Price discrimination: an protection strategy against software piracy

Price discrimination: an protection strategy against
software piracy
Marc Robert∗
ABSTRACT
In this paper, we analyze the new interest of software firms in protection policies against
piracy. These firms want to revolutionize safety in the computer industry.
However, in the mid-1980s, software firms gradually removed their copy protections. Shy and
Thisse (1999) explain that those protections have not been profitable for firms.
In contrast, in this work we show that, thanks to the development of Internet, the price
discrimination allows firms to protect their software again. Indeed, software firms can use
discrimination as a defensive strategy against the hackers. This use contrasts with this
suggested in the discrimination literature.
1. INTRODUCTION
The current objective of Microsoft Corporation is to revolutionize the security in the
computer industry with its new software “Palladium” that will be incorporated in future
version of windows 2004, “longhorn”. In order to obtain the trustworthy computer industry, in
the 1999s Microsoft sets up a consortium with microprocessor makers (Intel and AMD) and
with PC hardware makers (IBM, HP, Compaq). This alliance is the “Trusted Computing
Platform Alliance”, which promotes a new computing platform that will spot and disable both
pirated software and pirated songs or videos.
In contrast, in the mid-1980s, software firms have gradually removed
protections against copying. Shy and Thisse (1999) explain that firms had strategic incentives,
due to network effects. Indeed, the piracy protections have not been profitable for firms
because protections decreased the number of consumers using their software.
So, objective of this paper is to analyze the recently policy change on the part of
software firms. Why firms protect their software again? Which is the reason of this behaviour
change of managers’ software firms?
∗
LAMETA, Faculté Des Sciences Economiques, Espace Richter Avenue de la Mer B.P.9606 34054
Montpellier. Email: [email protected]
1
For this purpose, we study software industry in taking into account the recent
development of Internet. Since the early 2000s, the number of users of the web has increased
thus this media becomes a new canal of distribution for software firms. The Web has as main
advantage to facilitate the ability of software firms to use price discrimination. In order to
make this analysis, we develop a five stage game, inspired from Shy and Thisse (1999), where
software firms are free to adopt uniform or discriminatory pricing. Our solution concept is a
sub-game perfect equilibrium and we solve the game by backwards induction.
Our main result is that price discrimination allows software firms to protect their
software again because piracy protections become profitable again. We show that software
firms can use price discrimination as a defensive strategy against aggressive consumers, the
hackers. This reason is very different from those traditionally advanced in the study of the
discrimination. Indeed, firms do not want to earn a part of the consumer surplus or to increase
rival's cost, but they only want to protect their software against piracy. In software industry,
price discrimination is not necessarily an aggressive strategy. Our work aims to illustrate one
other of the classical explanations for which firms adopt discriminatory prices in the
oligopolistic markets. Price discrimination is not systematically harmful or beneficial strategy
for consumers or for rival firms. Discriminatory pricing is only a management strategy. What
is important, it is the way in which firms use it. The impacts of this strategy depend on firms'
reasons of its adoption.
The remainder of the article is organized in the following way: the next section
describes our model. Section 3 explains the consumers’ behavior for all protection software
degrees. The section 4, 5 and 6 determine the software equilibrium prices by all possible
pricing, in turn for unprotected industry, protected industry and partially protected industry.
Section 7 analyzes both the price policy choice of firms and their degree of software
protection choice. We derive the sub-game perfect equilibrium. Then in this section we study
the impacts of price discrimination consumers’ surplus and social welfare. We conclude the
paper with section 8.
2
2. THE MODEL
We use the Shy and Thisse (1999) framework to model price competition between two
firms A and B in the software industry. The software market is represented by a linear
segment of the length one [0, 1].
Those software firms are localized at both end of the line, firm A on the left and firm
B on the right. Each software firm produces and sells its software goods to consumers. They
also offer at each purchaser a technical assistance. They can either adopt a uniform pricing or
a discriminatory pricing. The uniform pricing with unique mill price is noted FOB (Free On
Bord) and the discriminatory pricing with delivered discriminatory prices is noted D.
If uniform pricing is adopted by firms, consumers bear transportation costs to go until
software firm. But, all consumers will pay the same mill price for the same software good.
In contrast, if discriminatory pricing is adopted, firms will deliver the product to the
consumers. Each consumer will pay a different delivered price because firms absorb a part of
transportation costs. Since they observe the consumer’s locations, they can charge locationspecific prices. Thus, firms price discriminate, setting different mill prices at the firms’ door.
Actually, users of software goods are divide up two categories. The first group is
constituted by professionals, who need the services and support provided by the software
suppliers. Moreover, they are strongly risk-averse with respect to being prosecuted for using
software illegally. In contrast, the second category is constituted by private users which are
student users or others who need not services and who are not risk-averse.
Thus, we assume that potential users of software firms A et B are professionals and
private consumers. Slive and Bernhardt (1998), Shy and Thisse (1999) make a similar
hypothesis. Professionals gain extra utility σ from services and support of software firms,
whereas private users do not derive utility. All consumers are uniformly1 distributed along the
unit interval [0, 1]. The location of a professional consumer is denoted x and the location of a
private is denoted y. The consumer localization is defined as the distance to the left endpoint
of the market. The total population in the economy has a measure of 2.
The group of professionals and private consumers have the same size. Each category
of consumers has the choice between buy software and pirate software or not uses any
software. But the professionals group will not pirate software because they are risk averse.
The number of total users (legally and illegally) of software A is noted nA and number of
users of software B is noted nB. The number of users influences consumers’ evaluation of
1
With unity density.
3
software goods. The consumer’s evaluation of software good depends both on its inherent
characteristics and on the number of users of software: the greater the number of software, the
greater the benefit of software, and so, the greater the demand. Indeed, the increase of number
of users leads to an increase in network size, thereby increasing both number of professionals
and private consumers using this software. The files generated by the same software are
completely compatible. So, the files exchange is facilitated and consumers benefit from
positive externalities who are represented by µni, where i = A, B and µ is the coefficient
measuring the importance of the network size to a software user.
In order to analyze consumers’ and firms decisions in software industry, we use multistage game. The timing of this game is the following (see details in the appendix A).
In the first stage, software firms choose between to protect their goods and not to protect,
those strategies are noted P and P respectively.
In second stage, after the protection choice, each software firms choose its pricing policy. It
is free to adopt a uniform pricing (FOB) or discriminatory pricing (D).
In third stage, firms set the price level for the selling of their software goods.
In the fourth stage, professionals and private consumers observe software prices charged by
software firms A and B, and make software choice. Consumers have different options: they
can remain in legality, buying either software good or not using any software, or they can
become hackers pirating either software good.
Our solution concept is a subgame perfect equilibrium. As with all multistage games,
we solve the game with backwards induction.
3. CONSUMERS’ DECISONS
Each consumer will buy software good, if he can find a variety i which procures at him the
positive indirect utility Ui. She will purchase the variety software that will maximize its
utility. This consumption decision is influenced both by the firms' pricing choice and the
firms' degree of protection choice. In the following, we detail as these firms’ decisions
influence consumers’ behavior purchasing.
Software firms A and B can adopt the same degree of protection against software
piracy.
If all firms possess the means of protecting their software, thereby making software piracy
prohibited, this situation is noted (P,P). Then consumers must choose between buying the
software and not using any software. But, if both software firms not want to protect software
4
or not possess the means of protecting it, situation noted ( P , P ) , the piracy become costless
for private consumers. In this case, the hackers use the software without obtain support and
services. Since some users may pirate software goods, the number of buyers can be smaller
than the number of users.
If firms use different protection policies, others cases may arise. Those situations are noted,
( P, P ) and ( P , P) , a firm protects its software whereas other firm does not. Firms adopt an
asymmetric choice because they have not the same technology level to fight against piracy, or
because they have different strategic behaviors.
Therefore, according to firms’ decisions, consumers can be placed in different industries,
unprotected industry ( P , P ) , protected industry ( P, P) , or partially protected industry ( P, P ) ,
( P , P) .
Furthermore, in each previous situations software firms can adopt the same pricing or
different pricing. In this paper, we extend previous analysis of Shy and Thisse which has only
studied the protection strategy in the uniform Mill price context. We consider a model where
firms are free to adopt uniform or discriminatory pricing policy. Four price systems may arise
in the second stage of our game: (D-D), (FOB-FOB), (FOB-D), (D-FOB). Those firms’
decisions influence price level and so consumers demand.
3.1 PROFESSIONALS’ UTILITY
When software firms use a uniform pricing, the professionals obtain the following
utility level:
U ( x, i ) ≡ σ + µ ni − CTi − piN with i=A,B
(1)
Where σ is the extra utility of professional from services and support who are provided by
software firms i; piN stands for the uniform mill price of software i and CTi stands for
transportation costs. Let those transportation costs be professionals’ costs of traveling distance
to buy the good. They can be interpreted as the costs for the consumer, in terms of utility loss,
for not consuming the favor variety of goods, but a variety at a distance d. When the transport
cost per distance unit is normalized at one, the transportation costs of professionals are
represented by x if i=A and 1-x if i= B. We assume that those potential consumers do not
5
pirate software goods even if software firms do not protect their products. Indeed, the
retaliation of software firms will be more harmful to professionals’ business activity.
Moreover, they need the support provided by software firm i. If the software’s price is less
than the extra utility generated by services, such pi < σ , professionals consider the piracy as
not profitable. Indeed, they only will obtain the following utility level U ( x, i ) ≡ µ ni − CTi .
Furthermore, if the importance of the network size to a software professional users are such
µ < 1/ 2 , all professionals will find the purchasing software profitable because U ( x, i ) > 0 ,
see Shy and Thisse (1999) lemme 1. In the remainder of this paper, we only consider cases in
which pi < σ and µ < ½.
Alternatively, when software firms use discriminatory prices, professionals obtain the
following utility level:
D
U ( x, i ) ≡ σ + µ ni − piL with i=A,B
(2)
D
Where piL stands for the delivered discriminatory prices of the software i. In this case,
Software firm i deliver the product to consumers and bears transportation costs. Each
consumer pays an individually delivered discriminatory price.
3.2 PRIVATE CONSUMERS’ UTILITY
Private consumers have different preferences from professionals’ preferences. They not derive
utility from the services and support provided by software firms to their legal customers. So,
they will have various consumption behaviors according to protections degree of software.
If software firms adopt a very weak degree of protection, private consumers will
prefer pirating software goods over buying software goods. In this case, they will obtain the
same utility level whatever the pricing choice of software firms, that is:
U ( y, i ) = µ ni − CTi ( i= A, B); CTi = y for i= A and CTi =1-y for i= B
(3)
In contrast, if software firms adopt a higher degree of protection, such private
consumers can not pirate software, some consumers will want buy software to use it. In this
case, the pricing choice of firms influences private consumers’ utility level and their demand.
6
When firms sell their software with uniform prices, a legal purchaser will obtain the following
utility level:
U ( y, i ) = µ ni − CTi − piN (i= A, B) ; CTi= y for i= A and CTi = 1-y for i= B
(4)
and when they adopt discriminatory prices a private purchaser will obtain:
D
U ( y , i ) = µ ni − piL , i=A, B
(5)
Consequently, the behavior of private consumers will be as follows:
Firstly, if software goods are unprotected, closest consumers of software firm i will choose
between to pirate software i and not to use it, while far consumers will not use any software
even if they can obtain it illegally for free. They will prefer not using software instead of
pirating software. Indeed, software goods are more distant or more different of their ideal
variety of software. The consumers’ utility of using software do not exceed its utilization cost,
such µ ni < CTi . So, in the middle of the linear market never consumers want software good.
Therefore, the group of private consumers is partitioned in three sub-groups: the pirates of
software A and pirates of software B, who are located at either end of a market, and nonusers.
The indifferent consumer between pirate software A and not using any software is yˆ A .
Formally yˆ A is the solution to equation U ( yˆ A , A) = − yˆ A + µ nA ; and the indifferent consumer
between pirate software B and not using any software is yˆ B , formally yˆ B solves
U (1 − yˆ B , B) = −(1 − yˆ B ) + µ nB .
Secondly, if software firms protect their software such as the piracy becomes impossible,
private consumers will have only two options: buy the near software or not use any software.
Thus, all private users of software goods will be legal purchasers. They are located at either
extremities of market. Instead, at the middle of market, private consumers remain not
interested by software. The last private consumers who accept to pay software good i, at the
uniform prices or discriminatory prices, are found by solving equations U ( yˆ A , A) = 0 and
U (1 − yˆ B , B) = 0 .
We now determine price levels fixed by software firms in all possible situations.
According to firm’s protection choices and firms’ pricing choices, sixteen sub-cases may
7
arise. Indeed, in each four protection situations (unprotected industry, protected industry, and
both partially protected industries) firms can adopt four price systems.
4. EQUILIBRIUM PRICES IN UNPROTECTED INDUSTRY
Without protection policy, the pricing of software firms only influence the purchasing
behaviour of professional consumers (group 1), while private consumers (group 2), pirate
software goods whatever the price type.
4.1 THE UNIFORM PRICING: THE CASE (FOB-FOB)
In this case, software firms A and B adopt the uniform price policy. Professionals pay out the
same mill price for the same software, and they have to move to buy software goods.
Consumers will bear the transportation cost of traveling distance to obtain the good. If they
do not want to move, consumers pay the price at the firm’s door plus the transportation cost
for delivery. We recall that the full price is constituted by mill price and transportation costs.
F
piL = piN + CTi . When firms do not protect their software, all private users are illegally users.
This case has been studied by Shy et Thisse (1999). We rapidly recall their results.
Among the professionals localized in x on the software market, we known that the
professional who is indifferent between buying software A and buying software B is given by
the following equality: s + µ nA − x − p AN = s + µ nB − (1 − x ) − pBN . This equality illustrates the
fact that this professional derives the same utility level from consumption of either software.
The localization of this professional will be:
xˆ =
1 + µ ( n A − nB ) + p B − p A
2
(6)
Instead, among private consumers on the software market, the indifferent consumer
between to pirate software A (B) and not to use it, is yˆ A = µ nA ( yˆ B = 1 − µnB ) solution of the
equality U ( yˆ A , A) = − yˆ A + µ nA = 0 ( U (1 − yˆ B , 2) = −(1 − yˆ B ) + µ nB = 0 ). Equilibrium prices
and firms’ profits are:
p AN * = pBN * =
1 − 2µ
1 − 2µ
and π APP − FF = π BPP − FF =
1− µ
2(1 − µ )
8
(7)
4.2 THE DISCRIMINATORY PRICING: THE CASE (D-D)
In this situation, software firms A and B sell their software at the discriminatory prices. We
analyze the purchasing behavior of professionals and of private consumers with this new
pricing.
4.2.1 The professionals’ consumption
Professional consumers benefit from delivery service offered by software firms. Each
D
professional purchaser pays out a delivered price piL . In contrary to the uniform pricing, firms
software discriminate with respect to locations purchasers absorbing part of the transportation
D
costs. Consequently, each professional x pay out an individual mill price, piN ( x) = piL − CTi ,
which is different from that of its neighbours. Software goods will be relatively cheaper for
far consumers of software firms than next consumers, because software prices decrease with
competition. Software firms sell only of consumers that accept to pay an enough higher
D
delivered price piL to cover total marginal cost CmTi which companies bear. Total marginal
cost is the sum of the marginal production cost and the marginal transportation cost. Ici, il se
résume au coût de transport CTi par logiciel.
Consumer arbitrage is considered to be prohibitively costly. Indeed, each professional
prefers buying software at the originally software makers over buying it at the other retailers.
Thus, he will obtain the support and services provided by software firms. Since resale among
professionals is not binding, a software firm’s price decision at a particular location has no
effect on actions at other locations. Delivered prices charged at different points of the market,
by the same firm, are strategically independent. Firms compete for consumers at each point on
the line. This is equivalent to Bertrand competition at each point in space. Competition in
prices will be thus represented by a succession of Bertrand’s games.
A segmentation of potential consumers appears, each software firm can sell at a subgroup of professionals. The boundary of markets is given by the intersection point of the total
marginal costs of firms net of network externalities that consumers derive from the
consumption of software goods. Indeed, the firm that is at a disadvantage due to distance will
have to set a price equal to its net total marginal cost CmTi-µni, to remain attractive for
consumers, while the other firm will set a price that just picks up all the consumers. Thus,
equilibrium
prices
will
be:
piL * = max {CmTi − µ ni ; CmT j − µ n j }
D
piL * = max { x − µ ni ; (1 − x ) − µ n j } .
D
9
i.e.
This equilibrium is different from that obtained by Lederer and Hurter (1986) or by Thisse
and Vives (1988), piL * = max {CmTi ; CmT j } , in which the networks effects has not been
D
analyzed.
In software industry, each software firms will fix on its market share discriminatory prices
equal at the net total marginal cost of its rival.
When software goods are unprotected and firms use discriminatory pricing, professional
consumers’ demand of software A and B will be:
xˆ =
1 − µ nB + µ nA
1 − µ nA + µ nB
and 1 − xˆ =
2
2
(8)
Software firm A will deliver all professionals localized between 0 and x̂ , software B will
deliver purchasers localized between x̂ and 1.
4.2.2 The private consumers’ consumption
Private consumers will not buy software goods. The lack security allows at some
private consumers y to pirate software. The others private consumers do not find software A
and B as interesting, in spite they are free. As viewed previously, the private consumers group
is divided between third sub-groups: hackers of software A at the left end of the market, the
hackers of software B at the right end of the market and at the middle of market the not users.
The last pirate y of software A is yˆ A = µ nA and the last hackers of product B is yˆ B = 1 − µ nB .
Hence, expressions of the number of total users, legally and illegally, of software A
and B are: nA = xˆ + yˆ A and nB = (1 − xˆ ) + (1 − yˆ B ) . The resolution of those equations give us
the equilibrium values n*A and nB* ,
1
2(1 − µ )
, then we obtain equilibrium prices and firms’
profits:
D
D
p AL * = (1 − x ) − µ nB* , pBL * = x − µ n*A and
. xˆ*
. xˆ*
π APP − DD = ∫ p AL * − CmTA dx = ∫ p AL * − ( x − µn*A ) dx =
D
.0
π
PP − DD
B
.1
=∫ *p
. xˆ
D
.0
LD *
B
.1
− CmTB dx = ∫ * p
. xˆ
LD *
B
1
4
1
− (1 − x − µn ) dx =
4
(9)
*
B
Software firms only earn gain by the selling software at professional consumers. Whereas,
software firms indirectly derive profits from the piracy software because that increase the
10
demand of legally costumers. In the real word, the professionals’ demand is influenced by
employments’ knowledge of software goods, which has been obtained on software pirated.
In the two previous paragraphs, we only assumed that software firms used the same
pricing, but they are free to adopt a different pricing. Consequently, asymmetric price systems
may arise (FOB, D) or (D, FOB), that we now study.
4.3 ASYMMETRIC PRICING
In this case, software firms adopt a different pricing, one sell their products at uniform prices,
whereas other sell their software at discriminatory prices. When firms adopt the asymmetric
price system (FOB-D) or (D-FOB), the firm which chooses uniform pricing will be the price
leader and the other firm will react optimally to its price. This situation can be interpreted as
the single-basing point pricing system in spatial price competition. The consumer pays the
base price, announced by the market leader, plus the transportation cost from the leader firm’s
door to the location of the consumer, whatever the firm that really supplies the consumer. The
localization of leader is reference point. It is a classical assumption in the spatial price
discrimination literature; see Philps (1983), Thisse and Vives (1988), Thisse and Vives (1992)
for a justification of this hypothesis.
If firm A adopt the FOB prices, it will charge its unique mill price p AN in the first
place. The market share of the leader is represented by the set of the locations where its price
is lower than the net total marginal cost of its competitor. Indeed, the software firm B, thanks
to its follower situation, will be able to just undercut the full price of software firm A,
F
D
p AL − µ nA . This firm B will fix lower discriminatory prices pBL than rival’s prices (such
D
F
as pBL = p AL − ε ) which will allow it to get all the demand. Thus, software B will serve all the
consumers localized up to point x. The market boundary will be this localization x who solve
F
the quality p AL − µ n A = CmTB − µ nB i.e.
p AN + x − µ n A = (1 − x ) − µ nB . Therefore, when the
price system will be FOB-D, the marginal professional consumer x will be:
xˆ =
1 − p A + µ nA − µ nB
2
(10)
Software firm A will sell their software at professional consumers localized at the left of
x̂ and software firm B will sell at professionals placed at the right.
11
Moreover, all private users of software A and B are hackers, which are at the number
yˆ A = µ nA and 1 − yˆ B = µ nB respectively.
Consequently, the total number of A-software users is nA = xˆ + yˆ A and number of B-software
users is nB = (1 − xˆ ) + (1 − yˆ B ) . The solution of these equations give us the expression of nA
and nB that we substitute into equations of demands x̂ and 1 − xˆ . Software firm A will
chooses uniform price, p AN * , to maximize its profit π APP − FD = p AN . xˆ . The firm B’s best response
{
D
}
to any mill price is pBL * = max p AN * + x − µ n*A ; CmTB − µ n*B . So, it will be able to charge
D
discriminatory prices pBL
*
at the majority of professional consumers, 1 − xˆ* = 3 / 4 . The
determination of equilibrium price p AN * yields equilibrium values n*A and nB* .
When software firms adopt the asymmetric price system (FOB, D), equilibrium prices and
firms’ profits will be:
p AN * =
F
D
2µ − 1
and p AL * = pBL * = p AN * + x − µ n*A and
2( µ − 1)
π APP − FD = p AN *.xˆ* =
.1
2µ − 1
and
8( µ − 1)
.1
π BPP − FD = ∫ ˆ pBL * − CmTB dx = ∫ ˆ pBL * − (1 − x) − µ n*B dx =
D
.x
D
.x
9
16
(11)
In the case (D-FOB), software firm B becomes the price leader, it uses the uniform
pricing and charges to its consumers the mill price pBN . The rival firm A will fix its
D
F
discriminatory prices p AL once the full price, pBL , of software B is known. Consequently, we
obtain the symmetric previous results.
Whatever the pricing used in the software industry, firms only compete on the professional
consumers, whereas private consumers profit by the lack of software protection to pirate it.
Those illegally utilisations are loss of earnings to software firms. In the real world, this piracy
increase with the recent development of the Web. In order to remove software piracy,
software firms may protect their products with a security chip or a special plug that is
necessary to launch the application. These protection policies will lead some private
consumers to buy software to use it. Now we determine again equilibrium prices in the
protected industry in which software firms delete piracy software.
12
5. EQUILIBRIUM PRICES IN PROTECTED INDUSTRY
The security degree adopted by software firms does not directly influence the purchasing
behavior of professional consumers. The utility expression of professionals is not modified.
So, whatever the pricing choice of software firms A and B, professionals will buy the same
quantity of protected software or unprotected software. In contrast, the protection of software
reduces the private consumers’ choice. They only are two options: buying software or not
using it. Those consumers will buy software if software’s price does not exceed utility level
that they drive of networks effects. Firms have to fix lower software’s price in order to sell at
the private consumers. Firstly, recall rapidly results of Shy and Thisse in the uniform pricing
context, then we take into account the possible firms’ adoption of discriminatory pricing.
5.1 UNIFORM PRICING: THE CASE (FOB-FOB)
As viewed in unprotected industry case, all private consumers do not want use software
goods, see Shy and Thisse (1999) lemma 2. Protection policies do not change this choice.
Thus, Shy and Thisse draw a distinction between two possible cases. They determine
equilibrium prices both for the case where some (but not all) private consumers buy software
and for the case where none of private consumers buy software.
In first, when software firms A and B charge lower prices, some private consumers
will buy software products. Indeed, the last private purchaser of software A is yˆ A whom the
utility level U ( yˆ A , A) = µnA − y A − p AN become zero. Among next private consumers of firm B
the last buyer of software B is
yˆ B , he derive from it the zero utility level
U ( yˆ B , B) = µnB − (1 − y B ) − pBN . In this case, the number of legally private users of software A
is yˆ A = µnA − p AN and that of B is 1 − yˆ B = µnB − pBN . All consumers, private and professionals
( xˆ + yˆ A and 1 − xˆ + 1 − yˆ B ), will pay out prices, p AN * and pBN * , and software firms will earn
profits:
p AN * = pBN * =
1 − 2µ
(1 − 2µ)(3 − 4 µ)
and π APP − FF = π BPP − FF =
5 − 8µ
2(1 − µ)(5 − 8µ)
(12)
Software firms A and B will charge those lower prices for values of network effects such as µ
> 0,399. Al contrary, when the importance of the network size to a software user is lower,
such as µ < 0,399, software firms can increase their profits by raising their prices. In spite the
fact that they loss a private market, they find it profitable to deviate of equilibrium lower
13
prices. The situation where none of private consumers buy and use software is the second case
studied by Shy and Thisse.
Secondly, when software A and B fix higher prices, so that private consumers y do not
buy and do not use software, they earn profits π iPP − FF − E =
(1 − µ)
. They sell their software
2
products at the professional consumers at price piN * = 1 − µ . For values µ < 0.438, never
software firms do not find profitable to deviate at this higher equilibrium prices, charging
lower prices.
In their proposition 4, Shy and Thisse conclude that the number of total software users
decrease with protection policies, and also conclude that firms’ profits decrease. Those results
are verified into cases, firstly when firms charge lower prices and values of µ are such
0.399<µ<0.438, secondly for all price levels when 0.438<µ<1/2. In their analyze Shy and
Thisse assume that software firms only adopt uniform pricing.
We now look for the impact of the discriminatory pricing on both private consumers’
behaviors consumption and profitability of software protection policies.
5.2 Discriminatory pricing: the case (D-D)
In this case, software firms A and B compete on both professionals and private markets.
In contrast to the uniform pricing context, all private consumers will buy protected
software. The software products appears more attractive with discriminatory prices because
firms deliver their software products at home of the purchasers. They bear transportation costs
and so they sell ideal variety software for each consumer. With discriminatory pricing, firms
fix higher prices at the next consumers and fix lower prices at far consumers or not very
interested consumers. Discriminatory pricing allows at software firms to decrease their prices
in order to attractive private consumers without profits loss on professionals market. Each
software firms have an influence zone on each market, which is given by the intersection
points ( x̂ and ŷ ) of the net marginal costs of two firms. Those zones overlap the market
areas where consumers’ utility levels, and so demands, are positive. The expressions of
professionals and private demands of software A and B are:
xˆ = yˆ =
1 − µ nB + µ n A
1 − µ n A + µ nB
and 1 − xˆ = 1 − yˆ =
2
2
14
(13)
The demand of professionals is the same that obtained in the unprotected industry given by
(8).
The number of total users of software A and B is different when firm protect their software
and do not protect. In substituting equilibrium values of n*A and nB* into professionals and
private’s demands we obtain xˆ * = yˆ * = 1/ 2 and 1 − xˆ* = 1 − yˆ * = 1/ 2 . For all consumers,
software firms fix their discriminatory prices equal to rival’s net marginal costs. Hence
discriminatory prices are less than uniform prices. Only consumers localized at the end of
market will pay out discriminatory prices equal at the uniform prices. Equilibrium prices and
firms’ profits are:
D
D
p AL * = CmTB − µn*B = (1 − x ) − µ and pBL * = CmTA − µn*A = x − µ
π APP − DD = π BPP − DD = 1/ 2
(14)
For equilibrium prices, we may check that consumers derive positive surplus of the
purchasing of software A and B. Indeed, consumers’ surplus of software A-users and software
PP
PP
B-users, S DD
( yˆ , A) and S DD
( yˆ , B) , are
3
3
µ − that are positive for µ>0.25.
2
8
Moreover, when firms adopt discriminatory pricing, the only stable equilibrium is the
lower prices equilibrium. This result is contrary to that is obtained with uniform pricing,
where higher prices equilibrium also may arise. Indeed, never software firm using
discriminatory prices find profitable to fix greater prices because its rival will undercut, and
the competitive intensity will leads decreasing price level.
In the protected industry, software also may choose pricing of the different nature. The
price systems D-FOB and FOB-D may take place. We study those price systems in the
following paragraph.
5.3 THE ASYMETRIC PRICE SYSTEMS
When firms choose an asymmetric price system, some consumers have to bear the
transportation cost of traveling distance to obtain software good, while others benefit to
delivered software.
In the case of FOB-D price system, software firm A becomes the price leader. A
segmentation of professional and private markets appears. The boundary of the potential
markets of each firm is delimited by x̂ and ŷ points. They are intersection points of uniform
15
F
full price p AL of the software A’s and net marginal costs of software B, CmTB − µnB on
professionals market and private market respectively. We obtain:
yˆ = xˆ =
1 − p AN + µ nA − µ nB
2
(15)
We remark that the expression of the professionals’ demand of protected software, x̂ and
1 − xˆ , is the same that of unprotected software, given by equation (10).
Software firm B (firm A) controls professional consumers from x̂ to 1 (from 0 to x̂ ), and
controls the private consumers from ŷ to 1. This software firm B is the only firm who can sell
its products to all potential consumers, professionals and privates, that thanks to
discriminatory pricing. While, software firm A sell its product to yˆ A private consumers out of
ŷ , where yˆ A = µn A − p AN . Indeed, the private consumer localized at yˆ A derives from software
D
A consumption a utility U ( y, A) = µn A − p AL null. But all purchasers of software B obtain an
positive utility U ( y, B) = µnB − pBN − (1 − y ) .
Therefore, number of legally users of software A is nA = xˆ + yˆ A , and the number of software
B-users is nB = (1 − xˆ ) + (1 − yˆ ) . Substituting x̂ , yˆ A , ŷ into those equations and then solving
simultaneously for nA and nB yields at the expressions of number users of software goods.
Those expressions are influenced by the software A mill price, they can be used to find out
the equilibrium mill price p AN * maximizing firm A’s profits. Thus, we determine equilibrium
D
discriminatory prices pBL * of firm B. When firms adopt the FOB-D prices system, equilibrium
prices and firms’ profit will be:
p AN * =
D
pBL * =
F
(2 µ − 1)
1
and p AL * = p AN * + Z − µn*A with Z = x, y and n*A = −
2(2µ − 3)
2( µ − 2)
(2 µ − 1)
µ
+Z +
and
2(2 µ − 3)
2( µ − 2)
π APP − FD = p AN * ( xˆ * + yˆ *A ) =
.1
1 − 2µ
4(µ − 2)(2 µ − 3)
.1
(16)
π BPP − FD = ∫ ˆ pBL * − (1 − x − µn*B ) dx + ∫ ˆ pBL * − (1 − y − µn*B ) dy =
. x*
D
. y*
16
D
(4µ − 7)2
2(µ − 2)2 (2 µ − 3)2
We may check that private purchasers get positive utility from software goods. Indeed, for
equilibrium value of prices, consumers’ surplus of software-users A and B, noted
PP
S FD
( yˆ A , A)
PP
S FD
( yˆ , B) ,
and
PP
S FD
( yˆ A , A) = µn*A − ∫
. yˆ *A
.0
p AN * + y dy =
are
positive.
The
1 + 13µ − 27 µ 2 + 18µ3 − 4µ4
(µ − 2)2 (2 µ − 3) 2
PP
( yˆ , B) =
values, and the second is S FD
first
expression
is
it is positive whatever µ
(7 − 4 µ)(16µ3 − 72µ2 + 88µ − 21)
it is positive for µ >
8( µ − 2) 2 (2 µ − 3)2
0,313.
When firms choose the D-FOB price system, they are placed in symmetric situation of
previous case and results are inversed. The software firm B becomes the price leader on
software markets.
Contrary to uniform pricing, lower prices equilibrium are the only stable equilibrium,
this equilibrium will appear in spite of the leader’s incitation to charge higher equilibrium
prices. This higher prices equilibrium is not sustainable because discriminatory firm
(follower) finds profitable to fix smaller prices. It will undercut leader’s prices, so its rival
firm will have to decrease its prices to remain attractive to consumers and protect its market
shares.
Effectively, with higher prices on professionals market the firm leader increase its profits
that become equal to (1 − µ) / 8 . It earn more profits than that it obtain in selling on both
consumer markets, professionals and private. A rapidly calculus give us π APP − FD −
and π BPP − DF −
1− µ
<0
8
1− µ
< 0 . The loss profits, due to loss private consumers, are overlapped.
8
However, discriminatory firm (follower) does not find profitable to increase prices as the
leader. It will loss its all private purchasers and so will earn lower profits of 9 /16 . A rapidly
calculus show that π APP − DF − (9 /16) > 0 and π BPP − FD − (9 /16) > 0 .
Software firms A and B are different objectives because the firm A sells more software on
private market than its rival B. Private consumers are more important for firm A than firm B.
In two previous sections, 4 and 5, we assumed that software firms choose the same
protection policy for their software. But others situations may arise, in which, for example, a
software firm protect its products while other do not protect it. In this case, the software
industry becomes partially protected. In the following section, we study this possibility.
17
6. EQUILIBRIUM PRICES IN PARTIALLY PROTECTED INDUSTRY
As viewed previously, the purchasing behaviors of professionals are not directly influenced
by protection policies of software firms, whereas those modify the choice of private
consumers. In the partially protected industry only firm protect its products. Consequently a
part of private consumers must buy software to use it. Thus, some private consumers pirate
software good while others buy it.
But, the price levels fixed by firms influence the choice of all potential consumers. We now
determine equilibrium prices for the four possible prices systems. At first, we rapidly recall
results of Shy and Thisse those are obtained in uniform price context, and then we analyze the
discriminatory pricing.
In the following, we assume that software firm A is more concerned about security problems
than its rival. This firm is the single firm who protect its products. All results will be
symmetric when in his turn firm B protect its products.
6.1. UNIFORM PRICING
When software firms A and B adopt uniform pricing, Shy and Thisse draw a distinction
between two possible (prices) equilibriums. Similarly to the analysis of protected industry
(sub-sections 5.1), in the first equilibrium some private consumers purchase the protected
software A because prices are small, whereas in the second equilibrium where the price of
software A is high neither private consumer buy software product. For those two prices
equilibriums, software firm B suffer from software piracy while software firm A do not suffer
from piracy thanks to its protection policy.
In the lower prices equilibrium, software firm A may sell at both professional and
private consumers. Next private consumers have to buy its products to use it, due to piracy
protections. Private buyers represent yˆ A = µnA − p AN customers out of all its customers.
Software B who is not interested in security problem, only sell at professional consumers. All
private users of its software are illegally users who are at the number of 1 − yˆ B = µnB . Those
illegally utilizations are loss of potential profits for software firm B.
The professionals’ demands of software A and B are x̂ and 1 − xˆ , given by the
equation (6). Therefore, the number of total users of software A is nA = xˆ + yˆ A and that of
software B’ users is nB = (1 − xˆ ) + (1 − yˆ B ) .
In order to maximize their profits, software firms will fix the equilibrium uniform
prices p AN * and pBN * and they will earn the following profits:
18
p
N*
A
3(2µ − 1)
16µ2 − 22 µ + 7
N*
=
et pB =
,
16 − 11
( µ − 1)(16µ − 11)
π APP − FF = p AN * ( xˆ * + yˆ *A ) =
π BPP − FF = pBN * (1 − xˆ * ) =
9(2µ − 1)(4µ − 3)
2(1 − µ)(16 µ − 11) 2
(8µ − 7)(16 µ2 − 22µ + 7)
2(1 − µ)(16 µ − 11) 2
(17)
Software firms will adopt those price levels for µ > 0.399. They do not find profitable to
deviate from this equilibrium charging higher prices.
In the high-price equilibrium, software firms only compete on the professional market
where professionals’ demand always are x̂ and 1 − xˆ . The pirate of software B always are at
the number of yˆ B . In this situation, where the numbers of users of software A and B are
nA = xˆ and nB = (1 − xˆ ) + (1 − yˆ B ) respectively, firms A and B will impose the prices p AN * and
pBN * which will maximize their profits:
p AN * =
µ2 − 6µ + 3
2µ2 − 6 µ + 3
et pBN * =
,
3(1 − µ)
3(1 − µ)
π
= p xˆ =
PP − FF
A
N* *
A
( µ2 − 6 µ + 3) 2
9(1 − µ)( µ2 − 4µ + 2)
π BPP − FF = pBN * (1 − xˆ* ) =
(2 µ2 − 6µ + 3)2
9(1 − µ)( µ2 − 4µ + 2)2
(18)
Firms will charge those price levels for values µ < 0.438. They prefer not derive from that
high price equilibrium in decreasing their prices.
Those results of Shy and Thisse, have been obtained in the uniform price context. We now
determine the influence of firms’ adoption of discriminatory pricing on price levels, when
software products are partially protected.
6.2. DISCRIMINATORY PRICING
When software firm A is the single firm to protect its products, it becomes a monopoly on the
private market. But in reality, it is in almost monopoly position. A priori, on this market the
software firm B can not compete with it. However, firm A is not free to fix the price level that
19
it wishes. Firm A is indirectly competed with the possible piracy of software B. Private
consumers may choose between to buy software A (at monopoly) and to pirate software B.
So, software firm A suffer from an indirect and illegally competition, which reduces its
market share monopoly. In order to consumers consider piracy as less attractive, firm A has to
decrease its price levels. Its objective is to capture a part of private customers in decreasing
prices until hackers’ costs. Pirates use the software B that is not their ideal variety of software
good, consequently they bear a utility loss (1 − y ) which is reduced by positive network
externalities µnB . Therefore, the real market boundary of software firm A is given by ŷ that
is the intersection point of its net marginal costs CmTA − µnA with the net utility loss of
hackers; it is the solution of equation y − µnA = (1 − y ) − µnB . Demands of professional and
private consumers of software A are xˆ = yˆ =
1 + µn A − µnB
.
2
Software firm B only sell at the 1 − xˆ professional consumers, and its software attracts
1 − yˆ B = µnB pirates. Thus, software A and B are used by n*A and nB* consumers, where
n*A = xˆ * + yˆ * =
2
1
and nB* = (1 − xˆ * ) + (1 − yˆ *B ) =
. The discriminatory pricing leads at
2−µ
2−µ
the following equilibrium prices and firms’ profits:
D
D
p AL * = 1 − z − µn*B et pBL * = z − µn*A , z = x, y ;
. xˆ*
π APP − DD = ∫ p AL * − ( x − µn*A ) dx + ∫
D
.0
.1
. yˆ *
.0
π BPP − DD = ∫ ˆ pBL * − (1 − x − µnB* ) dx =
D
. x*
D
p AL * − ( y − µn*A ) dy =
( µ − 1) 2
( µ − 2)2
2
( µ − 2) 2
(19)
For those equilibrium values, we check that all private consumers localized from 0 to
ŷ effectively buy the software A. Indeed, for values of µ such as µ > 0,275 they obtain the
PP
positive surplus S DD
( y, A) = µn*A − ∫
. yˆ *
.0
D
p AL * dy =
−4µ2 + 12µ − 3
. We also confirm that at these
2( µ − 2) 2
prices all private consumers localized from yˆ B to 1 will pirate software B. They derive from
PP
illegally utilisation of this software the positive S DD
( y, B ) .
Moreover, contrary to uniform price context in this discriminatory case the only stable
equilibrium is low-price equilibrium. Software A has never interest to sustain high-price
20
equilibrium. It will loss private customers and will make lower profits equal to
(2 µ − 1)2
( µ − 1)4
, whereas firm B’s profit will increase until
. These higher
(µ 2 − 4 µ + 2) 2
(2 − 4 µ + µ2 ) 2
prices increase profit margin of its rival B who exclusively sell at the professionals. So, in this
case software firm A will be able to increase its profit by sharply reducing its price and thus
attracting some private consumers. The war of prices will happen.
However, discriminatory prices may appear in others price systems as the asymmetric
price systems FOB-D and D-FOB. In these cases, software firms adopt different price
policies. We look for price equilibrium for various situations.
6.3. ASYMMETRIC PRICE SYSTEMS
When software goods are partially protected, the price policy chosen by firm A is the only one
price policy that influences the purchasing behavior of private consumers. Software firm B’s
decisions only influence behaviors of professional purchasers.
If the asymmetric price system FOB-D appears, the firm A impose uniform price at its
professional customers and private customers, whereas the rival firm B charge discriminatory
prices. In this case, the firm A becomes the price leader and firm B the follower. When firm B
chooses to not protect its software, this decision can be interpreted as the mean for it to fix
null prices for some consumers. This strategy has many consequences. The firm B’s laxness
modify indirectly the competition between firms on two consumers market, professional and
private. Thanks to network effects, this firm B artificially increases the total number of users
of its software, and so, artificially increases professionals’ demand of software B.
Moreover, software firm A can not earn the monopoly profit on private market in spite of the
fact that it is the single firm on it. Firm A suffer from indirect and illegally competition,
because when private consumers want to use software they have the choice between to buy
software A and pirate software B. Software firm A will sell at the private consumers if its net
F
full price, p AL * − µnA , is less than consumers’ utility loss that consumers bear when pirate
software B. So the potential private market share of software firm A is delimited by ŷ , that is
F
the solution of following equality: p AL * − µnA = (1 − y ) − µnB ⇔ p AN + y − µn A = (1 − y ) − µnB .
However, firm A will solely sell at the private consumers localized from 0 to yˆ A ( yˆ A p yˆ ),
who derive a positive utility, U ( y, A) = µnA − y − p AN , from consumption of software A. In
private market software firm B merely attract hackers that derive the positive utility
U ( y, B) from using of its software. Those pirates are localized from yˆ B to 1.
21
Due to the fact that professionals’ demands of unprotected software and protected software
are identical, the expressions x̂ and 1 − xˆ are given once again by equation (10). The total
number of users of software A and B are nA = xˆ + yˆ A and nB = (1 − xˆ ) + (1 − yˆ B ) .
When the asymmetric price system FOB-D is adopted, software firms fix equilibrium
prices, p AN * and pBL* , and earn following profits:
p AN * =
n*A =
F
2µ − 1
and p AL * = p AN * + Z − µn*A , Z = x, y and
2(4µ − 3)
D
1
, pBL * = p AN * + x − µn*A ;
4(1 − µ)
π APP − FD = p AN * ( xˆ * + yˆ *A ) =
(2 µ − 1)
8(1 − µ)(4 µ − 3)
.1
π BPP − FD = ∫ ˆ pBL* − CmTB − µn*B dx =
. x*
(8µ − 7) 2
16(4µ − 3)2
(20)
For low-price equilibrium, it can now be easily verified that all private consumers localized
from 0 to yˆ A effectively buy software A. Indeed, for all values of µ they obtain form their
purchase the positive surplus
PP
( y, A) = µ n*A − ∫
S FD
. yˆ *A
.0
that
pirate utility
.1
*
p AN + y dy =
U ( y, B )
PP
S FD
( y, B ) = µnB* − ∫ * 1 − y dy =
. yˆ B
−128µ 4 + 296µ 3 − 221µ 2 + 48µ + 4
. We also may check
32( µ − 1) 2 (4µ − 3)2
becomes null at
the
yˆ *B
and that
pirate surplus
(7 − 8µ)(40 µ2 − 63µ + 24)
is positive from yˆ *B to 1.
32( µ − 1)2 (4 µ − 3) 2
When the asymmetric price system D-FOB is adopted, software A sells again at both
professional consumers and private consumers, but in this case it choose discriminatory
pricing, while software B charge uniform prices. Software firm B sells again uniquely at
professional consumers and becomes the price leader. Once more this firm modifies the
nature of the competition between firms; because it lets private consumers pirate its software.
All private consumers choose the cheaper software (legally or illegally) in term of loss utility.
So, firm A have to decrease its discriminatory prices until level of the privates’ costs that they
bear in pirating software B. This once, firm A will sell at all potential private consumers, and
its market share are demarcated from 0 to ŷ , solution of equality: y − µnA = 0 + (1 − y ) − µnB .
The
number
of
software-A
and
software-B
22
users
becomes
nA = xˆ + yˆ
and
nB = (1 − xˆ ) + (1 − yˆ B ) . Contrary to protected industry, software firms are not placed in
symmetric situation that of FOB-D. Indeed, firm B impose following prices:
pBN * =
(2 µ − 1)
on professional market ( pBN * = 0 for private users thanks to piracy), and so full
µ−2
F
prices are pBL * = pBN * + (1 − Z ) − µnB* , where Z = x, y and nB* =
D
1
. Firm
2(2 − µ)
A charge
F
p AL * = pBL * on both private markets and professional markets. Firms’ profits are:
π BPP − DF = pBN * (1 − xˆ ) =
. xˆ
( µ − 1)(2 µ − 1)
2( µ − 2) 2
. yˆ
(21)
π APP − DF = ∫ p AL * − ( x − µn*A ) dx + ∫ p AL * − ( y − µn*A ) dy =
.0
D
D
.0
(2 µ2 − 2µ + 13)
4(µ − 2) 2
The possible hacking of software B is the means of private consumers (y) to buy it at the null
prices.
We may confirm that private consumers localized from 0 to ŷ will buy effectively software A
PP
because for µ > 0,269, they derive from their purchase the positive surplus S DF
( y, A) . We as
well can check that piracy is profitable for private consumers localized at the right of yˆ *B
PP
( y, B ) .
because they obtain from illegally utilization the positive surplus S DF
In contrast to the uniform pricing FOB-FOB, the asymmetric price systems FOB-D
and D-FOB lead at the single price equilibrium, which is enough low to allow at the private
consumers to buy software A. The high price equilibrium is unstable equilibrium. Indeed, it is
in the interest of software firm A to sustain low-price equilibrium because private customers
are very important for it. If prices level is too much higher, firm A will loss these private
consumers and will earn smaller profit that become equal to
(2 µ − 1)2
for µ > 0,4,
4(1 − µ)( µ2 − 4µ + 2)
(3 − 6 µ + µ2 ) 2
, when it is follower. Firm A finds more
when it is leader, or equal to
4( µ2 − 4 µ + 2) 2
profitable to sell at the two categories of consumers. Therefore, it will undercut rival’s high
prices. But software firm B will make more profit if it can sustain higher price equilibrium.
( µ − 1)3
Effectively, with the increase of prices it earns
when it is leader, and earns
4(4 µ − µ2 − 2)
23
(2µ2 − 6 µ + 3) 2
when it is follower. This increase of its profits is due to the fact that it does
4( µ2 − 4 µ + 2) 2
not suffer from large loss of customers because it only sells on professional consumers.
After the determination of price levels for each industry type (unprotected, protected
and partially protected) we now look for the strategic choices of software firms. Which is the
optimal price policy for software firms? Which is the optimal degree of protection of
software?
7. FIRMS’ STRATEGIC CHOICES AND THEIR IMPACTS
Shy and Thisse studied the protection policy of software firms with the assumption that firms
use uniquely uniform pricing. In the actual computer industry where the Internet is more and
more used by consumers, will the uniform pricing be chosen by software firms? If it is not
verified, will the policy of protection be again unprofitable to software firms?
7.1 THE PRICING CHOICE
In this paper, we assumed that software firms have the choice between uniform pricing
(FOB) and discriminatory pricing (D) at the second stage of the game. So, four price systems
may arise: the uniform FOB-FOB, the discriminatory D-D and the both asymmetric FOB-D
and D-FOB. Software firms will choose the pricing that will generate greater profits
according to behaviors of their rival. We determine their decisions with simple comparisons
of potential payoffs gained by these firms.
Whatever the protection policy adopted by firms at the first stage of the game, the
analysis of the payoff matrix of the second stage shows that price discrimination is the
equilibrium strategy; details of this analysis are available in the appendix B.
Indeed, in each sub-game, software firms will systematically adopt discriminatory prices. It is
a dominant strategy when firms implement no protection, protection and partially protection.
Consequently, the discriminatory price system D-D appears as the Nash equilibrium for these
third sub-games. In unprotected industry, software firms A and B will earn profits π APP − DD and
π BPP − DD that equal to 1/4, given by (9). In protected industry, they will obtain higher profits,
π APP − DD and π BPP − DD , that equal to ½, given by (14). In partially protected industry, software A
gains intermediate profit level π APP − DD , whereas firm B, who do not protect its software, earns
the most lower profits π BPP − DD , given in the equation (19).
24
We now look for the protection choice of software firms who use discriminatory
prices.
7.2 THE PROTECTION CHOICE OF SOFTWARE FIRMS AND ITS IMPACTS
In the uniform price context, Shy and Thisse show that software firms do not find profitable to
implement piracy protections due to the network effects. But the recent development on the
web makes discriminatory policy easier for software firms.
Is the discriminatory pricing choice a means to better protect software product? Is the piracy
protection policy an optimal strategy for software firms?
As Shy and Thisse we assumed that software firms can choose between two protection
policies, either it protect their software against piracy (strategy noted P ) or, al contrary, it do
not protect their products ( P ). So, third industry types may arise: the unprotected
industry ( P , P ) ,
the
protected
industry
( P, P )
and
partially
protected
industries
( P, P ) ; ( P , P) . For various situations, the analysis of the payoff matrix of software firms A
and B yields at the following results, this analysis is detailed in the appendix C.
Whatever the importance of the network size to a software user, either for law values
of µ (µ < 0.399) or for large values of µ (µ > 0.43), each software firms will adopt
systematically the protection strategy. The single sub-game perfect equilibrium is ( P, P )
where all software firms protect their software. Contrary to uniform pricing, the
discriminatory pricing make protections again profitable to software firms. Therefore, when
we take into account the discrimination strategy we obtain results that are different at the one
of Shy and Thisse.
Indeed, for values µ > 0,2765 Shy and Thisse obtain indeterminate result, because two
equilibriums may exist. When network effects are moderate (0,2765 < µ < 0,399), Shy and
Thisse show that asymmetric protection policies ( P, P ) and ( P , P ) are the equilibriums, in
which one firm protects its software and the other does not.
For stronger network effects µ>0.43, Shy and Thisse show that two other equilibriums may
arise: ( P , P ) or ( P, P) , where both firms protect or both refrain from protecting their
software. For this authors, it is reasonable to assume that unprotected equilibrium ( P , P ) will
prevail, because this equilibrium will yield strictly higher profits to both firms than ( P, P) .
The work of Shy and Thisse (1999) provides a strategic reason why the use of
software protection has declined since the mid-1980s. The reason is that a larger number of
users increases the utility of software. Thus, each firm can increase the competitive value of
25
its software by not protecting it. Alternatively, each firm can protect its software by reducing
the number of users to the number of buyers, and so making its software less attractive. Their
analysis show that an industry totally protected is not the Nash equilibrium of the game where
firms not cooperatively choose their protection policy.
Our results are inversed when firms are the possibility of discriminate between
consumers. The discrimination makes software protections again profitable. This result may
explain the recent interest of software firms for policies against piracy.
So, the use of discriminatory prices appears more profitable for software firms. But
before concluding this paper, we look for if discrimination is beneficial to consumers. Is the
selling of protected software (at the discriminatory prices) socially beneficial?
7.3 THE IMPACTS OF THE SELLING PROTECTED SOFTWARE ON WELFARE
Thanks to discriminatory pricing software firms can better protect their software
product against the piracy, while consumers benefit from an increase of their surplus.
Consumers more prefer to buy protected software at the discriminatory prices than to buy
unprotected software at the uniform prices. Moreover the discriminatory pricing also increase
the social welfare.
Indeed, when firms adopt uniform pricing and the net work effects are moderate,
0,2765 < µ < 0,399, Shy and Thisse show that firms will adopt opposed protection polices
( P, P ) or ( P , P) . When firms take these decisions, consumers obtain the surplus level2
µ3 (12 µ4 + aµ3 + bµ2 + cµ + d ) + eµ2 + fµ + 72σ − 90
,
18(µ − 1)2 ( µ2 − 4µ + 2)2
whereas
when
both
firms
use
discriminatory prices and choose to protect their software, consumers obtain the higher
surplus 2σ + 6µ − 5 / 4 .
Furthermore, when network effects are stronger such as µ>0.43, Shy and Thisse show
that two situations may arise: either firms protect their software ( P, P) or neither firms protect
software ( P , P ) .
In
this
two
situations,
the
total
consumer
surplus3
is
4σ − 8σ µ + 4σ µ2 + 24µ − 18µ2 − 7
gµ4 + hµ3 + iµ2 + jµ + 100σ − 139
and
respectively. When
4( µ − 1) 2
4( µ − 1) 2 (8µ − 5) 2
firms discriminate between consumers, the consumers’ surplus increases and becomes again
higher 2σ + 6µ − 5 / 4 .
2
3
Où a = (18σ − 159) , b = (812 − 180σ ) , c = (666σ − 2023) , d = (2646 − 1152σ ) , e = (1008σ − 1845) , f = (648 − 432σ ) .
Où g = 256σ − 640 , h = 18246 − 832σ , i = 996σ − 1898 , j = 852 − 520σ .
26
The discriminatory pricing increases firms’ profit and consumers’ surplus, so this pricing
increase social welfare. This price policy is socially beneficial because software firms and
consumers benefit from its utilization.
8. CONCLUSION
The analysis of Shy and Thisse (1999) allows explaining the fact that since the mid1980s software firms have gradually removed protection against copying. They had shown
that the piracy protections have not been profitable for software firms. When the market
expands and competition intensifies software firms have strategic incentives to remove
protection. Indeed, with this decision they increase the total number of software users because
not only legally purchasers can use software goods, and due to the strong network effects the
legal demand increase.
However, since the early 2000s, the recent development of the Web allows at software
firms more easily to use the discriminatory pricing. Thanks to this new media of distribution
software firms can adopt discriminatory prices with lower costs.
In this paper, we show that price discrimination allows software firms to protect their
software again because piracy protections become again profitable. Our work may explain the
new software firms’ interest for the protection practices. Indeed, in order to obtain the
trustworthy computer industry, in the 1999s Microsoft and important software firms set up a
consortium with microprocessor makers (Intel and AMD) and with PC hardware makers
(IBM, HP, Compaq). This alliance is the “Trusted Computing Platform Alliance”, TCPA,
which promotes a new computing platform that will spot and disable both pirated software
and pirated songs or videos.
Software firms can use price discrimination as a defensive strategy against aggressive
consumers, the hackers. This reason of its use is very different from this traditionally
suggested in the study of the discrimination. Indeed, firms do not want to earn a part of the
consumer surplus or to increase rival's cost, but they only want to protect their software
against piracy. In software industry, price discrimination is not necessarily an aggressive
strategy. Our work aims to illustrate one other of the classical explanations for which firms
adopt discriminatory prices in the oligopolistic markets. Price discrimination is not
systematically harmful or beneficial strategy for consumers or for rival firms. Discriminatory
27
pricing is only a management strategy. What is important, it is the way in which firms use it.
The impacts of this strategy depend on firms' reasons of its adoption.
28
Appendix
Appendix A: The timing of the game
1st stage: The protection policy choice of software firms A and B
Decision of software firm A
P
NP
Decision of software firm B
P
NP
P
NP
2nd Stage: the pricing choice
Decision of firm A
D
FOB
D
FOB
D
FOB
D FOB
Decision of firm B
D
FOB D
FOB
D
FOB
D
FOB D FOB D FOB D FOB
3rd stage: Determination of equilibrium software prices type A and B
4th stage: The purchasing choice of consumers
29
Appendix B: the pricing choice of software firms
Price discrimination is an dominate strategy for software firms, the system price (D,D) is the
Nash equilibrium of the sub-game, whatever the protection policy that is adopted by firms.
Indeed, in the unprotected industry ( P , P ) with values of µ such as 0.5>µ>0 the payoff matrix
is:
AB
FOB
1 − 2µ
2(1 − µ)
FOB
D
2µ − 1
8( µ − 1)
1 − 2µ
2(1 − µ)
9
16
9
16
D
1
4
2µ − 1
8( µ − 1)
As the inequalities are verified
9
> 1 − 2µ
16 2(1 − µ)
et 1 >
4
1
4
2µ − 1
,
8( µ − 1)
so the nash equilibrium is (D,D), where
software firms sell their products at the discriminatory prices.
In the case of the protected industry ( P, P) , the payoff matrix of software firms
becomes with strong network effects and with weak network effects respectively:
When 0.5>µ>0.438
A
B
When 0.399>µ>0
FOB
D
(2 µ − 1)(4 µ − 3)
2µ − 1
4(2 − µ)(2 µ − 3)
2(1 − µ)(8 µ − 5)2
F
O
B
(2 µ − 1)(4 µ − 3)
2(1 − µ)(8 µ − 5)
2( µ − 2) 2 (2 µ − 3) 2
1
2
2( µ − 2) (2 µ − 3)
2
>
1− µ
2
, as well as
2µ − 1
4(2 − µ)(2 µ − 3)
1− µ
2
(4 µ − 7)2
2( µ − 2) 2 (2 µ − 3) 2
D
1
2
As the following inequalities are verified:
2
1
2
D
1− µ
2
2( µ − 2) 2 (2 µ − 3) 2
2µ − 1
4(2 − µ)(2 µ − 3)
(4 µ − 7)2
FOB
F
O
B
(4 µ − 7)2
2
(4 µ − 7)2
D
A
B
>
2µ − 1
4(2 − µ)(2 µ − 3)
(4 µ − 7)2
2
2( µ − 2) (2 µ − 3)
2µ − 1
4(2 − µ)(2 µ − 3)
2
>
(2 µ − 1)(4 µ − 3)
2(1 − µ)(8 µ − 5)2
(4 µ − 7)2
2( µ − 2) 2 (2 µ − 3) 2
1
2
1
2
and
, consequently (D,D) will be the single Nash
equilibrium, where both software firms choose to sell their software with discriminatory
prices.
30
In the case of partially protected industry ( P, P ) , the payoffs matrix of firms becomes
with strong network effects and with weak network effects respectively:
when 0.5>µ>0.438
A
B
FOB
D
2(1 − µ)(16µ − 11)
2
16(4 µ − 3)
2(1 − µ)(16µ − 11)2
F
O
B
( µ − 2)
2
9(1 − µ)( µ − 4 µ + 2)
2µ − 1
8(1 − µ)(4µ − 3)
(8µ − 7) 2
16(4 µ − 3) 2
9(1 − µ)( µ 2 − 4 µ + 2) 2
2
2 µ2 − 2 µ + 13
4( µ − 2)
D
( µ − 1)2
( µ − 2)
2( µ − 2)2
2
( µ 2 − 6 µ + 3) 2
2
( µ − 1)(2 µ − 1)
D
2
2
2
2 µ2 − 2 µ + 13
4( µ − 2)
FOB
( µ 2 − 6 µ + 3) 2
(8µ − 7) 2
(2 µ − 1)(8 µ − 7) 2
D
A
B
2µ − 1
8(1 − µ)(4µ − 3)
9(8µ2 − 10 µ + 3)
F
O
B
when 0.399>µ>0
( µ − 2) 2
2
( µ − 1)2
( µ − 1)(2 µ − 1)
2
( µ − 2) 2
2( µ − 2)2
Direct calculations from previous matrix give us the following inequalities
2 µ2 − 2 µ + 13
4( µ − 2)2
>
9(8µ2 − 10 µ + 3)
2(1 − µ)(16µ − 11)2
( µ − 1)2
( µ − 2)
> ( µ − 1)(2µ 2− 1) et
2
2( µ − 2)
;
2
( µ − 2)
2 µ2 − 2 µ + 13
4( µ − 2)2
>
2
>
2µ − 1
8(1 − µ)(4µ − 3)
;
(8µ − 7) 2
16(4 µ − 3) 2
( µ 2 − 6 µ + 3) 2
9(1 − µ)( µ 2 − 4 µ + 2) 2
;
>
(2 µ − 1)(8 µ − 7) 2
2(1 − µ)(16µ − 11)2
(8µ − 7) 2
>
16(4 µ − 3) 2
;
( µ 2 − 6 µ + 3) 2
9(1 − µ)( µ 2 − 4 µ + 2) 2
So we may claim that the only equilibrium of this sub-game is the discriminatory price system
(D,D)
Appendix C: The protection policy choice of the software firms
In the first stage, where firms choose their own protection policy, the perfect sub-game
equilibrium is ( P, P) where both firms protect their software. For all values of µ, the payoff
matrix of firms is:
AB
NP
NP
P
1
4
( µ − 1)
2
( µ − 2) 2
2
1
4
( µ − 2) 2
2
P
1
2
( µ − 2) 2
1
2
( µ − 1)2
( µ − 2)
2
We obtain from the previous matrix the following inequalities:
2
( µ − 2)
2
> 1 and
4
1
2
2
> ( µ − 1) 2 . So,
( µ − 2)
we can confirm that protection strategy is a dominate strategy, and (P,P) is single equilibrium
of our multi-stages game.
31
REFERENCES:
-HOTELLING, H. 1929, Stability in competition, Economic Journal, Vol 39, pp 41-57
-HURTER, A., and P. LEDERER, 1985, Spatial duopoly with discriminatory pricing, Regional Science and
Urban Economics, Vol 15, pp 541-53.
-PHILPS, L. 1983, The economics of price discrimination, Cambrige University Press.
-SHY, O. and J. THISSE, 1999, A strategic approach to software protection, Journal of Economics and
Management Strategy, Vol 8, 2, pp 163-190
-SLIVE, J. and D. BERNHARDT, Pirated for profit, Canadian Journal of Economics, Vol. 31, 4, pp 887-899
-ROBERT, M. 2003, The Competitive and Welfare Effects of Third-Degree Price Discrimination in Systems
Markets: An Efficiency Pro-competitive Policy " The 18th Annual Congress of the European Economic
Association (EEA), Stockholm, Sweden, August 20-24.
-THISSE, J., and X. VIVES, 1988, On The Strategic Choice of Spatial Price Policy, American Economic
Review, Vol 78, pp 122-137.
-THISSE, J., and X. VIVES, 1992, Basing point pricing: Competition versus collusion, The journal of industrial
economics, Vol XL, pp 249-260.
32