| 期刊論文1. | Shy, O.、Thisse, J. F.(1999)。A Strategic Approach to Software Protection。Journal of Economics & Management Strategy,8(2),163-190。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 2. | Conner, K. R.、Rumelt, R. P.(1991)。Software Piracy: An Analysis of Protection Strategies。Management Science,37(2),125-139。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 其他1. | Chiou, J. R. and Tsai, M. F.(2008)。The Optimal Import Tariff in the Presence of Domestic Counterfeiting。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 2. | Grossman, G. and Shairo, C.(1988)。Foreign Counterfeiting of Status Goods。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 3. | Grossman, G. and Shairo, C.(1988)。Counterfeitproduct Trade。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 4. | McGirk, T.(2001)。Chasing Shadows。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 5. | Nascimento, F. and Vahonacker, W. R.(1988)。Optimal Strategic Pricing of Reproducible Consumer Product。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 6. | Takeyama, L. N.(1994)。The Welfare Implications of Unauthorized Reproduction of Intellectual Property in the Presence of Demand Network Externalities。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | 7. | United States House of Representatives Committee on Energy and Commerce(1985)。Unfair Foreign Trade Practices: Part 3, Hearings Before the Subcommittee on Oversight and Investigations of the Committee on Energy and Commerce。 ![](/gs32/thssjcncl/image/nclsfx.gif) ![new window](/gs32/images/newin.png) | |