Ethics and Information Technology

, Volume 5, Issue 1, pp 49–61 | Cite as

Trends and patterns among online software pirates

  • Sameer Hinduja
Article

Abstract

Computer crime on the Internet poses asignificant threat to the well-being ofbusinesses and individuals, and none are immunefrom the repercussions that can result. Onetype of this unethical and unlawful activity isonline software piracy. In this work, thesignificance of piracy as a topic for academicinquiry is first presented, followed by asummary of the conflicting stances on thisissue. Then, a review of scholarly literaturepreviously conducted in this area is given toprovide a backdrop for the current research. Univariate and bivariate findings from aquantitative study of students are used todemonstrate the incidence, scope, andassociated correlates of Internet piracy in auniversity setting. Technological and ethicalpolicy solutions that an institution mightimplement are suggested and discussed inconclusion.

academic business computer copyright ethics intellectual property Internet piracy software students university 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. R. Agnew and A.A.R. Peter. The Techniques of Neutralization: An Analysis of Predisposing and Situational Factors. Criminal Justice and Behavior, 13(1): 81–97, 1986 (March).Google Scholar
  2. M.R. Buckley, D.S. Wiese and M.G. Harvey. An Investigation into the Dimensions of Unethical Behavior. Journal of Education for Business, 73(5): 284–290, 1998 (May-June).Google Scholar
  3. H.K. Cheng, R.R. Sims and H. Teegen. To Purchase or Pirate Software: An Empirical Study. Journal of Management Information Systems, 13(4): 49–60, 1997 (Spring).Google Scholar
  4. A.L. Christensen and M.M. Eining. Factors Influencing Software Piracy: Implications for Accountants. Journal of Information Systems: 67–80, 1991 (Spring).Google Scholar
  5. Classification of Software. Software and Information Industry Association, 1999. [Online] Available http://www.siia.net/ piracy/programs/share.htm, December 12, 1999.Google Scholar
  6. E. Cohen and L. Cornwell. College Students Believe Piracy is Acceptable. CIS Educator Forum, 1(3): 2–5, 1989.Google Scholar
  7. Computer and Network Acceptable Use Policy. Middle Tennessee State University, 2001. [Online] Available http://www.mtsu.edu/misc/policy.html, March 15, 2001.Google Scholar
  8. D.F. Crown and M.S. Spiller. Learning from the Literature on Collegiate Cheating: A Review of Empirical Research. Journal of Business Ethics, 17(6): 683–700, 1998.Google Scholar
  9. D. Denning. Protection and Defense of Intrusion. Georgetown University, 1996 (February 28-March 1). Paper based on a talk given at the conference on 'National Security in the Information Age' at the US Air Force Academy, Colorado Springs, CO. [Online] Available http://www.cs.georgetown. edu/denning/infosec/USAFA.html, July 1, 1999.Google Scholar
  10. M.M. Eining and A.L. Christensen. A Psycho-Social Model of Software Piracy: The Development and Test of a Model. In R. Dejoie, G. Fowler and D. Paradice, editors, Ethical Issues in Information Systems, pp. 134–140. Boyd and Fraser Publishing Co., Boston, MA, 1991.Google Scholar
  11. D.R. Ellis. Computer Law-A Primer on the Law of Software Protection. The Florida Bar Journal, 1986 (April).Google Scholar
  12. R.D. Gopal and G.L. Sanders. International Software Piracy: Analysis of Key Issues and Impacts. Information Systems Research, 9(4): 380–397, 1998 (December).Google Scholar
  13. M.S. Friedman and K. Bissinger. Infojacking: Crimes on the Information Superhighway. New Jersey Law Journal, 1995 (May 22). [Online] Available http://www.sgrm.com/ art15.htm, March 01, 2001.Google Scholar
  14. S.J. Harrington. Why People Copy Software and Create Computer Viruses: Individual Characteristics or Situational Factors? Information Resources Management Journal: 28–37, 1989 (Summer).Google Scholar
  15. S. Hinduja. Neutralizing Piracy, 2002. Article manuscript under review.Google Scholar
  16. J.H. Im and C. Koen. Software Piracy and Responsibilities of Educational Institutions. Information and Management, 18(4): 189–194, 1990.Google Scholar
  17. J.H. Im and P.D. Van Epps. Software Piracy and Software Security in Business Schools: An Ethical Perspective. Data Base, 22(3): 15–21, 1991 (Summer).Google Scholar
  18. J.H. Im and P.D. Van Epps. Legal and Ethical Issues of Software Piracy. International Association for Computer Information Systems. New Orleans, LA, 1992a.Google Scholar
  19. J.H. Im and P.D. Van Epps. Software Piracy and Software Security Measures in Business Schools. Information and Management, 23(4): 193–203, 1992b.Google Scholar
  20. International Review of Criminal Policy-United Nations Manual on the Prevention and Control of Computer Related Crime, 1994. [Online] Available http://www.ifs.univie.ac.at/ %7Epr2gq1/rev4344.html, February 12, 1999.Google Scholar
  21. J. Jefferson. Deleting Cybercrooks: Prosecutors Want Tough Laws to Put Internet Hackers, Scam Artists and Pedophiles on Permanent Log Off. Cyber Law, ABA Journal, 83: 68, 1997 (October).Google Scholar
  22. K. Kievit. Information Systems Majors/Non-Majors and Computer Ethics. Journal of Computer Information Systems, 32(1): 43–49, 1991 (Fall).Google Scholar
  23. L.M. Leventhal, K.E. Instone and D.W. Chilson. Another View of Computer Science Ethics: Patterns of Responses Among Computer Scientists. Journal of System Software, 17: 49–60, 1992.Google Scholar
  24. Y. Malhotra. Controlling Copyright Infringements of Intellectual Property: The Case of Computer Software-Part One. Journal of Systems Management, 45: 32–35, 1994a (June).Google Scholar
  25. Microsoft Incorporates New Anti-Piracy Technologies In Windows 2000, Office 2000. Microsoft Corporation, 2000. [Online] Available http://www.microsoft.com/presspass/ press/2000/feb00/apfeaturespr.asp, April 5, 2000.Google Scholar
  26. E. Oz. The Attitude of Managers-to-Be Toward Software Piracy. OR/MS Today, 17(4): 24–26, 1990 (August).Google Scholar
  27. A.G. Peace. A Predictive Model of Software Piracy Behavior: An Empirical Validation. Unpublished doctoral dissertation, University of Pittsburgh, 1995.Google Scholar
  28. A.G. Peace. Software Piracy and Computer-Using Professionals: A Survey. Journal of Computer Information Systems, 38(1): 94–99, 1997 (Fall).Google Scholar
  29. Press Release. Business Software Alliance, 1999. [Online] Available http:/www.bsa.org/pressbox/policy/944837492. htm, December 12, 1999.Google Scholar
  30. M.M. Rahim, A.H. Seyal and N.A. Rahman. Software Piracy Among Computing Students: A Bruneian Scenario. Computers and Education, 32: 301–321, 1999.Google Scholar
  31. Recommended University Internet Usage Policy, 1999. [Online] Available http://www.siia.net/piracy/programs/univgd2.htm, November 15, 1999.Google Scholar
  32. R.A. Reid, J.K. Thompson and J.M. Logsdon. Knowledge and Attitudes of Management Students toward Software Piracy. Journal of Computer Information Systems, 33: 46–51, 1992 (Fall).Google Scholar
  33. V.F. Sacco and E. Zureik. Correlates of Computer Misuse: Data from a Self-Reporting Sample. Behaviour and Information Technology, 9: 353–369, 1990.Google Scholar
  34. U. Sieber. Legal Aspects of Computer-Related Crime in the Information Society. University of Würzburg. COMCRIME-Study Prepared for the European Commission, 1998. [Online] Available http://europa.eu.int/ISPO/legal/en/comcrime/ sieber.html, April 15, 2001.Google Scholar
  35. R.R. Sims, H.K. Cheng and H. Teegen. Toward a Profile of Student Software Piraters. Journal of Business Ethics, 15: 1996, 839–849.Google Scholar
  36. Software Piracy. Business Software Alliance, 1999. [Online] Available http://www.nopiracy.com/intro_c.html, December 12, 1999.Google Scholar
  37. Software Piracy and U.S. Law. Business Software Alliance, 1998. [Online] Available http://www.nopiracy.com/swandlaw_c.htm, December 12, 1999.Google Scholar
  38. SPAudit Software Management Tools. Software and Information Industry Association, 1999. [Online] Available http://www. siia.net/piracy/tools/download.htm, December 12, 1999.Google Scholar
  39. S. Solomon and J.A. O'Brien. The Effect of Demographic Factors on Attitudes Toward Software Piracy. Journal of Computer Information Systems: 40–46, 1990 (Spring).Google Scholar
  40. Temple University Pays $100,000 To Settle Software Claims. Business Software Alliance, 2000. [Online] Available http://www.bsa.org/pressbox/enforcement/index.html?/pressbox/ enforcement/952007190.html, March 25, 2000.Google Scholar
  41. The Copyright Act and Fair Use. Software Information Industry Association, 1999. [Online] Available http://www. siia.net/piracy/programs/fairuse.htm, December 12, 1999.Google Scholar
  42. C.R. Tittle. Sanctions and Social Deviance: The Question of Deterrence. Praeger Publishers, New York, 1980.Google Scholar
  43. Warez: Myth vs. Fact. Business Software Alliance, 1998. [Online] Available http://www.nopiracy.com/warezfaq_c. html, December 12, 1999.Google Scholar
  44. What is Free Software?-GNU Project. Free Software Foundation, 1999. [Online] Available http://www.fsf.org/philosophy/ free-sw.html, November 20, 1999.Google Scholar
  45. C. Wolf and S. Shorr. Cybercops Are Cracking Down on Internet Fraud. The National Law Journal. The New York Law Publishing Company, 1997.Google Scholar
  46. E.Y.H. Wong. How ShouldWe Teach Computer Ethics? A Short Study Done in Hong Kong. Computers and Education, 25(4): 179–191, 1995 (December).Google Scholar
  47. G. Wong, A. Kong and S. Ngai. A Study of Unauthorized Software Copying Among Post-Secondary Students in Hong Kong. The Australian Computer Journal, 22(4): 114–122, 1990 (November).Google Scholar
  48. W. Wood and R. Glass. Sex as a Determinant of Software Piracy. Journal of Computer Information Systems, 36(2): 37–40, 1995 (Winter).Google Scholar

Copyright information

© Kluwer Academic Publishers 2003

Authors and Affiliations

  • Sameer Hinduja

There are no affiliations available

Personalised recommendations