Reference: | 中文部分 中央社舊金山專電 (2002),「微軟指仿冒從未考慮進入台灣校園」,91 年 4 月19 日。 洪朝貴 (1999),自由軟體在台灣資訊教育的應用,資訊與教育,71,2-9。 ETtoday (2006),「網路追追追/BSA大規模掃蕩企業及個人盜版 Windows?」,95年 3 月 17 日,網頁:http://www.ettoday.com/2006/03/07/339- 1913656.html. ZDNet (2008),專訪Richard Stallman:學校教育應只用自由軟體。 英文部分 Alvisi, M., Argentesi, E. and E. Carbonara (2002), “Piracy and Quality Choice in Monopolistic Markets,” University of Bologna, Mimeo. Bae, S. H. and J. P. Choi (2006), “A Model of Piracy,” Information and Economics Policy, 18, 303-320. Banerjee, D. S. (2003), “Software Piracy: A Strategic Analysis and Policy Instruments,” International Journal of Industrial Organization, 21, 97-127. Banerjee, D. S. (2006), “Lobbying and Commercial Software Piracy,” European Journal of Political Economy, 22, 139-155. Banerjee, D. S., Banerjee, T. and A. Raychaudhuri (2008), “Optimal Enforcement and Anti-copying Strategies to Counter Copyright Infringement,” The Japanese Economic Review, 59, 519-535. Belleflamme, P. (2003), “Pricing Information Goods in the Presence of Coping,” In: Gordon, W. J., Watt, R. (Eds.), The Economics of Copyright. Developments in Research and Analysis. Edward Elgar. Chen, Y. and I. Png (2003), “Information Goods Pricing and Copyright Enforcemtnt : Welfare Analysis,” Information Systems Research, 14, 107-123. Conner, K. R. and R. Rumelt (1991), “Software Piracy: An Analysis of Protection Strategies,” Management Science, 37, 125-137. Corey, G. and S. Junarkar (1998), “Gates, Buffett a Bit Bearish,” http://news. cnet.com/2100-1023-212942.html Deneckere, R. J. and R.P. McAfee (1996), “Damaged Goods,” Journal of Economics and Management Strategy, 5, 149-174. Gayer, A. and O. Shy (2003), “Internet and Peer-to-peer Distributions in Markets for Digital Products,” Economics Letters, 81, 51-57. Gil, R. (2006), “The Economics of IPR Protection Policies,” Review of Network Economics, 5, 299-319. Haruvy, E. and A. Prasad (1998), “Optimal Product Strategies in the Presence of Network Extenalities,” Information Economic and Policy, 10, 489-499. Haruvy, E. and A. Prasad (2001), “Optimal Freeware Quality in the Presence of Network Extenalities : An Evolutionary Game Theoretical Approach,” Journal of Evolutionary Economics, 11, 231-248. Higgins, R. S. and P. H. Rubin (1986), “Counterfeit Goods,” Journal of Law and Economics, 29, 211-230. Jing, B. (2000), “Versioning Information Goods with Network Externalities,” 21st International Congerence on Information (ICIS), Brisbane, Australia. King, S. P. and R. Lampe (2003), “Network Externalities, Price Discrimination and Profitable Piracy,” Information Economics and policy, 15, 271-290. Paul McDougall (2007), “If You’re Going To Steal Software, Steal From Us :Microsoft Exec,” InformatiomWeek, http://www.informationweek.com/story/showArticle.jhtml?articleID=198000211 Peitz, M. and P. Waelbroeck (2006), “Piracy of Digital Products : A Critical Review of the Theoretical Literature,” Information Economics and Policy, 18, 449-476. Slive, J. and D. Bernhardt (1998), “Pirated for Profit,” Canadian Journal of Economics, 31:4, 887-899. Takeyama, L. (1994), “The Welfare Implications of Unauthorized Reproduction of Intellectual Property in the Presence of Network Externalities,” Journal of Industrial Economics, 62, 155-166. Yoon, K. (2002), “The Optimal Level of Copyright Protection,” Information Economics and Policy, 14, 327-348. |