DOI QR코드

DOI QR Code

Country Clustering Based on Environmental Factors Influencing on Software Piracy

소프트웨어 불법복제에 영향을 미치는 환경 요인에 기반한 국가 분류

  • 서보밀 (숙명여자대학교, 경영학부) ;
  • 심준호 (숙명여자대학교, 소프트웨어학부)
  • Received : 2017.12.05
  • Accepted : 2017.12.13
  • Published : 2017.12.31

Abstract

Purpose: As the importance of software has been emphasized recently, the size of the software market is continuously expanding. The development of the software market is being adversely affected by software piracy. In this study, we try to classify countries around the world based on the macro environmental factors, which influence software piracy. We also try to identify the differences in software piracy for each classified type. Design/methodology/approach: The data-driven approach is used in this study. From the BSA, the World Bank, and the OECD, we collect data from 1990 to 2015 for 127 environmental variables of 225 countries. Cronbach's ${\alpha}$ analysis, item-to-total correlation analysis, and exploratory factor analysis derive 15 constructs from the data. We apply two-step approach to cluster analysis. The number of clusters is determined to be 5 by hierarchical cluster analysis at the first step, and the countries are classified by the K-means clustering at the second step. We conduct ANOVA and MANOVA in order to verify the differences of the environmental factors and software piracy among derived clusters. Findings: The five clusters are identified as underdeveloped countries, developing countries, developed countries, world powers, and developing country with large market. There are statistically significant differences in the environmental factors among the clusters. In addition, there are statistically significant differences in software piracy rate, pirated value, and legal software sales among the clusters.

Keywords

References

  1. 강주희, 문태수, "소셜커머스의 경제적 가치와 정보품질이 재구매의도에 미치는 영향: 동기이론을 기반으로," 정보시스템연구, 제26권, 제2호, 2017, pp. 63-83.
  2. 김도영, 남재현, 전성훈, 정진화, "불법복제 감소의 경제적 효과," 한국경제연구, 제29권, 제1호, 2011, pp. 199-231.
  3. 김재전, 박경자, "디지털콘텐츠 저작권인식 및 지불의사의 영향요인: 기술적 규범의 조절효과를 중심으로," 인터넷전자상거래연구, 제17권, 제1호, 2017, pp. 259-277.
  4. 김종기, 전진환, "사회유대가 소프트웨어 불법복제에 미치는 영향에 관한 연구," 인터넷전자상거래연구, 제7권, 제4호, 2007, pp. 45-68.
  5. 김중한, "소프트웨어 불법복제 의도에 미치는 영향요인에 관한 연구," 한국IT서비스학회지, 제12권, 제2호, 2013, pp. 131-152. https://doi.org/10.9716/KITS.2013.12.2.131
  6. 김중한, "PC소프트웨어 불법사용에 대한 태도와 습관이 스마트폰 앱 불법복제에 미치는 영향," 한국산업정보학회논문지, 제22권, 제3호, 2017, pp. 49-61. https://doi.org/10.9723/jksiis.2017.22.3.049
  7. 김찬우, 정광호, "불법 소프트웨어 이용에 대한 인식 유형 분석," 한국사회와 행정연구, 제26권, 제4호, 2016, pp. 219-244.
  8. 김헌수, "소프트웨어산업이 한국경제에 미치는 영향과 소프트웨어 불법복제 결정요인," 사회과학연구, 제10권, 제1호, 2004, pp. 107-122.
  9. 노경수, 심완준, 신호균, "TPB, TIB 및 중화기술의 통합적 모형에 의한 디지털 영상물 불법복제 의도에 관한 연구," 정보시스템연구, 제23권, 제4호, 2014, pp. 197-219.
  10. 유병국, "인터넷 불법복제에 따른 독점기업의 가격전략," 인터넷전자상거래연구, 제10권, 제2호, 2010, pp. 25-39.
  11. 전진환, 김종기, "소프트웨어 품질인지에 따른 불법복제에 대한 사용자 인지 비교," 인터넷전자상거래연구, 제9권, 제2호, 2009, pp. 1-23.
  12. 최은지, 김광용, "온라인 디지털 불법복제 단속이 불법복제 의도에 미치는 영향에 관한 연구," 계간 저작권, 제22권, 제2호, 2009, pp. 25-49.
  13. 최은지, 한상호, 김광용, "S/W불법복제와 디지털 음반 불법복제의 행동 비교분석," 사회과학논총, 제10집, 2008, pp. 165-191.
  14. 한윤환, "소프트웨어 산업과 특허: 법적 진화와 경제적 쟁점," 한국산업정보학회논문지, 제15권, 제2호, 2010, pp. 99-113.
  15. Ajzen, I., "The Theory of Planned Behavior," Organizational Behavior and Human Decision Processes, Vol. 50, No. 2, 1991, pp. 179-211. https://doi.org/10.1016/0749-5978(91)90020-T
  16. Bagchi, K., Kirs, P., and Cerveny, R., "Global Software Piracy: Can Economic Factors Alone Explain the Trend?" Communications of the ACM, Vol. 49, No. 6, 2006, pp. 70-75. https://doi.org/10.1145/1132469.1132470
  17. Bardhan, P., "Corruption and Development: A Review of Issues," Journal of Economic Literature, Vol. 35, No. 3, 1997, pp. 1320-1346.
  18. BSA, Seizing Opportunity through License Compliance: BSA Global Software Survey, 2016, Available: http://globalstudy.bsa.org/2016/index.html.
  19. BSA, Shadow Market: 2011 BSA Global Software Piracy Study, 2012, Available: http://globalstudy.bsa.org/2011/.
  20. Cheng, H.K., Sims, R.R., and Teegen, H., "To Purchase or to Pirate Software: An Empirical Study," Journal of Management Information Systems, Vol. 13, No. 4, 1997, pp. 49-60. https://doi.org/10.1080/07421222.1997.11518142
  21. Cronan, T.P., and Al-Rafee, S., "Factors That Influence the Intention to Pirate Software and Media," Journal of Business Ethics, Vol. 78, No. 4, 2008, pp. 527-545. https://doi.org/10.1007/s10551-007-9366-8
  22. Curtis, D., "Software Piracy and Copyright Protection," Proceedings of WESCON '94, Anaheim: CA, 1994, pp. 199-203.
  23. Davis, F.D., Bagozzi, R.P., and Warshaw, P.R., "User Acceptance of Computer Technology: A Comparison of Two Theoretical Models," Management Science, Vol. 35, No. 8, 1989, pp. 982-1003. https://doi.org/10.1287/mnsc.35.8.982
  24. Gopal, R.D., and Sanders, G.L., "Global Software Piracy: You Can't Get Blood Out of a Turnip," Communications of the ACM, Vol. 43, No. 9, 2000, pp. 83-89. https://doi.org/10.1145/352183.352209
  25. Gopal, R.D., and Sanders, G.L., "International Software Piracy: Analysis of Key Issues and Impacts," Information Systems Research, Vol. 9, No. 4, 1998, pp. 380-397. https://doi.org/10.1287/isre.9.4.380
  26. Hair, J.F., Black, W.C., Babin, B.J., and Anderson, R.E., Multivariate Data Analysis: A Global Perspective, 7th Ed., New Jersey, Pearson Prentice Hall, 2010.
  27. Higgins, G.E., Wilson, A.L., and Fell, B.D., "An Application of Deterrence Theory to Software Piracy," Journal of Criminal Justice and Popular Culture, Vol. 12, No. 3, 2005, pp. 166-184.
  28. INSEAD, Competitive Advantage: The Economic Impact of Properly Licensed Software, BSA, 2013, Available: http://portal.bsa.org/insead/index.html.
  29. Leonard, L.N.K., and Cronan, T.P., "Illegal, Inappropriate, and Unethical Behavior in an Information Technology Context: A Study to Explain Influences," Journal of the Association for Information Systems, Vol. 1, No. 1, 2001, pp. 1-28.
  30. Lin, T.-C., Hsu, M.H., Kuo, F.-Y., and Sun, P.-C., "An Intention Model-Based Study of Software Piracy," Proceedings of the 32nd Hawaii International Conference on System Sciences, Maui: HI, 1999, pp. 1-8.
  31. Marron, D.B., and Steel, D.G., "Which Countries Protect Intellectual Property? The Case of Software Piracy," Economic Inquiry, Vol. 38, No. 2, 2000, pp. 159-174. https://doi.org/10.1111/j.1465-7295.2000.tb00011.x
  32. Mishra, A., Akman, I., and Yazici, A., "Organizational Software Piracy: An Empirical Assessment," Behaviour & Information Technology, Vol. 26, No. 5, 2007, pp. 437-444. https://doi.org/10.1080/01449290500483577
  33. Moon, B., McCluskey, J.D., and McCluskey, C.P., "A General Theory of Crime and Computer Crime: An Empirical Test," Journal of Criminal Justice, Vol. 38, No. 4, 2010, pp. 767-772. https://doi.org/10.1016/j.jcrimjus.2010.05.003
  34. Moores, T., and Dhillon, G., "Software Piracy: A View from Hong Kong," Communications of the ACM, Vol. 43, No. 12, 2000, pp. 88-93. https://doi.org/10.1145/355112.355129
  35. Nill, A., Schibrowsky, J., and Peltier, J.W., "Factors That Influence Software Piracy: A View from Germany," Communications of the ACM, Vol. 53, No. 6, 2010, pp. 131-134. https://doi.org/10.1145/1743546.1743581
  36. Ostergard, R.L., "The Measurement of Intellectual Property Rights Protection," Journal of International Business Studies, Vol. 31, No. 2, 2000, pp. 349-360. https://doi.org/10.1057/palgrave.jibs.8490911
  37. Peace, A.G., Galletta, D.F., and Thong, J.Y.L., "Software Piracy in the Workplace: A Model and Empirical Test," Journal of Management Information Systems, Vol. 20, No. 1, 2003, pp. 153-177. https://doi.org/10.1080/07421222.2003.11045759
  38. Ronkainen, I.A., and Guerrero-Cusumano, J.-L., "Correlates of Intellectual Property Violation," Multinational Business Review, Vol. 9, No. 1, 2001, pp. 59-65.
  39. Shin, S.K., Gopal, R.D., Sanders, G.L., and Whinston, A.B., "Global Software Piracy Revisited," Communications of the ACM, Vol. 47, No. 1, 2004, pp. 103-107. https://doi.org/10.1145/962081.962088
  40. Siponen, M., Vance, A., and Willison, R., "New Insights into the Problem of Software Piracy: The Effects of Neutralization, Shame, and Moral Beliefs," Information & Management, Vol. 49, No. 7-8, 2012, pp. 334-341. https://doi.org/10.1016/j.im.2012.06.004
  41. Swinyard, W.R., Rinne, H., and Kau, A.K., "The Morality of Software Piracy: A Cross-Cultural Analysis," Journal of Business Ethics, Vol. 9, No. 8, 1990, pp. 655-664. https://doi.org/10.1007/BF00383392
  42. Yang, D., "The Impact of Business Environments on Software Piracy," Technology in Society, Vol. 29, No. 1, 2007, pp. 121-141. https://doi.org/10.1016/j.techsoc.2006.10.006
  43. Yoon, C., "Theory of Planned Behavior and Ethics Theory in Digital Piracy: An Integrated Model," Journal of Business Ethics, Vol. 100, No. 3, 2011, pp. 405-417. https://doi.org/10.1007/s10551-010-0687-7