Location of Repository

Harnessing the Hackers: The emergence and exploitation of Outlaw Innovation

By Steve Flowers

Abstract

This paper will explore how the often illegal activities of hackers (in the original usage of the term to refer to individuals who modify computer hardware and software) may produce valuable innovations. It will explore how these innovations, termed Outlaw Innovations, may be appropriated by firms and provide case studies where this has taken place. The paper will seek to locate this phenomenon in the existing innovation literature, and explore the implications for firm innovation processes. It will outline a series of possible research questions and conclude by indicating the next steps in the development of this\ud research

Topics: N215 Change and Innovation, N212 Creative management
Year: 2006
OAI identifier: oai:eprints.brighton.ac.uk:2948

Suggested articles

Preview

Citations

  1. (2006). AiboPet legal controversy - http://aibohack.com/legal/index.html AiboPet,
  2. (2004). AOL/NCSA Online Safety Study, www.staysafeonline.info/pdf/safety_study_v04.pdf, accessed on
  3. (2005). Attorney takes on Elecgtronic Arts for “The Sims 2” Nakes Mods,
  4. (1991). Better Stories, not Better Constructs, to Generate Better Theory: A Rejoinder to Eisenhardt. doi
  5. (1989). Building Theories from case study research, doi
  6. (2004). Collective invention during the British Industrial Revolution: the case of the Cornish pumping engine, doi
  7. (2004). Counterculture through the ages,
  8. (2002). Customers as Innovators: A New Way to Create Value,
  9. (2005). Democratizing Innovation, doi
  10. (2005). Digital copyright and the “new” controversy: is the law moulding technology and innovation?, doi
  11. (2005). EFF files class action lawsuit against Sony BMG,
  12. (2005). ELSPA, quoted on DTI website,
  13. (2004). Free Culture: how big media uses technology and the law to lock down culture and control creativity, doi
  14. (2003). From Pong to Planet Quake: post-industrial transitions from leisure to work, doi
  15. (2005). Game modifiers represent a wide pool of free talent whose ideas have sometimed yielded monster hit – but also controversial twists, Mercury News,
  16. (2004). GameSpy’s 25 most memorable games of the past 5 years, www.gamespy.com/articles/552/552075p1.html, accessed
  17. (2001). Global Napster usage plummets, but new file-sharing alternatives gaining ground, reports Jupiter Media Matrix, Press release,
  18. (1984). Hackers: heroes of the computer revolution, doi
  19. (1982). Inside the Black Box: Technology and Economics, doi
  20. (2006). iTunes music store downloads top one billion songs, Apple Pres Release, February 23. www.apple.com/pr/library/2006/feb/23itms.html
  21. (1986). Lead Users: A Source of Novel Product Concepts, doi
  22. (2005). Precarious Playbour: Modders and the digital games industry,
  23. (1986). Profiting from technological innovation: Implications for integration, collaboration, licensing and public policy, doi
  24. (2005). PSP embraced by digital technicians,
  25. (1974). SAPPHOUpdated;
  26. (2000). SDMI cracked? Academics say yes, SDMI say no, Network World,
  27. (2005). Senators target ‘graphic’ video games, new.com.com ; news.com.com/Senators+target+graphic+video+games/2100-1043_3-5975913.html?tag=nl ; accessed
  28. (2002). Shifting Innovation to Users via Toolkits, doi
  29. (2005). Sony adds web browser to to PSP,
  30. (2005). Sony cracks down on PSP
  31. (2004). Spyware charges levelled at Lexmark, silicon.com,
  32. (2005). Tapping Into the Underground, doi
  33. (2005). Texas sues Sony BMG over anti-piracy software,
  34. (2003). The Era of Open Innovation, doi
  35. (1996). The Information Age: Economy, Society and Culture, Volume 1, The Rise of the Network Society, doi
  36. (2002). The Mod Squad, Popular Science,
  37. (1980). The Third Wave, doi
  38. (2001). The watermark war, InfoWorld,
  39. (1985). Tough Customers: Good Designs, doi
  40. (2005). Warcraft game maker in spying row, news.bbc.co.uk/2/hi/technology/4385050.stm, accessed on

To submit an update or takedown request for this paper, please submit an Update/Correction/Removal Request.