References
- 김광용, "윤리적 의사결정 관점의 소프트웨어 불볍 복제에 관한 연구.", 정보화정책,11(4) , pp ' 48-86 , 2004년 12월
- 배대헌, “특허 · 데이터베이스 등 가상공간상 지적재산권의 보호" 정보보호학회논문지 , 9(2) , pp33-44, 1999년 6월
- 오명신, 한승조, "소프트웨어 불법복제를 위한 보안칩", 정보보호학회논문지, 12(4) , pp , 87-98 ,2002년 8월
- 여상수, 윤훈기 , 검성권, "디지털 컨텐츠의 지적재산권 보호를 위한 익명 핑거프린팅의 연구", 동향정보보호학회논문지, 11(3) , pp , 131-141, 2001 년 6월
- 오장규, 김종기, "효과적인 정보보호 교육 및 훈련을 위한 프레임워크 개발" 정보보호학회지,13(2) ,pp , 59-69 , 2003년 4월
- 유영관, 이종무, "소프트웨어 품질 특성의 중요도에 관한 사용자의 인식도 조사 분석", 한국경 영과학회/대한산업공학회 춘계공동학술대회 pp277-279 , 2001 년 6월
- 장병윤, "인터넷상에서 온라인 컨텐츠의 지적재산권 보호에 관한 연구", 중재연구, 12(2) , pp ,373-418 , 2003 년 2윌
- 정보통신부,2007년 상반기 정보화실태조사,정보통신부, 2007년 8월
- 정상조, 지적재산권 강의, 홍문사, 1997 년 3월
- 최명길, 황원주, 김명수, "정보보호정책의 성숙도에 영향을 미치는 요인에 관한 연구", 정보보호학회논문지,18(3) , pp , 131-141 , 2008년 6월
- 채서일, 사회과학조사방법론, B&M, 2005년 2월
- 한국소프트웨어진흥원, 2004년도 S/W불법복제율 조사, 한국소프트웨어진흥원, 2005년 2월
- 한국소프트웨어진흥원, 지적재산권 보호강화와 산엽경쟁력, 한국소프트웨어진홍원, 2006년 6월
- 한국소프트혜어저작권협회,2007 AP 모니터링 결과보고서,한국소프트웨어저작권협회, 2008년 3월
- I. Aizen, ''The theory ofplanned behavior, Organizational Behavior & Human Decision Processes , vol. 50 , no , 2, pp ,179-211 , Dec, 1991 https://doi.org/10.1016/0749-5978(91)90020-T
- I.Ai zen and M, Fishbein, Understanding attitudes and predicting social behavior, Prentice-Hall , Mar. 1980
- 1. Al-Jabri and A. Abdul-Gader, "Software copyright infringements: an exp1oratory study of the effects of individua1 and peer be1iefs , , Omega, vol 25 , no. 3. pp. 335-344, June 1997 https://doi.org/10.1016/S0305-0483(96)00053-9
- S. A1-Rafee and T.P. Cronan, "Digital piracy: factors that influence attitude toward behavior," Journa1 of Business Ethics, vol. 63, no. 3, pp. 237-259, Feb. 2006 https://doi.org/10.1007/s10551-005-1902-9
- S. Chai. S. Bagchi-Sen, and C. Morrell , Role of perceived importance of information security: an exp1oratory study of middle schoo1 chi1dren's information security behavior , Issues in informing Science & Information Techno1ogy, vol. 3,no. 1, pp.127-136 , Mar. 2006 https://doi.org/10.28945/877
- H.K. Cheng, R.R. Sims, and H. Teegen,"To purchase or to pira te software: an empirica1 study," Journa1 of ManagementInformation Systems, vol. 13, no. 4, pp49-60. Mar 1997
- V.V. Cordell , N. Wongtada, and R. L. Kieschnick, "Counterfeit purchase intentions: ro1e of 1awfu1ness attitudes and product traits as determinants , Journa1 of business research, vol. 35, no1. pp. 41-53 , Jan. 1996 https://doi.org/10.1016/0148-2963(95)00009-7
- D. Curtis , "Software piracy and copyright protection," WESCON/94. Idea/Microelectro- nics. Conference Record, vol. 27. no. 29, pp. 199-203, Sep. 1994
- T.P. Cronan and S. Al-Rafee, "Factors that influence the intention to pirate software and media," Journal of business ethics, vol. 78, no. 4. pp. 527-545, Apr.2008 https://doi.org/10.1007/s10551-007-9366-8
- F. Davis. "Perceived usefulness, perceived ease of use. and user acceptance of information tochnology." MIS Quarterly, vol. 13, no. 3, pp. 319-340, Sep. 1989 https://doi.org/10.2307/249008
- RD. Gopal and G.L. Sanders, "International software piracy: analysis of key issues and impacts," Information Research, vol. 9, no. 4, pp. 380-397. Dec. 1998 https://doi.org/10.1287/isre.9.4.380
- RD. Gopal and G.L. Sanders. "Global software piracy: you can't get blood out of a turnip," Communications of the ACM, vol. 43, no. 9. pp. 82-89, Sep 2000 https://doi.org/10.1145/348941.349002
- R. Harris."Attitudes towards end-user computing: a structural equation modeL" Behaviour & Information Technology, vol. 18, no. 2. pp. 109-125, :Mar. 1999 https://doi.org/10.1080/014492999119156
- S. Binduja, "Trends and patterns among online software pirates." Ethics and Information Technology. vol. 5. no. 1. pp.49-61, Mar. 2003 https://doi.org/10.1023/A:1024910523384
- lSO/lEC 9126, Information technology software quality characteristics and metrics, International Organization for Standardization/ International Electrotechnical Commission, 2000
- I. Kiema, "Commercial piracy and intellectual property policy," Journal of Economic Behavior & Organization, vol. 68, no. 1, PP. 304 - 318, Mar. 2008 https://doi.org/10.1016/j.jebo.2008.03.005
- S. Lai, "Applying software reuse to improve softwaro quality and productivity," Tho 12th Asia Quality Management Symposium Total Quality Management for Restoring Competitiveness, pp. 43-50. Jan, 1998
- T. Lin, M. Hsu, F. Kuo, and P. Sun, ''An intention model-based study of software piracy," Proceedings of the 32nd Annual Hawaii International Conference on Sciences. pp. 1 Jan. 1999
- J. Lee and Y. Lee. "A holistic model of computer abuse within organizations."Information Management & Computer Security, vol. 10, no. 2. pp. 57-63, Apr.2002 https://doi.org/10.1108/09685220210424104
- D. Lending and S.A. Slaughter. "Understanding difforences in othical beliefs and behaviors toward software copying: the effects of organization culture,"Proceedings of the 1999 ACM SIGCPR conferonce on Computor personnel research, pp. 253 - 260, Apr, 1999
- K.D. Loch and S. Conger, "Evaluating ethical decision making and computer use," Communications of the ACM, vol. 39, no. 7, pp. 74-83, July 1996 https://doi.org/10.1145/233977.233999
- C.A. Matos, C.T. Ituassu. T. Cristiana, and C.A. Rossi, "Consumer attitudos toward counterfeits: a review and extension," The journal of consumer marketing, vol. 24, no.1. pp. 36-47, Feb. 2007 https://doi.org/10.1108/07363760710720975
- A. Mishra. I. Akman. and A. Yazici. "Organizational software piracy: an empirical assessment," Behaviour and Information Technology, vol. 26, no. 5,pp. 437-444, Sep 2007 https://doi.org/10.1080/01449290500483577
- T. Moores and G. Dhillon. "Software piracy: a view from Hong Kong," Communications of the ACM, vol. 43. no. 12, pp. 88-94, Dec. 2000 https://doi.org/10.1145/355112.355129
- A. Peace, D. Galletta. and J. Thong, "Software piracy in the workplace: a model and empirical tost," Journal of Management Information Systems, vol.20. no. 1, pp. 153-77, June 2003 https://doi.org/10.1080/07421222.2003.11045759
- T. Peltier, Information Security analysis, Auerbach, Jan. 2001
- H. Salemela, "From information systems quality to sustainable business quality."Information and Software Tochnology. vol. 39, no. 3, pp. 819-825, Mar. 1997 https://doi.org/10.1016/S0950-5849(97)00040-2
- S.K Shin. R.D. Gopal. G.L. Sanders. and A.B. Whinston. "Global software piracy revisited." Communications of the ACM. vol. 47. no. 1, pp. 103-107, Jan. 2004 https://doi.org/10.1145/962081.962088
- R. Siegfried. "Student attitudes on software piracy and related issues of computer ethics." Ethics and Information Technology. vol. 6. no. 4, pp. 215-222,Dec. 2004 https://doi.org/10.1007/s10676-004-3391-4
- M.T. Siponen and T. Vartiainen. "Attitudes to and factors affecting unauthorized copying of computer software in Finland." Behaviour & Information Technology. vol. 24. no. 4. pp. 249-257, July 2005 https://doi.org/10.1080/01449290512331321857
- B. Smith. P. Caputi. and P. Rawstorne. "Differentiating computer experience and attitudes toward computers: an empirical investigation." Computers in human behavior, vol. 16. no. 1, pp. 59-81, Jan 2000 https://doi.org/10.1016/S0747-5632(99)00052-7
- W.R. Swinyard. H. Rinne. and A.K Kau. "The morality of software piracy: a cross-cultural analysis." Journal of Business Ethnics. vol. 9. no. 8. pp. 655- 664. Aug. 1990 https://doi.org/10.1007/BF00383392
- J. Tang and C. Farn. "The effect of interpersonal influence on softlifting." Journal of Business Ethics, vol. 56. no.2, pp. 149-161, Jan 2005 https://doi.org/10.1007/s10551-004-2170-9
- J. Thatcher and P. Perrewe. ''An empirical examination of individual traits as antecedents to computer anxiety and computer self-efficiency." MIS Quarterly. vol. 26. no. 4, pp. 381-396, Dec. 2002 https://doi.org/10.2307/4132314
- S.C. Wagner and G.L. Sanders. "Considerations in ethical decisionmaking and software piracy.", Journal of Business Ethics, vol. 29. no. 1. pp. 161-170 Jan. 2001 https://doi.org/10.1023/A:1006415514200
- S.J. Winter. KM. Chudoba. and B.A. Gutek. "Attitudes toward computers: when do they predict computer use?" Information & management, vol. 34. no. 5,pp. 275-284, Nov. 1998 https://doi.org/10.1016/S0378-7206(98)00065-2
- M. Xenos and D. Christodoulakis.''Measuring perceived software quality." Information and software technology, vol. 39. no. 6. pp. 417-424, June 1997 https://doi.org/10.1016/S0950-5849(96)01154-8
- BSA.SW 불법복제 연구보고서,BSA,2006,http://www.bsa.org