Académique Documents
Professionnel Documents
Culture Documents
Protecting Innovation
Appropriability
The degree to which a firm can capture the rents from its innovation is
termed appropriability.
The ease with which competitors can imitate the innovation is, in turn, a
function of both the nature of the technology itself and the strength of
the mechanisms used to protect the innovation
Appropriability
Tacit Knowledge
Before 1998, most software algorithms were not eligible for patent
protection—they were eligible only for copyright protection.
Almost every country has its own laws governing patent protection. A
patent granted in one country does not generally provide protection in
other countries.
Inventors and firms may monetize patents in a range of different ways, including
licensing the technology to others or selling the patent rights to another firm that
can better utilize the technology.
A study by Stuart Graham and Deepak Hegde found that the vast majority of
patentees prefer to disclose their patent applications before they are granted.
Both large and small inventors, across all major technology fields exhibited this
preference for early disclosure, presumably because it allows them to publicize
their invention’s quality and scope to competitors, external investors, and potential
licensees.
Types of Protection
Patent trolling
Firms may also seek patents just to limit the options of competitors or
to earn revenues through aggressive patent lawsuits. These actions
are sometimes referred to as “patent trolling.”
Apple claims to be the #1 target for patent trolls, having faced nearly
100 lawsuits between 2011 and 2014.
Types of Protection
Patent thickets
In industries with complex technologies such as computers, software, and
telecommunications, a dense web of overlapping patents known as “patent thickets”
can make it very difficult for firms to compete without falling prey to patent suits by
other firms in that technology domain.
This can seriously stifle innovation and has resulted in the rather peculiar strategy of
firms buying bundles of patents to create war chests that they hope will deter the
patent attacks of others.
In 2011, the bankrupt Nortel auctioned off its massive patent portfolio. The auction
was won by a consortium called Rockstar Bidco that included Microsoft, Apple, RIM,
Sony, and Ericsson, who paid $4.5 billion for the war chest, beating out Google
which bid $4.4 billion.
Google also bought Motorola Mobility for $12.5 billion the same year,
and it was widely believed that the purchase was almost solely for
Motorola’s patents, which would bolster Google’s position in the lawsuit
they expected would arise from the Nortel patents.
Trademarks and service marks can be embodied in any indicator that can be
perceived through one of the five senses.
Most marks are embodied in visual indicators, such as words, pictures, and
slogans.
However, marks are also registered that use other senses such as sound
(e.g., tones that are associated with a particular company or brand, iPhone
ring tone) or smells (as in fragrance)
Trademark rights may be used to prevent others from using a mark that is
similar enough to be confusing, but they may not be used to prevent others
from producing or selling the same goods or services under a clearly
different mark.
Nearly all countries offer some form of trademark registration and protection
Types of Protection
Copyrights
For example, work that has not been fixed in a tangible form of expression (for
example, a choreographed dance or improvisational speech that was not
notated or recorded) is not eligible for copyright protection.
Titles, names, short phrases, slogans, familiar symbols, and lists of ingredients
also cannot be copyrighted.
Trade secrets need not meet many of the stringent requirements of patent
law, enabling a broader class of assets and activities to be protectable.
For example, while the formula for a beverage is not patentable, it can be
considered a trade secret.
Types of Protection
Trade Secrets
A firm that controls the standard can reap monopoly rents and can
exert significant architectural control over both its own industry and
related industries
Liberal Diffusion – pros and cons
Firms may liberally diffuse their technologies (through, for example, open source
software or liberal licensing arrangements) to accelerate effect that can lead to
the technology’s dominance
Dilemma
Liberal diffusion of the technology can result in the fragmentation of the technology
platform: As different producers add improvements to the technology that make it
better fit their needs, the “standard” may be split into many non-standardized
versions.
To resolve these trade-offs, firms often adopt a strategy of partial protection for
their innovations, falling somewhere on the continuum between wholly proprietary
systems and wholly open systems
Wholly Proprietary systems
Wholly proprietary systems are those based on technology that is company
owned and protected through patents, copyrights, secrecy, or other
mechanisms.
Wholly proprietary systems are often not compatible with the products offered
by other manufacturers. Because their operation is based on protected
technology, other manufacturers are often unable to develop components that
may interact with the proprietary system.
Sun’s Java – Liberal license, community source, anyone has access to complete
source code, develop commercial applications, or augment the code; but any
augmentation to the core structure of Java must be approved by the Java
Community Process
External developers may have very diverse objectives for the technology;
rather than work together toward some unified vision of what the
technology could achieve in the future, they might work in different,
possibly even conflicting, directions.
Whether and how these improvements get incorporated into the technology
and disseminated to other users of the technology can prove very
problematic.
Factors to Consider for Protection
Decision
Production Capabilities, Marketing Capabilities, and Capital