IDEAS home Printed from https://ideas.repec.org/a/kap/revind/v52y2018i1d10.1007_s11151-017-9581-0.html
   My bibliography  Save this article

Strategic Choice of Network Externality and Its Impact on Digital Piracy

Author

Listed:
  • Yuanzhu Lu

    (Central University of Finance and Economics)

  • Sougata Poddar

    (University of Redlands)

Abstract

Network externality plays a major role in the digital products market. The strength or the degree of the network externality has serious implications on the overall value or quality of the digital product. We focus on a situation where the degree of network externality of the product is a strategic choice of a digital firm that faces a commercial pirate that produces a lower quality of that product. We characterize the strategic response of the original firm to the pirate. We find the profit-maximizing degree of network externality chosen by the original firm under any cost environment and relative quality difference between the original and pirated good. Market structure and market coverage are endogenously determined in the model, which has implications with respect to piracy. We show that the relationship between profit-maximizing degree of network externality and the relative quality difference between the products can be monotonic or non-monotonic. The pirate’s response to the network effect is analyzed. Nash equilibria of the game in which both the network externality and the low quality are chosen simultaneously are also derived.

Suggested Citation

  • Yuanzhu Lu & Sougata Poddar, 2018. "Strategic Choice of Network Externality and Its Impact on Digital Piracy," Review of Industrial Organization, Springer;The Industrial Organization Society, vol. 52(1), pages 139-160, February.
  • Handle: RePEc:kap:revind:v:52:y:2018:i:1:d:10.1007_s11151-017-9581-0
    DOI: 10.1007/s11151-017-9581-0
    as

    Download full text from publisher

    File URL: http://link.springer.com/10.1007/s11151-017-9581-0
    File Function: Abstract
    Download Restriction: Access to full text is restricted to subscribers.

    File URL: https://libkey.io/10.1007/s11151-017-9581-0?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. Takeyama, Lisa N, 1994. "The Welfare Implications of Unauthorized Reproduction of Intellectual Property in the Presence of Demand Network Externalities," Journal of Industrial Economics, Wiley Blackwell, vol. 42(2), pages 155-166, June.
    2. Wauthy, Xavier, 1996. "Quality Choice in Models of Vertical Differentiation," Journal of Industrial Economics, Wiley Blackwell, vol. 44(3), pages 345-353, September.
    3. Chou, Chien-fu & Shy, Oz, 1990. "Network effects without network externalities," International Journal of Industrial Organization, Elsevier, vol. 8(2), pages 259-270, June.
    4. Kathleen Reavis Conner & Richard P. Rumelt, 1991. "Software Piracy: An Analysis of Protection Strategies," Management Science, INFORMS, vol. 37(2), pages 125-139, February.
    5. Grilo, Isabel & Shy, Oz & Thisse, Jacques-Francois, 2001. "Price competition when consumer behavior is characterized by conformity or vanity," Journal of Public Economics, Elsevier, vol. 80(3), pages 385-408, June.
    6. Banerjee, Dyuti S., 2003. "Software piracy: a strategic analysis and policy instruments," International Journal of Industrial Organization, Elsevier, vol. 21(1), pages 97-127, January.
    7. Church, Jeffrey & Gandal, Neil, 1993. "Complementary network externalities and technological adoption," International Journal of Industrial Organization, Elsevier, vol. 11(2), pages 239-260, June.
    8. Banerjee, Dyuti, 2013. "Effect of piracy on innovation in the presence of network externalities," Economic Modelling, Elsevier, vol. 33(C), pages 526-532.
    9. Luca Lambertini & Raimondello Orsini, 2005. "The Existence Of Equilibrium In A Differentiated Duopoly With Network Externalities," The Japanese Economic Review, Japanese Economic Association, vol. 56(1), pages 55-66, March.
    10. Oz Shy & Jacques‐Françlois Thisse, 1999. "A Strategic Approach to Software Protection," Journal of Economics & Management Strategy, Wiley Blackwell, vol. 8(2), pages 163-190, June.
    11. Jeffrey Rohlfs, 1974. "A Theory of Interdependent Demand for a Communications Service," Bell Journal of Economics, The RAND Corporation, vol. 5(1), pages 16-37, Spring.
    12. Katz, Michael L & Shapiro, Carl, 1985. "Network Externalities, Competition, and Compatibility," American Economic Review, American Economic Association, vol. 75(3), pages 424-440, June.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Yuanzhu Lu & Sougata Poddar, 2019. "Limiting End-user Piracy - The Role of Private and Public Anti-Piracy Measure," Annals of Economics and Finance, Society for AEF, vol. 20(1), pages 181-197, May.
    2. Barrachina, Alex & Forner-Carreras, Teresa, 2022. "Market must be defended: The role of counter-espionage policy in protecting domestic market welfare," Information Economics and Policy, Elsevier, vol. 58(C).
    3. Kresimir Zigic & Jiri Strelicky & Michal Kunin, 2020. "Private and Public IPR Protection in a Vertically Differentiated Software Duopoly," CERGE-EI Working Papers wp671, The Center for Economic Research and Graduate Education - Economics Institute, Prague.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Yuanzhu Lu & Sougata Poddar, 2015. "Strategic Choice of Network Externality," Working Papers 2015-03, Auckland University of Technology, Department of Economics.
    2. Oz Shy, 2011. "A Short Survey of Network Economics," Review of Industrial Organization, Springer;The Industrial Organization Society, vol. 38(2), pages 119-149, March.
    3. Ünlü, Vural & Hess, Thomas, 2003. "The optimal level of technical copyright protection: A game-theoretic approach," Working Papers 9/2003, University of Munich, Munich School of Management, Institute for Information Systems and New Media.
    4. Yuanzhu Lu & Sougata Poddar, 2019. "Limiting End-user Piracy - The Role of Private and Public Anti-Piracy Measure," Annals of Economics and Finance, Society for AEF, vol. 20(1), pages 181-197, May.
    5. Tsai, Ming-Fang & Chiou, Jiunn-Rong & Lin, Chun-Hung A., 2012. "A model of counterfeiting: A duopoly approach," Japan and the World Economy, Elsevier, vol. 24(4), pages 283-291.
    6. Banerjee, Dyuti, 2013. "Effect of piracy on innovation in the presence of network externalities," Economic Modelling, Elsevier, vol. 33(C), pages 526-532.
    7. Yuetao Gao & Yue Wu, 2023. "Regulating Probabilistic Selling of Counterfeits," Management Science, INFORMS, vol. 69(8), pages 4498-4517, August.
    8. Tunay I. Tunca & Qiong Wu, 2013. "Fighting Fire with Fire: Commercial Piracy and the Role of File Sharing on Copyright Protection Policy for Digital Goods," Information Systems Research, INFORMS, vol. 24(2), pages 436-453, June.
    9. Nie, Jiajia & Zhong, Ling & Li, Gendao & Cao, Kuo, 2022. "Piracy as an entry deterrence strategy in software market," European Journal of Operational Research, Elsevier, vol. 298(2), pages 560-572.
    10. D Banerjee, 2004. "Sensitivity To Tax Revenues and Optimal Anti-piracy Policy Instruments," Econometric Society 2004 Australasian Meetings 330, Econometric Society.
    11. Sanjay Jain, 2008. "Digital Piracy: A Competitive Analysis," Marketing Science, INFORMS, vol. 27(4), pages 610-626, 07-08.
    12. Sougata Poddar, 2002. "Network Externality and Software Piracy," WIDER Working Paper Series DP2002-115, World Institute for Development Economic Research (UNU-WIDER).
    13. Jonas Häckner & Astri Muren, 2015. "Counterfeiting and Negative Consumption Externalities – A Closer Look," Journal of Industry, Competition and Trade, Springer, vol. 15(4), pages 337-350, December.
    14. Yeh-ning Chen & Ivan Png, 2003. "Information Goods Pricing and Copyright Enforcement: Welfare Analysis," Information Systems Research, INFORMS, vol. 14(1), pages 107-123, March.
    15. Jean-Jacques Herings, P. & Peeters, Ronald & Yang, Michael S., 2010. "Competition against peer-to-peer networks," Information Economics and Policy, Elsevier, vol. 22(4), pages 315-331, December.
    16. Uriel Spiegel & Uri Ben-Zion & Tchai Tavor, 2005. "Profit Maximization And Social Optimum With Network Externality," Working Papers 0509, Ben-Gurion University of the Negev, Department of Economics.
    17. Dyuti S. Banerjee, 2014. "Effectiveness of government anti-piracy enforcement policy: commitment versus non-commitment," Chapters, in: Richard Watt (ed.), Handbook on the Economics of Copyright, chapter 15, pages 264-284, Edward Elgar Publishing.
    18. King, Stephen P. & Lampe, Ryan, 2003. "Network externalities, price discrimination and profitable piracy," Information Economics and Policy, Elsevier, vol. 15(3), pages 271-290, September.
    19. Yuanzhu Lu & Sougata Poddar, 2015. "Does the Nature of Piracy and Competition Matter?," Working Papers 2015-04, Auckland University of Technology, Department of Economics.
    20. Banerjee, Dyuti S., 2003. "Software piracy: a strategic analysis and policy instruments," International Journal of Industrial Organization, Elsevier, vol. 21(1), pages 97-127, January.

    More about this item

    Keywords

    Vertical product differentiation; Network externality; Market structure; Market coverage; Investment cost;
    All these keywords.

    JEL classification:

    • D23 - Microeconomics - - Production and Organizations - - - Organizational Behavior; Transaction Costs; Property Rights
    • D43 - Microeconomics - - Market Structure, Pricing, and Design - - - Oligopoly and Other Forms of Market Imperfection
    • L13 - Industrial Organization - - Market Structure, Firm Strategy, and Market Performance - - - Oligopoly and Other Imperfect Markets
    • L86 - Industrial Organization - - Industry Studies: Services - - - Information and Internet Services; Computer Software

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:kap:revind:v:52:y:2018:i:1:d:10.1007_s11151-017-9581-0. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Sonal Shukla or Springer Nature Abstracting and Indexing (email available below). General contact details of provider: http://www.springer.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.