Next Article in Journal
Organizational Digital Transformation Readiness: An Exploratory Investigation
Previous Article in Journal
More Realistic, More Better? How Anthropomorphic Images of Virtual Influencers Impact the Purchase Intentions of Consumers
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Using Blockchain Technology to Combat Counterfeits: The Optimal Pricing Scheme of Two Competitive Platforms

1
School of Management, Wuhan University of Science and Technology, Wuhan 430081, China
2
School of Management, Huazhong University of Science and Technology, Wuhan 430074, China
3
Department of Engineering Management, School of Civil Engineering and Architecture, Wuhan University of Technology, Wuhan 430072, China
4
School of Economics, Huazhong University of Science and Technology, Wuhan 430074, China
*
Author to whom correspondence should be addressed.
J. Theor. Appl. Electron. Commer. Res. 2024, 19(4), 3253-3282; https://doi.org/10.3390/jtaer19040158
Submission received: 4 September 2024 / Revised: 29 October 2024 / Accepted: 6 November 2024 / Published: 23 November 2024
(This article belongs to the Special Issue Blockchain Business Applications and the Metaverse)

Abstract

:
This paper investigates using blockchain technology to fight deceptive counterfeits in an electronic commerce environment. Thereby, a two-period pricing model is built under two competitive platforms: a blockchain-based platform which ensures product authentication and provides a higher value to customers but increases customers’ privacy concerns, and its rival (i.e., the traditional platform) in the absence of blockchain implementation which is perceived as having a lower value due to the existence of deceptive counterfeits and thus faces more government enforcement. Customers on both platforms are influenced by the electronic word-of-mouth (eWOM) effect, and customers value a platform more if the platform has more online sales. The two platforms either adopt the fixed pricing scheme or the modifiable pricing scheme and so four possible cases may occur. By deriving the equilibrium of each possible case, we analytically find that the attenuation of consumer privacy concerns, increases in government enforcement efforts, and eWOM can benefit the platform’s adoption of blockchain technology to combat counterfeits, and a strong eWOM effect is conducive to consumers but deteriorates price competition and thus harms both platforms. Whether the pricing schemes enhance the competitiveness of the blockchain-based platform over its rivals depends on the eWOM effect and the advantage gained from adopting blockchain technology.

1. Introduction

The e-commerce boom has caused traditional stores to seek out an online presence, in the form of entering platforms or developing mobile applications, to respond quickly to market needs. Nevertheless, counterfeits on e-commerce platforms are a serious problem and receive more attention from consumers and the government. According to a recent study by Ali Research, platform counterfeits and fake commodities climbed dramatically during the period of 2010–2020. The annual economic loss from copycatting products is estimated to be approximately CNY 55 million (abbreviation of Chinese Yuan) [1]. Counterfeiting can occur in two different settings, i.e., a customer can distinguish that a product is counterfeit and yet they decide to buy it (non-deceptive counterfeit), and a customer cannot distinguish between a genuine and a counterfeit product ex ante (deceptive counterfeit). A deceptive counterfeit, the focus of this paper, usually causes more harm to consumers as it may even involve health and safety risks. For example, fake medicines, which are deliberately and fraudulently mislabeled with respect to their identity or source, may cause therapeutic failure or even adverse effects in patients as they include wrong or insufficient active ingredients [2]. Additionally, on platforms where e-retailers have utilized technology such as RFID (Radio Frequency Identification) and hologram tags, there are still cases of deceptive counterfeits.
Technologies such as RFID or holograms have been widely applied to address the issue of fakes [3]. However, those techniques have had two main obstacles. First, it is likely that counterfeiters will imitate the genuine product’s tag. Second, once a product has been purchased, product authenticity can no longer be guaranteed since the tags are removed or replaced. Therefore, second-hand purchases are difficult to verify. But blockchain technology has been deemed as an ideal solution to anti-counterfeit operational challenges including the control of counterfeiting and providing deal transparency [4,5], and several blockchain-based applications have been carried out in recent years. For example, JD.COM partnered with the Australian startup InterAgri to develop a blockchain platform to track beef imports from overseas suppliers. The platform can record information about the breeding of cattle, processing, and transportation to final consumers. Bumble Bee Foods uses blockchain technology to track fresh fish from ocean to table: customers can scan a QR code on the product package to view the information about the fish-to-market journey, including the point of capture and the fishing community that caught it. In these typical cases, the use of a private key from a customer along with a public key and complex cryptography allows blockchain to provide an immutable, irreversible, and permanent record of transactions associated with a product [6]. In this way, a blockchain-based solution provides better transparency for customers and more easily and accurately verifies the authenticity of the product compared to previous technologies.
However, in addition to the additive costs associated, customer privacy concerns are also a major roadblock to blockchain implementation [4], because, in the blockchain scenario, customers must disclose their personal information by registering themselves as an owner to obtain a private key; such data, for example, in healthcare and the medicine industry, contain patients’ medical history which may have privacy implications for patients [6]. Similarly, the luxury industry giant LVMH requires customers to download its mobile apps and digital hot wallets in order to access the blockchain information, which leaves their personal information and funds exposed to hackers and potential security threats; meanwhile, some firms may use this information to carry out personalized marketing promotion to customers, but customers may regard such marketing activities as invasive to their privacy.
In particular, online e-commerce platforms, different from conventional physical stores, are prone to leak private information but also yield an electronic word-of-mouth effect (i.e., consumers’ comments, ratings, and online sales volumes), greatly influencing the consumers’ purchase behaviors. In this regard, e-retailers are more sensitive to platform dynamics, including rival pricing, marketing promotion, blockchain technology adoption, etc. A direct and simple way to counteract rivals’ dynamics is to capitalize on dynamic pricing schemes, which are frequently used to enhance their competitiveness.
Though the utilization of blockchain technology against deceptive counterfeits and pricing schemes is present in practice, some issues still remain ambiguous in this field of operations management. Motivated by the above practice, this paper will try to answer the following questions: (1) Compared to the traditional platform, does the blockchain-based platform help to generate more benefit for e-retailers, and do the fixed and modifiable pricing schemes yield different results? (2) With the support of blockchain technology, do the pricing schemes also aid in preventing counterfeits, and do enforcement efforts increase the chances of seizing the fakes to help the blockchain-based platform combat counterfeits? (3) Under the combating of counterfeits, which critical factors (e.g., electronic word-of-mouth (eWOM), unit blockchain-based cost, and consumers’ sensitive degree of privacy concern) impact both the platforms’ performance and the pricing scheme selection? (4) Under what conditions does the traditional platform like its rival also adopt the blockchain technology to compete with the blockchain-based platform?
To address the above four major questions, this paper conducts a two-period pricing game between two competitive platforms under the eWOM effect. To be specific, the blockchain-based platform provides a higher value for consumers due to blockchain technology against counterfeits, and yet some consumers are sensitive to privacy concerns of blockchain applications, whereas the other platform is a traditional one that is more likely to face government enforcement to monitor pirated goods in the absence of blockchain implementation. Two platforms may adopt the fixed pricing or the modifiable pricing scheme, and we analyze the equilibrium outcomes in four possible cases: case (F, F), where both platforms implement the fixed pricing; case (F, M), where the blockchain-based platform utilizes the fixed pricing and the traditional platform leverages the modifiable pricing; case (M, F), where the blockchain-based platform uses the modifiable pricing and the traditional platform leverages the fixed pricing; and case (M, M), where both platforms implement the modifiable pricing. The optimal decisions of the pricing scheme can be obtained by comparing the outcomes of four cases.
The novelties of this paper are threefold. (1) We are one of the first studies providing insights into the optimal decisions under blockchain technology and the pricing scheme for combating counterfeits. Although prior studies in the literature examine the impact of blockchain technology on firms’ anti-fake operations, it is rarely studied in a two-period competition setting combined with government enforcement efforts. (2) Adopting blockchain technology can help consumers identify products’ authenticity, yet it raises consumers’ privacy concerns and increases operation costs, thereby both key factors are taken into account in this research. Specifically, to characterize the consumer’s privacy concern, we use the fraction to quantify two groups of consumers, i.e., sensitive and insensitive consumers, which were seldom considered in anti-fake works before. (3) This paper utilizes the factor of government enforcement effort to link the relation between the counterfeit-existing possibility and the being-caught probability, which is consistent with the real world, because consumers care about the counterfeit-existing possibility, while e-retailers using traditional platforms may worry about the being-caught probability in the setting of two competitive platforms.
The rest of this paper is organized as follows: Section 2 reviews the relevant literature. Section 3 formulates our model. In Section 4, we analyze four possible cases to see how they are affected by adopting blockchain technology. Then, the optimal scheme selection and the related conditions are examined in Section 5. In Section 6, the extension is conducted to investigate under what conditions the traditional platform may also choose to adopt the blockchain technology. Section 7 summarizes the managerial insights and concludes with suggestions for future research. All proofs are provided in Appendix A.

2. Literature Review

2.1. Anti-Measures for Deceptive Counterfeit

The analytical research on counterfeiting mainly focuses on non-deceptive counterfeits. Grossman and Shapiro [7] discuss government policies towards non-deceptive counterfeiters and show that the policies that discourage foreign counterfeiting may reduce the home country’s welfare since non-deceptive counterfeits positively contribute to consumers’ welfare due to their low prices. Qian [8] finds that counterfeit entry induces incumbent brands to introduce an innovation strategy. And the pricing scheme will be adopted only if the counterfeit quality is lower than a threshold level. Scandizzo [9] takes consumers’ income level and two possible quality levels into the model and studies a competing market where firms who do not invest in quality improvement will become counterfeiters. Zhang et al. [10] compare the different fighting strategies in a market with one brand product and non-deceptive counterfeit. Similarly, Gao et al. [11] examine the impacts of different attributes and consumers’ utilities of the copycat on luxury branded products by using quality as a deterrence scheme and demonstrate that a higher branded product quality can deter a copycat’s entrance. More comprehensively, Pun and DeYong [12] suggest that product quality, legal enforcement, and customers’ forward-looking behaviors are effective deterrence strategies.
To the best of our knowledge, there are only several papers addressing deceptive counterfeiting. Liu et al. [13] investigate a multi-item newsvendor problem in the market where a retailer sells authentic and deceptive counterfeiting products under uncertain demand and analyze the effectiveness of the government’s monitoring scheme for the retailer’s cheating activities. Qian [14] assumes that only a fraction of consumers will be deceived and studies the effects of both price and non-price signaling under a Stackelberg game setting and finds that a brand name company will raise the price after a counterfeit’s entry. Cho et al. [15] investigate the impact of product characteristics on a counterfeiter’s decision in terms of deceptive and non-deceptive quality and price. Zhang and Zhang [16] and Qian et al. [17] further extend these results to multiple symmetric deceptive counterfeiters and introduce two dimensions of quality: searchable quality and experiential quality.
Under all the anti-measures studied in the existing literature, counterfeiters always had the possibility of manipulating fake products to look genuine to fool customers. However, blockchain strategy is fundamentally different from the conventional anti-counterfeiting ones. Products with a unique blockchain identifier cannot be duplicated because of their immutable, irreversible, and permanent characteristics. All customers can identify whether a product is authentic or fake during the deployment of a blockchain, so the problem where customers buy a fake unknowingly is completely eliminated. More importantly, apart from considering the adoption of blockchain technology as a countermeasure, our paper also contributes two new features to the literature. First, we take into account customers’ psychological factor of privacy concerns from blockchain adoption, which was seldom addressed before. Second, we consider the government enforcement efforts to monitor the market cheat behaviors.

2.2. Platform Service Operations

Platform operations play a critical role in e-commerce [18,19,20,21], and a body of platform-related OM studies have been published. For example, Bhargava et al. [22] study the optimal establishment timing for the platform technology. Anderson et al. [1] examine the platform operation decisions with the consideration of network externalities. Choi and He [19] study the platform operations in the setting of P2P. Zhang et al. [23] investigate the interaction between the e-retail platform’s contract selection and the manufacturer’s product quality decision. Meanwhile, more research further extends to different specific settings [24], such as crowdsourcing platforms [25], car-sharing platforms [26], fresh product platforms [18,19,27], and rental platforms [28].
Some studies focus on exploring the pricing decisions for platform services, which are related to our paper. For instance, Banerjee et al. [29] explore the optimal pricing decisions in the platform for ride-sharing services. Wang et al. [30] study the optimal pricing decisions for a service platform for calling taxis. Cachon et al. [31] look into the surge pricing policies on a platform when the service capacity is under self-scheduling control. Kung and Zhong [32] investigate the pricing decisions of a two-side platform with the delivery service considerations. Taylor [33] studies the optimal supply–demand matching in on-demand service platforms with independent service agents and considers the optimal service pricing decision. Most recently, Barenji et al. [34] explore smart platform pricing for e-commerce-based logistics services. The authors propose two types of communication schemes to better integrate data for the platform operations. Bai et al. [35] explore the optimal pricing problem for the on-demand service platform with impatient consumers.
Different from the aforementioned work focusing on one single platform [36], our study addresses two competitive platforms except for Bai and Tang [37], Zhang et al. [38], and Liu et al. [38]. Bai and Tang [37] study the case when two on-demand service platforms compete. They highlight the situations when both platforms can be profitable under such a duopoly competitive setting. Zhang et al. [38] study whether and when two competitive platforms should launch mobile applications simultaneously and sequentially. In addition, Chen et al. [39] examine two differentiated Cournot competitions on auction platforms with respect to quantity. Zhang et al. [40] use Bertrand competition to delineate the nexus of consumption network externalities and corporate social responsibility issues by setting prices until they reach the marginal cost. Although we also examine two competitive platforms, this paper concentrates on the optimal pricing decision for using blockchain against deceptive counterfeits, combined with the eWOM effect, which has been addressed less in prior studies in the platform OM literature.

2.3. Blockchain Technologies

Blockchain technologies have emerged as a crucial technological advance in recent years [41,42,43]. In operations management, Azzi et al. [44] believe that adopting blockchain technology will bring many benefits, such as increasing the trust level between producers and consumers, reducing or eliminating counterfeit products, and creating more transparent and accurate point-to-point tracking. Babich and Hilary [4] and Chod et al. [45] examine how blockchain can help improve operations in different topical areas, which include information and data sharing, risk management, automated smart contracting, etc. Shi and Choi [46] analytically explore how blockchain can be used to enhance food safety in supply chains and information visibility for facilitating the recall of poor quality or contaminated food products. Most recently, Rahmanzadeh et al. [47] presented a tactical supply chain planning model to integrate the designing process in the form of open innovation with consideration of intellectual property issues based on a blockchain platform. Zhang et al. [48] consider the two-period pricing on blockchain-based platforms, and customers are influenced by the network effect, revealing the ‘Matthew effect’ on platforms.
Additionally, some scholars have conducted other related research such as privacy [49], traceability [50], and counterfeiting [18]. Tian et al. [51] propose a secure digital evidence framework based on blockchain, which can ensure the integrity and effectiveness of data, so as to better balance privacy and traceability. Xu et al. [52] reconstruct the traceability system by replacing the central database with blockchain. They believe that the new system can provide transparent, efficient, and tamper-proof tracking data. For combating counterfeits, Choi [18] explores the values of blockchain technology against counterfeits in the diamond industry, considers three models, namely, the traditional retail operations, and the blockchain technology-supported selling platform and the blockchain technology-supported certification platform, and derives the condition of the values of blockchain technology-supported platforms for diamond authentication and certification. Pun et al. [53] consider a market with a manufacturer and a deceptive counterfeiter. The manufacturer can either use blockchain technology or signal authenticity through pricing and show that blockchain should only be used when the counterfeit quality is intermediate or when customers have intermediate distrust about products in the market. When customers have serious distrust about products, the pricing scheme is more effective than blockchain adoption, and it is found that blockchain can be more effective than a pricing strategy in eliminating post-purchase regret.
Although our paper also focuses on the blockchain-based platform operations for combating counterfeits, to the best of our knowledge, it is rare that the studies consider a two-periodic model with the consumers’ psychological factor of privacy concerns from blockchain adoption, and the government enforcement on two competitive platforms; thus, our work tries to fill this gap.

3. Model

Consider that a traditional platform T competes with a blockchain-based platform B. It is assumed that there are no existing counterfeits on platform B due to the blockchain technology ensuring product authentication. However, there may be some fakes on platform T with the counterfeit-existing possibility e λ ,   e λ ( 0 , 1 ) , and the platform T will be penalized by the amount Φ . It is assumed that Φ = 1 to simplify the model and not impact the main results. If counterfeits are found by government enforcement, the being-caught probability ω ( λ ) , ω ( λ ) ( 0 , 1 ) , and both the possibility functions are monotonic with respect to the enforcement effort λ . Without loss of generality, ω ( λ ) = k λ   ( 0 < k < 1 ) is set, where λ is not higher than 1 / k , and 1 / k represents the highest level of the government’s enforcement efforts. If each platform sells one type of product to consumers over two periods, the individual consumer has one unit demand. Considering that platform B uses blockchain to combat deceptive counterfeits, customers have to leave their own information owing to their use of blockchain-based hot wallets and registration of the platform as owners to obtain a private key, and some consumers may be sensitive to privacy information and worry about leaking their digital footprint, while other consumers do not care about it. To this end, we posit that the fraction of privacy-information-sensitive consumers is β , while the fraction for the privacy-information-insensitive consumers is 1 β . The consumer’s perceived product’s base value on platform B and platform T is denoted by v B and v T , respectively, and v T > 0 and v B > 0 are assumed, thus ensuring that consumers at the market buy either product on platform B or platform T.
Additionally, considering that platform B adopts blockchain technology, consumers will perceive a higher base value of products on platform B than that on platform T due to the fact that the authentication and quality of products on platform B are well monitored; thus, we have v B > v T . Δ = v B v T denotes the gains from blockchain implementation. However, the blockchain implementation incurs extra costs, assuming that the cost per unit for blockchain implementation c includes the cost of cloud-based service and the cost for the tag; the tag is a type of digital technology called a non-fungible token (NFT) that represents a unique digital proof of ownership over product and identity and is stored and protected on a shared public exchange. To avoid trivial calculations, the fixed cost of adopting blockchain technology and other platform costs are normalized to zero.
We use the Hotelling model to describe the platform differentiation. Platform B and platform T are located at x = 0 and x = 1 , respectively. The customers are uniformly distributed along the Hotelling line from 0 to 1, with a total number normalized to 1. A customer located at x has to pay a disutility μ x of buying the product on platform B and a disutility μ ( 1 x ) of buying the product on platform T, where μ characterizes the degree of product differentiation on two platforms. We assume that consumers patronize two platforms and buy products on one platform in one period.
In period 1, the eWOM effect is not present due to the fact that the platforms have no prior data on product sales. Two kinds of consumers have different utilities on two platforms.
(i)
For the privacy-information-sensitive consumers ( β ), the basic utility obtained by purchasing the product on platform B is given by U 1 = v B μ x p B ( 1 ) σ , where p B ( 1 ) denotes the price of platform B in period 1, and σ represents the consumer’s perceived privacy-information leakage degree due to blockchain adoption, whereas the utility function of purchasing the product on platform T is U T ( 1 ) = v T μ ( 1 x ) p T ( 1 ) ε e λ , where ε represents the consumer’s sensitivity degree to counterfeits.
(ii)
For the privacy-information-insensitive consumers ( 1 β ), the basic utility obtained by purchasing the product on platform B is given by U 2 = v B μ x p B ( 1 ) , whereas the utility function of purchasing the product on platform T is U T ( 1 ) = v T μ ( 1 x ) p T ( 1 ) ε e λ .
According to the work by the authors of [54], the privacy-information-sensitive consumers ( β ) will purchase products on platform B only if U 1 > U T ( 1 ) , or will purchase products on platform T only if U 1 < U T ( 1 ) . Thus, we can infer a decoupling point ( x 1 ) between purchasing products on platform B or products on platform T based on U 1 = U T ( 1 ) , i.e., v B μ x p B 1 σ = v T μ 1 x p T ( 1 ) ε e λ ; thus, we have x 1 = μ + Δ + p T ( 1 ) p B ( 1 ) + ε e λ σ 2 μ . Thereby, the first-periodic demand of the privacy-information-sensitive consumers ( β ) on platform B is presented as β 0 x 1 d x = β μ + Δ + p T ( 1 ) p B ( 1 ) + ε e λ σ 2 μ , and the first-periodic demand of privacy-information-sensitive consumers ( β ) on platform T is presented as β x 1 1 d x = β ( 1 μ + Δ + p T ( 1 ) p B ( 1 ) + ε e λ σ 2 μ ).
Similar to the derivation of the demand of the privacy-information-sensitive consumers ( β ), we also can derive the demand of the privacy-information-insensitive consumers (1 − β ), the decoupling point x 2 = μ + Δ + p T ( 1 ) p B ( 1 ) + ε e λ 2 μ , and the privacy-information-insensitive consumers (1 − β ) will purchase ( 1 β ) 0 x 2 d x products on platform B (i.e., ( 1 β ) μ + Δ + p T ( 1 ) p B ( 1 ) + ε e λ 2 μ )) and purchase ( 1 β ) x 2 1 d x products on platform T (i.e., ( 1 β ) ( 1 μ + Δ + p T ( 1 ) p B ( 1 ) + ε e λ 2 μ )).
Thus, product demands of platform B and platform T in period 1 from the privacy-information-sensitive and -insensitive consumers are as follows:
q B ( 1 ) = β μ + Δ + p T ( 1 ) p B ( 1 ) + ε e λ σ 2 μ + ( 1 β ) μ + Δ + p T ( 1 ) p B ( 1 ) + ε e λ 2 μ = μ + Δ + p T ( 1 ) p B ( 1 ) + ε e λ β σ 2 μ
q T ( 1 ) = β ( 1 μ + Δ + p T ( 1 ) p B ( 1 ) + ε e λ σ 2 μ ) + ( 1 β ) ( 1 μ + Δ + p T ( 1 ) p B ( 1 ) + ε e λ 2 μ ) = μ Δ + p B ( 1 ) p T ( 1 ) + β σ ε e λ 2 μ
In period 2, the utility of purchasing the products on platforms is impacted by the eWOM effect, which is positively related to the previous sales. Similarly, two kinds of consumers have different utilities on two platforms.
(i)
For the privacy-information-sensitive consumers ( β ), the basic utility obtained by purchasing the product on platform B is given by U 3 = v B μ x p B ( 2 ) σ + η q B ( 1 ) , where η measures the impact degree of the first period of online sales on the consumer’s utility in period 2, i.e., the power of the eWOM effect, while the utility function of purchasing the product on platform T is U T ( 2 ) = v T μ ( 1 x ) p T ( 2 ) ε e λ + η q T ( 1 ) . Owning to the fact that both platforms serve the same market consumers, we reasonably suppose that the power of the eWOM effect is the same for both platforms.
(ii)
For the privacy-information-insensitive consumers ( 1 β ), the basic utility obtained by purchasing the product on platform B is U 4 = v B μ x p B ( 2 ) + η q B ( 1 ) , while the basic utility on platform T is U T ( 2 ) = v T μ ( 1 x ) p T ( 2 ) ε e λ + η q T ( 1 ) .
Using the same logic, only if U 3 > U T ( 2 ) and U 4 > U T ( 2 ) , the privacy-information-sensitive and -insensitive consumers will purchase the products on platform B. Otherwise, they will purchase products on platform T. Thereby, we can calculate the product demands of platform B and platform T in period 2 as follows:
q B ( 2 ) = β Μ σ μ 2 μ 2 + ( 1 β ) M 2 μ 2 = μ 2 + ( μ + η ) ( Δ + ε e λ β σ ) + [ p T ( 2 ) p B ( 2 ) ] μ + [ p T ( 1 ) p B ( 1 ) ] η 2 μ 2
q T ( 2 ) = β ( 1 Μ σ μ 2 μ 2 ) + ( 1 β ) ( 1 M 2 μ 2 ) = μ 2 ( μ + η ) ( Δ + ε e λ β σ ) [ p T ( 2 ) p B ( 2 ) ] μ [ p T ( 1 ) p B ( 1 ) ] η 2 μ 2
where M = μ 2 + ( μ + η ) ( Δ + ε e λ ) β η σ + [ p T ( 2 ) p B ( 2 ) ] μ + [ p T ( 1 ) p B ( 1 ) ] η .
Both platforms have two pricing scheme options: the fixed pricing (F) or the modifiable pricing (M). We characterize the change in prices over two periods. If one platform’s prices over two periods remain unchanged, we refer to it as the fixed pricing scheme; if one platform’s prices over two periods are different, we define it as the modifiable pricing scheme. Both pricing schemes have different pricing mechanisms.
For the fixed pricing mechanism, this is when platform i decides to have the same price over the two periods, i.e., p i ( 1 ) = p i ( 2 ) = p i . Specifically, with platform B, it determines p B via maximizing the following two-periodic profit function:
π B ( p B ) = ( p B c ) [ q B ( 1 ) + q B ( 2 ) ]
And, with platform T, it decides p T via maximizing the following two-periodic profit function:
π T ( p T ) = p T [ q T ( 1 ) + q T ( 2 ) ] k λ e λ
It should be noted that without the adoption of blockchain technology, counterfeits may sneak into platform T and could be caught by government enforcement, and with the possibility of k λ , k λ ( 0 , 1 ) , it is definitely fined the amount Φ (assuming that Φ = 1 , for the model simplification, but this does not impact the main results), as well as with the possibility of k λ e λ , because the counterfeit-existing possibility is e λ and the being-caught possibility is k λ .
For the modifiable pricing mechanism, this is when platform i (B or T) decides the prices p i ( 1 ) and p i ( 2 ) by optimizing the profit. Specifically, with platform B, it decides p B ( 1 ) by maximizing the total profit:
π B ( p B ( 1 ) ) = ( p B ( 1 ) c ) q B ( 1 ) + ( p B ( 2 ) c ) q B ( 2 )
Then, it determines p B ( 2 ) by maximizing the second-period profit:
π B ( 2 ) ( p B ( 2 ) ) = ( p B ( 2 ) c ) q B ( 2 )
And with platform T, it determines p T ( 1 ) by maximizing the total profit:
π T ( p T ( 1 ) ) = p T ( 1 ) q T ( 1 ) + p T ( 2 ) q T ( 2 ) k λ e λ
Then, it determines p T ( 2 ) by maximizing the second-period profit:
π T ( 2 ) ( p T ( 2 ) ) = p T ( 2 ) q T ( 2 )
Similar to the work by the authors of [23], for two platforms, there may be four possible cases that could happen. Specifically, in the process of competition, if two platforms’ prices remain unchanged over two periods, we say that two platforms adopt the fixed pricing scheme, and it is refered to as case (F, F). If both platforms’ prices are changed over two periods, we say that both platforms adopt the modifiable pricing scheme, that is, case (M, M). If one platform’s price remains stable over two periods while the other’s price is altered, we say the former utilizes the fixed pricing scheme while the latter leverages the modifiable pricing scheme, and this is described as two cases, i.e., case (F, M) and case (M, F).
To concentrate on the setting of two platform competitions, we deposit the inequality max { 3 μ 2 μ + η , η 3 + 4 μ η 2 η μ 2 18 μ 3 η 2 + 5 μ η + 6 μ 2 } h min { 3 μ 2 μ + η , 18 μ 3 + η μ 2 η 3 4 μ η 2 η 2 + 5 η μ + 6 μ 2 } , where h = Δ ( β σ ε e λ + c ) , which indicates that the net advantage of purchasing the product on platform B over platform T (i.e., Δ ) or the net disadvantage of purchasing the product on platform B over platform T (i.e., β σ ε e λ + c ) is not large enough. We prove that max { 3 μ 2 μ + η , η 3 + 4 μ η 2 η μ 2 18 μ 3 η 2 + 5 μ η + 6 μ 2 } h min { 3 μ 2 μ + η , 18 μ 3 + η μ 2 η 3 4 μ η 2 η 2 + 5 η μ + 6 μ 2 } can guarantee that a platform will not price another platform out of the market in Appendix A. Table 1 illustrates the main notation of this research.

4. Equilibrium Analysis in Different Cases

Next, we proceed to calculate the equilibrium outcomes in four cases: (F, F), (F, M), (M, F), and (M, M).

4.1. Case (F, F)

In case (F, F), both platforms implement the fixed pricing scheme. That is to say, they set their own prices p B and p T , and they remain unchanged over two periods. The equilibrium is displayed in Theorem 1.
Theorem 1.
In case (F, F), the equilibrium outcomes of platform B and platform T are shown in Table 2.
Theorem 1 shows that platform B has more product sales than platform T in two periods due to the fact that some customers shift from platform T to platform B, especially in period 2; the incremental demand on platform B over two periods will increase with consumer’s sensitivity degree to counterfeits but decrease with the unit cost of blockchain adoption, and the government enforcement effort for combating counterfeits as well (the proofs are shown in Appendix A).

4.2. Case (F, M)

In case (F, M), platform B utilizes the fixed pricing scheme, and platform T adopts the modifiable pricing scheme. This means that Platform B’s prices remain stable, while platform T’s prices fluctuate over two periods. Using the backward induction method via the pricing mechanism, the equilibrium results are demonstrated in Theorem 2.
Theorem 2.
In case (F, M), the equilibrium outcomes of platform B and platform T are shown in Table 3.
Theorem 2 shows that, under case (F, M), some customers shift from platform T to platform B in period 2. The difference between the second-period price of platform T and the first-period price of platform B increases with the proportion of consumers having privacy concern β as well as enforcement efforts λ but decreases with consumers’ sensitivity degree to counterfeits ε .

4.3. Case (M, F)

In case (M, F), platform B utilizes the modifiable pricing scheme, and platform T implements the fixed pricing scheme. This means that platform B’s price is altered over two periods while platform T’s price remains stable. Using the backward induction method via the pricing mechanism, the equilibrium outcomes are demonstrated in Theorem 3.
Theorem 3.
In case (M, F), the equilibrium outcomes of the two platforms are given in Table 4.
Theorem 3 indicates that the gap between the second-period price and the first-period price of platform B decreases with the proportion of consumers having privacy concern β , the unit cost of blockchain adoption (c), and the enforcement efforts λ , but increase with consumers’ sensitivity degree to counterfeits ε .

4.4. Case (M, M)

In case (M, M), both platforms implement the modifiable pricing scheme simultaneously. We obtain the equilibrium outcomes in Theorem 4.
Theorem 4.
In case (M, M), the equilibrium outcomes of the platforms are shown in Table 5.
In case (M, M), we find that the price change in platform B from period 1 to period 2 is larger than that of platform T. As a result, some first-period consumers of platform B shifted to buy the product on platform T in period 2. The increased demand for platform T or the decreased demand for platform B decreases with the proportion of consumers having privacy concerns and enforcement efforts but increases with consumers’ sensitivity degree to counterfeits.
Corollary 1.
In four cases, the effects of the government’s enforcement effort λ on platform B ’s and platform T ’s profits.
a. 
For platform B, π B F F / λ < 0 , π B F M / λ < 0 , π B M F / λ < 0 , and π B M M / λ < 0 .
b. 
For platform T, in case (F, F), when λ > λ 1 , then π T F F / λ > 0 . (ii) In case (F, M), when λ > λ 2 , then π T F M / λ > 0 . (iii) In case (M, F), when λ > λ 3 , then π T M F / λ > 0 . (iv) In case (M, M), when λ > λ 4 , then π T M M / λ > 0 , where
λ 1 = ( η h 6 μ 2 + 2 μ h ) ε + 9 k μ 2 9 k μ 2
λ 2 = 1 ( η 2 μ ) ( η + 3 μ ) ε [ 2 ( η + 3 μ ) h η 2 μ η + 22 μ 2 ] 2 k ( η 2 + μ η 10 μ 2 ) 2
λ 3 = 1 4 μ 2 ( η + 3 μ ) ( 6 μ 2 h 3 η ) ε k ( 10 μ 2 η 2 μ η ) 2
λ 4 = 1 ε [ ( 7 η + 18 μ ) ( η 3 μ ) ( 4 η 2 27 μ 2 ) 3 ( 8 η 3 17 η 2 μ + 72 η μ 2 + 162 μ 3 ) h ] 3 k ( 4 η 2 27 μ 2 ) 2
From Corollary 1a, we can see that platform B’s profits decrease with the government’s enforcement efforts λ in four cases. The reason is that, with the higher enforcement efforts, platform T has fewer counterfeits, so platform T’s competitiveness is relatively improved, thus explaining the phenomenon that intensifying enforcement efforts will benefit platform T’s profits in the long run, but has a negative impact on platform B in the setting of competitive environment. Therefore, platform B’s profits decrease with the government’s enforcement effort λ in four cases. Corollary 1b indicates that when λ exceeds a certain threshold, platform T’s profit increases with λ in four cases; this result is consistent with reality. It implies that an effective way to combat counterfeits is either intensifying government enforcement or adopting blockchain technology.

4.5. Summary of Equilibrium in Four Cases

In this subsection, we summarize demand changes over the two periods in Table 6, followed by examining the effects of the gap between advantage over disadvantage (h), the unit cost of blockchain implementation ( c ), the consumer’s sensitivity degree to counterfeits ( ε ), and the government enforcement efforts ( λ ) on the equilibrium in the four cases. The results are presented in Table 7, Table 8, Table 9 and Table 10, respectively.
From Table 6, we observe that in case (F, F), when the net advantage of platform B over platform T is higher than the net disadvantage of platform T over platform B (i.e., h > 0 ), customers on Platform B will increase in period 2, whereas customers on platform T will decrease accordingly, and vice versa. In case (M, M), when the net advantage of Platform B over platform T is higher than the net disadvantage of platform over platform B (i.e., h > 0 ), the result is the opposite; some customers shift from platform B to platform T in period 2, and vice versa.
In case (F, M) or case (M, F), it does not matter that the net advantage of platform T over platform B is higher or lower than the net disadvantage because the platform with fixed pricing can always attract customers from its rival—the platform that adopts the modifiable pricing in period 2—which indicates that fixed pricing is more desirable than the modifiable pricing for platforms’ expanding market in case (F, M) and case (M, F).
Table 7 reveals that in four cases, the price on Platform B increases with h in two periods, while that on Platform T decreases with it. These findings are intuitive because the growth of platform B’s advantages given by blockchain makes platform B more competitive, and thus platform B will charge higher prices while platform T will charge lower prices to attract consumers accordingly. Table 7 also displays that, in four cases, the demand and profit on platform B increased with h in two periods, while those on Platform T decreased with it. It should be noted that, due to the equation h = Δ ( β σ ε e λ + c ) , h increases with Δ , ε , and λ but decreases with c , σ , and β . This means that the increases in Δ , ε , and λ , and the decreases in c , σ , and β , will make h larger; thus, Platform B (T) is better (worse) off.
Table 8 displays that, in four cases, the prices of both platforms increase with the unit cost of blockchain implementation ( c ) in two periods. However, the demand on platform T increases with c in two periods, while that on platform B decreases with it. The rationale of this fact is that the growth of unit cost of blockchain implementation ( c ) will definitely push platform B’s price upward, thus eliciting its corresponding demand shrinkage, which in turn is conductive to its rival platform T, that is, platform T’s profit rises while platform B’s profit drops accordingly.
Table 9 demonstrates that, in four cases, platform T’s demand decreases with the consumer’s sensitivity degree to counterfeits ( ε ) in two periods; its rival’s demand shows the reverse result. In this regard, platform T has to lower its price, while its rival will increase its own price in response to an increase in consumer’s sensitivity degree to counterfeits ( ε ). To this end, platform T will suffer more loss but platform B will benefit from it.
We can see from Table 10 that, in four cases, platform T’s demand will increase with the government enforcement efforts for combating counterfeits ( λ ) in two periods, but this has a negative effect on platform B’s demand. On the other hand, intensifying government enforcement is also conducive to an increase in platform T’s price and forces platform B to lower its price accordingly. It is worth noting that the optimum schemes could be found by considering more combined influencing factors; thereby, we further analyze the optimal scheme and the related conditions.

5. Optimal Pricing Scheme Selection

The platforms’ inclination to the fixed pricing scheme and the modifiable pricing scheme can be deduced by comparing the profits. Δ π B F F M F = π B F F π B M F , Δ π B F M M M = π B F M π B M M , Δ π T F F F M = π T F F π T F M , and Δ π T M F M M = π T M F π T M M are set. A positive value implies that the platform has the motivation to transfer from modifiable pricing to fixed pricing, a negative value implies that the platform has the motivation to transfer from fixed pricing to modifiable pricing, and a zero value implies that the platform is indiscriminate between adopting fixed pricing and modifiable pricing.
Lemma 1.
If η = 0 , the inequations Δ π B F F M F < 0 ,   Δ π B F M M M > 0 ,   Δ π T F F F M < 0 , and Δ π T M F M M > 0 hold.
Lemma 1 examines the situation in the absence of the eWOM effect, where the platforms are apt to choose a different pricing scheme from their rivals. Thus, the optimal scheme for platforms is case (M, F) or case (F, M), namely, one platform launches the fixed pricing scheme and the other implements the modifiable pricing scheme, due to Δ π B F F M F < 0 , Δ π T F F F M < 0 and Δ π B F M M M > 0 , Δ π T M F M M > 0 ; this also verifies that neither case (F, F) nor case (M, M) occurs without the eWOM effect. The rationale of this fact is that the absence of the eWOM effect indicates that previous sales fail to enlarge the next periodic demand, thus weakening the positive impact of the eWOM effect on profit. To this end, the platforms turn to a pricing scheme rather than eWOM, with an aim to enhance its performance. Meanwhile, there is an apparent discrepancy between the two platforms in consumers’ perceived value due to adopting blockchain technology; the platforms are more inclined to select a different pricing scheme from their rivals, enhancing consumers’ purchase intention.
Next, we investigate the optimal pricing schemes in the presence of the eWOM effect ( η > 0 ). When the conditions Δ π B F F M F < 0 and Δ π T F F F M < 0 are satisfied, it means that a platform decides to adopt the fixed pricing scheme while another platform adopts the modifiable pricing scheme (see Appendix A). But when a platform decides to adopt the modifiable pricing scheme, we cannot exactly identify another platform’s scheme selection. Thus, we need to further analyze two other conditions (i.e., Δ π B F M M M and Δ π T M F M M ), and hence, both platforms’ optimal scheme selection can be obtained. Due to the computational complexity, we conduct numerical studies to observe them and deduce the two following observations.
Observation 1.
When the eWOM effect η is strong,
(i) 
if h is smaller, case (M, M) is the optimal equilibrium, where both platforms adopt the modifiable pricing.
(ii) 
if h is larger, when h > 0 , case (F, M) is the optimal equilibrium, where the blockchain-based platform B adopts fixed pricing and the traditional platform T adopts modifiable pricing, while when h < 0 , case (M, F) is the optimal equilibrium, where the blockchain-based platform B adopts modifiable pricing and the traditional platform T adopts fixed pricing.
(iii) 
there will only exist case (M, M) in equilibrium when η = μ .
Observation 1(i) and Figure 1a display that one platform does not apparently outperform the other platform, which means that when the eWOM effect η is strong, and h is smaller, both platforms will adopt the modifiable pricing schemes due to Δ π B F M M M < 0 and Δ π T M F M M < 0 ; two platforms compete in price to attract consumers via the eWOM effect η , instead of being dependent on adopting a blockchain, because h is smaller.
Observation 1(ii) and Figure 1a show that when h is larger (i.e., larger than 0.5), and the increase in h leads to platform B’s choosing of fixed pricing and its rival for modifiable pricing, because platform B adopts blockchain technology, this can dramatically enhance its advantage over its rival Platform T, i.e., h > 0 . In contrast, if platform B adopts blockchain technology with its disadvantage over its rival platform T, i.e., h < 0 , platform B will select modifiable pricing and its rival will select fixed pricing. This reveals that the platform with more advantages than the other one always prefers fixed pricing. The reason is consistent with reality because the platform with more advantages wants to maintain the status quo, and is unwilling to make too many changes, including prices, whereas the rival platform with the disadvantage hopes to reverse the outcome and eagerly and actively adjusts the corresponding policies (for example, price policy) in response to such a passive situation.
Observation 1(iii) and Figure 1b characterize that both platforms will adopt the modifiable pricing scheme when the eWOM effect is equal to the degree of product differentiation on the two platforms, namely, η = μ . Under this circumstance, both platforms will choose the modifiable pricing scheme because the demand in period 2 will be dramatically affected by the demand in period 1, and platforms will set low prices to stimulate early demands, and then change late prices, combined with the eWOM effect, to increase its profit.
Observation 2.
When the eWOM effect η is weak,
(i) 
if h is small, case (F, M) or case (M, F) is the optimal equilibrium, where one platform adopts fixed pricing and another platform adopts modifiable pricing.
(ii) 
if h is larger, when h > 0 , case (F, M) is the optimal equilibrium, where the blockchain-based platform B adopts fixed pricing and the traditional platform T adopts modifiable pricing, while when h < 0 , case (M, F) is the optimal equilibrium, where the blockchain-based platform B adopts modifiable pricing and the traditional platform T adopts fixed pricing.
Observation 2(i) and Figure 2 show that given that one platform does not have particularly more competitiveness than another platform (i.e., h is small), both platforms tend to choose different pricing schemes. Because the network effect is weak and h is small, if both platforms adopt the same pricing schemes, instead of different pricing schemes, to attract more consumers, which will cause fierce competition, such a situation makes it impossible for this condition to last longer. As a result, both are ultimately inclined to choose different pricing schemes from the other, namely case (F, M) or case (M, F) is the optimal equilibrium. But which one is the best between case (F, M) and case (M, F)? The optimal outcomes are closely related to the factors such as consumers’ privacy concern ( β , σ ), enforcement effort ( λ , ω ), consumer’s sensitivity degree to counterfeits ( ε ), unit cost (c), and the degree of differentiation ( μ ) on two platforms.
Observation 2(ii) shows that when h is larger, and the positive value h increases, two equilibrium schemes are reduced to an equilibrium scheme (F, M). Because the positive value h increases, Δ π B F M M M rises dramatically and Δ π T M F M M is close to zero. For both platforms, scheme (F, M) is the only unique and optimal solution. Under this circumstance, platform B has more competitiveness than platform T. In order to survive the fierce market competition, platform T must adopt the modifiable pricing scheme and use price advantage to attract more consumers. The advantage of platform B is obvious, as it does not need to rely on price competition to attract consumers, but on blockchain technology, it is different. To this end, platform B has a stronger willingness to adhere to the fixed pricing scheme without deviating from it. Following the same logic, when h is larger, and the negative value h decreases, two equilibrium schemes are reduced to an equilibrium scheme (M, F). Because the positive value h increases, Δ π T M F M M rises considerably and Δ π B F M M M is close to zero. For both platforms, scheme (M, F) is the only unique and optimal solution.
Then, in the following part, the effect of several key pair parameters ( β , λ ), ( σ , ε ), and ( c , ω ) on the optimal pricing scheme is examined.
We first examine the impact of the fraction of consumers having privacy concerns ( β ) and the government enforcement efforts ( λ ) on the platform’s optimal pricing scheme selection. For convenience of analysis, μ = 1, c = 0.1 , and ε = 0.5 are set, and Δ = 2.4 and 0.7, σ = 5 and 3, and η = 0.1 and 0.6. Figure 3a indicates that when the strength of the eWOM effect η (0.1) is weaker, to some degree, no matter the amount of government enforcement effort for combating counterfeits ( λ ) that is made, if the fraction of consumers having privacy concerns ( β ) is at a low (high) level, platform B will choose the fixed (modifiable) pricing scheme as its optimal one, while platform T will choose the modifiable (fixed) pricing scheme; if the fraction of the consumer having privacy concerns ( β ) is at a mediate level, platform B or platform T will prefer to select a different pricing scheme from its rivals due to the fact that case (F, M) is the same as case (M, F) for both platforms. Interestingly, from the perspective of the colored area size, we also find that in the setting of the weaker eWOM effect, the greater likelihood of selecting a pricing scheme for both platforms is to choose a different pricing scheme from its rivals.
Figure 3b demonstrates the different results when the strength of the eWOM effect η (0.6) is stronger. In this case, the government enforcement effort for combating counterfeits ( λ ) will play a role in the platforms’ selection of a pricing scheme. With an increase in the fraction of the consumers having privacy concerns ( β ), the optimal scheme for platform B switches from fixed pricing to modifiable pricing, while platform T switches from modifiable to fixed pricing. Particularly, when the fraction of consumers having privacy concerns ( β ) is at a relatively low level, if the efforts for combating counterfeits ( λ ) are intensified during exertion, platform B will choose modifiable pricing, otherwise, it will select a fixed one. By contrast, When the proportion of consumers having privacy concerns ( β ) is at a relatively high level, the more efforts for combating counterfeits ( λ ) will cause platform T to choose the fixed pricing, otherwise, it will select the modifiable one. Additionally, although case (M, M) is the most likely case for the platforms’ preference, the gap between it and two other cases, i.e., case (F, M) and (M, F), becomes narrow.
Figure 4 shows the effects of the degree of privacy concern ( σ ) and the consumer’s sensitivity degree to counterfeits ( ε ) on the platform’s optimal pricing scheme selection. We specify that c = 0.1 and λ = ln ( 3 / 10 ) , and that Δ = 2.4 and 0.6, β = 0.8 and 0.2, and η = 0.1 and 0.6. Figure 4a demonstrates that when the strength of the eWOM effect is weaker, the degree of privacy concern ( σ ) is a greater critical influencing factor than the consumer’s sensitivity degree to counterfeits ( ε ) in the impact on platforms’ pricing choice. In detail, except for the case of the extremely lower and higher level of the degree of privacy concern ( σ ), platform B or platform T will normally prefer to select a different pricing scheme from its rivals. When consumers have an extremely lower level of the degree of privacy concern ( σ ), the increase in the consumer’s sensitivity degree to counterfeits ( ε ) will facilitate platform T’s adoption of modifiable pricing while platform B adopts fixed pricing. In contrast, when consumers have a higher level of the degree of privacy concern ( σ ), the decrease in the consumer’s sensitivity degree to counterfeits ( ε ) will evoke platform T to adopt fixed pricing while platform B adopts modifiable pricing.
Figure 4b demonstrates the case of when the strength of the eWOM effect η (0.6) is stronger. It is obvious that the strength of the eWOM effect will improve the role of the consumer’s sensitivity degree to counterfeits ( ε ) in platforms’ pricing scheme decision-making; meanwhile, the strong strength of the eWOM effect leads to two platforms clearly choosing their pricing scheme in comparison with the weak case. With an increase in the degree of privacy concerns ( σ ), the optimal scheme for platform B switches from fixed pricing to modifiable pricing, while platform T switches from modifiable to fixed pricing.
Figure 5 shows the effects of the unit cost of blockchain implementation (c) and being-caught probability ( ω ) on the platform’s optimal pricing scheme selection. We specify that ε = 0.5 , β = 0.2 , σ = 1.5 , Δ = 2.5 , and k = 0.5 . We can see that, given the different values of the strength of the eWOM effect, the role between the unit cost of blockchain implementation (c) and the being-caught probability ( ω ) proceeds in two different extremes when choosing a pricing scheme for both platforms. Specifically, when the strength of the eWOM effect is weaker ( η = 0.1), the unit cost of blockchain implementation (c) is a key factor for platforms to decide the pricing schemes, whereas the factor of the being-caught probability ( ω ) is almost negligible (Figure 5a). By contrast, when the strength of the eWOM effect is stronger ( η = 0.6), it shows that the being-caught probability ( ω ), and the unit cost of blockchain implementation (c) are the same indispensable determinants impacting platforms’ selection (Figure 5b).
Additionally, when the strength of the eWOM effect is weaker, it is most likely that platform B or platform T will prefer to select a different pricing scheme from its rivals when the strength of the eWOM effect is stronger; if the value of the being-caught probability ( ω ) falls on the lower area, platform B will choose fixed pricing and platform T will prefer to select the modifiable pricing scheme; if the value of the being-caught probability ( ω ) falls on the higher area, platform B will choose modifiable pricing and platform T will choose fixed pricing; if the value of the being-caught probability ( ω ) falls on the mediate area, both platforms select the modifiable pricing; interestingly, it is most likely that both platforms will select modifiable pricing when compared with the higher and lower areas where the value of the being-caught probability ( ω ) falls on.

6. Extension

In this section, we consider the condition of the traditional platform T also choosing to adopt the blockchain technology to compete with the blockchain-supported platform B under four different pricing schemes, and then we take some other factors into account including the platform brand and product quality to examine the possible impact on the outcomes.

6.1. Both Platforms’ Adoption of Blockchain Technology

When the traditional platform T decides to adopt blockchain technology, the first-periodic utility of the privacy-information-(in)sensitive consumers for both platforms is presented as follows. For privacy-information-sensitive consumers in period 1,
U ^ 1 = v B μ x p B ( 1 ) σ = v μ x p B ( 1 ) σ
U ^ T ( 1 ) = v T μ ( 1 x ) p T ( 1 ) σ = v μ ( 1 x ) p T ( 1 ) σ
where v T = v B = v due to both platforms adopting blockchain technology.
For privacy-information-insensitive consumers in period 1,
U ^ 2 = v μ x p B ( 1 ) ,   U ^ T ( 1 ) = v μ ( 1 x ) p T ( 1 )
Using the same reasoning as before, we can derive the product demands of both platforms in period 1.
q ^ B ( 1 ) = β μ + p T ( 1 ) p B ( 1 ) 2 μ + ( 1 β ) μ + p T ( 1 ) p B ( 1 ) 2 μ = μ + p T ( 1 ) p B ( 1 ) 2 μ
q ^ T ( 1 ) = β ( 1 μ + p T ( 1 ) p B ( 1 ) 2 μ ) + ( 1 β ) ( 1 μ + p T ( 1 ) p B ( 1 ) 2 μ ) = μ + p B ( 1 ) p T ( 1 ) 2 μ
In the same way, we can also calculate the product demands of two platforms in period 2 as follows:
q ^ B ( 2 ) = β K 2 μ 2 + ( 1 β ) K 2 μ 2 = μ 2 + [ p T ( 2 ) p B ( 2 ) ] μ + [ p T ( 1 ) p B ( 1 ) ] η 2 μ 2
q ^ T ( 2 ) = β ( 1 K 2 μ 2 ) + ( 1 β ) ( 1 K 2 μ 2 ) = μ 2 [ p T ( 2 ) p B ( 2 ) ] μ [ p T ( 1 ) p B ( 1 ) ] η 2 μ 2
where Κ = μ 2 + [ p T ( 2 ) p B ( 2 ) ] μ + [ p T ( 1 ) p B ( 1 ) ] η .
Considering that platform T is a late blockchain technology adopter, at the start of period 1, it will bear the related preparation cost (for example, familiarity with blockchain devices, staff training, etc.), denoted by I, while platform B does not bear such expenditure at this time due to its early bird of implementing blockchain technology against counterfeits; thus, the two-periodic profits of platforms B and T are
π B ( p B ) = ( p B c ) [ q ^ B ( 1 ) + q ^ B ( 2 ) ] ,   π T ( p T ) = ( p T c ) [ q ^ T ( 1 ) + q ^ T ( 2 ) ] I
Utilizing the same method as in Section 3, we can derive both platforms’ profits under four different circumstances. Then, by comparing platform T’s profits between not adopting and adopting blockchain technology against counterfeits, the conditions of the traditional platform T choosing to adopt blockchain technology are yielded as below.
Theorem 5.
(1) In case (F, F), platform T will adopt blockchain technology when k λ e λ > I + [ h ( 2 μ + η ) 12 μ 2 ] h 18 μ 2 ; (2) in case (F, M), platform T will adopt blockchain technology when k λ e λ > I + ( η + 3 μ ) ( 2 μ η ) ( η 2 + η μ + η h 22 μ 2 + 3 h μ ) h 2 ( η 2 + η μ 10 μ 2 ) 2 ; (3) in case (M, F), platform T will adopt blockchain technology when k λ e λ > I + 4 μ 2 h ( η + 3 μ ) ( 3 η 6 μ + h ) ( η 2 + η μ 10 μ 2 ) 2 ; and (4) in case (M, M), platform T will adopt blockchain technology when k λ e λ > I + h ( 56 η 4 + 24 η 3 μ 24 η 3 h + 810 η 2 μ 2 51 η 2 μ h 162 η μ 3 + 216 η μ 2 h 2916 μ 4 + 486 μ 3 h ) 6 ( 4 η 2 27 μ 2 ) 2 .
Theorem 5 obviously shows that when the government’s anti-fake penalty amount ( k λ e λ ) exceeds a certain threshold, platform T will also turn to adopt blockchain technology against counterfeits as its rival; otherwise, platform T has no motivation to implement it. Thus, from the perspective of the government, setting an appropriate amount of fines can drive platforms to adopt blockchain technology to combat counterfeiting.

6.2. Impact of Other Factors on Blockchain Adoption and Combating Counterfeits

We take the factors of the platform brand and the product quality into account to examine the possible impact on the outcomes. It is assumed that platform B has a brand reputation and high-quality products, inducing it to adopt blockchain technology. Therefore, in period 1, for the privacy-information-sensitive and -insensitive consumers, the basic utilities obtained by purchasing the product on platform B are given by
U ¯ 1 = v B μ x p B ( 1 ) σ + τ ( R + s ) ,
U ¯ 2 = v B μ x p B ( 1 ) + τ ( R + s )
where R denotes the consumer’s perceived brand reputation of platform B, s represents the consumer’s perceived product quality of platform B relative to platform T, and τ represents the consumer’s sensitive degree to platform B’s product quality and brand reputation.
In period 2, for the privacy-information-sensitive and -insensitive consumers, the basic utilities obtained by purchasing the product on platform B are
U ¯ 3 = v B μ x p B ( 2 ) σ + η q B ( 1 ) + τ ( R + s ) ,
U ¯ 4 = v B μ x p B ( 2 ) + η q B ( 1 ) + τ ( R + s )
For platform T, the utility function of purchasing products on platform T remains unchanged. In the same method as in Section 3, we can derive both platforms’ equilibrium outcomes under four cases and compare their impacts, the results are shown in Table 11.

7. Conclusions

To investigate the effects of using blockchain technology for combating counterfeits, we examine a two-period model where a traditional platform and a blockchain-based platform compete via different pricing schemes, i.e., fixed pricing or modifiable pricing. The implementation of blockchain technology can enhance the perceived utility of purchasing products on the blockchain-based platform but it can bear the related costs and raise customers’ privacy concerns, while the traditional platform in the absence of blockchain implementation is perceived as having a lower value due to the existence of deceptive counterfeits, thus facing more government enforcement. Customers on both platforms are impacted by the eWOM effect. We analyze the results of the optimal decisions under four possible cases. The equilibrium pricing schemes are derived, and the main results and important managerial insights are presented as follows:
(1)
Compared to the traditional platform T, the blockchain-based platform B helps generate more benefits for e-retailers. Platform B had more product sales than Platform T in two periods due to the fact that some customers shifted from platform T to platform B, especially in period 2, which made the traditional platform T adopt fixed or modifiable pricing schemes in response to sale changes. Also, the gap between the second-period price of Platform T and the first-period price of platform B changes with the proportion of consumers having privacy concerns. This suggests that when adopting blockchain technology and different pricing schemes for anti-fakes, managements must also make efforts to mitigate consumers’ anxieties related to privacy concerns, for example, by strengthening data security, introducing reliable encryption technology, and enhancing mutual trust via propaganda.
(2)
With the support of blockchain technology, the pricing schemes do not directly help combat counterfeits, but they do indirectly facilitate anti-fakes. The reason is that regardless of whether the blockchain-based platform B adopts the fixed or the modifiable pricing scheme, its rival (platform T) may turn to different one, thus inevitably intensifying competition; as a result, platform T is forced to reduce counterfeits with an aim to improve eWOM. This implies that both blockchain technology (external factor) and eWOM (internal factor) play important roles in fighting copycats, and managements do not emphasize one and neglect the other because these two factors intertwine and transform with each other.
(3)
The enforcement efforts increase the chances of seizing the copycats on platform T, but Platform B’s profits decrease with the government’s enforcement efforts in four cases. The reason is that, with the higher enforcement efforts, platform T has less counterfeits, so platform T’s competitiveness is relatively enhanced. Meanwhile, when enforcement efforts exceed a certain threshold, platform T’s profit increases with it in four cases, and this result is consistent with reality. This implies that an effective way to combat counterfeits is either by intensifying government enforcement or adopting blockchain technology; strengthening government enforcement not only benefits consumers but also platform T in the long run.
(4)
For combating counterfeits, these critical factors, including eWOM, unit blockchain-based cost, and consumer’s sensitive degree of privacy concern, greatly impact both platforms’ performance and pricing scheme selection. We find that if the eWOM effect is strong or the competitor adopts the fixed pricing scheme, the positive effect of the modifiable pricing scheme dominates its negative effect, and the modifiable pricing scheme is more desirable; otherwise, the fixed pricing scheme is more favorable. When the eWOM effect is weak, one platform adopts the fixed pricing scheme and the other adopts the modifiable pricing scheme. This suggests that, in the setting of a weak eWOM effect, managements must focus on their rivals’ pricing schemes to select their own pricing schemes, while in the setting of a strong eWOM effect, managements should shift focus from their rivals to consumers, and then select the modifiable pricing scheme to directly benefit consumers.
(5)
The result also reveals that when the government anti-fake penalty amount exceeds a certain threshold, the traditional platform T will also turn to adopt blockchain technology against counterfeits; otherwise, the traditional platform T has no motivation to implement it. Thus, from the perspective of the government, setting an appropriate amount of fines can drive platforms to adopt blockchain technology to combat counterfeiting.
There are also some research limitations of this paper.
(1)
This paper concentrates on the impact of adopting blockchain technology on platform competition and merely accommodates two different platforms rather than two supply chains. Future research could extend its investigation to the sophisticated supply chain, including interactions with upstream suppliers and platforms.
(2)
This research examines one platform adopting blockchain technology but does not address the issue of how to allocate the blockchain construction costs (i.e., fixed costs) between members in the setting of a supply chain, which may be considered in the future.
(3)
We build parsimonious models to acquire tractable outcomes. Our findings may be subject to the specific model setting. For instance, we only consider deceptive counterfeits and a deterministic demand function. Future research can further take it into account by introducing non-deceptive counterfeits and random demand parts.

Author Contributions

Writing—original draft preparation, J.L.; writing—review and editing, X.W., L.L. and D.Z.; visualization, L.L.; funding acquisition, J.L. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the National Natural Science Foundation of China, grant numbers 71872076 and 71964023. The APC was funded by the National Natural Science Foundation of China, grant numbers 71872076 and 71964023.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The original contributions presented in this study are included in the article; further inquiries can be directed to the corresponding author.

Conflicts of Interest

The authors declare no conflicts of interest.

Appendix A

Proof of Theorem 1.
Under case (F, F) where p i ( 1 ) = p i ( 2 ) = p i ( i = B , T ), by substituting Equations (1)–(4) into Equations (5) and (6), we have the following:
π B F F ( p B ) = ( p B c ) [ μ + Δ + p T p B + ε e λ β σ 2 μ + μ 2 + ( Δ + ε e λ β σ + p T p B ) ( μ + η ) 2 μ 2 ]
π T F F ( p T ) = p T [ μ Δ + p B p T + β σ ε e λ 2 μ + μ 2 ( Δ + ε e λ β σ + p T p B ) ( μ + η ) 2 μ 2 ] k λ e λ
Because 2 π B F F ( p B ) p B 2 = 2 π T F F ( p T ) p T 2 = η + 2 μ μ 2 < 0 , π B F F ( p B ) is concave in p B , and π T F F ( p T ) is concave in p T . We can obtain the optimal decisions from first-order conditions. By solving d π B F F ( p B ) d p B = 0 , we obtain platform B’s best optimal p B ( p T ) . Similarly, by simultaneously solving d π T F F ( p T ) d p T = 0 , we obtain platform T’s optimal p T ( p B ) . By setting p B = p B ( p T ) and p T = p T ( p B ) , we can derive the platforms’ equilibrium prices in Table 2. Substituting these equilibrium prices into the product demand and profit functions, we can obtain the corresponding profits and product demands.
From Table 2, we obtain that q T F F ( 1 ) = 3 μ h 6 μ and q T F F ( 2 ) = 3 μ 2 ( μ + η ) h 6 μ 2 . q T F F ( 1 ) and q T F F ( 2 ) are within (0, 1) if max { 3 μ , 3 μ 2 μ + η } < h < min { 3 μ , 3 μ 2 μ + η } (which can be reduced to 3 μ 2 μ + η < h < 3 μ 2 μ + η ). Thus, the product demands of both periods of platform T are within (0, 1) if 3 μ 2 μ + η < h < 3 μ 2 μ + η .
From Table 2, we also obtain that p B F F = 6 μ 2 + ( 3 c + h ) ( 2 μ + η ) 3 η + 6 μ and p T F F = 6 μ 2 h ( 2 μ + η ) 3 η + 6 μ . p B F F = 6 μ 2 + ( 3 c + h ) ( 2 μ + η ) 3 η + 6 μ > 0 if h > 6 μ 2 η + 2 μ 3 c . p T F F = 6 μ 2 h ( 2 μ + η ) 3 η + 6 μ > 0 if h < 6 μ 2 η + 2 μ .
From the above analysis, we know that the condition of h is
max { 3 μ 2 μ + η , 6 μ 2 η + 2 μ 3 c } < h < min { 3 μ 2 μ + η , 6 μ 2 η + 2 μ }
which can be reduced to 3 μ 2 μ + η < h < 3 μ 2 μ + η .
q B F F ( 1 ) q T F F ( 1 ) = 3 μ + h 6 μ 3 μ h 6 μ = h 3 μ > 0
When h > 0 ,
q B F F ( 2 ) q T F F ( 2 ) = 3 μ 2 + h ( μ + η ) 6 μ 2 3 μ 2 h ( μ + η ) 6 μ 2 = h ( μ + η ) 3 μ 2 > 0
and when h > 0 ,
q B F F ( 2 ) q B F F ( 1 ) = 3 μ 2 + h ( μ + η ) 6 μ 2 3 μ + h 6 μ = h η 6 μ 2
Thus, when h > 0 , q B F F ( 2 ) > q B F F ( 1 ) . When h < 0 , q B F F ( 2 ) < q B F F ( 1 ) .
q T F F ( 2 ) q T F F ( 1 ) = 3 μ 2 h ( μ + η ) 6 μ 2 3 μ h 6 μ = h η 6 μ 2
Thus, when h > 0 , q T F F ( 2 ) < q T F F ( 1 ) . When h < 0 , q T F F ( 2 ) > q T F F ( 1 ) .
d p B F F d z = η + 2 μ 3 η + 6 μ > 0 ,
d p T F F d z = η 2 μ 3 η + 6 μ < 0 ,
d ( q B F F ( 2 ) q B F F ( 1 ) ) d ε = e λ η 6 μ 2 > 0 ,
d ( q B F F ( 2 ) q B F F ( 1 ) ) d λ = ε e λ η 6 μ 2 < 0 ,
d ( q B F F ( 2 ) q B F F ( 1 ) ) d β = σ η 6 μ 2 < 0 ,
d ( q B F F ( 2 ) q B F F ( 1 ) ) d c = η 6 μ 2 < 0
Proof of Theorem 2.
Under case (F, M), where p B ( 1 ) = p B ( 2 ) = p B and platform T charges different prices during the two periods, we find the sub-game perfect equilibrium by backward induction.
At the beginning of the second period, platform T chooses p T ( 2 ) to maximize its second-period profit π T F M ( 2 ) ( p T ( 2 ) ) = p T ( 2 ) q T F M ( 2 ) . We find that π T F M ( 2 ) is concave in p T ( 2 ) . By solving the first-order condition d π T F M ( 2 ) d p T ( 2 ) = 0 , we can obtain the equilibrium second-period price of platform T as follows:
p T ( 2 ) = η ε e λ μ ε e λ + β η σ + β μ σ Δ η Δ μ + η p B η p T ( 1 ) + μ 2 + μ p B 2 μ
With the anticipated best response second-period price, the platforms independently and simultaneously set the first-period prices p B and p T ( 1 ) , in order to maximize their own profits over the two periods, which are given by π B F M ( p B ) = ( p B c ) ( q B F M ( 1 ) + q B F M ( 2 ) ) and π T F M ( p T ( 1 ) ) = p T ( 1 ) q T ( 1 ) + p T ( 2 ) q T ( 2 ) k λ e λ . By substituting (A.3) into π B F M ( p B ) and π T F M ( p T ( 1 ) ) , we find that π B F M ( p B ) and π T F M ( p T ( 1 ) ) are concave in p B and p T ( 1 ) , respectively. By solving the first-order conditions d π B F M d p B = 0 and d π T F M d p T ( 1 ) = 0 simultaneously, we can derive the equilibrium first-period prices given in Table 3. By substituting the equilibrium first-period prices into Equation (A3), we can derive the equilibrium second-period price of platform T. By substituting the equilibrium prices into the product demand and profit functions, we can further obtain the corresponding profits and product demands summarized in Table 3.
From Table 3, we obtain that
q T F M ( 1 ) = 22 μ 3 + η ( η 2 + 2 μ η 15 μ 2 ) + ( η 2 + 5 μ η + 6 μ 2 ) h 2 η 3 + 6 η 2 μ 16 η μ 2 40 μ 3
and
q T F M ( 2 ) = 22 μ 3 + μ η ( η 5 μ ) + ( η 2 + 5 μ η + 6 μ 2 ) h 2 η 3 + 6 η 2 μ 16 η μ 2 40 μ 3
q T F M ( 1 ) and q T F M ( 2 ) are within (0, 1) if
max { η 3 + 4 μ η 2 η μ 2 18 μ 3 η 2 + 5 μ η + 6 μ 2 , 2 η 3 + 5 μ η 2 11 η μ 2 18 μ 3 η 2 + 5 μ η + 6 μ 2 } < h h < min { 22 μ 3 η 3 2 μ η 2 + 15 μ 2 η η 2 + 5 μ η + 6 μ 2 , 5 μ 2 η μ η 2 + 22 μ 3 η 2 + 5 μ η + 6 μ 2 }
The above condition can be reduced to
η 3 + 4 μ η 2 η μ 2 18 μ 3 η 2 + 5 μ η + 6 μ 2 < h < 5 μ 2 η μ η 2 + 22 μ 3 η 2 + 5 μ η + 6 μ 2
under the condition of η μ . Thus, the product demands of both periods of platform T are within (0, 1)
  • if
η 3 + 4 μ η 2 η μ 2 18 μ 3 η 2 + 5 μ η + 6 μ 2 < h < 5 μ 2 η μ η 2 + 22 μ 3 η 2 + 5 μ η + 6 μ 2
From Table 3, we also obtain that
p B F M = 12 μ 3 c η ( μ + η ) + μ 2 ( 10 c 6 η + 4 h ) η 2 μ η + 10 μ 2
p T F M ( 1 ) = 22 μ 4 7 η μ 2 ( η + μ ) + ( η 3 + 4 η 2 μ + η μ 2 6 μ 3 ) h ( η 3 + 3 η 2 μ 8 η μ 2 20 μ 3 )
and
p T F M ( 2 ) = 22 μ 4 + μ 2 η ( η 5 μ ) + ( η 2 + 5 μ η + 6 μ 2 ) μ h η 3 + 3 η 2 μ 8 η μ 2 20 μ 3 ,
p B F M = 12 μ 3 c η ( μ + η ) + μ 2 ( 10 c 6 η + 4 h ) η 2 μ η + 10 μ 2 > 0 .
if
h > c η ( μ + η ) 12 μ 3 ( 10 c 6 η ) μ 2 4 μ 2 ,
p T F M ( 1 ) = 22 μ 4 7 η μ 2 ( η + μ ) + ( η 3 + 4 η 2 μ + η μ 2 6 μ 3 ) h ( η 3 + 3 η 2 μ 8 η μ 2 20 μ 3 ) > 0 .
and if
h < 22 μ 4 7 η 2 μ 2 7 η μ 3 6 μ 3 η 3 4 η 2 μ η μ 2 ,
p T F M ( 2 ) = 22 μ 4 + μ 2 η ( η 5 μ ) + ( η 2 + 5 μ η + 6 μ 2 ) μ h η 3 + 3 η 2 μ 8 η μ 2 20 μ 3 > 0 .
From the above analysis, we know that the condition
h [ max { η 3 + 4 μ η 2 η μ 2 18 μ 3 η 2 + 5 μ η + 6 μ 2 , c η ( μ + η ) 12 μ 3 ( 10 c 6 η ) μ 2 4 μ 2 } ,
min { 22 μ 4 7 η 2 μ 2 7 η μ 3 6 μ 3 η 3 4 η 2 μ η μ 2 , 22 μ 3 μ η ( η 5 μ ) η 2 + 5 μ η + 6 μ 2 , 5 μ 2 η μ η 2 + 22 μ 3 η 2 + 5 μ η + 6 μ 2 } ]
which can be reduced to
η 3 + 4 μ η 2 η μ 2 18 μ 3 η 2 + 5 μ η + 6 μ 2 < h < 5 μ 2 η μ η 2 + 22 μ 3 η 2 + 5 μ η + 6 μ 2
d ( p T F M ( 2 ) p T F M ( 1 ) ) d β = η ( η 2 σ 5 μ η σ 6 μ 2 σ ) η 3 + 3 μ η 2 8 μ 2 η 20 μ 3 > 0
d ( p T F M ( 2 ) p T F M ( 1 ) ) d ε = η ( η 2 e λ + 5 μ η e λ + 6 μ 2 e λ ) η 3 + 3 μ η 2 8 μ 2 η 20 μ 3 < 0
d ( p T F M ( 2 ) p T F M ( 1 ) ) d λ = η ( η 2 ε e λ 5 μ η ε e λ 6 μ 2 ε e λ ) η 3 + 3 μ η 2 8 μ 2 η 20 μ 3 > 0
d ( p T F M ( 2 ) p T F M ( 1 ) ) d c = η ( η 2 + 5 μ η + 6 μ 2 ) η 3 + 3 η 2 μ 8 μ 2 η 20 μ 3 > 0
q B F M ( 2 ) q B F M ( 1 ) = 18 μ 3 + η ( 11 μ 2 2 η 2 5 μ η ) + ( η 2 + 5 μ η + 6 μ 2 ) h 2 η 3 6 η 2 μ + 16 η μ 2 + 40 μ 3 18 μ 3 + ( η 2 + 5 μ η + 6 μ 2 ) h + η ( μ 2 η 2 4 μ η ) 2 η 3 6 η 2 μ + 16 η μ 2 + 40 μ 3 = η 4 μ + 2 η > 0
q T F M ( 2 ) q T F M ( 1 ) = 22 μ 3 + μ η ( η 5 μ ) + ( η 2 + 5 μ η + 6 μ 2 ) h 2 η 3 + 6 η 2 μ 16 η μ 2 40 μ 3 22 μ 3 + η ( η 2 + 2 μ η 15 μ 2 ) + ( η 2 + 5 μ η + 6 μ 2 ) h 2 η 3 + 6 η 2 μ 16 η μ 2 40 μ 3 = η 4 μ + 2 η < 0
Proof of Theorems 3 and 4.
The proof is similar to that of Theorem 2 and will not be repeated here. □
Proof of Corollary 1.
π B F F λ = [ ( η + 2 μ ) h + 6 μ 2 ] ε e λ 9 μ 2 < [ ( η + 2 μ ) ( 3 μ 2 μ + η ) + 6 μ 2 ] ε e λ 9 μ 2 = η ε e λ 3 ( μ + η ) < 0
π B F M λ = 4 μ 2 ( 3 μ + η ) ( 2 h 3 η + 6 μ ) ( η + 2 μ ) ε e λ ( η 2 + μ η 10 μ 2 ) ( η 3 + 3 η 2 μ 8 η μ 2 20 μ 3 ) < 4 μ 2 ( 3 μ + η ) ( 2 ( η 3 + 4 μ η 2 η μ 2 18 μ 3 η 2 + 5 μ η + 6 μ 2 ) 3 η + 6 μ ) ( η + 2 μ ) ε e λ ( η 2 + μ η 10 μ 2 ) ( η 3 + 3 η 2 μ 8 η μ 2 20 μ 3 ) = 4 μ 2 ( 3 μ + η ) η ( η + 2 μ ) ε e λ ( η 2 + 5 μ η + 6 μ 2 ) ( η 3 + 3 η 2 μ 8 η μ 2 20 μ 3 ) < 0
π B M F λ = 2 ( η 5 8 η 4 μ 17 η 3 μ 2 + 14 η 2 μ 3 + 84 η μ 4 + 72 μ 5 ) h ε e λ ( η 6 + 6 η 5 μ 15 η 4 μ 2 128 η 3 μ 3 88 η 2 μ 4 + 416 η μ 5 + 528 μ 6 ) ε e λ 2 ( η 3 + 3 η 2 μ 8 η μ 2 20 μ 3 ) 2 < ε e λ η ( η 7 + 9 η 6 μ + 15 η 5 μ 2 77 η 4 μ 3 268 η 3 μ 4 16 η 2 μ 5 + 768 η μ 6 + 720 μ 7 ) 2 ( η 2 + 5 μ η + 6 μ 2 ) ( η 3 + 3 η 2 μ 8 η μ 2 20 μ 3 ) 2 < 0
π B M M λ = 6 ( 8 η 3 17 η 2 μ + 72 η μ 2 + 162 μ 3 ) h ε e λ 2 ( 28 η 4 12 η 3 μ 405 η 2 μ 2 + 81 μ 3 η + 1458 μ 4 ) ε e λ 6 ( 4 η 2 27 μ 2 ) 2 < ε e λ η ( 16 η 4 216 η 2 μ 2 + 729 μ 4 ) 3 ( 9 μ + 4 η ) ( 4 η 2 27 μ 2 ) 2 < 0
Since the above monotonic derivations are all valid within their respective ranges (i.e., 3 μ 2 μ + η < h < 3 μ 2 μ + η in case (F, F),
η 3 + 4 μ η 2 η μ 2 18 μ 3 η 2 + 5 μ η + 6 μ 2 < h < 5 μ 2 η μ η 2 + 22 μ 3 η 2 + 5 μ η + 6 μ 2
in case (F, M), η 2 μ 5 η μ 2 22 μ 3 η 2 + 5 η μ + 6 μ 2 < h   < 18 μ 3 + η μ 2 η 3 4 μ η 2 η 2 + 5 η μ + 6 μ 2 , and in case (M, F),
max { 4 η 2 27 μ 2 9 μ + 4 η , 8 η 3 6 η ( c η c μ + 2 η μ ) 27 μ 2 ( 2 η 2 c 3 μ ) 3 ( 2 η 2 + 2 η μ 9 μ 2 )
c } < h < min { 27 μ 2 4 η 2 9 μ + 4 η , 8 η 3 3 μ ( 27 μ 2 4 η 2 18 η μ ) 6 η 2 + 6 η μ 27 μ 2 }
In case (M, M), the derivations are also valid within the range of
max { 3 μ 2 μ + η , η 3 + 4 μ η 2 η μ 2 18 μ 3 η 2 + 5 μ η + 6 μ 2 } < h < min { 3 μ 2 μ + η , 18 μ 3 + η μ 2 η 3 4 μ η 2 η 2 + 5 η μ + 6 μ 2 }
π T F F λ = [ ( η + 2 μ ) h 6 μ 2 ] ε e λ 9 μ 2 k e λ + k λ e λ > 0
if
λ > 1 [ 6 μ 2 ( η + 2 μ ) h ] ε 9 k μ 2
π T F M λ = ( η + 2 μ ) ( 2 ( η 4 6 η 3 μ 5 η 2 μ 2 + 24 μ 3 η + 36 μ 4 ) h ε e λ ( η 5 4 η 4 μ + 23 η 3 μ 2 + 82 η 2 μ 3 76 η μ 4 264 μ 5 ) ε e λ ) 2 ( η 3 + 3 η 2 μ 8 η μ 2 20 μ 3 ) 2 k e λ + k λ e λ > 0
if
λ > 1 ( η 2 μ ) ( η + 3 μ ) ε [ 2 ( η + 3 μ ) h η 2 μ η + 22 μ 2 ] 2 k ( η 2 + μ η 10 μ 2 ) 2
π T M F λ = 4 μ 2 ( η + 3 μ ) ( 2 h + 3 η 6 μ ) ε e λ ( η 2 + μ η 10 μ 2 ) 2 k e λ + k λ e λ > 0
if
λ > 1 4 μ 2 ( η + 3 μ ) ( 6 μ 2 h 3 η ) ε k ( 10 μ 2 η 2 μ η ) 2
π T M M λ = 6 ( 8 η 3 17 η 2 μ + 72 η μ 2 + 162 μ 3 ) h ε e λ + 2 ( 28 η 4 12 η 3 μ 405 η 2 μ 2 + 81 μ 3 η + 1458 μ 4 ) ε e λ 6 ( 4 η 2 27 μ 2 ) 2 k e λ + k λ e λ > 0
and if
λ > 1 ε [ ( 7 η + 18 μ ) ( η 3 μ ) ( 4 η 2 27 μ 2 ) 3 ( 8 η 3 17 η 2 μ + 72 η μ 2 + 162 μ 3 ) h ] 3 k ( 4 η 2 27 μ 2 ) 2
Proof of Theorem 5.
The proving process of Theorem 5 is similar to Theorems 1–4.  □
Proof of Lemma 1.
When η = 0 , we know that
max { 3 μ 2 μ + η , η 3 + 4 μ η 2 η μ 2 18 μ 3 η 2 + 5 μ η + 6 μ 2 } < h < min { 3 μ 2 μ + η , 18 μ 3 + η μ 2 η 3 4 μ η 2 η 2 + 5 η μ + 6 μ 2 }
is 3 μ < h < 3 μ . Under this condition, we have the following:
Δ π B F F M F = 189 μ 2 + 6 μ h + 19 h 2 900 μ < 189 μ 2 + 6 μ ( 3 μ ) + 19 ( 3 μ ) ( 3 μ ) 900 μ = 0
Δ π B F M M M = 18 μ 2 + 12 μ h + 2 h 2 225 μ > 18 μ 2 + 12 μ ( 3 μ ) + 2 ( 3 μ ) ( 3 μ ) 225 μ = 0
Δ π T F F F M = 189 μ 2 6 μ h + 19 h 2 900 μ < 189 μ 2 6 μ ( 3 μ ) + 19 ( 3 μ ) ( 3 μ ) 900 μ = 0
Δ π T M F M M = 18 μ 2 12 h μ + 2 h 2 225 μ > 18 μ 2 12 ( 3 μ ) μ + 2 ( 3 μ ) 2 225 μ = 0

References

  1. Anderson, E.G., Jr.; Parker, G.G.; Tan, B. Platform Performance Investment in the Presence of Network Externalities. Inf. Syst. Res. 2014, 25, 152–172. [Google Scholar] [CrossRef]
  2. Reggi, V. Counterfeit medicines: An intent to deceive. Int. J. Risk Saf. Med. 2007, 19, 105–108. [Google Scholar]
  3. Toyoda, K.; Mathiopoulos, P.T.; Sasase, I.; Ohtsuki, T. A Novel Blockchain-Based Product Ownership Management System (POMS) for Anti-Counterfeits in the Post Supply Chain. IEEE Access 2017, 5, 17465–17477. [Google Scholar] [CrossRef]
  4. Babich, V.; Hilary, G. Distributed Ledgers and Operations: What Operations Management Researchers Should Know About Blockchain Technology. Manuf. Serv. Oper. Manag. 2020, 22, 223–240. [Google Scholar] [CrossRef]
  5. Simchi-Levi, D. From the Editor. Manag. Sci. 2018, 64, 1–4. [Google Scholar] [CrossRef]
  6. Siyal, A.A.; Junejo, A.Z.; Zawish, M.; Ahmed, K.; Khalil, A.; Soursou, G. Applications of Blockchain Technology in Medicine and Healthcare: Challenges and Future Perspectives. Cryptography 2019, 3, 3. [Google Scholar] [CrossRef]
  7. Grossman, G.; Shapiro, C. Foreign counterfeiting of status goods. Q. J. Econ. 1988, 103, 79–100. [Google Scholar] [CrossRef]
  8. Qian, Y. Brand Management and Strategies Against Counterfeits. J. Econ. Manag. Strategy 2014, 23, 317–343. [Google Scholar] [CrossRef]
  9. Scandizzo, S. Counterfeit goods and income inequality. In IMF Working Paper; No. 01/13, January; SSRN: Atlanta, GA, USA, 2001. [Google Scholar]
  10. Zhang, J.; Hong, L.J.; Zhang, R.Q. Fighting strategies in a market with counterfeits. Ann. Oper. Res. 2012, 192, 49–66. [Google Scholar] [CrossRef]
  11. Gao, S.Y.; Lim, W.S.; Tang, C.S. Entry of Copycats of Luxury Brands. Mark. Sci. 2017, 36, 272–289. [Google Scholar] [CrossRef]
  12. Pun, H.; DeYong, G.D. Competing with Copycats When Customers Are Strategic. Manuf. Serv. Oper. Manag. 2017, 19, 403–418. [Google Scholar] [CrossRef]
  13. Liu, K.; Li, J.A.; Wu, Y.; Lai, K.K. Analysis of monitoring and limiting of commercial cheating: A newsvendor model. J. Oper. Res. Soc. 2005, 56, 844–854. [Google Scholar] [CrossRef]
  14. Qian, Y. Pricing and Marketing Impacts of Entry by Counterfeiters and Imitators; Working Paper; Northwestern University: Evanston, IL, USA, 2006. [Google Scholar]
  15. Cho, S.-H.; Fang, X.; Tayur, S. Combating Strategic Counterfeiters in Licit and Illicit Supply Chains. Manuf. Serv. Oper. Manag. 2015, 17, 273–289. [Google Scholar] [CrossRef]
  16. Zhang, J.; Zhang, R.Q. Supply chain structure in a market with deceptive counterfeits. Eur. J. Oper. Res. 2015, 240, 84–97. [Google Scholar] [CrossRef]
  17. Qian, Y.; Gong, Q.; Chen, Y. Untangling Searchable and Experiential Quality Responses to Counterfeits. Mark. Sci. 2015, 34, 522–538. [Google Scholar] [CrossRef]
  18. Choi, T.-M. Blockchain-technology-supported platforms for diamond authentication and certification in luxury supply chains. Transp. Res. Part E Logist. Transp. Rev. 2019, 128, 17–29. [Google Scholar] [CrossRef]
  19. Choi, T.-M.; He, Y. Peer-to-peer collaborative consumption for fashion products in the sharing economy: Platform operations. Transp. Res. Part E Logist. Transp. Rev. 2019, 126, 49–65. [Google Scholar] [CrossRef]
  20. Cui, Y.; Hu, M. Under the Same Roof: Value of Shared Living in Airbnb; Working Paper; University of Toronto: Toronto, ON, USA, 2018. [Google Scholar]
  21. Tian, L.; Jiang, B. Effects of Consumer-to-Consumer Product Sharing on Distribution Channel. Prod. Oper. Manag. 2018, 27, 350–367. [Google Scholar] [CrossRef]
  22. Bhargava, H.K.; Kim, B.C.; Sun, D. Commercialization of Platform Technologies: Launch Timing and Versioning Strategy. Prod. Oper. Manag. 2013, 22, 1374–1388. [Google Scholar] [CrossRef]
  23. Zhang, J.; Cao, Q.; He, X. Contract and product quality in platform selling. Eur. J. Oper. Res. 2019, 272, 928–944. [Google Scholar] [CrossRef]
  24. Liu, B.; Guo, X.; Yu, Y.; Tian, L. Manufacturer’s contract choice facing competing downstream online retail platforms. Int. J. Prod. Res. 2021, 59, 3017–3041. [Google Scholar] [CrossRef]
  25. Cheng, X.; Gou, Q.; Yue, J.; Zhang, Y. Equilibrium decisions for an innovation crowdsourcing platform. Transp. Res. Part E Logist. Transp. Rev. 2019, 125, 241–260. [Google Scholar] [CrossRef]
  26. Bellos, I.; Ferguson, M.; Toktay, L.B. The Car Sharing Economy: Interaction of Business Model Choice and Product Line Design. Manuf. Serv. Oper. Manag. 2017, 19, 185–201. [Google Scholar] [CrossRef]
  27. Chen, Y.-J.; Shanthikumar, J.G.; Shen, Z.-J.M. Incentive for Peer-to-Peer Knowledge Sharing among Farmers in Developing Economies. Prod. Oper. Manag. 2015, 24, 1430–1440. [Google Scholar] [CrossRef]
  28. Benjaafar, S.; Kong, G.; Li, X.; Courcoubetis, C. Peer-to-Peer Product Sharing: Implications for Ownership, Usage, and Social Welfare in the Sharing Economy. Manag. Sci. 2019, 65, 477–493. [Google Scholar] [CrossRef]
  29. Banerjee, S.; Riquelme, C.; Johari, R. Pricing in Ride-Share Platform; Working Paper; Stanford University: Standford, CA, USA, 2015. [Google Scholar]
  30. Wang, X.; He, F.; Yang, H.; Gao, H.O. Pricing strategies for a taxi-hailing platform. Transp. Res. Part E Logist. Transp. Rev. 2016, 93, 212–231. [Google Scholar] [CrossRef]
  31. Cachon, G.P.; Daniels, K.M.; Lobel, R. The Role of Surge Pricing on a Service Platform with Self-Scheduling Capacity. Manuf. Serv. Oper. Manag. 2017, 19, 368–384. [Google Scholar] [CrossRef]
  32. Kung, L.-C.; Zhong, G.-Y. The optimal pricing strategy for two-sided platform delivery in the sharing economy. Transp. Res. Part E Logist. Transp. Rev. 2017, 101, 1–12. [Google Scholar] [CrossRef]
  33. Taylor, T.A. On-Demand Service Platforms. Manuf. Serv. Oper. Manag. 2018, 20, 704–720. [Google Scholar] [CrossRef]
  34. Barenji, A.V.; Wang, W.M.; Li, Z.; Guerra-Zubiaga, D.A. Intelligent E-commerce logistics platform using hybrid agent based approach. Transp. Res. Part E Logist. Transp. Rev. 2019, 126, 15–31. [Google Scholar] [CrossRef]
  35. Bai, J.R.; So, K.C.; Tang, C.S.; Chen, X.; Wang, H. Coordinating Supply and Demand on an On-Demand Service Platform with Impatient Customers. Manuf. Serv. Oper. Manag. 2021, 21, 556–570. [Google Scholar] [CrossRef]
  36. Liu, W.; Yan, X.; Wei, W.; Xie, D. Pricing decisions for service platform with provider’s threshold participating quantity, value-added service and matching ability. Transp. Res. Part E Logist. Transp. Rev. 2019, 122, 410–432. [Google Scholar] [CrossRef]
  37. Bai, J.; Tang, C.S. Can Two Competing On-Demand Service Platforms Be Both Profitable? Working Paper; UCLA: Los Angeles, CA, USA, 2022. [Google Scholar]
  38. Zhang, X.; Hou, W.; Zhang, W. Simultaneous or sequential? Multihoming launch strategies for mobile applications with consideration of promotion and switching costs. Int. J. Prod. Res. 2022, 21, 421–435. [Google Scholar] [CrossRef]
  39. Chen, Y.; Hu, A.; Zhang, J. Optimal auction design with aftermarket Cournot competition. Games Econ. Behav. 2024, 145, 54–65. [Google Scholar] [CrossRef]
  40. Zhang, Z.; Ko, P.; Hsu, C.; Tsai, C. Consumption network externalities, corporate social responsibility, and conflicting interests: Cournot vs. Bertrand competition. Manag. Decis. Econ. 2024, 45, 1894–1900. [Google Scholar] [CrossRef]
  41. Cui, Y.; Gaur, V.; Liu, J. Supply Chain Transparency and Blockchain Design. Manag. Sci. 2023, 70, 3245–3263. [Google Scholar] [CrossRef]
  42. Li, T.; Zhang, X. Development Trajectory of Blockchain Platforms: The Role of Multirole. Inf. Syst. Res. 2023, 35, 1296–1323. [Google Scholar] [CrossRef]
  43. Iyengar, G.; Saleh, F.; Sethuraman, J.; Wang, W. Blockchain Adoption in a Supply Chain with Manufacturer Market Power. Manag. Sci. 2023, 70, 6158–6178. [Google Scholar] [CrossRef]
  44. Azzi, R.; Chamoun, R.K.; Sokhn, M. The power of a blockchain-based supply chain. Comput. Ind. Eng. 2019, 135, 582–592. [Google Scholar] [CrossRef]
  45. Chod, J.; Trichakis, N.; Tsoukalas, G.; Aspegren, H.; Weber, M. Blockchain and the Value of Operational Transparency for Supply Chain Finance; Working Paper; Boston College: Boston, MA, USA, 2018. [Google Scholar]
  46. Shi, X.; Choi, T.M. Enhancing Food Safety by Using Blockchain Technologies; Working Paper; The Hong Kong Polytechnic University: Hong Kong, China, 2019. [Google Scholar]
  47. Rahmanzadeh, S.; Pishvaee, M.S.; Rasouli, M.R. Integrated innovative product design and supply chain tactical planning within a blockchain platform. Int. J. Prod. Res. 2020, 58, 2242–2262. [Google Scholar] [CrossRef]
  48. Zhang, Z.; Ren, D.; Lan, Y.; Yang, S. Price competition and blockchain adoption in retailing markets. Eur. J. Oper. Res. 2021, 300, 647–660. [Google Scholar] [CrossRef]
  49. Xu, X.; Choi, T. The Supply chain operations with online platforms under the cap-and-trade regulation: Impacts of using blockchain technology. Transp. Res. Part E 2021, 155, 102491. [Google Scholar] [CrossRef]
  50. Wu, X.-Y.; Fan, Z.-P.; Cao, B.-B. An analysis of strategies for adopting blockchain technology in the fresh product supply chain. Int. J. Prod. Res. 2021, 61, 3717–3734. [Google Scholar] [CrossRef]
  51. Tian, Z.; Li, M.; Qiu, M.; Sun, Y.; Su, S. Block-DEF: A secure digital evidence framework using blockchain. Inf. Sci. 2019, 491, 151–165. [Google Scholar] [CrossRef]
  52. Xu, X.W.; Lu, Q.H.; Liu, Y.; Zhu, L.M.; Yao, H.N.; Vasilakos, A.V. Designing blockchain-based applications a case study for imported product traceability. Future Gener. Comput. Syst. Int. J. eSci. 2019, 92, 399–406. [Google Scholar] [CrossRef]
  53. Pun, H.; Swaminathan, J.M.; Hou, P. Blockchain Adoption for Combating Deceptive Counterfeits. Prod. Oper. Manag. 2021, 30, 864–882. [Google Scholar] [CrossRef]
  54. Li, J.; Yu, Y.; Liu, C.; Deng, X. An optimal strategy of advertising and electronic word-of-mouth with considering rebates. Kybernetes 2023, 52, 6440–6466. [Google Scholar] [CrossRef]
Figure 1. The profit differences between fixed and modifiable pricing.
Figure 1. The profit differences between fixed and modifiable pricing.
Jtaer 19 00158 g001
Figure 2. The profit differences between fixed and modifiable pricing.
Figure 2. The profit differences between fixed and modifiable pricing.
Jtaer 19 00158 g002
Figure 3. The impact of β and λ on the platform’s optimal pricing scheme selection.
Figure 3. The impact of β and λ on the platform’s optimal pricing scheme selection.
Jtaer 19 00158 g003
Figure 4. The impact of σ and ε on the platform’s optimal pricing scheme selection.
Figure 4. The impact of σ and ε on the platform’s optimal pricing scheme selection.
Jtaer 19 00158 g004
Figure 5. The impact of ω and c on the platform’s optimal pricing scheme selection.
Figure 5. The impact of ω and c on the platform’s optimal pricing scheme selection.
Jtaer 19 00158 g005
Table 1. Main notation.
Table 1. Main notation.
NotationDefinition
p i ( j ) The price of platform i in period j under modifiable pricing
p i The price of platform i under fixed pricing
λ The government enforcement efforts for combating counterfeits
ω ( λ ) The being-caught probability
ε The consumer’s sensitivity degree to counterfeits
β The fraction of consumers who are sensitive to privacy concerns
σ The consumer’s perceived privacy-information leakage degree
Δ The net advantage of purchasing the product on platform B over platform T
c The unit cost of blockchain implementation
v B , v T The consumer’s perceived product’s base value on platform B and platform T, respectively
μ The degree of product differentiation on two platforms
x The customer location
η The power of the eWOM effect, η 0
U i ( j ) The utility of using platform i in period j
q i ( j ) The product demand of platform i in period j
π i ( j ) The profit of platform i in period j
π i The total profit of platform i
Note i = B or T and j = 1 or 2.
Table 2. The equilibrium outcomes in case (F, F).
Table 2. The equilibrium outcomes in case (F, F).
OutcomePlatform BPlatform T
Price p B F F = 6 μ 2 + ( 3 c + h ) ( 2 μ + η ) 3 η + 6 μ p T F F = 6 μ 2 h ( 2 μ + η ) 3 η + 6 μ
First-period
product demand
q B F F ( 1 ) = 3 μ + h 6 μ q T F F ( 1 ) = 3 μ h 6 μ
Second-period
product demand
q B F F ( 2 ) = 3 μ 2 + h ( μ + η ) 6 μ 2 q T F F ( 2 ) = 3 μ 2 h ( μ + η ) 6 μ 2
Profit π B F F = [ h ( 2 μ + η ) + 6 μ 2 ] 2 18 μ 2 ( η + 2 μ ) π T F F = [ h ( 2 μ + η ) 6 μ 2 ] 2 18 μ 2 ( η + 2 μ ) k λ e λ
Table 3. The equilibrium outcomes in case (F, M).
Table 3. The equilibrium outcomes in case (F, M).
OutcomePlatform BPlatform T
First-period price p B F M = 12 μ 3 c η ( μ + η ) + μ 2 ( 10 c 6 η + 4 h ) η 2 μ η + 10 μ 2 p T F M ( 1 ) = 22 μ 4 7 η μ 2 ( η + μ ) + ( η 3 + 4 η 2 μ + η μ 2 6 μ 3 ) h N 1
Second-period price p T F M ( 2 ) = 22 μ 4 + μ 2 η ( η 5 μ ) + N 2 μ h N 1
First-period product demand q B F M ( 1 ) = 18 μ 3 + N 2 h + η ( μ 2 η 2 4 μ η ) 2 N 1 q T F M ( 1 ) = 22 μ 3 + η ( η 2 + 2 μ η 15 μ 2 ) + N 2 h 2 N 1
Second-period product demand q B F M ( 2 ) = 18 μ 3 + η ( 11 μ 2 2 η 2 5 μ η ) + N 2 h 2 N 1 q T F M ( 2 ) = 22 μ 3 + μ η ( η 5 μ ) + N 2 h 2 N 1
Profit π B F M = μ 2 ( 3 μ + η ) ( 6 μ 3 η + 2 h ) 2 ( η 2 + μ η 10 μ 2 ) 2 π T F M = 484 μ 6 + η μ 2 N 5 + N 3 h 2 + N 4 h 2 ( 2 μ + η ) ( η 2 + η μ 10 μ 2 ) 2 k λ e λ
Note: N 1 = η 3 + 3 η 2 μ 8 η μ 2 20 μ 3 , N 2 = η 2 + 5 μ η + 6 μ 2 , N 3 = 36 μ 4 + 24 η μ 3 η 4 6 μ η 3 5 μ 2 η 2 , N 4 = 23 η 3 μ 2 η 5 4 η 4 μ + 82 η 2 μ 3 76 η μ 4 264 μ 5 , and N 5 = 7 η 3 + 8 η 2 μ 139 η μ 2 44 μ 3 .
Table 4. The equilibrium outcomes in case (M, F).
Table 4. The equilibrium outcomes in case (M, F).
OutcomePlatform BPlatform T
First-period price p B M F ( 1 ) = 22 μ 4 + 7 μ 3 ( η 2 c ) + η 2 μ ( 7 μ c ) 9 c η μ 2 + N 6 ( h + c ) N 1 p T M F = 2 μ 2 ( 3 η 6 μ ) + 4 μ 2 h η 2 + η μ 10 μ 2
Second-period price p B M F ( 2 ) = 22 μ 4 + η μ 2 ( 3 c η ) + μ 3 ( 14 c + 5 η ) + μ N 2 ( h + c ) c η 2 ( η + 4 μ ) N 1
First-period product demand q B M F ( 1 ) = 22 μ 3 + 15 η μ 2 η 2 ( η + 2 μ ) + N 2 h 2 N 1 q T M F ( 1 ) = 18 μ 3 η μ 2 + η 2 ( η + 4 μ ) + N 2 h 2 η 3 + 6 η 2 μ 16 η μ 2 40 μ 3
Second-period product demand q B M F ( 2 ) = 22 μ 3 + ( 5 μ η ) η μ + N 2 h 2 N 1 q T F M ( 2 ) = 22 μ 3 + μ η ( η 5 μ ) + N 2 h 2 N 1
Profit π B M F = N 9 μ 2 + N 7 h 2 + N 8 h 2 N 1 2 π T M F = μ 2 ( η + 3 μ ) ( 3 η 6 μ + 2 h ) 2 ( η 2 + η μ 10 μ 2 ) 2 k λ e λ
Note: N 6 = η 3 + 4 η 2 μ + η μ 2 6 μ 3 , N 7 = 72 μ 5 + 84 η μ 4 + 14 η 2 μ 3 η 5 8 η 4 μ 17 η 3 μ 2 , N 8 = η 6 + 6 η 5 μ 15 η 4 μ 2 128 η 3 μ 3 88 η 2 μ 4 + 416 η μ 5 + 528 μ 6 , N 9 = 7 η 5 + 22 μ η 4 123 η 3 μ 2 322 η 2 μ 3 + 396 η μ 4 + 968 μ 5 .
Table 5. The equilibrium outcomes in case (M, M).
Table 5. The equilibrium outcomes in case (M, M).
OutcomePlatform BPlatform T
First-period
price
p B M M ( 1 ) = 8 η 3 + 6 η ( c η c μ + 2 η μ ) + 27 μ 2 ( 2 η 2 c 3 μ ) + 3 ( 2 η 2 + 2 η μ 9 μ 2 ) ( h + c ) 12 η 2 81 μ 2 p T M M ( 1 ) = 8 η 3 + 3 μ ( 27 μ 2 4 η 2 18 η μ ) + ( 6 η 2 + 6 η μ 27 μ 2 ) h 81 μ 2 12 η 2
Second-period price p B M M ( 2 ) = 27 μ 3 + ( 3 η μ + 9 μ 2 ) ( h + c ) 4 η 2 ( c + μ ) + 3 c μ ( 6 μ η ) 27 μ 2 4 η 2 p T M M ( 2 ) = 27 μ 3 + 4 η 2 μ + 3 μ ( η + 3 μ ) h 4 η 2 27 μ 2
First-period
product demand
q B M M ( 1 ) = 27 μ 2 4 η 2 + ( 9 μ + 4 η ) h 54 μ 2 8 η 2 q T M M ( 1 ) = 27 μ 2 + 4 η 2 + ( 9 μ + 4 η ) h 8 η 2 54 μ 2
Second-period
product demand
q B M M ( 2 ) = 27 μ 2 4 η 2 + 3 ( η + 3 μ ) h 54 μ 2 8 η 2 q T M M ( 2 ) = 27 μ 2 + 4 η 2 + 3 ( η + 3 μ ) h 8 η 2 54 μ 2
Profit π B M M = 3 M 1 h 2 + 2 M 2 h + 6 η μ M 3 + 4374 μ 5 32 η 5 6 ( 4 η 2 27 μ 2 ) 2 π T M M = 3 M 1 h 2 2 M 2 h + 6 η μ M 3 + 4374 μ 5 32 η 5 6 ( 4 η 2 27 μ 2 ) 2 k λ e λ
Note: M 1 = 162 μ 3 + 72 η μ 2 17 η 2 μ 8 η 3 , M 2 = 28 η 4 12 η 3 μ + 81 η μ 3 405 μ 2 η 2 + 1458 μ 4 , M 3 = 16 η 3 + 72 η 2 μ 216 η μ 2 243 μ 3 .
Table 6. Changes in product demands over two periods.
Table 6. Changes in product demands over two periods.
Outcome(F, F)(F, M)(M, F)(M, M)
Product demandPlatform B ( h > 0 )
( h < 0 )
( h > 0 )
( h < 0 )
Platform T ( h > 0 )
( h < 0 )
( h > 0 )
( h < 0 )
Note: ‘↑’ means that the product demand in the second period exceeds that in the first period, and ‘↓’ means that the product demand in the first period exceeds that in the second period.
Table 7. Effects of h on the equilibrium results in four cases.
Table 7. Effects of h on the equilibrium results in four cases.
Outcome(F, F)(F, M)(M, F)(M, M)
Platform BFirst-period price
Second-period price
First-period product demand
Second-period product demand
Profit
Platform TFirst-period price
Second-period price
First-period product demand
Second-period product demand
Profit
Note: ‘↓’ means that the variable decreases in h and ‘↑’ means that the variable increases in h .
Table 8. Effects of c on the equilibrium results in four cases.
Table 8. Effects of c on the equilibrium results in four cases.
Outcome(F, F)(F, M)(M, F)(M, M)
Platform BFirst-period price
Second-period price
First-period product demand
Second-period product demand
Profit
Platform TFirst-period price
Second-period price
First-period product demand
Second-period product demand
Profit
Note: ‘↓’ means that the variable decreases in c and ‘↑’ means that the variable increases in c .
Table 9. Effects of ε on the equilibrium results in four cases.
Table 9. Effects of ε on the equilibrium results in four cases.
Outcome(F, F)(F, M)(M, F)(M, M)
Platform BFirst-period price
Second-period price
First-period product demand
Second-period product demand
Profit
Platform TFirst-period price
Second-period price
First-period product demand
Second-period product demand
Profit
Note: ‘↓’ means that the variable decreases in ε and ‘↑’ means that the variable increases in ε .
Table 10. Effects of λ on the equilibrium results in four cases.
Table 10. Effects of λ on the equilibrium results in four cases.
Outcome(F, F)(F, M)(M, F)(M, M)
Platform BFirst-period price
Second-period price
First-period product demand
Second-period product demand
Platform TFirst-period price
Second-period price
First-period product demand
Second-period product demand
Note: ‘↓’ means that the variable decreases in λ and ‘↑’ means that the variable increases in λ .
Table 11. Impacts of the other factors on the equilibrium results in four cases.
Table 11. Impacts of the other factors on the equilibrium results in four cases.
Outcome(F, F)(F, M)(M, F)(M, M)
Platform BFirst-period price↑♂↑♂↑♂↑♂
Second-period price↓♀↑♂
First-period product demand↑♂↑♂↑♂↑♂
Second-period product demand↑♂↑♂↑♂ or ↓♀↑♂
Profit↑♂↑♂↑♂↑♂
Platform TFirst-period price↓♀↓♀↓♀↓♀
Second-period price↑♂ or ↓♀↑♂ or ↓♀
First-period demand↓♀↓♀↑♂↓♀
Second-period demand↓♀↑♂ or ↓♀↑♂ or ↓♀↑♂ or ↓♀
Profit↑♂↑♂ or ↓♀↓♀↑♂ or ↓♀
Note: ‘↓’ and ‘↑’ mean that the variable increases with R, and ‘♀’ and ‘♂’ mean that the variable decreases or increases with S.
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Li, J.; Wang, X.; Li, L.; Zhao, D. Using Blockchain Technology to Combat Counterfeits: The Optimal Pricing Scheme of Two Competitive Platforms. J. Theor. Appl. Electron. Commer. Res. 2024, 19, 3253-3282. https://doi.org/10.3390/jtaer19040158

AMA Style

Li J, Wang X, Li L, Zhao D. Using Blockchain Technology to Combat Counterfeits: The Optimal Pricing Scheme of Two Competitive Platforms. Journal of Theoretical and Applied Electronic Commerce Research. 2024; 19(4):3253-3282. https://doi.org/10.3390/jtaer19040158

Chicago/Turabian Style

Li, Jizi, Xiaodie Wang, Longyu Li, and Dangru Zhao. 2024. "Using Blockchain Technology to Combat Counterfeits: The Optimal Pricing Scheme of Two Competitive Platforms" Journal of Theoretical and Applied Electronic Commerce Research 19, no. 4: 3253-3282. https://doi.org/10.3390/jtaer19040158

APA Style

Li, J., Wang, X., Li, L., & Zhao, D. (2024). Using Blockchain Technology to Combat Counterfeits: The Optimal Pricing Scheme of Two Competitive Platforms. Journal of Theoretical and Applied Electronic Commerce Research, 19(4), 3253-3282. https://doi.org/10.3390/jtaer19040158

Article Metrics

Back to TopTop