Entry and espionage with noisy signals

We analyze the effect of industrial espionage on entry deterrence. We consider a monopoly incumbent who may expand capacity to deter entry, and a potential entrant who owns an Intelligence System. The Intelligence System (IS) generates a noisy signal based on the incumbentʼs actions. The potential entrant uses this signal to decide whether or not to enter the market. The incumbent may signal-jam to manipulate the likelihood of the noisy signals and hence affect the entrantʼs decisions. If the precision of the IS is commonly known, the incumbent benefits from his rivalʼs espionage. Actually, he benefits more the higher is the precision of the IS while the spying entrant is worse off with an IS of relatively high quality. When the IS quality is private information of the entrant, the incumbent is better off with an IS of high expected precision while the entrant benefits from one of high quality. In this case espionage makes the market more competitive.

[1]  X. Vives Duopoly information equilibrium: Cournot and bertrand , 1984 .

[2]  Pankaj Ghemawat,et al.  CAPACITY EXPANSION IN THE TITANIUM DIOXIDE INDUSTRY , 1984 .

[3]  Pascal Billand,et al.  Spying in Multi-Market Oligopolies , 2010 .

[4]  George J. Mailath Simultaneous Signaling in an Oligopoly Model , 1989 .

[5]  Paul R. Milgrom,et al.  Predation, reputation, and entry deterrence☆ , 1982 .

[6]  Esther Gal-Or,et al.  First Mover Disadvantages with Private Information , 1987 .

[7]  Ramon Caminal,et al.  A Dynamic Duopoly Model with Asymmetric Information , 1990 .

[8]  Robert B. Wilson Strategic models of entry deterrence , 1992 .

[9]  Michael Raith A General Model of Information Sharing in Oligopoly , 1993 .

[10]  Merrill E. Whitney,et al.  An Inquiry Into the Rationale for Economic Espionage , 1999 .

[11]  S. J. Ho,et al.  Extracting the information: espionage with double crossing , 2008 .

[12]  Donald N. Sull easyJet's $500 million gamble , 1999 .

[13]  Amparo Urbano,et al.  Learning in asymmetric duopoly markets: competition in information and market correlation , 2005 .

[14]  B. Jullien,et al.  Dynamic duopoly with learning through market experimentation , 1993 .

[15]  A. Matsui Information Leakage Forces Cooperation , 1989 .

[16]  E. Gal‐Or,et al.  Information Transmission—Cournot and Bertrand Equilibria , 1986 .

[17]  J. Harrington,et al.  Limit Pricing When the Potential Entrant Is Uncertain of Its Cost Function [Limit Pricing and Entry under Incomplete Information: An Equilibrium Analysis] , 1986 .

[18]  Xavier Vives,et al.  Why market shares matter: an information-based theory , 1996 .

[19]  Leonard J. Mirman,et al.  Duopoly signal jamming , 1993 .

[20]  M. Riordan Imperfect Information and Dynamic Conjectural Variations , 1985 .

[21]  J. Scott Provan,et al.  The Use of Spies in Strategic Situations: Preliminary Report , 2008 .

[22]  H. Young,et al.  Handbook of Game Theory with Economic Applications , 2015 .

[23]  Elizabeth A. Hall,et al.  An analysis of preemptive behavior in the titanium dioxide industry , 1990 .

[24]  E. Gal‐Or,et al.  Information Sharing in Oligopoly , 1985 .

[25]  Esther Gal-Or The Advantages of Imprecise Information , 1988 .

[26]  Leeat Yariv,et al.  Games with espionage , 2004, Games Econ. Behav..

[27]  Joseph E. Harrington,et al.  Oligopolistic Entry Deterrence under Incomplete Information , 1987 .

[28]  Benjamin Pfaff Economic Espionage And Industrial Spying , 2016 .