We're Leaking, and Everything's Fine: How and Why Companies Deliberately Leak Secrets

Although the protection of secrets is often vital to the survival of organizations, at other times organizations can benefit by deliberately leaking secrets to outsiders. We explore how and why this is the case. We identify two dimensions of leaks: (1) whether the information in the leak is factual or concocted and (2) whether leaks are conducted overtly or covertly. Using these two dimensions, we identify four types of leaks: informing, dissembling, misdirecting, and provoking. We also provide a framework to help managers decide whether or not they should leak secrets.

[1]  David R. Hannah,et al.  It’s a secret : Marketing value and the denial of availability , 2014 .

[2]  M. Leiblein,et al.  How Firms Capture Value From Their Innovations , 2013 .

[3]  David R. Hannah An Examination of the Factors that Influence Whether Newcomers Protect or Share Secrets of Their Former Employers , 2007 .

[4]  David R. Hannah Keeping trade secrets secret , 2006 .

[5]  Rita Gunther McGrath,et al.  Multimarket Maneuvering in Uncertain Spheres of Influence: Resource Diversion Strategies , 1998 .

[6]  David R. Hannah Should I Keep a Secret? The Effects of Trade Secret Protection Procedures on Employees' Obligations to Protect Trade Secrets , 2005, Organ. Sci..

[7]  Henk Akkermans,et al.  Travail, transparency and trust: A case study of computer-supported collaborative supply chain planning in high-tech electronics , 2004, Eur. J. Oper. Res..

[8]  Brian R. Gordon,et al.  A Multidimensional Conceptualization of Environmental Velocity , 2010 .

[9]  P. Hurmelinna-Laukkanen,et al.  Nature and Dynamics of Appropriability: Strategies for Appropriating Returns on Innovation , 2007 .

[10]  W. Richard Scott Organizations: Rational, Natural, and Open Systems , 1981 .

[11]  David R. Hannah,et al.  Why and How Do Employees Break and Bend Confidential Information Protection Rules? , 2015 .

[12]  Mary Kathryn Barbier D-Day Deception: Operation Fortitude and the Normandy Invasion , 2007 .

[13]  Peter Wright,et al.  Spy Catcher : The Candid Autobiography of a Senior Intelligence Officer , 1987 .

[14]  Steven Levy,et al.  In the Plex: How Google Thinks, Works, and Shapes Our Lives , 2011 .

[15]  J. Liebeskind,et al.  Keeping Organizational Secrets: Protective Institutional Mechanisms and their Costs , 1997 .