A search cost model of obfuscation

被引:116
|
作者
Ellison, Glenn [1 ,2 ]
Wolitzky, Alexander [3 ]
机构
[1] MIT, Cambridge, MA 02139 USA
[2] NBER, Cambridge, MA 02138 USA
[3] Stanford Univ, Stanford, CA 94305 USA
来源
RAND JOURNAL OF ECONOMICS | 2012年 / 43卷 / 03期
关键词
SEQUENTIAL SEARCH; CONSUMER SEARCH; PRICE; MARKETS; INFORMATION; COMPETITION; INTERNET; NUMBER; SALES;
D O I
10.1111/j.1756-2171.2012.00180.x
中图分类号
F [经济];
学科分类号
02 ;
摘要
This article develops models in which obfuscation is individually rational for oligopolistic firms. Firms sell a homogeneous good to rational consumers who incur search costs to learn prices. Search costs are endogenized by allowing obfuscationfirms have an unobservable action that increases the time needed to learn their price. One model involves search costs convex in shopping time. We show that slight convexity can dramatically alter the equilibrium price distribution. A second model examines an informational linkage between current and future search costs: consumers are uncertain about a component of search costs. Here, a signal-jamming mechanism can lead to equilibrium obfuscation.
引用
收藏
页码:417 / 441
页数:25
相关论文
共 50 条
  • [1] Competitive search obfuscation
    Hamalainen, Saara
    JOURNAL OF ECONOMIC DYNAMICS & CONTROL, 2018, 97 : 38 - 63
  • [3] Ordered search and equilibrium obfuscation
    Wilson, Chris M.
    INTERNATIONAL JOURNAL OF INDUSTRIAL ORGANIZATION, 2010, 28 (05) : 496 - 506
  • [4] Search, Obfuscation, and Price Elasticities on the Internet
    Ellison, Glenn
    Ellison, Sara Fisher
    ECONOMETRICA, 2009, 77 (02) : 427 - 452
  • [5] Obfuscation Resilient Search through Executable Classification
    Su, Fang-Hsiang
    Bell, Jonathan
    Kaiser, Gail
    Ray, Baishakhi
    MAPL'18: PROCEEDINGS OF THE 2ND ACM SIGPLAN INTERNATIONAL WORKSHOP ON MACHINE LEARNING AND PROGRAMMING LANGUAGES, 2018, : 20 - 30
  • [6] The performance cost of software obfuscation for Android applications
    Zhuang, Yan
    COMPUTERS & SECURITY, 2018, 73 : 57 - 72
  • [7] A Cost-Continuity Model for Web Search
    Nettleton, David F.
    Codina, Joan
    MODELING DECISIONS FOR ARTIFICIAL INTELLIGENCE (MDAI), 2010, 6408 : 219 - 230
  • [8] On Preventing Symbolic Execution Attacks by Low Cost Obfuscation
    Seto, Toshiki
    Monden, Akito
    Yucel, Zeynep
    Kanzaki, Yuichiro
    2019 20TH IEEE/ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNPD), 2019, : 495 - 500
  • [9] Multi-Keyword search over encrypted data with scoring and search pattern obfuscation
    Orencik, Cengiz
    Selcuk, Ayse
    Savas, Erkay
    Kantarcioglu, Murat
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2016, 15 (03) : 251 - 269
  • [10] Multi-Keyword search over encrypted data with scoring and search pattern obfuscation
    Cengiz Orencik
    Ayse Selcuk
    Erkay Savas
    Murat Kantarcioglu
    International Journal of Information Security, 2016, 15 : 251 - 269