Network Externality and Commercial Software Piracy
Contrary to the earlier findings under end-users piracy where the existence of strong network externality was shown to be a reason for allowing limited piracy, we find when the piracy is commercial in nature the optimal policy for the original software developer is to protect its product irrespective of the strength of network externality in the software users market.
|Date of creation:||Dec 2005|
|Date of revision:|
|Contact details of provider:|| Web page: http://www.fas.nus.edu.sg/ecs/index.html|
More information through EDIRC
Please report citation or reference errors to , or , if you are the registered author of the cited work, log in to your RePEc Author Service profile, click on "citations" and make appropriate adjustments.:
- SHY, Oz & THISSE, Jacques-François, .
"A strategic approach to software protection,"
CORE Discussion Papers RP
1413, Université catholique de Louvain, Center for Operations Research and Econometrics (CORE).
- Banerjee, Dyuti S., 2003. "Software piracy: a strategic analysis and policy instruments," International Journal of Industrial Organization, Elsevier, vol. 21(1), pages 97-127, January.
- Gayer, Amit & Shy, Oz, 2003. "Copyright protection and hardware taxation," Information Economics and Policy, Elsevier, vol. 15(4), pages 467-483, December.
- Takeyama, Lisa N, 1994. "The Welfare Implications of Unauthorized Reproduction of Intellectual Property in the Presence of Demand Network Externalities," Journal of Industrial Economics, Wiley Blackwell, vol. 42(2), pages 155-66, June.
- Joshua Slive & Dan Bernhardt, 1998. "Pirated for Profit," Canadian Journal of Economics, Canadian Economics Association, vol. 31(4), pages 886-899, November.
- Kathleen Reavis Conner & Richard P. Rumelt, 1991. "Software Piracy: An Analysis of Protection Strategies," Management Science, INFORMS, vol. 37(2), pages 125-139, February.
When requesting a correction, please mention this item's handle: RePEc:nus:nusewp:wp0516. See general information about how to correct material in RePEc.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: ()
If references are entirely missing, you can add them using this form.