SlideShare una empresa de Scribd logo
1 de 4
Descargar para leer sin conexión
Innovation without IP
Summary: Firms use multiple mechanisms other than IP to protect their inventions to ensure
they gain and keep competitive advantage over their competitors. Such mechanisms include the use
of tacit knowledge, lead-time advantage, design complexity, learning-effect advantage,
complementary capabilities and secrecy. The limited available evidence suggests the use of these
mechanisms is widespread among firms and differs across industries and countries.
Keywords: Innovation, lead time, tacit knowledge, secrecy, IP, competitiveness
Main Contributing Author: Ashish Bharadwaj
Main Contributing Institution: OECD
Page contents :

What is meant by innovation without IP?
How does innovation without IP foster innovation?
What evidence on innovation without IP?

What is meant by innovation without IP?
Non IP protection means are flexible, non-statutory tools or methods which can be used by firms in
order to make it more challenging for rivals to imitate inventions and resulting innovations
(Hurmelinna-Laukkanen and Puumalainen, 2007; Ruuskanen and Seppänen, 2013).
Such alternative mechanisms include the use of tacit knowledge, lead-time advantage, design
complexity, learning effect advantage, complementary capabilities, and secrecy. Human resource
management tools are often used to ensure the innovation is kept secret from competitors (e.g. non
compete agreements). The mechanisms are described as follows.

Lead-time. As a protection mechanism lead-time exploits the principle of first-mover
advantage. This means an innovative firm gains rewards by being first on the market before
its rivals can catch up with imitations of the innovation. By constantly innovating relatively
faster than its competitors, a firm can keep ahead of the imitators, uphold its “leading
position” over the technology and benefit from the innovation (Lopez and Roberts, 2002;
Carow, Heron and Saxton, 2004).
Learning effect advantage. It refers to “gaining advantage over potential imitators and
newcomers by being ahead of them on the learning curve so as to be able to reduce
production cost below those of competitors. Being able to reduce costs allows the incumbent
a powerful tool over its imitators.” (Xu, Huang and S. Gao 2012).
Tacit knowledge. Tacit knowledge is the uncodified, internalized knowledge and know-how
that individuals possess, based fundamentally on their experience. Innovations that largely
rely on tacit knowledge allow their owners to keep their advantage over competitors, as the
latter cannot easily copy the innovation.
Secrecy. Secrecy is another approach firms employ to block competitors from appropriating
valuable knowledge and innovations, without (in some cases, partially) relying on the
conventional statutory IP instruments. Firms explicitly aim to keep what is needed to
replicate the innovation secret from competitors. This is closely related to tacit knowledge,
which is often the approach that allows for such secrecy to effectively operate. Trade secrets
are a type of IP right (see Trade Secrets) that may provide additional protection, as they can
cover all valuable knowledge the firm has exclusive possession of and which the competitors
do not have. Most importantly, the possessor must take reasonable steps in practice to
Page 1 of 4
preserve its trade secrecy from being copied.
Complex design of products. Using complex designs is another protection mechanism
which can potentially block competitors from direct imitation or reverse engineering. This is
because imitators would have to work the whole innovation process and to spend substantial
time and resources in their attempt to imitate the innovation keeping them from engaging in
such activities.

To avoid losing such valuable knowledge, an organization can resort to varioushuman resource
management tools—such as rotation of personnel in different functions, organization of
cross?functional teams and building an environment that supports social interaction—to keep the
tacit knowledge or innovation from going out of the company (Hurmelinna-Laukkanen, Kylaeheiko
and Jauhiainen 2007).

How does innovation without IP foster innovation?
Alternative mechanisms to support innovations to IP arguably can provide further incentives for firms
to engage in innovations. This is to the extent that they can raise returns on investments in
inventions and their innovations. According to Pisano (2006), “appropriability is a multi-dimensional
concept and it is not only about protecting innovations via patents but also about various other
means that are available for use, influenced endogenously by the behavior and strategies of the
firm.” The strategic appropriability methods (non-IP) described earlier also include complementary
capabilities and management know-how that may have an effect on innovativeness. HurmelinnaLaukkanen and Puumalainen (2007) assert that labor mobility is also a form of technology imitation;
therefore, labor legislation, contracts and human resource management practices are also relevant
appropriability mechanisms. According to López (2009), there are a number of practical and
technical means of protection, such as passwords, digital signatures, copy prevention mechanisms,
among others, even though some of those mechanisms could be included under the heading of
secrecy.
However, some of the ways firms resort to protect their innovations can present a hindrance for
innovation activities. Notably, secrecy and complex product design (when exaggerated strategically)
reduce the diffusion of knowledge about inventions and force competitors to first re-invent those
inventions before they could use them to create new innovations on their basis. These factors thus
stress the potential value of using registered types of IP that facilitate revealing information
regarding inventions (see Access to knowledge and inventions). It is worth noting that this issue does
not arise for strategies based on lead-time: these can be used effectively, even if knowledge
regarding the innovation is revealed.
The question of how to make innovation efficient as well as profitable without using legal intellectual
property protection has intrigued many legal and management scholars alike. Comprising of similar
samples of firms, the Carnegie-Mellon study by Cohen, Nelson and Walsh (2000), on the one hand,
concluded secrecy was the most effective mechanism, along with lead time, while the Yale study by
Levin et al. (1987), on the other hand, judged secrecy as the least effective of all mechanisms. Gans
and Stern (2003) conclude that without IP protection, start-ups—which are most often small
firms—make weak competitors. However, the evidence (shown in the next section) is limited
because many firms use IP and non-IP protection methods jointly and, more importantly, as most
countries have an IP system, it is difficult to set out a counterfactual case. This is because non-use of
IP is not necessarily related to higher returns of alternative mechanisms but could also be related to
well-known costs of IP use (notably for small entities). Effectively, the well-known study by Cohen,
Nelson and Walsh (2000) found that the cost component demotivated small firms rather than larger
firms from not seeking IP-based protection mechanisms.

Page 2 of 4
What evidence on innovation without IP?
There is wide variety of evidence to show firms use such non-IP mechanisms to protect their
innovations. Lead-time advantage seems to be favoured by firms (small scale) that deal with product
innovations and innovations in production methods (Gallié and Legros, 2012). Differences across
industries seem equally important (Cohen, Nelson and Walsh 2000). Evidence across a variety of
countries points to their importance as well as to that of other mechanisms: Laursen and Salter
(2005) found the first mover mechanisms to be the most relevant appropriability method in U.K.
industries. Similar results were found for process innovations in a study by Harabi (1995) of R&Dintensive firms in the Swiss manufacturing industry. Lead time ranked second in product innovations.
In a study of German industrial firms, Sattler (2003) determined that the ranking of effectiveness
was as follows: long-term employment relationships, lead time, design complexity, secrecy, patents
and design registrations. For manufacturing firms in Spain, the most preferred mechanism was
related to lead time, followed by time and cost for imitation (related to the complexity of innovation),
secrecy and patents (Gonzalez-Alvarez and Nieto-Antolin, 2007). For Finnish manufacturing firms the
ranking of the effectiveness of appropriability mechanisms was as follows: lead time,
technical/practical means (secrecy, passwords, and limited access), tacitness, contracts, IPRs
(patents, trademarks, copyright, utility models, designs, trade secrets), labor legislation and human
resource management (Hurmelinna-Laukkanen and Puumalainen (2007). Reliance on these
mechanisms tends to be even more pronounced for emerging and developing countries. A study of
Indian IT firms found that better lead times and access to good marketing and distribution facilities
were the most critical strategies for profiting from product and process innovations, followed by
brand building (Basant, 2004).
Often these methods are used in combination with IP. For example, product innovations based on
tacit knowledge generated within the company can be protected by a combination of IP (trademark)
protection and strong reliance on some alternative non-IP methods (Howells, James and Malik, 2003).
For process innovations, which are less likely to be of tangible and codified nature compared to
product innovation, secrecy and lead time advantage are considered powerful tools to protect
innovation when compared to statutory means, especially patents (Gallié and Legros, 2012). In
addition, secrecy can be used as an alternative to patents (Teece, 1986; Levin. et al. 1987; Cohen,
Nelson and Walsh, 2000). Coca Cola’s recipe for its popular drink is a case where secrecy is used in
combination with a trademark.

References and Bibliography
Basant, R. (2004), “Intellectual property and innovation: Changing perspectives in the Indian IT industry,” Strategies
for
Building
Software
Industries
in
Developing
Countries
Conference,
Honolulu,
19-21
May.
http://www.iimahd.ernet.in/publications/data/2004-06-05rakesh.pdf
Blakley, J. (2010), “Lessons from fashion’s free culture”, University of Southern California, TED Talk (video).
http://www.ted.com/speakers/johanna_blakley.html
Boldrin, M. and D. K. Levine (2005), “Intellectual property and the efficient allocation of social surplus from creation”,
Review of Economic Research on Copyright Issues, Vol. 2/1, pp.45–67.
Boldrin, M. and D. K. Levine (2004), “IER Lawrence Klein Lecture: The case against intellectual monopoly”,
International Economic Review, Vol. 45, pp. 327–50.
Carow, K., R. Heron and T. Saxton (2004), “Do early birds get the returns? An empirical investigation of early-mover
advantages in acquisitions,” Strategic Management Journal, Vol. 25/6, pp. 563–85.
Cohen, W. M., R. R. Nelson and J. P. Walsh (2000), “Protecting their intellectual assets: Appropriability conditions and
why U.S. manufacturing firms patent (or not),” NBER Working Paper 7552, National Bureau of Economic Research,
Washington, DC.
Dechenaux, E., B. Goldfarb, S. Shane and M. Thursby (2008), “Appropriability and commercialization: Evidence of
MIT inventions”, Management Science, vol. 54, pp. 893–906.
Gallié, E?P. and D. Legros (2012), “French firms' strategies for protecting their intellectual property,” Research
Policy, Vol. 41/4, pp. 780–94.
Gans, J. S. and S. Stern (2003), “The product market and the market for ‘ideas’: Commercialization strategies for
technology entrepreneurs,” Research Policy, Vol. 33, pp. 333–50.
González-Álvarez, N. and M. Nieto-Antolín (2007), “Appropriability of innovation results: An empirical study in
Page 3 of 4
Spanish manufacturing firms,” Technovation, Vol. 27, pp. 280–95.
Harabi, N. (1995), “Appropriability of technical innovations: An empirical analysis,” Research Policy, Vol. 24, pp.
981–92.
Hertzfeld, H. R., A. N. Link and N. S. Vonortas (2006), “Intellectual property protection mechanisms in research
partnerships,” Research Policy, Vol. 35, pp. 825–38.
Howells, J., A. James and K. Malik (2003), “The sourcing of technological knowledge: Distributed innovation processes
and dynamic change,” R&D Management, 33(4), pp. 395–409
Hurmelinna-Laukkanen, P., K. Kylaeheiko and T. Jauhiainen (2007), “The Janus face of the appropriability regime in
the protection of innovations: Theoretical re?appraisal and empirical analysis,” Technovation, 27 (3), pp. 133–44.
Hurmelinna-Laukkanen, P. and K. Puumalainen (2007), “Nature and dynamics of appropriability: Strategies for
appropriating returns on innovation,” R&D Management, Vol. 37/2, pp. 95–112.
Konig, H. and G. Licht (1995), “Patents, R&D, and Innovation,” ifo Studien Zeitschrift fur empirische
Wirtschaftsforschung 4/95, pp. 521–43.
Laursen, K. and A. Salter (2005), “My Precious—The role of appropriability strategies in shaping innovative
performance,”
Working
Paper
05-02,
Danish
Research
Unit
for
Industrial
Dynamics.
http://www2.druid.dk/conferences/viewpaper.php?id=2583&cf=17
Leiponen, A. and J. Byma (2009), “If you cannot block, you better run: Small firms, co-operative innovation and
appropriability strategies,” Research Policy, Vol. 38, pp. 1478–88.
Levin, R.C., A. K. Klevorick, R. R. Nelson and S. G. Winter (1987), “Appropriating the returns from industrial research
and development,” Brookings Papers on Economic Activity, 3, pp. 783–831, Brookings Institution, Washington, DC.
López, A. (2009), “Innovation and appropriability: Empirical evidence and research agenda,” in The Economics of
Intellectual Property: Suggestions for Further Research in Developing Countries and Countries with Economies in
Transition, World Intellectual Property Organization, Geneva. http://www.wipo.int/ip-development/en/economics/
Lopez, L.E. and E. B. Roberts (2002), “First-mover advantages in regimes of weak appropriability: The case of
financial services innovations, Journal of Business Research, Vol. 55, pp. 997–1005.
Pisano, G. (1990), “The R&D boundaries of the firm: An empirical analysis,” Administrative Science Quarterly, Vol.
35, pp. 153–76.
Polanyi, M. (2002) Personal Knowledge: Towards a Post-Critical Philosophy, Original 1958, Routledge, London.
Pollock, R. (2006), “Innovation and imitation with and without intellectual property rights,” Working paper in Munich
Personal RePEc Archive, Germany. http://mpra.ub.uni-muenchen.de/5025/
Raustiala, K. and Sprigman, C. J. (2012), “The knockoff economy: How imitation sparks innovation” (Intro), Oxford
University Press; Law-Econ Research Paper No. 12-18, UCLA School of Law, Los Angeles, CA.
http://ssrn.com/abstract=2142983
Ruuskanen, R. and M. Seppänen (2013), “Alternative methods in protecting innovation: A literature review,” Working
paper series, Tempere University of Technology. http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2264763
Sattler, H. (2003), “Appropriability of Product Innovations: An Empirical Analysis for Germany,” International Journal
of Technology Management, 26/5-6, pp. 502-516
Teece, D. J. (1986), “Profiting from technological innovation,” Research Policy, Vol. 15, pp. 285–305.
Xu, K., K. Huang and S. Gao (2012), “Technology sourcing, appropriability regimes, and new product development,”
Journal of Engineering and Technology Management, Vol. 29/2, pp. 265–80.
Zhao, M. (2006), “Conducting R&D in countries with weak intellectual property rights protection,” Management
Science, Vol. 52/8, pp. 1185–99.

Source URL: https://innovationpolicyplatform.org/content/innovation-without-ip

Page 4 of 4

Powered by TCPDF (www.tcpdf.org)

Más contenido relacionado

Último

Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 

Último (20)

Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 

Destacado

Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsPixeldarts
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Applitools
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at WorkGetSmarter
 

Destacado (20)

Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 

Innovation without IP - - Innovation Policy Platform (OECD)

  • 1. Innovation without IP Summary: Firms use multiple mechanisms other than IP to protect their inventions to ensure they gain and keep competitive advantage over their competitors. Such mechanisms include the use of tacit knowledge, lead-time advantage, design complexity, learning-effect advantage, complementary capabilities and secrecy. The limited available evidence suggests the use of these mechanisms is widespread among firms and differs across industries and countries. Keywords: Innovation, lead time, tacit knowledge, secrecy, IP, competitiveness Main Contributing Author: Ashish Bharadwaj Main Contributing Institution: OECD Page contents : What is meant by innovation without IP? How does innovation without IP foster innovation? What evidence on innovation without IP? What is meant by innovation without IP? Non IP protection means are flexible, non-statutory tools or methods which can be used by firms in order to make it more challenging for rivals to imitate inventions and resulting innovations (Hurmelinna-Laukkanen and Puumalainen, 2007; Ruuskanen and Seppänen, 2013). Such alternative mechanisms include the use of tacit knowledge, lead-time advantage, design complexity, learning effect advantage, complementary capabilities, and secrecy. Human resource management tools are often used to ensure the innovation is kept secret from competitors (e.g. non compete agreements). The mechanisms are described as follows. Lead-time. As a protection mechanism lead-time exploits the principle of first-mover advantage. This means an innovative firm gains rewards by being first on the market before its rivals can catch up with imitations of the innovation. By constantly innovating relatively faster than its competitors, a firm can keep ahead of the imitators, uphold its “leading position” over the technology and benefit from the innovation (Lopez and Roberts, 2002; Carow, Heron and Saxton, 2004). Learning effect advantage. It refers to “gaining advantage over potential imitators and newcomers by being ahead of them on the learning curve so as to be able to reduce production cost below those of competitors. Being able to reduce costs allows the incumbent a powerful tool over its imitators.” (Xu, Huang and S. Gao 2012). Tacit knowledge. Tacit knowledge is the uncodified, internalized knowledge and know-how that individuals possess, based fundamentally on their experience. Innovations that largely rely on tacit knowledge allow their owners to keep their advantage over competitors, as the latter cannot easily copy the innovation. Secrecy. Secrecy is another approach firms employ to block competitors from appropriating valuable knowledge and innovations, without (in some cases, partially) relying on the conventional statutory IP instruments. Firms explicitly aim to keep what is needed to replicate the innovation secret from competitors. This is closely related to tacit knowledge, which is often the approach that allows for such secrecy to effectively operate. Trade secrets are a type of IP right (see Trade Secrets) that may provide additional protection, as they can cover all valuable knowledge the firm has exclusive possession of and which the competitors do not have. Most importantly, the possessor must take reasonable steps in practice to Page 1 of 4
  • 2. preserve its trade secrecy from being copied. Complex design of products. Using complex designs is another protection mechanism which can potentially block competitors from direct imitation or reverse engineering. This is because imitators would have to work the whole innovation process and to spend substantial time and resources in their attempt to imitate the innovation keeping them from engaging in such activities. To avoid losing such valuable knowledge, an organization can resort to varioushuman resource management tools—such as rotation of personnel in different functions, organization of cross?functional teams and building an environment that supports social interaction—to keep the tacit knowledge or innovation from going out of the company (Hurmelinna-Laukkanen, Kylaeheiko and Jauhiainen 2007). How does innovation without IP foster innovation? Alternative mechanisms to support innovations to IP arguably can provide further incentives for firms to engage in innovations. This is to the extent that they can raise returns on investments in inventions and their innovations. According to Pisano (2006), “appropriability is a multi-dimensional concept and it is not only about protecting innovations via patents but also about various other means that are available for use, influenced endogenously by the behavior and strategies of the firm.” The strategic appropriability methods (non-IP) described earlier also include complementary capabilities and management know-how that may have an effect on innovativeness. HurmelinnaLaukkanen and Puumalainen (2007) assert that labor mobility is also a form of technology imitation; therefore, labor legislation, contracts and human resource management practices are also relevant appropriability mechanisms. According to López (2009), there are a number of practical and technical means of protection, such as passwords, digital signatures, copy prevention mechanisms, among others, even though some of those mechanisms could be included under the heading of secrecy. However, some of the ways firms resort to protect their innovations can present a hindrance for innovation activities. Notably, secrecy and complex product design (when exaggerated strategically) reduce the diffusion of knowledge about inventions and force competitors to first re-invent those inventions before they could use them to create new innovations on their basis. These factors thus stress the potential value of using registered types of IP that facilitate revealing information regarding inventions (see Access to knowledge and inventions). It is worth noting that this issue does not arise for strategies based on lead-time: these can be used effectively, even if knowledge regarding the innovation is revealed. The question of how to make innovation efficient as well as profitable without using legal intellectual property protection has intrigued many legal and management scholars alike. Comprising of similar samples of firms, the Carnegie-Mellon study by Cohen, Nelson and Walsh (2000), on the one hand, concluded secrecy was the most effective mechanism, along with lead time, while the Yale study by Levin et al. (1987), on the other hand, judged secrecy as the least effective of all mechanisms. Gans and Stern (2003) conclude that without IP protection, start-ups—which are most often small firms—make weak competitors. However, the evidence (shown in the next section) is limited because many firms use IP and non-IP protection methods jointly and, more importantly, as most countries have an IP system, it is difficult to set out a counterfactual case. This is because non-use of IP is not necessarily related to higher returns of alternative mechanisms but could also be related to well-known costs of IP use (notably for small entities). Effectively, the well-known study by Cohen, Nelson and Walsh (2000) found that the cost component demotivated small firms rather than larger firms from not seeking IP-based protection mechanisms. Page 2 of 4
  • 3. What evidence on innovation without IP? There is wide variety of evidence to show firms use such non-IP mechanisms to protect their innovations. Lead-time advantage seems to be favoured by firms (small scale) that deal with product innovations and innovations in production methods (Gallié and Legros, 2012). Differences across industries seem equally important (Cohen, Nelson and Walsh 2000). Evidence across a variety of countries points to their importance as well as to that of other mechanisms: Laursen and Salter (2005) found the first mover mechanisms to be the most relevant appropriability method in U.K. industries. Similar results were found for process innovations in a study by Harabi (1995) of R&Dintensive firms in the Swiss manufacturing industry. Lead time ranked second in product innovations. In a study of German industrial firms, Sattler (2003) determined that the ranking of effectiveness was as follows: long-term employment relationships, lead time, design complexity, secrecy, patents and design registrations. For manufacturing firms in Spain, the most preferred mechanism was related to lead time, followed by time and cost for imitation (related to the complexity of innovation), secrecy and patents (Gonzalez-Alvarez and Nieto-Antolin, 2007). For Finnish manufacturing firms the ranking of the effectiveness of appropriability mechanisms was as follows: lead time, technical/practical means (secrecy, passwords, and limited access), tacitness, contracts, IPRs (patents, trademarks, copyright, utility models, designs, trade secrets), labor legislation and human resource management (Hurmelinna-Laukkanen and Puumalainen (2007). Reliance on these mechanisms tends to be even more pronounced for emerging and developing countries. A study of Indian IT firms found that better lead times and access to good marketing and distribution facilities were the most critical strategies for profiting from product and process innovations, followed by brand building (Basant, 2004). Often these methods are used in combination with IP. For example, product innovations based on tacit knowledge generated within the company can be protected by a combination of IP (trademark) protection and strong reliance on some alternative non-IP methods (Howells, James and Malik, 2003). For process innovations, which are less likely to be of tangible and codified nature compared to product innovation, secrecy and lead time advantage are considered powerful tools to protect innovation when compared to statutory means, especially patents (Gallié and Legros, 2012). In addition, secrecy can be used as an alternative to patents (Teece, 1986; Levin. et al. 1987; Cohen, Nelson and Walsh, 2000). Coca Cola’s recipe for its popular drink is a case where secrecy is used in combination with a trademark. References and Bibliography Basant, R. (2004), “Intellectual property and innovation: Changing perspectives in the Indian IT industry,” Strategies for Building Software Industries in Developing Countries Conference, Honolulu, 19-21 May. http://www.iimahd.ernet.in/publications/data/2004-06-05rakesh.pdf Blakley, J. (2010), “Lessons from fashion’s free culture”, University of Southern California, TED Talk (video). http://www.ted.com/speakers/johanna_blakley.html Boldrin, M. and D. K. Levine (2005), “Intellectual property and the efficient allocation of social surplus from creation”, Review of Economic Research on Copyright Issues, Vol. 2/1, pp.45–67. Boldrin, M. and D. K. Levine (2004), “IER Lawrence Klein Lecture: The case against intellectual monopoly”, International Economic Review, Vol. 45, pp. 327–50. Carow, K., R. Heron and T. Saxton (2004), “Do early birds get the returns? An empirical investigation of early-mover advantages in acquisitions,” Strategic Management Journal, Vol. 25/6, pp. 563–85. Cohen, W. M., R. R. Nelson and J. P. Walsh (2000), “Protecting their intellectual assets: Appropriability conditions and why U.S. manufacturing firms patent (or not),” NBER Working Paper 7552, National Bureau of Economic Research, Washington, DC. Dechenaux, E., B. Goldfarb, S. Shane and M. Thursby (2008), “Appropriability and commercialization: Evidence of MIT inventions”, Management Science, vol. 54, pp. 893–906. Gallié, E?P. and D. Legros (2012), “French firms' strategies for protecting their intellectual property,” Research Policy, Vol. 41/4, pp. 780–94. Gans, J. S. and S. Stern (2003), “The product market and the market for ‘ideas’: Commercialization strategies for technology entrepreneurs,” Research Policy, Vol. 33, pp. 333–50. González-Álvarez, N. and M. Nieto-Antolín (2007), “Appropriability of innovation results: An empirical study in Page 3 of 4
  • 4. Spanish manufacturing firms,” Technovation, Vol. 27, pp. 280–95. Harabi, N. (1995), “Appropriability of technical innovations: An empirical analysis,” Research Policy, Vol. 24, pp. 981–92. Hertzfeld, H. R., A. N. Link and N. S. Vonortas (2006), “Intellectual property protection mechanisms in research partnerships,” Research Policy, Vol. 35, pp. 825–38. Howells, J., A. James and K. Malik (2003), “The sourcing of technological knowledge: Distributed innovation processes and dynamic change,” R&D Management, 33(4), pp. 395–409 Hurmelinna-Laukkanen, P., K. Kylaeheiko and T. Jauhiainen (2007), “The Janus face of the appropriability regime in the protection of innovations: Theoretical re?appraisal and empirical analysis,” Technovation, 27 (3), pp. 133–44. Hurmelinna-Laukkanen, P. and K. Puumalainen (2007), “Nature and dynamics of appropriability: Strategies for appropriating returns on innovation,” R&D Management, Vol. 37/2, pp. 95–112. Konig, H. and G. Licht (1995), “Patents, R&D, and Innovation,” ifo Studien Zeitschrift fur empirische Wirtschaftsforschung 4/95, pp. 521–43. Laursen, K. and A. Salter (2005), “My Precious—The role of appropriability strategies in shaping innovative performance,” Working Paper 05-02, Danish Research Unit for Industrial Dynamics. http://www2.druid.dk/conferences/viewpaper.php?id=2583&cf=17 Leiponen, A. and J. Byma (2009), “If you cannot block, you better run: Small firms, co-operative innovation and appropriability strategies,” Research Policy, Vol. 38, pp. 1478–88. Levin, R.C., A. K. Klevorick, R. R. Nelson and S. G. Winter (1987), “Appropriating the returns from industrial research and development,” Brookings Papers on Economic Activity, 3, pp. 783–831, Brookings Institution, Washington, DC. López, A. (2009), “Innovation and appropriability: Empirical evidence and research agenda,” in The Economics of Intellectual Property: Suggestions for Further Research in Developing Countries and Countries with Economies in Transition, World Intellectual Property Organization, Geneva. http://www.wipo.int/ip-development/en/economics/ Lopez, L.E. and E. B. Roberts (2002), “First-mover advantages in regimes of weak appropriability: The case of financial services innovations, Journal of Business Research, Vol. 55, pp. 997–1005. Pisano, G. (1990), “The R&D boundaries of the firm: An empirical analysis,” Administrative Science Quarterly, Vol. 35, pp. 153–76. Polanyi, M. (2002) Personal Knowledge: Towards a Post-Critical Philosophy, Original 1958, Routledge, London. Pollock, R. (2006), “Innovation and imitation with and without intellectual property rights,” Working paper in Munich Personal RePEc Archive, Germany. http://mpra.ub.uni-muenchen.de/5025/ Raustiala, K. and Sprigman, C. J. (2012), “The knockoff economy: How imitation sparks innovation” (Intro), Oxford University Press; Law-Econ Research Paper No. 12-18, UCLA School of Law, Los Angeles, CA. http://ssrn.com/abstract=2142983 Ruuskanen, R. and M. Seppänen (2013), “Alternative methods in protecting innovation: A literature review,” Working paper series, Tempere University of Technology. http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2264763 Sattler, H. (2003), “Appropriability of Product Innovations: An Empirical Analysis for Germany,” International Journal of Technology Management, 26/5-6, pp. 502-516 Teece, D. J. (1986), “Profiting from technological innovation,” Research Policy, Vol. 15, pp. 285–305. Xu, K., K. Huang and S. Gao (2012), “Technology sourcing, appropriability regimes, and new product development,” Journal of Engineering and Technology Management, Vol. 29/2, pp. 265–80. Zhao, M. (2006), “Conducting R&D in countries with weak intellectual property rights protection,” Management Science, Vol. 52/8, pp. 1185–99. Source URL: https://innovationpolicyplatform.org/content/innovation-without-ip Page 4 of 4 Powered by TCPDF (www.tcpdf.org)