Parameters for software piracy research

Clyde W. Holsapple, Deepak Iyengar, Haihao Jin, Shashank Rao

Research output: Contribution to book or proceedingChapterpeer-review

Abstract

Advances in Internet and other digital technologies have opened up new channels and methods for online business. They have also led to a situation where the same channels can be abused and misused. One of these forms of technology abuse, which is becoming increasingly prevalent these days, is the piracy of digital content. This article introduces a relatively comprehensive and unified theoretical framework for studying and understanding a major aspect of digital piracy: namely, software piracy. Based on Routine Activities Theory, Rational Choice Theory, and guardianship concepts, the framework identifies key parameters that can affect the incidence of software piracy. We apply the framework in conducting a systematic examination of 75 articles dealing with software piracy. The examination reveals that a considerable number of parameters have received little or no attention from software-piracy researchers. In addition to suggesting research opportunities, the framework furnishes a systematic approach for structuring the design of future research studies in the realm of software piracy. The insights furnished by this article contribute to future investigations of the software-piracy phenomenon that are needed to avert the economic and social damage caused by software piracy.

Original languageEnglish
Title of host publicationCrime Opportunity Theories
Subtitle of host publicationRoutine Activity, Rational Choice and their Variants
PublisherTaylor and Francis
Pages277-296
Number of pages20
ISBN (Electronic)9781351570701
ISBN (Print)9780754629702
StatePublished - Jul 5 2017

Keywords

  • Guardianship
  • Piracy parameters
  • Rational Choice Theory
  • Routine Activities Theory
  • Software
  • Software piracy
  • Theoretical framework

Fingerprint

Dive into the research topics of 'Parameters for software piracy research'. Together they form a unique fingerprint.

Cite this