首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 25 毫秒
1.
Drawing on Jones's ethical model and Ajzen's theory of planned behavior, this study proposes and tests an integrative model for the decision-making process underlying software piracy. Survey data collected from computer users in Guangzhou, China, in accordance with two software piracy scenarios under study—end user piracy and software counterfeiting—provide general support for the model. Consistent with major propositions of the theory of planned behavior, the findings show that Chinese computer users’ perceived moral intensity of software piracy significantly affects their corresponding moral recognition, judgment, and intention in both scenarios. Moreover, a direct influence of moral judgment on attitude toward software piracy is found in both scenarios. With regard to end-user piracy specifically, the findings further echo the theory of planned behavior by demonstrating a direct influence of attitude, subjective norm, and perceived behavioral control on intention to pirate. As in the case of software counterfeiting, the findings, however, show that only attitude and subjective norm but not perceived behavioral control significantly influence this intention. Implications derived from this study suggest the potential to synthesize ethical and general social psychological concepts to explain software piracy behavior, and also furnish insights on how to deter software piracy in China.  相似文献   

2.
Advances in Internet and other digital technologies have opened up new channels and methods for online business. They have also led to a situation where the same channels can be abused and misused. One of these forms of technology abuse, which is becoming increasingly prevalent these days, is the piracy of digital content. This article introduces a relatively comprehensive and unified theoretical framework for studying and understanding a major aspect of digital piracy: namely, software piracy. Based on Routine Activities Theory, Rational Choice Theory, and guardianship concepts, the framework identifies key parameters that can affect the incidence of software piracy. We apply the framework in conducting a systematic examination of 75 articles dealing with software piracy. The examination reveals that a considerable number of parameters have received little or no attention from software-piracy researchers. In addition to suggesting research opportunities, the framework furnishes a systematic approach for structuring the design of future research studies in the realm of software piracy. The insights furnished by this article contribute to future investigations of the software-piracy phenomenon that are needed to avert the economic and social damage caused by software piracy.  相似文献   

3.
《Research Policy》2023,52(3):104701
Despite digital piracy's well-documented impact on firm revenue, the relationship between piracy and firm innovation, including the creation of new intellectual property (IP) rights, is not well-understood. To fill this gap, this paper estimates the impact of piracy on innovation through a quasi-experimental design and explores the mechanisms driving this relationship using data on software firms. Leveraging a 2001 technological shock that suddenly enabled rising software piracy, we find increases in subsequent R&D spending, copyrights, trademarks, and patents for large, incumbent software firms. Furthermore, firms with large patent portfolios appear to disproportionately increase copyrights and trademarks following the piracy shock. After considering alternatives, our analysis suggests that impacted firms perceive piracy as a form of product-market competition that causes them to increase innovation and balance their IP portfolios.  相似文献   

4.
软件产业作为信息产业的核心和灵魂,是国民经济发展的基础性和战略性产业,是信息化建设的关键环节,然而伴随着软件产业的飞速发展,软件盗版问题也越来越严重,它已经成为威胁软件产业的主要问题。以2006年51个国家的横截面数据为研究样本,对版权保护与软件业盗版率的关系进行了实证分析。结果显示,版权保护对抑制软件业盗版具有显著影响,其弹性系数为0.524。  相似文献   

5.
全球软件盗版损失的定量分析   总被引:1,自引:0,他引:1  
袁勤俭 《情报科学》2004,22(11):1311-1316
在全球软件产业蓬勃发展的同时,软件盗版对该产业危害和影响越来越大。本文定量分析了软件盗版给全球软件产业带来的损失。  相似文献   

6.
软件盗版这一"地下产业",抑制了软件的创新,破坏了市场秩序。形成这种局面的主要原因在于盗版的高额经济利益和软件保护制度的缺乏。建立以经济干预和制度完善为核心的综合治理机制,是解决软件盗版的关键。  相似文献   

7.
Computer crime on the Internet poses asignificant threat to the well-being ofbusinesses and individuals, and none are immunefrom the repercussions that can result. Onetype of this unethical and unlawful activity isonline software piracy. In this work, thesignificance of piracy as a topic for academicinquiry is first presented, followed by asummary of the conflicting stances on thisissue. Then, a review of scholarly literaturepreviously conducted in this area is given toprovide a backdrop for the current research. Univariate and bivariate findings from aquantitative study of students are used todemonstrate the incidence, scope, andassociated correlates of Internet piracy in auniversity setting. Technological and ethicalpolicy solutions that an institution mightimplement are suggested and discussed inconclusion.  相似文献   

8.
数字产品的知识产权保护问题越来越受到重视,政府政策对知识产权的保护起着重要作用。研究了盗版对数字产品企业的定价、企业利润及创新动力的影响,通过构建Hotelling模型得出:在不考虑网络效应的条件下,当市场上存在单个垄断商时,政府应采取最严厉的保护政策;然而当市场上存在双寡头企业竞争时,盗版在一定条件下能够降低企业之间的价格竞争,增加企业的利润和创新动力,并且使社会福利增加,此时政府应采取较宽松的政策。  相似文献   

9.
In the age of instant connectivity, it is often difficult to detach students from the Internet and technology. This study examines the role of consumerism and neutralization on the cyberslacking behavior of students in a classroom environment. This study offers a unique and integrative understanding of the impact of consumerism on neutralization behavior to understand the intention of students to use the Internet and technology in class for non-class activities. An online survey of 303 university students from United States was conducted. The study finds a positive and a significant relationship of consumerism with all the five neutralization techniques used by students to engage in cyberslacking. Except for condemnation of the condemners, the rest of the neutralization techniques were found to have a positive and a significant impact on student’s intention to engage in cyberslacking behavior. This study would extend the existing literature by expanding the concepts and theory of consumerism and neutralization to cyberslacking behavior in the classroom. The findings demonstrated several theoretical and practical implications that are discussed in the article.  相似文献   

10.
Internet platforms increasingly rely on personal data to maintain user base and attract potential users. However, users might misrepresent their personal information in response to the requests when they expect their personal information to be used for unstated purposes. Misrepresenting of personal information (MPI), as a regular deviant behavior on online platforms, leads to data noises and service failures and needs further investigation. Drawing on the neutralization theory and online scenario survey, this study constructs a model to examine the factors of MPI. The results show that techniques of neutralization, such as denial of injury, defense of necessity, metaphor of the ledger, and avoidance of greater harm, are positively associated with users’ intention of MPI. In particular, avoidance of greater harm has a stronger effect on MPI intention than other neutralization techniques. Furthermore, we also explore the contingent role of personality traits. The results show that extraversion negatively moderates the relationships between denial of injury, avoidance of greater harm and MPI, whereas neuroticism plays a positive role in moderating the relationships between denial of injury, metaphor of the ledger, avoidance of greater harm and MPI. Moreover, post-hoc analysis results show that users do some differernces regarding justify their deviant disclosure behavior by using neutralization techniques between e-commerce platform and social networking site. Focusing on the dark side of disclosure behavior, this study enriches the current literature by applying neutralization theory and provides a new direction for academia and Internet practitioners to understand users’ deviant disclosure behavior.  相似文献   

11.
从消费者效用角度研究了一个网络音乐厂商与一个传统音乐厂商构成的双寡头垄断市场中的产品定价策略,构建Hotelling博弈模型,探讨了网络外部性对音乐厂商最优定价、利润变化趋势和市场盗版水平的影响。研究发现:有网络外部性时,不论网络音乐厂商还是传统音乐厂商,产品价格都上升;网络音乐厂商的利润必然上升,而传统音乐厂商的利润可能下降。网络外部性的存在增大了整个音乐市场的需求,盗版的需求也随之增大,但市场竞争加剧导致盗版市场份额可能下降。  相似文献   

12.
Although commonly confused, the values inherent in copyright policy are different from those inherent in scholarly standards for proper accreditation of ideas. Piracy is the infringement of a copyright, and plagiarism is the failure to give credit. The increasing use of Web-based electron publication has created new contexts for both piracy and plagiarism. In so far as piracy and plagiarism are confused, we cannot appreciate how the Web has changed the importance of these very different types of wrongs. The present paper argues that Web-based publication lessens the importance of piracy, while it heightens the need for protections against plagiarism. Copyright policy protects the opportunity for publishers to make a profit from their investments. As the cost of publication decreases in the electronic media, we need fewer copyright protections. Plagiarism is the failure to abide by scholarly standards for citation of sources. These standards assure us that information can be verified and traced to its source. Since Web sources are often volatile and changing, it becomes increasingly difficult and important to have clear standards for verifying the source of all information.  相似文献   

13.
泄露他人隐私行为意向的影响要素研究   总被引:1,自引:0,他引:1       下载免费PDF全文
吴娜  李文立  吕欣  柯育龙 《科研管理》2015,36(11):139-147
互联网的发展为人们的生活带来巨大便利,但也带来了隐私安全隐患,通过互联网渠道泄露他人隐私的现象已经引起社会的高度关注。基于犯罪学领域的中和技术理论,分析了否认责任、否认伤害、否认受害者、更高层次效忠、避免更多的伤害和隐私意识对泄露他人隐私行为发生意向的影响,构建了互联网环境下泄露他人隐私意向的研究模型。以人肉搜索这一典型例子进行场景设计,通过问卷调查,收集759份有效问卷,采用Smart PLS2.0软件进行结构方程检验。实证结果表明否认责任、否认受害者和避免更多伤害三类中和技术正向影响泄露他人隐私行为的意向,否认伤害和更高层次效忠技术对泄露他人隐私意向没有显著影响。另外,增强个人隐私意识能有效削弱泄露他人隐私行为的意向。本研究结果有助于了解隐私泄露者的行为动机,为规范互联网用户上网行径和制定隐私保护政策提供借鉴。  相似文献   

14.
数字出版产业是伴随着产品内容创作生产、管理过程、产品形态的数字化发展而出现的新兴产业。与传统出版不同,我国的数字出版产业并没有完善的法律支撑,数字出版作品面临着权利主体认定模糊、创新性不足和盗版侵权等问题。发展数字出版产业应当完善立法,保护相关权利主体的合法权益、激励创新、打击盗版,以推动数字出版产业更好地发展。  相似文献   

15.
The increasing prospects of digital piracy has prompted the perceived need by electronic publishers to adopt technical systems of protection, and governments to reform their copyright laws. This article is a preliminary study of the management of intellectual property by electronic publishers, defined as those involved in the production of online databases, and CD-ROMs. It focuses on three main issues: (1) how electronic publishers view the increasing threat of piracy; (2) the methods of protection employed to protect intellectual property in digital format; and (3) the importance of technological protection of intellectual property in electronic publications. The analysis is based on a sample of 23 UK electronic publishers. The interviews revealed an interesting assortment of protection methods and did not show that technological protection was a preferred way. Instead, the means of protection, in addition to copyright law, comprised niche markets, pricing, trust, bad publicity, and nontechnical and technical means.  相似文献   

16.
Student Attitudes on Software Piracy and Related Issues of Computer Ethics   总被引:1,自引:0,他引:1  
Software piracy is older than the PC and has been the subject of several studies, which have found it to be a widespread phenomenon in general, and among university students in particular. An earlier study by Cohen and Cornwell from a decade ago is replicated, adding questions about downloading music from the Internet. The survey includes responses from 224 students in entry-level courses at two schools, a nondenominational suburban university and a Catholic urban college with similar student profiles. The study found that there has been few if any changes in student opinions regarding the unauthorized duplication of copy- righted materials. Students generally felt that copying commercial software and downloading music from the Internet was acceptable and found that there was no significant correlation between student attitudes and their school’s religious affiliation or lack thereof. Additionally, the study found that a small but significant percentage of respondents considered the other questionable behaviors as ethically acceptable. Finally, the reasons for these attitudes are discussed as well as what colleges can do to correct the situation.  相似文献   

17.
李首胤 《现代情报》2013,33(6):170-172
本文主要研究如何实现互联网上跟踪、发现、分析教学多媒体数字化信息资源中真伪的检测平台,并提供相应停止侵权措施的多媒体数字化信息资源版权监测系统,通过系统获得多媒体作品在互联网上的盗版传播情况,系统提供有效的技术手段来过滤和删除盗版内容。  相似文献   

18.
鉴于碳中和对我国农业农村发展提出了新要求,且农户兼业已成为普遍现象,为促进农户采纳低碳生产行为,利用对黑龙江省376份农户深度调研数据,实证分析碳中和背景下农户兼业对农户低碳生产行为的影响。结果表明农户兼业促使农户采纳低碳生产的概率提高了12.8%;进一步采用倾向得分匹配法解决样本选择偏误,结果发现这一概率值仍然高达14.0%~24.9%,而且在统计上非常显著和稳健,同时当农户家庭成员多、加入合作社、无政治身份、受政府宣传教育影响大、受政府监管影响大时,农户兼业促进农户进行低碳生产的作用更为明显。基于此,提出不仅要拓宽农户兼业渠道、提供农户更多兼业机会,还要发挥政府监管的约束作用,进而发挥农户兼业对农户低碳生产的促进作用,为我国早日实现农业农村碳中和提供路径参考。  相似文献   

19.
随着计算机技术和网络技术的飞速发展,数字文本的传播、拷贝、分发更加容易,同时也面临着非法传播和随意篡改的问题。文本数字水印技术可以保护数字作品的版权,防止盗版和侵权行为。该文分析了基于格式文本的数字水印技术的算法和研究现状,并重点讨论了针对当今比较流行的PDF格式化文档的数字水印算法,最后探讨了今后研究的发展趋势。  相似文献   

20.
网络时代著作权合理使用的研究   总被引:1,自引:0,他引:1  
尚月  谢卫东 《情报科学》2004,22(3):366-368
著作权合理使用制度对社会、对权利人、对著作权使用人来讲都是一个行之有效的制度,有效地促进了人类精神成果的推广和拓展。但是在网络环境和数字化的背景下,随着“盗版”定义的扩展、著作权保护手段的丰富,合理使用面临着被边缘化的危险。本文就这一问题进行探讨。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号