Academic literature on the topic 'Software piracy'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Software piracy.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Software piracy"
Aksatha, Mrs D. Seema Dev, and M. Blessing Marshal. "Software Piracy Protection." International Journal of Trend in Scientific Research and Development Volume-3, Issue-3 (April 30, 2019): 243–46. http://dx.doi.org/10.31142/ijtsrd21705.
Full textLogsdon, Jeanne M., Judith K. Thompson, and Richard A. Reid. "Software Piracy." Proceedings of the International Association for Business and Society 3 (1992): 62–74. http://dx.doi.org/10.5840/iabsproc199234.
Full textTenisci, Teresa, and Wendy Alexander. "Software piracy." ACM SIGUCCS Newsletter 22, no. 3 (December 30, 1992): 7–8. http://dx.doi.org/10.1145/149422.149426.
Full textGreen, Kenneth C., and Steven W. Gilbert. "Software Piracy." Change: The Magazine of Higher Learning 19, no. 1 (February 1987): 46–49. http://dx.doi.org/10.1080/00091383.1987.9937096.
Full textMoores, Trevor, and Gurpreet Dhillon. "Software piracy." Communications of the ACM 43, no. 12 (December 2000): 88–93. http://dx.doi.org/10.1145/355112.355129.
Full textBatson, Eric. "Software piracy." Postgraduate Medicine 77, no. 3 (February 15, 1985): 217–18. http://dx.doi.org/10.1080/00325481.1985.11698905.
Full textKing, Albert S. "Controlling Software Piracy." Bulletin of the Association for Business Communication 55, no. 3 (September 1992): 35–40. http://dx.doi.org/10.1177/108056999205500311.
Full textGopal, Ram D., and G. Lawrence Sanders. "Global software piracy." Communications of the ACM 43, no. 9 (September 2000): 82–89. http://dx.doi.org/10.1145/348941.349002.
Full textBagchi, Kallol, Peeter Kirs, and Robert Cerveny. "Global software piracy." Communications of the ACM 49, no. 6 (June 2006): 70–76. http://dx.doi.org/10.1145/1132469.1132470.
Full textWeisband, S. P., and S. E. Goodman. "International software piracy." Computer 25, no. 11 (November 1992): 87–90. http://dx.doi.org/10.1109/2.166426.
Full textDissertations / Theses on the topic "Software piracy"
Korhonen, J. (Johanna). "Software piracy among university students." Master's thesis, University of Oulu, 2017. http://urn.fi/URN:NBN:fi:oulu-201706022476.
Full textKorhonen, J. (Johanna). "Piracy prevention methods in software business." Bachelor's thesis, University of Oulu, 2016. http://urn.fi/URN:NBN:fi:oulu-201605131733.
Full textVillazon, Cira H. "Software piracy an empirical study of influencing factors /." Full text available online (restricted access), 2004. http://images.lib.monash.edu.au/ts/theses/Villazon.pdf.
Full textMyles, Ginger. "Software Theft Detection Through Program Identification." Diss., The University of Arizona, 2006. http://hdl.handle.net/10150/194166.
Full textAleassa, Hasan. "Investigating consumers' software piracy using an extended theory of reasoned action /." Available to subscribers only, 2009. http://proquest.umi.com/pqdweb?did=1878978001&sid=4&Fmt=2&clientId=1509&RQT=309&VName=PQD.
Full text"Department of Management." Keywords: Ethical ideology, Low self control, Public self consciousness, Religiosity, Software piracy, Theory of reasoned action. Includes bibliographical references (p. 146-170). Also available online.
Aleassa, Hasan M. "Investigating Consumers' Software Piracy Using An Extended Theory Of Reasoned Action." OpenSIUC, 2009. https://opensiuc.lib.siu.edu/dissertations/37.
Full textWells, Raymond Cleophas. "An Empirical Assessment of Factors Contributing to Individuals' Propensity to Commit Software Piracy in The Bahamas." NSUWorks, 2012. http://nsuworks.nova.edu/gscis_etd/335.
Full textJacobsson, Tony. "Piratkopiering: en ekonomisk-teoretisk granskning av marknaden för dataspel." Thesis, Linköping University, Department of Management and Economics, 2000. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-716.
Full textThis essay analyzes the market for entertainment software by identifying and explain the products typical properties, in addition i clarifies the behavior of consumers and producers. One of the most important property related to software is the ease with which it can be reproduced. When such reproduction is done illicit it´s called piracy. The software industry often claims that piracy leads to big losses for the companies as well as in welfare, the essay clarifies that this doesn´t has to be the case. On the contrary the possibility to cheap production and distribution may lead to an increased welfare. The paper questions todays copyright law and suggests that a different legislation would lead to an increase in welfare.
Klepetko, Radim. "Softwarové pirátství v modelu Cloud Computing." Master's thesis, Vysoká škola ekonomická v Praze, 2012. http://www.nusl.cz/ntk/nusl-165250.
Full textLow, Gregory Norman. "A software licensing framework." Thesis, Queensland University of Technology, 1998.
Find full textBooks on the topic "Software piracy"
Marshall, Patrick G. Software Piracy. 2455 Teller Road, Thousand Oaks California 91320 United States: CQ Press, 1993. http://dx.doi.org/10.4135/cqresrre19930521.
Full textPoddar, Sougata. Network externality and software piracy. Helsinki: United Nations University, World Institute for Development Economic Research, 2002.
Find full textKeet, Ernest E. Preventing piracy: A business guide to software protection. Reading, Mass: Addison-Wesley Pub. Co., 1985.
Find full textEzhov, A. A. I︠U︡ridicheskai︠a︡ zashchita iskli︠u︡chitelʹnykh prav pravoobladateleĭ na programmy dli︠a︡ ĖVM i bazy dannykh: Monografii︠a︡. [Moskva]: Izdatelʹskiĭ dom "I︠U︡piter", 2003.
Find full textT, Carlos A. Peláez. La campaña de la B.S.A. en Bolivia. Bolivia]: Diseño Gráfico & Edición de Publicaciones Literarias Jh. Jorge Estada Cuenca, 2001.
Find full textBunn, Edward DeV. Internet software piracy and the NET Act: A historical and perspective analysis of cyberlaw in the United States. Gainesville, Fla: Cambridge Lighthouse Press, 2005.
Find full textSupanto. Criminal policy: Memberantas pembajakan program komputer. Surakarta, Jawa Tengah, Indonesia: Kerja Sama Lembaga Pengembangan Pendidikan (LPP) dan UPT Penerbitan dan Pencetakan UNS (UNS Press), Universitas Sebelas Maret Surakarta, 2011.
Find full textBook chapters on the topic "Software piracy"
Weik, Martin H. "software piracy." In Computer Science and Communications Dictionary, 1611. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_17663.
Full textJakobsson, Markus, and Michael K. Reiter. "Discouraging Software Piracy Using Software Aging." In Security and Privacy in Digital Rights Management, 1–12. Berlin, Heidelberg: Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-47870-1_1.
Full textKumar, Abhinav, Anant Kumar Rai, Ankur Kumar Shrivastava, Dhirendra Yadav, Monark Bag, and Vrijendra Singh. "Software Piracy Prevention through SMS Gateway." In Communications in Computer and Information Science, 294–300. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-22786-8_37.
Full textDing, Hong, and Xiaofeng Zhang. "Software Piracy Prevention: Punish Buyer or Seller?" In Advances in Intelligent and Soft Computing, 353–60. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-25185-6_46.
Full textDu, Yanning, Xin Song, and Yichuan Wang. "Romeo: SGX-Based Software Anti-piracy Framework." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 140–55. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-30623-5_10.
Full textLee, Jaehyuk, Kangbin Yim, and Kyungroul Lee. "Vulnerability Analysis of Software Piracy and Reverse Engineering: Based on Software C." In Innovative Mobile and Internet Services in Ubiquitous Computing, 59–66. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-79728-7_7.
Full textSwinyard, William R., Heikki Rinne, and Ah Keng Kau. "The Morality of Software Piracy: A Cross-Cultural Analysis." In Citation Classics from the Journal of Business Ethics, 565–78. Dordrecht: Springer Netherlands, 2012. http://dx.doi.org/10.1007/978-94-007-4126-3_29.
Full textGarbharran, Ameetha, and Andrew Thatcher. "Modelling Social Cognitive Theory to Explain Software Piracy Intention." In Lecture Notes in Computer Science, 301–10. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-21793-7_34.
Full textBaboo, S. Santhosh, and P. Vinod Bhattathiripad. "Software Piracy Forensics: The Need for Further Developing AFC." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 19–26. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-19513-6_2.
Full textKumar, M. Arun. "Graphene SymFET and SiNW FET for IP Piracy Prevention Security Systems." In Nanoelectronic Devices for Hardware and Software Security, 321–37. Boca Raton: CRC Press, 2021. http://dx.doi.org/10.1201/9781003126645-16.
Full textConference papers on the topic "Software piracy"
Kovacic, Zlatko. "Determinants of Worldwide Software Piracy." In InSITE 2007: Informing Science + IT Education Conference. Informing Science Institute, 2007. http://dx.doi.org/10.28945/3142.
Full textHossain, Afsana, Amit Kumar Das, Nishat Tasnim Mim, Jahidul Hoque, and Rashedul Amin Tuhin. "Software Piracy: Factors and Profiling." In 2019 2nd International Conference on Applied Information Technology and Innovation (ICAITI). IEEE, 2019. http://dx.doi.org/10.1109/icaiti48442.2019.8982130.
Full text"The problem of software piracy." In ЖУРНАЛІСТИКА ТА РЕКЛАМА: ВЕКТОРИ ВЗАЄМОДІЇ. Київський національний торговельно-економічний університет, 2019. http://dx.doi.org/10.31617/k.knute.2019-03-19.06.
Full textAnckaert, Bertrand, Bjorn De Sutter, and Koen De Bosschere. "Software piracy prevention through diversity." In the 4th ACM workshop. New York, New York, USA: ACM Press, 2004. http://dx.doi.org/10.1145/1029146.1029157.
Full textZhang, Yawei, Lei Jin, Xiaojun Ye, and Dongqing Chen. "Software Piracy Prevention: Splitting on Client." In 2008 International Conference on Security Technology (SECTECH). IEEE, 2008. http://dx.doi.org/10.1109/sectech.2008.10.
Full textPng, Ivan P. L. "On the Reliability of Software Piracy Statistics." In 2010 43rd Hawaii International Conference on System Sciences. IEEE, 2010. http://dx.doi.org/10.1109/hicss.2010.291.
Full textNehra, Ajay, Rajkiran Meena, Deepak Sohu, and Om Prakash Rishi. "A robust approach to prevent software piracy." In 2012 Students Conference on Engineering and Systems (SCES). IEEE, 2012. http://dx.doi.org/10.1109/sces.2012.6199075.
Full textJohnson, Mark B. "Software piracy: stopping it before it stops you." In the 16th annual ACM SIGUCCS Conference. New York, New York, USA: ACM Press, 1988. http://dx.doi.org/10.1145/62548.62648.
Full textWillison, Robert, and Mikko Siponen. "Software Piracy: Original Insights from a Criminological Perspective." In 2008 41st Annual Hawaii International Conference on System Sciences. IEEE, 2008. http://dx.doi.org/10.1109/hicss.2008.407.
Full textReinig, Bruce A., and Robert K. Plice. "Modeling Software Piracy in Developed and Emerging Economies." In 2010 43rd Hawaii International Conference on System Sciences. IEEE, 2010. http://dx.doi.org/10.1109/hicss.2010.276.
Full textReports on the topic "Software piracy"
Athey, Susan, and Scott Stern. The Nature and Incidence of Software Piracy: Evidence from Windows. Cambridge, MA: National Bureau of Economic Research, December 2013. http://dx.doi.org/10.3386/w19755.
Full text