Investigating the Determinants of Business Software Piracy: A Longitudinal Study of European Countries

2010 ◽  
Vol 3 (3) ◽  
pp. 195-202 ◽  
Author(s):  
Mahmut Sonmez ◽  
Deli Yang ◽  
Antonio R. Andres
2021 ◽  
Author(s):  
Tibor Zingora ◽  
Sylvie Graf ◽  
Martina Hrebickova ◽  
Jaroslav Tocik ◽  
David Lacko ◽  
...  

In the COVID-19 pandemic, it is vital to identify factors increasing behaviors that limit the transmission of COVID-19 (i.e., anti-COVID-19 behavior) and factors protecting against the negative consequences of the pandemic on societies (i.e., prejudice). A simultaneous investigation of a change in anti-COVID behavior and prejudice during the pandemic is essential because some factors (e.g., fear of COVID-19) could increase both outcomes, whilst other factors (e.g., norms in anti-COVID behavior or intergroup contact in prejudice) could bring desirable changes in one outcome without negatively affecting the other. In a three-wave longitudinal study (NT1 = 4275) in five European countries from April to October 2020, we employed a latent change score model to distinguish between intra- and inter-individual changes in anti-COVID-19 behavior and prejudice. On the intra-individual level, anti-COVID-19 behavior was increased by anti-COVID-19 norms; and prejudice against migrants from the Middle East was influenced by positive and negative direct and mass-media intergroup contact.


Author(s):  
Ramiz Salama ◽  
Ayman Okal ◽  
Krell Chiprausha

Recently, programming theft has been a serious issue for programming ventures and extremely huge costs were required to secure their applications. As per Business Software Alliance, the worldwide programming theft rate in 2013 was 43% and the business estimation of unlicensed programming establishments was $62.7 billion, which brought about a large loss in income and a number positions in programming organisations. This paper will exhibit that ‘programming robbery insurance framework’ is mostly used to secure the theft of the framework. Presently, a progressive number of clients download the product without having the consent of the product’s proprietor since the product has the item key which can be located/used by an obscure individual to utilise that product. Our methodology will utilise ‘Macintosh-based confirmation’ and create an item key, which checks or compares the item key against a unique MAC address on each machine. Keywords: Copyright protection, software piracy prevention, identification, authentication, intellectual property protection, diversity, tailored updates.


Author(s):  
Susan J. Harrington

Despite the existence of laws and much publicity surrounding software piracy, it is widely believed that software piracy is commonplace (Eining & Christensen, 1991; Simpson, Banerjee, & Simpson, 1994). A recent study (i.e., Business Software Alliance, 1999) confirms that software piracy is increasing, with a 2.5 percent increase in piracy in 1998 over 1997, resulting in $3.2 billion in losses to organizations in the United States and $11 billion worldwide. Yet reasons why such illegal behavior continues to occur are lacking. While some attempts have been made at AACSB-accredited schools of business to incorporate ethics education into business programs, there is no knowledge of such education’s relationship to actual behavior, nor is there knowledge on what exactly should be taught. Because previous educational, software-based safeguards, and attempts at raising awareness have failed to stop software piracy, some researchers (e.g., Simpson et al., 1994) believe that only when contributory factors are isolated can appropriate measures be taken to reduce software piracy. In addition, Watson and Pitt (1993) suggest that software piracy research lacks attention to individual factors, important for further understanding of the phenomenon.


2004 ◽  
Vol 51 (4) ◽  
pp. 414-425 ◽  
Author(s):  
M. Limayem ◽  
M. Khalifa ◽  
W.W. Chin

2016 ◽  
Vol 43 (5) ◽  
pp. 780-800 ◽  
Author(s):  
Antonio Rodríguez Andrés ◽  
Simplice Asongu

Purpose The purpose of this paper is to examine global trajectories, dynamics, and tendencies of software piracy to ease the benchmarking of current efforts toward harmonizing the standards and enforcements of intellectual property rights (henceforth IPRs) protection worldwide. Design/methodology/approach For that purpose, the authors estimate dynamic panel data models for 99 countries over the period 1994-2010. Findings The main finding suggest that, a genuine timeframe for standardizing IPRs laws in the fight against software piracy is most feasible within a horizon of 4.3-10.4 years. In other words, full (100 percent) convergence within the specified timeframe will mean the enforcements of IPRs regimes without distinction of nationality or locality within identified fundamental characteristics of software piracy. The absence of convergence (in absolute and conditional terms) for the World panel indicates that, blanket policies may not be effective unless they are contingent on the prevailing trajectories, dynamics and tendencies of software piracy. Policy implications and caveats are also discussed. Originality/value It is the first attempt to empirically assess the convergence of IPRs systems across countries.


2015 ◽  
Vol 93 (6) ◽  
pp. 369-379 ◽  
Author(s):  
Aaron Reeves ◽  
Sanjay Basu ◽  
Martin McKee ◽  
Andreas Sandgren ◽  
David Stuckler ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document