{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,11]],"date-time":"2025-12-11T20:58:02Z","timestamp":1765486682413,"version":"3.37.3"},"reference-count":72,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2021,10,19]],"date-time":"2021-10-19T00:00:00Z","timestamp":1634601600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,10,19]],"date-time":"2021-10-19T00:00:00Z","timestamp":1634601600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Inf Syst Front"],"published-print":{"date-parts":[[2022,12]]},"DOI":"10.1007\/s10796-021-10189-7","type":"journal-article","created":{"date-parts":[[2021,10,19]],"date-time":"2021-10-19T09:58:42Z","timestamp":1634637522000},"page":"1905-1928","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["The Impact of Revenue Models on Anti-Counterfeiting Measures for Online Intermediaries"],"prefix":"10.1007","volume":"24","author":[{"given":"Xiong","family":"Zhang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6582-9253","authenticated-orcid":false,"given":"Xin","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Xuechen","family":"Luo","sequence":"additional","affiliation":[]},{"given":"Wei T.","family":"Yue","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,10,19]]},"reference":[{"issue":"3","key":"10189_CR1","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1007\/s10551-005-1902-9","volume":"63","author":"S Al-Rafee","year":"2006","unstructured":"Al-Rafee, S., & Cronan, T. P. (2006). Digital piracy: Factors that influence attitude toward behavior. Journal of Business Ethics, 63(3), 237\u2013259. https:\/\/doi.org\/10.1007\/s10551-005-1902-9","journal-title":"Journal of Business Ethics"},{"issue":"1","key":"10189_CR2","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1287\/isre.1070.0142","volume":"19","author":"T August","year":"2008","unstructured":"August, T., & Tunca, T. I. (2008). Let the pirates patch? An economic analysis of software security patch restrictions. Information Systems Research, 19(1), 48\u201370. https:\/\/doi.org\/10.1287\/isre.1070.0142","journal-title":"Information Systems Research"},{"issue":"1","key":"10189_CR3","first-page":"31","volume":"2","author":"S Ba","year":"2000","unstructured":"Ba, S., Whinston, A. B., & Zhang, H. (2000). The dynamics of the electronic market: An evolutionary game approach. Information Sciences, 2(1), 31\u201340.","journal-title":"Information Sciences"},{"issue":"3","key":"10189_CR4","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1016\/S0167-9236(02)00074-X","volume":"35","author":"S Ba","year":"2003","unstructured":"Ba, S., Whinston, A. B., & Zhang, H. (2003). Building trust in online auction markets through an economic incentive mechanism. Decision Support Systems, 35(3), 273\u2013286. https:\/\/doi.org\/10.1016\/S0167-9236(02)00074-X","journal-title":"Decision Support Systems"},{"unstructured":"Bergman, J. (2011). The eBay of the East: Inside Taobao, China\u2019s online marketplace. Time World.","key":"10189_CR5"},{"issue":"2","key":"10189_CR6","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1108\/JIBR-10-2017-0177","volume":"10","author":"V Bhatia","year":"2018","unstructured":"Bhatia, V. (2018). Examining consumers\u2019 attitude towards purchase of counterfeit fashion products. Journal of Indian Business Research, 10(2), 193\u2013207. https:\/\/doi.org\/10.1108\/JIBR-10-2017-0177","journal-title":"Journal of Indian Business Research"},{"issue":"4","key":"10189_CR7","doi-asserted-by":"publisher","first-page":"400","DOI":"10.1287\/isre.1050.0069","volume":"16","author":"RK Chellappa","year":"2005","unstructured":"Chellappa, R. K., & Shivendu, S. (2005). Managing piracy: Pricing and sampling strategies for digital experience goods in vertically segmented markets. Information Systems Research, 16(4), 400\u2013417. https:\/\/doi.org\/10.1287\/isre.1050.0069","journal-title":"Information Systems Research"},{"issue":"2","key":"10189_CR8","doi-asserted-by":"publisher","first-page":"250","DOI":"10.1287\/mnsc.47.2.250.9841","volume":"47","author":"C Chen","year":"2001","unstructured":"Chen, C. (2001). Design for the environment: A quality-based model for green product development. Management Science, 47(2), 250\u2013263. https:\/\/doi.org\/10.1287\/mnsc.47.2.250.9841","journal-title":"Management Science"},{"issue":"4","key":"10189_CR9","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1080\/07421222.1997.11518142","volume":"13","author":"HK Cheng","year":"1997","unstructured":"Cheng, H. K., Sims, R. R., & Teegen, H. (1997). To purchase or to pirate software: An empirical study. Journal of Management Information Systems, 13(4), 49\u201360. https:\/\/doi.org\/10.1080\/07421222.1997.11518142","journal-title":"Journal of Management Information Systems"},{"issue":"3","key":"10189_CR10","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1287\/msom.2015.0524","volume":"17","author":"SH Cho","year":"2015","unstructured":"Cho, S. H., Fang, X., & Tayur, S. (2015). Combating strategic counterfeiters in licit and illicit supply chains. Manufacturing and Service Operations Management, 17(3), 273\u2013289. https:\/\/doi.org\/10.1287\/msom.2015.0524","journal-title":"Manufacturing and Service Operations Management"},{"issue":"2","key":"10189_CR11","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1287\/mnsc.37.2.125","volume":"37","author":"KR Conner","year":"1991","unstructured":"Conner, K. R., & Rumelt, R. P. (1991). Software piracy\u00a0: An analysis of protection strategies. Management Science, 37(2), 125\u2013139.","journal-title":"Management Science"},{"issue":"3","key":"10189_CR12","doi-asserted-by":"publisher","first-page":"541","DOI":"10.1111\/joie.12056","volume":"62","author":"B Danaher","year":"2014","unstructured":"Danaher, B., et al. (2014). The effect of graduated response anti-piracy laws on music sales: Evidence from an event study in France. Journal of Industrial Economics, 62(3), 541\u2013553. https:\/\/doi.org\/10.1111\/joie.12056","journal-title":"Journal of Industrial Economics"},{"doi-asserted-by":"crossref","unstructured":"Danaher, B., Hersh, J., Smith, M. D., & Telang, R. (2020). The effect of piracy website blocking on consumer behavior. MIS Quarterly, 44(2), 631\u2013659.","key":"10189_CR13","DOI":"10.25300\/MISQ\/2020\/15791"},{"doi-asserted-by":"crossref","unstructured":"Danaher, B., Smith, M. D. & Telang, R. (2016). Website blocking revisited: The effect of The UK November 2014 blocks on consumer behavior.","key":"10189_CR14","DOI":"10.2139\/ssrn.2766795"},{"doi-asserted-by":"crossref","unstructured":"Dey, D., Kim, A. & Lahiri, A. (2018). Online piracy and the \u201clonger arm\u201d of enforcement. Management Science, Online.","key":"10189_CR15","DOI":"10.1287\/mnsc.2017.2984"},{"issue":"3","key":"10189_CR16","doi-asserted-by":"publisher","first-page":"1173","DOI":"10.1287\/mnsc.2017.2984","volume":"65","author":"D Dey","year":"2019","unstructured":"Dey, D., Kim, A., & Lahiri, A. (2019). Online piracy and the \u201clonger arm\u201d of enforcement. Management Science, 65(3), 1173\u20131190. https:\/\/doi.org\/10.1287\/mnsc.2017.2984","journal-title":"Management Science"},{"issue":"2","key":"10189_CR17","first-page":"1201","volume":"27","author":"D Evans","year":"2012","unstructured":"Evans, D. (2012). Governing bad behavior by users of multi-sided platforms. Berkeley Technology Law Journal, 27(2), 1201\u20131250.","journal-title":"Berkeley Technology Law Journal"},{"issue":"3","key":"10189_CR18","doi-asserted-by":"publisher","first-page":"143","DOI":"10.2753\/MIS0742-1222240305","volume":"24","author":"M Fan","year":"2007","unstructured":"Fan, M., Kumar, S., & Whinston, A. B. (2007). Selling or advertising: Strategies for providing digital media online. Journal of Management Information Systems, 24(3), 143\u2013166. https:\/\/doi.org\/10.2753\/MIS0742-1222240305","journal-title":"Journal of Management Information Systems"},{"issue":"2","key":"10189_CR19","doi-asserted-by":"publisher","first-page":"272","DOI":"10.1287\/mksc.2016.1008","volume":"36","author":"SY Gao","year":"2017","unstructured":"Gao, S. Y., Lim, W. S., & Tang, C. S. (2017). Entry of copycats of luxury brands. Marketing Science, 36(2), 272\u2013289. https:\/\/doi.org\/10.1287\/mksc.2016.1008","journal-title":"Marketing Science"},{"issue":"2","key":"10189_CR20","doi-asserted-by":"publisher","first-page":"159","DOI":"10.2753\/mis0742-1222300206","volume":"30","author":"X Geng","year":"2013","unstructured":"Geng, X., & Lee, Y.-J. (2013). Competing with piracy: A multichannel sequential search approach. Journal of Management Information Systems, 30(2), 159\u2013184. https:\/\/doi.org\/10.2753\/mis0742-1222300206","journal-title":"Journal of Management Information Systems"},{"issue":"4","key":"10189_CR21","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1080\/07421222.1997.11518141","volume":"13","author":"RD Gopal","year":"1997","unstructured":"Gopal, R. D., & Sanders, G. L. (1997). Preventive and deterrent controls for software piracy. Journal of Management Information Systems, 13(4), 29\u201347.","journal-title":"Journal of Management Information Systems"},{"unstructured":"Greek, D. (2009). eBay launches new anti-counterfeiting campaign, computer active.","key":"10189_CR22"},{"issue":"1","key":"10189_CR23","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/s10796-008-9142-z","volume":"11","author":"J Guajardo","year":"2009","unstructured":"Guajardo, J., et al. (2009). Anti-counterfeiting, key distribution, and key storage in an ambient world via physical unclonable functions. Information Systems Frontiers, 11(1), 19\u201341. https:\/\/doi.org\/10.1007\/s10796-008-9142-z","journal-title":"Information Systems Frontiers"},{"issue":"5","key":"10189_CR24","doi-asserted-by":"publisher","first-page":"1183","DOI":"10.1287\/mnsc.2014.1972","volume":"61","author":"L Guo","year":"2015","unstructured":"Guo, L., & Meng, X. (2015). Digital content provision and optimal copyright protection. Management Science, 61(5), 1183\u20131196.","journal-title":"Management Science"},{"unstructured":"Hair, J. F. et al. (2006). Multivariate data analysis. Pearson Prentice Hall.","key":"10189_CR25"},{"unstructured":"Hallanan, L. (2018). Pinduoduo counterfeit accusations come as no surprise to those in China. Forbes.com.","key":"10189_CR26"},{"issue":"2","key":"10189_CR27","doi-asserted-by":"publisher","first-page":"211","DOI":"10.2753\/MIS0742-1222310208","volume":"31","author":"MJ Hashim","year":"2014","unstructured":"Hashim, M. J., et al. (2014). Digital piracy, teens, and the source of advice: An experimental study. Journal of Management Information Systems, 31(2), 211\u2013244. https:\/\/doi.org\/10.2753\/MIS0742-1222310208","journal-title":"Journal of Management Information Systems"},{"issue":"3","key":"10189_CR28","doi-asserted-by":"publisher","first-page":"934","DOI":"10.1080\/07421222.2018.1481670","volume":"35","author":"MJ Hashim","year":"2018","unstructured":"Hashim, M. J., Kannan, K. N., & Wegener, D. T. (2018). Central role of moral obligations in determining intentions to engage in digital piracy. Journal of Management Information Systems, 35(3), 934\u2013963. https:\/\/doi.org\/10.1080\/07421222.2018.1481670","journal-title":"Journal of Management Information Systems"},{"key":"10189_CR29","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1016\/j.omega.2018.02.010","volume":"83","author":"Z Hong","year":"2019","unstructured":"Hong, Z., & Guo, X. (2019). Green product supply chain contracts considering environmental responsibilities. Omega (United Kingdom), 83, 155\u2013166. https:\/\/doi.org\/10.1016\/j.omega.2018.02.010","journal-title":"Omega (United Kingdom)"},{"issue":"6","key":"10189_CR30","doi-asserted-by":"publisher","first-page":"2573","DOI":"10.1287\/mnsc.2018.3072","volume":"65","author":"X Huang","year":"2019","unstructured":"Huang, X., Atasu, A., & Beril Toktay, L. (2019). Design implications of extended producer responsibility for durable products. Management Science, 65(6), 2573\u20132590. https:\/\/doi.org\/10.1287\/mnsc.2018.3072","journal-title":"Management Science"},{"issue":"1","key":"10189_CR31","doi-asserted-by":"publisher","first-page":"1","DOI":"10.25300\/MISQ\/2019\/14128","volume":"43","author":"TL James","year":"2019","unstructured":"James, T. L., Wallace, L., & Deane, J. K. (2019). Using organismic integration theory to explore the associations between users\u2019 exercise motivations and fitness technology feature set use. MIS Quarterly, 43(1), 1\u201312.","journal-title":"MIS Quarterly"},{"issue":"3","key":"10189_CR32","doi-asserted-by":"publisher","first-page":"109","DOI":"10.2753\/mis0742-1222240304","volume":"24","author":"M Khouja","year":"2007","unstructured":"Khouja, M., & Park, S. (2007). Optimal pricing of digital experience goods under piracy. Journal of Management Information Systems, 24(3), 109\u2013141. https:\/\/doi.org\/10.2753\/mis0742-1222240304","journal-title":"Journal of Management Information Systems"},{"issue":"3","key":"10189_CR33","doi-asserted-by":"publisher","first-page":"840","DOI":"10.1080\/07421222.2018.1481651","volume":"35","author":"A Kim","year":"2018","unstructured":"Kim, A. (2018). Doubly-bound relationship between publisher and retailer: The curious mix of wholesale and agency models. Journal of Management Information Systems, 35(3), 840\u2013865. https:\/\/doi.org\/10.1080\/07421222.2018.1481651","journal-title":"Journal of Management Information Systems"},{"unstructured":"Klara, R. (2017). Counterfeit goods are a $460 billion industry, and most are bought and sold online. AdWeek.","key":"10189_CR34"},{"issue":"3","key":"10189_CR35","doi-asserted-by":"publisher","first-page":"763","DOI":"10.2139\/ssrn.2335745","volume":"41","author":"Y Kwark","year":"2017","unstructured":"Kwark, Y., Chen, J., & Raghunathan, S. (2017). Platform or wholesale? A strategic tool for online retailers to benefit from third-party information. MIS Quarterly, 41(3), 763\u2013786. https:\/\/doi.org\/10.2139\/ssrn.2335745","journal-title":"MIS Quarterly"},{"issue":"10","key":"10189_CR36","doi-asserted-by":"publisher","first-page":"4608","DOI":"10.2139\/ssrn.2492840","volume":"64","author":"Y Kwark","year":"2018","unstructured":"Kwark, Y., Chen, J., & Raghunathan, S. (2018). User-generated content and competing firms\u2019 product design. Management Science, 64(10), 4608\u20134628. https:\/\/doi.org\/10.2139\/ssrn.2492840","journal-title":"Management Science"},{"issue":"1","key":"10189_CR37","doi-asserted-by":"publisher","first-page":"195","DOI":"10.2753\/MIS0742-1222290106","volume":"29","author":"M Lin","year":"2012","unstructured":"Lin, M., Ke, X., & Whinston, A. (2012). Vertical differentiation and a comparison of online advertising models. Journal of Management Information Systems, 29(1), 195\u2013236. https:\/\/doi.org\/10.2753\/MIS0742-1222290106","journal-title":"Journal of Management Information Systems"},{"unstructured":"Liu, J. (2014). No to internet piracy and pornography, China cracks down on P2P video platform. ZDNet.com.","key":"10189_CR38"},{"issue":"11","key":"10189_CR39","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1145\/2668893","volume":"57","author":"A Malhotra","year":"2014","unstructured":"Malhotra, A., & Van Alstyne, M. (2014). The dark side of the sharing economy ... and how to lighten it. Communications of the ACM, 57(11), 24\u201327. https:\/\/doi.org\/10.1145\/2668893","journal-title":"Communications of the ACM"},{"unstructured":"Neter, J. et al. (1996). Applied linear statistical models. 4th edn. McGraw-Hill\/Irwin.","key":"10189_CR40"},{"issue":"0","key":"10189_CR41","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1080\/13683500.2018.1504899","volume":"0","author":"S Nieuwland","year":"2018","unstructured":"Nieuwland, S., & van Melik, R. (2018). Regulating Airbnb: How cities deal with perceived negative externalities of short-term rentals. Current Issues in Tourism, 0(0), 1\u201315. https:\/\/doi.org\/10.1080\/13683500.2018.1504899","journal-title":"Current Issues in Tourism"},{"issue":"3","key":"10189_CR42","doi-asserted-by":"publisher","first-page":"264","DOI":"10.1002\/poi3.177","volume":"10","author":"P Nooren","year":"2018","unstructured":"Nooren, P., et al. (2018). Should we regulate digital platforms? A new framework for evaluating policy options. Policy and Internet, 10(3), 264\u2013301. https:\/\/doi.org\/10.1002\/poi3.177","journal-title":"Policy and Internet"},{"doi-asserted-by":"publisher","unstructured":"Odusanya, K., Aluko, O., & Lal, B. (2020). Building consumers\u2019 trust in electronic retail platforms in the Sub-Saharan context: An exploratory study on drivers and impact on continuance intention. Information Systems Frontiers. https:\/\/doi.org\/10.1007\/s10796-020-10043-2","key":"10189_CR43","DOI":"10.1007\/s10796-020-10043-2"},{"issue":"1","key":"10189_CR44","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1080\/07421222.2003.11045759","volume":"20","author":"AG Peace","year":"2003","unstructured":"Peace, A. G., Galletta, D. F., & Thong, J. Y. L. (2003). Software piracy in the workplace: A model and empirical test. Journal of Management Information Systems, 20(1), 153\u2013177. https:\/\/doi.org\/10.1080\/07421222.2003.11045759","journal-title":"Journal of Management Information Systems"},{"issue":"3","key":"10189_CR45","doi-asserted-by":"publisher","first-page":"403","DOI":"10.1287\/msom.2016.0613","volume":"19","author":"H Pun","year":"2017","unstructured":"Pun, H., & DeYong, G. D. (2017). Competing with copycats when customers are strategic. Manufacturing and Service Operations Management, 19(3), 403\u2013418. https:\/\/doi.org\/10.1287\/msom.2016.0613","journal-title":"Manufacturing and Service Operations Management"},{"issue":"4","key":"10189_CR46","doi-asserted-by":"publisher","first-page":"522","DOI":"10.1287\/mksc.2014.0867","volume":"34","author":"Y Qian","year":"2015","unstructured":"Qian, Y., Gong, Q., & Chen, Y. (2015). Untangling searchable and experiential quality responses to counterfeits. Marketing Science, 34(4), 522\u2013538. https:\/\/doi.org\/10.1287\/mksc.2014.0867","journal-title":"Marketing Science"},{"unstructured":"Revitalash (2018). Counterfeit product: Be aware of counterfeit products and websites. Revitalash.com.","key":"10189_CR47"},{"issue":"3","key":"10189_CR48","doi-asserted-by":"publisher","first-page":"807","DOI":"10.1007\/s11002-012-9190-5","volume":"23","author":"S Romani","year":"2012","unstructured":"Romani, S., Gistri, G., & Pace, S. (2012). When counterfeits raise the appeal of luxury brands. Marketing Letters, 23(3), 807\u2013824. https:\/\/doi.org\/10.1007\/s11002-012-9190-5","journal-title":"Marketing Letters"},{"unstructured":"Sharma, S. (2018). Online shopping: One out of three customers receive fake products. News18.com.","key":"10189_CR49"},{"unstructured":"Shepard, W. (2018). Alibaba\u2019s Taobao is once again branded a \u2018notorious market\u2019 for counterfeit goods. Forbes.com.","key":"10189_CR50"},{"issue":"5","key":"10189_CR51","doi-asserted-by":"publisher","first-page":"1162","DOI":"10.1002\/9781118673386.ch5","volume":"59","author":"H Shi","year":"2013","unstructured":"Shi, H., Liu, Y., & Petruzzi, N. C. (2013). Consumer heterogeneity, product quality,and distribution channels. Management Science, 59(5), 1162\u20131176. https:\/\/doi.org\/10.1002\/9781118673386.ch5","journal-title":"Management Science"},{"unstructured":"SingaporeLegalAdvice (2018). Is it illegal to buy counterfeit goods in Singapore? SingaporeLegalAdvice.com.","key":"10189_CR52"},{"issue":"4","key":"10189_CR53","doi-asserted-by":"publisher","first-page":"899","DOI":"10.1007\/s10796-016-9638-x","volume":"19","author":"M Sprenger","year":"2017","unstructured":"Sprenger, M., Mettler, T., & Winter, R. (2017). A viability theory for digital businesses: Exploring the evolutionary changes of revenue mechanisms to support managerial decisions. Information Systems Frontiers, 19(4), 899\u2013922.","journal-title":"Information Systems Frontiers"},{"issue":"3","key":"10189_CR54","doi-asserted-by":"publisher","first-page":"287","DOI":"10.1287\/isre.1040.0030","volume":"15","author":"A Sundararajan","year":"2004","unstructured":"Sundararajan, A. (2004). Managing digital piracy: Pricing and protection. Information Systems Research, 15(3), 287\u2013308. https:\/\/doi.org\/10.1287\/isre.1040.0030","journal-title":"Information Systems Research"},{"doi-asserted-by":"crossref","unstructured":"Tabachnick, B. G. and Fidell, L. S. (2019). Multivariate statistics, seventh ed, Pearson. doi: 10.4324\/9780429500749-17.","key":"10189_CR55","DOI":"10.4324\/9780429500749-17"},{"issue":"4","key":"10189_CR56","doi-asserted-by":"publisher","first-page":"381","DOI":"10.2307\/4132314","volume":"26","author":"JB Thatcher","year":"2002","unstructured":"Thatcher, J. B., & Perrew\u00e9, P. L. (2002). An empirical examination of individual traits as antecedents to computer anxiety and computer self-efficacy. MIS Quarterly, 26(4), 381\u2013396.","journal-title":"MIS Quarterly"},{"unstructured":"Titlow, J. P. (2016). Youtube is using AI to police copyright \u2013 to the tune of $2 billion in payouts. www.fastcompany.com.","key":"10189_CR57"},{"issue":"1","key":"10189_CR58","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1080\/10196780151105483","volume":"11","author":"LR Vijayasarathy","year":"2001","unstructured":"Vijayasarathy, L. R., & Jones, J. M. (2001). Do internet shopping aids make a difference? An empirical investigation. Electronic Markets, 11(1), 75\u201383. https:\/\/doi.org\/10.1080\/10196780151105483","journal-title":"Electronic Markets"},{"unstructured":"Walko, N. (2019). Amazon admits the obvious \u2013 they have a counterfeit problem. wccftech.com.","key":"10189_CR59"},{"issue":"3","key":"10189_CR60","doi-asserted-by":"publisher","first-page":"343","DOI":"10.2753\/MIS0742-1222280310","volume":"28","author":"J Wang","year":"2011","unstructured":"Wang, J., Yang, Z., & Bhattacharjee, S. (2011). Same coin, different sides: Differential impact of social learning on two facets of music piracy. Journal of Management Information Systems, 28(3), 343\u2013384. https:\/\/doi.org\/10.2753\/MIS0742-1222280310","journal-title":"Journal of Management Information Systems"},{"doi-asserted-by":"publisher","unstructured":"Wang, M., Li, X., & Chau, P. Y. K. (2020). Leveraging image-processing techniques for empirical research: Feasibility and reliability in online shopping context. Information Systems Frontiers. https:\/\/doi.org\/10.1007\/s10796-020-09981-8","key":"10189_CR61","DOI":"10.1007\/s10796-020-09981-8"},{"doi-asserted-by":"crossref","unstructured":"Wang, Q. et al. (2021). Using the anchoring effect and the cultural dimensions theory to study customers\u2019 online rating behaviors. Information Systems Frontiers.","key":"10189_CR62","DOI":"10.1007\/s10796-021-10148-2"},{"issue":"6","key":"10189_CR63","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1108\/02651339510102949","volume":"12","author":"CH Wee","year":"1995","unstructured":"Wee, C. H., Tan, S. J., & Cheok, K. H. (1995). Non-price determinants of intention to purchase counterfeit goods an exploratory study. International Marketing Review, 12(6), 19\u201346. https:\/\/doi.org\/10.1108\/02651339510102949","journal-title":"International Marketing Review"},{"issue":"6","key":"10189_CR64","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1016\/S0007-6813(99)80033-0","volume":"42","author":"R Wilke","year":"1999","unstructured":"Wilke, R., & Zaichkowsky, J. L. (1999). Brand imitation and its effects on innovation, competition, and brand equity. Business Horizons, 42(6), 9\u201318. https:\/\/doi.org\/10.1016\/S0007-6813(99)80033-0","journal-title":"Business Horizons"},{"unstructured":"Wood, L. (2017). Global brand counterfeiting report 2018: Value of counterfeited goods in 2017 amounted to $1.2 trillion \u2013 research and markets. BusinessWire.","key":"10189_CR65"},{"issue":"4","key":"10189_CR66","doi-asserted-by":"publisher","first-page":"947","DOI":"10.1007\/s10796-019-09907-z","volume":"22","author":"D Wu","year":"2020","unstructured":"Wu, D., Nan, G., & Li, M. (2020). Optimal piracy control: Should a firm implement digital rights management? Information Systems Frontiers, 22(4), 947\u2013960. https:\/\/doi.org\/10.1007\/s10796-019-09907-z","journal-title":"Information Systems Frontiers"},{"issue":"2","key":"10189_CR67","doi-asserted-by":"publisher","first-page":"519","DOI":"10.1016\/j.ijpe.2011.01.020","volume":"131","author":"B Yalabik","year":"2011","unstructured":"Yalabik, B., & Fairchild, R. J. (2011). Customer, regulatory, and competitive pressure as drivers of environmental innovation. International Journal of Production Economics, 131(2), 519\u2013527. https:\/\/doi.org\/10.1016\/j.ijpe.2011.01.020","journal-title":"International Journal of Production Economics"},{"issue":"3","key":"10189_CR68","first-page":"177","volume":"4","author":"J Yao","year":"2005","unstructured":"Yao, J. (2005). How a luxury monopolist might benefit from a stringent counterfeit monitoring regime. International Journal of Business and Economics, 4(3), 177\u2013192.","journal-title":"International Journal of Business and Economics"},{"issue":"7","key":"10189_CR69","doi-asserted-by":"publisher","first-page":"3269","DOI":"10.1287\/mnsc.2017.2774","volume":"64","author":"P Younkin","year":"2018","unstructured":"Younkin, P., & Kuppuswamy, V. (2018). The colorblind crowd? Founder race and performance in crowdfunding. Management Science, 64(7), 3269\u20133287. https:\/\/doi.org\/10.1287\/mnsc.2017.2774","journal-title":"Management Science"},{"issue":"1","key":"10189_CR70","doi-asserted-by":"publisher","first-page":"260","DOI":"10.1080\/07421222.2016.1172457","volume":"33","author":"Z Zhang","year":"2016","unstructured":"Zhang, Z., et al. (2016). Duopoly pricing strategy for information products with premium service: Free product or bundling? Journal of Management Information Systems, 33(1), 260\u2013295. https:\/\/doi.org\/10.1080\/07421222.2016.1172457","journal-title":"Journal of Management Information Systems"},{"doi-asserted-by":"publisher","unstructured":"Zhang, X., Yue, W. T., & Hui, W. (2019a). Bundling cloud software to fight piracy: An economic analysis. Internet Research. https:\/\/doi.org\/10.1108\/INTR-10-2018-0455","key":"10189_CR71","DOI":"10.1108\/INTR-10-2018-0455"},{"issue":"4","key":"10189_CR72","doi-asserted-by":"publisher","first-page":"1085","DOI":"10.1108\/ITP-05-2018-0210","volume":"32","author":"X Zhang","year":"2019","unstructured":"Zhang, X., Yue, W. T., & Hui, W. (2019b). Software piracy and bundling in the cloud-based software era. Information Technology and People, 32(4), 1085\u20131122. https:\/\/doi.org\/10.1108\/ITP-05-2018-0210","journal-title":"Information Technology and People"}],"container-title":["Information Systems Frontiers"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10796-021-10189-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10796-021-10189-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10796-021-10189-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,16]],"date-time":"2022-12-16T05:21:17Z","timestamp":1671168077000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10796-021-10189-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,19]]},"references-count":72,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2022,12]]}},"alternative-id":["10189"],"URL":"https:\/\/doi.org\/10.1007\/s10796-021-10189-7","relation":{},"ISSN":["1387-3326","1572-9419"],"issn-type":[{"type":"print","value":"1387-3326"},{"type":"electronic","value":"1572-9419"}],"subject":[],"published":{"date-parts":[[2021,10,19]]},"assertion":[{"value":"7 August 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 October 2021","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}