Modeling Pricing Strategies Using Game Theory and Support Vector Machines
Data Mining is a widely used discipline with methods that are heavily supported by statistical theory. Game theory, instead, develops models with solid economical foundations but with low applicability in companies so far. This work attempts to unify both approaches, presenting a model of price competition in the credit industry. Based on game theory and sustained by the robustness of Support Vector Machines to structurally estimate the model, it takes advantage from each approach to provide strong results and useful information. The model consists of a market-level game that determines the marginal cost, demand, and efficiency of the competitors. Demand is estimated using Support Vector Machines, allowing the inclusion of multiple variables and empowering standard economical estimation through the aggregation of client-level models. The model is being applied by one competitor, which created new business opportunities, such as the strategic chance to aggressively cut prices given the acquired market knowledge.
KeywordsSupport Vector Machine Hide Layer Nash Equilibrium Market Share Game Theory
Unable to display preview. Download preview PDF.
- 1.Cristiannini, N., Shawe-Taylor, J.: An Introduction to Support Vector Machines and Other Kernel-Based Methods. Cambridge University Press, Cambridge (2003)Google Scholar
- 4.Faires, J.D., Burden, R.: Numerical Analysis. Thomson Brooks/Cole (1986)Google Scholar
- 5.Friedman, J.: A non-cooperative equilibrium for supergames. Review of Economic Studies 38, 112 (1971)Google Scholar
- 6.Fudenberg, D., Tirole, J.: Game Theory. MIT Press, Cambridge (1991)Google Scholar
- 10.Rotemberg, I., Saloner, G.: A super-game theoretic model of business cycles and price wars during booms. American Economic Review 76(3), 390–407 (1986)Google Scholar
- 12.Schlkopf, B.: Statistical learning and kernel methods. Tech. Rep. Msr-Tr-23-2000, Microsoft Research (2000)Google Scholar
- 15.Vapnik, V., Lerner, A.: Pattern recognition using generalized portrait method. Automatization and Remote Control 24, 774–780 (1963)Google Scholar