The Profiles of Software Pirates among Tertiary Institutions in Singapore
The study seeks to examine the perception of software piracy as well as to discover its underlying factors among Singapore’s three university communities. Some five hundred responses were gathered from students and staff. By means of cluster analysis and factor analysis, the results identify three clusters of pirate profiles as influenced by factors such as attitudes towards software publishers, general acceptance, convenience, and ethics. The decision tree method links each pirate profile to demographic and computer-related variables. It shows that while age is negatively related to software piracy, computer experience and computer usage demonstrates an ambiguous relationship to software piracy respectively. Further, the undergraduate students tend to be pirates more often than university employees, and the Malays tend to be less frequent pirates as compared to other races. It is hoped that the study will help the relevant policy makers to develop better strategies to protect and to enforce the intellectual property rights among the universities as well as in an increasingly knowledge-based economy such as Singapore.
|Date of creation:||Aug 2005|
|Date of revision:|
|Contact details of provider:|| Postal: Nanyang Drive, Singapore 637332|
Fax: 6795 5797
Web page: http://egc.hss.ntu.edu.sg/
More information through EDIRC
Please report citation or reference errors to , or , if you are the registered author of the cited work, log in to your RePEc Author Service profile, click on "citations" and make appropriate adjustments.:
- Fernando Nascimento & Wilfried R. Vanhonacker, 1988. "Optimal Strategic Pricing of Reproducible Consumer Products," Management Science, INFORMS, vol. 34(8), pages 921-937, August.
- Banerjee, Dyuti S., 2003. "Software piracy: a strategic analysis and policy instruments," International Journal of Industrial Organization, Elsevier, vol. 21(1), pages 97-127, January.
- Kathleen Reavis Conner & Richard P. Rumelt, 1991. "Software Piracy: An Analysis of Protection Strategies," Management Science, INFORMS, vol. 37(2), pages 125-139, February.
- Joseph Farrell & Garth Saloner, 1986.
"Installed Base and Compatibility, With Implications for Product Preannouncements,"
411, Massachusetts Institute of Technology (MIT), Department of Economics.
- Joseph Farrell & Garth Saloner, 1985. "Installed Base and Compatibility With Implications for Product Preannouncements," Working papers 385, Massachusetts Institute of Technology (MIT), Department of Economics.
- Liebowitz, S J, 1985. "Copying and Indirect Appropriability: Photocopying of Journals," Journal of Political Economy, University of Chicago Press, vol. 93(5), pages 945-57, October.
- Takeyama, Lisa N, 1994. "The Welfare Implications of Unauthorized Reproduction of Intellectual Property in the Presence of Demand Network Externalities," Journal of Industrial Economics, Wiley Blackwell, vol. 42(2), pages 155-66, June.
- Katz, Michael L & Shapiro, Carl, 1986. "Technology Adoption in the Presence of Network Externalities," Journal of Political Economy, University of Chicago Press, vol. 94(4), pages 822-41, August.
- King, Stephen P. & Lampe, Ryan, 2003. "Network externalities, price discrimination and profitable piracy," Information Economics and Policy, Elsevier, vol. 15(3), pages 271-290, September.
- Besen, Stanley M., 1986. "Private copying, reproduction costs, and the supply of intellectual property," Information Economics and Policy, Elsevier, vol. 2(1), pages 5-22.
- Hosmer, LaRue Tone, 1988. "Adding ethics to the business curriculum," Business Horizons, Elsevier, vol. 31(4), pages 9-15.
- Novos, Ian E & Waldman, Michael, 1984. "The Effects of Increased Copyright Protection: An Analytic Approach," Journal of Political Economy, University of Chicago Press, vol. 92(2), pages 236-46, April.
When requesting a correction, please mention this item's handle: RePEc:nan:wpaper:0508. See general information about how to correct material in RePEc.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: (Magdalene Lim)
If references are entirely missing, you can add them using this form.