Software Piracy - Global Increase

Pirated software is on the increase and now accounts for over one third of the software installed on the world's computers and it's cost the software industry a staggering, $28bn (?12bn) last year in lost revenues. That's the startling claim of the UK based, Business Software Alliance. Their annual survey of global software piracy shows that some 36% of software applications were illegally installed and being used during 2003.

The study, conducted for the first time on behalf of the BSA by global technology research firm, International Data Corporation, incorporated major software market segments, including operating systems and consumer software and local market software. They discovered that while software costing $81bn (?38bn) was installed onto computers around the world, only $51bn (?23bn) was actually purchased and installed legally.

The USA and Canada who collectively are the most honest when it comes to purchasing software show a software piracy rate of 23% whilst the worst offenders are within the Eastern European countries, where piracy levels are an incredible 71%. It's difficult to draw any comparisons from previous years data as this is the first year the study has been out-sourced to an independent company and takes in a wider spectrum of software than the previous studies conducted in-house by the BSA. As well as counting the number of illegally produced software programs installed on systems, the study also includes software for where an insufficient number of site licenses have been purchased.

"Software piracy continues to be a major challenge for economies worldwide," said Robert Holleyman, president and CEO of BSA. "From Algeria to New Zealand, Canada to China, piracy deprives local governments of tax revenue, costs jobs throughout the technology supply chain and cripples the local, in-country software industry."

Mr Holleyman went on to say, that the IDC study reflects a logical evolution in BSA's decade-long effort to measure piracy in the global economy. Its scope was expanded to account more accurately for trends such as the growth of local software markets worldwide and the acceleration of Internet piracy.

For its analysis, IDC drew upon its worldwide data for software and hardware shipments, conducted more than 5,600 interviews in 15 countries, and used its in-country analysts around the globe to evaluate local market conditions. IDC identified the piracy rate and dollar losses by utilizing proprietary IDC models for PC, software and license shipments by all industry vendors in 86 countries.

The study found that the size of a regional software market is the critical link between piracy rates and actual dollars lost. For instance, 91 percent of software installed in the Ukraine in 2003 was pirated, as compared to 30 percent in the U.K. But dollar losses in the U.K. ($1.6 bn) were about 17 times higher than those in the Ukraine ($92.1m). This difference is attributed to a much larger total PC software market in the U.K. than in the Ukraine.

"A number of factors contribute to the regional differences in piracy, including local-market size, the availability of pirated software, the strength of copyright laws, and cultural differences regarding intellectual property rights," said John Gantz, Chief Research Officer at IDC. "Unfortunately, we found that high market growth regions also tend to be high piracy regions, such as China, India and Russia. If the piracy rate in emerging markets ? where people are rapidly integrating computers into their lives and businesses ? does not drop, the worldwide piracy rate will continue to increase."

"The fight for strong intellectual property protection and respect for copyrighted works spans the globe, and there is much work to be done," Mr Holleyman said. "BSA will continue to work with governments to enact policies to protect software intellectual property as well as implement programs to raise business and consumer awareness about the importance of copyright protection for creative works. Lowering the piracy rate will stimulate local economic activity, generate government revenue, create job growth and cultivate future innovation."

Countries with Highest Piracy Rate:

  • Vietnam 92%

  • China 92%

  • Ukraine 91%

  • Indonesia 88%

  • Zimbabwe 87%

  • Russia 87%

  • Algeria 84%

  • Nigeria 84%

  • Pakistan 83%

  • Paraguay 83%

Countries with Lowest Piracy Rate

  • United States 22%

  • New Zealand 23%

  • Denmark 26%

  • Sweden 27%

  • Austria 27%

  • United Kingdom 29%

  • Japan 29%

  • Belgium 29%

  • Germany 30%

  • Switzerland 31%

Related links: http://www.bsa.org/, http://www.bsa.org/

About The Author

Robert Palmer is CEO of deskNET Communications (http://www.desknet.co.uk) - providing webmasters and e-commerce with a more successful alternative to opt-in email marketing and email newsletters; mail:bob@desknet.co.uk

bmw rental chicago Bath .. Lockport Chicago limo O’Hare
In The News:

Spambots, data thieves, and other bad actors run rampant online — more so now than ever before. Here's what to do if one gets ahold of you.
Tech expert Kurt “CyberGuy" Knutsson says the Super Bowl's huge audience makes it a prime target for many types of cybersecurity scams.
It's not just about freeing up space on your computer, Kurt “CyberGuy" Knutsson says. It's about protecting your digital memories and important documents.
From proofreading and research to brainstorming and data analysis, you can use generative AI as a sidekick for just about any task you can dream of.
Tech expert Kurt “CyberGuy" Knutsson says Super Bowl 2025 ads promise star power and laughs, featuring Beckham's twin reveal.
First driverless semi delivers 100 loads in Texas, transforming logistics with AI. Tech expert Kurt “CyberGuy" Knutsson gives his takeaways.
A new scam using Elon Musk's name is making the rounds, promoting "energy-saving" devices and falsely linking the Tesla and SpaceX leader to the products.
China recently unveiled a new bullet train prototype with a test speed of 280 mph that is poised to break records and set new standards.
Hackers sometimes find ways to exploit iPhones, and Apple recently discovered a vulnerability in iOS that may have been exploited for over a year.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
Lynx the robot dog from China is pushing boundaries of what autonomous mobile robots can achieve with a groundbreaking design and unique mobility.
A startup claims to have developed the world's first entirely artificial intelligence-designed and 3D-printed shoe, the brainchild of a 25-year-old.
Creating an email alias can help clean up your inbox by organizing emails based on purpose, like creating different aliases for shopping, newsletters and work.
A multipurpose robotic system promises to transform how items are stacked onto pallets, aiming to maximize space utilization and reduce shipping costs.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
The number of people affected by a UnitedHealth data breach in February 2024 was actually higher than previously reported and was the largest medical data breach in U.S. history.
A phishing campaign uses Google Calendar to schedule fake meeting invitations that appear legitimate, redirecting targets to phishing sites.
Toll road text scam: Fake messages claim unpaid fees, seek payment via fraudulent links. Kurt “CyberGuy" Knutsson says this scam is becoming increasingly sophisticated and widespread.
Kurt “CyberGuy" Knutsson says these steps ensure that your friends and family get to the exact moment you want them to see. Try it out and streamline your sharing experience.
Tech expert Kurt “CyberGuy" Knutsson offers tips on how to protect your identity: Be vigilant, monitor accounts, use smart security, know theft response.
Tech expert Kurt “CyberGuy" Knutsson says cybercriminals are exploiting iMessage phishing protection, tricking users to reactivate links.
It's hard to imagine life without in-flight Wi-Fi these days – but sky-high web surfing comes with its own set of privacy concerns. Here's how to protect yourself.
Over 400,000 cases of credit card fraud were reported in 2024 to the Federal Trade Commission. The CyberGuy explains how to protect against becoming another victim.
A nondescript metal box transforms into a fully functional electric motorcycle that blurs the line between vehicle and urban infrastructure.
Many apps unrelated to location still ask users for tracking permission, and Texas Attorney General Ken Paxton has filed a lawsuit seeking to end this alleged practice by Allstate.

Dashboard Widgets for Windows

For a windows user like me, just can watch with... Read More

Microsoft CRM: Implementation, Customization, Support ? Consultant Overview

Microsoft Business Solutions CRM is present several years on the... Read More

Microsoft CRM for Corporate Business ? Working Offline

If your company has regional and worldwide operations, you might... Read More

HSphere Control Panel Tips and Tricks - Power At Your Fingertips: Part 1

The first topic we are going to discuss... Read More

Free Software: How Not To Get More Than You Bargained For!

I completed an experiment recently. I wanted to find out... Read More

Antivirus Software ? Get The Bugs Before They Get You!

You turn on your computer, and it doesn't look quite... Read More

ERP for Large Corporation ? New Selling Strategy

Our opinion is based on our Microsoft Business Solutions Great... Read More

Microsoft Great Plains: Interest Calculation Example ? Stored Procedure for Crystal Report

This is intermediate level SQL scripting article for DB Administrator,... Read More

What You Should Know About Installing Screensavers

Do you remember that frustrating feeling when you find an... Read More

Beware of Spyware

One day, you suddenly realize that your computer started to... Read More

CRM and Customer Life Cycle

Customer Relationship Management or CRM is a combination of enterprise... Read More

How to Make Attractive and Effective PowerPoint Presentations

Microsoft PowerPoint has dramatically changed the way in which academic... Read More

Internet Faxing Service Review

The Internet is reshaping every form of communications medium, and... Read More

Integrating Microsoft Great Plains Accounting/ERP: RMS, CRM, eCommerce, Lotus Domino ? overview

Microsoft Business Solutions Great Plains has substantial market share among... Read More

Lotus Domino: Application Integration ? A Programmer View

There are two approaches for application integration:? Programmer's approach ?... Read More

Spyware: What It Is and How to Combat It

Spyware is software or hardware installed on a computer without... Read More

Great Plains Dexterity: Customizations & Source Code Programming

Great Plains Software Dynamics, Dynamics C/S+, eEnterprise were written on... Read More

Microsoft Great Plains Integration with Legacy Systems ? Overview For Developer

Looks like Microsoft Great Plains becomes more and more popular,... Read More

Dont Choose Adobe When Working With PDF

While Adobe is the most known maker of PDF tools,... Read More

History of Java

The java programming language is becoming more and more popular... Read More

Microsoft Great Plains Integrations - Tips for Developer

In this short FAQ style article we would like to... Read More

Microsoft RMS ? Great Plains Integration ? Overview For IT Specialist

Microsoft Great Plains and Microsoft Retail Management System (Microsoft RMS)... Read More

Microsoft CRM Development

Microsoft CRM is CRM answer from Microsoft Business Solutions.The whole... Read More

Microsoft Great Plains Food Processing ? Implementation & Customization Highlights

Microsoft Great Plains might be considered as ERP platform to... Read More

Running a Program on a Remote Server Using SSH

How do you run a program on a remote server... Read More

limousine service Ava ..