3,050 research outputs found

    Risk of Using Pirated Software and its Impact on Software Protection Strategies

    Get PDF
    The software protection strategy of software developer and the inherent risk to end user in using pirated software are two major factors that affect a user’s decision on whether to purchase or pirate a software product. This paper analyzes the optimal protection strategy for software developer in horizontally and vertically differentiated markets. We find that the implementation cost of software protection constitutes the primary factor for software developers to determine their software protection strategies. However, in a vertically differentiated market, the lower quality product should always adopt a non-protection strategy, regardless of the protection implementation cost. In other cases, protection would only be optimal if the protection implementation cost to the software developer is relatively small. These findings are consistent with anecdotal evidence

    Digital Piracy: Theory

    Get PDF
    This article reviews recent theoretical contributions on digital piracy. It starts by elaborating on the reasons for intellectual property protection, by reporting a few facts about copyright protection, and by examining reasons to become a digital pirate. Next, it provides an exploration of the consequences of digital piracy, using a base model and several extensions (with consumer sampling, network effects, and indirect appropriation). A closer look at market-structure implications of end-user piracy is then taken. After a brief review of commercial piracy, additional legal and private responses to end-user piracy are considered. Finally, a quick look at emerging new business models is taken.information good, piracy, copyright, IP protection, internet, peer-to-peer, software, music

    Digital piracy : theory

    Get PDF
    This article reviews recent theoretical contributions on digital piracy. It starts by elaborating on the reasons for intellectual property protection, by reporting a few facts about copyright protection, and by examining reasons to become a digital pirate. Next, it provides an exploration of the consequences of digital piracy, using a base model and several extensions (with consumer sampling, network effects, and indirect appropriation). A closer look at market-structure implications of end-user piracy is then taken. After a brief review of commercial piracy, additional legal and private responses to end-user piracy are considered. Finally, a quick look at emerging new business models is taken.information good, piracy, copyright, IP protection, internet, peer-to-peer, software, music

    Sensitivity To Tax Revenues and Optimal Anti-piracy Policy Instruments

    Get PDF
    Abstract: We examine the effects of a government’s sensitivity to its tax revenues, earned from the software industry, on its anti-piracy policies that consists of monitoring and penalizing a commercial software pirate. We consider a strategic entry-deterrence framework where the original producer chooses a pricing strategy that either allows or deters the pirate’s entry. Sensitivity to tax revenues is a necessary but not a sufficient condition to prevent piracy. Welfare maximization may or may not result in monitoring as the socially optimal outcome. If monitoring is socially optimal then the pirate’s entry is deterred. The equilibrium entry-deterring price may be less than the equilibrium monopoly price. Only in the extreme case the monopoly outcome is restored.Keywords:Accommodating strategy, Aggressive strategy, Commercial piracy, Sensitivity factor.

    Software Piracy in Egypt: Analysis of the Institutional Environment and Efficiency of Enforcement Measures

    Get PDF
    This paper develops the first applied econometric model to examine the efficiency of existing enforcement measures and legal framework on prevailing software piracy rates in Egypt. Hence, it can be used as a tool when discussing new policies concerning the welfare of the interest groups and the pricing of protected software products (i.e., original software products). The model will focus on the available time-series data during 1992-2002 in Egypt. This time period was chosen due to the paucity of quantitative data concerning the model. The institutional environment is examined according to the New Institutional Economics (NIE) to illustrate the legal framework, the informal constraints and the enforcement authorities to support the empirical model. Analytical results show that efficient enforcement of property rights does not only imply increasing legal enforcement through imposing more severe punishments and prosecutions, as decreasing the prices of software plays a much bigger role. Thus relying on legal enforcement authorities alone is not always economically optimal, as it will not be able to deter IPR infringement on its own.Intellectual Property Rights (IPR), Legal Enforcement, New Institutional Economics (NIE), Software Piracy, Egypt

    Accommodation or Deterrence in the Face of Commercial Piracy: the Impact of Intellectual Property Rights (IPR) Protection

    Get PDF
    In this paper, we address the issue of illegal copying or counterfeiting of the original product and Intellectual Property Rights (IPR) protections. The original product developer makes costly investment to deter piracy in a given regime of IPR protection. In the presence of a commercial pirate, we find that it is profitable for the original producer to accommodate the pirate when there is weak IPR protection, and deter when the IPR protection is strong. However, in the comparative statics analysis, we find that there is a non-monotonic relationship between the optimal level of deterrence (chosen by the original producer) and the degree of IPR protection in the economy. The relationship between the rate of piracy and IPR protection is found to be monotonically decreasing whereas the relationship between the rate of piracy and the quality of the pirated product turns out to be non-monotonic. On the other side, from the commercial pirate¡¯s point of view, the most profitable way to survive in the market is to produce a pirated product of moderate quality. Our model also provided a possible explanation of varying piracy rates across countries/regions.Piracy, Copyright violations, Raising rival¡¯s cost, Deterrence, Accommodation, Product quality

    Does Copyright Enforcement Encourage Piracy?

    Get PDF
    More intensive copyright enforcement reduces piracy, raises prices, and lowers consumer surplus. We show that these results do not hold regarding the extent rather than intensity of enforcement. When enforcement is targeted at high-value buyers such as corporate and government users, the copyright holder has an incentive to charge super-monopoly prices, thereby encouraging piracy among low-value buyers. Extending enforcement down the demand curve broadens the copyright holder’s captive market, leading to lower prices and higher sales that can increase both profits and consumer surplus. The standard tradeoff between the incentive to generate intellectual property and the cost of monopoly power is therefore avoided. Private enforcement by copyright holders may be insuciently extensive since consumers can also benefit from more extensive enforcement. Similarly, new technologies which lead to stronger control over illicit use can paradoxically benefit consumers.piracy; internet; intellectual property; copyright protection; super-monopoly pricing

    Piracy of Digital Products: A Critical Review of the Economics Literature

    Get PDF
    Digital products have the property that they can be copied almost costlessly. This makes them candidates for non-commercial copying by final consumers. Because the copy of a copy typically does not deteriorate in quality, copying products can become a wide-spread phenomenon – this can be illustrated by the surge of file-sharing networks. In this paper we provide a critical overview of the literature that addresses the economic consequences of end-user copying. We conclude that some models with network effects are well-suited for the analysis of software copying while other models incorporating the feature that copies provide information about the originals may be useful for the analysis of digital music copying.information good, piracy, copyright, internet, peer-to-peer, software, music
    • …
    corecore