-
1
-
-
18844407813
-
Software piracy prevention through diversity
-
Washington DC, USA, November
-
B. Anckaert, B. De Sutter, and K. De Bosschere, "Software piracy prevention through diversity", Proceedings of the 4th ACM workshop on Digital Rights Management, Washington DC, USA, November 2004, pp. 63-71.
-
(2004)
Proceedings of the 4th ACM Workshop on Digital Rights Management
, pp. 63-71
-
-
Anckaert, B.1
De Sutter, B.2
De Bosschere, K.3
-
4
-
-
0031288383
-
To purchase or to pirate software: An empirical study
-
Spring
-
K. Cheng, R. Sims, and H. Teegen, "To Purchase or to Pirate Software: An Empirical Study", Journal of Management Information Systems, 13(4), Spring 1997, pp. 49-60.
-
(1997)
Journal of Management Information Systems
, vol.13
, Issue.4
, pp. 49-60
-
-
Cheng, K.1
Sims, R.2
Teegen, H.3
-
5
-
-
0001865968
-
Factors influencing software piracy: Implications for accountants
-
Spring
-
A. Christensen, and M. Eining, M., "Factors Influencing Software Piracy: Implications for Accountants", Journal of Information Systems, 5(1), Spring 1991, pp. 67-80.
-
(1991)
Journal of Information Systems
, vol.5
, Issue.1
, pp. 67-80
-
-
Christensen, A.1
Eining, M.2
-
6
-
-
0001020817
-
Software piracy: An analysis of protection strategies
-
February
-
K. Conner, and R. Rumelt, "Software Piracy: An Analysis of Protection Strategies", Management Science, 37(2), February 1991, pp. 125-139.
-
(1991)
Management Science
, vol.37
, Issue.2
, pp. 125-139
-
-
Conner, K.1
Rumelt, R.2
-
7
-
-
84970947585
-
Software engineering for security: A roadmap
-
Limerick, Ireland, June
-
P. Devanbu, and S. Stubblebine, "Software Engineering for Security: a Roadmap, Proceedings of the International Conference on Software Engineering, Limerick, Ireland, June 2000, pp. 227-239.
-
(2000)
Proceedings of the International Conference on Software Engineering
, pp. 227-239
-
-
Devanbu, P.1
Stubblebine, S.2
-
8
-
-
0031288375
-
Preventive and deterrent controls for software piracy
-
Spring
-
R.D. Gopal, and G.L. Sanders, "Preventive and deterrent controls for software piracy", Journal of Management Information Systems, 13(4), Spring 1997, pp. 29-48.
-
(1997)
Journal of Management Information Systems
, vol.13
, Issue.4
, pp. 29-48
-
-
Gopal, R.D.1
Sanders, G.L.2
-
9
-
-
0002481588
-
You can't get blood out of a turnip
-
September
-
R.D. Gopal, and G.L. Sanders, "You can't get blood out of a turnip", Communications of the ACM, 43(9), September 2000, pp. 83-89.
-
(2000)
Communications of the ACM
, vol.43
, Issue.9
, pp. 83-89
-
-
Gopal, R.D.1
Sanders, G.L.2
-
10
-
-
0003508724
-
-
Wiley&Sons, New York, USA
-
Hosmer, W., and Lemeshow, S., Applied logistic regression, Wiley&Sons, New York, USA, 2000.
-
(2000)
Applied Logistic Regression
-
-
Hosmer, W.1
Lemeshow, S.2
-
11
-
-
4043076317
-
Shaping of moral intensity regarding software piracy: A comparison between Thailand and U.S. students
-
January
-
R. Kini, H. Ramakrishna, and B.S. Vijayaraman, "Shaping of Moral Intensity Regarding Software Piracy: A Comparison Between Thailand and U.S. Students", Journal of Business Ethics, 49(1), January 2004, pp. 91-104.
-
(2004)
Journal of Business Ethics
, vol.49
, Issue.1
, pp. 91-104
-
-
Kini, R.1
Ramakrishna, H.2
Vijayaraman, B.S.3
-
12
-
-
0001470636
-
The measurement of urban travel demand
-
D. McFadden, "The Measurement of Urban Travel Demand", Journal of Public Economics, 3(4), 1974, pp. 303328.
-
(1974)
Journal of Public Economics
, vol.3
, Issue.4
, pp. 303328
-
-
McFadden, D.1
-
13
-
-
77956887506
-
A note on a general definition of the coefficient of determination
-
D. Nagelkerke, "A Note on a General Definition of the Coefficient of Determination", Biometrika, 78(3), 1991, pp. 691-693.
-
(1991)
Biometrika
, vol.78
, Issue.3
, pp. 691-693
-
-
Nagelkerke, D.1
-
14
-
-
0041426663
-
Software piracy in the workplace: A model and empirical test
-
Summer
-
G. Peace, D. Galletta, and L. Thong, "Software Piracy in the Workplace: A Model and Empirical Test", Journal of Management Information Systems, 20(1), Summer 2003, pp. 153-177.
-
(2003)
Journal of Management Information Systems
, vol.20
, Issue.1
, pp. 153-177
-
-
Peace, G.1
Galletta, D.2
Thong, L.3
-
15
-
-
0038544666
-
Methods for preventing unauthorized software distribution
-
May
-
M. Peyravian, A. Roginsky, and N. Zunic, "Methods for preventing unauthorized software distribution", Computers & Security, 22(4), May 2003, pp. 316-321.
-
(2003)
Computers & Security
, vol.22
, Issue.4
, pp. 316-321
-
-
Peyravian, M.1
Roginsky, A.2
Zunic, N.3
-
16
-
-
0033414721
-
A strategic approach to software protection
-
O. Shy, and J.-F. Thisse, "A strategic approach to software protection", Journal of Economics & Management Strategy, 8(2), 1999, pp. 163-190.
-
(1999)
Journal of Economics & Management Strategy
, vol.8
, Issue.2
, pp. 163-190
-
-
Shy, O.1
Thisse, J.-F.2
|