760 research outputs found

    Limitation of Sales Warranties as an Alternative to Intellectual Property Rights: An Empirical Analysis of IPhone Warranties’ Deterrent Impact on Consumers

    Get PDF
    Apple\u27s success with the Apple iPhone has brought with it certain problems. Its success has engendered a community that has attempted to circumvent Apple\u27s exclusive service agreement with AT&T. Unfortunately for Apple (and similarly situated manufacturers), intellectual property law allows consumers to alter their products so as to circumvent relationships that manufacturers may have with others. The patent and copyright law first sale doctrine allows consumers to manipulate a product after it is purchased. As a result, manufacturers are increasingly turning to alternatives to intellectual property to secure control over the device after the sale. One such alternative is the exclusion of warranty under Article 2 of the Uniform Commercial Code. This iBrief considers whether limitation of warranties have the deterrence effect manufacturers desire. Said differently, it considers whether manufacturers can use warranty limitations to prevent consumers from using their products in an unauthorized manner. The iBrief presents a behavioral model based on the Triandis model of planned behavior and enhances the model by accounting for likely and unlikely benefits and detriments. The model suggests that participants weigh the probability and magnitude of the detriment against the probability and magnitude of the beneficial impact when making the decision to engage in technological piracy. This model, considered with other empirical evidence, suggests that Apple\u27s warranty could be a stronger deterrent for consumers than civil liability. The iBrief concludes that manufacturers can better protect their post-sale expectation of profits by raising consumer awareness of their warranty\u27s quality and by raising awareness of the consequences for using the product in a way that is outside the terms of the consumers\u27 authorized use

    Software piracy: A time-series Analysis

    Get PDF

    Digital piracy: An assessment of consumer piracy risk and optimal supply chain coordination strategies.

    Get PDF
    Digital piracy and the emergence of new distribution channels have changed the dynamics of supply chain coordination and created many interesting problems. There has been increased attention to understanding the phenomenon of consumer piracy behavior and its impact on supply chain profitability. The purpose of this dissertation is to better understand the impact of digital piracy on online music channel and optimal supply chain strategies which achieve high levels of coordination. A multi-method approach including survey, mathematical modeling, and simulation are used to a) analyze the impact of piracy on digital music channel coordination under different contract arrangements, b) develop theoretical and operational basis for conceptualizing a measurement model of consumer piracy risk, c) examine the effectiveness of piracy control strategies used to dissuade consumers from illegal music downloads. Findings from this dissertation contribute to the literature on digital piracy, consumer piracy behavior, online channel distribution, and supply chain coordination, and provide several important managerial implications

    Cyber-crime Science = Crime Science + Information Security

    Get PDF
    Cyber-crime Science is an emerging area of study aiming to prevent cyber-crime by combining security protection techniques from Information Security with empirical research methods used in Crime Science. Information security research has developed techniques for protecting the confidentiality, integrity, and availability of information assets but is less strong on the empirical study of the effectiveness of these techniques. Crime Science studies the effect of crime prevention techniques empirically in the real world, and proposes improvements to these techniques based on this. Combining both approaches, Cyber-crime Science transfers and further develops Information Security techniques to prevent cyber-crime, and empirically studies the effectiveness of these techniques in the real world. In this paper we review the main contributions of Crime Science as of today, illustrate its application to a typical Information Security problem, namely phishing, explore the interdisciplinary structure of Cyber-crime Science, and present an agenda for research in Cyber-crime Science in the form of a set of suggested research questions

    Fighting Information Good Piracy with Versioning

    Get PDF
    Information goods piracy is a pervasive problem as advanced information and communication technologies become so inexpensive and so easy to access. This problem, if not alleviated, can pose a serious loss to society as it can reduce information goods providers’ incentives to develop information goods or threaten the use and growth of the Internet as a distribution media for valued digital information goods. Contrasting with previous literature, which mainly consider instruments, such as law enforcement or technology-based solutions, that work on increasing individual piracy cost, we consider using versioning as a complementary means to these other methods. While the previous literature has shown that versioning may not be the optimal strategy for information goods (having negligible or concave marginal costs), we show that versioning could be a very effective and profitable instrument to fight piracy. Furthermore, we also show that it is possible to do this without sacrificing the consumer’s surplus and, as a result, the entire social welfare could increase. This suggests that by using versioning along with other instruments that work on increasing individual piracy cost, information goods providers can fight piracy more efficiently

    Deterrence and Digital Piracy: A Preliminary Examination of the Role of Viruses

    Get PDF
    Digital piracy has been shown to be an emerging societal problem. However, research has demonstrated limited techniques that effectively combat digital piracy. The purpose of the present study is to examine the utility of computer viruses in deterring digital piracy. The findings from responses to a survey of college students revealed that fear of computer viruses may influence respondents’ intentions to engage in digital piracy. The policy implications of this finding are discussed

    Software piracy at work place: influence of organizational culture in the presence of various ethical orientations

    Get PDF
    Technology in terms of ‘information technology’ is a revolutionary discovery from time to time. On the similar note, one of the famous issues of IT is the Software Piracy, which has been the talk of the organizations every now and then. Software Piracy i.e. to avoid the illegal act of copying and stealing others information has always been a headache for organizations leading to billion dollars losses and no returns. This paper tracks the association of organizations’ ethical culture with its orientations and software piracy. It is understand the influence of ethical behavior of the organization on software piracy handling. The study revealed that there is a negative association between perceived organizational ethical culture and software piracy in organizations. In particular, organizational ethical culture significantly influences software piracy decisions for individual having ‘Exceptionist’ ethical orientation. Subsequently, there is no significant association between organizational ethical culture and software piracy for Subjectivists, Absolutists and Situationists.Software Piracy, Software Licensing, Ethical Orientations, Organizational Culture
    • 

    corecore