메뉴 건너뛰기




Volumn 13, Issue 2, 2004, Pages 371-374

A strategic approach to software protection: Comment

Author keywords

[No Author keywords available]

Indexed keywords


EID: 2542623641     PISSN: 10586407     EISSN: None     Source Type: Journal    
DOI: 10.1111/j.1530-9134.2004.00015.x     Document Type: Note
Times cited : (23)

References (4)
  • 1
    • 0001020817 scopus 로고
    • Software piracy - An analysis of protection strategies
    • Conner, K.R. and R.P. Rumelt, 1991, "Software Piracy - An Analysis of Protection Strategies," Management Science, 37, 125-139.
    • (1991) Management Science , vol.37 , pp. 125-139
    • Conner, K.R.1    Rumelt, R.P.2
  • 4
    • 21344491949 scopus 로고
    • The welfare implications of unauthorized reproduction of intellectual property in the presence of network externalities
    • Takeyama, L.N., 1994, "The Welfare Implications of Unauthorized Reproduction of Intellectual Property in the Presence of Network Externalities," Journal of Industrial Economics, 62, 155-166.
    • (1994) Journal of Industrial Economics , vol.62 , pp. 155-166
    • Takeyama, L.N.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.