Information Rules: A Strategic Guide to the Network Economy By

advertisement
Information Rules:
A Strategic Guide to the Network Economy
By
Carl Shapiro and Hal R. Varian
Reviewed By:
Amit Sharma
INF385Q – Fall 2005
University of Texas at Austin
Topics
•
•
•
•
•
•
About Authors
Definitions in Economy
Theme of the Book
Information Policy
Example – Battle of Browsers
Critique
About Authors
“The books that help you the most are the ones that make you think the most”
- Theodore Parker
 Carl Shapiro :
He is the Transamerica Professor of Business Strategy at the
Haas School of Business at UC - Berkeley . He also is The
Director of the Institute of Business and Economic Research,
and Professor of Economics in the Economics Department,
at UC Berkeley.
 Hal R. Varian:
He is the Dean of the School of Information Management
and Systems at UC Berkeley. He is also a professor in the Haas
School of Business, a Professor in the Economics Department.
The Information Economy
Economy:
All the activities involved in the production and distribution
of goods and services.
Information Economy:
It is an economy based on the exchange of knowledge
information and services rather than physical goods
and services.
The Information Economy (2)
Information:
Any Essentially, anything that can be digitized—encoded as a
stream of bits—is information. E.g. baseball scores, books, databases,
magazines, movies, music and Web pages are all information goods.
The book focuses on the value of information to different consumers.
Cost of Producing Information:
“ Information is costly to produce but cheap to reproduce.”
Theme of the Book:
3 Strategies for Information Economy:
1)
Differentiation of Product and Services.
2)
Lock – In.
3)
Positive feedback.
Differentiation of Products
and Services
Strategies used:
a) Mass Customization
b) Differential Pricing
e.g.
c) Personalized Content
d) Versioning
How to design your "product
line"?
1) Offer Versions
Dimensions: Delay, User Interfaces ,Image Resolution, Speed of Operation,
Format, Capability, Features, comprehensiveness, support
2) Principle of “self-selection” :
Design these versions to accentuate the needs of different groups of customers.
Lock In Cycle
Phase 4
Lock-In
Phase 1
Brand Selection
Phase 3
Entrenchment
Phase 2
Sampling
Lock In
How do Buyers Recognize that they are in Lock In?
• Contractual Commitments
• Durable purchases
• Brand specific Training
• Information and Databases e.g. CD and DVD
• Specialized suppliers.
• Search costs. e.g. Travel Agent, Insurance Agent etc.
• Loyalty Programs
Managing Lock- In for Buyers
How to avoid Lock-In?
• Bargain for initial sweeteners, such as discounts or support
for switching from your previous system.
• Don't be too anxious.
• Depict yourself as an attractive customer down the road
• Seek protection from monopolistic exploitation
• Keep your options open via second sourcing
• Watch out for creeping lock-in, and retain information
about usage records.
Managing Lock-In for Sellers
• Be prepared to invest to build an installed base through
promotions and by offering up-front discounts.
• Cultivate influential buyers and buyers with high switching
costs.
• Design your products and your pricing to get your
customers to invest in your technology, thereby raising
their own switching costs.
• Maximize the value of your installed base by selling your
customers complementary products and by selling access
to your installed base.
Positive Feedback
“ Positive feedback makes the strong grow
stronger . . . and the weak grow weaker.”
Positive Feedback (cont.)
How it Helps?
1) Adoption dynamics in the presence of positive feedback tend to
follow a predictable pattern. e.g. NES
2) Consumers value information technologies that are widely used,
just as they value communications networks with broad reach.
3) Positive feedback works to the advantage of large networks and
against small networks.
Positive Feedback (cont.)
• Generic strategies for innovators in
network markets:
Control
Compatibility
Performance
Openness
Controlled Migration
Open Migration
e.g. Win 98 and Intel PII
e.g. Modems
Performance Play
e.g. Nintendo Entertainment System
Discontinuity
e.g. CD Audio and Floppy Drive
Information Policy
• Don't expect the government's role to diminish.
• Every company needs to know the rules of
competition.
• Companies have considerable freedom to engage
in differential pricing.
• Competition policy is intended to ensure a fair
fight, not to punish winners or protect losers.
Information Policy
• Don't be afraid of cooperating with other
companies to set standards and develop new
technologies, so long as your efforts are designed
to bring benefits to consumers.
• If you are fortunate enough to gain a leading share
of the market, be sure to conduct an audit of your
practices.
Battle of the Browsers
Netscape
Microsoft
Preemption
•
Head start with Navigator in 1995, most
companies had already installed their
software
•
Microsoft came with IE in 1998 and
marketed through OEM, ISP etc.
•
Made IE free online and making it Default
Browser.
•
Investing heavily on User Interface
Penetration Pricing
•
Made browser available free of charge,
pioneered the idea of Plug-Ins ( third
party software )
•
Earns revenue through its other products
e.g. Netscape Web site
Battle of the Browsers (cont.)
Netscape
Microsoft
Expectation mgmt:
•
Netscape has partnered with
100 industrial companies in
order to bundle their product
•
Integrating IE in Windows OS
and making user believe that
they do not have a need to
install a new browser.
•
Microsoft as stated earlier has
already developed alliances
with OEM,ISP and Content
Providers by providing Financial
Schemes
Alliances:
•
Netscape and Sun
Microsystems are strong allies,
with Netscape supporting Sun's
Java and Sun helping lend
credibility to Netscape
Critique
• The definition of Information on which the book focuses is very
broad according to author.
• Authors fail to mention about the importance of Sales and Marketing
in an economy .
• Third party role in Information Economy is not taken into
consideration.
• An economy is not complete until its unit of transactions are defined.
The author fail to define how to estimate the value of a product
which is available in bits form.
THANK YOU
Download