Citation Export
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Park, Soomin | - |
dc.contributor.author | Moon, Junghoon | - |
dc.contributor.author | Rhee, Cheul | - |
dc.contributor.author | Choe, Young Chan | - |
dc.date.issued | 2023-12-01 | - |
dc.identifier.uri | https://dspace.ajou.ac.kr/dev/handle/2018.oak/33091 | - |
dc.description.abstract | In this study, we developed and tested a theoretical model to understand online music piracy behavior via email and instant messaging. We developed this theoretical model by drawing on a comprehensive literature review on music piracy, theory of reasoned action, social identity, and the deterrence theory. We collected primary data to test the hypotheses, and the results from the partial least squares analyses suggest attitude toward music file-sharing behavior and social identity positively affect intention to pirate music, whereas the perceived severity and certainty of punishment do not have significant effects on the attitude. The findings highlight the important role of social identity when a theoretical model with the concept explains music file-sharing behavior without monetary benefits in return. | - |
dc.language.iso | eng | - |
dc.publisher | Springer | - |
dc.subject.mesh | Communications channels | - |
dc.subject.mesh | Deterrence theory | - |
dc.subject.mesh | Digital piracy | - |
dc.subject.mesh | Music file sharing | - |
dc.subject.mesh | Music file-sharing behavior | - |
dc.subject.mesh | Music piracy | - |
dc.subject.mesh | Online music | - |
dc.subject.mesh | Private communication | - |
dc.subject.mesh | Social identity | - |
dc.subject.mesh | Theoretical modeling | - |
dc.title | Understanding Online Music Piracy Behavior via Private Communication Channels | - |
dc.type | Article | - |
dc.citation.endPage | 2392 | - |
dc.citation.startPage | 2377 | - |
dc.citation.title | Information Systems Frontiers | - |
dc.citation.volume | 25 | - |
dc.identifier.bibliographicCitation | Information Systems Frontiers, Vol.25, pp.2377-2392 | - |
dc.identifier.doi | 10.1007/s10796-022-10358-2 | - |
dc.identifier.scopusid | 2-s2.0-85143210602 | - |
dc.identifier.url | https://www.springer.com/journal/10796 | - |
dc.subject.keyword | Deterrence theory | - |
dc.subject.keyword | Digital piracy | - |
dc.subject.keyword | Music file-sharing behavior | - |
dc.subject.keyword | Social identity | - |
dc.description.isoa | false | - |
dc.subject.subarea | Theoretical Computer Science | - |
dc.subject.subarea | Software | - |
dc.subject.subarea | Information Systems | - |
dc.subject.subarea | Computer Networks and Communications | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.