Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where A. Graham Peace is active.

Publication


Featured researches published by A. Graham Peace.


Journal of Management Information Systems | 2003

Software Piracy in the Workplace: A Model and Empirical Test

A. Graham Peace; Dennis F. Galletta; James Y.L. Thong

Theft of software and other intellectual property has become one of the most visible problems in computing today. This paper details the development and empirical validation of a model of software piracy by individuals in the workplace. The model was developed from the results of prior research into software piracy, and the reference disciplines of the theory of planned behavior, expected utility theory, and deterrence theory. A survey of 201 respondents was used to test the model. The results indicate that individual attitudes, subjective norms, and perceived behavioral control are significant precursors to the intention to illegally copy software. In addition, punishment severity, punishment certainty, and software cost have direct effects on the individuals attitude toward software piracy, whereas punishment certainty has a significant effect on perceived behavioral control. Consequently, strategies to reduce software piracy should focus on these factors. The results add to a growing stream of information systems research into illegal software copying behavior and have significant implications for organizations and industry groups aiming to reduce software piracy.Theft of software and other intellectual property has become one of the most visible problems in computing today. This paper details the development and empirical validation of a model of software piracy by individuals in the workplace. The model was developed from the results of prior research into software piracy, and the reference disciplines of the theory of planned behavior, expected utility theory, and deterrence theory. A survey of 201 respondents was used to test the model. The results indicate that individual attitudes, subjective norms, and perceived behavioral control are significant precursors to the intention to illegally copy software. In addition, punishment severity, punishment certainty, and software cost have direct effects on the individuals attitude toward software piracy, whereas punishment certainty has a significant effect on perceived behavioral control. Consequently, strategies to reduce software piracy should focus on these factors. The results add to a growing stream of information systems research into illegal software copying behavior and have significant implications for organizations and industry groups aiming to reduce software piracy.


Business and Society Review | 2002

Ethical Issues in eBusiness: A Proposal for Creating the eBusiness Principles

A. Graham Peace; James Weber; Kathleen S. Hartzel; Jennifer Paige Nightingale

e Business seems to be the topic of conversation, wherever a businessperson turns today. Retailers small and large are creating web sites, and business-to-business ecommerce is expanding exponentially. In the ebusiness paradigm, employees regularly telecommute, cell phones are pervasive, and email is the preferred method of communication. Enterprise resource planning (ERP) systems are revolutionizing the internal operations of the corporation, while customer relationship management (CRM) and supply chain management (SCM) applications are integrating partnerships with environmental entities. eBusiness success stories are touted in newspapers and airplane magazines, and Amazon.com is as well known as companies ten times as old. Despite some much publicized bumps in the road, the information age has arrived. However, there are long-term ethical and social implications of these business trends that may be overlooked, as they do not fit into the profit picture. In addition, ethical principles needed as guides in conducting ebusiness are lacking. This article


Communications of The ACM | 2003

Balancing free speech and censorship: academia's response to the Internet

A. Graham Peace

Many universities do not consider the topic of censorship important enough to address in a formal way---but the legal and ethical risks of neglecting this issue should not be ignored.


Journal of Computer Information Systems | 2016

A Performance Evaluation Framework for a Public University Knowledge Management System

Virginia Franke Kleist; Larue Williams; A. Graham Peace

Measuring information technology (IT) implementation success has long been a challenge for information systems researchers and practitioners. The IT evaluation problem is exacerbated when assessing the specific performance of a knowledge management system (KMS), in part because the dependent variable must measure the construct of IT driven incremental enhancements to organizational knowledge and productivity. Historically, researchers have used many quantitative and qualitative variables to evaluate the performance of IT implementations, ranging from return on investment to quality of user decision-making. Academic institutions, such as universities, often have knowledge creation as a final goal, adding to the complexity of the KMS performance measurement challenge. This paper describes a planned, multi-phased, KMS implementation at a typical state university, and presents the theoretically-based, yet practitioner-oriented measures that will be applied to evaluate the ongoing success of the KMS, as it is deployed.


EJISDC: The Electronic Journal on Information Systems in Developing Countries | 2006

An Exploratory Study of Software Piracy in Jordan

Asim El Sheikh; Abdullah Abdali Rashed; Bashar Al Qudah; A. Graham Peace

This paper documents an exploratory study of software piracy in the developing country of Jordan. Piracy levels in the developing world have consistently ranked higher than in the industrialized nations, and this study finds that Jordan is no exception. Almost a quarter of those surveyed appeared to not understand the legal issues involved in piracy behavior. However, a majority did believe that copying software illegally is unethical. The roles of the government, NGOs and private industry in educating the public were also studied. The respondents believed that all three groups have a responsibility to increase public awareness of piracy issues, but the success of such efforts was seen as limited. The paper finishes with some suggestions on combating piracy in Jordan, including the implementation of a unified marketing strategy to raise public awareness of the issue.


Journal of Computer Information Systems | 2016

Software Piracy and Computer-Using Professionals: A Survey

A. Graham Peace


international conference on information systems | 1996

Developing a Predictive Model of Software Piracy Behavior: An Empirical Study

A. Graham Peace; Dennis F. Galletta


Journal of Information Ethics | 2002

Ethical Concerns Raised by the Use of the Internet in Academia

A. Graham Peace; Kathleen S. Hartzel


International Journal of Networking and Virtual Organisations | 2009

A conceptual analysis of group privacy in the virtual environment

Nanda C. Surendra; A. Graham Peace


Archive | 2005

Revisiting Mason: The Last 18 Years and Onward

Lee A. Freeman; A. Graham Peace

Collaboration


Dive into the A. Graham Peace's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Amir Hartman

University of Pittsburgh

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Thompson S. H. Teo

National University of Singapore

View shared research outputs
Top Co-Authors

Avatar

Diane M. Strong

Worcester Polytechnic Institute

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Larue Williams

West Virginia University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Manju K. Ahuja

Indiana University Bloomington

View shared research outputs
Researchain Logo
Decentralizing Knowledge