Value Capture and Value Networks in Open Source Vendor Strategies

Firms involved in open source software face inherent limits on their ability to appropriate returns from technological innovation. Here the author examines the business models used by IT vendors given the limited appropriability available for open source software. The author shows how firms capture value through complementary assets, while creating value and positive network effect through an inherent openness that attracts complementors, users and rivals to their corresponding value network. From this, this article offers suggestions for future research on complementary assets and value capture in business models

[1]  Michael Barnett The Keystone Advantage: What the New Dynamics of Business Ecosystems Mean for Strategy, Innovation, and Sustainability , 2006 .

[2]  Geoffrey A. Moore Crossing the chasm : marketing and selling high-tech products to mainstream customers , 1999 .

[3]  W. Arthur,et al.  Increasing returns and the new world of business. , 1996, Harvard business review.

[4]  J. Magretta Why business models matter. , 2002, Harvard business review.

[5]  Allan Afuah How much do your co-opetitors' capabilities matter in the face of technological change? , 2000 .

[6]  D. Teece Capturing Value from Knowledge Assets: The New Economy, Markets for Know-How, and Intangible Assets , 1998 .

[7]  H. J. Smith,et al.  The power of business models , 2005 .

[8]  Mikko Välimäki,et al.  The rise of open source licensing : a challenge to the use of intellectual property in the software industry , 2005 .

[9]  Øystein D. Fjeldstad,et al.  CONFIGURING VALUE FOR COMPETITIVE ADVANTAGE: ON CHAINS, SHOPS, AND NETWORKS , 1998 .

[10]  Kevin Crowston,et al.  Core and Periphery in Free/Libre and Open Source Software Team Communications , 2006, Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06).

[11]  M. Porter Competitive Advantage: Creating and Sustaining Superior Performance , 1985 .

[12]  Jason L. Dedrick,et al.  Innovation and Control in Standards Architectures: The Rise and Fall of Japan's PC-98 , 2000, Inf. Syst. Res..

[13]  Mark J. Safferstone Information Rules: A Strategic Guide to the Network Economy , 1999 .

[14]  Siobhan O’Mahony Guarding the commons: how community managed software projects protect their work , 2003 .

[15]  C. Oliver SUSTAINABLE COMPETITIVE ADVANTAGE: COMBINING INSTITUTIONAL AND RESOURCE- BASED VIEWS , 1997 .

[16]  John Cullen,et al.  Democratizing Innovation , 2020, Encyclopedia of Creativity, Invention, Innovation and Entrepreneurship.

[17]  A. Strauss,et al.  The discovery of grounded theory: strategies for qualitative research aldine de gruyter , 1968 .

[18]  D. Teece Profiting from technological innovation: Implications for integration, collaboration, licensing and public policy , 1993 .

[19]  Jean Hartley,et al.  Case study research , 2004 .

[20]  Mikko Välimäki Dual Licensing in Open Source Software Industry , 2002 .

[21]  R. Amit,et al.  Value creation in E‐business , 2001 .

[22]  Kieran Healy,et al.  The Ecology of Open-Source Software Development , 2003 .

[23]  R. Yin Case Study Research: Design and Methods , 1984 .

[24]  Joel West,et al.  How open is open enough?: Melding proprietary and open source platform strategies , 2003 .

[25]  Pamela Samuelson,et al.  A new view of intellectual property and software , 1996, CACM.

[26]  L. Berlin From Airline Reservations to Sonic the Hedgehog: A History of the Software Industry , 2005, Business History Review.

[27]  Michael A. Cusumano,et al.  The Business of Software: What Every Manager, Programmer, and Entrepreneur Must Know to Thrive and Survive in Good Times and Bad , 2004 .

[28]  J. West,et al.  Open innovation : researching a new paradigm , 2008 .

[29]  K. Eisenhardt Building theories from case study research , 1989, STUDI ORGANIZZATIVI.

[30]  Joel West,et al.  Contrasting Community Building in Sponsored and Community Founded Open Source Projects , 2005, Proceedings of the 38th Annual Hawaii International Conference on System Sciences.

[31]  Geoffrey A. Moore Crossing the chasm : marketing and selling technology products to mainstream customers , 1991 .

[32]  Martin Campbell-Kelly,et al.  From airline reservations to sonic the hedgehog: a history of the software industry - Book Review , 2004, IEEE Technology and Society Magazine.

[33]  A. Strauss,et al.  The Discovery of Grounded Theory , 1967 .

[34]  Michael H. Morris,et al.  The entrepreneur's business model: toward a unified perspective , 2005 .

[35]  F. Rothaermel Strategic Management Journal Research Note Incumbent's Advantage through Exploiting Complementary Assets via Interfirm Cooperation , 2022 .

[36]  Mary Tripsas UNRAVELING THE PROCESS OF CREATIVE DESTRUCTION: COMPLEMENTARY ASSETS AND INCUMBENT SURVIVAL IN THE TYPESETTER INDUSTRY: UNRAVELING THE PROCESS OF CREATIVE DESTRUCTION , 1997 .

[37]  Pamela Samuelson,et al.  A Manifesto Concerning the Legal Protection of Computer Programs: Why Existing Laws Fail To Provide Adequate Protection , 1994, KnowRight.

[38]  C. Shapiro,et al.  Technology Adoption in the Presence of Network Externalities , 1986, Journal of Political Economy.

[39]  Lawrence Rosen,et al.  Open Source Licensing: Software Freedom and Intellectual Property Law , 2004 .

[40]  G. Hamel Leading the Revolution , 2000 .

[41]  H. Chesbrough,et al.  The Role of the Business Model in Capturing Value from Innovation: Evidence from Xerox Corporation's Technology Spin-Off Companies , 2002 .

[42]  Andrew S. Grove,et al.  Only the Paranoid Survive: How to Exploit the Crisis Points that Challenge Every Company and Career , 1996 .