Advanced Search
MyIDEAS: Login to save this paper or follow this series

The Profiles of Software Pirates among Tertiary Institutions in Singapore

Contents:

Author Info

  • Lydia L. Gan

    (Division of Economics, School of Humanities and Social Sciences, Nanyang Technological University, Singapore)

  • Hian Chye Koh

    (Division of Marketing & International Business, Nanyang Business School, Nanyang Technological University, Singapore)

Registered author(s):

    Abstract

    The study seeks to examine the perception of software piracy as well as to discover its underlying factors among Singapore’s three university communities. Some five hundred responses were gathered from students and staff. By means of cluster analysis and factor analysis, the results identify three clusters of pirate profiles as influenced by factors such as attitudes towards software publishers, general acceptance, convenience, and ethics. The decision tree method links each pirate profile to demographic and computer-related variables. It shows that while age is negatively related to software piracy, computer experience and computer usage demonstrates an ambiguous relationship to software piracy respectively. Further, the undergraduate students tend to be pirates more often than university employees, and the Malays tend to be less frequent pirates as compared to other races. It is hoped that the study will help the relevant policy makers to develop better strategies to protect and to enforce the intellectual property rights among the universities as well as in an increasingly knowledge-based economy such as Singapore.

    Download Info

    If you experience problems downloading a file, check if you have the proper application to view it first. In case of further problems read the IDEAS help page. Note that these files are not on the IDEAS site. Please be patient as the files may be large.
    File URL: http://www.ntu.edu.sg/hss2/egc/wp/2005/2005-08.pdf
    Download Restriction: no

    Bibliographic Info

    Paper provided by Nanyang Technolgical University, School of Humanities and Social Sciences, Economic Growth centre in its series Economic Growth centre Working Paper Series with number 0508.

    as in new window
    Length: 35 pages
    Date of creation: Aug 2005
    Date of revision:
    Handle: RePEc:nan:wpaper:0508

    Contact details of provider:
    Postal: Nanyang Avenue, Singapore 639798.
    Fax: 6794 2830
    Web page: http://egc.hss.ntu.edu.sg/
    More information through EDIRC

    Related research

    Keywords: Software Piracy; Software Policy; Protection and Enforcement of Intellectual Property Rights; Cluster Analysis; Factor Analysis.;

    Find related papers by JEL classification:

    References

    References listed on IDEAS
    Please report citation or reference errors to , or , if you are the registered author of the cited work, log in to your RePEc Author Service profile, click on "citations" and make appropriate adjustments.:
    as in new window
    1. King, Stephen P. & Lampe, Ryan, 2003. "Network externalities, price discrimination and profitable piracy," Information Economics and Policy, Elsevier, vol. 15(3), pages 271-290, September.
    2. Takeyama, Lisa N, 1994. "The Welfare Implications of Unauthorized Reproduction of Intellectual Property in the Presence of Demand Network Externalities," Journal of Industrial Economics, Wiley Blackwell, vol. 42(2), pages 155-66, June.
    3. Liebowitz, S J, 1985. "Copying and Indirect Appropriability: Photocopying of Journals," Journal of Political Economy, University of Chicago Press, vol. 93(5), pages 945-57, October.
    4. Joseph Farrell & Garth Saloner, 1985. "Installed Base and Compatibility With Implications for Product Preannouncements," Working papers 385, Massachusetts Institute of Technology (MIT), Department of Economics.
    5. Kathleen Reavis Conner & Richard P. Rumelt, 1991. "Software Piracy: An Analysis of Protection Strategies," Management Science, INFORMS, vol. 37(2), pages 125-139, February.
    6. Novos, Ian E & Waldman, Michael, 1984. "The Effects of Increased Copyright Protection: An Analytic Approach," Journal of Political Economy, University of Chicago Press, vol. 92(2), pages 236-46, April.
    7. Besen, Stanley M., 1986. "Private copying, reproduction costs, and the supply of intellectual property," Information Economics and Policy, Elsevier, vol. 2(1), pages 5-22.
    8. Hosmer, LaRue Tone, 1988. "Adding ethics to the business curriculum," Business Horizons, Elsevier, vol. 31(4), pages 9-15.
    9. Katz, Michael L & Shapiro, Carl, 1986. "Technology Adoption in the Presence of Network Externalities," Journal of Political Economy, University of Chicago Press, vol. 94(4), pages 822-41, August.
    10. Fernando Nascimento & Wilfried R. Vanhonacker, 1988. "Optimal Strategic Pricing of Reproducible Consumer Products," Management Science, INFORMS, vol. 34(8), pages 921-937, August.
    11. Banerjee, Dyuti S., 2003. "Software piracy: a strategic analysis and policy instruments," International Journal of Industrial Organization, Elsevier, vol. 21(1), pages 97-127, January.
    Full references (including those not matched with items on IDEAS)

    Citations

    Lists

    This item is not listed on Wikipedia, on a reading list or among the top items on IDEAS.

    Statistics

    Access and download statistics

    Corrections

    When requesting a correction, please mention this item's handle: RePEc:nan:wpaper:0508. See general information about how to correct material in RePEc.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: (Magdalene Lim).

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If references are entirely missing, you can add them using this form.

    If the full references list an item that is present in RePEc, but the system did not link to it, you can help with this form.

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your profile, as there may be some citations waiting for confirmation.

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.