You are here: Home Contents V6 N4 V6N4_Taeha.html
Personal tools

Economic Analysis of Digital Rights Management for Software Updates

 

 

Full text
View
Purchase

Source
Journal of Information Systems Security
Volume 6, Number 4 (2010)
Pages 2052
ISSN 1551-0123 (Print)
ISSN 1551-0808 (Online)
Authors
Taeha Kim — College of Business Administration, Chung-Ang University, Korea
Alexander Talalayevsky — Consortium for Ocean Leadership, USA
Publisher
Information Institute Publishing, Washington DC, USA

 

 

Abstract

This work presents an economic model that examines the roles of digital rights management (DRM) technologies with respect to software updates/patches. The analyses focus on the impact of pricing, piracy levels, and quality of pirated goods on the profit of the firm as well as the overall welfare of the economy. We utilize a two stage model where a monopoly firm first releases a base software product and then releases updates. The conclusions suggest that DRM protection decision for the updates is an effective strategy in such regimes where piracy rates are high, the quality of pirated software is low, or the base product is highly priced. We derive a threshold that defines the sufficient level of updates that provides enough incentives for pirates of the base product to eventually purchase the product. This threshold is independent of the piracy rate, but it increases if the pirated quality or pricing of the base increases. Furthermore, our analysis suggests that update DRM may actually decrease the overall social surplus but its use should also lead to the fairer allocation of the total surplus between consumers and firms. Finally, these findings shed light on the current and future firm practices and strategies.

 

 

Keywords

Software Updates and Patches, Piracy, Digital Rights Management, Software Economics, Welfare Analysis

 

 

References

Altinkemer, K., and Guan, J.(2003), “Analyzing Protection Strategies for Online Software Distribution, Journal of Electronic Commerce Research, 4 (1): 34-48.

Anckaert, B., Sutter, B. D. and Bosschere, K. D. (2004), “Software Piracy Prevention through Delivery,” DRM 04, Oct 25, Washington DC, USA.

Arora, A., Caulkins, J. and Telang, R. (2006), “Sell First, Fix Later: Impact of Patching on Software Quality”, Management Science, 52 (3): 465-471.

August, T. and Tunca, T. I. (2006), “Network Software Security and User Incentives,” Management Science, 52 (11): 1703-1720.

Bakos, Y., Brynjolfsson, E. and Lichtman, D. (1999), “Shared Information Goods,” Journal of Law and Economics, 42 (1): 117-55.

Altinkemer, K., and Guan, J.(2003), “Analyzing Protection Strategies for Online Software Distribution, Journal of Electronic Commerce Research, 4 (1): 34-48.

Anckaert, B., Sutter, B. D. and Bosschere, K. D. (2004), “Software Piracy Prevention through Delivery,” DRM 04, Oct 25, Washington DC, USA.

Arora, A., Caulkins, J. and Telang, R. (2006), “Sell First, Fix Later: Impact of Patching on Software Quality”, Management Science, 52 (3): 465-471.

August, T. and Tunca, T. I. (2006), “Network Software Security and User Incentives,” Management Science, 52 (11): 1703-1720.

Bakos, Y., Brynjolfsson, E. and Lichtman, D. (1999), “Shared Information Goods,” Journal of Law and Economics, 42 (1): 117-55.

Niman, N. B. (2002), “Platform externalities and the antitrust case against Microsoft”, Antitrust Bulletin, 47 (4): 641-660.

NIST 800-40 (2002), “Procedures for Handling Security Patches,” US National Institute of Standards and Technology.

Prasad, A. and Mahajan, V. (2003), “How many pirates should a software firm tolerate? An Analysis of Piracy Protection on the Diffusion of Software,” International Journal of Research in Marketing, 20 (4): 337-353.

Rescorla, E. (2005), “Is Finding Security Holes a Good Idea?,” IEEE Security & Privacy, January/February 2005: 14-19.

Samuelson, P. (2003), “DRM {AND, OR, VS.} The Law,” Communications of the ACM, 46 (4): 41–45.

Shin, S. K., Gopal, R. D., Sanders, G. L. and Whinston, A.B. (2004), “Global Software Piracy Revisited,” Communications of the ACM, 47 (1); 103–107.

Shy, O. and Thisse, J. F., (1999), “A Strategic Approach to Software Protection,” Journal of Economics and Management Strategy, 8 (2): 163-190.

SIIA’s Report on Global Software Piracy (2000), http://www.siia.net/estore/GPR-00.pdf

Sundararajan, A. (2004a), “Managing Digital Piracy: Pricing, Protection and Welfare,” Information Systems Research, 15 (3): 287-308.

Sundararajan, A. (2004b), “Nonlinear pricing of information goods,” Management Science, 50 (12): 1660-1673.

Takeyama, L. (1994), “The Welfare Implications of Unauthorized Reproduction of Intellectual Property in the presence of demand network externalities,” Journal of Industrial Economics, 42 (2): 155–166.

Takeyama, L. (1997), “The Intertemporal Consequences of Unauthorized Reproduction of Intellectual Property,” Journal of Law and Economics, 40 (2): 511–522.

Varian, H. (2000), “Buying, Sharing and Renting Information Goods,” The Journal of Industrial Economics, 48 (4): 473-488.