Диссертация (1151120), страница 18
Текст из файла (страница 18)
№110, pp. 93 – 125.[51] Farrell, J., G., Saloner. Standardization, Compatibility, and Innovation //Rand Journal of Economics. 1985. №16, pp. 70 – 83.[52] Farrell, J., G. Saloner. Installed base and compatibility: innovation, productpreannouncements and predation // American Economic Review. 1986.№76, pp. 940 – 955.[53] Farrell, J., G. Saloner. Standardization and Variety // Economic Letters.1986. №20, pp. 71 – 74.[54] Gayer, A., Shy, O.
Copyright Protection and Hardware Taxation //Information Economics and Policy. 2002. №15, pp. 467 – 483.[55] Gayer, A., Shy, O. Internet and Peer-to-Peer Distributions in Markets forDigital Products // Economics Letters. 2003. №81, pp. 197 – 203.[56] Gilbert, R. J. Symposium on Compatibility: Incentives and MarketStructure // Journal of Industrial Economics, 1992. №40, pp.
1 – 8.[57] Godenberg, J., Liba, B. Muller, E. Talk of the network: a complex systemslook at the underlying process of word-of-mouth // Marketing Letters. 2001.№12, pp. 211 – 223.[58] Gopal, R., Sanders, G.International software piracy: Analysis of key issuesand impacts // Information Systems Research. 1998.
№9, pp. 380 – 397.[59] Gopal, R., Sanders, G. Global software piracy: You can't get blood out of aturnip // Communications of the ACM. 2000. №43, 82 – 89.[60] Heiman, A., Muller. E. Using demonstration to increase new productacceptance: controlling demonstration time // Journal of Market Research.1996. №33, pp. 422 – 430.111[61] Heiman, A., B. McWilliams, Z. Shen, D. Zilberman. Learning andforgetting: modeling optimal product sampling over time // ManagementScience.
2001. №47: 532 – 546.[62] Hoch, D., Rodeing, J., Purkert, C., Lindner, S. K. Secrets of softwaresuccess: Management insights from 100 software firms around the world.Boston M.A.: Harward Business School Press. 1999.[63] IDC. Понимание рисков, связанных с использованием нелегального ПОдомашними пользователями. White Paper. 2010.(URL: http://download.microsoft.com/documents/rus/antipiracy/IDC_Corporate_piracy_risks_WP_December_2010.pdf, дата обращения: 15.11.2014)[64] Jain, D., Mahajan, V., Muller, E. An approach for determining optimalproduct sampling for diffusion of a new product // Journal of ProductInnovation Management.
1995. №12, pp. 124 – 135.[65] Jing, B. Versioning information goods with network externalities.International Conference on Information Systems. 2000. (URL:http://aisel.aisnet.org/icis2000/1/, дата обращения: 15.11.2014)[66] Johnson, W. The economics of copying // Journal of Political Economy.1985. №93, pp. 158 – 173.[67] Katz, M., Shapiro, C. Network externalities, competition and compatibility //American Economic Review. 1985. №75, pp. 424 – 440.[68] Katz, M., Shapiro, C.
Technology Adoption in the Presence of NetworkExternalities // Journal of Political Economy. 1986., 94(8): 822 – 841.[69] Katz, M., Shapiro, C. Product Compatibility Choice in a Market withTechnological Progress, Oxford Economic Papers, Special Issue on the NewIndustrial Economics. 1986. №38, pp. 147 – 65.[70] Katz, M., Shapiro, C. Product Introduction with Network Externalities //Journal of Industrial Economics, 1992. №40, pp.
55 – 84.[71] Katz, M., Shapiro, C. Systems competition and network effects // TheJournal of Economic Perspectives. 1994. №8, pp. 93 – 115.112[72] Kemper, A., Valuation of Network Effects in Software Markets(Contributions to Management Science). Physica Verlag Heidelberg. 2010.[73] Khouja, M., S. Park. Optimal pricing of digital experience goods underpiracy // Journal of Management Information Systems. 2007. №24,pp.
109 – 141[74] King, P.S., Lampe, R., Price discrimination and profitable piracy",Information Economics and Policy. 2003, № 15, pp. 271 – 290[75] Knox, G., Eliashberg, J. The Consumer’s Rent vs. Buy Decision: The Caseof Home-Video. Working Paper. The Wharton School, University ofPennsylvania.
2007.(URL: http://knowledge.wharton.upenn.edu/wp-content/uploads/2013/09/1305.pdf, дата обращения: 15.11.2014)[76] Lahiri, A., D. Dey. Effects of Piracy on Quality of Information Goods //Management Science. 2013. № 59. pp 245 – 264.[77] Liebowitz, S. J., Margolis, S. E., Path Dependence, Lock-In, and History,Journal of Law // Economics and Organization. 1995.
№11, pp. 205 – 226.[78] Logsdon, J.M., Thompson, J. K., Reid, R. A. Software piracy: is it related tolevel of moral judgment? // Journal of Business Ethics. 1994. №13,pp. 849 – 857.[79] MacKie-Mason, J. K.,Varian, H. R. 1994. Pricing Congestible NetworkResources // IEEE Journal On Selected Areas In Communications. 1995.№13, pp. 1141 – 1149.[80] Matutes, C., Regibeau, P. Mix and Match: Product Compatibility withoutNetwork Externalities // Rand Journal of Economics, 1988.
№19,pp. 221 – 234.[81] Mondok M. Microsoft executive: Pirating software? Choose Microsoft!(URL: http://arstechnica.com/information-technology/2007/03/microsoft-executive-pirating-software-choose-microsoft/, дата обращения: 15.11.2014)113[82] Novos, I.E., Waldman, M. The Effects of Increased Copyright Protection:An Analytic Approach // Journal of Political Economy. 1984. №92,pp. 236 – 246.[83] Oren, S. S., Smith, S. A.
Critical Mass and Tariff Structure in ElectronicCommunications Markets // Bell Journal of Economics. 1981. №12,pp. 467 – 487.[84] Parker, G., Alstyne, V., Marshall W., Information Complements,Substitutes, and Strategic Product Design. 2000.(URL: http://ssrn.com/abstract=249585, дата обращения: 15.11.2014)[85] Peitz, M., Waelbroeck, P. Piracy of Digital Products: A Critical Review ofthe Economics Literature.
Working Paper, University of Mannheim andECARES. 2003.(URL: http://www.cesifo.de/pls/guestci/download/CESifo+Working+Papers+2003/CESifo+Working+Papers+November+2003/cesifo1_wp1071.pdf,дата обращения: 15.11.2014)[86] Poddar, S. Network Externality and Commercial Software Piracy, WorkingPaper. National University of Singapore. 2005.(URL: http://www.fas.nus.edu.sg/ecs/pub/wp/wp0516.pdf,дата обращения: 15.11.2014)[87] Prasad, A., Mahajan, V. How many pirates should a software firm tolerate?– An analysis of piracy protection on the diffusion of software //International Journal of Research in Marketing.
2003. №20, pp. 337 – 353.[88] Regibeau, P., Rockett, K. The timing of product introduction and thecredibility of compatibility decisions // International Journal of IndustrialOrganization. 1996. №14. pp. 801 – 823.[89] Rohlfs, J. A Theory of Interdependent Demand for a CommunicationsService // Bell Journal of Economics. 1974.
№5, pp. 16 – 37.[90] Shapiro, C., Varian, H. Information Rules: A Strategic Guide to the NetworkEconomy. Harvard Business Review Press. 1998.114[91] Shy, O. Technology Revolutions in the Presence of Network Externalities //International Journal of Industrial Organization. 1996. №14, pp. 785 – 800.[92] Shy, O., Thisse, J. F. A strategic approach to software protection // Journalof Economics and Management Strategy. 1999.
№8, pp. 163 – 190.[93] Slive, J., D. Bernhardt. 1998. Pirated for Profit // Canadian Journal ofEconomics. №31, pp. 886 – 899.[94] Swann, P., Shurmer, M. The emergence of standards in pc software: whowould benefit from institutional intervention? // Information Economics andPolicy. 1994. №6, pp. 295 – 318.[95] Takayema, N.L. The welfare implications of unauthorized reproduction ofintellectual property in the presence of demand network externalities //Journal of Industrial Economics.
1994. №42, pp. 155 – 166.[96] Takeyama, L.N. The Intertemporal Consequences of UnauthorizedReproduction of Intellectual Property // Journal of Law and Economics1997. №40, pp. 511 – 522.[97] Takeyama, L.N. Piracy, Asymmetric Information and Product QualityRevelation // Working Paper, Amherst College. 2002.(URL: http://fabrice.rochelandet.free.fr/piraterie/piracy2.pdf,дата обращения: 15.11.2014)[98] Thum, M. Network Externalities, Technological Progress, and theCompetition of Market Contract // International Journal of IndustrialOrganization.
1994. №12, pp. 269 – 289.[99] TNS. Мнение российских пользователей о пиратском ПО. 2010.(URL: http://download.microsoft.com/documents/rus/antipiracy/Anti-Piracy+Consumer+Research+Executive+Summary_Russia.pptx, датаобращения: 15.11.2014)[100] Wu, S.-y., P.-y. Chen Versioning and piracy control for digital informationgoods // Operations Research.
2008. №56, pp. 157 – 172.115[101] Yoon, K. The Optimal Level of Copyright Protection // InformationEconomics and Policy. 2002. №14, pp. 327 – 348.[102] Zwass. V. Foundations of Information Systems. 1997. Irwin/McGraw Hill.116ПРИЛОЖЕНИЕ 1. Программная реализация алгоритмамоделирования поведения потенциальных и существующихпользователей ППSub Model1()Const Ppi = 3.14159265358979krito = mu / rr + sigma ^ 2 / (mu - (mu ^ 2 + 2 * sigma ^2 * rr) ^ (0.5))kritp = sigma ^ 2 / (2 * sigma ^ 2 * rr) ^ (0.5)RandomizeN(0) = 0For i = 1 To TN(i) = (a + b * N(i - 1)) * (M - N(i - 1))Next iFor j = 1 To TFor i = N(j - 1) + 1 To N(j)ksi1 = Rndksi2 = RndUsers(i, j) = Exp(alpha + beta * Sqr((-1) * 2 *Log(ksi1)) * Cos(2 * Ppi * ksi2))Users(i, j) = Round(Users(i, j), 3)If (Users(i, j) > 20) Then Users(i, j) = 20Sheets("Value").SelectExpectedValueOriginal(i) = Cells(CInt(Users(i, j) *100) + 1, 2)ExpectedValuePirated(i) = Cells(CInt(Users(i, j) *100) + 1, 3)For k = j + 1 To T + 2ksi3 = Rndksi4 = RndUsers(i, k) = Users(i, k - 1) + sigma * Sqr((-1)* 2 * Log(ksi3)) * Sin(2 * Ppi * ksi4)Next kNext iNext jii = 1For c = 0 To 1000 Step 100117jj = 1For Neffect = 0 To 1 Step 0.1max_profit(ii, jj) = 0For p = 0 To 2000 Step 100For i = 0 To TD(i) = 0R(i) = 0S(i) = 0Next iFor i = 0 To TFor j = 1 To MUsers(j, i) = 0Choice(j, i) = 0Next jNext iFor j = 1 To TR(j) = 0 'оригинальная версия ППS(j) = 0 'пиратская версия ППD(j) = 0 'спрос на ППFor i = 1 To N(j)If (Choice(i, j - 1) = 0) ThenIf (ExpectedValueOriginal(i) + (R(j - 1) + S(j- 1)) * Neffect >= p) And (ExpectedValueOriginal(i) + (R(j- 1) + S(j - 1)) * Neffect - p >= ExpectedValuePirated(i)+ (R(j - 1) + S(j - 1)) * Neffect - c) ThenChoice(i, j) = 2R(j) = R(j) + 1D(j) = D(j) + 1End IfIf (ExpectedValuePirated(i) + (R(j - 1) + S(j 1)) * Neffect >= c) And (ExpectedValueOriginal(i) + (R(j- 1) + S(j - 1)) * Neffect - p < ExpectedValuePirated(i)+ (R(j - 1) + S(j - 1)) * Neffect - c) ThenChoice(i, j) = 1S(j) = S(j) + 1PirateTime(i) = jEnd IfEnd IfIf (Choice(i, j - 1) = 1) Then118If (Users(i, j) - mu * (j - PirateTime(j))) >=kritp ThenChoice(i, j) = 1S(j) = S(j) + 1ElseIf (ExpectedValueOriginal(i) + (R(j - 1) +S(j - 1)) * Neffect >= p) And (ExpectedValueOriginal(i) +(R(j - 1) + S(j - 1)) * Neffect - p >= ExpectedValuePirated(i)+ (R(j - 1) + S(j - 1)) * Neffect - c) ThenChoice(i, j) = 2R(j) = R(j) + 1D(j) = D(j) + 1Change = Change + 1ElseChoice(i, j) = 0End IfEnd IfIf (Choice(i, j - 1) = 2) ThenIf Users(i, j) >= krito ThenChoice(i, j) = 2R(j) = R(j) + 1ElseChoice(i, j) = -1End IfEnd IfIf (Choice(i, j - 1) = -1) ThenChoice(i, j) = -1End IfNext iNext jdemand = 0profit = 0For i = 1 To Tprofit = profit + p * D(i) / ((1 + rr) ^ (i))demand = demand + D(i)Next iIf (profit > max_profit(ii, jj)) Thenmax_profit(ii, jj) = profitopt_demand(ii, jj) = demandopt_p(ii, jj) = p119End IfNext pjj = jj + 1Next Neffectii = ii + 1Next cEnd Sub120.