Usage of Unauthorized Software in Taiwan

By Hsu, Jane Lu; Su, Ya-Lan | Social Behavior and Personality: an international journal, January 1, 2008 | Go to article overview

Usage of Unauthorized Software in Taiwan


Hsu, Jane Lu, Su, Ya-Lan, Social Behavior and Personality: an international journal


In this study usage of unauthorized software was examined in detail to reveal the methods by which users obtain pirated software, the quantities and varieties of pirated software in use, and the evaluations and intentions of repeat purchases. In general, computer users who are younger and have a limited budget are more likely to use pirated software. The most commonly used pirated software includes operation systems, office software, antivirus, and games/entertainment software. Consumers who prefer using unauthorized software would have obtained close to nine pirated software products in six months, and about two thirds of these types of users have intentions to obtain pirated software again.

Keywords: unauthorized software, piracy, consumer behavior, software usage.

Software piracy can be categorized into five types: end user piracy, client-server overuse, internet piracy, hard-disk loading, and software counterfeiting (Business Software Alliance). End user piracy refers to installation and distribution of unauthorized copies of software. Client-server overuse occurs when more users than allowed by the license use the software on a network simultaneously. Internet piracy includes the illegal downloading and transferring of copyrighted software. Hard-disk loading happens when new computers are sold with unauthorized software. Software counterfeiting is illegal duplication and sales of copyrighted software with the intention of imitating the originals. The general definition of software piracy is unauthorized duplication of commercially available software (Business Software Alliance). The usage of unauthorized software affects not only the revenue of manufacturers, but also intentions of investing in research and development of new products (Bloch, Bush, & Campbell, 1993; McDonald & Roberts, 1994; Prendergast, Chuen, & Phau, 2002).

Users of unauthorized products often lack concepts of respect for intellectual properties and purchase pirated products because of cheaper prices ( Albers-Miller, 1999). Im and Van Epps (1992) studied software usage in business schools in the US and found that illegal copying of authorized software was common. Wagner and Sanders (2001) found that consumers who had positive attitudes toward pirated software had higher intentions to purchase pirated products.

Aryanto (2003) mentioned that intellectual property rights violation was proliferating in Far East countries. In Taiwan, the piracy level of business software was estimated to be 42%, and business software piracy caused US$ 77.5 million losses in 2005 (International Intellectual Property Alliance). Kuo and Hsu (2001) examined constructs measuring software piracy as to whether consumers used or distributed pirated software, or persuaded others to do so. Simmons (2004) surveyed college students in Australia, Hong Kong, Singapore, Taiwan, and the US, and concluded that cultural dimensions were influential in software piracy. Tang and Farn (2005) studied intention and behavior concerning software piracy using survey data collected in public universities in Taiwan. They concluded that interpersonal influence affected the intention of software piracy but not the behavior.

Actions taken by the government of Taiwan dealing with software piracy have included: (1) Continuing a sustained copyright enforcement campaign throughout 2005 against manufacturing, distribution, and retail sectors in producing, distributing, and selling pirated products; (2) Bringing more effective enforcement against internet piracy; (3) Adopting effective policies to ensure government-owned servers or computer facilities do not infringe copyrighted materials; (4) Continuing the effective enforcement against corporate end user piracy of business software and against software counterfeiting; and (5) Amending the copyright law to extend the term of protection of copyrighted materials (Intellectual International Property Alliance).

Based on the data published by Business Software Alliance or findings in the relevant literature, software piracy in Taiwan seemed to be an issue causing concerns for intellectual property protection. …

The rest of this article is only available to active members of Questia

Sign up now for a free, 1-day trial and receive full access to:

  • Questia's entire collection
  • Automatic bibliography creation
  • More helpful research tools like notes, citations, and highlights
  • Ad-free environment

Already a member? Log in now.

Notes for this article

Add a new note
If you are trying to select text to create highlights or citations, remember that you must now click or tap on the first word, and then click or tap on the last word.
One moment ...
Default project is now your active project.
Project items

Items saved from this article

This article has been saved
Highlights (0)
Some of your highlights are legacy items.

Highlights saved before July 30, 2012 will not be displayed on their respective source pages.

You can easily re-create the highlights by opening the book page or article, selecting the text, and clicking “Highlight.”

Citations (0)
Some of your citations are legacy items.

Any citation created before July 30, 2012 will labeled as a “Cited page.” New citations will be saved as cited passages, pages or articles.

We also added the ability to view new citations from your projects or the book or article where you created them.

Notes (0)
Bookmarks (0)

You have no saved items from this article

Project items include:
  • Saved book/article
  • Highlights
  • Quotes/citations
  • Notes
  • Bookmarks
Notes
Cite this article

Cited article

Style
Citations are available only to our active members.
Sign up now to cite pages or passages in MLA, APA and Chicago citation styles.

(Einhorn, 1992, p. 25)

(Einhorn 25)

1

1. Lois J. Einhorn, Abraham Lincoln, the Orator: Penetrating the Lincoln Legend (Westport, CT: Greenwood Press, 1992), 25, http://www.questia.com/read/27419298.

Cited article

Usage of Unauthorized Software in Taiwan
Settings

Settings

Typeface
Text size Smaller Larger Reset View mode
Search within

Search within this article

Look up

Look up a word

  • Dictionary
  • Thesaurus
Please submit a word or phrase above.
Print this page

Print this page

Why can't I print more than one page at a time?

Full screen

matching results for page

Cited passage

Style
Citations are available only to our active members.
Sign up now to cite pages or passages in MLA, APA and Chicago citation styles.

"Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences." (Einhorn, 1992, p. 25).

"Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences." (Einhorn 25)

"Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences."1

1. Lois J. Einhorn, Abraham Lincoln, the Orator: Penetrating the Lincoln Legend (Westport, CT: Greenwood Press, 1992), 25, http://www.questia.com/read/27419298.

Cited passage

Thanks for trying Questia!

Please continue trying out our research tools, but please note, full functionality is available only to our active members.

Your work will be lost once you leave this Web page.

For full access in an ad-free environment, sign up now for a FREE, 1-day trial.

Already a member? Log in now.