ABSTRACT
We address a counterfeiter who pretends to be the legitimate producer of software or content, charges the same price as the latter and competes with her in the same market. We examine the legitimate producer's joint determination of the profit-maximizing price and intensity of monitoring the counterfeiter's illegal activity. Our approach involves an explicit solution of the profit-maximizing level of counterfeiting, based on a real probability of detection function. The analysis reveals that the profit-maximizing price is lower than the price set in the absence of counterfeiting and must be accompanied with some minimum level of monitoring to be positive. Depending on the level of counterfeiting, the profit-maximizing monitoring rate may rise or fall with an increase in the penalty rate or in the legitimate producer's share in the counterfeiter's fine and back payments, and may counter-intuitively rise with improvements in detection technology.
- Banerjee, D. S. 2003. Software Piracy: A strategic analysis and policy instruments. Int. J. Ind. Org. 21, 97--127.Google ScholarCross Ref
- Banerjee, D. S. 2006a. Lobbying and commercial software piracy. Eur. J. Pol. Ec. 22, 139--155.Google ScholarCross Ref
- Banerjee, D. S. 2006b. Enforcement sharing and commercial piracy. Rev. Ec. Res. Cop. Is. 3, 83--97.Google Scholar
- Corless, R. M., Gonnet, G. H., Hare, D. E. G., Jeffrey, D. J., and Knuth, D. E. 1996. On the Lambert W function. Adv. Comp. Math. 5, 329--359.Google ScholarCross Ref
- Kiema, I., 2006 Modeling Commercial Piracy of Information Goods. Discussion Paper No. 130. Helsinki Center of Economic Research, University of Helsinki, Finland.Google Scholar
- Varian, H. R. 1996 Economic Analysis of Copying. Unpublished Manuscript.Google Scholar
- Yao, J-T. 2005. Counterfeiting and an optimal monitoring policy. Eur. J. Law Ec. 19, 95--114.Google ScholarCross Ref
Index Terms
- Counterfeiting and anti-counterfeitingof software and content
Recommendations
Software Piracy: An Analysis of Protection Strategies
Software piracy by users is generally believed to harm both software firms through lower profits and buying customers through higher prices. Thus, it is thought that perfect and costless technological protection would benefit both firms and consumers. ...
RFID tag data processing in manufacturing for track-and-trace anti-counterfeiting
We address the issues in e-pedigree management for RFID-based track-and-trace anti-counterfeiting.We propose an algorithm for RFID tag data processing and synchronization (TDPS) to generate initial e-pedigree for apparel products during production.We ...
On the Use of Overt Anti-Counterfeiting Technologies
Many pharmaceutical companies use overt anti-counterfeiting technologies OACTs, such as holograms, to fight counterfeiters. An OACT is typically implemented on the drug packaging, which makes it difficult for counterfeiters to produce convincing copies ...
Comments