E-Commerce, Two-Sided Markets and Info-Mediation
Participants in a market, buyers and sellers, may need the service of an intermediary who will put them into contact and give them information about their potential trading partner. The intermediary chooses what price it will charge to each side to have access to its service. It also chooses what information it will reveal, for example to the buyer about the value of the seller’s product. In a market with network externalities, it would be optimal that everybody had access to the other side, as each side wants as many agents from the other side to be present as possible. This is however not feasible as the intermediary must charge positive access prices if it is to make any profit. In a market with asymmetric information, it would be optimal that all information about the buyers’ and sellers’ valuation for the traded product be available, but the intermediary will want to conceal or manipulate that information to increase its profit. The paper examines in the first part how network externalities play out in the intermediary’s access pricing strategies in both a monopoly and a competitive setting. In the second part, the paper shows how the intermediary will strategically manipulate and conceal information to extract the surplus from trade in the market it intermediates.
(This abstract was borrowed from another version of this item.)
|Date of creation:||Jan 2005|
|Date of revision:|
|Contact details of provider:|| Postal: |
Phone: +33 (0)5 61 12 85 89
Fax: + 33 (0)5 61 12 86 37
Web page: http://www.idei.fr/
More information through EDIRC
Please report citation or reference errors to , or , if you are the registered author of the cited work, log in to your RePEc Author Service profile, click on "citations" and make appropriate adjustments.:
- Guerra, G.A., 2001. "Certification Disclosure And Informational Efficiency: A Case For Ordered Ranking Of Levels," Economics Series Working Papers 9964, University of Oxford, Department of Economics.
- Roland Strausz, .
"Honest Certification and the Threat of Capture,"
018, Departmental Working Papers.
- Strausz, Roland, 2004. "Honest Certification and the Threat of Capture," Discussion Paper Series of SFB/TR 15 Governance and the Efficiency of Economic Systems 25, Free University of Berlin, Humboldt University of Berlin, University of Bonn, University of Mannheim, University of Munich.
- Mark Armstrong, 2006.
"Competition in two‐sided markets,"
RAND Journal of Economics,
RAND Corporation, vol. 37(3), pages 668-691, 09.
- Okuno-Fujiwara, Masahiro & Postlewaite, Andrew & Suzumura, Kotaro, 1990. "Strategic Information Revelation," Review of Economic Studies, Wiley Blackwell, vol. 57(1), pages 25-47, January.
- Josh Lerner & Jean Tirole, 2004. "A Model of Forum Shopping, with Special Reference to Standard Setting Organizations," NBER Working Papers 10664, National Bureau of Economic Research, Inc.
- Khalil, Fahad & Lawarree, Jacques, 1995. "Collusive Auditors," American Economic Review, American Economic Association, vol. 85(2), pages 442-46, May.
- Albano, Gian Luigi & Lizzeri, Alessandro, 2001. "Strategic Certification and Provision of Quality," International Economic Review, Department of Economics, University of Pennsylvania and Osaka University Institute of Social and Economic Research Association, vol. 42(1), pages 267-83, February.
- Michael R. Baye & John Morgan, 2001. "Information Gatekeepers on the Internet and the Competitiveness of Homogeneous Product Markets," American Economic Review, American Economic Association, vol. 91(3), pages 454-474, June.
- Caillaud, Bernard & Jullien, Bruno, 2001. "Competing cybermediaries," European Economic Review, Elsevier, vol. 45(4-6), pages 797-808, May.
- V. Crawford & J. Sobel, 2010.
"Strategic Information Transmission,"
Levine's Working Paper Archive
544, David K. Levine.
When requesting a correction, please mention this item's handle: RePEc:ide:wpaper:4031. See general information about how to correct material in RePEc.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: ()
If references are entirely missing, you can add them using this form.