Development and Validation of Ethical Computer Self-Efficacy Measure: The Case of Softlifting

The concept of self-efficacy is concerned with people's beliefs in their ability to produce given attainment. It has been widely applied to study human conduct in various settings. This study, based on Albert Bandura's social cognitive theory, proposes the employment of self-efficacy for i...

Full description

Saved in:  
Bibliographic Details
Authors: Kuo, Feng-Yang (Author) ; Hsu, Meng-Hsiang (Author)
Format: Electronic Article
Language:English
Check availability: HBZ Gateway
Journals Online & Print:
Drawer...
Fernleihe:Fernleihe für die Fachinformationsdienste
Published: Springer 2001
In: Journal of business ethics
Year: 2001, Volume: 32, Issue: 4, Pages: 299-315
Further subjects:B information ethics
B Self-efficacy
B Software Piracy
B Social cognitive theory
Online Access: Volltext (JSTOR)
Volltext (lizenzpflichtig)

MARC

LEADER 00000naa a22000002 4500
001 1785616234
003 DE-627
005 20220112043543.0
007 cr uuu---uuuuu
008 220112s2001 xx |||||o 00| ||eng c
024 7 |a 10.1023/A:1010715504824  |2 doi 
035 |a (DE-627)1785616234 
035 |a (DE-599)KXP1785616234 
040 |a DE-627  |b ger  |c DE-627  |e rda 
041 |a eng 
084 |a 1  |2 ssgn 
100 1 |a Kuo, Feng-Yang  |e VerfasserIn  |4 aut 
245 1 0 |a Development and Validation of Ethical Computer Self-Efficacy Measure: The Case of Softlifting 
264 1 |c 2001 
336 |a Text  |b txt  |2 rdacontent 
337 |a Computermedien  |b c  |2 rdamedia 
338 |a Online-Ressource  |b cr  |2 rdacarrier 
520 |a The concept of self-efficacy is concerned with people's beliefs in their ability to produce given attainment. It has been widely applied to study human conduct in various settings. This study, based on Albert Bandura's social cognitive theory, proposes the employment of self-efficacy for investigating people's ethical conduct related to computer use. Specifically, an ethical computer self-efficacy (ECSE) construct concerning software piracy is developed and validated. The measurement model of the construct was rigorously tested and validated through confirmatory factor analysis. The results suggest that ECSE can be operationalized as a second-order factor model. The first order constructs are termed use&keep (do not use), distribution (do not distribute), and persuasion (persuade others not to commit piracy). These factors are governed by a second-order construct of ECSE. This construct could be useful to research a wide range of information ethics in the future. 
650 4 |a Software Piracy 
650 4 |a Social cognitive theory 
650 4 |a Self-efficacy 
650 4 |a information ethics 
700 1 |a Hsu, Meng-Hsiang  |e VerfasserIn  |4 aut 
773 0 8 |i Enthalten in  |t Journal of business ethics  |d Dordrecht : Springer, 1982  |g 32(2001), 4, Seite 299-315  |h Online-Ressource  |w (DE-627)270937129  |w (DE-600)1478688-6  |w (DE-576)121465284  |x 1573-0697  |7 nnns 
773 1 8 |g volume:32  |g year:2001  |g number:4  |g pages:299-315 
856 |3 Volltext  |u http://www.jstor.org/stable/25074577  |x JSTOR 
856 4 0 |u https://doi.org/10.1023/A:1010715504824  |x Resolving-System  |z lizenzpflichtig  |3 Volltext 
935 |a mteo 
951 |a AR 
ELC |a 1 
ITA |a 1  |t 1 
LOK |0 000 xxxxxcx a22 zn 4500 
LOK |0 001 4033675108 
LOK |0 003 DE-627 
LOK |0 004 1785616234 
LOK |0 005 20220112043543 
LOK |0 008 220112||||||||||||||||ger||||||| 
LOK |0 035   |a (DE-Tue135)IxTheo#2021-12-30#60F0EEB7EEE4BA0D9F2D95213577568C1581AE46 
LOK |0 040   |a DE-Tue135  |c DE-627  |d DE-Tue135 
LOK |0 092   |o n 
LOK |0 852   |a DE-Tue135 
LOK |0 852 1  |9 00 
LOK |0 866   |x JSTOR#http://www.jstor.org/stable/25074577 
LOK |0 935   |a ixzs  |a ixrk  |a zota 
ORI |a SA-MARC-ixtheoa001.raw