نتایج جستجو برای: ip piracy

تعداد نتایج: 42073  

2015
Amal Bouejla Xavier Chaze Franck Guarnieri Aldo Napoli

In recent years, pirate attacks against shipping and oil field installations have become more frequent and more serious. This article proposes an innovative solution to the problem of offshore piracy from the perspective of the entire processing chain: from the detection of a potential threat to the implementation of a response. The response to an attack must take into account multiple variable...

Journal: :Journal of Current Southeast Asian Affairs 2009

2014
Hsiang-Lin Wu Shin-Yuan Hung Charlie C. Chen

Internet proliferation and ubiquity are easing the process for individuals to copy, download, share, sell and distribute copyrighted software without purchasing a legal license. The prevalent piracy issue has not only caused a tremendous loss of revenues for legal software makers, but also raised piracy ethicality. The current study shows that moral attitude is one of important predictors for p...

2003
Jessica Malm

Piracy, unauthorized copying, is today a highly widespread phenomenon, which causes a lot of worries and disputes in the media industry. Many of us download software programs from the Internet without fee and without considering the consequences. We could end up with less well produced products and the overall economic of the society could be negatively affected. Is there any situation or reaso...

2012
Robert W. D. Veitch Ioanna D. Constantiou

Technologies enabling digital piracy have expanded the variety of options available to users when deciding how to access a product. As a result, access-mode decisions for film and music are broader than for other goods where the piracy option is not as prevalent. This paper presents a model of access-mode decisions for film and music which integrates elements of previous digital piracy models a...

2011
Farinaz Koushanfar

This chapter provides the first comprehensive overview of hardware integrated circuits (IC) protection by metering. Hardware metering, or IC metering refers to mechanisms, methods, and protocols that enable tracking of the ICs post-fabrication. Metering is particularly needed in the horizontal semiconductor business model where the design houses outsource their fabrication to (mostly offshore) ...

2011
Patrick G. McLennan Quan V. Le

This paper examines the relationship between intellectual property rights (IPRs) and the growth rate of per capita GDP during the period 1996-2006 in a sample 71 countries. Using software piracy data as a proxy for IPR violations, we find that countries with increasing rates of software piracy have lower growth rates. We also find that states with strong commitments to enact policies to protect...

2016
S. L. Deshpande Jiawei Zhu Zhengang Wu Zhi Guan Steve Hanna Ling Huang Edward Wu Saung Li Charles Chen A. Gianazza F. Maggi A. Fattori L. Cavallaro

Rapid increase of Smartphone users worldwide has moved developers attention towards Mobile platform to create applications for Smartphone. Android is one such major mobile platform and also an open source operating system. With the rapid increase in the android applications some undesirable apps begin to show up. Two kinds of such apps are pirated and malware. This focuses on piracy of applicat...

Journal: :JTHTL 2014
Jean Pyun

INTRODUCTION ..................................................................................... 245 I. BACKGROUND OF PIRACY IN CHINA .................................................. 246 A. Piracy Today and the Increase in Internet Users .................. 246 B. History of Piracy as an Acceptable Practice in Chinese Culture .....................................................................

2001
Markus Jakobsson Michael K. Reiter

Most people consider frequent software updates a nuisance. However, we show how this common phenomenon can be turned into a feature that protects against software piracy. We define a protocol for “drop-in” upgrades of software that renders a large class of software piracy more traceable. A novel feature of our approach is a software aging technique by which we force the updates to occur, or els...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید