The contradiction between self-protection and self-presentation on knowledge sharing behavior

This study decomposes information security awareness (ISA) into general information security awareness (GISA) and information security policy awareness (ISPA), to explore how these factors affect knowledge-sharing behavior. It also investigates the effects of threat appraisal and source credibility...

Full description

Saved in:
Bibliographic Details
Published inComputers in human behavior Vol. 76; pp. 406 - 416
Main Authors Ortiz, Jaime, Chang, Shu-Hao, Chih, Wen-Hai, Wang, Chia-Hao
Format Journal Article
LanguageEnglish
Published Elmsford Elsevier Ltd 01.11.2017
Elsevier Science Ltd
Subjects
Online AccessGet full text

Cover

Loading…
Abstract This study decomposes information security awareness (ISA) into general information security awareness (GISA) and information security policy awareness (ISPA), to explore how these factors affect knowledge-sharing behavior. It also investigates the effects of threat appraisal and source credibility on knowledge-sharing behavior from self-protection and self-presentation perspectives. This study adopted an online questionnaire through mySurvey for data collection. This research collected and analyzed 598 valid responses by using a structural equation modeling to validate the research hypotheses. The results indicate that GISA and ISPA have significant positive effects on threat appraisal. Whereas ISPA has a significant positive effect on knowledge-sharing behavior, GISA does not. With regard to social ties, bonding social capital and bridging social capital have significant positive effects on both source credibility and knowledge-sharing behavior. Threat appraisal has a significant negative effect, and source credibility has a significant positive effect, on knowledge-sharing behavior. In addition, threat appraisal and source credibility exert partial mediation effects on ISPA, bonding social capital, bridging social capital, and knowledge-sharing behavior. •GISA and ISPA have significant effects on threat appraisal.•Bonding/bridging social capital have significant effects on source credibility.•ISPA has a significant effect on knowledge-sharing behavior.•Threat appraisal and source credibility have significant effects on knowledge-sharing behavior.•Bonding/bridging social capital have significant effects on knowledge-sharing behavior.
AbstractList This study decomposes information security awareness (ISA) into general information security awareness (GISA) and information security policy awareness (ISPA), to explore how these factors affect knowledge-sharing behavior. It also investigates the effects of threat appraisal and source credibility on knowledge-sharing behavior from self-protection and self-presentation perspectives. This study adopted an online questionnaire through mySurvey for data collection. This research collected and analyzed 598 valid responses by using a structural equation modeling to validate the research hypotheses. The results indicate that GISA and ISPA have significant positive effects on threat appraisal. Whereas ISPA has a significant positive effect on knowledge-sharing behavior, GISA does not. With regard to social ties, bonding social capital and bridging social capital have significant positive effects on both source credibility and knowledge-sharing behavior. Threat appraisal has a significant negative effect, and source credibility has a significant positive effect, on knowledge-sharing behavior. In addition, threat appraisal and source credibility exert partial mediation effects on ISPA, bonding social capital, bridging social capital, and knowledge-sharing behavior. •GISA and ISPA have significant effects on threat appraisal.•Bonding/bridging social capital have significant effects on source credibility.•ISPA has a significant effect on knowledge-sharing behavior.•Threat appraisal and source credibility have significant effects on knowledge-sharing behavior.•Bonding/bridging social capital have significant effects on knowledge-sharing behavior.
This study decomposes information security awareness (ISA) into general information security awareness (GISA) and information security policy awareness (ISPA), to explore how these factors affect knowledge-sharing behavior. It also investigates the effects of threat appraisal and source credibility on knowledge-sharing behavior from self-protection and self-presentation perspectives. This study adopted an online questionnaire through mySurvey for data collection. This research collected and analyzed 598 valid responses by using a structural equation modeling to validate the research hypotheses. The results indicate that GISA and ISPA have significant positive effects on threat appraisal. Whereas ISPA has a significant positive effect on knowledge-sharing behavior, GISA does not. With regard to social ties, bonding social capital and bridging social capital have significant positive effects on both source credibility and knowledge-sharing behavior. Threat appraisal has a significant negative effect, and source credibility has a significant positive effect, on knowledge-sharing behavior. In addition, threat appraisal and source credibility exert partial mediation effects on ISPA, bonding social capital, bridging social capital, and knowledge-sharing behavior.
Author Chang, Shu-Hao
Ortiz, Jaime
Chih, Wen-Hai
Wang, Chia-Hao
Author_xml – sequence: 1
  givenname: Jaime
  surname: Ortiz
  fullname: Ortiz, Jaime
  email: jortiz22@uh.edu
  organization: Global Strategies and Studies, University of Houston, E.W. Cullen Bldg. Suite 101, 4302 University Dr. Houston, TX, 77204-2039, United States
– sequence: 2
  givenname: Shu-Hao
  surname: Chang
  fullname: Chang, Shu-Hao
  email: shu-hao@hotmail.com
  organization: Science and Technology Policy Research and Information Centre of National Applied Research Laboratories, 3F., No. 106, Sec. 2, Heping E. Rd., Taipei, 10622, Taiwan, ROC
– sequence: 3
  givenname: Wen-Hai
  surname: Chih
  fullname: Chih, Wen-Hai
  email: whchih@mail.ndhu.edu.tw
  organization: Department of Business Administration, National Dong Hwa University, No. 1, Sec. 2, Da Hsueh Rd., Shoufent, Hualien, 97401, Taiwan, ROC
– sequence: 4
  givenname: Chia-Hao
  surname: Wang
  fullname: Wang, Chia-Hao
  email: 610332017@ems.ndhu.edu.tw
  organization: Department of Business Administration, National Dong Hwa University, No. 1, Sec. 2, Da Hsueh Rd., Shoufent, Hualien, 97401, Taiwan, ROC
BookMark eNp9kEtLAzEUhYNUsK3-AHcF1zPmNYmDKym-oOCmLiVkkjttak1qMm3x35s6unFROHDhcL_7OCM08MEDQpcElwQTcb0qzbIpKSayxFmMnKAhuZGskKKmAzTEksuiEoyeoVFKK4xxVWExRG_zJUxM8F3U1pnOBT9poNsD-EmCdVtsYuig97W3fx4k8J3-cbPefdivwS5gkpY6Or_II5Z650I8R6etXie4-K1j9PpwP58-FbOXx-fp3awwjFZd0WordE0JFYIBa4AT4IJY2zRtxbmuak1k1ejaWGGB14ZLajk13AKVwFvGxuiqn5vP_dxC6tQqbKPPKxWpBeMME0pzF-m7TAwpRWjVJroPHb8UweqQolqpnKI6pKhwFiOZkf8Y4_rPc2JufZS87UnIj-8cRJWMA2_AupgTVTa4I_Q3Z1eQVQ
CitedBy_id crossref_primary_10_1080_23311975_2023_2195027
crossref_primary_10_15869_itobiad_602478
crossref_primary_10_1108_ITP_05_2022_0412
crossref_primary_10_3389_fpsyg_2022_967991
crossref_primary_10_3389_fpsyg_2022_810140
crossref_primary_10_1108_ITP_05_2018_0255
crossref_primary_10_1155_2022_2376811
crossref_primary_10_1007_s10257_022_00575_2
crossref_primary_10_3389_fpsyg_2023_1181030
crossref_primary_10_1108_AJIM_01_2018_0019
crossref_primary_10_1016_j_elerap_2024_101359
crossref_primary_10_1108_ITP_05_2023_0421
crossref_primary_10_1109_TEM_2022_3185381
crossref_primary_10_1016_j_heliyon_2023_e13764
crossref_primary_10_1016_j_im_2024_103987
crossref_primary_10_1108_APJML_12_2022_1015
crossref_primary_10_2147_PRBM_S454292
Cites_doi 10.1111/j.1083-6101.2006.00029.x
10.1016/j.elerap.2011.07.003
10.1016/j.cose.2015.05.012
10.1145/1107458.1107465
10.1057/ejis.2009.11
10.2307/25148755
10.1111/j.1083-6101.2006.00020.x
10.1016/j.chb.2009.03.008
10.1080/10580530.2015.1080002
10.1007/s11747-014-0403-8
10.1002/(SICI)1097-0266(199902)20:2<195::AID-SMJ13>3.0.CO;2-7
10.1016/j.chb.2013.09.012
10.1016/j.compedu.2013.05.010
10.1007/s10796-012-9376-7
10.5465/amr.1989.4278999
10.1111/j.1083-6101.2007.00367.x
10.1002/hrm.20298
10.1016/j.chb.2015.03.050
10.1080/00223980.1975.9915803
10.1016/j.im.2014.03.007
10.2307/25148670
10.1057/jit.2010.6
10.1037/0022-3514.51.6.1173
10.5120/ijca2016910174
10.1177/0093650205285368
10.1016/j.istr.2010.04.005
10.1177/009207039502300406
10.1080/08874417.2016.1153910
10.1016/j.adolescence.2011.06.007
10.1177/0265407599162005
10.1287/isre.13.3.334.81
10.2307/3151312
10.1037/h0024833
10.2753/MIS0742-1222280309
10.1177/000271621606700118
10.2307/3151359
10.2307/25750690
10.5465/amr.2011.0235
10.1287/isre.1040.0032
10.1002/(SICI)1099-1441(199906)6:2<91::AID-KPM54>3.0.CO;2-M
10.1111/jcc4.12078
10.1007/s11747-015-0455-4
10.1016/j.chb.2014.02.031
10.1016/j.cose.2014.02.010
10.1016/j.tourman.2015.07.002
10.1109/TSMCA.2006.871793
10.1016/j.chb.2012.12.018
10.1287/isre.1070.0113
10.1037/0033-2909.103.3.411
10.1016/j.chb.2015.02.017
10.1108/PR-12-2013-0227
10.1016/j.dss.2013.01.029
10.1016/j.chb.2013.01.012
10.1016/j.cose.2014.03.004
ContentType Journal Article
Copyright 2017 Elsevier Ltd
Copyright Elsevier Science Ltd. Nov 2017
Copyright_xml – notice: 2017 Elsevier Ltd
– notice: Copyright Elsevier Science Ltd. Nov 2017
DBID AAYXX
CITATION
7SC
8FD
JQ2
L7M
L~C
L~D
DOI 10.1016/j.chb.2017.07.031
DatabaseName CrossRef
Computer and Information Systems Abstracts
Technology Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
DatabaseTitle CrossRef
Computer and Information Systems Abstracts
Technology Research Database
Computer and Information Systems Abstracts – Academic
Advanced Technologies Database with Aerospace
ProQuest Computer Science Collection
Computer and Information Systems Abstracts Professional
DatabaseTitleList
Computer and Information Systems Abstracts
DeliveryMethod fulltext_linktorsrc
Discipline Psychology
Computer Science
EISSN 1873-7692
EndPage 416
ExternalDocumentID 10_1016_j_chb_2017_07_031
S0747563217304533
GroupedDBID --K
--M
-~X
.DC
.~1
0R~
186
1B1
1RT
1~.
1~5
29F
4.4
457
4G.
53G
5GY
5VS
6J9
7-5
71M
8P~
9JN
9JO
AABNK
AACTN
AADFP
AAEDT
AAEDW
AAFJI
AAGJA
AAGUQ
AAIAV
AAIKJ
AAKOC
AALRI
AAOAW
AAQFI
AAQXK
AAXUO
AAYFN
ABBOA
ABFNM
ABFRF
ABIVO
ABJNI
ABMAC
ABMMH
ABOYX
ABXDB
ABYKQ
ACDAQ
ACGFO
ACGFS
ACHQT
ACNNM
ACRLP
ACXNI
ACZNC
ADBBV
ADEZE
ADHUB
ADJOM
ADMUD
AEBSH
AEFWE
AEKER
AFFNX
AFKWA
AFTJW
AFYLN
AGHFR
AGUBO
AGYEJ
AHHHB
AHZHX
AIALX
AIEXJ
AIKHN
AITUG
AJBFU
AJOXV
AKYCK
ALMA_UNASSIGNED_HOLDINGS
AMFUW
AMRAJ
AOMHK
AOUOD
ASPBG
AVARZ
AVWKF
AXJTR
AZFZN
BKOJK
BLXMC
CS3
DU5
EBS
EFJIC
EFLBG
EJD
EO8
EO9
EP2
EP3
F5P
FA8
FDB
FEDTE
FGOYB
FIRID
FNPLU
FYGXN
G-2
G-Q
GBLVA
GBOLZ
HF~
HLZ
HMW
HVGLF
HZ~
H~9
IHE
J1W
KOM
LG9
LPU
M3V
M41
MO0
N9A
NHB
O-L
O9-
OAUVE
OKEIE
OZT
P-8
P-9
P2P
PC.
PRBVW
Q38
R2-
RIG
ROL
RPZ
RXW
SBC
SCC
SDF
SDG
SDP
SES
SEW
SPC
SPCBC
SPS
SSB
SSO
SSV
SSY
SSZ
T5K
TAE
UMD
UNMZH
WUQ
XPP
XSW
ZCA
~G-
AATTM
AAXKI
AAYWO
AAYXX
ABWVN
ACRPL
ACVFH
ADCNI
ADNMO
AEIPS
AEUPX
AFJKZ
AFPUW
AFXIZ
AGCQF
AGQPQ
AGRNS
AIGII
AIIUN
AKBMS
AKRWK
AKYEP
ANKPU
APXCP
BNPGV
CITATION
SSH
7SC
8FD
EFKBS
JQ2
L7M
L~C
L~D
ID FETCH-LOGICAL-c325t-fad6a9212663e3be41e461ddbbf544a59a175ba9cd6de49c472d42c4de27e4f33
IEDL.DBID .~1
ISSN 0747-5632
IngestDate Wed Aug 13 04:42:28 EDT 2025
Tue Jul 01 03:51:33 EDT 2025
Thu Apr 24 22:54:49 EDT 2025
Fri Feb 23 02:13:59 EST 2024
IsPeerReviewed true
IsScholarly true
Keywords Information security awareness
Self-protection perspective
Self-presentation perspective
Knowledge-sharing behavior
Social capital
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c325t-fad6a9212663e3be41e461ddbbf544a59a175ba9cd6de49c472d42c4de27e4f33
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
PQID 1963430122
PQPubID 2038346
PageCount 11
ParticipantIDs proquest_journals_1963430122
crossref_primary_10_1016_j_chb_2017_07_031
crossref_citationtrail_10_1016_j_chb_2017_07_031
elsevier_sciencedirect_doi_10_1016_j_chb_2017_07_031
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate November 2017
2017-11-00
20171101
PublicationDateYYYYMMDD 2017-11-01
PublicationDate_xml – month: 11
  year: 2017
  text: November 2017
PublicationDecade 2010
PublicationPlace Elmsford
PublicationPlace_xml – name: Elmsford
PublicationTitle Computers in human behavior
PublicationYear 2017
Publisher Elsevier Ltd
Elsevier Science Ltd
Publisher_xml – name: Elsevier Ltd
– name: Elsevier Science Ltd
References Gaski, Nevin (bib27) 1985; 22
Shih, Huang (bib59) 2014; 16
Anderson, Gerbing (bib2) 1988; 103
Baron, Kenny (bib7) 1986; 51
Bilgihan, Barreda, Okumus, Nusair (bib10) 2016; 52
Ashforth, Mael (bib4) 1989; 14
Lee, Larsen (bib44) 2009; 18
Lin, Hung, Chen (bib46) 2009; 25
Lee (bib43) 2013; 29
Johnson, Li, Phan, Singer, Trinh (bib39) 2012
Rowatt, Cunningham, Druen (bib57) 1999; 16
Bhattacherjee, Sanford (bib9) 2006; 30
Bakshy, Rosenn, Marlow, Adamic (bib6) 2012
Reed, Tolman, Safyer (bib54) 2015; 50
Tamjidyamcholo, Baba, Shuib, Rohani (bib63) 2014; 43
Chang, Hsu, Lee (bib16) 2015; 32
Malhotra, Kim, Agarwal (bib49) 2004; 15
Putnam (bib53) 2001; 2
Jabee, Alam (bib38) 2016; 144
Hulland (bib36) 1999; 20
Yi, Yoon, Davis (bib68) 2013; 55
Gagné (bib26) 2009; 48
Bentler, Wu (bib8) 1993
Safa, Sookhak, Von Solms, Furnell, Ghani, Herawan (bib58) 2015; 53
Ahmed, Ragsdell, Olphert (bib1) 2014; Vol. 3
Boella, Van der Tone (bib11) 2006; 36
Smart Sights (bib60) 2016
Tamjidyamcholo, Baba, Tamjid, Gholipour (bib64) 2013; 68
Krasnova, Spiekermann, Koroleva, Hidebrand (bib42) 2010; 25
Arachchilage, Love (bib3) 2013; 29
Chai, Das, Rao (bib15) 2011; 28
McKnight, Choudhury, Kacmar (bib50) 2002; 13
Kankanhalli, Tan, Wei (bib41) 2005; 29
Ellison, Steinfield, Lampe (bib22) 2007; 12
Ma, Agarwal (bib48) 2007; 18
Chiang, Suen (bib18) 2015; 48
Bulgurcu, Cavusoglu, Benbasat (bib14) 2010; 34
Coles-Kemp (bib19) 2009; 14
Williams (bib66) 2006; 11
Chen, Lin, Yen (bib17) 2014; 51
Henseler, Ringle, Sarstedt (bib35) 2015; 43
Hwang (bib37) 2008; 19
Jöreskog, Sörbom (bib40) 1993
Ellison, Heino, Gibbs (bib21) 2006; 11
Ellison, Vitak, Gray, Lampe (bib23) 2014; 19
Rocha Flores, Antonsen, Ekstedt (bib55) 2014; 43
Ollier-Malaterre, Rothbard, Berg (bib52) 2013; 38
Voorhees, Brady, Ramirez (bib65) 2016; 44
Fox, Osborn, Warber (bib25) 2014; 35
Giffin (bib29) 1967; 68
Liao, Liu, Chen (bib45) 2011; 10
Bagozzi, Yi (bib5) 1988; 23
Hair, Black, Babin, Anderson (bib31) 2010
Gordon, Loeb (bib30) 2006; 49
Wu, Lee (bib67) 2016; 45
Brown (bib12) 1996
Bryce, Fraser (bib13) 2014; 30
Fornell, Larcker (bib24) 1981; 18
Nunnally (bib51) 1978
Sobel (bib61) 1982
Rogers (bib56) 1975; 91
Hendriks (bib34) 1999; 6
Han, Hovav (bib32) 2016; 56
Statista (bib62) 2017
Gibbs, Ellison, Heino (bib28) 2006; 33
Efron, Tibshirani (bib20) 1993
Hanifan (bib33) 1916; 67
Lwin, Li, Ang (bib47) 2012; 35
Fornell (10.1016/j.chb.2017.07.031_bib24) 1981; 18
Hair (10.1016/j.chb.2017.07.031_bib31) 2010
Chen (10.1016/j.chb.2017.07.031_bib17) 2014; 51
Giffin (10.1016/j.chb.2017.07.031_bib29) 1967; 68
Bilgihan (10.1016/j.chb.2017.07.031_bib10) 2016; 52
Yi (10.1016/j.chb.2017.07.031_bib68) 2013; 55
Wu (10.1016/j.chb.2017.07.031_bib67) 2016; 45
Ashforth (10.1016/j.chb.2017.07.031_bib4) 1989; 14
Boella (10.1016/j.chb.2017.07.031_bib11) 2006; 36
Sobel (10.1016/j.chb.2017.07.031_bib61) 1982
Hwang (10.1016/j.chb.2017.07.031_bib37) 2008; 19
Anderson (10.1016/j.chb.2017.07.031_bib2) 1988; 103
Ma (10.1016/j.chb.2017.07.031_bib48) 2007; 18
Lee (10.1016/j.chb.2017.07.031_bib43) 2013; 29
Safa (10.1016/j.chb.2017.07.031_bib58) 2015; 53
Bryce (10.1016/j.chb.2017.07.031_bib13) 2014; 30
Chiang (10.1016/j.chb.2017.07.031_bib18) 2015; 48
Tamjidyamcholo (10.1016/j.chb.2017.07.031_bib63) 2014; 43
Hendriks (10.1016/j.chb.2017.07.031_bib34) 1999; 6
Chang (10.1016/j.chb.2017.07.031_bib16) 2015; 32
McKnight (10.1016/j.chb.2017.07.031_bib50) 2002; 13
Gibbs (10.1016/j.chb.2017.07.031_bib28) 2006; 33
Liao (10.1016/j.chb.2017.07.031_bib45) 2011; 10
Krasnova (10.1016/j.chb.2017.07.031_bib42) 2010; 25
Lee (10.1016/j.chb.2017.07.031_bib44) 2009; 18
Statista (10.1016/j.chb.2017.07.031_bib62)
Lin (10.1016/j.chb.2017.07.031_bib46) 2009; 25
Baron (10.1016/j.chb.2017.07.031_bib7) 1986; 51
Ellison (10.1016/j.chb.2017.07.031_bib21) 2006; 11
Ellison (10.1016/j.chb.2017.07.031_bib23) 2014; 19
Bagozzi (10.1016/j.chb.2017.07.031_bib5) 1988; 23
Efron (10.1016/j.chb.2017.07.031_bib20) 1993
Chai (10.1016/j.chb.2017.07.031_bib15) 2011; 28
Bakshy (10.1016/j.chb.2017.07.031_bib6) 2012
Han (10.1016/j.chb.2017.07.031_bib32) 2016; 56
Bulgurcu (10.1016/j.chb.2017.07.031_bib14) 2010; 34
Jabee (10.1016/j.chb.2017.07.031_bib38) 2016; 144
Ahmed (10.1016/j.chb.2017.07.031_bib1) 2014; Vol. 3
Malhotra (10.1016/j.chb.2017.07.031_bib49) 2004; 15
Reed (10.1016/j.chb.2017.07.031_bib54) 2015; 50
Lwin (10.1016/j.chb.2017.07.031_bib47) 2012; 35
Voorhees (10.1016/j.chb.2017.07.031_bib65) 2016; 44
Johnson (10.1016/j.chb.2017.07.031_bib39) 2012
Nunnally (10.1016/j.chb.2017.07.031_bib51) 1978
Rocha Flores (10.1016/j.chb.2017.07.031_bib55) 2014; 43
Gordon (10.1016/j.chb.2017.07.031_bib30) 2006; 49
Shih (10.1016/j.chb.2017.07.031_bib59) 2014; 16
Coles-Kemp (10.1016/j.chb.2017.07.031_bib19) 2009; 14
Gagné (10.1016/j.chb.2017.07.031_bib26) 2009; 48
Hanifan (10.1016/j.chb.2017.07.031_bib33) 1916; 67
Hulland (10.1016/j.chb.2017.07.031_bib36) 1999; 20
Fox (10.1016/j.chb.2017.07.031_bib25) 2014; 35
Bhattacherjee (10.1016/j.chb.2017.07.031_bib9) 2006; 30
Williams (10.1016/j.chb.2017.07.031_bib66) 2006; 11
Putnam (10.1016/j.chb.2017.07.031_bib53) 2001; 2
Jöreskog (10.1016/j.chb.2017.07.031_bib40) 1993
Kankanhalli (10.1016/j.chb.2017.07.031_bib41) 2005; 29
Ellison (10.1016/j.chb.2017.07.031_bib22) 2007; 12
Brown (10.1016/j.chb.2017.07.031_bib12) 1996
Henseler (10.1016/j.chb.2017.07.031_bib35) 2015; 43
Bentler (10.1016/j.chb.2017.07.031_bib8) 1993
Arachchilage (10.1016/j.chb.2017.07.031_bib3) 2013; 29
Ollier-Malaterre (10.1016/j.chb.2017.07.031_bib52) 2013; 38
Gaski (10.1016/j.chb.2017.07.031_bib27) 1985; 22
Rowatt (10.1016/j.chb.2017.07.031_bib57) 1999; 16
Rogers (10.1016/j.chb.2017.07.031_bib56) 1975; 91
Smart Sights (10.1016/j.chb.2017.07.031_bib60)
Tamjidyamcholo (10.1016/j.chb.2017.07.031_bib64) 2013; 68
References_xml – volume: 20
  start-page: 195
  year: 1999
  end-page: 204
  ident: bib36
  article-title: Use of partial least squares in strategic management research: A review of four recent studies
  publication-title: Strategic Management Journal
– volume: 10
  start-page: 702
  year: 2011
  end-page: 715
  ident: bib45
  article-title: Examining the impact of privacy, trust and risk perceptions beyond monetary transactions: An integrated model
  publication-title: Electronic Commerce Research and Applications
– year: 1978
  ident: bib51
  article-title: Psychometric theory
– volume: 45
  start-page: 523
  year: 2016
  end-page: 538
  ident: bib67
  article-title: How to make a knowledge-sharing group: A group social capital perspective
  publication-title: Personnel Review
– volume: 22
  start-page: 130
  year: 1985
  end-page: 142
  ident: bib27
  article-title: The differential effects of exercised and unexercised power sources in a marketing channel
  publication-title: Journal of Marketing Research
– volume: 43
  start-page: 115
  year: 2015
  end-page: 135
  ident: bib35
  article-title: A new criterion for assessing discriminant validity in variance-based structural equation modeling
  publication-title: Journal of the Academy Marketing Science
– volume: 11
  start-page: 593
  year: 2006
  end-page: 628
  ident: bib66
  article-title: On and off the 'Net: Scales for social capital in an online era
  publication-title: Journal of Computer-mediated Communication
– volume: 15
  start-page: 336
  year: 2004
  end-page: 355
  ident: bib49
  article-title: Internet users' information privacy concerns (IUIPC): The construct, the scale, and a causal model
  publication-title: Information Systems Research
– volume: 11
  start-page: 415
  year: 2006
  end-page: 441
  ident: bib21
  article-title: Managing impressions online: Self-presentation processes in the online dating environment
  publication-title: Journal of Computer-mediated Communication
– volume: 68
  start-page: 104
  year: 1967
  end-page: 120
  ident: bib29
  article-title: The contribution of studies of source credibility to a theory of interpersonal trust in the communication process
  publication-title: Psychological Bulletin
– volume: 68
  start-page: 223
  year: 2013
  end-page: 232
  ident: bib64
  article-title: Information security—professional perceptions of knowledge-sharing intention under self-efficacy, trust, reciprocity, and shared-language
  publication-title: Computers & Education
– volume: 25
  start-page: 929
  year: 2009
  end-page: 939
  ident: bib46
  article-title: Fostering the determinants of knowledge sharing in professional virtual communities
  publication-title: Computers in Human Behavior
– volume: 53
  start-page: 65
  year: 2015
  end-page: 78
  ident: bib58
  article-title: Information security conscious care behaviour formation in organizations
  publication-title: Computers & Security
– volume: 56
  start-page: 218
  year: 2016
  end-page: 227
  ident: bib32
  article-title: Dimensionality of social capital and organizational citizenship behavior in information systems project teams
  publication-title: Journal of Computer Information Systems
– start-page: 169
  year: 1996
  end-page: 189
  ident: bib12
  article-title: Tajfel's contribution to the reduction of intergroup conflicts
  publication-title: Social groups and identities: Developing the legacy of henri tajfel
– volume: 38
  start-page: 645
  year: 2013
  end-page: 669
  ident: bib52
  article-title: When worlds collide in cyberspace: How boundary work in online social networks impacts professional relationships
  publication-title: Academy of Management Review
– volume: 35
  start-page: 31
  year: 2012
  end-page: 41
  ident: bib47
  article-title: Stop bugging me: An examination of adolescents' protection behavior against online harassment
  publication-title: Journal of Adolescence
– volume: 36
  start-page: 439
  year: 2006
  end-page: 450
  ident: bib11
  article-title: Security policies for sharing knowledge in virtual communities
  publication-title: IEEE Transactions on Systems, Man & Cybernetics: A
– volume: 19
  start-page: 419
  year: 2008
  end-page: 429
  ident: bib37
  article-title: A preliminary examination of the factors for knowledge sharing in technology mediated learning
  publication-title: Journal of Information Systems Education
– volume: 29
  start-page: 113
  year: 2005
  end-page: 143
  ident: bib41
  article-title: Contributing knowledge to electronic knowledge repositories: An empirical investigation
  publication-title: MIS Quarterly
– volume: 29
  start-page: 706
  year: 2013
  end-page: 714
  ident: bib3
  article-title: A game design framework for avoiding phishing attacks
  publication-title: Computers in Human Behavior
– year: 1993
  ident: bib20
  article-title: An introduction to the bootstrap
– volume: Vol. 3
  start-page: 1083
  year: 2014
  end-page: 1090
  ident: bib1
  article-title: Knowledge sharing and information security: A paradox?
  publication-title: Proceedings of the European conference on knowledge management
– volume: 43
  start-page: 19
  year: 2014
  end-page: 34
  ident: bib63
  article-title: Evaluation model for knowledge sharing in information security professional virtual community
  publication-title: Computers & Security
– volume: 103
  start-page: 411
  year: 1988
  end-page: 423
  ident: bib2
  article-title: Structural equation modeling in practice: A review and recommended two-step approach
  publication-title: Psychological Bulletin
– volume: 13
  start-page: 334
  year: 2002
  end-page: 359
  ident: bib50
  article-title: Developing and validating trust measures for e-commerce: An integrative typology
  publication-title: Information Systems Research
– volume: 23
  start-page: 272
  year: 1988
  end-page: 277
  ident: bib5
  article-title: On the evaluation of structural equation models
  publication-title: Academy of Marketing Science
– volume: 12
  start-page: 1143
  year: 2007
  end-page: 1168
  ident: bib22
  article-title: The benefits of Facebook “friends”: Social capital and college students' use of online social network sites
  publication-title: Journal of Computer-mediated Communication
– volume: 16
  start-page: 209
  year: 1999
  end-page: 223
  ident: bib57
  article-title: Lying to get a date: The effect of facial physical attractiveness on the willingness to deceive prospective dating partners
  publication-title: Journal of Social and Personal Relationships
– year: 2016
  ident: bib60
  article-title: Global social media research summary, 2016
– volume: 44
  start-page: 119
  year: 2016
  end-page: 134
  ident: bib65
  article-title: Discriminant validity testing in marketing: An analysis, causes for concern, and proposed remedies
  publication-title: Journal of the Academy of Marketing Science
– volume: 14
  start-page: 20
  year: 1989
  end-page: 39
  ident: bib4
  article-title: Social identity theory and the organization
  publication-title: Academy of Management Review
– volume: 67
  start-page: 130
  year: 1916
  end-page: 138
  ident: bib33
  article-title: The rural school community center
  publication-title: Annals of the American Academy of Political and Social Science
– volume: 43
  start-page: 90
  year: 2014
  end-page: 110
  ident: bib55
  article-title: Information security knowledge sharing in organizations: Investigating the effect of behavioral information security governance and national culture
  publication-title: Computers & Security
– year: 2010
  ident: bib31
  article-title: Multivariate data analysis
– volume: 51
  start-page: 568
  year: 2014
  end-page: 578
  ident: bib17
  article-title: How to facilitate inter-organizational knowledge sharing: The impact of trust
  publication-title: Information & Management
– volume: 2
  start-page: 41
  year: 2001
  end-page: 51
  ident: bib53
  article-title: Social capital: Measurement and consequences
  publication-title: Canadian Journal of Policy Research
– volume: 144
  start-page: 36
  year: 2016
  end-page: 40
  ident: bib38
  article-title: Issues and challenges of cyber security for SNSs (Facebook)
  publication-title: International Journal of Computer Applications
– volume: 91
  start-page: 93
  year: 1975
  end-page: 114
  ident: bib56
  article-title: A protection motivation theory of fear appeals and attitude change
  publication-title: Journal of Psychology
– volume: 32
  start-page: 331
  year: 2015
  end-page: 340
  ident: bib16
  article-title: Factors influencing knowledge-sharing behavior in virtual communities: A longitudinal investigation
  publication-title: Information Systems Management
– volume: 51
  start-page: 1173
  year: 1986
  end-page: 1182
  ident: bib7
  article-title: The moderator-mediator variable distinction in social psychological research: Conceptual, strategic, and statistical considerations
  publication-title: Journal of Personality and Social Psychology
– year: 2012
  ident: bib39
  article-title: The innovative success that is Apple, Inc
– volume: 18
  start-page: 42
  year: 2007
  end-page: 67
  ident: bib48
  article-title: Through a glass darkly: Information technology design, identity verification, and knowledge contribution in online communities
  publication-title: Information Systems Research
– volume: 6
  start-page: 91
  year: 1999
  end-page: 100
  ident: bib34
  article-title: Why share knowledge? The influence of ICT on the motivation for knowledge sharing
  publication-title: Knowledge and Process Management
– year: 1993
  ident: bib40
  article-title: LISREL 8, a guide to the program and application
– volume: 49
  start-page: 121
  year: 2006
  end-page: 125
  ident: bib30
  article-title: Budgeting process for information security expenditures
  publication-title: Communications of the ACM
– volume: 48
  start-page: 571
  year: 2009
  end-page: 589
  ident: bib26
  article-title: A model of knowledge-sharing motivation
  publication-title: Human Resource Management
– start-page: 519
  year: 2012
  end-page: 528
  ident: bib6
  article-title: The role of social networks in information diffusion
  publication-title: Proceeding of the 21st international conference on world wide web
– volume: 16
  start-page: 627
  year: 2014
  end-page: 641
  ident: bib59
  article-title: Influences of Web interactivity and social identity and bonds on the quality of online discussion in a virtual community
  publication-title: Information Systems Frontiers
– volume: 33
  start-page: 152
  year: 2006
  end-page: 177
  ident: bib28
  article-title: Self-presentation in online personals- the role of anticipated future interaction, self-disclosure, and perceived success in Internet dating
  publication-title: Communication Research
– volume: 52
  start-page: 287
  year: 2016
  end-page: 296
  ident: bib10
  article-title: Consumer perception of knowledge-sharing in travel-related online social networks
  publication-title: Tourism Management
– volume: 14
  start-page: 181
  year: 2009
  end-page: 185
  ident: bib19
  article-title: Information security management: An entangled research challenge
  publication-title: Information Security Technical Report
– year: 2017
  ident: bib62
  article-title: Facts and statistics on Apple
– volume: 25
  start-page: 109
  year: 2010
  end-page: 125
  ident: bib42
  article-title: Online social networks: Why we disclose
  publication-title: Journal of Information Technology
– volume: 48
  start-page: 516
  year: 2015
  end-page: 524
  ident: bib18
  article-title: Self-presentation and hiring recommendations in online communities: lessons from linkedIn
  publication-title: Computers in Human Behavior
– year: 1993
  ident: bib8
  article-title: EQS/Windows user's guide
– volume: 18
  start-page: 177
  year: 2009
  end-page: 187
  ident: bib44
  article-title: Threat or coping appraisal: Determinants of SMB executives' decision to adopt anti-malware software
  publication-title: European Journal of Information Systems
– volume: 30
  start-page: 805
  year: 2006
  end-page: 825
  ident: bib9
  article-title: Influence processes for information technology acceptance: An elaboration likelihood model
  publication-title: MIS Quarterly
– volume: 29
  start-page: 1499
  year: 2013
  end-page: 1509
  ident: bib43
  article-title: The role of attachment style in building social capital from SNSs: The interplay of anxiety and avoidance
  publication-title: Computers in Human Behavior
– volume: 30
  start-page: 299
  year: 2014
  end-page: 306
  ident: bib13
  article-title: The role of disclosure of personal information in the evaluation of risk and trust in young people's online interactions
  publication-title: Computers in Human Behavior
– volume: 35
  start-page: 527
  year: 2014
  end-page: 534
  ident: bib25
  article-title: Relational dialectics and SNSs: The role of Facebook in romantic relationship escalation, maintenance, conflict, and dissolution
  publication-title: Computers in Human Behavior
– volume: 28
  start-page: 309
  year: 2011
  end-page: 342
  ident: bib15
  article-title: Factors affecting bloggers' knowledge sharing: An investigation across gender
  publication-title: Journal of Management Information Systems
– volume: 55
  start-page: 284
  year: 2013
  end-page: 295
  ident: bib68
  article-title: Untangling the antecedents of initial trust in web-based health information: The roles of argument quality, source expertise, and user perceptions of information quality and risk
  publication-title: Decision Support Systems
– volume: 19
  start-page: 855
  year: 2014
  end-page: 870
  ident: bib23
  article-title: Cultivating social resources on social network sites: Facebook relationship maintenance behaviors and their role in social capital processes
  publication-title: Journal of Computer-mediated Communication
– volume: 18
  start-page: 39
  year: 1981
  end-page: 50
  ident: bib24
  article-title: Evaluating structural equation models with unobservable variables and measurement error
  publication-title: Journal of Marketing Research
– year: 1982
  ident: bib61
  article-title: Asymptotic confidence intervals for indirect effects in structural equation models
  publication-title: Sociological methodology
– volume: 50
  start-page: 431
  year: 2015
  end-page: 438
  ident: bib54
  article-title: Too close for comfort: Attachment insecurity and electronic intrusion in college students' dating relationships
  publication-title: Computers in Human Behavior
– volume: 34
  start-page: 523
  year: 2010
  end-page: 548
  ident: bib14
  article-title: Information security policy compliance: An empirical study of rationality-based beliefs and information security awareness
  publication-title: MIS Quarterly
– volume: 11
  start-page: 593
  year: 2006
  ident: 10.1016/j.chb.2017.07.031_bib66
  article-title: On and off the 'Net: Scales for social capital in an online era
  publication-title: Journal of Computer-mediated Communication
  doi: 10.1111/j.1083-6101.2006.00029.x
– volume: Vol. 3
  start-page: 1083
  year: 2014
  ident: 10.1016/j.chb.2017.07.031_bib1
  article-title: Knowledge sharing and information security: A paradox?
– volume: 10
  start-page: 702
  year: 2011
  ident: 10.1016/j.chb.2017.07.031_bib45
  article-title: Examining the impact of privacy, trust and risk perceptions beyond monetary transactions: An integrated model
  publication-title: Electronic Commerce Research and Applications
  doi: 10.1016/j.elerap.2011.07.003
– volume: 53
  start-page: 65
  year: 2015
  ident: 10.1016/j.chb.2017.07.031_bib58
  article-title: Information security conscious care behaviour formation in organizations
  publication-title: Computers & Security
  doi: 10.1016/j.cose.2015.05.012
– volume: 49
  start-page: 121
  issue: 1
  year: 2006
  ident: 10.1016/j.chb.2017.07.031_bib30
  article-title: Budgeting process for information security expenditures
  publication-title: Communications of the ACM
  doi: 10.1145/1107458.1107465
– volume: 18
  start-page: 177
  year: 2009
  ident: 10.1016/j.chb.2017.07.031_bib44
  article-title: Threat or coping appraisal: Determinants of SMB executives' decision to adopt anti-malware software
  publication-title: European Journal of Information Systems
  doi: 10.1057/ejis.2009.11
– volume: 30
  start-page: 805
  year: 2006
  ident: 10.1016/j.chb.2017.07.031_bib9
  article-title: Influence processes for information technology acceptance: An elaboration likelihood model
  publication-title: MIS Quarterly
  doi: 10.2307/25148755
– volume: 11
  start-page: 415
  year: 2006
  ident: 10.1016/j.chb.2017.07.031_bib21
  article-title: Managing impressions online: Self-presentation processes in the online dating environment
  publication-title: Journal of Computer-mediated Communication
  doi: 10.1111/j.1083-6101.2006.00020.x
– volume: 25
  start-page: 929
  year: 2009
  ident: 10.1016/j.chb.2017.07.031_bib46
  article-title: Fostering the determinants of knowledge sharing in professional virtual communities
  publication-title: Computers in Human Behavior
  doi: 10.1016/j.chb.2009.03.008
– volume: 32
  start-page: 331
  year: 2015
  ident: 10.1016/j.chb.2017.07.031_bib16
  article-title: Factors influencing knowledge-sharing behavior in virtual communities: A longitudinal investigation
  publication-title: Information Systems Management
  doi: 10.1080/10580530.2015.1080002
– volume: 43
  start-page: 115
  year: 2015
  ident: 10.1016/j.chb.2017.07.031_bib35
  article-title: A new criterion for assessing discriminant validity in variance-based structural equation modeling
  publication-title: Journal of the Academy Marketing Science
  doi: 10.1007/s11747-014-0403-8
– volume: 2
  start-page: 41
  year: 2001
  ident: 10.1016/j.chb.2017.07.031_bib53
  article-title: Social capital: Measurement and consequences
  publication-title: Canadian Journal of Policy Research
– volume: 20
  start-page: 195
  year: 1999
  ident: 10.1016/j.chb.2017.07.031_bib36
  article-title: Use of partial least squares in strategic management research: A review of four recent studies
  publication-title: Strategic Management Journal
  doi: 10.1002/(SICI)1097-0266(199902)20:2<195::AID-SMJ13>3.0.CO;2-7
– year: 2012
  ident: 10.1016/j.chb.2017.07.031_bib39
– volume: 30
  start-page: 299
  year: 2014
  ident: 10.1016/j.chb.2017.07.031_bib13
  article-title: The role of disclosure of personal information in the evaluation of risk and trust in young people's online interactions
  publication-title: Computers in Human Behavior
  doi: 10.1016/j.chb.2013.09.012
– volume: 68
  start-page: 223
  year: 2013
  ident: 10.1016/j.chb.2017.07.031_bib64
  article-title: Information security—professional perceptions of knowledge-sharing intention under self-efficacy, trust, reciprocity, and shared-language
  publication-title: Computers & Education
  doi: 10.1016/j.compedu.2013.05.010
– volume: 19
  start-page: 419
  year: 2008
  ident: 10.1016/j.chb.2017.07.031_bib37
  article-title: A preliminary examination of the factors for knowledge sharing in technology mediated learning
  publication-title: Journal of Information Systems Education
– volume: 16
  start-page: 627
  year: 2014
  ident: 10.1016/j.chb.2017.07.031_bib59
  article-title: Influences of Web interactivity and social identity and bonds on the quality of online discussion in a virtual community
  publication-title: Information Systems Frontiers
  doi: 10.1007/s10796-012-9376-7
– volume: 14
  start-page: 20
  year: 1989
  ident: 10.1016/j.chb.2017.07.031_bib4
  article-title: Social identity theory and the organization
  publication-title: Academy of Management Review
  doi: 10.5465/amr.1989.4278999
– volume: 12
  start-page: 1143
  year: 2007
  ident: 10.1016/j.chb.2017.07.031_bib22
  article-title: The benefits of Facebook “friends”: Social capital and college students' use of online social network sites
  publication-title: Journal of Computer-mediated Communication
  doi: 10.1111/j.1083-6101.2007.00367.x
– volume: 48
  start-page: 571
  year: 2009
  ident: 10.1016/j.chb.2017.07.031_bib26
  article-title: A model of knowledge-sharing motivation
  publication-title: Human Resource Management
  doi: 10.1002/hrm.20298
– volume: 50
  start-page: 431
  year: 2015
  ident: 10.1016/j.chb.2017.07.031_bib54
  article-title: Too close for comfort: Attachment insecurity and electronic intrusion in college students' dating relationships
  publication-title: Computers in Human Behavior
  doi: 10.1016/j.chb.2015.03.050
– year: 1978
  ident: 10.1016/j.chb.2017.07.031_bib51
– volume: 91
  start-page: 93
  year: 1975
  ident: 10.1016/j.chb.2017.07.031_bib56
  article-title: A protection motivation theory of fear appeals and attitude change
  publication-title: Journal of Psychology
  doi: 10.1080/00223980.1975.9915803
– volume: 51
  start-page: 568
  year: 2014
  ident: 10.1016/j.chb.2017.07.031_bib17
  article-title: How to facilitate inter-organizational knowledge sharing: The impact of trust
  publication-title: Information & Management
  doi: 10.1016/j.im.2014.03.007
– volume: 29
  start-page: 113
  year: 2005
  ident: 10.1016/j.chb.2017.07.031_bib41
  article-title: Contributing knowledge to electronic knowledge repositories: An empirical investigation
  publication-title: MIS Quarterly
  doi: 10.2307/25148670
– volume: 25
  start-page: 109
  year: 2010
  ident: 10.1016/j.chb.2017.07.031_bib42
  article-title: Online social networks: Why we disclose
  publication-title: Journal of Information Technology
  doi: 10.1057/jit.2010.6
– volume: 51
  start-page: 1173
  year: 1986
  ident: 10.1016/j.chb.2017.07.031_bib7
  article-title: The moderator-mediator variable distinction in social psychological research: Conceptual, strategic, and statistical considerations
  publication-title: Journal of Personality and Social Psychology
  doi: 10.1037/0022-3514.51.6.1173
– volume: 144
  start-page: 36
  year: 2016
  ident: 10.1016/j.chb.2017.07.031_bib38
  article-title: Issues and challenges of cyber security for SNSs (Facebook)
  publication-title: International Journal of Computer Applications
  doi: 10.5120/ijca2016910174
– volume: 33
  start-page: 152
  year: 2006
  ident: 10.1016/j.chb.2017.07.031_bib28
  article-title: Self-presentation in online personals- the role of anticipated future interaction, self-disclosure, and perceived success in Internet dating
  publication-title: Communication Research
  doi: 10.1177/0093650205285368
– volume: 14
  start-page: 181
  year: 2009
  ident: 10.1016/j.chb.2017.07.031_bib19
  article-title: Information security management: An entangled research challenge
  publication-title: Information Security Technical Report
  doi: 10.1016/j.istr.2010.04.005
– volume: 23
  start-page: 272
  year: 1988
  ident: 10.1016/j.chb.2017.07.031_bib5
  article-title: On the evaluation of structural equation models
  publication-title: Academy of Marketing Science
  doi: 10.1177/009207039502300406
– volume: 56
  start-page: 218
  year: 2016
  ident: 10.1016/j.chb.2017.07.031_bib32
  article-title: Dimensionality of social capital and organizational citizenship behavior in information systems project teams
  publication-title: Journal of Computer Information Systems
  doi: 10.1080/08874417.2016.1153910
– volume: 35
  start-page: 31
  year: 2012
  ident: 10.1016/j.chb.2017.07.031_bib47
  article-title: Stop bugging me: An examination of adolescents' protection behavior against online harassment
  publication-title: Journal of Adolescence
  doi: 10.1016/j.adolescence.2011.06.007
– volume: 16
  start-page: 209
  year: 1999
  ident: 10.1016/j.chb.2017.07.031_bib57
  article-title: Lying to get a date: The effect of facial physical attractiveness on the willingness to deceive prospective dating partners
  publication-title: Journal of Social and Personal Relationships
  doi: 10.1177/0265407599162005
– volume: 13
  start-page: 334
  year: 2002
  ident: 10.1016/j.chb.2017.07.031_bib50
  article-title: Developing and validating trust measures for e-commerce: An integrative typology
  publication-title: Information Systems Research
  doi: 10.1287/isre.13.3.334.81
– volume: 18
  start-page: 39
  issue: 3
  year: 1981
  ident: 10.1016/j.chb.2017.07.031_bib24
  article-title: Evaluating structural equation models with unobservable variables and measurement error
  publication-title: Journal of Marketing Research
  doi: 10.2307/3151312
– volume: 68
  start-page: 104
  year: 1967
  ident: 10.1016/j.chb.2017.07.031_bib29
  article-title: The contribution of studies of source credibility to a theory of interpersonal trust in the communication process
  publication-title: Psychological Bulletin
  doi: 10.1037/h0024833
– volume: 28
  start-page: 309
  year: 2011
  ident: 10.1016/j.chb.2017.07.031_bib15
  article-title: Factors affecting bloggers' knowledge sharing: An investigation across gender
  publication-title: Journal of Management Information Systems
  doi: 10.2753/MIS0742-1222280309
– volume: 67
  start-page: 130
  year: 1916
  ident: 10.1016/j.chb.2017.07.031_bib33
  article-title: The rural school community center
  publication-title: Annals of the American Academy of Political and Social Science
  doi: 10.1177/000271621606700118
– volume: 22
  start-page: 130
  issue: 2
  year: 1985
  ident: 10.1016/j.chb.2017.07.031_bib27
  article-title: The differential effects of exercised and unexercised power sources in a marketing channel
  publication-title: Journal of Marketing Research
  doi: 10.2307/3151359
– start-page: 169
  year: 1996
  ident: 10.1016/j.chb.2017.07.031_bib12
  article-title: Tajfel's contribution to the reduction of intergroup conflicts
– volume: 34
  start-page: 523
  year: 2010
  ident: 10.1016/j.chb.2017.07.031_bib14
  article-title: Information security policy compliance: An empirical study of rationality-based beliefs and information security awareness
  publication-title: MIS Quarterly
  doi: 10.2307/25750690
– year: 2010
  ident: 10.1016/j.chb.2017.07.031_bib31
– volume: 38
  start-page: 645
  year: 2013
  ident: 10.1016/j.chb.2017.07.031_bib52
  article-title: When worlds collide in cyberspace: How boundary work in online social networks impacts professional relationships
  publication-title: Academy of Management Review
  doi: 10.5465/amr.2011.0235
– volume: 15
  start-page: 336
  year: 2004
  ident: 10.1016/j.chb.2017.07.031_bib49
  article-title: Internet users' information privacy concerns (IUIPC): The construct, the scale, and a causal model
  publication-title: Information Systems Research
  doi: 10.1287/isre.1040.0032
– volume: 6
  start-page: 91
  year: 1999
  ident: 10.1016/j.chb.2017.07.031_bib34
  article-title: Why share knowledge? The influence of ICT on the motivation for knowledge sharing
  publication-title: Knowledge and Process Management
  doi: 10.1002/(SICI)1099-1441(199906)6:2<91::AID-KPM54>3.0.CO;2-M
– volume: 19
  start-page: 855
  year: 2014
  ident: 10.1016/j.chb.2017.07.031_bib23
  article-title: Cultivating social resources on social network sites: Facebook relationship maintenance behaviors and their role in social capital processes
  publication-title: Journal of Computer-mediated Communication
  doi: 10.1111/jcc4.12078
– volume: 44
  start-page: 119
  year: 2016
  ident: 10.1016/j.chb.2017.07.031_bib65
  article-title: Discriminant validity testing in marketing: An analysis, causes for concern, and proposed remedies
  publication-title: Journal of the Academy of Marketing Science
  doi: 10.1007/s11747-015-0455-4
– start-page: 519
  year: 2012
  ident: 10.1016/j.chb.2017.07.031_bib6
  article-title: The role of social networks in information diffusion
– year: 1993
  ident: 10.1016/j.chb.2017.07.031_bib20
– volume: 35
  start-page: 527
  year: 2014
  ident: 10.1016/j.chb.2017.07.031_bib25
  article-title: Relational dialectics and SNSs: The role of Facebook in romantic relationship escalation, maintenance, conflict, and dissolution
  publication-title: Computers in Human Behavior
  doi: 10.1016/j.chb.2014.02.031
– volume: 43
  start-page: 19
  year: 2014
  ident: 10.1016/j.chb.2017.07.031_bib63
  article-title: Evaluation model for knowledge sharing in information security professional virtual community
  publication-title: Computers & Security
  doi: 10.1016/j.cose.2014.02.010
– volume: 52
  start-page: 287
  year: 2016
  ident: 10.1016/j.chb.2017.07.031_bib10
  article-title: Consumer perception of knowledge-sharing in travel-related online social networks
  publication-title: Tourism Management
  doi: 10.1016/j.tourman.2015.07.002
– year: 1982
  ident: 10.1016/j.chb.2017.07.031_bib61
  article-title: Asymptotic confidence intervals for indirect effects in structural equation models
– year: 1993
  ident: 10.1016/j.chb.2017.07.031_bib8
– volume: 36
  start-page: 439
  year: 2006
  ident: 10.1016/j.chb.2017.07.031_bib11
  article-title: Security policies for sharing knowledge in virtual communities
  publication-title: IEEE Transactions on Systems, Man & Cybernetics: A
  doi: 10.1109/TSMCA.2006.871793
– volume: 29
  start-page: 706
  year: 2013
  ident: 10.1016/j.chb.2017.07.031_bib3
  article-title: A game design framework for avoiding phishing attacks
  publication-title: Computers in Human Behavior
  doi: 10.1016/j.chb.2012.12.018
– volume: 18
  start-page: 42
  year: 2007
  ident: 10.1016/j.chb.2017.07.031_bib48
  article-title: Through a glass darkly: Information technology design, identity verification, and knowledge contribution in online communities
  publication-title: Information Systems Research
  doi: 10.1287/isre.1070.0113
– ident: 10.1016/j.chb.2017.07.031_bib62
– volume: 103
  start-page: 411
  year: 1988
  ident: 10.1016/j.chb.2017.07.031_bib2
  article-title: Structural equation modeling in practice: A review and recommended two-step approach
  publication-title: Psychological Bulletin
  doi: 10.1037/0033-2909.103.3.411
– volume: 48
  start-page: 516
  year: 2015
  ident: 10.1016/j.chb.2017.07.031_bib18
  article-title: Self-presentation and hiring recommendations in online communities: lessons from linkedIn
  publication-title: Computers in Human Behavior
  doi: 10.1016/j.chb.2015.02.017
– ident: 10.1016/j.chb.2017.07.031_bib60
– volume: 45
  start-page: 523
  year: 2016
  ident: 10.1016/j.chb.2017.07.031_bib67
  article-title: How to make a knowledge-sharing group: A group social capital perspective
  publication-title: Personnel Review
  doi: 10.1108/PR-12-2013-0227
– year: 1993
  ident: 10.1016/j.chb.2017.07.031_bib40
– volume: 55
  start-page: 284
  year: 2013
  ident: 10.1016/j.chb.2017.07.031_bib68
  article-title: Untangling the antecedents of initial trust in web-based health information: The roles of argument quality, source expertise, and user perceptions of information quality and risk
  publication-title: Decision Support Systems
  doi: 10.1016/j.dss.2013.01.029
– volume: 29
  start-page: 1499
  year: 2013
  ident: 10.1016/j.chb.2017.07.031_bib43
  article-title: The role of attachment style in building social capital from SNSs: The interplay of anxiety and avoidance
  publication-title: Computers in Human Behavior
  doi: 10.1016/j.chb.2013.01.012
– volume: 43
  start-page: 90
  year: 2014
  ident: 10.1016/j.chb.2017.07.031_bib55
  article-title: Information security knowledge sharing in organizations: Investigating the effect of behavioral information security governance and national culture
  publication-title: Computers & Security
  doi: 10.1016/j.cose.2014.03.004
SSID ssj0005506
Score 2.325518
Snippet This study decomposes information security awareness (ISA) into general information security awareness (GISA) and information security policy awareness (ISPA),...
SourceID proquest
crossref
elsevier
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 406
SubjectTerms Bonding
Bridging
Credibility
Cybersecurity
Data collection
Effects
Information security awareness
Knowledge sharing
Knowledge-sharing behavior
Self-presentation perspective
Self-protection perspective
Social capital
Title The contradiction between self-protection and self-presentation on knowledge sharing behavior
URI https://dx.doi.org/10.1016/j.chb.2017.07.031
https://www.proquest.com/docview/1963430122
Volume 76
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LSwMxEA5SL158i_VRcvAkrO1uJrvuUYqlWvSgFnuRkNfSSlnF1oMXf7uZ3aSoYA9CYNmQLMtkMjPJfDNDyInikmXWHUssy9MIMkgjxQsZnRsmk0LHRW7xvuPmNu0P4XrERyukG2JhEFbpZX8t0ytp7Xvanprt18mkfY-p33nKnE2N3j6GGT8BMuTys89vMA9e1dfEwRGODp7NCuOlxwrRXVmVv5PFf-mmX1K6Uj29TbLubUZ6Uf_WFlmx5TbZCPUYqN-e22RtIc0-dsiTYwBaAdGlmVTBC9RjsujMTovIJ2jAflma0LeIRSqpa4sLNzobS7wApCGqf5cMe5cP3X7kaylEmiV8HhXSpDJ3espZGJYpC7GFNDZGqYIDSJ5LZ0comWuTGgu5hiwxkGgwNsksFIztkUb5Utp9QvHIgyFCRWw0oNeQoZGl-TlLlTSZbJJOoKLQPtE41ruYioAoexaO8AIJLzqusbhJThdTXussG8sGQ1ga8YNVhNMCy6YdhWUUfp_OBMofYOhePPjfVw_JGr7V0YlHpDF_e7fHzkyZq1bFhy2yenE16N_ic3D3OPgCG8XpoA
linkProvider Elsevier
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV05T8MwFH5CMNCFG1FOD7AghZLYTpqBAXGoXF0AiQUZX1GLqoBoEWLhT_EH8UvtCpBgQELy5NiJ9ex87_mdAJuKS5pZdy2xNE8jlrE0UryQUdNQmRQ6LnKL-o6Ldtq6Zqc3_GYM3kMsDLpVeuwfYnqF1r6n4anZeOx2G5eY-p2n1MnUaO2joYL1mX19cfe2_t7JodvkrSQ5Pro6aEW-tECkacIHUSFNKnMH247hWqosiy1LY2OUKjhjkufSsVUlc21SY1muWZYYlmhmbJJZVqAW1OH-hPtsE8sm7Lx98ivhVUFPXF2Eywum1MqpTHcUupNlVcJQGv_EDL-xhYrXHc_AlBdSyf6QDrMwZss5mA4FIIjHgzmojeDzdR5u3Ykjlee7NN0qWoJ4JzDSt70i8hkhsF-WJvSNgp9K4tpIw0f6HYkaRxLSCCzA9b9QeBHGy4fSLgHBOxbGJBWx0QzNlBSlOs2bNFXSZLIOu4GKQvvM5lhgoyeCC9u9cIQXSHix6xqN67A9mvI4TOvx22AWtkZ8OZvCsZ3fpq2GbRQeGPoCAY9RtGcu_-2tGzDZuro4F-cn7bMVqOGTYWjkKowPnp7tmpORBmq9OpME7v77J_gAx_sk6g
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=The+contradiction+between+self-protection+and+self-presentation+on+knowledge+sharing+behavior&rft.jtitle=Computers+in+human+behavior&rft.au=Ortiz%2C+Jaime&rft.au=Chang%2C+Shu-Hao&rft.au=Chih%2C+Wen-Hai&rft.au=Wang%2C+Chia-Hao&rft.date=2017-11-01&rft.pub=Elsevier+Ltd&rft.issn=0747-5632&rft.eissn=1873-7692&rft.volume=76&rft.spage=406&rft.epage=416&rft_id=info:doi/10.1016%2Fj.chb.2017.07.031&rft.externalDocID=S0747563217304533
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0747-5632&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0747-5632&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0747-5632&client=summon