Entry and espionage with noisy signals

نویسندگان

  • Alex Barrachina
  • Yair Tauman
  • Amparo Urbano
چکیده

We analyze industrial espionage in the context of entry deterrence. We consider a monopoly incumbent, who may expand capacity to deter entry, and a potential entrant who owns an inaccurate Intelligence System. The Intelligence System generates a noisy signal on incumbent's actions and the potential entrant decides whether to enter based on this signal. If the precision of the Intelligence System is commonly known, the incumbent will signal‐jam to manipulate the distribution of likely signals and hence the entrant's decisions. Therefore, the incumbent will benefit from his rival's espionage. In contrast, the spying firm (the entrant) will typically gain if the espionage accuracy is sufficiently high and privately known by her. In this setting, the market will be more competitive under espionage.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Novel Method for Detection of Epilepsy in Short and Noisy EEG Signals Using Ordinal Pattern Analysis

Introduction: In this paper, a novel complexity measure is proposed to detect dynamical changes in nonlinear systems using ordinal pattern analysis of time series data taken from the system. Epilepsy is considered as a dynamical change in nonlinear and complex brain system. The ability of the proposed measure for characterizing the normal and epileptic EEG signals when the signal is short or is...

متن کامل

Industrial Espionage with a Noisy Intelligence

We analyze industrial espionage in a model of two firms: a monopoly incumbent, M, and a potential entrant, E, who owns a noisy intelligence system (IS) of a certain precisionα . The IS generates a signal on M’s action and E decides whether or not to enter based on this signal. We show that ifα is commonly known, M is the one who benefits from a perfect IS and E who spies on M prefers a less acc...

متن کامل

Cyber Espionage and Illegitimate Information Retrieval

One of the most serious threats to a modern country’s trade, industry and long-term economic development is cyber espionage and insiders. The activities are directed against high-technological industries and companies with advanced basic research. The defence and telecoms sectors are of particular interest, just as biotechnics, medical and material technology. Behind this kind of espionage ther...

متن کامل

Output-only Modal Analysis of a Beam Via Frequency Domain Decomposition Method Using Noisy Data

The output data from a structure is the building block for output-only modal analysis. The structure response in the output data, however, is usually contaminated with noise. Naturally, the success of output-only methods in determining the modal parameters of a structure depends on noise level. In this paper, the possibility and accuracy of identifying the modal parameters of a simply supported...

متن کامل

Research of Blind Signals Separation with Genetic Algorithm and Particle Swarm Optimization Based on Mutual Information

Blind source separation technique separates mixed signals blindly without any information on the mixing system. In this paper, we have used two evolutionary algorithms, namely, genetic algorithm and particle swarm optimization for blind source separation. In these techniques a novel fitness function that is based on the mutual information and high order statistics is proposed. In order to evalu...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Games and Economic Behavior

دوره 83  شماره 

صفحات  -

تاریخ انتشار 2014