:::

詳目顯示

回上一頁
題名:網路效果與廠商策略之三篇論文
作者:陳建成
作者(外文):Chien-chen Chen
校院名稱:國立中正大學
系所名稱:國際經濟所
指導教授:陳和全
學位類別:博士
出版日期:2007
主題關鍵詞:相容性產品差異性軟體保護軟體盜版網路外部性社會矛盾庫諾競爭Network ExternalitySocial delimma.Cournot CompetitionSoftware PiracySoftware ProtectionCompatibilityDifferentiated product
原始連結:連回原系統網址new window
相關次數:
  • 被引用次數被引用次數:期刊(0) 博士論文(0) 專書(0) 專書論文(0)
  • 排除自我引用排除自我引用:0
  • 共同引用共同引用:0
  • 點閱點閱:28
隨著網路與電腦的普及化,產品相容性與防止盜版問題已成為現今兩個很重要的議題。而本論文針對這兩個議題加以深入探討,當市場上存在網路外部性之下,這兩個議題如何影響廠商的決策。在第二章中,我們同時考量產品差異性與產品相容性如何對廠商造成影響。而第三與第四章則是討論有關防止盜版的問題,第五章為總結。
有關相容性問題,第二章利用一個兩家廠商,兩階段的賽局模型進行分析。我們假設第一階段廠商先決定產品相容性,而第二階段則進行數量競爭。而在模型中,產品差異性為一個外生變數。透過這樣的設定,試圖去分析當市場存在網路外部性之下,廠商在產品相容性與差異性的最適選擇。我們發現廠商將產品相容性提高對自己越是不利,並且當產品相容性越高(越低)之下,廠商會試圖將產品差異化提高(降低)來減少損失。另外,本文發現在庫諾競爭之下,產品最小差異化原則不存在,而會出現產品最大差異化原則。最後在產品相容性為一個廠商可選擇的變數之下,會出現Social dilemma的狀況。
第三章與第四章是在探討當市場上存在網路外部性之下,軟體廠商採取軟體保護的選擇。同樣利用一個兩階段的賽局競爭進行分析,第一階段消費者決定是否採用或盜用軟體產品,而第二階段軟體廠商決定價格。在第三章中,我們討論軟體廠商對稱的保護策略,亦即兩家同時不採保護軟體與兩家均採保護軟體策略。我們發現在軟體廠商均不採保護之下,市場只存在第一類消費者全部購買使用與部分第二類消費者使用的均衡。而當兩家軟體廠商均採取保護策略之下,市場會存在兩組均衡,一組是第一類消費者全部使用而第二類消費者部分使用,另一組為兩類消費者均部分使用。最後,我們發現軟體廠商在不採取保護策略下的定價高於採保護策略。
而在第四章則接續第三章討論防止盜版的議題,此時兩家廠商採行不對稱保護策略,亦即一家採保護,另一家則不採保護。我們發現在不對稱保護策略之下,市場上存在的均衡組合與對稱之下均採保護的均衡組合相同,但均衡條件卻差異很大。我們發現當第一類消費者相對較多之下,採保護的軟體廠商可以定比較高的價格。另外透過軟體保護策略賽局分析,我們發現軟體廠商所提供的額外支援服務的效果是決定市場均衡的一個關鍵的因素。
The main concern of this thesis is to investigate firms’ strategies when the network effect exists in the market including two issues: the firm’s decision on the compatibility and anti-piracy problem. In chapter 2, we add in the existing literature with product differentiation to analyze its effect onto a firm’s decision about compatibility. Chapter 3 and 4 are dedicated to the issue of piracy problem.
In chapter 2, using a two-stage game model with two firms, we suppose that firms decide their degrees of product compatibility and then choose their outputs under Cournot competition. Through this setting, we explore the equilibrium choice of product compatibility and differentiation when network effect exists. We find that a firm with a higher degree of compatibility to other products has a more disadvantage in competition. We find that a firm with a higher (lower) compatibility to other firm is more likely to increase (decrease) degree of differentiation. The principle of minimum differentiation as in location literature does not exist under our Cournot model, but the principle of maximum differentiation exists. When considering compatibility as a choice variable, the social dilemma occurs and firms under Cournot equilibrium will choose the lowest degree of compatibility, but the social optimal occurs when both firms choose the highest degree of compatibility.
In chapter 3, we consider the piracy problem by using a duopoly price competition model for analyzing software firms’ strategy on law-protection. Moreover, the behavior of software users is also analyzed. We find that all type-1 and part of type-2 using software is the unique equilibrium when software is unprotected. When both software firms adopt protection strategy, an equilibrium where some type-2 consumers buy software exists. It exists two different kinds of demand pair depending on the size of extra-supporting provided by software firm. Finally, we find that the equilibrium price under none-protection is larger than under protection in the same equilibrium consumption group.
Chapter 4 follows the model in chapter 3 only with asymmetric law-protection strategies of the firms. Firms can differ in the choices of law protection strategy. By this study, whether to using law protection becomes a choice variable in the first stage, which is expected to change the competition of the firms. We also consider the software protection game in this chapter. In asymmetric strategies of software protection, equilibrium exists two cases: only part consumers of both types use software、all type-1 and part type-2 consumers use software. When firms adopt asymmetric strategies of software protection, the firm adopting software protection charges a higher price than the firm without protection policy facing more type-1. Through the software protection game, we know the extra-supporting service effect turns out to play a key factor to determine the market equilibrium.
References
台灣商業軟體聯盟(2006),“全球軟體盜版率調查報告”, 第三屆國際數據資訊年度軟體盜版研究.
Bae, S.H., and Choi, J.P., (2006), “A model of Piracy,” Information Economics and Policy, 18, 303-320.
Banerjee, D.S., (2003). Software Piracy:a strategic analysis and policy instruments. International Journal of Industrial Organization, 21, 97-127.
Banerjee, D.S., (2006), “Lobbying and commercial software piracy,” European Journal of Political Economy, 22, 139-155.
Beladi, H. and Choi, E.K. (1995), “On the Emergence of Multinational Corporations in Developing Economies: A Note,” Regional Science and Urban Economics, 25, 675-684.
Bezmen, T.L., and Depken, C. A., (2006), “Influences on Software Piracy: Evidence from the various United States,” Economics Letters, 90, 356-361.
Cabral, L.M.B., Salant, D.J., and Woroch, G.A. (1999), “Monopoly Pricing with Network Externalities,” International Journal of Industrial Organization, 17, 199-214.
Choi, J.P. (1994a),“Irreversible Choice of Uncertain Technologies With Network Externalities,”Rand Journal of Economics, 25, 382-401.
Choi, J.P. (1994b), “Network Externality, Compatibility Choice, and Planned Obsolescence,” Journal of Industrial Economics, 42, 167-181.
Chou, C.F. and Shy, O. (1990), “Network Effect without Network Externalities,” International Journal of Industrial Organization, 8, 259-270.
Chou, C.F. and Shy, O. (1993), “Partial Compatibility and Supporting Services,” Economics letters, 41, 193-197.
Conner, k., and Rumelt, R., (1991), “Software Piracy:An Analysis of Protection Strategies,” Management Science 37, 125-139.
Conner, K.R. (1995), “Obtaining Strategic Advantage from Being Imitated: When Can Encouraging Clone Pay?”Management Science, 41(2), 209-225.
De Bijl, P.W.J. and Goyal, S. (1995), “Technological Change in Markets with Network Externalities,” International Journal of Industrial Organization, 75, 332-337.
Economide, N. (1996), “Network Externalities, Complementarities, and Invitations to Enter,” European Journal of Political Economy, 12, 211-23.
Farrell, J. and Saloner, G. (1986), “Installed Base and Compatibility: Innovation, Product Preannouncement, and Predation,” American Economics Review, 76, 940-955.
Farrell, J. and Saloner, G. (1992),“Converters, Compatibility, and the Control of Interfaces,” Journal of Industrial Economics, 40, 9-35.
Gayer, A., and Shy, O., (2003a), “Copyright Protection and Hardware Taxation,” Information Economics and Policy, 15, 467-483.
Gayer, A., and Shy, O., (2003b), “Internet and Peer-to –peer Distributions in Markets for Digital Products,” Economics Letters, 81, 51-57.
Gopal, R., Bhattacharjee, S., and Sanders, G.L., (2006), “Do artists benefit from online music sharing,” Journal of Business, 79, 1503-1534.
Grindley, P. (1995), Standards Strategy and Policy: Case and Stories, New York: Oxford University Press.
Harbaugh, R., and Khemka, R., (2001), “Does copyright enforcement encourage piracy?,” Claremont Colleges Working Papers in Economics, Claremont McKenna College.
Haruvy, E. and Prasad, A. (1998), “Optimal Product Strategies in the Presence of Network Externalities,” Information Economics and Policy, 10, 489-499.
Hui, K.L., Png, I., (2003), “Piracy and the Legitimate Demand for Recorded Music,” Contributions to Economic Analysis & Policy, 2(1).
Johnson, W.R., (1985), “The Economics of Copying,” Journal of Political Economy, 93, 158-174.
Katz, M. and Shapiro, C. (1985), “Network Externalities, Competition, and Compatibility,” The American Economic Review, 75, 424-440.
Katz, M. and Shapiro, C. (1986), “Technology Adoption in the Presence of Network Externalities,” Journal of Political Economy, 94, 822-841.
King, S., and Lampe, R,. (2003). “Network Externalities, Price Discrimination and Profitable Piracy,” Information Economics and Policy 15, 271-290.
Kristiansen, E.G. (1996), “R&D in Markets with Network Externalities,” International Journal of Industrial Organization, 14, 769-784.
Kristiansen, E.G. (1998), “R&D in The Present of Network Externalities: Timing and Compatibility,” The Rand Journal of Economics, 29(3), 531-547.
Kristiansen, E.G. and Thum, M. (1997), “R&D Incentives in Compatible Network,” Journal of Economics, 65(1), 55-78.
Liebowitz, S.(1985), “Copying and Indirect Appropriability: Photocopying of Journals,” Journal of Political Economy, 93, 945-957.
Martin, S. (2002), Advanced Industrial Economics, 2nd ed., Blackwell publishers.
Matutes, C. and Regibeau, P. (1988), “Mix and Match: Product Compatibility Without Network Externalities,” Rand Journal of Economics, 19, 221-234.
Moore, J. (1993), “Predatory and Prey: A New Ecology of Competition,” Harvard Business Review, May-June, 75-86.
Novos, I.E., and Waldman, M., (1984), “The Effect of File Sharing on Record Sales, an Analytic Approach,” Journal of Political Economy, 92, 236-246.
Oberholzer, F., and Strumpf, K., (2004), “The Effect of File Sharing on Record Sales, an Empirical Analysis,” University of North Carolina, Chapel Hill (Mimeo).
Peitz, M., (2004), “A strategic approach to Software protection: Comment,” Journal of Economics & Management Strategy, 13, 371-374.
Peitz, M., and Waelbroeck, P., (2004), “File Sharing, Sampling, and Music Distribution,” International Unversity in Germany Working Paper.
Poddar, S., (2005), “Music Product as Durable Good and Online Piracy, National University of Singapore (Mimeo).
Purohit, D. (1994), “What Should You Do When Your Competitors Send in The Clones?” Marketing Science, 13(4), 392-411.
Qiu, L.D., (2006), “A general equilibrium analysis of software development: Implications of copyright protection and contract enforcement,” European Economic Review, 50, 1661-1682.
Regibeau, P. and Rockett, K.E. (1996), “The Timing of Product Introduction and the Credibility of Compatibility Decisions,” International Journal of Industrial Organization, 14, 801-823.
Shapiro, C. and Varian, H.R. (1999), Information Rules: A Strategic Guide to The Network Economy, Boston: Harvard Business School Press.
Shy, O. (1995), Industrial Organization: Theory and Application, Cambridge, Mass.: MIT Press.
Shy, O. and Thisse, J.F. (1999), “A Strategic Approach to Software Protection,” Journal of Economics & Management, 8(2), 163-190.
Slive, J. and Bernhardt, D. (1998), “Pirated for Profit,” Canadian Journal of Economics, 31(4), 886-899.
Takeyama, L.N., (1994), “The Welfare Implications of Unauthorized Reproduction of Intellectual Property in the Presence of Network Externalities,” Journal of Industrial Economics, 42, 155-166.
Takeyama, L.N., (2003), “Piracy, Asymmetric Information and Product Quality,” The Economics of Copyright, Developments in Research and Analysis, Edward Elgar.
Thum, M. (1994), “Network Externalities, Technological Progress, and The Competition of Market Contracts,” International Journal of Industrial Organization, 12, 269-289.
Waldman, M. (1993), “A New Perspective on Planned Obsolescence,” Quarterly Journal of Economics, 108, 273-283.
Xie, J. and Sirbu, M. (1995), “Price Competition and Compatibility in the Presence of Positive Demand Externalities,” Management Science, 41(5), 909-926.
Yoon, K., (2002), “The Optimal Level of Copyright Protection,” Information Economics and Policy, 14, 327-348.
Zhang, M.X., (2002), “Stardom, Peer-to-Peer and the Socially Optimal Distribution of Music,” Sloan School of Management, MIT, Mimeo.
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top
QR Code
QRCODE