THE PURPOSE OF KMS PICO IN COMPUTER SOFTWARE PIRACY: AN IN-DEPTH ANALYSIS