1. Array
    (
        [0] => Array
            (
                [sl] => ru
                [dispatch] => products.view
                [product_id] => 34502
                [version_id] => 0
            )
    
        [1] => ?:products.*, ?:product_descriptions.*, MIN(IF(?:product_prices.percentage_discount = 0, ?:product_prices.price, ?:product_prices.price - (?:product_prices.price * ?:product_prices.percentage_discount)/100)) as price, GROUP_CONCAT(IF(?:products_authors.link_type = 'M', CONCAT(?:products_authors.author_id, 'M'), ?:products_authors.author_id) ORDER BY ?:products_authors.position) as authors_ids, popularity.total as popularity, ?:publications_version.status as status, ?:publications_version.version_id as version_id, IF(shared_prices.product_id IS NOT NULL,MIN(IF(shared_prices.percentage_discount = 0, shared_prices.price, shared_prices.price - (shared_prices.price * shared_prices.percentage_discount)/100)),MIN(IF(?:product_prices.percentage_discount = 0, ?:product_prices.price, ?:product_prices.price - (?:product_prices.price * ?:product_prices.percentage_discount)/100))) as price
        [2] => Array
            (
                [product_id] => 34502
                [product_code] => S086904990000616-9-
                [doi] => 
                [show_doi] => N
                [product_type] => P
                [serial_number] => 616
                [company_id] => 27
                [list_price] => 0.0
                [amount] => 0
                [weight] => 0.000
                [length] => 0
                [width] => 0
                [height] => 0
                [shipping_freight] => 0.00
                [low_avail_limit] => 0
                [timestamp] => 1605018317
                [updated_timestamp] => 1605103924
                [usergroup_ids] => 0
                [is_edp] => Y
                [edp_shipping] => N
                [unlimited_download] => N
                [tracking] => B
                [free_shipping] => N
                [zero_price_action] => R
                [is_pbp] => N
                [is_op] => N
                [is_oper] => N
                [is_returnable] => Y
                [return_period] => 10
                [avail_since] => 0
                [out_of_stock_actions] => N
                [localization] => 
                [min_qty] => 0
                [max_qty] => 0
                [qty_step] => 0
                [list_qty_count] => 0
                [tax_ids] => 
                [age_verification] => N
                [age_limit] => 0
                [options_type] => P
                [exceptions_type] => F
                [details_layout] => 
                [shipping_params] => a:5:{s:16:"min_items_in_box";i:0;s:16:"max_items_in_box";i:0;s:10:"box_length";i:0;s:9:"box_width";i:0;s:10:"box_height";i:0;}
                [publication_type] => A
                [source_materials] => 
                [date_public] => 1393790400
                [date_accepted] => 0
                [date_received] => 0
                [date_included] => 0
                [date_review] => 0
                [comments] => 
                [list_ref] => Касперский Е. “Я стану № 1 в мире!” / / Территория бизнеса. 2008. № 5 (http://www. t6-magazine.ru/archive/20/subject/kaspersky/).<br />Шаститко А.Е. Конкурентоспособность региона: содержание, факторы, политика / / Балтийский регион. 2009. № 1.<br />Шаститко А.Е. Теория и практика сбалансированности инструментов экономической политики (Cтоит ли защищать конкуренцию от интеллектуальной собственности?) // Вопросы экономики. 2013. № 8.<br />Arrow K. Economic Welfare and the Allocation of Resources for Invention // The Rate and Direction of Inventive Activity. Princeton, 1962.<br />Business Software Association (BSA) Shadow Market. 2011 BSA Global Software Piracy Study. BSA. 2012.<br />Campbell-Kelly M. Development and Structure of the International Software Industry, 1950– 1990 // Business and Economic History. 1995. Vol. 24. № 2.<br />Cohen W., Nelson R., Walsh J. Protecting Their Intellectual Assets: Appropriability Conditions and Why U.S. Manufacturing Firms Patent (or Not) // NBER Working Paper. 2000. № w7552.<br />The Commission on the Theft of American Intellectual Property. 2013. The IP Commission Report (http://ipcommission.org/report/IP_Commission_ Report_052213.pdf).<br />Conner K.R., Rumelt R.P. Software Piracy: аn Analysis of Protection Strategies // Management Science. 1991. № 37.<br />Dasgupta P., David P. Information Disclosure and the Economics of Science and Technology // Arrow and the Ascent of Modern Economic Theory. New York, 1987.<br />Dasgupta P., David P. Toward a New Economics of Science // Research Policy. 1994. № 23.<br />Ellickson R. Order Without Law: How Neighbors Settle Disputes. Harvard, 1991.<br />Fauchart E., Hippel E. von. Norms-Based Intellectual Property Systems: the Case of French Chefs // MIT Sloan School of Management Working Paper 4576–06. January. 2006.<br />George K., Joll C., Lynk E. Industrial Organization: Competition, Growth and Structural Change. London, 1992.<br />Hackman J. Group Influ ences on Individuals. Chapter 33 / / Handbook of Industrial and Organizational Psychology. Chicago, 1976.<br />Levin R., Klevorick A., Nelson R., Winter S. Appropriating the Returns from Industrial Research and Development // Brookings Papers on Economic Activity. 1987. № 3.<br />Longe O.B. Intellectual Property Protection in the Age of Open Access and Digital Rights Management Balancing the Odds (http://www.ais.up.ac.za/digi /docs/longe_paper.pdf (2009)) Lu Y., Poddar S. Accommodation or Deterrence in the Face of Commercial Piracy: the Impact of Intellectual Property Rights (IPR) Protection // CEMA Working Papers 389. 2009.<br />Mansfield E. Patents and Innovation: аn Empirical Study // Management Science. 1986. № 32.<br />O’Mahony S. Guarding the Commons: how Open source Contributors Protect their Work // Rsearch Policy. 2003. Vol. 32. № 7.<br />Ostrom E. Governing the Commons. Cambridge, 1990.<br />Picot A., Fiedler M. Impacts of DRM on Internet Based Innovation // Digital Rights Management: Lecture Notes in Computer Science. 2003. Vol. 2770.<br />Rai A. Regulating Scientifi c Research: Intellectual Property Rights and the Norms of Science // Northwestern University Law Review. 1999. Vol. 94. № 1 (Fall).<br />Samuelson P. DRM {and, or, vs.} the Law // Communications of the ACM. 2003. Vol. 46. № 4.<br />Sundararajan A. Managing Digital Piracy: Pricing, Protection and Welfare // Center for Digital Economy Research, Stern School of Business, Working Paper. 2003. № IS-03–05.<br />Svensson M., Larsson S. Social Norms and Intellectual Property: Online Norms and the European Legal Development // Lund University Research Report in Sociology of Law. 2009. № 1.<br />Tyler T. Why People Obey the Law. New Haven, 1990.<br />Ünlü V., Hess T. The Optimal Level of Technical Copyright Protection: а Game-theoretic Approach // Institute of Information Systems and New Media at the Munich School of Management, Working Paper. 2003. № 9–2003.<br />Välimäki M., Oksanen V. DRM Interoperability and Intellectual Property Policy in Europe // European Intellectual Property Review. 2006. Vol. 26. № 11.<br />World Economic Forum, INSEAD. The Global Information Technology Report 2012. Living in a Hyperconnected World.
                [number_payments] => 1
                [issues_id] => 0
                [product_another] => 
                [keywords_list_another] => 
                [full_description_another] => 
                [financing_sources] => 
                [financing_sources_en] => 
                [position] => 2
                [page_from] => 17
                [page_to] => 33
                [rubric_ru] => 
                [rubric_en] => 
                [external_pid] => 0
                [edu_program_ids] => 313,314,318,448,449,450,451,452
                [operator_id] => 13224
                [issn_isbn] => 08690499
                [pages] => 0
                [retracted] => N
                [retracted_comment] => 
                [external_url] => 
                [video_url] => 
                [gold_access] => N
                [nonperiodic_type] => 
                [isbn] => 
                [source] => 
                [fiscal_data_1212] => 1
                [mark_code_type] => 
                [lang_code] => ru
                [product] => КАК ЗАЩИТИТЬ РЕЗУЛЬТАТЫ ИНТЕЛЛЕКТУАЛЬНОЙ ДЕЯТЕЛЬНОСТИ
                [shortname] => 
                [short_description] => 
                [full_description] => В статье рассматриваются проблемы защиты результатов интеллектуальной деятельности, прежде всего программного обеспечения, от несанкционированного копирования в странах с развивающейся экономикой. Ставятся задачи выявления особенностей интеллектуальной деятельности как особого блага, оценки масштабов контрафакта в сфере программного обеспечения и сравнительных преимуществ различных средств защиты – технических, правовых, морально- ценностных. Представлены различные варианты взаимосвязей между этими способами защиты результатов интеллектуальной деятельности.
                [meta_keywords] => 
                [meta_description] => 
                [search_words] => 
                [page_title] => 
                [theme] => 
                [age_warning_message] => 
                [keywords_list] => интеллектуальная собственность, интеллектуальный продукт, результаты интеллектуальной деятельности, программное обеспечение, защита интеллектуальной собственности
                [affiliation] => 
                [address] => 
                [occupation] => 
                [additional_sources_n_materials] => 
                [promo_text] => 
                [authors] => 
                [report_name] => 
                [price] => 0.00000000
                [authors_ids] => 30462,30461,17804
                [popularity] => 3027
                [status] => P
                [version_id] => 36143
            )
    
    )