:::

詳目顯示

回上一頁
題名:著作權侵權防禦機制之資源配置策略
書刊名:商略學報
作者:黃信雄陳芃婷
作者(外文):Huang, Hsin-hsiungChen, Peng-ting
出版日期:2016
卷期:8:3
頁次:頁195-210
主題關鍵詞:著作權防禦機制資源配置策略內容分析法決策試驗與實驗評估法Copyright infringement defense mechanismResource allocation strategyContent analysisDecision making trial and evaluation laboratoryDEMATEL
原始連結:連回原系統網址new window
相關次數:
  • 被引用次數被引用次數:期刊(0) 博士論文(0) 專書(0) 專書論文(0)
  • 排除自我引用排除自我引用:0
  • 共同引用共同引用:1479
  • 點閱點閱:24
隨著企業内部採用的電腦軟體越趨多元與廣泛,企業侵犯電腦軟體著作權的案例也日漸增加。企業因未建立合宜的著作權侵權防禦機制而暴露在著作權侵權訴訟的風險之下。本研究應用内容分析法面對面親訪5位著作權侵權訴訟經驗豐富的台灣資訊通路產業主管,萃取出12項著作權侵權防禦機制之關鍵指標。並運用決策試驗與實驗評估法(DEMATEL)進一步將指出決策者典範與支持、侵權懲處與軟體稽核三項關鍵因素是決定著作權侵權防禦機制成效的主要因素,其中決策者典範與支持為關鍵支配因素。企業主得以參考分析結果所繪製之高影響因素與受影響因素關係圖管理與擬定著作權侵權管理機制之執行方針,有助企業主於短期内建構適合自身企業的著作權侵權防禦機制。
With the widely use of computer software within the enterprise, the software copyright infringement case also increase day-by. Enterprises for failing to establish appropriate copyright infringement defense mechanisms exposed to the risk of copyright infringement litigation. This study interviewed five copyright infringement litigation experienced experts face to face and applied content analysis method to extract the 12 key indicators of the defense mechanisms of copyright infringement. The Decision Making Trial and Evaluation Laboratory (DEMATEL) was further used to identify the indicators into reason group index table with the results of group index. The study concluded that the decision-makers' model and support, infringement punishment, and software audit are three key factors in determine the effectiveness of the defense mechanisms of copyright infringement. Among these factors, decision-makers' model and support is the key dominant factor. The result of this research can be reference for managers while developing and implementing the copyright infringement defense mechanism.
期刊論文
1.Hand, P.(2006)。Intellectual property rights business management practices: A survey of the literature。Technovation,26(8),895-931。  new window
2.Lin, C.-L.(2015)。A Novel Hybrid Decision-Making Model for Determining Product Position under Consideration of Dependence and Feedback。Applied Mathematical Modelling,39(8),2194-2216。  new window
3.Laplume, A.、Pathak, S.、Xavier-Oliveira, E.(2014)。The politics of intellectual property rights regimes: An empirical study of new technology use in entrepreneurship。Technovation,34(12),807-816。  new window
4.Cao, Q.(2014)。Insight into weak enforcement of intellectual property rights in China。Technology in Society,38,40-47。  new window
5.Bader, M. A.、Gassmann, O.、Ruether, F.、Ziegler, N.(2012)。The role of IT for managing intellectual property--An empirical analysis。World Patent Information,34(3),216-223。  new window
6.Jeong, B. K.、Khouja, M.(2013)。Analysis of the effectiveness of preventive and deterrent piracy control strategies: agent-based modeling approach。Computers in Human Behavior,29(6),2744-2755。  new window
7.Kassarjian, H. H.、Kassarjian, W. M.(1988)。The impact of regulation on advertising: A content analysis。Journal of Consumer Policy,11(3),269-285。  new window
8.Im, J. H.、Koen, C. M.(1997)。Software piracy and its legal implications。Information and Management,31(5),265-272。  new window
9.Lin, C. L.、Tzeng, G. H.(2009)。A value-created system of science (technology) park by using DEMATEL。Expert Systems with Applications,36(6),9683-9697。  new window
10.Sukarmijan, S. S.、Sapong, O. D. V.(2014)。The importance of intellectual property for SMEs; challenges and moving forward。UMK Proce-dia,1,74-81。  new window
11.Hwang, K. P.、Wang, M. K.(2012)。Key factors for the successful evaluation and screening of managers of the intellectual property rights speciality。Expert Systems with Applications,39(2),2237-2238。  new window
12.Seyed-Hosseini, S. M.、Safaei, N.、Asgharpour, M. J.(2006)。Reprioritization of failures in a system failure mode and effects analysis by decision making trial and evaluation laboratory technique。Reliability Engineering & System Safety,91(8),872-881。  new window
13.Tzeng, Gwo-Hshiung、Chiang, Cheng-Hsin、Li, Chung-wei(2007)。Evaluating intertwined effects in e-learning programs: A novel hybrid MCDM model based on factor analysis and DEMATEL。Expert Systems with Applications,32(4),1028-1044。  new window
學位論文
1.黃韻樺(2010)。建構社區生態旅遊之知識結構-以社頂生態旅遊為例(碩士論文)。國立屏東商業技術學院,屏東。  延伸查詢new window
2.黎明憲(2009)。以內容分析法分析台灣ERP產業(碩士論文)。世新大學。  延伸查詢new window
圖書
1.趙晉枚、蔡財坤、周慧芳、謝銘洋、張凱娜(2011)。智慧財產權入門。台北:元照出版社。  延伸查詢new window
2.Krippendorff, Klaus H.(2013)。Content Analysis: An Introduction to Its Methodology。Sage。  new window
3.Holsti, Ole R.(1969)。Content Analysis for the Social Sciences and Humanities。Addison-Wesley Publishing Company。  new window
4.McQuail, Denis(1994)。Mass Communication Theory。London:Sage。  new window
5.陳家駿(1993)。電腦程式著作權專題研究。台北市:信孚法律事務所。  延伸查詢new window
6.陳家駿(2000)。智財權教戰守則。臺北市:財團法人資訊工業策進會科技法律中心。  延伸查詢new window
7.呂璋卿、周天(2000)。科技管理vs.法律策略。台北市:財團法人資訊工業策進會科技法律中心。  延伸查詢new window
8.陳國慈(2004)。科技企業與智慧財產。新竹市:國立清華大學出版社。  延伸查詢new window
9.喻幸園(2001)。智慧財產權之策略與管理。台北市:元照。  延伸查詢new window
10.資策會MIC智慧財產權研究小組(1993)。智慧財產權管理手冊。台北市:財團法人資訊工業策進會資訊與電腦出版社。  延伸查詢new window
11.王文科(1990)。教育研究法。五南圖書出版社。new window  延伸查詢new window
12.王石番(1991)。傳播內容分析法--理論與實踐。台北:幼獅文化。  延伸查詢new window
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top
:::
無相關著作
 
QR Code
QRCODE