References
- Ben-Shahar, D. and Jacob, A. (2004) Selective enforcement of copyright as an optimal monopolistic behavior, Contributions to Economic Analysis and Policy, 3, 12–29.
- Coase, R. H. (1972) Durability and monopoly, The Journal of Law and Economics, 15, 143–9. doi:10.1086/466731
- Conner, R. K. and Rumelt, R. P. (1991) Software piracy: an analysis of protection strategies, Management Science, 37, 125–39. doi:10.1287/mnsc.37.2.125
- Gayer, A. and Shy, O. (2003) Internet and peer-to-peer distributions in markets for digital products, Economics Letters, 81, 197–203. doi:10.1016/S0165-1765(03)00170-8
- Grossman, G. M. and Shapiro, C. (1988a) Counterfeit-product trade, The American Economic Review, 78, 59–75.
- Grossman, G. M. and Shapiro, C. (1988b) Foreign counterfeiting of status goods, The Quarterly Journal of Economics, 103, 79–100. doi:10.2307/1882643
- Minniti, A. and Vergari, C. (2010) Turning piracy into profits: a theoretical investigation, Information Economics and Policy, 22, 379–90. doi:10.1016/j.infoecopol.2010.06.001
- Peitz, M. and Waelbroeck, P. (2006) Piracy of digital products: a critical review of the theoretical literature, Information Economics and Policy, 18, 449–76. doi:10.1016/j.infoecopol.2006.06.005
- Takeyama, L. N. (1994) The welfare implications of unauthorized reproduction of intellectual property in the presence of demand network externalities, The Journal of Industrial Economics, 42, 155–66. doi:10.2307/2950487