The Interaction between Private and Public IPR Protection in a Software Market: A Positive and Normative Analysis
Two software developers, each offering a product variety of different (exogenously given) quality, compete in prices for heterogeneous users who choose from purchasing a legal version, using an illegal copy, and not using a product at all. Using an illegal version violates intellectual property rights (IPR) and is thus punishable when disclosed. If a developer considers the level of piracy as high, he can introduce protection for his product in the form of restricting support and other services to illegal users. We study the positive and normative implications of the interaction between a regulator's IPR protection and the IPR protection that producers themselves may undertake to protect their IPR against the end users' software piracy. In particular, we aim to establish when the two forms of IPR protections (public and private) act as complements and when as substitutes to each other. Finally, we explore the situations in which there is (or is not) a conflict of interest between the regulator and the developers in this respect.
|Date of creation:||Sep 2013|
|Contact details of provider:|| Postal: P.O. Box 882, Politickych veznu 7, 111 21 Praha 1|
Phone: (+420) 224 005 123
Fax: (+420) 224 005 333
Web page: http://www.cerge-ei.cz
More information through EDIRC
Please report citation or reference errors to , or , if you are the registered author of the cited work, log in to your RePEc Author Service profile, click on "citations" and make appropriate adjustments.:
- Bae, Sang Hoo & Choi, Jay Pil, 2006. "A model of piracy," Information Economics and Policy, Elsevier, vol. 18(3), pages 303-320, September.
- Jean Tirole, 1988. "The Theory of Industrial Organization," MIT Press Books, The MIT Press, edition 1, volume 1, number 0262200716, July.
- Sanjay Jain, 2008. "Digital Piracy: A Competitive Analysis," Marketing Science, INFORMS, vol. 27(4), pages 610-626, 07-08.
- Arun Sundararajan, 2003. "Managing Digital Piracy: Pricing, Protection and Welfare," Law and Economics 0307001, EconWPA.
- Boom, Anette, 2001. "On the Desirability of Compatibility with Product Selection," Journal of Industrial Economics, Wiley Blackwell, vol. 49(1), pages 85-96, March.
- Martin Peitz, 2004. "A Strategic Approach to Software Protection: Comment," Journal of Economics & Management Strategy, Wiley Blackwell, vol. 13(2), pages 371-374, 06.
- Banerjee, Dyuti S., 2003. "Software piracy: a strategic analysis and policy instruments," International Journal of Industrial Organization, Elsevier, vol. 21(1), pages 97-127, January.
- Bulow, Jeremy I & Geanakoplos, John D & Klemperer, Paul D, 1985. "Multimarket Oligopoly: Strategic Substitutes and Complements," Journal of Political Economy, University of Chicago Press, vol. 93(3), pages 488-511, June.
- King, Stephen P. & Lampe, Ryan, 2003. "Network externalities, price discrimination and profitable piracy," Information Economics and Policy, Elsevier, vol. 15(3), pages 271-290, September.
- Dyuti S. Banerjee & Tanmoyee Banerjee (Chatterjee) & Ajitava Raychaudhuri, 2008. "Optimal Enforcement And Anti-Copying Strategies To Counter Copyright Infringement," The Japanese Economic Review, Japanese Economic Association, vol. 59(4), pages 519-535.
- Minniti, Antonio & Vergari, Cecilia, 2010. "Turning Piracy into Profits: a Theoretical Investigation," Information Economics and Policy, Elsevier, vol. 22(4), pages 379-390, December.
- Peitz, Martin & Waldfogel, Joel, 2012. "The Oxford Handbook of the Digital Economy," OUP Catalogue, Oxford University Press, number 9780195397840.
When requesting a correction, please mention this item's handle: RePEc:cer:papers:wp490. See general information about how to correct material in RePEc.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: (Jana Koudelkova)
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
If references are entirely missing, you can add them using this form.
If the full references list an item that is present in RePEc, but the system did not link to it, you can help with this form.
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your profile, as there may be some citations waiting for confirmation.
Please note that corrections may take a couple of weeks to filter through the various RePEc services.