Schools of thought in software piracy research

Marton Gergely, V. Srinivasan Rao

Research output: Chapter in Book/Report/Conference proceedingConference contribution


The unauthorized copying of computer programs, referred to as software piracy, continues to be a major threat to the security of the digital assets of software publishers. Software piracy has received much attention from researchers, often from different perspectives, or schools of thought. As a first step, we have reviewed the articles on software piracy in Information Systems journals, classified them into major schools of thought, and summarized the findings of each school. We briefly show that a comparison of findings from multiple schools of thought can facilitate triangulation of results. Our comparison also points to the need for further clarification of some issues. In future work, we will include articles published in journals of other disciplines, and develop an integrated view of the software piracy phenomenon to support our efforts to propose a holistic approach to reduce software piracy.

Original languageEnglish
Title of host publication19th Americas Conference on Information Systems, AMCIS 2013 - Hyperconnected World
Subtitle of host publicationAnything, Anywhere, Anytime
Number of pages9
Publication statusPublished - 2013
Externally publishedYes
Event19th Americas Conference on Information Systems, AMCIS 2013 - Chicago, IL, United States
Duration: Aug 15 2013Aug 17 2013

Publication series

Name19th Americas Conference on Information Systems, AMCIS 2013 - Hyperconnected World: Anything, Anywhere, Anytime


Conference19th Americas Conference on Information Systems, AMCIS 2013
Country/TerritoryUnited States
CityChicago, IL


  • Intellectual property theft
  • Software piracy

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Computer Science Applications
  • Information Systems
  • Library and Information Sciences


Dive into the research topics of 'Schools of thought in software piracy research'. Together they form a unique fingerprint.

Cite this