English  |  正體中文  |  简体中文  |  Post-Print筆數 : 27 |  Items with full text/Total items : 111200/142120 (78%)
Visitors : 48098714      Online Users : 457
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    Please use this identifier to cite or link to this item: https://nccur.lib.nccu.edu.tw/handle/140.119/36878


    Title: 網路外部性、軟體盜版與自由軟體
    Authors: 吳崇仁
    WU,Chung-Jen
    Contributors: 江永裕
    陳坤銘

    吳崇仁
    WU,Chung-Jen
    Keywords: 網路外部性
    軟體盜版
    自由軟體
    Date: 2008
    Issue Date: 2009-09-18 20:01:00 (UTC+8)
    Abstract: 本論文由三篇文章所組成,主要是討論軟體市場存在盜版下,軟體廠商可能因應的策略與政府政策為何。整篇論文的主軸與行文順序如下:

      第一篇文章為「網路外部性,軟體盜版與廠商遊說決策」,本文主要是討論軟體獨占廠商面對家用及企業市場同時存在盜版情況下,分析軟體獨占廠商如何分配遊說金在兩市場上遊說政府取締盜版的決策及廠商在兩市場的定價策略。我們證明在取締盜版的遊說金分配策略方面,假設家用及企業市場均存在盜版情形下,企業市場存在網路外部性將影響獨占廠商的遊說決策。軟體獨占廠商將配置較高的遊說金用於遊說取締企業市場,並放任部分家用市場盜版。其次,在市場定價策略方面,當獨占廠商面臨兩市場均存在盜版的情形時,廠商將對兩市場採取差別取價,企業市場因為配置較高遊說金導致較高的成功機率,加上網路外部性的因素,對軟體的淨效用較高,獨占廠商在企業市場的定價一定高於家用市場。

      第二篇文章為「存在網路外部性下廠商的最適軟體贈與策略」,主要是探討軟體獨占廠商同時面對家用與企業均存在盜版現象下,廠商如何透過免費贈與次級品質軟體的策略組合來使其獲利最大。當廠商在家用市場實施贈與品質比盜版好的軟體策略時,部分的正版市場被贈與軟體侵蝕而利潤減少,但也因為贈與軟體除替代盜版軟體外,因為不需使用成本,家用市場原來不使用軟體者將全部使用贈與軟體,使得總網路外部性增加因而增加企業市場利潤。因此,當網路外部性高時,廠商可能因企業市場獲利高過家用市場損失而使總利潤增加。所以當網路外部性大時,廠商利潤最大的策略組合為 (家用市場贈與,企業市場不贈與)。當廠商在家用市場實施贈與品質比盜版差的軟體策略時,免費軟體將取代部分盜版軟體,以及原來家用市場不使用軟體者,創造出最大的網路外部性使企業市場獲利增加。所以在實施贈與品質比盜版差的軟體策略時,廠商利潤最大的策略組合仍為 (家用市場贈與,企業市場不贈與)。而且因為贈與品質比盜版差的軟體不會減少家用市場利潤,而且創造出的網路外部性與贈與品質比盜版好的軟體策略下相同,因此當廠商考慮贈與軟體時,廠商在家用市場必定選擇品質較盜版軟體差的軟體贈與。

      第三篇文章為「盜版取締、自由軟體與政府的最適補貼政策」,分析政府保護智慧財產權的公共政策除取締盜版外,尚可採行同時取締盜版與補助自由軟體使用政策,討論政府在公共政策搭配下,對智慧財產權的保護與加強市場競爭程度的效果為何。主要的結論為:第一,當政府不實施任何公共政策下,若自由軟體品質較盜版品質差,使用盜版軟體沒有任何機會成本,自由軟體將會完全退出市場。第二,在假設自由軟體品質高於盜版軟體品質下,政府增加補助自由軟體將可提高市場競爭程度。但當自由軟體品質是低於盜版軟體品質時,自由軟體的主要競爭者為盜版軟體而非正版軟體,因此政府補貼自由軟體確實可以減少盜版,達到保護智慧財產權的目標,但是卻無法影響正版軟體價格與數量,達到加強市場競爭的目標。第三,在自由軟體品質低於盜版軟體假設下,當政府的目標是社會福利最大時,政府的最適公共政策是同時實施取締盜版軟體與對自由軟體課稅而非補貼。
    Reference: 中文部分
    中央社舊金山專電 (2002),「微軟指仿冒從未考慮進入台灣校園」,91 年 4 月19 日。
    洪朝貴 (1999),自由軟體在台灣資訊教育的應用,資訊與教育,71,2-9。
    ETtoday (2006),「網路追追追/BSA大規模掃蕩企業及個人盜版 Windows?」,95年 3 月 17 日,網頁:http://www.ettoday.com/2006/03/07/339- 1913656.html.
    ZDNet (2008),專訪Richard Stallman:學校教育應只用自由軟體。
    英文部分
    Alvisi, M., Argentesi, E. and E. Carbonara (2002), “Piracy and Quality Choice in Monopolistic Markets,” University of Bologna, Mimeo.
    Bae, S. H. and J. P. Choi (2006), “A Model of Piracy,” Information and Economics Policy, 18, 303-320.
    Banerjee, D. S. (2003), “Software Piracy: A Strategic Analysis and Policy Instruments,” International Journal of Industrial Organization, 21, 97-127.
    Banerjee, D. S. (2006), “Lobbying and Commercial Software Piracy,” European Journal of Political Economy, 22, 139-155.
    Banerjee, D. S., Banerjee, T. and A. Raychaudhuri (2008), “Optimal Enforcement and Anti-copying Strategies to Counter Copyright Infringement,” The Japanese Economic Review, 59, 519-535.
    Belleflamme, P. (2003), “Pricing Information Goods in the Presence of Coping,” In: Gordon, W. J., Watt, R. (Eds.), The Economics of Copyright. Developments in Research and Analysis. Edward Elgar.
    Chen, Y. and I. Png (2003), “Information Goods Pricing and Copyright Enforcemtnt : Welfare Analysis,” Information Systems Research, 14, 107-123.
    Conner, K. R. and R. Rumelt (1991), “Software Piracy: An Analysis of Protection Strategies,” Management Science, 37, 125-137.
    Corey, G. and S. Junarkar (1998), “Gates, Buffett a Bit Bearish,” http://news. cnet.com/2100-1023-212942.html
    Deneckere, R. J. and R.P. McAfee (1996), “Damaged Goods,” Journal of Economics and Management Strategy, 5, 149-174.
    Gayer, A. and O. Shy (2003), “Internet and Peer-to-peer Distributions in Markets for Digital Products,” Economics Letters, 81, 51-57.
    Gil, R. (2006), “The Economics of IPR Protection Policies,” Review of Network Economics, 5, 299-319.
    Haruvy, E. and A. Prasad (1998), “Optimal Product Strategies in the Presence of Network Extenalities,” Information Economic and Policy, 10, 489-499.
    Haruvy, E. and A. Prasad (2001), “Optimal Freeware Quality in the Presence of Network Extenalities : An Evolutionary Game Theoretical Approach,” Journal of Evolutionary Economics, 11, 231-248.
    Higgins, R. S. and P. H. Rubin (1986), “Counterfeit Goods,” Journal of Law and Economics, 29, 211-230.
    Jing, B. (2000), “Versioning Information Goods with Network Externalities,” 21st International Congerence on Information (ICIS), Brisbane, Australia.
    King, S. P. and R. Lampe (2003), “Network Externalities, Price Discrimination and Profitable Piracy,” Information Economics and policy, 15, 271-290.
    Paul McDougall (2007), “If You’re Going To Steal Software, Steal From Us :Microsoft Exec,” InformatiomWeek, http://www.informationweek.com/story/showArticle.jhtml?articleID=198000211
    Peitz, M. and P. Waelbroeck (2006), “Piracy of Digital Products : A Critical Review of the Theoretical Literature,” Information Economics and Policy, 18, 449-476.
    Slive, J. and D. Bernhardt (1998), “Pirated for Profit,” Canadian Journal of Economics, 31:4, 887-899.
    Takeyama, L. (1994), “The Welfare Implications of Unauthorized Reproduction of Intellectual Property in the Presence of Network Externalities,” Journal of Industrial Economics, 62, 155-166.
    Yoon, K. (2002), “The Optimal Level of Copyright Protection,” Information Economics and Policy, 14, 327-348.
    Description: 博士
    國立政治大學
    國際經營與貿易研究所
    893515041
    97
    Source URI: http://thesis.lib.nccu.edu.tw/record/#G0893515041
    Data Type: thesis
    Appears in Collections:[國際經營與貿易學系 ] 學位論文

    Files in This Item:

    File Description SizeFormat
    51504101.pdf96KbAdobe PDF2755View/Open
    51504102.pdf126KbAdobe PDF2828View/Open
    51504103.pdf168KbAdobe PDF2879View/Open
    51504104.pdf112KbAdobe PDF2926View/Open
    51504105.pdf215KbAdobe PDF21049View/Open
    51504106.pdf315KbAdobe PDF2914View/Open
    51504107.pdf318KbAdobe PDF2953View/Open
    51504108.pdf337KbAdobe PDF21012View/Open
    51504109.pdf191KbAdobe PDF2952View/Open
    51504110.pdf106KbAdobe PDF2811View/Open


    All items in 政大典藏 are protected by copyright, with all rights reserved.


    社群 sharing

    著作權政策宣告 Copyright Announcement
    1.本網站之數位內容為國立政治大學所收錄之機構典藏,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。
    The digital content of this website is part of National Chengchi University Institutional Repository. It provides free access to academic research and public education for non-commercial use. Please utilize it in a proper and reasonable manner and respect the rights of copyright owners. For commercial use, please obtain authorization from the copyright owner in advance.

    2.本網站之製作,已盡力防止侵害著作權人之權益,如仍發現本網站之數位內容有侵害著作權人權益情事者,請權利人通知本網站維護人員(nccur@nccu.edu.tw),維護人員將立即採取移除該數位著作等補救措施。
    NCCU Institutional Repository is made to protect the interests of copyright owners. If you believe that any material on the website infringes copyright, please contact our staff(nccur@nccu.edu.tw). We will remove the work from the repository and investigate your claim.
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback