How To Understand The Implications Of Cybersecurity On A Vertically Integrated Firm



Similar documents
Theoretical Tools of Public Economics. Part-2

All these models were characterized by constant returns to scale technologies and perfectly competitive markets.

Practice Questions Week 8 Day 1

Problems: Table 1: Quilt Dress Quilts Dresses Helen Carolyn

Information Exchanges Among Firms and their Impact on Competition*

Demand, Supply and Elasticity

POTENTIAL OUTPUT and LONG RUN AGGREGATE SUPPLY

Chapter 04 Firm Production, Cost, and Revenue

MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question.

Practice Problems on the Capital Market

Slutsky Equation. M. Utku Ünver Micro Theory. Boston College. M. Utku Ünver Micro Theory (BC) Slutsky Equation 1 / 15

Total Hours Revenue Open (dollars) 1 $

Oligopoly: How do firms behave when there are only a few competitors? These firms produce all or most of their industry s output.

INTRODUCTION THE LABOR MARKET LABOR SUPPLY INCOME VS. LEISURE THE SUPPLY OF LABOR

CALIFORNIA POLICY BRIEFING MEMO MOTOR VEHICLE FUEL DIVERSIFICATION

NNIT Cybersecurity. A new threat landscape requires a new approach

UNIVERSAL STORAGE CONTAINERS LLC New York Beijing Atlanta. The Leader in Portable Moving & Storage. USC Housing Box

How To Protect Your Data From Being Hacked

ANSWERS TO END-OF-CHAPTER QUESTIONS

Economic Growth and Government Size. Mark Pingle Professor of Economics University of Nevada, Reno. and

Microeconomics Instructor Miller Practice Problems Labor Market

Hyun-soo JI and Ichiroh DAITOH Tohoku University. May 25, Abstract

An Information Security and Privacy Perspective for Procurement Services Projects

ANTITRUST GUIDELINES FOR HORIZONTAL COLLABORATIONS AMONG COMPETITORS:

A2 Micro Business Economics Diagrams

Chapter 12. Unemployment. covered in the final exam) 12-1 History of Unemployment in the New Zealand. discouraged and underemployed workers.

CE2451 Engineering Economics & Cost Analysis. Objectives of this course

Practice Questions Week 2 Day 1 Multiple Choice

UNITED STATES OF AMERICA BEFORE THE FEDERAL ENERGY REGULATORY COMMISSION

Basic Monopoly Theory

Practice Multiple Choice Questions Answers are bolded. Explanations to come soon!!

Problem Set #5-Key. Economics 305-Intermediate Microeconomic Theory

Jacob: If there is a tax, there is a dead weight loss; why do we speak of a social gain?

ECON 312: Oligopolisitic Competition 1. Industrial Organization Oligopolistic Competition

Product Differentiation In homogeneous goods markets, price competition leads to perfectly competitive outcome, even with two firms Price competition

MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question.

11 PERFECT COMPETITION. Chapter. Competition

Chapter 4. Specific Factors and Income Distribution

MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question.

Developing a National Strategy for Cybersecurity FOUNDATIONS FOR SECURITY, GROWTH, AND INNOVATION. Cristin Flynn Goodwin J.

Fair Competition Commission. THE FAIR COMPETITION COMMISSION PROCEDURE RULES, 2013 Rule 33(2) MERGER NOTIFICATION (Application for Merger Clearance)

Second Hour Exam Public Finance Fall, Answers

Non Sequitur by Wiley Miller

Foreclosure, Entry, and Competition in Platform Markets with Cloud

A Dynamic Analysis of Price Determination Under Joint Profit Maximization in Bilateral Monopoly

Figure 4-1 Price Quantity Quantity Per Pair Demanded Supplied $ $ $ $ $10 2 8

National Cyber Security Policy -2013

Optimal Health Insurance for Prevention and Treatment

Mitigating and managing cyber risk: ten issues to consider

Oligopoly: Cournot/Bertrand/Stackelberg

Advancing Cyber Security Using System Dynamics Simulation Modeling for System Resilience, Patching, and Software Development

Market structures. 18. Oligopoly Gene Chang Univ. of Toledo. Examples. Oligopoly Market. Behavior of Oligopoly. Behavior of Oligopoly

17. If a good is normal, then the Engel curve A. Slopes upward B. Slopes downward C. Is vertical D. Is horizontal

or, put slightly differently, the profit maximizing condition is for marginal revenue to equal marginal cost:

HEALTH CARE AND CYBER SECURITY:

Global Network and Application Security Testing Market An Overview of Emerging Trends and Growth Opportunities For Test Solution Vendors

Pre-Test Chapter 15 ed17

QUANTITATIVE MODEL FOR INFORMATION SECURITY RISK MANAGEMENT

MODULE 62: MONOPOLY & PUBLIC POLICY

Cybersecurity: Protecting Your Business. March 11, 2015

Chapter 6 Economic Growth

Lockheed Martin Corporation

Chapter 8 Application: The Costs of Taxation

Pre Test Chapter DVD players and DVDs are: A. complementary goods. B. substitute goods. C. independent goods. D. inferior goods.

Cyber Security for Advanced Manufacturing Next Steps

How To Write A Cybersecurity Framework

An increase in the number of students attending college. shifts to the left. An increase in the wage rate of refinery workers.

Chapter 16 THE FOREIGN EXCHANGE MARKET AND TRADE ELASTICITIES

CONSULTING IMAGE PLACEHOLDER

CALIFORNIA ISO. Pre-dispatch and Scheduling of RMR Energy in the Day Ahead Market

Managerial Economics Prof. Trupti Mishra S.J.M. School of Management Indian Institute of Technology, Bombay. Lecture - 13 Consumer Behaviour (Contd )

Shaping. Business Strategy. Through. Competitive Intelligence. Strategic Use of. Intellectual Property Information

Study Questions for Chapter 9 (Answer Sheet)

Phone: Fax:

A Primer on Exchange Rates and Exporting WASHINGTON STATE UNIVERSITY EXTENSION EM041E

Agenda. Productivity, Output, and Employment, Part 1. The Production Function. The Production Function. The Production Function. The Demand for Labor

Exercises Lecture 8: Trade policies

1. Supply and demand are the most important concepts in economics.

CHAPTER 18 MARKETS WITH MARKET POWER Principles of Economics in Context (Goodwin et al.)

Chapter 27: Taxation. 27.1: Introduction. 27.2: The Two Prices with a Tax. 27.2: The Pre-Tax Position

Who gains and who loses from an import tariff? An export tax? (Assume world prices are fixed).

Lecture 7: Policy Design: Health Insurance & Adverse Selection

High Level Cyber Security Assessment 2/1/2012. Assessor: J. Doe

Ch 1 - Conduct Market Research for Price Analysis

Regulation. E. Glen Weyl. Lecture 9 Price Theory and Market Design Fall University of Chicago

EY Cyber Security Hacktics Center of Excellence

UNIVERSITY OF CALICUT MICRO ECONOMICS - II

Big Data, Big Risk, Big Rewards. Hussein Syed

Transcription:

Cybersecurity, industrial organization, and competition policy Michael Riordan Columbia University 7/5/14 CRESSE 2014 1

7/5/14 CRESSE 2014 2

C Chinese Army Unit Is Seen as Tied to Hacking Against U.S. New York Times February 18, 2013 7/5/14 CRESSE 2014 3

7/5/14 CRESSE 2014 4

7/5/14 CRESSE 2014 5

7/5/14 CRESSE 2014 6

Trend toward outsourcing Reliance on networks specialized suppliers Motivated by cost reduction Lower labor costs (offshoring) Product and process innovation June 19, 2013 Dusseldorf/DICE workshop 7

Why U.S. Manufacturing Is Poised for a Comeback (Maybe), Wall Street Journal, June 1, 2014 the number of factory jobs has started to rise after plunging for decades, edging up by about 600,000 over the past four years to more than 12 million Boston Consulting Group estimates that China's overall manufacturing- cost advantage has shrunk to just 4%. companies' desire to produce goods closer to their customers 7/5/14 CRESSE 2014 8

Will re- shoring of manufacturing emphasize outsourcing or vertical integration? How does cybersecurity matter? 7/5/14 MaCCI 2014 9

Does competition over ideas (as well as prices) encourage vertical integration? Do cybersecurity concerns give new encouragement to vertical integration? Do vertical mergers motivated by cybersecurity raise competition policy concerns? 7/5/14 MaCCI 2014 10

Does competition over ideas (as well as prices) encourage vertical integration? NO Do cybersecurity concerns give new encouragement to vertical integration? YES Does vertical integration motivated by cybersecurity raise competition policy concerns? TO THE CONTRARY 7/5/14 MaCCI 2014 11

Outline I. Security interdependence Riordan (2014) Notes on Partnership Security, preliminary draft II. Vertical integration vs. outsourcing Loertscher and Riordan (2014), Oursourcing, Vertical Integration, and Cost Reduction, preliminary draft. III. Industrial organization and competition policy implications Allain, Chambolle & Rey (2011), Vertical Integration, Information, and Foreclosure, working paper. 7/5/14 CRESSE 2014 12

Part I: Security interdependence Model Elements Firms have heterogeneous incentives to take precautions. Firms face security risks both from direct attacks and from indirect attacks via business partners. More difficult to protect against indirect attacks. There is a positive externality of security investments. 7/5/14 CRESSE 2014 13

Risk is a function of threat, vulnerability, and consequences. α x θ 7/5/14 CRESSE 2014 14

Companies risking larger losses have an incentive for greater precautions. α x 1 θ 2 θ 1 x 2 α 7/5/14 CRESSE 2014 15

Cybersecurity is interdependent. α x 1 y 1 β y 2 θ 2 θ 1 x 2 α 7/5/14 CRESSE 2014 16

Simplifying assumptions: Composite security y i = ϕx i with 0 ϕ 1 Diminishing returns to investments quadratic investment costs θ i not too large Well- behaved social welfare function 7/5/14 CRESSE 2014 17

Results about cybersecurity: Strategic dependence: Best responses curves might slope either upward or downward, depending vulnerability to indirect attacks and the magnitude of expected losses. Equilibrium extenalities: There is a unique equilibrium at the intersection of the best response curves. If investments are strategic complements, then investments providing less than complete security are deficient relative to the social optimum. If investments are strategic substitutes for Firm 1, and expected losses are sufficiently asymmetric, then Firm 1 s investment may be above the socially optimal level. 7/5/14 CRESSE 2014 18

1.0 Strategic Complements Case: Ha=0.9, b=0.6, f=0.4, c=0.1, q 1 =0.5, q 2 =0.6L 0.8 Best Responses Social Best Responses Firm 1 Precautions 0.6 0.4 0.2 0.2 0.4 0.6 0.8 1.0 Firm 2 Precautions 7/5/14 CRESSE 2014 19

Part II: Vertical integration vs. outsourcing Model Elements Vertical integration occurs in a multilateral supply setting, in which potential suppliers invest in cost- reduction and compete on price. Vertical integration creates a preferred supplier. A vertically- integrated firm sources internally whenever it is cost- effective to do so, but cannot control the investment of independent suppliers. By distorting sourcing in favor of internal supply, vertical integration creates a tradeoff between avoiding markups and discouraging the investments of independent suppliers. 7/5/14 MaCCI 2014 20

Timing of decisions Customer v Supplier 1 Supplier 2. Supplier n Ψ(x 1 ) Ψ(x 2 ) Ψ(x n ) c 1 ~ F(c,x 1 ) c 2 ~ F(c,x 2 ) c n ~ F(c,x n ) B(c 1 ) or c 1 B(c 2 ) B(c n ) 7/5/14 CRESSE 2014 21

Simplifying assumptions: Inelastic demand v = Constant marginal cost of design effort Ψ(x) = ½ x 2 Design effort shifts mean of cost distribution G(c+x) Exponential cost distribution G(c) = 1- e - μ(c- β) 7/5/14 CRESSE 2014 22

Results about vertical integration: Efficient symmetric equilibrium investments if cost variance is sufficient. Vertical integration distorts the sourcing decision and reallocates investments in favor of internal supply. Vertical integration is disfavored if there is sufficient upstream competition. Not too much cost variance Sufficient number of potential suppliers 7/5/14 CRESSE 2014 23

Vertical divestiture is profitable if there is enough upstream competition. 0.02 Procurement cost under vertical integration + Investment cost of integrated supplier + Acquisition price of integrated supplier - Procurement cost under outsourcing 0.01 0.00 n = 12 0.2 0.4 0.6 0.8 1.0 μ -0.01 n = 10 n = 8 n =6-0.02 7/5/14 CRESSE 2014 24

Part III: Industrial organization implications Interdependent cybersecurity encourages vertical integration A vertically integrated firm internalizes the positive externality of improved security. There also may be economies of scope in security. A vertically integrated firm exploiting economies of scope might become more vulnerable to attack. Still, positive net benefits of internalizing the externality should prevail if selective intervention is possible. 7/5/14 CRESSE 2014 25

Competition policy implications Vertically integrated supplier has poor incentive to prevent internal information leakage, which raises rivals costs. U 1 U 2 D 1 D 2 Cf. Allain, Chambolle, and Rey (2011), Vertical integration, Information, and Foreclosure 7/5/14 CRESSE 2014 26

External cyber- espionage threats raise additional security concerns. U 1 U 2 D 1 D 2 D 3 7/5/14 CRESSE 2014 27

Improved cybersecurity as an efficiency defense Better incentives for security against external threats could outweigh concerns about internal information leakage. Economies of scope in the provision of security could improve safeguards against internal breaches: more effective firewalls; better access control; improved monitoring and forensics. 7/5/14 CRESSE 2014 28

Conclusions Suppliers compete on ideas as well as price. Markup avoidance incentives for vertical integration are counterweighed by an investment discouragement effect. Vertical integration internalizes positive externalities in the provision of cybersecurity. Improved cybersecurity is a ready- made efficiency defense against alleged input foreclosure from a vertical merger. 7/5/14 CRESSE 2014 29

Other Competition Policy Issues Collaborations between competitors Horizontal mergers 7/5/14 CRESSE 2014 30

Thank you! 7/5/14 CRESSE 2014 31