Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Sang-Yong Tom Lee is active.

Publication


Featured researches published by Sang-Yong Tom Lee.


Management Science | 2008

Consumer Privacy and Marketing Avoidance: A Static Model

Il-Horn Hann; Kai Lung Hui; Sang-Yong Tom Lee; Ivan P. L. Png

We introduce the concept of marketing avoidance---consumer efforts to conceal themselves and to deflect marketing. The setting is one in which sellers market some item through solicitations to potential consumers, who differ in their benefit from the item and suffer harm from receiving solicitations. Concealment by one consumer induces sellers to shift solicitations to other consumers, whereas deflection does not. Solicitations cause two externalities: direct harm on consumers and the (indirect) cost of consumer concealment and deflection. We find that in markets where the marginal cost of solicitation is sufficiently low, efforts by low-benefit consumers to conceal themselves will increase the cost-effectiveness of solicitations and lead sellers to market more. However, concealment by high-benefit consumers leads sellers to market less. Furthermore, concealment by low-benefit consumers increases direct privacy harm, and consumer welfare is higher with deflection than concealment. Finally, it is optimal to impose a charge on solicitations.


hawaii international conference on system sciences | 2007

Analyzing Online Information Privacy Concerns: An Information Processing Theory Approach

Il-Horn Hann; Kai Lung Hui; Sang-Yong Tom Lee; Ivan P. L. Png

The advent of the Internet has made the transmission of personally identifiable information common and often inadvertent to the user. As a consequence, individuals worry that companies misuse their information. Firms have tried to mitigate this concern in two ways: (1) offering privacy policies regarding the handling and use of personal information, (2) offering benefits such as financial gains or convenience. In this paper, we interpret these actions in the context of the information processing theory of motivation. Information processing theories, in the context of motivated behavior also known as expectancy theories, are built on the premise that people process information about behavior-outcome relationships. We empirically validate predictions that the means to mitigate privacy concerns are associated with positive valences resulting in an increase in motivational score. Further, we investigate these means in trade-off situation, where a firm may only offer partially complete privacy protection and/or some benefits


Review of Marketing Science | 2004

Buyer Shopping Costs and Retail Pricing: An Indirect Empirical Test

Sang-Yong Tom Lee; Ivan P. L. Png

Suppose that consumers incur fixed shopping costs and choose stores according to advertised discounts. Then, the extent to which a store will discount advertised items should increase with the profit from other regularly-priced items. Bookstores customarily advertise discounts on bestsellers. Among conventional bookstores, we found that the bestseller discount systematically increased with the store area, selection of titles, and presence of other product categories. One standard deviation increase in store area was associated with a 3.7 (± 1.8) higher bestseller percentage discount. Among online stores, we found that the bestseller discount systematically increased with the selection of titles and number of product categories. One standard deviation increase in selection was associated with a 9.5 (± 2.2) higher bestseller percentage discount. These results indirectly confirm that booksellers discount bestsellers to attract consumers, and that consumers bear significant fixed shopping costs.


Industrial Organization | 2005

Open Source vs. Proprietary Software: Competition and Compatibility

Sang-Yong Tom Lee; Zhaoli Meng

e use a Hotelling linear city model to study competition between open source and proprietary software, where only the producer of the proprietary software aims at maximizing the profit. The producer of the proprietary software must decide on compatibility. Different compatibility strategies will lead to different network externality, and thus result in different profit for the producer of the proprietary software. We found that the proprietary produceri¯s choice of compatibility strategy depends on the market coverage conditions. When the market is fully covered, one-way compatibility is the best strategy for the proprietary software. When the market is partly covered, two-way compatibility is the best strategy. Such results are not affected by software quality. Furthermore, when the provider of the open source software pursues the maximum market share rather than reacts passively, two-way compatibility would be the best choice for both the open source and the proprietary software. Moreover, the proprietary software producer does not favor its proprietary rival changing to open source software. Such a change may lower the social welfare.


Industrial Organization | 2005

Sales and Promotions: A More General Model

Il-Horn Hann; Kai Lung Hui; Sang-Yong Tom Lee; Ivan P. L. Png

We embed the Varian (1980) model in a broader setting that considers how switcher/loyal customer segments are determined. Generally, customer acquisition is deterministic while pricing is randomized. The equilibrium outcome depends on the timing of customer acquisition relative to pricing. If sellers acquire customers before setting prices, the unique equilibrium is asymmetric. If sellers acquire customers and set prices simultaneously, the unique equilibrium is symmetric. Our results provide a fundamental justification for previous analyses that variously assumed the outcome to be asymmetric or symmetric. The comparative statics for the asymmetric and symmetric equilibria are identical.


Management Information Systems Quarterly | 2007

The value of privacy assurance: an exploratory field experiment

Kai Lung Hui; Hock-Hai Teo; Sang-Yong Tom Lee


Journal of Management Information Systems | 2007

Overcoming Online Information Privacy Concerns: An Information-Processing Theory Approach

Il-Horn Hann; Kai Lung Hui; Sang-Yong Tom Lee; Ivan P. L. Png


international conference on information systems | 2002

The Value of Online Information Privacy: Evidence from the USA and Singapore

IIhorn Hann; Kai Lung Hui; Sang-Yong Tom Lee; Ivan P. L. Png


Industrial Organization | 2003

The Value of Online Information Privacy: An Empirical Investigation

Il-Horn Hann; Kai Lung Hui; Sang-Yong Tom Lee; Ivan P. L. Png


Industrial Organization | 2005

Consumer Privacy and Marketing Avoidance

Il-Horn Hann; Kai Lung Hui; Sang-Yong Tom Lee; Ivan P. L. Png

Collaboration


Dive into the Sang-Yong Tom Lee's collaboration.

Top Co-Authors

Avatar

Ivan P. L. Png

National University of Singapore

View shared research outputs
Top Co-Authors

Avatar

Kai Lung Hui

Hong Kong University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Hock-Hai Teo

National University of Singapore

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Zhaoli Meng

National University of Singapore

View shared research outputs
Top Co-Authors

Avatar

Xiaohua Zeng

University of British Columbia

View shared research outputs
Researchain Logo
Decentralizing Knowledge