Abstract
The emergence and rapid development of large-sized retail outlets creates opportunities for dominant retailers to align with the businesses in the supply chain, in which they have previously never been involved. When facing a vulnerable incumbent retailer and a dominant entrant retailer, which one should the supplier choose to align with? To address this problem, we model a supply chain composed of a dominant entrant retailer, a weak incumbent counterpart, and a common supplier from which both retailers source products. The retailers compete on quantity, and the dominant retailer is entitled to determine the wholesale price at which she purchases, while the weak retailer accepts the price offered by the supplier. Furthermore, the incumbent retailer is assumed to hold private information about market demand. We investigate the information strategy for the supplier of either aligning with the dominant entrant retailer, i.e., leaking the incumbent’s demand information to the entrant, or with the vulnerable incumbent retailer, i.e., concealing that information from the entrant. Our result reveals that all participants’ preferences depend on subtle considerations of multiple factors such as the state of terminal market demand, demand volatility, expected market demand and the dominant retailer’s wholesale price. We were surprised to find that the supplier would rather align with the vulnerable incumbent when fluctuations in terminal market demand are severe. In other words, the supplier does not always benefit from information leakage. Moreover, the incumbent and entrant do not always prefer a simplex information strategy. In addition, the supplier’s alignment strategies could realize the desirable opportunity of “win–win” outcomes with the incumbent or entrant in certain circumstances.
Similar content being viewed by others
References
Anand KS, Goyal M (2009) Strategic information management under leakage in a supply chain. Manag Sci 55(3):438–452
Bai X, Liu Y (2016) Robust optimization of supply chain network design in fuzzy decision system. J Intell Manuf 27(6):1131–1149
Bardhan IR, Krishnan VV, Lin S (2007) Project performance and the enabling role of information technology: an exploratory study on the role of alignment. Manuf Serv Oper Manag 9(4):579–595
Cao Q, Dowlatshahi S (2005) The impact of alignment between virtual enterprise and information technology on business performance in an agile manufacturing environment. J Oper Manag 23(5):531–550
Carney B (2004) Not everyone buys Tescos strategy. Bus. Week Online (Dec 6)
Chen XX, Wang Y, Sun HL, Chen ZY, Wang YL (2016) Decisions for a three-echelon supply chain with logistics outsourcing under a dominant retailer. J Syst Eng 31(2):254–267
Christman E (2003) Indie retailers sue best buy. Billboard (Au 23) 5–7
Fang F, Gurnani H, Natarajan HP (2017) Leadership, dominance, and preeminence in a channel structure with a common retailer. Decis Sci. https://doi.org/10.1111/deci.12266
Foust D (2004) Home depots remodeling project. Bus Week Online (Jan 9)
Gao J, Yang X, Liu D (2017) Uncertain shapley value of coalitional game with application to supply chain alliance. Appl Soft Comput 56:551–556
Geylani T, Dukes AJ, Srinivasan K (2007) Strategic manufacturer response to a dominant retailer. Mark Sci 26(2):164–178
Gunasekaran A, Subramanian N, Papadopoulos T (2017) Information technology for competitive advantage within logistics and supply chains: a review. Transp Res Part E: Log Transp Rev 99:14–33
Hays CL (2004) What Wal-Mart knows about customers’ habits. The New York Times, 14
He YL, Wang XZ, Huang JZ (2016) Fuzzy nonlinear regression analysis using a random weight network. Inf Sci 364:222–240
He YL, Wei CH, Long H, Ashfaq RAR, Huang JZ (2017) Random weight network-based fuzzy nonlinear regression for trapezoidal fuzzy number data. Appl Soft Comput. https://doi.org/10.1016/j.asoc.2017.08.006
Hua Z, Li S (2008) Impacts of demand uncertainty on retailer’s dominance and manufacturer-retailer supply chain cooperation. Omega 36(5):697–714
Jain A, Seshadri S, Sohoni M (2011) Differential pricing for information sharing under competition. Prod Oper Manag 20(2):235–252
Jain A, Sohoni M (2015) Should firms conceal information when dealing with common suppliers? Naval Res Logist 62(1):1–15
Kolay S, Shaffer G (2013) Contract design with a dominant retailer and a competitive fringe. Manag Sci 59(9):2111–2116
Kong G, Rajagopalan S, Zhang H (2013) Revenue sharing and information leakage in a supply chain. Manag Sci 59(3):556–572
Kong G, Rajagopalan S, Zhang H (2017) Information leakage in supply chains. Handbook of information exchange in supply chain management. Springer, Berlin, pp 313–341
Lan Y, Peng J, Wang F, Gao C (2017) Quality disclosure with information value under competition. Int J Mach Learn Cybern, pp 1–15
Lan Y, Zhao R, Tang W (2015) An inspection-based price rebate and effort contract model with incomplete information. Comput Ind Eng 83:264–272
Lee HL (2004) The triple: a supply chain. Harv Bus Rev 82(10):102–113
Raju J, Zhang ZJ (2005) Channel coordination in the presence of a dominant retailer. Mark Sci 24(2):254–262
Singer T (1999) Sharer beware: are you giving away too much information about your business. Inc. April 1, pp 38–48
Stone KE (1995) Competing with the retail giants. Wiley, NY
Useem J (2003) One nation under Wal–Mart. Fortune (March 3) 65–78
Wang K, Zhao R, Peng J (2017) Trade credit contracting under asymmetric credit default risk: screening, checking or insurance. Eur J Oper Res 266(2):554–568
Wang Y, Chen Y, Liu Y (2016) Modeling portfolio optimization problem by probability-credibility equilibrium risk criterion. Math Probl Eng (2016)
Weinstein S (2000) The price is righter. Progress Groc 79(5):89–94
Yang FM, Wang AY, Wu J, Tang L (2017) Evolutionary dynamics of E-commerce platform’s credit information sharing strategy. J Syst Eng 32(5):596–603
Yang G, Liu Y (2017) Optimizing an equilibrium supply chain network design problem by an improved hybrid biogeography based optimization algorithm. Appl Soft Comput 58:657–668
Yang K, Zhao R, Lan Y (2016) Impacts of uncertain project duration and asymmetric risk sensitivity information in project management. Int Trans Oper Res 23(4):749–774
Zhang DY, Cao X, Wang L, Zeng Y (2012) Mitigating the risk of information leakage in a two-level supply chain through optimal supplier selection. J Intell Manuf 23(4):1351–1364
Zhang C, Li S (2006) Secure information sharing in internet-based supply chain management systems. J Comput Inf Syst 46(4):18–24
Zhang ZC, Luo XG (2017) Analysis of a dual-channel supply chain with advertising effect and information sharing. J Syst Eng 32(4):499–512
Acknowledgements
This work was supported by the National Natural Science Foundation of China under Grant No. 71771164.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
All authors have no conflict of interest.
Human and animal rights
This article does not contain any studies with human participants or animals performed by any of the authors.
Additional information
Communicated by V. Loia.
Appendix: Proofs
Appendix: Proofs
Proof of Proposition 1
From model (1), when the supplier leaks the incumbent’s actual market demand information to the entrant, the two retailers play the Cournot competition with complete information. As the research processes of the high and low market demand states are similar, we consider only one of them. When the market demand state is high, the high-type incumbent solves
and the high-type entrant solves
Above two Eqs. (9) and (10) are simultaneously solved, we have
and
And then, the high-type supplier solves for
Taking Eq. (11) of wholesale price that the supplier sets for the incumbent back to Eqs. (9) and (10), we have the incumbent’s order quantity
and the entrant’s order quantity
Therefore, all participants’ profits are realized under the information leakage scenario as follows
Proof of Corollary 1
We analyze the difference of the two retailers’ order quantities under the scenario of information leakage. When the market demand state is high, the difference value of their order quantities
Obviously, when \(w_{e}<\displaystyle \frac{a+\alpha }{2}\), we have \(q_{iH}^{*Y}<q_{eH}^{*Y}\). The incumbent’s order quantity dominates the entrant’s. Otherwise, when \(w_{e}\ge \displaystyle \frac{a+\alpha }{2}\), we have \(q_{iH}^{*Y}\ge q_{eH}^{*Y}\). The entrant’s order quantity dominates the incumbent’s.
Proof of Proposition 2
When the terminal market demand state is low, we have the according solution procedure and conclusions.
Proof of Corollary 2
We analyze the difference of the two retailers’ order quantities under the scenario of information leakage. When the market demand state is low, the difference value of their order quantities
Obviously, when \(w_{e}<\displaystyle \frac{a-\alpha }{2}\), we have \(q_{iH}^{*Y}<q_{eH}^{*Y}\). The incumbent’s order quantity dominates the entrant’s. Otherwise, when \(w_{e}\ge \displaystyle \frac{a-\alpha }{2}\), we have \(q_{iH}^{*Y}\ge q_{eH}^{*Y}\). The entrant’s order quantity dominates the incumbent’s.
Proof of Propositions 3 and 4
From model (5), when the supplier conceals the incumbent’s actual market demand information from the entrant, the two retailers play the Cournot competition with incomplete information. When the market demand state is high, the high-type incumbent solves
and the entrant solves
Above two Eqs. (16) and (17) are simultaneously solved, we have
and
And then, the high-type supplier solves for
Taking Eq. (18) of wholesale price that the supplier sets for the incumbent back to Eqs. (16) and (17), we have the expression of incumbent’s order quantity
and the expression of entrant’s order quantity
On the other hand, when the market demand state is low, the low-type incumbent solves
Under the situation of low-type market demand, the solving process of the entrant is same as Eq. (17). We solve two Eqs. (21) and (17) simultaneously, and have
and
And then, the low-type supplier solves for
Taking Eq. (22) of wholesale price that the supplier sets for the incumbent back to Eqs. (21) and (17), we have the expression of incumbent’s order quantity
and the expression of entrant’s order quantity
Equations (18), (19), (22), and (23) are jointly solved, and then we have the high-type supplier’s wholesale price set for the incumbent
The high-type incumbent orders
When the market demand state is low, the supplier offers the wholesale price
The low-type incumbent orders
Taking the incumbent’s low-type order quantity to Eq. (20), or taking the high-type order quantity to Eq. (24), we could both get the entrant’s order quantity no matter what state the actual market demand is.
In consideration of all decision variables’ obtained results, the supplier’s profits under the information concealment scenario are realized and listed as follows
and
respectively, in high-type and low-type market demands. In addition, the high-type incumbent’s profit is
The low-type incumbent’s profit is
The entrant’s profit is
regardless of the market demand state.
Proof of Corollary 3
We analyze the differences of all participants’ optimal decisions between the scenario of information concealment and the scenario of information leakage. When the market demand state is high, the difference value of the supplier’s wholesale price sets for the incumbent
After verification, the numerator and denominator of Eq. (25) are both positive. Therefore, we have \(w_{iH}^{*N}>w_{iH}^{*Y}\), which implies that the supplier offers the incumbent the wholesale price in the scenario of information concealment is higher than that in the scenario of information leakage.
Next, we compare the incumbent’s order quantity under the information concealment scenario with that under the information leakage scenario.
After verification, when \(\alpha \le \displaystyle \frac{(p+2)(a-6w_{e})}{3(p+6)}\), Eq. (26) is nonpositive. We have \(q_{iH}^{*N}\le q_{iH}^{*Y}\), which means that the incumbent’s order quantity in the scenario of information concealment is no more than that in the scenario of information leakage. Inversely, when \(\alpha >\displaystyle \frac{(p+2)(a-6w_{e})}{3(p+6)}\), Eq. (26) is positive. We have \(q_{iH}^{*N}>q_{iH}^{*Y}\), which implies that the incumbent’s order quantity in the scenario of information concealment exceeds that in the scenario of information leakage.
Besides, we investigate the entrant’s order quantity between two scenarios—information concealment and information leakage. The difference of the entrant’s order quantity
After verification, when \(\alpha \le \displaystyle \frac{5p(a-6w_{e})}{160+7p-4p^2}\), Eq. (27) is nonnegative. We have \(q_{e}^{*N}\ge q_{eH}^{*Y}\), which means that the entrant’s order quantity in the scenario of information concealment is more than that in the scenario of information leakage. Inversely, when \(\alpha >\displaystyle \frac{5p(a-6w_{e})}{160+7p-4p^2}\), Eq. (27) is negative. We have \(q_{e}^{*N}<q_{eH}^{*Y}\), which implies that the entrant’s order quantity in the scenario of information concealment is less than that in the scenario of information leakage.
In the following, we illustrate the differences of three participants’ optimal decisions similarly when the market demand state is low. The difference value of the supplier’s wholesale price sets for the incumbent
After verification, when \(\alpha \le \displaystyle \frac{(p+7)(a-6w_{e})}{79+13p-4p^2}\), Eq. (28) is nonnegative. We have \(w_{iL}^{*N}\le w_{iL}^{*Y}\), which means that the supplier offers the incumbent the wholesale price in the scenario of information concealment is more than that in the scenario of information leakage. Inversely, when \(\alpha >\displaystyle \frac{(p+7)(a-6w_{e})}{79+13p-4p^2}\), Eq. (28) is negative. We have \(w_{iL}^{*N}>w_{iL}^{*Y}\), which implies that the supplier offers the incumbent the wholesale price in the scenario of information concealment is less than that in the scenario of information leakage.
Next, we compare the incumbent’s order quantity under the information concealment scenario with that under the information leakage scenario.
After verification, the numerator and denominator of Eq. (29) are both negative. Therefore, we have \(q_{iL}^{*N}<q_{iL}^{*Y}\), which means that the incumbent’s order quantity in the scenario of information concealment is lower than that in the scenario of information leakage.
Besides, we investigate the entrant’s order quantity between two scenarios—information concealment and information leakage. The difference of the entrant’s order quantity
After verification, the numerator and denominator of Eq. (30) are both positive. Therefore, we have \(q_{e}^{*N}>q_{eL}^{*Y}\), which implies that the entrant’s order quantity in the scenario of information concealment is higher than that in the scenario of information leakage.
Proof of Proposition 5
We analyze the supplier’s strategies based on the differences of his profits between the scenario of information concealment and the scenario of information leakage. When the market demand state is high, the difference value of the supplier’s profit
After verification, when
Equation (31) is negative. We have \(\pi _{sH}^{N}<\pi _{sH}^{Y}\), which means that the supplier’s profit in the scenario of information concealment is less than that in the scenario of information leakage, leading the supplier prefers to leak the incumbent’s actual market demand information to the entrant. Inversely, when
Equation (31) is nonnegative. We have \(\pi _{sH}^{N}\ge \pi _{sH}^{Y}\), which implies that the supplier’s profit in the scenario of information concealment surpasses that in the scenario of information leakage, making the supplier prefers to keep absolutely the incumbent’s actual market demand information secret from the entrant.
On the other hand, we compare the supplier’s profits under two information strategies when the market demand state is low. The difference value of the supplier’s profit
After verification, when
Eq. (32) is negative. We have \(\pi _{sL}^{N}<\pi _{sL}^{Y}\), which means that the supplier’s profit in the scenario of information concealment is less than that in the scenario of information leakage, leading the supplier prefers to leak the incumbent’s actual market demand information to the entrant. Inversely, when
Equation (32) is nonnegative. We have \(\pi _{sL}^{N}\ge \pi _{sL}^{Y}\), which implies that the supplier’s profit in the scenario of information concealment surpasses that in the scenario of information leakage, making the supplier prefers to keep absolutely the incumbent’s actual market demand information secret from the entrant.
Proof of Proposition 6
We observe that the expressions of two retailers’ profits are the square of that of their corresponding order quantities no matter what state the actual market demand is. Therefore, the comparisons of the retailers’ profits are same as the conditions of (i) parts (b) and (c), and (ii) parts (b) and (c) in Corollary 3. The detailed proof is omitted here.
Rights and permissions
About this article
Cite this article
Wang, Y., Tang, W. & Zhao, R. Supplier’s strategy: align with the dominant entrant retailer or the vulnerable incumbent retailer?. Soft Comput 23, 3481–3500 (2019). https://doi.org/10.1007/s00500-018-3008-1
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00500-018-3008-1