Small suppliers often face challenges to obtain financing for their operations. Especially in developing economies, traditional financing methods can be very costly or unavailable for such suppliers. In order to reduce channel costs, in recent years large buyers started to implement their own financing methods that intermediate between suppliers and financing institutions. In this paper, we analyze the role and efficiency of buyer intermediation in supplier financing (BIF). Building a theoretical model, we show that without buyer intermediation, traditional supplier financing can be inefficient and can significantly reduce supply chain performance. Using data from a large Chinese online retailer, we demonstrate that BIF induces lower wholesale prices and higher order quantities. Through structural regression estimation, we demonstrate that the retailer overestimates the demand by 10-15%. We also show that the financed suppliers have cash positions of only about 56% of their operating costs, and that BIF improved channel profits by approximately 16.7%, yielding significant annual savings for the retailer.
We study the effect of downstream competition on incentives for demand forecast investments in supply chains. We show that with common pricing schemes, such as wholesale price or two-part tariffs, downstream firms under Cournot competition overinvest in demand forecasting. Analyzing the determinants of overinvestment, we demonstrate that under wholesale price contracts and two-part tariffs, total demand forecast investment can be very significant, and as a result, the supply chain can suffer substantial losses. We show that an increased number of competing retailers and uncertainty in consumer demand tend to increase inefficiency, whereas increased consumer market size and demand forecast costs reduce the loss in supply chain surplus. We identify the causes of inefficiency, and to coordinate the channel with forecast investments, we explore contracts in the general class of market-based contracts used in practice. When retailers' forecast investments are not observable, such a contract that employs an index-price can fully coordinate the supply chain. When forecast investments are observable to others, however, the retailers engage in an "arms race" for forecast investment, which can result in a significant increase in overinvestment and reduction in supply chain surplus. Furthermore, in that case, simple market-based contracts cannot coordinate the supply chain. To solve this problem, we propose a uniform-price divisiblegood auction-based contracting scheme, which can achieve full coordination when forecast investments are observable. We also demonstrate the desirable properties for implementability of our proposed coordinating contracting schemes, including incentive-compatible and reliable demand forecast information revelation by the retailers, and being regret-free.
We study the effect of user incentives on software security in a network of individual users under costly patching and negative network security externalities. For proprietary software or freeware, we compare four alternative policies to manage network security: (i) consumer self-patching (where no external incentives are provided for patching or purchasing); (ii) mandatory patching; (iii) patching rebate; and (iv) usage tax. We show that for proprietary software, when the software security risk and the patching costs are high, for both a welfare-maximizing social planner and a profit-maximizing vendor, a patching rebate dominates the other policies. However, when the patching cost or the security risk is low, self-patching is best. We also show that when a rebate is effective, the profit-maximizing rebate is decreasing in the security risk and increasing in patching costs. The welfare-maximizing rebates are also increasing in patching costs, but can be increasing in the effective security risk when patching costs are high. For freeware, a usage tax is the most effective policy except when both patching costs, and security risk are low, in which case a patching rebate prevails. Optimal patching rebates and taxes tend to increase with increased security risk and patching costs, but can decrease in the security risk for high-risk levels. Our results suggest that both the value generated from software and vendor profits can be significantly improved by mechanisms that target user incentives to maintain software security.information systems, IT policy and management, network economics, economics of IS
In a variety of industries ranging from agriculture to electronics and oil, procurement takes place through a combination of bilateral fixed-price contracts and open market trading among supply chain participants, which allows them to improve supply chain performance by utilizing new demand and cost information. The strategic behavior of the participants in these markets interacts with the way fixed-price contracts are formulated and significantly affects supply chain efficiency. In this paper, we develop a strategic model that allows endogenous price formation in an industrial spot market where supply chain participants have private information. Utilizing the model, we analyze the equilibrium of a dynamic game between a single supplier and multiple manufacturers who first contract with the supplier at a fixed price and then trade on a spot market. We study how such trading affects supply chain performance and show that it does not eliminate fixed-price contracting even though the fixed price is determined under inferior information. We find that it reduces prices, increases the quantities produced, and improves supply chain profits and consumer surplus. However, depending on the information structure of the supply chain, spot trading may make either the supplier or the manufacturers worse off. Our results show how the informational regime affects the profitability of supply chain participants and the allocation of quantities between the procurement venues. We show that beyond a threshold level, the effect of increasing supply uncertainty, or decreasing either the demand uncertainty or the information asymmetry among the manufacturers, is to increase the percentage procured on the spot market as well as the overall quantity procured and sold, and to decrease prices. As the number of manufacturers increases, procurement shifts from fixed-price contracting to spot trading and in the limit, the supply chain is both fully coordinated and informationally efficient. We also show that in many cases, the supplier may gain strategic advantage by sharing some of her cost information with the manufacturers.spot trading, demand and cost information, procurement and supply chain, fixed-price contracts
We examine the competition between procurement auctions and long-term relational contracts that emerges from the increased usage of electronic marketplaces. Procurement auctions create supply chain efficiencies by selecting the least costly bidder, and long-term relational contracts ensure the quality of the procured products or services when these have nonverifiable attributes. The following two-layer supply chain model is analyzed: Suppliers of an industrial part with nonverifiable quality trade with several manufacturers that utilize that part in the production of an end product. A price-based reverse auction is used for the procurement of low-quality parts, and a relational long-term contract is used for high-quality parts. A formal model of the competition between the two procurement models identifies conditions under which the two coexist, and conditions under which one will push the other out of the market. Market and product parameters that increase the relative economic appeal of the relational contract are determined. It is demonstrated that the competition from the auction market can either facilitate or undermine the relational contract compared with a benchmark case of a monopolist supplier. This implies that competition between the two procurement models plays an important role in the supply of high-quality products.supply chain management, procurement auctions, relational contracting, quality differentiation
We examine the procurement process selection problem of a large industrial buyer who employs reverse auctions for awarding procurement contracts. We contrast two classes of commonly used strategies under multiple sourcing; namely, single-stage reverse auctions, and two-stage processes where price-quantity adjustments between the buyer and the suppliers follow a first-stage reverse auction. Deriving bounds of efficiency for these two classes of procurement processes under convex supplier production costs, we present insights on the conditions under which each class is preferable for the buyer. Considering the effect of contracting and processing costs, a single-stage process is likely to be preferable to a two-stage process when the number of bidding suppliers is high, especially when capacity is rigid. A two-stage process with one information transfer in the second stage may be the preferred procurement mode when production is highly scalable, i.e., when the marginal production cost increase with increased production is small. When the number of suppliers is low, the effect of a decrease in production scalability depends on the current scalability level. For high scalability levels, a decrease in production scalability may decrease the efficiency of both single-stage and simple two-stage processes, whereas for low scalability levels, it tends to increase efficiency for both of these process classes. A decrease in production costs makes employing simple processes more attractive when production is highly scalable or when supplier capacity is rigid. For intermediate production scalability, however, a cost decrease may make employing two-stage processes with multiple information transfers in the second round preferable for the buyer.procurement auctions, supply chain management, contracting, multiple sourcing
In recent years, vendor liability for software security vulnerabilities has been the center of an important debate in the software community and a topic gaining government attention in legislative committees and hearings. The importance of this question surrounding vendor security liability is amplified when one considers the increasing emergence of zero-day attacks where hackers take advantage of vulnerabilities before the software vendor has a chance to release protective patches. In this paper, we compare the effectiveness of three software liability policies: vendor liability for damages, vendor liability for patching costs, and government imposed security standards. We find that vendor liability for losses is not effective in improving social welfare in the short run, while liability for patching costs can be effective if either patching costs are large and the likelihood of a zero-day attack is low, or patching costs are small and zero-day likelihood is high. In the long run, when the vendor can invest in reducing the likelihood of security vulnerabilities, loss liability is still ineffective when the zero-day attack probability is high but can increase both vendor investment in security and social welfare when zero-day attack likelihood is sufficiently low. When the zero-day attack probability is high, patch liability is ineffective if user patching costs are large, but partial patch liability can boost vendor investment and improve welfare when patching costs are small. In contrast, in an environment with low zero-day attack probability, full vendor patch liability can be optimal. Finally, comparing the effectiveness of the three liability policies under study, we find that government imposed standards on software security investment can be preferable to both patching and loss liability on the vendor, if zero-day attack likelihood is sufficiently low. However, if zero-day attacks are a common occurrence and patching costs are not too high, partial patch liability is the most effective policy. This paper was accepted by Sandra Slaughter, information systems.IT policy and management, economics of IS, network economics, enabling technologies, software, liability, zero-day
W e study the question of whether a software vendor should allow users of unlicensed (pirated) copies of a software product to apply security patches. We present a joint model of network software security and software piracy and contrast two policies that a software vendor can enforce: (i) restriction of security patches only to legitimate users or (ii) provision of access to security patches to all users whether their copies are licensed or not. We find that when the software security risk is high and the piracy enforcement level is low, or when tendency for piracy in the consumer population is high, it is optimal for the vendor to restrict unlicensed users from applying security patches. When piracy tendency in the consumer population is low, applying software security patch restrictions is optimal for the vendor only when the piracy enforcement level is high. If patching costs are sufficiently low, however, an unrestricted patch release policy maximizes vendor profits. We also show that the vendor can use security patch restrictions as a substitute to investment in software security, and this effect can significantly reduce welfare. Furthermore, in certain cases, increased piracy enforcement levels can actually hurt vendor profits. We also show that governments can increase social surplus and intellectual property protection simultaneously by increasing piracy enforcement and utilizing the strategic interaction of piracy patch restrictions and network security. Finally, we demonstrate that, although unrestricted patching can maximize welfare when the piracy enforcement level is low, contrary to what one might expect, when the piracy enforcement level is high, restricting security patches only to licensed users can be socially optimal.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.