To see the other types of publications on this topic, follow the link: Software piracy.

Journal articles on the topic 'Software piracy'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Software piracy.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Aksatha, Mrs D. Seema Dev, and M. Blessing Marshal. "Software Piracy Protection." International Journal of Trend in Scientific Research and Development Volume-3, Issue-3 (April 30, 2019): 243–46. http://dx.doi.org/10.31142/ijtsrd21705.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Logsdon, Jeanne M., Judith K. Thompson, and Richard A. Reid. "Software Piracy." Proceedings of the International Association for Business and Society 3 (1992): 62–74. http://dx.doi.org/10.5840/iabsproc199234.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Tenisci, Teresa, and Wendy Alexander. "Software piracy." ACM SIGUCCS Newsletter 22, no. 3 (December 30, 1992): 7–8. http://dx.doi.org/10.1145/149422.149426.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Green, Kenneth C., and Steven W. Gilbert. "Software Piracy." Change: The Magazine of Higher Learning 19, no. 1 (February 1987): 46–49. http://dx.doi.org/10.1080/00091383.1987.9937096.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Moores, Trevor, and Gurpreet Dhillon. "Software piracy." Communications of the ACM 43, no. 12 (December 2000): 88–93. http://dx.doi.org/10.1145/355112.355129.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Batson, Eric. "Software piracy." Postgraduate Medicine 77, no. 3 (February 15, 1985): 217–18. http://dx.doi.org/10.1080/00325481.1985.11698905.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

King, Albert S. "Controlling Software Piracy." Bulletin of the Association for Business Communication 55, no. 3 (September 1992): 35–40. http://dx.doi.org/10.1177/108056999205500311.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Gopal, Ram D., and G. Lawrence Sanders. "Global software piracy." Communications of the ACM 43, no. 9 (September 2000): 82–89. http://dx.doi.org/10.1145/348941.349002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Bagchi, Kallol, Peeter Kirs, and Robert Cerveny. "Global software piracy." Communications of the ACM 49, no. 6 (June 2006): 70–76. http://dx.doi.org/10.1145/1132469.1132470.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Weisband, S. P., and S. E. Goodman. "International software piracy." Computer 25, no. 11 (November 1992): 87–90. http://dx.doi.org/10.1109/2.166426.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Schifreen, Robert. "Preventing software piracy." Network Security 1994, no. 9 (September 1994): 17–19. http://dx.doi.org/10.1016/1353-4858(94)90179-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Traphagan, Mark, and Anne Griffith. "Software Piracy and Global Competitiveness: Report on Global Software Piracy." International Review of Law, Computers & Technology 12, no. 3 (October 1998): 431–51. http://dx.doi.org/10.1080/13600869855298.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Zhang, Xiong, Wei T. Yue, and Wendy Hui. "Software piracy and bundling in the cloud-based software era." Information Technology & People 32, no. 4 (August 5, 2019): 1085–122. http://dx.doi.org/10.1108/itp-05-2018-0210.

Full text
Abstract:
Purpose In the cloud computing era, three merging developments in software industry are: cloud and on-premises software may offer complementary value to each other; cloud software service requires the support of significant information technology infrastructure; and software piracy problems can be better managed in the cloud. However, how these developments together impact a vendor’s bundling strategy has not yet been investigated. The paper aims to discuss this issue. Design/methodology/approach Drawing on the product bundling framework, this research establishes stylized models to study a software vendor’s bundling decision in the cloud-based era with special consideration on the issue of software piracy. Findings The authors find different key parameters associated with the cloud era exert different effects on the bundling decision. When on-premises software and cloud software generate additional value by complementing each other, software vendors can make greater profits under the pure components (PC) strategy. Regarding a low infrastructure cost, software vendors should favor pure bundling (PB). The impact of piracy deterrence effectiveness is less straightforward – it favors PC when piracy deterrence effectiveness is low, but PB when piracy deterrence effectiveness is high. Originality/value This study makes key contributions to theory and practice. First, this is the first study to examine software bundling strategies in the cloud computing era, whereby the three factors relevant to the cloud phenomenon have been considered. Second, this paper contributes to the literature of bundling and software piracy by examining the intersection of these two streams of literature. Third, this paper sheds light on a vendor’s bundling decision when facing piracy problems in the emerging cloud software era.
APA, Harvard, Vancouver, ISO, and other styles
14

Sadiku, Matthew N. O., Mahamadou Tembely, and Sarhan M. Musa. "Software Piracy: A Primer." International Journal of Advanced Research in Computer Science and Software Engineering 8, no. 5 (June 2, 2018): 97. http://dx.doi.org/10.23956/ijarcsse.v8i5.680.

Full text
Abstract:
Due to increasing use of computer and the Internet, there has been a rise in illegal copying of software. Software piracy is the unlawful reproduction and distribution of software. The ease with which software is pirated is creating a vexing problem for software publishing industry. Today software piracy is costing software industry billions of dollars annually in lost revenues. It may even force some companies to go out of business. This paper provides a short introduction to software piracy.
APA, Harvard, Vancouver, ISO, and other styles
15

GOMES, Nicolas Dias, Pedro André CERQUEIRA, and Luís ALÇADA-ALMEIDA. "Determinants of worldwide software piracy losses." Technological and Economic Development of Economy 24, no. 1 (September 11, 2015): 48–66. http://dx.doi.org/10.3846/20294913.2015.1074128.

Full text
Abstract:
This paper studies the determinants of software piracy losses along five major macro­economic dimensions: Technological, Educational, Institutional, Access to Information and Labor force. The study was conducted based on a large dataset available from 1995 to 2010 and comprising 81 countries. As for the Technological dimension, more patents by residents increases piracy losses while the effect of R&D is the opposite (decreases piracy losses). In terms of the Educational dimension, the results show that more spending on education increase the piracy losses but, at the same time, more schooling years have the contrary effect. Concerning the Institutional dimension, nations with less corruption have lower piracy levels. Regarding the Access to Information, it seems that access to Internet diminishes the losses while the share of Internet broadband subscriptions has no effect. The results also show that, regarding the Labor dimension, employment in services has a deterrent effect while labor force with higher education and youth unemployment increases piracy losses.
APA, Harvard, Vancouver, ISO, and other styles
16

Deni, Deni, and Misnen Misnen. "Piracy as a Violation of the Ethics of the Informatics Engineering Profession." Jurnal Improsci 1, no. 6 (June 16, 2024): 319–28. http://dx.doi.org/10.62885/improsci.v1i6.301.

Full text
Abstract:
The development of information technology is high-speed. The high price of original software makes people tend to use pirated products. Viewed from the ethical side of the information technology profession, piracy is inappropriate because it violates the inventor's intellectual property rights. This article is the result of thinking to analyze the extent of software piracy. Copyright problems in software, software piracy terms, causes of software piracy, the role of software, and solutions to overcome software piracy cases. Be able to know about software copyright. As a result of this research, we can find out where the crucial points violate software piracy, the motives that exist in the case of software piracy, and the role that exists in terms of software.
APA, Harvard, Vancouver, ISO, and other styles
17

Zangana, Hewa Majeed, Imad Fakhri Al-Shaikhli, and Yuliana Isma Graha. "The Ethical Dilemma of Software Piracy: An Inquiry from an Islamic Perspective." CCIT Journal 7, no. 1 (September 24, 2013): 59–76. http://dx.doi.org/10.33050/ccit.v7i1.171.

Full text
Abstract:
Software piracy in the Muslim countries is a prevailing issue. It has been estimated based on BSA by 2009 that more than 90% of software in Yemen is pirated, followed by Libya 88%, Indonesia 86%, and Iraq 85%. UAE has the lowest rate for software piracy, which is 36%. While in the Middle East area, the piracy rate is around 59% with total commercial value of $2,887 Million. Furthermore, the software piracy remains a critical issue in Asia Pacific, with the region accounting for the highest dollar losses in the world from the use of unlicensed software. The survey of software piracy around the world, which is collaboration between the Business Software Alliance (BSA) and IDC, indicates that software piracy on personal computers in the Asia Pacific region in November 2009 was 61 percent, worth 15,000 million U.S. dollars (BSA, 2009; IDC Global PC). The purpose of this study is to understand the software piracy from Islamic perspective and finding the recommendations, solutions ofthis problem to deter software piracy as much as possible. Focusing on the Islamic rule, evidence and argument relating to copyright infringement especially software piracy in the Islamic world; additionally, the effect of software piracy
APA, Harvard, Vancouver, ISO, and other styles
18

Fang, Xiang, and Sooun Lee. "Empirical Analysis of Software Piracy in Asia (Japan VS. Vietnam)." International Journal of Information Security and Privacy 8, no. 2 (April 2014): 33–54. http://dx.doi.org/10.4018/ijisp.2014040103.

Full text
Abstract:
The piracy rate in Asia Pacific region has been historically higher than the world average since the BSA global piracy study was first conducted in 2004 (BSA/IDC Global Software Piracy Study 2013). This study aims to identify which demographic factors affect software piracy in two Asian countries, Japan and Vietnam, which have drastically different piracy rates, economic development stages, income levels, and national cultures. The statistical analysis of data reveals that among various factors, country difference, education, and gender most significantly influence software piracy. In addition, this study offers recommendations on how to curb software piracy effectively.
APA, Harvard, Vancouver, ISO, and other styles
19

Hess, Gregory M. "Combating Online Software Piracy." Journal of Internet Commerce 2, no. 3 (June 2003): 3–10. http://dx.doi.org/10.1300/j179v02n03_02.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Samtani, Anil, Yin Yin Joanna Gok, Boon Shiang Cue, and Su Li Gina Tan. "Software Piracy in Singapore." Journal of World Intellectual Property 4, no. 4 (November 1, 2005): 581–604. http://dx.doi.org/10.1111/j.1747-1796.2001.tb00128.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Morgan, Malcolm J., and Diane J. Ruskell. "Software Piracy — The Problems." Industrial Management & Data Systems 87, no. 3/4 (March 1987): 8–12. http://dx.doi.org/10.1108/eb057469.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Webster, Geoffrey. "Software Piracy — An Update." Computers & Security 14, no. 5 (January 1995): 418. http://dx.doi.org/10.1016/0167-4048(95)97113-o.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Aldabergenov, Aibek Amanzholovich. "IS SOFTWARE PIRACY PREVENTABLE?" Theoretical & Applied Science 14, no. 06 (June 30, 2014): 5–8. http://dx.doi.org/10.15863/tas.2014.06.14.2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Shin, Seung Kyoon, Ram D. Gopal, G. Lawrence Sanders, and Andrew B. Whinston. "Global software piracy revisited." Communications of the ACM 47, no. 1 (January 1, 2004): 103–7. http://dx.doi.org/10.1145/962081.962088.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Higgins, George E., and David A. Makin. "Self-Control, Deviant Peers, and Software Piracy." Psychological Reports 95, no. 3 (December 2004): 921–31. http://dx.doi.org/10.2466/pr0.95.3.921-931.

Full text
Abstract:
Tests of self-control theory have examined a substantial number of criminal behaviors, but no study has examined the correlation of low self-control with software piracy. Using data collected from 302 students in this university, this study examined the correlation of low self-control with software piracy and the moderating role of associating with deviant peers in this correlation. Low self-control correlated with software piracy more strongly for those who had high associations with deviant peers than for students with low associations with deviant peers. Analysis indicated differential links for lack of moral attitude in relation to software piracy and favorable attitudes for software piracy for varying association with deviant peers.
APA, Harvard, Vancouver, ISO, and other styles
26

Hassan, Ahmad Mohammad, and Ayuba John. "Comparative analysis on different software piracy prevention techniques." International Journal of Informatics and Communication Technology (IJ-ICT) 10, no. 1 (April 1, 2021): 1. http://dx.doi.org/10.11591/ijict.v10i1.pp1-8.

Full text
Abstract:
Numerous type of software piracy known today, have several prevention techniques which has been established against them. Although, different software piracy techniques have been established, but the choice of which one should be the best to develop any software is the challenge for most software developers. Consequently, example of the types of piracy in software development can be categorise as follows: cracks and serials, softlifting and hard disk loading, internet piracy and software forging, mischaneling, reverse engineering, and tampering. We have several types of prevention techniques which aimed to resolved piracy in software development, although the methods have been wrecked. In this work a critical analysis has been carryout on different software piracy techniques and a simple model software was designed using the best technique to validate the results of the analysis.
APA, Harvard, Vancouver, ISO, and other styles
27

Zhang, Xiong, Wei T. Yue, and Wendy Hui. "Bundling cloud software to fight piracy: an economic analysis." Internet Research 30, no. 1 (July 26, 2019): 191–241. http://dx.doi.org/10.1108/intr-10-2018-0455.

Full text
Abstract:
Purpose The emergence of internet-enabled technology has led to the software service model in which the software firm, instead of the consumer, maintains software ownership. This model can curtail software piracy more effectively than the traditional on-premises software model. However, software firms are not abandoning traditional on-premises software but embracing both models simultaneously. In this study, the authors consider a firm’s software bundling decision in combination with its piracy deterrence strategy. The paper aims to discuss these issues. Design/methodology/approach The authors build three stylized models to analytically compare the bundling strategies under three scenarios: no piracy, piracy is present and piracy is present while the firm applies digital rights management (DRM). Findings The authors find pure bundling (PB) to be the optimal strategy due to the combination of competition and cannibalization effects in mixed bundling (MB). Simultaneously, consumers may enjoy greater surplus in PB than in MB, making PB the preferred strategy for both the firm and consumers. Interestingly, the win-win outcome coexists with some degree of piracy in the market. Originality/value The results provide important insights for firms and policy-makers and contribute to the literature on piracy and product bundling. First, the authors show piracy could be another driver for product bundling, which has never been discussed in prior literature. Second, the authors suggest an alternative perspective; that PB may be a desirable outcome for both firms and consumers when considering piracy and DRM. More surprisingly, this desirable outcome occurs with some level of piracy in the market. The presence of piracy leads to competition and cannibalization effects in MB, which eventually results in the win-win outcome in the software market for both the firm and the consumers.
APA, Harvard, Vancouver, ISO, and other styles
28

Asongu, Simplice. "Software piracy, inequality and the poor: evidence from Africa." Journal of Economic Studies 41, no. 4 (July 8, 2014): 526–53. http://dx.doi.org/10.1108/jes-10-2012-0141.

Full text
Abstract:
Purpose – Poverty and inequality undoubtedly remain substantial challenges to economic and human developments amid growing emphasis on intellectual property rights (IPRs) (with recent advances in information and communication technology (ICTs)) and good governance. In the first empirical study on the incidence of piracy on inequality in Africa, the purpose of this paper is to examine how a plethora of factors (IPRs laws, education and ICTs and government quality) are instrumental in the piracy-inequality nexus. Design/methodology/approach – Two-stage least squares estimation approaches are applied in which piracy is instrumented with IPRs regimes (treaties), education and ICTs and government quality dynamics. Findings – The main finding suggests that, software piracy is good for the poor as it has a positive income-redistributive effect; consistent with economic and cultural considerations from recent literature. ICTs and education (dissemination of knowledge) are instrumental in this positive redistributive effect, while good governance mitigates inequality beyond the piracy channel. Practical implications – As a policy implication, in the adoption IPRs, sampled countries should take account of the role less stringent IPRs regimes play on income-redistribution through software piracy. Collateral benefits include among others, the cheap dissemination of knowledge through ICTs which African countries badly need in their quest to become “knowledge economies.” A caveat, however, is that, too much piracy may decrease incentives to innovate. Hence, the need to adopt tighter IPRs regimes in tandem with increasing income-equality. Originality/value – It is the first empirical assessment of the incidence of piracy on inequality in Africa: a continent with stubbornly high poverty and inequality rates.
APA, Harvard, Vancouver, ISO, and other styles
29

Liao, Zitian, Shah Nazir, Anwar Hussain, Habib Ullah Khan, and Muhammad Shafiq. "Software Piracy Awareness, Policy, and User Perspective in Educational Institutions." Scientific Programming 2020 (December 11, 2020): 1–14. http://dx.doi.org/10.1155/2020/6647819.

Full text
Abstract:
Software theft and piracy are rapidly ever-increasing problems of the present-day software industry. Software piracy is the illegal copy and use of software in a way other than that is officially documented by exclusive rights of the developer in the form of an individual or organization as described in the relevant sale agreement (license). Owing to the evolution in software development and Internet, software piracy has become a main concern for many software companies. Software companies are confronted with extremely high losses due to the piracy of software. Pirates achieve a lot of money by doing business with pirated software. General end-users of the software are not aware of this serious crime and of the legal consequences of breaking the law. Even most of the time, end-users and consumers think that it is none of their concern and not an important issue for them. Although, in reality, if an organization is working with pirated software, there is a risk of failure of the software, and it might put their organization at risk as pirated software does not receive any support from the development organization. This ultimately puts the consumer organization in huge financial loss. Due to these reasons, software piracy has turned out to be a major concern, more emergent due to the extravagant development of the software industry and the availability of software(s) on the Internet. In this paper, we analyzed and identified the ratio of software piracy, awareness regarding piracy, and the policy of the licensed software provided. Based on the results of the study, some suggestions are proposed by which the level of piracy can be reduced.
APA, Harvard, Vancouver, ISO, and other styles
30

Liang, Zhili, and Zheng Yan. "Software Piracy among College Students: A Comprehensive Review of Contributing Factors, Underlying Processes, and Tackling Strategies." Journal of Educational Computing Research 33, no. 2 (September 2005): 115–40. http://dx.doi.org/10.2190/8m5u-hpqk-f2n5-b574.

Full text
Abstract:
This article reviewed empirical studies published in the past 30 years that examined software piracy among college students. It focused on three areas of study: (a) major factors that affect college students' intentions, attitudes, and moral intensity regarding software piracy, (b) various decision-making processes that underlie software piracy behavior, and (c) technical, legal, and educational strategies that deal with college students' software piracy. Limitations of existing research and future research directions were discussed.
APA, Harvard, Vancouver, ISO, and other styles
31

Hinduja, Sameer. "Deindividuation and Internet Software Piracy." CyberPsychology & Behavior 11, no. 4 (August 2008): 391–98. http://dx.doi.org/10.1089/cpb.2007.0048.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Kin-wai Lau, Eric. "Interaction effects in software piracy." Business Ethics: A European Review 16, no. 1 (January 2007): 34–47. http://dx.doi.org/10.1111/j.1467-8608.2006.00467.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Introna, Lucas D. "Singular justice and software piracy." Business Ethics: A European Review 16, no. 3 (July 2007): 264–77. http://dx.doi.org/10.1111/j.1467-8608.2007.00498.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Crittenden, William F., Christopher Robertson, and Victoria Crittenden. "Hard facts about software piracy." Business Strategy Review 18, no. 4 (December 2007): 30–33. http://dx.doi.org/10.1111/j.1467-8616.2007.00496.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Holsapple, Clyde W., Deepak Iyengar, Haihao Jin, and Shashank Rao. "Parameters for Software Piracy Research." Information Society 24, no. 4 (June 30, 2008): 199–218. http://dx.doi.org/10.1080/01972240802189468.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Jones, Doug, and Steven Brenner. "Ethical Decision Making: Software Piracy." Proceedings of the International Association for Business and Society 15 (2004): 53–62. http://dx.doi.org/10.5840/iabsproc2004159.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Andrés, Antonio Rodríguez. "Software piracy and income inequality." Applied Economics Letters 13, no. 2 (February 10, 2006): 101–5. http://dx.doi.org/10.1080/13504850500390374.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

HINDUJA, SAMEER. "Correlates of Internet Software Piracy." Journal of Contemporary Criminal Justice 17, no. 4 (November 2001): 369–82. http://dx.doi.org/10.1177/1043986201017004006.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Banerjee, Dyuti S. "Lobbying and commercial software piracy." European Journal of Political Economy 22, no. 1 (March 2006): 139–55. http://dx.doi.org/10.1016/j.ejpoleco.2005.03.003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Ian Kyer, C. "Software piracy & corporate compliance:." Computer Law & Security Review 10, no. 5 (September 1994): 245–46. http://dx.doi.org/10.1016/0267-3649(94)90008-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Nill, Alexander, John Schibrowsky, and James W. Peltier. "Factors that influence software piracy." Communications of the ACM 53, no. 6 (June 2010): 131–34. http://dx.doi.org/10.1145/1743546.1743581.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Fernández‐Márquez, Carlos M., Francisco J. Vázquez, and Richard Watt. "Social influence on software piracy." Managerial and Decision Economics 41, no. 7 (March 29, 2020): 1211–24. http://dx.doi.org/10.1002/mde.3167.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

De Kock, D., S. Lubbe, and W. Kritzinger. "Software piracy – Some aspects for South African managers to keep in mind." South African Journal of Economic and Management Sciences 6, no. 4 (November 15, 2003): 785–801. http://dx.doi.org/10.4102/sajems.v6i4.1517.

Full text
Abstract:
Software piracy is a significant issue for managers of organisations, especially in developing countries. There are several factors which contribute to software piracy, and which are investigated in this study. This study consists of a literature review, and reports on empirical research, which was conducted using a survey instrument to determine if software piracy is prevalent in South Africa. The findings confirm the results of previous studies. The conclusion is made that software piracy will always exist and that stricter measures are needed to prevent its occurrence.
APA, Harvard, Vancouver, ISO, and other styles
44

Reinig, Bruce A., and Robert K. Plice. "Toward an Understanding of Software Piracy in Developed and Emerging Economies." International Journal of Social and Organizational Dynamics in IT 1, no. 1 (January 2011): 1–12. http://dx.doi.org/10.4018/ijsodit.2011010101.

Full text
Abstract:
The software industry loses billions of dollars annually to software piracy and has raised awareness of the high software piracy rates worldwide, particularly in emerging economies. In this paper, the authors build a general model of software piracy that includes three economic and social factors suggested by the literature, including per capita GNI, the relative size of a country’s IT market, and government corruption. The paper demonstrates that the relationship between national software piracy and per capita GNI is nonlinear, with additional gains in per capita GNI, producing marginally smaller reductions in software piracy. No structural variation is found in the model with respect to whether an economy is developed or emerging, using the OECD membership as a proxy. However, a structural break did exist with respect to the relative size of a country’s IT market. The analysis suggests that the classification of an economy as developed or emerging does not necessarily advance the understanding of the causal mechanisms that give rise to software piracy. Findings suggest that more insight can be gained by focusing on strategies that take into account the relative size of a country’s IT market.
APA, Harvard, Vancouver, ISO, and other styles
45

Acilar, Ali, and Muzaffer Aydemir. "Exploring Gender Differences in Attitudes Toward Software Piracy Among Undergraduate Students in a Developing Country." International Journal of Information Communication Technologies and Human Development 4, no. 4 (October 2012): 1–9. http://dx.doi.org/10.4018/jicthd.2012100101.

Full text
Abstract:
This study explores the relationship between gender of undergraduate students and their attitudes towards software piracy. Research data was obtained by surveying the undergraduate students of a business administration department at a public university in Turkey. Independent samples t-test was used for comparisons between male and female students’ attitudes toward software piracy. It was found that female students find software piracy less acceptable than male students do. The study finding is consistent with previous studies that reported female student participants are significantly more ethical than male student participants in terms of software piracy.
APA, Harvard, Vancouver, ISO, and other styles
46

Woolley, Darryl J., and Martha M. Eining. "Software Piracy among Accounting Students: A Longitudinal Comparison of Changes and Sensitivity." Journal of Information Systems 20, no. 1 (March 1, 2006): 49–63. http://dx.doi.org/10.2308/jis.2006.20.1.49.

Full text
Abstract:
A 1991 survey found that a large proportion of accounting students pirate software. Since 1991, however, the rate of software piracy within the United States has decreased. Using the Theory of Reasoned Action (TRA), this paper analyzes whether the frequency and the underlying antecedents of software piracy also have changed among accounting students. The results indicate that students' understanding and knowledge of copyright laws have increased, but this knowledge has not influenced software piracy rates. This paper also investigates respondents' willingness to answer honestly questions dealing with software piracy. The randomized response technique allows for an evaluation of the honesty of responses to a sensitive question (i.e., software theft). In contrast to other ethics issues about which individuals have been found to be dishonest, the results indicate that participants honestly answered most questions about their piracy behavior.
APA, Harvard, Vancouver, ISO, and other styles
47

Yu, Chia-ping, Mei-Lien Young, and Bao-Chang Ju. "Consumer software piracy in virtual communities." Internet Research 25, no. 2 (April 7, 2015): 317–34. http://dx.doi.org/10.1108/intr-08-2013-0187.

Full text
Abstract:
Purpose – In consumer marketing literature, the ethical/moral components of consumer behavior have been recognized as important factors in individuals’ involvement in software piracy. However, there remains unanswered the question of which specific components are being referred to and how they explain consumer software piracy in the virtual knowledge-sharing community. This question is particularly unaddressed for those consumers who take the risks associated with piracy believing their acts to be taking from the haves (software producers) and giving to the have-nots. The paper aims to discuss this issue. Design/methodology/approach – In this research, the authors propose a synergistic model that adopts the perspective of heroism and social exchange, and test it with the data collected from a virtual community. To test the proposed research model, the authors investigated 489 subjects and examined the hypotheses by applying the partial least squares method. Findings – The findings show that the heroism construct has significant influence on sharing behavior in relation to cost factors, but not to benefit factors. Heroism stands out as the major construct in explaining sharing behavior. Thus, the research shows that the consumer software piracy present in the virtual knowledge-sharing community is a social behavior of exchange. Originality/value – Methodologically, the study proposes a new model for researchers and practitioners to understand consumer software piracy in the virtual community. Managerially, software producers should take it into consideration when formulating their product-pricing strategy, to ensure that software producers and the young can both win in the “buy or steal” war.
APA, Harvard, Vancouver, ISO, and other styles
48

Nobre Fernandez, Rodrigo, Felipe Garcia Ribeiro, and Jean Marcel Del Ponte Duarte. "Effects of Software Piracy on Economic Growth." International Journal of Economics and Finance 10, no. 6 (April 27, 2018): 1. http://dx.doi.org/10.5539/ijef.v10n6p1.

Full text
Abstract:
This study investigates the effects of software piracy on economic growth around the world for the years 2000 to 2014, using panel data structure with fixed effects to capture this relationship, plus year dummies. Our findings suggest, in general, that software piracy has a negative impact on growth and that this relationship seems to be non-linear.
APA, Harvard, Vancouver, ISO, and other styles
49

Armah, Gabriel Kofi, Peter Awonnatemi Agbedemnab, David Sanka Laar, and Iven Aabaah. "Prevalence and Causes of Software Piracy among Tertiary Students in Ghana." Asian Journal of Research in Computer Science 16, no. 4 (October 30, 2023): 223–29. http://dx.doi.org/10.9734/ajrcos/2023/v16i4384.

Full text
Abstract:
In the era of the Knowledge Economy, Intellectual Property Rights (IPRs) have become a crucial aspect of the twenty-first-century environment. Software piracy, characterized by the unauthorized copying, downloading, sharing, selling, or installation of copyrighted software, remains a serious problem worldwide, and Ghana is no exception. Various forms of software piracy, such as software lifting, hard disk loading, counterfeiting, and unauthorized renting, are prevalent in the country, leading to negative economic consequences. These consequences include distorted competition, loss of tax revenue and jobs due to the absence of a legitimate market, and increased costs for recovery. The impact of software piracy affects the social well-being of the Ghanaian citizenry. This research aims to explore the causes and effects of software piracy in Ghana, especially among tertiary students, and proposes potential solutions. A quantitative survey design was used via an online questionnaire to collect data from a sample of 47 students in the tertiary institutions especially public universities in Ghana with backgrounds in IT and are familiar with evolving trends in IT. The findings revealed that software piracy is prevalent in the country as a result of a lack of awareness, poor economic conditions, and weak legal framework and/or enforcement. The study recommends increased public education and awareness, strict enforcement of laws related to software piracy, and the promotion of domestic software development as measures to address the menace.
APA, Harvard, Vancouver, ISO, and other styles
50

U., Kumaran, Thangam S., T. V. Nidhin Prabhakar, Jana Selvaganesan, and Vishwas H.N. "Adversarial Defense: A GAN-IF Based Cyber-security Model for Intrusion Detection in Software Piracy." Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications 14, no. 4 (December 23, 2023): 96–114. http://dx.doi.org/10.58346/jowua.2023.i4.008.

Full text
Abstract:
Software-piracy continues to be most critical distress, posing grave threats to digital-assets and financial stability. Traditional Intrusion Detection systems (IDS) often battles hard to identify latest piracy attempts owing to their dependence on pre-established patterns. To effectively address this we attempt to suggest innovative approach leveraging DL based Generative Adversarial Networks (GANs) and ML based Isolation Forest (IF) for detecting software piracies. Our proposed GAN-IF based cyber-security model performs its functions by training a Generator network to mimic the behavior of genuine software applications. Discriminator network discriminates between legitimate and pirated software. Isolation Forests assists in detecting anomalies in diverse conditions, including unseen attacks. Integrated training based on DL and ML framework enables efficient learning and adaptation with respect to piracy challenges, making it highly-successful against prior known threats. There are several DL models which are utilized in IDS operations having limitations in terms of robustness, interpretability. Utilizing GAN in the context of cyber-security to combat software-piracy can have noteworthy merits since GANs can precisely identify forged software as they are skilled at generating fake content resembling actual. Training a GAN on legitimate software, helps to learn and identify disparities in pirated versions. Isolation-Forest can detect anomalies in software distribution networks or user behavior with respect to software usage by recognizing abnormal patterns indicating software piracy, like illegal access or sharing of software licenses. Our proposed model combines GANs and Isolation Forests, excels at accurately detecting subtle indicators of software piracy, a capability that traditional methods may fail to recognize. ML-DL integrated model continuously learns and updates its detection capabilities in response to evolving piracy tactics, making it resilient against zero-day attacks, polymorphic malware. Through adversarial training, ml-model minimizes false alarms and focuses only on genuine threats. In our evaluation, we demonstrate the effectiveness of GAN-IF based cyber-security model in detecting software piracy attempts across various scenarios. Results indicate that our approach outperforms traditional solutions in terms of detection accuracy and adaptability.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography