Givon et al., 1995 - Google Patents
Software piracy: Estimation of lost sales and the impact on software diffusionGivon et al., 1995
- Document ID
- 16930096648035417481
- Author
- Givon M
- Mahajan V
- Muller E
- Publication year
- Publication venue
- Journal of Marketing
External Links
Snippet
Software piracy by users has been identified as the worst problem facing the software industry today. Software piracy permits the shadow diffusion of a software parallel to its legal diffusion in the marketplace, increasing its user base over time. Because of this software …
- 238000009792 diffusion process 0 abstract description 96
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
- G06F21/125—Restricting unauthorised execution of programs by manipulating the program code, e.g. source code, compiled code, interpreted code, machine code
- G06F21/126—Interacting with the operating system
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
- G06F21/123—Restricting unauthorised execution of programs by using dedicated hardware, e.g. dongles, smart cards, cryptographic processors, global positioning systems [GPS] devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/07—Indexing scheme relating to G06F21/10, protecting distributed programs or content
- G06F2221/0722—Content
- G06F2221/0737—Traceability
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/07—Indexing scheme relating to G06F21/10, protecting distributed programs or content
- G06F2221/0775—Logging
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F7/38—Methods or arrangements for performing computations using exclusively denominational number representation, e.g. using binary, ternary, decimal representation
- G06F7/48—Methods or arrangements for performing computations using exclusively denominational number representation, e.g. using binary, ternary, decimal representation using non-contact-making devices, e.g. tube, solid state device; using unspecified devices
- G06F7/52—Multiplying; Dividing
- G06F7/523—Multiplying only
- G06F7/533—Reduction of the number of iteration steps or stages, e.g. using the Booth algorithm, log-sum, odd-even
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/36—Preventing errors by testing or debugging software
- G06F11/3604—Software analysis for verifying properties of programs
- G06F11/3612—Software analysis for verifying properties of programs by runtime analysis
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Givon et al. | Software piracy: Estimation of lost sales and the impact on software diffusion | |
| Siyal et al. | Predicting mobile banking acceptance and loyalty in Chinese bank customers | |
| Sinha et al. | Don't think twice, it's all right: Music piracy and pricing in a DRM-free environment | |
| Brown et al. | Managing marketing channel opportunism: the efficacy of alternative governance mechanisms | |
| Choi et al. | Spatiotemporal analysis of imitation behavior across new buyers at an online grocery retailer | |
| Green et al. | Segmenting markets with conjoint analysis | |
| Erler et al. | Bayesian imputation of time-varying covariates in linear mixed models | |
| Jacob et al. | The validity of the comparative interrupted time series design for evaluating the effect of school-level interventions | |
| Zhai et al. | Economic resilience during COVID-19: An insight from permanent business closures | |
| Mistler et al. | A comparison of joint model and fully conditional specification imputation for multilevel missing data | |
| Gomes et al. | Multiple imputation methods for handling missing data in cost-effectiveness analyses that use data from hierarchical studies: an application to cluster randomized trials | |
| Nguyen et al. | The dark sides of AI advertising: the integration of cognitive appraisal theory and information quality theory | |
| Lusthaus et al. | The Gozi group: A criminal firm in cyberspace? | |
| Wang et al. | Stability of uncertain delay differential equations | |
| Arya et al. | Auditor independence revisited | |
| LeBeau et al. | Model misspecification and assumption violations with the linear mixed model: a meta-analysis | |
| Brady et al. | Cognitive political economy: A growing partisan divide in economic perceptions | |
| Potipiroon | Reward expectancy and external whistleblowing: Testing the moderating roles of public service motivation, seriousness of wrongdoing, and whistleblower protection | |
| Goldar | Export participation and employment of contract workers in organized manufacturing plants in India | |
| Aguirre et al. | Innovation and informality: an analysis with the Colombian manufacturing industry 2007 to 2016 | |
| Saint-Hilary et al. | A novel measure of drug benefit–risk assessment based on scale loss score | |
| Mishra et al. | Determinants of discrimination in access to housing for marginalised social groups in India | |
| Choi et al. | Two-sample instrumental-variables regression with potentially weak instruments | |
| Ding et al. | Rural Residents’ Digital Payment: The Use and Its Impact on Credit Availability–Evidence Using Extended UTAUT2 | |
| Lui et al. | Exact tests in binary data under an incomplete block crossover design |