You are on page 1of 19

Strategic Management Journal

Strat. Mgmt. J. (2012)


Published online EarlyView in Wiley Online Library (wileyonlinelibrary.com) DOI: 10.1002/smj.2017
Received 10 June 2010; Final revision received 21 August 2012

THREAT OF ENTRY, ASYMMETRIC INFORMATION,


AND PRICING
ROBERT C. SEAMANS*
Stern School of Business, New York University, New York, New York, U.S.A.

This paper examines the impact of asymmetric information on incumbent firms’ propensity to
engage in limit pricing when faced with threat of entry. I draw from information economics to
argue that incumbents will use price to respond ex ante to entry in situations characterized
by asymmetric information. I suggest two situations in which asymmetric information can
arise: when potential entrants are from outside the primary industry and when incumbent firms
are members of R&D consortia. I then study pricing in the U.S. cable TV industry to show
that pricing patterns of incumbent cable TV systems are consistent with limit pricing when
the relationship between the incumbent and potential entrant is characterized by asymmetric
information. Copyright  2012 John Wiley & Sons, Ltd.

INTRODUCTION research and development (R&D) investment and


limit pricing (Smiley, 1988). In fact, surveys show
Given the potentially disruptive nature of entrants, that incumbents do use a number of these mech-
one should expect that incumbents will not sit idly anisms, including limit pricing (Smiley, 1988;
by as their markets are threatened, but will instead Singh, Utton, and Waterson, 1998).
respond quickly and forcefully to potential entry. A A limit pricing strategy is one in which the
well developed literature has broadened our under- incumbent firm uses low prices to signal its low
standing of entry responses (e.g., Lieberman, 1987, costs to a potential entrant (Bain, 1949). If the sig-
1989; Geroski, 1995; Helfat and Lieberman, 2002; nal is effective, the potential entrant realizes that
Simon, 2005; McCann and Vroom, 2010). How- the incumbent will be able to price the entrant
ever, despite the seeming importance of the incum- out of the market if it were to enter. In a notable
bent’s ex ante actions in response to potential paper by Milgrom and Roberts (1982: 446) the
entrants, most literature on the interaction between authors show that this strategy works only when
entrants and incumbents focuses on ex post interac- the entrant does not know the incumbent’s actual
tion. Faced with potential entry, the incumbent has costs. They formalize this intuition with a model,
a host of entry deterrence mechanisms available and describe the condition in which the entrant
including excess capacity, increased advertising, does not know the incumbent’s costs as one char-
acterized by ‘imperfect information’ also referred
Keywords: entry; information economics; price; incum- to as asymmetric or ‘asymmetrical information’
bent response; cable TV (Akerlof, 1970: 490), which is defined as the sit-

Correspondence to: Robert C. Seamans, Management Depart- uation in which one of the parties to a transaction
ment, NYU Stern School of Business, 44 West 4th Street, Suite
7-58, New York, NY 10 012, U.S.A. holds superior or more information than the other.
E-mail: rseamans@stern.nyu.edu Despite the importance of this condition, with the

Copyright  2012 John Wiley & Sons, Ltd.


R.C. Seamans

exception of an experimental study by Cooper, at an informational disadvantage when the incum-


Garvin, and Kagel (1997), no prior empirical study bent has access to proprietary technology from
on limit pricing has examined the role of asym- CableLabs. If this is the case, incumbent members
metric information. One goal of this study is to of CableLabs may engage in limit pricing. How-
show that, consistent with Milgrom and Roberts ever, membership in CableLabs is an informative
(1982), incumbents are more likely to use limit signal that may reduce asymmetric information
pricing in situations characterized by asymmetric with the potential entrant. Hence, I also develop
information. the counterargument that members of CableLabs
In order to accomplish this goal, I study how are less likely to use limit pricing. The results indi-
incumbent cable TV systems use prices in response cate that being a nonmember of CableLabs and
to entry threats. The data analyses use panel data facing a telecom entrant are both necessary condi-
from 2006–2009 that matches information on pric- tions for the use of limit pricing. Thus, even though
ing, system characteristics, and location for incum- membership in an exclusive R&D consortium may
bent cable TV systems to data on the location of provide proprietary access to new technology, it is
potential cable and telecom entrants. In the cable not a sufficient condition to engage in limit pric-
TV industry, economies of scale make it cheaper ing as the membership provides other informative
for an entrant to build off an existing system in signals to the potential entrant.
one market to enter an adjacent market. Thus, the This study contributes to existing literature in
probability of entry into the incumbent’s market several ways. First, it demonstrates that incum-
increases with the geographic proximity to a poten- bent firms engage in limit pricing when asym-
tial entrant. I take advantage of this institutional metric information is present. Second, it suggests
feature to identify changes in threat of entry from two conditions under which asymmetric informa-
variation in the proximity to potential entrants over tion arises: when a potential entrant is from another
time. The identification is aided by tests devel- industry and when an incumbent firm has access to
oped by Ellison and Ellison (2011) that argue that proprietary knowledge. Third, it adds to the empir-
an entry deterring response can be inferred when ical literature on entry deterrence by providing
the incumbent’s price is a nonmonotonic U-shaped evidence that firms use limit pricing in response
function of the probability of entry. One of the to threat of entry. Finally, the study focuses on
notable features of this study is its use of panel data ex ante responses to the threat of entry, whereas
to focus on the incumbent’s response to changes most existing literature focuses instead on ex post
in the threat of entry over time. The panel data responses.
allows the use of fixed effects to rule out plausible
alternative explanations.
Variation in information asymmetry arises from THEORETICAL AND EMPIRICAL
variation in types of entrants and incumbents. BACKGROUND
Potential entrants are divided into two mutu-
ally exclusive categories: cable entrants, which The advent of information economics in the 1970s
come from within the cable industry, and telecom introduced the idea that agents may have access
entrants, which come from outside the cable indus- to different information. The seminal paper by
try. I draw from corporate strategy research that Akerlof (1970) features a model in which the
identifies the presence of asymmetric information seller has private information about a used car that
from cross-industry differences (e.g., Capron and the buyer does not. Due to asymmetric informa-
Shen, 2007; Reuer and Ragozzino, 2008) to argue tion, trade between the buyer and seller breaks
that potential telecom entrants are more likely down unless the seller can credibly communi-
than potential cable entrants to have asymmetric cate information about the car to the buyer. In
information about incumbent firm costs. Incum- Akerlof’s model, as is the case in most infor-
bent types vary by membership in CableLabs, an mation economics models, the challenge is for
exclusive R&D consortium that disseminates tech- the parties to overcome asymmetric information
nical knowledge to its members. Those firms that and engage in trade. Information economics has
are CableLabs members have proprietary access helped explain firm interactions in many settings
to new technology. I draw from information eco- including corporate strategy and joint R&D. For
nomics to first argue that potential entrants may be example, industry relatedness (Capron and Shen,
Copyright  2012 John Wiley & Sons, Ltd. Strat. Mgmt. J. (2012)
DOI: 10.1002/smj
Threat of Entry, Asymmetric Information, and Pricing

2007) and geographic proximity (Ragozzino and shows that incumbent banks increase rates paid
Reuer, 2011) have been shown to reduce asymmet- to banking customers as the number of potential
ric information and thereby increase the probabil- entrants increases. Masson and Shaanan (1986)
ity of merger or acquisition. Cooperative research use a structural model to provide evidence that
arrangements, such as R&D consortia, provide excess capacity and price-cost margins are used
firms with a mechanism to reduce asymmetric strategically across 26 industries. Kadiyali (1996)
information about innovations (Katz, 1986) and conducts a case study of Kodak and provides evi-
internalize each other’s spillovers from research dence consistent with Kodak’s use of limit pric-
(Spence, 1984).1 ing in the photographic film industry. Cooper and
Information economics had a large impact on colleagues (1997) study limit pricing in a lab set-
the theoretical development of limit pricing. Mil- ting, which allows the authors to create conditions
grom and Roberts (1982) incorporate information with asymmetric information, and find support for
into a game theoretic model to formalize Bain’s the theoretical predictions in Milgrom and Roberts
(1949) idea about limit pricing and show that under (1982). Savage and Wirth (2005) study cable TV
complete information, limit pricing cannot be an pricing in the presence of potential entrants using
equilibrium outcome because the potential entrant a probit model of observed entry decisions as a
will not be fooled into thinking the incumbent’s function of market characteristics to create prob-
costs are lower. Instead, limit pricing is an equi- abilities of future entry events. These probabili-
librium outcome only when the potential entrant ties are used to proxy for potential competition
has limited information about the incumbent’s pro- in a simultaneous equation model that shows that
duction costs. Their two-period model assumes the potential competition has no effect on price. Gools-
potential entrant knows its own costs, but not the bee and Syverson (2008) show that incumbent air-
incumbent’s costs. Under such a setup, the incum- lines dropped prices in response to increased threat
bent can use low price to signal that it has low cost of entry from Southwest. They provide evidence
to a potential entrant. The potential entrant then that the low prices allow incumbent airlines to
fears that if it enters the market the incumbent will increase traffic on threatened routes, thereby creat-
be able to price so low as to make entry unprof- ing customer lock-in via loyalty programs before
itable. As a result, the potential entrant will not Southwest enters and establishes its own loyalty
enter (or at least will be less likely to enter). The program. In their setting, low price is used to deter
incumbent will use low price to send the low cost entry indirectly by raising Southwest’s fixed cost
signal provided that profits under monopoly using of entry.
low price are greater than profits under duopoly. Masson and Shaanan (1986) point out that asym-
The basic model developed by Milgrom and metric information is a necessary precondition for
Roberts (1982) has been extended in several ways. limit pricing, but do not exploit variation in asym-
McGahan (1992) provides a theoretical model of metric information. One potential reason for this
entry deterrence in which the entrant has perfect gap in the literature is that Milgrom and Roberts
information about the incumbent’s costs, but asym- (1982) do not elaborate on the likely source of
metric information about market demand. Exten- asymmetric information. Hence, this article adds to
sions by Linnemer (2004) and Bagwell (2007) prior literature by proposing two potential sources
allow for the use of additional mechanisms such of asymmetric information. Second, it provides an
as advertising in addition to limit pricing. Other empirical study of limit pricing that explicitly con-
extensions investigate the dynamics of limit pric- siders the role played by asymmetric information.
ing over time in an effort to understand how As such, it complements Cooper and colleagues
incumbents maintain their informational advan- (1997) by providing empirical evidence outside
tage over potential entrants through repeated play of a laboratory setting. In addition, whereas most
(LeBlanc, 1992; Kaya, 2009; Toxvaerd, 2010). of the prior empirical literature relies on cross-
Empirical evidence of the use of limit pricing sectional data to test for limit pricing, the tests
is limited. Hannan (1979) studies passbook sav- presented in this paper rely on panel data.
ings rates in Pennsylvania banking markets and Limit pricing is an example of ex ante entry
deterrence; other types of ex ante entry deter-
1
For more detailed reviews of information economics, see rence include excess capacity and early technology
Stiglitz (2000) and Riley (2001). adoption. A notable feature of the ex ante entry
Copyright  2012 John Wiley & Sons, Ltd. Strat. Mgmt. J. (2012)
DOI: 10.1002/smj
R.C. Seamans

deterrence literature is the relatively small number hospitals. Hence, Dafny uses a similar approach
of empirical papers, relative to the large number to that in Ellison and Ellison (2011), but uses
of theoretical papers (Wilson, 1992). Lieberman a proxy for the probability of entry that is ger-
(1987, 1989) finds no evidence that chemical pro- mane to the surgical procedure context she stud-
cessing firms use excess capacity or cumulative ies. Similarly, this paper uses a proxy for the
production leads to deter entry, whereas Hamil- probability of entry, geographic distance, which
ton and McManus (2009) show that early adoption is appropriate for the cable TV context. Hence,
of new technology by infertility treatment centers another contribution of this paper is to demon-
delays competitor entry. Ghemawat (1993) shows strate that the techniques developed in Ellison
that steel mill entrants adopt new technology to and Ellison (2011) can be applied in other set-
deter incumbent entry into new market niches. tings.
Hence, this article contributes more broadly by More broadly, this article contributes to exist-
adding to the empirical literature on ex ante entry ing literature on strategic responses to entry. A
deterrence. stylized finding of this literature is that incum-
Ellison and Ellison (2011) provide a tractable bent firms respond selectively to entrants (Geroski,
model of ex ante entry deterrence, which they 1995). Recent studies highlight that incentives to
apply to the pharmaceutical industry. The key respond can vary by characteristics of the incum-
insight from their model is that incentives to deter bent, characteristics of the market, or by charac-
entry will vary nonmonotonically with market size. teristics of the entrant. Simon (2005) finds that
The prediction from their model is that the incum- newer incumbents in the magazine industry cut
bent will engage in entry deterring activity in prices in response to entry more aggressively than
markets of an intermediate size, rather than large older incumbents. McCann and Vroom (2010)
or small markets. The intuition behind this result find that incumbent firms encourage entry when
is that entrants will enter large markets anyway, potential agglomeration effects in the market are
and it is unlikely that small markets will face any high. Casadesus-Masanell and Zhu (2010) ana-
entry, therefore investing in entry deterring activity lyze how an incumbent firm chooses between
in these markets will not affect the likely out- different responses, including changing its busi-
comes. Instead, when the potential entrant is ‘on ness model, in response to entry. These and other
the fence’ about entering a market, its decision studies (e.g., Thomas, 1999) have advanced our
is more likely to be swayed by the incumbent’s understanding about how and when incumbents
action. Market size is the relevant focus given the will respond to entry ex post. However, firms that
institutional features of the pharmaceutical indus- successfully deter entry through ex ante actions
try studied by Ellison and Ellison (2011), but other will have less incentive to respond ex post. Thus,
industries might require different proxies for threat by describing conditions under which an incum-
of entry. bent firm will engage in ex ante actions designed
In a closely related paper, Dafny (2005) applies to deter entry, this article also has important
the techniques from an earlier version of the work implications for the study of ex post strategic
by Ellison and Ellison (2011) to local surgical pro- responses.
cedure markets.2 Dafny argues that when incum-
bents increase surgical procedure volume they
move further down the learning curve of that par- HYPOTHESES
ticular surgery, thereby creating entry barriers that
are difficult for potential entrants to overcome. Prior empirical literature on limit pricing yields
She furthermore argues that potential entrants in mixed results, yet, with the exception of the exper-
this business come from other hospitals in the sur- imental study by Cooper and collegues (1997),
rounding area that do not yet have experience in none of the prior literature explicitly accounts for
the given surgical procedure. Dafny shows that asymmetric information. Information is an impor-
incumbents’ surgical procedure volume varies non- tant variable to be included in any study of limit
monotonically with the number of potential entrant pricing because variation in asymmetric infor-
mation will determine whether the incumbent is
2
The paper by Ellison and Ellison (2011) existed as a working able to engage in limit pricing or not (Milgrom
paper that predated Dafny (2005). and Roberts, 1982). Limit pricing theory gives
Copyright  2012 John Wiley & Sons, Ltd. Strat. Mgmt. J. (2012)
DOI: 10.1002/smj
Threat of Entry, Asymmetric Information, and Pricing

no guidance as to the likely sources of asym- able to use limit pricing to deter entry. This leads
metric information. In this section, I outline two to the first hypothesis:
potential sources of asymmetric information and
develop hypotheses linking these sources to the Hypothesis 1: Incumbents facing potential entry
incumbent’s price response. by firms outside the industry will be more likely
Entrants can come from a variety of sources. In to engage in limit pricing than incumbents fac-
the magazine industry studied by Simon (2005), ing potential entry by firms from inside the
entry into the incumbent’s market is from maga- industry.
zine publishers who specialize in other markets.
These de alio entrants build capabilities in one Asymmetric information about costs may also
market, which they then apply in a new market. be present in situations where the incumbent’s
The stream of literature on pre-entry experience production technology is a crucial input for its
demonstrates that the likelihood of a firm entering production function but the extent to which the
another industry is increasing in the match between production technology reduces costs is unknown.
the firm’s existing capabilities and resources and Information about production costs can be inferred
those required in the new industry (e.g., Pen- when information about the technology is easy
rose, 1959; Klepper and Simons, 2000; Helfat and to obtain. However, information about production
Lieberman, 2002). Success is not guaranteed, how- costs might not be easy to infer when informa-
ever, because there may be high coordination costs tion about the production technology is secret or
associated with de alio entry (Rawley, 2010; Zhou, difficult to obtain. Indeed, a rich discussion in
2011). Information on cost is relatively easy to the information economics literature describes how
obtain if the potential entrant can use its own cost regulators struggle to compel firms to reveal costs
(Laffont and Tirole, 1993). Other research shows
function to infer the likely cost of supply in the
that intellectual property rights can deter poten-
new market. For example, a hotel chain serving
tial entrants by excluding key technology, thereby
one geographical market looking to serve another
limiting imitation (Gilbert and Newbery, 1982).
geographical market can arguably infer costs of
Technology firms often use R&D consortia to
operating a hotel in the latter by observing actions
protect intellectual property from diffusion (Sakak-
of similar hotel chains already operating in that
ibara, 2002; Joshi and Nerkar, 2011). R&D con-
market (McCann and Vroom, 2010). More gen-
sortia allow member firms to share in R&D costs
erally, potential entrants that undertake a replica- (Katz, 1986) and also share information, thereby
tion strategy (Helfat and Lieberman, 2002) and are internalizing R&D spillovers (Spence, 1984).
from the same industry as the incumbent will infer Members of R&D consortia benefit from the dis-
production costs of the incumbent with relative covery of cost-reducing technology. Since any
ease. cost reducing technology is proprietary, members
On the other hand, it will be more difficult have an informational advantage over nonmem-
to infer the incumbent’s costs if the potential bers (Joshi and Nerkar, 2011). This increase in
entrant uses production technology different from asymmetric information may allow an incumbent
the incumbent firm, as may happen when the to engage in limit pricing:
entrant is from another industry. Overcoming the
informational disadvantage may be costly and time Hypothesis 2a: Incumbents that are members of
consuming (Coff, 1999), and despite their best R&D consortia will be more likely to engage
efforts, potential entrants may still have asymmet- in limit pricing than incumbents that are not
ric information about the incumbent’s production members.
costs. Indeed, a rich literature in corporate strategy
highlights how asymmetric information increases While membership in R&D consortia may pro-
as industry relatedness between acquirer and tar- vide access to proprietary knowledge, which in
get firm decreases (e.g., Coff, 1999; Capron and turn may facilitate the use of limit pricing, mem-
Shen, 2007; Reuer and Ragozzino, 2008; Lee and bership status may also provide an informative
Lieberman, 2010). Given the presence of asym- signal (Stuart, 2000) to the potential entrant. If
metric information when a potential entrant comes an entrant obtains information about the propri-
from outside the industry, incumbent firms may be etary technology used by one member firm, it
Copyright  2012 John Wiley & Sons, Ltd. Strat. Mgmt. J. (2012)
DOI: 10.1002/smj
R.C. Seamans

effectively gains information about all member careful identification of its incumbents and poten-
firms. Limiting leakage of member firms’ propri- tial entrants. Cable TV markets are defined by the
etary information may be especially difficult in geographical boundary of the city in which the
technology-intensive industries, which experience incumbent system is based. This effectively seg-
high employee turnover (Saxenian, 1991). Firms ments the United States into thousands of nonover-
in such industries may be able to learn much lapping geographic markets. Historically, a single
about their competitors through learning-by-hiring incumbent cable TV system served each market.
(Song, Almeida, and Wu, 2003) and competitors Following passage of the Telecom Act of 1996,
can quickly imitate once they have knowledge of a several private companies known in the industry as
manufacturing process (Zander and Kogut, 1995). ‘overbuilders’ were formed with the explicit pur-
On the other hand, nonmembers are not at the same pose of entering and competing with incumbent
risk of disclosure, and so any preexisting infor- cable TV systems. Companies such as RCN and
mation asymmetry between nonmember firms and Knology built their own cable systems; companies
potential entrants may persist. Hence, firms that such as AT&T and Verizon created subsidiaries to
are nonmembers of R&D consortia may engage in use existing telephone infrastructure to offer video
limit pricing whereas member firms do not. This services.
idea is formalized in the following hypothesis: Entrants typically focus on a specific geographic
area and base entry decisions on the proxim-
Hypothesis 2b: Incumbents that are nonmem- ity to their existing systems. For example, in its
bers of R&D consortia will be more likely to 2005 Annual Report, RCN describes its strategy
engage in limit pricing than incumbents that are to selectively expand its footprint: ‘RCN will con-
members. tinue to seek opportunities to increase its network
footprint within and adjacent to its existing mar-
ket clusters.’3 Building off the existing footprint
The first hypothesis studies incumbent response allows the entrant to spread the fixed cost of build-
to different types of potential entrants and the ing a video delivery platform and take advantage
second set of hypotheses studies how different of economies of scale in customer service, main-
types of incumbents respond to potential entrants. tenance, and repair. Thus, one can measure the
It is also useful to understand the relative impor- probability of entry into an incumbent’s market by
tance of the two conditions. When the entrant is measuring the distance from an incumbent system
from another industry, is there sufficient asymmet- to the edge of the closest cluster of entrants.
ric information to engage in limit pricing? Does Many of the cable entrants were started by vet-
membership or nonmembership in an R&D con- erans of the cable TV industry using technology
sortium provide sufficient asymmetric information similar to incumbent cable TV systems (Shapiro,
to engage in limit pricing? Is it necessary for 2000). The video signal of a typical cable system
both conditions to be present to provide enough travels along a fiber optic backbone to a neigh-
asymmetric information to engage in limit pricing? borhood node, and then along coaxial cable from
These additional empirical questions are analyzed the node to individual homes. In contrast, tele-
in the results section. com entrants are subsidiaries of large telecom firms
and their technology is more heterogeneous than
that of cable entrants (FCC, 2006). For example,
EMPIRICAL SETTING after traveling along a fiber optic backbone to a
neighborhood node, the video signal for AT&T’s
The empirical setting for this research is the U.S. U-verse system travels along standard copper tele-
cable television industry from 2006–2009. The phone lines from the node to individual homes,
industry is important to policy makers: it is a whereas the video signal for Verizon’s FiOS sys-
$100+B per year industry in the United States, the tem continues along fiber optic lines from the node
average U.S. adult spends over four hours per day to individual homes. As a result of the differ-
watching cable TV (Holmes, 2006), and its con- ent system architecture, AT&T and Verizon rely
tent can influence political outcomes (Della Vigna
and Kaplan, 2007). There are also many attractive 3
2005 RCN Annual Report, page six. Available for download:
features of the cable TV industry that allow for http://investor.rcn.com/annuals.cfm (6 June 2010).

Copyright  2012 John Wiley & Sons, Ltd. Strat. Mgmt. J. (2012)
DOI: 10.1002/smj
Threat of Entry, Asymmetric Information, and Pricing

on different standards for moving data through limit pricing as distance to the potential entrant
their systems (FCC, 2006; FCC, 2007). The dif- varies. Finally, in order to understand whether the
ferences in technology suggest that to the extent presence of either condition is sufficient for limit
asymmetric information exists at all it is likely pricing or whether both are necessary, I interact
higher between incumbents and telecom entrants membership in CableLabs with the distances to
than between incumbents and cable entrants. closest potential telecom and cable entrants.
In 1988, incumbent cable system operators Ellison and Ellison (2011) argue that incentives
established an R&D consortium called CableLabs to deter entry will vary nonmonotonically with the
to develop new technologies for cable systems.4 probability of entry. In the U.S. cable TV context,
CableLabs is credited with establishing many of the probability of entry increases as distance to the
the important standards used by cable operators, potential entrant decreases. If the potential entrant
including standards for cable modems, fiber optic has a low probability of entry into an incumbent’s
implementation and architecture, and telephony market, as might happen if the potential entrant
over the cable system. The standards are dissemi- is in a geographically distant location, then the
nated to members through documents and technical incumbent may decide not to use limit pricing
demonstrations at annual members-only confer- because entry is highly unlikely in any case. As
ences. In order to access documents or attend con- distance to the potential entrant shrinks, the proba-
ferences, members must sign nondisclosure agree- bility of entry starts to increase, and the incumbent
ments. Cable entrants are not members of Cable- may be more likely to engage in limit pricing
Labs and non-cable operators, including telecom because the relative costs of using low price are
entrants, are explicitly denied membership.5 increasingly offset by the potential reduction in
the probability of entry. As the probability of entry
increases past a certain point, however, the incum-
METHODOLOGY AND DATA bent may become less likely to engage in limit
pricing. The incumbent will be unwilling to forego
Methodology some profits by pricing low if, no matter the efforts
expended by the incumbent, the entrant is highly
To assess the two hypotheses, I analyze pricing pat- likely to enter. At the extreme, if entry is certain,
terns of incumbent cable TV systems facing threat there are no benefits to engaging in limit pricing.
of entry. Variation in incumbent and entrant types, Hence, to the extent that the incumbent engages in
variation in distance to potential entrants, and the limit pricing, its response will vary nonmonotoni-
large number of nonoverlapping geographic mar- cally with distance to the potential entrant.
kets provides a natural setting for clean tests of the The methodology proposed by Ellison and Elli-
hypotheses. For Hypothesis 1, I identify the dis- son (2011) suggests a specification of the following
tances to the closest potential telecom and cable form:
entrants and then test whether the incumbent is
more likely to engage in limit pricing when fac- (1) lnpriceist = β0 + β1
ing potential entry from the telecom entrant than
from the cable entrant. For Hypotheses 2a and 2b, lndistance to potential entrantit
I identify whether an incumbent cable TV firm is a + β2 lndistance to potential entrantit2 + bx Xist
member of CableLabs or not and then test whether
these firms are more or less likely to engage in + γi + service tiers + yeart + εist (1)

4
The National Cooperative Research Act, passed by Congress in
where lnprice ist is the natural log of price for
1984, reduced potential antitrust liabilities of research joint ven- system i with service tier s at time t, Xist is a vector
tures, including R&D consortia such as CabeLabs (Sakakibara, of system controls, γi is a system fixed effect,
2002).
5
service tier s is a service tier dummy, and year t
Per CableLabs’ Web site: ‘CableLabs’ members are exclusively
cable system operators. They do not include competitive network is a year effect. In cable TV industry parlance, a
platforms such as direct broadcast satellite (DBS), telephone ‘tier’ is a package of channels and sometimes other
companies delivering video services, electrical utilities deliv- services. Lndistance to potential entrant it is the log
ering broadband services, multi-channel multipoint distribution
systems (MMDS) or the like.’ From: http://www.cablelabs.com/ of the distance in miles to the closest potential
about/companies (4 December 2009). cable or telecom entrant to system i at time t. The
Copyright  2012 John Wiley & Sons, Ltd. Strat. Mgmt. J. (2012)
DOI: 10.1002/smj
R.C. Seamans

term lndistance to potential entrant 2it is included closest potential cable or telecom entrant is located
to capture any nonmonotonicity in the pricing were found using software that calculates the dis-
pattern. Signs on the coefficients of β1 < 0 and tance between zip codes to create the variable dis-
β2 > 0 will provide evidence of a nonmonotonic tance to potential entrant it .6 Separate variables for
U-shaped pricing response. In some specifications, distance to potential telecom entrant it and distance
the distances are broken out by telecom and cable to potential cable entrant it have also been created.
entrant in order to take advantage of variation in Logs of these distances are used in all regressions
asymmetric information between the two types of to correct for skewness in the data and to be con-
entrant. sistent with Ellison and Ellison (2011).
Cablelabs it is a dummy variable indicating
whether the incumbent system is owned by one
Data and variable definition
of the firms that is a member of CableLabs. This
Dependent variable: price variable is constructed using data on membership
Price is the dependent variable in all regres- for 2003, 2006–2009.7
sions. Price varies by system, service tier, and
year, and is logged following other research on Time-varying control variables
pricing (e.g., McCann and Vroom [2010], Simon System age it is a continuous variable that measures
[2005], Yamawaki [2002]). Data on price and other the age of system i at time t. System age it controls
cable system characteristics is from Warren Com- for the possibility that younger firms use newer
munications’ Cable TV Factbook for 2003 and technology that reduce distribution costs. Homes
2006–2009. The 2003 data is used for a robustness passed it is a count of the number of potential
test described in the results section. The Fact- hookups that the incumbent cable system passes
book data is the main source of cable TV system at time t. This variable is included to account
data used in most empirical studies of the industry for the idea that systems located in areas of high
(e.g., Goolsbee and Petrin, 2004; Della Vigna and population density may be able to trade off lower
Kaplan, 2007). prices for higher volume. This variable has been
logged to control for skewness. Percent fiber it is
Main independent variables the ratio of miles of fiber optic cable to total miles
of cable it . This variable is included to account
The main independent variables include distance
for changes in cable system technology. Systems
to potential entrants, type of potential entrant, and
with more fiber optic cables provide higher quality
information on the membership of CableLabs.
signals to customers and may be able to charge
Data on the location of potential cable entrants
more.
comes from Warren Communications’ Cable TV
The variable dsl providers it measures the aver-
Factbook for 2006–2009. Data on the location and
age number of digital subscriber line (DSL)
date of entry of potential telecom entrants comes
providers in the county in which system i is based
from Warren Communications’ Telco/IPTV Fact-
at time t. DSL provides customers with broadband
book for March 2010. The Telco/IPTV dataset is
Internet access and telephony and hence may be
a new dataset and to the best of my knowledge no
a substitute for cable TV service. It is important
other study has used this data. Date of entry, which
to include some measure of the number of DSL
is used to construct historical entry patterns, is only
providers to control for the possibility that incum-
available for about half of the potential telecom
bents in highly competitive markets are less likely
entrants. Hence, two assumptions are made for the
to respond to entry, as shown by Simon (2005).
main results. First, the inclusion of entry dates for
DSL data is publicly available from the FCC.8 The
only a subset of telecom entrants is random. Sec-
ond, if a telecom entrant enters prior to 2009, it is
6
not likely to exit before 2009. Robustness checks, Distances were calculated using Spheresoft Zip Code Tools in
Microsoft Excel.
described below, were performed on these assump- 7
The information for 2009 was obtained from http://www.
tions. There are 86 potential cable entrants and 901 cablelabs.com/join/companies/, (6 June 2010); historical infor-
potential telecom entrants. mation was obtained from various searches on internetarchive.
com.
The distances from each city in which an incum- 8
Data is available for download here: http://www.fcc.gov/wcb/
bent system is located to the city in which the iatd/comp.html (1 April 2010).

Copyright  2012 John Wiley & Sons, Ltd. Strat. Mgmt. J. (2012)
DOI: 10.1002/smj
Threat of Entry, Asymmetric Information, and Pricing

average is created by taking the estimated number County and City Databook for the year 2000. All
of DSL providers at the zip code level and averag- the cross-section results also include dummy vari-
ing across all zip codes in the county. Averages at ables for states to control for regional differences
the county level help control for a reporting issue in demand for cable services that are not already
with FCC data whereby ranges instead of numbers captured by the demographic variables, as well as
are specified for low numbers of DSL providers.9 to control for differences across states in regula-
Certain robustness checks described in the tion of cable and telecom services. For example, de
results section use the variables number of sys- Figueiredo and Edwards (2007) show that variation
tems it and two-way capable it . The continuous vari- in state legislatures affects pricing of unbundled
able number of systems it counts the number of network elements, which in turn may affect the
systems owned by the parent firm of system i at strength of competition from telecom firms.
time t. This variable has been logged to control for
skewness. Two-way capable it indicates whether the
Fixed effects and other dummy variables
system has been upgraded to two-way capability at
time t. The results include fixed effects variables for sys-
tem, year, and service tier and also include dummy
variables for channels. System fixed effects γi con-
Cross-sectional control variables
trol for unobserved, stable characteristics that vary
The main results use system level fixed effects, so at the system level. Since each system is spe-
cross-sectional variables are not included. How- cific to a city, the system fixed effects also control
ever, certain robustness checks described below for local market characteristics. Year effects year t
do not use fixed effects and so additional cross- control for unobserved time-varying factors such
sectional variables are included. These include as macroeconomic trends in the economy. Indi-
system-level and county-level variables. cators for 16 tiers service tier s are included in
A dummy variable for duopoly i indicates if the all regressions.10 Indicators for 283 channels are
incumbent system is one of two systems in a city. included in all regressions.11 The inclusion of ser-
The duopoly variable is included in robustness vice and channel dummies in this study captures
checks to account for the possibility that if there any changes in price within a system over time
already exist two systems in the market, the market that result from changes to channel lineups.12 Other
is unattractive to potential entrants so the incum- studies that have looked at cable TV system pricing
bent will have less incentive to engage in limit have focused on only one or two tiers of pricing,
pricing. The dummy variable municipal utility i typically the basic service and one premium tier.13
indicates if the incumbent system is based in a city Summary statistics of all variables are pre-
with a municipal electric utility. These municipal sented in Table 1A.14 The average distance from
agencies have been known to enter the video pro-
gramming market to compete against incumbent 10
There were an additional 17 tiers that were used infrequently
systems, and Seamans (2012) shows that incum- across the years of data and dropped; dropping the extra service
bent systems based in these cities tend to upgrade tiers resulted in reducing the total number of observations by
less than one percent.
their systems to deter city entry. Inclusion of the 11
There were over 1,600 different channels in the original
municipal utility i controls for the possibility that dataset, but most of these channels were rarely used outside
the municipal agency may enter, and so the market of a few systems. Channels were dropped if there were fewer
may be less attractive to private entrants. than 200 observations of that channel. This resulted in dropping
over 1,300 channels, but only about two percent of the total
Population per square mile i , per capita income i , observations. Note that it is important to include tier indicators
new house i (the number of new house permits because of the many channels that were dropped.
12
issued), and percent of population living in a rural i Channel lineups for a tier may be arranged differently across
systems. For example, in 2006 the Cartoon Network appears
area account for demand-side effects (Greenstein with 32 other channels in the basic tier in Stockton, CA,
and Mazzeo 2006; Mayo and Otsuka, 1991). with 43 other channels in the expanded basic tier in Alameda,
County-level demographic variables are from the CA, and with 67 other channels in the digital basic tier in
Bakersfield, CA.
13
For examples, see Chipty (2001) and Emmons and Prager
9
Results are unchanged in robustness checks that use a dummy (1997).
14
variable indicating a high number of DSL providers instead of Correlations between variables are included in the online
the continuous variable. The results are in the online supplement. supplement.

Copyright  2012 John Wiley & Sons, Ltd. Strat. Mgmt. J. (2012)
DOI: 10.1002/smj
R.C. Seamans

Table 1A. Summary statistics

Distribution
Mean SD Min Max 10th 50th 90th

1 Price 16.17 10.85 0.00 103.95 7.00 12.00 32.99


2 Distance to potential entrant 101.34 99.10 0.00 803.70 3.17 78.81 238.19
3 Dist. to potential telecom entrant 189.68 201.20 0.00 1000.00 3.87 113.26 514.54
4 Dist. to potential cable entrant 155.95 112.01 0.00 1000.00 33.08 137.09 297.29
5 CableLabs 0.48 0.50 0.00 1.00 0.00 0.00 1.00
6 System age 32.54 10.53 3.00 61.00 21.00 29.00 48.00
7 Homes passed 28043 115327 0.00 4100000 320 2845 52525
8 Percent fiber 0.04 0.12 0.00 1.00 0.00 0.00 0.17
9 DSL providers 5.26 1.80 0.86 15.80 3.06 5.14 7.50
10 Duopoly 0.04 0.20 0.00 1.00 0.00 0.00 0.00
11 Municipal utility 0.20 0.40 0.00 1.00 0.00 0.00 1.00
12 Population per square mile 234.64 1494.13 0.30 66835 6.50 49.80 392.60
13 Income 33282 7384 15439 74586 25109 32250 42260
14 New house 181.74 845.72 0.00 10245 0.00 0.00 247.00
15 Rural 5.69 6.34 0.00 47.00 0.30 3.20 15.00
16 Two-way capable 0.79 0.41 0.00 1.00 0.00 1.00 1.00
17 No. systems owned by firm 273.41 294.90 1.00 995.00 2.00 128.00 749.00

Number of observations: 41,280; number of systems: 3,202.

Table 1B. Summary statistics by incumbent type

Type of firm: (a) Non-CableLabs (b) CableLabs


Mean SD Mean SD

1 Price 16.04 10.03 16.30 11.66


2 Distance to potential entrant 103.06 94.52 99.56 103.75
3 Dist. to potential telecom entrant 191.37 200.06 187.71 202.44
4 Dist. to potential cable entrant 161.41 103.99 150.17 119.73
5 CableLabs 0.00 0.00 1.00 0.00
6 System age 30.66 10.64 34.61 10.01
7 Homes passed 4987 17372 52914 161849
8 Percent fiber 0.04 0.12 0.05 0.11
9 DSL providers 5.10 1.71 5.44 1.88
10 Duopoly 0.02 0.13 0.07 0.25
11 Municipal utility 0.19 0.39 0.20 0.40
12 Population per square mile 83.14 219.60 398.38 2132.75
13 Income 31679 6479 35009 7899
14 New house 81.47 581.23 290.30 1049.97
15 Rural 7.04 6.91 4.24 5.28
16 Two-way capable 0.72 0.45 0.86 0.35
17 No. systems owned by firm 107.90 177.54 453.04 291.70

(a) Number of observations: 21,451; number of systems: 1,884.


(b) Number of observations: 19,829; number of systems: 1,708.

an incumbent cable system to the closest potential potential entrant is about the same for nonmembers
entrant is 101 miles. Forty-eight percent of the and members of CableLabs (103 miles and 100
incumbent cable systems in the sample are mem- miles, respectively). Comparison of other variables
bers of CableLabs. Table 1B splits the summary suggests that members of CableLabs have larger
statistics by membership in CableLabs. The aver- systems and have parent firms that own many
age distance from an incumbent to the closest other systems. Robustness tests described below
Copyright  2012 John Wiley & Sons, Ltd. Strat. Mgmt. J. (2012)
DOI: 10.1002/smj
Threat of Entry, Asymmetric Information, and Pricing

Table 2. Demographic characteristics of entrant location, by type

Type of firm: (a) Cable entrants (b) Telecom entrants


Mean SD Min Max Mean SD Min Max

Population per square mile 618 2031 14 16526 1224 1473 9 12957
Income 34279 3658 28765 43405 45935 11569 21518 74586
New house 723 1564 0.00 6353 1323 2116 0.00 7808
Rural 5.97 9.23 0.00 26 0.73 1.28 0.00 14

(a) Number of potential cable entrants: 86.


(b) Number of potential telecom entrants: 901.

investigate the extent to which these differences attempt to further understand the source of asym-
drive results. metric information so as to better understand the
Demographic characteristics of the location of conditions under which incumbents engage in limit
potential entrants are presented in Table 2. Tele- pricing.
com entrants appear to be located in more pop- I first examine the extent to which variation in
ulated, higher income areas than cable entrants. entrant type explains when incumbents engage in
Robustness tests described below investigate the limit pricing. To test Hypothesis 1, I first sepa-
extent to which demographic differences across rately consider the distances to each type of poten-
incumbent cable systems drive results. tial entrant before including both in order to rule
out that colinearity between the variables drives
results.15 Column 3 follows the model described
in Eequation (1), but specifically considers the
RESULTS
distance to the closest potential telecom entrant.
The coefficient on lndistance to potential telecom
Main results entrant it is negative and significant and the coef-
This section presents results of ordinary least ficient on lndistance to potential telecom entrant 2it
squares regressions on the log of price, as described is positive and significant. The sign and signifi-
in Equation (1), with modifications as noted. cance of these coefficients provide evidence that
Robust standard errors are clustered at the system incumbent firms facing potential telecom entrants
level to account for any autocorrelation in the data are likely to engage in limit pricing. In Col-
(Bertrand, Duflo, and Mullainathan, 2004). umn 4, the coefficient on lndistance to potential
Table 3 presents the main results. Column 1 of cable entrant it is negative but insignificant and
Table 3 includes only the control variables; coef- the coefficient on lndistance to potential cable
ficients on channel, service tier, system, and year entrant 2it is positive but insignificant. These coef-
fixed effects are suppressed for presentation pur- ficients provide no evidence that incumbent firms
poses. The specification presented in Column 2 facing potential cable entrants engage in limit pric-
follows the model described in Equation (1) by ing. The results in Column 5 include distances to
focusing on the distance to the closest potential both types of potential entrants and confirm the
entrant of any type. The coefficient on lndistance results from the prior two columns. The results in
to potential entrant it is negative and significant and Columns 3–5 provide strong evidence in support
the coefficient on lndistance to potential entrant 2it of Hypothesis 1.
is positive and significant. The sign and signifi- Next, I examine the extent to which variation in
cance of these coefficients indicate that incumbent incumbent type explains when the incumbent will
systems engage in nonmonotonic U-shaped pricing engage in limit pricing. In order to test Hypotheses
when facing potential entry, a result that is con- 2A and 2B, Column 6 adds interactions between
sistent with limit pricing. Column 2 includes no
information about the likely source of asymmetric 15
As reported in the online supplement, the correlation between
information between the incumbent and poten- the distance to potential telecom entrant and distance to potential
tial entrant. The results in the remaining columns cable entrant is 0.30.

Copyright  2012 John Wiley & Sons, Ltd. Strat. Mgmt. J. (2012)
DOI: 10.1002/smj
Table 3. Main results
R.C. Seamans

Dependent variable: InPrice (OLS models)


(1) (2) (3) (4) (5) (6) (7)

InDistance to potential entrant −0.0235∗∗ −0.0470∗∗∗


[0.0103] [0.0168]

Copyright  2012 John Wiley & Sons, Ltd.


InDistance to potential entrant2 0.0031∗∗ 0.0082∗∗∗
[0.0015] [0.0023]
InDistance to potential telecom entrant −0.0337∗∗∗ −0.0343∗∗∗ −0.0485∗∗∗
[0.0123] [0.0123] [0.0178]
InDistance to potential telecom entrant2 0.0043∗∗∗ 0.0044∗∗∗ 0.0079∗∗∗
[0.0016] [0.0016] [0.0023]
InDistance to potential cable entrant −0.0080 −0.0066 −0.0238
[0.0120] [0.0120] [0.0217]
InDistance to potential cable entrant2 0.0008 0.0005 0.0027
[0.0015] [0.0015] [0.0026]
Cablelabs∗ InDist to potential entrant 0.0439∗∗
[0.0219]
Cablelabs∗ InDist to potential entrant2 −0.0098∗∗∗
[0.0032]
Cablelabs∗ InDist. to potential telecom entrant 0.0304
[0.0221]
Cablelabs∗ InDist. to potential telecom entrant2 −0.0073∗∗∗
[0.0028]
Cablelabs∗ InDist. to potential cable entrant 0.0268
[0.0269]
Cablelabs∗ InDist. to potential cable entrant2 −0.0035
[0.0034]
Cablelabs 0.0109 0.0099 0.0109 0.0109 0.0110 0.0084 −0.0118
[0.0142] [0.0143] [0.0143] [0.0142] [0.0142] [0.0380] [0.0711]
System age −0.6251∗∗∗ −0.6211∗∗∗ −0.6101∗∗∗ −0.6237∗∗∗ −0.6071∗∗∗ −0.5691∗∗ −0.4802∗∗
[0.2286] [0.2285] [0.2291] [0.2285] [0.2290] [0.2292] [0.2317]
Homes passed −0.0089 −0.0089 −0.0083 −0.0090 −0.0083 −0.0094 −0.0086
[0.0162] [0.0161] [0.0162] [0.0162] [0.0162] [0.0157] [0.0159]

DOI: 10.1002/smj
Strat. Mgmt. J. (2012)
Threat of Entry, Asymmetric Information, and Pricing

cablelabs it and the distance variables. The coeffi-

4.6532∗∗∗

0.4281
41,280
[0.0824]

[0.0052]

[0.8327]

3,202
cient on lndistance to potential entrant it is negative

YES
YES
YES
YES
−0.0041
0.0323
and significant and the coefficient on lndistance
to potential entrant 2it is positive and significant.
Hence, nonmembers of Cablelabs appear to engage
in limit pricing, providing support for Hypothesis
2b. The coefficient on the interaction cablelabs it *
4.9278∗∗∗

0.4279
41,280
lndistance to potential entrant it is positive and sig-
[0.0831]

[0.0050]

[0.8240]

3,202
YES
YES

YES
YES
−0.0054
0.0285

nificant and the coefficient on the interaction cable-


labs it * lndistance to potential entrant 2it is negative
and significant. These results indicate that mem-
bers of CableLabs do not engage in limit pricing,
and hence there is no support for Hypothesis 2a.16
5.0772∗∗∗

Finally, in Column 7 cablelabs it is interacted


0.4277
41,280
[0.0816]

[0.0052]

[0.8272]

3,202
YES
YES
YES
YES
0.0269

−0.0038

with the variables for distance to potential cable


and telecom entrants. None of the coefficients on
the variables for distance to potential cable entrant
are significant. The coefficient on lndistance to
potential telecom entrant it is negative and sig-
significant at 1%

nificant, the coefficient on lndistance to potential


5.0595∗∗∗

0.4276
41,280
[0.0818]

[0.0051]

[0.8185]

3,202
YES
YES

YES
YES
−0.0052
0.0243

telecom entrant 2it is positive and significant, the


coefficient on cablelabs it * lndistance to potential
telecom entrant it is positive but significant at the
15 percent level only, and the coefficient on cable-
∗∗∗

labs it * lndistance to potential entrant 2it is negative


significant at 5%;

and significant. The results indicate that nonmem-


5.0670∗∗∗

0.4277
41,280
[0.0817]

[0.0051]

[0.8266]

3,202
YES
YES
YES
YES

bers of CableLabs are likely to engage in limit


−0.0039
0.0268

pricing when facing a potential telecom entrant


but not a potential cable entrant, and members of
CableLabs are not likely to engage in limit pric-
∗∗
Robust standard errors in brackets; clustered at system; ∗ significant at 10%;

ing even when facing a potential telecom entrant.17


These results indicate that being a nonmember of
5.1004∗∗∗

0.4276
41,280
[0.0820]

[0.0050]

[0.8247]

CableLabs and facing a telecom entrant are both


3,202
YES

YES
YES
YES
−0.0051
0.0286

necessary conditions for the use of limit pricing.


The results in Table 3 provide support for
Hypothesis 1. In order to better understand how the
incumbent system responds to changes in the threat
5.0437∗∗∗

0.4276
41,280
[0.0818]

[0.0050]

[0.8181]

3,202
YES
YES
YES
YES
−0.0051
0.0239

16
Econometrically, the overall coefficient of Cablelabs mem-
bers is the sum of the baseline coefficient for all firms (without
interactions) and the coefficient of the variables interacted with
Cablelabs. Wald tests are performed on the sum of the inter-
acted and noninteracted coefficients to determine support for
Hypothesis 2a. The p-value on the Wald test lndistance to poten-
tial entrant it + CableLabs*lndistance to potential entrant it = 0
Number of observations
Service tier dummies
System fixed effects

is 0.82 and the p-value on the Wald test lndistance to poten-


Channel dummies

Year fixed effects

Number of systems

tial entrant 2it + CableLabs*lndistance to potential entrant 2it = 0


Controls included:

is 0.41. The null hypotheses that the coefficients equal zero can-
DSL providers

not be rejected in either case.


Percent fiber

17
The p-value on the Wald test lndistance to potential telecom
R-squared

entrant it + CableLabs*lndistance to potential telecom


Constant

entrant it = 0 is 0.23; the p-value on the Wald test lndistance to


potential telecom entrant 2it + CableLabs*lndistance to potential
telecom entrant 2it = 0 is 0.79.

Copyright  2012 John Wiley & Sons, Ltd. Strat. Mgmt. J. (2012)
DOI: 10.1002/smj
R.C. Seamans

of entry, I use the estimated coefficients from Col- pricing pattern. This section describes plausible
umn 5 to create a graph of the relationship between alternative explanations and robustness tests that
price and distance to potential entrant, by potential were performed to rule them out.
entrant type. As depicted in Figure 1, the incum- The main results include system-level fixed
bent system has a nonmonotonic U-shaped price effects to control for any unobserved, stable char-
response to the distance to the closest potential acteristics that vary at the system level. For exam-
telecom entrant. In contrast, the incumbent system ple, this helps rule out the idea that the results are
has a more or less flat price response to the dis- due to cross-system variation in demand for dig-
tance to the closest potential cable entrant. The ital broadcast satellite (DBS).18 The system-level
figure shows that the minimum of the U-shaped fixed effects also control for fixed attributes of the
price response function lies at about 50 miles. For cable system itself, such as quality of wires and
comparison, the mean distance to a potential tele- other components installed when the system was
com entrant is about 189 miles (see Table 1A). built, as well as political and bureaucratic varia-
The figure illustrates that the incumbent is more tion across cities, which might affect the cost and
likely to use a low price response when the poten- time involved for a cable system to apply for and
tial entrant is located a moderate distance away. If obtain permits to dig up streets and repair dam-
the potential entrant is located very close by, for aged equipment or lines. Fixed effects cannot rule
example 10 miles away, the incumbent has less out changes within the system over time. Hence,
incentive to price low to send a signal of low cost system-specific time-varying controls such as sys-
because the probability that the potential entrant tem age it , homes passed it , percent fiber it and dsl
will enter is high and any signal sent by the incum- providers it have been included to rule out likely
bent is unlikely to dissuade the potential entrant explanations for price changes within systems over
from entering. Likewise, if the potential entrant time.
is located far away, for example 300 miles away, One alternative explanation is that the use of
the incumbent has less incentive to price low to low prices by incumbents owes to incumbents
send a signal of low cost because the probabil- switching to lower cost technologies, not the use
ity of entry is already low. As indicated by the of a limit pricing strategy. The main results include
coefficients in Column 7, in the case of an incum- the variable percent fiber it to capture any changes
bent facing potential telecom entry the U-shape to cable wire quality and control for within-system
presented in Figure 1 will be steeper for a non- technology changes. However, while unlikely, it is
member of CableLabs and shallower for a member nevertheless possible that a system deploys new
of CableLabs. technology that is uncorrelated with the quality of
its cable wires. In order to further rule out this
Addressing threats to identification alternative explanation, the fully interacted model
presented in Table 3 Column 7 is repeated on
The results presented in Table 3 are consistent with the subset of firms that have upgraded to two-
limit pricing. However, there might be nonstrate- way capable it , another measure of cable system
gic reasons that explain the incumbent system’s technology.19 The results are consistent with those
presented in Table 3.20
Another possibility is that larger firms, which
own multiple systems, benefit from economies of
scale in purchasing or producing cable TV content.
These within-firm economies of scale lead to lower

18
By 2003, DBS availability was more or less ubiquitous and
DBS prices were uniform across markets (Crawford,
forthcoming).
19
As indicated in Table 1A, most systems in the sample (79%)
have upgraded to two-way capability, so this indicator variable
cannot be included as a regressor as it would be colinear with
the system fixed effect.
Figure 1. Effect of distance to potential entrant on 20
The results of all the robustness tests undertaken in this section
incumbent’s price, by entrant type are provided in an online supplement to the paper.

Copyright  2012 John Wiley & Sons, Ltd. Strat. Mgmt. J. (2012)
DOI: 10.1002/smj
Threat of Entry, Asymmetric Information, and Pricing

costs that might be passed on as lower prices possibility that the results in Table 3 owe to non-
to customers. Hence, an alternative explanation random data on the date of telecom entry. The
would be that incumbent systems owned by large results are consistent with the results presented in
firms are distributed geographically in such a way Table 3.22
that potential telecom entrants are, on average, Finally, in order to add additional support to
located 50 miles away. In order to rule out this the findings presented in Table 3, I use incum-
possibility, the fully interacted model is replicated bent cable system data from 2003 together with
after controlling for firm size using the continuous the 2009 location of potential entrants in a fal-
variable number of systems it , which counts the sification test. As in Kalnins, Swaminathan, and
number of systems owned by the parent firm of Mitchell (2006), the falsification test helps address
system i at time t. The results are consistent with the possibility that the relationships documented in
those presented in Table 3.21 Table 3 are not causal. The prior regression anal-
The possibility that the effects owe to economies yses assume exogeneity of the distance variables.
of scale or market power is further investigated If so, then the incumbent’s price patterns at time
using several split sample studies. These stud- t are a function of distance to closest potential
ies are performed on four variables of inter- entrant at time t. The robustness of this assump-
est including number of systems it , which cap- tion is tested by checking whether price patterns
tures within-firm economies of scale as described at time t are a function of distance to potential
above, dsl providers it , which captures market com- entrant at time t + k. In this setup, if coefficients
petition, homes passed it , which captures within- on the distance to potential entrant variables for
system economies of scale, and system density it , a time t + k are significant, it would suggest the
ratio of number of homes passed it to the miles of possibility of reverse causality or presence of omit-
cable it , which also captures within-system ted variables correlated with the future proximity
economies of scale. The split sample studies are of potential entrants. The test is operationalized
operationalized by interacting the independent vari-
by running analyses similar to those presented in
ables with a dummy variable indicating that the
Table 3, but using cable system variables from
variable of interest is above the median. There is
2003 and potential entrant variables from 2009.
no evidence that the results vary across the split
The 2003 date is chosen because it predates entry
samples.
by the telecom entrants (although there were cable
The statistics presented in Table 2 highlight that
entrants present at that point in time) and poten-
telecom entrants are more likely to locate in certain
tial entrant variables from 2009 are used to take
demographic areas than cable entrants. In order to
rule out that this difference is driving the incum- advantage of the full dataset of potential entrants.
bent’s differential response to telecom and cable Also, since the test is cross-sectional, system fixed
entrants, additional split sample studies are per- effects are not used. Instead, demographic and state
formed on demographic variables. These studies dummy variables are included. The results show
are performed on four measures including popu- that none of the distance variables is significant, as
lation per square mile i , income i , new house i , and expected.23 These results lend confidence that the
rural i . There is little evidence that the results vary results from Table 3 are not due to reverse causal-
across the split samples. ity or the presence of omitted variables that might
Another alternative explanation is that the results be correlated with the future proximity of potential
owe to the construction of the data. Date of entry entrants.
was only available for a subset of the telecom
entrants used to create the time-varying distance
to potential entrant variables used in the main 22
Variables that are significant at the 10 percent or better level
results. However, the location (but not date) is in the fixed effects models are significant at the 35 percent or
better level in the 2009 cross-section. The one exception is in
known for a larger set of telecom entrants in the fully interacted model. In this model, the sign on lndistance
2009. The results from Table 3 were replicated to potential telecom entrant it is positive and the coefficient on
on the 2009 cross-sectional data to rule out the lndistance to potential telecom entrant 2it is negative, which are
the reverse of those expected. The confidence intervals around
the coefficients are so large, however, that they include the point
21
Number of systems it is not included in the main results because estimates found in Table 3.
23
of its high correlation (0.58) with cablelabs it . The results are provided in an online supplement.

Copyright  2012 John Wiley & Sons, Ltd. Strat. Mgmt. J. (2012)
DOI: 10.1002/smj
R.C. Seamans

DISCUSSION AND CONCLUSION enough asymmetric information to engage in limit


pricing.
This study provides evidence that incumbent firms These findings provide evidence that incum-
use nonmonotonic U-shaped pricing when fac- bents use price as an ex ante strategic variable.
ing threat of entry. This U-shaped pricing pattern These results complement the large body of liter-
exists in situations characterized by asymmetric ature on ex post pricing responses (e.g.: Thomas,
information, and hence provides empirical evi- 1999; Simon, 2005; McCann and Vroom, 2010) by
dence consistent with limit pricing. To the best of demonstrating that firms have a range of options
my knowledge, this is the first study of limit pric- available to respond to potential and actual entry.
ing that explicitly incorporates variation in asym- These findings also differ from those of Savage
metric information outside of an experimental lab- and Wirth (2005) which finds no evidence that
oratory setting. In addition, this study suggests two incumbent cable TV systems use price in response
potential sources of asymmetric information: when to potential entry. This study differs from Savage
the entrant is from outside the incumbent’s indus- and Wirth in several ways. First, Savage and Wirth
try and when the incumbent is a member of an (2005) focus on the relationship between price
R&D consortium. and competition instead of limit pricing. Hence,
The analyses focus on the U.S. cable TV indus- their study does not consider situations in which
try; not only is the industry important for public asymmetric information might arise, whereas the
policy but also because its industrial organization concept of asymmetric information is central to
and the wealth of information on the packages this study. Second, Savage and Wirth use results
offered to consumers lend itself to a study of from a probit model to proxy for potential com-
entry deterrence. Incumbents, entrants, and mar- petition whereas this study uses the distance to
ket boundaries are readily identified. System fixed potential entrant as a measure of threat of entry.
effects rule out many of the obvious alternative Third, this study uses panel data with cable sys-
explanations and channel and service tier dummies tem fixed effects to analyze the pricing decisions
control for within-system, time-varying changes in of a large sample of cable systems over a period
the cost of cable service. Potential entrants into of time. Identification of the result comes from
the industry, whether cable or telecom, enter by within-system variation in distance to the potential
expanding off their existing footprint. Hence, con- entrant.
tinuous measures of threats of entry can be created This study suggests several areas for future
by calculating the distance between the incumbent research. One avenue for future research concerns
and closest potential entrant. Finally, the differ- the firm’s decision about the type of entry deterring
ences between the types of incumbents and poten- strategy. Incumbents may use other mechanisms to
tial entrants allow a researcher to exploit variation respond to potential entrants instead of limit pric-
in information asymmetry. ing. For example, incumbents may instead invest
The study first investigates differences in incum- in excess capacity, increased advertising, or R&D
bent pricing responses by type of potential entrant investment (Smiley, 1988), or may attempt to pass
faced. The results provide evidence consistent regulations prohibiting entry (Dean and Brown,
with limit pricing when incumbents face poten- 1995). In another study of the cable TV industry,
tial telecom entrants but not when incumbents face Seamans (2012) finds that incumbent systems use
potential cable entrants. The study then investi- technology upgrades to deter entry by municipal
gates the differences in pricing response by two agencies. Further research is needed to determine
types of incumbent that face potential entry. The how incumbents choose between entry deterring
results provide evidence consistent with limit pric- mechanisms.24 In addition, the literature on ex post
ing when incumbents are nonmembers of Cable- pricing responses (e.g.: Thomas, 1999; Simon,
Labs, but not when incumbents are members of 2005; McCann and Vroom, 2010) show that some
CableLabs. This suggests that membership status incumbents choose to wait until after the poten-
provides an informative signal to potential entrants tial entrant has actually entered before responding.
that precludes the use of limit pricing. Finally, the Hence, another avenue for future research is to
results provide evidence that both conditions—
nonmembership in CableLabs and potential tele- 24
The extent to which incumbents use other deterrence mecha-
com entry—are necessary in order to provide nisms biases against finding an effect in this study.

Copyright  2012 John Wiley & Sons, Ltd. Strat. Mgmt. J. (2012)
DOI: 10.1002/smj
Threat of Entry, Asymmetric Information, and Pricing

understand the conditions under which the incum- author also gratefully acknowledges financial sup-
bent will respond to potential entry with ex ante port from the NET Institute (www.netinst.org)
actions or wait for entry to occur before respond- and the Kauffman Foundation. All errors are the
ing with ex post actions. responsibility of the author.
While the study makes an important contribu-
tion to strategy literature, and suggests promis-
ing avenues for future research, it is important REFERENCES
to acknowledge several caveats. First, while the
results are consistent with limit pricing, it is dif- Akerlof GA. 1970. The market for ‘lemons’: quality
ficult to rule out all alternative explanations. The uncertainty and the market mechanism. Quarterly
fixed effects models and wide variety of robustness Journal of Economics 84(3): 488–500.
checks, including the falsification test, attempt to Bagwell K. 2007. Signaling and entry deterrence:
a multidimensional analysis. RAND Journal of
rule out plausible alternative explanations. These Economics 38(3): 670–697.
numerous attempts, however, are not foolproof. Bain J. 1949. A note on pricing in monopoly and
Second, the setting is limited to a single indus- oligopoly. American Economic Review 39: 448–464.
try, and it is unclear the extent to which the Bertrand M, Duflo E, Mullainathan S. 2004. How much
results generalize to other industries. Low price should we trust differences-in-differences estimates?
Quarterly Journal of Economics 119(1): 249–275.
has been observed in response to potential entry Cable TV Factbook. 2003, 2006–2009. Warren Commu-
in other industries (Goolsbee and Syverson, 2008; nications. Washington, DC.
Hannan, 1979; Masson and Shaanan, 1986). What Capron L, Shen J-C. 2007. Acquisitions of private vs.
has been missing from these studies thus far is public firms: private information, target selection, and
a focus on variation in asymmetric information. acquirer returns. Strategic Management Journal 28(9):
Future research would be well-served to further 891–911.
Casadesus-Masanell R, Zhu F. 2010. Strategies to fight
investigate whether variation in asymmetric infor- ad-sponsored rivals. Management Science 56(9):
mation across other industries allows incumbents 1484–1499.
to engage in limit pricing as it appears to do in the Chipty T. 2001. Vertical integration, market foreclosure,
cable TV industry. Future research is also needed and consumer welfare in the cable television industry.
to describe additional sources of asymmetric infor- American Economic Review 91(3): 428–453.
Coff RW. 1999. How buyers cope with uncertainty when
mation that may give rise to limit pricing. acquiring firms in knowledge-intensive industries:
The study has several implications for managers. caveat emptor. Organization Science 10(2): 144–161.
Information asymmetries between firms may pro- Cooper DJ, Garvin S, Kagel JH. 1997. Signaling and
vide opportunities to engage in strategic actions. adaptive learning in an entry limit pricing game.
In particular, incumbents facing entry by firms RAND Journal of Economics 28(4): 662–683.
Crawford G. Forthcoming. Cable regulation in the
from other industries may be able to use asym- satellite era. In Economic Regulation and Its Reform:
metric information to engage in limit pricing. R&D What Have We Learned? Rose N (ed). Chicago:
or other industry consortia provide many benefits. University of Chicago Press: Chicago, IL.
However, one potential cost is that membership in Dafny L. 2005. Games hospitals play: entry deterrence in
such consortia provides an informative signal to hospital procedure markets. Journal of Economics and
Management Strategy 14(3): 513–542.
potential entrants that may reduce the ability to Dean TJ, Brown RL. 1995. Pollution regulation as
engage in limit pricing. a barrier to new firm entry: initial evidence
and implications for future research. Academy of
Management Journal 38: 288–303.
ACKNOWLEDGEMENTS de Figueiredo RJP Jr, Edwards G. 2007. Does private
money buy public policy? Campaign contributions
and regulatory outcomes in telecommunications.
The author thanks the editor and two referees for Journal of Economics and Management Strategy
excellent comments and suggestions. The author 16(3): 547–576.
also thanks J.P. Eggers, Brian McCann, Anita Della Vigna S, Kaplan E. 2007. The Fox News
McGahan, David Mowery, Gabriel Natividad, effect: media bias and voting. Quarterly Journal of
Gonçalo Pacheco de Almeida, Robert Salomon, Economics 122: 1187–1234.
Ellison G, Ellison SF. 2011. Strategic entry deterrence
Steven Tadelis, Catherine Wolfram and seminar and the behavior of pharmaceutical incumbents prior
participants at the Academy of Management to patent expiration. American Economic Journal:
Annual Meetings for thoughtful comments. The Microeconomics 3: 1–36.
Copyright  2012 John Wiley & Sons, Ltd. Strat. Mgmt. J. (2012)
DOI: 10.1002/smj
R.C. Seamans

Emmons W, Prager R. 1997. The effects of market Klepper S, Simons KL. 2000. Dominance by birthright:
structure and ownership on prices and service offerings entry of prior radio producers and competitive
in the U.S. cable TV industry. RAND Journal of ramifications in the U.S. television receiver Industry.
Economics 28(4): 732–750. Strategic Management Journal , October–November
FCC 12th Annual Video Competition Report to Congress, Special Issue 21: 997–1016.
10February, 2006. Available at: http://hraunfoss.fcc. Laffont J, Tirole J. 1993. A Theory of Incentives in
gov/edocs public/attachmatch/FCC-06-11A1.pdf Procurement and Regulation. MIT Press: Cambridge,
(6 June 6 2010). MA.
FCC 13th Annual Video Competition Report to Congress, LeBlanc G. 1992. Signaling strength: limit pricing and
27 November, 2007. Available at: http://hraunfoss.fcc. predatory pricing. RAND Journal of Economics 23(4):
gov/edocs public/attachmatch/FCC-07-206A1.pdf (6 493–506.
June 6 2010). Lee GK, Lieberman MB. 2010. Acquisition vs. internal
Geroski PA. 1995. What do we know about entry? development as modes of market entry. Strategic
International Journal of Industrial Organization Management Journal 31(2): 140–158.
13(4): 421–440. Lieberman M. 1987. Excess capacity as a barrier to
Ghemawat P. 1993. Commitment to a process innovation: entry: an empirical appraisal. Journal of Industrial
Nucor, USX and thin-slab casting. Journal of Economics 35(4): 607–627.
Economics and Management Strategy 2(1): 135–161. Lieberman M. 1989. The learning curve, technological
Gilbert RJ, Newbery DM. 1982. Pre-emptive patenting barriers to entry, and competitive survival in the
and the persistence of monopoly. American Economic chemical processing industries. Strategic Management
Review 72(3): 514–526. Journal 10(5): 431–447.
Goolsbee A, Petrin A. 2004. The consumer gains from Linnemer L. 2004. Entry deterrence, product quality:
direct broadcast satellites and the competition with price and advertising as signals. Journal of Economics
cable TV. Econometrica 72(2): 351–381. and Management Strategy 7(4): 615–645.
Goolsbee A, Syverson C. 2008. How do incumbents Masson RT, Shaanan J. 1986. Excess capacity and
respond to the threat of entry? Evidence from limit pricing: an empirical test. Economica 53(211):
the major airlines. Quarterly Journal of Economics 365–378.
123(4): 1611–1633. Mayo JW, Otsuka Y. 1991. Demand, pricing and
Greenstein S, Mazzeo M. 2006. The role of differenti- regulation: evidence from the cable TV industry.
ation strategy in local telecommunication entry and RAND Journal of Economics 22(3): 396–410.
market evolution: 1999–2002. Journal of Industrial McCann BT, Vroom G. 2010. Pricing response to entry
Economics 54(3): 323–350. and agglomeration effects. Strategic Management
Hamilton BH, McManus B. 2009. Technology adoption Journal 31(3): 284–305.
and market structure: evidence from infertility McGahan AM. 1992. The effect of incomplete informa-
markets. Working paper. Washington University in St. tion about demand on preemption. International Jour-
Louis: St. Louis, MO. nal of Industrial Organization 11: 327–346.
Hannan T. 1979. Limit pricing and the banking industry. Milgrom P, Roberts J. 1982. Limit pricing and entry
Journal of Money, Credit and Banking 11(4): under incomplete information: an equilibrium analysis.
438–446. Econometrica 50(2): 443–459.
Helfat CE, Lieberman MB. 2002. The birth of capabili- Penrose ET. 1959. The Theory of the Growth of the Firm.
ties: market entry and the importance of pre-history. Oxford University Press: Oxford, UK.
Industrial and Corporate Change 11(4): 725–760. Ragozzino R, Reuer JJ. 2011. Geographic distance and
Holmes G. 2006. Nielsen media research reports corporate acquisitions: signals from IPO firms.
television’s popularity is still growing. Nielsen Media Strategic Management Journal 32(8): 876–894.
Research: New York. Rawley E. 2010. Diversification, coordination costs,
Joshi AM, Nerkar A. 2011. When do strategic alliances and organizational rigidity: evidence from microdata.
inhibit innovation by firms? Evidence from patent Strategic Management Journal 31(8): 873–891.
pools in the global optical disc industry. Strategic Reuer JJ, Ragozzino R. 2008. Adverse selection and
Management Journal 32(11): 1139–1160. M&A design: the roles of alliances and IPOs. Journal
Kadiyali V. 1996. Entry, its deterrence, and its of Economic Behavior & Organization 66: 195–212.
accommodation: a study of the U. S. photographic Riley JC. 2001. Silver signals: twenty-five years
film industry. RAND Journal of Economics 27(3): of screening and signaling. Journal of Economic
452–478. Literature 39: 432–478.
Kalnins A, Swaminathan A, Mitchell W. 2006. Turnover Sakakibara M. 2002. Formation of R&D consortia:
events, vicarious information, and the reduced industry and company effects. Strategic Management
likelihood of outlet-level exit among small multiunit Journal 23(11): 1033–1050.
organizations. Organization Science 17(1): 118–131. Savage SJ, Wirth M. 2005. Price, programming and
Katz ML. 1986. An analysis of cooperative research potential competition in U.S. cable television markets.
and development. RAND Journal of Economics 17(4): Journal of Regulatory Economics 27(1): 25–46.
527–543. Saxenian A. 1991. The origins and dynamics of
Kaya A. 2009. Repeated signaling games. Games & production networks in Silicon Valley. Research
Economic Behavior 66(2): 841–854. Policy 20(5): 423–437.
Copyright  2012 John Wiley & Sons, Ltd. Strat. Mgmt. J. (2012)
DOI: 10.1002/smj
Threat of Entry, Asymmetric Information, and Pricing

Seamans R. 2012. Fighting city hall: entry deterrence Hart S (eds). Elsevier Science Publishers: New York;
and technology upgrades in cable TV markets. 305–329.
Management Science 58(3): 461–475. Yamawaki H. 2002. Price reactions to new competition:
Shapiro M. 2000. Fiber-deep broadband ‘overbuilders’ a study of U.S. luxury car market, 1986–1997.
challenge incumbents. Lightwave 17(7): 53. International Journal of Industrial Organization
Simon D. 2005. Incumbent pricing responses to entry. 20(1): 19–39.
Strategic Management Journal 26(13): 1229–1248. Zander U, Kogut B. 1995. Knowledge and the speed
Singh S, Utton M, Waterson M. 1998. Strategic of the transfer and imitation of organizational
behaviour of incumbent firms in the UK. International capabilities: an empirical test. Organization Science
Journal of Industrial Organization 16(2): 229–251. 6(1): 76–92.
Smiley R. 1988. Empirical evidence on strategic Zhou YM. 2011. Synergy, coordination costs, and
entry deterrence. International Journal of Industrial diversification choices. Strategic Management Journal
Organization 6: 167–180. 32(6): 624–639.
Song J, Almeida P, Wu G. 2003. Learning-by-hiring:
when is mobility more likely to facilitate interfirm
knowledge transfer? Management Science 49(4):
351–365. SUPPORTING INFORMATION
Spence M. 1984. Cost reduction, competition, and
industry performance. Econometrica 52: 101–121. Additional supporting information may be found
Stiglitz JE. 2000. The contributions of the economics of in the online version of this article:
information to twentieth century economics. Quarterly
Journal of Economics 115: 1441–1478. APPENDIX : General description
Stuart TE. 2000. Interorganizational alliances and the Appendix 1: Correlations between variables
performance of firms: a study of growth and Appendix 2: Robustness tests
innovation rates in a high-technology industry.
Strategic Management Journal 21(8): 791–811.
Appendix 3: Cable characteristic split sample tests
Telco/IPTV Factbook. 2010. Warren Communications. Appendix 4: Demographic split sample tests
Washington, DC. Appendix 5: Robustness check on 2009 data
Thomas LA. 1999. Incumbent firms’ response to entry: Appendix 6: Falsification test with 2003 data
price, advertising, and new product introduction.
International Journal of Industrial Organization Please note: Wiley-Blackwell is not responsible
17(4): 527–555. for the content or functionality of any supporting
Toxvaerd F. 2010. Dynamic limit pricing. Working paper. materials supplied by the authors. Any queries
Cambridge University: Cambridge, UK. (other than missing material) should be directed
U.S. Department of Commerce, Bureau of the Census.
2000. County and City Databook . Department of to the corresponding author for the article.
Commerce: Washington, DC.
Wilson R. 1992. Strategic models of entry deterrence. In
Handbook of Game Theory (Volume 1), Aumann RJ,

Copyright  2012 John Wiley & Sons, Ltd. Strat. Mgmt. J. (2012)
DOI: 10.1002/smj

You might also like