|
References 台灣商業軟體聯盟(2006),“全球軟體盜版率調查報告”, 第三屆國際數據資訊年度軟體盜版研究. Bae, S.H., and Choi, J.P., (2006), “A model of Piracy,” Information Economics and Policy, 18, 303-320. Banerjee, D.S., (2003). Software Piracy:a strategic analysis and policy instruments. International Journal of Industrial Organization, 21, 97-127. Banerjee, D.S., (2006), “Lobbying and commercial software piracy,” European Journal of Political Economy, 22, 139-155. Beladi, H. and Choi, E.K. (1995), “On the Emergence of Multinational Corporations in Developing Economies: A Note,” Regional Science and Urban Economics, 25, 675-684. Bezmen, T.L., and Depken, C. A., (2006), “Influences on Software Piracy: Evidence from the various United States,” Economics Letters, 90, 356-361. Cabral, L.M.B., Salant, D.J., and Woroch, G.A. (1999), “Monopoly Pricing with Network Externalities,” International Journal of Industrial Organization, 17, 199-214. Choi, J.P. (1994a),“Irreversible Choice of Uncertain Technologies With Network Externalities,”Rand Journal of Economics, 25, 382-401. Choi, J.P. (1994b), “Network Externality, Compatibility Choice, and Planned Obsolescence,” Journal of Industrial Economics, 42, 167-181. Chou, C.F. and Shy, O. (1990), “Network Effect without Network Externalities,” International Journal of Industrial Organization, 8, 259-270. Chou, C.F. and Shy, O. (1993), “Partial Compatibility and Supporting Services,” Economics letters, 41, 193-197. Conner, k., and Rumelt, R., (1991), “Software Piracy:An Analysis of Protection Strategies,” Management Science 37, 125-139. Conner, K.R. (1995), “Obtaining Strategic Advantage from Being Imitated: When Can Encouraging Clone Pay?”Management Science, 41(2), 209-225. De Bijl, P.W.J. and Goyal, S. (1995), “Technological Change in Markets with Network Externalities,” International Journal of Industrial Organization, 75, 332-337. Economide, N. (1996), “Network Externalities, Complementarities, and Invitations to Enter,” European Journal of Political Economy, 12, 211-23. Farrell, J. and Saloner, G. (1986), “Installed Base and Compatibility: Innovation, Product Preannouncement, and Predation,” American Economics Review, 76, 940-955. Farrell, J. and Saloner, G. (1992),“Converters, Compatibility, and the Control of Interfaces,” Journal of Industrial Economics, 40, 9-35. Gayer, A., and Shy, O., (2003a), “Copyright Protection and Hardware Taxation,” Information Economics and Policy, 15, 467-483. Gayer, A., and Shy, O., (2003b), “Internet and Peer-to –peer Distributions in Markets for Digital Products,” Economics Letters, 81, 51-57. Gopal, R., Bhattacharjee, S., and Sanders, G.L., (2006), “Do artists benefit from online music sharing,” Journal of Business, 79, 1503-1534. Grindley, P. (1995), Standards Strategy and Policy: Case and Stories, New York: Oxford University Press. Harbaugh, R., and Khemka, R., (2001), “Does copyright enforcement encourage piracy?,” Claremont Colleges Working Papers in Economics, Claremont McKenna College. Haruvy, E. and Prasad, A. (1998), “Optimal Product Strategies in the Presence of Network Externalities,” Information Economics and Policy, 10, 489-499. Hui, K.L., Png, I., (2003), “Piracy and the Legitimate Demand for Recorded Music,” Contributions to Economic Analysis & Policy, 2(1). Johnson, W.R., (1985), “The Economics of Copying,” Journal of Political Economy, 93, 158-174. Katz, M. and Shapiro, C. (1985), “Network Externalities, Competition, and Compatibility,” The American Economic Review, 75, 424-440. Katz, M. and Shapiro, C. (1986), “Technology Adoption in the Presence of Network Externalities,” Journal of Political Economy, 94, 822-841. King, S., and Lampe, R,. (2003). “Network Externalities, Price Discrimination and Profitable Piracy,” Information Economics and Policy 15, 271-290. Kristiansen, E.G. (1996), “R&D in Markets with Network Externalities,” International Journal of Industrial Organization, 14, 769-784. Kristiansen, E.G. (1998), “R&D in The Present of Network Externalities: Timing and Compatibility,” The Rand Journal of Economics, 29(3), 531-547. Kristiansen, E.G. and Thum, M. (1997), “R&D Incentives in Compatible Network,” Journal of Economics, 65(1), 55-78. Liebowitz, S.(1985), “Copying and Indirect Appropriability: Photocopying of Journals,” Journal of Political Economy, 93, 945-957. Martin, S. (2002), Advanced Industrial Economics, 2nd ed., Blackwell publishers. Matutes, C. and Regibeau, P. (1988), “Mix and Match: Product Compatibility Without Network Externalities,” Rand Journal of Economics, 19, 221-234. Moore, J. (1993), “Predatory and Prey: A New Ecology of Competition,” Harvard Business Review, May-June, 75-86. Novos, I.E., and Waldman, M., (1984), “The Effect of File Sharing on Record Sales, an Analytic Approach,” Journal of Political Economy, 92, 236-246. Oberholzer, F., and Strumpf, K., (2004), “The Effect of File Sharing on Record Sales, an Empirical Analysis,” University of North Carolina, Chapel Hill (Mimeo). Peitz, M., (2004), “A strategic approach to Software protection: Comment,” Journal of Economics & Management Strategy, 13, 371-374. Peitz, M., and Waelbroeck, P., (2004), “File Sharing, Sampling, and Music Distribution,” International Unversity in Germany Working Paper. Poddar, S., (2005), “Music Product as Durable Good and Online Piracy, National University of Singapore (Mimeo). Purohit, D. (1994), “What Should You Do When Your Competitors Send in The Clones?” Marketing Science, 13(4), 392-411. Qiu, L.D., (2006), “A general equilibrium analysis of software development: Implications of copyright protection and contract enforcement,” European Economic Review, 50, 1661-1682. Regibeau, P. and Rockett, K.E. (1996), “The Timing of Product Introduction and the Credibility of Compatibility Decisions,” International Journal of Industrial Organization, 14, 801-823. Shapiro, C. and Varian, H.R. (1999), Information Rules: A Strategic Guide to The Network Economy, Boston: Harvard Business School Press. Shy, O. (1995), Industrial Organization: Theory and Application, Cambridge, Mass.: MIT Press. Shy, O. and Thisse, J.F. (1999), “A Strategic Approach to Software Protection,” Journal of Economics & Management, 8(2), 163-190. Slive, J. and Bernhardt, D. (1998), “Pirated for Profit,” Canadian Journal of Economics, 31(4), 886-899. Takeyama, L.N., (1994), “The Welfare Implications of Unauthorized Reproduction of Intellectual Property in the Presence of Network Externalities,” Journal of Industrial Economics, 42, 155-166. Takeyama, L.N., (2003), “Piracy, Asymmetric Information and Product Quality,” The Economics of Copyright, Developments in Research and Analysis, Edward Elgar. Thum, M. (1994), “Network Externalities, Technological Progress, and The Competition of Market Contracts,” International Journal of Industrial Organization, 12, 269-289. Waldman, M. (1993), “A New Perspective on Planned Obsolescence,” Quarterly Journal of Economics, 108, 273-283. Xie, J. and Sirbu, M. (1995), “Price Competition and Compatibility in the Presence of Positive Demand Externalities,” Management Science, 41(5), 909-926. Yoon, K., (2002), “The Optimal Level of Copyright Protection,” Information Economics and Policy, 14, 327-348. Zhang, M.X., (2002), “Stardom, Peer-to-Peer and the Socially Optimal Distribution of Music,” Sloan School of Management, MIT, Mimeo.
|