A Simple Economic Model to Explain Different Digitization Patterns
JOURNAL ARTICLE
Cite JOURNAL ARTICLE
Style
Format
A Simple Economic Model to Explain Different Digitization Patterns
Applied Economics Quarterly, Vol. 66 (2020), Iss. 4 : pp. 239–257
Additional Information
Article Details
Pricing
Author Details
Florian W. Bartholomae, Professor of Economics, Munich Business School, Elsenheimerstr. 61, 80687 Munich, Germany, and Privatdozent, Bundeswehr University Munich.
References
-
Allianz (2019): “Allianz Risk Barometer – Top Business Risks for 2019,” Munich: Allianz Global Corporate & Specialty SE, URL: https://www.agcs.allianz.com/assets/PDFs/Reports/Allianz_Risk_Barometer_2019.pdf.
Google Scholar -
Autor, D./Dorn, D./Katz, L. F./Patterson, C./Van Reenen, J. (2019): “The Fall of the Labor Share and the Rise of Superstar Firms,” URL: https://economics.mit.edu/files/12979.
Google Scholar -
Ba, S./Whinston, A. B./Zhang, H. (2000): “Small Companies in the Digital Economy,” in: Brynjolfsson, E., and Kahin, B. (eds): Understanding the Digital Economy. Data, Tools, and Research, Cambridge, MA: The MIT Press, 185–200.
Google Scholar -
Bachmann, M./Shahd, M./Grimm, F. (2015): “Spionage, Sabotage und Datendiebstahl – Wirtschaftsschutz im digitalen Zeitalter,” Berlin: Bitkom. URL: https://www.bitkom.org/sites/default/files/file/import/150709-Studienbericht-Wirtschaftsschutz.pdf.
Google Scholar -
Bandulet, M./Morasch, K. (2005): “Would You Like to be a Prosumer? Information Revelation, Personalization and Price Discrimination in Electronic Markets,” International Journal of the Economics of Business 12(2), 251–271.
Google Scholar -
Bartholomae, F. (2018a): “Cybercrime and Cloud Computing. A Game Theoretic Network Model,” Managerial and Decision Economics 39(3), 297–305.
Google Scholar -
Bartholomae, F. (2018b): Digital Transformation, International Competition and Specialization, CESifo Forum 19(4), 23–28.
Google Scholar -
Bartholomae, F./Wiens, M. (2016): Spieltheorie. Ein anwendungsorientiertes Lehrbuch, Wiesbaden: Springer Gabler.
Google Scholar -
Bartsch, M./Gentemann, L./Kob, T./Krösmann, C./Mille, M./Petri, A./Ritter, T./Rost, P./Schmidt, S./Schulz, M./Trapp, D./Wittmaack, L./Wunderlich, T. (2018): “Spionage, Sabotage und Datendiebstahl – Wirtschaftsschutz in der Industrie,” Studienbericht 2018, Berlin: Bitkom.
Google Scholar -
Berg, A. (2018): “Digitalisierung der Wirtschaft,” Berlin: Bitkom, URL: https://www.bitkom.org/sites/default/files/file/import/Bitkom-Charts-Digitalisierung-der-Wirtschaft-06-06-2018-final.pdf.
Google Scholar -
Berg, A. (2020): “Digitalisierung der Wirtschaft,” Berlin: Bitkom, URL: https://www.bitkom.org/sites/default/files/2020-03/bitkom-charts-digitalisierung-der-wirtschaft-01-04-2020_final.pdf.
Google Scholar -
Cremonini, M./Nizovtsev, D. (2006): “Understanding and influencing attackers’ decisions: Implications for security investment strategies,” in: Proceedings of 5th Workshop on the Economics of Information Security, Cambridge, UK.
Google Scholar -
Delbono, F./Denicoló, V. (1990): “R&D Investment in a Symmetric and Homogeneous Oligopol: Bertrand vs Cournot,” International Journal of Industrial Organization 8(2), 297–313.
Google Scholar -
DIHK (2017): “Wachsende Herausforderungen treffen auf größeren Optimismus. Das IHK-Unternehmensbarometer zur Digitalisierung 2017,” Berlin: DIHK.
Google Scholar -
Gravelle, H./Rees, R. (2004): Microeconomics, 3rd ed., Harlow: Prentice Hall.
Google Scholar -
Greiman, V. (2017): “Crime and Punishment in Cyberspace: National and International Perspectives,” in: Bryant, A., Mills, R., and Lopez, J. (eds): Proceedings of the 12th International Conference on Cyber Warfare and Security, Reading: Academic Conferences and Publishing International, 160–166.
Google Scholar -
Katz, M./Shapiro, C. (1985): “Network Externalities, Competition, and Compatibility,” The American Economic Review 75(3), 424–440.
Google Scholar -
Kopke, C./Petri, A./Kob, T./ Sopha, S. M./Holz, W./Seyerlein-Klug, A./Schulz, M./Geschonneck, A./Kröger, S./Münstermann, M. (2016): “Spionage, Sabotage und Datendiebstahl – Wirtschaftsschutz in der Industrie,” Berlin: Bitkom.
Google Scholar -
Kshetri, N. (2006): “The Simple Economics of Cybercrimes,” IEEE Security & Privacy 4(1), 33–39.
Google Scholar -
Kshetri, N. (2010): “The Global Cybercrime Industry: Economic, Institutional and Strategic Perspectives,” Heidelberg: Springer.
Google Scholar -
Linde, F. (2005): “Ökonomie der Information,” Göttingen: Universitätsverlag Göttingen.
Google Scholar -
Motta, M. (2004): “Competition Policy: Theory and Practice,” Cambridge: Cambridge University Press.
Google Scholar -
Rohleder, B./Schulte, K.-S. (2017): “Digitalisierung des Handwerks,” Berlin: Bitkom.
Google Scholar -
Shapiro, C./Varian, H. R. (1999): “Information Rules. A Strategic Guide to the Network Economy,” Boston, MA: Harvard Business Review Press.
Google Scholar -
Shy, O. (2001): “Industrial Organization. Theory and Applications,” Cambridge, MA: The MIT Press.
Google Scholar -
Shy, O. (2011): “A Short Survey of Network Economics,” Review of Industrial Organization 38, 119–149.
Google Scholar -
Spence, M. (1984): “Cost Reduction, Competition, and Industry Performance,” Econometrica 52(1), 101–122.
Google Scholar -
Varian, H. R. (2000): “Versioning Information Goods,” in: Kahin, B. & Varian, H. R. (eds), Internet Publishing and Beyond, Cambridge MA: MIT Press.
Google Scholar
Abstract
Many firms have to decide whether and how much of their business activities they want to digitize. Several studies point to considerable differences, especially between small- and large-sized firms. This paper develops a simple model that shows under which conditions digitization can be profitable for a firm. At first, different competitive situations are taken into account and subsequently, the effects of security problems on digitization decisions are examined using the example of the dangers of a cyberattack. The results show that digitization is a dominant strategy, which results in a prisoner’s dilemma if the competition is fierce. Moreover, in highly competitive markets, firms should set common security standards to protect against unauthorized access.
Table of Contents
Section Title | Page | Action | Price |
---|---|---|---|
Florian W. Bartholomae: A Simple Economic Model to Explain Different Digitization Patterns | 1 | ||
Abstract | 1 | ||
1. Introduction | 1 | ||
2. Simple Model of Digitization Decision | 2 | ||
3. Digitization and Cybercrime | 9 | ||
4. Decision for Data Security | 1 | ||
5. Conclusion and Recommendations for Action | 1 | ||
References | 1 |