Abstract
Software piracy is a damaging and important moral issue, which is widely believed to be unchecked in particular areas of the globe. This cross-cultural study examines differences in morality and behavior toward software piracy in Singapore versus the United States, and reviews the cultural histories of Asia versus the United States to explore why these differences occur. The paper is based upon pilot data collected in the U.S. and Singapore, using a tradeoff analysis methodology and analysis. The data reveal some fascinating interactions between the level of ethical transgression and the rewards or consequences which they produce.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
ADAPSO. 1984. Thou shalt not dupe. Arlington: ADAPSO.
Altbach, Philip G. 1988. Economic progress brings copyright to Asia. Far Eastern Economic Review 139(9): 62–63.
Bailey, Douglas M. 1984. A war of attrition: Software companies vs crafty pirates. New England Business 6(6): 22–23.
Barnes, Howared W. 1989.Cost leadership and differentiation: Contrasting strategies of Japan and the Federal Republic of Germany. Working Paper, Brigham Young University, Provo.
Benheshtian, Mehdi. 1986. Computer copyright law. Journal of Systems Management 37(9): 6–11.
Bern, Daryl. 1970. Beliefs, attitudes, and human affairs. Belmont: Brooks/Cole.
Blois, Keith. 1988. Supermarkets in China. Retail & Distribution Management 16(1): 40–42.
Davis, G.Gervaise. 1985. Software protection. New York: Van Nostrand Reinhold.
Eduardo, Lachica. 1989. Trade thievery: U.S. companies curb pirating of some items but by no means all. Wall Street Journal (March 16).
Greguras, Fred, and Frances Foster-Simons. 1985. Software protection in the People’s Republic of China. Information Age 7(4): 220–228.
Greguras, Fred, and Peter M. Langenberg. 1985. Trends in proprietary protection in Asia and the Pacific Region. Information Age 7(1): 3–9.
Harris, Thorne D. 1985. The legal guide to computer software protection. Englewood Cliffs: Prentice-Hall.
Hebditch, David. 1986. Pirate’s paradise. Datamation 32(17): 71–72.
Sanson, G.B. 1943. Japan: A short cultural history. New York: Appleton.
Swinyard, William R., Thomas L. DeLong, and Peng Sim Cheng. 1989. The relationship between moral decisions and their consequences: A tradeoff analysis approach. Journal of Business Ethics 8: 289–297.
Warner, Edward. 1986. U.S. attempts to take wind from Asian software pirates’ sails. Computerworld 20(18): 123.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Appendices
Appendix 1
The Scenario
Suppose you are working for a private company on a government consulting project. The timing and the completion of the project is critical, and you are committed to the project.
You have just found out that there is a computer software program which is essential to finish the project correctly and on time. The software is copyrighted and costs $800. However, the company has not budgeted for the software and is not willing to purchase it.
You have a friend who has purchased this software program. Your friend has offered to let you copy the programs and use the copy however you wish.
Alternatives
You have the four alternatives listed below available for you. Please check the space which best reflects your personal view how acceptable or unacceptable each alternative is for you.
Acceptable | Unacceptable | |
– | – | A. Do not copy the software and do not use it. |
– | – | B. Copy the program and destroy the copy after using it for the assignment. |
– | – | C. Copy the program and keep a copy for use on other projects. |
– | – | D. Copy the program and sell copies to other people that ask for it. |
Outcomes for Your Decision
Suppose that if you get the project finished correctly and on time, the following three alternatives exist for you. The successful completion of the project could:
-
1.
Provide you with a significant promotion and raise – a much better position and a 50% salary increase, or it could
-
2.
Provide you with a modest promotion and raise – a somewhat better position and a 10% salary increase, or it could
-
3.
Not affect your job, position, or salary with the company.
Appendix 2
Tradeoff Table for the Scenario
Now please consider both the four alternatives (A, B, C, and D) available to you with regards to the software, and the three personal outcomes (1, 2, and 3) and indicate the order of your preference for each combination, by numbering each box from 1 to 12:
Alternatives | ||||
Do not copy or use | Copy, but destroy after use | Copy and keep a copy | Copy and sell copies | |
Outcome for you: Provide you with a significant promotion and raise | ||||
Provide you with a modest promotion and raise | ||||
Not affect your position with the company |
Rights and permissions
Copyright information
© 2013 Springer Science+Business Media B.V.
About this chapter
Cite this chapter
Swinyard, W.R., Rinne, H., Kau, A.K. (2013). The Morality of Software Piracy: A Cross-Cultural Analysis. In: Michalos, A., Poff, D. (eds) Citation Classics from the Journal of Business Ethics. Advances in Business Ethics Research, vol 2. Springer, Dordrecht. https://doi.org/10.1007/978-94-007-4126-3_29
Download citation
DOI: https://doi.org/10.1007/978-94-007-4126-3_29
Published:
Publisher Name: Springer, Dordrecht
Print ISBN: 978-94-007-4125-6
Online ISBN: 978-94-007-4126-3
eBook Packages: Business and EconomicsBusiness and Management (R0)