메뉴 건너뛰기




Volumn 2005, Issue , 2005, Pages 504-507

Software piracy prevention through digital rights management systems

Author keywords

[No Author keywords available]

Indexed keywords

DIGITAL RIGHTS MANAGEMENT SYSTEMS; LOGISTIC REGRESSION; ONLINE DISTRIBUTION POLICY; SOFTWARE PIRACY PREVENTION;

EID: 33749077127     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICECT.2005.86     Document Type: Conference Paper
Times cited : (6)

References (16)
  • 4
    • 0031288383 scopus 로고    scopus 로고
    • To purchase or to pirate software: An empirical study
    • Spring
    • K. Cheng, R. Sims, and H. Teegen, "To Purchase or to Pirate Software: An Empirical Study", Journal of Management Information Systems, 13(4), Spring 1997, pp. 49-60.
    • (1997) Journal of Management Information Systems , vol.13 , Issue.4 , pp. 49-60
    • Cheng, K.1    Sims, R.2    Teegen, H.3
  • 5
    • 0001865968 scopus 로고
    • Factors influencing software piracy: Implications for accountants
    • Spring
    • A. Christensen, and M. Eining, M., "Factors Influencing Software Piracy: Implications for Accountants", Journal of Information Systems, 5(1), Spring 1991, pp. 67-80.
    • (1991) Journal of Information Systems , vol.5 , Issue.1 , pp. 67-80
    • Christensen, A.1    Eining, M.2
  • 6
    • 0001020817 scopus 로고
    • Software piracy: An analysis of protection strategies
    • February
    • K. Conner, and R. Rumelt, "Software Piracy: An Analysis of Protection Strategies", Management Science, 37(2), February 1991, pp. 125-139.
    • (1991) Management Science , vol.37 , Issue.2 , pp. 125-139
    • Conner, K.1    Rumelt, R.2
  • 8
    • 0031288375 scopus 로고    scopus 로고
    • Preventive and deterrent controls for software piracy
    • Spring
    • R.D. Gopal, and G.L. Sanders, "Preventive and deterrent controls for software piracy", Journal of Management Information Systems, 13(4), Spring 1997, pp. 29-48.
    • (1997) Journal of Management Information Systems , vol.13 , Issue.4 , pp. 29-48
    • Gopal, R.D.1    Sanders, G.L.2
  • 9
    • 0002481588 scopus 로고    scopus 로고
    • You can't get blood out of a turnip
    • September
    • R.D. Gopal, and G.L. Sanders, "You can't get blood out of a turnip", Communications of the ACM, 43(9), September 2000, pp. 83-89.
    • (2000) Communications of the ACM , vol.43 , Issue.9 , pp. 83-89
    • Gopal, R.D.1    Sanders, G.L.2
  • 11
    • 4043076317 scopus 로고    scopus 로고
    • Shaping of moral intensity regarding software piracy: A comparison between Thailand and U.S. students
    • January
    • R. Kini, H. Ramakrishna, and B.S. Vijayaraman, "Shaping of Moral Intensity Regarding Software Piracy: A Comparison Between Thailand and U.S. Students", Journal of Business Ethics, 49(1), January 2004, pp. 91-104.
    • (2004) Journal of Business Ethics , vol.49 , Issue.1 , pp. 91-104
    • Kini, R.1    Ramakrishna, H.2    Vijayaraman, B.S.3
  • 12
    • 0001470636 scopus 로고
    • The measurement of urban travel demand
    • D. McFadden, "The Measurement of Urban Travel Demand", Journal of Public Economics, 3(4), 1974, pp. 303328.
    • (1974) Journal of Public Economics , vol.3 , Issue.4 , pp. 303328
    • McFadden, D.1
  • 13
    • 77956887506 scopus 로고
    • A note on a general definition of the coefficient of determination
    • D. Nagelkerke, "A Note on a General Definition of the Coefficient of Determination", Biometrika, 78(3), 1991, pp. 691-693.
    • (1991) Biometrika , vol.78 , Issue.3 , pp. 691-693
    • Nagelkerke, D.1
  • 14
    • 0041426663 scopus 로고    scopus 로고
    • Software piracy in the workplace: A model and empirical test
    • Summer
    • G. Peace, D. Galletta, and L. Thong, "Software Piracy in the Workplace: A Model and Empirical Test", Journal of Management Information Systems, 20(1), Summer 2003, pp. 153-177.
    • (2003) Journal of Management Information Systems , vol.20 , Issue.1 , pp. 153-177
    • Peace, G.1    Galletta, D.2    Thong, L.3
  • 15
    • 0038544666 scopus 로고    scopus 로고
    • Methods for preventing unauthorized software distribution
    • May
    • M. Peyravian, A. Roginsky, and N. Zunic, "Methods for preventing unauthorized software distribution", Computers & Security, 22(4), May 2003, pp. 316-321.
    • (2003) Computers & Security , vol.22 , Issue.4 , pp. 316-321
    • Peyravian, M.1    Roginsky, A.2    Zunic, N.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.