The Profiles of Software Pirates among Tertiary Institutions in Singapore
AbstractThe study seeks to examine the perception of software piracy as well as to discover its underlying factors among Singapore’s three university communities. Some five hundred responses were gathered from students and staff. By means of cluster analysis and factor analysis, the results identify three clusters of pirate profiles as influenced by factors such as attitudes towards software publishers, general acceptance, convenience, and ethics. The decision tree method links each pirate profile to demographic and computer-related variables. It shows that while age is negatively related to software piracy, computer experience and computer usage demonstrates an ambiguous relationship to software piracy respectively. Further, the undergraduate students tend to be pirates more often than university employees, and the Malays tend to be less frequent pirates as compared to other races. It is hoped that the study will help the relevant policy makers to develop better strategies to protect and to enforce the intellectual property rights among the universities as well as in an increasingly knowledge-based economy such as Singapore.
Download InfoIf you experience problems downloading a file, check if you have the proper application to view it first. In case of further problems read the IDEAS help page. Note that these files are not on the IDEAS site. Please be patient as the files may be large.
Bibliographic InfoPaper provided by Nanyang Technolgical University, School of Humanities and Social Sciences, Economic Growth centre in its series Economic Growth centre Working Paper Series with number 0508.
Length: 35 pages
Date of creation: Aug 2005
Date of revision:
Software Piracy; Software Policy; Protection and Enforcement of Intellectual Property Rights; Cluster Analysis; Factor Analysis.;
Find related papers by JEL classification:
- O34 - Economic Development, Technological Change, and Growth - - Technological Change; Research and Development; Intellectual Property Rights - - - Intellectual Property Rights
- K42 - Law and Economics - - Legal Procedure, the Legal System, and Illegal Behavior - - - Illegal Behavior and the Enforcement of Law
Please report citation or reference errors to , or , if you are the registered author of the cited work, log in to your RePEc Author Service profile, click on "citations" and make appropriate adjustments.:
- Hosmer, LaRue Tone, 1988. "Adding ethics to the business curriculum," Business Horizons, Elsevier, vol. 31(4), pages 9-15.
- Besen, Stanley M., 1986. "Private copying, reproduction costs, and the supply of intellectual property," Information Economics and Policy, Elsevier, vol. 2(1), pages 5-22.
- Takeyama, Lisa N, 1994. "The Welfare Implications of Unauthorized Reproduction of Intellectual Property in the Presence of Demand Network Externalities," Journal of Industrial Economics, Wiley Blackwell, vol. 42(2), pages 155-66, June.
- Katz, Michael L & Shapiro, Carl, 1986. "Technology Adoption in the Presence of Network Externalities," Journal of Political Economy, University of Chicago Press, vol. 94(4), pages 822-41, August.
- Fernando Nascimento & Wilfried R. Vanhonacker, 1988. "Optimal Strategic Pricing of Reproducible Consumer Products," Management Science, INFORMS, vol. 34(8), pages 921-937, August.
- Joseph Farrell & Garth Saloner, 1985.
"Installed Base and Compatibility With Implications for Product Preannouncements,"
385, Massachusetts Institute of Technology (MIT), Department of Economics.
- Joseph Farrell & Garth Saloner, 1986. "Installed Base and Compatibility, With Implications for Product Preannouncements," Working papers 411, Massachusetts Institute of Technology (MIT), Department of Economics.
- King, Stephen P. & Lampe, Ryan, 2003. "Network externalities, price discrimination and profitable piracy," Information Economics and Policy, Elsevier, vol. 15(3), pages 271-290, September.
- Liebowitz, S J, 1985. "Copying and Indirect Appropriability: Photocopying of Journals," Journal of Political Economy, University of Chicago Press, vol. 93(5), pages 945-57, October.
- Banerjee, Dyuti S., 2003. "Software piracy: a strategic analysis and policy instruments," International Journal of Industrial Organization, Elsevier, vol. 21(1), pages 97-127, January.
- Kathleen Reavis Conner & Richard P. Rumelt, 1991. "Software Piracy: An Analysis of Protection Strategies," Management Science, INFORMS, vol. 37(2), pages 125-139, February.
- Novos, Ian E & Waldman, Michael, 1984. "The Effects of Increased Copyright Protection: An Analytic Approach," Journal of Political Economy, University of Chicago Press, vol. 92(2), pages 236-46, April.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: (Magdalene Lim).
If references are entirely missing, you can add them using this form.