Profit Maximization And Social Optimum With Network Externality
Author
Abstract
Suggested Citation
Download full text from publisher
References listed on IDEAS
- Banerjee, Dyuti S., 2003. "Software piracy: a strategic analysis and policy instruments," International Journal of Industrial Organization, Elsevier, vol. 21(1), pages 97-127, January.
- Cabral, Luis M. B. & Salant, David J. & Woroch, Glenn A., 1999.
"Monopoly pricing with network externalities,"
International Journal of Industrial Organization, Elsevier, vol. 17(2), pages 199-214, February.
- Luis Cabral & David Salant & Glenn Woroch, 1994. "Monopoly Pricing With Network Externalities," Industrial Organization 9411003, University Library of Munich, Germany.
- Farrell, Joseph & Saloner, Garth, 1986. "Installed Base and Compatibility: Innovation, Product Preannouncements, and Predation," American Economic Review, American Economic Association, vol. 76(5), pages 940-955, December.
- Liebowitz, S J, 1985. "Copying and Indirect Appropriability: Photocopying of Journals," Journal of Political Economy, University of Chicago Press, vol. 93(5), pages 945-957, October.
- Jeffrey Rohlfs, 1974. "A Theory of Interdependent Demand for a Communications Service," Bell Journal of Economics, The RAND Corporation, vol. 5(1), pages 16-37, Spring.
- Besen, Stanley M & Kirby, Sheila Nataraj, 1989. "Private Copying, Appropriability, and Optimal Copying Royalties," Journal of Law and Economics, University of Chicago Press, vol. 32(2), pages 255-280, October.
- Kathleen Reavis Conner & Richard P. Rumelt, 1991. "Software Piracy: An Analysis of Protection Strategies," Management Science, INFORMS, vol. 37(2), pages 125-139, February.
- Katz, Michael L & Shapiro, Carl, 1986. "Technology Adoption in the Presence of Network Externalities," Journal of Political Economy, University of Chicago Press, vol. 94(4), pages 822-841, August.
- Novos, Ian E & Waldman, Michael, 1984. "The Effects of Increased Copyright Protection: An Analytic Approach," Journal of Political Economy, University of Chicago Press, vol. 92(2), pages 236-246, April.
- Oz Shy & Jacques‐Françlois Thisse, 1999.
"A Strategic Approach to Software Protection,"
Journal of Economics & Management Strategy, Wiley Blackwell, vol. 8(2), pages 163-190, June.
- SHY, Oz & THISSE, Jacques-François, 1999. "A strategic approach to software protection," LIDAM Reprints CORE 1413, Université catholique de Louvain, Center for Operations Research and Econometrics (CORE).
Most related items
These are the items that most often cite the same works as this one and are cited by the same works as this one.- Tunay I. Tunca & Qiong Wu, 2013. "Fighting Fire with Fire: Commercial Piracy and the Role of File Sharing on Copyright Protection Policy for Digital Goods," Information Systems Research, INFORMS, vol. 24(2), pages 436-453, June.
- Yeh-ning Chen & Ivan Png, 2003. "Information Goods Pricing and Copyright Enforcement: Welfare Analysis," Information Systems Research, INFORMS, vol. 14(1), pages 107-123, March.
- Peitz, Martin & Waelbroeck, Patrick, 2006. "Piracy of digital products: A critical review of the theoretical literature," Information Economics and Policy, Elsevier, vol. 18(4), pages 449-476, November.
- Lydia L. Gan & Hian Chye Koh, 2005. "The Profiles of Software Pirates among Tertiary Institutions in Singapore," Economic Growth Centre Working Paper Series 0508, Nanyang Technological University, School of Social Sciences, Economic Growth Centre.
- Martin Peitz & Patrick Waelbroeck, 2005.
"An Economist's Guide to Digital Music,"
CESifo Economic Studies, CESifo Group, vol. 51(2-3), pages 359-428.
- Martin Peitz & Patrick Waelbroeck, 2004. "An Economist’s Guide to Digital Music," CESifo Working Paper Series 1333, CESifo.
- Peitz, Martin & Waelbroeck, Patrick, 2004. "An Economist's Guide to Digital Music," Discussion Paper Series of SFB/TR 15 Governance and the Efficiency of Economic Systems 32, Free University of Berlin, Humboldt University of Berlin, University of Bonn, University of Mannheim, University of Munich.
- Terrence August & Tunay I. Tunca, 2008. "Let the Pirates Patch? An Economic Analysis of Software Security Patch Restrictions," Information Systems Research, INFORMS, vol. 19(1), pages 48-70, March.
- Cho, Won-Young & Ahn, Byong-Hun, 2010. "Versioning of information goods under the threat of piracy," Information Economics and Policy, Elsevier, vol. 22(4), pages 332-340, December.
- Oz Shy, 2011.
"A Short Survey of Network Economics,"
Review of Industrial Organization, Springer;The Industrial Organization Society, vol. 38(2), pages 119-149, March.
- Oz Shy, 2010. "A short survey of network economics," Working Papers 10-3, Federal Reserve Bank of Boston.
- Sanjay Jain, 2008. "Digital Piracy: A Competitive Analysis," Marketing Science, INFORMS, vol. 27(4), pages 610-626, 07-08.
- Yao, Jen-Te, 2015. "The impact of counterfeit-purchase penalties on anti-counterfeiting under deceptive counterfeiting," Journal of Economics and Business, Elsevier, vol. 80(C), pages 51-61.
- T. S. Raghu & Rajiv Sinha & Ajay Vinze & Orneita Burton, 2009. "Willingness to Pay in an Open Source Software Environment," Information Systems Research, INFORMS, vol. 20(2), pages 218-236, June.
- Jean-Jacques Herings, P. & Peeters, Ronald & Yang, Michael S., 2010.
"Competition against peer-to-peer networks,"
Information Economics and Policy, Elsevier, vol. 22(4), pages 315-331, December.
- Herings, P.J.J. & Peeters, R.J.A.P. & Yang, M., 2008. "Competition against peer-to-peer networks," Research Memorandum 020, Maastricht University, Maastricht Research School of Economics of Technology and Organization (METEOR).
- Xinyu Hua & Kathryn E. Spier, 2023.
"Settling Lawsuits With Pirates,"
International Economic Review, Department of Economics, University of Pennsylvania and Osaka University Institute of Social and Economic Research Association, vol. 64(2), pages 543-575, May.
- Xinyu Hua & Kathryn E. Spier, 2021. "Settling Lawsuits with Pirates," HKUST CEP Working Papers Series 202104, HKUST Center for Economic Policy.
- Dyuti S. Banerjee & Teyu Chou, 2007. "Copyright Protection And Innovation In The Presence Of Commercial Piracy," Monash Economics Working Papers 05-07, Monash University, Department of Economics.
- Yang, S., 2010. "Markets of information goods facing a strong P2P network," Research Memorandum 037, Maastricht University, Maastricht Research School of Economics of Technology and Organization (METEOR).
- Banerjee, Dyuti S., 2006. "Lobbying and commercial software piracy," European Journal of Political Economy, Elsevier, vol. 22(1), pages 139-155, March.
- Tsai, Ming-Fang & Chiou, Jiunn-Rong & Lin, Chun-Hung A., 2012. "A model of counterfeiting: A duopoly approach," Japan and the World Economy, Elsevier, vol. 24(4), pages 283-291.
- Martin Peitz & Patrick Waelbroeck, 2003. "Piracy of Digital Products: A Critical Review of the Economics Literature," CESifo Working Paper Series 1071, CESifo.
- Liang Guo & Xiangyi Meng, 2015. "Digital Content Provision and Optimal Copyright Protection," Management Science, INFORMS, vol. 61(5), pages 1183-1196, May.
- Yuanzhu Lu & Sougata Poddar, 2015. "Strategic Choice of Network Externality," Working Papers 2015-03, Auckland University of Technology, Department of Economics.
More about this item
Keywords
Network Externality; Net Advertising; Social Optimum;All these keywords.
Statistics
Access and download statisticsCorrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:bgu:wpaper:0509. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Aamer Abu-Qarn (email available below). General contact details of provider: https://edirc.repec.org/data/edbguil.html .
Please note that corrections may take a couple of weeks to filter through the various RePEc services.