Piracy Prevention and the Pricing of Information Goods
This paper develops a simple model of piracy to analyze its effects on prices and welfare and to study the optimal enforcement policy. A monopolist produces an information good (involving a 'large' development cost and a 'small' reproduction cost) that is sold to two groups of consumers differing in their valuation of the good. We distinguish two settings: one in which the monopoly is regulated and one in which it maximizes profits and is not regulated, except that the public authority may be responsible for the control of piracy. We show that copying or piracy might be welfare enhancing because it is a way to 'provide' the good to some individuals (those with a low willingness to pay) without undermining the firm’s ability to finance the development cost via the pricing scheme applied to high valuation consumers. The level of piracy control differs according to the regulatory environment. Three levels of piracy control emerge. The highest is the one chosen by the private monopoly. The next level is the one chosen by the regulated monopoly. The lowest, that can be zero, is the level of control chosen by the public authority when the good is sold (and priced) by a private monopoly.
If you experience problems downloading a file, check if you have the proper application to view it first. In case of further problems read the IDEAS help page. Note that these files are not on the IDEAS site. Please be patient as the files may be large.
As the access to this document is restricted, you may want to look for a different version under "Related research" (further below) or search for a different version of it.
|Date of creation:||Mar 2006|
|Contact details of provider:|| Postal: Centre for Economic Policy Research, 77 Bastwick Street, London EC1V 3PZ.|
Phone: 44 - 20 - 7183 8801
Fax: 44 - 20 - 7183 8820
|Order Information:|| Email: |
Please report citation or reference errors to , or , if you are the registered author of the cited work, log in to your RePEc Author Service profile, click on "citations" and make appropriate adjustments.:
- Varian, Hal R, 2000. "Buying, Sharing and Renting Information Goods," Journal of Industrial Economics, Wiley Blackwell, vol. 48(4), pages 473-88, December.
- Besen, Stanley M & Kirby, Sheila Nataraj, 1989. "Private Copying, Appropriability, and Optimal Copying Royalties," Journal of Law and Economics, University of Chicago Press, vol. 32(2), pages 255-80, October.
- Takeyama, Lisa N, 1994. "The Welfare Implications of Unauthorized Reproduction of Intellectual Property in the Presence of Demand Network Externalities," Journal of Industrial Economics, Wiley Blackwell, vol. 42(2), pages 155-66, June.
- Martin Peitz & Patrick Waelbroeck, 2003. "Piracy of Digital Products: A Critical Review of the Economics Literature," CESifo Working Paper Series 1071, CESifo Group Munich.
- Paul Romer, 2002. "When Should We Use Intellectual Property Rights?," American Economic Review, American Economic Association, vol. 92(2), pages 213-216, May.
- SHY, Oz & THISSE, Jacques-François, .
"A strategic approach to software protection,"
CORE Discussion Papers RP
1413, Université catholique de Louvain, Center for Operations Research and Econometrics (CORE).
- Bae, Sang Hoo & Choi, Jay Pil, 2006. "A model of piracy," Information Economics and Policy, Elsevier, vol. 18(3), pages 303-320, September.
- Paul Belleflamme, 2002. "Pricing Information Goods in the Presence of Copying," Working Papers 463, Queen Mary University of London, School of Economics and Finance.
- Cremer, Helmuth & Laffont, Jean-Jacques, 2003.
"Public goods with costly access,"
Journal of Public Economics,
Elsevier, vol. 87(9-10), pages 1985-2012, September.
- Liebowitz, S J, 1985. "Copying and Indirect Appropriability: Photocopying of Journals," Journal of Political Economy, University of Chicago Press, vol. 93(5), pages 945-957, October.
- Yoon, Kiho, 2002. "The optimal level of copyright protection," Information Economics and Policy, Elsevier, vol. 14(3), pages 327-348, September.
When requesting a correction, please mention this item's handle: RePEc:cpr:ceprdp:5556. See general information about how to correct material in RePEc.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: ()
If references are entirely missing, you can add them using this form.