Academic literature on the topic 'Software piracy'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Software piracy.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Software piracy"

1

Aksatha, Mrs D. Seema Dev, and M. Blessing Marshal. "Software Piracy Protection." International Journal of Trend in Scientific Research and Development Volume-3, Issue-3 (April 30, 2019): 243–46. http://dx.doi.org/10.31142/ijtsrd21705.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Logsdon, Jeanne M., Judith K. Thompson, and Richard A. Reid. "Software Piracy." Proceedings of the International Association for Business and Society 3 (1992): 62–74. http://dx.doi.org/10.5840/iabsproc199234.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Tenisci, Teresa, and Wendy Alexander. "Software piracy." ACM SIGUCCS Newsletter 22, no. 3 (December 30, 1992): 7–8. http://dx.doi.org/10.1145/149422.149426.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Green, Kenneth C., and Steven W. Gilbert. "Software Piracy." Change: The Magazine of Higher Learning 19, no. 1 (February 1987): 46–49. http://dx.doi.org/10.1080/00091383.1987.9937096.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Moores, Trevor, and Gurpreet Dhillon. "Software piracy." Communications of the ACM 43, no. 12 (December 2000): 88–93. http://dx.doi.org/10.1145/355112.355129.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Batson, Eric. "Software piracy." Postgraduate Medicine 77, no. 3 (February 15, 1985): 217–18. http://dx.doi.org/10.1080/00325481.1985.11698905.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

King, Albert S. "Controlling Software Piracy." Bulletin of the Association for Business Communication 55, no. 3 (September 1992): 35–40. http://dx.doi.org/10.1177/108056999205500311.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Gopal, Ram D., and G. Lawrence Sanders. "Global software piracy." Communications of the ACM 43, no. 9 (September 2000): 82–89. http://dx.doi.org/10.1145/348941.349002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Bagchi, Kallol, Peeter Kirs, and Robert Cerveny. "Global software piracy." Communications of the ACM 49, no. 6 (June 2006): 70–76. http://dx.doi.org/10.1145/1132469.1132470.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Weisband, S. P., and S. E. Goodman. "International software piracy." Computer 25, no. 11 (November 1992): 87–90. http://dx.doi.org/10.1109/2.166426.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Software piracy"

1

Korhonen, J. (Johanna). "Software piracy among university students." Master's thesis, University of Oulu, 2017. http://urn.fi/URN:NBN:fi:oulu-201706022476.

Full text
Abstract:
Software piracy has been an ongoing issue for decades and it has a tremendous economic impact on software business. Software piracy seems to be especially common among young people, who often are technologically oriented and happen to be students. The purpose of this study was to map out what kind of a role software piracy plays among the students of the University of Oulu. The goal was also to find out how common software piracy is and how the software piracy rates differ among different subpopulations as well as finding out the reasons for software piracy. The study was of quantitative nature and a survey was conducted in order to gather data. In addition, a conceptual model was proposed and its purpose was to map out which factors influence the attitudes and intentions regarding pirating software, and the questions of the survey were partly based on the conceptual model. The aforementioned survey was distributed to the students of the University of Oulu as an online link via email. This study examined and compared the demographic factors as well as the reasons and purposes behind software piracy. The results of this study indicate that age and gender have statistical significance with software piracy. When it came to reasons, expensiveness was the most significant reason, which was in line with previous literature. The study also investigated the views of university students regarding software piracy. The connections in the conceptual model were explored as well: the factors presented in the conceptual model were found to be correlated although the strength of the correlation varied greatly. In addition, all of the connections in the model had statistical significance.
APA, Harvard, Vancouver, ISO, and other styles
2

Korhonen, J. (Johanna). "Piracy prevention methods in software business." Bachelor's thesis, University of Oulu, 2016. http://urn.fi/URN:NBN:fi:oulu-201605131733.

Full text
Abstract:
There are various forms of piracy in software business, and many prevention techniques have been developed against them. Forms of software piracy are, for example, cracks and serials, softlifting and hard disk loading, internet piracy and software counterfeiting, mischanneling, reverse engineering, and tampering. There are various prevention methods that target these types of piracy, although all of these methods have been broken. The piracy prevention measures can be divided into ethical, legal, and technical measures. Technical measures include measures like obfuscation and tamper-proofing, for example. However, relying on a single method does not provide complete protection from attacks against intellectual property, so companies wishing to protect their product should consider combining multiple methods of piracy prevention.
APA, Harvard, Vancouver, ISO, and other styles
3

Villazon, Cira H. "Software piracy an empirical study of influencing factors /." Full text available online (restricted access), 2004. http://images.lib.monash.edu.au/ts/theses/Villazon.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Myles, Ginger. "Software Theft Detection Through Program Identification." Diss., The University of Arizona, 2006. http://hdl.handle.net/10150/194166.

Full text
Abstract:
Prior to the general availability of high speed Internet, the spread of piratedsoftware required the transfer of a physical copy like a disk, which limited therate at which illegal software could be distributed. The low transfer raterestricted software piracy to levels which producers found acceptable becausethe associated losses could be absorbed. Large scale cases of piracy were rareand when they did occur the legal system provided suitable retribution. However,recent advances in computer technology have made the need for a physical copyobsolete. Piracy is now a widespread, decentralized problem in which millions ofindividuals take part. Without technical means of identifying pirated software,the protection afforded by the legal system is no longer easy to enforce or costeffective.The research in this dissertation addresses the threat of software piracythrough the exploration of two techniques: software watermarking and softwarebirthmarking. Neither of these techniques can be used to prevent software theftentirely. Instead, they are used to detect occurrences of theft after the fact.One of the limiting factors of the protection provided by the legal system isthat it cannot be used to identify an incidence of piracy. Softwarewatermarking and birthmarking fill this gap, thus providing complimentaryprotection to the established legal protection. In this research, we analyze thestate of the art in both software watermarking and birthmarking and we propose anovel scheme in each of the areas which make significant improvements overexisting techniques.
APA, Harvard, Vancouver, ISO, and other styles
5

Aleassa, Hasan. "Investigating consumers' software piracy using an extended theory of reasoned action /." Available to subscribers only, 2009. http://proquest.umi.com/pqdweb?did=1878978001&sid=4&Fmt=2&clientId=1509&RQT=309&VName=PQD.

Full text
Abstract:
Thesis (Ph. D.)--Southern Illinois University Carbondale, 2009.
"Department of Management." Keywords: Ethical ideology, Low self control, Public self consciousness, Religiosity, Software piracy, Theory of reasoned action. Includes bibliographical references (p. 146-170). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
6

Aleassa, Hasan M. "Investigating Consumers' Software Piracy Using An Extended Theory Of Reasoned Action." OpenSIUC, 2009. https://opensiuc.lib.siu.edu/dissertations/37.

Full text
Abstract:
Software piracy, the illegal and unauthorized duplication, sale, or distribution of software, is a widespread and costly phenomenon. According to the Business Software Alliance, more than one third of the PC software packages installed worldwide in 2006 were unauthorized copies. This behavior costs the software industry billions of lost dollars in revenue annually. Software piracy behavior has been investigated for more than thirty years. However, there are two voids in the literature: lack of studies in Non-Western countries and scarcity of process studies. As such, this study contributes to the literature by developing a software piracy model to understand the decision making process that underlies this illegal behavior among Jordanian university students. Based on a literature review in various disciplines, including social psychology, psychology, and criminology, several important variables have been incorporated into the proposed model. The model was tested using data collected from a sample of 323 undergraduate business students. The resulting data was analyzed by two main statistical techniques, structural equation modeling (SEM) and hierarchical multiple regression. The results indicated that the model was useful in predicting students' intention to pirate software. Seven out of eight hypotheses were supported. Consistent with The Theory of Reasoned Action, attitudes toward software piracy and subjective norms were significant predictors of intention to pirate software. However, our findings are inconsistent with previous studies with regard to the relative importance of attitude and subjective norms; subjective norms had a stronger effect. Also, the results suggested that ethical ideology, public self-consciousness, and low self-control moderated the effect of these variables on intention to pirate software. Lastly, the results indicated that the effect of subjective norms on afintention to pirate software was both direct and indirect through attitudes. The results have important practical implications for the software industry and governments to curtail software piracy. Limitations of the study and recommendations for future studies are discussed as well.
APA, Harvard, Vancouver, ISO, and other styles
7

Wells, Raymond Cleophas. "An Empirical Assessment of Factors Contributing to Individuals' Propensity to Commit Software Piracy in The Bahamas." NSUWorks, 2012. http://nsuworks.nova.edu/gscis_etd/335.

Full text
Abstract:
Researchers have found that software piracy worldwide over the years has significantly contributed to billions of dollars in lost revenue for many software firms. Software developers have found it difficult to create software that is not easily copied, thus, creating a software protection problem. Software piracy remains a global problem despite the significant effort to combat its prevalence. Over the years, significant research has attempted to determine the factors that contribute to individuals' propensity to commit software piracy. Most of the research on software piracy has been limited to larger societies, with recommendations by researchers to extend similar studies to smaller ones. The literature indicating the need for additional research on this topic in different populations and cultures is significant. Given that, the key contributions of this study were to assess empirically factors such as personal moral obligation (PMO), cultural dimensions, ethical computer self-efficacy (ECSE) and the effect it has on individuals' propensity -- in cultures that support it -- to commit software piracy in smaller geographical locations. Therefore, this research empirically assessed the contribution that PMO, Hofstede's cultural dimension of individualism/collectivism (I/C), and ECSE have made on individuals' propensity to commit software piracy. The study extended the current body of knowledge by finding answers to three specific questions. First, this study sought to determine whether the PMO component contributed to individuals' propensity to commit software piracy in The Bahamas. Secondly, this study sought to determine the level of contribution of Hofstede's cultural dimension of I/C to individuals' propensity to commit software piracy in The Bahamas. Finally, this study sought to determine the contribution of ECSE to individuals' propensity to commit software piracy in The Bahamas. A total of 321 usable responses were collected over a one-month period from students from the school of business at a small Bahamian college, to determine their level of PMO, I/C, and ECSE contribution to individuals' propensity to commit software piracy. This represents, approximately, a 64% response rate. The results showed the overall significance of the models of the three factors in predicting individuals' propensity to commit software piracy. Furthermore, the results indicated that PMO and ECSE subscale PMO and ECSE_DB were significant, however, I/C, and ECSE (as a whole) were not.
APA, Harvard, Vancouver, ISO, and other styles
8

Jacobsson, Tony. "Piratkopiering: en ekonomisk-teoretisk granskning av marknaden för dataspel." Thesis, Linköping University, Department of Management and Economics, 2000. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-716.

Full text
Abstract:

This essay analyzes the market for entertainment software by identifying and explain the products typical properties, in addition i clarifies the behavior of consumers and producers. One of the most important property related to software is the ease with which it can be reproduced. When such reproduction is done illicit it´s called piracy. The software industry often claims that piracy leads to big losses for the companies as well as in welfare, the essay clarifies that this doesn´t has to be the case. On the contrary the possibility to cheap production and distribution may lead to an increased welfare. The paper questions todays copyright law and suggests that a different legislation would lead to an increase in welfare.

APA, Harvard, Vancouver, ISO, and other styles
9

Klepetko, Radim. "Softwarové pirátství v modelu Cloud Computing." Master's thesis, Vysoká škola ekonomická v Praze, 2012. http://www.nusl.cz/ntk/nusl-165250.

Full text
Abstract:
The thesis focuses on software piracy mainly in the context of cloud computing. Its goals are to analyze contemporary software piracy with the focus on its forms, reasons leading to it and on antipiracy techniques. Second part of the thesis defines cloud computing and focuses on two basic interdependencies with software piracy: cloud as a pirates' tool and cloud as means to fight the piracy. Based on the findings of previous parts, concluding part of the thesis suggests set of recommendations for involved parties (especially software providers, cloud service providers and cloud service users).
APA, Harvard, Vancouver, ISO, and other styles
10

Low, Gregory Norman. "A software licensing framework." Thesis, Queensland University of Technology, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Software piracy"

1

Marshall, Patrick G. Software Piracy. 2455 Teller Road, Thousand Oaks California 91320 United States: CQ Press, 1993. http://dx.doi.org/10.4135/cqresrre19930521.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Poddar, Sougata. Network externality and software piracy. Helsinki: United Nations University, World Institute for Development Economic Research, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Johns, Adrian. Piracy. Chicago: University of Chicago Press, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Jr, Hugo Orrico. Pirataria de software. São Paulo: M.M. Livros, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Keet, Ernest E. Preventing piracy: A business guide to software protection. Reading, Mass: Addison-Wesley Pub. Co., 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Krömer, Jan. No copy: Die Welt der digitalen Raubkopie. Leipzig: Tropen, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Ezhov, A. A. I︠U︡ridicheskai︠a︡ zashchita iskli︠u︡chitelʹnykh prav pravoobladateleĭ na programmy dli︠a︡ ĖVM i bazy dannykh: Monografii︠a︡. [Moskva]: Izdatelʹskiĭ dom "I︠U︡piter", 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

T, Carlos A. Peláez. La campaña de la B.S.A. en Bolivia. Bolivia]: Diseño Gráfico & Edición de Publicaciones Literarias Jh. Jorge Estada Cuenca, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Bunn, Edward DeV. Internet software piracy and the NET Act: A historical and perspective analysis of cyberlaw in the United States. Gainesville, Fla: Cambridge Lighthouse Press, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Supanto. Criminal policy: Memberantas pembajakan program komputer. Surakarta, Jawa Tengah, Indonesia: Kerja Sama Lembaga Pengembangan Pendidikan (LPP) dan UPT Penerbitan dan Pencetakan UNS (UNS Press), Universitas Sebelas Maret Surakarta, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Software piracy"

1

Weik, Martin H. "software piracy." In Computer Science and Communications Dictionary, 1611. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_17663.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Jakobsson, Markus, and Michael K. Reiter. "Discouraging Software Piracy Using Software Aging." In Security and Privacy in Digital Rights Management, 1–12. Berlin, Heidelberg: Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-47870-1_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kumar, Abhinav, Anant Kumar Rai, Ankur Kumar Shrivastava, Dhirendra Yadav, Monark Bag, and Vrijendra Singh. "Software Piracy Prevention through SMS Gateway." In Communications in Computer and Information Science, 294–300. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-22786-8_37.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Ding, Hong, and Xiaofeng Zhang. "Software Piracy Prevention: Punish Buyer or Seller?" In Advances in Intelligent and Soft Computing, 353–60. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-25185-6_46.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Du, Yanning, Xin Song, and Yichuan Wang. "Romeo: SGX-Based Software Anti-piracy Framework." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 140–55. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-30623-5_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Lee, Jaehyuk, Kangbin Yim, and Kyungroul Lee. "Vulnerability Analysis of Software Piracy and Reverse Engineering: Based on Software C." In Innovative Mobile and Internet Services in Ubiquitous Computing, 59–66. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-79728-7_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Swinyard, William R., Heikki Rinne, and Ah Keng Kau. "The Morality of Software Piracy: A Cross-Cultural Analysis." In Citation Classics from the Journal of Business Ethics, 565–78. Dordrecht: Springer Netherlands, 2012. http://dx.doi.org/10.1007/978-94-007-4126-3_29.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Garbharran, Ameetha, and Andrew Thatcher. "Modelling Social Cognitive Theory to Explain Software Piracy Intention." In Lecture Notes in Computer Science, 301–10. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-21793-7_34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Baboo, S. Santhosh, and P. Vinod Bhattathiripad. "Software Piracy Forensics: The Need for Further Developing AFC." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 19–26. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-19513-6_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kumar, M. Arun. "Graphene SymFET and SiNW FET for IP Piracy Prevention Security Systems." In Nanoelectronic Devices for Hardware and Software Security, 321–37. Boca Raton: CRC Press, 2021. http://dx.doi.org/10.1201/9781003126645-16.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Software piracy"

1

Kovacic, Zlatko. "Determinants of Worldwide Software Piracy." In InSITE 2007: Informing Science + IT Education Conference. Informing Science Institute, 2007. http://dx.doi.org/10.28945/3142.

Full text
Abstract:
Software piracy or ‘softlifting’, the unauthorized use or illegal copying of computer software seems to be a persistent and truly global phenomenon, in spite of international efforts to reduce it. Could the battle against it be won by just merely accepting international standards for the protection of intellectual property rights? The answer to this question is the main focus of this research. This paper explores the determinants of cross-national variation in software piracy rates by performing a quantitative analysis using economic, cultural and legal variables. Based on regression analysis results, we identified factors which have a significant impact on software piracy. Among them, economic and legal factors make the most important contribution to the variability of worldwide software piracy rates. The implications of these results both for practice and theory are discussed.
APA, Harvard, Vancouver, ISO, and other styles
2

Hossain, Afsana, Amit Kumar Das, Nishat Tasnim Mim, Jahidul Hoque, and Rashedul Amin Tuhin. "Software Piracy: Factors and Profiling." In 2019 2nd International Conference on Applied Information Technology and Innovation (ICAITI). IEEE, 2019. http://dx.doi.org/10.1109/icaiti48442.2019.8982130.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

"The problem of software piracy." In ЖУРНАЛІСТИКА ТА РЕКЛАМА: ВЕКТОРИ ВЗАЄМОДІЇ. Київський національний торговельно-економічний університет, 2019. http://dx.doi.org/10.31617/k.knute.2019-03-19.06.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Anckaert, Bertrand, Bjorn De Sutter, and Koen De Bosschere. "Software piracy prevention through diversity." In the 4th ACM workshop. New York, New York, USA: ACM Press, 2004. http://dx.doi.org/10.1145/1029146.1029157.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Zhang, Yawei, Lei Jin, Xiaojun Ye, and Dongqing Chen. "Software Piracy Prevention: Splitting on Client." In 2008 International Conference on Security Technology (SECTECH). IEEE, 2008. http://dx.doi.org/10.1109/sectech.2008.10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Png, Ivan P. L. "On the Reliability of Software Piracy Statistics." In 2010 43rd Hawaii International Conference on System Sciences. IEEE, 2010. http://dx.doi.org/10.1109/hicss.2010.291.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Nehra, Ajay, Rajkiran Meena, Deepak Sohu, and Om Prakash Rishi. "A robust approach to prevent software piracy." In 2012 Students Conference on Engineering and Systems (SCES). IEEE, 2012. http://dx.doi.org/10.1109/sces.2012.6199075.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Johnson, Mark B. "Software piracy: stopping it before it stops you." In the 16th annual ACM SIGUCCS Conference. New York, New York, USA: ACM Press, 1988. http://dx.doi.org/10.1145/62548.62648.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Willison, Robert, and Mikko Siponen. "Software Piracy: Original Insights from a Criminological Perspective." In 2008 41st Annual Hawaii International Conference on System Sciences. IEEE, 2008. http://dx.doi.org/10.1109/hicss.2008.407.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Reinig, Bruce A., and Robert K. Plice. "Modeling Software Piracy in Developed and Emerging Economies." In 2010 43rd Hawaii International Conference on System Sciences. IEEE, 2010. http://dx.doi.org/10.1109/hicss.2010.276.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Software piracy"

1

Athey, Susan, and Scott Stern. The Nature and Incidence of Software Piracy: Evidence from Windows. Cambridge, MA: National Bureau of Economic Research, December 2013. http://dx.doi.org/10.3386/w19755.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography