Publication Cover
The Information Society
An International Journal
Volume 24, 2008 - Issue 4
825
Views
20
CrossRef citations to date
0
Altmetric
ARTICLES

Parameters for Software Piracy Research

, , &
Pages 199-218 | Received 02 Mar 2007, Accepted 21 Dec 2007, Published online: 18 Jul 2008

REFERENCES

  • Al Jabri , I. and Gader , A. 1997 . Software copyright infringement: An exploratory study of the effects of individual and peer beliefs . Omega: The International Journal of Management Science , 25 ( 3 ) : 335 – 344 .
  • Al-Rafee , S. and Cronan , P. T. 2006 . Digital piracy: Factors that influence attitudes toward behavior . Journal of Business Ethics , 63 ( 3 ) : 237 – 259 .
  • Altinkemer , K. , Guan , J. and Sahin , A. 2005 . Online software distribution with out enforcing copy protection as a strategic weapon . Information Systems and e-Business Management , 3 ( 4 ) : 343 – 361 .
  • Andres , A. R. 2006 . The relationship between copyright software protection and piracy: Evidence from Europe . European Journal of Law and Economics , 21 ( 1 ) : 29 – 51 .
  • Bae , H. and Choi , J. 2006 . A model of piracy . Information Economics and Policy , 18 ( 3 ) : 303 – 320 .
  • Bagchi , K. , Kirs , P. and Cerveny , P. 2006 . Global software piracy: Can economic factors alone explain the trend? . Communications of the ACM , 40 ( 6 ) : 70 – 77 .
  • Banerjee , D. 2006 . Lobbying and commercial software piracy . European Journal of Political Economy , 22 ( 1 ) : 139 – 155 .
  • Banerjee , D. 2003 . Software piracy: A strategic analysis and policy instruments . International Journal of Industrial Organization , 21 ( 1 ) : 197 – 217 .
  • Bass , K. and Barnett , T. 1999 . Individual difference variables, ethical judgments, and ethical behavioral intentions . Business Ethics Quarterly , 9 ( 2 ) : 183 – 205 .
  • Bezmen , T. and Depken , C. 2006 . Influences on software piracy: Evidence from the various United States . Economics Letters , 90 ( 3 ) : 356 – 361 .
  • Bhattacharjee , S. , Gopal , R. , Lertwachara , K. and Marsden , J. R. 2006 . Impact of legal threats on online music sharing activity: An analysis of music industry legal actions . Journal of Law and Economics , 49 ( 1 ) : 91 – 114 .
  • Bhattacharjee , S. , Gopal , R. , Lertwachara , K. and Marsden , J. R. 2006 . Consumer search and retailer strategies in the presence of online music sharing . Journal of Management Information Systems , 23 ( 1 ) : 129 – 159 .
  • Bhattacharjee , S. , Gopal , R. , Lertwachara , K. and Marsden , J. R. 2004 . Whatever happened to Payola? An empirical analysis of online music sharing . Decision Support Systems , 42 ( 1 ) : 104 – 120 .
  • Bhattacharjee , S. , Gopal , R. and Sanders , L. 2003 . Digital music and online sharing: Software piracy 2.0? . Communications of the ACM , 46 ( 7 ) : 107 – 111 .
  • Bhattacharjee , S. , Gopal , R. , Sanders , L. , Agarwal , M. and Wagner , S. 2002 . A behavioral model of digital music piracy . Journal of Organizational Computing and Electronic Commerce , 14 ( 2 ) : 89 – 105 .
  • Bono , S. , Rubin , A. , Stubbelfield , A. and Green , M. 2006 . Security through legality . Communications of the ACM , 40 ( 6 ) : 41 – 45 .
  • Braithwaite , J . 1989 . Crime, shame and re-integration , Cambridge : Oxford University Press .
  • Broidy , L. and Agnew , R. 1997 . Gender and crime: A general strain theory perspective . Journal of Research in Crime and Delinquency , 34 ( 3 ) : 275 – 306 .
  • BSA . 2007 . Fourth annual BSA & IDC global software piracy study http://w3.bsa.org/globalstudy//upload/2007-Global-Piracy-Study-EN.pdf (accessed April 1, 2008)
  • BSA and IDC . 2004 . First annual BSA & IDC global software piracy study http://www.caast.com/resources/IDC_Global_Software_Piracy_Study_2004.pdf (accessed April 1, 2008)
  • Caborn , A. 1997 . Are you a software thief, but don't know it . Management Today , http://www.managementtoday.co.uk/search/article/410979/uk-software-thief-dont-know-it/ November 1, 1997 (accessed April 1, 2008)
  • Calluzzo , V. and Cante , C. 2004 . Ethics in information technology and software use . Journal of Business Ethics , 51 ( 3 ) : 301 – 312 .
  • Chellappa , R. K. and Shivendu , S. 2005 . Managing piracy: pricing and sampling strategies for digital experience goods in vertically segmented markets . Information Systems Research , 16 ( 4 ) : 400 – 417 .
  • Cheng , H. , Sims , R. and Teegen , H. 1997 . To purchase or pirate software: An empirical study . Journal of Management Information Systems , 13 ( 4 ) : 49 – 60 .
  • Chiou , J. , Huang , C. and Lee , H. 2005 . The antecedents of music piracy: Attitudes and intentions . Journal of Business Ethics , 57 ( 2 ) : 161 – 174 .
  • Christinsen , A. and Eining , M. 1991 . Factors influencing software piracy: Implications for accountants . Journal of Information Systems , 5 ( 1 ) : 67 – 80 .
  • Clarke , R. 1999 . Hot products: Understanding, anticipating and reducing the demand for stolen goods . United Kingdom Police Research Series , http://www.crimereduction.gov.uk/stolengoods1.htm (Paper 112) (accessed October 15, 2007)
  • Clarke , R. and Felson , M. 1993 . “ Criminology, routine activity and rational choice—An introduction ” . In Routine activity and rational choice , Edited by: Clarke , R. and Felson , M. 1 – 13 . New Brunswick, NJ : Transaction .
  • Clarke , R. V. and Cornish , D. B. 1985 . “ Modeling offenders decisions: A framework for policy & research ” . In Crime & justice: An annual review of research Edited by: Tonry , M. and Morris , N. vol. 6 , 147 – 185 .
  • Cohen , L. E. and Felson , M. 1979 . Social change and crime rates: A routine activity approach . American Sociological Review , 44 ( 4 ) : 588 – 608 .
  • Coleman , J. W. 1987 . Toward an integrated theory of white collar crime . American Journal of Sociology , 93 ( 2 ) : 406 – 439 .
  • Conner , K. and Rummelt , R. 1991 . Software piracy: An analysis of protection strategies . Management Science , 37 ( 2 ) : 125 – 139 .
  • Craig , P. and Burnett , M. 2005 . Software Piracy Exposed , Rockland, MA : Syngress .
  • Cronan , T. , Foltz , B. and Jones , T. 2006 . Computer piracy, crime and IS misuse at the university . Communications of the ACM , 49 ( 6 ) : 85 – 90 .
  • Crowne , D. P. and Marlowe , D. 1960 . A new scale of social desirability independent of psychopathology . Journal of Consulting Psychology , 24 ( 4 ) : 349 – 354 .
  • Depken , C. and Simmons , L. 2004 . Social construct and the propensity for software piracy . Applied Economics Letters , 11 ( 2 ) : 97 – 100 .
  • Ford , R. C. and Richardson , W. D. 1994 . Ethical decision making: A review of empirical literature . Journal of Business Ethics , 13 ( 3 ) : 205 – 221 .
  • Gan , L. and Koh , H. 2006 . An empirical study of software piracy among tertiary institutions in Singapore . Information and Management , 43 ( 5 ) : 640 – 649 .
  • Ginsburg , J. C. 2001 . Copyright control over new technologies of dissemination . Columbia Law Review , 101 ( 7 ) : 1613 – 1647 .
  • Givon , M. , Mahajan , V. and Muller , E. 1995 . Software piracy: Estimation of lost sales and the impact of software diffusion . Journal of Marketing , 59 ( 1 ) : 29 – 37 .
  • Givon , M. , Mahajan , V. and Muller , E. 1997 . Assessing the relationship between user-based market share and unit sales-based market share for pirated software brands in competitive markets . Technological Forecasting & Social Change , 55 ( 2 ) : 131 – 144 .
  • Glass , R. and Wood , W. 1996 . Situational determinants of software piracy: An equity theory perspective . Journal of Business Ethics , 15 ( 11 ) : 1189 – 1198 .
  • Goode , S. and Cruise , S. 2006 . What motivates software crackers? . Journal of Business Ethics , 65 ( 2 ) : 173 – 201 .
  • Gopal , R. and Sanders , L. 1997 . Preventive and deterrent controls for software piracy . Journal of Management Information Systems , 13 ( 4 ) : 29 – 47 .
  • Gopal , R. and Sanders , L. 1998 . International software piracy: An analysis of key issues and impacts . Information Systems Research , 9 ( 4 ) : 380 – 397 .
  • Gopal , R. and Sanders , L. 2000 . Software piracy: You can't get blood out of a turnip . Communications of the ACM , 43 ( 9 ) : 84 – 89 .
  • Gottfredson , M. and Hirschi , T. 1990 . A general theory of crime , Stanford, CA : Stanford University Press .
  • Grasmick , H. and Bursik , R. 1990 . Conscience, significant others and rational choice—Extending the deterrence model . Law and Society Review , 24 ( 3 ) : 837 – 862 .
  • Greenberg , D. F. 1994 . The historical variability of the age–crime relationship . Journal of Quantitative Criminology , 10 ( 4 ) : 361 – 373 .
  • Gupta , P. , Gould , S. and Pola , B. 2004 . To pirate or not to pirate: A comparative study of the ethical versus other influences on consumer's software acquisition mode decision . Journal of Business Ethics , 55 ( 3 ) : 255 – 274 .
  • Harrington , S. 1995 . Computer crime and abuse by IS employees . Journal of Systems Management , 46 ( 2 ) : 6 – 11 .
  • Haruvy , E. , Mahajan , V. and Prasad , A. 2004 . The effect of piracy on the market penetration of subscription software . Journal of Business , 77 ( 2 ) : 581 – 609 .
  • Hawley , A. 1950 . Human ecology: A theory of community structure , New York : Ronald Press .
  • Hayes , S. 2006 . Piracy stats don't add up . Australian IT , http://www.australianit.news.com.au/story/0,24897,20713160-15306,00.html November 7, 2006 (accessed October 16 2007)
  • Higgins , G. E. , Fell , B. D. and Wilson , A. L. 2006 . Digital piracy: Assessing the contributions of an integrated self control theory and social learning theory using structural equation modeling . Criminal Justice Studies , 19 ( 1 ) : 3 – 22 .
  • Higgins , G. E. 2004 . Can low self-control help with the understanding of the software piracy problem? . Deviant Behavior , 26 ( 1 ) : 1 – 24 .
  • Hinduja , S. 2001 . Correlates of Internet software piracy . Journal of Contemporary Criminal Justice , 17 ( 4 ) : 369 – 382 .
  • Hinduja , S. 2003 . Trends and patterns among online software pirates . Ethics and Information Technology , 5 ( 1 ) : 49 – 61 .
  • Hirschi , T. 1969 . Causes of delinquency , first edition , Berkeley : University of California Press .
  • Holsing , N. and Yen , D. 1999 . Software asset management: Analysis, development and implementation . Information Resources Management Journal , 12 ( 3 ) : 14 – 27 .
  • Hood , M. 2005 . Steal this software and this DVD… and this book, and this handbag, and this car [Intellectual property theft] . Spectrum IEEE , 42 ( 6 ) : 52 – 53 .
  • Husted , B. 2000 . The impact of national culture on software piracy . Journal of Business Ethics , 26 ( 3 ) : 197 – 211 .
  • International Planning and Research Corporation . 2003 . Eighth annual BSA global software piracy study , Washington DC : Business Software Alliance .
  • King , S. and Lampe , R. 2003 . Network externalities, price discrimination and profitable piracy . Information Economics and Policy , 15 ( 3 ) : 271 – 290 .
  • Kini , R. , Ramakrishna , H. and Vijayaraman , B. 2004 . Shaping of moral intensity: A comparison between Thailand and US students . Journal of Business Ethics , 49 ( 1 ) : 91 – 104 .
  • Kini , R. , Ramakrishna , H. and Vijayaraman , B. 2003 . An exploratory study of moral intensity regarding software piracy of students in Thailand . Behavior and Information Technology , 22 ( 1 ) : 63 – 70 .
  • Kini , R. , Rominger , A. and Vijayaraman , B. 2000 . An empirical study of software piracy and moral intensity among university students . Journal of Computer Information Systems , 40 ( 3 ) : 62 – 73 .
  • Kohen , C. and Im , J. 1997 . Software piracy and its legal implications . Information and Management , 31 ( 5 ) : 265 – 272 .
  • Kuo , F. and Hsu , M. H. 2001 . Development and validation of an ethical computer self efficacy measure: The case of softlifting . Journal of Business Ethics , 32 ( 4 ) : 299 – 315 .
  • Lau , E. K. W. 2003 . An empirical study of software piracy . Business Ethics: A European Review , 12 ( 3 ) : 233 – 245 .
  • Law , R. and Wong , D. 2005 . How do hospitality and tourism students view software piracy? . Asia Pacific Journal of Tourism Research , 10 ( 3 ) : 263 – 273 .
  • Leyden , J. 2004 . Iceland's net traffic plummets, following P2P raids . The Register , http://www.theregister.co.uk/2004/09/30/p2p_raids_iceland/ September 30, 2004 (accessed 1 April 2008)
  • Limayem , M. , Khalifa , M. and Chin , W. 2004 . Factors affecting software piracy: A longitudinal study . IEEE Transaction on Engineering Management , 51 ( 4 ) : 414 – 425 .
  • Loch , K. D. and Cogner , S. 1996 . Evaluating ethical decision making and computer use . Communications of the ACM , 39 ( 7 ) : 74 – 83 .
  • Longson , J. , Thompson , J. and Reid , R. 1994 . Software piracy: Is it related to the level of moral of judgment? . Journal of Business Ethics , 13 ( 11 ) : 849 – 857 .
  • Loren , L. P. 1999 . Digitization, commodification, criminalization: The evolution of criminal copyright infringement and the importance of the willfulness requirement . Washington University Law Review , 77 : 835 – 887 .
  • Malhotra , Y. 1994 . Controlling copyright infringements of intellectual property: The case of computer software . Journal of Systems Management , 45 ( 6/7 ) : 32 – 25 .
  • Malone , T. , Yates , J. and Benjamin , R. 1987 . Electronic markets and electronic hierarchies . Communications of the ACM , 30 ( 6 ) : 485 – 497 .
  • Marron , D. and Steel , D. 2000 . Which countries protect intellectual property . Economic Inquiry , 38 ( 2 ) : 159 – 174 .
  • Mason , O. 1986 . Four ethical issues of the information age . MIS Quarterly , 10 ( 1 ) : 5 – 12 .
  • McIllwain , S. J. 2005 . Intellectual property theft and organized crime: The case of film piracy . Trends in Organized Crime , 8 ( 4 ) : 15 – 39 .
  • Mishra , B. , Raghu , T. and Prasad , A. 2005 . Strategic analysis of corporate software piracy prevention and detection . Journal of Organizational Computing and Electronic Commerce , 15 ( 2 ) : 223 – 252 .
  • Moores , T. and Chang , C. 2006 . Ethical decision making in software piracy: Initial development and test of a four component model . MIS Quarterly , 30 ( 1 ) : 167 – 180 .
  • Moores , T. and Dhaliwal , J. 2004 . A reversed context analysis of software piracy issues in Singapore . Information and Management , 41 ( 8 ) : 1037 – 1042 .
  • Moores , T. 2003 . The effect of national culture and economic wealth on global software piracy rates . Communications of the ACM , 46 ( 9 ) : 205 – 215 .
  • Moores , T. and Dhillon , G. 2000 . Software piracy: A view from Hong Kong . Communications of the ACM , 43 ( 12 ) : 88 – 93 .
  • Oz , E. 1990 . The attitude of managers to be toward software piracy . ORMS Today , 17 ( 4 ) : 24 – 26 .
  • Oz , E. 1995 . Software: Intellectual property protection alternatives . Journal of Systems Management , 46 ( 4 ) : 50 – 56 .
  • Oz , S. and Thisse , J. F. 1999 . A strategic approach to software protection . Journal of Economics and Management Strategy , 8 ( 2 ) : 163 – 190 .
  • Paternoster , R. 1987 . The deterrent effect and the perceived certainty and severity of punishment . Justice Quarterly , 4 ( 2 ) : 173 – 217 .
  • Paternoster , R. and Simpson , S. 1994 . “ A rational choice theory of corporate crime ” . In Routine activity and rational choice , Edited by: Clarke , R. and Felson , M. 37 – 58 . New Brunswick, NJ : Transaction .
  • Peace , A. G. 1997 . Software piracy and computer using professionals: A survey . Journal of Computer Information Systems , 38 ( 1 ) : 94 – 100 .
  • Peace , A. G. , Galletta , D. and Thong , J. 2003 . Software piracy in the workplace: A model and empirical test . Journal of Management Information Systems , 20 ( 1 ) : 153 – 177 .
  • Piquero , N. L. and Sealock , M. D. 2004 . Gender and general strain theory: A preliminary test of Broidy and Agnew's Gender GST hypotheses . Justice Quarterly , 21 ( 1 ) : 125 – 158 .
  • Prasad , R. 2006 . Piracy over peer-to-peer based on personal networks . Wireless Personal Communications , 37 ( 3–4 ) : 221 – 231 .
  • Prasad , A. and Mahajan , V. 2003 . How many pirates should a software firm tolerate? An analysis of piracy protection on the diffusion of software . International Journal of Research in Marketing , 20 ( 4 ) : 337 – 353 .
  • Rahim , M. , Rahman , M. N. A. and Seyal , A. 2000 . Software piracy among academics: An empirical study in Brunei-Darussalam . Information Management and Computer Security , 8 ( 1 ) : 14 – 26 .
  • Rahim , M. , Seyal , A. and Rahman , M. N. A. 1999 . Software piracy among computing students—A Bruneian scenario . Computers and Education , 32 ( 4 ) : 301 – 321 .
  • Ramakrishna , H. V. , Kini , R. B. and Vijayaraman , B. S. 2001 . Shaping of moral intensity regarding software piracy among university students: Immediate community effects . Journal of Computer Information Systems , 41 ( 4 ) : 47 – 51 .
  • Rehn , A. 2004 . The politics of contraband: The honor economies of the warez scene . Journal of Socio Economics , 33 ( 3 ) : 359 – 37 .
  • Reiss , A. Jr. 1951 . Delinquency as the failure of personal and social control . American Sociological Review , 16 ( 2 ) : 196 – 207 .
  • Rodríguez , A. 2006 . Software piracy and income inequality . Applied Economics Letters , 13 ( 2 ) : 101 – 105 .
  • Sacco , V. 1990 . Correlates of computer misuse: Data from a self reporting sample . Behavior and Information Technology , 9 ( 5 ) : 353 – 369 .
  • Samuelson , P. 1999 . Intellectual property and the digital economy: Why the anti-circumvention regulations need to be revised . Berkeley Technology Law Journal , 14 ( 2 ) : 519 – 547 .
  • Samuelson , P. 2003 . Digital rights management (and, or, vs.) the law . Communications of the ACM , 46 ( 4 ) : 41 – 45 .
  • Seale , D. A. , Polakowski , M. and Schneider , S. 1998 . Its not really theft! Personal and workplace ethics that enable software piracy . Behavior and Information Technology , 17 ( 1 ) : 27 – 40 .
  • Shin , S. K. , Gopal , R. , Sanders , G. L. and Whinston , A. 2004 . Global software piracy revisited . Communications of the ACM , 47 ( 1 ) : 103 – 107 .
  • Shore , B. , Venkatachalam , A. , Solorzano , E. , Burn , J. , Hassan , S. and Janczewski , L. 2001 . Softlifting and piracy: Behavior across cultures . Technology in Society , 23 ( 4 ) : 563 – 581 .
  • Siegfried , R. 2004 . Student attitudes on software piracy and related issues of computer ethics . Ethics and Information Technology , 6 ( 4 ) : 215 – 222 .
  • Simpson , P. , Banerjee , D. and Simpson , C. 1994 . Softlifting: A model of motivating factors . Journal of Business Ethics , 13 ( 6 ) : 431 – 439 .
  • Sims , R. , Cheng , H. and Teegen , H. 1996 . Toward a profile of student software pirates . Journal of Business Ethics , 15 ( 8 ) : 839 – 849 .
  • Singhapakdi , A. and Vitell , S. 1992 . Marketing ethics: Sales professionals versus other marketing professionals . Journal of Personal Selling and Sales Management , 12 ( 2 ) : 27 – 39 .
  • Solomon , S. and Obrien , J. 1990 . The effect of demographic factors on attitudes toward software piracy . Journal of Computer Information Systems , 30 ( 3 ) : 45 – 55 .
  • Straub , D. 1990 . Key information liability issues facing managers: Software piracy, proprietary databases, and individual rights to privacy . MIQ Quarterly , 14 ( 2 ) : 143 – 156 .
  • Swinyard , W. , Rinne , H. and Kau , A. K. 1990 . The morality of software piracy: A cross cultural analysis . Journal of Business Ethics , 9 ( 8 ) : 655 – 664 .
  • Tan , B. 2002 . Understanding consumer ethical decision making with respect to purchase of pirated software . Journal of Consumer Marketing , 19 ( 2 ) : 96 – 111 .
  • Tang , P. 1998 . How electronic publishers are protecting against piracy: Doubts about technical systems of protection . The Information Society , 14 ( 1 ) : 19 – 31 .
  • Tang , J. and Farn , C. 2005 . The effect of interpersonal influence on softlifting intention and behavior . Journal of Business Ethics , 56 ( 2 ) : 149 – 161 .
  • Taylor , G. S. and Shim , J. P. 1993 . A comparative examination of attitudes toward software piracy among business professors and executives . Human Relations , 46 ( 4 ) : 419 – 433 .
  • Thong , J. and Yap , C. S. 1998 . Testing an ethical decision making theory: The case of softlifting . Journal of Management Information Systems , 15 ( 1 ) : 213 – 237 .
  • U.S. Copyright Law . 1993 . http://www.copyright.gov/title17/92chap10.html Copyright Law of the United States of America and related laws contained in article 17 of the United States Code—Circular 92
  • Wagner , S. and Sanders , L. 2001 . Considerations in ethical decision making and software piracy . Journal of Business Ethics , 29 ( 1–2 ) : 161 – 167 .
  • Wall , D. 2001 . Crime and the Internet , London : Routledge .
  • Wang , F. , Zang , H. , Zang , H. and Ouyang , M. 2005 . Purchasing pirated software: An initial examination of Chinese consumers . Journal of Consumer Marketing , 22 ( 6 ) : 340 – 351 .
  • Wijk , J. V. 2002 . Dealing with piracy: Intellectual asset management in software and music . European Management Journal , 20 ( 6 ) : 689 – 698 .
  • Wong , G. 1990 . A study of unauthorized software copying among post secondary students in Hong Kong . Australian Computer Journal , 22 ( 4 ) : 114 – 122 .
  • Wood , W. and Glass , R. 1995 . Sex as a determinant of software piracy . Journal of Computer Information Systems , 36 ( 2 ) : 37 – 40 .
  • Wooley , D. and Eining , M. 2006 . Software piracy among accounting students: A longitudinal comparison of changes and sensitivity . Journal of Information Systems , 20 ( 1 ) : 49 – 63 .
  • Zwass , V. 2005 . Editors introduction . International Journal of Electronic Commerce , 9 ( 4 ) : 5 – 8 .

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.