نتایج جستجو برای: ip piracy

تعداد نتایج: 42073  

2017
Vinod Bhattathiripad S. Santhosh Baboo P. Vinod Bhattathiripad

Piracy is potentially possible at any stage of the lifetime of the software. In a post-piracy situation, however, the growth of the respective versions of the software (both the original and pirated) is expected to be in different directions as a result of expectedly different implementation strategies. This paper shows how such post-piracy modifications are of special interest to a cyber crime...

2013
Marton Gergely V. Srinivasan Rao

The unauthorized copying of computer programs, referred to as software piracy, continues to be a major threat to the security of the digital assets of software publishers. Software piracy has received much attention from researchers, often from different perspectives, or schools of thought. As a first step, we have reviewed the articles on software piracy in Information Systems journals, classi...

2005
David Y. Choi

This explorative paper examines the impact of online piracy on the emergence of innovative, legitimate business models. While often dismissed by academics and professionals alike, online piracy has shown to be a valuable source of innovation to both industry incumbents and entrepreneurs. The paper briefly summarizes the evolution of piracy technologies and associated online communities. Then, t...

2007
Jason Y.C. Ho Charles B. Weinberg Christina Kan

Piracy of trademarked, copyrighted, and/or branded goods and services is a critical factor in many industries. In the movie industry, which we study here, the Motion Picture Association of America (MPAA) estimates that piracy costs US movie studios $6.1 billion in 2005, the latest year for which data are available. (www.mpaa.org) The impact of piracy is viewed as so important to the movie indus...

Fab-less business model in semiconductor industry has led to serious concerns about trustworthy hardware. In untrusted foundries and manufacturing companies, submitted layout may be analyzed and reverse engineered to steal the information of a design or insert malicious Trojans. Understanding the netlist topology is the ultimate goal of the reverse engineering process. In this paper, we propose...

2015
Bao-Jun Jiang Pei-Yu Chen Tridas Mukhopadhyay Pei-yu Chen

Piracy has been a major problem for perpetually licensed software. Usage-based licensing architecture such as pay-per-use or software-as-a-service can offer technology-based protection against piracy. We provide an analytical framework to examine the economic implications of pay-per-use versus perpetual licensing in a market with potential piracy, network effect, and heterogeneous consumers in ...

Journal: :EJIS 2011
Ricky Y. K. Chan Jennifer W. M. Lai

This study empirically examines Chinese computer users’ ethical ideology and its relationship to their software piracy attitude and behaviour. The investigation reveals several important findings. First, cluster analysis results show that Chinese computer users can be divided into four ethical ideology types (i.e., situationists, absolutists, subjectivists, and exceptionists) reasonably consist...

2017
Santiago Yubero Elisa Larrañaga Beatriz Villora Raúl Navarro

The present study examines the relationship between different roles in cyberbullying behaviors (cyberbullies, cybervictims, cyberbullies-victims, and uninvolved) and self-reported digital piracy. In a region of central Spain, 643 (49.3% females, 50.7% males) students (grades 7-10) completed a number of self-reported measures, including cyberbullying victimization and perpetration, self-reported...

Journal: :Telematics and Informatics 2010
Sulaiman Al-Rafee Kamel Rouibah

With the increased reliance on the Internet, digital piracy is a hot topic that is receiving substantial interest. And while most studies concentrate on understanding piracy in developed countries, few studies have been done in developing countries. In order to fill in this gap, this study reports on an experiment to deter/prevent digital piracy behavior in an Arab and a Middle Eastern country....

2012
B. Srinivas Suresh Varma

These days software is not just few lines of code and few number of files, it constitute major part of business logic, and most valuable information. Software is required by all kind of people from individuals to large organizations to carry out important tasks. But it is being pirated on large scale, violating software license and leading to copyright infringement. Almost 50% software licenses...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید