ASSESSMENT OF SOFTWARE USAGE IN SRI LANKA SURVEY FINAL REPORT January by Pvt Ltd #3, Galle Road, Colombo 3, Sri Lanka Tel (94 ) 3757, 3757, 474334 Fax (94 ) 468548 E-mail: info@skillsinternationallk Website: wwwskillsinternationallk
Survey Final Report ACKNOWLEDGEMENT Many people provided invaluable help in numerous ways to complete this study successfully Our greatest debt is obviously, to those heads of institutions and their staff for the contributions and assistance rendered to us in completing the questionnaires and providing valuable information for the study Our gratitude is also extended to MrReshan Dewapura, Chief Executive Officer - Information and Communication Technology Agency of Sri Lanka (ICTA) for his invaluable contribution to make the study a success, MrJayantha Fernando, Director/ Legal Advisor ICTA for his guidance and providing opportunity to complete the study successfully and Mr Jagath Seneviratna, Programme Head, Monitoring and Evaluation of ICTA for his professional guidance, technical support and encouragement extended to us throughout the study We are also grateful to MrSanjaya Karunasena, Chief Technology Officer and other officers of ICTA who provided invaluable contributions in training our research team We would like to express our special gratitude to all the Field Research Officers and Research Assistants for working with a high level of commitment that enabled us to deliver a quality product on time A special thanks goes to all the others too numerous to mention who provided invaluable help with quantity checking of data, statistical analysis and useful comments towards the successful completion of the study We also acknowledge the contribution by Mr Indika Siriwardena, who provided valuable comments during the report review stage and all the staff seconded from (Pvt) Ltd, who helped in the project from its inception I
Survey Final Report TABLE OF CONTENTS Acknowledgement Table of Contents List of Figures List of Tables Abbreviations Executive Summary I II IV VI IX X Introduction Background Types of Piracy 3 Objectives of the Assignment 3 4 Scope of the Assignment 3 5 Expected Outputs/Deliverables of the Survey 4 Review of Relevant Literature 4 3 Methodology 6 3 The sampling framework 6 3 Information Sources for the survey population 7 33 Design of Questionnaires and Field Testing 8 34 Field Survey 35 Awareness Building 36 Activities Planned To Overcome Potential Survey Implementation Errors 37 Limitations of the Survey 38 Data entry and analysis 3 4 Profile of the Respondents 3 4 Profile of the Head Respondents 3 4 Profile of the User Respondents 7 II
Survey Final Report 5 Institution Profile 6 Software Usage Pattern 4 6 Security software usage Pattern 7 6 Sources of Supply of Software to the Institutions 3 7 Usage of Licensed & Unlicensed Software 33 7 Analysis of Software Usage Patterns in User Computers 33 7 Sector wise Analysis of User Software 4 8 Awareness on E- laws related to the use of Computers 76 8 Awareness of Head Respondents on E-Laws 76 8 Awareness of User Respondents on E-Laws 78 9 Views and Opinions Expressed by the Respondents on Piracy 79 9 Impact on Country s Economy 79 9 Reasons for using unlicensed software 8 93 Opinions expressed by Head Respondents on the Use of FOSS 85 94 Opinions expressed by User Respondents on the Use of FOSS 9 Discussion and Conclusions 94 Problem of Piracy 94 Findings of the study 95 Appendixes Appendix I - Software Usage Questionnaire I Appendix II Software Usage Questionnaire II Appendix III Sample selected for the Survey - List of Organizations and contact person Appendix IV References III
Survey Final Report List of Figures Figure 4: Gender Profile of the Head Respondents 4 Figure 4: Sector wise Analysis of the Head Respondents 5 Figure 43: Gender analysis of the User Respondents 8 Figure 44: Age Profile of User Respondents 9 Figure 6: Software Usages in Surveyed Institution 5 Figure 6 Distribution of Desktop Applications 7 Figure 63 Distribution of Database Software 9 Figure 64 Distribution of Middleware 3 Figure 65 Distributions of Business Applications 3 Figure 66 Distribution of Software Development Tools & Programming Languages 3 Figure 7 Distribution of User Software Categories found in the sample 34 Figure 7 Usage Pattern of Different software Categories in the sample 36 Figure 73 Usage Pattern of Operating Software in User Computers 37 Figure74 Usage Pattern of Unlicensed software in User computers-sector wise 45 Figure 75 Use of Unlicensed software in user computers Sector and software category wise 46 Figure 76 Sector wise Usage of Unlicensed Operating Systems & related Software in User Computers 49 Figure 77 Sector wise Usage of Unlicensed Desktop Applications in User Computers 5 Figure 78 Sector wise Usage of Unlicensed Security Software in user computers 54 Figure 79 Sector wise Usage of Unlicensed Database Software in the User Computers 56 Figure 7 Sector wise usage of Unlicensed Middleware in user computers 58 Figure 7 Sector wise Usage of Unlicensed Software Development Tools in user computers 6 Figure 7 Sector wise Usage of Unlicensed Statistical Applications in user computers 63 Figure 73 Usage pattern of Windows Operating Systems in Surveyed PCs 64 IV
Survey Final Report Figure 8: Awareness on Intellectual Property Act by the Heads in Different Sectors 76 Figure 8 Awareness on Computer Crimes Act by Heads of different Sectors 77 Figure 83: Awareness on E-Transactions Act by Heads of different Sectors 77 Figure 9: Statement No - Responses Received from the head respondents from Different Sectors 8 Figure 9: Statement No - Responses Received from the head respondents from Different Sectors 8 Figure 93: Statement No 3 - Responses Received from the Head respondents from Different Sectors 8 Figure 94: Statement No 4 - Responses Received from the head respondents from Different Sectors 83 Figure 95: Statement No 5 - Responses Received from the head respondents from Different Sectors 83 Figure 96: Statement No 4 - Responses Received from the head respondents from Different Sectors 84 Figure 97: Statement No 7 - Responses Received from the Head Respondents from Different Sectors 85 Figure 98: Responses received from Education sector 88 Figure 99: Responses received from IT sector 89 Figure 9: Responses received from Government sector 9 Figure 9: Responses received from Private sector 9 V
Survey Final Report List of Tables Table 3 Information Sources for the Survey Population 7 Table 3 Summary Details of the Sample 8 Table 33 Respondents of the Survey Table 34: Questionnaire Response rate Table 4: No of Heads and Users interviewed 3 Table 4: Ages and Gender Profile of Head Respondents 4 Table 43: Academic Qualification of Head Respondents 5 Table 44: IT Professional Qualifications of Head Respondents 6 Table 45: Job Designations of Head Respondents 7 Table 46: Age and Gender profile of the User Respondents 8 Table 47: Educational Qualifications of User Respondents 9 Table 48: Type of Training received by User Respondents Table 49: IT Qualifications of User Respondents Table 5: Number of Domains and Websites maintained by responded Institutions Table 5: Local Area Networks (LAN) and network connections maintained by the Institutions Table 53: E -mail accounts maintained by the institutions 3 Table 54: Types of Connectivity used by Institutions 3 Table 55: Types of IT facilities available in surveyed Institutions 4 Table 6 Usage of Operating Systems & related Software 5 Table6 Usage of Desktop Applications in surveyed institutions 6 Table 63 Security Software Usage Pattern in the institutions 8 Table 64 Usage of Database Software 8 Table 65 Usage of Middleware 9 Table 66 Usage of Business Applications 3 Table 67 Usage of Software Development Tools & Programming Languages 3 Table 68 Sources of Supply of software 3 Table 7 Distribution of user Software Categories in the sample 34 Table 7 Usage Pattern of Different software Categories in the sample 35 Table 73 The Usage pattern of Operating Systems & related Software in User computers 37 VI
Survey Final Report Table 74 Usage Pattern of Desktop Applications in User Computers 38 Table 75 Usage Pattern of Security Software in User Computers 39 Table 76 Database Software Usage Pattern in User computers 39 Table 77 Usage Pattern of Middleware in User Computers 4 Table 78 Usage Pattern of Business Applications in User Computers 4 Table 79 Usage Pattern of Software Development Tools & Programming Languages in User Computers 4 Table 7 Usage Pattern of Statistical Applications in User Computers 4 Table7 Sector wise Usage Pattern of Different Software Categories 43 Table 7 Combined Software Usage patterns of Operating, Security and Desktop Applications 44 Table 73 Sector wise Usage Pattern of Operating Systems in User Computers 48 Table 74 Sector wise Usage Pattern of Desktop Applications in User Computers 5 Table 75 Sector wise Usage Pattern of Security Software 53 Table 76 Sector wise Usage Pattern of Database Software in the User Computers 55 Table 77 Sector wise Usage Pattern of Middleware 57 Table 78 Sector wise Usage Pattern of Business Applications in the user computers 59 Table 79 Sector wise Usage Pattern of Software Development Tools & Programming Languages in User Computers 6 Table 7 Sector wise Usage Pattern of Statistical Applications 63 Table 7 Use of Windows Operating Systems in Various PCs 64 Table 7 Usage Pattern of Windows XP Operating Systems in Desktop Computers 65 Table 73 Usage Pattern of Vista Operating System in Desktop Computers 66 Table 74 Usage Pattern of Window 7 Operating System in Desktop Computers 67 Table 75 Use of Window XP Operating Systems in Laptops 68 Table 76 Use of Windows Vista Operating Systems in Laptops 69 Table 77 Use of Windows 7 Operating Systems in Laptops 7 Table 78 Usage pattern of Microsoft Office software in Desktop Computers 7 Table 79 Usage pattern of Microsoft Office Software in Laptops 73 Table 73 Use of Other Desktop Application Software in Desktop Computers 74 Table 73 Use of Other Desktop Application software in Laptops 75 Table 8: Awareness of Head Respondents on E-Laws 76 Table 8: Awareness of User Respondents on E-Laws 78 Table 83: Awareness of User Respondents on E-Laws for different sectors 78 VII
Survey Final Report Table 9: Impact of Software piracy on Country s Economy-Opinions expressed by Heads of Institutes 79 Table 9: Opinions Expressed by Head Respondents 8 Table 93: Responses Received for the Statements from Head Respondents 86 Table 94 Responses Received from User Respondents on the use of FOSS 9 VIII
Survey Final Report ABBREVIATIONS ACS BSA BCS BPO CCNA CIO DBA FOSS HND ICDL ICT ICTA KII SCJP SPSS TOR Australian Computer Society Business Software Alliance British Computer Society Business Process Outsourcing Cisco Certified Network Associate Chief Innovation Officer Database Administrator Free Open Source Software Higher National Diploma International Computer Driving License Information and Communication Technology Information and Communication Technology Agency Key Informant Interviews Sun Certified Java Programmer Software Package for Social Sciences Terms of Reference IX
Survey Final Report EXECUTIVE SUMMARY The objective of this study was to assess the usage level of software in all economic sectors of Sri Lanka Although Sri Lanka enacted the Intellectual Property Act in 3 to safeguard the copyrights of the software developers as well, several studies have shown that the piracy rate in the country remains high despite some reduction in this level in the year To achieve the government s objectives of 75 IT literacy by 6 and turning Sri Lanka into an IT centred knowledge hub and making ICT affordable and accessible to all sectors It is important to see that all these developments take place within the established legal framework Hence, a study of this nature is imperative not only to find out the level of piracy but also to provide more insight into key socio-economic attitudes and behaviours related to the use of unlicensed software so that corrective actions could be taken without hindering the growth of the industry Therefore the purpose of the study was to undertake a survey to identify necessary variables, collect the appropriate data and generate a comprehensive analytical report on unauthorised usage of software in the country The study was conducted by with technical inputs from ICTA In order to obtain relevant data required for the analysis, two surveys were carried out as face-to-face interviews using structured questionnaires To capture the broader picture involved in the use of unlicensed software in an institution, it is essential but not sufficient to obtain relevant information only from the Head /CEO or from the Head of the IT department of the institution Hence, a second questionnaire was developed to gather information from a sample of -5 computer users from each institution concerning the actual practices of the institution in relation to the use of unlicensed software The information gathered from these users was found to be more reliable since the enumerators were able to meet them individually and explain the national importance of the study They also established very cordial relationships with these respondents and managed to obtain accurate information This was revealed when users information was compared with the information provided by their heads In addition to these surveys, Key Informant Interviews (KIIs) were conducted to gather complementary and qualitative information required for the study X
Survey Final Report A comprehensive sampling frame was developed by including all vital sectors of the economy These institutions were grouped into four sectors namely, Education, IT, Private and the Government A stratified sampling method was adopted to select equal sample sizes from each sector The heads of selected institutions were interviewed by trained enumerators and further -5 computer users from each of the institutions were randomly selected to interview and complete the user questionnaire Considering the sensitive nature of this study, special precautions were taken to educate the Heads of Institutions assuring the confidentiality of the information The interviews were conducted on a voluntary basis and the institutions that were not willing to participate were left out Even some institutions that consented to participate in the survey opted to refrain from answering some questions citing them as confidential information The information used for the study was based purely on what was made available to the consultants and no physical verifications were carried out to ascertain the accuracy of information provided by the institutions or the computer users The key findings of the study are summarised below The study was conducted to generate and create a better understanding on the use of unlicensed software and to study the underlying factors and current trends on the subject Due to the complexities of the practices involved in different institutions, it is not appropriate to express piracy level as a single percentage value Piracy values change drastically between sectors, software categories and institutions In order to make these studies meaningful, software were categorized as Operating Systems & related Software Desktop Applications, 3Security Software, 4Database Software, 5Middleware 6Business Applications, 7Software Development Tools & Programming Languages and 8Statistical Applications Further, all software were distinctly identified either as licensed software or unlicensed software based on whether the software is registered with the copyright owner Under this division, Free Open Source Software also fell into the licensed category XI
Survey Final Report 3 When similar information provided by the Heads of the institutions and users of the same institutions was compared, it was revealed that in some institutions the management had not provided accurate information This may have been due to the fact that consideration to the reputation of the organization was considered with possible legal implications arising later This was noted when some institutions informed us that they needed to obtain even board approvals before providing the required information Hence, the information provided by the 66 users was considered for arriving at the conclusion The information provided by the Heads was useful in providing supplementary information to broaden the study area 4 The 66 user computers had recorded 77 different types of software and were categorized as mentioned above The mostly used software category was found to be Desktop Applications (3) followed by Operating Systems & related software (7), Security Software (66), Software Development Tools & Programming Languages (5), Database Software (44), Business Applications (3), Middleware (8 ) and Statistical Applications (6) 5 The analysis of user information revealed that the overall use of licensed software was 744 while the unlicensed software accounted for the balance 56 6 Further, when different categories were considered, Desktop Applications had the unlicensed software usage of 36, Software Development Tools & Programming Languages 73 and Operating Systems, Security Software and Statistical Applications had a percentage of, and 5 respectively Database software had an unlicensed percentage of, while middleware category had 4 of its software unlicensed In case of Business Applications, all software were found to be licensed copies 7 In sector wise analysis, it was found that the use of unlicensed software was highest in the Education sector (49) followed by IT sector (8), Government sector (47) and Private sector (43) 8 Out of the 8 categories of software, 85 of the total software usage fell into 3 categories namely - Operating Systems & related Software, Desktop Applications and Security Software When combined values were derived, it was found that licensed software usage XII
Survey Final Report was 77 and the unlicensed level was 73 Here again, the education sector recorded an unlicensed usage level of 43 followed by IT sector 38, Government sector 44 and Private sector 57 9 Out of the total Operating Systems & related Software found in the user computers, 93 were Microsoft Windows while 6 consisted of Linux based Operating Systems and 7 consisted of VM Ware Operating systems Further analysis indicated that 764 of the Microsoft Windows versions were licensed and the balance 36 carried various unlicensed Windows versions Sector wise analysis indicated that the Education sector had 77 of its Microsoft Windows software unlicensed, while the Government sector had recorded 5, IT sector & and the Private sector 89 In the Desktop Applications category too, the Education sector recorded the highest percentage of unlicensed software amounting to 467 followed by the Government sector 399, IT sector 336 and the Private sector 63 Of the total of 8 software packages found under the Desktop category, 79 were found to be Microsoft Office packages, 7 were Adobe Photoshop, 55 Open Office and 3 were Adobe PageMaker The overall use of unlicensed Microsoft Office packages were 338 while the level of unlicensed Microsoft Office was found to be 4 in the Education sector, 38 in Government sector, 349 in IT sector and 47 in the Private sector 3 It was also noted that Open Source Office Packages such as Open Office and Libre Office accounted for 73 of the total Desktop Applications Apart from this, institutions also used licensed software such as Kingsoft Office & Power Office 4 The other widely used Desktop Applications were Adobe Photoshop, with an unlicensed usage level of 63, Adobe PageMaker 54 and Adobe Coral Draw 875 5 The information gathered from Institutional Heads or IT Heads provided data regarding the total number of PCs and Laptops and the usage patterns of software This information was analyzed to provide valuable supplementary data which helped to broaden the view of the software usage patterns XIII
Survey Final Report 6 As expected, the most popular Operating Software used by these institutions was Microsoft Windows Out of a total of 3,66 desktops that were using different Windows Operating Systems, 69 was found to be using Windows XP, 33 Vista and 76 Windows 7 Use of unlicensed Windows XP was 6 in Pentium III machines, 7 in Pentium IV machines, 6 in Dual Core Machines, 4 in Core machines and in Core i3, i5 & i7 machines This clearly demonstrates that institutions are inclined towards buying licensed Operating Systems with the new purchases of hardware but were not replacing the Operating Systems in the older machines As such there was a back log of unlicensed copies The piracy levels of Microsoft Vista and Windows 7 were 3 and 3 respectively 7 The study also covered,3 laptops that were using Microsoft Windows Operating Systems and observed that 5 of the machines used Windows XP while 3 were using Vista and the balance 469 were using Windows 7 Here again, a declining trend of piracy in the newer machines was clearly evident As such, the unlicensed usage of Windows XP was 34 in Pentium IV machines, 7 in Dual Core machines, 3 in Core machines and 7 in Core i3,i5 & i7 machines The unlicensed usage levels of Windows Vista and Windows 7 were and 3 respectively 8 Out of 3,66 desktops that used Microsoft, 7 had MS Office 3 and 59 had MS Office 7 while the balance 4 carried MS Office The use of unlicensed MS Office 3 was 4 while MS Office 7 recorded 3, and MS Office was 3 Here again, the observation was that the use of unlicensed Microsoft Office demonstrated a decline 9 In the,3 laptops surveyed, 38 had MS Office 3, 548 MS Office 7 and 34 MS Office Of the laptops using MS Office 3, 4 were found to be using unlicensed copies while 5 MS Office 7 were also found to be unlicensed However, of the laptops using MS Office had licensed versions This again shows the emerging trend of institutions opting for licensed software with new purchases The other widely used Desktop Applications found in a smaller number of machines were Photoshop and PageMaker However, it was observed that 5 of the Adobe Photoshop Software was unlicensed, while 67 of the Adobe PageMaker Software was also unlicensed The similar percentages were observed in user machines as well XIV
Survey Final Report There was a clear indication that institutions are firmly in favour of Intellectual Property Rights, as 95 of the institution Heads interviewed agreed that each computer should have a licensed copy of the software They further disagreed with the practice of using single licensed copy on multiple computers in an office This demonstrates the views held by the Heads that innovators should be paid for their creations as it provides incentives for further advancement in technology Most of the Head respondents accounting to 8 of the total, agreed that the use of FOSS is more economical and 5 believed that in the long run, it is better to switch to FOSS than to use unlicensed software This is a clear indication that using FOSS is definitely the most preferred and acceptable option to the use of unlicensed software 3 Also 65 of the Head respondents agreed that FOSS is equally as good as licensed software and 53 believed that FOSS could be easily combined with existing proprietary software However, 59 expressed the difficulty of training staff to FOSS as they are already familiar with proprietary software Although some expressed the view that FOSS is less efficient as compared to proprietary software, creating awareness of its advantages may influence at least those who find it difficult to pay for proprietary software to shift to FOSS thus avoiding the use of pirated software Many expressed fear to adapt to the use of FOSS due to the lack of professional support available to users in case of technical difficulty Some even suggested that ICTA should have a resource unit to assist FOSS users in such situations 4 Of the total surveyed, 78 of the Head respondents agreed that institutions are unable to pay high licensing fee for proprietary software Some have indicated that in certain developing countries, such as in India, proprietary software is available at much cheaper rates and suggested that Sri Lanka should also explore the possibility of obtaining licensed software at an affordable price However, Microsoft representatives refuted this allegation and confirmed that costs of their software in Sri Lanka is the same as compared to other countries in the region They also mentioned about the very special rates available to students, universities, approved training institutions and state sector for their software However, it appeared during the survey, that this information has not spread to these sectors correctly XV
Survey Final Report 5 Of the hundred Heads interviewed, only 35 indicated that they are fully aware of the provisions of the Intellectual Property Act which provides required guidelines to the use of licensed software The lack of proper understanding of this law may have an impact on the use of pirated software in the country Therefore, programmes may be organised to create awareness on Intellectual Property Law and other computer related legislations among institutions 6 The majority of Head respondents felt that the levels of piracy prevalent in Sri Lanka could harm the reputation of the country and may affect foreign investment Hence the opinion was it is important to take steps to prevent the use of unlicensed software 7 In contrast to the institutional Heads, a significant percentage of user respondents were found to be unaware of FOSS and the Intellectual Property Act This shows the need to create awareness among computer users in these areas and the need for educating computer users 8 Some organisations as an alternate to the use of unlicensed software have opted to buy cheaper licensed alternative software such as ZW CAD and Kingsoft Office at a fraction of the cost of its expensive counterpart software This indicates that people are willing to use licensed software if available at an affordable price An institution has successfully negotiated for a popular virus guard at 35 of the normal cost by signing a volume license for three years This shows that institutions are exploring different ways and means to run their operations economically within the legal frame work If there is a forum for the Heads to meet each other and share their experiences it could lead the organisation towards the use of licensed software without losing the momentum gained by the IT usage in the country 9 The most crucial factor faced by the institutions is the total cost of replacing all unlicensed software from old machines with licensed software Some organisations having 6-7 machines need over Rs million for such a switch over It was observed that one large institution has successfully replaced the unlicensed software with FOSS and has reported saving over Rs 5 million However, the shift has prompted the proprietary software company to offer an extremely attractive corporate package to buy their proprietary software XVI
Survey Final Report 3 The Government of Sri Lanka (GOSL) is committed to control the unauthorised use of software and has taken active measures to prevent piracy in the country However, this cannot be controlled only by legal means A carefully planned multi pronged approach is needed to reduce the level of software piracy without affecting the growth of IT literacy in the country On one hand nobody could condone an illegal act and allow it to flourish in our society On the other hand if the costs of licensing are beyond the reach of an average user, it can be a discouraging factor for the growth of IT in all sectors In this regard FOSS can play a crucial role Further advocacy and popularisation is needed to take FOSS to the masses The country s national universities are on the right track by promoting FOSS among the undergraduates In conclusion, it is encouraging to note a declining trend in software piracy, as most institutions are opting for licensed software with the purchase of new machines The problem faced by most institutions is the replacement of the older machines with licensed software It is also observed that piracy is less in cheaper software such as Microsoft Operating Systems and the piracy is high in more expensive software ie Microsoft Office Some institutions also indicated that it is unfair to charge international rates for proprietary software from a developing country like Sri Lanka and that negotiation should take place to secure concessionary rates Ironically, although ICT is considered a shortcut to accessing information, the lack of knowledge exhibited by the respondents and at times by the Heads of institutions, indicated the need for more awareness on the legal and other economic ramifications of software piracy Hence, it is proposed that ICTA adopts a more comprehensive information sharing and awareness creation strategy to inform different economic sectors and general public at large, particularly the youth, on the implications of software piracy Given the relatively short time period, the range of the survey was controlled and restricted to specific sectors While we recognise this is a limitation faced in any type of survey, by conducting surveys at regular intervals, ICTA could monitor and assess the current context with regard to software piracy in Sri Lanka This would allow a better understanding of the trends in various sectors and would assist in developing appropriate strategies to minimise the problem XVII
Survey Final Report INTRODUCTION Background Computers and software have become essential tools in our businesses, schools, factories, banks and personal lives At the beginning, computer companies offered the total system comprising hardware, software and training thus restricting the compatibility of software to their own machines However, this situation changed drastically in 97s, leading to un-bundling of hardware and software leading to the manufacture of cheaper computers and the emergence of independent software development Further, the introduction of personal computers (PC) by IBM in the early 98s made PC an easy-to-use but also a powerful tool in business applications With the growth of PC usage, software developers began to concentrate more on user-friendly programmes targeting the majority of endusers The PC based local area networks (LAN) also became as powerful as the mainframes and also extended the scope of the software development leading to the emergence of extremely strong software industry However, like any other technology, software technology is also severely affected by the breach of intellectual property rights (of the creator) as a result of unauthorised copying or pirating of software Software piracy is defined as the unauthorised copying or distribution of copyrighted software This can be done by copying, downloading, sharing, selling, or installing multiple copies onto personal or work computers When a consumer purchases software, they are actually purchasing a license to use it, not the actual software The license condition stipulates how many times the purchaser can install the software If more copies of the software than the license permits are used, it amounts to piracy and hence, breaking of the law Whether the consumer is casually making a few copies for friends, loaning CDs, downloading or distributing pirated software from the Internet, or buying a single software program and then installing it on multiple computers, the consumer is committing copyright infringement and therefore, software piracy Another type of piracy is when licensed software is illegally obtained through internet channels using peer-to-peer file sharing or downloads from pirate websites that offer free software Pirated products often fail to function properly or worse, are capable of infecting the users PSs with malware that has the potential to cause serious damage When software is pirated, consumers, software developers, and resellers are harmed On the other hand, software piracy increases the risk of the consumer s computer being corrupted by defective software Those who provide defective and illegal software do not tend to provide after sales technical support Pirated software usually has inadequate documentation, which prevents consumers from enjoying the full benefits of the software package In addition, consumers are unable to take advantage of technical support and product upgrades from the original developers, which are typically available to legitimate registered users Pirated software can also cost consumers loss of time and money According to some studies carried out by Business Software Alliance (BSA) almost 4 of the all software installed in PCs is obtained from illegal means The report also says that for every $ worth of legitimate software sold in 9, an additional $75 worth of unlicensed software makes its way into the market When piracy takes place software developers lose revenue not only from current products but also from future programs When software is sold, most developers invest a portion of the revenue
Survey Final Report into future research and development activities to develop better software packages Hence, when software is pirated, not only does the software developer lose revenue from the current sales of their products, but also hinders the development of new software The economic impact of software piracy goes beyond the retail value of pirated software One among the many negative consequences of software piracy is the crippling of the emerging local software industry Other significant outcomes include loss of tax revenue and jobs due to the lack of a legitimate market and decreased business productivity from using defective and unsupported software Types of Piracy Software piracy occurs in many forms which include operating systems, systems software, such as databases and security packages, and applications software Some of the common types of piracy are described below End User Piracy Reseller Piracy Using multiple copies of a single software package on several different systems or distributing registered or licensed copies of software to others is called end user piracy Another common form of end user piracy is when a cracked version of the software is used to install in a computer By hacking into the software and disabling the copy protection or illegally generating key codes that unlocks the trial version making the software a registered leads to the creation of a cracked version Reseller piracy occurs when an unscrupulous reseller distributes multiple copies of a single software package to different customers; this includes preloading systems with software without providing original manuals and diskettes Reseller piracy also occurs when resellers knowingly sell counterfeit versions of software to unsuspecting customers Indications of reseller piracy are multiple users with the same serial number, lack of original documentation or an incomplete set, and non-matching documentation Trademark/Trade Name Infringement Infringement occurs when an individual or dealer claims to be authorized either as a technician, support provider or reseller, or is improperly using a trademark or trade name BBS/Internet Piracy BBS/ Internet Piracy occur when there is an electronic transfer of copyrighted software If system operators and/or users upload or download copyrighted software and materials onto or from bulletin boards or the Internet for others to copy and use without the proper license
Survey Final Report it is considered piracy Often hackers will distribute or sell the hacked software or cracked keys The developer does not receive any money for the software the hacker distributed This is an infringement on the developer's copyright Another technique used by software pirates is to illegally obtain a registered copy of the software Pirates purchase the software once and use it on multiple computers Purchasing software with a stolen credit card is another form of software piracy Unfortunately there are many kinds of software piracy that has hampered the software industry 3 Objectives of the Assignment The overall objective of the study was to assess the usage level of software in all economic sectors of Sri Lanka The purpose was to undertake a survey which identifies the necessary variables, collect appropriate data, and generate a comprehensive analytical report In order to achieve the objective of the study the following activities were carried out: Defining an appropriate sample frame Designing the questionnaires to obtain data on the following: a Awareness of the software license or unauthorised usage b Methods of obtaining unauthorised software c Types of unauthorised software in use d Factors influencing the use unauthorised software e Problems/consequences faced by users of unauthorised software f Demography of the respondents g Factors affecting the controlling of usage of unauthorized software 4 Scope of the Assignment The terms of reference provided by the client (ICTA) revealed that the consultant would undertake the following activities to accomplish the proposed task Meet with representatives of ICTA and gather details on the requirements for survey implementation and its time schedule Collect all documentation necessary to first analyze and understand the programme and conduct a document/literature review Prepare plans for survey implementation and training of staff to conduct interviews Develop a survey implementation plan outlining all the steps involved in the implementation of the survey, including a project time schedule, resource plan, and data collection plan 3
Survey Final Report 5 Expected Outputs/Deliverables of the Survey The key product (deliverable) expected from this outcome evaluation is a comprehensive analytical report in English that should, at least, include the following content: Executive summary Introduction Description of the evaluation methodology An in-depth analysis of the situation with regard to the outcome, the outputs and the partnership strategy Key findings (including best practices and lessons learned) Conclusions and recommendations Annexes (ietor, field visits, people interviewed, documents reviewed, etc) REVIEW OF RELEVANT LITERATURE Software piracy is a global phenomenon and in most countries copyright laws have been enacted to combat this illegal activity In Sri Lanka, Intellectual Property Act No 36 of 3, which replaced the Code of Intellectual Property Act No 5 of 979, contains many features to protect the rights of the creators, owners, and inventors of proprietary software from unauthorized use In Section 5 of the Act, a computer programme is defined as a set of instructions expressed in words, codes, schemes or any other form, which is capable, when incorporated in a medium that a computer can read of causing a computer to perform or achieve a particular task or result Use of software without a valid license or making modifications and carrying out customizations to licensed software without adhering to the license conditions is in contravention of the Act and would result in legal penalties as prescribed in the act There is also a provision under Section 7 of the same Act to the reproduction of a single copy of a computer programme by the lawful owner of the copy without the authorization of the owner of the copyright for archival purposes, in order to replace the lawfully owned copy of the computer programme should it be lost or destroyed or be rendered unusable However, such a copy needs to be destroyed in the event that the continued possession of the copy ceases to be lawful Sri Lanka has also introduced two other important legislations towards safe guarding the legitimate use of computers for businesses and personal use These are the Computer Crimes Act No 4 of 7 and the Electronic Transactions Act of 6 Under the Computer Crimes Act No 4 of 7, any cyber-crime such as unauthorized access to a computer, computer programme, data or information and unauthorized use of a computer without authorization is an offence and is liable for prosecution 4
Survey Final Report The ICTA has also formulated and published a document titled Policy and Procedures for Information and Communication Technology Usage in Government (e-government Policy) which provides critical guidelines to government officials towards achieving the objectives of e-government Section 4 states: Government organizations should use only licensed software; such licenses can be for either proprietary software, or for open source software Use of software without a valid license or making modifications and carrying out customizations to licensed software without adhering to the license conditions would be contrary to the Intellectual Property Act of 3 and would result in legal penalties (both criminal and civil liability) This clearly demonstrates the government s commitment towards implementing the Intellectual Property law in the State sector Further, the Criminal Investigation Department of the Sri Lanka Police has established a special Anti-Piracy and Counterfeit unit to enforce the law and legal action has already been instituted against companies using pirated and unlicensed software in their businesses Hence, it is very clear that government policy is to expand and promote ICT literacy within the accepted legal framework The national intellectual property office, ICTA, and other enforcement agencies have also carried out awareness and education initiatives to encourage the use of license software and curtail piracy According to studies carried out by Business Software Alliance covering 6 countries, the installation of unlicensed software on PCs, laptops and notebooks in was 4 while the commercial value of such pirated software stood at US $ 588 billion When compared to the previous year s values the piracy rate has decreased by while the commercial value has increased by 43 due to the increased volume of PC and laptop sales The report further points out that while the piracy rate dropped in 5 countries, it has increased only in 5 countries This indicates that people are beginning to understand and appreciate the value of intellectual property and its role in driving economic growth However, according to the same source, the piracy rate in Asia Pacific countries has increased from 59 in 9 to 6 in the In spite of this increase in the region, the piracy rate in Sri Lanka has reduced by three percentage points, recording the biggest drop in software piracy in Asia This remarkable achievement has been attributed to the consistent efforts of the National Intellectual Property office, ICTA and policy initiatives, awareness, education and legal enforcement by the authorities Although the piracy rate in Sri Lanka had reduced by 3 in, the level of piracy according to BSA studies stands at 86 However, this figure is highly controversial and needs to be verified with our own studies As per National ICT Workforce Survey Report published by ICTA in January, the proprietary software usage in all sectors in Sri Lanka is very high with an average of 86 The study covered 5 institutions, including IT and Non-IT companies, BPOs, ITEs and government ministries, departments and statutory institutions The report further indicates that a significant 3 use open source software in their institutions 5
Survey Final Report The ICT Usage in Government Organizations Survey (ICTUGS) carried out a survey in 36 Government Institutions This survey included Provincial Council Ministries, District Secretariats and Divisional Secretariats and outlined useful information regarding the software usage pattern in the State sector According to the findings, documented in the Final Report submitted in March, in the state sector, more than 6 of the software used in PCs/Laptops and around 9 of the software used in servers were licensed Hence, the usage of unlicensed software among all organizations in the study was around 4 The report also indicated that almost half the organizations surveyed used Free Open Source Software (FOSS) and the level of FOSS usage was as high as 75 in Statutory Organizations and 73 in District Secretariats 3 METHODOLOGY Given the sensitive nature and limited timeframe provided, the consultants used a combination of participatory methods and tools for the collecting of information for the study The data collection was done from both primary and secondary sources The study used both qualitative and quantitative methods from primary sources Quantitative data was collected using techniques such as Key Informants Interviews (KII), interactive discussions, and direct observations Most of the quantitative data was collected through survey questionnaires specifically designed for this purpose 3 The sampling framework A comprehensive sampling frame was developed to include all the economic sectors relevant to the survey covering the following sub sectors:- Education sector IT sector Private sector Government sector state universities, degree awarding and non-degree awarding private institutions and government technical colleges ICT Industry, software and hardware vendors and IT training institutes banks, hotels, services, and tour operators; whole-sale and retail-trade, manufacturing institutions and media institutions ministries, departments and statutory bodies A comprehensive list of organisations was developed by using all the available sources mainly from lists produced by Chambers and Industry Associations and telephone directories The government list was developed based on the govlk website 6
Survey Final Report 3 Information sources for the survey population The following table provides some of the sources from which information was collected to develop a comprehensive sampling frame Table 3 Information Sources for the Survey Population Sub Population Government sector Government Website (wwwgovlk) Information Sources Private sector IT Sector Education sector Ceylon Chamber of Commerce Sri Lanka Export Development Board Board of Investments (BOI) Shipping Association KOMPASS Directory Association of Computer Training Organization in Sri Lanka (ACTOS) Tertiary and Vocational Education Commission (TVEC) Database - National ICT Workforce Survey SLT Rainbow Pages Newspapers SLT Rainbow Pages Based on the comprehensive list of companies, a representative and four stratified sub sets were developed as shown in Table 3 From each sub population a sample of 3 institutions was drawn randomly The following table indicates the sample size for the survey 7
Survey Final Report Table 3 Summary Details of the Sample Sub Population Sample size Education sector - Government and private institutions 3 IT Sector- Software and hardware vendors, IT training institutes and software developers 3 Private sector: 3 3 Financial services, Insurance and Banking - Media institutions Freight forwarding services Hotels and Tour operators Wholesale and retail trade Manufacturing 4 Government Sector 3 Ministries Departments Statutory bodies TOTAL 33 Design of questionnaires and field testing Two questionnaires were developed to facilitate face-to-face discussions that were carried out by the specially selected enumerators to obtain accurate responses to the identified variables To ensure the quality and accuracy of data, fairly short questionnaires were used in the survey The questionnaires contained only the essential indicators as information overloading would not be productive The inputs from the client experts (ICTA) were highly valuable to finalise the questionnaires as the client has a strong background and experience on the subject under consideration Questionnaires and checklists were developed to collect all relevant information from each selected institution One comprehensive questionnaire was developed to gain the overall situation of the organisation and was completed with the assistance of key officials of the organisation such as the Chief Executive Officer (CEO), Chief Accountant, IT Director and or IT Manager Another short questionnaire was designed to gather information from -5 users based on individual face-to-face 8
Survey Final Report interviews conducted by the enumerators This was considered important as it would provide the actual information on the use of software in individual PCs Questionnaires were carefully prepared with more close-ended questions and mutually exclusive answer categories Most of the questions were of single answer response type while a few contingency questions were also included to prevent the respondents from answering irrelevant questions There were also some matrix questions where Likert response categories were used to get responses for several questions Considering the limitation of responding to close ended questions, a provision was made at the end of the questionnaire to express the frank opinions on the issues raised in the study Such responses provided qualitative inputs to the study and have been summarised and presented in the report All these questionnaires and checklists were finalised in consultation with the relevant officials of ICTA before mobilising the survey team for field study The initial of the completed questionnaires were carefully scrutinised for accuracy and quality Further, a group discussion was held with all enumerators to evaluate the quality of the completed questionnaires and to resolve any difficulties faced by them Based on the feedback received, necessary modifications were carried out to the mode of questioning To facilitate direct observations, a checklist was developed and enumerators were trained to record their own observations and present a one-page report as an addendum to the questionnaire Out of two methods of administering survey questionnaires, the consultants preferred to adopt the interview survey method where interviewing was carried out in a face-to face encounter by a trained enumerator conversant with the questions The main advantage in this method was that the interviewer could clarify matters thereby obtaining correct and relevant responses to the questions If the respondent misunderstood the intent of a question or indicated that he or she did not understand, the interviewer was able to provide the necessary clarification thereby obtaining the relevant responses This helped to decrease the number of don t knows and blank answers Further, the interviewers were also able to make important observations besides the usual responses to questions asked at the interview For example, in certain instances when users were unable to determine the processor type used in her/his computer, the enumerator was able to verify it Even in the case of open source software, some users were unaware as to what category the software belonged Hence, the use of enumerators with IT literacy was extremely helpful in obtaining accurate information from the respondents Given the sensitive nature of the topic, methods such as focus group discussions were deemed inappropriate as this would involve a common discussion in an open forum About 5 senior officers from software vendors were interviewed in order to capture the alternative perspective The overall findings of KIIs were incorporated to this report as appropriate For these interviews, Key Informant Techniques were used 9
Survey Final Report Table 33 Respondents of the Survey: CATEGORY AREAS EVALUATED TECHNIQUE Head of the organizations/ IT Manager 5- employees per organisation Representatives from software vendors Observation and inspection Availability of number of licenses, types of software available, number of machines available etc, reasons for not having licenses Whether licenses are available to the software used by employees, if they were aware about IPR and other laws and software licenses etc Measures implemented to control piracy rate Whether the licenses were available Face-to-face interviews Face-to-face interviews Key informal interviews Observation schedule 34 Field Survey Most survey research methods bring advantages and disadvantages The advantages of face to face interview methods include the following: Obtaining information from a large number of respondents Conducting personal interviews at a time convenient for respondents Acquiring data as inexpensively as possible The disadvantages include: Volunteer bias Interviewer bias Distortion Volunteer bias occurs when a sample of volunteers are not representative of the general population Interviewer bias occurs when an interviewer's expectations or insignificant gestures (eg smiling) inadvertently influence responses one way or the other Distortion occurs when a respondent does not respond to questions honestly In order to minimise these biases and to achieve a very high level of responses to the questionnaire, extensive training programmes were conducted by a qualified resource team In the first instance, only graduates or undergraduates with a strong IT background and who were conversant with computer hardware, software and licensing requirements were selected as the enumerators
Survey Final Report Six training sessions were conducted by experts from ICTA to provide the required information about the role of ICTA and its programmes The enumerators were also briefed about the ICT related laws, types of software licenses, types of piracy, studies conducted by BSA and the method of winning confidence of the respondents before the commencement of an interview During the training session, each enumerator was provided an opportunity to conduct mock interviews through role plays using the questionnaires They were thoroughly trained on survey methodologies and approaches Special attention was paid on how to approach the respondents and carry out discussions to match the local environment They were also trained on how to develop a strong rapport with respondents in collecting of information whilst ensuring data quality and reliability 35 Awareness building Awareness programmes for the selected institutions were conducted by sending letters, e-mails and making contact by phone The heads of organisations were also informed of the purpose and advantages of the study by a special letter addressed to them by the Chief Executive Officer of ICTA Confidence was built with the respondents by guaranteeing the confidentiality of the information provided during the study 36 Activities planned to overcome potential survey implementation errors The non response errors in surveys were considered one of the key impediments that could seriously affect the quality of the survey This would occur due to two reasons: the fact that selected respondents refuse to participate in the survey due to various reasons This could be handled at the initial stages to a certain extent through awareness and motivation The second reason could be that the questionnaires are often not filled properly or fully This can largely be attributed to the fact that the enumerators are not properly trained The following procedures were undertaken to overcome these errors: Employing qualified and experienced field staff Provision of effective and study-specific training to survey staff Holding regular follow- up meetings with enumerators Data cleaning and quality checking Close monitoring of data entry process with random checking of entered data
Survey Final Report 37 Limitations of the survey The major limitation faced by the consultants was the difficulty of getting a confirmed appointment from the institution within the limited timeframe that was available for the study Even after taking all possible steps to provide information and guaranteeing absolute confidentiality, around 3 institutions failed to respond positively to our request in obtaining an appointment Some institutions simply declined to participate in the survey while others gave various excuses to avoid participation Some government institutions also failed to respond positively to our request Several other institutions refused to provide users for the survey and only the head questionnaire was filled It was felt that the institution that did not co-operate with us were suspicious about the study and considered possible legal implications The institutions having large number of computers found it difficult to give details of the computers and software on the first day and enumerators had to visit these institutions several times to compile the required information The information appearing in this report is based on data provided by the organisations and no physical verifications were carried out to check the accuracy of the data Some of the larger organisations involved in multiple services/businesses had one centralised IT support division and this in turn posed some difficulties in categorising these institutions into sub sectors The study had to be limited to institutions due to time and resource constraints Although the consultants were able to cover a number of important sub sectors, the study was limited only to Colombo Even in the government sector, Provincial Councils and District Secretariats were not covered due the limited timeframe available for the completion of the study It is suggested that the next study should include a much wider coverage of the economy Table No 34: Questionnaire Response Rate Sector Sample selected Responses received Head questionnaires Completed User questionnaires Completed Education sector 9 IT sector 4 6 6 84 3 Private sector 45 3 3 73 4 Government 3 3 3 3 TOTAL 3 66
Survey Final Report 3 8 Data entry and analysis Completed questionnaire were carefully scrutinised by the quality control expert and missing items were completed before entering into the database The programme Epidata was used to enter questionnaire information and SPSS statistical software was used to analyse and obtain the required outputs 4 PROFILE OF THE RESPONDENTS The first questionnaire was completed with the help of the CEO, CIO, Director/Manager IT or the nominee appointed by head of the organisation The questionnaire contained comprehensive information gathering tool to get an overall perspective of the institution s views, policies and practices regarding the use of software The second questionnaires were completed by enumerators after meeting 5 computer users from each organization The enumerators were able to develop a close rapport with these users and were able to explain the national importance of this study As a result, more reliable information about their software usage patterns was obtained In total 66 user questionnaires were analysed in this study Table 4 No of Heads and Users interviewed No interviewed No interviewed Sector Institution Heads Computer Users Education 9 4 IT 6 6 84 8 Private 3 3 73 6 Government 3 3 3 3 66 4Profile of the Head Respondents The most striking feature of the key officials who provided the necessary inputs to complete the Head Questionnaire was that 87 of them were males It was also observed that more than 5 of them were below 4 years Table 4 provides the full age and gender profiles of the Head Respondents in the institutions surveyed 3
Survey Final Report Table 4 Age and Gender Profiles of Head Respondents Categories Gender Male Female years Age Category (years) Under 3 7 8 3-39 34 9 43 4-49 7 8 5-59 9 87 3 Figure 4 Gender and Age Profile of the Head Respondents 4
Survey Final Report Figure 4 Sector wise Analysis of the Head Respondents Age Category The highest percentage of younger heads was found in the education sector while the IT sector also had 5 of head respondents below the age of 4 years It is abundantly clear that IT as an emerging sector has younger heads Table 43 Academic Qualification of Head Respondents Qualification PhD Masters Postgraduate Diploma Bachelor's Degree Higher National Diploma GCE A/L Others Sector Education IT Private Government 8 4 5 3 45 5 5 7 33 36 3 4 8 3 6 4 6 4 36 5 3 5
Survey Final Report As clearly seen from the Table 43 almost 9 of the respondents have either a Bachelor s or Higher Degrees in their chosen fields Qualification Table 44 IT Professional Qualifications of Head Respondents Education IT Private Government British Computer Society 8 7 Australian Computer Society 6 7 4 Microsoft Certifications 8 9 4 Cisco Certified Network Associate/ Cisco Certified Network Professional 3 Sun Certified Java Programming 4 3 Charted Information Technology Professional 3 4 Database administrator (DBA) 4 3 BSc 8 8 3 7 6 Project Management Professional (PMP) 4 6 3 IT Master s Degree 4 9 7 6 Member of the Institute of Electrical & Electronic Engineers (MIEEE) 3 IT Higher National Diploma 7 9 No IT Qualifications 58 65 6 33 39 6
Survey Final Report Table 45 Job Designations of Head Respondents Designation Chief Executive Officer Senior Assistant Secretary Chief Information/Innovation Officer Education IT Private Government 4 5 6 6 6 3 3 7 3 9 4 7 7 Head of IT Department 6 5 4 54 63-4 4 Deputy Head of IT Department IT Engineer Senior Executive System Analyst / Project Manager / Team Leader 3 6 9 37 8 3 4 4 3 5 7 5 5 8 4 3 6 6 6 3 3 As indicated in information presented in the tables above, the respondent Heads of Institutions had the necessary IT qualifications and experiences to provide not only the data related to their institutions but also provide expert opinions on the subject under assessment 4Profile of the user respondents Apart from the institution head, randomly selected staff members who are computer users with sufficient knowledge on IT were selected to complete the second questionnaire Although it was planned to interview -5 users from each institution, some institutions refused to provide their staff for interviewing while others limited the numbers to a few As a result, only a total of 66 users were available for the study The age and gender profiles of these respondents are given in Table 46 As seen from the table, 77 of the respondents are below 4 years of age and 6 of the total user respondents are males There was only one respondent who was over 6 years 7
Survey Final Report Figure 43 Gender Analysis of User Respondents Table 46 Age and Gender profile of the User Respondents Age Gender Education Private Government IT sector sector Sector Sector No No No No Under 3 37 4 55 7 4 4 3-39 8 3 63 34 67 39 98 46 4-49 3 5 8 8 6 5 4 5-59 5 5 3 8 5 Over 6 5 9 84 73 3 66 Male 4 46 4 67 6 73 9 56 Female 49 54 6 33 47 7 94 44 No 5 38 56 39 6 8 37 6 4 6 5 38 9 84 73 3 66 8
Survey Final Report Figure 44 Age Profile of User Respondents PhD Masters Qualification Post Graduate Diploma Bachelor s Degree HND GCE A/L Diploma level Certificate level GCE O/L Table 47 Educational Qualifications of User Respondents Education IT Private Government 9 8 3 4 Other professional qualifications ACA AAT CIMA Charted Accountant Others SECTOR 7 3 9 33 47 34 38 9 8 5 3 4 5 3 3 4 3 Nos 3 84 7 3 48 57 389 3 9 95 4 57 8 7 7 3 6 9 3 7 66 9
Survey Final Report The selected user respondents were highly qualified officers and detailed analysis is shown in Table 47 Out of the total 66 respondents, 567 possessed bachelor s degrees or a postgraduate qualification Several others had professional accountancy qualifications, diplomas and certifications Most of these user respondents had important IT qualifications and the details are shown in Table 47 There were some respondents who had Master s degrees in IT while others had IT degrees, diplomas, certificates and various other memberships However, only 7 of the respondents have indicated their IT qualification while 8 of the respondents have not responded to this question In light of the high level of educational and IT qualifications of these user respondents, it is safe to assume that opinions and views expressed by them reflect the general perceptions of the average computer user Apart from the close-ended questions that were included in their questionnaire, an opportunity was given to these user respondents to express their views on software licensing and piracy These comments are summarised and presented in this report Table 48 Type of IT related Training Received by User Respondents Sector No Training No Education Sector 9 IT Sector 84 Private Sector 73 Government Sector 3 Web Designing 4 64 Accounting 3 43 Human Resources 9 99 Word Processing 47 57 Database Management 8 38 Web Designing 5 77 Accounting 39 Human Resources 4 3 Word Processing 97 57 Database Management 88 478 Web Designing Accounting 46 66 Human Resources 7 98 Word Processing 55 38 Database Management 45 6 Web Designing 43 Accounting 9 36 Human Resources 5 7 Word Processing 7 5 Database Management 66 3
Survey Final Report Table 49: IT Qualifications of User Respondents IT Qualification No Academic Qualifications IT Master s Degree 4 6 6 8 4 Post Graduate Diploma 3 3 IT Degree 3 38 9 4 9 Professional Qualifications Chartered IT 3 8 British Computer Society (BCS) 5 9 Australian Computer Society(ACS) 3 Microsoft certificate 4 8 Cisco Certification 3 Sun Certified Java 5 IT Diploma 8 6 8 34 77 7 International Computer Driving License (ICDL) 4 3 IT Certificate 8 9 9 4 68 No special IT qualifications 39 6 4 5 85 8 Education IT Private Government 66 5 INSTITUTION PROFILE Information technology has emerged as an essential component of any business, educational or government institution The institutions that responded to our survey were well equipped with all modern IT facilities and some of the salient facilities that were available are detailed in this chapter Table 5 clearly depicts that these institutions are using the available ICT effectively and efficiently and hence are aware of the issues faced by the institutions in relation to its usage especially regarding the use of software It is seen that all the Institutions except for three institutions were having own domains while 99 of them were having institutional websites
Survey Final Report Table 5 Number of Domains and Websites available in Responded Institutions S E C T O R Education IT Private Government No No No No No 6 3 3 Institutions having domains 9 75 6 3 94 8 93 93 93 Institutions having websites 6 3 97 3 99 99 no of websites 7 9 67 36 It is also observed that some institutions, especially in the private sector, had more than one website for their institution Table 5 Local Area Networks (LAN) and network connections maintained by the Institutions S E C T O R Education IT Private Government No No No No No 6 3 3 Availability of LAN 6 3 7 9 97 97 No of terminals,49 8,35 6,5 8,4 35,447 Except for 3 government institutions all other institutions have Local Area Networks (LAN) and in total these institutions have (reportedly) 35,447 connections in their networks
Survey Final Report Table 53 E -mail Accounts Maintained by the Institutions S E C T O R Education IT Private Government No No No No No no of institutions 8 5 3 4 87 e-mail accounts 595 8,39,47 3,869 5, Average value 74 333 44 6 Although some institutions failed to provide information, the majority of them had email accounts for their staff As seen from Table 53 the most number of e-mail accounts are available in the private sector where, on average, each private institution had 44 e-mail accounts Every institution had some form of connectivity to the internet depending on the nature of business and requirement The most commonly used connectivity was the ADSL broadband The details of different types of connections used by the different sectors are given in Table 54 Table 54: Types of Connectivity Used by Institutions Dial Up ADSL Broadband Broadband Mobile / Internet connection 3 Commercial Leased Line 4 IP/V PN con nect ions 5 Oth er (Fi ber etc ) SECTOR (a) Hardwired (b) Wireless (a) 5 Kpbs (b) Mbps (c) 4 Mbps (a) HSDPA (b) WiMAX (a) 64 Kbps (b) 8 Kbps (c) 56 Kbps (d) 5 Kbps (e) Mbps (f) Other ALL 3 5 8 4 9 6 8 3 7 7 3 4 38 6 EDUCATION 83 67 47 5 67 67 83 83 5 67 5 5 IT 38 9 38 385 38 346 77 38 77 54 9 54 54 54 38 PRIVATE 56 8 375 88 8 34 56 56 5 88 33 438 65 63 GOVT 67 33 3 5 33 67 33 67 67 67 67 33 4 3
Survey Final Report As shown in the table, 4 of the organizations use Mbps ADSL connections while 9 used High-Speed Downlink Packet Access (HSDPA) connections It was also observed that at present the use of Dial Up (hardwired and Wireless) is minimal The surveyed institutions had varied hardware used for IT related work These included servers, PCs, laptops, printers, scanners, plotters and multimedia projectors The details of this equipment are given in Table 55 Table 55 Types of IT facilities available in surveyed Institutions Number of units SECTORS Education IT Private Government HARDWARE Nos Nos Nos Nos Nos Servers 44 73 58 344 349 Work stations/ PCs 48 9397 548 46 36999 Laptops/Notebooks 337 868 88 655 4688 Printers 469 445 484 4535 9533 Scanners 7 48 64 58 65 Multimedia projectors 65 85 74 449 973 Plotters 3 9 6 38 Others 3 5 9 From the above information it is clear that all these institutions use computers in day-to-day activities and the facilities are widely used Hence these organizations were able to provide information for an in-depth analysis on software usage 6 SOFTWARE USAGE PATTERN The institutions use a wide variety of software in their servers, PCs and laptops These software were categorized into eight broad categories for the convenience of the study These categories are; Operating Systems and related software, Desktop Application, 3Security Software, 4Database Software, 5Middleware, 6Business Application, 7Software Development Tools & Programming Languages and 8Statistical Applications Again, all these categories were divided as licensed software and unlicensed software Free Open Source Software (FOSS) also fell into the licensed software since these software are automatically registered with the copyright owner although they are available freeof-charge The usage pattern of Operating Systems found in these institutions is presented in table 6 4
Survey Final Report Table 6 Usage of Operating Systems and related software Operating Systems and related software No Education Sector IT Sector Private Sector Government Sector MS Windows 596 Linux 6 Mac OS 3 VM Ware 585 975 49 3 384 4 63 38 9 494 586 7 37 37 3846 48 375 As seen from Figure 6, Microsoft Windows Operating Systems consist of 975 of the total operating systems while Linux based Operating Systems represented 4 and Mac OS consisted of Figure 6 Distribution of Operating Systems & Related Software Distribution of Operating Systems & related Software 98 MS Windows Linux Mac OS VM ware 5
Survey Final Report Table6 Usage of Desktop Applications in surveyed institutions Desktop Education Private Government IT Sector Applications Sector Sector Sector No Microsoft Office 96 57 35 7 3 9 Libre Office 3 6 333 667 Kingsoft Office 5 Power OFFICE 5 Open Officeorg 6 88 63 5 5 563 AutoCAD 3 6 333 667 Adobe Photoshop 3 6 7 7 3 435 Adobe PageMaker 9 49 444 556 Coral DRAW 5 7 Adobe Dreamweaver 66 333 5 47 ZW CAD 5 MATLAB 5 ArcCAD 5 5 ArcGIS 5 5 Team Mate 3 6 333 667 GIMP 5 Arc Info 5 5 QuarkXPress 5 8 59 4 5 4 Desktop Applications constitute most of the commonly used software in the country As seen from the Table 6 Microsoft Office is the most common software used in the computers and accounts for 53 of the total desktop applications used by these institutions The other significant desktop applications are Adobe Photoshop (6), Open Office (88) and PageMaker (49) The distributions of all desktop applications are graphically presented in Figure 6 below 6
Survey Final Report Figure 6 Distribution of Desktop Applications Distribution of Desktop Applications () Desktop Applications QuarkXPress Arc Info GIMP Team Mate ArcGIS ArcCAD MATLAB ZW CAD Adobe Dreamweaver Coral DRAW Adobe PageMaker Adobe Photoshop AutoCAD Open Officeorg Power OFFICE Kingsoft Office Libre Office Microsoft Office 3 4 Percentage 5 6 6 Security software usage Pattern The most commonly used security software by these institutions is Kaspersky with almost 46 of the institutions using it in their systems while Symantec is used by 8 of the machines MacAfee and NOD 3 are the next mostly used security software recording 7 and 6 respectively Altogether 6 different types of security software were found in these institutions as detailed in the Table 63 Kaspersky is found to be popular among these institutions due to the price factor and superior after sales service provided by the vendor It was revealed that one institution opted to get this software as they offered extremely attractive terms when a bulk purchase was made for a three-year period, indicating the cost-consciousnessconsciousness of institutions in purchasing of software 7
Survey Final Report Table 63 Security Software Usage Pattern in the institutions No Software No of institution(s) Kaspersky 44 458 Symantec 7 77 3 McAfee 7 73 4 ESET 6 63 5 SOPHOS 4 4 6 MS Security Essentials 3 3 7 Norton 3 3 8 ISA Firewall 3 3 9 Bit defender IPCop Avira RAS 3 Clam AV 4 Endian 5 Cisco Iron Port 6 Avast responded 96 Table 64 Usage of Database Software Database Software Education IT Private Government Sector Sector Sector Sector No Microsoft SQL 9 339 58 58 473 Oracle 6 86 5 33 3 5 My SQL 357 3 4 PostgreSQL 8 56 5 3 357 86 The distribution of database software category is depicted in Table 64 The most commonly available database software was MySQL (357) followed by Microsoft SQL (339) and Oracle (86) 8
Survey Final Report Figure 63 Distribution of Database Software Distribution of Database Software Microsoft SQL Oracle My SQL PostgreSQL 36 34 8 Table 65 Usage of Middleware Middle ware No Mulberry Mail system 3 XAMPP JBoss Tomcat Apache Squid / Proxy 3 RiftSaw Samba Education Private IT Sector Sector Sector 333 667 4 8 5 8 5 48 5 5 667 4 4 5 8 3 Government Sector 5 5 333 4 The distribution of Middleware is presented in Table 65 and graphically shown in figure 65 The mostly available Middleware is Apache, which accounts for 48 9
Survey Final Report Figure 64 Distribution of Middleware Distribution of Middleware 4 4 48 4 8 8 Mulberry Mail system XAMPP JBoss Tomcat Apache Squid / Proxy RiftSaw Samba Table 66 Usage of Business Applications Business Education Private Government IT Sector Applications Sector Sector Sector No Lotus Notes 4 8 5 5 5 MYOB ERP 4 5 7 5 Accpac 5 6 R 4 5 5 Smart Draw FAR MS Navision W CAD 4 5 5 Corona 4 5 5 Microsoft Exchange 9 73 636 5 6 8 54 The distribution of Business Applications indicates that ERPs (4) are the most common type of Business Application used by these institutions The distribution pattern is given in Figure 65 & Table 66 3
Survey Final Report Figure 65 Distribution of Business Applications Distribution of Business Applications Lotus Notes 4 8 MYOB ERP Accpac R 4 4 4 Smart Draw FAR MS Navision W CAD Corona Microsoft Exchange Table 67 Usage of Software Development Tools & Programming Languages Software Development Tools Education Sector IT Sector Private Sector No Microsoft Visual Studio 9 3 444 3 Microsoft net 4 43 5 NetBeans 7 5 86 49 4 BlueJ 36 Eclipse 7 Delphi 36 Java 4 43 5 5 5 8 4 49 4 Government Sector 5 43 43 Microsoft Visual Studio is the most commonly used software development tool found among these institutions The distribution of different Software Development Tools & Programming Languages are shown in Table 67 & Figure 67 3
Survey Final Report Figure 66 Distribution of Software Development Tools & Programming Languages Distribution of Software Development Tools & Programming Languages 7 4 4 4 5 3 4 Microsoft Visual Studio Microsoft net NetBeans BlueJ Eclipse Delphi Java 6 Sources of Supply of Software to the Institutions The sources of supply give an indication of the usage level of unlicensed software in the organisation ation As such a query was made in the questionnaire about this aspect and the results are depicted in Table 66 Table 68 Sources of Supply of software Source of Software Supply Mostly Sometimes Rarely No Answer No No No No No Authorised distributor FOSS from internet Pre-loaded when computers are purchased Complimentary (provided free of charge by vendor) Free internet sources 6 6 5 5 5 5 8 8 4 4 3 3 45 47 47 7 7 4 4 9 9 5 6 6 7 7 9 9 58 45 5 58 Other sources Specify 7 7 93 93 3
Survey Final Report Taking all sectors into account, 6 of the institutions responded that their software is mostly obtained from authorised distributors while 47 have indicated that software comes with the computer at the time of purchase Only have acknowledged they mostly get their software free from vendors and that Open Source Software is obtained from the internet The current trend is that most of the new computers are purchased with licensed software but older machines continue to use the unlicensed copies supplied by the vendor 7 USAGE OF LICENSED & UNLICENSED SOFTWARE 7 Analysis of Software Usage Patterns in User Computers As outlined in the methodology, the study carried out a survey involving -5 computer users from each of the selected institutions for an in depth analysis of the software usage patterns of these institutions During the face-to face interviews, the enumerators were able to develop a very close rapport with the respondents by explaining the importance of providing correct information to assess the licensed and unlicensed software usage pattern in the country The cordial relationships established by the enumerators helped to uncover very valuable and accurate details of the software usage patterns of these institutions Since majority of these respondents (57) had bachelors or higher degrees we can safely assume that they have provided accurate information to the best of their knowledge In some instance they were not very clear about the licensing aspects of some of the software, especially relating FOSS packages In such instances enumerators were able to clarify matters to the respondents as all enumerators were IT graduates Since this information was gathered from widely diverse representative sample of institutions, there is a strong possibility that data are more reliable than the information provided by the institutional Heads Knowing the possible legal implication that could arise for the institution by providing correct information, some Heads have not provided the accurate information This was evident when the Head s response was compared with the users responses of the same institution Therefore, it is more appropriate to rely on user information to arrive at general conclusions However, we could use the response-evaluation of Head questionnaires to understand the broader aspects of software usage Although the intention was to collect -5 user information from each organization, due to several constraints and restriction placed by the institutional Heads, the enumerators finally collected information from 66 users from organizations The collected data were carefully analyzed and the results are detailed below In order to make the analysis meaningful, 77 different types of software found in these user computers were divided into eight broad categories The categories are Operating Systems & related Software, Desktop Applications, 3Security Software, 4Database Software, 5Middleware, 6Business Applications, 7Software Development Tools & Programming Languages and 8Statistical Applications As shown in the Table 7 33
Survey Final Report Table 7 Distribution of User Software Categories in the sample No Software Categories Operating Systems & related Software Desktop Applications 3 Security Software 4 Database Software 5 Middleware 6 Business applications 7 Software Development Tools & Programming Languages 8 Statistical Applications 7 3 66 44 8 3 5 6 Further, all software found in these computers was divided as Licensed and Unlicensed based on the availability of usage agreement with the software copyright owner According to this division, Free and Open Source Software (FOSS) also fell into the licensed category since they need to be registered although they are mostly available free-of-charge In a broader sense, Unlicensed software means any proprietary software that was used without the required valid license or not being used as described in the license agreement The analysis of a total of 563 software packages found in these user computers are summarized in Table 7 A graphical representation of the same information is given in Figure 7 Figure 7 Distribution of User Software Categories found in the sample Operating Systems & related software Desktop Applications 3 4 5 7 Security Software Database Software 7 Middleware 3 Business applications Software Development Tools & Programming Languages Statistical Applications 34
Survey Final Report The highest percentage of 3 is represented by Desktop Applications followed by Operating Systems & related software 7, Security Software 66, Database Software 44, Software Development Tools & Programming Languages 5, Business Applications 3, Middleware 8 and Statistical Applications 6 The Table 7 shows the holistic view of the software usage pattern emerging from the analysis of these software found in 66 users As clearly seen from the table, the overall use of licensed software is 744 while the Unlicensed software accounts for the balance 56 However, it is interesting to note that the use of Unlicensed software vary very widely amongst the eight categories ranging from (Business Applications) to 36 (Desktop applications) The Desktop Applications category being the largest category, representing almost 3 of the total software available in the surveyed computers, includes most of the popular software like Microsoft Office, Adobe Photoshop, PageMaker, Coral Draw, Dream Weaver, Open Office and Libre Office Table 7 Usage Pattern of Different software Categories in the sample Software Categories Licensed Unlicensed No No No Operating Systems & related Software 695 7 54 778 54 Desktop Applications 8 3 5 64 88 36 3 Security Software 68 66 53 778 5 4 Database Software 4 44 9 789 4 5 Middleware 46 8 44 96 4 6 Business Applications 79 3 79 7 Software Development Tools & Programming Languages 3 5 96 77 36 73 8 Statistical Applications 6 6 4 875 5 96 744 657 56 35
Survey Final Report Figure 7 Usage Pattern of Different software Categories in the sample of License / Unlicense softwares 9 4 5 73 36 8 7 6 5 4 96 778 778 875 789 77 64 3 Software Categories Licensed Software Statistical Applications Software Development Tools & Programming Languages Business applications Middleware Database Software Security Software Desktop Applications Operating Systems & related Software Unlicensed Software Operating Systems & related Software Operating Systems were broadly divided into Microsoft Windows (proprietary), (proprietary) open sourced Linux based operating systems and VM Ware Ware As depicted in the Table 73,out,out of the total 69 695 software packages found in these user computers 93 93 were Microsoft Windows,, 6 were Linux based operating systems and balance 7 were made up of VM Ware operating systems As also seen from the same table, 778 of the operating systems used in these computers had license while were found to be using unlicensed copies Out of the total of 647 Microsoft Windows operating systems found in these user computers, 764 were licensed versions and balance 36 were unlicensed Although, all Linux based operating systems were available free-of-charge, free charge, they were all considered as licensed software It was also observed that some computers carried both Microsoft and Linux operating systems and as such out of 66 users, 935 used only the Microsoft Windows operating systems while used only Linux based operating systems Another 44 of the user computers had dual operating systems of Windows and Linux This situation is graphically presented in Figure 73 36
Survey Final Report Table 73 The Usage Pattern of Operating Systems & related Software in User computers Software Type Licensed No No Microsoft Windows 647 93 494 764 Linux 43 6 43 VM ware 5 695 7 4 54 8 778 Unlicensed No 53 36 54 Figure 73 Usage Pattern of Operating Systems & related Software in User Computers Desktop Applications Desktop Applications found in the user computers consisted of 3 different types of software and had in total of 8 packages, out of which 64 were licensed and 36 were unlicensed The details of Desktop Applications found in user computers are given in Table 74 As illustrated in the table, commonly used Desktop Application is Microsoft Office which accounted for 79 When all the Microsoft Office software was considered the piracy rate of 338The other important Desktop Applications were Adobe Photoshop (7),Open Officeorg (55) and Adobe Page Maker (3) Although, some Desktop Applications such as Adobe Writer and MATLAB showed piracy levels they had less than five number each Adobe Photoshop which was available in 57 of the surveyed computers showed a piracy level of 63, while Adobe PageMaker which was found in 4 machines showed a piracy level of 54 In general most of the Adobe software packages had piracy levels in excess of 5 It was also noted that some institutions are using cheaper licensed office packages such as Kingsoft Office as an alternative to a more expensive Microsoft version It is also seen that some institutions (58) are using FOSS versions like Open Office and Libre Office instead of using unlicensed copies of proprietary software 37
Survey Final Report Table 74 Usage Pattern of Desktop Applications in User Computers Software Licensed Unlicensed No No No Microsoft Office 583 79 386 66 97 338 Libre Office 4 8 4 Kingsoft Office 3 4 3 Power Office Open Officeorg 44 55 44 AutoCAD 5 6 3 6 4 Adobe PhotoShop 57 7 368 36 63 Adobe PageMaker 4 3 458 3 54 Adobe CorelDRAW 6 5 4 875 Adobe Dreamweaver 8 3 4 4 778 Adobe Writer 3 Adobe Illustrator 6 8 67 5 833 Joomla 3 4 3 Moodle Notepad++ Netviewer Nero 7 8 6 857 43 ArcCAD 3 ArcGIS 4 4 4 ZW CAD 3 MATLAB 3 4 3 ICDL Test software PROCON 8 5 64 88 36 Security Software Security software was available in all the user computers surveyed and the mostly used security software was Kaspersky (44) followed by Symantec (7) The overall usage of licensed versions was 778 while unlicensed versions accounted for However, as seen from Table 75 the piracy level of Symantec was of 44, while Avast has recorded 333 piracy and Kaspersky 38
Survey Final Report Table 75 Usage Pattern of Security Software in User Computers Software Licensed Unlicensed No No No Kaspersky 3 44 35 783 65 7 McAfee 7 4 7 Symantec 84 7 4 565 8 435 AVG 33 48 33 ESET 6 38 6 Avira 8 6 8 Avast 8 6 667 6 333 Bitdefender 6 9 6 SOPHOS 47 69 47 LanSafe 6 9 6 FileZilla 6 4 6 68 53 778 5 Database Software There were 6 different types of Database software in user computers totalling 4 software packages, out of which 79 were licensed and the balance were unlicensed versions The details of the Database Software usage are given in Table 76 Table 76 Database Software Usage Patter in User computers Software Licensed Unlicensed No No No Microsoft SQL 64 56 54 844 56 Oracle 5 9 9 76 6 4 ArcSDE 8 ehrm Systems 3 6 3 Fidelio 9 My SQL 9 67 3 684 6 36 4 9 789 4 As depicted in the table, the most commonly used database software is Microsoft SQL which was available in 56 of the computers surveyed while Oracle was found in 9 of the computers My SQL (67) and e-hrm systems (6) were the other two important types of Database software found in these computers 39
Survey Final Report Middleware There were different types of software found under this category and 96 of these were licensed and only 4 were unlicensed Details are given in Table 77 As seen from the table, out of the total of 46 packages found in these computers, 44 were licensed versions and hence the piracy level was only 43 Table 77 Usage Pattern of Middleware in User Computers Software Licensed Unlicensed No No No Crystal Reports 7 9 9 IBM i Access 6 3 6 XAMPP 4 87 4 JBoss 6 3 6 Tomcat Apache 43 Wamp 8 74 8 Zend PuTTY 43 Citrix 5 9 5 VNC Viewer 46 44 957 43 Business Applications There were seven types of Business Application representing a total of 79 software packages in the surveyed user computers The striking feature was that all these were licensed versions and details are shown in Table 78 Table 78 Usage Pattern of Business Applications in User Computers Software Licensed Unlicensed No No No Lotus notes 9 4 9 Symbol 3 WCM 5 MYOB 4 5 4 Logistics Software 3 38 3 ERP 49 6 49 Microsoft Exchange 3 79 79 4
Survey Final Report Software Development Tools & Programming Languages There were ten different types of software under this category in user computers out of which 73 were licensed and 7 were unlicensed The details are given in Table 79 Table 79 Usage Pattern of Software Development Tools & Programming Languages in User Computers Software Licensed Unlicensed No No No Microsoft Visual Basic 6 6 45 4 667 333 Microsoft Visual Studio 67 58 4 67 5 373 Microsoft Visual C# 8 Net Beans 5 Android SDK 5 Java SDK 4 3 4 Informix Client SDK 5 38 5 Eclipse 9 68 9 Delphi 3 3 Microsoft net 5 4 667 5 333 3 96 77 36 73 Although the overall piracy rate was 7, the mostly used software in this category was Microsoft Visual Studio which accounted for 58 of the total This had a piracy rate of 373 Statistical Applications There were four different types of software found under this category and the number of packages used in this software totalled 6 Out of these 88 were licensed and were unlicensed The details are given in Table 7 Table 7 Usage Pattern of Statistical Applications in User Computers Software Licensed Unlicensed No No No SPSS 7 438 6 857 43 Smart Statistics 6 Minitab 6 CSPro 7 438 7 6 4 875 5 4
Survey Final Report 7 Sector wise Analysis of User Software As indicated in the methodology, samples were drawn from four sectors of the economy, namely, Education, IT, Private and Government The sector-wise software usage pattern is illustrated in Table 7 Although the overall usage levels of licensed and unlicensed software were found to be 744 and 56 respectively, these levels vary between the sectors and as such piracy varies from 49 (education) to 43 (private) The piracy levels of IT and government sectors had recorded 8 and 47 respectively This is clearly illustrated in Figure 74 Hence, it is very clear that a single piracy level for the entire country has very little meaning as it varies very widely between sectors, software categories and individual software types However, it is clearly seen that heavily used Operating Systems and Desktop Applications categories which include all the extensively used software have piracy rates of and 36 The piracy level of Security Software is also When these three largest software categories are combined it provides information of 76 software packages which is 849 of the total found in user computers As shown in Table 7, the combined piracy level is 73 4
Survey Final Report Table7 Sector wise Usage Pattern of Different Software Categories Software Category Education Sector IT Sector Private Sector Government Sector Licensed Unlicensed Licensed Unlicensed No No No No No Operating Systems & related software 94 73 77 3 779 75 8 89 3 775 5 695 778 Desktop Applications 533 467 6 664 336 86 737 63 68 6 399 8 64 36 Security Software 6 484 56 39 64 36 6 54 68 778 Database Software 7 765 35 46 86 74 95 95 3 667 333 4 789 Middleware 3 3 93 77 9 947 53 46 957 43 Business applications 5 8 4 6 79 Software Development Tools & Programming 7 765 35 5 87 73 6 846 54 37 486 54 3 77 73 Languages Statistical Applications 3 6 875 5 Grand 384 59 49 85 79 8 64 857 43 75 753 47 563 744 56 Licensed Unlicensed Licensed Unlicensed Licensed Unlicensed 43
Survey Final Report Table 7 Combined Software Usage patterns of Operating, Security and Desktop Applications Education Sector IT Sector Private Sector Government Sector Software Category Licensed Unlicensed Licensed Unlicensed Licensed Unlicensed Licensed Unlicensed Licensed Unlicensed No No No No No Operating Software Desktop Applications Security Software 94 73 77 3 779 75 8 89 3 775 5 695 778 533 467 6 664 336 86 737 63 68 6 399 8 64 36 6 484 56 39 64 36 6 54 68 778 34 568 43 678 69 38 53 843 57 635 756 44 76 77 73 44
Survey Final Report Unlicensed Software 45 4 35 3 5 5 5 Education Sector IT Sector Private Sector Government Sector Sectors Figure74 Usage Pattern of Unlicensed software in User computers-sector wise Figure 75 provided the graphical representation of software piracy under different categories in these four sectors As it is observed that in most cases the piracy level is below 5 although the statistical package category in the education sector is given as this represents only two packages 45
Survey Final Report Figure 75 Use of Unlicensed Software in User Computers-Sector and Software re category wise 9 8 Unlicensed Software 7 6 5 Education Sector 4 IT Sector 3 Private Sector Government Sector Statistical Applications Software Development Tools & Programming Languages Business applications Middleware Database Software Security Software Desktop Applications Operating Systems & related Software Software Categories 46
Survey Final Report Operating Systems & related Software Although the overall licensed and unlicensed use of Operating systems were 778 and respectively, these values change from sector to sector The sector that recorded the highest percentage of unlicensed operating software was the education sector with 77 while government and IT sectors recorded piracy rates of 5 and respectively The lowest level was recorded by the private sector with 89 The details are shown in Table 73 47
Survey Final Report Table 73 Sector wise Usage Pattern of Operating Systems & related Software in User Computers Education Sector IT Sector Private Sector Government Sector Operating Systems Microsoft Windows Licensed Unlicensed Licensed Unlicensed Licensed Unlicensed Licensed Unlicensed No No No No No Licensed Unlicensed 9 74 86 76 733 67 7 8 88 77 9 647 764 36 Linux 3 34 4 43 VM ware 3 5 8 Grand 94 73 77 3 779 75 8 89 3 775 5 695 778 48
Survey Final Report Figure 76 Sector wise Usage of Unlicensed Operating Systems & related Software in User Computers 3 Unlicensed Software 5 5 5 Education Sector IT Sector Private Sector Government Sector Sectors 49
Survey Final Report Desktop Applications This was the largest category of software found in user computers with 3 different types and a total of 8 software packages Although the overall piracy level was 36, it was 467 in the education sector and 63 in the private sector In the case of government and IT sectors, the unlicensed usage levels were 399 and 336respectively Out of all the Desktop Applications, Microsoft Office packages consisted of 79 and the overall usage level of unlicensed versions were 338 However, the use of unlicensed Microsoft Office in the education sector was 4 while in private sector it was47 Similarly, the government and IT sectors were found to be using 38 and 349 unlicensed versions respectively out of their total Microsoft Office packages The Table 74 provides sector wise details of all Desktop Applications recorded from the user computers The second most widely used software found among the user computers was Adobe Photoshop which accounted for 7 of the total and as seen from the Table 74 almost 63 of the Adobe Photoshop packages were unlicensed The sector wise analysis indicates that level of unlicensed usage varies from 75 (government sector) to 333 (private sector) Adobe PageMaker was also available in 4 user computers and out of them 54 were unlicensed copies 5
Survey Final Report Table 74 Sector wise Usage Pattern of Desktop Applications in User Computers 533 467 664 336 737 63 75 5 43 3 5 75 857 8 7 8 6 399 Unlicense d 75 75 38 Licensed 5 5 6 5 No 7 5 4 4 7 5 4 68 Unlicense d 5 47 333 Licensed 753 667 77 375 No 58 3 3 3 6 3 86 Unlicense d 73 65 349 Government Sector Licensed 65 No 7 6 6 4 4 6 Unlicense d 4 Private Sector Licensed 598 IT Sector No 8 6 4 3 Unlicense d Microsoft Office Libre Office Kingsoft Office Power Office Open Officeorg AutoCAD Adobe PhotoShop Adobe PageMaker Adobe CorelDRAW Adobe Dreamweaver Adobe Writer Adobe Illustrator Joomla Moodle Notepad++ Netviewer Nero Arc CAD Arc GIS ZW CAD MATLAB ICDL Test software PROCON Grand Licensed Desktop Applications Education Sector No 583 4 3 44 5 57 4 6 8 6 3 7 4 3 8 66 6 368 458 5 67 857 64 338 4 63 54 875 778 833 43 36 5
Survey Final Report Figure 77 Sector wise Usage of Unlicensed Desktop Applications in User Computers 5 45 Unlicense Software 4 35 3 5 5 5 Education Sector IT Sector Private Sector Government Sector Sectors Security Software Security software was available in all the user computers surveyed and the mostly used security software was Kaspersky (44) followed by Symantec (7) The sector wise details are shown in Table 75 & Figure 78 5
Survey Final Report Table 75 Sector wise Usage Pattern of Security Software Unlicensed No 65 6 6 4 6 54 Licensed 36 64 Unlicensed Unlicensed 56 No 9 6 8 6 6 6 6 Licensed 484 58 Government Sector Licensed 4 No 6 5 38 8 6 6 6 39 Unlicensed 765 Private Sector Licensed 35 IT Sector Unlicensed Kaspersky McAfee Symantec AVG ESET Avira Avast Bitdefender SOPHOS LanSafe FileZilla No 85 6 6 7 6 6 6 Licensed Security Software Education Sector No 3 7 84 33 6 8 8 6 47 6 6 68 783 565 667 778 7 435 333 53
Survey Final Report Figure 78 Sector wise Usage of Unlicensed Security Software in user computers co 6 Unlicensed Software 5 4 3 Education Sector IT Sector Private Sector Government Sector Sectors Database Software There were 6 different types of Database software, totalling 4 software packages were found in these user computers where an overall unlicensed usage level was recorded However, piracy levels varied from 33 (government) to 95 (private) among the sectors Sector ctor wise details are given in Table76 The most commonly used Database Software was found to be Microsoft SQL which was available in 64 computers and out of which 56 5 were unlicensed copies of software Oracle was w available in 5 computers and the piracy pi rate was 4 54
Survey Final Report Table 76 Sector wise Usage of Pattern of Database Software in the User Computers Unlicensed No No 9 556 444 3 93 87 8 889 4 857 8 667 333 5 3 Unlicensed Licensed No Licensed Unlicensed My SQL No No 43 64 844 56 5 76 4 3 9 684 36 333 4 789 6 5 6 7 765 35 46 86 74 95 95 3 667 Licensed Fidelio Unlicensed ehrm Systems Licensed ArcSDE Oracle Government Sector Unlicensed Microsoft SQL Private Sector Licensed Database Software IT Sector Education Sector 55
Survey Final Report Figure 79 Sector wise Usage of Unlicensed Database Software in the User Computers Unlicensed Software 35 3 5 5 5 Education Sector IT Sector Private Sector Government Sector Sectors Middleware There were different types of Middleware, totalling 46 software packages were found in these user computers where an overall 43 unlicensed usage level was recorded However, piracy levels varied from 77 (private) to (education and IT) among the sectors It is also noted that out of the total of 46 numbers 43 were found in the government sector while IT and private sectors had 4 and 8 respectively Details are provided in Table 76 The piracy level in the government sector was 53 56
Survey Final Report Table 77 Sector wise Usage Pattern of Middleware Crystal Reports IBM i Access XAMPP JBoss Tomcat Apache Wamp Zend PuTTY Citrix VNC Viewer Licensed Unlicensed Licensed Unlicensed Licensed Unlicensed Licensed Unlicensed Government Sector Unlicensed Private Sector Licensed Middleware IT Sector Education Sector No No No No No 4 4 75 5 9 3 6 3 5 5 9 947 53 6 4 6 8 5 46 957 43 93 77 57
Survey Final Report Figure 7 Sector wise usage of Unlicensed Middleware in user computers 9 Unlicensed Software 8 7 6 5 4 3 Education Sector IT Sector Private Sector Government Sector Sectors Business Applications The Business Applications category consisted of 9 types and a total of 79 9 software packages The most striking feature of this category of software was that all the 7 79 packages were licensed versions of the software As expected 5 of this category of software was found in the private sector institutions and most of them were ERPs The details are given in Table 77 58
Survey Final Report Table 78 Sector wise Usage Pattern of Business Applications in the user computers Licensed Unlicensed Licensed Unlicensed Licensed Unlicensed Licensed Unlicensed Government Sector Unlicensed Private Sector Licensed Business applications IT Sector Education Sector No No No No No Lotus notes 5 4 Symbol WCM MYOB 4 Logistics Software 3 ERP 3 49 Microsoft Exchange 79 Grand 5 3 5 8 4 9 6 59
Survey Final Report Software Development Tools & Programming Languages The surveyed users also had types of Software Development Tools and these were found in 3 computers Of these 73 were licensed and balance 7 were unlicensed versions of the software As expected the IT sector had 394 of the total software while government sector accounted for 8 Private and education sectors accounted for 97 and 9 respectively The mostly used Software Development Tool was Microsoft Visual Studio which accounted for 58 of the total software packages under this category and the piracy level was 373 The sector wise details are given in Table 78 6
Survey Final Report Table 79 Sector wise Usage Pattern of Software Development Tools & Programming Languages in User Computers Microsoft Visual Basic 6 Microsoft Visual Studio Microsoft Visual C# NetBeans Android SDK Java SDK Informix Client SDK Eclipse Delphi Microsoft net Licensed Unlicensed Licensed Unlicensed Licensed Unlicensed Licensed Unlicensed Government Sector Unlicensed Private Sector Licensed IT Sector Education Sector Software Development Tools & Programming Languages No No No No No 5 7 6 4 3 333 667 6 667 333 3 74 58 3 69 38 3 38 69 67 67 373 4 4 5 37 73 4 6 5 486 5 54 5 9 3 5 3 667 77 333 73 9 35 5 5 765 87 846 54 6
Survey Final Report Figure 7 Sector wise Usage of Unlicensed Software Development Tools & Programming Languages in user computers 6 of Unlicensed Software 5 4 3 Education Sector IT Sector Private Sector Government Sector Sectors 6
Survey Final Report Statistical Applications There were 6 statistical packages consisting of four different types were found in these user computers and 5 were unlicensed Government sector accounted for 8 of the total For details please refer Table 79& & Figure 7 Table 7 Sector wise Usage Pattern of Statistical Statistical Applications Unlicensed No SPSS Smart statistics No No 6 7 857 43 Minitab CSPRo 7 7 Grand 3 6 875 5 Licensed Licensed No Unlicensed Unlicensed Licensed Licensed No Statistical Applications Government Sector Unlicensed Unlicensed Private Sector Licensed IT Sector Education Sector of Unlicensed Software Figure 7 Sector wise Usage Us of Unlicensed Statistical Applications in n user computers 9 8 7 6 5 4 3 Education Sector IT Sector Private Sector Government Sector Sectors 63
Survey Final Report Further to the analysis of data gathered from user computers information received from Head questionnaires were used to broaden the view of the usage pattern of widely used software software Operating Systems & related Software The most widely used software was found to be Microsoft Windows and information from 3,66 Desktop Computers and,3 laptops were analysed of the three Microsoft Windows Operating Systems the mostly used Operating System that was found in these surveyed computers was Windows XP, which accounted for 69 while Windows 7 accounted for 8 and Vista 3 The availability of these Operating erating Systems in different processor types are given in Table Figure 73 Usage pattern of Windows Operating Systems in Surveyed PCs Table 7 Use of Windows Operating Systems in Various PCs Window version used no of PCs XP Vista Window 7 Pentium III 63 Pentium IV 4,8 94 84 Dual Core 6,77 75 63 86 Core 4,56 333 67 6 Core i3,5,7 6,748 79 9 45 67 33 3,66 69 33 Processor type Others 76 64
Survey Final Report As seen from Table 7 the most commonly used Windows Operating System was Windows XP and this was found in most types of PCs Although its usage is high in older machines, it is widely used in newer machines as well The least used Windows Operating System was Vista which was available only in 33 of the machines Other Corei3,i5,i7 Core Dual Core Pentium IV Pentium III Processor Table 7 Usage Pattern of Windows XP Operating Systems in Desktop Computers Sector No computers No Windows XP Licensed Unlicensed Unlicensed No No No Education 4 4 4 IT 8 Private 33 3 33 3 Government 6 7 36 6 34 63 43 63 6 Education 578 446 3 578 3 IT 48 378 93 47 Private 49 7 8 Government 73 79 538 38 3 48 3635 77 445 7 Education 7 83 83 IT 964 64 5 54 49 Private 5 33 7 3 Government 983 355 35 39 677 476 9 554 6 Education 393 7 7 IT 683 53 5 3 Private 36 38 38 Government 349 8 6 88 456 463 56 59 4 Education 9 5 5 IT 6 7 5 4 Private 4985 433 434 Government 63 45 5 4 6748 475 56 478 Education Government 45 8 3 4 45 8 3 4 3,66 4,73,9 5,95 8 Grand total 5 65
Survey Final Report As seen from Table 7 the use of unlicensed copies of Window XP is mostly found in Pentium III and IV machines and the levels of piracy in these machines are 6 and 7 respectively The use of unlicensed Windows XP is high in the Government and IT sectors and it is extremely low in the private sector machines Another trend which is clearly seen is the lessening of the piracy level in recent years with the newer models of computers For example the piracy rate of 6 in the Pentium III machines has reduced to 6 in Dual Core, 4 in Core and to in Corei3,i5,i7 PCS This indicates a clear declining trend in the piracy of Windows XP software Table 73 Usage Pattern of Vista Operating System in Desktop Computers Other Corei3,i5,i7 Core Dual Core Pentium IV Pentium III Processor PCs Sector Vista No of computers Licensed Unlicensed Unlicensed No No NO No Education 4 IT Private 33 Government Education IT 6 63 578 48 Private 49 9 9 Government Education IT Private 73 48 7 964 5 3 3 3 3 Government Education IT Private 983 677 393 683 36 369 4 8 4 9 369 4 8 4 9 Government Education IT 349 456 9 6 34 3 36 Private 4985 Government Education 63 6748 Government 45 5 5 45 5 5 366 76 763 Grand 7 3 66
Survey Final Report As seen from Table 7, Vista was found only in 763 PCs or in 33 out of the total 3,66 PCs that use Windows Operating Systems Out of this only PCs carried unlicensed copies Other Corei3,i5,i7 Core Dual Core Pentium IV Pentium III Processor Table 74 Usage Pattern of Window 7 Operating System in Desktop Computers Sector No Computers Education IT Private Government Education IT Private Government Education IT Private Government Education IT Private Government Education IT Private Government Education No 4 33 6 63 578 48 49 73 48 7 964 5 983 677 393 683 36 349 456 9 6 4985 63 6748 Government 45 45 Grand 366 Window 7 Licensed No Unlicensed No 385 47 4 45 87 54 66 96 476 736 38 76 85 468 696 63 87 5 7 85 55 85 66 9 No 385 47 4 43 87 4 5 96 476 736 38 736 85 488 75 633 957 635 Unlicensed 3 3 7 4 7 4 3 Table 73 shows the usage pattern of unlicensed Windows 7 software in the surveyed Desktop Computers Here again it is seen that the piracy level has reduced from 7 in Dual Core Desktop Computers to 4 in Core i3,i5, and i7 Desktop Computers 67
Survey Final Report Other Corei3,i5,i7 Core Dual Core Pentium IV Processor Table 75 Use of Window XP Operating Systems in Laptops Laptops Sector Laptops Surveyed Windows XP Licensed Unlicensed Unlicensed No 5 8 5 No 5 3 5 NO 67 4 48 6 35 5 433 6 3 6 6 67 5 5 8 96 3 8 38 5 37 6 7 7 33 3 5 5 5 No 5 5 5 35 86 63 5 49 48 8 57 33 7 79 434 464 5 45 434 499 56 5 7 Government 4 4 4 4 Grand 3 9 Education IT Private Government Education IT Private Government Education IT Private Government Education IT Private Government Education 4 5 4 64 35 53 65 34 6 4 4 7 88 4 3 4 As indicated in data in Table 74 of,3 laptops that had Windows Operating systems,,65 laptops had Windows XP As in PCs, Windows XP was widely used in all types of laptops The overall usage of unlicensed Windows XP was 4, indicating the declining trend in piracy where unlicensed usage has come down from 34 in Pentium IV to 7 in Corei3, i5 and i7 laptops 68
Survey Final Report Other Corei3,i5,i7 Core Dual Core Pentium IV Processor Table 76 Use of Windows Vista Operating Systems in Laptops Sector Laptops Surveyed No 5 8 5 Education IT Private Vista Operating System Licensed Unlicensed Unlicensed No NO No Government Education IT Private 48 6 35 9 9 Government 5 Education IT Private 433 6 3 6 6 Government 6 Education IT Private 6 67 5 5 3 7 Government 8 4 Education 96 5 Government Grand,3 7 7 3 8 3 88 4 58 58 8 66 As depicted in Table 75, out of 66 laptops that carried Windows Vista Operating Systems were found unlicensed 69
Survey Final Report Other Corei3,i5,i7 Core Dual Core Pentium IV Processor Table 77 Use of Windows 7 Operating Systems in Laptops Laptops Sector Education IT Private Government Education IT Private Government Education IT Private Government Education IT Private Government Education Government Grand Laptops Surveyed Window 7 Operating System Licensed Unlicensed Unlicensed No 5 8 5 No No No 48 6 35 5 433 6 3 6 6 67 5 5 8 96 3 7 46 5 3 7 6 5 5 8 64 8 67 9 3 3 67 5 59 84 45 7 7 3 5 999 3 49 65 83 43 9 67 5 59 84 45 7 7,3 974 As shown in Table 76, Windows 7 Operating System was found in 999 or 47 of the total laptops that had Windows Operating Systems Unlike in Desktop Computers, the use of Windows 7 software was high in Laptops Out of the 999 laptops, only 5 carried unlicensed copies accounting for 3 It was also observed that of the Corei3, i5, and i7 laptops had licensed copies This once again indicates that the institutions are opting for licensed software when they purchase new computers 7
Survey Final Report Usage Pattern of Desktop Applications The mostly used Desktop Application was found to be Microsoft Office The details of 3,66 Desktop computers that use Microsoft Office packages are given in Table 77 Other Corei3,i5,i7 Core Dual Core Private 33 5 Government 6 79 7 86 8 63 8 7 35 5 Education 578 3 33 IT 48 58 6 Private 49 53 Government 73 5 8 Unlicensed No No Unlicensed IT Licensed No 4 unlicensed No MS Office total No 4 Unlicensed unlicensed Education No 4 Sector Licensed MS Office 7 Unlicensed MS Office 3 Licensed Pentium IV Pentium III Processor PCs computers Table 78 Usage pattern of Microsoft Office software in Desktop Computers No No No No No No 8 8 8 7 43 75 7 345 78 84 3 369 5 384 4 4 6 3 53 683 366 546 395 94 4 5 476 76 8 46 46 48 66 675 94 35 6 76 8 7 4 48 6 77 Education 7 46 6 5 4 74 84 98 75 IT 964 5 5 4 684 686 45 3 58 8 Private 5 67 8 49 33 3 43 8 8 Government 983 9 3 493 8 95 45 5 34 677 78 96 4 394 83 477 64 53 Education 393 7 7 9 4 96 IT 683 6 6 437 439 Private 36 57 3 487 47 3 74 Government 349 83 8 65 5 68 456 346 39 675 49 64 Education 9 IT 6 Private 4985 Government 63 6748 35 35 366 536 5 38 38 487 56 6 6 6 843 63 335 6 34 44 365 47 85 6 8 44 44 46 46 9 3 3 478 478 69 55 56 36 554 87 9 69 45 45 55 5 47 6 7 34 6 56 55 3 6 853 3453 5 43 34 744 755 48 363 3 Government 45 45 45 45 45 45 389 3 8 3,66 34 8 Education Grand total 57 636 4 9386 458 3589 3 7
Survey Final Report As seen from Table 77, a total of 3,66Desktop Computers used Microsoft Office Software in the surveyed institutions Of these,59 was using MS Office 7 while 7 used MS Office 3 and balance 4 was using MS Office The mostly pirated Microsoft Office version was MS Office 3 which recorded an overall piracy level of 4 Piracy rates were 643 in Dual Core machines and 487 in Core machines However, the level of unlicensed Microsoft office 3 has come down to 3 in newer machines like Core i3, i5, i7, indicating the same declining trend in piracy Similarly, Microsoft office 7 also indicates fairly high piracy level For example piracy level of Microsoft office 7 in Core machines has recorded 47 However, this has declined to 5 in case of newer machines like Core i3,i4,i5 In case of Microsoft Office, the overall Piracy rate has been 3 When overall situation is considered the piracy level has declined from 4 in Microsoft Office 3 to 3 in Microsoft Office This once again gives a clear indication that piracy level is on the decline as far as Microsoft office is concerned 7
Survey Final Report Table 79 Usage pattern of Microsoft Office Software in Laptops MS Office 3 Corei3,i5,i7 Core unlicensed Licensed Unlicensed unlicensed Licensed Unlicensed unlicensed No No No No No No No No No No Education 5 4 9 3 69 IT 8 7 7 Private 5 5 48 9 9 9 Education 6 53 53 7 7 IT 35 5 5 Private 59 8 87 7 7 Government 5 7 4 433 4 3 Education PCs MS Office Unlicensed MS Office 7 Licensed Dual Core Pentium IV Processor Laptops Sector 5 Government 9 38 56 56 3 7 3 5 3 8 8 36 5 8 3 6 6 6 56 36 7 7 34 7 7 8 8 IT 6 85 85 4 4 Private 3 6 5 4 59 3 6 5 4 4 Government 6 5 7 7 6 6 3 8 3 3 6 4 7 48 5 9 9 38 5 84 84 Education 67 67 67 IT 5 33 33 Private 5 6 6 3 9 44 5 445 4 4 Government 8 7 8 94 55 76 8 4 4 96 7 3 5 46 5 6 538 5 338 338 Government 3 4 5 3 33 3 74 74 3 4 3 33 74 74 3 4 7 96 87 97 67 667 667 7 7 Other Education IT Private Grand 4 5 As seen in Table No 78, 38 of the,3 Laptops used MS Office 3, while 548 used MS Office 7 and 34 used MS Office The usage of unlicensed Microsoft Office 3 software was found to be 4 and Microsoft Office 7 was found to be 5 However, all the 667 Laptops that were using Microsoft had licensed software 73
Survey Final Report Adobe Photoshop & Page Maker Apart from Microsoft office, other commonly used Desktop Applications were Adobe Photoshop and PageMaker It was observed that the majority of the software found in these PCs had unlicensed copies and the levels of piracy were 5 and 67 for Photoshop and PageMaker respectively Piracy level of Photoshop was high and (as seen from the table) in most sectors the level of piracy was The details are given in Table 79 Table 73 Use of Other Desktop Application Software in Desktop Computers 47 97 5 5 5 56 98 53 73 7 5 99 5 7 9 8 8 3 3 3 955 6 5 6 96 84 6 5 4 8 5 47 5 9 44 3 5 38 4 Unlicensed 3 3 48 8 5 6 5 5 8 3 7 7 6 total 7 7 89 9 Unlicensed 6 4 5 35 5 5 68 45 7 5 67 Unlicensed 73 5 8 7 56 86 6 8 3 PageMaker total unlicensed Education 4 IT Private 33 Government 6 Sub 63 Education 578 IT 48 Private 49 Government 73 Sub 48 Education 7 IT 964 Private 5 Government 983 Sub 677 Education 393 IT 683 Private 36 Government 349 Sub 456 Education 9 IT 6 Private 4985 Government 63 Sub 6748 Education 3 Government 4 Sub 45 Grand 3,66 Licensed No Sector Photoshop Licensed Others Corei3,i5,i7 Core Dual Core Pentium IV Pentium III Processor PCs 4 8 75 7 4 9 35 9 7 43 5 9 69 5 64 45 7 7 88 54 7 36 55 38 67 74
Survey Final Report This software was also found in 5 of a total of,3 laptops surveyed Of the two, Photoshop was found in 5 machines with 36 using unlicensed copies while PageMaker was used in only 6 machines with a piracy rate of 5The details are given in Table 73 Other Corei3,i5,i7 Core Dual Core No 3 8 7 7 8 8 8 3 4 8 7 3 8 8 3 5 5 5 5 67 3 3 38 3 3 5 No unlicensed No No Unlicensed No Page Maker unlicensed No Unlicensed No Education 5 IT 8 Private 5 Government 48 Education 6 IT 35 Private Government 5 433 Education IT 6 Private 3 Government 6 6 Education 67 IT 5 Private 5 Government 8 96 Education IT Private Government Grand,3 Licensed Laptops surveyed Sector Photoshop Licensed Pentium IV Processor Table 73 Use of Other Desktop Application software in Laptops 3 6 3 3 3 3 3 6 5 6 75 36 3 75
Survey Final Report 8 Awareness on E- laws related to the use of Computers 8 Awareness of Head Respondents on E-Laws E As mentioned previously, Sri Lanka has enacted three vital legislations related to ICT activities These are the Intellectual Property Act No36 of 3, 3, Computer Crimes Act No 4 of 7 and the EEtransactions Act No 9 of 6 As a part of the survey, an inquiry was made from all of the Heads of Institutions and 66 users to assess their level of awareness on these e--laws of the country Table8 Awareness of Head Respondents on E-Laws E Heard but details unknown E-Law Fully Aware Partially aware Not aware Intellectual Property Act No36 of 3 35 47 8 Computer Crimes Act No 4 of 7 39 38 9 4 E-transactions Act No 9 of 6 8 37 3 As presented in Table 8 only around 3-4 3 4 of the respondents have indicated that they are fully aware of these laws while 4- are not aware of some of these laws at all Even an important legislation such as the Intellectual Property Act which provides required guidelines to the use of licensed software is fully known only to 35 of the Institution Heads A majority majority, 65, of them are either partially aware or have just heard about it The lack of proper understanding of the intellectual property law could have an impact on the use of pirated software in the country Figure 8 Awareness on Intellectual Property Act by the Heads in Different Di fferent Sectors 76
Survey Final Report As seen from Figure8 only the majority of heads from IT is fully aware of ofthe Intellectual Property Act and even in the government sector only 4 of head respondents have indicated that they are fully aware of the Act Almost half of the the respondents are partially aware of the Act while 5 55 has only heard about the Act A and does not know much Act While a lack of understanding of the Act is not an excuse to use pirated software, it may be prudent prudent to create awareness among computer userss regarding the provisions of this Act with a view of reducing the level of piracy in the country Figure gure 8 Awareness on Computer Crimes Act by Heads of Different Sectors This piece of legislation is also fully known only to a few heads and 7 of the private sector heads are not aware of this legislation at all Figure 83 Awareness on E-Transactions E Transactions Act by Heads of different Sectors 77
Survey Final Report 8 Awareness of User Respondents on E-Laws The awareness of the e-laws among the 66 computer users surveyed from all sectors, indicated that the majority of them have either only heard about this law or is not aware at all Considering the educational and IT qualifications it is surprising that only around of the user respondents were aware of the Intellectual Property Act In general, the knowledge of E-laws among the user respondents is extremely poor and some form of plan is required educate them in order to develop the IT usage in the country Fully Aware Partially Aware Heard but details unknown Not Aware at all Table 8 Awareness of User Respondents on E-Laws Intellectual Property Act No36 of 3 5 4 Computer Crimes Act No 4 of 7 9 44 5 E-transactions Act No 9 of 6 8 6 43 34 E-law Table 83 Awareness of User Respondents on E-Laws for different sectors Government Private IT Education Sector Fully Aware Partially Aware Details unknown Intellectual Property Act No36 of 3 Computer Crimes Act No 4 of 7 E-transactions Act No 9 of 6 Intellectual Property Act No36 of 3 Computer Crimes Act No 4 of 7 E-transactions Act No 9 of 6 Intellectual Property Act No36 of 3 Computer Crimes Act No 4 of 7 E-transactions Act No 9 of 6 9 7 3 3 3 9 8 3 3 5 5 7 48 45 47 5 54 49 35 34 34 Not aware at all 8 36 6 9 3 8 3 36 Intellectual Property Act No36 of 3 3 38 Computer Crimes Act No 4 of 7 6 4 44 6 E-transactions Act No 9 of 6 6 7 43 33 E-law 78
Survey Final Report 9 Views and Opinions Expressed by the Respondents on Piracy 9 Impact on Country s Economy The study interviewed institutional heads and 66 users from these institutions to assess their views and opinions about software usage and piracy In this regard we asked the head respondents about their views on piracy and its impact on the country s economy The responses received are summarised in Table 9 Table 9 Impact of Software Piracy on Country s Economy: Opinions Expressed by Heads of Institutes Agreed Not Agreed 6 38 Yes No 93 97 b It can affect foreign investments in Sri Lanka 8 8 c It can discourage local software developers 6 39 Statement Do you think the use of unlicensed software can harm the country's economy If yes, in what ways could it harm the Sri Lankan economy a It can affect the integrity of the Sri Lankan business community Out of Heads of institutions who responded to our query, only 6 indicated that piracy could harm our economy Of these, 9 agreed that it can affect the integrity of the country s business community and 8 also agreed that it can affect the country s foreign investments However, only 6 considered that piracy can discourage local software developers These responses give an indication that close to 4 of the heads of these institutions do not consider piracy as an impediment to the country s economic development 79
Survey Final Report 9 Reasons for using unlicensed software Opinions were sought from the head respondents as to why the institutions are resorting to the use of unlicensed software in the country and the responses received are summarised in Table 9 Table 9 Opinions Expressed by Head Respondents Statement Response Received Not Agree Disagree Sure Lack of awareness of the Intellectual Property Act No36 of 3 64 4 Legal enforcement of the law is not effective 64 4 3 Institution is unable to pay high registration fees for proprietary software 78 4 8 46 39 5 36 54 6 67 7 37 4 4 5 6 7 Gotten used to the culture of using unauthorised copies of software Country could save valuable foreign exchange by not obtaining licensed software No harm done to the country s reputation by the use of unauthorised software After sales support service from the vendors is poor The results which appear in Table 9 show opinions expressed by head respondents as to why some institutions are resorting to the use of proprietary software without a valid license Accordingly, out of the respondents, 64 agreed that piracy takes place due to lack of awareness of the Intellectual Property Act while 4 however, disagreed with this argument and were not sure whether the lack of awareness is a valid reason for piracy However, a similar percentage of respondents attributed piracy to ineffective law enforcement while opted to disagree with this statement The highest percentage of 78 of the respondents attributed piracy to the high cost of registration of proprietary software Only 4 disagreed while 8 claimed that they were unsure Although another common belief is that people tend to use unlicensed software as they have got used to the culture of it over the years, only 46 agreed with the statement while 39 disagreed with it Also a majority of respondents disagreed with another popular argument that the country could save foreign exchange by not using licensed software In response to the statement that the use of unlicensed software does not harm the country s reputation, a majority of 67 disagreed with the statement To the statement that after sales support provided by vendors is poor, 37 agreed while 4 disagreed The responses received from different sectors are shown in Figures9 to 97 8
Survey Final Report Figure 9 Statement No: Responses Received from the head respondents from Di Different Sector As seen from the Figure 9, 73 of the respondents from the government sector agreed that the lack of awareness is a reason for piracy However, only 4 of the education sector respondents agreed that lack of awareness is a reason for piracy while a significant 33 was not sure of the accuracy of this statement The respondents who disagreed were between 3 3-5 Hence, the majority of the respondents have indicated the need for creating awareness among the community to discourage piracy It is also vital to note that the awareness about this important legislation that lend to the proper use of proprietary software is lacking in the education sector 4 of the head respondents have indicated that they are not sure of the statement Figure9 Statement No : Responses Received from the head respondents from Different Sectors 8
Survey Final Report As seen from Figure 9, a majority of 64 of the total respondents agreed that the reason for piracy is due to ineffectiveness of legal enforcement Heree again the 67 of government sector respondents have endorsed this statement while only 6 of the private sector respondents were not sure if piracy was due to the lack of effectiveness of the law enforcementonly around 5 5-5 of the respondents have disagreed with this argument Figure 93 Statement No 3: Responses Received from the Head respondents from Different Sectors Figure 93 indicates that an overwhelming 78 of the respondents agreed that the institution resorts to the use of unlicensed software software because of high registration fees charged for proprietary software Of the four (4) sectors almost 9 of the education sector respondents agreed with this argument Only 4 of the total respondents disagreed with this statement Some were of tthe opinion that proprietary software are sold in other developing countries at a lower price than in Sri Lanka Therefore it is appropriate to explore the possibility of obtaining concessionary rates for Sri Lanka so that most of the users could afford to use licensed software It is hoped that this would assist in minimising ing the illegal use of proprietary software to a lower level and bring more users to comply with the laws of the country 8
Survey Final Report Figure 94 Statement No 4: Responses Received from the head respondents from Different Sectors Although it is a popular belief that the country could save valuable foreign exchange by not obtaining licensed copies, as seen from Figure 94, only 36 of the total respondents have agreed with this argument In n fact a majority of 54 have disagreed with this argument while have indicated that they were unsure It is also pertinent to mention that over 7 of respondents from the government sector have disagreed with this argument However a majority of private sector respondents have agreed with the statement These results indicate that there is no clear understanding among all sectors regarding this issue and hence there is a need to educate them about the consequences and impact on the country as a result sult of high piracy usage rate Figure 95 Statement No 5: Responses Received from the head respondents from Different Sectors 83
Survey Final Report As seen from Figure 95, only 6 believed that there is no harm done to the country s reputation by using unauthorised ed software software However, the majority 67 of the respondents feel that high level of piracy in the country could harm the reputation of the country As seen from Table 95, almost 75 of the government sector and 65 of the IT sector respondents disagreed with the statement tatement while 699 in the private sector thought otherwise Here again there is no general consensus among the heads regarding the impact of piracy on the country s reputation Figure 96 Statement No 4: Responses Received from the head respondents fr from Different Sectors Some often expressed the view that they use unlicensed copies because they were familiar with the culture that prevailed for years before the intellectual property law came into effect in 3 We examined the validity of this argument argument with our head respondents and the secto sector-wise details are graphically depicted in Figure 96 Out of the total respondents, only 46 agreed with the statement while 39 disagreed and 5 were not sure sure However, a majority of respondents of the educati education sector (75) and private sector (63) agreed with the statement while only 4 of the government sector and 3 of the IT sector respondents disagreed with the statement 84
Survey Final Report Figure 97 Statement No 7: Responses Received from the Head Respondents from Different Sectors It is generally assumed that proprietary software is backed up by after sales support service from the vendor However, only 37 of the total respondents agreed with this statement A significant 4 disagreed while were unsure During discussions it was revealed that some software vendors do not provide the required services to their customers and as a result users in Sri Lanka have to seek support from overseas to resolve their problems 93 Opinions expressed ed by Head Respondents on the Use of FOSS In order to get an understanding on the views of the head respondents, twelve statements were presented in the questionnaire requesting them to select the best answers according to their knowledge on the subject These statements and the responses received from head respondents are presented in Table93 The following conclusion may be drawn based on these responses, although there were no clear cut overall opinions expressed by these highly diverse head responden respondents 85
Survey Final Report Table 93 Responses Received for the Statements from Head Respondents Responses received ( ) Statement Institution should always use licensed software on each of the computers Copies of licensed software may be used because of the cost factor Single licensed copy can be shared by 3 the staff Open source software is equally good 4 as the licensed software Open source software is unreliable 5 since they are not technically supported by a vendor Open source software can be combined easily with existing 6 proprietary software with the same IT system FOSS can be easily customized than 7 proprietary software Use of FOSS is more economical than 8 the use of proprietary software By using FOSS, the institution can 9 improve its information security and prevent virus attacks It is hard to train staff to use FOSS as they are already familiar with proprietary software In the long term it is better to switch to FOSS than use Proprietary software without a license Vendors provide an efficient after sales service for proprietary software Strongly Disagree Undecided Disagree Strongly Agree Agree 55 4 4 5 37 33 3 3 5 5 45 3 6 6 9 3 4 6 9 44 4 7 36 5 3 4 38 6 3 6 3 3 9 3 38 8 4 4 5 5 5 5 3 86
Survey Final Report A majority of 95 of the Head respondents have clearly indicated the necessity of using licensed software on each computer Only an insignificant 5 have expressed otherwise In a similar note, a majority of 7 of the Head respondents have expressed their disagreement with the use of single licensed copy on multiple computers within the organisation 3 There is a fair level of agreement (65) among the Head respondents that open source software is also equally good as the proprietary software and only 9 have disagreed with this statement A significant 6 have indicated their lack of knowledge in making a decision 4 A majority of 53 of the Head respondents disagreed with the statement that FOSS is unreliable as this software is not technically supported by vendors Only 3 agreed with the statement while as in previous instances, 6 expressed their lack of knowledge 5 Another unclear area regarding the use of FOSS is whether the programmes can be easily combined with the existing proprietary software within the same IT system Once again 53 have responded positively while only 6 have responded negatively The undecided respondents amount to 6 The Head respondents have indicated that they lack a clear idea about the ease of customization of open source software compared to proprietary software A high percentage (3) has indicated that they are undecided while 7 disagreed with the statement However a majority (43) have agreed that FOSS can be easily customised 7 Although there were a significant number of undecided responses for previous FOSS related statements, 8 of the respondents have endorsed the statement that the use of FOSS is more economical and only 7 disagreed while 3 remained undecided 8 A popular belief is that FOSS provides more security to information and is less prone to virus related damages However only 47 agreed with this statement and disagreed while 3 remained undecided 9 A significant 59 has agreed that training their staff to use FOSS is difficult as they are already familiar with proprietary software However 3 disagreed with this argument while remanied undecided A majority (66) of the respondents was of the opinion that it is better to switch to FOSS than to use proprietary software without a valid license Only 4 disagreed with this statement while remained undecided The statement Vendors provide an efficient after-sales service for proprietary software received an acceptance rate of 67 from the respondents while only disagreed with the statement and 3 remained undecided As an overall observation it is seen that a majority of the respondents were aware of the restrictions on the use of proprietary software and there is an increasing trend among the institutions to use FOSS However, a significant percentage of respondents need to learn more about FOSS in order to make informed decisions 87
Survey Final Report Figure 98 Responses Received from the Education Sector 88
Survey Final Report Figure 99 Responses Received from the IT Sector 89
Survey Final Report Figure 9 Responses Received from the Government Sector 9
Survey Final Report Figure igure 9 Responses Received from the Private Sector 9
Survey Final Report 94 Opinions expressed by User Respondents on the Use of FOSS In order to get an understanding on the views of the users, twelve statements were presented in the questionnaire requesting user respondents to select the best answers according to their knowledge on the subject These statements and the responses received from user respondents are presented in Table 94 The following conclusion may be drawn based on these responses, although there were no clear cut overall opinions expressed by these user respondents Table 9 4 Responses Received from User Respondents on the use of FOSS Statement Institution should always use licensed software on each of the computers Copies of licensed software may be used because of the cost factor Single licensed copy can be shared by 3 the staff Open source software is equally good as 4 the licensed software Open source software is unreliable 5 since they are not technically supported by a vendor Open source software can be combined 6 easily with existing proprietary software with the same IT system FOSS can be easily customized than 7 proprietary software Use of FOSS is more economical than 8 the use of proprietary software By using FOSS, the institution can 9 improve its information security and prevent virus attacks It is hard to train staff to use FOSS as they are already familiar with proprietary software In the long term it is better to switch to FOSS than use Proprietary software without a license Illegal software users should be punished to discourage software piracy Strongly Agree Responses received ( ) Strongly Agree Disagree Undecided Disagree 39 45 9 5 5 44 7 39 3 3 6 38 9 5 4 3 6 7 3 4 34 38 3 4 4 9 4 3 6 3 3 6 4 36 3 8 39 3 34 6 3 9 9
Survey Final Report A majority of 84 of the respondents have clearly indicated the necessity of using licensed software on each computer Only 6 have expressed otherwise However, 59 of the respondents agreed to the use of unlicensed software because of cost factor Only 3 disagreed with this option while remained undecided 3 Regarding the issue of using single licensed copy on multiple computers, respondents did not show a clear opinion as 46 agreed with this practice while 4 disagreed This shows their lack of awareness on this issue 4 A majority of 54 agreed with the statement that open source software is equally good as the licensed software However, 5 of the respondents have indicated their lack of knowledge on the use of FOSS 5 There was no clear consensus among the users regarding the reliability of FOSS since there is no reliable technical support available for FOSS users Once again 3 of the respondents have indicated their lack of awareness to respond to that statement 6 Once again the 38 of the user respondents have indicated their inability to express a clear opinion on the statement that FOSS can be easily combined with the existing proprietary software within the same IT system 7 Here again 46 of the respondents were unable to decide on the statement that FOSS can be easily customised than the proprietary software 8 Although a significant 6 responded as undecided, a majority of 69 agreed with the statement that use of FOSS is more economical than the use of proprietary software 9 The respondents were not clear in their minds regarding the statement that FOSS provides more security to information and is less prone to virus related damages While 4 agreed with the statement 4 remained undecided Only 47 has agreed that training of staff to use FOSS is difficult as they are already familiar with proprietary software However 8 expressed their inability to make any decision on the statement A majority 5 of the respondents was of the opinion that it is better to switch to FOSS than use proprietary software without a valid license However, a significant 34 has indicated their lack of knowledge to decide on the statement To a statement that illegal software users should be punished to discourage software piracy, only 48 agreed while 3 disagreed The balance remained undecided 93
Survey Final Report Discussion and Conclusions Problem of Piracy Software Piracy is a global phenomenon found both in developing countries as well as in developed countries With the expansion of IT facilities, the use of computers has entered into every business and household The driving force behind this expansion is undoubtedly the software that has helped to simplify tasks that were considered difficult and time consuming The industry spends billions of US dollars annually to develop new software and upgrade the existing software The Western world in particular has always recognised intellectual property rights of the creator and laws have been formulated to protect the creators rights However, due to the unique nature of software, it can be easily stolen without a physical loss of property to the owner This happens when single proprietary software is copied to a number of machines without a valid license Sometimes this software could be easily downloaded via internet This sort of unauthorised copying of software denies any royalty payment to the creator Despite the enactment of intellectual property law, according to some studies, Sri Lanka is also experiencing piracy of software at a fairly high level The purpose of this study was to assess the usage level of unauthorised software in the government and the other sectors of the country The Government of Sri Lanka (GOSL) is committed to control the unauthorised use of software and has taken active measures to control the situation However, as in any country this cannot be controlled only by legal means A carefully planned multi-prong approach is needed to reduce the level of software piracy without affecting the growth of the IT literacy in the country On one hand nobody could condone an illegal act and allow it to flourish in our society On the other hand if the costs of licensing are beyond the reach of an average user, can we ask him to give up IT completely? Are we to reverse our advances gained in popularising IT because of high costs of software? In this regard FOSS can play a crucial role and further advocacy and popularisation is needed to take FOSS to the masses The country s national universities are on the right track by promoting FOSS among the undergraduates Some university students are organised to promote FOSS but sadly lack resources to further their objectives In order to assess the use of unauthorised software a comprehensive survey was carried out and all relevant data was collected Considering the sensitive nature of the subject, it was not possible to get direct answers but attempts were made to arrive at conclusions by raising numerous queries related to software usage from the Head of Institutions or IT heads and actual computer users in surveyed institutions The outcome of this survey has been detailed in previous chapters where the information gathered from organisation Heads & 66 Users have been summarised The previous chapters detailed the usage of software in four sectors viz Education, IT, Private and Government It was observed that the use of unauthorised software is found in almost all of the institutions except in international software developing institutions that take strict measures to ensure that computers do not carry any unauthorized software 94
Survey Final Report Findings of the Study The study was carried out to access the usage level of Unauthorized Software in Educations, IT, Private & Government sectors by conducting a surveys with the Head of Institutions and a sample of 5 users from selected institutions As explained in Chapter 3, the final sample consisted of institutional Heads and 66 users of computers This dual approach was considered in order to verify the responses given by the Heads and its users As expected, discrepancies were observed in their responses provided by the Heads and the users It was observed that the users have provided more reliable information regarding software usage In order to simplify the study, different software were grouped in to 8 categories The categories were Operating Systems & related software, Desktop Application, 3Security Software, 4Database Software, 5Middleware 6Business Applications, 7Software Development Tools & Programming Languages and 8Statistical Applications Further, all the software were divided as licensed and unlicensed versions Free and Open Source Software (FOSS) also fell into the licensed category since it needed to be registered even though mostly available freeof-charge Although there were 8 categories most of the software found in the computers (85) fell into the categories of Operating Software, Desktop Applications and Security Software The findings of the study can be summarised as follows: There are eight broad categories of software that are found; I Operating Systems & related software II Desktop Applications III Security Software IV Database Software V Middleware VI Business Applications VII Software Development Tools & Programming languages VIII Statistical Applications Out of these, 85 of the software fell into the 3 categories namely Operating Systems & related software, Desktop Applications and Security Software The 66 user computers had recorded 77 different types of software which were categorized as mentioned above The mostly used software category was found to be Desktop Applications (3) followed by Operating Systems & related software (7), Security Software (66), Software Development Tools & Programming Languages (5), Database Software (44), Business Applications (3), Middleware (8) and Statistical Applications (6) 95
Survey Final Report 3 The analysis of user information revealed that the overall use of licensed software was 744 while the unlicensed software accounted for the balance 56 4 When different categories were considered, desktop applications had unlicensed software usage of 36, software development tools & programming languages 73 and operating systems, security software and statistical applications had a percentage 569 in total Database software had an unlicensed percentage of, while Middleware category had 4 5 All Business application software used were found to be licensed copies 6 In sector wise analysis, it was found that the use of unlicensed software was highest in the Education sector (49) followed by IT sector (8), Government sector (47) and Private sector (43) 7 When combined piracy levels were calculated for the 3 main categories namely Operating Systems & related software, Desktop Applications and Security Software piracy level was found to be 73 Here again, the education sector recorded an unlicensed usage level of 43 followed by the IT sector 38, Government sector 44 and Private sector 57 8 Out of the total Operating systems found in these user computers, 93 were Microsoft Windows while 6 consisted of Linux based Operating Systems and 7 consisted of VM Ware operating systems Further analysis indicated that 764 of the Microsoft Windows versions were licensed and the balance 36 carried various unlicensed Windows versions Sector wise analysis indicated that the Education sector had 86 of its Microsoft Windows Software unlicensed while Government sector had recorded 9, IT sector 67 & and the Private sector 88 9 In Desktop applications category too, the Education sector recorded the highest percentage of unlicensed software amounting to 467 followed by Government 399, IT sector 336 and Private sector 63 Out of the 8 software packages that was found under the Desktop category, 79 were found to be Microsoft Office packages and 7 were Adobe Photoshop, 55 Open Office and 3 were Adobe PageMaker The overall use of unlicensed Microsoft Office packages were 338 while it was found to be 4 in Education sector 38 in Government sector, 349 in the IT sector and 47 in the Private sector 96
Survey Final Report It was also noted that Open Source office packages such as Open Office and Libra Office accounted for 73 of the total Desktop applications Apart from this, institutions also used licensed software such as Kingsoft Office & Power Office 3 The other widely used Desktop Applications were Adobe Photoshop, which has an unlicensed usage level of 63, while Adobe PageMaker recorded 54 and Adobe Coral Draw 875 4 The information gathered from Institution Heads or IT Heads provided data regarding the total number of PCs, Laptops and usage pattern of software in these institutions This information was analyzed to provide valuable supplementary data which provided a broader view of the software usage pattern 5 As expected, the most popular Operating System Software used by these institutions was Microsoft Windows Out of a total of 3,66 desktops that were using different Windows Operating Systems, 69 was found to be using Windows XP, 33 Vista and 76 Windows 7 6 Use of unlicensed Windows XP was 6 in Pentium III machines, 7 in Pentium IV machines, 6 in Dual Core Machines, 4 in Core machines and in Core i3, i5 & i7 machines It clearly demonstrates that the institutions are inclined towards buying licensed versions when they purchase new machines However, the older machines are having a back log of unlicensed copies The piracy levels of Microsoft Vista and Windows 7 were 3 and 3 respectively 7 The study also covered,3 laptops that were using Microsoft Windows operating systems and observed that 5 of the machines used Windows XP, while 3 was using Vista and 469 was using Windows 7 Here again, a declining trend of piracy in the newer machines was clearly evident As such, the unlicensed usage of Windows XP which was 34 in Pentium IV machines has declined to 7 in Dual Core machines, 3 in core machines and 7 in core i3,i5 & i7 machines The unlicensed usage levels of Windows Vista and Windows 7 were and 3 respectively 8 Out of 3,66 desktops that used Microsoft, 7 had MS Office 3 and 59 had MS office 7 while the balance 4 carried MS office The use of unlicensed MS Office 3 was 4 while MS Office 7 recorded 3, and MS Office was 3 Here again, it is observed that the use of unlicensed Microsoft Office has demonstrated a declining trend 9 In the,3 laptops surveyed, 38 had MS Office 3, 548 MS Office 7 and 34 MS Office Of the laptops using MS Office 3, 4 were found to be using unlicensed copies while 5 MS Office 7 were also found to be unlicensed copies However, of the laptops 97
Survey Final Report using MS Office had licensed versions This again shows the emerging trend of institutions opting for licensed copies of software with new purchases The other important Desktop Applications were Adobe Photoshop and Page Maker Photoshop was used in 4 of the PCs while Page Maker was available only in 7 of the 3,66 PCs surveyed It was found that the majority of the software in these PCs had unlicensed copies and the levels of piracy were 5 and 67 for Photoshop and PageMaker respectively This software was also found in 5 of a total of,3 laptops surveyed Of the two, Photoshop was found in 5 machines with 36 using unlicensed copies while PageMaker was used in only 6 machines with a piracy rate of 5 When the opinions were sought, almost 95 of the heads interviewed expressed that each computer should have licensed software and disagreed with the practice of using single licensed copy on multiple computers even within the same institution This clearly indicates their unwavering agreement to comply with the provisions of Intellectual Property Law Most head respondents (accounting to 8 of the total) agreed that the use of FOSS is more economical and 5 believe that in the long run, it is better to switch to FOSS than to use unlicensed software This indicates the possible options to the use of counterfeit software 3 Also 65 of the respondents agreed that FOSS is equally good as the licensed software and 53 believed that FOSS can be easily combined with existing proprietary software However, 59 have expressed the difficulty of training the staff to FOSS as they are already familiar with proprietary software This clearly signifies the importance of promoting FOSS to counter use of unauthorized software 4 Out of the total, 78 of the head respondents agreed that institutions are unable to pay high licensing fee for proprietary software Some indicated that in certain developing countries proprietary software is available at a cheaper rate and Sri Lanka should also explore this possibility of obtaining licensed software at an affordable price This proves further the importance of promoting FOSS as a viable alternative to the use of unlicensed software 5 Some Heads also expressed the view that the Government of Sri Lanka (GOSL) should develop FOSS based programmes to suit local requirements and popularize them so that those who cannot afford to buy expensive proprietary software could use the same without resorting to the use of pirated copies 6 Of the Heads surveyed, only 35 of the respondents have indicated that they are fully aware of the provisions of the Intellectual Property Act which provides required guidelines to the use of licensed software The lack of proper understanding of this law may be having an impact on the use of pirated software in the country Hence, more programs to create awareness on e-laws may help to reduce the piracy level in the country 7 When queried, a majority of the Head respondents expressed that the high level of piracy prevailing in Sri Lanka could harm the reputation and image of the country and could affect foreign investment 98
Survey Final Report 8 Out of the 66 user respondents, the majority were unaware of FOSS and the Intellectual Property Act This shows the need to create awareness among the computer users on the provisions of these Laws 9 Some organizations as an alternate to the use of unlicensed software have opted to buy cheaper licensed alternative software such as ZWCAD & Kingsoft office at a fraction of the cost of its expensive counterpart software and they speak well of the performances This indicates that people are willing to use licensed software if available at an affordable price Once again it was observed that an institution has negotiated for a popular virus guard at 35 of the normal cost by signing a volume license for three years This shows that institutions are exploring different ways and means to run their operations economically within the legal frame work If there is a forum for the heads to meet each other and share their experiences it could help the organizations to the use of licensed software without losing the momentum gained by the IT usage in the country 3 The biggest problem faced by the institutions is the cost of replacing unlicensed software with licensed copies in all the old machines Some organizations with 6-7 machines need over Rs million for this operation At least one large institution had decided to replace the unlicensed software with FOSS and had saved over Rs 5 million However, the shift has prompted the proprietary software company to offer an extremely attractive corporate package to buy their proprietary software In conclusion, we can observe the declining trend in piracy as a majority of institutions are opting for licensed software when they buy new machines The problem faced by most institutions is the replacement of older machines with licensed software It is also observed that piracy is less in comparatively cheaper software like Operating Systems and high in other software Some institutions feel that it is not fair to charge international rates for proprietary software for a developing country like Sri Lanka and negotiations should take place for concessionary rates Further, FOSS should be promoted as an alternative to pirated software and a mechanism should be set up to provide assistance for FOSS users whenever required 99
Appendix
Appendix I
SOFTWARE USAGE QUESTIONNAIRE I
Appendix II
SOFTWARE USAGE QUESTIONNAIRE II
Appendix III
List of Organizations and Contact Person No Code No Name of Organization Designation Contact Person Educational Institutions Asia Pacific Institute of IT Lanka (Pvt) Ltd Operations Manager Dr Athula Pitigalaarachchi American Education Centre Ltd (ANC) IT Executive Mr Tuan Packeer College Director Mr Pubudu Alahakoon 3 Australian Center for Business Study (ACBT) IT Manager Mr Sandun Eranda Gamage 3 4 4 National Apprentice & Industrial Training Authority (NAITA) Head Of IT Mr Wanniarachchi 5 5 National Institute of Business Management (NIBM) Head Of IT Mrs Krishani Wijesiriwardana 6 6 University of Colombo - Faculty of Science Lecturer Of Physics (Coordinator of IT Unit) Mr Hiran HE Jayaweera 7 7 University of Moratuwa System Engineer Mr Sujith Fernando 8 8 Association of Accounting Technicians of Sri Lanka Director Computer Training Miss Shyamalie A Gunaratna 9 9 Chartered Institute of Management Accountants (CIMA) IT Infrastructure Analyst Mr Deleepa Illangakoon The Institute of Charted Accountants of Sri Lanka Chief Information Technology Officer Mr Gayan Wickramasinghe National Institute of Education Director IT Dr MB Ekanayake Sri Lanka College of Technology - Maradana Technical College Director Mr WMC Bandara IT Sector 3 6 Ceylinco Net Assist (Pvt) Ltd Marketing Manager Miss Luciana Maurene Anthony 4 7 DMS Training Centre Director Mr Palitha Rodrigo 5 8 IDM Computer Studies ( Pvt) Ltd Director Mr Harris Dissanayake 6 9 Informatics Institute of Computer Studies System Engineer Mr Asanka Upamal Walpitagamage 7 Singapore Informatics Institute Managing Director Mr Mohen Jayalath 8 Sri Lanka Institute of Information Technology (SLIIT) System Engineer Mr Pramod Hettihewa 9 OpenArc Computer School Ltd General Manager Mr Prabhath Nadurana 3 University of Colombo School of Computing (UCSC) Director Prof GN Wikramanayake 4 OST Training Centre Assistant General Manager Mr Mahesh Happitiya 5 AG Soft (Pvt) Ltd Project Manager Miss Vihashini De Cruze 3 6 Codeconnexion (Pvt) Ltd Finance Manager Mr Chaminda Abeysekara 4 7 Etisalat Lanka (Pvt) Ltd IT Manager Mrs Dinusha Ranaweera
5 8 hsenid Software International Team Leader - Network Mr Dulip Fonseka 6 9 IFS Sri Lanka LTD& IFS R & D Ltd Chief Operating Officer Mr Ranil Rajapakse 7 3 Just In Time (Pvt) Ltd Group CEO Dr Chandika Wickramatillake 8 3 Lanka Internet Services Ltd Managing Director Mr Rohith Udalagama 9 3 Sierra Information Technologies Ltd Deputy General Manager Mr Ananda Goonewardene 3 33 Softlogic Holdings PLC Director (Head of IT) Mr Haresh Kaimal 3 34 Suntel Lanka (Pvt) Ltd IT Manager Mr Prasad Samarasinghe 3 35 WS Lanka (Pvt) Ltd Senior Manager-System Administration Mr Dipendra De Silva 33 36 ZILLIONe Systems Solutions (Pvt) Ltd Business Development Manager Mr Vinusha Perera 34 37 DMS Electronics Sales Engineer Mr Yohan Gunasinghe 35 38 EPSI Computers (Pvt) Ltd CEO Mr Niranjan Kanagasooriyam 36 39 Science Land Software (Pvt) Ltd Director Mr Rohan Manamudali 37 Sri Lanka Telecom IT Manager Mr Janaka Harabaarachchi 38 Virtusa (Pvt) Ltd Managing Director Mr Madu Ratnayaka Private Sector 39 5 David Pieris information Technologies Ltd Officer Informations Systems Mr Chamilka Abagahawatta 4 5 Abans Group of Companies Manager - Resource & Project Applications Mr Sherwin Peter 4 53 ACL Cables Ltd Systems Manager Miss Helan De Fonseka 4 54 Bartleet & Co Ltd IT Manager Mr Darshan Gunaratne 43 55 CIC Holdings PLC IT Manager Mr Nadeera Wijenayake 44 56 Hatton National Bank Ltd Chief Information Officer Mr Sidath N Wijeratne 45 57 DFCC Bank Assistant Vice President Mr Nishan Weerasooriya 46 58 D H L Keells (Pvt) Ltd Information Systems Business Support Manager Mr Vajira Bandara 47 59 Expolanka Freight Ltd Manger - IT Support Mr Dixon Pereira 48 6 Hemas Intl Freight (Pte) Ltd Manager - Business Solutions Mr Chaminda Hendawitharana 49 6 Colombo Hilton Residencies IT Coordinator Mr Sumal Fonseka 5 6 Aitken Spence & Co Ltd IT Manager Mr Anupama Wijayasinghe 5 63 Galadari Hotel Manager Information Systems Mr Lalith Wijeweera 5 64 Taj Exotica (Taj Lanka Resorts Ltd) Assistant IT Manager Mr Jehan Anfar 53 65 Hidaramani Group Chief Information Officer Mr Samath Fernando 54 66 EAM Maliban Textiles Pvt Ltd Manager MIS Mr Sanjeewa Kodikara
55 67 Kotagala Plantation PLC IT Manager Mr P Rajapaksha 56 68 Kahawatte Plantation PLC IT Manager Mr Chaminda Thilakarathne 57 69 CIC Agri Business Ltd Assistant General Manager - IT Mr Dhammika Jayasundara 58 7 Delmage Forsyth & Co Ltd Senior System Analyst Mr Nisal Rathnayaka 59 7 Siedles (Pvt) Ltd Director- Technical Mr Kaushik Udesh 6 7 George Steuart & Co Ltd Assistant IT Manager Ms Yamuna Pathirana 6 73 Hemas Travels (Pvt) Ltd IT Coordinator Mr R Dharmapalan 6 74 Amba Research Lanka (Private) Limited Senior Manager IT Mr Lasith Mayakaduwa 63 75 Araliya Exporters (Pvt) Ltd CEO Mr Raj Kumar 64 76 Capital Maharaja Organization Ltd Director Mr Sashi Rajamahendran 65 77 Cargills (Ceylon) Ltd Director IT Mr Mohomed Barrie 66 78 Bank of Ceylon, Central Office Chief Manager - IT Mr Ranaweera 67 79 Ceylinco Life Insurance Co Ltd Deputy General Manager - ICT Mrs RMUK Rathnayake 68 8 Ceylon Tobacco Company Ltd IT Manager Mr Janak Weerakkodi 69 8 ODEL (Pvt) Ltd Executive - Network Administration Mr Najith Hasantha 7 8 Metropolitan Office (Pvt) Ltd Senior Manager - IT Division Mr Susil Peiris Government Sector 7 9 Auditor General's Department Deputy Auditor General Mr WPC Wickramarathna 7 9 Board of Investment of Sri Lanka Director (IT) Mr JPC Jayalath 73 93 Ceylon Electricity Board Deputy General Manager IT Mr MG Thilakeratne 74 94 Ceylon Petroleum Corporation IT Manager Mrs Sujani Fernando 75 95 Coconut Development Authority Chief Innovation Officer Ms HMDW Herath 76 96 Department of Census and Statistics Acting Director Mr SAS Bandulasena 77 97 Department of Examinations Commissioner of Examinations (Technology) Mr KMH Bandara 78 98 Department of Immigration & Emigration Deputy Controller Mr Chaminda Pathiraja 79 99 Department of Inland Revenue Senior IT Consultant MR Suminda Sugathapala 8 Department of Motor Traffic Data Processing Manager Mr Priyantha Eriyagama 8 Department of Survey Generals Deputy Surveyor General (IT) Mr PAN De Silva 8 Department of Technical Education and Training Deputy Director - Data Processing Mr MDA Mahinda 83 3 Hector Kobbekaduwa Agrarian Research and Training Institute Senior System Analyst Mr MBL Senarath 84 4 Institute of Policy Studies of Sri Lanka Head of Information Systems and Data Mr Harin Kodagoda
85 5 Ministry of Agriculture Senior Assistant Secretary Mr TL Nandasiri 86 6 Ministry of Education Director ICT Mr G M Neil Gunadasa 87 7 Ministry of External Affairs Director Mr BN Pathirane 88 8 Ministry of Public Administration & Home Affairs Assistant Director ICT Mr Lalith Waduge 89 9 Ministry of Water Supply and Drainage IT Assistant Mr Sisira Kumara 9 Ministry of Youth Affairs & Skills Development Assistant Director Miss Samanthi Mihindukula 9 National Intellectual Property Office of Sri Lanka Deputy Director Mrs GR Ranawake 9 Sri Lanka Insurance Corporation Ltd Deputy General Manager ICT Mr Ajith Wijayasundara 93 3 Sri Lanka Railways Chief Innovation Officer Mr ATLP Samarasinghe 94 4 Sri Lanka Samurdhi Authority System Analyst Mr Hiran Prasanna 95 5 University Grants Commission Systems Analyst Mr BNS Lankasena 96 6 Vocational Training Authority Director (Administration) Mr NKJ De Silva 97 7 Ministry of Postal Service Senior Assistant Mr Lakshman Padmakumara 98 8 Employees Trust Fund IT Manager Mr WSS Dharmasiri 99 9 Associated Newspapers of Ceylon Ltd Head of Information Technology Mr KDR Perera Department of Pensions Deputy Director - Pensions Mr Pradeep Gunawardene
Appendix IV
REFERENCES Intellectual Property Act No36 of 3 Computer Crimes Act No 4 of 7 E-transactions Act No 9 of 6 Policy and Procedures for Information and Communication Technology Usage in e-government Policy - ICTA publication National Workforce Survey- ICTA Publication ICT Usage in Government Organizations Survey (ICTUGS) - ICTA BSA Global Software Piracy Report-May - Business Software Alliance Business Software Alliance News Release, Colombo may Overview of Sri Lankan IT Industry Dinesh B Saparamadu Addressing Global Software Piracy-Microsoft Software Copyright laws in Sri Lanka, its Implementation and Measures to improve its Enforcement IT Law Group Assignment, Department of Computer Science and Engineering, University of Moratuwa