Search

Your search keyword '"Internet piracy"' showing total 371 results

Search Constraints

Start Over You searched for: Descriptor "Internet piracy" Remove constraint Descriptor: "Internet piracy" Database Academic Search Index Remove constraint Database: Academic Search Index
371 results on '"Internet piracy"'

Search Results

1. PRICE, PIRACY, AND SEARCH: WHICH PIRATES RESPOND TO CHANGES IN THE LEGAL PRICE?

2. THE GHOSTS IN THE MACHINE: Spotify's plot against musicians.

3. Abusing AI for Advertising.

4. Unveiling the Ethical Dilemmas of Digital Piracy: A Comprehensive Exploration of Motivations, Attitudes, and Behaviors.

5. Pirateria academică în rândul studenților din România.

6. A randomized encryption algorithm for the MPEG-DASH digital rights management.

7. The Status of Anti-Piracy of The Optical Media Board: Basis for an Enhanced Standard Operating Procedure.

8. New quantum color image watermarking technique (NQCIWT).

9. Digital Security in Educational Contexts: Digital Competence and Challenges for Good Practice.

10. Cartoon copyright recognition method based on character personality action.

11. Quantitative analysis of social influence and digital piracy contagion with differential equations on networks.

12. Determinants of Illegal Electronic Books Download in Spain.

13. Impact of the Internet on entertainment media industries: The double effects of Metcalfe and McLuhan.

14. Locking-Enabled Security Analysis of Cryptographic Circuits †.

15. Music distribution and copyright in Nigeria.

16. Who Is Responsible for AI Copyright Infringement?

17. Controlling digital piracy via domain name system blocks: A natural experiment.

18. Fraud in Online Classified Ads: Strategies, Risks, and Detection Methods: A Survey.

19. The Great Australian TV Delay: Disruption, Online Piracy and Netflix.

20. Novel retimed obfuscated architecture of discrete cosine transformation for optimization and enhancing the security.

21. Construction of a secure and efficient content key distribution framework for DRM systems.

22. ظاهرة المخدرات الرقمية أسبابها وآليات مواجهته ا

23. An Overview of Robust Video Watermarking Techniques.

24. Las cuatro P en Internet: Pornografía, plagio, piratería y permisos.

25. Audio-visual piracy on Telegram: a perspective on monetization models, pirate strategies and industrial pathways.

26. Cultural Industry's Strategic Development: Reaching International Audience by Using Virtual Reality and Augmented Reality Technologies.

27. Six Degrees of Kevin Bacon.

28. Robust audio watermarking via quantization and particle swarm optimization.

29. CYBERTERRORISM AND SOCIAL ENGINEERING - METHODS AND COUNTERMEASURES.

30. Correlates of participation in e-book piracy on campus.

31. Anime's knowledge cultures: Geek, Otaku, Zhai.

32. "Unus pro omnibus, omnes pro uno": understanding unauthorised file sharing in online communities from a public goods contribution perspective.

33. Pirate and chill: The effect of netflix on illegal streaming.

34. ActiveGuard: An active intellectual property protection technique for deep neural networks by leveraging adversarial examples as users' fingerprints.

35. COPYRIGHTS PROTECTIONS OF SONGS IN COVER VERSION ACTIVITIES.

36. TEA-Z: A Tiny and Efficient Architecture Based on Z Channel for Image Watermarking and Its Versatile Hardware Implementation.

37. Private practice.

38. Psychopathic personality disorder and cybercriminality: an outline of the issue.

39. Two Decades of E-Book Publishing in a Small Language Market: Publishers Lag Behind Pirates.

40. Causes and consequences of unauthorized use of books: readers, authors, and publishers' perspective.

41. The "Unruly" Space: Tanjong Piandang, a Pirates' Haven to a Fishing Village.

42. Privacy-Preserving IP Verification.

43. O consumo gratuito da música nas plataformas de streaming.

44. Is music piracy over? Comparing music piracy attitudes and behaviors between young generations.

45. Online content platforms, copyright decision-making algorithms and fundamental rights protection in China.

46. Editorial introduction.

49. Hardware Obfuscation for IP Protection of DSP Applications.

50. Piracy on the Internet High Seas: Using Hostis Humani Generis to Combat Cybercriminals.

Catalog

Books, media, physical & digital resources