UNDERSTANDING THE RISKS OF EMPLOYING KMS PICO FOR SOFTWARE ACTIVATION