Network Externality and Commercial Software Piracy
Contrary to the earlier findings under end-users piracy where the existence of strong network externality was shown to be a reason for allowing limited piracy, we find when the piracy is commercial in nature the optimal policy for the original software developer is to protect its product irrespective of the strength of network externality in the software users market.
|Date of creation:||Dec 2005|
|Contact details of provider:|| Web page: http://www.fas.nus.edu.sg/ecs/index.html|
More information through EDIRC
References listed on IDEAS
Please report citation or reference errors to , or , if you are the registered author of the cited work, log in to your RePEc Author Service profile, click on "citations" and make appropriate adjustments.:
- Oz Shy & Jacques-Françlois Thisse, 1999.
"A Strategic Approach to Software Protection,"
Journal of Economics & Management Strategy,
Wiley Blackwell, vol. 8(2), pages 163-190, 06.
- Kathleen Reavis Conner & Richard P. Rumelt, 1991. "Software Piracy: An Analysis of Protection Strategies," Management Science, INFORMS, vol. 37(2), pages 125-139, February.
- Gayer, Amit & Shy, Oz, 2003. "Copyright protection and hardware taxation," Information Economics and Policy, Elsevier, vol. 15(4), pages 467-483, December.
- Joshua Slive & Dan Bernhardt, 1998. "Pirated for Profit," Canadian Journal of Economics, Canadian Economics Association, vol. 31(4), pages 886-899, November.
- Takeyama, Lisa N, 1994. "The Welfare Implications of Unauthorized Reproduction of Intellectual Property in the Presence of Demand Network Externalities," Journal of Industrial Economics, Wiley Blackwell, vol. 42(2), pages 155-166, June.
- Banerjee, Dyuti S., 2003. "Software piracy: a strategic analysis and policy instruments," International Journal of Industrial Organization, Elsevier, vol. 21(1), pages 97-127, January.
When requesting a correction, please mention this item's handle: RePEc:nus:nusewp:wp0516. See general information about how to correct material in RePEc.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: ()
If references are entirely missing, you can add them using this form.