Piracy and the Legitimate Demand for Recorded Music
暂无分享,去创建一个
[1] Pinar Karaca-Mandic,et al. Network Effects in Technology Adoption: The Case of DVD Players - eScholarship , 2003 .
[2] H. Holm. Can economic theory explain piracy behavior? , 2003 .
[3] H. Varian. BUYING, SHARING AND RENTING INFORMATION GOODS* , 2003 .
[4] Ivan Png,et al. Information Goods Pricing and Copyright Enforcement: Welfare Analysis , 2003, Inf. Syst. Res..
[5] Assaf Jacob,et al. PREACH FOR A BREACH: SELECTIVE ENFORCEMENT OF COPYRIGHTS AS AN OPTIMAL MONOPOLISTIC BEHAVIOR , 2002 .
[6] Antonio Rodr ´ iguez. The European Software Piracy: An Empirical Application ⁄ , 2002 .
[7] Ram D. Gopal,et al. Global software piracy: you can't get blood out of a turnip , 2000, CACM.
[8] B. Husted. The Impact of National Culture on Software Piracy , 2000 .
[9] Assaf Jacob,et al. A Preach for a Breach: Promoting Copyright Infringements as an Optimal Monopolistic Behavior , 2000 .
[10] David G Steel,et al. Which Countries Protect Intellectual Property? The Case of Software Piracy , 2000 .
[11] Oz Shy,et al. A strategic approach to software protection , 1999 .
[12] Ivan P. L. Png,et al. Software pricing and copyright enforcement: private profit vis-a-vis social welfare , 1999, ICIS.
[13] Yannis Bakos,et al. Shared Information Goods , 1999 .
[14] Ram D. Gopal,et al. International Software Piracy: Analysis of Key Issues and Impacts , 1998, Inf. Syst. Res..
[15] H. Varian,et al. VERSIONING: THE SMART WAY TO SELL INFORMATION , 1998 .
[16] Neil Gandal,et al. The Dynamics of Technological Adoption in Hardware/Software Systems , 1997 .
[17] Lisa N. Takeyama. The Intertemporal Consequences of Unauthorized Reproduction of Intellectual Property1 , 1997, The Journal of Law and Economics.
[18] Ram D. Gopal,et al. Preventive and Deterrent Controls for Software Piracy , 1997, J. Manag. Inf. Syst..
[19] Robert D. Tollison,et al. Economics and the architecture of popular music , 1997 .
[20] Vijay Mahajan,et al. Software Piracy: Estimation of Lost Sales and the Impact on Software Diffusion , 1995 .
[21] Edi Karni,et al. Social Attributes and Strategic Equilibrium: A Restaurant Pricing Game , 1994, Journal of Political Economy.
[22] Lisa N. Takeyama. The Welfare Implications of Unauthorized Reproduction of Intellectual Property in the Presence of Demand Network Externalities , 1994 .
[23] S. Bikhchandani,et al. You have printed the following article : A Theory of Fads , Fashion , Custom , and Cultural Change as Informational Cascades , 2007 .
[24] G. Becker,et al. A Note on Restaurant Pricing and Other Examples of Social Influences on Price , 1991, Journal of Political Economy.
[25] K. R. Conner,et al. Software piracy: an analysis of protection strategies , 1991 .
[26] S. Besen,et al. Private Copying, Appropriability, and Optimal Copying Royalties , 1989, The Journal of Law and Economics.
[27] Wilfried R. Vanhonacker,et al. Optimal strategic pricing of reproducible consumer products , 1988 .
[28] S. Besen. New Technologies and Intellectual Property: An Economic Analysis , 1987 .
[29] S. Besen. Private copying, reproduction costs, and the supply of intellectual property , 1986 .
[30] S. Liebowitz. Copying and Indirect Appropriability: Photocopying of Journals , 1985, Journal of Political Economy.
[31] H. White. A Heteroskedasticity-Consistent Covariance Matrix Estimator and a Direct Test for Heteroskedasticity , 1980 .
[32] R. E. Burnkrant,et al. Informational and Normative Social Influence in Buyer Behavior , 1975 .
[33] M. Deutsch,et al. A study of normative and informational social influences upon individual judgement. , 1955, Journal of abnormal psychology.
[34] International Federation of the Phonographic Industry (IFPI) , 2022 .