Skip to main content
Log in

Trends and patterns among online software pirates

  • Published:
Ethics and Information Technology Aims and scope Submit manuscript

Abstract

Computer crime on the Internet poses asignificant threat to the well-being ofbusinesses and individuals, and none are immunefrom the repercussions that can result. Onetype of this unethical and unlawful activity isonline software piracy. In this work, thesignificance of piracy as a topic for academicinquiry is first presented, followed by asummary of the conflicting stances on thisissue. Then, a review of scholarly literaturepreviously conducted in this area is given toprovide a backdrop for the current research. Univariate and bivariate findings from aquantitative study of students are used todemonstrate the incidence, scope, andassociated correlates of Internet piracy in auniversity setting. Technological and ethicalpolicy solutions that an institution mightimplement are suggested and discussed inconclusion.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  • R. Agnew and A.A.R. Peter. The Techniques of Neutralization: An Analysis of Predisposing and Situational Factors. Criminal Justice and Behavior, 13(1): 81–97, 1986 (March).

    Google Scholar 

  • M.R. Buckley, D.S. Wiese and M.G. Harvey. An Investigation into the Dimensions of Unethical Behavior. Journal of Education for Business, 73(5): 284–290, 1998 (May-June).

    Google Scholar 

  • H.K. Cheng, R.R. Sims and H. Teegen. To Purchase or Pirate Software: An Empirical Study. Journal of Management Information Systems, 13(4): 49–60, 1997 (Spring).

    Google Scholar 

  • A.L. Christensen and M.M. Eining. Factors Influencing Software Piracy: Implications for Accountants. Journal of Information Systems: 67–80, 1991 (Spring).

  • Classification of Software. Software and Information Industry Association, 1999. [Online] Available http://www.siia.net/ piracy/programs/share.htm, December 12, 1999.

  • E. Cohen and L. Cornwell. College Students Believe Piracy is Acceptable. CIS Educator Forum, 1(3): 2–5, 1989.

    Google Scholar 

  • Computer and Network Acceptable Use Policy. Middle Tennessee State University, 2001. [Online] Available http://www.mtsu.edu/misc/policy.html, March 15, 2001.

  • D.F. Crown and M.S. Spiller. Learning from the Literature on Collegiate Cheating: A Review of Empirical Research. Journal of Business Ethics, 17(6): 683–700, 1998.

    Google Scholar 

  • D. Denning. Protection and Defense of Intrusion. Georgetown University, 1996 (February 28-March 1). Paper based on a talk given at the conference on 'National Security in the Information Age' at the US Air Force Academy, Colorado Springs, CO. [Online] Available http://www.cs.georgetown. edu/denning/infosec/USAFA.html, July 1, 1999.

  • M.M. Eining and A.L. Christensen. A Psycho-Social Model of Software Piracy: The Development and Test of a Model. In R. Dejoie, G. Fowler and D. Paradice, editors, Ethical Issues in Information Systems, pp. 134–140. Boyd and Fraser Publishing Co., Boston, MA, 1991.

    Google Scholar 

  • D.R. Ellis. Computer Law-A Primer on the Law of Software Protection. The Florida Bar Journal, 1986 (April).

  • R.D. Gopal and G.L. Sanders. International Software Piracy: Analysis of Key Issues and Impacts. Information Systems Research, 9(4): 380–397, 1998 (December).

    Google Scholar 

  • M.S. Friedman and K. Bissinger. Infojacking: Crimes on the Information Superhighway. New Jersey Law Journal, 1995 (May 22). [Online] Available http://www.sgrm.com/ art15.htm, March 01, 2001.

  • S.J. Harrington. Why People Copy Software and Create Computer Viruses: Individual Characteristics or Situational Factors? Information Resources Management Journal: 28–37, 1989 (Summer).

  • S. Hinduja. Neutralizing Piracy, 2002. Article manuscript under review.

  • J.H. Im and C. Koen. Software Piracy and Responsibilities of Educational Institutions. Information and Management, 18(4): 189–194, 1990.

    Google Scholar 

  • J.H. Im and P.D. Van Epps. Software Piracy and Software Security in Business Schools: An Ethical Perspective. Data Base, 22(3): 15–21, 1991 (Summer).

    Google Scholar 

  • J.H. Im and P.D. Van Epps. Legal and Ethical Issues of Software Piracy. International Association for Computer Information Systems. New Orleans, LA, 1992a.

    Google Scholar 

  • J.H. Im and P.D. Van Epps. Software Piracy and Software Security Measures in Business Schools. Information and Management, 23(4): 193–203, 1992b.

    Google Scholar 

  • International Review of Criminal Policy-United Nations Manual on the Prevention and Control of Computer Related Crime, 1994. [Online] Available http://www.ifs.univie.ac.at/ %7Epr2gq1/rev4344.html, February 12, 1999.

  • J. Jefferson. Deleting Cybercrooks: Prosecutors Want Tough Laws to Put Internet Hackers, Scam Artists and Pedophiles on Permanent Log Off. Cyber Law, ABA Journal, 83: 68, 1997 (October).

    Google Scholar 

  • K. Kievit. Information Systems Majors/Non-Majors and Computer Ethics. Journal of Computer Information Systems, 32(1): 43–49, 1991 (Fall).

    Google Scholar 

  • L.M. Leventhal, K.E. Instone and D.W. Chilson. Another View of Computer Science Ethics: Patterns of Responses Among Computer Scientists. Journal of System Software, 17: 49–60, 1992.

    Google Scholar 

  • Y. Malhotra. Controlling Copyright Infringements of Intellectual Property: The Case of Computer Software-Part One. Journal of Systems Management, 45: 32–35, 1994a (June).

    Google Scholar 

  • Microsoft Incorporates New Anti-Piracy Technologies In Windows 2000, Office 2000. Microsoft Corporation, 2000. [Online] Available http://www.microsoft.com/presspass/ press/2000/feb00/apfeaturespr.asp, April 5, 2000.

  • E. Oz. The Attitude of Managers-to-Be Toward Software Piracy. OR/MS Today, 17(4): 24–26, 1990 (August).

    Google Scholar 

  • A.G. Peace. A Predictive Model of Software Piracy Behavior: An Empirical Validation. Unpublished doctoral dissertation, University of Pittsburgh, 1995.

  • A.G. Peace. Software Piracy and Computer-Using Professionals: A Survey. Journal of Computer Information Systems, 38(1): 94–99, 1997 (Fall).

    Google Scholar 

  • Press Release. Business Software Alliance, 1999. [Online] Available http:/www.bsa.org/pressbox/policy/944837492. htm, December 12, 1999.

  • M.M. Rahim, A.H. Seyal and N.A. Rahman. Software Piracy Among Computing Students: A Bruneian Scenario. Computers and Education, 32: 301–321, 1999.

    Google Scholar 

  • Recommended University Internet Usage Policy, 1999. [Online] Available http://www.siia.net/piracy/programs/univgd2.htm, November 15, 1999.

  • R.A. Reid, J.K. Thompson and J.M. Logsdon. Knowledge and Attitudes of Management Students toward Software Piracy. Journal of Computer Information Systems, 33: 46–51, 1992 (Fall).

    Google Scholar 

  • V.F. Sacco and E. Zureik. Correlates of Computer Misuse: Data from a Self-Reporting Sample. Behaviour and Information Technology, 9: 353–369, 1990.

    Google Scholar 

  • U. Sieber. Legal Aspects of Computer-Related Crime in the Information Society. University of Würzburg. COMCRIME-Study Prepared for the European Commission, 1998. [Online] Available http://europa.eu.int/ISPO/legal/en/comcrime/ sieber.html, April 15, 2001.

  • R.R. Sims, H.K. Cheng and H. Teegen. Toward a Profile of Student Software Piraters. Journal of Business Ethics, 15: 1996, 839–849.

    Google Scholar 

  • Software Piracy. Business Software Alliance, 1999. [Online] Available http://www.nopiracy.com/intro_c.html, December 12, 1999.

  • Software Piracy and U.S. Law. Business Software Alliance, 1998. [Online] Available http://www.nopiracy.com/swandlaw_c.htm, December 12, 1999.

  • SPAudit Software Management Tools. Software and Information Industry Association, 1999. [Online] Available http://www. siia.net/piracy/tools/download.htm, December 12, 1999.

  • S. Solomon and J.A. O'Brien. The Effect of Demographic Factors on Attitudes Toward Software Piracy. Journal of Computer Information Systems: 40–46, 1990 (Spring).

  • Temple University Pays $100,000 To Settle Software Claims. Business Software Alliance, 2000. [Online] Available http://www.bsa.org/pressbox/enforcement/index.html?/pressbox/ enforcement/952007190.html, March 25, 2000.

  • The Copyright Act and Fair Use. Software Information Industry Association, 1999. [Online] Available http://www. siia.net/piracy/programs/fairuse.htm, December 12, 1999.

  • C.R. Tittle. Sanctions and Social Deviance: The Question of Deterrence. Praeger Publishers, New York, 1980.

    Google Scholar 

  • Warez: Myth vs. Fact. Business Software Alliance, 1998. [Online] Available http://www.nopiracy.com/warezfaq_c. html, December 12, 1999.

  • What is Free Software?-GNU Project. Free Software Foundation, 1999. [Online] Available http://www.fsf.org/philosophy/ free-sw.html, November 20, 1999.

  • C. Wolf and S. Shorr. Cybercops Are Cracking Down on Internet Fraud. The National Law Journal. The New York Law Publishing Company, 1997.

  • E.Y.H. Wong. How ShouldWe Teach Computer Ethics? A Short Study Done in Hong Kong. Computers and Education, 25(4): 179–191, 1995 (December).

    Google Scholar 

  • G. Wong, A. Kong and S. Ngai. A Study of Unauthorized Software Copying Among Post-Secondary Students in Hong Kong. The Australian Computer Journal, 22(4): 114–122, 1990 (November).

    Google Scholar 

  • W. Wood and R. Glass. Sex as a Determinant of Software Piracy. Journal of Computer Information Systems, 36(2): 37–40, 1995 (Winter).

    Google Scholar 

Download references

Authors

Rights and permissions

Reprints and permissions

About this article

Cite this article

Hinduja, S. Trends and patterns among online software pirates. Ethics and Information Technology 5, 49–61 (2003). https://doi.org/10.1023/A:1024910523384

Download citation

  • Issue Date:

  • DOI: https://doi.org/10.1023/A:1024910523384

Navigation