Exploring the supply of pirate software for mobile devices

Sigi Goode (School of Accounting and Business Information Systems, The Australian National University, Canberra, Australia)

Information Management & Computer Security

ISSN: 0968-5227

Publication date: 12 October 2010



Software piracy is an ongoing problem for software producers. At the same time, mobile devices such as personal digital assistants and smart phones are increasing in popularity. This paper seeks to examine the supply of pirate software for mobile devices, against a backdrop of conventional desktop piracy theory.


Using a novel data set of pirate software releases, the paper reviews 18,000 entries from a pirate software database to examine the type and origin of this software.


The paper finds that more popular platforms are not necessarily subject to greater levels of software piracy. For mobile devices, productivity software was more popular than game software. Many piracy groups were involved, but only four groups were responsible for over half of all releases. Some popular devices, such as the Blackberry and Apple iPhone, showed little to no piracy levels.

Research limitations/implications

As with empirical research into any criminal or deviant behaviour, there may be intention to deceive. The findings regarding device popularity and availability of pirate software have implications for demand‐side research.

Practical implications

The findings provide insights for business managers and information security professionals in the telecommunications and mobile applications industries.


Prior research work has focused on software for desktop computers. This study contributes by being some of the first published work on piracy for mobile devices. The work is also original in that most prior research has focused on the demand for pirate software. This paper provides insight into the supply of this software.



Goode, S. (2010), "Exploring the supply of pirate software for mobile devices", Information Management & Computer Security, Vol. 18 No. 4, pp. 204-225. https://doi.org/10.1108/09685221011079171

Download as .RIS



Emerald Group Publishing Limited

Copyright © 2010, Emerald Group Publishing Limited

Please note you might not have access to this content

You may be able to access this content by login via Shibboleth, Open Athens or with your Emerald account.
If you would like to contact us about accessing this content, click the button and fill out the form.
To rent this content from Deepdyve, please click the button.