Piracy Prevention and the Pricing of Information Goods
This paper develops a simple model of piracy to analyze its effects on prices and welfare and to study the optimal enforcement policy. A monopolist produces an information good (involving a 'large' development cost and a 'small' reproduction cost) that is sold to two groups of consumers differing in their valuation of the good. We distinguish two settings: one in which the monopoly is regulated and one in which it maximizes profits and is not regulated, except that the public authority may be responsible for the control of piracy. We show that copying or piracy might be welfare enhancing because it is a way to 'provide' the good to some individuals (those with a low willingness to pay) without undermining the firm’s ability to finance the development cost via the pricing scheme applied to high valuation consumers. The level of piracy control differs according to the regulatory environment. Three levels of piracy control emerge. The highest is the one chosen by the private monopoly. The next level is the one chosen by the regulated monopoly. The lowest, that can be zero, is the level of control chosen by the public authority when the good is sold (and priced) by a private monopoly.
|Date of creation:||Mar 2006|
|Date of revision:|
|Contact details of provider:|| Postal: |
Phone: 44 - 20 - 7183 8801
Fax: 44 - 20 - 7183 8820
|Order Information:|| Email: |
References listed on IDEAS
Please report citation or reference errors to , or , if you are the registered author of the cited work, log in to your RePEc Author Service profile, click on "citations" and make appropriate adjustments.:
- Paul Belleflamme, 2002. "Pricing Information Goods in the Presence of Copying," Working Papers 463, Queen Mary University of London, School of Economics and Finance.
- Cremer, Helmuth & Laffont, Jean-Jacques, 2003.
"Public goods with costly access,"
Journal of Public Economics,
Elsevier, vol. 87(9-10), pages 1985-2012, September.
- Oz Shy & Jacques-Françlois Thisse, 1999.
"A Strategic Approach to Software Protection,"
Journal of Economics & Management Strategy,
Wiley Blackwell, vol. 8(2), pages 163-190, 06.
- Paul Romer, 2002. "When Should We Use Intellectual Property Rights?," American Economic Review, American Economic Association, vol. 92(2), pages 213-216, May.
- Liebowitz, S J, 1985. "Copying and Indirect Appropriability: Photocopying of Journals," Journal of Political Economy, University of Chicago Press, vol. 93(5), pages 945-57, October.
- Bae, Sang Hoo & Choi, Jay Pil, 2006. "A model of piracy," Information Economics and Policy, Elsevier, vol. 18(3), pages 303-320, September.
- Takeyama, Lisa N, 1994. "The Welfare Implications of Unauthorized Reproduction of Intellectual Property in the Presence of Demand Network Externalities," Journal of Industrial Economics, Wiley Blackwell, vol. 42(2), pages 155-66, June.
- Varian, Hal R, 2000. "Buying, Sharing and Renting Information Goods," Journal of Industrial Economics, Wiley Blackwell, vol. 48(4), pages 473-88, December.
- Besen, Stanley M & Kirby, Sheila Nataraj, 1989. "Private Copying, Appropriability, and Optimal Copying Royalties," Journal of Law and Economics, University of Chicago Press, vol. 32(2), pages 255-80, October.
- Martin Peitz & Patrick Waelbroeck, 2003. "Piracy of Digital Products: A Critical Review of the Economics Literature," CESifo Working Paper Series 1071, CESifo Group Munich.
- Yoon, Kiho, 2002. "The optimal level of copyright protection," Information Economics and Policy, Elsevier, vol. 14(3), pages 327-348, September.
When requesting a correction, please mention this item's handle: RePEc:cpr:ceprdp:5556. See general information about how to correct material in RePEc.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: ()The email address of this maintainer does not seem to be valid anymore. Please ask to update the entry or send us the correct address
If references are entirely missing, you can add them using this form.