Skip to main content
Log in

Counterfeiting and an Optimal Monitoring Policy

  • Published:
European Journal of Law and Economics Aims and scope Submit manuscript

Abstract

This paper studies the impact of adopting a monitoring system on counterfeiting, in which a criterion to minimize welfare losses due to counterfeiting is provided. If the degree to which the genuine product is imitated (hence the imitation rate) is not high, then counterfeit products might be allowed to exist in such a market. For the case of a high imitation rate, the use of a counterfeit monitoring regime with an optimal counterfeit-monitoring rate is the best policy. If the duration of intellectual property protection is set as infinite, then a higher monitoring rate corresponds to a narrower protection scope. Finally, the enforcement of the laws of intellectual property rights should be flexible according to a product’s inherent attributes as pertaining to the difficulties at imitating the original products.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  • Aghion, P., Harris, C., Howitt, P., & Vickers, J. (2001). “Competition, Imitation and Growth with Step-by-Step Innovation.” Review of Economic Studies. {68}, 467–492.

    Google Scholar 

  • Banerjee, D. S. (2003). “Software Piracy:, A Strategic Analysis and Policy Instruments.” International Journal of Industrial Organization. 21, 97–127.

    Google Scholar 

  • Besen, S. M. & Kirby, S. N. (1989). “Private Copying, Appropriability, and Optimal Copy Royalties.” Journal of Law and Economics. 32, 255–280.

    Google Scholar 

  • Choi, J. C. & Shin, H. S. (1992). “A Comment on a Model of Vertical Product Differentiation.” The Journal of Industrial Economics. 60, 229–231.

    Google Scholar 

  • Conner, K. R. & Rumelt, R. P. (1991). “Software Piracy:, An Analysis of Protection Strategies.” Management Science. 37, 125–139.

    Article  Google Scholar 

  • Geroski, P. (1995). “Markets for Technology: Knowledge, Innovation and Appropriability.” In, P. Stoneman (ed.), Handbook of the Economics of Innovation and Technological Change. Oxford: Blackwell.

    Google Scholar 

  • Gilbert, R. & Shapiro, C. (1990). “Optimal Patent Length and Breadth.” Rand Journal of Economics. 21, 106–112.

    Google Scholar 

  • Gordon, W. J. & Bone, R. G. (2000). “Copyright.” In, B. Bouckaert & G. De Geest, (eds.), Encyclopedia of Law and Economics. Northampton, MA: Edward Elgar, Vol. 2.

    Google Scholar 

  • Griliches, Z. (1990). “Patent Statistics as Economic Indicators: A Survey.” Journal of Economic Literature. 28, 1661–1707.

    Google Scholar 

  • Grossman, G. M. & Shapiro, C. (1988a). “Counterfeit-Product Trade.” American Economic Review. 78, 59–75.

    Google Scholar 

  • Grossman, G. M. & Shapiro, C. (1988b). “Foreign Counterfeiting of Status Goods.” The Quarterly Journal of Economics. 103, 79–100.

    Google Scholar 

  • Higgins, R. S. & Rubin, P. H. (1986). “Counterfeit Goods.” The Journal of Law and Economics. 29, 211–230.

    Google Scholar 

  • Johnson, W. R. (1985). “The Economics of Copying.” Journal of Political Economy. 93, 158–174.

    Google Scholar 

  • Klemperer, P. (1990). “How Broad Should the Scope of Patent Protection Be?” Rand Journal of Economics. 21, 113–130.

    Google Scholar 

  • Liebowitz, S. J. (1985). “Copying and Indirect Appropriability: Photocopying of Journals.” Journal of Political Economy. 93, 945–957.

    Google Scholar 

  • Motta, M. (1993). “Endogenous Quality Choice: Price vs. Quality Competition.” The Journal of Industrial Economics. 42(2), 113–131.

    Google Scholar 

  • Mussa, M. & Rosen, S. (1978). “Monopoly and Product Quality.” Journal of Economic Theory. 18, 301–317.

    Google Scholar 

  • Novos, I. E. & Waldman, M. (1984). “The Effects of Increased Copyright Protection: An Analytic Approach.” Journal of Political Economy. 92, 236–246.

    Google Scholar 

  • Shy, O. & Thisse, J.-F. (1999). “A Strategic Approach to Software Protection.” Journal of Economics and Management Strategy. 8, 163–190.

    Google Scholar 

  • Takeyama, L. N. (1994). “The Welfare Implications of Unauthorized Reproduction of Intellectual Property in the Presence of Demand Network Externalities.” Journal of Industrial Economics. 42, 155–166.

    Google Scholar 

  • Time Magazine (2001a). “Chasing Shadows,” June 11.

  • Time Magazine (2001b). “In Defense of Fakes,” June 11.

  • Tirole, J. (1988). The Theory of Industrial Organization. Cambridge, MA: MIT Press.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jen-Te Yao.

Additional information

JEL Classification: D42, K42, L43

Rights and permissions

Reprints and permissions

About this article

Cite this article

Yao, JT. Counterfeiting and an Optimal Monitoring Policy. Eur J Law Econ 19, 95–114 (2005). https://doi.org/10.1007/s10657-005-5277-2

Download citation

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10657-005-5277-2

Keywords

Navigation