THE FUNCTION OF KMS PICO IN APPLICATION PIRACY: AN IN-DEPTH ANALYSIS