Piracy Activity vs. Product Features in Digital Games - OpenArchive ...
Piracy Activity vs. Product Features in Digital Games - OpenArchive ...
Piracy Activity vs. Product Features in Digital Games - OpenArchive ...
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Netherlands. Available from: http://www.tno.nl/content.cfm?context<br />
=thema&content=<strong>in</strong>no_publicatie&laag1=897&laag2=918&item_id<br />
=473.<br />
[17] International Intellectual Property Alliance (IIPA). 2010. 2010<br />
Special 301 Report on Copyright Protection and Enforcement.<br />
Available from: www.iipa.com.<br />
[18] KIRK, R. 2010. Special 301 Report 2010. Published by the<br />
Office of the United States Trade Representative, United States of<br />
America. Available from:<br />
http://bangkok.usembassy.gov/root/pdfs/2010_special_301_report.p<br />
df.<br />
[19] Klepek, P. 2008. Bethesda Is Tired Of Spend<strong>in</strong>g Money<br />
Support<strong>in</strong>g Software Pirates. MTV Multiplayer, October 13 2008.<br />
Available from: http://multiplayerblog.mtv.com<br />
/2008/10/13/bethesda-deals-with-pirates/.<br />
[20] LeBlond, S., Legout, A., Lefessant, F. Dabbous, W. and<br />
Kaafar, M. A. 2010. Spy<strong>in</strong>g the World from Your Laptop: Identify<strong>in</strong>g<br />
and Profil<strong>in</strong>g Content Providers and Big Downloaders <strong>in</strong><br />
BitTorrent. In Proceed<strong>in</strong>gs of the 3rd USENIX Workshop on Large-<br />
Scale Exploits and Emergent Threats, USENIX Association, 4-4.<br />
[21] Maier, G., Feldmann, A., Paxson, V. and Allman, M. 2009. On<br />
dom<strong>in</strong>ant characteristics of residential broadband <strong>in</strong>ternet traffic. In<br />
Proceed<strong>in</strong>gs of the 9th ACM SIGCOMM Conference on Internet<br />
Measurement, ACM, 90-102.<br />
[22] Mccoy, D., Bauer, K., Grunwald, D., Kohno, T. and Sicker, D.<br />
2008. Sh<strong>in</strong><strong>in</strong>g Light <strong>in</strong> Dark Places: Understand<strong>in</strong>g the Tor Network.<br />
In Proceed<strong>in</strong>gs of the Proceed<strong>in</strong>gs of the 8th <strong>in</strong>ternational<br />
symposium on Privacy Enhanc<strong>in</strong>g Technologies, ACM, 63-76.<br />
[23] Piatek, M., Kohno, T. and Krishnamurty, A. 2008. Challenges<br />
and directions for monitor<strong>in</strong>g P2P file shar<strong>in</strong>g networks-or: why my<br />
pr<strong>in</strong>ter received a DMCA takedown notice. In Proceed<strong>in</strong>gs of the<br />
Proceed<strong>in</strong>gs of the 3rd conference on Hot topics <strong>in</strong> security, USE-<br />
NIX Association, 1-7.<br />
[24] Rab<strong>in</strong>, S. 2010. Introduction to Game Development. Charles<br />
River Media.<br />
[25] Sanchez, J. 2008. 750,000 lost jobs? The dodgy digita beh<strong>in</strong>d<br />
the war on piracy. Ars Technica, October 7 th , 2008. Available from:<br />
http://arstechnica.com/tech-policy/news/2008/10/dodgy-digitsbeh<strong>in</strong>d-the-war-on-piracy.ars<br />
[26] Schulze, H., and Mochalski, K. 2009. Internet Study<br />
2008/2009. Available from: http://www.ipoque.com/study/ipoque-<br />
Internet-Study-08-09.pdf.<br />
[27] Sigle, D. 2010 Critical Values of the Pearson <strong>Product</strong>-<br />
Moment Correlation Coefficient. Neagle School of Education -<br />
University of Connecticut. Available from:<br />
http://www.gifted.uconn.edu/siegle/research/correlation/corrchrt.ht<br />
m<br />
[28] Stryszkowski, P. and Scorpecci, D. 2009. <strong>Piracy</strong> of <strong>Digital</strong><br />
Content. OECD Publish<strong>in</strong>g.<br />
[29] The Tor Project: Anonymity Onl<strong>in</strong>e. 2010. Available from:<br />
http://www.torproject.org/<br />
[30] TorrentFreak. 2010. Call of Duty Black Ops Most Pirated<br />
Game of 2010. TorrentFreak. December 28 2010. Available from:<br />
http://torrentfreak.com/call-of-duty-black-ops-most-pirated-gameof-2010-101228/.<br />
[31] Wolchok, S., and Halderman, J. A. 2010. Crawl<strong>in</strong>g BitTorrent<br />
DHTs for Fun and Profit. In Proceed<strong>in</strong>gs of the 4 th USENIX Workshop<br />
on Offensive Technologies, USENIX Association, 112-113.<br />
[32] Yang, D., Sonmez, M., Bosworth, D. and Fryxell, G. 2009.<br />
Global Software <strong>Piracy</strong>: Search<strong>in</strong>g for Further Explanations. Journal<br />
of Bus<strong>in</strong>ess Ethics 87, 269-283.<br />
8