Works matching DE "SOFTWARE piracy"
1
- Journal of Technology Transfer, 2009, v. 34, n. 6, p. 637, doi. 10.1007/s10961-009-9119-1
- Goel, Rajeev K.;
- Nelson, Michael A.
- Article
2
- Journal of Education for Business, 2007, v. 83, n. 2, p. 87, doi. 10.3200/JOEB.83.2.87-94
- Rawlinson, David R.;
- Lupton, Robert A.
- Article
3
- Social Science Computer Review, 2007, v. 25, n. 3, p. 339, doi. 10.1177/0894439307299934
- Higgis, George E.;
- Fell, Brian D.;
- Wilson, Abby L.
- Article
4
- International Arab Journal of Information Technology (IAJIT), 2015, v. 12, n. 3, p. 286
- Khan, Muhammad;
- Akram, Muhammad;
- Riaz, Naveed
- Article
5
- Social Behavior & Personality: an international journal, 2008, v. 36, n. 1, p. 1, doi. 10.2224/sbp.2008.36.1.1
- Article
6
- Berkeley Technology Law Journal, 2006, v. 21, n. 4, p. 1421
- Article
7
- Software & Systems Modeling, 2018, v. 17, n. 4, p. 1287, doi. 10.1007/s10270-016-0557-6
- Alalfi, Manar H.;
- Antony, Elizabeth P.;
- Cordy, James R.
- Article
8
- Nature, 2006, v. 441, n. 7093, p. 573, doi. 10.1038/441573a
- Article
9
- Cogent Engineering, 2017, v. 4, n. 1, p. 1, doi. 10.1080/23311916.2016.1243023
- Article
10
- Journal of World Intellectual Property, 2011, v. 14, n. 2, p. 133, doi. 10.1111/j.1747-1796.2010.00412.x
- Article
11
- Journal of Business Ethics, 2011, v. 100, n. 3, p. 405, doi. 10.1007/s10551-010-0687-7
- Article
12
- Journal of Business Ethics, 2011, v. 98, n. 4, p. 663, doi. 10.1007/s10551-010-0645-4
- Aleassa, Hassan;
- Pearson, John;
- McClurg, Scott
- Article
13
- Journal of Business Ethics, 2010, v. 94, n. 1, p. 23, doi. 10.1007/s10551-009-0247-1
- Article
14
- 2010
- Liao, Chechen;
- Lin, Hong-Nan;
- Liu, Yu-Ping
- Abstract
15
- Journal of Business Ethics, 2009, v. 90, n. 3, p. 361, doi. 10.1007/s10551-009-0046-8
- Chen, Mei-Fang;
- Pan, Ching-Ti;
- Pan, Ming-Chuan
- Article
16
- Journal of Business Ethics, 2009, v. 87, n. 2, p. 269, doi. 10.1007/s10551-008-9884-z
- Yang, Deli;
- Sonmez, Mahmut;
- Bosworth, Derek;
- Fryxell, Gerald
- Article
17
- Journal of Business Ethics, 2008, v. 83, n. 3, p. 515, doi. 10.1007/s10551-007-9636-5
- Zamoon, Shariffah;
- Curley, Shawn
- Article
18
- Journal of Business Ethics, 2008, v. 81, n. 4, p. 715, doi. 10.1007/s10551-007-9543-9
- Hsu, Jane;
- Shiue, Charlene
- Article
19
- Journal of Business Ethics, 2008, v. 81, n. 3, p. 635, doi. 10.1007/s10551-007-9537-7
- Bhal, Kanika;
- Leekha, Nivedita
- Article
20
- Journal of Business Ethics, 2008, v. 81, n. 1, p. 39, doi. 10.1007/s10551-007-9479-0
- Article
21
- Journal of Business Ethics, 2008, v. 78, n. 4, p. 623, doi. 10.1007/s10551-007-9372-x
- Robertson, Christopher;
- Gilley, K.;
- Crittenden, William
- Article
22
- Journal of Business Ethics, 2008, v. 77, n. 4, p. 481, doi. 10.1007/s10551-007-9361-0
- Goles, Tim;
- Jayatilaka, Bandula;
- George, Beena;
- Parsons, Linda;
- Chambers, Valrie;
- Taylor, David;
- Brune, Rebecca
- Article
23
- Journal of Business Ethics, 2006, v. 63, n. 3, p. 237, doi. 10.1007/s10551-005-1902-9
- Al-Rafee, Sulaiman;
- Cronan, Timothy
- Article
24
- Journal of Business Ethics, 2005, v. 56, n. 2, p. 149, doi. 10.1007/s10551-004-2170-9
- Jih-Hsin Tang;
- Cheng-Kiang Pam
- Article
25
- Journal of Business Ethics, 2004, v. 55, n. 3, p. 255, doi. 10.1007/s10551-004-0991-1
- Gupta, Pola B.;
- Gould, Stephen J.;
- Pola, Bharath
- Article
26
- Journal of Business Ethics, 2004, v. 55, n. 1, p. 61, doi. 10.1007/s10551-004-1779-z
- Suter, Tracy A.;
- Kopp, Steven W.;
- Hardesty, David M.
- Article
27
- Journal of Business Ethics, 2004, v. 54, n. 2, p. 121, doi. 10.1007/s10551-004-1571-0
- Freestone, O.;
- Mitchell, V. W.
- Article
28
- International Journal of Cyber Criminology, 2013, v. 7, n. 1, p. 62
- Article
29
- International Journal of Cyber Criminology, 2009, v. 3, n. 2, p. 550
- Baggili, Ibrahim;
- Rogers, Marcus
- Article
30
- Issues in Informing Science & Information Technology, 2010, v. 7, p. 321, doi. 10.28945/1209
- Article
31
- Social Studies, 2003, v. 94, n. 4, p. 188, doi. 10.1080/00377990309600204
- Article
32
- DOMES: Digest of Middle East Studies, 2006, v. 15, n. 2, p. 1, doi. 10.1111/j.1949-3606.2006.tb00025.x
- Article
33
- Review of Economics & Statistics, 2013, v. 95, n. 3, p. 1018, doi. 10.1162/REST_a_00290
- Article
34
- Journal of Electronic Testing, 2011, v. 27, n. 6, p. 767, doi. 10.1007/s10836-011-5255-2
- Chakraborty, Rajat;
- Bhunia, Swarup
- Article
35
- Journal of Management Information Systems, 2018, v. 35, n. 3, p. 934, doi. 10.1080/07421222.2018.1481670
- Hashim, Matthew J.;
- Kannan, Karthik N.;
- Wegener, Duane T.
- Article
36
- Journal of Business Ethics, 2016, v. 134, n. 1, p. 15, doi. 10.1007/s10551-014-2075-1
- Kos Koklic, Mateja;
- Kukar-Kinney, Monika;
- Vida, Irena
- Article
37
- Journal of Business Ethics, 2014, v. 123, n. 3, p. 385, doi. 10.1007/s10551-013-1846-4
- Arli, Denni;
- Tjiptono, Fandy
- Article
38
- Journal of Business Ethics, 2013, v. 118, n. 1, p. 45, doi. 10.1007/s10551-012-1552-7
- Article
39
- African Journal of Business Ethics, 2012, v. 6, n. 1, p. 1, doi. 10.4103/1817-7417.104697
- Thatcher, Andrew;
- Matthews, Mary
- Article
40
- Deviant Behavior, 2015, v. 36, n. 9, p. 705, doi. 10.1080/01639625.2014.977111
- Kim, Jung Eun;
- Kim, Jinhee
- Article
41
- Deviant Behavior, 2005, v. 26, n. 1, p. 1, doi. 10.1080/01639620490497947
- Article
42
- Behaviour & Information Technology, 2010, v. 29, n. 3, p. 277, doi. 10.1080/01449290902765076
- Konstantakis, NikosI.;
- Palaigeorgiou, GeorgeE.;
- Siozos, PanosD.;
- Tsoukalas, IoannisA.
- Article
43
- Journal of Contemporary Criminal Justice, 2001, v. 17, n. 4, p. 369, doi. 10.1177/1043986201017004006
- Article
44
- ComputerWorld Hong Kong, 2010, v. 26, n. 4, p. 20
- Article
45
- ComputerWorld Hong Kong, 2009, v. 26, n. 7, p. 29
- Article
47
- ComputerWorld Hong Kong, 2008, v. 25, n. 10, p. 22
- Article
48
- ComputerWorld Hong Kong, 2008, v. 25, n. 6, p. 46
- Article
49
- ComputerWorld Hong Kong, 2008, v. 25, n. 5, p. 6
- Article
50
- Brooklyn Journal of International Law, 2012, v. 37, n. 2, p. 623
- Article