Works matching Music piracy
1
- Journal of Global Information Technology Management, 2014, p. 6, doi. 10.1080/1097198X.2014.910988
- Das, Saini;
- Mukhopadhyay, Arunabha;
- Bagchi, Kallol K.
- Article
2
- International Journal of Electronic Commerce, 2012, v. 16, n. 3, p. 89, doi. 10.2753/JEC1086-4415160304
- Jeong, Bong-Keun;
- Zhao, Kexin;
- Khouja, Moutaz
- Article
3
- Structural Equation Modeling, 2008, v. 15, n. 3, p. 491, doi. 10.1080/10705510802154331
- Morton, Neil A.;
- Koufteros, Xenophon
- Article
4
- Deviant Behavior, 2008, v. 29, n. 4, p. 334, doi. 10.1080/01639620701588131
- Ingram, JasonR.;
- Hinduja, Sameer
- Article
6
- Journal of Consumer Affairs, 2022, v. 56, n. 2, p. 899, doi. 10.1111/joca.12459
- Borja, Karla;
- Dieringer, Suzanne
- Article
7
- Southwest Journal of Criminal Justice, 2012, v. 8, n. 2, p. 92
- Vandiver, Donna M.;
- Bowman, Scott;
- Vega, Armando
- Article
8
- International Journal of Cyber Criminology, 2018, p. 133, doi. 10.5281/zenodo.1467884
- Popham, James F.;
- Volpe, Claudia
- Article
9
- International Journal of Cyber Criminology, 2010, v. 4, n. 1/2, p. 657
- Gunter, Whitney D.;
- Higgins, George E.;
- Gealt, Roberta E.
- Article
10
- Anthropological Quarterly, 2012, v. 85, n. 3, p. 723, doi. 10.1353/anq.2012.0053
- Article
11
- Ethics & Information Technology, 2015, v. 17, n. 3, p. 211, doi. 10.1007/s10676-015-9376-7
- Article
12
- Journal of Business Ethics, 2005, v. 57, n. 2, p. 161, doi. 10.1007/s10551-004-5263-6
- Jyh-Shen Chiou;
- Ghien-yi Huang;
- Hsin-hui Lee
- Article
13
- International Journal of Business & Public Administration, 2010, v. 7, n. 1, p. 14
- Upshaw, Danny;
- Babin, Laurie A.
- Article
14
- Eurasian Business Review, 2011, v. 1, n. 1, p. 3, doi. 10.14208/bf03353795
- Article
15
- Ethnomusicology Forum, 2010, v. 19, n. 1, p. 27, doi. 10.1080/17411911003669616
- Article
16
- Atlantic Economic Journal, 2018, v. 46, n. 1, p. 59, doi. 10.1007/s11293-017-9567-1
- Mitchell, David M.;
- Scott, C. Patrick;
- Brown, Keneth H.
- Article
17
- Policy & Internet, 2012, v. 4, n. 3/4, p. 229, doi. 10.1002/poi3.18
- Article
18
- Psychology, Crime & Law, 2011, v. 17, n. 3, p. 261, doi. 10.1080/10683160903179526
- Wingrove, Twila;
- Korpas, AngelaL.;
- Weisz, Victoria
- Article
19
- International Journal of Information & Management Sciences, 2021, v. 32, n. 4, p. 287, doi. 10.6186/IJIMS.20211232(4).0002
- Oad, Sahib;
- Qu Jinliang;
- Dai Jingyi;
- Rehman Abro, Mujeeb ur;
- Oad, Ramaishan
- Article
20
- Journal of Business Ethics, 2014, v. 124, n. 4, p. 537, doi. 10.1007/s10551-013-1892-y
- Weijters, Bert;
- Goedertier, Frank;
- Verstreken, Sofie
- Article
21
- Marketing Letters, 2016, v. 27, n. 3, p. 603, doi. 10.1007/s11002-015-9349-y
- Weijters, Bert;
- Goedertier, Frank
- Article
22
- Critical Arts: A South-North Journal of Cultural & Media Studies, 2006, v. 20, n. 1, p. 158, doi. 10.1080/02560040608557784
- Article
23
- Journal of Business Ethics, 2005, v. 62, n. 2, p. 163, doi. 10.1007/s10551-005-0187-3
- Article
24
- International Social Science Review, 2009, v. 84, n. 3/4, p. 157
- Bender, Mark T.;
- Wang, Yongsheng
- Article
25
- Journal of Academic Ethics, 2015, v. 13, n. 4, p. 291, doi. 10.1007/s10805-015-9241-7
- Alleyne, Philmore;
- Soleyn, Sherlexis;
- Harris, Terry
- Article
26
- International Journal of Cyber Criminology, 2016, v. 10, n. 1, p. 21, doi. 10.5281/zenodo.58518
- Article
27
- International Journal of Cyber Criminology, 2012, v. 6, n. 2, p. 1014
- Tade, Oludayo;
- Akinleye, Babatunde
- Article
28
- International Journal of Cyber Criminology, 2012, v. 6, n. 1, p. 951
- Article
29
- Atlantic Journal of Communication, 2010, v. 18, n. 5, p. 241, doi. 10.1080/15456870.2010.521471
- Sheehan, Brian;
- Tsao, James;
- Yang, SungUn
- Article
30
- Journal of Communication, 2006, v. 56, n. 2, p. 406, doi. 10.1111/j.1460-2466.2006.00026.x
- Eyun-Jung Ki;
- Byeng-Hee Chang;
- Hyoungkoo Khang
- Article
31
- Creative Industries Journal, 2017, v. 10, n. 3, p. 226, doi. 10.1080/17510694.2017.1373884
- Brown, Steven C.;
- Krause, Amanda E.
- Article
32
- Criminal Justice Studies, 2011, v. 24, n. 2, p. 199, doi. 10.1080/1478601X.2011.561648
- Article
33
- Criminal Justice Studies, 2009, v. 22, n. 4, p. 405, doi. 10.1080/14786010903358125
- Hinduja, Sameer;
- Ingram, JasonR.
- Article
35
- Information Systems Frontiers, 2023, v. 25, n. 6, p. 2377, doi. 10.1007/s10796-022-10358-2
- Park, Soomin;
- Moon, Junghoon;
- Rhee, Cheul;
- Choe, Young-Chan
- Article
36
- Transformations in Business & Economics, 2015, v. 14, n. 1, p. 236
- Akulavicius, Marius;
- Vaclovas Bartkus, Edverdas
- Article
37
- Journal of Consumer Policy, 2005, v. 28, n. 3, p. 289, doi. 10.1007/s10603-005-8489-5
- d'Astous, Alain;
- Colbert, François;
- Montpetit, Daniel
- Article
38
- Deviant Behavior, 2011, v. 32, n. 7, p. 563, doi. 10.1080/01639625.2010.514202
- Hinduja, Sameer;
- Higgins, GeorgeE.
- Article
39
- MEIEA Journal, 2010, v. 10, n. 1, p. 13, doi. 10.25101/10.1
- Gloor, Storm;
- Rolston, Clyde Philip
- Article
40
- Revista Crítica de Ciências Sociais, 2016, n. 109, p. 229
- Article
42
- Psychology & Marketing, 2017, v. 34, n. 4, p. 428, doi. 10.1002/mar.20998
- Dilmperi, Athina;
- King, Tamira;
- Dennis, Charles
- Article
43
- MIS Quarterly, 2019, v. 43, n. 1, p. 23, doi. 10.25300/MISQ/2019/14812
- Byungwan Koh;
- Il-Horn Hann;
- Raghunathan, Srinivasan
- Article
44
- Berkeley Technology Law Journal, 2010, v. 25, n. 1, p. 311
- Article
45
- Berkeley Technology Law Journal, 2006, v. 21, n. 2, p. 795
- Article
48
- Journal of American History, 2010, v. 97, n. 3, p. 659, doi. 10.1093/jahist/97.3.659
- Article
50
- International Journal of Adolescence & Youth, 2013, v. 18, n. 2, p. 122, doi. 10.1080/02673843.2012.669837
- Article