Sensitivity To Tax Revenues and Optimal Anti-piracy Policy Instruments
Author
Abstract
Suggested Citation
Download full text from publisher
References listed on IDEAS
- Oz Shy & Jacques‐Françlois Thisse, 1999.
"A Strategic Approach to Software Protection,"
Journal of Economics & Management Strategy, Wiley Blackwell, vol. 8(2), pages 163-190, June.
- SHY, Oz & THISSE, Jacques-François, 1999. "A strategic approach to software protection," LIDAM Reprints CORE 1413, Université catholique de Louvain, Center for Operations Research and Econometrics (CORE).
- Banerjee, Dyuti S., 2003. "Software piracy: a strategic analysis and policy instruments," International Journal of Industrial Organization, Elsevier, vol. 21(1), pages 97-127, January.
- Fernando Nascimento & Wilfried R. Vanhonacker, 1988. "Optimal Strategic Pricing of Reproducible Consumer Products," Management Science, INFORMS, vol. 34(8), pages 921-937, August.
- Takeyama, Lisa N, 1994. "The Welfare Implications of Unauthorized Reproduction of Intellectual Property in the Presence of Demand Network Externalities," Journal of Industrial Economics, Wiley Blackwell, vol. 42(2), pages 155-166, June.
- Kathleen Reavis Conner & Richard P. Rumelt, 1991. "Software Piracy: An Analysis of Protection Strategies," Management Science, INFORMS, vol. 37(2), pages 125-139, February.
Most related items
These are the items that most often cite the same works as this one and are cited by the same works as this one.- Banerjee, Dyuti, 2013. "Effect of piracy on innovation in the presence of network externalities," Economic Modelling, Elsevier, vol. 33(C), pages 526-532.
- Dyuti S. Banerjee, 2014. "Effectiveness of government anti-piracy enforcement policy: commitment versus non-commitment," Chapters, in: Richard Watt (ed.), Handbook on the Economics of Copyright, chapter 15, pages 264-284, Edward Elgar Publishing.
- Banerjee, Dyuti S., 2006. "Lobbying and commercial software piracy," European Journal of Political Economy, Elsevier, vol. 22(1), pages 139-155, March.
- Dyuti S. Banerjee & Teyu Chou, 2007. "Copyright Protection And Innovation In The Presence Of Commercial Piracy," Monash Economics Working Papers 05-07, Monash University, Department of Economics.
- Tsai, Ming-Fang & Chiou, Jiunn-Rong & Lin, Chun-Hung A., 2012. "A model of counterfeiting: A duopoly approach," Japan and the World Economy, Elsevier, vol. 24(4), pages 283-291.
- Dyuti Banerjee & Ahmed Khalid & Jan-Egbert Sturm, 2005. "Socio-economic development and software piracy. An empirical assessment," Applied Economics, Taylor & Francis Journals, vol. 37(18), pages 2091-2097.
- Ünlü, Vural & Hess, Thomas, 2003. "The optimal level of technical copyright protection: A game-theoretic approach," Working Papers 9/2003, University of Munich, Munich School of Management, Institute for Information Systems and New Media.
- Arun Sundararajan, 2003. "Managing Digital Piracy: Pricing, Protection and Welfare," Law and Economics 0307001, University Library of Munich, Germany.
- Sougata Poddar, 2002. "Network Externality and Software Piracy," WIDER Working Paper Series DP2002-115, World Institute for Development Economic Research (UNU-WIDER).
- Yeh-ning Chen & Ivan Png, 2003. "Information Goods Pricing and Copyright Enforcement: Welfare Analysis," Information Systems Research, INFORMS, vol. 14(1), pages 107-123, March.
- Banerjee, Dyuti S., 2003. "Software piracy: a strategic analysis and policy instruments," International Journal of Industrial Organization, Elsevier, vol. 21(1), pages 97-127, January.
- Yuanzhu Lu & Sougata Poddar, 2019. "Limiting End-user Piracy - The Role of Private and Public Anti-Piracy Measure," Annals of Economics and Finance, Society for AEF, vol. 20(1), pages 181-197, May.
- Dyuti S. Banerjee & Tanmoyee Banerjee (Chatterjee) & Ajitava Raychaudhuri, 2008. "Optimal Enforcement And Anti‐Copying Strategies To Counter Copyright Infringement," The Japanese Economic Review, Japanese Economic Association, vol. 59(4), pages 519-535, December.
- Martin Peitz & Patrick Waelbroeck, 2003. "Piracy of Digital Products: A Critical Review of the Economics Literature," CESifo Working Paper Series 1071, CESifo.
- Yuanzhu Lu & Sougata Poddar, 2015. "Strategic Choice of Network Externality," Working Papers 2015-03, Auckland University of Technology, Department of Economics.
- Tunay I. Tunca & Qiong Wu, 2013. "Fighting Fire with Fire: Commercial Piracy and the Role of File Sharing on Copyright Protection Policy for Digital Goods," Information Systems Research, INFORMS, vol. 24(2), pages 436-453, June.
- Nie, Jiajia & Zhong, Ling & Li, Gendao & Cao, Kuo, 2022. "Piracy as an entry deterrence strategy in software market," European Journal of Operational Research, Elsevier, vol. 298(2), pages 560-572.
- T. S. Raghu & Rajiv Sinha & Ajay Vinze & Orneita Burton, 2009. "Willingness to Pay in an Open Source Software Environment," Information Systems Research, INFORMS, vol. 20(2), pages 218-236, June.
- Dyuti Banerjee, 2011. "On the sufficiency of regulatory enforcement in combating piracy," Journal of Regulatory Economics, Springer, vol. 40(2), pages 160-176, October.
- Peitz, Martin & Waelbroeck, Patrick, 2006. "Piracy of digital products: A critical review of the theoretical literature," Information Economics and Policy, Elsevier, vol. 18(4), pages 449-476, November.
More about this item
Keywords
Keywords:Accommodating strategy; Aggressive strategy; Commercial piracy; Sensitivity factor.;All these keywords.
JEL classification:
- K42 - Law and Economics - - Legal Procedure, the Legal System, and Illegal Behavior - - - Illegal Behavior and the Enforcement of Law
- L11 - Industrial Organization - - Market Structure, Firm Strategy, and Market Performance - - - Production, Pricing, and Market Structure; Size Distribution of Firms
NEP fields
This paper has been announced in the following NEP Reports:- NEP-LAW-2004-10-30 (Law and Economics)
Statistics
Access and download statisticsCorrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:ecm:ausm04:330. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Christopher F. Baum (email available below). General contact details of provider: https://edirc.repec.org/data/essssea.html .
Please note that corrections may take a couple of weeks to filter through the various RePEc services.