منابع مشابه
Discouraging Software Piracy Using Software Aging
Most people consider frequent software updates a nuisance. However, we show how this common phenomenon can be turned into a feature that protects against software piracy. We define a protocol for “drop-in” upgrades of software that renders a large class of software piracy more traceable. A novel feature of our approach is a software aging technique by which we force the updates to occur, or els...
متن کاملSOCIALIzATION AND SOFTWARE PIRACY: A STUDY
We examine the role of age, gender, and work experience on the propensity to buy, share, and use pirated software. These demographics are key properties of the cognitive-developmental, gender socialization, and occupational socialization theories. We find the overall level of reported buying is low, while the level of sharing and use is high. From the perspective of socialization, we find diffe...
متن کاملPiracy in a two - sided software market
This paper studies the impact of software piracy in a two-sidedmarket setting. Software platforms attract developers and users to maximize their profits. The equilibrium price structure is affected by piracy: license fees to developers are higher with more software protection but the impact on user prices is ambiguous. A conflict between platforms and software developers over software protectio...
متن کاملSoftware piracy: A time-series Analysis
Software piracy is a global problem that costs businesses billions of dollars each year. This study presents the first time series analysis looking at what influences software piracy. It includes data for 85 countries associating economic, cultural, and temporal variables with national software piracy rates. Some of the variables included coincide with those in previous studies (GDP, collectivi...
متن کاملStrategies to Combat Software Piracy
It is impossible to combat software piracy as long as the machines on which the programs execute are indistinguishable; then, any program that can execute on one machine may be copied for execution on another machine. Recently, hardware manufacturers have begun assigning unique identifiers to CPU chips, which make it possible to address the piracy issue in a new light. In this paper, we suggest...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Advanced Research in Computer Science and Software Engineering
سال: 2018
ISSN: 2277-128X,2277-6451
DOI: 10.23956/ijarcsse.v8i5.680