How to protect your invention against your alliance

How to protect your invention against your alliance
partner while working in an alliance
An exploratory case study of startup inventors in the Netherlands
Name: Max Kranendijk
Student number: 334556
E-mail: [email protected]
Master program: Management of Innovation (Business Administration)
Coach: Jan van den Ende
Co-reader: Helen Gubby
Date: 15-03-2012
8
Master Thesis
Max Kranendijk
Declaration of the author
The copyright of this Master thesis rests with the author. The author is responsible for its
contents. RSM is only responsible for the educational coaching and cannot be held liable for the
content.
Max Kranendijk
List of keywords
startup, invention, innovation, alliance, intellectual property protection
Page I
8
Master Thesis
Max Kranendijk
Preface
This Master thesis is my final contribution to my study Business Administration at RSM Erasmus
University Rotterdam. In the beginning of my thesis trajectory, I faced some difficulties in finding
a research topic which would benefit a certain organization. One of my thesis demands was to
conduct a research that would have a practical contribution to a certain organization. I had
several interviews with companies about conducting a research for them. Unfortunately, this did
not lead to any concrete research topic. During my internship at the ABN AMRO Dialogues House
I worked together with technical inventors. I experienced them struggling with commercializing
their invention and especially being worried of losing their invention due to imitation by a
competitor or (potential) partner. My goal was to contribute knowledge and recommendations
for methods which inventors can use to protect their inventions. Eventually, this observation led
to my research topic.
This thesis could never have been accomplished without the help of several people. Therefore, I
would like to mention the ones who supported me during my thesis trajectory.
I would like to express my thanks to Jan van den Ende for his supervision and valuable advice,
especially in defining my research topic. I would also like to thank Helen Gubby for providing me
her guidance in a completely new topic for me and her in-depth feedback concerning my English
grammar.
Without the help from Wouter Pijzel and Desirée Gerritsen, I would not have been able to
conduct my research and therefore I am grateful for sharing their contacts and expertise in
order to arrange my interviews.
Furthermore, I would like to thank ABN AMRO Dialogues House for introducing and guiding me
in the entrepreneurial and innovative environment of startups. Especially, I would like to thank
Karin Lems for her feedback on the structure of my thesis.
Last but not least, I would like to thank my girlfriend, Jana Zarembová, for her endless patience,
support and feedback in order to successfully finish my thesis and my family for the support
during my study period.
Utrecht, 2012
Max Kranendijk
Page II
8
Master Thesis
Max Kranendijk
Executive Summary
Technical startup inventors often face the problem of commercializing their invention due to the
lack of (financial) resources. Therefore, they frequently join an alliance to obtain the missing
resources and/or knowledge. A lot of research has been done about protection mechanism for
inventions. However, research does not focus on protection within an alliance against an own
alliance partner. Hence, the aim of this thesis is to answer the following research question: How
should you control the protection of an invention (knowledge) in an alliance against an own
alliance partner in order to maximize performance while commercializing an invention as a
startup SME (small and medium enterprise) innovator?
Discussions in the literature hardly make a distinction between protection against competitors
or own alliance partners. In most papers, the same protection mechanisms are used for normal
competitors and own alliance partners. Based on the literary resources and case studies, several
protection mechanisms were deliberated. The following protection mechanisms, suitable for
startup SMEs had been discussed: patents, secrecy, lead time, contracts, non-disclosure
agreements, trust and complementary knowledge.
For the case study, six inventors were interviewed who (un)successfully commercialized their
invention. The goal was to find out what their experience was with the different protection
mechanisms and which one was favorable in their situation. In addition, the researcher attended
events and interviewed several experts, who had a lot of experience in commercializing
inventions.
The case studies showed that all inventors struggled finding a (promising) alliance partner. One
of the reasons for this was that the inventions were often applicable for a niche market which
decreased the availability of potential partners. The inventions were mostly patented by the
inventors themselves, before approaching partners and resulted in a secure protection against
imitation. According to the case study results, the biggest problem was to negotiate about a
lucrative deal with a partner or keep in control of the invention when the partnership had
started. Several cases showed that inexperience led to less promising deals. Therefore, it is
advised to be coached when one is not experienced with commercializing an invention.
After comparing the literature review with the empirical results, it can be concluded that the
most important method to protect an invention as a startup SME is to keep part of the invention
(knowledge) in own control. In other words, the alliance partner is always (partly) dependent on
the inventor in order to successfully commercialize the invention. For instance, the inventor
should not share in what way the invention should enter the market or for which (extra)
possible purposes the invention can be used. In this manner, the startup SME maintains
bargaining power in the partnership.
Page III
8
Master Thesis
Max Kranendijk
Table of contents
Declaration of the author ....................................................................................................................... I
Preface .................................................................................................................................................... II
Executive Summary .............................................................................................................................. III
1
2
3
4
5
Introduction ................................................................................................................................... 1
1.1
Background ............................................................................................................................ 1
1.2
Research question.................................................................................................................. 1
1.3
Research framework ............................................................................................................. 2
1.4
Significance............................................................................................................................. 3
1.5
Delimitations .......................................................................................................................... 4
1.6
Definitions .............................................................................................................................. 4
Protection mechanisms ................................................................................................................. 6
2.1
Innovation versus invention defined ................................................................................... 6
2.2
Introduction in protection mechanisms .............................................................................. 6
2.3
Patents .................................................................................................................................... 7
2.4
Copyrights ............................................................................................................................ 10
2.5
Trademarks .......................................................................................................................... 11
2.6
Secrecy .................................................................................................................................. 11
2.7
Lead Time ............................................................................................................................. 12
2.8
Protection differences per industry ................................................................................... 12
2.9
Protection within SMEs / startups ..................................................................................... 13
2.10
Conclusion ............................................................................................................................ 15
Alliances........................................................................................................................................ 16
3.1
Introduction ......................................................................................................................... 16
3.2
(startup) SME alliances ....................................................................................................... 17
3.3
Leakage within alliances ..................................................................................................... 18
3.4
Conclusion ............................................................................................................................ 19
Protection in alliances ................................................................................................................. 20
4.1
Knowledge sharing/protection issues in alliances ........................................................... 20
4.2
Protection mechanisms used by startup SMEs in alliances.............................................. 22
4.3
Expected protection mechanisms used by SMEs in alliances .......................................... 24
4.4
Conclusion ............................................................................................................................ 25
Methodology................................................................................................................................. 26
Page IV
8
Master Thesis
6
5.1
Qualitative research strategy .............................................................................................. 26
5.2
Case study ............................................................................................................................. 26
5.3
Role of the researcher ......................................................................................................... 27
5.4
Selection of the cases ........................................................................................................... 28
5.5
Data collection procedures ................................................................................................. 28
5.6
The quality of the study ....................................................................................................... 29
5.7
Data analysis procedures .................................................................................................... 30
Empirical results .......................................................................................................................... 31
6.1
Interviews with technical startup inventors ..................................................................... 31
6.1.1
Corporate Inventor (Rutger Beekhuizen) .................................................................. 31
6.1.2
Long-Life Inventor (Kees Woensel) ........................................................................... 32
6.1.3
Lazy Partner (Peter Jong) ............................................................................................ 34
6.1.4
Niche Market Inventor (Evert Goud) ......................................................................... 35
6.1.5
Intrapreneur Becomes Entrepreneur (Fons Derks) ................................................. 37
6.1.6
Continuous Inventor (Jorg Leers)............................................................................... 38
6.1.7
Conclusions .................................................................................................................. 40
6.2
Interview with an alliance partner ..................................................................................... 42
6.2.1
6.3
7
Max Kranendijk
Fast Engineering .......................................................................................................... 42
Additional findings .............................................................................................................. 43
Conclusions .................................................................................................................................. 45
7.1
Conclusion ............................................................................................................................ 45
7.2
Additional findings .............................................................................................................. 47
7.3
Limitations and suggestions for further research ............................................................. 47
References ............................................................................................................................................ 49
Appendices ........................................................................................................................................... 56
Page V
8
Master Thesis
Max Kranendijk
1 Introduction
The first chapter describes the background of this thesis. In addition, it formulates the research
questions and the research framework. Moreover, the significance and delimitations of the
research are discussed. Finally, some important used definitions are explained.
1.1 Background
In recent years, there has been a shift from a closed innovation approach towards a more open
innovation approach (Chesbrough, 2003). This resulted in new initiatives, such as
crowdsourcing (Surowiecki, 2004), increased the amount and willingness to start alliance
partnerships and encouraged companies to work more together. Currently, companies ask
themselves how to deal with these upcoming changes and for which products and services it
applies.
A lot of companies struggle with the question: “How should you protect an innovation while
cooperating with third parties?” In general, most of the technological innovations are patented
because they can be well defined in a patent. Service orientated innovations are more difficult to
patent because they cannot be precisely described in such a way that a patent would secure
against imitation. As a result, service orientated innovations are difficult to protect. Therefore,
companies do not use only patents but also other methods to prevent from stealing an idea, such
as secrecy, lead time and human resources. A lot of research has been done on how to deal with
innovations in order to commercialize them and effectively cooperate with partners when the
inventor does not have the resources him/herself. The literature sources lack the specific
question; how protect an invention while working in an alliance against an own alliance partner
and how does this affect the result or performance? Especially, the combination of an alliance
with a startup small and medium enterprise (SME) inventor has not been researched. This thesis
conducted an exploratory research on this subject.
1.2 Research question
As mentioned above, a lot of companies, especially startup SMEs struggle with protecting their
invention while cooperating in an alliance with other parties. Therefore, this research will
emphasis on the decision of controlling and protecting an invention during cooperation with an
alliance partner in a way to successfully commercialize a new invention without losing invention
(knowledge) and suffering financial injury. The focus in this thesis is on startup SMEs (very
small firms, <10 employees), innovators with a technical invention and in general, a group with
limited resources who is often dependent on an alliance partner.
The issue mentioned above led to the following main research question (MRQ):
MRQ: How should you control the protection of an invention (knowledge) in an alliance
against an own alliance partner in order to maximize performance while commercializing
an invention as a startup SME innovator?
In order to answer this research question, four separate sub-research questions (SRQs) have
been formulated:
Page 1
8
Master Thesis
Max Kranendijk
SRQ1: How should you control the protection of an invention?


What is the definition of a patentable invention?
Which protection mechanisms can a startup SME use to control its invention?
SRQ2: How should you proceed managing an invention as a startup SME?


What alliance options are available as a startup SME and which ones are favorable?
What knowledge is required in order to start a successful alliance and which negotiations
are necessary?
SRQ3: How can an invention in an alliance be protected against an own alliance partner?


Which protection mechanisms can a startup SME use to control its invention against an
own alliance partner in an alliance?
How effective are these control mechanisms?
SRQ4: How can performance while commercializing your invention be maximized?

How does the effectiveness depend on contextual factors, such as type of technology,
industry, aim of the alliance, etc.?
1.3 Research framework
The research is built up out of four main parts; literature review, methodology, case study
(empirical findings) and conclusions and recommendations, which is shown in figure 1.
Input from experts / Case
selection
Input from different
sources
Academic
papers
Books
Websites
Agentschap
NL
NOVU
Dialogues
House
Input case study
Inventors
Firms
Experts
Case study
Chapter 6
Methodology
Chapter 5
Literature review
Chapters 2,3,4
Articles
Preliminary
literature findings
Preliminary case
study results
Conclusions and recommendations
Chapter 7
Magazines
Events
Figure 1: Research framework
Firstly, in chapter two, the literature review describes different protection mechanisms used to
protect an invention and which one to use in which situation and for what kind of invention.
Then, in chapter three, different types of alliances are discussed including their (dis)advantages.
Furthermore, chapter four elaborates what methods can be used by (especially) startup SMEs to
Page 2
8
Master Thesis
Max Kranendijk
protect an invention in an alliance partnership. Secondly, in chapter five, the methodology
approach is described of the conducted research. Based on the research questions from this
introduction chapter and the preliminary literature findings, a semi-structured interview
questionnaire is formed. Thirdly, in chapter six, case studies (empirical findings) are conducted
on real life inventors/entrepreneurs who have (un)successfully commercialized an invention
with the use of an alliance. The selection of the cases is based on theoretical literature and
practical experience of experts. The experts can be divided in three categories; governmental
(Agentschap NL1), semi-governmental (NOVU; Dutch Association of Inventors2) and private
(ABN AMRO Dialogues Incubator3) which are experts in the field such as intermediaries for
inventors and patent consultants. A more detailed description of the research design can be
found in the methodology section, which is described in chapter five. Finally, in chapter seven,
the outcomes are discussed and followed by a comparison between the literature review and
case study results.
1.4 Significance
It is widely acknowledged that innovation is fundamental to economic success. Especially, SMEs
are important for economic growth (Kitching and Blackburn, 1998). Often, SMEs lack resources
themselves which forces them to form an alliance with a partner or themselves, are the source of
knowledge for larger incumbents. How can these startup SMEs commercialize inventions
without losing their idea to their alliance partner?
A lot of research has been done on commercialization of an invention with the help of alliances.
These days, collaborative R&D partnerships among asymmetric partners are becoming
increasingly common (Blomqvist et al., 2005). Unfortunately, every invention is different and
deals with a lot of uncertainties resulting in a customized approach instead of a “one size fits all”.
Especially, little research has been done on focusing on Intellectual Property (IP) strategies of
small firms (Arundel, 2001). Even more rare is the focus on protecting an invention against an
own partner in an alliance (Rivera-Santor et al., 2008).
A lot of startup SMEs lack (financial) resources in order to effectively commercialize their
inventions. They are forced to cooperate with third parties in order to overcome lacking
resources and to be able to commercialize the invention. Particularly, the way to protect and
control the invention while working together within the alliance is essential.
In this thesis, the research has both a theoretical and practical contribution. In the literature
review, the theoretical part will be discussed with the focus on the discussion about which
protection mechanism to use within the alliance. The practical contribution is about learning
from experiences from inventors (case study) who had to struggle during commercializing the
invention with an alliance partner. These results can be linked and be helpful for iDexpress, a
joint venture of consultancy firm Dutch, Dutch Association of Inventors (NOVU) and ABN AMRO
Dialogues Incubator, which is a venture linking inventors with investors and other third
partners and is powered by the Province of Utrecht. iDexpress works as an intermediary
between inventors and investors. Learning more about how inventors can become successful
1
NL Agency is the number one contact point for businesses, knowledge institutions and government bodies, focusing on
sustainability, innovation, international business and cooperation. NL Agency falls under the Dutch Ministry of Economic Affairs,
Agriculture and Innovation.
2
NOVU is a Dutch organization of inventors, product developers and researchers and based in Utrecht in the center of the
Netherlands. The organization looks after the interests of its members in the widest possible sense.
3
A R&D department of ABN AMRO Bank which facilitates innovation and entrepreneurship in Financial Services.
Page 3
8
Master Thesis
Max Kranendijk
can help iDexpress finding successful inventors and convince them to commercialize their
invention with the help of an alliance and how to protect their invention within this alliance.
Besides inventors, SMEs and entrepreneurs can be supported to successfully cooperate in an
alliance without losing their invention and control the power difference between the two
parties. The outcomes of this research will also be shared with the members of the NOVU.
1.5 Delimitations
In order to narrow down the research scope, the following delimitations have been made:




The invention is technically orientated and patent eligible.
The invention cannot be commercialized without the set-up of an alliance.
The alliance partnership is between a startup SME and a (dominant) incumbent.
The research is primarily focused on the point of view of the startup SME.
1.6 Definitions
This thesis will often refer to the following three terms, idea, invention and innovation. The
main purpose is to research someone’s idea, invention or innovation and possibilities in
protecting it from their alliance partner while commercializing. The literature review will
portray the differences in the definition between them and which one is leading in this thesis in
detail. In addition, the following terms are widely used in this research.
(startup) SME:4 The category of micro, small and medium-sized enterprises (SMEs) is made up
of enterprises which employ fewer than 250 persons and which have an annual turnover not
exceeding 50 million euro, and/or an annual balance sheet total not exceeding 43 million euro.
Dominant incumbent:5 A business that holds a particular position in an industry at the present
time.
Technical invention:6 The solution needs to pertain to a construction, a device, a method of
production or a process which is set to achieve a certain technical result.
Idea:7 A thought or collection of thoughts that generate in the mind. An idea is usually generated
with intent, but can also be created unintentionally. Ideas often form during brainstorming
sessions or through discussions.
Invention:8 New scientific or technical idea, and the means of its embodiment or
accomplishment. To be patentable, an invention must be novel, have utility, and be non-obvious.
To be called an invention, an idea only needs to be proven as workable. But to be called an
innovation, it must also be replicable at an economical cost, and must satisfy a specific need.
That's why only a few inventions lead to innovations because not all of them are economically
feasible.
4
http://ec.europa.eu/enterprise/policies/sme/facts-figures-analysis/sme-definition/index_en.htm
http://dictionary.cambridge.org/dictionary/business-english/incumbent_1
S. Grzybowski, Prawo wynalazcze, Law on inventions, 1965 p. 21.
7
http://www.businessdictionary.com/definition/idea.html
8
http://www.businessdictionary.com/definition/invention.html
5
6
Page 4
8
Master Thesis
Max Kranendijk
Innovation:9 The process by which an idea or invention is translated into a good or service for
which people will pay, or something that results from this process.
Alliance:10 Coming together of two or more firms to create a unique organizational entity (such
as a joint venture), in which each firm retains its individual identity and internal control.
9
http://www.businessdictionary.com/definition/innovation.html
http://www.businessdictionary.com/definition/alliance.html
10
Page 5
8
Master Thesis
Max Kranendijk
2 Protection mechanisms
This chapter discusses the relevant theory supporting the answer of SRQ1. The focus is on what
is an invention and which protection mechanisms can a startup SME use to protect the
invention. The following main topics are described; innovation versus invention, protection
mechanisms, patent, trademarks, copyrights, secrecy and lead time.
2.1 Innovation versus invention defined
This section describes the differences between innovation and invention. In addition, it explains
which term is applicable in which situation and which one is used in this study.
Previous research argues that the ability of commercializing technological inventions are an
important driver for success (Cohen and Levinthal, 1990; Eisenhardt and Martin, 2000; Zahra
and Nielsen, 2002). In academic papers, the terms innovation and invention are often used for
similar meanings. Therefore, it is important to state an exact definition for both of the terms and
describe which one is used in this research.
According to Roberts (2007), innovation can be best defined as:
The generation of an idea or invention and the conversion of that invention into a
business or other useful application.
The generally accepted (broad) definition of innovation is all the stages from the technical
invention to final commercialization (the technical contribution does not have a dominant
position).
According to Marchetti (1980), invention can be best defined as:
The discoveries that are the bases of the innovations.
Concluding from the above definitions innovation and invention can be explained in short as:
Innovation = Invention + Exploitation (Roberts, 2007).
In this research, the term invention is used because the focus is on startup SME inventors who
invented a technological invention. The trajectory is studied, in what way an inventor can turn
its invention into an innovation with the support of an alliance partner and in what way to
protect its invention against their partner.
The literature lists several different types of innovations, such as radical and incremental
innovations in addition to product and service innovations. This research focusses on technical
(product) innovations in general and does therefore not describe different types of innovation in
detail.
2.2 Introduction in protection mechanisms
It is widely acknowledged that IP is important for innovation and technical growth (Lanjouw
and Schankerman, 2001). In addition, the protection and enforcement of IP rights promote
competition and it is commonly accepted that it is in the nature of intellectual property rights
(IPRs) to convey monopoly power (Carvalho, 2010). Already in the 1960s, Arrow (1962)
Page 6
8
Master Thesis
Max Kranendijk
recognized the importance of appropriability of the results of innovations for the allocation of
resources in innovative activities. In summary, protection of IP has the following objective:
The protection and enforcement of IPR should contribute to the promotion of
technological innovation and to the transfer and dissemination of technology, to the
mutual advantage of producers and users of technological knowledge and in a
manner conducive to social and economic welfare, and to a balance of rights and
obligations (Carvalho, 2010).
Within the literature, there are many different methods of categorizing protection mechanisms.
One of the main reasons is the difference in IP protection law between countries. Many
academics (e.g. Auerbach 2006 and Hertzfeld et al., 2006) divide IPR mechanisms in four
categories; patents, copyrights, trademarks and secrecy (trade secrets). This division is based on
the American law.11 Within the European law, there is a different distinction. Patents are
additionally divided in patents and registered designs.12 Nevertheless, the division of the
American law is used in this thesis because it is in line with other literature papers in which the
research was conducted within the European law, such as in a paper by Leiponen and Byma
(2009). In this study by Leiponen and Byma (2009) research was conducted in European Law
but the division of American Law was used. Which protection mechanism to use depends on
many factors, such as the type of knowledge to be protected, the kind of competition in the
specific industry and the nature and purpose of the partnership (Hertzfeld et al., 2006).
According to Harabi (1995), there are six mechanisms for protecting intellectual assets; patents
to prevent duplication, patents to secure royalty income, secrecy, lead time, moving quickly down
the learning curve and superior sales or service efforts. He contributes “informal mechanisms”,
such as lead time, moving quickly down the learning curve and superior sales or service efforts.
Nevertheless, this thesis will follow the main division; patents, copyrights, trademarks and
secrecy, but will also add lead time, because it is widely used by startup SMEs and becoming
more important as a (informal) protection mechanism for technical companies because of the
decreasing life cycle of (technical) products (Leiponen and Byma, 2009).
In general, there is a main separation made between protection mechanisms, formal methods,
such as utility patents and informal methods, such as lead time and secrecy (eg. Harabi 1995 and
Leiponen and Byma, 2009). Table 1 presents the division.
Table 1: Formal and informal protection mechanisms
Formal protection mechanisms
Informal protection mechanisms
Patents (including design patents)
Secrecy (trade secrets)
Copyrights
Lead time
Trademarks
2.3 Patents
As mentioned in the introduction about protection mechanisms, patents are one of the most
used methods of IP protection for technical inventions. According to the American law, a patent
may be granted on any new and useful process, machine, manufacture, composition of matter,
11
12
http://www.uspto.gov/ip/global/index.jsp
http://www.craske.co.uk/articles/art300809.htm
Page 7
8
Master Thesis
Max Kranendijk
improvement and plant as well as to new, original and ornamental design for an article of
manufacture (Besen and Raskind, 1991). In order to apply for a patent in the Netherlands, one
has to meet certain requirements, which are later in this chapter described.
Based on anecdotal and empirical research, it can be concluded that the importance of patents
has increases since the early 1980s (eg., Arundel, 2001; Thurow, 1997 and Granstrand, 1999).
According to Oxley (1999), patents are the most widely used instrument of protecting IP. Three
main reasons for the importance of patents are: the increasing number of patents, the move
towards an economic importance of proprietary knowledge; a shift from competition on price
towards competition based on technical innovation and the rise of new technologies (Arundel,
2001). In general, patents have been and still are frequently used as an indicator for innovation
(Brouwer and Kleinknecht, 1999).
According to Brouwer and Kleinknecht (1999), there are four factors influencing a firm’s
propensity to start patenting: industrial differences; affecting the speed and costs of imitation vs.
innovation, firm size; because of differences in resources capabilities; formalization of technology
exchange; seek for protecting knowledge when entering a partnership and R&D intensity;
companies with more “new to sector” products are likely to be more innovative.
On the other hand, currently, there is a shift in a way protection mechanisms are used. Recent
years showed a change in the opinion about patenting, such as the upcoming trend of open
innovation (Hanneman et al., 2010). This resulted in the increased speed of product life cycles
and the time of benefiting from an investment in R&D has decreased significantly. For example,
it took ten years to develop the technology for car navigation, but acceptance in the market
happened in a few years. As a result, firms may need more and faster new technologies but may
not have it available and not have the time to develop the technology. Companies, which lack
such new technologies find their technologies in firms which are specialized in developing
particular expertise and provide them sales with their established sales channels. As a result,
firms tend to start more alliances, as portrayed in section 3.3. Moreover, many companies highly
active in research and development have a reputation of patenting everything they created.
Often this generates huge costs and process waste. For instance, Procter & Gamble and Siemens
Aktiengesellschaft only receive royalty fees for 10% of their patents. For the other 90% they pay
annual fees without any financial benefits (Alexy et al., 2009). Consequently, companies with too
much focus on IP, can “miss the boat” in finding collaborators. Due to restrictions and hindering
researchers to talk outside the company, one can isolate him/herself.
The main reason for organizations or people to patent is to reward innovation by temporarily
restricting competition in the production of the resulting goods and services (Aoki and Schiff,
2008). In order to apply for a patent (in the Netherlands) an inventor has to meet three
requirements (Hanneman et al., 2010):
Under the act, a patent can only be granted in respect of an invention (1) where that
invention is deemed to be “novel” (2) and where the invention is likely to lead to
tangible benefit to industry or commerce (3).
If none of the three terms is met, the patent application will be rejected. Conversely, where all
three conditions are fulfilled, a patent will almost certainly be granted. In addition, inventions
need to meet the legislation stated by the Patent Act 1995 and the amendments which effect of
Page 8
8
Master Thesis
Max Kranendijk
5th of June 2008.13 On the 5th of October, the European Patent Convention (EPC) provided a legal
framework for the granting of European patents via a single, harmonized procedure before the
European Patent Office.14 In this way, it was made possible to file a single patent application in
one language.15
A lot of (smaller) firms struggle with the high costs involved with patents (MacDonald, 2004).
Even when the decision is made to apply for a patent, a second decision has to be made
concerning the countries a patent is applicable. Additionally, it is important to consider the
period for which the patent should apply. To give an example, applying for a patent which is
applicable in the Netherlands, Germany, United Kingdom, Belgium and France for a period of ten
years it will approximately cost 7000 euro. For a period of in total twenty years it would cost
roughly 40.000 euro.16 Prices differ a lot per country. Exact differences about applying for a
patent and differences per regime are omitted in this thesis because these details are out of the
scope of this research.
IP litigation is part of the patenting environment. Firms competing in research and development
and production often infringe each other’s patent right in order to return (extra) incomes or to
defend their market. Especially, patents that form the base of a cumulative chain, or
technological trajectory are more likely to go to court to protect patents (Lanjouw and
Schankerman, 2001). In this case, “improvement innovations” are always dependent on the
control of the initial invention which is confirmed by Scotchmer (1991) and Green and
Scotchmer (1995). In addition, reputation building plays an important role in the decision to
litigate. Companies competing in the same market are more likely to prosecute the infringement
of a patented innovation. Therefore, for some types of patents there is a larger chance of
infringement. Nevertheless, the litigation rate of all patents is about 1% (Jaffe, 2000). For the
valuable drugs and health patents it is 25% and around 10% in the technology fields (Lanjouw
and Schankerman, 2001). Not only the small percentage of success is the reason not to litigate
but mainly the high costs and the time to start and finish such a procedure (Lanjouw and
Schankerman, 2001). This thesis will not focus in detail on infringing procedures itself because it
is beyond the scope of this study.
Most of the research on patent protection has been focused on incumbent firms. Only a few have
examined small firms. Arundel (2001) found that small companies find patents to be less
efficient than trade secrets. Only large firms are likely to find patents to be of greater value than
secrecy for product innovations. On the other hand, Gans et al. (2002) and Gans and Stern
(2003) found that patents are very beneficial for science-based or venture capital-financed small
companies. Although research on all types of firms suggests that the nature of innovative activity
along with firm and industry characteristics influence firms’ choices of how to protect IP
(Leiponen and Byma, 2009). In addition, external factors influence the use of patents such as the
position of the company within the market and regulations set down by the government
(Hanneman et al., 2010).
According to Anton and Yao (1994), patents deal with two problems: they are sometimes
unenforceable, and they sometimes reveal underlying knowledge, which might be useful for
13
http://en.octrooicentrum.nl/images/stories/onderwerpen/patent_trademark_or_design/row95_eng_niet_officiele_vertaling.pdf
http://www.epo.org/law-practice/legal-texts/epc.html
15
http://www.epo.org/law-practice/legal-texts/html/epc/2010/e/ar2.html
16
http://www.octrooicentrum.nl/index.php/wrapper.html
14
Page 9
8
Master Thesis
Max Kranendijk
future inventions. For these reasons, some companies rather rely on secrecy than on patent
protection (Lederman, 1989). Section 2.6 portrays secrecy in more detail.
This section showed that there are many claims about when to use patents. In general, it can be
concluded that patents are most favorable in the high-tech industry, due to the complex product
or production details which can be patented. In addition, large firms have better capabilities to
apply for a patent and to defend it when infringing takes place.
2.4 Copyrights
As described in the introduction, copyrights is one of the forms of IP protection mechanism. The
following definition is widely used:17
Original work of authorship is fixed in any tangible medium of expression.
This means that all one needs for a copyright is an original work, involving some minimal degree
of creativity, embodied in some tangible means of expression (DuBoff and King, 2009). For
example, copyright protection extends to creative work such as art, music, literature and
software. Words, symbols and logos are not tangible and therefore protected by trademark laws,
which will be discussed in the following section.
Copyrights provide, after the 1st of January 1978, the author a protection period of their life and
another 70 years if the work was created by an identified human being (DuBoff and King, 2009).
Before the 1st of January 1978, there was a general protection period of 75 years. For exact
determination a precise expiration date needs to be calculated. These rules apply to the
American law. As discussed in the previous section with patents, copyright rules also differ per
country. Again, the details about differences between countries are omitted. The main purpose is
to explain the background of copyrights and present the issues involved with it.
The limits of copyrights are that not every copy of the copyright is an infringement. There are
two types of non-infringing use: fair use and exempted use (DuBoff and King, 2009). According to
the American Copyright Act of 1976 (DuBoff and King, 2009), copies of a protected work “for
purposes such as criticism, comment, news reporting, teaching (including multiple copies for
classroom use), scholarship, or research” can be considered fair use and therefore not an
infringement (DuBoff and King, 2009). In addition, copyrights in a fact work (such as news
stories or a database) does not extend to the names, places and events but is only based on the
authors interpretation (Besen and Raskind, 1991). Another copyright issue is the existence of
multiple valid copyrights to identical versions of a certain book or poem but only as long as each
owner has the evidence to support the validity of the copyrights. Moreover, copyright law has no
system process of application and definition of claims such as patents, therefore, copyright
protection is ultimately defined by litigation. The (American) Copyright Office does not make
any independent reviews of articles and therefore the copyright owner needs to produce
evidence in order to support the validity of the copyright.
The above mentioned reasons make copyrights not suitable for technical inventions and
therefore will not be described further as it is not applicable for IP protection in this research.
17
http://www.copyright.gov/help/faq/faq-general.html
Page 10
8
Master Thesis
Max Kranendijk
2.5 Trademarks
Trademark protection differs from other regimes of IP protection in both its legal basis and its
economic function. There is no constitutional foundation for trademark protection. There is only
a system where marks can be registered. The primary function of trademarks is to provide rules
of orderly marketing by identifying products and their sources. Words, symbols and logos
(design and image) used to identify products or services are protectable under the trademark
laws (DuBoff and King, 2009). Trademarks may be designated by the following symbols:18



™ (for an unregistered trade mark, that is, a mark used to promote or brand goods).
℠ (for an unregistered service mark, that is, a mark used to promote or brand services).
® (for a registered trademark).
By registering a trademark with the American Patent and Trademark Office, the registrant gains
access to the federal courts. However, in some countries unregistered rights may also be
enforced. The rules concerning trademarks differ per country. Unregistered trademarks are
usually only applicable in their geographical region (DuBoff and King, 2009).
Trademarks are used to identify and differentiate products by adding a trade-name, surname,
service mark, descriptive word or a collective mark. Also packaging or product features may be a
reason for a trademark on a certain product.
The value of a trademark depends on its public familiarity and the quality of the product. For
example, Coca Cola is still the most valuable brand, most popular on Facebook and famous in
every single country.1920 A strong (brand) trademark may limit competition by the ability of
competitors to copy a successful brand or certain package.
In order to acquire a trademark, “distinctiveness” is required, so requires a patent novelty and a
copyright requires originality. This means that a brand cannot claim the color orange or a
descriptive term like pasteurized which is applied to milk. A good example of another trademark
is “Kodak” which applies to a photographic film. When a certain trademark is infringed then it is
necessary to prove the actual confusion which occurred to specific customers (DuBoff and King,
2009).
Trademarks are mostly applicable for big firms and strong brands in order to defend their
products and services (DuBoff and King, 2009). This research is focused on startup SMEs with a
technical invention and therefore the use of trademarks is not a very suitable protection
mechanism. As a result, this research will not focus on more details about trademarks.
2.6 Secrecy
Secrecy is mainly found beneficial by firms that invest little in R&D and do not engage in
cooperative relationships (Leiponen and Byma, 2009). Moreover, generally, most companies do
not find it an appropriate strategy when cooperating closely with third parties because it is
difficult to maintain the secrecy while coopering effectively.
Many companies find secrecy slightly more important than patenting (Brouwer and Kleinknecht,
1999) with lead time rated the highest. According to Arundel (2001), secrecy is mainly used by
18
http://www.trademarkorganisation.org/en/definitions
http://www.gfmag.com/tools/global-database/economic-data/10621-best-global-brands-2010.html#axzz1iUrONa1k
20
http://hbr.org/2011/10/shaking-things-up-at-coca-cola/ar/1
19
Page 11
8
Master Thesis
Max Kranendijk
service orientated firms in order to keep the knowledge hidden as long as possible from its
competitors because of the easiness of being copied when seen. For products on the market this
is not evident because of the ability of reverse-engineering by competitors. However, Arundel
(2001) claims that all R&D performing firms in all size classes find secrecy to be a more effective
means of appropriation than patents. Especially, SMEs tend to rely more on secrecy than patents
compared with large firms. The reason for this might be the lack of resources to apply for and
defend the patents. In addition, it might be easier to maintain secrecy in smaller firms than
bigger ones.
Most research is aimed at protecting knowledge from competitors and not from alliance
partners. This study will make the link with protecting knowledge in an alliance agreement. It
can be assumed that secrecy in an alliance is difficult because there is a high chance that it will
hinder the cooperation. On the other hand, if it is a distribution or marketing agreement it would
not necessarily be a disadvantage for the other party if one is not aware of the details of the
invention. According to Takalo (1998), secrecy is in most cases used in addition to other
protection mechanisms to strengthening the IP protection.
2.7 Lead Time
Lead time is an outcome of the technology race, rather than an exogenous condition of it
according to Levin et al. (1987). By continuing to develop your own technology, competitors
cannot keep up and you gain a competitive advantage. Levin et al. (1987) found that in most
industries the advantage of lead time, secrecy and learning advantages are sufficient to make
R&D profitable for firms that undertake it.
According to Brouwer and Kleinknecht (1999), lead time is the most important protection
mechanism for defending IP and earning financial returns. Harabi (1995), confirms this but
indicates that lead time is more favorable for process innovations than product innovations but
generally still is one of the most favorable protection mechanisms.
Studies of the aircraft and semiconductor industries have shown that gaining lead time and
exploiting learning curve advantages are the primary methods of appropriating return (Levin et
al., 1987). This could indicate the more complex the innovation, the more difficult it is to imitate
an invention. As a result, it costs more time to imitate the invention which provides the inventor
more time to develop or redesign its original invention.
Another aspect of lead time is the creation of complementary assets. According to Teece (1988)
and Gans and Stern (2003), lead time can be an advantage by the creation of additional
complementary assets. When being the first in establishing or extending a market, lead time will
be a benefit. For instance, when building new relations with suppliers and distributors, being the
first will increase bargaining power.
In general, Levin et al. (1987) concluded that lead time was to be regarded as substantially more
effective than patents in protecting products. Especially, in industries where patents are
considered as an insufficient protection mechanism, lead time is highly rated in its effectiveness.
2.8 Protection differences per industry
According to Leiponen and Byma (2009), small and innovative Finnish manufacturing and
service firms can use patents effectively when they cooperate with universities and firms which
Page 12
8
Master Thesis
Max Kranendijk
actively invest in R&D. Harabi (1995) claims that product innovations are more likely to be
patented than process innovations. Process innovations are mostly protected with trade secrets.
Additionally, according to Brouwer and Kleinknecht (1999), firms’ propensity to patent is higher
in high-technology industries than in other technologies. This can be related to the newness of
the technology which is more difficult to imitate without harming the patent. According to Gans
et al. (2002), high-technology companies are likely to commercialize their innovations through
licensing. Cohen et al. (2000) come up with another distinction, dividing two types of industry;
discrete and complex product, such as electronics products and machinery and discrete products,
such as chemicals and food. Furthermore, they mention that innovations involving in high-tech
are more complex to commercialize because more knowledge is needed from different firms
(which is often acquired via licensing).
The assumption that manufacturing firms prefer patents over secrecy is doubtable, based on
earlier research shown below in table 2. Only Japan rated patents higher than secrecy.
Table 2: Overview of differences between patents and secrecy
Country
Ratio
References
United States
Secrecy > Patents
Levin et al.1987; Rausch, 1995; Cohen et al., 1998
Europe
Secrecy > Patents
Arundel et al., 1995; Harabi, 1995
Australia
Secrecy > Patents
McLennan, 1995
Japan
Patents > Secrecy
Cohen et al., 1998
According to Tether (2005), firms in services innovate differently from firms in products.
Companies in services focus more on employees’ skills and external partnerships than on formal
R&D. This is confirmed by Leiponen (2005), which he extends with suggesting that knowledgeintensive business service firms have knowledge boundaries which are more porous than those
from manufacturing companies. This results in different protection mechanism which are used
by service firms. Thether and Massini (2007) show that British service firms use formal methods
of appropriation, such as patents, trademarks and copyrights less frequently than manufacturing
firms. In addition, they found that service firms also use less informal methods of appropriation,
such as lead time and secrecy. However, there are differences between companies within the
service sector.
It can be concluded that the type of industry and its market decides which choices are made to
protect IP. Besides, the firm size is an important aspect of which protection mechanism to use.
The following section will focus on protection mechanisms used by startup SMEs.
2.9 Protection within SMEs / startups
Kitching and Blackburn (1998) categorized four options SMEs have to protect their practices; do
nothing, informal protection practices, non-registrable legal rights and registrable IPR. Their
research did not find a clear answer to what option of protection mechanism was preferred.
Nevertheless, “Most owners studied here perceived their IP to be essential to the firms’ survival and
prosperity” (Kitching and Blackburn ,1998). According to Moore (1996), SME owners manage
their IP mostly with informal protection mechanism because of the high costs and amount of
time involved with formal protection mechanisms.
Page 13
8
Master Thesis
Max Kranendijk
Alexy et al. (2009) found startup SMEs with a solid patent have an improved basis for
negotiations with venture capitalist, potential collaborators or large companies interested in
buying the invention. On the other hand, Cassiman and Veugelers (2002) found that for smaller
firms patenting is not the best option because of the resource constraint as mentioned before.
Large companies may use their bargaining power and as a result claim the intellectual assets
from the joint innovation.
Leiponen and Byma (2009) claim that small firms tend to rely on speed to market rather than
patents in order to protect their innovations. This is especially the case for R&D intensive firms
which are engaged in horizontal cooperation or have vertical business dependencies. They found
that only SMEs which closely cooperate with universities tend to find patenting more important.
Gans and Stern (2003) found that patents are mainly beneficial for science-based or venture
capital-financed small firms. This is especially the case when high-technology firms license their
innovations (Gans et al., 2002).
Leiponen and Byma (2009) and Arundel (2001) mention SMEs lack of resources to apply for and
defend patents as the main reason for not choosing to patent. Cohen et al. (2000) confirmed this
finding by especially stating that SMEs lack the resources to legally defend their patents. Besides,
patenting costs relatively a lot of time and money. Furthermore, SMEs often lack bargaining
power to claim ownership of intellectual assets that result from a partnership or joint venture
(Leiponen and Byma, 2009). According to Cassiman and Veugelers (2002), the cooperation with
customers and suppliers even has negative effects on all appropriations mechanisms.
Leiponen and Byma (2009) argue that innovative small firms that have close cooperative
arrangements may be at disadvantage in protecting their innovation returns. In general, SME
tend not to choose for secrecy in partnerships due to the close relationship knowledge might
more easily leak towards its alliance partner. Olander et al. (2009) confirm this claim but find
that copyrights are also not suitable as a protection mechanism for SMEs. Furthermore, Olander
et al. (2009) state that only patents are a suitable protection mechanism for startup SMEs. This
is controversial, Arundel (2001) claims that according to European data a higher percentage of
R&D performing firms in all size classes find secrecy to be a more effective means of
appropriation than patents.
SMEs usually do not have extensive patent portfolios to cross-license, which makes it difficult for
them to operate in complex-product industries. Therefore, SMEs tend to focus on product areas
where they can effectively compete by getting quickly to the market (lead time) by providing
superior marketing and complementary assets (Leiponen and Byma, 2009).
Additionally, SMEs often build up on existing technologies and processes with their inventions
rather than start from scratch. SMEs focus (more) on engineering-based complex-product
industries than on discrete-product industries.
In addition to protected inventions, there are also inventions which are easy to imitate for which
no property rights exist. These startup SMEs face the tradeoff to negotiate about a contingent
contract (with a buyer) prior to revealing the invention or revealing the invention and then
negotiate with the buyer, facing the risk of the invention being imitated (Anton and Yao, 1994).
This section showed that there is a lot of discussion which protection mechanism is most
suitable for startup SMEs which is confirmed by Olander’s et al. (2009) recent study. In addition,
Page 14
8
Master Thesis
Max Kranendijk
research has been done within different countries and regions. Unfortunately, a lot of research
does not make any distinction between the influence of contextual factors which might have an
effect on the preferred protection mechanism. Table 3 portrays an overview of the used
protection mechanisms by startup SMEs.
Table 3: Overview of used protection mechanisms for startup SMEs
Protection mechanism
Patent
Characteristics
Expensive to apply for but offers solid protection. For startup SMEs difficult to defend
due to limited (financial) legal support. Mainly used in high-tech industries,
cooperation with science-based, venture capital-financed firms and universities.
Lead time
Lead time is often used as replacement or extension for patents. In addition, it is often
used to acquire complementary assets by being the first one to enter or extend a new
market.
Secrecy
Secrecy is mostly used in service orientated firms. Furthermore, it is easier to use
secrecy in small firms. Moreover, it is often used as a substitute instead of expensive
patents.
2.10 Conclusion
This chapter described the difference between invention and innovation. It stated that the term
invention is used because there is no commercial purpose yet and the inventors studied are in
the trajectory of turning their invention into an innovation.
According to the discussions within the literature, there are several different ways of dividing
protection mechanisms. In this research for formal protection mechanisms have been chosen;
patents, copyrights and trademarks and informal protection mechanisms; secrecy and lead time
(e.g. Auerbach 2006; Harabi 1995; Hertzfeld et al., 2006; Leiponen and Byma, 2009).
Patents still remain the most used IP protection mechanism, nevertheless, this is changing due to
the rise of open innovation aspects, such as crowdsourcing (Hanneman et al., 2010). Because of
the decrease of product life cycles, companies need to increase their R&D activities and
therefore companies tend to look for other protection mechanisms than patents. Several studies
showed that firms tend to favorite lead time over patents and in the past sometimes secrecy
over patents (e.g. Brouwer and Kleinknecht, 1999; Leiponen and Byma, 2009; Levin et al.,1987),
although, secrecy is not favorable when working closely in a cooperation (Leiponen and Byma,
2009). The literature study also showed that companies tend to cooperate more with each other
which requires more openness to each other. Furthermore, the use of copyrights and
trademarks are rarely suitable for technical invention protection. Secrecy is mostly used by
startup SME inventors and companies use it in addition to patent protection. Lead time is a
result of the fast changing technological developments and companies use this “method” in
order to keep ahead of their competitors and imitators. In addition, it is often used to acquire
complementary assets in an earlier stage (Teece, 1988 and Gans and Stern, 2003).
Patents are mainly used in high-tech industries but secrecy is in most cases rated higher than
patents. Startup SMEs tend to prefer informal protection mechanisms over formal ones (e.g.
Arundel, 2001; Cohen et al., 2000; Gans and Stern, 2003). The main reason is that SMEs lack the
(financial) resources to apply for and defend the patents. Only in the high-tech sector patents are
widely rated as favorable.
Page 15
8
Master Thesis
Max Kranendijk
3 Alliances
Chapter three explains motives for firms to join alliances. In more detail, the focus is on startup
SMEs alliances with (large) incumbents. Hereby, it answers SRQ2 and it forms the basis of
answering SRQ3, which is answered in chapter four.
3.1 Introduction
Today’s knowledge-based global competitive climate changed the way companies do business.
Both large and small firms attempt to leverage external knowledge with the use of
(international) alliances (Blomqvist et al., 2005). In order to better understand why startup
SMEs join these alliances, this section examines the benefits and disadvantages of alliances.
Besides, it describes the risks which can be a part of an alliance and the way startup SMEs can
deal with such situations.
Alliances became more and more popular in the last thirty years. In 1990, alliances have been
more announced since 1981 than in all prior years combined (Anderson, 1990). Currently,
alliances are still very popular. Both in general and in corporate technological entrepreneurship
alliances are used in particular to acquire new knowledge or competences (e.g. Doz, 1988;
Eisenhardt and Schoonhoven, 1996; Baum et al., 2000; Kale et al., 2000; Rothaermel and Deeds,
2006). Alliances are especially relevant for manufacturing firms which support fostering
corporate entrepreneurial activities (Antoncic and Prodan, 2008).
According to the used literature sources, there are many definitions used for strategic alliances.
In this research, the following definition is used:
Strategic alliances are the "relatively enduring interfirm cooperative arrangements,
involving flows and linkages that utilize resources and/or governance structures
from autonomous organization, for the joint accomplishment of individual goals
linked to the corporate mission of each sponsoring firm" (Parkhe, 1991).
There are many variations of alliances. Koza and Lewin (2000) categorize three types: learning
alliances, business alliances and hybrid alliances. Startup SMEs have the intent of starting
business alliances in order to typically seek a position in a geographic or product market or
market segment (Koza and Lewin, 2000). Moreover, there is a broad variety of the types of
strategic alliances, such as joint ventures, equity strategic alliance, non-equity strategic alliance
and global strategic alliances. This research is not aimed at identifying the differences and
approaches of them. Thus, no further details will be explained about these types.
Firms use alliances for a variety of reasons; to gain competitive advantage in the marketplace, to
access or internalize new technologies and know-how beyond firm boundaries, to exploit
economies of scale and scope, or to share risk uncertainty with their partners (Kale et al., 2000).
Another reason is the importance of decreasing innovation cycle times in order to increase “time
to market” (Sorli et al., 2006). Companies try to partner up by forming alliances to acquire
lacking resources and specialized knowledge in order to optimize their innovation process.
Nowadays, this is often done according to the open innovation philosophy (Gassmann and Enkel,
2004). For (technical) startup SMEs, alliances offer an easy access to sell their products via the
stable infrastructure of their alliance partner (Doz, 1988).
Page 16
8
Master Thesis
Max Kranendijk
Another incentive for partnerships is that a firm can benefit from specialized knowledge of their
partners and interactive learning that takes place (Sobrero and Roberts, 2002). For technical
startup SMEs, this is especially useful to gain knowledge about commercialization, such as
marketing.
Startups SMEs lack most of the time several essential resources, such as production facilities,
distribution channels etc. Via the setup of an alliance they can acquire such missing resources.
On the other hand, for example, incumbents in the high-tech industries rely on R&D alliances
with startups to develop new products (Garrette et al., 2009). According to Blomqvist et al.
(2005), smaller companies offer dynamic capabilities, increased organizational flexibility and
innovative products and services to complement the large partner’s R&D or product range. The
following section will focus in more detail on startup SME alliances.
3.2 (startup) SME alliances
This section focusses on the formation of alliances from the point of view of startup SMEs.
Startup SMEs can decide between two approaches. Either they focus on the technology itself and
sell it via license agreements or other agreements or they partner up with a company to build,
market and sell the invention together (Arora et al., 2001). The trade-off between these two
choices is described in detail in this section.
According to Gans and Stern (2003), startup SMEs cope with the challenge of translating
promising technologies into a stream of economic returns for their founders, investors and
employees. In short, they lack the knowledge of commercialization. In many cases, this is the
main reason for a startup SME to start an alliance (confirmed by Anton and Yao, 1994; Baum et
al., 2000; Dickson et al. 2006). Consequently, startup SMEs face, in general, two options when
commercializing an innovation. These options are building an own value chain or join an existing
one via an incumbent. Gans and Stern (2003) claim that it depends on the existence or absence
of the “market for ideas”, which they build upon the two core elements from Teece (1986),
appropriability environment and complementary assets. As a result, startup SME strategies often
present a tradeoff between building their own value chain and joining an existing value chain.
Entering the product market and launching own product offers sometimes an opportunity.
Technology startup SMEs may be able to develop competences more precisely because
incumbents may be ineffective in organizing and marketing new technological opportunities
(Foster, 1986; Henderson and Clark, 1990; Christensen, 1997). After all, this research is focused
on startup alliances which partner up with an incumbent to join their partners’ value chain to
sell their product.
As described above, startup SMEs have several disadvantages, the main ones are the inability to
spread risk over a portfolio of new products, difficulties in entering markets or in market startup
abroad and problems in funding longer-term R&D and innovation activities (Rothwell and
Dodgson, 1991). In general, the environmental conditions and (market) uncertainties are the
main issues. Due to these limited resources startup SMEs are likely to start alliances to
complement their activities, including innovation creation and commercialization (Olander et al.,
2009). The main issue startup SMEs face is to convince other organizations of their capabilities
and to attract potential partners by offering their expertise and innovations to others (Blomqvist
et al., 2008). In the end, startup SMEs have a weaker lobbying and bargaining power (Olander et
al., 2009). Therefore, it is also more difficult for a startup SME to setup an interesting alliance for
them. Thus, startup SMEs should realize that the real danger of partnering with a larger and
Page 17
8
Master Thesis
Max Kranendijk
more powerful partner is that the startup SME can become overly dependent and lose control of
their own business decisions (Street and Cameron, 2007).
Startup SMEs can only make its launching decision once. As switching its commercializing
approach will involve costs, constraints and finally consumer value, which requires a finegrained ex ante analysis of the costs and benefits, which can be acquired with each option
(Bhide, 2000; Gans and Stern, 2003; Veugelers and Cassiman, 1999). This shows the importance
of making a good decision at the beginning to make the invention successful.
When a startup SME chooses to launch its invention via a cooperation strategy as explained
above they identify and execute agreements with other firms, which are in most cases
incumbents (Gans and Stern, 2003). For startup SMEs the negotiation about the “price” is
essential because it determines the value of the invention. Another option for commercializing
an invention for a startup SME is through acquisition by an established firm. However, the
strategy for this approach is beyond the scope of this research.
In general, technical startup SMEs choose to cooperate with (large) incumbents because they
have the financial, management and organizational resources to commercialize (Bhide, 2000;
Gans and Stern, 2003; Veugelers and Cassiman, 1999). Besides, it confers several benefits,
allowing buyers and sellers of technology to soften downstream product market competition, avoid
duplicative investment and engage in complementary technology development (Gans and Stern,
2003).
In addition, Parkhe (1993) mentioned an essential aspect of an alliance. “Alliances fundamentally
possess the shared feature of ongoing mutual interdependence, a condition in which one party is
vulnerable to another whose behavior is not under the control of the first” (Parkhe, 1993). Mostly,
alliances are formed between two larger incumbents in order to fulfill each other’s lacking
resources. Partnerships between startups and incumbents are relatively scarce. Especially the
protection of the smaller party in such a partnership has not been researched a lot. Parkhe
(1993) mentioned an interesting aspect in a case when a startup is in a partnership with an
incumbent that both parties need to be free from power and control from the other one. On
“paper” both parties have the intention of mutual interests but in practice one party often
benefits more than the other one. In this study the need for an alliance is more forced by the
smaller party because of the limitations from the startup SME inventor and therefore has a more
protective approach in order to not lose their knowledge about their invention.
Nevertheless, companies should not be too optimistic about alliances. Both scientific and
anecdotal reports suggest that the failure rate is rather high between all sorts of alliances, the
main reason being one of the two parties which has too optimistic behavior (Dickson et al.,
2006).
3.3 Leakage within alliances
One of the main concerns about alliances is that one party benefits more from the alliance than
the other. “Even if a firm’s products or processes are covered by patents or copyrights, it may face
damaging “leakage” of insufficiently protected innovation or knowhow” (Baughn et al., 1997).
Hamel (1991) and Williamson (1991) mention the same issue by claiming that collaborators risk
opportunistic exploitation by their partners, including leaking proprietary knowledge to
partners or losing control of important assets. Furthermore, according to Baum et al. (2000), it is
Page 18
8
Master Thesis
Max Kranendijk
likely that alliances are fiercest and most damaging within collaborations among potential rivals.
On the other hand, rivals offer tacit knowledge about strategy, technology and operations, which
are essential for startup SMEs in order to be successful (Baum et al., 2000). Therefore,
cooperation with rivals depends from partner to partner due to the contextual factors.
Theories presented so far in this literature study focus in most cases on knowledge, idea and
learning leakage which will support the research on protecting knowledge in an alliance
agreement. In addition, this study also emphasizes the financial returns acquired via an alliance
in terms of negotiated royalties and percentage of the sold products. According to Baughn et al.
(1997), (financial) injury can occur when one party leaks uncontrolled information to its partner
resulting in the “partner” gaining increased bargaining power in the relationship or possibly
help to create a future competitor. Alvarez and Barney (2001) mention two ways in which
startup SMEs can be hurt in an alliance. First, the large firm takes away organizational resources
and starts to underinvest in the relationship. Second, it places unreasonable demands on the
startup SME in such a way it hinders the creation of economic value. The latter mentioned is in
line with the lack of bargaining power by startup SMEs which has been earlier discussed.
After all, companies deal with a dilemma in trying to balance the openness and information
sharing needed to successfully carry out the joint activities for which the alliance was created
(Baughn et al., 1997). In general, firms should be aware of protecting their knowledge and skills,
if not its ability to create unique value for (potential) customers is diminished. Furthermore, the
attractiveness as an alliance partner decreases (Norman, 2002). Thus, the balance between
sharing and protecting knowledge in an alliance is crucial.
A lot of research has been done on knowledge leaking within alliances, but not (a lot of) research
has been done on protection mechanisms within alliances, in order to manage the flow of
knowledge and learning within partnerships (Rivera-Santor et al., 2008). Moreover, the focus of
discussions within the literature is often on alliances between two large firms. This research is
focused on the combination of a startup SME inventor with a large incumbent. The following
chapter will discuss which protection mechanisms are utilized in order to protect a startup
SME’s invention (knowledge) in an alliance.
3.4 Conclusion
This chapter described why companies start an alliance partnership. It defined the benefits that
companies can achieve, such as allowing buyers and sellers of technology to soften downstream
product market competition, avoid duplicative investment and engage in complementary
technology development (Gans and Stern, 2003). This is especially useful for SMEs because they
often lack financial, management and organizational resources to commercialize (Bhide, 2000;
Gans and Stern, 2003; Veugelers and Cassiman, 1999).
One of the biggest disadvantages of partnerships is the leakage of knowledge/idea and learning
(Baughn et al., 1997). Especially, leakage to potential rivals is of most concern (Baum et al.,
2000). Therefore, the main challenges firms face is the balance between knowledge sharing and
protecting (Baughn et al., 1997). So far, most research has been done on partnerships between
incumbents. Research on protection mechanisms in alliances between (startup) SMEs and
incumbents is scarce (Rivera-Santor et al., 2008). However, this research focusses on that
specific aspect and it is discussed in the following chapter.
Page 19
8
Master Thesis
Max Kranendijk
4 Protection in alliances
This chapter is concerned with the discussion about protecting an invention in an alliance
against an own alliance partner. In this manner, it will combine chapter two where methods
were discussed to protect an invention in general and chapter three, which focused on alliances.
This combination will contribute to the answer of SRQ3 and SRQ4.
4.1 Knowledge sharing/protection issues in alliances
This section portrays the discussion how to overcome the dilemma of knowledge sharing versus
protection in order to generate value creation. In sum, most startup SMEs face the knowledge
sharing/protection dilemma. Startup SMEs try to benefit from using protection mechanisms that
allow them to disclose their ideas and innovations safely, without having to worry about losing
their core knowledge assets. On the other hand, they try to get their share of the generated
benefits and innovation outputs (Olander et al., 2009). This often leads to a situation where a
startup SME shares its new invention in detail, in order for a large firm to be able to
manufacture, market, and distribute a startup SME’s new invention. Although, it is usually easy
for a large company to learn about a startup SME’s invention, it is often very difficult to learn or
imitate the large firm’s organizational resources and capabilities (Alvarez and Barney, 2001). In
addition, most of the time, the capabilities of the large company are very complex and the
startup SMEs do not have the resources to capture this knowledge. Another important factor
within alliances is trust. According to Krishnan et al. (2006), trust is the most mentioned
parameter in order to achieve successful alliances. The general view is that trust has a positive
effect on the alliance performance. However, trust can be extremely harmful for the success of
an alliance because one party relies too much on promises made by the other one which are not
executed in the end.
During a collaborative process, different legal agreements build on one another as the
collaboration moves various phases. Most of the time a non-disclosure agreement (NDA) is the
first one in the series (Slowinski et al., 2006). In a NDA is usually information shared about
technical capabilities, application requirements and business models. In most cases the
information in a NDA is very valuable because it describes and explains the invention. With this
information a (potential) partner should just know enough to decide if he wants to cooperate. In
addition, it is important that both parties know what is part of the NDA and what not.
Startup SMEs enjoy a number of benefits over incumbents on their innovation activities, such as
a rapid response to external threats and opportunities, efficient internal communication, and an
interactive management style (Olander et al., 2009). On the other hand, they suffer a number of
disadvantages which are mainly (material and financial) resources. Another big issue is the
inability to spread risk over a portfolio of new products (Olander et al., 2009).
Startup SMEs deal with big challenges deciding which knowledge to share and which knowledge
to protect. According to Olander et al. (2009), innovative firms need to create value through
combining existing knowledge in innovative ways. In order to obtain new knowledge, a company
should also share knowledge itself by acquiring access to new information networks. When
knowledge is shared, it is important that the company’s invention remains protected. Two things
need to be protected; unwanted knowledge flows and the possibility of imitation of the invention.
Table 4 provides an overview of the knowledge sharing versus knowledge protection dilemma
in innovation.
Page 20
8
Master Thesis
Max Kranendijk
Table 4: Overview of knowledge sharing versus knowledge protection dilemma in innovation (Olander et al.,
2009)
Knowledge sharing
Knowledge protection
Value/Innovation
Value capturing/
creation
Profiting from innovation
Needed for creating new
Needed for getting access to
innovative combinations and
markets;
ideas; may cause losing core
may cause losing competitive
knowledge assets to rivals.
edge.
Needed for safe disclosure of
Needed for protecting the
existing knowledge;
investments in innovation,
may prevent adequate
needed for safe disclosure;
knowledge flows.
may cause slower diffusion.
Due to new trends, such as open innovation, the idea is to make use of external ideas in firm’s
businesses and to let ideas generate within the firm to be used by others (Chesbrough, 2006).
This is also the case within alliances. However, even while using open innovation activities,
protection mechanisms are relevant; the methods used and goals of using protection
mechanisms will only be applied in a different way. Protection mechanisms are not only for
preventing others from copying knowledge assets or imitating products but also about making
them more transferable in such a way that transaction costs are lowered and that the
innovations are turned into more controllable assets (Cohen et al., 2000). According to Olander
et al. (2009), it is easier and safer to trade or license when the innovation has certain boundaries
and definable features. This could also be used within alliances. Moreover, Olander et al. (2009)
finds licensing a good option to start an alliance.
On the other hand, Olander et al. (2009) mentions that formal IP protection can hinder the
collaboration because of the bureaucratic procedures and the creation of distrust between
collaborating partners.
Another aspect which startup SMEs should take into account is the risk of the larger partner
eventually trying to take over the startup SME and thus having a different purpose of an alliance
(Street and Cameron, 2007). Nevertheless, larger players that have integrity and are trustworthy
are associated with long-term survival of the startup SME (Meyer et al., 1997). Additionally,
overdependence on any single relationship can weaken overall performance (Miles et al., 1999).
The above discussion shows the importance of having a neutral alliance partnership in order to
maximize performance. It is still difficult for firms to find out beforehand what the real intention
of a potential alliance partner is.
One of the main conclusions is that there is no straight forward answer as to which protection
mechanism is best used to defend IP, both in general as well as in an alliance. This is confirmed
by Olander et al. (2009), who claims the ways to protect ideas and innovations differ depending
on the chosen model of innovating and the economic and legal environment the firm operates in.
Another important factor is that the company should align its protection mechanisms with the
company’s goals.
Page 21
8
Master Thesis
Max Kranendijk
4.2 Protection mechanisms used by startup SMEs in alliances
The previous section described the challenges startup SMEs face while balancing their IP to
decide what to share and what to protect. This section will focus on the protection of an
invention against a (potential) alliance partner.
“Alliance formation is arguably one of the most utilized strategies for resource acquisition and
leveraging by SMEs” (Dickson et al., 2006). Thus, effective protection mechanism within alliances
are very important for SMEs. According to Street and Cameron (2007), startup SMEs should take
into account that the resources used to attract the larger partner are protectable. In other words,
the larger partner should not be able to simply take the resources but is dependent on the
startup SME in order to leverage the resources most effectively. Therefore, Alvarez and Barney
(2001) propose that startup SMEs should develop a process rather than a single product in
order to protect their resources.
Levin et al. (1987) and Hurmelinna-Laukkanen et al. (2008) recognize that startup SMEs should
have inventions which fundamentally involve new ideas such that they are relatively easy to be
protected. According to Simon et al. (2002), startup SMEs need to have incentives to protect
their inventions; a unique invention and keep them from competitors’ reach in order to maintain
survival. Baum et al. (2000) found that variation in the startup composition showed significant
differences in the performance of startup SMEs, supporting that the size and age of a firm affects
the performance of collaboration. Therefore, it is very hard to forecast an optimum for alliance
performance in a certain setting.
Previous chapters already described the difficulties startup SMEs face while using patents.
Patents involve high costs for application and maintaining. In addition, in the USA, patents are
mostly used in biotechnology, pharmaceutics and software (MacDonald, 2004). Patents on
software differ a lot per country’s legislation. Moreover, software is out of the scope of this
study.
Many startup SMEs use contracts as a protection mechanism but this involves a big disadvantage
due to the weak bargaining power compared to larger players (Olander et al., 2009). Startup
SMEs often face take-it or leave-it offers by large firms. The bargaining power from a firm
depends on its capabilities and on the range of alternatives it has available to meets its goals
(Baughn et al., 1997). As discussed in section 3.1, startup SMEs have relatively fewer alternatives
which means startup SMEs have in most cases relatively low bargaining power. Furthermore,
most startup SMEs fear the possibility of the large party capturing their invention. If so, the basis
for an alliance is dissolved (Baughn et al., 1997). Another problem is that contracts in addition to
patents are costly in matters of time because of the acquisition and high cost involved while
maintaining them. Especially, defending IP against accusations and violations by others would
be too costly for startup SMEs (Byma and Leiponen, 2007).
Blomqvist et al. (2005) claims that contracts form a good basis to defend partners know-how.
Nevertheless, investing in a detailed contract cannot guarantee successful collaboration. In
addition, contracting is extra difficult between firms with different backgrounds. Managers
should also be aware that the setup of a contract is part of the relation building between the
companies. Buckley and Chapman (1998) mention the importance of arranging the terms when
an alliance might fail. Blomqvist et al. (2005) adds that the collaboration and trust are already
Page 22
8
Master Thesis
Max Kranendijk
tested during the contracting process. In this period, both parties can test already if the culture,
goals and working methods are in line with the expectations of the final collaboration contact.
Due to the limited resources, startup SMEs are forced to look for cost-effective forms in order to
protect their inventions. These include lead time, tacitness of knowledge and human resource
management (Olander et al., 2009). Unfortunately, these methods refer to “normal” protection
against competitors and not directly to an alliance partner.
Alvarez and Barney (2001) categorized five approaches which startup SMEs can incorporate
while commercializing their invention. Table 5 shows a summary of these five approaches; Going
it alone, Slowing the large firm’s rate of learning, Use detailed and elaborate contracts to define the
alliance relationship, Build a relationship of trust and Bring other resources to the alliance besides
a single technology. Based on the five approaches it can be concluded that “trust”, “contracts” and
“complementary knowledge” are mentioned again. Alvarez and Barney (2001) suggest not to
join an alliance and commercialize yourself (going it alone). However, this approach is out of the
scope of this research. Additionally, they recommend to slow down the rate of learning from the
large firm’s partner, in a way it cannot take over the invention in a short amount of time and is
dependent on the startup SME to gain optimal benefit from the invention.
Table 5: Five approaches of protecting your invention in an alliance as a startup SME (Alvarez and Barney,
2001)
Theories presented in the literature hardly addresses the issue of “How to protect an invention
(knowledge) against an own alliance partner?” Some articles add the protection issues which
startup SMEs face with (potential) alliance partners and the possibility to overcome them, such
as Olander et al. (2009). Furthermore, the five approaches are mentioned by Alvarez and Barney
(2001). Nevertheless, there is no straight forward answer as to which protection mechanisms is
Page 23
8
Master Thesis
Max Kranendijk
most preferable. Moreover, the issue of invention leaking to an own alliance partner is not
explicitly researched. Discussions within the literature mainly emphasizes on “general
knowledge leakage” as described in section 3.2. The main conclusion from this section is that
startup SMEs tend to use more informal protection mechanisms (Kitching and Blackburn, 1998;
Hall et al., 1999; Byma and Leiponen 2007). However, not all startup SMEs follow the same
pattern, it still depends on environmental factors, such as the industry, firm size, market
uncertainty and innovation activity. Nevertheless, the following chapter examines the expected
protection mechanisms used by startup SMEs to protect their invention against their own
alliance partner.
4.3 Expected protection mechanisms used by SMEs in alliances
The previous section explained the protection mechanism used by SMEs in alliances, still there is
no straight forward answer as for which method to choose and in which situation.
It is hard to identify which protection mechanism will be used within alliances against their own
partner. As written in the introduction of this study, there has not been research done on this
aspect. However, it has become more of interest in recent academic papers. For example,
Olander et al. (2009) adds protection against alliances in addition to the normal protection
against competitors. But still there is no answer in what way to protect effectively against your
own partner.
Bonte and Keilbach (2005) claim that if a firm can effectively protect the rents from its product
and process innovations through secrecy, complexity and lead time, it is significantly more likely
that this firm is engaged in cooperative arrangements with its customers and suppliers. Since
startup SMEs lack generally (financial) resources to protect themselves via formal protection
mechanism, it can be expected that startup SMEs will use the same protection mechanisms
within alliances as well as to protect themselves against their own alliance partner. This means
that more informal protection mechanisms, such as lead time, secrecy and trust are used. Table
6 presents an overview of the mentioned protection mechanism by SMEs in alliances.
Consequently, it can be expected that the same methods are used by the inventors in the case
study of this research.
Page 24
8
Master Thesis
Max Kranendijk
Table 6: Expected used protection mechanisms by startup SMEs in an alliance against their alliance partner
Protection mechanism
Explanation
Patent
Especially expected in (high)technical inventions.
Secrecy
Used in a phase before obtaining a patent or contract with an
alliance partner.
Lead time
Improving the current invention in order to be ahead of
(possible) imitators.
Contracts
Negotiation about fixed incomes or other returns before entering
an alliance.
NDA
In a first phase NDAs can be used in order to negotiate with
potential partners.
Trust
Not directly a protection mechanism but it has a strong influence
on the alliance performance and can affect the relationship.
Complementary knowledge
Beside the specifications of the invention, also contribute
knowledge which is essential to make the invention successful.
4.4 Conclusion
This chapter focused on protection mechanisms within alliances. Unfortunately, there has been
little research done on this topic. Most research is in line with parts of the protection mechanism
of invention (knowledge) issue. In addition, there is no clear distinction made between
protecting against competitors or own (alliance) partners.
The main conclusion which can be drawn is that external factors, such as size, industry and type
of innovation are decisive for selecting the type(s) of protection mechanism because each option
interrelates with the others in a way that responses to the characteristics of the networks. In
other words, every invention is surrounded by different variables and the situation itself decides
which method is favorable. However, SMEs tend to be forced to use more informal protection
mechanisms, such as secrecy and lead time, because of their limited (financial) resources.
Page 25
8
Master Thesis
Max Kranendijk
5 Methodology
The literature review forms the basis of this thesis in which the integration is made between
protecting an invention in an alliance. The discussion and findings from the literature sources
are tested with several cases. The methodology used for conducting the case study is described
in this chapter.
5.1 Qualitative research strategy
According to Yin (2011), every research study has a design in order to strengthen the validity of
the study and insure that the data is collected properly and address the research topic being
studied. Furthermore, this study is based on the qualitative research design by Creswell (2003,
2007). This section describes how the research study has been build.
There are two ways to conduct an academic study, those being the qualitative and the
quantitative approach (Yin, 2009). In quantitative approach, questions are formulated with a
closed approach and the information is processed in a structured way resulting in narrowed
possible outcomes. A qualitative approach handles people, objects, and specific situations in
their real-life context in order to gain a deeper understanding of a specific phenomenon.
Qualitative studies are built upon people’s attitudes, preferences and associations concerning
the whole situation and therefore, it is possible to create a better understanding of the social
processes. A qualitative research method has been chosen for this research due to the study’s
complexity because the studied inventors commercialized their inventions in different situations
in such a way that research questions needed to be adapted to each of their specific situation.
The interviewees varied too much from each other to conduct a quantitative approach.
Therefore, a flexible approach is required in order to ask relevant questions for each of the
studied cases.
Yin (2011) mentions two approaches for conducting a qualitative research. Starting with
“questions first”, in order to exactly define what to ask and receive from the conducted study or
“fieldwork first” option, where the researcher first acquires data and later defines the questions
about what exactly will be researched. This study is a combination of above mentioned
approaches. First, research question were formulated in order to select data and suitable people
to interview. After conducting the interviews the research question were adapted to the output
of the data. This approach is described by Maxwell (1996) as a qualitative research design that
characterizes the process as an “interactive approach”, whereby a qualitative study’s purpose,
research questions, conceptual context, methods, and concern for validity all continually
interact. Concluding, it demands an “interactive approach” (Maxwell 1996) with open questions
in order to better understand the situation. In addition, the research is explorative as not a lot of
research has been done on this topic.
5.2 Case study
In the previous section an explanation was given of why a qualitative approach has been chosen.
In order to conduct the empirical case study, according to Yin (2011), the following steps were
made to conduct this study:


Defining something to investigate;
Collecting relevant data;
Page 26
8
Master Thesis


Max Kranendijk
Analyzing and interpreting the results;
Drawing conclusions based on the empirical findings.
According to Yin (2009), a case study is defined as the following:
“empirical inquiry that investigates a contemporary phenomenon within its real-life
context; when the boundaries between phenomenon and context are not clearly
evident; and in which multiple sources of evidence are used.”
The purpose of a case study is to develop detailed intensive knowledge about a single case or a
small number of related cases (Yin, 2009). A case study research is appropriate when the
questions addressed are “why” and “how” individuals or organizations have acted in a certain
way to establish a better understanding of the situation studied (Yin, 2009). In addition, he
argues that case studies are more suitable for situations where the researcher has little control
over the studied phenomenon. There are two types of case studies; single or multiple (collective)
case studies. According to Stake (1995), there is a third, intrinsic case study, in which the focus is
on the case itself (e.g. evaluating a program or studying a student with difficulties). This research
is conducted as a multiple case study because of the possibility of a “replication logic” in the
conducted cases (Yin, 2009). Hereby the researcher tries to find contrasting results for
predictable reasons. Another reason for the multiple case study approach is that the study builds
on a stronger analytical substance (Yin, 2009). With a single case, a researcher tries to study a
unique phenomenon or one, which is unique in its sort, which is not the case in this research.
The case study contains multiple cases from different product inventions. In this way, there can
be made a comparison between similar factors and also differences and similarities are
questioned. The findings are structured in a table format in order to find patterns.
Triangulation is applied in order to get more appropriate results. Outcomes from the several
cases are reviewed with the help of “pattern matching” in order to find similarities of the cases
and learn from certain phenomena.
5.3 Role of the researcher
According to Creswell (2003), it is important to share the background of the researcher and the
study with the participants in order to receive better quality of data. In addition, it is important
to keep strategic, ethical, and personal issues in mind to identify bias and personal values from
the interviewees.
The researcher conducting the case study has basic experience with inventors seeking for
partnership possibilities in order to successfully commercialize their invention. Besides, the
researcher has experience with the parties who are seeking inventors for investment or
partnership opportunities giving the advantage of having a point of view from both sides.
Additionally, this point of view will support conducting the interviews and asking additional
questions in order to successfully perform this research. Moreover, it is essential for the
researcher to have a neutral position while conducting the interviews. Most of the inventors
spend many years of their lives struggling with their invention and trying to commercialize this.
Especially, in the case of failures during the partnership or commercializing, the researcher
should be aware of asking for the exact reason and not being led by the interviewee’s emotions.
Page 27
8
Master Thesis
Max Kranendijk
5.4 Selection of the cases
The cases are selected with the assistance of experts from the Dutch Association of Inventors
(NOVU). Based on their expertise of commercializing inventions, a selection of interesting
inventors was made. Both successful cases and failures were selected in order to learn from
different experiences. Moreover, some of the inventors had more than one invention and were
asked about their learning experiences from different cases. A list of six cases was selected
which would contain the input for the empirical research. All the cases were inventors who had
invented one or more technical inventions and experienced working together with a partner to
commercialize their invention.
According to Yin (2009) and Creswell (2003), a good case study includes as many sources as
possible because it allows the researcher to concentrate on a broader range of historical,
attitudinal and behavioral issues. Furthermore, Creswell (2003) emphasizes the importance of
indicating the type(s) of data which will be collected. This allows the researcher to neutralize the
data and to process the data after being collected. In addition to the in-depth interviews, other
information was gathered via several sources. Table 7 presents the data input of the conducted
case study.
Table 7: Overview of data input for the conducted study
Data collection method
Data coverage
Interviewing
Ten interviews with experts in the field of inventors seeking to
commercialize their invention.
In-depth interviewing
Six inventors who successfully commercialized an invention
interviewed at their homes or work.
Telephone interview
One telephone interview with a (larger) party which
cooperates with inventors in order to commercialize their
invention.
Participating
Two event about inventing and defending IP; iDexpress mini
symposium and Agentschap NL symposium.
Documents and presentations
Research documents and presentations based on IP protection
while commercializing (e.g. KIVI NIRIA and Agentschap NL).
The use of different sources makes sure triangulation takes place and increases the construct
validity (Yin, 2009).
5.5 Data collection procedures
This part explains the method of collecting data. In this research, the following definition of data
is used:
Collection of organized information, usually the result of experience, observation,
experiment. This may consist of numbers, words, or images, particularly as
measurements or observations of a set of variables (Yin, 2011).
There are two types of data within the academic literature. Primary data are so-called first hand
data which the researcher collects him/herself, while secondary data are data that have been
collected and processed by other researchers for different purposes (Yin, 2011).
Page 28
8
Master Thesis
Max Kranendijk
The main source for “collecting relevant data” is the source of primary data. In this research, this
is acquired from the in-depth interviews with inventors, experts and other experienced people
in the field. Besides, additional data, secondary data is acquired via short interviews with
experts and documents about the researched topic.
The interviews were created, held and processed according to the seven stages by Kvale (1996):
1. Thematizing; formulate the purpose of an investigation and describe the concept of the
investigated topic.
2. Designing; plan the design of the study.
3. Interviewing; conduct the interviews.
4. Transcribing; prepare the interviews for analysis.
5. Analyzing; decide which methods of analysis are appropriate.
6. Verifying; determine the generalization, reliability and validity of the interview findings.
7. Reporting; communicate the findings and take the scientific criteria in mind.
The semi-structured interview questionnaire (Appendix A) for the in-depth interviews is based
on the literature review and input from experts in the field who closely work or worked together
with inventors and/or commercialization parties. As indicated in section 1.4, the questionnaire
was formed and tested with the input and feedback from three parties (Agentschap NL, NOVU
and ABN AMRO Dialogues Incubator). The interviews were held in person at the inventors’
homes, lasted between one and two hours and were digitally recorded. Due to the fact that all
interviewees are native Dutch speakers, the interviews were held in Dutch. In this manner a
neutral and “safe situation” was created for the interviewees, which is important to gain the
qualitative data from an interview (Kvale, 1996). All interviews started with an introduction
about the researcher and followed by working through the questionnaire. At the end of each
interview, there was room for discussing relevant topics in relation to the questionnaire which
had not been shared. Finally, all the interviewees received a transcript of the interview to add or
change misinterpretations of the interview. In the thesis, all interviewees are anonymized
because of the “sensitive information” which is in some cases shared. The transcripts of the
interviews are available in Dutch but are only available for the (co)readers when requested.
5.6 The quality of the study
One of the key aspects of research is the validity of the study and its findings. “A valid study is one
that has properly collected and interpreted its data, so that the conclusions accurately reflect and
represent the real world that was studied” (Yin, 2011). Besides, the quality of a study is based on
its reliability and the generalization. As this is a qualitative approach, validity and reliability
need to be taken into account when collecting the data (Yin, 2009). The reliability refers to how
consistent the results are and the validity means whether an interview study investigates what
was intended to study (Kvale, 1996). To ensure the quality of this qualitative case study, the
design was tested according to the checklist by Creswell (2007), which can be found in appendix
B.
The internal validity is realized via pattern matching and explanation building while the external
validity is realized via replication logic by the use of multiple cases (Yin, 2009). The construct
validity is ensured since all the interviewees were selected and approved by experts within the
field. In Addition, multiple sources were used to compare and draw the conclusions.
Page 29
8
Master Thesis
Max Kranendijk
The reliability was tested by sending all the interviewees a transcript of the results in order to
give feedback and make sure that there were no misinterpretations of their self-reported
behaviors and view. A semi-structured interview approach was chosen because of the
differences of technical inventions leaving the interviewees to provide their own thoughts about
protecting their invention in an alliance. Besides, the interviewees used different protection
mechanisms and worked with different partners which required a more flexible interview
approach.
“Qualitative case study is characterized by the main researcher spending substantial time, on site,
personally in contact with activities and operations of the case, reflecting, revising meanings of
what is going on” (Kvale, 1996). In this manner, the researcher can generalize the findings about
the cases. The possibility of “generalizability” is based on a trade of the number of selected cases
(Creswell, 2007). A larger number of cases results in a bigger picture of the situation(s), but
usually decreases the depth in any single case. The researcher will decide when enough cases
are conducted in order to generalize its data. In order to overcome the selection of sample size
and depth of the interviews, it is important to set the “boundaries” of the cases (Creswell, 2007).
According to Schofield (1990), there are three types of generalization; what is, what may be and
what could be. These types classify the certainty of the outcomes from the case and its
generalization.
5.7 Data analysis procedures
The results from the case studies were compared with the literature with the use of pattern
matching to identify (new) factors which were important and were decisive to choose a certain
protection mechanism. First, the detailed interview reports were reviewed in order to highlight
and identify similarities and differences between the interviewees. Second, the outcomes from
the categorized interviews were compared with the literature review in order to draw
conclusions. Key quotes from the interviewers were used to increase the validity and reliability
of this research (Yin, 2009).
Page 30
8
Master Thesis
Max Kranendijk
6 Empirical results
This chapter presents the results from the interviews with inventors and other data received
from meetings with experts and seminars. Furthermore, it includes some practical information
from non-academic papers and websites which address the latest trends concerning protection
mechanisms.
6.1 Interviews with technical startup inventors
This section summarizes the information gathered from the interviews with startup inventors.
In order to keep the interviews anonymous, details about the invention are not exposed.
Furthermore, the real names of the interviewees are replaced by randomly chosen names.
6.1.1 Corporate Inventor (Rutger Beekhuizen)
Rutger Beekhuizen has a technical background and studied mechanical engineering. His
invention skills and passion were created after the invention of a game for children. Due to a
partnership, the game was commercialized. This was at the same time his first experience with
partnership negotiations and commercialization activities. One of the key learnings was in what
way to successfully negotiate with partners about the share of earnings. He advises colleague
inventors to always ask for guidance during the commercializing trajectory when you are “new
to the game”.
After this success, he was asked to join several brainstorm sessions for several companies. In
one of these brainstorm sessions he took a “no cure no pay” offer for a certain problem. During
this “alliance agreement”, he received the resources in order to build a prototype for solving the
problem. His partner paid for the patent cost and resources for building the prototype.
Beekhuizen received his earnings via royalties. In this manner, he decreased the risk in case the
invention would fail.
According to Beekhuizen, he succeeded in the way the partnership was executed as he is aware
of some other inventor colleagues who suffered from losing their invention against their partner
or competitor. The basis for the successful cooperation was trust. Beekhuizen had already
worked together for a couple of times with his (potential) partner and from both sides this had
been a pleasant partnership. In addition to trust, Beekhuizen made sure that all his knowledge
shared about his invention was controlled with the use of NDAs. Additionally, he made sure that
he never revealed 100% of his knowledge, which resulted in keeping the power over the
invention. Moreover, Beekhuizen claims that it is important to constantly update your invention,
in this way, the inventor will be essential for his partner and the initial invention stays ahead of
(potential) imitators. Most favorable in Beekhuizens case, the modification led to an application
of a new (improved) patent. Due to the proved success of the invention, he could negotiate about
better financial rewards. An issue in almost every collaboration as a (startup) inventor is the
difficulty to forecast the (possible) success of a certain invention and to find a suitable alliance
partner.
In his case, the main protection mechanisms used against his partner were mutual trust, the use
of NDAs, partial disclosure and lead time. Furthermore, his partner paid for the patent for
protection against imitators.
Page 31
8
Master Thesis
Max Kranendijk
In general, Beekhuizen was satisfied with the cooperation. However, he would negotiate about a
fixed salary during his working hours on the invention. Now, he was depending on the sale
numbers of the invention. In the end, it took two to three years to actually sell the first products,
till that time Beekhuizen did not receive any earnings. With the help of a contract with, for
instance, a minimum amount of sold products or a maximum period of developing time before
launching the product you can put more pressure on your partner to commercialize the
invention. Finally, an additional recommendation from Beekhuizen was to always make a
physical prototype of an invention in order to convince (potential) partners. Table 8 portrays a
summary of the main findings about the Corporate Inventor case.
Table 8: Summary of the main findings of the Corporate Inventor case
Learning points

Never share 100% of your
Protection mechanism used
approach
against partner
Negotiate about a fixed salary when

NDA.
invention with your partner in
working on an invention in an

Trust.
order to keep power over your
alliance.

Partial disclosure.
Negotiate about a fixed income,

Lead time (also for
invention.

Recommendations for future


Ask advice from people with
when sale numbers do not meet
protection against
experience before taking
expectations in order to put
imitation).
commercial decisions about your
pressure on the partner to
invention.
commercialize the invention.
Quotes:
“Improving your invention and getting a new patent for the improvements is the best way of protection your invention
against imitation.”
“You should always have a physical prototype to show to your (potential) partners in order to convince them about the
benefits of your invention.”
“Potential partners for commercialization are difficult to convince because of the ‘not invented here’ syndrome.”
Case conclusion
The case showed a successful collaboration between an inventor and a (larger) partner.
Beekhuizen relied mostly on trust within the collaboration which was generated by earlier
positive experience. In addition, he used an NDA which was more a standard formality than an
actual protection mechanism. In addition, he realized the importance of not fully disclosing the
invention to his alliance partner. In this manner, he remained a key player in (further)
development of the invention. This gave him stronger negotiation power. Moreover,
continuously developing his invention (lead time) provided him a step ahead of competitors and
imitators strengthened his position in the alliance partnership.
6.1.2
Long-Life Inventor (Kees Woensel)
Kees Woensel has already been inventing products for 30 years. He started with repairing
technical and electronic devices and vehicles. Later, he started his own company in this field. His
first experience with a partnership failed due to a misunderstanding in mutual goals. A subsidy
Page 32
8
Master Thesis
Max Kranendijk
got involved and the focus was put on research and paper work instead of the actual invention.
Therefore, Woensel cancelled that partnership.
A couple of years later, Woensel introduced another invention which he designed, built and
patented himself (with help of a family member). In order to commercialize his invention, he
was in need of a company with a distribution channel. Once a partner with an international
distribution channel was found, the cooperation flourished. There were only a few initial issues
with the inventory and therefore he could not sell products for three months. During his
commercialization period, there was no threat of losing his invention to competitors or his
partner. His invention was patented and contains all three claims (see section 2.3 for more
information) and in case of infringing his patent, he was willing to prosecute.
During the development period of his invention, he explained his invention several times to
trusted experts to verify his product and the commercial potential. Before attending fairs and
publication, he applied for a patent. After the publicity, several parties contacted Woensel to
provide consults and partnerships in order to try to benefit from his potential invention. In that
period, it was important to identify which parties were seeking for mutual benefits instead of
exploiting somebody, as Woensel confirms
According to Woensel, the alliance partnership was successful. He had a good relationship with
his partner. Nevertheless, he experienced the difference of urgency and focus of commercializing
his invention. In his opinion, the partner should be capable of selling more products according to
the amount of leads generated from fairs and publication. Therefore, he started to support the
marketing activities of his partner. Table 9 presents a summary of the main findings about the
Long-Life Inventor case.
Table 9: Summary of the main findings of the Long-Life Inventor case
Learning points

Marketing of the product in such a
Recommendations for future
Protection mechanism used
approach
against partner

way that customers understand
the benefits of the invention.

Put more effort in the marketing

NDA.
of the product.

Trust.
Express the benefits of the

Patent.
invention in such a way that
potential buyers and users
understand the invention.
Quotes:
“You need to be able to sell (and preferable build) an invention yourself to test the price and willingness from customers
to buy it. Due to sales of your invention, potential buyers and partners will contact you automatically and you do not need
to convince others about the success of your invention.”
“The focus should lie on the invention and the end consumer, all things in between, such as partners, are not relevant.
Certainly, you should be aware of input from others but it should not lead you in a certain direction.”
“Apply as late as possible for a patent because the timer starts when your application is pending.”
Page 33
8
Master Thesis
Max Kranendijk
Case conclusion
This case presented a situation in which an inventor successfully developed a product by
himself. With the help of an alliance partner he gained access to the market. Before contacting
different parties for cooperation possibilities, a patent was arranged. The patent was applied as
main protection mechanism against partners and other imitators or competitors. During the
development phase, NDAs and trust were used to gain feedback from a trusted group of friends
and partners. According to Woensel, his approach and chosen protection mechanisms were
reliable and successful. In order to convince potential partners of the success of the invention, he
addresses the importance of a tangible prototype of the invention. Moreover, he recommends to
start only applying for a patent when you are ready to contact (potential) alliance partners or
customers, otherwise you waste time and money when your invention does not need it.
6.1.3
Lazy Partner (Peter Jong)
Peter Jong has been working at the same company since he left school. Within the building
industry, he invented a solution for making his work easier.
During a trial and error process, he managed to improve his invention and made it market ready
with the help of a friend. The first products were sold by himself due to publicity gained at a fair.
After that, he was approached by a large player which had a distribution channel throughout
Europe. The partner took over the production, marketing and distribution. Jong was paid via
royalties.
During the development and market launch, Jong did not suffer from any protection problems.
He applied for a patent himself with guidance from a third party. The patent provided him
protection from imitation by other companies or (potential) partners.
Jong had no fear of being copied by his alliance partner or any other company. However, he
would select a different partner next time and demand higher requirements from the
cooperation because he felt his partner neglected the willingness to actually sell and promote his
invention. In addition, he faced difficult negotiations in order to earn revenues and
commercialize the invention via his partners’ network. Moreover, he experienced a big
difference in bargaining power between his large partner and himself. In the future, he would
make a deal with stronger terms in order to prevent a low number of sales caused by the low
interest from the partner to actual sell his invention. In the end, Jong was not satisfied with the
cooperation because of the low number of sales gained via his partner. In his opinion, the
partner did not do enough (effective) marketing to sell his product. Table 10 portrays a
summary of the main findings about the Lazy Partner case.
Page 34
8
Master Thesis
Max Kranendijk
Table 10: Summary of the main findings of the Lazy Partner case
Learning points

Knowledge of the whole
Protection mechanism used
approach
against partner
Start an alliance with strong

Trust.
production is essential in order to
terms in order to put pressure on

Patent.
successfully commercialize your
the partner to sell his invention.
invention.

Recommendations for future


Keep marketing and production
Do not apply for a patent too early
in own control because the
otherwise the patent needs to be
inventor has more enthusiasm
extended (again) without having it
and incentives to sell his
on the market.
invention.
Quote:
“If I look back I would have been more selective when choosing my alliance partner.”
Case conclusion
The Lazy Partner case described a situation where an inventor developed the invention himself
and used an alliance partner to gain access to the market as in the Long-Life Inventor case.
Similarly as in the previous case, Jong used a patent to protect his invention. Due to a fair, he
gained publicity which eventually led to a cooperation partner to sell his invention via his
distribution channels. According to Jong, the sales figures were very disappointing, he reflects
that it would have been better to sell the products himself. In his case he was not afraid of being
imitated by his partner or other parties. The patent was well defined and the market was not
interesting enough to expect other parties to compete with him. Concluding, Jong was satisfied
with his protection mechanism, although if he had the possibility, he would have applied the
patent in a later stage because he paid for a period when the invention was not on the market
yet.
6.1.4
Niche Market Inventor (Evert Goud)
Evert Goud started working in the building industry at a young age and later started his own
company in this field. Unfortunately, he spent a long time in a revalidation center where he
started solving problems for his fellow patients. He invented several technical solutions within
the medical industry.
Gouds first experience with commercializing an invention was with a technical device which was
applicable for a leisure activity. Eventually , this invention failed to enter the market because of
technical issues and a foreseen problem of convincing the customer to purchase his product.
Nevertheless, he experienced the procedures of commercializing an invention already at that
time.
Goud worked mainly together with investors for commercializing his inventions. He never
feared that his invention would be copied by his own cooperation partners or potential
customers. According to Goud, the main reason for this was that his inventions were applicable
in a niche market and it is quite complicated to know how to efficiently market a product in this
field. During his inventions, he used a standard procedure. First, he showed and interacted with
a select group of trusted people in order to test his invention and to receive feedback for
Page 35
8
Master Thesis
Max Kranendijk
improvements. Second, he organized group interventions with the potential end consumer to
see what their reactions were. In all these phases, he used NDAs which could later be used to
prove that he was the first one with the invention. He applied for patents before going public via
fairs and/or media. By using this approach, Goud did not pay for his patents until the products
were on the market. The above mentioned procedure was a result of experience he has with
commercializing inventions.
Goud worked together with several different partners. He experienced that knowledge is more
important than financial resources. For instance, if the money is available but the invention is
not working properly, the invention is very likely to fail in the end. Furthermore, he confirmed
the importance of a working prototype. When people can observe a new product and see how it
functions, the product will eventually sell itself. Additionally, the best way to persuade investors
or potential partners of the success of an invention is to show videotapes of the positive
feedback from the end consumers while using your new product for which the invention is
applicable. Furthermore, it is important to distinguish the end users, the actual person who
purchases the product or service and the specific regulations which are involved in the
invention. In general, Goud did not fear being copied by partners because of the niche market in
which he was active in. Besides, the trusted “test panel” in combination with NDAs worked fine
for him. After going public, he fully relied on his patent. Table 11 shows a summary of the main
findings about the Niche Market Inventor case.
Table 11: Summary of the main findings of the Niche Market Inventor case
Learning points


Selection of your partner is
Recommendations for future
Protection mechanism used
approach
against partner
Receive feedback of the invention

Trust.
essential.
from (potential) users without

NDA.
Strong negotiations in an alliance
spending too much on prototypes.

Patent.
are important.


Try to figure out what the
potential is of your invention as
early as possible.
Quotes:
“A partner with knowledge is more important than a partner with money, a lot of money without suitable knowledge will
fail anyway.”
“Videotaping the (positive) experience of the end consumers will easier convince potential partners/buyers of the success
of your invention.”
“Prototyping is essential in order to convince the partners/buyers of your invention.”
Case conclusion
The Niche Market Inventor case portrays a fine example of a customized commercializing
trajectory developed by the inventor himself due to an own trial and error process. It is
important to notice that the specific approach might only be suitable for the medical industry.
Goud made primarily use of NDAs as protection mechanism in order to receive feedback from
people out of the field but first he always tested his inventions with a trusted group of people. In
this way, he was able to receive feedback from the end consumers to test the potential from his
Page 36
8
Master Thesis
Max Kranendijk
invention. He relied on his patent before actually launching the product and contacting partners
for distributing the invention. Goud was not afraid that his invention would be copied. First,
there were not a lot companies which understood the niche market. Second, it was too difficult
to exactly copy his invention due to his patent.
6.1.5
Intrapreneur Becomes Entrepreneur (Fons Derks)
Derks has a technical background in mechanical and electrical engineering. He had several
different jobs within the same company and was responsible for maintenance, quality control
and product development.
He developed several solutions for technical machines which were all used internally at the
company. Eventually, one invention was applicable for more purposes than within his
employer’s firm. This resulted in a fight over the ownership of invention. The solution was to
start a new venture, partly owned by Derks and two colleagues while the rest of the shares were
owned by Derks’ partner (employer). Derks acknowledges the convenience of working with
partners on an invention. “Together you can support each other when someone has motivation
problems”.
The new venture was a perfect solution for Derks because his partner paid for the patent and
development costs in return for discounts on the products developed by the new private
company.
According to Derks, his invention could never have been successful without his partner
(employer) because of the connections within the market. An investor would not have been
enough, since his invention needed certification and allowance from third parties in order to be
able to enter the market. His employer had a strong and reliable name within the market which
supported to gain trust and acceptance to overcome these issues. In addition, it was essential
that he has been working for a long time in the same company and knew the bureaucratic issues
he had to overcome.
Derks feared leaking of his new invention to his company (and other parties). He experienced
before that one of his inventions leaked towards a potential partner (buyer) because of sharing
too many details during the sales pitch about the solution created by his invention, resulting in
an imitation by his partner. Therefore, he kept his invention secret and arranged an agreement
(new venture) about the development and commercialization beforehand with the management
of his employer. In this manner, he “earned” profits and acceptance of his invention before
revealing the actual invention. Only a few colleagues knew about his invention but he was
convinced he could trust them because of the long mutual relationship.
In the end, Derks admits that this was a unique situation and could have only taken place
because of the long and satisfying relationship between him and his employer. After the support
from the management, he applied for a patent which was arranged with help from third parties.
Concluding, Derks was and still is satisfied with the cooperation. While having his employer as a
partner, he did not have to take the investment risks. Furthermore, he could have relied on the
strong connections from his employer. Table 12 presents a summary of the main findings about
the Intrapreneur Becomes Entrepreneur case.
Page 37
8
Master Thesis
Max Kranendijk
Table 12: Summary of the main findings of the Intrapreneur Becomes Entrepreneur case
Learning points

Work on an invention with one or
Recommendations for future
Protection mechanism used
approach
against partner
Ask advice from specialized

Trust.
two more colleagues. This helps to
parties before applying for a

Secrecy.
overcome difficult periods and
patent and/or starting to

NDA.
prevents the occurrence of “tunnel
negotiate with alliance partners.

New venture.

vision’’.

Do not share too many details
about your invention towards
partners and distributors to
prevent the risk of copying.
Quotes:
“Do not share your invention in detail with potential partners or other people because you never know exactly what you
have shared afterward.”
“Never share what your invention actually solves or mention the cause of the problem as this can help a potential partner
to come up with a solution himself. Instead, focus on the core benefits which the invention creates.”
“As an inventor it is preferable to cooperate with a partner who is eager to generate market share and who is not able to
duplicate your invention and does not have interest in doing so.”
Case conclusion
The Intrapreneur Becomes Entrepreneur case described a situation in which an inventor
developed a new product which was not only applicable for the employer’s business purposes
but also interesting for other companies and/or markets. Therefore, Derks wanted to obtain the
ownership of the invention himself. Due to the long relationship, almost 40 years, he could gain
an agreement to start a new venture partly owned by himself, two colleagues and his employer.
This way, he was able to keep the ownership of the invention because he had shares in the
patent. Firstly, he used trust to discuss the invention with his close colleagues. Secondly, he kept
his invention secret for the top management of his company before closing a deal. Finally, he
managed to start a new venture with the help of his employer. The meetings to create the new
venture were all held with people who signed NDAs. During the development of his invention, he
was careful with sharing his progress and knowledge because he lost an invention once before.
In that case, he shared too much of the invention details which led in an imitation by his
potential partner.
6.1.6
Continuous Inventor (Jorg Leers)
Jorg Leers has a technical background with a focus on logistics. His first invention was applicable
for the packaging industry during his previous employment at a company which could benefit
from it. Discussions about the ownership of the invention resulted in a breakup between Leers
and his employer.
Leers commercialized his invention in the cooperation with an investor group which led to a
small company. This company became successful and gradually gained market share and
acquired several big players. Unfortunately, the company went bankrupt because of debts from
Page 38
8
Master Thesis
Max Kranendijk
the investors. The success of the invention encouraged several big clients, who wanted to take
over the bankrupt company. After a while, Leers found a partner to cooperate with and
continued his company. At the same time, he was approached by a large player in the industry to
sell his invention. After refusing this offer, he was confronted with the power difference and
intimidation of the company. In the end, unfortunately, he experienced his invention being
copied and displayed on several international fairs which even resulted in winning an
international price by the imitator. Leers did not have the (financial) resources and time to
defend his patent. In addition, there were no parties which could support him in this case and he
accepted his loss. Eventually, he could sell his original invention to a smaller party which
compensated his financial investments.
Currently, he is working on a new invention, which he is still improving. There are several
parties interested but all of them do not want to cooperate because of the unstable financial
situation at the moment.
During his invention period and commercialization activities, he learned some essential lessons.
An (technical) inventor can choose two different approaches of commercialization. First, with
minimal investment costs, one develops the invention himself and tries to sell it himself as well
or via a partnership. Second, if the investments costs are too high or minimal risks want to be
taken, an investor tries to find a partner in an early stage to share development costs and/or find
expertise. This decision needs to be made in an early stage. Furthermore, to avoid risks, one
could choose to license/sell the invention to minimize risks.
According to Leers, the best way to prevent stealing and copying an invention is to keep on
developing and optimizing it to the current market demands. This leads to an improved
bargaining power to potential partners and/or a current partner. Hereby, an imitated version of
an invention will always be behind the latest invention (re)developed by the original inventor
(lead time). In addition, it is useful to license the invention to a partner and split it in smaller
parts, hence, the partner pays license fees per part of the region where he is allowed to sell the
certain invention. Moreover, it is important to include a clause in the contract which states that a
minimum amount needs to be sold which increases the pressure on a partner to sell an
invention. Furthermore, if negotiations are difficult and companies doubt about the potential
success, threaten your (potential) partners with commercializing the invention by your own and
prove that there are customers willing to buy it. Additionally, make sure you have a prototype
which supports the negotiations. Table 13 presents a summary of the main findings about the
Continuous Inventor case.
Page 39
8
Master Thesis
Max Kranendijk
Table 13: Summary of the main findings of the Continuous Inventor case
Learning points


Make sure the patent is well
Recommendations for future
Protection mechanism used
approach
against partner
Only cooperate/talk with

NDA.
defined, otherwise it is only a
partners who are interested in

Patent.
motivation for competitors to find
your invention without being able

Lead time (also for
a way to copy it.
to intimidate it.

Make sure your invention is new
protection against
imitation).
and verify it.

Speed and improving your
invention is a better protection
mechanism than just a patent.

A working prototype is essential
for convincing partners of the
success of your invention.
Quotes:
“In order to overcome doubt of your partner of the success of your invention, first sell the invention yourself.”
“Inventors often forget to take breaks and verify their invention in order to adapt it to the latest market changes.”
“Patents are more a tool of scaring your competitors than prevention. The best method is to continuously improve your
current invention to be one step ahead and use speed to be faster than your competitor.”
Case conclusion
The Continuous Inventor case portrays an example of an inventor who experienced losing his
invention to his partner. Leers lost his first invention to a large partner. He could not fight
against his imitator due to the lack of financial resources and time, even though, he had a patent
for his invention. Leers learned that negotiations are essential when approaching partner. As an
inventor, you should convince interesting partners of the potential success of your invention and
“threaten” with partnering up with competitors or even start producing and selling the
invention by your own. According to Leers, companies are afraid to miss a new business
opportunity and that is the point an inventor should focus on. Moreover, Leers used NDAs to
discuss new inventions and applied for a patent when commercialization opportunities were
possible. However, Leers perceives a patent more as a method to scare off imitators than to
defend an invention. In addition, he emphasizes the importance of lead time by continuously
improving the original invention. According to Leers, this is the best method to stay ahead of
potential imitators.
6.1.7
Conclusions
This section categorizes and summarizes the findings from the interviews with the inventors.
Table 14 portrays an overview of the used protection mechanisms by the interviewees.
Page 40
8
Master Thesis
Max Kranendijk
Table 14: Overview of the used protection mechanisms per case
Studied
Trust
NDA
Beekhuizen
X
X
Woensel
X
X
Jong
X
Goud
X
X
Derks
X
X
Secrecy
Patent
Lead time
Other
X
X
inventor
Leers
X
X
X
X
X
X
X
X
From table 14 it can be concluded that the use of NDAs (5 times) and trust (5 times) were most
favorable as protection mechanism against alliance partners. Moreover, patents were relatively
often used (4 times), only Beekhuizen and Derks did not use patents as protection mechanism
against their partners. Both of them were in a partnership where the partner paid for the patent
and the development itself. This way the patent was not used against their own partners.
Additionally, there were two other methods mentioned. Beekhuizen suggested to only partially
disclose the invention and Derks emphasizes the solution of starting a new venture in
cooperation with your partner. Beekhuizen and Derks had the same goal which was to keep
control of the invention by making sure they would play an important role in development of the
invention or its ownership rights. NDAs were mostly used as a formality and the studied
inventors generally did not indicate it as a suitable protection mechanism.
Furthermore, most of the interviewees faced difficulties in negotiating about the (potential)
revenues. They did not find a suitable method for improving this issue. Partners often used the
reason that they had to take (financial) risks in order to cooperate and commercialize the
invention. Therefore, Beekhuizen, Goud and Leers explicitly mentioned the value of physical
(working) prototypes. According to their experiences, this had a positive effect on gaining trust
from the (potential) partner and overcome the anxious behavior for investing in the invention.
The case studies showed that the most successful protection mechanism was to have additional
knowledge next to the invention itself or to know about the commercialization strategy of the
invention. In other words, an alliance partner should not be able to copy an invention and
commercialize it him/herself without the help of the inventor. Beekhuizen achieved this by only
partially disclosing his invention (partial disclosure) and continuous development of the original
invention (lead time). Derks started a new venture in order to keep (enough) shares in the
company to stay in control. Leers showed a similar approach as Beekhuizen and focused on lead
time by continuously developing the invention in order to become the key person to be involved
in the commercialization of the invention, such as (re)developing and implementing the product
in the market. For Woensel and Goud, patents served their purpose very well but in both cases
the risk of being copied was relatively low due to the niche market. Additionally, in case of
patents, it is often one of the most used protection mechanisms for technical products because
the invention is generally very well protected against imitators and an own alliance partner.
Then, there is still the issue of finding a lucrative alliance partner in order to commercialize the
invention. The cases showed that several inventors struggled with this issue. In particular,
inventors without any experience of commercializing an invention received low returns for their
inventions. They feared the difference in bargaining power and felt intimidated. Therefore, it is
Page 41
8
Master Thesis
Max Kranendijk
recommended to ask for advice from parties which have experience in commercializing
(technical) inventions, which is confirmed by Beekhuizen and Derks.
6.2 Interview with an alliance partner
In this section, a company was interviewed concerning their experience with startup SMEs.
Again, the real name of the studied company is replaced and randomly chosen.
6.2.1 Fast Engineering
Fast Engineering is fully focused on metal technology for the business to business market. They
produce their own products and cooperate with inventors for extending their product portfolio.
In addition, they have their own (worldwide) distribution channel.
Robbert Groeneveld, sales manager Fast Engineering obtained experience from several
cooperation projects with inventors. A lot of new inventions by inventors are refused because
they are not in line with the company’s business. Many inventors approach Fast Engineering
with NDAs which contain clauses about fines when information about the invention leaks.
According to Groeneveld, Fast Engineering never agrees on such terms because they do not want
to risk financial injury when it happens beyond their responsibility and have to prove it.
Inventors are often careful in sharing their inventions because of stories and rumors of
colleagues who lost their invention. Groeneveld claims they would never steal an invention, also
because they would not have the capabilities and incentives for it to imitate a certain product.
In general, Groeneveld is satisfied with experiences of cooperating with inventors. In most cases,
inventors obtain a percentage of the revenues. The (re)development of the invention and
production is executed by Fast Engineering. Moreover, they are responsible for the marketing
and sales. Ideally, the inventor is still involved in marketing activities, such as promotion at fairs.
In case of infringement of the patent from the inventor, Fast Engineering supports the case
because it also involves the revenues of them according to Groeneveld. Nevertheless, this is not
likely to happen due to the type of industry they are active in. Groeneveld expects imitation and
infringing to happen more in consumer products.
Conclusion
Experiences from Fast Engineering show that inventors often contact them for cooperation
opportunities but many cases will not lead to an alliance agreement. Two main reasons are the
limited market potential of the invention and/or the misfit with the current business of the
company. Moreover, Fast Engineering faces demands which cannot be granted, such as
information leakage fines and negotiations about minimum sales. Eventually, once an alliance
agreement is started, the relationships are, in general, pleasant to both sides, according to Fast
Engineering. In most favorable situation, the inventor attends promotion activities, such as fairs,
in order to stimulate the marketing of the product. It is important to realize that both parties of
the alliance need to put effort in sales of the invention. A lot of inventors think that their
invention will sell automatically due to the partnership.
Page 42
8
Master Thesis
Max Kranendijk
6.3 Additional findings
This section portrays the findings from additional sources, such as information and cases
provided by Agentschap NL1, NOVU2, KIVI NIRIA21, information from interviews and events and
some latest discussions from magazines and websites concerning IP management.
Agentschap NL explains the shift of IP management towards a more open approach due to
trends, such as open innovation in which IP is shared instead of protected. Companies tend to
cooperate more often and create shared IP, such as IP on enabling technologies, production or
test equipment. In this way, separate companies leverage specific parts of a new product or
service. In addition, open innovation will support firms to be more willing to license their patent
rights to others, even immediate competitors to exploit their patent rights to a larger extent.
Therefore, according to the European Commission, exploitation of innovation and IPRs is indeed
a key role to future economic success. Unfortunately, Agentschap NL does not describe how to
“play this collaboration game” in detail and defend its IP and resources in such partnership
agreements. It only mentions the right to defend its patent when infringement takes place
(Hanneman et al., 2010).
Technisch Weekblad22 (50th edition) focused on patents and their vision for 2012 in one of their
latest editions. Nowadays, there are more companies only applying for patents to litigate others,
typically startup SMEs when they make use of their patents because they are easier to
intimidate. Often, the firm which is using the patent is not aware of its existence. These types of
firms are so called “Patent Trolls”; companies which buy and enforce patents against one or
more alleged infringers in a manner considered by the target or observers as unduly aggressive
or opportunistic, often with no intention to further develop, manufacture or market the patented
invention (Poltorak, 2006). More and more startup SMEs face problems with these Patent Trolls,
especially software firms. In addition, it also happens to large firms. A recent example is Apple’s
new Ipad infringes 4G patents.23 Hence, people would like to see a change in the ownership of
patents, which is usually a company where the invention was created instead of the inventor
itself. According to Wouter Pijzel, Director of the NOVU this could prevent the above mentioned
issue. Another problem are the high fees involved with patents which hinders startup SMEs to
defend their invention. Kees Capel, lawyer at Kneppelhout & Korthals therefore suggests setting
a fixed price for legal costs, for example, ten to twenty thousand euro. Entrepreneur, Robert Gaal
(Wakoopa) proposes online application forms for patents in order to reduce the costs.
Additionally, he claims that still the best option for startup SMEs is speed to market in order to
keep ahead of (potential) competitors.
Several experts, such as lawyers and senior managers within IP management shared their vision
on patent use by startup SMEs during a seminar24 organized by Agentschap NL. A senior
manager from KPN explained that they never cooperate with startup inventors when they do not
have a patent for their invention. In that way, they avoid the risk that information leaks and
someone within KPN would commercialize the original invention. A legal employee from Philips
explained that within 20 years he only experienced infringement of a patent from a smaller
party two times. Nevertheless, several people from the seminar acknowledged the issue of
21
KIVI NIRIA is the Dutch association for engineers and engineering students. With 23.000 members KIVI NIRIA is the largest
engineering association in the Netherlands.
22
Weekly magazine from KIVI NIRIA about subjects within the technological field.
23
http://www.patentlyapple.com/patently-apple/2012/03/apples-new-ipad-with-lte-is-accused-of-infringing-4g-patents.html
24
Autumn event "Samen innoveren, samen octrooieren?”, 22nd of November 2011.
Page 43
8
Master Thesis
Max Kranendijk
inventions being stolen by alliance parties. During a mini symposium25, organized by iDexpress,
several attendees shared their fear of losing their invention to potential collaborators and their
careful approach in commercialization activities. In addition, they addressed the lack of
knowledge which most technical inventors need in order to commercialize their invention.
Based on both events, it can be concluded that the fear of losing an invention still remains with
startup SME inventors.
25
Symposium “Valorization in practice”, 22nd of June 2001.
Page 44
8
Master Thesis
Max Kranendijk
7 Conclusions
This chapter portrays the conclusions of this research and especially aims to answer the
research question: “How can startup SMEs protect their invention against their alliance partners
while commercializing their invention?”
Furthermore, it discusses additional interesting findings from the literature review and the case
study. Finally, limitations and elements for further research are mentioned.
7.1 Conclusion
In chapter one, the main research question (MRQ) was formulated: “How should you control the
protection of an invention (knowledge) in an alliance against an own alliance partner in order to
maximize performance while commercializing an invention as a startup SME innovator?” In order
to answer this question, several sub-research questions (SRQs) were formulated. In this chapter,
these questions will be answered step by step leading to the final answer of this research.
The first sub-research question (SRQ1), “How should you control the protection of your
invention?” was discussed in the second chapter. There were two types of protection
mechanisms distinguished, formal mechanisms; patents, copyrights and trademarks and informal
mechanisms; secrecy and lead time (Auerbach 2006; Harabi 1995; Hertzfeld, et al., 2006;
Leiponen and Byma, 2009). Patents still remain the most used IP protection mechanism,
nevertheless, this is changing due to the rise of open innovation aspects, such as crowdsourcing
(Hanneman et al., 2010). As a results, lead time and secrecy are increasing in terms of usage and
popularity (Brouwer and Kleinknecht, 1999; Leiponen and Byma, 2009; Levin et al.,1987).
However, secrecy is not favorable when working closely in a cooperation (Leiponen and Byma,
2009). Patents are mostly used in high-tech industries but secrecy is in most cases rated higher
than patents. Startup SMEs tend to prefer informal protection mechanisms over formal ones
(Arundel, 2001; Cohen et al., 2000; Gans and Stern, 2003). The cases confirmed that the use of
patents was favorable as a protection mechanism but was principally used in combination with
other protection mechanisms, mainly with secrecy and, in the starting phase, with NDAs.
Nevertheless, patents were used to protect the technical invention in all cases. In general, it can
be concluded that startup SMEs tend to use a combination of protection mechanisms and do not
favor one.
Sub-research question two (SRQ2), “How should you proceed managing your invention as a
(startup) small size innovator?” was discussed in chapter three. First, startup SMEs face, in
general, two options when commercializing an innovation. These options are building an own
value chain or join an existing one via an incumbent. This issue of correct decision-making is
confirmed by Leers who emphasizes the importance of the right choice which needs to be made
in an early stage. Second, startup SMEs have to choose one or several protection mechanisms.
The literature study explained that the contextual factors influence which protection mechanism
to prefer, for instance, technical inventions were mostly protected with a patent. Results from
the case study showed the influence of the type of market in which the invention was applicable
for. According to Woensel and Goud, in a niche market there is a smaller chance of an invention
being copied. There are fewer players (able) to imitate the invention. In addition, there is a great
deal of effort required for companies to compete in, usually, such a small niche market. Startup
SMEs with (high)tech inventions protect their inventions in most cases with patents, both
against imitators and their (potential) partners, which is confirmed by the case studies. When
Page 45
8
Master Thesis
Max Kranendijk
the patent is applied in cooperation with an employer or alliance partner, it is crucial to only
partially disclose the invention (partial disclosure). The inventor should ensure that the
invention knowledge or additional knowledge to commercialize the invention is kept secret for
his/her partner in order to remain of great importance for the partner.
Sub-research question three (SRQ3), “How can an invention in an alliance be protected against an
own alliance partner?” was discussed in chapter three and four. Firms join alliances in order to
gain several benefits, such as allowing buyers and sellers of technology to soften downstream
product market competition, avoid duplicative investment and engage in complementary
technology development (Gans and Stern, 2003). This is especially useful for startup SMEs
because they often lack financial, management and organizational resources to commercialize
(Bhide, 2000; Gans and Stern, 2003; Veugelers and Cassiman, 1999). According to Street and
Cameron (2007), startup SMEs should take into account that the resources used to attract the
larger partner are protectable. In other words, the larger partner should not be able to simply
take the resources but remains dependent on the startup SME in order to leverage the resources
most effectively. Therefore, Alvarez and Barney (2001) propose that startup SMEs should
develop a process rather than a single product in order to protect their resources. In the
Corporate Inventor case study this was mentioned by Beekhuizen as to only partially disclose
the invention (knowledge) in such a way that the invention cannot be copied easily. Derks used a
different method to be in control of his invention and started a new venture partly owned by
himself and his employer. The main conclusion of protecting an invention in an alliance is to
keep essential information for yourself or generate a method in order to be of great value for
your partner to leverage the invention successfully. This can be achieved with the following
methods according to the literary study and the case study results; partial disclosure, lead time
and/or a new venture.
The fourth sub-research question (SRQ4) “How can performance while commercializing your
invention be maximized?” was discussed in chapter four. According to Krishnan et al. (2006),
trust is the most mentioned parameter in order to achieve successful alliances. In general, trust
has a positive effect on the alliance performance. Contradictory, trust can be extremely harmful
for the success of an alliance. Overdependence on any single relationship can weaken overall
performance (Miles et al., 1999). It is of the utmost importance to have a neutral alliance
partnership in order to maximize performance. Firms find it challenging to figure out
beforehand what the real intention of a potential alliance partner is. The case studies showed
that the majority of the inventors used trust as a protection mechanism but in most cases it was
used to test the potential of an invention and receive feedback. Additionally, trust was vital for
choosing an alliance partner for most of the studied inventors and affected the relationships a
lot. In the case of Woensel and especially Jong, both inventors trusted their partners too much in
the effort taken in sales and marketing activities. Woensel and Jong were relying on earlier
promises which were finally not executed by the partner. The cases of Woensel and Jong
underline how important it is to monitor an alliance when it actually starts and that it is not only
about the (pre)negotiations beforehand.
Finally, the main research question (MRQ) can be answered, “How control the protection of your
invention (knowledge) in an alliance against your alliance partner in order to maximize
performance while commercializing your invention as a (startup) small size innovator?” There is
no straight forward answer which protection mechanism is most favorable to defend IP, both in
general and in an alliance. This is confirmed by the literature study (e.g. Olander et al., 2009) and
Page 46
8
Master Thesis
Max Kranendijk
by findings of the case study. Methods to protect ideas and innovations differ depending on the
chosen model of innovating and the economic and legal environment a firm operates in. What
can be concluded from the case studies is the importance of not sharing 100% of the invention
(knowledge) which is confirmed by Street and Cameron (2007). Always make sure that part of
the (implementation) knowledge of the invention remains with the inventor. In this way, the
startup inventor will always be essential for the alliance partner and as a result increases
bargaining power for the startup SME inventor which is confirmed by Beekhuizen and Derks in
the case study. Additionally, it is significant to find a partner who is seeking mutual benefits and
does not have the capabilities to imitate the invention. Derks mentioned the following, “as an
inventor it is preferable to cooperate with a partner who is eager to generate market share and
who is not able to duplicate your invention and does not have interest in doing so”. Furthermore, in
the case studies, the most successful protection mechanisms were lead time, partial disclosure
and/or a start of a new venture with your alliance partner in which the inventor has (enough)
shares to be in control.
7.2 Additional findings
A lot of startup SMEs face the challenge of finding a good alliance partner and convince them of
starting a cooperation in order to commercialize their invention. Therefore, Beekhuizen, Goud
and Leers explicitly mention the value of a physical (working) prototype. According to
Beekhuizen, “you should always have a physical prototype to show to your (potential) partners in
order to convince them about the benefits of your invention.” When people can see, feel and touch
a certain product or service, it is easier to convince potential partners of the success of the
invention than “selling” your invention by graphs, tables and forecasts. Goud videotaped
potential customers using the product and showed the experiences to potential investors and
partners which was an efficient way to convince them of the success of the invention.
Startup SME inventors often lack the knowledge about commercializing an invention. When the
invention has potential to become financially successful, parties start approaching the inventors
with cooperation offers. It is essential to ask advice from successful inventors or other people
who have experience with such a trajectory. The case studies showed that all inventors who
commercialized more inventions made mistakes due to lack of experience or knowledge which
could easily be overcome by asking advice from third parties which was confirmed by
Beekhuizen, Woensel, Goud and Leers.
7.3 Limitations and suggestions for further research
One of the limitations in this thesis was the broad scope of this explorative research. In order to
draw more precise conclusions, the focus of the case selection should be narrowed. In addition,
it would be interesting to further emphasize on the favorable protection mechanisms used;
partial disclosure, lead time and a new venture.
Two studied inventors, Derks and Leers developed their invention while working for an
employer. Both of them faced difficulties about the ownership of the invention. It would be
valuable to conduct a research on effectively commercializing an invention while working for an
employer and find out in what way to claim the ownership of the invention.
The conducted research was mainly focused on the perspective of startup inventors. It would be
interesting to research what the opinion is of large players concerning the alliance possibilities
Page 47
8
Master Thesis
Max Kranendijk
with startup SME inventors and what do startup SME inventors need to take into consideration
to be a promising partner for large firms.
There are several stories of startup SMEs which lost their invention to a large partner or
imitator, but no (legal) actions could be taken because of limited resources. Currently, there is a
big rise of social media which makes it possible to share negative publicity in case of invention
theft or imitation. In what way could social media, such as LinkedIn, Twitter, Facebook etc.
contribute to strengthen bargaining power for startup SMEs to threaten with bad publicity in
case of infringing or other financial harm by a large firm?
Page 48
8
Master Thesis
Max Kranendijk
References
Literature
Alexy, O., Criscuolo, P. and Salter, A. (2009). Does IP Strategy Have to Cripple Open Innovation?
MIT Sloan Management Review 2009, Vol: 51, Pages: 71–77.
Alvarez, S. A. and Barney, J. B. (2001). How Entrepreneurial Firms Can Benefit from Alliances with
Large Partners. Academy of Management Executive 15(1), 139–148.
Anderson, E. (1990). Two firms, one frontier: On assessing joint venture performance. Sloan
Management Review, 31(2): 19-30.
Anton, J.J. and Yao, D.A. (1994). Expropriation and inventions: appropriable rents in the absence of
property rights. American Economic Review 84 (1), 190–209.
Antoncic, B. and Prodan, I. (2008). Alliances, corporate technological entrepreneurship and firm
performance: testing a model on manufacturing firms. Technovation, No. 28, pp. 257-65.
Aoki, R. and Schiff, A. (2008). Promoting access to intellectual property: Patent pools, copyright
collectives and clearinghouses. R&D Management, 38, 189–204.
Arora, A., Fosfuri, A. and Gambardella, A. (2001). Markets for Technology: The Economics of
Innovation and Corporate Strategy. MIT Press, Cambridge, MA.
Arrow, K.J. (1962). Economic Welfare and the Allocation of Resources for Invention. in: the Rate
and Direction of Inventive Activity, ed. R.R. Nelson. Princeton: Princeton University Press.
Arundel, A. (2001). The relative effectiveness of patents and secrecy for appropriation. Research
Policy 30 (4), 611–624.
Arundel, A., van de Paal, G. and Soete L. (1995). Innovation Strategies of Europe’s Largest
Industrial Firms. MERIT, Maastricht.
Auerbach, J.I. (2006). Patent Law Principles & Strategies. Edell, Shapiro & Finnan, LLC.
Baughn, C.C., Denekamp, J.G., Stevens J.H. and Osborn, R.N. (1997). Protecting intellectual capital
in international alliances. Journal of World Business, 32(2), pp. 103-117.
Baum, J., Calabrese, T. and Silverman, B. (2000). Don’t go it alone: alliance network composition
and startups’ performance in Canadian biotechnology. Strategic Management Journal 21, 267 –
294.
Besen, S.M. and Raskind, L.J. (1991) An Introduction to the Law and Economics of Intellectual
Property. J. Econ. Persp.
Bhide, A. (2000). The Origin and Evolution of New Businesses. Oxford University Press, New York.
Blomqvist, K., Hurmelinna, P., and Seppanen, R. (2005). Playing the collaboration game right –
balancing trust and contracting. Technovation 25, 497-504.
Page 49
8
Master Thesis
Max Kranendijk
Blomqvist, K., Hurmelinna-Laukkanen, P., Nummela, N. and Saarenketo, S. (2008). The role of
trust and contracts in the internationalization of technology-intensive born globals. Journal of
Engineering and Technology Management, 25, 1/2, 123-135.
Bonte, W. and Keilbach, M. (2005). Concubinage or marriage? Informal and formal cooperations
for innovation. International Journal of Industrial Organization 23, 279–302.
Boutsma, E. (2011). Thema Octrooien en Visie 2012. Technisch Weekblad editie 50. Uitgeverij
Bèta Publishers.
Brouwer, E. and Kleinknecht, A. (1999). Innovative output, and a firm’s propensity to patents: an
exploration of CIS micro data. Research Policy 28, 615–624.
Buckley, P.J. and Chapman, M. (1998). The management of cooperative strategies in R&D and
innovation programmes. International Journal of the Economics of Business 5 (3), 369–381.
Byma, J. and Leiponen, A. (2007). Can’t block, must run: Small firms and appropriability. Mario
Einaudi Center for International Studies. Working paper series, WP 1-07.
Cassiman, B. and Veugelers, R. (2002). R&D cooperation and spillovers: some empirical evidence
from Belgium. American Economic Review 92 (4), 1169-1184.
Christensen, C.M. (1997). The Innovator’s Dilemma: When New Technologies Cause Great Firms to
Fail. Harvard Business School Press, Boston, MA.
Cohen, W.M. and Levinthal, D.A. (1990). Absorptive-capacity: a new perspective on learning and
innovation. Administrative Science Quarterly 35(1): 128–152.
Cohen, W.M., Nelson, R.R. and Walsh, J. (1998). Appropriability conditions and why firms patent
and why they do not in the American manufacturing sector. Mimeo. Carnegie Mellon University,
Pittsburgh.
Cohen, W.M., Nelson, R.R. and Walsh, J. (2000). Patenting Their Intellectual Assets: Appropriability
Conditions and Why US Manufacturing Firms Patent or Not. NBER paper 7522, Boston.
Dickson, P.H., Weaver, K.M. and Hoy, F. (2006). Opportunism in the R&D alliances of SMEs: The
roles of the institutional environment and SME size. Journal of Business Venturing, 21(4): 487513.
Doz, Y.L. (1988). Technology partnerships between larger and smaller firms: Some critical issues.
In F. K. Contractor and P. Lorange (eds.), Cooperative Strategies in International Business.
Lexington Books, Lexington, MA, pp. 169–186.
DuBoff, L.D. and King, C.O. (2009). Introduction to Copyright. TechTrends Volume 53, Number 5.
Eisenhardt, K. and Schoonhoven, C. (1996). Resource-based view of strategic alliance formation:
strategic and social effects in entrepreneurial firms. Organization Science 7 (2), 136–150.
Eisenhardt, K.M. and Martin, J.A. (2000). Dynamic capabilities: what are they? Strategic
Management Journal, October –November Special Issue 21: 1105–1121.
Foster, R.N. (1986). Innovation: The Attacker’s Advantage. Summit Books, New York.
Page 50
8
Master Thesis
Max Kranendijk
Gans, J.S. and Stern, S. (2003). The product market and the market for “ideas”: commercialization
strategies for technology entrepreneurs. Research Policy 32, 333–350.
Gans, J.S., Hsu, D.H. and Stern, S. (2002). When does startup innovation spur the gale of creative
destruction? Rand Journal of Economics 33 (4), 571–586.
Garrette, B., Castañer, X. and Dussauge, P. (2009). Horizontal alliances as an alternative to
autonomous production: Product expansion mode choice in the worldwide aircraft industry 19452000. Strategic Management Journal, 30(8): 885-894.
Gassmann, O. and Enkel, E. (2004). Towards a theory of open innovation: three core process
archetypes. Proceedings of the R&D Management Conference, Lisbon, Portugal, July 6–9.
Granstrand, O. (1999). The Economics and Management of Intellectual Property. Edward Elgar,
Cheltenham.
Green, J.R. and Scotchmer, S. (1995). On the Division of Profit in Sequential Innovation. RAND
Journal of Economics, Vol. 26, pp. 20-33.
Hall, M., Oppenheim, C. and Sheen, M. (1999). Barriers to the use of patent information in UK
small and medium-sized enterprises. Part I: Questionnaire survey, Journal of Information Science,
25, 5, 335-350.
Hamel, G. (1991). Competition for competence and interpartner learning within international
strategic alliances. Strategic Management Journal, Summer Special Issue, 12, pp. 83-103.
Harabi, N. (1995). Appropriability of technical innovations an empirical analysis. Research Policy,
Elsevier.
Henderson, R. and Clark, K. (1990). Architectural innovation: the reconfiguration of existing
product technologies and the failure of established firms. Administrative Science Quarterly 35, 9–
30.
Hertzfeld, H.R., Link, A.N. and Vonortas, N.S. (2006). Intellectual property protection mechanisms
in research partnerships. Research Policy 35 (6), 825–838.
Hurmelinna-Laukkanen, P., Sainio, L.M. and Jauhiainen, T. (2008). Appropriability regime for
radical and incremental innovations. R&D Management, 38, 3, 278-289.
Jaffe, A.B. (2000). The U.S. patent system in transition: policy innovation and the innovation
process. Research Policy 29:531-558.
Kale, P., Singh, H., and Perlmutter, H. (2000). Learning and protection of proprietary assets in
strategic alliances: Building relational capital. Strategic Management Journal, 21: 217–237.
Kitching, J. and Blackburn., R. (1998). Intellectual property management in the small and medium
enterprise (SME). Journal of Small Business and Enterprise Development, Volume 5, Number 4.
Koza, M. and Lewin, A. (2000). Managing partnerships and strategic alliances: Raising the odds of
success. Eur. Management J. 18(2) 145-151.
Page 51
8
Master Thesis
Max Kranendijk
Krishnan, R., Martin, X., and Noorderhaven, N.G. (2006). When does trust matter to alliance
performance? Academy of Management Journal, 49: 894 –917.
Lanjouw, J.O. and Schankerman, M. (2001). Characteristics of patent litigation: a window on
competition, RAND Journal of Economics, vol. 32(1), pp. 129–51.
Lederman, E. (1989). Criminal Liability for Breach of Confidential Commercial Information. 38
EMORY L.J. 921.
Leiponen, A. (2005). Organization of knowledge and innovation: the case of Finish business
services. Industry and Innovation 12 (2), 185-203.
Leiponen, A. and Byma, J. (2009). If you cannot block, you better run: Small firms, cooperative
innovation, and appropriation strategies, Research Policy 38 (2009) 1478–1488.
Levin, R.C., Klevorick, A.K., Nelson, R.R. and Winter, S.G. (1987). Appropriating the returns from
industrial research and development. Brookings Papers on Economic Activity 3, 242–279.
MacDonald, S. (2004). When Means Become Ends: Considering the Impact of Patent Strategy on
Innovation. Information Economics and Policy, 16, 135-158.
Marchetti, C. (1980). Society as a learning system: discovery, invention, and innovation cycles
revisited. Technol. Forecast. Social Change 18, 267-282.
McLennan, W. (1995). Innovation in Australian Manufacturing 1994. Australian Bureau of
Statistics, Canberra, catalogue no. 8116.0.
Meyer, G.D., Alvarez, S.A. and Blasick, J. (1997). Benefits of Technology-Based Strategic Alliances:
An Entrepreneurial Perspective. Frontiers of Entrepreneurship Research 17. Babson Park, MA,
June.
Miles, G., Preece, S.B. and Baetz, M.C. (1999). Dangers of Dependence: The Impact of Strategic
Alliance Use by Small Technology-Based Firms. Journal of Small Business Management 37(2), 20–
29.
Moore, B. (1996). Sources of innovation, Technology Transfer, and Diffusion. in A. Cosh and A.
Hughes (eds) The Changing State of British Enterprise, ESRC Centre for Business Research,
Cambridge.
Norman, P.M. (2002). Protecting knowledge in strategic alliances: Resource and relational
characteristics. Journal of High Technology Management Research, 13(2), 177 – 202.
Olander, H., Hurmelinna-Laukkanen P. and Mähönen, J. (2009). What’s small size got to do with
it? Protection of intellectual assets in SMEs. International Journal of Innovation Management,
13(3), 349–370.
Oxley, J.R. (1999). Institutional Environment and the Mechanism of Governance : the Impact of
Intellectual Property Protection on the Structure of Inter-firm Alliances. Journal of Economic
Behavior and Organization, 38 (3) : 283-309.
Page 52
8
Master Thesis
Max Kranendijk
Parkhe, A. (1991). Interfirm diversity, organizational learning, and longevity in global strategic
alliances. Journal of International Business Studies, 22, pp. 579–601.
Parkhe, A. (1993). Strategic alliance structuring: a game theoretic and transaction cost
examination of interfirm cooperation. The Academy of Management Journal, vol. 36, no.4, p.794829.
Poltorak, A. (2006). On 'Patent Trolls' and Injunctive Relief. ipfrontline.com.
Rausch, L. (1995). Estimates from the Manufacturer’s Innovation Survey Pilot. National Science
Foundation, Washington, DC, April, Mimeo.
Rivera-Santos, M., Dussauge., P. and Mitchell., W. (2008). Can New Ventures Control Learning and
Leakage in Alliances? The Partial Tradeoff between Knowledge Acquisition and Protection in
Partnerships Formed by Newly Created Business. L&L 3e.
Roberts, E.B. (2007). Managing invention and innovation. Research Technology Management;
Jan/Feb 2007; 50, 1; ProQuest pg. 35.
Rothaermel, F.T. and Deeds, D.L. (2006). Alliance type, alliance experience and alliance
management capability in high-technology ventures. Journal of Business Venturing 21 (4), 429–
460.
Rothwell, R. and Dodgson, M. (1991). External linkages and innovation in small and medium-sized
enterprises, R&D Management, 21, 2, 125–138.
Scotchmer, S. (1991). Standing on the Shoulders of Giants: Cumulative Research and the Patent
Law. Journal of Economic Perspectives, Vol. 5, pp. 29-41.
Simon, M., Elango, B., Houghton, S.M. and Savelli, S. (2002). The successful product pioneer:
Maintaining commitment while adapting to change. Journal of Small Business Management, 40, 3,
187-203.
Slowinski, G., Hummel, E. and Kumpf, R.J. (20060. Protecting Know-how and Trade Secrets in
Collaborative R&D Relationships. Research-Technology Management 49, pp. 30–38.
Sobrero, M., Roberts, E.B. (2002). Strategic management of supplier-manufacturer relations in
new product development. Research Policy 31 (1), 159-182.
Sorli, M., Stokic, D., Gorostiza, A. and Campos, A. (2006). Managing product/process knowledge in
the concurrent/simultaneous enterprise environment. Robotics and Computer-Integrated
Manufacturing, 22, 399–408.
Street, C.T. and Cameron, A.F. (2007). External Relationships and the Small Business: A Review of
Small Business Alliance and Network Research. Journal of Small Business Management, 45, 2,
239–266.
Takalo, T. (1998). Innovation and imitation under imperfect patent protection. Journal of
Economics 67, 229–241.
Teece, D.J. (1986). Profiting from technological innovation: implications for integration,
collaboration, licensing, and public policy. Research Policy 15, 285–305.
Page 53
8
Master Thesis
Max Kranendijk
Teece, D.J. (1988). Capturing Value from Technological Innovation: Integration, Strategic
Partnering, and Licensing Decisions. Interfaces (18:3), pp. 46-61.
Tether B. and Massini, S. (2007). Services and the information infrastructure. DTI occasional
paper no. 9.
Tether, B.S. (2005). Do services innovate (differently)? Insights from the European Innobarometer
survey. Industry and Innovation 12 (2), 153–184.
Thurow, L.C. (1997). Needed: a system of intellectual property rights. Harvard Business Review,
95–103, September/October.
Veugelers, R. and Cassiman, B. (1999). Make and buy in innovation strategies: evidence from
Belgian manufacturing firms. Research Policy 28, 63–80.
Williamson, O.E. (1991). Comparative economic organization: The analysis of discrete structural
alternatives. Administrative Science Quarterly, 36, pp. 269-296.
Zahra S.A and Nielsen A.P. (2002). Sources of capabilities, integration and technology
commercialization. Strategic Management Journal 23(5): 377–398.
Books
Carvalho, N.P. (2010). The TRIPS Regime of Trademarks and Designs. Kluwer Law International.
Chesbrough, H.W. (2003). Open innovation: The new imperative for creating and profiting from
technology.
Creswell., John., W. (2003). Research design: qualitative, quantitative and mixed method
approaches. Second edition. Saga Publications, Inc.
Creswell., John., W. (2007). Qualitative Inquiry & Research Design: Choosing Among Five
Approaches. Second edition. Saga Publications, Inc.
Hanneman, H.W.A.M. (chairman), et al. (2010). A century of patents in the Netherlands. The
Hague : Sdu, 2010. 6 dln. : ill. ; 31 cm.
Kvale, S. (1996). Interviews: An Introduction to Qualitative Research Interviewing. Sage
Publications, Inc.
Maxwell, J. A. (1996). Qualitative research design: an interactive approach. Thousand Oaks, CA:
Sage.
Schofield, J. W. (1990). Increasing the generalizability of qualitative research. In E. W. Eisner & A.
Peshkin (Eds.), Qualitative inquiry in education (pp. 201-232). New York: Teachers College Press.
Stake, R. (1995). The art of case study research. Thousand Oaks, CA: Sage.
Surowiecki, J. (2004). The Wisdom of Crowds. New York: Doubleday.
Yin, R.K. (2009). Case study research: Design and Methods, 4th edition. Thousand Oaks, CA: Sage.
Page 54
8
Master Thesis
Max Kranendijk
Yin, R.K. (2011). Qualitative research from start to finish. Guilford Press.
Definitions
S. Grzybowski, Prawo wynalazcze [Law on inventions], 1965 p. 21
Websites (visited between 2nd of October 2011 and 15th of March 2012)
http://dictionary.cambridge.org/dictionary/business-english/incumbent_1
http://ec.europa.eu/enterprise/policies/sme/facts-figures-analysis/smedefinition/index_en.htm
http://en.octrooicentrum.nl/images/stories/onderwerpen/patent_trademark_or_design/row95
_eng_niet_officiele_vertaling.pdf
http://hbr.org/2011/10/shaking-things-up-at-coca-cola/ar/1
http://www.businessdictionary.com/definition/alliance.html
http://www.businessdictionary.com/definition/idea.html
http://www.businessdictionary.com/definition/innovation.html
http://www.businessdictionary.com/definition/invention.html
http://www.copyright.gov/help/faq/faq-general.html
http://www.craske.co.uk/articles/art300809.htm
http://www.epo.org/law-practice/legal-texts/epc.html
http://www.epo.org/law-practice/legal-texts/html/epc/2010/e/ar2.html
http://www.gfmag.com/tools/global-database/economic-data/10621-best-global-brands2010.html#axzz1iUrONa1k
http://www.octrooicentrum.nl/index.php/wrapper.html
http://www.patentlyapple.com/patently-apple/2012/03/apples-new-ipad-with-lte-is-accusedof-infringing-4g-patents.html
http://www.trademarkorganisation.org/en/definitions
http://www.trademarkorganisation.org/en/definitions
http://www.uspto.gov/ip/global/index.jsp
Page 55
8
Master Thesis
Appendices
Appendix A: Case study questions
Appendix B: A Checklist of Questions for Designing a Qualitative Procedure
Appendix C: Interview transcripts
Page 56
Max Kranendijk
8
Master Thesis
Max Kranendijk
Appendix A
Case study questions
1. Background information of the invention and inventor
 Could you tell more about your background, education, job experience and the relation to
the invention?
 Could you describe the invention?
 Could you describe the industry in which the invention is for?
 What is the patent number (if applicable)?
 Do you have already experience with an earlier invention and/or the commercialization
process (how did it go and what was your experience).
2.



Background information of the partner
How many employees are working at the partner company?
What is the turn over from the partner company?
In which industry is the partner operating?
3.




Partnership questions
When you started to commercialize your invention what resources were lacking?
How did you make the selection of your partner?
How many (potential) parties did you contact?
How much did you know about the legal requirements of patenting before you attempted to
obtain a patent?
How did you experience the partnership with your partner?
To what extent did you keep your invention secret or protected against your alliance
partner and why?
Were you afraid of being copied by a competitor or your alliance partner (how and why)?
How long did the partnership trajectory take? Was this longer or shorter than expected and
why?
Which step or decision concerning your protection mechanism was decisive for your success
and why?
What would you have done differently (how and why)?
Do you have any other elements according to the experience with partnership which we did
not discussed?







4. Closing Remarks
Are there elements of the questions you like to highlight or add to the items we discussed?
Thank you for sharing your experience and expertise.
Page 57
8
Master Thesis
Max Kranendijk
Appendix B
A Checklist of Questions for Designing a Qualitative Procedure (Creswell, 2007)

Are the basic characteristics of qualitative studies mentioned?

Is the specific type of qualitative strategy of inquiry to be used in the study mentioned?
Is the history of, a definition of, and applications for the strategy mentioned?

Does the reader gain an understanding of the researcher's role in the study (past
experiences, personal connections to sites and people, steps in gaining entry, and
sensitive ethical issues)?

Is the purposeful sampling strategy for sites and individuals identified?

Are the specific forms of data collection mentioned and a rationale given for their use?

Are the procedures for recording information (such as protocols) during the data
collection procedure mentioned?

Are the data analysis steps identified?

Is there evidence that the researcher has organized the data for analysis?

Has the researcher reviewed the data generally to obtain a sense of the information?

Has coding been used with the data?

Have the codes been developed to form a description or to identify themes?

Are the themes interrelated to show a higher level of analysis and abstraction?

Are the ways that the data will be represented—such as in tables, graphs, and figures—
mentioned?

Have the bases for interpreting the analysis (personal experiences, the literature,
questions, action agenda) been specified?

Has the researcher mentioned the outcome of the study? (develop a theory? provide a
complex picture of themes?)

Have multiple strategies been cited for validating the findings?
Page 58
8
Master Thesis
Max Kranendijk
Appendix C
Interview transcripts
As requested from the interviewees, it is decided to keep the transcripts of the interviews secret.
Page 59