2015
DOI: 10.1016/j.infoecopol.2015.07.008
|View full text |Cite
|
Sign up to set email alerts
|

A survey on software piracy empirical literature: Stylized facts and theory

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

1
4
0
1

Year Published

2017
2017
2023
2023

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(6 citation statements)
references
References 46 publications
1
4
0
1
Order By: Relevance
“…Second, product design and development almost exclusively involve digital media, making confidentiality protection more difficult, and ostensibly more critical, than in manufacturing contexts (Massimino et al, 2018). Third, confidentiality performance is paramount as confidentiality losses may severely erode product sales and revenue streams (Craig, 2005; Gomes, Cerqueira, & Almeida, 2015; Han et al, 2014; Lu et al, 2019; Ma et al, 2014). Fourth, confidentiality losses (i.e., when the product is leaked to an illegal‐channel market) can be reliably identified in this industry (Craig, 2005; Massimino et al, 2017), remedying a nontrivial data‐availability problem facing similar empirical research (Massimino et al, 2018).…”
Section: Industry Context and Product Development Networkmentioning
confidence: 99%
“…Second, product design and development almost exclusively involve digital media, making confidentiality protection more difficult, and ostensibly more critical, than in manufacturing contexts (Massimino et al, 2018). Third, confidentiality performance is paramount as confidentiality losses may severely erode product sales and revenue streams (Craig, 2005; Gomes, Cerqueira, & Almeida, 2015; Han et al, 2014; Lu et al, 2019; Ma et al, 2014). Fourth, confidentiality losses (i.e., when the product is leaked to an illegal‐channel market) can be reliably identified in this industry (Craig, 2005; Massimino et al, 2017), remedying a nontrivial data‐availability problem facing similar empirical research (Massimino et al, 2018).…”
Section: Industry Context and Product Development Networkmentioning
confidence: 99%
“…Among the simplest relations, Gomes et al (2015) found the relation of variables such as education and per capita GDP with lower levels of piracy, although with inequality, this relation is negative. But there are more complex variables to measurewhich also affect growth, and are not observed, such as cultural issues.…”
Section: Literature Revisionmentioning
confidence: 99%
“…For a deeper and systematic review of the literature on the piracy of digital products, the interested reader is advised to look at the excellent and comprehensive surveys in Peitz and Waelbroeck (2006) and Belle ‡amme and Peitz (2012) and(2014). Also Gomes, et al 2015 provides a set of stylized facts about software piracy and related theory.…”
Section: Related Literaturementioning
confidence: 99%
“…By this term we understand a hardware device that is integrated with software and used to protect and license the software (see Djekic and Loebbecke 2007 device is used, installing an illegal version of the software is signi…cantly more di¢ cult either because of low availability of the illegal version or because of the high demand on the users' skill to install (or use) the illegal version. Given empirical evidence that every protection can be cracked (see Djekic andLoebbecke 2007 andGomes et al, 2015), we assume that perfect hardware based protection does not exist. After installation, however, a user does not distinguish between an illegal version and the legal one.…”
Section: Private Protection Against Copying: Hardware-based Protectionmentioning
confidence: 99%