{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T11:47:48Z","timestamp":1773661668771,"version":"3.50.1"},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2024,8,20]],"date-time":"2024-08-20T00:00:00Z","timestamp":1724112000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,8,20]],"date-time":"2024-08-20T00:00:00Z","timestamp":1724112000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soft Comput"],"published-print":{"date-parts":[[2026,3]]},"DOI":"10.1007\/s00500-024-09666-3","type":"journal-article","created":{"date-parts":[[2024,8,20]],"date-time":"2024-08-20T03:03:37Z","timestamp":1724123017000},"page":"2015-2026","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Strategy for complementor under platform owner\u2019s entry with vertically differentiated content"],"prefix":"10.1007","volume":"30","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4193-4232","authenticated-orcid":false,"given":"Zhiguo","family":"Li","sequence":"first","affiliation":[]},{"given":"Rui","family":"Dong","sequence":"additional","affiliation":[]},{"given":"Qianqian","family":"Cao","sequence":"additional","affiliation":[]},{"given":"Hongwu","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,8,20]]},"reference":[{"key":"9666_CR1","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1287\/isre.2013.0505","volume":"25","author":"EG Anderson","year":"2014","unstructured":"Anderson EG, Parker GG, Tan B (2014) Platform performance investment in the presence of network externalities. Inf Syst Res 25:152\u2013172. https:\/\/doi.org\/10.1287\/isre.2013.0505","journal-title":"Inf Syst Res"},{"key":"9666_CR2","doi-asserted-by":"publisher","first-page":"651","DOI":"10.1287\/mksc.1070.0280","volume":"26","author":"A Arya","year":"2007","unstructured":"Arya A, Mittendorf B, Sappington DEM (2007) The bright side of supplier encroachment. Mark Sci 26:651\u2013659. https:\/\/doi.org\/10.1287\/mksc.1070.0280","journal-title":"Mark Sci"},{"key":"9666_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1111\/1467-6451.00088","volume":"47","author":"TF Bresnahan","year":"1999","unstructured":"Bresnahan TF, Greenstein S (1999) Technological competition and the structure of the computer industry. J Ind Econ 47:1\u201340. https:\/\/doi.org\/10.1111\/1467-6451.00088","journal-title":"J Ind Econ"},{"key":"9666_CR4","unstructured":"Cennamo C, Gu Y, Zhu F (2018) Value co-creation and capture in platform markets: evidence from a creative industry. Technical Report (Working Paper). Harvard Business School"},{"key":"9666_CR5","unstructured":"Chen F, Han Y (2018) Strategic interactions on an ecommerce platform: pricing, demand learning, and the threat of entry. Technical Report (Working Paper). Columbia University"},{"key":"9666_CR6","doi-asserted-by":"publisher","first-page":"407","DOI":"10.1016\/j.ejor.2019.06.004","volume":"279","author":"Q Cui","year":"2019","unstructured":"Cui Q (2019) Quality investment, and the contract manufacturer\u2019s encroachment. Eur J Oper Res 279:407\u2013418. https:\/\/doi.org\/10.1016\/j.ejor.2019.06.004","journal-title":"Eur J Oper Res"},{"key":"9666_CR7","doi-asserted-by":"publisher","first-page":"1115","DOI":"10.1002\/smj.1978","volume":"33","author":"L Diestre","year":"2012","unstructured":"Diestre L, Rajagopalan N (2012) Are all \u2018sharks\u2019 dangerous? New biotechnology ventures and partner selection in r &d alliances. Strateg Manag J 33:1115\u20131134. https:\/\/doi.org\/10.1002\/smj.1978","journal-title":"Strateg Manag J"},{"key":"9666_CR8","doi-asserted-by":"publisher","first-page":"1545","DOI":"10.1002\/smj.3044","volume":"40","author":"S Ethiraj","year":"2019","unstructured":"Ethiraj S, Zhou YM (2019) Fight or flight? Market positions, submarket interdependencies, and strategic responses to entry threats. Strateg Manag J 40:1545\u20131569. https:\/\/doi.org\/10.1002\/smj.3044","journal-title":"Strateg Manag J"},{"key":"9666_CR9","doi-asserted-by":"publisher","first-page":"444","DOI":"10.1287\/isre.2018.0787","volume":"29","author":"J Foerderer","year":"2018","unstructured":"Foerderer J, Kude T, Mithas S, Heinzl A (2018) Does platform owner\u2019s entry crowd out innovation? Evidence from google photos. Inf Syst Res 29:444\u2013460. https:\/\/doi.org\/10.1287\/isre.2018.0787","journal-title":"Inf Syst Res"},{"key":"9666_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1111\/j.1530-9134.2007.00130.x","volume":"16","author":"A Gawer","year":"2007","unstructured":"Gawer A, Henderson R (2007) Platform owner entry and innovation in complementary markets: evidence from intel. J Econ Manag Strategy 16:1\u201334. https:\/\/doi.org\/10.1111\/j.1530-9134.2007.00130.x","journal-title":"J Econ Manag Strategy"},{"key":"9666_CR11","doi-asserted-by":"publisher","first-page":"280","DOI":"10.1287\/msom.2015.0562","volume":"18","author":"A Ha","year":"2016","unstructured":"Ha A, Long X, Nasiry J (2016) Quality in supply chain encroachment. Manuf Serv Oper Manag 18:280\u2013298. https:\/\/doi.org\/10.1287\/msom.2015.0562","journal-title":"Manuf Serv Oper Manag"},{"key":"9666_CR12","doi-asserted-by":"publisher","first-page":"3234","DOI":"10.1287\/mnsc.2019.3356","volume":"66","author":"A Hagiu","year":"2020","unstructured":"Hagiu A, Jullien B, Wright J (2020) Creating platforms by hosting rivals. Manage Sci 66:3234\u20133248. https:\/\/doi.org\/10.1287\/mnsc.2019.3356","journal-title":"Manage Sci"},{"key":"9666_CR13","doi-asserted-by":"publisher","first-page":"91","DOI":"10.5172\/impp.2003.5.1.91","volume":"5","author":"O Hauptman","year":"2003","unstructured":"Hauptman O (2003) Platform leadership: how intel, microsoft, and cisco drive industry innovation. Innovation 5:91\u201394. https:\/\/doi.org\/10.5172\/impp.2003.5.1.91","journal-title":"Innovation"},{"key":"9666_CR14","unstructured":"Hou P, Zhen Z, Li B (2022) Competitive strategies of manufacturer and copycat under network effects. Oper Res Manag Sci 31:149\u2013155. http:\/\/www.jorms.net\/EN\/10.12005\/orms.2022.0127"},{"key":"9666_CR15","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1287\/mnsc.1120.1618","volume":"59","author":"P Huang","year":"2013","unstructured":"Huang P, Ceccagnoli M, Forman C, Wu DJ (2013) Appropriability mechanisms and the platform partnership decision: evidence from enterprise software. Manage Sci 59:102\u2013121. https:\/\/doi.org\/10.1287\/mnsc.1120.1618","journal-title":"Manage Sci"},{"key":"9666_CR16","doi-asserted-by":"publisher","first-page":"757","DOI":"10.1287\/mksc.1110.0656","volume":"30","author":"B Jiang","year":"2011","unstructured":"Jiang B, Jerath K, Srinivasan K (2011) Firm strategies in the mid tail of platform-based retailing. Mark Sci 30:757\u2013775. https:\/\/doi.org\/10.1287\/mksc.1110.0656","journal-title":"Mark Sci"},{"key":"9666_CR17","doi-asserted-by":"publisher","first-page":"11205","DOI":"10.5465\/AMBPP.2017.11205abstract","volume":"2017","author":"H Kang","year":"2017","unstructured":"Kang H (2017) Intra-platform envelopment: the coopetitive dynamics between the platform owner and complementors. Acad Manag Proc 2017:11205. https:\/\/doi.org\/10.5465\/AMBPP.2017.11205abstract","journal-title":"Acad Manag Proc"},{"key":"9666_CR18","doi-asserted-by":"publisher","first-page":"295","DOI":"10.2189\/asqu.53.2.295","volume":"53","author":"R Katila","year":"2008","unstructured":"Katila R, Rosenberger JD, Eisenhardt KM (2008) Swimming with sharks: technology ventures, defense mechanisms and corporate relationships. Adm Sci Q 53:295\u2013332. https:\/\/doi.org\/10.2189\/asqu.53.2.295","journal-title":"Adm Sci Q"},{"key":"9666_CR19","doi-asserted-by":"publisher","first-page":"2655","DOI":"10.3390\/jtaer16070146","volume":"16","author":"H Li","year":"2021","unstructured":"Li H, Li Z (2021) Supplier encroachment in the supply chain in the e-commerce age: a systematic literature review. J Theor Appl Electron Commer Res 16:2655\u20132671. https:\/\/doi.org\/10.3390\/jtaer16070146","journal-title":"J Theor Appl Electron Commer Res"},{"key":"9666_CR20","doi-asserted-by":"publisher","first-page":"449","DOI":"10.1287\/mnsc.2013.1780","volume":"60","author":"Z Li","year":"2014","unstructured":"Li Z, Gilbert SM, Lai G (2014) Supplier encroachment under asymmetric information. Manage Sci 60:449\u2013462. https:\/\/doi.org\/10.1287\/mnsc.2013.1780","journal-title":"Manage Sci"},{"key":"9666_CR21","doi-asserted-by":"publisher","first-page":"15373","DOI":"10.1007\/s00500-020-04872-1","volume":"24","author":"Z Li","year":"2020","unstructured":"Li Z, Zhang H, Gao R (2020) Frugal innovation in supply chain cooperation considering e-retailer\u2019s platform value. Soft Comput 24:15373\u201315387. https:\/\/doi.org\/10.1007\/s00500-020-04872-1","journal-title":"Soft Comput"},{"key":"9666_CR22","doi-asserted-by":"publisher","first-page":"669","DOI":"10.1016\/j.ejor.2023.09.007","volume":"313","author":"Z Li","year":"2024","unstructured":"Li Z, Xie F, Zhang H, Zhang H (2024) Signaling quality through price guarantee window for technology-related products. Eur J Oper Res 313:669\u2013677. https:\/\/doi.org\/10.1016\/j.ejor.2023.09.007","journal-title":"Eur J Oper Res"},{"key":"9666_CR23","doi-asserted-by":"publisher","DOI":"10.1016\/j.cie.2019.106078","volume":"137","author":"J Shi","year":"2019","unstructured":"Shi J (2019) Contract manufacturer\u2019s encroachment strategy and quality decision with different channel leadership structures. Comput Ind Eng 137:106078. https:\/\/doi.org\/10.1016\/j.cie.2019.106078","journal-title":"Comput Ind Eng"},{"key":"9666_CR24","doi-asserted-by":"publisher","first-page":"10797","DOI":"10.1007\/s00500-021-05962-4","volume":"25","author":"M Tang","year":"2021","unstructured":"Tang M, Jiang L, Li Z, Zhang H (2021) Optimal ordering decision and information leakage preference under asymmetric forecast signal. Soft Comput 25:10797\u201310812. https:\/\/doi.org\/10.1007\/s00500-021-05962-4","journal-title":"Soft Comput"},{"key":"9666_CR25","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1016\/j.cie.2016.12.034","volume":"105","author":"L Wang","year":"2017","unstructured":"Wang L, Song H, Wang Y (2017) Pricing and service decisions of complementary products in a dual-channel supply chain. Comput Ind Eng 105:223\u2013233. https:\/\/doi.org\/10.1016\/j.cie.2016.12.034","journal-title":"Comput Ind Eng"},{"key":"9666_CR26","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1287\/isre.2017.0735","volume":"29","author":"Q Wang","year":"2018","unstructured":"Wang Q, Li B, Singh PV (2018) Copycats vs. original mobile apps: A machine learning copycat-detection method and empirical analysis. Inf Syst Res 29:273\u2013291. https:\/\/doi.org\/10.1287\/isre.2017.0735","journal-title":"Inf Syst Res"},{"key":"9666_CR27","doi-asserted-by":"publisher","first-page":"507","DOI":"10.1016\/j.ejor.2012.09.011","volume":"224","author":"J Wei","year":"2013","unstructured":"Wei J, Zhao J, Li Y (2013) Pricing decisions for complementary products with firms\u2019 different market powers. Eur J Oper Res 224:507\u2013519. https:\/\/doi.org\/10.1016\/j.ejor.2012.09.011","journal-title":"Eur J Oper Res"},{"key":"9666_CR28","doi-asserted-by":"publisher","first-page":"1336","DOI":"10.1002\/smj.3031","volume":"40","author":"W Wen","year":"2019","unstructured":"Wen W, Zhu F (2019) Threat of platform-owner entry and complementor responses: evidence from the mobile app market. Strateg Manag J 40:1336\u20131367. https:\/\/doi.org\/10.1002\/smj.3031","journal-title":"Strateg Manag J"},{"key":"9666_CR29","unstructured":"Zhang L, Zhou S, Chang L (2022) Sales mode selection of supply chain members considering the introduction of platform private brand and production modes. Chin J Manag Sci. http:\/\/www.zgglkx.com\/CN\/abstract\/abstract18184.shtml"},{"key":"9666_CR30","doi-asserted-by":"publisher","unstructured":"Zhu F (2019) Friends or foes? Examining platform owners\u2019 entry into complementors\u2019 spaces. J Econ Manag Strategy 28:23\u201328. https:\/\/doi.org\/10.1111\/jems.12303","DOI":"10.1111\/jems.12303"},{"key":"9666_CR31","doi-asserted-by":"publisher","first-page":"2618","DOI":"10.1002\/smj.2932","volume":"39","author":"F Zhu","year":"2018","unstructured":"Zhu F, Liu Q (2018) Competing with complementors: an empirical look at amazon.com. Strateg Manag J 39:2618\u20132642. https:\/\/doi.org\/10.1002\/smj.2932","journal-title":"Strateg Manag J"},{"key":"9666_CR32","unstructured":"Zhu F, Sun S (2018) Jd: envisioning the future of retail. Harvard Business School Case, pp 618\u2013051 https:\/\/www.hbs.edu\/faculty\/Pages\/item.aspx?num=54411"}],"container-title":["Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-024-09666-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00500-024-09666-3","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-024-09666-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T10:47:25Z","timestamp":1773658045000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00500-024-09666-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8,20]]},"references-count":32,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2026,3]]}},"alternative-id":["9666"],"URL":"https:\/\/doi.org\/10.1007\/s00500-024-09666-3","relation":{},"ISSN":["1432-7643","1433-7479"],"issn-type":[{"value":"1432-7643","type":"print"},{"value":"1433-7479","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,8,20]]},"assertion":[{"value":"10 January 2024","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 August 2024","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"The authors declare that this paper is compliance with ethical standards.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical standards"}}]}}