DOI QR코드

DOI QR Code

An Empirical Study on Factors Affecting the University Students' Software Piracy Intention

대학생들의 S/W 불법복제 의도에 영향을 미치는 요인에 관한 연구

  • Published : 2009.04.30

Abstract

Recently, software piracy is one of the serious crimes for the digital materials. It makes economically devasting to the software industry and the market. In particular, it is a widespread phenomenon among university students in Korea and negative affects in measuring social and cultural level. Many studies have been focused on the users' intention of the software piracy for making anti-piracy policy. The purpose of this study is to investigate the factors affecting university students' software piracy intention. The survey includes responses from 271 university students in a school of business adminstration. The research model was estimated with multiple regression. The analysis showed results that user's characteristics, subjective norms, and perceived software quality were significantly related to intention of software piracy, but security policy was not. Perceived importance of intellectual property has negative impact on user's software piracy intention. Based on the findings, we suggest the implications for developing and implementing appropriate policies for anti-piracy.

오늘날 소프트웨어 불법복제는 디지털 저작물에 대한 심각한 범죄 중 하나로 소프트웨어 개발업체와 시장에 경제적인 측면에서 막대한 손실을 입히고 있다. 더욱이 대학생들 사이에 불법복제가 만연되어 있어 국내의 사회 문화적 윤리적 수준을 평가하는데 부정적 영향을 미치고 있다. 이에 따라 기존 여러 연구들에서 사용자의 복제의도에 영향을 미치는 요인들에 대해 평가함으로써 반복제 정책을 수립하는데 도움을 주고자 하였다. 본 연구의 목적은 국내 대학생들의 소프트웨어 불법복제 의도에 미치는 영향요인에 대해 평가하는데 있다. 이를 위해 경영학과 학부생 271명으로부터 설문 조사하였으며, 연구모형은 다중회귀분석을 통해 추정하였다. 실증분석 결과에 의하면 내 보안정책은 학생들에게 아무런 영향을 미치지 않았으나, 사용자 특성, 주관적 규범, 소프트웨어 품질은 복제의도에 긍정적인 영향을 미치며, 개인의 지적재산권에 관한 인지는 복제의도에 부정적 영향을 미치는 것으로 나타났다. 이러한 결과는 불법복제를 줄이기 위한 적절한 정책수립에 도움을 줄 것으로 판단된다.

Keywords

References

  1. 김광용, "윤리적 의사결정 관점의 소프트웨어 불볍 복제에 관한 연구.", 정보화정책,11(4) , pp ' 48-86 , 2004년 12월
  2. 배대헌, “특허 · 데이터베이스 등 가상공간상 지적재산권의 보호" 정보보호학회논문지 , 9(2) , pp33-44, 1999년 6월
  3. 오명신, 한승조, "소프트웨어 불법복제를 위한 보안칩", 정보보호학회논문지, 12(4) , pp , 87-98 ,2002년 8월
  4. 여상수, 윤훈기 , 검성권, "디지털 컨텐츠의 지적재산권 보호를 위한 익명 핑거프린팅의 연구", 동향정보보호학회논문지, 11(3) , pp , 131-141, 2001 년 6월
  5. 오장규, 김종기, "효과적인 정보보호 교육 및 훈련을 위한 프레임워크 개발" 정보보호학회지,13(2) ,pp , 59-69 , 2003년 4월
  6. 유영관, 이종무, "소프트웨어 품질 특성의 중요도에 관한 사용자의 인식도 조사 분석", 한국경 영과학회/대한산업공학회 춘계공동학술대회 pp277-279 , 2001 년 6월
  7. 장병윤, "인터넷상에서 온라인 컨텐츠의 지적재산권 보호에 관한 연구", 중재연구, 12(2) , pp ,373-418 , 2003 년 2윌
  8. 정보통신부,2007년 상반기 정보화실태조사,정보통신부, 2007년 8월
  9. 정상조, 지적재산권 강의, 홍문사, 1997 년 3월
  10. 최명길, 황원주, 김명수, "정보보호정책의 성숙도에 영향을 미치는 요인에 관한 연구", 정보보호학회논문지,18(3) , pp , 131-141 , 2008년 6월
  11. 채서일, 사회과학조사방법론, B&M, 2005년 2월
  12. 한국소프트웨어진흥원, 2004년도 S/W불법복제율 조사, 한국소프트웨어진흥원, 2005년 2월
  13. 한국소프트웨어진흥원, 지적재산권 보호강화와 산엽경쟁력, 한국소프트웨어진홍원, 2006년 6월
  14. 한국소프트혜어저작권협회,2007 AP 모니터링 결과보고서,한국소프트웨어저작권협회, 2008년 3월
  15. I. Aizen, ''The theory ofplanned behavior, Organizational Behavior & Human Decision Processes , vol. 50 , no , 2, pp ,179-211 , Dec, 1991 https://doi.org/10.1016/0749-5978(91)90020-T
  16. I.Ai zen and M, Fishbein, Understanding attitudes and predicting social behavior, Prentice-Hall , Mar. 1980
  17. 1. Al-Jabri and A. Abdul-Gader, "Software copyright infringements: an exp1oratory study of the effects of individua1 and peer be1iefs , , Omega, vol 25 , no. 3. pp. 335-344, June 1997 https://doi.org/10.1016/S0305-0483(96)00053-9
  18. S. A1-Rafee and T.P. Cronan, "Digital piracy: factors that influence attitude toward behavior," Journa1 of Business Ethics, vol. 63, no. 3, pp. 237-259, Feb. 2006 https://doi.org/10.1007/s10551-005-1902-9
  19. S. Chai. S. Bagchi-Sen, and C. Morrell , Role of perceived importance of information security: an exp1oratory study of middle schoo1 chi1dren's information security behavior , Issues in informing Science & Information Techno1ogy, vol. 3,no. 1, pp.127-136 , Mar. 2006 https://doi.org/10.28945/877
  20. H.K. Cheng, R.R. Sims, and H. Teegen,"To purchase or to pira te software: an empirica1 study," Journa1 of ManagementInformation Systems, vol. 13, no. 4, pp49-60. Mar 1997
  21. V.V. Cordell , N. Wongtada, and R. L. Kieschnick, "Counterfeit purchase intentions: ro1e of 1awfu1ness attitudes and product traits as determinants , Journa1 of business research, vol. 35, no1. pp. 41-53 , Jan. 1996 https://doi.org/10.1016/0148-2963(95)00009-7
  22. D. Curtis , "Software piracy and copyright protection," WESCON/94. Idea/Microelectro- nics. Conference Record, vol. 27. no. 29, pp. 199-203, Sep. 1994
  23. T.P. Cronan and S. Al-Rafee, "Factors that influence the intention to pirate software and media," Journal of business ethics, vol. 78, no. 4. pp. 527-545, Apr.2008 https://doi.org/10.1007/s10551-007-9366-8
  24. F. Davis. "Perceived usefulness, perceived ease of use. and user acceptance of information tochnology." MIS Quarterly, vol. 13, no. 3, pp. 319-340, Sep. 1989 https://doi.org/10.2307/249008
  25. RD. Gopal and G.L. Sanders, "International software piracy: analysis of key issues and impacts," Information Research, vol. 9, no. 4, pp. 380-397. Dec. 1998 https://doi.org/10.1287/isre.9.4.380
  26. RD. Gopal and G.L. Sanders. "Global software piracy: you can't get blood out of a turnip," Communications of the ACM, vol. 43, no. 9. pp. 82-89, Sep 2000 https://doi.org/10.1145/348941.349002
  27. R. Harris."Attitudes towards end-user computing: a structural equation modeL" Behaviour & Information Technology, vol. 18, no. 2. pp. 109-125, :Mar. 1999 https://doi.org/10.1080/014492999119156
  28. S. Binduja, "Trends and patterns among online software pirates." Ethics and Information Technology. vol. 5. no. 1. pp.49-61, Mar. 2003 https://doi.org/10.1023/A:1024910523384
  29. lSO/lEC 9126, Information technology software quality characteristics and metrics, International Organization for Standardization/ International Electrotechnical Commission, 2000
  30. I. Kiema, "Commercial piracy and intellectual property policy," Journal of Economic Behavior & Organization, vol. 68, no. 1, PP. 304 - 318, Mar. 2008 https://doi.org/10.1016/j.jebo.2008.03.005
  31. S. Lai, "Applying software reuse to improve softwaro quality and productivity," Tho 12th Asia Quality Management Symposium Total Quality Management for Restoring Competitiveness, pp. 43-50. Jan, 1998
  32. T. Lin, M. Hsu, F. Kuo, and P. Sun, ''An intention model-based study of software piracy," Proceedings of the 32nd Annual Hawaii International Conference on Sciences. pp. 1 Jan. 1999
  33. J. Lee and Y. Lee. "A holistic model of computer abuse within organizations."Information Management & Computer Security, vol. 10, no. 2. pp. 57-63, Apr.2002 https://doi.org/10.1108/09685220210424104
  34. D. Lending and S.A. Slaughter. "Understanding difforences in othical beliefs and behaviors toward software copying: the effects of organization culture,"Proceedings of the 1999 ACM SIGCPR conferonce on Computor personnel research, pp. 253 - 260, Apr, 1999
  35. K.D. Loch and S. Conger, "Evaluating ethical decision making and computer use," Communications of the ACM, vol. 39, no. 7, pp. 74-83, July 1996 https://doi.org/10.1145/233977.233999
  36. C.A. Matos, C.T. Ituassu. T. Cristiana, and C.A. Rossi, "Consumer attitudos toward counterfeits: a review and extension," The journal of consumer marketing, vol. 24, no.1. pp. 36-47, Feb. 2007 https://doi.org/10.1108/07363760710720975
  37. A. Mishra. I. Akman. and A. Yazici. "Organizational software piracy: an empirical assessment," Behaviour and Information Technology, vol. 26, no. 5,pp. 437-444, Sep 2007 https://doi.org/10.1080/01449290500483577
  38. T. Moores and G. Dhillon. "Software piracy: a view from Hong Kong," Communications of the ACM, vol. 43. no. 12, pp. 88-94, Dec. 2000 https://doi.org/10.1145/355112.355129
  39. A. Peace, D. Galletta. and J. Thong, "Software piracy in the workplace: a model and empirical tost," Journal of Management Information Systems, vol.20. no. 1, pp. 153-77, June 2003 https://doi.org/10.1080/07421222.2003.11045759
  40. T. Peltier, Information Security analysis, Auerbach, Jan. 2001
  41. H. Salemela, "From information systems quality to sustainable business quality."Information and Software Tochnology. vol. 39, no. 3, pp. 819-825, Mar. 1997 https://doi.org/10.1016/S0950-5849(97)00040-2
  42. S.K Shin. R.D. Gopal. G.L. Sanders. and A.B. Whinston. "Global software piracy revisited." Communications of the ACM. vol. 47. no. 1, pp. 103-107, Jan. 2004 https://doi.org/10.1145/962081.962088
  43. R. Siegfried. "Student attitudes on software piracy and related issues of computer ethics." Ethics and Information Technology. vol. 6. no. 4, pp. 215-222,Dec. 2004 https://doi.org/10.1007/s10676-004-3391-4
  44. M.T. Siponen and T. Vartiainen. "Attitudes to and factors affecting unauthorized copying of computer software in Finland." Behaviour & Information Technology. vol. 24. no. 4. pp. 249-257, July 2005 https://doi.org/10.1080/01449290512331321857
  45. B. Smith. P. Caputi. and P. Rawstorne. "Differentiating computer experience and attitudes toward computers: an empirical investigation." Computers in human behavior, vol. 16. no. 1, pp. 59-81, Jan 2000 https://doi.org/10.1016/S0747-5632(99)00052-7
  46. W.R. Swinyard. H. Rinne. and A.K Kau. "The morality of software piracy: a cross-cultural analysis." Journal of Business Ethnics. vol. 9. no. 8. pp. 655- 664. Aug. 1990 https://doi.org/10.1007/BF00383392
  47. J. Tang and C. Farn. "The effect of interpersonal influence on softlifting." Journal of Business Ethics, vol. 56. no.2, pp. 149-161, Jan 2005 https://doi.org/10.1007/s10551-004-2170-9
  48. J. Thatcher and P. Perrewe. ''An empirical examination of individual traits as antecedents to computer anxiety and computer self-efficiency." MIS Quarterly. vol. 26. no. 4, pp. 381-396, Dec. 2002 https://doi.org/10.2307/4132314
  49. S.C. Wagner and G.L. Sanders. "Considerations in ethical decisionmaking and software piracy.", Journal of Business Ethics, vol. 29. no. 1. pp. 161-170 Jan. 2001 https://doi.org/10.1023/A:1006415514200
  50. S.J. Winter. KM. Chudoba. and B.A. Gutek. "Attitudes toward computers: when do they predict computer use?" Information & management, vol. 34. no. 5,pp. 275-284, Nov. 1998 https://doi.org/10.1016/S0378-7206(98)00065-2
  51. M. Xenos and D. Christodoulakis.''Measuring perceived software quality." Information and software technology, vol. 39. no. 6. pp. 417-424, June 1997 https://doi.org/10.1016/S0950-5849(96)01154-8
  52. BSA.SW 불법복제 연구보고서,BSA,2006,http://www.bsa.org