May 18, · Piracy now affects everything from CD to Software sales around the world. The article shows how economies are effected behind the scenes by stating, “for every $1 of In software piracy was 42 percent and it jumps to 43 percent in , the finding underscores the need to adopt a better way of managing software piracy Download full With a 36% piracy rate, South Africa has the lowly piracy rate in Africa, where Nigeria and Kenya are the highest within the region as for with 71% and 77% respectively as
Software Piracy - Free Essay Example | blogger.com
Don't use plagiarized sources, software piracy essay. Many previous researches concluded that software piracy is common among college students, preventive and deterrents techniques were no effective in combating the piracy problem, therefore there is a great urgency to identify the factors that leads to software piracy in order to formulate better strategies to overcome the problem. This research identified six variables that influence the intention of college students to use pirated software; they are Gender, Age, Value Consciousness, Attitude, Peer pressure software piracy essay Novelty seeking.
A survey was conducted with students who are attending colleges in Selangor, software piracy essay, Malaysia, with a total of respondents participated in the survey. The study found out that Value consciousness, Attitude, Peer pressure and Novelty seeking are the factors that has significant relationship with intention to use pirated software, however gender and age was not found to be significant factors that influence the intention to use pirated software. Software piracy can be considered as robbery, an infringement of copyrights, and anything that is copyrighted can be pirated and almost anything worth copying is worth pirating Honick and Craig, When the end users purchase the software they do not become the owner of the product, however they have the rights to use the software under the terms and conditions oppose by the copyright owner of the software.
Software piracy is somewhat out of controlled in the real world, Microsoft software piracy essay found pirated software in the computers of a police department who were investigating piracy, and also one out of three software used in business are pirated Carbon There are more than 6, companies employingemployers in the field of information technology BSA, This research aim to find the common factors that influences the intention of college students in Malaysia to use pirated software, as finding these factors will help to combat the issue of software piracy more efficiently.
Software piracy has become a worldwide dilemma due to the software piracy essay and economic losses the software industry and governments has to face, also extra cost, viruses and other identity theft problems the consumers have to bear, software piracy essay. In the case of software piracy it is important to identify what factors influence the intention of individuals to use pirated software; this will help the software industry to come up with better software piracy essay in the fight against software piracy. TA study conducted by Cohen and Cornwell shows that software piracy is acceptable among the college students, software piracy essay, research done by Hinduja illustrate that colleges and universities are breeding grounds for software piracy.
Protecting software piracy essay intellectual property is a key factor for the copyright holder and for the consumers as well. Number of legal cases conforms that copy right and patent laws apply to computer software. In the case of Whelan Association Inc v. Jaslow Dental Laboratories, IncLotus Development Corp v, software piracy essay. Altai Inc court ruled that intellectual properties were protected Lau, According to the Malaysian copy right actif an individual or a corporation was found in position with unauthorized software, the user may face criminal charges, they will face a fine of not exceeding RM 10, software piracy essay, for each infringing copy, or prison sentence of not exceeding five years, or both. Preventives and deterrents are the commonly used techniques in the fight against software piracy Gopal and Sanders,preventives makes it difficult for software crackers to crack the software by increasing the security features.
Deterrent uses the laws and regulation to prevent software piracy. This proves software piracy essay need to find the influential factors that derives individuals towards software piracy, understanding these factors will help to formulate better strategies to deal with the problem of software piracy. Since most of the current studies are conducted outside Malaysia, there might be some significant difference in the behavior of the college students in Malaysia compare to previous research done in other countries. As there are no researches done on college students in Malaysia, it will be difficult to guaranty that those factors brought in by other literature can we applied to college students in Malaysia.
Will factors like Value consciousness, Attitude, Peer pressure and Novelty Seeking influence the intention to use pirated software among college student in Malaysia? Will demographic factors like Age and gender influence the intention to use pirated software among college students in Malaysia? This study has five chapters; the chapter one includes the background of the problem, problem statement, objective and purpose of the research, justification and research questions. The second chapter is a Literature review, which talks about different theories related to behavior and ethics, findings of the previous literature and few models used in articles writing in the subject of software piracy are discussed, software piracy essay.
Third chapter is the methodology, which talks about the research philosophy, purpose, approach, and strategy and sample selection used in this study. The forth chapter talks about the findings of the study and the fifth chapter is a conclusion of this study, along with the limitation of the study and further research suggestions. Second part of this chapter is focused on the findings of the previous literatures, specifically the literatures related to factors the influence individuals to use pirated software will be examined and finally the models used in some literatures will be used to explain software piracy. Theory of Reasoned Action, developed by Icek Ajzen and Martin Fishbein were used to explain why an individual behaves in a certain manner.
The theory is based on the assumption that humans are rational and information available to them will be used systematically. TRA uses attitude and norms to predict behavioral intentions, that is when attitude leads to certain behavior but the relevant norms suggest something else, then both factors influence the behavior. The Theory of Reasoned Actions TRA identifies that behavior is a function of intention and intention is a function of both attitude and subjective norms. Theory of Reasoned Action is an useful tool used in predicting certain behaviors, its has been applied in predicting number of behaviors like dental hygiene, smoking, breast cancer examinations and the use of seatbelts, software piracy essay.
Change, Enker examined how attitude and normative belief is related to cheating and he found out that theory of reasoned action was a useful tool in understanding moral behavior of an individual. The motive behind explaining the theory of software piracy essay action is to understand the sequence of actions that software piracy essay to a certain behavior such as software piracy, software piracy essay. To address these restrictions in TRA, software piracy essay, Ajzen developed the Theory of Planned behavior TPBwhich was an extension of Theory of Reasoned Actions.
The new model proposed by Ajzen included the Perceived Behavior Control PBC which was not found in TRA. The Theory of Planned Behavior states that an intention to behave in a particular fashion originates from persons attitude, subjective norms and perceived behavioral control, software piracy essay. Similar to the Theory of Reasoned Action TRATheory of Planned Behavior TPB is used is in wide range of situation to predict a behavior Flanny and May, Chang tested the validity of both Theory of Reasoned Action and Theory of Planned behavior in software piracy. The research was conducted to see the capacity of TRA to explain software piracy behavioral intentions and to see whether TPB can predict software piracy more software piracy essay than TRA.
Chang concluded that perceived behavioral control is the most important factor that influences individuals to used pirated software. Individuals who behave unethically most of the time do not have the full control of the situation. Opportunities must be available to the individual for him to use pirated software. Kohlberg developed the theory of moral development, software piracy essay, which consists of 3 level of moral development and each level contains 2 stages, software piracy essay. The concept behind the moral development stages is that, an individual mature morally when they mature intellectually. Preconvention is the first level of moral development, this is the beginning of the moral development process, software piracy essay, and in the first stage of preconvention level Punishment and obedience orientation an individual will have full respect for the authority and only concentrate on avoiding any punishment.
At the second stage of the first level reward orientation an individual will focus on achieving personal benefits such and rewards. At this stage an individual will concentrate more on satisfying his or her own needs rather than fulfilling the needs of others or society as a whole. Conventional is the second level of moral development, in this level individuals focus more on a group, this is the level where peer pressure begins to influence the decision of an individual. At the first stage of this level an individual will think in terms of software piracy essay convention, someone is labeled good or bad based on familial and social norms. If individuals turn to second stage of level two, software piracy essay, they mature morally and focus on law and regulations, at this stage the focus is on maintaining social order, so that societies can function in an orderly manner.
Software piracy essay conventional is the final level of the moral development proposed by Kohlberg, if an individual reaches the first stage of post conventional level one should be able emphasize on what could be legally binding, however one should be able to understands that laws can be amended to meet the social demand. When an individual is at the final stage of software piracy essay development or the universal ethical principle orientation individuals see himself as a judge for the moral problems. Individuals at this stage are more concern about human rights, justices and equity in decision making.
According to Kohlberg, most people are stuck at the conventional level, authority orientation stage, where law and order is the key aspect of moral decision making. A study conducted by Lane and Lane on the subject of softlifting pirating software for personal use found out that many students who participated in their study remained in the conventional level, authority orientation stage, of the moral development, based on their research they concluded that moral reasons behind software piracy was less important to the student compare to the benefit from softlifting. Prior research conduct on software software piracy essay shows that age had a significant influence on software piracy, hence younger responded were found more acceptable to software piracy essay pirated software Al-Rafee and Cronan ; Peace and Gopal and Sanders However a study conducted by Kini et al, software piracy essay, concluded that software piracy essay has no significant influence on software piracy.
Kini et al. Ford and Richardson in their research in also concluded that females are more ethical than males; therefore females will use pirated software less than males, as software piracy can be considered unethical. Using pirated software could be costly for an organization, even thought their employees used the pirated software without the knowledge of the top management, the management could be held liable for the action on their employees Robinson and Reithel. However individuals do not see the use of pirated software as a crime or unethical behavior Im and Van Epps,Reid et al., software piracy essay.
Kini et al, suggest that there is lack of recognition and enforcement to intellectual property laws, making software piracy a common phenomenon. The study conducted by Gopal and Sanders, and Yang et al. Individuals who earns a high income tend to use pirated software lesser than the individuals who earns a lower income Wee et al. Lamayem et al. Yang et al,also stressed that economic improvement tend to reduce the use of software piracy. At an individual level, software piracy essay, the cost of original software is considered as prime factor that influences the decision of an individual to use pirated software or not Cheng et al, Moores and Dhillion,Rawlinson et al,in their research found out that most university students do not have much discretionary income with which to purchase original software, they also point out that reduction of the price of the original software will reduce the software piracy rate, software piracy essay.
Studies conducted by many researchers in the subject of software piracy identifies that financial gain that an individual gets from using pirated software is the most common reason to use pirated software Cheng et al. Banerjee et al. Loch and Conger in their study found that attitude and social norms play an important role in ethical decision making situation which can be related to the use of pirated software. Simpson et al. They found out that personal and situational factor influence the softlifting behavior, software piracy essay. Thong and Yap. Peace et al. The study concluded that attitude which is affected by the cost of original software, punishment severity and punishment certaintysoftware piracy essay, subjective norms and perceived behavioral control were found to be significant factors that influence the intention of and individual to use pirated software.
Zhang et al. However many studies done on software piracy suggest that ethical education in academic institution had no or minimal effect on the intention of software piracy essay students to use pirated software Simpson et al. Even though, individuals who felt a moral obligation or guilt towards software piracy have less intention to use pirated software Cronan and Al-Rafee. Logsdon et al. The researchers also warn the software developers that even individuals with higher moral reasoning may engage in software piracy. Christensen and Eining indicated that individual do not see piracy as inappropriate behavior and they do not believe their friends and superiors believe its inappropriate behavior. Kini et al studied the cultural differences between the students of United States and Thailand in relation to software piracy, software piracy essay, and they found out that students of United States has higher moral understanding towards software piracy compare to the students in Thailand.
Swinyard et al in their research suggested that Asians have a more casual attitude towards software piracy than Americans, software piracy essay are more likely to copy or buy software and less likely to criticize anyone who uses pirated software. Ferrell and Gresham emphasized the importance of peer group working supervisors in affecting ethical behavior. Christensen and Einingsoftware piracy essay that the decision to use pirated software are influenced by the attitudes of friends and organization, these researchers also indicated that students do not perceive software piracy as inappropriate since they also believe their friends and superiors share this same view.
According to Yang, software piracy is a huge problem for policy makers and consumers alike, due to the uncertainty involving cross border conflicts, business losses and consumer exposing to virus and different kind of identity theft. McDonald and Roberts also considered software piracy essay piracy as a very serious problem though out the world and the reason that it has become so hard to deal with this problem software piracy essay the easiness in duplicating a copyrighted product. Tang and Farn concluded that supply to the pirated software will exists as long as there is a demand for pirated software, enforcement of laws and regulation and software piracy essay programs may minimize the piracy rates, but it will not stop people from using pirated software. Researchers who try to take the use of software piracy positively suggests that, software piracy can be seen as a form of product sampling, and that sampling can aid in the diffusion of a good Gupta et al, As per Mahajan and Mullersoftware piracy essay, the success of excel over lotus 1, 2, and 3 was due to the high tolerance level towards software piracy.
Also the consumers have to pay a higher price to use original software; because the price of the legitimate software is inflated in order to make up to the loss of revenue from software piracy Eining and christensen. In the fight against software piracy, Germany has started enforcing a charge on every CD burner that is sold to compensate the loss of revenue due to piracy Cronan and Al-Rafee.
Why Piracy Will NEVER DIE
, time: 5:27Software Piracy » EssayGroom
With a 36% piracy rate, South Africa has the lowly piracy rate in Africa, where Nigeria and Kenya are the highest within the region as for with 71% and 77% respectively as May 18, · Piracy now affects everything from CD to Software sales around the world. The article shows how economies are effected behind the scenes by stating, “for every $1 of Software piracy is an unresolved, worldwide problem, costing millions of dollars in lost revenue. Software companies have used many different copy protection schemes. The most annoying
No comments:
Post a Comment