2015
DOI: 10.5465/amj.2012.0773
|View full text |Cite
|
Sign up to set email alerts
|

Network Defense: Pruning, Grafting, and Closing to Prevent Leakage of Strategic Knowledge to Rivals

Abstract: We explore how firms protect themselves from the risks of knowledge spillover to indirectly connected rivals in a network of interorganizational ties. We argue that the safeguards to limit opportunistic behavior by directly linked firms in a dyad, which have been the focus of extant research, are insufficient to overcome extra-dyadic leakage risks. Instead, firms terminate or avoid ties that expose their knowledge to indirectly linked rivals ("pruning" and "grafting") and embed themselves in dense networks ("c… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

2
98
0
6

Year Published

2015
2015
2024
2024

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 94 publications
(112 citation statements)
references
References 76 publications
(96 reference statements)
2
98
0
6
Order By: Relevance
“…IKL can occur intentionally or unintentionally according to past research (Frishammar et al, 2015;Ahmad et al, 2014;Nouh et al, 2014;Creese et al, 2015;Hernandez et al, 2014). In unintentional leakages, proprietary information and knowledge are accidentally or forcibly transferred to any unauthorized parties either through verbal or written communications.…”
Section: Literature Reviewmentioning
confidence: 99%
“…IKL can occur intentionally or unintentionally according to past research (Frishammar et al, 2015;Ahmad et al, 2014;Nouh et al, 2014;Creese et al, 2015;Hernandez et al, 2014). In unintentional leakages, proprietary information and knowledge are accidentally or forcibly transferred to any unauthorized parties either through verbal or written communications.…”
Section: Literature Reviewmentioning
confidence: 99%
“…For example, Pahnke et al (2015) investigated the situation where an entrepreneurial firm is indirectly connected to rival firms via common venture capitalists, showing that information leakage via these indirect ties to competitors negatively affected entrepreneurial firms' innovation activities. In addition, Hernandez et al (2015) examined the hazards of knowledge leakage to rivals via indirect ties formed by board interlock networks. The authors argued that firms control such risks by terminating and avoiding ties that could create indirect paths to rivals.…”
Section: Theoretical Backgroundmentioning
confidence: 99%
“…Our most immediate contribution to the alliance literature lies in building upon and extending the literature that investigates the competitive aspects of collaborations and the potential risks of partnering with rivals (Hamel et al, 1989;Khanna et al, 1998;Oxley & Sampson, 2004;Park & Russo, 1996). This literature has paid attention to dyadic competitive relationships with direct rivals while related research has just recently begun to consider the threats of knowledge leakage to rivals via indirect links such as through common suppliers, shared intermediary organizations, and board interlocks (Hernandez et al, 2015;Mesquita et al, 2008;Pahnke et al, 2015). We complement this emerging literature that has paid attention to shared formal ties among firms by suggesting that geographic co-location between a focal firm's partner and its rivals is an overlooked but important factor that can present risks of knowledge losses through other mechanisms (e.g., interpersonal interactions and mobility in a location and possible future interfirm transactions), and focal firms respond to the risks from partner-rival co-location through their alliance governance design choices.…”
Section: Contributions and Implicationsmentioning
confidence: 99%
See 1 more Smart Citation
“…Exploiting these opportunities requires absorptive capacity to understand, recognize and commercialize this knowledge (Qian and Acs, 2013). Entrepreneurs must find ways to distinguish partnerships that create exploitable knowledge, rather than expropriate otherwise protected knowledge assets (Hernandez et al, 2014;Katila et al, 2008).…”
Section: Knowledge Spillover and Creationmentioning
confidence: 99%