Skip to main content

Balancing Knowledge Protection and Sharing to Create Digital Innovations

  • Chapter
  • First Online:
Knowledge Management in Digital Change

Part of the book series: Progress in IS ((PROIS))

Abstract

The creation of digital innovations requires active participation and knowledge sharing on behalf of all collaboration partners in inter-organisational settings. However, while the participants collaborate, they also have their own interests and as they are competitors in many cases, they have to protect their competitive knowledge. Collaboration thus requires balancing of knowledge sharing and protection on both the organizational and individual level. This paper reviews literature from several domains to assess how the balancing act is scoped and what kind of measures to achieve this balance prior research has identified. The balancing act is examined on the channel, partner and artefact levels. The paper identifies the balancing act as decisions made over the course of the collaboration both by the organizations as a whole, and by individuals on concrete knowledge artefacts in their daily work. Implications from the point of view of creating digital innovation are presented.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 109.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 139.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 199.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  • Ahmad, A., Bosua, R., & Scheepers, R. (2014). Protecting organizational competitive advantage: A knowledge leakage perspective. Computers & Security, 42, 27–39.

    Article  Google Scholar 

  • Alnuaimi, T., & George, G. (2013). The retrieval of knowledge after spillovers. In Academy of management proceedings. Briarcliff Manor: Academy of Management.

    Google Scholar 

  • Alnuaimi, T., & George, G. (2015). Appropriability and the retrieval of knowledge after spillovers. Strategic Management Journal.

    Google Scholar 

  • Azar, O. H., & Brock, D. M. (2008). A citation-Based ranking of strategic management journals. Journal of Economics & Management Strategy, 17(3), 781–802.

    Article  Google Scholar 

  • Becerra, M., Lunnan, R., & Huemer, L. (2008). Trustworthiness, risk, and the transfer of tacit and explicit knowledge between alliance partners. Journal of Management Studies, 45(4), 691–713.

    Article  Google Scholar 

  • Bock, G.-W., Zmud, R. W., Kim, Y.-G., & Lee, J.-N. (2005). Behavioral intention formation in knowledge sharing: Examining the roles of extrinsic motivators, social-psychological forces, and organizational climate. MIS Quarterly, 87–111.

    Google Scholar 

  • Bogers, M. (2011). The open innovation paradox: Knowledge sharing and protection in R&D collaborations. European Journal of Innovation Management, 14(1), 93–117.

    Article  Google Scholar 

  • Bou-Llusar, J. C., & Segarra-Cipre´S, M. (2006). Strategic knowledge transfer and its implications for competitive advantage: An integrative conceptual framework. Journal of Knowledge Management, 10(4), 100–112.

    Article  Google Scholar 

  • Castellaneta, F., Conti, R., & Kacperczyk, A. (2016). Money secrets: How does trade secret legal protection affect firm market value? Evidence from the uniform trade secret act. Strategic Management Journal.

    Google Scholar 

  • Ceccagnoli, M. (2009). Appropriability, preemption, and firm performance. Strategic Management Journal, 30(1), 81–98.

    Article  Google Scholar 

  • Chan, P. C. W., & Lee, W. B. (2011). Knowledge audit with intellectual capital in the quality management process: An empirical study in an electronics company. The Electronic Journal of Knowledge Management, 9(2), 98–116.

    Google Scholar 

  • Coff, R. W., Coff, D. C., & Eastvold, R. (2006). The knowledge-leveraging paradox: How to achieve scale without making knowledge imitable. Academy of Management Review, 31(2), 452–465.

    Article  Google Scholar 

  • Conner, K. R., & Prahalad, C. K. (1996). A resource-based theory of the firm: Knowledge versus opportunism. Organization Science, 7(5), 477–501.

    Article  Google Scholar 

  • Cramton, C. D. (2001). The mutual knowledge problem and its consequences for dispersed collaboration. Organization Science, 12(3), 346–371.

    Article  Google Scholar 

  • Crossan, M. M., & Apaydin, M. (2010). A multi-dimensional framework of organizational innovation: A systematic review of the literature. Journal of Management Studies, 47(6), 1154–1191.

    Article  Google Scholar 

  • Daghfous, A., Belkhodja, O., & Angell, L. C. (2013). Understanding and managing knowledge loss. Journal of Knowledge Management, 17(5), 639–660.

    Article  Google Scholar 

  • David, W., & Fahey, L. (2000). Diagnosing cultural barriers to knowledge management. The Academy of Management Executive, 14(4), 113–127.

    Google Scholar 

  • De Faria, P., & Sofka, W. (2010). Knowledge protection strategies of multinational firms—A cross-country comparison. Research Policy, 39(7), 956–968.

    Article  Google Scholar 

  • Desouza, K. C. (2006). Knowledge security: An interesting research space. Journal of Information Science and Technology, 3(1).

    Google Scholar 

  • Di Stefano, G., King, A. A., & Verona, G. (2014). Kitchen confidential? Norms for the use of transferred knowledge in gourmet cuisine. Strategic Management Journal, 35(11), 1645–1670.

    Article  Google Scholar 

  • Erickson, G. S., & Rothberg, H. N. (2009). Intellectual capital in business-to-business markets. Industrial Marketing Management, 38(2), 159–165.

    Article  Google Scholar 

  • Fauchart, E., & Von Hippel, E. (2008). Norms-based intellectual property systems: The case of French chefs. Organization Science, 19(2), 187–201.

    Article  Google Scholar 

  • Giarratana, M. S., & Mariani, M. (2014). The relationship between knowledge sourcing and fear of imitation. Strategic Management Journal, 35(8), 1144–1163.

    Article  Google Scholar 

  • Grant, R. M. (1996a). Prospering in dynamically-competitive environments: Organizational capability as knowledge integration. Organization Science, 7(4), 375–387.

    Article  Google Scholar 

  • Grant, R. M. (1996b). Toward a knowledge-based theory of the firm. Strategic Management Journal, 17(2), 109–122.

    Article  Google Scholar 

  • Grant, R. M. (1996c). Toward a knowledge-based theory of the firm. Strategic Management Journal, 17(S2), 109–122.

    Article  Google Scholar 

  • Haldin-Herrgard, T. (2000). Difficulties in diffusion of tacit knowledge in organizations. Journal of Intellectual Capital, 1(4), 357–365.

    Article  Google Scholar 

  • Hamel, G. (1991). Competition for competence and inter-partner learning within international strategic alliances. Strategic Management Journal, 12(4), 83–103.

    Article  Google Scholar 

  • Hansen, M. T. (1999). The search-transfer problem: The role of weak ties in sharing knowledge across organization subunits. Administrative Science Quarterly, 44(1), 82–111.

    Article  Google Scholar 

  • Hendriks, P. (1999). Why share knowledge? The influence of ICT on the motivation for knowledge sharing. Knowledge and Process Management, 6(2), 91.

    Article  Google Scholar 

  • Hernandez, E., Sanders, W. G., & Tuschke, A. (2015). Network defense: Pruning, grafting, and closing to prevent leakage of strategic knowledge to rivals. Academy of Management Journal, 58(7), 1233–1260.

    Article  Google Scholar 

  • Holmes, R. M., Li, H., Hitt, M. A., Deghetto, K., & Sutton, T. (2016). The effects of location and MNC attributes on MNCs’ establishment of foreign R&D Centers: Evidence from China. Long Range Planning, 49(5), 594–613.

    Article  Google Scholar 

  • Ilvonen, I., Alanne, A., Helander, N., & Väyrynen, H. (2016). Knowledge sharing and knowledge security in Finnish companies. In 2016 49th Hawaii International Conference on System Sciences (HICSS). IEEE.

    Google Scholar 

  • Ilvonen, I., Jussila, J., Kärkkäinen, H., & Päivärinta, T. (2015). Knowledge security risk management in contemporary companies–Toward a proactive approach. In 2015 48th Hawaii International Conference on System Sciences (HICSS). IEEE.

    Google Scholar 

  • Jarvenpaa, S., & Majchrzak, A. (2016). Interactive self-regulatory theory for sharing and protecting in inter-organizational collaborations. Academy of Management Review, 41(1), 9–27.

    Article  Google Scholar 

  • Jarvenpaa, S. L., & Majchrzak, A. (2010). Research commentary-vigilant interaction in knowledge collaboration: Challenges of online user participation under ambivalence. Information Systems Research, 21(4), 773–784.

    Article  Google Scholar 

  • Jean, R. J., Sinkovics, R. R., & Hiebaum, T. P. (2014). The effects of supplier involvement and knowledge protection on product innovation in customer–supplier relationships: A study of global automotive suppliers in China. Journal of Product Innovation Management, 31(1), 98–113.

    Article  Google Scholar 

  • Jennex, M., & Durcikova, A., (2013). Assessing knowledge loss risk. In International Conference on System Sciences, HICSS46, Hawaii 46th Hawaii. IEEE Computer Society.

    Google Scholar 

  • Jennex, M., & Durcikova, A. (2014). Integrating IS security with knowledge management: Are we doing enough? International Journal of Knowledge Management (IJKM), 10(2), 1–12.

    Article  Google Scholar 

  • Jordan, J., & Lowe, J. (2004). Protecting strategic knowledge: insights from collaborative agreements in the aerospace sector. Technology Analysis & Strategic Management, 16(2), 241–259.

    Google Scholar 

  • Kale, P., Singh, H., & Perlmutter, H. (2000). Learning and protection of proprietary assets in strategic alliances: Building relational capital. Strategic Management Journal, 21(3), 217–237.

    Article  Google Scholar 

  • Khamseh, H. M., & Jolly, D. (2014). Knowledge transfer in alliances: The moderating role of the alliance type. Knowledge Management Research & Practice, 12(4), 409–420.

    Article  Google Scholar 

  • Lee, J., Min, J., & Lee, H. (2015). Setting a knowledge boundary for enhancing work coordination and team performance: Knowledge protection regulation across teams. Fort Worth, USA: ICIS.

    Google Scholar 

  • Lee, S. C., Chang, S. N., Liu, C. Y., & Yang, J. (2007). The effect of knowledge protection, knowledge ambiguity, and relational capital on alliance performance. Knowledge and Process Management, 14(1), 58–69.

    Article  Google Scholar 

  • Leyland, M. L. (2006). The role of culture on knowledge transfer: The case of the multinational corporation. The Learning Organization, 13(3), 257–275.

    Article  Google Scholar 

  • Lin, C., Wu, Y. J., Chang, C., Wang, W., & Lee, C. Y. (2012). The alliance innovation performance of R&D alliances-the absorptive capacity perspective. Technovation, 32(5), 282–292.

    Article  Google Scholar 

  • Loebbecke, C., Van Fenema, P. C., & Powell, P. (2016). Managing inter-organizational knowledge sharing. The Journal of Strategic Information Systems, 25(1), 4–14.

    Article  Google Scholar 

  • Manhart, M., & Thalmann, S. (2015). Protecting organizational knowledge: A structured literature review. Journal of Knowledge Management, 19(2), 190–211.

    Article  Google Scholar 

  • Manhart, M., Thalmann, S., & Maier, R. (2015). The Ends of Knowledge Sharing in Networks: Using Information Technology to Start Knowledge Protection. In 23rd European Conference on Information Systems (ECIS). Münster, Germany.

    Google Scholar 

  • Marabelli, M., & Newell, S. (2012). Knowledge risks in organizational networks: The practice perspective. The Journal of Strategic Information Systems, 21(1), 18–30.

    Article  Google Scholar 

  • Mazloomi Khamseh, H., & Jolly, D. R. (2008). Knowledge transfer in alliances: Determinant factors. Journal of Knowledge Management, 12(1), 37–50.

    Article  Google Scholar 

  • Mcdermott, R., & O’dell, C. (2001). Overcoming cultural barriers to sharing knowledge. Journal of Knowledge Management, 5(1), 76–85.

    Article  Google Scholar 

  • Moschini, G., & Yerokhin, O. (2008). Patents, research exemption, and the incentive for sequential innovation. Journal of Economics & Management Strategy, 17(2), 379–412.

    Article  Google Scholar 

  • Nandkumar, A., & Srikanth, K. (2015). Right person in the right place: How the host country IPR influences the distribution of inventors in offshore R&D projects of multinational enterprises. Strategic Management Journal.

    Google Scholar 

  • Nelson, R. R., & Winter, S. G. (1982). An evolutionary theory of economic change. Cambridge: Harvard University Press.

    Google Scholar 

  • Nonaka, I. (1991). The knowledge-creating company. Harvard Business Review, 69(6), 96–104.

    Google Scholar 

  • Nonaka, I. (1994). A dynamic theory of organizational knowledge creation. Organization Science, 5(1), 14–37.

    Article  Google Scholar 

  • Nonaka, I., & Takeuchi, H. (1995). The knowledge-creating company. New York: Oxford University Press.

    Google Scholar 

  • Nonaka, I., & Toyama, R. (2003). The knowledge-creating theory revisited: Knowledge creation as a synthesizing process. Knowledge Management Research & Practice, 1(1), 2–10.

    Article  Google Scholar 

  • Norman, P. M. (2002). Protecting knowledge in strategic alliances: Resource and relational characteristics. The Journal of High Technology Management Research, 13(2), 177–202.

    Article  Google Scholar 

  • Norman, P. M. (2004). Knowledge acquisition, knowledge loss, and satisfaction in high technology alliances. Journal of Business Research, 57(6), 610–619.

    Article  Google Scholar 

  • O’dell, C., & Grayson, C. J. (1998). If only we knew what we know. California Management Review, 40(3), 154–174.

    Article  Google Scholar 

  • Olander, H., Vanhala, M., & Hurmelinna-Laukkanen, P. (2014). Reasons for choosing mechanisms to protect knowledge and innovations. Management Decision, 52(2), 207–229.

    Article  Google Scholar 

  • Olander, H., Vanhala, M., Hurmelinna Laukkanen, P., & Blomqvist, K. (2015). HR related knowledge protection and innovation performance: The moderating effect of trust. Knowledge and Process Management.

    Google Scholar 

  • Pahnke, E., Mcdonald, R., Wang, D., & Hallen, B. (2015). Exposed: Venture capital, competitor ties, and entrepreneurial innovation. Academy of Management Journal, 58(5), 1334–1360.

    Article  Google Scholar 

  • Pawlowski, J. M. (2008). Culture profiles: Facilitating global learning and knowledge sharing. In 16th International Conference on Computers in Education (ICCE). Taipei, Taiwan.

    Google Scholar 

  • Pinjani, P., & Palvia, P. (2013). Trust and knowledge sharing in diverse global virtual teams. Information & Management, 50(4), 144–153.

    Article  Google Scholar 

  • Reagans, R., & Mcevily, B. (2003). Network structure and knowledge transfer: The effects of cohesion and range. Administrative Science Quarterly, 48(2), 240–267.

    Article  Google Scholar 

  • Reitzig, M., & Puranam, P. (2009). Value appropriation as an organizational capability: The case of IP protection through patents. Strategic Management Journal, 30(7), 765–789.

    Article  Google Scholar 

  • Riege, A. (2005). Three-dozen knowledge-sharing barriers managers must consider. Journal of Knowledge Management, 9(3), 18–35.

    Article  Google Scholar 

  • Rowley, J., & Slack, F. (2004). Conducting a literature review. Management Research News, 27(6), 31–39.

    Article  Google Scholar 

  • Sarigianni, C., Thalmann, S., & Manhart, M. (2016). Protecting knowledge in the financial sector: An analysis of knowledge risks arising from social media. In 49th Hawaii International Conference on System Sciences (HICSS), 2016. IEEE.

    Google Scholar 

  • Sazali, A., Raduan, C., Jegak, U., & Haslinda, A. (2010). The effects of partner protectiveness and transfer capacity on degree of inter-firm technology transfer in international joint ventures. International Journal of Economics and Management, 4(2), 334–349.

    Google Scholar 

  • Schäper, S., & Thalmann, S. (2015). Addressing challenges for informal learning in networks of organizations. In 23rd European Conference on Information Systems (ECIS). Münster, Germany.

    Google Scholar 

  • Serenko, A., & Bontis, N. (2013). Global ranking of knowledge management and intellectual capital academic journals: 2013 update. Journal of Knowledge Management, 17(2), 307–326.

    Article  Google Scholar 

  • Simonin, B. L. (2004). An empirical investigation of the process of knowledge transfer in international strategic alliances. Journal of International Business Studies, 35(5), 407–427.

    Article  Google Scholar 

  • Sofka, W., Shehu, E., & De Faria, P. (2014). Multinational subsidiary knowledge protection-do mandates and clusters matter? Research Policy, 43(8), 1320–1333.

    Article  Google Scholar 

  • Sveiby, K.-E. (2001). A knowledge-based theory of the firm to guide in strategy formulation. Journal of Intellectual Capital, 2(4), 344–358.

    Article  Google Scholar 

  • Sveiby, K.-E., & Simons, R. (2002). Collaborative climate and effectiveness of knowledge work-an empirical study. Journal of Knowledge Management, 6(5), 420–433.

    Article  Google Scholar 

  • Szulanski, G. (1996a). Exploring internal stickiness: Impediments to the transfer of best practice within the firm. Strategic Management Journal, 17(S2), 27–43.

    Article  Google Scholar 

  • Szulanski, G. (1996b). Exploring internal stickiness: Impediments to the transfer of best practice within the firm. Strategic Management Journal 17(Winter Special Issue), 27–43.

    Google Scholar 

  • Szulanski, G. (2000). The process of knowledge transfer: A diachronic analysis of stickiness. Organizational Behavior and Human Decision Processes, 82(1), 9–27.

    Article  Google Scholar 

  • Thalmann, S., Manhart, M., Ceravolo, P., & Azzini, A. (2014). An integrated risk management framework: Measuring the success of organizational knowledge protection. International Journal of Knowledge Management, 10(2), 28–42.

    Article  Google Scholar 

  • Toh, P. K., & Polidoro, F. (2013). A competition-based explanation of collaborative invention within the firm. Strategic Management Journal, 34(10), 1186–1208.

    Article  Google Scholar 

  • Trkman, P., & Desouza, K. C. (2012). Knowledge risks in organizational networks: An exploratory framework. The Journal of Strategic Information Systems, 21(1), 1–17.

    Article  Google Scholar 

  • Von Hippel, E. (2009). Democratizing innovation: The evolving phenomenon of user innovation. International Journal of Innovation Science, 1(1), 29–40.

    Article  Google Scholar 

  • Von Krogh, G. (2012). How does social software change knowledge management? Toward a strategic research agenda. The Journal of Strategic Information Systems, 21(2), 154–164.

    Article  Google Scholar 

  • Webster, J., & Watson, R. T. (2002a). Analyzing the past to prepare for the future: Writing a literature review. Management Information Systems Quarterly, 26(2).

    Google Scholar 

  • Webster, J., & Watson, R. T. (2002b). Analyzing the past to prepare for the future: Writing a literature review. MIS Quarterly, xiii–xxiii.

    Google Scholar 

  • Yoo, Y., Boland, R. J., Jr., Lyytinen, K., & Majchrzak, A. (2012). Organizing for innovation in the digitized world. Organization Science, 23(5), 1398–1408.

    Article  Google Scholar 

  • Yoo, Y., Henfridsson, O., & Lyytinen, K. (2010). Research commentary-The new organizing logic of digital innovation: An agenda for information systems research. Information Systems Research, 21(4), 724–735.

    Article  Google Scholar 

  • Yoo, Y., & Kanawattanachai, P. (2001). Developments of transactive memory systems and collective mind in virtual teams. The International Journal of Organizational Analysis, 9(2), 187–208.

    Article  Google Scholar 

  • Zanarone, G., Lo, D., & Madsen, T. L. (2015). The double edged effect of knowledge acquisition: How contracts safeguard pre existing resources. Strategic Management Journal.

    Google Scholar 

  • Zimmermann, A., & Ravishankar, M. (2014). Knowledge transfer in IT offshoring relationships: The roles of social capital, efficacy and outcome expectations. Information Systems Journal, 24(2), 167–202.

    Article  Google Scholar 

Download references

Acknowledgements

The Know-Center and Pro2Future are funded within the Austrian COMET Program—Competence Centers for Excellent Technologies—under the auspices of the Austrian Federal Ministry of Transport, Innovation and Technology, the Austrian Federal Ministry of Economy, Family and Youth and by the State of Styria. COMET is managed by the Austrian Research Promotion Agency FFG.

This research is partly funded by the Finnish Foundation for Economic Education for the second author.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Stefan Thalmann .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Thalmann, S., Ilvonen, I. (2018). Balancing Knowledge Protection and Sharing to Create Digital Innovations. In: North, K., Maier, R., Haas, O. (eds) Knowledge Management in Digital Change. Progress in IS. Springer, Cham. https://doi.org/10.1007/978-3-319-73546-7_10

Download citation

Publish with us

Policies and ethics

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy