You are on page 1of 16

Research Policy 32 (2003) 1243–1258

Why Open Source software can succeed夽


Andrea Bonaccorsi∗ , Cristina Rossi1
Laboratory of Economics and Management, Sant’Anna School of Advanced Studies, P.zza Martiri per la Libertà 33, 56127 Pisa, Italy

Abstract
The paper discusses three key economic problems raised by the emergence of Open Source: motivation, co-ordination,
and diffusion. First, the movement took off through the activity of a community that did not follow profit motivations.
Second, a hierarchical co-ordination emerged without proprietary rights. Third, Open Source systems diffused in environments
dominated by proprietary standards. The paper shows that recent developments in the theory of diffusion of technologies with
network externality may help to explain these phenomena. A simulation model based on heterogeneous agents is developed
in order to identify the relevant factors in the diffusion of the technology.
© 2003 Elsevier Science B.V. All rights reserved.
Keywords: Open Source; Diffusion; Network externality

1. Introduction economic analysis, which can be formulated into the


following questions:
From an economic point of view Open Source soft-
• Why do programmers write Open Source codes if
ware can be analysed as a process innovation: a new
no one pays them to do it?
and revolutionary process of producing software based
• How do hundreds of people dotted around the world
on unconstrained access to source code as opposed
manage to effectively co-ordinate with each other
to the traditional closed and property-based approach
in the absence of any hierarchical structure based
of the commercial world. This phenomenon raises a
on the ownership of assets, producing programmes
series of important questions that one, for reasons of
consisting of millions of lines of code?2
simplicity, might formulate in terms of Schumpeter’s
• Why is it that Open Source programmes are be-
three-phase axis of the innovative process, i.e. inven-
coming so widespread in a world dominated by
tion, innovation and diffusion (Schumpeter, 1934). For
Microsoft-imposed standards, and more generally
each of these phases the Open Source phenomenon
by proprietary standards?
generates extremely interesting theoretical puzzles for
The first question regards the invention phase: there
is no problem in explaining an individual inventing
夽 A preliminary version of this paper was presented at the Con- the concept of free software and proposing it to the
ference Open Source software, Pisa, December 2000 and at the programming community, but that still leaves unex-
AICA Conference, Bari, September 2002.
∗ Corresponding author. Tel.: +39-050-883323;

fax: +39-050-883344. 2 According to Sanders (1998), the kernel of the Linux operating

E-mail addresses: bonaccorsi@sssup.it (A. Bonaccorsi), system comprised over one and a half million lines of code. In
cristina.rossi@iit.cnr.it (C. Rossi). the first version, implemented by Linus Torvalds in 1991, there
1 Tel.: +39-050-883343; fax: +39-050-883344. were 10,000 lines.

0048-7333/03/$ – see front matter © 2003 Elsevier Science B.V. All rights reserved.
doi:10.1016/S0048-7333(03)00051-9
1244 A. Bonaccorsi, C. Rossi / Research Policy 32 (2003) 1243–1258

plained the phenomenon of hundreds of individuals helps to correct errors and enables adaptation to dif-
continually inventing programmes which are then ferent needs and hardware platforms.4 This has in fact
made available free of charge. What system of in- happened and Open Source software is well known
centives regulates the initial innovation phase? What today for its high degree of reliability5 and portabil-
motivates such behaviour? ity. In the new approach, the hierarchically organised
The second question concerns the problem of and top down planned structure adopted in all pro-
co-ordination, which is crucial for the transforma- ductive processes is abandoned in favour of a new
tion of an invention into economically advantageous kind of bottom up structure, which is non-coercive
and marketable innovations. The spontaneous, decen- and largely decentralised.
tralised functioning of the Open Source community The first urgent question is therefore the one clearly
represents a challenge to many current notions of put by Glass (1999, 104): “I don’t know who these
co-ordination. How is it possible to align the incen- crazy people are who want to write, read and even re-
tives of several different individuals without resorting vise all that code without being paid anything for it at
to property rights and related contracts? How is it all”. To understand how this is possible, it is necessary
possible to specify everyone’s tasks without resort- to refer to a characteristic feature of the vast mass of
ing to a formal hierarchical organisation based on programme users—their heterogeneity. They are ex-
ownership of assets? tremely diverse in terms of know-how, interests and
Finally, the third question focuses on the conditions user needs, forming a number of sub-groups with quite
for the diffusion of Open Source software in the pop- different profiles. First of all, there is a large group
ulation of users. How is it possible to increase the of individuals who are not capable of developing pro-
diffusion of new technology given the presence of a grammes but only of using them, and only then if they
well-established standard, and thus of increasing re- are decidedly user-friendly. Clearly these people will
turns from the adoption of the previous technology? never write free code, especially as available commer-
The aim of this paper is to explain what at first sight cial software responds very adequately to their needs.
would seem “nonsense” by combining recent devel- Second, those who do write it are people for whom the
opments in economic analysis such as the theory of computer is a hobby, programmers who spend hours
collective action and the theory of technological dif- in front of a screen in their spare time and at week-
fusion in the presence of network externalities. It will ends. Their contribution is inevitably limited; hobbyist
become clear how a non-conventional understanding forms of motivation are clearly insufficient to explain
of the phenomena can provide a plausible explanation. the enormous results achieved by the Open Source
movement. To do so, it is necessary to refer to a third
group, formed by the members of the hacker culture—
2. Motivational problems in the invention stage: the heirs of the “Real Programmers” of the immediate
Open Source software and collective action post-war period, who “came from the engineering and
physics fields . . . [and] programmed in FORTRAN
Stallman proposed a revolutionary idea in 1984 with and another half-dozen languages that have now been
the Free Software Foundation, subsequently confirmed forgotten” (Raymond, 1999b, 19). Although at the
in 1997 in the Open Source Definition.3 The key con- origins of computer revolution neither large univer-
cept is that there should be unrestricted access to com- sities nor large companies readily accepted computer
puter programming codes: anyone should be able to
use them, modify them and circulate such modifica- 4 Introduction to Open Source, http://www.opensource.org.
tions without having to pay anything. 5 The Web server equipped with the Linux Red Hat 4.2 operating
The basic Open Source software philosophy is ex- system and Apache, installed in 1997 by Pavlicek (1999) in the
tremely simple: when programmers are allowed to laboratories of the Compaq Computer Corporation, resisted 267
times before crashing and even then it only did so following a
work freely on the source code of a programme, this massive storm that led to a total power cut in the building where
will inevitably be improved because collaboration it was housed. According to Liebovitch (1999, 42) in comparison
to Windows NT, Linux has a resistance to crashing that can be
3 Open Source Definition, http://www.opensource.org. measured in “months and years rather than days or weeks”.
A. Bonaccorsi, C. Rossi / Research Policy 32 (2003) 1243–1258 1245

science and software as respected disciplines, several deadlines is transforming production into an assembly
generations of computer scientists were generated in line, brilliantly described in Microserfs (Coupland,
the academic world and the research centres of large 1996), the cult book about young workers at Mi-
software corporations. crosoft. “Microsoft-phobia” (Dalle and Jullien, 1999,
In order to understand the Open Source invention 14) is undoubtedly something shared by all members
phase it is necessary to analyse the motivation under- of the Open Source movement. The reasons for this
lying the decisions of these individuals, who choose are not purely ideological but also, indeed above all,
quite spontaneously to produce code lines. It should technical. Commercial software is primarily perceived
be emphasised that altruism might at most explain the as not being very reliable. Produced by a restricted
behaviour of people writing software in their spare group of programmers in obedience to market laws,
time but not the behaviour of those who have devoted it is in diametric opposition to the law expressed by
considerable resources of time and intellect. But if it Raymond (1999a): “Given enough eyeballs, all bugs
is not altruism, why work for free? are shallow”.
First of all, the production of Open Source software Intellectual gratification, aesthetic sense and infor-
is a form of intellectual gratification with an intrinsic mal workstyle are all recurrent features of the set of
utility similar to that of a scientific discovery, involving different motivations underlying the invention of Open
elements other than financial remuneration (Perkins, Source. In economic terms, these motivations refer to
1999, 81). Emerging as it does from the university and intrinsic or non-pecuniary rewards. But they are not
research environment, the movement adopts the mo- sufficient to explain the persistence of the behaviour
tivations of scientific research, transferring them into of programmers, because a self-interested form of be-
the production of technologies that have a potential haviour would end up fatally compromising the mech-
commercial value. Sharing results enables researchers anism of free software production. In fact this has not
both to improve their results through feedback from happened, and there are no signs that the original mo-
other members of the scientific community and to gain tivation has degenerated. In fact, there are other more
recognition and hence prestige for their work. The conventional motivations to be considered.
same thing happens when source code is shared: other One element is that working on Open Source
members of the group provide feedback that helps to projects provides the prestige and visibility that often
perfect it, while the fact that the results are clearly gives programmers the chance to be noticed by soft-
visible to everyone confers a degree of prestige which ware firms.8 This is the main motivation emphasised
expands in proportion to the size of the community.6 in Lerner and Tirole (1999): working freely for the
Secondly, besides being a form of intellectual work, Open Source movement would be an investment ac-
hackers also regard programming as an art form. tivity aimed at increasing the signalling of quality of
Several authors describe Open Source programming human capital.
as artistic satisfaction associated to solving complex Another element is that many Open Source projects
computer problems.7 take shape because the people promoting them have
Thirdly, in the new paradigm of development, looked in vain for a programme to perform a par-
programmers frequently rediscover the pleasure of ticular function. They arise, that is, to satisfy a de-
creativity, which is being progressively lost in the mand for which there is no corresponding supply, in
commercial world, where the nightmare of delivery short to “fill an unfilled market” (Green, 1999).9 In

6 Within the increasingly vast hacker community the qualities 8 As Di Bona et al. (1999, 14), all of the founding fathers of

that are appreciated are “intelligence, knowledge, technical ability, the movement “have earned enough of a reputation to allow them
personal productivity, dedication” (Perkins, 1999), also because to pay the rent and maintain their kids”.
9 One typical example is the Perl language developed by Wall in
programming is “love not money” (Sanders, 1998).
7 As an example, computer engineer Ullman (1998), author of 1987. According to Wall, Perl originated because of an unsatisfied
the book Close to the Machine, writes in emphatic tones about need. In his work as systems administrator at Burroughs, he saw
Linux being a reaffirmation of our human dignity and describes a need for something combining the speed and immediacy of
her first installation of the operating system as “an exhilarating the Unix shell languages with the possibility to develop more
succession of problem-solving challenges” (Sanders, 1998). complex programmes, a typical feature of high-level languages
1246 A. Bonaccorsi, C. Rossi / Research Policy 32 (2003) 1243–1258

some sense the economic rationale here would be self- of electronic mail. These two programs were the killer
production. applications in their market: no commercial competi-
It is then possible to give an economically sensible tor succeeded (or wanted) to attack their supremacy.
response to the first question. Stallman and the other In order to understand the governance structure
founding fathers of the Open Source movement have of such a massive and pervasive phenomenon, the
brought about a profound change in the nature of the Open Source projects have to be the units of analysis.
software good, which has actually assumed the char- Open Source projects in fact not only perform the
acteristics of a collective good. Although it is well co-ordination task of hundreds of developers scattered
known that free riding does not take place systemati- around the globe but they also represent the insti-
cally in the real world, in this specific case what still tution in which the whole Open Source production
needs to be explained is how self-interested, free riding paradigm becomes effective (Hecker, 1999, 50).
behaviour is avoided and how sustained co-operation Looking at the wide variety of the Open Source
is also maintained in such a large-scale community. projects posted on the Net, it is possible to identify
In order to give a final answer to this question, we some shared characteristics dealing with the project
need to analyse how the production of Open Source lifecycle, the network of the relations among its mem-
software is co-ordinated and governed. This analysis bers, the linkages with the Open Source community
will show that, contrary to most free riding problems, and the proprietary closed source software.
in this case the incentive to contribute to a collective An Open Source project is defined as “any group of
good does not get smaller the larger is the number of people developing software and providing their results
other contributors. to the public under an Open Source license” (Evers,
2000). The group of people working on the project and
the licence under which the source code is released
3. The governance structure of Open Source: are the key elements of the definition. A successful
communication protocols, software complexity project typically starts because an individual (or an or-
and the role of licence agreements ganisation) is facing a problem that needs a particular
kind of software in order to be solved. Looking hints
Several studies (Ghosh and Prakash, 2001; within her social network, she finds out other agents
Schimitz, 2001) report about 12.000 active Open sharing the same concern. They form the embryonic
Source projects. Given that, on average, about twenty informal group that starts working on the problem.
programmers work on each project and that each The group eventually consolidates placing the project
programmer contributes on average to two projects, on a sound basis. As the project goes on, the group
we obtain an estimate of a community of 120.000 looks for feedback making the results publicly avail-
developers. Such developers have supplied more than able on the Net through mailing lists, newsgroups or
1000 megabyte of code, which amount to around 25 other on line news services. In this way the project
million lines of code (LOCs). attracts further participation that brings new tangible
The number of projects posted on the Internet in- and intangible resources, while programmers that are
creases steadily. Some of these projects are fated to not interested on the project drop away. The increase
die but others are getting better and better. Among in participation allows the project to gain momentum,
the most cited (besides the Linux operating system frequent releases lead to bugs correction and generate
and the Web server Apache) there are BIND, that per- a feedback flow that improve the code and the under-
forms DNS resolution and Sendmail for the exchange standing of the underlying problem.
Two factors shape the lifecycle of a successful Open
like C. Unable to find that “something”, he created and then Source project: a widely accepted leadership setting
distributed it to the entire Open Source community. This provided a the project guidelines and driving the decision process,
number of clear advantages and today Perl is a commonly accepted and an effective co-ordination mechanism among the
language used above all for Internet-related applications. The same
thing happened for Ethernet drivers developed by NASA’s Donald
developers based on shared communication protocols.
Becker, who needed faster drivers for a project he was working Most successful Open Source projects, far from
on (Raymond, 1999a). being anarchical communities, display a clear
A. Bonaccorsi, C. Rossi / Research Policy 32 (2003) 1243–1258 1247

hierarchical organisation. On the other hand, contrary a bottom up approach that relies on generally accepted
to what happens in the proprietary paradigm, the roles protocols of communication and a shared notion of
within the hierarchy are not strictly assigned since validity. The strength of these elements is enhanced by
the beginning. As the project grows, the authority of the peculiar characteristics of the software good and
the project leaders (core development group) arises the by structure of the Open Source licence.
naturally from a bottom up investiture as a result Software is a complex product not only because it is
of the contributions to the commonly agreed goal. a medium to solve complex problems but also because
Such a structure often leads to a highly concentrated it results from the different features that can be com-
distribution of contributions.10 bined in various ways (Franck and Jungwirth, 2001).
The leadership deeply influences the evolution Such complexity has deep consequences on the quality
of the project by selecting the best fitting solution of the software product and on the efficiency of its pro-
among the ones that different contributors propose duction process. The development of object-oriented
for the same problem. On the other hand, the core programming represents a fundamental process inno-
development group does not carry out the bulk of the vation in the way of managing such complexity. In the
co-ordination effort. In general, no one in the project object-oriented framework, a program is no longer a
is forced to perform a particular task but agents monolithic entity, but is organised in several modules.
choose freely to focus on problems that they think to Such modules can be combined in different ways and
best fit their own interests and capabilities. In pres- reused in other programs. So the same modules may
ence of a pending job the strategy that is commonly allow the solutions of very different problems making
adopted lies in waiting for someone that volunteers effective the concepts of modularity and reusability
his contribution. When no one volunteers the job is (Baldwin and Clark, 1997; Bonaccorsi and Rossetto,
neglected. Clearly if such a job is fundamental for 1999). This fits very well the characteristics of the
the continuation, the project is going to stop.11 In Open Source production process. Inside each program,
such cases the core development group may ask for the combination of modules takes place according to a
contributions through the project mailing list or Web structured hierarchy of dependence relations, but mod-
page, but no coercive mechanism supports such an- ules entering at the same level of the system can be
nouncements. Nevertheless, in successful projects, developed independently from each other. Given that,
the pending tasks are carried out by more than an the division of labour among programmers inside a
individual or an organisation. Redundancy improves project may be simply performed allowing different
the quality of the code allowing to choose among a programmers to work on independent modules that are
wider set of solutions. An emergent property of this finally combined to form the whole structure.
system is therefore selective capability. According to its inventor, the key to the success of
The co-ordination mechanism shared by developers the Linux Open Source is its modularity (Torvalds,
is in most cases able to produce a well-structured flow 1999). The most important feature of Linux is, in fact,
of contributions. As happens for project leadership, its small and compact12 kernel that carries out the basic
co-ordination among developers is solved according to operating system tasks. The system capabilities can be
extended by independent modules that are loaded on
10 Referring to the active Open Source projects, it is estimated demand when the system is active and particular jobs
(Ghosh and Prakash, 2001) that 10% of the authors write more need to be performed and can be automatically un-
than 70% of the produced code, with the first 10 developers loaded if they are no longer required.13 This problem
producing over 25% of total code. Moreover, productivity varies
across authors. Only 25 programmers take part to more than
25 projects while the large majority contributes only to a single 12 “It is possible to fit both a kernel image and full root filesystem,

project. According to Mock et al. (2000), the 15 top developers of including all fundamental system programs, on just one 1.4 MB
Apache added almost 90% of the LOCs and Koch and Schneider floppy disk” (Bovet and Cesati, 2000).
(2002) found that, in the GNOME project, 52 programmers out 13 The module managing the floppy disk is a typical example. It

of 301 wrote 80% of the code. is loaded only when a floppy needs to be read and is automatically
11 In any case, the source code continues to be publicly available: unloaded, as the floppy is not in use for a while. This leads to
another group of developers can download it, perform the pending a great flexibility because it is possible to specify options and
task and restart the project. parameters when the modules is loaded but the speed of task
1248 A. Bonaccorsi, C. Rossi / Research Policy 32 (2003) 1243–1258

is overcome by the possibility of configuring Linux through the mechanism of compilation. Moreover
inserting all the modules inside the kernel and obtain- Open Source programmers share a common notion
ing monolithic kernel. Given that, a group of Linux of validity (Kasper, 2001), according to which the
developers work on kernel while other groups write solutions that not only exhibit the best performance
the modules allowing the computer to be connected but also look simple, clear and logic are selected,
with peripherals or to read video and audio files. thus guarantying non-chaotic future expansion of the
Co-ordination is thus made possible by the sensi- work.15 Shared behavioural rules help the perform
ble technical choice of “keeping the kernel small and this task. Each Open Source project includes conven-
limiting to a minimum the number of interfaces and tions that all participants are supposed to follow. Tacit
other restrictions to its future development”. In this rules govern, for instance, the posting of messages
way programmers can add modules without “stepping on mailing lists or notification of new issues to other
on each other’s toes”. participants. Such rules are widely accepted in the
The same Open Source project often involves indi- project community and are sometimes written down
viduals and organisations world-wide that contribute and distributed to each new participant as in the case
to make face to face communication and phone calls of the Debian project (Evers, 2000).
very rare. Asynchronous ones offered by the Internet Furthermore, licences are the most important in-
network substitute synchronous communication me- stitution in the governance structure of Open Source
dia. E-mail, ftp and newsgroup have the incontestable projects. Most Open Source projects are released un-
advantage of cutting off communication costs lower- der GPL copyleft licence whose design allows to attune
ing resources required for carrying out the project. the incentive of the Open Source developers, serving
The Open Source communication media also allow the goals of the Open Source community better than
for codification and storage of the produced knowl- other legal frameworks. The main characteristics of
edge. Hints, call and proposals for solutions, patch and the GPL copyleft licence is its viral nature: a piece of a
comments, are tidily registered in the archives of ftp GPL code inserted in a given program forces that pro-
sites or mailing list. Each project benefits from a large gram to be protected by the same license agreement;
amount of documentation produced during the devel- every program containing a piece of code released un-
opment process that can be consulted by everyone in- der the GPL, must be released under the GPL too. This
terested in participating to the project, enhancing the forbids every piece of GPL code to be inserted in pro-
probability of further participations. grams released under licences that do not allow the ac-
Moreover, a wide series of technical support cess to the source code, in general, and in proprietary
systems14 make easier co-ordination among partici- software in particular. Since it guarantees the continu-
pants. Like GNU Emacs, a development environment ation of code visibility, GPL maximizes its circulation.
released by Richard Stallman under the GPL licence, No one can hidden the code that is the true wealth of
such tools are almost always released under Open every Open Source project. Through the code, in fact,
Source licenses and can be downloaded from the In- developers signal their talent, learn new skills and ex-
ternet for free. Given that, they are widely used in change idea and knowledge in a common language.
Universities and Research Centres belonging to the In brief, hierarchical co-ordination based on the
cultural background of the participants. ownership of assets is not a necessary condition for
Social institutions deeply enhance the effectiveness carrying out complex software development tasks.
of the above mentioned co-ordination media. First On the contrary, such co-ordination would end up de-
of all, software itself is a convention or a common pressing the intellectual, aesthetic and pleasure-based
language, in which errors are identified and corrected motivation that seems intrinsic to the programming
community.
execution may be reduced by the process of module loading and
unloading.
14 For instance, VMS (Version Management Systems) programs 15 Kasper (2001) observes that OS contributors speak about cho-

trace back the story of the subsequent releases of the project and sen solutions in terms of beauty. There is a sort of tacit aesthetic
give, at each stage, a clear picture of the evolution of the project criterion according to which solutions have to based on an elegant
to each participant. logic and programming construction.
A. Bonaccorsi, C. Rossi / Research Policy 32 (2003) 1243–1258 1249

The above mentioned framework explains the gov- It is interesting to note that incumbents in the com-
ernance of activities that present some artistic or mercial software industry recently adopted other vari-
scientific intrinsic gratification. On the contrary, it ants of the hybrid model. In particular software giant
is not appropriate for the so-called “non-sexy” work corporations took note of the inevitable coexistence of
involving, for example, the development of graphical the two paradigms and decided to make their products
interfaces, the compilation of technical manuals, the compatible with Open Source platforms, to release the
on line support in newsgroups and so on. According code of some programs and even to take part in Open
to Lakhani and von Hippel (2003), the motivations Source projects. Apple has released the source code of
for performing “mundane but necessary tasks” (in the the Mac Server OS X, Sun produces the Open Source
specific case giving on line help about the Web server suite StarOffice in order to contrast Microsoft MS Of-
Apache) are similar to the ones governing higher level fice, whereas in December 2000 IBM announced its
activities such as developing and debugging the soft- decision to invest in Linux development for promoting
ware. However, it is difficult to accept the idea that the diffusion of its e-business platforms.
these low gratification activities could be motivated These hybrid business models are made possible by
by the same incentive structure than high level, cre- the proliferation of licensing agreements that follow
ative work. The incentive and co-ordination structure the dictates of Open Source while not following the
of low value activities is one of the most challenging more extreme GPL format. In fact, provided that the
for a paradigm having creativity and reputation as fundamental Open Source conditions are respected
fundamental values. (full access to the source code, full software usability,
Although these activities display a low degree of freedom of modification and redistribution of soft-
innovativeness, they are fundamental for the adoption ware), anyone can elaborate his own Open Source
of Open Source software.16 In general, while techno- licence. Besides the most famous (and restrictive)
logical discontinuities are liable for the emergence of GPL under which Linux and over than 80% Open
new trajectories, the spread across the system depends Source programs are released, there are a wide set of
on a cumulative series of little incremental modifica- licences. Some of them, for instance the BSD (Berke-
tions having, in many cases, no intrinsic technological ley Software Development), allow the appropriation
interest. of software modifications. Moreover, other licences,
The emergence of new hybrid business models which cannot be considered Open Source given that
seems to solve this kind of problem. The new model they protect copyright, provide the release of the
has been spurred by the entry of companies and soft- source code that particular categories of users are
ware houses producing free software, giving it away allowed to use. This is the case of the Apple Public
to customers free of charge and shifting the value Source Licence by Apple and of the Sun Community
from licensing agreements to additional services such Source Licence of Sun.
as packaging, consultancy, maintenance, updating and Besides playing an important role in the diffu-
training. This business model is widely accepted in sion process, hybrid models solve simultaneously
Open Source communities and is characterised by a two problems. On one hand, they secure to potential
detailed regulation presenting innovative legal solu- adopters a wide range of complementary services,
tions, which address the relation between free and on which are considered fundamental for reliability and
payment services.17 usability of the software, on the other hand they
provide monetary incentives for the development of
16 As an example, the two most famous Linux interfaces, KDE

and Gnome, created in 1998, provided Linux users with a In the automobile industry components produced by different firms
mouse-driven desktop environment. This kind of environment, are assembled in a product that satisfies consumer needs. In the
which is standard in the commercial world, favoured the adop- same way, Red Hat puts together and compiles the source code
tion of Torvald’s operating system by less skilled subjects and the of the Linux operating system obtaining a program ready for
migration of Windows and Mac users toward it. installation, which is distributed on a CD at less than 100 dollars
17 A number of successful firms adopt variants of this hybrid together with a set of complementary applications (for instance
business model. As an example, Red Hat, which provided NASA the Gimp program for managing and changing images) and a
with software for space missions, thinks of itself as a car producer. complete documentation.
1250 A. Bonaccorsi, C. Rossi / Research Policy 32 (2003) 1243–1258

“non-sexy” activities, which do not fit the typical This phenomenon leads us to analyse in-depth the
motivations of the Open Source community. third phase of Schumpeter’s taxonomy, namely diffu-
Moreover, the existence of commercial subjects us- sion. The mechanisms underlying such a rapid spread
ing Open Source software guarantees the future sur- are still not very clear.20
vival of the software. The guarantee that software will A more general question is what drives the pattern
continue to be produced and developed is a key ele- of diffusion of software technologies. Accepting Var-
ment in the adoption decision. Users, in fact, can avoid ian and Shapiro’s definition according to which “ev-
to change applications and platform with high switch- erything that can be digitalized, that is represented
ing costs for infrastructures and personnel training. by bit sequences, is information” (1999, 3), software
The coexistence of proprietary and open software is clearly information. A growing body of literature
is a possible interpretative key for the success of the suggests that the diffusion of informational goods is
Open Source movement. The necessity of mixing dif- subject to two fundamental factors: increasing returns
ferent remuneration forms with innovative business from the production or supply side, and network exter-
models belongs to the intrinsic diffusion dynamic of nality effects, or increasing returns from the demand
free software. side.
To understand the consequences of network exter-
nality effects on the diffusion process, it is funda-
4. The diffusion of Open Source software: mental to identify their sources. Externalities can be
negative and positive network externality effects direct, indirect or deriving from complementary ser-
vices. Computer programme users are mainly affected
The recent diffusion of Open Source software has by the first kind of externality: the classic example is
been remarkable. However, there are large differences the exchange of files. Anyone who has the same pro-
between the server and the client market, in particular gramme for running a given file type can read and
in the desktop case, in both the business and public modify files received from other people who, in turn,
sector markets. On the client-side Microsoft succeeded can do the same. Hence the importance of sharing
in exploiting the dominant position gained with MS a particular type of software—the operating system
Dos through the family of Windows18 so that Open which runs the whole file system of the computer.
Source is not largely diffused. In the server market, According to economic analysis of standards, the
particularly in Web servers, the situation is quite differ- diffusion phenomenon is subject to path dependence
ent, with a strong or even dominant position of Open and lock-in, as described in the celebrated analysis by
Source software.19 Brian Arthur and Paul David. Generally speaking, in-
creasing returns are defined as “the tendency for that
18 The Windows 3.1 operating system, which inherited the char- which is ahead to get further ahead, for that which
acteristics of Lisa (Apple) and X Windows (Xerox Parc) in the loses advantage to lose further advantage” (Arthur,
development of mouse driven graphic interfaces, was released at 1994, 100). The presence of increasing returns can
the beginning of the 1990s. The two graphical interfaces for Linux,
KDE and Gnome were released at the end of 1990s.
even give rise to situations where a small initial ad-
19 Currently, Netcraft estimates that about 61% of Internet Web vantage is all it takes to favour a standard in such a
servers run Apache. The penetration rate is quite high also in the way that it conquers the whole market.21 Note here
case of general-purpose servers (LAN or firm Intranets). Gartner
Group (2001) assigns to Linux 10% of the servers in the United
State while according to IDC Report (2001) Torvalds’ operating is around 1%. The Forrester study shows very good prospects
system runs on 27% of them. In Europe the public sector adopts of development: it estimates that 20% of the present investment
Open Source software in 8% of its servers and only 1% of its expenditure on proprietary licensing will be shifted on services
clients (Schimitz, 2001). The largest diffusion is in Germany and and personnel training by 2004.
France where many large organisations have adopted Open Source. 20 Apparently, they were not clear to the founder himself: “I was

Focusing only on firms, Forrester (2001) finds that 56% of the aware of the transition from being the sole user of Linux to there
2.500 Top US Companies use some kind of Open Source software, being a hundred-odd users, but the leap from a hundred users to
especially on Web servers (33%). Reported figures concerning millions escaped me” (Torvalds, 1999).
database-management programs are striking: 42% of them are 21 Paul David, for example, claims that a fundamental role was

Open Source while Open Source software in desktop applications played in the establishment of the QWERTY standard for type-
A. Bonaccorsi, C. Rossi / Research Policy 32 (2003) 1243–1258 1251

that increasing returns are an immediate consequence moment—the “virgin market condition” (Witt, 1997,
of network externalities, to the extent that Witt (1997) 762)—which is clearly unsustainable in the case of
argues that the two can be regarded as synonyms. software, where the Linux operating system is com-
The lock-in thesis has recently been the subject of peting with a decades-old predominance of systems
heated debate. Interestingly, the nature of Open Source based on and derived from MS DOS. In the same
technologies permits the formulation of a number of way, it is never true that the potential market for a
points relevant to this debate. technology is infinite and that the decision to use
Given the presence in the software diffusion pro- it cannot be reconsidered. This applies in particular
cess of the previously described direct network exter- in the case of computer programmes, which have a
nalities, the lock-in mechanism seems an inevitable growing but necessarily limited market (their use is
outcome: if a piece of software manages to gain a sig- not indispensable to all human activity!) and do not
nificant market share, a virtuous cycle is set in motion require extremely high fixed capital investments such
such that consumers will have even more incentive to that the subsequent revision of choices would involve
use it, there will be an increase in the supply of com- prohibitive costs. Arthur’s theory of the independence
plementary products (applications, maintenance) and of individual choices is also hard to sustain.
that particular piece of software will start to dominate Dalle and Jullien (1999) refer to local interactions
the market and become the standard. to explain the dissemination of the Linux system in
Having explained the lock-in, what remains to be place of Windows NT. In their view, what is important
explained, however, is what sets it in train. Arthur in the choice of an operating system is not so much
(1989, 116) refers to the presence of “small events” the total number of other individuals who use it but
that “by chance can give one of the two technolo- the number of those who do so within the group with
gies the necessary advantage”. If things really are like whom the individual interacts, i.e. a local network of
that, there is no defence against the possibility of in- reference. The characteristics of such a network vary
efficient technology establishing its dominance at the according to whether the nodes are represented by
expense of another one, which, if adopted, would be Open Source software users or by those using com-
superior. This is what happened with QWERTY type- mercial software. A widespread phenomenon amongst
writers, whose performance was inferior to the DSKs the former is in fact the so-called “advocacy” theo-
of August Dvorak (David, 1985). rised by leading members of the Open Source move-
The development of Open Source contradicts this ment (Pavlicek, 1999). This is a form of one-to-one
prediction in that it is eroding the market share of marketing whereby the users of Open Source pro-
Microsoft’s dominant standard. Is this another eco- grammes are invited to convince other members of
nomic absurdity? In fact the prediction of lock-in does their group of reference to do likewise and to abandon
not take into account a set of variables that have pow- the commercial sector. Advocacy has an exponential
erful effects on the pattern of technology adoption. growth: amongst its aims there is that of transforming
First of all, the mathematical demonstration of an individual into a new disciple of the movement and
lock-in closely depends on a set of initial assump- hence into a potential “advocate”. The role of an Open
tions; changing these assumptions, Witt (1997, 753) Source advocate is thus very similar to that of Witt’s
easily manages to explain how “newly introduced (1997, 763) diffusion agents who not only disseminate
technology can successfully disseminate in a market information about the new technology but also try to
despite existing network externality”. convince a group of potential users to do so simulta-
Secondly, Arthur’s hypotheses are also very restric- neously so as to contrast those diseconomies which
tive and difficult to defend in the case of software. in the presence of network externalities penalise those
The author assumes above all that the two compet- who first choose a new technology.
ing technologies arrive on the market at the same Moreover, from an economic point of view, soft-
ware produced outside commercial channels is nothing
writer keyboards by the victory in a typing contest held in Cincin-
more than a straightforward instance of the general is-
nati on 25 July 1888 by Frank McGuire, who used a QWERTY sue of collective action model that applies to the provi-
keyboard. sion of public good, where a public good is defined by
1252 A. Bonaccorsi, C. Rossi / Research Policy 32 (2003) 1243–1258

its non-excludability and non-rivalry (Von Hippel and too do the asymmetries within it. Of these, an impor-
von Krogh, 2003, 10). The new licences agreements tant role is played by the presence of a high variability
conceived by Open Source movement have transferred in interest (Rossi, 1998, 79). If “the interest is very
such characteristics to the software. Since a piece of concentrated and the subjects are highly interested,
code is posted on the Internet, no one can be forbid- they can constitute an efficacious subgroup capable
den to download and use it and each new download of supplying the good without the co-operation of
does not affect the possibility of further downloads. others, even though they form only a small fraction
Collective action model is a useful framework for of the collective” (Hardin, 1982, 79). The efficacious
studying how diffusion of Open Source software subgroup will thus procure the good that can then be
occurs. consumed by all members of the group. In the case
Fist of all, the size of the phenomenon is extremely of Open Source software, the efficacious subgroup is
interesting from a theoretical point of view, because it made up of hackers. Their major resource is their in-
seems to contradict the classical theory, proposed by disputable know-how in computer science, their most
Mancur Olson, of an inverse relation between the size marked interest is code writing as an intellectual ac-
of the group and the probability that collective action tivity the possibility to produce by themselves those
will be successful (Olson, 1965). The argument is that goods they cannot find on the market.
as the size of the group increases there is a progressive Their supply action is also made very effective
reduction in the probability of any defection being due to the fact that the source code good is non-rival
detected and a corresponding increase in the incentive in terms of consumption. The benefits it brings are
to benefit from the good without contributing to its invariant in relation to the number of users: anyone
production. However, Olson’s analysis does not take can download code from the Web, compile and use
into account a set of variables whose effect cannot be it without reducing other people’s capacity to do so.
ignored, above all the heterogeneity of the subjects This further confutes Olson’s thesis. As Chamberlain
called upon to participate in the collective action. (1974) demonstrated in the case of non-rival collec-
Hardin (1982) underlines the centrality of the hetero- tive goods, the quantity supplied increases with the
geneity of resources and interests within the group: a size of the group.
small set of strongly motivated and resourceful sub- Hardin’s conclusions provide an account of how
jects (small group) is often capable of overcoming the Open Source software is produced by the most in-
initial phases of the process of supply of the collective terested hackers, but it does not explain why other
good, setting in motion a virtuous circle that possibly individuals also collaborate in its production in an
enables the phenomenon to be self-sustaining. This is increasingly extensive process of co-operation. For
the idea at the heart of the Theory of Critical Mass this it is necessary to refer to Marwell and Oliver’s
initially proposed by Schelling (1978), then developed work on the theory of Critical Mass.
in sociology by Marwell et al. (1993) and picked up in Here the role of strongly interested subjects is not to
economics by Katz and Shapiro (1985), Economides provide the good entirely themselves, but to create the
(1996), Witt (1997) and Hurberman and Loch (1999). necessary conditions for production to become easier.
The basic idea is that it is sufficient to have an ini- Their task is to “be the first to cooperate”, enabling the
tial group capable of producing the collective good difficult initial start-up phase of collective action to be
(generally speaking, those with stronger motivation overcome. This is the role played by those who origi-
and interests so as to resist the defection of others) nate an Open Source project, deciding which problem
to discourage opportunistic behaviour in the rest of to work on and implementing the central nucleus of
the group. the code, which will then be subsequently modified,
Hardin (1982) argues, in fact, that the outcome of perfected and enriched by other contributions.
collective action is strongly influenced by the asym- The diffusion process of Open Source software
metries typical of all social processes. He contests seems, then, to satisfy the hypotheses at the heart
Olson’s thesis (1965) because “it is not logically of the existence of Critical Masses in the spread
possible to increase group size, n, ceteris paribus” of new technology, which permit an alternation of
(Hardin, 1982): as the size of the group increases, so standards as opposed to the long-term dominance
A. Bonaccorsi, C. Rossi / Research Policy 32 (2003) 1243–1258 1253

of inferior technology predicted by Arthur. Accord- is important not only to explain how the phenomenon
ing to Schelling (1978, 91), the term is borrowed arises and finds an economic application, but also to
from physics and indicates the quantity of radioac- explain how it spreads.
tive combustible required to set off nuclear fission. Once again the development of the Open Source
Transposing this concept to the economic and social phenomenon makes it possible to clearly see the im-
sphere, one talks of the Critical Mass effect if, when portance of heterogeneity in diffusion processes. The
certain variables characterising a process rise above a presence of active minorities does not have a great im-
given threshold, the phenomenon explodes, so that the pact if one assumes models with homogeneity amongst
system moves from the stable equilibrium in which agents (because the effect is mitigated by communi-
it was initially positioned and assumes another sta- cation, which occurs randomly between all members
ble equilibrium. In technology diffusion models, the of the population) or if one assumes increasing returns
variable is represented by the number of people who to adoption with high costs for revising choices. If on
adopt the new technology. the other hand one assumes agent heterogeneity, local
Dalle and Jullien (1999) have carried out com- interaction and the revision of technological choices,
puter simulations to analyse the Critical Mass it is possible to find phenomena involving the over-
phenomenon—which they call threshold effects— turning of established standards.
in the diffusion path for Linux. They observe that Another effect must be considered in the diffusion
its emergence depends on the value assumed by a of Open Source. While network externality effects
particular parameter α, which is a measure of the clearly favour incumbent software producers due to
“preference of users for standardisation” within their the size of installed base and compatibility problems, a
network of reference: the greater α is, the more poten- positive network externality effect is also in place. This
tial users are inclined to adopt the current standard, is due to the possibility for adopters to benefit from
that is Windows NT. This parameter is therefore also the legitimate access to a large pool of usable software
a measure of the proselytising power of Open Source tools, whose value is proportional to the number of
users: the lower α is, the greater is their strength adopters of Open Source software. We therefore posit
within each local network. The simulations reveal the two opposing network externality effects: a negative
presence of threshold effects when the value of α is effect inhibiting adoption and a positive effect favour-
sufficiently low. ing adoption. We will consider the difference between
Other authors agree in recognising the importance these two effects by modelling the negative effect as
in this field of expectations regarding the performance a continuous variable proportional to the number of
of technology and the final size of the network of users adopters of Open Source (then a negative effect at the
(Katz and Shapiro, 1985, 426; Bensen and Farrell, beginning of diffusion, given the prevalence of propri-
1994, 118). Analysing the diffusion of two competing etary software) and the positive effect as a threshold
technologies whose performance grows as the num- variable.
ber of people adopting it grows, Hurberman and Loch Finally, we should not ignore the competitive re-
(1999) concludes that the waiting period before the action from incumbent software producers. While
achievement of Critical Mass decreases in proportion Open Source software is promoted by a large volun-
to the degree of optimism of people’s expectations. tary community, commercial software producers may
The transition from the initial equilibrium where ev- try to defend their installed base by investing addi-
eryone uses the old technology to the one where the tional resources in R&D and improving the quality of
new technology has replaced the old one also takes proprietary software.
place more quickly the more heterogeneous the sub-
jects are. Huberman’s simulations demonstrate that if
there is a small group of individuals with double the 5. Open Source diffusion: a simulation model
propensity for innovation in relation to the group aver-
age, the Critical Mass is reached almost immediately. From the discussion above we conclude that the
This once again underlines the role of hackers and their adoption of Open Source and its ultimate diffusion are
culture in the Open Source movement. Their existence influenced by its perceived intrinsic value, the negative
1254 A. Bonaccorsi, C. Rossi / Research Policy 32 (2003) 1243–1258

network externality effect coming from the dominant the old technology (exponential distribution with mean
standard, the positive network externality effect com- equals to 1: EXP 1) and towards the new technol-
ing from the access to the community of program- ogy (exponential distribution with mean equals to 4:
mers, and the competitive reaction of incumbents in EXP 4). The latter distribution captures the presence
the commercial software industry. in the population of Open Source advocates charac-
This section presents the results of an agent-based terised by a strong appreciation for the new technology
simulation exercise, modelling the adoption deci- that they try to transmit to other individuals through
sion of a population of heterogeneous interacting social contacts. Finally, the hypothesis of a uniform
agents. The model is implemented using the SWARM distribution (UNIF 1 5) in the interval is considered.
platform.22 Parameter ρ captures incumbents’ reaction. Each
Starting from a situation in which the proprietary time the diffusion of free software increases by 1%,
software has a prevalence of 100%, each of the N the incumbents supplying proprietary software react
agents (N = 1000) must decide whether to adopt Open by investing in R&D and improving the quality of their
Source software, giving up the dominant standard, or products. In relative terms the agents’ evaluation of
to continue to use the proprietary software. Agents are Open Source software is reduced by a given percent-
also allowed to use both technologies. Starting from age (ρ). Briefly, we model competitive reaction as a
the dominance of proprietary software helps to make modification in the intrinsic value that agents attribute
clear the conditions under which Open Source may to the new technology.
diffuse. Each agent makes a decision on the basis of Variable NE addresses the network externality ef-
an explicit adoption function formulated as follows: fects in the use of computer software. In order to take
into account the decreasing amount of utility brought
F = α · (1 − ρ) · IV + [(1 − α) · NE + ∆ · CO] by the marginal agent, NE increases at a decreasing
with α, ∆ ∈ [0, 1] (1) rate:

na (t)
The function F is normalised in the interval [0,1] and NE = (2)
N
is composed by two parts. The former part (α·IV) deals
with agents’ evaluation of the intrinsic value of Open where na (t) is the number of Open Source adopters at
Source software, while the latter ([(1 − α) · NE + ∆ · time t.
CO]) deals with the behaviour of other agents in the Variable CO accounts for the co-ordination effect
system. or positive network externality effect. When the num-
IV (intrinsic value) is modelled as a random con- ber of adopters is sufficiently large, not only they can
tinuous variable in the interval 1–5, representing in exchange files, but also can work together in writing
increasing order the value that each agent attributes complete computer programs. Co-ordination effect is
to the new technology with respect to the old one. We triggered when adopters reach a given percentage of
take into account several distributions of the variable, the total (γ):
reflecting different attitudes towards the Open Source 
0 if na (t) < γ
technology. First of all, following the classical liter- CO = na (t) (3)
ature on the diffusion of innovations (Rogers, 1995)  if na (t) > γ
and the probit model approach (David, 1969; Geroski, N
2000), a normal distribution (NORM) is assumed. Agents are structurally and socially heterogeneous, in
Then we examine the case of biased beliefs, towards the sense that are endowed with social contacts that
allow the updating of the evaluation of Open Source
22 Swarm is a collection of software libraries, which provide sup- technology. The updating mechanism is quite simple.
port for simulation programming. The Swarm project was started When an agent has a contact (according to the sim-
in 1994 by Chris Langton, then at Santa Fe Institute (SFI) in New
ulation structure), the mean between the value of her
Mexico. The aim was to develop both a vocabulary and a set of
standard computer tools for the development of multi-agent sim- state variable and the state variable of the contacted
ulation models (so-called ABMs, short for agent-based models). agent is computed. This new value is assigned to the
See http://www.swarm.org for additional information. state variable of the contacting agent.
A. Bonaccorsi, C. Rossi / Research Policy 32 (2003) 1243–1258 1255

At time t = 0 contacts start. After having a contact, Table 1


agent i evaluates her own adoption function: Benchmark case
Proprietary Both Open Source
• If F < 0.33, i continues to use only the proprietary software technologies software
software. Exp 1 994 6 0
• If F ∈ [0.33, 0.66], i selects both technologies. Exp 4 0 626 374
• If F > 0.66, i adopts Open Source giving up pro- Norm 0 865 135
prietary software.23 Unif 1 5 0 867 133

In sum, we build a model in which the adoption de-


cision is made explicit. A new technology is adopted
if its intrinsic value is high, if other members of the in 7300 runs.24 In order to give robust results, we
population adopt and if there are direct benefits from explore all initial distributions.
co-ordination arising from exchanging pieces of code. Several points should be noticed. Open Source dif-
The relative importance of these two effects is man- fusion indeed depends on the initial distribution of
aged by parameters α and ∆. We are interested in intrinsic values assigned to the technology by agents.
understanding under which conditions, as reflected in In general, a moderate negative network externality
parameters, Open Source will spread in the popula- effect and a strong competitive reaction are not suf-
tion of potential adopters. In this version of the model ficient to block the diffusion of Open Source, even
we do not allow for choice revision, which might be starting from a normal or uniform distribution.
considered in the development of the research. However, a biased belief distribution against Open
Note that the setting does not mimic a classical Source (Exp 1) may in fact block the entire diffu-
epidemic diffusion process. Once adopted, agents sion process. Since a threshold for triggering positive
do not infect others with given probability. Rather, network externality effect is required (γ = 0.02), the
they average their own evaluation with that of the proportion of agents that start adopting on the basis
contacted agent, so that it is still possible for them of a favourable perception of Open Source is not suf-
to decrease their evaluation, so becoming less in- ficient to counterbalance the competitive reaction by
fectious, even though they continue to use the new incumbents.
technology. Therefore we do not expect to find a clas- The presence of a biased belief distribution (Exp 4)
sical S-shaped dynamics. Adoption is not triggered does not influence the total number of adopters but
by contact alone. As a result, we are more interested only its internal distribution. Finally, under all dis-
in studying the prevalence level (i.e. the penetration tributions, with the exception of Exp 1, the domi-
rate of Open Source in the limit) than in plotting the nant outcome is one of coexistence between the two
cumulative diffusion curve over time. technologies.
In the first group of simulations (benchmark case) Given this benchmark, the parameters are altered
parameters take the following values: one by one and set to one or zero in order to evaluate
their influence on the diffusion, keeping other param-
α = 0.75, γ = 0.02, ∆ = 0.2, ρ = 0.10 eters constant. We study only the most favourable dis-
tribution to Open Source, Exp 4. By doing so we fo-
This case represent a situation of moderate negative cus on the conditions under which Open Source may
and positive network externality, and strong com- diffuse starting from a favourable initial distribution
petitive reaction. Table 1 reports simulation results,
giving the total number of adopters out of 1000 agents 24 There is not an immediate translation of the model clock

into chronological time. Since each run represents a set of social


interactions, we may assume that they take place several times
23 The definition of boundaries is somewhat arbitrary, but it re- per day. In this case the simulation amounts to a few years. Other
flects equal weight assigned to the different alternatives of adop- interpretations are also legitimate.
tion. Technically speaking it is possible to adopt both commercial Data refer to one realisation of the stochastic process for each
and Open Source software on the same hardware, given the wide case. In most cases we controlled the mean for several realisations
availability of compatible programmes. (i.e. 10).
1256 A. Bonaccorsi, C. Rossi / Research Policy 32 (2003) 1243–1258

Table 2 on the other side relies on the activation of several


Variations in parameters sources of network externality. Incumbents are in the
Proprietary Both Open Source position to slow or even block the diffusion of the com-
software technologies software peting technology, by investing aggressively in R&D
α =1 382 392 226 and/or leveraging on the large installed base. A robust
∆ =0 349 522 129 general result is that under many plausible conditions
γ =0 0 626 374
commercial software and Open Source software are
ρ =0 0 545 455
likely to coexist even in the limit.

of beliefs, giving an upper bound to the diffusion pro- 6. Conclusions


cess. Results of the sensitivity analysis are listed in
Table 2. This work shows that the peculiarity of the Open
When negative network externality are not present Source movement can be explained using recent de-
(α = 1) adoption is influenced only by agents’ be- velopments in the theories of collective action, of
liefs, co-ordination effects and competitive reaction. In co-ordination in the absence of a central authority
this setting, even though initial beliefs strongly favour and of the diffusion of technologies in the presence
Open Source, incumbents still manage to retain 38% of network externality. This has made it possible to
market share in the limit. At the same time, when the throw light not only on how the phenomenon arises
co-ordination effect is set to zero, a similar result is and finds a vast economic application, but also on the
found. Clearly setting to zero the parameters α and ∆ mechanisms that underlie its massive diffusion. Many
eliminates their qualitative difference, i.e. the former questions do, however, remain open. There clearly
representing in a continuous way the negative impact needs to be more in-depth analysis of co-ordination
of installed base of commercial software and the lat- mechanisms, with particular reference to the precise
ter representing in a discrete way the positive effect functioning of Open Source projects, in order to un-
of Open Source communities. Keeping in mind that derstand the role played in them by the project leaders
the initial distribution is strongly biased in favour of and by the minor figures who do the non-sexy work.
Open Source, the resilience of commercial software is The search for an explanation of why this work is done
remarkable. is one of the most interesting challenges that remains
On the other hand, when there is not a threshold for a full economic understanding of the Open Source
for the positive co-ordination effect (γ = 0) and there movement. While both sociology and the economic
is not competitive reaction by incumbents (ρ = 0), theory of incentives are able to provide an account
Open Source saturates the market, although commer- of how a Finnish university researcher managed to
cial software survives in more than 50% of cases as a write the Linux kernel without being paid, it is more
second source. difficult to understand what motivates a programmer
The implication from Table 2 are clear: given a dis- to work on the realisation of a boring graphic in-
tribution of beliefs biased towards Open Source and in terface to make Linux more user-friendly. This is a
the absence of incumbent advantages the only way for fundamental point for two reasons: on the one hand,
commercial software to control the market is to engage the tendency of Open Source programmes to become
in a fierce quality competition supported by massive more user-friendly will enable their diffusion in in-
R&D efforts. In the absence of competitive reaction creasingly broad bands of the population, on the other,
Open Source ends up in dominating the market. user-friendly programmes and user assistance are the
The results of the simulation exercise confirm that core business of many of the new companies who, by
the diffusion of a network technology in presence of a managing to make profits through Open Source, have
well-established standard is difficult and takes a long demonstrated that in the case of software the word
time. Starting from this consideration, the simulations “free” has the meaning of “free speech” and not “free
suggest that the diffusion of Open Source on one side beer”. The mix of commercial and free solutions that
depends on the initial distribution of the beliefs, while goes on through the birth of new companies and the
A. Bonaccorsi, C. Rossi / Research Policy 32 (2003) 1243–1258 1257

richness of licensing arrangements are other interest- Bonaccorsi, A., Rossetto, S., 1999. Software reusability: a real
ing phenomena to be examined in the near future. option analysis. International Journal of Software Technology
Management, Fall.
One of the main implications of our analysis and of
Chamberlain, J., 1974. Provision of collective goods as a function
the simulation exercise is that under many plausible of group size. American Political Science Review 68, 707–716.
situations commercial software and Open Source are Dalle, J., Jullien, N., 1999. NT vs. Linux or Some Explanations
likely to coexist in the future. into Economics of Free Software. Paper Presented at “Applied
The Open Source phenomenon is certainly not Evolutionary Economics”. Grenoble, 7–9 June.
David, P.A., 1969. A contribution to the theory of diffusion. Centre
the only new information society to throw up in-
for Research in Economic Growth Research Memorandum 71,
teresting economic problems. The transformation of Stanford University, Stanford.
software from private good to collective good realised David, P.A., 1985. CLIO and the economics QWERTY. American
by Torvalds and the ensuing movement seems to Economic Review 75, 332–337.
have made Kenneth Arrow’s frequent remark come Economides, N., 1996. The economics of networks. International
Journal of Industrial Organization 16 (4), 673–699.
true, when he warned that in contexts where there is Evers, S., 2000. An Introduction to Open Source Software
knowledge-intensive innovation, the goods no longer Development. Technische Universität Berlin, Fachbereich
have a fixed nature but are to different degrees both Informatik, Fachgebiet Formale Modelle, Logik und
private and appropriable, and public and universal. Programmierung (FLP).
The fact that economic theory is best equipped to Franck, E., Jungwirth, C., 2001. Reconciling investors and
donators—the governance structure of Open Source. University
work on simple cases—with highly specialised the- of Zurich Working Paper, University of Zurich, Zurich.
ories for private goods (markets) and public goods Gartner Group, 2001. An end-user analysis. Linux server market
(public finance)—and struggles with complex cases share: where will be in 2001 and how will grow?
is obviously a problem. Fortunately, it is not a prob- Geroski, P.A., 2000. Models of technology diffusion. Research
Policy 29 (4–5), 603–625.
lem of the real world, which quickly moves on even
Ghosh, R., Prakash, V.V., 2001. The Orbiten Free Software Survey.
without economic theory. First Monday.
Glass, R., 1999. Of Open Source, Linux and Hype. IEEE Software
16 (1), 126–128.
Green, L., 1999. Economics of Open Source Software. http://www.
Acknowledgements badtux.org/eric/editorial/economics.html.
Hardin, R., 1982. Collective Action. John Hopkins University
Two anonymous referees and the editors gave pre- Press, Baltimore.
Hecker, F., 1999. Setting up shop: the business of Open-Source
cious comments, which greatly improved the paper. software. IEEE Software 16 (1), 45–51.
Jean Michel Dalle, Nicolas Jullien, Paola Giuri, Mauro Hurberman, B., Loch, C., 1999. A punctuated equilibrium model
Leoncini, Giovanni Santini and Guido Scorza also pro- of technology diffusion. Management Science 45, 160–177.
vided detailed comments. We acknowledge the contri- IDC Report, 2001. Available at http://dailynew.yahoo.com/h/
bution of Fabio Vistori in the preparation of the simu- zd/20010611/new report questions linux server claims 1.html.
Katz, M.L., Shapiro, C., 1985. Network externalities, competition,
lation exercise. We remain responsible for the content and compatibility. American Economic Review 75, 424–444.
of the paper. Koch, S., Schneider, G., 2002. Effort, co-operation and
co-ordination in an Open Source software project: GNOME.
Information Systems Journal 12 (1), 27–42.
Lakhani, K., von Hippel, E., 2003. How Open Source works:
References “Free” user-to-user assistance. Research Policy, in press.
Lerner, J., Tirole, J., 1999. The simple economy of Open
Source. NBER Working Series. Working Paper 7600. NBER,
Arthur, W.B., 1989. Competing technologies, increasing returns,
Cambridge, MA.
and lock-in by historical events. Economic Journal 99, 116–131.
Marwell, G., Oliver, P., Prahal, R., 1993. The critical mass in
Arthur, W.B., 1994. Increasing Returns and Path Dependence in collective action. A Micro-social Theory. Cambridge University
the Economy. University of Michigan Press, Ann Arbor. Press, Cambridge.
Baldwin, C.Y., Clark, K.B., 1997. Managing in the age of Olson, M., 1965. The Logic of Collective Action. Cambridge
modularity. Harvard Business Review 75 (5), 84–93. University Press, Cambridge, MA.
Bensen, S., Farrell, J., 1994. Choosing how to compete: Pavlicek, R., 1999. Keys to effective Linux advocacy within
strategies and tactics in standardisation. Journal of Economics your organisation. http://users.erols.com/plavlicek/oreilly/als-
Perspectives 8 (2), 117–131. fullpaper-1999.txt.
1258 A. Bonaccorsi, C. Rossi / Research Policy 32 (2003) 1243–1258

Perkins, G., 1999. Culture clash and the road of word dominance. Schimitz, P.E., 2001. Study into the use of Open Source software in
IEEE Software 16 (1), 80–84. the public sector. An IDA Study. Interchange of Data between
Raymond, E., 1999a. The cathedral and the bazaar. http://www. Administrations.
redhat.com/redhat/cathedral-bazar/. Schumpeter, J., 1934. The Theory of Economic Development.
Raymond, E., 1999b. Breve storia degli hacker. In: Di Bona, Harvard University Press, Cambridge, MA.
Ockman, S., Stone, M. (Eds.), Open Sources: Voci dalla Torvalds, L., 1999. Il vantaggio di Linux. In: Di Bona, Ockman,
Rivoluzione Open Source. Apogeo, Milano. S., Stone, M. (Eds.), Open Sources: Voci dalla Rivoluzione
Rogers, E., 1995. The Diffusion of Innovations, fourth ed. Free Open Source. Apogeo, Milano.
Press, New York. Ullman, E., 1998. The Dumbing Down of Programming. Paper
Rossi, C., 1998. Il Problema dell’Azione Collettiva nella Teoria Presented at 21st Salon, 13 May, http://www.salonmagazine.
Economica: una Rassegna di Alcuni Recenti Contributi. com.
Degree Thesis. Economics School, University of Pisa, Von Hippel, E., von Krogh, 2003. The private-collective innovation
Italy. model in Open Source software development: issues for
Sanders, J., 1998. Linux, Open Source and software’s future. IEEE organization science. Organization Science, in press.
software 15 (5), 88–91. Witt, U., 1997. Lock-in vs. critical masses. Industrial changes
Schelling, T., 1978. Micromotives and Macro Behavior. Norton, under network externalities. International Journal of Industrial
New York. Organisation 15, 753–772.

You might also like