نتایج جستجو برای: ip piracy

تعداد نتایج: 42073  

2007
Mohammad S. Rahman Karthik Kannan Mohit Tawarmalani

Traditionally, the government has been the sole entity to enforce anti-piracy measures. Of late, software vendors are attempting to thwart piracy of their products by limiting the patch to only legal users. By doing so, the vendor can vertically differentiate the legal copy from the pirated copy since pirates suffer more from hacker activity. Such an action by the vendor has interesting implica...

Journal: :J. of Management Information Systems 2014
Matthew Hashim Karthik N. Kannan Sandra Maximiano Jackie Rees Ulmer

We conduct an experiment in the lab to determine the effect of varying the source of piracy advice on music consumer behavior. By using teenagers and parents in our subject pool, we increase the realism of the piracy context by sampling potential pirates and their parents. Our treatments represent various sources of piracy advice (e.g., the teen’s parent, a record label, or an external regulato...

Journal: :IJSODIT 2011
Bruce A. Reinig Robert K. Plice

The software industry loses billions of dollars annually to software piracy and has raised awareness of the high software piracy rates worldwide, particularly in emerging economies. In this paper, the authors build a general model of software piracy that includes three economic and social factors suggested by the literature, including per capita GNI, the relative size of a country’s IT market, ...

Journal: :Journal of Information, Law and Technology 2006
Abdul Paliwala

This paper examines the critical role of the global expansion of IP rights in the construction and maintenance of digital inequalities and suggests that the irresolution of the World Summit on Information Society (WSIS) as well as the struggles for a Development Agenda mark a crucial dimension in the global politics of digital inequalities. It suggests that a pathway to understanding these poli...

2014
BO JIANG

ABSTRACT: In this article, I used series hazard modeling and multivariate logistic models to test the relative strengths of deterrence and reactance models for the risk of piracy attacks under a military intervention and several major events. I found significant evidence for the conclusion that the rate of piracy attacks reduced significantly when direct controls are implemented to reduce the e...

2008
Chul Woo Yoo Misuk Kim Young Chan Choe Vo Quoc Tuan

This research focuses on the development and empirical validation of a model of software piracy behavior in Vietnam on the basis of institution isomorphism theory, deterrence theory, and expected utility theory. A survey of 145 respondents and PLS (Partial Least Square) were utilized for analysis. The test of this study reveals that mimetic pressure is the greatest significant factor to influen...

2003
Martin Peitz Patrick Waelbroeck

We analyze the role of music downloading on the current downturn in CD sales. We provide 2000-2001 cross-country evidence in support of the claim of losses due to internet piracy made by the music industry. For the U.S. we also assess the potential loss from internet piracy using detailed survey data. We conclude the empirical analysis by forecasting CD sales for 2002. The results suggest that ...

2012

This paper studies, maps and explains the interactions between downloaders and uploaders pertaining to the Internet film piracy. This study also covers several motivational factors that influence users to upload or download movies, and thus to engage in film piracy over the Internet. The essay also proposes a model that describes user behavior including their relationships and influences. Moreo...

2001
Håkan J. Holm

A contingent valuation method is applied to study subjects' willingness to pay for originals when illegal copies are freely available. The subjects consisted of 234 Swedish undergraduate students from the "computer generation". Only 2% of the "normal" (and 0% of the "elite") students were willing to pay the retail price for the original. However, the majority was prepared to pay a non-negligibl...

2009
Attaya Heger

Confronted with an increasing phenomenon of piracy and the floss competition, which strategy has to adopt an editor of software? In this paper we show that editor can develop a momentary strategy called tolerant piracy in order to face the illegal copy phenomenon. But also in order to face the substitution risk of Floss software. On the one hand it appears that tolerant piracy strategy durably ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید