IDEAS home Printed from https://ideas.repec.org/a/kap/jbuset/v83y2008i3p515-533.html
   My bibliography  Save this article

Ripped from the Headlines: What can the Popular Press Teach us about Software Piracy?

Author

Listed:
  • Shariffah Zamoon
  • Shawn Curley

Abstract

No abstract is available for this item.

Suggested Citation

  • Shariffah Zamoon & Shawn Curley, 2008. "Ripped from the Headlines: What can the Popular Press Teach us about Software Piracy?," Journal of Business Ethics, Springer, vol. 83(3), pages 515-533, December.
  • Handle: RePEc:kap:jbuset:v:83:y:2008:i:3:p:515-533
    DOI: 10.1007/s10551-007-9636-5
    as

    Download full text from publisher

    File URL: http://hdl.handle.net/10.1007/s10551-007-9636-5
    Download Restriction: Access to full text is restricted to subscribers.

    File URL: https://libkey.io/10.1007/s10551-007-9636-5?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. Takeyama, Lisa N, 1994. "The Welfare Implications of Unauthorized Reproduction of Intellectual Property in the Presence of Demand Network Externalities," Journal of Industrial Economics, Wiley Blackwell, vol. 42(2), pages 155-166, June.
    2. Susan J. Harrington, 1989. "Why People Copy Software and Create Computer Viruses," Information Resources Management Journal (IRMJ), IGI Global, vol. 2(3), pages 28-38, July.
    3. Sigi Goode & Sam Cruise, 2006. "What Motivates Software Crackers?," Journal of Business Ethics, Springer, vol. 65(2), pages 173-201, May.
    4. Joshua Slive & Dan Bernhardt, 1998. "Pirated for Profit," Canadian Journal of Economics, Canadian Economics Association, vol. 31(4), pages 886-899, November.
    5. Arun Sundararajan, 2003. "Managing Digital Piracy: Pricing, Protection and Welfare," Law and Economics 0307001, University Library of Munich, Germany.
    6. Bryan W Husted & Janelle Brinker Dozier & J Timothy McMahon & Michael W Kattan, 1996. "The Impact of Cross-National Carriers of Business Ethics on Attitudes about Questionable Practices and Form of Moral Reasoning," Journal of International Business Studies, Palgrave Macmillan;Academy of International Business, vol. 27(2), pages 391-411, June.
    7. Arun Sundararajan, 2004. "Managing Digital Piracy: Pricing and Protection," Information Systems Research, INFORMS, vol. 15(3), pages 287-308, September.
    8. -, 1986. "Agenda = Agenda," Series Históricas 8749, Naciones Unidas Comisión Económica para América Latina y el Caribe (CEPAL).
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Luis Aguiar & Jörg Claussen & Christian Peukert, 2018. "Catch Me If You Can: Effectiveness and Consequences of Online Copyright Enforcement," Information Systems Research, INFORMS, vol. 29(3), pages 656-678, September.
    2. Ivan Bozhikin & Nikolay Dentchev, 2018. "Discovering a Wilderness of Regulatory Mechanisms for Corporate Social Responsibility: Literature Review," Economic Alternatives, University of National and World Economy, Sofia, Bulgaria, issue 2, pages 145-174, June.
    3. Martin Eisend, 2019. "Morality Effects and Consumer Responses to Counterfeit and Pirated Products: A Meta-analysis," Journal of Business Ethics, Springer, vol. 154(2), pages 301-323, January.
    4. Steven James Watson & Daniel John Zizzo & Piers Fleming, 2015. "Determinants of Unlawful File Sharing: A Scoping Review," PLOS ONE, Public Library of Science, vol. 10(6), pages 1-23, June.
    5. Mateja Kos Koklic & Monika Kukar-Kinney & Irena Vida, 2016. "Three-Level Mechanism of Consumer Digital Piracy: Development and Cross-Cultural Validation," Journal of Business Ethics, Springer, vol. 134(1), pages 15-27, March.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. T. S. Raghu & Rajiv Sinha & Ajay Vinze & Orneita Burton, 2009. "Willingness to Pay in an Open Source Software Environment," Information Systems Research, INFORMS, vol. 20(2), pages 218-236, June.
    2. Terrence August & Tunay I. Tunca, 2008. "Let the Pirates Patch? An Economic Analysis of Software Security Patch Restrictions," Information Systems Research, INFORMS, vol. 19(1), pages 48-70, March.
    3. Peitz, Martin & Waelbroeck, Patrick, 2006. "Piracy of digital products: A critical review of the theoretical literature," Information Economics and Policy, Elsevier, vol. 18(4), pages 449-476, November.
    4. Tunay I. Tunca & Qiong Wu, 2013. "Fighting Fire with Fire: Commercial Piracy and the Role of File Sharing on Copyright Protection Policy for Digital Goods," Information Systems Research, INFORMS, vol. 24(2), pages 436-453, June.
    5. Sanjay Jain, 2008. "Digital Piracy: A Competitive Analysis," Marketing Science, INFORMS, vol. 27(4), pages 610-626, 07-08.
    6. Shin-yi Wu & Pei-yu Chen, 2008. "Versioning and Piracy Control for Digital Information Goods," Operations Research, INFORMS, vol. 56(1), pages 157-172, February.
    7. Ram D. Gopal & Alok Gupta, 2010. "Trading Higher Software Piracy for Higher Profits: The Case of Phantom Piracy," Management Science, INFORMS, vol. 56(11), pages 1946-1962, November.
    8. Ramnath K. Chellappa & Shivendu Shivendu, 2005. "Managing Piracy: Pricing and Sampling Strategies for Digital Experience Goods in Vertically Segmented Markets," Information Systems Research, INFORMS, vol. 16(4), pages 400-417, December.
    9. Gil Ricard, 2006. "The Economics of IPR Protection Policies," Review of Network Economics, De Gruyter, vol. 5(3), pages 1-21, September.
    10. Anindya Ghose & Arun Sundararajan, 2005. "Versioning and Quality Distortion in Software? Evidence from E-Commerce Panel Data," Working Papers 05-14, NET Institute, revised Oct 2005.
    11. Jin-Hyuk Kim & Tin Cheuk Leung, 2013. "Quantifying the Impacts of Digital Rights Management and E-Book Pricing on the E-Book Reader Market," Working Papers 13-03, NET Institute.
    12. Sougata Poddar & Yuanzhu Lu, 2017. "Impact of Network Externality on End-User Piracy: Revisited," Economics Bulletin, AccessEcon, vol. 37(3), pages 1457-1467.
    13. Ünlü, Vural & Hess, Thomas, 2003. "The optimal level of technical copyright protection: A game-theoretic approach," Working Papers 9/2003, University of Munich, Munich School of Management, Institute for Information Systems and New Media.
    14. Nie, Jiajia & Zhong, Ling & Li, Gendao & Cao, Kuo, 2022. "Piracy as an entry deterrence strategy in software market," European Journal of Operational Research, Elsevier, vol. 298(2), pages 560-572.
    15. Rasch, Alexander & Wenzel, Tobias, 2013. "Piracy in a two-sided software market," Journal of Economic Behavior & Organization, Elsevier, vol. 88(C), pages 78-89.
    16. Yuanzhu Lu & Sougata Poddar, 2012. "Does Reliable Pirated Product Lead to More Piracy?," Working Papers 2012-05, Auckland University of Technology, Department of Economics.
    17. Herings, P. Jean-Jacques & Peeters, Ronald & Yang, Michael S., 2018. "Piracy on the Internet: Accommodate it or fight it? A dynamic approach," European Journal of Operational Research, Elsevier, vol. 266(1), pages 328-339.
    18. Kresimir Zigic & Jiri Strelicky & Michael Kunin, 2013. "The Interaction between Private and Public IPR Protection in a Software Market: A Positive and Normative Analysis," CERGE-EI Working Papers wp490, The Center for Economic Research and Graduate Education - Economics Institute, Prague.
    19. Dirk Bergemann & Thomas Eisenbach & Joan Feigenbaum & Scott Shenker, 2011. "Pricing under the Threat of Piracy: Flexibility and Platforms for Digital Goods," Cowles Foundation Discussion Papers 1834, Cowles Foundation for Research in Economics, Yale University.
    20. Shivendu Shivendu & Zhe (James) Zhang, 2015. "Versioning in the Software Industry: Heterogeneous Disutility from Underprovisioning of Functionality," Information Systems Research, INFORMS, vol. 26(4), pages 731-753, December.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:kap:jbuset:v:83:y:2008:i:3:p:515-533. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Sonal Shukla or Springer Nature Abstracting and Indexing (email available below). General contact details of provider: http://www.springer.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.