Free Essay

Software Piracy Research

In: Business and Management

Submitted By charleswff
Words 1039
Pages 5
Background With the quick development of the technology, computers and internet provide a great convenience to people, in another way, people can't live without these high technologies no matter in daily life or work. People enjoy the convenience not only through the hardware devices but also some great softwares. Nobody's PC and tablet can run well without the necessary software, but there' re a number of software users don't want to buy the full licensed softwares. In order to have a accurate percentage of software piracy rate, BSA (business software alliance) made a research about it. The result of the piracy rate research made the researchers shocked. On the BSA's piracy study on 2011, total worldwide software piracy rate is up to 42% (Business Software Alliance, 2011) . Software piracy has become an increasing global problem to businesses and software developers in the world during the past two decades (Shin, Gopal, Sanders, & Whinston, 2004). The software industry suffers billions dollar losses because of software piracy (Bass, 2011). There' s no denying that U.S. is generally considered as the world leader in the software industry, but America' s illegal software market is worth 9 billion dollars in 2011, which is the top 1 economy in commercial value of pirated PC software (BSA, 2011). The problem of piracy diminishes revenues and lessens investment in research and development, threatening the long term benefit of the software industry. According to the Software and Information Industry Association, the worldwide revenue of business-based PC applications was $21.6 billion in 1999, but global revenue losses due to piracy in the business application software market were calculated at $12 billion (Shin, Gopal, Sanders, & Whinston, 2004). These statistics showed the losses attributed to piracy go beyond more than 50% of revenues, and the world piracy rates increase for the first time since 1995. China’s entry into the global networked society has raised considerable debate over what is originated from the development and expansion of information and communication technologies (Lu, Weber, 2009). One of the key issues is Internet copyright piracy, which is critical to the credibility and stability of China’s membership to the global networked society.

Thesis statement Software piracy occurs in many ways such as unauthorized burning CDs, sharing among acquaintances, or over Internet. The easy access to Internet help the piracy spread rapidly. In China, people can easily find the pirated software download websites, on the websites everything is for free. Private users would rather to download the pirated software instead of spending hundreds of dollars on the software. This paper is about the software piracy problem in China. Why does software piracy happen and how to control the situation is quite important to software developers. This study is going to research the reasons why it's more serious problem in China. This study is to determine the ways to reduce the phenomenon and protect the software developers' benefit.

Secondary research The research focused on the software piracy in China, which was a big shadow market for the software industry. It provided an overview of several reasons why Chinese prefer to have the pirated softwares rather than pay for it. The research included the culture factors, patent laws, accessibility of illegal software and people's attitude to the pirated software. Previous research has pointed out that the lack of public awareness made most people perceive the copying of software would do no harm to anyone, and the patriotism not only allowed Chinese to use software piracy but also protected local software companies in the competition of foreign companies (Cook, Chan. 2002).

Project methodology and approach The purpose of the research is to find out the major reasons why Chinese prefer to download the pirated software, therefore the survey will locate on the Chinese PC users. A survey questionnaire is used to gather the information on the situation and reasons people use pirated softwares. Participants of the survey are the college students and my friends who are employed in different kinds of companies in China. I also collected useful informations from articles and websites to determine the major factors what I need to consider on making the questionnaire.

Project implication The research is conducted using questionnaire for the groups including students and employees who use softwares everyday. The purpose of the research is to get their opinions on the software piracy problem, which can find out what' re the PC users caring most on alternative choices between piracy and legal copy. By analyzing the result of the questionnaire and the information collected from the articles can help to find the best solution to reduce the piracy rate in Chinese software market.

Project limitations The main limitation of the research is the participants are all in the developed areas of China. This will limit the research because the backward areas could have a more terrible result of the questionnaire. Some participants will be afraid to tell the truth, and some will be dishonest, the result may be influenced by these people.

Implementation plan In order to reduce the software piracy rate in China, government need to improve laws to protect the patent of the software, people need to build the awareness of intellectual property and use legitimate softwares, and the software retailers should make the price lower to fit the Chinese national conditions.

Reference
Shin, S., Gopal, R. D., Sanders, G., & Whinston, A. B. (2004). Global Software Piracy Revisited. Communications Of The ACM, 47(1), 103-107.
Lu, J., & Weber, I. (2009). Internet Software Piracy in China A User Analysis of Resistance to Global Software Copyright Enforcement. Journal Of International & Intercultural Communication, 2(4), 298-317.
Business Software Alliance. (2011) . 2011 BSA and IDC global software piracy study. Retrieved from http://portal.bsa.org/globalpiracy2011/index.html
Bass, D. (2011). Software Piracy Losses Jump to $59 Billion in 2010, Report Says. Retrieved from http://www.bloomberg.com/news/2011-05-12/software-piracy-losses-jump-to-59-billion-in-2010-report-says.html
Ho, K. (2001). "A Study into the Problem of Software Piracy in Hong Kong and China." Retrieved from http://www.ipd.gov.hk/eng/intellectual_property/study_aids/piracy_hk_china_copyrt/piracy_hk_china_c.htm
Cook, J., & Chan, B. (2002). Software Piracy in China. Retrieved from https://ritdml.rit.edu/handle/1850/7942

Similar Documents

Free Essay

How Is Digital Piracy Hurting Modern Society?

...| How is Digital Piracy Hurting Modern Society? | | | Introduction Digital Piracy is a huge crime that is large hurting the entertainment business here in the United States and in other countries, but the question I ask myself is how digital piracy hurting modern society? What actions are our governments taking to stop people from downloading illegal music, movies, and software? How much of a profit loss is effecting the companies that are producing this digital material? If someone knows what the punishment is for downloading music, movies, and software would they still do it. This research will aim to understand what is digtal piracy is and why it is that people download illegal software, movies, and music. Literature review In the article Examine Digital Piracy: Self-Control, Punishment, and Self-Efficacy, the authors introduce what digital piracy is and how it changes on a constant basis. They show how the “United States government has been cooperating in the fight against digital piracy with the software, music and movie industries with the Digital Millennium Copyright Act (DCMA)” (Zhang, Smith, McDowell, 2009). They discuss how most people think that digital piracy is acceptable, it a soft crime and it does not hurt anyone, and most think that this information should be exchanged freely. The authors also did an online-survey study on college students who were taking Management Information Sciences (MIS) course at a public university in the southern United...

Words: 1689 - Pages: 7

Premium Essay

Software Piracy

...Week 1 Assignment Software piracy is the illegal copying, distribution, or use of software. It is such a profitable "business" that it has caught the attention of organized crime groups in a number of countries. When you purchase a commercial software package, an end user license agreement ( EULA) is included to protect that software program from copyright infringement. Typically, the license states that you can install the original copy of software you bought on one computer and that you can make a backup copy in case the original is lost or damaged. You agree to the licensing agreement when you open the software package (this is called a shrink wrap license), when you open the envelope that contains the software disks, or when you install the software. 2 organizations that that work to prevent software piracy is SIIA and FAST. The Software & Information Industry Association (SIIA) is a trade organization for the software and digital content industry. SIIA offers global services in business development, government relations, corporate education, and intellectual property protection to companies. It also advocates a legal and regulatory environment that benefits the entire industry. The Federation Against Software Theft was set up in 1984 by the British Computer Society's Copyright Committee, and was the first software copyright organization in the U.K. Its first action was to raise the awareness of software piracy and to lobby the U.K. Parliament for changes in the Copyright...

Words: 490 - Pages: 2

Free Essay

Application of Beam

...MARKET 2011 bsa global software piracy study NiNth editioN, May 2012ExEcutivE Summary ..............................................................................................................................1 Global trEndS .......................................................................................................................................2 Habits of Self-reported Pirates ...........................................................................................................2 Emerging Economies Exert Greater influence ....................................................................................4 Key market Highlights .........................................................................................................................4 Pcs continue to overshadow tablets and cloud computing, for now ............................................ 6 Strong Support for iP rights................................................................................................................7 Pc Software Piracy rates and commercial value of unlicensed Software.........................................8 mEtHodoloGy......................................................................................................................................10 “a rigorous and Well-designed Effort”............................................................................................10 bSa bluEPrint for rEducinG SoftWarE Piracy .........................

Words: 7853 - Pages: 32

Premium Essay

International Business

...Introduction Piracy is a form of theft. Specifically, it refers to the unauthorized copying or use of intellectual property. Intellectual property is knowledge or expression that is owned by someone. There are three major types of intellectual property: 1) creative works, including music, written material, movies, and software, which are protected by copyright law; 2) inventions, which are protected by patent law; and 3) brand-name products, which are protected by trademarks. Many of the issues surrounding piracy have to do with the difference between intellectual property and physical property. A CD, for example, is a piece of physical property, but the songs on the CD are intellectual property. A customer in a record store can purchase a CD, but someone else still owns—or more precisely, has the copyright to—the songs on the CD. Piracy is primarily a problem for the entertainment and software industries, and therefore piracy most often involves violations of copyright law. Copyright is a legal right that protects creative works from being reproduced, performed, or disseminated without permission of the copyright owner. Essentially, a copyright gives its owner the exclusive right to make copies of the material in question. The American Heritage Dictionary defines piracy as "the unauthorized duplication of copyrighted or patented material."   It is a problem that affects companies all over the world. Piracy of software, movies, and music is commonplace in China.   China...

Words: 4376 - Pages: 18

Free Essay

Software Pircey

...Software Piracy Software piracy as “The illegal copying, distribution, or use of software.” Piracy includes casual copying of particular software by an individual or business. With the advancement of technological tools software piracy has increased worldwide. You may be thinking, what does this have to do with me? Unfortunately, software piracy affects all of us in more ways than one. For instance, software piracy hurts the economy because revenue is lost. Second, the software industry is affected because limited numbers of jobs are available. Lastly, consumers end up paying higher prices for software programs. Not being educated about software piracy will not exempt you of civil and/or criminal penalties if found guilty. Fines could include up to $250,000 and/or 5 years in jail. Software piracy is considered stealing it is the same as shoplifting or burglary. The software user also runs a higher risk of viruses and fatal system crashes because of corrupted diskettes or defective software. Consumers also lose because they don't enjoy the full benefits of technical support, warranty protection, or product upgrade information. The history of computer piracy started, because too many factors had a critical influence on it. So, the best way is to begin with the concept piracy is most related to - the Internet. The idea was born in the late fifties, after the first artificial earth satellite - USSR's Sputnik - was launched. In response, the United States formed the Advanced Research...

Words: 853 - Pages: 4

Premium Essay

Case Study-Crime That Pays

...000 square-meter, seven-level piracy temple, packed with nearly 2,000 small stalls, staffed by thousands of hard-charging, take no prisoner vendors, offering cheap knockoffs of the leading branded products in the world. Navigating a surreal bazaar gone wild, I stroll by stalls boldly displaying bogus Prada purses, Hugo Boss shirts, ad Hermes scarves; depending on how well you negotiate, each can be had for an absurd fraction of the price of the genuine version. Moving on, stall after stall offers infamous “copywatches,” Nike gear, Sony Jump Drives, Wii Remotes, Gillette razors, Oakley sunglasses, Zeiss binoculars, Nikon lenses, North Face jackets – one after another, in a seemingly endless procession of premier brand names. Despite spot-on comestic resemblance, virtually all is counterfeit. Moving around, one comes to digital zones, finding copies of software, music, games, and movies. Rack upon rack displays products from some of the best and the brightest minds of the world, now selling for ludicrously low prices-Microsoft Windows 7 for about a buck, Microsoft Office for $0.75, Wii Guitar Hero for a buck, Photoshop for two bucks, AutoCad for five dollars. Each stall is packed with an ever-changing collage of customers-Germans, Indians, Canadians, Brazilians, British, and Americans, and so on-each getting past initial shock, and many buying multiple titles. -DPS’s stroll through the Silk Market, Beijing, March 2011 Almost from its inception, software technology has been has been...

Words: 1739 - Pages: 7

Premium Essay

Online Piracy Report

...A Report on Digital Piracy Table of Contents 1 EXECUTIVE SUMMARY ....................................................................................... 3 2 INTRODUCTION ................................................................................................. ..3 3 FINDINGS AND ANALYSIS 3.1 METHODS OF DIGITAL PIRACY ………………………… … ……...3 3.2 ECONOMIC IMPACTS OF DIGITAL PIRACY …………… … …… .5 3.21 THE ECONOMIC EFFECTS ON RETAIL ……………………....5 3.3 HOW TO STOP, AVOID AND REPORT DIGITAL PIRACY…………….6 4 CONCLUSION …………………………………………………………………............ 7 5 RECOMMENDATION ……………………………………………………………….….7 6 REFERENCES.. ………………………………………………………………………...8 1. Executive Summary The aim of this report is to inform a company that is thinking of investing in the production digital content about digital piracy. The content of this report will explain: * What digital piracy is * The different forms of Digital piracy * The economic impacts digital piracy has on the economy * How to spot and prevent digital piracy * A conclusion digital piracy and a recommendation 2. Introduction Digital piracy is the illegal trade in software, videos, digital video devices (DVDs), and music. Piracy occurs when someone other than the copyright holder copies the product and resells it for a fraction of the cost that the legitimate producer charges. It is a serious problem in many...

Words: 1913 - Pages: 8

Premium Essay

Stop Online Piracy Act Sopa

...Stop Online Piracy Act (SOPA) Name: Institution: Course: Tutor: Date: What is Stop Online Piracy Act? Stop Online Piracy Act is a United State bill that is aimed at increasing the ability of United State law to fight online trafficking of counterfeits goods and copyrighted property. Stop Online Privacy Act was introduced by Lamar smith who is a representative in the United States. Therefore, Stop Online Piracy Act targets pirate bay, which are mostly used by individuals for illegal downloads. These pirate bays are mostly the overseas sites such as torrent hub that are frequently accessed by most individuals. Stop Online Piracy Act has various provisions (Crothers, 2012). Firstly, SOPA requires the courts to put up requests that are aimed at ensuring that both the online payment facilities and advertising networks refrain from using the infringing websites to conduct their business activities. Secondly, Stop Online Piracy Act requires the courts to have orders that ensure that internet service providers do not have access to the infringing websites. The final provision of Stop Online Piracy Act states that all search engines such as Google should not link to the infringing websites. Therefore, SOPA provisions are aimed at including piracy of copyrighted content in the criminal laws that will attract a maximum of five years imprisonment. Stop Online Piracy Act has been opposed and embraced by the Americans. Those...

Words: 2303 - Pages: 10

Premium Essay

Ethical Problems

...that is used in every field including corporate offices and private homes. Computers have made our day to day tasks easier to do and made a great impact in our society that is still evolving and changing each day. Workers are able to do their jobs more efficiently and allow interconnectivity between computer users all around the world through the Internet. Computers has made it very easy for people to copy and steal intellectual property like music, movies and computer software programs like Photoshop and Microsoft office. The scenario I will present below shows the effects of software piracy and explain why it is unethical to download and use anything you do not have the rights to especially if it was obtained by breaking the law. Software Piracy Scenario Emanuel is a freshman college student at the University of Maryland. He lives on campus and lives on a fixed income. One of his classes requires a lot research and time to complete his assignments. Emanuel has his own laptop and is able to do the research on his computer but unfortunately he does not have Microsoft Office Suite installed on his laptop so he can use Microsoft Word to type up his documents. Instead, he has to go to the college campus library and use their computers that do have Microsoft Word installed because the price of Microsoft Office is too expensive to purchase for Emanuel. Unfortunately, the college library has a limited amount of computers and sometimes there is a waiting list with a time limit to...

Words: 1381 - Pages: 6

Premium Essay

Software Copyright Piracy & Laws

...Software Copyright Piracy & Laws | Business Law | | This paper contains both recent and past accounts of software piracy cases. Also within the contents are definitions of what software piracy is and what has and can be done to help stop copyright infringement. | | Brandon Sampsell | 4/19/2012 | | Software Copyright Piracy & Laws The definition of software piracy is the illegal copying of software for commercial or personal gain. Software companies have tried many methods to prevent piracy, with varying degrees of success. Several agencies like the Software Publishers Association and the Business Software Alliance have been formed to combat both worldwide and domestic piracy. Software piracy is an unresolved, worldwide problem, costing millions of dollars in lost revenue. In a more recent case, the case of Universal Music Australia Pty Ltd v Sharman License Holdings Ltd (2005) 220 ALR 1 was high-profile Australian litigation involving music labels suing the developers and distributors (collectively referred to as "the Sharman parties") of software that enabled access to the Kazaa a p2p network. The software, which was made available for free, enabled users to upload and download digital files like music files or data files. However, unlike earlier p2p networks the Kazaa network did not require operation through centralized servers, nor physical involvement in the transmission of the files. The essence of the litigation concerned the responsibility...

Words: 2318 - Pages: 10

Premium Essay

Intellectual Property Piracy and Small and Medium Enterprises

...geographically diverse companies, it also enables parties with less than ethical purposes to carry activities detrimental to those businesses or even to individual from remote location. One of those activities is piracy, which has been a plague for most production organizations and individuals as it prevents them from reaping the full benefit of their work. For the giant corporations, the impact might be minimal but for small and medium businesses with less financial power, this could be quite detrimental as it can cut away a great portion of their expected income. In this paper, I will discuss how the global system can be an enabler for illegal activities whether it is cyber-terrorism or piracy of intellectual properties. The focus will be placed on piracy and how it can affects the small and medium enterprises and the legal measures that are being implemented on an international level as well as on the U.S national level to deter it. Works Cited: • Andrés, A. R., & Asongu, S. A. (2013). Fighting Software Piracy: Which GovernanceTools Matter in Africa?. Discusses how the role of government in reinforcing laws protecting intellectual property right and how a key factor such as corruption can affect the government attempts at controlling piracy especially in developing countries. • McManis, C. R. & Pelletier, J. S. (2012). Two Tales of a Treaty Revisited: The Proposed Anti-Counterfeiting...

Words: 3952 - Pages: 16

Premium Essay

File Sharing and the Revenue of the Creative Industries

...internet piracy that threatens the creative industries, including films, music, software, and books. (Van Eijk, 2011) However, after the shutdown of Megaupload, one of the most popular file hosting site, a series of ripple effect happened, causing several other file sharing hosts either deleted their files, or set up an access restriction. (Peukert and Claussen, 2012) It appeared to be an impact on the internet piracy and the revenue of the creative industries would go up — But it didn’t. According to Peukert and Claussen (2012), for example, the revenue of the film industry have decrease ever since Megaupload’s shutdown. The purpose of the essay is trying to analyze the relationship between the internet piracy via file sharing hosts and the revenue of the creative industries — how does the former interact with the latter — and a solution to resolve the declined revenue of the creative industries. Internet Piracy and File Sharing As its name suggests, “Internet Piracy” refers to manufacturing and distributing unauthorized copies, ie. “pirate copies”, on the Internet. (Panethiere, 2005) While the term “File Sharing” means to share a file with another person physically, such as storing and distributing a file in a CD, DVD, or a drive, or via uploading to the Internet to be downloaded. Since people can get various files distributed without any authorization from the internet for free via file sharing host, file sharing have been considered as an act of Internet Piracy (Van Eijk...

Words: 1483 - Pages: 6

Premium Essay

Dbms Research Proposal Paper

...from unauthorized access, use, disclosure, modification, loss or theft. Fulfilling the ethical duty of confidentiality is essential to the trust relationship between researcher and participant, and to the integrity of the research project. The confidentiality agreement is done with the 20 Database administrators from 20 different organizations. With the due course of the interview time with various DBA’s, each of them have common and different points with the other DBA’s. The information is saved and kept confidential with the respective DBA’s of the organization. Very good care is taken to maintain the confidentiality to the information they provided. A safety locker in the bank is taken to keep the documents. They are accessed only by the researcher. Documents will be destroyed after 3 years. Data Collection The data was collected from 20 Database Administrators from 20 different data warehousing organizations whose age would be 28-36 years. This group was selected because the data warehouse details and the data which is present in it of all the clients across the globe is very confidential and it has to be handled with utmost care. Hence effective and experienced persons are chosen for this role of Database Administrators. In this qualitative research the time taken was a long period of 30 days since each DBA has to be interviewed with one on one questions, each DBA was asked about 10 open ended questions and was asked to express their opinion and thoughts in details...

Words: 982 - Pages: 4

Premium Essay

Global Communication

...2/26/2016 Sarsha Sekhar Sarsha Sekhar Digital piracy and its impacts Digital piracy and its impacts Sarsha Sekhar Final paper Prof. Peter Shields 02/26/2016 Global media piracy is among some of the most important concerns for our media industries today. With the internet network being so widespread, digital piracy has a huge potential to grow and create massive revenue losses for our media companies here in the United States. Considering how large scale the digital piracy industry is today, it is important for us to first understand the background and history of global piracy. The problem of piracy on copyrighted material is extreamly large and continues to grow in big numbers even today. This digital piracy causes big problems to the software, videogame, music and movie industries. Digital piracy is basically the production and purchase of counterfeit material at a discounted rate. This digital piracy is constantly flowing between our internet networks from one person to another. Digital piracy goes all the way back to the 1990’s when the computers came into the picture and when the internet was made available to the public use. Traditional media piracy was basically the copying of discs or floppy’s that were sold in retail stores all over the world. In the beginning, the media companies as well as the Chinese government did not pay much attention to digital piracy, which made it easier for these digital pirates to create these...

Words: 2845 - Pages: 12

Free Essay

Hacking Activity

...You can create art and beauty on a computer. Computers can change your life for the better. Like Aladdin's lamp, you could get it to do your bidding. Hackers operate by these principles whether anyone gives them permission to or not. For example, they have no compunction about taking information whether it is offered as free or not. However, they make a concerted effort to make information free to everyone. Hackers were the driving force behind the free software movement, which resulted in concepts such as "freeware" and "shareware," as well as the open source movement, in which source code is made available for everyone to use and adapt for their own purposes, without cost (Poynder). The GNU project was started in 1984 to develop a complete UNIX-like operating system that is free software; "GNU," which stands for "GNU's not UNIX," is based on the kernel Linux is sponsored by the Free Software Foundation and is widely used ("Free as in Freedom"). When hackers execute a hack, it is usually fueled by the desire to understand something more fully, and "hack value" is "the notion among hackers that something is worth doing or is interesting," so therefore hackers rarely bother hacking something that does not hold intrinsic interest for them ("Hack Value"). A classic hack has hallmark characteristics of its own, as well: 1. Simplicity: the act has to be simple but impressive. 2. Mastery: the act involves sophisticated technical knowledge. 3. Illicitness: the act...

Words: 1284 - Pages: 6