This study examines the persistence of software piracy with internet penetration vis-à-vis of PC users, conditional on Intellectual Property Rights (IPRs) institutions. The empirical evidence is based on a panel of 99 countries for the period 1994-2010 and the Generalised Method of Moments. The main finding is that, compared to internet penetration, PC usage is more responsible for the persistence of global software piracy. Knowing how technology affects the persistence of piracy is important because it enables more targeted policy initiatives. We show that the sensitivity of software piracy to IPRs mechanisms is contingent on the specific technology channels through which the pirated software is consumed
This paper examines two dimensions of the software piracy-development nexus to complement existing f...
This paper identifies that Information and Communication Technology (ICT) has a negative effect on s...
The proliferation of technology to produce pirated software has prompted key questions in policy dec...
This study examines the persistence of software piracy with internet penetration vis-à-vis of PC use...
This paper is an extension of the debate on the nexus between the strength of IPRs and prospects for...
This study examines the efficiency of tools for fighting software piracy in the conditional distribu...
This study examines the efficiency of tools for fighting software piracy in the conditional distribu...
With the proliferation of technology used to prate software, this paper answers some key questions i...
In this paper, we examine global trajectories, dynamics, and tendencies of software piracy to ease t...
In the current efforts towards harmonizing IPRs regimes in the African continent, this paper provide...
This paper is an extension of the debate on the nexus between the strength of IPRs and prospects for...
In the current efforts towards harmonizing IPRs regimes in the African continent, this paper provide...
This paper examines two dimensions of the software piracy-development nexus to complement existing f...
This study examines the efficiency of tools for fighting software piracy in the conditional distribu...
In the current efforts of harmonizing the standards and enforcement of IPRs protection worldwide, th...
This paper examines two dimensions of the software piracy-development nexus to complement existing f...
This paper identifies that Information and Communication Technology (ICT) has a negative effect on s...
The proliferation of technology to produce pirated software has prompted key questions in policy dec...
This study examines the persistence of software piracy with internet penetration vis-à-vis of PC use...
This paper is an extension of the debate on the nexus between the strength of IPRs and prospects for...
This study examines the efficiency of tools for fighting software piracy in the conditional distribu...
This study examines the efficiency of tools for fighting software piracy in the conditional distribu...
With the proliferation of technology used to prate software, this paper answers some key questions i...
In this paper, we examine global trajectories, dynamics, and tendencies of software piracy to ease t...
In the current efforts towards harmonizing IPRs regimes in the African continent, this paper provide...
This paper is an extension of the debate on the nexus between the strength of IPRs and prospects for...
In the current efforts towards harmonizing IPRs regimes in the African continent, this paper provide...
This paper examines two dimensions of the software piracy-development nexus to complement existing f...
This study examines the efficiency of tools for fighting software piracy in the conditional distribu...
In the current efforts of harmonizing the standards and enforcement of IPRs protection worldwide, th...
This paper examines two dimensions of the software piracy-development nexus to complement existing f...
This paper identifies that Information and Communication Technology (ICT) has a negative effect on s...
The proliferation of technology to produce pirated software has prompted key questions in policy dec...