Abstract
The study fits the individuals’ characteristics of consumption into an analysis of the demands for both genuine goods and counterfeit goods. The consumers’ substitutability of genuine goods for counterfeits and attitudes toward a dispersed consumption of counterfeit varieties are the dimensions that affect the niche markets for counterfeits. We show that it is not necessary to increase the competition among counterfeits to reduce the demand for individual counterfeits if at the margin the variety of counterfeits enhances the value of consuming the good. The enforcements against counterfeiting deter the number of counterfeit firms, but encourage the output of individual counterfeits if the market includes a significant number of counterfeiters. The optimal private enforcement against counterfeiting is also fully discussed in the model.
Similar content being viewed by others
Notes
In China, people refer to products like this as “shanzhai”, which in Chinese means a bandit stronghold in the mountain. These products infringe the property rights of branded firms in relation to both software and hardware. For instance, several shanzhai mobile phones, e.g., Hiphone, Ophone, or Uphone instead of iphone or NCKIA rather than NOKIA, as well as PC/NB, Netbook, GPS, monitor and TFT-LCD TV, etc., give rise to trademark infringements with confusing similarity. The phones also duplicate some of the functions that are patented by brand firms such as Apple, Nokia and Samsung.
For example, as the 3C hardware industries become more mature, shanzhai 3C products manufactured in China have become more popular in the markets in China, India, Pakistan and Russia in the last 4 years. The mayor of Shenzhen city estimates that there were more than 0.2 billion shanzhai mobile phones produced for nearly 1 million families in 2008 and nearly ninety thousand types of mobile phones in 2009 in Guangdong province alone. We can expect that shanzhai 3C products could constitute one of the business innovation models in the developing countries that must be able to significantly affect the development of the global IT industry.
OECD (2007) announced that the international trade in counterfeit and pirated products could have reached $200 billion in 2005. The Business Software Alliance (BSA) and International Data Corporation (IDC) estimated the total value of software piracy to be $53 billion in 2008 while customers paid $88 billion for the use of copyrighted software in the same year.
Chaudhry (2006) argued that one of the main reasons why China has become the primary source of counterfeit goods is the lack of intellectual property rights (IPR) enforcement. If China is willing to enforce intellectual property rights, the infringements of the right should decrease. For example, the Chinese government fiercely protected its Olympic logo, and punished the selling of fake Olympic items much more severely than of other counterfeits. China has thus successfully protected its property rights in relation to its Olympic logo.
For example, more than $16 billion worth of counterfeit goods are sold each year inside China. The US trade representative based in China reckons that the amount that American industries lose to counterfeit goods ranges from $200 to $250 billion (The Economist 2003/5/17). The IT software firms could lose nearly $100 billion per year according to KPMG and the Alliance for Gray Market and Counterfeit Abatement (Bednarz 2006). The International Chamber of Commerce in Geneva estimated that the global value of counterfeit products may exceed $650 billion per year (Kurtenbach 2006). OECD (2007) also announced that the international trade in counterfeit and pirated products could have been as high as $200 billion in 2005. It is not hard to imagine how huge the total value of products whose property rights have been violated must be.
For example, Higgins and Rubin (1986) provide data indicating that 27% of the buyers of the counterfeit goods already owned genuine Rolexes.
Counterfeit goods have become increasingly rampant over the years: from small scale copying of luxury goods in the 1980s, to large-scale production of low-tech products in the late 1980s and 1990s, and to the much larger scale production of high-tech electrical products (Chaudhry 2006). In 2004, the European Union experienced rapid growth of counterfeits with data on seizures revealing a dramatic percentage increase in counterfeits in the sectors for electrical equipment (+707%) and computer equipment (+899%) (EU Taxation and Customs Union 2005). Counterfeit goods account for 12% of products being sold in the toys and sports marketplace in the UK (Jones and Cline, 2002).
Counterfeit products can be classified into four distinct types: (1) True counterfeit products that look as much like the original as possible and use the same brand name. (2) Look-alikes that duplicate the original and bear a different name, but not a private label of a branded industrial product. (3) Reproductions that are not exact copies. (4) Unconvincing imitations.
Ordover (1991) and Maskus and McDaniel (1999) document the evidence that the rapid postwar industrialization in East Asian countries such as Japan and South Korea was accomplished under relatively weak IPR system and that a hasty imposition of a strong IPR regime could slow down the industrial development of today’s developing countries. Maskus(2000) also mentions these issues. Chin and Grossman (1990), Deardorff (1992), Helpman (1993), Lai (1998), Helpman and Lai (2005) and Branstetter et al. (2007) theoretically address the question of whether a country with limited capacity to innovate will benefit from extending IPRs to foreign inventors.
Nordhaus (1969) argued that the optimal policy render the marginal dynamic benefit equal to the marginal static efficiency loss. Strengthening intellectual property right provides greater incentives for innovations and thus the benefit that come from having more and better products.
However, McCalman (2001) and Chaudhuri et al. (2006) stress that a strong IPR also incurs static welfare losses.
Given that the individual counterfeit producer is symmetric, the demand for counterfeit varieties is \( Q = (\alpha_{C} \beta_{B} - \alpha_{B} \gamma_{B} )/\delta - (\beta_{B} /\delta ) \cdot p + (\gamma_{B} /\delta ) \cdot p_{B} , \)where \( \delta \equiv \beta_{B} (\beta_{C} /n + \gamma_{C} ) - (\gamma_{B} )^{2} . \) Since δ > 0, it needs \( (\alpha_{C} \beta_{B} - \alpha_{B} \gamma_{B} ) > 0 \) to guarantee that the demand for the counterfeit varieties is not negative when p and p B are equal to zero.
As for the general setting of the cost function, the expenditure on detecting the infringement of the intellectual property rights is convex in the level of the probability of each counterfeiter i being caught.
In the long run, the equilibrium number of the counterfeit varieties is derived from the zero profit condition for the production of individual counterfeit that makes the output and price of the individual counterfeit be the constants q le and p le. The output of the genuine good affects the market size of the counterfeit varieties, and hence the firm with the genuine good takes this into consideration to maximize its profit. So, the first order condition of profit-maximization for the production of the genuine good includes the effect of the output of the genuine good on the number of the counterfeit varieties. However, in the short run, the output of the genuine good does not affect the number of the counterfeit varies, but does affect the output and price of individual counterfeit. So, equating the short run outputs q se and the long run outputs q le of individual counterfeit and solving for n should not arrive at the long run equilibrium number of the counterfeit varieties \( n_{R}^{\text{le}} \). This can be seen from the equalization \( q^{\text{se}} = q^{\text{le}} \) that is specified as
\( \left( {{\frac{{2\beta_{C} (2\alpha_{C} \beta_{B} - \gamma_{B} \alpha_{B} ) + n\{ \gamma_{C} (\alpha_{C} \beta_{B} - \gamma_{B} \alpha_{B} ) + \alpha_{C} (\gamma_{C} \beta_{B} - \gamma_{B} \gamma_{B} )\} }}{{(2\beta_{C} + n\gamma_{C} )[4\beta_{C} \beta_{B} + 2n(\beta_{B} \gamma_{C} - \gamma_{B} \gamma_{B} )]}}}} \right) = \sqrt {{{\rho (E)F} \mathord{\left/ {\vphantom {{\rho (E)F} {(1 - \rho (E))\beta_{C} }}} \right. \kern-\nulldelimiterspace} {(1 - \rho (E))\beta_{C} }}} \). The solution for n in this equation is not equal to the long run equilibrium number of the counterfeit varieties \( n_{R}^{\text{le}} \).
\( p_{B}^{e} = \left( {{\frac{{\alpha_{B} }}{2}} + {\frac{{\gamma_{B} (2\sqrt {{{\beta_{c} \rho (E)F} \mathord{\left/ {\vphantom {{\beta_{c} \rho (E)F} {(1 - \rho (E))}}} \right. \kern-\nulldelimiterspace} {(1 - \rho (E))}}} - \alpha_{C} )}}{{2\gamma_{C} }}}} \right)\;\left( {1 + {\frac{{\gamma_{B} \alpha_{C}^{\prime } ( \cdot ){{{\text{d}}n_{R} } \mathord{\left/ {\vphantom {{{\text{d}}n_{R} } {{\text{d}}q_{B} }}} \right. \kern-\nulldelimiterspace} {{\text{d}}q_{B} }}}}{{2\left( {2(\beta_{B} \gamma_{C} - \gamma_{B} \gamma_{B} ) + \gamma_{B} \alpha_{C}^{\prime } ( \cdot ){{{\text{d}}n_{R} } \mathord{\left/ {\vphantom {{{\text{d}}n_{R} } {{\text{d}}q_{B} }}} \right. \kern-\nulldelimiterspace} {{\text{d}}q_{B} }}} \right)}}}} \right) \)
\( \rho^{''} (E) = {\frac{\psi (1 - \psi )}{{\left( {1 - \psi (1 - G(E)} \right)^{2} }}}G^{''} (E) - 2{\frac{{\psi^{2} (1 - \psi )}}{{\left( {1 - \psi (1 - G(E)} \right)^{3} }}}(G^{'} (E))^{2} \)
\( R_{G}^{nc\prime \prime } (E) = \left( {{\frac{{2\gamma_{B} \sqrt {{{\beta_{c} \psi \cdot F} \mathord{\left/ {\vphantom {{\beta_{c} \psi \cdot F} {(1 - \psi )}}} \right. \kern-\nulldelimiterspace} {(1 - \psi )}}} \mu^{2} \left( {1 - G(E)} \right)}}{{4\gamma_{C} \left( {\beta_{B} \gamma_{C} - \gamma_{B} \gamma_{B} } \right)\sqrt {G(E)} }}}} \right)\; \times \left( {{\frac{{ - \left( {\alpha_{c} \gamma_{B} } \right)\left( {{\frac{1 + G(E)}{2}}} \right) - 2\gamma_{B} \sqrt {{{\beta_{c} \psi \cdot F} \mathord{\left/ {\vphantom {{\beta_{c} \psi \cdot F} {(1 - \psi )}}} \right. \kern-\nulldelimiterspace} {(1 - \psi )}}} G(E)^{3/2} }}{G(E)}}} \right) \)
The marginal revenue and compensation with respect to private enforcement are
\( R_{G}^{{C^{\prime } }} (E) = {\frac{{\gamma_{B} \left( {\alpha_{B} \gamma_{C} - \gamma_{B} \left( {\alpha_{C} - p^{ge} } \right)} \right)}}{{4\gamma_{C} \left( {\beta_{B} \gamma_{C} - \gamma_{B} \gamma_{B} } \right)}}}2\;{\frac{{\partial p^{ge} }}{\partial E}}, \) \( CPS^{\prime } (E) = {\frac{{2\left( {2\beta_{B} \gamma_{C} - \gamma_{B} \gamma_{B} } \right)\alpha_{C} - 2\alpha_{B} \gamma_{B} \gamma_{C} - \left( {4\beta_{B} \gamma_{C} - 3\gamma_{B} \gamma_{B} } \right)2p^{\text{ge}} }}{{\left( {4(\beta_{B} \gamma_{C} - \gamma_{B} \gamma_{B} )} \right)\gamma_{C} }}}\;{\frac{{\partial p^{ge} }}{\partial E}}. \)
References
Andrés, A. R. (2006). The relationship between copyright software protection and piracy: Evidence from Europe. European Journal of Law and Economics, 21, 29–51.
Aoki, R., & Spiegel, Y. (2001). Pre-grant patent publication, R&D, and welfare. Mimeo: Northwestern University.
Bednarz, A. (2006). Targeting bogus goods: Technology gives merchants a fighting chance. Network World, 23(10), 1.
Branstetter, L., Fisman, R., Fritz Foley, C., & Saggi, K. (2007). Intellectual property rights, imitation, and foreign direct investment: Theory and evidence. Mimeo: Carnegie Mellon University.
Chaudhry, P. E. (2006). Changing levels of intellectual property rights protection for global firms: A synopsis of recent U.S. and EU trade enforcement strategies. Business Horizons, 49, 463–472.
Chaudhry, P. E., & Walsh, M. G. (1996). An assessment of the impact of counterfeiting in international markets: The piracy paradox persists. Columbia Journal of World Business, 31(3), 34–49.
Chaudhuri, S., Goldberg, P., & Jia, P. (2006). Estimating the effects of global patent protection in phamaceuticals: A case study in India. American Economic Review, 96, 1477–1514.
Chen, B. X. (2009). Rejected by apple, iphone developers go underground. Wired, August 6, 2009.
Chin, J., & Grossman, G. M. (1990). Intellectual property rights and north-south. In R. W. Jones & A. O. Krueger (Eds.), The political economy of international trade (pp. 90–107). Cambridge: Basil Blackwell Publishers.
Crampes, C., & Langinier, C. (2002). Litigation and settlement in patent infringement cases. RAND Journal of Economics, 33(2), 258–274.
Deardorff, A. V. (1992). Welfare effects of global patent protection. Economica, 59, 35–51.
Gilbert, R., & Shapiro, C. (1990). Optimal parent length and breadth. RAND Journal of Economics, 21(1), 106–112.
Grossman, G. M., & Shapiro, C. (1988a). Counterfeit-product trade. American Economic Review, 78(1), 59–75.
Grossman, G. M., & Shapiro, C. (1988b). Foreign counterfeiting of status goods. Quarterly Journal of Economics, 103(1), 59–75.
Helpman, E. (1993). Innovation, imitation, and intellectual property rights. Econometrica, 61, 1247–1280.
Higgins, R. S., & Rubin, P. H. (1986). Counterfeit goods. Journal of Law and Economics, 29, 211–230.
Imitating property is theft. (2003). The Economist, 367(8234), 52–56.
Jones, S. E., & Cline, H. (2002). New ammunition in the fight against fakes. Managing Intellectual Property, (121), 53–58.
Klemperer, P. (1990). How broad should the scope of patent protection be? Rand Journal of Economics, 21, 113–130.
Kurtenbach, E. (2007). Companies fight back against China privacy. Retrieved February 12, 2007, from http://www.sfgate.com/cgi-bin/article.cgi?f=/n/a/2006/07/02/financial/f134855D88.DTL.
Lai, E. L. C. (1998). International intellectual property rights protection and the rate of product innovation. Journal of Development Economics, 55, 133–153.
Marjit, S. M., & Shi, H. L. (2001). Cooperation in R&D: The case of patent infringement agreements. Journal of Economic Behavior & Organization, 45, 383–401.
Maskus, K. E. (2000). Intellectural property rights in the global economy. Washington, DC: Institution for International Economics.
Maskus, K. E., & McDaniel, C. (1999). Impacts of the Japanese patent system on productivity growth. Japan and the World Economy, 11, 557–574.
McCalman, P. (2001). Reap what you sow: An empirical analysis of patent harmonization. Journal of International Economics, 55, 161–186.
Melitz, M. J., & Ottaviano, G. I. P. (2008). Market size, trade and productivity. Review of Economic Studies, 75(1), 295–316.
Nordhaus, W. D. (1969). Invention, growth and welfare: A theoretical treatment of technological change. Cambridge, MA: MIT Press.
Ordover, J. (1991). Patent system for both diffusion and exclusion. Journal of Economic Perspectives, 5, 43–60.
Reiganun, J. F. (1989). The timing of innovation: Research, development and diffusion. In R. Schmalensee & R. D. Willig (Eds.), The handbook of industrial organization. New York: North Holland.
Yao, J. T. (2005). Counterfeiting and an optimal monitoring policy. European Journal of Law and Economics, 19, 95–114.
Author information
Authors and Affiliations
Corresponding authors
Appendix
Appendix
1.1 Illustration of remark 2
Similarly, if \( \alpha_{C}^{\prime } ( \cdot ) > 0, \) the equilibrium outputs are
the equilibrium number of the counterfeit varieties is
and the equilibrium price of the genuine good is
where \( {{dn_{R} } \mathord{\left/ {\vphantom {{dn_{R} } {dq_{B} }}} \right. \kern-\nulldelimiterspace} {dq_{B} }} = - {{\gamma_{B} } \mathord{\left/ {\vphantom {{\gamma_{B} } {(\gamma_{C} \sqrt {{{\rho (E)F} \mathord{\left/ {\vphantom {{\rho (E)F} {(1 - \rho (E))\beta_{C} }}} \right. \kern-\nulldelimiterspace} {(1 - \rho (E))\beta_{C} }}} - \alpha_{C}^{\prime } ( \cdot ))}}} \right. \kern-\nulldelimiterspace} {(\gamma_{C} \sqrt {{{\rho (E)F} \mathord{\left/ {\vphantom {{\rho (E)F} {(1 - \rho (E))\beta_{C} }}} \right. \kern-\nulldelimiterspace} {(1 - \rho (E))\beta_{C} }}} - \alpha_{C}^{\prime } ( \cdot ))}}. \) If \( \alpha_{C}^{\prime } ( \cdot ) \) is close to zero in equilibrium, the equilibrium total output of counterfeits is approaching to
and the equilibrium price is very close to
1.2 Illustration of Table 1
To simplify the notations, we define the following value functions:
From the first-order condition, we can derive the static comparisons.
Rights and permissions
About this article
Cite this article
Lai, F.T., Chang, SC. Consumers’ choices, infringements and market competition. Eur J Law Econ 34, 77–103 (2012). https://doi.org/10.1007/s10657-011-9225-z
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10657-011-9225-z