[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
article
Free access

Global software piracy: you can't get blood out of a turnip

Published: 01 September 2000 Publication History
First page of PDF

References

[1]
Broadside fired at Mexican software piracy. San Jose Mercury News. 0uly 2, 1998); www.sjmercury.com/business/center/mexpirO70598.htm.
[2]
Dewan, S. and Kraemer, K.L. International dimensions of the productivity paradox. Commun. ACM 4i, 8 (Aug. 1998), 56-62.
[3]
Distribution of Worldwide Software Revenues Vary Dramatically. International Data Corp. press release. Feb. 10, 1999; www.idcresearch.com/Press/default.htm.
[4]
Gopal R.D. and Sanders, G.L. An examination of preventive and deterrent controls for software piracy. J. Manage. Info. Syst. 13, 4 (Spr. 1997), 29-47.
[5]
Gopal R.D. and Sanders, G.L. International software piracy: Analysis of key issues and impacts. Info. Syst. Research 9, 4 (Dec. 1998), 380-397.
[6]
Meurer, M.J. Price discrimination, personal use and piracy: Copyright protection of digital works. Buffalo Law Rev. 45, 3 (Fall 1997), 845-898.
[7]
Shapiro, C., and Varian, H.R. Information Rules. Harvard Business School Press, Boston, MA, 1999.
[8]
Software pirates pile up profits in afflicted Asia. Christian Sci. Monitor (Dec 29, 1997).
[9]
The politics of piracy. The Economist (Feb. 20, 1999).
[10]
SPA's Report on Global Software Piracy. Software Publishers Association 1998; www.spa.org/piracy/98report.htm.
[11]
Varian, H.R. Microeconomic Analysis, 3rd Edition. W. W. Norton, New York, NY, 1992.
[12]
Worldwide Package Software Market Grew 13.6 Percent in 1998. International Data Corp. press release 0an. 12, 1999); www.idcresearch.com/ Press/default.htm.

Cited By

View all

Index Terms

  1. Global software piracy: you can't get blood out of a turnip

      Recommendations

      Reviews

      Gregory M. Aharonian

      Software lends itself very easily to piracy, especially in the Internet era, costing software manufacturers billions of dollars per year. Three issues nicely reported on by the authors are the amount of piracy that actually takes place, how much local income levels affect piracy, and how companies can differentially price their products to discourage piracy. The Software Publishers Association and Business Software Alliance routinely report that software piracy losses total over 10 billion dollars per year in an industry with sales of 140 billion dollars. But as the Software Information Industry Association reports, about half of that piracy occurs in North America and Western Europe, two regions where income levels are high enough that such levels of piracy are difficult to justify. It is apparent that software manufacturers need to address the problem in their home markets first. That said, about half of the piracy takes place in regions of the world where income levels are lower. As the authors report, there are correlations between per-capita gross national product (GNP) and piracy rates around the world. It is difficult to fight such piracy by relying solely on global intellectual property mechanisms, since enforcement is difficult for such governments, even those willing to deal with it. A more effective way to fight piracy is to set local pricing closer to the consumer's willing-to-pay price. Many companies price their products with the US markets in mind, even though US incomes are orders higher than those of most other countries, inviting piracy. The authors suggest, as one solution, that software manufacturers adopt price discrimination policies— for example, that they index the price of software to the per-capita GNP in countries where they sell their software. As consumers in these countries buy software to increase productivity, productivity then rises, GNPs rise, and the manufacturers can raise their prices accordingly. They would have to take steps to prevent gray market sales (buying software at a legitimately low price in one country, and importing it for resale into another market where the prices are higher), but overall, such changes would discourage piracy and increase profits, serving the best interests of all. Software manufacturers might well want to consider the observations and proposals contained in this article.

      Access critical reviews of Computing literature here

      Become a reviewer for Computing Reviews.

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image Communications of the ACM
      Communications of the ACM  Volume 43, Issue 9
      Sept. 2000
      91 pages
      ISSN:0001-0782
      EISSN:1557-7317
      DOI:10.1145/348941
      Issue’s Table of Contents
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 01 September 2000
      Published in CACM Volume 43, Issue 9

      Permissions

      Request permissions for this article.

      Check for updates

      Qualifiers

      • Article

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)238
      • Downloads (Last 6 weeks)62
      Reflects downloads up to 11 Dec 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2020)Illegal Content Monitoring on Social PlatformsProduction and Operations Management10.1111/poms.1319729:8(1837-1857)Online publication date: 1-Aug-2020
      • (2019)Software Piracy: Factors and Profiling2019 2nd International Conference on Applied Information Technology and Innovation (ICAITI)10.1109/ICAITI48442.2019.8982130(213-219)Online publication date: Sep-2019
      • (2019)CopyrightEncyclopedia of Law and Economics10.1007/978-1-4614-7753-2_122(382-388)Online publication date: 12-Apr-2019
      • (2018)Managing Business Ethics in a Global EnvironmentGeopolitics and Strategic Management in the Global Economy10.4018/978-1-5225-2673-5.ch008(137-169)Online publication date: 2018
      • (2018)Examining Security and Privacy Research in Developing RegionsProceedings of the 1st ACM SIGCAS Conference on Computing and Sustainable Societies10.1145/3209811.3209818(1-14)Online publication date: 20-Jun-2018
      • (2018)Investigating the impact of young consumers’ religiosity on digital piracyInternational Journal of Consumer Studies10.1111/ijcs.1244342:6(792-803)Online publication date: 28-Nov-2018
      • (2018)Digital Piracy: Factors that Influence the Intention to Pirate – A Structural Equation Model ApproachInternational Journal of Human–Computer Interaction10.1080/10447318.2018.1507783(1-15)Online publication date: 5-Sep-2018
      • (2017)Gender and young consumer ethics: an examination in two Southeast Asian countriesYoung Consumers10.1108/YC-10-2016-0064118:1(94-114)Online publication date: 18-Apr-2017
      • (2017)Reducing shoplifting by investment in securityJournal of the Operational Research Society10.1057/jors.2013.3765:5(685-693)Online publication date: 21-Dec-2017
      • (2017)Determinants of software piracy under risk aversion: a model with empirical evidenceEuropean Journal of Information Systems10.1057/ejis.2014.1424:5(519-530)Online publication date: 19-Dec-2017
      • Show More Cited By

      View Options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Magazine Site

      View this article on the magazine site (external)

      Magazine Site

      Login options

      Full Access

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media