Network Externality and Commercial Software Piracy
AbstractContrary to the earlier findings under end-users piracy where the existence of strong network externality was shown to be a reason for allowing limited piracy, we find when the piracy is commercial in nature the optimal policy for the original software developer is to protect its product irrespective of the strength of network externality in the software users market.
Download InfoIf you experience problems downloading a file, check if you have the proper application to view it first. In case of further problems read the IDEAS help page. Note that these files are not on the IDEAS site. Please be patient as the files may be large.
Bibliographic InfoPaper provided by National University of Singapore, Department of Economics in its series Departmental Working Papers with number wp0516.
Length: 11 pages
Date of creation: Dec 2005
Date of revision:
Copyright violations; Commercial/Retail piracy; Network externality; Quality;
Find related papers by JEL classification:
- D23 - Microeconomics - - Production and Organizations - - - Organizational Behavior; Transaction Costs; Property Rights
- D43 - Microeconomics - - Market Structure and Pricing - - - Oligopoly and Other Forms of Market Imperfection
- L13 - Industrial Organization - - Market Structure, Firm Strategy, and Market Performance - - - Oligopoly and Other Imperfect Markets
- L86 - Industrial Organization - - Industry Studies: Services - - - Information and Internet Services; Computer Software
This paper has been announced in the following NEP Reports:
- NEP-ALL-2006-01-24 (All new papers)
- NEP-MIC-2006-01-24 (Microeconomics)
- NEP-NET-2006-01-24 (Network Economics)
- NEP-REG-2006-01-24 (Regulation)
Please report citation or reference errors to , or , if you are the registered author of the cited work, log in to your RePEc Author Service profile, click on "citations" and make appropriate adjustments.:
- Kathleen Reavis Conner & Richard P. Rumelt, 1991. "Software Piracy: An Analysis of Protection Strategies," Management Science, INFORMS, vol. 37(2), pages 125-139, February.
- Oz Shy & Jacques-Françlois Thisse, 1999.
"A Strategic Approach to Software Protection,"
Journal of Economics & Management Strategy,
Wiley Blackwell, vol. 8(2), pages 163-190, 06.
- Banerjee, Dyuti S., 2003. "Software piracy: a strategic analysis and policy instruments," International Journal of Industrial Organization, Elsevier, vol. 21(1), pages 97-127, January.
- Takeyama, Lisa N, 1994. "The Welfare Implications of Unauthorized Reproduction of Intellectual Property in the Presence of Demand Network Externalities," Journal of Industrial Economics, Wiley Blackwell, vol. 42(2), pages 155-66, June.
- Joshua Slive & Dan Bernhardt, 1998. "Pirated for Profit," Canadian Journal of Economics, Canadian Economics Association, vol. 31(4), pages 886-899, November.
- Gayer, Amit & Shy, Oz, 2003. "Copyright protection and hardware taxation," Information Economics and Policy, Elsevier, vol. 15(4), pages 467-483, December.
- Peitz, Martin & Waelbroeck, Patrick, 2006. "Piracy of digital products: A critical review of the theoretical literature," Information Economics and Policy, Elsevier, vol. 18(4), pages 449-476, November.
- Yuanzhu Lu & Sougata Poddar, 2012. "Does Reliable Pirated Product Lead to More Piracy?," Working Papers 2012-05, Auckland University of Technology, Department of Economics.
- Yuanzhu Lu & Sougata Poddar, 2009. "Accommodation or Deterrence in the Face of Commercial Piracy: the Impact of Intellectual Property Rights (IPR) Protection," CEMA Working Papers 389, China Economics and Management Academy, Central University of Finance and Economics.
- Francisco Martínez-Sánchez & Javier M. López Cuñat, 2011. "Anti-piracy policy and quality differential in markets for information goods," Working Papers. Serie AD 2011-02, Instituto Valenciano de Investigaciones Económicas, S.A. (Ivie).
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: ().
If references are entirely missing, you can add them using this form.