The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for piracy with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1977-1990 (16) 1991-1998 (19) 1999-2000 (20) 2001-2002 (23) 2003 (32) 2004 (38) 2005 (46) 2006 (42) 2007 (36) 2008 (32) 2009 (30) 2010 (28) 2011 (21) 2012 (40) 2013 (26) 2014 (32) 2015 (22) 2016 (19) 2017 (20) 2018 (23) 2019 (18) 2020 (18) 2021 (17) 2022 (34) 2023-2024 (17)
Publication types (Num. hits)
article(356) incollection(6) inproceedings(306) phdthesis(1)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 254 occurrences of 151 keywords

Results
Found 669 publication records. Showing 669 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
17Mauro Barni, Franco Bartolini Data hiding for fighting piracy. Search on Bibsonomy IEEE Signal Process. Mag. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
17Mark Van Hoorebeek Health and safety and piracy: legal risk minimisation in libraries. Search on Bibsonomy Electron. Libr. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
17Joseph Nyiri The effects of piracy in a university setting. Search on Bibsonomy ACM Crossroads The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
17Ginger Myles Using software watermarking to discourage piracy. Search on Bibsonomy ACM Crossroads The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
17Louis Jezsik Why are you stealing that software: piracy in South East Asia. Search on Bibsonomy Ubiquity The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
17Eric S. Kyper, Rodrigo J. Lievano, Paul Mangiameli, SeungJae Shin Software piracy: A time-series Analysis. Search on Bibsonomy AMCIS The full citation details ... 2004 DBLP  BibTeX  RDF
17Neil Morton Understanding Attitudes toward Online Music Piracy. Search on Bibsonomy AMCIS The full citation details ... 2004 DBLP  BibTeX  RDF
17Vi Lam, Jerome Moscicki Rethinking digital piracy. Search on Bibsonomy ICWI The full citation details ... 2004 DBLP  BibTeX  RDF
17Alvin Stauber The New Vigilantism: Combating the Piracy of Copyrighted Materials on Peer-To-Peer Networks. Search on Bibsonomy ICEB The full citation details ... 2004 DBLP  BibTeX  RDF
17Marc Fetscherin, Sabrina Zaugg Music Piracy on Peer-to-Peer Networks. Search on Bibsonomy EEE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
17Alok Gupta, Ramnath K. Chellappa Ethical, Legal and Economic Issues in the Digital Economy: Intellectual Property Rights, Piracy, Trust, Security and Privacy: Minitrack Introduction. Search on Bibsonomy HICSS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
17Ranjan B. Kini, H. V. Ramakrishna, B. S. Vijayaraman An exploratory study of moral intensity regarding software piracy of students in Thailand. Search on Bibsonomy Behav. Inf. Technol. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
17Gleb Naumovich, Nasir D. Memon Preventing Piracy, Reverse Engineering, and Tampering. Search on Bibsonomy Computer The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
17Linda Dailey Paulson News Briefs Topics include: Nanotech RAM Holds Promise for Universal Memory / US Court Establishes Protection against Reverse Engineering / Using Web Crawlers to Fight Piracy. Search on Bibsonomy Computer The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
17Trevor T. Moores The effect of national culture and economic wealth on global software piracy rates. Search on Bibsonomy Commun. ACM The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
17Robert F. Easley, John G. Michel, Sarv Devaraj The MP3 open standard and the music industry's response to Internet piracy. Search on Bibsonomy Commun. ACM The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
17Sudip Bhattacharjee, Ram D. Gopal, G. Lawrence Sanders Digital music and online sharing: software piracy 2.0? Search on Bibsonomy Commun. ACM The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
17Stephen P. King, Ryan Lampe Network externalities, price discrimination and profitable piracy. Search on Bibsonomy Inf. Econ. Policy The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
17E. Eugene Schultz Security views: Online piracy battle heats up in US. Search on Bibsonomy Comput. Secur. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
17A. Graham Peace, Dennis F. Galletta, James Y. L. Thong Software Piracy in the Workplace: A Model and Empirical Test. Search on Bibsonomy J. Manag. Inf. Syst. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
17Ramnath K. Chellappa, Shivendu Shivendu Economic Implications of Variable Technology Standards for Movie Piracy in a Global Context. Search on Bibsonomy J. Manag. Inf. Syst. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
17Terry Costlow In Brief - Piracy, Advertising Groups Target Spyware. Search on Bibsonomy IEEE Distributed Syst. Online The full citation details ... 2003 DBLP  BibTeX  RDF
17Orneita Burton, T. S. Raghu 0001, Rajiv K. Sinha, Ajay S. Vinze Software Piracy: An Empirical Examination of the Impact of Network Externalities and Open Source Alternatives on Willingness to Pay. Search on Bibsonomy AMCIS The full citation details ... 2003 DBLP  BibTeX  RDF
17Shin-yi Wu, Pei-Yu Sharon Chen, G. Anandalingam Fighting Information Good Piracy with Versioning. Search on Bibsonomy ICIS The full citation details ... 2003 DBLP  BibTeX  RDF
17A. Graham Peace Software Piracy. Search on Bibsonomy Encyclopedia of Information Systems The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
17Laurie E. MacDonald, Kenneth T. Fougere Software Piracy: A Study of the Extent of Coverage in Introductory MIS Textbooks. Search on Bibsonomy J. Inf. Syst. Educ. The full citation details ... 2002 DBLP  BibTeX  RDF
17Xiaohua Zeng, Sang-Yong Tom Lee, Hock-Hai Teo Impact Of Online Renting On Software Piracy. Search on Bibsonomy ECIS The full citation details ... 2002 DBLP  BibTeX  RDF
17H. V. Ramakrishna, Ranjan B. Kini, B. S. Vijayaraman Shaping of Moral Intensity regarding Software Piracy in University Students: Immediate Community Effects. Search on Bibsonomy J. Comput. Inf. Syst. The full citation details ... 2001 DBLP  BibTeX  RDF
17Lynette Owen Piracy. Search on Bibsonomy Learn. Publ. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
17Frederick Gallegos Software Piracy: Some Facts, Figures, and Issues. Search on Bibsonomy Inf. Secur. J. A Glob. Perspect. The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
17Md. Mahbubur Rahim, Mohd. Noah Abd. Rahman, Afzaal H. Seyal Software piracy among academics: an empirical study in Brunei Darussalam. Search on Bibsonomy Inf. Manag. Comput. Secur. The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
17Diane Crawford Forum: Software piracy is not just economics anymore. Search on Bibsonomy Commun. ACM The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
17Ram D. Gopal, G. Lawrence Sanders Global software piracy: you can't get blood out of a turnip. Search on Bibsonomy Commun. ACM The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
17Trevor T. Moores, Gurpreet Dhillon Software piracy: a view from Hong Kong. Search on Bibsonomy Commun. ACM The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
17Herman T. Tavani Defining the boundaries of computer crime: piracy, break-ins, and sabotage in cyberspace. Search on Bibsonomy SIGCAS Comput. Soc. The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
17Jessica Litman Lunch speaker: Jessica Litman: The Demonization of Piracy. Location: Frontenac Ballroom. Search on Bibsonomy CFP The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
17Susan J. Harrington Software piracy: are Robin Hood and responsibility denial at work? Search on Bibsonomy IRMA Conference The full citation details ... 2000 DBLP  BibTeX  RDF
17Michael E. Whitman, Anthony M. Townsend, Robert J. Aalberts Cybersquatting: A Case of First Come/First Served or Piracy on the Cyber-Seas? Search on Bibsonomy Inf. Secur. J. A Glob. Perspect. The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
17James Couser Software piracy and the Doris Day Syndrome: some legal, ethical and social implications of contemporary conceptions of property. Search on Bibsonomy Int. J. Law Inf. Technol. The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
17Paul B. Schneck Persistent access control to prevent piracy of digital information. Search on Bibsonomy Proc. IEEE The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
17Md. Mahbubur Rahim, Afzaal H. Seyal, Mohd. Noah Abd. Rahman Software piracy among computing students: a Bruneian scenario. Search on Bibsonomy Comput. Educ. The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
17Moez Limayem, Mohamed Khalifa 0001, Wynne W. Chin Factors motivating software piracy: a longitudinal study. Search on Bibsonomy ICIS The full citation details ... 1999 DBLP  BibTeX  RDF
17Darryl A. Seale, Michael Polakowski, Sherry Schneider It's not really theft!: Personal and workplace ethics that enable software piracy. Search on Bibsonomy Behav. Inf. Technol. The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
17Ram D. Gopal, G. Lawrence Sanders International Software Piracy: Analysis of Key Issues and Impacts. Search on Bibsonomy Inf. Syst. Res. The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
17Roger A. Coldwell Did Chuck Babbage Predict Software Piracy? Search on Bibsonomy Commun. ACM The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
17Clifford M. Koen Jr., Jin H. Im Software piracy and its legal implications. Search on Bibsonomy Inf. Manag. The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
17Karl Dakin Softlaw: What If There Were No Software Piracy? Search on Bibsonomy IEEE Softw. The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
17Ram D. Gopal, G. Lawrence Sanders Preventive and Deterrent Controls for Software Piracy. Search on Bibsonomy J. Manag. Inf. Syst. The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
17Philip A. Redding Report on the Protection Afforded Computer Software in the Face of Computer Software Piracy. Search on Bibsonomy J. Inf. Law Technol. The full citation details ... 1996 DBLP  BibTeX  RDF
17A. Graham Peace, Dennis F. Galletta Developing a Predictive Model of Software Piracy Behavior: An Empirical Study. Search on Bibsonomy ICIS The full citation details ... 1996 DBLP  BibTeX  RDF
17Gérard Gabella, Marie-Dominique Picasso PC software industry lost $8.08 billion to pirates in 1994 piracy rate in the US declines. Search on Bibsonomy Inf. Manag. The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
17C. Ian Kyer Software piracy & corporate compliance. Search on Bibsonomy Comput. Law Secur. Rev. The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
17Harold W. Thimbleby Controversy corner : An organizational solution to piracy and viruses. Search on Bibsonomy J. Syst. Softw. The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
17Diana E. D'Angelo You don't have to look like a pirate to be one - the role of academic computing in software piracy deterrence. Search on Bibsonomy SIGUCCS The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
17Jin H. Im, Pamela D. Van Epps Software piracy and software security measures in business schools. Search on Bibsonomy Inf. Manag. The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
17Ram D. Gopal, G. Lawrence Sanders The Effect of Preventive and Deterrent Software Piracy Strategies on Producer Profits. Search on Bibsonomy ICIS The full citation details ... 1992 DBLP  BibTeX  RDF
17David P. Lewis Application of anti-piracy provisions of the copyright act 1968. Search on Bibsonomy Comput. Law Secur. Rev. The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
17Jin H. Im, Pamela D. Van Epps Software Piracy and Software Security in Business Schools: An Ethical Perspective. Search on Bibsonomy Data Base The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
17Jin H. Im, Clifford M. Koen Jr. Software piracy and responsibilities of educational institutions. Search on Bibsonomy Inf. Manag. The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
17Hans Gliss East Germany - haven for software piracy. Search on Bibsonomy Comput. Secur. The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
17Eric Zabinski Supply, demand, and piracy. Search on Bibsonomy SIGCAS Comput. Soc. The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
17Eli B. Cohen, Larry W. Cornwell College Students Believe Piracy is Acceptable. Search on Bibsonomy J. Inf. Syst. Educ. The full citation details ... 1989 DBLP  BibTeX  RDF
17Mark B. Johnson Software piracy: stopping it before it stops you. Search on Bibsonomy SIGUCCS The full citation details ... 1988 DBLP  DOI  BibTeX  RDF
17Robert Hay Software piracy in the U.K. - A review. Search on Bibsonomy Comput. Law Secur. Rev. The full citation details ... 1986 DBLP  DOI  BibTeX  RDF
17Richard H. Stern Distinguishing Legitimate Reverse Engineering from Unlawful Chip Piracy under the Semiconductor Chip Protection Act. Search on Bibsonomy COMPCON The full citation details ... 1986 DBLP  BibTeX  RDF
17Douglas J. Albert, Stephen P. Morse Combatting Software Piracy by Encryption and Key Management. Search on Bibsonomy Computer The full citation details ... 1984 DBLP  DOI  BibTeX  RDF
17Tim Maude, Derwent Maude Hardware Protection Against Software Piracy. Search on Bibsonomy Commun. ACM The full citation details ... 1984 DBLP  DOI  BibTeX  RDF
17Morrison Bump Jr. A primer on software piracy cases in the courts. Search on Bibsonomy Comput. Secur. The full citation details ... 1984 DBLP  DOI  BibTeX  RDF
17Peter S. Vogel "Software Piracy and protection". Search on Bibsonomy ACM Annual Conference The full citation details ... 1982 DBLP  DOI  BibTeX  RDF
17Calvin N. Mooers Preventing Software Piracy. Search on Bibsonomy Computer The full citation details ... 1977 DBLP  DOI  BibTeX  RDF
12Leah Hoffmann Content control. Search on Bibsonomy Commun. ACM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
12Ehsan Amiri, Gábor Tardos High rate fingerprinting codes and the fingerprinting capacity. Search on Bibsonomy SODA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
12Haibo Chen 0001, Liwei Yuan, Xi Wu 0001, Binyu Zang, Bo Huang 0002, Pen-Chung Yew Control flow obfuscation with information flow tracking. Search on Bibsonomy MICRO The full citation details ... 2009 DBLP  DOI  BibTeX  RDF control flow obfuscation, opaque predicate, information flow tracking, control speculation
12Ajay Surendranath, Geetika Sharma Using image-based modeling for exporting 3D content from Second Life. Search on Bibsonomy VRCAI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF 3D modeling from images, synthetic views, image-based modeling
12Marco Furini Digital audiobook: from passive to active pursuit. Search on Bibsonomy Multim. Tools Appl. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Entertainment applications, Interactive applications
12Daniel E. Geer Jr., Daniel G. Conway Type II Reverse Engineering [For Good Measure]. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
12Lino Coria-Mendoza, Mark R. Pickering, Panos Nasiopoulos, Rabab K. Ward A Video Watermarking Scheme Based on the Dual-Tree Complex Wavelet Transform. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
12Mikhail J. Atallah, Eric Bryant, John T. Korb, John R. Rice Binding software to specific native hardware in a VM environment: the puf challenge and opportunity. Search on Bibsonomy VMSec The full citation details ... 2008 DBLP  DOI  BibTeX  RDF anti-tamper, binding software to hardware, virtualization, software protection, physically unclonable functions
12Sun K. Yoo, Jun Choe, Do Yoon Kim Agent Based Architecture for Secure Access from Multiple Hospitals. Search on Bibsonomy ACIS-ICIS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Integrated Access Control, Web Service, RBAC, XML Security
12Yingjie Xia, Guanghua Song, Yao Zheng, Mingzhe Zhu R2P: A Peer-to-Peer Transfer System Based on Role and Reputation. Search on Bibsonomy WKDD The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
12Masaki Nakanishi An FPGA Configuration Scheme for Bitstream Protection. Search on Bibsonomy ARC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF FPGA configuration, bitstream protection, bitstream encryption, bitstream authentication
12Ingemar J. Cox Watermarking, steganography and content forensics. Search on Bibsonomy MM&Sec The full citation details ... 2008 DBLP  DOI  BibTeX  RDF content forensics, steganography, digital watermarking, data hiding, steganalysis
12Anil Yekkala, C. E. Veni Madhavan Bit Domain Encryption. Search on Bibsonomy ACIVS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
12Yousra Alkabani, Farinaz Koushanfar, Negar Kiyavash, Miodrag Potkonjak Trusted Integrated Circuits: A Nondestructive Hidden Characteristics Extraction Approach. Search on Bibsonomy Information Hiding The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
12Mina Deng, Bart Preneel On Secure and Anonymous Buyer-Seller Watermarking Protocol. Search on Bibsonomy ICIW The full citation details ... 2008 DBLP  DOI  BibTeX  RDF watermarking protocol, multimedia, e-commerce, security and privacy
12Maura B. Paterson Sliding-window dynamic frameproof codes. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF 05B30, AMS Classifications 94A62
12David Sohn Understanding DRM. Search on Bibsonomy ACM Queue The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
12Darko Kirovski, Fabien A. P. Petitcolas, Zeph Landau The Replacement Attack. Search on Bibsonomy IEEE Trans. Speech Audio Process. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
12Nimmi Rangaswamy Regulating India's Digital Public Cultures: A Grey or Differently Regulated Area. Search on Bibsonomy HCI (11) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
12Kristleifur Daðason, Herwig Lejsek, Friðrik Heiðar Ásmundsson, Björn Þór Jónsson 0001, Laurent Amsaleg Videntifier: identifying pirated videos in real-time. Search on Bibsonomy ACM Multimedia The full citation details ... 2007 DBLP  DOI  BibTeX  RDF nv-tree, video retrieval, copyright protection
12Che-Jen Hsieh, Wei-Cheng Liu, Jung-Shian Li An Efficient Packet-level JPEG Forensic Data Collection. Search on Bibsonomy FGCN (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
12Yao-Jen Chang, Chiu-Hui Chen Experiences of Adopting In-class Blogs in the Teaching of Hands-on Computer Laboratory Courses. Search on Bibsonomy ICALT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
12Hanane H. Mirza, Alexander Adli, Hien D. Thai, Yasunori Nagata, Zensho Nakao Audio Watermarking Based on the Psychoacoustic Model and Modulated Complex Lapped Transform. Search on Bibsonomy KES (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Psychoacoustic system, MCLT, Audio watermarking
12Bok-Min Goi, Raphael C.-W. Phan, Hean-Teik Chuah Cryptanalysis of Two Non-anonymous Buyer-Seller Watermarking Protocols for Content Protection. Search on Bibsonomy ICCSA (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Security issues in UMS, Authentication in UMS, content protection and DRM, digital watermarking and fingerprinting, protocol
12William Zhu 0001 Informed Recognition in Software Watermarking. Search on Bibsonomy PAISI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
12Cheng Yang, Jianbo Liu, Aina Sui, Yongbin Wang A Digital Rights Management Architecture for Multimedia in P2P. Search on Bibsonomy PAKDD Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Identity Authentication, Digital Watermarking, Peer-to-Peer (P2P), Public Key Infrastructure (PKI), Digital Rights Management (DRM)
12Noam Kogan, Yuval Shavitt, Avishai Wool A practical revocation scheme for broadcast encryption using smartcards. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF smart cards, Broadcast encryption
12Justin Zobel, Timothy C. Hoad Detection of video sequences using compact signatures. Search on Bibsonomy ACM Trans. Inf. Syst. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Video similarity detection, dynamic programming, local alignment
12Shu-Fen Tu, Ching-Sheng Hsu A DCT-based ownership identification method with gray-level and colorful signatures. Search on Bibsonomy Pattern Anal. Appl. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Ownership identification, Copyright protection scheme, Discrete cosine transform
12Yu-Lun Huang, F. S. Ho, Hsin-Yi Tsai, H. M. Kao A control flow obfuscation method to discourage malicious tampering of software codes. Search on Bibsonomy AsiaCCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF control flow obfuscation, reverse engineering, tamper-resistance, intellectual property protection, software obfuscation
Displaying result #501 - #600 of 669 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license