Macmillan - The Economics of Electronic Commerce
Macmillan - The Economics of Electronic Commerce
Macmillan - The Economics of Electronic Commerce
Contents
About This Book
Trademark Acknowledgments
Credits
-----------
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 7
-----------
Contents
Contents at a Glance
Chapter One
Electronic Commerce and the Internet 1
Chapter Two
Characteristics of Digital Products and Processes 59
Chapter Three
Internet Infrastructure and Pricing 93
Chapter Four
Quality Uncertainty and Market Efficiency 137
Chapter Five
Economic Aspects of Copyright Protection 175
Chapter Six
Signaling Quality and Product Information 213
Chapter Seven
Consumers' Search for Information 263
Chapter Eight
Product Choices and Discriminatory Pricing 313
Chapter Nine
Financial Intermediaries and Electronic Commerce 373
Chapter Ten
Electronic Payment Systems 407
Chapter Eleven
Business and Policy Implications of Electronic Commerce 463
Chapter Twelve
Future Directions for Economic Research 539
Index 583
Page 8
Page 9
Table of Contents
1 Electronic Commerce and the Internet 1
1.1. Developments in Internetworking 2
Distributed and Networked Computing 3
Open Networks 5
Two-way Communications and the Web 9
1.2. Electronic Commerce 12
Electronic Commerce Examples 13
Electronic Commerce as a Communications Network 15
Electronic Commerce of Digital Products 16
Commercial Potential of the Internet 21
1.3. Market Characteristics of Electronic Commerce 22
Current Commercial Uses of the Internet 23
User Characteristics 25
Competition and Market Organization 27
Business Organization and Virtual Firms 30
Legal Environment 32
1.4. Current Issues in Electronic Commerce 35
Contents and Quality 35
Copyrights versus Users Rights 38
Copyright and the Freedom of Speech 39
Legal and Economic Considerations of Copyrights
40
Interactive Advertising and the Use of Consumer Information 41
Push or Pull Advertising 42
Measuring the Impact of Online Advertising 43
Targeted Advertising and Privacy 44
Internet Intermediaries 45
Security and Privacy of Internet Transactions 46
Page 10
Pricing Strategies for Digital Products 48
Online Taxation, Regulation, and Other Legal Issues 50
1.5. Summary 51
References 53
Suggested Readings and Notes 54
History of the Internet 54
Firms and Markets 54
Electronic Data Interchange (EDI) 55
Internet Resources 55
Implications of Digital Process 55
The Internet Society (ISOC) 56
2 Characteristics of Digital Products and Processes 59
2.1. What Are Digital Products? 60
2.2. Characteristics of Information Products 64
Dependence on Individual Preference 65
Transitory or Cumulative Utility 65
Externalities of Information Products 66
Intrinsic Values of Digital Products 69
2.3. The Physical Nature of Digital Products 69
Indestructibility 70
Transmutability 72
Reproducibility 73
Physical Nature and Economic Issues 74
Product Selection Strategies Based on the Taxonomy 84
Changing Time Dependence 85
Changing Usage Patterns 85
Transfer Mode and Externalities 86
2.4. Summary 87
References 89
Page 11
Suggested Readings and Notes 89
Value of Information 89
Electronic Markets 90
Network Externalities 90
Internet Resources 91
Java Programming Language 91
Commercial Sites Index 91
Virtual Museums and Florist 91
Medical Sites on the Internet 92
3 Internet Infrastructure and Pricing 93
3.1. Internet Pipelines 93
3.2. Traffic Control on the Internet 96
Packet Switching 96
Internet Protocol Addresses 97
Transmission Control Protocol 100
Unicast, Broadcast, and Multicast 100
3.3. The Infrastructure Convergence 103
The Convergence in the Last Mile 104
Long-Haul Traffic 107
3.4. Congestion and Infrastructure Pricing 109
Ideal Economic Pricing Proposals 112
Dynamic Optimal Pricing 114
Static Priority Pricing 117
The Smart-Market Approach 118
Connection-Only and Flat-Rate Pricing 119
Voluntary User Declarations 122
Synopsis 122
3.5. Public Policy and Infrastructure 123
Public Policy for a Publicly Owned Network 124
Public Policy for a Privately Owned Network 125
3.6. Summary 127
References 130
Page 12
Suggested Readings and Notes 133
Further Readings on Game Theory 133
Internet Resources 133
The Internet Networking Infrastructure 133
Domain Name Registration 134
MBONE (Multicast Backbone) 134
IETF IP Multicasting Proposals 135
Broadband Online Services 135
4 Quality Uncertainty and Market Efficiency 137
4.1. Economics of the Lemons Market 139
Price as a Signal for Quality 141
Remedies for the Lemons Problem 143
4.2. Information Channels in Electronic Commerce 145
Sellers Provide Product Information 145
Freeware, Shareware, and Other Promotions 148
Free Products Online 148
The Economics of Try-Outs 150
Third-Party Information 152
Retailers and Other Brokers 153
4.3. Quality and Intermediaries 155
Transactional Efficiencies 156
Intermediaries as Experts 158
Intermediaries as an Information Source 161
Intermediaries as Producers 162
4.4. Intermediaries and Contracts 163
Subcontracting Systems 164
Incomplete Contracts 166
4.5. Summary 169
References 170
Suggested Readings and Notes 171
Economics of the Lemons Problem 171
Repeat Purchases and Reputation 172
Page 13
Internet Resources 173
Internet Commerce 173
Internet and Economics 173
5 Economic Aspects of Copyright Protection 175
5.1. Economic History of Copyright 176
The Property Aspect of Copyright 178
The Authorship Aspect of Copyright 183
Public Interest 184
5.2. The Nuts and Bolts of Copyrights 186
Objects Covered by Copyright 186
Terms of Copyright 187
Works That Cannot Be Copyrighted 187
Specific Rights of Authors Granted by Copyright 189
Fair Use Doctrine 190
Other Intellectual Property Laws 191
5.3. Copyright Protection and Digital Products 192
Reproduction 192
Reproductions on the Internet 193
Economic Implications of Reproduction 195
Resale and Distribution 195
Resale and the First Sale Doctrine 196
Resale Prevention and Pricing 198
Content Control 200
5.4. Market Protection Through Business Strategies 202
5.5. Policy Implications 204
Copyright and Antitrust Concerns 205
5.6. Summary 207
References 209
Suggested Readings and Notes 210
Historical Development of Copyright Laws 210
Patents and Economics 211
Page 14
Internet Resources 211
Articles 211
Internet Copyright Sites 212
Texts of Copyright Laws 212
World Intellectual Property Organization (WIPO)
Conference Resources 212
6 Signaling Quality and Product Information 213
6.1. Advertising on the Internet 214
Growth in Electronic Advertising 215
Types of Internet Advertising 217
Banner Ads 218
Selling Advertising to Consumers 220
Web Storefronts 222
6.2. The Economics of Advertising 223
The Economic Roles of Advertising 224
The Informational Content of Advertising 231
Information about Information Products 231
The Effect of Advertising on Price 234
Advertising and Product Differentiation 237
6.3. Other Strategies to Convey Product Information 239
Repeat Purchases and Reputation 239
Reputation Building in Electronic Commerce 240
Renting a Reputation 241
Shareware and Wasted Investments 242
Quality Guarantees for Digital Products 243
6.4. Marketing Strategies for the Internet 244
Myths and Popular Wisdom about Online Advertising 245
Broadcast versus Targeted Advertising 246
Push versus Pull Advertising 249
Advertisements as Commodities 251
Passive versus Active Marketing 252
Electronic Malls and Intermediaries 253
Page 15
Is Online Advertising Effective? 254
Providing Consumer Information 256
6.5. Summary 257
References 258
Suggested Readings and Notes 260
Advertising and Competition 260
Signaling 260
Internet Resources 261
Web Directory for Advertising 261
Popular Wisdom on Internet Marketing 261
Shareware Resources 262
7 Consumers' Search for Information 263
7.1. Consumer Searches and Economic Efficiency 263
Search Costs 265
Consumer Searches and Electronic Commerce 267
Digital Products and Consumer Searches 269
7.2. The Search Market and Intermediaries 270
Search Market Efficiency 271
Search Efficiency in Intermediaries 276
Search Efficiency in Informational Content 278
7.3. Search Engines on the Internet 280
Search or Surf? 281
Inadequacies of Search Engines 281
7.4. Market Efficiency In Various Information Sources 282
The World Wide Web 283
Web Searches 284
Gopher 285
Gopher Search 285
Anonymous FTP and Telnet 286
FTP Search by Archie 287
UseNet 287
Page 16
Mailing Lists 289
Electronic Messaging 290
E-mail Address Search 292
Consumer Learning and Search 292
7.5. Information Efficiency in Web Search Engines 294
Information Acquisition and Efficiency 298
Advertising versus Consumer Searching 305
7.6. Summary 307
References 309
Suggested Readings and Notes 309
Consumer Search 309
Internet Resources 310
Search Engines 310
Software Agents and Filtering 311
Robomoderation 311
8 Product Choices and Discriminatory Pricing 313
8.1. Product Differentiation and Pricing in Economics 315
What Is Product Differentiation? 315
Horizontal Differentiation 316
Vertical Differentiation 317
The Incentive to Differentiate 318
Chamberlinian Monopolistic Competition 319
Price Discrimination 320
Variations in Consumption Values: A Simple Case of
Price Discrimination 322
Product Matching 323
8.2. Product Customization 325
Sellers' Use of Transmutability 325
Gains and Losses from Customization 328
Consumer Arbitrage 328
Reduced Waste 329
Page 17
Price Discrimination 329
8.3. Use of Consumer Information 331
Primary and Secondary Consumer Information 331
Privacy and Anonymity 337
Anonymity as a Myth 337
Legal Efforts to Protect Privacy 340
Market-Based Solution to Protect Personal
Information 341
Consumer Information and Discriminatory Pricing 344
8.4. Pricing Digital Products 347
Cost Curves 348
Standard U-Shaped Average Cost Curve 348
Average Cost Curve of a Digital Product 349
Strategic Factors in Pricing 352
Quality Choices 352
Product Differentiation 355
Incentive Compatible Prices 356
Selling versus Renting Digital Products 359
Subscription and Bundling 361
The Case for Microbundles and Micropayments 365
8.5. Summary 367
References 368
Suggested Readings and Notes 369
Nonlinear Pricing 369
Product Differentiation 370
Price Discrimination 370
Internet Resources 371
Customized Internet Products 371
Privacy on the Internet 371
Cookies 372
Spoofing on the Internet 372
9 Financial Intermediaries and Electronic Commerce 373
9.1. Types of Financial Intermediaries 375
Page 18
9.2. Transactional Efficiencies 378
Phases of Transaction 379
Efficiency in Search Process 379
Negotiation and Settlement Processes 381
Financial Intermediaries: Electronic Market Case Studies 382
Internet Initial Public Offerings 383
Digital Exchange Markets 385
9.3. Transformation Functions 388
Maturity Transformation 389
Volume Transformation 389
Electronic Commerce Effects 390
9.4. Information Brokerage 390
Information Uncertainty and Risk 390
Information Trading 391
Certification and Assurance 394
9.5. Summary 399
References 401
Suggested Readings and Notes 402
Financial Intermediation and Credit Rationing 402
Internet Resources 403
Electronic Banking Resource Center 403
Encryption Technologies 403
Financial Services on the Internet 404
Digital Signature and Certification Services 404
10 Electronic Payment Systems 407
10.1 Electronic Payment Systems: An Overview 407
Payment Patterns 408
Types of Electronic Payment Systems 410
Conventional Payment Process 411
10.2. Payment Clearing Services 417
10.3. Notational Funds Transfer 421
Page 19
10.4. Digital Currency Payment Systems 426
Money as a Medium of Exchange 427
Inside Money and Outside Money 428
Needs for Electronic Currency Payment Systems 430
Anonymity in Transactions 430
Micropayments and the Internet 430
The Transferability of Value 431
10.5. Properties and Specifications of Digital
Currencies 432
Desirable Properties of Digital Currency 432
Monetary Value 432
Convenience 433
Security 433
Authentication 434
Non-Refutability 434
Accessibility and Reliability 434
Anonymity 435
Technical Specifications of Digital Currencies 435
Ecash 436
Millicent 438
Mondex 439
10.6. Evaluation and Policy Issues 440
Information Contents of Transactions 440
Transactional Efficiency 442
Monetary Effects 443
Effects on Market Organization 449
10.7. Digital Currency and Governments 451
Effects on Government Revenues 452
Regulatory Issues 453
Issues in International Commerce 455
10.8. Summary 457
References 459
Page 20
Suggested Readings and Notes 460
Quantity Theory of Money 460
Monetary Freedom 460
Electronic Payment Systems 461
Internet Resources 462
Electronic Money Resources 462
Standard Electronic Transactions (SET) 462
11 Business and Policy Implications of Electronic Commerce 463
11.1. Internet as the Great Equalizer 464
The Virtual Equality 464
The Reputational Transfer 465
Declining Average Costs and the Advantage of Size 466
Product Differentiation and Size 467
11.2. Search Service and Its Market Implications 468
Advertising in Broadcast Media 469
Search Engines and Advertising 471
Digital Cataloging Guidelines 472
Content Description 472
Search Interfaces 473
11.3. Copyright Protection Standards 474
11.4. The Use of Consumer Information 475
11.5. Digital Products and Pricing 477
Bundling and Subscription 477
Unbundling and Micropayments 482
Micropayments and Product Quality 483
Information Products and Economics 487
11.6. Taxation and the Future of Electronic Commerce 489
Taxable Item 489
Taxes on Access 490
Taxes on Transactions 492
Sales versus Transfer of Copyrights 496
Page 21
11.7. Anonymity and Legal Environment for Commerce 497
11.8. Global Framework for Electronic Commerce 501
Convergence in Spatial Markets 502
Artificial Borders 503
Uniform Commercial Environment 505
11.9. Antitrust and Regulation Policies 510
Economies of Scale and Regulation 511
Interoperability, Standardization, and Market Dominance 513
Network Externality and Monopolization 516
Monopoly and Welfare Loss: The Problem 516
Externalities and Their Effects 520
Network Effects versus Network Externalities 522
Anticompetitive Behaviors 523
Common Carriers and Microsoft 524
Vertical Integration and Retail Wheeling 525
11.10. The Economics of Electronic Commerce and the Internet 528
The Economics of Electronic Commerce 529
The Economics of Information Infrastructure 531
11.11. Summary 533
References 534
Suggested Readings and Notes 536
Law for the Internet 536
Internet Resources 536
Online Commerce and Taxation 536
Laws Regarding Computers 536
Internet Telephony 537
12 Future Directions for Economic Research 539
Page 22
12.1. The Role of Enabling Technologies 543
12.2. The Virtual World is Built on the Physical World 547
12.3. Components of the Virtual Economy 551
12.4. The Convergence 553
Convergence and the Market Structure 556
12.5. The Virtual Economy in Action 558
12.6. Growth of Virtual Intermediaries 563
12.7. Customization and Smart Products 566
Producer's Customization and Market Research 566
Online Market Research 568
Online Learning 569
Consumer Customization 571
12.8. Globalization and Cybernations 573
12.9. Market-Clearing Mechanisms 576
12.10. Summary 578
References 580
Internet Resources 581
Smart Products 581
Habitat and Virtual Communities 581
The 21st Century Technologies 581
Index 583
Table of Contents | Next
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 1
-----------
Soon-Yong Choi
Dale O. Stahl
Andrew B. Whinston
Trademark Acknowledgments
All terms mentioned in this book that are known to be trademarks or service
marks have been appropriately capitalized. Macmillan Technical Publishing
cannot attest to the accuracy of this information. Use of a term in this book
should not be regarded as affecting the validity of any trademark or service
mark.
Page 5
Credits
Graphics Image Specialists
Acquisitions Editor Tom Stone
Sadie Crawford, Wil Cruz
Senior Editors Sarah Kearns Production Analyst Erich
Suzanne Snyder Richter
Production Team Tricia Flodder,
Aleata Howard, Malinda Kuhn,
Project Editor Brad Herriman
Rowena Rappaport, Pamela
Woolf,
Copy Editors Margo Catts Keith Cline
Indexer Virginia Bess
Malinda McCain John Sleeva Sharon Wilke
Assistant Marketing Manager Gretchen
Schlesinger
Acquisitions Coordinators Amy Lewis Tim
Micheli
Cover Designer Gary Adair
Cover Production Aren Howell
Book Designer Glenn Larsen
Manufacturing Coordinator Brook Farling
Director of Production Larry Klein
Production Team Supervisors Laurie Casey
Joe Millay
Page 6
Previous | Table of Contents | Next
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 1
-----------
CHAPTER 1
1.1.Developments in Internetworking
The Internet is a network of networks. Each network is comprised of
com-puters connected by wire or wireless mediums, such as radio signals, that
enable component computers to "talk" to each other. Once computers are
networked, files on one computer can be accessed from any other computer on
the network; messages can be exchanged, and limited resources such as
printers can be shared. Large or small, each network is owned and managed by
a company or a single group with the exception of the Internet.
The Internet is not owned or managed by any single entity, although its
component networks are independent units managed and usually paid for by
the network's owners. (Chapter 3, section 3.6, covers Internet technology and
infrastructure in detail; in this chapter, we focus on general characteristics of
the Internet as a market infrastructure.) Computers on these component
networks became a part of the larger Internet when they used the same
standard for cross-communication—the TCP/IP protocol—known as the
language of the Internet. Therefore, any computer "speaking" TCP/IP protocol
is Internet-enabled in terms of connectivity.
The Internet is clearly the largest network of computers in existence today.
There are, however, many non-Internet networks such as commercial online
services that are quite large in their own right. The sudden dominance of the
Page 3
Internet as a model mechanism for information transfers and commercial
transactions may seem accidental in view of these large networks. However,
the Internet or Internet-like networks have two overriding factors in their favor
to become a market infrastructure: distributed computing and openness.
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 5
-----------
agents. The scope of market activities undertaken by these agents will be
defined as the commerce on the Internet matures. However, the organization of
agents in electronic commerce will be sufficiently different from physical
markets. For example, the traditional difference between a wholesaler and a
retailer is lost in the digital marketplace because a producer only needs to
transmit one copy to an intermediary. An efficient market organization is more
likely because activities of each agent involved in a transaction, from
production to payment and consumption, may be monitored and evaluated
more efficiently, and new product strategies and pricing can be implemented
rapidly and concurrently. Such changes in market organization are the subject
matter of later chapters.
Open Networks
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 8
-----------
While the level of performance guarantee for the Internet is lower than that for
private networks, the chance for a catastrophic failure is lower for the Internet
compared to a private network that is controlled and administered by a central
authority. A message traveling on the Internet will be rerouted if a part of the
Internet fails. At the same time, eavesdropping on the Internet is not targeted
or specific, as in the case of private networks. Since private networks carry
designated information over the same network, the result of a security breach
will be more severe than on the Internet, where message packets travel in
mixed jumbles. When the next generation of Internet standards are
implemented along with content-level encryption, the security of the Internet
may become a concern in mostly isolated instances.
While security and reliability will significantly increase in the next generation
Internet, its ever-increasing traffic due to multimedia, real-time, and
broadcasting applications may not result in any noticeable improvement in
terms of network congestion. More efficient compression technologies, faster
modems, and larger pipelines will certainly increase the absolute size of the
Internet bandwidth. However, cheaper and more abundant integrated circuits
and powerful microprocessors have been overwhelmed by concurrent, or
outpacing, increases in the demand for computational power. Similarly,
congestion may become a more critical issue in electronic commerce than
network security problems that have worried many prospective online
marketers.
Who Controls the Internet?
From its beginning in 1969 as ARPAnet (Advanced Research
Projects Agency of the U.S. Defense Department), connections to
the Internet have been based on open standards to provide
flexibility and robustness in order to maintain communications
capability even under a catastrophic disaster or a serious system
failure in some of the network's component computers.
As the Internet grew into a network of networks, no single
computer or network acted as a central authority. However, as in
other social organizations, there are certain groups whose
opinions matter.
Page 9
At the top of these groups is the Internet Society or ISOC
(http://info.isoc.org/index.html), shown in figure 1.1. The Internet
Society is a volunteer membership organization that appoints the
Internet Architecture Board, or the IAB (http://www.iab.org/iab/).
The IAB is responsible for maintaining interoperable standards
for communications as well as Internet addressing.
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 12
-----------
1.2.Electronic Commerce
In this section, electronic commerce is defined. This is not as simple as it
sounds, because electronic commerce is a fast-moving target. The definition is
ever-changing and expanding to include more and more sectors of the
economy, as the influence of electronic communications extends. A
conventional definition emphasizes technological aspects in an attempt to
provide a lasting concept. The following sections stress economic aspects and
define electronic commerce as a new market offering a new type of
commodity, such as digital products through digital processes. Sellers of
physical products are affected as well by digital processes—online ordering,
market research, and payment settlement—and are part of this new market.
Page 13
● Ordering products
● Customer service
Page 14
All are conducted online. The use of the Internet to support marketing and
customer-interface is only part of electronic innovations that are changing the
way firms do business. With intranets, corporations distribute internal memos
and announcements to their employees, and knowledge exchange and
scheduling communications flow worldwide in a timely fashion. With direct
connection to suppliers (for instance, an extended intranet), the same
technology is used for manufacturing and supply-chain management. 3M
(http://www. mmm.com), for example, expanded its EDI service to the
Internet, allowing its over 2,000 suppliers and customers access to its EDI
transactions via any way they choose—private VANs, phones, and faxes, as
well as the Internet. To sum up, for within-business, business-to-consumer,
and business-to-business applications, electronic commerce includes:
● Internal electronic mail and messaging
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 16
-----------
afforded small and medium size companies to take advantage of electronic
transactions.
However, many interactions between sellers and buyers happen before they are
ready to exchange orders and bills. A somewhat broader view of electronic
commerce includes these interactions between businesses and consumers.
Consumer services and product announcements have been routinely released to
the Internet by computer companies for many years. And increasingly, firms are
gearing up for Internet advertising and marketing. Going even further down the
digital road, electronic shops and malls are springing up that offer electronic
versions of catalog shopping in which consumers can search and order products
using web browsers, bypassing traditional paper and phone-based
merchandising. Organizations devoted to commercial uses of the Internet such
as CommerceNet (http://ww.commerce.net) and government agencies such as
the National Telecommunications and Information Administration (NTIA)
(http://www.ntia.doc.gov) have encouraged doing business electronically by
virtue of their presence on the Internet. As recently as September, 1996,
Yahoo!'s list of online malls contained over 700 shops (http://www.yahoo.
com/text/Business_and_Economy/Companies/Shopping_Centers/Online_Malls)
and Open Market's Commercial Sites Index contained 41,731 listings of
commercial web sites in October, 1996
(http://www.directory.net/dir/statistics.html).
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 20
-----------
especially for small value items, will spur an explosive growth in digital
products trading. In the immediate future, CD-ROM and disk-based sales will
be conducted online as the transmission speed bottleneck is removed. And
digital products are not limited to information or "infotainment" products. All
paper-based products, like posters, calendars, and all sorts of tickets, and all
other products comprised of graphics, images, and sound can be converted into
or replaced by digital counterparts. Even some products representing value
may take a digital form, as in digital currency and electronic checks, stocks,
and bonds. Some purely physical products are made into smart products that
allow digital interfaces for monitoring and control—smart cars, smart boilers,
and home security systems. Users will be able to interact with these products
via email, exchange personal settings online, or download trouble-shooting
programs. Essentially, all types of business services and processes have the
potential to become digital products exchanged on a digital network,
expanding the core of electronic commerce (see figure 1.4). Whether directly,
through their own businesses, or through the businesses of their competitors,
the producers of both digital and physical products will be affected by the
trends in electronic commerce.
The size of the market, judged by the number of agents or domain names, is
growing rapidly on the Internet. The growth rate in the number of Internet
hosts is exponential; it grew from about 300,000 in 1990 to over 12 million by
the end of 1996 (see figure 1.5). Admittedly, most of these Internet sites are
only potentially commercial. But the awareness of its commercial use among
businesses is growing. According to the O'Reilly & Associates' Internet Survey
(http://www.ora.com), almost half of all large companies with 1000 or more
employees surveyed in 1995 have created an Internet presence through
publicly accessible World Wide Web pages
(http://www.ora.com/gnn/bus/ora/survey/index.html). Medium-size companies
(between 101 and 999 employees) show a weaker presence at 35 percent.
Although the relatively lower cost and larger reach of Internet-based marketing
and commerce is very well suited to small and medium companies, large
companies seem to have more experience from EDIs and better recognize the
need for establishing their presence.
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 24
-----------
The same survey reports that many of these companies are not entirely
convinced that the Internet has improved the business environment
significantly. At present, most Internet-savvy companies are content to provide
company and product information for public access, and to augment electronic
messaging capabilities for intrabusiness communications by adding intranets
into their corporate networks. While the interest for commercial use of the
Internet is growing, there seems to be a widespread skepticism and uncertainty
about the potential of Internet commerce. A more willing acceptance for doing
business online depends on these companies gaining a better understanding of
how electronic commerce applies to their line of business as well as learning
business and marketing strategies appropriate for the Internet. The first step
toward this is to define clearly how and what kinds of commercial activities
are being conducted electronically.
Primary commercial uses on the Internet, other than EDIs, are advertising and
customer services. Online advertising has generated about $150-$200 million
dollars, up significantly from $10-$15 million in 1995 (Nua Internet Survey
(http://www.nua.ie)). This advertising revenue is the amount Internet
marketers received for their services, such as Internet billboards now common
in search sites, targeted emailing, and customized web advertising. However,
establishing a web storefront accounts for a significant portion of Internet
advertising activities, which is not fully reflected when we calculate
advertising revenues in a traditional way.
Through web presence and emailing, companies are establishing consumer
contacts as well as providing after-sale consumer services online and new
product and update announcements. For example, Apple Computers, Inc.
(http://www.info.apple.com) maintains over 20 mailing lists that send out new
hardware and software information, dispatch press releases, and hold open
discussions among users.
Transactions, such as payments and delivery, are conducted via traditional
communications media. One sector of business that actually delivers products
online is the online publishing industry that offers digitized products, such as
electronic databases, newspapers, magazines, and journals. It is also
Page 25
increasingly common for companies to deliver freeware, shareware, or demo
version software online. Even in these cases, however, payments are still made
by traditional means. While credit card information is transmitted online,
actual payment and clearance are done offline.
Electronic commerce as a marketplace still lacks many components. First,
despite increasing investments to upgrade and widen the bandwidth, many
bottlenecks exist, especially at the last mile that connects individual users to
the Internet—the ramp to the information highway. The long-run prospect is
not optimistic either. With the increase in the multimedia contents of web
pages and increasing uses of broadcasting and real-time applications, the
network has become highly congested. Some humorously contend that WWW
stands for the World Wide Wait. Second, data transmission must be made
secure from tampering. While encryption technologies secure messages
transmitted on an insecure pipeline, protocol level security measures are
undergoing considerations to be implemented in the next generation Internet
Protocol (IPng). Third, secure and reliable online payment systems must be
effective and widespread. With developments in these areas, all aspects of
business transactions may be conducted electronically. More importantly,
solving these problems will enable the trading of digital products, making the
Internet a true electronic market.
User Characteristics
Despite the constraints listed above, between ten and twenty million users are
already connected to the Internet according to various surveys conducted in
1995 and 1996. We can get an idea of the latest potential for an increase by
comparing this with the 95 million television households in the U.S. and about
50 to 60 million households that subscribe to cable television service. Already,
the Internet's reach is almost half that of cable television, which, for
comparison, was launched in the late 1940s as community antenna television
(CATV) and took off during the 1970s with the help of cable-only networks.
Still, Internet users—being technically savvy, relatively wealthy, educated,
males—are quite unlike the general population.
Page 26
One limiting factor for more widespread Internet use is the cost. To connect to
the Internet a typical home-based user needs a computer, a modem, a
telephone line, and an account with an Internet service provider. Even more
desirable is a faster direct connection using Ethernet or ISDN instead of
modem-based phone dialing, but because of costs associated with direct
connections, most home-based users suffer from slow and unreliable
connections via ordinary phone lines. While the telephone companies and
cable companies have proposed to set up an information superhighway that
will solve the transmission bottleneck for many years, their willingness to
invest in this has been limited by the current use of the Internet, which is more
informational than commercial, and thus reduces consumers' willingness to
pay for upgraded services.
In the meantime, reduced personal computer prices are leading to a rapid
increase in the number of home PCs, another prerequisite to Internet hookup.
According to a 1996 survey by Computer Intelligence Infocorp., almost 40
percent of all U.S. homes now have one or more PCs (Wall Street Journal, 21
May, 1996), and this increase is still growing. The number of homes with PCs
in 1995 was 16 percent. Growth is also seen among low to middle income
families as well as among the over 60 population. Some key demographic
figures of Internet users were revealed by the 5th World Wide Web survey
done by the Graphic, Visualization & Usability Center of Georgia Tech
University. In 1996, the average user was 33-years-old with a mean household
income of $59,000. Over half of the respondents had either educational
occupations or computer-related jobs (60 percent). Among the rest, 30 percent
belonged to professional or management occupations. Of all the respondents
about 32 percent were female. Even though this survey has a clear sample
selection bias (based on voluntary participation), it generally confirms that
Internet users are young, male professionals with higher than average income.
Nevertheless, the trend from the last two years shows that the percentage of
female Internet users and users in other age groups has been increasing.
The same survey also polled users on how willing they were to pay for access
to web sites. Interestingly, a full 65 percent said they would not pay, a
Previous | Table of Contents | Next
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 27
-----------
higher percentage than found in previous surveys. The authors attributed this
to the fact that people primarily used the WWW for entertainment and
browsing and that they already paid connection charges. About 12 percent said
that they were willing to pay some fees on a subscription model, while another
11 percent would agree to pay on a pay-per-view basis. Although different
payment systems would likely be based on the type of information sold rather
than on consumer preference—a subscription model would be relevant for
large databases or newspapers that offer updated information, whereas for
one-time use information, pay-per-view would be appropriate—the survey
findings raise the important question of how access charges and payment for
contents will be managed in the future.
Today's Internet users may be different from the general population in many
ways, until the majority of the populations participate in the market. However,
electronic commerce as a marketplace differs fundamentally from other
physical markets in many respects. For example, the size of a firm is not a
significant factor in establishing one's presence in the virtual marketplace. Big
and small companies can be located side by side with no difference in shop
floors or interior decorations. Consumers can search for product information
and compare prices over the whole Internet where geographical distance plays
no role. From an economics perspective, electronic commerce has many
characteristics of a perfectly competitive market. Although perfect competition
has been the basis of most economic studies by which we evaluate economic
efficiency, it is far more an exception in real life than the norm. Electronic
commerce presents an experimental stage to further realize the economic
efficiency of a competitive market.
Both economists and government regulators use perfect competition as a
benchmark against which market efficiency is judged. In a perfectly
competitive market, a commodity is produced for which the consumer's
willingness to pay equals the marginal cost of producing the commodity, and
neither sellers nor buyers can influence supply or demand conditions
individually or
Page 28
collectively. A society cannot improve its economic welfare by deviating from
competitive markets. However, perfect competition is seldom evident in real
markets because it requires that several assumptions be met. Among the
assumptions are:
● Many potential buyers and sellers must be able to enter and exit the
market at no cost (no barriers to entry)
● There are many sellers and buyers who cannot individually influence the
market (price takers)
● Products are homogeneous (no product differentiation)
● Buyers and sellers both know the price and quality of the product
(perfect information).
Although wholesale agricultural markets are often cited as one example of a
perfectly competitive market, in most other markets one of the above
assumptions, and often all four, will not be met. Heavy investment
requirements in manufacturing facilities and R&D often limit free entry by
competitors. Advertising also influences consumer behavior by changing
demand preferences or establishing reputation, which gives sellers a degree of
market power. To exploit taste differences among buyers, firms sell
differentiated products by brands or by quality, which as a result limits the
competitive effects on prices. Finally, both sellers and buyers have limited
information about demand and product quality given that it is costly to learn
about product quality, prices, and even the location of shops. Indeed, if sellers
and buyers were perfectly informed, there would be no need for advertising,
marketing, or sales efforts.
Even at a quick glance, the electronic marketplace better resembles the abstract
market of many sellers and buyers in which prices are determined efficiently
by supply and demand. The most important differences are lowered barriers to
entry (low overhead costs) and the opportunity to search and obtain perfect
information about products and demand.
The Internet is supposed to be the great equalizer, where big corporations will
have no inherent advantage over small vendors. In physical markets, bigness
has certain advantages, helping firms to command a larger presence in
Page 29
physical form, market share, and reputation. The importance of this `big'
presence to consumers is that it presents a signal of the quality of a firm's
products. We know that products sold by big firms are not necessarily of
higher quality, but it is one viable signal available in the physical market. A
similar correlation between bigness and assumed quality does not exist in
electronic commerce, lowering the barriers to entry.
Another characteristic of the ephemeral perfectly competitive market, the
availability of perfect information, is typically undermined in physical markets
by the consumers' inability to search completely or at a cost that reflects the
value of searched information. In electronic markets, automated indexing and
cataloging technologies that gather and present information at low cost aid a
complete search. The search for information is then as efficient as is allowed
by search services. Using conventional economic reasoning, however, a
complete indexing of the entire digital universe may not be economical,
although desirable. Nevertheless, indexing and cataloging have been the most
important Internet-based activities. Along with search services, they provide
means to advertise web pages and to direct browsers to specific sites. Because
of their importance, search services may be the first to be commercialized with
access fees, but it will be essential to maintain search fees as low as possible,
perhaps through competition, in order to minimize transactions costs.
Contrary to intuition, not only buyers benefit from perfect information, but so
can sellers. Electronic transmissions generally leave a trail of information
about consumer demand and tastes, which has a high value in its own right.
Refined demand information is useful in reducing wastes due to demand
uncertainty. Also, it leads to greater product diversity, enabling consumers to
obtain customized products that better match their preferences instead of
products that represent the average tastes of consumers. The flip-side effect of
this is the ability for sellers to charge the maximum price consumers are
willing to pay, which is discussed in Chapter 8, increasing sellers' market
power rather than reducing it.
Previous | Table of Contents | Next
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 30
-----------
Despite the benefits to both sides, informational efficiency in electronic
commerce is not guaranteed. The consumers' need to know about products and
the seller's desire to gain more knowledge about consumers' preferences have
to be balanced to avoid one taking advantage of the other. Clearly, complete
product information will be available only if sellers are willing to provide that
information just as consumer information is limited by the willingness of
consumers to reveal their preferences. Fully customized products may increase
the total social welfare but transfer benefits from consumers to firms. It
remains important, however, to recognize the unique potential for perfectly
informed sellers and buyers that electronic commerce presents.
When the World Wide Web first gained in popularity, many firms created web
pages and initiated direct contact with consumers. Increasingly, however, web
page development is contracted out to professionals, and many Internet-based
marketing activities are handled by intermediaries. Even sales in electronic
malls may be delegated to intermediary merchants, with the firms having no
direct contact with the buyers. Since physical distance is not a barrier to
business transactions, the electronic marketplace may resemble the
face-to-face business of the old tradition, making such intermediaries
unnecessary. On the other hand, market intermediaries have traditionally
played other functions designed to enhance efficiency. The new electronic
marketplace will necessitate new innovative models of firm organization,
production, delivery, and overall market institutions, including a close
examination of the role of intermediaries. Chapter 4 discusses this fundamental
issue in detail.
Other time-tested, basic business assumptions can no longer be presumed to
hold true in this new world. In the electronic age, firms no longer are based in
a single location because all functions need not be operated in one locale.
Going beyond even decentralization, a firm on the Internet becomes a
distributed company, or a virtual firm, where any operation can be anywhere.
A company like First Virtual (http://www.fv.com), for example, exists only on
a network (Borenstein et al., 1996). The critical difference between this and a
Page 31
multi-office corporation is that a virtual firm's day-to-day operation is also
conducted on a network. The mundane aspects of managing a
company—administrative tasks, scheduling meetings, supervision of remotely
located employees, and so on—appear to be the greatest challenge of a virtual
company because coordinating such matters most often depends on traditional
means of communication.
A promising application of electronic commerce for a virtual firm is to use the
web technology for within-business and business-to-business interactions.
Business logistics including supplier management, inventory, warehousing,
and invoicing can be integrated in a corporation-wide intranet, or intraweb,
which is defined as "a secure corporate network with rich functional features
of Local Area Networks interconnected by the Internet or its technologies and
applications" (Chellappa et al., 1997). Suppliers and customers are given
appropriate levels of access to intranets so that employees, suppliers, and
customers can be integrated in the firm's production and sales functions in a
network rather than a physical locale.
Another still unanswered question is whether interfirm relationships of virtual
firms will be different in electronic commerce. Economists have argued that a
firm is an organization by which producers can internalize transaction costs,
which are costs incurred in transacting business such as writing, monitoring,
and enforcing contracts. For example, if the cost of contracting bookkeeping
and accounting with an outside CPA (Certified Public Accounting) firm is
high, a firm may reduce costs by establishing an accounting department of its
own to handle the tasks. In an extreme case, a firm may find it efficient to
handle all activities from production, marketing, and payment to delivery.
When transaction costs are low, on the other hand, many functions done within
a firm may be contracted out in a market (see section 4.3). To the extent that
electronic commerce reduces transaction costs, firms will contract out or
delegate many of their functions to other agents in the market.
Increasing use of contracting implies a more fluid interfirm relationship and a
more decentralized, nonhierarchical organization. However, Steinfeld et al.
(1995) have examined the buyer-seller relationships between firms on a
Page 32
network, and concluded, based on case studies, that the use of an electronic
network between firms tends to lock out other firms. They present this as
evidence that networked businesses tend to promote hierarchical organizations
(such as corporations) instead of markets. In other words, doing commerce on
a network increases interdependence between existing partners, and has not
encouraged firms to seek new suppliers or buyers in an open trading market.
Such a trend is clearly observed when new firms have to invest in hardware
and software to participate in bidding and contracting. The open Internet,
however, lowers such investment requirements, and will facilitate a more
market-like organization among networked companies.
Legal Environment
The unique nature of the Internet brings it into uncharted legal and political
territory in regards to a number of different issues, among which copyright is
just one. Because the Internet is not constrained by political boundaries,
electronic commerce is not adequately defined by existing laws or regulated by
one government entity. For example, as commerce over the Internet increases,
city and state governments are seeking ways to collect and remit sales taxes on
Internet transactions (BusinessWeek, 1996). But a 1992 court case (Quill
Corp. vs. North Dakota) held that for a state to collect taxes on sales, the
vendor must have significant sales operations within the state. Because many
Internet operations have highly dispersed personnel, little inventory, and no
showrooms, at this time it is not clear whether states and local governments
have a legal right to collect taxes on their sales.
The issue regarding retail sales taxes in the electronic marketplace, while just
one of many, illustrates how the legal and economic systems must evolve to
accommodate the new electronic medium. Because authorities can control
points of sales through requirements and permits, sales taxes are a reasonable
method used to augment local revenues. But this practice becomes untenable
in a boundless marketplace. The same problem is foreseen with tariffs and
international trade. The question is whether governments should impose
Previous | Table of Contents | Next
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 33
-----------
control measures such as permits, requirements, and regulations so that they
can extend their locus of control over Internet commerce, or they should give
special treatment to electronic commerce and look for other venues for tax.
Each choice will have a substantially different effect on the future
development of electronic commerce. A more detailed discussion of taxation
issues can be found in Chapter 11.
Internet Sales Tax Permit?
To open a business of any kind, one needs to obtain a sales tax
permit and register business names with counties in which one
intends to operate. Necessary permits must be obtained depending
on the type of product handled. Financial and accounting records
must be kept and sales taxes must be reported periodically.
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 37
-----------
The so-called lemons problem occurs in most markets when it is difficult to
know product quality prior to purchase (Akerlof, 1970), which is a prominent
aspect of electronic commerce for at least two reasons. The first is that digital
products are more than just a digitized version of paper-based products.
Instead, digital products incorporate the unique advantages of the electronic
medium. Newspapers, for example, are personalized, searchable, and updated
instantly. The value and quality of a digitized newspaper, then, cannot be
adequately estimated based solely on the experience and practice in
paper-based counterparts. Furthermore, when products are highly customized
and their contents vary greatly, assessing quality becomes increasingly
subjective and personal.
Another reason for heightened uncertainty—and increased potential for the
lemons problem to arise—is the diversity of producers. Unlike physical
products, digital products are produced and sold by virtually anyone on the
Internet. Through today's personal homepages and web servers running on
every personal computer in the future, every user will be a producer and a
potential seller as well. Even for physical products, the worldwide market will
provide consumers with a considerably greater number of vendor choices that
may not be as familiar as local sellers. Conventional means to convey product
quality, such as reputation and brand name, are less useful in this type of
market with a vast array of sellers who may be in the market only for a short
time. Relatively small overhead costs to enter the electronic marketplace will
certainly lower the barrier to entry and will increase the level of competition
and choice, but consumers face many difficulties in selecting reliable, suitable
vendors.
Will an exhaustive and technically useful digital catalog be enough to persuade
consumers to trust online vendors about the quality of their products?
Seller-provided product information is useful if the products in question are
search goods; to judge quality, one only needs a picture or a product
specification. For experience goods, which must be consumed to learn the
quality, no amount of information will suffice.
Page 38
One typical means of resolving the quality uncertainty in similar situations in
physical markets is through the use of a trusted third party. For example,
● A used-car buyer can take the car to a trusted mechanic for evaluation
● Governments and industry groups also typically set standards for quality
and issue licenses to qualified producers in certain industries.
All these mechanisms depend on the neutrality and trustworthiness of the
parties who provide the supposedly objective information. The neutrality of
these parties is often in doubt, or otherwise their information is limited due to
various reasons—the lack of adequate funding, the vast number of products to
be evaluated, or the diversity in product specifications. In electronic
commerce, the number and diversity of digital products and their producers
may prove to be too costly to engage in complete and objective product
evaluations. An alternative is to rely on the market mechanism, in which an
intermediary reseller provides its customers with product information. An
efficient intermediary could economize costs in evaluating and guaranteeing
product quality. At the same time, the intermediary's need to maintain or
guarantee quality lies in its profit motive, not in its commitment to public
service. In Chapter 4, an evaluation of the role of intermediaries as a
mechanism to resolve quality uncertainty in a distributed network environment
is examined in more detail.
While quality uncertainty is one reason why good quality products withdraw
from the market, inadequate copyright protection also discourages content
owners from offering their products. The surging trends merging computer and
communications technologies has vastly increased the amount of information
and entertainment resources shared over the network—the areas which most
often include copyrighted materials. Efforts to protect copyrights on the
Internet have evoked legal as well as emotional responses and have clearly
revealed the inadequacy of current copyright legislation. Without resolving
this issue, selling online may not be the future in distributing contents.
Page 39
The case commonly referred to as "Church of Scientology vs. the Net" has
been at the center of copyright and censorship debates, and legal and net
attacks, and counter-attacks between the Church of Scientology (the Church)
and "netizens" who oppose any restriction on the use of the Internet. (See
Electronic Frontier Foundation archive at (http://www.eff.
org/pub/Censorship/CoS_v_the_Net/).) The case started in 1994 when a part of
the Church's Operating Thetan (OT) materials, considered by the Church to be
secret and copyrighted, appeared in the alt.religion.scientology UseNet
newsgroup via an anonymous mailer. OT materials are a major source of
revenue for the Church, which charges substantial amounts of money for its
members to view and study them. As the Church was unable to identify the
original anonymous mailer, it brought a copyright infringement suit against
one who reposted the same material on the newsgroup. As the Internet buzzed
about the incident, more participants in the newsgroup joined in related attacks
at the copyrighted materials and the Church itself. The Church not only sued
other users and the Internet service providers, it tried to shut down the
newsgroup and cancel messages posted to it. As the Church's effort expanded,
those concerned with censorship intensified their counter-efforts in protest
against the Church.
To date, the legal and nonlegal measures taken by the Church have not been
effective in protecting its documents and its reputation. However, the incident
serves as an illustrative example of how difficult it is to enforce copyright
control in cyberspace. The Church could prove that the materials had
economic value to them, but the alleged had no economic motives—no one
sold the material—and considered their actions to be within the boundaries
allowed by the fair use doctrine of copyright law. In contrast with pirate book
publishers, whose economic motives are easy to prove because they have loci
of operation and traceable accounts of sales and profits, public exchanges on
public networks are hard to track and even harder to control.
Previous | Table of Contents | Next
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 40
-----------
Legal and Economic Considerations of Copyrights
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 43
-----------
media, not only contents on web sites are eye-catching and jazzy, but also
Internet advertising uses a novel form of two-way communications in which
customer participation is encouraged. An active participation is desired in part
because it increases the chance that the viewer will remember the advertising
content. As a result, the model for web advertising and product delivery is no
longer one of push or pull. Instead, customers specify what products they
want, for example, pull, and sellers push these products to consumers
following prearranged agreements.
The actual impact of advertising is hard to track and quantify for both mass
media and the Internet, although interactive technology presents new
possibilities for the entire advertising industry. In the case of mass media, there
are companies that measure the size of the audience per commercial message,
for instance Nielson TV and radio ratings, and efforts are underway to further
evaluate the economic impacts of advertising by correlating advertising and an
increase in sales. But broadcast advertising is fundamentally inefficient
because of its redundancy. It sends messages regardless of whether people are
interested, receptive, or relevant to the product. In comparison, selecting an
audience and verifying the number of people who received a message is
relatively easy on the Internet. However, the advertiser still does not know
whether the receiver actually read the message or not.
Refined measures and methods are being proposed for the Internet. Proctor &
Gamble (http://www.pg.com), for example, limits payment for its ads on the
Yahoo! search engine (http://www.yahoo.com) to the number of people who
actually request more information by clicking on their advertisement rather
than paying based on the number of Yahoo! customers to whom its
advertisement is presented on their search pages. This is in contrast with the
traditional method of measuring viewer-ship, and payment—based on
"eyeballs," equivalent to the number of connections to Yahoo!, or the "hit
rate." As more and more sellers begin to doubt the effectiveness of broadcast
advertising on the Internet that simply flashes banner advertisements, many
advertiser-based services have to rely on different revenue sources, for
instance,
Page 44
subscription fees. As a result, there will be reduced outlets for broadcast-based
advertising in the future. An alternative is targeted advertising.
Internet Intermediaries
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 46
-----------
increased costs if they have to deal with as many sellers as needed to purchase
goods. Thus, there will remain a need for intermediaries and brokers in
electronic commerce. Retail shops, for example, perform various functions
such as transporting and distributing goods, evaluating and displaying related
products, and providing their expertise in matching a certain good of a certain
quality with the need of a consumer. As these functions might not be provided
by one, or even most producers, there is a continuing need in the electronic
marketplace as well as in physical markets for an intermediary that increases
efficiency by reducing various types of transaction costs.
Intermediaries will come in all different sizes and shapes and serve different
functions in electronic commerce. The informational role of an intermediary is
discussed in Chapter 4 when the question of quality uncertainty is taken up.
Search intermediaries will take part in consumer searches for product
information (Chapter 7) and financial intermediaries will play a role in
investment payment efficiencies (Chapters 9 and 10). But a functioning market
needs other intermediary services as well, such as insurance, accounting
services, brokers, financial services, regulators, network service providers, and
so on. Even UseNet newsgroups depend on the services of various groups who
advise on group creation during the request for discussions (RFD) and call for
votes (CFV) stages, volunteer vote takers, administrators of news-servers,
anonymous remailers, and users, as well as self-appointed net patrollers. All
these services are necessary and are currently done on a voluntary basis.
However, they all hold the potential to become paid intermediaries.
Unsecured transmission on the Internet is often cited as the main deterrent for
a rapid growth of electronic commerce. Although much progress is being made
in terms of security, the net is still considered to pose a risk for commercial
transactions. Although the Internet's lack of security stems from the
fundamental design of the basic protocol suite (Bellovin, 1989), security
measures can be implemented at various levels of Internet communications.
Network level security secures the conduit, while encryption secures the
content
Page 47
traveling through the conduit. Security takes on added importance when we
look at the special case of financial payment mechanisms.
While payment security usually means protecting sensitive information from
eavesdropping and theft, a secure transaction has a broader set of
requirements, including nonrepudiation, authentication, integrity, and
confidentiality. Nonrepudiation means that the parties in a transaction cannot
deny it after the fact. Authentication refers to the ability to verify the identity
of persons involved in transactions, while integrity means that the data
transferred should not be modified in transit or in storage. Finally,
confidentiality refers to privacy, in other words, that the transaction is only
between participants. A strong form of privacy is anonymity, where the
identities of one or more of the participants is not known to the other parties of
the transaction.
Nonrepudiation and authentication are aspects that have not been explored
fully and require further developments in certification technologies and
services. As in notary services, a market mechanism for nonrepudiation and
authentication involves a trusted third party (Froomkin, 1997). The U.S. Postal
Service has recently identified its electronic commerce opportunities to be a
service provider as a trusted certification authority. Although discussion on
this topic usually entails the legal implications of certifying actions and
liabilities, it is another area where intermediaries play an important role in
electronic commerce.
Data integrity and confidentiality issues have been dramatically addressed by
advanced encryption and digital signature technologies. There is a large body
of literature on the use of these technologies, that typically invokes
constitutional rights to privacy and the protection of free speech. Our focus,
instead, is on the economic implications of integrity and confidentiality.
Integrity, for example, relates to the derivative right guaranteed by copyright
law. Also, maintaining the integrity of a digital document will be tantamount if
that document in question is a digital currency or a digital financial document.
The concern for confidentiality turns into an economic issue when
transactional data are used or sold by sellers for other purposes. Such issues
related to the use of consumer information are discussed in Chapter 8. The
Page 48
desire, as well as technologies, to conceal such information has resulted in
anonymous payment systems. The issues of transaction security and payment
mechanisms are explored in Chapter 10.
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 49
-----------
Electronic commerce is radically changing the way products are distributed.
Prices for electronic newspapers, for example, may differ from those for
printed newspapers. Should we expect products ordered through web pages to
be priced lower because the process seems equivalent to direct-from-factory
merchandising? For personalized digital products, the cost of production may
vary for each consumer. Cost differences warrant different prices, and the
nature of network computing may enable sellers to implement complex pricing
strategies, which have been impractical in physical markets.
Research into these and other issues related to product pricing in electronic
commerce is just emerging. Most attention has been paid to software pricing.
With the durability problem in digital products, research is focusing on
renting, licensing, and leasing strategies. But there are non-conventional
methods of price discrimination which will be prevalent in electronic
commerce and which will have peculiar economic effects. Deneckere and
McAfee (1996) show an example where a lower quality product may cost
more than a higher quality one, and both sellers and buyers are better off. An
example of price discrimination of this sort is commonly observed where some
functions of computer hardware or software are disabled for specific markets.
A variant version of renting and licensing is subscription-based pricing. An
initial cost of producing a database is large but the cost of extracting and
selling a portion is minimal. The price for a database, therefore, cannot be
based on the cost of production or the marginal cost of serving a customer. A
break-even price will depend on the total number of subscribers, who vary
widely in their usage. Thus, optimal pricing will reflect differential usage.
Such a nonlinear optimal pricing strategy has been developed for natural
monopoly industries such as electric utilities, natural gas, and
telecommunications. In a way, the digital product industry is similar to them
because of the relatively high proportion of fixed costs to variable costs. The
problem is how to measure individual usage and associate the usage to price.
Usage-based pricing has been discussed in terms of network infrastructure, but
its application to product or service pricing is still not clear. Some argue that
pricing based on bundling and
Page 50
subscription will entirely circumvent the problem of measuring usage and
individual valuations, although measuring usage is rather convenient on the
Internet. But a more efficient allocation can be achieved if consumers are
allowed to purchase unbundled products using micropayments. This and other
subjects regarding digital product pricing will be discussed in Chapter 8.
As the number of Internet users grows and many areas of commerce begin to
feel the effects of electronic commerce activities, legal and regulatory
environments for the electronic marketplace are increasingly scrutinized by the
media and the legislators in a growing number of areas including:
● Taxation for online sales
1.5.Summary
The development of the Internet represents a fundamental change in networked
communication. Commercial enterprises on the Internet and the
next-generation networks must be adapted to the new environment of open,
distributed, peer-to-peer communication. At the same time, because of its
capability to use various file formats and support all kinds of communications
activities and its growing reach, the Internet will subsume many aspects of
business activities and organization. Already, electronic commerce has
expanded to include digital, as well as physical products, and informational, as
Page 52
well as noninformational products. More importantly, as business processes
and noncommercial activities themselves are digitized, new products and
intermediary opportunities are springing up. Electronic commerce will change
not only the way firms do business but will also transform intra- and interfirm
organizations, and in the process, the economics of the market. Understanding
the Internet in all its ramifications will be critical to developing proper
business strategies and seizing new opportunities that the Internet will
generate. At the same time, policy-makers and legislators need to broaden their
understanding of the nature of electronic commerce in order to make it a viable
economic sector by setting up proper policies and legislation.
Snapshots have also been provided of major issues and attempts to show why
they are of relevance and concern to the world of electronic commerce have
been explained. Subsequent chapters will add color and depth to each of these
topics, always stressing the economic perspective. Free speech versus absolute
author rights will not be explored further. Instead, emphasis on the need for a
market analysis of copyrights is given. Similarly, this book will refrain from
fueling the security concerns of potential commercial uses of the Internet,
which are no more severe than those posed by traditional media. Rather, we
explore the economic issues of who will control the revealed consumer
information and the payment systems.
Previous | Table of Contents | Next
Products | Contact Us | About Us | Privacy | Ad Info | Home
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 53
-----------
References
Akerlof, G., 1970. "The Market for Lemons: Quality Uncertainty and the
Market Mechanism." Quarterly Journal of Economics, 84: 488_500.
Anderson, C., 1995. "The Accidental Superhighway." The Economist. July 1,
1995. Available at http://www.economist.com/surveys/internet/intro.html.
Bellovin, S.M. 1989. " Security Problems in the TCP/IP Protocol Suite."
Comput. Commun. Review, 19(2): 32_48.
Benjamin R., and R. Wigand, 1995. "Electronic Markets and Virtual Value
Chains on the Information Highway." Sloan Management Review. Winter:
62_72.
Bhimani, A., 1996. "Securing the Commercial Internet." Communications of
the ACM, June 1996, 39(6): 29_35.
Borenstein, N.S., et al., 1996. "Perils and Pitfalls of Practical
Cybercommerce." Communications of the ACM, June 1996, 39(6): 36_44.
BusinessWeek, 1996. "New Tolls on the Info Highway?" Feb. 12, 1996.
Chellappa, R., A. Barua and A.B. Whinston, 1997. "Intranets: Looking
Beyond Internal Corporate Web Servers" In R. Kalakota and A.B. Whinston,
eds., Readings in Electronic Commerce, pp. 311_321. Reading, Mass.:
Addison-Wesley.
Deneckere, R., and R.P. McAfee, 1996. "Damaged Goods." Journal of
Economics and Management Strategy, 5(2): 149_174.
Froomkin, A.M., 1997. "The Essential Role of Trusted Third Parties in
Electronic Commerce." In Readings in Electronic Commerce, Chapter 6, pp.
119_176. Reading, Mass.: Addison-Wesley Longman, Inc.
Page 54
Hinden, R.M., 1996. "IP Next Generation: Overview." Communications of the
ACM, June 1996, 39(6): 61_71.
Radosevich, L., 1996. "The Once and Future EDI." CIO (http://www.cio.com),
December 15, 1996/January 1, 1997, pp. 67_77.
Steinfeld, C., R. Kraut, and A. Plummer, 1995. "The Impact of
Interorganizational Networks on Buyer-Seller Relationships." Journal of
Computer-Mediated Communication (JCMC), vol.1, No. 3. Available at
http://jcmc.huji.ac.il/vol1/issue3/steinfld.html.
There are various ways to define a firm. Economic definitions are mainly
concerned with potential gains in efficiency, for example reduction in
production or transactions costs.
In "The Nature of the Firm." Economica, 4:386_405 (1937), R. Coase views
the firm as a means to economize transaction costs. (Reprinted in Readings in
Price Theory, G. Stigler and K. Boulding, eds., 1952. Homewood, Ill:
Page 55
Irwin.) Depending on which minimizes transaction costs, a market-like
organization or a centralized firm is preferred. O. Williamson further
elaborated the concept of transaction costs in terms of the uncertainty in
long-term relationships such as future switching costs or investments in his
Markets and Hierachies: Analysis and Antitrust Implications. (New York: Free
Press) in 1975.
A concise summary on the role of a firm in a market is found in Jean
Tirole'sThe Theory of Industrial Organization, 1989, pp. 15_60. Cambridge,
Mass.: The MIT Press.
Internet Resources
Implications of Digital Process
Nicholas Negroponte is the author of being digital, 1996, New York, Alfred A.
Knopf, whose introduction and excerpts are available at
http://www.obs-us.com/obs/english/books/nn/bdintro.htm.
Page 57
GVU Web Survey:
http://www.cc.gatech.edu/gvu/user_surveys
O'Reilly & Associates/Trish Information Services:
http://www.ora.com/gnn/bus/ora/survey/index.html
Church of Scientology v. the Net:
Alison Frankel, 1996. "Making Law, Making Enemies." An article appeared in
The American Lawyer, March, 1996, available at:
http://www.counsel.com/spotlight/scient.html.
Ron Newman's Scientology page:
http://www.cybercom.net/~rnewman/scientology/home.html
Lotus Development Corporation v. Borland International, Inc.
Lotus vs. Borland resources at Berkeley HTLJ:
http://server.berkeley.edu/HTLJ/lvb/lvbindex.html
Page 58
Previous | Table of Contents | Next
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 59
-----------
CHAPTER 2
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 63
-----------
fashion acquired through years of training and experience. This valuable
knowledge base could be digitized into a file or a program and made available
to customers.
Similarly, any process involving multiple human interactions and
communications can be organized as a digital process or an electronic market.
For example, a news clipping service searches newspapers and magazines
every day to locate and collect articles for a client based on specified
preferences. A computer program could do the same information filtering of
digitized news articles. Auctions for virtually all products could be organized
as electronic markets where auction items are viewed online, and bids and
payments are taken electronically. Christie's (http://
www.specialcar.com/christies) publishes its auction catalog online, but it may
well have to adapt its auctioning process itself to respond to its electronic
competitors in the future. The government and corporations may also use
electronic markets to send out requests for proposals. They may also receive
and evaluate them in digital form, not only improving efficiency but expanding
the number of participants. If a TV or radio station conducts a viewer response
session using phones, faxes, or letters, a few hundred responses may strain its
human and material resources. Conducted on a web page, it can easily
accommodate tens of thousands of responses, analyze them and respond in
real-time. Innovative digitizing may also change the way we woo. Although
some occasions may demand real flowers, a virtual flower (a graphic file of a
flower) is an example of digitizing a physical product whose main purpose is
symbolic. A flower sent over the network could embody the gesture of
greeting, consolation, affection, or any other emotion.
The list of digital products is bounded only by human imagination. Still, they
share a number of common traits. Besides the apparent physical quality of
being a stream of bits, they have no physical bounds in production and use.
They can, however, be grouped in the three broad categories shown in table
2.1. As concert tickets demonstrate, many products are simply a token or a
symbol whose physical form is not an essential requirement. Paper money is
another example of a product which needs not necessarily be printed on paper.
It is merely a symbol, in fact, a concept of value that can be digitized.
Page 64
Table 2.1 Examples of Digital Products
1. Information and entertainment products:
❍ Paper-based information products: newspapers, magazines,
journals, books
❍ Product information: product specifications, user manuals, sales
training manuals
❍ Graphics: photographs, postcards, calendars, maps, posters
Externalities are economic consequences that are not fully accounted for by
the price or market system. These could be either unaccounted benefits or
harmful effects. Automobiles pollute the air but its cost on environment is not
reflected in the price of the automobile—an example of a negative externality.
If your
Previous | Table of Contents | Next
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 67
-----------
neighbor's tree gives you shade, it is a positive externality for you. A new
agricultural technique—the use of fallows in the Middle Ages, developed by
one, has benefited all other farmers. The use of the new technique by others
does not prevent the inventor from using it on his land. Therefore, the
technique has a positive externality.
Many products have network externalities, which means that the value of a
product increases as more people use it. Network externality is one example of
a positive externality. The benefit of network externality may come directly
from the increasing number of users, as in the case of the telephone. The value
of the telephone is low if few people have a telephone, but much higher if you
can reach almost anyone. Congestion is a negative externality that can offset
positive network externalities. You benefit if many people have a telephone,
but are hurt if they use it so much that you get a frequent busy signal. Another
example of a network externality is the software industry, where more
companies develop programs for users of a popular operating system, for
instance Windows, than for less popular operating systems. Other digital
products have network externalities. For example, some computer games are
more enjoyable when there are more people to play with. A communications
network such as email or newsgroup messaging clearly enjoys network
externality similar to the telephone as well as negative externalities, such as
congestion.
Sharing of information, computer software, and other digital products is often
encouraged by the fact that the gains from sharing are substantial due to
network externalities and often exceed the potential cost of sharing if caught
and levied copyright infringement fines. When information products have
network externalities, the control over reproduction and sharing has been the
primary objective of copyright protection. Copyright control has been effective
as long as infringers are easily located. Copies of books and audio tapes, for
example, are usually pirated by those who have access to mass production
facilities. As the number of potential pirates is limited and the investment
necessary for such an operation is relatively high, most serious copyright
infringement by pirates has been by overseas publishers operating beyond the
reach of territorial copyright enforcement. However, digital products are
highly vulnerable to copying by consumers who have the very same
technology as the
Page 68
producers. The stakes are raised even higher when we consider the possibility
of pirate copies of digital currencies and electronic financial instruments.
Appropriate technologies and effective legal means must clearly be established
to adapt to this new environment, the topic of Chapter 5. A more proactive
strategy, however, can be found in the very nature of digital products. Some
information is inherently more valuable if fewer people have it. In these cases,
the information has a harmful, or negative, externality if someone else has the
same information. Although a basic tenet of economics observation holds that
the value of a good is higher if it is more scarce, in the case of information, the
opposite is often true due to network externality. Nevertheless, there are
numerous instances where exclusive information is more valuable because its
exclusivity renders the owner benefits. A primary example would be market
information that can be used for investment or speculative purposes. The
profitability of insider trading, although illegal, depends on the exclusivity of
the information.
For digital products with negative externalities, it is not easy to guarantee
maximum value to a buyer. Value assurance is comparatively easy in the case
of physical products. If one owns an item, it is physically impossible for others
to own the same object at the same time, and the fewer similar items that exist,
the higher the value of each. In a digital world, however, products can be
reproduced and redistributed at will and the exclusivity of information
products is not due to physical impossibility. Rather, exclusivity is artificially
imposed through control of ownership. Hoarding a physical product to create
an artificial scarity and to corner a market may be illegal, but there is no such
constraint placed on hoarding an idea. Preferably, if sellers want to guarantee
the value of information to their customers, information should be hoarded, or
its access be limited. In terms of copyright protection, information sharing by
consumers is never a problem for a seller when there is negative externality
since sharing would mean lowering its value. However, sellers of information
products need to provide stronger evidence of their guarantee or
trustworthiness to customers than do sellers of non-digital products.
Page 69
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 70
-----------
reproducibility. Some non-digital products share these characteristics, but only
to a limited degree. For example, pictures can last for many decades with
proper care; parts of a song can be copied and changed; and whole books can
be photocopied. Despite these similarities, a digital file is the first medium of
expression that takes all these characteristics to an infinite degree of
perfection.
Indestructibility
Once created, a digital product maintains its form and quality ad infinitum
because of the lack of normal wear and tear. While some durable goods such
as automobiles or buildings may have a long life, they still suffer from usage,
and initial quality differences are further accentuated by consumer usage
behaviors. But the quality of a digital product does not degrade no matter how
long or how often it is used. Therefore, no distinction can be made between
durable and non-durable goods in the case of digital products. In other words,
for most purposes, a product sold by a producer is equivalent to one offered in
the second-hand market. This alone has significant ramifications on the
market.
Like any durable good, a producer of a digital product competes with its own
past sales since consumers purchase a digital product, at most, once during the
product's life. As a result, the producer is often forced to charge a very
competitive price—the lowest possible price—for its product even when it has
no competitor. Suppose that Alice sells a complete database of Medieval
English names. As the list is complete and no new names can be added, the
database is most durable. Suppose that those with English heritage are willing
to pay $100 for such a database, while non-English persons will pay only $10.
On the first market day, Alice can maximize her profit by selling only to
English descendants at $100 each. After all the sales are made, if Alice wants
to sell more she must lower the price to $10 because that is all the potential
buyers are willing to pay. However, if Alice lowers the price to $10 on the
second day, consumers who know the market demand could have predicted the
price change. Knowing that price will be lowered on the second day, no buyers
will pay the initial high price. Therefore, Alice can only price her product at
$10 at any time.
Page 71
This peculiar market behavior is due to the shrinking market size as the
durable good producer makes sales. The loss of market power for durable
goods is known as the Coase conjecture and affects all digital product sellers
(Coase, 1972). Several measures are available to avoid lowering prices. For
example, Alice may announce that she will not lower her price below $100 on
the first day, or issue a buy-back guarantee if the price is lowered, but their
effectiveness depends on her credibility (Bulow, 1982). Alternatively, she may
sell to the same number of customers in each market period with different, or
`updated' products. That is, a supposedly `complete' database is continuously
updated based on `newly found' data—a strategy of planned obsolescence.
Frequent updating and licensing are two popular strategies of durable good
sellers having a significant impact on digital product marketing and pricing.
Frequent updates make old versions of software obsolete, thereby enabling the
seller to continue to sell durable goods to the same buyers. While updated
versions may be used to introduce new and more efficient features, the
underlying profit motive in updates often increases inefficiency. Software
manufacturers often make changes in the user interface, to differentiate new
products sufficiently from old ones, so that users need to relearn the software,
resulting in waste. And in some cases, it is not clear whether new versions are
of superior quality to old ones. After many years of updates, some computer
programs have become exaggerated in size and complicated with unnecessary
and useless features.
Licensing is another way to continue to sell. By renting instead of selling a
durable good, consumers are charged for the usage in each period, whereby the
market for the seller continues to exist. When renting, consumers are not
affected by their expectations about the future sales and prices, and the firm
has no incentive to produce any additional units or to lower prices in the
future. Thus, licensing software will achieve the same goal in maximizing
profit as the practice of frequent updating.
The indestructibility of digital products is another factor why digital product
sellers would prefer licensing or leasing to direct sales. The life of a digital
product is not only comparably longer than that of most durable goods,
Page 72
but it also has to compete with "used" products that are indistinguishable from
new products. When products in second-hand markets resemble the products
in new product markets in every aspect, revenue protection for producers will
depend on how successfully they can discourage second-hand sales, especially
when the life of a product is longer than the product's usefulness to each
consumer. Consequently, certain products like books and musical CDs may
need special protection against reselling. Despite the obvious rationale from
the producers' perspective, it is still uncertain whether second-hand markets
can be legally prohibited.
Transmutability
A paradox to the above claim is that the content of digital products can be
changed instantly. They are extremely customizable and, indeed, seem to be
changing constantly. Changes, whether accidental, intended, or fraudulent, can
be irreversible. Hence, by the nature of digital products, producers lose some
control over the integrity of their products. Although most free documents on
the Internet state that they allow distribution only for unmodified copies, in a
world composed of ones and zeros, this is a stipulation that is virtually
impossible to enforce. This does not prevent producers from employing a wide
variety of mechanisms in their attempts to quail this behavior. Certain
technologies, for example, prevent easy modification. For example, a
document such as a PDF file can be viewed or printed with Adobe's Acrobat
Reader, but users cannot save the file in digital format. Therefore, any casual
digital modification will be prevented although unlimited printing is allowed.
Acrobat Reader is platform independent and used to disseminate technical
papers that contain graphics and equations. Despite these advantages, the
program is extremely large for its limited function and has spread very slowly.
While it is difficult to control content integrity at the user level once a digital
file is downloaded, there are mechanisms that can verify whether a document
has been modified. Encryption technologies (Data Encryption Standard and
RSA—public key encryption scheme patented by RSA Data
Previous | Table of Contents | Next
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 73
-----------
Security, Inc. (http://www.rsa.com)) provide privacy and protection against
modification, but only in transmission. Other authentication technologies have
been developed primarily for checking authenticity or whether a document's
content has been altered. These technologies are useful if buyers are concerned
about corrupted copies but will not provide sellers with effective control
against unauthorized modifications or copies.
The strategic implication of transmutability is that rather than trying to protect
content integrity, producers need to differentiate their products by customizing
and updating, and by selling them as interactive services, not as standard
shrink-wrapped products. This product differentiation is not only a possibility
but should be the overall business strategy adopted by companies producing
digital products. Component texts, graphics, audios, and videos, or an overall
look and format cannot be adequately protected. On the other hand, consumer
updates can be a natural process in the evolution of information and digital
products increasing the value of unmodified new products. This is underscored
by the third and final attribute of digital products—reproducibility.
Reproducibility
The beauty and the bone of all digital products is that they can be reproduced,
stored, and transferred at ease. This means, quite simply, that after the initial
fixed investment cost, the marginal cost of production is almost zero.
However, if the producer cannot appropriate even the fixed cost from the
market, product quality may be lowered, or the product may disappear
altogether. Given a set market price, the level of fixed costs determines the
minimum number of sales or market share needed to break even.
Consequently, advocates for intellectual property rights have centered on
preventing improper duplication and reselling of digital products. Whether
reproduction can be prevented via technology remains to be seen, but there is
great skepticism that this can be achieved. Rather, producers must strive to
make reproduction less valuable or irrelevant by continuously changing and
improving their products.
Page 74
For an obvious reason, the marginal cost of a digital product is assumed to be
zero. In terms of production, or reproduction, costs, this assertion would be
reasonable enough. However, the copyright payment would be applied to each
copy or reproduction, and a non-zero, per-unit cost is added. Once we include
such variable costs in the total production costs, digital products no longer
have zero marginal costs. Theoretical conclusions of some pricing models
critically depend on the assumption regarding marginal costs because they play
an important role in economic analyses. In Chapter 8, pricing strategies for
digital products are investigated. Here, we emphasize that, although digital
products may be reproduced at a minimum or no additional cost, this in no
way implies that their marginal costs will be zero.
The unique characteristics of digital products are all related in different ways
to the key issues in electronic commerce. The indestructibility raises the
concern regarding the effects of durability on market shares as well as the
product choices which producers of durable products must employ to counter
these effects. The first sales doctrine—allowing buyers to resell or lend
purchased products—may destroy the market completely unless an
information seller, for example, can restrict its customers from reselling.
On the other hand, the transmutability of digital products lends itself to
product differentiation and customization, perhaps to a much heightened
degree than any other physical products. Due to more flexible production
technologies, consumers are increasingly enjoying products which match their
tastes far better than mass-produced products that cater to average tastes. In
electronic commerce, each consumer would be able to purchase a product
based on his or her individual preference. The transmutability raises the whole
issue of customized products, individualized pricing, and the proper use of
consumer-revealed information.
Page 75
Among the three characteristics, reproducibility has been widely recognized as
the most problematic aspect of digital commerce. Participants in the
international copyright convention held in Geneva in December, 1996 spent an
extraordinary amount of time debating whether the temporary copies made by
computers when browsing, backing-up, and displaying on screen, being
reproductions, technically violate the copyrights. When copyright laws apply
to paper-based products, a simple act of photocopying is undoubtedly an area
of concern. For digital products, however, transmitting and reading a
document on a computer involve a different set of user behaviors. Transmitting
a file, for example, is based on the reproducibility of the file—a file transfer
program always sends a copy rather than the file itself. Such routines are
embedded in all aspects of computer file operations, but only now became a
serious issue.
How digital copyrights should evolve—through redefining copyright terms or
through adapting to the new usage pattern of digital products—will be
discussed in Chapter 5. But the three characteristics of digital products
discussed earlier clarify many aspects of digital copyrights. Resale prohibition,
for example, stems from the producer's concern about the infinite life span of
the product—indestructibility. Content control is necessary because of the
product's transmutability, and duplication prohibition is motivated by the ease
of reproducibility. Of these three, only transmutability can be countered by
producers through business strategies, frequent updating and customization.
Correspondingly, product differentiation and price discrimination based on
consumer tastes will be the main economic concerns in the electronic
commerce. The other two characteristics of digital products appear to work in
the consumers' favor, and producers have high incentives to prevent
reproduction and resale.
Digitized products can be composed of text, data, graphics, video, or audio.
Technologies are also making it possible to convey "feelings" in ad-dition to
sights and sounds. For example, when a cursor passes over a surface
Page 76
described as "rough" on the computer screen, a joystick or a mouse shakes and
jolts. Because of the ease and speed with which these components can be
reorganized, digital products are innately heterogeneous, making it difficult to
derive marketing or pricing strategies that can be used for a wide variety of
products. In this section, we develop a taxonomy by which digital products can
be grouped into a few major categories around common features and that is
meaningful in analyzing economic issues and developing business strategies.
A number of alternative schemes have been used to categorize digital products.
For example, file components have been used to characterize a product as
either a text file, a graphic or a data file. With the increasing use of multimedia
formats, however, this distinction is no longer useful. Categorizing digital
products into databases, information products, entertainment, software, and so
on, is both descriptive and subjective. Although useful, this practice is
inadequate and gives the false impression that electronic commerce simply
mirrors other product markets. Furthermore, it is loosely based on the usage of
a product which, as we discussed, may differ among consumers. In light of
this, we propose to categorize digital products based on user-product
interactions. Once converted into digital format, all products are essentially the
same. What determines the type of product is how it is acquired and how it is
used by consumers.
The first criterion we can use to classify digital products is the transfer mode.
Products that are downloaded at once or in piecemeal fashion, such as through
daily updates, can be called delivered products. Interactive products, on the
other hand, are products or services, such as remote-diagnosis, interactive
games, and tele-education. A simple communication between a server and a
client, such as a request for a search that is accomplished by sending
information and receiving a reply, is usually defined as interactive. In this
definition, however, all two-way communications are interactive.
Video-on-demand is regarded as an interactive service; a movie that allows
viewers to select different plots and endings is called an interactive movie. But
they simply operate under an automated process of the delivered transfer
mode.
Previous | Table of Contents | Next
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 77
-----------
To characterize a transfer as interactive requires the use of a real-time
application and the need to interact in successive requests and responses. For
example, a requested search information may be delivered in seconds or in
hours depending on the status of network congestion. But once delivered, there
is no more need to interact. Sending another request will be a different service.
TCP (Transfer Control Protocol) is well suited for delivered products where
transfer integrity and reliability are of primary concern. The TCP waits until
all packets of a message are collected before reassembling and presenting the
message (see Chapter 3 for protocols). An interactive product or service, on
the other hand, consists of a stream of requests and responses in a session that
defines an objective such as a search, a game, or a consultation with a doctor.
A live or real-time communication requires an orderly transfer of data, for
example, you would not want to hear words backward. Other protocols than
TCP are in use for interactive services on the Internet, which we discuss in
Chapter 3.
At present, the vast majority of digital products on the Internet are delivered,
not interactive. Information products such as databases and electronic versions
of all printed media, including books, journals, newspapers, and magazines
dominate the commercial offerings in today's Internet commerce, and most are
delivered. Even web browsing is a delivered product, it depends on a
sequential transfer of files which does not require a continuous connection or a
real-time coordination with other users or processes. Similarly, a subscription
service to a database is not an interactive product even though it involves
periodic deliveries. Piecemeal access or delivery is the common mode of
transferring files when periodic updates are needed, or if the whole database is
not needed at once, or too expensive to buy. In any case, these updates do not
require real time interaction between sellers and subscribers, and despite that,
such products are called interactive editions, as they are delivered products.
A conventional definition of interactivity often includes search activities. For
example, forms and queries submitted to and processed by World Wide Web
servers are often considered to be interactive. However, search, catalog,
Page 78
and directory services can be considered to be equivalent to a subscription
service with a large database (indexes), a portion of which is accessed by a
buyer. Thus, searches are delivered, not interactive, products. What does seem
to be an interactive process in the case of search services is in fact the process
of customization. That is, a search service customizes the product on the basis
of a customer's requested criteria. However, once produced in this way, the
product is simply delivered to the customer. Many online services use
consumers' requests as an input to their production processes. These involve
producer-consumer interactions, but they are not interactive services in terms
of transfer mode.
True interactive products are becoming more common on the Internet. One
area of expanding business is online consumer services, including health
services such as telemedicine, remote diagnostics, and tele-education. Other
types of interactive products are based on real-time video and audio
communications, such as video conferencing, Internet telephony, and the
real-time Internet broadcasting or multicasting (see Chapter 3 for Internet
infrastructure), and entertainment, such as Internet Relay Chat groups or
games played in MUDs (Multi-User Dungeons or Domains). While the latter
may appear to be a frivolous use of this valuable resource, it is often the place
where new technologies and uses have been test-driven, in this case, a truly
interactive service. Such interactive digital products may actually be the most
profitable services in electronic commerce because they are less prone to
personal arbitrage and reselling. Interactive services are fundamentally
personalized products which have consumption value for only the targeted
individual. To maximize such benefits, sellers can also prevent copyright
violations by converting delivered products into interactive products, an
alternative strategy to a costly, technology-based, control mechanism.
The second criterion for our taxonomy is timeliness. Time-dependent products
lose value rapidly, which may be a deterrent to offering them for resale or
distributing without authorization. Timeliness is critical to daily news, stock
quotes, and other information needed for quick decision-making. The timely
value of these products can be maintained by periodic updates and sold
Page 79
as subscription goods whereby sellers retain some control. Examples are stock
quotes, government-issued economic data, and journal abstracts.
Time-dependent products become obsolete and worthless when they are
out-of-date. Artificially created time-dependence, however, can be useful. For
example, it can convert time-independent, durable goods into non-durable
goods. Considering the indestructibility of digital products, this is the most
important aspect which firms can exploit in marketing. For example, a web
page providing information about a resort town may be visited once. To entice
revisits, the content of the web page should be updated periodically. Updating
in this regard is an arbitrary means to make old products obsolete and open
new marketing opportunities. When a digital product is time-independent,
sellers tend to use such strategies to transform it into a time-dependent
product.
While timeliness refers to the nature of digital products, exogenous factors
may confound the ability to provide timely service. If the network is
congested, even timely information may become obsolete by the time it
reaches consumers. Congestion at the seller's server is, in principle,
controllable by the system via capacity and pricing, but congestion elsewhere
in the network is outside the control of the seller. When the delivery network
performs poorly, controlling a product's timeliness involves both an
endogenous production decision and an exogenous factor that may require
cooperation and integration with service providers.
Time-dependence may be specific to the individual or may be applied to all
consumers. The timeliness of news and stock quotes, for example, is general to
all consumers. The freshness and the value of the information diminishes at the
same rate for everybody. When such products are offered the next day, their
prices would reflect their reduced valuation across the market. However, the
result of searches and queries made by a consumer for a specific
decision-making is time-dependent to that consumer only. Suppose Alice
wants to buy information on the sales figures of a firm in which she is
considering investing. This information is time-dependent for Alice because it
is useful for her decision. But after the decision is made, the information is no
longer needed.
Previous | Table of Contents | Next
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 80
-----------
However, it may still be of considerable value to Bob who compiles a table of
sales revenues. In such a case, Alice will be able to use the information and
still sell it to Bob at the full price.
In keeping with this, time-dependent products can be further divided into two
subgroups. Most databases, including indexes and directories, are
time-dependent specific to individuals, while news and stock quotes are
time-dependent general to all buyers. This difference is apparent if we consider
a similar distinction in TV programs. Producers of many programs, in
particular of sitcoms and TV movies, depend on revenues from reruns and
syndication. These programs find audiences who missed the first time. In
contrast, news and sports programs, in general, are not rebroadcast because of
their time-dependence across all consumers. Magazine-format news programs
have been popular despite this disadvantage because of low production costs.
More to the point, these programs often deal with time-insensitive topics, and
they recycle old programs, for example, features about "This Day in History"
and update segments. Similar adaptive strategies may be applicable to digital
product marketing.
To sum up, time-dependence may or may not be advantageous to marketers.
Since time-dependent products lose their value rapidly, there is a limited
window for marketing. But on the other hand, time-dependence discourages
reproduction and reselling, and avoids the problem of a durable
good—competing with its own past sales. When consumer reselling is not a
concern, products may be more valuable if they are made time-independent.
Bundling information into large databases, archives, and references helps to
reduce time-dependence. When the durable goods problem is present, sellers
increase time-dependence. Software, including computer programs and games,
is generally time-independent. Here, software vendors use updates quite often,
as discussed earlier, to force people to buy new products.
The third criterion against which to distinguish product categories is the
intensity in use. In this respect, single-use products resemble conventional
non-durable goods, and multiple-use products may correlate with durable
goods. As with traditional durable goods, consumers get benefits from a
Page 81
multiple-use product over time, unlike a single-use product. An example for a
single-use product is a search result which is no longer needed once it serves
its intended purpose. In contrast, software programs and most games can be
used repeatedly.
By definition, the total value of a multiple-use product must increase with use
since the value accumulates. But its growth rate may be diminishing, constant,
or increasing. In figure 2.2, graph A shows an example where a consumer's
utility is increasing, for example, as he learns more about a program and
becomes more efficient in its use. Graph B depicts a case of a product whose
utility declines over time, for example a computer game which becomes less
fun after each use. These are not the only possibilities. A different product's
utility cycle may be a combination of these two, increasing for a certain
duration and then decreasing, or vice versa. From time t1 to t2, the total utility
or value of a product is the area under the graph bounded by the two dates.
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 84
-----------
wide-spread use and acceptance by consumers opens other venues of
marketing, that is, when products have positive externalities. Many software
firms, including Netscape (http://www.netscape.com), have used this strategy
to establish dominance in their market. Once a computer software becomes
dominant, sellers of similar products often depend on the compatibility
between their products and the dominant software. Due to the positive
externality enjoyed by the users of compatible products, they often command a
higher price than non-compatible products (Gandal, 1994).
The dominant software firm, furthermore, enjoys a significant market power
from controlling the standards in its software. The following example
illustrates the importance of externalities in pricing and market competition.
Lotus Development Corporation, the maker of the Lotus 1-2-3 spreadsheet
program, claimed that Borland's Quattro Pro infringed its copyright by
replicating 1-2-3's user interface—menus and command structure—which
affords Borland's customers to run macros written for 1-2-3 (Lotus v. Borland,
1996). Equally divided (Justice Stevens absent), the Supreme Court let stand
the lower court's decision denying Lotus' claim. Although Lotus' claim was
denied, the nature of the decision clearly underscores the divided opinions of
the court and the continuing debate on the merits of externalities.
The taxonomy presented here will give readers a means to categorize and
compare different products being sold online. In each of the five criteria
discussed, a product can be changed from one characteristic to another, for
instance a time-independent product can be made time-dependent. One reason
for doing so may be to shorten the life of the product even though it physically
has almost an infinite life. Producers can also deal with digital products'
reproducibility and transmutability by changing product characteristics. A few
examples of how such a change can counter the problems arising from the
physical nature of digital products are given in the following sections. A
product may change in any of the five criteria we discussed.
Page 85
Products may also be changed to influence the way they are used in terms of
intensity and operation. A single-use product is, of course, discarded after one
use, or has no value to the consumer. But it may have a value and use to other
consumers, which will encourage reselling given a chance. Computer software,
Page 86
reference CD-ROMs and compilations, such as movie databases, are
multiple-use products, whose value stream may be longer than their update
cycles. A book in digital form is a single-use product, but a list of books,
perhaps with abstracts and reviews for each entry, becomes a useful reference
tool, which is used over a longer period. Not surprisingly, references are one of
the most popular digital information products. A book is also
time-independent, but can be turn into a time-dependent product by
emphasizing the timeliness of its content or its temporary popularity.
Likewise, multiple-use products can be time-dependent, further protecting the
market against reselling and reproduction.
Similarly, instead of selling an information product online, one can change it
into an executable program to gain control over its consumption. For example,
a table of daily average rainfall in Austin, Texas, may be sold as a table or as a
program that allows users to make queries or to graph. Other information, such
as a formula that calculates interest rates, can be sold as a program that does
not reveal the formula itself, but only enables its users to derive desired results.
A user's guide for a computer program can be made into an executable
software agent, which not only offers some added functionalities, such as
search, interface, and execute functions integrated into the program itself, but
also provides producers an extensive control over its usage and some
protection against copyright infringements. Lastly, as mentioned earlier, an
executable product, if more likely to be a multiple-use product, needs an added
protection against reselling.
In terms of transfer modes, interactive services have not yet reached their full
potential for technological reasons. But they may eventually become products
and services with the highest level of value added. Real-time interactive
applications, such as voice on the Internet, video conferencing, and
multicasting based on MBONE, will change the way we access information
and interact on the Internet. To support these activities, the Internet
infrastructure is being upgraded with faster modems, wider bandwidths,
reliable and real-time transfer modes, such as cell relays, asynchronous
transfer mode (ATM), and new
Previous | Table of Contents | Next
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 87
-----------
protocols to support transmission (see Kalakota and Whinston, 1996, for
multimedia and multicast technologies). But the critical issue is whether these
engineering solutions will be able to outpace interactive services' rapidly
increasing demand for bandwidths.
For products with positive externalities, like computer programs and games,
we see sellers trying to create profit opportunities based on the externality. By
providing freeware and shareware, programmers can create credentials and a
reputation and establish a certain market position which can later be recouped
from corporate sales. Similar strategies can be used for time-dependent
products. For example, news companies freely distribute headline news, but
charge for other services. Since free news is used to attract potential
customers, its positive externality works to the seller's advantage. Such
almost-free transactions seem to contradict the commercial aspirations of
potential Internet merchants. However, it is important to recognize that these
strategies are based on the characteristics of digital products, not an indication
that the Internet marketplace lacks copyright protection or commercial
opportunities.
2.4.Summary
We have defined digital products and services in terms of their usage and
physical characteristics, and offered a convenient taxonomy to classify various
digital products, highlighting their fundamental differences. Digital products
include all goods that are already in digital format or that can be digitized.
Purely physical products can also be partially digitized when they are made
into smart products equipped with digital interfaces. But an equally important
area of digitization is the business process itself. All aspects of digital
communication and processing can be considered to be digital products. In this
way, electronic commerce extends to the commerce of physical products
because many business transactions involving physical products can be
digitized and be a part of digital electronic commerce.
Page 88
The physical characteristics of digital products are fundamental and raise
contentious issues, such as digital copyrights and the use of consumer
information. At the same time, they are critical in analyzing digital markets in
terms of many economic issues. For example, indestructibility relates to the
issues of quality degradation, personal arbitrage, and the mode of
retailing—sale, renting, leasing, or subscription. Transmutability is also
fundamental in understanding product development, customization, and
differentiation strategies. In the process of customizing a product, firms also
have to deal with the problem of consumer information and privacy. Such
issues are the topics of the remaining chapters.
Page 89
References
Barlow, J.P., 1993. "Selling wine without bottles: the economy of mind on the
global net." Available in continuously evolving editions at various sites
including http://icg.stwing.upenn.edu/cis590/reading.063.html.
Lave, L.B., 1963. "The Value of Better Weather Information to the Raisin
Industry." Econometrica 31: 151_64.
Page 90
Gould, J.P., 1974. "Risk, Stochasitic Preference, and the Value of
Information." Journal of Economic Theory 8: 64_85.
Antonovitz, F., and T. Roe, 1986. "A Theoretical and Empirical Approach to
the Value of Information in Risky Markets." Review of Economics and
Statistics 68: 105_14.
Electronic Markets
Network Externalities
Internet Resources
Java Programming Language
Open Market maintains, with weekly updates, a listing of commercial sites and
publishes it at http://www.directory.net/dir/statistics.html.
Medical web sites often contain in-depth information about diseases, an index
of physicians, and abstracts and journal articles dealing with today's health
issues. Although these are not interactive services as defined in the text, an
examination of the following sites will give an indication on how future
interactive medical services will look like on the net.
● American Medical Association (AMA): http://www.ama-assn.org.
AMA web site also contains JAMA, Journal of the American Medical
Association
(http://www.ama-assn.org/public/journals/jama/jamahome.htm) and an
HIV/AIDS information center
(http://www.ama-assn.org/special/hiv/hivhome.htm).
● Center for Disease Control: http://www.cdc.gov
● Go Ask Alice: http://www.columbia.edu/cu/healthwise/alice.html
● Travel Health Online: http://www.ripprep.com
● Tripod's Ask the Doctor: http://www.tripod.com/living/ask_doc
● Typing Injury Archive: http://www.cs.princeton.edu/~dwallach/tifaq
● Women's Health Specialists at San Diego:
http://www.planetearth.net/SanDiego/DrRoss/submit.html
Previous | Table of Contents | Next
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 93
-----------
CHAPTER 3
3.1.Internet Pipelines
The network infrastructure of the Internet is similar to that of a telephone
system. In fact, most of the Internet traffic travels on the same network used
Page 94
for local and long-distance telephone calls, which may consist of copper wires,
coaxial cables, fiber-optic cables, and wireless and satellite systems. If you
consider messages as water, the Internet infrastructure is a system of pipes of
varying sizes. There are four levels of networks in this traffic distribution
system: end users, Local Access Networks (LANs), regional networks, and
backbone networks (see fig. 3.1).
● End users. Consumers and businesses that initiate and receive messages
using their computers, modems, and other equipment. They connect to
LANs either directly (a direct Ethernet connection or a dedicated ISDN
line, for example) or through dial-up service by using a telephone or
cable modem. This dial-up connection establishes only a temporary
connection to the network.
● Local Access Networks. These networks are Internet service providers,
university and research institutions, local access facilities of a
commercial online service provider, and corporate servers that accept
remote dial-up connections.
● Regional networks. These networks provide a bridge between LANs and
various backbone networks. A regional network may cover an area
within a state, a state-wide area, or several states, collecting messages
and sending them to their destinations via the backbone network. Many
of these mid-level regional networks have received support from the
National Science Foundation (NSF), which operated a national
backbone network called NSFnet from 1984 until 1996. Examples
include California Education and Research Federation Network
(CERFnet), the Southeastern Universities Research Association
(SURAnet), THEnet of Texas, NYSERnet of New York, and Westnet of
Colorado. When the NSFnet backbone was retired in 1996, these
regional networks were able to direct their traffic through commercial
backbone operators.
● Backbone networks. These networks carry Internet traffic between
regional networks and, if a connection is not present, direct it to other
interconnected backbone networks that have a connection to destination
regional networks. A backbone network has a very high bandwidth
Page 95
made up of a fiber-optic network, often capable of sending hundreds of
megabits per second. Backbone networks are also linked internationally.
Mexico's networks, for example, are linked to the CERFnet via a
satellite, as is the System Engineering Research Institute (SERI) of
Seoul, Korea. EBONE provides backbone services to a consortium of
European regional networks.
As regional networks are commercialized and their traffic is routed via three
major commercial backbone carriers—AT&T, Sprint, and MCI—there may
not be much difference to some LANs between regional and backbone
networks. Commercial backbone carriers use the same networks they use for
long-distance telephone traffic. In this sense, the Internet is not much different
from traditional telephone networks as far as the infrastructure is concerned.
What distinguishes the Internet is the way traffic is handled.
Figure 3.1 Internet network architecture.
Page 96
Packet Switching
Similar to telephone numbers, each Internet node or host has a unique address
called an IP address, which is used to route messages. An IP address is defined
Previous | Table of Contents | Next
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 98
-----------
by a 32-bit number—four 8-bit numbers. Each 8-bit (that is, 1 byte) number
can specify 256 different sites—from 0 to 255 (or 00000000 to 11111111 in
binary numbers). These four 8-bit numbers are separated by a period—for
example, 128.83.124.55. The separator period represents a different class of
network in a hierarchy; the computer with IP address 128.83.124.55 is
connected to a higher level network with the address 128.83.124.* (class C
network), which is again connected to a still higher network of 128.83.*.*
(class B network). A class A network is denoted with only the first-level IP
number.
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 102
-----------
One of the primary reasons for multicasting is to use the Internet infrastructure
more efficiently and perhaps to prepare for the ever-increasing demand for
bandwidth by real-time and multimedia applications. Although all feasible
engineering and network solutions should be examined and implemented, the
driving force behind a congested network is the consumer usage and
preference for bandwidth. Economic research in infrastructure pricing is aimed
at allocating resources by influencing consumption and investment behaviors,
which the next section examines.
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 106
-----------
routers, leased telephone lines from an RBOC, and customer service expenses.
According to an estimate by Forbes (as quoted in Srinagesh, 1995), a small
ISP provider in 1993 needed to invest about $30,000 for
equipment—representing sunk costs—and $1,000 per month for telephone
connections. Larger ISPs have larger sunk costs because they often have their
own backbone networks and equipment. These ISPs are intermediaries that
pay long-haul carriers for IP transport and offer individuals access to the
Internet at a price. A dial-up connection usually costs from $10 to $30 a
month, in addition to any charge for telephone connection. In comparison,
cable companies charge about $40 a month for Internet access using cable
modems.
The simple fact that a consumer can connect to the Internet via telephone,
television cable, wireless, or a direct connection highlights the nature of
infrastructure convergence. In terms of bandwidth, CSOs are in a superior
position over their competitors. If voice, video, and data transports were to be
handled by a single connection to a home, coaxial cables would offer the best
capacity for the necessary last mile. In other words, when cars are bigger than
18-wheelers, a much larger driveway will be needed even when trips are made
only occasionally. But telephone companies are meeting the bandwidth
challenge through compression technologies and by rewiring homes from
curbs. CSOs on the other hand seem to focus on the plain, old television
broadcasting.
Today's infrastructure convergence will change the economics of the last
mile—that is, the way consumers connect to the infrastructure, be it for the
Internet, telephone, or television. As market boundaries fall, the same
converging force has the potential to produce a few firms with significant
market power across many industries. Perhaps, only one pipeline—a
telecommunication monopoly—may handle all types of data transfers from
home. A raging debate about who will be that monopolist has already begun.
Some argue that CSOs have the advantage in bandwidth because their coaxial
cables can carry more data than telephone's twisted copper wires. RBOCs,
however, are more familiar with switching technologies and two-way
communications, and as a result they are well positioned to expand their
business into the Internet service provider market and cable television. Cable
operators face a significant amount
Page 107
of investment before they can compete in voice and Internet data transfers
(Benerofe and Kissane, 1996). Unlike the horizontal market monopolization of
a century ago, however, today's convergence is not recognized as a potentially
anticompetitive threat. Telecommunications research and policy must focus on
anticompetitive issues such as vertical and inter-industry integration by
telecommunications firms, which Chapter 11 discusses in more detail.
The increasing intensity in the debate about access charges and tax policies
mirrors the high stake in the battle for the last mile fought among RBOCs,
ISPs, and LDCs. The peculiar pricing structure of the Internet, or the lack of it,
has prompted a necessary debate about Internet access prices both among
academics, as discussed in the previous section, and in courts and the
Congress. Especially poignant is the conflict between local ISPs and RBOCs.
Although RBOCs have traditionally relied on a complicated fee
schedule—distinguishing type of usage, time, and distance—to recover their
fixed costs, the Internet traffic on their local loop is neither distinguished from
voice nor priced according to usage. Efficient prices, however, have to be
applied not only to telephone calls to an ISP but also to the Internet traffic
itself (that is, IP transport on the backbone). RBOCs themselves have entered
into backbone business along with LDCs and large regional ISPs. (Chapter 11
elaborates on the issue of Internet access charges involving the FCC and other
taxation topics.)
Long-Haul Traffic
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 109
-----------
cables for multimedia, and fiber-optic cables for long hauls, for example. Of
course, efficient prices will also facilitate in allocating resources to their most
efficient uses.
The economic foundations for optimal congestion pricing are deeply routed,
going back at least to Pigou (1928) and Vickrey (1969). To illustrate, consider
the classic case of a congested highway. The travel time between city A and
city B depends on the total volume of traffic. For simplicity, suppose each
citizen makes one trip per morning, but that some people have the option of
making their trip at non-congested times. Typically, travel time is an
increasing function of traffic volume and increases at a rapid rate as the traffic
volume nears the capacity of the highway. In deciding whether to travel during
the congested period, a citizen compares the incremental benefit of travel to
this incremental private time cost, and makes the trip if and only if the former
exceeds the latter.
Previous | Table of Contents | Next
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 113
-----------
From the point of view of the entire community, however, the social cost of
travel time is the sum of every citizen's private time costs. If some citizen
decides to make an extra trip, the additional social cost is the extra travel time
born by all citizens, not just the citizen making the extra trip. Only those
citizens whose incremental benefit from traveling during the congested period
exceeds the incremental social cost should do so, and the others should
postpone their travel to uncongested periods.
Hence, if the price of highway access is zero at all times, too many citizens
will decide to travel during the congested period, because they are not facing
the full social costs. The theoretical economic solution is to set the price of
highway access during the congested period equal to the incremental social
cost—called the optimal congestion toll. Then, by comparing the incremental
benefit of travel with the total cost (congestion toll + private time cost), each
citizen will voluntarily make the socially optimal decision.
In addition to achieving a socially optimal resource allocation for the existing
highway, socially optimal pricing provides correct signals for evaluating
capital investment decisions. Without optimal pricing, there is a bias toward
inefficient capacity. To see this, simply observe that, starting from a free
access policy, social benefits can be increased by implementing optimal
pricing without any additional capital investment, while under free access the
same increase in gross social benefits would require costly capital investment.
Further, with free access an additional million dollars of capacity will generate
fewer social benefits for two main reasons. First, the social benefits are
diminished by the congestion that accompanies increased demand. And
second, the distribution of the new capacity over the highway network will
very likely be inefficient. To see the last point, consider two bottlenecks, one
near an industrial site and the other near a shopping center. Because shopping
trips can be more easily spread over time, optimal congestion tolls could
virtually eliminate the congestion near the shopping center. Because of the
relative inflexibility of work schedules, however, considerable congestion
would remain at the industrial site. With optimal congestion tolls, the new
capacity would be concentrated near the industrial site, and with free access
the new capacity would be
Page 114
spread over both sites, thereby producing less total benefits for the entire
community.
A major impediment to congestion tolls for physical highways has been the
cost of administering such a system. Toll booths add considerable delay costs
to travelers, thereby negating the congestion-reducing benefits of the tolls.
Even when technologies are introduced to physical highways, costs of setting
up remote sensors in cars and roadway check points are substantial. When
addressing electronic highways, however, it is technologically feasible to
compute and assess charges with negligible administrative cost. Thus, the
Information Superhighway may be the first real-world instance in which
congestion tolls are practical.
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 117
-----------
the backbone, optimal congestion pricing will be most effective for these
bottlenecks. As data-intensive real-time video uses grow, however, congestion
could very likely become a serious problem on the backbone as well, in which
case optimal priority pricing will become a valuable tool for resource
allocation throughout the Internet.
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 120
-----------
over, because the users do not face the full social cost of their usage decisions,
connection fees cannot induce the socially optimal reallocation of demands
during congested times.
In addition to these fixed connection fees, some providers charge a variable fee
based on active connection time. Online service providers usually charge
hourly fees if one goes over the maximum hours allowed monthly. Some
online service providers, such as Netcom, prefer to forgo flat connection fees
altogether in favor of variable fees. Because there is a positive correlation
between connection time and bytes transmitted, one could view connection
time fees as an indirect measure of bandwidth usage. It is important to
recognize that connection time is not an accurate measure of bandwidth usage,
however, and it obviously does not discriminate between a real-time video
session and an e-mail session. Hence it does not confront the user with the
correct social cost of his specific usage.
Flat-rate pricing consists of a fee for a set bandwidth that does not vary with
the level of actual bandwidth usage nor the current state of congestion.
America Online offers flat-rate—a sort of "all you can eat"—pricing, and New
Zealand and Chile have experimented with flat-rate pricing for their
international link. The latter has had a bad experience primarily due to two
disjoint competing networks, which raises the important issue of whether ideal
socially optimal solutions can be implemented in privately owned competing
networks (see the section entitled "Public Policy and Infrastructure").
Because flat-rate pricing is a usage-based scheme, it can potentially improve
the efficiency of the resource allocation over that which would prevail under
non-usage based schemes. The model of GSW could be modified to solve for
the best flat-rate prices by imposing this as a feasibility constraint on the
optimization problem. Alternatively, the GSW simulation model could be
calibrated to represent the time-averaged stochastic flows (over say a month or
a year) and then take the time-averaged optimal congestion tolls as an
approximation to the optimal flat-rate prices. GSW (1995b) did this
time-averaging of the dynamic prices at each server in the network, and then
imposed these prices. They found that per-packet prices for each server did
indeed improve the efficiency of the network, but not nearly to the extent
achieved by dynamic optimal pricing (refer back to fig. 3.5).
Page 121
Part of the reason for the disappointing performance of per-packet pricing by
server was the lack of a component that depends of the size of the "job."
Optimal pricing imposes much higher prices for large jobs than for small jobs,
because large jobs would impose disproportionately longer delays for the users
whose jobs arrive after large jobs. Optimal nonlinear pricing causes a
reallocation away from the large jobs toward the small jobs. Within the
backbone where packet sizes are standardized—for example, in a cell relay
used in asynchronous transfer mode (ATM)—shouldn't optimal pricing be a
single per-packet fee? The answer is that the fee should be based on the
number of contiguous packets from a single user sent forward, because that is
the correct measure of how much the user's demand on the system potentially
delays other users.* The packet-switching technology potentially breaks up
contiguous packets into smaller sets, but does not completely eliminate them
(due to the tail-trop first-in-first-out (FIFO) queue discipline). Only when there
is excess capacity on the backbone, will a single per-packet fee be optimal
(and that fee would be zero).
Moreover, the benefits generated in the GSW simulation of per-packet pricing
came from load balancing—the redirection of traffic away from congested
servers toward non-congested servers due to the relevant price signals.
Minimalist flat-rate pricing (for example, Anania and Soloman, 1995) would
establish a single usage fee independent of the nodes and links in the network
that are used, thereby undermining even these load-balancing benefits.* * If
Internet traffic were fairly uniform—characterized by an average flow with a
relatively small variance and standard sized non-contiguous packet streams—
a well-coordinated layered regional system of flat-rate pricing might achieve
much of the maximum attainable efficiency. Internet traffic is anything but
uniform, however. It is characterized by frequent irregular bursts of contiguous
* Imagine you are approaching the ticket office at the entrance to a football
stadium along with 30 other people. Presumably you would rather see them
arriving individually rather than in buses, because if you are "second" in line
there is one person ahead of you in the individual scenario while there are 30
people ahead of you in the bus scenario. In the latter, you have a larger
expected waiting time and a larger variance in waiting time.
** Existing router algorithms achieve some load-balancing to the extent that
they can route traffic around congested nodes and links, but they cannot
change the final destinations. In contrast, pricing that depends on the
destination server can induce users to redirect their demands.
Page 122
packets, and the variance in flow tends to increase more than proportional to
the average flow. In such an environment, there are huge potential efficiency
gains from better resource allocation during and between bursty periods (Edell
et al., 1994). These gains can only be realized by dynamic optimal pricing.
Synopsis
This discussion has surveyed the range of proposals for infrastructure pricing
and priorities to solve the ever present congestion problems on the Internet.
The GSW proposal for dynamic congestion tolls is close to the ideal economic
solution and purports to be implementable in real time, whereas the proposals
Previous | Table of Contents | Next
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 123
-----------
based on static models and flat-rate pricing are unlikely to significantly
improve the efficiency of the Internet.
There are, however, practical and political barriers to implementing the GSW
proposal. First, gone are the days of the government controlled Internet. The
current and future Internet is a private enterprise endeavor consisting of a large
number of infrastructure owners, each in business to make money. In the
presence of a negative externality (such as congestion), it is a well-known
economic result that the private market outcome will not be socially optimal,
and the socially optimal outcome cannot be achieved by private markets.
Just what the private market outcome will be remains an open economic
question. If the current state is any indication of the future, it appears unlikely
that, in a competitive outcome, the private infrastructure owners will charge
anything close to optimal congestion tolls, implying that the Internet will
become a "tragedy of the commons," significantly eroding the potential
benefits of electronic commerce. Moreover, in the current "anti-regulatory"
climate, it is unlikely that governments will step in to protect the public
interest.
In the world of private intranets, however, optimal congestion tolls may come
to be. Intranets are owned by a corporation and for the exclusive use of
corporate users to ensure maximum security of sensitive corporate
information. As such, the corporation has every incentive to impose optimal
congestion tolls internally to achieve efficient utilization of its own resources.
Obviously the goal of public policy should be to promote the full realization of
the potential benefits of the network for the society as a whole. Although easy
to state, this goal could be distorted by special interest groups desiring to
exploit proprietary technologies and to appropriate potential public rents for
private pockets. Nevertheless, because of the extensive externalities associated
with the Internet and electronic commerce, a strong case can be made for a
strong public role.
In countries where the network infrastructure as well as the access providers
are governmental entities, the direct approach would be to establish a
legislative mandate for the efficient operation of the network for the common
good by means that include appropriate pricing. Recognizing the longevity of
the infrastructure (fiber optics and cables), debt-financing of the required
capital investment would be necessary and justified. Bandwidth usage fees
should not be used to cover fixed costs—that would induce a loss of potential
benefits and retard the growth of the network community. Usage fees should
be based only on variable operating costs and congestion costs. Fixed costs
should be recovered via connection fees and general taxation.
Page 125
The public would need to guard against the possibility that the upper-level
management of the network authority might attempt to distort prices or restrict
capacity in ways that increase revenues, perhaps using some of this to increase
its own compensation and benefits directly and indirectly.
Even if the infrastructure is owned and operated by the government, there will
undoubtedly be many cases in which access and content services are provided
by private entities. Because users will interact through the access providers,
the pricing policies of these providers will directly impact the performance of
the network. Some access providers, for example, may attempt to attract
customers by smoothing the temporal fluctuations in its costs and offering
customers more stable prices. Excess smoothing, however, will undermine the
capability of dynamic pricing to guide the resource allocation decisions toward
the socially optimal levels. Thus, even with optimal pricing at the
infrastructure level, it may be necessary to exercise regulatory oversight over
the access providers. The issues involved in such oversight are discussed next.
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 126
-----------
is not hard to construct simple examples for which there does not exist a stable
pricing equilibrium among competing firms.
Given the interoperability requirements of the Internet, the number of network
competitors are likely to be finite and of non-negligible size. In other words,
the classic assumption of many small price-taking suppliers will be far from
true. Instead, the Internet infrastructure market will be better described as a
"game" with a small number of strategic players.
One of the most productive areas of theoretical research in economics over the
past 20 years has been in "game theory." Recently, Rutgers University
sponsored a conference on economics, game theory and the Internet
(http://dimacs.rutgers.edu/workshops/economics), to foster more applications
of game theory to Internet issues.
The game among network competitors has some characteristics of "Prisoners'
Dilemma" (see Note). Everyone would be better off if each network manager
adopted optimal dynamic pricing, but each has a strong private incentive to
lower prices to attract more customers. The outcome is that everyone
over-utilizes the public resource and is much worse off.
Prisoners' Dilemma
In this classic game, two prisoners are being held in connection
with a crime. The sheriff has enough evidence to get a
misdemeanor conviction with a one year jail term. The sheriff
puts each prisoner in isolation and proposes a deal: "If you
confess and supply further evidence to implicate your accomplice,
I will recommend leniency for you. If your accomplice has
confessed, I will recommend a 5-year sentence rather than the
10-year sentence that goes with the felony conviction, and if your
accomplice has not confessed, I will recommend probation
without jail for you, while your accomplice will get the full
10-year sentence."
In the game, a prisoner is better off confessing no matter what he
thinks his accomplice will do. Hence, the game outcome has both
prisoners confessing and serving a 5-year sentence. Note that both
would have been better off if neither confessed, but there is no
way of guaranteeing this "cooperative" outcome, because each
prisoner has a strong private incentive to fink on the other.
Page 127
This classic "Prisoners' Dilemma" captures the critical features of many public
resource problems such as grazing ranges and ocean fisheries. Each player
would be better off if he restricted his use to a moderate (socially optimal)
level, but each has a strong private incentive to increase his use. The result is a
tragedy of the commons: the overutilization of the public resource and a loss
for everyone.
Thus, game theory appears to be ideally suited to studying this market game.
Unfortunately, beyond rather simplistic models such as the "Prisoners'
Dilemma," classic game theory has virtually no predictive power in this
complex dynamic environment. Even an extremely simplified competitive
network model may have no pure-strategy non-cooperative equilibrium. On
the other hand, permitting intertemporal strategies unleashes the "Folk
Theorems" of game theory, which say that virtually any behavior is possible.
In this environment, an active public policy involving price regulation or
Pigouvian taxes to avoid a tragedy of the commons may be necessary. In the
classic common resource situation, the imposition of a public fee (or tax)
equaling the marginal social cost of use will avoid the tragedy. Such a fee is
equivalent to optimal congestion tolls. The simulation results of GSW suggest
that the computation of optimal taxes is feasible.
Because the environment is so complex, however, the optimal public policy is
not obvious. Future research needs to develop a model of the Internet that
contains the essential and important characteristics of the Internet, which can
serve as a test bed for conducting policy studies. How will alternative
regulations or taxes affect the industry structure, the pricing schemes, the
pattern of use across service and user classes, congestion, social benefits, and
investment incentives? Simulation is a promising practical way to pursue these
questions.
3.6.Summary
If you were to consider only physical wires and cables, the Internet would be
nearly indistinguishable from existing telecommunications networks. In fact,
Page 128
most of the Internet traffic is routed through the same pipelines used for voice,
fax, and data transmissions. Rather, the Internet's strengths as a
communications medium and for electronic commerce purposes lie in the way
traffic is managed or routed and in its open interfacing with disparate networks
that exist and are coming into existence. Aided by computers, software, and
multimedia technologies, the familiar wire, cable, and wireless networks have
become the information infrastructure of the future.
However, while technologies are perfected and more cables are strung, the key
issue in managing this infrastructure and maximizing its utility remains a
problem of efficient resource allocation in the face of congestion. The Internet
infrastructure has experienced a cycle of congestion and network upgrades:
from the 56 kbps backbone in 1986 to the 1.5 mbps T1 upgrade by 1989, and
to 45 mbps T3 networks by the early 1990s. Now, each fiber-optic cable
network, the latest upgrade, can carry 20 or 30 times more traffic than a T3
network can. Because many fiber-optic networks are built redundantly by
laying several cables side by side, many predict an end to the bandwidth
scarcity. But congestion is a problem in the last mile, which represents the
major portion of networking costs. For this reason, the last mile still consists of
copper wires and coaxial cables. Even for fiber-optic backbones, what seems
to be an unimaginably large bandwidth will cause severe bottlenecks in short
time because of corresponding or outpacing growth in demand. Experience
with microprocessors amply demonstrates that possibility. Efficient pricing
mechanisms can present effective solutions to problems of both
congestion—by distributing traffic efficiently—and upgrades—by directing
investments to where they can most effectively increase social welfare.
Congestion threatens the future of electronic commerce, turning the Internet
into a tragedy of the commons. The ideal economic solution is to charge
optimal dynamic congestion tolls. Private infrastructure owners, interested in
profits rather than social benefits, however, are unlikely to voluntarily impose
optimal congestion tolls. What the private market outcome will be is uncertain.
More research is needed into the impact of alternative public policies on
congestion, infrastructure investment, and social benefits.
Previous | Table of Contents | Next
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 129
-----------
Finally, new forces are coming into play, affecting the level of competition among
telecommunication service providers, with serious implications for regulatory
policies and consumer protection. Foremost of these forces is the convergence in
infrastructure, especially in the last mile where users gain access to the Internet,
where a long list of companies—including telephone companies, cable system
operators, Internet service providers, long distance carriers, wireless operators,
satellite systems, and computer hardware and software vendors—face head-on
competition due to the disappearing market boundaries. The effects of this
convergence on market performance and government policies will be discussed in
Chapter 11 along with other policy-related issues.
Page 130
References
Anania, L., and R. Soloman, 1995. "Flat—The Minimalist Rate." Journal of
Electronic Publishing, http://www.press.umich.edu:80/jep/.
Benerofe, S., and J.D. Kissane, 1996. "The Technology Wars of Digital
Convergence." Available at
http://roscoe.law.harvard.edu/courses/techseminar96/antitrust/thepaper/thpaper.html.
Bohn, R., H. Braun, K. Claffy, and S. Wolff, 1994. "Mitigating the Coming Internet
Crunch: Multiple Service Levels via Precedence." Technical Report, University of
California.
Bernier, P., 1996. "Sprint, Unsung Network Performer?" Inter@ctive, August 26,
1996, pp. 43_44.
Clark, D., 1995. "A Model for Cost Allocation and Pricing in the Internet." Journal
of Electronic Publishing, http://www.press.umich.edu:80/jep/.
Gupta, A., D.O. Stahl and A.B. Whinston, 1995c. "A Stochastic Equilibrium Model
of Internet Pricing." Presentation at the Seventh World Congress of the Econometric
Society, Tokyo.
Gupta, A., D.O. Stahl and A.B. Whinston, 1996. "An Economic Approach to
Network Computing with Priority Classes." Journal of Organizational Computing
and Electronic Commerce, 6 (1): 71_95.
Kelly, F., 1995. "Charging and Accounting for Bursty Connections." Journal of
Electronic Publishing, http://www.press.umich.edu:80/jep/.
For a general introduction, see Gibbons, R., 1992, Game Theory for Applied
Economists. Priceton, N.J.: Princton University Press. See also Fudenberg, D., and
J. Tirole, 1989, "Noncooperative Game Theory for Industrial Organization: An
Introduction and Overview," in Schmalensee, R., and R. Willig, eds., Handbook of
Industrial Organization, Amsterdam: North-Holland.
Technical references to repeated games and the Folk Theorem include the following:
● Abreu, D., 1988. "Towards a Theory of Discounted Repeated Games."
Econometrica, 56: 383_396.
● Friedman, J., 1971. "Non-Cooperative Equilibrium for Supergames." Review
of Economic Studies, 38: 1_12.
● Fudenberg, D., and E. Maskin, 1986. "The Folk Theorem in Repeated Games
with Discounting or with Incomplete Information." Econometrica, 54:
533_556.
Internet Resources
The Internet Networking Infrastructure
An excellent list of links related to technical and economic resources about the
Internet network infrastructure is the Network Economics site of the School of
Information Management and Systems, UC-Berkeley at
http://www.sims.berkeley.edu/resources/infoecon/Networks.html.
Page 134
The proposed high-speed Internet backbone is detailed at
http://www.gov.mci.net/vBNS.
Theoretically, regional networks are connected to the backbone at various network
access points (NAPs) to this high-speed Internet. NAP maps are available at
http://www.cerf.net/cerfnet/about/interconnects.html.
The NSFNET backbone that began in 1987 was retired in 1995. See a final report on
the NSFnet: NSFNET: A Partnership for High-Speed Networking by K.D. Frazer,
available at http://www.merit.edu/nsfnet/final.report/. An interesting history of the
NSFnet is given by S.R. Harris and E. Gerich, available at
http://www.merit.edu/nsfnet/.retire.html.
Many sites related to the Internet infrastructure are listed in Telecom Information
Resources on the Internet, maintained by J. MacKie-Mason, available at
http://www.spp.umich.edu/telecom/telecom-info.html.
Imagine that you send a large file to 100 of your friends. The same file will travese
the Internet 100 times, eating up its bandwidth. The MBONE was developed to cope
with that problem, by overlaying a network that can distribute (known as mroute)
live audio and video data in a way to minimize duplicating the same data while in
transit.
Previous | Table of Contents | Next
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 135
-----------
Resources about the MBONE can be found at the MBONE Information web,
available at http://www.mbone.com. It also contains an MBONE FAQ.
Various reports on RTP by IETF Audio Video Transport Working Group are
available at http://www.ietf.cnri.reston.va.us/ids.by.wg/avt.html.
See also the multicast routing information page by Cisco Systems at
http://www.cisco.com/warp/public/614/17.html.
For information regarding ISDN and ADSL, see ISDN information page at
http://www.alumni.caltech.edu/~dank/isdn.
Page 136
Cable-based broadband online services offer a high-bandwidth connection 100
times faster than ISDN service. Time Warner Entertainment started its
RoadRunner cable modem service in 1996, first in Ohio. @Home
(http://www.home.net) is offered by a group of cable system operators
including Tele-Communications, Inc., Comcast, and Cox communications.
For information about RoadRunner, see
http://www.gayson.com/sschlos/linerunner.html. An unofficial RoadRunner
FAQ is available at http://members.tripod.com/~tlarrow/rrfaq.htm.
An extensive list of resources and links about cable modem is at
http://rpcp.mit.edu/~gingold/cable.
Previous | Table of Contents | Next
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 137
-----------
CHAPTER 4
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 141
-----------
The lemons problem, first discussed by Akerlof (1970), is one example of
adverse selection where bad products drive out good products. Similarly, a
firm insuring properties such as houses and automobiles may find that many of
its clients do not take adequate measures to protect their properties against
theft and accidents. But without a means to distinguish careful clients from
careless clients, the insurance premium—calculated based on the average
risk—will apply to all clients. "Good" clients withdraw from the insurance
market because they consider the insurance premium to be too high, while
`bad' clients remain. With only careless customers, the firm will have to exit
the market in the face of piling insurance claims. The problem of disappearing
markets occurs because of the asymmetric nature of information—that is, both
parties do not have the same information. If Alice knew who to trust or if the
insurance firm had knowledge about consumer behaviors, there might be some
reasonable prices to complete market transactions.
Without such knowledge, both Alice and the firm must seek the information in
other ways. One important method is to send a signal: Bob may send a signal
to Alice that his quotations are always good, or consumers may provide an
insurance firm with some evidence—signals—proving that they are low risk.
Signals, however, may not be truthful. One alternative, discussed in detail in
Chapter 8, is an incentive-compatible mechanism that aims to solve this
problem by devising a decentralized market design that gives participants an
incentive to truthfully reveal their information. The insurance company may
offer two different policies with varying amounts of deductibles and
co-payments, for example, so that high-risk consumers buy a different policy
from one aimed at low-risk consumers.
Consumers often think that the price of a product is a sign post of its quality.
The effectiveness of price as a quality signal is limited by the fact that a
low-quality firm may simply charge a high price for its product. In general,
prices will convey some but not all the information on product quality. Cooper
and Ross (1984) suggest that, because prices may convey information
adequately,
Page 142
two factors may actually discourage the entry of dishonest firms. The first is
the number of informed consumers versus uninformed consumers. A
high-quality product commands a high price because informed consumers are
willing to pay the price. Thus uninformed consumers are informed about the
quality through the signal—price—sent by informed consumers. The more
informed consumers there are, the more difficult it is for a dishonest firm to
cheat, and therefore prices do become an efficient indicator of quality. Cooper
and Ross, however, do not specify how informed consumers are informed in
the first place (discussed in more detail in the section entitled "Information
Channels in Electronic Commerce").
The second factor determining the signaling efficiency of prices is the cost
structure. As more firms enter a market, each firm's share of the market
shrinks, and if the cost of production is high at low output, dishonest firms
may find it unprofitable to enter. Note that dishonest firms can sell only to
uninformed consumers, while honest firms continue to sell to informed
consumers. Thus there will be more cheaters if a dishonest firm can make a
profit with a small number of sales. Counteracting this, the entry by dishonest
firms is discouraged if a large sunk cost is required. Intuitively, this is
consistent with the observation that ripoffs are more prevalent for a low-cost,
small-item product than for a high-cost, large-item product such as a database.
Once again, however, the Cooper and Ross model assumes that there are some
informed consumers. If all consumers are uninformed, prices alone cannot
convey any information about product quality.
For digital products whose fixed costs are large compared to variable costs, the
preceding result implies that fly-by-night operators will be discouraged to
enter the market. This certainly seems a reasonable assertion for large
databases and computer software. Suppose that a word processing program
costs $1 million to develop. As the number of sales increase, its average cost
declines along with its break-even price. If there is only one customer, for
example, its price must be $1 million plus variable costs. If there are one
million customers, the firm can sell a copy at slightly over $1 and still make
profits. If the product is of low quality, the number of sales declines and its
price must be raised to break even. As a result, low-quality products have a
lower chance to survive.
Page 143
For products with low fixed costs, however, fly-by-night operations may be
profitable if some consumers are not informed.
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 144
-----------
Finally, a different type of intermediary—a resale market such as a UseNet
newsgroup or a public bulletin board—may carry out essentially the same
function as a product reseller. Instead of the intermediary signaling quality to
consumers as a trusted third party, one can open a resale market where
dissatisfied buyers would try to resell the lemons or post quality information.
If this resale market is efficient, then there are no low-quality sellers
masquerading as high-quality sellers. The simple existence of the "punishing"
mechanism—a resale market or a forum for efficient information
exchange—discourages cheaters. A thorny issue in allowing consumer
reselling, however, is the debate about the first sale doctrine—the doctrine that
allows consumers to sell, rent, or lease a product after they pay for it. For some
products, preventing consumers from reselling is a pertinent issue for
copyright protection because resale markets can eliminate producer's future
sales (see Chapter 5, "Economic Aspects of Copyright Protection"). If just one
copy is put up for resale and exchanges hands rapidly on the Internet, for
example, the original producer may find no buyers the next day.
If producers or original sellers are not required to provide full refunds
whenever a customer is dissatisfied, however, consumers may desire to have a
similar leverage against ripoffs. A "forsale" newsgroup is an efficient
mechanism to solve the lemons problem without setting up artificial regulatory
restraints such as quality standards, market regulation, and various
consumer-protection initiatives. To protect the producer's market, reselling
may be limited to first-time buyers—those who bought a product from its
producer. Buyers either sell back (that is, return) to the producer, or resell in
the second-hand market, but products purchased in the resale market cannot be
resold.
Technologies to limit resale to initial purchasers are readily available.
Authentification technologies such as encryption, digital signature, hashing,
and time stamping (see Chapter 9, "Financial Intermediaries and Electronic
Commerce") enable content providers to include information about both the
copyright holder and the primary purchaser. When the latter wants to resell,
the document can be returned to the copyright holder or to a third party to be
stamped with that information. Any further unauthorized resale can be verified
by examining the sales record. Although there still is much uncertainty
Page 145
about whether consumers should be allowed to rent or sell a digital
product—although allowed under the first sale doctrine—some products such
as time-dependent goods have little resale value. In this case, buyers and
sellers need a mechanism such as repeated purchases (via subscription or
reputation-building) to resolve the quality uncertainty problem. For products
that can be resold, reselling could be an alternative to a return policy.
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 148
-----------
segment the umbrella market, and consequently sellers can increase prices to
extract the benefit from having products that match consumer tastes better. In
this setting, sellers gain from revealing information and matching consumers
with products. For search goods whose quality consumers can determine based
on seller-provided information, firms will have a greater incentive to provide
information.
The bottom line regarding the effectiveness of seller-provided product
information in resolving quality uncertainty is whether consumers trust sellers.
As mentioned earlier, for goods that consumers buy repeatedly, firms can
develop a reputation for quality and trustworthiness. Offering free samples and
try outs is another way. But for single purchase items such as durable goods,
firms have to rely on other measures to convince consumers about their
quality. One such method can be to provide consumers with "trial" products to
win their trust.
Figure 4.2 Jumbo! web site offering freeware and shareware programs.
Page 150
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 152
-----------
which is higher than the expected market price. Thus, try outs, if available, can
be used to resolve the quality uncertainty.
Some products are ill suited for try-outs. Suppose, for example, that Alice is
selling a computer database of weather information for all major U.S. cities,
and allows her customers to search for one city prior to purchase. Bob, who
wants to get information about the weather in San Francisco, can get the data
for San Francisco by using the try-out and then decline to buy the database.
Two mechanisms may become important in such a situation. First, Alice may
devise a demonstration plan, by which Bob can be convinced of the database's
quality without revealing any information from the database. Such a plan is
based on an algorithm known as zero-knowledge proofs. (See section 6.2 for a
detailed discussion on zero-knowledge proofs). Second, micropayment
methods may adequately address Bob's need, and in general support unbundled
sales of digital products. Although bundling of many related products will be
essential for information and digital products, microsales and microbundles are
useful in allowing consumers to try out without relying on free give-aways.
For some products, consumers may not be sure of their quality even after
try-outs. For others, try-outs may not be available for all features of a product,
or may take time and costly effort to learn. Still others are technically too
complex for consumers to evaluate their features. In these cases, an expert
evaluation may be needed.
Third-Party Information
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 155
-----------
quality, albeit pricey, products than a discount store. In a virtual market where
physical presence has little relevance, however, these indirect information
signals are not available or undergo radical changes. Clearly, the role of
intermediaries and their effectiveness in conveying just such quality
information in electronic commerce is a complex topic that this discussion has
only begun to explore.
Transactional Efficiencies
Intermediaries as Experts
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 159
-----------
consuming a product, he is wasting time and effort to learn the quality from
usage. What then are the incentives for an intermediary to invest in acquiring
evaluation skills or learning the quality of a product and to be truthful about
the information? First, an intermediary makes repeated purchases of similar
items, unlike consumers who may purchase a given item once or twice.
Therefore, the intermediary has an incentive to acquire knowledge, a sunk
cost, to be used for numerous purchases. Second, the intermediary is a
long-term player and his payoff from being truthful comes from continued
sales which will cease if his credibility is questioned.
Intermediaries as experts operate more frequently in certain types of markets
(Biglaiser, 1993). They are common where the difference between low-quality
and high-quality products is large, giving a larger profit margin from the two
expected prices. Also, if there are more low-quality goods than high-quality
goods, the cost to search for a high-quality good may justify the use of an
expert intermediary. In contrast, experts add little value if products are in
general of a high quality. A used-car market is a case in point, where products
are of high value but buyers are weary about lemons. Thus a successful
intermediary must assure buyers of product quality.
Aucnet USA, Inc. (http://www.aucnet.com), a new player in the wholesale
used-car market, combines the role of quality guarantor with digital
technologies that organize and facilitate market transactions. The idea of
Aucnet originated from a Japanese used-car dealer who saw an opportunity in
dealer-to-dealer trading. Used-car buyers are physically limited to visit all
dealers, and as a result some dealers may have excess inventory while others
may be unable to meet demand. A dealer-to-dealer exchange network,
however, is also constrained by the difficulty in moving cars. Aucnet, instead,
organizes a market for information on used cars trading in a satellite auction
market.
Three elements distinguish Aucnet from conventional electronic malls. First,
Aucnet provides detailed information on each used car put on the auction.
Inspected and graded by its own trained professionals, Aucnet guarantees its
quality evaluation, thereby inducing dealers to participate in remote auctions.
Second, Aucnet uses auction as a price discovering mechanism instead of
using posted prices. Thus, Aucnet is an electronic market that mediates excess
Page 160
supply and demand of its members. Finally, Aucnet also provides bulletin
boards where its members trade cars before and after an auction. This
secondary trading opportunity enables the market to be more active and offers
a self-corrective mechanism just as options markets enable stock investors and
commodity traders a chance to hedge. Aucnet members' participation in the
auction depends critically on their knowledge that Aucnet guarantees the
quality of each car—or the truthfulness of their information.
An Aucnet-like electronic market can be organized for any product whose
supply and demand are often unmatched. Most printing shops, for example,
lease expensive color copiers for which they have to make monthly payments.
Depending on the rental price and the demand, the price for color copying may
vary widely from week to week. A web-based intermediary market can be
organized to connect all printing shops, showing jobs waiting to be finished
and the status of all copiers. The service may be limited to printers or open to
consumers who can comparison shop. Such an intermediary market will
counter excess demand or supply problems, foster better uses of resources, and
simplify the consumer search process. In a similar vein, FlyCast
Communications Corp. (http://www.flycast.com) proposes to connect web
advertisers (buyers) with web store owners (sellers) to leverage web space
renting and advertising in a real-time dynamic exchange market. Some web
sites have idle space, while there are advertisers who are willing to pay
premium prices for the right mix of location, contents, and traffic. Its
client/server application, AdAgent, works like a real-time stock exchange
market, sending bids by advertisers and auctioning off ad spaces as well as
dispatching and displaying ads in real time. Finally, as part of the effort to
deregulate utility industries, electricity trading markets are being organized on
the Internet, where excess power capacity is sold and bought among electricity
wholesalers. To transmit electricity from a remote excess power supplier to
those in need requires a complex negotiation among many transmission
providers. Web-based information systems have been proposed to support such
an effort through the Open Access Same-time Information Systems (OASIS)
or TSIN (http://www.tsin.com). (See Chapter 11, "Business and Policy
Implications of Electronic Commerce," for a detailed discussion on the utility
deregulation and electronic commerce.)
Page 161
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 162
-----------
as the Internet because it only requires a short-term, unsophisticated
contracting between the supplier and the buyer (intermediary). The section
entitled "Intermediaries and Contracts" investigates the economics of
short-term contracts.
Intermediaries as Producers
Subcontracting Systems
Two types of subcontracting systems are in use to address the quality problem:
competitive bidding and just-in-time purchasing. In the U.S. and most Western
countries, a buyer offers a procurement contract to a large pool of potential
Page 165
subcontractors, who submit a bid to win the contract. Through this competitive
bidding system, the buyer selects a subcontractor with the lowest bid. After the
contract is awarded, it lasts until the quantity specified is fulfilled. Quality is
checked on each delivery, and products with unsatisfactory quality are
returned, but shipments continue until the contract expires. In comparison,
just-in-time purchasing has been used in Japan, where a buyer deals with a
relatively small number of subcontractors, and procurement contracts tend to
be awarded based on past performance rather than through competitive
bidding. Under the just-in-time procurement system, deliveries, which are of
relatively small quantity, are seldom inspected by the buyer. The supply
contract may require only a small quantity, but the length of the contract is left
open-ended, lasting as long as the buyer is satisfied with the subcontractor's
performance.
Neither of these two procurement systems has inherent advantages over the
other, but the desirability depends on the way production is set up (Taylor and
Wiggins). The competitive bidding system is well suited for mass-production
facilities with intermittent production runs. Such a production facility has high
set-up costs, but the unit production cost is lower due to the large scale of
production. Similarly, supplies are delivered a few times in large quantity,
minimizing costs for delivery as well as for quality inspection. The
just-in-time delivery system, on the other hand, accommodates a more flexible
production process that is run for smaller quantities. Computer-aided
production systems, for example, enable producers to vary product
specifications, and as a result product differentiation and customization
become more important than lowering unit costs based on mass production.
Correspondingly, the set-up cost or fixed cost for each production run is
relatively small. Flexible production in turn requires frequent, just-in-time
supplies with minimal delivery and inspection costs. In other words, the choice
of a procurement system depends on how a production process is set up
regarding its fixed cost.
An intermediary in electronic commerce offers an array of digital products,
often assembled using parts supplied by numerous producers—for example,
online newspaper publishers or CNN. For a digital product, its supply involves
only one copy, and customization is more critical than minimizing the unit
Previous | Table of Contents | Next
Products | Contact Us | About Us | Privacy | Ad Info | Home
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 166
-----------
production cost. In this regard, the just-in-time purchasing system is more relevant than the
competitive bidding system to digital-product intermediaries. This implies that intermediaries,
rather than attempting to verify quality of each delivered product, will use their continued
supply relationship as a means to induce suppliers to provide quality products.
The just-in-time purchasing system needs to establish a long-term relationship with suppliers
because, otherwise, the threat to discontinue will have little effect on the supplier's
performance. This very fact, however, limits the number of suppliers in physical markets,
often foregoing the gains from a competitive supply market such as a lower price.
Nevertheless, competition among suppliers may have little value in electronic commerce
because digital products, unlike automobile parts, may not be standardized in any meaningful
way. Furthermore, digital intermediaries need not limit the number of products they sell, and
may establish a long-term relationship with all prospective suppliers as long as their products
are selling.
Intermediaries in electronic commerce, then, purchase products using the just-in-time system,
and offer quality products without incurring costs to learn or inspect the quality. If consumers
buy directly from producers, the lack of a long-term relationship increases the chance of
getting a lemon. Although consumers may refuse to pay, return the lemon, or demand a
refund, such a punishment strategy based on current sale may fail to discourage cheating by
fly-by-night operators, especially if payments are made prior to sale and there is no adequate
means to recover them. This scenario seems to indicate that intermediaries do indeed play an
important role in electronic commerce.
The key incentive for suppliers in the just-in-time procurement system is the continued profit
in the future if they maintain high quality. The same sort of incentive mechanism can be
implemented through short-term, incomplete contracts between suppliers and intermediaries.
Incomplete Contracts
An incomplete contract leaves certain specifications out of the contract such as the
performance standard or a specific obligation, but may end up inducing
Page 167
the best outcome (Bernheim and Whinston, 1997). Suppose, for example, that Alice writes a
contract with Bob, her son in high school, to encourage and reward his school work. Alice,
being a working single mom, cannot verify how much studying Bob does each day or, more
importantly, how much Bob is learning in a meaningful way. Such an intellectual activity is
not verifiable—that is, in terms of business, an activity that is difficult to prove in court to be
one way or the other—but his school grades, although they are an imperfect indicator for
learning, are observable. Should Alice specify what grades Bob should be getting in the
contract, or should she avoid specifying target grades and leave them to Bob's discretion? If
the contract spells out what grades Bob should be getting—for example, all Bs—and
corresponding payments, the best Alice can expect is all Bs. Even if she demands all As, that
does not mean that Bob is actually learning; Bob may be cheating or just getting high grades
without learning anything.
If Alice is concerned with Bob's education, she may opt to write an incomplete contract by
leaving out any mention of grades or by only specifying minimum grades, but adding some
discretionary payments based on her future evaluation that Bob is actually doing his best.
Such an incomplete contract is common in wage negotiations: Bonus payments leave firms
the ability to respond to favorable work performance by their workers. In Bob's case, under a
complete contract, he has an incentive to minimize his effort to learn whether he can meet the
required grades. With an incomplete contract, Bob is rewarded for all his effort, and thus
doing his best is for his own advantage. The key aspect here is that Bob's and Alice's
incentives work toward the same goal.
In the earlier just-in-time procurement system, the punishment—the termination of contract
forever—induces the suppliers to maintain high quality. Therefore, the term of contract is left
unspecified—that is, an incomplete contract. In other words, continued future contracts are
the reward for high quality, although the term of contract was not specified, just as Bob's
rewards are not specified by Alice. When performance is not verifiable but otherwise can be
rewarded in some way—that is, if the desires or incentives of the contracting parties can be
made complementary—an incomplete contract results in a better outcome than a complete
contract.
Page 168
Such an incomplete contract is often observed between suppliers and intermediaries, where
high-quality products induce continued trading and benefit both the intermediary and its
suppliers. An example of an incomplete contract is an option contract, by which an
intermediary does not inspect the quality for each shipment, but has an option to terminate it
at any time. Any fly-by-night operators will be excluded from the intermediary market.
Numerous online shopping malls are springing up on the Internet. See, for example, Yahoo!'s
list at
http://www.yahoo.com/Business_and_Economy/Companies/Shopping_Centers/Online_Malls,
the Internet Mall (http://www.internet-mall.com), or Downtown Anywhere
(http://www.awa.com). But these online marketplaces just offer hypertexted links to
participating merchants' web sites or house them within their online web mall. A true online
intermediary, on the other hand, must offer an integrated online shopping network,
implementing a contract with its suppliers, which addresses the complaints about quality by
its customers.
Such an option contract can be implemented between the intermediary and its customers as
well. A complete contract, for example, is a subscription plan for an online information
service, for which the seller guarantees the quality of its service and the buyer agrees to pay
subscription fees for the duration of the contract. A subscriber cannot always verify the
quality throughout the contract period, however, giving the service provider an incentive to
shirk after the contract is signed. Customers, then, may not renew their subscription at the end
of the contract, but the seller's horizon may be short enough to disregard this loss.
Furthermore, unlike the competitive bidding system previously discussed, subscribers may
have no satisfactory means to "return" unsatisfactory services and demand refunds or
withhold payments. An incomplete contract, on the other hand, is based on microproducts and
micropayments, where short-term contracts are renewed each time consumers order
something. Instead of purchasing a bundled product, consumers are allowed to exercise an
option to pick and choose, continuing their patronage if products turn out to be of high
quality.
Previous | Table of Contents | Next
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 169
-----------
4.5. Summary
Although it is well understood that the Internet presents an exciting
opportunity to reduce transaction costs, its future may depend on how non-
technological but fundamentally economic issues such as the lemons problem
are solved. A market where buyers and sellers trade goods electronically lacks
many of the conventional ways to assess the quality of a product. This chapter
reviewed the basic economic reason why a market fails to exist when the
quality information is not available. Sellers may provide information about
their products but, for some products, it is difficult for consumers to assess the
quality even with detailed information. Furthermore, buyers may not trust
seller-provided information. An alternative is to rely on a trusted third party
who has the expertise to evaluate quality, but employing such experts may be
costly. For low-value items, then, the uncertainty about quality may be the
main reason why a market does not exist—witness the amount of information
being stored on millions of personal web pages and the common notion that
these pages are lemons. If electronic commerce were to ferment a truly
informational age, any little bit of information should find a market to trade in,
although a pecuniary remuneration would not be the only incentive for
engaging and disseminating information and knowledge.
Intermediaries in electronic commerce may play an important role in
enhancing market efficiency by providing product information even when
intermediaries do not have superior knowledge and skills to evaluate quality.
They act as a source of quality information by being a long-term player in the
market and by carrying a range of products. Similarly, consumers are better off
by having an option to buy microproducts with micropayments as well as
bundling and subscription, which forces sellers to maintain high quality.
Page 170
References
Akerlof, G., 1970. "The Market for Lemons: Quality Uncertainty and the
Market Mechanism." Quarterly Journal of Economics, 84: 488_500.
Bernheim, B.D., and M.D. Whinston, forthcoming. "Incomplete Contracts and
Strategic Ambiguity." Forthcoming in American Economic Review.
Biglaiser, G., 1993. "Middlemen as Experts." RAND Journal of Economics,
24(2): 212_223.
Biglaiser, G., and J.W. Friedman, 1994. "Middlemen as Guarantors of
Quality." International Journal of Industrial Organization, 12: 509_531.
Coase, R., 1937. "The Nature of the Firm." Economica, 4: 386_405.
Cooper, R., and T. Ross, 1984. "Prices, Product Qualities, and Asymmetric
Information: The Competitive Case." The Review of Economic Studies, 51:
197_207.
Lewis, T.R., and D.E.M. Sappington, 1994. "Supplying Information to
Facilitate Price Discrimination." International Economic Review, 35(2):
309_326.
Oi, W., 1992. "Productivity in the Distributive Trades: The Shopper and the
Economies of Massed Reserves." In Output Measurement in the Service
Sectors, Zvi Griliches, ed., pp. 161_191. Chicago, IL.: The University of
Chicago Press.
Rubinstein, A., and A. Wolinsky, 1987. "Middlemen." Quarterly Journal of
Economics, 102: 581_593.
Salop, S., and J. Stiglitz, 1977. "Bargains and Ripoffs: A Model of
Monopolistically Competitive Price Dispersion." The Review of Economic
Studies, 44: 494_510.
Page 171
Shapiro, C., 1982. "Consumer Information, Product Quality, and Seller
Reputation." The Bell Journal of Economics, 13: 20_35.
Taylor, C.R., and S.N. Wiggins, forthcoming. "Competition or Compensation:
Supplier Incentives Under the American and Japanese Subcontracting
Systems." Forthcoming in American Economic Review.
Williamson, O.E., 1975. Markets and Hierarchies: Analysis and Antitrust
Implications. New York: Free Press.
Williamson, S.D., 1987. "Recent Developments in Modeling Financial
Intermediation." Federal Reserve Bank of Minneapolis, Quarterly Review,
Summer, pp. 19_29.
Internet Resources
Internet Commerce
Figure 4.6 CommerceNet logo.
CommerceNet (http://www.commerce.net) is a non-profit consortium launched
in 1994 to act as an industry association for Internet commerce. It acts as the
advocacy group for the use of the Internet as a commercial medium,
coordinates the development of key Internet technologies, and supports their
applications through pilot projects and other informational activities.
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 174
-----------
The List of Economics Journals (http://www.helsinki.fi/webec/journals.html)
contains links to almost all economic journals published today. Some of these
links have tables of contents and abstracts, and provide search facilities.
JSTOR (http://www.jstor.org) have archived articles published in American
Economic Review, Journal of Political Economy, Quarterly Journal of
Economics, Review of Economics and Statistics, and Journal of Money, Credit
and Banking.
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 175
-----------
CHAPTER 5
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 179
-----------
Even generic theft statutes are found to be irrelevant in the case of
unauthorized copying. Again, theft involves physically taking an object, the
remedy to which may be recovering that object. Copyright, on the other hand,
does not protect the property itself, but rather the interest of the authors,
especially the market or profit interests. If a book is stolen from a publisher's
warehouse, for example, property laws governing theft or stolen property may
apply, but pirated copies are not theft protected by generic theft statute.
Instead, the violation is termed "infringement" of the publisher's interest
protected by copyright. This difference is illustrated by the fact that although
stolen property is recovered, pirated copies are destroyed. It is important to
recognize that, economically speaking, intellectual properties are not
properties—as tangible commodities—despite the misleading term, and
intellectual property laws do not protect the said property, but the interests of
the owners derived from the use of that property—although this interest may
very well be termed as "property" in the legal sense.
When does the proprietary right to an intellectual activity and its pecuniary
rewards become an issue? Stealing property, such as a theft, is an economic
concern because the owner is deprived of its use by which someone else
benefits. Suppose that Alice has a plow, and Bob steals that plow to plow his
land. During Bob's plowing, Alice is deprived of the use of that plow, and
perhaps loses her crop by missing the planting season. Bob's gain is Alice's
loss. Suppose, however, that Alice invented a plow attachment that makes
plowing much easier. Bob, after seeing how the attachment was made and
attached, makes his own device and gains the same benefit from reduced labor.
Alice in this case is not deprived of using her own idea on her own land.
Further suppose that Bob opens a business selling plow attachments. Does Bob
owe some monetary remuneration to Alice? Today, the answer is a resounding
yes—assuming that this plow has the same impact as it did then—but the idea
of "selling ideas" did not exist until the Modern era. Protection of private
property rights over intellectual activities is not an issue if there is no
opportunity, now or ever, of making a profit or if there is a reasonable method
of controlling reproduction and selling. During the Middle Ages, Bob or no
Page 180
one else would have thought of selling plow attachments as a business, and
innovations of many types were copied and stolen by others without regard to
intellectual property rights. (Keeping them secret was one way of controlling
ideas, to deprive others of their benefits.) Some ideas, even when not kept
secret, could not be copied. Even after printing presses revolutionized the book
trade and brought copyright issues to the forefront, for example, the same issue
was mostly irrelevant to painters and paintings, which could not be reproduced
easily.
The first known copyright theft occurred when Hermodorus copied Plato's
speeches and sold them overseas (Gurnsey, 1995). Was this a crime? If there
was a law prohibiting speech transcription and selling, Hermodorus might
have been a criminal. But the fact that there was no such law indicates that
Plato and his compatriots did not recognize a potential for profit in selling the
speeches. What limited the market for speeches was the lack of suitable
technology for producing copies. Even during the Middle Ages,
"unauthorized" hand-copying was an important part of monastic life. The
primary utility of these literary works was to communicate ideas to readers.
Disseminating ideas through hard-working monks was more important than
any profit consideration of the authors.
When Gutenberg's printing press changed the publishing industry in the 15th
century, a larger market began to appear for printed works. With mass
printing, the profit potential from mass marketing was recognized and, almost
immediately, some works were "popular" enough to be pirated. The idea of
proprietary ownership was quickly extended to copies as well as to the original
manuscript…hence the term "copyright." At this time, however, the property
right was applied to bound copies of books, and publishers rather than authors
controlled legal rights over publication and distribution.
This is logical if one considers that books and copies were perceived to be
properties of trade, and that the first copyright laws aimed to regulate no more
than the trade aspects of book publishing. The Royal Charter, for example,
given to London-based Stationers' Company in 1557, granted a monopoly right
to publishers. The Royal Charter was a precursor to modern copyright
Page 181
laws and established the "property" aspect of printed works. Once registered
and printed, a book became the property of the publisher. In this way, what the
Charter protected was the market, or the profit-making trade. The fact that
books were based on intellectual activities was not yet a consideration. Despite
the growing recognition of authorship rights and the importance of knowledge
and ideas, modern copyright laws still maintain this aspect of trade regulation.
The monopoly, however, broke down as the demand for books and regional
piracy increased substantially and the market regulation based on the Charter
became ineffective and was abandoned. By 1710, publishing and book trading
was an important profit-making activity, and interested parties demanded
statutory protection of their rights to secure markets for their properties.
England's Statute of Anne in 1710 laid down the first terms of copyright,
limited its application to 14 years, and set out infringement penalties. Although
the statute also professed to protect impoverished authors during the Age of
Enlightenment by signaling the assertion of their rights, the statute met with
vigorous piracy originating in Scotland and Ireland—and later in Australia and
the U.S. after copyright law was expanded to Scotland and Ireland. This
prompted a series of copyright laws that modified and strengthened the terms
of copyright protection. The benchmarks of copyright history outlined in
figure 5.1 show that a growing market and potential for rewards has always
been the driving force behind the struggle for copyright protection. It is also
important to remember that illegal copies became an issue only when
reproduction technology became sufficiently advanced. The invention of
printing presses, photocopiers, and now digital copying technologies have
periodically brought the issue to the forefront. But the market environment has
not changed significantly, and the digital marketplace does not present any
new issues that demand a complete revision in intellectual property laws as
some have argued.
Since the Statute of Anne, three major developments have occurred in modern
copyright laws. First, the intrinsic rights of authors have become increasingly
recognized. Although the Royal Charter and the Statute of Anne established
authors' rights, they were geared more toward protecting publishing houses
from pirates.
Previous | Table of Contents | Next
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 182
-----------
Second, the recognition that foreign market piracy is a substantial economic
issue has resulted in international copyright agreements. The Berne
Convention for the Protection of Literary and Artistic Works (the Berne
Convention) was established in 1886 and its most recent revision (the 1971
Paris text) is administered by the World Intellectual Property Organization
(WIPO) (http://www.wipo.org). A work copyrighted in one country is also
protected in other countries by the Berne Convention, as long as these
countries are signatories to the Convention. There are other international
copyright agreements including the Universal Copyright Convention (UCC),
which allows signatory countries to specify formalities such as copyright
notice and registration. Although the U.S. was the primary advocate for the
UCC, this and other agreements are overshadowed by the Berne Convention
and the WIPO.
And third, modern laws have extended their protection to all types of
intellectual properties to include paintings, musical scores, photographs,
recordings, and performing arts. Since knowledge became the most important
economic asset during the Industrial Revolution, the attempt to balance private
property rights against public benefits to stimulate economic development
have frequently resulted in clashes between the right of the author and the goal
of economic progress.
Public Interest
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 186
-----------
5.2. The Nuts and Bolts of Copyrights
Anyone who creates a work covered by copyright law (see the following
section) and fixes it on a substantially permanent medium automatically
possesses the copyright. Under current laws, a copyright is obtained as soon as
a work is created and fixed in a medium. Unlike patents, authors do not need
to claim their copyright, register, publish, or give copyright notices on their
work. Forms of copyright notice (for example, "C in a circle") are optional for
works published on and after March 1, 1989. Through agreements such as the
Berne Convention, copyright is acknowledged internationally as well, although
patents have to be filed individually for each country. Unless a specific
contract transferring the right is drawn up, the copyright belongs to the actual
authors. Full-time employment may constitute such a contractual situation,
known as "work for hire," where employers may own the copyright for the
material created. For other specially commissioned works for hire, a written
and signed agreement is required.
U.S. copyright law (17 U.S.C.) grants copyright protection for works of
authorship in the following cases:
● Literary works including books, magazines, news articles, manuals,
catalogs, advertising words, computer software, and compilations such
as directories and databases
● Musical works including accompanying words
● Pictorial, graphic, and sculptural works including maps and fine arts
Terms of Copyright
For works created in 1978 or later, the term of copyright is the author's life
plus 50 years after the author's death. In the case of corporate-authored works,
the term is 75 years after publication or 100 years from creation. Although
works created before 1978 were governed by different laws, such works were
given a term of 75 years from their creation.
Figure 5.2 U.S. Copyright Office home page. Unlike patents and trademarks
which are administered by U.S. Patent and Trademark Office
(http://www.uspto.gov), U.S. Copyright Office is a branch of the Library of
Congress (http:// lcweb.loc.gov/copyright/resces.html).
Rights of authors granted under copyright law include the following seven
areas. Correspondingly, copyright infringement occurs when someone is
engaged in any of these activities without authorization from the authors. The
seven rights include the following:
● Reproduction right to copy, duplicate, transcribe, or imitate the work in
fixed form
● Adaptive right to modify and create derivative works
Page 190
● Paternity right to claim (or disclaim) authorship
The last two rights—paternity and integrity—were not recognized in the U.S.
when it adhered to the Universal Copyright Convention (UCC), but in 1988
the U.S. joined the Berne Convention, which recognizes all seven rights of
authors. Both paternity and integrity rights pertain to the moral rights of
authors discussed in the previous section. The U.S. opted out of the full moral
rights provisions of the Berne Convention, except that the Congress did amend
U.S. copyright law to provide limited paternity and integrity rights for the
visual arts.
Even when a work is fully protected by copyright law, certain uses are
considered to be within the fair use rule and do not constitute an infringement
of the author's exclusive rights. A fair use of a copyrighted work is allowed for
purposes such as "criticism, comment, news reporting, teaching including
multiple copies for classroom use, scholarship, or research."
In determining whether a particular case falls within the fair use rule, Congress
has set out the following four guiding principles (17 U.S.C. 107):
1. The purpose and character of the use. If the use is for non-profit
educational purposes, it falls within the fair use rule. Even when the use
is commercial, however, a "productive" use may be allowed. A firm
may use one of Consumer Reports' reviews (copyrighted by its
publisher, Consumers Union) in its advertising as it "educates"
consumers (Consumers Union v. General Signal Corp., 2nd Cir. 1983).
Such interpretation is used by courts to balance incentives for content
providers and society's interests.
2. The nature of the copyrighted work. If a work is more factual than
artistic, its use is more likely to be judged as a fair use. Also,
Previous | Table of Contents | Next
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 191
----------- unpublished works are protected from fair use more than published
works because an infringement may deprive the author of publishing in
the first place and because it interferes with the author's right not to
publish.
3. The amount and substantiality of the portion used in relation to the
copyrighted work as a whole. The substantiality standard dictates that
even when a small amount of a copyrighted work is used, it will be an
infringement if that portion is qualitatively substantial.
4. The effect of the use on the potential market for or value of the
copyrighted work. This is by far the most important factor to consider
when evaluating the fair use rule. In short, fair use may be tolerated only
if it does not interfere with the author's marketability or profits. This
principle relates to a "potential," not an actual, market. Therefore, even
if an author does not market a work, its potential market is protected.
This also includes instances where an author markets the product only in
one market—for example, in a printed form but not in a digital form,
which is a potential market.
Reproduction
As shown in the history of copyright law, the need for change in copyright
protection has arisen historically because of increased ease of mass
reproduction of an original work. With the advent of the digital world, concern
has once again cropped up. Unlike earlier instances, however, the same
technology is now available to both producers and consumers. When printing
presses were first introduced, only entrepreneurs with significant capital would
engage in reproduction. As a result, unauthorized reproduction in book
publishing was mostly done by other publishers, not by consumers, and this
fact often gave copyright enforcers an easy way to identify and locate
infringers. Even with
Page 193
photocopiers, mass reproduction for the commercial market has been limited
to overseas publishers. For some books, for example, it may be cheaper to buy
than to photocopy. Unlike photocopying, however, digital reproduction is
easy, fast, and does not result in quality degradation.
In electronic commerce, then, the issue is to what extent the reproduction
technology available to consumers will erode the market to the detriment of
content owners. When there is no market erosion, control over reproduction is
largely meaningless. Reproduction without reselling or distributing seems
harmless and appears to fall under the fair use guideline. Still, unauthorized
reproduction by consumers is a complicated issue in electronic commerce.
Legal experts have not yet determined whether viewing a World Wide Web
page constitutes copying; after all, any connection over a network involves
downloading a copy of files. If a hard copy of that file is printed, does this
represent another unauthorized reproduction by the consumer? Because neither
of these cases involve reselling, interpreting these activities as "unauthorized
reproduction" rather than "fair use" goes too far in the interest of protecting
copyrights. Extending the definition of reproduction and seeking a blanket
protection against it does not reflect economic reality—the impact on the
market.
On the other hand, copying files for use on other computers may or may not be
considered fair use. This issue is usually dealt with via site or enterprise
licensing, which specifies the number of machines and users allowed under the
licensing contract. Because of the distributional aspect of licensing, the next
section discusses this case.
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 195
-----------
Economic Implications of Reproduction
While clear legal definitions need to be established, the process takes time and
many wrong conclusions will be reached. Instead, an economic approach
toward protecting copyrights in the digital world should be based on the
market. Reproduction without actual or intended distribution does not affect
the size of the market for the copyrighted work. The control over reproduction
therefore becomes an issue only when linked with distribution. In the
paper-based world, reproduction and distribution are fundamentally related as
the term "reproduction" itself is a product of the age of the printing press. In
many cases, digital reproduction is required for uses other than distribution.
A pertinent question in electronic commerce is whether today's reproduction
technology will lead to widespread, unauthorized distribution. If people do not
distribute or transmit copies, controlling reproduction might have legal
implications but be economically unnecessary. In this case, it may be sufficient
to identify a copy so that when copies are circulated it is possible to verify
whether they are unauthorized reproductions. Market control mechanisms
discouraging unauthorized copies in this vein may be sufficient. Proposals to
control every aspect of digital reproduction, using copyright arguments, will
have unintended effects on other uses of digital products.
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 198
-----------
products should be treated. In any case, prohibiting resale will have important
implications in terms of market efficiency. When buyers are not satisfied with
a product, for example, resale in the second-hand market is an alternative to
returning the product to the seller, as discussed in Chapter 4, "Quality
Uncertainty and Market Efficiency." If sellers do not provide an appropriate
return policy or warranty, buyers should be allowed a remedy such as reselling
the product.
If resale is permitted, the market erosion is still more significant for some
digital products than others. Time-independent single-use products—for
example, the average weather information in Austin, Texas—can find buyers
all year round, making them susceptible for resale. Theoretically, the producer
could only sell one copy. On the other hand, a time-dependent product loses its
value rapidly, which may encourage consumers to buy the product directly
from the producer instead of waiting to buy second-hand. Multiple-use
products such as computer programs also resist reselling as their product life is
longer than single-use products.
This indicates that one alternative to the wholesale revision of the law is for
the sellers to change their product choices and marketing strategies based on
consumers' uses of information products. Products, for example, could be
converted into time-dependent multiple-use products. Instead of selling
weather information for one city, one could sell an encyclopedic computer
program about weather. Another means to avoid the economic consequences
from reselling is to customize products and provide frequent updates.
Personalized products, by definition, are useless for persons other than those
for whom they are intended. These and other market-based solutions to
copyright protection are discussed in more detail in section entitled "Market
Protection Through Business Strategies."
Content Control
Even more than reproduction and resale and distribution, content control will
be the most important aspect in copyright protection for digital products.
Reorganizing and modifying a digital file is much easier than altering and
reproducing a non-digital work. As digital product development already
emphasizes differentiation and customization, as will be discussed in Chapter
8, illegal use of copyrighted works will in all probability focus on partial
copying and derivative works. Most World Wide Web users, for example,
routinely select and copy a portion of a web page—for example, a graphic file
or a list—to use on their own web pages. Currently, it is not clear whether
these materials are copyrighted or in the public domain, although the
Copyright Office routinely accepts copyright registration for web pages. Also,
web documents usually consist of many sub-documents, so it is often difficult
to access the whole document. Copying and downloading is done only on a
portion of a work.
Preserving the integrity of a digital product becomes harder than in the case of
physical intellectual properties because of the ease of changing the content of
an electronic file. Exact copies are easy to identify, but changes or damages
can occur either by accident or by design. Recent developments in
Previous | Table of Contents | Next
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 201
-----------
cryptographic technologies have now made it easier to preserve the integrity of
a digital product. Various authentication technologies have been developed for
documenting purposes and to prevent accidental changes. Major types are
encryption, hashing, and digital time-stamping.
The emphasis on cryptographic technologies stems from the fear of tampering
and the desire to preserve the integrity of a digital product. But is the
transmutability of digital products only a liability for sellers? To the contrary,
digital products are more valuable than physical products because of their
malleability. Suppose that you have completed a masterpiece painting. The
copyright law gives you the right to make derivative works from the painting.
To incorporate a portion of the painting, however, you need to re-draw it,
which might take as much time and effort as the first time. On the other hand,
a digital masterpiece can be copied effortlessly. In other words, after a product
is produced, subsequent costs for derivative works could be minimal.
Derivative works can be thought of as benefits of annual crops from owning an
agricultural land, or annual offspring gained from owning cattle. Digital
products have comparably smaller annual expenses to reap such benefits.
Therefore, authors may rely on the transmutability of digital products to
maximize the adaptive right granted under the copyright law by rearranging,
modifying, and customizing for different markets. In this case, the primary
objective as an author is to exploit the nature of digital products by changing
the content rather than maintaining it by using cumbersome technologies and
regulations.
In addition to the lowered cost of derivative works, differentiating products
also has an added benefit of preventing copyright violations because, as
discussed earlier, personalized products resist distribution. The transmutability,
therefore, counters the ill effects of reproducibility and indestructibility of
digital products. Personal Journal (http:// bis.dowjones.com/ pj.html), for
example, a personalized electronic edition of The Wall Street Journal, consists
of news and information about companies specifically chosen by a subscriber,
which might not be of great value to other potential subscribers who follow
different sets of companies. Without any legal maneuvering, personalizing
Page 202
digital products lowers the possibility of copyright infringement by
discouraging consumers from sharing the product. It is a prime example of
dealing with copyright problems by actively adapting to the digital product
environment.
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 204
-----------
argue in favor of a new mechanism to protect software (Samuelson et al.,
1994). The industry practices attempt to sidestep the whole issue of copyright
versus patent protection for software by heavily using licensing agreements
rather than sales to distribute the product. Through licensing, software vendors
maintain the ownership of the product and can impose various restrictions
regarding the use of their products. A proper legal protection for software
would represent a legitimate instance to rethink copyright laws for electronic
commerce.
In each of these points, the current legislative effort seems to favor expanding
publishers' rights. Debates on whether such radical changes are warranted for
the digital marketplace will continue although the discussion in this chapter
indicates that market-oriented solutions may well work with a minimal change
in existing copyright laws.
When a product has a network externality, the value of the product is increased
as more people use the same product. (See Chapter 3, "Internet Infrastructure
and Pricing," for a detailed discussion on the network externality.) As there are
more users, more products compatible and useful to the user will be offered. In
Page 206
many instances, the product becomes the standard to which all other products
must be compatible. A primary example is the computer operating system, for
which market Microsoft's Windows and related products dominate. More
computer programs are developed for Windows operating systems than
Macintosh or Unix operating systems because there are more users in the
Windows market.
When a product becomes a de facto standard and is protected by copyright, its
producer indeed enjoys a monopoly market power. In many cases, such a
monopoly is encouraged to minimize duplicative costs of having competing
standards. That monopoly, however, is often regulated in exchange for its
monopoly power. In today's Internet environment, where regulation is rejected
from all sides, a dominant firm will have an unrestricted market power after its
product becomes the standard. Copyrights for its product in turn protect its
monopoly position unless other firms are allowed to license it.
Some products such as the Internet communications protocol have been
developed as an industry standard which is not copyrighted. But, because of
the network externality, many privately developed computer-related products
exhibit the tendency to become a dominant, standard product in each market.
An antitrust remedy for such a market needs to consider the role played by
copyrights. To deny copyrights will certainly involve the loss of development
costs and other opportunity costs for the firm. Alternatively, governments may
require a kind of compulsory licensing to competitors or developers of related
products. A real antitrust concern arises, however, when the dominant firm
uses its position to strengthen its market power in other markets.
Antitrust remedies are notoriously slow and inadequate. In the context of
network externalities, even traditional antitrust laws may prove to be
ineffective (Lemley, 1996b). Section 2 of the Sherman Act, for example,
prohibits any firm's monopolization through anticompetitive means. The
problem, however, is to show the evidence for anticompetitive conduct when
the nature of products are such that monopolization occurs seemingly as a
normal course of product development, and the basis of its market power is the
copyright. Similarly, Section 1 of the Sherman Act prohibits conspiratorial
activities
Page 207
among competitors, which may have substantial adverse effect on competition.
To apply the rule aggressively would mean to prevent any standard-setting
initiative on the part of the firms when standardization would benefit
consumers and society as a whole. On the other hand, to promote
industry-wide standardization often means eliminating copyrights. Indeed,
some standard-setting organizations require their members to denounce any
copyright claim as a condition of participation.
Of course, being a dominant firm has its own disadvantages. A market leader
can be leapfrogged, for example, by a new firm with an innovative product
that becomes a new standard. The leader finds it difficult to abandon its
product because of its sunk costs, or it may suffer from its own success
because its product becomes unwieldy. Despite these down sides, however,
monopolistic firms whose products are protected by copyrights seem to pose a
significant threat to competition in electronic commerce.
5.6. Summary
Copyright in the Digital Age has become one of the hottest issues affecting the
future of electronic commerce. In the first place, the majority of digital
products fall into the range of expressions protected by copyright law. An
estimate by a computer software organization, although it has an obvious bias,
puts the cost of piracy on and off the Internet at several billion dollars a year.
An international effort to strengthen existing copyright laws was undertaken in
December, 1996 in Geneva for the first time in 25 years, organized by the
World Intellectual Property Organization, a United Nations agency in charge
of the Berne Convention. On the other hand, the culture of the Internet as a
free and unregulated communications medium has produced a strong
counter-argument for increased public access to information. Consumer groups
and a coalition of the free information movement warn that the new copyright
laws could retard the growth of the Internet and jeopardize the very future of
electronic commerce they intend to protect.
Previous | Table of Contents | Next
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 208
-----------
This chapter has purposely emphasized the economic significance of copyright
protection. The ease in reproduction and distribution of any digital product has
given rise to widespread legal and technical issues. In response, copyright laws
have already been reinterpreted and revised, although sophisticated
technologies are being developed to control many aspects of the transmission
and usage of digital products. Because the ultimate goal of the copyright
statute is to protect the market, however, and thus the remuneration, of a
copyrighted work, any legal or technological solution should be evaluated in
terms of how well it protects the market. Under that criteria, certain product
choice strategies such as differentiation and customization naturally discourage
consumers from unauthorized reproduction and distribution of a digital
product. Market driven solutions such as these avoid the use of legal and
artificial market barriers, a fact that is desirable in terms of market efficiency.
Page 209
References
Barlow, J.P., 1993. Selling Wine Without Bottles: The Economy of Mind on
the Global Net. Available at
http://www.eff.org/pub/Intellectual_property/idea_economy.article.
Brinson, J.D. and M.F. Radcliffe, 1994. Intellectual Property Law Primer for
Multimedia Developers. Available at http://www.eff.org/pub/CAF/law/
ipprimer.
Carroll, T., 1994. Frequently Asked Questions about Copyright. Available via
anonymous FTP to rtfm.mit.edu /pub/usenet/news.answers/law/
CopyrightFAQ.
Gerovac, B., D.C. Carver and R.J. Solomon, 1996. Electronic Commerce and
Intellectual Property: Protect Revenues, Not Bits. Available at
http://far.mit.edu/Pubs /ec_ip/index.html.
Godwin, M., 1994. "When Copying Isn't Theft: How the Government
Stumbled in a `Hacker' Case." Internet World, Jan./Feb. 1994.
Gurnsey, John 1995. Copyright Theft. Aldershot, England: Aslib Gower.
Lemley, M.A., 1996a. "Dealing with Overlapping Copyrights on the Internet."
Mimeo. The School of Law, the University of Texas.
Lemley, M.A., 1996b. "Antitrust and the Internet: Standardization Problem."
Connecticut Law Review, 28(4): 1041_1094.
Losey, R., 1995. Practical and Legal Protection of Computer Databases.
Available at
http://www.eff.org/pub/Intellectual_property/database_protection.paper
Page 210
Samuelson, Pamela, 1994. Legally Speaking: The NII Intellectual Property
Report. Available at
http://www.eff.org/pub/GII_NII/Govt_docs/HTML/ipwg_samuelson.html
Samuelson, P., R. Davis, M. Kapor, and J.H. Reichman, 1994. "A Manifesto
Concerning Legal Protection for Computer Programs." Columbia Law
Review, 94(8): 2308_2431.
Saunders, David 1992. Authorship and Copyright. London: Routledge.
Takeyama, Lisa N. 1994. "The Welfare Implications of Unauthorized
Reproduction of Intellectual Property in the Presence of Demand Network
Externalities." Journal of Industrial Economics, 17(2): 155.
Internet Resources
Articles
Okerson, A., 1996. "Who Owns Digital Works?" Scientific American. (http://
www.sciam.com/ WEB/ 0796issue/0796okerson.html)
Dyson, E., 1995. "Intellectual Value." HotWired. (http://www.hotwired.com/
wired/3.07/features/dyson.html)
Barlow, J.P., 1996. A Cyberspace Independence Declaration. Barlow's
reaction to the Telecommunications Reform Act of 1996. (http://
www.netusa.net/ ~jmr/decind.html)
Page 212
Full text of the U.S. Copyright Act (17 U.S.C.) is available at the U.S.
Copyright Office at http:// lcweb.loc.gov/copyright. The Copyright Office also
provides texts of the Berne Convention and the UCC.
Full text of the Berne Convention is available at
http://www.law.cornell.edu/treaties/berne/ overview.html.
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 213
-----------
CHAPTER 6
The general view of advertising and electronic commerce sees the Internet as
an alternative advertising medium with consumers' awareness of the medium
growing rapidly. According to a recent survey by Advertising Age
(http://www.adage.com), 82 percent of consumers surveyed in 1996 are aware
of the World Wide Web, almost doubling from 45 percent in 1995. Of these,
94 percent know about the Internet, compared to 82 percent in 1995.
The advertising market as a whole is a big business. The total advertising
expenditure in the U.S. in 1995, for example, exceeded $100 billion (see table
6.1). Although figures for individual companies are not available, many spend
a large sum of money. Proctor & Gamble, for example, spent $1.4 billion in
1986. Although firms are spending more of their dollars on the Internet, it still
accounts for a tiny share of the overall advertising market. In 1995, advertising
revenues on the Internet were estimated to be about $43 million (Business
Week, September 23, 1996). Estimates for 1996 vary from $140 to $350
million dollars, hedging toward higher figures if advertising values of barters,
reciprocal ads, and others are included. Even the largest estimate, however, is
still less than 1 percent of the total advertising revenues in the U.S. In
comparison, non-U.S. online advertising revenues in 1996 were estimated at
$6.1 million, according to Jupiter Communications (http://www.jup.com), with
Japan, the United Kingdom, and Germany each with over $1 million. The
biggest web advertising outlet in the U.S., Netscape Communications
(http://www.netscape.com), had a second quarter revenue of $7.75 million in
1996.
Page 216
Table 6.1 Advertising Expenditures in 1995
Industry Segment Expenditure in Billions of Dollars
Television 30.6
Cable and satellite TV 5.3
Radio 11.3
Newspaper 36.0
Magazine 14.6
Others 5.2
——————————— ——
Total 103.0
From 1995 to 1996, Internet advertising revenues have grown from under $50
million to about $200 million. Whether or not this trend will continue depends
on the effectiveness of Internet advertising. Because it is recognized as an
effective alternative to traditional media, the Internet's share in the total
advertising expenditure may grow. Frost & Sullivan (http://www.frost.com), a
market consulting firm, predicts that the share will be over 20 percent of the
total (about $5.5 billion) within five years. Advertising on the Internet,
however, is still in its infancy and its characteristics will change dramatically,
making projections based on current behaviors highly unreliable. Revenues
spent on the Internet may grow, but the real issue is how and where they are
spent.
Table 6.1 shows how dependent the newspaper industry is on advertising
revenues. A third of its advertising income is from classified advertising.
Numerous "for sale" newsgroups are replacing traditional classified
newspaper, magazine, and penny shoppers. With the possibility of losing
revenues, newspapers confront the growing Internet advertising in two ways.
First, newspapers establish an online channel for their service. Several leading
daily newspapers operate an online classified advertising service. Career Path
(http://www.careerpath.com), for example, lists "help wanted" advertising that
allows consumers to search and categorize. Second, online newspapers
themselves have become a substantial source of advertising income. According
to the
Previous | Table of Contents | Next
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 217
-----------
Newspaper Association of America (http://www.naa.org), a trade association
for newspaper publishers, a third of online newspapers made money in 1996.
A similar trend is forecast for online versions of traditional media newspapers
within four years. Over half of newspapers now have staff dedicated to online
production and sales.
Advertising revenue figures are based on the conventional definition of
advertising: the payment of sponsors whose ads are displayed to web browsers.
Web pages are sprinkled with more and more tiny electronic billboards to grab
the viewer's attention—just as printed advertisements and commercials work
for newspapers and television. Although this type of "conventional"
advertising is gaining a more ready audience in the World Wide Web universe,
the Internet also offers other advertising mechanisms, including topical and for
sale newsgroups, mailing lists, web links, and e-mails. Web storefronts also
serve the same function as advertising. The expenses spent on these are not
included in most ad revenue estimates, which might be even higher than the
$200 to $300 million estimated for 1996. The other channels of online
advertising include postings on related newsgroups and mailing lists, junk
e-mails, and selling advertisements directly to consumers.
Banner Ads
There are two pressing issues regarding banner ads on the Internet. First,
several studies are under way to clarify how effective banner ads are as a
marketing mechanism. Banners are bandwidth hogs that delay downloading
and frustrate web users. Some advertisers are reluctant to pay fees based on the
number of consumers who see the ads (impressions), but insist on measuring
"click-throughs" (that is, consumers must actually click the banner ad and visit
Page 219
the firm's web site). On the other hand, many consumers tolerate banner ads to
avoid paying for contents; some studies argue that they are effective even
without click-throughs. Section 6.4 discusses the question of advertising
effectiveness.
The second issue relates to the lack of standards regarding size, placement, and
fees for banners. Although there is no compelling need for standardization,
some factors favor standardization. The Internet Advertising Bureau (IAB) and
the Coalition for Advertising Supported Information and Entertainment
(CASIE), a trade association for advertisers and advertising agencies, for
example, argue that standardized banners will simplify production and
placement of these ads, reducing costs and setting an industry-wide basis for
calculating ad rates. Whether rates should depend on the size, layout, or
technologies involved must be determined through dialogs among advertisers
and ad carriers. The IAB/CASIE proposal has been endorsed in 1997 by the
Newspaper Association of America (http://www.naa.org).
Because e-mailing has become the hottest use of the Internet, "junk e-mails"
have been filling e-mailboxes. Junk e-mails are compared to phone solicitation
and junk mails but with a fundamental difference: recipients of junk e-mails
usually have to pay to receive them. Although recipients can delete e-mails
they do not want, downloading e-mails requires connection and storage costs.
Furthermore, junk e-mails may "bomb" one's mailbox, effectively disabling
e-mail service. To the extent that junk e-mails hinder one's ability to use the
service, they resemble sending advertisements via fax machines. Several
states, including Nevada, California, Virginia, and Connecticut, are
considering measures to make sending junk e-mails a misdemeanor.
Considering that recipients are forced to pay for something they don't want,
legislative response has been surprisingly slow. Rather, junk e-mails are
countered by anti-junk e-mails and complaints made to account administrators.
Unlike Post Office mails, e-mail advertisers might never be able to pay the
entire cost of sending an e-mail. An alternative is to pay recipients or to
compensate them with other services. This approach seems to be gaining wide
support in the online community.
Page 220
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 221
-----------
Table 6.2 Advertiser-Supported E-Mail and Internet Service Providers
Service URL Comments
NetForward www.netforward.com Ads may be removed (for a fee)
EMAILS.COM www.emails.com Allows personalized names
iName www.iname.com Allows personalized names
PostOne www.post1.com Provides an e-mail forwarding service
Bigfoot www.bigfoot.com Protects against junk e-mail; offers
non-English services
StarMail www.starmail.com Allows personalized names
Provides three months free service;
pobox pobox.com
uses aliases
RocketMail www.rocketmail.com Web-based
Friendly E-mail mypad.com Web-based
Hotmail www.hotmail.com Web-based
NetAddress www.netadress.com Ads may be removed (for a fee)
Juno www.juno.com Ads are displayed in a window
GeoCities www.geocities.com Offers free web home pages
Web Storefronts
● To increase demand
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 225
-----------
At that price, the number of units sold is Q. Upon advertising, the demand
schedule shifts to the right, implying that each consumer is willing to pay more
because of the better product information. Consequently, at each given price
there are more consumers who are willing to buy the product. With its new
demand and marginal revenue schedules, both the price and the quantity sold
increase to P' and Q', respectively. The firm's revenue increases because more
units are sold at a higher per-unit price. The firm's net profit from advertising
depends on the shape of the marginal cost and the cost of advertising. In the
simplified scenario shown in figure 6.2, the maximum increase in profit is the
shaded area {(P'_P)Q' + (P _ MC)(Q'_Q)}.
The firm's strategy is to maximize its profit, deciding the level of production
(Q) and the expenditure for each advertising method (m). The strategy can be
summarized by the following two first-order conditions:
Previous | Table of Contents | Next
Products | Contact Us | About Us | Privacy | Ad Info | Home
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 229
-----------
RQ = C'
and
Rn = A'(n) for each m
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 232
-----------
information product. To say that an automobile has 300 horsepower, 8
cylinders, and a sun roof does not interfere with selling or consuming the
product, because the product information is not the physical automobile itself.
On the other hand, describing a news story or a book often reveals the product
itself. A good summary of an article may be sufficient for many consumers
who will forgo buying and reading the actual article. This section describes the
nature of this problem with an example, and discusses a possible application of
a cryptographic algorithm—known as zero-knowledge proofing—to convey
product information.
Suppose that Alice has found an effective way of solving scheduling conflicts
of video conferencing in a virtual firm whose offices are located in different
time zones. As CEO of a virtual firm, Bob wants to hire Alice as a consultant
but is not sure whether such a scheduling mechanism can be found. If Alice
publishes her scheduling algorithm on her web page, Bob does not have to pay
for it once he reads the information. If Alice charges Bob to read her web
pages, Bob has to be convinced about the algorithm prior to buying it.
Therefore, Alice's problem is to convince Bob that she can actually provide
such a service without revealing her algorithm.
Such a situation is very common for all types of information products, because
it is difficult to verify the truthfulness (or the quality) of information unless the
information is revealed. As an information vendor, however, you do not want
to reveal the information prior to getting paid. Similarly, suppose that you
have found a winning strategy in picking stocks. To maximize your profit, you
want to persuade several investors that your strategy really works without
revealing what that strategy is.
Some types of signals are used in such situations where the information cannot
be revealed. Publishing the previous results of stock picking is such a signal.
The education level of prospective employees is often used as a signal for
productivity. Such signals, however, are often incomplete and are not definite
proofs of the information one wants. Similarly, if one wants to advertise the
quality of one's digital product, customers can be convinced only if the full
information is provided. Nevertheless, a certain mechanism may be found to
give a complete proof of quality without revealing the product. In the
Page 233
preceding example, if Alice can show Bob that she indeed knows how to
schedule a virtual video conference without letting Bob know of the secret
algorithm, such a procedure is called a "zero-knowledge proof" of the product.
A zero-knowledge proof is a signal that provides complete and perfect
information about the quality without revealing the information (Goldreich et
al., 1986 and Blum, 1986). Using the simple example by Quisquater and
Guillou (1990), suppose that there is a cave with a hidden path between the
points B and C (see fig. 6.5). Alice tries to convince Bob that she knows the
secret passage, which no one else knows. An interactive zero-knowledge proof
protocol proceeds as follows:
1. Bob stands outside the cave entrance where he cannot see point A so
that he does not know whether Alice goes to the right or left once she
enters the cave.
2. Alice enters the cave and goes to either point B or C.
3. Bob enters the cave and stands at point A.
4. Bob asks Alice to come out either from right (B) or left (C).
5. Alice complies, using the secret passage if she has to.
6. Alice and Bob repeat steps 1_5 several times.
Although the prime focus so far has been on the effect of advertising on
demand, a practical concern is on price. Because advertising costs need to be
reflected in the final price consumers pay, it seems obvious that firms who
advertise heavily might have to raise their prices. There is also a countering
force, however, that tends to reduce prices when firms advertise.
The various effects of advertising on price can be analyzed in terms of
absolute prices and price dispersion. As benchmark cases, imagine two
markets: one is populated by perfectly informed consumers, and the other by
Previous | Table of Contents | Next
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 235
-----------
consumers who have no information about products and prices. Suppose also
that product information is conveyed only by advertising.
In the market with perfectly informed consumers, there can only be one price
for an identical product. Otherwise, firms charging a higher price would lose
all customers. In the market with uninformed consumers, however, firms can
charge any price they want as long as consumers do not search for price
information. After some consumers start to visit other stores and compare
prices, the market will consist of informed and uninformed consumers. Most
real markets are this type of partially informed markets in which either
consumer search or advertising provides information about prices to some but
not all consumers. It is generally not possible or economically efficient to
inform all consumers because of the costs involved or because some
consumers will not receive information willingly or miss it by accident.
Among informed consumers, advertising may raise or lower the level of
absolute prices depending on the strategy. When advertising highlights relative
price information, prices tend to go down as low-price firms become known
and it becomes easier for consumers to compare prices. When advertising is
persuasive rather than informative, however, the goal of advertisers is to
manipulate demand for their products and to increase their market power. As a
result, persuasive advertising helps firms to raise prices. For this reason,
persuasive advertising that emphasizes brand recognition and the image of a
product is much more common than informative advertising. For some
professional groups, such as physicians and lawyers, informative advertising
with relative price information is often prohibited to maintain high prices,
although the basis for such prohibition is often to ensure quality.
The question at hand is whether persuasive information for digital products is
effective in the electronic marketplace. Considering that an author's point of
view is an important aspect in selling literary works, news, data, and other
information products, persuasive advertising may actually end up being the
mainstay in advertising digital products. Furthermore, because the information
about a product is often the product itself, persuasive advertising may be
preferred to detailed product description.
Page 236
Sellers may have to take into account, however, the fact that some consumers
will start to comparison shop despite the efforts of persuasive advertising. In a
situation in which consumers are partially informed, many prices can coexist
for a product. Those who cater to informed customers will charge a uniformly
low price. On the other hand, uninformed consumers can be charged different
prices. Consider informed consumers to be natives and uninformed consumers
to be tourists. The price for natives is lower than that for tourists because
natives are more familiar with the market. As more consumers are informed
(become natives), the two prices become closer and the degree of price
dispersion is reduced. Because advertising and searches by consumers are
costly, however, there will always be some non-advertisers charging higher
prices, which can be lowered only if all consumers become natives (informed
consumers).
Who corresponds to natives and tourists on the Internet? Natives are those who
are fully informed about sellers, products, and prices, whereas tourists are not
informed for any number of reasons. In a geographical model, tourists may be
unfamiliar with local merchants and stores. In other words, tourists must pay
higher costs to find out prices. On the Internet, the difference between natives
and tourists may lie in their ability to search and navigate the electronic
marketplace. In this respect, an easy user interface such as the web technology
has reduced the technological barrier for some to enter the marketplace and has
turned many tourists into natives. Nevertheless, as long as the technologies are
cumbersome, difficult to master, and expensive, the electronic marketplace
will not be so efficient as to avoid dispersed prices altogether. Also, dividing
consumers into separate groups by limiting their access based on their
classification naturally enables sellers to separate them into natives and
tourists. In this sense, proprietary networks favored by some sellers create
artificially separated markets with the potential to increase prices.
A corollary to advertising's effect on product prices is the efficiency effect of
advertising. By providing consumers with product information, advertising
improves market efficiency by lessening the search costs and facilitating
seller-buyer matching. When the price or product information is not provided
by
Page 237
sellers, for example, consumers have to incur the search costs by reading
newspapers or visiting stores. Thus, when firms provide advertising, the total
price paid by a buyer is lowered by the amount of the consumer search costs.
The overall efficiency of a market with advertising is higher if the firm's
advertising expense is lower than the sum of all consumers' individual search
costs, which is more than likely in most cases. Thus, when advertising is
informative, its economic effects are unambiguously beneficial. Advertising
can be wasteful, however, if it is purely of a persuasive nature, creating
non-existent differences in products. As a preemptive strategy, advertising in
its extreme may erect barriers to entry, lowering the level of competition and
raising prices.
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 238
-----------
After consumers find their match, advertising builds brand loyalty and
increases the firm's market power. Also, a firm's advertising is bound to inform
some consumers that its product does not match their tastes. In a simplified
market with two firms, one firm's advertising is beneficial to its competitor— a
type of public good (Meurer and Stahl, 1994). Eaton and Grossman (1986)
have also shown that informative advertising actually reduces price
competition among firms; thus consumer welfare is lowered despite a better
preference-product matching. The loss to consumers is due to a higher price;
as a result, there is an incentive for firms to provide excessive informative
advertising (Grossman and Shapiro, 1984).
Does advertising affect product differentiation itself? In some cases,
advertising can result in spurious product differentiation by which consumers
are persuaded to think, albeit mistakenly, that there are differences in
competing products. Many over-the-counter drugs and household chemicals
have essentially the same ingredients but consumers perceive them to be
different largely because of advertising.
When products are vertically differentiated (for example, by quality), truthful
advertising may solve the lemons problem discussed in Chapter 4 by signaling
quality. If all buyers are informed about product quality, a high- quality good
should command a higher price than a low-quality good. If advertising is
truthful and credible, higher price means higher quality.
Prices, however, are an imperfect indicator of quality. If buyers are unable to
assess the quality of a product, either price or advertising can supply some
information. Will a product that is either priced high or advertised heavily
really be a high quality product? As an empirical case study, Caves and Greene
(1996) calculated the rank correlation between product quality ratings, prices,
and advertising outlays for approximately 200 products. They found a weak
correlation between prices and quality and no significant relationship between
advertising and quality. In other words, advertising is not a reliable signal for
quality. They also report that the price-quality correlation is most notable for
convenience products such as frequently purchased consumption goods. For
these products, firms have an incentive to maintain a high-quality
Page 239
corresponding to a high price in order to ensure repeat purchases. But the
overall weak relationship between advertising and quality is consistent with
the observation that advertising is mostly persuasive. For experience goods
whose quality must be learned, advertising cannot supply any information
about the product quality but must instead persuade consumers to try out a
product. For digital products, being experience goods, advertising will be more
persuasive than informative, which further diminishes the value of advertising
as a signal for quality.
Renting a Reputation
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 242
-----------
The buyers of an article are thus ensured of its quality, knowing that the
intermediaries check the content of the article.
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 245
-----------
may occur prior to marketing a product or concurrently, which is elaborated in
Chapter 8. This section, however, focuses on the narrow definition of Internet
marketing—providing product information in the hope of increasing
sales—and evaluates the various strategies currently used or advocated. We
first review popular myths and wisdom regarding Internet marketing, and
analyze in-depth several popular notions, such as targeted advertising, push
versus pull models, and active marketing. We end by summarizing some
empirical studies on the effectiveness of these methods.
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 249
-----------
Active and intrusive advertising, such as mass e-mailings, is also redundant
and wasteful; it sends out messages that are of no value to many receivers and
are therefore wasted. Although over-the-air broadcasting also generates this
waste, messages floating in the air do not have as significant an effect as those
flowing through wired communications networks. Compared to mass media
advertising, then, reducing such wastes seems to be one area in which Internet
advertising can improve market efficiency substantially. For those who are
familiar with mass-media, "pushed" messages often appear to be more
efficient than "pulled" messages.
Advertisements as Commodities
Two trends might discourage push advertising. One trend is the effort to sell
advertisements as products. CyberGold (http://www.cybergold.com) has the
novel concept of marketing personalized advertisements to interested
consumers who voluntarily read the ads in exchange for direct payments from
the advertisers. Consumers fill out data on personal interests, and CyberGold
distributes targeted advertisements based on the personal profile. Each banner
is denoted with the amount of payment (see fig. 6.9). If interested, the reader
clicks the banner to read it and, passing some tests on its content, is paid for
the effort. Readers can sort and choose what they read, and the advertisers can
vary payments to reflect the frequency and desirability of readers. Advertisers
on mass media pay based on inadequate measures of audience. In contrast,
CyberGold's model is a sophisticated and direct means of advertisement.
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 253
-----------
customers. Similarly, the pull model of web merchandising implies passive
marketing.
This impression, however, is only superficial. Web-based marketers need to be
active, not in the sense of pushing products, but in interacting with customers.
Instead of passively displaying product and purchase information on their web
pages, marketers need to receive and process input from customers to assist in
their purchase decision and to customize products based on consumer
preferences. This interactivity does not require a real-time application. Rather,
consumer-seller interactions occur on the web because web storefronts
incorporate many functions of a physical store. Sales assistants in physical
markets, for example, help consumers pick out products; web pages must also
act as a sales assistant, guiding customers in their purchasing decision. Web
stores also perform the functions of production, delivery, and customer
service. An active web store takes advantage in organizing such diverse
functions in a dynamic process. A passive web store is static and only offers a
take-it-or-leave-it option.
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 257
-----------
Finally, on a technological level, the Internet poses a unique problem because,
unlike in mass media, technologies are rapidly developing to counter
electronic advertising and to give consumers control over messages. PrivNet
(http://www.privnet.com) has developed software that blocks memory-
grabbing features of a web page, such as graphics, blinking texts, and ads, and
disables web cookies, which record what a browser viewed in a web site. The
same technology that offers online advertisers a sophisticated tool also affords
consumers a means to combat intrusive messages. Filtering technologies are
necessary to solve information overload and to limit intrusive uses of the
Internet such as junk e-mails. These technologies have the potential to limit
further the effectiveness of online advertising.
6.5.Summary
When consumers have little or no information about product quality, the
market generally fails or the quality of the product deteriorates. One market
mechanism that prevents such market inefficiency is for the seller to provide
product information directly to consumers through advertising or to send
certain signals to convince consumers about the quality. This chapter reviewed
such seller-initiated information methods. An important aspect of online
advertising and marketing is that the medium facilitates integrating various
selling processes. Web storefronts, therefore, are a focal point in combining
product development, advertising, and ordering as well as customer service in
a seamless process of marketing. An equally possible alternative to seller-
provided information is for consumers to search for information, which is the
focus of the next chapter.
Page 258
References
Bain, J.S. Barriers to New Competition: Their Character and Consequences in
Manufacturing Industries. Cambridge: Harvard University Press, 1956.
Blum, M. "How to Prove a Theorem So No One Else Can Claim It."
Proceedings of the International Congress of Mathematicians, Berkeley, CA,
1986.
Caves, R.E., and D.P. Greene. "Brands' Quality Levels, Prices, and
Advertising Outlays: Empirical Evidence on Signals and Information Costs."
International Journal of Industrial Organization. 14: 29_52. 1996.
Chu, W., and W. Chu. "Signaling Quality by Selling through a Reputable
Retailer: an Example of Renting the Reputation of another Agent." Marketing
Science. 13(2) (1994): 177_189.
Cyberatlas, 1996. "What Makes People Click?" Available at
http://ww.cyberatlas.com/wip2.html.
Donatello, M., 1997. "How Do I Click Thee? Let Me Count the Ways..."
Available at http://www.naa.org/edge/eresearch.html.
Signaling
Cho, I. K., and Kreps, D.M. "Signaling Games and Stable Equilibria."
Quarterly Journal of Economics, 95 (1987): 1_24.
Spence, A.M. Market Signaling: Information Transfer in Hiring and Related
Processes. Cambridge: Harvard University Press, 1973.
Page 261
Internet Resources
Web Directory for Advertising
Shareware Resources
The following are some popular web sites that offer shareware:
● Arizona Mac Users Group: http://cdrom.amug.org
● BestZips: http://www.bestzips.com
● CNET's Shareware site: http://www.shareware.com
● Educational Software Cooperative: http://members.aol.com/edsoftcoop
● FTP search by program name: http://ftpsearch.ntnu.no/ftpsearch
● Shareware Trade Association: http://www.shareware.org
● Ziff-Davis Interactive: http://www.zdnet.com/zdi/software
Previous | Table of Contents | Next
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 263
-----------
CHAPTER 7
Search Costs
The cost of a search is any amount of money, time, or effort that buyers may
incur in obtaining price and quality information for products. Examples of
costly information gathering are visits to stores (which involve transportation
and time costs), telephone calls, buying newspapers, and so on. In physical
markets, searches usually happen sequentially—that is, consumers visit one
store, gather information, decide whether or not to purchase, and visit the next
store if the product is not bought (see fig. 7.1).
Suppose that Alice goes to the store #1, and finds the offer price is $10.
Suppose also that it costs $1 to visit each store, and that, for simplicity, this
cost is the same for all visits. Including the search cost, she faces the total price
of $11 at the first store she visits. She must decide whether to accept or reject
the offer. Her purchasing process may be either "take-it-or-leave-it" (accepting
the posted price), or "bargaining." If she goes to a second store, she incurs
another $1 for her search. If the second store offers the same product at $9.50,
Alice would have been better off buying it at the first store, because the total
price at the second store is $11.50 ($9.50 + $1 + $1). Suppose that $9.50 is the
competitive price and every consumer knows that fact. However, despite
consumers' knowledge, prices higher than the competitive price are still
observed in the market because of the search cost. If all sellers follow this
reasoning, there can only be one stable equilibrium price, which is at the
monopoly price. Even when the search cost is reduced to an arbitrarily small
amount, the logic of this result remains valid unless the search cost actually
becomes zero. In summary, this scenario demonstrates that prices will be
monopolistic—or arbitrarily high—even when there are many competing
sellers, as long as consumers are not informed and must incur search costs.
Page 266
Similar to searches in physical markets, online searches can also be carried out
either sequentially or simultaneously. Surfing through different web stores is a
sequential search; a price search based on a price database is an example of a
simultaneous search. In either case, an online search offers a tremendous
advantage over a physical search. Besides the lowered costs for time and
transportation, a computer-based search allows consumers to remember and
compare information gathered from many stores. Furthermore, online searches
enable consumers to process a wide range of information other than price, such
as location and name of vendors, terms of sales, quality and performance
variables, brand names, sizes and other product characteristics, and so forth.
Comparing prices alone strains the capacity to process information in physical
markets, especially if shopping involves many products. Online search
technologies automate this process and allow consumers to engage in more
sophisticated and efficient searches.
The search and information transmission mechanisms used in the electronic
marketplace are too new for researchers to have determined their efficiency. In
fact, there are contradicting predictions about what will happen. One view is
that with computer technologies such as search engines and intelligent
software agents, consumers may be able to search the whole information space
at no cost. For example, suppose you want to buy a product. Using a computer
program, you initiate a search mechanism that searches all the web pages on
the Internet for a product that matches your needs. The search generates a table
of names of sellers, prices, locations, and product specifications, as well as
other relevant information such as seller reputation, past sales records, and so
forth. You then choose a seller among the candidates, and initiate a purchase
order. Although this scenario is close to one with no search costs, which
produces an efficient market, there are many reasons why the electronic
marketplace may not actually be so efficient. In the first place, sellers may not
provide relevant information. Secondly, search algorithms or techniques may
not be sufficient to gather all the relevant information. This may be because of
access difficulties (because some web sites do not allow access), or because all
searches inevitably select and process information based
Previous | Table of Contents | Next
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 268
-----------
on prescribed criteria that may have non-technical problems. Lastly, economic
analyses indicate that a non-zero search cost, however small it may be, results
in noncompetitive pricing. Using electronic media may reduce search costs to
an arbitrarily small amount, but the cost is still non-zero. In mathematical
models, a reduction in search costs is quite different from an elimination of
search costs. In this regard, it may be reasonable to assume that the problems
associated with information will persist in electronic commerce as they do in
physical markets.
As section 7.4 discusses in more detail, some authors argue that increasing
advertising (such as information provided by sellers) tends to be a better means
of producing an efficient market than is efficient consumer searching. The
argument is that competition through advertising tends to lower prices,
whereas consumers do not usually search for all information because of the
search costs involved or the difficulty of processing information. The resulting
lack of full information on the part of consumers often gives some firms an
incentive to raise their prices. It is still not certain that advertising will be a
better information channel than a consumer search in electronic commerce.
Broadcast-based advertising has many obvious drawbacks, the most glaring of
which is that mass advertising is strongly resisted and discouraged on the
Internet, because Internet users must pay for connection and downloading time
to receive ads. Also, by its nature, advertising is necessarily duplicative and
wasteful (as discussed in Chapter 6), not to speak of its side effect of cluttering
precious bandwidth. At the same time, Internet consumers seem to prefer to
access product information actively. The conclusion is that searches initiated
by consumers based on their identified needs will surely be more efficient (in
terms of costs and effectiveness) in reaching the intended audience than
duplicative broadcast advertising will be.
Finally, consumers may behave differently in the electronic marketplace than
in physical markets where search costs are usually positive. This
positive—however small—search cost results in higher than competitive
prices. This phenomenon is popularly known as the "Diamond paradox"
(Diamond, 1971). Are search costs always positive? Admittedly, some
shoppers realize an enjoyment
Page 269
benefit to shopping rather than a cost. On the Internet, "surfers" often resemble
those shoppers who happily visit stores to simply look at the merchandise.
Armed with powerful archiving programs, online surfers are able to gather
information while enjoying themselves. When they process this information to
make a purchasing decision, the net cost of search may indeed be zero—or
certainly not positive—debunking the paradoxical result of monopoly price
equilibrium under positive search costs (Stahl, 1996).
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 272
----------- ● AccessThrough selection, consumers acquire lists of information sites
that fit their search criteria. But, to actually view these documents,
selected information must be downloaded or accessed by visiting the
web sites. The access occurs in two stages: the connecting and retrieving
processes.
The search market in this formulation extends beyond electronic searches to
include many forms of advertising. Advertising through mass mailing, for
example, consists of content providers and access, but the selection process is
entirely determined by the senders. In other words, it lacks the consumers'
selective initiative. Classified ads offer contents and selection, where contents
are the ads and the selection is provided by classification schemes, but
consumers must rely on different media to actually access the information, for
example, contact a store or a person offering the information. Directories may
provide contents if their classifications are useful in distinguishing entries. On
the other hand, directories like the white pages of the telephone book often
provide only selection because they do not have description and because
consumers need to place the call themselves. Internet search services such as
Yahoo! (http:// www.yahoo.com) and AltaVista
(http://www.altavista.digital.com) combine all three components, offering
contents, some selection mechanisms, and hyperlinks to access the contents;
but the search services differ in their scope of content and their selection
mechanisms.
Although Internet search services focus on selection and access processes, the
relevant contents must be exhaustive for a search to be efficient. The contents
need to include not only price and location of the sellers but also related
product information and the terms of sales. As content providers, web pages
should be configured to act as a sales person providing information such as
product specification, differences from other products, recommendations, and
so on. For example, to buy a shirt, a consumer may want to know the fabric,
type of care required, appropriate style consideration, size and fit, and so forth.
Consumers may also want to know third-party evaluations and safety records.
In short, web pages are expected to offer the knowledge and expertise that a
trained sales staff is expected to provide in a physical market.
Page 273
An ideal search market, therefore, allows consumers to take their searches
through a series of filtering processes by which they may reduce the universe
of available information to a manageable and meaningful size. An efficient
Internet search market can be depicted, as in figure 7.3, as the content space
available on the Internet containing the set of selected information, which also
contains accessed information space. In this case, even though some product
information is only available offline, the online search market is efficient
because all contents that are relevant (the area of the pentagon) exist online
(the rounded rectangle). In other words, one is a proper subset of the other in
the order of contents, selection, and access. If any or some of them are not a
proper subset, the search market is not efficient. For example, if some
contents, which are needed in the selection process, are not available online,
the search process cannot be efficient. In figure 7.4, (a) shows a case where
some information, although relevant, is not available online. As a result, only
the contents accessible online are retrieved.
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 276
-----------
Search Efficiency in Intermediaries
The primary way to search for products and price information in physical
markets is to visit stores. In the electronic marketplace, physical limitation is
replaced with a problem: locating and processing the relevant information is
difficult not because of the lack of such information but because of the very
abundance of it.
The prevalence of electronic catalogs, directories, and search services on the
Internet signals a new age of information overload. Although the incredible
amount of information provided on the Internet helps consumers to find
products matching their preferences, managing this information becomes a
new task for consumers who want to maximize the informational benefit of
this new communication medium. In the electronic marketplace, where
geographical residence has little meaning, the "natives" in the
native-and-tourist model of price dispersion are those who can use computer
programs comfortably, who know where to find relevant information, and who
have the correct type of software agents and brokers to help them in processing
the information. Those who have the ability to navigate the sea of information
have a clear economic advantage over electronic "tourists" in finding the right
products at the right prices.
In electronic commerce, however, most consumers may enjoy the benefit of
being a native because information processing—or navigating the sea of
information—can be automated to be run by computer programs (also called
intelligent agents) or relegated to information intermediaries who sell their
expertise in organizing information. Both of these tools help consumers to
search, locate, retrieve, filter, and process information without incurring as
high a cost as they do in physical markets.
Page 279
Intelligent or software agents, or bots, are computer programs that carry out a
specific task as programmed by a user. (A more detailed discussion is included
in section 7.3). For example, they can screen incoming e-mail messages,
evaluate them, and sort them out according to prescribed priorities, often
generating automatic replies when required. Some agents can be sent over the
network to search for information and report the results back to the owner. In a
similar manner, most web page databases of Internet search services are
generated by sending intelligent agents or bots, which can be highly
individualized to match users' preferences. Using artificial intelligence, these
agents can be trained over a period of time to refine their processing power.
With future developments in intelligent agents, the gain in closer preference
matching may even be more substantial than the gains in network efficiency
that have been achieved through the use of intermediaries.
However, in a non-intermediated search market, the problem of information
uncertainty still exists. Simply put, consumers must trust what the sellers say
about their products. Often sellers may not provide enough information for
consumers to fully evaluate their products, or the information received may be
inadequate for consumers to judge whether the sellers are reputable companies
or fly-by-night operators. Without some guarantee about the information and
remedies available in the event that there is a dispute over payment, delivery,
or post-sale service, face-to-face sales must be carried out on the basis of the
seller's reputation. In light of this, an intermediary's role in a search market
extends beyond being an information depository and distribution center. An
information intermediary processes the information gathered by selecting,
classifying, and evaluating it. With an added function as an information
retailer, an information intermediary can also act as a third party that manages
quality and service disputes between the buyer and the seller. Nevertheless, the
primary advantage of using an information intermediary lies in the resulting
increases in informational efficiency, both in quality and content.
Information is considered to be efficient if it is precise and correct. Suppose
there is an uncertain state of the world, such as tomorrow's temperature in
Austin, Texas. The actual temperature can be any number. After tomorrow,
Previous | Table of Contents | Next
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 280
-----------
you will know the temperature—a certainty by then. The usefulness of
information is in guiding us from the uncertain state to the certain state of the
world. In forecasting tomorrow's temperature, certain information is useful,
such as the location of the place, the season, previous temperatures, and so
forth. Some information may only help us to narrow the temperature down into
possible ranges, perhaps between 90 and 100. The more precise the
information is, the more valuable. Although a forecast of a temperature may be
correct in that it predicts the actual range, it may still be imprecise. The degree
of precision required depends on one's needs.
The primary function—and added value—of an information intermediary is in
enhancing the precision and "correctness" or accuracy of the information
collected. As such, users can access precise and correct information with
minimal effort by sending a query to a search service rather than embarking on
their own worldwide searches of the World Wide Web. But how can
intermediaries enhance the value of information? The answer lies in their
expertise: information brokers are equipped with more experience and greater
technical ability to process information. Secondly, they are better able to
evaluate the information and can offer a greater reliability to consumers as one
advantage of using their service rather than searching themselves. Initially, the
success of an intermediary depends upon the reputation and reliability of its
service, which is an added incentive for service providers to maintain better
information. Information efficiency is therefore an added value obtained by a
search market organized around intermediaries.
Search or Surf?
A complete listing of web sites and their documents currently does not exist.
Instead, consumers need to visit different search sites or relevant web sites that
might have useful links. This lack of a complete directory is not in itself a new
problem. In physical markets, a telephone directory only lists local businesses,
and there are a number of specialized directories for different industries and
markets. However, there is no reason why all information housed in a library's
reference section cannot be combined into one database, especially on the
Internet. Combining different Internet search databases can further alleviate
the hassle of having to use several search engines and the duplicative costs of
having many users collecting the same information. To recover the cost of
compiling an Internet database, more and more search engines are preoccupied
with soliciting advertisers rather than improving data integrity and search
efficiency. Search engines may be one of a few Internet services that are truly
essential in enhancing the usability and usefulness of the Internet for
commerce. An incomplete search engine is as useful as a partial phone
directory.
Internet search databases are also inaccurate and outdated because web sites
are constantly changing. They often give consumers links that no longer exist.
Page 282
In such an environment, updating may require as much effort as compiling the
initial database. An alternative may be to accept—or require—submissions by
site owners about changes. Another inaccuracy stems from web sites
misrepresenting and pretending to be something that they are not. That
possibility compels data compilers to verify each site manually, further
increasing the costs of maintaining an accurate database. A more coordinated
system of feedback among content providers, users, and search engines are
needed.
A third inadequacy of current search engines are the irrelevancy of some sites
matching search keywords. One problem stems from the lack of sophisticated
and complex search mechanisms to weed out irrelevant information. Equally
lacking is a proper description for each web site and its materials upon which
to base a search. As a result, a simple search often produces tens of thousands
of meaningless links. Digital document metadata standards need to be
established and accepted by content providers and become part of content
creation.
Finally, search results need to be objective. Results can be skewed if the
database itself consists of information that is pre-selected based on arbitrary
criteria. Some search engines do not include personal homepages or materials
residing on university web sites. Others reject web sites that are considered
offensive, indecent, or frivolous by their own standards. Also, with the
increasing commercialization, some search engine providers may give
preference to paying advertisers. Although all these are reasonable behaviors
for private enterprises, what would be the use of a phone directory that omitted
all "Smiths" or those living in an area with a particular zip code? An Internet
search engine is no longer just a springboard for Internet surfing. Rather, as an
essential infrastructure, its database needs to be complete and accurate to foster
an efficient information exchange.
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 283
-----------
Wide Web, with the largest and the fastest-growing servers today.
Nevertheless, the web is only one of a large number of digital information
resources. Despite the growing trend to move files from non-web servers to
web servers, some files may be better served through traditional information
channels such as anonymous FTP. One example is the downloading of free
software, which is far easier and is customizable with an anonymous FTP
program than with the World Wide Web. In addition, one of the advantages of
the World Wide Web is its capability to handle different data servers,
including FTP, Gopher, electronic mail, and others. Precisely for this reason,
FTP and Gopher files need not be moved into the web (HTTP) server, which
will prolong the life of many non-web information servers.
Numerous introductory books have been written with step-by-step user
instructions that inventory all types of resources and services available on the
Internet (see, for example Hahn, 1996). The following review of Internet
services is not meant to provide an exhaustive description, but rather to
highlight the characteristics of the information provided and each service's
efficiency in facilitating information searches. For the purposes of this
discussion, the wide range of Internet information sources can be divided into
three broad groups:
● Services based on file transfers: World Wide Web, Gopher, FTP and
Telnet
● Services used for broadcasting and exchanging information: UseNet,
mailing lists, and electronic messaging
● Services that involve real-time interactions: talk, Internet Relay Chat,
and Multiple User Dungeons (MUDs)
Although these services are not an altogether practical way of storing and
searching information for real-time services, they are discussed here.
Web Searches
The challenge for web search servers and consumers is how to filter, organize,
and process search information, which is essentially information (indexes)
about information (web contents). The following sections first focus on
non-web information sources and provide a brief description of the search
methods
Page 285
of each. Section 7.5 focuses on the informational efficiency of web search
services in more detail.
Gopher
The gopher system is quite similar to the web in most of its methods of
accessing and distributing information. Since its development in April, 1991 at
the University of Minnesota, it has seen phenomenal growth in the number of
servers and files offered, but then a precipitous decline due to the popularity of
the web. Gopher is essentially a system of Gopher servers containing files that
can be connected and accessed by others using Gopher client programs. In its
architecture, the Gopher is not much different from the web. However, Gopher
was developed as a cheap and easy way to share information resources in a
wide area network called Gopherspace. It presents a simple text-based menu of
files and directories of other gopher servers. It can also handle non-text
formats such as graphic and sound files. To view these, Gopher uses helper
applications, just as web browsers do, to process images and sounds. In this
respect, however, the web server is more versatile and can process multimedia
files seamlessly. Also, the graphic-rich user interface of the web and the ability
of web users to publish and present their content online have made the web the
overwhelming choice for Internet information interchange.
Despite the decline of the Gopher system, however, it remains an easy-to-use,
fast source of text-based information. An immense amount of information,
saved as simple text files, is available under gopher servers. Public,
governmental, and educational institutions in particular maintain a large
database of information on their Gopher servers. Many of these files await
conversion to web resources, but many will remain as Gopher files that can be
accessed by web browsers.
Gopher Search
The web and Gopher are both, in essence, automated file transfer programs.
Computer networks were first built to exchange files among different
computers using a set File Transfer Protocol (FTP) to ensure interoperability.
The development of various Internet services has been the result of
technological progress in making this file transfer process easier and
broadening it to enable all types of files to be transferred and viewed. The web
is merely the latest stage of this development.
FTP, on the other hand, was the first interactive service between computers
that required users to have a user ID and password to log in. Even in this age
of web browsing, file transfers between two machines or computer accounts
are accomplished via FTP. Anonymous FTP refers to an FTP server that is
configured to accept anonymous logins so that even users who do not have an
account with the host computer can log in, view, and download files, although
uploading is often limited to authorized persons.
The importance of anonymous FTP service lies in the immense mountain of
information that resides on these servers. Archives of most information
channels are stored in anonymous FTP servers, but most importantly Internet
software, both freeware and shareware, is distributed via anonymous FTP.
Telnet is similar in appearance to an FTP program in that users establish a
connection to a host computer and log in using their user ID and password.
However, Telnet allows users far wider control over the session. Users can
Previous | Table of Contents | Next
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 287
-----------
"telnet" to a computer where they have an account and work remotely doing
most operations as if they were directly logged on to the host computer.
Telnet is one piece of the enabling environment that makes the prospect of
telecommuting over the Internet possible because users can be anywhere and
still access their office computers. Similarly, you no longer need to go to a
library to use its online catalog. Customers can remotely log in to the library
Telnet system and browse and search for information, because most bulletin
board systems are running on Telnet. In situations where an information
service provider is centrally located with users scattered, as in many
government services, Telnet is an efficient and cost-effective means to provide
information. It is primarily used to access public information resources such as
library catalogs, public bulletin board systems, and information kiosks where
user inputs—such as choices of menu or form submission—are necessary. The
World Wide Web can also process user inputs through script-based programs,
but Telnet is more suitable for a remote working session.
UseNet
Mailing Lists
Mailing lists broadcast messages similar to UseNet newsgroups (in fact, many
mailing lists are available for reading under bit.listserv newsgroup hierarchy)
but they restrict posting to subscribers only. The significant difference between
mailing lists and UseNet is that the subject of discussion is even further
specialized and the messages are often archived for mailing lists. Also, unlike
UseNet, which does not have a central administrator, mailing lists are run by
managers of mail servers and by the owners of the list, who control all aspects
of information exchange and subscription. Consequently, many mailing lists
are run by commercial interests. The nature of focused and controlled
broadcasting through a mailing list has made it a favored marketing tool for
sellers, who can mass-distribute ads and other messages to subscribers (see fig.
7.6). It seems an ideal environment, where consumers voluntarily request
product information and still retain control over the channel because they can
unsubscribe at any time.
Previous | Table of Contents | Next
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 290
-----------
Electronic Messaging
Figure 7.7A typical setting for a mailing list (example of "Historical Fiction
Writers Group" mailing list).
As a messaging system, electronic mail lacks many of the standards for
services, such as receipt acknowledgment, registered mail, and insurance,
which are available with postal services. The lack of such services makes it a
poor medium to conduct commercial and legal transactions. However, e-mails
are delivered at all times, and users can distribute files to multiple recipients as
well as screen incoming messages. Its instant, universal, and reliable
messaging should make it a better medium to conduct business than posts or
faxes after basic standards are in place.
Page 292
Because of e-mail's private nature, there is no archive for messages, and they
will never be fully cataloged on the Internet. However, e-mail addresses can be
searched using directories based on X.500 standards if the addresses are
known. As in most EDI standards, X.500 standards only allow limited data
fields such as names and addresses (see fig. 7.8), but these fields can be
generated efficiently. If the address is unknown, worldwide searches can be
done by logging into NetFind or Finger, which contain X.500 databases. To
search for an e-mail address, the searcher specifies a combination of domain
names and user names. For example, if someone knows only the last name of
an individual and the name of the school he attends, he can use these items as a
search string, and NetFind or Finger searches all X.500 directories in the
school's known computer domains, and produces a list of e-mail addresses that
contain the last name specified.
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 295
-----------
International Data Corporation (http://www.idcresearch.com), the Internet had
about 37 million users and 107 million web pages in March, 1997. This
number is growing at about 2 percent every month. As the web becomes the
dominant information channel, it is important to focus on how web search
services are organized and to evaluate their efficiency in providing relevant
information to users.
Many personal web pages can actually be considered to be the result of a
personalized search service in its simplest form. In many cases the pages
contain nothing more than links to other web pages that the page creator
collected and organized under his or her interest areas, such as "My Favorite
Internet Bookstores" or "Audrey Hepburn's Unofficial Homepage." In a
fundamental way, these links represent a process of filtering of information,
that is, choosing information based on a relevancy criterion, evaluated by the
author, and presented to the public. Web search engines go through a similar
process, although they cover a wider area of web space and may use more
sophisticated selection criteria, the main topic of this section.
Adequate search facilities are an integral prerequisite to informational use of
the web. Surprisingly, however, the initial popularity of the web was due to its
recreational, not informational, use. The distinctive feature of the web is the
capability it gives users to jump from one place to another by clicking on
hypertext links. In fact, the web authoring language is named HyperText
Markup Language (HTML) and the addresses of web pages are designated by
HTTP (HyperText Transfer Protocol), all of which emphasize the hypertext
links and jumps. Therefore, it is not strange that the web users were said to be
"surfing the net," which signifies a random clicking and jumping between
places and an assumption that users were not searching for specific
information but spending time reading whatever web pages they happened to
encounter. Even today, some search engines offer visitors an option to surf
through randomly chosen web sites.
Surfing the net in this way is still the only way some web pages can be found,
because not all pages are indexed or cataloged. Users of search engines are
essentially limited to the web space that their search intermediaries have
Page 296
mapped out. Although this may be a limitation, relying on search engines are
still the easiest way to find specific information. Because the search space is
limited by the will of the service providers, gains in efficiency must be
weighed against the losses involved in foregoing some information not
included in the search database. The extent of the loss or gain depends on how
the search intermediaries filter information when preparing their databases.
Information filtering is done by search intermediaries in two stages: (1)
selection and (2) presentation. In each stage, some arbitrary value judgment is
imposed that may or may not affect the information efficiency for the
consumers. In terms of selection, search services quote how many unique web
addresses (URLs) their databases cover. The numbers range from tens of
millions to several hundred thousands. Some URLs are not visited, and
bot-resistant sites may be omitted. Some URLs are not added if they are
deemed to be of minor interest. The criteria used are, for example,
informational content, graphical presentation, and other interesting features.
Knowing how each search database is compiled helps users select a search
provider. For example, some search databases give high marks for jazzy
graphical contents and technological sophistication. For content-oriented users,
these sites, albeit valued highly by database compilers, may appear as a poor
source for information. Selection criteria are often discussed in the "About and
FAQ pages" of search engines.
After databases of this information are made, search intermediaries can use
different methods of accessing them for consumers. In one polar case, the
database may be presented as is so that when consumers search by keywords,
the results are displayed based on some relevancy criteria only. Relevancy
criteria are such measures as how many words in the document match the
search words, or whether the search word appears in the title or the URL,
which results in a higher relevancy score. Keyword strings can be enclosed in
quotes, as in "historical fiction," which narrows the search to select only those
documents that contain the phrase. Even with this and other improvements in
querying, the result of a search is often overwhelming. For example, 6,000
Page 297
documents are shown as a result of AltaVista search
(http://www.altavista.digital.com) using "historical fiction" and FAQ as
keywords (see fig. 7.9), but presented in the order of how many words are
matched. In this case, the information filtering by the intermediary (who
simply presents all matching entries) is minimal. On the other end of the
extreme, intermediaries may present sites evaluated and recommended by their
staff, such as the "What's New" and "What's Hot" lists.
Figure 7.9AltaVista search result using "historical fiction" and FAQ as
keywords.
Rather than using relevancy tests such as keyword matching, some
intermediaries organize their databases by categories; Yahoo!'s subject listings
are a good example. Keyword searches may end up presenting irrelevant
information that uses the search word in a totally different context; subject
listings or directories, however, present more reliable information on a given
subject. It is sometimes difficult to characterize a web page by one subject,
though, and intermediaries must exercise certain value judgments in deciding
under what subject a web page should be classified. This arbitrary decision
introduces errors as significant as those borne by keyword searches.
In another extreme case, search intermediaries present predetermined lists of
web sites to searchers. These sites have promotional materials or are paying
Page 298
advertisers. There is no way of knowing what criteria are used to select the
recommended or suggested web pages. By mixing data with plain advertising
links, the objectivity of the third-party intermediary is seriously compromised.
The process of information filtering has more facets than you may imagine.
Search intermediaries represent an example of information filtering occurring
in the middle of the information acquisition process. Although controlling and
filtering information at the source may be the result of censorship, firms may
also voluntarily restrict consumers' access to product information by not
providing certain information over the network. Another example of extreme
information filtering is broadcast television, where consumers have no control
over which programs are broadcast.
To increase consumer choices for information acquisition and consumption,
information filtering must occur in the later stages of the acquisition process.
Information filtering can be delayed until all information reaches the
consumers. Filtering agents, which can be programmed to sort out incoming
messages and to manage files, have become popular because of the increase in
information overload. Artificial intelligence-based summarizers can scan all
incoming information and present summaries according to a prescribed format
or filtering profile. Through the application of artificial intelligence, filtering
agents can be trained according to user tastes, reducing the margin of error.
Also, consumers can send out intelligent agents to search for information just
as search intermediaries have used their agents, such as bots, spiders, and so
forth, to compile their database. In this case, the role of search intermediary is
replaced by intelligent software agents, and information filtering is done by the
consumers themselves.
Information filtering is based on a simple procedure that places a filtering
program between a user and the content server (see fig. 7.10). The filtering
agent carries out selection processes based on user-determined filtering criteria
known as scripts or profiles, which are continuously updated via feedback. In a
collaborative filtering scheme, scripts and profiles are exchanged among
Previous | Table of Contents | Next
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 299
-----------
different users. An increasingly popular use of filtering agents among parents
and educators is to block certain web sites that contain inappropriate or
indecent materials. Some examples are: Cyberpatrol
(http://www.cyberpatrol.com), Cybersitter (http://www.solidoak.com), and
NetNanny (http://www.netnanny.com). Although these examples are software
programs that can be downloaded or installed by individual users, N2H2
(http://www.n2h2.com) provides server-based solutions, where filtering is
implemented for all users connected to the server. The same filtering scheme is
used to remove only the unwanted portion of a web document. In the
WebFilter implementation developed by Axel Boldt
(http://www.math.ucsb.edu/~boldt/), the filter is a proxy server that retrieves a
document and removes prescribed features such as advertising banners or large
graphics before presenting it to a user.
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 303
-----------
on. Census tracts are written on the rows as 1.01, 1.02, 2.01, 2.02, and so forth.
The table itself contains data, but no metadata. To help users, you can provide
an additional description of the data. For example, AGE01 means the number
of persons 1-year-old or under on September, 1989. INC01 refers to the
number of households with $5,000 or less in annual income in the year 1988.
You can also provide street names that bound each census tract to help plot the
data on a map. Other information is also necessary to be able to interpret the
data fully, such as error correction procedures, weighting methods, missing
value treatments, and information about census survey methods.
All this data does not describe the actual households that are the subject of the
census. Instead, it describes, or refers to, the collected data, and in this sense, it
is called metadata—data about data. Metadata standards are being developed
for many types of information: digital catalog standards are being prepared by
digital library associations, metadata standards are under development by the
Federal Geographic Data Committee, and most pertinent to the topic of the
Internet, private efforts are under way to establish header information for
digital files and software.
What is called metadata for databases is called metainformation for
information. Digital catalog standards attempt to establish a certain number of
variables that describe a digital file. Variables include the name of the author
and copyright holders, publication date, size of the file, type of file, system
requirement for viewing the file, and others. In a unified digital environment,
catalogs, headers, and codebooks have to be merged into one standardized
document called metainformation. Unlike library catalog cards or database
codebooks, digital headers, catalogs, and metainformation will be attached to
the document itself, and will become an integral tool in using and accessing
the document. For microproducts and microbundles, standardized
metainformation can be viewed rather than actual products, facilitating
transactions and minimizing concerns for copyright infringement.
Although search service providers and market analysts tend to focus on the
technical aspects of search engines and algorithms, or the commercial aspect
of
Page 304
a search service as an advertising conduit, in fact the greatest asset of the
Yahoo! directory is said to be its database of consumer preferences gathered
from monitoring access. The objective of managing Yahoo!'s directory
information is changing from providing a more efficient search mechanism to
maximizing advertising revenues. Advertising can be justified on search
engines in that it allows the service to be offered free to consumers, who
otherwise would need to pay a small fee.
An advertising-based search service brings to mind broadcast television. Just
as TV programming decisions are influenced by sponsors, search services may
also give preference to advertisers by presenting their URLs first. Also,
advertiser-supported TV programs target the broadest possible audience by
catering to the lowest common denominators of the viewers. Such
inefficiencies may appear in advertiser-supported search services as well. For
example, there may end up being a lack of specialized search services, or
search databases may ignore highly specialized web pages. On the other hand,
various search services may catalog mainly popular web sites so that more
people will visit them. Having a huge database of seldom-visited web sites
does not bring in as high a hit rate as does one with popular sites. Because
maintaining an up- to-date search database becomes more complex and
expensive, numerous advertiser-supported search services—competing for the
same customers—will hardly justify maintaining a complete, accurate and
ever-expanding database.
An alternative is to consolidate search services, not necessarily by supporting
only one provider but by linking databases. If advertising is to continue, there
may be a revenue sharing agreement to support linked databases. Another way
to avoid the pitfalls of broadcast business models is to implement
micropayments, perhaps in conjunction with distributing small payments or
coupons for reading advertisements online. When a commodity (such as
searches) is not arbitrarily tied with external goods (such as advertising) the
market becomes more efficient in the type of goods produced and in allocating
resources.
Page 305
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 306
-----------
zero. If the cost of advertising and consumer search are equivalent, it is
reasonable to expect the same result whether the cost reduction is in
advertising or in consumer searches. However, Robert and Stahl (1993) show
that the effect of reducing advertising cost is very much different from that of
lowering search cost. When advertising cost is lowered, firms tend to send
more advertisements and prices approach the marginal cost. On the other hand,
if the advantage is with consumers whose search costs decline, Robert and
Stahl show that firms reduce advertising drastically. Because there are
uninformed consumers as long as search costs are not exactly zero, prices tend
to rise above the marginal cost. In short, cost changes in advertising and
searches do have different market implications.
As long as there are non-zero, positive costs for advertising and search, then,
this surprising result implies that reductions in advertising costs do a better job
of bringing about lower prices than does improving search processes. This
does not mean that it is appropriate to ignore efficiency issues in the search
market; advertising alone does not bring about lower prices unless its cost
becomes zero. Rather, this result cautions against the notion that efficient
searches in electronic commerce will necessarily result in fully informed
consumers and competitive prices. A few observations are in order. Section
7.1, earlier in this chapter, discussed the possibility that search costs may
indeed be zero or even negative (for consumers who actually enjoy searching).
In that case, an efficient search market may produce competitive prices even
without advertising. Also, as in most economic models of advertising,
consumers are treated as potential customers so that any advertisement sent to
a consumer is read. In reality, unwanted advertisements cause resentment
among consumers and waste resources. In electronic commerce, however,
technological developments will reduce wasteful advertising as well as enable
more efficient searches. In fact, advertising and searches will be
indistinguishable in the electronic marketplace, as the following sections
explain.
Page 307
Marketing professionals are familiar with consumer advertising in the world of
one-way broadcasting media. However, in two-way communication, consumer
queries become far more important. Imagine that a consumer wants to buy a
product and can send a request for quotes to various sellers of that product.
This process is often used to contract out high-value projects in which the cost
to sellers of preparing and processing bid information can be justified. In
electronic commerce, consumer searches resemble this process. Rather than
sending indiscriminate advertising to all consumers, sellers can maintain their
web pages with elaborate product and price information, which is then
accessed by potential customers. Consumers may have to pay the costs of
access (for example, the costs of connection fees or search services), if not for
the product information itself. With a micropayment system, at least some
consumers will prefer this need-based search-advertising method over
broadcasting-based advertising. In the electronic marketplace, therefore,
consumer searches and advertising are part of an integrated process of price
discovery. Targeted advertising together with efficient search mechanisms will
push down prices to a competitive level for many products.
7.6.Summary
Advertising and search processes complement each other in electronic
commerce and are essential in reducing the uncertainty about product quality
and in preventing a possible market failure. Although search services on the
Internet are very popular, consumers often have to access different search
engines that cover different sources. Some search engines emphasize
evaluation and categorizing while others simply try to catalog as many web
pages as possible, but the sheer volume of Internet information often makes it
impossible to compile an adequate level of information from all resources that
exist on the Internet. Additionally, the rapid changes on the Internet often
make the information and links outdated.
Page 308
Despite these drawbacks, search engines are an essential tool in navigating the
virtual marketplace. This chapter has discussed the importance of Internet
search engines in terms of consumer search theory in economics. It is possible
in the future that consumers themselves may send out bots or other automated
intelligent agents to search the web space according to the owner's
specification. Rather than clogging the bandwidth with advertising, such bots
or agents could be charged a minute amount of money to be allowed to access
certain metainformation of a web page.
Finally, the efficiency gained from consumer searches and advertising is
necessary for two more compelling reasons in electronic commerce. First,
digital products are highly customized, and will have numerous producers. In
such a market with fragmented products and multiple vendors, all types of
information channels need to be efficient. Secondly, product differentiation
results in market segmentation, which increases sellers' market power.
Therefore, even with numerous sellers in the market, prices will tend to rise
more than in a market with homogeneous products. Efficient searches and
advertising are two elements that may counter potentially high prices in
electronic commerce. The next chapter discusses product customization and
pricing issues.
Page 309
References
Diamond, P.A., 1971. "A Model of Price Adjustment." Journal of Economic
Theory 3: 156_168.
Hahn, H., 1996. The Internet: Complete Reference. Second edition. Berkeley:
Osborne McGraw-Hill.
Robert, R. and D.O. Stahl, 1993. "Informative Price Advertising In a
Sequential Search Model." Econometrica 61 (3): 657_686.
Stahl, D.O., 1996. "Oligopolistic Pricing with Heterogeneous Consumer
Search." International Journal of Industrial Organization, 14:242_268.
Babbage at http://www.bbcnc.org.uk/babbage/iap.html.
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 311
-----------
Software Agents and Filtering
Robomoderation
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 313
-----------
CHAPTER 8
Differentiated products are classified in the same product group, yet they are
not identical. The various brands of breakfast cereal are an example of product
differentiation. Microsoft Word and WordPerfect are differentiated products in
the product group of word processing programs. Notice that Word and
WordPerfect are termed "differentiated" but not "different;" WordPerfect and a
breakfast cereal are "different" products (that is they belong to different
product groups). Another term that is often used with product differentiation is
product variety, which refers to the number of products (or brands) in a
product market. Note, product differentiation relates to the degree of
dissimilarity. Thus, product differentiation may increase if two products
become more dissimilar, while product variety remains the same.
Page 316
Products are perceived to have a bundle of characteristics such as weight, size,
volume, color, and other qualitative measures such as performance and
easiness to use. Products in a group share the same characteristics, but each
has a varying degree of these characteristics. While products can be
differentiated in many ways if the characteristics dimension is complex, a
useful distinction commonly made is between horizontal and vertical product
differentiation.
Horizontal Differentiation
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 317
-----------
Vertical Differentiation
Price Discrimination
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 321
-----------
same product than another consumer with a lower income or no immediate
need. If sellers can distinguish between these consumers, they can charge a
higher price for the former and establish a lower price for the latter. Group
discounts or senior discounts are based on this principle which is an example
of third-degree price discrimination.
Discriminatory pricing based on identification is called third-degree price
discrimination. In the absence of a means to identify consumers, sellers have to
rely on the incentives of each group to select an intended variety. This
condition is called the self selection or incentive compatibility requirement
(see section 8.4, "Pricing Digital Products," for more detail). This means that
given optimal product choices, consumers will sort themselves out according
to product characteristics and a price schedule that reveals their preferences.
This scheme based on consumers' voluntary choices is called second-degree
price discrimination. First-degree or perfect—price discrimination refers to
charging individual prices for each buyer, which are usually determined by the
consumer's maximum willingness to pay.
Discriminatory pricing should be used whenever possible because it is always
more profitable than uniform pricing (Phlips, 1983, p. 18). Not surprisingly,
price discrimination is a common practice. However, these are usually
second-degree price discriminations based on incentive schemes, or
third-degree price discriminations based on consumer groups. First-degree, or
perfect-price discrimination requires detailed consumer information, and the
ability to charge different prices for different consumers. Therefore, prices are
individualized to extract all individual consumer surplus and reselling among
consumers must be prevented. This possibility was once considered to be only
of academic interest, but the increasing availability of detailed consumer
profiles based on electronic transactions information greatly reduces
information uncertainty—a major impediment to practicing perfect price
discrimination. Sellers are increasingly able to introduce individualized prices
through online price negotiation and auctions.
In electronic commerce, the combination of three factors raises the possibility
of perfect-price discrimination. First, sellers gain detailed information about
consumer tastes. Second, products can be customized without much
Page 322
added cost. And third, consumers can be billed independently. In each of these
aspects, physical markets are highly constrained by transaction costs consisting
of information costs, product variation costs, and costs for elaborate billing.
Product Matching
Whenever possible, sellers charge different prices for the same product.
Discounts for groups, children, students, and senior citizens are used to
increase demand without lowering the price for other groups. In this case,
discriminatory prices actually help serve more consumers and increase
economic efficiency and social welfare. But in most cases, products are
differentiated for specific consumer groups. If these differentiated products
have different prices due to cost differences, these prices are not
discriminatory. However, price differentials may not correspond to differences
in costs. For educational markets, for example, software vendors may
intentionally disable certain functions and capabilities of a program to
distinguish these products from those for non-educational markets. Despite the
added cost of disabling the program, products for educational markets are
lower than their commercial versions (Deneckere and McAfee, 1996).
Dividing audience seats by sections in a theater achieves a similar effect.
In physical markets, the key to effectively segment the market with
differentiated products is knowing what one feature each group of consumers
wants that is not wanted by other groups. To prevent high-valuation customers
on the left side of the demand schedule from masquerading as low-valuation
customers on the right side of the demand schedule, sellers must be able to
Page 324
distinguish buyers through some means of identification. In both third- and
second-degree price discriminations, the power of the sellers is limited and
incomplete because they still cannot discriminate consumers within each
group.
In electronic commerce, sellers may finally have the means to practice
first-degree price discrimination by which each individual buyer pays the
maximum price they are willing to pay. In order to achieve a complete price
discrimination, sellers must have control over four factors of transactions:
preference profile, product differentiation, personalized billing, and consumer
arbitrage. Product differentiation is not a fundamental requirement, but it does
reduce the resistance of consumers and regulators to discriminatory prices, and
it also prevents or minimizes consumer arbitrage.
The control over preference profile means that sellers must know what each
customer wants. To date, market research and surveys have been important
aspects in product development and successful retailing. As society moves
from anonymous cash transactions to card-based payments and electronic
payment systems, sellers find it easier to collect information about consumers'
purchasing behaviors. In electronic commerce, this possibility is magnified
exponentially. But the possibility of gathering extensive personalized
information is not guaranteed in the future. Anonymous transactions lessen the
sellers' discriminatory power over consumers. To complete the sellers' market
control, the payment system must be non-anonymous to prevent one consumer
masquerading as another. Because consumers are becoming increasingly
aware and resistant to releasing private information, it is difficult to predict
what kinds of pricing regime will be prevalent in future electronic commerce.
But with the trend toward selling personalized products via subscription, there
will be in all certainty a heightened debate regarding consumer privacy and
anonymity in transactions and payments. At present, the debate revolves
around the privacy right, free speech, and other legal points of view. Instead,
this chapter focuses on the economic links between privacy and product
selection as well as price discrimination.
Previous | Table of Contents | Next
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 325
-----------
8.2. Product Customization
Digital product markets will differ significantly from physical markets both in
terms of production and marketing. For online marketing, the emphasis is on
the interaction between the seller and its customers. This increased interaction
is important in production as well. This section examines why product
differentiation becomes the most important aspect of digital goods production
and evaluates the economic benefits and costs of varying product specification
to the extent of customization.
The distinction between product differentiation and customization may be
considered by the economic literature to be a simple matter of degree. A finely
differentiated product can indeed be considered to be customized. However,
product customization goes far beyond producing a limited number of brands
or qualities of a product, and it raises completely different economic issues.
The number of differentiated products in a market has been an important issue
in the economics of product differentiation where efficiency in production is
often achieved by a standardized product. However, cost-reducing mass
production technology is no longer a major concern for digital products, where
the cost of reproduction becomes minimal. The economic efficiencies that this
section is concerned with are not those of economies of scale but rather those
that relate to product matching and reduced uncertainties in market demand.
Apart from this, product customization is an important strategy which
addresses the problem of unauthorized reproduction and distribution of digital
products by consumers. Finally, because customization is predicated upon
detailed information about consumer preferences, it is intrinsically related to
issues such as digital copyrights and privacy.
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 328
-----------
firms selected. A simple price schedule may be linear based on a fixed amount
for each company selected, for example $0.25 per company. A more complex
pricing strategy involves quantity discount or discounts based on tiers. Such
relationships between product differentiation and pricing are discussed in more
detail in section 8.4.
The primary economic benefits of product customization stem from the fact
that products match consumers' needs better than undifferentiated products
which correspond to the taste of the average consumer. For sellers, better
product matching means a reduced opportunity for consumer arbitrage. For
consumers and society, customized products reduce wastes but may cause
higher prices.
Consumer Arbitrage
Reduced Waste
Price Discrimination
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 332
-----------
The raw data collected in transactions is considered primary information, while the
cross-matched processed data is secondary information. The real power of compiling a
consumer profile lies in the processed information. For example, suppose that an airline tries
to promote its new East-to-West Coast flights. To send mass-mail advertisements, it needs to
select a target audience—this may include people who have rented cars in New York and
Los Angeles and who frequently make coast-to-coast long distance calls, and so on. Given
the willingness of those who have primary information to provide the data, this type of
targeted advertising has become a lucrative revenue source for telephone companies, credit
card services, and Internet search services. Visa (http://www.visa.com), for example, has
introduced a service which allows banks to analyze the consumption habits of its
cardholders, giving banks another source of revenue in the tight bank card business. By
cross-referencing this with other information such as telephone call records, hotel
reservations, and so on, any seller can establish a detailed profile for virtually anyone.
A proposed Minnesota bill (H.B. 2816, available at http://www.epic.org/
privacy/internet/MinnHB2816.html) defines identifiable consumer information as
information that
● Identifies a person by physical or electronic address or telephone numbers
The first item above is the conventional definition of identifiable information, while the
remaining three arise in electronic commerce because of the nature of communication on the
Internet. The public has access to a great deal of personal information. According to a
disclosure by Equifax (http://www.equifax.com), a credit reporting agency, a credit report
typically contains the following:
Page 333
● Identity information: name, current and previous addresses, date of birth, marital
status, and social security number
● Employment data: present position, length of employment, and previous jobs
● Credit history: credit experiences with specific credit grantors
● Public record information: civil suits and judgments, tax liens, bankruptcy records,
and other legal proceedings recorded by a court involving a monetary obligation
● Credit inquiry information: a listing of all credit grantors who have requested a copy
of the person's credit life within the last two years. (From Equifax FAQs)
(http://www.equifax.com/consumer/faqs/answer7.html)
Even universities routinely sell their lists of student names and addresses to outside
merchants who want to use them for marketing purposes. Controlling this information does
not pose a significant legal challenge. What is at issue in terms of economics is the use of
consumer profiles that describe a person's consumption behaviors and preferences collected
on the Internet through subtle methods such as menus given to web browsers. Unlike
information such as names, addresses, and social security numbers to which laws governing
consumer protection and disclosure may already apply, there is no basic agreement on how
to treat consumer information gained by processing communications data.
Because data gathering activities are based on monitoring Internet usage, a leading legal
question is the degree of monitoring allowable in electronic transactions. Currently, web
servers record the domain name or IP address of a visitor, the time accessed, the action such
as downloading (GET commands in figure 8.5), and the document accessed. By accessing
the preference setting that users specify in their browsers, servers can also record the
person's name, affiliation, address, and so on. Cookie technology allows servers far more
sophisticated operations, which not only record access activities but also interact and control
these activities (see the sidebar, "Cookies and Consumer
Page 334
Information"). Excessive monitoring is also a concern at workplaces where employers can
monitor computer usage by employees for use in evaluating work performance. Workplace
computers are routinely used for auditing, tracking, and process accounting, but there is
always room for abuse.
Why Do We Need Cookies? A cookie on the Internet is much like the caller ID
provided by telephone companies by which a telemarketer can bring up all
relevant customer information—name, address, previous purchase payment
records, and so on—by the time a sales representative answers a call. A web
site consists of many files stored in various subdirectories, and, when a client
accesses a particular page or document, a separate web connection is made and
the previous connection is lost. Suppose that a web grocer divides all its
merchandise in subdirectories such as produce, meat, and drinks.
Page 335
When a customer moves from the produce section (that is, page) to the meat
section, the customer is actually making a separate call, to use the telephone
analogy. To provide a continuous service so that the customer can browse
different pages, select items, and pay for all items at once, a continuous
database (or connection) of the customer is needed. The cookie technology is
therefore necessary in the web environment to overcome the lack of continuity
in connection. Such an environment without a persistent connection is called
"stateless." In this sense, a cookie is often referred to as persistent client state
information.
(1) The most common field of information (and the only required field) in a
cookie file is the data string in the form of name=VALUE. Name can be any
variable name followed by any VALUE assigned by the server. For example,
strings such as
Customer_Name=Alice_Arthur
Taste=Historical_Fiction
Item_Number=Part0012
Payment_Preferred=Ecash
can store information about the customer's name, preference or taste, the item
purchased, or the payment method used. The remaining four fields of
information are optional.
(3) The domain=DOMAIN_NAME field specifies the host name of the server
which generated the cookie. A client searches its cookie file to find all
matching cookies so that they may be sent to a server when requesting a
document.
(4) The path=PATH attribute specifies the subset of web pages (URLs) for
which the cookie is valid. The most general path is "path=/" which indicates
that the cookie is valid (or should be sent to the server) for all pages. If the path
is not specified, the default path is the current page when the cookie is sent by
the server.
(5) Finally, a cookie may be specified to be sent only when the communication
channel is secure by including the secure command. If secure is not specified, a
cookie is sent without regard to security.
continues
Previous | Table of Contents | Next
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
This cookie is valid until the end of 1999 for all Bob's pages including all subdirectories. Thus, Alice
sends the information Customer_Name=Alice whenever she accesses Bob's site. When Alice
accesses a mysteries page (/mysteries/mystery_list.html), Bob sends Alice another cookie with the
information:
which is valid for the all pages in the "/mysteries" subdirectory (and all subdirectories below that
directory). Therefore, when Alice visits Bob's web site the next time, her browser checks all its
cookies (by the domain name) and selects all cookies that match Bob's domain name. Then, her
browser sends all cookies valid for the specific path. For example, if Alice wants to look at the file
"/mysteries/mystery_list_update.html", she should send both cookies containing the information
Customer_Name=Alice and Taste=Mysteries.
Other Uses of Cookies. The information provided by cookies can be used to customize web pages
and sales. When caller ID is augmented by a computer database, a sales representative has all the
information it needs to assist the customer or to target the customer for specific sales. Similarly, a
web server may present a different web page to each customer based on the information provided by
cookies. Customers are not required to enter user name, passwords, or other registration information
repeatedly. Also, cookie-generated web pages can adapt to the needs of dynamic interactive
communications without much hassle. With such tools, web customers are made to talk to
"personalized" sales representatives who can best assist them.
The debate about privacy of Internet transactions focuses on the right of consumers to control the use of data
about themselves. Not surprisingly, consumer information collected by monitoring the World Wide Web has
become a contentious issue. Consumer information is inevitably revealed in ordinary business transactions, and
when products are customized, the most valuable commodity is the information about consumers' preferences.
The impact of firms' using this consumer information can be quite significant. Targeted junk mail based on
previous purchase records may be the least worrisome aspect of this abuse. More seriously, a person may be
denied medical insurance or a loan from a bank, or may be fired from work because of information that may not
be voluntarily available. In terms of economics, the use of consumer information can lead to price discrimination,
which often involves monopoly prices.
Anonymity as a Myth
We have seen that information contained in a credit report is quite extensive. However, we tend to think that such
information is difficult to collect and disseminate on the Internet because of the anonymity. Anonymity, the
absence of identity, is pervasive in Usenet discussion groups where participants find it useful to assume an
"online identity" to engage in sensitive or inflammatory discourse. Anonymity can encourage political speech,
reducing the risk of punishment, and it is useful when requesting sensitive, personal, and potentially embarrassing
information and services. But at the same time, this advantage may elicit criminal, unlawful, or libelous conduct.
How anonymous is
Page 338
Internet communication? Although the Internet affords a far greater degree of anonymity than physical markets,
many cases of anonymous messages can actually be "traced" back to the original sender, which is often necessary
if one desires a reply. Untraceable anonymity requires either an unscrupulous remailer—or a proxy server—who
forwards messages without attaching information about the original sender, or a remailer who destroys its log
information. To optimize anonymity, one can route one's message through several remailers, all of whom must
cooperate to divulge the identity. Nevertheless, the fact of the matter is that the majority of Internet messages are
traceable and identifiable, and consumers are unaware of being identified.
A popular myth was declared, "On the Internet, nobody knows you're a dog" (The New Yorker, May 7, 1993, p.
61) (see figure 8.6). In reality, the server computer knows a lot about its client. You can test how much a server
knows about yourself by logging into the Anonymizer.com server (see figure 8.7). The sample data shows your
affiliation, location, the type of computer and browser that you use, the mode of connection, and the pages you
have visited at the server. The use of Java-based applets and cookies further necessitate establishing traceable
identity on the Internet. And applets often establish a concurrent, third-party connection, as seen with advertising
banners which send and receive information from a different site than the document they are shown. Therefore,
even when personal information is offered voluntarily, there is a danger that that information may be collected by
a third party, who disguises itself as a legitimate server. This is called spoofing (see "Internet Resources" at the
end of this chapter). But, there are at least two other ways besides anonymity to maintain consumer privacy.
Page 339
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 340
-----------
Legal Efforts to Protect Privacy
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 343
-----------
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 347
-----------
capacity, misjudgment of consumer tastes, an so on. An informed firm can
increase its profit by reducing this waste as well as by finding markets that
uninformed firms may not serve. More precise demand information and
production creates increased satisfaction for consumers, who are no longer
uncertain about the quantity and product specification.
In fact, Ponssard (1979) has demonstrated that consumer welfare increases
when firms have better information on market demand. However, his model
also shows that the increase in profit and the value of the information
diminishes as more firms acquire this information. Ponssard refers to
information about the market in general, not about individual preferences. As
long as the better information is about the market but not about identifiable
information, resolving market and demand uncertainties does not pose a direct
threat to consumer welfare. For example, better economic planning can benefit
all sectors of society and, even when consumer information is used to
customize products, consumers do not suffer losses if the new products are
sold to indistinguishable customers. It's only when consumer information is
linked to payment and thereby to discriminatory pricing that we are presented
with both the gain in total welfare through efficiency and the loss in consumer
surplus due to higher prices. In electronic commerce, both the availability of
identifiable consumer information and the use of product differentiation
greatly facilitates discriminatory prices, alternatively known as differential,
nonlinear, or non-uniform prices.
Cost Curves
Introductory economics and management classes teach that the total cost of
production consists of fixed cost and variable costs. The fixed cost is the initial
investment needed to produce the first unit, such as the factory, machines, and
research and development. Once production begins, the fixed cost does not
vary whether the firm produces one unit or one thousand units, and thus it is
also known as "sunk cost." The variable cost, on the other hand, is the sum of
the material and labor costs that are needed to produce each unit.
Consequently, the variable cost of producing ten units may be ten times the
cost of producing one unit.
Figure 8.9 shows typical shapes of fixed and variable costs. Graphs A and C
are total fixed and total variable costs shown in terms of the number of the
output (Q). In this case, the total fixed cost is constant over a range of output
because it is "sunk" at the beginning and does not increase as the output is
raised. The total variable cost increases proportionately to the number of
output, but later increases at a faster rate due to congestion, which is one
example of disecon-omies of scale. As more employees are put to work to
increase the output beyond an optimal level of operation, the per-unit variable
cost increases faster and productivity decreases. The total cost of
production—the sum of total
Page 349
fixed and total variable costs—understandably increases as output is increased.
However, the per-unit cost of production, or the average cost, behaves quite
differently. For example, the average cost may decline until the maximum
level of operation and increase afterward. The decreasing average cost is first
due to wider sharing of the fixed costs. Graph B in figure 8.9 shows the
average fixed cost, which declines as an increasing number of units of output
"share" the initial cost. Graph D is the average variable cost that is constant up
to a level and then increases. The sum of B and D is the aveage (total) costs of
production shown in graph E. Because of the declining average fixed cost, the
average cost first declines but increases later when the effect of the increasing
average variable cost takes effect. The result is a well-known U-shaped
average cost curve. In terms of per-unit production cost, a production process
with a U-shaped average cost curve achieves an efficient level of production
when the average cost is at its lowest.
In stark contrast with the standard example above, the bulk of the production
cost of a digital product consists of fixed cost. Once the first unit is produced,
the additional variable costs are negligible regardless of the output level.
Page 350
Although some assume that the variable reproduction cost will be zero, the
author believes that it will be a substantial, albeit constant, amount due to the
per-copy copyright payment. Regardless of the assumption on variable costs,
the declining average fixed cost coupled with zero or constant variable costs
implies that the (total) average cost of a digital product will be similar to graph
B in figure 8.9.
Other industry comparisons may be helpful in determining the economic
implications of a declining average cost (AC). Declining average cost is
common in the utility and communications industries due to the extreme size
of the initial investment in infrastructure. As the per-unit cost of one firm
declines, it makes little sense to allow a competitor, which would result in two
firms operating at non-optimal levels of production. In these often highly
regulated industries, one firm will be more efficient in exhausting the
economies of scale manifested in the declining AC. However, the one firm, as
a monopolist, may engage in inefficient market behavior such as heightened
prices and output restriction. There is a large body of economic literature that
studies pricing practices under declining average costs, especially on how to
apply marginal cost pricing to guarantee that a natural monopolist breaks even
and still maximize social welfare (see the "Suggested Readings and Notes" list
at the end of this chapter).
The fundamental difference between a monopolist, or firms with some market
power, and a competitive firm is that a monopolist can raise prices and
increase profits without suffering a complete loss of customers. In a
competitive market, a firm loses all its customers if it raises prices above the
prevailing market level. Graphically, the difference is whether the firm's
market demand is flat or declining: a firm with market power faces a declining
demand schedule while a competitive firm faces a flat demand curve.
However, no competitive firm will survive if they have declining AC curves.
In figure 8.10, graph A shows a firm in a competitive market where only one
price (p) prevails initially for some reason. But competition implies that a
competitor will try to undercut its price, which will become zero after a round
of price cuts. At a price of zero, no firm will survive. For digital products such
as databases, many competitors would not survive if they sell similar products.
Previous | Table of Contents | Next
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 351
-----------
As discussed earlier, the level of fixed cost determines the price and quantity
of the digital products produced. Here, a model that describes different choices
in fixed investments is presented. This model also incorporates the critical
issue of product differentiation, a decision that needs to be made at the initial
stage of production. Because of the transmutability of digital products, the
electronic marketplace is characterized by similar but different products. An
economic motive for differentiation is the desire to minimize the effect of
competition among identical products, which destroys the market due to the
declining average cost of digital products. Thus, this model emphasizes the
nature of multi-product production in electronic commerce. Pricing becomes
more complex when a seller is faced with many similar but different products
targeted at different segments of consumers. Our objective is to present some
fundamental principles of multi-product pricing.
Quality Choices
Conventional supply and demand models describe the relationship between the
price and quantity produced with average and marginal costs calculated in
terms of output. For physical products, such a model may be adequate because
Page 353
the primary economic concern is determining the quantity of products to
produce and their price. Most observers of the digital market realize that the
choices in terms of product quality and variety supersede concerns of output
levels in electronic commerce. The question of output level is still important
because it determines how many consumers may have access to products, but
this is an issue of price, not a question of whether material and labor inputs can
be allocated more efficiently as output increases. The resource allocation
problem for digital products occurs when the first unit of a product is
produced.
Application of the price-quantity model often results in erroneous conclusions
in the case of digital products. In general, when the price of a product equals
its marginal cost (MC) of production, the resources are allocated efficiently.
But what is the marginal cost of production for a digital product? In terms of
output, the MC is the added cost of producing an additional copy, which is
mistakenly believed to be almost zero in electronic commerce. If this were
true, an efficient price for a digital product would be close to zero, allowing
virtually free dissemination. This does not work for two reasons. At the very
least, the MC consists of the per-copy copyright payment. So an appropriate
price for any product is the amount due to the creator, which is most certainly
a non-zero figure. In addition, the marginal cost to consider is production, not
distribution, costs.
To derive the marginal cost of production, first consider the total cost function
for a digital product. A digital product may have many characteristics such as
size, the number of multimedia components, accuracy of the data, and so on.
We denote those characteristics as S1, S2, ... , Sn, having a number of n
characteristics. A digital product is thus completely described by a series of
numbers, or a vector, (S1, S2, ... ,Sn). Suppose that S1 corresponds to the
accuracy of a database, taking a value ranging from 0 (completely inaccurate)
to 1 (completely accurate). Figure 8.12 shows the total cost needed to achieve
a certain level of accuracy. The graph shows a high cost for a totally inaccurate
database because it takes time and effort to manually "disguise" the data. The
lowest point in the curve may represent the initial state of a database: it costs
Page 354
more either to intentionally make the database worse or to verify each data
entry. The optimal level of accuracy depends on the willingness of consumers
to pay for this, as represented by the line. For example, the slope of the line
indicates that consumers are willing to pay one additional dollar for every
improvement of .1 in accuracy. At S1*, the marginal cost of improving the
database's accuracy equals that marginal willingness to pay. Above S1*, the
producer must spend more than $1 to achieve an improvement of .1, which
cannot be recovered from the consumers. The producer's optimal choice is
clearly S*. Note that because the marginal willingness to pay has a positive
slope, no producers will actually attempt to corrupt the database. For this
reason, we may consider a simplified cost curve that increases for all values of
S1.
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 355
-----------
producing a certain quality that is desired by consumers. The marginal cost of
reproduction or distribution has little relevancy.
Product Differentiation
A basic opportunity (and challenge) for all businesses is that consumers have
different preferences and price sensitivities. For example, suppose that some
consumers are willing to pay $2 for an improvement of .1 in accuracy—a
steeper line than the one in figure 8.11. Equating the marginal cost of accuracy
improvement to this group's higher willingness to pay will result in a higher
accuracy S1** > S1*. However, the price will also be higher so that those with
a lower willingness to pay may not purchase the improved product. To capture
both types of consumer, the producer may sell two versions of the product:
basic and improved.
In this way, product differentiation is born! This situation is depicted in figure
8.12, where the aggregated quality, S, is considered rather that the accuracy.
The subscript H (L) represents consumers with high (low) willingness to pay.
In figure 8.12, both high-type and low-type consumers get an efficient level of
quality when their willingness to pay equals the marginal cost of producing the
assigned quality. The market for each variety is separated by different prices
and qualities. The lines corresponding to consumer types can be interpreted as
indifference curves (or lines) of prices at each level of quality. Any
price-quality combination lying under the line will be a better deal because the
consumer pays less for the same quality. In this interpretation, each type of
consumer prefers what is targeted for them, as the alternative always lies
above their indifference curves. Implementing product choice and pricing
strategies of this type requires the seller to know the consumers, or the market
demand. In fact, analysis of market segmentation and collection and
processing of consumer demand information form the foundation of product
differentiation.
Page 356
Assuming that the digital product producer does not face direct competition,
there are ways to increase profit. In figure 8.12, PH and PL are equal to the
marginal cost of production. In terms of output, they are equal to the average
prices for breaking even. When raising prices, the firm needs to consider the
interaction between the two groups of consumers. At some price-quality
combinations, high-type consumers may prefer to buy the low-quality product,
and low-type consumers may purchase the high-quality product. To maintain
targeted marketing, the firm has two alternatives.
One method of customer targeting is to negotiate with each consumer—that is,
to give a "take-it-or-leave-it" deal. A strategy of this type works only if the
firm knows its consumers well. With increasingly detailed consumer profiling,
this type of information may be available in the electronic commerce world. In
addition, the firm should also be able to prevent consumers' reselling among
themselves, as some might find it profitable to exchange products among
themselves.
The second alternative is to craft the offer (prices and qualities) in such a way
that high-type consumers have no incentive to purchase the product intended
for low-type consumers, and vice versa. In this scheme, both types of
consumers benefit from buying what is intended for them, or at least they will
be indifferent. This strategy is called an incentive compatible (IC) solution.
Page 357
The resulting profit level is lower than the first alternative because there is
some cost necessary to maintain incentive compatibility. Nevertheless, an IC
solution does not require the seller to have detailed information about
consumers, who sort themselves out according to their type.
The cost in maintaining the IC solution stems from the fact that at least one
type of consumer, or a segment of a market, has a choice. For example, if both
types have no ability to switch products, the firm is free to charge whatever it
wishes, just like individual negotiations. However, if both types can switch,
the market is not at all separated. To illustrate the cost of the IC condition
graphically, see figure 8.13. In this modified version of figure 8.12, the firm
decides to raise the price of the high-quality product whose intended customers
have a higher willingness to pay. The initial price-quality combinations are A
(PH, SH) and D (PL, SL). As the firm increases the price for its high-quality
product, high-type consumers move from A to B and then to C. Choice C is
the maximum price the firm can charge because it intersects the origin where
both price and quality are zero, signifying no purchases. If the firm raises the
price beyond C, high-type consumers simply do not buy. However, high-type
consumers may simply switch to D because it lies below the curve going
through C, and thus it represents a better deal which is in fact better than not
buying any product. Because high-type consumers have alternatives, the
maximum price that the firm can charge is B, at which point high-type
consumers are indifferent between the high-quality product and the
low-quality product.
Low-type consumers, meanwhile, do not have an incentive to switch to the
high-quality product as all combinations of A, B, and C are above their
indifference curves and represent a worse deal. In sum, the firm would like to
charge C, but is constrained to charge a lower price, B, because it cannot force
high-type consumers to stick to the high-quality product. This consideration is
known as the incentive compatibility constraint, and it limits the firm's profit
maximization. Regardless of the limitation, because B is above the original
price, A, the firm makes positive profits. An astute firm first raises the price
for the low-quality product, maximizing the profit from low-type consumers,
and only then it should raise the price of the high-quality product to the IC
level.
Page 358
In this way, low-type consumers are charged their maximum price while
high-type consumers in general pay a price somewhat lower than their
maximum, B, rather than C.
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 359
-----------
to their willingness to pay. Our discussion of incentive compatibility is
meaningless if the market consists of consumers with identical tastes. In this
case, one price for one product suffices and is determined by the market
demand. Many have observed that such simplified pricing strategies work well
for information products in physical markets. For example, newspapers charge
a uniform subscription price; cable operators charge one price for a bundle of
basic channels. However, prices for a newspaper differ between delivery and
vending, and discount prices are available for student and delivery plans. Even
cable service is increasingly divided into many tiers to reflect the diversity in
consumer tastes. The physical and technological constraints that have largely
influenced the way newspapers and cable services are sold will no longer be
paramount for digital products. Nevertheless, some pricing strategies used in
physical markets may be used in electronic commerce: for example, leasing
options, subscription-based pricing, and bundling techniques may be
employed.
A basic truth of marketing is that if the value of a product is much less than the
cost or price of the product, not a single consumer will be willing to purchase
it. Even in this case, sales are possible. In such a situation, a group of
consumers may form a club if each individual's share of the price and the
accompanying transaction costs, such as waiting time for one's turn, are still
lower than the price of the product. A club good is classified between a pure
public good and a pure private good (Buchanan, 1965). A pure public good is
one whose optimum number of users is all consumers in the market, while this
number for a pure private good is one—here, individual consumption is
preferred. The optimum number of users in club goods is determined by the
marginal condition that the benefit of adding a marginal member must be equal
to the associated cost. When forming a club to share a product, several factors
must be considered: the group's benefit may increase by adding a member
(association benefits), the user cost may increase (congestion effects), or the
production cost (purchasing price) may be lowered (economies of scale).
Page 360
Association benefits are common in social clubs but not in private good clubs,
although a similar benefit is observed in pure private goods such as computer
software, which is called a network effect. Congestion effects are evident in
the example of library books, where more members create more waiting for a
turn to borrow. The economy of scale effect is simply the reduced per-member
cost to purchase a book. Taking the price as fixed cost, this is quite similar to
the case of declining average cost, which is not surprising because natural
monopolies in utility industries are forms of clubs.
When a product has a cost structure of this type or is prone to a sharing
arrangement, a viable club can be formed (see Sorenson et al., 1978), but the
seller may find it more profitable to arrange a sharing scheme himself instead
of selling directly to the consumers. A product sharing scheme initiated by the
seller, who maintains ownership of the product, is known as renting or leasing.
The objective is to discourage arbitrage by consumers and to avoid the
restrictions imposed by the first sale doctrine.
A library is an example of a sharing mechanism by which consumers who are
not willing to pay for a book may still use it. Suppose that Peter is trying to
sell a book titled The History of Libraries priced at $20. If Alice thinks that
reading the book is worth more than $20, she will prefer to buy it. However,
Peter cannot sell it to anyone whose value for the book is less than $20. Still, if
there are 10 people who each considers the book to be worth $5, their total
valuation sums to $50. Suppose that the cost of sharing, in this case waiting to
borrow, is $1. The maximum price that can be charged for the group of 10 is
$4. Peter can either sell two copies of his book at $20 each, or one copy at $40
if he is able to separate the library from the retail market.
Sharing arrangements are common when a product is used only once and the
quality of the product is not degraded. However, if a product is used more than
once, consumers may prefer to buy it outright, especially if the sharing cost is
high enough to justify the sale price because the total cost of an alternative to
buying includes transaction costs. For instance, for casual reading, many
depend on borrowing from a library, but they prefer to have their own copy if
they plan to read a book more than once. Because the cost of
Page 361
borrowing from a library includes waiting time and the fact that one can only
use the book for a limited time, the sum totals of these transactions costs and
the sale price determine whether the consumer buys or shares. For digital
libraries, both of these transaction costs may be negligible unless artificial
restrictions for check-out and returns are imposed.
Sharing or renting is often preferred by the seller even for those whose
valuation of the product exceeds the sale price. The reason for this has less to
do with the desire to exploit the residual market; controlling consumer
arbitrage is a important goal of the seller. After consumers buy a product, the
first sale doctrine allows them to do whatever they want with it. The first sale
doctrine means that a buyer may resell, rent, lease, or dispose of a product at
will after the purchase. Copyright protection only applies to copying or
reproducing the content of the book, and does not apply to selling the original
copy. In contrast, renting or leasing does not change the ownership of the
book, and here the first sale doctrine does not apply. In this case, the owner of
the book (the seller) may establish certain rules regarding its use. A very
elaborate form of such contractual restrictions is implemented by software
licensing, which not only controls how many persons can use a program but
also how often it is used in a given time period with the help of
use-measurement software.
For functional products such as software, licensing may be an adequate
method of maintaining ownership. However, as the complexity of networks
and computer usage increases, a more flexible licensing regime is required.
Although the number of licensed sites or users is relatively easy to manage,
there is no adequate method of monitoring access and time of usage. Licensing
terms are becoming increasingly complex—an increasing number of large
corporations rely on third-party asset management firms to keep track of
software purchases, updates, and usage.
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 362
-----------
willing to pay for these products on a sharing basis. For these products,
however, use-based distribution may be more efficient. Applets, for example,
are needed on special occasions and are subsequently discarded after use. This
strategy would not only be more efficient but is also consistent with the desire
to minimize the effects of easy reproduction.
First, let's differentiate the concept of bundling from similar practices. The
practice of bundling refers to packaging two or more products and selling the
bundle in fixed proportions. In other words, if you buy 10 bundles, you get 10
units of each component of the bundle. Components of a bundle sold
individually as well as in bundles is called a mixed bundling strategy.
Microsoft, for example, uses a mixed bundling strategy in selling its various
programs (including Word, Excel, PowerPoint, and Outlook) individually or as
a bundle in a Microsoft Office suite. Narrowly defined, bundling always refers
to a group of different products. When the bundle consists of the same product,
this is called quantity-dependent pricing. For example, computer diskettes are
sold in packages of 10 where the price is often lower than the sum of 10
individual diskettes sold separately. Also, bundling is different from tie-ins,
where a buyer of one product is also required to buy another product. But
unlike bundling, a buyer may consume different numbers of each component.
Thus, if Word and Excel programs were tie-ins, one can buy only one Word
program and be able (or, in some cases, the consumer is forced) to buy 10 or
20 units of Excel.
Adams and Yellen (1976) first showed that bundling is a useful price
discrimination method, especially when valuations are negatively related. For
example, suppose there are three consumers (Alice, Bob, and Charlie) and two
computer programs (Learn a Language, and Learn to Paint). The valuations of
three consumers for the two products are as shown in figure 8.15. Valuation
for Learn a Language is $40, $50, and $60 for Alice, Bob, and Charlie,
respectively, while valuation for Learn to Paint is the same as above but in the
reverse order of Charlie, Bob, and Alice. Suppose that both products cost $40
to produce. If sold separately for $50, Learn a Language will be sold to Bob
and Charlie, with a total profit of $20. Learn to Paint will fetch the same profit
but will be sold to Alice and Bob. If the price is increased to $60, only one unit
of each product will be sold—Learn a Language to Charlie and Learn to Paint
to
Page 363
Alice—which results in the same $20 profit for each product. However, if they
are bundled and sold at $100, all three will buy the bundle, and the total profit
is increased to $60. Although the increased profit from bundling may appear to
be due to the negative relationship in the demand for Learn a Language and
Learn to Paint, studies have shown that the negative correlation is not
necessary for bundling to be more profitable than unbundling (Spence, 1980,
under quantity-dependent pricing; Schmalensee, 1984, because of bunching
consumers; and Salinger, 1995, for the reason of reduced cost). A positive
relationship may be depicted as both demand curves have negative slopes or
positive slopes compared to figure 8.14. McAfee et al. (1989) also show that,
in most cases, a mixed bundling strategy almost always increases the seller's
profit when compared to pure bundling or non-bundling.
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 365
-----------
The Case for Microbundles and Micropayments
8.5. Summary
Our discussion in this chapter focused on three related issues: product
differentiation, price discrimination, and the use of consumer information.
Because of their transmutability, digital products are extremely customizable.
When individual preferences are known, the seller has an incentive to price
customized products according to the consumer's valuation. However, the very
nature of digital products raise the issue of control. Sellers are concerned with
how consumers use the product, and most importantly with rampant
unauthorized reproduction and distribution. One means for sellers to
discriminate its customers, that is to charge different prices, while preventing
consumer arbitrage, is an incentive compatible pricing strategy.
The electronic marketplace may be the most advanced in terms of
communications and transactional efficiencies. But, from an economics point
of view, the practices of product differentiation and non-uniform pricing
complicates the task of determining the competitiveness and efficiency of the
overall market. Non-sale methods, such as licensing, leasing, bundling, and
subscriptions, are prevalent in electronic commerce because of the concern for
copyright infringement and the influence of physical markets. These pricing
strategies are relatively simpler to analyze and implement, thus they are
eagerly implemented compared to mixed bundling and non-linear pricing
strategies. Electronic commerce offers fresh ground for research in the areas of
quality choices and multi-product pricing, giving economists an incentive to
explore such areas, with a wide ranging empirical applicability.
Simultaneously, market processes of production, delivery, payment, and
consumption for digital products will be quite different from those for physical
products. As pricing strategies cannot be evaluated without considering all
market processes, it is unwise to treat digital products as we do their physical
counterparts or to carelessly convince digital product sellers that existing
economic models can simply be reinterpreted for electronic commerce.
Page 368
References
Adams, W.J., and J.L. Yellen, 1976. "Commodity Bundling and the Burden of
Monopoly." Quarterly Journal of Economics, 90: 475_498.
Buchanan, J.M., 1965. "An Economic Theory of Clubs." Econometrica, 32:
1_14.
Chamberlin, E.H., 1933. The Theory of Monopolistic Competition.
Cambridge, Mass.: Harvard University Press.
Degryse, H., 1996. "On the Interaction Between Vertical and Horizontal
Product Differentiation: An application to banking." The Journal of Industrial
Economics, 44(2): 169_186.
Deneckere, R., and R.P. McAfee, 1996. "Damaged Goods." Journal of
Economics and Management Strategy, 5(2): 149_174.
Hotelling, H., 1929. "Stability in Competition." Economic Journal, 39: 41_57.
McAfee, R.P., J. McMillan, and M.D. Whinston, 1989. "Multiproduct
Monopoly, Commodity Bundling, and Correlation of values." Quarterly
Journal of Economics, 93: 371_383.
Odlyzko, A., 1996. "The Bumpy Road of Electronic Commerce." Presented at
the WebNet '96 conference, October 16_19, 1996. An electronic version is
available at http://aace.virginia.edu/aace/conf/webnet.html.
Salinger, M.A., 1995. "A Graphical Analysis of Bundling." Journal of
Business, 68(1): 85_98.
Schmalensee, R., 1984. "Gaussian Demand and Commodity Bundling."
Journal of Business, 57: S211_30.
Previous | Table of Contents | Next
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 369
-----------
Sorenson, J.R., J.T. Tschirhart and A.B. Whinston, 1978. "Private Good Clubs
and the Core." Journal of Public Economics, 10: 77_95.
Spence, A.M., 1980. "Multiproduct Quantity-Dependent Prices and
Profitability Constraints." Review of Economic Studies, 47: 821_42.
Product Differentiation
Price Discrimination
Internet Resources
Customized Internet Products
Cookies
JavaScript Tip of the Week: Everything You Ever Wanted to Know about
Cookies available at http://webreference.com/javascript/961125/index.html.
For cookies related sites, visit Malcom's Guide to Persistent Cookies resources
at http://www.emf.net/~mal/cookiesinfo.html.
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 373
-----------
CHAPTER 9
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 377
-----------
by the intermediary's economies of scale in information gathering, processing
and monitoring or from the law of large numbers—the ability to pool and
spread risks. This second case is more akin to dealers than brokers.
Traditionally, stock brokers are distinguished from stock dealers in that
brokers only match sellers with buyers whereas dealers purchase stocks from
sellers and sell them to buyers. However, both share a primary function: to
smooth out search and transaction processes among traders.
You can consider the third example of an intermediary a value-added retailer
who goes beyond simple brokeraging or distributing goods. A mutual-fund
manager who sells a share of a fund of combined products from different
producers is an intermediary of the third type because what buyers buy is
different from what sellers sell to the fund manager. This intermediary's
function involves some type of transformation in the characteristics of the
product. For example, a bank receives deposits from savers and makes loans to
borrowers. Thus, a bank is not only a dealer but also changes the nature of the
purchased product—deposits—into a different kind of financial product—a
loan.
Finally, intermediaries can function as market information service providers.
Their collection of company performance data, macroeconomic indicators,
stock quotes, and so on, facilitates financial transactions. Stock brokers, on top
of their brokerage functions, often make buy and sell recommendations to their
customers based on their own information and analysis. In this case, they are
performing two different functions of an intermediary. Publishers of financial
newspapers and newsletters, financial cable networks, and online business
information services are specialized information sellers and do not deal
directly with financial assets. In the electronic market as well, the information
function of collecting, evaluating and monitoring agents may or may not be
tied to trading of digital financial instruments.
The remaining sections revisit each of the functions of financial intermediaries
to show more clearly how the introduction of Internet-based commerce affects
each intermediary function.
Page 378
The Financial Sector
Financial markets play a key role in an economy by channeling
necessary funds from savers to borrowers who are looking to
invest in productive activities. Not surprisingly, the market and
operational efficiencies of financial markets have long-term
effects that determine the levels of future production and
consumption. In fact, the financial intermediation sector alone
accounts for over 15 percent of the gross national production in
the United States. Table 9.1 shows the amount of national income
generated by industry in 1996. The amount contributed by the
financial sector is greater than that of the wholesale and retail
trades combined and it is second only to the service industry in
sectoral importance to the national economy.
Table 9.1 National Income by Industry
Industry Billions of Dollars
Agriculture, forestry, and fishing 121.8
Mining 45.2
Construction 284.0
Manufacturing—durable goods 637.0
Manufacturing—non-durable goods 444.4
Transportation and public utilities 477.6
Wholesale trade 351.4
Retail trade 510.7
Finance, insurance and real estate 1,047.5
Services 1,458.3
Government 846.8
Total domestic 6,224.7
Phases of Transaction
● Negotiation
● Settlement
These processes are much like the processes of visiting a store, negotiating for
a price and purchasing an item. As in consumer searches, these processes may
proceed sequentially until a transaction is settled or may be conducted
simultaneously through a bidding or auction mechanism.
As the first step in the brokerage function, potential traders need to search for
and identify trading partners in the initial search phase. After potential partners
express interest, a negotiation phase follows between sellers and buyers
regarding prices and product specifications. If they reach agreement, traders
enter into the third stage—settlement—which includes contracting, payment
settlement, and delivery.
Of these three phases, the search and settlement processes can be automated
without much difficulty. The negotiation process, on the other hand, may
require some intermediary intervention or a sophisticated automated program
to execute. Because of this, fewer examples of increased market efficiency are
seen in this phase.
Page 380
In the search phase of intermediation, market efficiency increases if the time it
takes to find someone with matching goods and needs is decreased. In physical
markets, an intermediary achieves this by transporting goods from one place to
another so that geographically distant sellers and buyers are matched. A
financial intermediary—a middleman, in essence—collects selling and buying
information (that is, bid and ask prices) and proceeds to find a match. When
the size of the market is large, as it is in electronic commerce, it becomes
increasingly time-consuming for a seller to meet all potential buyers or vice
versa. The trading floors in stock exchange markets, for example, are
fundamentally central locations where all interested traders gather to minimize
search costs.
Within the large body of economic literature focusing on search costs (see
discussions in Chapters 4 and 7), Rubinstein and Wolinsky (1987) offer a
useful comparison between a broker and a dealer, even though their model is
not set up for financial markets. Their economic model is based on an
intermediary as a time-saving institution. The transaction cost incurred by
potential traders in their model is the waiting time needed to find a trader with
matching needs or products. A middleman in such a market may act either as a
dealer or a broker, that is, he may either buy a good from a seller and offer it to
another buyer or he may simply obtain the product on consignment, paying the
seller only upon completing the sale.
The extent to which a middleman improves search efficiency for buyers and
sellers depends on how quickly a buyer and a seller find each other. Rubinstein
and Wolinsky's research determined interesting differential effects of brokers
and dealers on the gains of sellers versus buyers. They found that when the
middleman is a broker, that is, a consignment intermediary, the gains to sellers
and buyers are symmetric. In other words, the broker does not worry about the
seller's profit from the final sale price, but focuses on finding a match. But if
the middleman is a dealer, the buyer gains more from the trade than does the
seller because the middleman's bargaining position is worsened by his
incentive to unload the product. The dealer has a sunk cost (the purchase
price), which becomes a factor in negotiating with potential buyers. A simple
brokerage method results in less distortion as a market clearing system than a
dealer's market does.
Previous | Table of Contents | Next
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 381
-----------
One example of an efficient trading mechanism in which the electronic
network acts as a broker is an automated electronic bulletin board. Regardless
of the difference between a broker and a dealer, the middleman's profit comes
from his ability to shorten the time and cost in finding a match. In an electronic
bulletin board, sellers and buyers still have to read or search all offers listed,
incurring considerable costs. But an intelligent software program may be used
to search and find interesting offers. Similarly, middlemen are involved in
trading places for cattle, produce, commodities, stocks, and various products,
where the marketplace or the trading floor may be considered as a middleman
for middlemen (see fig. 9.1). While middlemen representing sellers and buyers
are engaged in searches, the meeting place provides a forum for negotiation
and settlement.
The meeting place, or market, is where prices are discovered and sales are
made through negotiation. At one extreme, trades may be based on
take-it-or-leave-it offers with posted prices. Shopping at retail stores usually
involves posted prices. At the other extreme, prices may be settled after
exhaustive bargaining.
Page 382
Most price-discovery processes incorporate both methods: an item is offered
for a price or best offer.
Stock markets also utilize a structured bargaining process in which negotiation
proceeds with posted prices that are raised or lowered depending on supply
and demand. Ascending and descending price auctions are similarly structured
so as to adjust posted prices. This structured bargaining process lends itself to
easy automation. Computerized exchange markets in electronic commerce can
therefore integrate search and brokerage functions with the price discovery
process, and settle accounts through electronic messaging and payment
systems.
Although the electronic market offers clear opportunities for more efficient
search and settlement processes, automating the negotiation process poses
more difficulties. To incorporate the negotiation process into automated
trading mechanisms, each offer or bid has to contain extended specifications,
such as predefined price limits, volume and time, and the market has to
provide coordination and clearing mechanisms. Automated negotiation often
necessitates an elaborate process, such as an electronic auction, which requires
the continuous participation of all parties at the same time. Although
technically feasible, the difficulties involved hamper its more widespread use.
The following sections present two examples of using the Internet in lieu of
existing financial markets: initial public offerings (IPOs) on the Internet and
computerized exchange markets. These examples demonstrate how easy it is to
convert transactional aspects of capital markets into electronic markets. These
developments will not have a significant impact on existing financial markets
in the short run. But they are significant in pointing out the role of investment
firms, underwriters and stock brokers as artificial gatekeepers to the exchange
markets, from which they derive their income. As transaction costs decrease
via automated trading, simple brokerage (that is, executing buy or sell orders
on behalf of customers) will no longer provide a significant source of income.
Page 383
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 385
-----------
The long-term effects on financial service intermediaries of open electronic
markets are not clear. However, in terms of the transactional functions of
financial intermediaries, using the World Wide Web to search for information
may become a model for seeking investment opportunities and potential
investors—eliminating any qualitative difference between the NYSE and
electronic markets on the Internet. Online brokerage firms are fighting to lower
processing costs and commission rates, but, ultimately, their functions will be
replaced by more efficient computer programs and electronic markets.
Nevertheless, stock brokers will survive by unbundling other service activities,
which are discussed in sections 9.3 and 9.4.
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 389
-----------
Maturity Transformation
Volume Transformation
Information Trading
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 393
-----------
of the Securities Exchange Commission's Electronic Data Gathering, Analysis,
and Retrieval (EDGAR).
The Securities and Exchange Commission (http://www.sec.gov) requires
public companies to file information that it must make available to the public.
The SEC defines EDGAR (http://www.sec.gov/edgarhp.htm), shown in figure
9.4, as a system that performs automated collection, validation, indexing,
acceptance, and forwarding of submissions by companies. Its purpose is to
increase the efficiency and to ensure the fairness of the securities market by
making time-sensitive corporate information available to investors. The type of
information found on EDGAR includes annual reports (Form 10K), quarterly
reports (Form 10Q), proxy statements (annual reports to shareholders) and
other reports voluntarily filed by companies. Since the SEC has phased in
electronic filing of required forms, retrieval and search by individuals has
become immediate, convenient, and cost-effective.
A question immediately arises: how can information sellers make profits when
investors have convenient access to primary sources of information? One way
is to focus on processing the information; that is, the information sellers filter
available information and present it in a form customers find useful. In the age
of information overload, the amount of information is no longer as important
as the effective filtering and selection of relevant information (see section 7.5
for information filtering).
The problem of externality remains, however. In general, the information
seller has to limit subscribership. Even with limited subscribership, the
window of opportunity for an information seller may be small because market
prices tend to reflect the information investors have and others who simply
observe prices can deduce the content of the information. In short, information
trading does not add much value when the information infrastructure and
market is as efficient as in electronic commerce. To control the use of
information and to extract the most surplus from consumers requires bundling
information services with other financial services, as shown in Chapter 8.
Page 394
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 397
----------- which only he can decrypt with his private key. To prove that the
message did indeed come from Alice, she can reverse the process
by encrypting her message using her private key. Bob can then
decrypt Alice's message using her public key and he knows that it
could have come from Alice and no one else. This latter example
captures the essence of how public key encryption can be used as
a digital signature.
Digital signatures can be used not only to identify the sender but
also to authenticate the content of a document when used with
digest functions. A digest function, also known as a one-way hash
value, is an arithmetic number that describes a document.
Suppose Alice adds up all the 1s in her digital document that
consists of 1s and 0s, and generates a certain value.
Mathematically, you can manipulate this number so as to make it
impossible to alter a document and come up with the same hash
value. Alice can then encrypt the hash value with her private key,
attach it to the document and send it to Bob. Bob can verify
whether the document was altered in transit by re-computing the
hash value of the document and comparing it with the encrypted
hash value. Encrypted hash values are used when it is
time-consuming and expensive to encrypt the whole message.
Instead, the encrypted hash value and signature can be transmitted
for verification purposes.
9.5. Summary
Of all the functions financial intermediaries perform—transactional,
transformational, and informational—transactional functions relating to
market-making activities will be affected most by the emerging computerized
markets. This will occur as increasingly more efficient processes of finding
opportunities to trade and matching buyers and sellers are demanded. On the
other hand, transformational functions will be the least affected by the
increasing use of the Internet for trading capital assets. The need for product
transformation will persist separate from the revolutionary changes in how
transactions are organized. As such, existing financial institutions have a
tremendous advantage in terms of experience and expertise over newer entries
in electronic commerce. However, it is not clear how existing intermediaries
will adapt their services and products to maximize this advantage.
Previous | Table of Contents | Next
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 400
-----------
As transactional functions undergo substantial changes with the advent of
automated exchange markets, financial intermediaries may specialize in
informational functions to maximize their comparative advantage in information
acquisition and analysis. Examples of information intermediaries who deal only
with the qualitative aspects of information are financial certification authorities and
assurance services. These Internet-native intermediaries pose a new threat to
existing financial institutions by specializing in certain aspects of the market.
Nevertheless, an information seller still needs to combine his expertise in
information with transactional aspects of the market. Otherwise, the value accruing
to the intermediary will decrease as the information market becomes more efficient
and the profit-making margin shrinks. Selling capital market information, therefore,
is often optimized when the information is combined with the assets (for example, a
stock portfolio), whereby the information is sold only indirectly. In a way, this
indirect sale of information affords intermediaries more market power, and
discourages them from specializing in only one type of service in financial services.
One economic function of a financial intermediary—its allocative efficiency—has
not received much attention. An intermediary as a market institution is traditionally
evaluated in terms of transaction costs. In that sense, the predominant concern in
"virtual" financial services has been that of controlling and reducing operating
costs. Allocative efficiency, on the other hand, deals with whether available
financial assets are distributed or allocated adequately based on the risk and
financial potential of borrowers' projects. When the market is inefficient, credit
rationing, that is, allocating funds without regard to the profitability of each project,
is observed (Stiglitz and Weiss, 1981). While the effect of network technology on
operational efficiency is an important factor in assessing the profitability of online
financial services, it is still unknown how online financial intermediaries will affect
the way financial resources are allocated. This may well be a future direction of
economic studies.
Page 401
References
Admati, A.R., and P. Pfleiderer, 1986. "A Monopolistic Market for Information."
Journal of Economic Theory, 39: 400_438.
"Direct and Indirect Sale of Information." 1990. Econometrica, 58(4): 901_928.
AICPA, 1995. Report by AICPA Special Committee on Assurance Services.
Boyd, J.H., and E.C. Prescott, 1986. "Financial Intermediary-Coalitions." Journal of
Economic Theory, 38: 211_232.
Diamond, D., 1984. "Financial Intermediation and Delegated Monitoring." Review
of Economic Studies, 51: 393_414.
Froomkin, A.M., 1997. "The Essential Role of Trusted Third Parties in Electronic
Commerce." In Kalakota, R., and A. Whinston, eds., Readings in Electronic
Commerce. Reading, Mass.: Addison-Wesley.
Kalakota, R., and A. Whinston, 1997. Electronic Commerce: A Manager's Guide.
Reading, Mass.: Addison-Wesley.
Morgenson, G. 1996. One Day Soon the Music's Going to Stop. Available at http://
www.inetcapital.com/ music2.htm.
Rivest, R.L., and B. Lampson, 1996. SDSI—A Simple Distributed Security
Infrastructure. Available at http://theory.lcs.mit.edu/~rivest/sdsi10.html.
Internet Resources
Electronic Banking Resource Center
http://www.cob.ohio-state.edu/~richards
Encryption Technologies
David G. Post, 1994. "Encryption—It's Not Just for Spies Anymore." American
Lawyer, December 1994. Available at http://www.eff.org/pub/Publications/
David_Post/ crypto_not_just_spies_post.article.
Tatu Ylonen. "Introduction to Cryptography." Available at
http://www.cs.hut.fi/ssh/crypto/ intro.html.
Page 404
White House's white paper on key escrow policy calling for international key
escrow systems is archived at EPIC, available at
http://www.epic.org/crypto/key_escrow/white_paper.html.
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 406
-----------
Previous | Table of Contents | Next
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 407
-----------
CHAPTER 10
Payment Patterns
Page 410
Total 61,712.1 547.5
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 411
-----------
mechanism. To structure the following discussion of types, this chapter
broadly classifies all electronic payment systems into three groups: payment
through an intermediary, payment based on Electronic Funds Transfer (EFT)
and payment based on electronic currency.
The key benefit of this payment clearing system is that it separates sensitive
and non-sensitive information, and only non-sensitive information is
exchanged online. This alleviates security concerns often seen as a serious
barrier to online commerce. First Virtual does not even rely on encryption for
messages between buyers and sellers. A critical requisite for this system to
work is the users' trust in the intermediaries.
Figure 10.2 Transactions with an intermediary.
The second type of payment system does not depend on a central processing
intermediary. Instead, sensitive payment information (such as a credit card or
bank account number) is transmitted along with orders. This is, in effect, an
open Internet implementation of financial electronic data interchange (EDI)
(see fig. 10.3). An electronic funds transfer (EFT) is a financial application of
EDI, which sends credit card numbers or electronic checks via secured private
networks between banks and major corporations. To use EFTs to clear
payments and settle accounts, an online payment service will need to
Page 415
add capabilities to process orders, accounts and receipts. In its simplest form,
payment system may use digital checks—simply images of checks—and rely
on existing payment clearing networks. The Secure Electronic Transaction
(SET) protocol—a credit card-based system supported by Visa and
MasterCard—uses digital certificates, which are digital credit cards. This type
of payment system is called a notational funds transfer system because it
resembles traditional electronic fund transfers and wire transfers, which settle
notational accounts of buyers and sellers.
Notational funds transfer systems differ from payment-clearing services in that
the payment information transferred online contains sensitive financial
information. Thus, if a third party intercepts the sensitive information, it may
be abused like stolen credit cards or debit cards. A majority of proposed
Previous | Table of Contents | Next
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 416
-----------
electronic payment systems fall into this second type of payment system. The
objective of these systems is to extend the benefit and convenience of EFT to
consumers and small businesses. However, unlike EFTs, the Internet is open
and not as secure as private value-added networks (VANs). The challenge to
these systems is how to secure the integrity of the payment messages being
transmitted and to ensure the interoperability between different sets of
payment protocols.
Figure 10.3 Notational Funds Transfer system.
The third type of payment system does not transmit payment information but a
digital product representing values: electronic currency. The nature of digital
currency mirrors that of paper money as a means of payment. As such, digital
currency payment systems have the same advantages as paper currency
payment, namely anonymity and convenience. As in other electronic payment
systems, security during transmission and storage is a concern, although from
a different perspective. For digital currency systems, double-spending,
counterfeiting, and storage become critical issues, whereas for notational funds
transfers, eavesdropping and liability (when charges are made without
authorization) are important concerns. Figure 10.4 shows a digital currency
payment scheme.
The only difference from the figure is that the intermediary in figure 10.4 acts
as an electronic bank that converts outside money (for example, U.S. currency)
into inside money (for example, tokens or Ecash), which is circulated within
online markets. However, as a private monetary system, digital currency will
have a wide-ranging impact on money and monetary systems with implications
extending far beyond mere transactional efficiency. Digital currency already
has spawned many types of new businesses: software vendors for currency
server systems; hardware vendors for smart-card readers and
Page 417
other interface devices; technology firms for security, encryption and
authentication; and new banking services interfacing accounts in digital
currency and conventional currency, for example, Mark Twain Bank
(http://www.marktwain.com). Many of these new players navigate through
areas uncharted by researchers and government policymakers. Old maps used
to inscribe unknown territories with "Here Be Dragons," a cartographic term
for uncertainty. What kinds of dangerous, as well as fascinating, "dragons" we
will encounter in this new world of electronic payments is the subject of the
remaining sections.
Figure 10.4 Digital currency payment system.
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 421
-----------
(5) The FV payment server verifies Alice's account number for the vendor and checks for sufficient funds.
(6) The FV payment server sends an electronic message to Alice. This message could be an automatic World
Wide Web form, or a simple e-mail.
(7) Alice responds to the form or e-mail in one of three ways: Yes, I agree to pay; No, I will not pay; or Fraud, I
never asked for this. A "No" response can be used by FV's members if the downloaded file is not what they
expected.
(8) If the FV payment server receives a "Yes" from Alice, Bob's account is credited by FV, and Alice's account is
debited. If the answer is "No," no further action is taken.
(9) If FV receives no response from Alice, it tries to contact her again. But, after a certain number of tries, FV
may cancel her account because FV requires members to check e-mail regularly. If a member always responds
"No," FV also may discontinue the account.
Figure 10.6 First Virtual payment clearing process.
Page 422
10.3. Notational Funds Transfer
Although payment clearing services have decided advantages for registered members, these advantages cannot be transferred
to non-members. To transact with non-members, online shoppers and merchants may have to rely on traditional payment
methods, such as checks and credit cards, which are accepted as payment by almost all vendors. Using one of these payment
methods requires buyers to send their account or credit card information to sellers, who forward it to an intermediary or a
currency server, which verifies the information and relays it to the affected financial institutions. The banks, in turn, adjust the
users' notational accounts. Thus, you call this system a notational funds transfer system (NFT).
Any Internet payment system that is check- or credit card-based is an example of an NFT. The Interbank Check Imaging (ICI)
system (http://www.fstc.org/projects/imaging), developed by the Financial Services Technology Consortium [FSTC
(http://www.fstc.org)], is a direct application of imaging and network technologies to a financial payment system. Whether an
image of a check is transmitted or credit card numbers are merely exchanged, NFT systems are the most prevalent payment
mechanisms for Internet commerce simply because they represent a natural extension of the existing electronic funds transfer
(EFT) system.
As in payment clearing systems, an NFT system still involves an intermediary. The intermediary's role in this case is limited to
serving as a conduit of messages between the open Internet and closed financial networks. For example, CyberCash's payment
system (http://www.cybercash.com), another implementation of an NFT, uses CyberCash servers to authorize transactions
Page 423
and forward payment information to banks and processing houses. At the shopper's computer, a software program called
CyberCash Internet Wallet contains the shopper's credit card information (see fig. 10.7), which is forwarded to merchants and
then to a CyberCash server that handles payment clearing with banks (see sidebar: How CyberCash Works). Online shoppers
interact with the CyberCash server via a merchant CyberCash server, which transmits the information using public key
encryption. Because credit card information is already encrypted at the shopper's computer, merchants can only verify its
validity without discovering this sensitive information. In this model, more important than the trust issue, is the concern when
security as private information is being transmitted. CyberCash relies on both public key and secret key encryption
technologies to secure its messages (see section 9.4 for encryption technologies).
Figure 10.7 CyberCash Internet Wallet keeps user's credit card information.
continues
Page 424
continued
How CyberCash Works
CyberCash transactions are completed through three software programs: one program resides on the consumer's
PC (CyberCash Internet Wallet), one operates as part of the merchant server, and one operates within the
CyberCash servers. Before shopping with CyberCash, consumers download the CyberCash Wallet program,
which is available free from CyberCash (http://www.cybercash.com). Because CyberCash Wallet is a separate
piece of software, consumers can use any type of credit card. A CyberCash payment process, depicted in figure
10.8, works in the following manner:
(1) The consumer selects items for purchase and fills out the merchant's order form, complete with necessary
shipping information.
(2) When the shopper chooses to pay with CyberCash, the merchant server presents an invoice to the consumer
and requests payment, sending a special message to the consumer's CyberCash Wallet. The consumer simply
chooses which credit card to pay with and clicks it.
(3) CyberCash Wallet sends the credit card information to the merchant server.
(4) The merchant server verifies the validity and integrity of the received message, that is, checks whether it was
tampered with, and sends the message to a CyberCash
Page 425
server.
(5) The CyberCash server is linked to a credit card payment network, through which accounts are settled by
conventional processes.
(8) The merchant sends the ordered items with a receipt to the shopper.
Figure 10.8 CyberCash payment clearing process.
As evident from the way CyberCash works, an NFT is an extension of traditional credit card-based transaction systems in
which established players may have market advantages. To support the increasing use of credit card payments on the open
Internet, Visa (http://www.visa.com) and MasterCard proposed in 1996 a protocol to ensure interoperability across different
hardware platforms and web browsers. This protocol, named Secure Electronic Transaction (SET), is supported by Microsoft,
Netscape, IBM, GTE, VeriSign and other major players in electronic commerce. Besides offering standard communication
protocols and message formats for credit card-based transactions, SET provides confidentiality through encryption, message
integrity using digital signatures, and authentication of consumer and merchant identities (see sidebar, "How SET is Set to
Launch Credit Card Use in Cyberspace").
How SET is Set to Launch Credit Card Use in Cyberspace
Secure Electronic Transaction (SET) is an open specification developed jointly by Visa and MasterCard to secure
credit card transactions over the Internet. SET relies on digital certificates issued to consumers; the certificates
contain credit card information that is verified by credit card issuers through a certification authority. The
document stating that a card is valid is secured by public key encryption and the issuing bank attaches its digital
signature to the certificate. After consumers receive the certificates, they store them in their personal computers,
and send them to merchants when making purchases on the Internet. Merchants also resister with their
Previous | Table of Contents | Next
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 426
----------- banks, who issue digital certificates to be displayed on their web
pages.
Money has many origins and forms, but to be a viable medium of exchange, a
monetary system must meet certain criteria. Primitive forms of money include
virtually every type of goods with value, such as cash crops, cattle, and
ornamental and precious objects. These objects are used to pay tributes, make
peace offerings, compensate a bride's family, and fulfill other social customs.
While these primitive forms of money could be used as a store of value and a
means of payment, to act as a medium of exchange they need to be widely
available and broadly accepted, as well as convenient. Monetary objects may
have different uses, but an economic use of money as an exchange medium
needs to simplify the cumbersome barter system of physical goods.
Coins or paper currency—also called fiat money—meet the criteria of
acceptability, availability, and convenience as a medium of exchange. Precious
metals, struck as coins, were commonly used as money until the 19th century.
Page 428
On the other hand, the origin of paper money goes back only to the late Middle
Ages, when bank credits were transferred in the form of bills of credit, whose
value depended on the issuer's credit worthiness. Until quite recently, paper
money was issued by private banks as well as government agencies. In
Canada, private banks were free to issue notes based on their assets until the
beginning of this century. Even in the U.S., no national banking or currency
system existed during the free-banking era prior to the Civil War. Although
they were ultimately backed by government bonds, National Bank Notes had
been issued by federally chartered national banks since 1863 under the
National Bank Act. The National Bank Notes competed with Demand Notes
(also known as the "greenbacks") and Legal Tender Notes (also known as
United States Notes), both issued by the federal government. The Federal
Reserve Act of 1913 phased out these privately issued notes and replaced them
with Federal Reserve Notes by the late 1930s, but privately issued currency
had been common in the history of U.S. money.
As the use of fiat money grew, it became possible to separate the role of
exchange medium from the role of storing value. Paper currency does not have
an intrinsic value other than the promise by the issuing bank or government to
convert it into another form of stored value on demand. Ultimately, not even
this convertibility is promised, and the value of paper money depends solely
on the implicit trust among the public and between the public and the authority
who issues the currency.
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 429
-----------
verted into another form to address the needs of a market. When linked to a
currency, called outside money, the new form of money is known as inside
money because it is accepted within a certain market.
To be fully considered inside money, these instruments must be convertible
into dollars, that is, redeemable for cash, accepted for various products, and
transferable to other users for payment. Many forms of inside money already
are in use: transit coupons and tokens, casino chips, stadium cards and prepaid
telephone and copy cards. Inside money is circulated among those who trust
and accept it, and the ultimate value of such a currency is in its capability to be
converted to outside money.
The distinction between inside and outside monies is one of territory, in terms
of transactional activities. Inside money is circulated within the territory of the
money—that is, for the purposes specified by the money or for activities in
which that money is recognized and accepted as payment—but cannot be used
outside unless it is converted into outside money. Usually, outside money can
be used for inside-money transactions, but for reasons such as convenience,
inside money may be preferred. Inside money—for example, subway tokens,
video game tokens, and paper money for amusement park rides—is created
and used mainly for convenience, and as long as parity is maintained between
inside and outside money, inside money remains as tokens. These tokens often
don't circulate among users and have limited acceptability.
But certainly, any token may be transferred or traded among its holders and
accepted by a large number of merchants. When these tokens are used for
almost all payment and exchange needs, what is the difference from outside
money? In other words, if one can use casino chips to buy clothes in a mall, to
pay taxes, and to buy all kinds of products and services, has a new currency
been created? Indeed, an extreme case of the inside money model would be
private monies issued by malls and merchants. And an extreme case of this is
the creation of digital currency for use in the world's largest mall—the
Internet. If a digital currency gains the public's trust and is accepted by all
merchants and consumers on the Internet, the distinction between that
Page 430
and outside money (that is, dollars or francs or pounds), will be arbitrary. In
every sense of the word, digital currency is the same as cash.
When there is already a widely accepted and well-behaved national currency,
why would anyone want a new currency? The following section enumerates
some reasons digital currency is needed for online commercial transactions.
These reasons are based on the difference between electronic commerce and
physical markets.
However, there are arguments both for and against creating inside monies in
physical markets. For example, Champ et al. (1996) examines Canadian and
U.S. banking experiences during the late-19th century, and suggest that
banking panics and failures are less severe when private monies or inside
monies are available to alleviate liquidity constraints (that is, the lack of cash
to meet cash demand). On the other hand, Williamson and Wright (1994)
argue that private monies as a medium of exchange may fail to provide the
reliability and ready acceptance of national outside monies. This may result in
economic losses. For example, dollars facilitate transactions because everyone
is willing to accept dollars to exchange commodities. In bartering, both parties
must know the quality of each other's goods. With cash transactions, the
uncertainty is less because at least the quality of the cash is certain. However,
if that cash is private money, this type of transaction is no different from
bartering.
In the physical world, despite the convenience of paying by check, credit card,
or charge card, cash remains the most frequently used payment medium in
terms of the number of transactions. Similarly, many factors in electronic
commerce drive the need for a digital cash equivalent.
Anonymity in Transactions
The first basic need for digital cash harks back to the concern about con-
Page 431
sumer privacy discussed in Chapter 8. Non-cash payment systems also can
implement anonymity, as encryption technologies separate payment
information from buyer identification to conceal the buyer's identity from
banks or sellers. In models using trusted third parties, the privacy of consumer
information depends solely on this third party. While possible, none of these
methods is as easy, complete, or efficient in preserving consumer privacy as
digital currencies, in which only values are transferred without payer
information. The bank issuing digital currency keeps track only of serial
numbers to authenticate the value of a currency, and digital coins carry
encrypted messages about the user, which can be revealed only by legal
means.
Micropayments and the Internet
The second factor driving the use of digital currency is the economic need to
minimize transaction costs. Non-cash payment systems, as discussed in earlier
sections, require payees to verify and authenticate each payment, a highly
inefficient method for small-value transactions. Developing a cost-effective
payment mechanism to implement small-value transactions is a fundamental
prerequisite in commercializing the Internet, where many information goods
have values less than $1.
As the transaction costs of non-cash payment systems decrease, an increasing
percentage of transactions may become cashless. However, despite
increasingly sophisticated network financial technologies, paper- and
electronic-based payment systems still incur significant costs for handling and
authorization. Consequently, the use of cash has persisted. According to one
estimate, cash is used in 85 percent of transactions although it accounts for
only 0.5 percent of the value of transactions. Similar needs exist for electronic
commerce. It is critical for digital currency to be fully developed and accepted
if information trading is to take off on the Internet because neither a PCS nor
an NFT payment method is adequate for micropayments. Although digital
currency will not replace traditional payment methods for many products, it is
certainly well-suited to pay for accessing web pages, for example, and for the
commercialization of networked information.
Previous | Table of Contents | Next
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 432
-----------
The Transferability of Value
The third motivating factor behind digital cash is the need for transferability,
by which two parties may exchange goods and services without an intervening
third party. Non-cash payment systems are mediated by one or more third
parties, such as check- or credit card-clearing services. A system involving a
third party is a type of client-server in which the server (the third party)
represents the authority who backs up the validity of transactions. In contrast, a
transferable payment system supports peer-to-peer transactions in which the
role of the third party is subsumed within the digital currency. Although
transferability is not absolutely required to achieve payment and settlement
between two parties, any non-transferable payment system unnecessarily
increases the transaction costs and can delay the settlement process as an
on-line third party is required for each transaction.
Despite clear incentives, initial proposals for digital cash are tempered by the
fear of double spending and counterfeiting. For that reason Ecash by DigiCash
(http://www.digicash.com), for example, requires payees to verify a coin's
validity with a payment server or a bank. If valid, the coin is reissued under a
new serial number. In an effort to make Ecash acceptable, an unnecessary third
party and the associated transaction costs are involved. A truly transferable
digital currency will be one that can be circulated peer-to-peer online and
offline. The following section examines proposed digital currencies, including
Ecash, in detail.
Monetary Value
To be used as a monetary unit, digital currency must have value that can be
exchanged for other goods and services, be used to pay fiduciary obligations,
or be transferred to another person. Because digital currency is essentially a
file, it does not have an intrinsic value and must be linked to another system of
value. The most common implementation is to base the value of digital
currency on bank deposits, credits, or pre-payments using outside money.
After a digital currency is convertible to dollars, the next step is for it to be
accepted in the market as a monetary token. After becoming accepted and
trusted, a digital currency can establish related properties, such as
exchangeability and transferability.
Convenience
Convenience has been the biggest factor in the growth of notational currencies,
such as checks, which are scalable and easy to transport. Similarly, digital
currencies must be convenient to use, store, access, and transport. A digital
Page 434
file may allow remote access to money via telephone, modem, or Internet
connection. Electronic storage and transfer devices or network capabilities will
be needed. To gain wide acceptance, digital cash also must be convenient in
terms of scalability and interoperability so that users need not carry multiple
denominations or multiple versions for each operating system.
Security
To secure physical money and coins, one needs to store them in wallets, safes
or other private places. If digital currencies are stored on hard drives connected
to an open network, theoretically anybody can snoop and tamper with the
money. Encryption protects digital currency against tampering. Some
proposals using smart cards (for example, Mondex) store digital currency in
tamper-resistant hardware that can be maintained offline. Ecash relies on the
security of Ecash client software residing on users' computers.
At the same time, digital currencies must be resistant to accidents by owners.
Dollar bills are printed on strong paper that withstands many adverse
treatments, such as washing. To achieve similar security, adequate protection
standards are needed in physical specifications of digital coins and in policy
matters for legal and commercial liabilities.
Authentication
Non-Refutability
Anonymity
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 436
-----------
currency. But the economic rationale for simple, anonymous digital coins is
that they reduce transaction costs by eliminating third parties and protect
consumer information that could be used to price-discriminate among
consumers.
Two types of digital currency have been developed, but the general trend
appears to be toward a mixed system. Ecash, developed by DigiCash
(http://www.digicash.com), is the forerunner of Internet payment systems
based on online transactions. Mondex represents the other type of payment
system, based on offline transactions. Unlike their online counterparts aimed at
Internet users, offline payment systems grew out of existing EFT mechanisms
using debit cards, such as telephone and copy cards. These cards hold prepaid
account information and merchants who accept these cards are usually
credited for the transaction amounts by the card issuer. By using computer
chips embedded in these cards (hence the name smart cards) payment
information and values can be transferred. As issuers develop network
interface devices, smart cards can be used online as well, competing directly
with online payment systems. Similarly, Ecash and other online payment
systems are introducing electronic wallets similar to smart cards, enabling
offline transactions. As the two become integrated, the distinction between
online
Page 437
and offline systems is rapidly disappearing. More detailed discussions of
Ecash and Mondex follow.
Ecash
Millicent
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 440
-----------
Mondex
● Transactional efficiency
● Monetary effects
● Organizational effects
Transactional Efficiency
Although anonymity has been the focal point in the debate on electronic
payment proposals, the transaction cost will determine the future of any
electronic payment system. For large-value transactions, existing payment
methods using checks and credit cards can be adequately converted to the open
Internet after security concerns are alleviated. More importantly, payment
systems using the Internet can lower the cost of credit card-clearing services,
for which expensive private closed networks are built. Using the Internet will
eliminate a substantial portion of redundant infrastructure costs, and enable
small merchants and individuals to offer check and credit card payment
options for their customers.
In terms of reducing per-transaction cost, a PCS such as First Virtual appears
to be in a position similar to NFT systems, as long as First Virtual uses credit
cards or bank account transfers to settle payments. If First Virtual or a similar
intermediary settles members' accounts only intermittently, it may offer a less
costly way to handle repeated payment transactions, just as inter-bank
payments are settled once a day via Fedwire or CHIPS. However, as proposed,
First Virtual does not represent a significant reduction in transaction costs.
The cost of clearing a payment becomes critical for small-value transac
Previous | Table of Contents | Next
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 444
-----------
tions that might involve payment of a penny or less to view a web page. In the
case of digital currency, the level of transactional efficiency depends on
whether users need to interact with a third party to verify the currency's
validity, which increases costs. After verification, the intermediary re-issues a
new coin, making a digital coin in this scheme non-transferable. Bypassing
this cumbersome and repetitive process may compromise the level of security
against double spending or counterfeiting, or may require a secure hardware
platform, as in Mondex. Because encryption technologies are adequate enough
to support a high degree of security, systems such as Millicent may be viable
for high-volume, low-value transactions at minimal transaction costs.
(1+CD)
(CD+RD)
Monetary Effects
bank can lend the money to a third person, who in turn holds some of the
money in cash and deposits the rest. The money supply is created through this
process of deposits and lendings.
In the U.S., the Federal Reserve (the Fed) controls the money supply by
changing the amount of currency in circulation and the bank's capability to
lend. The Fed controls the amount of currency by selling and buying bonds
through its open market operations. When the Fed sells (or buys) bonds, it
reduces (or increases) the amount of currency circulating. The Fed also
requires each bank to hold a portion of their money in cash or with the Federal
Reserve banks to meet the cash demand of consumers. The resulting
reserve-deposit ratio may be changed by the Fed, but is currently around 10
percent. This means that for every $10 of checkable deposits, a bank must
have a cash reserve of $1.
The currency and the banks' deposits with the Fed are called the high-powered
money or the monetary base. The effect of the Fed's monetary operations on
the money stock involves the money multiplier, which is determined by the
currency-deposit ratio and the reserve-deposit ratio. The money supply
function can be expressed in the following equation:
Money Stock=(Money Multiplier) ¥ (Monetary Base), where
Money Multiplier=
Page 446
CD is the currency-deposit ratio, and RD is the reserve-deposit ratio. This
means that the total stock of money in the economy is 2.8 times greater than
the monetary base. The money multiplier and the stock of money can be
graphed, as in figure 10.11, using the money multiplier.
Figure 10.11 The monetary base and the money supply.
Figure 10.11 depicts a situation in which an increase in the monetary base,
denoted as DB, increases the total money supply by DM. The exact monetary
effect depends on the money multiplier, which is DM/DB in the graph. An
increase in the money multiplier (a counter-clockwise rotation around the
origin, that is, steeper, for the money multiplier line) implies that an increase in
the monetary base causes a larger increase in the money supply.
Ecash, e-money, or CyberCash systems essentially create new currencies, but
their effect on the money supply depends on whether they are backed by the
national currency. If Ecash, for example, is backed by dollar-denominated
currency accounts, inside (digital) money is exchanged with outside (fiat)
money. For example, suppose Alice withdraws $100 from her conventional
bank, deposits it with Mark Twain Bank's Ecash account, and converts it into
$100 worth of Ecash coins. If Mark Twain Bank does not hold the $100 but
deposits it with another bank, or lends the $100 under the same condition as
any other bank, the supply of money does not change by Alice moving her
money to the electronic bank.
However, say Alice withdraws $100 into cash to meet her need for cash
transactions. Such cash holding by a consumer represents a reduction in
demand deposits and the capacity to create money by lending institutions.
With Ecash instead of cash, Alice does not carry $100, which she would
normally have held for cash transactions, and therefore more money is
available for lending by banks. In other words, consumers will hold less cash
and more deposits with the availability of digital currency, which decreases the
currency-deposit ratio and increases the money multiplier (by reducing CD in
the money supply equation). As a result, the overall money supply will
increase if Mark Twain Bank, or any escrow intermediaries that hold backup
outside money for digital currency, is allowed to operate as a lending institu
Page 447
tion. The effect on the money supply will be even greater if Mark Twain Bank
is not subject to the Fed's normal reserve requirements and chooses to have a
lower reserve ratio. On the other hand, if digital currency issuers are required
to hold the dollar (outside money) in an escrow account and cannot lend the
deposit to a third person, the same amount of cash balance is held, either in
digital cash or fiat cash, with no effect on the money multiplier.
If, however, digital currency is not backed by dollars or any outside money,
digital currency is then simply a product whose price is determined only by the
supply and demand in the market, akin to holding foreign currency in lieu of
the dollar for cash transactions. Imagine that U.S. residents are suddenly using
Mexican pesos or German marks for everyday transactions. Its effects on the
money supply and the dollar interest rates deserve a great deal of investigation.
For example, suppose that residents in Texas adopt a digital currency, which is
not linked to the dollar, for their cash transactions. Alternatively, suppose that
members of the North American Free Trade Agreement (NAFTA) integrate
their economies while their currencies are maintained separately, and Texas
residents begin to use Mexican pesos instead of dollars for grocery shopping.
The dollar demand for cash will be greatly reduced. To reduce the supply of
dollars, the Fed may engage in open market operations, for example, selling
government bonds to the public, thereby increasing its cash holding and taking
cash out of circulation. U.S. monetary officials claim that changes in the
money supply can be adequately met by the Federal Reserve System, through
open market operations, whether or not digital currency is backed up by fiat
money. Nevertheless, if the Fed wants to reduce the money supply as the
demand for dollars decreases, it needs to raise the interest rate to sell bonds. At
the same time, people want to dispose of their cash by buying bonds, so that
the increased demand for bonds will lower interest rates. The net effect of the
Fed's open market operations and the citizen's demand for bonds may very
well offset each other to produce stable interest rates. However, if the Fed's
operations are out of sync, temporary instability will have a significant effect
on the economy—as evidenced by the stock market response to a quarter point
increase in the interest rate.
Previous | Table of Contents | Next
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 448
-----------
It may be enlightening to contrast the workings of Mark Twain Bank and Visa
International. The latter creates credit, but this is offset by the need for Visa's
investors and owners to inject funds to cover the float between paying vendors
and receiving payments from card users. Because the inflow, on average,
equals the outflow, no net increase occurs in the money supply. Note that the
borrowers do not deposit their unused credit with anyone. Credit is extended
only when Visa incurs an obligation to the vendor, which is a debit for Visa
covered by its investor-provided reserves. There is no multiplier effect like the
bank deposit/loan phenomenon. The total credit enjoyed by card users is offset
by the invested funds needed to cover the float.
Another long-term impact that some economists posit is the possibility of a
change in money velocity due to the introduction of digital currency
(Panurach, 1996). The velocity of money refers to the rate at which the money
circulates. Suppose that each transaction is worth $10. If the total transactional
size of an economy is $1,000, requiring 100 transactions, the money circulated
may be $1,000, which means that each $10 bill is used only once. On the other
hand, a fast circulating $10 bill may be used for all 100 transactions, resulting
in a much higher velocity of money.
Changes in payment systems—for example, employee compensation, not
payments for transactions—also affect the velocity of money, but these
changes are usually institutional. For example, in recent years, the increasing
use of electronic forms of wages has lowered average money balances.
Suppose that a person gets paid $3,000 in cash at the beginning of each month
and spends it by the end of a month. The average cash balance will be $1,500.
But if he is paid $1,500 twice a month, the average balance is only $750. The
economy will have to print $1,500 worth of money for the former, while it
needs only $750 for the latter. If the size of the economy is the same, the latter
meets the same transactional needs with less money; there is a higher velocity
of money. Similarly, if people use more non-cash payment methods, the need
for cash diminishes, and the economy will not need to have more cash. Given
the cash holding, then, convenient forms of wage payment and transactions
tend to increase the money velocity.
Page 449
However, the change in transaction speed seldom affects the real economy. In
the above example, the size of the economy remains the same regardless of the
money velocity. On the other hand, the real economy will grow if transactional
opportunities arise. More convenient money facilitates the way money
circulates in an economy, but its real effect is in lowering transactions cost,
which increases economic efficiency and the level of overall economy. Many
proposed electronic payment systems may simply replace existing payment
methods without any real economic effect, if they have little effect on
transactions cost.
Another issue pertaining to having more convenient forms of money is the
relationship between the velocity of money and inflation. The earliest
monetary theory, the quantity theory of money equation, shows that inflation
increases if the stock of money or the velocity of money increases. However, if
the money stock adjusts to compensate the change in the velocity of money,
the price level will not change. Furthermore, simply having more convenient
money would not affect the real economy without fundamental changes. For
example, it is true that whenever a $10 bill exchanges hands, a transaction
value of $10 is created. If the same amount of money circulates twice as fast,
twice as much value will be created. However, to have a real impact on the
economy, these values have to represent changing levels of production in real
goods. For example, the sum of weekly transactional values on the NYSE
often exceeds that of the annual Gross Domestic Product (GDP) of the United
States, but the figure is of transactional—financial nature. The simple fact that
money changes hands more frequently does not mean it will have a real impact
on the economy.
Finally, the Internet is global and may add significant instability to a nation's
monetary system through mechanisms that are out of that government's
control. For example, if offshore banks require no, or lower, cash reserves for
deposits, this will effectively lower the reserve-deposit ratio. Also, if offshore
banks offer higher interest rates, people will reduce their cash holding,
depositing their cash at these banks—which lowers the currency-deposit ratio.
As a result, the money multiplier increases. When the monetary base changes,
the larger money multiplier will produce a more volatile money
Page 450
supply, and possibly changes in price levels and fluctuations in the nominal
GDP. Furthermore, if most people prefer to hold international electronic
currency, open market operations by a central bank or the Fed may not be
effective in controlling the amount of currency or interest rates. Like a small
country whose exchange rate floats with dominant foreign currencies,
domestic monetary policies may be rendered ineffective by a worldwide digital
currency.
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 451
-----------
ing settlement. Just as you see Visa, MasterCard, and other credit card logos
on a merchant's door, web pages will be strewn with electronic logos
informing consumers of optional payment systems honored at their sites. Each
consumer and merchant must open an account with CyberCash or other
payment services offered in the market. Does this represent any improvement
over physical markets? In this regard, digital credit cards using an industry
standard such as SET may have an advantage over using numerous NFT
intermediaries, each issuing their versions of electronic wallets. However,
credit card-based systems simply extend existing payment networks to the
Internet, which may be sufficient for old models of business. As electronic
commerce demands new kinds of products and consumption behaviors,
electronic payment systems must also reflect these changes. For example, a
cost-effective micropayment system will be needed for microbundles and
microsales of information products. Even for this purpose alone, digital
currency and its related market infrastructure should be nurtured.
Left alone to markets, various forms of electronic payment systems will
differentiate by price, convenience and quality. Price certainly will be
determined by the difference between the cost of providing an electronic
payment service and the cost of using a conventional system—or the
consumer's willingness to pay given this opportunity cost. In terms of
transaction costs, online transactions must be far more efficient to generate
enough spread between the two options. Thus, efficiency gains are turned into
profit opportunities. However, this ignores consumers' willingness to pay,
which may very well increase because of convenience, anonymity and other
factors that are not available offline. Greater willingness to pay will support
electronic payment systems that may increase transaction costs. The major
challenges of electronic payment systems are not in reducing transaction costs
or perfecting security but in producing usage values to gain consumer
acceptance and devising efficient pricing strategies for various payment
intermediaries. For the Mondex system, (Clemons et al., 1997) identify various
ways to charge consumers for its service: selling cards, renting cards, charging
a fee for bank-to-card transfer, charging a fee for currency-to-Mondex
exchange, or discounting when Mondex currencies are traded for outside
monies. For digital
Page 452
currency, what is known as seigniorage can be a source of profit. Because this
involves monetary policies, banking regulation and international currency
exchanges, this chapter concludes by examining the role of governments in
promoting digital currency.
Money is exchanged with goods and services of equal value except when it is
issued by the government, which gains from the difference between the cost of
printing a dollar and the value of a dollar, known as the seigniorage. The
government derives further revenue from dollar currency held by consumers,
which amounts to interest-free lending to the government by the public—a
privilege often abused by excessive printing. In 1994, most of the $20 billion
generated by the Federal Reserve could be accounted for by the government's
privilege to print money (Blinder, 1994). Thus, when private monies are
issued, they take away some portion of the government's revenue related to
seigniorage and other currency operations.
As long as a national government is the only currency issuer, its revenue
related to seigniorage is the monopoly profit. If private firms are allowed to
print money, the profit will be shared with these firms. The dollar is accepted
by the public because of the public's confidence in the U.S. government.
Likewise, the acceptance of private money will depend on the public's trust in
the companies who issue the money. This does not mean that private
companies will appropriate profits that previously were the government's
revenues. Whether the profit is kept by them or is distributed to consumers will
depend on the competitiveness in the currency industry. If, for example, online
banks compete by paying interest on digital currency deposits, the interest paid
to depositors is the seigniorage now being appropriated by governments. The
competition among issuers may well drive the private profit to a level where a
significant portion of the monopoly profit currently enjoyed by governments is
instead given to consumers in the form of convenience, service, and quality.
Page 454
Regulatory Issues
Governments play a role in a wide range of regulatory issues regarding the use
of currency. Using the example of the U.S., this section discusses in detail how
a current reading of relevant regulations and laws highlights the need for
governments to resolve any uncertainty regarding the use of digital currency.
First, in terms of consumer protection, the Electronic Fund Transfer Act
(EFTA) and its Federal Reserve implementation rules, known as Regulation E,
determine the rights and responsibilities of consumers and financial
institutions. EFTA and Regulation E establish the rights, liabilities, and
responsibilities of parties in EFTs involving consumers. For example, under
EFTA, consumers are liable only to a maximum of $500 for unauthorized use
of a stolen or lost credit card. Further, this regulation establishes consumers'
rights regarding account disputes, damages, and losses. However, these
regulations are limited to EFTs and do not seem to cover, as written now,
electronic currency because digital currency is not "transfer information" but
rather money itself. Instead, if you lose a balance on your Mondex card, for
example, the issuer must provide consumers with remedies. The terms of
remedies will most likely need to be disclosed before consumers purchase
digital currency. However, disclosure rules governed by EFTA and Regulation
E also do not extend to digital currency. Unlike services based on dollar
currency, digital currency intermediaries will have to assure consumers of their
quality and reliability to succeed in the market. Through competition, it is
likely that an assortment of digital currency will be offered to exploit various
needs of transaction, with prices reflecting the degree of reliability and
convenience.
Second, government agencies require banks to keep records and file reports on
certain types of currency transactions to detect and counter money laundering
and other criminal activities. The government's control over money
Previous | Table of Contents | Next
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 455
-----------
laundering depends on its capability to follow the money trail. While the
debate has been raging on whether to allow anonymous digital coins, a
technical issue has not been resolved regarding who will provide routine data
on money movements. The Bank Secrecy Act (BSA) requires banks and
financial institutions to report certain transactions, for example, currency
transactions exceeding $10,000. However, BSA definitions regarding financial
institutions, currency, monetary instruments, and funds transfers may or may
not apply to digital currency and currency servers. For example, financial
institutions that are subject to the BSA regulation are entities licensed to
transmit funds or an issuer, seller, or redeemer of traveler's checks. If digital
currency is treated as a traveler's check, the BSA may apply to the issuer. But
legal definitions must be cleared by legislators beforehand. Finally, the nature
of digital currency may pose a problem for law enforcement. In general, digital
currencies are expected to be used for extremely low-value transactions, which
would be a poor medium for money laundering if regulatory agencies monitor
the frequency of transactions as well as the amount. Existing control over
dollar currency may be adequate to discourage criminal uses of digital
currency.
Third, the advent of digital currency raises the need to reexamine existing state
and federal laws, which regulate who can issue private monies and accept
money as deposits. Until 1913, state-chartered private banks were allowed to
issue currency in the United States subject to state regulations, and some states
today have laws regulating the issuance of private monies. However, a federal
law (18 U.S.C. 336), in addition to the U.S. Constitution's grant to Congress to
coin money (Article 1, Section 8), appears to prohibit private businesses from
issuing currency. 18 U.S.C. 336 codifies the 1862 Stamp Payments Act, which
has a direct bearing on digital coins. It states that:
"…whoever makes, issues, circulates, or pays out any note, check,
memorandum, token, or other obligation for a sum of less than $1,
intended to circulate as money or to be received or used in lieu of
lawful money of
Page 456
the United States,"
is subject to a fine and six months' imprisonment. The Stamp Payments Act
was enacted during the Civil War to counter inflationary effects of notes issued
by merchants because of the disappearing U.S. coins (which were stockpiled
because the coin's actual value was higher than its face value due to inflation).
Although the Federal Reserve and other government agencies have maintained
a laissez-faire attitude toward someone who can issue digital currency, this
uncertainty needs to be addressed in a legal and concrete way.
An equally uncertain issue for digital currency issuers and servers is whether
they are considered deposit takers. Under the Glass Steagall Act, Section 21,
only banks can accept deposits, and deposit-taking institutions are prohibited
from selling securities. Thus, only banks would be allowed to offer digital
currency services if selling digital coins is considered to be accepting deposits.
On the other hand, if digital currency is regarded as a digital commodity, any
retailer could sell digital currency. Furthermore, if digital currency issuers are
classified as banks, the Bank Holding Company Act (12 U.S.C. 1841) will
prohibit any non-bank firm from owning a business that issues digital
currency. The Federal Reserve closely controls deposit-taking banks through
these regulations. However, if non-bank firms are allowed to issue digital
currency, the Fed's control will be weakened, although Fed Reserve officials
do not see a significant change in their ability to control the monetary policy.
Nevertheless, Congress, the Federal Reserve, and the Justice Department
should put forth their clear opinions regarding these issues if digital currency
services are to be accepted for electronic commerce.
The nature of the Internet as an international network also raises the question
of whether one governmental body can regulate banking and financial services
that may operate overseas through offshore (Internet) banks and digital
currency issuers. These overseas entities have the same local presence on the
Internet while circumventing regulations imposed on local banks.
Page 457
For example, offshore banks are usually not subject to income tax, reserve
requirements, insurance premiums, and so on, which burden U.S. domestic
banks. This lack of regulation means opportunities for banks and financial
institutions. But, consumers also will benefit from the globalization of
banking. Many offshore banks are already advertising on the Internet for their
services, offering higher interest rates on deposits and better terms for loans.
As they expand their ability to transfer money to offshore sites through
cheaper communications media such as the Internet, ordinary consumers will
gain access to more favorable offshore banking. To date, offshore banking has
been available only to a few, whose large transactions justify offshore
banking's high cost (White, 1996).
Offshore banks have these advantages because customers do not need foreign
currency conversions. For example, Caribbean offshore banks allow
dollar-denominated accounts to serve U.S. residents. If offshore banking
involves foreign exchange, the benefit calculation will be more complex.
Using the same currency, offshore depositors are able to exploit the differences
in economic environment, such as banking regulations. However, if money is
ubiquitous worldwide and physical location is no longer relevant, what would
offshore banking mean? The increased use of worldwide digital currency may
eliminate regulatory differences among governments, and with it, many
advantages of offshore banking as well.
The prospect of a worldwide digital currency is at best puzzling as to its
impacts on the parity of national currencies and economies. First, what would
be the value of one, say, Digital Currency Unit (DCU$), if it is pegged to a
dollar? Internet users in France may be paid in DCU$, but when they convert
them into francs, they may have to use the dollar-to-franc exchange rate. The
system of foreign exchange will resemble that of the physical market, where
all currencies can be converted to a dollar. But the ever-changing exchange
rates do cause inconvenience for non-U.S. countries. Will this mean that every
country will issue digital currency denominated by its own currency unit?
One thing is certain: digital currencies will reflect the real international
Previous | Table of Contents | Next
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 458
-----------
economy as long as they remain as inside monies because their exchange
values are determined by outside economies. Therefore, economic activities in
the electronic marketplace will determine the characteristics of digital money,
not vice versa.
Page 459
10.8. Summary
Although a plethora of disparate payment systems are offered for electronic
commerce, many firms are reluctant to expand into online commerce because
of a perceived lack of suitable payment mechanisms. Widely different
technical specifications make it difficult to choose an appropriate payment
method. This chapter, instead of focusing on the technical specifications of
proposed electronic payment systems, distinguishes electronic payment
methods based on what is transmitted over the network. Because consumers
are familiar with credit card payment methods, they may accept electronic
versions as the standard for electronic commerce.
Nevertheless, existing payment methods developed for relatively high-value
transactions cannot adequately support web-based information trading. A
cost-effective micropayment system is essential for transactions of extremely
small value, just as cash remains the preferred payment method for these
transactions. Anonymity is only one aspect of cash transaction, but it has
received disproportionate, often sensational, attention in the press and by
regulatory agencies while the economic need for a cash-like payment system
in electronic commerce is largely ignored. Factors such as micropayments and
peer-to-peer transfers in electronic commerce—especially for the information
market—seem to indicate a healthy market for digital currency or small-value
digital checks or credit cards.
In terms of the regulatory and monetary impact, private digital monies clearly
present problems and opportunities. But, as with any digital product, the future
of digital currency will be determined by the market demand and supply.
Consequently, it is more than likely that each payment method reviewed in this
chapter will find a niche market and consumers will selectively use an
appropriate payment method depending on whether they prefer convenience,
costs, privacy, or the advantage of credit extension. The usefulness of digital
currency, however, has to be emphasized in terms of what a
Page 460
web-based information economy would mean for the future of electronic
commerce and the Internet. With a suitable payment method, the age of
information will manifest itself on the Internet, albeit in a commercial form.
References
Bester, H., and E. Petrakis, 1996. "Coupons and Oligopolistic Price
Discrimination." International Journal of Industrial Organization, 14: 227_242.
Blinder, A.S., 1995. "Statements to the Congress." Federal Reserve Bulletin,
81(12): 1089_1093.
Champ, B., B.D. Smith and S.D. Williamson, 1996. "Currency Elasticity and
Banking Panics: Theory and Evidence." Canadian Journal of Economics,
29(4): 828_864.
Clemons, E.K., D.C. Carson and B.W. Weber, 1997. "Reengineering Money:
The Mondex Stored Value Card and Beyond." International Journal of
Electronic Commerce, 1(2): 5_31.
Federal Reserve Bank of St. Louis, 1995. "A Payment Revolution in the
Making." 1995 Annual Report.
Greenspan, A., 1996. Remarks given to the U.S. Treasury Conference,
"Toward Electronic Money and Banking: The Role of Government,"
September 19, 1996.
Page 461
Kalakota, R., and A.B. Whinston, 1997. Electronic Commerce: A Manager's
Guide. Reading, Mass.: Addison-Wesley.
Knudson, S.E., J.K. Walton, and F. M. Young, 1994. "Business-to-Business
Payments and the Role of Financial Electronic Data Interchange." Federal
Reserve Bulletin, 80(4): 269_278.
Panurach, P. 1996. "Money in Electronic Commerce: Digital Cash, Electronic
Funds Transfer, and Ecash." Communications of ACM, 39(6): 45_50.
U.S. Department of the Treasury, 1996. "An Introduction to Electronic Money
Issues." Prepared for the U.S. Department of the Treasury Conference Toward
Electronic Money and Banking: The Role of Government.
White, L. 1996. The Technology Revolution and Monetary Evolution.
Presented at the Cato Institute's 14th Annual Monetary Conference, May 23,
1996.
Williamson, S.,and R. Wright, 1994. "Barter and Monetary Exchange Under
Private Information." American Economic Review, 84(1): 104_123.
Dean, E., ed., 1965. The Controversy over the Quantity Theory of Money.
Lexington, Mass.: Heath.
Judd, J.P., 1983. "The Recent Decline in Velocity: Instability in Money
Demand or Inflation?" Economic Review, Federal Reserve Bank of San
Francisco, Spring 1983, pp. 12_19.
Monetary Freedom
Internet Resources
Electronic Money Resources
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 463
-----------
CHAPTER 11
Contrary to the popular vision of virtual equality that paints the future of
electronic commerce as a market where the distinction between large and
small becomes moot, there is ample evidence that large firms may dominate
electronic commerce. First of all, a firm with an established reputation in
physical markets may be able to transfer this reputation to the virtual market.
To the extent that the company has established a reputation as a dominant and
large firm in physical markets, this reputation transfer represents a form of size
advantage in electronic commerce as well.
You can already see evidence of this in electronic commerce. During the first
stage of market growth, small, entrepreneurial firms dominated the Internet
scene. However, a reversal of fortune has become evident in many product
markets. For example, Amazon.com (http://www.amazon.com), the largest and
most successful online bookstore, faces stiff competition from established
booksellers such as Barnes & Noble and Borders (http://www.borders.com). In
another example, Netscape was the early entrant to the web-browser market,
holding almost 90 percent of the market until the giant in the physical world
entered. Microsoft's Internet Explorer has reduced Netscape Navigator's
market share by 20 percent in just one year since its introduction. The question
of quality—for example, downloading speed, ease of use, and features—often
becomes secondary to Microsoft's reputation as the leader in physical markets.
In addition, Microsoft can bundle its browser with its operating system
software so that new users inadvertently become its customers. (For a
comprehensive browser comparison, see C-Net's information page at
http://www.cnet.com/Content/Reviews/Compare/Browsers /index.html.)
Other firms native to the Internet will soon face challenges from physically
large firms as well. For example, VeriSign (http://www.verisign.com) has been
Page 466
the pioneer in certification services. But, the U.S. Postal Service
(http://www.usps.gov) intends to enter the certification business, which
requires verification technologies and the public's trust in a third party.
Similarly, many Internet payment services companies will have to compete
with large firms, such as national banks and Visa and MasterCard. Although
Internet-native firms have been small, innovative enterprises, their competitive
edge is being rapidly eroded as large firms with reputation, and the capital, in
physical markets enter the arena. Transferred reputation is clearly one factor
that makes size matter in electronic commerce.
Another reason why size will continue to matter in the electronic marketplace
stems from an economic observation of the process of competition in digital
products. A simplified competition process may take the following form.
Given that a digital product requires a large initial investment to produce the
first unit, the per-unit cost decreases as the number of units sold increases. In
other words, a digital product producer has an increasing economy of
scale—declining average costs—with respect to the number of sales.
Understandably, each firm tries to maximize its market share. For a set quality,
producers can determine the minimum number of sales needed to break even.
In the case of competition among same-quality producers, this break-even
price will be the same for all. Any price below that will increase market share,
but the firm will not break even. If the firm is large enough, and possesses
enough capital, a high-quality producer can cut its price and gain market share,
despite losses, as a temporary strategy to drive out competitors. And as the
firm's market size grows, it can further reduce its price as its average cost
declines. Contrary to the common belief that the Internet is an equalizer of
small and large firms, only firms with sizeable capital may survive a heated
competition.
Because a sizeable market share is necessary to cover the initial fixed cost of
production, the Internet as the "great equalizer" might well be a myth. A larger
firm that can invest more in quality will command a higher share of the
market. If products have the same price, a firm with higher quality will
dominate the market because consumers learn about quality and repeat
purchases.
Previous | Table of Contents | Next
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 467
-----------
Product Differentiation and Size
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 471
-----------
When unrelated product markets are artificially linked, optimization cannot be
expected to prevail. The objectives in the television programming market will
only occasionally match the objectives of the advertising market. In the
advertising-supported TV market, the type and quality of programs are
determined not by consumer preferences but by the incentive to maximize
profits from advertising. As a result, TV executives choose programs with
little consideration for consumer demand. Similar inefficiencies will be
observed in advertiser-supported search services.
Search engine providers that use advertising are intermediaries, just like TV
networks, that sell access to consumers or consumer information to advertisers.
Their search databases are like television programs that attract an audience.
However, why would a narrow-cast medium like the Internet need a business
model that evolved to address the peculiar problem of selling over-the-air
entertainment? Unlike in mass media markets, Internet markets for content and
advertisements can be separated. In the advertisement market, sellers
(advertisers) can sell their products directly to consumers. Consumers will be
paid for reading advertisements. In the search market, consumers will pay
service providers directly for the information. In either market, product
selection and prices will be based on preferences and costs relevant to either
advertisements or search information.
Some consumers prefer not to pay for search services and are willing to
tolerate advertising banners that are presented with search results. Others are
frustrated by the delay caused by graphic banners, which often maintain
surreptitious connections with advertising servers. Even as bandwidth becomes
cheaper, congestion will remain due to the ever-increasing size of content. In
addition to the congestion problem, essential problems remain regarding
advertiser-supported search services.
First, as in broadcasting, advertisers cannot be sure of the effectiveness of
advertising. Second, while an advertiser-based free service (like TV) or a
flat-fee billing system (like newspapers) may seem to be a cost-effective and
Page 472
equitable way of providing services, this is not the case. Some consumers are
discouraged from using the service because of the distortion introduced by
advertising. Others use the service beyond an efficient level, resulting in the
abuse or waste of the resource because it is free or cheap to use.
The commercialization of search services best exemplifies how
broadcast-based business models are commonly applied to electronic
commerce without serious consideration of the implications. This section's
discussion is not intended to press for a usage-based fee structure for search
services, nor to advocate publicly supporting search services. The discussion
does, however, demonstrate that the Internet's technological differences
warrant a reexamination of business models based on mass communications
media.
Content Description
Catalogs list and describe items available for sale or for other purposes, such
as in the case of library catalogs. A good catalog not only describes a product
succinctly but also provides a useful classification. Once such catalogs exist
for all web resources, the efficiency of Internet searches will be greatly
enhanced.
No guidelines or agreed-upon standards exist for digital catalogs. Digital
libraries are developing digital catalog standards but these are based on
conventional methods (that is, digital library catalogs are based on non-digital
library catalogs with a simple addition about file types). The catalog industry
has been
Page 473
working on electronic catalog standards in connection with CommerceNet
since 1994 (http://www.commerce.net/work/taskforces/catalogs). Electronic
catalogs refer to electronic versions of product catalogs that producers and
retailers offer consumers for ordering. Although one goals of its task force is to
develop a framework to define products using taxonomies, the task force has
focused narrowly on the question of search interfaces and architecture.
Because of the sheer number of web resources, it is easier for content
producers to provide content descriptions when products are made than to rely
on Internet search agents visiting web pages after they are made. When
geographic data is collected, it is conventional to compile meta-data describing
the data; for all physical databases, producers compile codebooks without
which they are often useless. The same logic should apply to web resources
and all digital products.
Search Interfaces
Once adequate product descriptions exist for all digital products, they must be
presented on demand to searchers, who may use a variety of search methods or
desire to access multiple catalogs for comparison. The CommerceNet Cat-alog
Working Group is developing such an open and versatile electronic catalog
system. Although the group is developing the framework for the catalog
industry, such as virtual mail-order firms, it can be used for electronic
commerce in general.
One of the group's proposed systems utilizes smart catalogs and virtual
catalogs (Keller, 1997). Smart catalogs are product descriptions provided by
producers. Virtual catalogs are maintained by intermediaries (retailers) and
provide interfaces between consumers who seek information and producers
who offer (smart) catalogs. Under the virtual catalog system, consumers need
not interact with each producer to perform multi-vendor comparisons. Virtual
catalogs allow producers control over their own catalogs, and offer dynamic
and up-to-date catalog information. Precisely such a system is needed for
Internet searches because of the large number of content vendors, the speed at
which content changes, and the efficiency of intermediaries in maintaining
quality and measuring and billing for usage.
Page 474
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 475
-----------
payment is made for each reproduction of the original, the copyright payment
is the cost of reproduction. For this reason, variable costs for digital products
will not be zero even when the costs of duplicating a digital file may come
close to zero. As a result, the marginal cost of a digital product will vary with
copyright payment, and the efficient price of a digital product will largely be a
function of royalty payments, which account for a substantial portion of
manufacturing costs. To see how the definition of copyright affects
government policy, consider that, if a sale is made for a digital product, the
income from the sale may be treated as an ordinary sale or as a royalty
payment from a reproduction. The same income, then, will be governed by
different federal income tax laws regarding sales income or royalty income,
which are taxed at different rates.
The real impact of copyright modifications will be judged in the marketplace.
Content owners' primary concern is the loss of revenue due to unauthorized
reproductions and sales. Where revenue opportunities do not exist, copyright
enforcement is only symbolic. Similarly, if there is no incentive to reproduce
and distribute without authorization, the cost and effort expended to secure
copyrights would not be economically justified. Products can be designed with
this in mind. Many digital products can be personalized so as to make them
useless for any other person. Highly time-sensitive information soon turns
worthless, other than for archiving purposes. And finally, some products can
be delivered interactively and in a secure manner, similar to stock market data
distributed via private networks. Making products insensitive to reproduction
and resale is an alternative to the vexing problem of securing digital copyright.
In the physical world, information products are often bundled and sold on by
subscription, and that observation has convinced many that the same practice
may be adequately applied to pricing digital products. Witness the way a
newspaper is delivered: all sorts of news and information in a one-size-fits-all
package. Cable services, on the other hand, are priced as a tier instead of as a
la carte options. Bundles of this type are convenient because precise
information about consumer demand for each component or between
components is not
Page 478
required; consumers can also average out the fluctuation in product quality and
their own demand; and billing and payment are simplified. Bundling therefore
appears to be an appropriate product selection strategy for many digital
products, at least for digital information products. Consequently, some argue
that information products should be sold just as newspapers and cable services
are sold: bundled and by subscription.
Although these advantages do favor bundling, a more fundamental need for
bundling newspapers and magazines is technological in nature. In the physical
market, a payment mechanism suitable for purchasing a small portion of a
newspaper simply does not exist. Also, the consumer's cost of disposing of the
unwanted portion of the product is small. Therefore, the economic costs will
also be negligible for any waste generated by bundling. For digital products,
however, neither the disposal cost nor the delivery cost is zero. If a person
subscribes to a digital newspaper but only reads a small portion of what is
delivered, he is paying for the delivery and storage of something he does not
consume. In addition, an indiscriminate broadcasting of digital newspapers
will tax the delivery network, exacerbating congestion. Pricing digital products
need not follow models used in physical markets when, in electronic
commerce, microproducts can be produced according to demand and billed in
an efficient manner based on usage.
Another questionable assumption is that physical newspapers and online
newspapers are the same product. In fact, online newspapers may be totally
different from their paper counterparts. Online newspapers offer consumers a
different set of characteristics: interactivity, customization, search, links, and
storage and reproduction mechanisms. These characteristics, in turn, result in
different uses. An online newspaper may, for example, be linked to computer
programs that input and analyze news items for investment decisions,
automatic dissemination to colleagues, and so on. You can no longer assume
that online and paper versions are indeed the same commodity.
The simple fact that consumers pay for a basic cable service, which is not
much different from what is available for free, indicates that cable services are
different from over-the-air television. In addition to better signal quality, cable
television services offer more channels 24 hours a day and access to
specialized
Previous | Table of Contents | Next
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 479
-----------
programming. In the same way, Internet dissemination of television programs
will exhibit further differences—perhaps even more fundamental ones. For
example, cable television enables broadcasters to charge consumers directly
for programs instead of relying on advertisers (for example, paid movie
channels and pay-per-view services). Although cable operators have not fully
exploited this possibility, online programming may indeed be sold a la carte,
not by channel, but by unbundled program. Furthermore, advertising may be
separated from content and sold as a separate product. As discussed in section
11.2, "Search Service and Its Market Implications," the peculiarity of
over-the-air broadcasting necessitated inserting commercials into programs.
But remote-control devices and split screens enable viewers to switch channels
to avoid commercials. With VCR and digital television sets equipped with
filtering devices, zapping through commercials will become even easier. Faced
with a scarcely passive audience, advertising based on mass media is set for a
wholesale revision.
Once formerly linked products are sold separately, proper prices for
commercials and contents must be determined. Newspaper sellers claim that
their advertising revenue helps lower the consumer price of their newspapers.
Television networks claim that, without commercials, the quality of their
programs would suffer. However, the value of a TV program is calculated by
the advertiser's willingness to pay instead of the viewers' willingness to pay.
Costs incurred by consumers are ignored, such as the disutility of watching
commercials or flipping through advertisements as well as the waste of
resources. What, then, is a direct price of a consumer watching an ad, or a
30-minute sitcom? Economists will have ample opportunity to ponder the
prices of goods that were formerly considered public goods with no
established market prices.
Buying a bundled digital product is similar to paying a flat subscription fee.
Therefore, problems similar to those encountered with bundling exist for
flat-fee subscription schemes used to sell digital products. Just as bundling
does not account for variations in consumer tastes, charging a flat fee also
ignores differences in usage, and often results in inefficient resource
allocation. Since America Online, Inc. (http://www.aol.com) changed its fee
schedule to a flat-fee system, its network has been severely congested,
increasing consumers'
Page 480
average waiting time. One factor favoring a flat-fee system is that users often
cannot control the amount of connection time. For example, if someone sends
a lengthy e-mail or posts a long message on a UseNet newsgroup, the receiver
must pay for the connection time required to download the files, which often
turn out to be useless or unwanted. Under the new system, AOL's heavy users,
who used to pay more than the new flat fee of $19.95 a month, reap the benefit
of the new flat-fee billing system, whereas occasional users, whose payment
used to be below the flat fee, are at a disadvantage. Besides this distribution
problem, access time has increased by two to three times in the case of AOL,
causing widespread congestion. A more efficient use of the resource can be
achieved if fees reflect the actual cost of service or the usage (see Chapter 3
for more information on efficient infrastructure pricing).
Despite these inefficiencies, flat fees and subscriptions to bundled services are
widely used because sellers can simplify billing and consumers can vary their
usage without worrying about additional charges. This type of pricing strategy
often works well with standardized products such as newspapers and TV
programs. Consumers receive basically the same product, while disposing of
the product's unwanted portions. But digital products can be highly customized
based on revealed consumer information. Such differentiated products will, of
course, require differentiated or non-uniform prices. Also, consumers with
special tastes for only a small portion of the bundled product can be better
served by unbundling, where there is a portion at a smaller fee. The
subscription rate for cable television service, for example, is stagnant, around
60 percent, and is expected to remain under 70 percent. In other words, more
than 30 percent of TV households find the subscription for bundled cable
service unattractive. Offering a la carte channels is difficult due to the lack of
sophisticated switching equipment and network for cable services. Similar
difficulties, however, do not exist in electronic commerce. Thus, while
bundling will be dominant for digital products—because any single digital
document is a bundle of multimedia files—an excessive emphasis on bundling
often leads to a misleading strategy of duplicating the inefficient pricing
schemes used in physical markets.
Page 481
To summarize, many similarities are shared by two forms of information
products—digital versions (for example, online magazines) and physical
versions (for example, paper-based magazines). Such outward similarities have
encouraged many economists to conclude that pricing in electronic commerce
will resemble the pricing of newspapers, magazines, and cable services.
Although the current trend in today's electronic commerce supports such
intuition, this has more to do with the characteristics of today's sellers and
products than with the nature of digital products and the electronic
marketplace. As long as sellers see electronic commerce only as a simple
extension of their physical products, this trend may continue. However,
tomorrow's electronic commerce, with numerous microproducers and
information-based products, will certainly demand different economic models
to guide business decisions.
Today, for example, a personal investment adviser or four years of college
remain beyond the reach of many consumers who have no need for all their
services or no funds for all the courses. In the virtual world, personal service
providers will be available for multiple transactions as well as for one-time
use. The enabling factor for these services to be provided is the lowered
threshold, in terms of number and value of transactions. The fragmentation, or
unbundling, of products and services will enable need-based transactions
whereas today's investment advisers can justify only large clients because of
the need to recoup fixed costs and operating expenses. By adding unbundled
services and usage-based prices, service providers can increase sales while
serving more consumers. Similarly, college education today consists of four
years of continuous enrollment. When education is virtualized, need-based
education and training will be available for specific topics and skills.
Consumers will be able to enroll in a specific course to get a certificate of
completion. As these examples illustrate, electronic commerce is indeed a new
way of delivering products and services, which requires a more flexible pricing
scheme than the familiar flat-fee subscription.
Previous | Table of Contents | Next
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 482
-----------
Unbundling and Micropayments
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 485
-----------
in the highest possible quality? Subscription has been touted as a possible
remedy for low quality because consumers discover the level of quality based
on repeated purchases. But not all products can be sold by subscription; the
market for information will be full of microproducts sold by microsellers who
cannot use this mechanism. Bundling is also suggested as a solution, but it
may actually lower quality if most consumers use only a portion of the
product. An intermediary may be able to establish a selling procedure based on
subscription and bundling by linking numerous microsellers and micro-buyers,
as discussed in Chapter 4. But the intermediary still is not able to determine
quality and does not have sufficient incentive to investigate all products. An
enforceable contract may be the mechanism that will establish an incentive for
content producers to maintain high quality, as the following scenarios
illustrate.
Suppose Alice is a digital product reseller who brokers hundreds of individual
shareware programmers. These programmers send their products to Alice, who
lists them on her web page. The following optional purchase arrangements are
possible:
● Commission—Alice signs no contract with her suppliers and pays each
programmer only after sales are made to consumers. Under this
consignment scenario, if Alice accepts all potential shareware
programmers and if many of their products are of low quality, she will
soon lose her reputation as well as customers. She clearly needs some
type of mechanism to ensure high quality.
● Complete Contract—Alice writes a contract with each shareware
programmer that contains complete specifications regarding quality.
Under this scenario, it is still costly for Alice to examine all products,
and programmers have an incentive to cheat. This problem is magnified
if the programmer is not a long-run player. Alice still faces the problem
of losing customers. If the contract specifies only the quantity or the
term for renewal, but not the quality, programmers still have an
incentive to cheat because Alice is committed to buying the products
while the contract lasts, regardless of quality.
Page 486
● Short-Term Option Contract—Alice writes an incomplete contract that
does not specify quality, and promises to purchase only one shareware
program from each programmer. The contract stipulates that Alice will
continue to represent the programmer as long as she does not receive a
complaint from a customer. In essence, this type of contract establishes
a short-term relationship with optional future transactions. The
incompleteness is not in quality, which is difficult to define, but in
quantity, because the contract leaves future sales unknown.
An incomplete, short-term contract forces Alice's suppliers to maintain high
quality for fear of not being represented. Therefore, the contract works
similarly to reputation: the seller (a programmer) is afraid of losing customers
(Alice). Whereas reputation takes a long time to develop, however, a
short-term option contract works more quickly because the term of sale is
short-term. A subscription-based pricing scheme aims at building reputation
over a long period while the possibility of terminating subscriptions
encourages sellers to maintain quality. However, because quality can vary
during the subscription period and subscribers are often unable to make
immediate threats, this is inferior to a solution that does not require buyers any
long-term obligation. For consumers, buying a microproduct is one such
arrangement—which is similar to an incomplete short-term contract that
enables Alice to impose quality on her suppliers.
Now, suppose Bob is a customer. From his point of view, an incomplete,
short-term contract is the same as buying only what he needs from the array of
products Alice offers. Bundling would mean that Bob is committed to buying a
number of products, some of which may not be of high quality. Therefore, an
efficient contract should allow Bob an option to terminate his patronage
immediately if he is not satisfied with one product. In this way, microproducts
and associated micropayments are essential for intermediaries and consumers
to resolve the quality uncertainty in electronic commerce.
Incomplete contracts of this type occur frequently in real life. Traditionally,
the incompleteness is explained by the cost in spelling out all possibilities of a
transaction (transaction costs), or by the inability of the parties to predict or
Page 487
recognize all contingencies (bounded rationality). A third reason, recognized
recently, is that an incomplete contract may be superior to complete contracts
(strategic ambiguity) (Bernheim and Whinston, 1997). Often an incomplete
contract results in a first-best outcome when some contract variables are
non-verifiable, such as the quality of shareware in the preceding example.
Although the literature on reputation asserts that quality can be maintained
only if purchases are repeated over a long period between long-term players,
strategic ambiguity hints at the importance of strategic, dynamic, short-term
relationships. Micropayments and unbundling—and software applets—would
then produce better-quality products than do subscription and bundling for
digital products.
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 488
-----------
just happens. When a model considers technology to be determined within the
system (for example through R&D activities), it is concerned with the level of
investments—the decision to allocate fixed investments. After the amount of
investment is determined, the level of technological development is also
determined. Therefore, technology plays a secondary role, although its
importance is somehow recognized.
Information and knowledge also play an important role in the economics of
information and uncertainty. In this area of economics, information is a signal
that may improve the quality of knowledge about products, competitors, or
buyers. Better information is a signal that has better quality—one that
produces a finer partition of uncertain states of the world. The information, as
a signal, merely helps to refine the process of transactions. Information in the
sense of its everyday usage—as a commodity such as books, databases, news-
papers and other intellectual properties—is often neglected by economists.
The primary difficulty in the economic analysis of information goods stems
from an inadequate understanding of what information is and how we use it as
a commodity. The way information and technology are used defies the normal,
comfortable economic analysis in which a predictable and consistent result (a
static equilibrium) is coveted. To obtain such a stable solution, a function, be it
a cost function or a growth function, must exhibit a tendency to settle down,
like a U-shaped average cost curve or the law of diminishing returns. On the
contrary, the technological process often shows a sudden departure, or a
cumulative or exponential growth, or an increasing return, making it difficult
to predict the result of an R&D project. Another frustrating factor is that
information and intellectual activities, once created, have no limit in
reproduction; they are not a scarce resource whose allocation must be
determined by a careful weighing of different uses and needs. Furthermore,
many information goods fall under the category of public goods, whose
producers are not adequately remunerated. To better understand the economic
effects of information, future research must focus on how information is
created and consumed. Electronic commerce presents an ideal environment for
study because technology will make it possible to measure the use of
information goods and enable an adequate compensation scheme.
Page 489
Taxable Item
If you attempt to apply existing tax laws to electronic commerce, the first task
at hand is to determine which digital products are taxable under which tax
mechanisms—sales tax, income tax, royalty tax, and so on. In the U.S., most
state sales and use tax laws are based on the sale and sale price of some
tangible personal property. Use tax is levied when the property is used to
generate a service, such as when a building or a machinery is rented or leased.
Tangible personal property is defined as "personal property that can be seen,
weighed, measured, felt, or touched or that is perceptible to the senses in any
other manner" (Texas Sales and Use Tax Definition, Sec. 151.005). If you
adhere to this definition, most digital products, as well as many types of
services, are excluded.
Page 490
To extend taxation into the digital domain, some state laws specifically define
computer programs and many types of services, for example information
services, as taxable. But such ad-hoc measures become infinitely haphazard as
electronic commerce grows and a typical transaction includes a wide range of
products and services, such as software, hardware, and technical service.
Digital files, although they all look similar, may be fundamentally different
products—for example, electronic house keys, digital currency, weather
information, computer programs, concert tickets, medical advice, and so on.
Clearly, an adequate solution entails simplifying existing tax laws instead of
complicating them further by extending them and applying them on an ad-hoc
basis.
Taxes on Access
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 491
-----------
local network. Unlike long distance carriers, however, ISPs pay only per-line
fees regardless of their total usage of the infrastructure. Internet connections by
ISP subscribers occupy telephone circuits longer than do voice calls,
increasing congestion in a network built to accommodate the lower average
calling time for voice communication. The traffic generated by ISPs puts a
strain on LECs' local exchange infrastructure, necessitating more investments
to maintain a satisfactory level of service. Long-distance carriers share such
investment costs by paying per-minute charges, and so should ISPs, LECs
argue.
Complicating this picture is the growing popularity of Internet telephony, or
using the Internet for voice, fax, and videoconferencing. Begun only in 1995,
some 500,000 users have downloaded Vocaltec's software
(http://www.vocaltec.com) for Internet telephony (Migdal and Taylor, 1997).
Leading web browser vendors also have introduced client software to facilitate
talking on the Internet (see "Internet Resources" at the end of this chapter).
When national Internet access providers (see Chapter 3) offer voice and fax
services on the Internet, they become long-distance carriers. In fact, the three
long-distance carriers—AT&T, MCI, and Sprint—are the major backbone
service providers for the Internet and also offer Internet services to consumers.
If a voice call is transmitted through their Internet services, they need not pay
access charges to LECs. But when the same call goes through the telephone
network, LECs collect usage-based access charges, for example six cents out
of the ten cents a minute for a typical long distance call (Migdal and Taylor,
1997).
Whether Internet traffic benefits outweigh the harm to LECs' business is in
dispute. According to a study commissioned by the Internet Access Coalition
(http://internetaccess.org)—whose members include Internet service providers,
computer and software manufacturers, and information service
companies—revenues in 1996 from Internet traffic far outstripped the
spending required to accommodate that traffic (IAC, 1997). While revenues
are growing for LECs and ISPs, both seem to have neglected necessary
investments to counter congestion, making consumers and congestion their
pawns in the game of access.
Page 492
In February, 1997, the FCC solicited public comments regarding access
charges on ISPs (http://www.fcc.gov/isp.html). Within a few weeks, the FCC
received over 100,000 messages from the public (some of which came from
spamming sites); again, this demonstrates the power of the Internet. Due to the
huge response, the commission has extended the filing deadline, and will not
make its ruling until later. However, the FCC has maintained its position
against charges on ISPs, prompting its officials to voice the opinion that
telephone companies, which wanted access charges, should be the target of
mass e-mailing—not the FCC.
With state and local governments and competitors eyeing the Internet as a
potential revenue source and the proposed Wyden-Cox bill (see the sidebar,
"U.S. Congress and Internet Taxes" later in the chapter) trying to preempt all
Internet taxes (Taylor, 1997), this nascent industry will face further struggles
and the result will have a significant impact on the Internet's future. Unlike
airwave spectra, which are finite, cable and fiber-optic conduits and
communications equipment can be upgraded by increasing investments.
Whether increased revenues from access charges will encourage telephone
companies to invest to relieve congestion or how much fixed infrastructure
costs ISPs should share with LECs is not entirely certain. While investment
decisions and engineering solutions are being considered, usage-based prices
will efficiently allocate limited resources. The key issue is to align Internet
access prices with telephone charges in a model that recognizes the
convergence in various types of communications infra-structure.
Taxes on Transactions
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 494
-----------
taxing jurisdictions. Complicated taxing schemes give sellers an incentive to
circumvent them altogether by using offshore locations for business, which
only requires establishing a computer server and managing remotely.
The Interactive Services Association (1996), whose members include America
Online, AT&T, CompuServe, IBM, and Microsoft Corporation, prefers
destination-based taxes. Under this scenario, as in the traditional mail-order
business, out-of-state sales will not be subject to state sales tax. To simplify
tax rates for multi-state operators, ISA also advocates setting a single tax rate
for each state and basing taxes on the state to which sales are billed—thereby
avoiding thousands of different tax rates levied by local governments. Such a
system might be implemented without much difficulty if Internet commerce is
deemed subject to interstate commerce regulations of the federal government,
which is contemplating sweeping legislation addressing these issues. (See the
following sidebar.)
U.S. Congress and Internet Taxes
Politicians and legislators know what's hot and what's not. A
search at the Library of Congress using the keyword "Internet"
produced 17 bills proposed in the 105th Congress. The bills cover
a wide range of topics, including encryption technologies, the use
of consumer information, and taxes. (See Bill Summary and
Status site at http://thomas.loc.gov/bss/d105query.html.) The
following three bills regarding Internet taxation have been
submitted to Congress. H.R. 1054 and S. 442 aim to preempt
local taxes on Internet transactions, and H.R. 995 addresses the
issue of access tax.
(1) H.R.1054
● Sponsor: Rep. Christopher Cox (R-CA)
● Introduced 03/13/97
This bill's major objectives include the following:
● to amend the Communications Act of 1934
(2) S. 442
● Sponsor: Sen. Ron Wyden (D-OR)
● Introduced 03/13/97
S. 442's goals are similar to those of H.R. 1054; hence we call the
Internet tax bill the Wyden-Cox bill. It proposes the following:
● to establish a national policy against state and local
government interference with interstate commerce on the
Internet or interactive computer services
● to exercise congressional jurisdiction over interstate
commerce
● to establish a moratorium on taxes and fees that would
interfere with the free flow of commerce via the Internet
● Introduced 03/06/97
● to clarify that fees for Internet and other online services are
not subject to tax
The bottom line in all these proposals is that sales taxes will have to be
simplified among thousands of local taxing jurisdictions. How this is
accomplished will depend on the simplifying of existing tax structure. The
ISA's approach toward Internet transaction taxes is ambitious in its need to
reformulate a uniform sales tax regime. It is not clear whether such uniformity
is required for transactions taxes to be levied on digital products. Also, because
it advocates a buyer-based taxation, this will require consumers' revealing, at
the very least, their addresses, whereas a seller-based system can support
anonymous transactions. In the absence of federal preemption, the difficulty in
rewriting local tax codes will favor adoption of a seller-based tax system.
Page 496
Even more basic than the issue of how to apply sales tax is the question of
whether many transactions in electronic commerce can be considered sales of
tangible personal properties at all. As discussed previously, a digital product
has almost zero reproduction cost after the first unit is produced. However, the
variable cost of making a copy and selling it to a customer will not be zero
because the cost of such a sale includes a copyright payment, often to many
authors. Therefore, such transactions may not be considered sales that are
transfers of physical goods, but rather transfers of copyright or the right to use
a copyrighted material. In this case, royalty payments would apply as opposed
to sales taxes.
In general, royalty—that is copyright—income is treated differently from
business income. As a result, types and uses of digital products have to be
considered when assessing state and local taxes, and when income taxes are
levied (U.S. Department of Treasury, 1996). Income generated by a typical
transaction involving software products can fall under any of the following
three categories:
● Royalty income from the transfer of copyright
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 498
-----------
"weak correspondence between computer domain name and reality" by U.S. Department of Treasury officials. Often
the anonymity of the Internet makes it more attractive and increases the level of communication, albeit between
unknown parties. Flame wars are quite common in Usenet newsgroups. Dozens of messages are exchanged after
users see a message that is offensive; if that message were printed in a newspaper, the response rate would be far
less. Flames are even more common in newsgroups in which a lot of participants use anonymous identities. Even
mass e-mail advertisers use anonymous sites, perhaps to avoid receiving angry protest e-mail or spamming sites,
which generate and send multiple messages, even though common sense indicates that consumers will willfully
disregard advertisements from unreachable sites. Nevertheless, you can send and receive communications more
easily on the Internet than traditional media. Such a heightened level of activity should also help the future of
electronic commerce. But the anonymity, suitable for political free speech, is often a hindrance for commerce.
The issue of anonymous transactions has been overblown and intermingled with privacy and free-speech issues.
Anonymous transactions are possible, and sometimes needed, in physical markets. But developers of electronic
payment systems and government officials are preoccupied with anonymity in electronic transactions for fear of
behavior that can be easily corrected or dealt with by existing laws and a slew of technologies, such as money
laundering, double spending, and credit card fraud. The possibility of large-scale online fraud is as rare, or as
prevalent, as in physical markets. More mundane sorts of crimes are committed on the Internet where users,
endowed with virtual identities, commit unacceptable behaviors, from flames to outright crimes.
Lack of identity leads to numerous crimes that may not be possible in physical markets. Although Jayne Hitchcock's
experience (see the sidebar, "Anonymity and Internet Harassment") is a rare example of the abuse of anonymity on
the Internet, many possible scenarios of identity crimes exist (Schneier, 1994). For example, in an old episode of the
television sitcom Cheers, Sam plays a chess game with Robin, to whom Sam represents himself as a chess master. In
reality, Robin is playing against a computer because every
Page 499
move Robin makes is related to Sam's friend, Norm, who is hiding in an adjacent room and entering the moves on
the computer; the computer's move is then relayed secretly to Sam via earphone.
A similar but far more sophisticated fraud could be achieved on the Internet. For instance, suppose Sam claims that
he is a grand master, and challenges both Kasparov and Karpov, but neither knows about the other challenge. Sam
plays white against Kasparov and black against Karpov. Sam repeats every move Kasparov makes to Karpov, and
vice versa. In this game, Kasparov is playing against Karpov, both of whom are impressed by Sam's chess-playing
ability. This is all an innocent practical joke until economic transactions become involved.
Anonymity and Internet Harassment
As Internet usage increases, so does the Internet crime rate. Kids are sending death threats to the White
House via e-mail from school computers; a dismissed employee of a large corporation forges e-mail
messages to support her lawsuit against dismissal; and Internet deadbeats fail to pay required
registration fees for their domain names. Finally, the anonymity of the Internet has also become the
greatest tool for harassment.
The Woodside Literary Agency (WLA) posted advertisements in 1996, some 8,100 of them, in various
UseNet newsgroups soliciting manuscripts from writers. The ad stated that the WLA would accept
almost all submitted manuscripts, but asked a reading fee of $75 to $250. Although such a practice is
unusual, the scam was aimed at writers who would appreciate any possibility to be represented by an
agent and be published. A scam of this scale is not news. But when some writers began posting
warnings against the WLA, the affair became a classic example of the dangers of Internet-scale crimes
and retaliation.
Jayne Hitchcock sent her writing samples to the agency but became suspicious when the agency
requested up-front fees. After she posted warnings about the antics of the agency, the WLA began
posting numerous messages using her name:
"with her home address and phone number attached (the message read):
Female International Author, no limits to imagination and fantasies, prefers group macho/sadistic
interaction, including lovebites and indiscriminate scratches. Stop by my house. Will take your calls
day or night. . . ." (Mingo, 1997).
continues
Page 500
continued
The resulting phone calls to Hitchcock's home were just the beginning. The WLA spammed her e-mail
accounts with harassing letters; inundated various newsgroups with inflammatory messages using her
name; sent her bosses insults and resignation letters with her forged name via e-mail; and sent similar
attacks to her husband's and agent's e-mail accounts.
The WLA changed its e-mail addresses and service providers when complaints were lodged with its
Internet service providers, and continued posting its advertisements using different names for
originators. After almost a year of continued effort by a group of people, the identity of the WLA is still
a mystery. The range of fraud and other criminal activities undertaken by the WLA runs the gamut of
most problematic uses of Internet—fraud, e-mail spamming, misrepresentation, forged signatures, and
forged messages—all perpetrated through the ease and speed of the Internet. On the other hand, the
WLA's virtual identities are difficult to connect to real names and addresses. Even when a connection is
established, law enforcement agencies are often clueless as to how to prosecute them.
Similarly, credit card frauds can occur even when merchants ask for proof that only the real owner can provide.
Suppose Alice uses her credit card to buy an online book through a bogus bookstore. Alice orders a book online
unaware of the bookstore's criminal intentions. When Alice presents her credit card online, the bogus bookstore
operator simultaneously places an order to an online jewelry shop using Alice's identity. When the jewelry shop asks
for proof to verify the credit information, the bookstore operator asks Alice the same question, and provides the
answer to the jewelry shop. In this scheme, Alice is proving her identity to the jewelry shop, but the bookstore
operator gets the jewelry at Alice's expense.
Such mundane crimes of identity can be undertaken quite easily on the Internet. Instead of building an elaborate
office for scams, criminals and scam artists need only a web page, computer technologies, and virtual identities.
While governments are preoccupied with primarily hypothetical crimes, they are neglecting adequate measures to
prevent worldly crimes. A critical crime deterrent is the possibility of being identified. If the electronic marketplace
Previous | Table of Contents | Next
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 501
-----------
were to mirror physical markets, a means to establish an identity, such as
driver's licenses or Social Security numbers, would be needed. Verification
services based on digital signatures are being offered, for example, by
VeriSign (http://www.verisign.com), but there is little effort to make such
services a common practice on the Internet. The fact that a commercial
enterprise takes up such an important function is a clear indication of an
inadequacy in governments' priorities.
It is easy enough to say that electronic commerce is global. The difficulty lies
in identifying the effects of globalization on the economy—changes in income
levels, jobs, domestic prices, and so on. An interesting exercise in international
trade and finance economics is to observe how two previously closed
economies are affected by subsequent interactions in human resources,
materials, and capital. Even though the soundness of trade was proved via the
theory of comparative advantages, in which trade makes sense even when one
country has absolute advantages in all sectors, the advocates and opponents of
free trade continue to debate other issues. Specifically, does international trade
have an impact on domestic economies? And how would borderless electronic
commerce change that?
By definition, a closed economy would not be affected by the international
movements of goods and capital. The United States, for example, was
considered relatively closed until the 1970s as its trade accounted for less than
10 percent of its Gross National Product (GNP). With the share increasing to
more than 15 percent, opinions vary as to the impact of trade on the U.S.
economy.
On one side, the flux of cheap imports into the U.S. is viewed as equivalent to
a huge supply of cheap labor, which depresses low-skilled workers' income
and increases income inequality. Exporting jobs overseas further creates an
oversupply of unskilled labor and affects the laborers' income adversely. On
the other side, competition from foreign labor is greatly discounted as a factor
in the worsening of income inequality. Rather, the blame is put on domestic
policies, especially the introduction of high technology, which raises the
income level of skilled workers while nontechnical workers do not gain. The
argument is that the flight of corporations abroad for cheap labor will not have
a long-term effect because wages in those countries will eventually be driven
up. Low productivity due to the low skill level of domestic workers is cited as
the primary reason the income gap is worsening. For both sides, creating more
jobs domestically will help to narrow the income gap. However, opponents to
free trade argue that expanding job opportunities for low-skilled
Page 503
workers and perhaps encouraging more domestic investments by multinational
corporations will raise wages for low-skilled workers. Advocates of free trade,
on the other hand, argue that such policies will have no effect. Rather, the skill
level and the productivity of low-wage earners have to be raised, perhaps
through more job training and education, but not by restricting job exports by
corporations.
The growth of global information infrastructure and its commercial use cuts
through both of these arguments. Through electronic commerce, high-wage
jobs—not just low-wage jobs—are being exported, that is high-value products
are being imported. For example, software engineers in India work on projects
via satellite networks linking directly with U.S. companies. High-skilled
researchers and scientists in Eastern Europe can be linked via Internet for
research purposes. This will depress wages for high-skilled laborers and
should narrow income inequality. At the same time, education and training
will become cheaper through electronic education services on the Internet, and
technological skill and productivity in the electronic marketplace will level off
among workers because the difference between high-tech and low-tech
laborers is smaller than in physical markets. For these reasons, the income gap
is expected to narrow as electronic commerce grows.
The global nature of electronic commerce will also change how corporations
operate globally, making these corporations more mobile. Shifting
manufacturing abroad is justified when wages are sufficiently different to
account for the cost of relocation. With electronic commerce, that cost will be
smaller, enabling corporations to exploit even small differences in wages. In
essence, this will result in more open economies worldwide and a possible
convergence in income levels.
Artificial Borders
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 505
-----------
among its member states (http://www.privacy.org/pi/intl_orgs/ec/eudp.html).
Although a uniform legal environment is desirable, the threat to control
economic activities underlies the professed goal of consumer protection. When
data is transferred outside the Union,
"...the Directive includes provisions to prevent the EU rules from
being circumvented. The basic rule is that the non-EU country
receiving the data should ensure an adequate level of protection...
The advantage for non-EU countries that can provide adequate
protection is that the free flow of data from all 15 EU states will
henceforth be assured, whereas up to now each state has decided
on such questions separately" (European Commission press
release,
http://www.privacy.org/pi/intl_orgs/ec/dp_EC_press_release.txt.)
The down side to this is that when the level of protection is deemed
inadequate, the European Union will have the authority to block exports of
personal data. A resulting scenario may be the inability of U.S. corporations to
access their own sales data compiled in Europe (Baker, 1995).
These and many other issues involving access and content control can be
resolved through technology without resorting to making more rules and
regulations. For example, many filtering programs, such as Net Nanny
(http://www.netnanny.com/netnanny), allow total control over Internet
browsing as well as application-level activities based on words, phrases, sites,
and content. These programs enable parents stricter and more effective control
over their children's access than legislation ever could.
The European Union's directive on personal data illustrates the need to have a
global (not regional) perspective in securing a workable commercial
environment for electronic commerce. A uniform commercial environment for
the global information infrastructure (GII) has more to do with setting ground
rules than erecting or removing artificial barriers.
Page 506
However, a uniform commercial environment for the GII must represent
international standardization and national interests to promote economic
well-being. The question is whether a uniform law or regulation can avoid
having differential impacts on individual countries. For example, using a
closed-economy model of trade, countries leverage tariffs and income-tax
policies to manipulate economic performance. However, a uniform
import/export tax—such as no tax, making all Internet transactions
duty-free—implies an open international economy that may result in the loss
of policy control over domestic economy. Domestic industries are often
protected by high tariffs, and a country's balance-of-payment position depends
on selectively controlling exports and imports. Many countries may not accept
simple uniformity if it means relinquishing this tool.
According to the U.S. and the European Union, the principal approach to
achieving a healthy GII is to rely on the market (IITF 1996; European Council,
1994). However, a uniform commercial environment can only be achieved
through widespread international negotiation and cooperation, of which there
has been scant evidence. Several exceptions exist in the areas of copyright, key
encryption, and electronic contract standards. But, even in these areas, the
uniformity underlying these efforts is procedural rather than specific. That is,
the goal is to lay a framework within which governments can verify,
recognize, enforce, and promote international transactions.
In addition to the World Intellectual Property Organization's
(http://www.wipo.org) worldwide conference on copyright (see Chapter 5), the
Working Group on Electronic Commerce of the United Nations Commission
on International Trade Law (UNCITRAL)
(http://www.un.or.at/uncitral/mainindx.htm) published its Model Law on
Electronic Commerce (excerpt available at
http://www.un.or.at/uncitral/texts/electcom/english/ml-ec.htm), which
establishes a uniform framework to establish the legal validity of electronic
documents in commerce. The Model Law, adopted in 1996, sets standards for
electronic equivalents to paper-based terms such as writing, signature, and
original. Although UNCITRAL has been working on international standards
for physical goods trading for more than three decades, such
Page 507
international bodies will need to take on an increasingly important role, and
also will need to be taken more seriously, in global electronic commerce.
Another prime area of international policy interest is cryptography. As
mentioned earlier, policies regarding encryption technologies are first and
foremost affected by national security interests. Imagine, then, the Internet
filled with private conversations, encoded with unbreakable encryption.
Besides crimes and conspiracies that might be discussed, the normal process of
information gathering by governments would be severely limited.
One method of managing encryption technology requires all keys to be
archived or escrowed with a trusted third party. The archived keys would be
used to break or recover encrypted messages. Managing such a key escrow
system involves a certification authority that issues the keys, a trusted third
party to archive such keys, and an infrastructure to provide the necessary
confidentiality and accountability when governments want to access these keys
on legitimate grounds. At present, the widespread use of encryption
technologies is discouraged by the lack of technology to integrate encryption
into applications, rather than by any impediments imposed by policy
(Denning, 1997).
A global key escrow system is proposed mainly to balance law enforcement
and national security concerns with the need to facilitate private
communications and transactions on a global scale. Nevertheless, the OECD
(http://www.oecd.org) adopted in March 1997 its Guidelines for Cryptography
Policy without specifically endorsing such an international key escrow system.
No matter what systems are supported in the market, however, continued
international cooperation is imperative to achieve an interoperable encryption
system because digital signatures, public keys, and encrypted digital currency
are essential in providing identity, confidentiality, nonrepudiation, and other
basic commercial requirements in the GII.
The global nature of the Internet is clearly one of its strengths, but a
predictable international legal and commercial environment is lacking. Recent
agreements negotiated by the World Trade Organization (http://www.wto.org)
lay a solid foundation for global electronic commerce (see the sidebar, "WTO
Page 508
Agreements"). The urgency to establish an international framework will grow
as digital products become the commodity of the GII, which today remains
largely a communications medium. While governments have some credible
needs to control free exchanges of ideas—whether they be sociocultural or
political reasons—restricting commercial transactions on the GII will have
severe economic consequences.
WTO Agreements
Two recent agreements sponsored by the World Trade
Organization have set up a global market in telecommunications,
computers, and software—helping to remove tariffs and increase
worldwide competition among high-technology firms.
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 509
-----------
Table 11.1World Trade Figures
Revenues in Share of Millions (U.S. Dollars) Percentage of Share
United States 178,758.0 29.70
EC (European Community) 170,166.0 28.27
Japan 93,855.0 15.59
Australia 11,403.0 1.89
Canada 10,689.0 1.78
Switzerland 8,889.0 1.48
Korea 8,728.0 1.45
Brazil 8,622.0 1.43
Mexico 6,509.0 1.08
Argentina 6,009.1 1.00
(2) The Information Technology Agreement
WTO's Information Technology Agreement aims at reducing customs duties on computer and
telecommunications products beginning July 1, 1997, and eliminating them altogether by the year
2000. This agreement will also affect the $600 billion market that includes computers, software,
telecommunication products, and semiconductors.
continues
Page 510
continued
4. Semiconductor manufacturing equipment (including a wide variety of equipment and
testing apparatus used to produce semiconductors, such as vapor deposition apparatus, spin
dryers, etching and stripping apparatus, laser cutters, sawing and dicing machines,
deposition machines, spinners, encapsulation machines, furnaces and heaters, ion
implanters, microscopes, handling and transport apparatus, measuring and checking
instruments, and parts and accessories)
5. Software (contained in diskettes, magnetic tapes, CD-ROMs, and so on)
6. Scientific instruments (including measuring and checking devices, chromatographs,
spectrometers, optical radiation devices, and electrophoresis equipment)
Additionally, other main products of interest covered by the ITA include word processors,
calculators, cash registers, ATM machines, certain static converters, indicator panels, capacitors,
resistors, printed circuits, certain electronic switches, certain connection devices, certain electric
conductors, fiber-optic cables, certain photocopiers, computer network equipment (LAN and
WAN equipment), flat panel displays, plotters, and multimedia upgrade kits. The ITA does not
cover consumer electronic goods.
Economies of scale refer to gains or losses in production cost that occur as output is increased. Typically,
production costs first decrease because fixed costs such as buildings and management expenses are shared.
They then increase as inefficiencies kick in when the output level goes beyond the optimal level. For example,
suppose a firm has ten permanent employees who can each produce ten widgets a day given the layout of the
factory, materials, and so on. The salaries and other costs, such as office rent, must be paid whether the firm
produces anything at all. The per-unit cost of the first widget produced is the sum of all these costs, which
decreases until 100 units are produced a day. For the 101st unit, one employee may have to work overtime, the
firm may have to pay special delivery charges to its material suppliers, or a new machine may need to be
purchased. The average cost of a widget increases rapidly beyond the optimal level of production.
Page 512
A simple case of decreasing average cost occurs when there is a high fixed cost but no (or constant) variable
cost. Because the fixed cost is shared by more and more output, the average cost will decrease forever. It is
commonly asserted that computer software costs nothing or little to duplicate. Development costs account for
the majority of the software's production cost. Consequently, the average cost of a computer program will drop
as more copies are sold. Similarly, most digital products appear to have economies of scale.
When a product has a decreasing average cost or an increasing economy of scale, the market often fails to
achieve an efficient solution. Competition implies duplicated fixed costs, and no firm could recoup its fixed
costs unless the market price equals the average cost. Without such guarantee, no firms will produce the
product. Does this imply that all digital products should be regulated as natural monopolists?
Digital products may not have economies of scale for two reasons. First, computer software, and most digital
products for that matter, may not have decreasing average costs. Although duplicating costs may indeed be
relatively small compared to initial development costs, duplication costs are not the only variable costs for
most products. Many physical products have low variable costs—for example, cereals, sneakers, and so
on—but they do not have decreasing average costs, because variable costs (such as administrative, marketing,
and distribution costs) increase at a faster rate as the number of sales increase (Liebowith and Margolis, 1995).
For this reason, many digital products will have U-shaped average costs (see Chapter 8 for more detail about
costs). Furthermore, for each copy of software or information sold, other substantial costs may exist, for
instance, copyright payments and copyright enforcement costs, customer support expenses, and management
and accounting costs. As a result, whether digital products exhibit decreasing average costs remains an
empirical question.
Second, economy of scale is not as relevant when products are not homogeneous. The economy of scale
simply indicates that having one producer is more efficient if you consider all varieties as essentially the same.
For
Previous | Table of Contents | Next
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 513
-----------
differentiated products catering to different segments of consumers, multiple
products are desired. These products may be produced by one producer.
However, the costs associated with differentiation and customization may
indicate a lack of scale economies. For application software such as word
processing and spreadsheet programs, differentiation is desirable. Any
artificial means to standardize such programs will be contrary to competition
and consumer satisfaction. Again, economy of scale will not be the primary
concern.
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 517
-----------
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 521
-----------
Therefore, widgets are overproduced—an inefficient resource allocation—if
you do not consider its externality (negative in this case).
Again, suppose that a home-builder considers how many trees to plant.
Suppose that the market value of each home increases by $3,000 if it has trees.
At $100 per tree, the home-builder plants 30 trees. However, neighbors may
benefit from the trees' shade and the neighborhood's increased home values;
say these benefits are worth $500. Therefore, an optimal number of trees is 35
instead of 30 if the home-builder considers the externality of planting trees
(positive in this case). Instead, trees are underproduced because the
home-builder has no means of charging his neighbors the added cost of $500.
Because externalities bring about these inefficiencies, you need to counter
externalities. For some externalities, the solution is to define property rights
more clearly. If the cost of pollution is clearly defined, the widget factory may
be required to pay $10 for each unit produced. If the home-builder can
appropriate the benefit of tree planting, or be compensated for the cost, he will
plant an optimal number of trees. If computer software has positive network
externality (a benefit to its users), the program will be underproduced unless
the producer can appropriate such benefit in terms of revenue. The economic
concern stems from such solutions often being impossible through market
processes.
On the other hand, if a market price already reflects the price of an external
benefit or loss, no externality problem exists. For example, a computer OS
may have a positive externality in that its value increases as more people use
the same product. This can be represented by an upward sloping benefit
schedule for consumers (see fig. 11.3), indicating that the average consumers'
willingness to pay (WTP) increases with more users. Given the firm's marginal
cost schedule, an optimal number of product is Q1, with the price of P1, if the
firm can charge consumers for the benefit from network externality. If not, the
output is reduced to Q2, with a lower price of P2, that corresponds to the
willingness to pay without network externality. At P2, the marginal cost is
below the true consumers' willingness to pay, indicating that the product is
underproduced.
Page 522
After you become clear about network externalities, you must distinguish
simple network effects from network externalities. If market prices fully
reflect the cost and benefit associated with an externality, no economic
concern exists. For example, if market prices efficiently determine the level of
air pollution or the number of trees planted, what we call externalities are no
longer externalities. Still, market size has some sort of effect, and such effects
are often called network effects to indicate that these effects do not result in
market inefficiencies.
If the price of OS software or an application program is raised to extract most
or all of the benefit associated with network externalities, the market needs no
intervention. Similarly, the dominant position of such a product, or its
desirability, should not be explained by network externalities. Instead, what
appears to be the result of network externality may be due to economies of
scale (Liebowitz and Margolis, 1995) or anticompetitive behaviors. When
comparing prices in the computer hardware market, the OS market, and the
applications software market, many perceive that network externalities are also
Page 523
behind the dominance of a player in all these markets. Simply put, prices for a
PC drop as more people use the Windows OS. In addition, Windows has more
application programs because more people use Windows, and so on. The
market is invariably dominated by a vertically integrated firm or a multi-firm
regime, such as the Windows-Intel platform. These arguments indiscriminately
apply network effects to different industries. That is, network externalities
between different products (often termed as indirect network externalities) are
mostly network effects, not externalities (Liebowitz and Margolis, 1995).
These network effects across different products are hardly distinguished from
anti-competitive behaviors that impose artificial connections such as tie-ins, or
exclude downstream competitors from accessing upstream products that one
monopolizes.
Anticompetitive Behaviors
A dominant firm should not use its position in one market to influence other
markets. For example, application programs need to interoperate with OS
software, which may be dominated by one firm. Through anticompetitive
behaviors, the dominating firm may extend its market power into the
application software market. While governments cannot prevent the firm from
entering related markets, this case may fall into the category of illegal tie-ins
prohibited by antitrust laws. Often, such tie-ins are practiced as bundling of
vertically related products. For example, Microsoft as a dominant firm in OSs
tries to dominate the web browser market as well. If Microsoft uses its market
power in OS to advance its interest in the web browser market, the company
certainly appears to be a monopoly. However, enforcement efforts are often
discouraged due to the need for interoperability, standardization, and network
externality, which compound understanding of what constitutes anti-
competitive behaviors in digital product markets. This section, provides an
example of how interrelated digital markets may be analyzed to understand
firms' behaviors in these markets.
Microsoft sells many application software products, including web browsers in
addition to OS programs. By bundling this software with Windows OS,
Page 524
and using various means to make it difficult for consumers to use
non-Microsoft applications, Microsoft tries to extend its monopoly market
power of one market (OS software) into the applications market.
It is often argued that the scale economy in computer software, rather than
monopolization, explains the bundling and the dominance of Microsoft. That
will depend on the extent of the economy of scale in that product market, but is
highly unlikely as was previously argued. Alternatively, some argue that a
need for standardization and interoperability works to favor integrated
software, such as Microsoft's bundles, which are also integrated with the
Windows OS. But as argued earlier, there is no apparent reason why the need
for standardization or interoperability between an OS and an application
program should give one firm substantial advantages over others. In other
words, Microsoft Word and WordPefect have equal opportunities in the
market for word-processing programs, just as different VCR manufacturers
have. If one program enjoys network externalities, its price must be higher
than the other to reflect its true value. If one is more convenient with the
Windows OS, it may indicate a lack of true interoperability and
standardization. A monopolist in the OS market must provide all application
software vendors equal access to its standards and specifications necessary to
run any application on its OS. The monopolist is what is known as the
common carrier.
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 525
-----------
commission. But Alice must also offer Charlie the same opportunity to pay a
higher price before discontinuing his magazine. Bob may issue many versions
of his magazine to fill up Alice's stand, but Alice must sell Charlie's unless she
can prove that all Bob magazines are more popular than Charlie's—or Bob
pays more money to carry his magazines.
The seemingly unreasonable restrictions on Alice and favors for Charlie stem
from the city's inability to accommodate more magazine stands. When
resources are limited, an equal and reasonable access by all publishers to the
distribution medium becomes important. Besides First Amendment and
free-speech issues, Bob's magazines may not be produced efficiently if the
market process is interfered—for example, some consumers will never know
the value of Charlie's magazine. Those who control limited distribution
conduits are called common carriers. For example, local telephone networks
are common carriers to long-distance companies because they cannot provide
long-distance services without access to the local exchange monopoly.
Because of limited resources and often large investments needed to build and
maintain common carrier services, common carriers are often regulated as
natural monopolists. When regulations are abandoned, however, the market
may produce inefficiencies. For example, suppose Alice decides to publish her
own magazines (or merge with Charlie). If her magazine stand is no longer
regulated as a common carrier, she has an incentive to sell only her magazines.
Other publishers will have no distribution outlets. As long as Alice has the
only magazine stand, therefore, other publishers must be guaranteed
reasonable access to her stand.
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 528
-----------
1997). Although today's TSIN is limited to wholesalers, electronic commerce
will provide a crucial framework for further efforts to include consumer
retailing in electricity as well as in natural gas.
Just as retail wheeling was unimaginable only a few years ago in regulated
utility markets, the infrastructure convergence is opening an era of competition
in numerous monopolistic markets with new types of firms. These include
more specialized firms, a result of disaggregating formerly vertically
integrated firms. On the other hand, regional monopolists are becoming
national competitors through horizontal mergers (for example, SWB and
Pacific Telesis; Nynex and Bell Atlantic) and through integration across
different markets (for example, AT&T's entering regional Bell's markets and
vice versa). In this shuffle, there is a danger of forgetting why society opted for
disintegration and deregulation: to increase competition, lower prices, and
raise economic efficiencies. To avoid a mishap, economic implications of
these changes in market structure must be better understood. For example, if
disintegration and retail wheeling make sense in the utility industry, why is it
different to break up software companies into OS and application software
units? If local exchange networks are common carriers, why would OS
vendors not be treated the same way? Are network externality and
interoperability the same forces that facilitate natural monopoly market
structure in the communications and utility industries? And, should these
forces be discarded as they are in the latter? This section answers some of
these questions; others await more in-depth analyses.
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 532
-----------
network, in which the economies of scale and regulatory efficiencies are of
primary concern. The telephone industry is not only being deregulated but also
faces competition from nontelephone infrastructure, which can carry all types
of digital traffic. Future commercial potential and profitability determine
investment decisions, and competition will be the driving force in achieving
economic efficiency. The focus of economic analysis should also make a
transition from regulatory economics to one of multiple infrastructure
competition and related problems in resource allocation.
For example, the decision to exempt Internet service providers from paying
access charges, despite their use of facilities owned by telephone companies,
has a profound impact on the level of investment in the telephone network—or
so it is claimed by telephone companies that will not invest if their fixed costs
in cable and exchange equipment cannot be recovered. Such investment
behavior is consistent with that of natural monopolists, and is the reason
regulatory agencies allow a certain rate of return for these monopolists.
However, in a competitive market environment, a telephone company will
charge for its service based on marginal cost, not average cost, and access
charges calculated to recoup fixed costs will be excess profits that cannot be
expected. Whether access charges on ISPs are justified is an empirical
question. The point here is that the information infrastructure needs to be
analyzed not in the context of regulated natural monopolies—for example
focusing on ways to recover fixed or stranded costs through market
competition—but rather in terms of the market where various types of
networks are converging to compete. Congestion-free pricing and competition
may find new uses for stranded investments. The economics of information
infrastructure goes beyond a simple extension of telecommunications
economics. What its focus and emphasis should be is left as a future area of
research.
Page 533
11.11. Summary
This chapter presented some pressing issues in electronic commerce. Many of
the issues discussed require applying a new perspective that commerce on the
Internet represents a new type of market. Instead of treating commerce on the
Internet as an extension of existing commerce or as an alternative distribution
channel, the electronic marketplace should be perceived as a market in which
players, products, and processes all undergo fundamental changes. Product
differentiation, searches, copyrights, consumer privacy, micropayments, and
other issues arise in physical markets as well. But because these factors take on
different dimensions when players and products are virtual and market
processes are networked and aided by computers, they can only be clearly
understood if you put them in the larger context of electronic commerce as a
market.
Page 534
References
Ang, P.H. and B. Nadarajan, 1996. "Censorship and the Internet: A Singapore
Perspective." Communications of the ACM, 39(6) pp.72_78.
Baker, J.B., 1996. "Horizontal Price-Fixing in Cyberspace." Presented at The
1996 Antitrust Conference: Antitrust Issues in Today's Economy. Available at
http://www.ftc.gov/speeches/other/confbd4.htm.
Baker, S., 1995. "The Net Escape Censorship? Ha!" Wired, issue 3.09
(September, 1995). Available online at
http://www.hotwired.com/wired/3.09/departments/baker.if.html.
Internet Access Coalition, 1997. The Effect of Internet Use on the Nation's
Telephone Network. Summary available at http://internetaccess.org/study.htm.
Page 535
Interactive Services Association (ISA), 1996. Logging on to Cyberspace Tax
Policy White Paper. Available at
http://www.isa.net/about/releases/taxwhpap.html.
Keller, A.M., 1997. "Smart Catalogs and Virtual Catalogs." In R. Kalakota and
A.B. Whinston, eds., Readings in Electronic Commerce, Chapter 11, pp.
259_271. Reading, Mass.: Addison-Wesley.
Liebowitz, S.J. and S. E. Margolis, 1995. "Are Network Externalities a New
Source of Market Failure?" Research in Law and Economics, 17:1_22.
Lemley, M.A., 1996. "Antitrust and the Internet: Standardization Problem."
Connecticut Law Review, 28(4): 1041_1094.
Migdal, J., and M. Taylor, 1997. "Thief or Benefactor?" Telephony, January
27, 1997, pp. 46_52.
Mingo, J., 1997. "Nowhere to Hide." Los Angeles Times, Feb. 10, 1997.
Radosevich, L., 1997. "Wired." WebMaster, February, 1997, pp. 26_31.
Schneier, B., 1994. Applied Cryptography: Protocols, Algorithms, and Source
Code in C. New York: John Wiley & Sons.
Sibley, D.S., and D.L. Weisman, 1997. "Raising Rivals' Costs: The Entry of an
Upstream Monopolist into Downstream Markets." Mimeo. Send
correspondence to [email protected].
Taylor, J.A., 1997. "Federal Lawmakers Plan Bill to Ban New Internet Taxes."
Investor's Business Daily, Section A9, January 29, 1997.
U.S. Department of Treasury, 1996. "Selected Tax Policy Implications of
Global Electronic Commerce." Available at
ftp://ftp.fedworld.gov/pub/tel/internet.txt.
Page 536
Internet Telephony
Voice on the Internet is based on the audio standard H.323 and other
multimedia conferencing standards adopted by the International
Telecommunications Union (http://www.itu.ch). See the ITU Standards site
provided by the International Multimedia Teleconferencing Consortium, Inc.,
at http://www.imtc.org/i/standard/i_itustd.htm.
● Vocaltec at http://www.vocaltec.com
Both large and small companies have entered Internet telephony. See the
following sites for examples:
● Netscape Conference from Netscape at
http://www.netscape.com/comprod/products/communicator/
● NetMeeting from Microsoft at http://www.microsoft.com/netmeeting/
● GXC at http://www.gxc.com
● Delta Three at http://www.deltathree.com
● Net2Phone from IDT at http://www.net2phone.com
For news and commentaries regarding Internet telephony, see Pulver.com's
web site at http://www.pulver.com or VON (Voice on the Net) at
http://www.von.com.
Previous | Table of Contents | Next
Products | Contact Us | About Us | Privacy | Ad Info | Home
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 538
-----------
Previous | Table of Contents | Next
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 539
-----------
CHAPTER 12
If it's not there and you can see it, it's virtual.
As discussed later in this chapter, the virtual world is as real as the physical
world, because the former is rooted in the latter. Technologies enable us to
interact with seemingly unreal persons and products online—the process called
the "virtual" process. After first examining various views on the future
economy, this section characterizes the virtual economy by focusing attention
on three aspects of the new economy: virtual products, innovations in virtual
processes, and the convergence in products, markets, and infrastructure. The
following sections provide a frontier map of the new economy to help develop
long-term business strategies as well as a meaningful research agenda.
As hindsight shows, the future is not easy to forecast, even for those experts
who are in the midst of changing technology and market process:
● 1859: "Drill for oil? You mean drill into the ground to try and find oil?
You're crazy!" Drillers whom Edwin L. Drake tried to enlist in his
project to drill for oil.
● 1876: "This `telephone' has too many shortcomings to be seriously
considered as a means of communication. The device is inherently of no
value to us." Western Union internal memo.
Page 541
● 1920s: "The wireless music box has no imaginable commercial value.
Who would pay for a message sent to nobody in particular?" David
Sarnoff's associates in response to his urgings for investment in the
radio.
● 1943: "I think there is a world market for maybe five computers."
Thomas Watson, chairman of IBM.
● 1949: "Computers in the future may weigh no more than 1.5 tons."
Popular Mechanics, forecasting the relentless march of science.
● 1968: "But what… is it good for?" Engineer at the Advanced
Computing Systems Division of IBM, commenting on the microchip.
● 1977: "There is no reason anyone would want a computer in their
home." A top executive of Digital Equipment Corp. (Selected quotes
from the "Internet Grapevine: Wet Blankets Throughout History.")
● 1996: "The Internet is the CB radio of the 1990s." An Internet skeptic.
In this book's middle-of-the-road view, we neither believe that the Internet is
only a fad nor that it will obliterate physical products and markets. The goal in
this chapter is to construct a logical picture of the future economy based on
how technological developments will be used for organizational and process
innovations. Like any map describing a frontier, scales and distances may turn
out to be incorrect. Nevertheless, a fairly adequate outline can be drawn
because the new economy is no longer an unknown territory. On the contrary,
signposts abound that point in all directions. Going off in these directions
could lead us to some interesting places, or we could end up in a desert. To
avoid such a calamity, this book will not predict what the killer application
will be in 20 years or even which technology will nail the market next. Rather,
the focus will be on market processes and the direction they will lead us into
the next century.
Many terms are used to characterize the new economy being fashioned by the
growing Information Superhighway:
Page 542
● An information economy, because information is the new commodity
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 543
-----------
12.1. The Role of Enabling Technologies
Computers and related technological developments have become the hallmarks
of a fast-growing, global economy in the midst of large-scale privatization,
free trade, and cooperation among nations. In discussions about the world
economy in the next 20 years, optimism is most apparent when talk focuses on
the global information infrastructure and electronic commerce. Electronic
commerce illustrates how technology will affect all aspects of economic life
by combining computer technology, telecommunications, and market
transactions into a seamless socioeconomic system. Not surprisingly, the
future is often defined by various applications of computer-related high
technologies.
These technologies and related industries are part of an integrated system just
as automobiles and highways represented an economic system of the 20th
century. To use the popular analogy, the Information Superhighway is the
interstate highway; its contents are automobiles and their cargoes; the Internet
service providers are the access roads; and transmission protocols are the
traffic laws. Traffic congestion can occur on both interstate highways and
Information Superhighways and can be alleviated by expanding highway lanes
or using cables with larger capacity. Faulty planning and investments may fail
to reduce congestion in access ramps to highways and in the last-mile access to
the Information Superhighway. Tolls may be imposed on cars and more easily
on messages moving on information highways.
This highway analogy is relevant and helpful in understanding what the
Information Superhighway signifies and how it operates. Just as the
automobile sector dominates today's economic activities with its associated
industries of automobile manufacturers, new and used car dealers, parts
suppliers and repair shops, motel and travel services, oil companies and gas
stations, insurance services, and roads and highway maintenance and
administration, the new economy will revolve around the many industries
operating on the Information Superhighway—computer hardware, software,
the communications industry (including telephone, cable, satellite, and
wireless), and various
Page 544
content providers such as publishing, database, entertainment, and news
organizations. In many ways, this new industrial sector—the interactive
multimedia industry (Tapscott, 1996)—can be considered to be the
automobile-related industry of the 21st century.
However, the highway analogy often fails to convey the importance of the
infrastructure in the broader economic context. Just as today's economy adds
up to more than an economy characterized by automobiles and the interstate
highway system, the virtual economy supported by computers and the
telecommunications industry is more than the sum of these industries.
For example, automobiles and highways triggered substantial changes in the
urban landscape and social organization. We need only think of malls and
suburban sleeper-towns, mobile single families, commuter traffic, and empty
or declining inner cities. Similarly, the Information Superhighway will enable
people to telecommute. This may reduce commuter traffic but may also
encourage urban sprawl or the migration toward sun-belt and pollution-free
rural states. In terms of business and market organization, structural changes
will transform marketing methods into a close cooperation between producers
and buyers, who can dictate what they want in a product and rapidly respond
to changes in prices and product quality. Competitive strategies will see
wholesale changes as market participants interact with each other in a
technologically sophisticated and equitable environment. Accordingly,
taxation must be revised to reflect ubiquitous online transactions, and
government regulation must change to keep pace.
Granted, automobiles and highways play an important role in today's economy
in terms of gross national product (GNP) and resource allocation. Still, the
economy created and supported by these industries is more than an
"automobile economy" or a "highway economy." Similarly, components of the
interactive multimedia industry, however important, are simply tools by which
products are produced and consumed and through which virtual players
interact.
Still, it is of great interest to identify what technologies will become dominant
in the future. Products will look different, depending on what software and
encryption technologies are adopted; response time and prices will be
Page 545
affected by whether cable or satellite is used for delivery infrastructure; and
market processes will change if push or pull technology is favored or if PCs or
network computers with applets dominate the future computing platform. How
will the market choose any one product over all the others?
The selection of a particular technology will depend on which market process
is favored by users. For example, the push model of Internet advertising gives
sellers control over marketing, but assumes consumers are passive—and too
lazy to participate. The pull model, on the other hand, recognizes the incentive
of consumers to actively participate in the market process and to reveal their
preferences. For push models to succeed, virtual sellers need to restrict buyers'
active participation, perhaps by promoting technologies that disable such
features. However, sellers often ignore the extent to which virtual buyers are
willing to participate in the market as well as the fact that available
technologies can turn such willingness into action. Thus, to predict which
enabling technology will be favored, consideration must be given to the
objectives of virtual players and what market process will best support those
objectives. The so-called web broadcasting and the new generation of push
technologies are in fact variants of the pull model, because they enable
consumers to select contents. Whether any given delivery scheme is called a
pull or push model, its distinguishing feature lies in the way it interacts with
recipients. In other words, the players and processes determine which of the
enabling technologies will be most useful, not vice versa.
Some of today's nascent technologies are bound to be standards by the year
2015. Important features that will shape the future include computer
processing, storage, communication, and presentation.
● Computer Processing: Computer processing power will continue to
experience exponential growth, doubling in some 18 months. Personal
computers with gigahertz clock speed will offer consumers the
processing power to receive, select, and present daily news, e-mails, and
various information available on the net. The human brain performs
between 10 trillion and 1,000 trillion operations per second. By 2015,
desktop computers will reach the low echelon of this human-like
computational performance. With such computing power, a networked
intelligence,
Previous | Table of Contents | Next
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 546
----------- and access to the depository of human knowledge, a computer will
behave like an expert who assists in decision-making based on facts and
knowledge.
● Storage: Read-and-write DVDs (formerly known as digital video discs)
will become standard storage devices for digital documents, each disc
holding over 10 gigabytes of data. These discs will replace CDs and
video tapes when audio equipment, video players, digital HDTV, and
computers are all linked together. For larger file storage and backups,
magnetic tapes or hard drives will continue to hold an edge over optical
disks, but files will be stored in central servers. Users will store their
files on these servers and download when necessary. Original files on
the server will be closely linked by icons and aliases to their copies on a
personal computer or display device. Data integrity will be maintained
through automatic updating without the chore of uploading or
downloading.
● Communication: After a transitional popularity of ISDN networks, the
last mile will demand more bandwidth and faster connection (see
Chapter 3, "Internet Infrastructure and Pricing"). While optical fiber
networks will make bandwidth a plentiful resource in the backbone,
congestion in access ramps to the information infrastructure will call for
efficient mechanisms for resource allocation. However, new products
sent over fiber optic networks will be still larger and more complicated.
As a result, bandwidth management will be important, but the challenge
will be to devise products that take advantage of bandwidth rather than
saving on bandwidth. Along with fiber optic cable networks,
high-frequency non-cable networks using microwave and satellite
communications will carry digital signals. There will no longer be
differences between local switching telephone networks, mobile phone
networks, long distance carriers, digital data services, and the Internet.
All digital communications will become interchangeable and
interoperable.
● Presentation: Presentation (display) devices will be integrated: it will be
possible to move digital HDTV sets, computer monitors, security
Page 547
monitors, video phones, and various appliances' control screens
wherever desired. Video, audio, data, and multimedia contents—today's
video tapes, music CDs, multimedia CDs, and computer floppy
disks—will be played by using one standard player. World Wide Web
pages will present sophisticated visual simulations of web materials,
instead of two-dimensional versions, using virtual reality languages.
Virtual reality markup languages (VRMLs) will complete the progress
toward a rich and real-life presentation that started with the launching of
the World Wide Web 20 years ago.
These enabling technologies of the 21st century will support the activities of
virtual businesses, governments, and consumer groups in their sales, research,
recreation, and other activities. The goal of this chapter is to describe resulting
changes in the economic and social sphere of the virtual economy, but it
begins by describing the players and other components of this virtual
economy, without which the enabling technologies have no value.
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 550
-----------
To complete the correspondence between our physical world and the future
virtual world, digital identities will be created around persons instead of
around computers. Today, computers and servers are online personalities of
the Internet, with humans attached to them. For example, a typical e-mail
address is written as [email protected]. Either the person's name or the
server computer address can change. This e-mail address is similar to a postal
address, in which building addresses are more or less fixed, while people move
around. Each person, however, is distinguished by some distinct and
permanent identification, such as a social security or driver's license number.
A similar identification can be given to individuals to establish online identity.
In the physical world, a message cannot be delivered to a social security
number. The difficulty is not in finding a way to deliver mail using social
security numbers but in maintaining a database that links building addresses
with social security numbers. In the virtual world, an elaborate and up-to-date
name server will forward messages to appropriate online persons, no matter
where they are. Likewise, businesses and other economic entities can establish
online identities. This does not preclude people from using online equivalents
of post office boxes or aliases if they choose to do so, but a permanent identity
is essential for verification purposes.
Both governments and private entities will provide these permanent identities,
just as identification cards are issued by governments, schools, and companies.
Multiple identification cards will all point to the same person, which can be
verified legally. Just as it is unlawful to assume multiple identities in legal and
commercial transactions, multiple virtual identities must be prohibited in
virtual transactions as well. As an extension to the physical identity, virtual
identities will be based on legal, permanent, and verifiable identities. Legality
need not be based on governments alone, however. Private certification
authorities will also run a centralized registering system to provide varying
levels of identity classes for different purposes. For the very reason aliases are
accepted (for example, for authors), multiple virtual identities will also be
useful.
Page 551
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 554
----------- sometimes called multimedia convergence. When a product exists in
both digital and physical forms, the convergence may make one form
obsolete. Whether a particular physical or digital form survives will
depend on its usefulness in consumption. For example, computer
catalogs in libraries have almost eliminated catalog index files. The
former has undoubted superiority over the latter in terms of
convenience, search capability, and save and print features. The same
convenience factor may favor printed books over digital books,
however, especially for books that should be read from cover to cover.
For reference books, digital versions are decidedly superior in terms of
consumption.
● Process convergence. One virtual process may be used for different
purposes that used to be carried out by different processes. For example,
a producer may solicit inputs from consumers regarding a feature of its
product. That consumer-revealed information is then used for
production (customization) as well as for marketing, sales, and
negotiations with consumers regarding terms of payment. As a result,
production, marketing, sales, consumption, and customer after-sale
service are all converging into a seamless, integrated process of the
virtual economy. The market-value chain can no longer be divided into
stages and steps, and must not only be continuous but also concurrent.
Such convergence cannot be expected with the broadcast mass media,
which is why electronic commerce is more than an alternative marketing
channel.
● Infrastructure convergence. Various types of communications
infrastructure are converging as well. Infrastructure convergence is
made possible by digitization of products and other technologies that
support the transfer of digital signals. This convergence has made
competitors out of telephone companies, cable operators, and
microwave and satellite operators, which individually used to enjoy a
natural monopoly status. For example, digital telephony on the Internet
takes business from long distance carriers and access charges from
local-loop providers. Satellite systems pose significant competition to
Internet carriers and
Page 555
telephone operators by beaming signals directly to PCs and telephones,
as they did with cable television programming. In these converging
markets, the need for uniform fees and taxes is already highlighted by
the struggle between local exchange carriers and Internet service
providers. Beyond a common tariff structure, the convergence will
demand new approaches in government regulation, competitive
strategies, product development, transaction processes, and economic
research and analysis.
● Market space convergence. Finally, globalization implies a spatial
convergence of markets. A classic example of a monopoly is a
geographically isolated firm—for example, the only gas station in an
isolated town. In the virtual economy, there is no monopoly market
power due to geographical isolation unless artificial borders are erected.
Neither will there be the need to have franchise stores all over the virtual
marketplace. One principle of franchising is to guarantee a monopoly
market for each franchiser by not allowing two franchisers to locate next
to each other. With only one market, there is no need for franchising,
although mirroring—the practice of providing identical materials on
different servers to lower the congestion problem—may eventually be
considered to be a form of franchising.
Convergence brings about new opportunities as well as uncertainties. As
products are digitized, they acquire new characteristics that increase their
appeal. For example, a CD-ROM version of an encyclopedia provides search
and link capabilities far exceeding the cross-indexing features provided by
book versions. New products mean new uses, new customers, and new ways of
doing business. Many focus on the opportunity to expand their business, but
the novelty also creates uncertainty.
For example, as the telecommunications infrastructure converges, traditional
boundaries among telephone companies, cable operators, and satellite
operators become unclear. These companies are experimenting in such areas as
video-on-demand services, interactive television, cable modems, online
shopping, and video dial tone to gauge consumer response and future
profitability in their widening playing field. Not knowing consumer demand
and
Page 556
competitors' strategies, however, they are hesitant to plunge into the unknown.
On the other hand, Bill Gates of Microsoft, Craig McCaw (who founded
McCaw Cellular Communications), and other investors are willing to take a
risk in the future of converging infrastructure. Their enterprise is called
Teledesic Corp., which will invest almost $10 billion to place 840 low
earth-orbiting satellites. The plan is to offer broadband connection,
broadcasting, video conferencing, and other telecommunications services
worldwide through Teledesic's satellite network. The project's possible payoffs
may be as large as the size of necessary investments.
The success of Teledesic and similar projects hinges on convergence not only
in telecommunications but also in networking technologies, computer
interface, digital contents, and worldwide markets. As mentioned earlier, the
Information Superhighway environment enables various products and services
to be produced, distributed, and consumed. An efficient, worldwide
information infrastructure will be useless if its usage is limited to a few
activities such as voice communication or online newspaper delivery. If it
entails all types of virtual activities, however, its economic impact will far
surpass that of the modern telecommunications industry. Convergence is the
key factor that will make or break an investment project that aims at
leveraging the future information infrastructure. If successful, any company
that controls the infrastructure is in a position to be a dominant firm in other
areas of the virtual economy.
Suppose a firm is a dominant player in computer operating systems and many
application program markets. It may also extend its dominance in the last mile
from the computer to the information infrastructure through networking
software and access services. By constructing the network itself, such a firm
can integrate all aspects of the infrastructure necessary for virtual processes,
establishing itself as a significant player in content provision as well by
cooperating with other content providers. Virtual contents consist of more than
information products and services. Online payment services, online
Page 557
banking, and digital currency services, for example, are necessary for the
virtual market. A firm that can dominate the world digital currency market can
take a lion's share of the seigniorage. Such a firm must possess the reputation
and capital necessary to convince consumers to hold its currency, just as the
wealth and credibility of the U.S. government is the sole guarantee to those
who hold dollars. The process of vertical integration and monopolization in all
these sectors of the worldwide economy has been unimaginable, but is
becoming a reality driven by the convergence in markets and the relaxation
in—or lack of—regulatory market interventions.
An alternative scenario is an efficient, competitive economy where
decentralized markets support many players and allocate resources efficiently.
The first step in promoting such an economy is to eliminate inefficient
mechanisms for resource allocation, induce better quality for products and
services, and guarantee a level playing field for all players. For example, as
was discussed in Chapter 3, usage-based pricing in Internet access services
will enhance quality and allocate resources efficiently. In the software market,
the telecommunications economics, as we discussed in Chapter 11, "Business
and Policy Implications of Electronic Commerce," can enlighten policymakers
about what constitutes anticompetitive behaviors.
Electronic commerce, by its own efficiencies, will also be able to provide
competitive and effective marketplaces for products and services often
monopolized in physical markets. For example, differentiated and customized
products will offer more choices than mass-produced goods, for which a firm
with sufficient economies of scale has the cost advantage. Microproducts,
applets, and microbundles enable short-term contracts between suppliers and
intermediaries and between retailers and consumers. As we discussed in
Chapter 4, "Quality Uncertainty and Market Efficiency," short-term contracts,
in turn, reduce inefficiencies caused by quality uncertainty. Electronic
payment systems based on micropayments and digital currency will facilitate
selling microproducts in addition to bundling and subscription, for which
existing payment mechanisms are adequate. Micropayments will also support a
usage-based copyright payment system, enabling content sellers to meter and
bill for
Previous | Table of Contents | Next
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 558
-----------
small and large uses of their products. In short, electronic commerce enhances
competition by its relentless drive toward efficiencies and open markets.
Convergence is a two-edged sword, opening all markets for a single, powerful
firm to dominate or for all firms to compete in each other's market.
Whether you believe the future economy will be monopolistic or competitive,
various market forces are already in place to influence our economic lives in
the next two decades. We can minimize the uncertainty by understanding the
trends or processes that will be pervasive in the future economy. While
specific business tactics must be based on actual, not forecast, data,
recognizing the trend provides an invaluable insight about what business
strategy will be needed. The remainder of this chapter highlights some
fundamental changes in the way the virtual economy will operate, as we see it
in the year 2015.
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 562
----------- ● E-mail is seen as the equivalent of modern letter-writing, but it is
basically a file-transfer mechanism, which can handle letters as well as
all types of files. Because of the familiarity and acceptance of e-mailing
among Internet users, consumers will be ready to grasp its future
functions.
● Permanent e-mail addresses are offered freely, which is based on the
forwarding principle. A future virtual player will have a permanent
Internet identity, much like a social security number. Messages will be
forwarded to current servers based on dynamic updating of domain
name servers or net identity servers.
The futuristic aspect in this scenario is in making all these technologies work
in a seamless, interoperable system; therefore, when developing a component
technology, businesses need to have a long-term perspective. For example, the
analog HDTV standard has been abandoned by the Japanese government and
corporations who introduced it early in the 1980s. Analog HDTVs will not
operate with digital HDTVs and are thus unable to participate in the digital
revolution. Going against such a trend will be a disaster. Likewise, smart
products should adopt standard communications protocols so they can be
controlled remotely via the Internet or other prevailing networks. Proprietary
software will isolate the product and diminish its usefulness in the virtual
economy. By visualizing how consumers use their products in the future,
businesses can gain an insight into what features their products must offer as
well.
The Alice and Bob example is decidedly not one of a market transaction
involving sellers and buyers. Electronic commerce will be conducted in the
same way Alice and Bob made contacts, exchanged their messages, and went
about their everyday lives, but with added technologies and features of an
economic system—payment mechanisms, product specifications,
intermediation, and negotiation processes for trade, contracts, and delivery.
The most significant lesson for product sellers in the above example is the
need for interoperability that enables an integrated and seamless consumption
process.
Page 563
Future virtual markets invite speculation about what other general features can
be detected to guide us during the next 20 years. The next section will delve
into some market aspects of the future virtual economy.
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 566
-----------
well, and musicians will distribute demo recordings on the net. However, this
model of direct sales will be limited by the sheer size of the market and the
problem of quality uncertainty, and these products will instead be mediated by
intermediaries. An electronic publishing or multimedia company will be in the
business of buying and selling intellectual properties, but its editing and
packaging function will no longer be affected by the limitations of its
medium—channels, programming slots, or number of pages, for example—or
by the need to appeal to the widest audience to maximize advertising revenues.
Instead, the publisher's focus will be on customizing products and providing
the best value for each customer.
Current methods of market surveys and focus groups leave much to be desired.
Although open-ended questions usually accompany survey forms, both
consumers and analysts focus on prepared questions, but the answers—ranging
from "highly satisfied" to "not at all satisfied"—only provide insights into
predetermined and preselected areas, which might not be the problem at all,
and the answers themselves are questionable when consumers have no proven
incentive to tell the truth. Furthermore, survey forms and techniques limit
responses to verbal communication.
Logging and analyzing web access is an indirect method of observing
consumer reactions, similar to watching through one-way mirrors. While this
practice is under criticism, an online survey environment can be created to
mimic many advantages of web log data. Using the virtual environment, this
method will allow consumers to express their opinions not only verbally but
through nonverbal actions and feelings. The key element in a virtual survey
method is to overcome the restricting factors of survey forms that ignore
nonverbal communications, yet it's difficult to interpret in a meaningful way
these nonverbal forms of communication, which often consist of images,
metaphors, and other cognitive expressions for which no interpretation
consensus exists.
Experimental research focuses on consumer storytelling through images
(Zaltman, 1996). Its premise is that most social communication is nonverbal
and thoughts can occur as images. For example, when consumers are asked to
bring images to describe their experience with a product, they may bring a
picture of one of their pets or a rainstorm. A picture of a dog represents
faithfulness, of course, while the storm hints at turmoil. Similarly, Internet
users are asked to characterize the color of their e-mail messages. Low opinion
about e-mail is represented by gray or black colors, while bright colors such as
pink and yellow indicate more excitement.
While this approach to nonverbal communications touches on an important
shortcoming in traditional survey methods, images and metaphors
Page 569
themselves are hard to interpret. To put them in words violates the very
premise of "not being able to express in words." However, a less ambitious
research environment can be constructed on the Internet. Instead of using
worded questions and asking for ratings, consumers will be presented with
images, games, and other interactive materials. By carefully constructing the
experimental environment, researchers can capture subjects' natural behaviors
and reactions by using cameras, audio inputs, sensitive mice, and so on to
monitor actions, emotions, and feelings. Instead of inviting consumers to
participate in experiments, advertisements and promotional free products will
provide a research environment that feeds data back to the seller. In a sense, all
potential customers will become focus groups, and the products themselves
will offer opportunities to gain information about consumers.
Online Learning
Consumers form groups on the net to congregate with like-minded people and
exchange opinions. UseNet newsgroups divide consumers by interest into
hierarchical groupings. Thus, those who are interested in computers frequent
groups in the comp hierarchy while art-inclined persons participate in rec.arts
groups. Further divisions of interest result in rec.arts.books for book lovers and
rec.arts.books.hist-fiction for those who favor historical novels. Along with
numerous mailing lists organized to address specific interests, these online
communities provide sellers a window for watching consumers learn from
each other. The power of word-of-mouth marketing has induced many sellers
to monitor messages and, if requested, provide relevant information as dutiful
members of the interest group.
There is no indication that today's sellers actively analyze messages posted in
these online communities. Even product-specific mailing lists managed by
sellers disseminate information but do not allow postings or feedback from
subscribers. The vast number of messages being exchanged may be a deterrent
to any firm contemplating the mining of such data. Instead, sellers rely on
traditionally mined data provided by web search operators, market research
firms, or brokers of processed customer data. The future virtual economy,
Previous | Table of Contents | Next
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 570
-----------
however, will consist of finely segmented online communities whose
participants include the majority of potential consumers. By becoming an
active member of these online groups, a seller will maintain contact with all its
customers and find out about competitors' strategies as well as consumer
responses.
As producers and sellers learn in a networked market environment, their
product selection and pricing strategies will affect both their customers and
their competitors. For customers, the issues will be the gains in
better-matching products and the potential losses in discriminatory prices. For
competitors, the strategic value of new information will depend on its
availability to competitors. For example, if the data on the Internet is public, it
will offer no competitive advantage, because all competitors will have the
same information. However, if the data is made private, such information is
strategically valuable; therefore, the cost of securing and processing such
information will be weighed against the gains in the market share or the profit.
In all likelihood, the profit potential will justify monitoring and analyzing
public messages in some fashion.
Current economic and marketing models do not account for interactions
between producers and consumers. The market somehow functions to match
supply with demand. As the uncertainty about product quality and even about
the identity of transacting partners grows in the virtual marketplace, however,
market agents will no longer be passive. The availability of information and
the technology to gather and process such information is the hallmark of an
electronic market such as the Internet. Economic models, then, will have to
incorporate the active learning by producers and the effects of such action on
product choices, prices, competition, and consumer welfare. Just as researchers
and corporate employees can collaborate and learn from each other on the
Internet, firms and consumers will determine market choices through
interacting and learning from each other. Such interactive learning will be
pervasive in the future virtual economy.
Page 571
Consumer Customization
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 574
-----------
need for firms to interact with consumers and for consumers to interact with
other consumers and firms. Specifically, consumers will not be myopic, but
will become strategic players in the market. Cybernations and
cybercommun-ities will become powerful instruments in influencing prices,
product quality, and competitive behaviors. To counter this trend, firms will
develop market strategies based on their interactions with consumers. Indeed,
demand preferences can be manipulated, quality information (advertising) can
be controlled, and reputation or brand loyalty can be cultivated, all by actively
participating in virtual communities.
Cybercommunities are a natural outgrowth of today's Internet societies, where
the process of word-of-mouth dissemination of information is greatly
facilitated by personal e-mail, mailing lists, chat lines, newsgroups, and other
discussion forums, which can occur concurrently and reach every corner of the
globe.
Although we mentioned earlier that sellers are not yet actively gathering and
processing information from messages posted in UseNet newsgroups, some
recognize the value of doing so. Firefly (http://www.ffly.com) is an example of
intelligent software agents observing, recording, and processing online data
logged by users of various Firefly communities in an attempt to learn more
about consumers. Processed or mined data results are then offered to
producers, who use Firefly communities as avenues for targeted advertising.
Software agents may even offer a review of a new product, using their
knowledge about the preference of each community.
To succeed in this business venture, Firefly faithfully duplicates Internet
communities. For example, there are newsgroups and chat areas for movie
buffs, country music fans, or cartoonists. Such areas may be subdivided more
finely by using a hierarchy of books, for example, and then fiction versus
nonfiction, and so on. It is also possible to form groups based on different
characteristics, such as authors or writing style. A list of an individual's
membership, the intensity of participation, and such will provide a detailed
preference profile of the person. A bookseller may find such a market segment
and post a review directly or through Firefly's software agent, acting like a
member
Page 575
of the group. By observing the message exchange and downloading pattern
and correlating this with sales and other data, the seller may modify the
product, change its advertising strategy, or find another target group. Knowing
this, consumers may also engage in strategic behaviors to influence the seller's
decisions.
The potential value of cybercommunities will be tempered by technical
problems regarding the accuracy and usefulness of data gathered by software
agents in cybercommunities. The window of time over which data is used to
calibrate the preference profile of each community is an important
consideration in a rapidly changing environment such as the Internet. Software
agents need a substantial period of time to learn and match the preference of a
group. In a rapidly changing market, however, the learning speed of agents
may be too slow to be helpful. The group may change its composition and
membership, or the group as a whole may undergo a shift in preferences. Such
dynamic changes can perhaps be eliminated by requiring strict guidelines for
join a group, but if there is such a guideline in the first place, there will be no
need to "learn" about the consumers. On the other hand, too short a window of
observation may yield very unreliable estimates about the preferences.
Despite these potential issues, marketing differentiated and customized
products will depend on information gathered in cybercommunities. Mass
market products are well suited for mass media advertising. On the other hand,
niche market products often are too costly to advertise on such a scale,
although the initial lack of people's knowing about and trying out the product
will be detrimental to future sales (McFadden and Train, 1996). For niche
products and experience goods consumers are wary of trying, a discussion
group composed of people with similar tastes could become a major source of
product information. If someone tries out a new product and posts an opinion
of its quality, all other members will value the information, because they share
the same tastes. And as we have seen earlier, the seller, as a business member
or acting as a consumer, may offer a review to influence opinion or promote
the product in an effort to induce some consumers to try it out.
Page 576
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 577
-----------
web advertising spaces are auctioned off to the highest bidders in real-time.
Other interesting examples of clearing markets are given by McAfee and
McMillan (1997).
Future electronic markets will be more than a simple use of technologies,
whose impact is often in terms of cost savings. In some cases, an electronic
market may open a new opportunity to trade a product that may not have been
possible otherwise. In other words, an electronic stock exchange is more than
an automated version of the New York Stock Exchange. As McAfee and
McMillan (1997) illustrate, an electronic market can effectively replace a
regulated market with a decentralized market. The result is often increased
efficiency while avoiding many problems associated with bureaucratic
administration and the lack of incentives. Regulation is often motivated
because of the failure of the market to allocate resources. Nevertheless, in
many cases, electronic markets succeed in overcoming the coordination
problems observed in physical markets.
The railway industry, to give an example, is often a natural monopoly and is
regulated as such. In such a market, one firm will be more efficient and thus
able to provide the service at the lowest possible cost, while two or more
competing firms may not survive. In Sweden, however, the central rail
administration, who allocated the use of tracks centrally, was instructed to sell
private firms access to these tracks. Opponents argued that, given the
complexity of train routes and timing schedules, such a decentralized market
allocation was impossible, not to mention a threat to train safety. Brewer and
Plott (1995), through simulated experiments, demonstrated that not only was
such a decentralized allocation possible but the result would be increased
efficiency. The experiments consisted of several sessions of electronic bidding,
where bidders did not know competitors' valuations of tracks. Nevertheless,
the analysis of the results showed that actual bid winners—the final allocation
of tracks—corresponded to the most desirable theoretical distribution. In this
example, an electronic market was shown to be more than an automated
physical market, as the former was able to achieve what the latter failed to do.
In this sense, an electronic market is not just an application of new technology
to existing markets—it is a new type of market.
Page 578
Through electronic commerce, then, many goods will be allocated more
efficiently, especially those regulated products and services now being targeted
for deregulation. The trend toward deregulation is spurred by the belief that
deregulated industries will result in better product choices, lower prices, and
higher consumer welfare, but it is often unclear how these industries, which
have been considered to be natural monopolies in which competition harms
consumers, can be made competitive when resources are allocated efficiently.
The answer will lie in virtual electronic markets by which a complex problem
of resource allocation and price discovery processes can be coordinated. As
discussed in Chapter 11, "Business and Policy Implications of Electronic
Commerce," the web is already used to coordinate interstate electricity
wholesale and retail wheeling. In the virtual economy, different types of
market-clearing mechanisms may be offered at the same time for the same
product. Selling by posted prices may be more efficient than bid-based
auctions if both sellers and buyers are fairly familiar with each other's values,
that is, consumers' willingness to pay and the cost of production. On the other
hand, auctions may be more efficient if there are many market agents and the
supply and demand are somewhat uncertain. Market brokers may operate these
mechanisms and compete through market experimentation and efficiency.
12.10. Summary
This chapter looked at a broader picture of the future virtual
economy—electronic commerce as a market with its unique market agents,
products, and processes. Popular articles and movies on the subject of virtual
reality conjure up a future where the physical world ceases to be important or
is in a power struggle with the virtual world. A truly virtual world that can
compete with the physical world only exists in a science fiction series such as
Star Trek, where
Page 579
holodecks create real-life characters and an environment with which humans
can interact. Even with their 24th century technologies, however, holodeck
characters sometimes go awry—it was they, after all, who attempted to take
over the ship itself in one episode. Luckily, the virtual world in the year 2015
will not be anything close to that vision.
The virtual world pictured here parallels our physical world in many respects.
The most important change it will bring lies in the way we will interact with
each other and with products—in other words, virtual processes.
Technological developments in the next 20 years will be substantial, but the
seeds of the virtual world—virtual players, products, and processes—are
already here. The virtual world that knows no physical boundaries turns out to
be cybercommunities and cybernations. While these interest groups exist only
virtually, in one sense they are an extension of today's segmented markets. The
difference, of course, is that these groups will have the means and reasons to
be more coherent and will become a force to reckon with in the marketplace
and in politics as well.
A hidden agenda in highlighting the features of the future world is to suggest
some areas of interest for economic research. As a commodity market, the
virtual marketplace presents fertile ground for research in all areas of
economic theory. Aside from Internet economics (which deals with resource
allocation and pricing for information infrastructure), cost structure and pricing
models for information products have already interested many economists.
More rigorous research is needed in digital products, product differentiation
and customization, electronic search and advertising, copyrights, and digital
currency. This chapter also emphasized the role of producer and consumer
learning and the importance of consumer groups and actions, which is often
neglected in firm-oriented theory of industrial organization. It is to be hoped
that the virtual economy described here will guide both researchers and
businesses in evaluating developments in electronic commerce in an
appropriate and useful context.
Page 580
References
Brewer, P. J. and C. R. Plott. "A binary conflict ascending price (BICAP)
mechanism for the decentralized allocation of the right to use railroad tracks."
Social Science Working Paper, #887, California Institute of Technology, 1995.
Hämäläinen, M., A. B. Whinston and S. Vishik. "Electronic markets for
learning: Education Brokerage on the Internet." Communications of the ACM,
39(6) 1996: 51_58.
Maes, P. "Agents that reduce work and information overload."
Communications of the ACM, 37(7) 1994: 31_40.
McFadden, D. L. and K. E. Train. "Consumers' evaluation of new products:
learning from self and others." Journal of Political Economy, 104(4) 1996:
683_703.
McAfee, R. P. and J. McMillan. "Electronic markets." Readings in Electronic
Commerce. Ed. R. Kalakota and A. B. Whinston. Reading, Mass.:
Addison-Wesley, 1997. 293_309.
Tapscott, D. The Digital Economy: Promise and Peril in the Age of Networked
Intelligence. New York: McGraw-Hill. 1996.
Zaltman, G. "Metaphorically speaking." Marketing Research, 8(2) 1996:
13_20.
Previous | Table of Contents | Next
Products | Contact Us | About Us | Privacy | Ad Info | Home
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.
To access the contents, click the chapter and section titles.
Page 581
-----------
Internet Resources
Smart Products
WorldsAway at:
http://www.worldsaway.com.
Assorted articles and web sites that discuss the future in selected subjects
include:
● Education: Vision 2010 at http://www.si.umich.edu/V2010/
Page 582
● GIS: http://www.gatekeeper.com/stormwater/information/gis_full.html
● Medicine and healthcare:
http://cfm.mc.duke.edu/chair/pcc/public/ahc/player.htm
● Court technology:
http://www.ncsc.dni.us/ncsc/bulletin/future/future.htm
● Banking: http://www.grantthornton.com/gtonline/finance/currency
/fall96c.htm
● Global economy: http://www.cgtd.com/global/gat-prs.html
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited. Read EarthWeb's privacy statement.