Software Anti-piracy and Pricing in a Competitive Environment: a Game Theoretic Analysis

Size: px
Start display at page:

Download "Software Anti-piracy and Pricing in a Competitive Environment: a Game Theoretic Analysis"

Transcription

1 Software Anti-piracy and Pricing in a Competitive Environment: a Game Theoretic Analysis We study a problem of two software firms competing on price in a market where consumers can choose between purchasing and pirating software. Firms invest in anti-piracy effort to prevent software piracy. We study both the monopolistic case and the duopolistic one. We obtain several interesting results under competition. In particular, when the network effect increases, each firm adopts a stronger anti-piracy measure only if the cross-effect of antipiracy effort on the other firm is high. If both cross-effect and network effect are low, each firm invests more in anti-piracy with an increase in network effect. Our results show the importance of considering competition and cross effect when a firm designs an anti-piracy policy. Key words: Software piracy, Anti-piracy effort, Cross effect, Game theory

2 1. Introduction Software piracy, the unauthorized copying, distribution, or use of software products, is by far the biggest problem facing the software industry. According to a global recent survey by The Software Alliance (also known as BSA) (2014), 43% of the PC software was installed without without proper licensing in 2013; the total commercial value of the unlicensed installation approximated to $62.7 billion globally in In addition, the use of pirated software can increase security threats, interfere with existing systems and cause system malfunction and downtime. A recent survey by IDC shows that the annual cost to enterprises for dealing with malware from pirated software can reach $114 billion (IDC 2013). Pirated software can be obtained from various sources. According to the same survey (IDC 2013), 45% pirated software is from online websites and P2P network and 21% from street market. Facing the threat of software piracy to their revenue and business growth, many companies exert great effort against software piracy. Software giant Microsoft has built a worldwide anti-piracy team which works closely with law enforcement agents to support criminal prosecutions. Microsoft is estimated to spend more than $10 million a year on its intelligence-gathering operations for anti-piracy and another $200 million on developing anti-piracy technology (New York Times 2010). To reduce the chances of accessing pirated content intentionally or unintentionally by Internet users, Security software company McAfee has both patented and developed various technologies that detect and block pirated material from any websites when visited by users (Burgess 2013, Ernesto 2013). Also, many software firms and industrial organizations have links on their websites to encourage the public to report piracy against their products. Software & Information Industry Association (SIIA) offers rewards up to $1 million for reporting piracy activities (siia.net 2015). BSA also has such reward program to combat software piracy ( 1.1 Problem Description We study a problem of two software providers who sell competing products in a consumer market. Pirated software products are available on the market for free, but consumers incur cost for using such pirated products. Consumers have heterogeneous valuations for these two products. They choose either a legitimate product or a pirated version to maximize their own utilities which also include the contribution of network effect: the more consumers use 2

3 a particular software product (pirated or purchased), the more valuable this product is to its users. A software provider can exert anti-piracy effort which increase the cost of using pirated software. In our problem, we also consider cross effect of anti-piracy effort. When a provider exerts anti-piracy effort, not only the cost of using its own pirated software increases, but the cost of using the pirate version of its competitor s product will also increase. Cross effect arises for several reasons. First, anti-piracy technology such as the one developed by McAfee usually block the access to pirated products in general, including both its own product and a competitor s product. Also anti-piracy campaign through shutting down illegal websites and user education makes pirated software less available and thus more costly to obtain and use. Software anti-piracy through legal enforcement and raid can increase the chance of users being caught of using any pirate software, leading to a higher cost of using pirate software overall. In the past studies, it is commonly assumed that there is only one software provider in the market which faces the competition from its pirate software (Conner and Rumelt 1991, August and Tunca 2008, Lahiri and Dey 2012). We study a more realistic setting of two competing software providers. In this paper, we study mainly three research questions. First, how will competition among legitimate and pirated products affect the anti-piracy effort? Second, how will anti-piracy effort be affected by the network effect when there is competition among legitimate and pirated products? Third, how will the network effect affect the profit of each firm due to competition? 2. Literature Review Software piracy has long been an important topic in the information system research area. Many papers have studied policies and strategies to combat piracy. Chen and Png (2003) explores how a government sets the fine for copying, tax on copying medium, and subsidy on legitimate purchases, while a monopoly publisher sets price and spending on detection. However, our paper focuses how network externality and other factors affect pricing and anti-piracy decisions in a competitive environment. Chellappa and Shivendu (2005) study the issue of product sampling when there is piracy. They use a two-stage model of piracy for a market where consumers are assumed to be heterogeneous in their marginal valuation for quality and their moral costs. They find that product sampling can internalize any potential 3

4 benefits of piracy. Sundararajan (2004) investigates how a monopolistic seller should choose the optimal pricing schedules and technological deterrence levels when digital piracy exists in the market and the degree of piracy can be influenced by implementing digital rights management (DRM) systems. Wu and Chen (2007) study the versioning strategy in the presence of piracy. They find that when there is no piracy, a single version is the optimal strategy for an information goods provider. However, when piracy exists, firms tend offer more than one quality through versioning, an effective and profitable instrument to fight piracy under some conditions. August and Tunca (2008) consider the decision of providing security patches to users. They find that in the case that piracy tendency is low, only when the piracy enforcement level is high, vendor s software security patch restrictions is optimal. When patching costs are sufficiently low, a vendor should provide patches to pirated software as well. Johar et al (2012) investigate a publisher who gain profit through advertisement when providing content to consumers who have heterogeneous valuation. The publisher needs to determine two dimensions, the content quality and content distribution delay, in its content provision strategy. They find that that when piracy exists, the publisher should improve at least one dimension of content provision. Another stream of literature on the other hand, studies the potential positive effect of piracy on software producers. Before Conner and Rumelt (1991), it was believed that software piracy would decrease software firms profits and increase prices, which would harm the social welfare. Conner and Rumelt (1991) incorporated the network externality into their model and examine piracy s effect on software firms profit. When more people use one software, whether legitimate or pirated, consumers can gain higher utility through network effect, making consumers willing to pay more for the product. Therefore if network effect is large, then firms can benefit from piracy. Shy and Thisse (1999) extend the monopolistic results of Conner and Rumelt (1991) to a duopolistic framework. They show that firms will allow piracy in order to increase the market size. Similarly, they show that if network effects are strong, then firms can benefit from not exerting anti-piracy effort. Gu and Mahajan (2005) also investigate piracy s effect on firms profits when competition exist. They show that piracy can reduce price competition, and can be beneficial to firms when markets have high wealth gaps. Jain (2008) find that strong network effects may lead to higher levels of copyright protection in some case. They show that when network effect is strong, stronger copyright enforcement can reduce price competition. Lahiri and Dey (2012) find when piracy enforcement is low, the monopolist have more incentive to invest in quality. Tunca and 4

5 Wu (2013) show that information goods industry, by suing file sharing networks or users who share copyrighted material on peer-to-peer networks, can sometimes hurt legitimate publishers of information goods. In our paper, we assume that a consumer chooses to buy or pirate software based on his or her utility. One contribution of our paper is to consider anti-piracy s cross effect which is not considered in other papers. We obtain several interesting results. For example, different from previous works (Conner and Rumelt 1991, Jain 2008), we show anti-piracy effort increases with network effect only if cross effect is high enough. 3. The Model Consider two competing firms (denoted by 1 and 2) located at the endpoints of a Hotelling line [0,1]. Each firm produces one software product with quality q i, i = 1, 2. Using a common assumption about the cost of information goods, we let the cost of producing an extra copy of software be 0. Let p 1 and p 2 be the price of legitimate software products that firms and 2 sell. Both software products have pirated version. We assume the pirated versions are costless to obtain since nowadays consumers can download pirated software products easily from many software pirating websites. Table 1 in the appendix contains a summary of key variables used in this paper. Consumers are heterogeneous in their taste for a particular software product and we assume they are uniformly located on the Hotelling line between 0 and 1. Denote t to be the mismatch cost parameter. Therefore a consumer located at x will incur the mismatch cost tx for using product 1 and t(1 x) for using product 2. Furthermore we assume the quality of both software products are large enough so that the market is fully covered (otherwise the problem becomes less interesting since each firm could act as a local monopoly). Then each consumer (for simplicity we use he to refer to a consumer later on) faces four options: buying software 1, buying software 2, pirating software 1, pirating software 2. Figure 1 depicts consumers choices. If a consumer located at x chooses to buy, his utility U i of buying and using a legitimate software product 1 or 2 is given by U 1 = q 1 + k(d 1 + D 3 ) tx p 1 (1) or U 2 = q 2 + k(d 2 + D 4 ) t(1 x) p 2 (2) 5

6 Consumer choice: Buy 1 Pirate 1 Pirate 2 Buy 2 0 Figure 1: Consumer demands in the duopolistic case 1 where D i (D 2+i ) is the demand for legitimate (pirated) software i, i = 1, 2. If a consumer chooses to pirate, he could get software for free by downloading or copying it. However, he may not get the fully quality q i by using pirated software. For instance, software firms may not provide patches for pirated software (August and Tunca 2008), so that computers using pirated version could be vulnerable for viruses, and a consumer s utility could decrease. Also, many software firms provide customer support only to those who own legitimate software products. Therefore a consumer naturally discounts the quality of pirated software. Consequently both the network benefit and mismatch cost of using pirated software decrease as a consumer does not value pirated software so high as legitimate one. Let θ i, i = 1, 2 be such discount factor for product 1 and 2. Then the utility of a consumer who uses a pirated version of software product 1 can be written in the following form: U 3 = θ 1 [q 1 + k(d 1 + D 3 ) tx] c 1 (e 1, e 2 ). (3) Penalty cost term c 1 (e 1, e 2 ) in (3) depends on the probability of a consumer being caught of using pirated software and subsequently required to pay penalty. As anti-piracy efforts e 1 exerted by firm 1 increases, a consumer is more likely to be caught using pirated software 1. Therefore we expect c 1 to increase with e 1, i.e., c 1 / e 1 > 0. Also there is a cross effect by anti-piracy effort e 2 from the other firm and we assume c 1 / e 2 > 0 as well. Similarly, the utility a consumer obtains by using a pirated software product 2 is given by: U 4 = θ 2 [q 2 + k(d 2 + D 4 ) t(1 x)] c 2 (e 1, e 2 ). (4) To proceed, we use the commonly used linear-quadratic framework to simplify the analysis. That is, we use a linear form of penalty cost c i (e 1, e 2 ) = a i e 1 + b i e 2, i = 1, 2 (5) and a quadratic cost of anti-piracy effort: r i e 2 i, i = 1, 2. 6

7 4. Analysis of the Model and Results 4.1 Benchmark: Monopoly Case We first analyze the case when there is only one software provider in the market. This analysis serves as a benchmark for the subsequent duopolistic analysis. Without the loss of generality, we assume that the monopolist is firm 1 and located at 0 of a Hotelling line where consumers are uniformly distributed. Penalty cost c 1 (e 1, e 2 ) becomes c 1 (e 1 ) = a 1 e 1 as e 1 is the only anti-piracy effort in the monopolistic case. The time sequence is the following. At the first stage, the monopolistic firm decides the anti piracy effort e 1. At the second stage, the firm decide the price of the software product p 1. At the third stage, consumers make their purchase or pirating decisions. We use backward induction to solve this problem. It can be shown that in the monopolistic case, the second and third stages can be merged into one stage and the final decisions will still be the same. For comparison with the duopoly s case, we keep two stages separate. At the third stage, a consumer can obtain a legitimate version, gaining utility U 1 given by Equation (1), or acquire a pirated one, gaining utility U 3 given by (3). Let x 1 be the point on the Hotelling line where a consumer is indifferent between purchasing and pirating and x 2 be the point where a consumer is indifferent between pirating or not using the software. In other words, the total demand is simply given by x 2. Then we have U 1 x=x1 = U 3 x=x1 (6) and That is and U 3 x=x2 = 0 (7) q 1 tx 1 + kx 2 p 1 = θ 1 (q 1 tx 1 + kx 2 ) a 1 e 1 (8) θ 1 (q 1 tx 2 + kx 2 ) a 1 e 1 = 0 (9) From (9), we can solve for x 2 : Plugging (10) into (8), we can get x 1 : x 2 = θ 1q 1 a 1 e 1 θ 1 (t k) x 1 = q 1 t + k q 1 t (t k) p 1 (1 θ 1 )t + 7 ( (10) 1 (1 θ 1 )t k ) 1 a 1 e 1. (11) t θ 1 (t k)

8 At the second stage, the firm chooses the selling price p 2 to maximize its profit: π 1 (p 1, e 1 ) = x 1 p 1 r 1 e 2 1 (12) Plugging (11) into the profit function (12) and differentiating the profit with price p 1, we can get the first order condition with respect to p 1 : π 1 (p 1, e 1 ) p 1 = q 1 t + k t from which we can solve for p 1 : θ 1 q 1 θ 1 (t k) 2p 1 (1 θ 1 )t + ( 1 (1 θ 1 )t k t 1 θ 1 (t k) )a 1e 1 (13) p 1 = 1 2 (1 θ 1)[q 1 + kq 1 (t k) + ( 1 (1 θ 1 ) k θ 1 (t k) )a 1e 1 ] (14) At the first stage, after one substitutes (14) into the profit function (12), the profit function becomes only a function of decision variable e 1. The firm needs to choose the effort to maximize its profit: π 1 = (1 θ 1)a 1 [q 1 + kq 1 e 1 4t (t k) + ( 1 k 1 θ 1 θ 1 (t k) )a 1 k 1e 1 ][ 1 θ 1 θ 1 (t k) ] 2r 1e 1 (15) We can get the optimal effort of anti-piracy as: e 1 = and plugging e 1 into (14), we can get p 1. q 1 + k q 1 t k 8r 1 t + ka (1 θ 1 )[ ka 1 θ 1 (t k) + a 1 a 1 1 ] θ 1 (t k) (1 θ 1 ) 1 θ 1 By using comparative statics analysis, we can study how different parameters can affect the optimal decision variables and the firm s profit. The results are summarized in Theorem 1 (Proofs of all theorems are omitted due to space constraint): Theorem 1. In the monopoly s case, we have the following results: 1. As network effect increases, the optimal anti-piracy effort decreases, the price increases and the firm s profit increases. That is, e 1/ k < 0, p 1/ k > 0, and π 1/ k > As software quality increases, the optimal anti-piracy effort increases, the price increases and the firm s profit increases. That is, e 1/ q 1 > 0, p 1/ q 1 > 0, and π 1/ q 1 > As perceived quality for using pirated software increases, the optimal anti-piracy effort increases, the price decreases and the profit decreases. That is, e 1/ θ 1 > 0, p 1/ θ 1 < 0 and π 1/ θ 1 < 0. 8 (16)

9 From Theorem 1.1, as the network effect increases, it is optimal for a software company to decrease its anti-piracy effort. This is similar to the one found in Conner and Rumelt (1991). The intuition is the following: as the network effect increases, a software company has incentive to reduce anti-piracy effort and allow a higher level of piracy so that more users will join the network even though they might choose to pirate. As a result, the software company can charge legitimate users a higher price due to increased network size and its profit increases. Therefore, when the network effect is strong, it is important for a monopolistic software provider to have a larger user base. On the other hand, as software quality increases, it becomes more attractive for both legitimate and pirating users. In this case, it is optimal for a software company to increase anti-piracy effort to reduce software piracy. At the same time, the company is able to charge legitimate users a higher price and increase its profit, as shown in Theorem 1.2. From Theorems 1.3, as quality of pirated software increases, it becomes more attractive to use pirated software. That means the competition between legitimate and pirated software becomes stronger. Then a software company s optimal response is to increase its anti-piracy effort to discourage the use of pirated software on the one hand, and to decrease its price to make legitimate software more competitive on the other hand. As a result, the monopolist s profit decreases as pirated software becomes attractive. Comparing Theorems 1.2 with 1.3, it is interesting to see that although anti-piracy effort always increases for an increase in either q 1 or θ 1, the behavior of profit is different. A monopolist s profit increases for a higher q 1 even with a higher anti-piracy effort since it becomes more attractive to purchase its product. However for a higher θ 1, it becomes more attractive to pirate and a firm puts in more anti-piracy effort and gets less profit. Next we explore a duopolistic case to see whether the same results hold in a competitive environment. 4.2 Duopoly Case We now study the setting that two firm are in the market.they lie at each end of the Hotelling line. That is, firm 1 lies at point of 0, and firm 2 at 1. The time sequence is similar to the monopoly case: At the first stage, both firms determine their anti-piracy effort e 1 and e 2 ; at the second stage, both firms set prices p 1 and p 2 ; at the third stage, consumers choose which type of software to use and whether to pirate or not. 9

10 At the third stage, a consumer located at point x 1 will get the same utility whether he uses pirated software product 1 or legitimate software product 1, as shown in Figure 1. Then U 1 in Equation (1) equals U 3 in (3) at x = x 1. That is, q 1 + k(d 1 + D 3 ) tx 1 p 1 = θ 1 [q 1 + k(d 1 + D 3 ) tx 1 ] c 1 (e 1, e 2 ) (17) Similarly, U 2 in Equation (2) equals U 4 in (4) at x = x 3 : q 2 + k(d 2 + D 4 ) t(1 x 3 ) p 2 = θ 2 [q 2 + k(d 2 + D 4 ) t(1 x 3 )] c 2 (e 1, e 2 ) (18) and a consumer at point x 2 will get the same utility whether using pirated product 1 or 2. Then, θ 1 [q 1 + k(d 1 + D 3 ) tx 2 ] c 1 (e 1, e 2 ) = θ 2 [q 2 + k(d 2 + D 4 ) t(1 x 2 )] c 2 (e 1, e 2 ) (19) As shown in Figure 1, the total demand for software product 1 is x 2, including pirated version and legitimate version and the total demand for software product 2 is 1 x 2. We shall have: D 1 + D 3 = x 2 (20) D 2 + D 4 = 1 x 2 (21) From (19), (20) and (21), we can solve for x 2 x 2 = θ 1q 1 θ 2 q 2 + (t k)θ 2 c 1 (e 1, e 2 ) + c 2 (e 1, e 2 ) (θ 1 + θ 2 )(t k) (22) From (17), we can get x 1 which is the demand for legitimate product 1 D 1, D 1 = x 1 = (1 θ 1)q 1 + (1 θ 1 )kx 2 p 1 + c 1 (e 1, e 2 ) (1 θ 1 )t (23) and from (18), we can get x 3 : x 3 = 1 D 2 = 1 (1 θ 2)q 2 + (1 θ 2 )k(1 x 2 ) p 2 + c 2 (e 1, e 2 ) (1 θ 2 )t (24) from which we can get the demand for legitimate product 2: D 2 = (1 θ 2)q 2 + (1 θ 2 )k(1 x 2 ) p 2 + c 2 (e 1, e 2 ). (25) (1 θ 2 )t The profits of firms 1 and 2 are given by: π 1 (p 1, e 1 ) = D 1 p 1 r 1 e 2 1 = (1 θ 1)q 1 + (1 θ 1 )kx 2 p 1 + c 1 (e 1, e 2 ) p 1 r 1 e 2 1 (26) (1 θ 1 )t 10

11 π 2 (p 2, e 2 ) = D 2 p 2 r 2 e 2 2 = (1 θ 2)q 2 + (1 θ 2 )k(1 x 2 ) p 2 + c 2 (e 1, e 2 ) p 2 r 2 e 2 2 (27) (1 θ 2 )t By solving p 1 and p 2 from π 1 (p 1, e 1 )/ p 1 = 0 and π 2 (p 2, e 2 )/ p 2 = 0, We can get prices of two software products at the Nash equilibrium: p 1 = (1 θ 1)q 1 + (1 θ 1 )kx 2 + c 1 (e 1, e 2 ) 2 (28) p 2 = (1 θ 2)q 2 + (1 θ 2 )k(1 x 2 ) + c 2 (e 1, e 2 ) 2 After plugging (28) and c i (e 1, e 2 ) = a i e 1 + b i e 2 into (26), we get the first order conditions of π 1 (p 1 (e 1, e 2 ), e 1 ) with respect to e 1 : π 1 = 2[(1 θ (1 θ 1)q 1 + (1 θ 1 )kx 2 + a 1 e 1 + b 1 e 2 ][ 1 )k( a 1 +b 1 ) (θ 1 +θ 2 + a )(t k) 1 ] 2r 1 e 1 = 0 (30) e 1 4(1 θ 1 )t Similarly, we have π 2 = 2[(1 θ (1 θ 2)q 2 + (1 θ 2 )k(1 x 2 ) + a 2 e 1 + b 2 e 2 ][ 2 )k(a 2 b 2 ) (θ 1 +θ 2 + b )(t k) 2 ] 2r 2 e 2 = 0 (31) e 2 4(1 θ 2 )t We can jointly solve the equilibrium anti-piracy efforts e 1 and e 2 from the first-order conditions (30) and (31). However, the expressions are too complicated to gain any analytical insights. To gain further insights, we consider the following two cases: a symmetric case where both firms parameters are the same and an asymmetric case where both firms parameters are the same except that software quality is different between two products Duoplistic Competition with Symmetric Firms When two firms are identical, we can get each firm s equilibrium effort as (29) e sym = (2q + k)(1 θ 1 ) 8r 1 t k a 1 +a 2 2θ 1 (t k) + a 1 1 θ 1 2(a 1 + a 2 ) (32) and the equilibrium price as p sym = (1 θ 1)q 1 + (1 θ 1)k 2 + (a 1 + a 2 )e sym 2 (33) Then we can show the following result from comparative statics analysis: Theorem 2. In the symmetric monopolistic case, we have the following results: 11

12 1. As network effect increases, both the equilibrium anti-piracy effort and price increase when the cross effect of anti-piracy effort is high. That is, e sym / k > 0 and p sym / k < 0 when the cross effect parameter a 2 is large enough. 2. As software quality increases, the equilibrium anti-piracy effort the price and the firm s profit all increase. That is, e sym / q 1 > 0, p sym / q 1 > 0, and π sym / q 1 > As perceived quality for using pirated software increases, the equilibrium anti-piracy effort increases; both the price and the profit decrease. That is, e sym / θ > 0, p sym / θ < 0, and π sym / θ < 0. Some results remain the same even in the duopolistic setting: Theorem 3.2 and 3 are the same as Theorem 1.2 and 1.3 in the monopolistic case. However, the result in Theorem 3.1 is quite interesting and different from Theorem 1.1 in the monopolistic case. On the one hand, a higher network effect makes anti-piracy effort less desirable, as one could see in the monopolistic case. On the other hand, under competition, a higher network effect could lead to a higher anti-piracy effort which could reduce the demand for the competitor s product (both legitimate and pirated). when the cross effect of anti-piracy effort is high, the second effect dominates the first effect and anti-piracy effort increases with network effect. 0.4 Anti-piracy effort k Figure 2: Anti-piracy effort without cross effect Even if the cross effect does not exist, i.e, coefficients of a2 = b2 = 0 in c i, we still obtain a result (shown in Figure 2) that is different from what one might have expected under the 12

13 monopolistic case. The result in Figure 2 is quite interesting. In the small network effect (k) region, when k increases, anti-piracy effort increases even though there is no cross effect from anti-piracy effort. Then such increase in anti-piracy effort is purely due to competition. When k further increases, network effect dominates the competition effect. Then anti-piracy effort decreases and each firm tries to increase its network by adopting a more lenient antipiracy policy. Furthermore, we also study how the change in the cross effect of anti-piracy effort influences the equilibrium results. Theorem 3. In the symmetric monopolistic case, an increase in the cross effect of the antipiracy effort leads to an increase in the equilibrium anti-piracy effort, the equilibrium price and each firm s profit. That is, e sym / a 2 > 0, p sym / a 2 < 0, and π sym / a 2 < 0. The result in Theorem 3 seems simple but is not that straightforward. When the cross effect of anti-piracy effort increases, anti-piracy effort becomes more effective in increasing the cost of using competitor s pirated software, not its own pirated software. Then why does a firm still have incentive to increase anti-piracy effort? Also how can a firm even increase its price? The reason is due to the competitive effect. As the competitor s pirated software becomes less attractive, the competitor can increase its price; in turn the first firm can increase price as well. So anti-piracy effort indirectly benefits the firm itself when the cross effect increases. Then each firm is motivated to increase anti-piracy effort even if the direct benefit goes to its competitor, knowing that its competitor is also motivated to do the same; ultimately, both firms benefit. Theorem 3 discovers the interesting role that the cross effect plays an increase in the cross effect can weaken the competition between two software firms. In the next subsection, we explore how relaxing the symmetric assumption can produce richer results Duoplistic Competition with Asymmetric Quality We first study how two companies with software of different qualities react by focusing on anti-piracy effort. Theorem 4. In an asymmetric case with different software quality q i, 1. both firm 1 s anti-piracy effort e 1 and firm 2 s effort e 2 increase with either software 1 s quality q 1 or software 2 s quality q 2 ; That is, e 1 / q i > 0 and e 2 / q i > 0, i=1,2. 13

14 2. the firm with higher quality software exerts more anti-piracy effort; The difference in effort increases with quality difference. When firm 1 s software quality increases q 1, it becomes more tempting to pirate the software. Firm 1 has an incentive to increase anti-piracy effort to reduce piracy and make purchasing the software more desirable. When firm 1 exert more anti-piracy effort, it is more costly to using pirated software product 1, leading to more users using pirated software 2. In turn, firm 2 will exert more effort in anti-piracy to shift some pirate users to legitimate users. In other words, each firm s anti-piracy effort increases even if only one firm s software quality increases, as Theorem 4.1 shows. Then which firm will spend more effort in preventing piracy? As Theorem 4.2 shows, the higher quality firm should put more effort since its product is more likely to be the target for piracy. This matches our daily experience: larger software firms are more actively involved in anti-piracy lawsuits, as their software has more functionalities and is more likely to be pirated. Theorem 5. In an asymmetric case with different effort cost r i, 1. both firm 1 s effort and firm 2 s effort will decrease with either firm s effort cost. That is, e 1 / r i < 0 and e 2 / r i < 0, i=1,2. 2. the firm with higher effort cost exerts less anti-piracy effort; the difference in effort increases with cost difference. The result that a firm s anti-piracy effort decreases with its effort cost is obvious. When its cost of anti-piracy is high, a firm will choose to decrease anti-piracy. However, it is not immediately clear why the other firm will decrease its effort as well, as Theorem 5.2 shows. The explanation is the following. When one firm s anti-piracy effort decreases, more users tend to pirate this firm s product. The pressure of piracy for the other firm will decrease, so the other firm is able to decrease its anti-piracy effort. 5. Conclusion In this paper, we analyzed the problem how software firms should price their products and invest in anti-piracy measures to prevent piracy in a competitive environment. 14

15 In a symmetric duopolistic setting, we show that when cross effect exists, the anti-piracy effort by a firm involved in price competition may increase or decrease with the network effect, which is different from previous results. Even without cross effect, anti-piracy effort may increase or decrease with the network effect in a competitive setting. Another interesting result is that when cross effect increases, each firm increases its anti-piracy effort. Although such increase benefits a competitor directly, this competitor can then increase price since there is less pressure from piracy; the first firm in turn can do the same, benefiting from cross effect ultimately. In an asymmetric duopolistic setting, we find that an increase in one product s quality causes two firms to increase anti-piracy effort, with a higher quality firm putting more effort. On the other hand, when anti-piracy cost becomes more expensive for one firm, then interestingly both firms will decrease anti-piracy effort due to the effect of competition. Our contributions are in two ways. First, we introduced the cross effect concept which commonly exists in reality and has not attracted enough interests in software piracy literature. Second, we find that anti-piracy effort may increase when network effect increases in some circumstances. This result is theoretically interesting, because, it contradicts the previous belief that firms can take advantage of high network effect and exert less anti-piracy effort. The implication to software companies is that when competition exists, they may need to exert more effort if the cross effect of anti-piracy effort is high. There are several extensions possible to our paper. First, we use a Hotellting model to study competition between two software products. Although many papers use this model, in reality, vertical competition on quality also widely exists. Second, it might be interesting to extend our study to include software versioning which is another strategy to combat piracy. 15

16 References August, T., & Tunca, T. I., Let the Pirates Patch? An Economic Analysis of Software Security Patch Restrictions. Information Systems Research, 19(1), (2008). doi: /isre Burgess, Rick McAfee Patents Anti-piracy Filter. Last retrieved February 24, http: // Chellappa, R. K., & Shivendu, S., Managing Piracy: Pricing and Sampling Strategies for Digital Experience Goods in Vertically Segmented Markets. Information Systems Research, 16(4), (2005). doi: /isre Chen, Y., & Png, I., Information Goods Pricing and Copyright Enforcement: Welfare Analysis. Information Systems Research, 14(1), (2003). doi: /isre Gu, B., & V. Mahajan, How Much Anti-piracy Effort is Too Much? A Study of the Global Software Industry. Working paper, University of Texas, Austin (2005). International Data Corporation (IDC) The Dangerous World of Counterfeit and Pirated Software. Last retrieved February 24, antipiracy/docs/idc pdf. Jain, S., Digital Piracy: A Competitive Analysis. Marketing Science, 27(4), (2008). doi: /mksc Johar, M., Kumar, N., & Mookerjee, V., Content Provision Strategies in the Presence of Content Piracy. Information Systems Research, 23(3-part-2), (2012). Lahiri, A., & Dey, D., Effects of Piracy on Quality of Information Goods. Management Science, 59(1), (2012). doi: /mnsc New York Times Chasing Pirates: Inside Microsofts War Room. Last retrieved February 24, Reavis Conner, K., & Rumelt, R. P., Software Piracy: An Analysis of Protection Strategies. Management Science, 37(2), (1991). doi: /mnsc Shy, O. & Thisse, J.-F., A Strategic Approach to Software Protection. Journal of Economics & Management Strategy, 8: (1999). doi: /j x siia.net SIIA s Corporate Anti-Piracy Reward Program. Last retrieved February 24, Sundararajan, A., Managing Digital Piracy: Pricing and Protection. Information Systems Research, 15(3), (2004). doi: /isre The Software Alliance (BSA) The Compliance Gap: BSA Global Software Survey. Last retrieved February 24, torrentfreak.com McAfee Brands The Pirate Bay as a security threat. Last retrieved February 24,

17 mcafee-brands-the-pirate-bay-as-a-security-threat /. Tunca, T. I., & Wu, Q., Fighting Fire with Fire: Commercial Piracy and the Role of File Sharing on Copyright Protection Policy for Digital Goods. Information Systems Research, 24(2), (2013). doi: /isre Wu, S., & Chen, P., Versioning and Piracy Control for Digital Information Goods. Operations Research, 56(1), (2007). doi: /opre

18 Appendix Notation Table 1: Summary of notation Description Parameters q i quality of software product i, where i {1, 2} θ i discounted quality of pirated software relative to a legitimate version, where i {1, 2} k coefficient of a software product s network externality x a consumer s location on the Hotelling line t coefficient of a consumer s mismatch cost of using a legitimate version t coefficient of a consumer s mismatch cost of using a pirated version π i profit of software firm i, where i {1, 2} U i utility a consumer gets from using ith legitimate software product i 1, 2 U 2+i utility a consumer gets from using pirated software product i, where i 1, 2 D i demand of legitimate software product i, where i {1, 2} D 2+i demand of pirated software product i, where i {1, 2} Decision Variables p i price of software product i, where i {1, 2} e i anti-piracy effort exerted by software company i, where i {1, 2} 18

In recent years, the issue of copyright protection for intellectual properties such as computer software, music

In recent years, the issue of copyright protection for intellectual properties such as computer software, music Vol. 7, No. 4, July August 008, pp. 60 66 issn 073-399 eissn 56-548X 08 704 060 informs doi 0.87/mksc.070.033 008 INFORMS Digital Piracy: A Competitive Analysis Sanjay Jain Mays Business School, Texas

More information

Discussion Paper No. 2002/115 Network Externality and Software Piracy. Sougata Poddar *

Discussion Paper No. 2002/115 Network Externality and Software Piracy. Sougata Poddar * Discussion Paper No. 00/5 Network Externality and Software Piracy Sougata Poddar * December 00 Abstract The pervasiveness of the illegal copying of software is a worldwide phenomenon. Software piracy implies

More information

Fighting Fire with Fire: Commercial Piracy and the Role of File Sharing on Copyright Protection Policy for Digital Goods

Fighting Fire with Fire: Commercial Piracy and the Role of File Sharing on Copyright Protection Policy for Digital Goods Fighting Fire with Fire: Commercial Piracy and the Role of File Sharing on Copyright Protection Policy for Digital Goods Tunay I. Tunca and Qiong Wu Graduate School of Business, Stanford University Stanford,

More information

Let the Pirates Patch? An Economic Analysis of Network Software Security Patch Restrictions

Let the Pirates Patch? An Economic Analysis of Network Software Security Patch Restrictions Let the Pirates Patch? An Economic Analysis of Network Software Security Patch Restrictions Terrence August and Tunay I. Tunca Graduate School of Business, Stanford University Stanford, CA, 94305 Extended

More information

Intellectual Property Right Protection in the Software Market

Intellectual Property Right Protection in the Software Market Intellectual Property Right Protection in the Software Market Yasuhiro Arai Aomori Public College 153-4, Yamazaki, Goushizawa, Aomori-city, Aomori 030-0196, Japan March 01 Abstract We discuss the software

More information

Software piracy and social welfare: an analysis of protection mechanisms and. pricing strategies

Software piracy and social welfare: an analysis of protection mechanisms and. pricing strategies Software piracy and social welfare: an analysis of protection mechanisms and pricing strategies aris Cevik, Gokhan Ozertan* Department of Economics, ogazici University, ebek, 34342 Istanbul, Turkey bstract

More information

Week 7 - Game Theory and Industrial Organisation

Week 7 - Game Theory and Industrial Organisation Week 7 - Game Theory and Industrial Organisation The Cournot and Bertrand models are the two basic templates for models of oligopoly; industry structures with a small number of firms. There are a number

More information

Sharing Online Advertising Revenue with Consumers

Sharing Online Advertising Revenue with Consumers Sharing Online Advertising Revenue with Consumers Yiling Chen 2,, Arpita Ghosh 1, Preston McAfee 1, and David Pennock 1 1 Yahoo! Research. Email: arpita, mcafee, pennockd@yahoo-inc.com 2 Harvard University.

More information

We study the question of whether a software vendor should allow users of unlicensed (pirated) copies of

We study the question of whether a software vendor should allow users of unlicensed (pirated) copies of Information Systems Research Vol. 19, No. 1, March 2008, pp. 48 70 issn 1047-7047 eissn 1526-5536 08 1901 0048 informs doi 10.1287/isre.1070.0142 2008 INFORMS Let the Pirates Patch? An Economic Analysis

More information

Pricing and Persuasive Advertising in a Differentiated Market

Pricing and Persuasive Advertising in a Differentiated Market Pricing and Persuasive Advertising in a Differentiated Market Baojun Jiang Olin Business School, Washington University in St. Louis, St. Louis, MO 63130, baojunjiang@wustl.edu Kannan Srinivasan Tepper

More information

Moral Hazard. Itay Goldstein. Wharton School, University of Pennsylvania

Moral Hazard. Itay Goldstein. Wharton School, University of Pennsylvania Moral Hazard Itay Goldstein Wharton School, University of Pennsylvania 1 Principal-Agent Problem Basic problem in corporate finance: separation of ownership and control: o The owners of the firm are typically

More information

Thus MR(Q) = P (Q) Q P (Q 1) (Q 1) < P (Q) Q P (Q) (Q 1) = P (Q), since P (Q 1) > P (Q).

Thus MR(Q) = P (Q) Q P (Q 1) (Q 1) < P (Q) Q P (Q) (Q 1) = P (Q), since P (Q 1) > P (Q). A monopolist s marginal revenue is always less than or equal to the price of the good. Marginal revenue is the amount of revenue the firm receives for each additional unit of output. It is the difference

More information

Market Power and Efficiency in Card Payment Systems: A Comment on Rochet and Tirole

Market Power and Efficiency in Card Payment Systems: A Comment on Rochet and Tirole Market Power and Efficiency in Card Payment Systems: A Comment on Rochet and Tirole Luís M. B. Cabral New York University and CEPR November 2005 1 Introduction Beginning with their seminal 2002 paper,

More information

Online Supplementary Material

Online Supplementary Material Online Supplementary Material The Supplementary Material includes 1. An alternative investment goal for fiscal capacity. 2. The relaxation of the monopoly assumption in favor of an oligopoly market. 3.

More information

Warranty Designs and Brand Reputation Analysis in a Duopoly

Warranty Designs and Brand Reputation Analysis in a Duopoly Warranty Designs and Brand Reputation Analysis in a Duopoly Kunpeng Li * Sam Houston State University, Huntsville, TX, U.S.A. Qin Geng Kutztown University of Pennsylvania, Kutztown, PA, U.S.A. Bin Shao

More information

The vertical differentiation model in the insurance market: costs structure and equilibria analysis

The vertical differentiation model in the insurance market: costs structure and equilibria analysis The vertical differentiation model in the insurance market: costs structure and equilibria analysis Denis V. Kuzyutin 1, Maria V. Nikitina, Nadezhda V. Smirnova and Ludmila N. Razgulyaeva 1 St.Petersburg

More information

Optimal election of qualities in the presence of externalities

Optimal election of qualities in the presence of externalities Optimal election of qualities in the presence of externalities Dolores Garcia Maria Tugores October 2002 Abstract In this paper we obtain the quality and the level of production that a certain sector would

More information

DOES COPYRIGHT ENFORCEMENT ENCOURAGE PIRACY?

DOES COPYRIGHT ENFORCEMENT ENCOURAGE PIRACY? DOES COPYRIGHT ENFORCEMENT ENCOURAGE PIRACY? Rick Harbaugh Rahul Khemka Abstract When copyright enforcement is targeted at high-value buyers such as corporate and government users, the copyright holder

More information

Competition and Regulation. Lecture 2: Background on imperfect competition

Competition and Regulation. Lecture 2: Background on imperfect competition Competition and Regulation Lecture 2: Background on imperfect competition Monopoly A monopolist maximizes its profits, choosing simultaneously quantity and prices, taking the Demand as a contraint; The

More information

Economics of Insurance

Economics of Insurance Economics of Insurance In this last lecture, we cover most topics of Economics of Information within a single application. Through this, you will see how the differential informational assumptions allow

More information

Patent Litigation with Endogenous Disputes

Patent Litigation with Endogenous Disputes Patent itigation with Endogenous Disputes Presentation at the AEA Annual Meeting January 6, 006 Session: Intellectual Property, itigation, and Innovation By James Bessen and Michael J. Meurer James Bessen

More information

Gains from trade in a Hotelling model of differentiated duopoly

Gains from trade in a Hotelling model of differentiated duopoly Gains from trade in a Hotelling model of differentiated duopoly Kenji Fujiwara School of Economics, Kwansei Gakuin University and Department of Economics, McGill University August 8, 009 Abstract Constructing

More information

On Software Piracy when Piracy is Costly

On Software Piracy when Piracy is Costly n Software iracy when iracy is Costly Sougata oddar Department of Economics National University of Singapore (NUS 10 Kent Ridge Crescent Singapore 11960 E-mail: ecssp@nus.edu.sg January 004 Abstract The

More information

Foreclosure, Entry, and Competition in Platform Markets with Cloud

Foreclosure, Entry, and Competition in Platform Markets with Cloud Foreclosure, Entry, and Competition in Platform Markets with Cloud Mark J. Tremblay Department of Economics Michigan State University E-mail: trembl22@msu.edu August 27, 2015 Abstract Platforms in two-sided

More information

OPTIMAL DESIGN OF A MULTITIER REWARD SCHEME. Amir Gandomi *, Saeed Zolfaghari **

OPTIMAL DESIGN OF A MULTITIER REWARD SCHEME. Amir Gandomi *, Saeed Zolfaghari ** OPTIMAL DESIGN OF A MULTITIER REWARD SCHEME Amir Gandomi *, Saeed Zolfaghari ** Department of Mechanical and Industrial Engineering, Ryerson University, Toronto, Ontario * Tel.: + 46 979 5000x7702, Email:

More information

Sharing Online Advertising Revenue with Consumers

Sharing Online Advertising Revenue with Consumers Sharing Online Advertising Revenue with Consumers Yiling Chen 2,, Arpita Ghosh 1, Preston McAfee 1, and David Pennock 1 1 Yahoo! Research. Email: arpita, mcafee, pennockd@yahoo-inc.com 2 Harvard University.

More information

Two Papers on Internet Connectivity and Quality. Abstract

Two Papers on Internet Connectivity and Quality. Abstract Two Papers on Internet Connectivity and Quality ROBERTO ROSON Dipartimento di Scienze Economiche, Università Ca Foscari di Venezia, Venice, Italy. Abstract I review two papers, addressing the issue of

More information

PIRACY OF DIGITAL PRODUCTS: A CRITICAL REVIEW OF THE ECONOMICS LITERATURE

PIRACY OF DIGITAL PRODUCTS: A CRITICAL REVIEW OF THE ECONOMICS LITERATURE PIRACY OF DIGITAL PRODUCTS: A CRITICAL REVIEW OF THE ECONOMICS LITERATURE MARTIN PEITZ PATRICK WAELBROECK CESIFO WORKING PAPER NO. 1071 CATEGORY 9: INDUSTRIAL ORGANISATION NOVEMBER 2003 An electronic version

More information

Product Differentiation In homogeneous goods markets, price competition leads to perfectly competitive outcome, even with two firms Price competition

Product Differentiation In homogeneous goods markets, price competition leads to perfectly competitive outcome, even with two firms Price competition Product Differentiation In homogeneous goods markets, price competition leads to perfectly competitive outcome, even with two firms Price competition with differentiated products Models where differentiation

More information

A Detailed Price Discrimination Example

A Detailed Price Discrimination Example A Detailed Price Discrimination Example Suppose that there are two different types of customers for a monopolist s product. Customers of type 1 have demand curves as follows. These demand curves include

More information

Prices versus Exams as Strategic Instruments for Competing Universities

Prices versus Exams as Strategic Instruments for Competing Universities Prices versus Exams as Strategic Instruments for Competing Universities Elena Del Rey and Laura Romero October 004 Abstract In this paper we investigate the optimal choice of prices and/or exams by universities

More information

9.1 Cournot and Bertrand Models with Homogeneous Products

9.1 Cournot and Bertrand Models with Homogeneous Products 1 Chapter 9 Quantity vs. Price Competition in Static Oligopoly Models We have seen how price and output are determined in perfectly competitive and monopoly markets. Most markets are oligopolistic, however,

More information

Advantages and Disadvantages of a Two-SeasonRewards Program

Advantages and Disadvantages of a Two-SeasonRewards Program Loyalty Rewards Programs in the Face of Entry Ross A. Brater January 03 Abstract consider a two-period model of a horizontally differentiated product market which features an incumbent firm and a potential

More information

Research Article Pricing Model for Dual Sales Channel with Promotion Effect Consideration

Research Article Pricing Model for Dual Sales Channel with Promotion Effect Consideration Mathematical Problems in Engineering Volume 06 Article ID 80403 0 pages http://dxdoiorg/055/06/80403 Research Article Pricing Model for Dual Sales Channel with Promotion Effect Consideration Chuiri Zhou

More information

e-book Platform Competition in the Presence of Two-Sided Network Externalities

e-book Platform Competition in the Presence of Two-Sided Network Externalities 2012 45th Hawaii International Conference on System Sciences e-book Platform Competition in the Presence of Two-Sided Network Externalities Yabing Jiang Graduate School of Business Administration Fordham

More information

SOFTWARE PIRACY AND ITS IMPACT ON SOCIAL WELFARE 1

SOFTWARE PIRACY AND ITS IMPACT ON SOCIAL WELFARE 1 SOFTWARE PIRACY AND ITS IMPACT ON SOCIAL WELFARE 1 Toomas Hinnosaar Software piracy involves usage, copying, selling and distributing computer programmes without the permission of its producer. Software

More information

A Mobile Platform's Monetizing Strategy for Advertising. under Agency Pricing for App Sales. Notre Dame, IN, 46556 5646. Abstract

A Mobile Platform's Monetizing Strategy for Advertising. under Agency Pricing for App Sales. Notre Dame, IN, 46556 5646. Abstract A Mobile Platform's Monetizing Strategy for Advertising under Agency Pricing for App Sales Lin Hao 1 Hong Guo 1 Robert Easley 1 1 Department of Management, Mendoza College of Business, University of Notre

More information

Buyer Search Costs and Endogenous Product Design

Buyer Search Costs and Endogenous Product Design Buyer Search Costs and Endogenous Product Design Dmitri Kuksov kuksov@haas.berkeley.edu University of California, Berkeley August, 2002 Abstract In many cases, buyers must incur search costs to find the

More information

POMS Abstract - 020-0196

POMS Abstract - 020-0196 POMS Abstract - 020-0196 Optimal Pricing and Referral Reward Programs under Competition Run H. Niu School of Business and Technology Webster University St. Louis, Missouri, USA Paul R. Messinger School

More information

Forthcoming in Research Papers Series, SU- HSE, Research in Economics and Finance, May 2010

Forthcoming in Research Papers Series, SU- HSE, Research in Economics and Finance, May 2010 Forthcoming in Research Papers Series, SU- HSE, Research in Economics and Finance, May 2010 How Does Income Inequality Affect Market Outcomes in Vertically Differentiated Markets? Anna V. Yurko State University

More information

ECON 312: Oligopolisitic Competition 1. Industrial Organization Oligopolistic Competition

ECON 312: Oligopolisitic Competition 1. Industrial Organization Oligopolistic Competition ECON 312: Oligopolisitic Competition 1 Industrial Organization Oligopolistic Competition Both the monopoly and the perfectly competitive market structure has in common is that neither has to concern itself

More information

Piracy and Network Externality An Analysis for the Monopolized Software Industry

Piracy and Network Externality An Analysis for the Monopolized Software Industry Piracy and Network Externality An Analysis for the Monoolized Software Industry Ming Chung Chang Deartment of Economics and Graduate Institute of Industrial Economics mcchang@mgt.ncu.edu.tw Chiu Fen Lin

More information

Information Exchanges Among Firms and their Impact on Competition*

Information Exchanges Among Firms and their Impact on Competition* Information Exchanges Among Firms and their Impact on Competition* Kai-Uwe Kühn Xavier Vives Institut d'anàlisi Econòmica (CSIC) Barcelona June 1994 Revised December 1994 *We are grateful to Paco Caballero,

More information

Part IV. Pricing strategies and market segmentation

Part IV. Pricing strategies and market segmentation Part IV. Pricing strategies and market segmentation Chapter 9. Menu pricing Slides Industrial Organization: Markets and Strategies Paul Belleflamme and Martin Peitz Cambridge University Press 2010 Chapter

More information

Documents de Travail du Centre d Economie de la Sorbonne

Documents de Travail du Centre d Economie de la Sorbonne Documents de Travail du Centre d Economie de la Sorbonne Trade Liberalization and Optimal R&D Policies with Process Innovation Thanh LE, Cuong LE VAN 014.79 Maison des Sciences Économiques, 106-11 boulevard

More information

Digital rights management (DRM) is an important yet controversial issue in the information goods markets.

Digital rights management (DRM) is an important yet controversial issue in the information goods markets. Articles in Advance, pp. 1 17 issn 0732-2399 eissn 1526-548X http://dx.doi.org/10.1287/mksc.1110.0668 2011 INFORMS Music Downloads and the Flip Side of Digital Rights Management Dinah A. Vernik Jesse H.

More information

2. Information Economics

2. Information Economics 2. Information Economics In General Equilibrium Theory all agents had full information regarding any variable of interest (prices, commodities, state of nature, cost function, preferences, etc.) In many

More information

When to Use the Open Business Model for Software Products under Network Effects?

When to Use the Open Business Model for Software Products under Network Effects? When to Use the Open Business Model for Software Products under Network Effects? Lizhen Xu, Marius F. Niculescu and D. J. Wu Scheller College of Business, Georgia Institute of Technology, Atlanta, GA 30308

More information

Should Ad Networks Bother Fighting Click Fraud? (Yes, They Should.)

Should Ad Networks Bother Fighting Click Fraud? (Yes, They Should.) Should Ad Networks Bother Fighting Click Fraud? (Yes, They Should.) Bobji Mungamuru Stanford University bobji@i.stanford.edu Stephen Weis Google sweis@google.com Hector Garcia-Molina Stanford University

More information

Extreme cases. In between cases

Extreme cases. In between cases CHAPTER 16 OLIGOPOLY FOUR TYPES OF MARKET STRUCTURE Extreme cases PERFECTLY COMPETITION Many firms No barriers to entry Identical products MONOPOLY One firm Huge barriers to entry Unique product In between

More information

Digital Music Set Free: The Flip Side of DRM

Digital Music Set Free: The Flip Side of DRM Digital Music Set Free: The Flip Side of DRM Dinah A. Vernik The Fuqua School of Business, Duke University, dinah.vernik@duke.edu Working paper October 27, 2008 Digital rights management (DRM) refers to

More information

Back to software profitable piracy : the role of information diffusion

Back to software profitable piracy : the role of information diffusion Back to software profitable piracy : the role of information diffusion Eric Darmon, Alexandra Rufini, Dominique Torre To cite this version: Eric Darmon, Alexandra Rufini, Dominique Torre. Back to software

More information

Applying CRM in Information Product Pricing

Applying CRM in Information Product Pricing Applying CRM in Information Product Pricing Wenjing Shang, Hong Wu and Zhimin Ji School of Economics and Management, Beijing University of Posts and Telecommunications, Beijing100876, P.R. China shang_wj83@yahoo.com.cn

More information

MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question.

MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question. Economics 103 Spring 2012: Multiple choice review questions for final exam. Exam will cover chapters on perfect competition, monopoly, monopolistic competition and oligopoly up to the Nash equilibrium

More information

OLIGOPOLY. Nature of Oligopoly. What Causes Oligopoly?

OLIGOPOLY. Nature of Oligopoly. What Causes Oligopoly? CH 11: OLIGOPOLY 1 OLIGOPOLY When a few big firms dominate the market, the situation is called oligopoly. Any action of one firm will affect the performance of other firms. If one of the firms reduces

More information

How To Understand The Economic Theory Of Piracy

How To Understand The Economic Theory Of Piracy Department of Economics Working aper No. 0515 http://nt.fas.nus.edu.sg/ecs/pub/wp/wp0515.pdf Why Software iracy Rates Differ A Theoretical Analysis by Sougata oddar 005 Sougata oddar. Views expressed herein

More information

Market Structure: Duopoly and Oligopoly

Market Structure: Duopoly and Oligopoly WSG10 7/7/03 4:24 PM Page 145 10 Market Structure: Duopoly and Oligopoly OVERVIEW An oligopoly is an industry comprising a few firms. A duopoly, which is a special case of oligopoly, is an industry consisting

More information

УРАГШАА MONGOLIA! FROM SOFTWARE PIRACY TO LICENSE COMPLIANCE. Evgeny DANILOV. Microsoft Central and Eastern Europe Multi-Country New Markets

УРАГШАА MONGOLIA! FROM SOFTWARE PIRACY TO LICENSE COMPLIANCE. Evgeny DANILOV. Microsoft Central and Eastern Europe Multi-Country New Markets УРАГШАА MONGOLIA! FROM SOFTWARE PIRACY TO LICENSE COMPLIANCE Evgeny DANILOV Microsoft Central and Eastern Europe Multi-Country New Markets Embracing the IT Change Stronger IPR Protection What is the Software

More information

The Importance of Brand Name and Quality in the Retail Food Industry

The Importance of Brand Name and Quality in the Retail Food Industry The Importance of Brand ame and Quality in the Retail Food Industry Contact Information Eidan Apelbaum Department of Agricultural & Resource Economics 16 Soc Sci & Humanities Bldg University of California,

More information

Game Theory: Supermodular Games 1

Game Theory: Supermodular Games 1 Game Theory: Supermodular Games 1 Christoph Schottmüller 1 License: CC Attribution ShareAlike 4.0 1 / 22 Outline 1 Introduction 2 Model 3 Revision questions and exercises 2 / 22 Motivation I several solution

More information

Problem Set 9 Solutions

Problem Set 9 Solutions Problem Set 9 s 1. A monopoly insurance company provides accident insurance to two types of customers: low risk customers, for whom the probability of an accident is 0.25, and high risk customers, for

More information

Oligopoly and Strategic Pricing

Oligopoly and Strategic Pricing R.E.Marks 1998 Oligopoly 1 R.E.Marks 1998 Oligopoly Oligopoly and Strategic Pricing In this section we consider how firms compete when there are few sellers an oligopolistic market (from the Greek). Small

More information

Models of Imperfect Competition

Models of Imperfect Competition Models of Imperfect Competition Monopolistic Competition Oligopoly Models of Imperfect Competition So far, we have discussed two forms of market competition that are difficult to observe in practice Perfect

More information

Terry College of Business - ECON 7950

Terry College of Business - ECON 7950 Terry College of Business - ECON 7950 Lecture 9: Product Differentiation Primary reference: McAfee, Competitive Solutions, Ch. 4 Differentiated Products When products are differentiated, competition does

More information

A Simple Model of Price Dispersion *

A Simple Model of Price Dispersion * Federal Reserve Bank of Dallas Globalization and Monetary Policy Institute Working Paper No. 112 http://www.dallasfed.org/assets/documents/institute/wpapers/2012/0112.pdf A Simple Model of Price Dispersion

More information

Please Do not Circulate Preliminary and Incomplete Mixed Bundling and Imperfect Competition

Please Do not Circulate Preliminary and Incomplete Mixed Bundling and Imperfect Competition Abstract A model of two-product, Hotelling duopolists is examined in which firms can engage in mixed bundling. Even though products are independent in consumption, bundled pricing induces complementarity

More information

Chapter 11 Pricing Strategies for Firms with Market Power

Chapter 11 Pricing Strategies for Firms with Market Power Managerial Economics & Business Strategy Chapter 11 Pricing Strategies for Firms with Market Power McGraw-Hill/Irwin Copyright 2010 by the McGraw-Hill Companies, Inc. All rights reserved. Overview I. Basic

More information

The Economics of Life Insurance Settlement

The Economics of Life Insurance Settlement The Economics of Life Insurance Settlement S. Hun Seog 1 Business School Seoul National University 599 Gwanak Ro, Gwanak Gu, Seoul, 151-916, Korea seogsh@snu.ac.kr Phone: +82-2-880-2552 Fax: +82-2-876-8411

More information

You Are What You Bet: Eliciting Risk Attitudes from Horse Races

You Are What You Bet: Eliciting Risk Attitudes from Horse Races You Are What You Bet: Eliciting Risk Attitudes from Horse Races Pierre-André Chiappori, Amit Gandhi, Bernard Salanié and Francois Salanié March 14, 2008 What Do We Know About Risk Preferences? Not that

More information

Technology platforms, such as Microsoft Windows, are the hubs of technology industries. We develop a

Technology platforms, such as Microsoft Windows, are the hubs of technology industries. We develop a MANAGEMENT SCIENCE Vol. 52, No. 7, July 2006, pp. 1057 1071 issn 0025-1909 eissn 1526-5501 06 5207 1057 informs doi 10.1287/mnsc.1060.0549 2006 INFORMS Two-Sided Competition of Proprietary vs. Open Source

More information

Monopolistic Competition

Monopolistic Competition Monopolistic Chapter 17 Copyright 2001 by Harcourt, Inc. All rights reserved. Requests for permission to make copies of any part of the work should be mailed to: Permissions Department, Harcourt College

More information

An Analysis of A Mobile Platform's In-App Advertising. Contract under Agency Pricing for App Sales ABSTRACT

An Analysis of A Mobile Platform's In-App Advertising. Contract under Agency Pricing for App Sales ABSTRACT An Analysis of A Mobile Platform's In-App Advertising Contract under Agency Pricing for App Sales Lin Hao 1 Hong Guo 1 Rob Easley 1 1 Mendoza College of Business, University of Notre Dame, Notre Dame,

More information

Labor Economics, 14.661. Lecture 3: Education, Selection, and Signaling

Labor Economics, 14.661. Lecture 3: Education, Selection, and Signaling Labor Economics, 14.661. Lecture 3: Education, Selection, and Signaling Daron Acemoglu MIT November 3, 2011. Daron Acemoglu (MIT) Education, Selection, and Signaling November 3, 2011. 1 / 31 Introduction

More information

Empirical Applying Of Mutual Funds

Empirical Applying Of Mutual Funds Internet Appendix for A Model of hadow Banking * At t = 0, a generic intermediary j solves the optimization problem: max ( D, I H, I L, H, L, TH, TL ) [R (I H + T H H ) + p H ( H T H )] + [E ω (π ω ) A

More information

Optimal Pricing Strategies for Open Source Support Providers*

Optimal Pricing Strategies for Open Source Support Providers* Asia Pacific Journal of Information Systems Vol. 23, No. 1, March 2013 1) Optimal Pricing Strategies for Open Source Support Providers* Byung Cho Kim** The market for commercial open source software (OSS)

More information

An analysis of strategies for protecting digital software products against the Internet piracy using econometric modeling

An analysis of strategies for protecting digital software products against the Internet piracy using econometric modeling An analysis of strategies for protecting digital software products against the Internet piracy using econometric modeling Alexey Laushkin Donetsk National University, Ukraine Structure of presentation

More information

Advertising. Sotiris Georganas. February 2013. Sotiris Georganas () Advertising February 2013 1 / 32

Advertising. Sotiris Georganas. February 2013. Sotiris Georganas () Advertising February 2013 1 / 32 Advertising Sotiris Georganas February 2013 Sotiris Georganas () Advertising February 2013 1 / 32 Outline 1 Introduction 2 Main questions about advertising 3 How does advertising work? 4 Persuasive advertising

More information

Imperfect Competition. Oligopoly. Types of Imperfectly Competitive Markets. Imperfect Competition. Markets With Only a Few Sellers

Imperfect Competition. Oligopoly. Types of Imperfectly Competitive Markets. Imperfect Competition. Markets With Only a Few Sellers Imperfect Competition Oligopoly Chapter 16 Imperfect competition refers to those market structures that fall between perfect competition and pure monopoly. Copyright 2001 by Harcourt, Inc. All rights reserved.

More information

Rutgers University Economics 102: Introductory Microeconomics Professor Altshuler Fall 2003

Rutgers University Economics 102: Introductory Microeconomics Professor Altshuler Fall 2003 Rutgers University Economics 102: Introductory Microeconomics Professor Altshuler Fall 2003 Answers to Problem Set 11 Chapter 16 2. a. If there were many suppliers of diamonds, price would equal marginal

More information

The Basics of Game Theory

The Basics of Game Theory Sloan School of Management 15.010/15.011 Massachusetts Institute of Technology RECITATION NOTES #7 The Basics of Game Theory Friday - November 5, 2004 OUTLINE OF TODAY S RECITATION 1. Game theory definitions:

More information

The Effects ofVariation Between Jain Mirman and JMC

The Effects ofVariation Between Jain Mirman and JMC MARKET STRUCTURE AND INSIDER TRADING WASSIM DAHER AND LEONARD J. MIRMAN Abstract. In this paper we examine the real and financial effects of two insiders trading in a static Jain Mirman model (Henceforth

More information

Piracy in Commercial vs. Open-Source Software Competition

Piracy in Commercial vs. Open-Source Software Competition Piracy in Commercial vs. Open-Source Software Competition Arne Rogde Gramstad University of Oslo May 15, 2014 Abstract I develop a model to study competition between a commercial software provider and

More information

Price Discrimination: Part 2. Sotiris Georganas

Price Discrimination: Part 2. Sotiris Georganas Price Discrimination: Part 2 Sotiris Georganas 1 More pricing techniques We will look at some further pricing techniques... 1. Non-linear pricing (2nd degree price discrimination) 2. Bundling 2 Non-linear

More information

The Impact of Professional Information Security Ratings on Vendor Competition 1 September 2009

The Impact of Professional Information Security Ratings on Vendor Competition 1 September 2009 The Impact of Professional Information Security Ratings on Vendor Competition 1 September 2009 Zach Z. Zhou Center for Digital Strategies The Tuck School of Business Dartmouth College zach.zhou@tuck.dartmouth.edu

More information

Deregulation of Shopping Hours: The Impact on Independent Retailers and Chain Stores

Deregulation of Shopping Hours: The Impact on Independent Retailers and Chain Stores No 03 Deregulation of Shopping Hours: The Impact on Independent Retailers and Chain Stores Tobias Wenzel September 2010 IMPRINT DICE DISCUSSION PAPER Published by Heinrich-Heine-Universität Düsseldorf,

More information

Estimating Consumer Switching Costs in the Danish Banking Industry

Estimating Consumer Switching Costs in the Danish Banking Industry Copenhagen Business School 2014 MSc in Business Administration and Management Science Estimating Consumer Switching Costs in the Danish Banking Industry by Frederik Vrangbæk Jensen Supervisor: Cédric Schneider

More information

Durable Goods Monopoly with Network Externalities with Application to the PC Operating Systems Market 1

Durable Goods Monopoly with Network Externalities with Application to the PC Operating Systems Market 1 Forthcoming, Quarterly Journal of Electronic Commerce, vol. 1, no. 3 (2000). Durable Goods Monopoly with Network Externalities with Application to the PC Operating Systems Market 1 by Nicholas Economides

More information

Richard Schmidtke: Private Provision of a Complementary Public Good

Richard Schmidtke: Private Provision of a Complementary Public Good Richard Schmidtke: Private Provision of a Complementary Public Good Munich Discussion Paper No. 2006-20 Department of Economics University of Munich Volkswirtschaftliche Fakultät Ludwig-Maximilians-Universität

More information

How To Get A License From A Business To A Computer (For A Business)

How To Get A License From A Business To A Computer (For A Business) Six Steps to Completing a Software Audit and Ensuring Compliance While Saving Money A Guide to Assessing Vulnerabilities and Ensuring Ongoing Software License Compliance 200 West Mercer Street Suite E300

More information

Oligopoly: How do firms behave when there are only a few competitors? These firms produce all or most of their industry s output.

Oligopoly: How do firms behave when there are only a few competitors? These firms produce all or most of their industry s output. Topic 8 Chapter 13 Oligopoly and Monopolistic Competition Econ 203 Topic 8 page 1 Oligopoly: How do firms behave when there are only a few competitors? These firms produce all or most of their industry

More information

Oligopoly and Trade. Notes for Oxford M.Phil. International Trade. J. Peter Neary. University of Oxford. November 26, 2009

Oligopoly and Trade. Notes for Oxford M.Phil. International Trade. J. Peter Neary. University of Oxford. November 26, 2009 Oligopoly and Trade Notes for Oxford M.Phil. International Trade J. Peter Neary University of Oxford November 26, 2009 J.P. Neary (University of Oxford) Oligopoly and Trade November 26, 2009 1 / 11 Oligopoly

More information

The Economics of E-commerce and Technology. Industry Analysis

The Economics of E-commerce and Technology. Industry Analysis The Economics of E-commerce and Technology Industry Analysis 1 10/1/2013 Industry Profits In Econ 11, Economic Profits = 0 In reality, many industries have much higher profits: 2 10/1/2013 Industry Analysis

More information

Market Structure: Perfect Competition and Monopoly

Market Structure: Perfect Competition and Monopoly WSG8 7/7/03 4:34 PM Page 113 8 Market Structure: Perfect Competition and Monopoly OVERVIEW One of the most important decisions made by a manager is how to price the firm s product. If the firm is a profit

More information

Economics 201 Fall 2010 Introduction to Economic Analysis Problem Set #6 Due: Wednesday, November 3

Economics 201 Fall 2010 Introduction to Economic Analysis Problem Set #6 Due: Wednesday, November 3 Economics 201 Fall 2010 Introduction to Economic Analysis Jeffrey Parker Problem Set #6 Due: Wednesday, November 3 1. Cournot Duopoly. Bartels and Jaymes are two individuals who one day discover a stream

More information

LECTURE #15: MICROECONOMICS CHAPTER 17

LECTURE #15: MICROECONOMICS CHAPTER 17 LECTURE #15: MICROECONOMICS CHAPTER 17 I. IMPORTANT DEFINITIONS A. Oligopoly: a market structure with a few sellers offering similar or identical products. B. Game Theory: the study of how people behave

More information

Schooling, Political Participation, and the Economy. (Online Supplementary Appendix: Not for Publication)

Schooling, Political Participation, and the Economy. (Online Supplementary Appendix: Not for Publication) Schooling, Political Participation, and the Economy Online Supplementary Appendix: Not for Publication) Filipe R. Campante Davin Chor July 200 Abstract In this online appendix, we present the proofs for

More information

How to Survive a Software Audit through Effective Software Management. By John Tomeny, Sassafras Software Inc.

How to Survive a Software Audit through Effective Software Management. By John Tomeny, Sassafras Software Inc. assafras oftware Box 150, Hanover, NH 03755 (603) 643-3351 http://www.sassafras.com info@sassafras.com How to Survive a Software Audit through Effective Software Management By John Tomeny, Sassafras Software

More information

WHY SHOULDN T YOU UPLOAD COPYRIGHTED MEDIA? BECAUSE YOU RISK: breaking the law downloading a serious computer virus sharing your personal data, which

WHY SHOULDN T YOU UPLOAD COPYRIGHTED MEDIA? BECAUSE YOU RISK: breaking the law downloading a serious computer virus sharing your personal data, which WHY SHOULDN T YOU UPLOAD COPYRIGHTED MEDIA? BECAUSE YOU RISK: breaking the law downloading a serious computer virus sharing your personal data, which can lead to identity theft getting exposed to pornographic

More information

A Game Theoretical Framework for Adversarial Learning

A Game Theoretical Framework for Adversarial Learning A Game Theoretical Framework for Adversarial Learning Murat Kantarcioglu University of Texas at Dallas Richardson, TX 75083, USA muratk@utdallas Chris Clifton Purdue University West Lafayette, IN 47907,

More information