BibTex RIS Kaynak Göster

SAHTECİLİK, KORSANLIK VE EKONOMİK SÜRDÜRÜLEBİLİRLİK: ÇATIŞAN MODELLER

Yıl 2013, Cilt: 2 Sayı: 4, 0 - 0, 01.07.2013

Öz

Aklınızda gelişen şeyin sahibi kimdir? Sahtecilik ve korsanlık araştırma için yeni bir alan olsa da uzun bir geçmişe
sahiptir.”Sürdürülebilir” genellikle “dayanılabilir” anlamına gelse de bir kavram olarak sürdürülebilirliği yorumlayabilmek
adına en az 255 yol vardır. Buradaki soru birbirlerinden farklı gibi görünen bu 2 modelin bir araya getirilip
getirilemeyeceğidir. Diğer taraftan, özgürlük ve yeniden dağıtım gibi sahtecilik ve korsanlık birbirine bağlı kavramlar haline
gelmişken sürdürülebilirlik nasıl zengin bir gelecek yaşanacağı sorusunu sorar. Bu kavramlar oranlanabilir mi? Sürdürülebilir
ekonomi alanında genellikle sermayenin 3 tip yönetimi (ekonomik, sosyal ve doğa) ve bunların tüketiminin baskı altında
olduğu kabul edilmektedir. Peki bu kavramın yasadışı üretilen malların tüketimi ve “soyut varlıkların” siber evrende akışıyla
nasıl bir ilgisi vardır?
Sahte mal üreticileri genellikle bir çeşit “stratejik planlama” yürüten ve iyi tanımlanmış stratejileri olabilen
karmaşık örgütlerdir. Staake, Thiess ve Fleisch (2009) söz konusu arz yönlü faaliyetlerin mekanizmalarını anlamak adına az
araştırma olduğunu ileri sürmüşlerdir. Günümüzdeki endişe bu tip faaliyetlerin ekonomik yapı içerisine kurumsallaşarak
girmesidir. Bulgular göstermektedir ki; kayıtdışı ekonominin piyasa ekonomisi üzerindeki etkisi anlamlıdır ve problem
düşünüldüğünden daha ciddi boyuttadır. Rakamlar farklılık arz etse de sahtecilik 10 yıl önceki dünya ticaretinin %5-7’si
olarak tahmin edilmiştir. (OECD, 98) Küçük şeyler gerçekten bilinen sorunun gerçek boyutuyla ya da ilgili oyuncuların
stratejik duruşuyla ilgilidir. Dolayısıyla sorulacak olan yeni soru şudur; ekonomik korsanların küresel pazarda stratejik roleri
nelerdir ve bunun ekonomik sürdürülebilirlik ile nasıl bir ilişkisi vardır? Bu soru yeni incelemeleri de beraberinde
getirmektedir. Peki bu gölge faaliyetleri olanlar aslında inovasyonun girişimci sürücüleri ve ekonomik kriz dönemlerindeki
pozitif güçler midir? Eğer öyleyse sürdürülebilirlik modelleri önerildiği gibi düzenlenmelidir.

Kaynakça

  • Adams, W. (2006). The Future of Sustainability: Re-thinking Environment and Development in the Twenty-first Century. Report of the IUCN Renowned Thinkers Meeting, 29-31 January 2006
  • Anderson, E., & Gatignon, H. (1986).Modes of foreign Entry: A transaction cost analysis and propositions. Journal of International Business Studies, 17 (3), 1-26.
  • Bacache, M., Bourreau, M., and Moreau, F. (2012).Piracy and Creation: The Case of the Music Industry (February 7, 2012).Available at http://ssrn.com/abstract=2000636.
  • Brouthers, K., Brouthers, L., & Werner, S. (2007) .Real options, international entry mode choice, and performance. Journal of Management Studies, 45 (5), 936-960.
  • Buckley, P.J., and Casson, M.C. (1976). The Future of the Multinational Enterprise, Homes&Meier: London.
  • Bulgaria leads in internet piracy in the EU ,(2010,April 27),The Sofia Echo.
  • Business Software Alliance. (2010).Seventh Annual BSA/IDC Global Software Piracy Study. Washington, DC: Business Software Alliance.
  • Chang, K.M. (1998). Predicting unethical behavior: A comparison of the theory of reasoned action and the theory of planned behavior. Journal of Business Ethics, 17 (16), 1825-34.
  • Chaudhry, .P.E., Zimmerman, A., Peters, J.A., & Cordell, V.C. (2009).Preserving intellectual property rights: Managerial insight into the escalating counterfeit market quandary. Business Horizons, 52, 57-66.
  • Christensen, Anne L. and Eining M. M. (1991). Factors influencing software piracy: Implications for accountants. Journal of Information Systems, 5, (1): 67-80.
  • Counterfeiters to Cost Europe ‘L200bn’, (2010, June 25), The Independent. d'Astous, A., Colbert, F., & and Montpetit D. (2005).Music piracy on the web How effective Are antipiracy arguments? Evidence from the theory of planned behavior, Journal of Consumer Policy, 28, 289-310.
  • Dyllick, T. & Hockerts, K. (2002). Beyond the business case for corporate sustainability. Business Strategy and the Environment, 11(2): 130-141
  • Dunnevant, L., Al Johar, T., Collier, J. Davis, M. and Dominic, Q. (2010).Illegal Pesticides in Poland. Paper for Strategic Management class at Virginia Commonwealth University.
  • Dunning, J.H. (2000). The eclectic paradigm as an envelope for economic and business theories on MNE activity. International Business Review, 9,163-190.
  • Dryden, J. (2007).Counting the cost: the economic impacts of counterfeiting and piracy.Paper presented to the Third Global Congress on Combating Counterfeiting and Piracy, Geneva, January.
  • Eisend, M., & Schuchert-Güler, P. (2006).Explaining Counterfeit Purchases: A Review and Preview. Academy of Marketing Science Review, 12, 1-22.
  • Engels, S. (2010). Counterfeiting and piracy: the industry perspective. Journal of Intellectual Property Law & Practice, (2010, March 31).
  • European Commission, (2009).Report on EU Customs Enforcement of Intellectual Property Rights, Results at the European Border –2008. Brussels: European Commission.
  • European Commission (2001). Towards a European strategy for preventing organised crime: Joint report from Commission Services and Europol. Brussels: Commission of the European Communities.
  • European Parliament resolution on the EU-US Summit of November 28, 2011". European Parliament. November 15, 2011. http://www.pcworld.com/businesscenter/article/244247/ european_parliament_joins_criticism_of_sopa.html . (Retrieved March 18, 2012)
  • European Parliament. "On the transparency and state of play of the ACTA negotiations". Resolution.
  • European Parliament. 10 March 2010. http://www.europarl.europa.eu/sides/getDoc.do?type=TA&reference=P7- TA-2010-0058&language=EN&ring=P7-RC-2010-0154. (Retrieved 18 March 2012)
  • "Fact Sheet: Anti-Counterfeiting Trade Agreement" (PDF). European Commission. 23 October 2007 (Updated November 2008). http://trade.ec.europa.eu/doclib/docs/2008/october/tradoc_140836.11.08.pdf . (Retrieved 17 March 2012.)
  • Fewer Hungarians consider buying pirated,counterfeit goods. August 9th, 2011 http://www.visegradgroup.eu/news/)
  • Fleisch E. (2006). Auto-ID Technologies and their Impact on Counterfeiting. Presentation at the MIT Convocation, January 23-24, 2006.
  • Fleming, M.H., Roman, J., & Farrell, G. (2000). The shadow economy. Journal of International Affairs, 53, (2), 387-409.
  • Franses, P.H.,& Lede,M.(2010). Diffusion of original and counterfeit products in a developing country. (Econometric Institute Report 2010-08).Rotterdam, The Netherlands: Erasmus School of Economics.
  • Frontier Economics.(2011).The economic and social impacts of counterfeiting and piracy in Turkey.London:Frontier Economics.
  • Gentry, J.W., Putrevu, S., and Shultz, II, C. J. (2006). The effects of counterfeiting on consumer search. Journal of Consumer Behaviour, 5, (September): 1-12.
  • Glass, R. S., and Wood, W. A. (1996). Situational determinants of software piracy: An equity theory perspective. Journal of Business Ethics, 15, 1189-98.
  • Guiterez, C., Verheugen, G., Mandelson, P., & Schwab, S. (2006, June). Countering counterfeiting. The Wall Street Journal, Eastern Edition, p.A20.
  • Guillén,M. F.(2003), Experience, imitation, and the sequence of foreign entry: Wholly owned and jointventure manufacturing by South Korean firms and business groups in China, 1987-1995 .Journal of International Business Studies, Vol. 34(2), 185-198.
  • Havocscope. (2010;2013).Black Market Rankings. Online database. Honolulu, HI. Retrieved from http://www.havocscope.com/
  • Heller,M.,& and Eisenberg,R.S.(1998). Can patents deter innovation? The anticommons in biomedical research. Science, 280, (1), 698-701.:
  • Hennart, J-F., (2009).Down with MNE-centric theories! Market entry and expansion as the bundling of MNE and local assets. Journal of International Business Studies, 40(9), 1432-1454.
  • Holling, C. S. (2000). "Theories for Sustainable Futures" Conservation Ecology 4(2): 7.
  • Hungarian Customs and Finance Guard (http://www.vam.hu/mainMenu.do?modulId=11)
  • Hinze, G. (February 17, 2012) EU Court of Justice: Social Networks Can’t Be Forced to Monitor and Filter to Prevent Copyright Infringement (Electronic Frontier Foundation)
  • International Intellectual Property Alliance. (February 8, 2013) 2013 Special 301 Report:Turkey. Washington:IIPA.
  • Internet Society.(2013). Issues Paper on Intellectual Property on the Internet.Geneva:Internet Society.
  • Johanson, J. & Wiedersheim, P., (1975). The internationalization of the firm: Four Swedish cases. Journal of Management Studies, 12 (3), 305-322.
  • Konstantakis N. I., Palaigeorgiou G. E., Siozos P. D., & Tsoukalas I.A. (2010).What do computer science students think about software piracy. Behaviour & Information Technology, 1362-3001, 29, (3), 277 – 285.
  • Kuo, F-Y. & Hsu, M-H. (2001). Development and validation of ethical computer Self-efficacy measure: The case of softlifting. Journal of Business Ethics, 32 (4): 299-315.
  • Leeson, P.T., & Rogers, D.B. Organizing crime. (Working paper series, George Mason University, 2009), 1-41.
  • Leibold, M., Probst, G.J.B., and Gibbert, M. (2002). Strategic management in the knowledge economy; new approaches and business. Erlangen: Publicis.
  • Levitt, S. and Venkatesh, S.A. (2000). An Economic analysis of a drug-selling gang’s finances. The Quarterly Journal of Economics, Vol. XX, 755-789.
  • Loayza, N. V. (1997).The Economics of the informal sector: A simple model and some empirical evidence from Latin America. World Bank Policy Research Department, Working Paper 1727.
  • Luo, Y. (2001).Determinants of entry in an emerging economy: A multilevel approach," Journal of Management Studies, 38(3), 443-72.
  • Madhok, A. (1998). The nature of multinational firm boundaries: Transaction costs, firm capabilities, and foreign market entry mode. International Business Review, 7,259-290.
  • Mann.S. (2011), There are at least 255 ways to visualize sustainability. “Sustainable Lens: A visual guide" (December 2011):
  • Mason, M. (2008). The Pirate’s Dilemma: How Youth Culture Is Reinventing Capitalism. New York: Free Press.
  • Montoro-Pons, J.D., & Cuadrado-Garcia, M. (2006). Digital goods and the effects of copying: An empirical study of the music market. Paper presented at the 14th International Conference on Cultural Economics, Vienna, Austria, and July 6–9, 2006.
  • Moulton, W.N., Thomas, H., & Pruett (1996).Business failure pathways: Environmental stress and organizational response. Journal of Management, 22, 4, 571-595.
  • OECD. (2008).The Economic Impact of Counterfeiting and Piracy. Paris: OECD.
  • One in four bottles of liquor is counterfeit, (28 April 2010), The Prague Post.
  • Open Rights Group (www.openrightsgroup.org/campaigns/stopacta) (Accessed March 18, 2012).
  • Piracy has recently gained a new name-"sharing with others". Polish Patent Office,2012.
  • Phillips, T. (2005). Knockoff: The Deadly Trade in Counterfeit Goods, Sterling, VA; Kogan Page, Ltd.
  • Proserpio, L., Salvemini, S., & Ghiringhelli, V. (2005).Entertainment pirates: Understanding piracy determinants in the movie, music, and software industries. International Journal of Arts Management; Fall, (8), 1-19.
  • Qian, Y. (2008). Impacts of entry by counterfeiters. The Quarterly Journal of Economics, November, 1577-1609.
  • Parthasarathy, M. & Mittelstaedt, R.A. (1995). Illegal adoption of a new product: A model of software piracy behavior. In Advances in Consumer Research 22, Eds. Frank R. Kardes and Mita Sujan. Provo, UT: Association for Consumer Research, 693-98.
  • Peace, Graham A., Dennis F. Galletta, and James Y. L. Thong. (2003). Software piracy in the workplace: A model and empirical test. Journal of Management Information Systems, 20 (1), 153-177.
  • Penz, E., & Stöttinger, B. 2005. Forget the "Real" thing - Take the copy! An explanatory model for the volitional purchase of counterfeit products." In Advances in Consumer Research 32, Eds. Geeta Menon and Akshay R. Rao. Duluth, MN: Association for Consumer Research, 568-75.
  • Prendergast, G., Chuen,L.H.,& Phau, I.(2002). Understanding consumer demand for Non-deceptive pirated brands. Marketing Intelligence & Planning, 20 (7): 405-16.
  • Raustiala, K., & Sprigman, C. (2006).The piracy paradox: Innovation and intellectual property in fashion design. Virginia Law Review, 92, (8), 1687-1777.
  • Report of the Commission on Intellectual Property Rights, Integrating Intellectual Property Rights and Development Policy, London September 2002 (http://www.iprcommission.org/papers/text/final_report/. reporthtmfinal.htm.)
  • Republic of Slovenia – Enforcement of IP Right, http://www.uil-sipo.si/sipo/office/about-us/iprenforcement/ (July 14, 2010)
  • Root, F.R. (1994). Entry strategies for international markets. London: Lexington Books.
  • Reitman, R. and Tien, L. Rogers’ “Cybersecurity” Bill Is Broad Enough to Use Against WikiLeaks and The Pirate Bay) Electronic Frontier Foundation.
  • Reitzig, M., & Puranam, P. (2009). Value appropriation as an organizational capability: The case of IP protection through patents. Strategic Management Journal, 30,765-789.
  • Rutter, J. & Bryce, J. (2008). The consumption of counterfeit goods:’ Here be pirates?’Sociology, 42, (6), 1146-1162.
  • Santos, J. F., & Ribeiro, J.C. (2006). An exploratory study of the relationship between counterfeiting and culture. Tékhne, (5-6), .227-243.
  • Schneider F., & Enste ,D. H. (2000). Shadow economies: Size, causes, and consequences. Journal of Economic Literature, 38(1), 77-114.
  • Schumpeter, J.A. (1942).Capitalism, Socialism, and Democracy. New York: Harper Perennial
  • Shadlen, K.C., Schrank, A., & Kurtz, M.J. (2005). The political economy of intellectual property protection: The case of software. International Studies Quarterly, 49, 45-71.
  • Slovak Pirate Party. Website. Accessed, March 17, 2012.
  • Slovak Spectator, March 5-11, 2012) ACTA Would be Good, Says Lawyer.
  • Sombart, W (1913). Luxury and capitalism (English translation).Ann Arbor: University of Michigan Press.
  • Staake, T., Thiesse, F., & Fleisch, E. (2009). Commentary: The emergence of counterfeit trade: a literature review. European Journal of Marketing, 43, (3/4), 320-349.
  • The music man. (2013,April 2),The Economist .
  • Thong, J., & Yap, C-S. (1998). Testing an ethical decision-making theory: the case of softlifting. Journal of Management Information Systems, 15, (1), 213-237.
  • UK Intellectual Property Office (http://www.ipo.gov.uk/home.htm)
  • United Nations Office on Drugs and Crime (June 2010).The globalization of crime: A transnational organized crime threat assessment (PDF).New York: United Nations.
  • United States House of Representatives. Press Resources; Committee on the Judiciary; October 26, 2011.
  • Wagner, S. & Sanders, G. (2001).Considerations in ethical Decision-making and software piracy. Journal of Business Ethics, 29, (1-2), 161-167.
  • Webb, J.T., Tihanyi, L., Ireland, R.D., & Sirmon, D.G., (2009).You say illegal, I say legitimate Entrepreneurship in the informal economy. Academy of Management Review, 34, (3), 492-510.
  • Wikipedia [online] (2010).Intellectual Property. Retrieved from http://www.wikipedia.com
  • Wilke, R., & Zaichkowsky, J.L. (1999). Brand imitation and its effects on innovation, competition, and brand equity. Business Horizon (November/December), 9-18
  • Wooley, D. J., & Eining, M.M. (2006).Software piracy among accounting students: A longitudinal comparison of changes and sensitivity. Journal of Information Systems 20 (1), 49.
  • World Commission on Environment and Development (WCED). Our common future. Oxford: Oxford University Press, 1987 p. 43.
  • World Customs Organization, (2008). Customs and IPR Report. Brussels: World Customs Organization.
  • Yang, D., Sonmex, M., Bosworth, D., & Fryxell, G. (2009).Global software piracy:Searching for further explanations. Journal of Business Ethics, 87,269-283.
  • Yoo, B., & S.-H.-Hee Lee. (2005). Do Counterfeits Promote Genuine Products?Working Paper, Hofstra University, Hempstead, NY.
  • Zhang, Y., Zhang, Z., & Liu, Z. (2007). Choice of entry modes in sequential FDI in an emerging economy. Management Decision, 45(4), 749-772.
  • Zhao, X. & Decker, R. (2004). Choice of foreign market entry mode. Working paper, University of Bielefeld

COUNTERFEITING, PIRACY AND ECONOMIC SUSTAINABILITY: MODELS IN CONFLICT?

Yıl 2013, Cilt: 2 Sayı: 4, 0 - 0, 01.07.2013

Öz

Who owns what develops in your mind? Counterfeiting and piracy have a lengthy history, yet are a youthful field when it comes to research.While generally accepted that 'sustainable' means 'to endure', sustainability as a concept is still open to interpretation (Holling, 2000) with at least 255 ways to visualize this concept. (Mann 2011) The question then becomes can you piece together two models which appear to be at odds with one another? On one hand, sustainability asks the question of how to leave a rich(er) future while piracy and counterfeiting are wrapped in terms such as freedom and redistribution.Are these concepts at odds? In the area of sustainable economics, it is generally accepted that there must be a management of three types of capital (economic, social, and natural) and that their consumption may be seen to be under stress (Dyllick and Hockerts, 2002). But how does this concept relate to the consumption of illegally produced goods and those 'intangibles' which flow through a cyberspace universe? Producers of counterfeit goods often are complex organizations who carry out some form of ‘strategic planning’ and who may have well-defined strategies. Staake, Thiesse, and Fleisch (2009) note that little research exists for understanding the mechanisms of such supply side activities. Of concern today is that such activities appear to becoming institutionalized into our economic fabric. Evidence indicates that the informal economy is both significant in its marketplace impact and that the problem is likely more severe than first imagined. While figures vary, counterfeiting alone was estimated to represent 5-7% of world trade over a decade ago (OECD, 1998). Little is really known relating either to the true size of the problem or to the strategic posture of the actors involved. Therefore, a new question exists which requires examination, namely what are the strategic roles of economic pirates in a global marketplace and how does this relate to economic sustainability? Are those who operate in the shadows actually entrepreneurial drivers of innovation and a positive force in times of economic downturn? If so, should they be regulated as models of sustainability generally suggest

Kaynakça

  • Adams, W. (2006). The Future of Sustainability: Re-thinking Environment and Development in the Twenty-first Century. Report of the IUCN Renowned Thinkers Meeting, 29-31 January 2006
  • Anderson, E., & Gatignon, H. (1986).Modes of foreign Entry: A transaction cost analysis and propositions. Journal of International Business Studies, 17 (3), 1-26.
  • Bacache, M., Bourreau, M., and Moreau, F. (2012).Piracy and Creation: The Case of the Music Industry (February 7, 2012).Available at http://ssrn.com/abstract=2000636.
  • Brouthers, K., Brouthers, L., & Werner, S. (2007) .Real options, international entry mode choice, and performance. Journal of Management Studies, 45 (5), 936-960.
  • Buckley, P.J., and Casson, M.C. (1976). The Future of the Multinational Enterprise, Homes&Meier: London.
  • Bulgaria leads in internet piracy in the EU ,(2010,April 27),The Sofia Echo.
  • Business Software Alliance. (2010).Seventh Annual BSA/IDC Global Software Piracy Study. Washington, DC: Business Software Alliance.
  • Chang, K.M. (1998). Predicting unethical behavior: A comparison of the theory of reasoned action and the theory of planned behavior. Journal of Business Ethics, 17 (16), 1825-34.
  • Chaudhry, .P.E., Zimmerman, A., Peters, J.A., & Cordell, V.C. (2009).Preserving intellectual property rights: Managerial insight into the escalating counterfeit market quandary. Business Horizons, 52, 57-66.
  • Christensen, Anne L. and Eining M. M. (1991). Factors influencing software piracy: Implications for accountants. Journal of Information Systems, 5, (1): 67-80.
  • Counterfeiters to Cost Europe ‘L200bn’, (2010, June 25), The Independent. d'Astous, A., Colbert, F., & and Montpetit D. (2005).Music piracy on the web How effective Are antipiracy arguments? Evidence from the theory of planned behavior, Journal of Consumer Policy, 28, 289-310.
  • Dyllick, T. & Hockerts, K. (2002). Beyond the business case for corporate sustainability. Business Strategy and the Environment, 11(2): 130-141
  • Dunnevant, L., Al Johar, T., Collier, J. Davis, M. and Dominic, Q. (2010).Illegal Pesticides in Poland. Paper for Strategic Management class at Virginia Commonwealth University.
  • Dunning, J.H. (2000). The eclectic paradigm as an envelope for economic and business theories on MNE activity. International Business Review, 9,163-190.
  • Dryden, J. (2007).Counting the cost: the economic impacts of counterfeiting and piracy.Paper presented to the Third Global Congress on Combating Counterfeiting and Piracy, Geneva, January.
  • Eisend, M., & Schuchert-Güler, P. (2006).Explaining Counterfeit Purchases: A Review and Preview. Academy of Marketing Science Review, 12, 1-22.
  • Engels, S. (2010). Counterfeiting and piracy: the industry perspective. Journal of Intellectual Property Law & Practice, (2010, March 31).
  • European Commission, (2009).Report on EU Customs Enforcement of Intellectual Property Rights, Results at the European Border –2008. Brussels: European Commission.
  • European Commission (2001). Towards a European strategy for preventing organised crime: Joint report from Commission Services and Europol. Brussels: Commission of the European Communities.
  • European Parliament resolution on the EU-US Summit of November 28, 2011". European Parliament. November 15, 2011. http://www.pcworld.com/businesscenter/article/244247/ european_parliament_joins_criticism_of_sopa.html . (Retrieved March 18, 2012)
  • European Parliament. "On the transparency and state of play of the ACTA negotiations". Resolution.
  • European Parliament. 10 March 2010. http://www.europarl.europa.eu/sides/getDoc.do?type=TA&reference=P7- TA-2010-0058&language=EN&ring=P7-RC-2010-0154. (Retrieved 18 March 2012)
  • "Fact Sheet: Anti-Counterfeiting Trade Agreement" (PDF). European Commission. 23 October 2007 (Updated November 2008). http://trade.ec.europa.eu/doclib/docs/2008/october/tradoc_140836.11.08.pdf . (Retrieved 17 March 2012.)
  • Fewer Hungarians consider buying pirated,counterfeit goods. August 9th, 2011 http://www.visegradgroup.eu/news/)
  • Fleisch E. (2006). Auto-ID Technologies and their Impact on Counterfeiting. Presentation at the MIT Convocation, January 23-24, 2006.
  • Fleming, M.H., Roman, J., & Farrell, G. (2000). The shadow economy. Journal of International Affairs, 53, (2), 387-409.
  • Franses, P.H.,& Lede,M.(2010). Diffusion of original and counterfeit products in a developing country. (Econometric Institute Report 2010-08).Rotterdam, The Netherlands: Erasmus School of Economics.
  • Frontier Economics.(2011).The economic and social impacts of counterfeiting and piracy in Turkey.London:Frontier Economics.
  • Gentry, J.W., Putrevu, S., and Shultz, II, C. J. (2006). The effects of counterfeiting on consumer search. Journal of Consumer Behaviour, 5, (September): 1-12.
  • Glass, R. S., and Wood, W. A. (1996). Situational determinants of software piracy: An equity theory perspective. Journal of Business Ethics, 15, 1189-98.
  • Guiterez, C., Verheugen, G., Mandelson, P., & Schwab, S. (2006, June). Countering counterfeiting. The Wall Street Journal, Eastern Edition, p.A20.
  • Guillén,M. F.(2003), Experience, imitation, and the sequence of foreign entry: Wholly owned and jointventure manufacturing by South Korean firms and business groups in China, 1987-1995 .Journal of International Business Studies, Vol. 34(2), 185-198.
  • Havocscope. (2010;2013).Black Market Rankings. Online database. Honolulu, HI. Retrieved from http://www.havocscope.com/
  • Heller,M.,& and Eisenberg,R.S.(1998). Can patents deter innovation? The anticommons in biomedical research. Science, 280, (1), 698-701.:
  • Hennart, J-F., (2009).Down with MNE-centric theories! Market entry and expansion as the bundling of MNE and local assets. Journal of International Business Studies, 40(9), 1432-1454.
  • Holling, C. S. (2000). "Theories for Sustainable Futures" Conservation Ecology 4(2): 7.
  • Hungarian Customs and Finance Guard (http://www.vam.hu/mainMenu.do?modulId=11)
  • Hinze, G. (February 17, 2012) EU Court of Justice: Social Networks Can’t Be Forced to Monitor and Filter to Prevent Copyright Infringement (Electronic Frontier Foundation)
  • International Intellectual Property Alliance. (February 8, 2013) 2013 Special 301 Report:Turkey. Washington:IIPA.
  • Internet Society.(2013). Issues Paper on Intellectual Property on the Internet.Geneva:Internet Society.
  • Johanson, J. & Wiedersheim, P., (1975). The internationalization of the firm: Four Swedish cases. Journal of Management Studies, 12 (3), 305-322.
  • Konstantakis N. I., Palaigeorgiou G. E., Siozos P. D., & Tsoukalas I.A. (2010).What do computer science students think about software piracy. Behaviour & Information Technology, 1362-3001, 29, (3), 277 – 285.
  • Kuo, F-Y. & Hsu, M-H. (2001). Development and validation of ethical computer Self-efficacy measure: The case of softlifting. Journal of Business Ethics, 32 (4): 299-315.
  • Leeson, P.T., & Rogers, D.B. Organizing crime. (Working paper series, George Mason University, 2009), 1-41.
  • Leibold, M., Probst, G.J.B., and Gibbert, M. (2002). Strategic management in the knowledge economy; new approaches and business. Erlangen: Publicis.
  • Levitt, S. and Venkatesh, S.A. (2000). An Economic analysis of a drug-selling gang’s finances. The Quarterly Journal of Economics, Vol. XX, 755-789.
  • Loayza, N. V. (1997).The Economics of the informal sector: A simple model and some empirical evidence from Latin America. World Bank Policy Research Department, Working Paper 1727.
  • Luo, Y. (2001).Determinants of entry in an emerging economy: A multilevel approach," Journal of Management Studies, 38(3), 443-72.
  • Madhok, A. (1998). The nature of multinational firm boundaries: Transaction costs, firm capabilities, and foreign market entry mode. International Business Review, 7,259-290.
  • Mann.S. (2011), There are at least 255 ways to visualize sustainability. “Sustainable Lens: A visual guide" (December 2011):
  • Mason, M. (2008). The Pirate’s Dilemma: How Youth Culture Is Reinventing Capitalism. New York: Free Press.
  • Montoro-Pons, J.D., & Cuadrado-Garcia, M. (2006). Digital goods and the effects of copying: An empirical study of the music market. Paper presented at the 14th International Conference on Cultural Economics, Vienna, Austria, and July 6–9, 2006.
  • Moulton, W.N., Thomas, H., & Pruett (1996).Business failure pathways: Environmental stress and organizational response. Journal of Management, 22, 4, 571-595.
  • OECD. (2008).The Economic Impact of Counterfeiting and Piracy. Paris: OECD.
  • One in four bottles of liquor is counterfeit, (28 April 2010), The Prague Post.
  • Open Rights Group (www.openrightsgroup.org/campaigns/stopacta) (Accessed March 18, 2012).
  • Piracy has recently gained a new name-"sharing with others". Polish Patent Office,2012.
  • Phillips, T. (2005). Knockoff: The Deadly Trade in Counterfeit Goods, Sterling, VA; Kogan Page, Ltd.
  • Proserpio, L., Salvemini, S., & Ghiringhelli, V. (2005).Entertainment pirates: Understanding piracy determinants in the movie, music, and software industries. International Journal of Arts Management; Fall, (8), 1-19.
  • Qian, Y. (2008). Impacts of entry by counterfeiters. The Quarterly Journal of Economics, November, 1577-1609.
  • Parthasarathy, M. & Mittelstaedt, R.A. (1995). Illegal adoption of a new product: A model of software piracy behavior. In Advances in Consumer Research 22, Eds. Frank R. Kardes and Mita Sujan. Provo, UT: Association for Consumer Research, 693-98.
  • Peace, Graham A., Dennis F. Galletta, and James Y. L. Thong. (2003). Software piracy in the workplace: A model and empirical test. Journal of Management Information Systems, 20 (1), 153-177.
  • Penz, E., & Stöttinger, B. 2005. Forget the "Real" thing - Take the copy! An explanatory model for the volitional purchase of counterfeit products." In Advances in Consumer Research 32, Eds. Geeta Menon and Akshay R. Rao. Duluth, MN: Association for Consumer Research, 568-75.
  • Prendergast, G., Chuen,L.H.,& Phau, I.(2002). Understanding consumer demand for Non-deceptive pirated brands. Marketing Intelligence & Planning, 20 (7): 405-16.
  • Raustiala, K., & Sprigman, C. (2006).The piracy paradox: Innovation and intellectual property in fashion design. Virginia Law Review, 92, (8), 1687-1777.
  • Report of the Commission on Intellectual Property Rights, Integrating Intellectual Property Rights and Development Policy, London September 2002 (http://www.iprcommission.org/papers/text/final_report/. reporthtmfinal.htm.)
  • Republic of Slovenia – Enforcement of IP Right, http://www.uil-sipo.si/sipo/office/about-us/iprenforcement/ (July 14, 2010)
  • Root, F.R. (1994). Entry strategies for international markets. London: Lexington Books.
  • Reitman, R. and Tien, L. Rogers’ “Cybersecurity” Bill Is Broad Enough to Use Against WikiLeaks and The Pirate Bay) Electronic Frontier Foundation.
  • Reitzig, M., & Puranam, P. (2009). Value appropriation as an organizational capability: The case of IP protection through patents. Strategic Management Journal, 30,765-789.
  • Rutter, J. & Bryce, J. (2008). The consumption of counterfeit goods:’ Here be pirates?’Sociology, 42, (6), 1146-1162.
  • Santos, J. F., & Ribeiro, J.C. (2006). An exploratory study of the relationship between counterfeiting and culture. Tékhne, (5-6), .227-243.
  • Schneider F., & Enste ,D. H. (2000). Shadow economies: Size, causes, and consequences. Journal of Economic Literature, 38(1), 77-114.
  • Schumpeter, J.A. (1942).Capitalism, Socialism, and Democracy. New York: Harper Perennial
  • Shadlen, K.C., Schrank, A., & Kurtz, M.J. (2005). The political economy of intellectual property protection: The case of software. International Studies Quarterly, 49, 45-71.
  • Slovak Pirate Party. Website. Accessed, March 17, 2012.
  • Slovak Spectator, March 5-11, 2012) ACTA Would be Good, Says Lawyer.
  • Sombart, W (1913). Luxury and capitalism (English translation).Ann Arbor: University of Michigan Press.
  • Staake, T., Thiesse, F., & Fleisch, E. (2009). Commentary: The emergence of counterfeit trade: a literature review. European Journal of Marketing, 43, (3/4), 320-349.
  • The music man. (2013,April 2),The Economist .
  • Thong, J., & Yap, C-S. (1998). Testing an ethical decision-making theory: the case of softlifting. Journal of Management Information Systems, 15, (1), 213-237.
  • UK Intellectual Property Office (http://www.ipo.gov.uk/home.htm)
  • United Nations Office on Drugs and Crime (June 2010).The globalization of crime: A transnational organized crime threat assessment (PDF).New York: United Nations.
  • United States House of Representatives. Press Resources; Committee on the Judiciary; October 26, 2011.
  • Wagner, S. & Sanders, G. (2001).Considerations in ethical Decision-making and software piracy. Journal of Business Ethics, 29, (1-2), 161-167.
  • Webb, J.T., Tihanyi, L., Ireland, R.D., & Sirmon, D.G., (2009).You say illegal, I say legitimate Entrepreneurship in the informal economy. Academy of Management Review, 34, (3), 492-510.
  • Wikipedia [online] (2010).Intellectual Property. Retrieved from http://www.wikipedia.com
  • Wilke, R., & Zaichkowsky, J.L. (1999). Brand imitation and its effects on innovation, competition, and brand equity. Business Horizon (November/December), 9-18
  • Wooley, D. J., & Eining, M.M. (2006).Software piracy among accounting students: A longitudinal comparison of changes and sensitivity. Journal of Information Systems 20 (1), 49.
  • World Commission on Environment and Development (WCED). Our common future. Oxford: Oxford University Press, 1987 p. 43.
  • World Customs Organization, (2008). Customs and IPR Report. Brussels: World Customs Organization.
  • Yang, D., Sonmex, M., Bosworth, D., & Fryxell, G. (2009).Global software piracy:Searching for further explanations. Journal of Business Ethics, 87,269-283.
  • Yoo, B., & S.-H.-Hee Lee. (2005). Do Counterfeits Promote Genuine Products?Working Paper, Hofstra University, Hempstead, NY.
  • Zhang, Y., Zhang, Z., & Liu, Z. (2007). Choice of entry modes in sequential FDI in an emerging economy. Management Decision, 45(4), 749-772.
  • Zhao, X. & Decker, R. (2004). Choice of foreign market entry mode. Working paper, University of Bielefeld
Toplam 95 adet kaynakça vardır.

Ayrıntılar

Diğer ID JA39SP98VE
Bölüm Araştırma Makalesi
Yazarlar

Michael Pıtts Bu kişi benim

Yayımlanma Tarihi 1 Temmuz 2013
Yayımlandığı Sayı Yıl 2013 Cilt: 2 Sayı: 4

Kaynak Göster

APA Pıtts, M. (2013). SAHTECİLİK, KORSANLIK VE EKONOMİK SÜRDÜRÜLEBİLİRLİK: ÇATIŞAN MODELLER. Balkan Sosyal Bilimler Dergisi, 2(4).