THE PURPOSE OF KMS PICO IN SOFTWARE PROGRAM PIRACY: AN IN-DEPTH ASSESSMENT