IDEAS home Printed from https://ideas.repec.org/a/eee/ejores/v205y2010i2p437-447.html
   My bibliography  Save this article

Free trial or no free trial: Optimal software product design with network effects

Author

Listed:
  • Cheng, Hsing Kenneth
  • Tang, Qian Candy

Abstract

A common business strategy to promote product adoption in software industry is to provide a free trial version with limited functionalities of the commercial product to increase the installed user base. The increase of user base will lead to higher value of the software because of positive network effects. However, offering a free trial version may cannibalize some demand of the commercial software. This paper examines the tradeoff between network effects and the cannibalization effect, and aims to uncover the conditions under which firms should introduce the free trial product. We find that when network intensity is strong, it is more profitable for a software monopoly to offer free trial than to segment the market with two versions of different qualities. In addition, this paper solves the joint decision problem of finding the optimal quality for the firm's free trial software and the optimal price of its commercial product.

Suggested Citation

  • Cheng, Hsing Kenneth & Tang, Qian Candy, 2010. "Free trial or no free trial: Optimal software product design with network effects," European Journal of Operational Research, Elsevier, vol. 205(2), pages 437-447, September.
  • Handle: RePEc:eee:ejores:v:205:y:2010:i:2:p:437-447
    as

    Download full text from publisher

    File URL: http://www.sciencedirect.com/science/article/pii/S0377-2217(10)00022-6
    Download Restriction: Full text for ScienceDirect subscribers only
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. Oz Shy & Jacques‐Françlois Thisse, 1999. "A Strategic Approach to Software Protection," Journal of Economics & Management Strategy, Wiley Blackwell, vol. 8(2), pages 163-190, June.
    2. Takeyama, Lisa N, 1994. "The Welfare Implications of Unauthorized Reproduction of Intellectual Property in the Presence of Demand Network Externalities," Journal of Industrial Economics, Wiley Blackwell, vol. 42(2), pages 155-166, June.
    3. S. J. Liebowitz & Stephen E. Margolis, 1994. "Network Externality: An Uncommon Tragedy," Journal of Economic Perspectives, American Economic Association, vol. 8(2), pages 133-150, Spring.
    4. Atip Asvanund & Karen Clay & Ramayya Krishnan & Michael D. Smith, 2004. "An Empirical Analysis of Network Externalities in Peer-to-Peer Music-Sharing Networks," Information Systems Research, INFORMS, vol. 15(2), pages 155-174, June.
    5. Kathleen Reavis Conner & Richard P. Rumelt, 1991. "Software Piracy: An Analysis of Protection Strategies," Management Science, INFORMS, vol. 37(2), pages 125-139, February.
    6. Kathleen R. Conner, 1995. "Obtaining Strategic Advantage from Being Imitated: When Can Encouraging "Clones" Pay?," Management Science, INFORMS, vol. 41(2), pages 209-225, February.
    7. Haruvy, Ernan & Prasad, Ashutosh, 1998. "Optimal product strategies in the presence of network externalities," Information Economics and Policy, Elsevier, vol. 10(4), pages 489-499, December.
    8. Erik Brynjolfsson & Chris F. Kemerer, 1996. "Network Externalities in Microcomputer Software: An Econometric Analysis of the Spreadsheet Market," Management Science, INFORMS, vol. 42(12), pages 1627-1647, December.
    9. Geoffrey G. Parker & Marshall W. Van Alstyne, 2000. "Information Complements, Substitutes, and Strategic Product Design," William Davidson Institute Working Papers Series 299, William Davidson Institute at the University of Michigan.
    10. Ernan Haruvy & Ashutosh Prasad, 2001. "Optimal freeware quality in the presence of network externalities: an evolutionary game theoretical approach," Journal of Evolutionary Economics, Springer, vol. 11(2), pages 231-248.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Oz Shy, 2011. "A Short Survey of Network Economics," Review of Industrial Organization, Springer;The Industrial Organization Society, vol. 38(2), pages 119-149, March.
    2. Sanjay Jain, 2008. "Digital Piracy: A Competitive Analysis," Marketing Science, INFORMS, vol. 27(4), pages 610-626, 07-08.
    3. Vendrik, M.C.M. & Hirata, J., 2003. "Experienced versus decision utility of income: relative or absolute happiness," Research Memorandum 039, Maastricht University, Maastricht Research School of Economics of Technology and Organization (METEOR).
    4. Shin-yi Wu & Pei-yu Chen, 2008. "Versioning and Piracy Control for Digital Information Goods," Operations Research, INFORMS, vol. 56(1), pages 157-172, February.
    5. Charles Z. Liu & Chris F. Kemerer & Michael D. Smith, 2007. "Standards Competition In The Presence Of Digital Conversion Technology: An Empirical Analysis Of The Flash Memory Card Market," Working Papers 07-17, NET Institute, revised Sep 2007.
    6. Liang Guo & Xiangyi Meng, 2015. "Digital Content Provision and Optimal Copyright Protection," Management Science, INFORMS, vol. 61(5), pages 1183-1196, May.
    7. Arun Sundararajan, 2004. "Managing Digital Piracy: Pricing and Protection," Information Systems Research, INFORMS, vol. 15(3), pages 287-308, September.
    8. van Kranenburg, H.L. & Hogenbirk, A.E., 2003. "Determinants of multimedia, entertainment, and business software copyright piracy: a cross-national study," Research Memorandum 020, Maastricht University, Maastricht Research School of Economics of Technology and Organization (METEOR).
    9. Martin Peitz & Patrick Waelbroeck, 2005. "An Economist's Guide to Digital Music," CESifo Economic Studies, CESifo Group, vol. 51(2-3), pages 359-428.
    10. Banerjee, Dyuti, 2013. "Effect of piracy on innovation in the presence of network externalities," Economic Modelling, Elsevier, vol. 33(C), pages 526-532.
    11. Peitz, Martin & Waelbroeck, Patrick, 2006. "Why the music industry may gain from free downloading -- The role of sampling," International Journal of Industrial Organization, Elsevier, vol. 24(5), pages 907-913, September.
    12. Ünlü, Vural & Hess, Thomas, 2003. "The optimal level of technical copyright protection: A game-theoretic approach," Working Papers 9/2003, University of Munich, Munich School of Management, Institute for Information Systems and New Media.
    13. Charles Zhechao Liu & Esther Gal-Or & Chris F. Kemerer & Michael D. Smith, 2011. "Compatibility and Proprietary Standards: The Impact of Conversion Technologies in IT Markets with Network Effects," Information Systems Research, INFORMS, vol. 22(1), pages 188-207, March.
    14. Arun Sundararajan, 2003. "Managing Digital Piracy: Pricing, Protection and Welfare," Law and Economics 0307001, University Library of Munich, Germany.
    15. Haruvy, Ernan & Prasad, Ashutosh, 2005. "Freeware as a competitive deterrent," Information Economics and Policy, Elsevier, vol. 17(4), pages 513-534, October.
    16. Fabio Manenti & Ernesto Somma, 2008. "One-Way Compatibility, Two-Way Compatibility and Entry in Network Industries," International Journal of the Economics of Business, Taylor & Francis Journals, vol. 15(3), pages 301-322.
    17. Cho, Won-Young & Ahn, Byong-Hun, 2010. "Versioning of information goods under the threat of piracy," Information Economics and Policy, Elsevier, vol. 22(4), pages 332-340, December.
    18. Sougata Poddar, 2002. "Network Externality and Software Piracy," WIDER Working Paper Series DP2002-115, World Institute for Development Economic Research (UNU-WIDER).
    19. Yeh-ning Chen & Ivan Png, 2003. "Information Goods Pricing and Copyright Enforcement: Welfare Analysis," Information Systems Research, INFORMS, vol. 14(1), pages 107-123, March.
    20. Gürtler, Oliver, 2006. "Software Piracy in the Video Game Market," Bonn Econ Discussion Papers 20/2006, University of Bonn, Bonn Graduate School of Economics (BGSE).

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:eee:ejores:v:205:y:2010:i:2:p:437-447. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Catherine Liu (email available below). General contact details of provider: http://www.elsevier.com/locate/eor .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.