":"2006","journal-title":"Journal of Law and Economics"},{"issue":"1","key":"16","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1016\/j.dss.2004.11.001","article-title":"Whatever happened to payola? An empirical analysis of online music sharing","volume":"42","author":"S. Bhattacharjee","year":"2006","journal-title":"Decision Support Systems"},{"issue":"6","key":"17","doi-asserted-by":"crossref","first-page":"136","DOI":"10.1145\/1516046.1516081","article-title":"Re-tuning the music industry\u2014Can they re-attain business resonance?","volume":"52","author":"S. Bhattacharjee","year":"2009","journal-title":"Communications of the ACM"},{"issue":"9","key":"18","doi-asserted-by":"crossref","first-page":"1359","DOI":"10.1287\/mnsc.1070.0699","article-title":"The effect of digital sharing technologies on music markets: A survival analysis of albums on ranking charts","volume":"53","author":"S. Bhattacharjee","year":"2007","journal-title":"Management Science"},{"issue":"5","key":"19","doi-asserted-by":"crossref","first-page":"992","DOI":"10.1086\/261849","article-title":"A theory of fads, fashion, custom, and cultural change in informational cascades","volume":"100","author":"S. Bikhchandani","year":"1992","journal-title":"Journal of Political Economy"},{"issue":"6","key":"20","first-page":"99","article-title":"The perils of the imitation age","volume":"82","author":"E. Bonabeau","year":"2004","journal-title":"Harvard Business Review"},{"key":"21","first-page":"179","article-title":"Music sharing as a computer supported collaborative application","author":"B. Brown","year":"2001"},{"issue":"2","key":"22","doi-asserted-by":"crossref","first-page":"128","DOI":"10.1525\/sp.1966.14.2.03a00020","article-title":"A differential association-reinforcement theory of criminal behavior","volume":"14","author":"R. Burgess","year":"1966","journal-title":"Social Problems"},{"issue":"4","key":"23","doi-asserted-by":"crossref","first-page":"689","DOI":"10.2307\/20650323","article-title":"Interpretation of formative measurement in information systems research","volume":"33","author":"R. Cenfetelli","year":"2009","journal-title":"MIS Quarterly"},{"issue":"3","key":"24","doi-asserted-by":"crossref","first-page":"206","DOI":"10.1177\/0196859909333697","article-title":"More than just free content: Motivations of peer-to-peer file sharers","volume":"33","author":"M. Cenite","year":"2009","journal-title":"Journal of Communication Inquiry"},{"issue":"4","key":"25","doi-asserted-by":"crossref","first-page":"411","DOI":"10.1016\/j.elerap.2008.02.001","article-title":"The intention to download music files in a P2P environment: Consumption value, fashion, and ethical decision perspectives","volume":"7","author":"Y.-C. Chen","year":"2008","journal-title":"Electronic Commerce Research and Applications"},{"key":"26","first-page":"295","volume-title":"Modern Methods for Business Research","author":"W. Chin","year":"1998"},{"issue":"1","key":"27","article-title":"Issues and opinion on structural equation modeling","volume":"22","author":"W. Chin","year":"1998","journal-title":"MIS Quarterly"},{"issue":"2-3","key":"28","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1145\/217278.217285","article-title":"Adoption intention in GSS: Relative importance of beliefs","volume":"26","author":"W. Chin","year":"1995","journal-title":"Data Base for Advances in Information Systems"},{"issue":"2","key":"29","doi-asserted-by":"crossref","first-page":"189","DOI":"10.1287\/isre.14.2.189.16018","article-title":"A partial least squares latent variable modeling approach for measuring interaction effects: Results from a Monte Carlo simulation study and an electronic-mail emotion\/adoption study","volume":"14","author":"W. Chin","year":"2003","journal-title":"Information Systems Research"},{"issue":"2","key":"30","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1007\/s10551-004-5263-6","article-title":"The antecedents of music piracy attitudes and intentions","volume":"57","author":"J.-S. Chiou","year":"2005","journal-title":"Journal of Business Ethics"},{"issue":"3","key":"31","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1080\/07421222.2002.11045733","article-title":"Special section: Competitive strategy, economics, and the Internet","volume":"19","author":"A. Chircu","year":"2002-3","journal-title":"Journal of Management Information Systems"},{"issue":"3","key":"32","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1080\/07421222.2002.11045738","article-title":"Newly vulnerable markets in an age of pure information products: An analysis of online music and online news","volume":"19","author":"E. Clemons","year":"2002-3","journal-title":"Journal of Management Information Systems"},{"issue":"3","key":"33","doi-asserted-by":"crossref","first-page":"343","DOI":"10.1177\/1367877904046412","article-title":"Cultures of music piracy: An ethnographic comparison of the U. S. and Japan","volume":"7","author":"I. Condry","year":"2004","journal-title":"International Journal of Cultural Studies"},{"issue":"10","key":"34","doi-asserted-by":"crossref","first-page":"1031","DOI":"10.1016\/j.jbusres.2008.05.002","article-title":"To buy or to pirate\": The matrix of music consumers' acquisition-mode decision-making","volume":"62","author":"J. Coyle","year":"2009","journal-title":"Journal of Business Research"},{"key":"35","volume-title":"The Approval Motive","author":"D. Crowne","year":"1964"},{"issue":"4","key":"36","first-page":"263","article-title":"Formative versus reflective indicators in organizational measure development: A comparison and empirical illustration","volume":"17","author":"A. Diamantopoulos","year":"2006","journal-title":"British Journal of Management Science"},{"issue":"2","key":"37","doi-asserted-by":"crossref","first-page":"259","DOI":"10.1509\/jmkr.38.2.269.18845","article-title":"Index construction with formative indicators: An alternative to scale development","volume":"38","author":"A. Diamantopoulos","year":"2001","journal-title":"Journal of Marketing Research"},{"key":"38","volume-title":"A Primer for Soft Modeling","author":"R. Falk","year":"1992"},{"key":"39","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511527821","volume-title":"The Psychology of Crime: A Social Science Textbook","author":"P. Feldman","year":"1993"},{"issue":"4","key":"40","doi-asserted-by":"crossref","first-page":"440","DOI":"10.2307\/3151718","article-title":"Two structural equation models: LISREL and PLS applied to consumer exit-voice theory","volume":"19","author":"C. Fornell","year":"1982","journal-title":"Journal of Marketing Research"},{"issue":"3","key":"41","doi-asserted-by":"crossref","first-page":"39","DOI":"10.2307\/3151312","article-title":"Structural equation models with unobservable variables and measurement errors","volume":"18","author":"C. Fornell","year":"1981","journal-title":"Journal of Marketing Research"},{"issue":"4","key":"42","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1080\/07421222.1997.11518141","article-title":"Preventive and deterrent controls for software piracy","volume":"13","author":"R. Gopal","year":"1997","journal-title":"Journal of Management Information Systems"},{"issue":"2","key":"43","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1207\/s15327744joce1402_01","article-title":"A behavioral model of digital music piracy","volume":"14","author":"R. Gopal","year":"2004","journal-title":"Journal of Organizational Computing and Electronic Commerce"},{"key":"44","unstructured":"Gu, B.; Huang, Y.; Duan, W.; and Whinston, A. B. Indirect reciprocity in contributions to a peer-to-peer music sharing network\u2014An empirical analysis of individual level data. Paper presented at the 2008 International Conference on Information Systems, Paris, December 2008 (available at <a target=\"_blank\" href='http:\/\/aisel.aisnet.org\/icis2008\/158\/'>http:\/\/aisel.aisnet.org\/icis2008\/158\/<\/a>"},{"key":"45","volume-title":"Practitioner's Guide to Audit Sampling","author":"D. Guy","year":"1998"},{"issue":"3","key":"46","doi-asserted-by":"crossref","first-page":"30","DOI":"10.2307\/1249759","article-title":"Benefit segmentation: A decision-oriented research tool","volume":"32","author":"R. Haley","year":"1968","journal-title":"Journal of Marketing"},{"issue":"2","key":"47","first-page":"1","article-title":"Does social learning theory condition the effects of low self-control on college students' software piracy?","volume":"2","author":"G. Higgins","year":"2004","journal-title":"Journal of Economic Crime Management"},{"key":"48","volume-title":"Music Piracy and Crime Theory","author":"S. Hinduja","year":"2006"},{"issue":"4","key":"49","doi-asserted-by":"crossref","first-page":"334","DOI":"10.1080\/01639620701588131","article-title":"Neutralizing music piracy: An empirical examination","volume":"29","author":"J. Ingram","year":"2008","journal-title":"Deviant Behavior"},{"key":"50","unstructured":"Jardin, X. RIAA focuses on colleges for anti-piracy efforts. NPR, March 1, 2007 (available at <a target=\"_blank\" href='http:\/\/www.npr.org\/templates\/story\/story.php?storyId=7667058\/'>www.npr.org\/templates\/story\/story.php?storyId=7667058\/<\/a>"},{"issue":"2","key":"51","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1086\/376806","article-title":"A critical review of construct indicators and measurement model misspecification in marketing and consumer research","volume":"30","author":"C. Jarvis","year":"2003","journal-title":"Journal of Consumer Research"},{"key":"52","volume-title":"Statistical Sampling and Risk Analysis in Auditing","author":"P. Jones","year":"1999"},{"key":"53","volume-title":"The Internet goes to college: How students are living in the future with today's technology","author":"S. Jones","year":"2002"},{"key":"54","unstructured":"Kennedy, J. IFPI digital music report 2009. International Federation of the Phonographic Industry, London, 2009 (available at <a target=\"_blank\" href='http:\/\/www.ifpi.org\/content\/library\/dmr2009.pdf'>www.ifpi.org\/content\/library\/dmr2009.pdf<\/a>"},{"issue":"1","key":"55","doi-asserted-by":"crossref","first-page":"114","DOI":"10.1037\/0021-9010.86.1.114","article-title":"Accounting for common method variance in cross-sectional research designs","volume":"86","author":"M. Lindell","year":"2001","journal-title":"Journal of Applied Psychology"},{"key":"56","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-52512-4","volume-title":"Latent Variable Path Modeling with Partial Least Squares","author":"J.-B. Lohm\u00f6ller","year":"1989"},{"issue":"1","key":"57","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1037\/1082-989X.10.1.21","article-title":"Investigating population heterogeneity with factor mixture models","volume":"10","author":"G. Lubke","year":"2005","journal-title":"Psychological Methods"},{"issue":"3","key":"58","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1108\/07363760810870662","article-title":"Digital piracy of MP3s: Consumer and ethical predispositions","volume":"25","author":"S. Lysonski","year":"2008","journal-title":"Journal of Consumer Marketing"},{"key":"59","volume-title":"Music downloading, file-sharing and copyright","author":"M. Madden","year":"2003"},{"issue":"2","key":"60","doi-asserted-by":"crossref","first-page":"171","DOI":"10.2307\/3149981","article-title":"Short term price and dealing effects in selected market segments","volume":"2","author":"W. Massy","year":"1965","journal-title":"Journal of Marketing Research"},{"key":"61","volume-title":"The Nine American Life-Styles","author":"A. Mitchell","year":"1983"},{"issue":"1","key":"62","doi-asserted-by":"crossref","first-page":"167","DOI":"10.2307\/25148722","article-title":"Ethical decision making in software piracy: Initial development and test of a four-component model","volume":"30","author":"T. Moores","year":"2006","journal-title":"MIS Quarterly"},{"key":"63","article-title":"Music industry tightens squeeze on students; Campus network access targeted","author":"M. Musgrove","year":"2007","journal-title":"Washington Post"},{"issue":"2","key":"64","first-page":"19","article-title":"The incentives for contributing digital contents over P2P networks: An empirical investigation","volume":"5","author":"T. Nandi","year":"2008","journal-title":"Review of Economic Research on Copyright Issues"},{"key":"65","volume-title":"Psychometric Theory","author":"J. Nunnally","year":"1978"},{"issue":"4","key":"66","doi-asserted-by":"crossref","first-page":"535","DOI":"10.1080\/10705510701575396","article-title":"Deciding on the number of classes in latent class analysis and growth mixture modeling: A Monte Carlo simulation study","volume":"14","author":"K. Nylund","year":"2007","journal-title":"Structural Equation Modeling"},{"issue":"6","key":"67","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1086\/511995","article-title":"The effect of file sharing on record sales: An empirical analysis","volume":"115","author":"F. Oberholzer-Gee","year":"2007","journal-title":"Journal of Political Economy"},{"issue":"2","key":"68","doi-asserted-by":"crossref","first-page":"173","DOI":"10.1080\/07418828700089271","article-title":"The deterrent effect of the perceived certainty and severity of punishment: A review of the evidence and issues","volume":"4","author":"R. Paternoster","year":"1987","journal-title":"Justice Quarterly"},{"issue":"1","key":"69","doi-asserted-by":"crossref","first-page":"105","DOI":"10.2307\/25148783","article-title":"Understanding and mitigating uncertainty in online exchange relationships: A principle-agent perspective","volume":"31","author":"P. Pavlou","year":"2007","journal-title":"MIS Quarterly"},{"issue":"1","key":"70","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1080\/07421222.2003.11045759","article-title":"Software piracy in the workplace: A model and empirical test","volume":"20","author":"A. Peace","year":"2003","journal-title":"Journal of Management Information Systems"},{"issue":"4","key":"71","doi-asserted-by":"crossref","first-page":"623","DOI":"10.2307\/25148814","article-title":"Specifying formative constructs in information systems research","volume":"31","author":"S. Petter","year":"2007","journal-title":"MIS Quarterly"},{"issue":"5","key":"72","doi-asserted-by":"crossref","first-page":"879","DOI":"10.1037\/0021-9010.88.5.879","article-title":"Common method biases in behavioral research: A critical review of the literature and recommended remedies","volume":"88","author":"P. Podsakoff","year":"2003","journal-title":"Journal of Applied Psychology"},{"key":"73","first-page":"37","volume-title":"Taking Stock: The Status of Criminological Theory","author":"T. Pratt","year":"2006"},{"issue":"1","key":"74","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1287\/mksc.12.1.103","article-title":"An empirical pooling approach for estimating marketing mix elasticities with PIMS data","volume":"12","author":"V. Ramaswamy","year":"1993","journal-title":"Marketing Science"},{"issue":"2","key":"75","doi-asserted-by":"crossref","first-page":"182","DOI":"10.1016\/j.obhdp.2009.05.002","article-title":"Myopic regret avoidance: Feedback avoidance and learning in repeated decision making","volume":"109","author":"J. Reb","year":"2009","journal-title":"Organizational Behavior and Human Decision Processes"},{"key":"76","unstructured":"Ringle, C. M.; Wende, S.; and Will, S. SmartPLS 2.0 (M3) Beta. Hamburg, 2005 (available at <a target=\"_blank\" href='http:\/\/www.smartpls.de'>www.smartpls.de<\/a>"},{"key":"77","unstructured":"Ripeanu, M.; Mowbray, M.; Andrade, N.; and Lima, A. Gifting technologies: A BitTorrent case study. Technical Report HPL-2007-26, Enterprise Systems and Software Laboratory, HP Laboratories, Bristol, UK, 2007 (available at <a target=\"_blank\" href='http:\/\/www.hpl.hp.com\/techreports\/2007\/HPL-2007-26.pdf'>www.hpl.hp.com\/techreports\/2007\/HPL-2007-26.pdf<\/a>"},{"key":"78","unstructured":"Rogers, M. K. A social learning theory and moral disengagement analysis of criminal computer behavior: An exploratory study. Ph.D. dissertation, University of Manitoba, Winnipeg, 2001."},{"key":"79","unstructured":"Sabbagh, D. Average teenager's iPod has 800 illegal music tracks. <i>The Times<\/i> (June 16, 2008) (available at <a target=\"_blank\" href='http:\/\/technology.timesonline.co.uk\/tol\/news\/tech_and_web\/personal_tech\/article4144585.ece\/'>http:\/\/technology.timesonline.co.uk\/tol\/news\/tech_and_web\/personal_tech\/article4144585.ece\/<\/a>"},{"issue":"2","key":"80","doi-asserted-by":"crossref","first-page":"349","DOI":"10.1007\/s10551-007-9424-2","article-title":"Ethical decisions about sharing music files in the P2P environment","volume":"80","author":"R.-A. Shang","year":"2008","journal-title":"Journal of Business Ethics"},{"issue":"1","key":"81","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1509\/jmkg.72.1.1","article-title":"Preventing digital music piracy: The carrot or the stick?","volume":"72","author":"R. Sinha","year":"2008","journal-title":"Journal of Marketing"},{"key":"82","unstructured":"Siwek, S. E. The true cost of sound recording piracy to the U. S. economy. Policy Report no. 188, Institute for Policy Innovation, Lewisville, TX, 2007."},{"issue":"4","key":"83","doi-asserted-by":"crossref","first-page":"495","DOI":"10.1177\/0022427897034004005","article-title":"A social learning theory analysis of computer crime among college students","volume":"34","author":"W. Skinner","year":"1997","journal-title":"Journal of Research in Crime and Delinquency"},{"issue":"2","key":"84","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1002\/1097-4679(197204)28:2<191::AID-JCLP2270280220>3.0.CO;2-G","article-title":"Short, homogeneous versions of the Marlowe-Crowne social desirability scale","volume":"28","author":"R. Strahan","year":"1972","journal-title":"Journal of Clinical Psychology"},{"issue":"6","key":"85","doi-asserted-by":"crossref","first-page":"664","DOI":"10.2307\/2089195","article-title":"Techniques of neutralization: A theory of delinquency","volume":"22","author":"G. Sykes","year":"1957","journal-title":"American Sociological Review"},{"key":"86","volume-title":"Piracy on campus: An overview of the problem and a look at emerging best practices to reduce online theft of copyrighted works","author":"R. Taylor","year":"2005"},{"key":"87","volume-title":"Sanctions and Social Deviance: The Question of Deterrence","author":"C. Tittle","year":"1980"},{"key":"88","first-page":"317","volume-title":"Advances in Latent Variable Mixture Models","author":"D. Tofighi","year":"2007"},{"key":"89","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511803956","volume-title":"Companions in Crime: The Social Aspects of Criminal Conduct","author":"M. Warr","year":"2002"},{"key":"90","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4615-4651-1","volume-title":"Market Segmentation: Conceptual and Methodological Foundations","author":"M. Wedel","year":"2000"},{"key":"91","first-page":"1","volume-title":"Systems Under Indirect Observation: Causality, Structure and Prediction, Part II","author":"H. Wold","year":"1982"},{"issue":"2","key":"92","doi-asserted-by":"crossref","first-page":"232","DOI":"10.1509\/jppm.29.2.232","article-title":"The impact of parenting strategies on child smoking behavior: The role of child self-esteem trajectory","volume":"29","author":"Z. Yang","year":"2010","journal-title":"Journal of Public Policy & Marketing"},{"issue":"3","key":"93","doi-asserted-by":"crossref","first-page":"202","DOI":"10.1007\/s11747-009-0153-1","article-title":"Non-local or local brands? A multi-level investigation into confidence in brand origin identification and its strategic implications","volume":"38","author":"L. Zhou","year":"2010","journal-title":"Journal of the Academy of Marketing Science"}],"container-title":["Journal of Management Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.2753\/MIS0742-1222280310","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,24]],"date-time":"2019-06-24T01:18:41Z","timestamp":1561339121000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.2753\/MIS0742-1222280310"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,12]]},"references-count":93,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2014,12,9]]},"published-print":{"date-parts":[[2011,12]]}},"alternative-id":["10.2753\/MIS0742-1222280310"],"URL":"https:\/\/doi.org\/10.2753\/mis0742-1222280310","relation":{},"ISSN":["0742-1222","1557-928X"],"issn-type":[{"value":"0742-1222","type":"print"},{"value":"1557-928X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,12]]}}}