2006
DOI: 10.1007/s10551-005-4709-9
|View full text |Cite
|
Sign up to set email alerts
|

What Motivates Software Crackers?

Abstract: Software piracy is a problem in the software industry, as firms lose revenue when pirated rather than original software is purchased. However, much of the research literature focuses on end-user piracy. This study goes directly to the initial software crackers to determine why they invest their skill in this activity instead of more lucrative and legal employment. The study applies a framework developed from the psychology literature in an online survey. The challenge of removing copy protection was the strong… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

1
30
0

Year Published

2011
2011
2020
2020

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 40 publications
(33 citation statements)
references
References 65 publications
1
30
0
Order By: Relevance
“…Regulations such as the DMCA have made it illegal to circumvent these DRM and to distribute the tools that would allow an individual to bypass them (Marshall 2006). However, even with such tight regulations, it is still possible to crack any DRM available (Goode and Cruise 2006).…”
Section: The Regulation Of the Warez Scenementioning
confidence: 99%
See 1 more Smart Citation
“…Regulations such as the DMCA have made it illegal to circumvent these DRM and to distribute the tools that would allow an individual to bypass them (Marshall 2006). However, even with such tight regulations, it is still possible to crack any DRM available (Goode and Cruise 2006).…”
Section: The Regulation Of the Warez Scenementioning
confidence: 99%
“…Their members rarely meet in person and use aliases to keep their identities secret (Craig 2005;Goode and Cruise 2006). Their main aim is not money, but respect among other hackers in the warez scene (Craig 2005;Rehn 2003).…”
Section: The Supply Of the Warez Scenementioning
confidence: 99%
“…Research on the techniques of neutralization has since expanded beyond male-oriented delinquency to include females and a wide variety of offenses committed by both young people and adults. For example, researchers have examined the techniques of neutralizations relied on by offenders engaged in violent crime (Byers & Crider, 2002;Levi, 1981;Pogrebin, Stretesky, Unnithan, & Venor, 2006;Presser, 2003;Ray & Simons, 1987), property crime (Copes, 2003;Cromwell & Thurman, 2003;Eliason & Dodder, 1999;Klockars, 1974), drug crimes (Peretti-Watel, 2003;Priest & McGrath, 1970), sex crimes (Brooks-Gordon & Gelsthorpe, 2003;DeYoung, 1988, Durkin & Bryant, 1999Higginson, 1999;Pogrebin, Poole, & Martinez, 1992;Scully & Marolla, 1984), cybercrime (Holt & Copes, 2010;Ingram & Hinduja, 2008), and economic crime (Benson, 1985;Copes & Vieraitis, 2009, 2012Copes, Vieraitis & Jochum, 2007;Cressey, 1953;Dabney, 1995;Evans & Porche, 2005;Goode & Cruise, 2006;Greenberg, 1990;Hollinger, 1991;Jesilow, Pontell, & Geis, 1993;Klenowski, Copes, & Mullins, 2011;Thurman, St. John, & Riggs, 1984;N. L. Piquero, Tibbetts, & Blankenship, 2005;Shover, Coffey, & Sanders, 2004).…”
mentioning
confidence: 99%
“…With just a few mouse clicks, people can download software; apply a downloaded patch to it, and start using it without payment. Vendors realized that protecting software against malicious users is a hard problem [9]. The user is in control of his machine: he has physical access to the hardware; he controls the network connectivity, etc.…”
Section: Introductionmentioning
confidence: 99%
“…Software cracking is the process of bypassing the registration and payments options on a software product to remove copyright protection safeguards or to turn a demo version of software into a fully function version without paying for it [3]. It involves the modification of software to remove or disable features which are considered undesirable by the person cracking the software, usually related to protection methods: copy protection (protection against the manipulation of software), trial/demo version, serial number, hardware key, date checks, CD check or software annoyances like nag screens and adware [9] [14]. Software cracking is a serious problem that and it possess a great danger to computer security.…”
Section: Introductionmentioning
confidence: 99%