ASSESSMENT OF SOFTWARE USAGE IN SRI LANKA
|
|
|
- Norma Jasmin Simmons
- 10 years ago
- Views:
Transcription
1 ASSESSMENT OF SOFTWARE USAGE IN SRI LANKA SURVEY FINAL REPORT January by Pvt Ltd #3, Galle Road, Colombo 3, Sri Lanka Tel (94 ) 3757, 3757, Fax (94 ) info@skillsinternationallk Website: wwwskillsinternationallk
2 Survey Final Report ACKNOWLEDGEMENT Many people provided invaluable help in numerous ways to complete this study successfully Our greatest debt is obviously, to those heads of institutions and their staff for the contributions and assistance rendered to us in completing the questionnaires and providing valuable information for the study Our gratitude is also extended to MrReshan Dewapura, Chief Executive Officer - Information and Communication Technology Agency of Sri Lanka (ICTA) for his invaluable contribution to make the study a success, MrJayantha Fernando, Director/ Legal Advisor ICTA for his guidance and providing opportunity to complete the study successfully and Mr Jagath Seneviratna, Programme Head, Monitoring and Evaluation of ICTA for his professional guidance, technical support and encouragement extended to us throughout the study We are also grateful to MrSanjaya Karunasena, Chief Technology Officer and other officers of ICTA who provided invaluable contributions in training our research team We would like to express our special gratitude to all the Field Research Officers and Research Assistants for working with a high level of commitment that enabled us to deliver a quality product on time A special thanks goes to all the others too numerous to mention who provided invaluable help with quantity checking of data, statistical analysis and useful comments towards the successful completion of the study We also acknowledge the contribution by Mr Indika Siriwardena, who provided valuable comments during the report review stage and all the staff seconded from (Pvt) Ltd, who helped in the project from its inception I
3 Survey Final Report TABLE OF CONTENTS Acknowledgement Table of Contents List of Figures List of Tables Abbreviations Executive Summary I II IV VI IX X Introduction Background Types of Piracy 3 Objectives of the Assignment 3 4 Scope of the Assignment 3 5 Expected Outputs/Deliverables of the Survey 4 Review of Relevant Literature 4 3 Methodology 6 3 The sampling framework 6 3 Information Sources for the survey population 7 33 Design of Questionnaires and Field Testing 8 34 Field Survey 35 Awareness Building 36 Activities Planned To Overcome Potential Survey Implementation Errors 37 Limitations of the Survey 38 Data entry and analysis 3 4 Profile of the Respondents 3 4 Profile of the Head Respondents 3 4 Profile of the User Respondents 7 II
4 Survey Final Report 5 Institution Profile 6 Software Usage Pattern 4 6 Security software usage Pattern 7 6 Sources of Supply of Software to the Institutions 3 7 Usage of Licensed & Unlicensed Software 33 7 Analysis of Software Usage Patterns in User Computers 33 7 Sector wise Analysis of User Software 4 8 Awareness on E- laws related to the use of Computers 76 8 Awareness of Head Respondents on E-Laws 76 8 Awareness of User Respondents on E-Laws 78 9 Views and Opinions Expressed by the Respondents on Piracy 79 9 Impact on Country s Economy 79 9 Reasons for using unlicensed software 8 93 Opinions expressed by Head Respondents on the Use of FOSS Opinions expressed by User Respondents on the Use of FOSS 9 Discussion and Conclusions 94 Problem of Piracy 94 Findings of the study 95 Appendixes Appendix I - Software Usage Questionnaire I Appendix II Software Usage Questionnaire II Appendix III Sample selected for the Survey - List of Organizations and contact person Appendix IV References III
5 Survey Final Report List of Figures Figure 4: Gender Profile of the Head Respondents 4 Figure 4: Sector wise Analysis of the Head Respondents 5 Figure 43: Gender analysis of the User Respondents 8 Figure 44: Age Profile of User Respondents 9 Figure 6: Software Usages in Surveyed Institution 5 Figure 6 Distribution of Desktop Applications 7 Figure 63 Distribution of Database Software 9 Figure 64 Distribution of Middleware 3 Figure 65 Distributions of Business Applications 3 Figure 66 Distribution of Software Development Tools & Programming Languages 3 Figure 7 Distribution of User Software Categories found in the sample 34 Figure 7 Usage Pattern of Different software Categories in the sample 36 Figure 73 Usage Pattern of Operating Software in User Computers 37 Figure74 Usage Pattern of Unlicensed software in User computers-sector wise 45 Figure 75 Use of Unlicensed software in user computers Sector and software category wise 46 Figure 76 Sector wise Usage of Unlicensed Operating Systems & related Software in User Computers 49 Figure 77 Sector wise Usage of Unlicensed Desktop Applications in User Computers 5 Figure 78 Sector wise Usage of Unlicensed Security Software in user computers 54 Figure 79 Sector wise Usage of Unlicensed Database Software in the User Computers 56 Figure 7 Sector wise usage of Unlicensed Middleware in user computers 58 Figure 7 Sector wise Usage of Unlicensed Software Development Tools in user computers 6 Figure 7 Sector wise Usage of Unlicensed Statistical Applications in user computers 63 Figure 73 Usage pattern of Windows Operating Systems in Surveyed PCs 64 IV
6 Survey Final Report Figure 8: Awareness on Intellectual Property Act by the Heads in Different Sectors 76 Figure 8 Awareness on Computer Crimes Act by Heads of different Sectors 77 Figure 83: Awareness on E-Transactions Act by Heads of different Sectors 77 Figure 9: Statement No - Responses Received from the head respondents from Different Sectors 8 Figure 9: Statement No - Responses Received from the head respondents from Different Sectors 8 Figure 93: Statement No 3 - Responses Received from the Head respondents from Different Sectors 8 Figure 94: Statement No 4 - Responses Received from the head respondents from Different Sectors 83 Figure 95: Statement No 5 - Responses Received from the head respondents from Different Sectors 83 Figure 96: Statement No 4 - Responses Received from the head respondents from Different Sectors 84 Figure 97: Statement No 7 - Responses Received from the Head Respondents from Different Sectors 85 Figure 98: Responses received from Education sector 88 Figure 99: Responses received from IT sector 89 Figure 9: Responses received from Government sector 9 Figure 9: Responses received from Private sector 9 V
7 Survey Final Report List of Tables Table 3 Information Sources for the Survey Population 7 Table 3 Summary Details of the Sample 8 Table 33 Respondents of the Survey Table 34: Questionnaire Response rate Table 4: No of Heads and Users interviewed 3 Table 4: Ages and Gender Profile of Head Respondents 4 Table 43: Academic Qualification of Head Respondents 5 Table 44: IT Professional Qualifications of Head Respondents 6 Table 45: Job Designations of Head Respondents 7 Table 46: Age and Gender profile of the User Respondents 8 Table 47: Educational Qualifications of User Respondents 9 Table 48: Type of Training received by User Respondents Table 49: IT Qualifications of User Respondents Table 5: Number of Domains and Websites maintained by responded Institutions Table 5: Local Area Networks (LAN) and network connections maintained by the Institutions Table 53: E -mail accounts maintained by the institutions 3 Table 54: Types of Connectivity used by Institutions 3 Table 55: Types of IT facilities available in surveyed Institutions 4 Table 6 Usage of Operating Systems & related Software 5 Table6 Usage of Desktop Applications in surveyed institutions 6 Table 63 Security Software Usage Pattern in the institutions 8 Table 64 Usage of Database Software 8 Table 65 Usage of Middleware 9 Table 66 Usage of Business Applications 3 Table 67 Usage of Software Development Tools & Programming Languages 3 Table 68 Sources of Supply of software 3 Table 7 Distribution of user Software Categories in the sample 34 Table 7 Usage Pattern of Different software Categories in the sample 35 Table 73 The Usage pattern of Operating Systems & related Software in User computers 37 VI
8 Survey Final Report Table 74 Usage Pattern of Desktop Applications in User Computers 38 Table 75 Usage Pattern of Security Software in User Computers 39 Table 76 Database Software Usage Pattern in User computers 39 Table 77 Usage Pattern of Middleware in User Computers 4 Table 78 Usage Pattern of Business Applications in User Computers 4 Table 79 Usage Pattern of Software Development Tools & Programming Languages in User Computers 4 Table 7 Usage Pattern of Statistical Applications in User Computers 4 Table7 Sector wise Usage Pattern of Different Software Categories 43 Table 7 Combined Software Usage patterns of Operating, Security and Desktop Applications 44 Table 73 Sector wise Usage Pattern of Operating Systems in User Computers 48 Table 74 Sector wise Usage Pattern of Desktop Applications in User Computers 5 Table 75 Sector wise Usage Pattern of Security Software 53 Table 76 Sector wise Usage Pattern of Database Software in the User Computers 55 Table 77 Sector wise Usage Pattern of Middleware 57 Table 78 Sector wise Usage Pattern of Business Applications in the user computers 59 Table 79 Sector wise Usage Pattern of Software Development Tools & Programming Languages in User Computers 6 Table 7 Sector wise Usage Pattern of Statistical Applications 63 Table 7 Use of Windows Operating Systems in Various PCs 64 Table 7 Usage Pattern of Windows XP Operating Systems in Desktop Computers 65 Table 73 Usage Pattern of Vista Operating System in Desktop Computers 66 Table 74 Usage Pattern of Window 7 Operating System in Desktop Computers 67 Table 75 Use of Window XP Operating Systems in Laptops 68 Table 76 Use of Windows Vista Operating Systems in Laptops 69 Table 77 Use of Windows 7 Operating Systems in Laptops 7 Table 78 Usage pattern of Microsoft Office software in Desktop Computers 7 Table 79 Usage pattern of Microsoft Office Software in Laptops 73 Table 73 Use of Other Desktop Application Software in Desktop Computers 74 Table 73 Use of Other Desktop Application software in Laptops 75 Table 8: Awareness of Head Respondents on E-Laws 76 Table 8: Awareness of User Respondents on E-Laws 78 Table 83: Awareness of User Respondents on E-Laws for different sectors 78 VII
9 Survey Final Report Table 9: Impact of Software piracy on Country s Economy-Opinions expressed by Heads of Institutes 79 Table 9: Opinions Expressed by Head Respondents 8 Table 93: Responses Received for the Statements from Head Respondents 86 Table 94 Responses Received from User Respondents on the use of FOSS 9 VIII
10 Survey Final Report ABBREVIATIONS ACS BSA BCS BPO CCNA CIO DBA FOSS HND ICDL ICT ICTA KII SCJP SPSS TOR Australian Computer Society Business Software Alliance British Computer Society Business Process Outsourcing Cisco Certified Network Associate Chief Innovation Officer Database Administrator Free Open Source Software Higher National Diploma International Computer Driving License Information and Communication Technology Information and Communication Technology Agency Key Informant Interviews Sun Certified Java Programmer Software Package for Social Sciences Terms of Reference IX
11 Survey Final Report EXECUTIVE SUMMARY The objective of this study was to assess the usage level of software in all economic sectors of Sri Lanka Although Sri Lanka enacted the Intellectual Property Act in 3 to safeguard the copyrights of the software developers as well, several studies have shown that the piracy rate in the country remains high despite some reduction in this level in the year To achieve the government s objectives of 75 IT literacy by 6 and turning Sri Lanka into an IT centred knowledge hub and making ICT affordable and accessible to all sectors It is important to see that all these developments take place within the established legal framework Hence, a study of this nature is imperative not only to find out the level of piracy but also to provide more insight into key socio-economic attitudes and behaviours related to the use of unlicensed software so that corrective actions could be taken without hindering the growth of the industry Therefore the purpose of the study was to undertake a survey to identify necessary variables, collect the appropriate data and generate a comprehensive analytical report on unauthorised usage of software in the country The study was conducted by with technical inputs from ICTA In order to obtain relevant data required for the analysis, two surveys were carried out as face-to-face interviews using structured questionnaires To capture the broader picture involved in the use of unlicensed software in an institution, it is essential but not sufficient to obtain relevant information only from the Head /CEO or from the Head of the IT department of the institution Hence, a second questionnaire was developed to gather information from a sample of -5 computer users from each institution concerning the actual practices of the institution in relation to the use of unlicensed software The information gathered from these users was found to be more reliable since the enumerators were able to meet them individually and explain the national importance of the study They also established very cordial relationships with these respondents and managed to obtain accurate information This was revealed when users information was compared with the information provided by their heads In addition to these surveys, Key Informant Interviews (KIIs) were conducted to gather complementary and qualitative information required for the study X
12 Survey Final Report A comprehensive sampling frame was developed by including all vital sectors of the economy These institutions were grouped into four sectors namely, Education, IT, Private and the Government A stratified sampling method was adopted to select equal sample sizes from each sector The heads of selected institutions were interviewed by trained enumerators and further -5 computer users from each of the institutions were randomly selected to interview and complete the user questionnaire Considering the sensitive nature of this study, special precautions were taken to educate the Heads of Institutions assuring the confidentiality of the information The interviews were conducted on a voluntary basis and the institutions that were not willing to participate were left out Even some institutions that consented to participate in the survey opted to refrain from answering some questions citing them as confidential information The information used for the study was based purely on what was made available to the consultants and no physical verifications were carried out to ascertain the accuracy of information provided by the institutions or the computer users The key findings of the study are summarised below The study was conducted to generate and create a better understanding on the use of unlicensed software and to study the underlying factors and current trends on the subject Due to the complexities of the practices involved in different institutions, it is not appropriate to express piracy level as a single percentage value Piracy values change drastically between sectors, software categories and institutions In order to make these studies meaningful, software were categorized as Operating Systems & related Software Desktop Applications, 3Security Software, 4Database Software, 5Middleware 6Business Applications, 7Software Development Tools & Programming Languages and 8Statistical Applications Further, all software were distinctly identified either as licensed software or unlicensed software based on whether the software is registered with the copyright owner Under this division, Free Open Source Software also fell into the licensed category XI
13 Survey Final Report 3 When similar information provided by the Heads of the institutions and users of the same institutions was compared, it was revealed that in some institutions the management had not provided accurate information This may have been due to the fact that consideration to the reputation of the organization was considered with possible legal implications arising later This was noted when some institutions informed us that they needed to obtain even board approvals before providing the required information Hence, the information provided by the 66 users was considered for arriving at the conclusion The information provided by the Heads was useful in providing supplementary information to broaden the study area 4 The 66 user computers had recorded 77 different types of software and were categorized as mentioned above The mostly used software category was found to be Desktop Applications (3) followed by Operating Systems & related software (7), Security Software (66), Software Development Tools & Programming Languages (5), Database Software (44), Business Applications (3), Middleware (8 ) and Statistical Applications (6) 5 The analysis of user information revealed that the overall use of licensed software was 744 while the unlicensed software accounted for the balance 56 6 Further, when different categories were considered, Desktop Applications had the unlicensed software usage of 36, Software Development Tools & Programming Languages 73 and Operating Systems, Security Software and Statistical Applications had a percentage of, and 5 respectively Database software had an unlicensed percentage of, while middleware category had 4 of its software unlicensed In case of Business Applications, all software were found to be licensed copies 7 In sector wise analysis, it was found that the use of unlicensed software was highest in the Education sector (49) followed by IT sector (8), Government sector (47) and Private sector (43) 8 Out of the 8 categories of software, 85 of the total software usage fell into 3 categories namely - Operating Systems & related Software, Desktop Applications and Security Software When combined values were derived, it was found that licensed software usage XII
14 Survey Final Report was 77 and the unlicensed level was 73 Here again, the education sector recorded an unlicensed usage level of 43 followed by IT sector 38, Government sector 44 and Private sector 57 9 Out of the total Operating Systems & related Software found in the user computers, 93 were Microsoft Windows while 6 consisted of Linux based Operating Systems and 7 consisted of VM Ware Operating systems Further analysis indicated that 764 of the Microsoft Windows versions were licensed and the balance 36 carried various unlicensed Windows versions Sector wise analysis indicated that the Education sector had 77 of its Microsoft Windows software unlicensed, while the Government sector had recorded 5, IT sector & and the Private sector 89 In the Desktop Applications category too, the Education sector recorded the highest percentage of unlicensed software amounting to 467 followed by the Government sector 399, IT sector 336 and the Private sector 63 Of the total of 8 software packages found under the Desktop category, 79 were found to be Microsoft Office packages, 7 were Adobe Photoshop, 55 Open Office and 3 were Adobe PageMaker The overall use of unlicensed Microsoft Office packages were 338 while the level of unlicensed Microsoft Office was found to be 4 in the Education sector, 38 in Government sector, 349 in IT sector and 47 in the Private sector 3 It was also noted that Open Source Office Packages such as Open Office and Libre Office accounted for 73 of the total Desktop Applications Apart from this, institutions also used licensed software such as Kingsoft Office & Power Office 4 The other widely used Desktop Applications were Adobe Photoshop, with an unlicensed usage level of 63, Adobe PageMaker 54 and Adobe Coral Draw The information gathered from Institutional Heads or IT Heads provided data regarding the total number of PCs and Laptops and the usage patterns of software This information was analyzed to provide valuable supplementary data which helped to broaden the view of the software usage patterns XIII
15 Survey Final Report 6 As expected, the most popular Operating Software used by these institutions was Microsoft Windows Out of a total of 3,66 desktops that were using different Windows Operating Systems, 69 was found to be using Windows XP, 33 Vista and 76 Windows 7 Use of unlicensed Windows XP was 6 in Pentium III machines, 7 in Pentium IV machines, 6 in Dual Core Machines, 4 in Core machines and in Core i3, i5 & i7 machines This clearly demonstrates that institutions are inclined towards buying licensed Operating Systems with the new purchases of hardware but were not replacing the Operating Systems in the older machines As such there was a back log of unlicensed copies The piracy levels of Microsoft Vista and Windows 7 were 3 and 3 respectively 7 The study also covered,3 laptops that were using Microsoft Windows Operating Systems and observed that 5 of the machines used Windows XP while 3 were using Vista and the balance 469 were using Windows 7 Here again, a declining trend of piracy in the newer machines was clearly evident As such, the unlicensed usage of Windows XP was 34 in Pentium IV machines, 7 in Dual Core machines, 3 in Core machines and 7 in Core i3,i5 & i7 machines The unlicensed usage levels of Windows Vista and Windows 7 were and 3 respectively 8 Out of 3,66 desktops that used Microsoft, 7 had MS Office 3 and 59 had MS Office 7 while the balance 4 carried MS Office The use of unlicensed MS Office 3 was 4 while MS Office 7 recorded 3, and MS Office was 3 Here again, the observation was that the use of unlicensed Microsoft Office demonstrated a decline 9 In the,3 laptops surveyed, 38 had MS Office 3, 548 MS Office 7 and 34 MS Office Of the laptops using MS Office 3, 4 were found to be using unlicensed copies while 5 MS Office 7 were also found to be unlicensed However, of the laptops using MS Office had licensed versions This again shows the emerging trend of institutions opting for licensed software with new purchases The other widely used Desktop Applications found in a smaller number of machines were Photoshop and PageMaker However, it was observed that 5 of the Adobe Photoshop Software was unlicensed, while 67 of the Adobe PageMaker Software was also unlicensed The similar percentages were observed in user machines as well XIV
16 Survey Final Report There was a clear indication that institutions are firmly in favour of Intellectual Property Rights, as 95 of the institution Heads interviewed agreed that each computer should have a licensed copy of the software They further disagreed with the practice of using single licensed copy on multiple computers in an office This demonstrates the views held by the Heads that innovators should be paid for their creations as it provides incentives for further advancement in technology Most of the Head respondents accounting to 8 of the total, agreed that the use of FOSS is more economical and 5 believed that in the long run, it is better to switch to FOSS than to use unlicensed software This is a clear indication that using FOSS is definitely the most preferred and acceptable option to the use of unlicensed software 3 Also 65 of the Head respondents agreed that FOSS is equally as good as licensed software and 53 believed that FOSS could be easily combined with existing proprietary software However, 59 expressed the difficulty of training staff to FOSS as they are already familiar with proprietary software Although some expressed the view that FOSS is less efficient as compared to proprietary software, creating awareness of its advantages may influence at least those who find it difficult to pay for proprietary software to shift to FOSS thus avoiding the use of pirated software Many expressed fear to adapt to the use of FOSS due to the lack of professional support available to users in case of technical difficulty Some even suggested that ICTA should have a resource unit to assist FOSS users in such situations 4 Of the total surveyed, 78 of the Head respondents agreed that institutions are unable to pay high licensing fee for proprietary software Some have indicated that in certain developing countries, such as in India, proprietary software is available at much cheaper rates and suggested that Sri Lanka should also explore the possibility of obtaining licensed software at an affordable price However, Microsoft representatives refuted this allegation and confirmed that costs of their software in Sri Lanka is the same as compared to other countries in the region They also mentioned about the very special rates available to students, universities, approved training institutions and state sector for their software However, it appeared during the survey, that this information has not spread to these sectors correctly XV
17 Survey Final Report 5 Of the hundred Heads interviewed, only 35 indicated that they are fully aware of the provisions of the Intellectual Property Act which provides required guidelines to the use of licensed software The lack of proper understanding of this law may have an impact on the use of pirated software in the country Therefore, programmes may be organised to create awareness on Intellectual Property Law and other computer related legislations among institutions 6 The majority of Head respondents felt that the levels of piracy prevalent in Sri Lanka could harm the reputation of the country and may affect foreign investment Hence the opinion was it is important to take steps to prevent the use of unlicensed software 7 In contrast to the institutional Heads, a significant percentage of user respondents were found to be unaware of FOSS and the Intellectual Property Act This shows the need to create awareness among computer users in these areas and the need for educating computer users 8 Some organisations as an alternate to the use of unlicensed software have opted to buy cheaper licensed alternative software such as ZW CAD and Kingsoft Office at a fraction of the cost of its expensive counterpart software This indicates that people are willing to use licensed software if available at an affordable price An institution has successfully negotiated for a popular virus guard at 35 of the normal cost by signing a volume license for three years This shows that institutions are exploring different ways and means to run their operations economically within the legal frame work If there is a forum for the Heads to meet each other and share their experiences it could lead the organisation towards the use of licensed software without losing the momentum gained by the IT usage in the country 9 The most crucial factor faced by the institutions is the total cost of replacing all unlicensed software from old machines with licensed software Some organisations having 6-7 machines need over Rs million for such a switch over It was observed that one large institution has successfully replaced the unlicensed software with FOSS and has reported saving over Rs 5 million However, the shift has prompted the proprietary software company to offer an extremely attractive corporate package to buy their proprietary software XVI
18 Survey Final Report 3 The Government of Sri Lanka (GOSL) is committed to control the unauthorised use of software and has taken active measures to prevent piracy in the country However, this cannot be controlled only by legal means A carefully planned multi pronged approach is needed to reduce the level of software piracy without affecting the growth of IT literacy in the country On one hand nobody could condone an illegal act and allow it to flourish in our society On the other hand if the costs of licensing are beyond the reach of an average user, it can be a discouraging factor for the growth of IT in all sectors In this regard FOSS can play a crucial role Further advocacy and popularisation is needed to take FOSS to the masses The country s national universities are on the right track by promoting FOSS among the undergraduates In conclusion, it is encouraging to note a declining trend in software piracy, as most institutions are opting for licensed software with the purchase of new machines The problem faced by most institutions is the replacement of the older machines with licensed software It is also observed that piracy is less in cheaper software such as Microsoft Operating Systems and the piracy is high in more expensive software ie Microsoft Office Some institutions also indicated that it is unfair to charge international rates for proprietary software from a developing country like Sri Lanka and that negotiation should take place to secure concessionary rates Ironically, although ICT is considered a shortcut to accessing information, the lack of knowledge exhibited by the respondents and at times by the Heads of institutions, indicated the need for more awareness on the legal and other economic ramifications of software piracy Hence, it is proposed that ICTA adopts a more comprehensive information sharing and awareness creation strategy to inform different economic sectors and general public at large, particularly the youth, on the implications of software piracy Given the relatively short time period, the range of the survey was controlled and restricted to specific sectors While we recognise this is a limitation faced in any type of survey, by conducting surveys at regular intervals, ICTA could monitor and assess the current context with regard to software piracy in Sri Lanka This would allow a better understanding of the trends in various sectors and would assist in developing appropriate strategies to minimise the problem XVII
19 Survey Final Report INTRODUCTION Background Computers and software have become essential tools in our businesses, schools, factories, banks and personal lives At the beginning, computer companies offered the total system comprising hardware, software and training thus restricting the compatibility of software to their own machines However, this situation changed drastically in 97s, leading to un-bundling of hardware and software leading to the manufacture of cheaper computers and the emergence of independent software development Further, the introduction of personal computers (PC) by IBM in the early 98s made PC an easy-to-use but also a powerful tool in business applications With the growth of PC usage, software developers began to concentrate more on user-friendly programmes targeting the majority of endusers The PC based local area networks (LAN) also became as powerful as the mainframes and also extended the scope of the software development leading to the emergence of extremely strong software industry However, like any other technology, software technology is also severely affected by the breach of intellectual property rights (of the creator) as a result of unauthorised copying or pirating of software Software piracy is defined as the unauthorised copying or distribution of copyrighted software This can be done by copying, downloading, sharing, selling, or installing multiple copies onto personal or work computers When a consumer purchases software, they are actually purchasing a license to use it, not the actual software The license condition stipulates how many times the purchaser can install the software If more copies of the software than the license permits are used, it amounts to piracy and hence, breaking of the law Whether the consumer is casually making a few copies for friends, loaning CDs, downloading or distributing pirated software from the Internet, or buying a single software program and then installing it on multiple computers, the consumer is committing copyright infringement and therefore, software piracy Another type of piracy is when licensed software is illegally obtained through internet channels using peer-to-peer file sharing or downloads from pirate websites that offer free software Pirated products often fail to function properly or worse, are capable of infecting the users PSs with malware that has the potential to cause serious damage When software is pirated, consumers, software developers, and resellers are harmed On the other hand, software piracy increases the risk of the consumer s computer being corrupted by defective software Those who provide defective and illegal software do not tend to provide after sales technical support Pirated software usually has inadequate documentation, which prevents consumers from enjoying the full benefits of the software package In addition, consumers are unable to take advantage of technical support and product upgrades from the original developers, which are typically available to legitimate registered users Pirated software can also cost consumers loss of time and money According to some studies carried out by Business Software Alliance (BSA) almost 4 of the all software installed in PCs is obtained from illegal means The report also says that for every $ worth of legitimate software sold in 9, an additional $75 worth of unlicensed software makes its way into the market When piracy takes place software developers lose revenue not only from current products but also from future programs When software is sold, most developers invest a portion of the revenue
20 Survey Final Report into future research and development activities to develop better software packages Hence, when software is pirated, not only does the software developer lose revenue from the current sales of their products, but also hinders the development of new software The economic impact of software piracy goes beyond the retail value of pirated software One among the many negative consequences of software piracy is the crippling of the emerging local software industry Other significant outcomes include loss of tax revenue and jobs due to the lack of a legitimate market and decreased business productivity from using defective and unsupported software Types of Piracy Software piracy occurs in many forms which include operating systems, systems software, such as databases and security packages, and applications software Some of the common types of piracy are described below End User Piracy Reseller Piracy Using multiple copies of a single software package on several different systems or distributing registered or licensed copies of software to others is called end user piracy Another common form of end user piracy is when a cracked version of the software is used to install in a computer By hacking into the software and disabling the copy protection or illegally generating key codes that unlocks the trial version making the software a registered leads to the creation of a cracked version Reseller piracy occurs when an unscrupulous reseller distributes multiple copies of a single software package to different customers; this includes preloading systems with software without providing original manuals and diskettes Reseller piracy also occurs when resellers knowingly sell counterfeit versions of software to unsuspecting customers Indications of reseller piracy are multiple users with the same serial number, lack of original documentation or an incomplete set, and non-matching documentation Trademark/Trade Name Infringement Infringement occurs when an individual or dealer claims to be authorized either as a technician, support provider or reseller, or is improperly using a trademark or trade name BBS/Internet Piracy BBS/ Internet Piracy occur when there is an electronic transfer of copyrighted software If system operators and/or users upload or download copyrighted software and materials onto or from bulletin boards or the Internet for others to copy and use without the proper license
21 Survey Final Report it is considered piracy Often hackers will distribute or sell the hacked software or cracked keys The developer does not receive any money for the software the hacker distributed This is an infringement on the developer's copyright Another technique used by software pirates is to illegally obtain a registered copy of the software Pirates purchase the software once and use it on multiple computers Purchasing software with a stolen credit card is another form of software piracy Unfortunately there are many kinds of software piracy that has hampered the software industry 3 Objectives of the Assignment The overall objective of the study was to assess the usage level of software in all economic sectors of Sri Lanka The purpose was to undertake a survey which identifies the necessary variables, collect appropriate data, and generate a comprehensive analytical report In order to achieve the objective of the study the following activities were carried out: Defining an appropriate sample frame Designing the questionnaires to obtain data on the following: a Awareness of the software license or unauthorised usage b Methods of obtaining unauthorised software c Types of unauthorised software in use d Factors influencing the use unauthorised software e Problems/consequences faced by users of unauthorised software f Demography of the respondents g Factors affecting the controlling of usage of unauthorized software 4 Scope of the Assignment The terms of reference provided by the client (ICTA) revealed that the consultant would undertake the following activities to accomplish the proposed task Meet with representatives of ICTA and gather details on the requirements for survey implementation and its time schedule Collect all documentation necessary to first analyze and understand the programme and conduct a document/literature review Prepare plans for survey implementation and training of staff to conduct interviews Develop a survey implementation plan outlining all the steps involved in the implementation of the survey, including a project time schedule, resource plan, and data collection plan 3
22 Survey Final Report 5 Expected Outputs/Deliverables of the Survey The key product (deliverable) expected from this outcome evaluation is a comprehensive analytical report in English that should, at least, include the following content: Executive summary Introduction Description of the evaluation methodology An in-depth analysis of the situation with regard to the outcome, the outputs and the partnership strategy Key findings (including best practices and lessons learned) Conclusions and recommendations Annexes (ietor, field visits, people interviewed, documents reviewed, etc) REVIEW OF RELEVANT LITERATURE Software piracy is a global phenomenon and in most countries copyright laws have been enacted to combat this illegal activity In Sri Lanka, Intellectual Property Act No 36 of 3, which replaced the Code of Intellectual Property Act No 5 of 979, contains many features to protect the rights of the creators, owners, and inventors of proprietary software from unauthorized use In Section 5 of the Act, a computer programme is defined as a set of instructions expressed in words, codes, schemes or any other form, which is capable, when incorporated in a medium that a computer can read of causing a computer to perform or achieve a particular task or result Use of software without a valid license or making modifications and carrying out customizations to licensed software without adhering to the license conditions is in contravention of the Act and would result in legal penalties as prescribed in the act There is also a provision under Section 7 of the same Act to the reproduction of a single copy of a computer programme by the lawful owner of the copy without the authorization of the owner of the copyright for archival purposes, in order to replace the lawfully owned copy of the computer programme should it be lost or destroyed or be rendered unusable However, such a copy needs to be destroyed in the event that the continued possession of the copy ceases to be lawful Sri Lanka has also introduced two other important legislations towards safe guarding the legitimate use of computers for businesses and personal use These are the Computer Crimes Act No 4 of 7 and the Electronic Transactions Act of 6 Under the Computer Crimes Act No 4 of 7, any cyber-crime such as unauthorized access to a computer, computer programme, data or information and unauthorized use of a computer without authorization is an offence and is liable for prosecution 4
23 Survey Final Report The ICTA has also formulated and published a document titled Policy and Procedures for Information and Communication Technology Usage in Government (e-government Policy) which provides critical guidelines to government officials towards achieving the objectives of e-government Section 4 states: Government organizations should use only licensed software; such licenses can be for either proprietary software, or for open source software Use of software without a valid license or making modifications and carrying out customizations to licensed software without adhering to the license conditions would be contrary to the Intellectual Property Act of 3 and would result in legal penalties (both criminal and civil liability) This clearly demonstrates the government s commitment towards implementing the Intellectual Property law in the State sector Further, the Criminal Investigation Department of the Sri Lanka Police has established a special Anti-Piracy and Counterfeit unit to enforce the law and legal action has already been instituted against companies using pirated and unlicensed software in their businesses Hence, it is very clear that government policy is to expand and promote ICT literacy within the accepted legal framework The national intellectual property office, ICTA, and other enforcement agencies have also carried out awareness and education initiatives to encourage the use of license software and curtail piracy According to studies carried out by Business Software Alliance covering 6 countries, the installation of unlicensed software on PCs, laptops and notebooks in was 4 while the commercial value of such pirated software stood at US $ 588 billion When compared to the previous year s values the piracy rate has decreased by while the commercial value has increased by 43 due to the increased volume of PC and laptop sales The report further points out that while the piracy rate dropped in 5 countries, it has increased only in 5 countries This indicates that people are beginning to understand and appreciate the value of intellectual property and its role in driving economic growth However, according to the same source, the piracy rate in Asia Pacific countries has increased from 59 in 9 to 6 in the In spite of this increase in the region, the piracy rate in Sri Lanka has reduced by three percentage points, recording the biggest drop in software piracy in Asia This remarkable achievement has been attributed to the consistent efforts of the National Intellectual Property office, ICTA and policy initiatives, awareness, education and legal enforcement by the authorities Although the piracy rate in Sri Lanka had reduced by 3 in, the level of piracy according to BSA studies stands at 86 However, this figure is highly controversial and needs to be verified with our own studies As per National ICT Workforce Survey Report published by ICTA in January, the proprietary software usage in all sectors in Sri Lanka is very high with an average of 86 The study covered 5 institutions, including IT and Non-IT companies, BPOs, ITEs and government ministries, departments and statutory institutions The report further indicates that a significant 3 use open source software in their institutions 5
24 Survey Final Report The ICT Usage in Government Organizations Survey (ICTUGS) carried out a survey in 36 Government Institutions This survey included Provincial Council Ministries, District Secretariats and Divisional Secretariats and outlined useful information regarding the software usage pattern in the State sector According to the findings, documented in the Final Report submitted in March, in the state sector, more than 6 of the software used in PCs/Laptops and around 9 of the software used in servers were licensed Hence, the usage of unlicensed software among all organizations in the study was around 4 The report also indicated that almost half the organizations surveyed used Free Open Source Software (FOSS) and the level of FOSS usage was as high as 75 in Statutory Organizations and 73 in District Secretariats 3 METHODOLOGY Given the sensitive nature and limited timeframe provided, the consultants used a combination of participatory methods and tools for the collecting of information for the study The data collection was done from both primary and secondary sources The study used both qualitative and quantitative methods from primary sources Quantitative data was collected using techniques such as Key Informants Interviews (KII), interactive discussions, and direct observations Most of the quantitative data was collected through survey questionnaires specifically designed for this purpose 3 The sampling framework A comprehensive sampling frame was developed to include all the economic sectors relevant to the survey covering the following sub sectors:- Education sector IT sector Private sector Government sector state universities, degree awarding and non-degree awarding private institutions and government technical colleges ICT Industry, software and hardware vendors and IT training institutes banks, hotels, services, and tour operators; whole-sale and retail-trade, manufacturing institutions and media institutions ministries, departments and statutory bodies A comprehensive list of organisations was developed by using all the available sources mainly from lists produced by Chambers and Industry Associations and telephone directories The government list was developed based on the govlk website 6
25 Survey Final Report 3 Information sources for the survey population The following table provides some of the sources from which information was collected to develop a comprehensive sampling frame Table 3 Information Sources for the Survey Population Sub Population Government sector Government Website (wwwgovlk) Information Sources Private sector IT Sector Education sector Ceylon Chamber of Commerce Sri Lanka Export Development Board Board of Investments (BOI) Shipping Association KOMPASS Directory Association of Computer Training Organization in Sri Lanka (ACTOS) Tertiary and Vocational Education Commission (TVEC) Database - National ICT Workforce Survey SLT Rainbow Pages Newspapers SLT Rainbow Pages Based on the comprehensive list of companies, a representative and four stratified sub sets were developed as shown in Table 3 From each sub population a sample of 3 institutions was drawn randomly The following table indicates the sample size for the survey 7
26 Survey Final Report Table 3 Summary Details of the Sample Sub Population Sample size Education sector - Government and private institutions 3 IT Sector- Software and hardware vendors, IT training institutes and software developers 3 Private sector: 3 3 Financial services, Insurance and Banking - Media institutions Freight forwarding services Hotels and Tour operators Wholesale and retail trade Manufacturing 4 Government Sector 3 Ministries Departments Statutory bodies TOTAL 33 Design of questionnaires and field testing Two questionnaires were developed to facilitate face-to-face discussions that were carried out by the specially selected enumerators to obtain accurate responses to the identified variables To ensure the quality and accuracy of data, fairly short questionnaires were used in the survey The questionnaires contained only the essential indicators as information overloading would not be productive The inputs from the client experts (ICTA) were highly valuable to finalise the questionnaires as the client has a strong background and experience on the subject under consideration Questionnaires and checklists were developed to collect all relevant information from each selected institution One comprehensive questionnaire was developed to gain the overall situation of the organisation and was completed with the assistance of key officials of the organisation such as the Chief Executive Officer (CEO), Chief Accountant, IT Director and or IT Manager Another short questionnaire was designed to gather information from -5 users based on individual face-to-face 8
27 Survey Final Report interviews conducted by the enumerators This was considered important as it would provide the actual information on the use of software in individual PCs Questionnaires were carefully prepared with more close-ended questions and mutually exclusive answer categories Most of the questions were of single answer response type while a few contingency questions were also included to prevent the respondents from answering irrelevant questions There were also some matrix questions where Likert response categories were used to get responses for several questions Considering the limitation of responding to close ended questions, a provision was made at the end of the questionnaire to express the frank opinions on the issues raised in the study Such responses provided qualitative inputs to the study and have been summarised and presented in the report All these questionnaires and checklists were finalised in consultation with the relevant officials of ICTA before mobilising the survey team for field study The initial of the completed questionnaires were carefully scrutinised for accuracy and quality Further, a group discussion was held with all enumerators to evaluate the quality of the completed questionnaires and to resolve any difficulties faced by them Based on the feedback received, necessary modifications were carried out to the mode of questioning To facilitate direct observations, a checklist was developed and enumerators were trained to record their own observations and present a one-page report as an addendum to the questionnaire Out of two methods of administering survey questionnaires, the consultants preferred to adopt the interview survey method where interviewing was carried out in a face-to face encounter by a trained enumerator conversant with the questions The main advantage in this method was that the interviewer could clarify matters thereby obtaining correct and relevant responses to the questions If the respondent misunderstood the intent of a question or indicated that he or she did not understand, the interviewer was able to provide the necessary clarification thereby obtaining the relevant responses This helped to decrease the number of don t knows and blank answers Further, the interviewers were also able to make important observations besides the usual responses to questions asked at the interview For example, in certain instances when users were unable to determine the processor type used in her/his computer, the enumerator was able to verify it Even in the case of open source software, some users were unaware as to what category the software belonged Hence, the use of enumerators with IT literacy was extremely helpful in obtaining accurate information from the respondents Given the sensitive nature of the topic, methods such as focus group discussions were deemed inappropriate as this would involve a common discussion in an open forum About 5 senior officers from software vendors were interviewed in order to capture the alternative perspective The overall findings of KIIs were incorporated to this report as appropriate For these interviews, Key Informant Techniques were used 9
28 Survey Final Report Table 33 Respondents of the Survey: CATEGORY AREAS EVALUATED TECHNIQUE Head of the organizations/ IT Manager 5- employees per organisation Representatives from software vendors Observation and inspection Availability of number of licenses, types of software available, number of machines available etc, reasons for not having licenses Whether licenses are available to the software used by employees, if they were aware about IPR and other laws and software licenses etc Measures implemented to control piracy rate Whether the licenses were available Face-to-face interviews Face-to-face interviews Key informal interviews Observation schedule 34 Field Survey Most survey research methods bring advantages and disadvantages The advantages of face to face interview methods include the following: Obtaining information from a large number of respondents Conducting personal interviews at a time convenient for respondents Acquiring data as inexpensively as possible The disadvantages include: Volunteer bias Interviewer bias Distortion Volunteer bias occurs when a sample of volunteers are not representative of the general population Interviewer bias occurs when an interviewer's expectations or insignificant gestures (eg smiling) inadvertently influence responses one way or the other Distortion occurs when a respondent does not respond to questions honestly In order to minimise these biases and to achieve a very high level of responses to the questionnaire, extensive training programmes were conducted by a qualified resource team In the first instance, only graduates or undergraduates with a strong IT background and who were conversant with computer hardware, software and licensing requirements were selected as the enumerators
29 Survey Final Report Six training sessions were conducted by experts from ICTA to provide the required information about the role of ICTA and its programmes The enumerators were also briefed about the ICT related laws, types of software licenses, types of piracy, studies conducted by BSA and the method of winning confidence of the respondents before the commencement of an interview During the training session, each enumerator was provided an opportunity to conduct mock interviews through role plays using the questionnaires They were thoroughly trained on survey methodologies and approaches Special attention was paid on how to approach the respondents and carry out discussions to match the local environment They were also trained on how to develop a strong rapport with respondents in collecting of information whilst ensuring data quality and reliability 35 Awareness building Awareness programmes for the selected institutions were conducted by sending letters, s and making contact by phone The heads of organisations were also informed of the purpose and advantages of the study by a special letter addressed to them by the Chief Executive Officer of ICTA Confidence was built with the respondents by guaranteeing the confidentiality of the information provided during the study 36 Activities planned to overcome potential survey implementation errors The non response errors in surveys were considered one of the key impediments that could seriously affect the quality of the survey This would occur due to two reasons: the fact that selected respondents refuse to participate in the survey due to various reasons This could be handled at the initial stages to a certain extent through awareness and motivation The second reason could be that the questionnaires are often not filled properly or fully This can largely be attributed to the fact that the enumerators are not properly trained The following procedures were undertaken to overcome these errors: Employing qualified and experienced field staff Provision of effective and study-specific training to survey staff Holding regular follow- up meetings with enumerators Data cleaning and quality checking Close monitoring of data entry process with random checking of entered data
30 Survey Final Report 37 Limitations of the survey The major limitation faced by the consultants was the difficulty of getting a confirmed appointment from the institution within the limited timeframe that was available for the study Even after taking all possible steps to provide information and guaranteeing absolute confidentiality, around 3 institutions failed to respond positively to our request in obtaining an appointment Some institutions simply declined to participate in the survey while others gave various excuses to avoid participation Some government institutions also failed to respond positively to our request Several other institutions refused to provide users for the survey and only the head questionnaire was filled It was felt that the institution that did not co-operate with us were suspicious about the study and considered possible legal implications The institutions having large number of computers found it difficult to give details of the computers and software on the first day and enumerators had to visit these institutions several times to compile the required information The information appearing in this report is based on data provided by the organisations and no physical verifications were carried out to check the accuracy of the data Some of the larger organisations involved in multiple services/businesses had one centralised IT support division and this in turn posed some difficulties in categorising these institutions into sub sectors The study had to be limited to institutions due to time and resource constraints Although the consultants were able to cover a number of important sub sectors, the study was limited only to Colombo Even in the government sector, Provincial Councils and District Secretariats were not covered due the limited timeframe available for the completion of the study It is suggested that the next study should include a much wider coverage of the economy Table No 34: Questionnaire Response Rate Sector Sample selected Responses received Head questionnaires Completed User questionnaires Completed Education sector 9 IT sector Private sector Government TOTAL 3 66
31 Survey Final Report 3 8 Data entry and analysis Completed questionnaire were carefully scrutinised by the quality control expert and missing items were completed before entering into the database The programme Epidata was used to enter questionnaire information and SPSS statistical software was used to analyse and obtain the required outputs 4 PROFILE OF THE RESPONDENTS The first questionnaire was completed with the help of the CEO, CIO, Director/Manager IT or the nominee appointed by head of the organisation The questionnaire contained comprehensive information gathering tool to get an overall perspective of the institution s views, policies and practices regarding the use of software The second questionnaires were completed by enumerators after meeting 5 computer users from each organization The enumerators were able to develop a close rapport with these users and were able to explain the national importance of this study As a result, more reliable information about their software usage patterns was obtained In total 66 user questionnaires were analysed in this study Table 4 No of Heads and Users interviewed No interviewed No interviewed Sector Institution Heads Computer Users Education 9 4 IT Private Government Profile of the Head Respondents The most striking feature of the key officials who provided the necessary inputs to complete the Head Questionnaire was that 87 of them were males It was also observed that more than 5 of them were below 4 years Table 4 provides the full age and gender profiles of the Head Respondents in the institutions surveyed 3
32 Survey Final Report Table 4 Age and Gender Profiles of Head Respondents Categories Gender Male Female years Age Category (years) Under Figure 4 Gender and Age Profile of the Head Respondents 4
33 Survey Final Report Figure 4 Sector wise Analysis of the Head Respondents Age Category The highest percentage of younger heads was found in the education sector while the IT sector also had 5 of head respondents below the age of 4 years It is abundantly clear that IT as an emerging sector has younger heads Table 43 Academic Qualification of Head Respondents Qualification PhD Masters Postgraduate Diploma Bachelor's Degree Higher National Diploma GCE A/L Others Sector Education IT Private Government
34 Survey Final Report As clearly seen from the Table 43 almost 9 of the respondents have either a Bachelor s or Higher Degrees in their chosen fields Qualification Table 44 IT Professional Qualifications of Head Respondents Education IT Private Government British Computer Society 8 7 Australian Computer Society Microsoft Certifications Cisco Certified Network Associate/ Cisco Certified Network Professional 3 Sun Certified Java Programming 4 3 Charted Information Technology Professional 3 4 Database administrator (DBA) 4 3 BSc Project Management Professional (PMP) IT Master s Degree Member of the Institute of Electrical & Electronic Engineers (MIEEE) 3 IT Higher National Diploma 7 9 No IT Qualifications
35 Survey Final Report Table 45 Job Designations of Head Respondents Designation Chief Executive Officer Senior Assistant Secretary Chief Information/Innovation Officer Education IT Private Government Head of IT Department Deputy Head of IT Department IT Engineer Senior Executive System Analyst / Project Manager / Team Leader As indicated in information presented in the tables above, the respondent Heads of Institutions had the necessary IT qualifications and experiences to provide not only the data related to their institutions but also provide expert opinions on the subject under assessment 4Profile of the user respondents Apart from the institution head, randomly selected staff members who are computer users with sufficient knowledge on IT were selected to complete the second questionnaire Although it was planned to interview -5 users from each institution, some institutions refused to provide their staff for interviewing while others limited the numbers to a few As a result, only a total of 66 users were available for the study The age and gender profiles of these respondents are given in Table 46 As seen from the table, 77 of the respondents are below 4 years of age and 6 of the total user respondents are males There was only one respondent who was over 6 years 7
36 Survey Final Report Figure 43 Gender Analysis of User Respondents Table 46 Age and Gender profile of the User Respondents Age Gender Education Private Government IT sector sector Sector Sector No No No No Under Over Male Female No
37 Survey Final Report Figure 44 Age Profile of User Respondents PhD Masters Qualification Post Graduate Diploma Bachelor s Degree HND GCE A/L Diploma level Certificate level GCE O/L Table 47 Educational Qualifications of User Respondents Education IT Private Government Other professional qualifications ACA AAT CIMA Charted Accountant Others SECTOR Nos
38 Survey Final Report The selected user respondents were highly qualified officers and detailed analysis is shown in Table 47 Out of the total 66 respondents, 567 possessed bachelor s degrees or a postgraduate qualification Several others had professional accountancy qualifications, diplomas and certifications Most of these user respondents had important IT qualifications and the details are shown in Table 47 There were some respondents who had Master s degrees in IT while others had IT degrees, diplomas, certificates and various other memberships However, only 7 of the respondents have indicated their IT qualification while 8 of the respondents have not responded to this question In light of the high level of educational and IT qualifications of these user respondents, it is safe to assume that opinions and views expressed by them reflect the general perceptions of the average computer user Apart from the close-ended questions that were included in their questionnaire, an opportunity was given to these user respondents to express their views on software licensing and piracy These comments are summarised and presented in this report Table 48 Type of IT related Training Received by User Respondents Sector No Training No Education Sector 9 IT Sector 84 Private Sector 73 Government Sector 3 Web Designing 4 64 Accounting 3 43 Human Resources 9 99 Word Processing Database Management 8 38 Web Designing 5 77 Accounting 39 Human Resources 4 3 Word Processing Database Management Web Designing Accounting Human Resources 7 98 Word Processing Database Management 45 6 Web Designing 43 Accounting 9 36 Human Resources 5 7 Word Processing 7 5 Database Management 66 3
39 Survey Final Report Table 49: IT Qualifications of User Respondents IT Qualification No Academic Qualifications IT Master s Degree Post Graduate Diploma 3 3 IT Degree Professional Qualifications Chartered IT 3 8 British Computer Society (BCS) 5 9 Australian Computer Society(ACS) 3 Microsoft certificate 4 8 Cisco Certification 3 Sun Certified Java 5 IT Diploma International Computer Driving License (ICDL) 4 3 IT Certificate No special IT qualifications Education IT Private Government 66 5 INSTITUTION PROFILE Information technology has emerged as an essential component of any business, educational or government institution The institutions that responded to our survey were well equipped with all modern IT facilities and some of the salient facilities that were available are detailed in this chapter Table 5 clearly depicts that these institutions are using the available ICT effectively and efficiently and hence are aware of the issues faced by the institutions in relation to its usage especially regarding the use of software It is seen that all the Institutions except for three institutions were having own domains while 99 of them were having institutional websites
40 Survey Final Report Table 5 Number of Domains and Websites available in Responded Institutions S E C T O R Education IT Private Government No No No No No Institutions having domains Institutions having websites no of websites It is also observed that some institutions, especially in the private sector, had more than one website for their institution Table 5 Local Area Networks (LAN) and network connections maintained by the Institutions S E C T O R Education IT Private Government No No No No No Availability of LAN No of terminals,49 8,35 6,5 8,4 35,447 Except for 3 government institutions all other institutions have Local Area Networks (LAN) and in total these institutions have (reportedly) 35,447 connections in their networks
41 Survey Final Report Table 53 E -mail Accounts Maintained by the Institutions S E C T O R Education IT Private Government No No No No No no of institutions accounts 595 8,39,47 3,869 5, Average value Although some institutions failed to provide information, the majority of them had accounts for their staff As seen from Table 53 the most number of accounts are available in the private sector where, on average, each private institution had 44 accounts Every institution had some form of connectivity to the internet depending on the nature of business and requirement The most commonly used connectivity was the ADSL broadband The details of different types of connections used by the different sectors are given in Table 54 Table 54: Types of Connectivity Used by Institutions Dial Up ADSL Broadband Broadband Mobile / Internet connection 3 Commercial Leased Line 4 IP/V PN con nect ions 5 Oth er (Fi ber etc ) SECTOR (a) Hardwired (b) Wireless (a) 5 Kpbs (b) Mbps (c) 4 Mbps (a) HSDPA (b) WiMAX (a) 64 Kbps (b) 8 Kbps (c) 56 Kbps (d) 5 Kbps (e) Mbps (f) Other ALL EDUCATION IT PRIVATE GOVT
42 Survey Final Report As shown in the table, 4 of the organizations use Mbps ADSL connections while 9 used High-Speed Downlink Packet Access (HSDPA) connections It was also observed that at present the use of Dial Up (hardwired and Wireless) is minimal The surveyed institutions had varied hardware used for IT related work These included servers, PCs, laptops, printers, scanners, plotters and multimedia projectors The details of this equipment are given in Table 55 Table 55 Types of IT facilities available in surveyed Institutions Number of units SECTORS Education IT Private Government HARDWARE Nos Nos Nos Nos Nos Servers Work stations/ PCs Laptops/Notebooks Printers Scanners Multimedia projectors Plotters Others From the above information it is clear that all these institutions use computers in day-to-day activities and the facilities are widely used Hence these organizations were able to provide information for an in-depth analysis on software usage 6 SOFTWARE USAGE PATTERN The institutions use a wide variety of software in their servers, PCs and laptops These software were categorized into eight broad categories for the convenience of the study These categories are; Operating Systems and related software, Desktop Application, 3Security Software, 4Database Software, 5Middleware, 6Business Application, 7Software Development Tools & Programming Languages and 8Statistical Applications Again, all these categories were divided as licensed software and unlicensed software Free Open Source Software (FOSS) also fell into the licensed software since these software are automatically registered with the copyright owner although they are available freeof-charge The usage pattern of Operating Systems found in these institutions is presented in table 6 4
43 Survey Final Report Table 6 Usage of Operating Systems and related software Operating Systems and related software No Education Sector IT Sector Private Sector Government Sector MS Windows 596 Linux 6 Mac OS 3 VM Ware As seen from Figure 6, Microsoft Windows Operating Systems consist of 975 of the total operating systems while Linux based Operating Systems represented 4 and Mac OS consisted of Figure 6 Distribution of Operating Systems & Related Software Distribution of Operating Systems & related Software 98 MS Windows Linux Mac OS VM ware 5
44 Survey Final Report Table6 Usage of Desktop Applications in surveyed institutions Desktop Education Private Government IT Sector Applications Sector Sector Sector No Microsoft Office Libre Office Kingsoft Office 5 Power OFFICE 5 Open Officeorg AutoCAD Adobe Photoshop Adobe PageMaker Coral DRAW 5 7 Adobe Dreamweaver ZW CAD 5 MATLAB 5 ArcCAD 5 5 ArcGIS 5 5 Team Mate GIMP 5 Arc Info 5 5 QuarkXPress Desktop Applications constitute most of the commonly used software in the country As seen from the Table 6 Microsoft Office is the most common software used in the computers and accounts for 53 of the total desktop applications used by these institutions The other significant desktop applications are Adobe Photoshop (6), Open Office (88) and PageMaker (49) The distributions of all desktop applications are graphically presented in Figure 6 below 6
45 Survey Final Report Figure 6 Distribution of Desktop Applications Distribution of Desktop Applications () Desktop Applications QuarkXPress Arc Info GIMP Team Mate ArcGIS ArcCAD MATLAB ZW CAD Adobe Dreamweaver Coral DRAW Adobe PageMaker Adobe Photoshop AutoCAD Open Officeorg Power OFFICE Kingsoft Office Libre Office Microsoft Office 3 4 Percentage Security software usage Pattern The most commonly used security software by these institutions is Kaspersky with almost 46 of the institutions using it in their systems while Symantec is used by 8 of the machines MacAfee and NOD 3 are the next mostly used security software recording 7 and 6 respectively Altogether 6 different types of security software were found in these institutions as detailed in the Table 63 Kaspersky is found to be popular among these institutions due to the price factor and superior after sales service provided by the vendor It was revealed that one institution opted to get this software as they offered extremely attractive terms when a bulk purchase was made for a three-year period, indicating the cost-consciousnessconsciousness of institutions in purchasing of software 7
46 Survey Final Report Table 63 Security Software Usage Pattern in the institutions No Software No of institution(s) Kaspersky Symantec McAfee ESET SOPHOS MS Security Essentials Norton ISA Firewall Bit defender IPCop Avira RAS 3 Clam AV 4 Endian 5 Cisco Iron Port 6 Avast responded 96 Table 64 Usage of Database Software Database Software Education IT Private Government Sector Sector Sector Sector No Microsoft SQL Oracle My SQL PostgreSQL The distribution of database software category is depicted in Table 64 The most commonly available database software was MySQL (357) followed by Microsoft SQL (339) and Oracle (86) 8
47 Survey Final Report Figure 63 Distribution of Database Software Distribution of Database Software Microsoft SQL Oracle My SQL PostgreSQL Table 65 Usage of Middleware Middle ware No Mulberry Mail system 3 XAMPP JBoss Tomcat Apache Squid / Proxy 3 RiftSaw Samba Education Private IT Sector Sector Sector Government Sector The distribution of Middleware is presented in Table 65 and graphically shown in figure 65 The mostly available Middleware is Apache, which accounts for 48 9
48 Survey Final Report Figure 64 Distribution of Middleware Distribution of Middleware Mulberry Mail system XAMPP JBoss Tomcat Apache Squid / Proxy RiftSaw Samba Table 66 Usage of Business Applications Business Education Private Government IT Sector Applications Sector Sector Sector No Lotus Notes MYOB ERP Accpac 5 6 R Smart Draw FAR MS Navision W CAD Corona Microsoft Exchange The distribution of Business Applications indicates that ERPs (4) are the most common type of Business Application used by these institutions The distribution pattern is given in Figure 65 & Table 66 3
49 Survey Final Report Figure 65 Distribution of Business Applications Distribution of Business Applications Lotus Notes 4 8 MYOB ERP Accpac R Smart Draw FAR MS Navision W CAD Corona Microsoft Exchange Table 67 Usage of Software Development Tools & Programming Languages Software Development Tools Education Sector IT Sector Private Sector No Microsoft Visual Studio Microsoft net NetBeans BlueJ 36 Eclipse 7 Delphi 36 Java Government Sector Microsoft Visual Studio is the most commonly used software development tool found among these institutions The distribution of different Software Development Tools & Programming Languages are shown in Table 67 & Figure 67 3
50 Survey Final Report Figure 66 Distribution of Software Development Tools & Programming Languages Distribution of Software Development Tools & Programming Languages Microsoft Visual Studio Microsoft net NetBeans BlueJ Eclipse Delphi Java 6 Sources of Supply of Software to the Institutions The sources of supply give an indication of the usage level of unlicensed software in the organisation ation As such a query was made in the questionnaire about this aspect and the results are depicted in Table 66 Table 68 Sources of Supply of software Source of Software Supply Mostly Sometimes Rarely No Answer No No No No No Authorised distributor FOSS from internet Pre-loaded when computers are purchased Complimentary (provided free of charge by vendor) Free internet sources Other sources Specify
51 Survey Final Report Taking all sectors into account, 6 of the institutions responded that their software is mostly obtained from authorised distributors while 47 have indicated that software comes with the computer at the time of purchase Only have acknowledged they mostly get their software free from vendors and that Open Source Software is obtained from the internet The current trend is that most of the new computers are purchased with licensed software but older machines continue to use the unlicensed copies supplied by the vendor 7 USAGE OF LICENSED & UNLICENSED SOFTWARE 7 Analysis of Software Usage Patterns in User Computers As outlined in the methodology, the study carried out a survey involving -5 computer users from each of the selected institutions for an in depth analysis of the software usage patterns of these institutions During the face-to face interviews, the enumerators were able to develop a very close rapport with the respondents by explaining the importance of providing correct information to assess the licensed and unlicensed software usage pattern in the country The cordial relationships established by the enumerators helped to uncover very valuable and accurate details of the software usage patterns of these institutions Since majority of these respondents (57) had bachelors or higher degrees we can safely assume that they have provided accurate information to the best of their knowledge In some instance they were not very clear about the licensing aspects of some of the software, especially relating FOSS packages In such instances enumerators were able to clarify matters to the respondents as all enumerators were IT graduates Since this information was gathered from widely diverse representative sample of institutions, there is a strong possibility that data are more reliable than the information provided by the institutional Heads Knowing the possible legal implication that could arise for the institution by providing correct information, some Heads have not provided the accurate information This was evident when the Head s response was compared with the users responses of the same institution Therefore, it is more appropriate to rely on user information to arrive at general conclusions However, we could use the response-evaluation of Head questionnaires to understand the broader aspects of software usage Although the intention was to collect -5 user information from each organization, due to several constraints and restriction placed by the institutional Heads, the enumerators finally collected information from 66 users from organizations The collected data were carefully analyzed and the results are detailed below In order to make the analysis meaningful, 77 different types of software found in these user computers were divided into eight broad categories The categories are Operating Systems & related Software, Desktop Applications, 3Security Software, 4Database Software, 5Middleware, 6Business Applications, 7Software Development Tools & Programming Languages and 8Statistical Applications As shown in the Table 7 33
52 Survey Final Report Table 7 Distribution of User Software Categories in the sample No Software Categories Operating Systems & related Software Desktop Applications 3 Security Software 4 Database Software 5 Middleware 6 Business applications 7 Software Development Tools & Programming Languages 8 Statistical Applications Further, all software found in these computers was divided as Licensed and Unlicensed based on the availability of usage agreement with the software copyright owner According to this division, Free and Open Source Software (FOSS) also fell into the licensed category since they need to be registered although they are mostly available free-of-charge In a broader sense, Unlicensed software means any proprietary software that was used without the required valid license or not being used as described in the license agreement The analysis of a total of 563 software packages found in these user computers are summarized in Table 7 A graphical representation of the same information is given in Figure 7 Figure 7 Distribution of User Software Categories found in the sample Operating Systems & related software Desktop Applications Security Software Database Software 7 Middleware 3 Business applications Software Development Tools & Programming Languages Statistical Applications 34
53 Survey Final Report The highest percentage of 3 is represented by Desktop Applications followed by Operating Systems & related software 7, Security Software 66, Database Software 44, Software Development Tools & Programming Languages 5, Business Applications 3, Middleware 8 and Statistical Applications 6 The Table 7 shows the holistic view of the software usage pattern emerging from the analysis of these software found in 66 users As clearly seen from the table, the overall use of licensed software is 744 while the Unlicensed software accounts for the balance 56 However, it is interesting to note that the use of Unlicensed software vary very widely amongst the eight categories ranging from (Business Applications) to 36 (Desktop applications) The Desktop Applications category being the largest category, representing almost 3 of the total software available in the surveyed computers, includes most of the popular software like Microsoft Office, Adobe Photoshop, PageMaker, Coral Draw, Dream Weaver, Open Office and Libre Office Table 7 Usage Pattern of Different software Categories in the sample Software Categories Licensed Unlicensed No No No Operating Systems & related Software Desktop Applications Security Software Database Software Middleware Business Applications Software Development Tools & Programming Languages Statistical Applications
54 Survey Final Report Figure 7 Usage Pattern of Different software Categories in the sample of License / Unlicense softwares Software Categories Licensed Software Statistical Applications Software Development Tools & Programming Languages Business applications Middleware Database Software Security Software Desktop Applications Operating Systems & related Software Unlicensed Software Operating Systems & related Software Operating Systems were broadly divided into Microsoft Windows (proprietary), (proprietary) open sourced Linux based operating systems and VM Ware Ware As depicted in the Table 73,out,out of the total software packages found in these user computers were Microsoft Windows,, 6 were Linux based operating systems and balance 7 were made up of VM Ware operating systems As also seen from the same table, 778 of the operating systems used in these computers had license while were found to be using unlicensed copies Out of the total of 647 Microsoft Windows operating systems found in these user computers, 764 were licensed versions and balance 36 were unlicensed Although, all Linux based operating systems were available free-of-charge, free charge, they were all considered as licensed software It was also observed that some computers carried both Microsoft and Linux operating systems and as such out of 66 users, 935 used only the Microsoft Windows operating systems while used only Linux based operating systems Another 44 of the user computers had dual operating systems of Windows and Linux This situation is graphically presented in Figure 73 36
55 Survey Final Report Table 73 The Usage Pattern of Operating Systems & related Software in User computers Software Type Licensed No No Microsoft Windows Linux VM ware Unlicensed No Figure 73 Usage Pattern of Operating Systems & related Software in User Computers Desktop Applications Desktop Applications found in the user computers consisted of 3 different types of software and had in total of 8 packages, out of which 64 were licensed and 36 were unlicensed The details of Desktop Applications found in user computers are given in Table 74 As illustrated in the table, commonly used Desktop Application is Microsoft Office which accounted for 79 When all the Microsoft Office software was considered the piracy rate of 338The other important Desktop Applications were Adobe Photoshop (7),Open Officeorg (55) and Adobe Page Maker (3) Although, some Desktop Applications such as Adobe Writer and MATLAB showed piracy levels they had less than five number each Adobe Photoshop which was available in 57 of the surveyed computers showed a piracy level of 63, while Adobe PageMaker which was found in 4 machines showed a piracy level of 54 In general most of the Adobe software packages had piracy levels in excess of 5 It was also noted that some institutions are using cheaper licensed office packages such as Kingsoft Office as an alternative to a more expensive Microsoft version It is also seen that some institutions (58) are using FOSS versions like Open Office and Libre Office instead of using unlicensed copies of proprietary software 37
56 Survey Final Report Table 74 Usage Pattern of Desktop Applications in User Computers Software Licensed Unlicensed No No No Microsoft Office Libre Office Kingsoft Office Power Office Open Officeorg AutoCAD Adobe PhotoShop Adobe PageMaker Adobe CorelDRAW Adobe Dreamweaver Adobe Writer 3 Adobe Illustrator Joomla Moodle Notepad++ Netviewer Nero ArcCAD 3 ArcGIS ZW CAD 3 MATLAB ICDL Test software PROCON Security Software Security software was available in all the user computers surveyed and the mostly used security software was Kaspersky (44) followed by Symantec (7) The overall usage of licensed versions was 778 while unlicensed versions accounted for However, as seen from Table 75 the piracy level of Symantec was of 44, while Avast has recorded 333 piracy and Kaspersky 38
57 Survey Final Report Table 75 Usage Pattern of Security Software in User Computers Software Licensed Unlicensed No No No Kaspersky McAfee Symantec AVG ESET Avira Avast Bitdefender SOPHOS LanSafe FileZilla Database Software There were 6 different types of Database software in user computers totalling 4 software packages, out of which 79 were licensed and the balance were unlicensed versions The details of the Database Software usage are given in Table 76 Table 76 Database Software Usage Patter in User computers Software Licensed Unlicensed No No No Microsoft SQL Oracle ArcSDE 8 ehrm Systems Fidelio 9 My SQL As depicted in the table, the most commonly used database software is Microsoft SQL which was available in 56 of the computers surveyed while Oracle was found in 9 of the computers My SQL (67) and e-hrm systems (6) were the other two important types of Database software found in these computers 39
58 Survey Final Report Middleware There were different types of software found under this category and 96 of these were licensed and only 4 were unlicensed Details are given in Table 77 As seen from the table, out of the total of 46 packages found in these computers, 44 were licensed versions and hence the piracy level was only 43 Table 77 Usage Pattern of Middleware in User Computers Software Licensed Unlicensed No No No Crystal Reports IBM i Access XAMPP JBoss Tomcat Apache 43 Wamp Zend PuTTY 43 Citrix VNC Viewer Business Applications There were seven types of Business Application representing a total of 79 software packages in the surveyed user computers The striking feature was that all these were licensed versions and details are shown in Table 78 Table 78 Usage Pattern of Business Applications in User Computers Software Licensed Unlicensed No No No Lotus notes Symbol 3 WCM 5 MYOB Logistics Software ERP Microsoft Exchange
59 Survey Final Report Software Development Tools & Programming Languages There were ten different types of software under this category in user computers out of which 73 were licensed and 7 were unlicensed The details are given in Table 79 Table 79 Usage Pattern of Software Development Tools & Programming Languages in User Computers Software Licensed Unlicensed No No No Microsoft Visual Basic Microsoft Visual Studio Microsoft Visual C# 8 Net Beans 5 Android SDK 5 Java SDK Informix Client SDK Eclipse Delphi 3 3 Microsoft net Although the overall piracy rate was 7, the mostly used software in this category was Microsoft Visual Studio which accounted for 58 of the total This had a piracy rate of 373 Statistical Applications There were four different types of software found under this category and the number of packages used in this software totalled 6 Out of these 88 were licensed and were unlicensed The details are given in Table 7 Table 7 Usage Pattern of Statistical Applications in User Computers Software Licensed Unlicensed No No No SPSS Smart Statistics 6 Minitab 6 CSPro
60 Survey Final Report 7 Sector wise Analysis of User Software As indicated in the methodology, samples were drawn from four sectors of the economy, namely, Education, IT, Private and Government The sector-wise software usage pattern is illustrated in Table 7 Although the overall usage levels of licensed and unlicensed software were found to be 744 and 56 respectively, these levels vary between the sectors and as such piracy varies from 49 (education) to 43 (private) The piracy levels of IT and government sectors had recorded 8 and 47 respectively This is clearly illustrated in Figure 74 Hence, it is very clear that a single piracy level for the entire country has very little meaning as it varies very widely between sectors, software categories and individual software types However, it is clearly seen that heavily used Operating Systems and Desktop Applications categories which include all the extensively used software have piracy rates of and 36 The piracy level of Security Software is also When these three largest software categories are combined it provides information of 76 software packages which is 849 of the total found in user computers As shown in Table 7, the combined piracy level is 73 4
61 Survey Final Report Table7 Sector wise Usage Pattern of Different Software Categories Software Category Education Sector IT Sector Private Sector Government Sector Licensed Unlicensed Licensed Unlicensed No No No No No Operating Systems & related software Desktop Applications Security Software Database Software Middleware Business applications Software Development Tools & Programming Languages Statistical Applications Grand Licensed Unlicensed Licensed Unlicensed Licensed Unlicensed 43
62 Survey Final Report Table 7 Combined Software Usage patterns of Operating, Security and Desktop Applications Education Sector IT Sector Private Sector Government Sector Software Category Licensed Unlicensed Licensed Unlicensed Licensed Unlicensed Licensed Unlicensed Licensed Unlicensed No No No No No Operating Software Desktop Applications Security Software
63 Survey Final Report Unlicensed Software Education Sector IT Sector Private Sector Government Sector Sectors Figure74 Usage Pattern of Unlicensed software in User computers-sector wise Figure 75 provided the graphical representation of software piracy under different categories in these four sectors As it is observed that in most cases the piracy level is below 5 although the statistical package category in the education sector is given as this represents only two packages 45
64 Survey Final Report Figure 75 Use of Unlicensed Software in User Computers-Sector and Software re category wise 9 8 Unlicensed Software Education Sector 4 IT Sector 3 Private Sector Government Sector Statistical Applications Software Development Tools & Programming Languages Business applications Middleware Database Software Security Software Desktop Applications Operating Systems & related Software Software Categories 46
65 Survey Final Report Operating Systems & related Software Although the overall licensed and unlicensed use of Operating systems were 778 and respectively, these values change from sector to sector The sector that recorded the highest percentage of unlicensed operating software was the education sector with 77 while government and IT sectors recorded piracy rates of 5 and respectively The lowest level was recorded by the private sector with 89 The details are shown in Table 73 47
66 Survey Final Report Table 73 Sector wise Usage Pattern of Operating Systems & related Software in User Computers Education Sector IT Sector Private Sector Government Sector Operating Systems Microsoft Windows Licensed Unlicensed Licensed Unlicensed Licensed Unlicensed Licensed Unlicensed No No No No No Licensed Unlicensed Linux VM ware Grand
67 Survey Final Report Figure 76 Sector wise Usage of Unlicensed Operating Systems & related Software in User Computers 3 Unlicensed Software Education Sector IT Sector Private Sector Government Sector Sectors 49
68 Survey Final Report Desktop Applications This was the largest category of software found in user computers with 3 different types and a total of 8 software packages Although the overall piracy level was 36, it was 467 in the education sector and 63 in the private sector In the case of government and IT sectors, the unlicensed usage levels were 399 and 336respectively Out of all the Desktop Applications, Microsoft Office packages consisted of 79 and the overall usage level of unlicensed versions were 338 However, the use of unlicensed Microsoft Office in the education sector was 4 while in private sector it was47 Similarly, the government and IT sectors were found to be using 38 and 349 unlicensed versions respectively out of their total Microsoft Office packages The Table 74 provides sector wise details of all Desktop Applications recorded from the user computers The second most widely used software found among the user computers was Adobe Photoshop which accounted for 7 of the total and as seen from the Table 74 almost 63 of the Adobe Photoshop packages were unlicensed The sector wise analysis indicates that level of unlicensed usage varies from 75 (government sector) to 333 (private sector) Adobe PageMaker was also available in 4 user computers and out of them 54 were unlicensed copies 5
69 Survey Final Report Table 74 Sector wise Usage Pattern of Desktop Applications in User Computers Unlicense d Licensed No Unlicense d Licensed No Unlicense d Government Sector Licensed 65 No Unlicense d 4 Private Sector Licensed 598 IT Sector No Unlicense d Microsoft Office Libre Office Kingsoft Office Power Office Open Officeorg AutoCAD Adobe PhotoShop Adobe PageMaker Adobe CorelDRAW Adobe Dreamweaver Adobe Writer Adobe Illustrator Joomla Moodle Notepad++ Netviewer Nero Arc CAD Arc GIS ZW CAD MATLAB ICDL Test software PROCON Grand Licensed Desktop Applications Education Sector No
70 Survey Final Report Figure 77 Sector wise Usage of Unlicensed Desktop Applications in User Computers 5 45 Unlicense Software Education Sector IT Sector Private Sector Government Sector Sectors Security Software Security software was available in all the user computers surveyed and the mostly used security software was Kaspersky (44) followed by Symantec (7) The sector wise details are shown in Table 75 & Figure 78 5
71 Survey Final Report Table 75 Sector wise Usage Pattern of Security Software Unlicensed No Licensed Unlicensed Unlicensed 56 No Licensed Government Sector Licensed 4 No Unlicensed 765 Private Sector Licensed 35 IT Sector Unlicensed Kaspersky McAfee Symantec AVG ESET Avira Avast Bitdefender SOPHOS LanSafe FileZilla No Licensed Security Software Education Sector No
72 Survey Final Report Figure 78 Sector wise Usage of Unlicensed Security Software in user computers co 6 Unlicensed Software Education Sector IT Sector Private Sector Government Sector Sectors Database Software There were 6 different types of Database software, totalling 4 software packages were found in these user computers where an overall unlicensed usage level was recorded However, piracy levels varied from 33 (government) to 95 (private) among the sectors Sector ctor wise details are given in Table76 The most commonly used Database Software was found to be Microsoft SQL which was available in 64 computers and out of which 56 5 were unlicensed copies of software Oracle was w available in 5 computers and the piracy pi rate was 4 54
73 Survey Final Report Table 76 Sector wise Usage of Pattern of Database Software in the User Computers Unlicensed No No Unlicensed Licensed No Licensed Unlicensed My SQL No No Licensed Fidelio Unlicensed ehrm Systems Licensed ArcSDE Oracle Government Sector Unlicensed Microsoft SQL Private Sector Licensed Database Software IT Sector Education Sector 55
74 Survey Final Report Figure 79 Sector wise Usage of Unlicensed Database Software in the User Computers Unlicensed Software Education Sector IT Sector Private Sector Government Sector Sectors Middleware There were different types of Middleware, totalling 46 software packages were found in these user computers where an overall 43 unlicensed usage level was recorded However, piracy levels varied from 77 (private) to (education and IT) among the sectors It is also noted that out of the total of 46 numbers 43 were found in the government sector while IT and private sectors had 4 and 8 respectively Details are provided in Table 76 The piracy level in the government sector was 53 56
75 Survey Final Report Table 77 Sector wise Usage Pattern of Middleware Crystal Reports IBM i Access XAMPP JBoss Tomcat Apache Wamp Zend PuTTY Citrix VNC Viewer Licensed Unlicensed Licensed Unlicensed Licensed Unlicensed Licensed Unlicensed Government Sector Unlicensed Private Sector Licensed Middleware IT Sector Education Sector No No No No No
76 Survey Final Report Figure 7 Sector wise usage of Unlicensed Middleware in user computers 9 Unlicensed Software Education Sector IT Sector Private Sector Government Sector Sectors Business Applications The Business Applications category consisted of 9 types and a total of 79 9 software packages The most striking feature of this category of software was that all the 7 79 packages were licensed versions of the software As expected 5 of this category of software was found in the private sector institutions and most of them were ERPs The details are given in Table 77 58
77 Survey Final Report Table 78 Sector wise Usage Pattern of Business Applications in the user computers Licensed Unlicensed Licensed Unlicensed Licensed Unlicensed Licensed Unlicensed Government Sector Unlicensed Private Sector Licensed Business applications IT Sector Education Sector No No No No No Lotus notes 5 4 Symbol WCM MYOB 4 Logistics Software 3 ERP 3 49 Microsoft Exchange 79 Grand
78 Survey Final Report Software Development Tools & Programming Languages The surveyed users also had types of Software Development Tools and these were found in 3 computers Of these 73 were licensed and balance 7 were unlicensed versions of the software As expected the IT sector had 394 of the total software while government sector accounted for 8 Private and education sectors accounted for 97 and 9 respectively The mostly used Software Development Tool was Microsoft Visual Studio which accounted for 58 of the total software packages under this category and the piracy level was 373 The sector wise details are given in Table 78 6
79 Survey Final Report Table 79 Sector wise Usage Pattern of Software Development Tools & Programming Languages in User Computers Microsoft Visual Basic 6 Microsoft Visual Studio Microsoft Visual C# NetBeans Android SDK Java SDK Informix Client SDK Eclipse Delphi Microsoft net Licensed Unlicensed Licensed Unlicensed Licensed Unlicensed Licensed Unlicensed Government Sector Unlicensed Private Sector Licensed IT Sector Education Sector Software Development Tools & Programming Languages No No No No No
80 Survey Final Report Figure 7 Sector wise Usage of Unlicensed Software Development Tools & Programming Languages in user computers 6 of Unlicensed Software Education Sector IT Sector Private Sector Government Sector Sectors 6
81 Survey Final Report Statistical Applications There were 6 statistical packages consisting of four different types were found in these user computers and 5 were unlicensed Government sector accounted for 8 of the total For details please refer Table 79& & Figure 7 Table 7 Sector wise Usage Pattern of Statistical Statistical Applications Unlicensed No SPSS Smart statistics No No Minitab CSPRo 7 7 Grand Licensed Licensed No Unlicensed Unlicensed Licensed Licensed No Statistical Applications Government Sector Unlicensed Unlicensed Private Sector Licensed IT Sector Education Sector of Unlicensed Software Figure 7 Sector wise Usage Us of Unlicensed Statistical Applications in n user computers Education Sector IT Sector Private Sector Government Sector Sectors 63
82 Survey Final Report Further to the analysis of data gathered from user computers information received from Head questionnaires were used to broaden the view of the usage pattern of widely used software software Operating Systems & related Software The most widely used software was found to be Microsoft Windows and information from 3,66 Desktop Computers and,3 laptops were analysed of the three Microsoft Windows Operating Systems the mostly used Operating System that was found in these surveyed computers was Windows XP, which accounted for 69 while Windows 7 accounted for 8 and Vista 3 The availability of these Operating erating Systems in different processor types are given in Table Figure 73 Usage pattern of Windows Operating Systems in Surveyed PCs Table 7 Use of Windows Operating Systems in Various PCs Window version used no of PCs XP Vista Window 7 Pentium III 63 Pentium IV 4, Dual Core 6, Core 4, Core i3,5,7 6, , Processor type Others 76 64
83 Survey Final Report As seen from Table 7 the most commonly used Windows Operating System was Windows XP and this was found in most types of PCs Although its usage is high in older machines, it is widely used in newer machines as well The least used Windows Operating System was Vista which was available only in 33 of the machines Other Corei3,i5,i7 Core Dual Core Pentium IV Pentium III Processor Table 7 Usage Pattern of Windows XP Operating Systems in Desktop Computers Sector No computers No Windows XP Licensed Unlicensed Unlicensed No No No Education IT 8 Private Government Education IT Private Government Education IT Private Government Education IT Private Government Education IT Private Government Education Government ,66 4,73,9 5,95 8 Grand total 5 65
84 Survey Final Report As seen from Table 7 the use of unlicensed copies of Window XP is mostly found in Pentium III and IV machines and the levels of piracy in these machines are 6 and 7 respectively The use of unlicensed Windows XP is high in the Government and IT sectors and it is extremely low in the private sector machines Another trend which is clearly seen is the lessening of the piracy level in recent years with the newer models of computers For example the piracy rate of 6 in the Pentium III machines has reduced to 6 in Dual Core, 4 in Core and to in Corei3,i5,i7 PCS This indicates a clear declining trend in the piracy of Windows XP software Table 73 Usage Pattern of Vista Operating System in Desktop Computers Other Corei3,i5,i7 Core Dual Core Pentium IV Pentium III Processor PCs Sector Vista No of computers Licensed Unlicensed Unlicensed No No NO No Education 4 IT Private 33 Government Education IT Private Government Education IT Private Government Education IT Private Government Education IT Private 4985 Government Education Government Grand
85 Survey Final Report As seen from Table 7, Vista was found only in 763 PCs or in 33 out of the total 3,66 PCs that use Windows Operating Systems Out of this only PCs carried unlicensed copies Other Corei3,i5,i7 Core Dual Core Pentium IV Pentium III Processor Table 74 Usage Pattern of Window 7 Operating System in Desktop Computers Sector No Computers Education IT Private Government Education IT Private Government Education IT Private Government Education IT Private Government Education IT Private Government Education No Government Grand 366 Window 7 Licensed No Unlicensed No No Unlicensed Table 73 shows the usage pattern of unlicensed Windows 7 software in the surveyed Desktop Computers Here again it is seen that the piracy level has reduced from 7 in Dual Core Desktop Computers to 4 in Core i3,i5, and i7 Desktop Computers 67
86 Survey Final Report Other Corei3,i5,i7 Core Dual Core Pentium IV Processor Table 75 Use of Window XP Operating Systems in Laptops Laptops Sector Laptops Surveyed Windows XP Licensed Unlicensed Unlicensed No No NO No Government Grand 3 9 Education IT Private Government Education IT Private Government Education IT Private Government Education IT Private Government Education As indicated in data in Table 74 of,3 laptops that had Windows Operating systems,,65 laptops had Windows XP As in PCs, Windows XP was widely used in all types of laptops The overall usage of unlicensed Windows XP was 4, indicating the declining trend in piracy where unlicensed usage has come down from 34 in Pentium IV to 7 in Corei3, i5 and i7 laptops 68
87 Survey Final Report Other Corei3,i5,i7 Core Dual Core Pentium IV Processor Table 76 Use of Windows Vista Operating Systems in Laptops Sector Laptops Surveyed No Education IT Private Vista Operating System Licensed Unlicensed Unlicensed No NO No Government Education IT Private Government 5 Education IT Private Government 6 Education IT Private Government 8 4 Education 96 5 Government Grand, As depicted in Table 75, out of 66 laptops that carried Windows Vista Operating Systems were found unlicensed 69
88 Survey Final Report Other Corei3,i5,i7 Core Dual Core Pentium IV Processor Table 77 Use of Windows 7 Operating Systems in Laptops Laptops Sector Education IT Private Government Education IT Private Government Education IT Private Government Education IT Private Government Education Government Grand Laptops Surveyed Window 7 Operating System Licensed Unlicensed Unlicensed No No No No ,3 974 As shown in Table 76, Windows 7 Operating System was found in 999 or 47 of the total laptops that had Windows Operating Systems Unlike in Desktop Computers, the use of Windows 7 software was high in Laptops Out of the 999 laptops, only 5 carried unlicensed copies accounting for 3 It was also observed that of the Corei3, i5, and i7 laptops had licensed copies This once again indicates that the institutions are opting for licensed software when they purchase new computers 7
89 Survey Final Report Usage Pattern of Desktop Applications The mostly used Desktop Application was found to be Microsoft Office The details of 3,66 Desktop computers that use Microsoft Office packages are given in Table 77 Other Corei3,i5,i7 Core Dual Core Private 33 5 Government Education IT Private Government Unlicensed No No Unlicensed IT Licensed No 4 unlicensed No MS Office total No 4 Unlicensed unlicensed Education No 4 Sector Licensed MS Office 7 Unlicensed MS Office 3 Licensed Pentium IV Pentium III Processor PCs computers Table 78 Usage pattern of Microsoft Office software in Desktop Computers No No No No No No Education IT Private Government Education IT Private Government Education 9 IT 6 Private 4985 Government Government , Education Grand total
90 Survey Final Report As seen from Table 77, a total of 3,66Desktop Computers used Microsoft Office Software in the surveyed institutions Of these,59 was using MS Office 7 while 7 used MS Office 3 and balance 4 was using MS Office The mostly pirated Microsoft Office version was MS Office 3 which recorded an overall piracy level of 4 Piracy rates were 643 in Dual Core machines and 487 in Core machines However, the level of unlicensed Microsoft office 3 has come down to 3 in newer machines like Core i3, i5, i7, indicating the same declining trend in piracy Similarly, Microsoft office 7 also indicates fairly high piracy level For example piracy level of Microsoft office 7 in Core machines has recorded 47 However, this has declined to 5 in case of newer machines like Core i3,i4,i5 In case of Microsoft Office, the overall Piracy rate has been 3 When overall situation is considered the piracy level has declined from 4 in Microsoft Office 3 to 3 in Microsoft Office This once again gives a clear indication that piracy level is on the decline as far as Microsoft office is concerned 7
91 Survey Final Report Table 79 Usage pattern of Microsoft Office Software in Laptops MS Office 3 Corei3,i5,i7 Core unlicensed Licensed Unlicensed unlicensed Licensed Unlicensed unlicensed No No No No No No No No No No Education IT Private Education IT Private Government Education PCs MS Office Unlicensed MS Office 7 Licensed Dual Core Pentium IV Processor Laptops Sector 5 Government IT Private Government Education IT Private Government Government Other Education IT Private Grand 4 5 As seen in Table No 78, 38 of the,3 Laptops used MS Office 3, while 548 used MS Office 7 and 34 used MS Office The usage of unlicensed Microsoft Office 3 software was found to be 4 and Microsoft Office 7 was found to be 5 However, all the 667 Laptops that were using Microsoft had licensed software 73
92 Survey Final Report Adobe Photoshop & Page Maker Apart from Microsoft office, other commonly used Desktop Applications were Adobe Photoshop and PageMaker It was observed that the majority of the software found in these PCs had unlicensed copies and the levels of piracy were 5 and 67 for Photoshop and PageMaker respectively Piracy level of Photoshop was high and (as seen from the table) in most sectors the level of piracy was The details are given in Table 79 Table 73 Use of Other Desktop Application Software in Desktop Computers Unlicensed total Unlicensed Unlicensed PageMaker total unlicensed Education 4 IT Private 33 Government 6 Sub 63 Education 578 IT 48 Private 49 Government 73 Sub 48 Education 7 IT 964 Private 5 Government 983 Sub 677 Education 393 IT 683 Private 36 Government 349 Sub 456 Education 9 IT 6 Private 4985 Government 63 Sub 6748 Education 3 Government 4 Sub 45 Grand 3,66 Licensed No Sector Photoshop Licensed Others Corei3,i5,i7 Core Dual Core Pentium IV Pentium III Processor PCs
93 Survey Final Report This software was also found in 5 of a total of,3 laptops surveyed Of the two, Photoshop was found in 5 machines with 36 using unlicensed copies while PageMaker was used in only 6 machines with a piracy rate of 5The details are given in Table 73 Other Corei3,i5,i7 Core Dual Core No No unlicensed No No Unlicensed No Page Maker unlicensed No Unlicensed No Education 5 IT 8 Private 5 Government 48 Education 6 IT 35 Private Government Education IT 6 Private 3 Government 6 6 Education 67 IT 5 Private 5 Government 8 96 Education IT Private Government Grand,3 Licensed Laptops surveyed Sector Photoshop Licensed Pentium IV Processor Table 73 Use of Other Desktop Application software in Laptops
94 Survey Final Report 8 Awareness on E- laws related to the use of Computers 8 Awareness of Head Respondents on E-Laws E As mentioned previously, Sri Lanka has enacted three vital legislations related to ICT activities These are the Intellectual Property Act No36 of 3, 3, Computer Crimes Act No 4 of 7 and the EEtransactions Act No 9 of 6 As a part of the survey, an inquiry was made from all of the Heads of Institutions and 66 users to assess their level of awareness on these e--laws of the country Table8 Awareness of Head Respondents on E-Laws E Heard but details unknown E-Law Fully Aware Partially aware Not aware Intellectual Property Act No36 of Computer Crimes Act No 4 of E-transactions Act No 9 of As presented in Table 8 only around of the respondents have indicated that they are fully aware of these laws while 4- are not aware of some of these laws at all Even an important legislation such as the Intellectual Property Act which provides required guidelines to the use of licensed software is fully known only to 35 of the Institution Heads A majority majority, 65, of them are either partially aware or have just heard about it The lack of proper understanding of the intellectual property law could have an impact on the use of pirated software in the country Figure 8 Awareness on Intellectual Property Act by the Heads in Different Di fferent Sectors 76
95 Survey Final Report As seen from Figure8 only the majority of heads from IT is fully aware of ofthe Intellectual Property Act and even in the government sector only 4 of head respondents have indicated that they are fully aware of the Act Almost half of the the respondents are partially aware of the Act while 5 55 has only heard about the Act A and does not know much Act While a lack of understanding of the Act is not an excuse to use pirated software, it may be prudent prudent to create awareness among computer userss regarding the provisions of this Act with a view of reducing the level of piracy in the country Figure gure 8 Awareness on Computer Crimes Act by Heads of Different Sectors This piece of legislation is also fully known only to a few heads and 7 of the private sector heads are not aware of this legislation at all Figure 83 Awareness on E-Transactions E Transactions Act by Heads of different Sectors 77
96 Survey Final Report 8 Awareness of User Respondents on E-Laws The awareness of the e-laws among the 66 computer users surveyed from all sectors, indicated that the majority of them have either only heard about this law or is not aware at all Considering the educational and IT qualifications it is surprising that only around of the user respondents were aware of the Intellectual Property Act In general, the knowledge of E-laws among the user respondents is extremely poor and some form of plan is required educate them in order to develop the IT usage in the country Fully Aware Partially Aware Heard but details unknown Not Aware at all Table 8 Awareness of User Respondents on E-Laws Intellectual Property Act No36 of Computer Crimes Act No 4 of E-transactions Act No 9 of E-law Table 83 Awareness of User Respondents on E-Laws for different sectors Government Private IT Education Sector Fully Aware Partially Aware Details unknown Intellectual Property Act No36 of 3 Computer Crimes Act No 4 of 7 E-transactions Act No 9 of 6 Intellectual Property Act No36 of 3 Computer Crimes Act No 4 of 7 E-transactions Act No 9 of 6 Intellectual Property Act No36 of 3 Computer Crimes Act No 4 of 7 E-transactions Act No 9 of Not aware at all Intellectual Property Act No36 of Computer Crimes Act No 4 of E-transactions Act No 9 of E-law 78
97 Survey Final Report 9 Views and Opinions Expressed by the Respondents on Piracy 9 Impact on Country s Economy The study interviewed institutional heads and 66 users from these institutions to assess their views and opinions about software usage and piracy In this regard we asked the head respondents about their views on piracy and its impact on the country s economy The responses received are summarised in Table 9 Table 9 Impact of Software Piracy on Country s Economy: Opinions Expressed by Heads of Institutes Agreed Not Agreed 6 38 Yes No b It can affect foreign investments in Sri Lanka 8 8 c It can discourage local software developers 6 39 Statement Do you think the use of unlicensed software can harm the country's economy If yes, in what ways could it harm the Sri Lankan economy a It can affect the integrity of the Sri Lankan business community Out of Heads of institutions who responded to our query, only 6 indicated that piracy could harm our economy Of these, 9 agreed that it can affect the integrity of the country s business community and 8 also agreed that it can affect the country s foreign investments However, only 6 considered that piracy can discourage local software developers These responses give an indication that close to 4 of the heads of these institutions do not consider piracy as an impediment to the country s economic development 79
98 Survey Final Report 9 Reasons for using unlicensed software Opinions were sought from the head respondents as to why the institutions are resorting to the use of unlicensed software in the country and the responses received are summarised in Table 9 Table 9 Opinions Expressed by Head Respondents Statement Response Received Not Agree Disagree Sure Lack of awareness of the Intellectual Property Act No36 of Legal enforcement of the law is not effective Institution is unable to pay high registration fees for proprietary software Gotten used to the culture of using unauthorised copies of software Country could save valuable foreign exchange by not obtaining licensed software No harm done to the country s reputation by the use of unauthorised software After sales support service from the vendors is poor The results which appear in Table 9 show opinions expressed by head respondents as to why some institutions are resorting to the use of proprietary software without a valid license Accordingly, out of the respondents, 64 agreed that piracy takes place due to lack of awareness of the Intellectual Property Act while 4 however, disagreed with this argument and were not sure whether the lack of awareness is a valid reason for piracy However, a similar percentage of respondents attributed piracy to ineffective law enforcement while opted to disagree with this statement The highest percentage of 78 of the respondents attributed piracy to the high cost of registration of proprietary software Only 4 disagreed while 8 claimed that they were unsure Although another common belief is that people tend to use unlicensed software as they have got used to the culture of it over the years, only 46 agreed with the statement while 39 disagreed with it Also a majority of respondents disagreed with another popular argument that the country could save foreign exchange by not using licensed software In response to the statement that the use of unlicensed software does not harm the country s reputation, a majority of 67 disagreed with the statement To the statement that after sales support provided by vendors is poor, 37 agreed while 4 disagreed The responses received from different sectors are shown in Figures9 to 97 8
99 Survey Final Report Figure 9 Statement No: Responses Received from the head respondents from Di Different Sector As seen from the Figure 9, 73 of the respondents from the government sector agreed that the lack of awareness is a reason for piracy However, only 4 of the education sector respondents agreed that lack of awareness is a reason for piracy while a significant 33 was not sure of the accuracy of this statement The respondents who disagreed were between Hence, the majority of the respondents have indicated the need for creating awareness among the community to discourage piracy It is also vital to note that the awareness about this important legislation that lend to the proper use of proprietary software is lacking in the education sector 4 of the head respondents have indicated that they are not sure of the statement Figure9 Statement No : Responses Received from the head respondents from Different Sectors 8
100 Survey Final Report As seen from Figure 9, a majority of 64 of the total respondents agreed that the reason for piracy is due to ineffectiveness of legal enforcement Heree again the 67 of government sector respondents have endorsed this statement while only 6 of the private sector respondents were not sure if piracy was due to the lack of effectiveness of the law enforcementonly around of the respondents have disagreed with this argument Figure 93 Statement No 3: Responses Received from the Head respondents from Different Sectors Figure 93 indicates that an overwhelming 78 of the respondents agreed that the institution resorts to the use of unlicensed software software because of high registration fees charged for proprietary software Of the four (4) sectors almost 9 of the education sector respondents agreed with this argument Only 4 of the total respondents disagreed with this statement Some were of tthe opinion that proprietary software are sold in other developing countries at a lower price than in Sri Lanka Therefore it is appropriate to explore the possibility of obtaining concessionary rates for Sri Lanka so that most of the users could afford to use licensed software It is hoped that this would assist in minimising ing the illegal use of proprietary software to a lower level and bring more users to comply with the laws of the country 8
101 Survey Final Report Figure 94 Statement No 4: Responses Received from the head respondents from Different Sectors Although it is a popular belief that the country could save valuable foreign exchange by not obtaining licensed copies, as seen from Figure 94, only 36 of the total respondents have agreed with this argument In n fact a majority of 54 have disagreed with this argument while have indicated that they were unsure It is also pertinent to mention that over 7 of respondents from the government sector have disagreed with this argument However a majority of private sector respondents have agreed with the statement These results indicate that there is no clear understanding among all sectors regarding this issue and hence there is a need to educate them about the consequences and impact on the country as a result sult of high piracy usage rate Figure 95 Statement No 5: Responses Received from the head respondents from Different Sectors 83
102 Survey Final Report As seen from Figure 95, only 6 believed that there is no harm done to the country s reputation by using unauthorised ed software software However, the majority 67 of the respondents feel that high level of piracy in the country could harm the reputation of the country As seen from Table 95, almost 75 of the government sector and 65 of the IT sector respondents disagreed with the statement tatement while 699 in the private sector thought otherwise Here again there is no general consensus among the heads regarding the impact of piracy on the country s reputation Figure 96 Statement No 4: Responses Received from the head respondents fr from Different Sectors Some often expressed the view that they use unlicensed copies because they were familiar with the culture that prevailed for years before the intellectual property law came into effect in 3 We examined the validity of this argument argument with our head respondents and the secto sector-wise details are graphically depicted in Figure 96 Out of the total respondents, only 46 agreed with the statement while 39 disagreed and 5 were not sure sure However, a majority of respondents of the educati education sector (75) and private sector (63) agreed with the statement while only 4 of the government sector and 3 of the IT sector respondents disagreed with the statement 84
103 Survey Final Report Figure 97 Statement No 7: Responses Received from the Head Respondents from Different Sectors It is generally assumed that proprietary software is backed up by after sales support service from the vendor However, only 37 of the total respondents agreed with this statement A significant 4 disagreed while were unsure During discussions it was revealed that some software vendors do not provide the required services to their customers and as a result users in Sri Lanka have to seek support from overseas to resolve their problems 93 Opinions expressed ed by Head Respondents on the Use of FOSS In order to get an understanding on the views of the head respondents, twelve statements were presented in the questionnaire requesting them to select the best answers according to their knowledge on the subject These statements and the responses received from head respondents are presented in Table93 The following conclusion may be drawn based on these responses, although there were no clear cut overall opinions expressed by these highly diverse head responden respondents 85
104 Survey Final Report Table 93 Responses Received for the Statements from Head Respondents Responses received ( ) Statement Institution should always use licensed software on each of the computers Copies of licensed software may be used because of the cost factor Single licensed copy can be shared by 3 the staff Open source software is equally good 4 as the licensed software Open source software is unreliable 5 since they are not technically supported by a vendor Open source software can be combined easily with existing 6 proprietary software with the same IT system FOSS can be easily customized than 7 proprietary software Use of FOSS is more economical than 8 the use of proprietary software By using FOSS, the institution can 9 improve its information security and prevent virus attacks It is hard to train staff to use FOSS as they are already familiar with proprietary software In the long term it is better to switch to FOSS than use Proprietary software without a license Vendors provide an efficient after sales service for proprietary software Strongly Disagree Undecided Disagree Strongly Agree Agree
105 Survey Final Report A majority of 95 of the Head respondents have clearly indicated the necessity of using licensed software on each computer Only an insignificant 5 have expressed otherwise In a similar note, a majority of 7 of the Head respondents have expressed their disagreement with the use of single licensed copy on multiple computers within the organisation 3 There is a fair level of agreement (65) among the Head respondents that open source software is also equally good as the proprietary software and only 9 have disagreed with this statement A significant 6 have indicated their lack of knowledge in making a decision 4 A majority of 53 of the Head respondents disagreed with the statement that FOSS is unreliable as this software is not technically supported by vendors Only 3 agreed with the statement while as in previous instances, 6 expressed their lack of knowledge 5 Another unclear area regarding the use of FOSS is whether the programmes can be easily combined with the existing proprietary software within the same IT system Once again 53 have responded positively while only 6 have responded negatively The undecided respondents amount to 6 The Head respondents have indicated that they lack a clear idea about the ease of customization of open source software compared to proprietary software A high percentage (3) has indicated that they are undecided while 7 disagreed with the statement However a majority (43) have agreed that FOSS can be easily customised 7 Although there were a significant number of undecided responses for previous FOSS related statements, 8 of the respondents have endorsed the statement that the use of FOSS is more economical and only 7 disagreed while 3 remained undecided 8 A popular belief is that FOSS provides more security to information and is less prone to virus related damages However only 47 agreed with this statement and disagreed while 3 remained undecided 9 A significant 59 has agreed that training their staff to use FOSS is difficult as they are already familiar with proprietary software However 3 disagreed with this argument while remanied undecided A majority (66) of the respondents was of the opinion that it is better to switch to FOSS than to use proprietary software without a valid license Only 4 disagreed with this statement while remained undecided The statement Vendors provide an efficient after-sales service for proprietary software received an acceptance rate of 67 from the respondents while only disagreed with the statement and 3 remained undecided As an overall observation it is seen that a majority of the respondents were aware of the restrictions on the use of proprietary software and there is an increasing trend among the institutions to use FOSS However, a significant percentage of respondents need to learn more about FOSS in order to make informed decisions 87
106 Survey Final Report Figure 98 Responses Received from the Education Sector 88
107 Survey Final Report Figure 99 Responses Received from the IT Sector 89
108 Survey Final Report Figure 9 Responses Received from the Government Sector 9
109 Survey Final Report Figure igure 9 Responses Received from the Private Sector 9
110 Survey Final Report 94 Opinions expressed by User Respondents on the Use of FOSS In order to get an understanding on the views of the users, twelve statements were presented in the questionnaire requesting user respondents to select the best answers according to their knowledge on the subject These statements and the responses received from user respondents are presented in Table 94 The following conclusion may be drawn based on these responses, although there were no clear cut overall opinions expressed by these user respondents Table 9 4 Responses Received from User Respondents on the use of FOSS Statement Institution should always use licensed software on each of the computers Copies of licensed software may be used because of the cost factor Single licensed copy can be shared by 3 the staff Open source software is equally good as 4 the licensed software Open source software is unreliable 5 since they are not technically supported by a vendor Open source software can be combined 6 easily with existing proprietary software with the same IT system FOSS can be easily customized than 7 proprietary software Use of FOSS is more economical than 8 the use of proprietary software By using FOSS, the institution can 9 improve its information security and prevent virus attacks It is hard to train staff to use FOSS as they are already familiar with proprietary software In the long term it is better to switch to FOSS than use Proprietary software without a license Illegal software users should be punished to discourage software piracy Strongly Agree Responses received ( ) Strongly Agree Disagree Undecided Disagree
111 Survey Final Report A majority of 84 of the respondents have clearly indicated the necessity of using licensed software on each computer Only 6 have expressed otherwise However, 59 of the respondents agreed to the use of unlicensed software because of cost factor Only 3 disagreed with this option while remained undecided 3 Regarding the issue of using single licensed copy on multiple computers, respondents did not show a clear opinion as 46 agreed with this practice while 4 disagreed This shows their lack of awareness on this issue 4 A majority of 54 agreed with the statement that open source software is equally good as the licensed software However, 5 of the respondents have indicated their lack of knowledge on the use of FOSS 5 There was no clear consensus among the users regarding the reliability of FOSS since there is no reliable technical support available for FOSS users Once again 3 of the respondents have indicated their lack of awareness to respond to that statement 6 Once again the 38 of the user respondents have indicated their inability to express a clear opinion on the statement that FOSS can be easily combined with the existing proprietary software within the same IT system 7 Here again 46 of the respondents were unable to decide on the statement that FOSS can be easily customised than the proprietary software 8 Although a significant 6 responded as undecided, a majority of 69 agreed with the statement that use of FOSS is more economical than the use of proprietary software 9 The respondents were not clear in their minds regarding the statement that FOSS provides more security to information and is less prone to virus related damages While 4 agreed with the statement 4 remained undecided Only 47 has agreed that training of staff to use FOSS is difficult as they are already familiar with proprietary software However 8 expressed their inability to make any decision on the statement A majority 5 of the respondents was of the opinion that it is better to switch to FOSS than use proprietary software without a valid license However, a significant 34 has indicated their lack of knowledge to decide on the statement To a statement that illegal software users should be punished to discourage software piracy, only 48 agreed while 3 disagreed The balance remained undecided 93
112 Survey Final Report Discussion and Conclusions Problem of Piracy Software Piracy is a global phenomenon found both in developing countries as well as in developed countries With the expansion of IT facilities, the use of computers has entered into every business and household The driving force behind this expansion is undoubtedly the software that has helped to simplify tasks that were considered difficult and time consuming The industry spends billions of US dollars annually to develop new software and upgrade the existing software The Western world in particular has always recognised intellectual property rights of the creator and laws have been formulated to protect the creators rights However, due to the unique nature of software, it can be easily stolen without a physical loss of property to the owner This happens when single proprietary software is copied to a number of machines without a valid license Sometimes this software could be easily downloaded via internet This sort of unauthorised copying of software denies any royalty payment to the creator Despite the enactment of intellectual property law, according to some studies, Sri Lanka is also experiencing piracy of software at a fairly high level The purpose of this study was to assess the usage level of unauthorised software in the government and the other sectors of the country The Government of Sri Lanka (GOSL) is committed to control the unauthorised use of software and has taken active measures to control the situation However, as in any country this cannot be controlled only by legal means A carefully planned multi-prong approach is needed to reduce the level of software piracy without affecting the growth of the IT literacy in the country On one hand nobody could condone an illegal act and allow it to flourish in our society On the other hand if the costs of licensing are beyond the reach of an average user, can we ask him to give up IT completely? Are we to reverse our advances gained in popularising IT because of high costs of software? In this regard FOSS can play a crucial role and further advocacy and popularisation is needed to take FOSS to the masses The country s national universities are on the right track by promoting FOSS among the undergraduates Some university students are organised to promote FOSS but sadly lack resources to further their objectives In order to assess the use of unauthorised software a comprehensive survey was carried out and all relevant data was collected Considering the sensitive nature of the subject, it was not possible to get direct answers but attempts were made to arrive at conclusions by raising numerous queries related to software usage from the Head of Institutions or IT heads and actual computer users in surveyed institutions The outcome of this survey has been detailed in previous chapters where the information gathered from organisation Heads & 66 Users have been summarised The previous chapters detailed the usage of software in four sectors viz Education, IT, Private and Government It was observed that the use of unauthorised software is found in almost all of the institutions except in international software developing institutions that take strict measures to ensure that computers do not carry any unauthorized software 94
113 Survey Final Report Findings of the Study The study was carried out to access the usage level of Unauthorized Software in Educations, IT, Private & Government sectors by conducting a surveys with the Head of Institutions and a sample of 5 users from selected institutions As explained in Chapter 3, the final sample consisted of institutional Heads and 66 users of computers This dual approach was considered in order to verify the responses given by the Heads and its users As expected, discrepancies were observed in their responses provided by the Heads and the users It was observed that the users have provided more reliable information regarding software usage In order to simplify the study, different software were grouped in to 8 categories The categories were Operating Systems & related software, Desktop Application, 3Security Software, 4Database Software, 5Middleware 6Business Applications, 7Software Development Tools & Programming Languages and 8Statistical Applications Further, all the software were divided as licensed and unlicensed versions Free and Open Source Software (FOSS) also fell into the licensed category since it needed to be registered even though mostly available freeof-charge Although there were 8 categories most of the software found in the computers (85) fell into the categories of Operating Software, Desktop Applications and Security Software The findings of the study can be summarised as follows: There are eight broad categories of software that are found; I Operating Systems & related software II Desktop Applications III Security Software IV Database Software V Middleware VI Business Applications VII Software Development Tools & Programming languages VIII Statistical Applications Out of these, 85 of the software fell into the 3 categories namely Operating Systems & related software, Desktop Applications and Security Software The 66 user computers had recorded 77 different types of software which were categorized as mentioned above The mostly used software category was found to be Desktop Applications (3) followed by Operating Systems & related software (7), Security Software (66), Software Development Tools & Programming Languages (5), Database Software (44), Business Applications (3), Middleware (8) and Statistical Applications (6) 95
114 Survey Final Report 3 The analysis of user information revealed that the overall use of licensed software was 744 while the unlicensed software accounted for the balance 56 4 When different categories were considered, desktop applications had unlicensed software usage of 36, software development tools & programming languages 73 and operating systems, security software and statistical applications had a percentage 569 in total Database software had an unlicensed percentage of, while Middleware category had 4 5 All Business application software used were found to be licensed copies 6 In sector wise analysis, it was found that the use of unlicensed software was highest in the Education sector (49) followed by IT sector (8), Government sector (47) and Private sector (43) 7 When combined piracy levels were calculated for the 3 main categories namely Operating Systems & related software, Desktop Applications and Security Software piracy level was found to be 73 Here again, the education sector recorded an unlicensed usage level of 43 followed by the IT sector 38, Government sector 44 and Private sector 57 8 Out of the total Operating systems found in these user computers, 93 were Microsoft Windows while 6 consisted of Linux based Operating Systems and 7 consisted of VM Ware operating systems Further analysis indicated that 764 of the Microsoft Windows versions were licensed and the balance 36 carried various unlicensed Windows versions Sector wise analysis indicated that the Education sector had 86 of its Microsoft Windows Software unlicensed while Government sector had recorded 9, IT sector 67 & and the Private sector 88 9 In Desktop applications category too, the Education sector recorded the highest percentage of unlicensed software amounting to 467 followed by Government 399, IT sector 336 and Private sector 63 Out of the 8 software packages that was found under the Desktop category, 79 were found to be Microsoft Office packages and 7 were Adobe Photoshop, 55 Open Office and 3 were Adobe PageMaker The overall use of unlicensed Microsoft Office packages were 338 while it was found to be 4 in Education sector 38 in Government sector, 349 in the IT sector and 47 in the Private sector 96
115 Survey Final Report It was also noted that Open Source office packages such as Open Office and Libra Office accounted for 73 of the total Desktop applications Apart from this, institutions also used licensed software such as Kingsoft Office & Power Office 3 The other widely used Desktop Applications were Adobe Photoshop, which has an unlicensed usage level of 63, while Adobe PageMaker recorded 54 and Adobe Coral Draw The information gathered from Institution Heads or IT Heads provided data regarding the total number of PCs, Laptops and usage pattern of software in these institutions This information was analyzed to provide valuable supplementary data which provided a broader view of the software usage pattern 5 As expected, the most popular Operating System Software used by these institutions was Microsoft Windows Out of a total of 3,66 desktops that were using different Windows Operating Systems, 69 was found to be using Windows XP, 33 Vista and 76 Windows 7 6 Use of unlicensed Windows XP was 6 in Pentium III machines, 7 in Pentium IV machines, 6 in Dual Core Machines, 4 in Core machines and in Core i3, i5 & i7 machines It clearly demonstrates that the institutions are inclined towards buying licensed versions when they purchase new machines However, the older machines are having a back log of unlicensed copies The piracy levels of Microsoft Vista and Windows 7 were 3 and 3 respectively 7 The study also covered,3 laptops that were using Microsoft Windows operating systems and observed that 5 of the machines used Windows XP, while 3 was using Vista and 469 was using Windows 7 Here again, a declining trend of piracy in the newer machines was clearly evident As such, the unlicensed usage of Windows XP which was 34 in Pentium IV machines has declined to 7 in Dual Core machines, 3 in core machines and 7 in core i3,i5 & i7 machines The unlicensed usage levels of Windows Vista and Windows 7 were and 3 respectively 8 Out of 3,66 desktops that used Microsoft, 7 had MS Office 3 and 59 had MS office 7 while the balance 4 carried MS office The use of unlicensed MS Office 3 was 4 while MS Office 7 recorded 3, and MS Office was 3 Here again, it is observed that the use of unlicensed Microsoft Office has demonstrated a declining trend 9 In the,3 laptops surveyed, 38 had MS Office 3, 548 MS Office 7 and 34 MS Office Of the laptops using MS Office 3, 4 were found to be using unlicensed copies while 5 MS Office 7 were also found to be unlicensed copies However, of the laptops 97
116 Survey Final Report using MS Office had licensed versions This again shows the emerging trend of institutions opting for licensed copies of software with new purchases The other important Desktop Applications were Adobe Photoshop and Page Maker Photoshop was used in 4 of the PCs while Page Maker was available only in 7 of the 3,66 PCs surveyed It was found that the majority of the software in these PCs had unlicensed copies and the levels of piracy were 5 and 67 for Photoshop and PageMaker respectively This software was also found in 5 of a total of,3 laptops surveyed Of the two, Photoshop was found in 5 machines with 36 using unlicensed copies while PageMaker was used in only 6 machines with a piracy rate of 5 When the opinions were sought, almost 95 of the heads interviewed expressed that each computer should have licensed software and disagreed with the practice of using single licensed copy on multiple computers even within the same institution This clearly indicates their unwavering agreement to comply with the provisions of Intellectual Property Law Most head respondents (accounting to 8 of the total) agreed that the use of FOSS is more economical and 5 believe that in the long run, it is better to switch to FOSS than to use unlicensed software This indicates the possible options to the use of counterfeit software 3 Also 65 of the respondents agreed that FOSS is equally good as the licensed software and 53 believed that FOSS can be easily combined with existing proprietary software However, 59 have expressed the difficulty of training the staff to FOSS as they are already familiar with proprietary software This clearly signifies the importance of promoting FOSS to counter use of unauthorized software 4 Out of the total, 78 of the head respondents agreed that institutions are unable to pay high licensing fee for proprietary software Some indicated that in certain developing countries proprietary software is available at a cheaper rate and Sri Lanka should also explore this possibility of obtaining licensed software at an affordable price This proves further the importance of promoting FOSS as a viable alternative to the use of unlicensed software 5 Some Heads also expressed the view that the Government of Sri Lanka (GOSL) should develop FOSS based programmes to suit local requirements and popularize them so that those who cannot afford to buy expensive proprietary software could use the same without resorting to the use of pirated copies 6 Of the Heads surveyed, only 35 of the respondents have indicated that they are fully aware of the provisions of the Intellectual Property Act which provides required guidelines to the use of licensed software The lack of proper understanding of this law may be having an impact on the use of pirated software in the country Hence, more programs to create awareness on e-laws may help to reduce the piracy level in the country 7 When queried, a majority of the Head respondents expressed that the high level of piracy prevailing in Sri Lanka could harm the reputation and image of the country and could affect foreign investment 98
117 Survey Final Report 8 Out of the 66 user respondents, the majority were unaware of FOSS and the Intellectual Property Act This shows the need to create awareness among the computer users on the provisions of these Laws 9 Some organizations as an alternate to the use of unlicensed software have opted to buy cheaper licensed alternative software such as ZWCAD & Kingsoft office at a fraction of the cost of its expensive counterpart software and they speak well of the performances This indicates that people are willing to use licensed software if available at an affordable price Once again it was observed that an institution has negotiated for a popular virus guard at 35 of the normal cost by signing a volume license for three years This shows that institutions are exploring different ways and means to run their operations economically within the legal frame work If there is a forum for the heads to meet each other and share their experiences it could help the organizations to the use of licensed software without losing the momentum gained by the IT usage in the country 3 The biggest problem faced by the institutions is the cost of replacing unlicensed software with licensed copies in all the old machines Some organizations with 6-7 machines need over Rs million for this operation At least one large institution had decided to replace the unlicensed software with FOSS and had saved over Rs 5 million However, the shift has prompted the proprietary software company to offer an extremely attractive corporate package to buy their proprietary software In conclusion, we can observe the declining trend in piracy as a majority of institutions are opting for licensed software when they buy new machines The problem faced by most institutions is the replacement of older machines with licensed software It is also observed that piracy is less in comparatively cheaper software like Operating Systems and high in other software Some institutions feel that it is not fair to charge international rates for proprietary software for a developing country like Sri Lanka and negotiations should take place for concessionary rates Further, FOSS should be promoted as an alternative to pirated software and a mechanism should be set up to provide assistance for FOSS users whenever required 99
118 Appendix
119 Appendix I
120 SOFTWARE USAGE QUESTIONNAIRE I
121 Appendix II
122 SOFTWARE USAGE QUESTIONNAIRE II
123 Appendix III
124 List of Organizations and Contact Person No Code No Name of Organization Designation Contact Person Educational Institutions Asia Pacific Institute of IT Lanka (Pvt) Ltd Operations Manager Dr Athula Pitigalaarachchi American Education Centre Ltd (ANC) IT Executive Mr Tuan Packeer College Director Mr Pubudu Alahakoon 3 Australian Center for Business Study (ACBT) IT Manager Mr Sandun Eranda Gamage National Apprentice & Industrial Training Authority (NAITA) Head Of IT Mr Wanniarachchi 5 5 National Institute of Business Management (NIBM) Head Of IT Mrs Krishani Wijesiriwardana 6 6 University of Colombo - Faculty of Science Lecturer Of Physics (Coordinator of IT Unit) Mr Hiran HE Jayaweera 7 7 University of Moratuwa System Engineer Mr Sujith Fernando 8 8 Association of Accounting Technicians of Sri Lanka Director Computer Training Miss Shyamalie A Gunaratna 9 9 Chartered Institute of Management Accountants (CIMA) IT Infrastructure Analyst Mr Deleepa Illangakoon The Institute of Charted Accountants of Sri Lanka Chief Information Technology Officer Mr Gayan Wickramasinghe National Institute of Education Director IT Dr MB Ekanayake Sri Lanka College of Technology - Maradana Technical College Director Mr WMC Bandara IT Sector 3 6 Ceylinco Net Assist (Pvt) Ltd Marketing Manager Miss Luciana Maurene Anthony 4 7 DMS Training Centre Director Mr Palitha Rodrigo 5 8 IDM Computer Studies ( Pvt) Ltd Director Mr Harris Dissanayake 6 9 Informatics Institute of Computer Studies System Engineer Mr Asanka Upamal Walpitagamage 7 Singapore Informatics Institute Managing Director Mr Mohen Jayalath 8 Sri Lanka Institute of Information Technology (SLIIT) System Engineer Mr Pramod Hettihewa 9 OpenArc Computer School Ltd General Manager Mr Prabhath Nadurana 3 University of Colombo School of Computing (UCSC) Director Prof GN Wikramanayake 4 OST Training Centre Assistant General Manager Mr Mahesh Happitiya 5 AG Soft (Pvt) Ltd Project Manager Miss Vihashini De Cruze 3 6 Codeconnexion (Pvt) Ltd Finance Manager Mr Chaminda Abeysekara 4 7 Etisalat Lanka (Pvt) Ltd IT Manager Mrs Dinusha Ranaweera
125 5 8 hsenid Software International Team Leader - Network Mr Dulip Fonseka 6 9 IFS Sri Lanka LTD& IFS R & D Ltd Chief Operating Officer Mr Ranil Rajapakse 7 3 Just In Time (Pvt) Ltd Group CEO Dr Chandika Wickramatillake 8 3 Lanka Internet Services Ltd Managing Director Mr Rohith Udalagama 9 3 Sierra Information Technologies Ltd Deputy General Manager Mr Ananda Goonewardene 3 33 Softlogic Holdings PLC Director (Head of IT) Mr Haresh Kaimal 3 34 Suntel Lanka (Pvt) Ltd IT Manager Mr Prasad Samarasinghe 3 35 WS Lanka (Pvt) Ltd Senior Manager-System Administration Mr Dipendra De Silva ZILLIONe Systems Solutions (Pvt) Ltd Business Development Manager Mr Vinusha Perera DMS Electronics Sales Engineer Mr Yohan Gunasinghe EPSI Computers (Pvt) Ltd CEO Mr Niranjan Kanagasooriyam Science Land Software (Pvt) Ltd Director Mr Rohan Manamudali 37 Sri Lanka Telecom IT Manager Mr Janaka Harabaarachchi 38 Virtusa (Pvt) Ltd Managing Director Mr Madu Ratnayaka Private Sector 39 5 David Pieris information Technologies Ltd Officer Informations Systems Mr Chamilka Abagahawatta 4 5 Abans Group of Companies Manager - Resource & Project Applications Mr Sherwin Peter 4 53 ACL Cables Ltd Systems Manager Miss Helan De Fonseka 4 54 Bartleet & Co Ltd IT Manager Mr Darshan Gunaratne CIC Holdings PLC IT Manager Mr Nadeera Wijenayake Hatton National Bank Ltd Chief Information Officer Mr Sidath N Wijeratne DFCC Bank Assistant Vice President Mr Nishan Weerasooriya D H L Keells (Pvt) Ltd Information Systems Business Support Manager Mr Vajira Bandara Expolanka Freight Ltd Manger - IT Support Mr Dixon Pereira 48 6 Hemas Intl Freight (Pte) Ltd Manager - Business Solutions Mr Chaminda Hendawitharana 49 6 Colombo Hilton Residencies IT Coordinator Mr Sumal Fonseka 5 6 Aitken Spence & Co Ltd IT Manager Mr Anupama Wijayasinghe 5 63 Galadari Hotel Manager Information Systems Mr Lalith Wijeweera 5 64 Taj Exotica (Taj Lanka Resorts Ltd) Assistant IT Manager Mr Jehan Anfar Hidaramani Group Chief Information Officer Mr Samath Fernando EAM Maliban Textiles Pvt Ltd Manager MIS Mr Sanjeewa Kodikara
126 55 67 Kotagala Plantation PLC IT Manager Mr P Rajapaksha Kahawatte Plantation PLC IT Manager Mr Chaminda Thilakarathne CIC Agri Business Ltd Assistant General Manager - IT Mr Dhammika Jayasundara 58 7 Delmage Forsyth & Co Ltd Senior System Analyst Mr Nisal Rathnayaka 59 7 Siedles (Pvt) Ltd Director- Technical Mr Kaushik Udesh 6 7 George Steuart & Co Ltd Assistant IT Manager Ms Yamuna Pathirana 6 73 Hemas Travels (Pvt) Ltd IT Coordinator Mr R Dharmapalan 6 74 Amba Research Lanka (Private) Limited Senior Manager IT Mr Lasith Mayakaduwa Araliya Exporters (Pvt) Ltd CEO Mr Raj Kumar Capital Maharaja Organization Ltd Director Mr Sashi Rajamahendran Cargills (Ceylon) Ltd Director IT Mr Mohomed Barrie Bank of Ceylon, Central Office Chief Manager - IT Mr Ranaweera Ceylinco Life Insurance Co Ltd Deputy General Manager - ICT Mrs RMUK Rathnayake 68 8 Ceylon Tobacco Company Ltd IT Manager Mr Janak Weerakkodi 69 8 ODEL (Pvt) Ltd Executive - Network Administration Mr Najith Hasantha 7 8 Metropolitan Office (Pvt) Ltd Senior Manager - IT Division Mr Susil Peiris Government Sector 7 9 Auditor General's Department Deputy Auditor General Mr WPC Wickramarathna 7 9 Board of Investment of Sri Lanka Director (IT) Mr JPC Jayalath Ceylon Electricity Board Deputy General Manager IT Mr MG Thilakeratne Ceylon Petroleum Corporation IT Manager Mrs Sujani Fernando Coconut Development Authority Chief Innovation Officer Ms HMDW Herath Department of Census and Statistics Acting Director Mr SAS Bandulasena Department of Examinations Commissioner of Examinations (Technology) Mr KMH Bandara Department of Immigration & Emigration Deputy Controller Mr Chaminda Pathiraja Department of Inland Revenue Senior IT Consultant MR Suminda Sugathapala 8 Department of Motor Traffic Data Processing Manager Mr Priyantha Eriyagama 8 Department of Survey Generals Deputy Surveyor General (IT) Mr PAN De Silva 8 Department of Technical Education and Training Deputy Director - Data Processing Mr MDA Mahinda 83 3 Hector Kobbekaduwa Agrarian Research and Training Institute Senior System Analyst Mr MBL Senarath 84 4 Institute of Policy Studies of Sri Lanka Head of Information Systems and Data Mr Harin Kodagoda
127 85 5 Ministry of Agriculture Senior Assistant Secretary Mr TL Nandasiri 86 6 Ministry of Education Director ICT Mr G M Neil Gunadasa 87 7 Ministry of External Affairs Director Mr BN Pathirane 88 8 Ministry of Public Administration & Home Affairs Assistant Director ICT Mr Lalith Waduge 89 9 Ministry of Water Supply and Drainage IT Assistant Mr Sisira Kumara 9 Ministry of Youth Affairs & Skills Development Assistant Director Miss Samanthi Mihindukula 9 National Intellectual Property Office of Sri Lanka Deputy Director Mrs GR Ranawake 9 Sri Lanka Insurance Corporation Ltd Deputy General Manager ICT Mr Ajith Wijayasundara 93 3 Sri Lanka Railways Chief Innovation Officer Mr ATLP Samarasinghe 94 4 Sri Lanka Samurdhi Authority System Analyst Mr Hiran Prasanna 95 5 University Grants Commission Systems Analyst Mr BNS Lankasena 96 6 Vocational Training Authority Director (Administration) Mr NKJ De Silva 97 7 Ministry of Postal Service Senior Assistant Mr Lakshman Padmakumara 98 8 Employees Trust Fund IT Manager Mr WSS Dharmasiri 99 9 Associated Newspapers of Ceylon Ltd Head of Information Technology Mr KDR Perera Department of Pensions Deputy Director - Pensions Mr Pradeep Gunawardene
128 Appendix IV
129 REFERENCES Intellectual Property Act No36 of 3 Computer Crimes Act No 4 of 7 E-transactions Act No 9 of 6 Policy and Procedures for Information and Communication Technology Usage in e-government Policy - ICTA publication National Workforce Survey- ICTA Publication ICT Usage in Government Organizations Survey (ICTUGS) - ICTA BSA Global Software Piracy Report-May - Business Software Alliance Business Software Alliance News Release, Colombo may Overview of Sri Lankan IT Industry Dinesh B Saparamadu Addressing Global Software Piracy-Microsoft Software Copyright laws in Sri Lanka, its Implementation and Measures to improve its Enforcement IT Law Group Assignment, Department of Computer Science and Engineering, University of Moratuwa
National. icr Policy
National icr Policy TABLE OF CONTENTS Forward Acknowledgements 1. Principles...1 1.0 Introduction...1 1.1 Vision...2 1.2 Mission...2 1.3 Policy Context...2 2. Policy Objectives...4 2.1 ICT Infrastructure...4
National ICT Workforce Survey
National ICT Workforce Survey e-sri LANKA DEVELOPMENT PROJECT Cr : 3986-CE ICTA/CON/QCBS/P1/248 January 2010 Survey conducted on behalf of the ICT Agency of Sri Lanka and implemented by MG Consultants
Dundalk Institute of Technology. Acceptable Usage Policy. Version 1.0.1
Dundalk Institute of Technology Acceptable Usage Policy Version 1.0.1 1 Document Location..\DkIT_Policy_Documents\Policies Revision History Date of this revision: Date of next review: Version Revision
GENERAL CONDITIONS OF USE OF COMPUTING AND NETWORK FACILITIES
GENERAL CONDITIONS OF USE OF COMPUTING AND NETWORK FACILITIES Version 3.0 17/05/2012 CONTENTS 1. Introduction and Scope... 3 2. Data Protection Act 1998... 4 3. Licence Registration and Prevention of Piracy...
STRATEGIC POLICY REQUIRED HARDWARE, SOFTWARE AND CONFIGURATION STANDARDS
Policy: Title: Status: ISP-S9 Use of Computers Policy Revised Information Security Policy Documentation STRATEGIC POLICY 1. Introduction 1.1. This information security policy document contains high-level
Information Services. Regulations for the Use of Information Technology (IT) Facilities at the University of Kent
Scope Information Services Regulations for the Use of Information Technology (IT) Facilities at the University of Kent 1. These regulations apply to The Law All students registered at the University, all
Software Licensing and Compliance Guide
This message has been brought to you by m Software Licensing and Compliance Guide What every business needs to kw about software licensing and compliance. Welcome This guide was developed for businesses
USE OF INFORMATION TECHNOLOGY FACILITIES
POLICY CI-03 USE OF INFORMATION TECHNOLOGY FACILITIES Document Control Statement This Policy is maintained by the Information Technology Department. Any printed copy may not be up to date and you are advised
GFSU Certified Cyber Crime Investigator GFSU-CCCI. Training Partner. Important dates for all batches
GFSU Certified Cyber Crime Investigator GFSU-CCCI 1. Internet Fundamentals 2. Cyber Crime Essentials 3. Cyber Investigation Essentials 4. Digital Evidence in Computer Devices 5. Cyber Forensics Essentials
STATUTORY INSTRUMENTS SUPPLEMENT No. 1 11th May, 2012.
THE EAST AFRICAN COMMUNITY STATUTORY INSTRUMENTS SUPPLEMENT No. 1 11th May, 2012. to the East African Community Gazette No. 7 of 11th May, 2012. Printed by the Uganda Printing and Publishing Corporation,
IMPORTANT IT IS DEAMED THAT YOU HAVE READ AND AGREE TO ALL TERMS & CONDITIONS BEFORE USING THIS WEBSITE.
Terms & conditions for the use of this Website IMPORTANT IT IS DEAMED THAT YOU HAVE READ AND AGREE TO ALL TERMS & CONDITIONS BEFORE USING THIS WEBSITE. By using this website you are deemed to have full
Data Management Policies. Sage ERP Online
Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...
Software Piracy in the Arab Region
EGM on Enabling Environment for the Development of Arabic e-services Beirut, 8-9 March 2011 Software Piracy in the Arab Region Status, Impact and the Way Ahead Mansour Farah Consultant on ICT for Development
University of South Wales Software Policies
University of South Wales Software Policies Updated 23 rd January 2015 Page 1 University of South Wales - Software Policies The University s software policies are applicable to all software and datasets
Tameside Metropolitan Borough Council ICT Security Policy for Schools. Adopted by:
Tameside Metropolitan Borough Council ICT Security Policy for Schools Adopted by: 1. Introduction 1.1. The purpose of the Policy is to protect the institution s information assets from all threats, whether
Managing Security Risks in Modern IT Networks
Managing Security Risks in Modern IT Networks White Paper Table of Contents Executive summary... 3 Introduction: networks under siege... 3 How great is the problem?... 3 Spyware: a growing issue... 3 Feeling
How to Survive a Software Audit through Effective Software Management. By John Tomeny, Sassafras Software Inc.
assafras oftware Box 150, Hanover, NH 03755 (603) 643-3351 http://www.sassafras.com [email protected] How to Survive a Software Audit through Effective Software Management By John Tomeny, Sassafras Software
Ensuring HIPAA Compliance with AcclaimVault Online Backup and Archiving Services
Ensuring HIPAA Compliance with AcclaimVault Online Backup and Archiving Services 1 Contents 3 Introduction 5 The HIPAA Security Rule 7 HIPAA Compliance & AcclaimVault Backup 8 AcclaimVault Security and
ICT Student Usage Policy
ICT Student Usage Policy Document status Document owner Vice Principal Finance and Resources Document author IT Manager Document type Policy Date of document January 2015 Version number 04 Review requirements
Medford Public Schools Medford, Massachusetts. Software Policy Approved by School Committee
Software Policy Approved by School Committee General Statement of Policy The Medford Public Schools licenses the use of computer software from a variety of third parties. Such software is normally copyrighted
Software Asset Management Guide
Software Asset Management Guide WHY MANAGE SOFTWARE ASSETS Introduction IN TODAY'S ECONOMY, software is indispensable to every organization, large and small. Thanks to software, businesses are more efficient
GEORGIA DEPARTMENT OF CORRECTIONS Standard Operating Procedures IVJ01-0001. Authority: Effective Date: Page 1 of Wetherington/Ferrero 12/31/01 12
GEORGIA DEPARTMENT OF CORRECTIONS Standard Operating Procedures Functional Area: Office of Information Technology Subject: Technology Policies & Procedures Revises Previous Authority: Page 1 of Wetherington/Ferrero
Card Account means your Card account that is in relation to your Visa Wallet maintained and operated by Tune Money Sdn Bhd.
VERIFIED BY VISA TERMS AND CONDITIONS OF USE Important: The Verified by Visa service is designed to provide you with improved security when your BIG Card- Prepaid Visa is used to make purchases online.
ICT SECURITY POLICY. Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation
ICT SECURITY POLICY Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation Responsibility Assistant Principal, Learner Services Jannette
How To Get A License From A Business To A Computer (For A Business)
Six Steps to Completing a Software Audit and Ensuring Compliance While Saving Money A Guide to Assessing Vulnerabilities and Ensuring Ongoing Software License Compliance 200 West Mercer Street Suite E300
INFORMATION SECURITY MANAGEMENT SYSTEM. Version 1c
INFORMATION SECURITY MANAGEMENT SYSTEM Version 1c Revised April 2011 CONTENTS Introduction... 5 1 Security Policy... 7 1.1 Information Security Policy... 7 1.2 Scope 2 Security Organisation... 8 2.1 Information
Service Schedule for CLOUD SERVICES
Service Schedule for CLOUD SERVICES This Service Schedule is effective for Cloud Services provided on or after 1 September 2013. Terms and Conditions applicable to Cloud Services provided prior to this
THIS SERVICE LEVEL AGREEMENT DEFINES THE SERVICE LEVELS PROVIDED TO YOU BY THE COMPANY ( Exchange My Mail ).
THIS SERVICE LEVEL AGREEMENT DEFINES THE SERVICE LEVELS PROVIDED TO YOU BY THE COMPANY ( Exchange My Mail ). I. Service Definition. Exchange My Mail will provide Hosted Exchange and other Application Services
TERMS OF REFERENCE FOR CERTIFICATION BODIES (CBs)
TERMS OF REFERENCE FOR CERTIFICATION BODIES (CBs) AUGUST 2014 1. Introduction National Information Technology Authority (NITA-U) was established by the Act of Parliament (National Information Technology
THIS SERVICE LEVEL AGREEMENT DEFINES THE SERVICE LEVELS PROVIDED TO YOU BY THE COMPANY.
THIS SERVICE LEVEL AGREEMENT DEFINES THE SERVICE LEVELS PROVIDED TO YOU BY THE COMPANY. Capitalized terms used herein but not otherwise defined shall have their respective meanings set forth in the End
T +1 (345) 949-0330 / F +1 (345) 945-1448 / E: The Banking Code. Contents
1107 T +1 (345) 949-0330 / F +1 (345) 945-1448 / E: The Banking Code Contents 1 Introduction 3 2 Our Key Commitments to you 3 3 Helping you to choose Products and Services which meet your Needs 4 4 Interest
Data Protection Act 1998. Guidance on the use of cloud computing
Data Protection Act 1998 Guidance on the use of cloud computing Contents Overview... 2 Introduction... 2 What is cloud computing?... 3 Definitions... 3 Deployment models... 4 Service models... 5 Layered
Scope of Work Microsoft Infrastructure Upgrade
Introduction Scope of Work Microsoft Infrastructure Upgrade The University of Texas M. D. Anderson Cancer Center (M. D. Anderson) in Houston, Texas, celebrating six decades of Making Cancer History, is
EXTERNAL CRITICAL SUCCESS FACTORS FOR THE GROWTH OF STARTUP SOFTWARE DEVELOPMENT COMPANIES IN SRI LANKA
EXTERNAL CRITICAL SUCCESS FACTORS FOR THE GROWTH OF STARTUP SOFTWARE DEVELOPMENT COMPANIES IN SRI LANKA By J. C. Nanayakkara The dissertation was submitted to the Department of Computer Science and Engineering
Professional Ethics for Computer Science. Lecture 2: Ethics for IT Professionals and IT Users
Professional Ethics for Computer Science Lecture 2: Ethics for IT Professionals and IT Users Klaus Mueller Computer Science Department Stony Brook University Objectives What key characteristics distinguish
Sport and Sports Betting Integrity Action Plan Britain s approach to address risks to the integrity of sport and sports betting
Sport and Sports Betting Integrity Action Plan Britain s approach to address risks to the integrity of sport and sports betting Version 2.0 September 2015 Page 1 of 10 Sport and sports betting integrity
Head of Human Resources (Primary line manager) and Head of ICT
Job Description Job Title: Line manager: Responsible for: Key contacts & relationship: Systems and Database Administrator Head of Human Resources (Primary line manager) and Head of ICT No direct reports
NATIONAL ICT WORKFORCE SURVEY - 2013 EXECUTIVE SUMMARY
NATIONAL ICT WORKFORCE SURVEY - 2013 EXECUTIVE SUMMARY Positive domestic developments in post-conflict era and gradual recovery of the global economic situation have created conducive environment for growth
Online (Internet) Banking Agreement and Disclosure
Online (Internet) Banking Agreement and Disclosure This Online (Internet) Banking Agreement and Disclosure ( the Agreement") explains the terms and conditions governing the basic Online Banking services
BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY
BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY The Acceptable Use Policy ("the Policy") governs use of the Buckeye Express High Speed Internet Service ("the Service"). All subscribers
GETTING STARTED WITH A COMPUTER SYSTEM FACTSHEET
FACTSHEET When setting up a small business there can be many areas of uncertainty, but getting your IT or computer systems right and connected does not need to be one of them. If your company is either
region16.net Acceptable Use Policy ( AUP )
region16.net Acceptable Use Policy ( AUP ) Introduction By using service(s) provided by region16.net (including, but not necessarily limited to, Internet Services and videoconferencing), you agree to comply
Computer Use Policy Approved by the Ohio Wesleyan University Faculty: March 24, 2014
I. Introduction Computer Use Policy Approved by the Ohio Wesleyan University Faculty: March 24, 2014 Ohio Wesleyan University (OWU) provides computing resources to support the educational mission and administration
Computer, Network, Internet and Web Page Acceptable Use Policy for the Students of the Springfield Public Schools
Computer, Network, Internet and Web Page Acceptable Use Policy for the Students of the The computer and information technology resources, which includes World Wide Web access and electronic mail capability,
Software License Optimization and Compliance: 10 Best Practices
Software License Optimization and Compliance: 10 Best Practices Improve efficiency and save money through integrated Software Asset Management By Tim Clark and Kathy Stershic The FactPoint Group Table
Certificate and Diplomas in ICT Professional Competence (4520-01/02/03/04)
Certificate and Diplomas in ICT Professional Competence (4520-01/02/03/04) Levels 1-4 unit handbook for centres www.cityandguilds.com July 2011 Version 1.2 (May 2012) About City & Guilds As the UK s leading
University of Liverpool
University of Liverpool Information Security Policy Reference Number Title CSD-003 Information Security Policy Version Number 3.0 Document Status Document Classification Active Open Effective Date 01 October
Riverside Community College District Policy No. 3720 General Institution
Riverside Community College District Policy No. 3720 General Institution BP 3720 COMPUTER AND NETWORK USE References: Education Code Section 72400 Penal Code 502 17 U.S. Code Sections 101, et seq. It shall
INTERNET, EMAIL AND COMPUTER USE POLICY.
INTERNET, EMAIL AND COMPUTER USE POLICY. CONSIDERATIONS Code of Conduct Discipline and termination policy Privacy Policy Sexual Harassment policy Workplace Health & Safety Policy LEGISLATION Copyright
WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY
SMALL BUSINESSES WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY ONE CLICK CAN CHANGE EVERYTHING SMALL BUSINESSES My reputation was ruined by malicious emails ONE CLICK CAN CHANGE EVERYTHING Cybercrime comes
TERMS & CONDITIONS FOR INTERNET ACCESS. Service Provided by Fast Telecommunication Company W.L.L. (hereinafter referred to as FAST Telco )
TERMS & CONDITIONS FOR INTERNET ACCESS Service Provided by Fast Telecommunication Company W.L.L. (hereinafter referred to as FAST Telco ) These are the Terms & Conditions upon which Fast Telco will provide
Mandatory Provident Fund Schemes Authority COMPLIANCE STANDARDS FOR MPF APPROVED TRUSTEES. First Edition July 2005. Hong Kong
Mandatory Provident Fund Schemes Authority COMPLIANCE STANDARDS FOR MPF APPROVED TRUSTEES First Edition July 2005 Hong Kong Contents Glossary...2 Introduction to Standards...4 Interpretation Section...6
A Guide to Software Asset Management
A Guide to Software Asset Management About this Guide This guide has been developed to help businesses understand the fundamentals of Software Asset Management, to equip your organisation with the essential
Internet Use Policy and Code of Conduct
Internet Use Policy and Code of Conduct UNIQUE REF NUMBER: AC/IG/023/V1.1 DOCUMENT STATUS: Agreed by Audit Committee 18 July 2013 DATE ISSUED: July 2013 DATE TO BE REVIEWED: July 2014 1 P age AMENDMENT
2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy
Version History Author Approved Committee Version Status date Eddie Jefferson 09/15/2009 Full Governing 1.0 Final Version Body Eddie Jefferson 18/08/2012 Full Governing Body 2.0 Emended due to the change
Chapter 15: Computer Security and Privacy
Understanding Computers Today and Tomorrow 12 th Edition Chapter 15: Computer Security and Privacy Learning Objectives Explain why all computer users should be concerned about computer security. List some
PLEASE READ THIS AGREEMENT CAREFULLY. BY INSTALLING, DOWNLOADING OR OTHERWISE USING THE SOFTWARE, YOU AGREE TO THE TERMS OF THIS AGREEMENT.
Access Governance Suite 6 Lifecycle Manager 6 Compliance Manager 6 Software License Agreement PLEASE READ THIS AGREEMENT CAREFULLY. BY INSTALLING, DOWNLOADING OR OTHERWISE USING THE SOFTWARE, YOU AGREE
Information Security
Information Security A staff guide to the University's Information Systems Security Policy Issued by the IT Security Group on behalf of the University. Information Systems Security Guidelines for Staff
THE STATE UNIVERSITY OF ZANZIBAR (SUZA) JOB OPPORTUNITIES
THE STATE UNIVERSITY OF ZANZIBAR (SUZA) JOB OPPORTUNITIES The State University of Zanzibar (SUZA) is the only public university in Zanzibar established by Act No. 8 of the House of Representatives of 1999.
FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information
FINAL May 2005 Guideline on Security Systems for Safeguarding Customer Information Table of Contents 1 Introduction 1 1.1 Purpose of Guideline 1 2 Definitions 2 3 Internal Controls and Procedures 2 3.1
Cybercrime: risks, penalties and prevention
Cybercrime: risks, penalties and prevention Cyber attacks have been appearing in the news with increased frequency and recent victims of cybercrime have included well-known companies such as Sony, LinkedIn,
THE TRANSFER OF PERSONAL DATA ABROAD
THE TRANSFER OF PERSONAL DATA ABROAD MARCH 2014 THIS NOTE CONSIDERS THE SITUATION OF AN IRISH ORGANISATION OR BUSINESS SEEKING TO TRANSFER PERSONAL DATA ABROAD FOR STORAGE OR PROCESSING, IN LIGHT OF THE
St. Peter s C.E. Primary School Farnworth Email, Internet Security and Facsimile Policy
Learn, sparkle & shine St. Peter s C.E. Primary School Farnworth Email, Internet Security and Facsimile Policy Adopted from the LA Policy April 2015 CONTENTS Page No 1. Introduction 1 2. Guiding Principles
Software Copyright. 1. Introduction. Last update: July 2009
- 1. Introduction...1-1.1. The scope of this briefing paper...1-1.2. "Software" defined...1-2. What is software copyright?...2-3. The Community Directive on software copyright...3-3.1. What does software
STFC Monitoring and Interception policy for Information & Communications Technology Systems and Services
STFC Monitoring and Interception policy for Information & Communications Technology Systems and Services Issue 1.0 (Effective 27 June 2012) This document contains a copy of the STFC policy statements outlining
IT SECURITY POLICY (ISMS 01)
IT SECURITY POLICY (ISMS 01) NWAS IM&T Security Policy Page: Page 1 of 14 Date of Approval: 12.01.2015 Status: Final Date of Review Recommended by Approved by Information Governance Management Group Trust
BRIGHAM AND WOMEN S HOSPITAL
BRIGHAM AND WOMEN S HOSPITAL HUMAN RESOURCES POLICIES AND PROCEDURES SUBJECT: SOCIAL MEDIA, ELECTRONIC COMMUNICATION and ACCEPTABLE USE POLICY #: HR-503 EFFECTIVE DATE: January 1, 2008 POLICY This policy
THIS SERVICE LEVEL AGREEMENT DEFINES THE SERVICE LEVELS PROVIDED TO YOU BY COMPANY.
THIS SERVICE LEVEL AGREEMENT DEFINES THE SERVICE LEVELS PROVIDED TO YOU BY COMPANY. Capitalized terms used herein but not otherwise defined shall have their respective meanings set forth in the End User
USFSP Network Security Guidelines
USFSP Network Security Guidelines Table of Contents I. Access to Data II. Workstations and Personal Computers A. Computer Viruses B. Software C. Hardware D. Storage Media III. Local Area Networks (LANs)
Kenmore State High School Student Laptop Charter
Kenmore State High School Student Laptop Charter 2 Contents Student Laptop Charter... 4 Loan equipment... 4 Equipment ownership... 5 Fee for provision of laptop... 5 Laptop care... 6 Data security... 6
ATHLONE INSTITUTE OF TECHNOLOGY. I.T Acceptable Usage Staff Policy
ATHLONE INSTITUTE OF TECHNOLOGY I.T Acceptable Usage Staff Policy Table of Contents 1. Purpose... 2 2. Terminology... 2 3. Scope... 2 4. Acceptable Usage Policy... 3 5. Policy Acceptance... 6 6. Policy
Rethinking Schools Limited Institutional Site License
Rethinking Schools Limited Institutional Site License This License Agreement ( License ) is entered into the day of [20 ] ( Effective Date ) between Rethinking Schools Limited, a Wisconsin Corporation,
Grasmere Primary School Asset Management Policy
Grasmere Primary School Asset Management Policy 1. INTRODUCTION: 1.1.1 The Governing Body of Grasmere Primary School is responsible for the proper management and security of the school premises and the
