Skip to main content

Publication records

ESMT Working Paper

Consumer choice under limited attention when alternatives have different information costs

ESMT Working Paper No. 16-04 (R3)
Frank Huettner, Tamer Boyaci, Yalçın Akçay (2018)
Subject(s)
Product and operations management
Keyword(s)
Discrete choice, rational inattention, information acquisition, non-uniform information costs, market inference
JEL Code(s)
D40, D80
Consumers often do not have complete information about the choices they face and therefore have to spend time and effort in acquiring information. Since information acquisition is costly, consumers trade-off the value of better information against its cost, and make their final product choices based on imperfect information. We model this decision using the rational inattention approach and describe the rationally inattentive consumer’s choice behavior when she faces alternatives with different information costs. To this end, we introduce an information cost function that distinguishes between direct and implied information. We then analytically characterize the optimal choice probabilities. We find that non-uniform information costs can have a strong impact on product choice, which gets particularly conspicuous when the product alternatives are otherwise very similar. There are significant implications on how a seller should provide information about its products and how changes to the product set impacts consumer choice. For example, non-uniform information costs can lead to situations where it is disadvantageous for the seller to provide easier access to information for a particular product, and to situations where the addition of an inferior (never chosen) product increases the market share of another existing product (i.e., failure of regularity). We also provide an algorithm to compute the optimal choice probabilities and discuss how our framework can be empirically estimated from suitable choice data.

 


View all ESMT Working Papers in the ESMT Working Paper Series here. ESMT Working Papers are also available via SSRN, RePEc, EconStor, and the German National Library (DNB).

Pages
52
ISSN (Print)
1866–3494
Book Review

IT-Sicherheitsrecht [IT-security law]

Review of Buchbesprechungen. Paul Voigt, IT-Sicherheitsrecht, Cologne: Computer und Recht
Martin Schallbruch (2018)
Subject(s)
Information technology and systems; Technology, R&D management
Keyword(s)
Cybersecurity, information security
Book review of Paul Voigt, “IT-Sicherheitsrecht”, (IT security law), 2018
Secondary Title
Buchbesprechungen. Paul Voigt, IT-Sicherheitsrecht
Journal Pages
r81–r81
Journal Article

Nothing is free: Data-driven optimisation unlocks freemium business models' real potential

The European Business Review September/October: 47–50
Stefan Wagner, Julian Runge (2018)
Subject(s)
Information technology and systems; Management sciences, decision sciences and quantitative methods; Marketing; Strategy and general management
Keyword(s)
Innovation, pricing, freemium, business model
Journal Pages
47–50
Working Paper

Technologieanalysen. Ergebnisse der Umfrage zur Einstufung und Bewertung von Technologien [Technology analyses. Survey based results for classification and qualification of technologies]

Free University Berlin Working paper
Elisabeth Eppinger, Andreas Tauber, Monique Goepel, Viktor Jarotschkin (2018)
Subject(s)
Information technology and systems; Management sciences, decision sciences and quantitative methods; Technology, R&D management
Keyword(s)
Technology assessment, technology analysis, indicators
Betting on right technologies, selecting meaningful fields of application and thus steering technology developments with suitable properties in the right direction is crucial for the sustainable success of technology companies. However, due to the worldwide increase and rapid acceleration of research and development activities as well as the increasing integration of value chains, it is becoming increasingly difficult to correctly assess technology developments. At the same time, access to data and information has dramatically improved powered by the developments of the world wide web. Powerful information and telecommunication devices as well as software make large data sets easier to access and complex data analyses with new types of indicators possible. Thus, the possibilities of indicator-based technology assessments have also improved for companies that have very limited resources for technology analysis. In order to provide an up-to-date overview of which indicators and methods for technology analysis are currently used in practice and in science, the Chair of Innovation Management of the Free University Berlin conducted a survey of German-speaking experts* from business and science in November and December 2017. The results are presented in this report.
Pages
62
Journal Article

Too precise to pursue: How precise first offers create barriers-to-entry in negotiations and markets

Organizational Behavior and Human Decision Processes 148 (September): 87–100
Alice J. Lee, David D. Loschelder, Martin Schweinsberg, Malia F. Mason, Adam D. Galinsky (2018)
Subject(s)
Human resources management/organizational behavior
Keyword(s)
Anchor precision, negotiation entry, barriers-to-entry, first offers, social attribution, decision making
Precise first offers strongly anchor negotiation outcomes. This precision advantage has been previously documented only when the parties were already engaged in a negotiation. We introduce the concept of negotiation entry, i.e., the decision to enter a negotiation with a particular party. We predict that precise prices create barriers-to-entry, reducing a counterpart’s likelihood of entering a negotiation. Six studies (N=1,580) and one archival analysis of real estate sector data (N=11,214) support our barrier-to-entry prediction: Potential negotiators were less likely to enter a negotiation with precise versus round first offers. Using both statistical mediation and experimental-causal-chain analyses, we establish that perceptions of offer maker inflexibility underlie the precision barrier. Furthermore, we demonstrate that this inflexibility mechanism of precision is distinct from the mechanism (being offended) that creates barriers-to-entry for extreme first offers. The discussion theoretically integrates research on first-offer precision and extremity by offering the Precision-Extremity Model of First Offers.
With permission of Elsevier
Volume
148
Journal Pages
87–100
Book

Multivariate Analysemethoden: Eine anwendungsorientierte Einführung [Multivariate statistical analysis: A practical introduction]

15th ed.,Berlin Heidelberg: Gabler
Klaus Backhaus, Bernd Erichson, Wulff Plinke, Rolf Weiber (2018)
Subject(s)
Marketing
Keyword(s)
multivariate analysis
Volume
15th ed.,
ISBN
978-3-662-56654-1
ISBN (Online)
978-3-662-56655-8
ESMT Case Study

Leadership under high pressure

ESMT Case Study No. ESMT-318-0178-1
Subject(s)
Human resources management/organizational behavior
Keyword(s)
Leadership, crisis management, decision making, team interaction
When managers are confronted with a corporate crisis, such as the explosion of BP’s Deepwater Horizon oil exploration platform, they have to operate under conditions that differ fundamentally from those experienced during normal management processes. Among other things, they may have to work with specialized teams and understand their priorities and decision-making processes, without giving up their own responsibilities. The following case simulation confronts participants with an escalating crisis situation in an unfamiliar environment and requires a series of team decisions to be taken under time pressure. The case is based on real experiences of the German Air Force during its ISAF (International Security Assistance Force) mission in Afghanistan.
The participants are divided into groups of four, each group being responsible for a large military transport aircraft and its mission. Within the groups, each participant assumes the role of a specified flight crew member. Each participant receives individual instructions on their roles and duties as well as background information on the other crew members. Based on this information, the teams must prepare and execute their flight missions. The main objective of the simulation is to highlight the challenges of sharing information within a team and of decision-making under time pressure in an unfamiliar environment.
The case simulation may be used in a leadership course in MBA programs. It may also be used in executive-education programs to support sessions on both group decision-making and crisis management. On the whole, the case may be used to learn:
1. how to cooperate in teams
2. how team decisions may effectively be made
3. how to prioritize tasks under time pressure in a crisis situation
4. how to examine the impact of framing in decision-making processes
buy nowbuy nowbuy now
ESMT Case Study

Andreas Keller in China

ESMT Case Study No. ESMT-318-0179-1
Johannes Habel, Zheng Han (2018)
Subject(s)
Strategy and general management
Keyword(s)
General management, decision making, international business, international marketing, organizational behavior, business strategies, external environment analysis, sales
On the surface, this case study deals with a straightforward sales management issue: The protagonist, Andreas Keller, needs to increase the company’s revenue to get the Chinese business unit out of the red. However, as students dig deeper into the case study, they detect the following underlying, intriguing issues:
  • Setting priorities and making decisions in sales management, especially in times of distress.
  • Understanding intercultural and leadership challenges for a foreign “airborne manager” (空降) in a foreign subsidiary.
  • Comprehending the suitability of premium, service-based business models in China.
  • Understanding the limitations of applying business models from mature markets in Western countries to China.
  • Preparing for expatriate positions in China and elsewhere.
The case study can be taught in both executive education and degree courses. More specifically, the case study is ideally suited for international MBA students with some working experience and international career ambitions. It can be used in both the general management courses and specialized courses on sales, business development, or marketing.
buy nowbuy nowbuy now
Book

Cybersecurity in Germany

SpringerBriefs in Cybersecurity, 1st ed.,New York City, New York: Springer
Martin Schallbruch, Isabel Skierka (2018)
Subject(s)
Economics, politics and business environment; Information technology and systems
Keyword(s)
Cybersecurity, cyber defense, critical infrastructure protection, digital sovereignty, data protection, policy, strategy, regulation
JEL Code(s)
K24, N44, O25, O38
With the digitization of nearly all aspects of life, our societies increasingly depend on the resilience and security of computing and communication technologies. Hence, the protection of information technology (IT) against unauthorized access, attack, and accidental failure, has become a priority for nation-states around the world. Throughout the past one or two decades, most countries have adopted strategies, policies, and practical steps to protect the security of IT and critical infrastructures within their territory, and, by extension, their citizens. These practices are generally subsumed under the umbrella of cybersecurity. The book provides an analysis of the evolution of cybersecurity policy in Germany over the past two and a half decades. It highlights development lines as well as upcoming strategic challenges of the German cybersecurity policy.
Volume
1st ed.,
Pages
76
ISBN
978-3-319-90013-1
ISBN (Online)
978-3-319-90014-8
Journal Article

Appearing self-confident and getting credit for it: Why it may be easier for men than women to gain influence at work

Human Resource Management 57 (4): 839–854
Special Issue: Women's Career Equality and Leadership in Organizations: Creating an Evidence‐based Positive Change July/August 2018
Laura Guillén, Margarita Mayo, Natalia Karelaia (2018)
Subject(s)
Human resources management/organizational behavior
Keyword(s)
Self-confidence appearance, gender, job performance, prosocial orientation, organizational influence
Appearing self-confident is instrumental for progressing at work. However, little is known about what makes individuals appear self-confident at work. We draw on attribution and social perceptions literatures to theorize about both antecedents and consequences of appearing self-confident for men and women in male-dominated professions. We suggest that performance is one determinant of whether individuals are seen as confident at work, and that this effect is moderated by gender. We further propose that self-confidence appearance increases the extent to which individuals exert influence in their organizations. However, for women, appearing self-confident is not enough to gain influence. In contrast to men, women in addition are “required” to be prosocially oriented. Multisource, time-lag data from a technological company showed that performance had a positive effect on self-confidence appearance for both men and women. However, the effect of self-confidence appearance on organizational influence was moderated by gender and prosocial orientation, as predicted. Our results show that through self-confidence appearance, job performance directly enables men to exert influence in their organizations. In contrast, high performing women gain influence only when self-confidence appearance is coupled with prosocial orientation. We discuss the implications of our results for gender equality, leadership, and social perceptions.
© 2017 Wiley Periodicals, Inc.
Volume
57
Journal Pages
839–854