Works matching DE "SOFTWARE piracy"
1
- Nature, 1996, v. 383, n. 6595, p. 4, doi. 10.1038/383004a0
- Article
2
- Cogent Engineering, 2017, v. 4, n. 1, p. 1, doi. 10.1080/23311916.2016.1243023
- Article
3
- Journal of Education for Business, 2007, v. 83, n. 2, p. 87, doi. 10.3200/JOEB.83.2.87-94
- Rawlinson, David R.;
- Lupton, Robert A.
- Article
4
- Scholedge International Journal of Management & Development, 2015, v. 2, n. 2, p. 9
- Sabir, Raja Irfan;
- Idrees, Mehran;
- Shahnawaz, Muhammad
- Article
5
- Science & Engineering Ethics, 2015, v. 21, n. 4, p. 967, doi. 10.1007/s11948-014-9573-5
- Santillanes, Gary;
- Felder, Ryan
- Article
6
- Journal of Experimental & Theoretical Artificial Intelligence, 2019, v. 31, n. 2, p. 267, doi. 10.1080/0952813X.2018.1546769
- Khalilian, Alireza;
- Mirzaeiyan, Alireza;
- Vahidi-Asl, Mojtaba;
- Haghighi, Hassan
- Article
7
- Computer Science & Information Systems, 2014, v. 11, n. 3, p. 1055, doi. 10.2298/CSIS130918064H
- Yongman Han;
- Jongcheon Choi;
- Seong-je Cho;
- Haeyoung Yoo;
- Jinwoon Woo;
- Yunmook Nah;
- Minkyu Park
- Article
8
- Information Systems Frontiers, 2012, v. 14, n. 2, p. 261, doi. 10.1007/s10796-010-9236-2
- Kartas, Anastasiou;
- Goode, Sigi
- Article
9
- Journal of Promotion Management, 2002, v. 9, n. 1/2, p. 199
- Thompson, George Benjamin;
- Hamilton, Lynda S.
- Article
10
- Journal of Promotion Management, 2002, v. 9, n. 1/2, p. 181
- Neese, William T.;
- McManis, Charles R.
- Article
11
- INFOtheca - Journal of Informatics & Librarianship, 2010, v. 11, n. 1, p. 39a
- Article
12
- History & Technology, 2019, v. 35, n. 2, p. 177, doi. 10.1080/07341512.2019.1652432
- Article
13
- Journal of Intellectual Property Law & Practice, 2014, v. 9, n. 6, p. 456, doi. 10.1093/jiplp/jpu050
- Newton, Heather;
- Moir, Andrew;
- Montagnon, Rachel
- Article
14
- Journal of Intellectual Property Law & Practice, 2013, v. 8, n. 7, p. 512, doi. 10.1093/jiplp/jpt068
- Article
15
- Social Science Computer Review, 2007, v. 25, n. 3, p. 339, doi. 10.1177/0894439307299934
- Higgis, George E.;
- Fell, Brian D.;
- Wilson, Abby L.
- Article
16
- Journal of Marketing Management, 2018, v. 34, n. 3/4, p. 314, doi. 10.1080/0267257X.2018.1452278
- Petrescu, Maria;
- Gironda, John T.;
- Korgaonkar, Pradeep K.
- Article
17
- Information Society, 2013, v. 29, n. 4, p. 219, doi. 10.1080/01972243.2013.792303
- Guarnieri, Franck;
- Przyswa, Eric
- Article
18
- Information Society, 2013, v. 29, n. 4, p. 203, doi. 10.1080/01972243.2013.792302
- Chan, RickyY. K.;
- Ma, KatherineH. Y.;
- Wong, Y.H.
- Article
19
- Information Development, 2014, v. 30, n. 4, p. 295, doi. 10.1177/0266666914552969
- Article
20
- Information Development, 2014, v. 30, n. 4, p. 342, doi. 10.1177/0266666912465974
- Yoo, Chul-Woo;
- Sanders, G Lawrence;
- Rhee, Cheul;
- Choe, Young-Chan
- Article
21
- Library Philosophy & Practice, 2013, p. 1
- Mirza, Iram Zehra;
- Islam, Shahina
- Article
22
- Journal of Business Ethics, 1990, v. 9, n. 8, p. 655, doi. 10.1007/BF00383392
- Swinyard, W. R.;
- Rinne, H.;
- Keng Kau, A.
- Article
23
- Applied Economics Letters, 2006, v. 13, n. 2, p. 101, doi. 10.1080/13504850500390374
- Andrés, Antonio Rodríguez
- Article
24
- Journal of Economics, 2008, v. 95, n. 1, p. 25, doi. 10.1007/s00712-008-0019-x
- Chang, Ming;
- Lin, Chiu;
- Wu, Dachrahn
- Article
25
- Journal of Contemporary Criminal Justice, 2001, v. 17, n. 4, p. 369, doi. 10.1177/1043986201017004006
- Article
26
- UCLA Law Review, 2013, v. 61, n. 1, p. 148
- Article
27
- Berkeley Technology Law Journal, 2006, v. 21, n. 4, p. 1421
- Article
28
- Review of Law & Economics, 2017, v. 13, n. 2, p. -1, doi. 10.1515/rle-2013-0005
- Article
29
- Review of Law & Economics, 2012, v. 8, n. 2, p. 433, doi. 10.1515/1555-5879.1527
- El Harbi, Sana;
- Grolleau, Gilles;
- Bekir, Insaf
- Article
30
- Issues in Informing Science & Information Technology, 2010, v. 7, p. 321, doi. 10.28945/1209
- Article
31
- Software & Systems Modeling, 2018, v. 17, n. 4, p. 1287, doi. 10.1007/s10270-016-0557-6
- Alalfi, Manar H.;
- Antony, Elizabeth P.;
- Cordy, James R.
- Article
32
- Ethics & Information Technology, 2007, v. 9, n. 2, p. 187, doi. 10.1007/s10676-007-9143-5
- Article
33
- Journal of World Intellectual Property, 2011, v. 14, n. 2, p. 133, doi. 10.1111/j.1747-1796.2010.00412.x
- Article
34
- NETNOMICS: Economic Research & Electronic Networking, 2018, v. 19, n. 1/2, p. 43, doi. 10.1007/s11066-018-9126-1
- Asongu, Simplice;
- Meniago, Christelle
- Article
35
- Behaviour & Information Technology, 2010, v. 29, n. 3, p. 277, doi. 10.1080/01449290902765076
- Konstantakis, NikosI.;
- Palaigeorgiou, GeorgeE.;
- Siozos, PanosD.;
- Tsoukalas, IoannisA.
- Article
36
- International Journal of Communication (19328036), 2015, v. 9, p. 798
- REUNANEN, MARKKU;
- WASIAK, PATRYK;
- BOTZ, DANIEL
- Article
37
- International Journal of Communication (19328036), 2012, v. 6, p. 643
- Article
38
- Social Behavior & Personality: an international journal, 2008, v. 36, n. 1, p. 1, doi. 10.2224/sbp.2008.36.1.1
- Article
39
- Journal of Technology Transfer, 2009, v. 34, n. 6, p. 637, doi. 10.1007/s10961-009-9119-1
- Goel, Rajeev K.;
- Nelson, Michael A.
- Article
40
- Journal of Electronic Testing, 2011, v. 27, n. 6, p. 767, doi. 10.1007/s10836-011-5255-2
- Chakraborty, Rajat;
- Bhunia, Swarup
- Article
41
- MIS Quarterly, 2006, v. 30, n. 1, p. 167, doi. 10.2307/25148722
- Moores, Trevor T.;
- Chang, Jerry Cha-Jan
- Article
42
- MIS Quarterly, 1990, v. 14, n. 2, p. 143, doi. 10.2307/248772
- Straub Jr., Detmar W.;
- Collins, Rosann Webb
- Article
43
- Journal of Management Information Systems, 2018, v. 35, n. 3, p. 934, doi. 10.1080/07421222.2018.1481670
- Hashim, Matthew J.;
- Kannan, Karthik N.;
- Wegener, Duane T.
- Article
44
- Journal of Management Information Systems, 2003, v. 20, n. 1, p. 153, doi. 10.1080/07421222.2003.11045759
- Peace, A. Graham;
- Galletta, Dennis F.;
- Thong, James Y. L.
- Article
45
- Journal of Engineering Science & Technology Review, 2018, v. 11, n. 4, p. 48, doi. 10.25103/jestr.114.06
- Adekitan, Aderibigbe Israel;
- Orimogunje, Abidemi
- Article
46
- Journal of Organizational Computing & Electronic Commerce, 2005, v. 15, n. 3, p. 223, doi. 10.1207/s15327744joce1503_3
- Mishra, Birendra K.;
- Raghu, T. S.;
- Prasad, Ashutosh
- Article
47
- Information Security Journal: A Global Perspective, 2014, v. 23, n. 3, p. 68, doi. 10.1080/19393555.2014.975557
- Rana, Hardikkumar;
- Stamp, Mark
- Article
48
- Information Security Journal: A Global Perspective, 2013, v. 22, n. 3, p. 140, doi. 10.1080/19393555.2013.787474
- Kazi, Shabana;
- Stamp, Mark
- Article
49
- Social Semiotics, 2006, v. 16, n. 1, p. 57, doi. 10.1080/10350330500487786
- Article
50
- Journal of Marketing Management, 2014, v. 30, n. 9-10, p. 857, doi. 10.1080/0267257X.2014.927900
- Abdelhadi, Amal;
- Foster, Carley;
- Whysall, Paul
- Article