On Software Piracy when Piracy is Costly

Size: px
Start display at page:

Download "On Software Piracy when Piracy is Costly"

Transcription

1 Deartment of Economics Working aer No htt://nt.fas.nus.edu.sg/ecs/ub/w/w0309.df n Software iracy when iracy is Costly Sougata oddar August 003 Abstract: The ervasiveness of the illegal coying of software is a worldwide henomenon. However, the level of iracy across various markets as well as across various countries varies a great deal. In some markets (countries), we observe ramant iracy while in some other markets (countries) iracy is rare. In this aer, we develo a simle economic model to exlain both these features when there is one original firm/retailer and one irate in the market. We find out under what condition iracy will take lace. We show that the irate survives in the market, when cost of iracy is not too high, which in turn deends on the legal environment (e.g. the enforcement olicy against the irate) under which the irate oerates; and the irate roduces a coy that is moderately reliable and moderately differentiated from the original roduct available in the market. JEL classifications: D3, D43, L13, L86 Keywords: Software iracy, Raising rival s cost, roduct reliability, roduct differentiation, Cometition 003 Sougata oddar, Deartment of Economics, National University of Singaore, 1 Arts Link, AS Level 6, Singaore , Reublic of Singaore. Tel: (65) ; Fax: (65) ; ecss@nus.edu.sg. I would like to thank the seminar articiants at the Deartment of Economics at NUS, and at the University of Tokyo; the conference articiants at Australian Economic Society Meeting (00), Adelaide, Indian Statistical Institute, Kolkata (003) and EARIE (003), Helsinki for the most helful comments and suggestions. This aer is a art of the research roject titled "Economics of Software iracy" (00). Financial suort from NUS in the form of research grant (R ) is gratefully acknowledged. Views exressed herein are those of the author and do not necessarily reflect the views of the Deartment of Economics, National University of Singaore.

2 1. Introduction The ervasiveness of the illegal coying of software is a worldwide henomenon. It is not only having a rofound effect on the users of the software, but also on the software industry as a whole. It is also having a tremendous effect on the develoment of digital intellectual roerties and technologies. However, the level of iracy across various markets varies a great deal. In some markets, we observe ramant iracy while in some other markets iracy is rare. 1 In this aer, we develo a simle economic model to exlain both these features when there is one original firm/retailer and one irate in the market. We find out under what condition iracy will take lace and when it can be stoed. The basic assumtion we use here is stoing iracy is a costly activity, but if such costly activity is undertaken, it raises the cost of iracy to the irate, which consequently limits/stos iracy. In this aer, we assume the original develoer of the software or the original retailer takes the costly effort to sto/limit iracy. It invests ariori in something that raises the cost of iracy. For examle, before the irate arrives, the original firm may set u an oeration in order to monitor the market so that when the irate comes, it can catch the irate and sto iracy. In other words, setting u an arrangement of monitoring by the original firm raises the cost of iracy to the irate. We cature this notion by assuming that the irate s marginal cost of roducing a coy increases with the monitoring effort of the original develoer. So higher the monitoring level, higher the marginal cost of roducing irated coies. Hence, overall iracy becomes costly with the degree of monitoring arrangement made by the original firm. Secondly, instead of monitoring or in addition to monitoring, the original firm can invest in R&D before, so that it can develo a technology (like utting a rotective device into the software), which increases the cost of coying its software. Now to develo such technology usually costly R&D must be undertaken before. So the idea is, the original firm can increase the cost of irate s activity by investing in something (in terms of setting u the monitoring arrangement and/or doing R&D) before the irate could start its oeration. Since this investment is costly, the question that naturally arises, whether it will be rofitable to the original firm to actually undertake such oeration. And if at all it 1 iracy rates defined as the ratio of the number of irated coies to total installed coies, vary from 5 ercent in US to 94 ercent in Vietnam in the year 001. (Source: IR reort for BSA 00) 1

3 undertakes such oeration, under what circumstances it will be effective. We show that the answers to these questions deend on the overall rofitability of the original firm as well as the irate. Analyzing the model, we are able to exlain, why sometime irates oerate in the market, and why the original firm cannot do anything about it. We also show when the original firm will actually be able to sto iracy successfully. In other words, our analysis works out the condition (i.e. arametric configuration) when there will be a irate in the market and when there will be no irate oerating. The effects of installing rotection device into software as well as monitoring iracy have been analyzed in Chen and ng (1999) and Banerjee (00) among others. Chen and ng (1999) studies how original develoers of the software should set rice and determine enforcement olicy (monitor) in order to sto iracy. They show while monitoring reduces overall usage of the software and hence reduce social welfare, aroriate ricing olicy increases overall usage of the software and society s welfare. So they suggest society should favour dealing with iracy through rice rather than monitoring. n the other hand, Banerjee (00) examines the government s as well as the original firm s role in restricting iracy and shows that welfare maximization results in not monitoring as the socially otimal outcome. He also shows in order to eliminate iracy, rice discrimination and limit ricing are two ossible ricing strategies available to the original firm. In contrast in this aer, we aroach the roblem from a new angle and exlore the ossibility of stoing iracy by the original firm by raising the (rival) irate s cost of roduction. Raising rivals cost of roduction in order to induce its rivals to exit the industry has been studied for the first time by Salo and Scheffman (1983). They focused their study in an industry consisting of a dominant firm and a cometitive fringe, where the low cost dominant firm can cause injury to the rivals by strategically raising the cost of the fringe firms. Interestingly, further studies of this feature (of raising rival s cost) had not been done much in other tye of industries or market structures. The only excetion is vertically related markets. In this aer, we introduce the feature in a simle duooly framework where one cometitor (the original firm) endogenously raises the rival s See Salinger (1988), rdover et al. (1990), Sibley & Wiseman (1998), and Banerjee & Lin (003) for studies on this feature.

4 (irate) cost by undertaking some costly investment in the form of R&D (or arranging to monitor the market) before. We believe aart from the iracy asect of this aer, studying the strategic otion of raising rival s cost in this fashion in a simle duooly model is also a contribution to the literature of strategic entry deterrence. n software iracy, there is also a literature (see Conner and Rumelt (1991), Takeyama (1994), Slive and Bernhardt (1998), Shy and Thisse (1999) among others) which comes u with a fairly general exlanation of the existence of the iracy henomenon. There the argument basically stands on the feature of network externality 3 that is observed in the software user market. They show that when the network effect is strong (i.e. in the resence of high network externality), the original firm will allow (limited) iracy as it turns out to be the more rofitable otion than rotection. In contrast, in this aer, we come out with an alternative exlanation of the existence of software iracy without relying on the feature of network externality at all. 4 In this model, the existence (or non-existence) of iracy comes out as an endogenous outcome of the strategic game between the irate and the original firm under certain arametric configuration. The lan of the aer is as follows. In the next section, we describe the model in detail. In section 3, the main analysis is done, and the main result is derived. Section 4 concludes with some remarks.. The Model.1 The Software Firm and the irate Consider an original software firm and a irate. The irate has the technology to coy the original software. We assume the irate roduces software coies, which may not be as reliable as the original roduct. The robability that a irated software works is q, 3 The idea of network externality stems from the work of Katz and Shairo (1985), (see also Rohlfs 1974, Gandal 1994, and Shy 1996). Generally, the idea is that the utility that a given user derives from some roducts deends uon the number of other users who consume the same roducts. In other words, consumers references are said to exhibit network externality if the utility of each consumer increases with the cumulative number of other consumers urchasing the same brand. When this is the case, each additional urchase raises the value to existing users as well as the exected value to future adoters. A classic examle of a roduct that exhibits such a characteristic is found in the telehone network. 4 If we incororate network externality in our model, it can be shown that the results we obtain here will qualitatively remain unchanged, only the comutations will be little more involving. 3

5 ( 0,1) q and this robability is common knowledge. Therefore q serves as a roxy for the quality of the irated software. Usually irated coies does not come with the suorting services, so one can think even if the irated software is exactly same as the original one (because of digital coing), but the lack of suorting service does not allow the user to get the full value of the irated software, hence quality of the irated software q can also be interreted like this. There are two time eriods, where in the first eriod ( t = 1), the original develoer makes costly arrangement to monitor the market for any future otential irate s activity and/or undertakes some costly R&D in order to make iracy costly technologically. We assume all these costly actions of the original develoer essentially raise the marginal cost of roducing a coy by the irate. The otential irate aears in the market of the original roduct in the second time eriod (t = ). We assume the higher the investment effort by the original software develoer in the first eriod, the higher the marginal cost of coying of the irate. The irate if survives, cometes with the original develoer in rice by ossibly roducing less reliable yet cheaer roducts.. Costs and rofits of the Cometing Firms We assume at t = 1, the cost of investment by the original develoer to increase the marginal cost of the irate by an amount of x is given by ( x) level of deterrence. x c =. Let us call x as the Thus, if the rofit of the software develoer at t = is denoted by π = D is the rice charged by the develoer and rofit of develoer at = 1 t becomes π π c ( x), 5 where D is the demand it faces, then the net x = = π n the other hand, if the irate is in the market at t = then it s rofit function becomes π = ( cx) D, where demand and c is ositive constant ( > 0) is the rice charged by the irate and D is the irate s c exogenously given. c = 0 means iracy is costless or in other words, original firm s investment effort in the earlier eriod has no 5 Assuming the marginal cost of roduction of the software is zero for the original firm. 4

6 effect in deterring iracy. n the other hand, higher c increases the cost of iracy, which says, original firm s investment to sto iracy becomes more effective. We can interret the exogenous cost coefficient c as follows. It can be interreted as strictness of the enforcement olicy against iracy of a articular country. For examle, we can generally find a relatively high c in the develoed countries where iracy is taken as a serious crime; hence it raises the cost of iracy significantly. n the other hand, in most of the develoing countries, we will robably find c to be relatively low, because the enforcement olicies against iracy may not be as strict as the develoed nations, hence cost of iracy would remain relatively small. Thus, c can be interreted as the legal environment where the market oerates..3 Consumer Demand There is a continuum of consumers indexed by X, X [0,1]. A consumer s willingness to ay for the software deends on how much he/she values it measured by X. A high value of X means higher valuation for the software and low value of X means lower valuation for the software. Therefore, one consumer differs from another on the basis of his valuation for the articular software. We assume valuations are uniformly distributed over the interval [ 0,1] and the size of the market is normalized to 1. A consumer s utility function is given as: X if buy original software U = q X 6 if buy irated software 0 if buy none There is no way a consumer can get defected irated software relaced since there is no warranty for the irated software. 7 Hence, the consumer enjoys the benefit of the irated software only with robability q. In the event that the irated software urchased does 6 q X = q (X ) + ( 1 q )( ). If the irated software is not working, consumer does not derive any benefit from the software and instead only incurs a loss equivalent to the amount aid for the irated software. 7 In most markets irates oerate using some makeshift arrangement, if the arted software turns out to be defected, there is no chance of getting software relaced. 5

7 not work at all, the loss to the consumer is the rice aid for it. The original software is fully guaranteed to work and true that are the rices of the original and irated software resectively. It must be >. ( ) can be viewed as the remium a consumer ays for buying guaranteed-to-work software. 3. Analysis 3.1 Deriving Demand of the Software Develoer and the irate D and D can be derived from the distribution of buyers as follows. Figure 1: DISTRIBUTIN F BUYERS None irate riginal 0 Yˆ Xˆ 1 Recall that consumers are heterogeneous with resect to their values towards the software. Thus, the marginal consumer, Xˆ, who is indifferent between buying the original software and the irated version is given by: Xˆ Xˆ = = q Xˆ 1 q The marginal consumer,ŷ, who is indifferent between buying the irated software and not buying any software is: qyˆ Yˆ = = 0 q Thus the demand for original software is: D = ( 1 Xˆ ) = 1 1 q 6

8 Demand for irated software is: D = Xˆ Yˆ q = q( 1 We look for subgame erfect equilibrium of the two eriod game and solve using the usual method of backward induction. Let s first focus on the second eriod of the game. 3. rice Cometition in the roduct Market In the second eriod, if the irate oerates, the two firms engage in a Bertrand rice cometition and choose the rofit maximizing rices of the resective roducts. The rofit function of the irate is: π = ( cx) D = ( cx) q q ( 1 The rofit function of the original firm is: π = D = 1 1 q The reaction functions of the original firm and the irate are as follows. 1 q q cx R ( ) = + ; R ( ) = + Notice that as the original firms uts more investment effort in the first eriod, higher will be x in the second eriod, which means higher will be the marginal cost of coying to the irate. Thus a increase in x (or an increase in the exogenous arameter c ) will shift the reaction function of the irate uward. This will result higher equilibrium rices for both the original firm and the irate. It is easy to see that the original firm will gain from this change in the roduct market cometition stage as it is now charging higher rice while its costs in that eriod remains the same. However, for the irate since the total cost of iracy goes u for this change, the net effect in the change in total rofit remains ambiguous. The ossibility that there could be no real change in rofit or even a decline in rofit of the irate cannot be ruled out. The Nash equilibrium in rices are given by ( + cx q( cx =, = 4 q 4 q Equilibrium demands are given by D = q + cx ( 4 ( 1 ; D 1 cx = 1 4 q q 1 ( ( ) q 7

9 The equilibrium rofits are given by ( (1 + cx) ( 4 ( 1 π = and π = ( q( 1 cx( ) ( 4 q( irate s Decision The irate will be in business as long as it can make ositive rofit, which consequently uts an uer bound restriction on x. Equating π = 0, we get ( 1 ( q xˆ =. c Thus for all x xˆ, the rofit of the irate becomes non-ositive hence, the irate will not oerate, and iracy will be deterred. 3.4 Choice of timal Level of Deterrence by the Software Develoer Now we move on to the first eriod of the game. In this eriod, original firm decides on its otimal choice on the level of x to deter iracy. 1 π = π c x = π x with resect to x. Thus it maximizes its net rofit ( ) Solving, we get the otimal level of deterrence Now given the fact that when deterrence is given by min ( x, xˆ ) x = 4c( 1 ( 4 ( 1 c x = xˆ, the irate stays out; the actual otimal level of. Note that if c = 0 i.e. when the original firm s investment effort has no effect in deterring iracy, the original firm will not choose any investment in the first lace, hence x = 0. x = 0 is also true when the irate roduces exactly the same roduct (i.e. q = 1) as the original firm. When the roduct is same, the original firm s costly investment has no deterring effect at all. So it will not invest in the first lace. 8

10 Aart from the above restriction, to ensure > 0 1 q when c < ( 4 ( x we must have ( 4 q )( 1 > c i.e. = ϕ (say). Hence, the effective range of c for which the above analysis is valid is given by the following. 8 Lemma 1 The otimal level of deterrence x is strictly ositive if and only if < c < ϕ( 0. A necessary condition for the existence of > 0 1 q roof: Note that ( 4 when q = 0 ; which is x is: 0 < < max ( = c ϕ = is decreasing in q. Hence the maximum value is reached. Recall that ( 0,1) q. 3.5 Towards the Main Result Now we would like to see under what condition the otimal level of deterrence x where xˆ is the actual level of deterrence of the irate. This imlies when ( 1 ( 4 q c = c ( q ), (say) xˆ, In other words, when c is more than or equal to c (, the iracy will be stoed. Thus we have the following result. Lemma The original firm will be able to successfully sto iracy if c roof: The maximum value that ( c can attain is (For details see aendix). Hence, for any c , the irate will be out of business and the iracy will be stoed; otherwise we will always observe iracy. 8 Note that this effective restriction is coming on the range of c because our concerned q is less than one. 9

11 Recall, reviously we found that x > 0 for 0 < c < Now we found that the irate may oerate in the market and comete with the original firm as long as c < Thus, the final effective range of c where the analysis of rice cometition between the original develoer and the irate is valid is 0 < c < Thus, we have our main result. Theorem When iracy is costly the original firm will be able to sto iracy when (i).6631 c < ϕ( 0 and (ii) when 0 < < c, the condition for stoing iracy is c c (. 3.6 Economic Interretation Case (i) is obvious in the sense that one, when c is too high (thus the marginal cost becomes too high) for the irate to oerate rofitably. Case (ii) is interesting, as it says whether iracy will be stoed or not deends on the two arameters of the model, the cost coefficient of iracy, that is c (which is in the lefthand side), and the reliability of the irate s roduct that is q, which is combined in the exression c ( ) q (in the right-hand side). Result in (ii) imlies, when cost of iracy is relatively low, then unless the roduct is very unreliable (i.e. q is close to 0) or almost similar to the original roduct (i.e. q is close to 1), there will be iracy (see the exression of c ( ). In this case, the irate can oerate rofitably because first of all, cost of iracy is low and secondly, irate s roduct is moderately reliable (i.e. q is away from zero) and at the same time moderately differentiated (i.e. q is away from one) from the original roduct. This gives enough demand to the irate to oerate rofitably and thus the irate survives. n the other hand, in case (ii) when c is relatively high and the irate s roduct is very unreliable (i.e. q is close to 0) or almost similar to the original roduct (i.e. q is close to 1), the irate cannot oerate rofitably. The reasons are as follows. First of all, in this case, iracy becomes costly, so to cover that cost the irate has to earn enough rofit. cx 10

12 Now when the roduct is very unreliable (i.e. q is close to 0), the demand of the irate becomes very low, as a result irate cannot survive in the market when iracy comes with significant cost. n the other extreme, when its roduct becomes very similar to the original firm s roduct (i.e. q is close to 1), then very tough cometition in rice lowers the irate s rofit significantly. Also note that in the situation when c is relatively high, in the roduct market cometition, the irate cometes with the original firm with a significant cost disadvantage. Thus, in this situation, the irate finds very hard to survive rofitably. 3.7 ther ossible Deterrence When x < xˆ (i.e. otimal level of deterrence is less than the actual deterrence level of the irate), the whether iracy will be actually deterred or not by the original roducer deends on whether entry-deterring monooly rofit of the original roducer is more or less than its accommodating duooly rofit. In this case, the entry deterring monooly rofit of the original roducer is given by ( 1 ( M ( ) ( ˆ) ( ˆ) 1 1 q π xˆ = c x = x = (1) c n the other hand, the accommodating duooly rofit the original roducer is given by 4c( 1 c ( 4 ( 1 ( 4 ( 1 ( 1 ) q ( ) ( 1 ) A c c q π x = ( 4 ) ( 1 ) () q q c roosition When otimal level of deterrence is less than the actual deterrence level of the irate (i.e. x < xˆ ), iracy will be stoed if and only if M ( ) A ( π xˆ > π x ). If the above fails to hold, the original roducer will fail to deter the irate and as a result iracy will take lace anyway. 11

13 4. Discussion on Welfare Here we will try to make a comarison on social welfare in two cases, namely (i) when the irate is out of the market due to successful entry deterrence by the original firm, and (ii) when the original firm is unable to deter the irate. Case (i) corresonds to a monooly situation and it is true when min ( x, xˆ ) Welfare is defined as sum of consumer surlus (CS), industry rofit () minus the cost of deterrence (DC). In this monooly situation, let s say welfare ( 1 ( 1 ( 1 ( 1 = xˆ M W is given by, q 3 1 q W M = CS + DC = + = (3) 8 4 c 8 c Case (ii) corresonds to the duooly situation when the irate is resent and it is true when min ( x, xˆ ) = A M x and ( x ) π ( xˆ ) π >. In this case, total welfare W is given by, 1 W = π + π + CS + CS The following is true. 4c( 1 ( 4 ( 1 c (4) Lemma 3 In the case of successful deterrence, the monooly rice of the original firm roof: See aendix. in the in the duooly case. 1 M = is greater than the rice Thus we have the following: > > which imlies the total consumer surlus M (CS) is higher in the resence of the irate (duooly case) comared to the monooly situation. n the other hand, the total industry rofit in the duooly case is lower than the industry rofit in the monooly case. Finally, ( x) c ˆ in case (i) is greater than ( x ) So comaring (3) and (4) we get, W M W = CS + + DC c in case (ii) as x < xˆ 1

14 From above we get CS < 0, > 0, and DC < 0, so the overall difference is ambiguous. Thus, the overall effect on social welfare due to the resence of the irate is ambiguous. This can be contrasted with a situation when stoing iracy is costless as well as the case when the irate does not face any cost for iracy. In that situation, it is always true that the resence of the irate is social welfare imroving (See oddar 00). But here we find the overall effect on social welfare due to the resence of the irate may not be necessary welfare imroving always. This is mainly because the irate faces a significant deterring cost of iracy while oerating and at the same time resence of monitoring/r&d cost of the original firm may result in lower industry rofit. 5. Conclusion We believe if the main result of this model is interreted likewise (above), it does rovide us a satisfactory exlanation on the economics of software iracy in this framework. We show that the great degree of variance in the incidence of iracy across markets and countries can well be understood through the two exogenous arameters of the model. The first one is c, the cost coefficient, which we interret as the strictness of the enforcement olicy against iracy in a articular country or region i.e. it is the legal environment under which the firms oerate; and the second one is q, the reliability of the irated software roduct that is available in the market. If we have a reasonably good information on these two arameters (or if we can estimate reasonably well about the values) in a articular market, then we can have a reasonably accurate rediction regarding the existence (or non-existence) of software iracy in that market. f course, this is robably a much simlified situation than the real life case; nevertheless, the analysis does give some insights about the henomenon of varying degree of software iracy. We also believe that this exlanation verifies our natural intuition regarding the henomenon when a irate could rofitably survive in the market alongside the original roducer, and when it would fail to do so. 13

15 Reference Banerjee, Dyuti S. (003), Software iracy: A Strategic Analysis and olicy Instruments, International Journal of industrial rganization, Vol 1, Banerjee, S., and Lin,. (003), Downstream R&D, Raising Rivals Cost, and Inut rice Contracts, International Journal of industrial rganization, Vol 1, Chen, Y, and ng, I. (1999), Software ricing and Coyright: Enforcement Against End-Users, SSRN Working aer Series. Conner, K.R., and Rumelt, R.. (1991) Software iracy: An Analysis of rotection Strategies, Management Science, Vol. 37, No, Gandal, N. (1994), Hedonic rice Indexes for Sreadsheets and an Emirical Test of Network Externalities Hyothesis, Rand Journal of Economics, 5, Katz, M. and Shairo, C. (1985), Network Externalities, Cometition and Comatibility, American Economic Review, Vol. 75, No, June. rdover, J., Saloner, G., and Salo, S. C., (1990), Equilibrium Vertical Foreclosure, American Economic Review, 80, ricewaterhousecooers for Business Software Alliance (1998), Contributions of the ackaged Software Industry to the Global Economy, Washington D.C. oddar, S. (00) Software iracy and Welfare in Economics of Software iracy Research Reort, NUS Research Grant R Rohlfs, J. (1974) A Theory of Interdeendent Demand for a Communication Service, Bell Journal of Economics, Vol 8, Salinger, M., (1988), Vertical Mergers and Market Foreclosure, Quarterly Journal of Economics, 77, Shy, z. (1995) Industrial rganization: Theory and Alications, Cambridge: MIT ress. Shy,. and Thisse, J. F. (1999) A Strategic Aroach to Software rotection. Journal of Economics and Management Science, Vol. 8, No., Sibley, D. S. and Weisman, D. L. (1998) Raising Rivals Costs: The Entry of an Ustream Monoolist into Downstream Markets. Information Economics and olicy, Vol. 10, Slive, J. and Bernhardt, D. (1998) irated for rofit. Canadian Journal of Economics, Vol. 31, No. 4,

16 Salo, S. and Scheffman, D. (1983) Raising Rivals Costs, American Economic Review, Vol. 73, Takeyama, L. N. (1994) The Welfare Imlications of Unauthorized Reroduction of Intellectual roerty in the resence of Demand Network Externalities. Journal of Industrial Economics, No., Internet Source 1998, 000, 00 Global Software iracy Reort htt:// Aendix roof of Lemma : Let s denote q( 1 ( 4 as f (. It can be easily shown that for q ( 0,1), f ( attains maximum when q = Hence, the maximum value of f ( is ( ) Now from section 3.5, note that f ( = c ( ( ) Thus maximum value of ( c = This imlies maximum value of c ( = Result follows. roof of Lemma 3: To show M = 1 > = ( 1 + cx 4 q when x = x Above imlies3q > cx After simlification this imlies c 3c ( <. Now since we are under the subcase (i.e. the case of iracy) c c ( Hence, the result follows. <, the above is true. 15

On Software Piracy when Piracy is Costly

On Software Piracy when Piracy is Costly n Software iracy when iracy is Costly Sougata oddar Department of Economics National University of Singapore (NUS 10 Kent Ridge Crescent Singapore 11960 E-mail: ecssp@nus.edu.sg January 004 Abstract The

More information

Piracy and Network Externality An Analysis for the Monopolized Software Industry

Piracy and Network Externality An Analysis for the Monopolized Software Industry Piracy and Network Externality An Analysis for the Monoolized Software Industry Ming Chung Chang Deartment of Economics and Graduate Institute of Industrial Economics mcchang@mgt.ncu.edu.tw Chiu Fen Lin

More information

How To Understand The Economic Theory Of Piracy

How To Understand The Economic Theory Of Piracy Department of Economics Working aper No. 0515 http://nt.fas.nus.edu.sg/ecs/pub/wp/wp0515.pdf Why Software iracy Rates Differ A Theoretical Analysis by Sougata oddar 005 Sougata oddar. Views expressed herein

More information

A Simple Model of Pricing, Markups and Market. Power Under Demand Fluctuations

A Simple Model of Pricing, Markups and Market. Power Under Demand Fluctuations A Simle Model of Pricing, Markus and Market Power Under Demand Fluctuations Stanley S. Reynolds Deartment of Economics; University of Arizona; Tucson, AZ 85721 Bart J. Wilson Economic Science Laboratory;

More information

THE WELFARE IMPLICATIONS OF COSTLY MONITORING IN THE CREDIT MARKET: A NOTE

THE WELFARE IMPLICATIONS OF COSTLY MONITORING IN THE CREDIT MARKET: A NOTE The Economic Journal, 110 (Aril ), 576±580.. Published by Blackwell Publishers, 108 Cowley Road, Oxford OX4 1JF, UK and 50 Main Street, Malden, MA 02148, USA. THE WELFARE IMPLICATIONS OF COSTLY MONITORING

More information

Discussion Paper No. 2002/115 Network Externality and Software Piracy. Sougata Poddar *

Discussion Paper No. 2002/115 Network Externality and Software Piracy. Sougata Poddar * Discussion Paper No. 00/5 Network Externality and Software Piracy Sougata Poddar * December 00 Abstract The pervasiveness of the illegal copying of software is a worldwide phenomenon. Software piracy implies

More information

Joint Production and Financing Decisions: Modeling and Analysis

Joint Production and Financing Decisions: Modeling and Analysis Joint Production and Financing Decisions: Modeling and Analysis Xiaodong Xu John R. Birge Deartment of Industrial Engineering and Management Sciences, Northwestern University, Evanston, Illinois 60208,

More information

An important observation in supply chain management, known as the bullwhip effect,

An important observation in supply chain management, known as the bullwhip effect, Quantifying the Bullwhi Effect in a Simle Suly Chain: The Imact of Forecasting, Lead Times, and Information Frank Chen Zvi Drezner Jennifer K. Ryan David Simchi-Levi Decision Sciences Deartment, National

More information

Large firms and heterogeneity: the structure of trade and industry under oligopoly

Large firms and heterogeneity: the structure of trade and industry under oligopoly Large firms and heterogeneity: the structure of trade and industry under oligooly Eddy Bekkers University of Linz Joseh Francois University of Linz & CEPR (London) ABSTRACT: We develo a model of trade

More information

Economics 431 Fall 2003 2nd midterm Answer Key

Economics 431 Fall 2003 2nd midterm Answer Key Economics 431 Fall 2003 2nd midterm Answer Key 1) (20 oints) Big C cable comany has a local monooly in cable TV (good 1) and fast Internet (good 2). Assume that the marginal cost of roducing either good

More information

Working paper No: 23/2011 May 2011 LSE Health. Sotiris Vandoros, Katherine Grace Carman. Demand and Pricing of Preventative Health Care

Working paper No: 23/2011 May 2011 LSE Health. Sotiris Vandoros, Katherine Grace Carman. Demand and Pricing of Preventative Health Care Working aer o: 3/0 May 0 LSE Health Sotiris Vandoros, Katherine Grace Carman Demand and Pricing of Preventative Health Care Demand and Pricing of Preventative Healthcare Sotiris Vandoros, Katherine Grace

More information

Multiperiod Portfolio Optimization with General Transaction Costs

Multiperiod Portfolio Optimization with General Transaction Costs Multieriod Portfolio Otimization with General Transaction Costs Victor DeMiguel Deartment of Management Science and Oerations, London Business School, London NW1 4SA, UK, avmiguel@london.edu Xiaoling Mei

More information

How To Determine Rice Discrimination

How To Determine Rice Discrimination Price Discrimination in the Digital Economy Drew Fudenberg (Harvard University) J. Miguel Villas-Boas (University of California, Berkeley) May 2012 ABSTRACT With the develoments in information technology

More information

Interbank Market and Central Bank Policy

Interbank Market and Central Bank Policy Federal Reserve Bank of New York Staff Reorts Interbank Market and Central Bank Policy Jung-Hyun Ahn Vincent Bignon Régis Breton Antoine Martin Staff Reort No. 763 January 206 This aer resents reliminary

More information

Penalty Interest Rates, Universal Default, and the Common Pool Problem of Credit Card Debt

Penalty Interest Rates, Universal Default, and the Common Pool Problem of Credit Card Debt Penalty Interest Rates, Universal Default, and the Common Pool Problem of Credit Card Debt Lawrence M. Ausubel and Amanda E. Dawsey * February 2009 Preliminary and Incomlete Introduction It is now reasonably

More information

Asymmetric Information, Transaction Cost, and. Externalities in Competitive Insurance Markets *

Asymmetric Information, Transaction Cost, and. Externalities in Competitive Insurance Markets * Asymmetric Information, Transaction Cost, and Externalities in Cometitive Insurance Markets * Jerry W. iu Deartment of Finance, University of Notre Dame, Notre Dame, IN 46556-5646 wliu@nd.edu Mark J. Browne

More information

Digital goods lend themselves to versioning but also suffer from piracy losses. This paper develops a pricing

Digital goods lend themselves to versioning but also suffer from piracy losses. This paper develops a pricing Information Systems Research Vol. 16, No. 4, December 2005,. 400 417 issn 1047-7047 eissn 1526-5536 05 1604 0400 informs doi 10.1287/isre.1050.0069 2005 INFORMS Managing Piracy: Pricing and Samling Strategies

More information

Two-resource stochastic capacity planning employing a Bayesian methodology

Two-resource stochastic capacity planning employing a Bayesian methodology Journal of the Oerational Research Society (23) 54, 1198 128 r 23 Oerational Research Society Ltd. All rights reserved. 16-5682/3 $25. www.algrave-journals.com/jors Two-resource stochastic caacity lanning

More information

European Journal of Operational Research

European Journal of Operational Research Euroean Journal of Oerational Research 15 (011) 730 739 Contents lists available at ScienceDirect Euroean Journal of Oerational Research journal homeage: www.elsevier.com/locate/ejor Interfaces with Other

More information

Sang Hoo Bae Department of Economics Clark University 950 Main Street Worcester, MA 01610-1477 508.793.7101 sbae@clarku.edu

Sang Hoo Bae Department of Economics Clark University 950 Main Street Worcester, MA 01610-1477 508.793.7101 sbae@clarku.edu Outsourcing with Quality Cometition: Insights from a Three Stage Game Theoretic Model Sang Hoo ae Deartment of Economics Clark University 950 Main Street Worcester, M 01610-1477 508.793.7101 sbae@clarku.edu

More information

X How to Schedule a Cascade in an Arbitrary Graph

X How to Schedule a Cascade in an Arbitrary Graph X How to Schedule a Cascade in an Arbitrary Grah Flavio Chierichetti, Cornell University Jon Kleinberg, Cornell University Alessandro Panconesi, Saienza University When individuals in a social network

More information

Intellectual Property Right Protection in the Software Market

Intellectual Property Right Protection in the Software Market Intellectual Property Right Protection in the Software Market Yasuhiro Arai Aomori Public College 153-4, Yamazaki, Goushizawa, Aomori-city, Aomori 030-0196, Japan March 01 Abstract We discuss the software

More information

The Economics of the Cloud: Price Competition and Congestion

The Economics of the Cloud: Price Competition and Congestion Submitted to Oerations Research manuscrit The Economics of the Cloud: Price Cometition and Congestion Jonatha Anselmi Basque Center for Alied Mathematics, jonatha.anselmi@gmail.com Danilo Ardagna Di. di

More information

Risk in Revenue Management and Dynamic Pricing

Risk in Revenue Management and Dynamic Pricing OPERATIONS RESEARCH Vol. 56, No. 2, March Aril 2008,. 326 343 issn 0030-364X eissn 1526-5463 08 5602 0326 informs doi 10.1287/ore.1070.0438 2008 INFORMS Risk in Revenue Management and Dynamic Pricing Yuri

More information

A joint initiative of Ludwig-Maximilians University s Center for Economic Studies and the Ifo Institute for Economic Research

A joint initiative of Ludwig-Maximilians University s Center for Economic Studies and the Ifo Institute for Economic Research A joint initiative of Ludwig-Maximilians University s Center for Economic Studies and the Ifo Institute for Economic Research Area Conference on Alied Microeconomics - 2 March 20 CESifo Conference Centre,

More information

Cash-in-the-Market Pricing and Optimal Bank Bailout Policy 1

Cash-in-the-Market Pricing and Optimal Bank Bailout Policy 1 Cash-in-the-Maret Pricing and Otimal Ban Bailout Policy 1 Viral V. Acharya 2 London Business School and CEPR Tanju Yorulmazer 3 Ban of England J.E.L. Classification: G21, G28, G38, E58, D62. Keywords:

More information

Risk and Return. Sample chapter. e r t u i o p a s d f CHAPTER CONTENTS LEARNING OBJECTIVES. Chapter 7

Risk and Return. Sample chapter. e r t u i o p a s d f CHAPTER CONTENTS LEARNING OBJECTIVES. Chapter 7 Chater 7 Risk and Return LEARNING OBJECTIVES After studying this chater you should be able to: e r t u i o a s d f understand how return and risk are defined and measured understand the concet of risk

More information

Dynamics of Open Source Movements

Dynamics of Open Source Movements Dynamics of Oen Source Movements Susan Athey y and Glenn Ellison z January 2006 Abstract This aer considers a dynamic model of the evolution of oen source software rojects, focusing on the evolution of

More information

Managing specific risk in property portfolios

Managing specific risk in property portfolios Managing secific risk in roerty ortfolios Andrew Baum, PhD University of Reading, UK Peter Struemell OPC, London, UK Contact author: Andrew Baum Deartment of Real Estate and Planning University of Reading

More information

What is Adverse Selection. Economics of Information and Contracts Adverse Selection. Lemons Problem. Lemons Problem

What is Adverse Selection. Economics of Information and Contracts Adverse Selection. Lemons Problem. Lemons Problem What is Adverse Selection Economics of Information and Contracts Adverse Selection Levent Koçkesen Koç University In markets with erfect information all rofitable trades (those in which the value to the

More information

CFRI 3,4. Zhengwei Wang PBC School of Finance, Tsinghua University, Beijing, China and SEBA, Beijing Normal University, Beijing, China

CFRI 3,4. Zhengwei Wang PBC School of Finance, Tsinghua University, Beijing, China and SEBA, Beijing Normal University, Beijing, China The current issue and full text archive of this journal is available at www.emeraldinsight.com/2044-1398.htm CFRI 3,4 322 constraints and cororate caital structure: a model Wuxiang Zhu School of Economics

More information

EFFECTS OF FEDERAL RISK MANAGEMENT PROGRAMS ON INVESTMENT, PRODUCTION, AND CONTRACT DESIGN UNDER UNCERTAINTY. A Dissertation SANGTAEK SEO

EFFECTS OF FEDERAL RISK MANAGEMENT PROGRAMS ON INVESTMENT, PRODUCTION, AND CONTRACT DESIGN UNDER UNCERTAINTY. A Dissertation SANGTAEK SEO EFFECTS OF FEDERAL RISK MANAGEMENT PROGRAMS ON INVESTMENT, PRODUCTION, AND CONTRACT DESIGN UNDER UNCERTAINTY A Dissertation by SANGTAEK SEO Submitted to the Office of Graduate Studies of Texas A&M University

More information

Estimating the Gains from Liberalizing Services Trade: The Case of Passenger Aviation *

Estimating the Gains from Liberalizing Services Trade: The Case of Passenger Aviation * Estimating the Gains from Liberalizing Services Trade: The Case of Passenger Aviation * Anca Cristea, University of Oregon avid Hummels, Purdue University & NBER Brian Roberson, Purdue University March

More information

Capital, Systemic Risk, Insurance Prices and Regulation

Capital, Systemic Risk, Insurance Prices and Regulation Caital, Systemic Risk, Insurance Prices and Regulation Ajay Subramanian J. Mack Robinson College of Business Georgia State University asubramanian@gsu.edu Jinjing Wang J. Mack Robinson College of Business

More information

Service Network Design with Asset Management: Formulations and Comparative Analyzes

Service Network Design with Asset Management: Formulations and Comparative Analyzes Service Network Design with Asset Management: Formulations and Comarative Analyzes Jardar Andersen Teodor Gabriel Crainic Marielle Christiansen October 2007 CIRRELT-2007-40 Service Network Design with

More information

On the predictive content of the PPI on CPI inflation: the case of Mexico

On the predictive content of the PPI on CPI inflation: the case of Mexico On the redictive content of the PPI on inflation: the case of Mexico José Sidaoui, Carlos Caistrán, Daniel Chiquiar and Manuel Ramos-Francia 1 1. Introduction It would be natural to exect that shocks to

More information

Softmax Model as Generalization upon Logistic Discrimination Suffers from Overfitting

Softmax Model as Generalization upon Logistic Discrimination Suffers from Overfitting Journal of Data Science 12(2014),563-574 Softmax Model as Generalization uon Logistic Discrimination Suffers from Overfitting F. Mohammadi Basatini 1 and Rahim Chiniardaz 2 1 Deartment of Statistics, Shoushtar

More information

Service Network Design with Asset Management: Formulations and Comparative Analyzes

Service Network Design with Asset Management: Formulations and Comparative Analyzes Service Network Design with Asset Management: Formulations and Comarative Analyzes Jardar Andersen Teodor Gabriel Crainic Marielle Christiansen October 2007 CIRRELT-2007-40 Service Network Design with

More information

The Economics of the Cloud: Price Competition and Congestion

The Economics of the Cloud: Price Competition and Congestion Submitted to Oerations Research manuscrit (Please, rovide the manuscrit number!) Authors are encouraged to submit new aers to INFORMS journals by means of a style file temlate, which includes the journal

More information

F inding the optimal, or value-maximizing, capital

F inding the optimal, or value-maximizing, capital Estimating Risk-Adjusted Costs of Financial Distress by Heitor Almeida, University of Illinois at Urbana-Chamaign, and Thomas Philion, New York University 1 F inding the otimal, or value-maximizing, caital

More information

Reference Pricing with Endogenous Generic Entry

Reference Pricing with Endogenous Generic Entry Reference Pricing with Endogenous Generic Entry Kurt R. Brekke, Chiara Canta, Odd Rune Straume Aril 18, 2016 Abstract Reference ricing intends to reduce harmaceutical exenditures by increasing demand elasticity

More information

The Online Freeze-tag Problem

The Online Freeze-tag Problem The Online Freeze-tag Problem Mikael Hammar, Bengt J. Nilsson, and Mia Persson Atus Technologies AB, IDEON, SE-3 70 Lund, Sweden mikael.hammar@atus.com School of Technology and Society, Malmö University,

More information

INFERRING APP DEMAND FROM PUBLICLY AVAILABLE DATA 1

INFERRING APP DEMAND FROM PUBLICLY AVAILABLE DATA 1 RESEARCH NOTE INFERRING APP DEMAND FROM PUBLICLY AVAILABLE DATA 1 Rajiv Garg McCombs School of Business, The University of Texas at Austin, Austin, TX 78712 U.S.A. {Rajiv.Garg@mccombs.utexas.edu} Rahul

More information

A Modified Measure of Covert Network Performance

A Modified Measure of Covert Network Performance A Modified Measure of Covert Network Performance LYNNE L DOTY Marist College Deartment of Mathematics Poughkeesie, NY UNITED STATES lynnedoty@maristedu Abstract: In a covert network the need for secrecy

More information

6.042/18.062J Mathematics for Computer Science December 12, 2006 Tom Leighton and Ronitt Rubinfeld. Random Walks

6.042/18.062J Mathematics for Computer Science December 12, 2006 Tom Leighton and Ronitt Rubinfeld. Random Walks 6.042/8.062J Mathematics for Comuter Science December 2, 2006 Tom Leighton and Ronitt Rubinfeld Lecture Notes Random Walks Gambler s Ruin Today we re going to talk about one-dimensional random walks. In

More information

Large-Scale IP Traceback in High-Speed Internet: Practical Techniques and Theoretical Foundation

Large-Scale IP Traceback in High-Speed Internet: Practical Techniques and Theoretical Foundation Large-Scale IP Traceback in High-Seed Internet: Practical Techniques and Theoretical Foundation Jun Li Minho Sung Jun (Jim) Xu College of Comuting Georgia Institute of Technology {junli,mhsung,jx}@cc.gatech.edu

More information

A Multivariate Statistical Analysis of Stock Trends. Abstract

A Multivariate Statistical Analysis of Stock Trends. Abstract A Multivariate Statistical Analysis of Stock Trends Aril Kerby Alma College Alma, MI James Lawrence Miami University Oxford, OH Abstract Is there a method to redict the stock market? What factors determine

More information

Re-Dispatch Approach for Congestion Relief in Deregulated Power Systems

Re-Dispatch Approach for Congestion Relief in Deregulated Power Systems Re-Disatch Aroach for Congestion Relief in Deregulated ower Systems Ch. Naga Raja Kumari #1, M. Anitha 2 #1, 2 Assistant rofessor, Det. of Electrical Engineering RVR & JC College of Engineering, Guntur-522019,

More information

Jena Research Papers in Business and Economics

Jena Research Papers in Business and Economics Jena Research Paers in Business and Economics A newsvendor model with service and loss constraints Werner Jammernegg und Peter Kischka 21/2008 Jenaer Schriften zur Wirtschaftswissenschaft Working and Discussion

More information

Applications of Regret Theory to Asset Pricing

Applications of Regret Theory to Asset Pricing Alications of Regret Theory to Asset Pricing Anna Dodonova * Henry B. Tiie College of Business, University of Iowa Iowa City, Iowa 52242-1000 Tel.: +1-319-337-9958 E-mail address: anna-dodonova@uiowa.edu

More information

Separating Trading and Banking: Consequences for Financial Stability

Separating Trading and Banking: Consequences for Financial Stability Searating Trading and Banking: Consequences for Financial Stability Hendrik Hakenes University of Bonn, Max Planck Institute Bonn, and CEPR Isabel Schnabel Johannes Gutenberg University Mainz, Max Planck

More information

c 2009 Je rey A. Miron 3. Examples: Linear Demand Curves and Monopoly

c 2009 Je rey A. Miron 3. Examples: Linear Demand Curves and Monopoly Lecture 0: Monooly. c 009 Je rey A. Miron Outline. Introduction. Maximizing Pro ts. Examles: Linear Demand Curves and Monooly. The Ine ciency of Monooly. The Deadweight Loss of Monooly. Price Discrimination.

More information

Machine Learning with Operational Costs

Machine Learning with Operational Costs Journal of Machine Learning Research 14 (2013) 1989-2028 Submitted 12/11; Revised 8/12; Published 7/13 Machine Learning with Oerational Costs Theja Tulabandhula Deartment of Electrical Engineering and

More information

Outsourcing and Technological Innovations: A Firm-Level Analysis

Outsourcing and Technological Innovations: A Firm-Level Analysis DISCUSSION PAPER SERIES IZA DP No. 3334 Outsourcing and Technological Innovations: A Firm-Level Analysis Ann Bartel Saul Lach Nachum Sicherman February 2008 Forschungsinstitut zur Zuunft der Arbeit Institute

More information

Evaluating a Web-Based Information System for Managing Master of Science Summer Projects

Evaluating a Web-Based Information System for Managing Master of Science Summer Projects Evaluating a Web-Based Information System for Managing Master of Science Summer Projects Till Rebenich University of Southamton tr08r@ecs.soton.ac.uk Andrew M. Gravell University of Southamton amg@ecs.soton.ac.uk

More information

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 29, NO. 4, APRIL 2011 757. Load-Balancing Spectrum Decision for Cognitive Radio Networks

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 29, NO. 4, APRIL 2011 757. Load-Balancing Spectrum Decision for Cognitive Radio Networks IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 29, NO. 4, APRIL 20 757 Load-Balancing Sectrum Decision for Cognitive Radio Networks Li-Chun Wang, Fellow, IEEE, Chung-Wei Wang, Student Member, IEEE,

More information

An Empirical Analysis of the Effect of Credit Rating on Trade Credit

An Empirical Analysis of the Effect of Credit Rating on Trade Credit 011 International Conference on Financial Management and Economics IPED vol.11 (011) (011) ICSIT Press, Singaore n Emirical nalysis of the Effect of Credit ating on Trade Credit Jian-Hsin Chou¹ Mei-Ching

More information

IEEM 101: Inventory control

IEEM 101: Inventory control IEEM 101: Inventory control Outline of this series of lectures: 1. Definition of inventory. Examles of where inventory can imrove things in a system 3. Deterministic Inventory Models 3.1. Continuous review:

More information

SEQUENTIAL INNOVATION, PATENTS, AND IMITATION. James Bessen Eric Maskin. No. 00-01 January 2000

SEQUENTIAL INNOVATION, PATENTS, AND IMITATION. James Bessen Eric Maskin. No. 00-01 January 2000 WORKING PAPER DEPARTMENT OF ECONOMICS SEQUENTIAL INNOVATION, PATENTS, AND IMITATION James Bessen Eric Maskin No. 00-01 January 000 MASSACHUSETTS INSTITUTE OF TECHNOLOGY 50 MEMORIAL DRIVE CAMBRIDGE, MASS.

More information

The fast Fourier transform method for the valuation of European style options in-the-money (ITM), at-the-money (ATM) and out-of-the-money (OTM)

The fast Fourier transform method for the valuation of European style options in-the-money (ITM), at-the-money (ATM) and out-of-the-money (OTM) Comutational and Alied Mathematics Journal 15; 1(1: 1-6 Published online January, 15 (htt://www.aascit.org/ournal/cam he fast Fourier transform method for the valuation of Euroean style otions in-the-money

More information

Compensating Fund Managers for Risk-Adjusted Performance

Compensating Fund Managers for Risk-Adjusted Performance Comensating Fund Managers for Risk-Adjusted Performance Thomas S. Coleman Æquilibrium Investments, Ltd. Laurence B. Siegel The Ford Foundation Journal of Alternative Investments Winter 1999 In contrast

More information

WASHINGTON UNIVERSITY IN ST. LOUIS Olin Business School CONTAGION OF A CRISIS, CORPORATE GOVERNANCE, AND CREDIT RATING

WASHINGTON UNIVERSITY IN ST. LOUIS Olin Business School CONTAGION OF A CRISIS, CORPORATE GOVERNANCE, AND CREDIT RATING WASHINGTON UNIVERSITY IN ST. LOUIS Olin Business School Dissertation Examination Committee: Armando R. Gomes, Co-Chair David K. Levine, Co-Chair Ohad Kadan Todd T. Milbourn John H. Nachbar Anjan V. Thakor

More information

Where you are Where you need to be How you get there Market Intelligence Competitive Insights Winning Strategies

Where you are Where you need to be How you get there Market Intelligence Competitive Insights Winning Strategies Where you are Where you need to be How you get there Market Intelligence Cometitive Insights Winning Strategies The industrial and B2B market research and strategy firm Dominate Your Markets Whether you

More information

The Competitiveness Impacts of Climate Change Mitigation Policies

The Competitiveness Impacts of Climate Change Mitigation Policies The Cometitiveness Imacts of Climate Change Mitigation Policies Joseh E. Aldy William A. Pizer 2011 RPP-2011-08 Regulatory Policy Program Mossavar-Rahmani Center for Business and Government Harvard Kennedy

More information

I will make some additional remarks to my lecture on Monday. I think the main

I will make some additional remarks to my lecture on Monday. I think the main Jon Vislie; august 04 Hand out EON 4335 Economics of Banking Sulement to the the lecture on the Diamond Dybvig model I will make some additional remarks to my lecture on onday. I think the main results

More information

DAY-AHEAD ELECTRICITY PRICE FORECASTING BASED ON TIME SERIES MODELS: A COMPARISON

DAY-AHEAD ELECTRICITY PRICE FORECASTING BASED ON TIME SERIES MODELS: A COMPARISON DAY-AHEAD ELECTRICITY PRICE FORECASTING BASED ON TIME SERIES MODELS: A COMPARISON Rosario Esínola, Javier Contreras, Francisco J. Nogales and Antonio J. Conejo E.T.S. de Ingenieros Industriales, Universidad

More information

Time-Cost Trade-Offs in Resource-Constraint Project Scheduling Problems with Overlapping Modes

Time-Cost Trade-Offs in Resource-Constraint Project Scheduling Problems with Overlapping Modes Time-Cost Trade-Offs in Resource-Constraint Proect Scheduling Problems with Overlaing Modes François Berthaut Robert Pellerin Nathalie Perrier Adnène Hai February 2011 CIRRELT-2011-10 Bureaux de Montréal

More information

Corporate Compliance Policy

Corporate Compliance Policy Cororate Comliance Policy English Edition FOREWORD Dear Emloyees, The global nature of Bayer s oerations means that our activities are subject to a wide variety of statutory regulations and standards

More information

Commercializing Open Source Software

Commercializing Open Source Software ommercializing Oen Source Software Byung ho Kim 1 bck@vt.edu Pamlin ollege of Business Virginia Tech Blacksburg, VA 4061 Tridas Mukhoadhyay tridas@cmu.edu Teer School of Business arnegie Mellon University

More information

Sage HRMS I Planning Guide. The Complete Buyer s Guide for Payroll Software

Sage HRMS I Planning Guide. The Complete Buyer s Guide for Payroll Software I Planning Guide The Comlete Buyer s Guide for Payroll Software Table of Contents Introduction... 1 Recent Payroll Trends... 2 Payroll Automation With Emloyee Self-Service... 2 Analyzing Your Current Payroll

More information

NBER WORKING PAPER SERIES HOW MUCH OF CHINESE EXPORTS IS REALLY MADE IN CHINA? ASSESSING DOMESTIC VALUE-ADDED WHEN PROCESSING TRADE IS PERVASIVE

NBER WORKING PAPER SERIES HOW MUCH OF CHINESE EXPORTS IS REALLY MADE IN CHINA? ASSESSING DOMESTIC VALUE-ADDED WHEN PROCESSING TRADE IS PERVASIVE NBER WORKING PAPER SERIES HOW MUCH OF CHINESE EXPORTS IS REALLY MADE IN CHINA? ASSESSING DOMESTIC VALUE-ADDED WHEN PROCESSING TRADE IS PERVASIVE Robert Kooman Zhi Wang Shang-Jin Wei Working Paer 14109

More information

Monitoring Frequency of Change By Li Qin

Monitoring Frequency of Change By Li Qin Monitoring Frequency of Change By Li Qin Abstract Control charts are widely used in rocess monitoring roblems. This aer gives a brief review of control charts for monitoring a roortion and some initial

More information

Estimating the Degree of Expert s Agency Problem: The Case of Medical Malpractice Lawyers

Estimating the Degree of Expert s Agency Problem: The Case of Medical Malpractice Lawyers Estimating the Degree of Exert s Agency Problem: The Case of Medical Malractice Lawyers Yasutora Watanabe Northwestern University March 2007 Abstract I emirically study the exert s agency roblem in the

More information

Project Finance as a Risk- Management Tool in International Syndicated Lending

Project Finance as a Risk- Management Tool in International Syndicated Lending Discussion Paer No. 183 Project Finance as a Risk Management Tool in International Syndicated ending Christa ainz* Stefanie Kleimeier** December 2006 *Christa ainz, Deartment of Economics, University of

More information

Index Numbers OPTIONAL - II Mathematics for Commerce, Economics and Business INDEX NUMBERS

Index Numbers OPTIONAL - II Mathematics for Commerce, Economics and Business INDEX NUMBERS Index Numbers OPTIONAL - II 38 INDEX NUMBERS Of the imortant statistical devices and techniques, Index Numbers have today become one of the most widely used for judging the ulse of economy, although in

More information

On-the-Job Search, Work Effort and Hyperbolic Discounting

On-the-Job Search, Work Effort and Hyperbolic Discounting On-the-Job Search, Work Effort and Hyerbolic Discounting Thomas van Huizen March 2010 - Preliminary draft - ABSTRACT This aer assesses theoretically and examines emirically the effects of time references

More information

An inventory control system for spare parts at a refinery: An empirical comparison of different reorder point methods

An inventory control system for spare parts at a refinery: An empirical comparison of different reorder point methods An inventory control system for sare arts at a refinery: An emirical comarison of different reorder oint methods Eric Porras a*, Rommert Dekker b a Instituto Tecnológico y de Estudios Sueriores de Monterrey,

More information

Web Application Scalability: A Model-Based Approach

Web Application Scalability: A Model-Based Approach Coyright 24, Software Engineering Research and Performance Engineering Services. All rights reserved. Web Alication Scalability: A Model-Based Aroach Lloyd G. Williams, Ph.D. Software Engineering Research

More information

DEPARTMENT OF ECONOMICS DISCUSSION PAPER SERIES

DEPARTMENT OF ECONOMICS DISCUSSION PAPER SERIES ISSN 1471-0498 DEPARTMENT OF ECONOMICS DISCUSSION PAPER SERIES MARGINAL COST PRICING VERSUS INSURANCE Simon Cowan Number 102 May 2002 Manor Road Building, Oxford OX1 3UQ Marginal cost ricing versus insurance

More information

Software piracy and social welfare: an analysis of protection mechanisms and. pricing strategies

Software piracy and social welfare: an analysis of protection mechanisms and. pricing strategies Software piracy and social welfare: an analysis of protection mechanisms and pricing strategies aris Cevik, Gokhan Ozertan* Department of Economics, ogazici University, ebek, 34342 Istanbul, Turkey bstract

More information

St.George - ACCI SMALL BUSINESS SURVEY August 2007

St.George - ACCI SMALL BUSINESS SURVEY August 2007 Release Date: 21 August 2007 St.George - ACCI SMALL BUSINESS SURVEY August 2007 Identifying National Trends and Conditions for the Sector Working in Partnershi for the future of Australian Business St.George

More information

An actuarial approach to pricing Mortgage Insurance considering simultaneously mortgage default and prepayment

An actuarial approach to pricing Mortgage Insurance considering simultaneously mortgage default and prepayment An actuarial aroach to ricing Mortgage Insurance considering simultaneously mortgage default and reayment Jesús Alan Elizondo Flores Comisión Nacional Bancaria y de Valores aelizondo@cnbv.gob.mx Valeria

More information

CRITICAL AVIATION INFRASTRUCTURES VULNERABILITY ASSESSMENT TO TERRORIST THREATS

CRITICAL AVIATION INFRASTRUCTURES VULNERABILITY ASSESSMENT TO TERRORIST THREATS Review of the Air Force Academy No (23) 203 CRITICAL AVIATION INFRASTRUCTURES VULNERABILITY ASSESSMENT TO TERRORIST THREATS Cătălin CIOACĂ Henri Coandă Air Force Academy, Braşov, Romania Abstract: The

More information

Concurrent Program Synthesis Based on Supervisory Control

Concurrent Program Synthesis Based on Supervisory Control 010 American Control Conference Marriott Waterfront, Baltimore, MD, USA June 30-July 0, 010 ThB07.5 Concurrent Program Synthesis Based on Suervisory Control Marian V. Iordache and Panos J. Antsaklis Abstract

More information

The Behavioral Economics of Insurance

The Behavioral Economics of Insurance DEPARTMENT OF ECONOMICS The Behavioral Economics of Insurance Ali al-nowaihi, University of Leicester, UK Sanjit Dhami, University of Leicester, UK Working Paer No. 0/2 Udated Aril 200 The Behavioral Economics

More information

The Changing Wage Return to an Undergraduate Education

The Changing Wage Return to an Undergraduate Education DISCUSSION PAPER SERIES IZA DP No. 1549 The Changing Wage Return to an Undergraduate Education Nigel C. O'Leary Peter J. Sloane March 2005 Forschungsinstitut zur Zukunft der Arbeit Institute for the Study

More information

Introduction to NP-Completeness Written and copyright c by Jie Wang 1

Introduction to NP-Completeness Written and copyright c by Jie Wang 1 91.502 Foundations of Comuter Science 1 Introduction to Written and coyright c by Jie Wang 1 We use time-bounded (deterministic and nondeterministic) Turing machines to study comutational comlexity of

More information

6.4 The Basic Scheme when the Agent is Risk Averse

6.4 The Basic Scheme when the Agent is Risk Averse 100 OPTIMAL COMPENSATION SCHEMES such that Further, effort is chosen so that ˆβ = ˆα = 0 e = δ The level of utility in equilibrium is strictly larger than the outside otion (which was normalized to zero

More information

Ambiguity, Risk and Earthquake Insurance Premiums: An Empirical Analysis. Toshio FUJIMI, Hirokazu TATANO

Ambiguity, Risk and Earthquake Insurance Premiums: An Empirical Analysis. Toshio FUJIMI, Hirokazu TATANO 京 都 大 学 防 災 研 究 所 年 報 第 49 号 C 平 成 8 年 4 月 Annuals 6 of Disas. Prev. Res. Inst., Kyoto Univ., No. 49 C, 6 Ambiguity, Risk and Earthquake Insurance Premiums: An Emirical Analysis Toshio FUJIMI, Hirokazu

More information

The risk of using the Q heterogeneity estimator for software engineering experiments

The risk of using the Q heterogeneity estimator for software engineering experiments Dieste, O., Fernández, E., García-Martínez, R., Juristo, N. 11. The risk of using the Q heterogeneity estimator for software engineering exeriments. The risk of using the Q heterogeneity estimator for

More information

for UK industrial and scientific companies managed by Business Marketing Online

for UK industrial and scientific companies managed by Business Marketing Online for UK industrial and scientific comanies managed by Business Marketing Online This is a Google AdWords advertisement and so is this... and so is this......advertising with Google Adwords is now essential.

More information

NEWSVENDOR PROBLEM WITH PRICING: PROPERTIES, ALGORITHMS, AND SIMULATION

NEWSVENDOR PROBLEM WITH PRICING: PROPERTIES, ALGORITHMS, AND SIMULATION Proceedings of the 2005 Winter Simulation Conference M. E. Kuhl, N. M. Steiger, F. B. rmstrong, and J.. Joines, eds. NEWSVENDOR PROBLEM WITH PRICING: PROPERTIES, LGORITHMS, ND SIMULTION Roger L. Zhan ISE

More information

Title: Stochastic models of resource allocation for services

Title: Stochastic models of resource allocation for services Title: Stochastic models of resource allocation for services Author: Ralh Badinelli,Professor, Virginia Tech, Deartment of BIT (235), Virginia Tech, Blacksburg VA 2461, USA, ralhb@vt.edu Phone : (54) 231-7688,

More information

Comparing Dissimilarity Measures for Symbolic Data Analysis

Comparing Dissimilarity Measures for Symbolic Data Analysis Comaring Dissimilarity Measures for Symbolic Data Analysis Donato MALERBA, Floriana ESPOSITO, Vincenzo GIOVIALE and Valentina TAMMA Diartimento di Informatica, University of Bari Via Orabona 4 76 Bari,

More information

TOWARDS REAL-TIME METADATA FOR SENSOR-BASED NETWORKS AND GEOGRAPHIC DATABASES

TOWARDS REAL-TIME METADATA FOR SENSOR-BASED NETWORKS AND GEOGRAPHIC DATABASES TOWARDS REAL-TIME METADATA FOR SENSOR-BASED NETWORKS AND GEOGRAPHIC DATABASES C. Gutiérrez, S. Servigne, R. Laurini LIRIS, INSA Lyon, Bât. Blaise Pascal, 20 av. Albert Einstein 69621 Villeurbanne, France

More information

Estimating the Degree of Expert s Agency Problem: The Case of Medical Malpractice Lawyers

Estimating the Degree of Expert s Agency Problem: The Case of Medical Malpractice Lawyers Estimating the Degree of Exert s Agency Problem: The Case of Medical Malractice Lawyers Yasutora Watanabe Northwestern University March 2007 Very Preliminary and Incomlete - Comments Welcome! Abstract

More information

Location costs, product quality, and implicit franchise contracts Haucap, Justus; Wey, Christian; Barmbold, Jens

Location costs, product quality, and implicit franchise contracts Haucap, Justus; Wey, Christian; Barmbold, Jens www.ssoar.info Location costs, roduct quality, and imlicit franchise contracts auca, Justus; Wey, Christian; Barmbold, Jens Veröffentlichungsversion / Published Version Arbeitsaier / working aer Zur Verfügung

More information

On Multicast Capacity and Delay in Cognitive Radio Mobile Ad-hoc Networks

On Multicast Capacity and Delay in Cognitive Radio Mobile Ad-hoc Networks On Multicast Caacity and Delay in Cognitive Radio Mobile Ad-hoc Networks Jinbei Zhang, Yixuan Li, Zhuotao Liu, Fan Wu, Feng Yang, Xinbing Wang Det of Electronic Engineering Det of Comuter Science and Engineering

More information

Branch-and-Price for Service Network Design with Asset Management Constraints

Branch-and-Price for Service Network Design with Asset Management Constraints Branch-and-Price for Servicee Network Design with Asset Management Constraints Jardar Andersen Roar Grønhaug Mariellee Christiansen Teodor Gabriel Crainic December 2007 CIRRELT-2007-55 Branch-and-Price

More information

How To Understand The Difference Between A Bet And A Bet On A Draw Or Draw On A Market

How To Understand The Difference Between A Bet And A Bet On A Draw Or Draw On A Market OPTIA EXCHANGE ETTING STRATEGY FOR WIN-DRAW-OSS ARKETS Darren O Shaughnessy a,b a Ranking Software, elbourne b Corresonding author: darren@rankingsoftware.com Abstract Since the etfair betting exchange

More information