{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,28]],"date-time":"2024-10-28T04:02:15Z","timestamp":1730088135800,"version":"3.28.0"},"reference-count":46,"publisher":"Elsevier BV","issue":"8","license":[{"start":{"date-parts":[[2023,12,1]],"date-time":"2023-12-01T00:00:00Z","timestamp":1701388800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2023,12,1]],"date-time":"2023-12-01T00:00:00Z","timestamp":1701388800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2023,12,1]],"date-time":"2023-12-01T00:00:00Z","timestamp":1701388800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2023,12,1]],"date-time":"2023-12-01T00:00:00Z","timestamp":1701388800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2023,12,1]],"date-time":"2023-12-01T00:00:00Z","timestamp":1701388800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,12,1]],"date-time":"2023-12-01T00:00:00Z","timestamp":1701388800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100012325","name":"National Office for Philosophy and Social Sciences","doi-asserted-by":"publisher","award":["ZD053"],"id":[{"id":"10.13039\/501100012325","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012456","name":"Chinese National Funding of Social Sciences","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100012456","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Information & Management"],"published-print":{"date-parts":[[2023,12]]},"DOI":"10.1016\/j.im.2023.103859","type":"journal-article","created":{"date-parts":[[2023,9,9]],"date-time":"2023-09-09T08:32:04Z","timestamp":1694248324000},"page":"103859","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"title":["Jailbreaking in closed two-sided platforms"],"prefix":"10.1016","volume":"60","author":[{"given":"Yunhao","family":"Liu","sequence":"first","affiliation":[]},{"given":"Gengzhong","family":"Feng","sequence":"additional","affiliation":[]},{"given":"Yangyang","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Xiangyin","family":"Kong","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"year":"2018","journal-title":"Bus. Opportunity. Retrieved from","article-title":"Software management: security imperative","key":"10.1016\/j.im.2023.103859_bib0001"},{"unstructured":"Goff, M. (2022). Software piracy statistics 2022 \u2013 stat watch. Retrieved from https:\/\/www.revenera.com\/blog\/software-monetization\/software-piracy-stat-watch\/.","key":"10.1016\/j.im.2023.103859_bib0002"},{"issue":"10","key":"10.1016\/j.im.2023.103859_bib0003","first-page":"92","article-title":"Strategies for two-sided markets","volume":"84","author":"Eisenmann","year":"2006","journal-title":"Harv. Bus. Rev."},{"unstructured":"Brewster, T. (2020). Of Ma and malware: inside China's iPhone jailbreaking industrial complex. Retrieved from https:\/\/www.forbes.com\/sites\/thomasbrewster\/2015\/06\/26\/china-iphone-jailbreak-industry\/?sh=19a03e677538.","key":"10.1016\/j.im.2023.103859_bib0004"},{"unstructured":"Kelly, G. (2020). New iPhone, iPad jailbreak exposes massive zero-day flaw impacting 900 million devices. Retrieved from https:\/\/www.forbes.com\/sites\/gordonkelly\/2020\/05\/24\/apple-iphone-ios-135-warning-security-jailbreak-iphone-11-pro-max-upgrade\/?sh=4a405ee778d2.","key":"10.1016\/j.im.2023.103859_bib0005"},{"unstructured":"Fisher, T. (2019). PlayStation demanding $20,000 From PS4 hacker and pirated games seller. Retrieved from https:\/\/comicbook.com\/gaming\/news\/ps4-playstation-sony-hacker-pirate\/.","key":"10.1016\/j.im.2023.103859_bib0006"},{"issue":"4","key":"10.1016\/j.im.2023.103859_bib0007","doi-asserted-by":"crossref","first-page":"1117","DOI":"10.25300\/MISQ\/2018\/14798","article-title":"The\" invisible hand\" of piracy: an economic analysis of the information-goods supply chain","volume":"42","author":"Kim","year":"2018","journal-title":"MIS Q."},{"issue":"2","key":"10.1016\/j.im.2023.103859_bib0008","doi-asserted-by":"crossref","first-page":"125","DOI":"10.1287\/mnsc.37.2.125","article-title":"Software piracy: an analysis of protection strategies","volume":"37","author":"Conner","year":"1991","journal-title":"Manag. Sci."},{"issue":"4","key":"10.1016\/j.im.2023.103859_bib0009","doi-asserted-by":"crossref","first-page":"990","DOI":"10.1162\/154247603322493212","article-title":"Platform competition in two-sided markets","volume":"1","author":"Rochet","year":"2003","journal-title":"J. Eur. Econ. Assoc."},{"issue":"3","key":"10.1016\/j.im.2023.103859_bib0010","doi-asserted-by":"crossref","first-page":"668","DOI":"10.1111\/j.1756-2171.2006.tb00037.x","article-title":"Competition in two-sided markets","volume":"37","author":"Armstrong","year":"2006","journal-title":"Rand. J. Econ."},{"issue":"1","key":"10.1016\/j.im.2023.103859_bib0011","doi-asserted-by":"crossref","first-page":"152","DOI":"10.1287\/isre.2013.0505","article-title":"Platform performance investment in the presence of network externalities","volume":"25","author":"Anderson","year":"2014","journal-title":"Inf. Syst. Res."},{"issue":"4","key":"10.1016\/j.im.2023.103859_bib0012","doi-asserted-by":"crossref","first-page":"933","DOI":"10.1287\/mnsc.1120.1577","article-title":"First-party content and coordination in two-sided markets","volume":"59","author":"Hagiu","year":"2013","journal-title":"Manag. Sci."},{"issue":"6","key":"10.1016\/j.im.2023.103859_bib0013","doi-asserted-by":"crossref","first-page":"4415","DOI":"10.1287\/mnsc.2021.4075","article-title":"Quality regulation on two-sided platforms: exclusion, subsidization, and first-party applications","volume":"68","author":"Huang","year":"2022","journal-title":"Manag. Sci."},{"issue":"1","key":"10.1016\/j.im.2023.103859_bib0014","doi-asserted-by":"crossref","first-page":"217","DOI":"10.1287\/isre.2019.0882","article-title":"Platform pricing and investment to drive third-party value creation in two-sided networks","volume":"31","author":"Tan","year":"2020","journal-title":"Inf. Syst.Res."},{"issue":"13","key":"10.1016\/j.im.2023.103859_bib0015","doi-asserted-by":"crossref","first-page":"3808","DOI":"10.1080\/00207543.2016.1148275","article-title":"One-side value-added service investment and pricing strategies for a two-sided platform","volume":"54","author":"Dou","year":"2016","journal-title":"Int. J. Prod. Res."},{"issue":"3","key":"10.1016\/j.im.2023.103859_bib0016","doi-asserted-by":"crossref","first-page":"952","DOI":"10.1016\/j.ejor.2022.04.041","article-title":"Bilateral value-added service investment in platform competition with cross-side network effects under multihoming","volume":"304","author":"Sui","year":"2023","journal-title":"Eur. J. Oper. Res."},{"key":"10.1016\/j.im.2023.103859_bib0017","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.tre.2017.02.003","article-title":"The optimal pricing strategy for two-sided platform delivery in the sharing economy","volume":"101","author":"Kung","year":"2017","journal-title":"Transp. Res. Part E: Logistics Transp. Revie"},{"issue":"12","key":"10.1016\/j.im.2023.103859_bib0018","doi-asserted-by":"crossref","first-page":"8909","DOI":"10.1287\/mnsc.2022.4302","article-title":"Two-sided platform competition in a sharing economy","volume":"68","author":"Zhang","year":"2022","journal-title":"Manage Sci"},{"issue":"7","key":"10.1016\/j.im.2023.103859_bib0019","doi-asserted-by":"crossref","DOI":"10.1016\/j.im.2021.103506","article-title":"Information disclosure and blockchain technology adoption strategy for competing platforms","volume":"59","author":"Wang","year":"2022","journal-title":"Inf. Manag."},{"issue":"7","key":"10.1016\/j.im.2023.103859_bib0020","doi-asserted-by":"crossref","first-page":"1057","DOI":"10.1287\/mnsc.1060.0549","article-title":"Two-sided competition of proprietary vs. open-source technology platforms and the implications for the software industry","volume":"52","author":"Economides","year":"2006","journal-title":"Manag. Sci."},{"issue":"6","key":"10.1016\/j.im.2023.103859_bib0021","doi-asserted-by":"crossref","first-page":"877","DOI":"10.1111\/j.1937-5956.2011.01233.x","article-title":"When should a firm open its source code: a strategic analysis","volume":"20","author":"Kort","year":"2011","journal-title":"Prod. Operations Manag."},{"issue":"2","key":"10.1016\/j.im.2023.103859_bib0022","doi-asserted-by":"crossref","first-page":"306","DOI":"10.1111\/jems.12089","article-title":"Investment incentives in open-source and proprietary two-sided platforms","volume":"24","author":"Casadesus-Masanell","year":"2015","journal-title":"J. Econ. Manag. Strategy"},{"issue":"2","key":"10.1016\/j.im.2023.103859_bib0023","doi-asserted-by":"crossref","first-page":"155","DOI":"10.2307\/2950487","article-title":"The welfare implications of unauthorized reproduction of intellectual property in the presence of demand network externalities","volume":"42","author":"Takeyama","year":"1994","journal-title":"J. Ind. Econ."},{"issue":"2","key":"10.1016\/j.im.2023.103859_bib0024","first-page":"163","article-title":"A strategic approach to software protection","volume":"8","author":"Shy","year":"1999","journal-title":"J. Econ. Manag. Strategy"},{"issue":"4","key":"10.1016\/j.im.2023.103859_bib0025","doi-asserted-by":"crossref","first-page":"610","DOI":"10.1287\/mksc.1070.0313","article-title":"Digital piracy: a competitive analysis","volume":"27","author":"Jain","year":"2008","journal-title":"Mark. Sci."},{"issue":"4","key":"10.1016\/j.im.2023.103859_bib0026","doi-asserted-by":"crossref","first-page":"400","DOI":"10.1287\/isre.1050.0069","article-title":"Managing piracy: pricing and sampling strategies for digital experience goods in vertically segmented markets","volume":"16","author":"Chellappa","year":"2005","journal-title":"Inf. Syst. Res."},{"issue":"1","key":"10.1016\/j.im.2023.103859_bib0027","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1287\/opre.1070.0414","article-title":"Versioning and piracy control for digital information goods","volume":"56","author":"Wu","year":"2008","journal-title":"Oper. Res."},{"issue":"3","key":"10.1016\/j.im.2023.103859_bib0028","doi-asserted-by":"crossref","first-page":"287","DOI":"10.1287\/isre.1040.0030","article-title":"Managing digital piracy: pricing and protection","volume":"15","author":"Sundararajan","year":"2004","journal-title":"Inf. Syst. Res."},{"issue":"4","key":"10.1016\/j.im.2023.103859_bib0029","doi-asserted-by":"crossref","first-page":"528","DOI":"10.1016\/j.dss.2009.05.015","article-title":"Pricing schemes for digital content with DRM mechanisms","volume":"47","author":"Li","year":"2009","journal-title":"Decis. Support Syst."},{"key":"10.1016\/j.im.2023.103859_bib0030","doi-asserted-by":"crossref","DOI":"10.1016\/j.elerap.2021.101072","article-title":"Optimal piracy control and pricing strategies considering quality degradation: the effects of policy instruments","volume":"48","author":"Zhang","year":"2021","journal-title":"Electron. Commer. Res. Appl."},{"issue":"2","key":"10.1016\/j.im.2023.103859_bib0031","doi-asserted-by":"crossref","DOI":"10.1016\/j.im.2022.103601","article-title":"Managing digital piracy under consumer valuation uncertainty: the roles of product demonstrations and antipiracy measures","volume":"59","author":"Yi","year":"2022","journal-title":"Inf. Manag."},{"issue":"11","key":"10.1016\/j.im.2023.103859_bib0032","doi-asserted-by":"crossref","first-page":"1946","DOI":"10.1287\/mnsc.1100.1221","article-title":"Trading higher software piracy for higher profits: the case of phantom piracy","volume":"56","author":"Gopal","year":"2010","journal-title":"Manag. Sci."},{"issue":"3","key":"10.1016\/j.im.2023.103859_bib0033","doi-asserted-by":"crossref","first-page":"481","DOI":"10.1016\/j.jce.2016.08.002","article-title":"To root or not to root? The economics of jailbreak","volume":"45","author":"Chao","year":"2017","journal-title":"J. Comp. Econ."},{"key":"10.1016\/j.im.2023.103859_bib0034","doi-asserted-by":"crossref","first-page":"78","DOI":"10.1016\/j.jebo.2013.01.009","article-title":"Piracy in a two-sided software market","volume":"88","author":"Rasch","year":"2013","journal-title":"J. Econ. Behav. Organ."},{"issue":"8","key":"10.1016\/j.im.2023.103859_bib0035","doi-asserted-by":"crossref","first-page":"735","DOI":"10.1016\/j.telpol.2014.11.003","article-title":"The impact of piracy on prominent and non-prominent software developers","volume":"39","author":"Rasch","year":"2015","journal-title":"Telecomm. Policy"},{"issue":"3","key":"10.1016\/j.im.2023.103859_bib0036","doi-asserted-by":"crossref","first-page":"1002","DOI":"10.1080\/07421222.2019.1628952","article-title":"An economic analysis of platform protection in the presence of content substitutability","volume":"36","author":"Nan","year":"2019","journal-title":"J. Manag. Inf. Syst."},{"issue":"2","key":"10.1016\/j.im.2023.103859_bib0037","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1177\/0008125618818841","article-title":"Business model responses to digital piracy","volume":"61","author":"Aversa","year":"2019","journal-title":"Calif. Manag. Rev."},{"issue":"1","key":"10.1016\/j.im.2023.103859_bib0038","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1007\/s11129-019-09221-7","article-title":"Software piracy and outsourcing in two-sided markets","volume":"18","author":"Ishihara","year":"2020","journal-title":"Quantitative Mark. Econ."},{"issue":"1","key":"10.1016\/j.im.2023.103859_bib0039","doi-asserted-by":"crossref","first-page":"240","DOI":"10.1287\/isre.2019.0883","article-title":"Bloatware and jailbreaking: strategic impacts of consumer-initiated modification of technology products","volume":"31","author":"Cavusoglu","year":"2020","journal-title":"Inf. Syst. Res."},{"issue":"6","key":"10.1016\/j.im.2023.103859_bib0040","doi-asserted-by":"crossref","first-page":"1374","DOI":"10.1111\/j.1937-5956.2012.01344.x","article-title":"Commercialization of platform technologies: launch timing and versioning strategy","volume":"22","author":"Bhargava","year":"2013","journal-title":"Prod. Operations Manag."},{"issue":"2","key":"10.1016\/j.im.2023.103859_bib0041","doi-asserted-by":"crossref","first-page":"595","DOI":"10.1016\/j.ejor.2016.03.030","article-title":"Evolutionary location and pricing strategies for service merchants in competitive O2O markets","volume":"254","author":"He","year":"2016","journal-title":"Eur. J. Oper. Res."},{"unstructured":"O'Flaherty, K. (2020). This Is How You Can Hack An Apple iPhone Using An Android Device. Retrieved from https:\/\/www.forbes.com\/sites\/kateoflahertyuk\/2020\/03\/04\/this-is-how-you-can-jailbreak-an-apple-iphone-using-an-android-device\/?sh=2c07ad032271.","key":"10.1016\/j.im.2023.103859_bib0042"},{"unstructured":"Hernandez, P. (2020). The nintendo switch hacking scene is chaos right now. Retrieved from https:\/\/www.theverge.com\/2018\/6\/28\/17501530\/nintendo-switch-hacking-piracy-porn-bans.","key":"10.1016\/j.im.2023.103859_bib0043"},{"issue":"1","key":"10.1016\/j.im.2023.103859_bib0044","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1016\/S0167-7187(01)00090-X","article-title":"Software piracy: a strategic analysis and policy instruments","volume":"21","author":"Banerjee","year":"2003","journal-title":"Int. J. Ind. Organ."},{"issue":"4","key":"10.1016\/j.im.2023.103859_bib0045","doi-asserted-by":"crossref","first-page":"449","DOI":"10.1016\/j.infoecopol.2006.06.005","article-title":"Piracy of digital products: a critical review of the theoretical literature","volume":"18","author":"Peitz","year":"2006","journal-title":"Inf. Econ. Policy"},{"issue":"2","key":"10.1016\/j.im.2023.103859_bib0046","doi-asserted-by":"crossref","first-page":"488","DOI":"10.1287\/isre.1110.0348","article-title":"Optimal software free trial strategy: the impact of network externalities and consumer uncertainty","volume":"23","author":"Cheng","year":"2012","journal-title":"Inf. Syst. Res."}],"container-title":["Information & Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0378720623001076?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0378720623001076?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2024,10,27]],"date-time":"2024-10-27T20:26:33Z","timestamp":1730060793000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0378720623001076"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12]]},"references-count":46,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2023,12]]}},"alternative-id":["S0378720623001076"],"URL":"https:\/\/doi.org\/10.1016\/j.im.2023.103859","relation":{},"ISSN":["0378-7206"],"issn-type":[{"type":"print","value":"0378-7206"}],"subject":[],"published":{"date-parts":[[2023,12]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Jailbreaking in closed two-sided platforms","name":"articletitle","label":"Article Title"},{"value":"Information & Management","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.im.2023.103859","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2023 Elsevier B.V. All rights reserved.","name":"copyright","label":"Copyright"}],"article-number":"103859"}}