158 lines
8.3 KiB
Plaintext
158 lines
8.3 KiB
Plaintext
SOFTWARE PIRACY: AN ALTERNATIVE VIEW
|
||
Jim Thomas and Gordon Meyer
|
||
(5 March, 1990)
|
||
|
||
|
||
-------------------------------------------------------------------
|
||
Jim Thomas is an associate professor in Sociology. Gordon Meyer
|
||
received his M.A. in Sociology in 1989. They are currently
|
||
researching the computer underground from which the data for this
|
||
note are drawn.
|
||
-------------------------------------------------------------------
|
||
|
||
The university policy against computer software piracy has
|
||
been widely publicized, including in a recent issue of Computing
|
||
News (December, 1989). There is no question that the university
|
||
must protect itself against actions of the NIU community for
|
||
which it could be held legally accountable. However, based on
|
||
our current research of the "computer underground" and the active-
|
||
ities of "phreaks, hackers, and pirates," we find no evidence to
|
||
support the many value judgments offered in the rationale circu-
|
||
lated by the university. These normative judgments contribute to
|
||
law enforcement tendencies to expand the definitions of illegali-
|
||
ty and, as one recent government publication has done, to place
|
||
piracy in the same category of crimes as "computer theft" and
|
||
"theft of trade secrets." Our intent here is neither to justify
|
||
software piracy nor to challenge University policy. However, be-
|
||
cause the area of copyright and "computer abuse" law is so new,
|
||
and because these laws tend to rely in media and other depictions
|
||
of "computer underground" activeity as criminally sanctionable, we
|
||
challenge conceptions of underground activeity that seem unsub-
|
||
stantiated by evidence.
|
||
|
||
The university's normative justification of the University
|
||
policy can be summarized in three broad principles:
|
||
|
||
1. Software piracy shows disrespect for the intellectual work
|
||
and property of others and subverts the mission of higher
|
||
education.
|
||
|
||
2. Software piracy deprives authors of a "fair return" for
|
||
their work.
|
||
|
||
3. Software piracy is unethical.
|
||
|
||
These assertions help justify criminalization and corresponding
|
||
sanctions. However, The data from our research do not support
|
||
these judgments for several reasons. First, software pirates
|
||
make a clear distinction between "pirates," persons who collect
|
||
and share software for as hobbyists akin to stamp collectors, and
|
||
"bootleggers." Bootleggers are persons who distribute software
|
||
for material gain. Pirates may copy and install programs, but
|
||
generally their goal is to collect, and they derive satisfaction
|
||
from running programs for which they have no need and that they
|
||
will rarely, if ever, use.
|
||
|
||
Second, software pirates--despite the claims of the SPA
|
||
(Software Publishsers Association)--report spending considerably
|
||
more money purchasing software than the average user. Many of
|
||
these purchases are for trading, and there is a strong ethos in
|
||
the pirate world that if one uses a program, one purchases it.
|
||
Reasons for purchasing include documentation, acquiring informa-
|
||
tion about and discounts on updates, and on-line technical sup-
|
||
port. It is quite common for pirates to purchase identical pro-
|
||
grams to those they have already obtained.
|
||
|
||
Third, the "no return" policy of most software merchandisers
|
||
makes it difficult for potential buyers to assess the ability of
|
||
a program to meet their needs or work adequately on their system.
|
||
Piracy creates an informed public by assuring that programs are
|
||
available for pre-testing, by providing a pool of reasonably lit-
|
||
erate users to publicly discuss the merits of competing products,
|
||
and to even offer technical assistance to those who have pur-
|
||
chased a program. In this sense, the "unauthorized" copying of
|
||
software can be seen as contributing to the university mission of
|
||
expanding knowledge, of preventing exploitation of consumers, and
|
||
above all, to the expansion of computer literacy contributing to
|
||
the free flow of information.
|
||
|
||
Fourth, pirates spend a considerable sum on their hobby.
|
||
Among the most active topics of discussion among pirates are
|
||
those of the need to endlessly upgrade, the endless purchase of
|
||
diskettes on which to store programs, and--with the popularity of
|
||
9600 baud modems--the advantages of investing between $600-900
|
||
for expanding telecommunications hardware. Because most pirates
|
||
exchange software across telephone lines, piracy has benefitted
|
||
telephone companies because of the growth of Bulletin Board Sys-
|
||
tems (BBSs). Our data indicate that an average monthly phone bill
|
||
of $200 or more is common, and active pirates easily double that
|
||
cost.
|
||
|
||
Fifth, there is simply no evidence to corroborate the claim
|
||
that piracy deprives authors of revenue. Our data suggest that
|
||
pirates annually purchase no less than three times the 1.5 pro-
|
||
grams the SPA estimates for the "average" user, purchases direct-
|
||
ly related to the hobby rather than a need. Further, few students
|
||
or faculty could afford the price of Dbase 4 and other large pro-
|
||
grams, and few people could afford to spend several thousand dol-
|
||
lars a year on computer games. Traded programs would simply re-
|
||
main unpurchased. Because piracy creates an interest in software,
|
||
expands consumer literacy, and contributes to a "user culture"
|
||
that benefits the industry as a whole, we suggest that without
|
||
such a culture there would be less interest in software and, con-
|
||
sequently, less revenue for authors.
|
||
|
||
Sixth, the claim that piracy is unethical is usually a glib
|
||
one made without a strong rationale. Although we make no metaphy-
|
||
sical claims here, we do suggest that the appeal to ethic in at-
|
||
tempts to criminalize piracy is far too serious to be so glibly
|
||
asserted, and the underlying issues require far more research and
|
||
debate. Even in the debates over VCR reproduction and photocopy-
|
||
ing books or journal articles, the appeal to ethics was never ad-
|
||
duced as stridently and self-righteously as in discussions of
|
||
software piracy.
|
||
|
||
The rapid growth of computer and telecommunications technol-
|
||
ogy brings with it new ethical, legal, and practical questions of
|
||
the nature of "private property," free and open access to infor-
|
||
mation and resources, and definitions of "authorship." Few among
|
||
us condone any form of predatory behavior. However, we find
|
||
equally disturbing the tendency to assumptively assert claims and
|
||
definitions that rightly should be brought into a public forum
|
||
for debate rather. The University has the obligation to protect
|
||
the law, but it also has an equal obligation to do so responsibly
|
||
without contributing to the current hysteria surrounding alleged
|
||
"computer crime."
|
||
|
||
=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
|
||
The preceding article is from the
|
||
Computer Underground Digest Issue #1.03 / File 5 of 6
|
||
available on USENET, BITNET, Compuserve, and various other interesting
|
||
places.
|
||
|
||
Gordon and I wrote the following for Northern Illinois University's THE
|
||
COMPUTING NEWS. It was not published for two reasons. First, despite the
|
||
fact that our comments are drawn from an on-going research project, it was
|
||
considered "opinionated." We were in a catch-22 situation: We were required
|
||
to work within severe space constraints, and could present neither data nor
|
||
other research citations, yet, we were also advised not to make the article
|
||
"too scholarly" for a general audience. Second, and apparently most
|
||
important, we were told that if the article were published, it would appear
|
||
to violate the NIU policy, so was inappropriate. Only through the most
|
||
adept feat of intellectual aerobics could such an interpretation be made,
|
||
because we were then, and our article is quite explicit that, in no way
|
||
opposing the policy, but only the rhetoric in which it was presented. Our
|
||
goal was to debate the rhetoric, not the policy. Such a rationale strikes us
|
||
as the CHILLING EFFECT that has occured because of recent hysteria
|
||
surrounding alleged computer abuses, and we find it quite ironic that a
|
||
University, normally the cornerstone of debate, seems to be stifling debate
|
||
on this issue. So, we present it here instead.
|
||
|
||
We have seen an earlier version of this article floating around on bulletin
|
||
boards, but this is the final, "official," version.
|
||
Jim Thomas / Gordon Meyer
|
||
|
||
******************************************************************
|
||
|
||
|
||
|