{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:26:29Z","timestamp":1750307189080,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,6,29]],"date-time":"2011-06-29T00:00:00Z","timestamp":1309305600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,6,29]]},"DOI":"10.1145\/2159365.2159416","type":"proceedings-article","created":{"date-parts":[[2012,3,6]],"date-time":"2012-03-06T13:18:26Z","timestamp":1331039906000},"page":"292-294","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Only the good... get pirated"],"prefix":"10.1145","author":[{"given":"Anders","family":"Drachen","sequence":"first","affiliation":[{"name":"Copenhagen Business School"}]},{"given":"Kevin","family":"Bauer","sequence":"additional","affiliation":[{"name":"University of Waterloo"}]},{"given":"Robert W. D.","family":"Veitch","sequence":"additional","affiliation":[{"name":"Copenhagen Business School"}]}],"member":"320","published-online":{"date-parts":[[2011,6,29]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1080\/00036840500293276"},{"volume-title":"Proceedings of the 37th Research Conference on Communication, Information and Internet Policy, TPRC, 1--18","author":"Bauer K.","key":"e_1_3_2_1_2_1"},{"volume-title":"Bitstalker: Accurately and Efficiently Monitoring BitTorrent Traffic. In Proceedings of the First IEEE Workshop on Information Forensics and Security","year":"2009","author":"Bauer K.","key":"e_1_3_2_1_3_1"},{"key":"e_1_3_2_1_4_1","unstructured":"BitTorrent Protocl Specification. 2010. Available from: http:\/\/wiki.theory.org\/BitTorrentSpecification. BitTorrent Protocl Specification. 2010. Available from: http:\/\/wiki.theory.org\/BitTorrentSpecification."},{"key":"e_1_3_2_1_5_1","unstructured":"BTGuard: Anonymous BitTorrent Services. 2011. Available from: http:\/\/btguard.com\/. BTGuard: Anonymous BitTorrent Services. 2011. Available from: http:\/\/btguard.com\/."},{"key":"e_1_3_2_1_6_1","unstructured":"Business Software Alliance. 2010. Seventh Annual BSA and IDC Global Software Piracy Study. Available from: http:\/\/www.bsa.org\/country\/Research%20and%20Statistics.aspx  Business Software Alliance. 2010. Seventh Annual BSA and IDC Global Software Piracy Study. Available from: http:\/\/www.bsa.org\/country\/Research%20and%20Statistics.aspx"},{"key":"e_1_3_2_1_7_1","unstructured":"Drachen A. Bauer K. Veitch R. 2011. Piracy Activity vs. Product Features in Digital Games. Technical Report Copenhagen Business School 6th May 2011. 8 pp. Available from: http:\/\/openarchive.cbs.dk\/handle\/10398\/8299  Drachen A. Bauer K. Veitch R. 2011. Piracy Activity vs. Product Features in Digital Games. Technical Report Copenhagen Business School 6 th May 2011. 8 pp. Available from: http:\/\/openarchive.cbs.dk\/handle\/10398\/8299"},{"key":"e_1_3_2_1_8_1","first-page":"2009","article-title":"Illegal downloads and dodgy figures","volume":"5","author":"Goldacre B.","year":"2009","journal-title":"The Guardian"},{"key":"e_1_3_2_1_9_1","unstructured":"International Intellectual Property Alliance (IIPA). 2010. 2010 Special 301 Report on Copyright Protection and Enforcement. Available from: www.iipa.com.  International Intellectual Property Alliance (IIPA). 2010. 2010 Special 301 Report on Copyright Protection and Enforcement. Available from: www.iipa.com."},{"volume-title":"Report","year":"2010","author":"Kirk R.","key":"e_1_3_2_1_10_1"},{"volume-title":"MTV Multiplayer","year":"2008","author":"Klepek P.","key":"e_1_3_2_1_11_1"},{"volume-title":"Proceedings of the Proceedings of the 3rd conference on Hot topics in security, USENIX Association, 1--7.","author":"Piatek M.","key":"e_1_3_2_1_12_1"},{"key":"e_1_3_2_1_13_1","unstructured":"Rabin S. 2010. Introduction to Game Development. Charles River Media.   Rabin S. 2010. Introduction to Game Development. Charles River Media."},{"volume-title":"October 7th, 2008","year":"2008","author":"Sanchez J.","key":"e_1_3_2_1_14_1"},{"key":"e_1_3_2_1_15_1","unstructured":"Sigle D. 2010 Critical Values of the Pearson Product-Moment Correlation Coefficient. Neagle School of Education - University of Connecticut. Available from: http:\/\/www.gifted.uconn.edu\/siegle\/research\/correlation\/corrchrt.htm  Sigle D. 2010 Critical Values of the Pearson Product-Moment Correlation Coefficient. Neagle School of Education - University of Connecticut. Available from: http:\/\/www.gifted.uconn.edu\/siegle\/research\/correlation\/corrchrt.htm"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"Stryszkowski P. and Scorpecci D. 2009. Piracy of Digital Content. OECD Publishing.  Stryszkowski P. and Scorpecci D. 2009. Piracy of Digital Content. OECD Publishing.","DOI":"10.1787\/9789264065437-en"},{"key":"e_1_3_2_1_17_1","unstructured":"The Tor Project: Anonymity Online. 2010. Available from: http:\/\/www.torproject.org\/ The Tor Project: Anonymity Online. 2010. Available from: http:\/\/www.torproject.org\/"},{"volume-title":"Proc. of the 4th USENIX Workshop on Offensive Technologies, USENIX Association, 112--113","author":"Wolchok S.","key":"e_1_3_2_1_18_1"}],"event":{"name":"FDG'11: Foundations of Digital Games","sponsor":["SASDG Society for the Advancement of the Science of Digital Games","SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGAI ACM Special Interest Group on Artificial Intelligence","SIGGRAPH ACM Special Interest Group on Computer Graphics and Interactive Techniques","SIGCSE ACM Special Interest Group on Computer Science Education"],"location":"Bordeaux France","acronym":"FDG'11"},"container-title":["Proceedings of the 6th International Conference on Foundations of Digital Games"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2159365.2159416","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2159365.2159416","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T10:05:51Z","timestamp":1750241151000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2159365.2159416"}},"subtitle":["game piracy activity vs. metacritic score"],"short-title":[],"issued":{"date-parts":[[2011,6,29]]},"references-count":18,"alternative-id":["10.1145\/2159365.2159416","10.1145\/2159365"],"URL":"https:\/\/doi.org\/10.1145\/2159365.2159416","relation":{},"subject":[],"published":{"date-parts":[[2011,6,29]]},"assertion":[{"value":"2011-06-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}