Skip to main content
Kent Academic Repository

Harnessing the hackers: The emergence and exploitation of Outlaw Innovation

Flowers, Stephen (2008) Harnessing the hackers: The emergence and exploitation of Outlaw Innovation. Research Policy, 37 (2). pp. 177-193. ISSN 0048-7333. (doi:10.1016/j.respol.2007.10.006) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:51405)

The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided.
Official URL:
http://dx.doi.org/10.1016/j.respol.2007.10.006

Abstract

This paper will explore how the often illegal activities of hackers (employed in the original usage of the term to refer to individuals who modify computer hardware and software) may produce valuable innovations. The paper argues that structural changes, including a growth in the number of knowledge workers, has resulted in a burgeoning community of users able to modify or hack existing products, or develop products that compete with existing suppliers. The paper will introduce the complementary concepts of Outlaw Innovation and the Outlaw User, locating them within the literature on users. The paper will explore how firms react to this activity and provide case studies of this phenomenon. The paper will argue that Outlaw Innovation represents an extension in our understanding of the way in which firms interact with users, presents a series of policy challenges, and opens a promising area for further research. A series of possible research questions will be outlined and the paper will conclude by indicating the next steps in the development of this line of enquiry. © 2008.

Item Type: Article
DOI/Identification number: 10.1016/j.respol.2007.10.006
Additional information: Unmapped bibliographic data: LA - English [Field not mapped to EPrints] J2 - Res Policy [Field not mapped to EPrints] AD - Centre for Research in Innovation Management (CENTRIM), University of Brighton, United Kingdom [Field not mapped to EPrints] DB - Scopus [Field not mapped to EPrints]
Uncontrolled keywords: Hackers, Innovation, Outlaw, User, Computer crime, Information technology, Security of data, Technological forecasting, Outlaw Innovation, Outlaw User, Structural changes, Research and development management
Subjects: H Social Sciences > HF Commerce > HF5351 Business
Divisions: Divisions > Kent Business School - Division > Kent Business School (do not use)
Depositing User: Kimberley Attard-Owen
Date Deposited: 04 Nov 2015 10:54 UTC
Last Modified: 16 Nov 2021 10:21 UTC
Resource URI: https://kar.kent.ac.uk/id/eprint/51405 (The current URI for this page, for reference purposes)

University of Kent Author Information

  • Depositors only (login required):

Total unique views for this document in KAR since July 2020. For more details click on the image.