Parameters for Software Piracy Research

Advances in Internet and other digital technologies have opened up new channels and methods for online business. They have also led to a situation where the same channels can be abused and misused. One of these forms of technology abuse, which is becoming increasingly prevalent these days, is the piracy of digital content. This article introduces a relatively comprehensive and unified theoretical framework for studying and understanding a major aspect of digital piracy: namely, software piracy. Based on Routine Activities Theory, Rational Choice Theory, and guardianship concepts, the framework identifies key parameters that can affect the incidence of software piracy. We apply the framework in conducting a systematic examination of 75 articles dealing with software piracy. The examination reveals that a considerable number of parameters have received little or no attention from software-piracy researchers. In addition to suggesting research opportunities, the framework furnishes a systematic approach for structuring the design of future research studies in the realm of software piracy. The insights furnished by this article contribute to future investigations of the software-piracy phenomenon that are needed to avert the economic and social damage caused by software piracy.

[1]  L. Loren Digitization, Commodification, Criminalization: the Evolution of Criminal Copyright Infringement and the Importance of the Willfulness Requirement , 1999 .

[2]  Trevor T. Moores The effect of national culture and economic wealth on global software piracy rates , 2003, CACM.

[3]  J. Burn,et al.  Softlifting and piracy: behavior across cultures , 2001 .

[4]  A. Rehn,et al.  The Politics of Contraband - The Honor Economies of the Warez Scene , 2004 .

[5]  Clifford M. Koen,et al.  Software piracy and its legal implications , 1997, Inf. Manag..

[6]  Vijay Mahajan,et al.  Software Piracy: Estimation of Lost Sales and the Impact on Software Diffusion , 1995 .

[7]  J. Marsden,et al.  Impact of Legal Threats on Online Music Sharing Activity: An Analysis of Music Industry Legal Actions* , 2006, The Journal of Law and Economics.

[8]  Dusten R. Hollist,et al.  Causes of Delinquency , 1950, Juvenile Justice.

[9]  Ibrahim M. Al-Jabri,et al.  Software copyright infringements: an exploratory study of the effects of individual and peer beliefs , 1997 .

[10]  Pamela Samuelson,et al.  DRM {and, or, vs.} the law , 2003, CACM.

[11]  Feng-Yang Kuo,et al.  Development and Validation of Ethical Computer Self-Efficacy Measure: The Case of Softlifting , 2001 .

[12]  Rajiv Kohli,et al.  Introduction to the Special Issue: Measuring the Business Value of Information Technology in e-Business Environments , 2004, Int. J. Electron. Commer..

[13]  Joseph N. Symons Delinquency as the Failure of Personal and Social Controls: Discussion , 1951 .

[14]  Lydia L. Gan,et al.  An empirical study of software piracy among tertiary institutions in Singapore , 2006, Inf. Manag..

[15]  P. Simpson,et al.  Softlifting: A model of motivating factors , 1994 .

[16]  R. Ford,et al.  Ethical decision making: A review of the empirical literature , 1994 .

[17]  Sanjay Jain,et al.  Editors' Introduction , 2005, ALT.

[18]  Sigi Goode,et al.  What Motivates Software Crackers? , 2006 .

[19]  A. Reiss, Delinquency as the Failure of Personal and Social Controls , 1951 .

[20]  Dennis F. Galletta,et al.  Software Piracy in the Workplace: A Model and Empirical Test , 2003, J. Manag. Inf. Syst..

[21]  J. Braithwaite Crime, shame and reintegration: Contents , 1989 .

[22]  Ranjan B. Kini,et al.  An Empirical Study of Software Piracy and Moral Intensity among University Students , 2000, Journal of Computer Information Systems.

[23]  Timothy Paul Cronan,et al.  Piracy, computer crime, and IS misuse at the university , 2006, Commun. ACM.

[24]  George E. Higgins,et al.  Digital Piracy: Assessing the Contributions of an Integrated Self‐Control Theory and Social Learning Theory Using Structural Equation Modeling , 2006 .

[25]  Hsing Kenneth Cheng,et al.  Toward a profile of student software piraters , 1996 .

[26]  Stephen J. Gould,et al.  “To Pirate or Not to Pirate”: A Comparative Study of the Ethical Versus Other Influences on the Consumer’s Software Acquisition-Mode Decision , 2004 .

[27]  Karen D. Loch,et al.  Evaluating ethical decision making and computer use , 1996, CACM.

[28]  J. Chiou,et al.  The Antecedents of Music Piracy Attitudes and Intentions , 2005 .

[29]  D. Greenberg The historical variability of the age-crime relationship , 1994 .

[30]  D. Marlowe,et al.  A new scale of social desirability independent of psychopathology. , 1960, Journal of consulting psychology.

[31]  Trevor T. Moores,et al.  Ethical Decision Making in Software Piracy: Initial Development and a Test of a Four-Component Model , 2006, MIS Q..

[32]  Ram D. Gopal,et al.  Preventive and Deterrent Controls for Software Piracy , 1997, J. Manag. Inf. Syst..

[33]  T. P. Cronan,et al.  Digital Piracy: Factors that Influence Attitude Toward Behavior , 2006 .

[34]  W StraubDetmar,et al.  Key information liability issues facing managers: software piracy, proprietary databases, and individual rights to privacy , 1990 .

[35]  Lawrence E. Cohen,et al.  Social Change and Crime Rate Trends: A Routine Activity Approach , 1979 .

[36]  David S. Wall,et al.  Crime and the Internet , 2001 .

[37]  R. Agnew,et al.  Gender and Crime: A General Strain Theory Perspective , 1997 .

[38]  Vijay Mahajan,et al.  Assessing the relationship between the user-based market share and unit sales-based market share for pirated software brands in competitive markets , 1997 .

[39]  M. Hood Steal this software and this DVD, and this book, and this handbag, and this car... [intellectual property] , 2005, IEEE Spectrum.

[40]  Wallace A. Wood,et al.  Situational determinants of software piracy: An equity theory perspective , 1996 .

[41]  Ranjan B. Kini,et al.  Shaping of Moral Intensity regarding Software Piracy in University Students: Immediate Community Effects , 2001, J. Comput. Inf. Syst..

[42]  B. Tan Understanding consumer ethical decision making with respect to purchase of pirated software , 2002 .

[43]  David C. Yen,et al.  Software Asset Management: Analysis, Development and Implementation , 1999 .

[44]  Puay Tang How Electronic Publishers are Protecting agains Privacy: Doubts about Technical Systems of Protection , 1998, Inf. Soc..

[45]  Kallol Kumar Bagchi,et al.  Global software piracy , 2006, Commun. ACM.

[46]  James R. Marsden,et al.  Consumer Search and Retailer Strategies in the Presence of Online Music Sharing , 2006, J. Manag. Inf. Syst..

[47]  Stephen P. King,et al.  Network externalities, price discrimination and profitable piracy , 2003, Inf. Econ. Policy.

[48]  Martha M. Eining,et al.  Software Piracy among Accounting Students: A Longitudinal Comparison of Changes and Sensitivity , 2006, J. Inf. Syst..

[49]  Amos H. Hawley,et al.  Human Ecology: A Theory of Community Structure , 1950 .

[50]  Darryl A. Seale,et al.  It's not really theft!: Personal and workplace ethics that enable software piracy , 1998, Behav. Inf. Technol..

[51]  Sameer Hinduja,et al.  Correlates of Internet Software Piracy , 2001 .

[52]  T. S. Raghu,et al.  Strategic Analysis of Corporate Software Piracy Prevention and Detection , 2005, J. Organ. Comput. Electron. Commer..

[53]  Richard A. Reid,et al.  Software piracy: Is it related to level of moral judgment? , 1994 .

[54]  Trevor T. Moores,et al.  A reversed context analysis of software piracy issues in Singapore , 2004, Inf. Manag..

[55]  Afzaal H. Seyal,et al.  Software piracy among academics: an empirical study in Brunei Darussalam , 2000, Inf. Manag. Comput. Secur..

[56]  George E. Higgins can low self-control help with the understanding of the software piracy problem? , 2004 .

[57]  Gurpreet Dhillon,et al.  Software piracy: a view from Hong Kong , 2000, CACM.

[58]  G. Lawrence Sanders,et al.  Considerations in Ethical Decision-Making and Software Piracy , 2001 .

[59]  Vincent J. Calluzzo,et al.  Ethics in Information Technology and Software Use , 2004 .

[60]  William R. Swinyard,et al.  The morality of software piracy: A cross-cultural analysis , 1990 .

[61]  Dyuti S. Banerjee Lobbying and commercial software piracy , 2006 .

[62]  R. Clarke,et al.  Modeling Offenders' Decisions: A Framework for Research and Policy , 1985, Crime and Justice.

[63]  Ron Honick Software Piracy Exposed , 2005 .

[64]  Pamela Samuelson Digital Rights Management {and, or, vs.} the Law , 2003 .

[65]  Oz Shy,et al.  A strategic approach to software protection , 1999 .

[66]  Ranjan B. Kini,et al.  Shaping of Moral Intensity Regarding Software Piracy: A Comparison Between Thailand and U.S. Students , 2004 .

[67]  S. Hinduja Trends and patterns among online software pirates , 2003, Ethics and Information Technology.

[68]  Matthew Green,et al.  Security through legality , 2006, Commun. ACM.

[69]  Fang Wang,et al.  Purchasing pirated software: an initial examination of Chinese consumers , 2005 .

[70]  A. Andrés The relationship between copyright software protection and piracy: Evidence from europe , 2006 .

[71]  Jane C. Ginsburg,et al.  Copyright and Control Over New Technologies of Dissemination , 2001 .

[73]  Jeffrey Scott Mclllwain Intellectual Property Theft and Organized Crime: The Case of Film Piracy , 2005 .

[74]  R. Clarke Hot Products : understanding , anticipating and reducing demand for stolen goods , 1999 .

[75]  A. Andrés Software piracy and income inequality , 2006 .

[76]  Andrew B. Whinston,et al.  Global software piracy revisited , 2004, CACM.

[77]  Chee-Sing Yap,et al.  Testing an Ethical Decision-Making Theory: The Case of Softlifting , 1998, J. Manag. Inf. Syst..

[78]  Jung P. Shim,et al.  A Comparative Examination of Attitudes Toward Software Piracy Among Business Professors and Executives , 1993 .

[79]  Gene Brown,et al.  Individual Difference Variables, Ethical Judgments, and Ethical Behavioral Intentions , 1999, Business Ethics Quarterly.

[80]  C. Depken,et al.  Social construct and the propensity for software piracy , 2004 .

[81]  JoAnne Yates,et al.  Electronic markets and electronic hierarchies , 1987, CACM.

[82]  Afzaal H. Seyal,et al.  Software piracy among computing students: a Bruneian scenario , 1999, Comput. Educ..

[83]  R. Paternoster,et al.  The deterrent effect of the perceived certainty and severity of punishment: A review of the evidence and issues , 1987 .

[84]  Miriam D. Sealock,et al.  Gender and general strain theory: A preliminary test of Broidy and Agnew's gender/GST hypotheses , 2004 .

[85]  Ram D. Gopal,et al.  International Software Piracy: Analysis of Key Issues and Impacts , 1998, Inf. Syst. Res..

[86]  James William Coleman,et al.  Toward an Integrated Theory of White-Collar Crime , 1987, American Journal of Sociology.

[87]  Vijay Mahajan,et al.  How many pirates should a software firm tolerate? An analysis of piracy protection on the diffusion of software , 2003 .

[88]  K. R. Conner,et al.  Software piracy: an analysis of protection strategies , 1991 .

[89]  Sudip Bhattacharjee,et al.  A Behavioral Model of Digital Music Piracy , 2004, J. Organ. Comput. Electron. Commer..

[90]  Ram D. Gopal,et al.  Global software piracy: you can't get blood out of a turnip , 2000, CACM.

[91]  Vijay Mahajan,et al.  The Effect of Piracy on the Market Penetration of Subscription Software , 2004 .

[92]  B. Husted The Impact of National Culture on Software Piracy , 2000 .

[93]  Elia Zureik,et al.  Correlates of computer misuse: data from a self-reporting sample , 1990 .

[94]  Pamela Samuelson,et al.  Why the Anti-Circumvention Regulations Need to be Revised , 1999 .

[95]  Sudip Bhattacharjee,et al.  Digital music and online sharing: software piracy 2.0? , 2003, CACM.

[96]  James R. Marsden,et al.  Whatever happened to payola? An empirical analysis of online music sharing , 2005, Decis. Support Syst..

[97]  Jay Pil Choi,et al.  A model of piracy , 2006, Inf. Econ. Policy.

[98]  Kemal Altinkemer,et al.  Online software distribution without enforcing copy protection as a strategic weapon , 2005, Inf. Syst. E Bus. Manag..

[99]  Shivendu Shivendu,et al.  Managing Piracy: Pricing and Sampling Strategies for Digital Experience Goods in Vertically Segmented Markets , 2003, Inf. Syst. Res..

[100]  Craig A. Depken,et al.  Influences on software piracy: Evidence from the various United States , 2006 .

[101]  E. K. Lau An Empirical Study of Software Piracy , 2003 .

[102]  Ranjan B. Kini,et al.  An exploratory study of moral intensity regarding software piracy of students in Thailand , 2003, Behav. Inf. Technol..

[103]  Wynne W. Chin,et al.  Factors motivating software piracy: a longitudinal study , 2004, IEEE Transactions on Engineering Management.

[104]  Harold G. Grasmick,et al.  Conscience, significant others, and rational choice: Extending the deterrence model. , 1990 .

[105]  David G Steel,et al.  Which Countries Protect Intellectual Property? The Case of Software Piracy , 2000 .

[106]  Jih-Hsin Tang,et al.  The Effect of Interpersonal Influence on Softlifting Intention and Behaviour , 2005 .

[107]  A. Kong,et al.  A Study of Unauthorised Software Copying Among Post-Secondary Students in Hong Kong , 1990, Aust. Comput. J..

[108]  Dyuti Banerjee Software piracy: a strategic analysis and policy instruments , 2003 .

[109]  Daniel S. Nagin,et al.  THE DETERRENT EFFECT OF PERCEIVED CERTAINTY AND SEVERITY OF PUNISHMENT REVISITED , 1989 .

[110]  Rajeev Prasad Piracy Over Peer-To-Peer Based on Personal Network , 2006, Wirel. Pers. Commun..

[111]  Hsing K. Cheng,et al.  To Purchase or to Pirate Software: An Empirical Study , 1997, J. Manag. Inf. Syst..

[112]  Robert M. Siegfried,et al.  Student Attitudes on Software Piracy and Related Issues of Computer Ethics , 2004, Ethics and Information Technology.

[113]  R. Mason Four ethical issues of the information age , 1986 .

[114]  Jeroen van Wijk,et al.  Dealing with Piracy:: Intellectual Asset Management in Music and Software , 2002 .