IDEAS home Printed from https://ideas.repec.org/a/eee/iepoli/v19y2007i2p151-170.html
   My bibliography  Save this article

Predatory pricing with the existence of network externalities in the laboratory

Author

Listed:
  • Chiaravutthi, Yingyot

Abstract

No abstract is available for this item.

Suggested Citation

  • Chiaravutthi, Yingyot, 2007. "Predatory pricing with the existence of network externalities in the laboratory," Information Economics and Policy, Elsevier, vol. 19(2), pages 151-170, June.
  • Handle: RePEc:eee:iepoli:v:19:y:2007:i:2:p:151-170
    as

    Download full text from publisher

    File URL: http://www.sciencedirect.com/science/article/pii/S0167-6245(07)00017-0
    Download Restriction: Full text for ScienceDirect subscribers only
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. Katz, Michael L & Shapiro, Carl, 1986. "Technology Adoption in the Presence of Network Externalities," Journal of Political Economy, University of Chicago Press, vol. 94(4), pages 822-841, August.
    2. Harrison, Glenn W., 1988. "Predatory pricing in a multiple market experiment : A note," Journal of Economic Behavior & Organization, Elsevier, vol. 9(4), pages 405-417, June.
    3. Kreps, David M. & Wilson, Robert, 1982. "Reputation and imperfect information," Journal of Economic Theory, Elsevier, vol. 27(2), pages 253-279, August.
    4. Jean-Pierre Benoit, 1984. "Financially Constrained Entry in a Game with Incomplete Information," RAND Journal of Economics, The RAND Corporation, vol. 15(4), pages 490-499, Winter.
    5. Yun Joo Jung & John H. Kagel & Dan Levin, 1994. "On the Existence of Predatory Pricing: An Experimental Study of Reputation and Entry Deterrence in the Chain-Store Game," RAND Journal of Economics, The RAND Corporation, vol. 25(1), pages 72-93, Spring.
    6. Farrell, Joseph & Saloner, Garth, 1986. "Installed Base and Compatibility: Innovation, Product Preannouncements, and Predation," American Economic Review, American Economic Association, vol. 76(5), pages 940-955, December.
    7. Capra, C. Monica & Goeree, Jacob K. & Gomez, Rosario & Holt, Charles A., 2000. "Predation, asymmetric information and strategic behavior in the classroom: an experimental approach to the teaching of industrial organization," International Journal of Industrial Organization, Elsevier, vol. 18(1), pages 205-225, January.
    8. Isaac, R Mark & Smith, Vernon L, 1985. "In Search of Predatory Pricing," Journal of Political Economy, University of Chicago Press, vol. 93(2), pages 320-345, April.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Takács, Károly, 2010. "Hálózati kísérletek [Network experiments]," Közgazdasági Szemle (Economic Review - monthly of the Hungarian Academy of Sciences), Közgazdasági Szemle Alapítvány (Economic Review Foundation), vol. 0(11), pages 958-979.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Capra, C. Monica & Goeree, Jacob K. & Gomez, Rosario & Holt, Charles A., 2000. "Predation, asymmetric information and strategic behavior in the classroom: an experimental approach to the teaching of industrial organization," International Journal of Industrial Organization, Elsevier, vol. 18(1), pages 205-225, January.
    2. van Damme, E.E.C. & Larouche, P. & Müller, W., 2006. "Abuse of a Dominant Position : Cases and Experiments," Discussion Paper 2006-020, Tilburg University, Tilburg Law and Economic Center.
    3. Lisa V. Bruttel & Jochen Glöckner, 2011. "Strategic Buyers And Market Entry," Journal of Competition Law and Economics, Oxford University Press, vol. 7(2), pages 381-402.
    4. William Comanor & H. Frech, 2015. "Economic Rationality and the Areeda–Turner Rule," Review of Industrial Organization, Springer;The Industrial Organization Society, vol. 46(3), pages 253-268, May.
    5. van Damme, E.E.C. & Larouche, P. & Müller, W., 2006. "Abuse of a Dominant Position : Cases and Experiments," Discussion Paper 2006-020, Tilburg University, Tilburg Law and Economic Center.
    6. repec:iad:wpaper:0104 is not listed on IDEAS
    7. Engelmann, Dirk & Müller, Wieland, 2011. "Collusion through price ceilings? In search of a focal-point effect," Journal of Economic Behavior & Organization, Elsevier, vol. 79(3), pages 291-302, August.
    8. Kaplow, Louis & Shapiro, Carl, 2007. "Antitrust," Handbook of Law and Economics, in: A. Mitchell Polinsky & Steven Shavell (ed.), Handbook of Law and Economics, edition 1, volume 2, chapter 15, pages 1073-1225, Elsevier.
    9. Bruce H. Clark & David B. Montgomery, 1998. "Deterrence, Reputations, and Competitive Cognition," Management Science, INFORMS, vol. 44(1), pages 62-82, January.
    10. Nelson, Jon P., 1995. "Market structure and incomplete information: Price formation in a real-world repeated English auction," Journal of Economic Behavior & Organization, Elsevier, vol. 27(3), pages 421-437, August.
    11. Hans‐Theo Normann & Roberto Ricciuti, 2009. "Laboratory Experiments For Economic Policy Making," Journal of Economic Surveys, Wiley Blackwell, vol. 23(3), pages 407-432, July.
    12. Mason, Charles F. & Phillips, Owen R., 2000. "An experimental evaluation of strategic preemption," International Journal of Industrial Organization, Elsevier, vol. 18(1), pages 107-135, January.
    13. Phlips, Louis, 1996. "On the detection of collusion and predation," European Economic Review, Elsevier, vol. 40(3-5), pages 495-510, April.
    14. Beomjin Choi & T. S. Raghu & Ajay Vinzé & Kevin J. Dooley, 2019. "Effectiveness of standards consortia: Social network perspectives," Information Systems Frontiers, Springer, vol. 21(2), pages 405-416, April.
    15. William Tracy, 2014. "Paradox Lost: The Evolution of Strategies in Selten’s Chain Store Game," Computational Economics, Springer;Society for Computational Economics, vol. 43(1), pages 83-103, January.
    16. Dasgupta Utteeyo, 2011. "Are Entry Threats Always Credible?," The B.E. Journal of Economic Analysis & Policy, De Gruyter, vol. 11(1), pages 1-41, December.
    17. Slowak, André P., 2009. "Market fields structure & dynamics in industrial automation," FZID Discussion Papers 02-2009, University of Hohenheim, Center for Research on Innovation and Services (FZID).
    18. Giovanna Devetag & Enrico Zaninotto, 2001. "The imperfect hiding: Some introductory concepts and preliminary issues on modularity," ROCK Working Papers 010, Department of Computer and Management Sciences, University of Trento, Italy, revised 13 Jun 2008.
    19. Haltiwanger, John & Waldman, Michael, 1991. "Responders versus Non-responders: A New Perspective on Heterogeneity," Economic Journal, Royal Economic Society, vol. 101(408), pages 1085-1102, September.
    20. Howell, Bronwyn, 2006. "Unveiling 'Invisible Hands': Two-Sided Platforms in Health Care Markets," Working Paper Series 3841, Victoria University of Wellington, The New Zealand Institute for the Study of Competition and Regulation.
    21. Dennis W. Carlton & Michael Waldman, 2002. "The Strategic Use of Tying to Preserve and Create Market Power in Evolving Industries," RAND Journal of Economics, The RAND Corporation, vol. 33(2), pages 194-220, Summer.

    More about this item

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:eee:iepoli:v:19:y:2007:i:2:p:151-170. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Catherine Liu (email available below). General contact details of provider: http://www.elsevier.com/locate/inca/505549 .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.