Competition against peer-to-peer networks
In this paper, we consider the competition of a monopolistic provider of information products against a peer-to-peer file-sharing network that offers illegal versions of the products. We focus on the role of direct externalities caused by the P2P file-sharing technology rather than the indirect consumption externalities studied previously in the literature. In our model the market structure is endogenous and we characterize three possible scenarios where the firm uses monopoly pricing, network-deterring pricing, and network-accommodating pricing, respectively. We make a full comparative-static analysis of prices, quantities, profits, consumer surplus and total surplus for each of the scenarios as well as a comparison across scenarios. We show that in the case of network-accommodating pricing, the firm sets a higher price when facing a lower generic cost factor of downloading. Furthermore, in all scenarios, profits for the firm unambiguously decrease when the generic cost factor of downloading declines; total welfare unambiguously increases, however, a result that has implications for intellectual property rights enforcement policy.
References listed on IDEAS
Please report citation or reference errors to , or , if you are the registered author of the cited work, log in to your RePEc Author Service profile, click on "citations" and make appropriate adjustments.:
- Economides, Nicholas, 1996.
"The economics of networks,"
International Journal of Industrial Organization,
Elsevier, vol. 14(6), pages 673-699, October.
- Shy,Oz, 2001.
"The Economics of Network Industries,"
Cambridge University Press, number 9780521805001, May.
- SHY, Oz & THISSE, Jacques-François, "undated".
"A strategic approach to software protection,"
CORE Discussion Papers RP
1413, Université catholique de Louvain, Center for Operations Research and Econometrics (CORE).
- Katz, Michael L & Shapiro, Carl, 1986. "Technology Adoption in the Presence of Network Externalities," Journal of Political Economy, University of Chicago Press, vol. 94(4), pages 822-841, August.
- Nicholas Economides & Charles Himmelberg, 1995. "Critical Mass and Network Size with Application to the US Fax Market," Working Papers 95-11, New York University, Leonard N. Stern School of Business, Department of Economics.
- Nocke, Volker & Peitz, Martin & Stahl, Konrad, 2004.
CEPR Discussion Papers
4657, C.E.P.R. Discussion Papers.
- Volker Nocke & Martin Peitz & Konrad Stahl, 2004. "Platform Ownership," PIER Working Paper Archive 04-029, Penn Institute for Economic Research, Department of Economics, University of Pennsylvania.
- Nocke, Volker & Peitz, Martin & Stahl, Konrad, 2004. "Platform Ownership," Discussion Paper Series of SFB/TR 15 Governance and the Efficiency of Economic Systems 16, Free University of Berlin, Humboldt University of Berlin, University of Bonn, University of Mannheim, University of Munich.
- Takeyama, Lisa N, 1994. "The Welfare Implications of Unauthorized Reproduction of Intellectual Property in the Presence of Demand Network Externalities," Journal of Industrial Economics, Wiley Blackwell, vol. 42(2), pages 155-166, June.
- Gayer, Amit & Shy, Oz, 2003. "Internet and peer-to-peer distributions in markets for digital products," Economics Letters, Elsevier, vol. 81(2), pages 197-203, November.
- Johnson, William R, 1985. "The Economics of Copying," Journal of Political Economy, University of Chicago Press, vol. 93(1), pages 158-174, February.
- Paul Belleflamme, 2002. "Pricing Information Goods in the Presence of Copying," Working Papers 463, Queen Mary University of London, School of Economics and Finance.
- Fudenberg, Drew & Tirole, Jean, 2000. "Pricing a Network Good to Deter Entry," Journal of Industrial Economics, Wiley Blackwell, vol. 48(4), pages 373-390, December.
- Liebowitz, S J, 1985. "Copying and Indirect Appropriability: Photocopying of Journals," Journal of Political Economy, University of Chicago Press, vol. 93(5), pages 945-957, October.
- Bae, Sang Hoo & Choi, Jay Pil, 2006. "A model of piracy," Information Economics and Policy, Elsevier, vol. 18(3), pages 303-320, September.
- Kathleen Reavis Conner & Richard P. Rumelt, 1991. "Software Piracy: An Analysis of Protection Strategies," Management Science, INFORMS, vol. 37(2), pages 125-139, February.
- Katz, Michael L & Shapiro, Carl, 1985. "Network Externalities, Competition, and Compatibility," American Economic Review, American Economic Association, vol. 75(3), pages 424-440, June.
- Peitz, Martin & Waelbroeck, Patrick, 2006. "Piracy of digital products: A critical review of the theoretical literature," Information Economics and Policy, Elsevier, vol. 18(4), pages 449-476, November.
When requesting a correction, please mention this item's handle: RePEc:eee:iepoli:v:22:y:2010:i:4:p:315-331. See general information about how to correct material in RePEc.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: (Shamier, Wendy)
If references are entirely missing, you can add them using this form.