Strategic Bypass Deterrence∗

نویسندگان

  • Francis Bloch
  • Axel Gautier
چکیده

In liberalized network industries, competitors can either compete for service using the existing infrastructure (access) or deploy their own capacity (bypass). We revisit this make-or-buy problem making two contributions to the literature. First we analyze both the profit maximizing behavior of an incumbent and the welfare maximizing behavior when the entrant chooses between access and bypass. Second, we extend the baseline model studied in the literature by allowing for fixed costs of network installation. By analogy to the literature on strategic entry deterrence, we distinguish three régimes of blockaded bypass, deterred bypass and accommodated bypass depending on the entrant’s unit cost. We show that the make-or-buy decision of the entrant is not necessarily technologically efficient: when bypass is chosen, it is always the cheapest option but access may be chosen when it is not cost effective.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Strategic Entry Deterrence and the Behavior of Pharmaceutical Incumbents Prior to Patent Expiration1

This paper develops a new approach to testing for strategic entry deterrence and applies it to the behavior of pharmaceutical incumbents just before they lose patent protection. The approach involves looking at a cross-section of markets and examining whether behavior is nonmonotonic in the size of the market. Under certain conditions, investment levels will be monotone in market size if firms ...

متن کامل

Coping with Information Security Breaches from Inside: A Strategic Approach

This study looks into the employment of deterrence to reduce security breaches within organisations. The result reveals that current deterrence is less influential. This study suggests that organisations should shift towards the detection of violations and the identification of perpetrators. The research also presents a conceptual architecture of multiple strategies. Keywords— Information Secur...

متن کامل

Anticipated Entry and Entry Deterrence: Evidence from the American Casino Industry∗

Using new data on entry plans into the American casino industry, I find that incumbent firms invest in physical capacity when threatened with a nearby entry plan, and these strategic investments deter eventual entry. Consistent with an entry deterrence motive, incumbents respond to the threat of entry during planning when entry is uncertain, but do not invest in physical capacity when entry is ...

متن کامل

Key strategic issues with rural drink drive enforcement

Rural drink driving is a serious road safety issue which contributes to a significant number of fatalities and injuries in New Zealand annually. Although enforcement remains a key mechanism for reducing the incidence of rural drink driving, there are a number of crucial strategic issues that influence its effectiveness, including: who should conduct the enforcement, resource availability, enfor...

متن کامل

Strategic Operations in the Cyber Domain and their Implications for National Cyber Security

With the public discussion mainly revolving around deterrence (either by denial or by punishment), there are actually a number of strategies which can be applied to cyber operations. A cyber strategy can be thought of as an umbrella for various individual cyber operations with the ultimate aim to achieve a strategic and / or political goal. Thus, cyber strategies can be defined as the developme...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012