Proceedings of WESCON '94
DOI: 10.1109/wescon.1994.403606
|View full text |Cite
|
Sign up to set email alerts
|

Using copied software: your work product at risk

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 0 publications
0
1
0
Order By: Relevance
“…They bring out the importance of sanctions and punishments and the fears relating to them to minimize unauthorized copying of software: Limayem et al . (1999, p. 129), Mackenzie & Goldman (2000, p. 175), Johnson (1988), Solomon & O'Brien (1991), Straub & Nance (1990, p. 46), Strikwerda & Ross (1992, p. 135), Moores & Dhillon (2000, p. 90), Vitell & Davis (1990, p. 70), Kruger (1994) and Thong & Yap (1998).…”
Section: Stage 1: Obedience and Punishment Orientationmentioning
confidence: 99%
“…They bring out the importance of sanctions and punishments and the fears relating to them to minimize unauthorized copying of software: Limayem et al . (1999, p. 129), Mackenzie & Goldman (2000, p. 175), Johnson (1988), Solomon & O'Brien (1991), Straub & Nance (1990, p. 46), Strikwerda & Ross (1992, p. 135), Moores & Dhillon (2000, p. 90), Vitell & Davis (1990, p. 70), Kruger (1994) and Thong & Yap (1998).…”
Section: Stage 1: Obedience and Punishment Orientationmentioning
confidence: 99%