Confirmatory Factor Analysis (CFA)
From Copyright EVIDENCE
Confirmatory Factor Analysis (CFA) is a quantitative method defined within the Copyright Evidence wiki.
The following studies use this method for data analysis (15):
Citation | |
---|---|
Al-Rafee and Dashti (2012) | Al-Rafee, S., & Dashti, A. E. (2012). A Cross Cultural Comparison of the Extended TPB: The Case of Digital Piracy. Journal of Global Information Technology Management, 15(1), 5-24. |
Chiou, Huang and Lee (2005) | Chiou, J. S., Huang, C. Y., & Lee, H. H. (2005). The antecedents of music piracy attitudes and intentions. Journal of Business Ethics, 57(2), 161-174. |
Cockrill and Goode (2012) | Cockrill, A., & Goode, M. M. (2012). DVD Pirating Intentions: Angels, Devils, Chancers and Receivers. Journal of Consumer Behaviour, 11(1), 1-10. |
Corbett (2011) | Corbett, S., 2011. Archiving Our Culture in a Digital Environment: Copyright Law and Digitisation Practices in Cultural Heritage Institutions. New Zealand Law Foundation Report. |
Durham, Hirshleifer, Smith (1998) | Durham, Yvonne, Jack Hirshleifer, and Vernon L. Smith. Do the rich get richer and the poor poorer? Experimental tests of a model of power. The American Economic Review 88.4 (1998): 970-983. |
Huang (2005) | Huang, C. Y. (2005). File sharing as a form of music consumption. International Journal of Electronic Commerce, 9(4), 37-55. |
Ilevbare (2008) | ILEVBARE, F. M. 2008. Psychosocial factors influencing attitudes towards internet piracy among Nigerian university students. IFE Psychologia: An International Journal, 16, 120-129. |
Moores, Nill and Rothenberger (2009) | Moores, T. T., Nill, A., & Rothenberger, M. A. (2009). Knowledge of Software Piracy as an Antecedent to Reducing Pirating Behavior . Journal of Computer Information Systems, 50(1). |
Morris and Higgins (2010) | Morris, R. G., & Higgins, G. E. (2010). Criminological theory in the digital age: The case of social learning theory and digital piracy. Journal of Criminal Justice, 38(4), 470-480. |
Morton and Koufteros (2008) | Morton, N. A. and Koufteros , X. 2008. Intention to Commit Online Music Piracy and its an Empirical Antecedents: An Empirical Investigation. Structural Equation Modeling-a Multidisciplinary Journal, 15, 491-512. |
Peace, Galletta and Thong (2003) | Peace, A. G., Galletta, D. F., & Thong, J. Y. (2003). Software piracy in the workplace: A model and empirical test. Journal of Management Information Systems, 20(1), 153-177. |
Tang and Fam (2005) | Tang, J. H., & Farn, C. K. (2005). The effect of interpersonal influence on softlifting intention and behaviour. Journal of Business Ethics, 56(2), 149-161. |
Wang and McClung (2012) | Wang, X., & McClung, S. R. (2012). The immorality of illegal downloading: The role of anticipated guilt and general emotions. Computers in Human Behavior, 28(1), 153-159. |
Wang, Chen, Yang and Farn (2009) | Wang, C. C., Chen, C. T., Yang, S. C., & Farn, C. K. (2009). Pirate or buy? The moderating effect of idolatry. Journal of Business Ethics, 90(1), 81-93. |
Yoon (2012) | Yoon, C. (2012). Digital piracy intention: a comparison of theoretical models. Behaviour & Information Technology, 31(6), 565-576. |