The Profiles of Software Pirates among Tertiary Institutions in Singapore

The study seeks to examine the perception of software piracy as well as to discover its underlying factors among Singapore’s three university communities. Some five hundred responses were gathered from students and staff. By means of cluster analysis and factor analysis, the results identify three clusters of pirate profiles as influenced by factors such as attitudes towards software publishers, general acceptance, convenience, and ethics. The decision tree method links each pirate profile to demographic and computer-related variables. It shows that while age is negatively related to software piracy, computer experience and computer usage demonstrates an ambiguous relationship to software piracy respectively. Further, the undergraduate students tend to be pirates more often than university employees, and the Malays tend to be less frequent pirates as compared to other races. It is hoped that the study will help the relevant policy makers to develop better strategies to protect and to enforce the intellectual property rights among the universities as well as in an increasingly knowledge-based economy such as Singapore.

[1]  Vijay Mahajan,et al.  Software Piracy: Estimation of Lost Sales and the Impact on Software Diffusion , 1995 .

[2]  L. Kohlberg,et al.  The meaning and measurement of moral development , 1981 .

[3]  Eli B. Cohen,et al.  College Students Believe Piracy is Acceptable , 1989, J. Inf. Syst. Educ..

[4]  Wilfried R. Vanhonacker,et al.  Optimal strategic pricing of reproducible consumer products , 1988 .

[5]  Ranjan B. Kini,et al.  An exploratory study of moral intensity regarding software piracy of students in Thailand , 2003, Behav. Inf. Technol..

[6]  Hsing K. Cheng,et al.  To Purchase or to Pirate Software: An Empirical Study , 1997, J. Manag. Inf. Syst..

[7]  Joseph Farrell,et al.  Installed base and compatibility : innovation, product preannouncements and predation , 1986 .

[8]  Janet M. Cook Increasing students security awareness: article II. What C.S. graduates don`t learn about security concepts and ethical standards , 1986, SIGCSE '86.

[9]  Ronald R. Sims,et al.  Corporate Misconduct: The Legal, Societal, and Management Issues , 1995 .

[10]  Ram D. Gopal,et al.  Preventive and Deterrent Controls for Software Piracy , 1997, J. Manag. Inf. Syst..

[11]  S. Athey,et al.  A comparison of experts' and high tech students' ethical beliefs in computer-related situations , 1993 .

[12]  C. Shapiro,et al.  Technology Adoption in the Presence of Network Externalities , 1986, Journal of Political Economy.

[13]  Jin H. Im,et al.  Software piracy and software security in business schools: an ethical perspective , 1991, DATB.

[14]  Ang Yang Ang,et al.  Piracy Attitudes of Tertiary Students in Australia , 1998 .

[15]  L. Kohlberg A Cognitive-Developmental Approach to Moral Education. , 1972 .

[16]  Brian J. Reithel,et al.  The Software Piracy Dilemma in Public Administration: A Survey of University Software Policy Enforcement , 1994 .

[17]  James A. Muncy,et al.  Consumer ethics: An investigation of the ethical beliefs of the final consumer. , 1992 .

[18]  William C. Gaidis,et al.  A cross-cultural comparison of the ethics of business students , 1991 .

[19]  William R. Johnson,et al.  The Economics of Copying , 1985, Journal of Political Economy.

[20]  Lisa N. Takeyama The Welfare Implications of Unauthorized Reproduction of Intellectual Property in the Presence of Demand Network Externalities , 1994 .

[21]  Timothy Paul Cronan,et al.  Modeling IT Ethics: A Study in Situational Ethics , 1998, MIS Q..

[22]  P. Langenberg,et al.  Trends in proprietary protection in Asia and the Pacific region , 1985 .

[23]  Dyuti Banerjee Software piracy: a strategic analysis and policy instruments , 2003 .

[24]  Charles A. Rarick,et al.  Education for the moral development of managers: Kohlberg's stages of moral development and integrative education , 1987 .

[25]  Donald L. Davis,et al.  Ethical beliefs of MIS professionals: The frequency and opportunity for unethical behavior , 1990 .

[26]  William R. Swinyard,et al.  The morality of software piracy: A cross-cultural analysis , 1990 .

[27]  Harold Joseph Highland Protecting your microcomputer system , 1984 .

[28]  Robert A. Peterson,et al.  Concerns of College Students Regarding Business Ethics , 1984 .

[29]  T. R. Martin Do Courses in Ethics Improve the Ethical Judgment of Students? , 1981 .

[30]  John M. Browning,et al.  How ethical are industrial buyers , 1983 .

[31]  S. Besen Private copying, reproduction costs, and the supply of intellectual property , 1986 .

[32]  K. R. Conner,et al.  Software piracy: an analysis of protection strategies , 1991 .

[33]  Hsing Kenneth Cheng,et al.  Toward a profile of student software piraters , 1996 .

[34]  Jung P. Shim,et al.  A Comparative Examination of Attitudes Toward Software Piracy Among Business Professors and Executives , 1993 .

[35]  G. Gemmill,et al.  An Exploratory Study of the Personal Value Systems of College Students and Managers , 1971 .

[36]  Janet M. Cook Defining ethical and unethical student behaviors using departmental regulations and sanctions , 1987, SIGCSE '87.

[37]  Stewart Kowalski,et al.  Computer ethics and computer abuse: a study of Swedish and Canadian university data processing students , 1990 .

[38]  I. Png,et al.  Software Pricing and Copyright: Enforcement Against End-Users , 1999 .

[39]  Tung-Ching Lin,et al.  An intention model-based study of software piracy , 1999, Proceedings of the 32nd Annual Hawaii International Conference on Systems Sciences. 1999. HICSS-32. Abstracts and CD-ROM of Full Papers.

[40]  Oz Shy,et al.  A strategic approach to software protection , 1999 .

[41]  F. Schab Schooling without learning: thirty years of cheating in high school. , 1991, Adolescence.

[42]  S. Liebowitz Copying and Indirect Appropriability: Photocopying of Journals , 1985, Journal of Political Economy.

[43]  Karen D. Loch,et al.  Evaluating ethical decision making and computer use , 1996, CACM.

[44]  I. Ajzen,et al.  Attitude-behavior relations: A theoretical analysis and review of empirical research. , 1977 .

[45]  Stephen P. King,et al.  Network externalities, price discrimination and profitable piracy , 2003, Inf. Econ. Policy.

[46]  Dennis F. Galletta,et al.  Developing a Predictive Model of Software Piracy Behavior: An Empirical Study , 1996, ICIS.

[47]  Susan J. Harrington,et al.  The Effect of Codes of Ethics and Personal Denial of Responsibility on Computer Abuse Judgments and Intentions , 1996, MIS Q..

[48]  Jasbir Dhaliwal,et al.  A reversed context analysis of software piracy issues in Singapore , 2004, Inf. Manag..

[49]  Afzaal H. Seyal,et al.  Software piracy among academics: an empirical study in Brunei Darussalam , 2000, Inf. Manag. Comput. Secur..

[50]  M. Lynn,et al.  Egoistic and Nonegoistic Motives in Social Dilemmas , 1986 .

[51]  Gurpreet Dhillon,et al.  Software piracy: a view from Hong Kong , 2000, CACM.

[52]  Thomas J. DeLoughry Widespread Piracy by Students Frustrates Developers of Computer Software. , 1987 .

[53]  L. Hosmer Adding ethics to the business curriculum , 1988 .

[54]  J HarringtonSusan The effect of codes of ethics and personal denial of responsibility on computer abuse judgements and intentions , 1996 .

[55]  David B. Paradice,et al.  Ethical attitudes of entry-level MIS personnel , 1990, Inf. Manag..

[56]  Clifford M. Koen,et al.  Software piracy and responsibilities of educational institutions , 1990, Inf. Manag..

[57]  Michael Waldman,et al.  The Effects of Increased Copyright Protection: An Analytic Approach , 1984, Journal of Political Economy.

[58]  S. Athey A Survey of the AACSB Universities’ Policies on Software Copying , 1990 .