Skip to main content

Publication records

Journal Article

Financing capacity investment under demand uncertainty: An optimal contracting approach

Manufacturing and Service Operations Management 20 (1): 85–96
Special Issue on Interface of Finance, Operations, and Risk Management (Winter 2018)
Francis de Véricourt, Denis Gromb (2018)
Subject(s)
Management sciences, decision sciences and quantitative methods
Keyword(s)
Capacity, optimal contracts, financial constraints, newsvendor model
We study the capacity choice problem of a firm, whose access to capital is hampered by financial frictions, i.e., moral hazard. The firm optimizes both its capacity investment under demand uncertainty and its sourcing of funds from a competitive investor. Ours is the first study of this problem to adopt an optimal contracting approach: feasible sources of funds are derived endogenously from fundamentals and include standard financial claims (debt, equity, convertible debt, etc.). Thus, in contrast to most of the literature on financing capacity investments, our results are robust to a change of financial contract. We characterize the optimal capacity level under optimal financing. First, we find conditions under which a feasible financial contract exists that achieves first-best. When no such contract exists, we find that under optimal financing, the choice of capacity sometimes exceeds strictly the efficient level. Further, the firm invests more when its cash is low, and in some cases less when the project’s unit revenue is high. These results run counter to the newsvendor logic and standard finance arguments. We also show that our main results hold in the case of a strategic monopolist investor, and such an investor may invest more than a competitive one.
© 2017, INFORMS
Volume
20
Journal Pages
85–96
ISSN (Online)
1526–5498
ISSN (Print)
1523-4614
Teaching material

The essence of strategy

ESMT Publication
Olaf Plötner, Harald Hungenberg (2018)
Subject(s)
Marketing; Strategy and general management
Keyword(s)
Competitive advantage, customer segments, product technology, business model, growth options, company’s value, portfolio management, merger & acquisitions, corporate synergies
The paper summarizes the key elements of business strategies as well as corporate strategies and puts them together as a synchronized framework.
Book Chapter

Minimum-variance hedging for managing risks in inventory models with price fluctuations

In Integrated risk management in supply chains, 11 vols. 107-123. .
Caner Canyakmaz, Süleyman Özekici, Fikri Karaesmen (2017)
Keyword(s)
Minimum-variance hedging, inventory, price risk, demand risk
We consider the financial hedging of a random operational cash flow that arises in inventory operations with price and demand uncertainty. We use a variance minimization approach to find a financial portfolio that would minimize the total variance of operational and financial returns. For inventory models that involve continuous price fluctuations and price-dependent demand that arrives in continuous time, we characterize the minimum-variance hedging policies and numerically illustrate their effectiveness.
Secondary Title
Integrated risk management in supply chains
Pages
107-123
Journal Article

IT-Sicherheitsrecht – Schutz digitaler Dienste, Datenschutz und Datensicherheit [IT security law – Protection of digital services, data protection, and data security]

Computer und Recht 33 (12): 798–804
Martin Schallbruch (2017)
Subject(s)
Economics, politics and business environment; Information technology and systems
Keyword(s)
IT security, cybersecurity, cyber law, data protection, privacy, data security
Volume
33
Journal Pages
798–804
ISSN (Online)
2194-4172
ESMT Working Paper

Static or dynamic efficiency: Horizontal merger effects in the wireless telecommunications industry

ESMT Working Paper No. 17-04
Michał Grajek, Klaus Gugler, Tobias Kretschmer, Ion Mişcişin (2017)
Subject(s)
Economics, politics and business environment; Information technology and systems; Technology, R&D management
Keyword(s)
Telecom mergers, static and dynamic efficiency, difference-in-difference
JEL Code(s)
L22, O33, G34, L96
This paper studies five mergers in the European wireless telecommunication industry and analyzes their impact on prices and capital expenditures of both merging carriers and their rivals. We find substantial heterogeneity in the relationship between increases in concentration and carriers’ prices. The specifics of each merger case clearly matter. Moreover, we find a positive correlation between the price and the investment effects; when the prices after merger increase (decrease), the investments increase (decrease) too. Thus, we document a trade-off between static and dynamic efficiencies of mergers.

 

View all ESMT Working Papers in the ESMT Working Paper Series here. ESMT Working Papers are also available via SSRN, RePEc, EconStor, and the German National Library (DNB).

Pages
40
ISSN (Print)
1866–3494
Online Article

Blockchain and smart contracts: Pioneers of the energy frontier

International Business Times
Subject(s)
Economics, politics and business environment; Entrepreneurship
Keyword(s)
Blockchain, smart contracts, business models, energy transition, P2P networks
Online article

Price comparison websites and selective distribution systems: An effects-based approach

CompLaw Blog
Theon van Dijk, Hans W. Friederiszick, Ela Głowicka (2017)
Subject(s)
Economics, politics and business environment
Keyword(s)
Vertical restraints, selective distribution, price comparison websites, effect-based approach
ESMT Working Paper

Brand positioning and consumer taste information

ESMT Working Paper No. 17-01 (R1)
Arcan Nalca, Tamer Boyaci, Saibal Ray (2017)
Subject(s)
Product and operations management
Keyword(s)
Supply chain management, uncertain consumer taste, product introduction, product positioning, store brands, national brands, information acquisition, information sharing, vertical differentiation, horizontal differentiation
In this paper, we study how a retailer can benefit from acquiring consumer taste information in the presence of competition between the retailers store brand (SB) and a manufacturers national brand (NB). In our model, there is ex-ante uncertainty about consumer preferences for distinct product features, and the retailer has an advantage in resolving this uncertainty because of his close proximity to consumers. Our focus is on the impact of the retailers information acquisition and disclosure strategy on the positioning of the brands. Our analysis reveals that acquiring taste information allows the retailer to make better SB positioning decisions. Information disclosure, however, enables the manufacturer to make better NB positioning decisions – which in return may benefit or hurt the retailer. For instance, if a particular product feature is quite popular, then it is beneficial for the retailer to incorporate that feature into the SB, and inform the manufacturer so that the NB also includes this feature. Information sharing, in these circumstances, benefits both the retailer and the manufacturer, even though it increases the intensity of competition between the brands. But, there are situations in which the retailer refrains from information sharing so that a potentially poor positioning decision by the NB makes the SB the only provider of the popular feature. The retailer always benefits from acquiring information. However, it is beneficial to the manufacturer only if the retailer does not introduce an SB due to the associated high fixed cost.

 

View all ESMT Working Papers in the ESMT Working Paper Series here. ESMT Working Papers are also available via SSRN, RePEc, EconStor, and the German National Library (DNB).

Pages
33
ISSN (Print)
1866–3494
Journal Article

When serving customers includes correcting them: Understanding the ambivalent effects of enforcing service rules

International Journal of Research in Marketing 34 (4): 919–941
Johannes Habel, Sascha Alavi, Doreén Pick (2017)
Subject(s)
Marketing
Keyword(s)
Service delivery, customer–employee interaction, dysfunctional customer behavior, co-production, enforcement
JEL Code(s)
M310
Service employees frequently must enforce rules upon their customers to mitigate dysfunctional customer behavior and ensure proper service delivery (e.g., enforce “fasten seatbelt” signs on flights). However, the consequences of enforcing service rules (ESR) are not well understood. To elucidate the effect of ESR, the authors present seven studies involving > 6800 customers and consisting of cross-sectional and longitudinal data from customer surveys and company records as well as experiments. The results indicate that ESR exerts ambivalent effects: customers who experience ESR directed at other customers perceive service employees as more competent, which increases customer loyalty. However, if ESR is directed at customers themselves, they perceive a self-concept threat, leading them to devalue service employees' warmth and competence and to become less loyal. The effects of ESR hinge on a number of factors, including the harm that dysfunctional behavior potentially causes, the way ESR is communicated, and customers' experience with the service situation. Furthermore, the authors show that service employees can alleviate the negative effects of ESR by communicating service rules in advance and justifying ESR appropriately.
With permission of Elsevier
Volume
34
Journal Pages
919–941
DSI Industrial & Policy Recommendations Series (IPR)

Recommendations for the development of vulnerability equities processes

DSI Industrial & Policy Recommendations Series (IPR) 2017 (7)
Subject(s)
Technology, R&D management
Keyword(s)
Vulnerability, vulnerability equities processes
The report shows that a reporting of vulnerabilities used by the state for active measures is likely to have only a minor effect on the increase in overall technical IT security. On the other hand, the value of the work of the security authorities is in many cases considered high, due to the high tactical enablement against potential malicious actors. The demand of some, that state authorities should refrain from pro-actively exploiting vulnerabilities for active measures therefore does not seem to make much sense; the net effect in security would be negative. Nevertheless, processes can be introduced that allow a more precise assessment and an informed, accountable and cautious handling of offensively used vulnerabilities.
Volume
2017