Works matching DE "SOFTWARE piracy"
1
- Jurist-Diction, 2024, v. 7, n. 4, p. 699, doi. 10.20473/jd.v7i4.64465
- Article
2
- Journal of Artificial Societies & Social Simulation, 2008, v. 11, n. 4, p. 1
- Ozertan, Gokhan;
- Cevik, Baris
- Article
3
- Journal of World Intellectual Property, 2011, v. 14, n. 2, p. 133, doi. 10.1111/j.1747-1796.2010.00412.x
- Article
4
- Mathematical Structures in Computer Science, 2019, v. 29, n. 2, p. 339, doi. 10.1017/S0960129518000038
- DALLA PREDA, MILA;
- PASQUA, MICHELE
- Article
5
- CyberPsychology & Behavior, 2008, v. 11, n. 4, p. 391, doi. 10.1089/cpb.2007.0048
- Article
6
- Information Systems Frontiers, 2012, v. 14, n. 2, p. 261, doi. 10.1007/s10796-010-9236-2
- Kartas, Anastasiou;
- Goode, Sigi
- Article
7
- Journalism Educator, 1992, v. 47, n. 2, p. 98, doi. 10.1177/107769589204700214
- Article
8
- Computer Systems Science & Engineering, 2023, v. 46, n. 1, p. 3037, doi. 10.32604/csse.2023.033970
- Alrayes, Fatma S.;
- Alotaibi, Najm;
- Alzahrani, Jaber S.;
- Alazwari, Sana;
- Alhogail, Areej;
- Al-Sharafi, Ali M.;
- Othman, Mahmoud;
- Hamza, Manar Ahmed
- Article
9
- Marketing Science, 2008, v. 27, n. 4, p. 610, doi. 10.1287/mksc.1070.0313
- Article
10
- Journal of Information Systems & Operations Management, 2011, v. 5, n. 2, p. 161
- Article
11
- NETNOMICS: Economic Research & Electronic Networking, 2018, v. 19, n. 1/2, p. 43, doi. 10.1007/s11066-018-9126-1
- Asongu, Simplice;
- Meniago, Christelle
- Article
12
- Journal of Business Ethics, 2011, v. 100, n. 3, p. 405, doi. 10.1007/s10551-010-0687-7
- Article
13
- Journal of Business Ethics, 2011, v. 98, n. 4, p. 663, doi. 10.1007/s10551-010-0645-4
- Aleassa, Hassan;
- Pearson, John;
- McClurg, Scott
- Article
14
- Journal of Business Ethics, 2010, v. 94, n. 1, p. 23, doi. 10.1007/s10551-009-0247-1
- Article
15
- 2010
- Liao, Chechen;
- Lin, Hong-Nan;
- Liu, Yu-Ping
- Abstract
16
- Journal of Business Ethics, 2009, v. 90, n. 3, p. 361, doi. 10.1007/s10551-009-0046-8
- Chen, Mei-Fang;
- Pan, Ching-Ti;
- Pan, Ming-Chuan
- Article
17
- Journal of Business Ethics, 2009, v. 87, n. 2, p. 269, doi. 10.1007/s10551-008-9884-z
- Yang, Deli;
- Sonmez, Mahmut;
- Bosworth, Derek;
- Fryxell, Gerald
- Article
18
- Journal of Business Ethics, 2008, v. 83, n. 3, p. 515, doi. 10.1007/s10551-007-9636-5
- Zamoon, Shariffah;
- Curley, Shawn
- Article
19
- Journal of Business Ethics, 2008, v. 81, n. 4, p. 715, doi. 10.1007/s10551-007-9543-9
- Hsu, Jane;
- Shiue, Charlene
- Article
20
- Journal of Business Ethics, 2008, v. 81, n. 3, p. 635, doi. 10.1007/s10551-007-9537-7
- Bhal, Kanika;
- Leekha, Nivedita
- Article
21
- Journal of Business Ethics, 2008, v. 81, n. 1, p. 39, doi. 10.1007/s10551-007-9479-0
- Article
22
- Journal of Business Ethics, 2008, v. 78, n. 4, p. 623, doi. 10.1007/s10551-007-9372-x
- Robertson, Christopher;
- Gilley, K.;
- Crittenden, William
- Article
23
- Journal of Business Ethics, 2008, v. 77, n. 4, p. 481, doi. 10.1007/s10551-007-9361-0
- Goles, Tim;
- Jayatilaka, Bandula;
- George, Beena;
- Parsons, Linda;
- Chambers, Valrie;
- Taylor, David;
- Brune, Rebecca
- Article
24
- Journal of Business Ethics, 2005, v. 56, n. 2, p. 149, doi. 10.1007/s10551-004-2170-9
- Jih-Hsin Tang;
- Cheng-Kiang Pam
- Article
25
- Journal of Business Ethics, 2004, v. 55, n. 3, p. 255, doi. 10.1007/s10551-004-0991-1
- Gupta, Pola B.;
- Gould, Stephen J.;
- Pola, Bharath
- Article
26
- Journal of Business Ethics, 2004, v. 55, n. 1, p. 61, doi. 10.1007/s10551-004-1779-z
- Suter, Tracy A.;
- Kopp, Steven W.;
- Hardesty, David M.
- Article
27
- Journal of Business Ethics, 2004, v. 54, n. 2, p. 121, doi. 10.1007/s10551-004-1571-0
- Freestone, O.;
- Mitchell, V. W.
- Article
28
- Journal of Internet Commerce, 2003, v. 2, n. 3, p. 3, doi. 10.1300/J179v02n03_02
- Article
29
- INFOtheca - Journal of Informatics & Librarianship, 2010, v. 11, n. 1, p. 39a
- Article
30
- History & Technology, 2019, v. 35, n. 2, p. 177, doi. 10.1080/07341512.2019.1652432
- Article
31
- Journal of Economics, 2008, v. 95, n. 1, p. 25, doi. 10.1007/s00712-008-0019-x
- Chang, Ming;
- Lin, Chiu;
- Wu, Dachrahn
- Article
32
- Social Science Computer Review, 2007, v. 25, n. 3, p. 339, doi. 10.1177/0894439307299934
- Higgis, George E.;
- Fell, Brian D.;
- Wilson, Abby L.
- Article
33
- Journal of Contemporary Criminal Justice, 2001, v. 17, n. 4, p. 369, doi. 10.1177/1043986201017004006
- Article
34
- ComputerWorld Hong Kong, 2010, v. 26, n. 4, p. 20
- Article
35
- ComputerWorld Hong Kong, 2009, v. 26, n. 7, p. 29
- Article
37
- ComputerWorld Hong Kong, 2008, v. 25, n. 10, p. 22
- Article
38
- ComputerWorld Hong Kong, 2008, v. 25, n. 6, p. 46
- Article
39
- ComputerWorld Hong Kong, 2008, v. 25, n. 5, p. 6
- Article
40
- International Journal of Communication (19328036), 2015, v. 9, p. 798
- REUNANEN, MARKKU;
- WASIAK, PATRYK;
- BOTZ, DANIEL
- Article
41
- International Journal of Communication (19328036), 2012, v. 6, p. 643
- Article
42
- Berkeley Technology Law Journal, 2006, v. 21, n. 4, p. 1421
- Article
43
- Review of Law & Economics, 2017, v. 13, n. 2, p. -1, doi. 10.1515/rle-2013-0005
- Article
44
- Review of Law & Economics, 2012, v. 8, n. 2, p. 433, doi. 10.1515/1555-5879.1527
- El Harbi, Sana;
- Grolleau, Gilles;
- Bekir, Insaf
- Article
45
- Nature, 1996, v. 383, n. 6595, p. 4, doi. 10.1038/383004a0
- Article
46
- African Development Review / Revue Africaine de Développement, 2014, v. 26, n. 4, p. 572, doi. 10.1111/1467-8268.12113
- Article
47
- Journal of Promotion Management, 2002, v. 9, n. 1/2, p. 199
- Thompson, George Benjamin;
- Hamilton, Lynda S.
- Article
48
- Journal of Promotion Management, 2002, v. 9, n. 1/2, p. 181
- Neese, William T.;
- McManis, Charles R.
- Article
49
- Information Security Journal: A Global Perspective, 2014, v. 23, n. 3, p. 68, doi. 10.1080/19393555.2014.975557
- Rana, Hardikkumar;
- Stamp, Mark
- Article
50
- Information Security Journal: A Global Perspective, 2013, v. 22, n. 3, p. 140, doi. 10.1080/19393555.2013.787474
- Kazi, Shabana;
- Stamp, Mark
- Article