2008
DOI: 10.1007/s00712-008-0019-x
|View full text |Cite
|
Sign up to set email alerts
|

Piracy and limited liability

Abstract: Piracy, Limited liability, Income distribution, L12, O34,

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
3
0

Year Published

2010
2010
2020
2020

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 31 publications
0
3
0
Order By: Relevance
“…They argue that piracy is a major factor in a monopolistic software producer's decision matrix of efficiency and quality in the short and long run. Chang et al (2008) research ender‐user piracy in a monopolized software industry setting in which consumers have a heterogeneous income and limited liability. Other important studies using utility functions include Johnson (1985), Novos and Waldman (1984), Shy and Thisse (1999), Gayer and Shy (2003), Gayer and Shy (2000), Qiu (2006) and Kiema (2008).…”
Section: Methodologies Used In Piracy Studiesmentioning
confidence: 99%
“…They argue that piracy is a major factor in a monopolistic software producer's decision matrix of efficiency and quality in the short and long run. Chang et al (2008) research ender‐user piracy in a monopolized software industry setting in which consumers have a heterogeneous income and limited liability. Other important studies using utility functions include Johnson (1985), Novos and Waldman (1984), Shy and Thisse (1999), Gayer and Shy (2003), Gayer and Shy (2000), Qiu (2006) and Kiema (2008).…”
Section: Methodologies Used In Piracy Studiesmentioning
confidence: 99%
“…If the pirate's illegal operations are 2 See Peitz and Waelbroeck (2006) for a survey of piracy in which copies are made exclusively by end consumers. 3 Limit price has been analyzed in models with end-user copying, as in Bae and Choi (2006) and Chang et al (2008). 4 See López-Cuñat and Martínez-Sánchez (2010) for a critical, detailed analysis of Banerjee's model.…”
Section: The Modelmentioning
confidence: 99%
“…Therefore, the incumbent commits to the price of the original product. We will discuss later the relaxation of such hypothesis.4 Piracy deterrence has been analyzed in models with end-users copying, as inBae and Choi (2006) andChang et al (2008).5 The pirate decides first on entry an then, in the case of entry, the pirate and the incumbent make simultaneous decisions on prices.…”
mentioning
confidence: 99%