The Dark Side of Online Knowledge Sharing
暂无分享,去创建一个
James E. Hunton | Ryan J. Baxter | Scott R. Boss | Antoinette L. Smith | Antoinette L. Smith | J. Hunton
[1] Scott B. MacKenzie,et al. Common method biases in behavioral research: a critical review of the literature and recommended remedies. , 2003, The Journal of applied psychology.
[2] James M. Kohlmeyer,et al. Organizational justice and turnover in public accounting firms: a research note , 2005 .
[3] Yung-Chuan Lee,et al. Information leakage detection in distributed systems using software agents , 2009, 2009 IEEE Symposium on Intelligent Agents.
[4] David Gefen,et al. Some antecedents and effects of trust in virtual communities , 2002, J. Strateg. Inf. Syst..
[5] Richard Mahee,et al. Understanding Knowledge Sharing , 2007 .
[6] Brian S. Butler,et al. Membership Size, Communication Activity, and Sustainability: A Resource-Based Model of Online Social Structures , 2001, Inf. Syst. Res..
[7] José María Gómez Hidalgo,et al. Data Leak Prevention through Named Entity Recognition , 2010, 2010 IEEE Second International Conference on Social Computing.
[8] H. Aarts,et al. How often did I do it? Experienced ease of retrieval and frequency estimates of past behavior , 1999 .
[9] Izak Benbasat,et al. Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness , 2010, MIS Q..
[10] Merrill Warkentin,et al. Fear Appeals and Information Security Behaviors: An Empirical Study , 2010, MIS Q..
[11] N. Noorderhaven,et al. When Does Trust Matter to Alliance Performance , 2006 .
[12] Timothy R. Hill,et al. The Emerging Challenge of Knowledge Management Ecosystems: A Silicon Valley High Tech Company Signals the Future , 2011, Inf. Syst. Manag..
[13] Daniel Z. Levin,et al. The Strength of Weak Ties You Can Trust: The Mediating Role of Trust in Effective Knowledge Transfer , 2004, Manag. Sci..
[14] Lee Sproull,et al. More Than an Answer: Information Relationships for Actionable Knowledge , 2004, Organ. Sci..
[15] Robin Teigland,et al. Collective Action and Knowledge Contribution in Electronic Networks of Practice , 2004, J. Assoc. Inf. Syst..
[16] Wendy Wood,et al. Habit and intention in everyday life: The multiple processes by which past behavior predicts future behavior. , 1998 .
[17] S. Ghoshal,et al. Social Capital, Intellectual Capital, and the Organizational Advantage , 1998 .
[18] Dorothy E. Leidner,et al. Review: Knowledge Management and Knowledge Management Systems: Conceptual Foundations and Research Issues , 2001, MIS Q..
[19] M. Polanyi. Chapter 7 – The Tacit Dimension , 1997 .
[20] Jacob Cohen. Statistical Power Analysis for the Behavioral Sciences , 1969, The SAGE Encyclopedia of Research Design.
[21] Yajiong Xue,et al. Understanding Security Behaviors in Personal Computer Usage: A Threat Avoidance Perspective , 2010, J. Assoc. Inf. Syst..
[22] Samer Faraj,et al. Why Should I Share? Examining Social Capital and Knowledge Contribution in Electronic Networks of Practice , 2005, MIS Q..
[23] Eric L. Lesser,et al. Nurturing interpersonal trust in knowledge-sharing networks , 2003 .
[24] Sirkka L. Jarvenpaa,et al. Is Anybody Out There? Antecedents of Trust in Global Virtual Teams , 1998, J. Manag. Inf. Syst..
[25] Clifford W. Smith. A perspective on accounting-based debt covenant violations , 1993 .
[26] Georg von Krogh,et al. Knowledge-based theories of the firm in strategic management : a review and extension , 2012 .
[27] B. Verplanken,et al. Habit and information use in travel mode choices , 1997 .
[28] Gonzalo Álvarez,et al. A Threat Model Approach to Threats and Vulnerabilities in On-line Social Networks , 2010, CISIS.
[29] Larry J. Williams,et al. Antecedents and consequences of satisfaction and commitment in turnover models: A reanalysis using latent variable structural equation methods. , 1986 .
[30] Chin-Lung Hsu,et al. Acceptance of blog usage: The roles of technology acceptance, social influence and knowledge sharing motivation , 2008, Inf. Manag..
[31] Daniel Heller,et al. Antecedents and consequences of the frequency of upward and downward social comparisons at work , 2007 .
[32] D. A. Kenny,et al. The moderator-mediator variable distinction in social psychological research: conceptual, strategic, and statistical considerations. , 1986, Journal of personality and social psychology.
[33] Gabriel Szulanski,et al. When and How Trustworthiness Matters: Knowledge Transfer and the Moderating Effect of Causal Ambiguity , 2004, Organ. Sci..
[34] G. Ryle,et al. 心的概念 = The concept of mind , 1962 .
[35] N. Aranya,et al. A Comparison of Two Organizational Commitment Scales. , 1983 .
[36] Shan Ling Pan,et al. Bridging communities of practice with information technology in pursuit of global knowledge sharing , 2003, J. Strateg. Inf. Syst..
[37] Uday S. Murthy,et al. Knowledge Sharing Among Accounting Academics in an Electronic Network of Practice , 2009 .
[38] E. Vance Wilson,et al. Antecedents and determinants of information technology habit , 2010, Inf. Manag..
[39] Joanne Roberts. Limits to Communities of Practice , 2006 .
[40] I. Ajzen. Nature and operation of attitudes. , 2001, Annual review of psychology.
[41] Ritu Agarwal,et al. Through a Glass Darkly: Information Technology Design, Identity Verification, and Knowledge Contribution in Online Communities , 2007, Inf. Syst. Res..
[42] A. P. Sweeney,et al. Debt-covenant violations and managers' accounting responses , 1994 .
[43] N. Sadat Shami,et al. We are all lurkers: consuming behaviors among authors and readers in an enterprise file-sharing service , 2010, GROUP '10.
[44] J. Brown,et al. Knowledge and Organization: A Social-Practice Perspective , 2001 .
[45] Balachander Krishnamurthy,et al. On the leakage of personally identifiable information via online social networks , 2009, CCRV.
[46] J. H. Davis,et al. The effect of the performance appraisal system on trust for management: A field quasi-experiment. , 1999 .
[47] Wynne W. Chin,et al. Extending the technology acceptance model: the influence of perceived user resources , 2001, DATB.
[48] R. Lennox,et al. Conventional wisdom on measurement: A structural equation perspective. , 1991 .
[49] Mikko T. Siponen,et al. Improving Employees' Compliance Through Information Systems Security Training: An Action Research Study , 2010, MIS Q..
[50] Dennis F. Galletta,et al. User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach , 2009, Inf. Syst. Res..
[51] M. McLure Wasko,et al. "It is what one does": why people participate and help others in electronic communities of practice , 2000, J. Strateg. Inf. Syst..
[52] B. Sparrow,et al. Google Effects on Memory: Cognitive Consequences of Having Information at Our Fingertips , 2011, Science.
[53] Mikko T. Siponen,et al. Neutralization: New Insights into the Problem of Employee Systems Security Policy Violations , 2010, MIS Q..
[54] Ashwin Machanavajjhala,et al. Privacy-Preserving Data Publishing , 2009, Found. Trends Databases.
[55] Ann Majchrzak,et al. Knowledge Collaboration in Online Communities , 2011, Organ. Sci..
[56] J. H. Davis,et al. An Integrative Model Of Organizational Trust , 1995 .
[57] Rajiv Sabherwal,et al. Usability and Sociability in Online Communities: A Comparative Study of Knowledge Seeking and Contribution , 2009, J. Assoc. Inf. Syst..
[58] R. Reilly,et al. Why do we trust? Moving beyond individual to dyadic perceptions. , 2010, The Journal of applied psychology.
[59] Eric T. G. Wang,et al. Understanding knowledge sharing in virtual communities: An integration of social capital and social cognitive theories , 2006, Decis. Support Syst..
[60] William J. Cenker,et al. Organizational commitment and auditors in public accounting , 2007 .
[61] J. Liebeskind,et al. Knowledge, Strategy, and the Theory of the Firm , 1996 .
[62] K. Ramesh,et al. The importance of accounting changes in debt contracts: the cost of flexibility in covenant calculations , 2002 .
[63] Bongsug Chae,et al. The paradoxes of knowledge management: An eastern philosophical perspective , 2006, Inf. Organ..
[64] Steven Postrel,et al. Shared knowledge, “glitches,” and product development performance , 1999 .
[65] Lada A. Adamic,et al. Knowledge sharing and yahoo answers: everyone knows something , 2008, WWW.
[66] Atreyi Kankanhalli,et al. Contributing Knowledge to Electronic Knowledge Repositories: An Empirical Investigation , 2005, MIS Q..
[67] Kregg Aytes,et al. Computer Security and Risky Computing Practices: A Rational Choice Perspective , 2004, J. Organ. End User Comput..
[68] Henri Barki,et al. User Participation in Information Systems Security Risk Management , 2010, MIS Q..
[69] L. Porter,et al. The Measurement of Organizational Commitment. , 1979 .
[70] Dennis F. Galletta,et al. A Multidimensional Commitment Model of Volitional Systems Adoption and Usage Behavior , 2005, J. Manag. Inf. Syst..