Skip to main content
Log in

Optimal Piracy Control: Should a Firm Implement Digital Rights Management?

  • Published:
Information Systems Frontiers Aims and scope Submit manuscript

Abstract

Many firms offer digital rights management (DRM) technologies to increase the piracy cost, thereby protecting illegal copy and distribution. However, many industrial cases contradict the speculation that using DRM technologies reduces legal users’ net value. Therefore, we develop a theoretical model to examine the trade-off based on consumer heterogeneity in piracy cost sensitivity to explore under what conditions a monopoly implements DRM policy. In the model, we categorize pirates into two types according to their behaviours in the piracy process. We find that adopting DRM restriction is profitable to the firm when the level of DRM restriction is high. The optimal restriction level is the maximal technological level when piracy cost is high and the maximal technological level is higher than a threshold. In addition, we derive that the firm should implement policies to prevent downloading unauthorized products shared by other legal users from a P2P network. When both piracy cost and DRM restriction level are low, a lower piracy cost increases the firm’s profit.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  • Al-Rafee, S., & Cronan, T. P. (2006). Digital piracy: Factors that influence attitude toward behavior. Journal of Business Ethics, 63(3), 237–259.

    Google Scholar 

  • Asongu, S. A., Singh, P., & Le Roux, S. (2018). Fighting software piracy: Some global conditional policy instruments. Journal of Business Ethics, 152(1), 175–189.

    Google Scholar 

  • Bae, S. H., & Choi, J. P. (2006). A model of piracy. Information Economics and Policy, 18(3), 303–320.

    Google Scholar 

  • Banerjee, D. S. (2003). Software piracy: A strategic analysis and policy instruments. International Journal of Industrial Organization, 21(1), 97–127.

    Google Scholar 

  • Bhattacharjee, S., Gopal, R. D., Lertwachara, K., & Marsden, J. R. (2006a). Consumer search and retailer strategies in the presence of online music sharing. Journal of Management Information Systems, 23(1), 129–159.

    Google Scholar 

  • Bhattacharjee, S., Gopal, R. D., Lertwachara, K., & Marsden, J. R. (2006b). Impact of legal threats on online music sharing activity: An analysis of music industry legal actions. The Journal of Law and Economics, 49(1), 91–114.

    Google Scholar 

  • Business Software Alliance (BSA) (2016). BSA Global Software Survey: Seizing opportunity through license compliance. REPORT, BSA, Washington, DC.

  • Chellappa, R. K., & Shivendu, S. (2005). Managing piracy: Pricing and sampling strategies for digital experience goods in vertically segmented markets. Information Systems Research, 16(4), 400–417.

    Google Scholar 

  • Chen, Y. N., & Png, I. (2003). Information goods pricing and copyright enforcement: Welfare analysis. Information Systems Research, 14(1), 107–123.

    Google Scholar 

  • Choi, P., Bae, S. H., & Jun, J. (2010). Digital piracy and firms’ strategic interactions: The effects of public copy protection and DRM similarity. Information Economics and Policy, 22(4), 354–364.

    Google Scholar 

  • Conner, K. R., & Rumelt, R. P. (1991). Software piracy: An analysis of protection strategies. Management Science, 37(2), 125–139.

    Google Scholar 

  • Dey, D., Kim, A., & Lahiri, A. (2018). Online piracy and the “longer arm” of enforcement. Management Science. https://doi.org/10.1287/mnsc.2017.2984.

  • Ernesto. (2008). Top 10 most pirated games of 2008. https://torrentfreak.com/top-10-most-pirated-games-of-2008-081204/. Accessed 23 Aug 2017.

  • Fan, M., Kumar, S., & Whinston, A. B. (2009). Short-term and long-term competition between providers of shrink-wrap software and software as a service. European Journal of Operational Research, 196(2), 661–671.

    Google Scholar 

  • Frattolillo, F. (2017). A digital rights management system based on cloud. TELKOMNIKA (Telecommunication Computing Electronics and Control), 15(2), 671–677.

    Google Scholar 

  • Gans, J. S. (2015). “Selling out” and the impact of music piracy on artist entry. Information Economics and Policy, 32, 58–64.

    Google Scholar 

  • Glass, R. S., & Wood, W. A. (1996). Situational determinants of software piracy: An equity theory perspective. Journal of Business Ethics, 15(11), 1189–1198.

    Google Scholar 

  • Godinho de Matos, M., Ferreira, P., & Smith, M. D. (2017). The effect of subscription video-on-demand on piracy: Evidence from a household-level randomized experiment. Management Science, 64, 5610–5630. https://doi.org/10.1287/mnsc.2017.2875.

    Article  Google Scholar 

  • Gopal, R. D., & Gupta, A. (2010). Trading higher software piracy for higher profits: The case of phantom piracy. Management Science, 56(1), 1946–1962.

    Google Scholar 

  • Gopal, R. D., & Sanders, G. L. (1997). Preventive and deterrent controls for software piracy. Journal of Management Information Systems, 13(4), 29–47.

    Google Scholar 

  • Gopal, R. D., & Sanders, G. L. (1998). International software piracy: Analysis of key issues and impacts. Information Systems Research, 9(4), 380–397.

    Google Scholar 

  • Greenberg, A., & Irwin, M. J. (2008). Spore’s piracy problem. https://www.forbes.com/2008/09/12/spore-drm-piracy-tech-security-cx_ag_mji_0912spore.html#249ba0ed2614. Accessed 25 Aug 2017.

  • Guo, L., & Meng, X. (2014). Digital content provision and optimal copyright protection. Management Science, 61(5), 1183–1196.

    Google Scholar 

  • Herings, P. J. J., Peeters, R., & Yang, M. S. (2018). Piracy on the internet: Accommodate it or fight it? A dynamic approach. European Journal of Operational Research, 266(1), 328–339.

    Google Scholar 

  • Huang, Y. S., Lin, S. H., & Fang, C. C. (2017). Pricing and coordination with consideration of piracy for digital goods in supply chains. Journal of Business Research, 77, 30–40.

    Google Scholar 

  • Husted, B. W. (2000). The impact of national culture on software piracy. Journal of Business Ethics, 26(3), 197–211.

    Google Scholar 

  • Jain, S. (2008). Digital piracy: A competitive analysis. Marketing Science, 27(4), 610–626.

    Google Scholar 

  • Jaisingh, J. (2009). Impact of piracy on innovation at software firms and implications for piracy policy. Decision Support Systems, 46(4), 763–773.

    Google Scholar 

  • Jobs, S. 2007. Thoughts on music. Apple (February 6) http://www.apple.com/fr/hotnews/thoughtsonmusic/. Accessed 17 Aug 2017.

  • Khouja, M., & Smith, M. A. (2007). Optimal pricing for information goods with piracy and saturation effect. European Journal of Operational Research, 176(1), 482–497.

    Google Scholar 

  • Khouja, M., Hadzikadic, M., Rajagopalan, H. K., & Tsay, L. (2008). Application of complex adaptive systems to pricing of reproducible information goods. Decision Support Systems, 44(3), 725–739.

    Google Scholar 

  • Kogan, K., Ozinci, Y., & Perlman, Y. (2013). Containing piracy with product pricing, updating and protection investments. International Journal of Production Economics, 144(2), 468–478.

    Google Scholar 

  • Koklic, M. K., Kukar-Kinney, M., & Vida, I. (2016). Three-level mechanism of consumer digital piracy: Development and cross-cultural validation. Journal of Business Ethics, 134(1), 15–27.

    Google Scholar 

  • Koroush, G. (2008). PC game piracy examined: Page 8. http://www.tweakguides.com/Piracy_8.html. Accessed 3 Oct 2017.

  • Lahiri, A., & Dey, D. (2013). Effects of piracy on quality of information goods. Management Science, 59(1), 245–264.

    Google Scholar 

  • Leung, T. C. (2015). Music piracy: Bad for record sales but good for the iPod? Information Economics and Policy, 31, 1–12.

    Google Scholar 

  • Li, S., Cheng, H. K., & Jin, Y. (2018). Optimal distribution strategy for Enterprise software: Retail, SaaS, or dual channel? Production and Operations Management, 27(11), 1928–1939.

    Google Scholar 

  • Liu, E., Liu, Z., & Shao, F. (2014). Digital rights management and access control in multimedia social networks. In Genetic and evolutionary computing (pp. 257–266). Cham: Springer.

    Google Scholar 

  • Ma, L., Montgomery, A. L., Singh, P. V., & Smith, M. D. (2014). An empirical analysis of the impact of pre-release movie piracy on box office revenue. Information Systems Research, 25(3), 590–603.

    Google Scholar 

  • Ma, Z., Jiang, M., Gao, H., & Wang, Z. (2018). Blockchain for digital rights management. Future Generation Computer Systems, 89, 746–764.

    Google Scholar 

  • Machado, F. S., Sainam, P., Raghu, T. S., & Sinha, R. (2017). Software piracy in the presence of open source alternatives. Journal of the Association for Information Systems, 18(1), 1–21.

    Google Scholar 

  • Nan, G., Wu, D., Li, M., & Tan, Y. (2018). Optimal freemium strategy for information goods in the presence of piracy. Journal of the Association for Information Systems, 19(4), 266–305.

    Google Scholar 

  • Ning, Y., Xu, S. X., Yan, M., & Huang, G. Q. (2018). Digital pricing with piracy and variety seeking. International Journal of Production Economics, 206, 184–195.

    Google Scholar 

  • Papies, D., & van Heerde, H. J. (2017). The dynamic interplay between recorded music and live concerts: The role of piracy, unbundling, and artist characteristics. Journal of Marketing, 81(4), 67–87.

    Google Scholar 

  • Prasad, A., & Mahajan, V. (2003). How many pirates should a software firm tolerate?: An analysis of piracy protection on the diffusion of software. International Journal of Research in Marketing, 20(4), 337–353.

    Google Scholar 

  • Rojas, C., & Briceño, A. (2019). The effects of piracy on competition: Evidence from subscription TV. International Journal of Industrial Organization, 63, 18–43.

    Google Scholar 

  • Sinha, R. K., Machado, F. S., & Sellman, C. (2010). Don't think twice, it's all right: Music piracy and pricing in a DRM-free environment. Journal of Marketing, 74(2), 40–54.

    Google Scholar 

  • Sun, D., Easley, R., & Kim, B. C. (2015). Optimal digital rights management with uncertain piracy. Decision Sciences, 46(1), 165–191.

    Google Scholar 

  • Sundararajan, A. (2004). Managing digital piracy: Pricing and protection. Information Systems Research, 15(3), 287–308.

    Google Scholar 

  • Udo, G., Bagchi, K., & Maity, M. (2016). Exploring factors affecting digital piracy using the norm activation and UTAUT models: The role of national culture. Journal of Business Ethics, 135(3), 517–541.

    Google Scholar 

  • Ugale, K. S., Mune, A., & Deshmukh, H. R. (2017). Digital rights management by using cloud computing. International Journal of Computer Engineering and Information Technology, 9(4), 67.

    Google Scholar 

  • Vernik, D. A., Purohit, D., & Desai, P. S. (2011). Music downloads and the flip side of digital rights management. Marketing Science, 30(6), 1011–1027.

    Google Scholar 

  • Waters, J. (2015). Welfare implications of piracy with dynamic pricing and heterogeneous consumers. European Journal of Operational Research, 240(3), 904–911.

    Google Scholar 

  • Wu, S., & Chen, P. (2008). Versioning and piracy control for digital information goods. Operations Research, 56(1), 157–172.

    Google Scholar 

  • Wu, D., Nan, G., & Li, M. (2018). Optimal software upgrade strategy: Should we sell products or premium services in the presence of piracy? Electronic Commerce Research and Applications, 28, 219–229.

    Google Scholar 

  • Yang, Z., & Wang, J. (2015). Differential effects of social influence sources on self-reported music piracy. Decision Support Systems, 69, 70–81.

    Google Scholar 

  • Yoon, C. (2011). Theory of planned behavior and ethics theory in digital piracy: An integrated model. Journal of Business Ethics, 100(3), 405–417.

    Google Scholar 

  • Zhang, L. (2016). Intellectual property strategy and the long tail: Evidence from the recorded music industry. Management Science, 64(1), 24–42.

    Google Scholar 

  • Zhang, J., Cai, J., & Zhang, Z. (2017). A novel digital rights management mechanism on peer-to-peer streaming system. In Advances in intelligent information hiding and multimedia signal processing (pp. 243–250). Cham: Springer.

    Google Scholar 

Download references

Acknowledgements

This research is partially supported by research grant from the National Science Foundation of China (No.71471128) and the Key Program of National Natural Science Foundation of China (No.71631003).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Guofang Nan.

Ethics declarations

Conflict of Interest

All authors declare that they have no conflict of interest.

Human and Animal Rights Statement

This article does not contain any studies with human participants or animals performed by any of the authors.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Appendix

Appendix

1.1 Proof of Proposition 1

Differentiating \( {D}_P^{\ast } \) with respect to f, we derive that \( \frac{\partial {D}_P^{\ast }}{\partial f}=\frac{-\gamma \left(\delta -1\right)\beta -\left(h-1\right)\beta v}{2\delta \Big){f}^2} \). Therefore, we obtain that \( \frac{\partial {D}_P^{\ast }}{\partial f}>0 \) when \( \updelta <1+\frac{v- hv}{\gamma } \), while we derive \( \frac{\partial {D}_P^{\ast }}{\partial f}<0 \) when \( \updelta >1+\frac{v- hv}{\gamma } \).

1.2 Proof of Proposition 2

Differentiating π with respect to f, we derive that

$$ \frac{\partial {\pi}^{\ast }}{\partial f}=-\frac{\left(\left(\updelta -1\right)\upgamma \upbeta +\updelta \mathrm{f}-\upbeta \mathrm{v}\left(\mathrm{h}-1\right)\right)\left(\left(\updelta -1\right)\upgamma \upbeta +\updelta \mathrm{f}+\upbeta \mathrm{v}\left(\mathrm{h}-1\right)\right)}{4\delta {f}^2}. $$

We divide the results into several parts as follows:

  1. (a)

    when \( \updelta <1+\frac{v- hv}{\gamma } \), we have

  1. (1)

    if \( \mathrm{f}<-\frac{\beta \left(\delta \gamma + hv-\gamma -v\right)}{\delta } \), we derive \( \frac{\partial {\pi}^{\ast }}{\partial f}<0 \).

  2. (2)

    if \( \mathrm{f}>-\frac{\beta \left(\delta \gamma + hv-\gamma -v\right)}{\delta } \), we derive \( \frac{\partial {\pi}^{\ast }}{\partial f}>0 \).

  1. (b)

    when \( \updelta >1+\frac{v- hv}{\gamma } \), we have \( \frac{\partial {\pi}^{\ast }}{\partial f}>0 \).

1.3 Proof of Proposition 3

Differentiating \( {D}_P^{\ast } \) with respect to β, we derive that \( \frac{\partial {D}_P^{\ast }}{\partial \beta }=\frac{\updelta \upgamma -\upgamma +\mathrm{v}\left(\mathrm{h}-1\right)}{2\delta f}. \) Therefore, we obtain that \( \frac{\partial {D}_P^{\ast }}{\partial \beta }>0 \) when \( \updelta >1+\frac{v- hv}{\gamma } \), while we derive \( \frac{\partial {D}_P^{\ast }}{\partial \beta }<0 \) when \( \updelta <1+\frac{v- hv}{\gamma } \).

1.4 Proof of Proposition 4

Differentiating π with respect to β, we derive that

$$ \frac{\partial {\pi}^{\ast }}{\partial \beta }=\frac{\left(\gamma -\delta \gamma +v\left(1-h\right)\right)\left(\delta f+\beta \left(v\left(1-h\right)+\gamma \left(1-\delta \right)\right)\right)}{2\delta f}>0. $$

1.5 Proof of Proposition 5

Differentiating \( {D}_P^{\ast } \) with respect to δ, we derive that \( \frac{\partial {D}_P^{\ast }}{\partial \delta }=-\frac{\beta \left(\left(h-1\right)v-\gamma \right)}{2f{\delta}^2}>0 \).

1.6 Proof of Proposition 6

Differentiating π with respect to δ, we derive that

$$ \frac{\partial {\pi}^{\ast }}{\partial \delta }=\frac{\left(\updelta \mathrm{f}+\upbeta \left(\left(\mathrm{h}-1\right)\mathrm{v}-\upgamma -\updelta \upgamma \right)\right)\left(\updelta \mathrm{f}+\upbeta \left(\mathrm{v}\left(1-\mathrm{h}\right)+\upgamma -\updelta \upgamma \right)\right)}{4f{\delta}^2}. $$

We divide the results into several parts as follows:

  1. (a)

    when βγ > f, we derive \( \frac{\partial {\pi}^{\ast }}{\partial \delta }<0 \).

  2. (b)

    when γβ < f, we have \( \frac{\partial {\pi}^{\ast }}{\partial \delta }<0 \) if and only if \( \updelta <-\frac{\upbeta \left(\mathrm{v}+\upgamma -\mathrm{hv}\right)}{\beta \gamma -f} \), while we derive \( \frac{\partial {\pi}^{\ast }}{\partial \delta }>0 \) if and only if \( \updelta >-\frac{\upbeta \left(\mathrm{v}+\upgamma -\mathrm{hv}\right)}{\beta \gamma -f} \).

1.7 Proof of Proposition 7

Note that \( {\pi}^{\ast }-{\pi}_N^{\ast }=\frac{\left(\updelta -1\right)\left(\left({\gamma}^2\updelta -{\left(\left(h-1\right)v-\gamma \right)}^2\right)\right){\beta}^2-2 f\beta \gamma \delta +\delta {f}^2\Big)}{4\delta f} \). Thus, we have \( {\pi}^{\ast }>{\pi}_N^{\ast } \) if \( \delta >\frac{\beta^2\left({\left( hv-\gamma \right)}^2+v\left(v-2 hv+2\gamma \right)\right)}{{\left(f-\beta \gamma \right)}^2} \), while we have \( {\pi}^{\ast }<{\pi}_N^{\ast } \) if \( \delta <\frac{\beta^2\left({\left( hv-\gamma \right)}^2+v\left(v-2 hv+2\gamma \right)\right)}{{\left(f-\beta \gamma \right)}^2} \).

1.8 Proof of Proposition 8

The firm optimize its profit \( \pi =p\left(1-\frac{\beta \delta \gamma + h\beta v-\beta \gamma +p-\beta v}{f\delta}\right) \) by determining the optimal price. The optimal price is characterized by the first-order conditions of π and we can derive the price p(δ) = ( + βv + βγ − βδγ − βvh)/2. Substituting this price into the profit function, we derive the following results:

  1. (a)

    when βγ > f, we derive δ = 1.

  2. (b)

    when βγ < f, we have δ = 1 if and only if \( \overline{\delta}<\frac{\beta^2\left({\left( hv-\gamma \right)}^2+v\left(v-2 hv+2\gamma \right)\right)}{{\left(f-\beta \gamma \right)}^2} \), while we derive \( {\delta}^{\ast }=\overline{\delta} \) if and only if \( \overline{\delta}>\frac{\beta^2\left({\left( hv-\gamma \right)}^2+v\left(v-2 hv+2\gamma \right)\right)}{{\left(f-\beta \gamma \right)}^2} \).

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Wu, D., Nan, G. & Li, M. Optimal Piracy Control: Should a Firm Implement Digital Rights Management?. Inf Syst Front 22, 947–960 (2020). https://doi.org/10.1007/s10796-019-09907-z

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10796-019-09907-z

Keywords

Navigation