Publication Cover
The Information Society
An International Journal
Volume 24, 2008 - Issue 4
825
Views
20
CrossRef citations to date
0
Altmetric
ARTICLES

Parameters for Software Piracy Research

, , &
Pages 199-218 | Received 02 Mar 2007, Accepted 21 Dec 2007, Published online: 18 Jul 2008
 

Abstract

Advances in Internet and other digital technologies have opened up new channels and methods for online business. They have also led to a situation where the same channels can be abused and misused. One of these forms of technology abuse, which is becoming increasingly prevalent these days, is the piracy of digital content. This article introduces a relatively comprehensive and unified theoretical framework for studying and understanding a major aspect of digital piracy: namely, software piracy. Based on Routine Activities Theory, Rational Choice Theory, and guardianship concepts, the framework identifies key parameters that can affect the incidence of software piracy. We apply the framework in conducting a systematic examination of 75 articles dealing with software piracy. The examination reveals that a considerable number of parameters have received little or no attention from software-piracy researchers. In addition to suggesting research opportunities, the framework furnishes a systematic approach for structuring the design of future research studies in the realm of software piracy. The insights furnished by this article contribute to future investigations of the software-piracy phenomenon that are needed to avert the economic and social damage caused by software piracy.

Authors are listed alphabetically. We are thankful to the reviewers for their insightful comments that helped strengthen this article. Any errors or omissions, however, are our own.

Notes

1. See, for example, J. C. Ginsburg, Copyright control over new technologies of dissemination, Columbia Law Review, 101(7), 2001, or L. P. Loren, Digitization, commodification, criminalization: The evolution of criminal copyright infringement and the importance of the willfulness requirement, Washington University Law Review (77), 1999.

2. At this point, however, a caveat is necessary; piracy may not be an exact fit with the notion of extreme deviance (for example, arson) as, in software piracy unlike other crimes, the entity that is being attacked (the maker of the software in this case) stands to benefit at least a little bit, by way of network externalities present in the software. For example, CitationGivon et al. (1997) argue that some of the success of Microsoft Excel over competitors such as Lotus 1-2-3 could be attributed to the higher leeway that Microsoft allowed for piracy in the initial stages of its life cycle. However, in this article, we do not focus on the aspect of gains to the software maker, as overall, gains are known to be significantly smaller compared to the sales lost due to piracy (see for example BSA Piracy Report, 2007).

3. Of course, it should be noted that this is less of an issue with software than it would be with other forms of digital media such as films and music.

4. We are thankful to a reviewer for pointing this out.

5. We are thankful to a reviewer for pointing this out.

Log in via your institution

Log in to Taylor & Francis Online

PDF download + Online access

  • 48 hours access to article PDF & online version
  • Article PDF can be downloaded
  • Article PDF can be printed
USD 53.00 Add to cart

Issue Purchase

  • 30 days online access to complete issue
  • Article PDFs can be downloaded
  • Article PDFs can be printed
USD 229.00 Add to cart

* Local tax will be added as applicable

Related Research

People also read lists articles that other readers of this article have read.

Recommended articles lists articles that we recommend and is powered by our AI driven recommendation engine.

Cited by lists all citing articles based on Crossref citations.
Articles with the Crossref icon will open in a new tab.