IDEAS home Printed from https://ideas.repec.org/p/bgu/wpaper/0509.html
   My bibliography  Save this paper

Profit Maximization And Social Optimum With Network Externality

Author

Listed:
  • Uriel Spiegel

    (Interdisciplinary Department of Social Sciences, Bar-Ilan University, and Visiting Professor, University of Pennsylvania)

  • Uri Ben-Zion

    (BGU)

  • Tchai Tavor

    (BGU)

Abstract

The paper analyzes the options open to monopoly firms that sell software or internet service. We consider two groups of customers which are different in their reservation prices. The monopoly in general use price discrimination between customers by producing two versions of the product at different prices where the existing low price must be zero for the lower quality product (i.e., free version). The monopoly can sell advertising space to increase its revenue but risk losing customers that are annoyed by advertising. We show that the monopoly has an incentive to increase its output due to the network externality. We also find cases where the maximum profit is consistent with maximum social welfare. This means that no government regulation is needed. The model is consistent with the empirical marketing software product and internet service in the real-world (e.g., Adobe Acrobat).

Suggested Citation

  • Uriel Spiegel & Uri Ben-Zion & Tchai Tavor, 2005. "Profit Maximization And Social Optimum With Network Externality," Working Papers 0509, Ben-Gurion University of the Negev, Department of Economics.
  • Handle: RePEc:bgu:wpaper:0509
    as

    Download full text from publisher

    File URL: https://in.bgu.ac.il/en/humsos/Econ/Workingpapers/0509.pdf
    Download Restriction: no
    ---><---

    References listed on IDEAS

    as
    1. Banerjee, Dyuti S., 2003. "Software piracy: a strategic analysis and policy instruments," International Journal of Industrial Organization, Elsevier, vol. 21(1), pages 97-127, January.
    2. Cabral, Luis M. B. & Salant, David J. & Woroch, Glenn A., 1999. "Monopoly pricing with network externalities," International Journal of Industrial Organization, Elsevier, vol. 17(2), pages 199-214, February.
    3. Farrell, Joseph & Saloner, Garth, 1986. "Installed Base and Compatibility: Innovation, Product Preannouncements, and Predation," American Economic Review, American Economic Association, vol. 76(5), pages 940-955, December.
    4. Liebowitz, S J, 1985. "Copying and Indirect Appropriability: Photocopying of Journals," Journal of Political Economy, University of Chicago Press, vol. 93(5), pages 945-957, October.
    5. Jeffrey Rohlfs, 1974. "A Theory of Interdependent Demand for a Communications Service," Bell Journal of Economics, The RAND Corporation, vol. 5(1), pages 16-37, Spring.
    6. Besen, Stanley M & Kirby, Sheila Nataraj, 1989. "Private Copying, Appropriability, and Optimal Copying Royalties," Journal of Law and Economics, University of Chicago Press, vol. 32(2), pages 255-280, October.
    7. Kathleen Reavis Conner & Richard P. Rumelt, 1991. "Software Piracy: An Analysis of Protection Strategies," Management Science, INFORMS, vol. 37(2), pages 125-139, February.
    8. Katz, Michael L & Shapiro, Carl, 1986. "Technology Adoption in the Presence of Network Externalities," Journal of Political Economy, University of Chicago Press, vol. 94(4), pages 822-841, August.
    9. Novos, Ian E & Waldman, Michael, 1984. "The Effects of Increased Copyright Protection: An Analytic Approach," Journal of Political Economy, University of Chicago Press, vol. 92(2), pages 236-246, April.
    10. Oz Shy & Jacques‐Françlois Thisse, 1999. "A Strategic Approach to Software Protection," Journal of Economics & Management Strategy, Wiley Blackwell, vol. 8(2), pages 163-190, June.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Tunay I. Tunca & Qiong Wu, 2013. "Fighting Fire with Fire: Commercial Piracy and the Role of File Sharing on Copyright Protection Policy for Digital Goods," Information Systems Research, INFORMS, vol. 24(2), pages 436-453, June.
    2. Yeh-ning Chen & Ivan Png, 2003. "Information Goods Pricing and Copyright Enforcement: Welfare Analysis," Information Systems Research, INFORMS, vol. 14(1), pages 107-123, March.
    3. Peitz, Martin & Waelbroeck, Patrick, 2006. "Piracy of digital products: A critical review of the theoretical literature," Information Economics and Policy, Elsevier, vol. 18(4), pages 449-476, November.
    4. Lydia L. Gan & Hian Chye Koh, 2005. "The Profiles of Software Pirates among Tertiary Institutions in Singapore," Economic Growth Centre Working Paper Series 0508, Nanyang Technological University, School of Social Sciences, Economic Growth Centre.
    5. Martin Peitz & Patrick Waelbroeck, 2005. "An Economist's Guide to Digital Music," CESifo Economic Studies, CESifo Group, vol. 51(2-3), pages 359-428.
    6. Terrence August & Tunay I. Tunca, 2008. "Let the Pirates Patch? An Economic Analysis of Software Security Patch Restrictions," Information Systems Research, INFORMS, vol. 19(1), pages 48-70, March.
    7. Cho, Won-Young & Ahn, Byong-Hun, 2010. "Versioning of information goods under the threat of piracy," Information Economics and Policy, Elsevier, vol. 22(4), pages 332-340, December.
    8. Oz Shy, 2011. "A Short Survey of Network Economics," Review of Industrial Organization, Springer;The Industrial Organization Society, vol. 38(2), pages 119-149, March.
    9. Sanjay Jain, 2008. "Digital Piracy: A Competitive Analysis," Marketing Science, INFORMS, vol. 27(4), pages 610-626, 07-08.
    10. Yao, Jen-Te, 2015. "The impact of counterfeit-purchase penalties on anti-counterfeiting under deceptive counterfeiting," Journal of Economics and Business, Elsevier, vol. 80(C), pages 51-61.
    11. T. S. Raghu & Rajiv Sinha & Ajay Vinze & Orneita Burton, 2009. "Willingness to Pay in an Open Source Software Environment," Information Systems Research, INFORMS, vol. 20(2), pages 218-236, June.
    12. Jean-Jacques Herings, P. & Peeters, Ronald & Yang, Michael S., 2010. "Competition against peer-to-peer networks," Information Economics and Policy, Elsevier, vol. 22(4), pages 315-331, December.
    13. Xinyu Hua & Kathryn E. Spier, 2023. "Settling Lawsuits With Pirates," International Economic Review, Department of Economics, University of Pennsylvania and Osaka University Institute of Social and Economic Research Association, vol. 64(2), pages 543-575, May.
    14. Dyuti S. Banerjee & Teyu Chou, 2007. "Copyright Protection And Innovation In The Presence Of Commercial Piracy," Monash Economics Working Papers 05-07, Monash University, Department of Economics.
    15. Yang, S., 2010. "Markets of information goods facing a strong P2P network," Research Memorandum 037, Maastricht University, Maastricht Research School of Economics of Technology and Organization (METEOR).
    16. Banerjee, Dyuti S., 2006. "Lobbying and commercial software piracy," European Journal of Political Economy, Elsevier, vol. 22(1), pages 139-155, March.
    17. Tsai, Ming-Fang & Chiou, Jiunn-Rong & Lin, Chun-Hung A., 2012. "A model of counterfeiting: A duopoly approach," Japan and the World Economy, Elsevier, vol. 24(4), pages 283-291.
    18. Martin Peitz & Patrick Waelbroeck, 2003. "Piracy of Digital Products: A Critical Review of the Economics Literature," CESifo Working Paper Series 1071, CESifo.
    19. Liang Guo & Xiangyi Meng, 2015. "Digital Content Provision and Optimal Copyright Protection," Management Science, INFORMS, vol. 61(5), pages 1183-1196, May.
    20. Yuanzhu Lu & Sougata Poddar, 2015. "Strategic Choice of Network Externality," Working Papers 2015-03, Auckland University of Technology, Department of Economics.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:bgu:wpaper:0509. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Aamer Abu-Qarn (email available below). General contact details of provider: https://edirc.repec.org/data/edbguil.html .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.