Kwan et al., 2010: Applying the Randomized Response Technique to Elicit Truthful Responses to Sensitive Questions in IS Research: The Case of Software Piracy Behavior

This publication is cited by the following publications:

Citation:

Samuel S. K. Kwan, Mike K. P. So, and Kar Yan Tam. Applying the Randomized Response Technique to Elicit Truthful Responses to Sensitive Questions in IS Research: The Case of Software Piracy Behavior. Information Systems Research, March 2010. doi:10.1287/isre.1090.0271.

Bibtex


@article{kwan_applying_2010,
 abstract = {Research on software piracy often relies on self-reports by individual users and thus suffers from possible response distortion attributable to a variety of human motivations. Conclusions drawn directly from distorted self-reports may misguide managerial and policy decisions. The randomized response technique (RRT) was proposed as a remedy to response distortion. In this paper, a model based on RRT was used to illustrate how truthful responses to sensitive questions can be empirically estimated. The model was tested in two empirical studies on software piracy. Consistent with our expectations, respondents responding to RRT were more willing to disclose sensitive information about their attitudes, intentions, and behaviors on software piracy. Nontrivial distortions were demonstrated in causal relationships involving sensitive and nonsensitive variables. The study extends RRT to multivariate analysis and illustrates the feasibility and usefulness of the method in studying sensitive behavioral issues in the ...},
 author = {Kwan, Samuel S. K. and So, Mike K. P. and Tam, Kar Yan},
 doi = {10.1287/isre.1090.0271},
 journal = {Information Systems Research},
 language = {en},
 month = {March},
 shorttitle = {Applying the {{Randomized Response Technique}} to {{Elicit Truthful Responses}} to {{Sensitive Questions}} in {{IS Research}}},
 title = {Applying the {{Randomized Response Technique}} to {{Elicit Truthful Responses}} to {{Sensitive Questions}} in {{IS Research}}: {{The Case}} of {{Software Piracy Behavior}}},
 year = {2010}
}