Software Piracy - Global Increase

Pirated software is on the increase and now accounts for over one third of the software installed on the world's computers and it's cost the software industry a staggering, $28bn (?12bn) last year in lost revenues. That's the startling claim of the UK based, Business Software Alliance. Their annual survey of global software piracy shows that some 36% of software applications were illegally installed and being used during 2003.

The study, conducted for the first time on behalf of the BSA by global technology research firm, International Data Corporation, incorporated major software market segments, including operating systems and consumer software and local market software. They discovered that while software costing $81bn (?38bn) was installed onto computers around the world, only $51bn (?23bn) was actually purchased and installed legally.

The USA and Canada who collectively are the most honest when it comes to purchasing software show a software piracy rate of 23% whilst the worst offenders are within the Eastern European countries, where piracy levels are an incredible 71%. It's difficult to draw any comparisons from previous years data as this is the first year the study has been out-sourced to an independent company and takes in a wider spectrum of software than the previous studies conducted in-house by the BSA. As well as counting the number of illegally produced software programs installed on systems, the study also includes software for where an insufficient number of site licenses have been purchased.

"Software piracy continues to be a major challenge for economies worldwide," said Robert Holleyman, president and CEO of BSA. "From Algeria to New Zealand, Canada to China, piracy deprives local governments of tax revenue, costs jobs throughout the technology supply chain and cripples the local, in-country software industry."

Mr Holleyman went on to say, that the IDC study reflects a logical evolution in BSA's decade-long effort to measure piracy in the global economy. Its scope was expanded to account more accurately for trends such as the growth of local software markets worldwide and the acceleration of Internet piracy.

For its analysis, IDC drew upon its worldwide data for software and hardware shipments, conducted more than 5,600 interviews in 15 countries, and used its in-country analysts around the globe to evaluate local market conditions. IDC identified the piracy rate and dollar losses by utilizing proprietary IDC models for PC, software and license shipments by all industry vendors in 86 countries.

The study found that the size of a regional software market is the critical link between piracy rates and actual dollars lost. For instance, 91 percent of software installed in the Ukraine in 2003 was pirated, as compared to 30 percent in the U.K. But dollar losses in the U.K. ($1.6 bn) were about 17 times higher than those in the Ukraine ($92.1m). This difference is attributed to a much larger total PC software market in the U.K. than in the Ukraine.

"A number of factors contribute to the regional differences in piracy, including local-market size, the availability of pirated software, the strength of copyright laws, and cultural differences regarding intellectual property rights," said John Gantz, Chief Research Officer at IDC. "Unfortunately, we found that high market growth regions also tend to be high piracy regions, such as China, India and Russia. If the piracy rate in emerging markets ? where people are rapidly integrating computers into their lives and businesses ? does not drop, the worldwide piracy rate will continue to increase."

"The fight for strong intellectual property protection and respect for copyrighted works spans the globe, and there is much work to be done," Mr Holleyman said. "BSA will continue to work with governments to enact policies to protect software intellectual property as well as implement programs to raise business and consumer awareness about the importance of copyright protection for creative works. Lowering the piracy rate will stimulate local economic activity, generate government revenue, create job growth and cultivate future innovation."

Countries with Highest Piracy Rate:

  • Vietnam 92%

  • China 92%

  • Ukraine 91%

  • Indonesia 88%

  • Zimbabwe 87%

  • Russia 87%

  • Algeria 84%

  • Nigeria 84%

  • Pakistan 83%

  • Paraguay 83%

Countries with Lowest Piracy Rate

  • United States 22%

  • New Zealand 23%

  • Denmark 26%

  • Sweden 27%

  • Austria 27%

  • United Kingdom 29%

  • Japan 29%

  • Belgium 29%

  • Germany 30%

  • Switzerland 31%

Related links: http://www.bsa.org/, http://www.bsa.org/

About The Author

Robert Palmer is CEO of deskNET Communications (http://www.desknet.co.uk) - providing webmasters and e-commerce with a more successful alternative to opt-in email marketing and email newsletters; mail:bob@desknet.co.uk

Willow Springs limo O'Hare .. Lockport Chicago limo O’Hare
In The News:

Tech expert Kurt “CyberGuy" Knutsson discusses how robots can milk, feed and clean cows on dairy farms, boosting efficiency and comfort.
Tech expert Kurt “CyberGuy" Knutsson says quantum internet ensures unhackable security and redefines online privacy and speed.
Kawasaki's CORLEO is a hydrogen-powered, AI-driven rideable robot. Tech expert Kurt “CyberGuy" Knutsson reports on this new way of thinking about off-road transportation.
The CyberGuy breaks down five mobile privacy terms that could make a difference when it comes to keeping your personal information safe.
A groundbreaking robot that's like a real-life Wall-E uses advanced artificial intelligence to replicate natural gestures and deliberate actions with striking accuracy.
If not properly managed, Windows Defender Application Control, a security feature with Windows, could be a potential security vulnerability.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
FlashBot Arm, a semi-humanoid robot, acts more like a human than traditional robots, and you may see it working at a restaurant, healthcare center or hotel.
There are multiple ways to find your missing Android phone after it goes missing. One method involves using a smartwatch to ping your phone.
The NeuroOne OneRF Ablation System is a new device with FDA-cleared technology designed for both diagnosing and treating neurological disorders in one procedure.
The CyberGuy provides tips to protect yourself from criminals who use various methods to make unauthorized transactions using your account information.
New drone technology maps land and water with stunning accuracy, giving researchers and conservationists a new way to understand our planet.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
X hit with massive data breach with 200 million records leaked, including emails. Tech expert Kurt “CyberGuy" Knutsson offers seven tips to help protect yourself.
Atlas robot by Boston Dynamics amazes tech expert Kurt “CyberGuy" Knutsson with its breakdancing moves.
Tech expert Kurt “CyberGuy" Knutsson talks about how Google kept Android SafetyCore details quiet until it scanned users' photos.
Hydrogen trucks debut in Georgia, sparking debates on costs and green freight gains. Kurt “CyberGuy" Knutsson comments on this promising chapter in green logistics evolution.
Tech expert Kurt “CyberGuy" Knutsson says ChatGPT learns from chats, but you should avoid sharing sensitive information to protect your privacy.
Beyond Aero's BYA-1: Hydrogen-electric jet with zero emissions, reduced costs, 2030 launch. Kurt “CyberGuy" Knutsson discusses a potential game changer in the evolution of air travel.
Kurt "CyberGuy" Knutsson explains how you can creatively repurpose your old unused Android devices, which are full of potential and hidden value.
Mech the super-humanoid robot can lift up to 132 pounds and is designed to tackle stressful and repetitive tasks that often lead to workplace injuries.
Double-clicking is something we all do, often without giving it a second thought. But it could be giving hackers permission to do something dangerous.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
Kurt the CyberGuy offers some of his easy expert tips to free up storage space on your Android if your device is running short on storage.
You can reset your internet router remotely if you're not home when your power goes out. Kurt "CyberGuy" Knutsson explains how this can be done.

Microsoft CRM Data Conversion FAQ

Microsoft Business Solutions CRM data conversion deserves FAQ type of... Read More

Oracle Development: JDeveloper 10G ? Java, J2EE, EJB, MVC, XML - Overview For Programmer

In 2004 Oracle, Inc. made its new step toward J2EE... Read More

The End of Spyware?

The US House of Representatives has recently passed the "Spy... Read More

The Dirt on Screensavers

Remember back in the days where screensavers were the coolest... Read More

You Can Write Microsoft Office Program in About 60 Minutes

Microsoft Office program is a programming tool called Visual Basic... Read More

Spyware Protection: A Must for Any Home Computer

Now that spyware is the single most dangerous threat to... Read More

What is Spyware? Are You Being Watched?

Find out why Spyware Removal from computers is important and... Read More

Who?s Watching What You Type?

If someone entered your home, uninvited and installed numerous cameras... Read More

Blind CC (Bcc): Master Its Use When E-Mailing

If you use Microsoft Outlook (or similar applications) for e-mailing,... Read More

Microsoft CRM in Latin America: Implementation, Customization, Support ? Overview for Consultant

Microsoft Business Solutions CRM is present several years on the... Read More

Story Development Software: Good or Evil?

In the early days of the personal computer, we're talking... Read More

Preventive Maintenance Software Companies

Several software companies design programs for preventive maintenance. Most of... Read More

Microsoft CRM Implementation for Large Corporation ? overview

Microsoft Business Solutions CRM is now approaching the phase of... Read More

QuarkXpress Tips: How to Move Content Between Print and Web Layouts

Since its release in 1987, QuarkXpress had made an immediate... Read More

How To Make Good Use of Spreadsheets

Most computer users use spreadsheets software such as Microsoft Excel... Read More

Recent Studies Show that 9 out of 10 PCs Are Infected with Spyware

Spyware and malware are large problems for Internet users today... Read More

MultiNational Corporation ERP Implementation ? Microsoft Business Solutions Great Plains

If you look back to the history, you will see... Read More

Microsoft CRM Integration with IBM Lotus Notes Domino ? Machinery Dealership Example

IBM Lotus Notes with Domino email server is traditional document... Read More

Software Engineering: An Introduction

Software Engineering is the Systematic Approach for analysis design implementation... Read More

The Truth about Colossus: Are You Just A Magnetic Image?

What is Colossus?Colossus is software licensed to about twenty-five insurance... Read More

Protect Your Most Vital Business Asset with Security Software

Homeland security, airport security, Internet security ??" these days we???re... Read More

EDI: Electronic Document Interchange for Microsoft Great Plains ? Overview for Software Developer/Pr

Microsoft Great Plains - Microsoft Business Solutions accounting and ERP... Read More

Spyware Definitions List

The adware and spyware definitions list is very long. But... Read More

Create A Flash Presentation For Free With Open Office

The intentions of this short tutorial are not to teach... Read More

Brand Your Websites URL With a Favicon

Have you ever noticed that when you look at your... Read More

group transportation logistics management Highland ..