IS

Shor, Mikhael

Topic Weight Topic Terms
0.289 negotiation negotiations using potential power agreement paper bases partners ending negotiators offers visualization messaging instant
0.258 market competition competitive network markets firms products competing competitor differentiation advantage competitors presence dominant structure
0.212 price buyers sellers pricing market prices seller offer goods profits buyer two-sided preferences purchase intermediary
0.175 security threat information users detection coping configuration avoidance response firm malicious attack intrusion appraisal countermeasures
0.143 software development product functionality period upgrade sampling examines extent suggests factors considered useful uncertainty previous
0.130 framework model used conceptual proposed given particular general concept frameworks literature developed develop providing paper
0.121 network networks social analysis ties structure p2p exchange externalities individual impact peer-to-peer structural growth centrality
0.114 e-commerce value returns initiatives market study announcements stock event abnormal companies significant growth positive using
0.103 participation activities different roles projects examined outcomes level benefits conditions key importance isd suggest situations

Focal Researcher     Coauthors of Focal Researcher (1st degree)     Coauthors of Coauthors (2nd degree)

Note: click on a node to go to a researcher's profile page. Drag a node to reallocate. Number on the edge is the number of co-authorships.

Galbreth, Michael R. 2 March, Salvatore T. 1 Scudder, Gary D. 1
business-to-business e-commerce 1 e-marketplace 1 game theory 1 network externalities 1
network effect 1 software selection 1

Articles (2)

THE IMPACT OF MALICIOUS AGENTS ON THE ENTERPRISE SOFTWARE INDUSTRY. (MIS Quarterly, 2010)
Authors: Abstract:
    In this paper, a competitive software market that includes horizontal and quality differentiation, as well as a negative network effect driven by the presence of malicious agents, is modeled. Software products with larger installed bases, and therefore more potential computers to attack, present more appealing targets for malicious agents. One finding is that software firms may profit from increased malicious activity. Software products in a more competitive market are less likely to invest in security, while monopolistic or niche products are likely to be more secure from malicious attack. The results provide insights for IS managers considering enterprise software adoption.
A Game-Theoretic Model of E-Marketplace Participation Growth. (Journal of Management Information Systems, 2005)
Authors: Abstract:
    Despite their potential to significantly reduce transaction costs for both buyers and sellers, e-marketplaces have struggled. Recent literature has examined the value propositions of e-marketplaces and proposed conceptual frameworks for their analysis. In this research, we move beyond conceptual analysis by developing a game-theoretic model of return on-investment (ROI)-driven e-marketplace participation growth. This model provides insights into expected e-marketplace growth and participation, and can be used to determine both the viability and expected long-run size of a given e-marketplace. Our results indicate that the pricing policy of the e-market-place intermediary can affect the rate at which participation grows and, therefore, sentiment about its prospects. We focus on e-marketplaces that add value to buyers and sellers by increasing the efficiency of administrative tasks but also simultaneously add value to buyers and reduce value to sellers by lowering prices for goods purchased. Value to participants in these e-marketplaces is determined by the volume of transactions that can be conducted using the e-marketplace, resulting in a two-sided network effect-buyers reacting to sellers and sellers reacting to buyers. The game-theoretic model identifies an e marketplace equilibrium at which participation growth is predicted to stop.