Comments
Description
Transcript
情報通信サービスの融合とロックイン効果: 固定ブロードバンドと携帯電話
'Ly{lFi|wu2 i+#QI NPB7=@>T ,) 8T S + D<DL;Q5L3M $T T 6 G/.0l?LUy{l: mEaYV`qkU%m ?F(FMC)y{l*O\HKotsVa[aUc_hUf l|wu2\(&`tgYsVfm[q+#QInl| wu2Ufm+#QI[qnl|wu2hXsV0J -lCJm4lLrhXsVAkU[q+#QInl|wu 2m ^[jZ[1adVclC2UNTT xl|wu2mbsp ll`Y_i\edVAkU+#QI[qnl|wu 2m ^[jZ[1adVclC2UNTT xl|wu2maUcl 2p]Y_i\edV v FTTHU3GUFMCU|w{z|~ } JEL RL96, H40 + W606-8501 N"!809NB7M Tel&Fax: 075-753-3477T E-mail:T [email protected] 1 I. ¡¦ EL '0f¯Õ½×¾Àx`x¯ÕÆÏX+·×Å»Z7 ¡[ §À¾ÈTU«(Taplin 2006, Fransman 2006, Ida 2006a, b) '0 fÇÓ×ÁÃÕÁÖ·×Å» .g&lCq«2006 6K 2500 &l(5F Wg 50%)« t¡FTTHÙ31%ADSLÙ53%CATV ¯Õ½× ¾ÀÙ16%« ¤ADSL z¦«§ FTTH ¹°® EL ÇÓ×ÁÃÕÁ V;« Qm¹°®q«NTT NpADSL 4* 39%FTTH 4* 68%¦« i`x .gCq« 2006 6K 9983 &l{ËïÑÖ¯Õ½×¾À ZW¡ 87%« r Pq«dA5u(2G)Ù32%dA5u(3G)Ù63%3G 2G -8« Qm¹°®q«NTT Á¶Ë2G 63%3G 51%¦« 9IJs¬«·×Å»¡S¾ÀÔײ(Next Generation Network, NGN) y3LP«'0x`x o$·×Å»(Fixed Mobile Convergence, FMC)«1 FMC ·×Å»(«S ¨« ľ´×ºÈÏÕ FMCÙÔÕ»À¾ÈÅÐÕ³v|·×Å»! 8·×Å»!« bKR% FMCÙØ bKØ u\#2§2,§xu· ×Å»Z« ¾ÀÔײ FMCÙ1 ¿×½É׻¾ÀÔײ¨ª¨ª ¹×ÊÒ»h$·×Å»Z« ©¢`«£Qm }]wZ¥Zm ¡ « cBe><¬«O]Y« G§7 FMC ·× Å»¡FTTH 3G Z«bÍ׸½×µ¾À« FTTH 3G D§ @«« ¡NTT ³Ñ×ÈKDDI ³Ñ×ȼÆÀÃÕ²³Ñ×È~ ©¬« 1 2005 6 6 H 15 EBT ¡:MÇÑ×ƱÕÖÈÓº°²Ày¦ FMC BT ÆÌ׺ÎÕ(BT Fusion)·×Å»@}/ ¬¡Ø A5 u2,¡ GSM A5uR2¡ Bluetooth(1M^¡ Wi-Fi) '0xj xuZ"n«·×Å»«(=)xk$_a? 2006) 2 £¥© ³®$.ÚãçÖØåÖ®* ±ÎÇÅÃ?¬ NTT Qx¯A4~ ®* ±ÎÇÅÃ?¬ NTT ÖËÞ³®°Âª¢³0!7a§Á³ kCn³Y¯±Á¨³&2 ¬³G;¿#ÃE`§Á£¯® ¾ NTT Qx³$.ÚãçÖØåÖæßçÍ´NTT ÖËÞ³A4~ÌçÙÐà a§Áe^³¯§Âµ¨Â´°³h6³* ¤ NTT ÖËÞ³A4~ÌçÙÐæßçÍ´ NTT Qx³$.ÚãçÖØåÖà a§Áe^³¯§Âµ¨Â´°³h6³* ¤ £³¾²Xq¿z¬³ÌçÙÐÃa§Á£¯¼¬³ÌçÙÐ Ãa§ÁsZ;ûÁ¾±;ÃãÓÈÆåS¯"¹ãÓÈÆåS´9 P×ÓÕäçÈ(;½i';,%§Á¼¯®\.³Uq½=v]À «§Á_ £ÁFr®¦¿Â ©(Shapiro and Varian 1999Witt 1999 Liebowitz and Margolis 2002 [)££®´NTT ÉáçÛ®$.ÚãçÖØåÖ (Á´A4~)¿A4~(Á´$.ÚãçÖØåÖ)²gu§Á£¯³G ³Uq®$.ÚãçÖØåÖ(Á´A4~)¿A4~(Á´$. ÚãçÖØåÖ)²gu§Á¾À¼ÐÆÓÒåÉa±°³{Y¿1K®Á£¯Ã ãÓÈÆåS¯"¶ £³¾±#²mÁ©»²2006 5 12 M*-¯pc´aqÅåÊ çÕTÃ/H¥$.ÚãçÖØåÖ¯A4~²§ÁXqaà Web ®ÅåÊçÕT¥©<´£³¾²¥:¿Â©f+(Revealed Preference, RP)ÔçÑÃa³+)V;Ãw_§ÁÝÓÈÐÖæãÏÓÕ(Mixed Logit, ML) æÞÔá¿R¥©IO³$.oÆåÑç×Ó Õ²¥Ida and Kuroda (2006a)RÃ¥Á 2 º©g²¥Ida and Kuroda (2006b)RÃ¥Á3¤¿²ADSL ¿ FTTH ·³ÜÆÉâçÎà岬 ¨³ ÚãçÖØåÖæÌçÙгD>R¯¥f+W(Revealed Preference Method, RPM)®R¥©¼³²´Madden et al. (1999)Eisner and Waldon (2001)Kridel et al. (2001)Dufy-Deno (2003)bb (2004)lÁ wJ+W(Stated Preference Method, SPM)®R¥©¼³¯¥Madden and Simpson (1997)Savage and Waldman (2005)Ida and Sato (2004)Ida, Kinoshita, and Sato (2006)tb (2004)Nbt (2005)lÁ 3 A4~³/}dj´ºª3±¡Taylor (2002, p.130)®¼A4~³yL ;³R´8³¯@B¤ÂÁº¥3G à ĪA4~y³| R´¸¯Ä°,%¥±(´ Kim (2005)®À£³F´ËåÏàÆåÕR Ãa 3G ²2§ÁXq³wJ+ÃR¥Á¨³ Tishler et al. (2001) 2 3 Ida and Sakahira (2007)z7usyr!¯³¶ª¬´ª.%d[ 7 TEH |r5EHzZs k 5^/M^tsIr¯³¶ª¬´ªy.%d[³§´8 cr=v}zsNTT 6V¯³¶ª¬´ª£z 1%zr NTT ª¡°.%d[£z 0.06%zs³§´8NYC4)t zr´©#~u(f'Ct)sy|r³§´8 2G 3G xuiStsIr.%d[y¯³¶ª¬´ª³§´8 cr=v}zsNTT ª¡°.%d[£z 1%zr NTT 6V¯³¶ª¬´ª£z 1.05%zs³§´8NYC4) tr´©{u('Ct)sy|r³§´8 ADSL FTTH xuiSts k 5^/<*=vusIlKr]9;W5CNY\2 sImKr-!°¨²\2sInKr¯³¶ª¬´ªy.%d [³§´8\2sIoKr.%d[y¯³¶ª¬´ª³§ ´8\2sIpKr¯³¶ª¬´ª.%d[b³§´8 ?!sIqKrM^ws II.k ]9;W5CNY k 5Kr7Au]9;W¨¶¦5CNYuX\s 2006 & 12 3r` µODr!¯³¶ª¬´ªr.%d[c´ ¶ ©]9"0s°«¦BaFBaQyr!¯³¶ª¬´ª.%d[ AQ 1874 +rWeb ´ ¶©]9s(r&jrR:r%& rJQ$(U 1 _ts <U 1 ,> k !¯³¶ª¬´ªL@>U 2 _tsPG£ ADSL(52%)r FTTH(33%)rCATV(15%)husNTT 6V£ ADSL(36%)r FTTH(63%)ts!¯³¶ª¬´ª¢¶®¥A@>U 3 _ts Kim and Kwon (2003)rIimi (2005)³¤§©µ°¨²Aur¥±²rgr1 5.%d[eW7us 4 ADSL 050-IP }m(45%)FTTH 0ABJ-IP }m(39%)¦Vª© ? ;ËP;~EË=v³ÌÀ¶V ADSL FTTH xd+ h§ ªCATV ®Ê¸Ì¾¹¼ V&j'ª© <f 2 4> <f 3 4> 6,}m³ÌÀ¶"aRL f 4 r¨© Dc´° NTT ½²Ç (47%)au(32%)·Á¼¿Ê±(22%)© iC<.´° 2G(30%) 3G(70%)© 6,}m³ÌÀ¶VRL f 5 r¨© 3G < 2G ¦ ¨¤ÆÌȯ°Â¦@³ÌÀ¶§W¥weKN¦-³ÌÀ¶¢ V- l3G ¤-³ÌÀ¶V- ª¡ « <f 4 4> <f 5 4> III. 5%Ç»È @_ AV©5%Ç»Èko© @p:YX % É̽¿Ê½6,}m 2 ³ÌÀ¶u3xɹ±®ÊB<0! ¬A©© {%ÂÉ̽¿Ê½6,}m 2 u3 t]<\.ǻȨ<\.Z $0«U0¬b2ª© /g© t]|8u3´¶ºÅ(©`kKMy1>*M¬ V 2 Izɵ¹¼ËÇ»È5%M(Amemiya 1978)¥ 2 IzÃÉÀ¹¼ËÇ»È5% M(Nelson and Olson 1978)¦Vª© H¦2 Izɵ¹¼Ë Ç»È5%M¬V5%© ^Iz<\.JU9£¬Vn)¬Éµ¹¼ËÇ»È5 %© ^Iz^Izu3O[S¬79<\.q Fs¬Éµ¹¼ËÇ»È5%© Q^Iz|8u3Ç »È xu# G0¬fT©¦Ä¹±¶½Ëɵ¹¼(ML)ËÇ 5 Kpn .%7ui6L _g= 1Aza&kuGRt '{x(Independent and Identical Distribution, IID) z} CL u@DL onztzmCL IID pq t IIA uCJ{n|xmIIA V{1Az ML ud)BMypnML e ? 0mUypj\;0¢¡m]"X\ 9TLNh2q x vYLo(McFadden and Train 2000) 4n l ML 7 u'4 zmCL e3PH 'h zQz}-[Iy£Train 2003, Louviere et al. 2000¤nCL e3P H Lni mb87 ¢ m n ue3W i t/K q~]" Xf Vni me3W 7 J {m Lni ( ) = exp(Vni ( )) / j =1 exp(Vnj ( )) J otmML h7 !*h7 f ( ) swm Pni = exp(V ( )) / J exp(V ( )) f ( )d j =1 ni nj n l ML ^=L^wxuvp}m5 ¢¡uKp n u f ( | ) pq'4m't+vy} r :wxzm ¢ 7 R {n f ( | ) t r ¢Zqxm| r e3 PH Lni ( ) _Svnx ¢y}PH (m P̂ni = 1 / R r =1 Lni ( r ) R mx PHO PH Pni 5 gon¢y}#7$*h 7(Simulated Log Likelihood, SLL)m d ni ,`e3Wue3y}¦me3 ypp¥¡¢h7K{xm SLL= n=1 j =1 d ni ln P̂nj N J nx ¢y}#7$*h7 <r u¢y} ML ¢u'{xFE,} Random Parameter m;¢¡ >c0FE,} Error Components (Revelt and Train 1998, Brownstone and Train 1999, Ben-Akiva, Bolduc, and Walker 2001)n 4 6 /(RmozZddlrY100 qm 200 qq ,}KeYqV$}=MehZ X ML lrYq;pj\kYSqQ& }vmpY?C p q1 }J@laz(Revelt and Train 2000)Z?C n qQ& ~ yn }%meh q!=:r h( | yn ) = P( yn | ) f ( ) P( yn | ) f ( )d m.czZ IV. _x) TLsq 3 0AlrY_x) TLsq3}J7fzZgY NTT <Cp^cz NTT ) TLq<96rE 6 qPyl [zZNTT 2Gq<C` NTT q) TL}<fz5: (51%)rYNTT 2Gq<C` NTT q) TL}<fz 5:(44%)wyvW\Z8pYNTT 2Gq<C` NTT q 3G } <fz5:(52%)rYNTT 2Gq<C` NTT q 3G } <fz5:(42%)wyvW\Z3hekYNTT lY_x) TLsY3r\k\z_n]_Z <E 6 '> X ddlrY3 iq_xY_x) TLsq3} fzZ>qrYFN-*} NTT ) TLQ&(2G+3G)thr NTT 2Gq) TLQ&(2G+3G)mek\zZ>qrYFN- *} NTT 3G Q&thr NTT 2Gq 3G Q&mek\zZ>q rYFN-*} NTT 2G Q&thr NTT 2Gq 2G Q& mek\zZYU4YN-ek\bZ DpYeh(B3}"zhuprY200-300 qY[z\r 100 q`#Hl[zmI|{k\z(Halton 1960, Bhat 2001, Train 2003)Z0O+q(B3r 100 l[zZ 5 7 K XLu 1LG>(2G+3G)DRfdePM;?# jL(1)NTT vo G>L(2)NTT voG>]WhM?# aL,<jWh s}y~r]w s}y~r_SfihM s}y~rjL (1)NTT {vx vD40L(2)$F&!E(B>+urB+)8 5C1)]WhM"Lw s}y~rjL(3)kl{1s|L(4)H +2As|L(5)I(sk vs|L(6)2A1s|L(7)tz G>1s|L(8) qntzpm1s|L(9)E9-.1s|]WhM u 1 `?# `&37=a: 7(a)_Qfi[OhMu 1 `6' a: 8(a)_Qfi[OhM ZYT]a*`eP_c]dfihM NTT {vx vRf NTT voG>bL%^,`JjQhM &!EaLG>`D_%^@`JjQhM tzG>1LE9-.1aL NTT voG>_%^,`Jj QhM I(sk vL qn1aLNTT voG>_%^@`Jj QhM <: 7 > <: 8 > K *_Lu 2L3G Dj?#UePM;?# jL(1)NTT vo 3GL(2)NTT v o 3G ]WhMu 2 `?# aLu 1 _/VL: 7(b)`Bg\NhM u 2 `6'a: 8(b)_Qfi[OhM ZYT]a*`eP_c]dfi hM NTT {vx vRf NTT G>(3G)bL%^,`JjQhM &!EaLG>(3G)`D_%^JjQ[O^O6M tzG>1LE9-.1aL NTT G>(3G)_%^,`Jj QhM I(sk vL qn1aLNTT G>(3G)_%^@`JjQ $73/?;=20@ 1(Ida and Kuroda (2006b)3/?;=2)64>51<0@' )64>5189=2: NTT ! 3GNTT !"+ 3G #- 4>%A NTT !,.* & 6 8 vT R 'lS 3S2G JxH&`sWTBH&$xS(1)NTT | 2GS(2)NTT | 2G ibvT 3 mH&$nSNGSK@13xM\S 1 l5aSA 7(c)mIuhUvT 3 m"<,nA 8(c)lXtwgVvTe d_in.msWlpiqtwvT NTT Zt NTT |#NG(2G)oS)kOnDtwkVT *%KnS#NG(2G)mJl)kOxXgVkVT Vcwm$r)hnkVT V. #NGZtomzy, *;hnS#NGZtomzy,xF4bvTcS NTT |m#NG8?lY^v NTT m862nA 9 mIu hUvTNTT |m#NG8?[ NTT +Cmx8bv07 (43%)nSNTT |m#NG8?[ NTT +Cmx8bv 07(36%)surQVT-lSNTT |m#NG8?[ NTT +Cm FTTH x 8bv07(65%)nSNTT |m#NG8?[ NTT +Cm FTTH x 8bv07(62%)surQVTNTT {hS#NGZtoS zy,nVgVvZjWZT <A 9 > R __hnS3 fmZtS#NGZtomzy,x bvT:mnSBH&$x NTT +C(ADSL+FTTH)p dn NTT +Cm(ADSL+FTTH)i`gVvT:mnSB H&$x NTT +C FTTH pdn NTT +Cm FTTH i`gVvT:m nSBH&$x NTT +C ADSL pdn NTT +Cm ADSL i`gVvT SP.SH&`gV]T R cS 4S(ADSL+FTTH)ZtqsWTBH&$xS(1)NTT +CS(2)NTT +CibvTH&$nS/E xbv~ }i~ }l^twvT~ }xS(1)NTT |#NGJ97S(2)(L*%K(>!=%K 9 +ISP 7wIP ;2S8=!7)PJ[@?ftqtcmuhqnvbv]? (3)050-IP ;2(clv?(4)0ABJ-IP ;2(clv?(5))_via(clv? (6)kt`ptclv?(7):$(6 :+)PJ[@odr 4 S3 S !*-1T. 10(a)RDY\NB[@odr 4 S,#T. 11(a)RDY\N B[@MLGPTEEXK%SXCRVPWY\[@ NTT e^o;2FY NTT jsvegteU? !7T?jsvegteS6R Q<]DQB7@ 0ABJ-IP ;2(?)_via(T? NTT jsvegteR Q&S Q&S<]D[@ <]D[@ 050-IP ;2(?kt`ptT?NTT jsvegteR Q4S<] D[@ <. 10 > <. 11 > > %R?odr 5?FTTH 6]3HXC@/3 ]?(1)NTT "0 FTTH? (2)NTT "0 FTTH PJ[@odr 5 S3 T?050-IP ;2(clv]9 BN?odr 4 R'I?. 10(b)S5ZOA[@odr 5 S,#T. 11(b)RD Y\NB[@MLGPT%SXCRVPWY\[@ NTT e^o;2FY NTT-FTTH U? !7T?FTTH S6R Q<]DQB@ )_via(T? NTT-FTTH R Q&S<]D[@ kt`ptT?NTT-FTTH R Q4S<]D[@ Q&S<]D[@ > R?odr 6?ADSL 6]3HXC@/3 ]?(1)NTT "0 ADSL? (2)NTT "0 ADSL PJ[@odr 6 S3 T?0ABJ-IP ;2(clv] 9BN?odr 4 R'I?. 10(c)S5ZOA[@odr 6 S,#T. 11(c)R DY\NB[@MLGPT%SXCRVPWY\[@ NTT e^o;2FY NTT-ADSL U? Q&S<]D[@ ';62D@B53E 4+Ida and Kuroda (2006a)Ida and Sakahira (2007)!"$ #B5, 97C84A3E* ,97C84<=B5 > NTT :?!"$ #NTT :?%.!"$ # &0 7C(F NTT :?/1-) 7 10 40MmTADSL lL*k3(j$QxYjWU R")&mT NTT-ADSL k3(j:l$QxYvU 050-IP OJ?T mTNTT-ADSL k3(jKl$QxYvU VI.S i."OJlNl}{7l< S 4DhmT-F7xkTL*A>l#'x6bsXUL*A>l#'i mTVvl|z\ 1%\vi]kTll|z\%\v[x GbT2 fl!Nl}{7xGc+8ibgpjc`i\5vU!NhT #'l/mPC@hVu&vU S dT[t."OJnl}{7\ 1 kBawgWvU 1 hmTNTT [t NTT ."OJnlL*A>l#'m 0.059(1%;=3()hVvU 2 hmTNTT [t NTT-3G nlL* A>l#'m 0.076(1%;=3()hVvU2%kT 3 hmTNTT [t NTT-2G nlL*A>l#'m 0.040(P3()hVvUIEcviTNTT [t NTT ."OJj[yd^ 3G nl}{7mcv rllTel{} maW(P#@hVv)U < 1 , > S 9kT."OJ[tnl}{7\ 2 kBawgWvU 4 hmTNTT ."OJ[t NTT nlL*A>l#'m 1.046(1% ;=3()hVvU 5 hmTNTT ."OJ[t NTT-FTTH nlL*A>l# 'm 1.067(1%;=3()hVvU 6 hmTNTT ."OJ[t NTT-ADSL n lL*A>l#'m 0.872(1%;=3()hVvUIEcviTNTT ."OJ[t NTT j[yd^ FTTH nl}{7mbTel{} m k]WU < 2 , > S [tTNTT ~kZ_v}{7x9lsXkoiqv`i\h]vU NTT ~hmTi."OJNhTWkHbXsXj1 11 ¿¯ª©ÀC'!¦¤:/¤¸¿Á²´À²¿¯ª©À C>+¿¯ª©À£¥¡%NTT «¾Á¹¸¿Á²´À²:/|k zF¢Ueh§¦¿¯ª©ÀC[{cN ^CjKob NTT ¸¼À²w&Y¦ ¤:/|k¤¿¯ª©ÀCg¦w&$H3¨ 3 9r A»°¾zw&$H3¨dQ¦ ML »°¾¨S¦ :/|k¤¸¿Á²´À²¿¯ª©ÀC.¨¶±«¼ºd:/| k¤¸¿Á²´À²¿¯ª©ÀC@4©Àµª±¡%> ¿¯ª©ÀCzw&$H3¡% < 3 8> VII. ^n AVZ2 M)yTB\ )¸¿Á²´À²¤: /|k¿¯ª©ÀC B^CNTT «¾Á¹¿¯ª ©ÀC'!¦¡,\:/|k¤ )¸¿Á²´ À²¿¯ª©ÀC B^CNTT «¾Á¹¿¯ª©À C'!C¡% AVZ4It¥¦:/|k )¸¿Á²´À²O 3G FTTH FMC ¬Á· 2 AD¦?:/|k )¸¿Á²´À²3G FTTH ¨?_¦¸¼À²-" 3 ¥52§¦O: /|k¨pM¿¯ª©ÀC> )¸¿Á²´À²¨pM¿¯ª©À C£¥¡%^n )¸¿Á²´À²:/|k¿¯ª© ÀC}+X3¦¨W¦ AVZ2 Ml~¨7;\Q!vcRFGu#¨ ¥6Kobw&¡()sqmE1f¦\:/ |k )¸¿Á²´À²z@4¿¯ª©ÀCi*§¤ [<]~¦ ¡0¡J4L»³®½À«¨` ¦xf¦ a=P 12 +)+ (2005) ,8C9@7C;245 IP '#(!3"- 57.2: 65-74. *+) (2004) ,&%?:A6.13>BD<=C< 3(!-InfoCom Review 35: 25-36. +) (2004) ,3>BD<=C< 2/05$%38C 9@7C;-InfoCom Review 34: 87-98. Amemiya, T. (1978) "On a Two-step Estimation of a Multivariate Logit Model," Journal of Econometrics 8: 13-21. Ben-Akiva, M., D. Bolduc, and J. Walker (2001) "Specification, Estimation and Identification of the Logit Kernel (or Continuous Mixed Logit) Model," Working Paper, Department of Civil Engineering, MIT. Bhat, C. (2001) "Quasi-random Maximum Simulated Likelihood Estimation of the Mixed Multinomial Logit Model," Transportation Research B 35: 677-693. Brownstone, D. and K.E. Train (1999) "Forecasting New Product Penetration with Flexible Substitution Patterns," Journal of Econometrics 89: 109-129. Duffy-Deno, K.T. (2003) "Business Demand for Broadband Access Capacity," Journal of Regulatory Economics 24: 359-372. Eisner, J. and T. Waldon (2001) "The Demand for Bandwidth: Second Telephone Lines and One-line Services," Information Economics and Policy 13: 301-309. Fransman, M. (ed.) (2006) Global Broadband Battles, Stanford University Press. Halton, J. (1960) "On the Efficiency of Evaluating Certain Quasi-random Sequences of Points in Evaluating Multi-dimensional Integrals," Numerische Mathematik 2: 84-90. Ida, T. (2006a) "The Broadband Market in Japan," R. Taplin and M. Wakui (eds.), Japanese Telecommunications Market and Policy in Transition, Routledge: 37-64. Ida, T. (2006b) "Broadband, Information Society, and National System in Japan," M. Fransman (ed.), Global Broadband Battles, Stanford University Press: 65-86. Ida, T., S. Kinoshita, and M. Sato (2006) "Conjoint Analysis of Demand for IP Telephony: The Case of Japan," Applied Economics, forthcoming. Ida, T. and T. Kuroda (2006a) “Discrete Choice Analysis of Demand for Broadband in Japan,” Journal of Regulatory Economics vol.29: 5-22. Ida, T. and T. Kuroda (2006b) "Discrete Choice Model Analysis of Demand for Mobile telephone Service in Japan" Graduate School of Economics, Kyoto University, 13 COE21 Discussion Paper No. 90. Ida, T. and M. Sato (2004) "Conjoint Analysis of Consumer Preferences for Broadband Services in Japan," Graduate School of Economics, Kyoto University, COE21 Discussion Paper No. 32. Ida, T. and K. Sakahira (2007) "Broadband Migration and Lock-in Effects: Mixed Logit Model Analysis of Japan's High-speed Internet Access Service," Graduate School of Economics, Kyoto University, COE21 Discussion Paper No.120. Iimi A (2005) Estimating Demand for Cellular Phone Services in Japan. Telecommunications Policy 29: 3-23. Kim HS, Kwon N (2003) The Advantage of Network Size in Acquiring New Subscribers: A Conditional Logit Analysis of the Korean Mobile Telephony Market. Information Economics and Policy 15: 17-33. Kim Y (2005) Estimation of Consumer Preferences on New Telecommunications Services: IMT-2000 Service in Korea. Information Economics and Policy 17: 73-84. Kridel, D.J., P.N. Rappoport, and L.D. Taylor (2001) "An Econometric Model of the Demand for Access to the Internet by Cable Modem," in D.G. Loomis and L.D. Taylor (eds.) Forecasting the Internet: Understanding the explosive Growth of Data Communications, MA: Kluwer Academic Publishers. Liebowitz, S.J. and S.E. Margolis (2002) "Network Effects," in: M.E. Cave et al. (eds.) Handbook of Telecommunications Economics Vol.1, North-Holland: 76-96. Louviere, J.J., D.A., Hensher and J.D. Swait, (2000) Stated Choice Methods, Cambridge University Press. Madden, G. and M. Simpson (1997) "Residential Broadband Subscription Demand: an Econometric Analysis of Australian Choice Experiment Data," Applied Economics 29: 1073-1078. Madden, G., S.G. Savage, and G. Coble-Neal (1999) "Subscriber Churn in the Australian ISP Market," Information Economics and Policy 11: 195-208. McFadden, D. and K.E. Train (2000) "Mixed MNL Models of Discrete Choice Models of Discrete Response," Journal of A: lied Econometrics 15: 447-470. Nelson, F. and L. Olson (1978) "Specification and Estimation of a Simultaneous-Equation Model with limited Dependent Variables," International Economic Review 19.3: 695-709. 14 Revelt, D. and K. Train (1998) "Incentives for Appliance Efficiency in a Competitive Energy Environment: Random Parameters Logit Models of Households' Choices," Review of Economics and Statistics 80: 647-657. Revelt, D. and K. Train (2000) "Specific Taste Parameters and Mixed Logit," Working Paper No. E00-274, Department of Economics, University of California, Berkeley. Savage, S.J. and D. Waldman (2005) "Broadband Internet Access, Awareness, and Use: Analysis of United States Household Data," Telecommunications Policy 29: 615-633. Shapiro, C. and H.R. Varian (1999) Information Rules: A Strategic Guide to the Network Economy, Harvard Business School Press. Taplin, R. and M. Wakui (eds.) (2006) Japanese Telecommunications Market and Policy in Transition, Routledge. Taylor L.D. (2002) Customer Demand Analysis. In: Cave ME, Majumdar K, Vogelsang I (eds.) Handbook of Telecommunications Economics Vol.1. North Holland Publishing. Tishler A, Ventura R, Watters J (2001) Cellular Telephones in the Israeli Market: the Demand, the Choice of Provider and Potential Revenues. Applied Economics 33: 1479-1492. Train, K.E. (2003) Discrete Choice Methods with Simulation, Cambridge University Press. Witt, U. (1999) "'Lock-In' vs. 'Critical Masses'--Industrial Change under Network Externalities," International Journal of Industrial Organization 15: 753-773. 15 -7G)* 3@4 "% ' ?:9 ;6592 ?97 :?5=2 86 9<9 7?5:2 96 =8? 9>5?2 :6 ;6: 8<5?2 ;6 8=> 7:5>2 (F =<< :65?2 ,! 78? <5?2 .+ 766 ;592 ?> ;582 966 # 8>7 7;562 966;66 ;88 8=5?2 3A41/ "% 3B4+!0 "% & >8 :5:2 ! 9=6 7?5=2 3C4 "% ;66=66 =667666 76667;66 7;66 ::8 :78 7<< ;7 895<2 88562 >5?2 85=2 16 MPILHJNMOKL 86; 765?2 $+ >< :5<2 DE 9> 8562 ]PX\JLZJ 19ZD\KFI ')., &$ "& *//+ # ('/0 % " 2').,6 -// !$ "$ COILZ< #& % 9\[7<BA %! %# 7F;[KFIY\<A % % 56 & &" 3*//+6 -// &! # ! dc_b " % a^^` ! =9[:QG8>S & # 56 # %$ @UND\GW>S RVETH87 ?\MA 56 #" $% &! #& 4('/06 17 *f ZceUWdULeXO #=$1397CLeXO#$ \ea <@>Z_FNdI 0+. /(, 0.&+" /*&/" ','%68 +*++&0" ' '&'" C! C! C C )')(&)" ((' ((&*" ,.+ ,0&(" )())&)" #>$4::5CLeXO#$ \ea <@>Z_FNdI -(+ ,)0 0/&0" /,&)" ','%68 ((' (.&." )+) *0&'" C! C! C C (*, )(&." -/ ((&'" *-,/&0" (+' ))&," #?$21:;CLeXO#$ \ea <@>Z_FNdI ).+ )*, 0.&," /*&-" ','%68 )' .&(" ' '&'" C! C! C C +* (,&*" (/ -&+" (*, +/&'" ++ (,&." PH]`SDLeXO Gd_EdJe[ Gd_EdM^QYdI *.+ */&," SbX )*+ )+&(" () (&)" B C LeXO '&-" --( -/&'" ACCKd SdR )0 *&'" PH]`SDLeXO Gd_EdJe[ Gd_EdM^QYdI ),+ +'&0" SbX (,' )+&)" (( (&/" B C LeXO (&'" +*/ .'&," ACCKd SdR )+&)" PH]`SDLeXO Gd_EdJe[ Gd_EdM^QYdI 18 ()++&/" SbX )&(" ,/ )'&-" B C LeXO ) '&." (.0 -*&." ACCKd SdR . )&," VQTWdHdI ,.' ,/&-" AC '&-" VQTWdHdI *.-'&," AC (* )&(" VQTWdHdI (*, +/&'" AC * (&(" : $-795 2.6 !! $( " 04138, " 2.6 $( 04138, ! 2.6 $( 04138, ! % &#/+* '#) 19 2['"DZLF +:,/7<DZLF+ QZT >?N AQR ! ($ )H>XVZJY =OS WXGBYRE@ 1656* .3/6* /50 2.* /45 2-* 3. ..* 0/ 3* 1. 4* /1* M?SA #% &VZPXB 789 ;< 3 .* /1 1* KZCZJ SZHZ /3 2* . -* -* 3 .* IUL'" 2 .* +\,07<DZLF+ Y $ .1 0* , QZT >?N AQR ! ($ )H>XVZJY =OS WXGBYRE@ ./0/ 60* 3-1 13* 5-6 3.* 435 25* /12 .6* /11 .5* /20 .6* 4/ 2* M?SA #% &VZPXB 789 ;< ..3 6* .34 .0* // /* 13 0* ..* IUL'" , 06 0* Y $ ... 5* 20 KZCZJ SZHZ /-0 .2* !A<>@:;?:/432>976? +)**<>@:;?:1.05)**:8=2 )**:8= )**:8= )** # ! " #" )** ! " %% ## $$ #" " $ ,)**<>@:;?:1.05)**:8='2 :8= :8= )** " " " # )** " "! &**( ! !" ! -)**<>@:;?:1.05)**:8='2 :8= :8= )** $# )** ! ! &**( $ "" $ $ 21 4S $"> (:) $"> " 899HCK 899HCK 55/ 14,.' 66/ 2/,6' %! &F?P OPEBQL ?@J ! GMI$ # NRH DA =0*/34 046 .2. ..6 26 00 2 + 10,-' .4,.' .0,2' 3,4' 0,4' -,3' =/*642 052 .22 .24 33 .. 54 + 05,5' .2,3' .2,5' 3,4' .,.' 5,5' # 53 6,5' 03 0,3' (;)07"> " 899HCK 899HCK 2013,4' 3-1 20,0' %! &F?P OPEBQL ?@J ! GMI$ # NRH DA =0*045 =1*36/,5 /30 .-4 61 2 0/ + + 16,3' /-,/' .4,4' -,6' 3,-' =0*-01 =1*03/,/25 .-/ ..5 25 3 + + 1/,4' .3,6' .6,2' 6,3' .,-' # 26,1' 12 4,2' (<)/7"> " 899HCK 899HCK /.6 14,4' /12/,0' %! &F?P OPEBQL ?@J ! GMI$ # NRH DA =0*-./ =1*/5.,6 3/3 .. + + /4,1' ..,6' 2,-' -,-' -,-' =/*514 =0*642,/ 4/ /5 .4 .2 1 + + 0-,-' ..,4' 4,.' 3,0' .,4' 22 # 1 .,5' 5 0,0' '<\+( % /B0+( IYRV /C07? % 5<;8 IYRV /D06? % 5765 IYRV 997 256643949 2<8;376= 27:<354; 256=<3=9< 2=593:8; 27<73754 434:4 #) 4377864 4354649 # 435::57 534;65; 2434447<8 4344455 # 4344578; 4344477 @AA2FGQ 436577: 4354=7; @AA2,$ 4347;68 435:<9= 434;9 #) 4389:86 435748= 435677< 634:5:= 111 243444985 4344459 111 43445:9< 43484 #) 4364657 435:=45 435<94; 7345:=8 243444455 4344456 4344484 111 111 4344446< 43444<: 43776<4 4357;45 11 434<<8; 435<9<< 2434554= 4364657 4359=47 4375;86 24348:55 43864=5 243;7:97 43:<57: 2 2 27535::84 2 5765964 2 UYLSZOUT[K @AA2>> * 111 111 NYUYLSZOUT[K @AA2- 243848:7 435;=5= @AA2$ 24355<55 4369=9< 11 @AA2MWP+( 537;=:9 43879:8 111 @AA2XYJH 27384686 43985:6 @AA2*& 5389:79 436;879 111 111 " 243957:< 4364;47 2434;99: 436=85: 6367758 273667<8 439;<78 5386=8: 436=845 !\1115.#E119.#E154.# 23 439;:<6 11 111 111 111 $D27?AC=>B=65A<:9B .+--=;@4138+--?AC=>B=5 +-- +-- +--=;@ # ## !$ +--=;@ ! ! $$ ! !! " #" $ ! /+--=;@4138+--'--)5 +-- +-- +--=;@ $" ! ! +--=;@ $" !$ # ( $ " ! !! # ! 0+--=;@4138+--%&,*5 +-- +-- +--=;@ # ! $ +--=;@ ! ! !## ( " ! " ! ! ! $" 24 )(ICFHABGA? #;$CFHABGA? JKK JKK >,%.0-'1 & >+%0)/'/ & 68! *,++')" ,-+ ,('(" ,,. .('*" .+/ -.'*" DG@EG *1/ ,(')" -,. ,0'*" *'1 & *'1 & /,) +1'-" ))++ .('-" >-%+/('* & >,%1)*'0 & 68! )0/'( ,/'-" ),,'( .+'," )-1 ,('," 0+ +.'." DG@EG *,. .*'," )*, -,'." *'1 & +') & +1, .+'," **/ +.'." >+%1(0'1 & >+%+(0', & 68! ))('( +)'/" +*('( -)'*" 0. *,'0" +-( -.'(" DG@EG *(( -/'." +/0 .('-" *'1 & *'0 & +,/ +-'/" .*.,'+" #<$4::5? JKK JKK #=$2397? JKK JKK 25 '44aU]`QS^Q& .I/U]`QS^Q .J/@HHA M^V\ M^V\ 4;:7 .K/=?GD 954 M^V\ <:5 14457243< 16<82373 1883253; 145<;2<8; 17632777 19:62:6< " 32468 " 323;5 " 324;6 $) $) $) [^PX_T[Y`O 44254783 4267;6< 000 <2<:;65 527:;64 000 <25795< 42<7::7 000 492:58;3 5258;9; 000 4828:6;3 725;<;< 000 47296;63 62;356; 000 32333488 323333< 3233345: 3233348 132333386 3233349 323333:5 3233366 3233333< 3233369 323339<7 3233374 EHH13831BF,( 142:8879 325543<8 000 1 1 142:4779 325:734 EHH13=>C1BF,( 4278843 325758< 000 3295;44 32594:: 00 1 1 EHH1% 326::5: 32444<6 000 32:489: 324<8;3 000 325495< 324::54 EHH1W^NZ^ 13276::< 3247479 000 132588;3 3256676 132<;683 325553: EHH1+ 132333<3 3236955 324:8<4 3239:9; 324:6:6 3238;6< EHH1 * $ $ R^[^PX_T[Y`O #a0004-!$L008-!$L043-!$ 26 000 000 000 000 27 28 3 29