enemies at the gate? new entry threats and...

58
Enemies at the Gate? New Entry Threats and Innovation in the U.S. IT Industry Yang Pan, Peng Huang, Anandasivam Gopal Robert H. Smith School of Business University of Maryland, College Park, MD 20742 Abstract We examine how firms in the IT industry adjust their innovation strategy as a response to the potential entry threats they face in their product markets. While turbulence in the product markets caused by startups affects an incumbent firm’s investment decisions, prior research has provided contrasting theoretical predictions on the relationship between new entry threats and innovation strategy. In addition, the absence of acceptable industry classifications for startups, as well as the inability to accurately gauge when they represent a credible threat has limited empirical research into this question. In this paper, we first contribute a new measure of identifying these threats through text analyses based on product descriptions provided by incumbent firm 10-K filings and business descriptions provided by start-ups. This new measure differs significantly from approaches that use static industry classifications, which are backward-looking and do not fully account for industry evolution over time. We show the text-based measure captures entry threats from the startup space through a series of validation tests. Second, using a sample of U.S. IT firms over the period 1997-2013, we show that incumbent firms react to new entry threats by systematically reducing innovation investments. We show these effects to be robust to a series of regression specifications addressing the endogeneity of new entry threats. Interestingly, we also find that in the face of intensive new entry threats, firms with diversified product portfolios are less aggressive in terms of reducing their innovation spending, compared to specialized firms. We discuss the research and practice implications of the new text-based measure for new entry threats as well as the responses to these threats by incumbents in the paper. Keywords: Innovation, R&D, new entry threats, disruptive technology, text mining

Upload: others

Post on 18-Jun-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Enemies at the Gate? New Entry Threats and …misrc.umn.edu/workshops/2016/spring/Huang_Enemies.pdfEnemies at the Gate? New Entry Threats and Innovation in the U.S. IT Industry Yang

Enemies at the Gate? New Entry Threats and Innovation

in the U.S. IT Industry

Yang Pan, Peng Huang, Anandasivam Gopal

Robert H. Smith School of Business

University of Maryland, College Park, MD 20742

Abstract

We examine how firms in the IT industry adjust their innovation strategy as a response to the potential

entry threats they face in their product markets. While turbulence in the product markets caused by

startups affects an incumbent firm’s investment decisions, prior research has provided contrasting

theoretical predictions on the relationship between new entry threats and innovation strategy. In addition,

the absence of acceptable industry classifications for startups, as well as the inability to accurately gauge

when they represent a credible threat has limited empirical research into this question. In this paper, we

first contribute a new measure of identifying these threats through text analyses based on product

descriptions provided by incumbent firm 10-K filings and business descriptions provided by start-ups.

This new measure differs significantly from approaches that use static industry classifications, which are

backward-looking and do not fully account for industry evolution over time. We show the text-based

measure captures entry threats from the startup space through a series of validation tests. Second, using a

sample of U.S. IT firms over the period 1997-2013, we show that incumbent firms react to new entry

threats by systematically reducing innovation investments. We show these effects to be robust to a series

of regression specifications addressing the endogeneity of new entry threats. Interestingly, we also find

that in the face of intensive new entry threats, firms with diversified product portfolios are less aggressive

in terms of reducing their innovation spending, compared to specialized firms. We discuss the research

and practice implications of the new text-based measure for new entry threats as well as the responses to

these threats by incumbents in the paper.

Keywords: Innovation, R&D, new entry threats, disruptive technology, text mining

Page 2: Enemies at the Gate? New Entry Threats and …misrc.umn.edu/workshops/2016/spring/Huang_Enemies.pdfEnemies at the Gate? New Entry Threats and Innovation in the U.S. IT Industry Yang

1

1. Introduction

It is accepted wisdom that the Information Technology (IT) industry plays a central and critical role in

driving economic growth over the last two decades, especially in the United States (Jorgenson and Stiroh

1999; Jorgenson et al. 2000). This contribution to economic growth is partly a product of the constant

technological changes and fast clockspeed (Fine 1998) that is a significant characteristic of the IT

industry in general. The rate of change in the industry’s external environment, including the development

of new technologies, shifts in consumer preferences, and fast-moving market dynamics far exceeds those

seen in other industries (Brynjolfsson and McAfee 2011; Mendelson and Pillai 1999). The result is a

compression of product life-cycles (Mendelson and Pillai 1998), volatility in market structure and a

hyper-competitive context where advantages, if any, tend to be short-lived (Wiggins and Ruefli 2005). In

such contexts, the ability to develop new product and process innovations remains a key driver of a firm’s

competitive advantages (Kleis et al. 2012).

A significant part of this fast-moving dynamic is fed by the high rate of new entry in the form of

entrepreneurial ventures; technology startups are constantly introducing new products and business

models to the market (Giarratana 2004). Indeed, over 70% of all venture-capital funded startups tend to be

associated with the IT industry (Gompers and Lerner 2001), thus contributing significantly to the threat of

new entry experienced by incumbent firms. The presence of intense entrepreneurial activity in the product

market of an incumbent can cause turbulence in the market – entrepreneurs incorporating new and

innovative technologies, backed by influential venture capitalists and their deep networks, can affect the

future market potential of incumbents very quickly in the IT context. Incumbents may respond to this

constant threat of new entry in many different ways, but since innovation remains an important source of

competitive advantage in technology markets, we ask: In the presence of such threats of new entry, how

do incumbents respond in terms of their investments in innovation? This forms the central research

question we address.

Extant literature suggests two mechanisms at play in how incumbents may respond to new entry

threats. On the one hand, firms may increase their investments in their innovative activities, in the hope of

Page 3: Enemies at the Gate? New Entry Threats and …misrc.umn.edu/workshops/2016/spring/Huang_Enemies.pdfEnemies at the Gate? New Entry Threats and Innovation in the U.S. IT Industry Yang

2

building technological and process capabilities to successfully compete in the future as the perceived

nascent threats materialize (Lukach et al. 2007; Reinganum 1983). Consider, for example, the situation

facing Intel upon the anticipated entry of ARM processors into the mobile computing markets. Intel

initially underestimated the mobile processor markets and the strengths of ARM processors - RISC

(Reduced Instruction Set Computing) based processors that reduce costs, heat and power use, making

them perfect for light, portable, battery-powered devices, leading them to be licensed by firms such as

Apple, Marvell, Broadcom, and Samsung. However, rather than eschew the threats to their market that

ARM represented, Intel chose to invest heavily in innovation, developing its own low-power x86-

compatible Atom processors.1 Thus a strategic response to the threat of new entry on the part of the

incumbent may be to increase investments in innovation-related activities, so as to compete head on with

the new entry, if and when it does materialize.

On the other hand, an arguably logical choice would be to eschew risky investments in innovation

that, at the best of times, have uncertain payoff and instead choose to either conserve their cash (Hoberg

et al. 2014; Klepper and Simons 1997) or invest in complementary capabilities that are vital in the

commercialization of new innovation such as in manufacturing, distribution, or marketing (Teece 1986),

as a way to differentiate themselves should the anticipated threats materialize (O’Connor and Rafferty

2012). In addition, an incumbent may choose to delay its investment in the new innovation until the

technological and market uncertainties settle, and then cherry-pick the winners that emerge from the new

entries – either through strategic alliances or acquisitions. Consider, for instance, Instagram, a mobile

photo-sharing app developer. As Instagram steadily increased in popularity within the social media

ecosystem and positioned itself as a social network in its own right, it was perceived as a potential threat

by Facebook. Rather than wait for the competition to fully materialize, Facebook acquired the company

for approximately $1 Billion in cash, while also abandoning its own efforts towards developing a

standalone mobile photo-sharing app.2 Effectively, Facebook chose to not invest further in its own

1 http://appleinsider.com/articles/15/01/19/how-intel-lost-the-mobile-chip-business-to-apples-ax-arm-application-processors

2 http://techcrunch.com/2012/04/09/facebook-to-acquire-instagram-for-1-billion/

Page 4: Enemies at the Gate? New Entry Threats and …misrc.umn.edu/workshops/2016/spring/Huang_Enemies.pdfEnemies at the Gate? New Entry Threats and Innovation in the U.S. IT Industry Yang

3

innovation activities, but to conserve cash and deploy this in the form of an acquisition to deal with the

threat of new entry. These alternative predictions reflect an important tension in the literature regarding

the specific manner in which firms respond to new entry threats that remains empirically unresolved. In

this paper, we present empirical evidence that helps resolve this tension specifically in the IT industry,

thereby generalizing beyond individual cases such as those described above.

Studying new entry threats empirically poses several challenges. By definition, threats from

entrepreneurial startups represent forward-looking estimations of the extent to which the potential entry of

new competition may influence cash flows or product market performance; therefore, these threats have

not manifested as yet but may materialize at some point in the future, compared to traditional measures of

observed entry, which are contemporaneous. Thus, extant empirical work studying new entry threat have

typically focused on de alio entry (diversifying entry) instead of de novo entry (entry by startups), and

extrapolated from these measures of present market competition to evaluate potential new entry threats

(Aghion et al. 2009; Becker-Blease 2011). In addition, these measures typically define competition or

industry concentration based on static SIC or NAICS codes (Aghion and Howitt 1992; Becker-Blease

2011), and suffer from multiple shortcomings: a firm is rarely reclassified even when it diversifies or

transitions into a different industry; and they lack temporal variations both within and across industries.

Furthermore, for start-ups, there are no ready-to-use and accepted industry classifications, causing

difficulties in identifying any potential threats from de novo entries. Since new entry threat is often a

central construct in theoretical analyses of competitive dynamics (Spence 1977), the absence of an

established measure represents a significant gap in the literature.

Given this lack of an existing measure of the threat of new entry from start-ups, one of the

objectives of our work in this paper is to develop and validate such a measure. While we formally define

the new entry threat measurement later in the paper, intuitively we measure the extent to which an

incumbent firm’s description of its product markets in its 10-K filings overlaps with the descriptions of

new entrepreneurial firms that receive first-stage funding from VCs during the same period. In order to

understand where de novo entry might occur for an incumbent, we focus on extracting business

Page 5: Enemies at the Gate? New Entry Threats and …misrc.umn.edu/workshops/2016/spring/Huang_Enemies.pdfEnemies at the Gate? New Entry Threats and Innovation in the U.S. IT Industry Yang

4

descriptions of startups receiving first round VC funding from VentureXpert in that year. The focus on

very early-stage startups is particularly appropriate here since these firms collectively represent

movement in the incumbent firm’s product market towards possible future competition. In addition, the

fact that they were funded by VCs makes these threats particularly relevant because they tend to be highly

innovative and have a higher likelihood of becoming real threats to incumbents in the near future.

Since we are interested in evaluating the effect of these threats on the incumbent firm’s

innovation strategy, we build on prior research in IS and innovation (Kleis et al. 2012; Tambe et al. 2012)

by focusing on R&D spending by the incumbent. R&D expenditures are empirically attractive because

R&D efforts can be undertaken relatively quickly by the firm and can be more easily linked to specific

external events. In our study, more specifically, we use R&D intensity, defined as R&D expenditure

standardized by total asset in the same year, as a measure of the extent to which the firm responds to new

entry threats through investments in innovation. We estimate our models using panel data methods on

firms in the IT industries over the period of 1997 - 2013; these years are selected based on joint data

availability on R&D spending, new entry threats and firm-level data on industry classifications. Our

results show that greater new entry threats are associated with a reduction in R&D investments, all else

being equal. While R&D spending represents one form of innovation spending, we also test our theories

on an alternative measure of innovation that has been used extensively – patent counts and citations (Hall

et al. 2001). While patent data pose several challenges in terms of data quality and availability, our results

from patent counts are fully consistent. Finally, we also examine the extent to which these relationships

hold in the case of diversified incumbent firms – our results show that new entry threat has a larger effect

on specialized firms, suggesting that incumbents operating in specialized markets are more sensitive to

new entry threat and adjust their investments in innovation more swiftly.

Our work provides several contributions to the IS literature on innovation. The rapid rate of

technological change observed in the IT industries and the associated volatility in product markets

(Brynjolfsson and McAfee 2011) has brought into sharp focus the role of the firm’s response to such

threats. In addition, a societal focus on innovation-related IT entrepreneurship and the development of

Page 6: Enemies at the Gate? New Entry Threats and …misrc.umn.edu/workshops/2016/spring/Huang_Enemies.pdfEnemies at the Gate? New Entry Threats and Innovation in the U.S. IT Industry Yang

5

entrepreneurial ecosystems (in the forms of incubators and accelerators) have radically improved the

abilities of these new ventures to threaten incumbent firms. In these contexts, it is important to understand

how new entry threat may be accurately measured, and to understand how incumbents respond to these

threats. Our work here directly contributes to these gaps in the literature. The implications of our work

extent beyond understanding the impact of new entry threats to innovative investments, to also evaluating

how these responses may vary depending on whether the firm is diversified, and the effects on patenting

strategies adopted by incumbents. We thus contribute to the broader literature on IT and innovation in a

significant manner.

Beyond the theoretical implications, we also contribute by devising and validating a new way of

measuring new entry threat from entrepreneurial ventures using text analysis. We build on existing work

in other disciplines such as finance and marketing that has used text to construct measurement schemes

(Hoberg and Phillips 2010; Tetlock et al. 2008) by creating text similarity scores between incumbent

firms and broad movements in the VC-backed entrepreneurial space. These similarity scores are more

suitable for capturing emerging threats from the collective entrepreneurial space, rather than focusing on

single entrepreneurs that are easy to ignore or discount, thereby representing considerable value within

the fast-moving IT context. We believe that many more empirical questions in the literature relating to

new entry threats can be addressed through the usage of the measures we provide.

2. Theoretical Background

2.1 New Entry Threats

All firms face lateral competition and new entry threats in their native markets. However, these are

particularly pronounced and influential in the high-tech sector, specifically in the IT industry, (Fontana

and Nesta 2009), where firm survival is often in question as a result of these competitive dynamics.

Collectively, these are referred to as product market threats, defined as incipient instability and

uncertainty in a firm’s product market, which can threaten the sustainability of the firm’s future earnings

as well as viability of its product portfolio (Hoberg et al. 2014).

Page 7: Enemies at the Gate? New Entry Threats and …misrc.umn.edu/workshops/2016/spring/Huang_Enemies.pdfEnemies at the Gate? New Entry Threats and Innovation in the U.S. IT Industry Yang

6

Within the domain of product market threats, we distinguish new entry threats specifically from

competition from other existing competitors on two key dimensions. First, competition is

contemporaneous and is usually measured by market outcomes, such as market share/concentration

(Blundell et al. 1999) or Lerner Index (Aghion 2003), while new entry threats are forward-looking since

they imperil the “stability and sustainability of future earnings” (Brav et al. 2005). Second, while

competition describes equilibrium market outcomes, new entry threat is inherently about disequilibrium,

often associated with changes in competitive dynamics (Cockburn and MacGarvie 2011). The ability to

threaten future earnings, especially in the IT sector, is closely linked to technological changes and product

innovation (Coad and Rao 2008), thereby making prior work in industry lifecycles of particular relevance

(Abernathy and Utterback 1978). Industry lifecycles describe the processes that unfold in technologically

progressive industries as they evolve from birth to maturity (Klepper 1996). In general, when new

industries form, there is considerable new entry into the field, firms offer many varieties of similar

products, prices are typically high and there is considerable product innovation that occurs within the

nascent industry (Jovanovic and MacDonald 1994; Klepper 1996). Over time, despite steady market

growth, new entry into the field ceases, prices drop and there is a shakeout in the number of firms. At this

stage, a dominant design emerges in the industry (Jovanovic and MacDonald 1994) and incumbent firms

shift to process innovations that improve upon the dominant design, leading again to increased

competition in the industry. Thus, industry lifecycles are characterized by successive waves of product

and process innovations that introduce high volatility within the technology industry.

These dynamics are particularly salient in the tech sector for three reasons. First, prior work in

technology-based industries has indicated that in fast-moving contexts, there is likely little separation

between periods of product and process innovation (Klepper and Simons 1993). Effectively, product and

process innovations emerge concurrently from different players in the industry, thereby generating

considerable product market threats from new venture firms (Abernathy and Utterback 1978). Second, the

IT industry incorporates significant levels of heterogeneity in terms of firm capabilities, learning and the

ability to capitalize on innovation activities (Agarwal and Gort 2002; Reinganum 1983). Therefore, given

Page 8: Enemies at the Gate? New Entry Threats and …misrc.umn.edu/workshops/2016/spring/Huang_Enemies.pdfEnemies at the Gate? New Entry Threats and Innovation in the U.S. IT Industry Yang

7

this heterogeneity, it is more likely that incumbents are bombarded with concurrent and successive waves

of uncertainty from ongoing process and product innovation at any point in time, as has been documented

clearly in the IT industry (Rai and Tang 2013). Finally, evidence indicates that the pace at which industry

lifecycles emerge and stabilize, even briefly, in the last two decades has increased in the IT industry

(Carrillo 2005; Fine 1998; Mendelson and Pillai 1998). As “clockspeed” quickens, there is thus

systematically greater threat of new entry for incumbents.

How may incumbents respond to an increased perception of new entry threats into their product

markets? A review of the empirical literature studying firm responses to new entry within their markets

provides some clear indications. One clear strategic response that incumbents adopt to fight new entry is

through pricing (Geroski 1995). Pricing allows incumbents to deter entry or retaliate after entry has

occurred. Theoretical analyses of new entry suggest several approaches to strategic pricing that

incumbents may adopt. One such strategy is limit pricing, whereby the incumbent sets prices low enough

so as to make new entry into the product market unprofitable (Bain 1956; Goolsbee and Syverson 2008).

Alternatively, predatory pricing may also be adopted, whereby the incumbent cuts prices after entry in

order to drive out the new entrants and develop a tough reputation that helps deter further entry (Milgrom

and Roberts 1982). Recent empirical work examining incumbents’ pricing responses have, however,

provided mixed results associated with these strategies (Simon 2005), suggesting that the successful use

of these pricing strategies depend on the extent to which the incumbent is able to respond aggressively

(Yamawaki 2002) and its incentives to respond (Simon 2005).

In differentiated product markets, firms are likely to use other responses to new entry since

demand tends to be inelastic to price. These include incumbent investments in advertising, increased

diversification, expanding product lines, retrenchment in order to conserve cash, or ceding the market to

the new entrant. Each of these options appears attractive depending on the specific context and the

technological sophistication of the new entrant. Thomas (1999) shows that in the ready-to-eat breakfast

cereal industry, incumbents tend to respond to the threat of new entry through increasing advertising, as a

way to limit or deter further new entry. Large sunk investments in advertising raise the fixed costs of

Page 9: Enemies at the Gate? New Entry Threats and …misrc.umn.edu/workshops/2016/spring/Huang_Enemies.pdfEnemies at the Gate? New Entry Threats and Innovation in the U.S. IT Industry Yang

8

operating in an industry for new entrant, and allow firms to credibly expand output (Sutton 1991).

Similarly, Koski and Majumdar (2002) find that in the telecommunications industry, incumbent local

exchange carriers significantly raise advertising expenditures when faced with the threat of entry.

Alternatively, expanding into new areas or introducing a battery of new products that crowd the product

attribute space leaves little profitable room for new entrants to enter (Schmalensee 1978; Shankar 1999).

However, as discussed by Judd (1985), such a strategy may not always be viable for the incumbent; in the

case of multiproduct incumbents, it may be preferable to withdraw from specific product markets in order

to avoid intense post-entry competition. Finally, Hoberg et al. (2014) show that in the presence of product

market threats from other incumbents, firms are more likely to conserve cash and make fewer payouts in

the forms of dividends or repurchases. They argue that this indicates firms respond to impending entry if

and when it occurs by conserving critical resources.

In lieu of an exhaustive review of the literature on how incumbents respond to new entry, we

have condensed a representative set of empirical studies examining this issue in Table 1, listing out the

empirical context, the mode of entry being discussed, and the strategic responses taken by incumbents.

There are two central insights that emerge from this table that are particularly relevant to the IT industry,

and to our work in this paper. First, very few prior studies have investigated the threat of de novo entry –

entry by startup firms. The vast majority of the literature has focused on de alio entry – lateral,

diversifying entry by other existing competitors. In some cases, there are no distinctions drawn between

these two forms of new entry (Carroll et al. 1996; Khessina and Carroll 2008). In the IT industry de novo

entry is widespread, common, and are often the source of disruptive technologies that present significant

threats to existing firms. Indeed, prior work establishes that a majority of product innovations (i.e. new

designs and technologies, rather than process innovations) emerge from the entrepreneurial space

(Agarwal and Gort 2002; Prusa and Schmitz Jr 1991; Prusa and Schmitz Jr 1994), making the study of de

novo entry particularly apposite for the IT industry. Second, with the exception of analytical models

(Lukach et al. 2007) and the recent work by Aghion et al. (Aghion et al. 2009), most prior research has

examined incumbent responses in terms of pricing/capacity, product market expansion/diversification,

Page 10: Enemies at the Gate? New Entry Threats and …misrc.umn.edu/workshops/2016/spring/Huang_Enemies.pdfEnemies at the Gate? New Entry Threats and Innovation in the U.S. IT Industry Yang

9

and advertising, while largely ignoring the extent to which the incumbents can respond through

innovation. If innovation remains a primary driver of competitive advantage in the IT industry, it is

noteworthy that the literature is largely silent on the role of innovation as a strategic variable in response

to new entry within the IT industry. In this study, we aim to bridge this specific gap in the literature. In

the next section, we discuss the potential theoretical mechanisms that may link the incumbent’s response

to new entry threats through innovation, before delving into empirical operationalizations.

[Insert Table 1 about here]

2.2 New Entry Threat and the Incumbent’s Investment in Innovation

How may an incumbent firm respond to new entry threats in its product markets through innovation

spending? Prior research offers four specific theoretical perspectives that inform the relationship between

new entry threat and the incumbents’ response through innovation investments. The first mechanism is

based on a strategy of pre-emption, specifically along the dimension of innovation itself. In contexts

where demand is increasing and innovation is critical to retain advantage, the incumbent may pre-empt

potential new entry by building capacity (i.e. innovative products or solutions) well before it is needed,

essentially pre-empting innovation investments that any entrant may choose to make (Eaton and Lipsey

1979). Pre-emptive market expansion into new product lines or market segments by the incumbent creates

out a crowding out effect of the market spectrum, thereby eliminating viable niches for entrants while also

signaling that the market available to future new entry is likely to be less profitable (Schmalensee 1978).

To the extent that new product introduction requires heavy investments in product innovation in the IT

industry, this mechanism would postulate a positive relationship between the perception of new entry

threats for the incumbent and its investments in innovation, either through increased R&D spending or

higher patenting rates.

Providing a counter-argument to those presented above, a series of papers suggest that major

innovations may not be most efficiently carried out by large incumbent corporations due to a series of

communication and incentive problems (Chandy and Tellis 2000; Hamberg 1963; Mueller and Tilton

Page 11: Enemies at the Gate? New Entry Threats and …misrc.umn.edu/workshops/2016/spring/Huang_Enemies.pdfEnemies at the Gate? New Entry Threats and Innovation in the U.S. IT Industry Yang

10

1969). These scholars argue, for instance, that incumbents generally prefer R&D projects that promise

short-term payoffs rather than long-term, risky projects that may be potentially groundbreaking.

Incumbents also have a vested interest in existing technologies, and are reluctant in pursuing major

innovations that would replace the currently profitable products. Finally, large firms have difficulty

building organizational norms that reward and nurture highly creative engineers and innovators, thereby

facing serious issues of incentive alignment. Thus, it is not surprising that Henderson (Henderson 1993)

finds that the research efforts of incumbents to exploit radical innovation are significantly less productive

than those of new entrants. Thus, a perspective rooted in the presence of considerable heterogeneity in the

abilities of incumbents to respond in a nimble manner to new entry threat would predict a negative

relationship between new entry threat and innovative spending. Incumbents facing potential new entrants

are likely to seek alternative means to compete, leading to underinvestment in innovation.

A third perspective argues that strategic considerations may deter incumbents from investing

heavily in new innovation when they face high rate of entry, especially in the early stages when the

potential of new innovation is uncertain. Teece (Teece 1986) argues that when new innovations are easily

imitated, the appropriation of the innovation depends heavily on the ownership of certain complementary

assets, and the profits may not accrue to the developers of the intellectual property. Furthermore, the

active development of products based on new innovative output typically faces high levels of technical

and demand uncertainty. Since incumbents, faced with the risk of losing the outcomes of new investments

as well as reputational loss from prior investments, tend to be risk-averse, they are likely to delay entry

into new market niches based on new innovation (Mitchell 1989). Building on these ideas, Mitchell and

Singh (Mitchell and Singh 1992) find that when incumbents enter a new product area, they often take a

more cautious approach that limits their investment exposure, choosing instead to expand their knowledge

base through strategic alliances. This cautious approach suggests that incumbents are not likely to

significantly increase their innovation spending when faced with new entry. Indeed, they might even

reduce their innovation spending, choosing instead to invest in complementary assets or pre-entry

alliances (Mitchell 1989).

Page 12: Enemies at the Gate? New Entry Threats and …misrc.umn.edu/workshops/2016/spring/Huang_Enemies.pdfEnemies at the Gate? New Entry Threats and Innovation in the U.S. IT Industry Yang

11

Finally, Hauser and Shugan’s (1983) “defender” model provides a useful analytical framework

that helps shed light on an incumbent’s response to competitive entry. The authors show that under a wide

range of conditions, the optimal, profit-maximizing response to new entry may indeed be to respond

negatively through, for instance, cutting back resource commitments or raising prices (Gatignon et al.

1989; Kuester et al. 1999). The underlying argument in this model is that entry generally decreases every

other competitors’ profits and makes the overall market less attractive. In addition, the enhanced

competitive pressure brought about by new entrants in the marketplace has important implications for

managerial incentives (Schmidt 1997). Specifically, if new entry forces the incumbent to reduce slack,

enhance efficiency, and focus on margins, it also helps to discipline managers by aligning their incentives

with the firm, rather than pursuing their own goals (Hart 1983). Thus, reductions in organizational slack

likely forces managers to focus on firm profitability and thereby invest less in risky activities such as

innovation that may not have immediate payoff, leading to a negative relationship between new entry

threats and innovation spending by incumbent firms.

[Insert Table 2 about here]

We present a summary of these arguments, and the theoretical perspectives within, in Table 2. As

evident, there are contrasting predictions for how incumbents in the IT industry may respond to new entry

threats in their product markets. Given these countervailing predictions, we believe it is more useful to let

the empirical analysis reveal the patterns that apply in the IT industry. As a first step, we first propose a

new text-based measure of new entry threats arising from de novo entry in the next section, and describe

the validation process for the measure.

3. A Text-Base Measure of New Entry Threats

An empirical measurement of new entry threat has remained elusive in the innovation literature, given the

forward-looking nature of this construct. Most existing work has used current competitive intensity or

observed (actual) entry to account for these effects (Aghion et al. 2009; Chen et al. 1992) but these are

approximations at best and do not address the construct as discussed in the managerial and theoretical

Page 13: Enemies at the Gate? New Entry Threats and …misrc.umn.edu/workshops/2016/spring/Huang_Enemies.pdfEnemies at the Gate? New Entry Threats and Innovation in the U.S. IT Industry Yang

12

literature (Caves and Porter 1977; Porter 2008). When facing de novo entry, the challenge for the

incumbent is to spot the disruptive entrepreneurial firms that constitute such a threat early on and respond

adequately (Rigby et al. 2002). While this ability to spot the specific disruptor is imprecise and uncertain

(Markides 2006), broad movements within the entrepreneurial space into markets that intersect with the

incumbent’s product markets can still be recognized as significant threats. In other words, while an

incumbent may not observe a specific startup with a particular product innovation, the incumbent will

surely observe and respond to shifts across the larger entrepreneurial landscape into certain specific

markets or technologies. Prior work studying technology fads and cascades has discussed these broader

trends as being significant predictors of firm and individual behavior (Abrahamson 1991; Bikhchandani et

al. 1998). We argue that such large-scale new venture formation within a certain product market is a valid

representative of new entry threat and impending competition in the future. New analytical techniques

using text analysis provide methods that may be used to measure such threats in a novel manner. We

explore these options to construct measures for new entry threats emerging from startups, described in the

remainder of this section.

3.1 Methodology: From Words to New Entry Threats

The use of text analysis requires reasonably descriptive text corpora from firms that may be used to

construct appropriate measures. A considerable body of work that has used public filings provided by the

firms, specifically firm annual reports (10-Ks) in the US, to create measures of firm fundamentals such as

competitive intensity, industry classes and firm strategy (Hoberg and Phillips 2010; Tetlock 2011;

Tetlock et al. 2008). These documents are useful as sources of data for two reasons. First, public firm

product descriptions must be representative and significant as required by financial market regulations.

Thus, product descriptions of public firms contain timely information about their products, markets and

competitors that are consistent with the firm’s perceptions. Second, as firms evolve, these descriptions are

modified and updated to reflect the changing nature of their businesses, thereby providing longitudinal

variation. We therefore consider the use of text-based measurement schemes for capturing new entry

threats in the context of IT industry.

Page 14: Enemies at the Gate? New Entry Threats and …misrc.umn.edu/workshops/2016/spring/Huang_Enemies.pdfEnemies at the Gate? New Entry Threats and Innovation in the U.S. IT Industry Yang

13

We construct our new measure using techniques available in text analytics. We use the

VentureXpert dataset and focus on startups that are backed by venture capital funding. Using

VentureXpert data allows us to focus on IT entrepreneurs that have received venture capital funding, and

therefore are of baseline quality and represent credible threats to incumbents. It is important to note that

new ventures included in VentureXpert are typically too small and early-stage to count as competitors or

threats to incumbent firms. Therefore, we refine our definition of new entry threat from the startup space

in two ways. First, we argue that the threat of new entry from new ventures does not appear from any

single entrepreneur but from broad, collective movements in the startup space, i.e. evidence of systematic

entrepreneurial movements into a specific area or sub-industry are more representative of new entry threat

for an incumbent. Following Hoberg et al. (2014), we identify new entry threats at the level of the

“industry”; for the purposes of our analysis, we treat the whole set of entrepreneurial ventures in

VentureXpert that receive funding as the relevant “industry”, since they represent collectively the new

entry threat that is faced by incumbents. Second, it is unlikely that all entrepreneurial firms represent

emerging, new entry threat to the incumbent. Therefore, we consider those entrepreneurs that receive

first-stage funding in a given year as posing new entry threat to incumbents in that year. If the

entrepreneurial ecosystem observes value in a specific industry subclass or technology space and

systematically invests in new ventures at the early funding stage, there is likely to be a groundswell of

new ventures associated with this industry subclass entering the VentureXpert dataset in a given year,

which could then potentially lead to significant realized entry in 2-3 years, thereby representing new entry

threat for the incumbent. In summary, the new entry threat measure here is based on (a) new ventures that

receive new first stage venture capital funding, and (b) collective body of all entrepreneurs who receive

first-stage funding, rather than individual entrepreneurs.

This collective body of startups will represent varying levels of new entry threats to incumbents,

depending on how closely the entrepreneurial ventures are related to the primary market of the incumbent.

We therefore require a measure of the similarity between the product portfolios observed in the VC-

funded startup space and the incumbent’s product market. We use the cosine text similarity approach to

Page 15: Enemies at the Gate? New Entry Threats and …misrc.umn.edu/workshops/2016/spring/Huang_Enemies.pdfEnemies at the Gate? New Entry Threats and Innovation in the U.S. IT Industry Yang

14

capture this similarity (Sebastiani 2002). The primary building block to construct the text cosine

similarity metric is the set of unique words that firms use to describe their products in their business

descriptions. For publicly traded firms (incumbents), the source of business descriptions is retrieved from

Section 1 of their 10-K annual filings. For startups, we use their business description from VentureXpert

database. We extract all detailed business descriptions from start-ups that received first-stage funding and

aggregate these descriptions for each year t; these business descriptions are short, with the typical

description consisting of 4-5 sentences. Aggregating these for a given year provides a more representative

and useful document of entrepreneurial entries in a particular year. Cosine similarity between this

collective entrepreneurial document and an incumbent’s business description forms the basis for

measuring new entry threat, effectively by calculating their overlap in word usage.

Specifically, once the respective text documents are available, we parse semantics at a sentence

level with the Natural Language Processing Toolkit (Bird et al. 2009) and retain the nouns and proper

nouns, which are the most meaningful words elements in product descriptions. We remove commonly

used English stop words. We also omit geographical words such as country, state and city names, as well

as the words describing time periods such as months and dates, following Hoberg and Phillips (2015).

Our results are robust to the inclusion of these stop words. Figure 1 presents a histogram of frequencies of

the number of unique words used in the product descriptions of the incumbent firms, showing that the

typical firm uses roughly 700 unique words. Figure 2 displays the number of startups that received first-

round funding, which range from 522 to 2299; and the number of unique words used in the collective

startups’ product descriptions across the years, which range from 3020 to 6508 words per year.

[Insert Figure 1 and Figure 2 about here]

Next, we define all incumbents’ business descriptions and the aggregated start-up document as a

cumulative document corpus (or collection) for each year t (that is, the corpus includes n+1 documents in

total, with n being the number of incumbents in year t). Subsequently, we build document vectors for each

incumbent’s text and the aggregated start-up text in year t. Let Jt denote a scalar equal to the length of the

words dictionary, which includes all unique words used in document corpus of year t. Let Wit represent an

Page 16: Enemies at the Gate? New Entry Threats and …misrc.umn.edu/workshops/2016/spring/Huang_Enemies.pdfEnemies at the Gate? New Entry Threats and Innovation in the U.S. IT Industry Yang

15

ordered vector of length Jt describing the pattern in which the Jt words are used in document i (i = 0

represents the aggregated start-up file) in year t. We use Term Frequency times Inverse Document

Frequency (TF-IDF) (Tata and Patel 2007) as the weight for each word in the document vector. In this

case, each element j in Wit captures the relative importance of word (or term) j in document i, given its

within-document frequency and cross-document frequency. Term Frequency (fit) is defined as the number

of occurrences of words j in document i. The normalized term frequency is defined as:

TFji

=f

ji

maxk

fki

(1)

That is, the term frequency of term j in document i is fji normalized by the maximum number of

occurrences of any term in document i. This normalization process helps correct for biases caused by the

length of a document (i.e. term frequency gets inflated in longer documents). Inverse Document

Frequency (IDFji) for a term is defined in following fashion. Suppose term j appears in nj of the N

documents in the collection, then IDFj = log(N/nj). Naturally, a term that appears in many documents,

such as “service”, gets a lower IDF weight (and therefore is treated as less important), while a term that

occurs in only a few documents, such as “encryption”, gets a higher IDF weight. The weighting score of

TF-IDF for term j in document i thus defined to be TFji × IDFj. Intuitively, words with high within-

document frequency obtain higher weighting and those with high cross-document frequency are weighted

less. Lastly, since our main interest lies in the similarity between the document representing an incumbent

and the aggregate document representing start-ups in that year, we operationalize the text-based measure

of new entry threats for incumbent firm i in year t as:

(2)

where Wit denotes incumbent firm i’s document vector in year t (i = 1,2,3…n) and W0t represents the

aggregated start-ups’ business descriptions document vector. By construction, the cosine TF-IDF-based

Page 17: Enemies at the Gate? New Entry Threats and …misrc.umn.edu/workshops/2016/spring/Huang_Enemies.pdfEnemies at the Gate? New Entry Threats and Innovation in the U.S. IT Industry Yang

16

measure of new entry threat NET_TFIDFit is bounded between [0, 1]. Higher values represent greater

threat of new entry for the incumbent (since the two word vectors are closer in unit vector space).

There are several reasons that the cosine similarity score calculated by using TF-IDF weighted

words vector is a good measure of new entry threat in our study. First, the properties of TF-IDF are well

understood given its wide use in the studies of information processing and text analysis (Aizawa 2003;

Aral and Van Alstyne 2011; Hiemstra 2000). Second, the measure is intuitive given its consideration of

words frequency within and between documents. Third, the method is only moderately computationally

burdensome, making it scalable to replicate or extend to large datasets. Finally, the cosine similarity’s

normalization builds in a natural control for document length, since it measures the angle between two

word vectors on a unit sphere.

3.2 Validation of the Measure of New Entry Threat

On the basis of the methodology defined above, we calculate new entry threat (NET) for all

COMPUSTAT public firms in the high-tech industries (of which IT industries form a subset) from 1997

to 2014. The high-tech industry is formed using the 46 4-digit NAICS codes defined by Hecker (1999).

Since NET is a new measure based on text mining of production descriptions, in this section, we aim to

illustrate the validity of our measure through a series of tests. These include assessing whether our text-

based measure captures changing trends in the startup space over time; examining how NET is associated

with the changes in the competitive dynamics of the incumbent’s industry in subsequent years; comparing

the turbulence experienced by high-NET firms with those experienced by low-NET firms in subsequent

years; and examining how NET in a selected number of industries are influenced by industry-level

demand shocks caused by well-known and major exogenous events. We believe these tests provide

significant validation for the measure, and describe these in some detail below.

3.2.1 Capturing Changing Trends in the Entrepreneurial Space

As a first step to establish the validity of our NET measure, we examine whether our approach of using

text indeed accounts for shifting technology trends within the startup space as reflected in the “hottest”

Page 18: Enemies at the Gate? New Entry Threats and …misrc.umn.edu/workshops/2016/spring/Huang_Enemies.pdfEnemies at the Gate? New Entry Threats and Innovation in the U.S. IT Industry Yang

17

words used in product descriptions of new entrant firms across years in our sample. In Table 3, we present

the list of 20 words with the highest TF-IDF weights in the collective startup product descriptions

document in three selected years – 2000, when the dot-com bubble was at its peak; 2003, when the stock

market reached the lowest point after the collapse of the dot-com bubble; and 2006, when the economy

had recovered from the dot-com bubble.

[Insert Table 3 about here]

We observe several interesting patterns. First, there is significant longitudinal variation in the

most influential words that venture-funded startups use to describe their products and services. Second,

the changes in the vocabulary reflect systematic shifts in technology trends that are consistent with

observations in high-tech. For example, in 2000, the VC-funded entrepreneurial space was dominated by

firms related to the Internet or software industries: words such as “online”, “Internet”, “software”, “web”,

“email”, “broadband”, “ecommerce” and “portal” were among the most frequently used in their product

descriptions. In fact, all but 2 among the top 20 words are related to information and communication

technology industries in 2000. However, in 2003, we observe a significant change in the vocabulary used

to describe funded startups. The use of Internet-related words dramatically reduced, to be replaced by

words such as “disease”, “patient”, “drug”, “treatment”, “therapy”, “protein”, “biotech”, and “antibody”.

These changes show that the VC-funded startup space had shifted systematically from Internet/software

to pharmaceutical and biotech industries after the dot-com bubble. Interestingly, in 2006, we see the word

list reflecting a balance between IT and biotech industries. While some software and Internet-related

terms resurface, they do so with a completely different emphasis. Terms such as “search”, “cloud”, “blog”

“advertising”, “video” and “game” become more influential, reflecting a trend toward cloud computing,

social media, online advertising and video games in the IT industry. Overall, Table 3 provides evidence

for the significant longitudinal variation in the words that are used to describe the entrepreneurial firms in

different years, and shows that our text-based measure of new entry threat captures and builds on these

underlying trends within the startup space with fidelity.

Page 19: Enemies at the Gate? New Entry Threats and …misrc.umn.edu/workshops/2016/spring/Huang_Enemies.pdfEnemies at the Gate? New Entry Threats and Innovation in the U.S. IT Industry Yang

18

3.2.2 New Entry Threat and Competitive Dynamics

If our NET measure does indeed capture the extent to which incumbents face potential new entry, one

way to validate the measure is to examine how a firm’s NET is associated with the changes in its

competitive landscape in the following years. This would imply that firms with higher values of NET are

likely to face, in the subsequent 2-3 years, an increase in the number of direct competitors, all else being

equal. This is likely to happen through a number of mechanisms. To start with, some fraction of the new

startups may eventually go public and become a real rival for the incumbent. In other cases, existing

incumbents may form various types of alliances or joint ventures with the startups, or acquire technology

licensing from them, and invade the product space of the focal incumbent (Mitchell and Singh 1992). We

present in Figure 3 a scatter plot depicting the correlation between the numbers of rivals of an incumbent

defined by text-based network industries classification (TNIC)3 (Hoberg and Phillips 2010) in years t +2

and t+3 and the NET measure for the firm in year t. From the scatter plot, we clearly observe that a higher

level of NET is positive associated with number of rivals an incumbent faces in the next few years,

indicating that some of the entry threats do indeed materialize in the subsequent years. While these plots

show univariate relationships, we also estimated regressions with the number of competitors as the

dependent variable and NET as independent variables, including a full set of control variables. These

results, available upon request, show a significant positive relationship between NET and the number of

competitors in subsequent years for the incumbent firm.

[Insert Figure 3 and Figure 4 about here]

Relatedly, prior literature has shown that one of the direct consequences of rampant new entry is

the reduction of profitability in the industry as a whole, due to increased competitive intensity (Audretsch

and Mata 1995). Some view entry as a mechanism through which profits in excess of long-run

equilibrium are eroded (Mueller 1990). To test these expectations, we again show in Figure 4 a scatter

plot relating NET in year t to a commonly used profitability measure, Return on Assets (ROA), in years

3 Only text-based network industries classification provide us time-varying rival numbers in the same industry (Hoberg and

Phillips 2015). Therefore, we use this classification rather than the static SIC or NAICS codes to define industry classes.

Page 20: Enemies at the Gate? New Entry Threats and …misrc.umn.edu/workshops/2016/spring/Huang_Enemies.pdfEnemies at the Gate? New Entry Threats and Innovation in the U.S. IT Industry Yang

19

t+2 and t+3. As a validity check, firms with higher NET values should experience deteriorating

profitability in the years ahead, as the threats materialize. As expected, the slope of the fitted line of the

scatter plot is negative, showing that higher levels of NET are correlated with decreased operating

performance of the firm in the subsequent years, adding further validity to the NET measure.

3.2.3 Turbulence Experienced by High NET vs. Low NET Firms

One of the defining characteristics of new entry threat is that it threatens the sustainability of the firm’s

future earnings and the viability of its product portfolio (Hoberg et al. 2014). As a result, if a fraction of

the threats indeed materialize, firms with high levels of NET are more likely to suffer from deteriorating

operational performance due to heightened competition, and therefore more likely to experience turbulent

events such as liquidation or downsizing during the difficult time period that follows. We test these

eventualities in this section. We contrast firms with high NET values and those with low NET values to

investigate the likelihood of experiencing turbulent events, such as filing bankruptcy, announcing

significant downsizing or layoffs, or being acquired or merged by other companies in the five years

following the measurement of NET

Specifically, for each year in our NET data time frame (1997 – 2014), we select the ten firms with

the highest NET scores and the ten firms with the lowest NET scores, and put them into high group and

low group respectively. This results in a total of 103 unique firms in the low group and 82 unique firms in

the high group during the sample frame (the number is less than 10 times number of years, because a firm

may appear in a given group in multiple years). For each observation in the high group and the low group,

we conduct a search in the Lexis/Nexis database to identify news releases that are related to the turbulent

events associated with the firm in the subsequent 5 years, using a Boolean query that combines the

company name and keywords such as “bankruptcy”, “liquidation”, “layoff”, “cut jobs”, “merger”, and

“acquisition”. We limit the source to be any of the four types: Newspapers, Business and Industry News,

U.S. Newspapers, Web news. Through this exercise, we identify turbulent events associated with the firm

in the subsequent five years, and collect information such as the exact time of the events, other companies

involved in the event of a merger, and so on. We also search through news releases from the firm to

Page 21: Enemies at the Gate? New Entry Threats and …misrc.umn.edu/workshops/2016/spring/Huang_Enemies.pdfEnemies at the Gate? New Entry Threats and Innovation in the U.S. IT Industry Yang

20

confirm the dates and details of the events thus identified. For the purposes of validation, we report the

frequency of such events across the two sets of firms, representing high and low rates of new entry

threats. Figure 5 reports the comparison of these groups in terms of the rates of incidents for three critical

events – bankruptcies, layoffs, and acquisitions/mergers4. As we expected, companies facing high level

of NET have much greater likelihood of experiencing turbulent events in the next few years. For

companies in the high group, 8.5% (7 companies) of 82 companies filed bankruptcy, 40.2% (33

companies) announced significant layoffs, and 29.3% (24 companies) were acquired by or merged with

other firms in the subsequent 5 years. In comparison, among the companies in the low group, only 4.8%

(5 companies) of 103 companies filed bankruptcy, 7.8% (8 companies) announced layoffs and 15.5% (16

companies) were acquired or merged. In addition, the two-sided t-tests show that the probability of

“Layoffs” and “M&A” are significantly different between the high NET group and the low NET group

(p<0.05 and p<0.01, respectively). On average, companies with low new entry threats fared much better

than companies with high new entry threats in subsequent years. In summary, this provides evidence that

the NET measure is forward-looking and does indeed correlate with firms’ future competitive dynamics.

[Insert Figure 5 about here]

3.2.4 New Entry Threat and Industry-level Exogenous Demand Shocks

A further source of validation for NET arises from being able to observe higher values in NET when an

exogenous event creates the potential for new entry into that industry; in this section, we assess these

effects. The underlying argument here is that a sudden increase (or decrease) in industry-level demand

due to exogenous event disrupts the relationship between supply and demand, and therefore encourages

(or discourage) entry. As a result, incumbents in the industry will likely face increasing (or decreasing if

demand shock is negative) levels of NET following the events. We consider 4 selected high-tech

industries and their associated exogenous events as exemplars. The first is the military armored vehicle

4 Beyond these comparisons, we also delve deeper into the two sets of firms for a given year. This qualitative information is

provided in Appendix 1 for the year 2009.

Page 22: Enemies at the Gate? New Entry Threats and …misrc.umn.edu/workshops/2016/spring/Huang_Enemies.pdfEnemies at the Gate? New Entry Threats and Innovation in the U.S. IT Industry Yang

21

manufacturing industry5 following the terrorist attacks on September 11, 2001. The second event we

consider is changes in the Internet services provider and web search portal industry following the bursting

of the dot-com bubble in March 2000. Third, we consider changes in the software publishing industry

after Apple’s announcement of a major and critical SDK release for iOS, which drove hundreds of app

developers into the mobile apps market. Finally, we trace changes in the biotechnology industry which

experienced a demand boost following the complete sequencing of the human genome. We choose these

events due to their importance in shaping the trajectory of these high-tech industries, thereby potentially

offering new opportunities for entrepreneurial firms.

[Insert Figure 6 about here]

Military Armored Vehicle Manufacture (NAICS 336992). Historical data suggests that the U.S. military

spending reached a peak of nearly 6% of GDP during the Reagan defense buildup, and declined in the

1990s, bottoming out at 3.5% of GDP in 2001.6 But the terrorist attacks on September 11, 2001 reversed

that trend sharply, and defense spending began a substantial increase in the years following the attack,

eventually reaching 4.6% of GDP by 2005 during the Iraq invasion. Spending stabilized after 2005, but

increased further to 5.7% of GDP in 2010 and 2011 with the stepped up effort in Afghanistan.7 We expect

the 9/11 attacks to dramatically boost demand for the military and defense industries, which should lead

to more new entry by entrepreneurial firms in the following years. Figure 6a plots average NET faced by

incumbents in the military armored vehicle manufacturing industry over our sample period (the vertical

line represents the exogenous event of 9/11). We find strong support for our conjecture – we observe a

sudden surge in NET in the industry after 2001, indicating that our measure is responsive to industry-level

exogenous events that provide demand shocks. Furthermore, we find that NET in this industry peaked in

2010, the year in which military spending reaching a new high in recent years. These dynamics provide

some support for the thesis that new entry follows exogenous demand shocks.

5 Military Armored Vehicle Manufacturing industry is the only close related with military goods and services industry in high-

tech sector (Hecker 1999). 6 http://www.usgovernmentspending.com/defense_spending

7 http://www.usgovernmentspending.com/spending_chart_1990_2020USp_XXs2li011tcn_30f_Recent_Defense_Spending

Page 23: Enemies at the Gate? New Entry Threats and …misrc.umn.edu/workshops/2016/spring/Huang_Enemies.pdfEnemies at the Gate? New Entry Threats and Innovation in the U.S. IT Industry Yang

22

Internet Related Industries (NAICS 5181, 5161, and 5182). We next consider the dot-com collapse and

examine its influence on NET values faced by Internet-related industries, which include Internet Service

providers and Web Search Portal (NAICS 5181), Internet Publishing (NAICS 5161), and Data Processing

(NAICS 5182). In contrast to the previous case, this event generated a significant negative demand shock.

The stock market collapsed in March 2000, causing plunges in stock prices of large e-commence and

Internet companies, including Amazon, eBay, and Cisco, while making investors reconsider the valuation

of Internet service companies (Wheale and Amin 2003). As a result, we expect VCs to shy away from

investments in Internet-related firms, thereby reducing new entry threat faced by firms in this industry.

Figure 6b provides evidence in support of this expectation. The average NET of Internet related firms (the

solid line) reached its peak in 2000, and dropped significantly in 2001. The negative trend continued until

year 2003 when the market started to recover from the dot-com bust.

Software Publishers (NAICS 5112). In Figure 6b we also present the average NET experienced by firms

in the software industry (in dashed line). We find that the level of NET for software publishers also

dropped following the dot-com bust. However, the decline in NET is smaller for software publishers than

for Internet related firms, suggesting that software publishers are less severely influenced by this

particular demand shock. In addition, we observe a strong increase in NET values for incumbent software

publishers more recently, starting from 2009. We partly attribute this to Apple’s launch of SDK3

(Software Development Kit 3) for iOS, which ignited exponential growth in its app ecosystem. Although

Apple’s AppStore opened in July 2008, the functionalities of earlier versions of SDK were too restrictive

and prohibited real innovation.8 With the introduction of SDK3, Apple offered over 100 new features to

the framework and more than 1000 new APIs. Some of these features, such as Map API, Payment API,

and push notifications, were critical for developers to operate in this ecosystem (Ghazawneh and

Henfridsson 2010). Thus, we see a corresponding increase in entrepreneurial software developers joining

the mobile app ecosystem, and a concomitant increase in NET values for the industry.

8 http://whydoeseverythingsuck.com/2008/03/apples-iphone-sdk-prohibits-real-mobile.html

Page 24: Enemies at the Gate? New Entry Threats and …misrc.umn.edu/workshops/2016/spring/Huang_Enemies.pdfEnemies at the Gate? New Entry Threats and Innovation in the U.S. IT Industry Yang

23

Biotechnology Research and Development (NAICS 5417). Lastly, we turn to a milestone event in the

biotech industry– the completion of the human genome sequence – and examine how it shaped new entry

threat in the industry. Due to widespread international cooperation and advances in the field of genomics

(especially in sequence analysis), as well as major advances in computing technology, an initial

sequencing of the human genome -- the genetic blueprint for human beings -- was finished in 2000,

announced jointly by President Bill Clinton and Prime Minister Tony Blair on June 26, 2000. 9 In

addition, in 2001, the sequence of the human genome was published in Science and Nature,10

making it

possible for researchers across the world to begin developing treatments. These two events led to the

entry of a large number of biotechnology startups. As seen in Figure 6c, we see the average level of NET

for incumbents in the biotechnology R&D services industry increased dramatically in 2001, a trend that

continues to 2002, thus again verifying that our NET does track closely with external demand shocks that

affect new entry threats. In summary, we believe that our NET measures are valid, and represent a new

method to measure de novo new entry threats using text analysis. We now consider econometric models

that relate to our core question: how do incumbents respond to new entry threats in terms of innovation?

4. Empirical Analyses

We present our empirical analyses in this section in stages. We first start with a description of the sample

and variables we use in our empirical models. As mentioned above, R&D intensity is our primary

measure of innovation investments. We then address the endogeneity of new entry threats by using

dynamic panel models, and by estimating simultaneous equation models that incorporate the role of entry

barriers. We show that our results are robust to the use of alternative innovation measures, such as

number of patent applications and citation-weighted patents. Lastly, we examine how product diversity

within the incumbent firm moderates the relationship between NET and innovation strategy.

9 http://web.ornl.gov/sci/techresources/Human_Genome/project/clinton1.shtml 10 https://www.genome.gov/10002192

Page 25: Enemies at the Gate? New Entry Threats and …misrc.umn.edu/workshops/2016/spring/Huang_Enemies.pdfEnemies at the Gate? New Entry Threats and Innovation in the U.S. IT Industry Yang

24

4.1 Data and Variables

We restrict our analyses to the IT industries, using the 24 4-digit NAICS industry codes that include IT

software, hardware, and services industries for the years 1997-2013 (Kim et al. 2016). Financial data and

other firm characteristics are obtained from Compustat. Our primary dataset consists of 2101 publicly

traded firms over the period 1997-2013 with 14,410 firm-year observations, representing an unbalanced

panel. The sample period includes years when there was considerable turbulence in the IT industry (e.g.,

during the Internet boom and bubble burst) as well as the less volatile years. The long panel also includes

the period of the global financial crisis in 2008 and the period of recovery afterwards, which significantly

affected IT-related venture capital funding and entrepreneurial activities in general. Together, the dataset

provides considerable longitudinal variation in our measure of new entry threats that allows us to use

firm-level fixed effect models to control for many unobserved firm heterogeneities. We describe the other

variables in our main analyses below.

Innovation: We employ two commonly used proxies for innovation of a firm: R&D intensity and patent

applications. R&D has been viewed as a key determinant and indicator of technological innovation of

firms (Cohen and Klepper 1996) and also measures the degree to which firms pursue product and process

innovation, and has been shown to drive firm growth in the high-tech sector (Coad and Rao 2008).

Following prior literature, we define R&D intensity as R&D expenditures over firm’s total asset

(Blonigen and Taylor 2000; Hall 1988). Unlike patents, which are usually observed with a lag, R&D

expenditures reflect contemporaneous managerial decisions that are more closely associated with a firm’s

innovation strategy. We also use patent applications and citation information as our alternative innovation

measure in robustness tests, based on data obtained from the NBER patent database (Hall et al. 2001). We

use the patent application year in our analysis, since the application year is more close to the time of the

actual innovation (Griliches et al. 1988); and use number of patents applications that were eventually

granted, consistent with prior work (Crépon et al. 1998; Griliches et al. 1988; Hall et al. 1986). To the

extent that patents vary in quality and importance (Griliches et al. 1988), we also construct citation-

Page 26: Enemies at the Gate? New Entry Threats and …misrc.umn.edu/workshops/2016/spring/Huang_Enemies.pdfEnemies at the Gate? New Entry Threats and Innovation in the U.S. IT Industry Yang

25

weighted patent counts (Hall et al. 2001). Following Hall et al. (2001), we correct for the truncation bias

in patent citations using the “weight multiplier” that can be applied to the number of citations from

USPTO through 2006 received by the patent. Since the distributions of patent counts and weighted

citations are right skewed, we use the natural logarithm of patent counts and weighted citations.11

Control Variables: Following the innovation literature (Atanassov 2013; Becker-Blease 2011; Kaplan

and Zingales 1997), we control for a vector of firm characteristics that may affect a firm’s innovation

investments, including firm size, firm age, profitability, asset tangibility, leverage, capital expenditure,

product market competition, growth opportunity, and financial constraints. We control for

contemporaneous competition for the incumbent firm by Herfindahl-Hirschman index based on the

increasingly popular Text-based Network Industry Classification (TNIC) scheme created by Hoberg and

Phillips (2010), where industry classification is based on product market vocabularies. These

classifications are updated every year as firms file 10-K reports, allowing for a more accurate measure of

contemporaneous competition. Detailed variable definitions are described in Table 4, and summary

statistics and correlations are shown in Table 5.

[Insert Table 4 and Table 5 about here]

4.2 Baseline Analysis of NET on Incumbent Innovation

Our baseline model estimates the effect of new entry threats (NET) on the incumbent firm’s innovation

investment, using a two-way fixed effects panel data specification below:

Innovationit

=ht+l

i+ b

1´ NET

it+ X

itg + m

it (3)

where i indexes firms, and t indexes time periods. In the baseline model we use R&D intensity as the

dependent variable Innovationit. The variable NETit is from our new text-based measure of new entry

threats. Xit is a set of firm characteristics that affect a firms’ innovation investment. We control for time-

invariant unobservable firm characteristics by including firm fixed effects λi . We include year fixed

effects ηt to control for economy wide shocks. Standard errors are clustered at the firm-level to control

11 To avoid losing firm-year observations with zero patents or weighted citations, we add one to the actual value before taking the

natural logarithm.

Page 27: Enemies at the Gate? New Entry Threats and …misrc.umn.edu/workshops/2016/spring/Huang_Enemies.pdfEnemies at the Gate? New Entry Threats and Innovation in the U.S. IT Industry Yang

26

for serial correlation (Wooldridge 2010). μit represents the idiosyncratic errors.

[Insert Table 6 about here]

We report the results from fixed effect model in Column (1) of Table 6. For comparison, we also

present a random effects panel data model in column (2). In random effects models, the unobserved

individual heterogeneity λi is assumed to be uncorrelated with the included regressors (Greene 2003). We

find the coefficient of new entry threat (NET) is negative in the fixed effects estimate and significant at

5% level, indicating that greater new entry threats are associated with lower level innovation investments,

all else being equal. The result from a Hausman’s test comparing the fixed effects and random effects

estimates rejects the orthogonality of the random effects and the regressors at p<0.01. Therefore, without

the strong assumption that the firm heterogeneity is uncorrelated with the regressors, random effect

estimates are biased. We therefore interpret our results using the fixed effects estimates.

To illustrate the magnitude of effect of NET on innovation, consider a one standard deviation

(s.d.) increase in new entry threat (before standardization, NET has a mean of 0.07 and s.d. of 0.05). The

coefficient of NET implies a 0.35 percentage point reduction in R&D intensity, which translates to a

reduction of $10.75 million in R&D expenditure based on the mean level of asset in the sample. While

extant literature is divided on the direct effect of the threat of new entry on the incumbent firm’s

innovation strategy, our analysis indicates that in the IT industry, the average firm responds to such

threats by reducing its innovation investments.

While a fixed effects model controls for many unobserved firm heterogeneities, a particular

concern here is that the presence of pre-emptive innovation might deter entry or other unobserved

industry-wide shocks (such as technological opportunities) may influence both entrepreneurial entry, VC

funding decisions and incumbent innovation, causing the endogeneity of new entry threats. Therefore, we

relax the assumption that NET is strictly exogenous and use the generalized method of moments (GMM)-

based dynamic panel data models estimator (Arellano and Bond 1991; Blundell and Bond 1998). Taking

advantage of our long panel and large number of firms in our dataset, we construct internal instruments

within the data consistent with dynamic panel data models. More specifically, we use the differences

Page 28: Enemies at the Gate? New Entry Threats and …misrc.umn.edu/workshops/2016/spring/Huang_Enemies.pdfEnemies at the Gate? New Entry Threats and Innovation in the U.S. IT Industry Yang

27

GMM estimator, employing lag term of our endogenous variables, NET and L.R&D Intensity, and all

difference of other exogenous variables including year dummies as our instrument variables for

differenced equation. We use the second lag and onward of endogenous variables for the difference GMM

specifications12

. We checked the validity of the moment conditions required by the differences GMM

estimator using the Hansen test, which does not reject the assumption that our instruments are exogenous

(Arellano and Bond 1991; Roodman 2009). We also test the validity of generalized method of moments

(GMM) assumptions in our model. The test results are reported at the bottom of Table 6, which indicate

that our model specification shows no significant serial correlation in the first-differenced disturbances.

We report the results from Arellano-Bond estimator of dynamic panel data models, treating NET

as exogenous first in Column (3) and then as endogenous in Column (4) of Table 6. We observe that the

coefficient estimate of NET in Column (3) is similar to that of the fixed effects model, consistent with our

main finding that new entry threats reduce innovation. Moreover, the coefficient of estimate of NET in

column 4 (-1.337) is significantly higher than that from the fixed effects model. The larger estimate in the

dynamic panel data model, after accounting for the endogeneity of NET, suggests that the presence of

endogeneity causes a downward bias in the FE model, while the FE model generates more conservative

estimates of the effect of NET. Overall, the Arellano-Bond estimates provide strong support for the main

finding that threat of future competition through de novo entry reduces the inclination of incumbents to

invest in risky innovation investments. Our results are consistent with existing work showing that firms

facing market turbulence are more likely to respond conservatively (Brav et al. 2005; Hoberg et al. 2014).

This strategy of conservativeness appears to extend to innovation-related investments as well, given the

high risk of failure in such activities and the uncertainty of appropriating the returns from such activities

(Lukach et al. 2007, Fontana et al. 2009).

4.3 Simultaneous Equations Models

Beyond the dynamic panel model to account for the endogeneity of NET, we use an alternative

12 In unreported analysis, we try varying levels of lags and their combinations; our results are fully robust to the selection of lag

structures.

Page 29: Enemies at the Gate? New Entry Threats and …misrc.umn.edu/workshops/2016/spring/Huang_Enemies.pdfEnemies at the Gate? New Entry Threats and Innovation in the U.S. IT Industry Yang

28

identification strategy that involves modeling the endogenous variable through a separate equation. We

thus propose and estimate jointly a system of equations to account for the endogeneity of NET

(Wooldridge 2002, p.209). We use the method of Simultaneous Equations Models (SEMs) to address the

reverse causality issues – i.e. incumbent’s R&D investments may lead to entry barrier (Mueller and Tilton

1969). As shown by Orr (1974) and Cockburn and MacGarvie (2011), new entry in an industry is likely

influenced by industry level innovation investments. For example, in Orr (1974)’s model, entry is

assumed to be a function of the incentives to enter relative to the level of entry barrier. Such entry

incentives and barriers may include factors such as industry-level R&D intensity, the growth rate in the

industry, the level of profitability observed in the industry, industry-level uncertainty and industry

concentration. In order to model how startups may make the decision to enter a certain industry (and

thereby endogenize NET), we build on his model to derive the following equation, which is then

estimated as part of a simultaneous equations model along with equation (3):

NETit

=at+t

i+q

1×Ind _ R & DIntensity

i ,t-1

+q2×Ind _ SaleGrowthRate

i ,t-1

+q3×Ind _Concentration

i ,t-1

+q4×Ind _ ProfitExp

i ,t-1

+q5×Ind _Uncertainty

i ,t-1+u

it

(4)

where t indexes time periods, and i indexes incumbents. We define industry using the TNIC (Hoberg and

Phillips 2015), which allows each firm to have its own unique set of competitors identified by the

similarity of product descriptions in their annual reports. NETit is a proxy for the level of entry into

incumbent i’s industry at year t, and is modeled as a function of lagged value of average R&D intensity,

average sale growth rate, expectation for future profit13

, industry concentration, and market uncertainty of

the incumbent’s industry. Detailed variable constructions are described in Table 4. We control for time-

invariant unobservable firm characteristics by including fixed effects, τi, and use year fixed effects αt to

13 A commonly used proxy for the expectation of future profit is Tobin’s Q (Jankowski 1998).

Page 30: Enemies at the Gate? New Entry Threats and …misrc.umn.edu/workshops/2016/spring/Huang_Enemies.pdfEnemies at the Gate? New Entry Threats and Innovation in the U.S. IT Industry Yang

29

control for economy wide shocks. Standard errors are clustered at the firm-level to control for serial

correlation (Wooldridge 2010). υit represents the idiosyncratic error. We estimate this equation together

with equation (3) – which models incumbent firm’s innovation investments – as a simultaneous equations

system to establish the causal inference of new entry threats on incumbent’s innovation strategy. We use

three-stage least squares (3SLS) estimation procedures. The 3SLS estimator assumes that the errors are

correlated across equations and is more efficient than estimation of each equation by two-stage least

squares (Cameron and Trivedi 2005).

[Insert Table 7 about here]

The results of 3SLS estimation are shown in Table 7. Qualitatively, the results from the

Incumbent Equation. (i.e. equation (3)) are similar to the FE specification in Table 6: the coefficient of

NET is negative and statistically significant, providing strong evidence for the causal relationship between

new entry threats and incumbent innovation. We note that the coefficient estimate of NET is larger than

that from the fixed effects model in Table 6, which again suggests that the endogeneity of NET due to

reverse causality likely biases the coefficient estimate downwards (as suggested by the Arellano-Bond

models). The FE model thus generates a more conservative estimate of the effect of NET on innovation.

Interestingly, the estimation of the Entry Equation provides yet another validation test for our

text-based measure of new entry threats. The results from this equation are highly consistent with prior

work on entry incentives and entry barriers (Bresnahan and Reiss 1991; Cockburn and MacGarvie 2011;

Orr 1974). The coefficients for Industry Sale Growth Rate and Expectation for Future Profit are both

positive and significantly associated with new entry threats (p<0.05 and p<0.01, respectively) since the

past industry growth rate and profit in future is a strong incentive to enter (Orr 1974; Siegfried 1994).

Industry R&D intensity is negative and significantly associated with new entry (p<0.01), as R&D

investments generate intellectual property rights that deter entry (Cockburn and MacGarvie 2011).

Industry Concentration also deters entry (p<0.01), as predicted by prior literature. In highly concentrated

industries, the incumbents have greater advantage of economies of scale over potential entrants (Hurdle et

al. 1989), and are likely to use strategic entry deterrence more often (Bunch and Smiley 1992). Thus, the

Page 31: Enemies at the Gate? New Entry Threats and …misrc.umn.edu/workshops/2016/spring/Huang_Enemies.pdfEnemies at the Gate? New Entry Threats and Innovation in the U.S. IT Industry Yang

30

results from the first stage equation provide further support for the validity of the NET measure as well.

4.4 Alternative Innovation Outcome Measures

In this section, we use the number of patent and patent citation from the NBER database (Hall et al. 2001)

as alternative measures of innovation to further corroborate the relationship between new entry threats

and incumbent innovation we discover. As discussed before, we use the patent application year to

construct our innovation variables. In order to address the truncation issue with patent citation, we take

two measures. First, we use the “weight multiplier”, which can be applied to the number of citations from

USPTO through 2006 received by the patent, to correct for the right hand side truncation bias in patent

citations (Hall et al. 2001). Second, we limit our sample to the period of 1997-2002 to avoid the left hand

side truncation problem of NBER patent data close to 2006. This is because a typical patent is granted

about two years after application (Jaffe et al. 1993). 14

Our final data therefore includes 7,824

observations associated with 2,089 firms. We test the same Two-Way Fixed Effect specification in

equation (3) by replacing the dependent variable Innovationit with one of the following two measures: the

natural log of patent application counts, Ln(1+Patentt+2), or the natural log of the citation-weighted patent

application counts, Ln(1+WeightedCitationt+2). We impose a two-year lag on the observed new entry

threat variables as well as other firm level controls relative to innovation outcome since the actual

investments in these innovations are likely to have been made earlier (Chemmanur and Tian 2012). The

two-year lag also allows for sufficient time on the part of the firm to react to new entry threats as well as

reduces the chances of reverse causality in the regression.

[Insert Table 8 about here]

Table 8 reports the results of the tests with patent as innovation output. Panel A reports results

with the full IT industry sample. Here again, we find that the coefficient of NET is negative in both

column 1 and column 2 but only significant for citation-weighted patents at the 1% level, indicating that

greater new entry threats are associated with fewer high-quality patent applications from incumbents.

14

Therefore most patent applications filed in 2005 and 2006 do not appear in the NBER patent database. We thank an

anonymous reviewer for suggesting this.

Page 32: Enemies at the Gate? New Entry Threats and …misrc.umn.edu/workshops/2016/spring/Huang_Enemies.pdfEnemies at the Gate? New Entry Threats and Innovation in the U.S. IT Industry Yang

31

Within the IT industry in particular, patent protection tends to be weaker in the service sectors than the

hardware/software product sectors, which leads to a lower propensity for patenting. Therefore patent

output may not be a perfect measure for inventive activities in IT services. In Panel B of Table 8 we

report the results after excluding IT service sectors. 15

We find that for this subsample, the estimates of

NET are negative and significant for both the number of patents as well as citation-weighted patents.

Comparing the results in Panel B to those in Panel A, it is clear that the coefficient estimates are of higher

magnitude, suggesting that new entry threats have a greater impact on patenting in the hardware/software

industries than in IT service industries. By our estimate from column 3 and column 4, a one s.d. increase

in new entry threat is associated with a 2.7% reduction in patent applications and a 12.4% reduction in

citation-weighted patents. Overall, our analyses with patent data confirm that our central finding is robust.

4.5 Reaction to New Entry Threat by Diversified vs. Specialized Firms

Prior research has found that lateral entry from other incumbents triggers a stronger reaction from more

focused, specialized firms than diversified firms in terms of market expansion/retrenchment (Khanna and

Tice 2000). In this section, we examine whether diversified firms respond differently to de novo entry

threats than specialized firms. We argue there are at least two reasons why a specialized firm may react to

new entry threats more strongly than a diversified firm. First, specialized firms may be better at detecting

emerging product market threats from startups, due to their focus. Managers in specialized firms closely

monitor the competitive landscape in their narrow product fields. In contrast, managers in diversified

firms have to divide their attention across a variety of product markets, and may not be able to detect

entry threats in every product market due to their limited information processing capacities. Second, by

virtue of a diversified product portfolio, diversified firms are able to diversify their risks across different

product lines. When they face entry threats in a particular market, they may find that other lines of

business provide a hedge against these threats. Diversified firms are better at weathering the turbulence

caused by new entry, and therefore have less incentive to react as dramatically.

15 IT product subsample is defined with full sample excluding IT services sector, identified by 4 digital NAICS code:

5182,5413,5415,5416, and 5417.

Page 33: Enemies at the Gate? New Entry Threats and …misrc.umn.edu/workshops/2016/spring/Huang_Enemies.pdfEnemies at the Gate? New Entry Threats and Innovation in the U.S. IT Industry Yang

32

We analyze these differences between diversified firms and specialized firms by constructing a

firm product diversification variable using Jacquemin and Berry (1979) entropy measure of sale shares in

different lines of business. This measure has been used widely in prior literature (Wiersema and Bowen

2008). Entropy is computed using data on firm sales in each 6-digit NAICS businesses as reported by the

COMPUSTAT Segment database. Mathematically, Entropy for firm i in year t is defined as following:

Entropyit

= Psit

s=1

n

å ×ln1

Psit

(5)

where n denotes the total number of 6-digit NAICS business sectors reported by firm i in year t, and Psit is

the share of sales from business sector s over the total sales of firm i in year t. Because not all

COMPUSTAT firms report sales by lines of business, we are able to calculate this variable for 954 firms

in our sample. We then define a firm’s product Diversityi as the within-firm mean of Entropyit over the

sample period.

[Insert Table 9 about here]

In Table 9 we report the regression results with the firm diversification measure. In Column (1),

we report the estimates from a fixed effects model that incorporates the interaction term of NET and

Diversity. The interaction term is positive and statistically significant (p<0.01), showing that consistent

with our conjecture, firms with higher level of product diversification response less dramatically in

reducing innovation investments. We also present split sample analyses comparing diversified firms to

specialized firms (Column (2) and Column (3)), using the sample mean of Diversity to split the sub-

samples. Interesting, we find that only specialized firms adjust their innovation investments according to

new entry threats, while diversified firms seem to be much more inertial, thus confirming the insight from

the literature that diversified firms are less likely to respond aggressively to new entry threats through

innovation spending.

Page 34: Enemies at the Gate? New Entry Threats and …misrc.umn.edu/workshops/2016/spring/Huang_Enemies.pdfEnemies at the Gate? New Entry Threats and Innovation in the U.S. IT Industry Yang

33

5. Discussion and Conclusion

It is widely acknowledged that innovation is one of the central engines of competitive advantage in the IT

industry (Giarratana 2004). It is equally well established that the IT industry tends to be volatile, with

quick clockspeeds, rapid change, and hypercompetition (McAfee and Brynjolfsson 2008). Juxtaposing

these two observations begs the question – how do incumbent IT firms respond to increased threats of

new entry in terms of their innovation strategies? This question remains, surprisingly, understudied in

extant IS research. In this study, we examine this question by studying how incumbents respond to

emerging threats from new, entrepreneurial firms. As the means to answering this question, we first

develop a text-based measure of new entry threats by analyzing the product descriptions of both

incumbent firms and startups. We conduct a series of validation tests and show that the NET measure

indeed captures impending threats from the startup space. Subsequently, using data on a panel of 2101

firms in the IT industry over the period of 1997-2013, we find that increasing level of new entry threats is

associated with a reduction in a firm’s innovation investments, measured by R&D intensity. Our finding

is robust to the use of alternative measures of innovation outputs, including the count of patent

applications and citation-weighted patent applications, as well as alternative regression specifications

addressing the endogeneity of NET. Across all these tests, we show highly consistent results – that IT

firms tend to reduce their innovation investments when faced with new entry threats from startups.

There are several potential explanations for the relationship we uncover between new entry threat

and innovation investments. As suggested by theory, facing greater threats of product market entry,

managers may choose strategic alliances to gain a window into technological changes (Cui and O'Connor

2012; Mitchell and Singh 1992) rather than directly invest in R&D. Alternatively, the incumbent firms,

realizing that their research efforts in exploiting radical innovation are not as efficient as new entrants

(Henderson 1993), may invest in corporate venture capital to fund external startups directly (Kim et al.

2016). Another mechanism may involve managers deciding to improve efficiency or cut slack within the

firm as a response to the incipient instability emerging from threats of new entry (Schmidt 1997); this

would manifest as a reduction in innovation but an increase in cash holdings as a buffer (Hoberg et al.

Page 35: Enemies at the Gate? New Entry Threats and …misrc.umn.edu/workshops/2016/spring/Huang_Enemies.pdfEnemies at the Gate? New Entry Threats and Innovation in the U.S. IT Industry Yang

34

2014), which may then be used in acquiring and strengthening complementary assets essential in the

commercialization of new innovations (Teece 1986). While a clear identification of these mechanisms is

beyond the scope of this work, we conduct some exploratory analyses to understand how firms may be

responding to new entry threats, and present details on one of these analyses: cash holdings by the

incumbents – in Appendix 2. We find that on average, incumbent firms also react to NET by increasing

their cash holdings, consistent with Hoberg et al’s (2014) finding that firms are more financially

conservative when their product markets become more volatile. Interestingly, here again we find that

specialized firms react more strongly (hold more cash) than diversified firms, which echoes our earlier

findings with regard to R&D intensity, and is consistent with prior literature (Khanna and Tice 2000).

Our work makes several useful contributions to the literature on innovation within the IT

industry. First, although prior literature has investigated many forms of strategic responses to entry,

empirical studies in this field have largely focused on diversifying entry instead of de novo entry (Carroll

et al. 1996), partly due to the difficulty of measuring such entries. In addition, while there have been

plenty of papers investigating incumbent responses in terms of pricing, excessive capacity, product

market mix, or advertising, very few of them (Aghion et al. 2009) have examined how incumbents may

respond through innovation. More to the point, while many studies have examined the effects of entry

after entry has occurred, relatively few have addressed the question of how firms respond before entry

materializes; some rare exceptions include Seamans (2013) and Goolsbee and Syverson (2008). Our work

here pushes the frontier on both dimensions. We provide an empirical answer to the question of how new

entry threat affects innovation investments in the IT industry, and also provide a new measure that

addresses ex ante threat of entry from the startup ecosystem, a vital source of disruption in the IT

industry. Our work thus fills these two vital gaps in the literature on entry and innovation.

Second, existing theories are divided in their predictions of the relationship between new entry

threats and innovation. As we highlighted earlier, while the pre-emptive market expansion theory (Eaton

and Lipsey 1979) predicts that incumbent firms should increase the level of innovation in the face of new

entry, the theories of heterogeneous research capabilities (Chandy and Tellis 2000; Hamberg 1963;

Page 36: Enemies at the Gate? New Entry Threats and …misrc.umn.edu/workshops/2016/spring/Huang_Enemies.pdfEnemies at the Gate? New Entry Threats and Innovation in the U.S. IT Industry Yang

35

Mueller and Tilton 1969), strategic interaction (Mitchell and Singh 1992), and post-entry defense models

(Gatignon et al. 1989; Kuester et al. 1999) all make the opposite prediction. By presenting empirical

evidence in the U.S. IT industry, we show that an average incumbent firm reacts to the challenge of new

entry more conservatively, instead of competing with startups head-on. There may be good reasons for

this strategic behavior; returning to our example of Intel, while the firm has reacted aggressively to the

threats brought by ARM’s low power, RISC-based processes through its own Atom mobile processors,

the success of this strategy is questionable. Five years after the introduction of the Atom processor, it is

still a distant second to ARM chips, while Intel’s mobile group has reported a loss of $7 Billion over the

period 2013-2014 alone. 16

Clearly, we cannot draw causal conclusions here, but this example provides

some context for why incumbents may choose to draw down their innovation spending when faced with

new entry threats from startups.

In addition to theoretical contributions, we make a methodological contribution by creating and

validating a new measurement of new entry threat from the startup ecosystem. Our text-mining approach,

in contrast to earlier measurement of market threats based on industry classifications or market shares, not

only captures forward-looking threats in a firm’s competitive environment, but also changes over time as

firms enter and exit certain product markets, as shown in the case of the TNICs by Hoberg and Phillips

(2015). It is our intention to provide these measures to the broader IS community so as to allow the

community to further test and verify the value of these measures. There are several empirical and

theoretical contexts where new entry threats faced by incumbents play a central role; the availability of a

standard and accepted measure will help by allowing for comparability across models and theories. We

hope that our work here will encourage the use of this measure, as well as the development of similar

text-based approaches to studying the important topic of competitive dynamics in the IT industry.

16 http://appleinsider.com/articles/14/11/16/after-losing-apples-ipad-business-intel-has-bled-7-billion-while-heavily-subsidizing-

cheap-x86-atom-android-tablets

Page 37: Enemies at the Gate? New Entry Threats and …misrc.umn.edu/workshops/2016/spring/Huang_Enemies.pdfEnemies at the Gate? New Entry Threats and Innovation in the U.S. IT Industry Yang

36

References

Abernathy, W. J., and Utterback, J. M. 1978. "Patterns of Industrial Innovation," Technology Review

(80:7), pp. 40-47.

Abrahamson, E. 1991. "Managerial Fads and Fashions: The Diffusion and Rejection of Innovations,"

Academy of Management Review (16:3), pp. 586-612.

Agarwal, R., and Gort, M. 2002. "Firm and Product Life Cycles and Firm Survival," American Economic

Review (92:2), pp. 184-190.

Aghion, P. 2003. "Empirical Estimates of the Relationship between Product Market Competition and

Innovation," in Institutions, Innovation and Growth: Selected Economic Papers. Edward Elgar

Publishing, pp. 142-169.

Aghion, P., Blundell, R., Griffith, R., Howitt, P., and Prantl, S. 2009. "The Effects of Entry on Incumbent

Innovation and Productivity," The Review of Economics and Statistics (91:1), pp. 20-32.

Aghion, P., and Howitt, P. 1992. "A Model of Growth through Creative Destruction," Econometrica

(60:2), pp. 323-351.

Aizawa, A. 2003. "An Information-Theoretic Perspective of Tf–Idf Measures," Information Processing &

Management (39:1), pp. 45-65.

Aral, S., and Van Alstyne, M. 2011. "The Diversity-Bandwidth Trade-Off," American Journal of

Sociology (117:1), pp. 90-171.

Arellano, M., and Bond, S. 1991. "Some Tests of Specification for Panel Data: Monte Carlo Evidence and

an Application to Employment Equations," The Review of Economic Studies (58:2), pp. 277-297.

Atanassov, J. 2013. "Do Hostile Takeovers Stifle Innovation? Evidence from Antitakeover Legislation

and Corporate Patenting," The Journal of Finance (68:3), pp. 1097-1131.

Audretsch, D. B., and Mata, J. 1995. "The Post-Entry Performance of Firms: Introduction," International

Journal of Industrial Organization (13:4), pp. 413-419.

Bain, J. S. 1956. Barriers to New Competition: Their Character and Consequences in Manufacturing

Industries. Harvard University Press Cambridge, MA.

Becker-Blease, J. R. 2011. "Governance and Innovation," Journal of Corporate Finance (17:4), pp. 947-

958.

Bikhchandani, S., Hirshleifer, D., and Welch, I. 1998. "Learning from the Behavior of Others:

Conformity, Fads, and Informational Cascades," The Journal of Economic Perspectives (2:3), pp.

151-170.

Bird, S., Klein, E., and Loper, E. 2009. Natural Language Processing with Python. O'Reilly Media, Inc.

Blonigen, B. A., and Taylor, C. T. 2000. "R&D Intensity and Acquisitions in High-Technology

Industries: Evidence from the Us Electronic and Electrical Equipment Industries," The Journal of

Industrial Economics (48:1), pp. 47-70.

Blundell, R., and Bond, S. 1998. "Initial Conditions and Moment Restrictions in Dynamic Panel Data

Models," Journal of Econometrics (87:1), pp. 115-143.

Blundell, R., Griffith, R., and Van Reenen, J. 1999. "Market Share, Market Value and Innovation in a

Panel of British Manufacturing Firms," The Review of Economic Studies (66:3), pp. 529-554.

Brav, A., Graham, J. R., Harvey, C. R., and Michaely, R. 2005. "Payout Policy in the 21st Century,"

Journal of Financial Economics (77:3), pp. 483-527.

Bresnahan, T. F., and Reiss, P. C. 1991. "Entry and Competition in Concentrated Markets," Journal of

Political Economy (99:5), pp. 977-1009.

Brown, L. D., and Caylor, M. L. 2006. "Corporate Governance and Firm Valuation," Journal of

Accounting and Public Policy (25:4), pp. 409-434.

Brynjolfsson, E., and McAfee, A. 2011. Race against the Machine: How the Digital Revolution Is

Accelerating Innovation, Driving Productivity, and Irreversibly Transforming Employment and

the Economy. Lexington, MA: Digital Frontier Press.

Bunch, D. S., and Smiley, R. 1992. "Who Deters Entry? Evidence on the Use of Strategic Entry

Deterrents," The Review of Economics and Statistics (74:3), pp. 509-521.

Page 38: Enemies at the Gate? New Entry Threats and …misrc.umn.edu/workshops/2016/spring/Huang_Enemies.pdfEnemies at the Gate? New Entry Threats and Innovation in the U.S. IT Industry Yang

37

Cameron, A. C., and Trivedi, P. K. 2005. Microeconometrics: Methods and Applications. Cambridge

university press.

Carrillo, J. E. 2005. "Industry Clockspeed and the Pace of New Product Development," Production and

Operations Management (14:2), pp. 125-141.

Carroll, G. R., Bigelow, L. S., Seidel, M. D. L., and Tsai, L. B. 1996. "The Fates of De Novo and De Alio

Producers in the American Automobile Industry 1885–1981," Strategic Management Journal

(17:S1), pp. 117-137.

Caves, R. E., and Porter, M. E. 1977. "From Entry Barriers to Mobility Barriers: Conjectural Decisions

and Contrived Deterrence to New Competition," The Quarterly Journal of Economics (91:2), pp.

241-261.

Chandy, R. K., and Tellis, G. J. 2000. "The Incumbent’s Curse? Incumbency, Size, and Radical Product

Innovation," Journal of marketing (64:3), pp. 1-17.

Chemmanur, T., and Tian, X. 2012. "Do Anti-Takeover Provisions Spur Corporate Innovation?," AFA

2012 Chicago Meetings Paper), Available at SSRN: http://ssrn.com/abstract=1572219.

Chen, M.-J., Smith, K. G., and Grimm, C. M. 1992. "Action Characteristics as Predictors of Competitive

Responses," Management Science (38:3), pp. 439-455.

Coad, A., and Rao, R. 2008. "Innovation and Firm Growth in High-Tech Sectors: A Quantile Regression

Approach," Research Policy (37:4), pp. 633-648.

Cockburn, I. M., and MacGarvie, M. J. 2011. "Entry and Patenting in the Software Industry,"

Management Science (57:5), pp. 915-933.

Cohen, W. M., and Klepper, S. 1996. "Firm Size and the Nature of Innovation within Industries: The

Case of Process and Product R&D," The Review of Economics and Statistics (78:2), pp. 232-243.

Crépon, B., Duguet, E., and Mairessec, J. 1998. "Research, Innovation and Productivity: An Econometric

Analysis at the Firm Level," Economics of Innovation and New Technology (7:2), pp. 115-158.

Cui, A. S., and O'Connor, G. 2012. "Alliance Portfolio Resource Diversity and Firm Innovation," Journal

of Marketing (76:4), pp. 24-43.

Eaton, B. C., and Lipsey, R. G. 1979. "The Theory of Market Pre-Emption: The Persistence of Excess

Capacity and Monopoly in Growing Spatial Markets," Economica (46:182), pp. 149-158.

Fine, C. H. 1998. Clockspeed: Winning Industry Control in the Age of Temporary Advantage. Reading,

MA: Perseus Books.

Fontana, R., and Nesta, L. 2009. "Product Innovation and Survival in a High-Tech Industry," Review of

Industrial Organization (34:4), pp. 287-306.

Gatignon, H., Anderson, E., and Helsen, K. 1989. "Competitive Reactions to Market Entry: Explaining

Interfirm Differences," Journal of Marketing Research (26:1), p. 44.

Geroski, P. A. 1995. "What Do We Know About Entry?," International Journal of Industrial

Organization (13:4), pp. 421-440.

Ghazawneh, A., and Henfridsson, O. 2010. "Governing Third-Party Development through Platform

Boundary Resources," the International Conference on Information Systems (ICIS): AIS

Electronic Library (AISeL), pp. 1-18.

Giarratana, M. S. 2004. "The Birth of a New Industry: Entry by Start-Ups and the Drivers of Firm

Growth: The Case of Encryption Software," Research Policy (33:5), pp. 787-806.

Gilbert, R. J., and Newbery, D. M. 1982. "Preemptive Patenting and the Persistence of Monopoly,"

American Economic Review (72:3), pp. 514-526.

Gompers, P., and Lerner, J. 2001. "The Venture Capital Revolution," Journal of Economic Perspectives

(15:2), pp. 145-168.

Goolsbee, A., and Syverson, C. 2008. "How Do Incumbents Respond to the Threat of Entry? Evidence

from the Major Airlines," The Quarterly Journal of Economics (123:4), pp. 1611-1633.

Greene, W. H. 2003. Econometric Analysis. Pearson Education India.

Griliches, Z., Pakes, A., and Hall, B. H. 1988. "The Value of Patents as Indicators of Inventive Activity."

NBER Working Paper No. 2083. Available at: http://www.nber.org/papers/w2083.

Page 39: Enemies at the Gate? New Entry Threats and …misrc.umn.edu/workshops/2016/spring/Huang_Enemies.pdfEnemies at the Gate? New Entry Threats and Innovation in the U.S. IT Industry Yang

38

Hall, B. H. 1988. "The Effect of Takeover Activity on Corporate Research and Development," in

Corporate Takeovers: Causes and Consequences. University of Chicago Press, pp. 69-100.

Hall, B. H., Griliches, Z., and Hausman, J. A. 1986. "Patents and R&D: Is There a Lag?," International

Economic Review (27:2), pp. 265-284.

Hall, B. H., Jaffe, A. B., and Trajtenberg, M. 2001. "The Nber Patent Citation Data File: Lessons, Insights

and Methodological Tools," in Patents, Citations and Innovations. Cambridge, MA.

Hamberg, D. 1963. "Invention in the Industrial Research Laboratory," Journal of Political Economy

(71:2), pp. 95-115.

Hart, O. D. 1983. "The Market Mechanism as an Incentive Scheme," Bell Journal of Economics (14:2),

pp. 366-382.

Hauser, J. R., and Shugan, S. M. 1983. "Defensive Marketing Strategies," Marketing Science (2:4), pp.

319-360.

Hecker, D. 1999. "High-Technology Employment: A Broader View," Monthly Lab. Rev. (122:6), pp. 18-

28.

Henderson, R. 1993. "Underinvestment and Incompetence as Responses to Radical Innovation: Evidence

from the Photolithographic Alignment Equipment Industry," The Rand Journal of Economics

(24:2), p. 248.

Hiemstra, D. 2000. "A Probabilistic Justification for Using Tf× Idf Term Weighting in Information

Retrieval," International Journal on Digital Libraries (3:2), pp. 131-139.

Hoberg, G., and Phillips, G. 2010. "Product Market Synergies and Competition in Mergers and

Acquisitions: A Text-Based Analysis," Review of Financial Studies (23:10), pp. 3773-3811.

Hoberg, G., Phillips, G., and Prabhala, N. 2014. "Product Market Threats, Payouts, and Financial

Flexibility," The Journal of Finance (69:1), pp. 293-324.

Hoberg, G., and Phillips, G. M. 2015. "Text-Based Network Industries and Endogenous Product

Differentiation," Journal of Political Economy (Forthcoming).

Hurdle, G. J., Johnson, R. L., Joskow, A. S., Werden, G. J., and Williams, M. A. 1989. "Concentration,

Potential Entry, and Performance in the Airline Industry," The Journal of Industrial Economics

(38:2), pp. 119-139.

Jacquemin, A. P., and Berry, C. H. 1979. "Entropy Measure of Diversification and Corporate Growth,"

The Journal of Industrial Economics (27:4), pp. 359-369.

Jaffe, A. B., Trajtenberg, M., and Henderson, R. 1993. "Geographic Localization of Knowledge

Spillovers as Evidenced by Patent Citations," The Quarterly Journal of Economics (108:3), pp.

577-598.

Jankowski, R. 1998. Profits, Taxes, and the State. Greenwood Publishing Group.

Jorgenson, D. W., and Stiroh, K. J. 1999. "Information Technology and Growth," American Economic

Review (89:2), pp. 109-115.

Jorgenson, D. W., Stiroh, K. J., Gordon, R. J., and Sichel, D. E. 2000. "Raising the Speed Limit: U. S.

Economic Growth in the Information Age.," Brookings Papers on Economic Activity (31:1), pp.

125-235.

Jovanovic, B., and MacDonald, G. 1994. "The Life-Cycle of a Competitive Industry," Journal of Political

Economy (102:2), pp. 322-347.

Judd, K. L. 1985. "Credible Spatial Preemption," The RAND Journal of Economics (16:2), pp. 153-166.

Kaplan, S. N., and Zingales, L. 1997. "Do Investment-Cash Flow Sensitivities Provide Useful Measures

of Financing Constraints?," The Quarterly Journal of Economics (112:1), pp. 169-215.

Khanna, N., and Tice, S. 2000. "Strategic Responses of Incumbents to New Entry: The Effect of

Ownership Structure, Capital Structure, and Focus," The Review of Financial Studies (13:3), pp.

749-779.

Khessina, O. M., and Carroll, G. R. 2008. "Product Demography of De Novo and De Alio Firms in the

Optical Disk Drive Industry, 1983-1999," Organization Science (19:1), pp. 25-38.

Page 40: Enemies at the Gate? New Entry Threats and …misrc.umn.edu/workshops/2016/spring/Huang_Enemies.pdfEnemies at the Gate? New Entry Threats and Innovation in the U.S. IT Industry Yang

39

Kim, K., Gopal, A., and Hoberg, G. 2016. "Product Market Competition and Corporate Venture Capital

Investment in the It Industry: An Empirical Analysis," Information Systems Research

(Forthcoming).

Kleis, L., Chwelos, P., Ramirez, R. V., and Cockburn, I. 2012. "Information Technology and Intangible

Output: The Impact of It Investment on Innovation Productivity," Information Systems Research

(23:1), pp. 42-59.

Klepper, S. 1996. "Entry, Exit, Growth, and Innovation over the Product Life Cycle," The American

Economic Review (86:3), pp. 562-583.

Klepper, S., and Simons, K. L. 1993. "Industry Shakeouts and Technological Change," International

Journal of Industrial Organization. (23:1), pp. 23-43.

Klepper, S., and Simons, K. L. 1997. "Technological Extinctions of Industrial Firms: An Inquiry into

Their Nature and Causes," Industrial and Corporate Change (6:2), pp. 379-460.

Koski, H. A., and Majumdar, S. K. 2002. "Paragons of Virtue? Competitor Entry and the Strategies of

Incumbents in the U.S. Local Telecommunications Industry," Information Economics and Policy

(14:4), pp. 453-480.

Kuester, S., Homburg, C., and Robertson, T. S. 1999. "Retaliatory Behavior to New Product Entry,"

Journal of Marketing (63:4), pp. 90-106.

Lieberman, M. B. 1987. "Postentry Investment and Market Structure in the Chemical Processing

Industries," The RAND Journal of Economics (18:4), pp. 533-549.

Lukach, R., Kort, P. M., and Plasmans, J. 2007. "Optimal R&D Investment Strategies under the Threat of

New Technology Entry," International Journal of Industrial Organization (25:1), pp. 103-119.

Markides, C. 2006. "Disruptive Innovation: In Need of Better Theory," Journal of Product Innovation

Management (23:1), pp. 19-25.

McAfee, A., and Brynjolfsson, E. 2008. "Investing in the It That Makes a Competitive Difference,"

Harvard Business Review (86:7/8), p. 98.

McCann, B. T., and Vroom, G. 2010. "Pricing Response to Entry and Agglomeration Effects," Strategic

Management Journal (31:3), pp. 284-305.

Mendelson, H., and Pillai, R. R. 1998. "Clockspeed and Informational Response: Evidence from the

Information Technology Industry," Information Systems Research (9:4), pp. 415-433.

Mendelson, H., and Pillai, R. R. 1999. "Industry Clockspeed: Measurement and Operational

Implications," Manufacturing & Service Operations Management (1:1), pp. 1-20.

Milgrom, P., and Roberts, J. 1982. "Predation, Reputation, and Entry Deterrence," Journal of economic

theory (27:2), pp. 280-312.

Mitchell, W. 1989. "Whether or When? Probability and Timing of Incumbents' Entry into Emerging

Industrial Subfields," Administrative Science Quarterly (34:2), p. 208.

Mitchell, W., and Singh, K. 1992. "Incumbents' Use of Pre-Entry Alliances before Expansion into New

Technical Subfields of an Industry," Journal of Economic Behavior & Organization (18:3), pp.

347-372.

Mueller, D. C. 1990. "Profits and the Process of Competition," in The Dynamics of Company Profits: An

International Comparison. Cambridge University Press, pp. 1-14.

Mueller, D. C., and Tilton, J. E. 1969. "Research and Development Costs as a Barrier to Entry," The

Canadian Journal of Economics/Revue Canadienne d'Economique (2:4), pp. 570-579.

O’Connor, M., and Rafferty, M. 2012. "Corporate Governance and Innovation," Journal of Financial and

Quantitative Analysis (47:02), pp. 397-413.

Orr, D. 1974. "The Determinants of Entry: A Study of the Canadian Manufacturing Industries," The

Review of Economics and Statistics (55:1), pp. 58-66.

Porter, M. E. 2008. "The Five Competitive Forces That Shape Strategy," Harvard Business Review

(86:1), pp. 25-40.

Prusa, T. J., and Schmitz Jr, J. A. 1991. "Are New Firms an Important Source of Innovation?: Evidence

from the Pc Software Industry," Economics Letters (35:3), pp. 339-342.

Page 41: Enemies at the Gate? New Entry Threats and …misrc.umn.edu/workshops/2016/spring/Huang_Enemies.pdfEnemies at the Gate? New Entry Threats and Innovation in the U.S. IT Industry Yang

40

Prusa, T. J., and Schmitz Jr, J. A. 1994. "Can Companies Maintain Their Initial Innovative Thrust? A

Study of the Pc Software Industry," The Review of Economics and Statistics (76:3), pp. 523-540.

Rai, A., and Tang, X. 2013. "Research Commentary-Information Technology-Enabled Business Models:

A Conceptual Framework and a Coevolution Perspective for Future Research," Information

Systems Research (25:1), pp. 1-14.

Reinganum, M. R. 1983. "The Anomalous Stock Market Behavior of Small Firms in January: Empirical

Tests for Tax-Loss Selling Effects," Journal of Financial Economics (12:1), pp. 89-104.

Rigby, D. K., Christensen, C. M., and Johnson, M. 2002. "Foundations for Growth: How to Identify and

Build Disruptive New Businesses," MIT Sloan Management Review (43:3), pp. 22-32.

Roodman, D. 2009. "How to Do Xtabond2: An Introduction to Difference and System Gmm in Stata,"

Stata Journal (9:1), pp. 86-136.

Schmalensee, R. 1978. "Entry Deterrence in the Ready-to-Eat Breakfast Cereal Industry," The Bell

Journal of Economics (9:2), pp. 305-327.

Schmidt, K. M. 1997. "Managerial Incentives and Product Market Competition," The Review of Economic

Studies (64:2), pp. 191-213.

Seamans, R. C. 2013. "Threat of Entry, Asymmetric Information, and Pricing," Strategic Management

Journal (34:4), pp. 426-444.

Sebastiani, F. 2002. "Machine Learning in Automated Text Categorization," ACM Computing Surveys

(CSUR) (34:1), pp. 1-47.

Shankar, V. 1999. "New Product Introduction and Incumbent Response Strategies: Their Interrelationship

and the Role of Multimarket Contact," Journal of Marketing Research (36:3), pp. 327-344.

Siegfried, J. J. 1994. "Empirical Studies of Entry and Exit: A Survey of the Evidence," Review of

Industrial Organization (9:2), p. 121.

Simon, D. 2005. "Incumbent Pricing Responses to Entry," Strategic Management Journal (26:13), pp.

1229-1248.

Spence, A. M. 1977. "Entry, Capacity, Investment and Oligopolistic Pricing," The Bell Journal of

Economics (8:2), pp. 534-544.

Sutton, J. 1991. Sunk Costs and Market Structure: Price Competition, Advertising, and the Evolution of

Concentration. MIT press.

Tambe, P., Hitt, L. M., and Brynjolfsson, E. 2012. "The Extroverted Firm: How External Information

Practices Affect Innovation and Productivity," Management Science (58:5), pp. 843-859.

Tata, S., and Patel, J. M. 2007. "Estimating the Selectivity of Tf-Idf Based Cosine Similarity Predicates,"

ACM SIGMOD Record (36:2), pp. 7-12.

Teece, D. J. 1986. "Profiting from Technological Innovation: Implications for Integration, Collaboration,

Licensing and Public Policy," Research Policy (15:6), pp. 285-305.

Tetlock, P. C. 2011. "All the News That's Fit to Reprint: Do Investors React to Stale Information?,"

Review of Financial Studies (24:5), pp. 1481-1512.

Tetlock, P. C., Saar-tsechansky, M., and Macskassy, S. 2008. "More Than Words: Quantifying Language

to Measure Firms' Fundamentals," The Journal of Finance (63:3), pp. 1437-1467.

Thomas, L. A. 1999. "Incumbent Firms' Response to Entry: Price, Advertising, and New Product

Introduction," International Journal of Industrial Organization (17:4), pp. 527-555.

Wheale, P. R., and Amin, L. H. 2003. "Bursting the Dot. Com" Bubble': A Case Study in Investor

Behaviour," Technology Analysis & Strategic Management (15:1), pp. 117-136.

Wiersema, M. F., and Bowen, H. P. 2008. "Corporate Diversification: The Impact of Foreign

Competition, Industry Globalization, and Product Diversification," Strategic Management

Journal (29:2), pp. 115-132.

Wiggins, R. R., and Ruefli, T. W. 2005. "Schumpeter's Ghost: Is Hypercompetition Making the Best of

Times Shorter?," Strategic Management Journal (26:10), pp. 887-911.

Wooldridge, J. M. 2010. Econometric Analysis of Cross Section and Panel Data. Cambridge, MA: MIT

press.

Page 42: Enemies at the Gate? New Entry Threats and …misrc.umn.edu/workshops/2016/spring/Huang_Enemies.pdfEnemies at the Gate? New Entry Threats and Innovation in the U.S. IT Industry Yang

41

Yamawaki, H. 2002. "Price Reactions to New Competition: A Study of Us Luxury Car Market, 1986–

1997," International Journal of Industrial Organization (20:1), pp. 19-39.

Page 43: Enemies at the Gate? New Entry Threats and …misrc.umn.edu/workshops/2016/spring/Huang_Enemies.pdfEnemies at the Gate? New Entry Threats and Innovation in the U.S. IT Industry Yang

42

Figure 1: Number of Unique Words Used in 10-K Product Descriptions (Incumbent)

Figure 2: Number of Startups that Received First-round Funding, and Number of Unique Words

Used in the Collection of Startups’ Product Descriptions

Page 44: Enemies at the Gate? New Entry Threats and …misrc.umn.edu/workshops/2016/spring/Huang_Enemies.pdfEnemies at the Gate? New Entry Threats and Innovation in the U.S. IT Industry Yang

43

Figure 3: New Entry Threats and Ex Post Number of Competitive Rivals for Incumbent (TNIC)

Figure 4: New Entry Threats and Ex Post Operating Performance (Return on Asset) for Incumbent

Page 45: Enemies at the Gate? New Entry Threats and …misrc.umn.edu/workshops/2016/spring/Huang_Enemies.pdfEnemies at the Gate? New Entry Threats and Innovation in the U.S. IT Industry Yang

44

Figure 5: Comparing Turbulent Events between Top 10 Highest-NET Companies

and Top 10 Lowest-NET Companies

Note: Two-sided t-test of group means: Bankruptcy (p=0.329), Layoffs (p=0.000), M&A (p=0.028)

Figure 6a: Average NET Over Time, Military Armored Vehicle Manufacturing

Page 46: Enemies at the Gate? New Entry Threats and …misrc.umn.edu/workshops/2016/spring/Huang_Enemies.pdfEnemies at the Gate? New Entry Threats and Innovation in the U.S. IT Industry Yang

45

Figure 6b: Average NET Over Time, Internet Related Firms and Software Publishers

Figure 6c: Average NET over Time, Biotechnology R&D Services

Page 47: Enemies at the Gate? New Entry Threats and …misrc.umn.edu/workshops/2016/spring/Huang_Enemies.pdfEnemies at the Gate? New Entry Threats and Innovation in the U.S. IT Industry Yang

46

Table 1: Literature on Entry and Incumbent’s Strategic Responses

Paper/Journal Type of Entry

Industrial Setting Strategic variable of

incumbent’s response

Khanna and Tice 2000 /

The Review of Financial

Studies

Diversifying entry Department store Market expansion/retrenchment

Thomas 1999 /

International Journal of

Industrial Organization

Diversifying entry Ready-to-eat cereal industry Pricing, advertising, and

diversification

Yamawaki 2002/

International Journal of

Industrial Organization

Diversifying/Foreign entry Luxury cars Pricing

Simon 2005 / Strategic

Management Journal

Mixed Magazine subscription Pricing

McCann and Vroom 2010 /

Strategic Management

Journal

Mixed Hotel Pricing

Seamans 2013 / Strategic

Management Journal

Not specified Cable TV Pricing

Kuester et al. 1999 /Journal

of Marketing

Not specified Consumer and industrial

goods manufacturers

Product mix and price

Gatignon et al. 1989

/Journal of Marketing

Research

Mixed OTC gynecological product

and airline

Advertising expenditure

Aghion et al. 2009 /The

Review of Economics and

Statistics

Diversifying/Foreign entry Manufacturing Innovation

Koski and Majumdar 2002

/Information Economics

and Policy

Not specified Telecom Pricing, Advertising and

Diversification

Lieberman 1987 / The

RAND Journal of

Economics

Diversifying entry Chemical processing Excess capacity

Goolsbee and Syverson

2008 /The Quarterly

Journal of Economics

Diversifying entry US airline industry Pricing

Page 48: Enemies at the Gate? New Entry Threats and …misrc.umn.edu/workshops/2016/spring/Huang_Enemies.pdfEnemies at the Gate? New Entry Threats and Innovation in the U.S. IT Industry Yang

47

Table 2: Theoretical Perspectives on the Relationship between New Entry Threat and the

Incumbent’s Innovation Response

Theoretical

Perspective

Optimal Strategic

Reaction

Implication for

Incumbent Innovation

Supporting Literature

Pre-emptive market

expansion

Enter into new product

markets to pre-empt entry Increase innovation Eaton and Lipsey 1979;

Gilbert and Newbery 1982;

Schmalensee 1978

Heterogeneous Research

Capability

Underinvest in radically new

and commercially important

inventions, and focus on

“improvement” inventions

Reduce innovation Chandy and Tellis 2000;

Hamberg 1963; Henderson

1993; Mueller and Tilton

1969

Strategic interaction Acquire complementary

assets required for the

commercialization of

innovation; form

interorganizational strategic

alliances with new entrants

Reduce innovation Mitchell 1989; Mitchell and

Singh 1992; Teece 1986

Post-entry defense Cut slack; improve

efficiency; align managerial

incentives

Reduce innovation Gatignon et al. 1989; Hart

1983; Hauser and Shugan

1983; Kuester et al. 1999

Table 3: Top 20 Words with Highest TF-IDF Weights in Entrepreneurial Firms’ Documents in the

Years 2000, 2003, 2006

Year Words List

2000 onlin, internet, softwar, wireless, softwareprovid,

servicesprovid, solut, web, content, broadband, ecommerc,

softwaredevelop, servicesdevelop, platform, media, drug, email,

network, enterpris, patient, portal

2003 diseas, patient, drug, therapeut, cancer, softwar, therapi,

treatment, protein, wireless, discord, video, molecul, inhibitor,

tissu, healthcar, biotechnolog, antibodi, pharmaceut, cell

2006 onlin, diseas, patient, cancer, drug, therapeut, search, publish,

media, video, therapi, cloud, blog, antibodi, tissu, treatment,

game, softwar, advertis, platform

Note: All words are stemmed and pre-processed

Page 49: Enemies at the Gate? New Entry Threats and …misrc.umn.edu/workshops/2016/spring/Huang_Enemies.pdfEnemies at the Gate? New Entry Threats and Innovation in the U.S. IT Industry Yang

48

Table 4: Variable Definitions and Data Sources

Innovation Variables (data source: Compustat & NBER Patent Database)

R&D_intensity𝑖𝑡 Research and Development expenditure to total assets ratio of firm i in year t

Patents𝑖𝑡 Number of patents firm i applied for in year t

WCitations𝑖𝑡 The number of citation-weighted patent applications of firm i in year t

New Entry Threat Variable (data source: VentureXpert & 10K files)

NET𝑖𝑡 A text-based measure of threat from new entry by term frequency–inverse document

frequency weighted cosine similarity between business description of startups and

established firms.

Firm Characteristics (data source: Compustat & TNIC)

Sale𝑖𝑡 Total Sale of firm i in year t (in $ Billion)

Age𝑖𝑡 Number of years since listing of firm i in year t

ROA𝑖𝑡 Operating income before depreciation to total assets ratio of firm i in year t

Asset_tangibility𝑖𝑡 Net property, plants and equipments to total assets ratio of firm i in year t

Leverage𝑖𝑡 Total debt of firm i in year t divided by its total assets

CapExp/Assets𝑖𝑡 Capital expenditure to total assets ratio of firm i in year t

Tobin′s Q𝑖𝑡 Market to book ratio of firm i in year t as defined in Brown and Caylor (2006)

KZ Index𝑖𝑡 Kaplan-Zingales Index (Kaplan and Zingales 1997) is a relative measurement of

reliance on external financing. Companies with higher KZ-Index scores are more

likely to experience difficulties when financial conditions tighten since they may have

difficulty financing their ongoing operations.17

.

TNIC_HHI𝑖𝑡 Herfindahl-Hirschman Index of firm i in year t based on Text-based Network

Industry Classifications (TNIC) (Hoberg et al. 2014).

Industry Level Variables (data source: Compustat & TNIC)

Ind_R&DIntensity𝑖𝑡 Mean of R&D Intensity of all companies in company i’s industry at year t

Ind_SaleGrowthRate𝑖𝑡 Mean of sale growth over last year of all companies in company i’s industry at year t

Ind_Concentration𝑖𝑡 Herfindahl-Hirschman Index of market share by sale in company i’s industry at year t

Ind_ProfitExp𝑖𝑡 Mean of Tobin’s q of all companies in company i’s industry at year t

Ind_Uncertainty𝑖𝑡 Standard deviation of Profit Rate of all companies in company i’s industry at year t

17 Following Chemmanur and Tian (2012), we use the regression coefficients from Kaplan and Zingales (1997) to compute the

KZ index as : 1.002* 39.368* 1.315* +0.28* +3.18*Cash flow Dividends Cash flow Q Leverage

Page 50: Enemies at the Gate? New Entry Threats and …misrc.umn.edu/workshops/2016/spring/Huang_Enemies.pdfEnemies at the Gate? New Entry Threats and Innovation in the U.S. IT Industry Yang

49

Table 5: Summary Statistics and Correlation Coefficients

This table reports the summary statistics for primary variables constructed based on the sample of U.S. public firms in the IT Industries18

from 1997 to 2013.

Please see Table 4 for the description of the variables. Pearson Correlation Coefficients are reported for our sample of 14,410 firm year observations.

Variable

Mean

Std.

dev.

R&D

Intensity NET Sale Age ROA

Asset

Tangibility Leverage

CapExp/

Assets

Tobin

Q

KZ

Index

Correlation Coefficients

R&D Intensity (%) 12.87 15.52

NET 0.07 0.05 0.092*

Sale (Billion) 1.36 7.03 -0.085* 0.040*

Age 15.51 12.37 -0.195* -0.338* 0.254*

ROA (%) -1.26 35.99 -0.645* -0.065* 0.093* 0.178*

Asset Tangibility (%) 13.33 11.91 -0.057* -0.368* 0.113* 0.408* 0.114*

Leverage (%) 9.34 17.21 -0.015 -0.149* 0.057* 0.132* 0.019* 0.341*

CapExp/Assets (%) 3.92 4.27 0.050* -0.048* 0.038* 0.019* -0.017* 0.488* 0.138*

Tobin’s Q 2.48 2.96 0.249* 0.045* -0.031* -0.125* -0.302* -0.072* 0.001 0.052*

KZ Index 0.25 2.69 -0.009 0.009 -0.001 -0.012 0.018* 0.045* 0.166* 0.042* 0.221*

TINC-HHI 0.23 0.21 -0.119* -0.148* -0.065* 0.006 -0.024* -0.137* -0.022* -0.088* -0.031* -0.037*

18 We include all IT Industries, such as hardware, software and IT services industries, which is defined by 4 digital NAICS code: 2211, 3332, 3333, 3336, 3339, 3341, 3342, 3343,

3344, 3345, 3346, 5112, 5161, 5171, 5172, 5173, 5174, 5179, 5112, 5181, 5182, 5413, 5415, 5416 and 5417.

Page 51: Enemies at the Gate? New Entry Threats and …misrc.umn.edu/workshops/2016/spring/Huang_Enemies.pdfEnemies at the Gate? New Entry Threats and Innovation in the U.S. IT Industry Yang

50

Table 6: New Entry Threats and Innovation

This table reports the estimates for R&D Intensity as dependent variables. The sample constructed based on the

sample of U.S. public firms in the IT Industries from 1997 to 2013.

Fixed Effect Random Effect Dynamic panel model

NET as exogenous NET as endogenous

(1) (2) (3) (4)

NET -0.351** -0.074 -0.335* -1.337***

(0.144) (0.114) (0.174) (0.335)

L.R&D Intensity - - 0.119*** 0.122***

(0.040) (0.039)

Ln (Sales) 0.152 0.011 0.863* 1.011**

(0.365) (0.113) (0.515) (0.504)

Ln(Age) 1.079* 0.222 1.291* 0.867

(0.553) (0.302) (0.766) (0.767)

ROA -26.460*** -27.022*** -28.657*** -28.730***

(2.422) (0.294) (2.957) (2.953)

PPE / Assets 16.151*** 9.525*** 14.862*** 14.836***

(2.426) (1.285) (3.321) (3.328)

Leverage -2.049 -2.901*** -3.052 -2.993

(1.324) (0.559) (1.905) (1.908)

Capx / Assets 8.180* 8.071***

13.016* 13.105*

(4.558) (2.422) (7.008) (7.042)

Tobin’s Q 0.178** 0.155*** 0.194 0.194

(0.087) (0.029) (0.121) (0.121)

KZ Index 0.096

0.093*** 0.005 0.003

(0.086) (0.029) (0.057) (0.057)

TNIC HHI 0.087 -1.513*** -0.535 -0.786

(0.530) (0.474) (0.555) (0.564)

Firm Dummies Yes -

Year Dummies Yes Yes Yes Yes

Observations 14,410 14,410 10,490 10,490

# of Firms 2101 2101 1,557 1,557

Adjusted R2 0.761 - -

Note: Robust standard errors in parentheses. *** p<0.01, ** p<0.05, * p<0.1

New entry threats are standardized with mean of zero and standard deviation of one.

The dynamic model in column 3 treats L.R&D Intensity as endogenous variable. The model in column 4 assumes both NET

and L.R&D Intensity are endogenous variables.

Instruments for differenced equation: GMM-type: L(2/.).NET, L(2/.).L.R&D Intensity, i.e., all available lags

from lag2 onward; and all difference of exogenous variables, including year dummies.

Arellano-Bond test results for zero autocorrelation in the first differences errors

Model with NET as exogenous Model with NET as endogenous

Order z Pr > z Order z Pr > z

1 -3.68 0.000 1 -3.79 0.000

2 -1.85 0.064 2 -1.90 0.058

Page 52: Enemies at the Gate? New Entry Threats and …misrc.umn.edu/workshops/2016/spring/Huang_Enemies.pdfEnemies at the Gate? New Entry Threats and Innovation in the U.S. IT Industry Yang

51

Table 7: 3SLS Simultaneous Equations System Estimation

This table reports the 3SLS estimates for R&D Intensity and NET as endogenous variables. The sample is

constructed based on the sample of U.S. public firms in the IT Industries from 1997 to 2013.

Incumbent Eqn. Entry Eqn.

Dependent Variable: R&D Intensity (%) NET

NET -2.845***

(0.672)

Ln (Sales) -0.120

(0.159)

Ln(Age) 2.802***

(0.379)

ROA -26.263***

(0.302)

PPE / Assets 12.392***

(1.347)

Leverage -1.071**

(0.524)

Capx / Assets 9.105***

(2.442)

Tobin’s Q 0.218***

(0.028)

KZ Index -0.028

(0.025)

TNIC HHI -0.290

(0.526)

L.Ind_R&DIntensity (%) -0.012***

(0.002)

L.Ind_SaleGrowthRate 0.000**

(0.000)

L.Ind_Concentration -0.299***

(0.035)

L.Ind_ProfitExp19

0.199***

(0.009)

L.Ind_Uncentainty 0.017

(0.044)

Firm/Industry Dummies Yes Yes

Year Dummies Yes Yes

R2 0.391 0.044

Observations 13,760

Robust standard errors in parentheses. *** p<0.01, ** p<0.05, * p<0.1

Note: new entry threats are standardized with mean of zero and standard deviation of one.

19 Tobin's q is often used as a proxy for profit expectation (see e.g., Jankowsky 1998, p34).

Page 53: Enemies at the Gate? New Entry Threats and …misrc.umn.edu/workshops/2016/spring/Huang_Enemies.pdfEnemies at the Gate? New Entry Threats and Innovation in the U.S. IT Industry Yang

52

Table 8: New Entry Threats and Patents

This table reports the estimates for Number of Patents and Weighted Citation as dependent variables. The sample

constructed based on the sample of U.S. public firms in the IT sector and IT product sector from 1997 to 2002.

Dependent

Variable

Panel A

Full IT Sample

Panel B

IT Subsample Excluding Service20

Number of

Patents

Weighted Citations

Number of

Patents

Weighted Citations

(1) (2) (3) (4)

NET -0.019 -0.091*** -0.028** -0.133***

(0.012) (0.030) (0.014) (0.034)

Ln (Sales) 0.003 -0.043 -0.009 -0.073*

(0.014) (0.036) (0.017) (0.041)

Ln(Age) 0.033 0.098 0.017 0.009

(0.044) (0.123) (0.050) (0.138)

ROA 0.007 0.054 0.011 0.077

(0.024) (0.070) (0.027) (0.079)

PPE / Assets 0.102 0.600** 0.067 0.613**

(0.106) (0.285) (0.114) (0.306)

Leverage -0.074 -0.166 -0.056 -0.187

(0.054) (0.133) (0.062) (0.152)

Capx / Assets -0.114 -0.031 -0.030 0.280

(0.169) (0.475) (0.194) (0.537)

Tobin’s Q 0.007** 0.011 0.007* 0.011

(0.003) (0.007) (0.004) (0.008)

KZ Index -0.005*** -0.015*** -0.006*** -0.014**

(0.002) (0.006) (0.002) (0.006)

TNIC HHI 0.034 0.208* -0.022 0.055

(0.044) (0.118) (0.054) (0.141)

Firm FE Yes Yes Yes Yes

Year FE Yes Yes Yes Yes

Observations 7,824 7,824 6,539 6,539

# of Firms 2089 2089 1738 1738

Adjusted R2 0.890 0.733 0.888 0.737

Robust standard errors in parentheses. *** p<0.01, ** p<0.05, * p<0.1

Note: new entry threats are standardized with mean of zero and standard deviation of one.

20 IT product industries includes IT software, Hardware and Telecom. We exclude IT services industry defined by 4 digital

NAICS code: 5182,5413,5415,5416,and 5417.

2( )tLn Patent 2( )tLn WeightedCitation 2( )tLn Patent 2( )tLn WeightedCitation

Page 54: Enemies at the Gate? New Entry Threats and …misrc.umn.edu/workshops/2016/spring/Huang_Enemies.pdfEnemies at the Gate? New Entry Threats and Innovation in the U.S. IT Industry Yang

53

Table 9: Diversified vs. Specialized Firms: The Effects of NET on Innovation

This table reports the estimates for R&D Intensity as dependent variables. The sample constructed based on the

sample of U.S. public firms in the IT Industries from 1997 to 2013.

Dependent Variables

R&D Intensity

Full Sample Specialized Firms Diversified Firms

(1) (2) (3)

NET -0.821*** -0.466** 0.089

(0.307) (0.223) (0.137)

NET × Diversity 0.573*** - -

(0.221) - -

Ln (Sales) -0.192 0.113 -0.685**

(0.475) (0.647) (0.280)

Ln(Age) 0.946 0.830 0.048

(0.598) (0.983) (0.550)

ROA -27.380*** -27.994*** -22.534***

(3.698) (4.097) (2.831)

PPE / Assets 14.432*** 20.432*** 6.135***

(2.782) (4.405) (1.974)

Leverage -3.353* -2.746 -3.547***

(1.951) (2.928) (0.854)

Capx / Assets 7.763 4.177 11.691***

(6.052) (9.404) (4.160)

Tobin’s Q 0.146 0.091 0.289***

(0.109) (0.127) (0.110)

KZ Index 0.154 0.227 -0.121

(0.129) (0.161) (0.094)

TNIC HHI -0.141 0.240 -0.782*

(0.566) (1.014) (0.428)

Year & Firm Fixed

Effects

Yes Yes Yes

Observations 9,571 5,508 4,063

# of Firms 954 594 360

Adjusted R2 0.736 0.720 0.742

Robust standard errors in parentheses. *** p<0.01, ** p<0.05, * p<0.1

Note: new entry threats are standardized with mean of zero and standard deviation of one.

Page 55: Enemies at the Gate? New Entry Threats and …misrc.umn.edu/workshops/2016/spring/Huang_Enemies.pdfEnemies at the Gate? New Entry Threats and Innovation in the U.S. IT Industry Yang

54

Appendix 1: NET and Turbulent Events - A Qualitative Examination of Year 2009

We select companies with high and low NET values in 2009 to qualitatively examine the industry

composition of the firms as well as their turbulent events in the following five years. There are two

reasons for why we pick firms in year 2009. First, we try to avoid most recent year in our sample, since

we allow a 5-year period to observe the subsequent turbulent events. Second, selecting year of 2009

allows us to minimize the influence from dot-com bubble in 2000 and finance crisis in 2007-2008. We

summarize the industry sectors (4 digital NACIS) of all companies and present this information in Table

A1. As can be seen from Table A1, the majority of low NET companies belong to manufacturing industry

including pharmaceutical and medicine manufacturing, communications equipment manufacturing, and

computer and peripheral equipment manufacturing. These industries represent particularly stable

ecosystem within the high-tech sector. The probable reasons for this stability include: manufacturing in

general has high capital requirements that are natural barriers to entry, markets for manufacturing in the

US are relatively mature and highly concentrated, standards and protocols within the manufacturing

industry are relatively stable, leading to relatively fewer process and product innovations in 2009. By

contrast, the high NET group includes a majority of software publishers, where firms experience high

margins, high growth rates, access to skilled human capital, and relatively low entry barriers. These

factors make this industry particularly attractive to entrepreneurs, and correspondingly incumbents

experience high new entry threat. Table A1 also shows the turbulent events of these companies in the

following 5 years (2010 – 2014). We observe that the incident rates of bankruptcies, layoffs, and M&A

are much greater for high NET firm.

Appendix 2: Analyses of Cash Holdings

We study how an incumbent firm adjusts its cash holdings in response to NET. We compute a firm’s cash

holding as the natural log of firm cash and cash equivalents, and run a fixed effects panel data model with

using cash holding as the dependent variable (Hoberg et al. 2014). We report the results in Table A2. The

results from Column (1) show that on average, firms withhold more cash in year t as new entry threats

Page 56: Enemies at the Gate? New Entry Threats and …misrc.umn.edu/workshops/2016/spring/Huang_Enemies.pdfEnemies at the Gate? New Entry Threats and Innovation in the U.S. IT Industry Yang

55

increase, consistent with Hoberg et al’s (2014) finding that firms are more financially conservative when

their product markets are volatile. Interestingly, in Column (2), we also find a significant moderating

effect of firm product diversification in that diversified firms tend to reserve less cash holdings in the face

of new entry. In the subsample analyses, presented in Column (3) and (4), the estimates of NET further

confirm that a specialized firm reacts to entry more dramatically so that it holds more cash. 21

21

We also conducted a robustness test where we used cash ratio (which is the ratio of cash holdings over assets) as the dependent

variable, and all the findings are consistent.

Page 57: Enemies at the Gate? New Entry Threats and …misrc.umn.edu/workshops/2016/spring/Huang_Enemies.pdfEnemies at the Gate? New Entry Threats and Innovation in the U.S. IT Industry Yang

56

Table A1: Industry Composition and Turbulent Events of High NET vs. Low NET companies, 2009

Company Name 4 Digit NAICS Industry Sector Events in 2010 - 2014

Companies with Low NET Bankruptcy M&A Layoff

China Botanic Pharmaceutical

Inc.

Pharmaceutical and medicine manufacturing

FirstEnergy Corp. Electric power generation, transmission, and distribution

Intellicheck Mobilisa, Inc. Computer and peripheral equipment manufacturing

Intermec, Inc. Computer and peripheral equipment manufacturing Yes

Plantronics, Inc. Communications equipment manufacturing

The Singing Machine, Inc. Audio and video equipment manufacturing

Strasbaugh, Inc. Industrial machinery manufacturing Yes

Wayside Technology Group, Inc.

Professional and commercial equipment and supplies,

merchant wholesalers

World Surveillance Group Inc. Aerospace product and parts manufacturing

WorldGate Communications, Inc. Communications equipment manufacturing Yes

Companies with High NET

Limelight Networks, Inc Wired telecommunications carriers

Health Grades, Inc. Wired telecommunications carriers Yes

Salesforce.com Inc. Software publishers Yes

Convera Corporation Software publishers Yes Yes

THQ Inc. Software publishers Yes Yes

Take-Two Interactive Software,

Inc.

Software publishers

Electronic Arts, Inc. Software publishers Yes

Vocus Inc. Software publishers Yes Yes

Microsoft Corp. Software publishers Yes

Digital River, Inc.

Professional and commercial equipment and supplies,

merchant wholesalers

Yes

Page 58: Enemies at the Gate? New Entry Threats and …misrc.umn.edu/workshops/2016/spring/Huang_Enemies.pdfEnemies at the Gate? New Entry Threats and Innovation in the U.S. IT Industry Yang

57

Table A2: New Entry Threats and Cash Holdings

This table reports the estimates for Log of Cash and Cash Equivalents as dependent variables. The sample

constructed based on the sample of U.S. public firms in the IT industries from 1997 to 2013.

Dependent Variables

Ln(Cash Holdings)

Full Sample Specialized Firms Diversified Firms

(1) (2) (3) (4)

NET 0.100*** 0.187*** 0.136*** 0.030

(0.011) (0.029) (0.017) (0.019)

NET × Diversity - -0.096*** - -

- (0.025) - -

Ln (Sales) 0.509*** 0.533*** 0.471*** 0.661***

(0.018) (0.021) (0.026) (0.036)

Ln(Age) -0.559*** -0.460*** -0.466*** -0.348***

(0.043) (0.047) (0.067) (0.071)

ROA 0.140*** 0.083 0.150*** -0.323**

(0.037) (0.052) (0.053) (0.162)

PPE / Assets -3.065*** -2.837*** -2.664*** -2.968***

(0.163) (0.203) (0.271) (0.296)

Leverage -0.274*** -0.258*** -0.270*** -0.222*

(0.069) (0.080) (0.105) (0.128)

Capx / Assets 0.343 0.714** 0.792* 0.727

(0.241) (0.338) (0.447) (0.468)

Tobin’s Q 0.002 -0.002 -0.004 0.016*

(0.003) (0.004) (0.005) (0.009)

KZ Index -0.009** -0.011** -0.009* -0.025

(0.004) (0.006) (0.006) (0.017)

TNIC HHI -0.051 -0.045 -0.107 0.029

(0.046) (0.052) (0.074) (0.073)

Year & Firm Fixed Effects Yes Yes Yes Yes

Observations 14,410 9,571 5,508 4,063

# of Firms 2100 954 594 360

Adjusted R2 0.889 0.903 0.885 0.913

Robust standard errors in parentheses. *** p<0.01, ** p<0.05, * p<0.1

Note: new entry threats are standardized with mean of zero and standard deviation of one.