IDEAS home Printed from https://ideas.repec.org/a/kap/jbuset/v83y2008i3p515-533.html
   My bibliography  Save this article

Ripped from the Headlines: What can the Popular Press Teach us about Software Piracy?

Author

Listed:
  • Shariffah Zamoon
  • Shawn Curley

Abstract

No abstract is available for this item.

Suggested Citation

  • Shariffah Zamoon & Shawn Curley, 2008. "Ripped from the Headlines: What can the Popular Press Teach us about Software Piracy?," Journal of Business Ethics, Springer, vol. 83(3), pages 515-533, December.
  • Handle: RePEc:kap:jbuset:v:83:y:2008:i:3:p:515-533
    DOI: 10.1007/s10551-007-9636-5
    as

    Download full text from publisher

    File URL: http://hdl.handle.net/10.1007/s10551-007-9636-5
    Download Restriction: Access to full text is restricted to subscribers.

    File URL: https://libkey.io/10.1007/s10551-007-9636-5?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. Susan J. Harrington, 1989. "Why People Copy Software and Create Computer Viruses," Information Resources Management Journal (IRMJ), IGI Global, vol. 2(3), pages 28-38, July.
    2. Sigi Goode & Sam Cruise, 2006. "What Motivates Software Crackers?," Journal of Business Ethics, Springer, vol. 65(2), pages 173-201, May.
    3. Joshua Slive & Dan Bernhardt, 1998. "Pirated for Profit," Canadian Journal of Economics, Canadian Economics Association, vol. 31(4), pages 886-899, November.
    4. Arun Sundararajan, 2003. "Managing Digital Piracy: Pricing, Protection and Welfare," Law and Economics 0307001, University Library of Munich, Germany.
    5. Bryan W Husted & Janelle Brinker Dozier & J Timothy McMahon & Michael W Kattan, 1996. "The Impact of Cross-National Carriers of Business Ethics on Attitudes about Questionable Practices and Form of Moral Reasoning," Journal of International Business Studies, Palgrave Macmillan;Academy of International Business, vol. 27(2), pages 391-411, June.
    6. Arun Sundararajan, 2004. "Managing Digital Piracy: Pricing and Protection," Information Systems Research, INFORMS, vol. 15(3), pages 287-308, September.
    7. -, 1986. "Agenda = Agenda," Series Históricas 8749, Naciones Unidas Comisión Económica para América Latina y el Caribe (CEPAL).
    8. Takeyama, Lisa N, 1994. "The Welfare Implications of Unauthorized Reproduction of Intellectual Property in the Presence of Demand Network Externalities," Journal of Industrial Economics, Wiley Blackwell, vol. 42(2), pages 155-166, June.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Luis Aguiar & Jörg Claussen & Christian Peukert, 2018. "Catch Me If You Can: Effectiveness and Consequences of Online Copyright Enforcement," Information Systems Research, INFORMS, vol. 29(3), pages 656-678, September.
    2. Ivan Bozhikin & Nikolay Dentchev, 2018. "Discovering a Wilderness of Regulatory Mechanisms for Corporate Social Responsibility: Literature Review," Economic Alternatives, University of National and World Economy, Sofia, Bulgaria, issue 2, pages 145-174, June.
    3. Mateja Kos Koklic & Monika Kukar-Kinney & Irena Vida, 2016. "Three-Level Mechanism of Consumer Digital Piracy: Development and Cross-Cultural Validation," Journal of Business Ethics, Springer, vol. 134(1), pages 15-27, March.
    4. Martin Eisend, 2019. "Morality Effects and Consumer Responses to Counterfeit and Pirated Products: A Meta-analysis," Journal of Business Ethics, Springer, vol. 154(2), pages 301-323, January.
    5. Steven James Watson & Daniel John Zizzo & Piers Fleming, 2015. "Determinants of Unlawful File Sharing: A Scoping Review," PLOS ONE, Public Library of Science, vol. 10(6), pages 1-23, June.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. T. S. Raghu & Rajiv Sinha & Ajay Vinze & Orneita Burton, 2009. "Willingness to Pay in an Open Source Software Environment," Information Systems Research, INFORMS, vol. 20(2), pages 218-236, June.
    2. Terrence August & Tunay I. Tunca, 2008. "Let the Pirates Patch? An Economic Analysis of Software Security Patch Restrictions," Information Systems Research, INFORMS, vol. 19(1), pages 48-70, March.
    3. Peitz, Martin & Waelbroeck, Patrick, 2006. "Piracy of digital products: A critical review of the theoretical literature," Information Economics and Policy, Elsevier, vol. 18(4), pages 449-476, November.
    4. Sanjay Jain, 2008. "Digital Piracy: A Competitive Analysis," Marketing Science, INFORMS, vol. 27(4), pages 610-626, 07-08.
    5. Shin-yi Wu & Pei-yu Chen, 2008. "Versioning and Piracy Control for Digital Information Goods," Operations Research, INFORMS, vol. 56(1), pages 157-172, February.
    6. Ram D. Gopal & Alok Gupta, 2010. "Trading Higher Software Piracy for Higher Profits: The Case of Phantom Piracy," Management Science, INFORMS, vol. 56(11), pages 1946-1962, November.
    7. Tunay I. Tunca & Qiong Wu, 2013. "Fighting Fire with Fire: Commercial Piracy and the Role of File Sharing on Copyright Protection Policy for Digital Goods," Information Systems Research, INFORMS, vol. 24(2), pages 436-453, June.
    8. Ramnath K. Chellappa & Shivendu Shivendu, 2005. "Managing Piracy: Pricing and Sampling Strategies for Digital Experience Goods in Vertically Segmented Markets," Information Systems Research, INFORMS, vol. 16(4), pages 400-417, December.
    9. Gil Ricard, 2006. "The Economics of IPR Protection Policies," Review of Network Economics, De Gruyter, vol. 5(3), pages 1-21, September.
    10. Anindya Ghose & Arun Sundararajan, 2005. "Versioning and Quality Distortion in Software? Evidence from E-Commerce Panel Data," Working Papers 05-14, NET Institute, revised Oct 2005.
    11. Jin-Hyuk Kim & Tin Cheuk Leung, 2013. "Quantifying the Impacts of Digital Rights Management and E-Book Pricing on the E-Book Reader Market," Working Papers 13-03, NET Institute.
    12. Ünlü, Vural & Hess, Thomas, 2003. "The optimal level of technical copyright protection: A game-theoretic approach," Working Papers 9/2003, University of Munich, Munich School of Management, Institute for Information Systems and New Media.
    13. Kresimir Zigic & Jiri Strelicky & Michael Kunin, 2013. "The Interaction between Private and Public IPR Protection in a Software Market: A Positive and Normative Analysis," CERGE-EI Working Papers wp490, The Center for Economic Research and Graduate Education - Economics Institute, Prague.
    14. Shivendu Shivendu & Zhe (James) Zhang, 2015. "Versioning in the Software Industry: Heterogeneous Disutility from Underprovisioning of Functionality," Information Systems Research, INFORMS, vol. 26(4), pages 731-753, December.
    15. Sougata Poddar, 2002. "Network Externality and Software Piracy," WIDER Working Paper Series DP2002-115, World Institute for Development Economic Research (UNU-WIDER).
    16. Jin-Hyuk Kim, 2008. "Digital Rights Management and Technological Tying," Working Papers 08-05, NET Institute, revised Sep 2008.
    17. Jonas Häckner & Astri Muren, 2015. "Counterfeiting and Negative Consumption Externalities – A Closer Look," Journal of Industry, Competition and Trade, Springer, vol. 15(4), pages 337-350, December.
    18. Rick Harbaugh & Rahul Khemka, 2010. "Does Copyright Enforcement Encourage Piracy?," Journal of Industrial Economics, Wiley Blackwell, vol. 58(2), pages 306-323, June.
    19. Timothy Cronan & Sulaiman Al-Rafee, 2008. "Factors that Influence the Intention to Pirate Software and Media," Journal of Business Ethics, Springer, vol. 78(4), pages 527-545, April.
    20. Martyna Kobus & Michał Krawczyk, 2013. "Piracy as an ethical decision," Working Papers 2013-22, Faculty of Economic Sciences, University of Warsaw.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:kap:jbuset:v:83:y:2008:i:3:p:515-533. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Sonal Shukla or Springer Nature Abstracting and Indexing (email available below). General contact details of provider: http://www.springer.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.