1 Security and Lock - In Tom
نویسنده
چکیده
A customer experiences “lock-in” when the extra value it might obtain from a new supplier’s products or services is exceeded by the cost of switching from its current vendor. Customers may regret this state of affairs if they would have been better off having secured the alternative product from the start, or more simply, if the switching costs are substantially lower than the incremental value of the alternative supplier’s product (in which case, the customer will switch and capture the difference). Conversely, an incumbent supplier might appreciate and indeed encourage this state of affairs to the extent it can realize additional profit. These two interact in the sense that a supplier would likely forego additional profit (and a customer would receive lower prices) if switching costs were lower, even if the customer does not actually switch. Less apparently, though potentially more importantly, lock-in may have substantial impact on the types of product innovation a customer accesses, both directly from its supplier and indirectly through innovation in complementary products.
منابع مشابه
بررسی اثر TOM و اثر نیمه اول و دوم هر ماه بر روی بازدهی و حجم معاملات در بورس اوراق بهادار تهران
Several anomalies have been documented indicating that capital markets do not behave as rational as “modern portfolio theory” states in other words a set of emotional, psychological and irrational behaviors are common in capital markets. Several tests have been conducted to address this issue. A large number of these tests have justified the effect of behavioral factors on securities prices. On...
متن کاملTopics in Cable and Security: Selective Encryption and Economic Lock-In
A customer experiences lock-in when the extra value it might obtain from a new supplier’s product or services is exceeded by the cost of switching from its current vendor. Security technology is particularly potent as a source of lock-in, and the cable industry presents a powerful example of such lock-in. Cable system operators are locked-in by their equipment suppliers via the conditional acce...
متن کاملSecurity and Lock-In
A customer experiences “lock-in” when switching costs exceed the potential incremental value of alternative suppliers’ products over its current supplier’s product. Customers may regret this state of affairs if they would have been better off having secured the alternative product from the start, or more simply, if the switching costs were substantially lower than the incremental value of the a...
متن کاملQuery Process ing in LDV: A Secure Database System
This paper gives an overview of Query Processing of the Multilevel Secure Database Management System (MLSDBMS), LOCK Data Views (LDV), for the Secure Distributed Data Views contract. The prime contractor is Honeywell's Secure Computing Technology Center (SCTC) and the subcontractor is Honeywell's Corporate Systems Development Division (CSDD). The paper summarizes design issues such as data dist...
متن کاملSecuring Scan Design Using Lock & Key Technique
Scan test has been a common and useful method for testing VLSI designs due to the high controllability and observability it provides. These same properties have recently been shown to also be a security threat to the intellectual property on a chip [1]. In order to defend from scan based attacks, we present the Lock & Key technique. Our proposed technique provides security while not negatively ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2005