Abstract
Computer crime on the Internet poses asignificant threat to the well-being ofbusinesses and individuals, and none are immunefrom the repercussions that can result. Onetype of this unethical and unlawful activity isonline software piracy. In this work, thesignificance of piracy as a topic for academicinquiry is first presented, followed by asummary of the conflicting stances on thisissue. Then, a review of scholarly literaturepreviously conducted in this area is given toprovide a backdrop for the current research. Univariate and bivariate findings from aquantitative study of students are used todemonstrate the incidence, scope, andassociated correlates of Internet piracy in auniversity setting. Technological and ethicalpolicy solutions that an institution mightimplement are suggested and discussed inconclusion.
Similar content being viewed by others
References
R. Agnew and A.A.R. Peter. The Techniques of Neutralization: An Analysis of Predisposing and Situational Factors. Criminal Justice and Behavior, 13(1): 81–97, 1986 (March).
M.R. Buckley, D.S. Wiese and M.G. Harvey. An Investigation into the Dimensions of Unethical Behavior. Journal of Education for Business, 73(5): 284–290, 1998 (May-June).
H.K. Cheng, R.R. Sims and H. Teegen. To Purchase or Pirate Software: An Empirical Study. Journal of Management Information Systems, 13(4): 49–60, 1997 (Spring).
A.L. Christensen and M.M. Eining. Factors Influencing Software Piracy: Implications for Accountants. Journal of Information Systems: 67–80, 1991 (Spring).
Classification of Software. Software and Information Industry Association, 1999. [Online] Available http://www.siia.net/ piracy/programs/share.htm, December 12, 1999.
E. Cohen and L. Cornwell. College Students Believe Piracy is Acceptable. CIS Educator Forum, 1(3): 2–5, 1989.
Computer and Network Acceptable Use Policy. Middle Tennessee State University, 2001. [Online] Available http://www.mtsu.edu/misc/policy.html, March 15, 2001.
D.F. Crown and M.S. Spiller. Learning from the Literature on Collegiate Cheating: A Review of Empirical Research. Journal of Business Ethics, 17(6): 683–700, 1998.
D. Denning. Protection and Defense of Intrusion. Georgetown University, 1996 (February 28-March 1). Paper based on a talk given at the conference on 'National Security in the Information Age' at the US Air Force Academy, Colorado Springs, CO. [Online] Available http://www.cs.georgetown. edu/denning/infosec/USAFA.html, July 1, 1999.
M.M. Eining and A.L. Christensen. A Psycho-Social Model of Software Piracy: The Development and Test of a Model. In R. Dejoie, G. Fowler and D. Paradice, editors, Ethical Issues in Information Systems, pp. 134–140. Boyd and Fraser Publishing Co., Boston, MA, 1991.
D.R. Ellis. Computer Law-A Primer on the Law of Software Protection. The Florida Bar Journal, 1986 (April).
R.D. Gopal and G.L. Sanders. International Software Piracy: Analysis of Key Issues and Impacts. Information Systems Research, 9(4): 380–397, 1998 (December).
M.S. Friedman and K. Bissinger. Infojacking: Crimes on the Information Superhighway. New Jersey Law Journal, 1995 (May 22). [Online] Available http://www.sgrm.com/ art15.htm, March 01, 2001.
S.J. Harrington. Why People Copy Software and Create Computer Viruses: Individual Characteristics or Situational Factors? Information Resources Management Journal: 28–37, 1989 (Summer).
S. Hinduja. Neutralizing Piracy, 2002. Article manuscript under review.
J.H. Im and C. Koen. Software Piracy and Responsibilities of Educational Institutions. Information and Management, 18(4): 189–194, 1990.
J.H. Im and P.D. Van Epps. Software Piracy and Software Security in Business Schools: An Ethical Perspective. Data Base, 22(3): 15–21, 1991 (Summer).
J.H. Im and P.D. Van Epps. Legal and Ethical Issues of Software Piracy. International Association for Computer Information Systems. New Orleans, LA, 1992a.
J.H. Im and P.D. Van Epps. Software Piracy and Software Security Measures in Business Schools. Information and Management, 23(4): 193–203, 1992b.
International Review of Criminal Policy-United Nations Manual on the Prevention and Control of Computer Related Crime, 1994. [Online] Available http://www.ifs.univie.ac.at/ %7Epr2gq1/rev4344.html, February 12, 1999.
J. Jefferson. Deleting Cybercrooks: Prosecutors Want Tough Laws to Put Internet Hackers, Scam Artists and Pedophiles on Permanent Log Off. Cyber Law, ABA Journal, 83: 68, 1997 (October).
K. Kievit. Information Systems Majors/Non-Majors and Computer Ethics. Journal of Computer Information Systems, 32(1): 43–49, 1991 (Fall).
L.M. Leventhal, K.E. Instone and D.W. Chilson. Another View of Computer Science Ethics: Patterns of Responses Among Computer Scientists. Journal of System Software, 17: 49–60, 1992.
Y. Malhotra. Controlling Copyright Infringements of Intellectual Property: The Case of Computer Software-Part One. Journal of Systems Management, 45: 32–35, 1994a (June).
Microsoft Incorporates New Anti-Piracy Technologies In Windows 2000, Office 2000. Microsoft Corporation, 2000. [Online] Available http://www.microsoft.com/presspass/ press/2000/feb00/apfeaturespr.asp, April 5, 2000.
E. Oz. The Attitude of Managers-to-Be Toward Software Piracy. OR/MS Today, 17(4): 24–26, 1990 (August).
A.G. Peace. A Predictive Model of Software Piracy Behavior: An Empirical Validation. Unpublished doctoral dissertation, University of Pittsburgh, 1995.
A.G. Peace. Software Piracy and Computer-Using Professionals: A Survey. Journal of Computer Information Systems, 38(1): 94–99, 1997 (Fall).
Press Release. Business Software Alliance, 1999. [Online] Available http:/www.bsa.org/pressbox/policy/944837492. htm, December 12, 1999.
M.M. Rahim, A.H. Seyal and N.A. Rahman. Software Piracy Among Computing Students: A Bruneian Scenario. Computers and Education, 32: 301–321, 1999.
Recommended University Internet Usage Policy, 1999. [Online] Available http://www.siia.net/piracy/programs/univgd2.htm, November 15, 1999.
R.A. Reid, J.K. Thompson and J.M. Logsdon. Knowledge and Attitudes of Management Students toward Software Piracy. Journal of Computer Information Systems, 33: 46–51, 1992 (Fall).
V.F. Sacco and E. Zureik. Correlates of Computer Misuse: Data from a Self-Reporting Sample. Behaviour and Information Technology, 9: 353–369, 1990.
U. Sieber. Legal Aspects of Computer-Related Crime in the Information Society. University of Würzburg. COMCRIME-Study Prepared for the European Commission, 1998. [Online] Available http://europa.eu.int/ISPO/legal/en/comcrime/ sieber.html, April 15, 2001.
R.R. Sims, H.K. Cheng and H. Teegen. Toward a Profile of Student Software Piraters. Journal of Business Ethics, 15: 1996, 839–849.
Software Piracy. Business Software Alliance, 1999. [Online] Available http://www.nopiracy.com/intro_c.html, December 12, 1999.
Software Piracy and U.S. Law. Business Software Alliance, 1998. [Online] Available http://www.nopiracy.com/swandlaw_c.htm, December 12, 1999.
SPAudit Software Management Tools. Software and Information Industry Association, 1999. [Online] Available http://www. siia.net/piracy/tools/download.htm, December 12, 1999.
S. Solomon and J.A. O'Brien. The Effect of Demographic Factors on Attitudes Toward Software Piracy. Journal of Computer Information Systems: 40–46, 1990 (Spring).
Temple University Pays $100,000 To Settle Software Claims. Business Software Alliance, 2000. [Online] Available http://www.bsa.org/pressbox/enforcement/index.html?/pressbox/ enforcement/952007190.html, March 25, 2000.
The Copyright Act and Fair Use. Software Information Industry Association, 1999. [Online] Available http://www. siia.net/piracy/programs/fairuse.htm, December 12, 1999.
C.R. Tittle. Sanctions and Social Deviance: The Question of Deterrence. Praeger Publishers, New York, 1980.
Warez: Myth vs. Fact. Business Software Alliance, 1998. [Online] Available http://www.nopiracy.com/warezfaq_c. html, December 12, 1999.
What is Free Software?-GNU Project. Free Software Foundation, 1999. [Online] Available http://www.fsf.org/philosophy/ free-sw.html, November 20, 1999.
C. Wolf and S. Shorr. Cybercops Are Cracking Down on Internet Fraud. The National Law Journal. The New York Law Publishing Company, 1997.
E.Y.H. Wong. How ShouldWe Teach Computer Ethics? A Short Study Done in Hong Kong. Computers and Education, 25(4): 179–191, 1995 (December).
G. Wong, A. Kong and S. Ngai. A Study of Unauthorized Software Copying Among Post-Secondary Students in Hong Kong. The Australian Computer Journal, 22(4): 114–122, 1990 (November).
W. Wood and R. Glass. Sex as a Determinant of Software Piracy. Journal of Computer Information Systems, 36(2): 37–40, 1995 (Winter).
Rights and permissions
About this article
Cite this article
Hinduja, S. Trends and patterns among online software pirates. Ethics and Information Technology 5, 49–61 (2003). https://doi.org/10.1023/A:1024910523384
Issue Date:
DOI: https://doi.org/10.1023/A:1024910523384