Teaching Trade Secret Management with Threshold Concepts

Trade secret management (TSM) is an emerging field of research. Teaching trade secret management requires the inclusion of several challenging topics, such as how firms use secrets in open innovation and collaboration. The threshold concepts framework is an educational lens well suited for teaching subjects such as TSM that are transformative and troublesome. We identify four such areas in trade secret management and discuss how threshold concepts can be a useful framework for teaching. We then present an outline of a curriculum suited for master’s programs and training of intellectual property (IP) managers. Our main contribution is to fields of management and educational sciences, as well as those of innovation studies and jurisprudence.

example. Claiming that information as a trade secret can be an excuse for hiding crimes or unethical business behavior, such as tax evasion, as revealed in the Panama Papers (Abazi 2016). We frame trade secrets as an option for organizations to create and secure competitive advantages for the benefit of business or society.
However, ethical challenges associated with trade secrets are easily understood by students and are not challenging to teach. In this article, we discuss other aspects of trade secrets and their management that are challenging to teach, such as the paradox of "secrets" used in "open" innovation. We present an educational framework, "threshold concepts," that addresses these aspects. Our article is conceptual and explorative, from the standpoint of educational sciences and the teaching of IP concepts in management and innovation studies; our research goal is to substantiate threshold concepts as a framework for teaching trade secret management and to exemplify this framework with a curriculum outline.
The following sections of this article provide background and context on the subject of trade secrets. We then discuss how they are managed. We explain the term "simultaneities" as it relates to trade secrets and their counterintuitive and troublesome nature, then propose a list of challenging issues with regard to teaching trade secret management. Along the way, we provide examples and identify possible threshold concepts. We then apply these threshold concepts to outline a curriculum on trade secrets in the context of a typical intellectual property (IP) management course. We conclude with recommendations for further research.

Background and Context: New Legislation and Teaching Challenges
Trade secrets are often used together with other mechanisms, such as patents and copyright, to control innovation. Trade secret management can thus be viewed as an integral part of IP management. There is currently limited research on trade secret management and, to our knowledge, no research on how to teach it. 1 Recently, both the EU and the USA amended their legal framework for trade secrets. The new laws are more precise than previous ones as to their scope and the types of secrets they regulate. These legal changes concern how trade secrets can be objects for licensing and knowledge sharing as functions of collaboration and open innovation. When we teach how to manage trade secrets, this contrast between secrecy and openness is paradoxical or counterintuitive. 2 1 Evans (2012) presents an interesting case study on trade secrets in the teaching of law. The case concerns trade secret management; however, its scope is that of trade secret law and the practical application of American jurisprudence.

2
In English, that paradox is embedded in the term itself, as the words imply some secret exchange of knowledge -or at least that the secret concerns something that is transferred. However, this is not the case in other languages. As examples, in German and Scandinavian languages, "trade secret" is equivalent to "business secret" (Betriebs-und Geschäftsgeheimnisses, forretningshemmelighet, bedriftshemmelighet). In French, "industrial secret," "commercial secret," or "business secret" (secret industriel, secret commercial, secret des affaires) "commerce" implies sharing. Similar etymological differences seem to exist among other languages.
Teaching trade secret management builds on learners having prior understanding of concepts of intellectual property and its management at an advanced level. National laws and traditions regarding trade secrets are complex and differ among jurisdictions; however, those differences mostly affect how to manage possible misappropriation. Thus, from a teaching perspective, understanding in detail jurisdictional differences among the USA, the EU, China, Japan, or any other country or state has little relevance to the topic of trade secret management within these countries' organizations; it is enough to know that there are legal differences. As innovation and trade are often international, a manager of trade secrets has to know when to call on international legal expertise. The authors of this article are all Europeans and none are lawyers. Our perspective is that of managing trade secrets within organizations that collaborate with others, often across jurisdictions or cultures.

Introducing Threshold Concepts
Our experience in teaching trade secret management stems from teaching students at master's programs at European universities, experiences in course design in higher education, as well as courses for IP managers and other managers of innovation in research, development, and business operations. For all these groups, we have noticed that some curriculum topics require special attention because they are not only complicated and challenging, but also counterintuitive. Taking this initial realization as a starting point, the educational principles of the threshold concepts framework could be useful in teaching the topic of trade secrets (Flanagan 2020). This framework could provide a way to understand the characteristics and nature of trade secrets and their management, and to shed light on the consequences of this understanding for teaching the subject of trade secrets and trade secrets management.
The threshold concept framework is a pedagogical framework that focuses on aspects of a field or discipline that at face value seem counterintuitive and troublesome, yet understanding these aspects is essential to understanding and mastering that field or discipline. These aspects or concepts in the discipline may be seen as a portal; passing through it leads to a transformed understanding of the subject matter and a reformulation of the learner's frame of meaning. This implies an ontological change in the learner, a new way of seeing things (Meyer and Land 2003Land et al. 2005).
Early research in the field stems from economics, where, for example, an underlying barrier to students' understanding were linked to the concept of "opportunity cost." This barrier was seen as one such essential threshold into the understanding of economic theory (Shanahan and Meyer 2006). In this research, the focus was upon identifying and describing an educational core or points of gravitation in a field, to contribute to an integrated understanding of the field.
Using this background and context, we review challenging and complicated issues in trade secrets management teaching to determine whether they can be viewed as counterintuitive. We use characteristics of counterintuition as an indicator and point of entry into a challenging topic, because while teaching, we have observed students' confusion and lack of understanding. Thus, the method we employ to address these perceived problems is to develop discussions of these counterintuitive issues and compare them with the characteristics of threshold concepts. Table 1 illustrates possible characteristics of a threshold concept.
Together, these characteristics describe the highly complex nature of a threshold concept.

Characteristics Comment Transformative
Changes the way in which the student views the discipline.

Irreversible
Difficult to unlearn.

Integrative
Combines different aspects of the subject that the learner had not previously seen as related.

Bounded
Delineates a particular conceptual space, serving a specific and limited purpose.

Discursive
Incorporates enhanced and extended use of language.

Reconstitutive
May entail a shift in learner subjectivity, which is implied through the transformative and discursive aspects already noted. Such reconstitution is, perhaps, more likely to be recognized initially by others, and also to take place over time.

Liminality
Threshold concept mastery often involves "messy journeys back, forth, and across conceptual terrain" (Cousin 2006, 5). property. That need for protection is similar to that of a firm or an organization, for which trade secrets are a common form of secrecy.

Trade Secrets in Management Science and Jurisprudence
Innovation and management researchers see trade secrets as an innovation appropriation mechanism that is used jointly with other mechanisms such as patents, copyright, trademarks, as well as standardization, certifications, and other means of controlling and capturing value from innovation. Beginning in the 1980s, research on innovation included secrecy as a way to appropriate innovation (Levin et al. 1987;Von Hippel 1982). For example, Nonaka and Teece (2001)  In jurisprudence, there has been a century-long debate on how best to regulate trade secrets. They could be seen as any combination of intellectual property, breach of confidence, and unfair competition (Lemley 2008). 4 That discussion is outside the scope of this article but illustrates that the teaching of trade secret management should include several perspectives. 5 The view that people regard secrets as property is, however, part of the foundation of secrecy studies.
Aside from aside from agreements or contracts, to explain this aspect of property as fundamental to trade secrets, a general definition of secrecy adapted from Simmel (1906) is instructive: "the intentional or unintentional concealment of information." Within Simmel's context and example of 3 There is also the question of national security and trade secrets. The lines between trade secrets, national security, and trade wars are blurry (Rowe 2016;Burgess and Power 2011) and with a long history. For example, were trade secrets an important part of the regulations of transatlantic trade in the sixteenth century (Vermeir and Margócsy 2012). A recent example in media is the court proceedings against Huawei; see https://web.archive.org/web/20200215143825/https://www.cnbc.com/2020/02/14/huaweisays-us-charges-are-an-attempt-to-irrevocably-damage-its-image.html 4 The Paris Convention is the oldest international agreement on IP, originally from 1884. In 1900, a revision introduces article 10bis on unfair competition. Trade secret misappropriation has always been regarded as one such form of unfair competition. Others include passing-off and counterfeiting. Later trade agreements, including the Trade-Related Aspects of Intellectual Property Rights (TRIPs), are more detailed with respect to trade secrets.

5
A manager needs to understand these different perspectives -as well as the regulations in different jurisdictions-as they can have implications for the legal measures available in the case of trade secrets misappropriation. Each perspective has some impact on the management of trade secrets, as documentation of the secret should follow legal practise for all relevant jurisdictions. We discuss later in this article the term "simultaneities": how seemingly different concepts may coexist as parts of the same phenomenon. marriage, in which "the secret of the one party is to a certain extent recognized by the other, and the intentionally or unintentionally concealed is intentionally or unintentionally respected" (Simmel 1906, 462), this definition is useful. As this article concerns trade secrets, information is intentionally or unintentionally concealed, collaborators know there are secrets, and they respect the concealment of those secrets. If concealment is not respected, then there is misappropriation or theft of the secret. This respect or trust is, together with the property view of secrets, essential.

Trade Secrets and IP Management
The term "trade secret" has a clear legal definition in the EU and the USA (Schultz and Lippoldt 2018). As we discuss later, trade secrets are more of a process than just being a commercial opposite of openness. Vague terms that include the explanatory (e.g., "undisclosed" or "proprietary") and the broad (e.g., "information" or "know-how") serve a purpose, in that they encompass information that may or may not become trade secrets as well as the legally well-defined trade secret. "Secret" itself has negative connotations (Bok 1989, 12). For a researcher that needs to keep a trade secret, it can be better to talk about "proprietary technology" and thus avoid a conflict with the Mertonian norm of communality. For a business manager or lawyer drafting a nondisclosure agreement, "confidential business information" may appear more relevant.
Most legal definitions of "trade secret" include four concepts for knowledge to be considered a trade secret: (a) it is business-related technical or commercial information, (b) it must not be known to the public, (c) its secrecy must have business value, and (d) there must be a reasonable effort to protect it against disclosure.
It is an integral part of the teaching of trade secrecy to explain and discuss the impact that different terms and jurisdictions have on its practical management. Doing so is complicated but not challenging, and is clearly defined: different national legislation all incorporate variants of the Paris Convention's more than hundred-years-old rules on the principle of unfair competition (Bodenhausen 1968). 6

Exceptions from Trade Secret Legislation
There are areas in which secret information is not protected by trade secret laws. An important issue in teaching is to explain and discuss these exceptions in the context of ethics and societal needs. Our examples are from the EU directive (European Commission 2016). As the directive is new, it is unclear how broadly it will apply to the public interest. Whistleblowers are, for example, protected under US laws (Levine and Seaman 2018;6 The Paris Convention (1884) is the oldest international agreement on IP. In 1900, a revision introduced article 10bis on unfair competition. Trade secret misappropriation has always been regarded as one such form of unfair competition. Others include passing-off and counterfeiting. Later trade agreements, including the Trade-Related Aspects of Intellectual Property Rights (TRIPs) are more detailed with regard to trade secrets.
Menell 2017) and in many other countries (Right2INFO.org 2019). Some examples from the EU follow: Investigative journalism: Journalists in the EU cannot be hindered by trade secrets legislation to investigate and publish news on companies' practices and business affairs. The EU directive only concerns unlawful conduct by which someone acquires or discloses, without authorization and through illicit means, information with commercial value.

Legal obligations to disclose information of public interest:
The EU directive does not alter the legal obligations on companies to disclose information for such public policy objectives. For example, in the chemical and pharmaceutical sectors, companies are subject to legal obligations to disclose information of public interest. The EU directive does not provide any grounds for companies to hide information that they are obliged to submit to regulatory authorities or to the public The rights of citizens to access documents in the possession of public authorities: Moreover, the EU directive does not alter and does not have any impact on the regulations that foresee the right of citizens to access documents in the possession of public authorities. Revealing misconduct, wrongdoing, or illegal activity: In addition, the EU directive expressly safeguards those who, acting in the public interest, disclose a trade secret for the purpose of revealing a misconduct, wrongdoing, or illegal activity. This safeguard is operative if the trade secret was acquired or passed to the whistleblower using illicit means such as the breach of law or contract. Abazi (2016) discusses how the EU directive increases the susceptibility of whistleblowers because of the burden of proof and the problems of demonstrating a general public interest. However, these problems also arise from the EU not having general legislation for whistleblower protection, only rules for specific sectors, in addition to laws in member states.
In the case of an organization, its management must understand when the information they wish to keep secret can be considered a trade secret. If employees are informed that trade secrecy applies to that particular information, and ethical considerations might subsequently lead to publication, then the ability to identify, keep, and manage the real trade secrets may suffer.

Trade Secret Management
Trade secrets may be viewed as secrets that have a causal relationship to a firm's competitive advantages. Business managers find that trade secrets are more important for controlling innovation than are patents, copyright, and trademarks. This view is confirmed by studies spanning the last thirty years from both the USA and Europe, as well as those of different industries and firm sizes contract or trust. For other IP, such as patents and copyright, jurisprudence defines the concept; there are no patents without patent law. For trade secrets, however, the laws are mere fallbacks in the case of unsuccessful management in addition to a framework for sharing.
What matters is how managers of trade secrets teach and train their organization to keep those secrets, how the secrets are used for sharing knowledge within an organization and with third parties, and how the secrets are combined with other measures, such as patents and copyright, to create and maintain competitive advantages. In this view, the difference between secrets in general and trade secrets specifically is simply that trade secrets are managed with a commercial purpose (Levin et al. 1987;Cohen, Nelson, and Walsh 2000;Arundel 2001;Leiponen and Byma 2009;Gallié and Legros 2012;Hall et al. 2014;Eurostat 2016). Laws constitute a framework for knowledge transfer, such as licensing, in the form of trade secrets. This framework may be of use to the holder of a trade secret in the case of misappropriation if the secret is stolen or becomes public by breach of contract.
Large organizations may organize trade secret management as part of IP management. In other organizations, the management of trade secrets may be part of roles such as innovation managers or R&D managers, integrated into legal or human resources management, or termed "knowledge management." Another important role is that of managing information security, or cybersecurity. The management tasks can be divided into phases, such as defining the trade secret, installing measures to protect it, exploiting it, and losing it (Granstrand 2000, 26;Lezzi, Lazoi, and Corallo 2018;Holgersson and Wallin 2017;Al-Aali and Teece 2013;Li and Tsai 2009;Bos, Broekhuizen, and de Faria 2015).
Secrets are a normal part of organizational knowledge management.
Whenever they provide competitive advantages, the organizations tend to build procedures and rules for knowledge management. The procedures and rules are initiated either by management or by the employees themselves.
Employees will be burdened with keeping secrets and may bend those rules mechanisms such as contractual agreements, researchers in innovation studies use "appropriation mechanisms" as a general term (Gallié and Legros 2012;Hall et al. 2014). The complexity of trade secrets being an organizational phenomenon, and being combined with other mechanisms, creates a need for a different approach to teaching than to IP management in general. We now turn briefly to complexity theory to explain how we use counterintuition as an indicator for topics that are challenging to teach.

Simultaneities in Teaching Trade Secret Management
Brent Davis (2008) describes "simultaneity" as "events and phenomena that exist or operate at the same time" (51). Simultaneities, derived from complexity theory and applied in education, oppose the ideas of binaries, dichotomies, and hierarchies, and form the basis for understanding counterintuition. Simultaneities are perceived by learners as counterintuitive and phenomena that are seemingly individual are presented both as a unity and as co-occurring. An example of simultaneity is the "knower and knowledge," where the curriculum reflects the knowledge and pedagogy reflects the knower. They coincide -interdependent yet independent -but remain separate. In trade secrets management, simultaneities exist on a fundamental level, in that openness and secrecy can be viewed as characteristics of the same information. 7 Hilgartner (2012) discusses a "dialectic of revelation and concealment through which knowledge is selectively made available and unavailable to others, often in the same act" (268). In a historical example from the Human Genome Projects, researchers from competing organizations discuss trade secrets and future research directions during conferences. They intricately balanced openness and secrecy with "partial transfers of knowledge, targeted distribution, matters of timing, and the rights and 7 The debate in jurisprudence over whether trade secrets can be considered property may be viewed as a debate over a simultaneity. encumbrances that attach to knowledge at different points in its transit" (268). Complex information is simultaneously both open and secret.
We illustrate another practical simultaneity in Figure 1. Here an idea is implemented into technology: the technology has a crucial part, a core, that we label "1." The firm then files a patent application. The technology is developed, and while drafting of the patent application begins, the firm understands there are other aspects of the technology that may be kept secret over time, labeled "2" in the figure. The firm now describes 1 and 2 and keeps them as trade secrets (TS). When they have done so and put protective measures in place, there are two trade secrets. TS 1 is what the later patent application describes; TS 2 is a useful addition, such as the temperature range in which a process is most efficient.
There could be more additions of commercial trade secrets, such as the results from market tests or business plans, as well as trademarks, copyrights, and other appropriation mechanisms not shown in the figure. Now, firm B acquires a license; TS 1 and TS 2 are then both used.
Meanwhile, the firm files a patent application that includes TS 1. Firm B acquires a license for the possible patent as well. The patent application is eventually published. As a result, TS 1 is no longer a secret and its use ends.
However, TS 2 is now used as part of the license to firm B.
In this case, we use boxes to illustrate TS 1, TS 2, the patent application, the granted patent, and the three licenses as different concepts.
However, for educational purposes these can be presented as a simultaneity.
It is hindsight to present the complete picture as we do. For the IP manager, the versions of the secrets and patent applications evolve together, but we have the luxury of separating them. Different people, organizations, and managers will be involved throughout the timeline, but at any one point, trade secrets, patent applications and patents will blend; there is no dichotomy.

Experience-Based Issues That are Challenging to Teach
We made a list of trade secret-related issues that we find challenging to teach, both at universities and in workshops with professionals, such as IP managers, chief technology officers, or corporate lawyers. For some issues, the challenges are complicated rules, differing legal systems, or arbitrary logic. However, we also realized that for some issues the challenge is their counterintuition. As an example, there is an inherent paradox in the fact that secrets can be used to share knowledge. As private individuals, we have all shared secrets; in this case, the context is itself the secret and is thus a personal matter. However, the border between secrecy, privacy issues, and trade secrets blend. One example concerns how clinical data from genetic illustrates how the use of secrets is counterintuitive in that they form two paradoxes concerning innovation (Laursen and Salter 2014;Bogers 2011;Arrow 1962).
We propose a two-step process: first, to identify counterintuitive issues, and second, from these issues, to identify possible threshold concepts. Methodologically, we draw upon the process of identifying such bottleneck elements in learning material on the decoding-the-disciplines approach and "backcasting" (Robinson 2003;Middendorf and Pace 2004;Shopkow 2010). 10 In Table 2, we list a selection of challenging issues and indicate possible counterintuition (the column marked CI) to initiate mapping of the terrain. The examples discuss the distinction between complicated and counterintuitive issues. We chose counterintuitive issues as a point of entry to initiate further analysis, as these issues are -in our experience -most 8 Arrow (1962) shows how the prospective buyer of a technology wants to know how it works before paying. If the buyer then learns the technology, then they do not need to pay for the knowledge they've just received. If the seller has a patent, or there is legislation on trade secret misappropriation, then the paradox is mediated.

9
Laursen and Salter (2014) paraphrases Arrow in that "the creation of innovations often requires openness, but the commercialization of innovations requires protection" (867). Such protection can include trade secrets.
1 0 "Backcasting" is the colloquial opposite of forecasting: It seeks to design a desirable future, and then find policies and programs that connect to the present. See also the brief discussion on curriculum later in this article. challenging to teach. In Table 1, we present the characteristics of threshold concepts, and we compare these to the counterintuitive issues in Table 3. A trade secret has a value. It has an impact on accounting and taxation.

No
The value of a trade secret can be estimated in a similar way as for patents (e.g., from the net present value of a royalty stream or the cost to develop a similar product or service or misappropriate the competitor's trade secret). The 18 month publication of patent applications came from the needs of the Dutch Patent Office in the 1960s. Patents were published at grant and the Dutch Patent Office had a huge backlog. No one outside the Patent Office but the applicant knew that a technology would be patented. This secrecy could last for many years, thus, wrongful investments could be made by third parties. The Dutch then began to publish all applications after 18 months of secrecy. The West-Germans followed, and then the rest of the world (see Davidson 1969;Hoffmann 1972).

CI COMMENTS, EXAMPLES REFERENCE
Trade secret management depends on recording metadata for trade secrets. The metadata can be public.

Yes
A secret starts as concealed information. The metadata (e.g., the field of technology or commerce, the ones in the know, the importance, the associated IP) of the secret and its concealment may be shared without divulging the secret. Thus, the manager of trade secrets does not need to know the secrets.

Li and Tsai 2009
Workforce mobility causes conflicts on trade secrets.

Yes
Most other IP types are defined by law, but secrecy may exist and be used in trade without any involvement of law. The transition from a secret to a trade secret is a process that involves risk reduction and documentation of metadata. Bok 1989;Hannah et al. 2019 The terms of a nondisclosure agreement (NDA) must be managed.

No
NDAs are complicated by specific terms that must be followed. Their purpose may depend on the legal system of the jurisdiction (e.g., differences between common and civil law). Wetter et al. 2017 The scope of a trade secret is not possible to validate unless it is litigated.

No
As for copyright, circumstances must be compared with the legal definition by a court of law. The scope of the law is set to balance copying with incentives for innovation and use of the patent system. An example is whether there were proper measures against disclosure or not. Ottoz and Cugno 2011;Sandeen 2018 Trade secret management includes cybersecurity.

Applying Threshold Concepts
As illustrated above, the nature of trade secrets seen from teaching and learning perspectives represents to learners and novices in the discipline a fluid and less distinct landscape. Also, among academics, there is a limited or unclear agreement regarding what graduates should know. There is a lack of bright points of navigation, clear or predefined goals for learners, clear ontologies, and fixed epistemologies. In sum, the teaching of trade secret management is quite challenging.
More so than in many other epistemological fields, the understanding of trade secrets and their management are dependent on developing a way of thinking and sense of understanding of "the underlying game" or "episteme"; that is, they are dependent on developing "habits of the mind" (Perkins 2006;Shulman 2005). 12 Note that there is an internal relationship and interdependency among them. For example, a threshold concept, such as "trade secrets can be used in open innovation" (see Table 3 below), will at the same time be transformative and discursive, since a new perspective of reading the world will include a new way of describing what you see, in other words, an ontological shift. Table 3 shows the four issues we find counterintuitive when teaching. For these, we have briefly commented on the characteristics of threshold concepts from Table 1.

MAIN THRESHOLD CONCEPTS: CHARACTERISTICS AND COMMENTS
Trade secret management depends on recording metadata for trade secrets. The metadata can be public.
Transformative: Trade secrets can be part of an IP portfolio and discussed with others who are not in the know, including IP managers. Troublesome: It is counterintuitive that the attributes of the secret are themselves not secret. Irreversible: A trade secret has attributes and metadata.
Integrative: It is the fundament for appropriating knowledge with a mix of IP that includes trade secrets.
Trade secrets can be used for sharing and exchanging knowledge, and as part of open innovation.
Transformative: Trade secrets are part of the knowledge flow between firms.
Troublesome: There is no contradiction between open innovation and trade secrets. Discursive: Changes the view of licensing.
Reconstitutive: The starting point for questioning academic and industrial norms. Also, to see how secrecy and openness balance.
Trade secrets cannot be managed as other IP, as the property is lost if published; however, they are mixed and managed with another IP.
Transformative: Changes the view of the early phase of innovation projects. Troublesome: The other types of IP changes, when trade secrets are an integral part of their cycle.
Integrative: The different types of IP are integrated by trade secret initiation. Liminality: The details of a national and international patent, copyright, trademark, and design law, as well as marketing law, must be known before trade secrets can be mixed and managed.
Secrecy and openness are not only legal concepts, as is most other IP. They are formed in a process, and there is no rigid dichotomy.
Transformative: The literature mostly presents trade secret management as legal management. Troublesome: Opposed to registered IP and copyright, successful management of secrecy depends on human factors. Openness may lead to a need for secrecy, for example, in the case of biobanks and privacy issues.
Integrative: The early-stage innovation process comprises decisions on the joint use of different types of IP. Discursive: The ability to switch between a perspective of openness and secrecy, and legal and organization concepts. In Table 3, the four issues have at least four of the eight characteristics of threshold concepts. All include the counterintuition of the "troublesome" characteristics and are also transformative. For teaching trade secret management, we then have essential issues that we find change how students view the discipline. A problem will then be to formulate these issues as learning objectives, together with other, non-troublesome issues. We discuss this aspect of curriculum later in this article.
Many learners tend to perceive their learning trajectory in the same way -as a relatively linear and directed path to mastery. The characteristics of simultaneities and counterintuitive aspects imply, from the student's perspective, a lack of clarity as to learning objectives -the precise goals or aims to be learned. This places the learner in a state of liminality (Land, Rattray, and Vivian 2014;Turner 1969;Gennep 1960

The Epistemological Landscape
In the previous section of this article, we described how the teaching of trade secrets is an ambiguous and complex discipline, and how the threshold concepts framework may be used as a lens through which to describe and analyze. To further explore this area, we now turn to how it should be understood in epistemological terms.
Describing a knowledge domain, and how it can be taught and learned, requires an understanding of its epistemological characteristics. Learners, even at the master level, tend to want simple ontologies, fixed epistemologies, and recipes as to how to achieve desired learning outcomes.
This attitude is reinforced by current examination systems. However, to be a participant in a given field, teachers and learners need to develop an expanded understanding of what constitutes knowledge in their particular field. We draw upon three sources of epistemological framing: Polanyi's (1966) ideas of "tacit knowledge," Gibbons's (1994) distinction between "Mode 1" and "Mode 2" knowledge, and Schön's (1987Schön's ( , 1983 seminal work describing the reflective practitioner. The knowledge perspective adopted to frame trade secrets and the teaching thereof rests on what Gibbons has termed Mode 2 knowledge (Gibbons 1994). Gibbons distinguish between Mode 1 and Mode 2 knowledge development: whereas Mode 1 represents traditional knowledge, reflecting the classic academic hierarchies, Mode 2 knowledge is developed in an interaction between different actors from science and industry. Typically, this kind of knowledge is developed out of a defined problem or a given context, often a "wicked" one. Consequently, this knowledge perspective is interdisciplinary and relies on both theoretical and practical input.
Furthermore, tacit knowledge plays an important part. Tacit knowledge in an organization rests in the experiences, relations, and networks among a group of people. This kind of knowledge is rarely documented or otherwise formalized but can be activated and shared when the need arises. It is consequently hard to get access to for newcomers in an organization, but the participation in communities socializes members toward a certain way of thinking. Thus, tacit knowledge is not easily taught or acquired and may emerge through dialogue, narratives, and participation. Mode 2 knowledge is more connected to its immediate application and the interplay between development and application. In a real sense, learning, also seen as an organizational endeavor, is not separate from the development of knowledge and its application. Although individual and social aspects are present in all types of learning and knowledge production, for Gibbons the individual drive is seen as dominant in Mode 1 knowledge production, and the social or collective drive is seen as dominant in Mode 2 knowledge production (Gibbons 1994). To learners and practitioners alike, the process of achieving knowledge in the present domain is associated with the state of liminality, recognizing emergent ontologies and epistemologies, and developing a sensitivity to context and situation. In earlier work, Schön (1987) has elaborated on these abilities of the practitioner and describes the development of such emergent knowledge as a "reflective conversation with the materials of a situation" (14), aligned with elements of improvisation and moving in "indeterminate, swampy zones of practice" (3).

Trade Secret Management: An Example Curriculum
In Table 4, we present an example curriculum building on Land et al. (2005) and Hunkins and Hammill (1994 Introduce steps to improve the organization Education, governance and policy, processes in place, IP portfolio management, including trade secrets with metadata.

Conclusion
We have demonstrated that four central issues in the teaching of trade secret management can be viewed through the lens of threshold concepts, and thus be used to open the field to learners. We then showed how these concepts might be used in an example curriculum. In theorizing on this topic, we link the lack of ontological clarity to the simultaneities, and to how trade secret management integrates with IP management. We relate this understanding to the epistemological concepts of tacit knowledge, Mode 2 knowledge, and the reflective practitioner.
We explained IP management and trade secret management as a practitioners' skill to provide an example curriculum aimed at the education of management practitioners. However, this contribution is not only related to management and educational sciences, but also has relevance to innovation studies and jurisprudence. Trade secrets are part of the broader concept of appropriation mechanisms. For researchers of innovation and jurisprudence, it is crucial to understand better the ontological shift from trade secrets for keeping knowledge secluded to trade secrets used for knowledge transfer in open innovation. There is then no dichotomy of openness and secrecy, but a process of knowledge appropriation in which well-defined trade secrets blend with other appropriation mechanisms that include intellectual property.

Limitations and Future Research
The present study is conceptual. We build our proposals for using threshold concepts in trade secret management education on limited experience. Two of the authors have long experience in teaching IP management, but mainly in the Nordic countries and the United Kingdom; we know from the literature that there are cultural differences in how secrecy is used for innovation (Delerue and Lejeune 2011;Serradell-Lopez and Cavaller 2009). As discussed earlier in this article, there are also legal differences. With the new EU and US legislation, regions have moved toward viewing trade secrets more as property than, for example, Japanese and Chinese legislation, which sees the issue as a question of fair competition.
These cultural differences may have an impact on what issues are considered to be counterintuitive. Thus, the impact of cultural differences on the teaching of trade secret management is an exciting possibility for future research.
In our experience, there seems to be a male bias in the attendance of both academic and industrial courses on IP management. Delerue and Hamid (2015) find no gender differences in the ethical attitude to trade secret misappropriation. However, there are reported gender differences in the attitude to secrecy among adolescents (Frijns et al. 2005). These studies may be a starting point for research on gender differences relevant to the teaching of trade secret management.
In Table 2, we referred to literature on the issue of trade secrets in open innovation. There are differences in the approach to trade secrets among fields of industry, as well as among academic institutions and firms.
One example from the ICT industry, reported by Feldman (2006), empirically examined whether trade secret law affects high-tech employees' willingness to keep information confidential. In a study of the life sciences field, researchers who cooperated with industry expectedly reported more trade secret results from their research (Blumenthal et al. 1996). The effects of industrial sponsorship on researchers are discussed by Czarnitzki, Grimpe, and Pellens (2015). We have not tested the four threshold concepts we identify in courses for differences in learning outcomes versus the industrial or academic background of the learners (Flanagan et al. 2014). To identify such differences would be an interesting question for further research.
We started our discussion on trade secrets by pointing at the lack of ontological clarity, then explored the epistemological landscape and connected it to the discussion on Mode 2 knowledge. When knowledge production is collaborative, the management of trade secrets must adapt. This is clearly another area for future research (Ankrah and Al-Tabbaa 2015). As the management of trade secrets develops, so must the teaching also develop and evolve. Our hope is that the framework of threshold concepts may improve upon the teaching of trade secret management.