Dissertations / Theses on the topic 'Software piracy'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Software piracy.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Korhonen, J. (Johanna). "Software piracy among university students." Master's thesis, University of Oulu, 2017. http://urn.fi/URN:NBN:fi:oulu-201706022476.
Full textKorhonen, J. (Johanna). "Piracy prevention methods in software business." Bachelor's thesis, University of Oulu, 2016. http://urn.fi/URN:NBN:fi:oulu-201605131733.
Full textVillazon, Cira H. "Software piracy an empirical study of influencing factors /." Full text available online (restricted access), 2004. http://images.lib.monash.edu.au/ts/theses/Villazon.pdf.
Full textMyles, Ginger. "Software Theft Detection Through Program Identification." Diss., The University of Arizona, 2006. http://hdl.handle.net/10150/194166.
Full textAleassa, Hasan. "Investigating consumers' software piracy using an extended theory of reasoned action /." Available to subscribers only, 2009. http://proquest.umi.com/pqdweb?did=1878978001&sid=4&Fmt=2&clientId=1509&RQT=309&VName=PQD.
Full text"Department of Management." Keywords: Ethical ideology, Low self control, Public self consciousness, Religiosity, Software piracy, Theory of reasoned action. Includes bibliographical references (p. 146-170). Also available online.
Aleassa, Hasan M. "Investigating Consumers' Software Piracy Using An Extended Theory Of Reasoned Action." OpenSIUC, 2009. https://opensiuc.lib.siu.edu/dissertations/37.
Full textWells, Raymond Cleophas. "An Empirical Assessment of Factors Contributing to Individuals' Propensity to Commit Software Piracy in The Bahamas." NSUWorks, 2012. http://nsuworks.nova.edu/gscis_etd/335.
Full textJacobsson, Tony. "Piratkopiering: en ekonomisk-teoretisk granskning av marknaden för dataspel." Thesis, Linköping University, Department of Management and Economics, 2000. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-716.
Full textThis essay analyzes the market for entertainment software by identifying and explain the products typical properties, in addition i clarifies the behavior of consumers and producers. One of the most important property related to software is the ease with which it can be reproduced. When such reproduction is done illicit it´s called piracy. The software industry often claims that piracy leads to big losses for the companies as well as in welfare, the essay clarifies that this doesn´t has to be the case. On the contrary the possibility to cheap production and distribution may lead to an increased welfare. The paper questions todays copyright law and suggests that a different legislation would lead to an increase in welfare.
Klepetko, Radim. "Softwarové pirátství v modelu Cloud Computing." Master's thesis, Vysoká škola ekonomická v Praze, 2012. http://www.nusl.cz/ntk/nusl-165250.
Full textLow, Gregory Norman. "A software licensing framework." Thesis, Queensland University of Technology, 1998.
Find full textVijayakumar, Prasad. "Thou shalt not steal, an analysis of the GATT TRIPS copyright provisions and software piracy in India." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2001. http://www.collectionscanada.ca/obj/s4/f2/dsk3/ftp05/MQ63383.pdf.
Full textAhmad, Saghir. "Legal protection for computer programmes in EU, US and Pakistan : software piracy as a challenge in Pakistan /." Oslo : Faculty of Law, Universitetet i Oslo, 2008. http://www.duo.uio.no/publ/jus/2008/87514/87514.pdf.
Full textBürki, Irina. "The impact of the WTO accession process on institutions and developments in the software business in Russia : the case of anti-piracy software protection /." [S.l.] : [s.n.], 2008. http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&doc_number=017050636&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA.
Full textReiss, Jeffrey. "STUDENT DIGITAL PIRACY IN THE FLORIDA STATE UNIVERSITY SYSTEM:AN EXPLORATORY STUDY ON ITS INFRASTRUCTURAL EFFECTS." Doctoral diss., University of Central Florida, 2010. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/3537.
Full textEd.D.
Department of Educational Research, Technology and Leadership
Education
Educational Leadership EdD
Mjörner, Patrik, and Erik Bosrup. "Alternative methods of financing software : Replacing illegal copying with free copying." Thesis, Blekinge Tekniska Högskola, Avdelningen för programvarusystem, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-4177.
Full textMjukvaruindustrins största och allvarligaste problem är piratkopiering. De flesta försökt att få bukt med piratkopieringsproblemet har misslyckats. Alternativa metoder för att försöka lösa piratkopieringsproblemet måste därför hittas. Ett alternativt sätt att lösa piratkopieringsproblemet på är med hjälp av alternativa finansieringsmetoder för programvara. De alternativa finansieringsmetoderna använder sig av mjukvaras speciella egenarter som extremt låg reproduktionskostnad och enkelheten att enkelt göra perfekta kopior. Dessa alternativa finansieringsmetoder försöker hitta andra källor för inkomst än försäljningen av licenser. Många alternativa finansieringsmetoder finns. Dessa är tillämpbara och lämpliga i olika situationer och ingen universell lösning finns. Det dessa metoder har gemensamt är att programvarans användare fritt kan kopiera programvaran och använda den utan att behöva köpa en licens. Då de alternativa finansieringsmetoderna har olika positiva och negative påverkningar på sina användare ges tillfälle att kunna kombinera modeller.
Attaya, Heger. "Le Marché des logiciels : une confrontation entre logiciels propriétaires, libres et piratés." Thesis, Paris 13, 2014. http://www.theses.fr/2014PA131029.
Full textPublishers of proprietary software are confronted both by the onset of piracy practices and free/open software. So far, the obstacles faced by proprietary software have been presented in the literature by means of two distinct approaches :(i) the piracy/proprietary software (illicit competition), or (ii) the open source/proprietary software (licit competition) standpoints. In this thesis we propose an alternative approach of the software market, which focuses on the coexistence of competitive forces piracy practices and open software. The three forces are supported by di_erent actors, to which we add the new one of open hardware that consolidated the position of free software on the market. The new approach distinguishes also between sophisticated active pirates producers and casual passive pirate users. We emphasized that it is di_cult to distinguish between hackers and pirates, as piracy practices are sometimes tolerated by the market. Using an econometric and mathematics model we show the impacts that one in_icts over the other. The mathematical model investigates how changes in the _rm's anti-piracy policya_ect the number of pirates users, given that the free software network size increases if pirates become free software users. The proposed econometric model shows that government policies in favour of open source software and adoption of Linux by individuals tends to decrease software piracy. A majorempirical result concerns the emerging and developing countries where policies in favour of free software can in some speci_c cases reduce piracy
Vyhnálek, Aleš. "Počítačová kriminalita." Master's thesis, Vysoká škola ekonomická v Praze, 2007. http://www.nusl.cz/ntk/nusl-3976.
Full textHeřman, Karel. "Problematika licenčních smluv." Master's thesis, Vysoká škola ekonomická v Praze, 2009. http://www.nusl.cz/ntk/nusl-11289.
Full textKubalová, Kamila. "Softwarové pirátství a metodika jeho vyšetřování." Master's thesis, Vysoká škola ekonomická v Praze, 2008. http://www.nusl.cz/ntk/nusl-10160.
Full textKreickamas, Tomas. "Programų apsaugos, naudojant lustines korteles, metodo sudarymas ir tyrimas." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2013. http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2013~D_20130821_142613-81010.
Full textSoftware piracy is copying and distributing of software illegally and without permission. This problem is not new but effective protective measures against it until today are not developed. Therefore, in 2011 illegal software has been downloaded for more than 60 billion USA dollars and that amount is growing every year. After software threats’ analysis we found out that the biggest problem is reverse engineering. Measures which can help to solve this problem we divided into software-based and hardware-based protection. After software-based protection analysis we found out that one of best measures against reverse engineering is code encryption or packaging and one of the best hardware-based protection tools is using of dongle keys. After analysis of advantages and disadvantages of software-based and hardware-based protection we developed method against software piracy. This method relies on the encryption of critical (most valuable) program modules and its safe execution in a safe device. In this paper, as a safe device we will use smart cards. These devices were chosen for their low cost and high level of safety. After implementation of simulated method we found out that decryption of module, which size is ~6KB, in smart card takes only 2% of the total program execution time, so this task does not have significant impact on program execution time. The biggest impact on increasing of protected program execution time have the module performance (59,37% of the total time)... [to full text]
Kuna, Matej. "Úprava programů v Javascriptu pomocí překladače." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2010. http://www.nusl.cz/ntk/nusl-237098.
Full textFilho, Rubens Araujo Menezes de Souza. "Os donos das ideias: história e conflitos do direito autoral, do copyright e das patentes na crise contemporânea do capital: da rodada Uruguai (1986) aos partidos piratas (2006)." Universidade de São Paulo, 2014. http://www.teses.usp.br/teses/disponiveis/8/8138/tde-12122014-184858/.
Full textThrough the historical analysis of the \"intellectual property\", in particular patents, copyright and authors rights, this thesis deals with the crisis of contemporary capitalism, and analyzes the covert increasing trend of states, that with the use of computer technology and the intensification of laws, become increasingly authoritarian, eroding civil rights and liberties secured by populations long ago. To reach this objective the history of computers, the Internet, the Free Software Movement, the Pirate Parties, the Free Software movement in Brazil, the intellectual property laws in the Western world and the globalization of trade and finance are reconstituted
Lundström, Justus, Jonas Widriksson, and Viktor Zaunders. "Changes in media consumption and file sharing : The impact of legislation and new digital media services." Thesis, Jönköping University, JIBS, Business Informatics, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-12534.
Full textIn this study we investigate how the attitude and behaviour concerning illegal file shar-ing have changed among the young population in Sweden. The study will analyze the impact of the IPRED law that was introduced in April 2008 and new digital media ser-vices that have emerged in the last couple of years. It is also evaluated which of these have had the most impact on the attitude and behaviour of the selected population.
The main part of our research consists of a quantitative survey handed out to a sample population among high school students (ages 16-20) in Jönköping, Sweden. This pri-mary data is later compared to secondary data from a similar study that was done on the same demographics two years prior to this research in order to measure the change in behaviour and attitude. The previous study was conducted prior to the IPRED law im-plementation by one of the authors. We also used prior research within this subject and related fields to further understand and interpret our data.
What we have discovered through our research is that there has been a decrease in ille-gal file sharing, especially when considering music, however this decrease is much more an effect of the adopting of new media services then it can be attributed to the IPRED law. Furthermore, the attitudes towards file sharing have remained unchanged and a large number of young adults do not feel that file sharing should be illegal.
It is also concluded that good legal alternatives to file sharing have a large market po-tential if these services can fulfil consumers demand on availability and price. Addition-ally we have found that good legal alternatives are important if the public is to refrain from returning to their old file sharing habits once the initial scare from new legislation has worn off.
Ryšavá, Iveta. "Softwarové pirátství v prostředí odlišných kultur." Master's thesis, Vysoká škola ekonomická v Praze, 2012. http://www.nusl.cz/ntk/nusl-124605.
Full textTroilo, Maurizio. "Web 2.0, contenuti aperti e produzione tra pari: analisi economica delle possibili sinergie." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2010. http://amslaurea.unibo.it/1201/.
Full textRendon, Kahn Joao Macias. "Intensidad moral percibida y consumo de software pirata en estudiantes de una universidad particular de Lima." Bachelor's thesis, Pontificia Universidad Católica del Perú, 2009. http://tesis.pucp.edu.pe/repositorio/handle/123456789/428.
Full textTesis
Cohen, Véronique-Déborah. "La spécificité des contrats liés aux technologies issues du numérique. Quelles singularités ces contrats présentent-ils, comparés à ceux du monde analogique ?" Thesis, Paris 2, 2011. http://www.theses.fr/2011PA020083/document.
Full textOver the last decades, the fast-evolving technologies and the information and communication technologies (I.C.T) have been widespread in the current analogical world. They are engendered agreements which need a particular approach and which can’t be ignored today, because of their difficulties of application, interpretation, and even of qualification. The analogical world failed to offer a legal framework to that innovative and dynamic digital world creating tremendous legal uncertainty. Consequently, the emerging lack of appropriate agreements forced policymakers, regulators and legislators to elaborate new governance, new regulation and new acts to respond to those needs and expectations issued of the Information Society. The purpose is also to answer to the real needs of the lawyers and the professors of Law. These agreements are very different of the agreements of the analogical world in numerous points, but are inscribed in a logical and natural evolution of the Right of contracts. That’s why, it’s necessary to know what is their place in the legal life, and above all, how they are perceived and analyzed regarding the more "classical" contracts of the analogical world. Furthermore, other questions may be asked : in which kind of environment they evolve? What is characterizing the contracts linked to the information and communication technologies? What makes them so specific and so particular compared with the other agreements? The dematerialization of technology centered object can influence their way of formation, their execution and the balance of the agreements? What are their legal implications? If these agreements make reference to an specific and technical terminology of I.C.T., to the digital world, and if their object may be complex, in reality, the services generated by the Information Society are surrounding us in our daily life and are not different of the services we know since ever
Casali, Richelita do Rosario Brito. "Responsabilidade Social do Consumidor: conceituação e proposta de mensuração." Universidade Federal da Paraíba, 2011. http://tede.biblioteca.ufpb.br:8080/handle/tede/3769.
Full textCoordenação de Aperfeiçoamento de Pessoal de Nível Superior - CAPES
This study is focused on the ethical behavior of consumers in a broad perspective and under the expression Consumer Social Responsibility. This perspective, in the point of view of the marketing exchange system, has been neglected in academic research, since most such studies are dedicated to understand the offerer of the ex-change. The research is justified to the extent that the consumer is considered as one of the major agents of exchange system, with a potential of triggering unethical behavior that may disrupt the exchange system. It was developed a literature review addressing initially the subject ethics, from a macro point of view (as the general grounds of ethics) until issues in a micro sphere (emphasizing ethics applied in the context of marketing, the focus of our study). In addition, a theoretical construct about the Social Responsibility of the Consumer was conducted in order to understand how it was designed and operated by several authors over time. This process culminated in a reinterpretation of the construct through the integration of four dimensions de-fined (altruistic behavior, environmentally sustainable behavior, activist behavior and honest/ethical behavior). To enable the measurement of this construct, knowledge of the theory of scale development and of statistical procedures were applied to pro-pose the Consumer Social Responsibility Scale (ConSR Scale). The development of this scale of measurement required two data collections, the first with 202 students and just for the purpose of purifying the scale pool of items, and the second with 286 general consumers, with part of the data collected in two different Brazilian states, and part in the online version). The second sample had confirmatory purposes and allowed the consolidation of ConSR Scale in terms of reliability and validity. Addition-ally, the subject software piracy was studied and used as the empirical context for the first test of ConSR Scale, what required its inclusion as a topic in the literature re-view. Overall, the results indicated that the consumer social responsibility has very little influence, both in intention and practice of software piracy, and being honest be-havior dimension was the only one that presented statistically significantly influence. The theoretical and practical implications of research results were presented at and of the study, as well as limitations and recommendations for further research involv-ing the subjects here analyzed.
Esta dissertação tem como tema central o comportamento ético do consumidor em sua perspectiva ampliada, tratada sob o termo Responsabilidade Social do Consu-midor. Esta perspectiva, do ponto de vista do sistema de troca em marketing, tem sido negligenciada nas pesquisas acadêmicas, uma vez que em sua maioria tais estudos se dedicam ao lado do ofertante. A pesquisa se justifica na medida em que considera o consumidor, enquanto um dos agentes principais do sistema de troca, como um potencial desencadeador de comportamentos antiéticos que pode desequi-librar o sistema de trocas. O objetivo foi analisar as formas de descrição, mensura-ção e avaliação do comportamento ético do consumidor quanto à sua responsabili-dade no consumo de software pirata. Foi desenvolvida uma revisão de literatura abordando inicialmente o tema ética, tanto de um ponto de vista macro (como fun-damentos gerais da ética) até questões em uma esfera micro (enfatizando a ética aplicada no contexto de marketing, foco do nosso estudo); além disso, um aprofun-damento teórico a respeito do construto Responsabilidade Social do Consumidor foi realizado, a fim de entender como foi concebido e operacionalizado pelos diversos autores ao longo do tempo. Este processo culminou em uma proposta de reinterpre-tação do fenômeno a partir da integração das quatro dimensões delimitadas (com-portamento altruísta, comportamento ambientalmente sustentável, comportamento ativista ou engajado e comportamento ético ou honesto). Para viabilizar a mensura-ção deste construto, foram aplicados conhecimentos da teoria de construção de es-calas e procedimentos estatísticos apropriados na elaboração da Escala de Respon-sabilidade Social do Consumidor (RSCons). O desenvolvimento da escala de men-suração exigiu duas coletas de dados, sendo a primeira para fins exploratórios de limpeza da escala realizada com 202 estudantes universitários, e a segunda amostra composta por 286 consumidores, com aplicação em dois estados brasileiros e pela internet. A segunda amostragem teve fins confirmatórios e permitiu a consolidação a escala de RSCons em termos de validade e confiabilidade. Em complemento, foi abordado o tema pirataria de software para efeito de análise da escala de RSCOns, o que exigiu sua inclusão como um tópico na revisão de literatura. De maneira geral, os resultados indicam que a responsabilidade social do consumidor influencia muito pouco o comportamento de pirataria, tanto na intenção quanto na prática, sendo comportamento ético ou honesto do consumidor a única dimensão que influencia de forma estatisticamente significativa. As implicações teóricas e práticas dos resulta-dos pesquisa são apresentadas ao final do estudo, bem como limitações e reco-mendações para outras pesquisas envolvendo os temas em questão.
Hsiao, chih-wuen, and 蕭智文. "Diffusion Model on Software Piracy." Thesis, 2002. http://ndltd.ncl.edu.tw/handle/96502101332927416413.
Full text真理大學
管理科學研究所
90
Software piracy by users has been identified as the worst problem facing the software industry today. And the pervasiveness of software piracy throughout the world is having a profound effect on software publishing industry and the development of digital intellectual properties and technology. Because of this software shadow diffusion, a software firm loses potential profits. However, shadow diffusion may influence the legal diffusion of the software. Software pirates may influence potential software users to adopt the software, and some of these adopters may become buyers. A diffusion modeling approach is suggested to track shadow diffusion and the legal diffusion of a software over time. The approach enables management to estimate the pirated adoptions over time and the percentage of legal adoptions due to the influence of pirates. The modeling approach is applied to study the diffusion of types of software in United Kingdom. The results suggest the diffusion that although six of every seven software users utilized pirated copies, these pirates were responsible for generation more than 75% of new software buyers significantly influencing the legal diffusion of the software. Although software piracy would decrease the profit of software firms, the protection of software is not always a good idea. Owing to network effect, sometimes the software firms should choose not to protect their software.
Gomes, Nicolas. "Software Piracy: An Empirical Analysis." Doctoral thesis, 2015. http://hdl.handle.net/10316/26917.
Full textChapter 2 summary As the devices that used software became more available to the masses the problem of software piracy increases. Recent theoretical works have attempted to model the phenomenon of software piracy; others tried to describe empirically the determinants that may explain this phenomenon. The empirical literature in the latter case is still in its infancy. This chapter reviews the theoretical literature focusing on three major models: those dealing with diffusion models, with network externalities and with game theory. It also presents the empirical literature where we identify eight stylized results that reflect the main macroeconomic variables in five dimensions that explain software piracy: the Economic, Cultural, Educational, Technological and Legal and dimensions. Chapter 3 summary This chapter studies the determinants of software piracy losses along five major macroeconomic dimensions: Technological, Educational, Institutional, Access to Information and Labor force. The study was conducted based on a large dataset available from 1994 to 2010 and comprising 81 countries. As for the Technological dimension, more patents by residents increases piracy losses while the effect of R&D is opposite (decreases piracy losses). In terms of the Educational dimension the results obtained show that more spending on education increase the piracy losses but, at the same time, more schooling years have the opposite effect. In the Institutional dimension, more corrupt free nations have low piracy levels. Regarding the Access to Information, it seems that access to Internet diminishes the losses while the share of Internet broadband subscriptions has no effect. The results show that, regarding the Labor dimension, employment in services has a deterrent effect while labor force with higher education and youth unemployment increases piracy losses. Chapter 4 summary This chapter explores the relation between the levels of taxation among different types of households and the levels of software piracy from 1996 to 2010, in the European Union (EU). It extends previous work by introducing large sets of panel data for the EU and its various regions. We estimate our model using the fixed effect, comparing results from the Euro Area and the Countries that joined EU in 2004 and 2007. Results show that levels of taxation increase the levels of software piracy losses; moreover these results depend on marital status and number of children. The weight of taxation on GDP (e.g. the taxes on consumption) increases piracy losses while the impact of inflation is negative and marginal. Additional to this we also found that the relative importance of these taxes in relation to total taxation can affect this phenomenon. An increase in the weight of capital taxation would decrease software piracy while this effect was opposite when considering the relative importance of consumption taxes. Chapter 5 summary In this chapter we construct a panel data set from 2000 to 2011 for the EU 28, studying the impact of education on the levels of software piracy in a country. When an aggregated analysis is made, e.g. considering all ISCED (International Standard Classification of Education) levels, expenditure on public educational institutions as well as public spending on education have a deterrent effect on piracy, being significant. However, the effect of financial aid to students is positive. When the analysis is made taking into account the ISCED 1997 disaggregation, expenditure on ISCED 5-6 has a negative and significant effect. Taking into account the type of educational institutions, more expenditure on ISCED 1 to 4 will lower piracy. We also found that more financial help to students on higher levels of education, e.g. ISCED 5-6, have a positive and significant effect. Finally, more years of schooling of both primary and secondary education will have a deterrent effect on software piracy. Chapter 6 summary This chapter analyses the interactions between software piracy and economic growth using a simultaneous equation approach to a panel of countries for which information on software piracy is available for 1995, 2000, 2005 and 2010. This allows us to establish the interactions between these variables, but also to measure the direct and indirect effects of other variables that have shown relevancy for both economic growth and software piracy. Results indicate that there exist a concave nonlinear relationship between software piracy and economic growth.
Resumo do Capítulo 2 Há medida que os computadores que usam software se disseminaram, o problema da pirataria informática surgiu. Estudos teóricos recentes modelaram o fenómeno da pirataria; outros tentaram explicar empiricamente os determinantes que podem explicar este fenómeno. A literatura empírica ainda está em sua infância. Este capítulo analisa a literatura teórica com foco em três grandes modelos: aqueles que lidam com modelos de difusão, as externalidades de rede e com a teoria dos jogos. Apresenta, também, a literatura empírica em que identificamos oito resultados estilizados que refletem as principais variáveis em cinco dimensões macroeconómicas que explicam a pirataria de software: económicas, culturais, educacionais, tecnológicas e dimensões legais. Resumo do Capítulo 3 Este capítulo estuda os determinantes das perdas resultantes da pirataria de software ao longo de cinco dimensões macroeconômicas principais: tecnológica, dimensões educacionais, aspectos institucionais, força de trabalho e acesso à informação utilizando um conjunto grande de dados disponíveis de 1994-2010, composto por 81 países. Quanto à dimensão tecnológica, mais patentes por residentes aumenta as perdas de pirataria enquanto o efeito do I&D é oposta (diminui as perdas de pirataria). Em termos da dimensão educacional, os resultados obtidos mostram que mais gastos em educação aumentam as perdas de pirataria, mas, ao mesmo tempo, mais anos de escolaridade têm o efeito oposto. Na dimensão institucional, as nações livres de corrupção, têm baixos níveis de pirataria. Em relação ao acesso à informação, parece que o acesso à Internet diminui as perdas, enquanto a quota de assinaturas de banda larga à Internet não tem efeito. Os resultados mostram que, em relação à Força de Trabalho, o emprego nos serviços tem um efeito dissuasor, enquanto força de trabalho com o ensino superior e o desemprego dos jovens aumenta as perdas de pirataria. Resumo do Capítulo 4 Este capítulo explora a relação entre níveis de tributação entre os diferentes tipos de famílias na União Europeia e os níveis de pirataria de software entre 1996-2010. Melhora estudos anteriores na medida em que introduz dados em painel, estudando a União Europeia e as diferentes regiões. Nós estimamos o nosso modelo utilizando o efeito fixo (FE), comparando os resultados a partir da zona do euro e os países que aderiram à UE em 2004 e 2007. Os resultados mostram que os níveis de tributação aumentam os níveis de pirataria de software. Além disso, estes resultados dependem do estado civil das famílias e do número de filhos. O peso da tributação sobre um PIB na Economia (Produto Interno Bruto), ou seja, os impostos sobre o consumo têm um efeito positivo sobre os prejuízos da pirataria, enquanto o impacto da inflação é negativa e marginal sobre a pirataria de software. Alem disto, a importância relativa desses impostos em relação ao peso total de impostos pode afetar este fenômeno. Um aumento no peso da tributação do capital diminuiria a pirataria de software, enquanto este efeito foi oposto ao considerar a importância relativa dos impostos sobre o consumo. Resumo do Capítulo 5 Neste capítulo vamos construir um painel de dados entre 2000-2011 para a UE 28, estudando o impacto da educação sobre os níveis de pirataria de software. Quando uma análise de agregados é feita, e.g. considerando todos os níveis de ISCED (Classificação Internacional Tipo da Educação), gastos com instituições educacionais públicas, bem como os gastos públicos com a educação tem um efeito dissuasor sobre a pirataria, sendo significativo. No entanto, o efeito de ajuda financeira aos estudantes é positivo. Quando a análise é feita tendo em conta a desagregação ISCED 1997, as despesas com ISCED 5-6 tem um efeito negativo e significativo. Tendo em conta o tipo de instituições de ensino, mais despesas com ISCED 1-4 irá reduzir a pirataria. Também encontramos que mais ajuda financeira aos estudantes nos níveis mais elevados do ensino, por exemplo, ISCED 5-6, tem um efeito positivo e significativo. Por fim, mais anos de escolaridade do ensino primário e secundário terá um efeito dissuasor sobre a pirataria de software. Resumo do Capítulo 6 Este capítulo analisa as interações entre a pirataria de software e o crescimento económico através de uma abordagem de equações simultâneas, utilizando um painel de países para os quais informações sobre a pirataria está disponível para 1995, 2000, 2005 e 2010. O que nos permite estabelecer as interações entre essas variáveis, mas também para medir os efeitos diretos e indiretos de outras variáveis que mostraram relevância para o crescimento económico e a pirataria de software. Os resultados indicam que existe uma relação não linear côncava entre a pirataria de software e crescimento económico.
Lu, Jia. "Software Copyright and Piracy in China." 2009. http://hdl.handle.net/1969.1/ETD-TAMU-2009-08-3258.
Full textTang, Jih-Hsin, and 唐日新. "A Study On the Factors of Software Piracy." Thesis, 1996. http://ndltd.ncl.edu.tw/handle/57163105016288872261.
Full textLi, Ping-Chieh, and 黎秉劼. "Network Externality, Software Piracy and Copy Protection Policy." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/59833302484509737013.
Full text淡江大學
亞洲研究所碩士班
101
The purpose of this thesis is to analyses three questions in game industry where exists network externality. One, when consumers place a high value for the variety of game software, what variation will occurs in hardware competition? Two, in game industry, hardware is incompatible with another hardware. In this case, consumers what will encourage consumers to change their hardware? Three, should software gain their profits by installing device to protect their software, or choose not to protect thesoftware but gain the value of software by internet externality? This thesis used the economies model by Oz Shy(2001) to analyse. In chapter 3, we discovered that when consumers place a high value for the variety of game software, the hardware’s price and profits will decrease. Same in the Chapter 3, we found three reason that will attract consumers to change their hardware. First, when the hardware’s price is lower than another hardware which the consumer used. Second, when the variety of software for the hardware is more than the hardware that consumer used. Third, when the differentiation between hardware decrease. In chapter 4, we defined that there are two types of software users. The users who gain an extra utility form services by software firms(Type O), and the users who does not mind the service form software firms(Type I). In the analysis, we found that when the Type O users place a high value for the service form software firms, no copy protection yields a higher profit than copy protection. Because in the case of no copy protection, the number of users will increase and the value of software wil increase.
Lu, Kuan-wei, and 盧冠瑋. "Extending the Understanding of Software Piracy: A Pirated Software Sharing Behavior Model." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/78650377737826343587.
Full text國立屏東商業技術學院
資訊管理系
96
The advancing technology of peer-to-peer file sharing has increased the availability of information-based products on the world market, especially computer software, music, and videos. The same advancement, however, has also reduced the costs and increased the availability throughout the world of the technology applied to pirate these products. Downloading and sharing the pirated products is a problem for the software, music and movie industry. Investigating the piracy has long been attracting the interest of academics. Most previous research in this field has focused on investigating why people wants to spend time cracking copyrighted software and downloading the pirated software. Relatively little research has investigated the determinants of sharing pirated software. The behavior of sharing pirated software would cause serious damage to the copyright owner since it could boost the diffusion of pirated software. This study, therefore, deals with the issue relating to why people want to put effort into sharing pirated software. This study extends information technology (IT) behavior research by proposing a behavioral model of pirated software sharing that includes behavioral intention, attitude, perceived behavioral control and situational factors. The proposed model integrates elements from the Theory of Reasoned Action (TRA), Theory of Planned Behavior (TPB) and social influence as well as behavioral decision-making models. A three-phase procedure was employed to establish the behavioral decision-making model of determining to share pirated software. First, the impact of perceived behavioral control on the attitude towards sharing pirated software was investigated in order to analyze the behavior shaped by individual attributes. Second, the impact of social influence on the attitude towards sharing pirated software was investigated in order to analyze the behavior shaped by normative attributes. Finally, a behavior impact model integrating individual and normative impacts was proposed and verified, in order to clearly understand the causal relations of the behavior shaping of pirated software sharing.
"A robust anti-tampering scheme for software piracy protection." 2011. http://library.cuhk.edu.hk/record=b5894617.
Full textThesis (M.Phil.)--Chinese University of Hong Kong, 2011.
Includes bibliographical references (leaves 79-92).
Abstracts in English and Chinese.
Abstract --- p.i
Acknowledgement --- p.iv
Chapter 1 --- Introduction --- p.1
Chapter 1.1 --- Motivation --- p.1
Chapter 1.2 --- Software Cracking --- p.2
Chapter 1.3 --- Objectives --- p.4
Chapter 1.4 --- Contributions --- p.5
Chapter 1.5 --- Thesis Outline --- p.6
Chapter 2 --- Related Work --- p.8
Chapter 2.1 --- Hardware-based Protection --- p.8
Chapter 2.2 --- Network-based Protection --- p.9
Chapter 2.3 --- Software-based Protection --- p.11
Chapter 2.3.1 --- Obfuscation --- p.11
Chapter 2.3.2 --- Code Encryption --- p.13
Chapter 2.3.3 --- Virtual Machine --- p.15
Chapter 2.3.4 --- Self-checksumming --- p.16
Chapter 2.3.5 --- Watermarking --- p.20
Chapter 2.3.6 --- Self-modifying Code --- p.22
Chapter 2.3.7 --- Software Aging --- p.23
Chapter 3 --- Proposed Protection Scheme --- p.24
Chapter 3.1 --- Introduction --- p.24
Chapter 3.2 --- Protector --- p.27
Chapter 3.2.1 --- A Traditional Protector Structure --- p.28
Chapter 3.2.2 --- Protector Construction --- p.31
Chapter "3,2.3" --- Protector Implementation - Version 1 --- p.32
Chapter 3.2.4 --- Protector Implementation - Version 2 --- p.35
Chapter 3.2.5 --- Tamper Responses --- p.37
Chapter 3.3 --- Protection Tree --- p.39
Chapter 3.4 --- Non-deterministic Execution of Functions --- p.43
Chapter 3.4.1 --- Introduction to n-version Functions --- p.44
Chapter 3.4.2 --- Probability Distributions --- p.45
Chapter 3.4.3 --- Implementation Issues --- p.47
Chapter 3.5 --- Desired Properties --- p.49
Chapter 4 --- Cracking Complexity and Security Analysis --- p.52
Chapter 4.1 --- Cracking Complexity --- p.52
Chapter 4.2 --- Security Analysis --- p.55
Chapter 4.2.1 --- Automation Attacks --- p.55
Chapter 4.2.2 --- Control Flow Graph Analysis --- p.55
Chapter 4.2.3 --- Cloning Attack --- p.56
Chapter 4.2.4 --- Dynamic Tracing --- p.56
Chapter 5 --- Experiments --- p.58
Chapter 5.1 --- Execution Time Overhead --- p.59
Chapter 5.2 --- Tamper Responses --- p.67
Chapter 6 --- Conclusion and Future Work --- p.73
Chapter 6.1 --- Conclusion --- p.73
Chapter 6.2 --- Comparison --- p.75
Chapter 6.3 --- Future Work --- p.77
Bibliography --- p.79
Chen, Chung-Le, and 陳忠樂. "A Study of Intellectual Property Protection against Software Piracy." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/55692913119527862155.
Full text國立交通大學
管理學院高階主管管理碩士學程
97
In this knowledge-based economy, information technology is an asset vital to industry and economic development. Governments in many jurisdictions actively promote awareness of intellectual property rights, take measures to combat infringement including software piracy and implement policies to encourage technology innovations. Despite all these initiatives, software piracy cases contribute to increase. The two main attributing factors are (i) the high prices of genuine software programs which may not be affordable by users and (ii) the lack of respect for intellectual property rights among certain corporate users or consumers. In addition to the new technology P2P, which makes its easy to download illegal software from the Internet, the different levels of intellectual property protection afforded in various jurisdictions further increase the difficulty in stamping out such infringement against software that are in markets worldwide. This study attempts to identify a mechanism for the protection of intellectual property rights to software from the perspectives of software industries, information technology and relevant technology laws, and adopts several case studies of software piracy in the Greater China. The Study serves as a reference for software business operators and end-users in protecting their legal rights and interests with respect to the use of software.
Wu, Hsiang-Lin, and 吳祥麟. "The Antecedents of Attitude toward Software Piracy Intention:A Psychological Perspective." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/2h4hzq.
Full text國立中正大學
資訊管理學系暨研究所
103
Software piracy is a on going exacerbative phenomenon in the world. Therefore, it attracts many scholars are drawn to put their efforts into this topic. Many important factors are exploited and discussed from various perspectives. In these studies, the individual’s attitude is viewed as an important predictor of his piracy intention and later piracy behavior though it has not been discussed systematically. Therefore, this study borrows the work of Eagly and Chaiken (1993), and tries to understand the formation of an individual’s attitude in a systematic way. According to their proposition, three constructs are discussed, that is, cognitive beliefs, affective beliefs and behavioral beliefs. Two cognitive beliefs, that is, perceived likelihood of punishment and perceived benefit are introduced; related affective beliefs, that is, shame, happiness and excitement are examined; and behavior belief, past piracy behavior is also included in the research. The results showed that affective beliefs and behavioral belief have a significant impact on an individual’s attitude and intention respectively. Finally, implications and recommendations are also discussed.
Chi, Chien-Ting, and 季建廷. "A Study on the Software Anti-Piracy and Management in Taiwan." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/63611881923426061908.
Full textLi, Chung Chang, and 張力中. "The Research of College Students Attitudes and Behaviors toward Software Piracy." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/30586879570394414954.
Full text輔仁大學
資訊管理學系
98
The major purpose of this study was to examine factors affecting college student’s software pirating behavioral intention and behavior. A questionnaire survey was conducted to 318 college students to collect data. Results of the survey showed that subject’s moral intensity and the convenience for software pirating had significant impact on subject’s attitude toward piracy. The peer’s influence, subject’s price perception of the software, and law awareness had no significant effects on the attitudes. For subject’s behavioral intentions of software piracy, moral intensity, convenience for software pirating, peer’s influence, and law awareness were all found to be significant factors while no such effect was found from price perception of the software. Results of this study also revealed that the convenience for software pirating and peer’s influence did significantly affect subject’s software pirating behavior. Price perception of the software, moral intensity, and law awareness did not have significant impacts on the pirating behavior. Results of this study confirmed Theory of the Planned Behavior that subject’s attitude toward software piracy affects his/her behavioral intentions and the behavioral intention affects the actual behavior.
Hao-MinLei and 雷皓閔. "The relationship between socio-economic conditions and piracy of business software." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/32485823963677899222.
Full text國立成功大學
企業管理學系碩博士班
98
Extensive use of Internet builds up the digital age which makes information transfers quicker. Problems of software piracy become more and more serious in these years. “How to lower the piracy rates effectively from the overall standpoints” becomes such an important problem around the world. Based on the previous researches regarding the piracy rates, this study uses the standpoints of “country-level” to discuss the problems of piracy rates around the world. The socio-economic conditions are used as the research indicators, including: (1) economic, (2) demography, (3) technology, (4) culture and education. There are 29 variables in research indicators from the year of 2004 to 2008. In this study, we use principal component analysis (PCA) method to merge 29 variables into four indicators in order to reduce the difficulties of analysis. Then, we develop models from multiple regression analysis to discuss the factors of national piracy rates. In addition, we also use the IMD (Lausanne Institute of Management) data of the Global Competitiveness Report and extend discussion of piracy rates and relationships between national competitiveness. The research results of multiple regression models reveal that economy, culture, education, and technology have significant influence on piracy rates. Improving economy, education and technology or creating culture would significantly lower the piracy rates. Nevertheless, education and technology have greater impact on piracy rates than the economy; On the other hand, the demography has no significant influence on piracy rates.
George, João Bernardo Pardellas de Oliveira da Fonseca. "The impact of software as a service in software piracy : has the change in the distribution and sale of software provided not only an accurate answer against software piracy but also an increase in consumer-value?" Master's thesis, 2012. http://hdl.handle.net/10400.14/17589.
Full textVan, der Schyff Derek. ""The theory of planned behaviour and how it relates to software piracy"." Thesis, 2009. http://hdl.handle.net/10539/6610.
Full textMatthews, M. S. "Bandura's social cognitive theory (SCT) in a cross-nation study of software piracy." Thesis, 2009. http://hdl.handle.net/10539/7021.
Full text"A study of the software piracy problem in corporate users of Hong Kong." Chinese University of Hong Kong, 1990. http://library.cuhk.edu.hk/record=b5886397.
Full textThesis (M.B.A.)--Chinese University of Hong Kong, 1990.
Bibliography: leaf 50 (2nd group).
TABLE OF CONTENTS --- p.ii
PREFACE --- p.iii
Chapter
Chapter I. --- INTRODUCTION --- p.1
The Need for Copyright of Software --- p.1
Software Piracy and Illicit Copying --- p.2
Protective Measures of Software --- p.2
The Copyright (Computer Software) Amendment Act --- p.3
The Problem --- p.4
The Research Problem Defined --- p.8
Chapter II. --- METHODOLOGY --- p.9
Chapter III. --- THE PROCESS OF THE RESEARCH PROJECT --- p.12
Chapter IV. --- ANALYSIS OF DATA --- p.14
Analysis of Individual Question --- p.14
Analysis of Answer between Questions --- p.20
Chapter V. --- RESEARCH FINDINGS --- p.29
Chapter VI. --- CONCLUSION --- p.35
Some Recommendation --- p.37
Chapter VII. --- A FINAL WORD AND ACKNOWLEDGEMENT --- p.40
Appendex
Chapter I. --- Copyright (Computer Software) Amendment Act 1985 --- p.41
Chapter II. --- Sample Software License Agreement --- p.45
Chapter III. --- Bibliography --- p.50
Chapter III. --- Questionnaire --- p.51
Chapter IV. --- SPSS Reports --- p.55
Chen, Jia-Ying, and 陳嘉瑩. "Determinants of software piracy rate: comparison between OECD countries and non-OECD countries." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/7n726a.
Full text國立中央大學
產業經濟研究所
104
This paper examines the impact of the level of the openness, innovation, GDP, the Internet, high-technology exports, education, and income inequality on the rate of business software piracy at the country level. The study finds that GDP per capita, Internet, and innovation as measured by Scientific and technical journal articles have negative effects on business software piracy rates. A country’s degree of high-technology exports and education do not significantly affect the piracy of software. Using data from BSA and WDI for 87 countries from 2003 to 2011, the findings also show that the degree of openness and income inequality affect differently to piracy rate in OECD countries and non OECD countries.
Funkhouser, Nathan, and 方納森. "Software Piracy among Students in Taiwan: The Ethical Decision Making Process and Attitudes toward the Use of Pirated Software." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/64274983500864006870.
Full text國立成功大學
國際管理碩士在職專班
94
This study looks at the influence of consumer moral intensity, perceived risks and moral judgment on the use of pirated software in Taiwan. Moral intensity includes magnitude of consequences, social consensus, probability of effect, temporal immediacy and proximity. Perceived risk is based on financial, performance, social and prosecution risks. Moral Judgment is related to cognitive moral development and reasoning. Seven hypotheses are developed and tested with data from scenario-based questionnaires. One-way ANOVA is applied to assess the differences of respondents’ intentions to consider using pirated software and to actually use pirated or legally acquired software. This will allow us to focus on the variables that form the hypotheses and also the influence of the demographic data that could have an influence on the outcome intention. To find out the relationships among moral intensity, perceived risks and moral judgment as they relate to the ethical decision making outcome, structure equation modeling is employed to test the interrelationships of all the variables in the entire model. In particular, how moral intensity and perceived risks relate to moral judgment. The results indicate that moral intensity, perceived risks and moral judgment are related to ethical decision making regarding the use of pirated software. Past use of pirated software was also an indicator. However, demographic variables like age, income and gender were not predictors in the way they had been hypothesized.
Hsu, Bai-qin, and 徐百欽. "Exploring the Ethical Decision Making in Software Piracy under Conditions of Volitional and non-Volitional Control among Taiwan’s Undergraduate Student: A Situational Piracy Prevention Perspective." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/76351887395040229063.
Full text國立高雄大學
經濟管理研究所
94
With the prevalence of Internet and the rapid changes in information technology, software piracy has become a significant challenge around the world. According to Business Software Alliance (BSA) statistics in 2004, the software piracy of point-to-point (P2P) has increased materially by 770%. Also, in an April 2003 economic impact study, the International Data Corporation (IDC) concludes that a 10 point reduction in the global piracy rate could deliver both direct and indirect benefits. In this study, a situational prevention theory is proposed and applied into the piracy issue, which comprises five different prevention categories: (1) increase the effort, (2) increase the risks, (3) reduce the rewards, (4) reduce provocations, and (5) remove excuses. Further, we have extended the Theory of Planned Behavior by adding a new variable – habit, to explore the individual’s decision making in software piracy under conditions of volitional and non-volitional control among Taiwan’s undergraduate student A totally 707 returned survey are used for analysis using structural equation modeling (SEM) as performed in LISREL. The results show the individual’s pirate intention is positively influenced by attitude and subjective norm; the perceived moral obligation and self-regulatory efficacy are negatively impact on one’s pirate intention; as for the mediating variables, the piracy intention and habit both positively influence on one’s pirate behavior. While this study has considered a non-volitional control variable – habit into the existing TPB model, this variable has explained a significant proportion of the variance in one’s pirate behavior. Based on the research findings, conclusions and implications are discussed.
Zemančík, Adam. "Softwarové pirátství." Master's thesis, 2017. http://www.nusl.cz/ntk/nusl-368790.
Full textWhite, Edward Peter Greenwood. "Evolving border theory and self-regulation theory for a mobile phone generation." Thesis, 2018. https://hdl.handle.net/10539/26274.
Full textThe global adoption of mobile phones has fundamentally changed life as we know it. This study hopes to understand if mobile- and/or smartphones have changed the way in which work and home domains are constructed and what the consequences are on the individual’s workfamily balance. More importantly, are individuals able to self-regulate the flow of communication from the work into the home domain via a mobile- and/or smartphone in order to maintain the intricate work-family balance. To determine the plausibility/feasibility of this hypothesis, the study builds on Clark's (2000) Border theory with respect to work-life balance and border violations, bearing recent technological advances in mind, through the incorporation of Bandura’s (1986) self-regulation mechanism to explain the border management mechanism. To determine the validity of this hypothesis, a mixed-methods study was conducted which utilised a managerial participant sample recruited from South Africa in three phases; a pilot study (N = 30); a primary sample of a further 227 managers; and in-depth follow-up interviews with 27 managers and their partners. To determine the relationship between self-regulation and mobile phone usage for after-hours work in the home domain, Pearson’s correlation coefficients were used. The relationship between self-regulation and work-family balance was further explored through moderated multiple linear regressions, using a model from Baron and Kenny (1986), which created further explorative points which were investigated in the 27 interviews. The interviews were conducted to determine if individuals understand their afterhours mobile phone usage for work purposes and this was analysed via thematic content analysis (TCA). There was evidence for relationships between self-regulation and the time spent on organisational work within the work day and at home (after hours), which results in an impact on the development of work-family conflict. The relationship between the mobile phone use for work can be attributed to self-regulation, which implies that self-regulation is an intermediary mechanism. Moderated multilinear regression, unexpectedly, showed that individuals with low (deficient) self-regulatory ability, facilitated work ubiquitously with their mobile phones while simultaneously increasing their own self-esteem, as it supported their own work-family balance. The interviews uncovered three different border-keeper groups (borderexpanders, border-adapters, and border-enforcers). The outcomes of this research indicates that mobile- and/or smartphones have the ability to alter the border construction between the work and home domains as well as the intricate balance between them. Keywords: Work-family balance, Border theory, Mobile phones, Smartphones, Self-regulation, Self-esteem, South African managers
GR2019
Kráčmer, Stanislav. "Softwarové pirátství." Master's thesis, 2011. http://www.nusl.cz/ntk/nusl-297962.
Full text