一、中文部分
1.林安凱(民93)「網路族為何下載mp3?比較理性與非理性動機的影響」,台北;東吳大學企管研究所碩士論文。2.陳品錚(民93)「點對點環境下檔案分享行為之倫理決策探討」,台北;東吳大學企管研究所碩士論文。3.簡志峰(民92)「點對點環境下使用者分享行為之研究」,台北;東吳大學企管研究所碩士論文。4.兩岸著作權問答增修版(民83),台北;行政院大陸委員會。
5.楊雲明(民91),個體經濟學,台北;智勝文化。
6.邱皓政(民93),結構方程模式:LISREL的理論、技術與應用,台北;雙葉書廊。
二、英文部分
1.Ajzen, I. (1985), “From intentions to actions: A theory of planned behavior”. In J. Kuhi & J.Beckmann (Eds.), Action control: From cognition to behavior, Springer, Heidelberg.
2.Ajzen, I. (1991), “The theory of planned behavior,” Organizational Behavior and Human Decision Process, 50: 179-211.
3.Ajzen, I., Fishbein, M. (1980), Understanding attitudes and predicting social behavior. Prentice-Hall, Englewood Cliffs, NJ.
4.Anderson, J. C., and Gerbing, D. W. (1988), “Structural equation modeling in practice: A review and recommended two-step approach,” Psychological Bulletin, 103(3): 411-423.
5.Bagozzi, R. P., and Yi, Y. (1988), “On the evaluation of structural equations,” Journal of the Academy of Marketing Science, 16(1) : 74-94
6.Banerjee, D. (1998), “Modeling IT ethics: A study of situational ethics” MIS Quarterly, 22(1): 31-60.
7.Beck L., Ajzen I. (1991), ”Predicting dishonest actions using the theory of planned behavior,” Journal of Research in Personality, 24: 285–301.
8.Becker, J., M. Clement (2004), “The economic rationale of offering media files in peer-to-peer networks,” 37th Hawaii International Conference on System Sciences.
9.Bentler, P. M., Bonett, D. G., (1980), “Significance test and goodness of fit in the analysis of covariance structures,” Psychological Bulletin, 88(3): 588-606.
10.Bhattacharjee, S., R. D. Gopal, and G. L. Sanders (2003), “Digital music and online sharing: Software piracy 2.0?” Communications of The ACM, 46(7): 107-111.
11.Blau P. (1964), Exchange and power in social life, Wiley, NY.
12.Browne, M. W. and Cudeck, R. (1993), “Alternative ways of assessing model fit,” In Bollen and Long (Eds.), Testing structural equation models : 136-162.
13.Chang, M. K. (1998), “Predicting unethical behavior: A comparison of the theory of reasoned action and the theory of planned behavior,” Journal of Business Ethics, 17: 1825-1834.
14.Einging, M. M. and A. L. Christensen (1991), A psycho-social model of software piracy: The development and test on model, in R. Dejoie, G. Flower, and D. Paradice(eds.), Ethical Issues in Information Systems. Boyd and Fraser Publishing Company, Boston.
15.Emerson, R.A. (1972), “Power-dependence relations,” American Sociological Review, 27: 31-41.
16.Fornell, C., and Larker, D. (1981), “Evaluating structure equations model with unobservable variables and measurement error,” Journal of Marketing Research, 18(1): 39-50.
17.Ginate, J. C., W. G. Park (1997), “Determinants of patent rights: A cross-national study,” Research Policy: 26:283-301.
18.Gopal, R. D., G. L. Sanders (2000), “Global software piracy: You can’t get blood out of a turnip,” Communications of the ACM, 43(9): 82-89.
19.Gopal, R. D., G. L. Sanders (1998), “International dimensions of the productivity paradox,” Communications of the ACM, 9(4): 380-397.
20.Gopal, R. D., G. L. Sanders, S. Bhattacharjee, M. Agrawal, and S. C. Wager (2004), “A behavior model of digital music piracy,” Journal of Organizational Computing and Electric Commence, 14(2): 89-105.
21.Guoa, L., S. Jiangb, L. Xiaoc, X. Zhanga (2005), “Fast and low-cost search schemes by exploiting localities in P2P networks,” Journal of Parallel and Distributed Computing, 65:729-742.
22.Hair, J. F., R. E. Anderson, R. L. Tatham, and W. C. Black (1992), Multivariate data analysis with readings, Macmillan, Heidelberg.
23.Hofmans, G.. C. (1958), “Social behavior as exchange,” The American Journal of Sociology: 597-606.
24.Hofstede, G. (1980), Culture’s consequence: International differences in work-related values, Sage, Beverly Hills, CA.
25.Hu, L. and Bentler, P. M. (1999), “Cutoff criteria for fit indexes in covariance structure analysis:Conventional criteria versus new alternatives,” Structural Equation Modeling, 6(1): 1-55
26.Husted, B. W. (2000), “The impact of national culture on software piracy,” Journal of Business Ethics, 26(3): 197-211.
27.Karen, D. L., S. Conger (1996), “Evaluating ethical decision making and computer use,” Communications of the ACM, 39(7):74-83.
28.Knack, S., P. Keefer (1995), “Institutions and economic performance: Cross country tests using alternative institutional measures,” Economics and Politics, 7:207-227.
29.Krishnan, R., M. D. Smith, R. Telang (2003), “The economics of peer-to-peer networks,” Journal of Information Technology Theory and Applications, 5(3): 31-44.
30.Krishnan, R., M. D. Smith, Z. Tang, and R. Telang (2002), "The virtual commons: Why free-riding can be tolerated in file sharing networks," International Conference on Information Systems (ICIS).
31.Lending, D., S. A. Slaughter (1999), “Understanding differences in ethical beliefs and behaviors toward software copying: the effects of organization culture,” SIGCPR: 253-260.
32.Leonard, L. N. K., Timothy Paul Cronan, and Jennifer Kreie (2004), “What influences IT ethical behavior intentions-planned behavior, reasoned action, perceived importance, or individual characteristics?” Information & Management, 42:143-158.
33.Madden T.J., Ellen P.S., Ajzen I. (1992), “A comparison of the theory of planned behavior and the theory of reasoned action,” Personality and Social Psychology Bulletin, 18(1): 3–9.
34.Marron, D. B., D. G. Stell (2000), “Which country protect intellectual property? The case of software piracy,” Economic Inquiry, 38(2):159-174.
35.Nually, J. C. (1978), Psychometric Theory, McGraw-Hill, NY.
36.Paramenswaran, M., A. Susarla, and A. B. Whinston. (2001), “P2P networking: An information-sharing alternative,” Computer, July:1-8.
37.Peace, A. G., D. F. Galletta, and J. Y. L. Thong (2003), “Software piracy in the workplace: A model and empirical test,” Journal of Management Information System, 22(3): 153-177.
38.Rapp, R. T., R. P. Rozek (1990), “Benefits and prices of intellectual property protection in developing countries” Journal of World Trade, 24(5): 75-102.
39.Reid, R. A., J. K. Thompson and J. M. Logsdon (1992), “ Knowledge and attitudes of management students toward software piracy,” Journal of Computer Information Systems, 33:46-51.
40.Sheppard, B. H., J. Hartwick, and P. R. Warshaw (1988), “The theory of reasoned action: A meta-analysis of past research with recommendations for modifications and future research,” Journal of Consumer Research, 15: 325-343.
41.Shin, S. K., R.D.Gopal, G. L. Sanders, and A. B. Whinston (2004), “Global software piracy revisited,” Communications of the ACM, 47(1): 103-107
42.Solomon, S. L. and J. A. O’Brien (1990), “The effects of demographic factors on attitude toward software piracy,” Ethics Issues in Information Systems: 168-181.
43.Swinyard, W. R, H. Rinne, and A.Keng Kau, (1990), “The morality of software piracy: A cross-culture analysis,” Journal of Business Ethics, 9:655-664.
44.Williamson, O. E. (1975), “Transaction price economics: the government of contractual relations,” Journal of Law and Economics, 22(3): 233-261.
45.Wines, W. A., N. K. Napier (1992), “Toward an understanding of cross cultural ethics: A tentative model,” Journal of Business Ethics, 11:831-841.
三、網站部分
1.中華人民共和國國家統計局,http://www.stats.gov.cn,2005。
2.CIA (2005), The world factbook,
http://www2.cia.gov/factbook2005.zip, July, 2005.
3.Geert Hofstede Cultural Dimensions
http://www.geert-hofstede.com/hofstede_dimensions.php?culture1=89&culture2=18, July, 2005.
4.IFPI (2005), Commercial piracy report, http://www.ifpi.org/site-content/library/piracy2005.pdf, July, 2005.
5.USTR(2005), Special 301 Report,
http://www.ustr.gov/assets/Document_Library/Reports_Publications/2005/2005_Special_301/asset_upload_file195_7636.pdf, July, 2005.