14 research outputs found

    Prohibited Activities of Computer

    Get PDF
    Illegal activities that carried out using computer. The action that committed against a person with a criminal motive to intentionally harm, or mental harm someone. For example hacking, stealing someone private information, gaining unauthorized access, security, damaging software, sharing files using Bluetooth, steal an identity crimes using the computer as a tool, these crime requires the technical knowledge. Illegal activities involves to send an e-mail that threatens other person or property. Trafficking in stolen password, computer viruses and warms. Child pornography, is illegal and these activities are also performed using computer. Another illegal activity of the computer is sound recording, the exclusive right to reproduce, and disturb their sound recording. All these activities are illegal that are performed using computer. Keywords: Illegal activities. Internet. Computers .Security. Cyber –attack. Personal information

    Music Piracy Among College Students

    Get PDF
    This study explores the predictors of music piracy. Do age, gender, class rank, and major, and certain self-reported usage and knowledge factors help explain college students’ engagement in music piracy? Additionally, we seek to learn the impact of ethics, legal and social norms on illegal download intentions. A survey was constructed and completed by over two hundred college students. Data has been collected and analysis has been completed using multiple regression analysis and structured equation modeling (SEM). Findings from multiple regression analysis indicate that demographic factors are not good predictors of music piracy; however, the number of digital music files owned by an individual and the individual’s own level of knowledge about music piracy are significant predictors of the number of illegally downloaded music files possessed by the individual. This study also found through SEM that legal and ethics factors do help explain intentions toward music piracy

    Examining the Role of Peer Influence and Self-Control on Downloading Behavior

    Get PDF
    The purpose of the present study is two-fold. First, the present study is designed to provide additional information about the link between off-line and virtual peers and music piracy. Second, the present study provides information about how off-line and virtual peers interact with self-control to understand music piracy. The results of this study show that low self-control has a link with digital piracy. This means that individuals who cannot resist temptation and do not see the consequences of their action have an increased likelihood to perform digital piracy, which is consistent with a growing literature in this area (Higgins et al. 2006; Higgins and Makin 2004a, 2004b; Higgins and Wilson 2006)

    Music piracy and neutralization: A trajectory analysis from short-term longitudinal

    Get PDF
    Digital piracy is an emerging criminal behavior. Little empirical research has been produced that examines the role of neutralization and performance of this behavior. Using short-term longitudinal data from college students, the present study examines the trajectories of digital piracy and the role of neutralization. The findings from this study show that trajectories of digital piracy may be tied to neutralization toward digital piracy. Criminal justice policies may be developed from this study

    Piracy prevention methods in software business

    Get PDF
    Abstract. There are various forms of piracy in software business, and many prevention techniques have been developed against them. Forms of software piracy are, for example, cracks and serials, softlifting and hard disk loading, internet piracy and software counterfeiting, mischanneling, reverse engineering, and tampering. There are various prevention methods that target these types of piracy, although all of these methods have been broken. The piracy prevention measures can be divided into ethical, legal, and technical measures. Technical measures include measures like obfuscation and tamper-proofing, for example. However, relying on a single method does not provide complete protection from attacks against intellectual property, so companies wishing to protect their product should consider combining multiple methods of piracy prevention

    Deterrence and Digital Piracy: A Preliminary Examination of the Role of Viruses

    Get PDF
    Digital piracy has been shown to be an emerging societal problem. However, research has demonstrated limited techniques that effectively combat digital piracy. The purpose of the present study is to examine the utility of computer viruses in deterring digital piracy. The findings from responses to a survey of college students revealed that fear of computer viruses may influence respondents’ intentions to engage in digital piracy. The policy implications of this finding are discussed

    Factors Motivating Software Piracy in Vietnam

    Get PDF
    This research focuses on the development and empirical validation of a model of software piracy behavior in Vietnam on the basis of institution isomorphism theory, deterrence theory, and expected utility theory. A survey of 145 respondents and PLS (Partial Least Square) were utilized for analysis. The test of this study reveals that mimetic pressure is the greatest significant factor to influence software piracy intention. Coercive pressure, normative pressure, punishment severity, and software cost are also significantly related to the intention. However, punishment certainty does not have a significant influence on software piracy

    Estudio de la investigación en sistemas de información a través del análisis de dos revistas (1981-1997)

    Get PDF
    El área de los Sistemas de Información es todavía joven, por lo que el estudio de su literatura puede ser útil para saber qué están los investigadores haciendo en la misma, e incluso qué se puede hacer para mejorarla. Para hacer este estudio se han analizado los artículos de las publicaciones Management Information Systems Quarterly e Information & Management desde 1981 a 1997, y se han observado los tópicos más habituales, así como las estrategias de investigación y de autoría más frecuentes.Information Systems is a young research area so an analysis of the literature could be useful to know what are the researchers doing and even what can we do to improve the area. In order to do it this study analyces the articles published in Management Information Systems Quarterly and Information & Management journals from 1981 to 1997, to observe the most usual topics, research strategies and authors strategies

    A study of ethics and information technology usage among UUM international students / Abdul Manaf Bohari and Nurul Hafizan Mazani

    Get PDF
    Basically, ethics is a universal entity on guiding beliefs, standards, or ideas that pervades an individual, a group or community of people who are accountable for their actions and behaviors. In the emerging of world of ICT, one is required to behave ethically rights. Ethics of IT users varies according to religions, cultures, and societies; and based on literature review, it depends on beliefs and perceptions. Currently, IT drastically changes the way how ethics is conducted and practised within organizations. Therefore, the main objective of this research is to identify what is perceived as ethical behavior in IT usage. Secondly, this research is to observe the ethics among international students in relation to IT. In order to conduct this research, questionnaire will be used to collect the primary data from respondents, as well as international students of Universiti Utara Malaysia. The data collected will then be analyzed using Statistical Package for Social Science (SPSS) software. This research reveals that, ethics in IT users of different countries such as Indonesia, Thailand, China, Iraq, and Pakistan vary. Mostly, the ethics is based on attitudes and perceptions and to what extent it is said to be ethical in dealing with IT

    Deterrence and digital piracy: A preliminary examination of the role of viruses

    Get PDF
    ABSTRACT Digital piracy has been shown to be an emerging societal problem. However, research has demonstrated limited techniques that effectively combat digital piracy. The purpose of the present study is to examine the utility of computer viruses in deterring digital piracy. The findings from responses to a survey of college students revealed that fear of computer viruses may influence respondents' intentions to engage in digital piracy. The policy implications of this finding are discussed
    corecore