The contradiction between self-protection and self-presentation on knowledge sharing behavior
This study decomposes information security awareness (ISA) into general information security awareness (GISA) and information security policy awareness (ISPA), to explore how these factors affect knowledge-sharing behavior. It also investigates the effects of threat appraisal and source credibility...
Saved in:
Published in | Computers in human behavior Vol. 76; pp. 406 - 416 |
---|---|
Main Authors | , , , |
Format | Journal Article |
Language | English |
Published |
Elmsford
Elsevier Ltd
01.11.2017
Elsevier Science Ltd |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | This study decomposes information security awareness (ISA) into general information security awareness (GISA) and information security policy awareness (ISPA), to explore how these factors affect knowledge-sharing behavior. It also investigates the effects of threat appraisal and source credibility on knowledge-sharing behavior from self-protection and self-presentation perspectives. This study adopted an online questionnaire through mySurvey for data collection. This research collected and analyzed 598 valid responses by using a structural equation modeling to validate the research hypotheses. The results indicate that GISA and ISPA have significant positive effects on threat appraisal. Whereas ISPA has a significant positive effect on knowledge-sharing behavior, GISA does not. With regard to social ties, bonding social capital and bridging social capital have significant positive effects on both source credibility and knowledge-sharing behavior. Threat appraisal has a significant negative effect, and source credibility has a significant positive effect, on knowledge-sharing behavior. In addition, threat appraisal and source credibility exert partial mediation effects on ISPA, bonding social capital, bridging social capital, and knowledge-sharing behavior.
•GISA and ISPA have significant effects on threat appraisal.•Bonding/bridging social capital have significant effects on source credibility.•ISPA has a significant effect on knowledge-sharing behavior.•Threat appraisal and source credibility have significant effects on knowledge-sharing behavior.•Bonding/bridging social capital have significant effects on knowledge-sharing behavior. |
---|---|
AbstractList | This study decomposes information security awareness (ISA) into general information security awareness (GISA) and information security policy awareness (ISPA), to explore how these factors affect knowledge-sharing behavior. It also investigates the effects of threat appraisal and source credibility on knowledge-sharing behavior from self-protection and self-presentation perspectives. This study adopted an online questionnaire through mySurvey for data collection. This research collected and analyzed 598 valid responses by using a structural equation modeling to validate the research hypotheses. The results indicate that GISA and ISPA have significant positive effects on threat appraisal. Whereas ISPA has a significant positive effect on knowledge-sharing behavior, GISA does not. With regard to social ties, bonding social capital and bridging social capital have significant positive effects on both source credibility and knowledge-sharing behavior. Threat appraisal has a significant negative effect, and source credibility has a significant positive effect, on knowledge-sharing behavior. In addition, threat appraisal and source credibility exert partial mediation effects on ISPA, bonding social capital, bridging social capital, and knowledge-sharing behavior.
•GISA and ISPA have significant effects on threat appraisal.•Bonding/bridging social capital have significant effects on source credibility.•ISPA has a significant effect on knowledge-sharing behavior.•Threat appraisal and source credibility have significant effects on knowledge-sharing behavior.•Bonding/bridging social capital have significant effects on knowledge-sharing behavior. This study decomposes information security awareness (ISA) into general information security awareness (GISA) and information security policy awareness (ISPA), to explore how these factors affect knowledge-sharing behavior. It also investigates the effects of threat appraisal and source credibility on knowledge-sharing behavior from self-protection and self-presentation perspectives. This study adopted an online questionnaire through mySurvey for data collection. This research collected and analyzed 598 valid responses by using a structural equation modeling to validate the research hypotheses. The results indicate that GISA and ISPA have significant positive effects on threat appraisal. Whereas ISPA has a significant positive effect on knowledge-sharing behavior, GISA does not. With regard to social ties, bonding social capital and bridging social capital have significant positive effects on both source credibility and knowledge-sharing behavior. Threat appraisal has a significant negative effect, and source credibility has a significant positive effect, on knowledge-sharing behavior. In addition, threat appraisal and source credibility exert partial mediation effects on ISPA, bonding social capital, bridging social capital, and knowledge-sharing behavior. |
Author | Chang, Shu-Hao Ortiz, Jaime Chih, Wen-Hai Wang, Chia-Hao |
Author_xml | – sequence: 1 givenname: Jaime surname: Ortiz fullname: Ortiz, Jaime email: jortiz22@uh.edu organization: Global Strategies and Studies, University of Houston, E.W. Cullen Bldg. Suite 101, 4302 University Dr. Houston, TX, 77204-2039, United States – sequence: 2 givenname: Shu-Hao surname: Chang fullname: Chang, Shu-Hao email: shu-hao@hotmail.com organization: Science and Technology Policy Research and Information Centre of National Applied Research Laboratories, 3F., No. 106, Sec. 2, Heping E. Rd., Taipei, 10622, Taiwan, ROC – sequence: 3 givenname: Wen-Hai surname: Chih fullname: Chih, Wen-Hai email: whchih@mail.ndhu.edu.tw organization: Department of Business Administration, National Dong Hwa University, No. 1, Sec. 2, Da Hsueh Rd., Shoufent, Hualien, 97401, Taiwan, ROC – sequence: 4 givenname: Chia-Hao surname: Wang fullname: Wang, Chia-Hao email: 610332017@ems.ndhu.edu.tw organization: Department of Business Administration, National Dong Hwa University, No. 1, Sec. 2, Da Hsueh Rd., Shoufent, Hualien, 97401, Taiwan, ROC |
BookMark | eNp9kEtLAzEUhYNUsK3-AHcF1zPmNYmDKym-oOCmLiVkkjttak1qMm3x35s6unFROHDhcL_7OCM08MEDQpcElwQTcb0qzbIpKSayxFmMnKAhuZGskKKmAzTEksuiEoyeoVFKK4xxVWExRG_zJUxM8F3U1pnOBT9poNsD-EmCdVtsYuig97W3fx4k8J3-cbPefdivwS5gkpY6Or_II5Z650I8R6etXie4-K1j9PpwP58-FbOXx-fp3awwjFZd0WordE0JFYIBa4AT4IJY2zRtxbmuak1k1ejaWGGB14ZLajk13AKVwFvGxuiqn5vP_dxC6tQqbKPPKxWpBeMME0pzF-m7TAwpRWjVJroPHb8UweqQolqpnKI6pKhwFiOZkf8Y4_rPc2JufZS87UnIj-8cRJWMA2_AupgTVTa4I_Q3Z1eQVQ |
CitedBy_id | crossref_primary_10_1080_23311975_2023_2195027 crossref_primary_10_15869_itobiad_602478 crossref_primary_10_1108_ITP_05_2022_0412 crossref_primary_10_3389_fpsyg_2022_967991 crossref_primary_10_3389_fpsyg_2022_810140 crossref_primary_10_1108_ITP_05_2018_0255 crossref_primary_10_1155_2022_2376811 crossref_primary_10_1007_s10257_022_00575_2 crossref_primary_10_3389_fpsyg_2023_1181030 crossref_primary_10_1108_AJIM_01_2018_0019 crossref_primary_10_1016_j_elerap_2024_101359 crossref_primary_10_1108_ITP_05_2023_0421 crossref_primary_10_1109_TEM_2022_3185381 crossref_primary_10_1016_j_heliyon_2023_e13764 crossref_primary_10_1016_j_im_2024_103987 crossref_primary_10_1108_APJML_12_2022_1015 crossref_primary_10_2147_PRBM_S454292 |
Cites_doi | 10.1111/j.1083-6101.2006.00029.x 10.1016/j.elerap.2011.07.003 10.1016/j.cose.2015.05.012 10.1145/1107458.1107465 10.1057/ejis.2009.11 10.2307/25148755 10.1111/j.1083-6101.2006.00020.x 10.1016/j.chb.2009.03.008 10.1080/10580530.2015.1080002 10.1007/s11747-014-0403-8 10.1002/(SICI)1097-0266(199902)20:2<195::AID-SMJ13>3.0.CO;2-7 10.1016/j.chb.2013.09.012 10.1016/j.compedu.2013.05.010 10.1007/s10796-012-9376-7 10.5465/amr.1989.4278999 10.1111/j.1083-6101.2007.00367.x 10.1002/hrm.20298 10.1016/j.chb.2015.03.050 10.1080/00223980.1975.9915803 10.1016/j.im.2014.03.007 10.2307/25148670 10.1057/jit.2010.6 10.1037/0022-3514.51.6.1173 10.5120/ijca2016910174 10.1177/0093650205285368 10.1016/j.istr.2010.04.005 10.1177/009207039502300406 10.1080/08874417.2016.1153910 10.1016/j.adolescence.2011.06.007 10.1177/0265407599162005 10.1287/isre.13.3.334.81 10.2307/3151312 10.1037/h0024833 10.2753/MIS0742-1222280309 10.1177/000271621606700118 10.2307/3151359 10.2307/25750690 10.5465/amr.2011.0235 10.1287/isre.1040.0032 10.1002/(SICI)1099-1441(199906)6:2<91::AID-KPM54>3.0.CO;2-M 10.1111/jcc4.12078 10.1007/s11747-015-0455-4 10.1016/j.chb.2014.02.031 10.1016/j.cose.2014.02.010 10.1016/j.tourman.2015.07.002 10.1109/TSMCA.2006.871793 10.1016/j.chb.2012.12.018 10.1287/isre.1070.0113 10.1037/0033-2909.103.3.411 10.1016/j.chb.2015.02.017 10.1108/PR-12-2013-0227 10.1016/j.dss.2013.01.029 10.1016/j.chb.2013.01.012 10.1016/j.cose.2014.03.004 |
ContentType | Journal Article |
Copyright | 2017 Elsevier Ltd Copyright Elsevier Science Ltd. Nov 2017 |
Copyright_xml | – notice: 2017 Elsevier Ltd – notice: Copyright Elsevier Science Ltd. Nov 2017 |
DBID | AAYXX CITATION 7SC 8FD JQ2 L7M L~C L~D |
DOI | 10.1016/j.chb.2017.07.031 |
DatabaseName | CrossRef Computer and Information Systems Abstracts Technology Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
DatabaseTitle | CrossRef Computer and Information Systems Abstracts Technology Research Database Computer and Information Systems Abstracts – Academic Advanced Technologies Database with Aerospace ProQuest Computer Science Collection Computer and Information Systems Abstracts Professional |
DatabaseTitleList | Computer and Information Systems Abstracts |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Psychology Computer Science |
EISSN | 1873-7692 |
EndPage | 416 |
ExternalDocumentID | 10_1016_j_chb_2017_07_031 S0747563217304533 |
GroupedDBID | --K --M -~X .DC .~1 0R~ 186 1B1 1RT 1~. 1~5 29F 4.4 457 4G. 53G 5GY 5VS 6J9 7-5 71M 8P~ 9JN 9JO AABNK AACTN AADFP AAEDT AAEDW AAFJI AAGJA AAGUQ AAIAV AAIKJ AAKOC AALRI AAOAW AAQFI AAQXK AAXUO AAYFN ABBOA ABFNM ABFRF ABIVO ABJNI ABMAC ABMMH ABOYX ABXDB ABYKQ ACDAQ ACGFO ACGFS ACHQT ACNNM ACRLP ACXNI ACZNC ADBBV ADEZE ADHUB ADJOM ADMUD AEBSH AEFWE AEKER AFFNX AFKWA AFTJW AFYLN AGHFR AGUBO AGYEJ AHHHB AHZHX AIALX AIEXJ AIKHN AITUG AJBFU AJOXV AKYCK ALMA_UNASSIGNED_HOLDINGS AMFUW AMRAJ AOMHK AOUOD ASPBG AVARZ AVWKF AXJTR AZFZN BKOJK BLXMC CS3 DU5 EBS EFJIC EFLBG EJD EO8 EO9 EP2 EP3 F5P FA8 FDB FEDTE FGOYB FIRID FNPLU FYGXN G-2 G-Q GBLVA GBOLZ HF~ HLZ HMW HVGLF HZ~ H~9 IHE J1W KOM LG9 LPU M3V M41 MO0 N9A NHB O-L O9- OAUVE OKEIE OZT P-8 P-9 P2P PC. PRBVW Q38 R2- RIG ROL RPZ RXW SBC SCC SDF SDG SDP SES SEW SPC SPCBC SPS SSB SSO SSV SSY SSZ T5K TAE UMD UNMZH WUQ XPP XSW ZCA ~G- AATTM AAXKI AAYWO AAYXX ABWVN ACRPL ACVFH ADCNI ADNMO AEIPS AEUPX AFJKZ AFPUW AFXIZ AGCQF AGQPQ AGRNS AIGII AIIUN AKBMS AKRWK AKYEP ANKPU APXCP BNPGV CITATION SSH 7SC 8FD EFKBS JQ2 L7M L~C L~D |
ID | FETCH-LOGICAL-c325t-fad6a9212663e3be41e461ddbbf544a59a175ba9cd6de49c472d42c4de27e4f33 |
IEDL.DBID | .~1 |
ISSN | 0747-5632 |
IngestDate | Wed Aug 13 04:42:28 EDT 2025 Tue Jul 01 03:51:33 EDT 2025 Thu Apr 24 22:54:49 EDT 2025 Fri Feb 23 02:13:59 EST 2024 |
IsPeerReviewed | true |
IsScholarly | true |
Keywords | Information security awareness Self-protection perspective Self-presentation perspective Knowledge-sharing behavior Social capital |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c325t-fad6a9212663e3be41e461ddbbf544a59a175ba9cd6de49c472d42c4de27e4f33 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
PQID | 1963430122 |
PQPubID | 2038346 |
PageCount | 11 |
ParticipantIDs | proquest_journals_1963430122 crossref_primary_10_1016_j_chb_2017_07_031 crossref_citationtrail_10_1016_j_chb_2017_07_031 elsevier_sciencedirect_doi_10_1016_j_chb_2017_07_031 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | November 2017 2017-11-00 20171101 |
PublicationDateYYYYMMDD | 2017-11-01 |
PublicationDate_xml | – month: 11 year: 2017 text: November 2017 |
PublicationDecade | 2010 |
PublicationPlace | Elmsford |
PublicationPlace_xml | – name: Elmsford |
PublicationTitle | Computers in human behavior |
PublicationYear | 2017 |
Publisher | Elsevier Ltd Elsevier Science Ltd |
Publisher_xml | – name: Elsevier Ltd – name: Elsevier Science Ltd |
References | Gaski, Nevin (bib27) 1985; 22 Shih, Huang (bib59) 2014; 16 Anderson, Gerbing (bib2) 1988; 103 Baron, Kenny (bib7) 1986; 51 Bilgihan, Barreda, Okumus, Nusair (bib10) 2016; 52 Ashforth, Mael (bib4) 1989; 14 Lee, Larsen (bib44) 2009; 18 Lin, Hung, Chen (bib46) 2009; 25 Lee (bib43) 2013; 29 Johnson, Li, Phan, Singer, Trinh (bib39) 2012 Rowatt, Cunningham, Druen (bib57) 1999; 16 Bhattacherjee, Sanford (bib9) 2006; 30 Bakshy, Rosenn, Marlow, Adamic (bib6) 2012 Reed, Tolman, Safyer (bib54) 2015; 50 Tamjidyamcholo, Baba, Shuib, Rohani (bib63) 2014; 43 Chang, Hsu, Lee (bib16) 2015; 32 Malhotra, Kim, Agarwal (bib49) 2004; 15 Putnam (bib53) 2001; 2 Jabee, Alam (bib38) 2016; 144 Hulland (bib36) 1999; 20 Yi, Yoon, Davis (bib68) 2013; 55 Gagné (bib26) 2009; 48 Bentler, Wu (bib8) 1993 Safa, Sookhak, Von Solms, Furnell, Ghani, Herawan (bib58) 2015; 53 Ahmed, Ragsdell, Olphert (bib1) 2014; Vol. 3 Boella, Van der Tone (bib11) 2006; 36 Smart Sights (bib60) 2016 Tamjidyamcholo, Baba, Tamjid, Gholipour (bib64) 2013; 68 Krasnova, Spiekermann, Koroleva, Hidebrand (bib42) 2010; 25 Arachchilage, Love (bib3) 2013; 29 Chai, Das, Rao (bib15) 2011; 28 McKnight, Choudhury, Kacmar (bib50) 2002; 13 Kankanhalli, Tan, Wei (bib41) 2005; 29 Ellison, Steinfield, Lampe (bib22) 2007; 12 Ma, Agarwal (bib48) 2007; 18 Chiang, Suen (bib18) 2015; 48 Bulgurcu, Cavusoglu, Benbasat (bib14) 2010; 34 Coles-Kemp (bib19) 2009; 14 Williams (bib66) 2006; 11 Chen, Lin, Yen (bib17) 2014; 51 Henseler, Ringle, Sarstedt (bib35) 2015; 43 Hwang (bib37) 2008; 19 Jöreskog, Sörbom (bib40) 1993 Ellison, Heino, Gibbs (bib21) 2006; 11 Ellison, Vitak, Gray, Lampe (bib23) 2014; 19 Rocha Flores, Antonsen, Ekstedt (bib55) 2014; 43 Ollier-Malaterre, Rothbard, Berg (bib52) 2013; 38 Voorhees, Brady, Ramirez (bib65) 2016; 44 Fox, Osborn, Warber (bib25) 2014; 35 Giffin (bib29) 1967; 68 Liao, Liu, Chen (bib45) 2011; 10 Bagozzi, Yi (bib5) 1988; 23 Hair, Black, Babin, Anderson (bib31) 2010 Gordon, Loeb (bib30) 2006; 49 Wu, Lee (bib67) 2016; 45 Brown (bib12) 1996 Bryce, Fraser (bib13) 2014; 30 Fornell, Larcker (bib24) 1981; 18 Nunnally (bib51) 1978 Sobel (bib61) 1982 Rogers (bib56) 1975; 91 Hendriks (bib34) 1999; 6 Han, Hovav (bib32) 2016; 56 Statista (bib62) 2017 Gibbs, Ellison, Heino (bib28) 2006; 33 Efron, Tibshirani (bib20) 1993 Hanifan (bib33) 1916; 67 Lwin, Li, Ang (bib47) 2012; 35 Fornell (10.1016/j.chb.2017.07.031_bib24) 1981; 18 Hair (10.1016/j.chb.2017.07.031_bib31) 2010 Chen (10.1016/j.chb.2017.07.031_bib17) 2014; 51 Giffin (10.1016/j.chb.2017.07.031_bib29) 1967; 68 Bilgihan (10.1016/j.chb.2017.07.031_bib10) 2016; 52 Yi (10.1016/j.chb.2017.07.031_bib68) 2013; 55 Wu (10.1016/j.chb.2017.07.031_bib67) 2016; 45 Ashforth (10.1016/j.chb.2017.07.031_bib4) 1989; 14 Boella (10.1016/j.chb.2017.07.031_bib11) 2006; 36 Sobel (10.1016/j.chb.2017.07.031_bib61) 1982 Hwang (10.1016/j.chb.2017.07.031_bib37) 2008; 19 Anderson (10.1016/j.chb.2017.07.031_bib2) 1988; 103 Ma (10.1016/j.chb.2017.07.031_bib48) 2007; 18 Lee (10.1016/j.chb.2017.07.031_bib43) 2013; 29 Safa (10.1016/j.chb.2017.07.031_bib58) 2015; 53 Bryce (10.1016/j.chb.2017.07.031_bib13) 2014; 30 Chiang (10.1016/j.chb.2017.07.031_bib18) 2015; 48 Tamjidyamcholo (10.1016/j.chb.2017.07.031_bib63) 2014; 43 Hendriks (10.1016/j.chb.2017.07.031_bib34) 1999; 6 Chang (10.1016/j.chb.2017.07.031_bib16) 2015; 32 McKnight (10.1016/j.chb.2017.07.031_bib50) 2002; 13 Gibbs (10.1016/j.chb.2017.07.031_bib28) 2006; 33 Liao (10.1016/j.chb.2017.07.031_bib45) 2011; 10 Krasnova (10.1016/j.chb.2017.07.031_bib42) 2010; 25 Lee (10.1016/j.chb.2017.07.031_bib44) 2009; 18 Statista (10.1016/j.chb.2017.07.031_bib62) Lin (10.1016/j.chb.2017.07.031_bib46) 2009; 25 Baron (10.1016/j.chb.2017.07.031_bib7) 1986; 51 Ellison (10.1016/j.chb.2017.07.031_bib21) 2006; 11 Ellison (10.1016/j.chb.2017.07.031_bib23) 2014; 19 Bagozzi (10.1016/j.chb.2017.07.031_bib5) 1988; 23 Efron (10.1016/j.chb.2017.07.031_bib20) 1993 Chai (10.1016/j.chb.2017.07.031_bib15) 2011; 28 Bakshy (10.1016/j.chb.2017.07.031_bib6) 2012 Han (10.1016/j.chb.2017.07.031_bib32) 2016; 56 Bulgurcu (10.1016/j.chb.2017.07.031_bib14) 2010; 34 Jabee (10.1016/j.chb.2017.07.031_bib38) 2016; 144 Ahmed (10.1016/j.chb.2017.07.031_bib1) 2014; Vol. 3 Malhotra (10.1016/j.chb.2017.07.031_bib49) 2004; 15 Reed (10.1016/j.chb.2017.07.031_bib54) 2015; 50 Lwin (10.1016/j.chb.2017.07.031_bib47) 2012; 35 Voorhees (10.1016/j.chb.2017.07.031_bib65) 2016; 44 Johnson (10.1016/j.chb.2017.07.031_bib39) 2012 Nunnally (10.1016/j.chb.2017.07.031_bib51) 1978 Rocha Flores (10.1016/j.chb.2017.07.031_bib55) 2014; 43 Gordon (10.1016/j.chb.2017.07.031_bib30) 2006; 49 Shih (10.1016/j.chb.2017.07.031_bib59) 2014; 16 Coles-Kemp (10.1016/j.chb.2017.07.031_bib19) 2009; 14 Gagné (10.1016/j.chb.2017.07.031_bib26) 2009; 48 Hanifan (10.1016/j.chb.2017.07.031_bib33) 1916; 67 Hulland (10.1016/j.chb.2017.07.031_bib36) 1999; 20 Fox (10.1016/j.chb.2017.07.031_bib25) 2014; 35 Bhattacherjee (10.1016/j.chb.2017.07.031_bib9) 2006; 30 Williams (10.1016/j.chb.2017.07.031_bib66) 2006; 11 Putnam (10.1016/j.chb.2017.07.031_bib53) 2001; 2 Jöreskog (10.1016/j.chb.2017.07.031_bib40) 1993 Kankanhalli (10.1016/j.chb.2017.07.031_bib41) 2005; 29 Ellison (10.1016/j.chb.2017.07.031_bib22) 2007; 12 Brown (10.1016/j.chb.2017.07.031_bib12) 1996 Henseler (10.1016/j.chb.2017.07.031_bib35) 2015; 43 Bentler (10.1016/j.chb.2017.07.031_bib8) 1993 Arachchilage (10.1016/j.chb.2017.07.031_bib3) 2013; 29 Ollier-Malaterre (10.1016/j.chb.2017.07.031_bib52) 2013; 38 Gaski (10.1016/j.chb.2017.07.031_bib27) 1985; 22 Rowatt (10.1016/j.chb.2017.07.031_bib57) 1999; 16 Rogers (10.1016/j.chb.2017.07.031_bib56) 1975; 91 Smart Sights (10.1016/j.chb.2017.07.031_bib60) Tamjidyamcholo (10.1016/j.chb.2017.07.031_bib64) 2013; 68 |
References_xml | – volume: 20 start-page: 195 year: 1999 end-page: 204 ident: bib36 article-title: Use of partial least squares in strategic management research: A review of four recent studies publication-title: Strategic Management Journal – volume: 10 start-page: 702 year: 2011 end-page: 715 ident: bib45 article-title: Examining the impact of privacy, trust and risk perceptions beyond monetary transactions: An integrated model publication-title: Electronic Commerce Research and Applications – year: 1978 ident: bib51 article-title: Psychometric theory – volume: 45 start-page: 523 year: 2016 end-page: 538 ident: bib67 article-title: How to make a knowledge-sharing group: A group social capital perspective publication-title: Personnel Review – volume: 22 start-page: 130 year: 1985 end-page: 142 ident: bib27 article-title: The differential effects of exercised and unexercised power sources in a marketing channel publication-title: Journal of Marketing Research – volume: 43 start-page: 115 year: 2015 end-page: 135 ident: bib35 article-title: A new criterion for assessing discriminant validity in variance-based structural equation modeling publication-title: Journal of the Academy Marketing Science – volume: 11 start-page: 593 year: 2006 end-page: 628 ident: bib66 article-title: On and off the 'Net: Scales for social capital in an online era publication-title: Journal of Computer-mediated Communication – volume: 15 start-page: 336 year: 2004 end-page: 355 ident: bib49 article-title: Internet users' information privacy concerns (IUIPC): The construct, the scale, and a causal model publication-title: Information Systems Research – volume: 11 start-page: 415 year: 2006 end-page: 441 ident: bib21 article-title: Managing impressions online: Self-presentation processes in the online dating environment publication-title: Journal of Computer-mediated Communication – volume: 68 start-page: 104 year: 1967 end-page: 120 ident: bib29 article-title: The contribution of studies of source credibility to a theory of interpersonal trust in the communication process publication-title: Psychological Bulletin – volume: 68 start-page: 223 year: 2013 end-page: 232 ident: bib64 article-title: Information security—professional perceptions of knowledge-sharing intention under self-efficacy, trust, reciprocity, and shared-language publication-title: Computers & Education – volume: 25 start-page: 929 year: 2009 end-page: 939 ident: bib46 article-title: Fostering the determinants of knowledge sharing in professional virtual communities publication-title: Computers in Human Behavior – volume: 53 start-page: 65 year: 2015 end-page: 78 ident: bib58 article-title: Information security conscious care behaviour formation in organizations publication-title: Computers & Security – volume: 56 start-page: 218 year: 2016 end-page: 227 ident: bib32 article-title: Dimensionality of social capital and organizational citizenship behavior in information systems project teams publication-title: Journal of Computer Information Systems – start-page: 169 year: 1996 end-page: 189 ident: bib12 article-title: Tajfel's contribution to the reduction of intergroup conflicts publication-title: Social groups and identities: Developing the legacy of henri tajfel – volume: 38 start-page: 645 year: 2013 end-page: 669 ident: bib52 article-title: When worlds collide in cyberspace: How boundary work in online social networks impacts professional relationships publication-title: Academy of Management Review – volume: 35 start-page: 31 year: 2012 end-page: 41 ident: bib47 article-title: Stop bugging me: An examination of adolescents' protection behavior against online harassment publication-title: Journal of Adolescence – volume: 36 start-page: 439 year: 2006 end-page: 450 ident: bib11 article-title: Security policies for sharing knowledge in virtual communities publication-title: IEEE Transactions on Systems, Man & Cybernetics: A – volume: 19 start-page: 419 year: 2008 end-page: 429 ident: bib37 article-title: A preliminary examination of the factors for knowledge sharing in technology mediated learning publication-title: Journal of Information Systems Education – volume: 29 start-page: 113 year: 2005 end-page: 143 ident: bib41 article-title: Contributing knowledge to electronic knowledge repositories: An empirical investigation publication-title: MIS Quarterly – volume: 29 start-page: 706 year: 2013 end-page: 714 ident: bib3 article-title: A game design framework for avoiding phishing attacks publication-title: Computers in Human Behavior – year: 1993 ident: bib20 article-title: An introduction to the bootstrap – volume: Vol. 3 start-page: 1083 year: 2014 end-page: 1090 ident: bib1 article-title: Knowledge sharing and information security: A paradox? publication-title: Proceedings of the European conference on knowledge management – volume: 43 start-page: 19 year: 2014 end-page: 34 ident: bib63 article-title: Evaluation model for knowledge sharing in information security professional virtual community publication-title: Computers & Security – volume: 103 start-page: 411 year: 1988 end-page: 423 ident: bib2 article-title: Structural equation modeling in practice: A review and recommended two-step approach publication-title: Psychological Bulletin – volume: 13 start-page: 334 year: 2002 end-page: 359 ident: bib50 article-title: Developing and validating trust measures for e-commerce: An integrative typology publication-title: Information Systems Research – volume: 23 start-page: 272 year: 1988 end-page: 277 ident: bib5 article-title: On the evaluation of structural equation models publication-title: Academy of Marketing Science – volume: 12 start-page: 1143 year: 2007 end-page: 1168 ident: bib22 article-title: The benefits of Facebook “friends”: Social capital and college students' use of online social network sites publication-title: Journal of Computer-mediated Communication – volume: 16 start-page: 209 year: 1999 end-page: 223 ident: bib57 article-title: Lying to get a date: The effect of facial physical attractiveness on the willingness to deceive prospective dating partners publication-title: Journal of Social and Personal Relationships – year: 2016 ident: bib60 article-title: Global social media research summary, 2016 – volume: 44 start-page: 119 year: 2016 end-page: 134 ident: bib65 article-title: Discriminant validity testing in marketing: An analysis, causes for concern, and proposed remedies publication-title: Journal of the Academy of Marketing Science – volume: 14 start-page: 20 year: 1989 end-page: 39 ident: bib4 article-title: Social identity theory and the organization publication-title: Academy of Management Review – volume: 67 start-page: 130 year: 1916 end-page: 138 ident: bib33 article-title: The rural school community center publication-title: Annals of the American Academy of Political and Social Science – volume: 43 start-page: 90 year: 2014 end-page: 110 ident: bib55 article-title: Information security knowledge sharing in organizations: Investigating the effect of behavioral information security governance and national culture publication-title: Computers & Security – year: 2010 ident: bib31 article-title: Multivariate data analysis – volume: 51 start-page: 568 year: 2014 end-page: 578 ident: bib17 article-title: How to facilitate inter-organizational knowledge sharing: The impact of trust publication-title: Information & Management – volume: 2 start-page: 41 year: 2001 end-page: 51 ident: bib53 article-title: Social capital: Measurement and consequences publication-title: Canadian Journal of Policy Research – volume: 144 start-page: 36 year: 2016 end-page: 40 ident: bib38 article-title: Issues and challenges of cyber security for SNSs (Facebook) publication-title: International Journal of Computer Applications – volume: 91 start-page: 93 year: 1975 end-page: 114 ident: bib56 article-title: A protection motivation theory of fear appeals and attitude change publication-title: Journal of Psychology – volume: 32 start-page: 331 year: 2015 end-page: 340 ident: bib16 article-title: Factors influencing knowledge-sharing behavior in virtual communities: A longitudinal investigation publication-title: Information Systems Management – volume: 51 start-page: 1173 year: 1986 end-page: 1182 ident: bib7 article-title: The moderator-mediator variable distinction in social psychological research: Conceptual, strategic, and statistical considerations publication-title: Journal of Personality and Social Psychology – year: 2012 ident: bib39 article-title: The innovative success that is Apple, Inc – volume: 18 start-page: 42 year: 2007 end-page: 67 ident: bib48 article-title: Through a glass darkly: Information technology design, identity verification, and knowledge contribution in online communities publication-title: Information Systems Research – volume: 6 start-page: 91 year: 1999 end-page: 100 ident: bib34 article-title: Why share knowledge? The influence of ICT on the motivation for knowledge sharing publication-title: Knowledge and Process Management – year: 1993 ident: bib40 article-title: LISREL 8, a guide to the program and application – volume: 49 start-page: 121 year: 2006 end-page: 125 ident: bib30 article-title: Budgeting process for information security expenditures publication-title: Communications of the ACM – volume: 48 start-page: 571 year: 2009 end-page: 589 ident: bib26 article-title: A model of knowledge-sharing motivation publication-title: Human Resource Management – start-page: 519 year: 2012 end-page: 528 ident: bib6 article-title: The role of social networks in information diffusion publication-title: Proceeding of the 21st international conference on world wide web – volume: 16 start-page: 627 year: 2014 end-page: 641 ident: bib59 article-title: Influences of Web interactivity and social identity and bonds on the quality of online discussion in a virtual community publication-title: Information Systems Frontiers – volume: 33 start-page: 152 year: 2006 end-page: 177 ident: bib28 article-title: Self-presentation in online personals- the role of anticipated future interaction, self-disclosure, and perceived success in Internet dating publication-title: Communication Research – volume: 52 start-page: 287 year: 2016 end-page: 296 ident: bib10 article-title: Consumer perception of knowledge-sharing in travel-related online social networks publication-title: Tourism Management – volume: 14 start-page: 181 year: 2009 end-page: 185 ident: bib19 article-title: Information security management: An entangled research challenge publication-title: Information Security Technical Report – year: 2017 ident: bib62 article-title: Facts and statistics on Apple – volume: 25 start-page: 109 year: 2010 end-page: 125 ident: bib42 article-title: Online social networks: Why we disclose publication-title: Journal of Information Technology – volume: 48 start-page: 516 year: 2015 end-page: 524 ident: bib18 article-title: Self-presentation and hiring recommendations in online communities: lessons from linkedIn publication-title: Computers in Human Behavior – year: 1993 ident: bib8 article-title: EQS/Windows user's guide – volume: 18 start-page: 177 year: 2009 end-page: 187 ident: bib44 article-title: Threat or coping appraisal: Determinants of SMB executives' decision to adopt anti-malware software publication-title: European Journal of Information Systems – volume: 30 start-page: 805 year: 2006 end-page: 825 ident: bib9 article-title: Influence processes for information technology acceptance: An elaboration likelihood model publication-title: MIS Quarterly – volume: 29 start-page: 1499 year: 2013 end-page: 1509 ident: bib43 article-title: The role of attachment style in building social capital from SNSs: The interplay of anxiety and avoidance publication-title: Computers in Human Behavior – volume: 30 start-page: 299 year: 2014 end-page: 306 ident: bib13 article-title: The role of disclosure of personal information in the evaluation of risk and trust in young people's online interactions publication-title: Computers in Human Behavior – volume: 35 start-page: 527 year: 2014 end-page: 534 ident: bib25 article-title: Relational dialectics and SNSs: The role of Facebook in romantic relationship escalation, maintenance, conflict, and dissolution publication-title: Computers in Human Behavior – volume: 28 start-page: 309 year: 2011 end-page: 342 ident: bib15 article-title: Factors affecting bloggers' knowledge sharing: An investigation across gender publication-title: Journal of Management Information Systems – volume: 55 start-page: 284 year: 2013 end-page: 295 ident: bib68 article-title: Untangling the antecedents of initial trust in web-based health information: The roles of argument quality, source expertise, and user perceptions of information quality and risk publication-title: Decision Support Systems – volume: 19 start-page: 855 year: 2014 end-page: 870 ident: bib23 article-title: Cultivating social resources on social network sites: Facebook relationship maintenance behaviors and their role in social capital processes publication-title: Journal of Computer-mediated Communication – volume: 18 start-page: 39 year: 1981 end-page: 50 ident: bib24 article-title: Evaluating structural equation models with unobservable variables and measurement error publication-title: Journal of Marketing Research – year: 1982 ident: bib61 article-title: Asymptotic confidence intervals for indirect effects in structural equation models publication-title: Sociological methodology – volume: 50 start-page: 431 year: 2015 end-page: 438 ident: bib54 article-title: Too close for comfort: Attachment insecurity and electronic intrusion in college students' dating relationships publication-title: Computers in Human Behavior – volume: 34 start-page: 523 year: 2010 end-page: 548 ident: bib14 article-title: Information security policy compliance: An empirical study of rationality-based beliefs and information security awareness publication-title: MIS Quarterly – volume: 11 start-page: 593 year: 2006 ident: 10.1016/j.chb.2017.07.031_bib66 article-title: On and off the 'Net: Scales for social capital in an online era publication-title: Journal of Computer-mediated Communication doi: 10.1111/j.1083-6101.2006.00029.x – volume: Vol. 3 start-page: 1083 year: 2014 ident: 10.1016/j.chb.2017.07.031_bib1 article-title: Knowledge sharing and information security: A paradox? – volume: 10 start-page: 702 year: 2011 ident: 10.1016/j.chb.2017.07.031_bib45 article-title: Examining the impact of privacy, trust and risk perceptions beyond monetary transactions: An integrated model publication-title: Electronic Commerce Research and Applications doi: 10.1016/j.elerap.2011.07.003 – volume: 53 start-page: 65 year: 2015 ident: 10.1016/j.chb.2017.07.031_bib58 article-title: Information security conscious care behaviour formation in organizations publication-title: Computers & Security doi: 10.1016/j.cose.2015.05.012 – volume: 49 start-page: 121 issue: 1 year: 2006 ident: 10.1016/j.chb.2017.07.031_bib30 article-title: Budgeting process for information security expenditures publication-title: Communications of the ACM doi: 10.1145/1107458.1107465 – volume: 18 start-page: 177 year: 2009 ident: 10.1016/j.chb.2017.07.031_bib44 article-title: Threat or coping appraisal: Determinants of SMB executives' decision to adopt anti-malware software publication-title: European Journal of Information Systems doi: 10.1057/ejis.2009.11 – volume: 30 start-page: 805 year: 2006 ident: 10.1016/j.chb.2017.07.031_bib9 article-title: Influence processes for information technology acceptance: An elaboration likelihood model publication-title: MIS Quarterly doi: 10.2307/25148755 – volume: 11 start-page: 415 year: 2006 ident: 10.1016/j.chb.2017.07.031_bib21 article-title: Managing impressions online: Self-presentation processes in the online dating environment publication-title: Journal of Computer-mediated Communication doi: 10.1111/j.1083-6101.2006.00020.x – volume: 25 start-page: 929 year: 2009 ident: 10.1016/j.chb.2017.07.031_bib46 article-title: Fostering the determinants of knowledge sharing in professional virtual communities publication-title: Computers in Human Behavior doi: 10.1016/j.chb.2009.03.008 – volume: 32 start-page: 331 year: 2015 ident: 10.1016/j.chb.2017.07.031_bib16 article-title: Factors influencing knowledge-sharing behavior in virtual communities: A longitudinal investigation publication-title: Information Systems Management doi: 10.1080/10580530.2015.1080002 – volume: 43 start-page: 115 year: 2015 ident: 10.1016/j.chb.2017.07.031_bib35 article-title: A new criterion for assessing discriminant validity in variance-based structural equation modeling publication-title: Journal of the Academy Marketing Science doi: 10.1007/s11747-014-0403-8 – volume: 2 start-page: 41 year: 2001 ident: 10.1016/j.chb.2017.07.031_bib53 article-title: Social capital: Measurement and consequences publication-title: Canadian Journal of Policy Research – volume: 20 start-page: 195 year: 1999 ident: 10.1016/j.chb.2017.07.031_bib36 article-title: Use of partial least squares in strategic management research: A review of four recent studies publication-title: Strategic Management Journal doi: 10.1002/(SICI)1097-0266(199902)20:2<195::AID-SMJ13>3.0.CO;2-7 – year: 2012 ident: 10.1016/j.chb.2017.07.031_bib39 – volume: 30 start-page: 299 year: 2014 ident: 10.1016/j.chb.2017.07.031_bib13 article-title: The role of disclosure of personal information in the evaluation of risk and trust in young people's online interactions publication-title: Computers in Human Behavior doi: 10.1016/j.chb.2013.09.012 – volume: 68 start-page: 223 year: 2013 ident: 10.1016/j.chb.2017.07.031_bib64 article-title: Information security—professional perceptions of knowledge-sharing intention under self-efficacy, trust, reciprocity, and shared-language publication-title: Computers & Education doi: 10.1016/j.compedu.2013.05.010 – volume: 19 start-page: 419 year: 2008 ident: 10.1016/j.chb.2017.07.031_bib37 article-title: A preliminary examination of the factors for knowledge sharing in technology mediated learning publication-title: Journal of Information Systems Education – volume: 16 start-page: 627 year: 2014 ident: 10.1016/j.chb.2017.07.031_bib59 article-title: Influences of Web interactivity and social identity and bonds on the quality of online discussion in a virtual community publication-title: Information Systems Frontiers doi: 10.1007/s10796-012-9376-7 – volume: 14 start-page: 20 year: 1989 ident: 10.1016/j.chb.2017.07.031_bib4 article-title: Social identity theory and the organization publication-title: Academy of Management Review doi: 10.5465/amr.1989.4278999 – volume: 12 start-page: 1143 year: 2007 ident: 10.1016/j.chb.2017.07.031_bib22 article-title: The benefits of Facebook “friends”: Social capital and college students' use of online social network sites publication-title: Journal of Computer-mediated Communication doi: 10.1111/j.1083-6101.2007.00367.x – volume: 48 start-page: 571 year: 2009 ident: 10.1016/j.chb.2017.07.031_bib26 article-title: A model of knowledge-sharing motivation publication-title: Human Resource Management doi: 10.1002/hrm.20298 – volume: 50 start-page: 431 year: 2015 ident: 10.1016/j.chb.2017.07.031_bib54 article-title: Too close for comfort: Attachment insecurity and electronic intrusion in college students' dating relationships publication-title: Computers in Human Behavior doi: 10.1016/j.chb.2015.03.050 – year: 1978 ident: 10.1016/j.chb.2017.07.031_bib51 – volume: 91 start-page: 93 year: 1975 ident: 10.1016/j.chb.2017.07.031_bib56 article-title: A protection motivation theory of fear appeals and attitude change publication-title: Journal of Psychology doi: 10.1080/00223980.1975.9915803 – volume: 51 start-page: 568 year: 2014 ident: 10.1016/j.chb.2017.07.031_bib17 article-title: How to facilitate inter-organizational knowledge sharing: The impact of trust publication-title: Information & Management doi: 10.1016/j.im.2014.03.007 – volume: 29 start-page: 113 year: 2005 ident: 10.1016/j.chb.2017.07.031_bib41 article-title: Contributing knowledge to electronic knowledge repositories: An empirical investigation publication-title: MIS Quarterly doi: 10.2307/25148670 – volume: 25 start-page: 109 year: 2010 ident: 10.1016/j.chb.2017.07.031_bib42 article-title: Online social networks: Why we disclose publication-title: Journal of Information Technology doi: 10.1057/jit.2010.6 – volume: 51 start-page: 1173 year: 1986 ident: 10.1016/j.chb.2017.07.031_bib7 article-title: The moderator-mediator variable distinction in social psychological research: Conceptual, strategic, and statistical considerations publication-title: Journal of Personality and Social Psychology doi: 10.1037/0022-3514.51.6.1173 – volume: 144 start-page: 36 year: 2016 ident: 10.1016/j.chb.2017.07.031_bib38 article-title: Issues and challenges of cyber security for SNSs (Facebook) publication-title: International Journal of Computer Applications doi: 10.5120/ijca2016910174 – volume: 33 start-page: 152 year: 2006 ident: 10.1016/j.chb.2017.07.031_bib28 article-title: Self-presentation in online personals- the role of anticipated future interaction, self-disclosure, and perceived success in Internet dating publication-title: Communication Research doi: 10.1177/0093650205285368 – volume: 14 start-page: 181 year: 2009 ident: 10.1016/j.chb.2017.07.031_bib19 article-title: Information security management: An entangled research challenge publication-title: Information Security Technical Report doi: 10.1016/j.istr.2010.04.005 – volume: 23 start-page: 272 year: 1988 ident: 10.1016/j.chb.2017.07.031_bib5 article-title: On the evaluation of structural equation models publication-title: Academy of Marketing Science doi: 10.1177/009207039502300406 – volume: 56 start-page: 218 year: 2016 ident: 10.1016/j.chb.2017.07.031_bib32 article-title: Dimensionality of social capital and organizational citizenship behavior in information systems project teams publication-title: Journal of Computer Information Systems doi: 10.1080/08874417.2016.1153910 – volume: 35 start-page: 31 year: 2012 ident: 10.1016/j.chb.2017.07.031_bib47 article-title: Stop bugging me: An examination of adolescents' protection behavior against online harassment publication-title: Journal of Adolescence doi: 10.1016/j.adolescence.2011.06.007 – volume: 16 start-page: 209 year: 1999 ident: 10.1016/j.chb.2017.07.031_bib57 article-title: Lying to get a date: The effect of facial physical attractiveness on the willingness to deceive prospective dating partners publication-title: Journal of Social and Personal Relationships doi: 10.1177/0265407599162005 – volume: 13 start-page: 334 year: 2002 ident: 10.1016/j.chb.2017.07.031_bib50 article-title: Developing and validating trust measures for e-commerce: An integrative typology publication-title: Information Systems Research doi: 10.1287/isre.13.3.334.81 – volume: 18 start-page: 39 issue: 3 year: 1981 ident: 10.1016/j.chb.2017.07.031_bib24 article-title: Evaluating structural equation models with unobservable variables and measurement error publication-title: Journal of Marketing Research doi: 10.2307/3151312 – volume: 68 start-page: 104 year: 1967 ident: 10.1016/j.chb.2017.07.031_bib29 article-title: The contribution of studies of source credibility to a theory of interpersonal trust in the communication process publication-title: Psychological Bulletin doi: 10.1037/h0024833 – volume: 28 start-page: 309 year: 2011 ident: 10.1016/j.chb.2017.07.031_bib15 article-title: Factors affecting bloggers' knowledge sharing: An investigation across gender publication-title: Journal of Management Information Systems doi: 10.2753/MIS0742-1222280309 – volume: 67 start-page: 130 year: 1916 ident: 10.1016/j.chb.2017.07.031_bib33 article-title: The rural school community center publication-title: Annals of the American Academy of Political and Social Science doi: 10.1177/000271621606700118 – volume: 22 start-page: 130 issue: 2 year: 1985 ident: 10.1016/j.chb.2017.07.031_bib27 article-title: The differential effects of exercised and unexercised power sources in a marketing channel publication-title: Journal of Marketing Research doi: 10.2307/3151359 – start-page: 169 year: 1996 ident: 10.1016/j.chb.2017.07.031_bib12 article-title: Tajfel's contribution to the reduction of intergroup conflicts – volume: 34 start-page: 523 year: 2010 ident: 10.1016/j.chb.2017.07.031_bib14 article-title: Information security policy compliance: An empirical study of rationality-based beliefs and information security awareness publication-title: MIS Quarterly doi: 10.2307/25750690 – year: 2010 ident: 10.1016/j.chb.2017.07.031_bib31 – volume: 38 start-page: 645 year: 2013 ident: 10.1016/j.chb.2017.07.031_bib52 article-title: When worlds collide in cyberspace: How boundary work in online social networks impacts professional relationships publication-title: Academy of Management Review doi: 10.5465/amr.2011.0235 – volume: 15 start-page: 336 year: 2004 ident: 10.1016/j.chb.2017.07.031_bib49 article-title: Internet users' information privacy concerns (IUIPC): The construct, the scale, and a causal model publication-title: Information Systems Research doi: 10.1287/isre.1040.0032 – volume: 6 start-page: 91 year: 1999 ident: 10.1016/j.chb.2017.07.031_bib34 article-title: Why share knowledge? The influence of ICT on the motivation for knowledge sharing publication-title: Knowledge and Process Management doi: 10.1002/(SICI)1099-1441(199906)6:2<91::AID-KPM54>3.0.CO;2-M – volume: 19 start-page: 855 year: 2014 ident: 10.1016/j.chb.2017.07.031_bib23 article-title: Cultivating social resources on social network sites: Facebook relationship maintenance behaviors and their role in social capital processes publication-title: Journal of Computer-mediated Communication doi: 10.1111/jcc4.12078 – volume: 44 start-page: 119 year: 2016 ident: 10.1016/j.chb.2017.07.031_bib65 article-title: Discriminant validity testing in marketing: An analysis, causes for concern, and proposed remedies publication-title: Journal of the Academy of Marketing Science doi: 10.1007/s11747-015-0455-4 – start-page: 519 year: 2012 ident: 10.1016/j.chb.2017.07.031_bib6 article-title: The role of social networks in information diffusion – year: 1993 ident: 10.1016/j.chb.2017.07.031_bib20 – volume: 35 start-page: 527 year: 2014 ident: 10.1016/j.chb.2017.07.031_bib25 article-title: Relational dialectics and SNSs: The role of Facebook in romantic relationship escalation, maintenance, conflict, and dissolution publication-title: Computers in Human Behavior doi: 10.1016/j.chb.2014.02.031 – volume: 43 start-page: 19 year: 2014 ident: 10.1016/j.chb.2017.07.031_bib63 article-title: Evaluation model for knowledge sharing in information security professional virtual community publication-title: Computers & Security doi: 10.1016/j.cose.2014.02.010 – volume: 52 start-page: 287 year: 2016 ident: 10.1016/j.chb.2017.07.031_bib10 article-title: Consumer perception of knowledge-sharing in travel-related online social networks publication-title: Tourism Management doi: 10.1016/j.tourman.2015.07.002 – year: 1982 ident: 10.1016/j.chb.2017.07.031_bib61 article-title: Asymptotic confidence intervals for indirect effects in structural equation models – year: 1993 ident: 10.1016/j.chb.2017.07.031_bib8 – volume: 36 start-page: 439 year: 2006 ident: 10.1016/j.chb.2017.07.031_bib11 article-title: Security policies for sharing knowledge in virtual communities publication-title: IEEE Transactions on Systems, Man & Cybernetics: A doi: 10.1109/TSMCA.2006.871793 – volume: 29 start-page: 706 year: 2013 ident: 10.1016/j.chb.2017.07.031_bib3 article-title: A game design framework for avoiding phishing attacks publication-title: Computers in Human Behavior doi: 10.1016/j.chb.2012.12.018 – volume: 18 start-page: 42 year: 2007 ident: 10.1016/j.chb.2017.07.031_bib48 article-title: Through a glass darkly: Information technology design, identity verification, and knowledge contribution in online communities publication-title: Information Systems Research doi: 10.1287/isre.1070.0113 – ident: 10.1016/j.chb.2017.07.031_bib62 – volume: 103 start-page: 411 year: 1988 ident: 10.1016/j.chb.2017.07.031_bib2 article-title: Structural equation modeling in practice: A review and recommended two-step approach publication-title: Psychological Bulletin doi: 10.1037/0033-2909.103.3.411 – volume: 48 start-page: 516 year: 2015 ident: 10.1016/j.chb.2017.07.031_bib18 article-title: Self-presentation and hiring recommendations in online communities: lessons from linkedIn publication-title: Computers in Human Behavior doi: 10.1016/j.chb.2015.02.017 – ident: 10.1016/j.chb.2017.07.031_bib60 – volume: 45 start-page: 523 year: 2016 ident: 10.1016/j.chb.2017.07.031_bib67 article-title: How to make a knowledge-sharing group: A group social capital perspective publication-title: Personnel Review doi: 10.1108/PR-12-2013-0227 – year: 1993 ident: 10.1016/j.chb.2017.07.031_bib40 – volume: 55 start-page: 284 year: 2013 ident: 10.1016/j.chb.2017.07.031_bib68 article-title: Untangling the antecedents of initial trust in web-based health information: The roles of argument quality, source expertise, and user perceptions of information quality and risk publication-title: Decision Support Systems doi: 10.1016/j.dss.2013.01.029 – volume: 29 start-page: 1499 year: 2013 ident: 10.1016/j.chb.2017.07.031_bib43 article-title: The role of attachment style in building social capital from SNSs: The interplay of anxiety and avoidance publication-title: Computers in Human Behavior doi: 10.1016/j.chb.2013.01.012 – volume: 43 start-page: 90 year: 2014 ident: 10.1016/j.chb.2017.07.031_bib55 article-title: Information security knowledge sharing in organizations: Investigating the effect of behavioral information security governance and national culture publication-title: Computers & Security doi: 10.1016/j.cose.2014.03.004 |
SSID | ssj0005506 |
Score | 2.325518 |
Snippet | This study decomposes information security awareness (ISA) into general information security awareness (GISA) and information security policy awareness (ISPA),... |
SourceID | proquest crossref elsevier |
SourceType | Aggregation Database Enrichment Source Index Database Publisher |
StartPage | 406 |
SubjectTerms | Bonding Bridging Credibility Cybersecurity Data collection Effects Information security awareness Knowledge sharing Knowledge-sharing behavior Self-presentation perspective Self-protection perspective Social capital |
Title | The contradiction between self-protection and self-presentation on knowledge sharing behavior |
URI | https://dx.doi.org/10.1016/j.chb.2017.07.031 https://www.proquest.com/docview/1963430122 |
Volume | 76 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LSwMxEA5SL158i_VRcvAkrO1uJrvuUYqlWvSgFnuRkNfSSlnF1oMXf7uZ3aSoYA9CYNmQLMtkMjPJfDNDyInikmXWHUssy9MIMkgjxQsZnRsmk0LHRW7xvuPmNu0P4XrERyukG2JhEFbpZX8t0ytp7Xvanprt18mkfY-p33nKnE2N3j6GGT8BMuTys89vMA9e1dfEwRGODp7NCuOlxwrRXVmVv5PFf-mmX1K6Uj29TbLubUZ6Uf_WFlmx5TbZCPUYqN-e22RtIc0-dsiTYwBaAdGlmVTBC9RjsujMTovIJ2jAflma0LeIRSqpa4sLNzobS7wApCGqf5cMe5cP3X7kaylEmiV8HhXSpDJ3espZGJYpC7GFNDZGqYIDSJ5LZ0comWuTGgu5hiwxkGgwNsksFIztkUb5Utp9QvHIgyFCRWw0oNeQoZGl-TlLlTSZbJJOoKLQPtE41ruYioAoexaO8AIJLzqusbhJThdTXussG8sGQ1ga8YNVhNMCy6YdhWUUfp_OBMofYOhePPjfVw_JGr7V0YlHpDF_e7fHzkyZq1bFhy2yenE16N_ic3D3OPgCG8XpoA |
linkProvider | Elsevier |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV05T8MwFH5CMNCFG1FOD7AghZLYTpqBAXGoXF0AiQUZX1GLqoBoEWLhT_EH8UvtCpBgQELy5NiJ9ex87_mdAJuKS5pZdy2xNE8jlrE0UryQUdNQmRQ6LnKL-o6Ldtq6Zqc3_GYM3kMsDLpVeuwfYnqF1r6n4anZeOx2G5eY-p2n1MnUaO2joYL1mX19cfe2_t7JodvkrSQ5Pro6aEW-tECkacIHUSFNKnMH247hWqosiy1LY2OUKjhjkufSsVUlc21SY1muWZYYlmhmbJJZVqAW1OH-hPtsE8sm7Lx98ivhVUFPXF2Eywum1MqpTHcUupNlVcJQGv_EDL-xhYrXHc_AlBdSyf6QDrMwZss5mA4FIIjHgzmojeDzdR5u3Ykjlee7NN0qWoJ4JzDSt70i8hkhsF-WJvSNgp9K4tpIw0f6HYkaRxLSCCzA9b9QeBHGy4fSLgHBOxbGJBWx0QzNlBSlOs2bNFXSZLIOu4GKQvvM5lhgoyeCC9u9cIQXSHix6xqN67A9mvI4TOvx22AWtkZ8OZvCsZ3fpq2GbRQeGPoCAY9RtGcu_-2tGzDZuro4F-cn7bMVqOGTYWjkKowPnp7tmpORBmq9OpME7v77J_gAx_sk6g |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=The+contradiction+between+self-protection+and+self-presentation+on+knowledge+sharing+behavior&rft.jtitle=Computers+in+human+behavior&rft.au=Ortiz%2C+Jaime&rft.au=Chang%2C+Shu-Hao&rft.au=Chih%2C+Wen-Hai&rft.au=Wang%2C+Chia-Hao&rft.date=2017-11-01&rft.pub=Elsevier+Ltd&rft.issn=0747-5632&rft.eissn=1873-7692&rft.volume=76&rft.spage=406&rft.epage=416&rft_id=info:doi/10.1016%2Fj.chb.2017.07.031&rft.externalDocID=S0747563217304533 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0747-5632&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0747-5632&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0747-5632&client=summon |