Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
Knowledge management
(section)
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
==Knowledge protection== Knowledge protection refers to behaviors and actions taken to protect the knowledge from unwanted opportunistic behavior for example appropriation or imitation of the knowledge.<ref>{{Cite book |last=Norman |first=Patricia |title=Protecting Knowledge in Strategic Alliances: Resource and Relational Characteristics |date=2002 |doi=10.1016/S1047-8310(02)00050-0}}</ref> Knowledge protection is used to prevent the knowledge to be unintentionally available or useful for competitors. Knowledge protection can be for example a patent, copyright, trademark, lead time or secrecy held by a company or an individual.<ref>{{Cite journal |last1=Sofka |first1=Wolfgang |last2=Edlira |first2=Shehu |last3=de Faria |first3=Pedro |title=Multinational Subsidiary Knowledge Protection - Do Mandates and Clusters Matter? |journal=Research Policy |date=2014 |volume=43 |issue=8 |pages=1320β1333 |doi=10.1016/j.respol.2014.05.006}}</ref> === Knowledge protection methods === There are various methods for knowledge protection and those methods are often divided into two categories by their formality: formal protection and informal protection.<ref name="gast2019">{{cite journal |last1=Gast |first1=Johanna |last2=Gundolf |first2=Katherine |last3=Harms |first3=Rainer |last4=Matos Collado |first4=Elvin |title=Knowledge management and coopetition: How do cooperating competitors balance the needs to share and protect their knowledge? |journal=Industrial Marketing Management |year=2019 |volume=77 |pages=65β74 |doi=10.1016/j.indmarman.2018.12.007|s2cid=169838694 |url=https://ris.utwente.nl/ws/files/124075017/1_s2.0_S0019850118303298_main.pdf }}</ref><ref name=":2"/><ref name="ws2023">{{cite book |chapter=Methods of Knowledge Protection |chapter-url=https://www.worldscientific.com/doi/abs/10.1142/9781848169616_0008 |website=World Scientific |series=Series on Technology Management |year=2012 |volume=21 |pages=89β91 |doi=10.1142/9781848169616_0008 |isbn=978-1-84816-960-9 |access-date=9 May 2023 |archive-date=10 May 2023 |archive-url=https://web.archive.org/web/20230510095337/https://www.worldscientific.com/doi/abs/10.1142/9781848169616_0008 |url-status=live |title=Workbook for Opening Innovation |publisher=Imperial College Press }}</ref><ref name="bolisani2013">{{cite journal |last1=Bolisani |first1=Ettore |last2=Paiola |first2=Marco |last3=Scarso |first3=Enrico |title=Knowledge protection in knowledge-intensive business services |journal=Journal of Intellectual Capital |date=1 January 2013 |volume=14 |issue=2 |pages=192β211 |doi=10.1108/14691931311323841}}</ref> Occasionally a third category is introduced, semi-formal protection, which includes contracts and trade-secrets.<ref name="ws2023"/><ref name="bolisani2013" /><ref name="stefan2017">{{cite journal |last1=Stefan |first1=Ioana |last2=Bengtsson |first2=Lars |title=Unravelling appropriability mechanisms and openness depth effects on firm performance across stages in the innovation process |journal=Technological Forecasting & Social Change |date=2017 |volume=120 |pages=252β260 |doi=10.1016/j.techfore.2017.03.014|s2cid=85557336 |doi-access=free }}</ref> These semi-formal methods are also usually placed under formal methods. Organizations often use a combination of formal and informal knowledge protection methods to achieve comprehensive protection of their knowledge assets.<ref name="bolisani2013"/> The formal and informal knowledge protection mechanisms are different in nature, and they have their benefits and drawbacks. In many organizations, the challenge is to find a good mix of measures that works for the organization.<ref name=":2"/> ==== Formal methods ==== Formal knowledge protection practices can take various forms, such as legal instruments or formal procedures and structures, to control which knowledge is shared and which is protected.<ref name="gast2019"/> Formal knowledge protection methods include for example: patents, trademarks, copyrights and licensing.<ref name="gast2019"/><ref name="ws2023"/><ref name="estrada2016">{{cite journal |last1=Estrada |first1=Isabel |last2=Faems |first2=Dries |last3=de Faria |first3=Pedro |title=Coopetition and product innovation performance: The role of internal knowledge sharing mechanisms and formal knowledge protection mechanisms |journal=Industrial Marketing Management |date=2016 |volume=53 |pages=56β65 |doi=10.1016/j.indmarman.2015.11.013|url=https://pure.rug.nl/ws/files/80563452/Coopetition_and_product_innovation_performance_The_role_of_internal.pdf }}</ref> Technical solutions to protect the knowledge fall also under the category of formal knowledge protection. Formal knowledge protection from technical viewpoint includes technical access constraints and protection of communication channels, systems, and storage.<ref name=":2"/> While knowledge may eventually become public in some form or another, formal protection mechanisms are necessary to prevent competitors from directly utilizing it for their own gain.<ref name=":2"/> Formal protection methods are particularly effective in protecting established knowledge that can be codified and embodied in final products or services.<ref name="estrada2016"/> ==== Informal methods ==== Informal knowledge protection methods refer to the use of informal mechanisms such as human resource management practices or secrecy to protect knowledge assets. There is notable amount of knowledge that cannot be protected by formal methods, and for which more informal protection might be the most efficient option.<ref name="olander2014"/> Informal knowledge protection methods can take various forms, such as: secrecy, social norms and values, complexity, lead-time and Human resource management.<ref name="gast2019"/><ref name="estrada2016"/><ref name="telg2023">{{cite journal |last1=Telg |first1=Nina |last2=Lokshin |first2=Boris |last3=Letterie |first3=Wilko |title=How formal and informal intellectual property protection matters for firms' decision to engage in coopetition: The role of environmental dynamism and competition intensity |journal=Technovation |date=2023 |volume=124 |page=102751 |doi=10.1016/j.technovation.2023.102751|s2cid=257908051 |doi-access=free }}</ref><ref name="olander2014">{{cite journal |last1=Olander |first1=Heidi |last2=Vanhala |first2=Mika |last3=Hurmelinna-Laukkanen |first3=Pia |title=Reasons for choosing mechanisms to protect knowledge and innovations |journal=Management Decision |date=2014 |volume=52 |issue=2 |pages=207β229 |doi=10.1108/MD-11-2012-0791|url=https://lutpub.lut.fi/handle/10024/160013 |url-access=subscription }}</ref> Informal knowledge protection methods protect knowledge assets for example by making it difficult for outsiders to access and understand the knowledge within the boundaries of the organization.<ref name="telg2023"/> Informal protection methods are more effective for protecting knowledge that is complex or difficult to express, articulate, or codify.<ref name="telg2023"/><ref name="olander2014"/> === Balancing knowledge protection and knowledge sharing === The balance between knowledge sharing and knowledge protection is a critical dilemma faced by organizations today.<ref name=":1">{{Citation |last1=Thalmann |first1=Stefan |title=Balancing Knowledge Protection and Sharing to Create Digital Innovations |date=2018 |url=http://link.springer.com/10.1007/978-3-319-73546-7_10 |work=Knowledge Management in Digital Change |pages=171β188 |editor-last=North |editor-first=Klaus |access-date=2023-05-09 |place=Cham |publisher=Springer International Publishing |doi=10.1007/978-3-319-73546-7_10 |isbn=978-3-319-73545-0 |last2=Ilvonen |first2=Ilona |series=Progress in IS |editor2-last=Maier |editor2-first=Ronald |editor3-last=Haas |editor3-first=Oliver|url-access=subscription }}</ref><ref name=":2">{{Cite journal |last1=Ilvonen |first1=Ilona |last2=Thalmann |first2=Stefan |last3=Manhart |first3=Markus |last4=Sillaber |first4=Christian |date=2018-04-03 |title=Reconciling digital transformation and knowledge protection: a research agenda |url=https://www.tandfonline.com/doi/full/10.1080/14778238.2018.1445427 |journal=Knowledge Management Research & Practice |language=en |volume=16 |issue=2 |pages=235β244 |doi=10.1080/14778238.2018.1445427 |s2cid=196033786 |issn=1477-8238 |access-date=2023-05-09 |archive-date=2023-05-09 |archive-url=https://web.archive.org/web/20230509121244/https://www.tandfonline.com/doi/full/10.1080/14778238.2018.1445427 |url-status=live |url-access=subscription }}</ref> While sharing knowledge can lead to innovation, collaboration, and competitive advantage, protecting knowledge can prevent it from being misused, misappropriated, or lost.<ref name=":1" /><ref name=":2" /><ref name=":3">{{Cite journal |last1=Olander |first1=Heidi |last2=Hurmelinna-Laukkanen |first2=Pia |last3=MΓ€hΓΆnen |first3=Jukka |date=September 2009 |title=WHAT'S SMALL SIZE GOT TO DO WITH IT? PROTECTION OF INTELLECTUAL ASSETS IN SMEs |url=https://www.worldscientific.com/doi/abs/10.1142/S1363919609002339 |journal=International Journal of Innovation Management |language=en |volume=13 |issue=3 |pages=349β370 |doi=10.1142/S1363919609002339 |issn=1363-9196 |access-date=2023-05-09 |archive-date=2023-05-09 |archive-url=https://web.archive.org/web/20230509121249/https://www.worldscientific.com/doi/abs/10.1142/S1363919609002339 |url-status=live |url-access=subscription }}</ref> Thus, the need for organizational learning must be balanced with the need to protect organisations' intellectual property, especially whilst cooperating with external partners.<ref name=":1" /><ref name=":4">{{Cite journal |last=Hurmelinna-Laukkanen |first=Pia |date=2011-08-02 |title=Enabling collaborative innovation β knowledge protection for knowledge sharing |url=https://www.emerald.com/insight/content/doi/10.1108/14601061111148816/full/html |journal=European Journal of Innovation Management |language=en |volume=14 |issue=3 |pages=303β321 |doi=10.1108/14601061111148816 |issn=1460-1060 |access-date=2023-05-09 |archive-date=2023-05-09 |archive-url=https://web.archive.org/web/20230509121246/https://www.emerald.com/insight/content/doi/10.1108/14601061111148816/full/html |url-status=live |url-access=subscription }}</ref> The role of information security is crucial in helping organisations protect their assets whilst still enabling the benefits of information sharing.<ref name=":2" /><ref name=":3" /> By implementing effective knowledge management strategies, organizations can protect valuable [[intellectual property]] while also encouraging the sharing of relevant knowledge across teams and departments.<ref name=":1" /> This active balancing act requires careful consideration of factors such as the level of openness, the identification of core knowledge areas, and the establishment of appropriate mechanisms for knowledge transfer and collaboration.<ref name=":1" /> Finding the right balance between knowledge sharing and knowledge protection is a complex issue that requires a nuanced understanding of the trade-off's involved and the context in which knowledge is shared or protected.<ref name=":1" /><ref name=":4" /> === Knowledge protection risks === Protecting knowledge cannot be considered without its risks. Here are listed four of the major risks associated with knowledge protection: * Overprotection: One of the major risks of knowledge protection is overprotection. Overprotection occurs when intellectual property rights are too broad or too strict, preventing others from building upon existing ideas and stifling innovation. As noted by Rouyre and Fernandez,<ref>{{Cite book |last=Rouyre |first=Andrey |title=Managing Knowledge Sharing-Protecting Tensions in Coupled Innovation Projects among Several Competitors|publisher=SAGE Journals |year=2019 }}</ref> overprotection can have a chilling effect on follow-on innovation, which is particularly problematic in fields where innovation is cumulative. * Misappropriation: Another risk associated with knowledge protection is misappropriation. Misappropriation refers to the unauthorized use or theft of intellectual property. This can occur when confidential information is leaked, trade secrets are stolen, or patents are infringed upon. According to the World Intellectual Property Organization,<ref name="WIPO 2019">{{Cite book |last=WIPO |title=Understanding Intellectual Property |publisher=World Intellectual Property Organization |year=2019}}</ref> misappropriation can result in significant financial losses for individuals and organizations. * Infringement claims: Intellectual property owners can also face risks associated with infringement claims. Infringement occurs when someone uses intellectual property without permission or authorization, and the owner of the intellectual property files a lawsuit. Infringement claims can be costly and time-consuming and can result in damage to an individual's or organization's reputation. As noted by Law Insider's Knowledge of infringement Sample Clauses,<ref>{{Cite book |last=Law Insider |title=Knowledge of Infringement Sample Clauses |publisher=Law Insider |year=2019}}</ref> infringement claims can also result in financial penalties and even criminal prosecution. * Inadequate protection: Inadequate protection of intellectual property is also a significant risk. This occurs when intellectual property owners fail to properly protect their knowledge, such as by failing to obtain patents, trademarks, or copyrights. Inadequate protection can result in the loss of intellectual property rights and can make it difficult for individuals and organizations to enforce their rights in court. As noted by the WIPO,<ref name="WIPO 2019"/> inadequate protection can also make it easier for others to copy or steal intellectual property. In conclusion, protecting knowledge is crucial to promote innovation and creativity, but it is not without its risks. Overprotection, misappropriation, infringement claims, and inadequate protection are all risks associated with knowledge protection. Individuals and organizations should take steps to protect their intellectual property while also considering the potential risks and benefits of such protection.
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)