Exploring the supply of pirate software for mobile devices: An analysis of software types and piracy groups
Information Management & Computer Security
ISSN: 0968-5227
Article publication date: 12 October 2010
Abstract
Purpose
Software piracy is an ongoing problem for software producers. At the same time, mobile devices such as personal digital assistants and smart phones are increasing in popularity. This paper seeks to examine the supply of pirate software for mobile devices, against a backdrop of conventional desktop piracy theory.
Design/methodology/approach
Using a novel data set of pirate software releases, the paper reviews 18,000 entries from a pirate software database to examine the type and origin of this software.
Findings
The paper finds that more popular platforms are not necessarily subject to greater levels of software piracy. For mobile devices, productivity software was more popular than game software. Many piracy groups were involved, but only four groups were responsible for over half of all releases. Some popular devices, such as the Blackberry and Apple iPhone, showed little to no piracy levels.
Research limitations/implications
As with empirical research into any criminal or deviant behaviour, there may be intention to deceive. The findings regarding device popularity and availability of pirate software have implications for demand‐side research.
Practical implications
The findings provide insights for business managers and information security professionals in the telecommunications and mobile applications industries.
Originality/value
Prior research work has focused on software for desktop computers. This study contributes by being some of the first published work on piracy for mobile devices. The work is also original in that most prior research has focused on the demand for pirate software. This paper provides insight into the supply of this software.
Keywords
Citation
Goode, S. (2010), "Exploring the supply of pirate software for mobile devices: An analysis of software types and piracy groups", Information Management & Computer Security, Vol. 18 No. 4, pp. 204-225. https://doi.org/10.1108/09685221011079171
Publisher
:Emerald Group Publishing Limited
Copyright © 2010, Emerald Group Publishing Limited