Spelling suggestions: "subject:"piracy"" "subject:"liracy""
41 |
Digital Piracy, Teens, and the Source of Advice: An Experimental StudyHashim, Matthew J., Kannan, Karthik N., Maximiano, Sandra, Ulmer, Jackie Rees 01 October 2014 (has links)
The objective of our paper is to determine the effect of piracy advice from various sources on music consumer behavior. Specifically, does it matter if the source of advice has a stake in the outcome of the piracy decision? Does it matter if the source of advice has a social tie with the advisee? Accordingly, we conduct a lab experiment using teenagers and their parents as subjects, increasing the realism of the context by sampling potential pirates and their parents. Treatments represent various sources of piracy advice (e.g., the teen’s parent, a record label, or an external regulator). Subjects make decisions playing our new experimental game – The Piracy Game – extended from the volunteer’s dilemma literature. Interestingly, subjects respond negatively to advice from record labels over time, purchasing fewer songs as compared to other sources such as the subject’s parent. The existence of a social tie between the advisor and the subject assists in mitigating piracy, especially when a parent is facing potential penalties due to his/her child’s behavior. An external regulator, having no social tie or stake in the decision, provides the least credible source of advice, leading to the greatest amount of piracy. Our analyses not only provide managerial insights but also develop theoretical understanding of the role of social ties in the context of advice.
|
42 |
Softwarové pirátství v modelu Cloud Computing / Software piracy in the cloud computing modelKlepetko, Radim January 2012 (has links)
The thesis focuses on software piracy mainly in the context of cloud computing. Its goals are to analyze contemporary software piracy with the focus on its forms, reasons leading to it and on antipiracy techniques. Second part of the thesis defines cloud computing and focuses on two basic interdependencies with software piracy: cloud as a pirates' tool and cloud as means to fight the piracy. Based on the findings of previous parts, concluding part of the thesis suggests set of recommendations for involved parties (especially software providers, cloud service providers and cloud service users).
|
43 |
Softwarové pirátství / Software PiracyHenzlová, Sandra January 2019 (has links)
Software Piracy Abstract This master thesis deals with software piracy, and other phenomena that comes with it. The phenomena are primarily warez groups, crackers and hackers. The work itself is divided into five parts. First part sets out foundation that this thesis is based on, it also defines terms used in this work. It is focused on computer programs, videogames. Videogames are the main target of warez groups. Warez groups compete with other groups to be the first one to break the anti-piracy protection implemented into the videogame by game developers to prevent pirates from using their videogame illegally. Second part of the work analyzes Czech and international law that is applicable onto computer programs. Its main focus is Czech law; however, it is important to describe international as it is the base for Czech law. Main part of this section deals with intellectual property rights, but administrative law protection, and criminal law protection are mentioned as well. Third part analyzes software piracy as stand-alone phenomenon, points out its declining popularity. It also describes forms of software piracy. Fourth part of this work analyzes the production of pirated goods. It describes the process that is behind software piracy, how warez groups supply the public with illegal stuff. It describes...
|
44 |
Evolving border theory and self-regulation theory for a mobile phone generationWhite, Edward Peter Greenwood January 2018 (has links)
A thesis submitted to the Faculty of Humanities, University of the Witwatersrand, Johannesburg, in fulfilment of the requirements for the degree of Doctor of Philosophy
Johannesburg, South Africa, 2018 / The global adoption of mobile phones has fundamentally changed life as we know it. This study hopes to understand if mobile- and/or smartphones have changed the way in which work and home domains are constructed and what the consequences are on the individual’s workfamily balance. More importantly, are individuals able to self-regulate the flow of communication from the work into the home domain via a mobile- and/or smartphone in order to maintain the intricate work-family balance. To determine the plausibility/feasibility of this hypothesis, the study builds on Clark's (2000) Border theory with respect to work-life balance and border violations, bearing recent technological advances in mind, through the incorporation of Bandura’s (1986) self-regulation mechanism to explain the border management mechanism. To determine the validity of this hypothesis, a mixed-methods study was conducted which utilised a managerial participant sample recruited from South Africa in three phases; a pilot study (N = 30); a primary sample of a further 227 managers; and in-depth follow-up interviews with 27 managers and their partners. To determine the relationship between self-regulation and mobile phone usage for after-hours work in the home domain, Pearson’s correlation coefficients were used. The relationship between self-regulation and work-family balance was further explored through moderated multiple linear regressions, using a model from Baron and Kenny (1986), which created further explorative points which were investigated in the 27 interviews. The interviews were conducted to determine if individuals understand their afterhours mobile phone usage for work purposes and this was analysed via thematic content analysis (TCA).
There was evidence for relationships between self-regulation and the time spent on organisational work within the work day and at home (after hours), which results in an impact on the development of work-family conflict. The relationship between the mobile phone use for work can be attributed to self-regulation, which implies that self-regulation is an intermediary mechanism. Moderated multilinear regression, unexpectedly, showed that individuals with low (deficient) self-regulatory ability, facilitated work ubiquitously with their mobile phones while simultaneously increasing their own self-esteem, as it supported their own work-family balance. The interviews uncovered three different border-keeper groups (borderexpanders, border-adapters, and border-enforcers). The outcomes of this research indicates that mobile- and/or smartphones have the ability to alter the border construction between the work and home domains as well as the intricate balance between them.
Keywords: Work-family balance, Border theory, Mobile phones, Smartphones, Self-regulation, Self-esteem, South African managers / GR2019
|
45 |
Fundamental Demographics of Digital Piracy OffendersGuerra, Chris 05 1900 (has links)
Digital piracy is an emerging cybercrime subtype with overarching implications for administrators and researchers alike. Within this body of knowledge, it is unclear what individual-level factors are linked to digital piracy. Using a college-based sample, while focusing on gender, race, and age, this study identifies fundamental individual-level variables associated with digital piracy commission. After conducting multiple independent samples t-tests and a multivariate logistic regression, results found age and computer proficiency were significantly associated with the likelihood of engaging in digital piracy. These findings can help establish the foundational characteristics of digital pirates. By shifting the focus back to basic individual factors, universities can identify preventive efforts and researchers can better understand who engages in digital piracy.
|
46 |
Censored Kids and Piracy: An Examination of Film Censorship in SingaporeChew, Chang Hui 01 January 2013 (has links) (PDF)
The island state of Singapore in Southeast Asia has a history of film censorship, one of several techniques in state repression it uses as a furtherance of state power. Yet, Singapore's success also depends on being open to global information and cultural flows. Drawing from queer theory, this thesis examines a recent case study of film censorship in Singapore, the 2010 film, The Kids are All Right. The thesis examines laws and regulations in Singapore to understand how films are interpellated into objects of moral danger, and also the reaction of some progressive Singaporeans to the censorship. The thesis also discusses the contradictions between state censorship and the recognition of its circumvention through copyright infringement and piracy. Finally, the thesis makes some suggestions about steps that can be taken to resist against film censorship, as well as directions for future research.
|
47 |
Intellectual property abuses: How should multinationals respond?Yang, Deli, Sonmez, M., Bosworth, D. January 2004 (has links)
No / This article illustrates the causes of piracy and pinpoints piracy associated with registrations and with production and distribution. Based on interviews with British and American multinational managers working in China, the authors elaborate 10 corporate actions to counter the spread of the `inevitable curse¿. In order to implement these 10 strategies, the authors recommend that firms treat piracy as a challenge, be corporately proactive, be aware of the repertoire of possible strategies, investigate co-operative action with other companies, agencies and government and be continuously alert to the dynamic nature of piracy. The problems reflected here are common to multinationals operating businesses around the world, and the destructive nature of piracy is likely to encourage more academic study to yield further insights for practice.
|
48 |
An Empirical Assessment of Factors Contributing to Individuals' Propensity to Commit Software Piracy in The BahamasWells, Raymond Cleophas 01 January 2012 (has links)
Researchers have found that software piracy worldwide over the years has significantly contributed to billions of dollars in lost revenue for many software firms. Software developers have found it difficult to create software that is not easily copied, thus, creating a software protection problem. Software piracy remains a global problem despite the significant effort to combat its prevalence.
Over the years, significant research has attempted to determine the factors that contribute to individuals' propensity to commit software piracy. Most of the research on software piracy has been limited to larger societies, with recommendations by researchers to extend similar studies to smaller ones. The literature indicating the need for additional research on this topic in different populations and cultures is significant. Given that, the key contributions of this study were to assess empirically factors such as personal moral obligation (PMO), cultural dimensions, ethical computer self-efficacy (ECSE) and the effect it has on individuals' propensity -- in cultures that support it -- to commit software piracy in smaller geographical locations.
Therefore, this research empirically assessed the contribution that PMO, Hofstede's cultural dimension of individualism/collectivism (I/C), and ECSE have made on individuals' propensity to commit software piracy. The study extended the current body of knowledge by finding answers to three specific questions. First, this study sought to determine whether the PMO component contributed to individuals' propensity to commit software piracy in The Bahamas. Secondly, this study sought to determine the level of contribution of Hofstede's cultural dimension of I/C to individuals' propensity to commit software piracy in The Bahamas. Finally, this study sought to determine the contribution of ECSE to individuals' propensity to commit software piracy in The Bahamas.
A total of 321 usable responses were collected over a one-month period from students from the school of business at a small Bahamian college, to determine their level of PMO, I/C, and ECSE contribution to individuals' propensity to commit software piracy. This represents, approximately, a 64% response rate. The results showed the overall significance of the models of the three factors in predicting individuals' propensity to commit software piracy. Furthermore, the results indicated that PMO and ECSE subscale PMO and ECSE_DB were significant, however, I/C, and ECSE (as a whole) were not.
|
49 |
The privatisation of international security : the regulatory framework for Private Maritime Security Companies, using operations off Somalia, 2005-13, as a case studyChapsos, I. January 2014 (has links)
This thesis examines the expansion of private maritime security provision, its regulation and implications for national and global security. The main research question addressed is: How are private maritime security companies (PMSCs) regulated in the context of the contemporary trend towards international security privatisation? However, further questions stem from this: Is the complex framework of the PMSCs’ business model adequately regulated? To what extent could the existing practices and regulatory framework affect international security in governance and policy, strategic, social and commercial terms? Qualitative research methods were used, strongly supported by empirical data collection – available due to extensive professional experience and personal engagement of the author with the private maritime security industry. Using a case study of PMSCs’ operations off Somalia from 2005-2013, and a plethora of selected data from primary sources and semi-structured interviews, the paper argues that there is need for more effective regulation of PMSCs and the establishment of international standards. Following an analysis of the current conceptual framework of private security, focussing particularly on maritime security, in the context of contemporary academic literature and professional practice, the paper provides a detailed theoretical justification for the selection of the methodology used. After broadening and deepening the analysis of the privatisation of security ashore, the concerns raised are then transferred to the maritime domain. The situation becomes even more complicated in the high seas due to inconsistencies between flag states’ regulations, the unregulated vastness of the oceans and the reluctance of any international body (such as the IMO) to undertake the essential task of regulating PMSCs. Building on this, an analytical framework that enables the integration of maritime security and contemporary piracy into the contemporary paradigm of global security is developed. An historical overview of piracy then demonstrates that modern piracy is an ancient phenomenon with contemporary local characteristics. The maritime crime’s causal factors remain more or less the same throughout human history and, the paper argues, PMSCs serve as a short term response to address the symptoms rather than the root causes. Given that PMSCs have so far been used primarily as measures against Somali piracy, activities in this specific region provide an appropriate case study. The development of a typology of piracy offers a deeper understanding of the regional distinctiveness of the phenomenon, which is essential to acquiring a holistic picture of the operational environment in which PMSCs are deployed. The above considerations are used as a basis for analysing the complexities of the PMSCs’ business model, in legal, operational and ethical terms. The questionable practices involved in these are not fully regulated by national states. Hence, their contract and deployment raise ethical, legal and operational concerns. In the penultimate chapter, these are further assessed in terms of the extent to which the existing regulatory framework and PMSCs’ practices affect international security in governance and policy, strategic, social and commercial terms. The research indicates that states are increasingly outsourcing the monopoly they have exercised in security provision - a trend that has also expanded the private sector’s activities and business at sea. However, the lack of international laws and the consequent unstandardized plethora of flag states’ regulations has meant that the burgeoning private security services are dependent on the global market to regulate themselves. States’ reluctance and/or inability to regulate these companies has allowed controversial practices to persist and the lack of an international body responsible for their regulation and vetting on a worldwide basis has inevitable consequences in terms of global security. The overall outcome of this thesis is an elucidation of the potential implications of the privatisation of maritime security - both positive and negative. Most significantly, it suggests this could present a significant threat to international security in the near future.
|
50 |
Pirate Economics: The Economic Causes and Consequences of Contemporary Maritime Piracy in Sub-Saharan AfricaCharlebois, Jamie 20 August 2012 (has links)
The past 20 years have witnessed a resurgence of maritime piracy, especially along the East and West coasts of Africa. Much scholarly research has been undertaken on this issue; however a consensus on the primary economic causes of piracy does not exist. This thesis seeks to identify the primary economic causes and consequences of maritime piracy in Somalia and Nigeria specifically, and coastal sub-Saharan Africa more generally. It investigates whether variables such as a lack of employment opportunities, particularly in the fisheries sector, are a causal factor of maritime piracy. These potential causal factors are explored using both case studies and regression analyses. Net exports of fish are found to be a statistically significant predictor of the frequency of piracy, suggesting that a decrease in national fish production and employment in the fisheries sector results in an increase in the occurrence of piracy.
|
Page generated in 0.0373 seconds