Digital Piracy: A Competitive Analysis
Author
Abstract
Suggested Citation
DOI: 10.1287/mksc.1070.0313
Download full text from publisher
References listed on IDEAS
- Yuxin Chen & Jinhong Xie, 2007. "Cross-Market Network Effect with Asymmetric Customer Loyalty: Implications for Competitive Advantage," Marketing Science, INFORMS, vol. 26(1), pages 52-66, 01-02.
- Takeyama, Lisa N, 1994. "The Welfare Implications of Unauthorized Reproduction of Intellectual Property in the Presence of Demand Network Externalities," Journal of Industrial Economics, Wiley Blackwell, vol. 42(2), pages 155-166, June.
- Barrett, Alan & Bergin, Adele & Coleman, Kieran & McHale, John & Morgenroth, Edgar & Walsh, John R., 2005. "Budget Perspectives 2006," Research Series, Economic and Social Research Institute (ESRI), number BMI181 edited by Callan, Tim & Doris, Aedin.
- Baohong Sun & Jinhong Xie & H. Henry Cao, 2004. "Product Strategy for Innovators in Markets with Network Effects," Marketing Science, INFORMS, vol. 23(2), pages 243-254, October.
- Johnson, William R, 1985. "The Economics of Copying," Journal of Political Economy, University of Chicago Press, vol. 93(1), pages 158-174, February.
- Greg Shaffer & Z. John Zhang, 1995. "Competitive Coupon Targeting," Marketing Science, INFORMS, vol. 14(4), pages 395-416.
- Kathleen Reavis Conner & Richard P. Rumelt, 1991. "Software Piracy: An Analysis of Protection Strategies," Management Science, INFORMS, vol. 37(2), pages 125-139, February.
- Kathleen R. Conner, 1995. "Obtaining Strategic Advantage from Being Imitated: When Can Encouraging "Clones" Pay?," Management Science, INFORMS, vol. 41(2), pages 209-225, February.
- Png, I P L & Hirshleifer, D, 1987. "Price Discrimination through Offers to Match Price," The Journal of Business, University of Chicago Press, vol. 60(3), pages 365-383, July.
- Hui Kai-Lung & Png Ivan, 2003. "Piracy and the Legitimate Demand for Recorded Music," The B.E. Journal of Economic Analysis & Policy, De Gruyter, vol. 2(1), pages 1-22, September.
- Novos, Ian E & Waldman, Michael, 1984. "The Effects of Increased Copyright Protection: An Analytic Approach," Journal of Political Economy, University of Chicago Press, vol. 92(2), pages 236-246, April.
- Fudenberg, Drew & Tirole, Jean, 1984. "The Fat-Cat Effect, the Puppy-Dog Ploy, and the Lean and Hungry Look," American Economic Review, American Economic Association, vol. 74(2), pages 361-366, May.
- Partha Dasgupta & Eric Maskin, 1986. "The Existence of Equilibrium in Discontinuous Economic Games, I: Theory," The Review of Economic Studies, Review of Economic Studies Ltd, vol. 53(1), pages 1-26.
- Partha Dasgupta & Eric Maskin, 1986. "The Existence of Equilibrium in Discontinuous Economic Games, II: Applications," The Review of Economic Studies, Review of Economic Studies Ltd, vol. 53(1), pages 27-41.
- Oecd, 2005. "New Perspectives on ICT Skills and Employment," OECD Digital Economy Papers 96, OECD Publishing.
- Church, Jeffrey & Gandal, Neil, 1992. "Network Effects, Software Provision, and Standardization," Journal of Industrial Economics, Wiley Blackwell, vol. 40(1), pages 85-103, March.
- Oz Shy & Jacques‐Françlois Thisse, 1999.
"A Strategic Approach to Software Protection,"
Journal of Economics & Management Strategy, Wiley Blackwell, vol. 8(2), pages 163-190, June.
- SHY, Oz & THISSE, Jacques-François, 1999. "A strategic approach to software protection," LIDAM Reprints CORE 1413, Université catholique de Louvain, Center for Operations Research and Econometrics (CORE).
- Liebowitz, S J, 1985. "Copying and Indirect Appropriability: Photocopying of Journals," Journal of Political Economy, University of Chicago Press, vol. 93(5), pages 945-957, October.
- Arun Sundararajan, 2003. "Managing Digital Piracy: Pricing, Protection and Welfare," Law and Economics 0307001, University Library of Munich, Germany.
- Xiaotong Li, 2005. "Cheap Talk and Bogus Network Externalities in the Emerging Technology Market," Marketing Science, INFORMS, vol. 24(4), pages 531-543, October.
- Hal R. Varian, 2005. "Copying and Copyright," Journal of Economic Perspectives, American Economic Association, vol. 19(2), pages 121-138, Spring.
- Martin Peitz, 2004. "A Strategic Approach to Software Protection: Comment," Journal of Economics & Management Strategy, Wiley Blackwell, vol. 13(2), pages 371-374, June.
- Katz, Michael L & Shapiro, Carl, 1985. "Network Externalities, Competition, and Compatibility," American Economic Review, American Economic Association, vol. 75(3), pages 424-440, June.
- Arun Sundararajan, 2004. "Managing Digital Piracy: Pricing and Protection," Information Systems Research, INFORMS, vol. 15(3), pages 287-308, September.
- Besen, Stanley M & Kirby, Sheila Nataraj, 1989. "Private Copying, Appropriability, and Optimal Copying Royalties," Journal of Law and Economics, University of Chicago Press, vol. 32(2), pages 255-280, October.
- Devavrat Purohit, 1994. "What Should You Do When Your Competitors Send in the Clones?," Marketing Science, INFORMS, vol. 13(4), pages 392-411.
- Charles C. Moul, 2006. "—The Day After Tomorrow: Longer Run Issues in Theatrical Exhibition," Marketing Science, INFORMS, vol. 25(6), pages 665-666, 11-12.
- Jinhong Xie & Marvin Sirbu, 1995. "Price Competition and Compatibility in the Presence of Positive Demand Externalities," Management Science, INFORMS, vol. 41(5), pages 909-926, May.
Most related items
These are the items that most often cite the same works as this one and are cited by the same works as this one.- Terrence August & Tunay I. Tunca, 2008. "Let the Pirates Patch? An Economic Analysis of Software Security Patch Restrictions," Information Systems Research, INFORMS, vol. 19(1), pages 48-70, March.
- Peitz, Martin & Waelbroeck, Patrick, 2006. "Piracy of digital products: A critical review of the theoretical literature," Information Economics and Policy, Elsevier, vol. 18(4), pages 449-476, November.
- Tunay I. Tunca & Qiong Wu, 2013. "Fighting Fire with Fire: Commercial Piracy and the Role of File Sharing on Copyright Protection Policy for Digital Goods," Information Systems Research, INFORMS, vol. 24(2), pages 436-453, June.
- Shin-yi Wu & Pei-yu Chen, 2008. "Versioning and Piracy Control for Digital Information Goods," Operations Research, INFORMS, vol. 56(1), pages 157-172, February.
- Liang Guo & Xiangyi Meng, 2015. "Digital Content Provision and Optimal Copyright Protection," Management Science, INFORMS, vol. 61(5), pages 1183-1196, May.
- Nie, Jiajia & Zhong, Ling & Li, Gendao & Cao, Kuo, 2022. "Piracy as an entry deterrence strategy in software market," European Journal of Operational Research, Elsevier, vol. 298(2), pages 560-572.
- Gürtler, Oliver, 2005. "On Strategic Enabling of Product Piracy in the Market for Video Games," Bonn Econ Discussion Papers 36/2005, University of Bonn, Bonn Graduate School of Economics (BGSE).
- Ming-Fang Tsai & Jiunn-Rong Chiou, 2012. "Counterfeiting, enforcement and social welfare," Journal of Economics, Springer, vol. 107(1), pages 1-21, September.
- Yeh-ning Chen & Ivan Png, 2003. "Information Goods Pricing and Copyright Enforcement: Welfare Analysis," Information Systems Research, INFORMS, vol. 14(1), pages 107-123, March.
- Gürtler, Oliver, 2006. "Software Piracy in the Video Game Market," Bonn Econ Discussion Papers 20/2006, University of Bonn, Bonn Graduate School of Economics (BGSE).
- Stan J. Liebowitz & Richard Watt, 2006. "How To Best Ensure Remuneration For Creators In The Market For Music? Copyright And Its Alternatives," Journal of Economic Surveys, Wiley Blackwell, vol. 20(4), pages 513-545, September.
- Baojun Jiang & Lin Tian, 2018. "Collaborative Consumption: Strategic and Economic Implications of Product Sharing," Management Science, INFORMS, vol. 64(3), pages 1171-1188, March.
- Xinyu Hua & Kathryn E. Spier, 2023.
"Settling Lawsuits With Pirates,"
International Economic Review, Department of Economics, University of Pennsylvania and Osaka University Institute of Social and Economic Research Association, vol. 64(2), pages 543-575, May.
- Xinyu Hua & Kathryn E. Spier, 2021. "Settling Lawsuits with Pirates," HKUST CEP Working Papers Series 202104, HKUST Center for Economic Policy.
- Tsai, Ming-Fang & Chiou, Jiunn-Rong & Lin, Chun-Hung A., 2012. "A model of counterfeiting: A duopoly approach," Japan and the World Economy, Elsevier, vol. 24(4), pages 283-291.
- Martin Peitz & Patrick Waelbroeck, 2003. "Piracy of Digital Products: A Critical Review of the Economics Literature," CESifo Working Paper Series 1071, CESifo.
- Martin Peitz & Patrick Waelbroeck, 2005.
"An Economist's Guide to Digital Music,"
CESifo Economic Studies, CESifo Group, vol. 51(2-3), pages 359-428.
- Martin Peitz & Patrick Waelbroeck, 2004. "An Economist’s Guide to Digital Music," CESifo Working Paper Series 1333, CESifo.
- Peitz, Martin & Waelbroeck, Patrick, 2004. "An Economist's Guide to Digital Music," Discussion Paper Series of SFB/TR 15 Governance and the Efficiency of Economic Systems 32, Free University of Berlin, Humboldt University of Berlin, University of Bonn, University of Mannheim, University of Munich.
- Ünlü, Vural & Hess, Thomas, 2003. "The optimal level of technical copyright protection: A game-theoretic approach," Working Papers 9/2003, University of Munich, Munich School of Management, Institute for Information Systems and New Media.
- Cho, Won-Young & Ahn, Byong-Hun, 2010. "Versioning of information goods under the threat of piracy," Information Economics and Policy, Elsevier, vol. 22(4), pages 332-340, December.
- Yoon, Kiho, 2002. "The optimal level of copyright protection," Information Economics and Policy, Elsevier, vol. 14(3), pages 327-348, September.
- Jin-Hyuk Kim, 2008. "Digital Rights Management and Technological Tying," Working Papers 08-05, NET Institute, revised Sep 2008.
More about this item
Keywords
piracy; pricing; innovation; network effects; game theory;All these keywords.
Statistics
Access and download statisticsCorrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:inm:ormksc:v:27:y:2008:i:4:p:610-626. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Chris Asher (email available below). General contact details of provider: https://edirc.repec.org/data/inforea.html .
Please note that corrections may take a couple of weeks to filter through the various RePEc services.