1Swinyard, W. R. , Rinne, H. and Kau. A.K. (1990), The Morality of Software Piracy: A Cross-cultural Analysis,Journal of Business Ethics, Vol. 9, pp. 655-664.
2Tom, G. , Garibaldi, B. , Zeng, Y. and Pilcher, J. (1998), Consumer demand for counterfeit Goods, Psychology and Marketing, Vol. 15 No. 5, pp405-421.
3Wendy, W. (2000), Attitude change: Persuasion and social influence, Annual Review of Psychology, Vol. 51, pp. 539.
4Wong, K. (1985 ), Computer crime-risk management and computer security, Computer and Security, Vol. 4, pp. 287-295.
5Arghavan, N. and Zaichkowsky, J. L. (2000), Do counterfeits devalue the ownership of luxury brands?, Journal of Product & Brand Management, Vol. 9 No. 7, pp. 485-497.
6Bearden, W.O. , Netemeyer, R.G. and Teel, J. E. (1989), Measurement of consumer susceptibility to interpersonal influence, Journal of Consumer Research, Vol. 15, March, pp. 473-481.
7Bloch, P.H. , Bush, R.F. and Campbell, L. (1993), Consumer ‘accomplices' in product counterfeiting: a demand-side investigation, Journal of Consumer Marketing, Vol. 10 No. 4, pp. 27-36.
8Bryan, W. H. (2000), The Impact of National Culture on Software Piracy, Journal of Business Ethics, Vol. 26, pp.197-211.
9Bush, R. , Bloch, P. and Dawson, S. (1989), Remedies for Product Counterfeiting, Business Horizons, Vol. 32, pp. 59-65.
10Cordell, V. V. , Wongtada, N. and Kieschnick, R.L. Jr. (1996), Counterfeit purchase intentions: role of lawfulness attitudes and product traits as determinants, Journal of Business Research, Vol. 35 No. 1, pp. 41- 54.