On Strategic Enabling of Product Piracy in the Market for Video Games
In this paper, we consider the market for video games, where some firms are active in both, the market for video games hardware and software. It is puzzling that hardware can be easily made compatible with duplicated (i.e. pirated) software. We ask, whether there exist strategic reasons explaining this puzzle. Firms may, for example, enable software piracy in order to increase their market shares in the hardware market. This will indeed be true, if hardware prices are fixed and the market is completely covered. With endogenous prices, however, price reactions to enabling of product piracy will offset the increase in market shares and copy protection will be set at the highest possible level. If, on the other hand, the market is only partially covered, copy protection will be strategically reduced. In doing so, hardware firms shift reservation prices from the software to the more important hardware market.
|Date of creation:||Nov 2005|
|Date of revision:|
|Contact details of provider:|| Postal: |
Fax: +49 228 73 6884
Web page: http://www.bgse.uni-bonn.de
References listed on IDEAS
Please report citation or reference errors to , or , if you are the registered author of the cited work, log in to your RePEc Author Service profile, click on "citations" and make appropriate adjustments.:
- Varian, Hal R, 2000. "Buying, Sharing and Renting Information Goods," Journal of Industrial Economics, Wiley Blackwell, vol. 48(4), pages 473-88, December.
- Novos, Ian E & Waldman, Michael, 1984. "The Effects of Increased Copyright Protection: An Analytic Approach," Journal of Political Economy, University of Chicago Press, vol. 92(2), pages 236-46, April.
- Oz Shy & Jacques-Françlois Thisse, 1999.
"A Strategic Approach to Software Protection,"
Journal of Economics & Management Strategy,
Wiley Blackwell, vol. 8(2), pages 163-190, 06.
- Steven C. Salop, 1979. "Monopolistic Competition with Outside Goods," Bell Journal of Economics, The RAND Corporation, vol. 10(1), pages 141-156, Spring.
- Bakos, Yannis & Brynjolfsson, Erik & Lichtman, Douglas, 1999. "Shared Information Goods," Journal of Law and Economics, University of Chicago Press, vol. 42(1), pages 117-55, April.
- Johnson, William R, 1985. "The Economics of Copying," Journal of Political Economy, University of Chicago Press, vol. 93(1), pages 158-74, February.
- Economides, Nicholas, 1986. "Minimal and maximal product differentiation in Hotelling's duopoly," Economics Letters, Elsevier, vol. 21(1), pages 67-71.
- Takeyama, Lisa N, 1994. "The Welfare Implications of Unauthorized Reproduction of Intellectual Property in the Presence of Demand Network Externalities," Journal of Industrial Economics, Wiley Blackwell, vol. 42(2), pages 155-66, June.
- Martin Peitz & Patrick Waelbroeck, 2003. "Piracy of Digital Products: A Critical Review of the Economics Literature," CESifo Working Paper Series 1071, CESifo Group Munich.
- d'ASPREMONT, Claude & GABSZEWICZ, Jean J. & THISSE, Jacques-François, .
"On Hotelling's "Stability in competition","
CORE Discussion Papers RP
-385, Université catholique de Louvain, Center for Operations Research and Econometrics (CORE).
- Gayer, Amit & Shy, Oz, 2003. "Internet and peer-to-peer distributions in markets for digital products," Economics Letters, Elsevier, vol. 81(2), pages 197-203, November.
- Martin Peitz, 2004. "A Strategic Approach to Software Protection: Comment," Journal of Economics & Management Strategy, Wiley Blackwell, vol. 13(2), pages 371-374, 06.
- Diana M. Burton & H. Alan Love & Gokhan Ozertan & Curtis R. Taylor, 2005. "Property Rights Protection of Biotechnology Innovations," Journal of Economics & Management Strategy, Wiley Blackwell, vol. 14(4), pages 779-812, December.
- Besen, Stanley M & Kirby, Sheila Nataraj, 1989. "Private Copying, Appropriability, and Optimal Copying Royalties," Journal of Law and Economics, University of Chicago Press, vol. 32(2), pages 255-80, October.
- Liebowitz, S J, 1985. "Copying and Indirect Appropriability: Photocopying of Journals," Journal of Political Economy, University of Chicago Press, vol. 93(5), pages 945-57, October.
- Kathleen Reavis Conner & Richard P. Rumelt, 1991. "Software Piracy: An Analysis of Protection Strategies," Management Science, INFORMS, vol. 37(2), pages 125-139, February.
When requesting a correction, please mention this item's handle: RePEc:bon:bonedp:bgse36_2005. See general information about how to correct material in RePEc.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: (BGSE Office)
If references are entirely missing, you can add them using this form.