Asymmetric Interaction in Competitive Internet Technology Diffusion: Implications for the Competition Between Local and Multinational Online Vendors

نویسندگان

  • Peijian Song
  • Cheng Zhang
  • Yunjie Calvin Xu
  • Ling Xue
  • Ke Wang
چکیده

This paper explores the diffusion of competitive Internet technology products in the context of competition between local and multinational corporations as well as how the diffusive interactions between technologies affect their dominance in electronic markets. Drawing on existing theories of innovation diffusion, and competitive dynamics, the authors adopted a new diffusion model that incorporates the influence of one technology’s adoption on the diffusion of other technology. The authors then validated the model using longitudinal field data of the two pairs of Internet technology products in Chinese electronic markets. The findings of this investigation suggest that Internet product diffusion can be better predicted by a competitive dynamic model than by an independent-diffusion-process model. Further, results indicate that the diffusive interaction between local and multinational corporations’ technologies can be a two-way asymmetric interaction. Such a pattern supports a conclusion of significant second-mover advantage for local online vendors in fast-growing emerging markets. The authors also examine the policy implications of these results, specifically with respect to how asymmetric interaction effects can help domestic online vendors gain second-mover advantage facing the entry of multinational corporations.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Micro Move of Competitive Internet Technology Diffusion: How Firms' Actions Could Help?

This research explores the extent to which Internet technology firms’ competitive actions shape the diffusion of their respective products in competition with rivals. Combining competitive dynamics perspective with technology diffusion, we extend macro innovation diffusion model by incorporating four micro-level firm actions, including firms’ competitive intensity, action timing, action simplic...

متن کامل

DYNAMIC COMPLEXITY OF A THREE SPECIES COMPETITIVE FOOD CHAIN MODEL WITH INTER AND INTRA SPECIFIC COMPETITIONS

The present article deals with the inter specific competition and intra-specific competition among predator populations of a prey-dependent three component food chain model consisting of two competitive predator sharing one prey species as their food. The behaviour of the system near the biologically feasible equilibria is thoroughly analyzed. Boundedness and dissipativeness of the system are e...

متن کامل

Street Garment Vendors’ Contribution to the Economy and Local Community: An Empirical Study to the Street Garments Vendors in Dhaka City, Bangladesh

The street garment vendors are playing a significant role in the fields of the economic development through protecting resources (garment products) from such a position where they are treated as wastes; very much less valued products and creating the opportunity for self-employment. This study aimed at showing the economic contribution and the impact of the street vendors to the local community...

متن کامل

Developing a new stochastic competitive model regarding inventory and price

Within the competition in today’s business environment, the design of supply chains becomes more complex than before. This paper deals with the retailer’s location problem when customers choose their vendors, and inventory costs have been considered for retailers. In a competitive location problem, price and location of facilities affect demands of customers; consequently, simultaneous optimiza...

متن کامل

A Mutual Authentication Method for Internet of Things

Today, we are witnessing the expansion of various Internet of Things (IoT) applications and services such as surveillance and health. These services are delivered to users via smart devices anywhere and anytime. Forecasts show that the IoT, which is controlled online in the user environment, will reach 25 billion devices worldwide by 2020. Data security is one of the main concerns in the IoT. ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • JGIM

دوره 19  شماره 

صفحات  -

تاریخ انتشار 2011