Piracy rates and software protection in the time of 2008 global economic crisis: Empirical analysis for Greece, Germany and England
International Journal of Economics and Management Studies |
© 2016 by SSRG - IJEMS Journal |
Volume 3 Issue 2 |
Year of Publication : 2016 |
Authors : John Hlias Plikas, Hlias Plikas, Ioanna Ntini, Alexandros-Nikolaos Zattas |
How to Cite?
John Hlias Plikas, Hlias Plikas, Ioanna Ntini, Alexandros-Nikolaos Zattas, "Piracy rates and software protection in the time of 2008 global economic crisis: Empirical analysis for Greece, Germany and England," SSRG International Journal of Economics and Management Studies, vol. 3, no. 2, pp. 10-16, 2016. Crossref, https://doi.org/10.14445/23939125/IJEMS-V3I3P103
Abstract:
2008 global economic crisis were a plague in many sectors of many countries. Many countries were among those which affected the least, such as Germany and England whereas others were among those which were affected the most, such as the famous case of Greece. One sector that rises to the surface more and more as technology progresses is piracy and piracy rates, factor that belongs in those sectors that were affected. That’s where software protection policies appear. The purpose of this paper is to analyze the relationship between software security and piracy rates, collecting relevant data for three European countries of utmost significance as regarding the 2008 global economic recession, Greece, Germany and England. The reason this paper was created was to provide those factors as regarding the data selected, that affect the most the piracy rates factor as regarding the global recession. Through thorough research, using Monte Carlo simulation technique and empirical analysis we discover proof that GDP and R&D factors have a negative impact on piracy rates.
Keywords:
Piracy rates, Software protection, 2008 global economic crisis, Empirical analysis, software security.
References:
[1]. Andrés, A. R. (2006). The relationship between copyright software protection and piracy: Evidence from Europe. European Journal of Law and Economics,21(1), 29-51.
[2]. Assuli, O. B., Leshno, M.(2013) "Implementing a Monte-Carlo simulation on admission decisions", Journal of Enterprise Information Management, Vol. 26 Iss: 1/2, pp.154 – 164
[3]. Austin, J. H. (1998). Zen and the brain: Toward an understanding of meditation and consciousness. Cambridge, MA: MIT Press.
[4]. Bhattacharjee, S., Gopal, R. D., & Sanders, G. L. (2003). Digital music and online sharing: Software piracy 2.0?. Communications of the ACM, 46(7), 107-111
[5]. BSA global software piracy study, (2011). SHADOW MARKET. Retrieved from http://globalstudy.bsa.org/2011/downloads/study_pdf/2011_BSA_Pi racy_Study-Standard.pdf
[6]. Calarco, M., & Atterton, P. (2009). Animal philosophy: Essential readings in continental thought. New York, NY: Continuum.
[7]. Chen, J. Q. (2003). Intelligence: Multiple intelligences. In J. Guthrie (Ed.), Encyclopedia of education (pp. 1198-1201). New York, NY: Macmillan.
[8]. Clancy, T., Stiner, C., & Koltz, T. (2002). Shadow warriors: Inside the special forces. New York, NY: Putnam
[9]. Dr. R.Narayanasamy, Ms. R.Thirugnanasoundari "Risk and Return Analysis of Equity Shares with Special Reference it Companies (NSE) Stock Index", SSRG International Journal of Economics and Management Studies (SSRG - IJEMS), V3(2),1-4 March to April 2016. ISSN:2393 - 9125.
www.internationaljournalssrg.org/IJEMS/index.html. Published by : Seventh Sense Research Group
[10]. Dr. V. Selvarani, Prof. A. Zeenath Amman "A Study on Consumer Behaviour of Instant Food Products with Special Reference to Tiruchirappalli City", SSRG International Journal of Economics and Management Studies (SSRG - IJEMS), V3(1),1-7 January to February 2016. ISSN:2393 - 9125.
www.internationaljournalssrg.org/IJEMS/index.html. Published by : Seventh Sense Research Group.
[11]. Ginarte, J. C., & Park, W. G. (1997). Determinants of patent rights: A cross-national study. Research policy, 26(3), 283-301.
[12]. Vida, I., Koklič, M. K., Kinney, M. K., Penz, E. (2012) "Predicting consumer digital piracy behavior: The role of rationalization and perceived consequences", Journal of Research in Interactive Marketing, Vol. 6 Iss: 4, pp.298 - 313
[13]. Louveaux, S., Poulett, Y., Salaün, A.(1999) "User protection in cyberspace: some recommendations", info, Vol. 1 Iss: 6, pp.521 – 537
[14]. Mahesh, G., Mittal, R.(2009) "Digital content creation and copyright issues", The Electronic Library, Vol. 27 Iss: 4, pp.676 – 683
[15]. Marron, D. B., & Steel, D. G. (2000). Which countries protect intellectual property? The case of software piracy. Economic inquiry, 38(2), 159-174.
[16]. Mohan, S. R., Singh, M. P., & Joshi, M. P. (2012). On the use of empirical equation in extracting disorder parameters in inhomogeneous organic thin films.The Journal of Physical Chemistry C, 116(3), 2555-2562.
[17]. Morgan, M. J., Ruskell, D. J.(1987) "Software Piracy — The Problems", Industrial Management & Data Systems, Vol. 87 Iss: 3/4, pp.8 – 12
[18]. Suki, N. M., Ramayah, T., Suki, N. M. (2011) "Understanding consumer intention with respect to purchase and use of pirated software", Information Management & Computer Security, Vol. 19 Iss: 3, pp.195 - 210
[19]. Ostergard, R. (2000). The measurement of intellectual property rights protection. Journal of International Business Studies, 31(2), 349-360.
[20]. Pederzoli , D., Volker G. Kuppelwieser, V. G.(2015) "Retail companies‟ internationalization behavior and the 2008 crisis", International Journal of Retail & Distribution Management, Vol. 43 Iss: 9, pp.870 – 894
[21]. PLIKAS, J. H.(2015). Social Media and Small Businesses: A Combinational Strategic Approach under the Current Economic Crisis. IOSR Journal of Business and Management (IOSR-JBM), Volume 17, Issue 12 .Ver. I (Dec. 2015), PP 105-115
[22]. Poonam, Archna Chaudhry "Financial Inclusion in India: A State Level Study", SSRG International Journal of Economics and Management Studies (SSRG - IJEMS), V3(3),1-4 May to June 2016. ISSN:2393 - 9125. www.internationaljournalssrg.org/IJEMS/index.html. Published by : Seventh Sense Research Group
[23]. Prakash, A., Jha, S. K., Mohanty, R. P.(2012) "Scenario planning for service quality: a Monte Carlo simulation study", Journal of Strategy and Management, Vol. 5 Iss: 3, pp.331 – 352
[24]. Prof. (Dr.) Sameer Sinha, Prof. Sunil Mishra "A Study on Consumers Perception towards Mobile Handset", SSRG International Journal of Economics and Management Studies (SSRG - IJEMS), V3(3),1-4 May to June 2016. ISSN:2393 - 9125. www.internationaljournalssrg.org/IJEMS/index.html. Published by : Seventh Sense Research Group.
[25]. Rojo-Álvarez, J. L., Martínez-Ramón, M., Prado-Cumplido, D., Artés-Rodríguez, A., & Fig.ueiras-Vidal, A. R. (2004). Support vector method for robust ARMA system identification. Signal Processing, IEEE Transactions on,52(1), 155-164.
[26]. Shadlen, K. C., Schrank, A., & Kurtz, M. J. (2005). The political economy of intellectual property protection: the case of software. International Studies Quarterly, 49(1), 45-71.
[27]. Shapiro, C., & Varian, H. R. (2013). Information rules: a strategic guide to the network economy. Harvard Business Press.
[28]. UNESCO - United Nations Educational, Scientific and Cultural Organization, (2016). Retrieved from http://www.uis.unesco.org/Pages/default.aspx
[29]. World Bank, (2016). Retrieved from http://data.worldbank.org/indicator
[30]. WIPO - World Intellectual Property Organization, (2016). Retrieved from http://www.wipo.int/portal/en/index.html
[31]. WTO–World Trade Organization, (2016). Retrieved from https://www.wto.org/english/res_e/res_e.htm