Optimal adoptions of freemium version and patching strategy: Network and security externalities

The freemium pricing model has become mainstream in the software industry. A large user base can induce positive network effects while expanding security risks associated with unpatched users. This study explores a two-stage decision problem faced by software vendors that involves a freemium version...

Full description

Bibliographic Details
Main Authors: Nan Feng, Hanyue Zhang, Changqing Dong, Jie Zhang, Minqiang Li, Jing Xie
Format: Article
Language:English
Published: KeAi Communications Co., Ltd. 2022-03-01
Series:Journal of Management Science and Engineering
Subjects:
Online Access:http://www.sciencedirect.com/science/article/pii/S2096232021000640
_version_ 1811248846772109312
author Nan Feng
Hanyue Zhang
Changqing Dong
Jie Zhang
Minqiang Li
Jing Xie
author_facet Nan Feng
Hanyue Zhang
Changqing Dong
Jie Zhang
Minqiang Li
Jing Xie
author_sort Nan Feng
collection DOAJ
description The freemium pricing model has become mainstream in the software industry. A large user base can induce positive network effects while expanding security risks associated with unpatched users. This study explores a two-stage decision problem faced by software vendors that involves a freemium versioning strategy and a subsequent security-patching strategy when taking both the positive network externality and negative security externality into consideration. It is noteworthy that a joint effect of the two externalities on the vendor’s management decisions exists. First, we analytically derive three patching strategies for the vendor: PS1 (rebates all users), PS2 (rebates only freeware users), and PS3 (rebates no users). Our results indicate that, if the strength of the positive network externality is relatively low, the optimal security-patching strategy will be significantly affected by the negative security externality. Specifically, when the intensity of the negative security externality is low, the vendor’s optimal patching strategy will be PS1. However, with the increase in the negative security externality, the optimal patching strategy changes to PS2 and then to PS3, whereas the strategy spaces of PS1 and PS2 decrease in the positive network externality to zero. Nevertheless, if the strength of the positive network externality is relatively high, the vendor is better off selecting PS1 when the negative security externality is low. However, when the negative security externality is high, PS3 is optimal. Furthermore, based on optimal patching strategies, we reveal the optimal conditions required for the vendor to adopt the freemium model compared with commercial only. Of interest, we find that the vendor adopting the freemium version is also influenced by the interaction of the two externalities. Finally, through numerical experiments, we find that the vendor and social planner’s interests can be aligned under certain conditions. However, this is not always the case.
first_indexed 2024-04-12T15:35:11Z
format Article
id doaj.art-026459bb15844af89c7109147e0f1efd
institution Directory Open Access Journal
issn 2096-2320
language English
last_indexed 2024-04-12T15:35:11Z
publishDate 2022-03-01
publisher KeAi Communications Co., Ltd.
record_format Article
series Journal of Management Science and Engineering
spelling doaj.art-026459bb15844af89c7109147e0f1efd2022-12-22T03:26:58ZengKeAi Communications Co., Ltd.Journal of Management Science and Engineering2096-23202022-03-0171107132Optimal adoptions of freemium version and patching strategy: Network and security externalitiesNan Feng0Hanyue Zhang1Changqing Dong2Jie Zhang3Minqiang Li4Jing Xie5College of Management and Economics, Tianjin University, Tianjin, 300072, ChinaCollege of Management and Economics, Tianjin University, Tianjin, 300072, ChinaCollege of Management and Economics, Tianjin University, Tianjin, 300072, China; Corresponding author.College of Business Administration, University of Texas at Arlington, Arlington, TX, 76019, USACollege of Management and Economics, Tianjin University, Tianjin, 300072, ChinaCollege of Management and Economics, Tianjin University, Tianjin, 300072, ChinaThe freemium pricing model has become mainstream in the software industry. A large user base can induce positive network effects while expanding security risks associated with unpatched users. This study explores a two-stage decision problem faced by software vendors that involves a freemium versioning strategy and a subsequent security-patching strategy when taking both the positive network externality and negative security externality into consideration. It is noteworthy that a joint effect of the two externalities on the vendor’s management decisions exists. First, we analytically derive three patching strategies for the vendor: PS1 (rebates all users), PS2 (rebates only freeware users), and PS3 (rebates no users). Our results indicate that, if the strength of the positive network externality is relatively low, the optimal security-patching strategy will be significantly affected by the negative security externality. Specifically, when the intensity of the negative security externality is low, the vendor’s optimal patching strategy will be PS1. However, with the increase in the negative security externality, the optimal patching strategy changes to PS2 and then to PS3, whereas the strategy spaces of PS1 and PS2 decrease in the positive network externality to zero. Nevertheless, if the strength of the positive network externality is relatively high, the vendor is better off selecting PS1 when the negative security externality is low. However, when the negative security externality is high, PS3 is optimal. Furthermore, based on optimal patching strategies, we reveal the optimal conditions required for the vendor to adopt the freemium model compared with commercial only. Of interest, we find that the vendor adopting the freemium version is also influenced by the interaction of the two externalities. Finally, through numerical experiments, we find that the vendor and social planner’s interests can be aligned under certain conditions. However, this is not always the case.http://www.sciencedirect.com/science/article/pii/S2096232021000640FreemiumPositive network externalityNegative security externalityPatching strategy
spellingShingle Nan Feng
Hanyue Zhang
Changqing Dong
Jie Zhang
Minqiang Li
Jing Xie
Optimal adoptions of freemium version and patching strategy: Network and security externalities
Journal of Management Science and Engineering
Freemium
Positive network externality
Negative security externality
Patching strategy
title Optimal adoptions of freemium version and patching strategy: Network and security externalities
title_full Optimal adoptions of freemium version and patching strategy: Network and security externalities
title_fullStr Optimal adoptions of freemium version and patching strategy: Network and security externalities
title_full_unstemmed Optimal adoptions of freemium version and patching strategy: Network and security externalities
title_short Optimal adoptions of freemium version and patching strategy: Network and security externalities
title_sort optimal adoptions of freemium version and patching strategy network and security externalities
topic Freemium
Positive network externality
Negative security externality
Patching strategy
url http://www.sciencedirect.com/science/article/pii/S2096232021000640
work_keys_str_mv AT nanfeng optimaladoptionsoffreemiumversionandpatchingstrategynetworkandsecurityexternalities
AT hanyuezhang optimaladoptionsoffreemiumversionandpatchingstrategynetworkandsecurityexternalities
AT changqingdong optimaladoptionsoffreemiumversionandpatchingstrategynetworkandsecurityexternalities
AT jiezhang optimaladoptionsoffreemiumversionandpatchingstrategynetworkandsecurityexternalities
AT minqiangli optimaladoptionsoffreemiumversionandpatchingstrategynetworkandsecurityexternalities
AT jingxie optimaladoptionsoffreemiumversionandpatchingstrategynetworkandsecurityexternalities