Software Piracy - Global Increase

Pirated software is on the increase and now accounts for over one third of the software installed on the world's computers and it's cost the software industry a staggering, $28bn (?12bn) last year in lost revenues. That's the startling claim of the UK based, Business Software Alliance. Their annual survey of global software piracy shows that some 36% of software applications were illegally installed and being used during 2003.

The study, conducted for the first time on behalf of the BSA by global technology research firm, International Data Corporation, incorporated major software market segments, including operating systems and consumer software and local market software. They discovered that while software costing $81bn (?38bn) was installed onto computers around the world, only $51bn (?23bn) was actually purchased and installed legally.

The USA and Canada who collectively are the most honest when it comes to purchasing software show a software piracy rate of 23% whilst the worst offenders are within the Eastern European countries, where piracy levels are an incredible 71%. It's difficult to draw any comparisons from previous years data as this is the first year the study has been out-sourced to an independent company and takes in a wider spectrum of software than the previous studies conducted in-house by the BSA. As well as counting the number of illegally produced software programs installed on systems, the study also includes software for where an insufficient number of site licenses have been purchased.

"Software piracy continues to be a major challenge for economies worldwide," said Robert Holleyman, president and CEO of BSA. "From Algeria to New Zealand, Canada to China, piracy deprives local governments of tax revenue, costs jobs throughout the technology supply chain and cripples the local, in-country software industry."

Mr Holleyman went on to say, that the IDC study reflects a logical evolution in BSA's decade-long effort to measure piracy in the global economy. Its scope was expanded to account more accurately for trends such as the growth of local software markets worldwide and the acceleration of Internet piracy.

For its analysis, IDC drew upon its worldwide data for software and hardware shipments, conducted more than 5,600 interviews in 15 countries, and used its in-country analysts around the globe to evaluate local market conditions. IDC identified the piracy rate and dollar losses by utilizing proprietary IDC models for PC, software and license shipments by all industry vendors in 86 countries.

The study found that the size of a regional software market is the critical link between piracy rates and actual dollars lost. For instance, 91 percent of software installed in the Ukraine in 2003 was pirated, as compared to 30 percent in the U.K. But dollar losses in the U.K. ($1.6 bn) were about 17 times higher than those in the Ukraine ($92.1m). This difference is attributed to a much larger total PC software market in the U.K. than in the Ukraine.

"A number of factors contribute to the regional differences in piracy, including local-market size, the availability of pirated software, the strength of copyright laws, and cultural differences regarding intellectual property rights," said John Gantz, Chief Research Officer at IDC. "Unfortunately, we found that high market growth regions also tend to be high piracy regions, such as China, India and Russia. If the piracy rate in emerging markets ? where people are rapidly integrating computers into their lives and businesses ? does not drop, the worldwide piracy rate will continue to increase."

"The fight for strong intellectual property protection and respect for copyrighted works spans the globe, and there is much work to be done," Mr Holleyman said. "BSA will continue to work with governments to enact policies to protect software intellectual property as well as implement programs to raise business and consumer awareness about the importance of copyright protection for creative works. Lowering the piracy rate will stimulate local economic activity, generate government revenue, create job growth and cultivate future innovation."

Countries with Highest Piracy Rate:

  • Vietnam 92%

  • China 92%

  • Ukraine 91%

  • Indonesia 88%

  • Zimbabwe 87%

  • Russia 87%

  • Algeria 84%

  • Nigeria 84%

  • Pakistan 83%

  • Paraguay 83%

Countries with Lowest Piracy Rate

  • United States 22%

  • New Zealand 23%

  • Denmark 26%

  • Sweden 27%

  • Austria 27%

  • United Kingdom 29%

  • Japan 29%

  • Belgium 29%

  • Germany 30%

  • Switzerland 31%

Related links: http://www.bsa.org/, http://www.bsa.org/

About The Author

Robert Palmer is CEO of deskNET Communications (http://www.desknet.co.uk) - providing webmasters and e-commerce with a more successful alternative to opt-in email marketing and email newsletters; mail:bob@desknet.co.uk

cheapest limo Akin .. Lockport Chicago limo O’Hare
In The News:

Tech expert Kurt “CyberGuy" Knutsson says using outdated computers and software leaves them vulnerable to security risks and malware.
Tech expert Kurt “CyberGuy" Knutsson reveals how WalkON enhances walking and jogging with sensors and artificial tendons.
Old-fashioned check fraud is back in style, quintupling over the past year. Here are a few low-tech, practical means of protecting yourself.
Tech expert Kurt “CyberGuy" Knutsson discusses how 600,000-plus records, including checks and property data, were left exposed online by an information service provider.
That weird text from a friend may actually be from a hacker. Kurt “CyberGuy" Knutsson tells you what signs to look out for.
Scammers can wreak havoc on your life just by having your phone number. Kurt "CyberGuy" Knutsson addresses how to avoid becoming a victim.
PongBot is an artificial intelligence-powered tennis robot and a smart training partner available to play 24 hours a day, seven days a week.
Kurt "CyberGuy" Knutsson explains how to update your iPhone to add Apple Intelligence, which he says can transform your interactions with your phone.
University scientists have trained a robotic surgical system to do work with the skill of human doctors, possibly transforming the future of surgeries.
As more companies implement artificial intelligence for daily tasks, some industry leaders are working to push back against certain aspects of the technology.
Tech expert Kurt “CyberGuy" Knutsson says the Batagaika crater in Siberia expands 35 million cubic feet yearly due to thawing.
While fewer than 30% of farmers reportedly use emerging technologies like artificial intelligence, experts believe AI could help producers and farmers make food quicker and more efficiently.
Amazon becomes a prime target of scammers during the holiday shopping season trying to steal Social Security numbers, bank information and Amazon credentials.
Spammers have found a way to target Spotify playlists and podcasts to push pirated software, cheat codes for games and spam links and malware sites.
Sharing information online like your vacation plans and relationship status can make you a target for scammers; here's what to avoid posting to keep yourself safe.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
Kurt "CyberGuy" Knutsson explores six sneaky holiday season gift card tricks, providing tips on how to outsmart scammers trying to rip you off.
Apple Watch's Translate app gives you your own personal interpreter, allowing you to have live two-way conversations in up to 20 different languages.
With kids facing a seemingly increasing amount of threats from creeps on the internet, here's how you can respectfully ask people not to post photos of your children on social media.
Tech expert Kurt “CyberGuy" Knutsson reveals how to regain your Facebook access if you get hacked or locked out.
Kurt “CyberGuy" Knutsson explains how to safeguard retirement accounts from cyber threats with a VPN: encryption, anonymity, secure access.
I’m going to Europe soon, and planning my trip was a breeze. Yes, really! AI did a big chunk of the work for me — and it can help you plan your next getaway, too.
Tech expert Kurt “CyberGuy" Knutsson says North Korean hackers hide malware in macOS apps, bypassing Mac security checks.
Kurt “CyberGuy" Knutsson reveals how iPhone’s new Automatic Mic Mode adjusts settings for optimal call quality automatically.
Jeff Hancock, an expert on AI and misinformation, has been accused of fabricating an expert declaration by citing a study that was allegedly made up by AI.

Microsoft Great Plains Implementation for Midsize & Large Corporation: Lockbox Processing

Microsoft Great Plains is now targeting large and midsize businesses... Read More

Software Engineering: An Introduction

Software Engineering is the Systematic Approach for analysis design implementation... Read More

What is a Document Manager without Version History?

Document Manager and Version HistoryIn previous articles I have discussed... Read More

Enterprise Resource Planning Overview

ERP (Enterprise Resource Planning) Overview covers What is ERP, Brief... Read More

MicroWorld Releases New Version of MailScan Ver. 4.5 - Antivirus and Content Security Software

MicroWorld Technologies, Inc. the leading solutions provider in the area... Read More

Microsoft Great Plains in Metal Distribution: Implementation & Customization ? Consultant Overview

Microsoft Business Solutions Great Plains serves to the wide spectrum... Read More

Defining OLAP Solutions and Data Warehouse design

This tutorial covers OLAP solutions used by Data warehouses and... Read More

Best Practices In Choosing Network Monitoring Software

Blue Cross and Blue Shield of Hawaii (HMSA) found itself... Read More

Navision Attain Database access via C/ODBC in ASP.NET Application

Navision Software was purchased by Microsoft and now it is... Read More

Run Your Own Search Engine

Our hosted solution allow you to run your own search... Read More

Not All Project Management Software is Created Equal

The purpose of Project Management Software is to provide an... Read More

Protect Your Most Vital Business Asset with Security Software

Homeland security, airport security, Internet security ??" these days we???re... Read More

My Experience - Making a Vision into Reality

Disclaimer: All the thoughts expressed are my views only! Your... Read More

Brief Notes About Mainframe Software Pricing

We don't think about mainframe software pricing anymore, we just... Read More

What Stands Behind The Software Description?

With thousands of web pages added to the Net every... Read More

Passwords Used In Microsoft Word Documents

You would like to protect your documents, wouldn't you? Reasons... Read More

Microsoft Great Plains Oil & Gas ? Implementation & Customization Highlights

Microsoft Great Plains serves the wide spectrum of horizontal markets.... Read More

Linux Dual Boot-How To Format

Just the thought of a duel-boot scares many people away,... Read More

History of Java

The java programming language is becoming more and more popular... Read More

Windows Screensavers Explained

In this article you will find some background information about... Read More

Implementing ERP for Large Publicly Traded Corporation ? Microsoft Great Plains

We would like first emphasize the change in the paradigm.... Read More

Great Plains Bill of Materials Setup & Customization for Process Manufacturing ? Overview

Microsoft Great Plains has full-featured Manufacturing suite of modules: Capacity... Read More

Microsoft CRM Data Conversion FAQ

Microsoft Business Solutions CRM data conversion deserves FAQ type of... Read More

Configure Windows Indexing Service for Performance

The Windows Indexing Service provides you with the ability to... Read More

What is Groupware?

Vince Lombardi once said that, "The achievements of an organization... Read More

Aledo wedding limo ..