-
2
-
-
85138753682
-
-
Ben-Shahar, D., and Jacob, A. “Preach for a Breach: Selective Enforcement of Copyrights as an Optimal Monopolistic Behavior,” Working Paper, Arison School of Business, Herzliya, Israel, 2001.
-
Ben-Shahar, D., and Jacob, A. “Preach for a Breach: Selective Enforcement of Copyrights as an Optimal Monopolistic Behavior,” Working Paper, Arison School of Business, Herzliya, Israel, 2001.
-
-
-
-
3
-
-
85138674309
-
-
Bhargava, H. K., and Choudhary, V. “Information Goods and Vertical Differentiation,” Journal of Management Information Systems (18:2), Fall 2001, pp. 89-106.
-
Bhargava, H. K., and Choudhary, V. “Information Goods and Vertical Differentiation,” Journal of Management Information Systems (18:2), Fall 2001, pp. 89-106.
-
-
-
-
4
-
-
85138750300
-
-
Bhargava, H. K., and Choudhary, V. “One Size Fits All? Optimality Conditions for Market Segmentation via Second-Degree Price Discrimination,” Working Paper, Graduate School of Industrial Administration, Carnegie Mellon University, Pittsburgh, PA, 2002.
-
Bhargava, H. K., and Choudhary, V. “One Size Fits All? Optimality Conditions for Market Segmentation via Second-Degree Price Discrimination,” Working Paper, Graduate School of Industrial Administration, Carnegie Mellon University, Pittsburgh, PA, 2002.
-
-
-
-
5
-
-
0042420119
-
The Case Against Intellectual Property
-
May
-
Boldrin, M., and Levine, D. K. “ The Case Against Intellectual Property,” American Economic Review (92:2), May 2002, pp. 209-212.
-
(2002)
American Economic Review
, vol.92
, Issue.2
, pp. 209-212
-
-
Boldrin, M.1
Levine, D.K.2
-
6
-
-
85138710776
-
-
Chen, Y., and Png, I. “Information Goods Pricing and Copyright Enforcement: Welfare Analysis,” Information Systems Research (14:1), March 2003, pp. 107-123.
-
Chen, Y., and Png, I. “Information Goods Pricing and Copyright Enforcement: Welfare Analysis,” Information Systems Research (14:1), March 2003, pp. 107-123.
-
-
-
-
7
-
-
0031288383
-
-
Cheng, H. K., Sims, R. R., and Teegen, H. “To Purchase or to Pirate Software: An Empirical Study,” Journal of Management Information System (13:4), Spring 1997, pp. 49-60.
-
(1997)
To Purchase Or to Pirate Software: An Empirical Study,” Journal of Management Information System (13:4)
, pp. 49-60
-
-
Cheng, H.K.1
Sims, R.R.2
Teegen, H.3
-
8
-
-
0001020817
-
Software Piracy: An Analysis of Protection Strategies
-
February
-
Conner, K. R., and Rumelt, R. P. “Software Piracy: An Analysis of Protection Strategies,” Management Science (37:2), February 1991, pp. 125-139.
-
(1991)
Management Science
, vol.37
, Issue.2
, pp. 125-139
-
-
Conner, K.R.1
Rumelt, R.P.2
-
9
-
-
85138723380
-
-
Duchene, A., and Waelbroeck, P. “Welfare Implications of Illegal Copies: The Case of Peer-to-peer Distribution Technologies,” Working Paper, Center of Education and Research in Socio-economic Analysis-Ecole Nationale des Ponts et Chaussées, Paris, 2001.
-
-
-
-
10
-
-
85138705929
-
-
Gayer, A., and Shy, O. “Copyright Protection and Hardware Taxation,” Information Economics & Policy, forthcoming.
-
Gayer, A., and Shy, O. “Copyright Protection and Hardware Taxation,” Information Economics & Policy, forthcoming.
-
-
-
-
11
-
-
0031288375
-
-
Gopal, R. D., and Sanders, G. L. “Preventive and Deterrent Controls,” Journal of Management Information System (13:4), Spring 1997, pp. 29-47.
-
(1997)
Preventive and Deterrent Controls,” Journal of Management Information System (13:4)
, pp. 29-47
-
-
Gopal, R.D.1
Sanders, G.L.2
-
13
-
-
85138749782
-
-
Klein, B., Lerner, A. V., and Murphy, K. M. “The Economics of Copyright ‘Fair Use’ in a Networked World,” The American Economic Review (92:2), May 2002, pp. 205-208.
-
Klein, B., Lerner, A. V., and Murphy, K. M. “The Economics of Copyright ‘Fair Use’ in a Networked World,” The American Economic Review (92:2), May 2002, pp. 205-208.
-
-
-
-
14
-
-
49349126835
-
Monopoly and Product Quality
-
Mussa, M., and Rosen, S. “Monopoly and Product Quality,” Journal of Economic Theory (18:2), 1978, pp. 301-317.
-
(1978)
Journal of Economic Theory
, vol.18
, Issue.2
, pp. 301-317
-
-
Mussa, M.1
Rosen, S.2
-
15
-
-
0033414721
-
A Strategic Approach to Software Protection
-
Shy, O., and Thisse, J. F. “A Strategic Approach to Software Protection,” Journal of Economics and Management Strategy (8), 1999, pp. 163-190.
-
(1999)
Journal of Economics and Management Strategy
, vol.8
, pp. 163-190
-
-
Shy, O.1
Thisse, J.F.2
-
16
-
-
21344491949
-
The Welfare Implications of Unauthorized Reproduction of Intellectual Property in the Presence of Network Externalities
-
Takeyama, L. N. “The Welfare Implications of Unauthorized Reproduction of Intellectual Property in the Presence of Network Externalities,” Journal of Industrial Economics (62), 1994, pp. 155-166.
-
(1994)
Journal of Industrial Economics
, Issue.62
, pp. 155-166
-
-
Takeyama, L.N.1
-
17
-
-
85138724868
-
-
Varian, H. R. “Versioning Information Goods,” Working Paper, School of Information Management and Systems, University of California, Berkeley, Berkeley, CA, 1997.
-
Varian, H. R. “Versioning Information Goods,” Working Paper, School of Information Management and Systems, University of California, Berkeley, Berkeley, CA, 1997.
-
-
-
-
18
-
-
85138750921
-
-
Varian, H. R. “Markets for Information Goods,” Working Paper, School of Information Management and Systems, University of California, Berkeley, Berkeley, CA, 1998.
-
Varian, H. R. “Markets for Information Goods,” Working Paper, School of Information Management and Systems, University of California, Berkeley, Berkeley, CA, 1998.
-
-
-
|