Competitive Entry and Pricing

Embed Size (px)

Citation preview

  • 8/3/2019 Competitive Entry and Pricing

    1/26

    Review of Marketing Science

    Volume 1 2003 Article 3

    Competitive Entry and Pricing Responses to

    Product Innovation

    Barry Bayus

    Pradeep Chintagunta

    University of North Carolina, Chapel Hill, barry [email protected] of Chicago, [email protected]

    Copyright c2003the authors. All rights reserved. No part of this publication may be reproduced,

    stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical,

    photocopying, recording, or otherwise, without the prior written permission of the publisher, be-

    press, which has been given certain exclusive rights by the author. Review of Marketing Science

    is produced by The Berkeley Electronic Press (bepress). http://www.bepress.com/romsjournal

  • 8/3/2019 Competitive Entry and Pricing

    2/26

    Competitive Entry and Pricing Responses to

    Product Innovation

    Barry Bayus and Pradeep Chintagunta

    Abstract

    In this paper, we study competitive response to a product innovation. We consider the dynamic

    interaction between a Defender (a firm with a first generation product) and an Attacker (a

    firm with a second generation product). The second generation product entry decision of theDefender, as well as the pricing decisions of both firms, are analyzed. Analytical results are

    derived by developing a 3-period pricing game, and studying closed-loop policies for a Nash

    equilibrium. These results allow us to identify strategies in which the Attacker can prevent (or

    delay) a competitive response by the Defender. Some empirical support for our analytical results

    is also provided by pricing data and information on the timing of successive product generation

    introductions in the semiconductor and personal computer industries.

    KEYWORDS: New Products, Pricing, Competition, Entry

  • 8/3/2019 Competitive Entry and Pricing

    3/26

    1. Introduction

    Understanding the dynamic rivalry between firms is of great importance in the development ofstrategic and tactical plans (Porter 1980; MacMillan, et al. 1985; Chen, et al. 1992; Zhao 2003).A critical variable associated with organizational performance is the response time of a

    competitor to a firms action (MacMillan and McCaffery 1982; MacMillan, et al. 1985). Forexample, predicting the response lag to a new product innovation (in the absence of patent protection or high investment requirements) is a key issue since it determines the monopoly period in which sufficient profits must be accumulated to justify the risks associated withdeveloping the new product. As discussed by Porter (1980), the ultimate effectiveness of anycompetitive action depends on whether or not there is a response, and if so, whether theresponse is delayed. A firm generally profits most by actions that prevent or delay a reaction.Preemptive strategies also are likely to lead to a competitive advantage (MacMillan 1983).Thus, knowing the conditions when a competitive action will go unchallenged is highlydesirable.

    Descriptive theories of competitive response have been proposed in the strategic

    management literature. For example, Porter (1980) provides an extensive discussion of entry barriers that can block competitive countermoves. MacMillan and McCaffery (1982) extendthese ideas by suggesting that other strategic and organizational reasons may also act to delay afirms reaction to a product innovation. Empirical investigations of the strategic andorganizational factors associated with competitive responses in the banking (MacMillan, et al.1985), electronics (Smith, et al. 1989), and the airline (Chen, et al. 1991; Chen and MacMillan1992) industries have been conducted. Marketing mix responses by oligopoly members to theentry of another firm have also been estimated (e.g., Gatignon, et al. 1989). More recently,analytical studies have considered the trade-offs between entry time, product performance, anddevelopment costs (e.g., Bayus, Jain, and Rao 1997; Zhao 2002).

    However, generally absent from the literature are analytical studies that take anormative perspective of competitive response to product innovation. Although a fewanalytical efforts have investigated the new product entry timing decision, this research has notdirectly studied competitive response. For example, Wilson and Norton (1989) study themonopoly situation of when (if ever) a firm should introduce a new product designed to replaceits current product entry. Eliashberg and Jeuland (1986) investigate the impact ofexogenousentry by a competitor on dynamic pricing patterns. Bowman and Gatignon (1995) study thefactors related to a competitors response time to a new product introduction. Bayus, Jain, andRao (1997) consider the entry timing for two competitors that each can introduce a newproduct. Zhao (2002) studies the product introduction timing for an incumbent and entrant, butdoes not consider pricing strategies or multiple product generations. In addition, none of thisliterature considers the underlying buying behavior associated with durable products.

    The purpose of this paper is to analytically study competitive response to a productinnovation. In contrast to the existing literature, our analysis begins at the point when acompetitor has already introduced a product innovation. We consider a two firm, two productgeneration situation in which a Defender currently offers a first generation product and anAttacker offers a second generation product. Key aspects of our model are: (1) competition(i.e., an Attacker has already introduced a next generation product), (2) the Defender firmsdecision of whether to introduce the second generation product, and (3) endogenous pricingover time for the first and second generation products of both firms. A dynamic model for

    Bayus and Chintagunta: Competitive Entry and Pricing

    Produced by The Berkeley Electronic Press, 2

  • 8/3/2019 Competitive Entry and Pricing

    4/26

    consumer sales of a second generation product (i.e., using new technology) is developed byincorporating the replacement behavior of a first generation product (i.e., which uses oldtechnology). Analytical results for this situation are derived by studying equilibrium closed-loop policies in a 3-period game. This model is used to determine conditions when theDefender responds to the Attacker by introducing a next generation product. These results also

    allow us to identify the circumstances under which the Attacker can prevent (or delay) acompetitive response by the Defender.Although this paper complements some existing modeling efforts, we examine a

    different competitive situation. We do not study the monopoly situation in which a single firmexpands its product line to include old and new technologies (e.g., as in Wilson and Norton1989; Moorthy and Png 1992, Fishman and Rob 2000). Nor do we study the case in which afirm is faced with a competitive entry into its current market (e.g., as in Hauser and Shugan1983; Eliashberg and Jeuland 1986; Gatignon, et al. 1997). And we do not study the diffusionof a single new technology among competing firms, including patent races amongcompetitors (e.g., as in Reinganum 1983; Fudenberg and Tirole 1985; Connor 1988; Ghemawat1991). Prima facie, our analysis appears to be related to the literature on disruptive

    technologies (Bower and Christensen 1995). In that case, the Attackers product is initiallyinferior to that of the Defender. However, the improvement in both products over time is suchthat the Attackers product fulfills consumer needs at some point in the future whereas theDefender over provides quality at that point. Now consumers are willing to purchase theAttackers product. By contrast, we look at a situation in which the Attackers initial quality is,ceteris paribus, higher than that of the Defender.

    The situation we study is representative of cases in which an incumbent firm is facedwith a rival firms introduction of a competing technology (sometimes it is a firm outside theestablished industry, called invisible competitors by Kodama 1992). Examples of firms thathave had to face the threat of a product innovation include piston aircraft engines (vs.turbojets), mechanical (vs. electric) typewriters, vacuum tubes (vs. transistors), discretetransistors (vs. integrated circuits), and traditional camera film processing (vs. electronicimaging). See Cooper and Schendel (1976) for other examples. The competition between Netscape and Microsoft in the Internet browser war is a well known setting with thesecharacteristics (e.g., Windrum 2001). Another example in the personal computer industry isthe IBM PC XT (based on Intels 8088 CPU technology) which was faced with the entry of theCompaq Deskpro personal computer (based on Intels more powerful 8086 CPU chip) in 1984(e.g., see Sultan 1989). In all these cases, predictions of the Defender firms likely responsesare expected to be a part of the strategic and tactical plans of the Attacker.

    The remainder of this paper is organized as follows. In the next section, a 3-periodmodel for two competing firms is developed. In Section 3, closed-loop Nash equilibrium pricepatterns are determined and their consistency with empirical data from the personal computermarket is discussed. In Section 4, the entry decision of the Defender is analyzed and strategiesin which the Attacker can prevent a response are discussed. Information on the timing ofsuccessive technology introductions in the semiconductor and personal computer markets arealso used to lend empirical support to the analytical results. Implications and conclusions arediscussed in the final section.

    2 Review of Marketing Science Vol. 1 [2003], Artic

    http://www.bepress.com/romsjournal/vol1/iss1/art3

  • 8/3/2019 Competitive Entry and Pricing

    5/26

    2. Model Formulation

    Two firms are considered in our analysis, termed the Defender and the Attacker. In the basicmodel we consider three time periods: period 1 in which the Defender offers a first generation product and the Attacker introduces a second generation product; period 2 in which the

    Defender introduces a second generation (resulting in three products on the market); and period3 in which the Defender phases out the first generation product, leaving only the two competingsecond generation products on the market. This 3-period model structure gives us theflexibility to examine alternative entry decisions for the Defender (e.g., no second generationproduct, a second generation product with immediate withdraw of its first generation product). Note that with respect to timing decisions, we will focus on the entry decision and not aspecific phase out strategy that might be implemented by the Defender. Considering anendogenous phase out and entry decision is a potential topic for future research.

    Initially, we assume that there is an installed base of the first generation product. Forsimplicity, we further assume that the market potential for the product innovation is constantand is a function of the installed base (see Bayus 1992 for a discussion of these assumptions

    and development of a monopoly model). This allows us to focus on the purchase behavior (i.e.,replacement and substitution behavior) for competing product generations. If a productinnovation expands the market, there is an even greater motivation for the Defender to respondwith a matching product entry. However, the qualitative nature of our findings will not beaffected. Of course, the market potential for a next generation product will depend on theproduct category, and may be larger or smaller than the installed base of an earlier generationproduct (e.g., see Norton and Bass 1992). A complete analysis of the effects associated with adynamic market potential are left for future research.

    Finally, we do not consider any fixed costs associated with introducing a productinnovation. Since these costs are constant, a parallel and downward shift in the optimal profitpaths will occur as these costs increase. Of course, large fixed entry costs make it more likelythat the Defender will not introduce a next generation product.

    2.1 The Demand Model

    Figures 1 (a), (b) and (c) depict the key components of our model in each of the three timeperiods of interest. The model structure depends on the Defenders decision of whether to enterwith the new technology, and whether to phase out the product with old technology. Atany point in time, some proportion of the installed base of the first generation product will benormal replacements (i.e., households owning an older unit, and thus having a highreplacement probability under any circumstances, that replaced their first generation productwith a new unit); the remaining proportion (1-) are potential discretionary replacers (i.e.,households owning a first generation product that accelerate their replacement decision andpurchase a second generation unit in advance of the normal replacement decision)1.

    1In general, the household durable replacement decision is related to the age of a currently owned unit, and thusaggregate replacements will be a function of the underlying age-based distribution of units in use. However, inorder to simplify the formulation, replacement demand is modeled as a constant proportion of the installed base(i.e., cumulative sales; see also Jeuland and Dolan 1982; Thepot 1988; Bayus 1992). Although this is a restrictiveassumption, empirical evidence suggests that this is a reasonable starting point.

    Bayus and Chintagunta: Competitive Entry and Pricing

    Produced by The Berkeley Electronic Press, 2

  • 8/3/2019 Competitive Entry and Pricing

    6/26

    Figure 1(a)

    The Model Structure for the 3-Period Game: Period 1

    Installed Base

    DiscretionaryReplacements

    NormalReplacements

    Do NotBuy

    Buy SecondGeneration

    FirstGeneration

    Attacker Defender

    (1-)

    (1-f1) f1 (1-g1) g1

    4 Review of Marketing Science Vol. 1 [2003], Artic

    http://www.bepress.com/romsjournal/vol1/iss1/art3

  • 8/3/2019 Competitive Entry and Pricing

    7/26

    Figure 1(b)

    The Model Structure for the 3-Period Game: Period 2

    Installed Base

    DiscretionaryReplacements

    NormalReplacements

    Do NotBuy

    Buy SecondGeneration

    FirstGeneration

    Attacker Defender

    (1-)

    (1-f2) f2(1-g2)

    g2

    Defender

    f2A

    g2A

    g2D

    f2D

    Bayus and Chintagunta: Competitive Entry and Pricing

    Produced by The Berkeley Electronic Press, 2

  • 8/3/2019 Competitive Entry and Pricing

    8/26

    Figure 1(c)

    The Model Structure for the 3-Period Game: Period 3

    Installed Base

    DiscretionaryReplacements

    NormalReplacements

    Do NotBuy

    BuySecond

    Generation

    Attacker Defender

    (1-)

    (1-f3) f3

    f3A (1-g3)

    f3D

    g3

    6 Review of Marketing Science Vol. 1 [2003], Artic

    http://www.bepress.com/romsjournal/vol1/iss1/art3

  • 8/3/2019 Competitive Entry and Pricing

    9/26

    The number of consumers making a discretionary replacement is modeled using theusual diffusion process for a single product that has been studied by several researchers. Theseconsumers buy a second generation product because of some inherent preference for a nextgeneration product and its associated price point. A widely analyzed model of first time buyer(FTB) sales is the diffusion model in which demand is a function of the cumulative number of

    adopters, x(t): dx/dt = (1-x/M)( + x/M), where M is the market potential that is assumed tobe constant, and and are the coefficients of external and internal influence (e.g., see thereview in Mahajan, et al. 1990). A related demand model in which the diffusion effect is afunction of the time since introduction is y(x,t) = dx/dt = (M-x) W(t) (e.g., see Jain and Rao1990 for a detailed discussion)2. In line with this literature, second generation product salesdue to discretionary replacements are modeled as a function of time since introduction.

    The demand behavior we study in each of the three time periods is discussed next.Period 1 (see Figure 1a): Of the consumers facing a normal replacement decision,

    some proportion g1 will purchase a second generation product from the Attacker; and theproportion (1-g1) will buy another first generation product from the Defender. We model thefraction g1 s a function of the price of the first generation product, q1, the second generation

    product price for the Attacker, p1A

    , and the intrinsic preferences for the first and secondgeneration products (the specific formulation is discussed later). Of the consumers that are potential discretionary replacers, some proportion f1 will purchase a second generation product from the Attacker. The fraction f1 is a function of the price of the Attackers secondgeneration product.

    Period 2 (see Figure 1b): Of the fraction of consumers making a normalreplacement, a fraction g2 purchases the second generation product and the remainder (1-g2),buys the first generation product. Thus, g2 is a function of the prices of all three products (q2,p2

    D, p2

    A) on the market in period 2. The normal replacement sales of the second generation

    product, g2 are divided into g2D and g2

    A for the Defender and the Attacker, respectively. Thissplit depends upon the prices charged by the two firms for the second generation product. Ofthis, the sales accruing to the Defender and Attacker are f

    2

    D and f2

    A, respectively.Period 3 (see Figure 1c): In this period, all normal replacements result in the

    purchase of a second generation product. These sales are divided between the two firmsaccording to the proportion g3 (the fraction of consumers buying the Attackers secondgeneration product), which is a function of the second generation product prices for theDefender and Attacker, p3

    D, and p3

    A. The fraction f3 makes a discretionary replacement for a

    second generation product, with this fraction depending upon the process of the Defender andAttacker. Of these discretionary replacements, f3

    D go to the Defender and f3A to the Attacker.

    The notation used to develop our analytical model is summarized below:Xt: Cumulative FTB sales of second generation product up to

    period t = 1,2,3. (x0 = initial sales level)

    Wt: Diffusion effect on discretionary replacement demand inperiod t = 1,2,3.

    N: Initial installed base of first generation product.

    2 Defining F(t) = [1-e-(+)t]/[1+(/)e-(+)t], which is the solution to the Bass-type diffusion model, sales at time tcan be calculated in discrete-time as [M-x(t-1)][F(t)-F(t-1)]/[1-F(t-1)]. Thus, W(t) is a function of F(t) and F(t-1),and dW(t)/dt > 0.

    Bayus and Chintagunta: Competitive Entry and Pricing

    Produced by The Berkeley Electronic Press, 2

  • 8/3/2019 Competitive Entry and Pricing

    10/26

    : Proportion of the installed base of the first generationproduct that will make a normal replacement each period.

    ptD: Second generation product price for Defender, t = 2,3.

    ptA: Second generation product price for Attacker, t = 1,2,3.

    qt: First generation product price for Defender, t = 1,2.

    f1(p1A): Proportion of households making a discretionary

    replacement that purchase a second generation product inperiod 1.

    g1(p1A, q1): Proportion of households making a normal replacement

    that purchase a second generation product in period 1.

    f2(p2A, p2

    D): Proportion of households making a discretionary

    replacement that purchase a second generation product in period 2. Of these, f2

    D buy from the Defender and f2A buy

    from the Attacker (f2D

    + f2A

    = f2).

    g2(p2A, p2

    D, q2): Proportion of households making a normal replacementthat purchase a second generation product in period 2. Ofthese, g2

    Dbuy from the Defender and g2

    Afrom the Attacker

    (g2D + g2

    A = g2).

    f3(p

    3

    A, p3

    D): Proportion of households making a discretionaryreplacement that purchase a second generation product in period 3. Of these, f3

    Dpurchase from the Defender and f3

    A

    from the Attacker (f3D + f3

    A =f3).

    g3(p3A, p3

    D): Share of second generation product sales by normal

    replacement buyers for the Attacker in period 3.

    k: Marginal cost of the first generation product.

    cD,cA: Marginal cost of second generation product for Defenderand Attacker, respectively.

    Second generation product sales in each of the three time periods are given by thefollowing equations.

    x1 x0 = (N- x0) [(1-) W1f1 + g1)] (Period 1)

    x2 x1 = (N- x1) [(1-) W2f2 + g2)] (Period 2)

    8 Review of Marketing Science Vol. 1 [2003], Artic

    http://www.bepress.com/romsjournal/vol1/iss1/art3

  • 8/3/2019 Competitive Entry and Pricing

    11/26

    x3 x2 = (N- x2) [(1-) W3f3 + )] (Period 3)

    where the subscripts refer to the time periods and W1, W2 and W3 are such that 0

  • 8/3/2019 Competitive Entry and Pricing

    12/26

    The proportion of households making a normal replacement that purchase a secondgeneration product in period 2 is

    g2(p2A, p2

    D,q2) = m + n(p2A+ p2

    D) + oq2

    where 0

  • 8/3/2019 Competitive Entry and Pricing

    13/26

    3A = (p3

    A cA) (N- x2) [(1-) W3f3A + g3)]

    Note that in order to isolate the impact of demand for the successive productgenerations on the entry decision and pricing policies, possible cost declines due to experiencecurve effects are not considered.

    3. Dynamic Pricing Strategies

    To derive optimal equilibrium prices for the 3-period game described in the previous section,the first-order conditions associated with the profit functions are solved via backward recursion(for brevity, details are not reported here). Although closed form expressions for the closed-loop Nash equilibrium prices can be obtained, it is analytically impossible to establish anyrelationship between qt, pt

    D and ptA. Therefore, we examine the nature of the price paths

    numerically over a wide range of parameter values that are feasible4.In Figure 2, the nature of the equilibrium price paths for a typical situation from the

    numerical analysis is diagrammed5. Note that the period 1 price for the first generation product

    (q1) can also be between p1D

    and p1A

    . However, even in this case q2 is generally below p2D

    andp2A.

    Thus, we obtain the following (see also Figure 2).

    Result 1

    The price paths for both old and new technology products decline over time.

    Result 2

    The Attacker responds to a competitive product entry with a sharp drop in its price.

    Result 1 extends the findings reports in Bayus (1992) for a monopoly situation, and Result 2extends the findings reported in Eliashberg and Jeuland (1986) for exogenous product entry.

    4Recall that the parameters , , a, , , m and are bounded between 0 and 1 by definition. For these parameters

    we examined values in the range [0.10, 0.90] at intervals of 0.05. Values below 0.1 and above 0.9 couldpotentially result in shares that fall below zero and exceed one in magnitude and are, therefore, not included in the

    analysis. The parameters , , b, n, -o and are all bounded from above the zero. In choosing values for theseparameters, it was important not to violate the [0,1] range for the share numbers of the linear probability rules.Accordingly, for these parameters the ranges examined were [-1.4, -0.6] for b, , n, and , and [1, 2.8] for o,again in increments of 0.05. Finally, using the same considerations (and the empirical finds in Bayus 1992), the parameter was varied in the range [0.05, 0.50]. For the cost parameters, the following (fixed) values were chosen:cD = cA = 0.2. For k, we analyzed values in the range 0

  • 8/3/2019 Competitive Entry and Pricing

    14/26

    Figure 2

    Equilibrium Price Patterns

    Intuitively, our results may be explained by interpreting the market as consisting of twosegments: the normal replacers and the discretionary replacers. While the Attackersupplies both segments, the Defender competes only in the normal replacer segment. If theAttacker could price discriminate, it would charge the monopoly price to discretionaryreplacers and the competitive price to normal replacers in period 1. As this is not possible,the Attacker sets an intermediate price to the market. Clearly, this price would exceed theDefenders first period competitive price (even when marginal costs for both generation products are identical). In period 2, the Defender introduces the second generation product.The attacker no longer enjoys monopoly power in the discretionary replacer segment and,consequently, has to drop prices to competitive levels. Further, the new product introductionalso increases competition for consumers in the normal replacer segment as these consumerscan now choose from among three product offerings. Hence, the Defender has to drop the priceof its first generation product along with introducing the new technology product. Finally, phasing out the first generation product by the Defender in period 3 eases the competitivepressure in the normal replacer segment and precludes any sharp price declines. However,

    1 2 3

    Time Period

    PriceAttacker(2

    ndGeneration)

    Defender(2nd Generation)

    Defender

    (1st Generation)

    12 Review of Marketing Science Vol. 1 [2003], Artic

    http://www.bepress.com/romsjournal/vol1/iss1/art3

  • 8/3/2019 Competitive Entry and Pricing

    15/26

    prices continue to decline due to the diffusion effect6.These intuitive explanations notwithstanding, are these dynamic pricing strategies

    consistent with actual firm behaviors? Unfortunately, identifying appropriate data whichexactly matches the model structure and parameters considered is extremely difficult. To provide some empirical support these results however, the historically implemented pricing

    strategies of two, large competitors (IBM and Compaq) for their various competing personalcomputer models were statistically analyzed. We note that this industry has two keycharacteristics which do correspond to the analytical model: (1) the product is a durable goodwhich involves overlapping technological advancements (and thus discretionary and normalreplacements are important), and (2) two firms with relatively large market shares (IBM with a1990 market share of around 17% and Compaq with a market share of almost 5%) competewith the same Intel microprocessor technology (and thus a duopoly is a reasonable structure toconsider for the time period we analyze). Although the specific features and options of personal computer models can vary considerably, industry analysts generally agree that themicroprocessor in a machine determines its computing power. Thus, we identify technologygenerations based on the installed CPU chip (see also Bayus 1998).

    Unit sales and average prices over the period 1984-1990 for models in the IBM PS/2and Compaq Deskpro lines were obtained from the International Data Corporation ProcessorInstallation Census (see also Bayus 1998). These two personal product lines are directcompetitors (Johnson and Radding 1992), sales of each product model follow the usual lifecycle pattern (sales are initially small, increasing to a peck, and then declining), and IBMdominates Compaq in sales for each period. Further, for each product generation IBM is theDefender and Compaq is the Attacker. For example, the IBM XT (with an 8088 CPU) wasavailable a year before Compaqs first product entry using Intels new X86 CPU technology.In 1984, Compaq entered with a DeskPro PC (with the faster 8086 CPU). IBM eventuallyintroduced its PS/2 Model 30 (with an 8086 CPU) in 1987.

    Figure 3 shows the average prices of the IBM XT (the Defenders first generationproduct), the IBM PS/2 Model 30 (the Defenders next generation product), and the CompaqDeskpro 8086 (the Attackers next generation product). Consistent with Result 1, the first andsecond generation product prices of IBM and Compaq are declining over time. In addition, theAttacker (Compaq) sharply drops its price when the Defender (IBM) enters with a competingproduct (see Compaqs price pattern between 1986-1987) which is consistent with Result 2.

    As estimate of the effects of a competitive product entry on prices was also obtained byusing the Compaq price data (PRICE) across three CPU technology generations (8086, 286,386). Defining the following dummy variables:

    ENTRY= 1 when IBM enters with a competing product (0 otherwise)

    G1 = 1 if PC uses 8086 CPU (0 otherwise)

    6 Detailed comparative statics analyses of the various model parameters on equilibrium prices are not reportedhere. Generally speaking, changes in the intrinsic preference or price sensitivity parameters result in intuitivemovements in the absolute price values. Importantly, the dynamic patterns discussed in this section are notaffected.

    Bayus and Chintagunta: Competitive Entry and Pricing

    Produced by The Berkeley Electronic Press, 2

  • 8/3/2019 Competitive Entry and Pricing

    16/26

    Figure 3

    Selected PC Prices

    0

    1

    2

    3

    4

    5

    6

    7

    1983 1984 1985 1986 1987 1988 1989 1990

    YEAR

    AveragePrice($000)

    G2 = 1 if PC uses 286 CPU (0 otherwise)

    and using OLS, the following regression results are obtained (t-statistics in parentheses):

    PRICE= 7859.11 463.28ENTRY 3173.69 G1 2590.36 G2 502.34 TIME(-1.96) (-11.63) (-9.49) (-8.47)

    R2=0.97 F=80.33 (p=0.00)

    Here, TIMEis a time trend variable (e.g., 1,2,3,within each product generation)7.

    As indicated by the high R2 value and significant F-value, this model provides a verygood fit to Compaqs implemented pricing policies. All coefficients are statistically significantat the 0.05 level. As expected, the coefficients ofG1 and G2 are negative, indicating that the base price of successive product generations increases. Consistent with Result 1, the

    coefficient of the TIMEis negative, suggesting that prices decline over time. However, we notethat this result might also be due to cost declines associated with experience effects. Given thelimited data available, these two complementary effects cannot be empirically separated. Mostimportant is the finding that the coefficient ofENTRYis negative and statistically significant.This implies that a competitive product entry is met with a decrease in prices. This providessupport for Result 2.

    7 The regression results also hold for other simple formulations such as a quadratic time trend variable.

    Attacker

    (Compaq 8086)

    Defender(IBM 8088)

    Defender(IBM 8086)

    14 Review of Marketing Science Vol. 1 [2003], Artic

    http://www.bepress.com/romsjournal/vol1/iss1/art3

  • 8/3/2019 Competitive Entry and Pricing

    17/26

    4. The Product Entry Response

    To investigate the Defenders entry decision, we examine the complete model structure inwhich the Defender introduces a second generation product in period 2 and phases out its firstgeneration product by period 3, along with two other scenarios:

    i). The Defender does not introduce a second generation product in any of the threetime periods; and

    ii). The Defender introduces a second generation product in period 2, butimmediately withdraws its first generation product.

    A comparison of the total profits accrued over the three time periods from each of thethree scenarios will enable the Defender to decide whether or not to introduce the nextgeneration product in period 2, and also whether to immediately withdraw its first generationproduct or phase it out. Since out results indicate that the Defender never maximizes profit by

    immediately withdrawing its first generation product (profits under the complete modelstructure dominate those when the Defender only competes with a second generation product),we only discuss the phase out scenario (i.e., the next generation product is introduced) withthe no introduction strategy.

    Our analyses generally indicate that the Defender maximizes profits by introducing thenext generation product. However, there are four conditions when the Defender does notintroduce a next generation product.

    Result 3

    The Defender does not respond if the market is preempted by the Attacker.

    Large values of the intrinsic propensity for a discretionary replacement () and smallvalues of the price sensitivity for discretionary replacements () are associated with theDefender not introducing the next generation product. Since both of these parameters involvediscretionary replacements in period 1, the Attacker may be able to steal the market if the

    new product is truly superior (either due to product technology, represented as large values of,

    or due to lower price, represented as small values of) to the first generation product.

    Result 4

    The Defender does not respond when the threat posed by the Attackers product innovationis small.

    The Defender does not introduce the nest generation product when the intrinsic propensity for a normal replacement () and the intrinsic propensity for a discretionaryreplacement in periods 2 or 3 (a) are small. Thus, if the new product does not offer anadvantage compared to the existing first generation product, the Defender finds that it isoptimal to keep its monopoly of the old product. If households are sensitive to the price ofthe new product (represented as large values of b and ), it is not profitable for the Defender tointroduce a next generation product.

    Bayus and Chintagunta: Competitive Entry and Pricing

    Produced by The Berkeley Electronic Press, 2

  • 8/3/2019 Competitive Entry and Pricing

    18/26

    Result 5

    The Defender does not respond if the Attacker establishes a large pioneering advantage.

    Large values of the intrinsic preference for the Attackers next generation product over

    the Defenders () are associated with the Defender not introducing the new product. Since the

    parameter involves period 3 normal replacements where all buyers must decide between theAttacker and the Defender, a pioneering advantage by the Attacker results in an unattractiveentry proposition for the Defender.

    Result 6

    The Defender does not respond if there is a large base of customers for the first generationproduct.

    Large values of the normal replacement proportion () are associated with theDefender not introducing a next generation product. When a relatively high proportion ofhouseholds make a replacement, the Defender maximizes profits by maintaining its monopoly

    of the first generation product.Results 3 through 6 give the general conditions when a product innovation will gounchallenged by an incumbent. But, are these results consistent with actual firm behaviors? To provide empirical support for some of these results, we have assembled information on thetiming of entry for successive product technologies in the semiconductor and personalcomputer industries.

    Table 1 contains the introduction dates of various competing IBM and Compaq personalcomputers discussed in the pricing section. This table also reports the calculated time betweenCompaqs introduction of a next generation product and IBMs subsequent introduction of acompeting product. Across four technology generations IBM always enters with a nextgeneration product, albeit several months after Compaqs product introduction. With each

    advance in technology, IBMs response time decreases. Although several considerations(including production constraints, software and component availability, and internal politics)certainly influenced the specific launch time of the PS/2 product line, the information in Table1 is consistent with Results 4 and 6. As noted previously, Compaq did not initially preemptIBM for any product generation (i.e., the Attacker did not preempt the market due to a drasticinnovation) since sales for each next generation product were relatively small. In addition,Compaq (even though it beat IBM to market in several technologies) did not have a superiorityover IBM in market share, distribution, or advertising (i.e. the Attacker did not gain apioneering advantage). What is true however, is that IBM believed it was not too critical to befirst in the market with the next generation technology (Hooper 1992). IBM also consistentlyunderestimated the industry demand for personal computers. This suggests that IBM did not see

    too much of a threat for successive personal computer technologies. In addition, IBM had thedominant market share position (and thus a relatively large customer base) in the previousproduct technology.

    16 Review of Marketing Science Vol. 1 [2003], Artic

    http://www.bepress.com/romsjournal/vol1/iss1/art3

  • 8/3/2019 Competitive Entry and Pricing

    19/26

    Table 1

    Entry Timing in the Personal Computer Industry

    8086(available June 1978)

    286(available February 1982)

    386(available October 198

    Compaq

    (The Attacker)

    June 1984 April 1985 September 1986

    IBM

    (The Defender)

    April 1987 April 1987 June 1988

    Difference

    (in months)

    34 24 21

    Bayus and Chintagunta: Competitive Entry and Pricing

  • 8/3/2019 Competitive Entry and Pricing

    20/26

    Further statistical estimation was conducted using data from International DataCorporation on 29 of the largest manufacturers and across four CPU technology generations(8088, 286, 386, 486). A proxy for response time ( RESPONSE TIME) was constructed bycalculating the time (in months) between the date at which a CPU technology was available and

    the date that product technology was first introduced by each manufacturer. The first productentry by each firm was excluded from the analysis since variables outside the scope of this paper may explain market entry by a firm. Using the same technology generation dummyvariables defined earlier, and defining

    G3 = 1 if PC uses 386 CPU (0 otherwise)

    G4 = 1 if PC uses 486 CPU (0 otherwise)

    SHARE= manufacturer market share in the year before its product entry,

    the following OLS regression results are obtained (t-statistics in parentheses):

    RESPONSE= 67.79 - 0.27 SHARE- 18.63 G2 - 39.08 G3 - 54.71 G4

    TIME (-0.69) (-3.18) (-7.08) (-9.42)

    R2=0.68 F=30.81 (p=0.00)

    Here, SHAREis used to represent the relative size of the existing customer base of a previousproduct technology.

    As indicated by the large R2

    value and significant F-value, this model provides a very

    good fit to the actual response times for this set of personal computer manufacturers. Thecoefficients of the technology generation dummy variables are negative and statisticallysignificant at better than the 0.05 level. These coefficients indicate that quicker response timesare associated with each successive product generation. Consistent with Result 4, this findingsuggests that more advanced technology (i.e., faster processing speed) poses a greater threat to previous generation products. The coefficient associated with SHARE is insignificant,suggesting that the customer base of a previous product generation does not affect responsetime. One possible explanation for this finding is that market share may capture aspects of twoopposite effects: the "pioneering advantage" described in Result 5 (e.g., firms with smallmarket shares take longer to respond since the larger share companies are more likely to haveintrinsic advantages) and the "customer base of first generation product" described in Result 6

    (e.g., firms with small market share respond quickly since the larger share companies prefer notto cannibalize their current customer base). Unfortunately, the limited data which are availabledoes not allow us to empirically separate these effects.

    However, empirical support for Result 6 comes from a related industry---semiconductors. Table 2 reports the world market share rankings of the leading U.S.manufacturers of semiconductors (see Soukup and Cooper 1983; Dorfman 1987). These dataimply that firms with large market shares in one technology tended to respond slowly (if at all)to newer technologies. For example, the vacuum tube companies generally underestimated the

    18 Review of Marketing Science Vol. 1 [2003], Artic

    http://www.bepress.com/romsjournal/vol1/iss1/art3

  • 8/3/2019 Competitive Entry and Pricing

    21/26

    threat of transistors, and before they could recover, new entrants had gained a strong foothold.It was not until 1959 that the sales value of semiconductors exceed that of receiving tubes.Even then, receiving tubes remained more than a $300 million a year business. A robustreplacement market also meant that sales did not fall off drastically until the 1970's (Dorfman1987). Thus, consistent with Result 6, the large existing customer base of tube manufacturers

    gave them little incentive to pursue newer technologies.

    5. Discussion and Conclusions

    The purpose of this paper has been to analytically identify conditions when the introduction ofa product innovation will go unchallenged. As extensively discussed in the strategicmanagement literature, we assume that a firm profits most by actions that prevent or delay areaction. We have considered the situation in which an established firm is faced with thecompetitive entry of a next generation product. Our model and analyses incorporatecompetition (an Attacker has already introduced a second generation product), the Defender'sdecision of whether to introduce the second generation product, and endogenous pricing over

    time for the competitors and two product generations. The dynamic model for sales of thesecond generation product includes replacement behavior associated with the first generation product. Analytical results are derived by studying equilibrium closed-loop policies in a 3- period game. The pricing and product entry results are also shown to be consistent withimplemented firm decisions in the personal computer and semiconductor industries.

    Several of our results merit further discussion. For the situation we study, price is notused as a weapon to delay a competitive response. As shown in Figure 2, prices of the productinnovation generally start high and decrease over time (i.e., a "skimming" policy is followed).This declining price pattern results from our demand model (i.e., we assume an installed baseof the first generation product, and sales come from replacements).

    It is not surprising that our analyses indicate that the Defender usually maximizes

    profits by responding with a competitive product entry. More interesting is that there are fouranalytically derived conditions in which the Defender maximizes profits by not challenging theproduct innovation. These conditions suggest approaches that an Attacker might use to prevent(or delay) a competitive response. One strategy is to preempt the market with a "breakthrough"product. On the other hand, an "incremental" strategy in which the initial product entry does not pose a strong threat (at least as perceived by the incumbent firms) to the existing producttechnology is viable. Interestingly, U. S. companies seem to follow the breakthrough approachto product development and the Japanese tend to use the incremental strategy (Gomory 1989).Despite the fact that revolutionary products can dramatically improve a company's profitability,it seems that the Japanese approach has been very successful (Rosenberg and Steinmueller1988).

    Other possible strategies in which an Attacker can prevent a competitive responseinclude entering markets where the Defender has a large customer base in the previous producttechnology, and establishing a foothold in the new market quickly (due to the pioneeringadvantage) making it unattractive for a competitor to respond. Incumbent firms are generallyreluctant to respond to a product innovation if it would mean cannibalizing an existing profitable product. Several firms in the computer industry have had to face this difficultproblem recently. Finally, there is a large literature discussing the advantages associated withpioneering (e.g., see the review in Kerin et al. 1992).

    Bayus and Chintagunta: Competitive Entry and Pricing

    Produced by The Berkeley Electronic Press, 2

  • 8/3/2019 Competitive Entry and Pricing

    22/26

    Table 2

    Leading U.S.Semiconductor Manufacturers Ranked by Share of World Market(Source: Dorfman 1987)

    Transistors Semiconductors Integrated CircuitsCOMPANY Tubes (1955) (1965) (1975)

    RCA 1 7 6 8Sylvania 2 4G E 3 6 5Raytheon 4 10Westinghouse 5 8Amperex 6 National Video 7Ranland 8Eimac 9Landsdale Tube 10

    Hughes 1Transitron 2 9Philco 3 8Texas Instruments 5 1 1Motorola 9 2 5Clevite 10

    Fairchild 3 2General Instrument 4 7Sprague 7

    National Semiconductor 3Intel 4Rockwell 6Signetics 9American Microsystems 10

    20 Review of Marketing Science Vol. 1 [2003], Artic

    http://www.bepress.com/romsjournal/vol1/iss1/art3

  • 8/3/2019 Competitive Entry and Pricing

    23/26

    In our model formulation, several assumptions have been made which representavenues for future research. Two potential topics are briefly outlined here. So as to simplify ouranalysis, we have only indirectly addressed the strategies an Attacker can use to prevent (ordelay) a competitive response. Besides price, the model can be extended to directly consider theAttackers other marketing mix decisions. For example, advertising expenditures can be

    modeled as affecting the intrinsic propensities to buy from the Attacker (and in particular, the period 3 parameters). The tradeoff between costs and obtaining a pioneering advantage canthen be studied more closely. In addition, product development efforts of the Attacker can bedirect1y incorporated into the model. In this way, the Attacker's decision of the productinnovation "level" can be direct1y studied (e.g., should the Attacker introduce a productdesigned to preempt the market, or a product that does not pose a threat to the Defender?).

    Finally, another relevant and interesting direction for future research is to model thesituation in which the Defender can respond to a product innovation by improving its firstgeneration product (instead of only introducing a second generation product). In fact, thedevelopment of "hybrid" or "bridging" technologies has been widely used by firms faced withthe competitive entry of a new technology. For example, Kodak initially took this approach to

    the threat of electronic imaging technology (Mossberg 1991). See Tang (1988) for some initialsteps in this direction.

    6. Colophon

    Barry L. BayusKenan-Flagler Business SchoolUniversity of North CarolinaChapel Hill, NC 27599(919)[email protected]

    Pradeep ChintaguntaGraduate School of BusinessUniversity of Chicago1101 East 58th StreetChicago, IL 60637(773)[email protected]

    Bayus and Chintagunta: Competitive Entry and Pricing

    Produced by The Berkeley Electronic Press, 2

  • 8/3/2019 Competitive Entry and Pricing

    24/26

    References

    Bayus, B. (1992), The Dynamic Pricing of Next Generation Consumer Durables,Marketing Science, 11 (Summer), 251-265.

    Bayus, B. (1998), An Analysis of Product Lifetimes in a Technologically Dynamic Industry,Management Science, 44 (June), 763-775

    Bayus, B., S. Jain, and A. Rao (1997), Too Little, Too Early: Introduction Timing and NewProduct Performance in the Personal Digital Assistant Industry, Journal of MarketingResearch, 34 (February), 50-63.

    Bower, J.L. and C.M. Christensen (1995), Disruptive Technologies: Catching the Wave,Harvard Business Review, January, 43-53.

    Bowman, D. and H. Gatignon (1995), Determinants of Competitor Response Time to a New

    Product Introduction,Journal of Marketing Research, (February), 42-53.

    Chen, M., K. Smith, and C. Grimm (1992), Action Characteristics as Predictors ofCompetitive Response, Management Science, 38 (March), 439-455.

    Chen, M. and I. MacMillan (1992), Nonresponse and Delayed Response to CompetitiveMoves: The Roles of Competitor Dependence and Action Irreversibility,Academy ofManagement Journal, 35 (3), 539-570.

    Connor, K. (1988), Strategies for Product Cannibalism, Strategic Management Journal, 9,

    9-26.

    Cooper, A. and D. Schendel (1976), Strategic Responses to Technological Threats,Business Horizons, (February), 61-69.

    Dorfman, N. (1987),Innovation and Market Structure: Lessons from the Commuter andSemiconductor Industries, Cambridge, MA: Ballinger Publishing.

    Eliashberg, J. and A. Jeuland (1986), The Impact of Competitive Entry in a DevelopingMarket Upon Dynamic Pricing Strategies, Marketing Science, 5 (Winter), 20-36.

    Fishman, A. and R. Rob (2000), Product Innovation by a Durable-Good Monopoly, RANDJournal of Economics, 31 (2), 237-252.

    Fudenberg, D. and J. Tirole (1985), Preemption and Rent Equalization in the Adoption of

    New Technologies,Review of Economic Studies, 52, 383-401.

    Gatignon, H., E. Anderson, and K. Helsen (1989), Competitive Reactions to Market Entry:Explaining Interfirm Differences,Journal of Marketing Research, 26 (February), 44-55.

    22 Review of Marketing Science Vol. 1 [2003], Artic

    http://www.bepress.com/romsjournal/vol1/iss1/art3

  • 8/3/2019 Competitive Entry and Pricing

    25/26

    Gatignon, H., T. Robertson, and A. Fein (1997), Incumbent Defense Strategies Against New

    Product Entry,International Journal of Research in Marketing, (May), 163-176.

    Ghemawat, P. (1991), Market Incumbency and Technological Inertia, Marketing Science,

    10 (Spring), 161-171.

    Gomory, R. (1989), From the Ladder of Science to the Product Development Cycle,

    Harvard Business Review, 89 (November-December), 99-105.

    Hauser, J. and S. Shugan (1983), Defensive Marketing Strategies, Marketing Science, 2

    (Fall), 319-360.

    Hooper, L. (1992), IBM Avoids Front Lines of PC Industry's Price War, Wall Street Journal,July 21.

    Jain, D. and R. Rao (1990), Effect of Price on the Demand for Durables: Modeling,

    Estimation, and Findings,Journal of Business and Economic Statistics, 8 (April), 163-170.

    Jeuland, A. and R. Dolan (1982), An Aspect of New Product Planning: Dynamic Pricing, inA. Zoltners (ed.), TIMS Studies in the Management Sciences. Vol. 18: Marketing

    Planning Models, New York: Elsevier Science Publ., 1-21.

    Johnson, B. and A. Radding (1992), IBM, Apple, Compaq Aim at Clones, Advertising Age,

    November 16, 44.

    Kerin, R., P. Varadarajan, and R. Peterson (1992), First-Mover Advantage: A Synthesis,Conceptual Framework, and Research Propositions, Journal of Marketing, 56 (October), 33-

    52.

    Kodama,F. (1992), Technology Fusion and the New R&D, Harvard Business Review, July-August, 70-78.

    MacMillan, I. and M. McCaffery (1982), How Aggressive Innovation Can Help YourCompany,Journal of Business Strategy, 2 (Spring), 115-119.

    MacMillan, I. (1983), Preemptive Strategies,Journal of Business Strategy, 16-26.

    MacMillan, I., M. McCaffery, and G. Van Wijk (1985), Competitors' Responses to Easily

    Imitated New Products--Exploring Commercial Banking Product Introductions, StrategicManagement Journal, 6, 75-86.

    Maddala, G. (1987), Limited Dependent and Qualitative Variables in Econometrics, New

    York: Cambridge University Press.

    Mahajan, V., E. Muller, and F. Bass (1990), New Product Diffusion Models in Marketing: A

    Review and Directions for Research,Journal of Marketing, 54 (January), 1-26.

    Bayus and Chintagunta: Competitive Entry and Pricing

    Produced by The Berkeley Electronic Press, 2

  • 8/3/2019 Competitive Entry and Pricing

    26/26

    Moorthy, K.S. and I. Png (1992), Market Segmentation, Cannibalization, and the Timing ofProduct Introductions, Management Science, 38 (March), 345-359.

    Mossberg, W. (1991), Now It's a Snap to Take Photos for Use on PCs, Wall StreetJournal, December 12.

    Norton, J. and F. Bass (1992), Evolution of Technological Generations: The Law ofCapture, Sloan Management Review, Winter, 66-77.

    Porter, M. (1980), Competitive Strategy: Techniques for Analyzing Industries andCompetitors, New York: Free Press.

    Reinganum, J. (1983), Uncertain Innovation and the Persistence of Monopoly,AmericanEconomic Review, September, 741-748.

    Rosenberg, N. and W. Steinmueller (1988), Why are Americans Such Poor Imitators?

    American Economic Review Papers and Proceedings, (May), 229-234.

    Smith, K., C. Grimm, M. Chen, and M. Gannon (1989), Predictors of Response Time toCompetitive Strategic Actions: Preliminary Theory and Evidence,Journal of BusinessResearch, 18, 245-258.

    Soukup, W. and A. Cooper (1983), Strategic Response to Technological Change in theElectronic Components Industry,R&D Management, 13 (4), 219-230.

    Sultan, F. (1989), IBM Innovations: Introduction of the PS/2, Harvard Business SchoolCase 9-590-026.

    Tang, M. (1988), An Economic Perspective on Escalating Commitment, StrategicManagement Journal, 9, 79-92.

    Thepot, J. (1988), An Optimal Control Contribution to Product Life Cycle Theory,International Journal of Research in Marketing, 5, 271-288.

    Wilson, L. and J. Norton (1989), Optimal Entry Timing For a Product Line Extension,Marketing Science, Winter, 1-17.

    Windrum, P. (2001), Late Entrant Strategies in Technological Ecologies: Microsofts Use ofStandards in the Browser Wars, International Studies of Management and Organization, 31(1), 87-105.

    Zhao, H. (2002), R&D Competition Between an Incumbent and an Entrant: An IntegratedModel of R&D Investment, Performance Improvement, and Time-to-Market, Review ofMarketing Science Working Papers, 2(2), Article 3.

    24 Review of Marketing Science Vol. 1 [2003], Artic