UNDERSTANDING KMS PICO AND ITS ROLE IN COMPUTER SOFTWARE PIRACY