1. Ajzen, I., Czasch, C. and Flood, M.G. (2009), “From intentions to behavior: implementation intention, commitment, and conscientiousness”, Journal of Applied Social Psychology, Vol. 39 No. 6, pp. 1356‐72.
2. Asparouhov, T. and Muthen, B. (2009), “Exploratory structural equation modeling”, Structural Equation Modeling, Vol. 16, pp. 397‐438.
3. Bhattacharjee, S., Gopal, R.D., Lertwachara, K. and Marsden, J.R. (2006), “Consumer search and retailer strategies in the presence of online music sharing”, Journal of Management Information Systems, Vol. 23 No. 1, pp. 129‐59.
4. Business Software Alliance (2009), “Software piracy on the internet: a threat to your security”, October, Business Software Alliance, Washington, DC, available at: http://global.bsa.org/internetreport2009/2009internetpiracyreport. pdf (accessed January 15, 2010).
5. Castro, D., Bennett, R. and Andes, S. (2009), “Steal these policies: strategies for reducing digital piracy”, The Information Technology & Innovation Foundation, available at: www.itif.org/files/2009‐12‐15.DigitalPiracy.pdf (accessed January 15, 2009).