Network externalities, price discrimination and profitable piracy
AbstractNo abstract is available for this item.
Download InfoIf you experience problems downloading a file, check if you have the proper application to view it first. In case of further problems read the IDEAS help page. Note that these files are not on the IDEAS site. Please be patient as the files may be large.
Bibliographic InfoArticle provided by Elsevier in its journal Information Economics and Policy.
Volume (Year): 15 (2003)
Issue (Month): 3 (September)
Contact details of provider:
Web page: http://www.elsevier.com/locate/inca/505549
Please report citation or reference errors to , or , if you are the registered author of the cited work, log in to your RePEc Author Service profile, click on "citations" and make appropriate adjustments.:
- Steven Shavell, 1989.
"Specific Versus General Enforcement of Law,"
NBER Working Papers
3062, National Bureau of Economic Research, Inc.
- Varian, Hal R., 1989. "Price discrimination," Handbook of Industrial Organization, in: R. Schmalensee & R. Willig (ed.), Handbook of Industrial Organization, edition 1, volume 1, chapter 10, pages 597-654 Elsevier.
- Joshua Slive & Dan Bernhardt, 1998. "Pirated for Profit," Canadian Journal of Economics, Canadian Economics Association, vol. 31(4), pages 886-899, November.
- SHY, Oz & THISSE, Jacques-François, .
"A strategic approach to software protection,"
CORE Discussion Papers RP
-1413, Université catholique de Louvain, Center for Operations Research and Econometrics (CORE).
- Polinsky, A Mitchell & Shavell, Steven, 1992.
"Enforcement Costs and the Optimal Magnitude and Probability of Fines,"
Journal of Law and Economics,
University of Chicago Press, vol. 35(1), pages 133-48, April.
- A. Mitchell Polinsky & Steven Shavell, 1990. "Enforcement Costs and the Optimal Magnitude and Probability of Fines," NBER Working Papers 3429, National Bureau of Economic Research, Inc.
- Garoupa, Nuno, 1997. " The Theory of Optimal Law Enforcement," Journal of Economic Surveys, Wiley Blackwell, vol. 11(3), pages 267-95, September.
- Besen, Stanley M & Kirby, Sheila Nataraj, 1989. "Private Copying, Appropriability, and Optimal Copying Royalties," Journal of Law and Economics, University of Chicago Press, vol. 32(2), pages 255-80, October.
- Katz, Michael L & Shapiro, Carl, 1985. "Network Externalities, Competition, and Compatibility," American Economic Review, American Economic Association, vol. 75(3), pages 424-40, June.
- Kathleen Reavis Conner & Richard P. Rumelt, 1991. "Software Piracy: An Analysis of Protection Strategies," Management Science, INFORMS, vol. 37(2), pages 125-139, February.
- Sheng-Wuu Joe & Shin-Yi Lin & Chou-Kang Chiu, 2010. "Modeling the unethical intention of software piracy: a qualitative integration of network externalities and information cascades," Quality & Quantity: International Journal of Methodology, Springer, vol. 44(1), pages 191-198, January.
- David Waterman & Sung Ji & Laura Rochet, 2007. "Enforcement and Control of Piracy, Copying, and Sharing in the Movie Industry," Review of Industrial Organization, Springer, vol. 30(4), pages 255-289, June.
- Stan J. Liebowitz & Richard Watt, 2006. "How To Best Ensure Remuneration For Creators In The Market For Music? Copyright And Its Alternatives," Journal of Economic Surveys, Wiley Blackwell, vol. 20(4), pages 513-545, 09.
- Cho, Won-Young & Ahn, Byong-Hun, 2010. "Versioning of information goods under the threat of piracy," Information Economics and Policy, Elsevier, vol. 22(4), pages 332-340, December.
- Kresimir Zigic & Jiri Strelicky & Michael Kunin, 2013. "The Interaction between Private and Public IPR Protection in a Software Market: A Positive and Normative Analysis," CERGE-EI Working Papers wp490, The Center for Economic Research and Graduate Education - Economic Institute, Prague.
- Lydia L. Gan & Hian Chye Koh, 2005. "The Profiles of Software Pirates among Tertiary Institutions in Singapore," Economic Growth centre Working Paper Series 0508, Nanyang Technolgical University, School of Humanities and Social Sciences, Economic Growth centre.
- Kinokuni, Hiroshi, 2005. "Compensation for copying and bargaining," Information Economics and Policy, Elsevier, vol. 17(3), pages 349-364, July.
- Joshua S. Gans, 2014. "“Selling Out” and the Impact of Music Piracy on Artist Entry," NBER Working Papers 20162, National Bureau of Economic Research, Inc.
- Gergely Csorba & Jong-Hee Hahn, 2006. "FUNCTIONAL DEGRADATION AND ASYMMETRIC NETWORK EFFECTS -super-* ," Journal of Industrial Economics, Wiley Blackwell, vol. 54(2), pages 253-268, 06.
- Peitz, Martin & Waelbroeck, Patrick, 2006. "Piracy of digital products: A critical review of the theoretical literature," Information Economics and Policy, Elsevier, vol. 18(4), pages 449-476, November.
- Kogan, Konstantin & Ozinci, Yaacov & Perlman, Yael, 2013. "Containing piracy with product pricing, updating and protection investments," International Journal of Production Economics, Elsevier, vol. 144(2), pages 468-478.
- Eric Darmon & Alexandra Rufini & Dominique Torre, 2009.
"Back to software "profitable piracy": the role of information diffusion,"
- Eric Darmon & Alexandra Rufini & Dominique Torre, 2009. "Back to software "profitable piracy": the role of information diffusion," Economics Bulletin, AccessEcon, vol. 29(2), pages 543-553.
- Eric P. Chiang & Djeto Assane, 2009. "Estimating The Willingness To Pay For Digital Music," Contemporary Economic Policy, Western Economic Association International, vol. 27(4), pages 512-522, October.
- Jiri Strelicky & Kresimir Zigic, 2011. "Intellectual Property Rights Protection and Enforcement in a Software Duopoly," CERGE-EI Working Papers wp435, The Center for Economic Research and Graduate Education - Economic Institute, Prague.
- Mikko Mustonen, 2005. "When Does a Firm Support Substitute Open Source Programming?," Journal of Economics & Management Strategy, Wiley Blackwell, vol. 14(1), pages 121-139, 03.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: (Zhang, Lei).
If references are entirely missing, you can add them using this form.