IDEAS home Printed from https://ideas.repec.org/a/udc/esteco/v29y2002i1p71-88.html
   My bibliography  Save this article

Complementarities and network externalities in casually copied goods

Author

Listed:
  • David Blackburn

Abstract

In this paper, we examine the impacts of casual copying in the market for goods that have strong network externalities and/or are strong complements with goods in another market. By allowing casual copying to occur, the monopolist triggers two effects. The "copying effect" reduces demand (and thus profits) due the introduction of a better outside alternative to consumers. However, a "network augmenting" effect works to increase demand through the larger size of a network that allows copying. We find that if the marginal network externality is large enough, the monopolist will find it profitable to allow some level of casual copying to occur among non-purchasers of the good. And in a simplified dynamic setting, we find that as time passes and the good’s network becomes more mature, the monopolist will seek higher and higher levels of copy protection. This implies that firms in newly formed markets should be more willing to allow copying to occur than those in established markets.

Suggested Citation

  • David Blackburn, 2002. "Complementarities and network externalities in casually copied goods," Estudios de Economia, University of Chile, Department of Economics, vol. 29(1 Year 20), pages 71-88, June.
  • Handle: RePEc:udc:esteco:v:29:y:2002:i:1:p:71-88
    as

    Download full text from publisher

    File URL: http://www.econ.uchile.cl/uploads/publicacion/79b11ad7-992f-4715-bf36-6447497600b8.pdf
    Download Restriction: no
    ---><---

    References listed on IDEAS

    as
    1. Takeyama, Lisa N, 1997. "The Intertemporal Consequences of Unauthorized Reproduction of Intellectual Property," Journal of Law and Economics, University of Chicago Press, vol. 40(2), pages 511-522, October.
    2. Takeyama, Lisa N, 1994. "The Welfare Implications of Unauthorized Reproduction of Intellectual Property in the Presence of Demand Network Externalities," Journal of Industrial Economics, Wiley Blackwell, vol. 42(2), pages 155-166, June.
    3. Bakos, Yannis & Brynjolfsson, Erik & Lichtman, Douglas, 1999. "Shared Information Goods," Journal of Law and Economics, University of Chicago Press, vol. 42(1), pages 117-155, April.
    4. Economides, Nicholas, 1996. "Network externalities, complementarities, and invitations to enter," European Journal of Political Economy, Elsevier, vol. 12(2), pages 211-233, September.
    5. Liebowitz, S J, 1985. "Copying and Indirect Appropriability: Photocopying of Journals," Journal of Political Economy, University of Chicago Press, vol. 93(5), pages 945-957, October.
    6. Katz, Michael L & Shapiro, Carl, 1985. "Network Externalities, Competition, and Compatibility," American Economic Review, American Economic Association, vol. 75(3), pages 424-440, June.
    7. Besen, Stanley M & Kirby, Sheila Nataraj, 1989. "Private Copying, Appropriability, and Optimal Copying Royalties," Journal of Law and Economics, University of Chicago Press, vol. 32(2), pages 255-280, October.
    8. Andrea Shepard, 1987. "Licensing to Enhance Demand for New Technologies," RAND Journal of Economics, The RAND Corporation, vol. 18(3), pages 360-368, Autumn.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Gil Ricard, 2006. "The Economics of IPR Protection Policies," Review of Network Economics, De Gruyter, vol. 5(3), pages 1-21, September.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Liang Guo & Xiangyi Meng, 2015. "Digital Content Provision and Optimal Copyright Protection," Management Science, INFORMS, vol. 61(5), pages 1183-1196, May.
    2. Tunay I. Tunca & Qiong Wu, 2013. "Fighting Fire with Fire: Commercial Piracy and the Role of File Sharing on Copyright Protection Policy for Digital Goods," Information Systems Research, INFORMS, vol. 24(2), pages 436-453, June.
    3. Terrence August & Tunay I. Tunca, 2008. "Let the Pirates Patch? An Economic Analysis of Software Security Patch Restrictions," Information Systems Research, INFORMS, vol. 19(1), pages 48-70, March.
    4. Yoon, Kiho, 2002. "The optimal level of copyright protection," Information Economics and Policy, Elsevier, vol. 14(3), pages 327-348, September.
    5. Rick Harbaugh & Rahul Khemka, 2010. "Does Copyright Enforcement Encourage Piracy?," Journal of Industrial Economics, Wiley Blackwell, vol. 58(2), pages 306-323, June.
    6. Holm, Håkan, 2000. "The Computer Generation's Willingness to Pay for Originals when Pirates are Present – A CV study," Working Papers 2000:9, Lund University, Department of Economics, revised 16 Mar 2001.
    7. Peitz, Martin & Waelbroeck, Patrick, 2006. "Piracy of digital products: A critical review of the theoretical literature," Information Economics and Policy, Elsevier, vol. 18(4), pages 449-476, November.
    8. Martin Peitz & Patrick Waelbroeck, 2005. "An Economist's Guide to Digital Music," CESifo Economic Studies, CESifo Group, vol. 51(2-3), pages 359-428.
    9. Gürtler, Oliver, 2005. "On Strategic Enabling of Product Piracy in the Market for Video Games," Bonn Econ Discussion Papers 36/2005, University of Bonn, Bonn Graduate School of Economics (BGSE).
    10. Ming-Fang Tsai & Jiunn-Rong Chiou, 2012. "Counterfeiting, enforcement and social welfare," Journal of Economics, Springer, vol. 107(1), pages 1-21, September.
    11. Cho, Won-Young & Ahn, Byong-Hun, 2010. "Versioning of information goods under the threat of piracy," Information Economics and Policy, Elsevier, vol. 22(4), pages 332-340, December.
    12. Sanjay Jain, 2008. "Digital Piracy: A Competitive Analysis," Marketing Science, INFORMS, vol. 27(4), pages 610-626, 07-08.
    13. Yeh-ning Chen & Ivan Png, 2003. "Information Goods Pricing and Copyright Enforcement: Welfare Analysis," Information Systems Research, INFORMS, vol. 14(1), pages 107-123, March.
    14. Gürtler, Oliver, 2006. "Software Piracy in the Video Game Market," Bonn Econ Discussion Papers 20/2006, University of Bonn, Bonn Graduate School of Economics (BGSE).
    15. T. S. Raghu & Rajiv Sinha & Ajay Vinze & Orneita Burton, 2009. "Willingness to Pay in an Open Source Software Environment," Information Systems Research, INFORMS, vol. 20(2), pages 218-236, June.
    16. Alan E. Woodfield, 2006. "Piracy Accommodation and the Optimal Timing of Royalty Payments," Working Papers in Economics 06/01, University of Canterbury, Department of Economics and Finance.
    17. Kinokuni, Hiroshi, 2005. "Compensation for copying and bargaining," Information Economics and Policy, Elsevier, vol. 17(3), pages 349-364, July.
    18. Baojun Jiang & Lin Tian, 2018. "Collaborative Consumption: Strategic and Economic Implications of Product Sharing," Management Science, INFORMS, vol. 64(3), pages 1171-1188, March.
    19. David Waterman & Sung Ji & Laura Rochet, 2007. "Enforcement and Control of Piracy, Copying, and Sharing in the Movie Industry," Review of Industrial Organization, Springer;The Industrial Organization Society, vol. 30(4), pages 255-289, June.
    20. Xinyu Hua & Kathryn E. Spier, 2023. "Settling Lawsuits With Pirates," International Economic Review, Department of Economics, University of Pennsylvania and Osaka University Institute of Social and Economic Research Association, vol. 64(2), pages 543-575, May.

    More about this item

    Keywords

    Copy protection; network externalities; indirect network effects; copying; complementarities.;
    All these keywords.

    JEL classification:

    • D42 - Microeconomics - - Market Structure, Pricing, and Design - - - Monopoly
    • L12 - Industrial Organization - - Market Structure, Firm Strategy, and Market Performance - - - Monopoly; Monopolization Strategies
    • D45 - Microeconomics - - Market Structure, Pricing, and Design - - - Rationing; Licensing
    • C72 - Mathematical and Quantitative Methods - - Game Theory and Bargaining Theory - - - Noncooperative Games

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:udc:esteco:v:29:y:2002:i:1:p:71-88. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Verónica Kunze (email available below). General contact details of provider: https://edirc.repec.org/data/deuclcl.html .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.