최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기한국IT서비스학회지 = Journal of Information Technology Services, v.14 no.2, 2015년, pp.15 - 31
김중환 (경기대학교 경영정보학과)
Software piracy is widespread throughout the world. It has negative effects on the software industry and the intellectual property market. Despite various deterrent policies, the phenomenon has been getting severe. The current study investigated the antecedents of software piracy attitudes and inten...
* AI 자동 식별 결과로 적합하지 않은 문장이 있을 수 있으니, 이용에 유의하시기 바랍니다.
핵심어 | 질문 | 논문에서 추출한 답변 |
---|---|---|
최근 불법복제물 유통량이 상승한 원인은? | 6%가 증가한 것으로 나타났다(Korea Federation of Copyright Organizations, 2014). 2008년 이후 감소하다가 최근 큰 폭으로 상승했는데 태블릿, 스마트폰 등 모바일 기기의 확산으로 콘텐츠 이용환경의 변화에 따른 증가에서 그 원인을 찾을 수 있다. | |
소프트웨어 개발의 특징은? | 소프트웨어 개발은 많은 비용과 인력이 투입되지만 전자도서, 음원, 영상물 등 다른 유형의 디지털 콘텐츠와 마찬가지로 손쉽게 복제되고 배포될 수 있는 특징이 있다. 지속적인 불법 사용 근절정책에도 불구하고 비즈니스 소프트웨어 연합회(BSA)의 최근 발표자료에 의하면 정당한 라이선스 없이 PC에 설치된 소프트웨어 비율은 2011년 42%에서 2013년 43%로 늘어났으며 이에 따른 경제적인 손실은 약 627억 달러에 이른다(Business Software Alliance, 2014). | |
스마트폰이 새로운 컴퓨팅 플랫폼으로 자리잡을 수 있었던 이유는? | 스마트폰은 통신기능과 컨텐츠 생산, 검색 기능을 갖춘 융합기기라는 하드웨어 측면뿐만 아니라 응용프로그램(앱)을 설치하여 사용자 필요에 따라 다양한 기능을 추가할 수 있는 장점 때문에 새로운 컴퓨팅 플랫폼으로 자리잡아가고 있다. 2009년 5%에 불과했던 전세계 스마트폰 보급률은 2014년 24. |
Ajzen, I. and M. Fishbein, Belief, Attitude, Intention and Behavior : An Introduction to Theory and Research, 1975.
Bagchi, K., P. Kirs, and R. Cerveny, "Global Software Piracy : Can Economic Factors Along Explain the Trend?", Communications of the ACM, Vol.49, No.6, 2006, 70-75.
Bandura, A., Social Foundations of Thought and Action : A Social Cognitive Theory, Prentice-Hall, Inc, 1986.
Beck, L. and I. Ajzen, "Predicting Dishonest Actions Using the Theory of Planned Behavior", Journal of Research in Personality, Vol.25, No.3, 1991, 285-301.
Bezmen, T.L. and C.A. Depken, "Influences on Software Piracy : Evidence from the Various United States", Economics Letters, Vol.90, No.3, 2006, 356-361.
Bohner, G. and N. Dickel, "Attitudes and Attitude Change", Annual Review of Psychology, Vol.62, No.1, 2011, 391-417.
Business Software Alliance, The Compliance Gap : BSA Global Software Survey, 2014.
Byrne, B.M., Structural Equation Modeling with AMOS : Basic Concepts, Applications, and Programming, 2nd ed. Lawrence Erlbaum Associates, Mahwah, NJ, 2010.
Cheng, H.K., R.R. Sims, and H. Teegen, "To Purchase or to Pirate Software : An Empirical Study", Journal of Management Information Systems, Vol.13, No.4, 1997, 49-60.
Cheung, G.W. and R.B. Rensvold, "Evaluating Goodness-of-Fit Indexes for Testing Measurement Invariance", Structural Equation Modeling : A Multidisciplinary Journal, Vol.9, No.2, 2002, 233-255.
Christensen, A.L. and M.M. Eining, "Factors Influencing Software Piracy : Implications for Accountants", Journal of Information Systems, Vol.5, No.1, 1991, 67-80.
Compeau, D.R. and C.A. Higgins, "Computer Self-Efficacy : Development of a Measure and Initial Test", MIS Quarterly, Vol.19, No.2, 1995, 189-211.
Cronan, T.P. and S. Al-Rafee, "Factors That Influence the Intention to Pirate Software and Media", Journal of Business Ethics, Vol.78, No.4, 2008, 527-545.
D'Astous, A., F. Colbert, and D. Montpetit, "Music Piracy on the Web-How Effective Are Anti-Piracy Arguments? Evidence from the Theory of Planned Behaviour", Journal of Consumer Policy, Vol.28, No.3, 2005, 289-310.
Depken, C.A. and L.C. Simmons, "Social Construct and the Propensity for Software Piracy", Applied Economics Letters, Vol.11, No.2, 2004, 97-100.
Digieco Report, Tap On The Door of Mobile First World, 2015.
Engadget, "Monument Valley Dev : 5% of Android Players Paid to Play", 2015. Available at http://www.engadget.com/2015/01/06/monument-valley-dev-5-of-android-players-paid-to-play/(Accessed January 6, 2015).
Gopal, R.D., G.L. Sanders, S. Bhattacharjee, M. Agrawal, and S.C. Wagner, "A Behavioral Model of Digital Music Piracy", Journal of Organizational Computing and Electronic Commerce, Vol.14, No.2, 2004, 89-105.
Gopal, R.D. and G.L. Sanders, "International Software Piracy : Analysis of Key Issues and Impacts", Information Systems Research, Vol.9, No.4, 1998, 380-397.
Gopal, R.D. and G.L. Sanders, "Global Software Piracy : You Can't Get Blood out of a Turnip", Communications of the ACM, Vol.43, No.9, 2000, 82-89.
Gottfredson, M. and T. Hirschi, A General Theory of Crime, Stanford University Press, 1990.
Hair, J.F., W.C. Black, B.J. Babin, and R.E. Anderson, Multivariate Data Analysis, 7th ed. New Jersey : Prentice Hall, 2009.
Hennig-Thurau, T., V. Henning, and H. Sattler, "Consumer File Sharing of Motion Pictures", Journal of Marketing, Vol.71, No.4, 2007, 1-18.
Higgins, G.E., "Can Low Self-Control Help With the Understanding of the Software Piracy Problem?", Deviant Behavior, Vol.26, No.1, 2004, 1-24.
Hinduja, S., "Neutralization Theory and Online Software Piracy : An Empirical Analysis", Ethics and Information Technology, Vol.9, No.3, 2007, 187-204.
Hunt, S.D. and S. Vitell, "A General Theory of Marketing Ethics", Journal of Macromarketing, Vol.6, No.1, 1986, 5-16.
Ingram, J.R. and S. Hinduja, "Neutralizing Music Piracy : An Empirical Examination", Deviant Behavior, Vol.29, No.4, 2008, 334-366.
INSEAD, Competitive Advantage : The Economic Impact of Properly Licensed Software, 2013.
Ki, E.J., B.H. Chang, and H. Khang, "Exploring Influential Factors on Music Piracy across Countries", Journal of Communication, Vol. 56, No.2, 2006, 406-426.
Kim, J.H., "A Study on the Predictors of Intention to Pirate Software", Journal of the Korea Society of IT Services, Vol.12, No.2, 2013, 131-152. (김중한, "소프트웨어 불법복제 의도에 미치는 영향 요인에 관한 연구", 한국IT서비스학회지, 제12권, 제2호, 2013, 131-152.)
Korea Copyright Commission, Research on Status of Copyright Violations from Mobile Equipment and Setting up Countermeasures, 2011. (한국저작권위원회, "스마트 기기를 통한 저작권 침해 실태조사 및 대응방안 연구", 2011.)
Korea Federation of Copyright Organizations, Annual Report on Copyright Protection, 2014. (한국저작권단체연합회, "저작권 보호 연차보고서", 2014.)
Leonard, L.N.K. and T.P. Cronan, "Illegal, Inappropriate, and Unethical Behavior in an Information Technology Context : A Study to Explain Influences", Journal of the Association for Information Systems, Vol.1, No. 12, 2001, 1-31.
Limayem, M., M. Khalifa, and W.W. Chin, "Factors Motivating Software Piracy : A Longitudinal Study", IEEE Transactions on Engineering Management, Vol.51, No.4, 2004, 414-425.
Lin, T., M.H. Hsu, F. Kuo, and P. Sun, "An Intention Model-Based Study of Software Piracy", In Proceedings of the 32nd Hawaii International Conference on System Sciences, 1999.
Lysonski, S. and S. Durvasula, "Digital Piracy of MP3s : Consumer and Ethical Predispositions", Journal of Consumer Marketing, Vol.25, No.3, 2008, 167-178.
Ministry of Knowledge Economy, 2011 Employment Trends Report, 2012. (지식경제부, "2011년 정보통신부문 인력동향 보고서", 2012.)
Moon, B., J.D. McCluskey, and C.P. McCluskey, "A General Theory of Crime and Computer Crime : An Empirical Test", Journal of Criminal Justice, Vol.38, No.4, 2010, 767-772.
Moores, T.T., "An Analysis of the Impact of Economic Wealth and National Culture on the Rise and Fall of Software Piracy Rates", Journal of Business Ethics, Vol.81, No.1, 2008, 39-51.
Morris, R.G. and G.E. Higgins, "Neutralizing Potential and Self-Reported Digital Piracy : A Multitheoretical Exploration Among College Undergraduates", Criminal Justice Review, Vol.34, No.2, 2008, 173-195.
Nandedkar, A. and V. Midha, "It Won't Happen to Me : An Assessment of Optimism Bias in Music Piracy", Computers in Human Behavior, Vol.28, No.1, 2012, 41-48.
Peace, A.G., D.F. Galletta, and J.Y.L. Thong, "Software Piracy in the Workplace : A Model and Empirical Test", Journal of Management Information Systems, Vol.20, No.1, 2003, 153-177.
Piquero, N.L. and A.R. Piquero, "Democracy and Intellectual Property : Examining Trajectories of Software Piracy", The ANNALS of the American Academy of Political and Social Science, Vol.605, No.1, 2006, 104-127.
Randall, D.M. and A.M. Gibson, "Ethical Decision Making in the Medical Profession : An Application of the Theory of Planned Behavior", Journal of Business Ethics, Vol.10, No.2, 1991, 111-122.
Sinha, R.K. and N. Mandel, "Preventing Digital Music Piracy : The Carrot or the Stick?", Journal of Marketing, Vol.72, No.1, 2008, 1-15.
Sykes, G.M. and D. Matza, "Techniques of Neutralization : A Theory of Delinquency", American Sociological Review, Vol.22, No. 6, 1957, 664-70.
Thong, J.Y.L. and C.S. Yap, "Testing an Ethical Decision-Making Theory : The Case of Softlifting", Journal of Management Information Systems, Vol.15, No.1, 1998, 213-37.
Triandis, H.C., "Values, Attitudes, and Interpersonal Behavior", In Nebraska Symposium on Motivation, 1979.
Van Kranenburg, H. and A. Hogenbirk, "Multimedia, Entertainment, and Business Software Copyright Piracy : A Cross-National Study", Journal of Media Economics, Vol. 18, No.2, 2005, 109-129.
Vitell, S.J., J.J. Singh, and J.G.P. Paolillo, "Consumers' Ethical Beliefs : The Roles of Money, Religiosity and Attitude toward Business", Journal of Business Ethics, Vol.73, No.4, 2007, 369-379.
Williams, K.R. and R. Hawkins, "Perceptual Research on General Deterrence : A Critical Review", Law and Society Review, Vol.20, 1986, 545-572.
Yoon, C., "Theory of Planned Behavior and Ethics Theory in Digital Piracy : An Integrated Model", Journal of Business Ethics, Vol. 100, No.3, 2011, 405-417.
Zhang, X., M. Shim, and G. Gim, "An Empirical Study of the Piracy Behavior on Digital Content", Journal of Korea IT Service, Vol.9, No.4, 2010, 37-55. (장향란, 심민우, 김광용, "디지털콘텐츠 불법복제 행동에 관한 연구", 한국IT서비스학회지, 제9권, 제4호, 2010, 37-55.)
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
출판사/학술단체 등이 한시적으로 특별한 프로모션 또는 일정기간 경과 후 접근을 허용하여, 출판사/학술단체 등의 사이트에서 이용 가능한 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.