IDEAS home Printed from https://ideas.repec.org/p/ecm/ausm04/330.html
   My bibliography  Save this paper

Sensitivity To Tax Revenues and Optimal Anti-piracy Policy Instruments

Author

Listed:
  • D Banerjee

Abstract

Abstract: We examine the effects of a government’s sensitivity to its tax revenues, earned from the software industry, on its anti-piracy policies that consists of monitoring and penalizing a commercial software pirate. We consider a strategic entry-deterrence framework where the original producer chooses a pricing strategy that either allows or deters the pirate’s entry. Sensitivity to tax revenues is a necessary but not a sufficient condition to prevent piracy. Welfare maximization may or may not result in monitoring as the socially optimal outcome. If monitoring is socially optimal then the pirate’s entry is deterred. The equilibrium entry-deterring price may be less than the equilibrium monopoly price. Only in the extreme case the monopoly outcome is restored.

Suggested Citation

  • D Banerjee, 2004. "Sensitivity To Tax Revenues and Optimal Anti-piracy Policy Instruments," Econometric Society 2004 Australasian Meetings 330, Econometric Society.
  • Handle: RePEc:ecm:ausm04:330
    as

    Download full text from publisher

    File URL: http://repec.org/esAUSM04/up.15000.1078454428.pdf
    Download Restriction: no
    ---><---

    References listed on IDEAS

    as
    1. Oz Shy & Jacques‐Françlois Thisse, 1999. "A Strategic Approach to Software Protection," Journal of Economics & Management Strategy, Wiley Blackwell, vol. 8(2), pages 163-190, June.
    2. Banerjee, Dyuti S., 2003. "Software piracy: a strategic analysis and policy instruments," International Journal of Industrial Organization, Elsevier, vol. 21(1), pages 97-127, January.
    3. Fernando Nascimento & Wilfried R. Vanhonacker, 1988. "Optimal Strategic Pricing of Reproducible Consumer Products," Management Science, INFORMS, vol. 34(8), pages 921-937, August.
    4. Takeyama, Lisa N, 1994. "The Welfare Implications of Unauthorized Reproduction of Intellectual Property in the Presence of Demand Network Externalities," Journal of Industrial Economics, Wiley Blackwell, vol. 42(2), pages 155-166, June.
    5. Kathleen Reavis Conner & Richard P. Rumelt, 1991. "Software Piracy: An Analysis of Protection Strategies," Management Science, INFORMS, vol. 37(2), pages 125-139, February.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Banerjee, Dyuti, 2013. "Effect of piracy on innovation in the presence of network externalities," Economic Modelling, Elsevier, vol. 33(C), pages 526-532.
    2. Dyuti S. Banerjee, 2014. "Effectiveness of government anti-piracy enforcement policy: commitment versus non-commitment," Chapters, in: Richard Watt (ed.), Handbook on the Economics of Copyright, chapter 15, pages 264-284, Edward Elgar Publishing.
    3. Banerjee, Dyuti S., 2006. "Lobbying and commercial software piracy," European Journal of Political Economy, Elsevier, vol. 22(1), pages 139-155, March.
    4. Dyuti S. Banerjee & Teyu Chou, 2007. "Copyright Protection And Innovation In The Presence Of Commercial Piracy," Monash Economics Working Papers 05-07, Monash University, Department of Economics.
    5. Tsai, Ming-Fang & Chiou, Jiunn-Rong & Lin, Chun-Hung A., 2012. "A model of counterfeiting: A duopoly approach," Japan and the World Economy, Elsevier, vol. 24(4), pages 283-291.
    6. Dyuti Banerjee & Ahmed Khalid & Jan-Egbert Sturm, 2005. "Socio-economic development and software piracy. An empirical assessment," Applied Economics, Taylor & Francis Journals, vol. 37(18), pages 2091-2097.
    7. Ünlü, Vural & Hess, Thomas, 2003. "The optimal level of technical copyright protection: A game-theoretic approach," Working Papers 9/2003, University of Munich, Munich School of Management, Institute for Information Systems and New Media.
    8. Arun Sundararajan, 2003. "Managing Digital Piracy: Pricing, Protection and Welfare," Law and Economics 0307001, University Library of Munich, Germany.
    9. Sougata Poddar, 2002. "Network Externality and Software Piracy," WIDER Working Paper Series DP2002-115, World Institute for Development Economic Research (UNU-WIDER).
    10. Yeh-ning Chen & Ivan Png, 2003. "Information Goods Pricing and Copyright Enforcement: Welfare Analysis," Information Systems Research, INFORMS, vol. 14(1), pages 107-123, March.
    11. Banerjee, Dyuti S., 2003. "Software piracy: a strategic analysis and policy instruments," International Journal of Industrial Organization, Elsevier, vol. 21(1), pages 97-127, January.
    12. Yuanzhu Lu & Sougata Poddar, 2019. "Limiting End-user Piracy - The Role of Private and Public Anti-Piracy Measure," Annals of Economics and Finance, Society for AEF, vol. 20(1), pages 181-197, May.
    13. Dyuti S. Banerjee & Tanmoyee Banerjee (Chatterjee) & Ajitava Raychaudhuri, 2008. "Optimal Enforcement And Anti‐Copying Strategies To Counter Copyright Infringement," The Japanese Economic Review, Japanese Economic Association, vol. 59(4), pages 519-535, December.
    14. Martin Peitz & Patrick Waelbroeck, 2003. "Piracy of Digital Products: A Critical Review of the Economics Literature," CESifo Working Paper Series 1071, CESifo.
    15. Yuanzhu Lu & Sougata Poddar, 2015. "Strategic Choice of Network Externality," Working Papers 2015-03, Auckland University of Technology, Department of Economics.
    16. Tunay I. Tunca & Qiong Wu, 2013. "Fighting Fire with Fire: Commercial Piracy and the Role of File Sharing on Copyright Protection Policy for Digital Goods," Information Systems Research, INFORMS, vol. 24(2), pages 436-453, June.
    17. Nie, Jiajia & Zhong, Ling & Li, Gendao & Cao, Kuo, 2022. "Piracy as an entry deterrence strategy in software market," European Journal of Operational Research, Elsevier, vol. 298(2), pages 560-572.
    18. T. S. Raghu & Rajiv Sinha & Ajay Vinze & Orneita Burton, 2009. "Willingness to Pay in an Open Source Software Environment," Information Systems Research, INFORMS, vol. 20(2), pages 218-236, June.
    19. Dyuti Banerjee, 2011. "On the sufficiency of regulatory enforcement in combating piracy," Journal of Regulatory Economics, Springer, vol. 40(2), pages 160-176, October.
    20. Peitz, Martin & Waelbroeck, Patrick, 2006. "Piracy of digital products: A critical review of the theoretical literature," Information Economics and Policy, Elsevier, vol. 18(4), pages 449-476, November.

    More about this item

    Keywords

    Keywords:Accommodating strategy; Aggressive strategy; Commercial piracy; Sensitivity factor.;
    All these keywords.

    JEL classification:

    • K42 - Law and Economics - - Legal Procedure, the Legal System, and Illegal Behavior - - - Illegal Behavior and the Enforcement of Law
    • L11 - Industrial Organization - - Market Structure, Firm Strategy, and Market Performance - - - Production, Pricing, and Market Structure; Size Distribution of Firms

    NEP fields

    This paper has been announced in the following NEP Reports:

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:ecm:ausm04:330. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Christopher F. Baum (email available below). General contact details of provider: https://edirc.repec.org/data/essssea.html .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.