Analysis of Key Dynamics of Software Piracy in Sub-Saharan Africa

Mboungou Mouyabi Seke*
*University of the Witwatersrand, Johannesburg, South Africa.
Periodicity:September - November'2018
DOI : https://doi.org/10.26634/jit.7.4.15071

Abstract

Since Africa faces a growing pressure of Information and Communication Technology (ICT) adoption in the light of commercial investments, one of the predicaments the continent still struggles with is a lucrative "business" that has caught the attention of organized crime groups in a number of countries. This profitable business called software piracy is by definition one of the most common types of computer crimes. Its exact impact is hard to quantify, but there is no doubt that this trend has been increasing everywhere in the world. However, Africa is the continent that counts several developing countries that are not presently operating service economies; consequently, there is no shame concomitant with downloading, purchasing, or selling pirated software products. Thus far, there are many reasons provided by various knowledge bases to why software piracy happens; this paper, however discussed four causal factors of software piracy in the Sub-Saharan Africa. It emphasises on their dynamics identified to be crucial in encouraging this sordid behaviour in this particular sub-region of the globe. In addition, this paper argues the major issues surrounding this topic and suggests a way forward towards an anti-piracy continent.

Keywords

Software Piracy, Poverty, Moral Values, Social Attitudes, Education

How to Cite this Article?

Mouyabi seke, M.(2018). Analysis of Key dynamics of software piracy in Sub-Saharan Africa, i-manager's Journal on Information Technology, 7(4), 1-10 https://doi.org/10.26634/jit.7.4.15071

References

[1]. Alicar, A. (2010). Demographic factors affecting freshman students' towards software piracy: An empiral study. Issue of Informing Science and Information Technology, 7, 321-328.
[2]. Andrés, A. R. (2002). The European Software Piracy: An Empiral Application. University of Southern Denmark.
[3]. Andrés, A. R. (2006). The relationship between copyright software protection and privacy: Evidence from Europe. European Journal of Law and Economics, 21(1), 29-51.
[4]. Apple. (2016). Piracy Prevention. Retrieved from http://www.apple.com/legal/intellectual-property/piracy. html
[5]. BSA. (2010). Global Piracy Study 2010, Seventh Annual BSA/IDC Global Software Piracy Study. Washington, DC: Business Software Alliance.
[6]. Chen, C-C., Chen, C-P., & Yeh, C-Y. (2010). Determinants of software piracy: Evidence from Far East countries. Journal of International and Global Economic Studies, 3(2), 53-62.
[7]. Cheng, H. K., Sims, R. R., & Teegen, H. (1997). To purchase or to private software: An empirical study. Journal of Management Information System, 13(4), 49- 60.
[8]. Glass, R., & Wood, W. (1996). Situational determinants of software piracy: An equity theory perspective. Journal of Business Ethics, 15(11), 1189-1198.
[9]. Gopal, R., & Sanders, G. (1998). International software piracy: Analysis of key issues and impacts. Information Systems Research, 9(4), 380-395.
[10]. Gopal, R., & Sanders, G. (1997). Preventive and deterrent controls for software piracy. Journal of Management Information Systems, 13(4), 29-47.
[11]. Hinduja, S. (2003). Trends and patterns among online software piracy. Ethics and Information Technology, 5(1), 49-61.
[12]. Husted, B. W. (2000). The impact of national culture on software piracy. Journal of Business Ethics, 26(3), 197- 211.
[13]. Marron, D., & Steel, D. (2000). Which countries protect Intellectual Property? The case of Software Piracy. Economic Inquiry, 38(2), 159-174.
[14]. Microsoft. (2016). What is software piracy? Why should I be concerned about it? Retrieved from Microsoft Corporation Website: https://www.microsoft.com/ resources/ documentation/ windows/xp/all/ proddocs/en-us/ lic_what_is_piracy.mspx?mfr=true
[15]. Oz, E. (1990). The attitude of managers to be towards software piracy. OR/MS Today, 17(4), 24-26.
[16]. Sims, R., Cheng, H., & Teegen, H. (1996). Towards a profile of student software piraters. Journal of Business Ethics, 15(8), 839-849.
[17]. Stanford University. (2005-2016). Copyright and Fair use. Retrieved from Stanford University Librairies: http://fairuse.stanford.edu/law/us-code/u-s-copyright-act/ copyright-infringement-and-remedies/
[18]. Teston, G. (2008). Software Piracy among Technology Education: Investigating property right in the culture of innovation. Journal of Technology Education, 20(1), 66-78.
[19]. Thong, J., & Yap, C. S. (1998). Testing an Ethical Decision-Making Theory: The Case of Softlifting. Journal of Management Information Systems, 15(1), 213-237.
[20]. Wu, H. L., Hung, S. Y., & Chen, C. (2014). The Cognitions and Affects of Moral Attitude towards Software Piracy Intention. Retrieved from www.pacis-net. org/file/2014/1883.pdf
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Online 15 15

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.