Albanese, Jay. (2018). Cybercrime as an Essential Element in Transnational Counterfeiting Schemes. Presentation at International Academic Conference: Linking Organized Crime and Cybercrime. Une conférence accueillie par la Hallym University et parrainée par l’ONUDC, 8 juin 2018.
Burkart, Patrick. (2010). Music and cyberliberties. Wesleyan University Press.
Chaudhry, Peggy E., Sohail S. Chaudhry, Stephen A. Stumpf, and Hasshi Sudler. (2011). Piracy in Cyberspace: Consumer Complicity, Pirates and Enterprise Enforcement. Enterprise Information Systems, Vol. 5(2), 255-271.
Chaudhry, Peggy E., Sohail S. Chaudhry, Stephen A. Stumpf, and Hasshi Sudler. (2011). Piracy in Cyberspace: Consumer Complicity, Pirates and Enterprise Enforcement. Enterprise Information Systems, Vol. 5(2), 255-271.
Cheung, C.K. (2013). Understanding factors associated with online piracy behaviour of adolescents. International Journal of Adolescence and Youth, Vol. 18(2), 122-132.
Dolliver, Diana and Katherine Love. (2015). Criminogenic asymmetries in cyberspace: A comparative analysis of two TOR marketplaces. Journal of Globalization Studies, Vol 6(2), 75-96
Drath, Ross. (2012). Hotfile, Megaupload, and the future of copyright on the Internet: What can cyberlockers tell us about DMCA reform? The John Marshall Review of Intellectual Property Law, Vol. 12, 205-241.
Gifford Jr., Adam and Gary J. Santoni. (1979). Public economics: politicians, property rights, and exchange. Dryden, Press.
Goldsmith, Andrew and Russell Brewer. (2015). Digital drift and the criminal interaction order. Theoretical Criminology, Vol. 19(1), 112-130.
Gopal, Ram D. and G. Lawrence Sanders. (1998). International software piracy: Analysis of key issues and impacts. Information Systems Research, Vol. 9(4), 380-397.
Gopal, Ram, G. Lawrence, Sudip Bhattacharjee, Manish Agrawal and Suzanne C. Wagner. (2004). A behavioral model of digital music piracy. Journal of Organizational Computing & Electronic Commerce, Vol. 14(2), 89-105.
Higgins, George E. (2005). Can low self‐control help with the understanding of the software piracy problem? Deviant Behavior, Vol. 26:1-24.
Higgins, George E. and Abbey L. Wilson. (2006). Low Self-Control, Moral Beliefs, and Social Learning Theory in University Students' Intentions to Pirate Software. Security Journal, Vol. 19(2), 75-92.
Higgins, George E. and David Makin. (2004). Does Social Learning Theory Condition the Effects of Low Self-control on College Students' Software Piracy? Journal of Economic Crime Management, Vol. 2, 1-22.
Higgins, George E. and David Makin. (2004). Self-Control, Deviant Peers, and Software Piracy. Psychological Reports, Vol. 95(3), 921-931.
Higgins, George E., Brian D. Fell and Abbey L. Wilson. (2006). Digital piracy: assessing the contributions of an integrated self-control theory and social learning theory. Criminal Justice Studies, Vol. 19(1), 3-22.
Higgins, George E., Brian D. Fell and Abby L. Wilson. (2007). Low Self-Control and Social Learning in Understanding Students' Intentions to Pirate Movies in the United States. Social Science Computer Review, Vol. 25(3), 339-357.
Higgins, George E., Scott E. Wolfe and Catherine D. Marcum. (2008). Digital Piracy: An Examination of Three Measurements of Self-Control. Deviant Behavior, 29(5), 440-460.
Higgins, George E., Scott E. Wolfe and Catherine D. Marcum. (2008). Digital Piracy and neutralization: A trajectory analysis from short-term longitudinal data. International Journal of Cyber Criminology, Vol. 2(2), 324-336.
Hinduja, Sameer. (2001).Correlates of Internet software piracy. Journal of Contemporary Criminal Justice, Vol. 17,369-382.
Hinduja, Sameer. (2012). General Strain, Self-Control, and Music Piracy. International Journal of Cyber Criminology, Vol. 6(1), 951-967
Hinduja, Sameer. (2007). Neutralization theory and online software piracy: An empirical analysis. Ethics and Information Technology, Vol. 9(3), 187-204.
Hinduja, Sameer and Jason Ingram. (2008). Self-control and ethical beliefs on the social learning of intellectual property theft. Western Criminology Review, Vol. 9(2), 52-72.
Hinduja, Sameer and Jason Ingram. (2009). Social learning theory and music piracy: The differential role of online and offline peer influences. Criminal Justice Studies, Vol. 22(4), 405-420.
Hohn, Dave A., Lisa R. Muftic and Kelly Wolf. (2006). Swashbuckling students: an exploratory study of Internet piracy. Security Journal, Vol. 19(2), 110-127.
Ingram, Jason and Sameer Hinduja, S. (2008). Neutralizing music piracy: An empirical examination. Deviant Behavior, Vol. 29(4), 334-366.
INTA. (2017). Launch of INTA-CIPAM Children's IP Awareness and Education Campaign in Schools. INTA Bulletin, Vol. 72(9).
Lessig, Lawrence. (2004). Free culture: How big media uses technology and the law to lock down culture and control creativity. Penguin.
Lessig, Lawrence. (2008). Remix: making art and commerce thrive in the hybrid economy. Penguin.
Malin, Jenessa and Blain J. Fowers. (2009). Adolescent self-control and music and movie piracy. Computers in Human Behavior, Vol. 25(3), 718-722.
Maras, Marie-Helen. (2016). Cybercriminology. Oxford University Press.
Moore, Robert G., and Elizabeth McMullan. (2009). Neutralizations and rationalizations of digital piracy: A qualitative analysis of university students. International Journal of Cyber Criminology, Vol. 3(1), 441-451.
Morris, Robert G. and George E. Higgins. (2009). Neutralizing Potential and Self-Reported Digital Piracy: A Multitheoretical Exploration Among College Undergraduates. Criminal Justice Review, Vol. 34(2), 173-195.
Seale, Darryl A., Michael Polakowski, and Sherry Schneider. (1998). It's Not Really Theft! Personal and Workplace Ethics that Enable Software Privacy. Behavior and Information Technology, Vol. 17(1), 27-40.
Silbey, Jessica M. (2018). The Mythical Beginnings of Intellectual Property. George Mason Law Review, Vol. 15, 319-379.
Smallridge, Joshua L. and Jennifer R. Roberts. (2013). Crime Specific Neutralizations: An Empirical Examination of Four Types of Digital Piracy. International Journal of Cyber Criminology, Vol. 7(2), 125-140.
Shin, Seung Kyoon, Ram D. Gopal, G. Lawrence Sanders, and Andrew B. Whinston. (2004). Global software piracy revisited. Communications of the ACM, Vol. 47(1), 103-107.
Siponen Mikko and Anthony Vance. (2010). Neutralization: New insights into the problem of employee information systems security policy violation. Management Information Systems Quarterly, Vol. 34(3), 487-502.
Skinner, B. F. and Fream, A. M. (1997). A social learning theory analysis of computer crime among college students. Journal of Research in Crime and Delinquency, 34, 495-518.
Sykes, Gresham and David Matza. (1957). Techniques of neutralization: A theory of delinquency. American Sociological Review, Vol. 22(6), 664-670.
ONUDC. (2014b). « Contrefaçon. Ne soutenez pas le crime organisé. » – L’ONUDC lance une campagne de sensibilisation sur les 250 milliards de dollars générés chaque année par la contrefaçon.
Wall, David S. (2017). The Theft of Ideas as a Cybercrime: Downloading and Changes in the Business Model of Creative Arts. In M. McGuire and T. Holt (eds). The Handbook of Technology, Crime & Justice (pp. 161-177) , Routledge.
Zeithaml, Valarie A. (1988). Consumer Perceptions of Price, Quality, and Value: A Means-End Model and Synthesis of Evidence. Journal of Marketing, Vol. 52, 2-22.
Arrêts
A&M Records, Inc. v. Napster, Inc., 239 F. 3d 1004 (2001).
Feist Publications, Inc v. Rural Telephone Service Co Inc., 499 U.S. 340 (1991).
Jewelers' Circular Pub. Co. v. Keystone Pub. Co., 281 F. 83 (2d Cir 1922).
Directive (UE) 2016/943 du Parlement européen et du Conseil du 8 juin 2016 relative à la protection du savoir-faire et des informations commerciales non divulgués (secrets d'affaires) contre l’obtention, l’utilisation et la divulgation illicites .