Construct: software piracy intention
This construct belongs to the following categories:
This construct is used by:
Papers using this construct cite the following papers for the source of this construct:
The following constructs were (potentially) derived from this construct:
- perceptions of the certainty by D'Arcy et al., 2009: User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach
- severity of organizational sanctions for engaging in IS misuse by D'Arcy et al., 2009: User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach
- Detection probability by Li et al., 2010: Understanding Compliance with Internet Use Policy from the Perspective of Rational Choice Theory
- sanction severity by Li et al., 2010: Understanding Compliance with Internet Use Policy from the Perspective of Rational Choice Theory
- subjective norms by Li et al., 2010: Understanding Compliance with Internet Use Policy from the Perspective of Rational Choice Theory
- IUP compliance intention by Li et al., 2010: Understanding Compliance with Internet Use Policy from the Perspective of Rational Choice Theory
- Severity of penalty by Herath, 2009: Encouraging Information Security Behaviors in Organizations: Role of Penalties, Pressures and Perceived Effectiveness
- Certainty of detection by Herath, 2009: Encouraging Information Security Behaviors in Organizations: Role of Penalties, Pressures and Perceived Effectiveness
- Security policy attitude by Herath, 2009: Protection Motivation and Deterrence: A Framework for Security Policy Compliance in Organisations
- Punishment severity by Herath, 2009: Protection Motivation and Deterrence: A Framework for Security Policy Compliance in Organisations
- Detection certainty by Herath, 2009: Protection Motivation and Deterrence: A Framework for Security Policy Compliance in Organisations