IDEAS home Printed from https://ideas.repec.org/p/hhs/lunewp/2000_009.html
   My bibliography  Save this paper

The Computer Generation's Willingness to Pay for Originals when Pirates are Present – A CV study

Author

Listed:
  • Holm, Håkan

    (Department of Economics, Lund University)

Abstract

A contingent valuation method is applied to study subjects' willingness to pay for originals when illegal copies are freely available. The subjects consisted of 234 Swedish undergraduate students from the "computer generation". Only 2% of the "normal" (and 0% of the "elite") students were willing to pay the retail price for the original. However, the majority was prepared to pay a non-negligible amount for the original. Demand curves and profit maximizing behaviors are analyzed. The price elasticity of piracy indicates that piracy is insensitive to price cuts. The results have implications for the calculation of damages of piracy.

Suggested Citation

  • Holm, Håkan, 2000. "The Computer Generation's Willingness to Pay for Originals when Pirates are Present – A CV study," Working Papers 2000:9, Lund University, Department of Economics, revised 16 Mar 2001.
  • Handle: RePEc:hhs:lunewp:2000_009
    as

    Download full text from publisher

    File URL: http://swopec.hhs.se/lunewp/papers/lunewp2000_009.pdf
    File Function: Complete Rendering
    Download Restriction: no
    ---><---

    References listed on IDEAS

    as
    1. Takeyama, Lisa N, 1997. "The Intertemporal Consequences of Unauthorized Reproduction of Intellectual Property," Journal of Law and Economics, University of Chicago Press, vol. 40(2), pages 511-522, October.
    2. Takeyama, Lisa N, 1994. "The Welfare Implications of Unauthorized Reproduction of Intellectual Property in the Presence of Demand Network Externalities," Journal of Industrial Economics, Wiley Blackwell, vol. 42(2), pages 155-166, June.
    3. Johnson, William R, 1985. "The Economics of Copying," Journal of Political Economy, University of Chicago Press, vol. 93(1), pages 158-174, February.
    4. Kathleen Reavis Conner & Richard P. Rumelt, 1991. "Software Piracy: An Analysis of Protection Strategies," Management Science, INFORMS, vol. 37(2), pages 125-139, February.
    5. Novos, Ian E & Waldman, Michael, 1984. "The Effects of Increased Copyright Protection: An Analytic Approach," Journal of Political Economy, University of Chicago Press, vol. 92(2), pages 236-246, April.
    6. Bakos, Yannis & Brynjolfsson, Erik & Lichtman, Douglas, 1999. "Shared Information Goods," Journal of Law and Economics, University of Chicago Press, vol. 42(1), pages 117-155, April.
    7. Paul R. Portney, 1994. "The Contingent Valuation Debate: Why Economists Should Care," Journal of Economic Perspectives, American Economic Association, vol. 8(4), pages 3-17, Fall.
    8. Besen, Stanley M., 1986. "Private copying, reproduction costs, and the supply of intellectual property," Information Economics and Policy, Elsevier, vol. 2(1), pages 5-22.
    9. Liebowitz, S J, 1985. "Copying and Indirect Appropriability: Photocopying of Journals," Journal of Political Economy, University of Chicago Press, vol. 93(5), pages 945-957, October.
    10. Peter A. Diamond & Jerry A. Hausman, 1994. "Contingent Valuation: Is Some Number Better than No Number?," Journal of Economic Perspectives, American Economic Association, vol. 8(4), pages 45-64, Fall.
    11. W. Michael Hanemann, 1994. "Valuing the Environment through Contingent Valuation," Journal of Economic Perspectives, American Economic Association, vol. 8(4), pages 19-43, Fall.
    12. Besen, Stanley M & Kirby, Sheila Nataraj, 1989. "Private Copying, Appropriability, and Optimal Copying Royalties," Journal of Law and Economics, University of Chicago Press, vol. 32(2), pages 255-280, October.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Ünlü, Vural & Hess, Thomas, 2003. "The optimal level of technical copyright protection: A game-theoretic approach," Working Papers 9/2003, University of Munich, Munich School of Management, Institute for Information Systems and New Media.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Yoon, Kiho, 2002. "The optimal level of copyright protection," Information Economics and Policy, Elsevier, vol. 14(3), pages 327-348, September.
    2. Tunay I. Tunca & Qiong Wu, 2013. "Fighting Fire with Fire: Commercial Piracy and the Role of File Sharing on Copyright Protection Policy for Digital Goods," Information Systems Research, INFORMS, vol. 24(2), pages 436-453, June.
    3. Terrence August & Tunay I. Tunca, 2008. "Let the Pirates Patch? An Economic Analysis of Software Security Patch Restrictions," Information Systems Research, INFORMS, vol. 19(1), pages 48-70, March.
    4. Peitz, Martin & Waelbroeck, Patrick, 2006. "Piracy of digital products: A critical review of the theoretical literature," Information Economics and Policy, Elsevier, vol. 18(4), pages 449-476, November.
    5. Yeh-ning Chen & Ivan Png, 2003. "Information Goods Pricing and Copyright Enforcement: Welfare Analysis," Information Systems Research, INFORMS, vol. 14(1), pages 107-123, March.
    6. Gürtler, Oliver, 2006. "Software Piracy in the Video Game Market," Bonn Econ Discussion Papers 20/2006, University of Bonn, Bonn Graduate School of Economics (BGSE).
    7. Kinokuni, Hiroshi, 2005. "Compensation for copying and bargaining," Information Economics and Policy, Elsevier, vol. 17(3), pages 349-364, July.
    8. Xinyu Hua & Kathryn E. Spier, 2023. "Settling Lawsuits With Pirates," International Economic Review, Department of Economics, University of Pennsylvania and Osaka University Institute of Social and Economic Research Association, vol. 64(2), pages 543-575, May.
    9. Gürtler, Oliver, 2005. "On Strategic Enabling of Product Piracy in the Market for Video Games," Bonn Econ Discussion Papers 36/2005, University of Bonn, Bonn Graduate School of Economics (BGSE).
    10. Baojun Jiang & Lin Tian, 2018. "Collaborative Consumption: Strategic and Economic Implications of Product Sharing," Management Science, INFORMS, vol. 64(3), pages 1171-1188, March.
    11. Kinokuni, Hiroshi, 2003. "Copy-protection policies and profitability," Information Economics and Policy, Elsevier, vol. 15(4), pages 521-536, December.
    12. Martin Peitz & Patrick Waelbroeck, 2005. "An Economist's Guide to Digital Music," CESifo Economic Studies, CESifo Group, vol. 51(2-3), pages 359-428.
    13. Cho, Won-Young & Ahn, Byong-Hun, 2010. "Versioning of information goods under the threat of piracy," Information Economics and Policy, Elsevier, vol. 22(4), pages 332-340, December.
    14. Sanjay Jain, 2008. "Digital Piracy: A Competitive Analysis," Marketing Science, INFORMS, vol. 27(4), pages 610-626, 07-08.
    15. Rob, Rafael & Waldfogel, Joel, 2006. "Piracy on the High C's: Music Downloading, Sales Displacement, and Social Welfare in a Sample of College Students," Journal of Law and Economics, University of Chicago Press, vol. 49(1), pages 29-62, April.
    16. Rick Harbaugh & Rahul Khemka, 2010. "Does Copyright Enforcement Encourage Piracy?," Journal of Industrial Economics, Wiley Blackwell, vol. 58(2), pages 306-323, June.
    17. Stan J. Liebowitz & Richard Watt, 2006. "How To Best Ensure Remuneration For Creators In The Market For Music? Copyright And Its Alternatives," Journal of Economic Surveys, Wiley Blackwell, vol. 20(4), pages 513-545, September.
    18. Patrick Legros, 2005. "Art and the Internet: Blessing the Curse?," Levine's Bibliography 666156000000000502, UCLA Department of Economics.
    19. Gayer, Amit & Shy, Oz, 2003. "Copyright protection and hardware taxation," Information Economics and Policy, Elsevier, vol. 15(4), pages 467-483, December.
    20. Martin Peitz & Patrick Waelbroeck, 2003. "Piracy of Digital Products: A Critical Review of the Economics Literature," CESifo Working Paper Series 1071, CESifo.

    More about this item

    Keywords

    Piracy; Contingent Valuation; Damages; Software;
    All these keywords.

    JEL classification:

    • D40 - Microeconomics - - Market Structure, Pricing, and Design - - - General
    • K40 - Law and Economics - - Legal Procedure, the Legal System, and Illegal Behavior - - - General
    • K42 - Law and Economics - - Legal Procedure, the Legal System, and Illegal Behavior - - - Illegal Behavior and the Enforcement of Law
    • L20 - Industrial Organization - - Firm Objectives, Organization, and Behavior - - - General
    • Z10 - Other Special Topics - - Cultural Economics - - - General

    NEP fields

    This paper has been announced in the following NEP Reports:

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:hhs:lunewp:2000_009. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Iker Arregui Alegria (email available below). General contact details of provider: https://edirc.repec.org/data/delunse.html .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.