Software Piracy Research: A Cross-disciplinary Systematic Review

Few studies have synthesized accumulated scholarly knowledge on software piracy across the disciplines that study this phenomenon. We contribute to understanding the intellectual and social development on software piracy by performing a cross-disciplinary literature search. We used 17 research questions to address five specific areas of inquiry on software piracy research: 1) what makes up software piracy’s intellectual substance?, 2) do theoretical contributions on software piracy suggest a cross-disciplinary research community on the topic?, 3) what changes have occurred in software piracy research across the seven measured periods?, 4) what are the top IS journals’ publishing patterns on software piracy research?, and 5) who has contributed to software piracy research? To address these questions, we classified 179 software research studies. We found that: 1) over 50 percent of the studies focused on an individual level of analysis, 2) most papers examined software piracy in North America and Asia Pacific regions, although other regions also have major problems, and 3) the distribution of theoretical and methodological contributions show a pattern of leaning towards positivism. The findings point to several research opportunities including expanding research: 1) at organizational levels with particular emphasis on organizations’ role as consumers and or intermediaries, 2) in Latin America and Africa, which are areas with high incidence of software piracy, and 3) on approaches beyond positivism.

[1]  G. Lawrence Sanders,et al.  Considerations in Ethical Decision-Making and Software Piracy , 2001 .

[2]  George E. Higgins,et al.  An Application of Deterrence Theory to Software Piracy , 2005 .

[3]  Hsing K. Cheng,et al.  To Purchase or to Pirate Software: An Empirical Study , 1997, J. Manag. Inf. Syst..

[4]  Lynette Owen,et al.  Piracy , 2001, Learn. Publ..

[5]  Pei-Hsuan Hsieh Does age matter? Students’ perspectives of unauthorized software copying under legal and ethical considerations. , 2012 .

[6]  R. Mason Four ethical issues of the information age , 1986 .

[7]  Prashant Palvia,et al.  Management Information Systems Research: What's There in a Methodology? , 2003, Commun. Assoc. Inf. Syst..

[8]  Edgar H. Sibley,et al.  A profile of information systems research published in Information & Management , 2007, Inf. Manag..

[9]  Kar Yan Tam,et al.  Research Note - Applying the Randomized Response Technique to Elicit Truthful Responses to Sensitive Questions in IS Research: The Case of Software Piracy Behavior , 2010, Inf. Syst. Res..

[10]  D. Bernhardt,et al.  Pirated for Profit , 1998 .

[11]  R. Harrison,et al.  A Meta-analysis of Multidisciplinary Research , 2012 .

[12]  George E. Higgins,et al.  Low Self-Control, Moral Beliefs, and Social Learning Theory in University Students’ Intentions to Pirate Software , 2006 .

[13]  Vatcharaporn Esichaikul,et al.  Socialization and Software Piracy: A Study , 2011, J. Comput. Inf. Syst..

[14]  William R. Swinyard,et al.  The morality of software piracy: A cross-cultural analysis , 1990 .

[15]  K. R. Conner,et al.  Software piracy: an analysis of protection strategies , 1991 .

[16]  David G Steel,et al.  Which Countries Protect Intellectual Property? The Case of Software Piracy , 2000 .

[17]  William R. King,et al.  External Validity in IS Survey Research , 2005, Commun. Assoc. Inf. Syst..

[18]  Marton Gergely,et al.  Schools of Thought in Software Piracy Research , 2013, AMCIS.

[19]  Ram D. Gopal,et al.  International Software Piracy: Analysis of Key Issues and Impacts , 1998, Inf. Syst. Res..

[20]  Na Li,et al.  The Intellectual Development of Human-Computer Interaction Research: A Critical Assessment of the MIS Literature (1990-2002) , 2005, J. Assoc. Inf. Syst..

[21]  Venkataraman Ramesh,et al.  Research in Information Systems: An Empirical Study of Diversity in the Discipline and Its Journals , 2002, J. Manag. Inf. Syst..

[22]  T. Moores An Analysis of the Impact of Economic Wealth and National Culture on the Rise and Fall of Software Piracy Rates , 2008 .

[23]  M. L. Gibson,et al.  Students as Surrogates for Managers in a Decision-Making Environment: An Experimental Study , 1991, J. Manag. Inf. Syst..

[24]  Paul Stephens,et al.  An Exploration of the Ideologies of Software Intellectual Property: The Impact on Ethical Decision Making , 2007 .

[25]  Vijay Mahajan,et al.  How many pirates should a software firm tolerate? An analysis of piracy protection on the diffusion of software , 2003 .

[26]  Varun Grover,et al.  Analyzing methodological rigor of MIS survey research from 1980-1989 , 1993, Inf. Manag..

[27]  Detmar W. Straub,et al.  Key information liability issues facing managers: software piracy, proprietary databases, and indi , 1990 .

[28]  Helen Kelley,et al.  Research Commentary - Generalizability of Information Systems Research Using Student Subjects - A Reflection on Our Practices and Recommendations for Future Research , 2012, Inf. Syst. Res..

[29]  Josephine E. Olson,et al.  Top-25-Business-School Professors Rate Journals in Operations Management and Related Fields , 2005, Interfaces.

[30]  John F. Rockart,et al.  Editor’s comments , 2005, MIS Q. Executive.

[31]  Trevor T. Moores The effect of national culture and economic wealth on global software piracy rates , 2003, CACM.

[32]  Edward Bernroider,et al.  Research in information systems: a study of diversity and inter-disciplinary discourse in the AIS basket journals between 1995 and 2011 , 2013, J. Inf. Technol..

[33]  Ram D. Gopal,et al.  Global software piracy: you can't get blood out of a turnip , 2000, CACM.

[34]  Vijay Mahajan,et al.  The Effect of Piracy on the Market Penetration of Subscription Software , 2004 .

[35]  Alan R. Hevner,et al.  POSITIONING AND PRESENTING DESIGN SCIENCE RESEARCH FOR MAXIMUM IMPACT 1 , 2013 .

[36]  Detmar W. Straub,et al.  Current and Future Uses of the Group Decision Support System Technology: Report on a Recent Empirical Study , 1988, J. Manag. Inf. Syst..

[37]  Maurice Landry,et al.  Can the field of MIS be disciplined? , 1989, CACM.

[38]  Mikko T. Siponen,et al.  New insights into the problem of software piracy: The effects of neutralization, shame, and moral beliefs , 2012, Inf. Manag..

[39]  Peter B. Seddon,et al.  OTHER-SETTINGS GENERALIZATION IN IS RESEARCH , 2006 .

[40]  Shirley Gregor,et al.  The Nature of Theory in Information Systems , 2006, MIS Q..

[41]  B. Husted The Impact of National Culture on Software Piracy , 2000 .

[42]  A. Nederhof Methods of coping with social desirability bias: A review. , 1985 .

[43]  Ranjan B. Kini,et al.  An exploratory study of moral intensity regarding software piracy of students in Thailand , 2003, Behav. Inf. Technol..

[44]  Venkataraman Ramesh,et al.  A unified classification system for research in the computing disciplines , 2005, Inf. Softw. Technol..

[45]  I. Ajzen,et al.  Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research , 1977 .

[46]  Trevor T. Moores,et al.  Knowledge of Software Piracy as an Antecedent to Reducing Pirating Behavior , 2009, J. Comput. Inf. Syst..

[47]  Vijay Mahajan,et al.  Software Piracy: Estimation of Lost Sales and the Impact on Software Diffusion , 1995 .

[48]  Paul Belleflamme,et al.  Digital Piracy: An Update , 2014 .

[49]  Suzanne Rivard,et al.  A Keyword Classification Scheme for IS Research Literature: An Update , 1993 .

[50]  Jack Belzer,et al.  Encyclopedia of Computer Science and Technology , 2002 .

[51]  Alok Mishra,et al.  Ethical behavior issues in software use: An analysis of public and private sectors , 2009, Comput. Hum. Behav..

[52]  Erwin Fielt,et al.  Exploring Shared Services from an IS Perspective: A Literature Review and Research Agenda , 2014, Commun. Assoc. Inf. Syst..

[53]  Michael A. Nelson,et al.  Determinants of software piracy: economics, institutions, and technology , 2009 .

[54]  Michael A. Nelson,et al.  Shadow economy and international software piracy , 2012 .

[55]  Yogesh Kumar Dwivedi,et al.  The beginnings of a new era: time to reflect on 17 years of the ISJ , 2008, Inf. Syst. J..

[56]  Michael J. Ginzberg,et al.  MIS and the behavioral sciences: research patterns and prescriptions , 1982, DATB.

[57]  Lydia L. Gan,et al.  An empirical study of software piracy among tertiary institutions in Singapore , 2006, Inf. Manag..

[58]  Alok Mishra,et al.  Software piracy among IT professionals in organizations , 2006, Int. J. Inf. Manag..

[59]  J. R. Landis,et al.  The measurement of observer agreement for categorical data. , 1977, Biometrics.

[60]  Pamela Samuelson,et al.  A Case Study on Computer Programs , 1993 .

[61]  James W. Peltier,et al.  Factors that influence software piracy , 2010, Commun. ACM.

[62]  Byron Keating Distribution Channels: Understanding and Managing Channels to Market , 2010 .

[63]  Robert E. Crossler,et al.  Privacy in the Digital Age: A Review of Information Privacy Research in Information Systems , 2011, MIS Q..

[64]  D. O. Sears College sophomores in the laboratory: Influences of a narrow data base on social psychology's view of human nature. , 1986 .

[65]  J. Venable Incorporating design science research and critical research into an introductory business research methods course , 2011 .

[66]  B. Tan Understanding consumer ethical decision making with respect to purchase of pirated software , 2002 .

[67]  David C. Yen,et al.  Software Asset Management: Analysis, Development and Implementation , 1999 .

[68]  T. S. Raghu,et al.  Strategic Analysis of Corporate Software Piracy Prevention and Detection , 2005, J. Organ. Comput. Electron. Commer..

[69]  Liisa von Hellens,et al.  Qualitative Research in Information Systems , 2007, Australas. J. Inf. Syst..

[70]  Simplice Asongu,et al.  Fighting Software Piracy: Which Governance Tools Matter in Africa? , 2012, Journal of Business Ethics.

[71]  Viswanath Venkatesh,et al.  Bridging the Qualitative-Quantitative Divide: Guidelines for Conducting Mixed Methods Research in Information Systems , 2013, MIS Q..

[72]  Mark Srite,et al.  The Role of Espoused National Cultural Values in Technology Acceptance , 2006, MIS Q..

[73]  David Alan Grier Long John Software and the Digital Jolly Roger , 2008, Computer.

[74]  Richard A. Reid,et al.  Software piracy: Is it related to level of moral judgment? , 1994 .

[75]  Yi-Ching Hsieh,et al.  How to Encourage Customers to Use Legal Software , 2008 .

[76]  George E. Higgins can low self-control help with the understanding of the software piracy problem? , 2004 .

[77]  Paul Benjamin Lowry,et al.  A Systematic Review of Social Networks Research in Information Systems: Building a Foundation for Exciting Future Research , 2015, Commun. Assoc. Inf. Syst..

[78]  Alexander Nill,et al.  Global software piracy: Trends and strategic considerations , 2009 .

[79]  Kallol Kumar Bagchi,et al.  Global software piracy , 2006, Commun. ACM.

[80]  Sigi Goode,et al.  Use, perceived deterrence and the role of software piracy in video game console adoption , 2012, Inf. Syst. Frontiers.

[81]  Willie Breeze,et al.  The Relationship of Theory and Research , 1993, AORN Journal.

[82]  H C Triandis,et al.  Values, attitudes, and interpersonal behavior. , 1980, Nebraska Symposium on Motivation. Nebraska Symposium on Motivation.

[83]  Varun Grover,et al.  The Effect of an IS Article's Structure on Its Impact , 2010, Commun. Assoc. Inf. Syst..

[84]  Rajeev K. Goel,et al.  Does Software Piracy Affect Economic Growth? Evidence Across Countries , 2012 .

[85]  Wynne W. Chin,et al.  Factors motivating software piracy: a longitudinal study , 2004, IEEE Transactions on Engineering Management.

[86]  Jasbir Dhaliwal,et al.  A reversed context analysis of software piracy issues in Singapore , 2004, Inf. Manag..

[87]  Jia Lu,et al.  Chinese culture and software copyright , 2009, New Media Soc..

[88]  Ian Weber,et al.  Internet Software Piracy in China: A User Analysis of Resistance to Global Software Copyright Enforcement , 2009 .

[89]  Zheng Yan,et al.  Software Piracy among College Students: A Comprehensive Review of Contributing Factors, Underlying Processes, and Tackling Strategies , 2005 .

[90]  Wanda J. Orlikowski,et al.  Studying Information Technology in Organizations: Research Approaches and Assumptions , 1991, Inf. Syst. Res..

[91]  Tim Maude,et al.  Hardware protection against software piracy , 1984, CACM.

[92]  George E. Higgins Gender Differences in Software Piracy: The Mediating Roles of Self-Control Theory and Social Learning Theory , 2006 .

[93]  Alex Kigerl,et al.  Infringing Nations: Predicting Software Piracy Rates, BitTorrent Tracker Hosting, and P2P File Sharing Client Downloads Between Countries , 2013 .

[94]  Sameer Hinduja,et al.  Neutralization theory and online software piracy: An empirical analysis , 2007, Ethics and Information Technology.

[95]  Ranjan B. Kini,et al.  Shaping of Moral Intensity regarding Software Piracy in University Students: Immediate Community Effects , 2001, J. Comput. Inf. Syst..

[96]  Erwin Fielt,et al.  The Impact Of Software-As-A-Service On Business Models Of Leading Software Vendors: Experiences From Three Exploratory Case Studies , 2011, PACIS.

[97]  Rudy Hirschheim,et al.  A paradigmatic and methodological examination of information systems research from 1991 to 2001 , 2004, Inf. Syst. J..

[98]  Steven Downing,et al.  Social Control in a Subculture of Piracy , 2010 .

[99]  Gurpreet Dhillon,et al.  Software piracy: a view from Hong Kong , 2000, CACM.

[100]  Patricia Carlson,et al.  A Review of MIS Research and Disciplinary Development , 1992, J. Manag. Inf. Syst..

[101]  Yogesh Kumar Dwivedi,et al.  Profile of IS research published in the European Journal of Information Systems , 2008, Eur. J. Inf. Syst..

[102]  Atanu Lahiri Revisiting the incentive to tolerate illegal distribution of software products , 2012, Decis. Support Syst..

[103]  Andrew B. Whinston,et al.  Global software piracy revisited , 2004, CACM.

[104]  Chee-Sing Yap,et al.  Testing an Ethical Decision-Making Theory: The Case of Softlifting , 1998, J. Manag. Inf. Syst..

[105]  Jung P. Shim,et al.  A Comparative Examination of Attitudes Toward Software Piracy Among Business Professors and Executives , 1993 .

[106]  David A. Makin,et al.  Does Social Learning Theory Condition the Effects of Low Self-Control on College Students' Software Piracy? , 2004 .

[107]  Ron Honick Software Piracy Exposed , 2005 .

[108]  Ranjan B. Kini,et al.  Shaping of Moral Intensity Regarding Software Piracy: A Comparison Between Thailand and U.S. Students , 2004 .

[109]  Heng Xu,et al.  Information Privacy Research: An Interdisciplinary Review , 2011, MIS Q..

[110]  Ricky Y. K. Chan,et al.  Does ethical ideology affect software piracy attitude and behaviour? An empirical investigation of computer users in China , 2011, Eur. J. Inf. Syst..

[111]  Gerald E. Fryxell,et al.  Global Software Piracy: Searching for Further Explanations , 2009 .

[112]  Tero Vartiainen,et al.  Unauthorized copying of software and levels of moral development: a literature analysis and its implications for research and practice , 2004, Inf. Syst. J..

[113]  Hsing Kenneth Cheng,et al.  Optimal software pricing in the presence of piracy and word-of-mouth effect , 2011, Decis. Support Syst..

[114]  Detmar W. Straub,et al.  Effective IS Security: An Empirical Study , 1990, Inf. Syst. Res..

[115]  Clyde W. Holsapple,et al.  Parameters for Software Piracy Research , 2008, Inf. Soc..

[116]  A. Viera,et al.  Understanding interobserver agreement: the kappa statistic. , 2005, Family medicine.

[117]  Burton Grad,et al.  A Personal Recollection: IBM's Unbundling of Software and Services , 2002, IEEE Ann. Hist. Comput..

[118]  Detmar W. Straub,et al.  Measuring Researcher-Production in Information Systems , 2002, J. Assoc. Inf. Syst..

[119]  Malcolm McRoberts Software Licensing in the Cloud Age , 2014, ArXiv.

[120]  A. Andrés Software piracy and income inequality , 2006 .

[121]  Paul E. Ceruzzi,et al.  A history of modern computing , 1999 .

[122]  M. Saeed,et al.  Enhancement of Software Engineering by Shifting From Software Product to Software Service , 2005, 2005 International Conference on Information and Communication Technologies.

[123]  Trevor T. Moores Untangling the Web of Relationships Between Wealth, Culture, and Global Software Piracy Rates: A Path Model , 2010, J. Glob. Inf. Manag..

[124]  Hsing Kenneth Cheng,et al.  Toward a profile of student software piraters , 1996 .

[125]  Jane M. Carey,et al.  The Intellectual Advancement of Human-Computer Interaction Research: A Critical Assessment of the MIS Literature (1990-2008) , 2009 .

[126]  Shirley Gregor,et al.  The Anatomy of a Design Theory , 2007, J. Assoc. Inf. Syst..

[127]  P. Simpson,et al.  Softlifting: A model of motivating factors , 1994 .

[128]  Dirk Draheim,et al.  Cloud-Aided Software Engineering: Evolving Viable Software Systems Through a Web of Views , 2013 .

[129]  Dennis F. Galletta,et al.  Software Piracy in the Workplace: A Model and Empirical Test , 2003, J. Manag. Inf. Syst..

[130]  John Mingers,et al.  Multimethodology: Towards a framework for mixing methodologies , 1997 .

[131]  Jerry Fjermestad,et al.  Electronic Commerce Customer Relationship Management: An Assessment of Research , 2001, Int. J. Electron. Commer..

[132]  Dyuti S. Banerjee On the sufficiency of regulatory enforcement in combating piracy , 2011 .

[133]  D. Yang,et al.  Alleviating piracy through open source strategy: An exploratory study of business software firms in China , 2009, J. Strateg. Inf. Syst..

[134]  Deli Yang,et al.  Economic and Cultural Impact on Intellectual Property Violations: A Study of Software Piracy , 2007 .

[135]  David A. Makin,et al.  Self-Control, Deviant Peers, and Software Piracy , 2004, Psychological reports.

[136]  Wilfried R. Vanhonacker,et al.  Optimal strategic pricing of reproducible consumer products , 1988 .

[137]  Sigi Goode,et al.  Exploring software piracy as a factor of video game console adoption , 2012, Behav. Inf. Technol..

[138]  Trevor T. Moores,et al.  Ethical Decision Making in Software Piracy: Initial Development and a Test of a Four-Component Model , 2006, MIS Q..

[139]  Ram D. Gopal,et al.  Preventive and Deterrent Controls for Software Piracy , 1997, J. Manag. Inf. Syst..

[140]  김정남 고객과 지식 Marketing , 2003 .

[141]  Venkataraman Ramesh,et al.  Research in software engineering: an analysis of the literature , 2002, Inf. Softw. Technol..

[142]  Victoria L. Crittenden,et al.  Hard Facts About Software Piracy , 2007 .

[143]  Venkataraman Ramesh,et al.  An analysis of research in computing disciplines , 2004, CACM.

[144]  Clifford M. Koen,et al.  Software piracy and its legal implications , 1997, Inf. Manag..

[145]  Alok Mishra,et al.  Organizational software piracy: an empirical assessment , 2007, Behav. Inf. Technol..

[146]  Ronald L. Graham The legal protection of computer software , 1984, CACM.

[147]  Prashant Palvia,et al.  Research Methodologies in MIS: An Update , 2004, Commun. Assoc. Inf. Syst..

[148]  Jukka Vuorinen,et al.  Ethical codes in the digital world: comparisons of the proprietary, the open/free and the cracker system , 2007, Ethics and Information Technology.

[149]  Sigi Goode,et al.  Exploring the supply of pirate software for mobile devices: An analysis of software types and piracy groups , 2010, Inf. Manag. Comput. Secur..

[150]  Yogesh Kumar Dwivedi,et al.  The diffusion and use of institutional theory: a cross-disciplinary longitudinal literature survey , 2009, J. Inf. Technol..