skip to main content
article

Unauthorized copying of software: an empirical study of reasons for and against

Published:01 June 2007Publication History
Skip Abstract Section

Abstract

Computer users copy computer software - this is well-known. However, less well-known are the reasons why some computer users choose to make unauthorized copies of computer software. Furthermore, the relationship linking the theory and the practice is unknown, i.e., how the attitudes of ordinary end-users correspond with the theoretical views of computer ethics scholars. In order to fill this gap in the literature, we investigated the moral attitudes of 249 Finnish computing students towards the unauthorized copying of computer software, and we then asked how these results compared with the theoretical reasons offered by computer ethics scholars. The results shed a new light on students' moral attitudes with respect to the unauthorized copying of software. In particular, this new knowledge is useful for computer ethics teachers, and for organizations seeking to combat this practice.

References

  1. Ajzen, I., 1991. The theory of planned behavior. Organizational Behavior and Human Decision Processes, 50, 179--211.Google ScholarGoogle ScholarCross RefCross Ref
  2. Anderson, R. E., Johnson, D. G., Gotterbarn, D., Perrole, J., 1993. Using the New ACM code of ethics in Decision Making. Communications of the ACM, 36 (2), 98--107. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Baase, S., 1997. A Gift of Fire. Upper Saddle River, New Jersey: Prentice Hall.Google ScholarGoogle Scholar
  4. Bowyer, K. K., 2001. Ethics and Computing - Living Responsibility in a Computerized World. Los Alamitos, California: IEEE Computer Society Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Cheng Y., Png, I. P. L. 1999. Software pricing and copyright enforcement: private profit vis-à-vis social welfare. Proceeding of the 20th international conference on Information Systems, pp. 119--123. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Cheng, H. K., Sims, R. R., Teegen, H., 1997. To purchase or to pirate software: an empirical study. Journal of Management Information Systems, 13 (4), 49--51. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Collins, W. R., Miller, K. W., Spielman, B. J., Wherry, P., 1994. How Good Is Good Enough? Communications of ACM, 37 (1) 81--91. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Dancy, J., 1993. An ethic of prima facie duties in P. Singer, ed. A Companion to Ethics, Oxford: Basil Blackwell, 219--229.Google ScholarGoogle Scholar
  9. Fishbein, M., Ajzen, I., 1975. Belief, Attitude, Intention and Behavior: An Introduction to Theory and Research. Reading: Addison-Wesley.Google ScholarGoogle Scholar
  10. Forester, T., Morrison, P., 1993. Computer Ethics: Cautionary Tales and Ethical Dilemmas in computing, MIT Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Gattiker, U. E., Kelley, H., 1999. Morality and Computers: Attitudes and Differences in Moral Judgements. Information Systems Research, 10 (3) 233--254. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Gopal, R. D., Sanders, G. L., 1998. International Software Piracy: Analysis of Key Issues and Impacts. Information Systems Research, 9 (4) 380--395. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Gopal, R. D, Ram, D., Sanders, G. L., 1997. Preventive and Deterrent Controls for Software Piracy. Journal of Management Information Systems, 13 (4) 29--38. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Hare, R. M, 1981. Moral Thinking: its levels, methods and point. Oxford, UK: Clarendon Press.Google ScholarGoogle Scholar
  15. Hare, R. M., 1976. Value Education in a Pluralist Society: A Philosophical glance at the Humanities Curriculum Project. Proceedings of the Education Society of Great Britain.Google ScholarGoogle ScholarCross RefCross Ref
  16. Hare, R. M., 1975. Autonomy as an Educational Idea. In S. C. Brown, ed., Philosophers Discuss Education. London: Macmillan.Google ScholarGoogle Scholar
  17. Hare, R. M., 1963. Freedom and Reason, Oxford: Oxford University Press.Google ScholarGoogle Scholar
  18. Johnson, D. G., 2000. Computer Ethics. Upper Saddle River, New Jersey: Prentice Hall.Google ScholarGoogle Scholar
  19. Kallman, E., Grillo, J., 1993. Ethical Decision Making and Information Technology. New York: McGraw-Hill. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Kant, I., 1993. The Moral Law: Groundwork of the Metaphysic of Morals. London: Routledge.Google ScholarGoogle Scholar
  21. Kuflik, A., 1995. Moral Foundations of Intellectual Property Rights. In: D. G. Johnson, H. Nissenbaum, eds., Computers, Ethics & Social Values. New Jersey: Prentice Hall. 169--180.Google ScholarGoogle Scholar
  22. Lacity, M. C., Janson, M. A., 1994. Understanding Qualitatitve Data: A Framework of Text Analysis Methods. Journal of Management Information Systems, 11 (2) 137--155. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Ladd, J., 1997. Ethics and the Computer World: a New Challenge for Philosophers. Computers & Society, 27 (3) 8--13. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Langford, D., 1995. Practical Computer Ethics. Guildford, Surrey: McGraw-Hill. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Lending, D., Slaughter, S. A., 1999. Understanding differences in ethical beliefs and behaviors toward software copying: the effects of organization culture. Proceedings of the 1999 ACM SIGCPR conference on Computer personnel research. April 08--10, New Orleans, Louisiana. 253--260. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Limayem, M., Khalifa M., Wynne, W. C., 1999. Factors motivating software piracy: a longitudinal study. Proceeding of the 20th International Conference on Information Systems, Charlotte, North Carolina. 124--131. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Lisman, C. D., 1998. Ethics Education in Schools. Encyclopedia of Applied Ethics, Volume 2, San Diego: Academic Press.Google ScholarGoogle Scholar
  28. Lin, T. C, Hsu, M. H., Kuo, F. Y., Sun, P-C., 1999. An intention model-based study of software piracy. Proceedings of the 32nd Annual Hawaii International Conference on Systems Sciences. January 5--8, Maui, Hawaii. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Loch, K. D, Conger, S., 1996. Evaluating Ethical Decision-Making and Computer Use. Communications of the ACM, 39 (7) 74--83. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Mackie, J. L., 1981. Ethics, Inventing Right and Wrong. London: Penguin.Google ScholarGoogle Scholar
  31. Macklin, R., 1980. Problems in the Teaching of Ethics: Pluralism and Indoctrination. D., Callahan, S., Bok, eds., Ethics Teaching in Higher Education. New York: Plenum Press. 81--101.Google ScholarGoogle Scholar
  32. Malhotra, Y, 1994. Controlling Copyright infringements of intellectual property: the case of computer software. Journal of Systems Management, July.Google ScholarGoogle Scholar
  33. Mason, R. O., 1986. Four ethical issues of the information age. MIS Quarterly, 10 (1) 5--12.Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Moor, J. H., 1985. What is computer ethics? Metaphilosophy, 16, 266--275.Google ScholarGoogle ScholarCross RefCross Ref
  35. Moores, T., Dhillon, G., 2000. Software piracy: a view from Hong Kong. Communications of the ACM, 43 (12) 88--93. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. Nissenbaum, H., 1995. Should I copy my neighbours' software. In D. G. Johnson, H. Nissenbaum, eds, Computers, Ethics & Social Values. New Jersey: Prentice Hall.Google ScholarGoogle Scholar
  37. Pence, G., 1993. Virtue Theory In P. Singer, ed., A Companion to Ethics. Oxford, UK: Basil Blackwell. 249--258.Google ScholarGoogle Scholar
  38. Pettit, P., 1993. Consequentialism. In P. Singer, ed., A Companion to Ethics, Oxford, UK: Basil Blackwell. 230--240.Google ScholarGoogle Scholar
  39. Piaget, J., 1977. The Moral Judgment of the Child. Harmonsdsworth: Penguin.Google ScholarGoogle Scholar
  40. Randall, D. M., 1989. Taking stock: can the theory of reasoned action explain unethical conduct? Journal of Business Ethics, 8, 873--882.Google ScholarGoogle ScholarCross RefCross Ref
  41. Rawls, J., 1971. A Theory of Justice. London: Oxford University Press.Google ScholarGoogle Scholar
  42. Rest, J. R., 1994. Background: Theory and Research. In J. R. Rest, D. Narvaez, eds., Moral Development in the Professions: Psychology and Applied Ethics, Lawrence Erlbaum Associates, UK. 1--26.Google ScholarGoogle Scholar
  43. Ross, D., 1930. The Right and the Good. Oxford: Oxford University Press.Google ScholarGoogle Scholar
  44. Seale, D. A., Polakowski, M., Schneider, S., 1998. It's not really theft!: personal and workplace ethics that enable software piracy. Behaviour and Information Technology, 17 (1) 27--40.Google ScholarGoogle ScholarCross RefCross Ref
  45. Simpson, P. M., Banerjee, D., Simpson, C. L., 1994. Softlifting: A model of motivating factors. Journal of Business Ethics, 13 (3) 431--438.Google ScholarGoogle ScholarCross RefCross Ref
  46. Siponen, M. T., 2001. The Relevance of Software Rights: An Anthology of the Divergence of Sociopolitical Doctrines. AI & Society, 15 (1&2), 128--148. Google ScholarGoogle ScholarDigital LibraryDigital Library
  47. Stallman, R., 1995. Why software should be free. In: D. G. Johnson, H. Nissenbaum, eds., Computers, Ethics & Social Values. New Jersey: Prentice Hall.Google ScholarGoogle Scholar
  48. Stallman, R., 1997. The GNU Manifesto. In M. D. Ermann, M. B. Williams, M. S. Shauf, eds., Computers, Ethics and Society. Oxford: Oxford University Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  49. Strikweda, R. B., Ross, J. M., 1992. Software and Ethical Softness. Collegiate Microcomputer 3, 143--156. Google ScholarGoogle ScholarDigital LibraryDigital Library
  50. Sumner, M., Werner, K., 1997. On-line ethics: a comparison of the attitudes of freshmen, MIS majors, and practitioners. Proceedings of the 1997 Conference on Computer Personnel Research, San Francisco, California, April 3--5. 1--8. Google ScholarGoogle ScholarDigital LibraryDigital Library
  51. Takeyama, L. N., 2002. Piracy, Asymmetric Information, and Product Quality revelation. http://www.serci.org/, 24th October 2002, Society of Economic Research on Copyright Issues.Google ScholarGoogle Scholar
  52. Thong, J. Y. L., Yap, C-S., 1998. Testing an ethical decision-making theory: The case of softlifting. Journal of Management Information Systems, 15 (1) 213--237. Google ScholarGoogle ScholarDigital LibraryDigital Library
  53. Traphagan, M., Griffith, A., 1998. Software Piracy and Global Competitiveness: Report on Global Software Piracy. International Review of Law, Computers & Technology, 12 (3) 431--451.Google ScholarGoogle ScholarCross RefCross Ref
  54. Warnock, M., 1975. The Neutral Teacher. In M. Taylor, ed., Progress & problems in moral education, Windsor: NFER Publishing Company.Google ScholarGoogle Scholar
  55. Weckert, J., 1997. Intellectual Property Rights and Computer Software. Journal of Business Ethics. 6 (2) 101--109.Google ScholarGoogle ScholarCross RefCross Ref
  56. Weckert, J., Adeney, D., 1997. Computer and Information Ethics. Westport, Connecticut: Greenwood Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  57. Weisband, S. P., Goodman, S. E., 1992. International software piracy. IEEE Computer, 25 (11) 87--90.Google ScholarGoogle ScholarDigital LibraryDigital Library
  58. Vitell, S. J., Davis, D. L., 1990. Ethical beliefs of MIS professionals: The frequency and opportunity for unethical behaviour. Journal of Business Ethics, 9 (1) 63--70.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Unauthorized copying of software: an empirical study of reasons for and against

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader