Platform Envelopment

29
07-104 Copyright © 2007 by Thomas Eisenmann, Geoffrey Parker, and Marshall Van Alstyne. Working papers are in draft form. This working paper is distributed for purposes of comment and discussion only. It may not be reproduced without permission of the copyright holder. Copies of working papers are available from the author. Platform Envelopment Thomas Eisenmann Geoffrey Parker Marshall Van Alstyne

Transcript of Platform Envelopment

07-104

Copyright © 2007 by Thomas Eisenmann, Geoffrey Parker, and Marshall Van Alstyne.

Working papers are in draft form. This working paper is distributed for purposes of comment and discussion only. It may not be reproduced without permission of the copyright holder. Copies of working papers are available from the author.

Platform Envelopment

Thomas Eisenmann Geoffrey Parker Marshall Van Alstyne

Platform Envelopment

Thomas Eisenmann, Geoffrey Parker, Marshall Van Alstyne

May 17, 2007

ABSTRACT

Due to network effects and switching costs, platform providers often become

entrenched. To dislodge them, entrants generally must offer revolutionary products. We

explore a second path to platform leadership change that does not rely on Schumpeterian

creative destruction: platform envelopment. By leveraging common components and

shared user relationships, one platform provider can move into another’s market,

combining its own functionality with the target’s in a multi-platform bundle. Dominant

firms otherwise sheltered from entry by standalone rivals may be vulnerable to an

adjacent platform provider’s envelopment attack. We analyze conditions under which

envelopment strategies are likely to succeed.

Keywords: Platforms, network effects, bundling, two-sided markets, convergence

Thomas Eisenmann

Associate Professor

Harvard Business School

Rock Center 218

Boston, MA 02163

Phone 617-495-6980

Fax 617-495-3817

[email protected]

Geoffrey Parker

Associate Professor

A. B. Freeman School of

Business

Tulane University

New Orleans, LA 70118

Phone 504-865-5472

Fax 504-865-6751

[email protected]

Marshall Van Alstyne

Associate Professor

Boston University School

of Management

595 Commonwealth Ave.

Boston, MA 02215

Phone 617-358-3571

Fax 617-353-5003

[email protected]

1

Platform-mediated networks comprise a large and rapidly growing share of the global

economy. They encompass network users—individuals or firms whose interactions are

subject to network effects—along with intermediaries who organize platforms that

provide infrastructure and rules to facilitate users’ interactions (Rochet & Tirole, 2003;

Eisenmann et al., 2006; Evans et al., 2006). Examples are as diverse as video games,

container shipping, credit cards, instant messaging, package delivery, web search, real

estate brokerage, HMOs, shopping malls, DVDs, online dating services, travel

reservation systems, stock exchanges, and barcodes.

Established platform providers can be difficult to displace. They are sheltered by

network effects (Farrell & Saloner, 1985; Katz & Shapiro, 1985; Economides, 1996),

switching costs (Klemperer, 1987), and endogenous sunk costs for R&D, infrastructure,

and marketing (Sutton, 1991). To dislodge entrenched platform providers, standalone

entrants—firms that compete in a single product market—generally must offer

revolutionary products and services (Henderson & Clark, 1990; Bresnahan, 1999). For

these reasons, Evans & Schmalensee (2001) observed that networked industries often

evolve through sequential winner-take-all battles, with superior new platforms replacing

old ones.

This paper explores a second path to platform leadership change that does not rely on

Schumpeterian creative destruction: a phenomenon we call platform envelopment.

Platform providers that serve different networked markets often employ similar

components and have overlapping user bases. We define platform envelopment as entry

by one platform provider into another’s market, combining its own functionality with the

target’s in a multi-platform bundle that leverages common components and/or shared

user relationships. Dominant firms that otherwise are sheltered from entry by standalone

rivals due to strong network effects and high switching costs may be vulnerable to an

adjacent platform provider’s envelopment attack.

For example, Microsoft launched Windows Media Player (WMP) in 1998,

enveloping RealNetwork’s dominant streaming media platform. RealNetworks (Real)

served a two-sided network (Rochet & Tirole, 2003; Parker & Van Alstyne, 2005):

consumers downloaded its media player for free and content companies paid for Real’s

server software. Like Real, Microsoft freely supplied WMP to consumers, but Microsoft

bundled its streaming media server software at no additional cost as a standard feature of

Windows NT server—a multipurpose operating system that also incorporated file, print,

mail, and web server software. Users found Microsoft’s bundles appealing and Real

rapidly lost market share.

We believe that envelopment is a widespread phenomenon and a powerful force

shaping platform evolution. While we do not offer statistical evidence of the incidence or

impact of envelopment in this paper, we note that the phenomenon occurs in 13 out of 30

case studies in an MBA course on platform-mediated networks (Eisenmann, 2007).

Examples include cable television system operators and local telephone companies each

offering “triple play” bundles comprised of TV, phone, and Internet access services;

eBay’s acquisition of PayPal; NTT DoCoMo’s move into mobile phone-based payment

services; and LinkedIn adding job listings to its professional networking website to

compete with Monster.com. Our analysis of motivations for envelopment draws heavily

on senior management interviews completed in the context of these case studies.

2

In this paper, we present a taxonomy of different types of envelopment, based

principally on the relationship between the attacker’s platform and that of its target;

specifically, whether the platforms are complements, substitutes, or functionally

unrelated. We explain the economic mechanisms behind different types of envelopment

and describe conditions under which each is likely to be viable. Depending on the type of

envelopment attack, bundling may yield price discrimination gains, efficiency

improvements, or strategic advantages, for example, foreclosure of the attacker’s core

market.

Contributions. Our main contribution is describing a mechanism for platform

leadership change that does not require breakthrough innovation. In doing so, we

integrate recent research on product bundling (e.g., Whinston, 1990; Bakos &

Brynjolfsson, 2000; Carlton & Waldman, 2002; Nalebuff, 2004) and platform evolution

(e.g., Fine, 1998; Bresnahan & Greenstein, 1999; Gawer & Cusumano, 2002; Iansiti &

Levin, 2004).

In particular, we extend the work of Fine (1998) and Bresnahan & Greenstein (1999)

and show how envelopment can drive epochal change when technical leadership is

divided across industry layers, for example, microprocessors and operating systems in

personal computers (Grove, 1996). Bresnahan (1999) observed that a dominant player in

one layer would often sponsor entry into an adjacent layer, supplanting or diminishing

that layer’s leaders. We show that cross-layer entry frequently will take the form of

platform envelopment.

Our research also sheds light on why the boundaries between platform-mediated

networks often blur. In industries that produce, process, and distribute digital

information, such boundary blurring is called convergence. For example, handheld

devices now incorporate the functionality of mobile phones, PCs, media players, video

game players, and even credit cards. Convergence is a pervasive phenomenon that has

received limited attention from scholars (Greenstein & Khanna, 1997; Yoffie, 1997). We

assert that convergence is almost always the product of platform envelopment strategies.

Organization of the Paper. The balance of this paper is organized into four sections.

Section 1 defines platform-mediated networks, explains why dominant platform

providers often become entrenched, and describes different ways in which platforms may

be related. Section 2 describes how economic and strategic benefits from bundling

depend on the nature of the relationship between platforms. Section 3 presents a

taxonomy of different types of envelopment attack based on the relationship between

platforms, provides examples, and posits conditions under which each attack type is most

likely to succeed. Section 4 considers issues for future research and methods appropriate

for exploring these issues.

Platform-Mediated Networks

In this section we define platform-mediated networks and describe some of their

properties. Next, we explain why established platforms—the targets of envelopment

attacks—may be difficult to displace. Finally, we describe different ways in which two

platforms may be related. These relationships are relevant to our analysis because

3

envelopment, by definition, involves one platform provider adding another platform’s

functionality to its own.

Properties of Platform-Mediated Networks

A platform-mediated network is comprised of users whose interactions are subject to

network effects, along with one or more intermediaries who organize a platform that

facilitates users’ interactions (Rochet & Tirole, 2003; Eisenmann et al., 2006; Evans et

al., 2006). The platform encompasses the set of components and rules employed in

common in most interactions between network users (Wheelright & Clark, 1992).

Components include hardware, software, and service modules, along with an architecture

that specifies how they fit together (Henderson & Clark, 1990). Rules encompass

information visible to network participants that is used to coordinate their activities

(Baldwin & Clark, 2000). In particular, rules include standards that ensure compatibility

between different components; protocols that govern information exchange; policies that

constrain network user behavior; and contracts that specify terms of trade and the rights

and responsibilities of network participants.

In traditional industries, bilateral exchanges follow a linear path as vendors purchase

inputs, transform them, and sell output. By contrast, exchanges in platform-mediated

networks have a triangular structure (see Figure 1). Network users transact with each

other and they simultaneously affiliate with platform providers. For example, video game

networks have two distinct groups of users, that is, two “sides.” Developers on the

network’s “supply side” offer games to consumers on the “demand side”—the first set of

bilateral exchanges. Developers must also contract with the platform’s provider—Sony

Playstation, Microsoft Xbox, or Nintendo Wii—for permission to publish games and for

production support—the second set of exchanges. Finally, consumers must procure a

console and associated services from the platform provider—the third set of exchanges.

Every platform-mediated network has a focal platform at its core, although other

platforms may play subordinate roles in the network, as explained below. The focal

platform may have a single provider (e.g., Microsoft’s Xbox, eBay, Miami Yellow

Pages). Alternatively, multiple providers may offer competing but compatible versions of

a shared platform (e.g., Citibank Visa vs. Bank of America Visa; Ubuntu Linux vs. Red

Hat Linux). If users switch between rival providers of a shared platform, they do not

forfeit platform-specific investments, because all providers follow the same rules.

Platform Entrenchment

Platform-mediated markets—also referred to here as networked markets—are

comprised of sets of platform-mediated networks. For example, the console-based video

game market includes the Xbox, Playstation, and Wii networks; the U.S. credit card

market includes the Visa, Mastercard, and American Express networks. Two platforms

are rivals in the same networked market if they employ different rules and if changing the

price that users pay to affiliate with one platform influences the other’s transaction

volumes.

4

Figure 1: Elements of a platform-mediated network

Networked markets are typically served by only a few rival platforms; in many cases,

almost all users rely on a single platform (e.g., Microsoft’s Windows, Adobe’s PDF,

eBay’s online auctions). The number of platforms serving a networked market tends to be

small when network effects are strong, multi-homing costs are high, and user demand for

differentiated platform functionality is limited (Arthur, 1989; Caillaud & Jullien, 2003;

Ellison & Fudenberg, 2003; Noe & Parker, 2005).

When network effects are positive and strong, users will converge on fewer

platforms; a sub-scale platform will have little appeal, unless it provides the only way to

interact with certain transaction partners. Likewise, users are less likely to multi-home—

that is, rely upon multiple platforms—when it is expensive to establish and maintain

platform affiliations. Finally, fewer platforms will be viable if users have relatively

homogeneous needs. By contrast, if various user segments have distinct preferences and

no single platform can profitably satisfy all segments’ needs, then the market is more

likely to be served by multiple rival platforms.

With few rivals, established platform providers enjoy market power. High returns

would normally attract entrants, but incumbent platform providers are often well

protected. Factors that restrict the number of platforms in the first place can make it

difficult and expensive to develop a new platform. Confronted with these barriers, most

standalone entrants can only succeed if they offer significant improvements in

performance and if they invest heavily to shift users’ expectations and absorb switching

costs.

Relationships Between Platforms

From the perspective of a focal platform’s users (for convenience, platform “A”), a

second platform (“B”) must be related to the focal platform in one of four ways. First, the

two platforms may be functionally unrelated. Second, the two platforms may be

5

substitutes. Third, platform B may a nested network user of platform A. Finally, platform

B may be a nested component employed by platform A’s users. Below, we explain these

relationships and provide examples. In the next section, we show how the relationships

affect benefits from bundling two platforms and thus the likelihood of successful

envelopment.

Unrelated Platforms. Two platforms may be functionally unrelated, that is, designed

to serve fundamentally different purposes, as with mobile phones and handheld video

game devices. However, functional independence does not rule out the possibility that

two platforms have common components or shared user relationships. For example, a

handheld gaming device and a mobile phone each require a display, battery,

microprocessor, and keys for input. Likewise, many teenagers own both a handheld

gaming device and a mobile phone.

Substitutes. Rival platforms are close substitutes when they offer very similar

functionality. Close substitutes are outside our scope of inquiry because envelopment, by

definition, bundles two platforms with different functionality.

Rival platforms are weak substitutes—and candidates for envelopment—when they

serve the same basic purpose, but employ technologies suited for different types of

transactions. For example, Monster.com and LinkedIn.com use different approaches in

helping users find and fill jobs: searchable listings and social networking, respectively.

These approaches offer different advantages: listings are valuable when parties wish to

conduct a comprehensive search, whereas social networks provide a mutually-trusted

third party’s assessment of fit. Depending on situational needs, some job seekers and

recruiters may rely on both platforms (i.e., multi-home); others may use just one.

Nested Network Users. Platform-mediated networks are often organized

hierarchically in layers (Grove, 1996; Farrell, Monroe & Saloner, 1998). Consequently,

the same entity may simultaneously serve as a platform provider for one network and as a

user in another. For example, eBay is the platform provider for its online auction

network, and at the same time, one of the World Wide Web’s millions of network users.

In turn, the World Wide Web and dozens of other “application layer” platforms (e.g.,

email, file transfer protocol, instant messaging) are nested network users with respect to

the Internet, a “transport layer” platform.

Nested Components. Platform providers serve as network users’ primary point of

contact with the platform, but they do not necessarily supply all of the platform’s

components. Frequently, platform providers rely on third parties who sell components

directly to network users. Sometimes, these components are platforms themselves. For

example, eBay provides interfaces that allow auction sellers to accept several forms of

payment, including credit cards and PayPal, an email-based payment service acquired by

eBay in 2002. These payment services are all platforms that serve two-sided networks

comprised of merchants and consumers.

Reciprocally and Unilaterally Specific Complements

When platform B is a nested component of platform A, platform A’s users will view

the two platforms as complements. From the perspective of A’s users, the platforms will

be more valuable when consumed together than separately, and each platform will exhibit

6

negative cross-price elasticity with respect to the other. Likewise, when platform B is a

nested supply-side user of platform A (e.g., a specific video game vis-à-vis a console),

then platform A’s demand-side users (e.g., consumers) will view the two platforms as

complements.

When two platforms are complements, the strength of cross-price elasticity between

them may or may not be symmetrical. In some cases, the two platforms will be

reciprocally specific complements: most use of each platform will be coupled with the

other platform’s use (see Figure 2). For example, Microsoft Word—a platform that

facilitates file exchange between users—is also a nested network user of Microsoft’s

Windows operating system. Since Word is installed on a large fraction of PCs, and since

Windows is the dominant PC operating system, Word and Windows are reciprocally

specific complements. Each should exhibit reasonably high negative cross-price elasticity

with respect to the other.

More typically, when platform B is a nested network user of platform A, B will be a

unilaterally specific complement of A: most use of B will be coupled with A’s use, but

the reverse will not be true.1 For example, most users of Quicken’s personal financial

management software rely on Windows; the rest rely on Macintosh. However, only a

modest fraction of Windows-compatible PC owners are Quicken users. Increasing the

price of a unilaterally specific application like Quicken would have almost no impact on

Windows’ sales, but increasing Windows’ price would reduce Quicken’s sales.

Figure 2: Reciprocally and unilaterally specific complements

As with nested network user relationships, nested component relationships can be

reciprocally specific. For example, PayPal is used by 78% of eBay buyers; the balance

pay with credit cards or money orders. With respect to PayPal transactions, 70% are

1 Unilaterally specific complements are similar to “one-way essential complements” in Chen & Nalebuff (2006). However, in Chen & Nalebuff, A is essential for all uses of B, whereas with unilaterally specific complements, A is associated with most uses of B.

7

completed on eBay; other online retailers and person-to-person payments account for the

rest. Hence, the two platforms are reciprocally specific complements.

More typically, the focal platform will be a unilaterally specific complement to its

nested component. For example, almost all eBay users require shipping services, but

eBay represents only a small share of total shipments by Federal Express or UPS. Note

that this relationship reverses the pattern of dependence normally seen with nested

network users. Focal platforms are often asymmetrically dependent on their nested

components, whereas nested network users are often asymmetrically dependent on their

focal platforms.

We emphasize the distinction between reciprocally and unilaterally specific

complements, because the strength and direction of relational dependence affects the

payoff from bundling, and hence prospects for successful envelopment.

Bundling Benefits

Envelopment entails one platform provider adding another platform’s functionality to

its own, and then offering a multi-platform bundle. In this section, we review potential

benefits from bundling, which include price discrimination gains, efficiency

improvements, and strategic advantages (Nalebuff, 2003; Carlton & Waldman, 2005a).

We describe how bundling benefits depend on the nature of the relationship between

platforms and posit conditions under which various benefits are likely to influence the

odds of successful platform envelopment.

Price Discrimination Gains

Bundling reduces heterogeneity in consumers’ aggregate valuations for a set of items,

allowing a firm with market power to extract a larger share of available surplus than it

would earn from selling the items separately (Schmalensee, 1984; McAfee et al., 1989).

Bundling thus serves as an effective price discrimination device in situations where a

firm cannot assess customers’ willingness to pay for items or must offer the same price to

all customers.

Compared to selling items separately, bundling is more likely to increase profits

when: 1) the marginal cost of items is low or zero, as with many information goods; and

2) the correlation of consumers’ valuations for individual items is negative or weakly

positive (Bakos & Brynjolfsson, 1999). If the correlation of consumers’ valuations is

perfectly positive, then bundling does not reduce the heterogeneity of aggregate

valuations and therefore does not yield price discrimination gains; bundling and selling

items separately generate equal profits.

If marginal costs are material and the correlation of users’ valuations is not perfectly

positive, then willingness to pay for a pure bundle (i.e., an offer of A+B, but neither A

nor B alone) may fall below the bundle’s cost for a significant fraction of potential

customers—those with little interest in one or both items. In such situations, a mixed

bundle (i.e., offering A+B, A alone, and B alone) or tying (i.e., offering A+B and A alone

but not B alone) may be more profitable than selling items separately—provided that the

fixed cost of creating and marketing a bundle is not too high (Adams & Yellen, 1976;

McAfee et al., 1989; Matutes & Regibeau, 1992).

8

Figure 3 summarizes analysis that builds on Nalebuff (2004) to illustrate conditions

under which a pure bundle is more profitable due to price discrimination gains than

selling the items separately. For a monopolist selling two items with uncorrelated

valuations, demand is assumed to be uniformly distributed as prices range from zero to

maximum valuations of VA and VB, respectively. The items are also assumed to have the

same ratio of marginal cost to maximum valuation, i.e., MCA/VA = MCB/VB (see

Appendix for details on model assumptions and derivations to support Figure 3). The

horizontal axis of Figure 3 reflects VA/VB, that is, the ratio of the items’ maximum

valuations, arbitrarily designating the item with the lower maximum valuation as A. The

vertical axis reflects (MCA + MCB)/(VA + VB), that is, the ratio of the sum of the items’

marginal costs to the sum of their maximum valuations. Figure 3’s curve shows

combinations of the marginal cost ratio and the ratio of the item’s maximum valuations

for which bundling and selling separately yield equal profit. Selling separately yields

greater profit than bundling for points above the curve, and less profit for points below

the curve.

Figure 3: Attributes favoring bundling versus separate sales for platforms with

uncorrelated valuations

When A has a very low maximum valuation relative to B, bundling is only profitable

when the items also have very low marginal costs. For items with equal maximum

valuation (i.e., VA/VB = 1), bundling is more profitable than selling separately when

(MCA + MCB)/(VA + VB) < 0.139. Expressed as the ratio of marginal cost to the profit-

maximizing prices for the items sold separately, this threshold equates to (MCA +

MCB)/((VA + MCA)/2 + ((VB + MCB)/2) < 0.243. Most information goods and many other

platforms have marginal costs below this threshold. However, the threshold level of

marginal cost for profitable bundling declines with the strength of positive correlation of

9

users’ valuations for two platforms (Bakos & Brynjolfsson, 1999). As explained

immediately below, the type of relationship between the platforms systematically

influences the correlation of users’ valuations.

Unrelated Platforms. Potential users’ valuations of two functionally unrelated

platforms would not normally be correlated, unless use of each platform is associated

with common underlying demographic or behavioral traits such as income, age, or

profession. With common underlying traits, correlation is likely to be positive but not

perfect, so price discrimination gains should be available. For example, many car owners

value both emergency roadside services and auto loan brokerage. By bundling these and

other functionally unrelated services, the American Automobile Association exploits

price discrimination opportunities.

Weak Substitutes. When items in a bundle are complements or functionally

unrelated, a user’s valuation for the bundle equals the sum of that user’s valuation for the

items purchased separately. However, additivity does not generally hold for two perfect

substitutes (Bakos & Brynjolfsson, 2000). Having access to a second perfect substitute

provides no additional utility in the case of subscription services or perishable items, but

some value with depreciable durables or consumable items that can be held inventory.

With two weak substitutes, a typical user’s valuation for a bundle should exceed her

standalone valuation for the single item she prefers most, assuming that the two platforms

each provide some functionality not available from the other. However, in terms of

Figure 3, the ratio VA/VB is likely to be low, because a fraction of platform A’s

functionality will be duplicated by platform B. Furthermore, demand for each platform’s

unique functionality will often be positively correlated. For example, film fans who rent

many movies will value both the wide variety available through mail delivery services

and the instant access offered by Internet download services. Due to the asymmetry and

positive correlation of platform valuations, bundling weak substitutes will only yield

increased profits through price discrimination gains when marginal costs are very low.

Complements. Since reciprocally specific complements are typically consumed in

tandem, a user with strong demand for one platform should value the other highly. Due to

the strong positive correlation of users’ valuations, bundling the platforms is not likely to

yield increased profits through price discrimination, although other bundling benefits

may be available, as explained below. For unilaterally specific complements, the

correlation of valuations will be positive but weaker, so price discrimination gains may

be forthcoming from bundling.

Following from this analysis, we have:

Proposition 1: Assuming marginal costs are low, bundling two platforms is more

likely to yield increased profits through price discrimination when:

a. Platforms are functionally independent, and their use is not associated

with common underlying demographic or behavioral traits.

b. Platforms are complements, but their use is not reciprocally specific.

10

Efficiency Improvements

Compared to selling separate items, bundling can improve efficiency through

economies of scope in initial marketing; economies of scope in production and ongoing

operations; quality advantages through an integrated design; and avoidance of double

marginalization of perfect complements (Davis et al., 2001; Evans & Salinger, 2005)

Economies of Scope in Initial Marketing. When they buy bundled products, users

can reduce search costs. Equivalently, firms that bundle products should realize

economies of scope in customer acquisition activities, because they can sell the bundle

with a single message. Likewise, bundling should reduce distribution costs, compared to

shipping and stocking items that are sold separately.

Since customer acquisition and distribution expenses often have a large variable

component, efficiency improvements will reduce marginal costs and increase the set of

platform pairs that are candidates for profitable bundling. In terms of Figure 3, MCA +

MCB for an A + B bundle will be lower than MCA + MCB for A and B sold separately.

The magnitude of economies of scope in initial marketing does not depend systematically

on the type of relationship between two platforms. Bundling should yield such savings

regardless of whether the platforms are functionally unrelated, weak substitutes, or

complements.

Economies of Scope in Production and Ongoing Operations. Compared to two

products sold separately, an integrated design can reduce production costs by leveraging

shared components. For example, video game consoles and DVD players both

incorporate optical disk readers and circuitry for outputting audio and video to a

television.

When two platforms are functionally unrelated, as with video games and DVDs,

economies of scope in production and ongoing operations may be forthcoming, but it is

not possible to generalize about their incidence or magnitude. However, the likelihood of

realizing operating cost synergies through bundling does vary systematically when pairs

of platforms are weak substitutes or complements.

Weak substitutes overlap to some extent in functionality, and hence should offer

economies of scope in production and ongoing operations. For example, Netflix bundles

two platforms that offer fundamentally different approaches for renting movies: mail

delivery and Internet download services. Compared to firms offering the platforms

separately, Netflix can save costs by relying on a single unit to procure films and by

building a single website to facilitate users’ title selections.

By their nature, complements do not overlap much in functionality. Consequently,

bundling two platforms typically will not yield major savings from sharing components.

For example, by enveloping PayPal, eBay enjoyed some economies of scope in data

center and fraud detection operations, but most functions provided by auction and

payment services platforms were unduplicated.

Based on this analysis, we posit:

Proposition 2: Bundling weak substitutes is likely to yield increased profits

through economies of scope in production and ongoing operations.

11

Quality Advantages. Integrating two platforms may improve product quality through

tighter management and/or simplification of component interfaces (Ulrich, 1995;

Schilling, 2000). Improvement opportunities are especially likely for reciprocally specific

complements that are consumed as a system, as with Apple’s iPod and iTunes.

Integrating weak substitutes may also yield quality improvement. For example, by

bundling DVD-by-mail and Internet download services, Netflix can amass a more

complete transaction profile for a given user, and thereby offer better rental

recommendations.

By contrast, integrating functionally unrelated platforms is more likely to result in

design compromises that reduce quality, relative to platforms sold separately. For

example, due to design flaws, consumers rejected Nokia’s N-Gage, which combined a

mobile phone and handheld video game player. To accommodate gaming keypads, the

device had a half-moon shape that was awkward for phone use. The N-Gage also

required removal of its battery to insert game cartridges.

This logic yields:

Proposition 3: Integrating reciprocally specific complements and weak

substitutes may yield quality improvements compared to platforms provided by

separate firms.

Avoidance of Double Marginalization. Profits can be improved by avoiding double

marginalization when bundling complements that: 1) must be consumed in fixed

proportions; and 2) would otherwise be supplied by separate monopolists who cannot

price discriminate. Reciprocally specific complements often meet these conditions. For

example, operating system (OS) and application software is consumed in one-to-one

proportions.

In this context, a bundle’s optimal price will be lower than the sum of the prices

offered by separate monopolists, who each will ignore the externality imposed upon the

other (Nalebuff, 2000). Compared to traditional industries, the double marginalization of

complements is more salient in networked industries, where winner-take-all outcomes are

common (e.g., see Casadesus-Masanel & Yoffie, 2006, for analysis of double

marginalization in the context of brinksmanship between Intel and Microsoft). Hence:

Proposition 4: Bundling reciprocally specific complements otherwise supplied by

separate platform providers with significant market power may yield increased

profits through avoidance of double marginalization.

Strategic Advantages

The Chicago School’s “one monopoly price theorem” (OMPT) held that a monopolist

cannot increase profits by bundling its primary product with a complement (Posner,

1976; Bork, 1978). Whinston (1990) demonstrated that OMPT is valid under restrictive

conditions: 1) the complement (denoted “B” in the discussion that follows) is supplied in

a perfectly competitive market; 2) the monopolist’s product (denoted “A”) is essential for

all uses of the complement; 3) the products are used in fixed proportions; and 4) the

complement is subject to constant returns to scale. Carlton & Waldman (2005b) added a

12

fifth condition: OMPT requires a one-period setting, but may not apply with repeated

purchases or upgrades over multiple periods, especially when switching costs are salient.

Platform-mediated markets often violate these conditions, so we would expect to

observe profitable bundling of complements by platform providers. Specifically, as

explained above, complements to a focal platform are often platforms themselves—either

nested network users or nested components—and thus leverage network effects. Network

effects may engender increasing returns (violating condition #4) and lead to an

oligopolistic market structure (violating condition #1). Also, platform affiliation typically

entails a long-term relationship for network users (violating condition #5).

Extending Market Power. If OMPT requirements are relaxed, a monopolist may be

able to profitably extend its market power into a complement market (Whinston, 1990;

Farrell & Weiser, 2003). According to Whinston (2001), when a monopolist’s primary

product is not essential for all uses of a complement whose suppliers have market power,

the monopolist has an incentive to exclude rival complement suppliers, to capture rent

from alternate uses. When the complement market is subject to increasing returns—

consistent with market power for standalone suppliers—the monopolist may have the

ability to capture rents through bundling by denying scale to rival producers of the

complement.

Specifically, assume that A is not essential for all uses of B, but the monopolist

creates a bundle that ensures that A can only be consumed with its version of B, through

either technical or contractual means. As an example, consider a counterfactual in which

eBay, prior to acquiring PayPal, had banned that email payment service and mandated

that auction participants instead use Billpoint, an eBay-owned payment service.

Whinston’s conditions would be satisfied: PayPal enjoyed market power and increasing

returns due to network effects. Also, as noted above, eBay’s near-monopoly in online

auctions was not essential for all uses of PayPal.

In this scenario, standalone suppliers of B can make no sales to consumers who value

an A + B bundle. In an alternative scenario, if rival versions of B remain compatible with

A, then a standalone supplier of B will only be able to charge an amount equal to the

value of any quality difference perceived by customers between its version of B and the

monopolist’s. In either scenario, the demand reduction for standalone suppliers is greater

to the extent that valuations for A and B are positively correlated and the bundle has

strong appeal. Likewise, in both scenarios, standalone suppliers of B may not earn

enough revenue to cover their fixed costs; they may be forced to exit the market, or may

never enter in the first place.2 Matching the monopolist’s bundle would require

2 Bundling does not always weaken standalone suppliers. Under certain conditions, it may serve to soften rivalry and boost profits for all market participants. Carbajo, de Meza & Seidmann (1990) presented a model in which: 1) monopolized A is not essential for all uses of B; 2) undifferentiated versions of B are offered by A’s monopolist and by a single standalone supplier; 3) the correlation of customers’ heterogeneous valuations for A and B is perfectly positive; and 4) firms must offer, under Bertrand competition, the same price to all customers. Absent bundling, price competition would drive profits for the undifferentiated B products to zero. However, both firms can profit from the B market if the monopolist targets high-valuation customers with a high-priced A + B bundle and cedes low-valuation B customers to the standalone supplier. The bundle differentiates the B products; low-valuation customers cannot justify purchasing the high-priced bundle, so they only have one choice when buying B. This allows the standalone supplier to raise its price above marginal cost.

13

standalone suppliers to incur the presumably prohibitive cost of entering the monopolist’s

primary market. This suggests:

Proposition 5: Through envelopment, a platform provider can profitably extend

its market power when its target supplies either: 1) a reciprocally specific

complement; or 2) a unilaterally specific complement that is used mainly but not

exclusively with the attacker’s platform.

Foreclosure of the Attacker’s Market. A dominant firm may also be able to weaken

existing rivals or deter entrants in its own market by bundling a complement (Whinston,

1990; Church & Gandal, 1992 and 2000). Consider a situation in which a dominant firm

and its rivals all sell versions of A typically used in tandem with a reciprocally specific B

complement, which is sold by a single standalone supplier subject to increasing returns.

Consistent with the scenario above, if the dominant firm offers an A + B bundle, it denies

revenue to the standalone supplier of B and may force it to exit. In that event, the

dominant firm’s existing and potential rivals in the A market will lack a source of supply

for the crucial B complement. This implies:

Proposition 6: Through envelopment, a platform provider can profitably weaken

or deter rivals in its own market when its target supplies a reciprocally specific

complement.

Taxonomy of Envelopment Attacks

The analysis above suggests that the viability of platform envelopment depends

strongly on the relationship between two platforms. Accordingly, our taxonomy of

envelopment attacks focuses on platform dyads that are functionally unrelated, weak

substitutes, and complements. For each type of platform envelopment, we offer examples

(see Table 1) and discuss the economic mechanisms that help or hinder an attack,

specifically, the extent to which bundling engenders price discrimination gains, efficiency

improvements, and/or strategic advantages (see Table 2).

Conglomeration Attacks

In a conglomeration attack, the enveloper’s platform is functionally unrelated to the

target’s. The attacker’s bundle is a conglomerate, in the same sense as a corporation

comprised of largely unrelated businesses or a rock consisting of separate stones

cemented together.

Price Discrimination Gains. If use of two functionally unrelated platforms is not

associated with common underlying demographic or behavioral traits, then potential

users’ valuations for the platforms should be uncorrelated and significant price

discrimination benefits may be available, provided that marginal costs for the platforms

are also low (Proposition 1a).

Efficiency Improvements. Compared to providing platforms through separate firms,

conglomeration attacks offer economies of scope in initial marketing, and in some cases,

significant reductions in production and/or ongoing operating costs.

For example, cable TV system operators and local telephone companies have

launched conglomeration attacks on each other. Cable companies now offer phone

14

service and phone companies have added TV service. These functionally unrelated

platforms meet different needs but have significant user overlap. About 85% of U.S.

households subscribe to multi-channel TV service through cable or satellite providers,

and 95% subscribe to local phone service through fixed-line, mobile, or Voice over

Internet Protocol providers. Consequently, bundling cable and phone services offers

significant economies of scope in initial marketing.

Table 1: Examples of Platform Envelopment by Attack Type

Attacker Target Comments

Conglomeration Attack

Cable TV system operators

Local phone companies

Attacks have been reciprocated.

NTT DoCoMo mobile phone service

Traditional credit cards

DoCoMo allied with Sumitomo-Mitsui (Japan’s 2nd largest credit card company) to offer mobile phone-based payment services.

Apple iPhone Smart phones from Nokia, Motorola, etc.

iPhone bundles iPod functionality into a smart phone.

Intermodal Attack

UPS Federal Express UPS added overnight delivery in 1982; Federal Express reciprocated, acquiring a trucking carrier in 1998.

LinkedIn’s online professional network

Monster.com’s recruitment platform

LinkedIn has added job listings, and Monster has added social networking functionality.

Blockbuster Video Netflix’s DVD-by-mail platform

Blockbuster added a mail-delivery option in 2004.

Foreclosure Attack

Microsoft’s Windows RealNetwork’s media player

Windows Media Player displaced RealPlayer, but Microsoft paid RealNetworks $760 million to settle an antitrust lawsuit.

eBay’s auction marketplace

PayPal’s email payment service

eBay acquired PayPal after eBay’s in-house service, Billpoint, failed to displace PayPal.

Microsoft Office Adobe Acrobat PDF writer software

Office 2007 adds a “save as PDF” option, the core function of Adobe’s $299 Acrobat writer software.

15

Table 2: Motivations by Attack Type

Conglomeration Intermodal Foreclosure

Relationship

Between Platforms

• Functionally unrelated

• Weak substitutes serving same basic purpose, but using technologies suited for different transaction types

• Complements, either reciprocally or unilaterally specific

Potential for

Price

Discrimination Gains

(Assuming low marginal costs)

• Strong potential when correlation of users’ valuations is zero (P1a)

• Moderate potential when correlation of users’ valuations is weakly positive due to common underlying demographic or behavioral traits (P1a)

• Limited potential due to asymmetry and positive correlation of weak substitutes consumed in a bundle

• Limited potential for reciprocally specific complements due to strong positive correlation of users’ valuations

• Moderate potential for unilaterally specific complements due to weaker positive correlation of valuations (P1b)

Potential for

Efficiency Improvements

(Beyond economies in initial marketing available for all types)

• Significant economies of scope in ongoing operations available for some platform pairs but not others

• Operating cost synergies due to shared components and suppliers (P2)

• Quality improvements through superior knowledge of customer preferences across transaction types (P3)

• Quality improvements through tighter management or simplification of component interfaces (P3)

• Opportunity to avoid double marginalization when monopolists supply essential complements (P4)

Potential for

Strategic Advantages

• Limited • Opportunity to neutralize an emerging threat

• Opportunity for attacker to extend its market power into a complement market (P5)

• Opportunity for attacker to protect its core market by foreclosing rivals’ access to reciprocally specific complements (P6)

16

The platforms also share many common components, so envelopers can capture

operational synergies. Both cable TV and phone companies are able to utilize existing

copper lines to deliver additional services without duplicating the huge upfront

investment required to wire households. Also, both parties are able to leverage existing

customer service operations when offering new services, including field technicians, call

centers, and billing systems.

Strategic Advantages. Compared to other types of envelopment, indirect attacks

offer fewer strategic advantages. Unlike a foreclosure attack (described below), an

indirect attack cannot strengthen the enveloper’s core platform by denying its rivals

access to a crucial complement. Also, unlike an intermodal attack (also described below),

an indirect attack cannot neutralize an emerging substitution threat. Since strategic

advantages are less salient, indirect attackers must rely on either price discrimination

gains or efficiency improvements.

Convergence. Conglomeration attacks are frequently the mechanism behind

convergence, a pervasive phenomenon in industries that produce, process, and distribute

digital information. Yoffie (1997, p. 2) defines convergence as “the unification of

function—the coming together of previously distinct products.” Convergence has several

drivers, most notably performance improvements for semiconductors and broadband

communications networks. Examples of digital convergence include: 1) Apple’s iPhone,

which integrates a music player, mobile phone, and Internet communications device; 2)

the Xbox 360 and PlayStation 3 video game consoles, which each include high-definition

DVD players and Internet browsing capabilities; and 3) “triple plays” offered by cable

and phone companies, incorporating not only the TV and telephone services mentioned

above, but also broadband Internet access. All these examples of convergence are

conglomeration attacks, bundling platforms that are largely functionally unrelated.

Intermodal Attacks

With an intermodal attack, the enveloper’s platform and its target’s are weak

substitutes. They serve the same basic purpose but satisfy different sets of user needs,

because they rely on fundamentally different technologies—that is, on distinct modes for

accessing relevant functionality.

Price Discrimination Gains. Intermodal attacks are unlikely to yield price

discrimination benefits due to the asymmetry and positive correlation of users’ valuations

for weak substitutes consumed in a bundle.

Efficiency Improvements. Compared to providing platforms through separate firms,

intermodal attacks offer economies of scope in initial marketing and—consistent with

Proposition 2—potentially significant reductions in production and ongoing operating

costs. Likewise, integrating weak substitutes may yield quality improvements, compared

to two platforms offered by different firms (Proposition 3).

For example, prior to 1982, Federal Express and UPS fulfilled the same broad

mandate—package shipping—but served different user needs. Federal Express relied on

planes configured in a hub-and-spoke network to offer rush shipments of small, high-

value packages. Prior to launching its own overnight air delivery service in 1982—an

intermodal attack on Federal Express—UPS was dependent on trucks, which are better

17

suited for larger and less time-sensitive shipments. Many shippers send both types of

packages, so UPS was able to capture efficiency gains through its envelopment attack.

For example, UPS could market both types of service through a single sales force and

could offer a single point of contact for customer service. While UPS did not realize

long-haul transportation cost savings by offering both shipping modes, intermodal

operations leveraged costs incurred in sorting packages and local delivery.

Strategic Advantages. When a new platform serves the same basic purpose as an

established platform but offers different functionality, the potential for competition

between the two platforms may initially be unclear. Given uncertainty about the extent of

substitutability, an intermodal attack may be construed as a “better safe than sorry”

strategy.

Netflix appears to be following this approach by bundling Internet downloads with its

DVD-by-mail service. Likewise, Monster.com’s move into online professional

networking was motivated in part by an emerging competitive threat from LinkedIn and

other startups. By contrast, UPS missed its opportunity to neutralize a potential new rival.

Federal Express was 12 years old and well established by the time it faced UPS’s

intermodal attack.

Foreclosure Attacks

With a foreclosure attack, the target is either a nested network user or a nested

component of the attacker’s platform. By bundling the target’s platform with its own, the

attacker forecloses access to its users.

Price Discrimination Gains. Price discrimination gains are likely to be limited for

reciprocally specific complements, due to the strong positive correlation of potential

users’ valuations. When a target’s platform is a unilaterally specific complement, the

correlation of potential users’ valuations should be weaker and an enveloper may realize

price discrimination benefits from bundling, consistent with Proposition 1b.

Efficiency Improvements. Foreclosure attacks offer economies of scope in initial

marketing, but economies of scope in ongoing operations are likely to be more modest.

With reciprocally specific complements, an integrated design may yield quality

improvements, compared to relying on a standalone supplier for a crucial complement

(Proposition 3). Also, when bundling reciprocally specific complements otherwise

supplied by independent monopolists, a foreclosure attack may also accrue efficiency

gains by avoiding double marginalization (Proposition 4).

Strategic Advantages. A foreclosure attack limits access to users of the enveloper’s

core platform, thereby reducing the target’s revenue. In this manner, the enveloper may

extend its market power into the complement market, consistent with Proposition 5. If the

platforms are reciprocally specific, the enveloper may also increase entry barriers in its

core market, consistent with Proposition 6. When the target’s platform declines in value

due to network effects, the enveloper’s standalone rivals must rely on an inferior

complement.

Microsoft’s attack on RealNetworks’ streaming media platform, described in the

introduction, is an example of a foreclosure attack that weakened Microsoft’s operating

18

system rivals. The compatibility of Windows Media Player with other PC operating

systems was intermittent; for example, new versions did not work with Apple’s

Macintosh prior to 2000 or after 2003. As a result, Microsoft bolstered its core Windows

operating system by enveloping a crucial complement. However, Microsoft’s streaming

media strategy drew antitrust scrutiny.

Cross-Layer Competition. Foreclosure attacks like Microsoft’s can play a powerful

role in the evolution of multi-layer industries. As platforms mature, their providers

sometimes embrace modular technologies and cede responsibility for supplying certain

complements to partners (Langlois & Robertson, 1992; Suarez & Utterback, 1995;

Baldwin & Clark, 2000; Jacobides, 2005; Boudreau, 2006). Often, these complements are

platforms themselves. Reduced integration may result in an industry comprised of

multiple layers, each with a separate set of suppliers. In the personal computer industry,

for example, the layers consist of semiconductor manufacturing, PC assembly, operating

system provision, and application software, among others (Grove, 1996). The credit card

and telecommunications industries have similarly layered structures (Fransman, 2002;

Evans & Schmalensee, 2005).

Over time, dominant players typically emerge within layers that are subject to strong

scale economies due to fixed costs and/or network effects. These powerful players will

extract a greater share of industry rents and vie with the focal platform’s original provider

for technical leadership (Bresnahan, 1999). Friction over divided technical leadership is

exacerbated as new layers with new leaders emerge. With a modular architecture

conducive to experimentation, technological change may yield new uses for a platform,

for example, browsers or streaming media software vis-à-vis PC operating systems. The

original platform’s sponsor may be slow to integrate the new functionality due to inherent

uncertainty about technology and demand. By the time the original platform sponsor

offers the functionality, network effects may have propelled the new platform’s pioneer

to a dominant position, effectively creating another industry layer.

Fine (1998) and Bresnahan (1999) observed that in the computer industry, the

dominant player in one layer often pursued strategies to supplant or diminish another

layer’s leaders. In some cases, challenges took the form of proxy wars, with players

sponsoring weaker allies in adjacent layers (e.g., Microsoft backing AMD). In other

cases, challengers directly entered an adjacent layer. Direct entry usually took the form of

a foreclosure attack, as with Microsoft’s respective envelopment attacks on

RealNetworks’ streaming media software, Netscape’s browser, Adobe’s PDF standard,

and TiVo’s digital video recorder platform. More recently, industry observers have

speculated that Google might mount a cross-layer foreclosure attack on Microsoft

Windows by offering a Linux-based operating system with tight linkages to Google’s

applications. Likewise, Google has bundled its paid search platform with a payment

service (Google “Checkout”) and a product listing service (Google “Base”) in a cross-

layer foreclosure attack against eBay.

Issues for Future Research

This section considers three sets of issues for future research on platform

envelopment. The first asks when envelopers should acquire an incumbent platform

provider rather than build a new platform internally. The second set concerns defensive

19

options for firms targeted for envelopment. For example, when should they match the

attacker’s bundle? The third set of issues examines organizational challenges posed by

envelopment attacks, which require a high level of internal, cross-unit coordination. The

paper concludes with a discussion of research methods appropriate for future work on

platform envelopment.

Acquisition vs. Internal Development

Future research should analyze tradeoffs confronting envelopers who can choose

between acquiring an incumbent platform provider and developing a platform de novo.

By acquiring a going concern, an enveloper can speed its attack, especially when it lacks

crucial skills and resources. Also, an acquisition can avoid the risk that mounting losses,

coupled with pressure from investors to improve short-term profit performance, will lead

to the premature shutdown of an in-house startup. However, compared to building from

scratch, acquiring an existing platform is likely to result in substantial integration

challenges that may result in compatibility problems in the near term.

Defensive Strategies

Researchers also should study factors that favor different defensive strategies for

firms facing envelopment. Besides investing aggressively in innovation to stay a step

ahead of potential attackers, options include:

• Changing Business Models. Simply ceding the targeted platform and redeploying

into new markets may be the best option for some firms. RealNetworks pursued this

approach in response to Windows Media Player, scaling back investment in its

streaming media platform. RealNetworks leveraged existing relationships with

consumers and music companies to launch Rhapsody, an online subscription music

service.

• Matching the Bundle. Firms may be able to counter an envelopment attack by

assembling a comparable bundle. The target can cross parry (Karnani & Wernerfelt,

1985) if it has the requisite skills and resources to enter the attacker’s core market,

and if barriers are not insurmountable due to intellectual property protection, high

switching costs, or other factors. These dynamics are evident in online recruitment:

as noted above, Monster.com added networking features in response to an

envelopment threat from LinkedIn, which subsequently added job listings.

However, bundle-versus-bundle competition can be exceptionally fierce (Bakos &

Brynjolfsson, 2000; Nalebuff, 2000), so researchers should consider conditions

under which accommodating an attack is likely to be more profitable than matching the enveloper’s bundle.

• Mergers and Alliances. Instead of assembling bundles on their own, platform

providers targeted for envelopment can merge or joint venture with their attackers’

rivals. Lotus, vulnerable to Microsoft’s Office Suite, pursued this approach in

merging with IBM. Likewise, RealNetworks’ Rhapsody platform, which is

vulnerable to envelopment by mobile phone and Internet service providers, was

able to co-opt potential rivals by joint venturing with Cingular and Comcast.

20

• Antitrust Litigation. Antitrust law for networked industries is still under dispute

(Evans, 2003; Farrell & Weiser, 2003; Carlton & Waldman, 2005a). Dominant

platform providers that offer bundles risk being charged with illegal tying. Several

targets for envelopment by Microsoft have received favorable antitrust rulings

and/or settlement payments, including Novell, RealNetworks, Sun Microsystems, and Netscape.

Organizational Issues

Launching an envelopment attack requires an unusually high level of cross-unit

coordination. Engineers must integrate two platforms’ functionality and marketers must

formulate joint pricing and targeting strategies. Even if the technology can be developed

internally, most companies find that achieving cross-unit cooperation is difficult, because

managers will fight for autonomy and strive to advance their units’ interests (Garud &

Kumaraswamy, 1995; Galunic & Eisenhardt, 2001).

Future research could focus on optimal organizational structures for encouraging

cross-unit cooperation in the context of envelopment, in particular, the appropriate degree

of structural separation between new and old units (Tushman & O’Reilly, 1996;

Christensen, 1997) and the ideal level of centralization of shared functions. Researchers

also could study the organizational systems, processes, and cultural values that successful

envelopers use to promote cross-unit cooperation, including transfer-pricing

arrangements and incentive plans.

Methodological Issues

Future research on envelopment should rely on a range of methods. Case studies

based on field interviews and analysis of archival records could reveal motivations for

envelopment beyond those discussed in this paper. Qualitative methods would also be

useful in exploring approaches that firms use to address the organizational issues

described above.

Econometric analysis could test hypotheses about factors that increase a firm’s

propensity to pursue envelopment and conditions that improve the odds of success with

different attack types. Likewise, additional analytical modeling could shed light on these

issues. To analyze the dynamics discussed above, however, a closed-form model would

need to reflect heterogeneity and correlation in potential users’ valuations, economies of

scope in marketing and production, and multi-homing costs, among other factors. Ideally,

models would evaluate not only pure bundling, but also tying and mixed bundling, and

would do so in a two-sided context. Due to the unusually large number of variables this

would require, researchers will likely find it difficult to develop tractable closed-form

models that capture the full richness of the envelopment phenomenon. However,

modeling specific aspects may be feasible. Likewise, simulation techniques may be well

suited for dealing with the intrinsic complexity of platform envelopment strategies.

Conclusion

In this paper, we introduced the concept of platform envelopment. By leveraging

common components and shared user relationships, one platform provider can envelop

21

another’s market, combining its own functionality with the target’s in a multi-platform

bundle. We presented a taxonomy of envelopment attacks, based on the relationship

between the attacker’s platform and its target’s, and discussed the economic and strategic

motivations for each attack type.

Briefly, with a conglomeration attack the platforms are functionally unrelated, but

may share common users and components. In that event, bundling can yield significant

economies of scope. With an intermodal attack the platforms are weak substitutes, and

the attacker may neutralize an emerging competitive threat. With a foreclosure attack the

platforms are complements. If envelopment reduces the appeal of a standalone provider’s

crucial complement, the attacker may strengthen its position vis-à-vis rivals in its core

market.

Envelopment is a widespread phenomenon that plays an important role in platform

evolution. It is an effective strategy for mounting cross-layer challenges in industries

where different firms dominate hierarchically organized strata of complements. Likewise,

the pervasive convergence of businesses that produce, process, and distribute digital

information often takes the form of platform envelopment. Most significantly,

envelopment provides a mechanism for platform leadership change that does not require

breakthrough innovation or Schumpeterian creative destruction. Well-established

incumbents that otherwise are sheltered from entry by standalone rivals due to strong

network effects and high switching costs may be vulnerable to envelopment.

22

References

Adams W, Yellen, J. 1976. Commodity bundling and the burden of monopoly. Quarterly Journal of

Economics 90: 475-498.

Arthur W B. 1989. Competing technologies, increasing returns, and lock-in by historical events.

Economic Journal 99: 116-131.

Bakos Y, Brynjolfsson E. 1999. Bundling information goods: Pricing, profits and efficiency.

Management Science 45:1613-1630.

Bakos Y, Brynjolfsson E. 2000. Bundling and competition on the Internet: aggregation strategies for

information goods. Marketing Science 19: 63-82.

Baldwin C, Clark K. 2000. Design Rules, Vol. 1: The Power of Modularity. MIT Press: Cambridge,

MA.

Bork R. 1978. The Antitrust Paradox. Basic Books: New York.

Boudreau K. 2006. Does opening a platform generate more innovation? MIT Sloan Research Paper

4611-06.

Bresnahan T. 1999. New modes of competition: implications for the future structure of the computer

industry. In Competition, Innovation and the Microsoft Monopoly: Antitrust in the Digital Marketplace.

Eisenach J, Lenard T (eds.). Kluwer: Boston.

Bresnahan T, Greenstein S. 1999. Technological competition and the structure of the computer industry.

Journal of Industrial Economics 47: 1-40.

Caillaud B, Jullien B. 2003. Chicken & egg: Competition among intermediation service providers. Rand

Journal of Economics 34(2): 309-328.

Carbajo J, de Meza D, Seidmann D. 1990. A strategic motivation for commodity bundling. Journal of

Industrial Economics. 38: 283-298.

Carlton D, Waldman M. 2002. The strategic use of tying to preserve and create market power in

evolving industries. Rand Journal of Economics 33(2): 194-220.

Carlton D, Waldman M. 2005a. Theories of tying and implications for antitrust. Johnson School

Research Paper 24-06.

Carlton D, Waldman M. 2005b. Tying, upgrades, and switching costs in durable-goods markets. NBER

Working Paper 11407.

Casadesus-Masanell R, Yoffie, D. 2006. Wintel: cooperation or conflict. Management Science

forthcoming.

Chen M, Nalebuff B. 2006. One-way essential complements. Working paper available at SSRN.

Church J, Gandal N. 1992. Integration, complementary products and variety. Journal of Economics and

Management Strategy 1: 651-675.

Church J, Gandal N. 2000. Systems competition, vertical merger, and foreclosure. Journal of

Economics and Management Strategy 9: 25-51.

Christensen C. 1997. The Innovator's Dilemma: When New Technologies Cause Great Firms to Fail.

Harvard Business School Press: Boston.

Davis S, MacCrisken J, Murphy K. 2001. Economic perspectives on software design: PC operating

systems and platforms. NBER Working Paper W8411.

Economides N. 1996. The economics of networks. International Journal of Industrial Economics 14:

673-699.

23

Eisenmann T. 2007. Managing Networked Businesses: course overview for educators. HBS note #807-

104.

Eisenmann T, Parker G, Van Alstyne M. 2006. Strategies for two-sided markets. Harvard Business

Review Oct. 2006.

Ellison G, Fudenberg D. 2003. Knife-edge or plateau: when do market models tip? Quarterly Journal of

Economics 118: 1249-1278.

Evans D. 2003. The antitrust economics of multi-sided platform industries. Yale Journal on Regulation

20: 325-382.

Evans D, Salinger M. 2005. Why do firms bundle and tie? Evidence from competitive markets and

implications for tying law. Yale Journal on Regulation 22: 37-89.

Evans D, Hagiu A, Schmalensee R. 2006. Invisible Engines: How Software Platforms Drive Innovation

and Transform Industries. MIT Press: Cambridge, MA.

Evans D, Schmalensee R. 2001. Some economic aspects of antitrust analysis in dynamically

competitive industries. NBER working paper W8268.

Evans D, Schmalensee R. 2005 (2nd

edition). Paying with Plastic: The Digital Revolution in Buying and

Borrowing. MIT Press: Cambridge, MA.

Farrell J, Monroe H, Saloner G. 1998. The vertical organization of industry: systems competition versus

component competition. Journal of Economics and Management Strategy 7: 143-182.

Farrell J, Saloner G. 1985. Standardization, compatibility, and innovation. Rand Journal of Economics

16: 70-83.

Farrell J, Weiser P. 2003. Modularity, vertical integration, and open-access policies: towards a

convergence of antitrust and regulation in the Internet age. Harvard Journal of Law & Technology 17: 86-

118.

Fine C. 1998. Clockspeed: Winning Industry Control in the Age of Temporary Advantage. Perseus

Publishing: New York.

Fransman M. 2002. Telecoms in the Internet Age. Oxford University Press: London.

Galunic C, Eisenhardt K. Architectural innovation and modular corporate forms. Academy of

Management Journal 44: 1229-1249.

Garud R, Kumaraswamy A. 1995. Technological and organizational designs to achieve economies of

substitution. Strategic Management Journal 17: 93-109.

Gawer A, Cusumano M. 2002. Platform Leadership: How Intel, Microsoft, and Cisco Drive Industry

Innovation. Harvard Business School Press: Boston.

Greenstein S, Khanna T. 1997. What does industry convergence mean? In Competing in the Age of

Digital Convergence. Yoffie D. (ed.). Harvard Business School Press: Boston.

Grove A. 1996. Only the Paranoid Survive: How to Exploit the Crisis Points that Challenge Every

Company and Career. Doubleday: New York.

Henderson R, Clark K. 1990. Architectural innovation: the reconfiguration of existing product

technologies and the failure of established firms. Administrative Science Quarterly 35: 9-30.

Iansiti M, Levin R. 2004. The Keystone Advantage: What the New Dynamics of Business Ecosystems

Mean for Strategy, Innovation, and Sustainability. Harvard Business School Press: Boston.

Jacobides M. 2005. Industry change through vertical disintegration: how and why markets emerged in

mortgage banking. Academy of Management Journal 48: 465-498.

Karnani A, Wernerfelt B. 1985. Multiple point competition. Strategic Management Journal 6: 87-96.

24

Katz M, Shapiro C. 1985. Network externalities, competition, and compatibility. American Economic

Review 75: 424-440.

Klemperer P. 1987. Markets with consumer switching costs. Quarterly Journal of Economics 102: 375-

394.

Langlois R, Robertson P. 1992. Networks and innovation in a modular system: lessons from the

microcomputer and stereo component industries. Research Policy 21: 297-313.

Matutes C, Regibeau P. 1992. Compatibility and bundling of complementary goods in a duopoly.

Journal of Industrial Economics 40: 37-54.

McAfee R, McMillan J, Whinston M. 1989. Multiproduct monopoly, commodity bundling, and

correlation of values. Quarterly Journal of Economics 114: 371-384

Nalebuff B. 2000. Competing against bundles. In Incentives, Organization, and Public Economics.

Hammond P, Myles G. (eds). Oxford University Press: London.

Nalebuff B. 2003. Bundling, tying and portfolio effects. DTI Economics Paper no. 1.

Nalebuff B. 2004. Bundling as an entry deterrent. Quarterly Journal of Economics 119: 159-187.

Noe T, Parker G. 2005. Winner take all: Competition, strategy, and the structure of returns in the

Internet economy. Journal of Economics and Management Strategy 14: 141-164.

Parker G, Van Alstyne M. 2005. Two-sided network effects: a theory of information product design.

Management Science 51: 1494-1504.

Papoulis A. 1991 (3rd

edition). Probability, Random Variables, and Stochastic Processes. McGraw-Hill:

Boston.

Posner R. 1976. Antitrust Law: An Economic Perspective. University of Chicago Press: Chicago.

Rochet J, Tirole J. 2003. Platform competition in two-sided markets. Journal of the European

Economic Association, 1(4): 990-1029.

Schilling M. 2000. Towards a general modular systems theory and its application to inter-firm product

modularity. Academy of Management Review 25: 312-334.

Schmalensee R. 1984. Gaussian demand and commodity bundling. Journal of Business 57: 211-230.

Suarez F, Utterback J. 1995. Dominant designs and the survival of firms. Strategic Management

Journal 16: 415-430.

Sutton J. 1991. Sunk Costs and Market Structure: Price Competition, Advertising, and the Evolution of

Concentration. MIT Press: Cambridge, MA.

Tushman M, O'Reilly C. 1996. Ambidextrous organizations: managing evolutionary and revolutionary

change. California Management Review 38(4): 8-30.

Ulrich K. 1995. The role of product architecture in the manufacturing firm. Research Policy 24: 419-

440.

Wheelright S, Clark K. 1992. Revolutionizing Product Development. Free Press: New York.

Whinston, M. 1990. Tying, foreclosure and exclusion. American Economic Review 80: 837-859.

Whinston M. 2001. Exclusivity and tying in U.S. v Microsoft: what we know, and don’t know. Journal

of Economic Perspectives 15: 63-80.

Yoffie D. 1997. Introduction: CHESS and competing in the age of digital convergence. In Competing in

the Age of Digital Convergence. Yoffie D. (ed.). Harvard Business School Press: Boston.

25

26

27