Semantic search
From Copyright EVIDENCE
Citation | |
---|---|
Danaher et al. (2019) | Danaher, Brett and Hersh, Jonathan Samuel and Smith, Michael D. and Telang, Rahul, The Effect of Piracy Website Blocking on Consumer Behavior (August 13, 2019). Available at SSRN: https://ssrn.com/abstract=2612063 or http://dx.doi.org/10.2139/ssrn.2612063 |
Danna, Martinelli and Nuvolari (2021) | Danna, R.; Martinelli, A. and Nuvolari, A. (2021) D4.6. Interim report on negative space of EU creative industries <https://doi.org/10.5281/zenodo.5069616> (Zenodo 5 July 2021) last accessed 7 December 2021 |
Depken and Simmons (2004) | C. A. Depken II & L. C. Simmons (2004) Social construct and the propensity for software piracy, Applied Economics Letters, 11:2, 97-100. |
Depoorter (2019) | Depoorter, B. (2019) Copyright Enforcement in the Digital Age: When the Remedy is the Wrong. 66 UCLA L. Rev. 400 |
Depoorter and Vanneste (2006) | Depoorter, B. and Vanneste, S., 2006. Norms and enforcement: The case against copyright litigation. Oregon Law Review, 84(4), p.1127. |
Djekic and Loebbecke (2005) | DJEKIC, P. and LOEBBECKE, C. 2005. Software piracy prevention through digital rights management systems. In: MULLER, G. and LIN, K. J. (eds.) CEC 2005: Seventh IEEE International Conference on E-Commerce Technology, Proceedings. Munich, Germany. |
Dobusch and Quack (2013) | Dobusch, L., & Quack, S. (2013). Framing standards, mobilizing users: Copyright versus fair use in transnational regulation. Review of International Political Economy, 20(1), 52-88. |
EY (2014) | EY (2014) Creating Growth: Measuring Cultural and Creative Markets in the EU, |
Engstrom and Feamster (2017) | Engstrom, E. And Feamster, N. (2017) The Limits of Filtering: A Look at the Functionality & Shortcomings of Content Detection Tools. Available: https://www.engine.is/the-limits-of-filtering (last accessed 23 May 2019) |
Envisional (2011) | Envisional (2011), Technical report: An Estimate of Infringing Use of the Internet |
Erickson (2014) | Erickson, K. (2014) User Illusion: Ideological Construction of ‘User- Generated Content’ in the EC Consultation on Copyright. Internet Policy Review 4(3). DOI:10.14763/2014.4.331 |
Erickson and Kretschmer (2019) | Erickson, K. And Kretschmer, M. (2019) Empirical Approaches to Intermediary Liability in THE OXFORD HANDBOOK OF INTERMEDIARY LIABILITY ONLINE (ed. Giancarlo Frosio), Oxford University Press, Forthcoming |
Erickson, Heald, Homberg, Kretschmer and Mendis (2015) | Erickson, K., Heald, P. J., Homberg, F., Kretschmer, M., & Mendis, D. (2015). Copyright and the Value of the Public Domain: An Empirical Assessment. Intellectual Property Office Research Paper. |
European Commission (2014) | Guidelines on Recommended Standard Licences, Datasets and Charging for the Reuse of Documents, European Commission 2014/C 240/01, available at http://ec.europa.eu/information_society/newsroom/cf/dae/document.cfm?action=display&doc_id=6421. |
European Commission (2016) | European Commission (2016) Synopsis Report on the Public Consultation on the Regulatory Environment for Platforms, Online Intermediaries and the Collaborative Economy, |
Faklaris and Hook (2017) | Faklaris, C. and Hook, S.A. (2017) Attitudes About ‘Fair Use’ and Content Sharing in Social Media Applications. CSCW 2017, February 25-March 1, 2017, Portland, OR, USA |
Farooqui, Goodridge and Haskel (2011) | Farooqui, S., Goodridge, P., & Haskel, J. (2011). The Role of Intellectual Property Rights in the UK Market Sector. Intellectual Property, 2. |
Favale (2011) | Favale, M. (2011). Approximation and DRM: can digital locks respect copyright exceptions?. International Journal of Law and Information Technology, 19(4), 306-323 |
Favale, Homberg, Kretschmer, Mendis and Secchi (2013) | Favale, M., Homberg, F., Kretschmer, M., Mendis, D., & Secchi, D. (2015). Copyright, and the Regulation of Orphan Works: A Comparative Review of Seven Jurisdictions and a Rights Clearance Simulation. Available at SSRN 2613498. |
Favale, Kretschmer and Torremans (2018) | Favale, M., Kretschmer, M., and Torremans, P.L.C. (2018) Who Is Steering the Jurisprudence of the European Court of Justice? The Influence of Member State Submissions on Copyright Law Available at SSRN: https://ssrn.com/abstract=3116703 or http://dx.doi.org/10.2139/ssrn.3116703 |
Fiesler (2020) | Fiesler, C. (2020) Lawful Users: Copyright Circumvention and Legal Constraints on Technology Use. Available: https://cmci.colorado.edu/~cafi5706/CHI2020_DMCA_Fiesler.pdf (last accessed: 17 February 2020) |
Flynn and Palmedo (2017) | Flynn, S. and Palmedo, M. (2017) The User Rights Database: Measuring the Impact of Copyright Balance. Available at SSRN: https://ssrn.com/abstract=3082371 or http://dx.doi.org/10.2139/ssrn.3082371 |
Fromer and Lemley (2013) | Fromer, Jeanne C., and Mark A. Lemley. "Audience in Intellectual Property Infringement, The." Mich. L. Rev. 112 (2013): 1251. |
Frosio (2017) | Frosio, G. F. (2017). Reforming Intermediary Liability in the Platform Economy: A European Digital Single Market Strategy. |
Gan and Koh (2006) | Gan, L. L., & Koh, H. C. (2006). An empirical study of software piracy among tertiary institutions in Singapore. Information & Management, 43(5), 640-649. |
Gecer and Topal (2019) | Gecer, A.K. and Topal, A.D. (2019) Academic and postgraduate student awareness of digital product copyright issues. Information Development. |
GfK Belgium (2015) | GfK Belgium, Provision of two online consumer surveys as support and evidence base to a Commission study: Identifying the main cross-border obstacles to the Digital Single Market and where they matter most |
Givon, Mahajan and Muller (1995) | Givon, M. , Mahajan, V. & Muller, E. (1995). Software piracy: Estimation of lost sales and the impact on software diffusion. Journal of Marketing, 59(1), 29-37. |
Goles, Jayatilaka, George, Parsons, Chambers, Taylor and Brune (2008) | Goles, T., Jayatilaka, B., George, B., Parsons, L., Chambers, V., Taylor, D., & Brune, R. (2008). Softlifting: Exploring determinants of attitude. Journal of Business Ethics, 77(4), 481-499. |
Gopal and Sanders (1997) | Gopal, R. D., & Sanders, G. L. (1997). Preventive and deterrent controls for software piracy. Journal of Management Information Systems, 29-47. |
Gowers (2006) | Gowers, A. (2006). Gowers Review of Intellectual Property. The Stationery Office. |
Greenhalgh, Phillips, Pitkethly, Rogers and Tomalin (2010) | Greenhalgh, C., Philips, J., Pitkethly, R., Rogers, M., & Tomalin, J. (2010). Intellectual Property Enforcement in Smaller UK Firms. Report for the Strategy Advisory Board for Intellectual Property Policy (SABIP). |
Gunter (2009) | Gunter, W.D. (2009) Internet Scallywags: A Comparative Analysis of Multiple Forms and Measurements of Digital Piracy. Western Criminology Review10(1):15-28 |
Gupta, Gould and Pola (2004) | Gupta, P. B., Gould, S. J., & Pola, B. (2004). “To pirate or not to pirate”: A comparative study of the ethical versus other influences on the consumer’s software acquisition-mode decision. Journal of Business Ethics, 55(3), 255-274. |
Hadopi (2011) | HADOPI. 2011. Hadopi, cultural assets and internet use: practices and perceptions of French internet users (Online). Available: http://www.hadopi.fr/download/HADOPI_T0_version_long.pdf. |
Haefliger, Jäger and Von Krogh (2010) | Haefliger, S., Jäger, P., & Von Krogh, G. (2010). Under the radar: Industry entry by user entrepreneurs. Research policy, 39(9), 1198-1213. |
Hargreaves (2011) | Hargreaves, I. (2011). Digital Opportunity. A Review of Intellectual Property and Growth, |
Higgins (2004) | Higgins, G. E. (2004). Can low self-control help with the understanding of the software piracy problem?. Deviant Behavior, 26(1), 1-24. |
Higgins (2007) | Higgins, G. E. 2007. Digital piracy: An examination of Low Self-Control and Motivation Using Short-Term Longitudinal Data. Cyberpsychology and Behavior, 10, 523-529. |
Higgins and Makin (2004) | Higgins, G. E. and Makin, D. A. 2004. Self-Control, Deviant Peers, and Software Piracy Psychological Reports, 95, 921-931. |
Higgins, Fell and Wilson (2006) | Higgins, G. E., Fell, B. D. and Wilson, A. L. 2006. Digital Piracy: Assessing the Contributions of an Integrated Self-Control Theory and Social Learning Theory Using Structural Equation Modeling. Criminal Justice Studies: A Critical Journal of Crime, Law and Society, 19, 3-22. |
Hinduja (2008) | Hinduja, S. (2008). Deindividuation and internet software piracy. CyberPsychology & Behavior, 11(4), 391-398. |
Holm (2001) | Holm, H. J. (2001). The computer generation's willingness to pay for originals when pirates are present: A cv study. Lund University. |
Holt and Copes (2010) | Holt, Thomas J., and Heith Copes. "Transferring subcultural knowledge on-line: Practices and beliefs of persistent digital pirates." Deviant Behavior 31.7 (2010): 625-654. |
Holt, Bossler and May (2012) | Holt, T. J., Bossler, A. M., & May, D. C. (2012). Low self-control, deviant peer associations, and juvenile cyberdeviance. American Journal of Criminal Justice, 37(3), 378-395. |
Hong (2007) | Hong, S. H. (2007). The recent growth of the internet and changes in household-level demand for entertainment. Information Economics and Policy, 19(3), 304-318. |
Hsu and Shiue (2008) | Hsu, J. L., & Shiue, C. W. (2008). Consumers’ willingness to pay for non-pirated software. Journal of Business Ethics, 81(4), 715-732. |
Hsu and Su (2008) | Hsu, J. L., & Su, Y. L. (2008). Usage of unauthorized software in Taiwan. Social Behavior and Personality: an international journal, 36(1), 1-8. |
Huang, Zhu and Liu (2007) | Huang, M., Zhu, H., & Liu, M. (2007, September). Why Do Chinese Users Use Pirated Software: An Integrative Perspective?. In Wireless Communications, Networking and Mobile Computing, 2007. WiCom 2007. International Conference on (pp. 5884-5887). IEEE. Chicago |
Husted (2000) | Husted, B. W. (2000). The impact of national culture on software piracy. Journal of Business Ethics, 26(3), 197-211. |