The Interaction between Private and Public IPR Protection in a Software Market: A Positive and Normative Analysis
Two software developers, each offering a product variety of different (exogenously given) quality, compete in prices for heterogeneous users who choose from purchasing a legal version, using an illegal copy, and not using a product at all. Using an illegal version violates intellectual property rights (IPR) and is thus punishable when disclosed. If a developer considers the level of piracy as high, he can introduce protection for his product in the form of restricting support and other services to illegal users. We study the positive and normative implications of the interaction between a regulator's IPR protection and the IPR protection that producers themselves may undertake to protect their IPR against the end users' software piracy. In particular, we aim to establish when the two forms of IPR protections (public and private) act as complements and when as substitutes to each other. Finally, we explore the situations in which there is (or is not) a conflict of interest between the regulator and the developers in this respect.
|Date of creation:||Sep 2013|
|Date of revision:|
|Contact details of provider:|| Postal: P.O. Box 882, Politickych veznu 7, 111 21 Praha 1|
Phone: (+420) 224 005 123
Fax: (+420) 224 005 333
Web page: http://www.cerge-ei.cz
More information through EDIRC
References listed on IDEAS
Please report citation or reference errors to , or , if you are the registered author of the cited work, log in to your RePEc Author Service profile, click on "citations" and make appropriate adjustments.:
- Sanjay Jain, 2008. "Digital Piracy: A Competitive Analysis," Marketing Science, INFORMS, vol. 27(4), pages 610-626, 07-08.
- Bae, Sang Hoo & Choi, Jay Pil, 2006. "A model of piracy," Information Economics and Policy, Elsevier, vol. 18(3), pages 303-320, September.
- Peitz, Martin & Waldfogel, Joel, 2012. "The Oxford Handbook of the Digital Economy," OUP Catalogue, Oxford University Press, number 9780195397840, December.
- Dyuti S. Banerjee & Tanmoyee Banerjee (Chatterjee) & Ajitava Raychaudhuri, 2008. "Optimal Enforcement And Anti-Copying Strategies To Counter Copyright Infringement," The Japanese Economic Review, Japanese Economic Association, vol. 59(4), pages 519-535.
- Banerjee, Dyuti S., 2003. "Software piracy: a strategic analysis and policy instruments," International Journal of Industrial Organization, Elsevier, vol. 21(1), pages 97-127, January.
- Martin Peitz, 2004. "A Strategic Approach to Software Protection: Comment," Journal of Economics & Management Strategy, Wiley Blackwell, vol. 13(2), pages 371-374, 06.
- Bulow, Jeremy I & Geanakoplos, John D & Klemperer, Paul D, 1985. "Multimarket Oligopoly: Strategic Substitutes and Complements," Journal of Political Economy, University of Chicago Press, vol. 93(3), pages 488-511, June.
- Jean Tirole, 1988. "The Theory of Industrial Organization," MIT Press Books, The MIT Press, edition 1, volume 1, number 0262200716, December.
- Arun Sundararajan, 2003. "Managing Digital Piracy: Pricing, Protection and Welfare," Law and Economics 0307001, EconWPA.
- Boom, Anette, 2001. "On the Desirability of Compatibility with Product Selection," Journal of Industrial Economics, Wiley Blackwell, vol. 49(1), pages 85-96, March.
- King, Stephen P. & Lampe, Ryan, 2003. "Network externalities, price discrimination and profitable piracy," Information Economics and Policy, Elsevier, vol. 15(3), pages 271-290, September.
- Minniti, Antonio & Vergari, Cecilia, 2010. "Turning Piracy into Profits: a Theoretical Investigation," Information Economics and Policy, Elsevier, vol. 22(4), pages 379-390, December.
When requesting a correction, please mention this item's handle: RePEc:cer:papers:wp490. See general information about how to correct material in RePEc.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: (Jana Koudelkova)
If references are entirely missing, you can add them using this form.