Optimal product strategies in the presence of network externalities
No abstract is available for this item.
References listed on IDEAS
Please report citation or reference errors to , or , if you are the registered author of the cited work, log in to your RePEc Author Service profile, click on "citations" and make appropriate adjustments.:
- Takeyama, Lisa N, 1994. "The Welfare Implications of Unauthorized Reproduction of Intellectual Property in the Presence of Demand Network Externalities," Journal of Industrial Economics, Wiley Blackwell, vol. 42(2), pages 155-66, June.
- Choi, Jay Pil, 1994. "Network Externality, Compatibility Choice, and Planned Obsolescence," Journal of Industrial Economics, Wiley Blackwell, vol. 42(2), pages 167-82, June.
- Kathleen Reavis Conner & Richard P. Rumelt, 1991. "Software Piracy: An Analysis of Protection Strategies," Management Science, INFORMS, vol. 37(2), pages 125-139, February.
- Katz, Michael L & Shapiro, Carl, 1985. "Network Externalities, Competition, and Compatibility," American Economic Review, American Economic Association, vol. 75(3), pages 424-40, June.
- Katz, Michael L & Shapiro, Carl, 1986. "Technology Adoption in the Presence of Network Externalities," Journal of Political Economy, University of Chicago Press, vol. 94(4), pages 822-41, August.
- Katz, Michael L & Shapiro, Carl, 1992. "Product Introduction with Network Externalities," Journal of Industrial Economics, Wiley Blackwell, vol. 40(1), pages 55-83, March.
When requesting a correction, please mention this item's handle: RePEc:eee:iepoli:v:10:y:1998:i:4:p:489-499. See general information about how to correct material in RePEc.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: (Shamier, Wendy)
If references are entirely missing, you can add them using this form.