Hsu and Su (2008)

From Copyright EVIDENCE
Revision as of 12:48, 17 November 2016 by Guido Noto La Diega (talk | contribs) (Created page with "{{MainSource |Source={{Source |Name of Study=Hsu and Su (2008) |Author=Hsu, J. L.; Su, Y.-L.; |Title=Usage of unauthorized software in Taiwan |Year=2008 |Full Citation=Hsu, J....")
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Advertising Architectural Publishing of books, periodicals and other publishing Programming and broadcasting Computer programming Computer consultancy Creative, arts and entertainment Cultural education Libraries, archives, museums and other cultural activities

Film and motion pictures Sound recording and music publishing Photographic activities PR and communication Software publishing Video game publishing Specialised design Television programmes Translation and interpretation

1. Relationship between protection (subject matter/term/scope) and supply/economic development/growth/welfare 2. Relationship between creative process and protection - what motivates creators (e.g. attribution; control; remuneration; time allocation)? 3. Harmony of interest assumption between authors and publishers (creators and producers/investors) 4. Effects of protection on industry structure (e.g. oligopolies; competition; economics of superstars; business models; technology adoption) 5. Understanding consumption/use (e.g. determinants of unlawful behaviour; user-generated content; social media)

A. Nature and Scope of exclusive rights (hyperlinking/browsing; reproduction right) B. Exceptions (distinguish innovation and public policy purposes; open-ended/closed list; commercial/non-commercial distinction) C. Mass digitisation/orphan works (non-use; extended collective licensing) D. Licensing and Business models (collecting societies; meta data; exchanges/hubs; windowing; crossborder availability) E. Fair remuneration (levies; copyright contracts) F. Enforcement (quantifying infringement; criminal sanctions; intermediary liability; graduated response; litigation and court data; commercial/non-commercial distinction; education and awareness)

Source Details

Hsu and Su (2008)
Title: Usage of unauthorized software in Taiwan
Author(s): Hsu, J. L., Su, Y.-L.
Year: 2008
Citation: Hsu, J. L., & Su, Y. L. (2008). Usage of unauthorized software in Taiwan. Social Behavior and Personality: an international journal, 36(1), 1-8.
Link(s): Definitive , Open Access
Key Related Studies:
Discipline:
Linked by:
About the Data
Data Description: Questionnaires were designed based on the literature and discussions of professionals and practitioners. A trial survey was conducted prior to the formal survey, and the questionnaires were modified based on the suggestions of the professionals, practitioners, and respondents in the trial survey. The formal survey was conducted in the metropolitan area of Taipei, Taiwan, from March 29 to April 6, 2004.In order to include respondents of various age and educational levels, high school students, college students, and general consumers who were not currently enrolled as full-time students were surveyed.
Data Type: Primary and Secondary data
Secondary Data Sources:
Data Collection Methods:
Data Analysis Methods:
Industry(ies):
Country(ies):
Cross Country Study?: No
Comparative Study?: No
Literature review?: Yes
Government or policy study?: No
Time Period(s) of Collection:
  • 2004
Funder(s):
  • National Science Council, Taiwan

Abstract

In this study usage of unauthorized software was examined in detail to reveal the methods by which users obtain pirated software, the quantities and varieties of pirated software in use, and the evaluations and intentions of repeat purchases. In general, computer users who are younger and have a limited budget are more likely to use pirated software. The most commonly used pirated software includes operation systems, office software, antivirus, and games/entertainment software. Consumers who prefer using unauthorized software would have obtained close to nine pirated software products in six months, and about two thirds of these types of users have intentions to obtain pirated software again.

Main Results of the Study

  • The majority of respondents obtained pirated software from internet downloads and sharing with friends.
  • Fewer respondents actually purchased pirated software products. This result signaled an important point that if computer users had strong intentions to obtain unauthorized software, they would have access to it without paying for it.
  • The common belief that only students are heavy users of pirated software might need to be modified, since users with higher educational levels seemed to have higher tendencies of using pirated software.
  • For quantities of unauthorized software obtained in the previous six months, respondents in the cluster of preferred using pirated software had downloaded close to four software products from the internet, and had obtained 4.7 software products from friends on average. Respondents in the less preferred cluster had obtained significantly less pirated software in the last six months, 1.72 software products downloaded from the internet and 1.8 shared from friends on average.
  • Among the unauthorized software products, operation systems, office software, antivirus software, and games/entertainment were popular. For operation systems, the results of this study revealed that almost one in every two computer users had unauthorized operation systems in their computers.
  • Respondents who preferred using unauthorized software had about half of the total software products in use being unauthorized, while respondents who less preferred using pirated software still had more than a quarter of software products in use being illegal


Policy Implications as Stated By Author

The study has provided new insights into usage of unauthorized software products. Further research may apply latent class analysis (McCutcheon, 1987; Von Eye & Clogg, 1994) in examining dimensions affecting intentions concerning pirated software usage to reveal influential factors that are strategically important in administrating issues of software piracy.



Coverage of Study

Coverage of Fundamental Issues
Issue Included within Study
Relationship between protection (subject matter/term/scope) and supply/economic development/growth/welfare
Relationship between creative process and protection - what motivates creators (e.g. attribution; control; remuneration; time allocation)?
Harmony of interest assumption between authors and publishers (creators and producers/investors)
Effects of protection on industry structure (e.g. oligopolies; competition; economics of superstars; business models; technology adoption)
Understanding consumption/use (e.g. determinants of unlawful behaviour; user-generated content; social media)
Green-tick.png
Coverage of Evidence Based Policies
Issue Included within Study
Nature and Scope of exclusive rights (hyperlinking/browsing; reproduction right)
Exceptions (distinguish innovation and public policy purposes; open-ended/closed list; commercial/non-commercial distinction)
Mass digitisation/orphan works (non-use; extended collective licensing)
Licensing and Business models (collecting societies; meta data; exchanges/hubs; windowing; crossborder availability)
Fair remuneration (levies; copyright contracts)
Enforcement (quantifying infringement; criminal sanctions; intermediary liability; graduated response; litigation and court data; commercial/non-commercial distinction; education and awareness)
Green-tick.png

Datasets

Sample size: 214
Level of aggregation: High school students
Period of material under study: 2004


Sample size: 211
Level of aggregation: College students
Period of material under study: 2014


Sample size: 205
Level of aggregation: Individual
Period of material under study: 2014