Digital Rights Management and the Pricing of Digital Products Yooki Park and Suzanne Scotchmer...

21
Digital Rights Management and the Pricing of Digital Products Yooki Park and Suzanne Scotchmer Workshop on the Economics of Information Security KSG, Cambridge, MA June 2, 2005

Transcript of Digital Rights Management and the Pricing of Digital Products Yooki Park and Suzanne Scotchmer...

Page 1: Digital Rights Management and the Pricing of Digital Products Yooki Park and Suzanne Scotchmer Workshop on the Economics of Information Security KSG, Cambridge,

Digital Rights Management and the Pricing of Digital Products

Yooki Parkand

Suzanne Scotchmer

Workshop on the Economics of Information Security

KSG, Cambridge, MAJune 2, 2005

Page 2: Digital Rights Management and the Pricing of Digital Products Yooki Park and Suzanne Scotchmer Workshop on the Economics of Information Security KSG, Cambridge,

Outline of Talk

• DRM: A circumvention hypothesis• The price-moderating effect of the circumvention

threat: – The Monopoly Case

– The Duopoly Case

• Will vendors make the optimal choice to share?• Cost-Sharing and Independent Pricing• Collusion through Technology

Page 3: Digital Rights Management and the Pricing of Digital Products Yooki Park and Suzanne Scotchmer Workshop on the Economics of Information Security KSG, Cambridge,

• A Circumvention Hypothesis:DRM sets the cost of circumvention (but does not protect in any absolute sense)Mass circumvention (internet) is detectable, avoidable.

• The conceit in this paper:Content will eventually be given away for free (unprotected) but the ability to “render” it is protected.

• Business Models: Who sells the ability to “render,” and what is the relationship with the content provider? Third party? Self? How is the cost of protection covered, and how does it relate to payments for content?

We consider a wholly owned subsidiary.

Page 4: Digital Rights Management and the Pricing of Digital Products Yooki Park and Suzanne Scotchmer Workshop on the Economics of Information Security KSG, Cambridge,

Outline of Talk

• A circumvention hypothesis• The price-moderating effect of the circumvention

threat: – The Monopoly Case

– The Duopoly Case

• Will vendors make the optimal choice to share?• Cost-Sharing and Independent Pricing• Collusion through Technology

Page 5: Digital Rights Management and the Pricing of Digital Products Yooki Park and Suzanne Scotchmer Workshop on the Economics of Information Security KSG, Cambridge,

Monopoly: the price-reducing effect of a threat of circumvention

p*

Reducing the price from the monopoly price has no effect on revenue, but reduces the cost of protection.

Model: e = strength of protection = cost of circumventionCost of protection = K(e) No-hacking constraint: p ≤ e

Page 6: Digital Rights Management and the Pricing of Digital Products Yooki Park and Suzanne Scotchmer Workshop on the Economics of Information Security KSG, Cambridge,

Welfare Implications of DRM

• DRM might increase profit and consumer welfare. Protection may last longer, but DRM is costly.With equal total revenue, less DWL:

p

x(p)

p*

x(p*)

p

p

x(p)

p*

x(p*)

p

~ ~

~~

Page 7: Digital Rights Management and the Pricing of Digital Products Yooki Park and Suzanne Scotchmer Workshop on the Economics of Information Security KSG, Cambridge,

Outline of Talk

• A circumvention hypothesis• The price-moderating effect of the circumvention

threat: – The Monopoly Case

– The Duopoly Case

• Will vendors make the optimal choice to share?• Cost-Sharing and Independent Pricing• Collusion through Technology

Page 8: Digital Rights Management and the Pricing of Digital Products Yooki Park and Suzanne Scotchmer Workshop on the Economics of Information Security KSG, Cambridge,

Pricing with DRM

• Comparisons

C

Legal Enforcement

Separate DRM

Shared DRM

Independent pricing

Î I

Joint pricing C J

I I I, ,~

Assume: The no-hacking constraint with shared protection p1+p2 ≤ e .

Page 9: Digital Rights Management and the Pricing of Digital Products Yooki Park and Suzanne Scotchmer Workshop on the Economics of Information Security KSG, Cambridge,

p1(p2,t)

p2(p1,t)

p2

p1

Suppose that the “own” second derivative is larger in absolute value than the cross partial. This also gives uniqueness.

The General Monotone Comparative Statics Argument

2

1 21 1 2

2

11 1 2

0

0

p pp p t

p tp p t

( , , )

( , , )

Page 10: Digital Rights Management and the Pricing of Digital Products Yooki Park and Suzanne Scotchmer Workshop on the Economics of Information Security KSG, Cambridge,

Oligopoly: the price-reducing effect of a threat of circumvention

Legal Enforcement Separate DRM Shared DRM

Independent pricing Î I

Joint pricing C JCI I I, ,

~

R p p tK p t1 1 2 1 1 0( , ) ( ) , [ , ]

Collusive Pricing: Supermodular payoff functions

Independent Systems: Supermodular payoff functions

p pC J

p pI I

R p p R p p K p p t K p K p K p p1 1 2 2 1 2 1 2 1 2 1 2( , ) ( , ) ( ) [ ( ) ( ) ( )]

p p t p a t t p a t tC J J C , [ , ] , ,0 1 0 1

Page 11: Digital Rights Management and the Pricing of Digital Products Yooki Park and Suzanne Scotchmer Workshop on the Economics of Information Security KSG, Cambridge,

Outline of Talk

• A circumvention hypothesis• The price-moderating effect of the circumvention

threat: – The Monopoly Case

– The Duopoly Case

• Will vendors make the optimal choice to share?• Cost-Sharing and Independent Pricing• Collusion through Technology

Page 12: Digital Rights Management and the Pricing of Digital Products Yooki Park and Suzanne Scotchmer Workshop on the Economics of Information Security KSG, Cambridge,

Will vendors make the optimal choice whether to share? (no)

• The private versus the public interest:

Reducing costs of protection is good for everyone.(But sharing might not reduce costs.)

Vendors want to raise price, while it is (possibly) in the public interest to lower price.

Because of this conflict, vendors will not make the optimal choice whether to share.

Page 13: Digital Rights Management and the Pricing of Digital Products Yooki Park and Suzanne Scotchmer Workshop on the Economics of Information Security KSG, Cambridge,

Outline of Talk

• A circumvention hypothesis• The price-moderating effect of the circumvention

threat: – The Monopoly Case

– The Duopoly Case

• Will vendors make the optimal choice to share?• Cost-Sharing and Independent Pricing• Collusion through Technology

Page 14: Digital Rights Management and the Pricing of Digital Products Yooki Park and Suzanne Scotchmer Workshop on the Economics of Information Security KSG, Cambridge,

Cost Sharing and Independent PricingMust pricing be collusive, pJ?

• With independent pricing, equilibrium prices depend on how costs are shared:

Cost-sharing schemes:

(1) Fixed cost shares

(2) Revenue-based cost shares;

firms set prices; revenue can be monitored.

(3) Demand-based cost shares;

firms set prices; total revenue is not monitored.

Page 15: Digital Rights Management and the Pricing of Digital Products Yooki Park and Suzanne Scotchmer Workshop on the Economics of Information Security KSG, Cambridge,

Revenue-based cost sharing

• Revenue share of firm 1:

• Why does the pursuit of profit generally break collusion? A price reduction increases the firm’s revenue by stealing business from the rival.

• But with cost sharing, the increase in revenue (generally) also increases the cost share .

• Revenue-based cost sharing can be collusive, despite independence in price setting.

),(),(

),(),(

212211

211211 ppRppR

ppRpp

Page 16: Digital Rights Management and the Pricing of Digital Products Yooki Park and Suzanne Scotchmer Workshop on the Economics of Information Security KSG, Cambridge,

Demand-based cost sharing

• ….Makes collusion even harder to sustain.

• A reduction in price increases the cost share even more than with revenue-based cost sharing

• Firms will prefer demand-based cost sharing to revenue-based cost sharing.

~ ( , )( , )

( , ) ( , )1 1 2

1 1 2

1 1 2 2 1 2

p pD p p

D p p D p p

Page 17: Digital Rights Management and the Pricing of Digital Products Yooki Park and Suzanne Scotchmer Workshop on the Economics of Information Security KSG, Cambridge,

Pure effects of cost sharing (given K): Does higher K (protection cost) lead to higher prices?

• Compare: (1) demand-based cost sharing with (2) fixed cost shares and (3) revenue-based cost sharing

• Monotone comparative statics:

• But what happens when the no-hacking constraint is imposed? Constrain prices at pJ ?

• Notice that higher prices require higher protectionProtection can be used to constrain prices downward but not upward.

p pI I~

p p e1 2

Page 18: Digital Rights Management and the Pricing of Digital Products Yooki Park and Suzanne Scotchmer Workshop on the Economics of Information Security KSG, Cambridge,

Comparative statics argument

1 1 2

1 1 2 1 1 2 1 1 2 1 1 2

2

1 21 1 2

2

11 1 20 0

( , , )

( , ) ( , ) [ ( , ) ~ ( , )]

( , , ) , ( , , )

p p t

R p p p p t p p p p

p pp p t

p tp p t

Revenue-based cost sharing is t=0Demand-based cost-sharing is t=1

p pI I~

Page 19: Digital Rights Management and the Pricing of Digital Products Yooki Park and Suzanne Scotchmer Workshop on the Economics of Information Security KSG, Cambridge,

Pure effects of cost sharing: Effect of K (protection cost) on the equilibrium

prices (assuming no hacking)

1 1 2 1 1 2 1 1 2

2

11 1 2

2

11 1 2

1 1

0 0

( , , ) ( , ) ( , )

( , , ) ( , )

~

p p K R p p p p K

p Kp p K

pp p

if

H o ld s fo r b u t n o t n ecessa r ily

Page 20: Digital Rights Management and the Pricing of Digital Products Yooki Park and Suzanne Scotchmer Workshop on the Economics of Information Security KSG, Cambridge,

Why might cost-sharing not support the collusive prices pJ?

• The most interesting case is when the collusive price is above the price sustainable with perfect legal enforcement.

• At pJ a reduction in price increases revenue.

• A reduction in price increases the cost share.

• Which dominates?

• The level of protection sets of price cap but the firms might find an equilibrium at lower prices.

Page 21: Digital Rights Management and the Pricing of Digital Products Yooki Park and Suzanne Scotchmer Workshop on the Economics of Information Security KSG, Cambridge,

Collusion through Technology

• Competitive objective is unclear:

• Demand-based cost-sharing is best for collusion. (Constrain prices through the protection level.)

• Technology determines whether collusion is possible.

(1) DRM to enforce a single price?(2) Create a veil that allows demand (downloads) to be

monitored, but not revenue?(4) Distribute content for zero price, pay for “rendering.”(5) Privacy concerns?

(Keep the download records out of the hands of the DRM subsidiary?)Would not want to overcome a single monopoly price

by allowing rebates on the side/Requires too much information.

p p p pI I I J, , , ~