Software piracy: an analysis of protection strategies
Management Science
A study of unauthorised software copying among post-secondary students in Hong Kong
Australian Computer Journal - Special issue on information technology and the law I
Electronic markets and electronic hierarchies
Communications of the ACM
Evaluating ethical decision making and computer use
Communications of the ACM
Software piracy and its legal implications
Information and Management
Software piracy among computing students: a Bruneian scenario
Computers & Education
Software asset management: analysis, development and implementation
Information Resources Management Journal
Global software piracy: you can't get blood out of a turnip
Communications of the ACM
Software piracy: a view from Hong Kong
Communications of the ACM
Communications of the ACM - Digital rights management
International Software Piracy: Analysis of Key Issues and Impacts
Information Systems Research
Digital music and online sharing: software piracy 2.0?
Communications of the ACM - A game experience in every application
Trends and patterns among online software pirates
Ethics and Information Technology
The effect of national culture and economic wealth on global software piracy rates
Communications of the ACM - Why CS students need math
Global software piracy revisited
Communications of the ACM - Multimodal interfaces that flex, adapt, and persist
A reversed context analysis of software piracy issues in Singapore
Information and Management
Student Attitudes on Software Piracy and Related Issues of Computer Ethics
Ethics and Information Technology
Global software piracy: can economic factors alone explain the trend?
Communications of the ACM - Hacking and innovation
Piracy, computer crime, and IS misuse at the university
Communications of the ACM - Hacking and innovation
Piracy Over Peer-To-Peer Based on Personal Network
Wireless Personal Communications: An International Journal
An empirical study of software piracy among tertiary institutions in Singapore
Information and Management
Testing an ethical decision-making theory: the case of softlifting
Journal of Management Information Systems
Preventive and deterrent controls for software piracy
Journal of Management Information Systems
To purchase or to pirate software: an empirical study
Journal of Management Information Systems
Whatever happened to payola? an empirical analysis of online music sharing
Decision Support Systems
Information Systems Research
Consumer Search and Retailer Strategies in the Presence of Online Music Sharing
Journal of Management Information Systems
Software Piracy in the Workplace: A Model and Empirical Test
Journal of Management Information Systems
Use, perceived deterrence and the role of software piracy in video game console adoption
Information Systems Frontiers
Towards a conceptual model of software piracy: from students perspective
International Journal of Business Information Systems
Hi-index | 0.00 |
Advances in Internet and other digital technologies have opened up new channels and methods for online business. They have also led to a situation where the same channels can be abused and misused. One of these forms of technology abuse, which is becoming increasingly prevalent these days, is the piracy of digital content. This article introduces a relatively comprehensive and unified theoretical framework for studying and understanding a major aspect of digital piracy: namely, software piracy. Based on Routine Activities Theory, Rational Choice Theory, and guardianship concepts, the framework identifies key parameters that can affect the incidence of software piracy. We apply the framework in conducting a systematic examination of 75 articles dealing with software piracy. The examination reveals that a considerable number of parameters have received little or no attention from software-piracy researchers. In addition to suggesting research opportunities, the framework furnishes a systematic approach for structuring the design of future research studies in the realm of software piracy. The insights furnished by this article contribute to future investigations of the software-piracy phenomenon that are needed to avert the economic and social damage caused by software piracy.