{"title":"使用复制的软件:您的工作产品处于危险之中","authors":"R. Kruger","doi":"10.1109/WESCON.1994.403606","DOIUrl":null,"url":null,"abstract":"The computer software industry is one of the greatest business success stories in recent history, representing one of the fastest growing segments of the U.S. Economy while also dominating world markets. In the United States alone, 35 percent of the software in use is obtained illegally, with losses estimated at $2.3 billion in 1993. Software piracy occurs in many different ways. Five of the most common forms are: hard-disk loading, end-user piracy, counterfeiting goods, software rentals, and bulletin board piracy. Many businesses and end-users do not realize the risks associated with using copied software. Not only is using copied software against the law, the work product and consequently, a company's competitive edge is at stake. The paper considers enforcement activities around the world.<<ETX>>","PeriodicalId":136567,"journal":{"name":"Proceedings of WESCON '94","volume":"35 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1994-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Using copied software: your work product at risk\",\"authors\":\"R. Kruger\",\"doi\":\"10.1109/WESCON.1994.403606\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The computer software industry is one of the greatest business success stories in recent history, representing one of the fastest growing segments of the U.S. Economy while also dominating world markets. In the United States alone, 35 percent of the software in use is obtained illegally, with losses estimated at $2.3 billion in 1993. Software piracy occurs in many different ways. Five of the most common forms are: hard-disk loading, end-user piracy, counterfeiting goods, software rentals, and bulletin board piracy. Many businesses and end-users do not realize the risks associated with using copied software. Not only is using copied software against the law, the work product and consequently, a company's competitive edge is at stake. The paper considers enforcement activities around the world.<<ETX>>\",\"PeriodicalId\":136567,\"journal\":{\"name\":\"Proceedings of WESCON '94\",\"volume\":\"35 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1994-09-27\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of WESCON '94\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/WESCON.1994.403606\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of WESCON '94","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WESCON.1994.403606","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The computer software industry is one of the greatest business success stories in recent history, representing one of the fastest growing segments of the U.S. Economy while also dominating world markets. In the United States alone, 35 percent of the software in use is obtained illegally, with losses estimated at $2.3 billion in 1993. Software piracy occurs in many different ways. Five of the most common forms are: hard-disk loading, end-user piracy, counterfeiting goods, software rentals, and bulletin board piracy. Many businesses and end-users do not realize the risks associated with using copied software. Not only is using copied software against the law, the work product and consequently, a company's competitive edge is at stake. The paper considers enforcement activities around the world.<>