Feeds

ARRRRR. Half world's techies are software PIRATES – survey

They're OPENLY doing it, too

Build a business case: developing custom apps

Almost half of the world's enterprise IT managers openly admit to using pirated software at work – at least a survey from a software industry association says so.

A report (PDF) from The Software Alliance claims that during 2013, 43 per cent of all software in the world was installed without a licence, up from 42 per cent in the previous study.

However, Blighty's big-hearted tech bods were more law-abiding in 2013 than the previous year, because the total percentage of pirated software used by businesses dropped slightly from 27 to 26 per cent.

The results were extrapolated from a survey of 22,000 consumer and enterprise PC users and a parallel survey of more than 2,000 IT managers.

The survey estimated around $62.7bn worth of unlicensed software had been used last year. The US accounted for $9.7bn of this, with an unlicensed rate of 18 per cent, it claimed.

The Software Alliance said: "Behind this mixed picture is a cross-current of two large-scale market trends: The growing popularity of tablet computers is eating into new PC shipments, while emerging economies account for an increasing majority of the still-vast global market for desktops and laptops.”

"These tectonic shifts will continue to reshape the global software landscape over time,” continued the canned quote, “but the importance of using genuine, properly licensed software will remain as important as ever — particularly as cybersecurity threats proliferate."

Emerging economies use the most pirated software, which is not surprising because these nations are still keen on using old school desktops and laptops rather than imitating the cloud-floating, slab-fondling techies of the First World.

Just 35 per cent of companies have written policies requiring them to use licensed software.

The US is the top market for unlicensed software, where pirated wares are worth $9.7bn a year. In second place is China, where pirate booty is $8.7bn, followed by India at $2.9bn.

Some 64 per cent of those surveyed said unauthorised access by hackers was a major concern, while 59 per cent were worried about loss of data.

"Those concerns are not unreasonable," the BSA added. "The global cybersecurity threat environment has in fact been worsening — and that trend has been exacerbated in part by vulnerabilities associated with illegitimate software." ®

Bridging the IT gap between rising business demands and ageing tools

More from The Register

next story
KDE releases ice-cream coloured Plasma 5 just in time for summer
Melty but refreshing - popular rival to Mint's Cinnamon's still a work in progress
NO MORE ALL CAPS and other pleasures of Visual Studio 14
Unpicking a packed preview that breaks down ASP.NET
Secure microkernel that uses maths to be 'bug free' goes open source
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
Cheer up, Nokia fans. It can start making mobes again in 18 months
The real winner of the Nokia sale is *drumroll* ... Nokia
Put down that Oracle database patch: It could cost $23,000 per CPU
On-by-default INMEMORY tech a boon for developers ... as long as they can afford it
Another day, another Firefox: Version 31 is upon us ALREADY
Web devs, Mozilla really wants you to like this one
Google shows off new Chrome OS look
Athena springs full-grown from Chromium project's head
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.