2018
DOI: 10.1080/0267257x.2018.1452278
|View full text |Cite
|
Sign up to set email alerts
|

Online piracy in the context of routine activities and subjective norms

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
14
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 26 publications
(25 citation statements)
references
References 117 publications
1
14
0
Order By: Relevance
“…The law sees digital piracy as a crime against property, a theft. It is the logic of powerful industry players, which focus on prevention efforts (Akulavic ˇius & Bartkus, 2015;Petrescu et al, 2018). Therefore, it is crucial to understand their behavior, motives, and cognitive processes in order to develop deterrent strategies and to realign them with legal standards (Hashim et al, 2018).…”
Section: Digital Piracy As Theftmentioning
confidence: 99%
“…The law sees digital piracy as a crime against property, a theft. It is the logic of powerful industry players, which focus on prevention efforts (Akulavic ˇius & Bartkus, 2015;Petrescu et al, 2018). Therefore, it is crucial to understand their behavior, motives, and cognitive processes in order to develop deterrent strategies and to realign them with legal standards (Hashim et al, 2018).…”
Section: Digital Piracy As Theftmentioning
confidence: 99%
“…Specifically, engaging in leisure activities could increase one’s satisfaction level with the activity, which subsequently shows a positive attitude toward the activities (Eskiler et al , 2019). In the cybercrime context, it was confirmed that when individuals are exposed frequently to the virtual environment, it will lead them to have attitudes change toward cybercrime activities, such as online software piracy (Petrescu et al , 2018).…”
Section: Recommendations For Phishing Prevention: the Importance Of A...mentioning
confidence: 98%
“…Therefore, the following procedures were undertaken in accordance with recommended guidelines for appropriate scale development processes by Hinkin (1998) andChurchill (1979). First, the items were developed perusing the literature on RAT and using items from established measurement scales applied in many other settings such as cyberstalking (Reyns, Henson, & Fisher, 2011), malware activities (Bossler & Holt, 2009), software piracy (Petrescu, Gironda & Korgaonkar, 2018;Tan, 2002), and robbery (Spano & Nagy, 2005). These were adapted to reflect the shoplifting context of our study.…”
Section: Perceived Behavioral Controlmentioning
confidence: 99%