-
1
-
-
0037995342
-
How often did I do it? Experienced ease of retrieval and frequency estimates of past behavior
-
Aarts, H., and A. Dijksterhuis. 1999. How often did I do it? Experienced ease of retrieval and frequency estimates of past behavior. Acta Psychologica 103 (1-2): 77-89.
-
(1999)
Acta Psychologica
, vol.103
, Issue.1-2
, pp. 77-89
-
-
Aarts, H.1
Dijksterhuis, A.2
-
3
-
-
4043090817
-
Nurturing interpersonal trust in knowledgesharing networks
-
Abrams, L. C., R. Cross, E. Lesser, and D. Z. Levin. 2003. Nurturing interpersonal trust in knowledgesharing networks. The Academy of Management Executive 17 (4): 64.
-
(2003)
The Academy of Management Executive
, vol.17
, Issue.4
, pp. 64
-
-
Abrams, L.C.1
Cross, R.2
Lesser, E.3
Levin, D.Z.4
-
4
-
-
57349163398
-
-
Paper read at Proceeding of the 17th International Conference on the World Wide Web, Beijing, China
-
Adamic, L. A., J. Zhang, E. Bakshy, and M. S. Ackerman. 2008. Knowledge Sharing and Yahoo Answers: Everyone Knows Something. Paper read at Proceeding of the 17th International Conference on the World Wide Web, Beijing, China.
-
(2008)
Knowledge Sharing and Yahoo Answers: Everyone Knows Something.
-
-
Adamic, L.A.1
Zhang, J.2
Bakshy, E.3
Ackerman, M.S.4
-
5
-
-
0035229172
-
Nature and operation of attitudes
-
Ajzen, I. 2001. Nature and operation of attitudes. Annual Review of Psychology 52 (1): 27-58.
-
(2001)
Annual Review of Psychology
, vol.52
, Issue.1
, pp. 27-58
-
-
Ajzen, I.1
-
6
-
-
9744248703
-
Review: Knowledge management and knowledge management systems: Conceptual foundations and research issues
-
Alavi, M., and D. E. Leidner. 2001. Review: Knowledge management and knowledge management systems: Conceptual foundations and research issues. MIS Quarterly 25 (1): 107-136.
-
(2001)
MIS Quarterly
, vol.25
, Issue.1
, pp. 107-136
-
-
Alavi, M.1
Leidner, D.E.2
-
7
-
-
0002826997
-
A Reexamination of accountants' organizational-professional conflict
-
Aranya, N., and K. R. Ferris. 1984. A Reexamination of accountants' organizational-professional conflict. The Accounting Review 59 (1): 1.
-
(1984)
The Accounting Review
, vol.59
, Issue.1
, pp. 1
-
-
Aranya, N.1
Ferris, K.R.2
-
8
-
-
2642549662
-
Computer security and risky computing practices: A rational choice perspective
-
Aytes, K., and T. Connolly. 2004. Computer security and risky computing practices: A rational choice perspective. Journal of Organizational and End User Computing 16 (3): 22-40.
-
(2004)
Journal of Organizational and End User Computing
, vol.16
, Issue.3
, pp. 22-40
-
-
Aytes, K.1
Connolly, T.2
-
9
-
-
0023020183
-
The moderator mediator variable distinction in social psychological research-Conceptual, strategic, and statistical considerations
-
Baron, R. M., and D. A. Kenny. 1986. The moderator mediator variable distinction in social psychological research-Conceptual, strategic, and statistical considerations. Journal of Personality and Social Psychology 51 (6): 1173-1182.
-
(1986)
Journal of Personality and Social Psychology
, vol.51
, Issue.6
, pp. 1173-1182
-
-
Baron, R.M.1
Kenny, D.A.2
-
10
-
-
0036267587
-
The importance of accounting changes in debt contracts: The cost of flexibility in covenant calculations
-
Beatty, A., K. Ramesh, and J. Weber. 2002. The importance of accounting changes in debt contracts: The cost of flexibility in covenant calculations. Journal of Accounting and Economics 33 (2): 205-227.
-
(2002)
Journal of Accounting and Economics
, vol.33
, Issue.2
, pp. 205-227
-
-
Beatty, A.1
Ramesh, K.2
Weber, J.3
-
11
-
-
0347973105
-
Conventional wisdom on measurement-A structural equation perspective
-
Bollen, K., and R. Lennox. 1991. Conventional wisdom on measurement-A structural equation perspective. Psychological Bulletin 110 (2): 305-314.
-
(1991)
Psychological Bulletin
, vol.110
, Issue.2
, pp. 305-314
-
-
Bollen, K.1
Lennox, R.2
-
12
-
-
33845647611
-
Antecedents and consequences of the frequency of upward and downward social comparisons at work*
-
Brown, D. J., D. L. Ferris, D. Heller, and L. M. Keeping. 2007. Antecedents and consequences of the frequency of upward and downward social comparisons at work*. Organizational Behavior and Human Decision Processes 102 (1): 59.
-
(2007)
Organizational Behavior and Human Decision Processes
, vol.102
, Issue.1
, pp. 59
-
-
Brown, D.J.1
Ferris, D.L.2
Heller, D.3
Keeping, L.M.4
-
13
-
-
0035612309
-
Knowledge and organization: A social-practice perspective
-
Brown, J. S., and P. Duguid. 2001. Knowledge and organization: A social-practice perspective. Organization Science 12 (2): 198-213.
-
(2001)
Organization Science
, vol.12
, Issue.2
, pp. 198-213
-
-
Brown, J.S.1
Duguid, P.2
-
14
-
-
77957061746
-
Information security policy compliance: An empirical study of rationality-based beliefs and information security awareness
-
Bulgurcu, B., H. Cavusoglu, and I. Benbasat. 2010. Information security policy compliance: An empirical study of rationality-based beliefs and information security awareness. MIS Quarterly 34 (3): 523-548.
-
(2010)
MIS Quarterly
, vol.34
, Issue.3
, pp. 523-548
-
-
Bulgurcu, B.1
Cavusoglu, H.2
Benbasat, I.3
-
15
-
-
78651480194
-
The emerging challenge of knowledge management ecosystems: A Silicon Valley high tech company signals the future
-
Burkhard, R. J., T. R. Hill, and S. Venkatsubramanyan. 2011. The emerging challenge of knowledge management ecosystems: A Silicon Valley high tech company signals the future. Information Systems Management 28 (1): 5-18.
-
(2011)
Information Systems Management
, vol.28
, Issue.1
, pp. 5-18
-
-
Burkhard, R.J.1
Hill, T.R.2
Venkatsubramanyan, S.3
-
16
-
-
0035622120
-
Membership size, communication activity, and sustainability: A resource-based model of online social structures
-
Butler, B. 2001. Membership size, communication activity, and sustainability: A resource-based model of online social structures. Information Systems Research 12 (4): 346-362.
-
(2001)
Information Systems Research
, vol.12
, Issue.4
, pp. 346-362
-
-
Butler, B.1
-
17
-
-
30044443611
-
The paradoxes of knowledge management: An eastern philosophical perspective
-
Chae, B., and J. M. Bloodgood. 2006. The paradoxes of knowledge management: An eastern philosophical perspective. Information and Organization 16: 1-26.
-
(2006)
Information and Organization
, vol.16
, pp. 1-26
-
-
Chae, B.1
Bloodgood, J.M.2
-
18
-
-
77954718437
-
Privacy-preserving data publishing
-
Chen, B., D. Kifer, K. LeFevre, and A. Machanavajjhala. 2009. Privacy-preserving data publishing. Foundations and Trends Databases 2 (1-2): 1-167.
-
(2009)
Foundations and Trends Databases
, vol.2
, Issue.1-2
, pp. 1-167
-
-
Chen, B.1
Kifer, D.2
LeFevre, K.3
Machanavajjhala, A.4
-
19
-
-
33750439144
-
Understanding knowledge sharing in virtual communities: An integration of social capital and social cognitive theories
-
Chiu, C. M., M. H. Hsu, and E. T. G. Wang. 2006. Understanding knowledge sharing in virtual communities: An integration of social capital and social cognitive theories. Decision Support Systems 42 (3): 1872-1888.
-
(2006)
Decision Support Systems
, vol.42
, Issue.3
, pp. 1872-1888
-
-
Chiu, C.M.1
Hsu, M.H.2
Wang, E.T.G.3
-
21
-
-
4344622259
-
More than an answer: Information relationships for actionable knowledge
-
Cross, R., and L. Sproull. 2004. More than an answer: Information relationships for actionable knowledge. Organization Science 15 (4): 446-462.
-
(2004)
Organization Science
, vol.15
, Issue.4
, pp. 446-462
-
-
Cross, R.1
Sproull, L.2
-
22
-
-
67649551429
-
User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach
-
D'Arcy, J., A. Hovav, and D. Galletta. 2009. User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach. Information Systems Research 20 (1): 79.
-
(2009)
Information Systems Research
, vol.20
, Issue.1
, pp. 79
-
-
D'Arcy, J.1
Hovav, A.2
Galletta, D.3
-
23
-
-
78650638063
-
Knowledge collaboration in online communities
-
Faraj, S., S. L. Jarvenpaa, and A. Majchrzak. 2011. Knowledge collaboration in online communities. Organization Science 22 (5): 1224-1239.
-
(2011)
Organization Science
, vol.22
, Issue.5
, pp. 1224-1239
-
-
Faraj, S.1
Jarvenpaa, S.L.2
Majchrzak, A.3
-
24
-
-
0002535598
-
A comparison of two organizational commitment scales
-
Ferris, K. R., and N. Aranya. 1983. A comparison of two organizational commitment scales. Personnel Psychology 36 (1): 87.
-
(1983)
Personnel Psychology
, vol.36
, Issue.1
, pp. 87
-
-
Ferris, K.R.1
Aranya, N.2
-
25
-
-
84870753032
-
-
Paper read at 1st International Workshop on Privacy Aspects of Social Web and Cloud Computing (PASWeb), Minneapolis, MN
-
Gomez-Hidalgo, J. M., J. M. Marti{dotless}n-Abreuy, J. Nievesx, I. Santosx, F. Brezox, and P. G. Bringas. 2010. Data Leak Prevention Through Named Entity Recognition. Paper read at 1st International Workshop on Privacy Aspects of Social Web and Cloud Computing (PASWeb), Minneapolis, MN.
-
(2010)
Data Leak Prevention Through Named Entity Recognition.
-
-
Gomez-Hidalgo, J.M.1
Martin-Abreuy, J.M.2
Nievesx, J.3
Santosx, I.4
Brezox, F.5
Bringas, P.G.6
-
26
-
-
0000207559
-
Shared knowledge, "glitches," and product development performance
-
Hoopes, D. G., and S. Postrel. 1999. Shared knowledge, "glitches," and product development performance. Strategic Management Journal 20 (9).
-
(1999)
Strategic Management Journal
, vol.20
, Issue.9
-
-
Hoopes, D.G.1
Postrel, S.2
-
27
-
-
38649111049
-
Acceptance of blog usage: The roles of technology acceptance, social influence, and knowledge sharing motivation
-
Hsu, C. L., and J. C. C. Lin. 2008. Acceptance of blog usage: The roles of technology acceptance, social influence, and knowledge sharing motivation. Information and Management 45 (1): 65-74.
-
(2008)
Information and Management
, vol.45
, Issue.1
, pp. 65-74
-
-
Hsu, C.L.1
Lin, J.C.C.2
-
29
-
-
77957057727
-
Fear appeals and information security behaviors: An empirical study
-
Johnston, A. C., and M. Warkentin. 2010. Fear appeals and information security behaviors: An empirical study. MIS Quarterly 34 (3): 549-566.
-
(2010)
MIS Quarterly
, vol.34
, Issue.3
, pp. 549-566
-
-
Johnston, A.C.1
Warkentin, M.2
-
30
-
-
28744434462
-
Contributing knowledge to electronic knowledge repositories: An empirical investigation
-
Kankanhalli, A., B. C. Y. Tan, and K. K. Wei. 2005. Contributing knowledge to electronic knowledge repositories: An empirical investigation. MIS Quarterly 29 (1): 113-143.
-
(2005)
MIS Quarterly
, vol.29
, Issue.1
, pp. 113-143
-
-
Kankanhalli, A.1
Tan, B.C.Y.2
Wei, K.K.3
-
31
-
-
33748358862
-
-
Working paper, MIT Sloan
-
Kaplan, S., A. Schenkel, G. von Krogh, and C. Weber. 2001. Knowledge-Based Theories of the Firm in Strategic Management: A Review and Extension. Working paper, MIT Sloan.
-
(2001)
Knowledge-Based Theories of the Firm in Strategic Management: A Review and Extension.
-
-
Kaplan, S.1
Schenkel, A.2
von Krogh, G.3
Weber, C.4
-
32
-
-
1142266187
-
-
Slashdot (December). Available at
-
Katz, J. 1998. Luring the lurkers. Slashdot (December). Available at: http://slashdot.org/story/98/12/28/ 1745252/luring-the-lurkers
-
(1998)
Luring the lurkers.
-
-
Katz, J.1
-
35
-
-
77955469335
-
Antecedents and determinants of information technology habit
-
Lankton, N. K., E. V. Wilson, and E. Mao. 2010. Antecedents and determinants of information technology habit. Information and Management 47: 300-307.
-
(2010)
Information and Management
, vol.47
, pp. 300-307
-
-
Lankton, N.K.1
Wilson, E.V.2
Mao, E.3
-
36
-
-
80053025564
-
A threat model approach to threats and vulnerabilities in on-line social networks
-
Laorden, C., B. Sanz, G. Alvarez, and P. G. Bringas. 2010. A threat model approach to threats and vulnerabilities in on-line social networks. Computational Intelligence in Security for Information Systems 85: 135-142.
-
(2010)
Computational Intelligence in Security for Information Systems
, vol.85
, pp. 135-142
-
-
Laorden, C.1
Sanz, B.2
Alvarez, G.3
Bringas, P.G.4
-
37
-
-
34247111292
-
Organizational commitment and auditors in public accounting
-
Lawrence, P. K., and J. C. William. 2007. Organizational commitment and auditors in public accounting. Managerial Auditing Journal 22 (4): 354.
-
(2007)
Managerial Auditing Journal
, vol.22
, Issue.4
, pp. 354
-
-
Lawrence, P.K.1
William, J.C.2
-
38
-
-
67650562846
-
-
Carbondale, IL: Southern Illinois University Carbondale
-
Lee, Y.-C., S. Bishop, H. Okhravi, and S. Rahimi. 2009. Information Leakage Detection in Distributed Systems Using Software Agents. Carbondale, IL: Southern Illinois University Carbondale.
-
(2009)
Information Leakage Detection in Distributed Systems Using Software Agents.
-
-
Lee, Y.-C.1
Bishop, S.2
Okhravi, H.3
Rahimi, S.4
-
39
-
-
4344649168
-
The strength of weak ties you can trust: The mediating role of trust in effective knowledge transfer
-
Levin, D. Z., and R. Cross. 2004. The strength of weak ties you can trust: The mediating role of trust in effective knowledge transfer. Management Science 50 (11): 1477-1490.
-
(2004)
Management Science
, vol.50
, Issue.11
, pp. 1477-1490
-
-
Levin, D.Z.1
Cross, R.2
-
40
-
-
77955121478
-
Understanding security behaviors in personal computer usage: A threat avoidance perspective
-
Liang, H. G., and Y. J. Xue. 2010. Understanding security behaviors in personal computer usage: A threat avoidance perspective. Journal of the Association for Information Systems 11 (7): 394-413.
-
(2010)
Journal of the Association for Information Systems
, vol.11
, Issue.7
, pp. 394-413
-
-
Liang, H.G.1
Xue, Y.J.2
-
41
-
-
0002083939
-
Knowledge, strategy, and the theory of the firm
-
Liebeskind, J. P. 1996. Knowledge, strategy, and the theory of the firm. Strategic Management Journal 17: 93-107.
-
(1996)
Strategic Management Journal
, vol.17
, pp. 93-107
-
-
Liebeskind, J.P.1
-
42
-
-
34247508664
-
Through a glass darkly: Information technology design, identity verification, and knowledge contribution in online communities
-
Ma, M., and R. Agarwal. 2007. Through a glass darkly: Information technology design, identity verification, and knowledge contribution in online communities. Information Systems Research 18 (1): 42.
-
(2007)
Information Systems Research
, vol.18
, Issue.1
, pp. 42
-
-
Ma, M.1
Agarwal, R.2
-
43
-
-
23744448456
-
A multidimensional commitment model of volitional systems adoption and usage behavior
-
Malhotra, Y., and D. Galletta. 2005. A multidimensional commitment model of volitional systems adoption and usage behavior. Journal of Management Information Systems 22 (1): 117-151.
-
(2005)
Journal of Management Information Systems
, vol.22
, Issue.1
, pp. 117-151
-
-
Malhotra, Y.1
Galletta, D.2
-
44
-
-
25844487151
-
Extending the technology acceptance model: The influence of perceived user resources
-
Mathieson, K., E. Peacock, and W. W. Chin. 2001. Extending the technology acceptance model: The influence of perceived user resources. Database for Advances in Information Systems 32 (3): 86-112.
-
(2001)
Database for Advances in Information Systems
, vol.32
, Issue.3
, pp. 86-112
-
-
Mathieson, K.1
Peacock, E.2
Chin, W.W.3
-
45
-
-
0033241307
-
The effect of the performance appraisal system on trust for management: A field quasi-experiment
-
Mayer, R. C., and J. H. Davis. 1999. The effect of the performance appraisal system on trust for management: A field quasi-experiment. Journal of Applied Psychology 84 (1): 123.
-
(1999)
Journal of Applied Psychology
, vol.84
, Issue.1
, pp. 123
-
-
Mayer, R.C.1
Davis, J.H.2
-
48
-
-
78751698483
-
-
Paper read at GROUP '10 Proceedings of the 16th ACM International Conference on Supporting Group Work, New York, NY
-
Muller, M., N. S. Shami, and D. R. Millen. 2010. We Are All Lurkers: Consuming Behaviors Among Authors and Readers in an Enterprise File-Sharing Service. Paper read at GROUP '10 Proceedings of the 16th ACM International Conference on Supporting Group Work, New York, NY.
-
(2010)
We Are All Lurkers: Consuming Behaviors Among Authors and Readers in an Enterprise File-Sharing Service.
-
-
Muller, M.1
Shami, N.S.2
Millen, D.R.3
-
49
-
-
0032375624
-
Social capital, intellectual capital, and the organizational advantage
-
Nahapiet, J., and S. Ghoshal. 1998. Social capital, intellectual capital, and the organizational advantage. Academy of Management Review 23 (2): 242-266.
-
(1998)
Academy of Management Review
, vol.23
, Issue.2
, pp. 242-266
-
-
Nahapiet, J.1
Ghoshal, S.2
-
51
-
-
0032385513
-
Habit and intention in everyday life: The multiple processes by which past behavior predicts future behavior
-
Ouellette, J. A., and W. Wood. 1998. Habit and intention in everyday life: The multiple processes by which past behavior predicts future behavior. Psychological Bulletin 124 (1): 54-74.
-
(1998)
Psychological Bulletin
, vol.124
, Issue.1
, pp. 54-74
-
-
Ouellette, J.A.1
Wood, W.2
-
52
-
-
84867973293
-
Bridging communities of practice with information technology in pursuit of global knowledge sharing
-
Pan, S. L., and D. E. Leidner. 2003. Bridging communities of practice with information technology in pursuit of global knowledge sharing. The Journal of Strategic Information Systems 12 (1): 71-88.
-
(2003)
The Journal of Strategic Information Systems
, vol.12
, Issue.1
, pp. 71-88
-
-
Pan, S.L.1
Leidner, D.E.2
-
53
-
-
11244294048
-
Organizational justice and turnover in public accounting firms: A research note
-
Parker, R. J., and J. M., Kohlmeyer. 2005. Organizational justice and turnover in public accounting firms: A research note. Accounting, Organizations and Society 30 (4): 357-369.
-
(2005)
Accounting, Organizations and Society
, vol.30
, Issue.4
, pp. 357-369
-
-
Parker, R.J.1
Kohlmeyer, J.M.2
-
54
-
-
70449711048
-
Usability and sociability in online communities: A comparative study of knowledge seeking and contribution
-
Phang, C. W., A. Kankanhalli, and R. Sabherwal. 2009. Usability and sociability in online communities: A comparative study of knowledge seeking and contribution. Journal of the Association for Information Systems 10 (2).
-
(2009)
Journal of the Association for Information Systems
, vol.10
, Issue.2
-
-
Phang, C.W.1
Kankanhalli, A.2
Sabherwal, R.3
-
55
-
-
0141907688
-
Common method biases in behavioral research: A critical review of the literature and recommended remedies
-
Podsakoff, P. M., S. B. MacKenzie, J. Y. Lee, and N. P. Podsakoff. 2003. Common method biases in behavioral research: A critical review of the literature and recommended remedies. Journal of Applied Psychology 88 (5): 879-903.
-
(2003)
Journal of Applied Psychology
, vol.88
, Issue.5
, pp. 879-903
-
-
Podsakoff, P.M.1
MacKenzie, S.B.2
Lee, J.Y.3
Podsakoff, N.P.4
-
58
-
-
78650770842
-
Improving employees' compliance through information systems security training: An action research study
-
Puhakainen, P., and M. Siponen. 2010. Improving employees' compliance through information systems security training: An action research study. MIS Quarterly 34 (4): 757-778.
-
(2010)
MIS Quarterly
, vol.34
, Issue.4
, pp. 757-778
-
-
Puhakainen, P.1
Siponen, M.2
-
60
-
-
33646412858
-
Limits to communities of practice
-
Roberts, J. 2006. Limits to communities of practice. Journal of Management Studies 43 (3): 623-639.
-
(2006)
Journal of Management Studies
, vol.43
, Issue.3
, pp. 623-639
-
-
Roberts, J.1
-
63
-
-
77957068563
-
Neutralization: New insights into the problem of employee information systems security policy violations
-
Siponen, M., and A. Vance. 2010. Neutralization: New insights into the problem of employee information systems security policy violations. MIS Quarterly 34 (3): 487-502.
-
(2010)
MIS Quarterly
, vol.34
, Issue.3
, pp. 487-502
-
-
Siponen, M.1
Vance, A.2
-
64
-
-
21144469072
-
A perspective on accounting-based debt covenant violations
-
Smith, C. W. 1993. A perspective on accounting-based debt covenant violations. Accounting Review 68 (2): 289-303.
-
(1993)
Accounting Review
, vol.68
, Issue.2
, pp. 289-303
-
-
Smith, C.W.1
-
65
-
-
80051473399
-
Google effects on memory: Cognitive consequences of having information at our fingertips
-
Sparrow, B., J. Liu, and D. M. Wegner. 2011. Google effects on memory: cognitive consequences of having information at our fingertips. Science 333 (6043): 776-778.
-
(2011)
Science
, vol.333
, Issue.6043
, pp. 776-778
-
-
Sparrow, B.1
Liu, J.2
Wegner, D.M.3
-
66
-
-
77957070672
-
User participation in information systems security risk management
-
Spears, J. L., and H. Barki. 2010. User participation in information systems security risk management. MIS Quarterly 34 (3): 503-522.
-
(2010)
MIS Quarterly
, vol.34
, Issue.3
, pp. 503-522
-
-
Spears, J.L.1
Barki, H.2
-
67
-
-
38149148207
-
Debt-covenant violations and managers accounting responses
-
Sweeney, A. P. 1994. Debt-covenant violations and managers accounting responses. Journal of Accounting and Economics 17 (3): 281-308.
-
(1994)
Journal of Accounting and Economics
, vol.17
, Issue.3
, pp. 281-308
-
-
Sweeney, A.P.1
-
68
-
-
7544228213
-
When and how trustworthiness matters: Knowledge transfer and the moderating effect of causal ambiguity
-
Szulanski, G., R. Cappetta, and R. J. Jensen. 2004. When and how trustworthiness matters: Knowledge transfer and the moderating effect of causal ambiguity. Organization Science 15 (5): 600-613.
-
(2004)
Organization Science
, vol.15
, Issue.5
, pp. 600-613
-
-
Szulanski, G.1
Cappetta, R.2
Jensen, R.J.3
-
69
-
-
77349125413
-
Knowledge sharing among accounting academics in an electronic network of practice
-
Taylor, E. Z., and U. S. Murthy. 2009. Knowledge sharing among accounting academics in an electronic network of practice. Accounting Horizons 23 (2): 151-179.
-
(2009)
Accounting Horizons
, vol.23
, Issue.2
, pp. 151-179
-
-
Taylor, E.Z.1
Murthy, U.S.2
-
70
-
-
0346437614
-
It is what one does: Why people participate and help others in electronic communities of practice
-
Wasko, M., and S. Faraj. 2000. It is what one does: Why people participate and help others in electronic communities of practice. Journal of Strategic Information Systems 9 (2-3): 155-173.
-
(2000)
Journal of Strategic Information Systems
, vol.9
, Issue.2-3
, pp. 155-173
-
-
Wasko, M.1
Faraj, S.2
-
71
-
-
24144482419
-
Why should I share? Examining social capital and knowledge contribution in electronic networks of practice
-
Wasko, M. M., and S. Faraj. 2005. Why should I share? Examining social capital and knowledge contribution in electronic networks of practice. MIS Quarterly 29 (1): 35-57.
-
(2005)
MIS Quarterly
, vol.29
, Issue.1
, pp. 35-57
-
-
Wasko, M.M.1
Faraj, S.2
-
72
-
-
33947253640
-
Collective action and knowledge contribution in electronic networks of practice
-
Wasko, M. M., S. Faraj, and R. Teigland. 2004. Collective action and knowledge contribution in electronic networks of practice. Journal of Association for Information Systems 5 (11-12): 493-513.
-
(2004)
Journal of Association for Information Systems
, vol.5
, Issue.11-12
, pp. 493-513
-
-
Wasko, M.M.1
Faraj, S.2
Teigland, R.3
-
73
-
-
0000047027
-
Positive accounting theory-A 10-year perspective
-
Watts, R. L., and J. L. Zimmerman. 1990. Positive accounting theory-A 10-year perspective. The Accounting Review 65 (1): 131-156.
-
(1990)
The Accounting Review
, vol.65
, Issue.1
, pp. 131-156
-
-
Watts, R.L.1
Zimmerman, J.L.2
-
74
-
-
0000189486
-
Antecedents and consequences of satisfaction and commitment in turnover models: A reanalysis using latent variable structural equation methods
-
Williams, L. J., and J. T. Hazer. 1986. Antecedents and consequences of satisfaction and commitment in turnover models: A reanalysis using latent variable structural equation methods. Journal of Applied Psychology 71 (2): 219.
-
(1986)
Journal of Applied Psychology
, vol.71
, Issue.2
, pp. 219
-
-
Williams, L.J.1
Hazer, J.T.2
-
75
-
-
76449101785
-
Why do we trust? Moving beyond individual to dyadic perceptions
-
Yakovleva, M., R. R. Reilly, and R. Werko. 2010. Why do we trust? Moving beyond individual to dyadic perceptions. Journal of Applied Psychology 95 (1): 79-91.
-
(2010)
Journal of Applied Psychology
, vol.95
, Issue.1
, pp. 79-91
-
-
Yakovleva, M.1
Reilly, R.R.2
Werko, R.3
|