{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T15:40:30Z","timestamp":1763480430360,"version":"3.37.3"},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2021,1,7]],"date-time":"2021-01-07T00:00:00Z","timestamp":1609977600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,7]],"date-time":"2021-01-07T00:00:00Z","timestamp":1609977600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100010198","name":"Ministerio de Econom\u00eda, Industria y Competitividad, Gobierno de Espa\u00f1a","doi-asserted-by":"publisher","award":["ECO-2016-75575-R","ECO2017-85746-P"],"award-info":[{"award-number":["ECO-2016-75575-R","ECO2017-85746-P"]}],"id":[{"id":"10.13039\/501100010198","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100011596","name":"Conselleria d'Educaci\u00f3, Investigaci\u00f3, Cultura i Esport","doi-asserted-by":"publisher","award":["PROMETEO 2019\/095"],"award-info":[{"award-number":["PROMETEO 2019\/095"]}],"id":[{"id":"10.13039\/501100011596","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100014440","name":"Ministerio de Ciencia, Innovaci\u00f3n y Universidades","doi-asserted-by":"publisher","award":["PID2019-110790RB-I00"],"award-info":[{"award-number":["PID2019-110790RB-I00"]}],"id":[{"id":"10.13039\/100014440","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int J Game Theory"],"published-print":{"date-parts":[[2021,3]]},"DOI":"10.1007\/s00182-020-00748-8","type":"journal-article","created":{"date-parts":[[2021,1,7]],"date-time":"2021-01-07T18:03:49Z","timestamp":1610042629000},"page":"241-278","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Entry with two correlated signals: the case of industrial espionage and its positive competitive effects"],"prefix":"10.1007","volume":"50","author":[{"given":"Alex","family":"Barrachina","sequence":"first","affiliation":[]},{"given":"Yair","family":"Tauman","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2971-9612","authenticated-orcid":false,"given":"Amparo","family":"Urbano","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,1,7]]},"reference":[{"issue":"1","key":"748_CR1","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1016\/0167-7187(94)90028-0","volume":"12","author":"S Albaek","year":"1992","unstructured":"Albaek S, Overgaard PB (1992a) Advertising and Pricing to Deter or Accommodate Entry When Demand Is Unknown: Comment. Int J Ind Organ 12(1):83\u201387","journal-title":"Int J Ind Organ"},{"issue":"4","key":"748_CR2","doi-asserted-by":"publisher","first-page":"677","DOI":"10.1111\/j.1430-9134.1992.00677.x","volume":"1","author":"S Albaek","year":"1992","unstructured":"Albaek S, Overgaard PB (1992b) Upstream Pricing and Advertising Signal Downstream Demand. Journal of Economics and Management Strategy 1(4):677\u2013698","journal-title":"Journal of Economics and Management Strategy"},{"issue":"4","key":"748_CR3","doi-asserted-by":"publisher","first-page":"585","DOI":"10.1111\/j.1430-9134.1992.00585.x","volume":"1","author":"K Bagwell","year":"1992","unstructured":"Bagwell K (1992) A Model of Competitive Limit Pricing. Journal of Economics and Management Strategy 1(4):585\u2013606","journal-title":"Journal of Economics and Management Strategy"},{"issue":"3","key":"748_CR4","doi-asserted-by":"publisher","first-page":"670","DOI":"10.1111\/j.0741-6261.2007.00106.x","volume":"38","author":"K Bagwell","year":"2007","unstructured":"Bagwell K (2007) Signalling and Entry Deterrence: A Multidimensional Analysis. Rand J Econ 38(3):670\u2013697","journal-title":"Rand J Econ"},{"issue":"1","key":"748_CR5","doi-asserted-by":"publisher","first-page":"59","DOI":"10.2307\/2555397","volume":"19","author":"K Bagwell","year":"1988","unstructured":"Bagwell K, Ramey G (1988) Advertising and Limit Pricing. Rand J Econ 19(1):59\u201371","journal-title":"Rand J Econ"},{"issue":"1","key":"748_CR6","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1016\/0167-7187(89)90036-2","volume":"8","author":"K Bagwell","year":"1990","unstructured":"Bagwell K, Ramey G (1990) Advertising and Pricing to Deter or Accommodate Entry When Demand Is Unknown. Int J Ind Organ 8(1):93\u2013113","journal-title":"Int J Ind Organ"},{"issue":"2","key":"748_CR7","doi-asserted-by":"publisher","first-page":"155","DOI":"10.2307\/2601015","volume":"22","author":"K Bagwell","year":"1991","unstructured":"Bagwell K, Ramey G (1991) Oligopoly Limit Pricing. Rand J Econ 22(2):155\u2013172","journal-title":"Rand J Econ"},{"key":"748_CR8","first-page":"448","volume":"39","author":"JS Bain","year":"1949","unstructured":"Bain JS (1949) A Note on Pricing in Monopoly and Oligopoly. American Economic Review 39:448\u2013464","journal-title":"American Economic Review"},{"issue":"1","key":"748_CR9","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1111\/manc.12229","volume":"87","author":"A Barrachina","year":"2019","unstructured":"Barrachina A (2019) Entry under an Information-Gathering Monopoly. The Manchester School 87(1):117\u2013134","journal-title":"The Manchester School"},{"key":"748_CR10","doi-asserted-by":"publisher","unstructured":"Barrachina, A. and Forner-Carreras, T. (2020) \u201cMarket Must Be Defended: The Role of Counter-Espionage Policy in Maximizing Domestic Market Welfare,\u201d Working paper at SSRN. doi:\u00a0http:\/\/dx.doi.org\/https:\/\/doi.org\/10.2139\/ssrn.3532719","DOI":"10.2139\/ssrn.3532719"},{"key":"748_CR11","doi-asserted-by":"crossref","unstructured":"Barrachina, A., Tauman, Y. and Urbano, A. (2014) \u201cEntry and Espionage with Noisy Signals,\u201c Games and Economic Behavior, 83, 127\u2013146.","DOI":"10.1016\/j.geb.2013.10.005"},{"key":"748_CR12","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1057\/s41284-019-00194-6","volume":"33","author":"Z Bederna","year":"2020","unstructured":"Bederna Z, Szadeczky T (2020) Cyber Espionage Through Botnets. Security Journal 33:43\u201362","journal-title":"Security Journal"},{"key":"748_CR13","unstructured":"Bhatti, H. J. and Alymenko, A. (2017) \u201cA Literature Review: Industrial Espionage,\u201d Working Paper at DiVA. Available at:"},{"key":"748_CR14","unstructured":"https:\/\/www.diva-portal.org\/smash\/get\/diva2:1076071\/FULLTEXT01.pdf"},{"issue":"2","key":"748_CR15","doi-asserted-by":"publisher","first-page":"248","DOI":"10.1111\/jpet.12180","volume":"18","author":"P Billand","year":"2016","unstructured":"Billand P, Bravard C, Chakrabarti S, Sarangi S (2016) Business Intelligence and Multimarket Competition. Journal of Public Economic Theory 18(2):248\u2013267","journal-title":"Journal of Public Economic Theory"},{"key":"748_CR16","doi-asserted-by":"publisher","unstructured":"Fan, C., Jun, B. H. and Wolfstetter, E.G. (2019) \u201cInduced Price Leadership and (Counter-)spying Rivals' Play under Incomplete Information,\u201d Working paper at SSRN. doi: http:\/\/dx.doi.org\/https:\/\/doi.org\/10.2139\/ssrn.3326079","DOI":"10.2139\/ssrn.3326079"},{"issue":"3","key":"748_CR17","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1177\/1350507607079030","volume":"38","author":"J Ferdinand","year":"2007","unstructured":"Ferdinand J, Simm D (2007) Re-theorizing external learning - Insights from Economic and Industrial Espionage. Management Learning 38(3):297\u2013317","journal-title":"Management Learning"},{"key":"748_CR18","doi-asserted-by":"crossref","unstructured":"Grabiszewski, K., and Minor, D. (2019) \u201cEconomic Espionage,\u201d Defence and","DOI":"10.1080\/10242694.2018.1477400"},{"key":"748_CR19","unstructured":"Peace Economics, 30:3, 269\u2013277."},{"key":"748_CR20","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1287\/mnsc.14.3.159","volume":"14","author":"JC Harsanyi","year":"1967","unstructured":"Harsanyi JC (1967) Games with Incomplete Information Played by \u2018Bayesian\u00b4 Players. Parts I-III. Part I. The Basic Model. Manage Sci 14:159\u2013182","journal-title":"Manage Sci"},{"key":"748_CR21","doi-asserted-by":"publisher","first-page":"320","DOI":"10.1287\/mnsc.14.5.320","volume":"14","author":"JC Harsanyi","year":"1968","unstructured":"Harsanyi JC (1968) Games with Incomplete Information Played by \u2018Bayesian\u00b4 Players. Part II. Bayesian Equilibrium Points. Manage Sci 14:320\u2013334","journal-title":"Manage Sci"},{"issue":"1","key":"748_CR22","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1007\/s00712-007-0290-2","volume":"93","author":"SJ Ho","year":"2008","unstructured":"Ho SJ (2008) Extracting the Information: Espionage with Double Crossing. J Econ 93(1):31\u201358","journal-title":"J Econ"},{"key":"748_CR23","doi-asserted-by":"publisher","unstructured":"Kozlovskaya, M. (2018) \u201cIndustrial Espionage in Duopoly Games,\u201d Working paper at SSRN. doi: http:\/\/dx.doi.org\/https:\/\/doi.org\/10.2139\/ssrn.3190093","DOI":"10.2139\/ssrn.3190093"},{"key":"748_CR24","doi-asserted-by":"crossref","unstructured":"Linnemer, L. (1998) \"Entry Deterrence, Product Quality: Price and Advertising as Signals,\u201c Journal of Economics and Management Strategy, 7:4, 615\u2013645.","DOI":"10.1162\/105864098567533"},{"issue":"4","key":"748_CR25","doi-asserted-by":"publisher","first-page":"981","DOI":"10.2307\/1912047","volume":"51","author":"SA Matthews","year":"1983","unstructured":"Matthews SA, Mirman L (1983) Equilibrium Limit Pricing: The Effect of Private Information and Stochastic Demand. Econometrica 51(4):981\u2013996","journal-title":"Econometrica"},{"key":"748_CR26","doi-asserted-by":"publisher","first-page":"380","DOI":"10.2307\/3003562","volume":"12","author":"P Milgrom","year":"1981","unstructured":"Milgrom P (1981) Good News and Bad News: Representation Theorems and Applications. Bell Journal of Economics 12:380\u2013391","journal-title":"Bell Journal of Economics"},{"issue":"2","key":"748_CR27","doi-asserted-by":"publisher","first-page":"443","DOI":"10.2307\/1912637","volume":"50","author":"P Milgrom","year":"1982","unstructured":"Milgrom P, Roberts J (1982) Limit Pricing and Entry under Incomplete Information: An Equilibrium Analysis. Econometrica 50(2):443\u2013459","journal-title":"Econometrica"},{"issue":"1","key":"748_CR28","doi-asserted-by":"publisher","first-page":"29","DOI":"10.2307\/2097895","volume":"25","author":"D Needham","year":"1976","unstructured":"Needham D (1976) Entry Barriers and Non-Price Aspects of Firms\u2019 Behavior. Journal of Industrial Economics 25(1):29\u201343","journal-title":"Journal of Industrial Economics"},{"issue":"2","key":"748_CR29","doi-asserted-by":"publisher","first-page":"340","DOI":"10.2307\/3087437","volume":"33","author":"R Orzach","year":"2002","unstructured":"Orzach R, Overgaard PB, Tauman Y (2002) Modest Advertising Signals Strength. Rand J Econ 33(2):340\u2013358","journal-title":"Rand J Econ"},{"key":"748_CR30","unstructured":"Perea, A. and Swinkels, J. (1999) \u201cSelling Information in Extensive Form Games,\u201d Working Paper. https:\/\/e-archivo.uc3m.es\/bitstream\/10016\/6151\/1\/we994418.PDF (accessed June 2012)."},{"issue":"3","key":"748_CR31","doi-asserted-by":"publisher","first-page":"671","DOI":"10.1007\/s00182-011-0310-x","volume":"41","author":"C Pires","year":"2012","unstructured":"Pires C, Jorge S (2012) Limit Pricing Under Third-Degree Price Discrimination. International Journal of Game Theory 41(3):671\u2013698","journal-title":"International Journal of Game Theory"},{"key":"748_CR32","unstructured":"Roche, E. M. (2016) \u201cIndustrial Espionage,\u201d The Intelligencer: Journal of U.S. Intelligence Studies, 22\u00a0:1, 59\u201363."},{"issue":"1","key":"748_CR33","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1016\/0022-0531(85)90078-X","volume":"36","author":"Y Sakai","year":"1985","unstructured":"Sakai Y (1985) The Value of Information in a Simple Duopoly Model. Journal of Economic Theory 36(1):36\u201354","journal-title":"Journal of Economic Theory"},{"key":"748_CR34","unstructured":"Securonix (2015) \u201cA Case of Corporate Espionage,\u201d 10.07.2015. https:\/\/www.securonix.com\/a-case-of-corporate-espionage (last retrieved April 4, 2020)."},{"key":"748_CR35","doi-asserted-by":"crossref","unstructured":"Solan E. and Yariv, L. (2004) \u201cGames with Espionage,\u201c Games and Economic Behavior, 47:1, 172\u2013199.","DOI":"10.1016\/S0899-8256(03)00177-5"},{"issue":"3","key":"748_CR36","first-page":"51","volume":"6","author":"K Solberg","year":"2016","unstructured":"Solberg K (2016) Economic and Industrial Espionage at the Start of the 21st Century - Status Quaestionis. Journal of Intelligence Studies in Business 6(3):51\u201364","journal-title":"Journal of Intelligence Studies in Business"},{"issue":"2","key":"748_CR37","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1080\/10168739900000040","volume":"13","author":"ME Whitney","year":"1999","unstructured":"Whitney ME, Gaisford JD (1999) An Inquiry into the Rationale for Economic Espionage. International Economic Journal 13(2):103\u2013123","journal-title":"International Economic Journal"}],"container-title":["International Journal of Game Theory"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00182-020-00748-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00182-020-00748-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00182-020-00748-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,3,31]],"date-time":"2021-03-31T16:05:47Z","timestamp":1617206747000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00182-020-00748-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,7]]},"references-count":37,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,3]]}},"alternative-id":["748"],"URL":"https:\/\/doi.org\/10.1007\/s00182-020-00748-8","relation":{},"ISSN":["0020-7276","1432-1270"],"issn-type":[{"type":"print","value":"0020-7276"},{"type":"electronic","value":"1432-1270"}],"subject":[],"published":{"date-parts":[[2021,1,7]]},"assertion":[{"value":"27 October 2020","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 January 2021","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}