A Strategic Approach to Software Protection
Author
Abstract
Suggested Citation
DOI: 10.1111/j.1430-9134.1999.00163.x
Download full text from publisher
Other versions of this item:
- SHY, Oz & THISSE, Jacques-François, 1999. "A strategic approach to software protection," LIDAM Reprints CORE 1413, Université catholique de Louvain, Center for Operations Research and Econometrics (CORE).
References listed on IDEAS
- Erik Brynjolfsson & Chris F. Kemerer, 1996.
"Network Externalities in Microcomputer Software: An Econometric Analysis of the Spreadsheet Market,"
Management Science, INFORMS, vol. 42(12), pages 1627-1647, December.
- Erik Brynjolfsson & Chris F. Kemerer, 1993. "Network Externalities in Microcomputer Software: An Econometric Analysis of the Spreadsheet Market," Working Paper Series 158, MIT Center for Coordination Science.
- Liebowitz, S J, 1985. "Copying and Indirect Appropriability: Photocopying of Journals," Journal of Political Economy, University of Chicago Press, vol. 93(5), pages 945-957, October.
- Neil Gandal, 1994. "Hedonic Price Indexes for Spreadsheets and an Empirical Test for Network Externalities," RAND Journal of Economics, The RAND Corporation, vol. 25(1), pages 160-170, Spring.
- Kathleen Reavis Conner & Richard P. Rumelt, 1991. "Software Piracy: An Analysis of Protection Strategies," Management Science, INFORMS, vol. 37(2), pages 125-139, February.
- Novos, Ian E & Waldman, Michael, 1984. "The Effects of Increased Copyright Protection: An Analytic Approach," Journal of Political Economy, University of Chicago Press, vol. 92(2), pages 236-246, April.
Most related items
These are the items that most often cite the same works as this one and are cited by the same works as this one.- Martin Peitz & Patrick Waelbroeck, 2005.
"An Economist's Guide to Digital Music,"
CESifo Economic Studies, CESifo Group, vol. 51(2-3), pages 359-428.
- Martin Peitz & Patrick Waelbroeck, 2004. "An Economist’s Guide to Digital Music," CESifo Working Paper Series 1333, CESifo.
- Peitz, Martin & Waelbroeck, Patrick, 2004. "An Economist's Guide to Digital Music," Discussion Paper Series of SFB/TR 15 Governance and the Efficiency of Economic Systems 32, Free University of Berlin, Humboldt University of Berlin, University of Bonn, University of Mannheim, University of Munich.
- Takeyama, Lisa N, 1997. "The Intertemporal Consequences of Unauthorized Reproduction of Intellectual Property," Journal of Law and Economics, University of Chicago Press, vol. 40(2), pages 511-522, October.
- Peitz, Martin & Waelbroeck, Patrick, 2006. "Piracy of digital products: A critical review of the theoretical literature," Information Economics and Policy, Elsevier, vol. 18(4), pages 449-476, November.
- Patrick Legros, 2005.
"Art and the Internet: Blessing the Curse?,"
NajEcon Working Paper Reviews
172782000000000001, www.najecon.org.
- Patrick Legros, 2005. "Art and the Internet: Blessing the Curse?," Levine's Bibliography 666156000000000502, UCLA Department of Economics.
- Vitor Trindade & Johannes Moenius, 2007. "Networks, Standards and Intellectual Property Rights," Working Papers 0705, Department of Economics, University of Missouri.
- Xinyu Hua & Kathryn E. Spier, 2021. "Settling Lawsuits with Pirates," HKUST CEP Working Papers Series 202104, HKUST Center for Economic Policy.
- Tunay I. Tunca & Qiong Wu, 2013. "Fighting Fire with Fire: Commercial Piracy and the Role of File Sharing on Copyright Protection Policy for Digital Goods," Information Systems Research, INFORMS, vol. 24(2), pages 436-453, June.
- Adrien Hervouet & Stéphane Lemarié, 2023. "The Economics of Royalty Rates in Plant Breeding," Working Papers 2023-03, Grenoble Applied Economics Laboratory (GAEL).
- Lydia L. Gan & Hian Chye Koh, 2005. "The Profiles of Software Pirates among Tertiary Institutions in Singapore," Economic Growth Centre Working Paper Series 0508, Nanyang Technological University, School of Social Sciences, Economic Growth Centre.
- Yang, S., 2010. "Markets of information goods facing a strong P2P network," Research Memorandum 037, Maastricht University, Maastricht Research School of Economics of Technology and Organization (METEOR).
- Terrence August & Tunay I. Tunca, 2008. "Let the Pirates Patch? An Economic Analysis of Software Security Patch Restrictions," Information Systems Research, INFORMS, vol. 19(1), pages 48-70, March.
- Cho, Won-Young & Ahn, Byong-Hun, 2010. "Versioning of information goods under the threat of piracy," Information Economics and Policy, Elsevier, vol. 22(4), pages 332-340, December.
- Oz Shy, 2011.
"A Short Survey of Network Economics,"
Review of Industrial Organization, Springer;The Industrial Organization Society, vol. 38(2), pages 119-149, March.
- Oz Shy, 2010. "A short survey of network economics," Working Papers 10-3, Federal Reserve Bank of Boston.
- Sanjay Jain, 2008. "Digital Piracy: A Competitive Analysis," Marketing Science, INFORMS, vol. 27(4), pages 610-626, 07-08.
- Bakos, Yannis & Brynjolfsson, Erik & Lichtman, Douglas, 1999. "Shared Information Goods," Journal of Law and Economics, University of Chicago Press, vol. 42(1), pages 117-155, April.
- Yoon, Kiho, 2002. "The optimal level of copyright protection," Information Economics and Policy, Elsevier, vol. 14(3), pages 327-348, September.
- Yeh-ning Chen & Ivan Png, 2003. "Information Goods Pricing and Copyright Enforcement: Welfare Analysis," Information Systems Research, INFORMS, vol. 14(1), pages 107-123, March.
- Tsai, Ming-Fang & Chiou, Jiunn-Rong & Lin, Chun-Hung A., 2012. "A model of counterfeiting: A duopoly approach," Japan and the World Economy, Elsevier, vol. 24(4), pages 283-291.
- Diana M. Burton & H. Alan Love & Gokhan Ozertan & Curtis R. Taylor, 2005. "Property Rights Protection of Biotechnology Innovations," Journal of Economics & Management Strategy, Wiley Blackwell, vol. 14(4), pages 779-812, December.
- Stan J. Liebowitz & Richard Watt, 2006. "How To Best Ensure Remuneration For Creators In The Market For Music? Copyright And Its Alternatives," Journal of Economic Surveys, Wiley Blackwell, vol. 20(4), pages 513-545, September.
Corrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:bla:jemstr:v:8:y:1999:i:2:p:163-190. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Wiley Content Delivery (email available below). General contact details of provider: http://www.kellogg.northwestern.edu/research/journals/JEMS/ .
Please note that corrections may take a couple of weeks to filter through the various RePEc services.