Vous êtes sur la page 1sur 12

Analyzing Information Intermediaries in Electronic Brokerage

Robert J. Kauffman Mani Subramani Charles A. Wood


Associate Professor Assistant Professor Doctoral Program
Information and Decision Sciences, Carlson School of Management
University of Minnesota, Minneapolis, MN 55455
{rkauffman, msubramani, cwood}@csom.umn.edu; 612-624-8030
__________________________________________________________________________________

1
Analyzing Information Intermediaries in Electronic Brokerage

__________________________________________________________________________________

ABSTRACT is useful; it allows us to understand how different types


of intermediaries create different kinds of value, how
In the past, full-service stock brokerage firms had a
intermediaries become vulnerable to competitors using
strategic advantage over discount brokers because of the
these new technologies, and how intermediaries react to
control full-service brokers had over the information
competitive threats from firms using Web technology.
provided to the customer. Full-service stockbrokers act
as information intermediaries in that they capture Definitions of Key Terms. We use the term
residual value from the transfer of information to make strategic vulnerability to describe a reduction in market
a profit. Information intermediaries differ from power due to a competitor's use of technology. Strategic
transaction intermediaries, who provide information vulnerability can result in a competitive disadvantage if
freely to the customer and rely solely on selection, the vulnerable company does not address the
efficiency of production and delivery, and the competitors' use of technology by imitating the
relationship with the customer to make a profit. New competitor’s actions or developing alternatives for the
Web-based information technologies allow information consumer that reduce the competitor’s threat. Strategic
to flow more freely and offers customers other sources of vulnerability can result in several situations. First,
information, reducing the strategic advantage enjoyed competitors may deliver superior execution of the same
by the information intermediary. Strategic vulnerability set of value-creating processes. For example, E*Trade
occurs when information intermediaries are challenged (www.etrade.com), a recent entrant to the electronic
by competitors who use employ the new innovations brokerage services market, made it easier for customers
(e.g., electronic commerce technologies) to establish to place orders electronically and thus eliminated the
themselves as alternatives to market leaders. This need for the large staff that is typical of a traditional
research explores how strategic vulnerability differs brokerage firm. Second, competitors may use more
when the market leader is an information intermediary. efficient reconfigurations of their business processes.
We develop a model of the phases of strategic For example, Charles Schwab (www.schwab.com)
vulnerability and discuss three propositions that involve recently began to provide access to research from third
strategic vulnerability, stalling of technological parties -- something that makes firms with dedicated
adoption and value creation that show how information research capabilities in-house more vulnerable.
intermediaries differ from transaction intermediaries.
We define transaction intermediaries in terms of
their reliance upon capabilities to efficiently deliver
products to customers and to communicate with the
1. INTRODUCTION
customer. For example, the main function of discount
The information technologies (ITs) associated with stockbrokers is to match stock sellers with stock buyers.
the World Wide Web give people unprecedented access By doing so, they facilitate transactions that would be
to information. These technologies can change the difficult or impossible without their intermediation.
nature of the competition and transform industrial Transaction intermediaries can experience strategic
structure. This transformation can occur in multiple vulnerability when competitors use technology to
industry contexts when market leaders become become more efficient. For example, E*Trade and
strategically vulnerable to competitors who exploit Web Ameritrade (www.ameritrade.com), among other new
technologies to successfully establish market share. In firms, have emerged as viable alternatives to traditional
this paper, we argue that this transformation occurs in discount brokers by providing services to consumers
two different ways: by enabling links between buyers over the Web and over online services such as
and suppliers for transactions in physical goods and CompuServe. These new competitors are able to
services; and by enhancing the flow of information leverage new technology to provide services
between counterparties in a transaction. This distinction electronically that were usually performed in person or

2
over the phone. As a result, they are able to provide the full-service brokers by acquiring the online information
same services more efficiently than traditional discount needed to make investments and trade at a discount.
brokers. Discount brokers like Charles Schwab were Information intermediaries only reluctantly adopt these
forced to imitate these new entrants to remain technologies of the competitors. For example, in mid-
competitive. 1999, with mounting strategic threats from online
discount brokers, several full-service brokers (e.g.,
We define information intermediaries as firms that
American Express Financial Advisors and Merrill
profit from controlling information flows. They need not
Lynch) were just starting to commit to online trading and
do so by relying on IT solutions, as we will illustrate in
unbundled servicing.
Section 3 of this paper. Information intermediaries
control information that is either desired by the Information intermediaries in the brokerage business
consumer, or information that a supplier would like the also rely on the control generated by restricting
consumer to have, or both. An information information flow as a basis for charging a premium. For
intermediary's control over information enables it to example, discount brokers such as Charles Schwab, a
charge a premium for information access. Competitors transaction intermediary up till just recently, mostly
cause strategic vulnerability for the information relied on efficient stock ordering to remain competitive.
intermediary by using IT to communicate needed The company was not in a powerful position with respect
information to the customer, reducing the value of the to investment information relative to their competition.
information provided by the information intermediary. Full-service brokers, meanwhile, have acted as
information intermediaries, and did not allow
The Intermediation Problem in Brokerage. In the
information to be passed on to the consumer without a
brokerage industry, discount brokers are classified as
fee or a contract.
transaction intermediaries while full-service brokers are
classified as information intermediaries. (See Table 1.) These observations lead us to propose a number of
questions for research:
Table 1. Brokerage Classification
Broker Classification
• What are the determinants of strategic vulnerability
Type for information intermediaries?
Full- Information Intermediaries – Full-service • How is the response to strategic vulnerability of
Service brokers are information intermediaries
Brokers and are able to charge several times what
information intermediaries different from the
discount brokers charge because of the response of transaction intermediaries?
information they provide. • What can an information intermediary do to create
Discount Transaction Intermediaries – Discount
new value to remain a viable competitor in its
Brokers brokers are transaction intermediaries and
exist solely to match a stock buyer with a marketplace?
stock seller without providing stock The answers that we provide to these questions
information or advice. about organizational strategy for intermediation in this
paper are applicable in a number of contexts (e.g., real
In the brokerage industry, full-service brokerage estate, the insurance industry, mortgage lending, and
firms over time developed capabilities that allowed their more). However, we have chosen to focus on the
financial advisory staff to aggregate company and financial services industry, and electronic brokers in
industry information in a timely manner to support better particular because they provide a leading opportunity for
purchase decisions by their customers. The full-service academic researchers to observe and explain the strategic
stock brokers' control over company information vulnerability of information intermediaries.
traditionally allowed them to charge several times as
much as discount brokers. Discount brokers, as
transaction intermediaries in this case, provided the same 2. LITERATURE REVIEW
basic service as full-service brokers (e.g., stock To examine these questions, we use three different
purchases), but full-service brokers intermediaries) bodies of knowledge to develop our perspective on
would provide additional information to enable the intermediation:
investor to make intelligent purchase decisions.
• Economic theory (Biglaiser, 1993;
Today, however, electronic brokers such as Charles
Demsetz, 1968; Rubinstein and Wolinsky,
Schwab and E*Trade use the Web to provide free,
1987) explains why intermediary exist in terms
searchable company and industry information. As a
of their role in increasing the likelihood of
result, some investors will be able to bypass expensive

3
transaction matching, and why sellers and where everyone's needs are different, such as with
buyers are willing to subsidize these activities. insurance, real estate, or investing, an intermediary can
use her knowledge to act as an expert, increasing the
• Transaction costs theory (Coase, 1937; likelihood that the consumer will find products that are
Williamson, 1979; Malone, Yates and suited to his individual needs (Biglaiser, 1993). For
Benjamin, 1987) is a subset of economic theory example, stockbrokers and customers discuss what
that explains how firms use intermediaries to stocks to invest in. The broker acts as an expert to
reduce the costs of transactions. New provide information needed by the customer to make a
technology that facilitates the same transactions purchase.
causes strategic vulnerability.
An intermediary also facilitates transactions between
• Social network theory uses the idea of consumers and suppliers, using expertise to make the
structural holes (Burt, 1992) to describe how supplier and consumer better off (Biglaiser, 1993).
"disconnected" networks cannot share Rubinstein and Wolinsky (1987) describe how
information. Information intermediaries bridge intermediaries facilitate transactions when it is
structural holes, profiting from members of improbable or inefficient and timely consuming to match
these networks who have to pay for information a buyer and a seller. Consequently, if a match becomes
originating from the other network. more probable or more efficient and less time
Competitors use Web technology to communicate consuming, then the intermediary becomes vulnerable
information that was previously only available through since the intermediary’s services will not be as valuable
information intermediaries, thereby closing structural to the buyer and seller.
holes. Organizational theory and the knowledge-based Advances in communication technology that
view of the firm (Nonaka and Takeuchi, 1995; Seely increases the ease of communication can reduce the
Brown and Duguid, 1998) define the firm as a set of value of an information intermediary's services.
capabilities and collective knowledge. Information Consumers who have access to Web information can
intermediaries' vulnerability, to some extent, can result avoid the premiums charged by the information
from reductions in the value of their information. Hence, intermediary. For some consumers, the expertise of the
firms that are strategically vulnerable must discover intermediary may still be of some use, but the marginal
ways to develop and bundle products and services that value is decreased. Malone, Yates, and Benjamin (1987)
customers find valuable. apply transaction costs theory to predict that firm
2.1. Intermediaries As Transaction Facilitators hierarchies will decrease in size and may dissolve into
self-organizing market structures due to advances in
Intermediaries are vital to a smoothly functioning communication technology. As competitors use the Web
market because they reduce the costs that buyers and to provide information, the information intermediary
sellers incur in making transactions. Without them, becomes vulnerable.
transactions would occur only if the transaction costs
(such as search costs, contract bargaining, risk of bad 2.2. Intermediaries As Bridges Over Structural Holes
transaction due to faulty knowledge, etc.) were less than Burt (1992) introduced the idea of structural holes, a
the total value of the transaction. Coase (1937) and later perspective associated with social network theory. A
Williamson (1979) reasoned that firms exist to decrease structural hole occurs when two networks (e.g., suppliers
the costs of transactions. Similarly, brokers exist and consumers) are not connected. By "not connected,"
because they reduce transaction costs to an acceptable Burt means that actors (individuals, organizations or
portion of transaction value, thereby creating motivation industries) in one network are not reachable by any actor
for buyers and suppliers to work with them. The profit in another network, because the two networks are
charged by an intermediary is less than or equal to the disjoint. No information can flow through the structural
buyer’s and seller’s utility of the services provided by hole, even though actors in both networks would benefit.
the intermediary. These services allow a timely
transaction match to occur (Rubinstein and Wolinsky, An information intermediary creates value by
1987). bridging this structural hole and allowing information to
flow between networks. This intermediary can exert
Intermediaries are best suited to conditions in which some control over both networks by choosing what
demand occurs in the presence of heterogeneous information to transfer, and, therefore can profit from her
consumers, where information must be discovered about position as a bridge (Burt, 1992). Figure 1 shows how a
the nature of the transaction goods. Intermediary- single intermediary (Actor A) bridges the structural holes
supported knowledge transfers tend to make financial between Networks A and B, A and C, and B and C.
markets efficient, for example. In market situations

4
Actor A controls the flow of information between the theory states that firms are knowledge organizations, and
networks, and can use her gate-keeping influence to that profitability rests on the generation and synthesis of
profit from any other participant (indicated by the black organizational knowledge (Kogut and Udo, 1992).
circles) who requires information from a different Competitive advantage results from cultivating this
network. (See Figure 1.) knowledge to develop core competencies. Seely Brown
and Duguid (1998) suggest that firms gather experience
Intermediaries act as a bridge over a structural hole
and knowledge when firm members work together in
between the network of sellers or information providers
communities of practice. Communities of practice
and the network of buyers. For example, full-service
combine explicit information with experience to develop
stockbrokers provide information to the consumer about
tacit information that is not easily transferred over an
various securities and influence the consumer's purchase
electronic medium (Nonaka, 1994). Customers often
decisions. In addition, the broker can often charge the
have access to data, consisting of facts without context,
seller for providing such information to the buyer, such
but they may not have access to information or
as in the case of limited partnerships (Eichenwald, 1995)
knowledge, which create surprise value as facts take on
or initial public offerings (Klein, 1998), thus profiting
meaning within context (Cohen, 1999). Firms can use
from both the seller and the buyer.
tacit knowledge to help customers navigate through
Figure 1. An Information Intermediary Bridges a complex situations in a way that communication via the
Structural Hole Internet cannot support.
When an insufficient amount of useful knowledge is
accrued, according to Seely Brown and Duguid (1998),
the value of the knowledge provided by the firm over
time is reduced and the firm loses competitive
advantage. The Internet exacerbates this problem by
allowing faster information dissemination and sharing,
often making existing knowledge obsolete. Firms must
develop and retain tacit knowledge, and develop
techniques to market and package their unique
capabilities for customers.
Strategically vulnerable firms need to decide how to
Although an intermediary provides a valuable create and bundle knowledge products in ways that are
function in filling a structural hole, we stress that the difficult for competitors to duplicate. A bundling
intermediaries' central position as a bridge over a strategy can be profitable when marginal production
structural hole tends to give the broker control over the costs are low, there is much return business, and
consumer -- control that may not be in the best interest of consumer needs are homogeneous (Bakos and
the customer (Arya, Fellingham and Young, 1993). Brynjolfsson, 1998). For instance, a stockbroker may
First, brokers may exhibit opportunistic behavior, taking charge $2100 per year for unlimited online trades,
advantage of their position as a bridge over a structural advise, and financial statements. Such bundling may be
hole, to restrict the flow of information to the consumer. easy to implement using existing Web technology, but
For example, Eichenwald (1995) showed how hard to duplicate. An unbundling strategy can be
Prudential-Bache's tax shelter brokers, unknown to the profitable when customer needs are heterogeneous,
parent company and investors, manipulated transactions repeat sales are minimal, or production costs are high
and fraudulently used an investor's money to cover a (Bakos and Brynjolfsson, 1998). For example, brokers
their own investment losses. Second, brokers may not can unbundle their services into fee-based-per-service
share the same values and priorities as the customer. For products, calibrating their customers' willingness-to-pay
example, a stockbroker may understand a given industry for advice and services. Such unbundling removes
better than other industries and therefore try to steer implicit subsidies and allows firm knowledge to be
customers toward her area of expertise regardless of the leveraged.
investment needs of the customer.
2.3. Intermediaries as Experts and Sellers of 3. THEORETICAL FRAMEWORK AND
Knowledge PROPOSITIONS
Nonaka and Takeuchi's (1995) knowledge-based We next use these theoretical perspectives to
view of the firm represents the firm as a collection of develop a framework for analyzing strategic
knowledge, not as a collection of transactions. The

5
vulnerability and intermediation that supports the normative guidance about how firms should develop
specification of three propositions. knowledge that would "fill" a structural hole, creating
opportunities for competitive advantage and improved
3.1. A Strategic Vulnerability Framework for
appropriability of value. The knowledge-based view of
Intermediation
the firm also argues that firms must constantly add value
The three perspectives -- economic analysis of in customer relationships by developing new knowledge
intermediation, social network theory, and the that results in new products and services that are highly
knowledge-based view of the firm -- each comment on valued in the marketplace. It emphasizes that sustainable
different aspects of the information intermediary. The competitive advantage is a by-product of continuing
first explains why intermediaries are formed, and how innovation.
their existence makes buyers and suppliers better off.
We formalize our use of the theory in Table 2 by
The literature suggests ways in which newly efficient
defining four phases of strategic vulnerability for
high technology intermediaries can destabilize market
intermediaries. We indicate the distinctive differences in
structure, leading to the vulnerability of the information
the likely experiences of transaction intermediaries and
intermediary. The latter two perspectives offer
information intermediaries. (See Table 2.)

Table 2. Phases of Strategic Vulnerability


Phase Transaction Intermediaries Information Intermediaries
I: Intermediation Intermediation is accomplished through Intermediation is accomplished by bridging a
the traditional economic role of efficiently structural hole and controlling the level of
matching sellers and buyers in a way that information between two networks. (TC, SN)
reduces transaction costs. (TC)
II: Vulnerability Vulnerability exists when a competitor's Vulnerability exists when technology allows
more efficient processes reduces or competitors to use communication innovations (e.g.,
eliminates the relative economic the Web) to close the structural hole bridged by the
efficiency of the transaction intermediary. information intermediary. (EC, SN)
(EA)
III: Resistance There is usually no resistance. Transaction There is usually strong resistance as information
intermediaries rush to develop knowledge intermediaries struggle to maintain profits and
to copy the success of the competitor who position over the structural hole. (EC, SN)
is challenging them. (EA)
IV: Adoption, Transaction intermediaries develop Information intermediaries must develop knowledge
Extinction, knowledge to successfully duplicate the to compete in the new environment. New products
or Successful innovation and are, once more, or unbundled products may be necessary that let
Resistance competitive, or they fail and become them add value in the new competitive environment.
extinct or at least reduced in importance. If the company stalls too long, it will be hurt. The
(EA, KBV) information intermediary may successfully
reestablish the structural hole and its position as a
bridge over it, but this is unlikely since any such
attempt would be met with resistance from both
competitors and customers. (EC, SN, KBV)
Legend: EA = economic analysis; TC = transaction cost theory; SN = social network theory; KBV = knowledge-base view of the firm

3.2. Propositions can change the dynamics of competition by giving


competitors who employ the technology more time to
Strategic vulnerability elicits different responses
gain a foothold or reach critical mass in the new
from information intermediaries than it does from
competitive landscape. As well, information
transaction intermediaries. Information intermediaries
intermediaries can become vulnerable if certain elements
derive revenue by bridging the structural hole and
are in place, including enabling technology and
controlling information. Information intermediaries are
competitors that would benefit if the structural hole were
vulnerable when communication technology reduces the
closed.
premium that information intermediaries charge.
Consequently, information intermediaries resist the move Our research question "What are the determinants of
to new technology, often issuing press releases strategic vulnerability for information intermediaries?" is
describing how the new technology is bad for the addressed by:
consumer. This resistance to adopt the new technology

6
• The Strategic Vulnerability Proposition: Table 3. Three Propositions for Analyzing
Information intermediaries are subject to strategic Intermediary Strategies
vulnerability from competitors when: Three Transaction Information
(a) an information intermediary profits Propositions Intermediaries Intermediaries
because of its position as a bridge over a Strategic Intermediaries are Intermediaries are
Vulnerability vulnerable because vulnerable because
structural hole and its competitors would profit competitors competitors can bypass
if that structural hole were closed; become more customer's dependence
(b) communication technology exists that efficient due to on the intermediary's
technical information.
can provide information previously only
innovation.
available via the information intermediary; and, Stalling Intermediaries Intermediaries usually
(c) the information intermediary's Adoption often try to stall, trying to protect
duplicate their their profitable position
customers use this communication technology.
competitor's as bridge over the
Using observations from different industries, we success. structural hole.
illustrate differences in behavior between Value Intermediaries try Intermediaries need to
transaction and information intermediaries in Creation to duplicate the find new product
their reactions to technical innovations that competitor's value bundling options that
allow more efficient communication. to maintain their add value for the client
market share. and leverage the
The research question "How is the response to Intermediary's
strategic vulnerability of information intermediaries knowledge that is not
different from transaction intermediaries?" is addressed available to the
by: competitor.

• The Stalling Adoption Proposition: Unlike


transaction intermediaries that rush to duplicate an 3.3. Other Examples of Stalling and Imitating
innovation, if an intermediary's main source of We assert that when intermediaries profit from
profit is through the control of information, then controlling information, and competitors use technology
that intermediary will "stall" and resist imitation of to provide the same information, the information
competitors’ technological innovations that intermediaries will first stall to imitate the competitors
enhance the transfer of this information. because such imitation may make it difficult for current
As an industry is transformed and structural holes customers to differentiate between the information
are closed by competitors, information intermediaries intermediary’s products and the competitor’s products.
will no longer be able to charge merely for information. When competitive pressure continues to increase, the
They will need to develop new products and services that information intermediary will eventually try to rebundle
are a combination of components of existing products products and services in an attempt to stop the erosion of
and newly developed products that are valued by the their customer base and to reclaim lost market share.
firm's customers. Our final proposition addresses the In the interest of clarification, three points must be
research question, "What can an information understood regarding the predicted phases of strategic
intermediary do to create new value and stay a viable vulnerability shown in Table 2. First, we recognize that
competitor with respect to long-time customers?" information intermediaries often perform value-added
• The Value Creation Proposition: A firm that functions, such as filtering, customization, or
acts as an information intermediary but is now aggregation. However, while these services are valuable,
vulnerable due to advances in communication if the information intermediary commands a higher price
technology will eventually be forced to change the for controlling information -- as well as offering these
bundling their products to be more knowledge- services -- then the price it can charge for its services
intensive, specialized, and competitively-priced to will be reduced. This is because the information
attract more customers. intermediary’s clients derive a portion of the products’
value from information that is now available at a fraction
We next compare these propositions from the of the cost.
perspective of the transaction intermediary and the Second, it is obvious that competitors are necessary
information intermediary. As Tables 2 and 3 illustrate, to generate strategic threat. If no competitors are
there is reason to believe that transaction and information attempting to close a structural hole that is bridged by an
intermediaries are quite different.

7
information intermediary, then the information 4.1. Methodology
intermediary will not feel threatened and may adopt new
Our methodology in this research is an industry case
communication technology, such as the Web, to make its
study. It is appropriate for two reasons. First,
current business processes more efficient.
case studies aid the exploration of evolving areas,
Third, being an information intermediary that is enabling the construction of new explanatory
threatened by competitors is not the only reason to stall theoretical perspectives. With the recent arrival
to adopt a new technology. For example, if new of Internet-focused business models, empirical
technology causes a high degree of change to existing methods are often suitable; few data exist for the
business practices, a firm may stall while trying to kinds of phenomena we address here. Second,
incorporate this new technology. For example, Dell case studies offer an opportunity to identify
computers primarily sold mail-order computers over the settings in which significant future research
phone. For Dell, the move to the Internet simplified efforts -- analytical, empirical or experimental --
some of its business processes. Compaq, on the other are likely to provide useful normative guidance
hand, had a network of resellers and chains. Compaq for management.
saw no need to rush to the Internet to sell computers and
Eisenhardt (1989) and Tsoukas (1989) remind us
was more concerned about the effect that direct sales
that in-depth analysis of a single system does not
would have on existing value chain relationships.
preclude arriving at valid explanations and relevant
Thus, we assert that there are many reasons why conclusions, though they may be subject to concerns
firms may react differently to new technology. about external validity. Moreover, the case study
However, if a firm is an information intermediary, it is method enables us to examine responses of information
our observation that it will stall rather than adopt intermediaries in detail and to use information from the
technology that its competitors use to close structural brokerage industry as a lens on firm behavior in other
holes. Furthermore, rather than using a high level of industries. To address generalizability issues from the
imitation of their competitors (such as Compaq Express study of a single case, we examine other industries in the
did when it finally started imitating other online next section that employ information intermediaries to
computer vendors like Dell), when the information see if they share common elements.
intermediaries finally adopt the new technology, they
4.2. The Brokerage Industry
will rebundle their products to differentiate them from
their competitors. Discount brokers charge little but provide less
information than full-service brokers, who often charge
many times more. We next analyze intermediation in the
4. INFORMATION INTERMEDIATION IN THE brokerage industry from the point of view of our
BROKERAGE INDUSTRY framework.
The brokerage industry provides an appropriate context Full-Service Brokers. Full-service brokers provide
for the study of the effects of competitors' Internet- investors with valuable information for investment
focused business models on traditional full-service decision-making. Aggregating and interpreting
brokers as information intermediaries. In this section, information for the investor requires a complex network
we will show why full-service stockbrokers can be of sources that are dedicated to constantly monitoring
considered as information intermediaries, and how their company information. Full-service stockbrokers convey
reactions to the efforts of online discount brokers are this information to the investor at a premium. Figure 2
different than those of transaction intermediaries. shows how the full-service broker bridges a structural
hole between the investor and information sources. (See
Figure 2.)
Figure 2. Brokerage Market Network Structure With
Full-Service Broker Intermediation

8
observer remarks that electronic brokers are "giving
away so much free data and research to attract traffic that
they're making once-valuable information virtually
worthless" (Lux, 1997, p. 92). As discount brokers give
investors access to corporate financial information (via
SEC EDGAR or Yahoo Finance), aggregated industry
information (from Bloomberg or Bridge), and analysts'
reports (from FirstCall), the need for a full-service
broker is diminished. In this sense, technology closes
the structural hole. (See Figure 4.)
The full-service broker is an information Technological Innovation and Stalling Adoption.
intermediary that is positioned over a structural hole -- Full-service stockbrokers have existed not only to match
the investor has no connection to the other network buyers and sellers of stocks, but also to advise the
actors (e.g., firm and industry analysts, the stock investor. Full-service stockbrokers acted as a structural
exchanges and the firms themselves). Therefore, the hole between networks of analysts, companies and
full-service broker can exert some influence over investors. Investors needed stockbroker information, but
investor decision-making, and will have the ability to could not be sure if the stockbroker gave them good
charge a premium for information. advice.
Discount Brokers. Investors who have access to Figure 4. Broker Market Network Structure with the
needed information or refuse to pay premium prices use Internet
discount brokers to buy stock. Discount brokers charge
less than full-service brokers but don't provide
information to the investor that full-service brokers
provide. Although they provide stock exchange access,
they do not provide advice or additional information
about companies or industries. (See Figure 3.) Often
their business model precludes them from bearing the
risk of lawsuits that might arise due to investment
recommendations to their clients.
Figure 3. Brokerage Market Network Structure with
Discount Brokers Although full-service stockbrokers would charge a
commission that was several times higher than the
discount broker, many investors would pay this higher
commission since stockbroker advice could lead to
higher profits. Unlike discount brokers, no full-service
stockbrokers rushed to embrace the Web as a viable
4.3. Strategic Vulnerability in Brokerage channel:
Discount brokers can use Web technology to True, full-service stockbrokers and their online
provide terabytes of easily searchable data available competitors are converging. Wall Street's retail
about companies to the investor, without taking any powerhouses are ramping up new electronic
fiduciary responsibility for its contents. Through their offerings. But out on the Web, the two camps are
use of the Web, discount brokers allow individuals to still living in different worlds. Visit even the most
find information they need for investment decision- advanced of the traditional brokers' Web sites, and
making, threatening the full-service broker, who builds you'll come away thinking that investing is still a
this capability into its service bundle for a fee. dark art best practiced under the tutelage of trained
Electronic Brokerage on the Internet. professionals. None yet offer online trading.
Communication technology changes the information Virtually every link you pursue leads sooner or later
intermediary's position. Discounters who remain to one message: call your broker. Over at the
reluctant to give advice directly (for liability or online brokers' sites, however, the democratization
availability reasons, for example) can use the Internet to of investing is in full swing … (NcNamee, 1999, p.
provide consumers with a new spectrum of information. 120).
This decreases the full-service brokers' control. One

9
Full-service stockbrokers resisted moving online our stalling adoption proposition. However, they are
because electronic transactions decrease the value of starting to develop new products and new business
their brokers' activities. However, even though full- models based on core competencies, for example,
service brokers control most of the assets in the describe new business models and bundling techniques
brokerage industry, online trading is beginning diminish for knowledge-based brokerage services:
full-service brokers' market share. Market leader Merrill
Lynch has been a leading naysayer on online investment • Prudential Securities will charge $24.95 for online
till just recently (Merrill Lynch, 1999), when the or full-service broker trades via an account that
pressures it has experienced in its retail brokerage charges investors an annual fee of roughly 1% to
business led to its first money-losing quarter since 1989. 1.5% of assets (Gasparino and Buckman, 1999a)
Although investors are trading shares in record numbers • Salomon Smith Barney contemplates online trading
and the Dow-Jones Industrial Average has jumped to for its "Asset One" (minimum $100,000) accounts.
over 10,000, Merrill had to lay off over 4,000 employees Investors will pay fees ranging from 0.5% to 2% of
between October 1998 and April 1999. Meanwhile, assets, and get online trades and "free" advice.
online discount brokers (e.g., E*Trade, Ameritrade, (Gasparino and Buckman, 1999a)
Charles Schwab, etc.) were handling about 340,000
trades per day (nearly one in seven that occur on the • Merrill Lynch now offers trades for $29.95 per trade
exchanges), an increase of 34% over the prior three plus a minimum annual fee of $1,500 that allows
months, and nearly 125% beyond the volumes that clients to seek advice and use Merrill’s online
occurred in 1997. By the end of 1999, this volume will resources like financial planning, research reports,
amount to about 14% of all stock trades that occurred on pre-approved mortgages, and free access to ATM
the market, nearly double from 1998, with more than machines (Gasparino and Buckman, 1999b; Merrill
$500 billion assets now controlled by electronic brokers. Lynch, 1999)
(This information was from news by Reuters on the Full-service brokers are at a point were competition
World Wide Web, various dates (www.reuters.com).) has damaged performance. In response, these firms are
Online competitors have taken advantage of bundling products to be more knowledge-intensive,
Merrill's reluctant to be a full participant in the online specialized, and competitively priced to attract
trading made, and are capturing market share at the customers. This outcome is illustrative of our value
expense of the full-service broker: creation proposition.

... Merrill's [7%] percentage increase pales


compared with Internet brokers. Transaction 5. TRANSFORMATION OF OTHER INDUSTRIES
revenue (composed mostly of brokerage
commissions) soared nearly 2.4 times in the first Do we see similar processes occurring in other
quarter at E*Trade Group Inc., to $90.5 million. … industries where information intermediaries are
Those investors aren't just using "play money" for prominent? Does the theoretical perspective that we
cyber-trading. … 22% of the online households offer seem to be borne out elsewhere in American
had more than half their portfolios with the industry? In this section, we consider three other
Internet-investment firms, instead of their full- industries that appear to offer supportive evidence.
service brokers (Gasparino and Buckman, 1999a, Real Estate. In the real estate industry, real estate
C1). brokers' main source of profit lies in controlling
residential multiple listing service (MLS) information
Framework Application. In years now past, the that the seller cannot update and that a buyer is unable to
full-service brokers occupied the position that bridged access. Strategic vulnerability arises from new
the structural hole. Discount brokers have benefited by competitors like Owners.com (www.owners.com), which
closing the structural hole bridged by the full-service provides "for sale by owner" (FSBO) listings of
brokers, such that latter no longer have such an obvious properties, thereby bypassing the expensive MLS realtor.
competitive advantage. This follows the logic of our While many realtors have web sites where potential
strategic vulnerability proposition. Many investors use buyers can view homes (without addresses) for sale, no
the Web and can retrieve information provided by realtor has yet made the move to allow addressed listings
discount brokers, thus enabling investors to forego the or transactions to occur electronically. In this sense,
cost of a full-service broker. realtors are currently stalling until the industry can
Full-service stockbrokers have so far resisted the determine how to rebundle services to face the strategic
move to online trading, a situation that is described by

10
vulnerability brought about by competitors' threats of Wit Capital and other Internet-based investment banks to
online services. exploit this new channel for capital subscription.
Automobiles. Automobile dealers also can act as
information intermediaries; they provide car buyers with
6. CONCLUSIONS
information that can help them to make a purchase.
Historically, dealers were in a position of information In this paper, we have made three contributions
control. They would only reveal car information that towards developing a better understanding of the
was in their best interests. For example, defects, strategic issues associated with information
evidence of poor performance, and manufacturer price intermediaries. First, we identified different phases of
information were hidden from the consumer. Now, reactions to strategic vulnerability that differ for
traditional dealers face online competitors (e.g., information intermediaries and transaction
AutoByTel (www.autobytel.com) and Microsoft's intermediaries. Information intermediaries are reluctant
CarPoint (carpoint.msn.com)), who provide information to use communication technologies because it weakens
about manufacturers' models and dealer costs, their competitive advantage as bridges over structural
performing intermediation at fraction of the cost and holes. In contrast, transaction intermediaries reduce
overhead of traditional car dealers. vulnerability by copying the innovations of their
competitors. Second, our strategic vulnerability
According to the Boston Consulting Group
framework shows how information intermediaries differ
(Middlemiss, 1998), one of every six people shopping
from transaction intermediaries, especially in terms of
for an automobile uses the Web to get information or to
their control of information as a means of adding value
make a purchase. And, by 2000, 50% of U.S. auto sales
in their marketplaces.
will be to people who used the Web to research, buy, or
lease their cars. All the determinants of the strategic Third, we developed a strategic framework that
vulnerability proposition are present: shows how information intermediaries can create value
that is difficult to duplicate through Web technology.
• the dealers span a structural hole;
Web technology enables the transfer of information and
• technology that is used by car buyers is being reduces the value of information intermediaries' services
employed by traditional dealers' competitors to and capabilities. We described several industries in
eliminate their competitive advantage; which information intermediaries profit from bridging
• although car dealers have web sites, these sites structural holes. Our theory predicts that information
convey mostly advertising information, but still do intermediaries in these industries have a higher
not provide the extensive information that car buyers probability of becoming vulnerable: communication
have come to associate with the Internet car sales technology allows competitors to transfer information to
websites. the consumer, thereby allowing competitors to threaten
the information intermediary's traditional strengths.
Clearly, car dealers have been stalling. They have
avoided providing information or allowing online Although a single industry case study of the
purchases, because it has been in their interests to do so. brokerage industry limits our ability to generalize, and
It remains to be seen how car dealers can rebundle their offer a broad-based theory, nevertheless, we have
products to make them more attractive, and maintain provided exploratory evidence of information
their brick-and-mortar margins. intermediary vulnerability and stalling technological
adoption in other industries. As we move into the 21st
Initial Public Offerings (IPOs). Investment century, these competitors -- and the traditional
bankers (e.g., Goldman Sachs, Morgan Stanley, etc.) industries that they represent -- may be blind-sided by
charge significant premiums based on value created in new competition with new business that involve direct
the capital formation process. Their competitive links in the social networks in which they control the
advantage lay in controlling information about firm risk flow of information. The multiple theoretical
and value, and investors' risk profiles. Upstarts such as perspectives that we have offered in this paper offer a
Wit Capital (www.witcapital.com) and E*Trade starting point for more in-depth analysis, and expansion
(www.etrade.com) make investment banks vulnerable by to other application areas when more complex instances
creating new electronic financial markets over the of information intermediation occurs.
Internet (Klein, 1998). Investment bankers are stalling to
continue profiting from the structural hole that they
bridge, but already they are making arrangements with

11
17. Merrill Lynch, "Merrill Lynch Sets New Industry
Standard for Advice, Access, and Choice in Personal
REFERENCES
Financial Services," Press Release, June 1, 1999
1. Arya, A., Fellingham, J. C., and Young, R. A. "The (available at http://www.merrilllynch.com/
Effects of Risk Aversion on Production Decisions in woml/press_release/index.htm).
Decentralized Organizations," Management Science, 18. Middlemiss, J. "Autobytel Drives Car Shoppers
39, 7, 1993, 794-805. Through the Internet," Bank Technology News,
2. Bakos, Y., and Brynjolfsson, E. "Bundling October 1998, 1.
Information Goods: Pricing, Profits and Efficiency," 19. Nonaka, I. "Dynamic Theory of Organizational
Working paper, Center for Research on Information Knowledge Creation," Organization Science, 5, 1,
Intensive Organizations, Stern School of Business, 1994, 14-37.
New York University, New York, NY, 1999. 20. Nonaka, I., and Takeuchi, H. The Knowledge-
3. Biglaiser, G. “Middlemen as Experts,” RAND Creating Company: How Japanese Companies
Journal of Economics, 24, 2, Summer 1993, 212- Create the Dynamics of Innovation, Oxford
223. University Press, New York, NY, 1995.
4. Burt, R. S. Structural Holes: The Social Structure of 21. Rubinstein, A., and Wolinsky, A. "Middlemen," The
Competition, Harvard University Press, Cambridge, Quarterly Journal of Economics, 102, August 1987,
MA, 1992. 581-594.
5. Coase, R. H. "The Nature of the Firm," Economica, 22. Schifrin, M. "The Bull Has an Identity Crisis,"
4, 1937, 386-405. Forbes, April 5, 1999, p. 108.
6. Cohen, D. "Toward a Knowledge Context: Report 23. Seely Brown, J., and Duguid, P. "Organizing
on the First Annual U.C. Berkeley Forum on Knowledge," California Management Review, 40, 3,
Knowledge and the Firm," California Management 1998, 90-111.
Review, 40, 3, 1999, 22-39. 24. Tsoukas, H. "The Validity of Idiographic Research
7. Demsetz, H. "The Costs of Transacting," Quarterly Explanations," Academy of Management Review, 14,
Journal of Economics, 82, 1, February 1968, 35-53. 4, 1989, 551-561.
8. Eichenwald, K. Serpent on The Rock, McGraw-Hill, 25. Williamson, O. "Transaction-Cost Economics: The
New York, NY, 1995. Governance of Contractual Relations," Journal of
9. Eisenhardt, K. “Building Theories from Case Study Law and Economics, 22, 2, 1997, 233-261.
Research,” Academy of Management Review, 14, 4,
October 1989, 532-550.
10. Gasparino, C., and Buckman, R. "Big Brokers Plan
Online Counterattack," The Wall Street Journal,
April 27, 1999a, C1, C18.
11. Gasparino, C., and Buckman, R. "Horning In:
Facing Internet Threat, Merrill to Offer Trading
Online for Low Fees," The Wall Street Journal, June
1, 1999b, A1.
12. Hackett, S. C. "A Comparative Analysis of
Merchant and Broker Intermediation," Journal of
Economic Behavior and Organization, 18, 1992,
299-315.
13. Klein, A. Wallstreet.Com -- Fat Cat Investing at
the Click of a Mouse: How Andy Klein and the
Internet Can Give Everyone a Seat on the
Exchange, Henry Holt and Company, New York,
NY, 1998.
14. Lux, H. "The Search for the Killer App,"
Institutional Investor, 31, 4, 1997. 91-102.
15. Malone, T. W., Yates, J., and Benjamin, R. I.
"Electronic Markets and Electronic Hierarchies,"
Communications of the ACM, 30, 6, 1987, 484-497.
16. McNamee, M. "Investor's Guide," BusinessWeek,
February 22, 1999, p. 120.

12

Vous aimerez peut-être aussi