Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
17 | Mauro Barni, Franco Bartolini |
Data hiding for fighting piracy. |
IEEE Signal Process. Mag. |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Mark Van Hoorebeek |
Health and safety and piracy: legal risk minimisation in libraries. |
Electron. Libr. |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Joseph Nyiri |
The effects of piracy in a university setting. |
ACM Crossroads |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Ginger Myles |
Using software watermarking to discourage piracy. |
ACM Crossroads |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Louis Jezsik |
Why are you stealing that software: piracy in South East Asia. |
Ubiquity |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Eric S. Kyper, Rodrigo J. Lievano, Paul Mangiameli, SeungJae Shin |
Software piracy: A time-series Analysis. |
AMCIS |
2004 |
DBLP BibTeX RDF |
|
17 | Neil Morton |
Understanding Attitudes toward Online Music Piracy. |
AMCIS |
2004 |
DBLP BibTeX RDF |
|
17 | Vi Lam, Jerome Moscicki |
Rethinking digital piracy. |
ICWI |
2004 |
DBLP BibTeX RDF |
|
17 | Alvin Stauber |
The New Vigilantism: Combating the Piracy of Copyrighted Materials on Peer-To-Peer Networks. |
ICEB |
2004 |
DBLP BibTeX RDF |
|
17 | Marc Fetscherin, Sabrina Zaugg |
Music Piracy on Peer-to-Peer Networks. |
EEE |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Alok Gupta, Ramnath K. Chellappa |
Ethical, Legal and Economic Issues in the Digital Economy: Intellectual Property Rights, Piracy, Trust, Security and Privacy: Minitrack Introduction. |
HICSS |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Ranjan B. Kini, H. V. Ramakrishna, B. S. Vijayaraman |
An exploratory study of moral intensity regarding software piracy of students in Thailand. |
Behav. Inf. Technol. |
2003 |
DBLP DOI BibTeX RDF |
|
17 | Gleb Naumovich, Nasir D. Memon |
Preventing Piracy, Reverse Engineering, and Tampering. |
Computer |
2003 |
DBLP DOI BibTeX RDF |
|
17 | Linda Dailey Paulson |
News Briefs Topics include: Nanotech RAM Holds Promise for Universal Memory / US Court Establishes Protection against Reverse Engineering / Using Web Crawlers to Fight Piracy. |
Computer |
2003 |
DBLP DOI BibTeX RDF |
|
17 | Trevor T. Moores |
The effect of national culture and economic wealth on global software piracy rates. |
Commun. ACM |
2003 |
DBLP DOI BibTeX RDF |
|
17 | Robert F. Easley, John G. Michel, Sarv Devaraj |
The MP3 open standard and the music industry's response to Internet piracy. |
Commun. ACM |
2003 |
DBLP DOI BibTeX RDF |
|
17 | Sudip Bhattacharjee, Ram D. Gopal, G. Lawrence Sanders |
Digital music and online sharing: software piracy 2.0? |
Commun. ACM |
2003 |
DBLP DOI BibTeX RDF |
|
17 | Stephen P. King, Ryan Lampe |
Network externalities, price discrimination and profitable piracy. |
Inf. Econ. Policy |
2003 |
DBLP DOI BibTeX RDF |
|
17 | E. Eugene Schultz |
Security views: Online piracy battle heats up in US. |
Comput. Secur. |
2003 |
DBLP DOI BibTeX RDF |
|
17 | A. Graham Peace, Dennis F. Galletta, James Y. L. Thong |
Software Piracy in the Workplace: A Model and Empirical Test. |
J. Manag. Inf. Syst. |
2003 |
DBLP DOI BibTeX RDF |
|
17 | Ramnath K. Chellappa, Shivendu Shivendu |
Economic Implications of Variable Technology Standards for Movie Piracy in a Global Context. |
J. Manag. Inf. Syst. |
2003 |
DBLP DOI BibTeX RDF |
|
17 | Terry Costlow |
In Brief - Piracy, Advertising Groups Target Spyware. |
IEEE Distributed Syst. Online |
2003 |
DBLP BibTeX RDF |
|
17 | Orneita Burton, T. S. Raghu 0001, Rajiv K. Sinha, Ajay S. Vinze |
Software Piracy: An Empirical Examination of the Impact of Network Externalities and Open Source Alternatives on Willingness to Pay. |
AMCIS |
2003 |
DBLP BibTeX RDF |
|
17 | Shin-yi Wu, Pei-Yu Sharon Chen, G. Anandalingam |
Fighting Information Good Piracy with Versioning. |
ICIS |
2003 |
DBLP BibTeX RDF |
|
17 | A. Graham Peace |
Software Piracy. |
Encyclopedia of Information Systems |
2002 |
DBLP DOI BibTeX RDF |
|
17 | Laurie E. MacDonald, Kenneth T. Fougere |
Software Piracy: A Study of the Extent of Coverage in Introductory MIS Textbooks. |
J. Inf. Syst. Educ. |
2002 |
DBLP BibTeX RDF |
|
17 | Xiaohua Zeng, Sang-Yong Tom Lee, Hock-Hai Teo |
Impact Of Online Renting On Software Piracy. |
ECIS |
2002 |
DBLP BibTeX RDF |
|
17 | H. V. Ramakrishna, Ranjan B. Kini, B. S. Vijayaraman |
Shaping of Moral Intensity regarding Software Piracy in University Students: Immediate Community Effects. |
J. Comput. Inf. Syst. |
2001 |
DBLP BibTeX RDF |
|
17 | Lynette Owen |
Piracy. |
Learn. Publ. |
2001 |
DBLP DOI BibTeX RDF |
|
17 | Frederick Gallegos |
Software Piracy: Some Facts, Figures, and Issues. |
Inf. Secur. J. A Glob. Perspect. |
2000 |
DBLP DOI BibTeX RDF |
|
17 | Md. Mahbubur Rahim, Mohd. Noah Abd. Rahman, Afzaal H. Seyal |
Software piracy among academics: an empirical study in Brunei Darussalam. |
Inf. Manag. Comput. Secur. |
2000 |
DBLP DOI BibTeX RDF |
|
17 | Diane Crawford |
Forum: Software piracy is not just economics anymore. |
Commun. ACM |
2000 |
DBLP DOI BibTeX RDF |
|
17 | Ram D. Gopal, G. Lawrence Sanders |
Global software piracy: you can't get blood out of a turnip. |
Commun. ACM |
2000 |
DBLP DOI BibTeX RDF |
|
17 | Trevor T. Moores, Gurpreet Dhillon |
Software piracy: a view from Hong Kong. |
Commun. ACM |
2000 |
DBLP DOI BibTeX RDF |
|
17 | Herman T. Tavani |
Defining the boundaries of computer crime: piracy, break-ins, and sabotage in cyberspace. |
SIGCAS Comput. Soc. |
2000 |
DBLP DOI BibTeX RDF |
|
17 | Jessica Litman |
Lunch speaker: Jessica Litman: The Demonization of Piracy. Location: Frontenac Ballroom. |
CFP |
2000 |
DBLP DOI BibTeX RDF |
|
17 | Susan J. Harrington |
Software piracy: are Robin Hood and responsibility denial at work? |
IRMA Conference |
2000 |
DBLP BibTeX RDF |
|
17 | Michael E. Whitman, Anthony M. Townsend, Robert J. Aalberts |
Cybersquatting: A Case of First Come/First Served or Piracy on the Cyber-Seas? |
Inf. Secur. J. A Glob. Perspect. |
1999 |
DBLP DOI BibTeX RDF |
|
17 | James Couser |
Software piracy and the Doris Day Syndrome: some legal, ethical and social implications of contemporary conceptions of property. |
Int. J. Law Inf. Technol. |
1999 |
DBLP DOI BibTeX RDF |
|
17 | Paul B. Schneck |
Persistent access control to prevent piracy of digital information. |
Proc. IEEE |
1999 |
DBLP DOI BibTeX RDF |
|
17 | Md. Mahbubur Rahim, Afzaal H. Seyal, Mohd. Noah Abd. Rahman |
Software piracy among computing students: a Bruneian scenario. |
Comput. Educ. |
1999 |
DBLP DOI BibTeX RDF |
|
17 | Moez Limayem, Mohamed Khalifa 0001, Wynne W. Chin |
Factors motivating software piracy: a longitudinal study. |
ICIS |
1999 |
DBLP BibTeX RDF |
|
17 | Darryl A. Seale, Michael Polakowski, Sherry Schneider |
It's not really theft!: Personal and workplace ethics that enable software piracy. |
Behav. Inf. Technol. |
1998 |
DBLP DOI BibTeX RDF |
|
17 | Ram D. Gopal, G. Lawrence Sanders |
International Software Piracy: Analysis of Key Issues and Impacts. |
Inf. Syst. Res. |
1998 |
DBLP DOI BibTeX RDF |
|
17 | Roger A. Coldwell |
Did Chuck Babbage Predict Software Piracy? |
Commun. ACM |
1998 |
DBLP DOI BibTeX RDF |
|
17 | Clifford M. Koen Jr., Jin H. Im |
Software piracy and its legal implications. |
Inf. Manag. |
1997 |
DBLP DOI BibTeX RDF |
|
17 | Karl Dakin |
Softlaw: What If There Were No Software Piracy? |
IEEE Softw. |
1997 |
DBLP DOI BibTeX RDF |
|
17 | Ram D. Gopal, G. Lawrence Sanders |
Preventive and Deterrent Controls for Software Piracy. |
J. Manag. Inf. Syst. |
1997 |
DBLP DOI BibTeX RDF |
|
17 | Philip A. Redding |
Report on the Protection Afforded Computer Software in the Face of Computer Software Piracy. |
J. Inf. Law Technol. |
1996 |
DBLP BibTeX RDF |
|
17 | A. Graham Peace, Dennis F. Galletta |
Developing a Predictive Model of Software Piracy Behavior: An Empirical Study. |
ICIS |
1996 |
DBLP BibTeX RDF |
|
17 | Gérard Gabella, Marie-Dominique Picasso |
PC software industry lost $8.08 billion to pirates in 1994 piracy rate in the US declines. |
Inf. Manag. |
1995 |
DBLP DOI BibTeX RDF |
|
17 | C. Ian Kyer |
Software piracy & corporate compliance. |
Comput. Law Secur. Rev. |
1994 |
DBLP DOI BibTeX RDF |
|
17 | Harold W. Thimbleby |
Controversy corner : An organizational solution to piracy and viruses. |
J. Syst. Softw. |
1994 |
DBLP DOI BibTeX RDF |
|
17 | Diana E. D'Angelo |
You don't have to look like a pirate to be one - the role of academic computing in software piracy deterrence. |
SIGUCCS |
1993 |
DBLP DOI BibTeX RDF |
|
17 | Jin H. Im, Pamela D. Van Epps |
Software piracy and software security measures in business schools. |
Inf. Manag. |
1992 |
DBLP DOI BibTeX RDF |
|
17 | Ram D. Gopal, G. Lawrence Sanders |
The Effect of Preventive and Deterrent Software Piracy Strategies on Producer Profits. |
ICIS |
1992 |
DBLP BibTeX RDF |
|
17 | David P. Lewis |
Application of anti-piracy provisions of the copyright act 1968. |
Comput. Law Secur. Rev. |
1991 |
DBLP DOI BibTeX RDF |
|
17 | Jin H. Im, Pamela D. Van Epps |
Software Piracy and Software Security in Business Schools: An Ethical Perspective. |
Data Base |
1991 |
DBLP DOI BibTeX RDF |
|
17 | Jin H. Im, Clifford M. Koen Jr. |
Software piracy and responsibilities of educational institutions. |
Inf. Manag. |
1990 |
DBLP DOI BibTeX RDF |
|
17 | Hans Gliss |
East Germany - haven for software piracy. |
Comput. Secur. |
1990 |
DBLP DOI BibTeX RDF |
|
17 | Eric Zabinski |
Supply, demand, and piracy. |
SIGCAS Comput. Soc. |
1990 |
DBLP DOI BibTeX RDF |
|
17 | Eli B. Cohen, Larry W. Cornwell |
College Students Believe Piracy is Acceptable. |
J. Inf. Syst. Educ. |
1989 |
DBLP BibTeX RDF |
|
17 | Mark B. Johnson |
Software piracy: stopping it before it stops you. |
SIGUCCS |
1988 |
DBLP DOI BibTeX RDF |
|
17 | Robert Hay |
Software piracy in the U.K. - A review. |
Comput. Law Secur. Rev. |
1986 |
DBLP DOI BibTeX RDF |
|
17 | Richard H. Stern |
Distinguishing Legitimate Reverse Engineering from Unlawful Chip Piracy under the Semiconductor Chip Protection Act. |
COMPCON |
1986 |
DBLP BibTeX RDF |
|
17 | Douglas J. Albert, Stephen P. Morse |
Combatting Software Piracy by Encryption and Key Management. |
Computer |
1984 |
DBLP DOI BibTeX RDF |
|
17 | Tim Maude, Derwent Maude |
Hardware Protection Against Software Piracy. |
Commun. ACM |
1984 |
DBLP DOI BibTeX RDF |
|
17 | Morrison Bump Jr. |
A primer on software piracy cases in the courts. |
Comput. Secur. |
1984 |
DBLP DOI BibTeX RDF |
|
17 | Peter S. Vogel |
"Software Piracy and protection". |
ACM Annual Conference |
1982 |
DBLP DOI BibTeX RDF |
|
17 | Calvin N. Mooers |
Preventing Software Piracy. |
Computer |
1977 |
DBLP DOI BibTeX RDF |
|
12 | Leah Hoffmann |
Content control. |
Commun. ACM |
2009 |
DBLP DOI BibTeX RDF |
|
12 | Ehsan Amiri, Gábor Tardos |
High rate fingerprinting codes and the fingerprinting capacity. |
SODA |
2009 |
DBLP DOI BibTeX RDF |
|
12 | Haibo Chen 0001, Liwei Yuan, Xi Wu 0001, Binyu Zang, Bo Huang 0002, Pen-Chung Yew |
Control flow obfuscation with information flow tracking. |
MICRO |
2009 |
DBLP DOI BibTeX RDF |
control flow obfuscation, opaque predicate, information flow tracking, control speculation |
12 | Ajay Surendranath, Geetika Sharma |
Using image-based modeling for exporting 3D content from Second Life. |
VRCAI |
2009 |
DBLP DOI BibTeX RDF |
3D modeling from images, synthetic views, image-based modeling |
12 | Marco Furini |
Digital audiobook: from passive to active pursuit. |
Multim. Tools Appl. |
2008 |
DBLP DOI BibTeX RDF |
Entertainment applications, Interactive applications |
12 | Daniel E. Geer Jr., Daniel G. Conway |
Type II Reverse Engineering [For Good Measure]. |
IEEE Secur. Priv. |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Lino Coria-Mendoza, Mark R. Pickering, Panos Nasiopoulos, Rabab K. Ward |
A Video Watermarking Scheme Based on the Dual-Tree Complex Wavelet Transform. |
IEEE Trans. Inf. Forensics Secur. |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Mikhail J. Atallah, Eric Bryant, John T. Korb, John R. Rice |
Binding software to specific native hardware in a VM environment: the puf challenge and opportunity. |
VMSec |
2008 |
DBLP DOI BibTeX RDF |
anti-tamper, binding software to hardware, virtualization, software protection, physically unclonable functions |
12 | Sun K. Yoo, Jun Choe, Do Yoon Kim |
Agent Based Architecture for Secure Access from Multiple Hospitals. |
ACIS-ICIS |
2008 |
DBLP DOI BibTeX RDF |
Integrated Access Control, Web Service, RBAC, XML Security |
12 | Yingjie Xia, Guanghua Song, Yao Zheng, Mingzhe Zhu |
R2P: A Peer-to-Peer Transfer System Based on Role and Reputation. |
WKDD |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Masaki Nakanishi |
An FPGA Configuration Scheme for Bitstream Protection. |
ARC |
2008 |
DBLP DOI BibTeX RDF |
FPGA configuration, bitstream protection, bitstream encryption, bitstream authentication |
12 | Ingemar J. Cox |
Watermarking, steganography and content forensics. |
MM&Sec |
2008 |
DBLP DOI BibTeX RDF |
content forensics, steganography, digital watermarking, data hiding, steganalysis |
12 | Anil Yekkala, C. E. Veni Madhavan |
Bit Domain Encryption. |
ACIVS |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Yousra Alkabani, Farinaz Koushanfar, Negar Kiyavash, Miodrag Potkonjak |
Trusted Integrated Circuits: A Nondestructive Hidden Characteristics Extraction Approach. |
Information Hiding |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Mina Deng, Bart Preneel |
On Secure and Anonymous Buyer-Seller Watermarking Protocol. |
ICIW |
2008 |
DBLP DOI BibTeX RDF |
watermarking protocol, multimedia, e-commerce, security and privacy |
12 | Maura B. Paterson |
Sliding-window dynamic frameproof codes. |
Des. Codes Cryptogr. |
2007 |
DBLP DOI BibTeX RDF |
05B30, AMS Classifications 94A62 |
12 | David Sohn |
Understanding DRM. |
ACM Queue |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Darko Kirovski, Fabien A. P. Petitcolas, Zeph Landau |
The Replacement Attack. |
IEEE Trans. Speech Audio Process. |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Nimmi Rangaswamy |
Regulating India's Digital Public Cultures: A Grey or Differently Regulated Area. |
HCI (11) |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Kristleifur Daðason, Herwig Lejsek, Friðrik Heiðar Ásmundsson, Björn Þór Jónsson 0001, Laurent Amsaleg |
Videntifier: identifying pirated videos in real-time. |
ACM Multimedia |
2007 |
DBLP DOI BibTeX RDF |
nv-tree, video retrieval, copyright protection |
12 | Che-Jen Hsieh, Wei-Cheng Liu, Jung-Shian Li |
An Efficient Packet-level JPEG Forensic Data Collection. |
FGCN (2) |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Yao-Jen Chang, Chiu-Hui Chen |
Experiences of Adopting In-class Blogs in the Teaching of Hands-on Computer Laboratory Courses. |
ICALT |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Hanane H. Mirza, Alexander Adli, Hien D. Thai, Yasunori Nagata, Zensho Nakao |
Audio Watermarking Based on the Psychoacoustic Model and Modulated Complex Lapped Transform. |
KES (2) |
2007 |
DBLP DOI BibTeX RDF |
Psychoacoustic system, MCLT, Audio watermarking |
12 | Bok-Min Goi, Raphael C.-W. Phan, Hean-Teik Chuah |
Cryptanalysis of Two Non-anonymous Buyer-Seller Watermarking Protocols for Content Protection. |
ICCSA (1) |
2007 |
DBLP DOI BibTeX RDF |
Security issues in UMS, Authentication in UMS, content protection and DRM, digital watermarking and fingerprinting, protocol |
12 | William Zhu 0001 |
Informed Recognition in Software Watermarking. |
PAISI |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Cheng Yang, Jianbo Liu, Aina Sui, Yongbin Wang |
A Digital Rights Management Architecture for Multimedia in P2P. |
PAKDD Workshops |
2007 |
DBLP DOI BibTeX RDF |
Identity Authentication, Digital Watermarking, Peer-to-Peer (P2P), Public Key Infrastructure (PKI), Digital Rights Management (DRM) |
12 | Noam Kogan, Yuval Shavitt, Avishai Wool |
A practical revocation scheme for broadcast encryption using smartcards. |
ACM Trans. Inf. Syst. Secur. |
2006 |
DBLP DOI BibTeX RDF |
smart cards, Broadcast encryption |
12 | Justin Zobel, Timothy C. Hoad |
Detection of video sequences using compact signatures. |
ACM Trans. Inf. Syst. |
2006 |
DBLP DOI BibTeX RDF |
Video similarity detection, dynamic programming, local alignment |
12 | Shu-Fen Tu, Ching-Sheng Hsu |
A DCT-based ownership identification method with gray-level and colorful signatures. |
Pattern Anal. Appl. |
2006 |
DBLP DOI BibTeX RDF |
Ownership identification, Copyright protection scheme, Discrete cosine transform |
12 | Yu-Lun Huang, F. S. Ho, Hsin-Yi Tsai, H. M. Kao |
A control flow obfuscation method to discourage malicious tampering of software codes. |
AsiaCCS |
2006 |
DBLP DOI BibTeX RDF |
control flow obfuscation, reverse engineering, tamper-resistance, intellectual property protection, software obfuscation |