IDEAS home Printed from https://ideas.repec.org/a/kap/netnom/v9y2008i2p87-94.html
   My bibliography  Save this article

Competition with clone: an analysis of the role of illegal copy

Author

Listed:
  • Jhung-Soo Hong
  • Jae-Cheol Kim

Abstract

No abstract is available for this item.

Suggested Citation

  • Jhung-Soo Hong & Jae-Cheol Kim, 2008. "Competition with clone: an analysis of the role of illegal copy," Netnomics, Springer, vol. 9(2), pages 87-94, October.
  • Handle: RePEc:kap:netnom:v:9:y:2008:i:2:p:87-94
    DOI: 10.1007/s11066-008-9028-8
    as

    Download full text from publisher

    File URL: http://hdl.handle.net/10.1007/s11066-008-9028-8
    Download Restriction: Access to full text is restricted to subscribers.

    File URL: https://libkey.io/10.1007/s11066-008-9028-8?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. Bae, Sang Hoo & Choi, Jay Pil, 2006. "A model of piracy," Information Economics and Policy, Elsevier, vol. 18(3), pages 303-320, September.
    2. Takeyama, Lisa N, 1997. "The Intertemporal Consequences of Unauthorized Reproduction of Intellectual Property," Journal of Law and Economics, University of Chicago Press, vol. 40(2), pages 511-522, October.
    3. Takeyama, Lisa N, 1994. "The Welfare Implications of Unauthorized Reproduction of Intellectual Property in the Presence of Demand Network Externalities," Journal of Industrial Economics, Wiley Blackwell, vol. 42(2), pages 155-166, June.
    4. Kathleen Reavis Conner & Richard P. Rumelt, 1991. "Software Piracy: An Analysis of Protection Strategies," Management Science, INFORMS, vol. 37(2), pages 125-139, February.
    5. Besen, Stanley M., 1986. "Private copying, reproduction costs, and the supply of intellectual property," Information Economics and Policy, Elsevier, vol. 2(1), pages 5-22.
    6. Yoon, Kiho, 2002. "The optimal level of copyright protection," Information Economics and Policy, Elsevier, vol. 14(3), pages 327-348, September.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Jens Hougaard & Mich Tvede, 2010. "Selling digital music: business models for public goods," Netnomics, Springer, vol. 11(1), pages 85-102, April.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Kinokuni, Hiroshi, 2005. "Compensation for copying and bargaining," Information Economics and Policy, Elsevier, vol. 17(3), pages 349-364, July.
    2. Kinokuni, Hiroshi, 2003. "Copy-protection policies and profitability," Information Economics and Policy, Elsevier, vol. 15(4), pages 521-536, December.
    3. Rasch, Alexander & Wenzel, Tobias, 2013. "Piracy in a two-sided software market," Journal of Economic Behavior & Organization, Elsevier, vol. 88(C), pages 78-89.
    4. Chang, Yang-Ming & Walter, Jason, 2015. "Digital piracy: Price-quality competition between legal firms and P2P network hosts," Information Economics and Policy, Elsevier, vol. 31(C), pages 22-32.
    5. Cho, Won-Young & Ahn, Byong-Hun, 2010. "Versioning of information goods under the threat of piracy," Information Economics and Policy, Elsevier, vol. 22(4), pages 332-340, December.
    6. Yoon, Kiho, 2002. "The optimal level of copyright protection," Information Economics and Policy, Elsevier, vol. 14(3), pages 327-348, September.
    7. Waters, James, 2013. "Pricing information goods with piracy and heterogeneous consumers," MPRA Paper 46918, University Library of Munich, Germany.
    8. Rick Harbaugh & Rahul Khemka, 2010. "Does Copyright Enforcement Encourage Piracy?," Journal of Industrial Economics, Wiley Blackwell, vol. 58(2), pages 306-323, June.
    9. Holm, Håkan, 2000. "The Computer Generation's Willingness to Pay for Originals when Pirates are Present – A CV study," Working Papers 2000:9, Lund University, Department of Economics, revised 16 Mar 2001.
    10. Peitz, Martin & Waelbroeck, Patrick, 2006. "Piracy of digital products: A critical review of the theoretical literature," Information Economics and Policy, Elsevier, vol. 18(4), pages 449-476, November.
    11. Shin-yi Wu & Pei-yu Chen, 2008. "Versioning and Piracy Control for Digital Information Goods," Operations Research, INFORMS, vol. 56(1), pages 157-172, February.
    12. Tsai, Ming-Fang & Chiou, Jiunn-Rong & Lin, Chun-Hung A., 2012. "A model of counterfeiting: A duopoly approach," Japan and the World Economy, Elsevier, vol. 24(4), pages 283-291.
    13. Martin Peitz & Patrick Waelbroeck, 2003. "Piracy of Digital Products: A Critical Review of the Economics Literature," CESifo Working Paper Series 1071, CESifo.
    14. Julie Holland Mortimer, 2007. "Price Discrimination, Copyright Law, and Technological Innovation: Evidence from the Introduction of DVDs," The Quarterly Journal of Economics, President and Fellows of Harvard College, vol. 122(3), pages 1307-1350.
    15. Liang Guo & Xiangyi Meng, 2015. "Digital Content Provision and Optimal Copyright Protection," Management Science, INFORMS, vol. 61(5), pages 1183-1196, May.
    16. William M. Volckmann, 2023. "The effects of market size, wealth, and network effects on digital piracy and profit," European Journal of Law and Economics, Springer, vol. 55(1), pages 61-85, February.
    17. Kogan, Konstantin & Ozinci, Yaacov & Perlman, Yael, 2013. "Containing piracy with product pricing, updating and protection investments," International Journal of Production Economics, Elsevier, vol. 144(2), pages 468-478.
    18. Kresimir Zigic & Jiri Strelicky & Michal Kunin, 2020. "Private and Public IPR Protection in a Vertically Differentiated Software Duopoly," CERGE-EI Working Papers wp671, The Center for Economic Research and Graduate Education - Economics Institute, Prague.
    19. Ünlü, Vural & Hess, Thomas, 2003. "The optimal level of technical copyright protection: A game-theoretic approach," Working Papers 9/2003, University of Munich, Munich School of Management, Institute for Information Systems and New Media.
    20. Tunay I. Tunca & Qiong Wu, 2013. "Fighting Fire with Fire: Commercial Piracy and the Role of File Sharing on Copyright Protection Policy for Digital Goods," Information Systems Research, INFORMS, vol. 24(2), pages 436-453, June.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:kap:netnom:v:9:y:2008:i:2:p:87-94. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Sonal Shukla or Springer Nature Abstracting and Indexing (email available below). General contact details of provider: http://www.springer.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.