2,872 research outputs found
THE EFFECT OF PREVENTIVE AND DETERRENT SOFTWARE PIRACY STRATEGIES ON PRODUCER PROFITS
In an attempt to protect their intellectual property and compete effectively in an increasingly dynamic marketplace, software producers have employed a number of preventive and deterrent measures to counter software piracy. Conventional wisdom suggests that reducing piracy will force consumers to legitimately acquire software, thus increasing firm profits. In this paper, we develop an analytical model, using Buchanan\u27s economic theory of clubs, to test the implications of anti-piracy measures on producer profits. Our results suggest that deterrent measures can potentially increase profits. Empirical results are also presented which support the assumptions of the analytical model
Design and Implementation of Distributed Databases for Improving Law Enforcement in Developing Countries
Huge populations and low per capita incomes are the norm in developing countries. Apart from the other impacts, these two features make law enforcement in developing countries a colossal task. The absence of databases on citizens - their credit histories and felony records, is a serious impediment to normal Government activity and regulation. This lack of control can have serious consequences, domestic and international, if not checked immediately. In this paper, we propose that the rapid advance in telecommunications and computer technologies could be used very effectively in creating infrastructures in developing countries to improve the enforcement of law and order
Psychological Profiling of Hacking Potential
This paper investigates the psychological traits of individuals’ attraction to engaging in hacking behaviors (both ethical and illegal/unethical) upon entering the workforce. We examine the role of the Dark Triad, Opposition to Authority and Thrill-Seeking traits as regards the propensity of an individual to be interested in White Hat, Black Hat, and Grey Hat hacking. A new set of scales were developed to assist in the delineation of the three hat categories. We also developed a scale to measure each subject’s perception of the probability of being apprehended for violating privacy laws. Engaging in criminal activity involves a choice where there are consequences and opportunities, and individuals perceive them differently, but they can be deterred if there is a likelihood of punishment, and the punishment is severe. The results suggest that individuals that are White Hat, Grey Hat and Black Hat hackers score high on the Machiavellian and Psychopathy scales. We also found evidence that Grey Hatters oppose authority, Black Hatters score high on the thrill-seeking dimension and White Hatters, the good guys, tend to be Narcissists. Thrill-seeking was moderately important for White Hat hacking and Black hat hacking. Opposition to Authority was important for Grey Hat hacking. Narcissism was not statistically significant in any of the models. The probability of being apprehended had a negative effect on Grey Hat and Black Hat hacking. Several suggestions will be made on what organizations can do to address insider threats
Recommended from our members
Modeling information technology impacts in clerical work environments
The industrialization of white collar work via information technology (IT) is a key indicator of the emerging post-industrial economy (Hirschhorn, 1988). A conceptual model linking clerical work environments to effective IT impacts such as IT utilization, IT\u27s perceived ease of use and performance impact was developed and empirically tested. Underlying the model is the premise that clerical job structure is a facilitator of IT impacts (Weber, 1988). The results indicate that clerical job structure factors such as typing, composing or editing, and bookkeeping were significantly related to IT impacts in clerical work settings. A job holder\u27s IT competence and top management commitment to IT were also found to be significantly related to IT impacts in clerical work settings. Antecedent relationships among the IT impacts also contributed to understanding the IT impacts - for example, IT utilization affected perceived ease of use and perceived performance impact, and perceived ease of use affected perceived performance impact
- …