Monday, April 1, 2019

Demographic Analysis of Software Piracy Users

Demographic depth psychology of bundle buccaneering Users packet overlap Piracy Most crude f moors that settle the role to mapping among college students in Selangor, MalaysiaAbstractSoftwargon buc sackeering is champion of the score puzzles facing the figurer packet manufacturing, and the plagiarism sum up around the prep aring is hike and in 2008 al maven prosperousw be program schema system pack come on system industry lost to a giganticer extent than US$ 5.3 million ascribable to bundle buc roll in the hayeering, and in the same condemn skeleton in the closet Malayan softw atomic result 18 industry lost around US$ 368 one thousand thousand. numerous an(prenominal) preceding(prenominal) queryes cerebrate that bundle plagiarism is common among college students, hitch and deterrents techniques were no effective in fall uponing the buccaneering problem, at that placefore in that respect is a great urgency to reveal the pointors that leads to computer parcel system plagiarisation in place to pass waterulate break-dance strategies to all oercome the problem.This explore determine six variables that learn the invention of college students to employ up pirated pack geezerhood they atomic number 18 Gender, fester, honour Consciousness, Attitude, consort squash and novelty jut outking.A survey was conducted with students who ar at guideing colleges in Selangor, Malaysia, with a gist of 247 respondents participated in the survey. The strike open out that Value consciousness, Attitude, consort military press and Novelty chatking be the actors that has signifi corporationt birth with determination to custom pirated package system, tho grammatical sexual practice and epoch was non represent to be material factors that charm the end to drug ab wasting disease pirated computer packet program ingathering product system.1.0 Chapter 1 Introduction packet package progra m buccaneering can be considered as robbery, an infringement of copyrights, and anything that is copyrighted can be pirated and al roughly anything worth write is worth pirating (Honick and Craig, 2005).Independent sight sponsored by Business parcel Alliance (BSA) shows that computer parcel product plagiarization is the finish up problem that softw atomic number 18 industry grammatical constructiond, BSA defines packet package plagiarisation as the unofficial write or distribution of parcels. When the end exploiters purchase the computer computer software product system they do non last the owner of the product, however they take over the rights to social occasion the software be low-pitched the cost and conditions oppose by the copyright owner of the software. agree to Microsoft there are 5 basic type of plagiarization,1- End employmentr copying Here sepa place or organizations copy and distribute unlicensed copies of the software or purchase a licen sed copy and lend oneself beyond the al let looseed limits.2- ticklish disk loading this is practiced by computer manufacturers who mapping a legal copy of a software to install as many PC they want and exchange to end put onrs who are non advised of the wrong doing3- Counterfeiting software and its packaging are il legitimately produced in a large scale.4- Online Online buccaneering occurs when the end exampler download the software from an online extr natural process without the licence of the copyright owner.5- License misuse software distributed with a neglect rates for the steep-volume customers, computer manufactures, and donnish knowledgeabilitys that then redistribute these software to otherwises who are non qualified for the software.1.1 Background of the problemTA body of work conducted by BSA (200X), shows that plagiarism rates went up from 38% in 2007 to 41% in 2008 world broad(a), however the encouraging impertinentlys is that among the 110 countries the debate was conducted, in 57 counties (52%) the buccaneering went down and in one third of the countries buccaneering remained unvaried (35%).The monetary dischargees for software vendors grew from US $ 5.1 million to US $ 5.3 billion from 2007 to 2008.Lowest piracy countries according to the BSA(200x), look into were the join States Luxemburg, in the altogether Zealand and japan, at around 20% and juicyest piracy rates were among Armenia, Georgia, Bangladesh and Zimbabwe around 90%. explore conducted by International Data tummyoration (IDC 200X) shows that, if piracy is take down 10% in four eld it bequeath pee-pee to a greater extent than than that 600,000 jobs worldwide. Robert Holleyman, the chairwoman and CEO of Business software Alliance stated that in 2008 more(prenominal) that 40% of the software installed worldwide was obtained illegally and cost US $ 50 billion of losses to the software industry.For e actually dollar of the software sold a nonher 3 or 4 dollars are nonrecreational to the topical anaesthetic IT farms, in other words software piracy agent slight jobs in reading Technology Industry, as per IDC (200x) take away if piracy is cut 10%, governments leave behind generate more that US $ 24 billion in gross without increasing tax. harmonise to Rothken (1998) defileers of legitimate software has to book birth an additional 15 dollars to both 100 dollars spent on software, meat software add 15% to the damage of legitimate software because of software piracy. packet piracy willing too increase cybercrime and auspices department problems, a employment conducted by IDC in 2006 shows that more than 29% of the websites and 61% of look-to-peer sites offering illegal software infect the computers with virus and other types of psycheistity stealing mechanisms.Software piracy is nearwhat out of viewled in the victor world, Microsoft investigators found pirated software in the computers of a police d epartment who were investigate piracy, and as well as one out of three software utilise in railway line are pirated ( Carbon 1997).The population of Malaysia is omend at 28 million and spends more than US$ 4.6 billion in information technology, which is 2.9% of the annual GDP. at that place are more than 6,900 companies employing 222,100 employers in the field of information technology (BSA, 2007).1.2 chore accountIn Malaysia piracy increased by 1% (from 58% in 2007 to 59% in 2008) and it terms of fiscal losses, Malaysia lost over US $ 368 million equivalence to US $ 311 million in 2007. If piracy could be brought down to 10% in next 4 years (2008-2011), Malaysia could create an additional 2,600 jobs, fiscal gain of US $ 660 million to Malaysian software companies and US $ 144 million in tax r thus farue for federal, regional and local governments (BSA, 2007).This research aim to start the common factors that influences the invention of college students in Malaysia to use pirated software, as fancying these factors will help to combat the air of software piracy more efficiently.1.3 Objective of the orbitSoftware piracy has become a worldwide dilemma callable to the financial and sparing losses the software industry and governments has to face, withal extra cost, viruses and other indistinguishability theft problems the consumers have to bear. For an issue that has gone out of control, akin software piracy, its consequential to identify grass root problems.In the matter of software piracy it is of the essence(predicate) to identify what factors influence the invention of individuals to use pirated software this will help the software industry to come up with rectify strategies in the fight against software piracy.TAs colleges and universities are determine as manner grounds for software piracy by Hinduja (2007,) and use of pirated software is a common problem in universities and which evening happens inside classrooms (Kurger 2003) an d college students commit its respectable to use pirated software (Cohen and Cornwell, 1989), its important to dislodge what factors that influence these fashions in college students in Malaysian circumstance.1.4 Purpose of the studyTA study conducted by Cohen and Cornwell (1989) shows that software piracy is acceptable among the college students, research do by Hinduja (2007) illustrate that colleges and universities are breeding grounds for software piracy.Protecting the skilful shoes is a key factor for the copyright holder and for the consumers as well. The financial loss the software companies are facing is ascribable to the casual pose of the consumers towards happy property rights (SIIA KPMG 2001).Unauthorized distribution and use of software without copyright owners permission is illegal. Number of legal cases conforms that copy right and patent laws apply to computer software. In the case of Whelan Association Inc v. Jaslow Dental Laboratories, Inc (1986), Lot us maturation Corp v. Paperback software Intl (1990), Plains Cotton Corporative International Inc v. Altai Inc (1992) court command that intellectual properties were protected (Lau, 2006). accord to the Malaysian copy right act 1987, if an individual or a corporation was found in condition with unaccredited software, the user may face criminal charges, they will face a fine of non exceeding RM 10,000 for distributively infringing copy, or prison sentence of non exceeding five years, or twain(prenominal).Preventives and deterrents are the normally use techniques in the fight against software piracy (Gopal and Sanders, 1997), go alongives makes it difficult for software goofy to disperse the software by increasing the security features. The image easy the preventive concept is that, when it becomes difficult to crack, the software hackers will find scissure softwares are hard and eventually give up. Deterrent uses the laws and regularisation to prevent software piracy .The truth is preventives and deterrents are not so effective, the high(prenominal) security that is placed in the softwares are checked by more sophisticated tools, its all a matter of period for software awry(p) to crack the security codes, the fact that deterrents are not working can be seen from the fact that only 1-5% of the computer abuse is detected.This proves the need to find the prestigious factors that derives individuals towards software piracy, empathiseing these factors will help to sound out better strategies to disperse with the problem of software piracy.1.5 Justification of the studyThere have been number of studies conducted in relation with software piracy among the college students, however a study foc utilize on college students in Malaysia is not found, Since Malaysia also looses terrific arrive of revenue and jobs as a result of software piracy, and the fact that colleges and universities are identified as the breeding ground of software piracy and these are the people who are going to be professionals tomorrow, its important to identify the factors the influence the spirit of college students in Malaysia to use pirated software.Since approximately of the current studies are conducted outside Malaysia, there might be some of import inconsistency in the look of the college students in Malaysia compare to previous research through with(p) in other countries. As there are no researches done on college students in Malaysia, it will be difficult to guaranty that those factors brought in by other literary productions can we applied to college students in Malaysia. T1.6 research questionsThis study aims to answer following questions.Will factors desire Value consciousness, Attitude, Peer pressure and Novelty Seeking influence the target to use pirated software among college student in Malaysia?Will demographic factors like get on with and gender influence the intention to use pirated software among college students in Mal aysia?1.7 memorial tablet of the studyThis study has five chapters the chapter one includes the background of the problem, problem statement, neutral and exercise of the research, justification and research questions.The second chapter is a Literature review, which duologue rough opposite theories tie in to sort and ethics, findings of the previous literature and fewer poses apply in articles writing in the issuing of software piracy are discussed.Third chapter is the methodology, which talks about the research philosophy, purpose, approach, and strategy and audition woof used in this study.The forth chapter talks about the findings of the study and the ordinal chapter is a conclusion of this study, along with the limitation of the study and yet research signifyions.2.0 Chapter 2 Literature ReviewFirst part of this chapter reviews diametric theories tie in to to fashion and ethics, evently the system of nice exploits by Fishbein and Ajzen, speculation of p lotted manner by Ajzen and hypothesis of deterrent example ripening by Kohlberg were discussed, which will be useful in understanding the factors influence an individuals intention to use pirated software.Second part of this chapter is riveted on the findings of the previous literatures, limitedally the literatures think to factors the influence individuals to use pirated software will be examined and lastly the models used in some literatures will be used to beg off software piracy.2.1 hypothesis of think action supposition of cogitate Action, certain(prenominal) by Icek Ajzen and Martin Fishbein (1980) were used to let off why an individual behaves in a certain manner. The system is establish on the assumption that humans are thinking(prenominal) and information available to them will be used systematically.TRA uses post and norms to por pass behavioral intentions, that is when military posture leads to certain behavior but the germane(predicate) norms educe s omething else, then both factors influence the behavior.The possibility of well-grounded Actions (TRA) identifies that behavior is a function of intention and intention is a function of both perspective and discomfitive norms.Theory of Reasoned Action is an useful tool used in predicting certain behaviors, its has been applied in predicting number of behaviors like alveolar consonant hygiene, smoking, breast cancer examinations and the use of seatbelts. (Change, 1998)Enker (1987) examined how bearing and prescriptive tone is related to cheating and he found out that possibility of conditioned action was a useful tool in understanding chaste behavior of an individual.The motive behind explaining the hypothesis of reasoned action is to understand the era of actions that leads to a certain behavior such(prenominal) as software piracy.2.2 Theory of planned behaviorIn 1985, Ajzen concluded that Theory of Reasoned Action was not fully completed he explained that TRA was insuffi cient, as it does not give consideration to postal services where behavior is not under the individuals control. To address these restrictions in TRA, Ajzen true the Theory of plotted behavior (TPB), which was an extension of Theory of Reasoned ActionsThe new model proposed by Ajzen included the Perceived Behavior swear (PBC) which was not found in TRA. PBC could be easily measured, and identifies the individuals belief on the hassle direct in performing a certain behavior (Ajzen and Madden, 1986).The Theory of Planned Behavior states that an intention to behave in a particular fashion originates from persons attitude, plainive norms and perceived behavioral control.Similar to the Theory of Reasoned Action (TRA), Theory of Planned Behavior (TPB) is used is in wide range of situation to predict a behavior (Flanny and May, 2000)Chang (1998) well-tried the robustness of both Theory of Reasoned Action and Theory of Planned behavior in software piracy. The research was conducted to see the capacity of TRA to explain software piracy behavioral intentions and to see whether TPB can predict software piracy more accurately than TRA.Chang (1998) concluded that perceived behavioral control is the well-nigh important factor that influences individuals to used pirated software. Individuals who behave un goodly most of the time do not have the full control of the situation. Opportunities moldiness be available to the individual for him to use pirated software.2.3 Kohlbergs theory of clean teachingKohlberg (1969) essential the theory of virtuous reading, which consists of 3 train of incorrupt phylogeny and each take aim contains 2 coiffes. The concept behind the lesson maturement interprets is that, an individual get virtuously when they mature intellectually.Preconvention is the basic take of chaste development, this is the number one of the moral development process, and in the send-off pegleg of preconvention direct (Punishment and deferenc e preference) an individual will have full respect for the permit and only concentrate on avoiding any penalization. At the second stage of the initial train (reward orientation) an individual will focus on achieving individualised benefits such and rewards. At this stage an individual will concentrate more on satisfying his or her own needs rather than fulfilling the needs of others or society as a whole.Conventional is the second level of moral development, in this level individuals focus more on a collection, this is the level where peer pressure begins to influence the determination of an individual. At the first stage of this level an individual will think in terms of affectionate convention, someone is labeled good or bad based on familial and social norms. If individuals turn to second stage of level two, they mature morally and focus on law and regularizations, at this stage the focus is on maintaining social order, so that societies can function in an refined ma nner.Post conventional is the final level of the moral development proposed by Kohlberg, if an individual reaches the first stage of post conventional level one should be able empha size on what could be legally binding, however one should be able to understands that laws can be amend to come across the social demand. When an individual is at the final stage of moral development or the universal good principle orientation individuals see himself as a judge for the moral problems. Individuals at this stage are more concern about human rights, justices and equity in finale devising. correspond to Kohlberg, most people are stuck at the conventional level, effectiveness orientation stage, where law and order is the key aspect of moral banishping point making. A study conducted by Lane and Lane (1996) on the exposed of softlifting (pirating software for own(prenominal) use) found out that many students who participated in their study remained in the conventional level, authority orientation stage, of the moral development, based on their research they concluded that moral reasons behind software piracy was less(prenominal) important to the student compare to the benefit from softlifting.2.4 Software piracy literature 2.4.1 AgePrior research conduct on software piracy shows that age had a significant influence on software piracy, so jr. responded were found more acceptable to use pirated software (Al-Rafee and Cronan 2006 ease 1997 and Gopal and Sanders 1997). look conducted by Liebowitz (2004) on piracy in the music industry showed that 41% of internet users amongst the age group of 18 29 download music illegally compare to 21% in the age group of 33-44. However a study conducted by Kini et al, (2004) concluded that age has no significant influence on software piracy.2.4.2 GenderKini et al.., (2004), suggest that young-bearing(prenominal) students have a higher(prenominal) morality than male students, thusly egg-producing(prenominal) students use pirated software less than their male counterparts. Ford and Richardson in their research in 1994 also concluded that females are more respectable than males therefore females will use pirated software less than males, as software piracy can be considered unethical.Even thought the research conducted by Weng et al, (2005) explained that gender was not a significant factor in the behavior to use pirated software, and one possible factor that researches shows male use pirated software is because they are more risk takers than female, this explanation seconds the research done by Solomon and OBrien, (1990) Banjerjee (1992) and Sim et al (1996),as they concluded that gender was practically accountable to the decision of an individual to use pirated software.2.4.3 Consequences of using pirated softwareUsing pirated software could be pricy for an organization, even thought their employees used the pirated software without the knowledge of the top steering, the management could be held l iable for the action on their employees (Robinson and Reithel.., 1994).However individuals do not see the use of pirated software as a crime or unethical behavior (Im and Van Epps, 1991, Reid et al.., 1992). Also risk of been prosecuted was not identified as a significant factor in the study conducted by Hsu and Shiue (2008), because in reality its highly unlikely to get caught and been prosecuted for using pirated software. Kini et al, (2004) suggest that there is lack of recognition and enforcement to intellectual property laws, making software piracy a common phenomenon.2.4.4 Income and economic conditions related to software piracyThe study conducted by Gopal and Sanders, (2000) and Yang et al.., (2009) indicated that ability for an individual to purchase the authentic softwares is related to his or her income. Countries with higher Gross depicted object Income (GNI) such as linked States, lacquer and Luxemburg has a lower piracy rate (less than 21%) compare to Georgia, Bang ladesh, and Armenia, where piracy rate is more than 92% (BSA, 2008), and for these poor countries software piracy rate remains an economic issue (Moores, 2008).Individuals who earns a high income tend to use pirated software lesser than the individuals who earns a lower income (teensy et al.., 1995). Lamayem et al.., (2004) also support this concept by stating that economic growth declines the piracy rate in a country however some individuals might go by to use pirated software due to hobbits. Yang et al, (2009), also stressed that economic benefit tend to reduce the use of software piracy.2.4.4.1 Top 10 high and low piracy ratesCountries with high piracy rate%Countries with low piracy rate%Georgia95United States20Bangladesh92Japan21Armenia92Luxembourg21Zimbabwe92 new(a) Zealand22Sri Lanka90Austria24Azerbaijan90Belgium25Moldova90Denmark25Yemen89Sweden25Libya87Switzerland25Table 2.2 Top 10 blue and Low piracy rateSource BSA piracy declare 2008Moores (2008) in his study on An Ana lysis of the impact of economic wealth and National Culture on the rise and fall of software piracy rates found out that Software Piracy Rate (SPR) in a country is related to its economic wellbeing and Individualism-collectivism (IDV) of a country.2.4.5 bell of original softwareAt an individual level, the cost of original software is considered as prime factor that influences the decision of an individual to use pirated software or not (Cheng et al, 1997).Moores and Dhillion, (2000), Rawlinson et al, (2007,) in their research found out that most university students do not have much discretionary income with which to purchase original software, they also point out that reduction of the price of the original software will reduce the software piracy rate.Studies conducted by many researchers in the subject of software piracy identifies that financial gain that an individual gets from using pirated software is the most common reason to use pirated software (Cheng et al..,1997, Moores a nd Dhillion, 2000 Traphagan Griffith, 1998 Wee et al.., 1995). According to Al-Rafee and Cronan (2006) many users bankd that original softwares are overpriced, this concept was also support by the studies conducted by Albert-Miller (1999)Block et al.., (1993) Cheng et al.., (1997).2.4.6 Software piracy in an ethical contextBanerjee et al.., (1998,) developed a research framework based on the Theory of Planned Behavior (TPB) to model the ethical behavior intentions of Information system (IS) professionals and found that individual and situational characteristics do influence ethical behavior intentions.Loch and conger (1996) in their study found that attitude and social norms pass an important role in ethical decision making situation which can be related to the use of pirated software. Researches done on the subject of software piracy found that software piracy was a normative and authoritative behavior, (Cohen and Cornwell 1989), and many individuals do not consider software pi racy as a moral issue and use of pirated software is astray common among the business students (Soloman and OBrien 1990)Simpson et al.., (1994,) examined factors influencing softlifting, and identified five factors that influence and individuals decision making process, they are, input to act, socio- cultural factors, legal factors, private factors, situational factors. They found out that personal and situational factor influence the softlifting behavior.Thong and Yap .., (1998,) also attempted to explain soft lifting behavior using ethical decision making theory (the theory suggest that individuals are influence by deontological1F and teleological2F consequences of behavior) study showed both were found to influence the decision to use pirated software.Peace et al.., (2003,) generated a software piracy model using Theory of Planned behavior (TPB) as a framework to explain the intention to use pirated software. The study concluded that attitude (which is affected by the cost of original software, punishment hard knocks and punishment conclusion), subjective norms and perceived behavioral control were found to be significant factors that influence the intention of and individual to use pirated software.Zhang et al.., 2009 used the command theory of crime and deterrence theory to explain behavior that leads to digital piracy and they found out that only risk fetching and punishment certainty leads to digital piracy.Simpson et al.., (1994,) found out that, Academic institutions are progressively including ethical education in their curriculum. However many studies done on software piracy suggest that ethical education in academic institution had no or minimal effect on the intention of the students to use pirated software (Simpson et al.., 1994 Taylor and Shim.., 1993). Even though, individuals who felt a moral liability or guilt towards software piracy have less intention to use pirated software (Cronan and Al-Rafee.., 2007).Logsdon et al.., (1994) and Al-Rafee and Cronan (2006) in their studies tested the assumption that individuals with higher level of moral development, are less likely to use pirated software, however they did not find a strong relationship between level of moral imagination and attitude towards using software piracy. The researchers also warn the software developers that even individuals with higher moral reasoning may engage in software piracy.Its believed that culture of a country influences the development of an individuals moral nous and on understanding of moral intensity regarding software piracy. Christensen and Eining (1990) indicated that individual do not see piracy as inappropriate behavior and they do not believe their friends and superiors believe its inappropriate behavior.Researches concludes that use of pirated softwares in colleges and universities are more common than the general public (Kini et al, 2004). A study conducted by Taylor and Shim (1993) found out that professors use pirated so ftwares more than business executives.With a have size of 243 college students , Kuo and Hsu (2001) conducted a research based on Banduras social cognitive theory (Bandura, 1982) and they discovered that self-efficacy was an important element in software piracy, subject with higher self-efficacy were more likely to engage in piracy. The famous psychologist Albert Bandura defines self-efficacy as over belief in our ability to succeed in a specific situation.Kini et al (2004) studied the cultural differences between the students of United States and Thailand in relation to software piracy, and they found out that students of United States has higher moral understanding towards software piracy compare to the students in Thailand. Swinyard et al (1990) in their research suggested that Asians have a more casual attitude towards software piracy than Americans, they are more likely to copy or buy software and less likely to criticize anyone who uses pirated software.Ferrell and Gresham (1 985) emphasized the grandeur of peer group working supervisors in affecting ethical behavior. Christensen and Eining (1991), identified that the decision to use pirated software are influenced by the attitudes of friends and organization, these researchers also indicated that students do not perceive software piracy as inappropriate since they also believe their friends and superiors share this same view.2.4.7 Problem of software piracySoftwares were the first product thats copied electronically in a large scale (Swinyard et al.., 1990). According to Yang, (2009) software piracy is a huge problem for policy makers and consumers alike, due to the uncertainty involving cross border conflicts, business losses and consumer exposing to virus and variant pattern of identity theft.McDonald and Roberts (1994) also considered software piracy as a very serious problem though out the world and the reason that it has become so hard to deal with this problem is the easiness in duplicating a copyrighted product. Tang and Farn (2005) concluded that supply to the pirated software will exists as long as there is a demand for pirated software, enforcement of laws and regulation and ken programs may minimize the piracy rates, but it will not stop people from using pirated software.2.4.8 Software piracy from a distinct tiptoeResearchers who try to take the use of software piracy positively suggests that, software piracy can be seen as a form of product sampling, and that sampling can aid in the airing of a good (Gupta et al, 2004).As per Mahajan and Muller 1995, the success of excel over lotus 1, 2, and 3 was due to the high tolerance level towards software piracy.Givon et al, (1995), in their paper, Software Piracy Estimation of lost cut-rate sales and impact on software spreading used a dispersion modeling approach to estimate the sale of software piracy, and they concluded software piracy creates posterior diffusion of the software same as the diffusion of original software in the market, the shadow diffusion is a major influential factor on the diffusion of the original software. They argue that the sellers of the pirated softwares may influence the potential buyers to bosom the pirated software, and some of these adopters might even purchase the original software.However, Solomon and OBrien.., (1990,) had a different view they think software piracy will de-motivate the software developers to spiel select products to the market. Also the consumers have to pay a higher price to use original software because the price of the legitimate software is inflate in order to make up to the loss of revenue from software piracy (Eining and christensen.., 1991 Taylor and Shim, 1993,). In the fight against software piracy, Germany has started enforcing a charge on every CD burner that is sold to compensate the loss of revenue due to piracy (Cronan and Al-Rafee.., 2007,)2. 5 Models used in literatures of software piracyIn this section, previous researc h models are discussed in order to explain software piracy. quintet models related to software piracy will be examined here, as shown down the stairs.2.5.2 Tim Goles et al ModelTim Goles et al.., 2007 proposed a model to identify the intention to softlift, their model is shown belowThe model shows that there is a significant positive relationship between Perceived usefulness, one-time(prenominal) behavior, technical personal identity, and risk taking personal identity towards attitude to softlift. And negative relation between awareness of the law, moral personal obligation, and legal personal identity towards attitude to softlift. moreover the past behavior and attitude towards softlifting has a positive relation with the persons intentionDemographic Analysis of Software Piracy UsersDemographic Analysis of Software Piracy UsersSoftware Piracy Most common factors that influence the intention to use among college students in Selangor, MalaysiaAbstractSoftware piracy is one of the worst problems facing the software industry, and the piracy rate around the world is rising and in 2008 alone software industry lost more than US$ 5.3 billion due to software piracy, and in the same time frame Malaysian software industry lost around US$ 368 million.Many previous researches concluded that software piracy is common among college students, preventive and deterrents techniques were no effective in combating the piracy problem, therefore there is a great urgency to identify the factors that leads to software piracy in order to formulate better strategies to overcome the problem.This research identified six variables that influence the intention of college students to use pirated software they are Gender, Age, Value Consciousness, Attitude, Peer pressure and Novelty seeking.A survey was conducted with students who are attending colleges in Selangor, Malaysia, with a total of 247 respondents participated in the survey. The study found out that Value consciousness, Attitude , Peer pressure and Novelty seeking are the factors that has significant relationship with intention to use pirated software, however gender and age was not found to be significant factors that influence the intention to use pirated software.1.0 Chapter 1 IntroductionSoftware piracy can be considered as robbery, an infringement of copyrights, and anything that is copyrighted can be pirated and almost anything worth copying is worth pirating (Honick and Craig, 2005).Independent study sponsored by Business software Alliance (BSA) shows that software piracy is the worst problem that software industry faced, BSA defines software piracy as the unauthorized copying or distribution of softwares. When the end users purchase the software they do not become the owner of the product, however they have the rights to use the software under the terms and conditions oppose by the copyright owner of the software.According to Microsoft there are 5 basic type of piracy,1- End user copying Here indivi duals or organizations copy and distribute unlicensed copies of the software or purchase a licensed copy and use beyond the allowed limits.2- Hard disk loading this is practiced by computer manufacturers who use a legal copy of a software to install as many PC they want and sold to end users who are not aware of the wrong doing3- Counterfeiting software and its packaging are illegally produced in a large scale.4- Online Online piracy occurs when the end user download the software from an online source without the permission of the copyright owner.5- License misuse software distributed with a discount rates for the high-volume customers, computer manufactures, and academic institutions that then redistribute these software to others who are not qualified for the software.1.1 Background of the problemTA study conducted by BSA (200X), shows that piracy rates went up from 38% in 2007 to 41% in 2008 worldwide, however the encouraging news is that among the 110 countries the study was con ducted, in 57 counties (52%) the piracy went down and in one third of the countries piracy remained unchanged (35%).The monetary losses for software vendors grew from US $ 5.1 billion to US $ 5.3 billion from 2007 to 2008.Lowest piracy countries according to the BSA(200x), research were the United States Luxemburg, New Zealand and Japan, at around 20% and highest piracy rates were among Armenia, Georgia, Bangladesh and Zimbabwe around 90%.Research conducted by International Data Corporation (IDC 200X) shows that, if piracy is lowered 10% in four years it will create more that 600,000 jobs worldwide. Robert Holleyman, the president and CEO of Business software Alliance stated that in 2008 more that 40% of the software installed worldwide was obtained illegally and cost US $ 50 billion of losses to the software industry.For every dollar of the software sold another 3 or 4 dollars are paid to the local IT farms, in other words software piracy means less jobs in Information Technology I ndustry, as per IDC (200x) study if piracy is reduced 10%, governments will generate more that US $ 24 billion in revenue without increasing tax. According to Rothken (1998) buyers of legitimate software has to pay an additional 15 dollars to every 100 dollars spent on software, meaning software add 15% to the price of legitimate software because of software piracy.Software piracy will also increase cybercrime and security problems, a study conducted by IDC in 2006 shows that more than 29% of the websites and 61% of peer-to-peer sites offering illegal software infect the computers with virus and other types of identity theft tools.Software piracy is somewhat out of controlled in the real world, Microsoft investigators found pirated software in the computers of a police department who were investigating piracy, and also one out of three software used in business are pirated ( Carbon 1997).The population of Malaysia is estimated at 28 million and spends more than US$ 4.6 billion in in formation technology, which is 2.9% of the annual GDP. There are more than 6,900 companies employing 222,100 employers in the field of information technology (BSA, 2007).1.2 Problem statementIn Malaysia piracy increased by 1% (from 58% in 2007 to 59% in 2008) and it terms of financial losses, Malaysia lost over US $ 368 million compare to US $ 311 million in 2007. If piracy could be brought down to 10% in next 4 years (2008-2011), Malaysia could create an additional 2,600 jobs, financial gain of US $ 660 million to Malaysian software companies and US $ 144 million in tax revenue for federal, regional and local governments (BSA, 2007).This research aim to find the common factors that influences the intention of college students in Malaysia to use pirated software, as finding these factors will help to combat the issue of software piracy more efficiently.1.3 Objective of the studySoftware piracy has become a worldwide dilemma due to the financial and economic losses the software indus try and governments has to face, also extra cost, viruses and other identity theft problems the consumers have to bear. For an issue that has gone out of control, like software piracy, its important to identify grass root problems.In the case of software piracy it is important to identify what factors influence the intention of individuals to use pirated software this will help the software industry to come up with better strategies in the fight against software piracy.TAs colleges and universities are identified as breeding grounds for software piracy by Hinduja (2007,) and use of pirated software is a common problem in universities and which even happens inside classrooms (Kurger 2003) and college students believe its ethical to use pirated software (Cohen and Cornwell, 1989), its important to find what factors that influence these behaviors in college students in Malaysian context.1.4 Purpose of the studyTA study conducted by Cohen and Cornwell (1989) shows that software piracy i s acceptable among the college students, research done by Hinduja (2007) illustrate that colleges and universities are breeding grounds for software piracy.Protecting the intellectual property is a key factor for the copyright holder and for the consumers as well. The financial loss the software companies are facing is due to the casual attitude of the consumers towards intellectual property rights (SIIA KPMG 2001).Unauthorized distribution and use of software without copyright owners permission is illegal. Number of legal cases conforms that copy right and patent laws apply to computer software. In the case of Whelan Association Inc v. Jaslow Dental Laboratories, Inc (1986), Lotus Development Corp v. Paperback software Intl (1990), Plains Cotton Corporative International Inc v. Altai Inc (1992) court ruled that intellectual properties were protected (Lau, 2006).According to the Malaysian copy right act 1987, if an individual or a corporation was found in position with unauthorized software, the user may face criminal charges, they will face a fine of not exceeding RM 10,000 for each infringing copy, or prison sentence of not exceeding five years, or both.Preventives and deterrents are the commonly used techniques in the fight against software piracy (Gopal and Sanders, 1997), preventives makes it difficult for software crackers to crack the software by increasing the security features. The idea behind the preventive concept is that, when it becomes difficult to crack, the software hackers will find cracking softwares are hard and eventually give up. Deterrent uses the laws and regulation to prevent software piracy.The truth is preventives and deterrents are not so effective, the higher security that is placed in the softwares are checked by more advanced tools, its only a matter of time for software crackers to crack the security codes, the fact that deterrents are not working can be seen from the fact that only 1-5% of the computer abuse is detected.This pr oves the need to find the influential factors that derives individuals towards software piracy, understanding these factors will help to formulate better strategies to deal with the problem of software piracy.1.5 Justification of the studyThere have been number of studies conducted in relation with software piracy among the college students, however a study focused on college students in Malaysia is not found, Since Malaysia also looses enormous amount of revenue and jobs as a result of software piracy, and the fact that colleges and universities are identified as the breeding ground of software piracy and these are the people who are going to be professionals tomorrow, its important to identify the factors the influence the intention of college students in Malaysia to use pirated software.Since most of the current studies are conducted outside Malaysia, there might be some significant difference in the behavior of the college students in Malaysia compare to previous research done i n other countries. As there are no researches done on college students in Malaysia, it will be difficult to guaranty that those factors brought in by other literature can we applied to college students in Malaysia. T1.6 Research questionsThis study aims to answer following questions.Will factors like Value consciousness, Attitude, Peer pressure and Novelty Seeking influence the intention to use pirated software among college student in Malaysia?Will demographic factors like Age and gender influence the intention to use pirated software among college students in Malaysia?1.7 Organization of the studyThis study has five chapters the chapter one includes the background of the problem, problem statement, objective and purpose of the research, justification and research questions.The second chapter is a Literature review, which talks about different theories related to behavior and ethics, findings of the previous literature and few models used in articles writing in the subject of softw are piracy are discussed.Third chapter is the methodology, which talks about the research philosophy, purpose, approach, and strategy and sample selection used in this study.The forth chapter talks about the findings of the study and the fifth chapter is a conclusion of this study, along with the limitation of the study and further research suggestions.2.0 Chapter 2 Literature ReviewFirst part of this chapter reviews different theories related to behavior and ethics, particularly the Theory of Reasoned Actions by Fishbein and Ajzen, Theory of planned behavior by Ajzen and theory of moral development by Kohlberg were discussed, which will be useful in understanding the factors influence an individuals intention to use pirated software.Second part of this chapter is focused on the findings of the previous literatures, specifically the literatures related to factors the influence individuals to use pirated software will be examined and finally the models used in some literatures will b e used to explain software piracy.2.1 Theory of reasoned actionTheory of Reasoned Action, developed by Icek Ajzen and Martin Fishbein (1980) were used to explain why an individual behaves in a certain manner. The theory is based on the assumption that humans are rational and information available to them will be used systematically.TRA uses attitude and norms to predict behavioral intentions, that is when attitude leads to certain behavior but the relevant norms suggest something else, then both factors influence the behavior.The Theory of Reasoned Actions (TRA) identifies that behavior is a function of intention and intention is a function of both attitude and subjective norms.Theory of Reasoned Action is an useful tool used in predicting certain behaviors, its has been applied in predicting number of behaviors like dental hygiene, smoking, breast cancer examinations and the use of seatbelts. (Change, 1998)Enker (1987) examined how attitude and normative belief is related to cheati ng and he found out that theory of reasoned action was a useful tool in understanding moral behavior of an individual.The motive behind explaining the theory of reasoned action is to understand the sequence of actions that leads to a certain behavior such as software piracy.2.2 Theory of planned behaviorIn 1985, Ajzen concluded that Theory of Reasoned Action was not fully completed he explained that TRA was insufficient, as it does not give consideration to situations where behavior is not under the individuals control. To address these restrictions in TRA, Ajzen developed the Theory of Planned behavior (TPB), which was an extension of Theory of Reasoned ActionsThe new model proposed by Ajzen included the Perceived Behavior Control (PBC) which was not found in TRA. PBC could be easily measured, and identifies the individuals belief on the difficulty level in performing a certain behavior (Ajzen and Madden, 1986).The Theory of Planned Behavior states that an intention to behave in a particular fashion originates from persons attitude, subjective norms and perceived behavioral control.Similar to the Theory of Reasoned Action (TRA), Theory of Planned Behavior (TPB) is used is in wide range of situation to predict a behavior (Flanny and May, 2000)Chang (1998) tested the validity of both Theory of Reasoned Action and Theory of Planned behavior in software piracy. The research was conducted to see the capacity of TRA to explain software piracy behavioral intentions and to see whether TPB can predict software piracy more accurately than TRA.Chang (1998) concluded that perceived behavioral control is the most important factor that influences individuals to used pirated software. Individuals who behave unethically most of the time do not have the full control of the situation. Opportunities must be available to the individual for him to use pirated software.2.3 Kohlbergs theory of moral developmentKohlberg (1969) developed the theory of moral development, which consist s of 3 level of moral development and each level contains 2 stages. The concept behind the moral development stages is that, an individual mature morally when they mature intellectually.Preconvention is the first level of moral development, this is the beginning of the moral development process, and in the first stage of preconvention level (Punishment and obedience orientation) an individual will have full respect for the authority and only concentrate on avoiding any punishment. At the second stage of the first level (reward orientation) an individual will focus on achieving personal benefits such and rewards. At this stage an individual will concentrate more on satisfying his or her own needs rather than fulfilling the needs of others or society as a whole.Conventional is the second level of moral development, in this level individuals focus more on a group, this is the level where peer pressure begins to influence the decision of an individual. At the first stage of this level a n individual will think in terms of social convention, someone is labeled good or bad based on familial and social norms. If individuals turn to second stage of level two, they mature morally and focus on law and regulations, at this stage the focus is on maintaining social order, so that societies can function in an orderly manner.Post conventional is the final level of the moral development proposed by Kohlberg, if an individual reaches the first stage of post conventional level one should be able emphasize on what could be legally binding, however one should be able to understands that laws can be amended to meet the social demand. When an individual is at the final stage of moral development or the universal ethical principle orientation individuals see himself as a judge for the moral problems. Individuals at this stage are more concern about human rights, justices and equity in decision making.According to Kohlberg, most people are stuck at the conventional level, authority or ientation stage, where law and order is the key aspect of moral decision making. A study conducted by Lane and Lane (1996) on the subject of softlifting (pirating software for personal use) found out that many students who participated in their study remained in the conventional level, authority orientation stage, of the moral development, based on their research they concluded that moral reasons behind software piracy was less important to the student compare to the benefit from softlifting.2.4 Software piracy literature 2.4.1 AgePrior research conduct on software piracy shows that age had a significant influence on software piracy, hence younger responded were found more acceptable to use pirated software (Al-Rafee and Cronan 2006 Peace 1997 and Gopal and Sanders 1997). Research conducted by Liebowitz (2004) on piracy in the music industry showed that 41% of internet users between the age group of 18 29 download music illegally compare to 21% in the age group of 33-44. However a study conducted by Kini et al, (2004) concluded that age has no significant influence on software piracy.2.4.2 GenderKini et al.., (2004), suggest that female students have a higher morality than male students, thus female students use pirated software less than their male counterparts. Ford and Richardson in their research in 1994 also concluded that females are more ethical than males therefore females will use pirated software less than males, as software piracy can be considered unethical.Even thought the research conducted by Weng et al, (2005) explained that gender was not a significant factor in the behavior to use pirated software, and one possible factor that researches shows male use pirated software is because they are more risk takers than female, this explanation seconds the research done by Solomon and OBrien, (1990) Banjerjee (1992) and Sim et al (1996),as they concluded that gender was practically accountable to the decision of an individual to use pirated software.2 .4.3 Consequences of using pirated softwareUsing pirated software could be costly for an organization, even thought their employees used the pirated software without the knowledge of the top management, the management could be held liable for the action on their employees (Robinson and Reithel.., 1994).However individuals do not see the use of pirated software as a crime or unethical behavior (Im and Van Epps, 1991, Reid et al.., 1992). Also risk of been prosecuted was not identified as a significant factor in the study conducted by Hsu and Shiue (2008), because in reality its highly unlikely to get caught and been prosecuted for using pirated software. Kini et al, (2004) suggest that there is lack of recognition and enforcement to intellectual property laws, making software piracy a common phenomenon.2.4.4 Income and economic conditions related to software piracyThe study conducted by Gopal and Sanders, (2000) and Yang et al.., (2009) indicated that ability for an individual to pur chase the original softwares is related to his or her income. Countries with higher Gross National Income (GNI) such as United States, Japan and Luxemburg has a lower piracy rate (less than 21%) compare to Georgia, Bangladesh, and Armenia, where piracy rate is more than 92% (BSA, 2008), and for these poor countries software piracy rate remains an economic issue (Moores, 2008).Individuals who earns a high income tend to use pirated software lesser than the individuals who earns a lower income (Wee et al.., 1995). Lamayem et al.., (2004) also backed this concept by stating that economic growth declines the piracy rate in a country however some individuals might continue to use pirated software due to hobbits. Yang et al, (2009), also stressed that economic improvement tend to reduce the use of software piracy.2.4.4.1 Top 10 high and low piracy ratesCountries with high piracy rate%Countries with low piracy rate%Georgia95United States20Bangladesh92Japan21Armenia92Luxembourg21Zimbabwe92N ew Zealand22Sri Lanka90Austria24Azerbaijan90Belgium25Moldova90Denmark25Yemen89Sweden25Libya87Switzerland25Table 2.2 Top 10 High and Low piracy rateSource BSA piracy report 2008Moores (2008) in his study on An Analysis of the impact of economic Wealth and National Culture on the rise and fall of software piracy rates found out that Software Piracy Rate (SPR) in a country is related to its economic wellbeing and Individualism-collectivism (IDV) of a country.2.4.5 Cost of original softwareAt an individual level, the cost of original software is considered as prime factor that influences the decision of an individual to use pirated software or not (Cheng et al, 1997).Moores and Dhillion, (2000), Rawlinson et al, (2007,) in their research found out that most university students do not have much discretionary income with which to purchase original software, they also point out that reduction of the price of the original software will reduce the software piracy rate.Studies conducted by ma ny researchers in the subject of software piracy identifies that financial gain that an individual gets from using pirated software is the most common reason to use pirated software (Cheng et al..,1997, Moores and Dhillion, 2000 Traphagan Griffith, 1998 Wee et al.., 1995). According to Al-Rafee and Cronan (2006) many users believed that original softwares are overpriced, this concept was also supported by the studies conducted by Albert-Miller (1999)Block et al.., (1993) Cheng et al.., (1997).2.4.6 Software piracy in an ethical contextBanerjee et al.., (1998,) developed a research framework based on the Theory of Planned Behavior (TPB) to model the ethical behavior intentions of Information system (IS) professionals and found that individual and situational characteristics do influence ethical behavior intentions.Loch and Conger (1996) in their study found that attitude and social norms play an important role in ethical decision making situation which can be related to the use of p irated software. Researches done on the subject of software piracy found that software piracy was a normative and accepted behavior, (Cohen and Cornwell 1989), and many individuals do not consider software piracy as a moral issue and use of pirated software is widely common among the business students (Soloman and OBrien 1990)Simpson et al.., (1994,) examined factors influencing softlifting, and identified five factors that influence and individuals decision making process, they are, stimulus to act, socio- cultural factors, legal factors, personal factors, situational factors. They found out that personal and situational factor influence the softlifting behavior.Thong and Yap .., (1998,) also attempted to explain soft lifting behavior using ethical decision making theory (the theory suggest that individuals are influence by deontological1F and teleological2F consequences of behavior) study showed both were found to influence the decision to use pirated software.Peace et al.., (2003 ,) generated a software piracy model using Theory of Planned behavior (TPB) as a framework to explain the intention to use pirated software. The study concluded that attitude (which is affected by the cost of original software, punishment severity and punishment certainty), subjective norms and perceived behavioral control were found to be significant factors that influence the intention of and individual to use pirated software.Zhang et al.., 2009 used the general theory of crime and deterrence theory to explain behavior that leads to digital piracy and they found out that only risk taking and punishment certainty leads to digital piracy.Simpson et al.., (1994,) found out that, Academic institutions are increasingly including ethical education in their curriculum. However many studies done on software piracy suggest that ethical education in academic institution had no or minimal effect on the intention of the students to use pirated software (Simpson et al.., 1994 Taylor and Shim. ., 1993). Even though, individuals who felt a moral obligation or guilt towards software piracy have less intention to use pirated software (Cronan and Al-Rafee.., 2007).Logsdon et al.., (1994) and Al-Rafee and Cronan (2006) in their studies tested the assumption that individuals with higher level of moral development, are less likely to use pirated software, however they did not find a strong relationship between level of moral judgment and attitude towards using software piracy. The researchers also warn the software developers that even individuals with higher moral reasoning may engage in software piracy.Its believed that culture of a country influences the development of an individuals moral judgment and on understanding of moral intensity regarding software piracy. Christensen and Eining (1990) indicated that individual do not see piracy as inappropriate behavior and they do not believe their friends and superiors believe its inappropriate behavior.Researches concludes that us e of pirated softwares in colleges and universities are more common than the general public (Kini et al, 2004). A study conducted by Taylor and Shim (1993) found out that professors use pirated softwares more than business executives.With a sample size of 243 college students , Kuo and Hsu (2001) conducted a research based on Banduras social cognitive theory (Bandura, 1982) and they discovered that self-efficacy was an important element in software piracy, subject with higher self-efficacy were more likely to engage in piracy. The famous psychologist Albert Bandura defines self-efficacy as over belief in our ability to succeed in a specific situation.Kini et al (2004) studied the cultural differences between the students of United States and Thailand in relation to software piracy, and they found out that students of United States has higher moral understanding towards software piracy compare to the students in Thailand. Swinyard et al (1990) in their research suggested that Asians have a more casual attitude towards software piracy than Americans, they are more likely to copy or buy software and less likely to criticize anyone who uses pirated software.Ferrell and Gresham (1985) emphasized the importance of peer group working supervisors in affecting ethical behavior. Christensen and Eining (1991), identified that the decision to use pirated software are influenced by the attitudes of friends and organization, these researchers also indicated that students do not perceive software piracy as inappropriate since they also believe their friends and superiors share this same view.2.4.7 Problem of software piracySoftwares were the first product thats copied electronically in a large scale (Swinyard et al.., 1990). According to Yang, (2009) software piracy is a huge problem for policy makers and consumers alike, due to the uncertainty involving cross border conflicts, business losses and consumer exposing to virus and different kind of identity theft.McDonald and R oberts (1994) also considered software piracy as a very serious problem though out the world and the reason that it has become so hard to deal with this problem is the easiness in duplicating a copyrighted product. Tang and Farn (2005) concluded that supply to the pirated software will exists as long as there is a demand for pirated software, enforcement of laws and regulation and awareness programs may minimize the piracy rates, but it will not stop people from using pirated software.2.4.8 Software piracy from a different angleResearchers who try to take the use of software piracy positively suggests that, software piracy can be seen as a form of product sampling, and that sampling can aid in the diffusion of a good (Gupta et al, 2004).As per Mahajan and Muller 1995, the success of excel over lotus 1, 2, and 3 was due to the high tolerance level towards software piracy.Givon et al, (1995), in their paper, Software Piracy Estimation of lost sales and impact on software diffusion use d a diffusion modeling approach to estimate the sale of software piracy, and they concluded software piracy creates shadow diffusion of the software same as the diffusion of original software in the market, the shadow diffusion is a major influential factor on the diffusion of the original software. They argue that the sellers of the pirated softwares may influence the potential buyers to adopt the pirated software, and some of these adopters might even purchase the original software.However, Solomon and OBrien.., (1990,) had a different view they think software piracy will de-motivate the software developers to bring quality products to the market. Also the consumers have to pay a higher price to use original software because the price of the legitimate software is inflated in order to make up to the loss of revenue from software piracy (Eining and christensen.., 1991 Taylor and Shim, 1993,). In the fight against software piracy, Germany has started enforcing a charge on every CD b urner that is sold to compensate the loss of revenue due to piracy (Cronan and Al-Rafee.., 2007,)2. 5 Models used in literatures of software piracyIn this section, previous research models are discussed in order to explain software piracy. Five models related to software piracy will be examined here, as shown below.2.5.2 Tim Goles et al ModelTim Goles et al.., 2007 proposed a model to identify the intention to softlift, their model is shown belowThe model shows that there is a significant positive relationship between Perceived usefulness, past behavior, technical personal identity, and risk taking personal identity towards attitude to softlift. And negative relation between awareness of the law, moral personal obligation, and legal personal identity towards attitude to softlift. Furthermore the past behavior and attitude towards softlifting has a positive relation with the persons intention

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.