Digital Piracy: Theory
Paul Belleflamme
Martin Peitz
CESIFO WORKING PAPER NO. 3222
CATEGORY 11: INDUSTRIAL ORGANISATION
OCTOBER 2010
An electronic version of the paper may be downloaded
• from the SSRN website:
www.SSRN.com
• from the RePEc website:
www.RePEc.org
• from the CESifo website:
www.CESifo-group.org/wp
T
T
CESifo Working Paper No. 3222
Digital Piracy: Theory
Abstract
This article reviews recent theoretical contributions on digital piracy. It starts by elaborating
on the reasons for intellectual property protection, by reporting a few facts about copyright
protection, and by examining reasons to become a digital pirate. Next, it provides an
exploration of the consequences of digital piracy, using a base model and several extensions
(with consumer sampling, network effects, and indirect appropriation). A closer look at
market-structure implications of end-user piracy is then taken. After a brief review of
commercial piracy, additional legal and private responses to end-user piracy are considered.
Finally, a quick look at emerging new business models is taken.
JEL-Code: L11, L82, L86.
Keywords: information good, piracy, copyright, IP protection, internet, peer-to-peer, software,
music.
Paul Belleflamme
Catholic University of Louvain
1348 Louvain la Neuve
Belgium
[email protected]
Martin Peitz
Department of Economics
University of Mannheim
68131 Mannheim
Germany
[email protected]
To be published in Peitz, M. and Waldfogel, J. (eds), The Oxford Handbook of the Digital
Economy, Oxford University Press, 2011 (expected). This version: October 2010. We would
like to thank Stefan Bechtold for useful comments.
DIGITAL PIRACY: THEORY
1
1. Introduction
Over the last two decades, the fast penetration of the Internet and the digitization of information products (music, movies, books and software) have led an
increasing number of consumers to copy and distribute information products without the authorization of their legal owners, a phenomenon known as ‘digital piracy’.
Content industries (with record companies at the forefront) were quick to blame
digital piracy for huge revenue losses and to take legal actions against file-sharing
technologies and their users. Policy makers also reacted by gradually reinforcing
copyright law. In general, digital technologies and the Internet have deeply modified
the interaction between copyright holders, technology companies and consumers,
thereby posing interesting challenges for the economic analysis of digital products.
For instance, formal analysis is needed to examine the effect of digital piracy on
right-holders’ profits; also, if digital piracy has a negative impact on the producers, one needs to analyze the strategies that can be used to counter piracy. As
importantly, a public policy perspective has to be taken; here, the main issue is
to evaluate the extent to which social interests are aligned with the interests of
copyright owners.
This article reviews recent theoretical contributions on these issues. As background information, we elaborate in Section 2 on the reasons for intellectual property protection, report a few facts about copyright protection, and examine reasons
to become a digital pirate. In Section 3, we provide an exploration of the consequences of digital piracy. To this purpose, we present a base model and then provide
several extensions: Consumer sampling, network effects, and indirect appropriation.
Section 4 takes a closer look at market-structure implications of end-user piracy.
Section 5 reviews the rather short literature on commercial piracy, which has to include strategic considerations by the pirates. Section 6 discusses contributions that,
in addition to price, consider alternative responses to piracy. Section 7 concludes,
taking a quick look at emerging new business models.
2. The protection of intellectual property and digital content
What is exactly digital piracy? Why is illegal? To answer these questions, we
need to describe the legislation that piracy violates. We also need to understand
the raison d’être and the recent developments of this legislation. Finally, we need
to analyze what brings people to become digital pirates.
2.1. Intellectual property protection: Why and how. Intellectual property
(IP) refers to the legal rights that result from intellectual activity in the industrial,
scientific, literary and artistic fields. Most countries have adopted laws to protect
intellectual property, with the objective to promote innovation and aesthetic creativity. The economic rationale can be summarized as follows. Intellectual creations
have a public good nature: They are nonrival (their consumption by one person
does not prevent their consumption by another person) and, often, nonexcludable
(one person cannot exclude another person from their consumption). The latter
property reduces the incentives to create, as creators face difficulties in appropriating the revenues of their creation. This causes an underproduction problem that IP
law addresses by making intellectual creations excludable by legal means. That is,
IP law grants exclusive use of the protected creation to the creator, which restores
the incentives to create. However, by granting monopoly rights to the creator, IP
2
PAUL BELLEFLAMME AND MARTIN PEITZ
law entails an underutilization problem. Indeed, as the marginal cost of production is zero (which is a consequence of nonrivalness), any positive price induces
a welfare-reducing rationing. There is thus a conflict, as pointed out by Arrow
(1962), between dynamic efficiency considerations (how to provide the right incentives to create and innovate?), and static efficiency considerations (how to promote
the diffusion and use of the results of creation and innovation?). In order to strike
a balance between these two conflicting problems, IP law grants exclusive rights
only for a limited period of time and for a limited scope.1
The IP protection legislation generally distinguishes among four separate IP
regimes, which are targeted at different subject matters. On the one hand, patents,
trade secrets and trademarks are designed to protect industrial property (such as
inventions, processes, machines, brand names, industrial designs,...). On the other
hand, copyrights concern literary, musical, choreographic, dramatic and artistic
works (such as novels, poems, plays, films, songs, drawings, paintings, photographs,
sculptures, architectural designs, ...). It is with this so-called “copyright branch of
IP” that we are concerned here. Piracy can indeed be defined as the unauthorized
reproduction, use, or diffusion of a copyrighted work. Copyright applies to the
expression of works, in whatever mode or form, and gives authors an exclusive
right over the reproduction, performance, adaptation and translation of their work.
Compared to patents, this protection is weaker (as only the expression is protected,
and not the underlying ideas) but it is extended over a longer period of time.2
2.2. Recent changes in copyright law. The challenges brought by the emergence of digital technologies and the Internet have triggered many of the recent
changes in copyright law.3 Digital technologies have enabled the low-cost and highquality reproduction of copyrighted works (in particular, music and movies), leading
to their complete dematerialization; the Internet has further facilitated consumers’
ability to find and redistribute digital content. These two trends have seriously
limited copyright owners in their ability to control how content gets to consumers.
This has undermined the existing business models, which were relying on controlled
distribution and broadcast channels. In the past, as long as illegal copies were expensive to make, of drastically inferior quality, or, at least, limited in scale, end-user
piracy did not pose a major threat.
Before devising new business models (see Section ??), content providers and
copyright owners have tried to prevent the old ones from crashing down, mainly by
pursuing copyright infringers and by using digital technologies as protective measures (see Section ??). They have also lobbied for—and obtained—more restrictive
laws for their protection. In the U.S., two major changes occured in 1998: First, the
Copyright Term Extension Act (CTEA, aka Sonny Bono Copyright Act) extended
the duration of existing U.S. copyrights by 20 years; second, the Digital Millenium
1
For more on this topic, see, e.g., Belleflamme and Peitz (2010, Chapter 19).
Currently, copyright protection lasts for 70 years after the author’s death in both the European
Union and the United States. For sound recordings and film, it lasts, in general, for 50 years after
publication in the European Union and for 95 years in the United States—see European Parliament
and Council of the European Union (2006) and Hirtle (2010). It is proposed to extend protection
in the European Union to 95 years—see European Commission (2008).
3
For a thorough description, see Gasser (2005a and b).
2
DIGITAL PIRACY: THEORY
3
Copyright Act (DMCA) reinforced copyright protection by making it a crime to
circumvent the technological measures that control access to copyrighted work.4
In Europe, a number of EU directives have lead EU member states to harmonize
their national copyright laws in the first half of the 1990s. Worth mentioning is the
European Union Copyright Directive (EUCD) of 2001, which, in the spirit of the
DMCA, requires member states to enact provisions preventing the circumvention of
technical protection measures (leaving, however, siginificant leeway to the member
states to define the scope of their protections).
More recently, a number of countries have passed laws aiming at fighting Internet
piracy. France opened the way by adopting in September 2009 a legislation that
authorizes the suspension of Internet access to pirates who ignored two warnings to
quit. The UK followed suit in April 2010 with a legislation incorporating a similar
“Three Strikes” provision.5 In the US, the Obama administration is reported to
examine this possibility as well.6 In Sweden, a new law allows copyright holders to
obtain a court order forcing ISPs to provide the IP addresses identifying computers
of illegal file-sharers.7
2.3. Becoming digital pirate. What brings people to engage in the illegal act of
digital piracy? To answer this question, we need to separate commercial (for-profit)
piracy from end-user piracy. As far as commercial piracy is concerned, the motivation is clearly criminal: The large-scale reproduction and distribution of copyrighted
products generates the sort of high profit margins that criminal organizations are after. On the other hand, understanding the motivations behind end-user piracy–i.e.,
illegal reproduction of copyrighted work by the consumer themselves–is much more
complex. It is indeed surprising to observe such large-scale violation of the laws
protecting digital products by individuals who are normally law-abiding citizens.
A number of explanations have been advanced. First, the lack of clarity of the
laws can be blamed. In particular, there exist limitations to a copyright holder’s
exclusive rights that are not clearly defined. One such limitation is “fair use”, which
permits the limited use of a copyrighted work without requiring the creator’s authorization.8 Fair use includes certain personal uses, but the contours of these uses
are typically hard to define in the digital world where technologies are evolving
4
Voices were raised against these more restrictive laws, arguing that they were likely to stifle
rather than foster creation. For instance, seventeen economists (among them five Nobel laureates)
condemned the CTEA on the grounds that the economic benefits from copyright extension were
very unlikely to outweigh the costs (see Eldred et al. vs. Ashcroft, Attorney General, 537 U.S.
186, 2003). A more fundamental critique of copyright protection is provided by Boldrin and
Levine (2008). They essentially argue that copyright protection stifles creativity and innovation
and hurts consumers also in the long run.
5
The ‘Digital Economy Bill’ has been passed by the Lords on April 6, 2010. At the time of
this writing, it has not yet been examined by the Commons.
6
See
“Obama
administration
steps
up
anti-piracy
plan”
by
A.B.
Block
(www.hollywoodreporter.com, June 22, 2010; last consulted on July 23, 2010).
7
It was estimated that Internet traffic fell by one third on the day the new law came into effect
(i.e., April 1, 2009; see http://news.bbc.co.uk/2/hi/7978853.stm, last consulted on July 23, 2010).
8
The “fair use” doctrine is embedded in American copyright law. In the European Union the
right of the rights holder are also limited, in particular, for a “private copy” (copie privée), which
allows the copying of copyrighted material except software for personal use.
4
PAUL BELLEFLAMME AND MARTIN PEITZ
rapidly. Consumers may thus consider certain uses of copyrighted works fair, although these uses are actually illegal.9 Second, following Becker (1968), we can
simply see end-user piracy as the normal reaction of rational agents who compare
the costs and benefits of this activity. Even if they are aware of breaking the law,
consumers perceive as very remote the sanctions that they may encounter if they
are caught buying or making copies. The benefits, on the other hand, are obvious
as free downloads and copying technologies are ubiquitous. The literature that we
review in the next sections embraces this view. However convincing this economic
explanation may be, it still falls short of explaining why many individuals infringe
copyright law but not other laws (for which a similar pattern of low risks and high
rewards could be observed). To solve this puzzle, Balestrino (2008) proposes a
theoretical model of digital piracy combined with a game-theoretic mechanism of
social norm formation. He argues that no social stigma is attached to digital piracy
because it has no perceived social cost; as a result, there is no pressure to build
a norm condemning it.10 Also, the literature typically does not explain why individuals upload copyrighted material even though that puts them at greater risk of
being investigated for copyright infringement and does not give them any direct
benefit.11
We now move to the economic analysis of digital piracy (essentially, end-user
piracy, on which the literature has mostly focused; we briefly consider commercial
piracy in Section ??).
3. Profit and welfare effects of end-user piracy
In this section, we study the impacts of end-user piracy on firms’ profits and
strategies.12 We also examine how piracy affects welfare, both in the short and in the
long run. We start with a basic analysis in which the monopoly producer of a digital
product faces the threat of copying by the consumers. Copying undermines the
producer’s ability to appropriate the returns from its creation. Hence, applying the
reasoning behind the protection of IP, we expect that more piracy (i.e., less effective
copyright protection) will improve welfare from a static efficiency perspective but
may deteriorate it if we include dynamic efficiency considerations. We move then
to models that present piracy under a more favorable angle. Several reasons are put
forward to explain how piracy may increase the copyright holder’s profits, thereby
having the potential to enhance both short- and long-run welfare. Note that the
models reviewed in this second subsection (at one exception) also consider settings
with a single digital product supplied by a monopolist. We defer the analysis of
settings with several products and producers to Section ??.
9
Gasser (2005a) reports survey results that partially confirm this interpretation. In a recent
paper, Chiang and Assane (2009) present an empirical analysis of the factors influencing the
willingness to pay for digital music downloads. They show that income and risk perceptions play
a dominant role. They also review the empirical literature focusing on the determinants of piracy.
10
See also Hill (2007) who looks at the behavior of individual consumers and tries to uncover
why they knowingly consume pirated goods. Some of the actions of, e.g., the RIAA are intended
to “educate” consumers in the sense that it is attempted to attach social stigma to digital piracy.
11
Uploaders in a file-sharing network contribute to a public good from the viewpoint of the
other users of that network. A somewhat different but related phenomenon consists in providing
user-generated content.
12
The section partly draws on Peitz and Waelbroeck (2006b).
DIGITAL PIRACY: THEORY
5
3.1. A first analysis. The basic analysis of end-user piracy considers the market
for a digital product supplied by a single producer. The assumption of a monopoly
greatly simplifies the analysis and can be justified by arguing that digital products
(e.g., music titles or movies) are sufficiently horizontally differentiated to make
the demand for any particular product largely independent of the prices of other
products in the same category. The monopolist faces, however, another form of
competition: Along the original files that the monopolist supplies, there also exist
(illegal) digital copies of these files. That is, the market offers two versions of the
product, the original and a copy. It is usually assumed that these two versions
are vertically differentiated: The original has quality q, while the copy may be of
lower quality, q c ≤ q. The monopolist chooses the price, and possibly the quality,
of the original. As for the copy, it can be obtained at a given price, which may
vary across consumers. This price may be zero; it is positive if the pirated good is
costly to acquire or if there is an expected cost from being detected. The quality
of the copy primarily depends on technological and legal factors. The government
(through the definition and the enforcement of IP protection) and the monopolist
(through technical protective measures) have the potential to affect both the price
and the quality of copies.
In some situations the pirated good is of higher quality (q c > q). Two examples
for this: First, this can be the case in a quality dimension which may be called
versatility. Such a situation arises if the original is DRM-protected, whereas the
copy is not.13 DRM-protection often restricts the use of a product and, thus, its
versatility. For instance, DRM-protected songs purchased on iTunes did not play
on an incompatible mp3-device. Second, the quality dimension may be availability.
Originals may only be available as bundles, as is the case for some music albums
which artists refuse to make available for download per song. Also, some originals
may be released later than pirated versions, as is the case for many films on DVD.
3.1.1. Basic insights. A general result that we can expect in such a framework is
that piracy limits the monopoly power of the supplier of the original. As a consequence, the availability of digital copies at best leaves the firm’s profits unchanged
(meaning that piracy is not a real threat) or, more realistically, reduces the firm’s
profits. This is indeed the conclusion reached in a variety of models (see, for instance, Novos and Waldman, 1984, Johnson, 1985, and Belleflamme, 2003). When
price is the only strategic variable of the firm, three types of reactions are possible:
If piracy is not a real threat (because copies have too low a quality/price ratio), no
reaction is necessary (piracy is said to be ‘blockaded’); otherwise, the firm either
reduces its price to make all active consumers prefer the original (a ‘deterrence’
strategy), or it sets a larger price and lets some consumers use the pirated good
(an ‘accommodation’ strategy). Inevitably, profits are reduced in both the deterrence and the accommodation strategy. The reduction in the monopolist’s profits,
however, are more than compensated by the increase in consumer surplus. From a
static efficiency point of view, piracy is thus welfare-enhancing.
The conclusion may differ when dynamic efficiency is taken into consideration.
Reductions in profits typically affect incentives to provide quality. In a model
in which original and copy have the same quality but in which consumers have
13DRM stands for digital rights management, which is an umbrella term for a number of
technologies that inhibits uses of digital content not desired or intended by the copyright holder
(see Subsection ?? for more on this topic).
6
PAUL BELLEFLAMME AND MARTIN PEITZ
heterogeneous copying costs, Novos and Waldman (1984) show how lower profits
reduce, under some assumptions, the ex ante incentives to provide quality. This
result is confirmed by Bae and Choi (2006) in a vertical product differentiation
model with quality degradation for copies. In a multi-product framework, Johnson
(1985) shows how lower profits also reduce the incentives to provide variety. This
implies that although a short-term welfare analysis may see piracy in a favorable
light, the long-term effects are more likely to be negative.
3.1.2. Impacts of piracy on strategies and welfare. Let us now develop the previous
argument in more detail and examine the strategies that producers of digital products can adopt in the face of piracy. We follow Novos and Waldman (1984) in giving
the following alternative to the consumer: She can either purchase the original or
she can copy at a cost c + z (1 + x), where c is the marginal cost of production, x is
the extent of copyright protection, and z is the additional marginal cost of making
a copy; the latter cost is assumed to be heterogeneous across consumers. What
Novos and Waldman had in mind in 1984 was clearly physical copies. Yet, their
specification also fits digital products. Think, e.g., of software: Downloading and
installing illegaly copied files require time and effort for the users (c); moreover, in
the case they are caught copying files, users incur an additional cost (a fine or the
disutility from having the product confiscated, z); the likelihood and the magnitude
of this cost depend on the extent of copyright protection (x).
In this setting, for moderate prices of the original in a protected monopoly, those
consumers with a low enough copying cost prefer the copy to the original. The firm
can make copying unattractive to all consumers by setting a sufficiently low price.
This deterrence strategy might, however, be too costly to the monopolist who will
then prefer to raise the price and accommodate piracy. In any case, profits are lower
than if piracy was not a threat. Novos and Waldman establish that the monopolist
provides too low a quality compared to the social optimum; this is because piracy
prevents the monopolist from appropriating all rents from quality improvements.
One could therefore expect that a stronger copyright protection, making piracy
less attractive, would induce the monopolist to increase the quality offered. Novos
and Waldman show that this is indeed the case provided that there are relatively
more consumers with higher than with lower copying costs (i.e., the density of z
needs to be increasing). Note that the reinforcement of copyright protection does
not hinder static efficiency in this model (an increase in x makes consumers switch
from the copy to the original, thus saving the copying cost that is wasteful from
a social point of view). It follows then that making copyright protection stronger
and/or enforcing it more strictly is unambiguously welfare-enhancing in Novos and
Waldman’s model (as long as the density of z is increasing).
However, the latter conclusion is not robust to a slight modification of the setup.
Novos and Waldman assume that copies have the same quality as the original, and
that copying costs vary across consumers. Alternatively, we could assume that the
value of the original relative to the copy is heterogeneous but that the associated
disutility of copying is the same for all consumers. In that scenario, all consumers
attach the same value to the original but vary in the value they attach to the copy;
namely, the value of the copy for consumer z is equal to the value of the original
minus z (1 + x). Heterogenity in the copying costs is thus replaced by heterogeneity in the perceived quality degradation of the copy. The setup then follows the
vertical differentiation model of Mussa and Rosen (1978). Two specifications of the
DIGITAL PIRACY: THEORY
7
heterogeneity of consumers’ valuations dominate the literature: (i) Discrete types
(namely two types, high-valuation and low-valuation consumers); (ii) a continuum
of types (the distribution is then typically assumed to be uniform on an interval).
Yoon (2002), Belleflamme (2003), and Bae and Choi (2006) consider a singleproduct monopolist selling to a continuum of heterogeneous consumers. A consumer
derives utility θq − p for the original, where θ is the consumer’s taste parameter,
distributed on the unit interval, q is the quality of the original, and p its price.14 She
derives utility αθq − c for the copy, where 1 − α is the factor of quality depreciation
and c, the copying cost. We check thus that consumers are heterogeneous in terms of
the valuation of the quality differential between original and copy (i.e., (1 − α) θq,
which Bae and Choi call the ‘degradation cost’ of piracy) and homogeneous in
terms of the copying cost (i.e, c, the ‘reproduction cost’ of piracy in Bae and Choi’s
terminology). We also see that pricing in the presence of piracy is the same as
pricing against a firm pricing at c a product of quality αq. Obviously, in this setup
the firm’s profits decrease with the availability of digital copies.15
When analyzing the (short-run and long-run) welfare effects of piracy, Bae and
Choi (2006) argue that Novos and Waldman’s conclusion is particular to their modeling framework. They show indeed that the welfare effects of a stronger copyright
protection crucially depend on how the two types of costs associated to piracy are
affected. The reason is that these two costs impact the demand for a legal copy in
different ways: A change in the constant reproduction cost induces a parallel shift
of the demand function, whereas a change in the degradation cost makes the demand curve pivot. In particular, if we are in a situation when the monopolist finds
it optimal to accommodate piracy, a strengthening of IP protection affects welfare
differently depending on the piracy cost that is increased: A higher degradation
cost results in higher quality and lower consumption of the original product, while
a higher reproduction cost induces exactly the opposite. It may even be the case
that a higher reproduction cost unambiguously reduces social welfare as both static
and dynamic efficiency are negatively affected.
In Bae and Choi’s analysis, a stronger IP protection is modeled as a marginal
increase of either the degradation cost or the reproduction cost of piracy. This
conveniently abstracts away the issues of where the increased protection comes from
(legal and/or technical measures?) and how much it costs (public and/or private
costs?). Yoon (2002) partially addresses these issues. In his setting, copyright
protection leads to a private cost to consumers. Formally, a consumer’s utility takes
the form αθq−c−x, where x denotes the consumers’ additional cost due to copyright
protection (which also constitutes a social cost). In this setting, an increase in
x leads to an increase in the monopolist’s profits and to a decrease in consumer
surplus. As for (short-run) total surplus, it is initially decreasing in x and then, after
reaching its minimum, is inversely U-shaped. Yoon then shows that the socially
optimal copyright protection should be set such that the monopolist optimally
reacts by deterring copying. The copyrighted product is then fully protected in the
14Yoon (2002) and Belleflamme (2003) both assume a uniform distribution of the taste parameter and an exogenously given quality of the original; Bae and Choi (2006) consider a more
general class of distributions and also endogenize the monopolist’s quality choice.
15Although profits are reduced in the monopoly setting, committing not to enforce copyright
protection may be a profitable strategy in a market with potential entry as it may serve as an
entry deterrent. The reason is that an entrant suffers if the incumbent does not enforce copyright
protection.
8
PAUL BELLEFLAMME AND MARTIN PEITZ
sense that copies are driven out of the market. However, the monopolist has to
lower its price compared to a situation of ‘blockaded entry’, which occurs if copying
is not feasible. Thus profits generated by the copyrighted product are reduced
under the social optimum.
Chen and Png (2002) also take the costs of stronger IP protection into account.
In particular, they consider the social costs that arise when firms spend resources
on detecting copyright infringers. They consider a setting with two groups of consumers: One group has infinite copying costs and therefore never copies, while
the other group has finite copying costs and may therefore prefer to copy. Within
each group, consumers have heterogeneous valuations for the good, although originals and copies are identical. The expected utility from illegal copying depends
on the detection probability. This leaves two possibilities to the monopolist to
eliminate copies: It can either lower its price or increase the detection probability
by spending resources in some anti-piracy technology. The implications of these
two strategies clearly differ from a social point of view: Short-run welfare is unambiguously improved if the price is lowered (because less effort in copying is needed)
but is deteriorated if the detection probability is increased (because the technology
costs are wasteful from a social point of view and because the surplus of copiers is
also reduced).16
Summary. The basic models we have reviewed here consider end-user piracy under
the following set of assumptions: (i) A monopoly supplies a single original product, (ii) copies are viewed as a lower-quality variant of the original product, (iii)
consumers are heterogeneous (either with respect to their cost of making or acquiring copies, or to their valuation of the quality degradation between originals
and copies). In these models, consumers with a low cost of copying or with a low
willingness to pay for quality may prefer to consume the copy. The copy competes
thus with the original, which forces the monopolist to lower its price (otherwise,
the incentive constraint of too many consumers would be violated). From a static
efficiency point of view, the presence of pirated copies leads to an expansion of
the market and, thereby, to an increase in consumer surplus. This has to be balanced, in a dynamic efficiency perspective, with the reduced incentives to improve
the quality of the original product (as a result of the reduction in the copyright
holder’s profits). Moreover, the analysis of total welfare must also incorporate a
number of costs associated to piracy: The costs for consumers of making copies
compared to the marginal cost of production of originals; the costs for firms of
technical measures to protect products against copying; the costs for governments
to enforce copyrights. If these costs are high, society may prefer to adopt little or
no protection (because of the low performance, at least in a short-run view, of the
combination of protection policies and the profit-maximizing behavior of copyright
owners).
As we now show, some of these conclusions may not carry over in environments
where original products are made available in several versions.
3.1.3. Price discrimination. So far, it has been assumed that original digital products are offered in a single version. Although pirated versions are available on the
market, these versions are imposed upon the copyrights holder. In many instances,
16Chen and Png then analyze the socially optimal government policy consisting of a tax on
copies and recording equipment, subsidies to originals, and penalties in case of copyright violations.
DIGITAL PIRACY: THEORY
9
however, producers of digital products deliberately offer the original in different versions in an attempt to capture a larger share of consumer surplus through (seconddegree) price discrimination.17 It is therefore important to analyze the link between
end-user piracy and the firms’ versioning strategies.
Alvisi, Argentesi and Carbonara (2002) analyze the incentives of a firm facing
piracy to offer a downgraded version.18 They adopt a vertical differentiation setting à la Mussa and Rosen (1978) and choose parameters in such a way that the
monopolist prefers to offer a single quality in the absence of piracy. The question is
whether the introduction of copies (which are assumed to have the same quality as
originals) drives the monopolist to offer a second quality. In their model, consumers
are heterogeneous in two respects. First, as in the Mussa-Rosen setting, consumers
differ by their taste θ for quality increases. Second, they also differ in their reproduction cost. The authors assume a positive correlation between the two sources
of heterogeneity: Consumers with a high preference for quality (high values of θ)
sustain a high copying cost cH ; consumers with a low preference for quality (low
values of θ) sustain a low copying cost cL . Under these assumptions, a high quality
product can be offered at a higher price to consumers with a high preference for
quality. The authors then show that the monopolist’s optimal response to piracy
may be to introduce an extra version of lower quality. This lower quality version is
targeted at consumers with a low copying cost (and a low preference for quality);
its purpose is clearly to divert them from the pirated good to the original one. The
authors also show that a stricter enforcement of copyright protection reduces the
incentive to differentiate, which reinforces the idea that vertical differentiation is a
reaction to piracy.
Cho and Ahn (2010) study a related, though slightly different, issue. In their
setting, the monopolist optimally offers two qualities in the absence of piracy. What
they study, then, is how piracy affects the choice of these two qualities. Like
Alvisi et al., they adopt a Mussa-Rosen setting and assume that copies have the
same quality as originals. They make, however, different assumptions regarding
consumers: Instead of a continuum of consumer types, they assume two classes;
moreover, they assume that all consumers share the same copying cost. In this
framework, they show that the presence of piracy induces the firm to choose a lower
level of quality for the high-end version, and a higher level of quality for the low-end
version relative to decisions made in the absence of piracy (i.e., the firm reduces
vertical differentiation under piracy). These results need to be put in perspective
with the results drawn from the basic models that we reviewed above. Novos and
Waldman (1984) and others show that piracy causes an underprovision problem as
it induces firms to create digital products with an inefficient low quality. They also
suggest that strengthening copyright protection may alleviate this problem. Cho
17For a overview of versioning of information goods, see Shapiro and Varian (1998) and Belleflamme (2006).
18The argument is similar to the decision by a monopolist to introduce a low-quality variant
in response to the introduction of a generic drug in the pharmaceutical industry (see Valletti and
Szymanski, 2006). More generally, recent work has considered conditions under which it is profitmaximizing for a monopolist to introduce a low-quality variant (see e.g. Johnson and Myatt,
2003). In our piracy context, the argument also relates to King and Lampe (2003), as described
in the subsection on network effects below. In addition, a number of articles have looked at the
incentives to provide downgraded goods without piracy but with network effects. These include
Hahn (2001, 2004), Csorba (2002), and Csorba and Hahn (2006).
10
PAUL BELLEFLAMME AND MARTIN PEITZ
and Ahn’s contribution is to show that when several versions of the same digital
product are offered, the underprovision problem only carries over to the high-quality
version. These results need to be kept in mind when disucssing the optimal level
of copyright protection.
3.2. A more favorable view of piracy. We now move beyond the previous basic
models and consider a number of reasons why copyright owners’ profits may actually
increase with piracy. Piracy could then improve welfare not only in the short run
but also in the long run. We consider three reasons: Sampling, network effects, and
indirect appropriation.
3.2.1. Consumer sampling. As we have just seen, the basic models of end-user
piracy focus on an important feature of digital products, namely their public good
nature. The non-excludability of digital products is synonymous with the potential
for piracy, leading to appropriability problems for the producers. This section
addresses another important feature of digital products. Digital products (music
and movies in particular) belong to the category of experience goods, for which the
quality or suitability can only be observed after purchase. This poses yet another
problem for producers of digital products who may find it hard to start selling a
new product because consumers lack information about it. One obvious answer to
this problem is to allow consumers to try out the product (listen to an extract from
a song, watch the trailer of a movie, browse a book in a bookshop or on the web,
test a beta version of a video game or a software).
In terms of experimentation, the digitalization of content products comes as a
mixed blessing. On the one hand, it is more dangerous for producers to release
“samples” of a digital product as these can quickly be copied and shared, thereby
jeopardizing the sales of the “full” original product. On the other hand, in an
increasingly interconnected world, the sharing of digital copies also largely reduces
the producers’ costs of transmitting information to the consumers. The information
contained in pirated copies may be about the product fit to the consumer taste, or
about the product quality. In the former case, copies are a form of sample while
in the latter, they can solve an adverse selection problem. We consider these two
views in turn.19
The sampling effect. The idea that copies can benefit the sales of an original product through an exposure or sampling effect was already present in the ‘analog’
world; Liebowitz (1985) made indeed this point for photocopies of books or journals. Digital technologies have naturally revived this idea as they make copying
and spreading digital products much less costly. This has lead a number of authors
to analyze the informational role of unauthorized copies on the copyright holders’
profits and strategies, as well as on welfare.
One path to model the informational role of digital copies is to extend the basic
single-product models that we reviewed above. Recall the vertical differentiation
model used by Yoon (2002), Belleflamme (2003) and Bae and Choi (2006). In this
19In a different, though related, approach, Wang and Zhang (2009) consider samples of digital
products that, unlike pirated versions, cannot be used as substitutes to the original product.
Hence, samples do not jeopardize the sales of the legitimate product. However, digitalization
prevents the firm from controlling free samples, as could be done with physical goods. It is,
therefore, impossible to target a particular category of consumers with samples (as samples become
immediately accessible to anyone once they are provided). The authors show that the firm may
nevertheless find it profitable to use free samples.
DIGITAL PIRACY: THEORY
11
model, a consumer with taste parameter θ derives utility θq−p from the original and
αθq −c from the copy (where 1−α measures the quality degradation and c, the cost
of acquiring or making a copy). In this framework, Ahn and Yoon (2009) assume
that digitalization and sampling affect a consumer’s utility in the following way:
The utility from an original becomes (1 + s) θ−p, where s > 0 denotes the sampling
effect of an original; the utility from a copy becomes (1 + t) α′ θ − c′ , where t > 0
denotes the sampling effect of a copy, and α′ and c′ are the new quality degradation
parameter and consumers’ reproduction cost, respectively. Typically, digitalization
contributes to reduce both the quality degradation and the reproduction cost of
copies; we expect thus α′ > α and c′ < c. The authors then carry out comparative
statics exercices to evaluate the impact of digitalization and sampling on profit,
consumer surplus and (short-run) social welfare. As far as profits are concerned,
Ahn and Yoon confirm that the positive informational effect of copies attenuates
their negative business-stealing effect. Unsurprisingly, the impact of digitalization
on the consumer surplus is unambiguously positive. Finally, they find that the
impact on social welfare is ambiguous in general, but they show that the impact
may be positive.
Gopal, Bhattacharjee, and Sanders (2006) also examine the effects of sampling
in a single-product model with an exogenous price. In their setting, downloading
(of illegitimate files) may increase the attractiveness of the original product by
helping consumers find out that they like the product. This sampling effect can be
decisive for consumers with intermediate valuations for the product. The authors
show indeed that these consumers buy the original if downloading is available, but
otherwise refrain from doing so. This allows the firm to increase its profits.20 The
authors further show that sampling, by reducing consumer uncertainty, is likely to
benefit more producers of niche products rather than ‘superstars’.21
The informational role of digital copies available on P2P networks is further
analyzed in Duchene and Waelbroeck (2005, 2006), with the same basic model
of end-user piracy as a starting point (a single firm, an original providing additional value compared to the copy, and heterogeneous consumers with respect to
the opportunity cost of spending time online searching for files). Here, the firm’s
distribution and protection strategies are explicitely taken into account and the
focus is on the effects of extended copyright protection. The authors assume that
consumers can purchase a new product only after they have downloaded a digital
copy that provides information on the characteristics of the product. They also assume that technological protection increases the consumers’ disutility of a copy but
at the same reduces the fair use value of the original product (although the former
effect is assumed to dominate the latter; the fair use value is due to information
20A similar situation is described by Chellappa and Shivendu (2005) in a two-stage model in
which consumers can use pirated copies to update their perception of a digital product’s fit to their
tastes. The firm’s profits may increase if some pirates who, on the basis of their initial perception,
did not consider purchasing eventually decide, on the basis of their updated perception, to discard
the pirated version and purchase the original.
21Zhang (2002) also makes this point in a different setting. In a similar vein, Alcala and
Gonzalez-Maestre (2010) show that piracy reduces superstars’ earnings and the incentives to
invest in their promotion, which tends to increase the market share and the number of niche and
young artists. The view that digital information transmission has reduced the skewness in the
distribution of content products—i.e., that niche products have found a larger audience, has been
popularized and coined the “long tail” by Anderson (2004).
12
PAUL BELLEFLAMME AND MARTIN PEITZ
transmission through downloading. As for legal protection, it affects copiers’ utility
through the expected penalty if caught copying. In this framework, Duchene and
Waelbroeck show that a stronger IP protection negatively affects both copiers and
buyers: The effect on copiers is direct through the increased expected penalty; the
effect on buyers is indirect and stems from the fact that a stronger legal protection
leads the firm to increase both its technological protection and its price, which
unambiguously reduces consumer surplus.
In contrast with the above papers, it is in a multi-product environment that Peitz
and Waelbroeck (2004, 2006a) analyze the informational role of copies and their
possibly positive effect on profits. They propose a multi-product monopoly model
in which products are located on the Salop circle and in which consumers regard
each original as superior to its copy. To model sampling, the authors assume that
if consumers are not able to download copies on P2P networks, they completely
lack information about the products and choose therefore at random among them.
In contrast, if copies are available, consumers can use them to obtain information
on the horizontal characteristics of products. That is, P2P allows users to sample
and, thereby, to obtain a very precise signal concerning the location of the products
with respect to their own taste.22 As the number of products increases and as they
become more differentiated, this sampling effect becomes more powerful; consumers
have then a higher willingness to pay for the original and, as Peitz and Waelbroeck
show, the firm eventually benefits from the availability of digital copies.
Copying and adverse selection. In situations of asymmetric information, copies can
provide information on the quality of the original product and, thereby, they have
the potential to solve an adverse selection problem. This is the argument developed
by Takeyama (2003). In her model, a monopolist sells, over two periods, a durable
digital product that can have two exogenous qualities (high and low). There is
asymmetric information insofar as quality is known to the producer but not to the
consumers. It is assumed that consumers have no value for low quality, have unit
demand and are present in both periods. This benchmark setting is designed in
such a way that the adverse selection problem prevents a high-quality firm from
making profits.
However, the situation may be improved in the presence of piracy. A consumer
who copies in the first period will indeed learn the quality of the product and may
then decide to purchase the original in the second period (as it is assumed that the
original provides a higher value to consumers than the copy). Using our previous
notation, we can write the utility from a copy as αi θq − c. As before, c denotes
the reproduction cost. As for the quality degradation parameter, it is assumed that
it can take two values: One group of consumers receive a low value from copies
(αL ) and the other group, a higher value (αH > αL ). Takeyama imposes some
parameter restrictions to make sure that the group of consumers with parameter
αL never copy; for these ‘captive consumers’, the reproduction cost is higher than
the benefits of the copy, whatever the true quality and the price of the original. In
contrast, the other group may decide to copy in the first period and, upon learning
that the product is of high quality, purchase in the second.
22The mirror image of such information pull is the information push strategy of a producer
to reveal relevant product characteristics to consumers. Such a strategy may consist of content
advertising, as investigated by Anderson and Renault (2006).
DIGITAL PIRACY: THEORY
13
Different types of equilibria are possible in which the presence of copies allows
a high-quality firm to make profits. A first possibility is a pooling equilibrium
in which the firm intertemporally price-discriminates. In the first period, the firm
sells to captive consumers and lets the group with a high value for copies copy;
in the second period, the firm sells to the latter group at a price equal to the
value that they attach to the quality differential between the two versions (i.e.,
(1 − αH ) θq). Copying solves the adverse selection problem for high quality by
bringing an informational gain that the high-quality firm can capture.
There also exists a separating equilibrium with copies in which the quality may
be revealed to consumers prior to purchase and the low quality original may not
be available on the market. A natural extension of this result is to let the firm
decide whether copies should be available or not (by enforcing copyright or not).
Takeyama (2003) shows that the firm may strategically decide to make copies available (i.e., not to enforce copyright) as the existence of copies serves as a signal of
high quality. Takeyama (2009) explores more deeply this idea that a producer of
digital products can signal product quality via its copyright enforcement decision.
To this end, she explicitly models copyright enforcement and allows it to be partial
(instead of the all-or-nothing assumption of the previous model). In this extended
model, she shows that a high-quality firm may be able to choose a level of partial
copyright protection that a low-quality firm would never find profitable to mimic.
There exists therefore a separating equilibrium in which high quality is revealed.23
Note that if there was perfect information, a high-quality firm would opt for full
copyright protection. We see thus here that asymmetric information may make
partial enforcement of IP protection (i.e., some tolerance of piracy) profitable for
copyright holders.
Summary. Digital goods are complex experience goods: Consumers face uncertainty
whether a particular variety exists, and they have heterogeneous tastes for them.
Sampling by consumers can be highly beneficial for such goods. Information-pull
technologies, such as P2P networks, social networks and other Web 2.0 technologies,
greatly facilitate such sampling, especially for new or niche firms (and artists). This
suggests that sampling has the potential to generate positive welfare effects both
in the short and in the long run. This also explains why business models based on
traditional information-push technologies are slowly making way, under the pressure
of end-user piracy, to new business models and industry structures (see Section ??
for a brief review).
3.2.2. Network effects. A large majority of digital products exhibit network effects
in the sense that they give a utility to their users that increases with the number of
other users of that product. Hence, the utility derived from consumption depends
directly or indirectly on the consumption decision of other consumers. Software is
the prime illustration: The usefulness of a software often directly increases with the
number of users because (in case of incompatibility or only partial compatibility
with other products) a user can more easily exchange files generated with that
software; also, it often indirectly increases with the number of users because more
complementary products and services are offered (due to increasing returns). Music,
books and movies also exhibit network effects: The more they are consumed, the
23As a deliberate low enforcement of copyright protection is analogous to charging a low
introductory price of zero (or of distributing free samples), we notice a clear parallel between
Takeyama’s adverse selection story and the sampling story of the previous models.
14
PAUL BELLEFLAMME AND MARTIN PEITZ
more people are knowledgeable about them and the more they become attractive
(because of word-of-mouth recommendation, or because of the social prestige they
confer).24
When it comes to piracy, the key point is that network effects are generated by
both legitimate and pirated copies of a particular product. That is, pirated copies
contribute, through network effects, to raise the attractiveness of the original product. It follows that not enforcing copyright protection may, in some market environments, be privately and socially beneficial in the presence of network effects.25
This point was first made by Conner and Rumelt (1991). A number of other studies have developed the argument in a monopoly setting (we defer duopoly settings
to the next section). In contrast with the basic analyses of end-user piracy, these
papers reject the idea that piracy necessarily reduces the monopolist’s profits.
As we did for sampling, we start by extending the basic model to allow for
network effects. Belleflamme (2003) does so in the following way. Recall that in the
basic model, utilities were θq − p and αθq − c for an original and a copy respectively.
Now, with network effects, these utilities become (θ + µN ) q − p and (θ + µN ) αq −
c, where N is the consumer mass with an original or a copy, and µ measures
the strength of the network effect. Repeating the analysis of the monopolist’s
optimal pricing decision under these new assumptions, Belleflamme shows that
piracy continues to reduce profits as long as network effects are not too strong.
Contrastingly, Takeyama (1994) shows, in a different model, that piracy can
benefit the monopolist. Like Belleflamme (2003), she assumes that users only receive a share α of the utility associated with the original when using an illegal
copy. Her assumptions about consumers and network effects, however, differ with
Belleflamme’s. First, instead of considering a continuum of user types, she takes
a two-type distribution: There is a group of high-valuation users and a group of
low-valuation users. Second, while Belleflamme assumes that only the fixed utility depends on the network size, she assumes that it is the type-dependent utility
that depends on the network size. It follows that under Takeyama’s specification,
the network effect is more pronounced for the original than for the copy. This is
best seen by looking at consumers’ utilities. Supposing that N users consume the
product (in either form), high-valuation users derive utilities N − p and αN − c,
respectively from an original and a copy. As for low-valuation users, these utilities
are εN − p and αεN − c, with 0 < ε < 1.
Let us now sketch Takeyama’s main result in a simple example where we set the
reproduction cost c to zero and where we assume that each group of users is of
mass 1. When copies are not available (because, e.g., copyright protection is fully
enforced), a monopolist who sets a uniform price faces the following alternative:
It sets either p = 2ε if all users are served, or p = 1 if only high-valuation users
are served. The former option yields a profit of 4ε and the latter, a profit of 1.
Hence, the firm chooses to serve all users if ε > 1/4, and only high-valuation users
24Akin to network effects are addiction effects that create a positive inter-temporal link between a consumer’s own consumption of a digital product. Silva and Ramello (2000) note that
low-valuation consumers can become high-valuation ones thanks to previous consumption. As
Regner et al. (2009) observe, a kind of sampling effect may then arise insofar as current consumption of a copy can lead to future purchases of the same product or artist when consuming the
copy has created sufficient pleasure over time.
25In this section, we focus on the effects on the firm’s profit and only make a few remarks on
welfare effects.
DIGITAL PIRACY: THEORY
15
otherwise. Suppose now that piracy is an option (which all users prefer to not
consuming as copies are free). If the firm targets only high-valuation users, the
maximal price it can charge is 2 (1 − α), as a mass 2 of users consume the product
and as (1 − α) is the additional value attached to an original with respect to a copy.
The associated profit is 2 (1 − α). On the other hand, if the firm wants to sell to
all users, the maximum price is 2 (1 − α) ε and the associated profit, 4 (1 − α) ε.
It is thus optimal to serve only high-valuation users if 2 (1 − α) > 4 (1 − α) ε or
ε < 1/2. It follows that for 1/4 < ε < 1/2, piracy leads the monopolist to switch
tactics: It serves all users whitout piracy but only high-valuation users with piracy.
And if the monopolist can choose between the two regimes, it prefers not to enforce
copyright protection if 2 (1 − α) > 4ε—i.e., if the original is sufficiently superior to
the pirated version.
To summarize, we have that under certain conditions, the firm prefers to set a low
price when piracy is not possible so as to sell to all users and fully exploit network
effects. However, when piracy is possible, the firm can benefit from full network
effects while, at the same time, setting a high price to target high-valuation users.
As low-valuation users generate network effects even when they copy instead of
purchasing the original, the firm foregoes less profit from not serving this group
of users when piracy is present. There exist thus parameter configurations for
which profits without enforcement are higher than profits with full enforcement of
copyright protection.26
Gayer and Shy (2003a) obtain similar results. They consider a monopoly model
in which original and copy are horizontally differentiated and in which the original
may give higher fixed utility and stronger network effects. The authors show that
if network effects for the original are sufficiently strong, the monopolist’s profits are
larger with the availability of copies.
It must be noted that the previous results might not carry over to situations
where the monopolist uses versioning strategies. In particular, King and Lampe
(2003) show that a monopolist who offers a downgraded version himself (in order
to exploit network effects) may suffer from end-user piracy. The reason is that it is
often optimal to sell the downgraded version at a low but positive price. It is only
if creating a low-end version is sufficiently costly for the monopolist that it is not
in its interest to use this strategy.
Summary. When network effects are taken into account, one observes that copyright
holders may welcome end-user piracy. This is likely to be the case if firms manage
to price discriminate between users of originals and copiers (and if they do not
have any superior discrimination strategies available). The policy implication is
that weak IP protection should be favored because it makes both consumers and
firms better off in the short run (and it also fosters incentives to create or improve
quality in the long run).
3.2.3. Indirect appropriation. Indirect appropriation refers to the idea that the ability to make copies may increase the consumers’ willingness to pay for originals and,
thereby, allow producers of originals to capture (partially or even fully) the value
of these copies. This idea has been put forward by Liebowitz (1985) in the case
of photocopies of books and other printed material. The argument is in fact an
26Takeyama (1994) also shows that piracy can lead to a Pareto improvement compared to the
setting in which copies are not available. This occurs when the monopolist only sells to highvaluation users with and without copyright enforcement and when profits increase with copying.
16
PAUL BELLEFLAMME AND MARTIN PEITZ
application of (third-degree) price discrimination. Groups of consumers differ by
their willingness to pay for the original product and the source of the difference is
the value that they attach to the ability of copying. Thus, if the producer is able
to identify those consumers who purchase the originals that serve as models for
subsequent copies, he can increase his profits by charging a higher price to these
consumers than to other consumers. The difference between the prices for the two
groups is nothing but the value of copies; it is thus as if the producer had been able
to charge directly the consumers of copies.
It is important to note that this result relies on three restrictive assumptions:
(i) It must be possible for the producer to assess the amount of copying that will
be done from a single original; (ii) the population of buyers of the original must be
homogeneous; (iii) as in any price dsicrimination story, arbitrage must be prevented.
Liebowitz argues that these assumptions are largely satisfied for the particular case
of photocopying of academic journals. Libraries may indeed be expected to copy
more and they are easily identified. The theory is appealing as it can be invoked
to explain the shift from books (weak complement with photocopiers) to journals
(strong complements) in the academic profession.27
Liebowitz’s paper has been very influential and has inspired a number of subsequent studies on the issue of indirect appropriability. Besen and Kirby (1989)
make a link between indirect appropriability and the issue of a monopolist facing
a second-hand market. In a model with small-scale copying, they show that direct
appropriability arises when the marginal cost of copying is constant and indirect
appropriability when the marginal cost is increasing in the number of copies. The
main message of their analysis is thus that the technology of copying and the substitutability between originals and their copies are crucial to assess the advantage of
direct versus indirect appropriation. Besen and Kirby also show that strong substitutability between originals and copies, combined with increasing marginal cost of
copying, lead to a situation of clubs who share the cost of the original among their
(copying) members. The notion of sharing copies within clubs has been further
analyzed by Bakos, Brynjolfsson, and Lichtman (1999) and by Varian (2000). The
issue is to determine under which conditions selling to clubs rather than to their
members directly is more profitable for the copyright owner.
The next question that arises naturally is whether indirect appropriation is applicable to any copying environment. Serious doubts can be raised when looking
at how digital technologies have increased the speed and quality with which copies
can be made and distributed. As Watt (2005) nicely puts it, “indirect appropriability has been shown to work well enough for the very special case of publishing of
academic journals, but surely it would take a rather bold man indeed to seriously
suggest that it can also provide a robust form of remuneration for copyright holders
when music is burned from one CD to another, when mp3 files are shared by 50
million individual Internet users from their own homes world wide, and when bootlegged copies of Microsoft Office 2003 show up on the back streets of Bangkok.”
27Liebowitz tests for indirect appropriability by analyzing the change in the relative price of
an economic journal charged to institutions and individuals between 1959 and 1982 as a function
of its usage (measured by citations). After controlling for journal age and commercial journals,
Liebowitz finds a positive relation between the usage and the relative price of copyrighted good.
Also, price discrimination increased after the introduction of photocopy machines and demand
for material that is easy to copy (such as journal articles) increased compared to other materials
(such as books that are more difficult to copy).
DIGITAL PIRACY: THEORY
17
Johnson and Waldman (2005) share Watt’s skepticism about the wider applicability
of indirect appropriation. They identify two reasons why the indirect appropriation
argument can break down in markets for digital products. First, if copies flood the
market, their price falls to marginal cost, which is essentially zero for digital products. It follows that there is no profit associated with selling copies and thus no
indirect appropriability component of the price of original. Second, as digital copies
are close substitutes for originals, the price at which copies are available limits the
price the monopolist can charge for originals. Moreover, this price is necessarily
low if consumer valuation for copies is low. For these two reasons, the ability of
indirect appropriation does not seem to offer an escape route by which copyright
holders could benefit from end-user piracy in digital markets.
Note that Johnson and Waldman’s arguments apply more to the initial argument
of Liebowitz (1985) and Besen and Kirby (1989) than to the sharing version of Bakos
et al. (1999) and Varian (2000). However, one can also be skeptical about the
applicability of the sharing argument to digital products. Indeed, as the marginal
production costs of digital products are negligible, it cannot be profitable to sell
them through clubs. It can be argued, however, that the definition of costs should
be broadened to include marketing and distribution costs, which may well be nonnegligible even in a digital world. In this case, private copying (done within clubs)
may enhance the copyright holder’s profit. This may explain, for example, the
practice of site licenses for software. When these marketing and distribution costs
are due to an asymmetric information problem between firm and consumers, the
sampling argument that we exposed above complements the explanation.
A more convincing case can be made for indirect appropriation in digital markets
if one considers that indirect appropriation does not apply across consumers for a
given digital product but across complementary goods for a given consumer. The
idea is simple: If illegal copies are consumed together with private goods that
cannot be copied, the potential problem of end-user copying for copyright owners
is much less pronounced. We briefly return to this argument in Section ?? where
we describe new business models designed to tackle end-user piracy.
Summary. Indirect appropriation works when it is possible to assess the value of
the uses made from a legally purchased product. Producers can indirectly appropriate revenues from homogenous consumers who share its products within a club
or community if the marginal cost of copying is increasing. Digital technologies,
however, seriously undermine the feasibility of this strategy as high-quality copies
can quickly flood the market.
4. End-user piracy and market structure
So far in this survey, we have considered environments where a single digital product is offered by a monopoly producer.28 It may be argued that a single-product
monopoly setting is a reasonable approximation for markets with a high degree
of horizontal product differentiation (like music, books or movies). There exist,
however, a number of situations where this assumption proves restrictive and inappropriate. Even if digital products are highly differentiated and, therefore, hardly
28There are two exceptions in the papers we have reviewed in the previous sections: First,
Johnson (1985) studies a monopolistic competition framework in which a number of copyright
holders produce each a single original; second, Peitz and Waelbroeck (2004, 2006a) consider a
multiproduct monopolist.
18
PAUL BELLEFLAMME AND MARTIN PEITZ
compete directly with one another, some form of indirect competition may nevertheless appear. First, indirect competition stems either from the presence of a common substitute (namely copying) to otherwise independent originals, or, secondly,
from the durability of the digital product that puts the monopolist in competition with its future selves. Thirdly, some digital products present higher levels of
substitutability, at least on some market segments; think, e.g., of business software
that offer similar functionalities and are, therefore, close substitutes.29 We examine
these three situations in turn.
4.1. Indirect competition caused by copying. Related to Johnson (1985), the
idea that copying generates a form of indirect competition between horizontally differentiated digital products has been studied by Belleflamme and Picard (2007). In
a multi-product framework, they show how increasing returns to scale in the copying technology create an interdependence between the demands for digital products,
which would be independent otherwise. Increasing returns to scale in copying typically arise if consumers incur a high initial fixed cost to be able to copy (for example
by breaking the ‘moral barrier’ to illegal copying or by purchasing a DVD burner).
It follows that a firm benefits from low prices of the other firms because this makes
consumers less prone to install the copying technology, thereby reducing the threat
of piracy. As a result, there exists in this setting a range of prices for which prices
are strategic substitutes.
In a two-product duopoly, Belleflamme and Picard show that this strategic substitutability generates free-riding behaviors with respect to the threat of piracy: If
the two firms take this threat seriously by quoting low prices, then there exists an
opportunity for a firm to take advantage of this situation and to raise its price. If
the fixed cost of copying is low enough, such free-riding can lead to the absence
of an equilibrium in pure strategies. Firms may then randomize between several
prices, leading to price dispersion.30 Interestingly, when the fixed cost of copying
is not too small, the market can yield a symmetric equilibrium with prices that
are larger than the (average) price that would be set by a multi-product monopoly
controlling the two digital products.31
The interactions between copyright holders under the threat of piracy also yield
surprising welfare implications. From a static efficiency perspective, concentration
may be preferable to competition; this result is an application of the ‘Cournot effect’
according to which a merger between two monopolies producing complementary
goods is welfare-enhancing. Regarding dynamic efficiency, the multi-product setting
makes it possible to assess the incentives to create new digital products (rather
than the incentives to improve the quality of existing products, as is done in the
literature using monopoly settings). To this end, Belleflamme and Picard measure
29Even in the music and film industries, it can be argued that production and pricing decisions
are concentrated in the hands of a small number of major players.
30Price dispersion is commonly observed in markets for digital products. For instance, Brynjolfsson and Smith (2000) observe prices for a matched set of 20 books and 20 CDs sold through
conventional and Internet outlets, and report average price differences ranging from 25% for books
to 33% for CDs. The explanation usually advanced in the literature does not rely on piracy, though,
but on asymmetric information and search frictions (see, e.g.,Varian, 1980 and Baye and Morgan,
2001).
31Belleflamme and Picard even show that there exist parameter configurations for which the
duopoly prices are larger than the price of a monopoly that faces no threat of piracy.
DIGITAL PIRACY: THEORY
19
the (gross) incentives to create a new digital product by comparing their twoproduct framework with an economy where only a single digital product is available.
Whether those incentives are larger for an entrant or for an incumbent firm is not
clear a priori. On the one hand, the entrant’s incentives are reduced by the freeriding effect observed in a duopoly; on the other hand, the incumbent’s incentives
are reduced by a cannibalization effect (copying becomes more attractive as the
number of goods increases). Yet, it is possible to conclude in this model that
incentives to create are always higher for an entrant—i.e., if the ex post economy is
organized as a duopoly. Therefore, ex post competition can be seen as a necessary
evil that enhances ex ante incentives to create (which is the exact opposite of the
traditional argument underlying IP protection, as recalled in Section ??).
Clearly, the previous results are derived from a set of restrictive assumptions and
should, therefore, not be taken at face value. They suggest, however, that under the
threat of piracy, copyright holders impose on each other a number of externalities
that may significantly alter the equilibrium outcome (and the welfare implications)
compared to what is obtained under a one-good monopoly setting.
4.2. Durable goods and commitment problem. Digital products such as software are durable goods—i.e., consumers can benefit from the purchase of these
goods over a number of periods. An important issue for firms selling durable goods
is whether they can commit to future prices. In the absence of commitment, a
monopolist selling a durable good is, in effect, in price competition with itself over
several periods, which might force it, at the extreme, to offer a competitive price in
the first period—this is the Coase conjecture that has been formalized by Stokey
(1981), Bulow (1982), Gul, Sonnenschein (1986).32
Re-considering end-user piracy, Takeyama (1997) assumes that a copyright holder
suffers from this Coasian commitment problem and shows that piracy may hurt the
monopolist even more when dynamic effects are taken into account.33 She develops
a two-period model with two types of consumers, who buy up to one unit in the
two periods: ‘High types’ have a high valuation for the good and no propensity to
copy, while ‘low types’ have a low valuation for the good and a strong propensity
to copy. Without copying, high types anticipate a lower price in the second period, which is set to make low types indifferent between buying and not buying.
Therefore, the monopolist has to offer a price strictly below the valuation of high
types in the first period so as to satisfy their incentive constraint. The problem gets
32In many markets for digital products, it is not clear whether firms actually lack commitment
power. Indeed, since most firms offer multiple products, they may not give steep mark-downs over
time for reputation reasons. As is well-known in the literature on the durable goods monopoly,
reputation concerns may give the firm commitment power. Planned obsolescence, which is common
for software, may also be used to reduce the durability of the product.
33In related papers on versioning by a durable goods monopolist, Hahn (2006) and Inderst
(2008) consider an environment with two consumer types and discrete time in which a firm can
sell different versions of a product over time. Here, the firm faces a commitment problem in price
and quality. They show that a firm may optimally decide to sell a low- and a high-quality version
in the first period (and trade only occurs in this period). The firm may optimally sell the lowquality version below marginal cost in the first period. By serving low-valuation consumers in the
first period, it avoids price concessions in later periods to high-valuation consumers. This result
can be interpreted in terms of piracy as follows: illegal copying (which resembles a low-quality
version) may mitigate the Coasian commitment problem so that copies that are distributed for
free actually increase the firm’s profit. Hahn (2006) also provides detailed conditions for the
monopolist to introduce a low-quality version simultaneously or with a delay.
20
PAUL BELLEFLAMME AND MARTIN PEITZ
worse when copying is possible: Now, the monopolist has to lower the second-period
price to make low types indifferent between buying and copying. This leads to a
reduction in profits that is equivalent to what would be obtained in an atemporal
model. However, what makes things worse is that the lower second-period price
affects the incentive constraint of high types in such a way that the monopolist also
has to lower the first-period price. This second, dynamic, effect leads to a further
reduction in first-period profits.
It is thus shown that the dynamic problem typically amplifies the negative effect
of piracy on profits. However, Takeyama also identifies cases where copying actually
increases profits: If the monopolist cannot avoid copying in the second period without making losses in that period (i.e., if the marginal costs of production and selling
of the good are above the private copying cost of low types), then the availability
of copies in the second period serves as a commitment not to offer the good in the
second period. As a consequence, in the first period, the participation constraint
and not the incentive constraint of high types becomes binding. In other words,
the monopolist can extract the full surplus from high types.
4.3. Competitive effects. What happens when two producers of substitutable
and piratable digital products directly compete with each another? Shy and Thisse
(1999) address this issue by extending to a duopoly framework the analysis of piracy
in the presence of network effects (in the spirit of Conner and Rumelt, 1991, and
Takeyama, 1994). In their model, two firms are located at the extreme points of the
Hotelling line. Two types of consumers are distributed along the line: Using the
same terminology as in the previous model, ‘high types’ have a strong preference
for originals, while ‘low types’ are indifferent whether the good is an original or a
copy. In particular, the benefit from purchasing the original is r > 0 for high types
and 0 for low types.34 Both types of consumers enjoy network benefits, which are
generated by the total number of users of a particular software (be they consumers
of the original or of a copy). Denoting this number by N and considering the
product located at 0, we have the following utility functions for a consumer located
at x ∈ [0, 1]: When purchasing the original, the consumer gets r + µN − x − p
if her type is high and µN − x − p if her type is low; when copying the product,
the consumer gets µN − x whatever her type (µ measures the strength of network
effects and copies are assumed to be free and to be prefect substitutes to originals).
Shy and Thisse impose parameter restrictions to make sure that the firms never
compete for low types. Under this assumption, they compare the types of equilibria
that obtain when (full) copy protection prevails or when consumers can copy. Under
copy protection, they show that there exist up to two types of symmetric equilibria:
If network effects are sufficiently strong, the equilibrium is such that both firms price
low so as to sell the good to some low types; if network effects are sufficiently weak,
the firms prefer at equilibrium to set prices so as to sell only to high types.35 In
contrast, when consumers can copy, the argument already put forward by Takeyama
(1994) may apply: Firms can exploit network effects without selling to low value
consumers. This is true as long as network effects are strong enough. Then, firms do
not need to price low to take advantage of network effects (as they had to under copy
34The difference in value between an original and a copy is thus independent of the network
effect, contrary to Takeyama (1994).
35For this result, see Peitz (2004) who corrects a mistake made by Shy and Thisse in their
original analysis.
DIGITAL PIRACY: THEORY
21
protection). When copies are freely available, they can concentrate on high value
consumers and still reap the benefits from network effects, which leads to higher
prices and profits. On the other hand, when network effects are weak, it turns out
that sales are not affected by the copy protection policy. What changes, however,
in a duopoly framework is that price competition gets fiercer and, consequently,
profits fall.
The analysis of Shy and Thisse (1999) has been extended in a number of directions. Jain (2008) refines the analysis of copyright protection by assuming that
firm i can choose a level of copyright protection, noted αi , such that only a proportion αi of low types (who are, by assumption, the only consumers interested in
copying) can copy its product (that is, αi represents the level of piracy for firm i’s
product). Another important difference with Shy and Thisse’s framework is that
Jain lifts the restriction on the absence of competition for low types. Jain assumes
instead that low types have a sufficiently higher valuation for the product such that
firms compete for them. It turns out that results change significantly under this
alternative assumption. In the absence of network effects, Jain shows that piracy
can change the composition of the market and, thereby, reduce price competition
between firms. This is because copying by low types, who are more price-sensitive,
enables firms to credibly charge higher prices on the segment of consumers that do
not copy. Furthermore, this positive effect of piracy on firms’ profits can sometimes
outweigh the negative impact due to lost sales. So, even in the absence of network
effects, firms may prefer weak copyright protection in equilibrium. The existence of
network effects, however, somewhat blurs the picture. Actually, the opposite result
may hold when network effects are strong enough: It is copyright enforcement that
helps firms to reduce price competition. This is because when firms compete for low
types and network effects are strong, allowing piracy by both firms can intensify
price competition. Therefore, in such situations, strict copyright enforcement by
one firm can serve as a coordination device to reduce price competition. The main
message that can then be drawn from Jain’s analysis is that, in a duopoly framework, the role of copyright protection depends on the strength of network effects:
Absent network effects, weak copyright protection allows firms to increase prices,
while the opposite prevails in the case of strong network effects.
Minnitti and Vergari (2010) also consider a differentiated-product duopoly framework. Their goal is to analyse how the presence of a (private, small-scale) filesharing community affects the pricing behaviour and profitability of producers of
digital products. It is assumed that consumers can download one of the two goods
by joining a file-sharing community, with the restriction that consumers can join
only if they buy and share a digital good with the community.36 Their model differs from the above two models in a number of ways. First, consumers are assumed
to be homogeneous (except for their location on the Hotelling line); they all value
originals in the same way but their copying cost depends on their location. Second,
there are no network effects. Third, consumers are allowed to consume both goods:
They may buy one and copy the other.37 Finally, the intrinsic benefit from using
the first digital product may not be large enough for all consumers to be willing to
participate. Minnitti and Vergari show that the latter assumption is key: Market
36This initial purchase requirement seems a reasonable assumption within small, private communities where consumers share only the files they own.
37As long as piracy is feasible, purchasing both goods is a dominated option for all consumers.
22
PAUL BELLEFLAMME AND MARTIN PEITZ
coverage is indeed crucial in determining firms’ attitude towards piracy. In particular, when the market is not completely covered, firms are shown to benefit from
piracy. We are indeed in the presence of two monopolies that see the downloading
option as a way to enlarge their market share without increasing competition. This
is because downloading is made through file-sharing communities that can only be
joined by consumers who have purchased a digital product. Hence, the downloading
possibility makes the goods more attractive, which drives some consumers to use
both goods. Firms take thus advantage of a form of indirect appropriation. Naturally, this argument only holds when there are consumers still to be conquered. In
fully covered markets, the positive demand effect is indeed missing and file-sharing
is harmful to firms; they would therefore prefer to be protected from piracy.
5. Commercial digital piracy
We have been concerned so far with end-user piracy. In this section, we consider
briefly commercial (or for-profit) piracy—i.e., piracy achieved by organizations that
illegally reproduce and sell copyrighted products at a large scale. Commercial
piracy is a form of counterfeiting, which, following Grossman and Shapiro (1988a,
1988b), can be defined as illegally copying authentic goods with a brand name.
It can take one of two forms: Either the copied product is a perfect substitute
of the original one and, insofar as the two products are sold at the same price
(which is usually the case), consumers cannot distinguish between them; or the
counterfeited product is an imperfect substitute of the original one and consumers
knowingly make a choice regarding which product to buy.38 These two forms are
called, respectively, ‘deceptive’ and ‘non-deceptive’ counterfeiting in Grossman and
Shapiro’s terminology.
Although commercial piracy is a major concern to the producers of digital products (software, music and movies), mainly in developing countries,39 this form of
piracy has received little attention in the economics literature. There is in fact only
a handful of papers that explicitly study commercial piracy. However, commercial
piracy can largely be studied by using the models developped in the literature on
end-user piracy. As far as consumer decisions are concerned, nothing really differs
between the two forms of piracy: Copying from a friend or buying a counterfeited
product are essentially modelled in the same way. Now, what clearly differs in the
case of commercial piracy is the presence of an additional category of (possibly
strategic) players, namely the counterfeiters. Yet, from a modelling point of view,
including these players is not fundamentally different from including competing
legitimate producers, as is done in the models reviewed in the previous section.
38Consumers know (or strongly suspect) that they are buying a counterfeit, either because
they observe the product’s low quality after close inspection, or simply because of the place of
purchase. For instance, in the case of music, we can think of CDs bought from street peddlers,
or of downloads from a file-sharing service such as the Russian site AllofMP3, which charged
significantly lower prices than those of mainstream services (although this site claimed that it
operated in accordance with Russian copyright law, it was closed down in 2006 under American
pressure).
39Estimates of the effects of piracy on the profits of copyright owners are notoriously hard
to make; distinguishing between commercial and non-commercial forms of piracy is fraught with
even more difficulties. Kiema (2008, p. 304-305) reports that “the International Federation of the
Phonographic Industry (IFPI) has estimated that approximately 37% of all the [music] CDs that
were purchased in 2005 globally were pirate copies. However, in the case of the software industry,
it is more difficult to find estimates of the prevalence of commercial piracy.”
DIGITAL PIRACY: THEORY
23
Banerjee (2003, 2006) studies competition between an incumbent copyright owner
and one potential pirate entrant. Consumers are assumed to be able to distinguish
legitimate from pirate products, for which they have a lower willingness to pay—i.e.,
Banerjee considers non-deceptive counterfeiting. He uses the Mussa-Rosen model of
vertical product differentiation, with consumers being heterogeneous with respect
to the utility derived from the quality difference between the original and the copy.
The main difference with the models reviewed in Subsection ?? is that the price of
the copy is set by a profit-maximizing counterfeiter. In this context, Banerjee analyzes what attitude a government (caring about static efficiency) and the copyright
owner take in the face of piracy. The government may decide to monitor and penalize commercial piracy, while the copyright owner may combine entry-deterrence
strategies and investments in protective devices against copying.40 Jaisingh (2009)
performs a similar analysis in a slightly different framework: The heterogeneity
with respect to quality differences is replaced by heterogeneity with respect to the
copying costs (which can be increased by anti-piracy measures). The analytical
reasons as to why the policy implications drawn from Jaisingh’s and Banerjee’s
analyses differ are clearly explained in Bae and Choi (2006).41
The above analyses share the often unrealistic assumption that only one counterfeiter can enter the market. In reality, counterfeiters tend to remain relatively
small. As copying and distributing digital products do not require heavy investments, entry in the counterfeiting business is relatively easy and the number of
counterfeiters tends thus to be large on a given market. Being small also reduces
the risk for the pirate to be detected by a public authority. It is also observed
that pirated copies are priced above marginal cost (which is close to zero for digital
products). One needs then to address the question why Bertrand competition between the counterfeiters (rather than between them and the copyright owner) does
not drive prices down to zero.
Yao (2005) proposes the following answer: Although counterfeiters have zero
marginal cost of production, they face an expected cost resulting from the risk
of being caught by the authorities. In particular, counterfeiters are caught with
probability φ ∈ [0, 1], and have to pay a fine, which is fixed at some proportion
t of the price of the legitimate product, pm . Letting pc denote the price of a
pirate copy, we have that the net expected payoff due to counterfeiting is equal
to (1 − φ) pc − φtpm . Because of free entry and exit of counterfeiters, this should
be equal to zero at the long-run equilibrium. It follows that pc = (φtpm ) / (1 − φ),
which increases with pm , the price of the legitimate product and with φ, which can
be seen as the monitoring rate to detect counterfeits and thus, as an indicator of
the strength of IP rights enforcement.42
40Martinez-Sanchez (2010b) considers (movie) piracy in a vertical product differentiation model
with sequential pricing and shows that the pirate, if it enters, decides to offer the illegal copy prior
to the release of the original. Maximizing short-run welfare the government does not fully protect
the copyright holder and, similar to the work on end-user piracy, the government designs its policy
such that the incumbent decides to set a price below the monopoly price that successfully deters
the pirate from entering the market.
41Banerjee et al. (2008) address the same questions in the case of deceptive counterfeiting
(originals and copies are seen as perfect substitutes by the consumers).
42Yao (2005) further assumes that the original product and the pirate copies are vertically
differentiated à la Mussa-Rosen (counterfeiting is thus non-deceptive). In this framework, he
analyzes the effect of changes in the extent of IP rights enforcement on total social welfare (dynamic
efficiency is considered by endogenizing the copyright owner’s choice of quality). The main result
24
PAUL BELLEFLAMME AND MARTIN PEITZ
Kiema (2008) proposes a related explanation for the positive price of pirate
copies. Counterfeiters are assumed to have zero marginal cost of production but
to face some positive ‘advertising cost’. To make positive sales, counterfeiters have
to inform consumers of the availability of their products; they do so, by sending
advertisements to consumers at random. Although the physical cost of sending an
ad is close to zero in a digital world, each additional sending increases the expected
cost of punishment for the counterfeiter, which makes the advertising cost positive.
As a result, the competition between the counterfeiters resembles the classical model
of advertising by Butters (1977), which leads to equilibrium price dispersion.43
6. Private and public measures against end-user piracy
In the preceding sections, we considered the rightholder’s reaction to piracy and
mostly focused on the pricing decision, taking the enforcement policy and public
measures in the face of piracy as given. Public debate has been dominated by the
actions that should be taken, especially by the government, in response to piracy.
In this section, we report on some recent efforts on this issue. One can distinguish
three categories of actions: (1) legal actions; (2) technology-based actions and (3)
alternative remuneration schemes. Concerning the first category, one may want to
distinguish between actions against platforms on which piracy is taking place—i.e.,
legal actions against file-sharing platforms such as the old Napster—and actions
against individual uploaders and downloaders. Concerning the second category, in
the context of digital files this comes under the name of digital rights management
(DRM). Concerning the third category, it is a bit odd to talk about piracy, since
levies on hardware intend to give returns to rightholders under a fair-use regime—
i.e., to justify levies end-user copying cannot be seen as illegal, but would need to
be considered fair use.
6.1. Legal actions.
6.1.1. Facts. It is fair to say that it is the introduction of Napster (a peer-to-peer–
P2P–file-sharing system) in 1999 that turned the issue of digital piracy into a topic
of intense debate. The fear was great in the music industry that illegal file-sharing
would quickly destroy profits. The first legal actions were thus targeted against filesharing platforms. In 2001, the Recording Industry Association of America (RIAA)
obtained the closure of Napster but the victory proved short-lived as a number
of other file-sharing systems (such as Kazaa, Limewire, and Morpheus) quickly
replaced Naspter. The industry started then a campaign of litigation against individual P2P file sharers: Between 2003 and 2008, legal proceedings were opened
against about 35,000 people. In parallel, the industry also lobbied to obtain stronger
protection of copyrights and stiffer penalties for infringement. Yet, these tactics did
not prove very effective in combating online music piracy. At the end of 2008, the
industry decided then to shift its efforts to a model known as ‘graduated response’.
is that the government should monitor counterfeiting only if the degree to which counterfeiters
are able to imitate the original product is above some threshold.
43Combining these assumptions with the usual Mussa-Rosen framework, Kiema (2008) analyzes the role of government policy and of DRM systems in preventing commercial piracy. One
interesting result is that when there are several counterfeiters on the market, an increase in the
price of legitimate copies increases price dispersion in the market for pirate copies and decreases
their minimum price.
DIGITAL PIRACY: THEORY
25
As we already mentioned in Section ??, a widely publicized form of graduated response (in Europe and in the United States) is a “three strikes” rule according to
which the user’s ISP suspends or terminates Internet access after three successive
notices of copyright infringement. At the time of this writing, it is too early to
assess the effectiveness of such measures.
6.1.2. Analysis. In the basic analysis of the effects of digital piracy that we described in Section ??, we already examined how stronger legal actions against
copyright infringement may affect the right holder’s profit and the consumer surplus. Recall that legal actions were modeled through either a marginal increase in
the copying cost or a marginal decrease in the quality of copies (see, e.g., Novos
and Waldman, 1984, Yoon, 2002, or Bae and Choi, 2006). We complete here this
preliminary analysis by reviewing a couple of papers that have a closer look at how
copyright protection is chosen.
In the analyses of Section ??, it was assumed that the copyright holder does
not distinguish between different types of users—i.e., we considered a broad-based
enforcement policy that affects all consumers in the same way. A copyright holder
may, however, prefer a targeted enforcement policy and focus instead on some specific user groups. In particular, the monopolist may want to concentrate on highvaluation consumers. Harbaugh and Khemka (2010) analyze this option in a model
of vertical differentiation with a continuum of consumer types. Targeted enforcement is modeled as a costly device that allows the firm to create two distinct groups
of consumers: Those consumers who are targeted are willing to pay a high premium
on originals, while the others do not face any risks and are essentially not willing
to pay a premium for originals. This means that a model with a continuum of
types and targeted enforcement becomes a model with essentially two types, the
group sizes being determined by the scope of the enforcement policy. The interesting finding in such a framework is that the optimal monopoly price with targeted
enforcement may be above the monopoly price without piracy, pM . As Harbaugh
and Khemka (2010) explain, the reason is that with targeted enforcement and positive enforcement costs, the monopolist may not want to apply enforcement up to
the level of the demand that would be served by the monopolist without piracy
but may want to choose a more limited scope. Then, if enforcement is sufficiently
effective to deter the targeted consumer segment from copying, prices are above pM
since only high-valuation consumers can be “convinced” to buy the original.
In Cremer and Pestieau (2009), a monopolist sells a digital product in two
versions. These versions are targeted at two different types of consumers (which
the firm cannot observe): High-valuation (j = 1) and low-valuation consumers
(j = 2). Facing the price-quality pairs (pL , qL ) and (pH , qH ), consumers derive
utility uj (qi ) − pi , i = L, H. Low-valuation consumers may also make a copy
and achieve some quality q < qH . The quality of the copy is the solution to
maxq θu2 (q) − x (q, e), where x is the individual cost from copying. This cost increases in the chosen quality q and the level of copyright protection e. The level e
can be seen as chosen either by the monopolist or by the government (or a regulator appointed by the government): In the former case, it corresponds to private
legal actions or attempts of technical protection (like the DRM systems we consider in the next section); in the latter case, it corresponds to public measures of
IP protection (e.g. those established in the Digital Millennium Copyright Act).
26
PAUL BELLEFLAMME AND MARTIN PEITZ
The authors suppose first that the government is in charge of the pricing policy
as well as the level of copyright protection. In that case, they show that it can be
socially optimal (in a second-best sense—i.e., respecting the incentive constraints
of consumers) to sell only to high-valuation consumers and to let all low-valuation
consumers copy the product. Then, high-valuation consumers fully finance the
product. Although a private firm could replicate such a strategy, it could find it
more profitable to implement a positive level of copyright protection and, thereby,
to sell to both types of consumers. It follows that the private firm implements a
higher level of copyright protection than the government.
In a second scenario, Cremer and Pestieau consider that e is a government policy
determining the strength of IP protection. Suppose that we are in a situation in
which the socially optimal government policy (again in a second-best sense) requires
to sell to both consumer groups and to choose a positive level of IP protection. If
the firm controls the pricing, the best government policy may be not to provide
any IP protection at all. Thus, although IP protection is too low compared to the
socially optimal government policy when the government also controls the pricing
policy, it is the best not to provide IP protection given that the product is sold by
a profit-maximizing firm.
6.2. Technology-based actions.
6.2.1. Facts. Copyright holders may resort to technology-based actions to complement their IP rights so as to prevent unauthorized duplication of their work. Digital
products are often protected by digital rights management (DRM) systems, which
is an umbrella term for a number of technologies that inhibits uses of digital content not desired or intended by the content provider.44 DRM systems have thus
the potential to fight digital piracy but also, in a more general way, to manage
how digital products can be used. Well-known examples of DRM systems are the
Content Scrambling System (CSS) employed on film DVDs since 1996, so-called
‘copy-proof’ CDs introduced by Bertelsman in 2002 (which could not be played on
all CD players and were later abandoned), and the FairPlay system used by Apple
on its iTunes Store. Recent development in digital distribution suggest that DRM is
on a loosing path since not only Apple but also Amazon and Walmart have started
selling DRM-free digital music files.
6.2.2. Analysis. The basic analyses of digital piracy can again be used to assess
the impacts of DRM systems when they are simply viewed as a way to increase the
copying cost. However, it can be seen from the above description that the effects
that DRM systems have on the production, distribution and consumption of digital
products go beyond the reduction of illegal copying. We review here some of these
effects.
Besides hindering piracy, DRM systems may also increase the copyright holder
profits by allowing him to implement various price discrimination tactics (versioning, group pricing and even personalized pricing). DRM tools allow indeed the
producer to define who can do what with the digital product. This possibility is
particularly interesting for new artists, as Duchène, Peitz and Waelbroeck (2006)
44As Kiema (2008, p. 305) explains, “digital rights management tools can, broadly speaking,
be divided into cryptography (i.e. the distribution of information goods in an enciphered format)
and watermarking (i.e. embedding information into a digital product in such a way that each
copy of the good becomes different).”
DIGITAL PIRACY: THEORY
27
argue. Because they make it easier for new artists to expose their products to consumers, DRM should not simply be considered as a tool to protect against piracy,
but rather as a key to opening up the market.
A potential downside of DRM systems is that they may decrease the value that
the consumers attach to the original product (for an illustration, think of the copyprotected CDs that could not be played on all CD devices). The producer faces
then a trade-off between making the demand for the digital product less elastic (as
DRM systems hinder copying) and, at the same time, dampening the demand (as
DRM protection reduces the attractiveness of the original). Sundararajan (2004)
analyses this trade-off and shows that the producer may find it optimal to choose an
intermediate protection level. In a similar vein, although in the main part assuming
that DRM leaves the quality unaffected, Ahn and Shin (2010) find that DRM-free
is optimal when copyrights enforcement is strong or when the antipiracy function
in DRM is not very effective due to the severe free rider problem. Otherwise, they
show that the use of DRM is optimal for the firm, with the legitimate products
having lower quality than unauthorized copies. Ahn and Shin obtain implications
for the optimal design of copyright law that takes into account the substitution
possibility through DRM.
In a competitive context, the choices of DRM systems also raise issues related to
compatibility and interoperability. For instance, several incompatible DRM systems
coexist for the distribution of digital music; similarly, on the e-book market, each
platform comes with its own incompatible DRM protection. Park and Scotchmer
(2005) examine whether firms prefer proprietary systems or a shared system, and
whether their choice coincides with efficiency. The answers to these questions are
ambiguous as the two options may have countervailing effects on prices and costs.
Regarding prices, proprietary systems have the advantage of being a less attractive
target for circumvention attempts, which reduces firms’ incentives to lower their
prices so as to avoid circumvention. On the other hand, a shared system may
facilitate collusion through cost sharing. Regarding costs, the transition from a
shared system to proprietary systems lowers costs as the required level of protection
is lower, but raises them because of duplication.
A related issue is the effect of strategic interaction among producers of digital
goods on their choice of DRM protection. In the spirit of Johnson (1985) and Belleflamme and Picard (2007), Choi, Bae and Jun (2010) consider a framework in which
the interdependence between the firms comes from their strategies against piracy
rather than from direct competition on prices. In particular, the degree of similarity between the DRM systems of the two firms (i.e., the extent to which cracking
one system allows users to crack the other system) is key to determine the type of
strategic interaction between the firms: If the two systems are relatively dissimilar,
the DRM protection levels of the two firms are seen as strategic substitutes as they
tend to move in the opposite direction; in contrast, when the two systems are quite
similar, the protection levels move in the same direction and are seen as strategic
complements. The authors derive the optimal DRM levels, prices, and demand
functions for the original for each type of strategic interaction. They examine then
the interaction between public and private protection against piracy. In particular,
they show that when the firms consider their DRM levels as strategic substitutes,
a crowding-out effect is observed: A stronger public copyright protection tends to
28
PAUL BELLEFLAMME AND MARTIN PEITZ
reduce the equilibrium level of private DRM protection and to increase piracy. The
opposite prevails when DRM levels are seen as strategic complements.
6.3. Alternative remuneration schemes.
6.3.1. Facts. As we explained in Section ??, an important limitation to a copyright
holder’s exclusive rights is “fair use”, which permits the limited use of a copyrighted
work without requiring the creator’s authorization. In particular, using the European terminology, “private copies” are permitted (i.e., users are allowed to copy
copyrighted material as long as it is for their personal use). In most European
countries, Japan and Canada, this allowance has been coupled with the imposition
of so-called “copyright levies”. These levies are intended to compensate copyright
holders for the economic harm done by legal private copying. The logic is thus
the following: As acts of private copying cannot be licensed for practical purposes
by the relevant rights holders, an alternative remuneration scheme, involving lower
transaction costs, has to be found. The chosen solution is to place surcharges on
digital recording equipment and media, and to let collecting copyright societies
collect the fees and pass them back to copyright holders.
6.3.2. Analysis. Although copyright levies are not intended to compensate for illegal copying (they do not constitute a sort of “piracy tax”), we mention them here
because they are likely to have indirect impacts on piracy. Levies, like any sales
tax, create market distortions. By making hardware devices more expensive, they
have the potential to reduce copying, be it legal or illegal.45 On the supply side,
levies represent a alternative source of revenues for producers and may therefore
affect their attitude towards piracy.46
It is along these lines that Gayer and Shy (2003b) study the effect of hardware
taxation on the demand for software. They postulate that consumers cannot use the
software (either the original or a copy) without purchasing the hardware. Therefore, by making the hardware/software bundle more expensive, a tax on hardware
reduces both copying and the demand for the legitimate software. Yet, if the proceeds of the hardware tax go to the software producer, a tax increase may benefit
the producer. The authors compute then the profit-maximizing tax rate and show
that it falls short of the tax rate that eliminates piracy.
Alcala and Gonzalez-Maestre (2010) compare the consequences of different levies
on copy equipment and analyze alternative schemes for allocating their yields. To
do so, they extend the conventional analysis of digital piracy by including three
key aspects of artistic markets that are usually neglected: The predominance of
superstars, the importance of promotion expenditures, and the dynamics of talent
sorting. They start with a short-run analysis where they take the number of superstars as exogenously given and assume that there is free entry into the sub-market
of niche and young artists. Piracy is shown to hurt superstars (by reducing their
45Arguably, levies may contribute to blur the boundary between legal and illegal use of copyrighted work (users may have the wrong impression that the payment of an upfront tax on the
hardware grants them extensive rights on the content).
46Obviously, using ‘producers’ as a general term is an oversimplification in this context. Copyright levies have indeed contrasting impacts on the various players in the value chain of digital
products. Roughly put, rights holders and collecting societies (acting on their behalf) like the
levies, whereas the consumer electronics industry hates them. Accordingly, the industry welcomed the European Commission’s initiative to reform the copyright levies system in the EU.
Yet, despite a large consultation of all stakeholders, no such reform has been implemented so far.
DIGITAL PIRACY: THEORY
29
earnings and the incentives to invest in their promotion) at the benefit of niche and
young artists (whose market share and number increase). Using an overlappinggenerations model of artists, they study then the dynamics of the market and its
long run equilibrium. The number of superstars is now endogenous: Only a fraction
of young artists starting the artistic career show talent and become superstars later
in their career. Hence, as piracy helps more young artists start their career, it also
increases the number of highly talented artists in the long run.
In this setting, the authors uncover two potential negative impacts of copyright
levies on artistic creation. First, by hindering the promotion of niche and young
artists, levies hamper artistic creation in the long run. Second, when levy yields are
distributed in proportion to market sales (which is the most common policy followed
by Western countries), levies strongly favor superstars and, thereby, reduce artistic
diversity in the short run, as well as high-quality artistic creation in the long run.
The latter problem could be alleviated, the authors argue, by allocating levy yields
on the basis of non-linear (in sales) schemes that strongly favor young artists.
To close this section and link it with the previous one, let us recall that the logic of
the copyright levy system relies on transaction costs: The system was introduced
because there were no effective means to monitor (and therefore authorise) acts
of copying by consumers. However, the advent of DRM technologies should lead
policy-makers to question this argument. Indeed, as Regner et al. (2009) note, it
is now (technologically and economically) feasible to design DRM-based licensing
contracts on which individualized monitoring and compensation schemes can be
based.
7. Conclusion
In this article, we have extensively reviewed the theoretical literature on piracy
of information products. This literature, which started in the mid-1980s, really
mushroomed at the turn of the 21st century when digital piracy became a topic of
intense debate. Our analysis has been mainly focused on end-user piracy, which acts
as an illegal source of competition for right-holders. One therefore expects piracy to
have a negative impact on right-holders’ profits. In terms of welfare, piracy is likely
to improve welfare in the short run (as the deadweight loss of monopoly is reduced)
but to deteriorate it in the long run (as lower profits imply lower incentives to
create and to improve products). These conclusions were established in a number
of seminal papers considering a simple monopoly framework.
Subsequent analyses extended this basic approach in several directions. First, it
was suggested that piracy also had the potential to increase the right-holders’ profits, thereby counteracting its negative competition effect; a number of ways were
described by which pirated copies could increase the value of original products either
by solving an experience good problem (sampling), by increasing network benefits,
or simply because the ability to make copies raises the consumers’ willingness to
pay for originals (indirect appropriation). It was then shown that there exist circumstances where right-holders favor piracy and where fighting piracy could prove
welfare-detrimental. A second line of extension was to examine the effects of piracy
in environments where several digital products compete with one another. Competition between digital products either stems directly from their substitutability,
or indirectly because end-user piracy is a common substitute for otherwise independent products (durability may also create intertemporal competition for the
30
PAUL BELLEFLAMME AND MARTIN PEITZ
same product). These analyses showed that competition may significantly alter
copyright holders’ strategies towards piracy (and the corresponding welfare implications) compared to what can be drawn from the basic monopoly approach.
Finally, we discussed contributions that consider other responses to piracy than actions through prices, namely legal actions, technical measures and copyright levies.
To close this survey, we should say a few words about new business models that
have recently emerged in digital markets. A number of papers have described these
new models: For instance, Dubosson-Torbay, Pigneur, and Usunier (2004) review
business models for music distribution in a post-Napster world; Duchène, Peitz, and
Waelbroeck (2006) examine the potential of DRM for creating new markets. More
recently, Regner, Barria, Pitt and Neville (2009) survey and categorize emerging
digital media business models. Interestingly, they categorize the models according
to the extent to which payment and rights are decoupled from the actual distribution of content. On one end of the spectrum, one finds the conventional models
that we have reviewed in this survey: These models are based on strong DRM and
imply a strong link between payment, rights and distribution (basically, it is the
conventional offline retail model that is translated online). As an alternative, various industry players have tried subscription-based business models, which, however,
also tend to rely on strong DRM. When one moves along the spectrum, payment
and rights become increasingly decoupled from distribution. A recent trend seems
indeed to let consumers access digital products without asking for an immediate
payment or, even, without asking for any payment at all. In some models, payment may be made on a voluntary basis.47 In other models, the content is free but
revenues come from complementary products and services, or from advertising.
The latter type of models exploit the idea of indirect appropriation that we explored at the end of Section ??. Recall, however, that indirect appropriation applied
across consumers for a given product. Here, what is suggested is to exploit indirect appropriation across products for a given consumer. Indeed, if illegal copies
are consumed together with private goods that cannot be copied, end-user piracy
may be seen as less harmful for copyright owners. In this logic, digital products
can be used as loss leaders that boost the demand for complementary products or
services; for instance, free downloads of an artist’s music can be used as a promotional device that increases the demand for concert tickets or for ancillary products
(ringtones on mobile phones, T-shirts, caps, etc.). A number of formal analyses of
such complementary product and service-based models have been proposed.48
As these business models are recent and are developing in a fast-changing technological landscape, it is not surprising that they have only received limited attention
in the literature so far. Yet, given the importance of digital media industries, the
academic interest in these emerging models is deemed to grow. The present survey
may thus have to be significantly complemented in a few years from now.
47Regner and Barria (2009) analyze the payment behavior of customers of the online music
label Magnatune; Kim, Natter and Spann (2009) analyze factors that influence prices paid under
the ‘Pay What You Want’ model and show that this model can lead to an increase in seller
revenues.
48See Curien, Laffond, Lainé, and Moreau (2004), Gayer and Shy (2006), Curien and Moreau
(2009); see also Krueger (2005), and Connolly and Krueger (2006), who document the increasing
importance of concert revenues.
DIGITAL PIRACY: THEORY
31
References
[1] Ahn, I., Shin, I. 2010. On the Optimal Level of Protection in DRM. Information
Economics and Policy, forthcoming.
[2] Ahn, I., Yoon, K., 2009. On the Impact of Digital Music Distribution. CESifo Eco-
nomic Studies 55, pp. 306-325.
[3] Alcala, F., Gonzalez-Maestre, M., 2010. Copying, Superstars, and Artistic Creation.
Information Economics and Policy, forthcoming.
[4] Alvisi, M., Argentesi, E., Carbonara, E., 2002. Piracy and Quality Choice in Monop-
olistic Markets. Mimeo, University of Bologna.
[5] Anderson, C., 2004. The Long Tail. Wired (October 12, 2004).
[6] Anderson, S., Renault, R., 2006. Advertising Content. American Economic Review
96, pp. 93-113.
[7] Arrow, K., 1962. Economic Welfare and the Allocation of Resources for Inventions. In:
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
[16]
[17]
[18]
[19]
[20]
[21]
[22]
[23]
[24]
[25]
[26]
R. Nelson (Ed.), The Rate and Direction of Inventive Activity, Princeton University
Press.
Bae, S.-H., Choi, J.P. 2006. A Model of Piracy. Information Economics and Policy
18, pp. 303-320.
Bakos, J. Y., Brynjolfsson, E., Lichtman, G., 1999. Shared Information Goods. Journal of Law and Economics 48, pp. 117-156.
Balestrino, A., 2008. It is a Theft but not a Crime. European Journal of Political
Economy 24, pp. 455–469.
Banerjee, D. S., 2003. Software Piracy: A Strategic Analysis and Policy Instruments.
International Journal of Industrial Organization 21, pp. 97-121.
Banerjee, D. S., 2006. Lobbying and Commercial Software Piracy. European Journal
of Political Economy 22, pp. 139-155.
Banerjee, D. S., Banerjee (Chaterjee) T., Raychaudhuri, A., 2008. Optimal Enforcement and Anti-Copying Strategies to Counter Copyright Infringement. The Japanese
Economic Review 59, pp. 519-535.
Baye, M., Morgan, J., 2001. Information Gatekeepers on the Internet and the Competitiveness of Homogeneous Product Markets. American Economic Review 91, pp.
454-474.
Becker, G., 1968. Crime and Punishment: An Economic Approach. Journal of Political
Economy 76, pp. 169–217.
Belleflamme, P., 2003. Pricing Information Goods in the Presence of Copying. In: Gordon, W. J., Watt, R. (Eds.), The Economics of Copyright. Developments in Research
and Analysis, Edward Elgar.
Belleflamme, P., 2006. Versioning Information Goods. In: G. Illing, Peitz, M. (Eds.),
Industrial Organization and the Digital Economy, MIT Press.
Belleflamme, P., Picard, P.M., 2007. Piracy and Competition. Journal of Economics
and Management Strategy 16, pp. 351-383.
Belleflamme, P., Peitz, M., 2010. Industrial Organization: Markets and Strategies.
Cambridge: Cambridge University Press.
Besen , S. M., Kirby, S. N., 1989. Private Copying, Appropriability, and Optimal
Copying Royalties. Journal of Law and Economics 32, pp. 255-280.
Boldrin, M., Levine, D., 2008. Against Intellectual Monopoly. Cambridge University
Press.
Brynjolfsson, E., Smith, M.D. 2000, Frictionless Commerce?: A Comparison of Internet and Conventional Retailers. Management Science 46, pp. 563-585.
Bulow, J., 1982. Durable-Goods Monopolists. Journal of Political Economy 90, pp.
314-332.
Butters, G.R., 1977. Equilibrium Distributions of Sales and Advertising Prices. The
Review of Economic Studies 44, pp. 465–491.
Chellappa, R.K., Shivendu, S., 2005. Managing Piracy: Pricing and Sampling Strategies for Digital Experience Goods in Vertically Segmented Markets. Information Systems Research 16, pp. 400–417.
Chen, Y., Png, I., 2003. Information Goods Pricing and Copyright Enforcement:
Welfare Analysis. Information Systems Research 14, pp. 107-123.
32
PAUL BELLEFLAMME AND MARTIN PEITZ
[27] Chiang, E.P., Assane, D., 2009. Estimating the Willingness to Pay for Digital Music.
Contemporary Economic Policy 27, pp. 512–522.
[28] Cho, W.Y., Ahn, B.H., 2010. Versioning of Information Goods under the Threat of
Piracy. Information Economics and Policy, forthcoming.
[29] Choi, P., Bae, S.H., Jun, J., 2010. Digital Piracy and Firms’ Strategic Interactions:
[30]
[31]
[32]
[33]
[34]
[35]
[36]
[37]
[38]
[39]
[40]
[41]
[42]
[43]
[44]
[45]
[46]
[47]
[48]
[49]
The Effects of Public Copy Protection and DRM Similarity. Information Economics
and Policy, forthcoming.
Conner K. R., Rumelt, R. P., 1991. Software Piracy - An Analysis of Protection
Strategies. Management Science 37, pp. 125-139.
Connolly, M., Krueger, A., 2006. Rockonomics: The Economics of Popular Music. In:
V. Ginsburgh, Throsby, D. (Eds.), Handbook of the Economics of Arts and Culture
(Volume 1), Elsevier Science, Amsterdam, pp. 667-719.
Cremer, H., Pestieau, P., 2009. Piracy Prevention and the Pricing of Information
Goods. Information Economics and Policy 21, pp. 34-42.
Csorba, G., 2002. Read-only Versions for Free and for Profit: Functional Quality Differentiation Strategies of a Software Producing Monopoly. Mimeo, Central European
University, Budapest.
Csorba, G., Hahn, J. H., 2006. Functional Degradation and Asymmetric Network
Effects. Journal of Industrial Economics 54, pp. 253-268.
Curien, N., Laffond, G., Lainé, J., Moreau, F., 2004. Towards a New Business Model
for the Music Industry: Accommodating Piracy through Ancillary Products. Mimeo.
Curien, N., Moreau, F., 2009. The Music Industry in the Digital Era: Toward New
Contracts. Journal of Media Economics 22, pp. 102-113.
Dubosson-Torbay, M., Pigneur, Y., Usunier, J.-C., 2004. Business Models for Music Distribution after the P2P Revolution. Proceedings of the Fourth International
Conference on Web Delivering of Music, pp. 172-179.
Duchène, A., Peitz, M., Waelbroeck, P., 2006. Can DRM Create New Markets? Communications & Strategies 62, pp. 197-207.
Duchène, A., Waelbroeck, P., 2005. Peer-to-Peer, Piracy and the Copyright Law:
Implications for Consumers and Artists. In: Takeyama, L., Gordon, W., Liacos, P.,
Towse, R. (Eds.), Developments in the Economics of Copyright: Research and Analysis, Edward Elgar.
Duchène, A., Waelbroeck, P., 2006. The Legal and Technological Battle in the Music Industry: Information-Push versus Information-Pull Technologies. International
Review of Law and Economics 26, pp. 565-580.
European Commission, 2008. Proposal for a European Parliament and Council Directive amending Directive 2006/116/EC of the European Parliament and of the Council
on the Term of Protection of Copyright and Certain Related Rights. COM(2008) 464
final.
European Parliament and Council of the European Union, 2006. Directive
2006/116/EC of the European Parliament and of the Council of 12 December 2006
on the Term of Protection of Copyright and Certain Related Rights, Official Journal
of the European Union L 372, pp.12-18.
Gasser, U., 2005a. Copyright and Digital Media in a Post-Napster World:
2005 Update. Berkman Publication Serie.s No. 2005-03. Available at SSRN:
http://ssrn.com/abstract=655393.
Gasser, U., 2005b. Copyright and Digital Media in a Post-Napster World: International Supplement. Available at SSRN: http://ssrn.com/abstract=655391.
Gayer, A., Shy, O., 2003a. Internet and Peer-to-Peer Distributions in Markets for
Digital Products. Economics Letters 81, pp. 51-57.
Gayer, A., Shy, O., 2003b. Copyright Protection and Hardware Taxation. Information
Economics and Policy 15, pp. 467-483.
Gayer, A., Shy, O., 2006. Publishers, Artists, and Copyright Enforcement. Information
Economics and Policy 18, pp. 374-384.
Gopal, R., Bhattacharjee, S., Sanders, G. L., 2006. Do Artists Benefit from Online
Music Sharing? Journal of Business 79, pp. 1503-1534.
Grossman, G. M., Shapiro, C., 1988a. Counterfeit-Product Trade. American Economic
Review 78, pp. 59–75.
DIGITAL PIRACY: THEORY
33
[50] Grossman, G. M., Shapiro, C., 1988b. Foreign Counterfeiting of Status Goods. The
Quarterly Journal of Economics 103, pp. 79–100.
[51] Gul, F., Sonnenschein, H., Wilson, R. (1986). Foundations of Dynamic Monopoly and
the Coase Conjecture. Journal of Economic Theory 39, pp. 155-190.
[52] Hahn, J.-H., 2001. Functional Quality Degradation with Network Externalities.
Mimeo, Keele University.
[53] Hahn, J.-H., 2004. The Welfare Effects of Quality Degradation of Software with Net-
work Externalities. Information Economics and Policy 16, pp. 535-552.
[54] Hahn, J.H., 2006. Damaged Durable Goods. Rand Journal of Economics 37, pp. 121-
133.
[55] Harbaugh, R., Khemka, R., 2010. Does copyright enforcement encourage piracy?
Journal of Industrial Economics 58, pp. 306-322.
[56] Hill, C.W.L., 2007. Digital Piracy: Causes, Consequences, and Strategic Responses.
Asia Pacific Journal of Management 24, pp. 9-25.
[57] Hirtle, P., 2010. Copyright Term and the Public Domain in the United States. Avail-
able at http://copyright.cornell.edu/resources/publicdomain.cfm
[58] Inderst, R., 2008. Durable Goods with Quality Differentiation. Economics Letters 100,
pp. 173-177.
[59] Jain, S., 2008. Digital Piracy: A Competitive Analysis. Marketing Science 27, pp.
610-626.
[60] Jaisingh, J., 2009. Impact of Piracy on Innovation at Software Firms and Implications
for Piracy Policy. Decision Support Systems 46, pp. 763-773.
[61] Johnson, J.P., Myatt, D., 2003. Multiproduct Quality Competition: Fighting Brands
and Product Line Pruning. American Economic Review 93, pp. 748-774.
[62] Johnson, J.P., Waldman, M., 2005. The Limits of Indirect Appropriability in Markets
for Copiable Goods. Review of Economic Research on Copyright Issues 2, pp. 19-37.
[63] Johnson, W.R., 1985. The Economics of Copying. Journal of Political Economy 93,
pp. 158-174.
[64] Kiema, I., 2008. Commercial Piracy and Intellectual Property Policy. Journal of Eco-
nomic Behavior & Organization 68, pp. 304–318.
[65] Kim, J.-Y., Natter, M., Spann, M., 2009. Pay What You Want: A New Participative
Pricing Mechanism. Journal of Marketing 73: 44–58.
[66] King, P.S., Lampe, R., 2003. Price Discrimination and Profitable Piracy. Information
Economics and Policy 15, pp. 271-290.
[67] Krueger, A., 2005. The Economics of Real Superstars: The Market for Concerts in
the Material World. Journal of Labor Economics 23, pp. 1-30.
[68] Liebowitz, S., 1985. Copying and Indirect Appropriability: Photocopying of Journals.
Journal of Political Economy 93, pp. 945-957.
[69] Martinez-Sanchez, F. 2010. Avoiding Commercial Piracy. Information Economics and
Policy, forthcoming.
[70] Minnitti, A., Vergari, C., 2010. Turning Piracy into Profits: a Theoretical Investiga-
tion. Information Economics and Policy, forthcoming.
[71] Mussa, M., Rosen, S., 1978. Monopoly and Product Quality. Journal of Economic
Theory 18, pp. 301-317.
[72] Novos, I.E., Waldman, M., 1984. The Effects of Increased Copyright Protection: An
Analytic Approach. Journal of Political Economy 92, pp. 236-246.
[73] Park, Y., Scotchmer, S., 2005. Digital Rights Management and the Pricing of Digital
Products. NBER working paper 11532.
[74] Peitz, M., 2004. A Strategic Approach to Software Protection: Comment. Journal of
Economics and Management Strategy 13, pp. 371-374.
[75] Peitz, M., Waelbroeck, P., 2004. File Sharing, Sampling, and Music Distribution.
Mimeo. Available at SSRN.
[76] Peitz, M., Waelbroeck, P., 2006a. Why the Music Industry May Gain from Free
Downloading - the Role of Sampling. International Journal of Industrial Organization
24, pp. 907-913.
[77] Peitz, M., Waelbroeck, P., 2006b. Piracy of Digital Products: A Critical Review of
the Theoretical Literature. Information Economics and Policy 18, pp. 449-476.
34
PAUL BELLEFLAMME AND MARTIN PEITZ
[78] Regner, T., Barria, J.A., 2009. Do Consumers Pay Voluntarily? The Case of Online
Music. Journal of Economic Behavior & Organization 71: 395–406.
[79] Regner, T., Barria, J.A., Pitt, J.V., Neville, B., 2009. An Artist Life Cycle Model for
[80]
[81]
[82]
[83]
[84]
[85]
[86]
[87]
[88]
[89]
[90]
[91]
[92]
[93]
[94]
[95]
[96]
Digital Media Content: Strategies for the Light Web and the Dark Web. Electronic
Commerce Research and Applications 8, pp. 334–342.
Shapiro, C., Varian, H., 1998. Information Rules: A Strategic Guide to the Network
Economy. McGraw & Hill.
Shy, O., Thisse, J., 1999. A Strategic Approach to Software Protection. Journal of
Economics and Management Strategy 8, pp. 163-190.
Silva, F., Ramello, G., 2000. Sound Recording Market: The Ambiguous Case of Copyright and Piracy. Industrial and Corporate Change 9, pp. 415–442.
Stokey, N. L., 1981. Rational Expectations and Durable Goods Pricing, Bell Journal
of Economics 12, pp. 112-128.
Sundararajan, A., 2004. Managing Digital Piracy: Pricing and Protection. Information Systems Research 15, pp. 287-308.
Takeyama, L. N., 1994. The Welfare Implications of Unauthorized Reproduction of
Intellectual Property in the Presence of Network Externalities. Journal of Industrial
Economics 42, pp. 155-166.
Takeyama, L. N., 1997. The Intertemporal Consequences of Unauthorized Reproduction of Intellectual Property. Journal of Law and Economics 40, pp. 511-522.
Takeyama, L. N., 2003. Piracy, Asymmetric Information and Product Quality. In:
W. J. Gordon and R. Watt (eds.): The Economics of Copyright. Developments in
Research and Analysis, Edward Elgar.
Takeyama, L. N., 2009. Copyright Enforcement and Product Quality Signaling in
Markets. Information Economics and Policy 21, pp. 291-296.
Valletti, T., Szymanski, S., 2006. Parallel Trade, International Exhaustion and Intellectual Property Rights: A Welfare Analysis. Journal of Industrial Economics 54, pp.
499-526.
Varian, H.R., 1980. A Model of Sales. American Economic Review 70, pp. 651-659.
Varian, H. R., 2000. Buying, Sharing and Renting Information Goods. Journal of
Industrial Economics 48, pp. 473-488.
Wang, C.A., Zhang, X.M., 2009. Sampling of Information Goods. Decision Support
Systems 48, pp. 14-22.
Watt, R., 2005. Indirect Appropriability 20 years on. Review of Economic Research
on Copyright Issues 2, pp. 1-4.
Yao, J.-T., 2005. Counterfeiting and an Optimal Monitoring Policy. European Journal
of Law and Economics 19, pp. 95-114.
Yoon, K., 2002. The Optimal Level of Copyright Protection. Information Economics
and Policy 14, pp. 327-348.
Zhang, M. X., 2002. Stardom, Peer-to-Peer and the Socially Optimal Distribution of
Music. mimeo, Sloan School of Management, MIT.
CESifo Working Paper Series
for full list see www.cesifo-group.org/wp
(address: Poschingerstr. 5, 81679 Munich, Germany,
[email protected])
___________________________________________________________________________
T
T
3160 Philip E. Graves, Appropriate Fiscal Policy over the Business Cycle: Proper Stimulus
Policies Can Work, August 2010
3161 Michael Binder and Marcel Bluhm, On the Conditional Effects of IMF Program
Participation on Output Growth, August 2010
3162 Michael Binder, Qianying Chen, and Xuan Zhang, On the Effects of Monetary Policy
Shocks on Exchange Rates, August 2010
3163 Felix J. Bierbrauer, On the Optimality of Optimal Income Taxation, August 2010
3164 Nikolaus Wolf, Europe’s Great Depression – Coordination Failure after the First World
War, September 2010
3165 Dan Kovenock and Brian Roberson, Conflicts with Multiple Battlefields, September
2010
3166 Jean-Pierre Ponssard and Catherine Thomas, Capacity Investment under Demand
Uncertainty. An Empirical Study of the US Cement Industry, 1994-2006, September
2010
3167 Jørgen Juel Andersen, Jon H. Fiva and Gisle James Natvik, Voting when the Stakes are
High, September 2010
3168 Michael Hoel, Is there a Green Paradox?, September 2010
3169 Scott Alan Carson, Nineteenth Century US African-American and White Female
Statures: Insight from US Prison Records, September 2010
3170 Gil S. Epstein, Yosef Mealem and Shmuel Nitzan, Political Culture and Discrimination
in Contests, September 2010
3171 Sara Fisher Ellison, Jeffrey Greenbaum and Wallace P. Mullin, Diversity, Social Goods
Provision, and Performance in the Firm, September 2010
3172 Silvia Dominguez-Martinez, Randolph Sloof and Ferdinand von Siemens, Monitoring
your Friends, not your Foes: Strategic Ignorance and the Delegation of Real Authority,
September 2010
3173 Marcus Dittrich and Beate Schirwitz, Union Membership and Employment Dynamics:
A Note, September 2010
3174 Francesco Daveri, Paolo Manasse and Danila Serra, The Twin Effects of Globalization
– Evidence from a Sample of Indian Manufacturing Firms, September 2010
3175 Florian Blöchl, Fabian J. Theis, Fernando Vega-Redondo and Eric O’N. Fisher, Which
Sectors of a Modern Economy are most Central?, September 2010
3176 Dag Morten Dalen, Marilena Locatelli and Steinar Strøm, Longitudinal Analysis of
Generic Substitution, September 2010
3177 Armin Falk, Stephan Meier and Christian Zehnder, Did we Overestimate the Role of
Social Preferences? The Case of Self-Selected Student Samples, September 2010
3178 Christian Fahrholz and Cezary Wójcik, The Bail-Out! Positive Political Economics of
Greek-type Crises in the EMU, September 2010
3179 Klaus Abberger and Wolfgang Nierhaus, The Ifo Business Cycle Clock: Circular
Correlation with the Real GDP, September 2010
3180 Walter Krämer and Gerhard Arminger, “True Believers” or Numerical Terrorism at the
Nuclear Power Plant, September 2010
3181 Bernard M.S. Van Praag, Dmitri Romanov and Ada Ferrer-i-Carbonell, Happiness and
Financial Satisfaction in Israel. Effects of Religiosity, Ethnicity, and War, September
2010
3182 Dimitrios Koumparoulis and Paul De Grauwe, Public Capital, Employment and
Productivity: An Empirical Investigation for Greece, September 2010
3183 John Whalley and Tanmaya Shekhar, The Rapidly Deepening India-China Economic
Relationship, September 2010
3184 Andreas Schäfer and Thomas Steger, History, Expectations, and Public Policy:
Economic Development in Eastern Germany, September 2010
3185 Thomas Eichner and Marco Runkel, Subsidizing Renewable Energy under Capital
Mobility, September 2010
3186 Konstantinos Angelopoulos and James Malley, Fear of Model Misspecification and the
Robustness Premium, September 2010
3187 Philip E. Graves, A Note on the Design of Experiments Involving Public Goods,
September 2010
3188 Glenn Ellison, How does the Market Use Citation Data? The Hirsch Index in
Economics, September 2010
3189 Barbara Hanel and Regina T. Riphahn, The Employment of Mothers – Recent
Developments and their Determinants in East and West Germany, September 2010
3190 Alexander Haupt and Silke Uebelmesser, Integration, Mobility, and Human Capital
Formation, September 2010
3191 Vincenzo Galasso and Paola Profeta, When the State Mirrors the Family: The Design of
Pension Systems, September 2010
3192 Stéphane Zuber and Geir B. Asheim, Justifying Social Discounting: The RankDiscounted Utilitarian Approach, September 2010
3193 Alexander Kemnitz, Educational Federalism and the Quality Effects of Tuition Fees,
September 2010
3194 Claudia M. Buch, Sandra Eickmeier and Esteban Prieto, Macroeconomic Factors and
Micro-Level Bank Risk, September 2010
3195 May Elsayyad and Kai A. Konrad, Fighting Multiple Tax Havens, September 2010
3196 Laszlo Goerke and Markus Pannenberg, Trade Union Membership and Dismissals,
September 2010
3197 Ferdinand Mittermaier and Johannes Rincke, Do Countries Compensate Firms for
International Wage Differentials?, September 2010
3198 John Boyd, Gianni De Nicoló and Abu M. Jalal, Bank Competition, Asset Allocations
and Risk of Failure: An Empirical Investigation, September 2010
3199 Guido Heineck and Bernd Süssmuth, A Different Look at Lenin’s Legacy: Trust, Risk,
Fairness and Cooperativeness in the two Germanies, September 2010
3200 Ingvild Almås, Tarjei Havnes and Magne Mogstad, Baby Booming Inequality?
Demographic Change and Earnings Inequality in Norway, 1967-2000, October 2010
3201 Thomas Aronsson and Sören Blomquist, The Standard Deviation of Life-Length,
Retirement Incentives, and Optimal Pension Design, October 2010
3202 Thorvaldur Gylfason and Eduard Hochreiter, Growing Together: Croatia and Latvia,
October 2010
3203 Ken Burdett and Melvyn Coles, Tenure and Experience Effects on Wages: A Theory,
October 2010
3204 Wendy Carlin, Good Institutions are not enough: Ongoing Challenges of East German
Development, October 2010
3205 Tobias König and Andreas Wagener, Tax Structure and Government Expenditures
under Tax Equity Norms, October 2010
3206 Daniel W. Sacks, Betsey Stevenson and Justin Wolfers, Subjective Well-Being, Income,
Economic Development and Growth, October 2010
3207 Mario Larch and Wolfgang Lechthaler, Why “Buy American” is a Bad Idea but
Politicians still Like it, October 2010
3208 Guglielmo Maria Caporale and Luis A. Gil-Alana, US Disposable Personal Income and
Housing Price Index: A Fractional Integration Analysis, October 2010
3209 Bruno S. Frey, Withering Academia?, October 2010
3210 Eva Mörk, Anna Sjögren and Helena Svaleryd, Childcare Costs and the Demand for
Children – Evidence from a Nationwide Reform, October 2010
3211 Dan Kovenock, Brian Roberson and Roman M. Sheremeta, The Attack and Defense of
Weakest-Link Networks, October 2010
3212 Shmuel Nitzan and Kaoru Ueda, Prize Sharing in Collective Contests, October 2010
3213 Erling Eide, Kristine von Simson and Steinar Strøm, Rank Dependent Utility, Tax
Evasion and Labor Supply, October 2010
3214 Thomas Eichner and Marco Runkel, Interjurisdictional Spillovers, Decentralized
Policymaking and the Elasticity of Capital Supply, October 2010
3215 Susan Athey and Glenn Ellison, Dynamics of Open Source Movements, October 2010
3216 Christian Bjørnskov, Axel Dreher, Justina A.V. Fischer and Jan Schnellenbach,
Inequality and Happiness: When Perceived Social Mobility and Economic Reality do
not Match, October 2010
3217 Thomas Cornelissen, Oliver Himmler and Tobias Koenig, Fairness Spillovers – The
Case of Taxation, October 2010
3218 David E. Wildasin, State Corporation Income Taxation - An Economic Perspective on
Nexus, October 2010
3219 Andreas Peichl, Nico Pestel and Hilmar Schneider, Does Size Matter? The Impact of
Changes in Household Structure on Income Distribution in Germany, October 2010
3220 Alexander Kemnitz, A Simple Model of Health Insurance Competition, October 2010
3221 Johannes Becker and Marco Runkel, Even Small Trade Costs Restore Efficiency in Tax
Competition, October 2010
3222 Paul Belleflamme and Martin Peitz, Digital Piracy: Theory, October 2010