Access the full text.
Sign up today, get DeepDyve free for 14 days.
S. Kowalski, H. Kowalski (1990)
Computer ethics and computer abuse: a study of Swedish and Canadian university data processing studentsInformation Age archive, 12
J. Im, C. Koen (1990)
Software piracy and responsibilities of educational institutionsInf. Manag., 18
Sue Williams, S. Ogletree, W. Woodburn, P. Raffeld (1993)
Gender roles, computer attitudes, and dyadic computer interaction performance in college studentsSex Roles, 29
W. Zikmund (1984)
Business Research Methods
Ken Wong (1985)
Computer crime - Risk management and computer securityComput. Secur., 4
Moshe Givon, V. Mahajan, E. Muller (1995)
Software Piracy: Estimation of Lost Sales and the Impact on Software DiffusionJournal of Marketing, 59
E. Oz (1998)
Acceptable protection of software intellectual property: a survey of software developers and lawyersInf. Manag., 34
James Davis, R. Welton (1991)
Professional ethics: Business students' perceptionsJournal of Business Ethics, 10
G. Wong, A. Kong, S. Ngai (1990)
A Study of Unauthorised Software Copying Among Post-Secondary Students in Hong KongAust. Comput. J., 22
K. Loch, Sue Conger (1996)
Evaluating ethical decision making and computer useCommun. ACM, 39
C. Moser, G. Kalton (1958)
Survey Methods in Social Investigation
P. Simpson, Debasish Banerjee, C. Simpson (1994)
Softlifting: A model of motivating factorsJournal of Business Ethics, 13
J. Im, Pamela Epps (1992)
Software piracy and software security measures in business schoolsInf. Manag., 23
R. Sims, H. Cheng, Hildy Teegen (1996)
Toward a profile of student software piratersJournal of Business Ethics, 15
G. Taylor, Jung Shim (1993)
A Comparative Examination of Attitudes Toward Software Piracy Among Business Professors and ExecutivesHuman Relations, 46
This article reports the results of a survey in Brunei Darussalam concerning the use of pirated software among academics. Though, the suspicion of academics using pirated software has long been circulating around in East and South East Asia, no "hard data" has ever been collected. This article confirms the suspicion, and provides new information on the use of pirated software outside the USA. Also reveals the type of tasks accomplished by academics with pirated software, and identifies the reasons for using such software. Moreover, relates academics' use of pirated software with nine factors related to demographics, computer exposure, and job profile of academics. The findings are discussed, and are compared with some related findings reported elsewhere. Finally, concludes with some suggestions to curb piracy, and identifies areas of further research.
Information Management & Computer Security – Emerald Publishing
Published: Mar 1, 2000
Keywords: Theft; Academic staff
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.