Skip to main content
Article thumbnail
Location of Repository

From Outlaws to Trusted Partners

By Steve Flowers

Abstract

This paper will explore how the often illegal activities of some users may produce valuable innovations. The paper argues that structural changes, including a growth in the number of knowledge workers, has resulted in a burgeoning community of users able to modify or hack existing products, or develop products that compete with existing suppliers. The paper will introduce the complementary concepts of Outlaw Innovation and the Outlaw User, locating them within the literature on users. The paper will explore how firms react to this activity and provide case studies of this phenomenon. The paper will argue that Outlaw Innovation represents an extension in our understanding of the way in which firms interact with users, presents a series of policy challenges, and opens a promising area for further research

Topics: N215 Change and Innovation
Year: 2007
OAI identifier: oai:eprints.brighton.ac.uk:5620

Suggested articles

Citations

  1. (1992). A summary of convenient vocabulary for the semiotics of human and nonhuman assemblies, Shaping Technology/Building Society.
  2. (2001). Aibo custom code pulled from website,
  3. (2001). Aibo owners biting mad at Sony, Wired News,
  4. (2006). AiboPet legal controversy - http://aibohack.com/legal/index.html AiboPet,
  5. (2004). AOL/NCSA Online Safety Study, www.staysafeonline.info/pdf/safety_study_v04.pdf, accessed on
  6. (2005). Attorney takes on Electronic Arts for “The Sims 2” Naked Mods,
  7. (1991). Better Stories, not Better Constructs, to Generate Better Theory: A Rejoinder to Eisenhardt. doi
  8. (1989). Building Theories from case study research, doi
  9. (1989). Case Study Research: Design and Methods, doi
  10. (2004). Collective invention during the British Industrial Revolution: the case of the Cornish pumping engine, doi
  11. (1991). Configuring the user: The case of usability trials, doi
  12. (2002). Customers as Innovators: A New Way to Create Value,
  13. (2005). Democratizing Innovation, doi
  14. (2005). Digital copyright and the “new” controversy: is the law moulding technology and innovation?, doi
  15. (2005). EFF files class action lawsuit against Sony BMG,
  16. (2005). ELSPA, quoted on DTI website,
  17. (2005). Enter avalanche: P2P filesharing from Microsoft, The Register,
  18. (2004). Free Culture: how big media uses technology and the law to lock down culture and control creativity, doi
  19. (2003). From Pong to Planet Quake: post-industrial transitions from leisure to work, doi
  20. (2005). Game modifiers represent a wide pool of free talent whose ideas have sometimes yielded monster hits – but also controversial twists, Mercury News,
  21. (2004). GameSpy’s 25 most memorable games of the past 5 years, www.gamespy.com/articles/552/552075p1.html, accessed
  22. (2001). Global Napster usage plummets, but new file-sharing alternatives gaining ground, reports Jupiter Media Matrix, Press release,
  23. (1984). Hackers: heroes of the computer revolution, doi
  24. (2003). How communities support innovative activities: an exploration of assistance and sharing among end-users, doi
  25. (2003). How users and Non-users matter, in How users Matter. The Co-Construction of Users doi
  26. (1982). Inside the Black Box: Technology and Economics, doi
  27. (2007). iTunes music store downloads tops two billion songs, Apple Press Release,
  28. (1986). Lead Users: A Source of Novel Product Concepts, doi
  29. (2005). Precarious Playbour: Modders and the digital games industry,
  30. (1986). Profiting from technological innovation: Implications for integration, collaboration, licensing and public policy, doi
  31. (2005). PSP embraced by digital technicians,
  32. (2003). Resisting Consumer Technology in Rural America: the telephone and electrification, in How users Matter. The Co-Construction of Users
  33. (1974). SAPPHO-Updated; doi
  34. (2000). SDMI cracked? Academics say yes, SDMI say no, Network World,
  35. (2005). Senators target ‘graphic’ video games, new.com.com ; news.com.com/Senators+target+graphic+video+games/2100-1043_3-5975913.html?tag=nl ; accessed
  36. (2002). Shifting Innovation to Users via Toolkits, doi
  37. (2005). Sony adds web browser to PSP,
  38. (2005). Sony cracks down on PSP hacks,
  39. (2004). Spyware charges levelled at Lexmark, silicon.com,
  40. (2006). Symantec Internet Security Threat Report: Trends for doi
  41. (2005). Tapping Into the Underground, doi
  42. (2005). Texas sues Sony BMG over anti-piracy software,
  43. (2003). The Era of Open Innovation, doi
  44. (1996). The Information Age: Economy, Society and Culture, Volume 1, The Rise of the Network Society, doi
  45. (2002). The Mod Squad, Popular Science,
  46. (1980). The Third Wave, doi
  47. (2001). The watermark war, InfoWorld, www.infoworld.com/articles/op/xml/01/05/21/010521oplivingston.html,
  48. (1985). Tough Customers: Good Designs, doi
  49. (2005). Warcraft game maker in spying row, news.bbc.co.uk/2/hi/technology/4385050.stm, accessed on

To submit an update or takedown request for this paper, please submit an Update/Correction/Removal Request.