IDEAS home Printed from https://ideas.repec.org/a/eee/ejores/v298y2022i2p560-572.html
   My bibliography  Save this article

Piracy as an entry deterrence strategy in software market

Author

Listed:
  • Nie, Jiajia
  • Zhong, Ling
  • Li, Gendao
  • Cao, Kuo

Abstract

Piracy is commonly believed to be detrimental to legal suppliers, so strong enforcement against piracy is expected. However, in practice, some companies do not deter piracy actively which seems counterintuitive. To explore the rationale behind the uncommon phenomenon, this paper explores the piracy issue from the entry deterrence perspective. In particular, we study an incumbent’s entry deterrence strategy using piracy when facing a potential entrant who offers similar products in the market. The incumbent decides whether to deter the piracy, and the entrant chooses whether to enter the market by anticipating the competition in the potential market and the entry cost. By analyzing the strategies of both the incumbent and the entrant, we find that deterring piracy is not always a good strategy since piracy could be used as a deterring strategy on the entrant, which explains the practices in many companies. Specifically, we find that when the entry cost is moderate, the incumbent accommodates piracy when the entrant is more of a threat, and piracy serves as a partner of the incumbent to prevent the entry of a powerful entrant. This conclusion also holds when considering the entry deterrence cost, network effect and the entrant is a high end substitute.

Suggested Citation

  • Nie, Jiajia & Zhong, Ling & Li, Gendao & Cao, Kuo, 2022. "Piracy as an entry deterrence strategy in software market," European Journal of Operational Research, Elsevier, vol. 298(2), pages 560-572.
  • Handle: RePEc:eee:ejores:v:298:y:2022:i:2:p:560-572
    DOI: 10.1016/j.ejor.2021.06.006
    as

    Download full text from publisher

    File URL: http://www.sciencedirect.com/science/article/pii/S0377221721005129
    Download Restriction: Full text for ScienceDirect subscribers only

    File URL: https://libkey.io/10.1016/j.ejor.2021.06.006?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. Sanjay Jain, 2008. "Digital Piracy: A Competitive Analysis," Marketing Science, INFORMS, vol. 27(4), pages 610-626, 07-08.
    2. Karaer, Özgen & Erhun, Feryal, 2015. "Quality and entry deterrence," European Journal of Operational Research, Elsevier, vol. 240(1), pages 292-303.
    3. Takeyama, Lisa N, 1994. "The Welfare Implications of Unauthorized Reproduction of Intellectual Property in the Presence of Demand Network Externalities," Journal of Industrial Economics, Wiley Blackwell, vol. 42(2), pages 155-166, June.
    4. Giacomo Bonanno, 1987. "Location Choice, Product Proliferation and Entry Deterrence," The Review of Economic Studies, Review of Economic Studies Ltd, vol. 54(1), pages 37-45.
    5. Kenneth L. Judd, 1985. "Credible Spatial Preemption," RAND Journal of Economics, The RAND Corporation, vol. 16(2), pages 153-166, Summer.
    6. Marius F. Niculescu & D. J. Wu, 2014. "Economics of Free Under Perpetual Licensing: Implications for the Software Industry," Information Systems Research, INFORMS, vol. 25(1), pages 173-199, March.
    7. Guofang Nan & Zan Zhang & Minqiang Li, 2019. "Optimal pricing for cloud service providers in a competitive setting," International Journal of Production Research, Taylor & Francis Journals, vol. 57(20), pages 6278-6291, October.
    8. Hubert Pun & Gregory D. DeYong, 2017. "Competing with Copycats When Customers Are Strategic," Manufacturing & Service Operations Management, INFORMS, vol. 19(3), pages 403-418, July.
    9. Johnson, William R, 1985. "The Economics of Copying," Journal of Political Economy, University of Chicago Press, vol. 93(1), pages 158-174, February.
    10. Kathleen Reavis Conner & Richard P. Rumelt, 1991. "Software Piracy: An Analysis of Protection Strategies," Management Science, INFORMS, vol. 37(2), pages 125-139, February.
    11. Hui Kai-Lung & Png Ivan, 2003. "Piracy and the Legitimate Demand for Recorded Music," The B.E. Journal of Economic Analysis & Policy, De Gruyter, vol. 2(1), pages 1-24, September.
    12. Brett Danaher & Samita Dhanasobhon & Michael D. Smith & Rahul Telang, 2010. "Converting Pirates Without Cannibalizing Purchasers: The Impact of Digital Distribution on Physical Sales and Internet Piracy," Marketing Science, INFORMS, vol. 29(6), pages 1138-1151, 11-12.
    13. Dixit, Avinash, 1980. "The Role of Investment in Entry-Deterrence," Economic Journal, Royal Economic Society, vol. 90(357), pages 95-106, March.
    14. Amit Mehra & Ram Bala & Ramesh Sankaranarayanan, 2012. "Competitive Behavior-Based Price Discrimination for Software Upgrades," Information Systems Research, INFORMS, vol. 23(1), pages 60-74, March.
    15. Richard Schmalensee, 1978. "Entry Deterrence in the Ready-to-Eat Breakfast Cereal Industry," Bell Journal of Economics, The RAND Corporation, vol. 9(2), pages 305-327, Autumn.
    16. Yong-Hwan Noh & Giancarlo Moschini, 2006. "Vertical Product Differentiation, Entry-Deterrence Strategies, and Entry Qualities," Review of Industrial Organization, Springer;The Industrial Organization Society, vol. 29(3), pages 227-252, November.
    17. Luis Aguiar & Jörg Claussen & Christian Peukert, 2018. "Catch Me If You Can: Effectiveness and Consequences of Online Copyright Enforcement," Information Systems Research, INFORMS, vol. 29(3), pages 656-678, September.
    18. Banerjee, Dyuti S., 2003. "Software piracy: a strategic analysis and policy instruments," International Journal of Industrial Organization, Elsevier, vol. 21(1), pages 97-127, January.
    19. Novos, Ian E & Waldman, Michael, 1984. "The Effects of Increased Copyright Protection: An Analytic Approach," Journal of Political Economy, University of Chicago Press, vol. 92(2), pages 236-246, April.
    20. Yunchuan Liu & Sunil Gupta & Z. John Zhang, 2006. "Note on Self-Restraint as an Online Entry-Deterrence Strategy," Management Science, INFORMS, vol. 52(11), pages 1799-1809, November.
    21. Mason, Robin & Weeds, Helen, 2010. "Investment, uncertainty and pre-emption," International Journal of Industrial Organization, Elsevier, vol. 28(3), pages 278-287, May.
    22. Ram D. Gopal & Alok Gupta, 2010. "Trading Higher Software Piracy for Higher Profits: The Case of Phantom Piracy," Management Science, INFORMS, vol. 56(11), pages 1946-1962, November.
    23. Jia, Kunhao & Liao, Xiuwu & Feng, Juan, 2018. "Selling or leasing? Dynamic pricing of software with upgrades," European Journal of Operational Research, Elsevier, vol. 266(3), pages 1044-1061.
    24. Shin-yi Wu & Pei-yu Chen, 2008. "Versioning and Piracy Control for Digital Information Goods," Operations Research, INFORMS, vol. 56(1), pages 157-172, February.
    25. Terrence August & Duy Dao & Kihoon Kim, 2019. "Market Segmentation and Software Security: Pricing Patching Rights," Management Science, INFORMS, vol. 65(10), pages 4575-4597, October.
    26. Anil Arya & Brian Mittendorf & David E. M. Sappington, 2007. "The Bright Side of Supplier Encroachment," Marketing Science, INFORMS, vol. 26(5), pages 651-659, 09-10.
    27. Baozhuang Niu & Qinquan Cui & Jie Zhang, 2017. "Impact of channel power and fairness concern on supplier’s market entry decision," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 68(12), pages 1570-1581, December.
    28. Yannis Bakos & Erik Brynjolfsson, 1999. "Bundling Information Goods: Pricing, Profits, and Efficiency," Management Science, INFORMS, vol. 45(12), pages 1613-1630, December.
    29. Terrence August & Tunay I. Tunca, 2008. "Let the Pirates Patch? An Economic Analysis of Software Security Patch Restrictions," Information Systems Research, INFORMS, vol. 19(1), pages 48-70, March.
    30. Shabtai Donnenfeld & Shlomo Weber, 1995. "Limit Qualities and Entry Deterrence," RAND Journal of Economics, The RAND Corporation, vol. 26(1), pages 113-130, Spring.
    31. Zhou, Yong-Wu & Cao, Zong-Hong & Zhong, Yuanguang, 2015. "Pricing and alliance selection for a dominant retailer with an upstream entry," European Journal of Operational Research, Elsevier, vol. 243(1), pages 211-223.
    32. Ashutosh Prasad & R. Venkatesh & Vijay Mahajan, 2010. "Optimal Bundling of Technological Products with Network Externality," Management Science, INFORMS, vol. 56(12), pages 2224-2236, December.
    33. Terrence August & Hyoduk Shin & Tunay I. Tunca, 2013. "Licensing and Competition for Services in Open Source Software," Information Systems Research, INFORMS, vol. 24(4), pages 1068-1086, December.
    34. Oz Shy & Jacques‐Françlois Thisse, 1999. "A Strategic Approach to Software Protection," Journal of Economics & Management Strategy, Wiley Blackwell, vol. 8(2), pages 163-190, June.
    35. A. Michael Spence, 1977. "Entry, Capacity, Investment and Oligopolistic Pricing," Bell Journal of Economics, The RAND Corporation, vol. 8(2), pages 534-544, Autumn.
    36. Hung-Ken Chien & C. Y. Cyrus Chu, 2008. "Sale or Lease? Durable-Goods Monopoly with Network Effects," Marketing Science, INFORMS, vol. 27(6), pages 1012-1019, 11-12.
    37. Kannan Srinivasan, 1991. "Multiple Market Entry, Cost Signalling and Entry Deterrence," Management Science, INFORMS, vol. 37(12), pages 1539-1555, December.
    38. Cui, Qinquan, 2019. "Quality investment, and the contract manufacturer’s encroachment," European Journal of Operational Research, Elsevier, vol. 279(2), pages 407-418.
    39. Tunay I. Tunca & Qiong Wu, 2013. "Fighting Fire with Fire: Commercial Piracy and the Role of File Sharing on Copyright Protection Policy for Digital Goods," Information Systems Research, INFORMS, vol. 24(2), pages 436-453, June.
    40. Takashi Omori & George Yarrow, 1982. "Product Diversification, Entry Prevention and Limit Pricing," Bell Journal of Economics, The RAND Corporation, vol. 13(1), pages 242-248, Spring.
    41. Richard Gilbert & Xavier Vives, 1986. "Entry Deterrence and the Free Rider Problem," The Review of Economic Studies, Review of Economic Studies Ltd, vol. 53(1), pages 71-83.
    42. Arun Sundararajan, 2004. "Managing Digital Piracy: Pricing and Protection," Information Systems Research, INFORMS, vol. 15(3), pages 287-308, September.
    43. Cho, Won-Young & Ahn, Byong-Hun, 2010. "Versioning of information goods under the threat of piracy," Information Economics and Policy, Elsevier, vol. 22(4), pages 332-340, December.
    44. Atanu Lahiri & Debabrata Dey, 2013. "Effects of Piracy on Quality of Information Goods," Management Science, INFORMS, vol. 59(1), pages 245-264, June.
    45. Yeh-ning Chen & Ivan Png, 2003. "Information Goods Pricing and Copyright Enforcement: Welfare Analysis," Information Systems Research, INFORMS, vol. 14(1), pages 107-123, March.
    46. Cheng, Hsing Kenneth & Tang, Qian Candy, 2010. "Free trial or no free trial: Optimal software product design with network effects," European Journal of Operational Research, Elsevier, vol. 205(2), pages 437-447, September.
    47. Roy Jones & Haim Mendelson, 2011. "Information Goods vs. Industrial Goods: Cost Structure and Competition," Management Science, INFORMS, vol. 57(1), pages 164-176, January.
    48. Wen Wen & Marco Ceccagnoli & Chris Forman, 2016. "Opening Up Intellectual Property Strategy: Implications for Open Source Software Entry by Start-up Firms," Management Science, INFORMS, vol. 62(9), pages 2668-2691, September.
    49. Matsui, Kenji, 2012. "Strategic upfront marketing channel integration as an entry barrier," European Journal of Operational Research, Elsevier, vol. 220(3), pages 865-875.
    50. Yannis Bakos & Erik Brynjolfsson, 2000. "Bundling and Competition on the Internet," Marketing Science, INFORMS, vol. 19(1), pages 63-82, May.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Peng, Shuxia & Li, Bo & Wu, Shuang, 2023. "Presence of piracy and legal protection: Decisions in the digital goods market under different contracts," European Journal of Operational Research, Elsevier, vol. 309(2), pages 578-596.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Tarun Jain & Jishnu Hazra & T. C. Edwin Cheng, 2020. "Illegal Content Monitoring on Social Platforms," Production and Operations Management, Production and Operations Management Society, vol. 29(8), pages 1837-1857, August.
    2. Debabrata Dey & Antino Kim & Atanu Lahiri, 2019. "Online Piracy and the “Longer Arm” of Enforcement," Management Science, INFORMS, vol. 65(3), pages 1173-1190, March.
    3. Tunay I. Tunca & Qiong Wu, 2013. "Fighting Fire with Fire: Commercial Piracy and the Role of File Sharing on Copyright Protection Policy for Digital Goods," Information Systems Research, INFORMS, vol. 24(2), pages 436-453, June.
    4. Can Sun & Yonghua Ji & Xianjun Geng, 2023. "Which Enemy to Dance with? A New Role of Software Piracy in Influencing Antipiracy Strategies," Information Systems Research, INFORMS, vol. 34(4), pages 1711-1727, December.
    5. Peng, Shuxia & Li, Bo & Wu, Shuang, 2023. "Presence of piracy and legal protection: Decisions in the digital goods market under different contracts," European Journal of Operational Research, Elsevier, vol. 309(2), pages 578-596.
    6. Atanu Lahiri & Debabrata Dey, 2013. "Effects of Piracy on Quality of Information Goods," Management Science, INFORMS, vol. 59(1), pages 245-264, June.
    7. Dan Wu & Guofang Nan & Minqiang Li, 2020. "Optimal Piracy Control: Should a Firm Implement Digital Rights Management?," Information Systems Frontiers, Springer, vol. 22(4), pages 947-960, August.
    8. Shin-yi Wu & Pei-yu Chen, 2008. "Versioning and Piracy Control for Digital Information Goods," Operations Research, INFORMS, vol. 56(1), pages 157-172, February.
    9. Peitz, Martin & Waelbroeck, Patrick, 2006. "Piracy of digital products: A critical review of the theoretical literature," Information Economics and Policy, Elsevier, vol. 18(4), pages 449-476, November.
    10. Sanjay Jain, 2008. "Digital Piracy: A Competitive Analysis," Marketing Science, INFORMS, vol. 27(4), pages 610-626, 07-08.
    11. Luis Aguiar & Jörg Claussen & Christian Peukert, 2018. "Catch Me If You Can: Effectiveness and Consequences of Online Copyright Enforcement," Information Systems Research, INFORMS, vol. 29(3), pages 656-678, September.
    12. Peter-J. Jost, 2023. "Price commitment and the strategic launch of a fighter brand," Quantitative Marketing and Economics (QME), Springer, vol. 21(3), pages 381-435, September.
    13. Baojun Jiang & Lin Tian, 2018. "Collaborative Consumption: Strategic and Economic Implications of Product Sharing," Management Science, INFORMS, vol. 64(3), pages 1171-1188, March.
    14. Karaer, Özgen & Erhun, Feryal, 2015. "Quality and entry deterrence," European Journal of Operational Research, Elsevier, vol. 240(1), pages 292-303.
    15. Tsai, Ming-Fang & Chiou, Jiunn-Rong & Lin, Chun-Hung A., 2012. "A model of counterfeiting: A duopoly approach," Japan and the World Economy, Elsevier, vol. 24(4), pages 283-291.
    16. Ünlü, Vural & Hess, Thomas, 2003. "The optimal level of technical copyright protection: A game-theoretic approach," Working Papers 9/2003, University of Munich, Munich School of Management, Institute for Information Systems and New Media.
    17. Yeh-ning Chen & Ivan Png, 2003. "Information Goods Pricing and Copyright Enforcement: Welfare Analysis," Information Systems Research, INFORMS, vol. 14(1), pages 107-123, March.
    18. Stan J. Liebowitz & Richard Watt, 2006. "How To Best Ensure Remuneration For Creators In The Market For Music? Copyright And Its Alternatives," Journal of Economic Surveys, Wiley Blackwell, vol. 20(4), pages 513-545, September.
    19. Bradley, Wendy A. & Kolev, Julian, 2023. "How does digital piracy affect innovation? Evidence from software firms," Research Policy, Elsevier, vol. 52(3).
    20. Yuanzhu Lu & Sougata Poddar, 2019. "Limiting End-user Piracy - The Role of Private and Public Anti-Piracy Measure," Annals of Economics and Finance, Society for AEF, vol. 20(1), pages 181-197, May.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:eee:ejores:v:298:y:2022:i:2:p:560-572. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Catherine Liu (email available below). General contact details of provider: http://www.elsevier.com/locate/eor .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.