[go: up one dir, main page]

Givon et al., 1995 - Google Patents

Software piracy: Estimation of lost sales and the impact on software diffusion

Givon et al., 1995

Document ID
16930096648035417481
Author
Givon M
Mahajan V
Muller E
Publication year
Publication venue
Journal of Marketing

External Links

Snippet

Software piracy by users has been identified as the worst problem facing the software industry today. Software piracy permits the shadow diffusion of a software parallel to its legal diffusion in the marketplace, increasing its user base over time. Because of this software …
Continue reading at journals.sagepub.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • G06F21/125Restricting unauthorised execution of programs by manipulating the program code, e.g. source code, compiled code, interpreted code, machine code
    • G06F21/126Interacting with the operating system
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • G06F21/123Restricting unauthorised execution of programs by using dedicated hardware, e.g. dongles, smart cards, cryptographic processors, global positioning systems [GPS] devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/07Indexing scheme relating to G06F21/10, protecting distributed programs or content
    • G06F2221/0722Content
    • G06F2221/0737Traceability
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/07Indexing scheme relating to G06F21/10, protecting distributed programs or content
    • G06F2221/0775Logging
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F7/00Methods or arrangements for processing data by operating upon the order or content of the data handled
    • G06F7/38Methods or arrangements for performing computations using exclusively denominational number representation, e.g. using binary, ternary, decimal representation
    • G06F7/48Methods or arrangements for performing computations using exclusively denominational number representation, e.g. using binary, ternary, decimal representation using non-contact-making devices, e.g. tube, solid state device; using unspecified devices
    • G06F7/52Multiplying; Dividing
    • G06F7/523Multiplying only
    • G06F7/533Reduction of the number of iteration steps or stages, e.g. using the Booth algorithm, log-sum, odd-even
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3604Software analysis for verifying properties of programs
    • G06F11/3612Software analysis for verifying properties of programs by runtime analysis

Similar Documents

Publication Publication Date Title
Givon et al. Software piracy: Estimation of lost sales and the impact on software diffusion
Siyal et al. Predicting mobile banking acceptance and loyalty in Chinese bank customers
Sinha et al. Don't think twice, it's all right: Music piracy and pricing in a DRM-free environment
Brown et al. Managing marketing channel opportunism: the efficacy of alternative governance mechanisms
Choi et al. Spatiotemporal analysis of imitation behavior across new buyers at an online grocery retailer
Green et al. Segmenting markets with conjoint analysis
Erler et al. Bayesian imputation of time-varying covariates in linear mixed models
Jacob et al. The validity of the comparative interrupted time series design for evaluating the effect of school-level interventions
Zhai et al. Economic resilience during COVID-19: An insight from permanent business closures
Mistler et al. A comparison of joint model and fully conditional specification imputation for multilevel missing data
Gomes et al. Multiple imputation methods for handling missing data in cost-effectiveness analyses that use data from hierarchical studies: an application to cluster randomized trials
Nguyen et al. The dark sides of AI advertising: the integration of cognitive appraisal theory and information quality theory
Lusthaus et al. The Gozi group: A criminal firm in cyberspace?
Wang et al. Stability of uncertain delay differential equations
Arya et al. Auditor independence revisited
LeBeau et al. Model misspecification and assumption violations with the linear mixed model: a meta-analysis
Brady et al. Cognitive political economy: A growing partisan divide in economic perceptions
Potipiroon Reward expectancy and external whistleblowing: Testing the moderating roles of public service motivation, seriousness of wrongdoing, and whistleblower protection
Goldar Export participation and employment of contract workers in organized manufacturing plants in India
Aguirre et al. Innovation and informality: an analysis with the Colombian manufacturing industry 2007 to 2016
Saint-Hilary et al. A novel measure of drug benefit–risk assessment based on scale loss score
Mishra et al. Determinants of discrimination in access to housing for marginalised social groups in India
Choi et al. Two-sample instrumental-variables regression with potentially weak instruments
Ding et al. Rural Residents’ Digital Payment: The Use and Its Impact on Credit Availability–Evidence Using Extended UTAUT2
Lui et al. Exact tests in binary data under an incomplete block crossover design