Seguridad informatica

Páginas: 29 (7219 palabras) Publicado: 31 de mayo de 2011
E I G H T H A N N U A L B S A G L O B A L S O F T WA R E

2 010 PIRACY STUDY
M AY 2 0 1 1

TABLE OF CONTENTS
EXECUTIVE SUMMARY .................................................................................................... 1 GLOBAL PIRACY TRENDS IN 2010 ................................................................................... 3 The Surging PC Market in Emerging Economies............................................................. 3 A Shifting Market Landscape ...................................................................................... 4 Anti-Piracy “Equity” and the Need for Sustained Efforts .................................................... 6 GLOBAL OPINION: DECIDEDLY PRO-IPR, YET CONFUSED ABOUT WHAT IS LEGAL ................... 7 METHODOLOGY............................................................................................................ 12 BSA BLUEPRINT FOR REDUCING SOFTWARE PIRACY ....................................................... 15

CHARTS AND TABLES
Commercial Value of Pirated PC Software........................................................................... 1 Global PC Shipments....................................................................................................... 2 Global PC Software Sales ................................................................................................. 2 Highest and Lowest Piracy Rates ...................................................................................... 3 PC Software Piracy Rates by Region.................................................................................. 4 Economies with Highest Commercial Value of Pirated PC Software ......................................... 5 Commercial Value of Unlicensed PC Software by Region ....................................................... 5 Confusion Over Software Acquisition Channels ..................................................................... 7 PC Software Piracy Rates andCommercial Value of Unlicensed Software ................................ 8 Support for Intellectual Property Rights & Innovation .......................................................... 10

EIGHTH ANNUAL BSA GLOBAL SOFTWARE PIRACY STUDY

EXECUTIVE SUMMARY

In the global market for personal computers, 2010 was a watershed year. For the first time, PC shipments to emerging economiesoutpaced those to mature markets, 174 million to 173 million. On that score, at least, 2010 might fairly be considered the year in which the world’s emerging economies stopped merely emerging: They have fully arrived.
But this turning point also underscores how emerging economies have become the driving force behind PC software piracy. • The commercial value of software piracy grew 14 percent globallylast year to a record total of $58.8 billion, according to the 2010 BSA Global Software Piracy Study. • Just six years ago, the commercial value of the PC software that was being pirated in emerging economies accounted for less than a third of the world total. Last year, it accounted for more than half — $31.9 billion. This year’s study of PC software piracy is the eighth to be conducted by theBusiness Software Alliance in partnership with IDC, the IT industry’s leading market research and forecasting firm. The 2010 study covers 116 countries and regions using a robust methodology that incorporates 182 discrete data inputs for each. But this year’s study also adds a new dimension: Deeper and richer surveys of PC users in 32 countries, conducted by Ipsos Public Affairs, one of the world’sleading public-opinion research firms. A striking finding is that world opinion comes down firmly in favor of intellectual property (IP) rights. Seven PC users in 10 support paying innovators for their creations to promote more technology advances, while just three in 10 say no company or individual should control technologies that could benefit the rest of society. This is true even in markets with...
Leer documento completo

Regístrate para leer el documento completo.

Estos documentos también te pueden resultar útiles

  • SEGURIDAD INFORMATICA
  • Seguridad Informatica
  • Seguridad Informatica
  • Seguridad Informatica
  • Seguridad informatica
  • Seguridad Informática
  • Seguridad informatica
  • Seguridad informatica

Conviértase en miembro formal de Buenas Tareas

INSCRÍBETE - ES GRATIS