IDEAS home Printed from https://ideas.repec.org/a/jas/jasssj/2005-81-3.html
   My bibliography  Save this article

Pricing Strategies and Protection of Digital Products Under Presence of Piracy: A Welfare Analysis

Author

Abstract

Based on a duopolistic set-up where firms produce software products with respective support packs, we analyze firms' pricing and predetermined monitoring decisions, as well as the impacts of these factors on welfare. In the presence of end-user piracy, users are classified as support-dependent and support-independent. First, a theoretical model is derived, but, due to its complexity, a numerical example is employed to derive the results. We observe that firms that are in competition face a menu of monitoring and pricing combinations. Our results indicate that (i) firms may use monitoring and pricing as strategic complements, rather than substitutes, (ii) profits are not necessarily an increasing function of both monitoring rates and prices, and welfare improvement from the lowest set of monitoring and pricing levels is possible, (iii) firms may prefer improvement in software rather than support packs, targeting especially the support-independent users.

Suggested Citation

  • Gokhan Ozertan & Baris Cevik, 2008. "Pricing Strategies and Protection of Digital Products Under Presence of Piracy: A Welfare Analysis," Journal of Artificial Societies and Social Simulation, Journal of Artificial Societies and Social Simulation, vol. 11(4), pages 1-1.
  • Handle: RePEc:jas:jasssj:2005-81-3
    as

    Download full text from publisher

    File URL: https://www.jasss.org/11/4/1/1.pdf
    Download Restriction: no
    ---><---

    References listed on IDEAS

    as
    1. Paul Belleflamme & Pierre M. Picard, 2007. "Piracy and Competition," Journal of Economics & Management Strategy, Wiley Blackwell, vol. 16(2), pages 351-383, June.
    2. Amit Gayer & Oz Shy, 2005. "Copyright Enforcement in the Digital Era," CESifo Economic Studies, CESifo, vol. 51(2-3), pages 477-489.
    3. Bae, Sang Hoo & Choi, Jay Pil, 2006. "A model of piracy," Information Economics and Policy, Elsevier, vol. 18(3), pages 303-320, September.
    4. Johnson, William R, 1985. "The Economics of Copying," Journal of Political Economy, University of Chicago Press, vol. 93(1), pages 158-174, February.
    5. Steven Shavell & A. Mitchell Polinsky, 2000. "The Economic Theory of Public Enforcement of Law," Journal of Economic Literature, American Economic Association, vol. 38(1), pages 45-76, March.
    6. Oz Shy & Jacques‐Françlois Thisse, 1999. "A Strategic Approach to Software Protection," Journal of Economics & Management Strategy, Wiley Blackwell, vol. 8(2), pages 163-190, June.
    7. Yeh-ning Chen & Ivan Png, 2003. "Information Goods Pricing and Copyright Enforcement: Welfare Analysis," Information Systems Research, INFORMS, vol. 14(1), pages 107-123, March.
    8. Arun Sundararajan, 2003. "Managing Digital Piracy: Pricing, Protection and Welfare," Law and Economics 0307001, University Library of Munich, Germany.
    9. Arun Sundararajan, 2004. "Managing Digital Piracy: Pricing and Protection," Information Systems Research, INFORMS, vol. 15(3), pages 287-308, September.
    10. Banerjee, Dyuti S., 2006. "Lobbying and commercial software piracy," European Journal of Political Economy, Elsevier, vol. 22(1), pages 139-155, March.
    11. Kathleen Reavis Conner & Richard P. Rumelt, 1991. "Software Piracy: An Analysis of Protection Strategies," Management Science, INFORMS, vol. 37(2), pages 125-139, February.
    12. Peitz, Martin & Waelbroeck, Patrick, 2006. "Piracy of digital products: A critical review of the theoretical literature," Information Economics and Policy, Elsevier, vol. 18(4), pages 449-476, November.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Tsai, Ming-Fang & Chiou, Jiunn-Rong & Lin, Chun-Hung A., 2012. "A model of counterfeiting: A duopoly approach," Japan and the World Economy, Elsevier, vol. 24(4), pages 283-291.
    2. Žigić, Krešimir & Střelický, Jiří & Kúnin, Michael, 2023. "Copyright and firms’ own IPR protection in a software market: Monopoly versus duopoly," Economic Modelling, Elsevier, vol. 123(C).
    3. Kresimir Zigic & Jiri Strelicky & Michael Kunin, 2013. "The Interaction between Private and Public IPR Protection in a Software Market: A Positive and Normative Analysis," CERGE-EI Working Papers wp490, The Center for Economic Research and Graduate Education - Economics Institute, Prague.
    4. Shin-yi Wu & Pei-yu Chen, 2008. "Versioning and Piracy Control for Digital Information Goods," Operations Research, INFORMS, vol. 56(1), pages 157-172, February.
    5. Peitz, Martin & Waelbroeck, Patrick, 2006. "Piracy of digital products: A critical review of the theoretical literature," Information Economics and Policy, Elsevier, vol. 18(4), pages 449-476, November.
    6. Kresimir Zigic & Jiri Strelicky & Michael Kunin, 2015. "Modeling Software Piracy Protection: Monopoly versus Duopoly," CERGE-EI Working Papers wp551, The Center for Economic Research and Graduate Education - Economics Institute, Prague.
    7. Kresimir Zigic & Jiri Strelicky & Michal Kunin, 2020. "Private and Public IPR Protection in a Vertically Differentiated Software Duopoly," CERGE-EI Working Papers wp671, The Center for Economic Research and Graduate Education - Economics Institute, Prague.
    8. Sanjay Jain, 2008. "Digital Piracy: A Competitive Analysis," Marketing Science, INFORMS, vol. 27(4), pages 610-626, 07-08.
    9. Jean-Jacques Herings, P. & Peeters, Ronald & Yang, Michael S., 2010. "Competition against peer-to-peer networks," Information Economics and Policy, Elsevier, vol. 22(4), pages 315-331, December.
    10. Yuanzhu Lu & Sougata Poddar, 2019. "Limiting End-user Piracy - The Role of Private and Public Anti-Piracy Measure," Annals of Economics and Finance, Society for AEF, vol. 20(1), pages 181-197, May.
    11. Inceoglu, Firat, 2015. "Copyright protection and entry deterrence," Information Economics and Policy, Elsevier, vol. 32(C), pages 38-45.
    12. Tunay I. Tunca & Qiong Wu, 2013. "Fighting Fire with Fire: Commercial Piracy and the Role of File Sharing on Copyright Protection Policy for Digital Goods," Information Systems Research, INFORMS, vol. 24(2), pages 436-453, June.
    13. Nie, Jiajia & Zhong, Ling & Li, Gendao & Cao, Kuo, 2022. "Piracy as an entry deterrence strategy in software market," European Journal of Operational Research, Elsevier, vol. 298(2), pages 560-572.
    14. Terrence August & Tunay I. Tunca, 2008. "Let the Pirates Patch? An Economic Analysis of Software Security Patch Restrictions," Information Systems Research, INFORMS, vol. 19(1), pages 48-70, March.
    15. Ming Chang & Chiu Lin & Dachrahn Wu, 2008. "Piracy and limited liability," Journal of Economics, Springer, vol. 95(1), pages 25-53, October.
    16. M Khouja & H K Rajagopalan, 2009. "Can piracy lead to higher prices in the music and motion picture industries?," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 60(3), pages 372-383, March.
    17. Xinyu Hua & Kathryn E. Spier, 2021. "Settling Lawsuits with Pirates," HKUST CEP Working Papers Series 202104, HKUST Center for Economic Policy.
    18. Atanu Lahiri & Debabrata Dey, 2013. "Effects of Piracy on Quality of Information Goods," Management Science, INFORMS, vol. 59(1), pages 245-264, June.
    19. Ünlü, Vural & Hess, Thomas, 2003. "The optimal level of technical copyright protection: A game-theoretic approach," Working Papers 9/2003, University of Munich, Munich School of Management, Institute for Information Systems and New Media.
    20. Dan Wu & Guofang Nan & Minqiang Li, 2020. "Optimal Piracy Control: Should a Firm Implement Digital Rights Management?," Information Systems Frontiers, Springer, vol. 22(4), pages 947-960, August.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:jas:jasssj:2005-81-3. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Carlo Debernardi (email available below). General contact details of provider: .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.