Digital Piracy: A Competitive Analysis
暂无分享,去创建一个
[1] Vijay Mahajan,et al. Software Piracy: Estimation of Lost Sales and the Impact on Software Diffusion , 1995 .
[2] C. Shapiro,et al. Network Externalities, Competition, and Compatibility , 1985 .
[3] Devavrat Purohit,et al. What Should You Do When Your Competitors Send in the Clones , 1994 .
[4] Oz Shy,et al. A strategic approach to software protection , 1999 .
[5] J. Miguel Villas-Boas,et al. Bertrand Supertraps , 2005, Manag. Sci..
[6] Ivan P. L. Png,et al. Price Discrimination through Offers to Match Price , 1987 .
[7] Neil Gandal,et al. NETWORK EFFECTS, SOFTWARE PROVISION, AND STANDARDIZATION* , 1992 .
[8] E. Maskin,et al. The Existence of Equilibrium in Discontinuous Economic Games, I: Theory , 1986 .
[9] Baohong Sun,et al. Product Strategy for Innovators in Markets with Network Effects , 2004 .
[10] Volker Schneider,et al. Business Software Alliance , 2009 .
[11] Z. John Zhang,et al. Competitive Coupon Targeting , 1995 .
[12] Jinhong Xie,et al. Cross-Market Network Effect with Asymmetric Customer Loyalty: Implications for Competitive Advantage , 2007 .
[13] Vijay Mahajan,et al. How many pirates should a software firm tolerate? An analysis of piracy protection on the diffusion of software , 2003 .
[14] Martin Peitz. A Strategic Approach to Software Protection: Comment , 2004 .
[15] Marvin A. Sirbu,et al. Price Competition and Compatibility in the Presence of Positive Demand Externalities , 1995 .
[16] S. Besen,et al. Private Copying, Appropriability, and Optimal Copying Royalties , 1989, The Journal of Law and Economics.
[17] Kallol Kumar Bagchi,et al. Global software piracy , 2006, Commun. ACM.
[18] K. R. Conner,et al. Software piracy: an analysis of protection strategies , 1991 .
[19] K. R. Conner,et al. Obtaining Strategic Advantage from Being Imitated: When Can Encouraging Clones Pay? , 1995 .
[20] Vijay Mahajan,et al. The Effect of Piracy on the Market Penetration of Subscription Software , 2004 .
[21] H. Varian. Journal of Economic Perspectives. , 2004 .
[22] Invited Commentary---The Day After Tomorrow: Longer Run Issues in Theatrical Exhibition , 2006 .
[23] D. Fudenberg,et al. The Fat-Cat Effect, the Puppy-Dog Ploy, and the Lean and Hungry Look , 1984 .
[24] Michael Waldman,et al. The Effects of Increased Copyright Protection: An Analytic Approach , 1984, Journal of Political Economy.
[25] S. Liebowitz. Copying and Indirect Appropriability: Photocopying of Journals , 1985, Journal of Political Economy.
[26] K. Arrow. Economic Welfare and the Allocation of Resources for Invention , 1962 .
[27] Ram D. Gopal,et al. Preventive and Deterrent Controls for Software Piracy , 1997, J. Manag. Inf. Syst..
[28] K. Hui,et al. Piracy and the Legitimate Demand for Recorded Music , 2002 .
[29] V. Mahajan,et al. How Much Anti-Piracy Effort is Too Much? - a Study of the Global Software Industry , 2005 .
[30] Joydeep Srivastava,et al. An Experimental and Theoretical Analysis of Price-Matching Refund Policies , 2000 .
[31] Arun Sundararajan,et al. Managing Digital Piracy: Pricing and Protection , 2004, Inf. Syst. Res..
[32] William R. Johnson,et al. The Economics of Copying , 1985, Journal of Political Economy.
[33] Xiaotong Li. Cheap Talk and Bogus Network Externalities in the Emerging Technology Market , 2005 .
[34] Lisa N. Takeyama. The Welfare Implications of Unauthorized Reproduction of Intellectual Property in the Presence of Demand Network Externalities , 1994 .
[35] William R. Swinyard,et al. The morality of software piracy: A cross-cultural analysis , 1990 .
[36] Florian Zettelmeyer,et al. Expanding to the Internet: Pricing and Communications Strategies When Firms Compete on Multiple Channels , 2000 .
[37] Hsing K. Cheng,et al. To Purchase or to Pirate Software: An Empirical Study , 1997, J. Manag. Inf. Syst..