SOCIALIZATION AND SOFTWARE PIRACY: A STUDY

被引:0
|
作者
Moores, Trevor T. [1 ]
Esichaikul, Vatcharaporn [2 ]
机构
[1] ESSEC Business Sch, F-95021 Cergy Pontoise, France
[2] Asian Inst Technol, Klongluang 12120, Pathumthani, Thailand
关键词
Cognitive developmental approach; Gender socialization theory; Intellectual property rights; Occupational socialization theory; Software piracy; ETHICAL DECISION-MAKING; DIGITAL PIRACY; ISSUES; MODEL;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We examine the role of age, gender, and work experience on the propensity to buy, share, and use pirated software. These demographics are key properties of the cognitive-developmental, gender socialization, and occupational socialization theories. We find the overall level of reported buying is low, while the level of sharing and use is high. From the perspective of socialization, we find differences in levels of buying based on gender, differences in levels of sharing based on age and gender, and differences in levels of use based on years of work experience. This suggests the source of pirated software has shifted from buying to a diffusion network that involves sharing within certain social groups. The higher rate of use for those with more years of work experience reinforces a continual problem for software vendors: The inability of customers to pay for software that is deemed necessary to conduct business.
引用
收藏
页码:1 / 9
页数:9
相关论文
共 50 条
  • [21] PREVENTING SOFTWARE PIRACY
    MOOERS, CN
    COMPUTER, 1977, 10 (03) : 29 - 30
  • [22] PREVENTING SOFTWARE PIRACY
    SCHMITT, S
    POPULAR COMPUTING, 1982, 1 (10): : 14 - 14
  • [23] A Preliminary Study of Personality Traits and their Influence on Software Piracy
    Ming, Tan Ming
    Jabar, Marzanah A.
    Wei, Koh Tieng
    Sidi, Fatimah
    2015 9TH MALAYSIAN SOFTWARE ENGINEERING CONFERENCE (MYSEC2015), 2015, : 252 - 258
  • [24] IS SOFTWARE PIRACY JUSTIFIED
    IMMEL, AR
    POPULAR COMPUTING, 1983, 2 (09): : 48 - &
  • [25] To Blow or not to Blow: An Experimental Study on the Intention to Whistleblow on Software Piracy
    Oh, Lih-Bin
    Teo, Hock-Hai
    JOURNAL OF ORGANIZATIONAL COMPUTING AND ELECTRONIC COMMERCE, 2010, 20 (04) : 347 - 369
  • [26] THE REAL COST OF SOFTWARE PIRACY
    COOPER, C
    INFORMATION AGE, 1984, 6 (02): : 98 - 102
  • [27] On the Reliability of Software Piracy Statistics
    Png, Ivan P. L.
    43RD HAWAII INTERNATIONAL CONFERENCE ON SYSTEMS SCIENCES VOLS 1-5 (HICSS 2010), 2010, : 3631 - 3639
  • [28] An empirical study of software piracy among tertiary institutions in Singapore
    Gan, Lydia L.
    Koh, Hian Chye
    INFORMATION & MANAGEMENT, 2006, 43 (05) : 640 - 649
  • [29] Social influence on software piracy
    Fernandez-Marquez, Carlos M.
    Vazquez, Francisco J.
    Watt, Richard
    MANAGERIAL AND DECISION ECONOMICS, 2020, 41 (07) : 1211 - 1224
  • [30] Deindividuation and Internet software piracy
    Hinduja, Sameer
    CYBERPSYCHOLOGY & BEHAVIOR, 2008, 11 (04): : 391 - 398