The Dark Side of Online Knowledge Sharing

ABSTRACT : Given the growing trend of electronic networks of practice and the growing propensity of individuals to rely on the Internet for problem solving, we examine whether programmers in a hypothetical situation would be likely to disclose confidential information through an online forum in attempt to solve a programming problem. We hypothesize and find in a survey of 187 programmers that online forum commitment and trust lead to greater online forum participation, which in turn predicts a higher likelihood of confidential information disclosure. We also find that programmers with greater awareness of security policies exhibit a lower likelihood of deciding to risk disclosing confidential information. The study contributes to extant literature by raising and exploring the potentially negative, dark side of knowledge sharing through electronic networks of practice.

[1]  Scott B. MacKenzie,et al.  Common method biases in behavioral research: a critical review of the literature and recommended remedies. , 2003, The Journal of applied psychology.

[2]  James M. Kohlmeyer,et al.  Organizational justice and turnover in public accounting firms: a research note , 2005 .

[3]  Yung-Chuan Lee,et al.  Information leakage detection in distributed systems using software agents , 2009, 2009 IEEE Symposium on Intelligent Agents.

[4]  David Gefen,et al.  Some antecedents and effects of trust in virtual communities , 2002, J. Strateg. Inf. Syst..

[5]  Richard Mahee,et al.  Understanding Knowledge Sharing , 2007 .

[6]  Brian S. Butler,et al.  Membership Size, Communication Activity, and Sustainability: A Resource-Based Model of Online Social Structures , 2001, Inf. Syst. Res..

[7]  José María Gómez Hidalgo,et al.  Data Leak Prevention through Named Entity Recognition , 2010, 2010 IEEE Second International Conference on Social Computing.

[8]  H. Aarts,et al.  How often did I do it? Experienced ease of retrieval and frequency estimates of past behavior , 1999 .

[9]  Izak Benbasat,et al.  Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness , 2010, MIS Q..

[10]  Merrill Warkentin,et al.  Fear Appeals and Information Security Behaviors: An Empirical Study , 2010, MIS Q..

[11]  N. Noorderhaven,et al.  When Does Trust Matter to Alliance Performance , 2006 .

[12]  Timothy R. Hill,et al.  The Emerging Challenge of Knowledge Management Ecosystems: A Silicon Valley High Tech Company Signals the Future , 2011, Inf. Syst. Manag..

[13]  Daniel Z. Levin,et al.  The Strength of Weak Ties You Can Trust: The Mediating Role of Trust in Effective Knowledge Transfer , 2004, Manag. Sci..

[14]  Lee Sproull,et al.  More Than an Answer: Information Relationships for Actionable Knowledge , 2004, Organ. Sci..

[15]  Robin Teigland,et al.  Collective Action and Knowledge Contribution in Electronic Networks of Practice , 2004, J. Assoc. Inf. Syst..

[16]  Wendy Wood,et al.  Habit and intention in everyday life: The multiple processes by which past behavior predicts future behavior. , 1998 .

[17]  S. Ghoshal,et al.  Social Capital, Intellectual Capital, and the Organizational Advantage , 1998 .

[18]  Dorothy E. Leidner,et al.  Review: Knowledge Management and Knowledge Management Systems: Conceptual Foundations and Research Issues , 2001, MIS Q..

[19]  M. Polanyi Chapter 7 – The Tacit Dimension , 1997 .

[20]  Jacob Cohen Statistical Power Analysis for the Behavioral Sciences , 1969, The SAGE Encyclopedia of Research Design.

[21]  Yajiong Xue,et al.  Understanding Security Behaviors in Personal Computer Usage: A Threat Avoidance Perspective , 2010, J. Assoc. Inf. Syst..

[22]  Samer Faraj,et al.  Why Should I Share? Examining Social Capital and Knowledge Contribution in Electronic Networks of Practice , 2005, MIS Q..

[23]  Eric L. Lesser,et al.  Nurturing interpersonal trust in knowledge-sharing networks , 2003 .

[24]  Sirkka L. Jarvenpaa,et al.  Is Anybody Out There? Antecedents of Trust in Global Virtual Teams , 1998, J. Manag. Inf. Syst..

[25]  Clifford W. Smith A perspective on accounting-based debt covenant violations , 1993 .

[26]  Georg von Krogh,et al.  Knowledge-based theories of the firm in strategic management : a review and extension , 2012 .

[27]  B. Verplanken,et al.  Habit and information use in travel mode choices , 1997 .

[28]  Gonzalo Álvarez,et al.  A Threat Model Approach to Threats and Vulnerabilities in On-line Social Networks , 2010, CISIS.

[29]  Larry J. Williams,et al.  Antecedents and consequences of satisfaction and commitment in turnover models: A reanalysis using latent variable structural equation methods. , 1986 .

[30]  Chin-Lung Hsu,et al.  Acceptance of blog usage: The roles of technology acceptance, social influence and knowledge sharing motivation , 2008, Inf. Manag..

[31]  Daniel Heller,et al.  Antecedents and consequences of the frequency of upward and downward social comparisons at work , 2007 .

[32]  D. A. Kenny,et al.  The moderator-mediator variable distinction in social psychological research: conceptual, strategic, and statistical considerations. , 1986, Journal of personality and social psychology.

[33]  Gabriel Szulanski,et al.  When and How Trustworthiness Matters: Knowledge Transfer and the Moderating Effect of Causal Ambiguity , 2004, Organ. Sci..

[34]  G. Ryle,et al.  心的概念 = The concept of mind , 1962 .

[35]  N. Aranya,et al.  A Comparison of Two Organizational Commitment Scales. , 1983 .

[36]  Shan Ling Pan,et al.  Bridging communities of practice with information technology in pursuit of global knowledge sharing , 2003, J. Strateg. Inf. Syst..

[37]  Uday S. Murthy,et al.  Knowledge Sharing Among Accounting Academics in an Electronic Network of Practice , 2009 .

[38]  E. Vance Wilson,et al.  Antecedents and determinants of information technology habit , 2010, Inf. Manag..

[39]  Joanne Roberts Limits to Communities of Practice , 2006 .

[40]  I. Ajzen Nature and operation of attitudes. , 2001, Annual review of psychology.

[41]  Ritu Agarwal,et al.  Through a Glass Darkly: Information Technology Design, Identity Verification, and Knowledge Contribution in Online Communities , 2007, Inf. Syst. Res..

[42]  A. P. Sweeney,et al.  Debt-covenant violations and managers' accounting responses , 1994 .

[43]  N. Sadat Shami,et al.  We are all lurkers: consuming behaviors among authors and readers in an enterprise file-sharing service , 2010, GROUP '10.

[44]  J. Brown,et al.  Knowledge and Organization: A Social-Practice Perspective , 2001 .

[45]  Balachander Krishnamurthy,et al.  On the leakage of personally identifiable information via online social networks , 2009, CCRV.

[46]  J. H. Davis,et al.  The effect of the performance appraisal system on trust for management: A field quasi-experiment. , 1999 .

[47]  Wynne W. Chin,et al.  Extending the technology acceptance model: the influence of perceived user resources , 2001, DATB.

[48]  R. Lennox,et al.  Conventional wisdom on measurement: A structural equation perspective. , 1991 .

[49]  Mikko T. Siponen,et al.  Improving Employees' Compliance Through Information Systems Security Training: An Action Research Study , 2010, MIS Q..

[50]  Dennis F. Galletta,et al.  User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach , 2009, Inf. Syst. Res..

[51]  M. McLure Wasko,et al.  "It is what one does": why people participate and help others in electronic communities of practice , 2000, J. Strateg. Inf. Syst..

[52]  B. Sparrow,et al.  Google Effects on Memory: Cognitive Consequences of Having Information at Our Fingertips , 2011, Science.

[53]  Mikko T. Siponen,et al.  Neutralization: New Insights into the Problem of Employee Systems Security Policy Violations , 2010, MIS Q..

[54]  Ashwin Machanavajjhala,et al.  Privacy-Preserving Data Publishing , 2009, Found. Trends Databases.

[55]  Ann Majchrzak,et al.  Knowledge Collaboration in Online Communities , 2011, Organ. Sci..

[56]  J. H. Davis,et al.  An Integrative Model Of Organizational Trust , 1995 .

[57]  Rajiv Sabherwal,et al.  Usability and Sociability in Online Communities: A Comparative Study of Knowledge Seeking and Contribution , 2009, J. Assoc. Inf. Syst..

[58]  R. Reilly,et al.  Why do we trust? Moving beyond individual to dyadic perceptions. , 2010, The Journal of applied psychology.

[59]  Eric T. G. Wang,et al.  Understanding knowledge sharing in virtual communities: An integration of social capital and social cognitive theories , 2006, Decis. Support Syst..

[60]  William J. Cenker,et al.  Organizational commitment and auditors in public accounting , 2007 .

[61]  J. Liebeskind,et al.  Knowledge, Strategy, and the Theory of the Firm , 1996 .

[62]  K. Ramesh,et al.  The importance of accounting changes in debt contracts: the cost of flexibility in covenant calculations , 2002 .

[63]  Bongsug Chae,et al.  The paradoxes of knowledge management: An eastern philosophical perspective , 2006, Inf. Organ..

[64]  Steven Postrel,et al.  Shared knowledge, “glitches,” and product development performance , 1999 .

[65]  Lada A. Adamic,et al.  Knowledge sharing and yahoo answers: everyone knows something , 2008, WWW.

[66]  Atreyi Kankanhalli,et al.  Contributing Knowledge to Electronic Knowledge Repositories: An Empirical Investigation , 2005, MIS Q..

[67]  Kregg Aytes,et al.  Computer Security and Risky Computing Practices: A Rational Choice Perspective , 2004, J. Organ. End User Comput..

[68]  Henri Barki,et al.  User Participation in Information Systems Security Risk Management , 2010, MIS Q..

[69]  L. Porter,et al.  The Measurement of Organizational Commitment. , 1979 .

[70]  Dennis F. Galletta,et al.  A Multidimensional Commitment Model of Volitional Systems Adoption and Usage Behavior , 2005, J. Manag. Inf. Syst..