{"id":722,"date":"2013-09-11T22:11:15","date_gmt":"2013-09-12T02:11:15","guid":{"rendered":"http:\/\/community.mis.temple.edu\/seminars\/?p=722"},"modified":"2013-09-11T22:18:02","modified_gmt":"2013-09-12T02:18:02","slug":"september-13-karthik-kannan-to-present-on-economic-and-policy-implications-of-restricted-patch-distribution","status":"publish","type":"post","link":"https:\/\/community.mis.temple.edu\/seminars\/september-13-karthik-kannan-to-present-on-economic-and-policy-implications-of-restricted-patch-distribution\/","title":{"rendered":"September 13: Karthik Kannan to present on Economic and Policy Implications of Restricted Patch Distribution"},"content":{"rendered":"<p>Karthik N Kannan<br \/>\nAssociate Professor of Management<br \/>\nKrannert School of Management, Purdue University<\/p>\n<p><em id=\"__mceDel\">September 13, 2013<\/em><\/p>\n<p>Speakman Hall 200, 9:45am \u2013 1115am<br \/>\nSeminar Title: Economic and Policy Implications of Restricted Patch Distribution<br \/>\n<strong><\/strong><\/p>\n<p><strong>Abstract<\/strong><\/p>\n<p>In this paper, we study how restricting the availability of patches to legal users impacts vendor\u2019s pro\ufb01ts, market share, software maintenance decisions, and welfare outcomes. Prior work on this topic assumes that hacker\u2019s effort is independent of the vendor\u2019s decision to release the patch freely or not. Clearly, if the patch is not available to everyone, the hacker \ufb01nds it easier to exploit the vulnerability in the product and, as a result, is likely to alter his effort. In order to understand the role of a strategic hacker, we build a game-theoretic model, where the hacker\u2019s decision is endogenous. With this model, we \ufb01nd that the hacker\u2019s effort may, on one hand, decrease the utility that the vendor can extract from the consumers. On the other hand, it may help differentiate the legal version of the product from the pirated version. A vendor can strategically exploit the hacker\u2019s behavior in its pricing and software maintenance decisions. The endogeneity of hacker\u2019s actions drives several of our \ufb01ndings that have interesting policy implications. For example, the vendor may increase the price and reduce market share in order to exploit the differentiation. In such a case, there may be more pirates in the restricted-patch case than when the patch is freely available, a result that runs counter to typical arguments provided for restricting patches. A government body that understands this trade-off may exert a different level of piracy prevention effort so that the vendor is incentivized to make decisions that improve social welfare.<\/p>\n<p><a href=\"http:\/\/community.mis.temple.edu\/seminars\/files\/2013\/09\/piracyecon.pdf\">Click here for a copy of the paper<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Karthik N Kannan Associate Professor of Management Krannert School of Management, Purdue University September 13, 2013 Speakman Hall 200, 9:45am \u2013 1115am Seminar Title: Economic and Policy Implications of Restricted Patch Distribution Abstract In this paper, we study how restricting the availability of patches to legal users impacts vendor\u2019s pro\ufb01ts, market share, software maintenance decisions, [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[1],"tags":[],"class_list":{"0":"post-722","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-uncategorized","7":"entry"},"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/community.mis.temple.edu\/seminars\/wp-json\/wp\/v2\/posts\/722","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/community.mis.temple.edu\/seminars\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/community.mis.temple.edu\/seminars\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/seminars\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/seminars\/wp-json\/wp\/v2\/comments?post=722"}],"version-history":[{"count":3,"href":"https:\/\/community.mis.temple.edu\/seminars\/wp-json\/wp\/v2\/posts\/722\/revisions"}],"predecessor-version":[{"id":725,"href":"https:\/\/community.mis.temple.edu\/seminars\/wp-json\/wp\/v2\/posts\/722\/revisions\/725"}],"wp:attachment":[{"href":"https:\/\/community.mis.temple.edu\/seminars\/wp-json\/wp\/v2\/media?parent=722"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/seminars\/wp-json\/wp\/v2\/categories?post=722"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/seminars\/wp-json\/wp\/v2\/tags?post=722"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}