Hsu and Su (2008)
|Hsu and Su (2008)|
|Title:||Usage of unauthorized software in Taiwan|
|Author(s):||Hsu, J. L., Su, Y.-L.|
|Citation:||Hsu, J. L., & Su, Y. L. (2008). Usage of unauthorized software in Taiwan. Social Behavior and Personality: an international journal, 36(1), 1-8.|
|Link(s):||Definitive , Open Access|
|Key Related Studies:|
|About the Data|
|Data Description:||Questionnaires were designed based on the literature and discussions of professionals and practitioners. A trial survey was conducted prior to the formal survey, and the questionnaires were modified based on the suggestions of the professionals, practitioners, and respondents in the trial survey. The formal survey was conducted in the metropolitan area of Taipei, Taiwan, from March 29 to April 6, 2004.In order to include respondents of various age and educational levels, high school students, college students, and general consumers who were not currently enrolled as full-time students were surveyed.|
|Data Type:||Primary and Secondary data|
|Secondary Data Sources:|
|Data Collection Methods:|
|Data Analysis Methods:|
|Cross Country Study?:||No|
|Government or policy study?:||No|
|Time Period(s) of Collection:||
In this study usage of unauthorized software was examined in detail to reveal the methods by which users obtain pirated software, the quantities and varieties of pirated software in use, and the evaluations and intentions of repeat purchases. In general, computer users who are younger and have a limited budget are more likely to use pirated software. The most commonly used pirated software includes operation systems, office software, antivirus, and games/entertainment software. Consumers who prefer using unauthorized software would have obtained close to nine pirated software products in six months, and about two thirds of these types of users have intentions to obtain pirated software again.
Main Results of the Study
- The majority of respondents obtained pirated software from internet downloads and sharing with friends.
- Fewer respondents actually purchased pirated software products. This result signaled an important point that if computer users had strong intentions to obtain unauthorized software, they would have access to it without paying for it.
- The common belief that only students are heavy users of pirated software might need to be modified, since users with higher educational levels seemed to have higher tendencies of using pirated software.
- For quantities of unauthorized software obtained in the previous six months, respondents in the cluster of preferred using pirated software had downloaded close to four software products from the internet, and had obtained 4.7 software products from friends on average. Respondents in the less preferred cluster had obtained significantly less pirated software in the last six months, 1.72 software products downloaded from the internet and 1.8 shared from friends on average.
- Among the unauthorized software products, operation systems, office software, antivirus software, and games/entertainment were popular. For operation systems, the results of this study revealed that almost one in every two computer users had unauthorized operation systems in their computers.
- Respondents who preferred using unauthorized software had about half of the total software products in use being unauthorized, while respondents who less preferred using pirated software still had more than a quarter of software products in use being illegal
Policy Implications as Stated By Author
The study has provided new insights into usage of unauthorized software products. Further research may apply latent class analysis (McCutcheon, 1987; Von Eye & Clogg, 1994) in examining dimensions affecting intentions concerning pirated software usage to reveal influential factors that are strategically important in administrating issues of software piracy.
Coverage of Study
|Level of aggregation:||High school students|
|Period of material under study:||2004|
|Level of aggregation:||College students|
|Period of material under study:||2014|
|Level of aggregation:||Individual|
|Period of material under study:||2014|