{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T09:55:29Z","timestamp":1774518929272,"version":"3.50.1"},"reference-count":61,"publisher":"Emerald","issue":"2","license":[{"start":{"date-parts":[[2019,3,11]],"date-time":"2019-03-11T00:00:00Z","timestamp":1552262400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JKM"],"published-print":{"date-parts":[[2019,3,11]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-subheading\">Purpose<\/jats:title><jats:p>The purpose of this paper is to explore in depth the mechanisms that organizations use to keep their innovations secret. This paper examines how, when and why secrecy appropriation mechanisms (SAMs) can enable innovators to appropriate value from their innovations.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Design\/methodology\/approach<\/jats:title><jats:p>Building from an extensive literature review of innovation and secrecy, the paper presents a number of implications for theory and research in the form of testable propositions.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Findings<\/jats:title><jats:p>This conceptualization proposes that SAMs can have both positive and negative effects on a number of organizational dynamics. SAMs involve tradeoffs, and the key to understanding whether they create value to organizations lies in understanding that these tradeoffs exist and the nature of these tradeoffs.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Practical implications<\/jats:title><jats:p>While most managers recognize the importance of secrecy in innovations, many struggle with the practical challenges of doing so. The paper presents guidance for managers to overcome these challenges.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Originality\/value<\/jats:title><jats:p>This paper adds to previous research that has identified secrecy as an important appropriation mechanism for firms by digging deeper into the details of SAMs and exploring their sources, characteristics and effects.<\/jats:p><\/jats:sec>","DOI":"10.1108\/jkm-09-2017-0389","type":"journal-article","created":{"date-parts":[[2018,9,25]],"date-time":"2018-09-25T03:24:51Z","timestamp":1537845891000},"page":"297-312","source":"Crossref","is-referenced-by-count":20,"title":["Secrets and knowledge management strategy: the role of secrecy appropriation mechanisms in realizing value from firm innovations"],"prefix":"10.1108","volume":"23","author":[{"given":"David","family":"Hannah","sequence":"first","affiliation":[]},{"given":"Michael","family":"Parent","sequence":"additional","affiliation":[]},{"given":"Leyland","family":"Pitt","sequence":"additional","affiliation":[]},{"given":"Pierre","family":"Berthon","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"issue":"1","key":"key2020092411035528200_ref001","first-page":"71","article-title":"Does IP strategy have to cripple open innovation?","volume":"51","year":"2009","journal-title":"MIT Sloan Management Review"},{"issue":"4","key":"key2020092411035528200_ref002","doi-asserted-by":"crossref","first-page":"895","DOI":"10.1016\/j.respol.2013.01.004","article-title":"Private\u2013collective innovation, competition, and firms\u2019 counterintuitive appropriation strategies","volume":"42","year":"2013","journal-title":"Research Policy"},{"issue":"7","key":"key2020092411035528200_ref003","doi-asserted-by":"crossref","first-page":"1263","DOI":"10.1002\/smj.2383","article-title":"Appropriability and the retrieval of knowledge after spillovers","volume":"37","year":"2016","journal-title":"Strategic Management Journal"},{"issue":"1","key":"key2020092411035528200_ref004","doi-asserted-by":"crossref","first-page":"1","DOI":"10.2307\/1593727","article-title":"Little patents and big secrets: managing intellectual property","volume":"35","year":"2004","journal-title":"RAND Journal of Economics"},{"key":"key2020092411035528200_ref005","doi-asserted-by":"crossref","first-page":"609","DOI":"10.1515\/9781400879762-024","article-title":"Economic welfare and the allocation of resources for invention","volume-title":"The Rate and Direction of Inventive Activity: Economic and Social Factors","year":"1962"},{"issue":"4","key":"key2020092411035528200_ref006","doi-asserted-by":"crossref","first-page":"611","DOI":"10.1016\/S0048-7333(00)00100-1","article-title":"The relative effectiveness of patents and secrecy for appropriation","volume":"30","year":"2001","journal-title":"Research Policy"},{"key":"key2020092411035528200_ref007","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1016\/j.technovation.2015.05.003","article-title":"Exploring the use of patents in a weak institutional environment: the effects of innovation partnerships, firm ownership, and new management practices","volume":"45\/46","year":"2015","journal-title":"Technovation"},{"issue":"2","key":"key2020092411035528200_ref008","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1016\/S1090-9516(97)90002-X","article-title":"Protecting intellectual capital in international alliances","volume":"32","year":"1997","journal-title":"Journal of World Business"},{"key":"key2020092411035528200_ref08a","volume-title":"The Language of Secrecy: Symbols and Metaphors in Poro Ritual","year":"1984"},{"issue":"3","key":"key2020092411035528200_ref009","doi-asserted-by":"crossref","first-page":"523","DOI":"10.2307\/25750690","article-title":"Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness","volume":"34","year":"2010","journal-title":"MIS Quarterly"},{"issue":"5","key":"key2020092411035528200_ref010","doi-asserted-by":"crossref","first-page":"555","DOI":"10.1287\/orsc.1040.0094","article-title":"Transferring, translating, and transforming: an integrative framework for managing knowledge across boundaries","volume":"15","year":"2004","journal-title":"Organization Science"},{"key":"key2020092411035528200_ref011","volume-title":"Open Innovation: The New Imperative for Creating and Profiting from Technology","year":"2006"},{"key":"key2020092411035528200_ref012","volume-title":"Open Innovation: Researching a New Paradigm","year":"2006"},{"key":"key2020092411035528200_ref013","volume-title":"Protecting Their Intellectual Assets: Appropriability Conditions and Why US Manufacturing Firms Patent (or Not) (No. w7552)","year":"2000"},{"issue":"4","key":"key2020092411035528200_ref014","doi-asserted-by":"crossref","first-page":"403","DOI":"10.1016\/S0167-2681(01)00154-8","article-title":"Innovation and reciprocal externalities: information transmission via job mobility","volume":"45","year":"2001","journal-title":"Journal of Economic Behavior & Organization"},{"issue":"10","key":"key2020092411035528200_ref015","doi-asserted-by":"crossref","first-page":"1423","DOI":"10.1177\/0170840613515470","article-title":"Bringing secrecy into the open: towards a theorization of the social processes of organizational secrecy","volume":"35","year":"2014","journal-title":"Organization Studies"},{"issue":"6","key":"key2020092411035528200_ref016","doi-asserted-by":"crossref","first-page":"1154","DOI":"10.1111\/j.1467-6486.2009.00880.x","article-title":"A multi\u2010dimensional framework of organizational innovation: a systematic review of the literature","volume":"47","year":"2010","journal-title":"Journal of Management Studies"},{"key":"key2020092411035528200_ref017","article-title":"Appropriation and intellectual property in the informal economy (2016)","volume-title":"The Informal Economy in Developing Nations: Hidden Engine of Innovation? New Economic Insights and Policies","year":"2016"},{"key":"key2020092411035528200_ref018","unstructured":"de Beer, J. Fu, K. and Wunsch-Vincent, S. (2013), \u201cThe informal economy, innovation and intellectual property-concepts, metrics and policy considerations. world intellectual property organization, economic research working paper #10\u201d, available at: www.wipo.int\/edocs\/pubdocs\/en\/wipo_pub_econstat_wp_10.pdf"},{"key":"key2020092411035528200_ref019","volume-title":"Protecting Trade Secrets, Patents, Copyrights, and Trademarks","year":"1995","edition":"2nd Ed."},{"issue":"2","key":"key2020092411035528200_ref020","doi-asserted-by":"crossref","first-page":"102","DOI":"10.1177\/1056492607313082","article-title":"On the virtues of secrecy in organizations","volume":"17","year":"2008","journal-title":"Journal of Management Inquiry"},{"issue":"1","key":"key2020092411035528200_ref021","doi-asserted-by":"crossref","first-page":"57","DOI":"10.5465\/amr.1989.4279003","article-title":"Agency theory: an assessment and review","volume":"14","year":"1989","journal-title":"Academy of Management Review"},{"issue":"2","key":"key2020092411035528200_ref022","doi-asserted-by":"crossref","first-page":"301","DOI":"10.1086\/467037","article-title":"Separation of ownership and control","volume":"26","year":"1983","journal-title":"The Journal of Law and Economics"},{"issue":"2","key":"key2020092411035528200_ref023","doi-asserted-by":"crossref","first-page":"187","DOI":"10.1287\/orsc.1070.0314","article-title":"Norms-based intellectual property systems: the case of French chefs","volume":"19","year":"2008","journal-title":"Organization Science"},{"issue":"5","key":"key2020092411035528200_ref024","doi-asserted-by":"crossref","first-page":"914","DOI":"10.1016\/j.respol.2013.09.006","article-title":"Closed or open innovation? Problem solving and the governance choice","volume":"43","year":"2014","journal-title":"Research Policy"},{"issue":"1","key":"key2020092411035528200_ref025","doi-asserted-by":"crossref","first-page":"22","DOI":"10.2307\/2787117","article-title":"Secrecy, trust, and dangerous leisure: generating group cohesion in voluntary organizations","volume":"59","year":"1996","journal-title":"Social Psychology Quarterly"},{"issue":"4","key":"key2020092411035528200_ref026","doi-asserted-by":"crossref","first-page":"780","DOI":"10.1016\/j.respol.2011.12.008","article-title":"French firms\u2019 strategies for protecting their intellectual property","volume":"41","year":"2012","journal-title":"Research Policy"},{"issue":"5","key":"key2020092411035528200_ref027","doi-asserted-by":"crossref","first-page":"280","DOI":"10.1016\/j.technovation.2006.12.004","article-title":"Appropriability of innovation results: an empirical study in Spanish manufacturing firms","volume":"27","year":"2007","journal-title":"Technovation"},{"issue":"3","key":"key2020092411035528200_ref028","doi-asserted-by":"crossref","first-page":"611","DOI":"10.2307\/25148742","article-title":"The nature of theory in information systems","volume":"30","year":"2006","journal-title":"MIS Quarterly"},{"issue":"1","key":"key2020092411035528200_ref029","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1287\/orsc.1040.0113","article-title":"Should I keep a secret? The effects of trade secret protection procedures on employees\u2019 obligations to protect trade secrets","volume":"16","year":"2005","journal-title":"Organization Science"},{"key":"key2020092411035528200_ref030","first-page":"17","article-title":"Keeping trade secrets secret","volume":"47","year":"2006","journal-title":"MIT Sloan Management Review"},{"issue":"4","key":"key2020092411035528200_ref031","doi-asserted-by":"crossref","first-page":"465","DOI":"10.1111\/j.1467-6486.2007.00694.x","article-title":"An examination of the factors that influence whether newcomers protect or share secrets of their former employers","volume":"44","year":"2007","journal-title":"Journal of Management Studies"},{"issue":"3","key":"key2020092411035528200_ref032","doi-asserted-by":"crossref","first-page":"381","DOI":"10.1111\/joms.12120","article-title":"Why and how do employees break and bend confidential information protection rules?","volume":"52","year":"2015","journal-title":"Journal of Management Studies"},{"issue":"1","key":"key2020092411035528200_ref033","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1016\/j.bushor.2013.09.001","article-title":"It\u2019s a secret: marketing value and the denial of availability","volume":"57","year":"2014","journal-title":"Business Horizons"},{"issue":"6","key":"key2020092411035528200_ref034","doi-asserted-by":"crossref","first-page":"981","DOI":"10.1016\/0048-7333(94)00812-4","article-title":"Appropriability of technical innovations: an empirical analysis","volume":"24","year":"1995","journal-title":"Research Policy"},{"issue":"3\/4","key":"key2020092411035528200_ref035","doi-asserted-by":"crossref","first-page":"282","DOI":"10.1504\/IJTM.2009.022653","article-title":"The availability, strength and efficiency of appropriability mechanisms \u2013 protecting investments in knowledge creation","volume":"45","year":"2009","journal-title":"International Journal of Technology Management"},{"issue":"7","key":"key2020092411035528200_ref036","doi-asserted-by":"crossref","first-page":"1178","DOI":"10.1108\/00251741211246950","article-title":"Constituents and outcomes of absorptive capacity\u2013appropriability regime changing the game","volume":"50","year":"2012","journal-title":"Management Decision"},{"key":"key2020092411035528200_ref037","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1111\/j.1467-9310.2007.00460.x","article-title":"Nature and dynamics of appropriability: strategies for appropriating returns on innovation","volume":"37","year":"2007","journal-title":"R&D Management"},{"issue":"3","key":"key2020092411035528200_ref038","doi-asserted-by":"crossref","first-page":"278","DOI":"10.1111\/j.1467-9310.2008.00512.x-i1","article-title":"Appropriability regime for radical and incremental innovations","volume":"38","year":"2008","journal-title":"R&D Management"},{"issue":"5","key":"key2020092411035528200_ref039","doi-asserted-by":"crossref","first-page":"1123","DOI":"10.1177\/0149206313488211","article-title":"How firms capture value from their innovations","volume":"39","year":"2013","journal-title":"Journal of Management"},{"issue":"4","key":"key2020092411035528200_ref040","doi-asserted-by":"crossref","first-page":"305","DOI":"10.1016\/0304-405X(76)90026-X","article-title":"Theory of the firm: managerial behavior, agency costs and ownership structure","volume":"3","year":"1976","journal-title":"Journal of Financial Economics"},{"issue":"2","key":"key2020092411035528200_ref041","doi-asserted-by":"crossref","first-page":"82","DOI":"10.1257\/000282806777211928","article-title":"Simultaneous model of innovation, secrecy, and patent policy","volume":"96","year":"2006","journal-title":"American Economic Review"},{"key":"key2020092411035528200_ref042","volume-title":"Managing Intellectual Property Rights","year":"1993"},{"issue":"3","key":"key2020092411035528200_ref043","doi-asserted-by":"crossref","first-page":"623","DOI":"10.1093\/icc\/6.3.623","article-title":"Keeping organizational secrets: protective institutional mechanisms and their costs","volume":"6","year":"1997","journal-title":"Journal of Corporate Change"},{"key":"key2020092411035528200_ref044","volume-title":"The Social Psychology of Procedural Justice","year":"1988"},{"issue":"4","key":"key2020092411035528200_ref045","doi-asserted-by":"crossref","first-page":"437","DOI":"10.2307\/799923","article-title":"Towards a sociology of secrecy and security systems","volume":"19","year":"1972","journal-title":"Social Problems"},{"issue":"2","key":"key2020092411035528200_ref046","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1525\/eth.1989.17.2.02a00010","article-title":"The magic of secrecy","volume":"17","year":"1989","journal-title":"Ethos"},{"issue":"2","key":"key2020092411035528200_ref047","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1177\/089124199028002001","article-title":"Enculturation into secrecy among junior high school girls","volume":"28","year":"1999","journal-title":"Journal of Contemporary Ethnography"},{"issue":"2\/3","key":"key2020092411035528200_ref048","first-page":"78","article-title":"Innovation and appropriation mechanisms: evidence from argentine microdata","volume":"33","year":"2013","journal-title":"Technovation"},{"issue":"12","key":"key2020092411035528200_ref049","doi-asserted-by":"crossref","first-page":"681","DOI":"10.1016\/j.technovation.2012.07.004","article-title":"The use of patents and informal appropriation mechanisms\u2014differences between sectors and among companies","volume":"32","year":"2012","journal-title":"Technovation"},{"key":"key2020092411035528200_ref050","volume-title":"For God, Country, and Coca-Cola","year":"1993"},{"key":"key2020092411035528200_ref051","unstructured":"Silk Road Foundation (2014), \u201cHistory of silk\u201d, available at: www.silk-road.com\/artl\/silkhistory.shtml"},{"key":"key2020092411035528200_ref052","first-page":"1121","article-title":"The future of innovation-trade secrets, property rights, and protectionism-an age-old tale","volume":"70","year":"2004","journal-title":"Brooklyn Law Review"},{"issue":"3","key":"key2020092411035528200_ref053","doi-asserted-by":"crossref","first-page":"55","DOI":"10.2307\/41165943","article-title":"Capturing value from knowledge assets: the new economy, markets for know how, and intangible assets","volume":"40","year":"1998","journal-title":"California Management Review"},{"key":"key2020092411035528200_ref054","volume-title":"Secrecy: A Cross-Cultural Perspective","year":"1980"},{"issue":"1","key":"key2020092411035528200_ref055","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1016\/j.respol.2012.04.019","article-title":"To protect or not to protect? Modes of appropriability in the small enterprise sector","volume":"42","year":"2013","journal-title":"Research Policy"},{"key":"key2020092411035528200_ref056","volume-title":"The Cultures of Work Organizations","year":"1993"},{"issue":"6","key":"key2020092411035528200_ref057","doi-asserted-by":"crossref","first-page":"1143","DOI":"10.5465\/amj.2005.19573114","article-title":"Can businesses effectively regulate employee conduct? The antecedents of rule following in work settings","volume":"48","year":"2005","journal-title":"Academy of Management Journal"},{"issue":"5","key":"key2020092411035528200_ref058","doi-asserted-by":"crossref","first-page":"679","DOI":"10.1177\/0265407597145006","article-title":"Revealing family secrets: the influence of topic, function, and relationships","volume":"14","year":"1997","journal-title":"Journal of Social and Personal Relationships"},{"key":"key2020092411035528200_ref059","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1016\/j.technovation.2015.03.003","article-title":"Effects of intellectual property rights and patented knowledge in innovation and industry value added: a multinational empirical analysis of different industries","volume":"43-44","year":"2015","journal-title":"Technovation"},{"issue":"4","key":"key2020092411035528200_ref060","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1007\/BF02697802","article-title":"Secrecy and social cohesion","volume":"16","year":"1979","journal-title":"Society"}],"container-title":["Journal of Knowledge Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/JKM-09-2017-0389\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/JKM-09-2017-0389\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T22:27:26Z","timestamp":1753396046000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/jkm\/article\/23\/2\/297-312\/432264"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,3,11]]},"references-count":61,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2019,3,11]]}},"alternative-id":["10.1108\/JKM-09-2017-0389"],"URL":"https:\/\/doi.org\/10.1108\/jkm-09-2017-0389","relation":{},"ISSN":["1367-3270"],"issn-type":[{"value":"1367-3270","type":"print"}],"subject":[],"published":{"date-parts":[[2019,3,11]]}}}