Menu Expand

Cite JOURNAL ARTICLE

Style

Bartholomae, F. A Simple Economic Model to Explain Different Digitization Patterns. Applied Economics Quarterly, 66(4), 239-257. https://doi.org/10.3790/aeq.66.4.239
Bartholomae, Florian W. "A Simple Economic Model to Explain Different Digitization Patterns" Applied Economics Quarterly 66.4, , 239-257. https://doi.org/10.3790/aeq.66.4.239
Bartholomae, Florian W.: A Simple Economic Model to Explain Different Digitization Patterns, in: Applied Economics Quarterly, vol. 66, iss. 4, 239-257, [online] https://doi.org/10.3790/aeq.66.4.239

Format

A Simple Economic Model to Explain Different Digitization Patterns

Bartholomae, Florian W.

Applied Economics Quarterly, Vol. 66 (2020), Iss. 4 : pp. 239–257

Additional Information

Article Details

Pricing

Author Details

Florian W. Bartholomae, Professor of Economics, Munich Business School, Elsenheimerstr. 61, 80687 Munich, Germany, and Privatdozent, Bundeswehr University Munich.

References

  1. Allianz (2019): “Allianz Risk Barometer – Top Business Risks for 2019,” Munich: Allianz Global Corporate & Specialty SE, URL: https://www.agcs.allianz.com/assets/PDFs/Reports/Allianz_Risk_Barometer_2019.pdf.  Google Scholar
  2. Autor, D./Dorn, D./Katz, L. F./Patterson, C./Van Reenen, J. (2019): “The Fall of the Labor Share and the Rise of Superstar Firms,” URL: https://economics.mit.edu/files/12979.  Google Scholar
  3. Ba, S./Whinston, A. B./Zhang, H. (2000): “Small Companies in the Digital Economy,” in: Brynjolfsson, E., and Kahin, B. (eds): Understanding the Digital Economy. Data, Tools, and Research, Cambridge, MA: The MIT Press, 185–200.  Google Scholar
  4. Bachmann, M./Shahd, M./Grimm, F. (2015): “Spionage, Sabotage und Datendiebstahl – Wirtschaftsschutz im digitalen Zeitalter,” Berlin: Bitkom. URL: https://www.bitkom.org/sites/default/files/file/import/150709-Studienbericht-Wirtschaftsschutz.pdf.  Google Scholar
  5. Bandulet, M./Morasch, K. (2005): “Would You Like to be a Prosumer? Information Revelation, Personalization and Price Discrimination in Electronic Markets,” International Journal of the Economics of Business 12(2), 251–271.  Google Scholar
  6. Bartholomae, F. (2018a): “Cybercrime and Cloud Computing. A Game Theoretic Network Model,” Managerial and Decision Economics 39(3), 297–305.  Google Scholar
  7. Bartholomae, F. (2018b): Digital Transformation, International Competition and Specialization, CESifo Forum 19(4), 23–28.  Google Scholar
  8. Bartholomae, F./Wiens, M. (2016): Spieltheorie. Ein anwendungsorientiertes Lehrbuch, Wiesbaden: Springer Gabler.  Google Scholar
  9. Bartsch, M./Gentemann, L./Kob, T./Krösmann, C./Mille, M./Petri, A./Ritter, T./Rost, P./Schmidt, S./Schulz, M./Trapp, D./Wittmaack, L./Wunderlich, T. (2018): “Spionage, Sabotage und Datendiebstahl – Wirtschaftsschutz in der Industrie,” Studienbericht 2018, Berlin: Bitkom.  Google Scholar
  10. Berg, A. (2018): “Digitalisierung der Wirtschaft,” Berlin: Bitkom, URL: https://www.bitkom.org/sites/default/files/file/import/Bitkom-Charts-Digitalisierung-der-Wirtschaft-06-06-2018-final.pdf.  Google Scholar
  11. Berg, A. (2020): “Digitalisierung der Wirtschaft,” Berlin: Bitkom, URL: https://www.bitkom.org/sites/default/files/2020-03/bitkom-charts-digitalisierung-der-wirtschaft-01-04-2020_final.pdf.  Google Scholar
  12. Cremonini, M./Nizovtsev, D. (2006): “Understanding and influencing attackers’ decisions: Implications for security investment strategies,” in: Proceedings of 5th Workshop on the Economics of Information Security, Cambridge, UK.  Google Scholar
  13. Delbono, F./Denicoló, V. (1990): “R&D Investment in a Symmetric and Homogeneous Oligopol: Bertrand vs Cournot,” International Journal of Industrial Organization 8(2), 297–313.  Google Scholar
  14. DIHK (2017): “Wachsende Herausforderungen treffen auf größeren Optimismus. Das IHK-Unternehmensbarometer zur Digitalisierung 2017,” Berlin: DIHK.  Google Scholar
  15. Gravelle, H./Rees, R. (2004): Microeconomics, 3rd ed., Harlow: Prentice Hall.  Google Scholar
  16. Greiman, V. (2017): “Crime and Punishment in Cyberspace: National and International Perspectives,” in: Bryant, A., Mills, R., and Lopez, J. (eds): Proceedings of the 12th International Conference on Cyber Warfare and Security, Reading: Academic Conferences and Publishing International, 160–166.  Google Scholar
  17. Katz, M./Shapiro, C. (1985): “Network Externalities, Competition, and Compatibility,” The American Economic Review 75(3), 424–440.  Google Scholar
  18. Kopke, C./Petri, A./Kob, T./ Sopha, S. M./Holz, W./Seyerlein-Klug, A./Schulz, M./Geschonneck, A./Kröger, S./Münstermann, M. (2016): “Spionage, Sabotage und Datendiebstahl – Wirtschaftsschutz in der Industrie,” Berlin: Bitkom.  Google Scholar
  19. Kshetri, N. (2006): “The Simple Economics of Cybercrimes,” IEEE Security & Privacy 4(1), 33–39.  Google Scholar
  20. Kshetri, N. (2010): “The Global Cybercrime Industry: Economic, Institutional and Strategic Perspectives,” Heidelberg: Springer.  Google Scholar
  21. Linde, F. (2005): “Ökonomie der Information,” Göttingen: Universitätsverlag Göttingen.  Google Scholar
  22. Motta, M. (2004): “Competition Policy: Theory and Practice,” Cambridge: Cambridge University Press.  Google Scholar
  23. Rohleder, B./Schulte, K.-S. (2017): “Digitalisierung des Handwerks,” Berlin: Bitkom.  Google Scholar
  24. Shapiro, C./Varian, H. R. (1999): “Information Rules. A Strategic Guide to the Network Economy,” Boston, MA: Harvard Business Review Press.  Google Scholar
  25. Shy, O. (2001): “Industrial Organization. Theory and Applications,” Cambridge, MA: The MIT Press.  Google Scholar
  26. Shy, O. (2011): “A Short Survey of Network Economics,” Review of Industrial Organization 38, 119–149.  Google Scholar
  27. Spence, M. (1984): “Cost Reduction, Competition, and Industry Performance,” Econometrica 52(1), 101–122.  Google Scholar
  28. Varian, H. R. (2000): “Versioning Information Goods,” in: Kahin, B. & Varian, H. R. (eds), Internet Publishing and Beyond, Cambridge MA: MIT Press.  Google Scholar

Abstract

Many firms have to decide whether and how much of their business activities they want to digitize. Several studies point to considerable differences, especially between small- and large-sized firms. This paper develops a simple model that shows under which conditions digitization can be profitable for a firm. At first, different competitive situations are taken into account and subsequently, the effects of security problems on digitization decisions are examined using the example of the dangers of a cyberattack. The results show that digitization is a dominant strategy, which results in a prisoner’s dilemma if the competition is fierce. Moreover, in highly competitive markets, firms should set common security standards to protect against unauthorized access.

Table of Contents

Section Title Page Action Price
Florian W. Bartholomae: A Simple Economic Model to Explain Different Digitization Patterns 1
Abstract 1
1. Introduction 1
2. Simple Model of Digitization Decision 2
3. Digitization and Cybercrime 9
4. Decision for Data Security 1
5. Conclusion and Recommendations for Action 1
References 1