{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,5,8]],"date-time":"2023-05-08T06:10:02Z","timestamp":1683526202351},"reference-count":19,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2006,7,25]],"date-time":"2006-07-25T00:00:00Z","timestamp":1153785600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMS"],"published-print":{"date-parts":[[2007,8,15]]},"DOI":"10.1007\/s10287-006-0025-9","type":"journal-article","created":{"date-parts":[[2006,7,24]],"date-time":"2006-07-24T08:05:27Z","timestamp":1153728327000},"page":"301-312","source":"Crossref","is-referenced-by-count":0,"title":["The danger model: application to a competitive market"],"prefix":"10.1007","volume":"4","author":[{"given":"Enrique","family":"Castillo","sequence":"first","affiliation":[]},{"given":"Mar\u00eda","family":"Sarabia","sequence":"additional","affiliation":[]},{"given":"Elena","family":"\u00c1lvarez","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2006,7,25]]},"reference":[{"key":"25_CR1","doi-asserted-by":"crossref","DOI":"10.5962\/bhl.title.8281","volume-title":"The clonal selection theory of adquired immunity","author":"FM Burnet","year":"1959","unstructured":"Burnet FM (1959) The clonal selection theory of adquired immunity. Vanderbilt University Press, Nashville"},{"key":"25_CR2","unstructured":"Casadesus-Masanell R, Ghemawat P (2006) Dynamic mixed duopoly: A model motivated by Linux vs. Windows. Strategy Unit Workin Paper No.04-012: IESE Working Paper No. D\/519. Manage Sci (To appear)"},{"issue":"4","key":"25_CR3","doi-asserted-by":"crossref","first-page":"430","DOI":"10.1198\/004017004000000509","volume":"46","author":"E Castillo","year":"2004","unstructured":"Castillo E, Hadi AS, Conejo A, Fern\u00e1ndez A (2004) A general Method for local sensitivity analysis with application to regression models and other problems. Technometrics 46(4):430\u2013444","journal-title":"Technometrics"},{"issue":"1","key":"25_CR4","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1007\/s10957-005-7557-y","volume":"128","author":"E Castillo","year":"2006a","unstructured":"Castillo E, Conejo A, Castillo C, M\u00ednguez R, Ortigosa D (2006a) A Perturbation approach to sensitivity analysis in nonlinear programming. J Opt. Theory App 128(1):49\u201374","journal-title":"J Opt. Theory App"},{"key":"25_CR5","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1080\/03052150500229418","volume":"38","author":"E Castillo","year":"2006b","unstructured":"Castillo E, Conejo A, M\u00ednguez R, Castillo C (2006b) A closed formula for local sensitivity analysis in mathematical programming. Eng Optimi 38:93\u2013112","journal-title":"Eng Optimi"},{"key":"25_CR6","doi-asserted-by":"crossref","first-page":"453","DOI":"10.5465\/256688","volume":"38","author":"MJ Chen","year":"1995","unstructured":"Chen MJ, Hambrick DC (1995) Speed, stealth and selective attack: How small firms differ from large firms in competitive behavior. Acad Manage J 38:453\u2013482","journal-title":"Acad Manage J"},{"key":"25_CR7","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1002\/smj.4250150202","volume":"15","author":"MJ Chen","year":"1994","unstructured":"Chen MJ, Miller D (1994) Competitive attack, retaliation and performance: An expectancy-valence framework. Strateg Manage J 15:85\u2013102","journal-title":"Strateg Manage J"},{"key":"25_CR8","volume-title":"Hypercompetition","author":"RA D\u2019Aveni","year":"1994","unstructured":"D\u2019Aveni RA (1994) Hypercompetition. Free Press, New York"},{"key":"25_CR9","doi-asserted-by":"crossref","first-page":"858","DOI":"10.2307\/3069419","volume":"44","author":"WJ Ferrier","year":"2001","unstructured":"Ferrier WJ (2001) Navigating the competitive landscape: the drivers and consequences of competitive aggressiveness. Acad Manage J 44:858\u2013877","journal-title":"Acad Manage J"},{"key":"25_CR10","volume-title":"Competition and Entrepreneurship","author":"I Kirzner","year":"1973","unstructured":"Kirzner I (1973) Competition and Entrepreneurship. The University of Chicago Press, Chicago"},{"key":"25_CR11","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1002\/smj.4250131009","volume":"13","author":"D Leonard-Barton","year":"1992","unstructured":"Leonard-Barton D (1992) Core capabilities and core rigidities: A paradox in managing new product development. Strateg Manage J Summer Special Issue 13:111\u2013125","journal-title":"Strateg Manage J Summer Special Issue"},{"key":"25_CR12","doi-asserted-by":"crossref","first-page":"113","DOI":"10.1002\/smj.4250141010","volume":"14","author":"KR MacCrimmon","year":"1993","unstructured":"MacCrimmon KR (1993) Do firm strategies exist?. Strateg Manage J 14:113\u2013130","journal-title":"Strateg Manage J"},{"key":"25_CR13","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1108\/eb038892","volume":"1","author":"IC MacMillan","year":"1980","unstructured":"MacMillan IC (1980) How business strategists can use guerrilla warfare tactics. J Bus Strategy 1:63\u201365","journal-title":"J Bus Strategy"},{"key":"25_CR14","doi-asserted-by":"crossref","first-page":"301","DOI":"10.1126\/science.1071059","volume":"296","author":"P Matzinger","year":"2002","unstructured":"Matzinger P (2002) The danger model: a renewed sense of self. Science 296:301\u2013305","journal-title":"Science"},{"key":"25_CR15","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1002\/smj.4250060306","volume":"6","author":"H Mintzberg","year":"1985","unstructured":"Mintzberg H, Waters JA (1985) Of strategies, deliberate and emergent\". Strate Manage J 6:257\u2013272","journal-title":"Strate Manage J"},{"key":"25_CR16","first-page":"66","volume":"65","author":"H Mintzberg","year":"1987","unstructured":"Mintzberg H (1987) Crafting strategy. Harvard bus rev 65:66\u201375","journal-title":"Harvard bus rev"},{"key":"25_CR17","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-349-11336-1","volume-title":"The competitive advantage of nations","author":"ME Porter","year":"1990","unstructured":"Porter ME (1990) The competitive advantage of nations. The Free Press, New York"},{"key":"25_CR18","unstructured":"Silverman B (2001) Sun microsystems, Inc.: Solaris strategy. HBS case 9-701\u2013058"},{"key":"25_CR19","doi-asserted-by":"crossref","first-page":"509","DOI":"10.1002\/(SICI)1097-0266(199708)18:7<509::AID-SMJ882>3.0.CO;2-Z","volume":"18","author":"DJ Teece","year":"1997","unstructured":"Teece DJ, Pisano G, Shuen A (1997) Dynamic capabilities and strategic management. Strate Manage J 18:509\u2013533","journal-title":"Strate Manage J"}],"container-title":["Computational Management Science"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10287-006-0025-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10287-006-0025-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10287-006-0025-9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,8]],"date-time":"2023-05-08T05:40:39Z","timestamp":1683524439000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10287-006-0025-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,7,25]]},"references-count":19,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2007,8,15]]}},"alternative-id":["25"],"URL":"https:\/\/doi.org\/10.1007\/s10287-006-0025-9","relation":{},"ISSN":["1619-697X","1619-6988"],"issn-type":[{"value":"1619-697X","type":"print"},{"value":"1619-6988","type":"electronic"}],"subject":[],"published":{"date-parts":[[2006,7,25]]}}}