Author List: August, Terrence; Tunca, Tunay I.;
Information Systems Research, 2008, Volume 19, Issue 1, Page 48-70.
We study the question of whether a software vendor should allow users of unlicensed (pirated) copies of a software product to apply security patches. We present a joint model of network software security and software piracy and contrast two policies that a software vendor can enforce: (i) restriction of security patches only to legitimate users or (ii) provision of access to security patches to all users whether their copies are licensed or not. We find that when the software security risk is high and the piracy enforcement level is low, or when tendency for piracy in the consumer population is high, it is optimal for the vendor to restrict unlicensed users from applying security patches. When piracy tendency in the consumer population is low, applying software security patch restrictions is optimal for the vendor only when the piracy enforcement level is high. If patching costs are sufficiently low, however, an unrestricted patch release policy maximizes vendor profits. We also show that the vendor can use security patch restrictions as a substitute to investment in software security, and this effect can significantly reduce welfare. Furthermore, in certain cases, increased piracy enforcement levels can actually hurt vendor profits. We also show that governments can increase social surplus and intellectual property protection simultaneously by increasing piracy enforcement and utilizing the strategic interaction of piracy patch restrictions and network security. Finally, we demonstrate that, although unrestricted patching can maximize welfare when the piracy enforcement level is low, contrary to what one might expect, when the piracy enforcement level is high, restricting security patches only to licensed users can be socially optimal.
Keywords: economics of IS; IT policy and management; IT security; network economics; software piracy
Algorithm:

List of Topics

#201 0.271 piracy goods digital property intellectual rights protection presence legal consumption music consumers enforcement publisher pirate producers policies copyright provision profits
#22 0.240 software vendors vendor saas patch cloud release model vulnerabilities time patching overall quality delivery software-as-a-service high need security vulnerability actually
#73 0.174 security threat information users detection coping configuration avoidance response firm malicious attack intrusion appraisal countermeasures benefit costs threats ability rate
#5 0.165 consumer consumers model optimal welfare price market pricing equilibrium surplus different higher results strategy quality cost lower competition firm paper
#74 0.092 high low level levels increase associated related characterized terms study focus weak hand choose general lower best predicted conditions implications