Harnessing the Hackers: The emergence and exploitation of Outlaw Innovation

Steve Flowers

Research output: Chapter in Book/Conference proceeding with ISSN or ISBNConference contribution with ISSN or ISBN

Abstract

This paper will explore how the often illegal activities of hackers (in the original usage of the term to refer to individuals who modify computer hardware and software) may produce valuable innovations. It will explore how these innovations, termed Outlaw Innovations, may be appropriated by firms and provide case studies where this has taken place. The paper will seek to locate this phenomenon in the existing innovation literature, and explore the implications for firm innovation processes. It will outline a series of possible research questions and conclude by indicating the next steps in the development of this research.
Original languageEnglish
Title of host publicationDRUID Summer Conference 2006 on Knowledge, Innovation and Competitiveness: Dynamics of Firms, Networks, Regions and Institution
Publication statusPublished - Jun 2006
EventDRUID Summer Conference 2006 on Knowledge, Innovation and Competitiveness: Dynamics of Firms, Networks, Regions and Institution - Copenhagen, Denmark
Duration: 1 Jun 2006 → …

Conference

ConferenceDRUID Summer Conference 2006 on Knowledge, Innovation and Competitiveness: Dynamics of Firms, Networks, Regions and Institution
Period1/06/06 → …

Fingerprint

hacker
exploitation
innovation
firm
hardware

Keywords

  • Innovation
  • Users
  • Hackers
  • CENTRIM

Cite this

Flowers, S. (2006). Harnessing the Hackers: The emergence and exploitation of Outlaw Innovation. In DRUID Summer Conference 2006 on Knowledge, Innovation and Competitiveness: Dynamics of Firms, Networks, Regions and Institution
Flowers, Steve. / Harnessing the Hackers: The emergence and exploitation of Outlaw Innovation. DRUID Summer Conference 2006 on Knowledge, Innovation and Competitiveness: Dynamics of Firms, Networks, Regions and Institution. 2006.
@inproceedings{f1ebf1781cb946daa063407caea7692d,
title = "Harnessing the Hackers: The emergence and exploitation of Outlaw Innovation",
abstract = "This paper will explore how the often illegal activities of hackers (in the original usage of the term to refer to individuals who modify computer hardware and software) may produce valuable innovations. It will explore how these innovations, termed Outlaw Innovations, may be appropriated by firms and provide case studies where this has taken place. The paper will seek to locate this phenomenon in the existing innovation literature, and explore the implications for firm innovation processes. It will outline a series of possible research questions and conclude by indicating the next steps in the development of this research.",
keywords = "Innovation, Users, Hackers, CENTRIM",
author = "Steve Flowers",
year = "2006",
month = "6",
language = "English",
booktitle = "DRUID Summer Conference 2006 on Knowledge, Innovation and Competitiveness: Dynamics of Firms, Networks, Regions and Institution",

}

Flowers, S 2006, Harnessing the Hackers: The emergence and exploitation of Outlaw Innovation. in DRUID Summer Conference 2006 on Knowledge, Innovation and Competitiveness: Dynamics of Firms, Networks, Regions and Institution. DRUID Summer Conference 2006 on Knowledge, Innovation and Competitiveness: Dynamics of Firms, Networks, Regions and Institution, 1/06/06.

Harnessing the Hackers: The emergence and exploitation of Outlaw Innovation. / Flowers, Steve.

DRUID Summer Conference 2006 on Knowledge, Innovation and Competitiveness: Dynamics of Firms, Networks, Regions and Institution. 2006.

Research output: Chapter in Book/Conference proceeding with ISSN or ISBNConference contribution with ISSN or ISBN

TY - GEN

T1 - Harnessing the Hackers: The emergence and exploitation of Outlaw Innovation

AU - Flowers, Steve

PY - 2006/6

Y1 - 2006/6

N2 - This paper will explore how the often illegal activities of hackers (in the original usage of the term to refer to individuals who modify computer hardware and software) may produce valuable innovations. It will explore how these innovations, termed Outlaw Innovations, may be appropriated by firms and provide case studies where this has taken place. The paper will seek to locate this phenomenon in the existing innovation literature, and explore the implications for firm innovation processes. It will outline a series of possible research questions and conclude by indicating the next steps in the development of this research.

AB - This paper will explore how the often illegal activities of hackers (in the original usage of the term to refer to individuals who modify computer hardware and software) may produce valuable innovations. It will explore how these innovations, termed Outlaw Innovations, may be appropriated by firms and provide case studies where this has taken place. The paper will seek to locate this phenomenon in the existing innovation literature, and explore the implications for firm innovation processes. It will outline a series of possible research questions and conclude by indicating the next steps in the development of this research.

KW - Innovation

KW - Users

KW - Hackers

KW - CENTRIM

M3 - Conference contribution with ISSN or ISBN

BT - DRUID Summer Conference 2006 on Knowledge, Innovation and Competitiveness: Dynamics of Firms, Networks, Regions and Institution

ER -

Flowers S. Harnessing the Hackers: The emergence and exploitation of Outlaw Innovation. In DRUID Summer Conference 2006 on Knowledge, Innovation and Competitiveness: Dynamics of Firms, Networks, Regions and Institution. 2006