Two related trends characterize the recent past: value propositions are migrating from the physical to the informational, and value creation is shifting from firms to consumers. These two trends meet in the phenomenon of “consumer-generated intellectual property” (CGIP). This article addresses the question: “How should firms manage the intellectual property that their customers create?” It explores how CGIP presents important dilemmas for managers and argues that consumers’ “intellectual property” should not be leveraged at the expense of their “emotional property.” It integrates these perspectives into a diagnostic framework and discusses eight strategies for firms to manage CGIP.
Two related trends characterize the recent past: value propositions are migrating from the physical to the informational, and value creation is shifting from firms to consumers. These two trends meet in the phenomenon of “consumer-generated intellectual property” (CGIP). This article addresses the question: “How should firms manage the intellectual property that their customers create?” It explores how CGIP presents important dilemmas for managers and argues that consumers’ “intellectual property” should not be leveraged at the expense of their “emotional property.” It integrates these perspectives into a diagnostic framework and discusses eight strategies for firms to manage CGIP. (Keywords: Consumer Behavior, Intellectual Property, Innovation Management, New Product Management, Competitive Advantage, Consumers, Product Design)
"Innovations" of copyright and intellectual propertiesWendy Lile
This document discusses innovations in copyright and intellectual property laws. It covers the types of intellectual property protections including copyrights, patents, and trademarks. It then discusses the application processes and statistics for these protections. The document also examines restrictive technologies like digital rights management (DRM) and piracy laws, and how they impact content distribution and mobile access. It concludes by arguing that current intellectual property restrictions mainly benefit large international businesses, rather than individual creators or the U.S. economy.
This document discusses consumer-generated intellectual property (CGIP), which is defined as intellectual property produced by consumers rather than firms. It presents an Emotional Property-Intellectual Property matrix that identifies eight strategies - Cultivate, Coordinate, Cooperate, Capture, Condone, Condemn, Crush, Copy - for firms to manage CGIP based on the level of emotional investment by consumers and the firm's ability to control the IP. The strategies range from positive approaches that balance consumer emotion and IP control, to negative approaches that ignore consumer interests. The document emphasizes the importance of recognizing both the emotional and intellectual property aspects of CGIP when developing strategies.
Two trends are characterized in recent times: value propositions are migrating from physical to informational, and value creation is shifting from firms to consumers. These trends combine to produce the phenomenon of "consumer generated intellectual property" (CGIP). The paper discusses dilemmas firms face in managing CGIP created by consumers. It presents strategies firms can take to control CGIP along a spectrum from cultivating to copying consumer innovations without permission. A key consideration is the level of consumers' emotional investment in their creations independent of intellectual property rights.
This document provides a summary of 3 key chapters from the 8th edition of the textbook "e-commerce, business. technology. society" by Kenneth C. Laudon and Carol Guercio Traver.
The first chapter discusses ethics, law, and e-commerce in virtual worlds like Second Life, including what constitutes mischief, banned behaviors, and debates around enforcing real-world laws. The second chapter covers understanding ethical issues in e-commerce related to privacy, intellectual property, governance, and public safety. The third chapter examines legal and technological approaches to protecting privacy, including the types of data collected online, profiling and behavioral targeting, and the FTC's evolving privacy framework.
1. Some businesses engage in unethical practices like spamming to increase sales, as there are limited online laws and enforcement is done by users.
2. It is important for businesses to have ethical policies and protect customer privacy and security in order to build trust with online customers.
3. Laws aim to protect children's privacy and safety online by restricting data collection and requiring schools to use filtering software. Parents can also monitor children's internet use.
The document discusses the Leahy-Smith America Invents Act (AIA) of 2012, which reformed U.S. patent law by changing it from a "first to invent" system to a "first to file" system. Supporters argue it streamlines the patent process, while critics argue it disadvantages small businesses and entrepreneurs. The document analyzes both sides of the debate and argues that while reforms may be needed, the AIA addressed issues with the previous system and overall patent reform was necessary.
Two related trends characterize the recent past: value propositions are migrating from the physical to the informational, and value creation is shifting from firms to consumers. These two trends meet in the phenomenon of “consumer-generated intellectual property” (CGIP). This article addresses the question: “How should firms manage the intellectual property that their customers create?” It explores how CGIP presents important dilemmas for managers and argues that consumers’ “intellectual property” should not be leveraged at the expense of their “emotional property.” It integrates these perspectives into a diagnostic framework and discusses eight strategies for firms to manage CGIP. (Keywords: Consumer Behavior, Intellectual Property, Innovation Management, New Product Management, Competitive Advantage, Consumers, Product Design)
"Innovations" of copyright and intellectual propertiesWendy Lile
This document discusses innovations in copyright and intellectual property laws. It covers the types of intellectual property protections including copyrights, patents, and trademarks. It then discusses the application processes and statistics for these protections. The document also examines restrictive technologies like digital rights management (DRM) and piracy laws, and how they impact content distribution and mobile access. It concludes by arguing that current intellectual property restrictions mainly benefit large international businesses, rather than individual creators or the U.S. economy.
This document discusses consumer-generated intellectual property (CGIP), which is defined as intellectual property produced by consumers rather than firms. It presents an Emotional Property-Intellectual Property matrix that identifies eight strategies - Cultivate, Coordinate, Cooperate, Capture, Condone, Condemn, Crush, Copy - for firms to manage CGIP based on the level of emotional investment by consumers and the firm's ability to control the IP. The strategies range from positive approaches that balance consumer emotion and IP control, to negative approaches that ignore consumer interests. The document emphasizes the importance of recognizing both the emotional and intellectual property aspects of CGIP when developing strategies.
Two trends are characterized in recent times: value propositions are migrating from physical to informational, and value creation is shifting from firms to consumers. These trends combine to produce the phenomenon of "consumer generated intellectual property" (CGIP). The paper discusses dilemmas firms face in managing CGIP created by consumers. It presents strategies firms can take to control CGIP along a spectrum from cultivating to copying consumer innovations without permission. A key consideration is the level of consumers' emotional investment in their creations independent of intellectual property rights.
This document provides a summary of 3 key chapters from the 8th edition of the textbook "e-commerce, business. technology. society" by Kenneth C. Laudon and Carol Guercio Traver.
The first chapter discusses ethics, law, and e-commerce in virtual worlds like Second Life, including what constitutes mischief, banned behaviors, and debates around enforcing real-world laws. The second chapter covers understanding ethical issues in e-commerce related to privacy, intellectual property, governance, and public safety. The third chapter examines legal and technological approaches to protecting privacy, including the types of data collected online, profiling and behavioral targeting, and the FTC's evolving privacy framework.
1. Some businesses engage in unethical practices like spamming to increase sales, as there are limited online laws and enforcement is done by users.
2. It is important for businesses to have ethical policies and protect customer privacy and security in order to build trust with online customers.
3. Laws aim to protect children's privacy and safety online by restricting data collection and requiring schools to use filtering software. Parents can also monitor children's internet use.
The document discusses the Leahy-Smith America Invents Act (AIA) of 2012, which reformed U.S. patent law by changing it from a "first to invent" system to a "first to file" system. Supporters argue it streamlines the patent process, while critics argue it disadvantages small businesses and entrepreneurs. The document analyzes both sides of the debate and argues that while reforms may be needed, the AIA addressed issues with the previous system and overall patent reform was necessary.
This document provides an overview of key ethical and legal issues related to privacy, intellectual property, governance, and public welfare in e-commerce and on the internet. It discusses debates around topics like the right to be forgotten, behavioral targeting, government surveillance, copyright and patent law, taxation of online sales, net neutrality, and the regulation of online pharmacies. The document is intended to help analyze these complex issues from individual, social, and political perspectives.
What every product manager needs to know about online privacyTrevor Fox
This seminar will introduce the issue and describe the potential for new privacy laws in the US and in the EU that could affect the business model of social medial/Web 2.0/mobile app vendors.
The document provides an overview of the history and evolution of the internet and internet marketing. It discusses:
- The origins of the internet in the 1960s as the ARPANET network and its initial non-commercial use.
- The development of technologies like TCP/IP protocols, email, and the world wide web in the 1990s that helped the internet become commercialized.
- The dot-com boom and bust period of the late 1990s/early 2000s and how internet firms had to adopt more disciplined marketing plans.
- The shift from Web 1.0's focus on connecting people to networks, to Web 2.0's emphasis on user-generated content and social media/networking
The document provides an overview of the nine elements of digital citizenship according to Dr. Clara Bannister. The nine elements are: digital access, digital commerce, digital communication, digital literacy, digital etiquette, digital law, digital rights and responsibilities, digital health and wellness, and digital security. Each element is briefly described in one to three sentences. Resources such as videos and websites are provided for further explanation and student activities related to each element. The goal is to educate about appropriate and responsible use of technology.
Ethical, Social And Political Issues Raised By E CommerceNicholas Davis
This document summarizes the topics and assignments covered in Session Three of the Management 265: Introduction to E-Commerce course. The session covered consumer behavior concepts in internet marketing, how technology supports online marketing, online market research, forms of online marketing communications, how websites function as marketing tools, and ethical issues in e-commerce. Assignments included reading chapters, submitting papers on ethical implications and a case analysis, and continuing work on an e-commerce functions paper. The document also covered various e-commerce concepts and issues like intellectual property, legal/ethical dilemmas, and the Digital Millennium Copyright Act.
4 Trends Shaping the Future of Social Mediaplusaziz
I worked with the Advertising Educational Foundation & Xavier University to develop a presentation for students and academics in marketing | Presentation took place on October 9th, 2014 (a day before my 31st birthday)
2007 presentation to the exec board of a high street bank - the workplace of...Jerry Fishenden
This document discusses how technology is changing the nature of business and work. It argues that offices and traditional work models are becoming outdated as technology enables new flexible and distributed ways of working. The future of work involves ubiquitous connectivity, intelligent environments, and putting users and communities at the center. Organizations must embrace these digital transformations and rethink their strategies, operations, and talent to remain competitive in this new landscape.
Ethical, Social, and Political Issues in E-commerceNor Ayuzi Deraman
Internet, like other technologies, can:
Enable new crimes
Affect environment
Threaten social values
Costs and benefits must be carefully considered, especially when there are no clear-cut legal or cultural guidelines
This document summarizes a presentation given by Ian Brown and Chris Marsden. Some key points:
[1] Brown and Marsden are working on a book about regulating code and internet governance.
[2] They propose developing a "prosumer law" approach that enhances competitive production of public goods like innovation, safety, and democratic rights.
[3] The presentation outlines several case studies that will be analyzed in the book, including data protection, copyright, filtering, social networks, and net neutrality.
The document discusses digital citizenship and its nine key elements:
1. Digital access, referring to equal participation in technology.
2. Digital commerce, regarding online buying and selling legally and responsibly.
3. Digital communication, covering appropriate electronic information exchange.
4. Digital literacy, or learning about technology use and staying informed.
5. Digital etiquette, involving respectful and appropriate online conduct.
Whirlpool presents the volume 2 of the Digital School. Lesson 4 is dedicated to explain who digital natives are and how they behave, with insight for their role in companies and business environment.
Digital technology has enabled powerful global conversations and information sharing through the internet at blinding speeds. This has made markets smarter and able to adapt faster than most companies. It allows simultaneous communication with large groups, reaching more consumers in less time compared to traditional one-on-one interactions. While most internet users freely share and receive information without concerns over payment or copyright, the digital economy involves both sharing information for free and commercial transactions, benefiting some groups while negatively impacting others.
George konstantakis iot and product design360mnbsu
The Internet of Things (IoT) may be at the core of the next Industrial Revolution! The socioeconomic implications of IoT, in general, are astounding. As with all disruptive technology, there are threats and opportunities that must be understood by business leaders. How do these implications relate to the needs of manufacturing businesses and the human resources that are intertwined with them? How can Product Design address those needs? This closing session will explore these questions and offer solutions.
Canadian Copyright Law, Technology and Cultural Management CAMT
The document provides an overview of copyright and the internet from the perspective of artists and copyright lawyers. It discusses how the internet can be used as a platform for promotion, income, and circumventing traditional career paths for artists. It also examines issues for copyright lawyers, such as balancing rights holders' interests with user access. Current Canadian copyright law and proposals for reform are reviewed, including debates around technological protection measures, safe harbors for internet service providers, and other challenges posed by new technologies.
Getting Smart About Intellectual PropertyArvinPatel
U.S. firms leave $1 trillion in potential profits each year by underutilizing their intellectual property. The document discusses how more companies are recognizing intellectual property as valuable business assets and are partnering with experts to better manage their patents, trademarks, and copyrights. As intellectual property becomes more important globally, all companies including small businesses and foreign firms need to understand intellectual property laws to compete effectively in international markets.
This document summarizes a presentation on disruptive technologies and their impact on corporate IT. It discusses how disruptive technologies can permanently change business models, industries, and social norms. Examples discussed include railroads establishing time zones, Ryanair disrupting air travel, and Wikipedia crowdsourcing news media. The document also examines where corporate IT may face disruption, such as from the iPhone app store, and lists various sources that can help identify emerging disruptive technologies early.
This document discusses several legal and ethical issues related to e-commerce, including privacy and information rights, property rights, governance issues, and public safety concerns. It outlines India's Information Technology Act of 2000, which provides the legal framework for e-commerce and addresses cybercrime. Specific issues covered include security threats to e-commerce like hacking and viruses; legal issues involving incorporation, trademarks, and transactions; and the regulation of internet gambling. Ethical concepts around responsibility, accountability, and analyzing dilemmas are also examined.
The orphan works situation across the European Union is still developing, but efforts have progressed farther than in the United States. The EU is focusing more on state-regulated rather than private solutions. Canada allows its Copyright Board to issue compulsory licenses for orphan works after extensive search efforts. The U.S. has struggled to pass legislation and efforts in 2008 supported limited use without permission if a diligent search was made, but did not create a database of orphan works.
This document provides an instructor's manual for a chapter on ethical, social, and political issues in e-commerce. It outlines key teaching objectives around privacy, intellectual property, governance, and public safety issues. It also defines important terms and concepts, provides an overview of the chapter contents, and offers teaching suggestions for facilitating discussion on these complex topics. The document is intended to help instructors teach students to thoughtfully analyze e-commerce through an ethical lens.
Este documento explica los conceptos básicos de los sistemas de telefonía, incluyendo la voz, la PSTN, las PBX y la convergencia hacia la telefonía IP. Describe cómo las ondas de voz se transforman en señales eléctricas y cómo estas se transmiten a través de la red telefónica usando conmutación de circuitos. También introduce conceptos como las centrales telefónicas, las jerarquías en la red y el papel de las PBX en los entornos empresariales.
MENU ? CATERING BY.JEWEL, BANGLADESHI CHEF RESIDENT IN CAIRO
FINE INDIAN, CHINESE, MEXICAN, ITALIAN, CUISINE???
CATERING FOR LARGE OR SMALL PARTTIES
TASTY, HIGH QUALITY, GOOD VALUE MEALS,
DELIVERY TO YOUR HOME
ALL FOOD PREPARED TO THE STRENGTH OF YOUR CHOICE,
(6 hrs Minimum Notice, 24 Hrs Preferred)
Contact- 01227749841, 01114631006
jewel_20032@hotmail.com
INDIAN,
CURRY, beef or chicken, veggie
STIR FRY65, chicken or beef
DUPIAZA, chicken or beef, veggie
JALFREZI, chicken or beef, veggie
KORMA, chicken or beef, veggie
KOFTACURRY,beef,chicken,veggie
BUTTER, chicken or beef, veggie
TIKKACURRY, chicken or beef
GREENCURRY, chicken or beef
REDCURRY, chicken or beef
CHILI, chicken or beef
VINDAALO, chicken or meat
MINCEBEEF, chickpeas or potato
HALEEM, beef or chicken, mutton
NIHARY, beef or chicken, mutton
RICEPULAO,meat,chicken,Veggie
BIRYANI, meat or chicken,veggie
KACCHIBIRYANI,meat or chicken
KASEARI, meat or chicken,veggie
KEBABS, beef or chicken
ROLLSFRY, chicken,beef, veggie
TANDOORY, beef or chicken, fish
PAKORA, chicken or beef, veggie
STIRFRY, mixed veggie
CURRY, chickpeas w/potatoes
CURRY, prawn or filet fish
LENTILS, SPINIACH OR POTATO
Cheese dumpling ?
CHINESE,
CHOW MEIN, beef or chicken
ORANGE, chicken or beef
SWEET SOUR, chicken or beef
SINGAPORENOODLES, meat…
NOODLESOUP, chicken or beef
SWEET SOUR, prawn
STIRFRY, chicken or beef, veggie
DUMPLING, chicken or beef
SPRINGROLLS, chicken or beef
CHINESERICE,beef,chicken,Veggie
WONTONS deep fry beef.chicken
MEXICAN
TAMALES, beef or chicken
FAJITAS, beef or chicken, veggie
ENCHILADAS, beef or chicken
QUESADILLAS, beef or chicken
TACOS, beef or chicken, fish
BURRITO'S, beef ,chicken,veggie
CHILICONCARNE, beef or chicken
CHILAQUILES CHIPS,beef,chicken
NACHOS CHIPS, beef or chicken
MEXICAN, tomato Rice…
Avocado salsa guacamole ?
fresh salsa ?
Roasted salsa ?
ITALIAN
VEAL PICCATA, beef or chicken
LASAGNA, beef or chicken,veggie
BOLOGNESE, beef or chicken
CARBONARA, beef or chicken
ESCALOPE, chicken or beef
CAESAR SALAD, beef or chicken
PIZZA, any kind
PASTA, chicken or beef
PASTA, prawn
TOMATO SAUSE PASTA…
Greek food moussaka ?
This document provides an overview of key ethical and legal issues related to privacy, intellectual property, governance, and public welfare in e-commerce and on the internet. It discusses debates around topics like the right to be forgotten, behavioral targeting, government surveillance, copyright and patent law, taxation of online sales, net neutrality, and the regulation of online pharmacies. The document is intended to help analyze these complex issues from individual, social, and political perspectives.
What every product manager needs to know about online privacyTrevor Fox
This seminar will introduce the issue and describe the potential for new privacy laws in the US and in the EU that could affect the business model of social medial/Web 2.0/mobile app vendors.
The document provides an overview of the history and evolution of the internet and internet marketing. It discusses:
- The origins of the internet in the 1960s as the ARPANET network and its initial non-commercial use.
- The development of technologies like TCP/IP protocols, email, and the world wide web in the 1990s that helped the internet become commercialized.
- The dot-com boom and bust period of the late 1990s/early 2000s and how internet firms had to adopt more disciplined marketing plans.
- The shift from Web 1.0's focus on connecting people to networks, to Web 2.0's emphasis on user-generated content and social media/networking
The document provides an overview of the nine elements of digital citizenship according to Dr. Clara Bannister. The nine elements are: digital access, digital commerce, digital communication, digital literacy, digital etiquette, digital law, digital rights and responsibilities, digital health and wellness, and digital security. Each element is briefly described in one to three sentences. Resources such as videos and websites are provided for further explanation and student activities related to each element. The goal is to educate about appropriate and responsible use of technology.
Ethical, Social And Political Issues Raised By E CommerceNicholas Davis
This document summarizes the topics and assignments covered in Session Three of the Management 265: Introduction to E-Commerce course. The session covered consumer behavior concepts in internet marketing, how technology supports online marketing, online market research, forms of online marketing communications, how websites function as marketing tools, and ethical issues in e-commerce. Assignments included reading chapters, submitting papers on ethical implications and a case analysis, and continuing work on an e-commerce functions paper. The document also covered various e-commerce concepts and issues like intellectual property, legal/ethical dilemmas, and the Digital Millennium Copyright Act.
4 Trends Shaping the Future of Social Mediaplusaziz
I worked with the Advertising Educational Foundation & Xavier University to develop a presentation for students and academics in marketing | Presentation took place on October 9th, 2014 (a day before my 31st birthday)
2007 presentation to the exec board of a high street bank - the workplace of...Jerry Fishenden
This document discusses how technology is changing the nature of business and work. It argues that offices and traditional work models are becoming outdated as technology enables new flexible and distributed ways of working. The future of work involves ubiquitous connectivity, intelligent environments, and putting users and communities at the center. Organizations must embrace these digital transformations and rethink their strategies, operations, and talent to remain competitive in this new landscape.
Ethical, Social, and Political Issues in E-commerceNor Ayuzi Deraman
Internet, like other technologies, can:
Enable new crimes
Affect environment
Threaten social values
Costs and benefits must be carefully considered, especially when there are no clear-cut legal or cultural guidelines
This document summarizes a presentation given by Ian Brown and Chris Marsden. Some key points:
[1] Brown and Marsden are working on a book about regulating code and internet governance.
[2] They propose developing a "prosumer law" approach that enhances competitive production of public goods like innovation, safety, and democratic rights.
[3] The presentation outlines several case studies that will be analyzed in the book, including data protection, copyright, filtering, social networks, and net neutrality.
The document discusses digital citizenship and its nine key elements:
1. Digital access, referring to equal participation in technology.
2. Digital commerce, regarding online buying and selling legally and responsibly.
3. Digital communication, covering appropriate electronic information exchange.
4. Digital literacy, or learning about technology use and staying informed.
5. Digital etiquette, involving respectful and appropriate online conduct.
Whirlpool presents the volume 2 of the Digital School. Lesson 4 is dedicated to explain who digital natives are and how they behave, with insight for their role in companies and business environment.
Digital technology has enabled powerful global conversations and information sharing through the internet at blinding speeds. This has made markets smarter and able to adapt faster than most companies. It allows simultaneous communication with large groups, reaching more consumers in less time compared to traditional one-on-one interactions. While most internet users freely share and receive information without concerns over payment or copyright, the digital economy involves both sharing information for free and commercial transactions, benefiting some groups while negatively impacting others.
George konstantakis iot and product design360mnbsu
The Internet of Things (IoT) may be at the core of the next Industrial Revolution! The socioeconomic implications of IoT, in general, are astounding. As with all disruptive technology, there are threats and opportunities that must be understood by business leaders. How do these implications relate to the needs of manufacturing businesses and the human resources that are intertwined with them? How can Product Design address those needs? This closing session will explore these questions and offer solutions.
Canadian Copyright Law, Technology and Cultural Management CAMT
The document provides an overview of copyright and the internet from the perspective of artists and copyright lawyers. It discusses how the internet can be used as a platform for promotion, income, and circumventing traditional career paths for artists. It also examines issues for copyright lawyers, such as balancing rights holders' interests with user access. Current Canadian copyright law and proposals for reform are reviewed, including debates around technological protection measures, safe harbors for internet service providers, and other challenges posed by new technologies.
Getting Smart About Intellectual PropertyArvinPatel
U.S. firms leave $1 trillion in potential profits each year by underutilizing their intellectual property. The document discusses how more companies are recognizing intellectual property as valuable business assets and are partnering with experts to better manage their patents, trademarks, and copyrights. As intellectual property becomes more important globally, all companies including small businesses and foreign firms need to understand intellectual property laws to compete effectively in international markets.
This document summarizes a presentation on disruptive technologies and their impact on corporate IT. It discusses how disruptive technologies can permanently change business models, industries, and social norms. Examples discussed include railroads establishing time zones, Ryanair disrupting air travel, and Wikipedia crowdsourcing news media. The document also examines where corporate IT may face disruption, such as from the iPhone app store, and lists various sources that can help identify emerging disruptive technologies early.
This document discusses several legal and ethical issues related to e-commerce, including privacy and information rights, property rights, governance issues, and public safety concerns. It outlines India's Information Technology Act of 2000, which provides the legal framework for e-commerce and addresses cybercrime. Specific issues covered include security threats to e-commerce like hacking and viruses; legal issues involving incorporation, trademarks, and transactions; and the regulation of internet gambling. Ethical concepts around responsibility, accountability, and analyzing dilemmas are also examined.
The orphan works situation across the European Union is still developing, but efforts have progressed farther than in the United States. The EU is focusing more on state-regulated rather than private solutions. Canada allows its Copyright Board to issue compulsory licenses for orphan works after extensive search efforts. The U.S. has struggled to pass legislation and efforts in 2008 supported limited use without permission if a diligent search was made, but did not create a database of orphan works.
This document provides an instructor's manual for a chapter on ethical, social, and political issues in e-commerce. It outlines key teaching objectives around privacy, intellectual property, governance, and public safety issues. It also defines important terms and concepts, provides an overview of the chapter contents, and offers teaching suggestions for facilitating discussion on these complex topics. The document is intended to help instructors teach students to thoughtfully analyze e-commerce through an ethical lens.
Este documento explica los conceptos básicos de los sistemas de telefonía, incluyendo la voz, la PSTN, las PBX y la convergencia hacia la telefonía IP. Describe cómo las ondas de voz se transforman en señales eléctricas y cómo estas se transmiten a través de la red telefónica usando conmutación de circuitos. También introduce conceptos como las centrales telefónicas, las jerarquías en la red y el papel de las PBX en los entornos empresariales.
MENU ? CATERING BY.JEWEL, BANGLADESHI CHEF RESIDENT IN CAIRO
FINE INDIAN, CHINESE, MEXICAN, ITALIAN, CUISINE???
CATERING FOR LARGE OR SMALL PARTTIES
TASTY, HIGH QUALITY, GOOD VALUE MEALS,
DELIVERY TO YOUR HOME
ALL FOOD PREPARED TO THE STRENGTH OF YOUR CHOICE,
(6 hrs Minimum Notice, 24 Hrs Preferred)
Contact- 01227749841, 01114631006
jewel_20032@hotmail.com
INDIAN,
CURRY, beef or chicken, veggie
STIR FRY65, chicken or beef
DUPIAZA, chicken or beef, veggie
JALFREZI, chicken or beef, veggie
KORMA, chicken or beef, veggie
KOFTACURRY,beef,chicken,veggie
BUTTER, chicken or beef, veggie
TIKKACURRY, chicken or beef
GREENCURRY, chicken or beef
REDCURRY, chicken or beef
CHILI, chicken or beef
VINDAALO, chicken or meat
MINCEBEEF, chickpeas or potato
HALEEM, beef or chicken, mutton
NIHARY, beef or chicken, mutton
RICEPULAO,meat,chicken,Veggie
BIRYANI, meat or chicken,veggie
KACCHIBIRYANI,meat or chicken
KASEARI, meat or chicken,veggie
KEBABS, beef or chicken
ROLLSFRY, chicken,beef, veggie
TANDOORY, beef or chicken, fish
PAKORA, chicken or beef, veggie
STIRFRY, mixed veggie
CURRY, chickpeas w/potatoes
CURRY, prawn or filet fish
LENTILS, SPINIACH OR POTATO
Cheese dumpling ?
CHINESE,
CHOW MEIN, beef or chicken
ORANGE, chicken or beef
SWEET SOUR, chicken or beef
SINGAPORENOODLES, meat…
NOODLESOUP, chicken or beef
SWEET SOUR, prawn
STIRFRY, chicken or beef, veggie
DUMPLING, chicken or beef
SPRINGROLLS, chicken or beef
CHINESERICE,beef,chicken,Veggie
WONTONS deep fry beef.chicken
MEXICAN
TAMALES, beef or chicken
FAJITAS, beef or chicken, veggie
ENCHILADAS, beef or chicken
QUESADILLAS, beef or chicken
TACOS, beef or chicken, fish
BURRITO'S, beef ,chicken,veggie
CHILICONCARNE, beef or chicken
CHILAQUILES CHIPS,beef,chicken
NACHOS CHIPS, beef or chicken
MEXICAN, tomato Rice…
Avocado salsa guacamole ?
fresh salsa ?
Roasted salsa ?
ITALIAN
VEAL PICCATA, beef or chicken
LASAGNA, beef or chicken,veggie
BOLOGNESE, beef or chicken
CARBONARA, beef or chicken
ESCALOPE, chicken or beef
CAESAR SALAD, beef or chicken
PIZZA, any kind
PASTA, chicken or beef
PASTA, prawn
TOMATO SAUSE PASTA…
Greek food moussaka ?
This document discusses the many services that pharmacists can provide to patients. It begins by noting that 87% of people trust pharmacist advice. It then discusses the PharmD program and evolution of pharmacy education. Pharmacists can provide prescription counseling, advice on over-the-counter medications, medication reconciliation services, immunizations, and help with proper medication disposal. They are well-positioned to help patients safely and effectively use both prescription and over-the-counter medications.
El documento describe la incorporación de tabletas en la educación inicial y primaria. Explica que las nuevas tecnologías están cambiando la forma de enseñar y aprender, por lo que es necesario que las escuelas adopten estas herramientas. Señala que desde 2014 las tabletas se han incluido en la entrega de equipos a nivel inicial y primeros años de primaria. Sin embargo, los docentes tienen dudas sobre cómo usarlas. Por esto, el proyecto busca capacitar a los maestros en el uso y manejo de las tabletas para que pued
O texto encoraja as pessoas a abençoarem suas dificuldades e ajudarem os outros, o que trará mais amparo e liberdade. Quanto mais compreensivos forem com os outros e doarem de si mesmos, mais paz e proteção divina encontrarão. Devemos buscar Jesus em todos, especialmente nos que sofrem, servindo-os e ficando mais felizes sob as bênçãos dele.
El documento proporciona una guía sobre las Normas APA (American Psychological Association) para la presentación de documentos académicos y de investigación. Explica los componentes preliminares como la portada y tabla de contenido, así como aspectos generales sobre formato, citaciones y referencias bibliográficas. Además, brinda ejemplos sobre cómo presentar diferentes secciones como portadas, capítulos y referencias siguiendo el estilo APA.
O documento discute a ampliação da desobsessão por meio da introdução da terapia psicológica nos Centros Espíritas. Defende que os trabalhadores da desobsessão e os encarnados que buscam ajuda devem analisar aspectos como relações familiares, vida intelectual e profissional para uma evolução completa. Também sugere a criação de núcleos terapêuticos nas instituições para atender tanto os trabalhadores quanto aqueles que precisam de desobsessão.
O documento discute as consequências de semear diferentes tipos de sementes na vida, como plantar amor colhe amizade, enquanto plantar discórdia colhe solidão. Ele enfatiza que somos responsáveis por escolher cuidadosamente quais sementes espalhamos ao nosso redor para garantir uma colheita positiva.
O documento discute a importância da família para a sociedade. Afirma que a família é fundamental para o desenvolvimento da sociedade e dos indivíduos, permitindo que valores como amor e sabedoria floresçam. Contudo, nos dias atuais há um ataque injustificado à estrutura familiar, o que causa problemas sociais.
Ter fé significa aceitar os desígnios de Deus mesmo sem compreendê-los, dar quando se precisa dar, e crer quando é mais fácil duvidar. Ter fé também significa guiar a vida com o coração em vez dos olhos, levantar-se após cair, e arriscar-se por sonhos e ideais.
Este poema describe una mariposa herida que lucha por volar a pesar de sus alas rotas, representando la resiliencia del espíritu humano ante la adversidad. El autor, José Guimarães, es un poeta brasileño cuyo sitio web y página de Facebook se proporcionan para aquellos interesados en aprender más sobre él y su trabajo.
A empresa de tecnologia anunciou um novo smartphone com câmera aprimorada, maior tela e melhor desempenho. O dispositivo também possui recursos adicionais de inteligência artificial e segurança de dados aprimorados. O lançamento do novo smartphone está programado para o final deste ano.
El documento describe los protocolos fundamentales de las redes TCP/IP, incluyendo IP, TCP y UDP. Explica cómo funciona el direccionamiento IP y el enrutamiento de paquetes a través de routers. También describe cómo la conmutación de paquetes permite la transmisión simultánea de múltiples flujos de datos a través de una red compartida.
Open branding: Managing the unauthorized use of brand-related intellectual pr...Ian McCarthy
Consumers often innovate with brand-related intellectual property (IP) without permission. Although firms often respond by exercising their legal right to stop such activity, there are a variety of situations in which consumers’ unauthorized use of brand-related IP can be desirable for a brand or in which enforcing IP rights can adversely affect a brand. This article illustrates situations in which managers may benefit from choosing to forgo exercising their IP rights. To assist managers, this article contributes a framework for understanding the managerial approaches to situations in which consumers use IP without permission.
When customers get clever: Managerial approaches to dealing with creative con...Ian McCarthy
Creative consumers (defined as customers who adapt, modify, or transform a proprietary offering) represent an intriguing paradox for business. On
one hand, they can signify a black hole for future revenue, with breach of copyright and intellectual property. On the other hand, they represent a gold mine of ideas and business opportunities. Central to business is the need to create and capture value, and creative consumers demand a shift in the mindsets and business models of how firms accomplish both. Based upon their attitude and action toward customer innovation, we develop a typology of firms’ stances toward creative consumers. We then consider the implications of the stances model for corporate strategy and
examine a three-step approach to dealing with creative consumers: awareness, analysis, and response.
Web 2.0, Social Media and the Creative Consumer.Kelly Page
These slides were delivered to an MBA class about rise of the creative consumer. The slides are beaded on research work by leading scholars: Pierre Berthon (Bentely), Ian Mcarthy (SFU), Leyland Pitt (SFU), Colin Campbel (Monash), Steve Kates (SFU), Hope Schau (Arizona), Albert Muntz (DePaul) and Clay Shirky in his book - Cognitive Surplus.
This document summarizes key points from a lecture and reading about new media institutions and business models. It discusses commercial vs volunteer production of information goods, challenges to strict copyright law, and different strategies for dealing with intellectual property like exclusive rights vs non-exclusive strategies. Key non-exclusive strategies discussed include cost minimization to obtain information inputs at low costs, and reliance on relationships and social networks rather than asserting exclusive rights. The document provides several examples to illustrate different strategies like scholarly lawyers, software publishing, and open source communities.
The document discusses the shift from traditional consumer models to consumer co-creation enabled by new technologies and user-generated content. It provides examples of companies like Procter & Gamble and Lego that have successfully engaged communities to gather feedback and co-create new products and innovations. It also outlines considerations for developing effective communities of creation, such as balancing order and openness, intellectual property management, and incentives for long-term user involvement.
Editorial: User Innovation and the Role of Creative ConsumersIan McCarthy
In recent years, the phenomenon of creative consumers has attracted much research interest. In 2012 for instance, approximately 70 articles in business publications referred specifically to the concept of creative consumers. This and earlier work on creative consumers has helped us to understand who they are, what they are, what they do, and why their activities and outputs are increasingly important to companies. For no longer do business leaders obsess that ideas and innovation must originate from their own firm’s R&D resources. To be competitive, firms now recognise there is significant value in sourcing ideas and innovations from the market place (Kuusisto and Kuusisto, 2013). Like other business activities, including marketing, manufacturing and logistics (see McCarthy and Anagnostou, 2004), innovation is becoming more open, and more outsourced to users, and this is changing the boundaries of the origins, development, and ownership of ideas and intellectual property.
Is Respect for Creativity too much to ask?MaxineHorn
Creative Barcode is a system that aims to protect creative works by allowing creators to add a unique barcode to proposals and concepts before sharing them. The barcode contains the creator's contact details and references simple permission-based terms of use. This system provides a trust-based model for engagement between creators and potential clients or partners. It also generates certificates of ownership transfer once a concept is purchased. The system is designed to address vulnerabilities creators face when exposing unpublished work and the lack of protection for ideas under copyright law alone. It could help galvanize the global community of freelance creators if widely adopted.
The Web Summit 2014 document provides a summary of the key topics, trends, learnings, and insights from the annual technology conference. Some of the major discussions included the continued exponential growth of technology and how it is decreasing the time needed to create value; the shift to more engaged audiences who are creators rather than just consumers; and the importance of storytelling and focusing on the consumer for both tech companies and brands. Privacy, big data, and the future of virtual reality were also highlighted as important issues covered at the event.
This report highlights some of the most popular business trends of the particular point in time in which I wrote this. Spotting out trends is particularly important because it not only proves that you are aware of evolving markets, but also because you develop a keen observation for viable niche markets.
Intellectual property rights in the global creative economy report 2013Giuliano Tavaroli
This document discusses several megatrends driving changes in the global creative economy and intellectual property system. These include new technologies enabling ubiquitous access to content from any location, an increasingly global market, shifting business models away from ownership towards licensed access, greater user involvement in content creation, complex chains of derivative works, and new content distribution and access models using social media and mobile devices. The document aims to help policymakers ensure IP systems adapt to these changes in content creation and consumption.
The FDA’s role in the approval and subsequent review of Vioxx, a.docxmehek4
The FDA’s role in the approval and subsequent review of Vioxx, a pain medication with- drawn from the market by its manufacturer after it was associated with heart attacks and strokes, is discussed in a case at the end of this textbook.
In 2010, Congress established, as part of the Dodd-Frank Act (also discussed in Chapters 8 and 14), a new consumer regulatory body, called the Consumer Financial Pro- tection Bureau. The purposes and actions of this agency are described in Exhibit 15.B. The debate over whether government should become involved in protecting consumer privacy is discussed in the next section of this chapter.
All seven government regulatory agencies shown in Figure 15.2 are authorized by law to intervene directly into the very center of free market activities, if that is considered nec- essary to protect consumers. In other words, consumer protection laws and agencies substi- tute government-mandated standards and the decisions of government officials for decision making by private buyers and sellers.
Consumer Privacy in the Digital Age
In the early 21st century, rapidly evolving information technologies have given new ur- gency to the broad issue of consumer privacy. Shoppers have always been concerned that information they reveal in the course of a sales transaction—for example, their credit card or driver’s license numbers—might be misused. But in recent years, fast-changing tech- nologies have increasingly enabled businesses to collect, buy, sell, and use vast amounts of personal data about their customers and potential customers. The danger is not only that this information might rarely be used fraudulently, but also that its collection represents a violation of privacy and might lead to unanticipated harms.
Individuals are often unaware of how much information about themselves they reveal to others as they shop, interact with friends, play games, or look for information online. A variety of technologies make this possible. Many websites place cookies—or more power- ful Flash cookies—on a computer hard drive, to identify the user during each subsequent visit and to build profiles of their behavior over time. Web beacons embedded in e-mails and websites retrieve information about the viewer. In deep packet inspection, third parties access and analyze digital packets of information sent over the Internet, such as pieces of e-mails or Skype calls, to infer characteristics of the sender. Not just retailers, but also Internet service providers such as Comcast, search engine operators such as Google, and informational services such as Dictionary.com, also track their users. So-called data aggregators purchase and combine data about individuals collected from various sources and compile them into highly detailed portraits to be sold to retailers, service providers, and advertisers.15
An example of a data aggregator is Acxiom Corporation, based in Conway, Arkansas. Acxiom, called the “quiet giant” of the industry, has built the larg ...
This document discusses the evolution of the knowledge economy and how it relates to innovation. It argues that even traditionally "hard" industries like automotive and agriculture rely heavily on new ideas and knowledge. The knowledge economy is most effective when ideas are practically applied. For industries and services to grow, they must commoditize their offerings to scale up. Data analytics is an emerging field that analyzes economic interactions to optimize products and services. Intuit shares small business data with researchers to improve economic measurement and forecasting. The author's company, Qualco, strives to transform innovative ideas into commoditized products and services through a process of continued innovation.
Good Ideas For Argumentative Essays. Online assignment writing service.Crystal Hall
The document discusses the controversy over Chris Ofili's artwork "The Holy Virgin Mary" which was displayed at the Brooklyn Museum of Art. The artwork incorporated elephant dung in its creation, which outraged New York City Mayor Rudolph Giuliani. The summary argues that Giuliani's outrage was misplaced, as other works in the exhibition were more sexually graphic and controversial yet did not receive the same criticism. It suggests Giuliani's reaction targeted the work because it involved a religious subject.
Making a face: Graphical illustrations of managerial stances toward customer ...Ian McCarthy
Creative consumers – consumers who adapt, modify or transform a proprietary offering – represent an intriguing paradox for business. On the one hand they can be a black hole for future revenue, with breach of copyright and intellectual property, while on the other hand they represent a gold mine of ideas and business opportunities. This problem is central to business – business needs to both create and capture value; the problem is that creative consumers demand a shift in the mindsets and business models of how firms both create and capture value. We develop a typology of firms’ stances to creative consumers based upon their attitude and action towards customer innovation. We then consider the implications of the stances model for corporate strategy, and examine a three-step approach to dealing with creative consumers, namely, awareness, analysis and response.
Innovation is demand driven. India is not home to any significant global innovation for the obvious reason -there is no demand for innovations in India. There is demand for innovative products/ services and they are met by imports. Preaching to private sector to invest in R&D has become an annual ritual. Declaration like Innovation Decade exposed hollowness of public policy. Will the government walk the talk?
Digital Banking: Reshaping the Business Model - Alba CéspedesAlba Cespedes
Digital banking is reshaping the traditional banking business model through new digital technologies and changing customer behaviors. Banks must transform by focusing on omnichannel strategies, creating value-added digital products, and maintaining customer relationships as interactions become more digital. While some regions like the UK and Scandinavia are more prepared for digital banking, adoption is happening unevenly across Europe. Banks that fully embrace digital transformation stand to significantly increase revenues and reduce costs.
This document discusses the shift from passive to proactive consumers or "prosumers". It notes that consumers have become less passive and are looking for more substance over marketing images. Prosumers both consume and produce content. The document examines how marketing must change to engage prosumers through transparent communications, fair contract terms, and protecting consumer data security especially as more transactions occur on mobile devices.
2009 03-07 comment les marchés communiqueADN Marketing
The document discusses how the internet has transformed consumers into more active participants through social media and user-generated content. It has created a giant focus group where consumers openly share opinions about products and companies. Companies now must actively engage with consumers online and respond to feedback to build trust and learn what consumers want. The future of marketing involves treating the market as a conversation where companies and consumers openly discuss products.
Chapter 2 Schilling 2017 Sources of Innovationahmdirvan
Individuals, firms, universities, government laboratories, and private non-profit organizations can all be sources of innovation. Firms are well-suited for innovation activities because they have greater resources than individuals and a system to direct those resources. Innovation can come from individuals, either as lone inventors or users designing solutions to meet their own needs. Universities and government laboratories also contribute to innovation through research efforts. Regional clusters can spur innovation through proximity that facilitates knowledge exchange, as seen in technology hubs like Silicon Valley.
THIS IS AN ARTICLE ON THE THEME- "INNOVATE". THE ARTICLE IS PART OF TASK (CONTENT WRITING) UNDER THE CONTENT DEVELOPMENT DOMAIN. THE ARTICLE IS PUBLISHED ON MEDIUM. THIS TASK IS PART OF THE GRIP INTERNSHIP BATCH JANUARY 2022.
Similar to Consumer generated Intellectual Property (20)
This document discusses marketing strategies for financial services companies in an era of ubiquitous technology and digital connectivity, referred to as "U-commerce". It begins by outlining the evolution of technology's impact on the financial services industry. It then introduces the concept of U-commerce and its key characteristics of ubiquity, universality, uniqueness, and unison.
The document proposes a 2x2 framework to help financial services marketers identify objectives and strategies. The objectives are amplification, attenuation, contextualization, and transcension. Corresponding marketing strategies of nexus marketing, sync marketing, immersion marketing, and transcension marketing are presented. Examples specific to financial services are used to illustrate how companies can achieve the objectives through these strategies.
Although the protection of secrets is often vital to the survival of orga- nizations, at other times organizations can benefit by deliberately leaking secrets to outsiders. We explore how and why this is the case. We identify two dimensions of leaks: (1) whether the information in the leak is factual or concocted and (2) whether leaks are conducted overtly or covertly. Using these two dimensions, we identify four types of leaks: informing, dissembling, misdirecting, and provoking. We also provide a framework to help managers decide whether or not they should leak secrets.
Purpose – The status of icewine as a luxury item is largely undisputed in popular perception. Despite this, icewine has received very little attention in the management literature. This paper aims to close this gap by developing a theoretical framework to segment the luxury wine and spirits market with a focus on icewine.
Design/methodology/approach – This paper is conceptual in nature. The authors adapt Berthon et al.’s (2009) aesthetics and ontology (AO) framework for luxury brands to provide a theoretical lens for segmenting the luxury wine and spirits market into four distinct segments.
Findings – The main contribution of this paper is a theoretical framework for segmenting the market for luxury wines and spirits into four distinct segments: cabinet collectors, cellar collectors, connoisseurs and carousers. The authors then apply their framework to the icewine category and outline considerations for the marketing mix of icewine producers.
Practical implications – The AO framework for luxury wines and spirits is bene cial for icewine producers to help differentiate their current and future market segments. In addition, this paper outlines practical implications for icewine maker’s marketing mix that could enhance their competitive position today and in the future.
Originality/value – This is the rst paper examining icewine in the context of luxury marketing.
Purpose – Sometimes consumers express their enthusiasm for a brand by creating brand extensions, products or services in new categories that are closely affiliated with the “parent” brand. This paper aims to examine the positive or negative impact that consumer-generated brand extensions (CGBEs) can have on brand image and revenue, and the options that companies have available to deal with them. Design/methodology/approach – The paper presents a case study of the collectible strategy card game – Magic: The Gathering – and discusses how the company responded to five different brand extensions that were created by players. This case study was used to develop a framework that allows managers to evaluate CGBEs based on their benefits and risks and to select an appropriate response.
Findings – Four possible responses were identified: challenge, criticize, commend and catalyze. Which of these responses is appropriate for companies depends on whether the CGBE has a positive or negative impact on the brand image and revenue and whether this impact is large enough to merit an active response.
Originality/value – This study shows that it is essential for managers to understand how to evaluate CGBEs. Managed properly, they can improve product usage, help generate new customers and have a positive impact on revenue and brand image. However, CGBEs can also have a negative effect, in particular if they are substitutes for the original product.
The verb “simulate,” from the Latin simulare, to copy, repre- sent, or feign, has three distinct meanings in English. First, it can refer to something that imitates the appearance or char- acter of something else, such as when an actor stoops or walks very slowly in order to portray an old person. Second, it can refer to the act of pretending, for example, in a child’s game of “playing house,” in which children pretend to be adults in a home situation. Its third, much more recent mean- ing refers directly to the act of producing a computer model of a complex phenomenon. Interestingly, tracking the use of the word simulate in written work and media over time (as well as its noun form “simulation” and its adjective forms “simulated” and “simulative”) shows a very rapid take-off in the 1950s and from then on. This is almost certainly due to the advent of computers, with their ability to rapidly calcu- late the interaction effects of the large numbers of complex variables that constitute a phenomenon. However, viewing simulation as something that can only be done by computers is, in our opinion, limiting. For the purposes of learning, the real world can indeed be copied, represented, imitated, and pretended, as well as pretended in the marketing classroom.
Wearing safe: Physical and informational security in the age of the wearable ...Simon Fraser University
Wearable computing devices promise to deliver countless benefits to users. Moreover, they are among the most personal and unique computing devices of all, more so than laptops and tablets and even more so than smartphones. However, this uniqueness also brings with it a risk of security issues not encountered previously in information systems: the potential to not only compromise data, but also to physically harm the wearer. This article considers wearable device security from three perspectives: whether the threat is to the device and/or the individual, the role that the wearable device plays, and how holistic wearable device security strategies can be developed and monitored.
This document discusses various innovations in social media. It begins by defining innovation and discussing different types of innovations such as incremental, sustaining, disruptive, and radical innovations. It then explores several areas of social media innovation including social networking, social curation, the mobile experience and streaming, wearables, augmented and virtual reality, and artificial intelligence. For each area, examples of innovative companies and technologies are provided, such as how GoPro utilizes user-generated content in its marketing strategy. The document concludes by discussing challenges and takeaways regarding social media innovation.
There is growing interest in how gamification–—defined as the application of game design principles in non-gaming contexts–—can be used in business. However, academic research and management practice have paid little attention to the challenges of how best to design, implement, manage, and optimize gamification strategies. To advance understanding of gamification, this article defines what it is and explains how it prompts managers to think about business practice in new and innovative ways. Drawing upon the game design literature, we present a framework of three gamification principles–—mechanics, dynamics, and emotions (MDE)–—to explain how gamified experiences can be created. We then provide an extended illustration of gamification and conclude with ideas for future research and application opportu- nities.
Ads are no longer unidirectional or one-dimensional but a blend of offline and online techniques designed to directly interact with the community. For many companies, advertising via online platforms such as YouTube and Vimeo has replaced commercials on television altogether. Recently, branded flash mobs have emerged as a popular form of viral advertising. While many branded flash mobs have experienced millions of YouTube views a metric such as view count does not fully indicate the effectiveness of the ad. This netnographic study evaluates viewers’ attitude toward the ad to better understand the effects of branded flash mobs. After examining 2,882 YouTube comments from three virally successful branded flash mob ads, a typology is developed, referred to as the archetype of consumer attitude matrix, to enable academics to formulate research questions regarding branded flash mobs. These archetypes of consumer attitudes to the online ad, in this case branded flash mobs, aid in the assessment of consumer response based on processing (cognitive versus emotive) and stance (supportive versus antagonistic). This typology also serves as a guide to marketing managers in the use of branded flash mobs in their viral campaigns. The article concludes with recommendations for future research.
This document provides an overview of 3D printing and its potential disruptions and implications. It discusses how 3D printing works using additive rather than subtractive manufacturing. Designs can be created digitally and then printed by adding layers of material until the final product is completed. 3D printing will disrupt traditional manufacturing by allowing on-demand production without large inventories and enabling individuals to print parts and products at home. Firms and consumers will both be impacted, and it raises intellectual property and ethical issues that policymakers will need to address regarding this new technology.
The document provides a list of 33 rules for writing, along with some commentary. The rules advise against various grammatical errors and clichés. They recommend avoiding prepositions at the end of sentences, sentence fragments, unnecessary words, and verbing nouns. The author notes they expanded on a shorter version of the rules they found elsewhere, and invites the reader to provide additional points. The document is signed by Dr. Jan Kietzmann and includes his contact information.
Generation-C - Innovation, UGC, IP laws, Social Media, Hacking, iPhone, DRM, ...Simon Fraser University
Generation-C is a generational movement consisting of creative consumers, those who increasingly modify proprietary offerings, and of members of society who in turn use the developments of these creative consumers. It is argued that their respective activities, creating and using modified products, are carried out by an increasing number of people, everyday, without any moral and legal considerations. The resulting controversies associated with existing intellectual property rights are discussed, and suggestions put forward that the future can only bring conflict if such legislation is not changed so that derivative innovations are allowed to flourish. The article concludes with important messages to organisations, intellectual property rights lawyers, owners of property rights, governments and politicians, suggesting they reconsider their respective stances for the good of society.
Organizations use a variety of labels to refer to their customers — the individuals who use their products and services. These labels (e.g., guests, students, clients, members, patients, users, etc.) suggest different meanings and connotations than being a simple customer. In this paper, we explore traditional labeling theory, and its roots in categorization and semiotic theories, to aid in the understanding of the customer- firm relationship. We then extend and formalize this to a customer labeling theory, in which we posit that a firm’s labels for its customers may shape consumer and organizational attitudes. Therefore, if customers become what marketers call them, then these labels shape the dialog between organizations and their customers. Thus, customer labels indirectly impact the success of firms’ customer relationship management efforts. We discuss customer labeling implications for firms and make suggestions for future academic research.
This conceptual paper discusses eWoM as a coping response dependent on positive, neutral, or negative experiences made by potential, actual, or former consumers of products, services, and brands. We combine existing lenses and propose an integrative model for unpacking eWoM to examine how different consumption experiences motivate consumers to share eWoM online. The paper further presents an eWoM Attentionscape as an appropriate tool for examining the amount of attention the resulting different types of eWoM receive from brand managers. We discuss how eWoM priorities can differ between public affairs professionals and consumers, and what the implications are for the management of eWoM in the context of public affairs and viral marketing.
Innovations in mobile technology shape how mobile workers share knowledge and collaborate on the go. We introduce mobile communities of practice (MCOPs) as a lens for under- standing how these workers self-organize, and present three MCOP case studies. Working from contextual ambidexterity, we develop a typology of bureaucratic, anarchic, idiosyncratic and adhocratic MCOPs. We discuss how variations in the degree of organizational alignment and individual discretion shape the extent to which these types explore and exploit mobile work practices and approach organizational ambidexterity. This article concludes with important strategic implications for managing mobile work and practical considerations for identifying, creating, and supporting MCOPs.
In this paper, we highlight some of the challenges and opportunities that social media presents to researchers, and offer relevant theoretical avenues to be explored. To do this, we present a model that unpacks social media by using a honeycomb of seven functional building blocks. We then examine each of the seven building blocks and, through appropriate social and socio-technical theories, raise questions that warrant further in-depth research to advance the conceptualization of social media in public affairs research. Finally, we combine the individual research questions for each building block back into the honeycomb model to illustrate how the theories in combination provide a powerful macro-lens for research on social media dynamics.
Traditionally, consumers used the Internet to simply expend content: they read it, they watched it, and they used it to buy products and services. Increasingly, however, consumers are utilizing platforms–—such as content sharing sites, blogs, social networking, and wikis–—to create, modify, share, and discuss Internet content. This represents the social media phenomenon, which can now significantly impact a firm’s reputation, sales, and even survival. Yet, many executives eschew or ignore this form of media because they don’t understand what it is, the various forms it can take, and how to engage with it and learn. In response, we present a framework that defines social media by using seven functional building blocks: identity, conversations, sharing, presence, relationships, reputation, and groups. As different social media activities are defined by the extent to which they focus on some or all of these blocks, we explain the implications that each block can have for how firms should engage with social media. To conclude, we present a number of recommendations regarding how firms should develop strategies for monitoring, understanding, and responding to different social media activities.
This document discusses the evolution of surveillance systems from the panopticon concept to modern implementations. It describes three generations of surveillance: 1) the original panopticon prison design, 2) the adoption of CCTV cameras and data mining, and 3) emerging technologies that outsource surveillance to citizens and integrate monitoring into everyday devices. The key limitations of each generation are a lack of cohesion across disparate systems and limited data sharing between systems. Newer technologies aim to increase data capture, coupling of systems, and population monitoring to establish a more effective virtual panopticon.
Minding the gap: Bridging Computing Science and Business Studies with an Inte...Simon Fraser University
For today’s information technology organization, working in teams across functional and even organizational boundaries has become an integral part of every project. When asked about these projects, practitioners regularly report on how grave differences between business professionals and tech- nology teams have negatively affected project performance. The serious gap between how the two sides think, talk and work is systemic already in the training and education of both Business and Computer Science students at the univer- sity level. This paper describes the design of a competitive SFU Innovation Challenge which aims to bridge that gap by tasking interdisciplinary groups to create iPhone application prototypes and related business innovation roadmaps. This document then summarizes the objectives of the SFU Inno- vation Challenge, and reports on the difficulties and posi- tive results that materialized when students combined their technological problem- solving techniques and managerial strategies for effectively confronting real-world problems.
The recent evolution of mobile auto-identification technologies invites firms to connect to mobile work in altogether new ways. By strategically embedding “smart” devices, organizations involve individual subjects and real objects in their corporate information flows, and execute more and more business pro- cesses through such technologies as mobile Radio-Frequency Identification (RFID). The imminent path from mobility to pervasiveness focuses entirely on improving organizational performance measures and metrics of success. Work itself, and the dramatic changes these technologies introduce to the organiza- tion and to the role of the mobile worker are by and large ignored. The aim of this chapter is to unveil the key changes and challenges that emerge when mobile landscapes are “tagged”, and when mobile workers and mobile auto-identification technologies work side-by-side. The motivation for this chapter is to encourage thoughts that appreciate auto-identification technologies and their socio-technical impact on specific mobile work practices and on the nature of mobile work in general.
Discover timeless style with the 2022 Vintage Roman Numerals Men's Ring. Crafted from premium stainless steel, this 6mm wide ring embodies elegance and durability. Perfect as a gift, it seamlessly blends classic Roman numeral detailing with modern sophistication, making it an ideal accessory for any occasion.
https://rb.gy/usj1a2
Call8328958814 satta matka Kalyan result satta guessing➑➌➋➑➒➎➑➑➊➍
Satta Matka Kalyan Main Mumbai Fastest Results
Satta Matka ❋ Sattamatka ❋ New Mumbai Ratan Satta Matka ❋ Fast Matka ❋ Milan Market ❋ Kalyan Matka Results ❋ Satta Game ❋ Matka Game ❋ Satta Matka ❋ Kalyan Satta Matka ❋ Mumbai Main ❋ Online Matka Results ❋ Satta Matka Tips ❋ Milan Chart ❋ Satta Matka Boss❋ New Star Day ❋ Satta King ❋ Live Satta Matka Results ❋ Satta Matka Company ❋ Indian Matka ❋ Satta Matka 143❋ Kalyan Night Matka..
The APCO Geopolitical Radar - Q3 2024 The Global Operating Environment for Bu...APCO
The Radar reflects input from APCO’s teams located around the world. It distils a host of interconnected events and trends into insights to inform operational and strategic decisions. Issues covered in this edition include:
IMPACT Silver is a pure silver zinc producer with over $260 million in revenue since 2008 and a large 100% owned 210km Mexico land package - 2024 catalysts includes new 14% grade zinc Plomosas mine and 20,000m of fully funded exploration drilling.
At Techbox Square, in Singapore, we're not just creative web designers and developers, we're the driving force behind your brand identity. Contact us today.
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.AnnySerafinaLove
This letter, written by Kellen Harkins, Course Director at Full Sail University, commends Anny Love's exemplary performance in the Video Sharing Platforms class. It highlights her dedication, willingness to challenge herself, and exceptional skills in production, editing, and marketing across various video platforms like YouTube, TikTok, and Instagram.
Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...my Pandit
Explore the fascinating world of the Gemini Zodiac Sign. Discover the unique personality traits, key dates, and horoscope insights of Gemini individuals. Learn how their sociable, communicative nature and boundless curiosity make them the dynamic explorers of the zodiac. Dive into the duality of the Gemini sign and understand their intellectual and adventurous spirit.
Starting a business is like embarking on an unpredictable adventure. It’s a journey filled with highs and lows, victories and defeats. But what if I told you that those setbacks and failures could be the very stepping stones that lead you to fortune? Let’s explore how resilience, adaptability, and strategic thinking can transform adversity into opportunity.
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challengesHolger Mueller
Holger Mueller of Constellation Research shares his key takeaways from SAP's Sapphire confernece, held in Orlando, June 3rd till 5th 2024, in the Orange Convention Center.
Top mailing list providers in the USA.pptxJeremyPeirce1
Discover the top mailing list providers in the USA, offering targeted lists, segmentation, and analytics to optimize your marketing campaigns and drive engagement.
Taurus Zodiac Sign: Unveiling the Traits, Dates, and Horoscope Insights of th...my Pandit
Dive into the steadfast world of the Taurus Zodiac Sign. Discover the grounded, stable, and logical nature of Taurus individuals, and explore their key personality traits, important dates, and horoscope insights. Learn how the determination and patience of the Taurus sign make them the rock-steady achievers and anchors of the zodiac.
Part 2 Deep Dive: Navigating the 2024 Slowdownjeffkluth1
Introduction
The global retail industry has weathered numerous storms, with the financial crisis of 2008 serving as a poignant reminder of the sector's resilience and adaptability. However, as we navigate the complex landscape of 2024, retailers face a unique set of challenges that demand innovative strategies and a fundamental shift in mindset. This white paper contrasts the impact of the 2008 recession on the retail sector with the current headwinds retailers are grappling with, while offering a comprehensive roadmap for success in this new paradigm.
Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...
Consumer generated Intellectual Property
1. CGIP:
MANAGING CONSUMER-GENERATED
INTELLECTUAL PROPERTY
Pierre Berthon
Leyland Pitt
Jan Kietzmann
Ian P. McCarthy
Two related trends characterize the recent past: value propositions are migrating from the physical to the
informational, and value creation is shifting from firms to consumers. These two trends meet in the phenomenon
of “consumer-generated intellectual property” (CGIP). This article addresses the question: “How should firms
manage the intellectual property that their customers create?” It explores how CGIP presents important dilem-
mas for managers and argues that consumers’ “intellectual property” should not be leveraged at the expense of
their “emotional property.” It integrates these perspectives into a diagnostic framework and discusses eight strat-
egies for firms to manage CGIP. (Keywords: Consumer Behavior, Intellectual Property, Innovation Management,
New Product Management, Competitive Advantage, Consumers, Product Design)
I
n 2009, when Facebook was in its infancy, its management was amazed
to discover that Vin Diesel, the cult movie star of films such as Pitch Black
and Fast and Furious, had over one million “likes” (he now has well over
86 million). This number was an order of magnitude more than that for
any other person. The traffic Vin Diesel’s content alone attracted undoubtedly
contributed to the social network’s phenomenal growth. As Diesel was later to
remark: “Facebook owes me billions of dollars for boosting its profile.”1
While
Diesel obviously benefitted by gaining exposure on Facebook for his personal
brand, he received not a single cent from Facebook. He did get a phone call from
the social network’s management demanding that he reveal the secret of his
page’s popularity. Worse yet, due to Facebook’s IP policy, the content that Vin
Diesel created on the site, and that drew so many users to Facebook in the first
place, was no longer exclusively his—it now also belonged to Facebook.
Facebook is not alone, but it typifies a significant business phenomenon of
the 21st
century: much of the value and intellectual property nowadays lies in
information generated by customers, consumers, and users, rather than by firms
themselves. Indeed, today, information is increasingly the basis of value, and con-
sumers are considered co-creators thereof, and the entities who actually bring this
CALIFORNIA MANAGEMENT REVIEW VOL. 57, NO. 4 SUMMER 2015 CMR.BERKELEY.EDU 43
2. forth through their use of, and engagement with,
products. This was alluded to by Glazer more than
twenty years ago, who noted “a shift from infor-
mation as a support for the classical (usually phys-
ically based) notion of a product or service toward
information as a wealth-generating asset in its
own right.”2
This is in line with the mindset of
service-dominant logic,3
which holds that instead
of firms marketing to customers, they instead
market, or co-create, with customers. Thus, rather
than a firm marketing goods to its marketplace,
it now exchanges services with that customer
base to the benefit of both parties. This is not only
a phenomenon that concerns social media sites,
which often base their entire business models
upon attracting, collecting, mining, and repurpos-
ing user-generated content to drive ad sales. It
also affects more traditional business models. For
example, Michael Powell was a loyal customer
of retail giant Home Depot. He observed that a
number of Home Depot employees were being injured when cutting wood for
customers at the store. To solve this problem, he developed a finger guard, called
“Safe Hands,” to protect workers from the blades of the radial saws, and demon-
strated it to the company in 2004. Home Depot, delighted with the clever customer’s
idea, then commissioned a third party to manufacture the innovation and installed
it in Home Depot outlets throughout the U.S. When a shocked Michael Powell pro-
tested at the appropriation of his ideas, the company rejected his claim for compen-
sation. Subsequently he took the firm to court, and in 2010 a U.S. district court
judge ordered the company to pay Powell $3M in punitive damages, and a further
$2.8M in legal fees. This was followed by a jury decision that Home Depot should
compensate Powell $15M in restitution.4
This is clearly a creative consumer inno-
vating in and for a company, which in turn treated the consumer disrespectfully by
misappropriating the innovation without compensation or consideration. In the
end, the company suffers both financially and from a reputation perspective. This
case yields three lessons: First, customers can be a valuable source of innovation
for firms; second, firms need to manage these consumer innovations carefully;
and third, if firms manage this process poorly, the financial and legal consequences
can be severe.
While the two examples just presented seem poles apart, they are in fact part
of the same phenomenon, namely, the value of the intellectual property that cus-
tomers generate, and the dilemmas of managing it. While the posting of a “selfie”
on Facebook, and the invention of a safety device might seem of very different
value, the situations are actually not that clear-cut. When the creative offering is
social/symbolic, who creates is critical to the perception of value. In creative offer-
ings that are instrumental/functional, what is created is critical to value. In the case
above, “selfies” or photographs generated massive traffic to Facebook because they
Pierre Berthon is the Clifford F. Youse
Chair of Information Design and Marketing
Strategy at the McCallum School of
Business, Bentley University, USA.
<pberthon@bentley.edu>
Leyland Pitt is the Dennis F. Culver EMBA
Alumni Chair of Business at the Beedie
School of Business, Simon Fraser
University, Vancouver, Canada, and also
Affiliate Professor in the Department of
Industrial Marketing, Royal Institute of
Technology (KTH), Stockholm, Sweden.
<lpitt@sfu.ca>
Jan Kietzmann is an Associate Professor
of MIS and Innovation & Entrepreneurship
at the Beedie School of Business, Simon
Fraser University, Vancouver, Canada.
<jkietzma@sfu.ca>
Ian P. McCarthy is a Professor in
Technology and Operations Management
in the Beedie School of Business at Simon
Fraser University, Vancouver, Canada.
<ian_mccarthy@sfu.ca>
CGIP: Managing Consumer-Generated Intellectual Property
44 UNIVERSITY OF CALIFORNIA, BERKELEY VOL. 57, NO. 4 SUMMER 2015 CMR.BERKELEY.EDU
3. were Vin Diesel’s, whereas the average Facebook member generates only the traffic
of their friends. On the other hand, in the case of the finger guard, “what” the inno-
vation could do matters much more to Home Depot than who created it. People
with good ideas, or those who use their intellect to create something valuable,
are faced with three general choices. They can withhold the idea altogether or
legally protect it outright, both of which might enable them to extract rents from
it. Or, they can share it in the commons. In most cases, it is a choice between pro-
tecting and sharing ideas. Historically, by usually opting to protect their work, firms
and entrepreneurial individuals have generated and exploited intellectual prop-
erty: “creations of the mind” for which exclusive rights are recognized.5
These
exclusive rights pertain to a variety of intangible, non-physical assets, including
musical and artistic works, discoveries and inventions, and words, phrases, sym-
bols, and designs.6
With the exception of trademarks, the intellectual property
legislation in most countries has the broad objective of “promoting progress”
(e.g., the U.S. constitution, article 1, section 8, clause 8). Creators and/or copyright
owners benefit because there is an incentive for inventors and artists to create and
make their work available. The reasoning is that unless they are legally entitled to
capture the full value of their creations and extract rents, those who create and
invent will not have sufficient incentive to do so.
The rise of the information age has seen a major shift not only in the crea-
tion of intellectual property, but also in society’s attitudes towards it, where the
creation and use of modified products are carried out by an increasing number
of individuals, often without any moral and legal considerations.7
The diffusion
of user-generated content has been driven by the internet, which enables the
instantaneous spreading of information at infinitesimally low cost, as well as the
ready availability of inexpensive yet very powerful devices (computers, tablets,
and mobile phones) loaded with innovative software and production tools for
all sorts of applications, ranging from music to movies and cookery to chemistry.
The resulting democratization of creation and production has seen the rise of the
“creative consumer.”8
At the same time, consumer-generated content is becoming
the new intellectual property, and consumers are increasingly creating, not
merely consuming, value for firms. This gives rise to what we term “consumer-
generated intellectual property” (CGIP)—IP produced by consumers rather than
only by firms.
Traditionally, intellectual property has described “a wide variety of property
created by musicians, authors, artists, and inventors,” with the law of intellectual
property typically encompassing “the areas of copyright, patents, and trademark
law.”9
The intentions of these laws are to encourage the development of art,
science, and information by granting certain property rights (such as protection
and exploitation) to those who invent or create. Copyrights, for instance, preserve
“original works of authorship” that are fixed in a tangible form of expression (liter-
ary, dramatic, musical, artistic, and certain other intellectual works, both published
and unpublished) and give the owner the exclusive right to reproduce, alter,
perform, or display the copyrighted work. Patents, on the other hand, require the
detailed public disclosure of a novel and non-obvious invention, product, or
process. Like copyrights, patents are “negative rights,” that is, patents are rights to
CGIP: Managing Consumer-Generated Intellectual Property
CALIFORNIA MANAGEMENT REVIEW VOL. 57, NO. 4 SUMMER 2015 CMR.BERKELEY.EDU 45
4. prevent others from commercially making, using, selling, importing, or distributing
a patented invention without permission.10
Throughout history, musicians, authors, artists, and inventors have created
and consumers have consumed. Now this situation is being turned on its head.
For a variety of reasons, particularly due to modular technologies and the ease of
access to and spreadability of information, consumers are now modifying, appro-
priating, and indeed creating. The notions of intellectual property—who owns
these creations and the rights to them—are becoming increasingly contested. Based
on the existing definition of intellectual property, CGIP might be defined as
“consumer-generated creations of the mind that build upon, change, improve, or
repurpose existing commercial offerings and/or platforms. These include literary
and artistic works; designs; and symbols, names, and images.”11
What is conten-
tious is that owners of proprietary offerings tend to assert that they have the rights
to these innovations, while creative consumers would argue that these works were
the “creations of their minds.”
What makes consumer-generated creations a source of conflict is that, from
the perspective of the firm, it is an issue of money and control, while on the consumer’s
side it is about creativity and emotion. Indeed, any act of creation has both an intellec-
tual and emotional component, as creations are considered part of one’s extended self:
they have both intellectual property and emotional property.12
Emotional property
can be defined as the emotional investment in an act of creation, and the attachment
to the creation itself, such that the creator feels ownership of the creation. Now while
a company may legally appropriate the intellectual component of a consumer’s
creation, the creator less easily divests their emotional investment. Moreover, it is
the consumer’s emotional investment in the creation that drives their subse-
quent decision making and behavior in response to the firm’s actions. As recent
research has shown, it is emotional value that is the primary driver of consumer
decisions.13
The question of how firms should manage CGIP is becoming an increas-
ingly critical dilemma for executives—the majority of whom have probably not
even begun to consider the options, or what approach is optimal in what context.
On the one hand, there is the potential to lose control, not only over the firm’s IP,
but also over the potential innovations and revenue streams from CGIP. On the
other hand, there is the very real possibility of alienating consumers, especially
the most creative consumers, by appearing to be dictatorial and acting like a bully.
Being too controlling might easily reduce the submission of the best content and
ideas, and kill the goose that really can lay golden eggs. These are the issues that
we address in this article.
Building on Borgmann’s philosophy of information which distinguishes
information about reality, information for reality, and information as reality,14
we consider the relationship between types of information and IP. We then con-
struct a framework of the eight strategies available to executives for managing
CGIP, and illustrate these by means of a series of associated short case studies.
While firms may leverage the “intellectual property” that their customers pro-
duce, they should also understand the importance of emotional property to
consumers.
CGIP: Managing Consumer-Generated Intellectual Property
46 UNIVERSITY OF CALIFORNIA, BERKELEY VOL. 57, NO. 4 SUMMER 2015 CMR.BERKELEY.EDU
5. CGIP and the Creative Consumer
Creative consumers are hardly a recent phenomenon. As far back as the
Model T, Ford customers—especially farmers—adapted their cars to perform all
kinds of tasks that the manufacturer had never intended, regularly using them
as a power source for driving generators, mills, and lathes. Ford’s remedy for what
it obviously, although never expressly, viewed as an appropriation of its IP was to
threaten to void the warranty on the vehicle. However, consumer creativity, and
the IP issues it raises, is a far more prevalent issue today, particularly as a result of
networks, product malleability, and the ready availability of inexpensive creativity
tools. Managers can no longer only rely on knee-jerk reactions such as negating
guarantees. The ubiquity of consumer creativity, and its seemingly infinite variety,
require a far more thoughtful managerial approach.
We have two observations: one about the valence of consumer ideas; another
about the complexity of the dilemma that CGIP can pose to managers. First, the
valence of consumer creativity and its effects on the proprietary offerings of firms
(and the IP attached to them) can vary from the negative (and possibly even danger-
ous) to the positive. A negative example is that when sales of methamphetamine
were banned in most countries after World War II, the demand for it as a recreational
drug spawned its production by individuals, who used readily available cold medica-
tions containing the chemical Benzedrine as feeder stock to cook “crystal meth” in
home laboratories. This undesirable development of CGIP led to a prohibition of
over-the-counter medications containing Benzedrine and pseudoephedrine, includ-
ing well-known brands such as Sudafed, Advil Allergy Sinus Caplets, TheraFlu, and
Tylenol Flu NightTime Gelcaps. A more positive example of CGIP comes from Toyota
Motor Corporation, which like many other car manufacturers initially frowned on
people altering their products. However, after learning of the exploits of Toyota Prius
hybrid owner Ron Gremban, whose modifications to his car not only allow him to
achieve far superior engine performance and driving distance, but also to charge it
in his garage, the company now says it may be able to learn from such individuals.
“They’re like the hot-rodders of yesterday who did everything to soup up their cars.
It was all about horsepower and bling-bling, lots of chrome and accessories,” said
Cindy Knight, a Toyota spokeswoman.15
Second, the nature of consumer creativity, and the dilemmas it presents for
managers with regard to intellectual property, ranges on a spectrum from simple
to complex. This can be illustrated by a selection of scenarios on the hacking of
AIBO, Sony’s well-known electronic pet. Sony launched AIBO in 1999. The first
two letters of the acronym (AI) stood for “artificial intelligence,” while the last
two letters (BO) stood for “robot.” The word “AIBO” was also the Japanese word
for “companion,” or “pal.” AIBO could perform certain movements and act out
certain behaviors, and was also programmed to feign emotions such as “missing”
the owners when they were away, and “happy” at seeing them on their return. It
wasn’t long however before some AIBO owners, perhaps bored with the limited
range of actions the $2000 toy could perform, hacked AIBO’s operating system
to make their cyberpets dance, jive, and perform a wide host of “unauthorized”
actions, for which Sony threatened to sue them.16
CGIP: Managing Consumer-Generated Intellectual Property
CALIFORNIA MANAGEMENT REVIEW VOL. 57, NO. 4 SUMMER 2015 CMR.BERKELEY.EDU 47
6. We sketch the CGIP dilemmas that might face managers at Sony with
regard to potential scenarios of the hacking of AIBO (or indeed similar consumer
creativity actions on any other proprietary technologies) on the spectrum, from
simple to complex, in Figure 1 below. It is obvious that the complexity of the
dilemma depends on the nature of the consumer’s creativity, and also the extent
to which the consumer attempts to extract rents from this. In the case of AIBO, if
the consumer hacks the product solely for their own benefit, then concerns about
ownership of IP are low for both the consumer and the firm. A consumer hacking
the product and sharing this information as a member of some community built
around the product/brand would probably find this to be more valuable because
of the social capital it could build for them, but the firm might not be that con-
cerned about this limited exposure. When the consumer not only hacks the prod-
uct, but then also distributes this freely by broadcasting the code online, the firm
will care much more about the IP issues involved. Finally, the stakes are highest
for both the consumer and the firm when the consumer not only hacks the firm’s
product, but then broadcasts and distributes this by selling the hack.
The value of consumer creativity should not be under-estimated. While
some observers of the phenomenon are more skeptical, and believe that truly valu-
able innovation usually comes from within the firm,17
recent empirical evidence
suggests that creative consumers often trump professionals on a number of dimen-
sions. Poetz and Schreier18
staged a real-world competition for ideas between a
firm’s professionals and those generated by users. The challenge was to solve an
effective and relevant problem in the consumer goods market for baby products.
Senior executives within the firm (blind to their source) then judged the submis-
sions along the dimensions of novelty, customer benefit, and feasibility. The
researchers found that user-generated ideas scored significantly higher on novelty
and customer benefit. Perhaps not surprisingly, user-generated ideas scored a little
lower on feasibility, but the average values for feasibility were relatively high over-
all, suggesting that feasibility was not necessarily a serious impediment. As a result
FIGURE 1. The CGIP Complexity of Dilemma Spectrum
Complexity of Dilemma
Creative Activity
Sharing Activity
Concern
about CGIP
ownership Firm
Consumer
Simple Complex
Consumer modifies a product for a special purpose and/or for pleasure.
Not Shared Invention openly
announced and
instructions (such
as code) given
away for free
Invention openly
announced and
given away as an
executable
application for
free
Invention publicly
marketed and
sold as an
application or as
a modified
product
Low
Low Low
Medium
Medium
Medium Medium
High High
High
Invention
privately
announced and
instructions
(such as code)
made available
within a closed
community
CGIP: Managing Consumer-Generated Intellectual Property
48 UNIVERSITY OF CALIFORNIA, BERKELEY VOL. 57, NO. 4 SUMMER 2015 CMR.BERKELEY.EDU
7. of the advantages to be found for firms in exploiting customer creativity, a number
of authors19
have noted the opportunities to be found, and have suggested ways of
managing and encouraging them.20
Alexy, Paola, and Salter21
note that by enabling
consumers to submit ideas, firms gain insight into consumer preferences and con-
sumer engagement with their offerings. This is because customers may have two
types of knowledge: first, knowledge about their own needs and problems; second,
knowledge relevant to the particular firm’s needs and problems—especially related
to problems that the firm might not be able to solve itself, and ideas about offerings
the firm may not have even thought about yet.22
However, these authors go on to add that managing a firm’s interactions with
creative outsiders is complicated by issues regarding the role of intellectual property
ownership and protection, both of which can drive costs and managerial effort. In pre-
vious work, Alexy and his colleagues23
observed that a firm’s IP strategy could either
kill or enable its open innovation activities. This need not be the case, they argue:
firms who use IP strategically will not only benefit from open innovation, which
includes consumer creativity, but also enhance the financial returns they obtain from
it. The work focuses on a broad range of outsiders, including suppliers, collaborators
such as other firms, institutions and universities, and lead users.24
Whereas the broad
groups of such creative outsiders will tend to have a more formal communication
with the firm, creative consumers might not. They might even want to avoid any con-
tact, formal or informal! This raises the question of how firms should think more seri-
ously and comprehensively about intellectual property in the domain of the creative
consumer, or CGIP. Our objective in this article is to provide ways of conceptualizing
CGIP and for firms to develop strategies for dealing with the issues surrounding CGIP.
This necessitates attempting to answer the question: In today’s information age, is
there a correspondence between type of information and type of intellectual prop-
erty? In order to do so, we turn to the work of the philosopher Borgmann.
Types of Information
Borgmann, in his book Holding on to Reality: The Nature of Information at the Turn of
theMillennium,25
providestwocriticalinsightsintothenatureofinformation.First,infor-
mationisheterogeneousandthatdistincttypescanbeobserved;andsecond,eachtypeof
information in its own way shapes our engagement with the world. The first is useful in
exploring the types of intellectual property, the latter in how CGIP might be managed.
Borgmann argues that there are essentially three types of information (see
Figure 2): information about reality, information for reality, and information as reality.
§ Information about reality involves information that in some way reflects or
reproduces some aspect of reality, and includes such things as reports, photo-
graphs, or, more abstractly, maps—these are representation of reality.
§ Information for reality involves injunctions such as musical scores, recipes,
and blueprints—these are instructions on how to shape or change reality.
§ Information as reality involves on the one hand information about information
(meta-information) such as a dictionary, and on the other hand information
for information such as a computer program.
CGIP: Managing Consumer-Generated Intellectual Property
CALIFORNIA MANAGEMENT REVIEW VOL. 57, NO. 4 SUMMER 2015 CMR.BERKELEY.EDU 49
8. Borgmann’s information types constitute a historical progression from
signs of the natural world (for example, spoor indicates the presence of animals,
thunder the imminence of rain), through cultural transmission that involves some
form of performance or enactment (for example, a play has to be acted, a prayer
intoned), to technological information where information constitutes its own real-
ity or “hyper-reality.”
For our purposes of understanding consumer-generated offerings, we do not
need to retain Borgmann’s specification that reality be limited just to the “natural”
world. Indeed, we can replace the term reality with “something” and that “thing”
can have ontological reality within the world that it is constituted. Thus love, as
constituted in the world of emotions, is just as real as a lake in the natural world.
Similarly, the number pi, as conceived in the abstract world of mathematics, is just
as real as a pine tree.
Shared Creations: Their Legal Status
The sharing of ideas has a long history, and individuals have long been
willing to contribute intellect and labor without the expectation of material benefit.
This is how “sharing” differs from “protecting” intellectual creations to exploit
them in a commercial sense. Beginning in 1857, the first Oxford English Dictio-
nary was a huge cooperative project between scholars and individuals throughout
the English-speaking world. T. James Murray acted as editor as part of his other
appointments and commitments and none of the contributors were financially
rewarded.26
In medicine, for “orphan” drugs the markets are relatively small
because the incidence of certain diseases is low. However, since suffering is acute,
many scientists and their employers donate time to researching these products.27
Like open source software, innovations in skateboarding, windsurfing, and snow-
boarding products have been led not by manufacturers but by enthusiasts, who
freely reveal and share their discoveries with all other aficionados.28
FIGURE 2. Types of Information According to Borgmann
Signs, information (I) Information as reality
I R
Information about reality
R I I R
Information for reality
Natural world, reality (R)
CGIP: Managing Consumer-Generated Intellectual Property
50 UNIVERSITY OF CALIFORNIA, BERKELEY VOL. 57, NO. 4 SUMMER 2015 CMR.BERKELEY.EDU
9. What some believe to be open source and others to be proprietary has been
the source of significant conflict. For example, entrenched providers of services,
such as the “branded yoga” of Bikram Choudhury, have been vilified by purists
who demand and assert that an age-old pursuit such as yoga should be available
to all. Some have even established an alliance dedicated to this called OS (“Open
Source”) Yoga Unity.29
Antonio Meucci set up a voice communication link in his Staten Island, NY,
home that connected the second floor bedroom to his laboratory. He submitted a
patent caveat (an antiquated, renewable provisional application and intention to
file a full patent application at a later date, discontinued in the US in 1909) for this
device to the U.S. Patent Office in 1871. However he failed to mention the electro-
magnetic transmission of vocal sound in the document, and also didn’t pay the
annual $10 fee to maintain the patent caveat.30
In 1876, Alexander Graham Bell
was granted a patent for the electromagnetic transmission of vocal sound by
undulating electric current that became the core basis of the modern telephone.
The simple lesson is that the first to file patent owns the creation; if you fail to pro-
tect your idea, someone can come along and patent it. What is the legal status of
shared ideas? The simple answer is that they have none. However, what if you
wanted to consider their legal status before you share your ideas? What options
do you have?
Sharing Creations: Legal Options for Organizations
If organizations want to share their ideas, but at the same time take credit
for them and protect their destinies, they have two options. The first is “copyleft,”
a form of licensing that can be used to maintain selected copyright conditions for
works such as computer software, documents, and art. Under copyleft, creators
may give every person who receives a copy of the work permission to reproduce,
adapt, and distribute it, and they may require that any resulting copies or adapta-
tions are also bound by the same licensing agreement.
A second alternative for organizations is the so-called “open patent.” Open
patented inventions can be freely distributed under a copyleft-like license. These
works can be used as-is, or improved, in which case the patent improvement would
have to be re-licensed to the institution that holds the original patent, and from
which the original work was licensed. This frees all users (individuals and/or other
organizations) who have accepted the license from the threat of lawsuits for patent
infringement, in exchange for their surrendering the right to build up new patents
of their own (in the specific domain for which the original license applies).
Creations: To Protect or to Share?
There are obviously benefits for the organization in both the protecting and
sharing of creations. The fundamental benefit of protecting creations is that the
owner shields the revenue streams that will flow from it. The greatest advantage
of sharing creations is that systemic innovation is promoted and stimulated: This
is why Elon Musk gave away the patents (making them open patents) to Tesla’s
innovative battery technology. His intention is to kickstart the entire electric vehicle
market. These dichotomies are illustrated in Figure 3, juxtaposed against a contrast
CGIP: Managing Consumer-Generated Intellectual Property
CALIFORNIA MANAGEMENT REVIEW VOL. 57, NO. 4 SUMMER 2015 CMR.BERKELEY.EDU 51
10. of whether information is for, or about, creations. This enables us to understand and
compare the notions previously discussed, namely, patents and open patents, and
copyright versus copyleft.
Of course, the ultimate question is, given the revenue stream and exclusion
of competition that information suppression protects, why would organizations
want to share their creations? The reasons, which all organizations need to under-
stand, are three-fold. First, many open source and voluntary contribution com-
munities, consisting of both organizations and consumers, have been described
as “gift economies”31
in which goods and services are given to others with no
reciprocal obligation from the recipients. Sharing is the lifeblood of these commu-
nities. Creativity, innovation, and development services can be considered “gifts”
provided by members of the community. These are in turn combined into a prod-
uct that is “given away” to users, who are not obligated to repay the gift. How-
ever, those who do contribute feedback, bug reports, feature requests, and so on
are helping improve the product in a continuous quality improvement loop.
Second, it enables firms to tap into the sheer personal enjoyment that invent-
ing and showing off their creations provides the consumer. Being the first to change
or hack a product, or the first to solve a major problem means less when the creative
consumers are unable to share their achievements.
Third, the benefits of sharing enable the construction of symbolic capital for
the inventor or creator, be they individual or organization.32
Conversely to econ-
omic capital, the more one gives away, the more symbolic capital one accumulates
FIGURE 3. Types of Information and IP Options
Injunctions to change the world
Promotes
systemic
innovation
Promotes
focal firm
revenue
Descriptions about the world
Information for
Open-
patent
Patent
Copyleft
Information about
Copyright
Closed
IP is protected
Open
IP is shared
CGIP: Managing Consumer-Generated Intellectual Property
52 UNIVERSITY OF CALIFORNIA, BERKELEY VOL. 57, NO. 4 SUMMER 2015 CMR.BERKELEY.EDU
11. in the form of prestige, status, and reputation. Thus, those who give away more
innovations have higher perceived status in the marketplace. Additionally, those
who contribute more creations to their community are held in higher regard and
reputation. Importantly, this alternative form of capital can be converted into econ-
omic (or social) capital, and vice versa.33
For example, from an individual perspec-
tive, George Hotz, who hacked the original iPhone and Sony’s PlayStation 3, gave
these hacks away free. In doing so however, he attracted enormous media atten-
tion, job offers, and awards that benefitted him socially and economically. From
an organizational viewpoint, Microsoft has earned huge symbolic capital and posi-
tive media attention by reversing its initial stance and now embracing and contrib-
uting to the open-source platform Linux.
To summarize, we contend that even in cases of copyrighted or patented
material, organizations may be well advised to work with consumers and encour-
age their innovation. To this end, managers need to consider a range of strategic
options with regard to CGIP.
What are a firm’s strategic options in regard to CGIP?
A firm has two basic options with regard to CGIP: it can either be positively or
negatively disposed to it. The strategies it then adopts toward CGIP will in both cases
range according to whether there is more focus on consumers, more focus on the firm,
or a balance between the two. This will obviously depend on two perspectives: the
extent to which the firm perceives the consumer to have either high or low emotional
property vested in the innovation, and the extent to which the firm has the potential to
control the intellectual property. Following, we describe the eight strategies a firm can
adopt toward CGIP (Figure 4) and illustrate each with a case that typifies it.
Cultivate
Cultivating is a very positive strategy for the consumer, one under which the
firm helps consumers generate IP without any attempt to capture or control it.
A good example of this is Lego and its Mindstorms Robotic Invention System
(RIS), a sophisticated kit with an intelligent brick computer, various sensors and
actuators to build models that can carry out various movements. Soon after the
release, Lego discovered that consumers were hacking the programming language
and developing applications and extensions to the original code.34
Rather than issu-
ing cease and desist letters, Lego embraced the consumers’ creativity and cultivated
CGIP through an online community forum (“a place for you to explore & share your
Robots”) that invited enthusiasts to meet and exchange their builds. However, the
company made no attempt to control or exploit this in any way. What does Lego
get from this? The company garners a fiercely loyal and enthusiastic group of loyal
customers who express their love for the brand by continually innovating with and
contributing to its product mix. Indeed, it would be fair to say that these innovative
customers satisfy all the requirements of the definition of a brand community.35
Coordinate
In the case of the “coordinate” strategy, the firm is positive to CGIP and facil-
itates its creation. It does this not to extract rent from CGIP, but rather because the
CGIP: Managing Consumer-Generated Intellectual Property
CALIFORNIA MANAGEMENT REVIEW VOL. 57, NO. 4 SUMMER 2015 CMR.BERKELEY.EDU 53
12. presence of CGIP will attract customers, from whom rent can then be generated in
other ways, such as through advertising. Facebook is a good example of a “coor-
dinating” firm. There is little intellectual value in the millions of status reports,
photographs, birthday greetings, and jokes that get posted every day. However,
by providing a forum for people to display and share this information, Facebook
enables a process for attracting traffic from hundreds of millions of their friends
on a daily basis, all of whom want to know what is happening in their social
circles. These huge numbers of eyeballs obviously represent substantial advertis-
ing revenue for Facebook.
Cooperate
Under the “cooperate” strategy, the firm encourages consumer creativity in
order to share the returns of CGIP between the firm and the customer. A good
example of this is the firm Threadless.36
Its website hosts a regular competition
in which customers propose designs for T-shirts. Other customers then vote on
these before managers decide which designs get to be manufactured and sold by
Threadless. Threadless has outsourced all creativity to consumers who compete
for the prize and status awarded to the winning design, and all market research
FIGURE 4. CGIP Strategies
CGIP Strategies
Positive
Cultivate
• Strategy: Help consumers generate IP with
no attempt to capture or control
Coordinate
• Example: Lego
• Strategy: Use CGIP to attract customers
(but not extract rent from CGIP)
• Example: Facebook
Cooperate
Capture
• Strategy: Share CGIP between the firm and
the consumer
• Example: Threadless
• Strategy: Take CGIP for the firm
• Example: Quirky
Negative
Condone
• Strategy: Turn a blind eye
• Example: Music industry & YouTube
Condemn
• Strategy: Oppose and lobby, but due to
legal reasons cannot prevent
• Example: Apple and Jailbreak
Crush
• Strategy: Legally pursue CGIP that builds
on or purportedly threatens your IP
• Example: Sony Aibo
Copy
• Strategy: Ignore the customer, and simply
appropriate the customer’s innovation by
copying it without permission
• Example: Home Depot and Michael Powell
Consumer
ControlofCGIP
Firm
CGIP: Managing Consumer-Generated Intellectual Property
54 UNIVERSITY OF CALIFORNIA, BERKELEY VOL. 57, NO. 4 SUMMER 2015 CMR.BERKELEY.EDU
13. to individuals in the crowd who, through their votes, signal approval and inten-
tions to purchase particular T-shirt designs.
Capture
Under the “capture” strategy, the firm positively encourages consumers to
generate CGIP that it then captures as its own in order to advance its business.
For example, the invention company Quirky invites individuals to submit new
product ideas to their site for consideration. If an idea is favorably received by the
Quirky community and its management, it is then developed into a prototype
and in many cases eventually turned into a commercial product. In exchange for
Quirky funding this development process, the inventor assigns all IP to Quirky. If
the product is a commercial success, Quirky shares some of the profit with the
inventor and the community, but retains the IP into perpetuity. Many products
developed in this way are simple household products (the best-seller is a bendable
power strip of which over 600,000 have been sold) that can be found for sale in
Best Buy, Bed Bath & Beyond, Target, and on Amazon.
Condone
In the case of the “condone” strategy, the firm is essentially negative to CGIP,
but simply turns a blind eye to it rather than confronting consumers. Jill and Kevin
had an interesting and different dance procession down the aisle for their wedding,
to the beat of Sony artist Chris Brown’s song “Forever.” They posted the video on
YouTube, and it has received more than 100 million views to date. Sony would have
been within its rights to demand its removal as an infringement of copyright.37
How-
ever, the firm chose to take no legal action—perhaps because it didn’t want to appear
a bully or more probably because the artist had serious PR problems as the result of a
recent court case, and the happy video was a way of rehabilitating that. Nowadays, it
would appear that many music firms simply condone the infringement of their copy-
right when consumers include music videos of their artists on video sharing sites such
as YouTube, unless they do so for commercial intent.
Condemn
Under the “condemn” strategy, firms clearly disapprove of what they per-
ceive to be infringements of their IP. They might actively lobby against such activi-
ties and also retaliate by refusing to honor the warranty of products that have been
tampered with. However, firms stop short of actively pursuing consumers or taking
legal action. For example, Apple has expressed its opposition to the “jailbreaking”
of its iPhones, broadcast that the warranties on jailbroken iPhones are invalid,
and continually attempted to render the iPhone unhackable. However, it has not
yet prosecuted those who develop or execute the jailbreak.
Crush
Those firms that adopt a “crush” strategy toward CGIP will take decisive
action against consumer IP violations. For example, when Jose Avila made furni-
ture for his apartment exclusively from Federal Express boxes and displayed them
on a website, FedEx immediately sent him a cease and desist letter demanding that
CGIP: Managing Consumer-Generated Intellectual Property
CALIFORNIA MANAGEMENT REVIEW VOL. 57, NO. 4 SUMMER 2015 CMR.BERKELEY.EDU 55
14. he stop using the boxes for purposes other than what they had been intended for,
and take down the website.38
Similarly, Sony originally sued owners who had
hacked their AIBO pet to perform actions that “had not been authorized” by Sony.
Copy
Under the “copy” strategy, firms ignore the customer and simply appropriate
the customer’s invention by copying it, without explicit permission. This may be a
sin of omission (simply being unaware of the customer), or one of commission
(purposely ignoring the customer, and banking on the asymmetry of power
between firm and customer). Whether Home Depot was merely unaware of where
Michael Powell’s innovation had come from, or whether they had purposely disre-
garded the source, is not the point. The fact remains, that the firm was found to
have copied his intellectual property.
Combining Intellectual and Emotional Property
As we have seen, CGIP presents a number of interesting dilemmas for man-
agers: dilemmas of ownership, dilemmas of control, dilemmas of perception, and
ultimately dilemmas of the purpose of the firm. Managers are forced to weigh the
benefits and costs of consumer-generated intellectual property, consider whether
to exercise exclusive control or to share the CGIP, and the effect that their actions
will have on consumers’ perceptions of the firm and indeed their future willingness
to engage. These dilemmas range from simple to complex as the impact of CGIP on
the firm’s offering increases; it becomes especially acute when CGIP constitutes the
bulk of the firm’s offering (as is the case with Facebook, Threadless, and Quirky).
This leads us to the question of how to manage intellect and emotion.
Information as Reality and Information as Engagement
Although intellectual property focuses on information about and informa-
tion for reality, many of the interactions, particularly online, are de facto composed
of Borgmann’s third type of information: information as its own reality. Now
while Borgmann saw this as an alienation from the natural world, Verbeek39
views this as an ambivalent mediator of reality. Having reinstated this third type
of information, Verbeek goes on to argue that technology information existentially
realizes and hermeneutically represents; that is, technological information enables
modes of action and interaction while shaping (amplifying and attenuating) inter-
pretations and experiences. The point is that technological information is a mode
of engagement in and of its own right. One does not have to go far to realize this:
you are what your Facebook page says you are, a product’s quality is what it is
rated as by consumers—both independent of the physical reality of you or of a
product’s quality. While the technological information and physical reality may
be correlated, the relationship is a lot looser than some would believe.
From Intellectual Property to Emotional Property
If we view information as a mode of engagement, we can see that experien-
tially it has both an emotional (visceral, subjective) as well as an intellectual (factual,
CGIP: Managing Consumer-Generated Intellectual Property
56 UNIVERSITY OF CALIFORNIA, BERKELEY VOL. 57, NO. 4 SUMMER 2015 CMR.BERKELEY.EDU
15. objective) component. Information is both comprehended and felt; it is a creation of
the heart and of the head. This is an important point to bear in mind when managing
CGIP, for the management of intellectual property is about the management of only
one side of engagement. Effective management of CGIP without taking cognizance
of the emotional aspect can be problematic. Thus we have proposed a complemen-
tary term to intellectual property: emotional property. If intellectual property is
defined as legal rights to creations of the mind, emotional property can be defined
as the emotional investment in or attachment to creations of the heart and mind.
Viewed this way, the backlash against certain companies’ appropriation of
CGIP could have been expected. For while a company can capture CGIP, it cannot
appropriate or negate the emotional investment that consumers have in their cre-
ations. Thus the manner in which CGIP is appropriated and to what ends it is used
become important considerations. Firms need to contemplate how overtly or covertly
they assume CGIP and whether the ends to which the CGIP is put is assonant or
dissonant with consumers’ emotional values. Recognizing the de facto existence of
consumers’ emotional property and its experiential legitimacy (even if it has no
legal status) should lead managers to always ask the question: what meaning does
this IP have to the consumer? For example, the re-use of a person’s picture in pro-
motion of a social media site may have very different reactions if that person had
recently died. The emotional property principle might be: “understand and ask.”
That is, understand the meaning and seek permission, regardless of whether you
own the IP or not.
Emotional property is exclusive to the consumer, and its value can range
from low to high. For example, a simple product review on Amazon may represent
low emotional property to the poster. In contrast, a piece of music that a consumer
has composed, recorded, and posted on YouTube might have high emotional prop-
erty to its creator. Firms usually only care about intellectual property and their con-
trol over it. In Michael Powell’s case, his invention represented high intellectual
property to Home Depot, but also high emotional property to Powell himself—a
combination for which some strategies are much more appropriate than others.
We explore these relationships further in the matrix in Figure 5, which combines
the value of the emotional property to the consumer and the firm’s potential to
control the intellectual property. We use the term “potential control,” as there is
always a cost and an uncertainty element in the attempt to exercise control. For
example, car manufacturers could sue consumers who hack the engine maps of
their cars (the code is copyrighted), but the cost in terms of legal fees and negative
publicity combined with the uncertainty of legal outcomes has, to date, deterred
them. We term the resulting grid the “EPIP” (Emotional Property-Intellectual
Property) matrix.
We can also map the 8 Cs previously referred to onto the four quadrants of
the EPIP matrix to offer managerial diagnostics and advice. The logic of the EPIP
matrix is as follows: along the horizontal axis, the Cs run in sequence from less to
more control that the firm can potentially exercise over the CGIP. Consumers nat-
urally try to maximize their own interests. Undeniably, they prefer it when firms
respond with the most positive strategies (from Figure 4), but even when firms
adopt a negative stance towards CGIP, consumers support strategies that allow
CGIP: Managing Consumer-Generated Intellectual Property
CALIFORNIA MANAGEMENT REVIEW VOL. 57, NO. 4 SUMMER 2015 CMR.BERKELEY.EDU 57
16. them to retain the most control over their IP. Thus positive and negative strategies
map onto the vertical axis.
Managers can use the EPIP matrix to gain insight into the nature of the con-
sumer’s intellectual contribution. The firm first needs to gauge the value of the intel-
lectual property to itself and the extent to which it has the potential to control it.
Then it must ascertain the value of the emotional property to the creative consumer;
and, having done this, it must then adopt one of the appropriate Cs as its strategy. We
discuss each of the four quadrants and their optimal associated strategies in turn.
Where the creation has low emotional property value to the consumer, as
well as low control over intellectual property value by the firm, the strategic options
are to condone or to condemn. Jill and Kevin obviously had a high emotional attach-
ment to their wedding and the wedding dance. They just so happened to choose the
Chris Brown song, which was not really central to their creativity, and they could
conceivably have used any similar piece of music. While their choice represented
an infringement of Sony’s copyright, the firm chose to condone their action and this
had positive results for the firm. Consumers who created jailbreaks for the Apple
iPhone obviously had high emotional stakes in their innovations. While Apple
did not approve of their actions, the firm realized that the costs of either pursuing
them directly, or alternatively embracing them would be prohibitive. The firm
therefore merely chose to condemn them.
Where the creation has high emotional property value to the consumer, but
the firm has limited potential to control the intellectual property, the strategic
options are to cultivate or to coordinate. When Lego learned of consumers hacking
FIGURE 5. Emotional Property-Intellectual Property (EPIP) Matrix
High
Consumer’s
Emotional
Property
Low
Firm’s Potential Control of CGIPLow High
Cultivate
Coordinate
Cooperate
Capture
Condone
Condemn
Crush
Copy
CGIP: Managing Consumer-Generated Intellectual Property
58 UNIVERSITY OF CALIFORNIA, BERKELEY VOL. 57, NO. 4 SUMMER 2015 CMR.BERKELEY.EDU
17. its product and creating new code, it chose to cultivate their creativity, and by doing
so enabled innovation to grow and a brand community to evolve. The emotional
property value of a single selfie to an individual on Facebook is relatively low,
and is also of relatively low intellectual property value to Facebook. The firm there-
fore chooses to adopt the positive strategy of coordinating the CGIP efforts of millions
of individuals and facilitating their creation. The presence of countless millions of
individual CGIP contributions in turn attracts customers, from whom rent can then
be generated.
Where the creation has low emotional property value to the consumer, and
the firm has high potential to control the intellectual property, the strategic choices
are to crush or to copy. Perceiving the hacks by individual owners of its AIBO prod-
uct had low emotional property value to them, Sony chose to crush their efforts by
issuing cease and desist letters. Home Depot perceived (wrongly) that Michael
Powell’s innovation had low emotional property value to him. Instead of cooperat-
ing with Powell, the firm chose to copy his invention. While this might have been a
feasible, if somewhat unethical strategy if the consumer had been unable to fight
back, in this particular case the strategy failed badly for Home Depot.
Finally, in the instance where the creation has high emotional property value
to the consumer and the firm has high potential to control the intellectual property,
the strategic choices are to cooperate or to capture. Threadless chooses to cooperate with
its customers, because it realizes that their designs have high emotional property
value to them and also represent high intellectual property value to the firm. Impor-
tantly, Threadless shares the intellectual property with the consumer. However,
while the individual innovation efforts of Quirky’s customers are of high emotional
value to them, and they also represent valuable intellectual property to the firm,
Quirky chooses to capture this value. Unlike Threadless, Quirky takes exclusive
ownership of the IP for all successful submissions, and the contributor may or may
not be compensated, depending on the idea’s eventual commercialization.
Conclusion
We have explored the phenomenon of consumer-generated intellectual
property that arises when consumers rather than firms contribute content, inno-
vate, modify, hack, or in other ways change or add value to the offerings of organ-
izations. CGIP raises critical issues for managers who need to consider how their
firms are going to deal with the myriad of problems and opportunities it raises.
Obviously, the complexity of managing CGIP varies considerably, and this com-
plexity varies with the value of the CGIP to both consumers and firms. Borgmann’s
insights into the types of information provide us with a lens for understanding the
nature of CGIP and the legal actions firms might take in this regard. A firm’s stances
towards CGIP can be either positive or negative and there are four positive and four
negative strategies that firms can implement in dealing with CGIP. However, we
distinguish between intellectual property (which firms might care about more)
and emotional property (which consumers might be more concerned with). We
suggest the use of the EPIP matrix that allows managers to devise the appropriate
strategies to deal with any conceivable CGIP issue that might arise.
CGIP: Managing Consumer-Generated Intellectual Property
CALIFORNIA MANAGEMENT REVIEW VOL. 57, NO. 4 SUMMER 2015 CMR.BERKELEY.EDU 59
18. The information contained in intellectual property generated by consumers
has almost everything in common with the notion of information as a commodity,
as discussed by Glazer.40
In describing the “value of information,” he notes that
unlike the typical economic good, information is not easily divisible; it is non-
appropriable, abundant, and rarely exhibits decreasing returns to use. The intellec-
tual property generated by a consumer can usually be shared with other consumers
and firms. Unlike a physical good, when a consumer gives information away, they
still have it for themselves. CGIP is plentiful, partially because of the modularity of
many products, and also because of the ease with which consumers can now com-
municate, share, and improve their ideas. This is why it has an increasing return to
use. Finally, the idea-generative activity of consumers does indeed “feed on itself.”
As we saw in the Lego case, the more consumers who contribute, the more active
the community becomes, the more new members join, and the more they in turn
contribute. Not only do the numbers of ideas and contributions increase: the qual-
ity does as well: “This creates both the demand and conditions for production of
subsequent [contributions].”41
Emotional property constitutes an important issue that has not previously
been raised in the consumer innovation or marketing literatures. As we show, firms
should take emotional property very seriously and deal with it carefully when
encountering creative consumers. Managers should work hard at understanding
the value of emotional property, because getting it wrong can have disastrous legal,
financial, and reputational consequences for the firm.
Until recently, firms have focused on the exchange of manufactured
goods,42
embedded value, and transactions. Now, a new dominant logic is emerg-
ing in which not only marketing, but indeed the entire outlook of organizations
has shifted to a “continuous social and economic process”43
in which the consum-
ers as creators and co-creators play a far more equitable role. Astute managers will
look beyond the boundaries of the organization to evaluate not only the intellec-
tual, but also the emotional property of creative consumers, and select their CGIP
strategy accordingly.
Notes
1. A. Loinaz, “Diesel says Facebook owes him “billions of dollars” for boosting the sites profile,”
Entertainment Weekly, May 13, 2013, <http://ca.eonline.com/news/418116/vin-diesel-says-
facebook-owes-him-billions-of-dollars-for-boosting-site-s-profile>, accessed October 14, 2014.
2. R. Glazer, “Marketing in an Information-Intensive Environment: Strategic Implications of
Knowledge as an Asset,” The Journal of Marketing, 55/4 (October 1991): 1-19.
3. S.L. Vargo and R.F. Lusch, “Evolving to a New Dominant Logic for Marketing,” Journal of Market-
ing, 68/1 (January 2004): 1-17; L.A. Bettencourt, R.F. Lusch, and S.L. Vargo, “A Service Lens on
Value Creation: Marketing’s Role in Achieving Strategic Advantage,” California Management
Review, 57/1 (Fall 2014): 44-66.
4. M.E. Kabay, “Michael Powell gives The Home Depot the finger (guard),” 2010, <www.network-
world.com/article/2212203/data-center/michael-powell-gives-the-home-depot-the-finger–guard-.
html>, accessed February 15, 2014.
5. Richard Raysman, E.A. Pisacreta, S.H. Ostrow, and K.A. Adler, Intellectual Property Licensing:
Forms and Analysis (New York, NY: Law Journal Press, 1999) p. 1-650.
6. D.J. Teece, “Capturing Value from Knowledge Assets,” California Management Review, 40/3
(Spring 1998): 55-79.
CGIP: Managing Consumer-Generated Intellectual Property
60 UNIVERSITY OF CALIFORNIA, BERKELEY VOL. 57, NO. 4 SUMMER 2015 CMR.BERKELEY.EDU
19. 7. J.H. Kietzmann and I. Angell, “Generation-C: Creative Consumers in a World of Intellectual
Property Rights,” International Journal of Technology Marketing, 9/1 (2014): 86-98.
8. E. Mollick, “Tapping into the Underground,” MIT Sloan Management Review, 46/4 (Summer
2005): 21-24.
9. West’s Encyclopedia of American Law (Detroit, MI: Thomson/Gale, 2008).
10. World Intellectual Property Organization, “FAQs: Patents,” 2014, <www.wipo.int/patents/en/
faq_patents.html>, accessed October 14, 2014.
11. World Intellectual Property Organization, “What is Intellectual Property?” 2015, <www.wipo.
int/about-ip/en/>, accessed February 15, 2015.
12. M. Csikszentmihalyi and E. Halton, The Meaning of Things: Domestic Symbols and the Self (Cambridge:
Cambridge University Press, 1981).
13. G.F. Loewenstein, E.U. Weber, C.K. Hsee, and N. Welch, “Risk as Feelings,” Psychological Bulletin,
127/2 (March 2001): 267; F. Dolcos, A.D. Iordan, and S. Dolcos, “Neural Correlates of Emotion–
Cognition Interactions: A Review of Evidence from Brain Imaging Investigations,” Journal of
Cognitive Psychology, 23/6 (2011): 669-694.
14. A. Borgmann, Holding on to Reality: The Nature of Information at the Turn of the Millennium (Chicago,
IL: University of Chicago Press, 1999).
15. T. Molloy, “Engineers modify hybrid cars to get up to 250 mpg,” 2005, <http://usatoday30.
usatoday.com/tech/products/gear/2005-08-14-hybrid-tinkering_x.htm>, accessed October 14,
2014.
16. J. Deighton and L. Kornfeld, “Sony and the JK Wedding Dance,” Harvard Business School
Case 510-064, 2012.
17. R.C. Bennett and R.G. Cooper, “The Misuse of Marketing: An American Tragedy,” Business
Horizons, 24/6 (November/December 1981): 51-61.
18. M.K. Poetz and M. Schreier, “The Value of Crowdsourcing: Can Users Really Compete with
Professionals in Generating New Product Ideas?” Journal of Product Innovation Management,
29/2 (March 2012): 245-256.
19. R.V. Kozinets, A. Hemetsberger, and H.J. Schau, “The Wisdom of Consumer Crowds Collective
Innovation in the Age of Networked Marketing,” Journal of Macromarketing, 28/4 (December
2008): 339-354.
20. A.M. Muñiz Jr. and H.J. Schau, “How to Inspire Value-Laden Collaborative Consumer-Generated
Content,” Business Horizons, 54/3 (May/June 2011): 209-217.
21. O. Alexy, A. Salter, and P. Criscuolo, “Managing Unsolicited Ideas for R&D,” California Manage-
ment Review, 54/3 (Spring 2012): 116-139.
22. E. Von Hippel, “Democratizing Innovation: The Evolving Phenomenon of User Innovation,”
International Journal of Innovation Science, 1/1 (2009): 29-40.
23. Alexy, Salter, and Criscuolo, op. cit.
24. E. Von Hippel, “Lead Users: A Source of Novel Product Concepts,” Management Science, 32/7
(July 1986): 791-805.
25. Borgmann, op. cit.
26. S. Winchester, The Surgeon of Crowthorne: A Tale of Murder, Madness and the Oxford English Dictio-
nary (London: Penguin, 2002).
27. “An Open-Source Shot in the Arm?” The Economist, 371/8379 (2004): 17-19.
28. S. Shah, “Sources and Patterns of Innovation in a Consumer Products Field: Innovations in
Sporting Equipment,” Sloan Working Paper, 2000.
29. B. Choudhury, “The Litigious Yogi,” The Economist, 371/8380 (2004): 64.
30. G.E. Schiavo, Antonio Meucci: Inventor of the Telephone (New York, NY: Vigo Press, 1958).
31. M. Bergquist and J. Ljungberg, “The Power of Gifts: Organizing Social Relationships in Open
Source Communities,” Information Systems Journal, 11/4 (October 2001): 305-320.
32. P. Bourdieu, Outline of a Theory of Practice, Volume 16 (Cambridge: Cambridge University Press,
1977).
33. Ibid.
34. A. Sundelin, “Business Model Example: LEGO—Turning Users into Product Developers,”
2009, <http://tbmdb.blogspot.ca/2009/12/business-model-example-lego-turning.html>,
accessed October 14, 2014.
35. J.H. McAlexander, J.W. Schouten, and H.F. Koenig, “Building Brand Community,” Journal of
Marketing, 66/1 (January 2002): 38-54; H.J. Schau, A.M. Muñiz Jr., and E.J. Arnould, “How
Brand Community Practices Create Value,” Journal of Marketing, 73/5 (September 2009): 30-51.
36. K.R. Lakhani and Z. Kanji, “Threadless: The Business of Community,” Harvard Business
School Case no. 9-608-707, 2008, p. 608-707.
CGIP: Managing Consumer-Generated Intellectual Property
CALIFORNIA MANAGEMENT REVIEW VOL. 57, NO. 4 SUMMER 2015 CMR.BERKELEY.EDU 61