Please use this identifier to cite or link to this item:
|Title:||An Exploratory Study of Determinants and Corrective Measures for Software Piracy and Counterfeiting in the Digital Age||Authors:||Theng, Yin-Leng
Tan, Wee Teck
Lwin, May Oo
|Issue Date:||2010||Source:||Theng, Y.-L., Tan, W. T., Lwin, M. O., & Foo, S. S.-B. (2010). An Exploratory Study of Determinants and Corrective Measures for Software Piracy and Counterfeiting in the Digital Age. Computer and Information Science, 3(3), 30-49.||Series/Report no.:||Computer and Information Science||Abstract:||Software piracy and counterfeiting is a global problem that has resulted in huge economic losses worldwide. This paper proposes a theory-based approach to study the key factors contributing to piracy and counterfeiting issues. We first developed a theoretical model linking the antecedents into the key factors using information acquired from an extended literature review. We then undertook a survey of thirty business professionals representing different industries, functional roles and different levels of work exposure to software usages in Singapore to investigate the issues. Specifically, the objectives of the survey were to: (1) investigate the key issues associated to software piracy and counterfeiting; (2) identify the factors that have contributed to the software piracy and counterfeiting; and (3) draw up a refined list of appropriate measures to counter software piracy and counterfeiting. Through the structural use of Non-Parametric Correlation Test, Chi-Square Test for Independence, Fisher Exact Probability Test and Phi value, our findings showed that the lack of awareness to software usage laws and regulations, the perceived lack of enforcement measures and penalties, and the lack of educational programs catering to the proper usage of software were the key factors contributing to the software piracy and counterfeiting issues. The findings are useful to managers of software companies and policy-makers in reviewing existing software protection policies, laws and regulations, such that any flaws or loopholes can be identified.||URI:||https://hdl.handle.net/10356/80778
|DOI:||10.5539/cis.v3n3p30||Rights:||© 2010 Canadian Center of Science and Education. This paper was published in Computer and Information Science and is made available as an electronic reprint (preprint) with permission of Canadian Center of Science and Education. The published version is available at: [http://dx.doi.org/10.5539/cis.v3n3p30]. One print or electronic copy may be made for personal use only. Systematic or multiple reproduction, distribution to multiple locations via electronic or other means, duplication of any material in this paper for a fee or for commercial purposes, or modification of the content of the paper is prohibited and is subject to penalties under law.||Fulltext Permission:||open||Fulltext Availability:||With Fulltext|
|Appears in Collections:||WKWSCI Journal Articles|
Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.