Knowledge sabotage as an extreme form of counterproductive knowledge behavior: the perspective of the target
暂无分享,去创建一个
[1] J. Henrich,et al. Most people are not WEIRD , 2010, Nature.
[2] Scott B. MacKenzie,et al. Common method biases in behavioral research: a critical review of the literature and recommended remedies. , 2003, The Journal of applied psychology.
[3] M. Deutsch. A Theory of Cooperation – Competition and beyond , 2012 .
[4] N. Krieger,et al. Social Hazards on the Job: Workplace Abuse, Sexual Harassment, and Racial Discrimination—A Study of Black, Latino, and White Low-Income Women and Men Workers in the United States , 2006, International journal of health services : planning, administration, evaluation.
[5] M. Ronald Buckley,et al. A historical perspective of counterproductive work behavior targeting the organization , 2013 .
[6] Pamela R. Johnson,et al. Rudeness at Work: Impulse over Restraint , 2001 .
[7] K. Pedigo,et al. Western Australian Managers Tell Their Stories: Ethical Challenges in International Business Operations , 2001 .
[8] Bruce Schneier,et al. The psychology of security , 2007, CACM.
[9] D. Sandy Staples,et al. Are full and partial knowledge sharing the same? , 2010, J. Knowl. Manag..
[10] Dianne P. Ford,et al. Understanding "disengagement from knowledge sharing": engagement theory versus adaptive cost theory , 2015, J. Knowl. Manag..
[11] Michael D. Crino,et al. Employee Sabotage: A Random or Preventable Phenomenon? , 1994 .
[12] Christine M. Pearson,et al. Tit for Tat? The Spiraling Effect of Incivility in the Workplace , 1999 .
[13] Amar Cheema,et al. Data collection in a flat world: the strengths and weaknesses of mechanical turk samples , 2013 .
[14] Mark Promislo,et al. Unethical and Unwell: Decrements in Well-Being and Unethical Activity at Work , 2010 .
[15] Adam J. Berinsky,et al. Evaluating Online Labor Markets for Experimental Research: Amazon.com's Mechanical Turk , 2012, Political Analysis.
[16] Denise M. Rousseau,et al. CHANGING OBLIGATIONS AND THE PSYCHOLOGICAL CONTRACT: A LONGITUDINAL STUDY , 1994 .
[17] F. Cheung,et al. Psychological contract breach and counterproductive workplace behaviors: testing moderating effect of attribution style and power distance , 2011 .
[18] D. Marlowe,et al. A new scale of social desirability independent of psychopathology. , 1960, Journal of consulting psychology.
[19] N. Bowling,et al. Workplace harassment from the victim's perspective: a theoretical model and meta-analysis. , 2006, The Journal of applied psychology.
[20] Joy L. Cullen,et al. Socialization of business practitioners: learning to reflect on current business practices , 1995 .
[21] L. Cortina,et al. Patterns and profiles of response to incivility in the workplace. , 2009, Journal of occupational health psychology.
[22] D. Paulhus,et al. The Dark Triad of personality: Narcissism, Machiavellianism, and psychopathy , 2002 .
[23] N. Turner,et al. Predicting workplace aggression: a meta-analysis. , 2007, The Journal of applied psychology.
[24] I. Nonaka,et al. The Concept of “Ba”: Building a Foundation for Knowledge Creation , 1998 .
[25] M. Vartia. Consequences of workplace bullying with respect to the well-being of its targets and the observers of bullying. , 2001, Scandinavian journal of work, environment & health.
[26] Mary Beth Rosson,et al. Comparative usability evaluation: critical incidents and critical threads , 1994, CHI '94.
[27] Gary P. Latham,et al. The reliability and validity of the critical incident technique: A closer look. , 1974 .
[28] Stefano Bresciani,et al. Ambidextrous work in smart city project alliances: unpacking the role of human resource management systems , 2019 .
[29] Loraleigh Keashly. Emotional Abuse in the Workplace. , 1997 .
[30] Miha Skerlavaj,et al. Evasive knowledge hiding in academia: when competitive individuals are asked to collaborate , 2019, J. Knowl. Manag..
[31] Alexander Serenko,et al. Rigor and Relevance: The Application of The Critical Incident Technique to Investigate Email Usage , 2010, J. Organ. Comput. Electron. Commer..
[32] P. Totterdell,et al. Can employees be emotionally drained by witnessing unpleasant interactions between coworkers? A diary study of induced emotion regulation , 2012 .
[33] Miha Skerlavaj,et al. Tell me if you can: time pressure, prosocial motivation, perspective taking, and knowledge hiding , 2018, J. Knowl. Manag..
[34] Philipp Holtkamp,et al. Measuring and Controlling Social Desirability Bias: Applications in Information Systems Research , 2019, J. Assoc. Inf. Syst..
[35] L. Porter,et al. Alternative Approaches to the Employee-Organization Relationship: Does Investment in Employees Pay Off? , 1997 .
[36] C. Dreu. The virtue and vice of workplace conflict: food for (pessimistic) thought , 2008 .
[37] Matthew B. Miles,et al. Qualitative Data Analysis: An Expanded Sourcebook , 1994 .
[38] R. Folger,et al. RETALIATION IN THE WORKPLACE: THE ROLES OF DISTRIBUTIVE, PROCEDURAL, AND INTERACTIONAL JUSTICE , 1997 .
[39] J. C. Flanagan. Psychological Bulletin THE CRITICAL INCIDENT TECHNIQUE , 2022 .
[40] Steven L. Alter. Goals and Tactics on the Dark Side of Knowledge Management , 2006, Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06).
[41] J. Webster,et al. Knowledge hiding in organizations , 2012 .
[42] E. E. Jones. Attribution: Perceiving the Causes of Behavior , 1987 .
[43] Gary Blau,et al. Testing a measure of instigated workplace incivility , 2005 .
[44] K. Sheehan,et al. An Analysis of Data Quality: Professional Panels, Student Subject Pools, and Amazon's Mechanical Turk , 2017 .
[45] Michael D. Buhrmester,et al. Amazon's Mechanical Turk , 2011, Perspectives on psychological science : a journal of the Association for Psychological Science.
[46] Lee D. Butterfield,et al. Fifty years of the critical incident technique: 1954-2004 and beyond , 2005 .
[47] K. Jehn. A Multimethod Examination of the Benefits and Detriments of Intragroup Conflict , 1995 .
[48] Neil F. Doherty,et al. The rhetoric of "knowledge hoarding": a research-based critique , 2017, J. Knowl. Manag..
[49] Philipp Holtkamp,et al. Measuring and Controlling Social Desirability Bias: Applications in Information Systems Research , 2019, J. Assoc. Inf. Syst..
[50] Michele J. Gelfand,et al. Conflict in the workplace: Sources, functions, and dynamics across multiple levels of analysis. , 2007 .
[51] Silvia Martelo-Landroguez,et al. Uncontrolled counter-knowledge: its effects on knowledge management corridors , 2019, Knowledge Management Research & Practice.
[52] J. Barling,et al. Understanding the Many Faces of Workplace Violence. , 2005 .
[53] R. Folger,et al. Effects of Procedural and Distributive Justice on Reactions to Pay Raise Decisions , 1989 .
[54] Alexander Serenko,et al. A dual-attitude model of system use: The effect of explicit and implicit attitudes , 2019, Inf. Manag..
[55] R. Bennett,et al. A TYPOLOGY OF DEVIANT WORKPLACE BEHAVIORS: A MULTIDIMENSIONAL SCALING STUDY , 1995 .
[56] Alexander Serenko,et al. Knowledge sabotage as an extreme form of counterproductive knowledge behavior: conceptualization, typology, and empirical demonstration , 2019, J. Knowl. Manag..
[57] Anıl Boz Semerci,et al. Examination of knowledge hiding with conflict, competition and personal values , 2019, International Journal of Conflict Management.
[58] Paul E. Spector,et al. The Stressor-Emotion Model of Counterproductive Work Behavior. , 2005 .
[59] M. S. Hershcovis,et al. Observing workplace incivility. , 2015, The Journal of applied psychology.
[60] D. Rousseau. Psychological and implied contracts in organizations , 1989 .
[61] W. Gove,et al. Deterrence: Some Theoretical Considerations , 1975 .
[62] R. Bies,et al. Interactional justice: Looking backward, looking forward. , 2015 .
[63] Holly J. Payne. Targets, strategies, and topics of deception among part‐time workers , 2008 .
[64] Bengt-Erik Andersson,et al. Studies in the reliability and validity of the critical incident technique. , 1964 .
[65] Darren C. Treadway,et al. Bullying in the 21st Century Global Organization: An Ethical Perspective , 2009 .
[66] Robert A. Baron,et al. Aggression in the Workplace: A Social-Psychological Perspective. , 1997 .
[67] J. Cegarra-Navarro,et al. Negative aspects of counter-knowledge on absorptive capacity and human capital , 2015 .
[68] John Israilidis,et al. Individual variables with an impact on knowledge sharing: the critical role of employees' ignorance , 2015, J. Knowl. Manag..
[69] Alexander Serenko,et al. The World IT Project: History, Trials, Tribulations, Lessons, and Recommendations , 2017, Commun. Assoc. Inf. Syst..
[70] Travis C. Pratt,et al. The Empirical Status of Deterrence Theory: A Meta-Analysis , 2006 .
[71] Alexander Serenko,et al. The use of interface agents for email notification in critical incidents , 2006, Int. J. Hum. Comput. Stud..
[72] James E. Bartlett,et al. Workplace Bullying: An Integrative Literature Review , 2011 .
[73] Daniel C. Ganster,et al. Social Undermining in the Workplace , 2002 .
[74] Richard N. Landers,et al. Validation of the Beneficial and Harmful Work-Related Social Media Behavioral Taxonomies , 2014 .
[75] F. Analoui,et al. Workplace sabotage: its styles, motives and management , 1995 .
[76] Nick Bontis,et al. Organizational size and knowledge flow: a proposed theoretical link , 2007 .
[77] M. Banaji,et al. PREDICTIVE VALIDITY OF THE IAT 1 RUNNING HEAD : PREDICTIVE VALIDITY OF THE IAT Understanding and Using the Implicit Association Test : III . Meta-analysis of Predictive Validity , 2006 .
[78] S. Thatcher,et al. The Effects of Conflict Asymmetry on Work Group and Individual Outcomes , 2010 .
[79] M. Bauer. Exchange And Power In Social Life , 2016 .
[80] More Lies than Meet the Eyes: Organizational Realities and Deceptions in Nonprofit Organizations , 2008 .
[81] B. Weiner,et al. Perceiving the Causes of Success and Failure , 1989 .
[82] June E. Downey,et al. Les r?v?lations de l'?criture d'apr?s un contr?le scientifique. , 1908 .
[83] J. Barling,et al. Leader Apologies and Employee and Leader Well-Being , 2014 .
[84] M. Sandy Hershcovis,et al. “Incivility, social undermining, bullying…oh my!”: A call to reconcile constructs within workplace aggression research , 2011 .
[85] Klaus Krippendorff,et al. Content Analysis: An Introduction to Its Methodology , 1980 .