Knowledge sabotage as an extreme form of counterproductive knowledge behavior: the perspective of the target

This study aims to explore the existence of knowledge sabotage in the contemporary organization from the perspective of the target.,This study collected and analyzed 172 critical incidents reported by 109 employees who were targets of knowledge sabotage in their organizations.,Over 50 per cent of employees experienced at least one knowledge sabotage incident. Knowledge sabotage is driven by three factors, namely, gratification, retaliation against other employees and one’s malevolent personality. Knowledge saboteurs are more likely to provide intangible than tangible knowledge. Knowledge sabotage results in extremely negative consequences for individuals, organizations and third parties. Organizations often indirectly facilitate knowledge sabotage among their employees. Both knowledge saboteurs and their targets believe in their innocence – saboteurs are certain that their action was a necessary response to targets’ inappropriate workplace behavior, whereas targets insist on their innocence and hold saboteurs solely responsible.,Organizations should recruit employees with compatible personalities and working styles, introduce inter-employee conflict prevention and resolution procedures, develop anti-knowledge sabotage policies, clearly articulate the individual and organizational consequences of knowledge sabotage and eliminate zero-sum game-based incentives and rewards.,This is the first study documenting knowledge sabotage from the target’s perspective.

[1]  J. Henrich,et al.  Most people are not WEIRD , 2010, Nature.

[2]  Scott B. MacKenzie,et al.  Common method biases in behavioral research: a critical review of the literature and recommended remedies. , 2003, The Journal of applied psychology.

[3]  M. Deutsch A Theory of Cooperation – Competition and beyond , 2012 .

[4]  N. Krieger,et al.  Social Hazards on the Job: Workplace Abuse, Sexual Harassment, and Racial Discrimination—A Study of Black, Latino, and White Low-Income Women and Men Workers in the United States , 2006, International journal of health services : planning, administration, evaluation.

[5]  M. Ronald Buckley,et al.  A historical perspective of counterproductive work behavior targeting the organization , 2013 .

[6]  Pamela R. Johnson,et al.  Rudeness at Work: Impulse over Restraint , 2001 .

[7]  K. Pedigo,et al.  Western Australian Managers Tell Their Stories: Ethical Challenges in International Business Operations , 2001 .

[8]  Bruce Schneier,et al.  The psychology of security , 2007, CACM.

[9]  D. Sandy Staples,et al.  Are full and partial knowledge sharing the same? , 2010, J. Knowl. Manag..

[10]  Dianne P. Ford,et al.  Understanding "disengagement from knowledge sharing": engagement theory versus adaptive cost theory , 2015, J. Knowl. Manag..

[11]  Michael D. Crino,et al.  Employee Sabotage: A Random or Preventable Phenomenon? , 1994 .

[12]  Christine M. Pearson,et al.  Tit for Tat? The Spiraling Effect of Incivility in the Workplace , 1999 .

[13]  Amar Cheema,et al.  Data collection in a flat world: the strengths and weaknesses of mechanical turk samples , 2013 .

[14]  Mark Promislo,et al.  Unethical and Unwell: Decrements in Well-Being and Unethical Activity at Work , 2010 .

[15]  Adam J. Berinsky,et al.  Evaluating Online Labor Markets for Experimental Research: Amazon.com's Mechanical Turk , 2012, Political Analysis.

[16]  Denise M. Rousseau,et al.  CHANGING OBLIGATIONS AND THE PSYCHOLOGICAL CONTRACT: A LONGITUDINAL STUDY , 1994 .

[17]  F. Cheung,et al.  Psychological contract breach and counterproductive workplace behaviors: testing moderating effect of attribution style and power distance , 2011 .

[18]  D. Marlowe,et al.  A new scale of social desirability independent of psychopathology. , 1960, Journal of consulting psychology.

[19]  N. Bowling,et al.  Workplace harassment from the victim's perspective: a theoretical model and meta-analysis. , 2006, The Journal of applied psychology.

[20]  Joy L. Cullen,et al.  Socialization of business practitioners: learning to reflect on current business practices , 1995 .

[21]  L. Cortina,et al.  Patterns and profiles of response to incivility in the workplace. , 2009, Journal of occupational health psychology.

[22]  D. Paulhus,et al.  The Dark Triad of personality: Narcissism, Machiavellianism, and psychopathy , 2002 .

[23]  N. Turner,et al.  Predicting workplace aggression: a meta-analysis. , 2007, The Journal of applied psychology.

[24]  I. Nonaka,et al.  The Concept of “Ba”: Building a Foundation for Knowledge Creation , 1998 .

[25]  M. Vartia Consequences of workplace bullying with respect to the well-being of its targets and the observers of bullying. , 2001, Scandinavian journal of work, environment & health.

[26]  Mary Beth Rosson,et al.  Comparative usability evaluation: critical incidents and critical threads , 1994, CHI '94.

[27]  Gary P. Latham,et al.  The reliability and validity of the critical incident technique: A closer look. , 1974 .

[28]  Stefano Bresciani,et al.  Ambidextrous work in smart city project alliances: unpacking the role of human resource management systems , 2019 .

[29]  Loraleigh Keashly Emotional Abuse in the Workplace. , 1997 .

[30]  Miha Skerlavaj,et al.  Evasive knowledge hiding in academia: when competitive individuals are asked to collaborate , 2019, J. Knowl. Manag..

[31]  Alexander Serenko,et al.  Rigor and Relevance: The Application of The Critical Incident Technique to Investigate Email Usage , 2010, J. Organ. Comput. Electron. Commer..

[32]  P. Totterdell,et al.  Can employees be emotionally drained by witnessing unpleasant interactions between coworkers? A diary study of induced emotion regulation , 2012 .

[33]  Miha Skerlavaj,et al.  Tell me if you can: time pressure, prosocial motivation, perspective taking, and knowledge hiding , 2018, J. Knowl. Manag..

[34]  Philipp Holtkamp,et al.  Measuring and Controlling Social Desirability Bias: Applications in Information Systems Research , 2019, J. Assoc. Inf. Syst..

[35]  L. Porter,et al.  Alternative Approaches to the Employee-Organization Relationship: Does Investment in Employees Pay Off? , 1997 .

[36]  C. Dreu The virtue and vice of workplace conflict: food for (pessimistic) thought , 2008 .

[37]  Matthew B. Miles,et al.  Qualitative Data Analysis: An Expanded Sourcebook , 1994 .

[38]  R. Folger,et al.  RETALIATION IN THE WORKPLACE: THE ROLES OF DISTRIBUTIVE, PROCEDURAL, AND INTERACTIONAL JUSTICE , 1997 .

[39]  J. C. Flanagan Psychological Bulletin THE CRITICAL INCIDENT TECHNIQUE , 2022 .

[40]  Steven L. Alter Goals and Tactics on the Dark Side of Knowledge Management , 2006, Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06).

[41]  J. Webster,et al.  Knowledge hiding in organizations , 2012 .

[42]  E. E. Jones Attribution: Perceiving the Causes of Behavior , 1987 .

[43]  Gary Blau,et al.  Testing a measure of instigated workplace incivility , 2005 .

[44]  K. Sheehan,et al.  An Analysis of Data Quality: Professional Panels, Student Subject Pools, and Amazon's Mechanical Turk , 2017 .

[45]  Michael D. Buhrmester,et al.  Amazon's Mechanical Turk , 2011, Perspectives on psychological science : a journal of the Association for Psychological Science.

[46]  Lee D. Butterfield,et al.  Fifty years of the critical incident technique: 1954-2004 and beyond , 2005 .

[47]  K. Jehn A Multimethod Examination of the Benefits and Detriments of Intragroup Conflict , 1995 .

[48]  Neil F. Doherty,et al.  The rhetoric of "knowledge hoarding": a research-based critique , 2017, J. Knowl. Manag..

[49]  Philipp Holtkamp,et al.  Measuring and Controlling Social Desirability Bias: Applications in Information Systems Research , 2019, J. Assoc. Inf. Syst..

[50]  Michele J. Gelfand,et al.  Conflict in the workplace: Sources, functions, and dynamics across multiple levels of analysis. , 2007 .

[51]  Silvia Martelo-Landroguez,et al.  Uncontrolled counter-knowledge: its effects on knowledge management corridors , 2019, Knowledge Management Research & Practice.

[52]  J. Barling,et al.  Understanding the Many Faces of Workplace Violence. , 2005 .

[53]  R. Folger,et al.  Effects of Procedural and Distributive Justice on Reactions to Pay Raise Decisions , 1989 .

[54]  Alexander Serenko,et al.  A dual-attitude model of system use: The effect of explicit and implicit attitudes , 2019, Inf. Manag..

[55]  R. Bennett,et al.  A TYPOLOGY OF DEVIANT WORKPLACE BEHAVIORS: A MULTIDIMENSIONAL SCALING STUDY , 1995 .

[56]  Alexander Serenko,et al.  Knowledge sabotage as an extreme form of counterproductive knowledge behavior: conceptualization, typology, and empirical demonstration , 2019, J. Knowl. Manag..

[57]  Anıl Boz Semerci,et al.  Examination of knowledge hiding with conflict, competition and personal values , 2019, International Journal of Conflict Management.

[58]  Paul E. Spector,et al.  The Stressor-Emotion Model of Counterproductive Work Behavior. , 2005 .

[59]  M. S. Hershcovis,et al.  Observing workplace incivility. , 2015, The Journal of applied psychology.

[60]  D. Rousseau Psychological and implied contracts in organizations , 1989 .

[61]  W. Gove,et al.  Deterrence: Some Theoretical Considerations , 1975 .

[62]  R. Bies,et al.  Interactional justice: Looking backward, looking forward. , 2015 .

[63]  Holly J. Payne Targets, strategies, and topics of deception among part‐time workers , 2008 .

[64]  Bengt-Erik Andersson,et al.  Studies in the reliability and validity of the critical incident technique. , 1964 .

[65]  Darren C. Treadway,et al.  Bullying in the 21st Century Global Organization: An Ethical Perspective , 2009 .

[66]  Robert A. Baron,et al.  Aggression in the Workplace: A Social-Psychological Perspective. , 1997 .

[67]  J. Cegarra-Navarro,et al.  Negative aspects of counter-knowledge on absorptive capacity and human capital , 2015 .

[68]  John Israilidis,et al.  Individual variables with an impact on knowledge sharing: the critical role of employees' ignorance , 2015, J. Knowl. Manag..

[69]  Alexander Serenko,et al.  The World IT Project: History, Trials, Tribulations, Lessons, and Recommendations , 2017, Commun. Assoc. Inf. Syst..

[70]  Travis C. Pratt,et al.  The Empirical Status of Deterrence Theory: A Meta-Analysis , 2006 .

[71]  Alexander Serenko,et al.  The use of interface agents for email notification in critical incidents , 2006, Int. J. Hum. Comput. Stud..

[72]  James E. Bartlett,et al.  Workplace Bullying: An Integrative Literature Review , 2011 .

[73]  Daniel C. Ganster,et al.  Social Undermining in the Workplace , 2002 .

[74]  Richard N. Landers,et al.  Validation of the Beneficial and Harmful Work-Related Social Media Behavioral Taxonomies , 2014 .

[75]  F. Analoui,et al.  Workplace sabotage: its styles, motives and management , 1995 .

[76]  Nick Bontis,et al.  Organizational size and knowledge flow: a proposed theoretical link , 2007 .

[77]  M. Banaji,et al.  PREDICTIVE VALIDITY OF THE IAT 1 RUNNING HEAD : PREDICTIVE VALIDITY OF THE IAT Understanding and Using the Implicit Association Test : III . Meta-analysis of Predictive Validity , 2006 .

[78]  S. Thatcher,et al.  The Effects of Conflict Asymmetry on Work Group and Individual Outcomes , 2010 .

[79]  M. Bauer Exchange And Power In Social Life , 2016 .

[80]  More Lies than Meet the Eyes: Organizational Realities and Deceptions in Nonprofit Organizations , 2008 .

[81]  B. Weiner,et al.  Perceiving the Causes of Success and Failure , 1989 .

[82]  June E. Downey,et al.  Les r?v?lations de l'?criture d'apr?s un contr?le scientifique. , 1908 .

[83]  J. Barling,et al.  Leader Apologies and Employee and Leader Well-Being , 2014 .

[84]  M. Sandy Hershcovis,et al.  “Incivility, social undermining, bullying…oh my!”: A call to reconcile constructs within workplace aggression research , 2011 .

[85]  Klaus Krippendorff,et al.  Content Analysis: An Introduction to Its Methodology , 1980 .