{"id":"https://openalex.org/W1992019700","doi":"https://doi.org/10.1145/126743.126747","title":"Software piracy and software security in business schools: an ethical perspective","display_name":"Software piracy and software security in business schools: an ethical perspective","publication_year":1991,"publication_date":"1991-06-01","ids":{"openalex":"https://openalex.org/W1992019700","doi":"https://doi.org/10.1145/126743.126747","mag":"1992019700"},"language":"en","primary_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1145/126743.126747","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/126743.126747","source":{"id":"https://openalex.org/S199280970","display_name":"ACM SIGMIS Database the DATABASE for Advances in Information Systems","issn_l":"0095-0033","issn":["0095-0033","2331-1584"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://dl.acm.org/doi/pdf/10.1145/126743.126747","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5110167400","display_name":"Jin Hyouk Im","orcid":null},"institutions":[{"id":"https://openalex.org/I192396691","display_name":"University of New Orleans","ror":"https://ror.org/034mtvk83","country_code":"US","type":"education","lineage":["https://openalex.org/I192396691","https://openalex.org/I2799628689"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jin H. Im","raw_affiliation_strings":["University of New Orleans"],"affiliations":[{"raw_affiliation_string":"University of New Orleans","institution_ids":["https://openalex.org/I192396691"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5084885259","display_name":"Pamela D. Van Epps","orcid":null},"institutions":[{"id":"https://openalex.org/I192396691","display_name":"University of New Orleans","ror":"https://ror.org/034mtvk83","country_code":"US","type":"education","lineage":["https://openalex.org/I192396691","https://openalex.org/I2799628689"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Pamela D. Van Epps","raw_affiliation_strings":["University of New Orleans"],"affiliations":[{"raw_affiliation_string":"University of New Orleans","institution_ids":["https://openalex.org/I192396691"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"fulltext_origin":"pdf","cited_by_count":29,"citation_normalized_percentile":{"value":0.884892,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":88,"max":89},"biblio":{"volume":"22","issue":"3","first_page":"15","last_page":"22"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11058","display_name":"Ethics in Business and Education","score":0.9794,"subfield":{"id":"https://openalex.org/subfields/1802","display_name":"Information Systems and Management"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T11058","display_name":"Ethics in Business and Education","score":0.9794,"subfield":{"id":"https://openalex.org/subfields/1802","display_name":"Information Systems and Management"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9049,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/copying","display_name":"Copying","score":0.83906275},{"id":"https://openalex.org/keywords/software-review","display_name":"Software review","score":0.5119294}],"concepts":[{"id":"https://openalex.org/C2779151265","wikidata":"https://www.wikidata.org/wiki/Q1156791","display_name":"Copying","level":2,"score":0.83906275},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.60421443},{"id":"https://openalex.org/C12713177","wikidata":"https://www.wikidata.org/wiki/Q1900281","display_name":"Perspective (graphical)","level":2,"score":0.58337164},{"id":"https://openalex.org/C125900194","wikidata":"https://www.wikidata.org/wiki/Q3516888","display_name":"Software review","level":5,"score":0.5119294},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.496954},{"id":"https://openalex.org/C39549134","wikidata":"https://www.wikidata.org/wiki/Q133080","display_name":"Public relations","level":1,"score":0.455732},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.42078018},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.389513},{"id":"https://openalex.org/C529173508","wikidata":"https://www.wikidata.org/wiki/Q638608","display_name":"Software development","level":3,"score":0.37816417},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.3500299},{"id":"https://openalex.org/C55587333","wikidata":"https://www.wikidata.org/wiki/Q1133029","display_name":"Engineering ethics","level":1,"score":0.3444816},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.34338132},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.31072158},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.28427282},{"id":"https://openalex.org/C186846655","wikidata":"https://www.wikidata.org/wiki/Q3398377","display_name":"Software construction","level":4,"score":0.17350826},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.12527955},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.07480851},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":true,"landing_page_url":"https://doi.org/10.1145/126743.126747","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/126743.126747","source":{"id":"https://openalex.org/S199280970","display_name":"ACM SIGMIS Database the DATABASE for Advances in Information Systems","issn_l":"0095-0033","issn":["0095-0033","2331-1584"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1145/126743.126747","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/126743.126747","source":{"id":"https://openalex.org/S199280970","display_name":"ACM SIGMIS Database the DATABASE for Advances in Information Systems","issn_l":"0095-0033","issn":["0095-0033","2331-1584"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, justice, and strong institutions","score":0.6}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":11,"referenced_works":["https://openalex.org/W1525396709","https://openalex.org/W1528098494","https://openalex.org/W1977410509","https://openalex.org/W1990713139","https://openalex.org/W2018102674","https://openalex.org/W2069207199","https://openalex.org/W2132170224","https://openalex.org/W227491811","https://openalex.org/W239311441","https://openalex.org/W2394773617","https://openalex.org/W343807186"],"related_works":["https://openalex.org/W945978269","https://openalex.org/W4225160120","https://openalex.org/W4200095465","https://openalex.org/W3195683614","https://openalex.org/W3157838713","https://openalex.org/W2561915247","https://openalex.org/W2500795683","https://openalex.org/W2257437395","https://openalex.org/W2146939716","https://openalex.org/W2087711777"],"abstract_inverted_index":{"Many":[0],"business":[1],"schools":[2,51],"have":[3],"become":[4],"heavily":[5],"dependent":[6],"on":[7,42],"microcomputers":[8],"for":[9,78,92],"educational":[10],"purposes.":[11],"That":[12],"exposes":[13],"them":[14],"to":[15,74,101],"a":[16,39],"new":[17],"type":[18],"of":[19,38,52,56,59],"ethical":[20],"issue---the":[21],"ramifications":[22],"involved":[23],"with":[24,89],"unauthorized":[25],"software":[26,43,46,69,102],"copying":[27],"by":[28,81],"faculty,":[29,82],"staff,":[30],"and":[31,45,72,84,94,104],"students.":[32,85],"This":[33],"article":[34,87],"presents":[35],"the":[36,53],"results":[37],"field":[40],"survey":[41],"piracy":[44,103],"security":[47,70,105],"in":[48],"241":[49],"member":[50],"American":[54],"Assembly":[55],"Collegiate":[57],"Schools":[58],"Business":[60],"(AACSB).":[61],"The":[62,86],"authors":[63],"discuss":[64],"some":[65,90],"important":[66],"findings":[67],"concerning":[68],"procedures":[71],"policies":[73],"reduce":[75],"legal":[76],"responsibilities":[77],"copyright":[79],"infringements":[80],"staff":[83],"concludes":[88],"recommendations":[91],"creating":[93],"sustaining":[95],"an":[96],"environment":[97],"where":[98],"conditions":[99],"contributing":[100],"issues":[106],"are":[107],"minimized.":[108]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W1992019700","counts_by_year":[{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2015,"cited_by_count":1},{"year":2013,"cited_by_count":2}],"updated_date":"2024-12-17T10:32:20.422167","created_date":"2016-06-24"}