Font Size: a A A

Economic Analysis Of The Software Intellectual Property Protection

Posted on:2012-06-15Degree:MasterType:Thesis
Country:ChinaCandidate:J LinFull Text:PDF
GTID:2166330332990161Subject:Western economics
Abstract/Summary:PDF Full Text Request
The rapid development of information technology, greatly boost economy of all countries and districts. But compare to the vigorous growth of computer hardware industry, the software industry seems a little bit sluggish. The reason is not lack of talents or technologies, but the infested piracy. The software industry plays a decisive role in national economy, so how to stop the piracy phenomenon and ensure its sound development are what we concerned.This thesis, from a point of view of the economic, analyzed the characteristic of the software industry and problems of property protection, established mathematical models to try to find reasonable explanation. Chapter 1 introduced the history of software intellectual property protection. Then Chapter 2 reviewed current research situation both at home and abroad. Chapter 3 established multilevel market models which have network external effect or conversion cost characteristic, to describe the strategy change of manufacturers. Chapter 4 combined current market welfare with expected innovation welfare, try to discuss the relationship between whole social welfare and government protection; Then established a two level markets model to describe manufacturer's strategies about second innovation release time, and fractionally discussed the relationship between whole social welfare and valid protection length.This thesis applied micro-economics theory and meth, established mathematical models which can simulate software market with some kind characteristic, in order to describe manufacturer's behavior, to research software protection altitude and valid protection length. All of these improved the comprehension of the software intellectual property protection problem.
Keywords/Search Tags:Software Intellectual Property, Network Externalities, Lock in Effect, Length of Protection
PDF Full Text Request
Related items