Advanced Search
MyIDEAS: Login

Accommodation or Deterrence in the Face of Commercial Piracy: the Impact of Intellectual Property Rights (IPR) Protection

Contents:

Author Info

  • Yuanzhu Lu

    ()
    (China Economics and Management Academy, Central University of Finance and Economics)

  • Sougata Poddar

    ()
    (Department of Economics and Finance, Hanyang University, Seoul Campus)

Abstract

In this paper, we address the issue of illegal copying or counterfeiting of the original product and Intellectual Property Rights (IPR) protections. The original product developer makes costly investment to deter piracy in a given regime of IPR protection. In the presence of a commercial pirate, we find that it is profitable for the original producer to accommodate the pirate when there is weak IPR protection, and deter when the IPR protection is strong. However, in the comparative statics analysis, we find that there is a non-monotonic relationship between the optimal level of deterrence (chosen by the original producer) and the degree of IPR protection in the economy. The relationship between the rate of piracy and IPR protection is found to be monotonically decreasing whereas the relationship between the rate of piracy and the quality of the pirated product turns out to be non-monotonic. On the other side, from the commercial pirate¡¯s point of view, the most profitable way to survive in the market is to produce a pirated product of moderate quality. Our model also provided a possible explanation of varying piracy rates across countries/regions.

Download Info

If you experience problems downloading a file, check if you have the proper application to view it first. In case of further problems read the IDEAS help page. Note that these files are not on the IDEAS site. Please be patient as the files may be large.
File URL: http://down.aefweb.net/WorkingPapers/w389.pdf
Download Restriction: no

Bibliographic Info

Paper provided by China Economics and Management Academy, Central University of Finance and Economics in its series CEMA Working Papers with number 389.

as in new window
Length: 29 pages
Date of creation: Nov 2009
Date of revision:
Handle: RePEc:cuf:wpaper:389

Contact details of provider:
Web page: http://cema.cufe.edu.cn/
More information through EDIRC

Related research

Keywords: Piracy; Copyright violations; Raising rival¡¯s cost; Deterrence; Accommodation; Product quality;

Find related papers by JEL classification:

References

References listed on IDEAS
Please report citation or reference errors to , or , if you are the registered author of the cited work, log in to your RePEc Author Service profile, click on "citations" and make appropriate adjustments.:
as in new window
  1. Antonio Rodriguez Andres, 2004. "The Relationship Between Software Protection And Piracy: Evidence From Europe," Law and Economics 0402001, EconWPA.
  2. Kiema, Ilkka, 2008. "Commercial piracy and intellectual property policy," Journal of Economic Behavior & Organization, Elsevier, vol. 68(1), pages 304-318, October.
  3. Paul Belleflamme & Pierre M. Picard, 2007. "Piracy and Competition," Journal of Economics & Management Strategy, Wiley Blackwell, vol. 16(2), pages 351-383, 06.
  4. Landes, William M & Posner, Richard A, 1989. "An Economic Analysis of Copyright Law," The Journal of Legal Studies, University of Chicago Press, vol. 18(2), pages 325-63, June.
  5. Joshua Slive & Dan Bernhardt, 1998. "Pirated for Profit," Canadian Journal of Economics, Canadian Economics Association, vol. 31(4), pages 886-899, November.
  6. Bae, Sang Hoo & Choi, Jay Pil, 2006. "A model of piracy," Information Economics and Policy, Elsevier, vol. 18(3), pages 303-320, September.
  7. Holm Håkan J., 2003. "Can economic theory explain piracy behavior?," The B.E. Journal of Economic Analysis & Policy, De Gruyter, vol. 3(1), pages 1-18, April.
  8. Banerjee, Dyuti S., 2006. "Lobbying and commercial software piracy," European Journal of Political Economy, Elsevier, vol. 22(1), pages 139-155, March.
  9. Kim Jin-Hyuk, 2007. "Strategic Use of Copyright Protection to Deter Entry," The B.E. Journal of Economic Analysis & Policy, De Gruyter, vol. 7(1), pages 1-19, September.
  10. Marron, Donald B & Steel, David G, 2000. "Which Countries Protect Intellectual Property? The Case of Software Piracy," Economic Inquiry, Western Economic Association International, vol. 38(2), pages 159-74, April.
  11. Sougata Poddar, 2005. "Network Externality and Commercial Software Piracy," Departmental Working Papers wp0516, National University of Singapore, Department of Economics.
  12. Banerjee, Dyuti S., 2003. "Software piracy: a strategic analysis and policy instruments," International Journal of Industrial Organization, Elsevier, vol. 21(1), pages 97-127, January.
Full references (including those not matched with items on IDEAS)

Citations

Lists

This item is not listed on Wikipedia, on a reading list or among the top items on IDEAS.

Statistics

Access and download statistics

Corrections

When requesting a correction, please mention this item's handle: RePEc:cuf:wpaper:389. See general information about how to correct material in RePEc.

For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: (Qiang Gao).

If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

If references are entirely missing, you can add them using this form.

If the full references list an item that is present in RePEc, but the system did not link to it, you can help with this form.

If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your profile, as there may be some citations waiting for confirmation.

Please note that corrections may take a couple of weeks to filter through the various RePEc services.