TY - JOUR
T1 - Piracy as an entry deterrence strategy in software market
AU - Nie, Jiajia
AU - Zhong, Ling
AU - Li, Gendao
AU - Cao, Kuo
N1 - Funding Information: This work was supported by the National Natural Science Foundation of China [grant number 71672153 ] .
PY - 2022/4/16
Y1 - 2022/4/16
N2 - Piracy is commonly believed to be detrimental to legal suppliers, so strong enforcement against piracy is expected. However, in practice, some companies do not deter piracy actively which seems counterintuitive. To explore the rationale behind the uncommon phenomenon, this paper explores the piracy issue from the entry deterrence perspective. In particular, we study an incumbent's entry deterrence strategy using piracy when facing a potential entrant who offers similar products in the market. The incumbent decides whether to deter the piracy, and the entrant chooses whether to enter the market by anticipating the competition in the potential market and the entry cost. By analyzing the strategies of both the incumbent and the entrant, we find that deterring piracy is not always a good strategy since piracy could be used as a deterring strategy on the entrant, which explains the practices in many companies. Specifically, we find that when the entry cost is moderate, the incumbent accommodates piracy when the entrant is more of a threat, and piracy serves as a partner of the incumbent to prevent the entry of a powerful entrant. This conclusion also holds when considering the entry deterrence cost, network effect and the entrant is a high end substitute.
AB - Piracy is commonly believed to be detrimental to legal suppliers, so strong enforcement against piracy is expected. However, in practice, some companies do not deter piracy actively which seems counterintuitive. To explore the rationale behind the uncommon phenomenon, this paper explores the piracy issue from the entry deterrence perspective. In particular, we study an incumbent's entry deterrence strategy using piracy when facing a potential entrant who offers similar products in the market. The incumbent decides whether to deter the piracy, and the entrant chooses whether to enter the market by anticipating the competition in the potential market and the entry cost. By analyzing the strategies of both the incumbent and the entrant, we find that deterring piracy is not always a good strategy since piracy could be used as a deterring strategy on the entrant, which explains the practices in many companies. Specifically, we find that when the entry cost is moderate, the incumbent accommodates piracy when the entrant is more of a threat, and piracy serves as a partner of the incumbent to prevent the entry of a powerful entrant. This conclusion also holds when considering the entry deterrence cost, network effect and the entrant is a high end substitute.
KW - Enter deterrence strategy
KW - Entry cost
KW - Piracy
KW - Software market
KW - Supply chain management
UR - http://www.scopus.com/inward/record.url?scp=85109430668&partnerID=8YFLogxK
U2 - 10.1016/j.ejor.2021.06.006
DO - 10.1016/j.ejor.2021.06.006
M3 - Article
AN - SCOPUS:85109430668
SN - 0377-2217
VL - 298
SP - 560
EP - 572
JO - European Journal of Operational Research
JF - European Journal of Operational Research
IS - 2
ER -