:::

詳目顯示

回上一頁
題名:軟體侵權擴散模式之研究
書刊名:商管科技季刊
作者:賴奎魁 引用關係蕭智文吳曉君 引用關係
作者(外文):Lai, Kuei-kueiHsiao, Chih-wuenWu, Shiao-chun
出版日期:2003
卷期:4:1
頁次:頁33-52
主題關鍵詞:軟體擴散擴散模式軟體侵權Software diffusionDiffusion modelSoftware piracy
原始連結:連回原系統網址new window
相關次數:
  • 被引用次數被引用次數:期刊(0) 博士論文(1) 專書(0) 專書論文(0)
  • 排除自我引用排除自我引用:0
  • 共同引用共同引用:0
  • 點閱點閱:21
     軟體侵權的現象在現今軟體產業中已是個非常嚴重的問題,嚴重影響到軟體開發業者與資訊科技智慧財產權的發展,許多公司因此損失了相當多的潛在利潤。儘管如此,軟體侵權的擴散可能會影響到合法軟體的擴散,亦即軟體侵權者可能會影響潛在使用者採用該軟體,並且這些採用者中有些可能會成為購買者。本研究之擴散模式是用來描繪合法與非法軟體的擴散軌跡,此方法能夠估計侵權者的數量,與受侵權者影響而採用合法產品的比例。本文運用此模式研究英國軟體的擴散型式,其結果說明了儘管每7個軟體使用者當中就有6個使用非法的產品,但約有75%以上之購買者是受此侵權者影響而採用該軟體,此力量深深地影響到合法軟體的擴散。雖然軟體盜版會使廠商的利潤減少,使得軟體廠商不得不採取軟體保護策略,但由於軟體市場有網路效果存在,有時開放軟體反而是較佳的策略。
     Software piracy by users has been identified as the worst problem facing the software industry today. And the pervasiveness of software piracy throughout the world is having a profound effect on software publishing industry and the development of digital intellectual properties and technology. Because of this software shadow diffusion, a software firm loses potential profits. However, shadow diffusion the legal diffusion of the software. Software pirates may influence potential software users to adopt the software, and some of these adopters may become buyers. A diffusion modeling approach is suggested to track shadow diffusion and the legal diffusion of a software over time. The approach enables management to estimate the pirated adoptions over time and the percentage of legal adoptions due to the influence of pirates. The modeling approach is applied to study the diffusion of types of software in United Kingdom. The results suggest the diffusion that although six of every seven software users utilized pirated copies, these pirates were responsible for generation more than 75% of new software buyers significantly influencing the legal diffusion of the software. Although software piracy would decrease the profit of software firms, the protection of software is not always a good idea. Owning to network effect, sometimes the software firms should choose not to protect their software.
期刊論文
1.KALISH, S.(1985)。A NEW PRODUCT ADOPTION MODEL WITH PRICING ADVERTISING AND UNCERTAINTY。MANAGEMENT SCIENCE,31,1569-1585。  new window
2.Mahajan, V.、Peterson, R. A.(1978)。Innovation diffusion in a dynamic potential adopter population。Management Science,24,1589-1597。  new window
3.Mahajan, V.、Muller, E.、Srivastava, R. K.(1990)。Determination of Adopter Categories by Using Innovation Diffusion Models。Journal of Marketing Research,27,37-50。  new window
4.Bass, Frank M.(1969)。A new product growth for model consumer durables。Management Science,15(5),215-227。  new window
5.Norton, John A.、Bass, Frank M.(1987)。A Diffusion Theory Model of Adoption and Substitution for Successive Generations of High-Technology Products。Management Science,33(9),1069-1086。  new window
6.Givon, M.、Mahajan, V.、Muller, E.(1995)。Software piracy:Estimation of lost sales and the impact on software diffusion。Journal of Marketing,59(1),29-37。  new window
圖書
1.Rogers, E. M.(1983)。Diffusion of Innovations。New York:Macmillan Publishing Company, Inc.。  new window
其他
1.莊柏青(2001)。軟體產業特性及經營法則。  延伸查詢new window
2.雷章寶(2001)。我國資訊軟體業現況與展望。  延伸查詢new window
3.Kalish, S.(1983)。Monopolist pricing with dynamic demand and production cost。  new window
4.Kalish, S.;Lilien, G. L.(1986)。A market entry timing model for new technologie。  new window
5.Mahajan, V.;Muller, E.;Moshe, G.(1995)。Software piracy : Estimation of lost sales and the impact on software diffusion。  new window
6.Tam, Kar Yan(1996)。Dynamic price elasticity and the diffusion of mainframe computing。  new window
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top
QR Code
QRCODE