1991
DOI: 10.1287/mnsc.37.2.125
|View full text |Cite
|
Sign up to set email alerts
|

Software Piracy: An Analysis of Protection Strategies

Abstract: Software piracy by users is generally believed to harm both software firms (through lower profits) and buying customers (through higher prices). Thus, it is thought that perfect and costless technological protection would benefit both firms and consumers. The model developed here suggests that in some circumstances, even with significant piracy, not protecting can be the best policy, both raising firm profits and lowering selling prices. Key to the analysis is joining the presence of a positive network externa… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
21
0

Year Published

2000
2000
2022
2022

Publication Types

Select...
8
2

Relationship

0
10

Authors

Journals

citations
Cited by 442 publications
(22 citation statements)
references
References 8 publications
1
21
0
Order By: Relevance
“…The institutional context of recorded music consumption is laid out by analysing the copyright from a theoretical (Landes & Posner, 1989; Novos & Waldman, 1984) as well as an applied perspective (Ku, 2002; Liebowitz & Watt, 2006). The former frames the economic discussion on information goods and copying (Johnson, 1985; Varian, 2000, 2005) and introduces the debate on the potential positive effects of infringement: indirect appropriability (Liebowitz, 1985), network externalities (King & Lampe, 2003; Reavis‐Conner & Rumelt, 1991; Takeyama, 1994), bundling (Bakos et al., 1999), and sampling (Gopal et al., 2006). These offset the magnitude of the substitution effect between original and copies and lead to a theoretically ambiguous impact of file sharing (and copyright infringement in general) on revenue and/or profits.…”
Section: Intellectual Structure Of Mcrmentioning
confidence: 99%
“…The institutional context of recorded music consumption is laid out by analysing the copyright from a theoretical (Landes & Posner, 1989; Novos & Waldman, 1984) as well as an applied perspective (Ku, 2002; Liebowitz & Watt, 2006). The former frames the economic discussion on information goods and copying (Johnson, 1985; Varian, 2000, 2005) and introduces the debate on the potential positive effects of infringement: indirect appropriability (Liebowitz, 1985), network externalities (King & Lampe, 2003; Reavis‐Conner & Rumelt, 1991; Takeyama, 1994), bundling (Bakos et al., 1999), and sampling (Gopal et al., 2006). These offset the magnitude of the substitution effect between original and copies and lead to a theoretically ambiguous impact of file sharing (and copyright infringement in general) on revenue and/or profits.…”
Section: Intellectual Structure Of Mcrmentioning
confidence: 99%
“…The problem emerged with the hobbyist home computer [6,7], the use of the personal computer in business [8], and in education [9,10]. While software piracy may be seen to present problems for a software vendor, Conner [11], Katz [12], and Shy and Thisse [13] argue that removing copy protection under certain circumstances, for example due to the strength of the network effect, can be beneficial to the vendor. Furthermore, Darmon et al [14] show that the need for copy protection is reduced for customers that need support services from the software vendor.…”
Section: Software Piracymentioning
confidence: 99%
“…Training provided to health care personnel can have a significant influence on the perceived ease of use and perceived usefulness of EPAMMS. Training can facilitate learning processes, highlighting the relative advantages of technology in order to improve intention to use (Cooner and Rumelt 1991;Robinson et al 2005). One of the most frequently cited barriers to technology use is lack of training (Keil et al 1995).…”
Section: Trainingmentioning
confidence: 99%