Experimental Evidence on Predatory Pricing Policies
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Amazon's Antitrust Paradox
LINA M. KHAN Amazon’s Antitrust Paradox abstract. Amazon is the titan of twenty-first century commerce. In addition to being a re- tailer, it is now a marketing platform, a delivery and logistics network, a payment service, a credit lender, an auction house, a major book publisher, a producer of television and films, a fashion designer, a hardware manufacturer, and a leading host of cloud server space. Although Amazon has clocked staggering growth, it generates meager profits, choosing to price below-cost and ex- pand widely instead. Through this strategy, the company has positioned itself at the center of e- commerce and now serves as essential infrastructure for a host of other businesses that depend upon it. Elements of the firm’s structure and conduct pose anticompetitive concerns—yet it has escaped antitrust scrutiny. This Note argues that the current framework in antitrust—specifically its pegging competi- tion to “consumer welfare,” defined as short-term price effects—is unequipped to capture the ar- chitecture of market power in the modern economy. We cannot cognize the potential harms to competition posed by Amazon’s dominance if we measure competition primarily through price and output. Specifically, current doctrine underappreciates the risk of predatory pricing and how integration across distinct business lines may prove anticompetitive. These concerns are height- ened in the context of online platforms for two reasons. First, the economics of platform markets create incentives for a company to pursue growth over profits, a strategy that investors have re- warded. Under these conditions, predatory pricing becomes highly rational—even as existing doctrine treats it as irrational and therefore implausible. -
The Three Types of Collusion: Fixing Prices, Rivals, and Rules Robert H
University of Baltimore Law ScholarWorks@University of Baltimore School of Law All Faculty Scholarship Faculty Scholarship 2000 The Three Types of Collusion: Fixing Prices, Rivals, and Rules Robert H. Lande University of Baltimore School of Law, [email protected] Howard P. Marvel Ohio State University, [email protected] Follow this and additional works at: http://scholarworks.law.ubalt.edu/all_fac Part of the Antitrust and Trade Regulation Commons, and the Law and Economics Commons Recommended Citation The Three Types of Collusion: Fixing Prices, Rivals, and Rules, 2000 Wis. L. Rev. 941 (2000) This Article is brought to you for free and open access by the Faculty Scholarship at ScholarWorks@University of Baltimore School of Law. It has been accepted for inclusion in All Faculty Scholarship by an authorized administrator of ScholarWorks@University of Baltimore School of Law. For more information, please contact [email protected]. ARTICLES THE THREE TYPES OF COLLUSION: FIXING PRICES, RIVALS, AND RULES ROBERTH. LANDE * & HOWARDP. MARVEL** Antitrust law has long held collusion to be paramount among the offenses that it is charged with prohibiting. The reason for this prohibition is simple----collusion typically leads to monopoly-like outcomes, including monopoly profits that are shared by the colluding parties. Most collusion cases can be classified into two established general categories.) Classic, or "Type I" collusion involves collective action to raise price directly? Firms can also collude to disadvantage rivals in a manner that causes the rivals' output to diminish or causes their behavior to become chastened. This "Type 11" collusion in turn allows the colluding firms to raise prices.3 Many important collusion cases, however, do not fit into either of these categories. -
Predatory Pricing, a Case Study: Matsushita Electric Industries Co. V. Zenith Radio Corporation
PREDATORY PRICING, A CASE STUDY: MATSUSHITA ELECTRIC INDUSTRIES CO. V. ZENITH RADIO CORPORATION M. STEVEN WAGLE INTRODUCTION There is an abundance of predatory pricing theories. Scholars have created a barrage of rules and thresholds designed to detect un- lawful predatory practices. The most influential work on predatory practice was written almost thirty years ago by John S. McGee.1 Mc- Gee showed that although it was widely believed that the Standard Oil Company used predatory pricing in its virtual monopolization of the oil refining market, there was no hard evidence to show that Standard Oil in fact employed such pricing. Since McGee, many scholars have reviewed the theories of pric- ing, and recent literature on the law and economics of antitrust has devoted increasing attention to this issue.2 There has also been an outpouring of cost-based rules appearing in court opinions dealing with predatory pricing.3 These rules can essentially be attributed to t J.D., Washburn University, 1986; M.A., Wichita State University, 1986; B.A., Unmversity of Kansas, 1980. Law clerk to the Hon. John K. Pearson, Wichita, Kansas. I would like to thank Dr. Philip Hersch, Professor of Economics, Wichita State Umver- sity, for patiently reviewing this article and offering invaluable criticism of it. 1. McGee, Predatory Price Cutting: The Standard Oil (NJ.) Case, 1 J.L. & EcON. 137 (1958). 2. For additional perspectives, see Areeda & Turner, PredatoryPring and Re- lated Practices Under Section 2 of the Sherman Act, 88 HARV. L. REV. 697 (1975); Jos- kow & Klevorick, A Frameworkfor Analyzing PredatoryPrmcng Policy, 89 YALE L.J. -
Measuring the Effectiveness of Generic Malware Models
San Jose State University SJSU ScholarWorks Master's Projects Master's Theses and Graduate Research Fall 2017 Measuring the Effectiveness of Generic Malware Models Naman Bagga San Jose State University Follow this and additional works at: https://scholarworks.sjsu.edu/etd_projects Part of the Computer Sciences Commons Recommended Citation Bagga, Naman, "Measuring the Effectiveness of Generic Malware Models" (2017). Master's Projects. 566. DOI: https://doi.org/10.31979/etd.8486-cfhx https://scholarworks.sjsu.edu/etd_projects/566 This Master's Project is brought to you for free and open access by the Master's Theses and Graduate Research at SJSU ScholarWorks. It has been accepted for inclusion in Master's Projects by an authorized administrator of SJSU ScholarWorks. For more information, please contact [email protected]. Measuring the Effectiveness of Generic Malware Models A Project Presented to The Faculty of the Department of Computer Science San Jose State University In Partial Fulfillment of the Requirements for the Degree Master of Science by Naman Bagga December 2017 ○c 2017 Naman Bagga ALL RIGHTS RESERVED The Designated Project Committee Approves the Project Titled Measuring the Effectiveness of Generic Malware Models by Naman Bagga APPROVED FOR THE DEPARTMENTS OF COMPUTER SCIENCE SAN JOSE STATE UNIVERSITY December 2017 Dr. Mark Stamp Department of Computer Science Dr. Jon Pearce Department of Computer Science Dr. Thomas Austin Department of Computer Science ABSTRACT Measuring the Effectiveness of Generic Malware Models by Naman Bagga Malware detection based on machine learning techniques is often treated as a problem specific to a particular malware family. In such cases, detection involves training and testing models for each malware family. -
Buyer Power: Is Monopsony the New Monopoly?
COVER STORIES Antitrust , Vol. 33, No. 2, Spring 2019. © 2019 by the American Bar Association. Reproduced with permission. All rights reserved. This information or any portion thereof may not be copied or disseminated in any form or by any means or stored in an electronic database or retrieval system without the express written consent of the American Bar Association. Buyer Power: Is Monopsony the New Monopoly? BY DEBBIE FEINSTEIN AND ALBERT TENG OR A NUMBER OF YEARS, exists—or only when it can also be shown to harm consumer commentators have debated whether the United welfare; (2) historical case law on monopsony; (3) recent States has a monopoly problem. But as part of the cases involving monopsony issues; and (4) counseling con - recent conversation over the direction of antitrust siderations for monopsony issues. It remains to be seen law and the continued appropriateness of the con - whether we will see significantly increased enforcement Fsumer welfare standard, the debate has turned to whether the against buyer-side agreements and mergers that affect buyer antitrust agencies are paying enough attention to monopsony power and whether such enforcement will be successful, but issues. 1 A concept that appears more in textbooks than in case what is clear is that the antitrust enforcement agencies will be law has suddenly become mainstream and practitioners exploring the depth and reach of these theories and clients should be aware of developments when they counsel clients must be prepared for investigations and enforcement actions on issues involving supply-side concerns. implicating these issues. This topic is not going anywhere any time soon. -
Resale Price Maintenance: Economic Theories and Empirical Evidence
"RESALE PRICE MAINTENANCE: ECONOMIC THEORIES AND EMPIRICAL EVIDENCE Thomas R. Overstreet, Jr. Bureau of Economics Staff Report to the Federal Trade Commission November 1983 RESALF. PRICE INTF.NANCE: ECONO IC THEORIES AND PIRICAL EVIDENCE Thomas R. Overstreet, Jr. Bureau of Economics Staff Report to the Federal Trade Commiss ion November 1983 . FEDERAL TRDE COM~ISSION -f. JAMES C. ~ILLER, III, Chairman MICHAEL PERTSCHUK, Commissioner PATRICIA P. BAILEY, Commissioner GEORGE W. DOUGLAS, Commissioner TERRY CALVANI, Commi S5 ioner BUREAU OF ECONO~ICS WENDY GRA~, Director RONALD S. BOND, Deputy Director for Operations and Research RICHARD HIGGINS, Deputy Director for Consumer Protection and Regulatory Analysis JOHN L. PETE , Associate Director for Special Projects DAVID T. SCHEFF N, Deputy Director for Competition and Anti trust PAUL PAUTLER, Assistant to Deputy Director for Competition and Antitrust JOHN E. CALFEE, Special Assistant to the Director JAMES A. HURDLE, Special Assistant to . the Director THOMAS WALTON, Special Assistant to the Director KEITH B. ANDERSON, Assistant Director of Regulatory Analysis JAMES M. FERGUSON, Assistant Director for Antitrust PAULINE IPPOLITO, Assistant Director for Industry Analysis WILLIAM F. LONG, ~anager for Line of Business PHILIP NELSON, Assistant Director for Competition Analysis PAUL H. RUBIN, Assistant Director for Consumer Protection This report has been prepared by an individual member of the professional staff of the FTC Bureau of Economics. It rsfle cts solely the views of the author, and is not intended to represent the position of the Federal Trade Commission, or necessarily the views of any individual Commissioner. -ii - fI. ACKNOWLEDGMENTS I would like to thank former FTC Commissioner David A. -
Guidelines for the Analysis of Cases of Exclusionary Abuse of Dominance
GUIDELINES FOR THE ANALYSIS OF CASES OF EXCLUSIONARY ABUSE OF DOMINANCE Buenos Aires, Mayo de 2019 Disclaimer: These guidelines have been translated into English to help their reading by non-Spanish speaking people. The only official version of the Argentine Guidelines for the Analysis of Cases of Exclusionary Abuse of Dominance, however, is the Spanish version. 1 CONTENTS I. INTRODUCTION 3 II. EXISTENCE OF A DOMINANT POSITION 4 III. ABUSE OF DOMINANCE 7 III.1. Factors to take into account for the existence of exclusionary abuses of dominance 8 III.2. Efficiencies 9 IV. SPECIFIC FORMS OF ABUSE 10 IV.1. Refusal to supply and margin squeeze 10 IV.2. Tying and bundling 13 IV.3. Predatory pricing 15 IV.4. Vertical restraints 16 IV.4.1.Resale price maintenance 17 IV.4.2. Exclusivity 18 IV.4.3.Conditional discounts 20 2 I. INTRODUCTION The aim of this document is to provide guidelines regarding practices that constitute infringements of Act No. 27,442 of Defense of Competition (LDC, for its Spanish acronym) and to contribute to predictability in decision-making, notwithstanding its application on a case-by-case basis and the use of complementary criteria that may be developed in the future. In this sense, the guidelines set forth in this document do not constitute an opinion regarding specific cases under investigation. A typical classification of the conducts that infringe the LDC differentiates unilateral from coordinated conducts. This document refers only to the first type, in particular, to possible abuses of a dominant position by a single firm or legal entity. -
Hardening Windows 2000
Hardening Windows 2000 Philip Cox ([email protected]) Version 1.3 March 14, 2002 Abstract Determining what steps need to be taken to secure a system is one of the most frustrating things that system administrators have to do. This white paper provides a method for getting a Win2K server to a “secure” baseline. From this baseline you can work forward to install additional services. The focus of this white paper is on the Win2K server, but much of the information is applicable to Win2K Professional as well. This paper is excerpted and modified from Chapter 21 of the “Windows 2000 Security Handbook” (ISBN: 0-07- 212433-4, copyright Osborne/McGraw-Hill) authored by Phil Cox and Tom Sheldon (www.windows2000securityhandbook.com). Original material and content © Osborne/McGraw-Hill, 2000-2001. Supplemental material and updates © SystemExperts Corporation, 1995 - 2002. All rights reserved. All trademarks used herein are the property of their respective owners. Original material and content © Osborne/McGraw-Hill, 2000-2001. Supplemental material and updates © SystemExperts Corporation, 1995 - 2001. Table of Contents Abstract......................................................................................................................................................................1 Table Of Contents......................................................................................................................................................2 The Requirements ......................................................................................................................................................3 -
Report on Predatory Pricing
Report on Predatory Pricing Prepared by The Unilateral Conduct Working Group th Presented at the 7 Annual Conference of the ICN Kyoto, April 2008 TABLE OF CONTENTS Executive Summary.......................................................................................................... 3 I. LEGAL BASIS AND ENFORCEMENT................................................................ 5 1. General v. Specific Provisions................................................................................ 5 2. Civil v. Criminal Enforcement................................................................................ 6 3. Overview of Agency and Private Enforcement ...................................................... 7 A. Agency enforcement ........................................................................................... 7 B. Private cases challenging predatory pricing ....................................................... 8 II. CRITERIA FOR ABUSE OF DOMINANCE/MONOPOLIZATION BASED ON PREDATORY PRICING.......................................................................................... 9 1. Use of Cost Measures or Benchmarks to Demonstrate Loss or Sacrifice .............. 9 A. Cost measures employed................................................................................. 9 B. Agencies do not necessarily use the same cost measure in every case......... 12 C. Presumptions and safe harbors.......................................................................... 13 D. Use of price and cost data ................................................................................ -
The European Antitrust Review 2013
The European Antitrust Review 2013 Published by Global Competition Review in association with Anastasios Antoniou LLC Art De Lex Law Firm Asters bpv Braun Partners bpv Hügel Rechtsanwälte Buntscheck Rechtsanwaltsgesellschaft mbH DLA Piper Italy DLA Piper Spain SL Dryllerakis & Associates Eisenberger & Herzog ELIG Attorneys at Law Epstein, Chomsky, Osnat & Co Gide Loyrette Nouel AARPI Herbert Smith LLP Homburger K & L Gates Karanovic´ & Nikolic´ Kastell Advokatbyrå AB Kavcˇicˇ, Rogl & Bracˇun Kirkland & Ellis International LLP Krogerus Attorneys Ltd Lademann & Associates GmbH Economists and Competition Consultants Latham & Watkins Macfarlanes LLP Monaco & Associati Motieka & Audzevicˇius Popovici Nitu & Asociatii SJ Berwin Steptoe & Johnson LLP Sullivan & Cromwell LLP Szabó Kelemen & Partners Attorneys Taylor Wessing Vasil Kisil & Partners Vogel & Vogel Wikborg Rein www.globalcompetitionreview.com EU: MONOPOLISATION Post Danmark: predatory pricing in the European Union Howard Rosenblatt, Héctor Armengod and Andreas Scordamaglia-Tousis Latham & Watkins Introduction that a dominant firm can only be interested in applying such low In last year’s edition, we wrote that unilateral pricing behaviour – in prices to eliminate competitors and gain a dominant position which that case, conditional discounts – requires a careful approach to will allow it to exercise market power.6 As the Court explained in enforcement. While under-enforcement could undermine competi- France Télécom, the relevant measure of costs are those of the domi- tion, over-enforcement could deter companies from charging low nant firm, even if they are not below costs incurred by competitors.7 prices – both outcomes that are bad for consumers. The stakes are Nevertheless, this presumption could theoretically be rebutted with equally high in alleged predatory pricing. -
01001100 01001100 01001100 01001100
01001100 01001100 01001100 01001100 01010100 01010100 01010100 01010100 01000101 01000101 LTER DATABITS 01000101 01000101 01010010 01010010 01010010 01010010 _______________________________________________________________________________________ Summer 1990 Data Management Newsletter of Long-term Ecological Research Welcome to the summer 1990 issue of DATABITS! This issue features the agenda of the upcoming data manager's meeting, a report on the most recent LTER Coordinating Committee meeting, reports from the sites and some hints on using Unix and MSDOS. From the Sites BNZ-- At BCEF field season has caught up with us, and our efforts are concentrated on data acquisition and storage at a fast and furious pace. -- Phyllis Adams, Bonanza Creek LTER HFR-- A busy field season has begun, with help from summer undergraduates: among other things, we're finishing the current forest inventory, mapping trees for the hurricane pull-down and overstory deadening experiments next fall, and resampling hurricane regeneration plots. Data is entered and analyzed on the computers at the end of each field day. Indoors we're setting up new computers, digitizing GIS overlays, continuing analysis of several GIS projects, and beginning the long task of keyboarding data from the past. -- Emery Boose, Harvard Forest LTER NWT-- Recent construction of our climate database represents a level of accessibility previously unknown. Although these data (38-year record for Niwot Ridge) have been reduced and stored on magnetic tape or floppy disks for several years, difficulties associated with use of the data as stored on these media have discouraged all but the most persistent researchers from resorting to hard copies. The new climate database allows for the rapid creation of files, tailored by individual investigators to meet their parti- cular needs, that are easily loaded into a spreadsheet format. -
Predatory Pricing
UC Berkeley Law and Economics Workshop Title Predatory Pricing Permalink https://escholarship.org/uc/item/22k506ds Author Edlin, Aaron S Publication Date 2010-02-01 eScholarship.org Powered by the California Digital Library University of California Predatory Pricing 2010 Aaron S. Edlin From the Selected Works of Aaron Edlin; http://works.bepress.com/aaron edlin/74 Aaron Edlin Page 1 12/27/09 Predatory Pricing1 Aaron Edlin Richard Jennings Professor of Law and Professor of Economics, UC Berkeley And National Bureau of Economic Research . Forthcoming, Research Handbook on the Economics of Antitrust Law, edited by Einer Elhauge. Abstract Judge Breyer famously worried that aggressive prohibitions of predatory pricing throw away a bird in hand (low prices during the alleged predatory period) for a speculative bird in the bush (preventing higher prices thereafter). Here, I argue that there is no bird in hand because entry cannot be presumed. Moreover, it is plausibly commonplace that post‐entry low prices or the threat of low prices has anticompetitive results by reducing entry and keeping prices high pre‐entry and post‐predation. I analyze three potential standards for identifying predatory pricing. Two are traditional but have been tangled together and must be distinguished. First, a price‐cost test based on sacrifice theory requires that either price or cost be measured by what I describe as “inclusive” measures. A price‐cost test to prevent the exclusion of equally efficient competitors, by contrast, requires that price and cost be measured by more traditional “exclusive” measures. Finally, I describe a Consumer Betterment Standard for monopolization and consider its application to predatory pricing.