{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,5]],"date-time":"2025-12-05T01:14:45Z","timestamp":1764897285988,"version":"3.46.0"},"reference-count":0,"publisher":"Canadian Center of Science and Education","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CIS"],"DOI":"10.5539\/cis.v3n3p30","type":"journal-article","created":{"date-parts":[[2014,5,14]],"date-time":"2014-05-14T02:38:43Z","timestamp":1400035123000},"source":"Crossref","is-referenced-by-count":1,"title":["An Exploratory Study of Determinants and Corrective Measures for Software Piracy and Counterfeiting in the Digital Age"],"prefix":"10.5539","volume":"3","author":[{"given":"Yin-Leng","family":"Theng","sequence":"first","affiliation":[]},{"given":"Wee Teck","family":"Tan","sequence":"additional","affiliation":[]},{"given":"May","family":"O. Lwin","sequence":"additional","affiliation":[]},{"given":"Schubert Foo","family":"Shou-Boon","sequence":"additional","affiliation":[]}],"member":"3486","published-online":{"date-parts":[[2010,7,9]]},"container-title":["Computer and Information Science"],"original-title":[],"link":[{"URL":"https:\/\/www.ccsenet.org\/journal\/index.php\/CIS\/article\/download\/6892\/5427","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,5]],"date-time":"2025-12-05T01:12:09Z","timestamp":1764897129000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.ccsenet.org\/journal\/index.php\/cis\/article\/view\/6892"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,7,9]]},"references-count":0,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2010,7,20]]}},"URL":"https:\/\/doi.org\/10.5539\/cis.v3n3p30","relation":{},"ISSN":["1913-8997","1913-8989"],"issn-type":[{"type":"electronic","value":"1913-8997"},{"type":"print","value":"1913-8989"}],"subject":[],"published":{"date-parts":[[2010,7,9]]}}}