Unauthorized copying of software: what is wrong with the nonexclusive argument? | IEEE Journals & Magazine | IEEE Xplore