參考文獻
一、 中文文獻
1. 宋文娟,2001,「一種質量並重的研究法-德菲法在醫務管理學研究領域之應用」,醫務管理,第2卷2期,頁11-20。2. 李正國,2003,「盜版光碟犯罪行為現況分析與建議」,智慧財產季刊,44 期,頁59-63。3. 李利芳,趙傑,2006,「Rational Analysis on Relationship between Ethics and Law in Legal Ethics」,太原師範學院學報,3 月號。
4. 李昇穎、陳怡璇、陳郁佳、盧欣妤、羅淑汝,2006,「台灣線上音樂之商業模式探討」,網路社會學通訊期刊52。
5. 汪志堅,2005,「盜版商品購買意願影響因素之研究:以音樂雷射唱片為例」,行銷評論,第2卷第4期,頁491-522。6. 何雍慶、張威龍、林泰安,2004,「行銷道德強度、知覺風險與道德判斷力對購買意願之影響:以大專學生之MP3盜錄為例」,『管理思維與實務』學術研討會論文集,頁90-105,台北。
7. 林東清,2005,第二版,資訊管理,台北,智勝文化。
8. 劉耀仁,2008,台灣音樂著作盜版防治政策工具之系統動態研究,國立交通大學科技管理研究所博士論文。9. 謝鴻源,2004,本地唱片業者如何因應當前主要問題之研究,國立交通大學傳播所碩士論文。二、 英文文獻
1. Ajzen I (1985), “From Intentions to Behavior: A Theory of Planned Behavior,” in I. J. K. J. B. (eds.), Action-Control: From Cognition to Behavior (Spinger, Heidelberg), pp. 11–39.
2. Ajzen, I (1991), “The Theory of Planned Behavior,” Organizational Behavior and Human Decision Processes 50(1), pp. 179–211.
3. Ajzen, I. (2002), “Perceived Behavioral Control, Self-Efficacy, Locus of Control, and the Theory of Planned Behavior,” Journal of Applied Social Psychology 32, pp. 1-20.
4. Anderson, R. and D. Johnson, et al. (1993), “Using the New ACM Code of Ethics in Decision Making,” Communications of the ACM 36(2), pp. 98–107.
5. Ang, S. H., P. S. Cheng, E. A. C. Lim and S. K. Tambyah (2001), “Spot the Difference: Consumer Responses Towards Counterfeits,” Journal of Consumer Marketing 18(3), pp. 219-235.
6. Banerjee, D. and T. P. Cronan, et al. (1998), “Modeling IT Ethics: A Study in Situational Ethics,” MIS Quarterly 22(1), pp. 31–60.
7. Bansal, H. S., Voyer, P. A. (2000), “Word-of-Mouth Processes within a Services Purchases Decision Context,” Journal of Service Research 3, pp. 166-177.
8. Bauer, R. A. (1960), “Consumer Behavior as Risk Taking, Dynamic Marketing for a Changing World,” American Marketing Association, Chicago, pp. 389-398.
9. Beck, L. and I. Ajzen (1991), “Predicting Dishonest Actions Using the Theory of Planned Behavior,” Journal of Research in Personality 25(3), pp. 285–301.
10. Bolton, R. N (1998), “A Dynamic Model of the Duration of the Customer’s Relationship with A Continuous Service Provider: The Role of Satisfaction,” Marketing Science 17, pp. 45-65.
11. Bolton, R. N. and K. N. Lemon (1999), “A Dynamic Model of Customers’ Usage of Services: Usage as an Antecedent and Consequence of Satisfaction,” Journal of Marketing Research 36, pp. 171-186.
12. Bhattacherjee, A. (2001) “Understanding Information Systems Continuance: An Expectation Confirmation Model,” MIS Quarterly 25(3), pp. 351-370.
13. Bhattacharjee, S. and R. Gopal, et al. (2003), “Digital Music and Online Sharing: Software Piracy 2.0,” Communication of the ACM 46(7), pp. 107–111.
14. Bhattacharjee, S. and R. Gopal, et al. (2006), “Consumer Search and Retailer Strategies in the Presence of Online Music Sharing,” Journal of Management Information Systems 23(1), pp. 129–141.
15. Bhattacharjee, S. and R. Gopal, et al. (2006), “What Happened to Payola? An Empirical Analysis Online Music Sharing,” Decision Support Systems 42(1), pp. 104–110.
16. Chang, M. K. (1998), “Predicting Unethical Behavior: A Comparison of the Theory of Reasoned Action and the Theory of Planned Behavior,” Journal of Business Ethics 17(16), pp. 1825–1834.
17. Chellappa, R. and S. Shivendu (2003), “Economic Impacts of Variable Technology Standards for Movie Piracy in a Global Context,” Journal of Management Information Systems 20(2), pp. 137–149.
18. Cheng, H. and R. Sims, et al. (1997), “To Purchase or to Pirate Software: An Empirical Study,” Journal of Management Information Systems 4, pp. 49–60.
19. Chiou, J. S., C. Y. Huang and H. H. Lee (2005), “The Antecedents of Music Piracy Attitudes and Intentions,” Journal of Business Ethics 57(2), pp. 161–174.
20. Chiou, J. S. and Shen, C. C. (2006), “The effects of satisfaction, opportunism, and asset specificity on consumers’ loyalty intention toward internet portal sites,” International Journal of Service Industry Management 17(1), pp. 7-22.
21. Colbert, F., Tomiuk, M.-A., Hwang, H., & Me’nard, M. (2003). An investigation into the effects of Napster’s demise on the purchase of music CD’s. Proceedings of the 7th International Conference on Arts and Cultural Management. Milan, Italy: Universita` Commerciale Luigi Bocconi (electronic document).
22. Connolly, Marie and Alan B. Krueger (2005), “Rockonomics: The Economics of Popular Music,” in Handbook of the Economics of Arts and Culture, V.A. Ginsburgh and D. Throsby, eds. Amsterdam: North Holland, pp. 667–720.
23. Conti, G. (2006), “Hacking and Innovation,” Communications of the ACM 49(6), pp. 33–36.
24. Cronin, J. J. and S. A. Taylor (1992), “Measuring Service Quality: A Reexamination and Extension,” Journal of Marketing 56, pp. 55-68.
25. Cronan T. P. and Al-Rafee S. (2008), “Factors that Influence the Intention to Pirate Software and Media,” Journal of Business Ethics 78, pp. 527-545.
26. d’Astous, A., F. Colbert & D. Montpetit (2005) “Music Piracy on the Web – How Effective Are Anti-Piracy Arguments? Evidence From the Theory of Planned Behaviour.” Journal of Consumer Policy 28, pp. 289–310.
27. Deng, S., P. Townsend, M. Robert and N. Quesnel (1996), “A Guide to Intellectual Property Rights in Southeast Asia and China,” Business Horizon 39(6), 43–51.
28. Dubinsky, A. J., Loken, B. (1989), “Analyzing Ethical Decision Making in Marketing,” Journal of Business Ethics 19(2), pp 83-107.
29. Feinberg, R. M. and D. J. Rousslang (1990), “The Economic Effects of Intellectual Property Right Infringements,” Journal of Business 63(1), pp. 79–90.
30. Feuilherade, P. (2004) Online Piracy “Devastates” Music, BBC News. 2004.
31. Fishbein, M. and I. Ajzen (1975), “Attitude, Intention, and Behavior: An Introduction to Theory and Research” (Reading, MA).
32. Fornell, C., and Larcker, D.F. (1981), “Structural equation models with unobservable variables and measurement errors,” Journal of Marketing Research 18(2), pp. 39–50.
33. Fornell, C. (1992), “A National Customer Satisfaction Barometer: The Swedish Experience.” Journal of Marketing 56(1), pp. 6-21.
34. Fornell, C., M. D. Johnson, E. W. Anderson, J. Cha, and B. E. Bryant (1996), “The American Customer Satisfaction Index: Nature, Purpose, and Findings,” Journal of Marketing 60, pp. 7-18.
35. Fritzsche, D.J., Becker, H. (1983), “Ethical Behavior of Marketing Managers,” Journal of Business Ethics 2, pp. 291-299.
36. Fraedrich, J. P., Ferrell, O.C. (1992), “The impact of perceived risk and moral philosophy type on ethical decision making in business organizations,” Journal of Business Research 24(4), pp. 283-95.
37. Forrester (2003):“US Youth Online Study.”
38. Garbarino, E. and Johnson, M.S. (1999), “The different roles of satisfaction, trust and commitment in customer relationships,” Journal of Marketing 63, pp. 70-87.
39. Gefen, D.; Straub, D.; and Boudreau, M. (2000), “Structural equation modeling and regression: Guidelines for research practice,” Communications of the Association for Information Systems 4(7), pp. 1–77.
40. Gefen, D. (2002), “Customer loyalty in e-commerce,” Journal of the Association for Information Systems 3(1), pp. 27–51.
41. Gopal, R. D. and G. L. Sanders (1998), “International Software Piracy: Analysis of Key Issues and Impacts,” Information Systems Research 9(4), pp. 380–397.
42. Gopal, R. D., Sanders, G. L., Bhattacharjee, S., Agrawal, M., & Wagner, S. C. (forthcoming). “A behavioral model of digital music piracy,” Journal of Organizational Computing and Electronic Commerce.
43. Graziano, M. and L. Rainie (2001), “The Music Downloading Deluge: 37 Million American Adults and Youths Have Retrieved Music Files on the Internet,” Pew Internet Tracking Report (April 24), pp. 1-8.
44. Graham, A. P. (2003),“Software Piracy in the Workplace: A Model and Empirical Test,” Journal of management Information Systems 20(1), pp. 153-177.
45. Helm, B. (2005), “A hard ride for eDonkey,” Business Week, October 24, pp. 90-2.
46. Hiatt, B. and Serpick, E. (2007), “The record industry’s slow fade,” Rolling Stone, June 28, pp. 13-14.
47. Howard, J. A. and Sheth, J. N. (1969), “The Theory of Buyer Behavior,” John Wiley and Sons Inc., New York, NY.
48. Huang C. Y. (2005), “File Sharing as a Form of Music Consumption.” International Journal of Electronic Commerce 9(4), pp. 37-55
49. Huang, M., Liu, M. and Zhu, H. (2007), “Why Do Chinese Users Use Pirated Software: An Integrative Perspective?”[Downloaded on November 11, 2009 at 03:05 from IEEE Xplore.]
50. Hunt, S. and S. Vitell (1986), “A General Theory of Marketing Ethics,” Journal of Micromarketing 6, pp. 5–16.
51. Husted, B. W. (2000), “The Impact of National Culture on Software Piracy,” Journal of Business Ethics 26(3), pp. 197–211.
52. Hsu M.H. and Kuo F.Y.(2002),“An Investigation of Volitional Control in Information Ethics,” Behaviour and Information Technology, pp. 1-10.
53. IFPI (2008), “IFPI Digital Music Report: Revolution, Innovation, Responsibility,” (accessed March 29, 2008), [available at http://www.ifpi.org/content/library/DMR2008.pdf].
54. Jintae, L. and Younghwa, L. (2002), “A holistic Model of Computer Abuse within Organizations,” Information Management and Computer Security, 10 (2/3), pp. 57-63.
55. Jones, M.A. and Suh, J. (2000), “Transaction-specific satisfaction and overall satisfaction: an empirical analysis,” Journal of Service Marketing 14(2), pp. 147-59.
56. Jones, T. M. (1991), “Ethical Decision Making by Individuals in Organizations:An Issue Contingent Model,” Academy fo Management Review, 16(2), pp. 336-395
57. Keaveney, S.M. and Parthasarathy, M. (2001), “Customer Switching Behavior in Online Service: An Exploratory Study of the Role of Selected Attitudinal, Behavioral, and Demographic Factors,” Academy of Marketing Science, 29(4), pp. 374-390.
58. Knopper, S. (2004), “Lawsuits fail,” Rolling Stone, August 19, p. 32.
59. Knopper, S. (2007), “RIAA campaign rejected by colleges,” Rolling Stone, April 19, p. 12.
60. Kotler, P. (2000), “Marketing Management: Analysis, Planning Implementation and Control,” 10th Ed., Prentice Hall, Englewood Cliffs, NJ.
61. Kreie, J. and P. Cronan (1999), “Copyright, Piracy, Privacy, and Security Issues: Acceptable or Unacceptable Actions for End Users,” Journal of End User Computing 11(2), pp. 13–21.
62. Kuo, F. and M. Hsu (2001), “Development and Validation of Ethical Computer Self-Efficacy Measure: The Case of Softlifting,” Journal of Business Ethics 32, pp. 299–315.
63. Kwong, T. C. H., & Lee, M. K. O. (2002). “Behavioral intention model for the exchange mode Internet music piracy,” Proceedings of the 35th Annual Hawaii International Conference on System Sciences, Computer Society (electronic document).
64. Kwong, K. K et al (2003), “The Effects of Attitudinal and Demographic Factors on Intention to Buy Pirated CDs: The Case of Chinese Consumers,” Journal of Business Ethics 47, pp. 223-235.
65. Lai, K. K-Y. and J. L. Zaichkowsky (1999), “Brand Imitation: Do the Chinese Have Different Views?,” Asia Pacific Journal of Management 16(2), 179–192.
66. Lau, E. (2003), “An Empirical Study of Software Piracy,” Business Ethics 12(3), pp. 233–245.
67. Lessig, L (2002), The Future of Ideas (Vintage Books, New York, NY).
68. Liao, C, Lin, H. N. and Liu, Y. P. (2010), “Predicting the Use of Pirated Software: A Contingency Model Integrating Perceived Risk with the Theory of Planned Behavior,” Journal of Business Ethics 91, pp. 237–252.
69. Limayem, M., Khalifa M. and Chin, W. W. (1999),“Factors Motivating Software Piracy: A Longitudinal Study,” Proceeding of the 20th International Conference on Information, pp 124–131.
70. Loch, K. D. and Conger, S. (1996), “Evaluating Ethical Decision Making and Computer Use,” Communications of the ACM 39(7), pp. 74-83.
71. Lysonski, S. and Durvasula, S. (2008), “Digital piracy of MP3s: consumer and ethical predispositions,” Journal of Consumer Marketing 25(3), pp.167-178.
72. Madden, T. and P. Ellen, et al (1992), “A Comparison of the Theory of Planned Behavior and the Theory of Reasoned Action,” Personality and Social Psychology Bulletin 18, pp. 3-9.
73. McDonald, G. and C. Roberts (1994), “Product Piracy: The Problem that will not Go Away,” Journal of Product & Brand Management 3(4), pp. 55–65.
74. Morris, S. A. and R. A. McDonald (1995), “The Role of Moral Intensity in Moral Judgments: An Empirical Investigation,” Journal of Business Ethics 14, pp. 715-726.
75. Moores, T. T. and J. C. J. Chang (2006), “Ethical Decision Making in Software Piracy: Initial Development and Test of a Four-Component Model,” MIS Quarterly 30(1), pp. 167–180.
76. Nia, A. and J. L. Zaichkowsky (2000), “Do Counterfeits Devalue the Ownership of Luxury Brands?,” Journal of Product & Brand Management 9(7), 485–497.
77. Nunnally, J.(1978), “Psychometric Theory,” New York: McGraw-Hill.
78. Oliver, R.L (1980), “A Cognitive Model of the Antecedents and Consequences of Satisfaction Decision,” Journal of Marketing Research 17(11), pp. 460-469.
79. Oliver, R. L (1999), “Whence Consumer Loyalty?” Journal of Marketing 63, pp. 33-44.
80. Park, C., and Kim, Y. (2006), “The Effect of Information Satisfaction and Relational Benefit on Consumers’ Online Shopping Site Commitments,” Journal of Electronic Commerce in Organization 4(1), pp. 70-90.
81. Peace, A. G., Galletta, D. F., and Thong, J. Y. L. (2003). “Software piracy in the workplace: A model and empirical test,” Journal of Information Systems 20, pp. 153-177.
82. Rest, J. R. (1986), “Moral Development: Advances in Research and Theory,” N.Y., Westprot, Connneticut.
83. Rest, J. R (1979), “Developing in Judging Moral Issues” (University of Minnesota Press, Minneapolis, MN).
84. Ryu, S. et al.(2003), “Knowledge Sharing Behavior of Physicians in Hospitals,” Expert Systems with Applications 25, pp. 113-122.
85. Shultz II, C. J. and B. Saporito (1996), “Protecting Intellectual Property: Strategies and Recommendations to Deter Counterfeiting and Brand Piracy in Global Markets,” Columbia Journal of World Business 31 (Spring), pp. 18–28.
86. Simone, J. T. (1999), “Countering Counterfeiters,” The China Business Review ( January-February), pp. 12–19.
87. Simmons, L. (2004), “An exploratory analysis of software piracy using cross-cultural data,” International Journal of Technology Management 28(1), pp. 139-48.
88. Simpson P. M., Banerjee D. and Simpson C. L. (1994), “Softlifting: A Model of Motivating Factors,” Journal of Business Ethics 13, pp. 431-438.
89. Sinha, Rajiv K. and Naomi Mandel (2008), “Preventing Digital Music Piracy: The Carrot or the Stick? ” Journal of Marketing 72, pp. 1-15.
90. Siwek, Stephen E. (2006), “The True Cost of Motion Picture Piracy to the US Economy,” Institute for Policy Innovation, (accessed March 29, 2008), [available at http://www.ipi.org/ ipi%5CIPIPublications.nsf/PublicationLookupFullTextPDF/ 293C69E7D5055FA4862571F800168459/$File/CostOfPiracy. pdf?OpenElement].
91. Straub, D. and R. Collins (1990), “Key Information Liability Issues Facing Managers: Software Piracy, Proprietary Databases, and Individual Right to Privacy,” MIS Quarterly (June), pp. 143–156.
92. Swinyard, W. R., H. Rinne and A. K. Kau (1990), “The Morality of Software Piracy: A Cross-Cultural Analysis,” Journal of Business Ethics 9(8), pp. 655–664.
93. Tan, B. (2002), “Understanding consumer ethical decision making with respect to purchase of pirated software,” The Journal of Consumer Marketing 19(2), pp. 96-111.
94. Thong, J. and C. Yap (1998), “Testing an Ethical Decision- Making Theory: The Case of Softlifting,” Journal of Management Information Systems 15(1), pp. 213–237.
95. Tonglet, M. (2001), “Consumer misbehaviour: An exploratory study of shoplifting,” Journal of Consumer Behavior 1, pp.336-354.
96. Trevino, L. (1986), “Ethical Decision Making in Organizations: A Person- Situation Interactionist Model,” Academy of Management Review 11(3), pp. 601-617.
97. Vallerand, R. J. and L. G. Pelletier (1992), “Ajzen and Fishbein’s Theory of reasoned Action as Applied to Moral Behavior: A Confirmatory Analysis,” Journal of Personality and Social Psychology 62 (January), 98.
98. Von Lohmann, F. (2003), “Peer-to-Peer File Sharing and Copyright Law: A Primer for Developers,” in F. Kaashoek and I. Stoica (eds.), Peer-to-Peer System II: Second International Workshop (IPTPS 2003, LNCS 2735, Springer), pp. 108–117.
99. Walls, W. and P. Harvey (2006), “Digital Pirates in Practice: Analysis of Market Transactions in Hong Kong’s Pirate Software Arcades,” International Journal of Management 23(2), pp. 207–215.
100. Wagner, S. and G. Sanders (2001), “Considerations in Ethical Decision-Making and Software Piracy,” Journal of Business Ethics 29(1/2), pp. 161–167.
101. Walsh, G., Mitchell, V., Frenzel, T. and Wiedmann, K. (2003), “Internet-induced changes in consumer music procurement behavior,” Marketing Intelligence and Planning 21(5), pp. 305-17.
102. Wang, F., Zhang, H., Zang, H. and Ouyang, M. (2005), “Purchasing pirated software: an initial examination of Chinese consumers,” Journal of Consumer Marketing 22(6), pp.340-351.
103. Weber, J. (1990), “Manager’s Moral Reasoning: Assessing their responses to three moral dilemmas,” Human Relations 43, pp. 687-702.
104. Weber, J (1993), “Assessing the Role of the Moral Issue and its Intensity upon Managerial Decision Making,” International Association for Business and Society Proceedings pp. 390-394.
105. Wee, C. H., S. J. Tan and K. H. Cheok (1995), “Nonprice Determinants of Intention to Purchase Counterfeit Goods: An Exploratory Study,” International Marketing Review 12(6), pp. 19–46.
106. Westbrook, R. A. (1981), “Sources of consumer satisfaction with retail outlets,” Journal of Retailing 5, pp. 68-85.
107. Zeithaml, V. A., L. L. Berry and A. Parasuraman (1996), “The Behavioral Consequences of Service quality,” Journal of Marketing 60, pp. 31-46.