Preview

Moscow University Economics Bulletin

Advanced search

The Impact of Piracy and Technical Protection of Results of Intellectual Activity on Social Welfare

https://doi.org/10.38050/01300105201714

Abstract

The article reflects the main aspects that should be taken into account in developing and changing the regulation of intellectual property sphere. Being harmful in some aspects, piracy also has a number of properties that can be useful for copyright owners: information, network and indirect effects. The paper presents a mathematical model showing the case where the protection of intellectual activity result can cause more damage to public welfare than piracy itself. The findings show a need for tools more flexible than the intellectual property system so that every copyright owner can choose the required level of protection.

About the Authors

A. A. Morosanova
Lomonosov MSU; Ranepa under the RF President
Russian Federation


A. I. Meleshkina
Lomonosov MSU; Ranepa under the RF President
Russian Federation


References

1. Федеральный закон от 2 июля 2013 г. № 187-ФЗ г. Москва «О внесении изменений в отдельные законодательные акты Российской Федерации по вопросам защиты интеллектуальных прав в информационно-телекоммуникационных сетях».

2. Федеральный закон от 24 ноября 2014 г. № 364-ФЗ «О внесении изменений в Федеральный закон «Об информации, информационных технологиях и о защите информации» и Гражданский процессуальный кодекс Российской Федерации».

3. Комкова А. А., Курдин А. А. Влияние цифрового пиратства на рыночные стратегии в сфере программного обеспечения // Экономическая политика. - 2014. - № 6. - С. 54-75.

4. Крючкова П. В., Авдашева С. Б. Государственный и частный инфорсмент законодательства при риске ошибок I рода: выбор для России // Журнал новой экономической ассоциации. - 2013. - Т. 15. - No 3. - С. 114-140.

5. Шаститко А., Курдин А., Комкова А. Как защитить результаты интеллектуальной деятельности [How to protect intellectual property] // Общественные науки и современность. - 2014. - № 2. - С. 17-33.

6. Bae S.-H., Choi J. P. A Model of Piracy // Information Economics and Policy. - 2006. - 18. - P. 303-320.

7. Belleflamme P. Pricing Information Goods in the Presence of Copying. In: Gordon W. J., Watt R. (Eds.), The Economics of Copyright. Developments in Research and Analysis, Edward Elgar, 2003.

8. Chen Y., Venkatesan R., Cary M., Pang R., Sinha S., Jakubowski M. Oblivious. Hashing: A Stealthy Software Integrity Verification Primitive, Proc. 5th Information Hiding Workshop (IHW), Netherlands (October 2002), Springer LNCS 2578. 2002. - P. 400-414. URL: https://www.microsoft.com/en-us/research/ wp-content/uploads/2016/02/chen02oh.pdf

9. Chow S., Eisen P., Johnson H., van Oorschot P. C. White-Box Cryptography and an AES Implementation. - Р. 250-270, Proc. 9th International Workshop on Selected Areas in Cryptography (SAC 2002), Springer LNCS 2595 (2003). URL: https://www.cs.colorado.edu/~jrblack/class/csci7000/s05/project/oorschot-whitebox.pdf

10. Collberg C., Thomborson C., Low D. A Taxonomy of Obfuscating Transformations // Technical Report 148, Dept. Computer Science, University of Auckland (July 1997). URL: https://researchspace.auckland.ac.nz/bitstream/handle/2292/3491/TR148.pdf

11. Creative Commons, 2016. URL: https://creativecommons.org/licenses/?lang =ru

12. Graham P. Hackers & Painters: Big Ideas from the Computer Age. O’Reilly Media, 2009.

13. Grice C. and Junnarkar S. Gates, Buffett a Bit Bearish, CNET News, 1998.

14. Liebowitz S. Copying and Indirect Appropriability: Photocopying of Journals // Journal of Political Economy. - 1985. - 93. - P. 945-957.

15. MacInnes I., Kongsmak K., Heckman R. (2005) Impediments to Digital Distribution for Books and Software // JMM - The International Journal on Media Management. - 2014. - № 7. - Р. 75-85.

16. Main A., van Oorschot P. C. Software Protection and Application Security: Understanding the Battleground?, Dec. 31, 2003. URL: http://people.scs. carleton.ca/~paulv/papers/softprot8a.pdf

17. Mussa M., Rosen S. Monopoly and Product Quality // Journal of Economic Theory. - 1978. - 18. -P. 301-317.

18. Novos I. E., Waldman M. The Effects of Increased Copyright Protection: An Analytic Approach // Journal of Political Economy. - 1984. - 92. - P. 236-246.

19. Open Source Initiative, 2016. URL: https://opensource.org/

20. Shamir A., van Someren N. Playing hide and seek with stored keys, 1998. URL: http://hawaii.ms11.net/keyhide2.pdf

21. Takeyama L. N. Piracy, Asymmetric Information and Product Quality. In: W. J. Gordon and R. Watt (eds.): The Economics of Copyright. Develop ments in Research and Analysis, Edward Elgar. Varian, H. R. (1980). A Model of Sales // American Economic Review. - 2003. - 70. - P. 651-659.

22. The Free Software Foundation, 2016. URL: http://www.fsf.org/

23. Wang C., Hill J., Knight J., Davidson J. Software Tamper Resistance: Obstructing Static Analysis of Programs // Dept. of Computer Science, Univ. of Virginia, Tech. Report CS-2000-12 (May 2000). URL: http://profs.sci.univr.it/~giaco/ download/Watermarking-Obfuscation/wang00software.pdf

24. Watt R. Indirect Appropriability 20 years on // Review of Economic Research on Copyright. - 2005. - Is. 2. - P. 1-4.

25. Wilson R., Wilson S. (2005) Creative Commons And Open Content. URL: http://oss-watch.ac.uk/resources/cclicensing on 20 July 2005, last updated 9 September 2013.

26. Yoon K. The Optimal Level of Copyright Protection // Information Economics and Policy. - 2002. - 14. - P. 327-348.


Review

For citations:


Morosanova A.A., Meleshkina A.I. The Impact of Piracy and Technical Protection of Results of Intellectual Activity on Social Welfare. Moscow University Economics Bulletin. 2017;(1):62-85. (In Russ.) https://doi.org/10.38050/01300105201714

Views: 345


Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.


ISSN 0130-0105 (Print)