-
1
-
-
84894549608
-
User preference of cyber security awareness delivery methods
-
J. Abawajy User preference of cyber security awareness delivery methods Behaviour and Information Technology 33 3 2014 236 247 10.1080/0144929X.2012.708787
-
(2014)
Behaviour and Information Technology
, vol.33
, Issue.3
, pp. 236-247
-
-
Abawajy, J.1
-
3
-
-
37249036235
-
Prediction of goal-directed behavior: Attitudes, intentions, and perceived behavioral control
-
I. Ajzen, and T.J. Madden Prediction of goal-directed behavior: attitudes, intentions, and perceived behavioral control Journal of Experimental Social Psychology 22 5 1986 453 474 10.1016/0022-1031(86)90045-4 http://dx.doi.org/10.1016/0022-1031(86
-
(1986)
Journal of Experimental Social Psychology
, vol.22
, Issue.5
, pp. 453-474
-
-
Ajzen, I.1
Madden, T.J.2
-
4
-
-
84878873834
-
Determinants of knowledge sharing in a public sector organization
-
A.T. Amayah Determinants of knowledge sharing in a public sector organization Journal of Knowledge Management 17 3 2013 454 471 10.1108/JKM-11-2012-0369
-
(2013)
Journal of Knowledge Management
, vol.17
, Issue.3
, pp. 454-471
-
-
Amayah, A.T.1
-
6
-
-
84855297514
-
Specification, evaluation, and interpretation of structural equation models
-
R.P. Bagozzi, and Y. Yi Specification, evaluation, and interpretation of structural equation models Academy of Marketing Science 40 2011 8 34 10.1007/s11747-011-0278-x
-
(2011)
Academy of Marketing Science
, vol.40
, pp. 8-34
-
-
Bagozzi, R.P.1
Yi, Y.2
-
7
-
-
84885587978
-
The role of disclosure of personal information in the evaluation of risk and trust in young peoples' online interactions
-
J. Bryce, and J. Fraser The role of disclosure of personal information in the evaluation of risk and trust in young peoples' online interactions Computers in Human Behavior 30 2014 299 306 10.1016/j.chb.2013.09.012
-
(2014)
Computers in Human Behavior
, vol.30
, pp. 299-306
-
-
Bryce, J.1
Fraser, J.2
-
8
-
-
0003526482
-
-
Sage Publications, Inc Thousand Oaks, CA, USA
-
B.M. Byrne Structural equation modeling with EQS and EQS-Windows: basic concepts, applications, and programming 1994 Sage Publications, Inc Thousand Oaks, CA, USA
-
(1994)
Structural Equation Modeling with EQS and EQS-Windows: Basic Concepts, Applications, and Programming
-
-
Byrne, B.M.1
-
10
-
-
84896486103
-
Going spear phishing: Exploring embedded training and awareness
-
D.D. Caputo, S.L. Pfleeger, J.D. Freeman, and M.E. Johnson Going spear phishing: exploring embedded training and awareness IEEE Security and Privacy 12 1 2014 28 38 10.1109/MSP.2013.106
-
(2014)
IEEE Security and Privacy
, vol.12
, Issue.1
, pp. 28-38
-
-
Caputo, D.D.1
Pfleeger, S.L.2
Freeman, J.D.3
Johnson, M.E.4
-
11
-
-
84929522381
-
Institutional pressures in security management: Direct and indirect influences on organizational investment in information security control resources
-
H. Cavusoglu, H. Cavusoglu, J.-Y. Son, and I. Benbasat Institutional pressures in security management: direct and indirect influences on organizational investment in information security control resources Information & Management 0 2015 10.1016/j.im.2014.12.004
-
(2015)
Information & Management
-
-
Cavusoglu, H.1
Cavusoglu, H.2
Son, J.-Y.3
Benbasat, I.4
-
12
-
-
79951580981
-
Social capital and individual motivations on knowledge sharing: Participant involvement as a moderator
-
H.H. Chang, and S.-S. Chuang Social capital and individual motivations on knowledge sharing: participant involvement as a moderator Information & Management 48 1 2011 9 18 10.1016/j.im.2010.11.001
-
(2011)
Information & Management
, vol.48
, Issue.1
, pp. 9-18
-
-
Chang, H.H.1
Chuang, S.-S.2
-
13
-
-
84901014101
-
How to facilitate inter-organizational knowledge sharing: The impact of trust
-
Y.-H. Chen, T.-P. Lin, and D.C. Yen How to facilitate inter-organizational knowledge sharing: the impact of trust Information & Management 2014 568 578 10.1016/j.im.2014.03.007
-
(2014)
Information & Management
, pp. 568-578
-
-
Chen, Y.-H.1
Lin, T.-P.2
Yen, D.C.3
-
14
-
-
84888878603
-
Understanding the violation of IS security policy in organizations: An integrated model based on social control and deterrence theory
-
L. Cheng, Y. Li, W. Li, E. Holm, and Q. Zhai Understanding the violation of IS security policy in organizations: an integrated model based on social control and deterrence theory Computers & Security 39 Part B 0 2013 447 459 10.1016/j.cose.2013.09.009
-
(2013)
Computers & Security
, vol.39 PART B
, pp. 447-459
-
-
Cheng, L.1
Li, Y.2
Li, W.3
Holm, E.4
Zhai, Q.5
-
15
-
-
84875789759
-
Ethical contexts and employee job responses in the hotel industry: The roles of work values and perceived organizational support
-
Pi-Y. Cheng, J.-T. Yang, C.-S. Wan, and M.-C. Chu Ethical contexts and employee job responses in the hotel industry: the roles of work values and perceived organizational support International Journal of Hospitality Management 34 0 2013 108 115 10.1016/j.ijhm.2013.03.007
-
(2013)
International Journal of Hospitality Management
, vol.34
, pp. 108-115
-
-
Cheng, P.-Y.1
Yang, J.-T.2
Wan, C.-S.3
Chu, M.-C.4
-
16
-
-
80955142795
-
The cyber threat landscape: Challenges and future research directions
-
K.-K.R. Choo The cyber threat landscape: challenges and future research directions Computers & Security 30 8 2011 719 731 10.1016/j.cose.2011.08.004
-
(2011)
Computers & Security
, vol.30
, Issue.8
, pp. 719-731
-
-
Choo, K.-K.R.1
-
17
-
-
84863720925
-
Information systems user security: A structured model of the knowing-doing gap
-
J. Cox Information systems user security: a structured model of the knowing-doing gap Computers in Human Behavior 28 5 2012 1849 1858 10.1016/j.chb.2012.05.003
-
(2012)
Computers in Human Behavior
, vol.28
, Issue.5
, pp. 1849-1858
-
-
Cox, J.1
-
18
-
-
84878313947
-
Toward web-based information security knowledge sharing
-
D. Feledi, S. Fenz, and L. Lechner Toward web-based information security knowledge sharing Information Security Technical Report 17 4 2013 199 209 10.1016/j.istr.2013.03.004
-
(2013)
Information Security Technical Report
, vol.17
, Issue.4
, pp. 199-209
-
-
Feledi, D.1
Fenz, S.2
Lechner, L.3
-
19
-
-
49049145201
-
On construct validity: A critique of Miniard and Cohen's paper
-
M. Fishbein, and I. Ajzen On construct validity: a critique of Miniard and Cohen's paper Journal of Experimental Social Psychology 17 3 1981 340 350 10.1016/0022-1031(81)90032-9 http://dx.doi.org/10.1016/0022-1031(81
-
(1981)
Journal of Experimental Social Psychology
, vol.17
, Issue.3
, pp. 340-350
-
-
Fishbein, M.1
Ajzen, I.2
-
22
-
-
84871394959
-
The effects of individual motivations and social capital on employees' tacit and explicit knowledge sharing intentions
-
Y.S. Hau, B. Kim, H. Lee, and Y.-G. Kim The effects of individual motivations and social capital on employees' tacit and explicit knowledge sharing intentions International Journal of Information Management 33 2 2013 356 366 10.1016/j.ijinfomgt.2012.10.009
-
(2013)
International Journal of Information Management
, vol.33
, Issue.2
, pp. 356-366
-
-
Hau, Y.S.1
Kim, B.2
Lee, H.3
Kim, Y.-G.4
-
23
-
-
84911446654
-
A good thing isn't always a good thing: Dispositional attitudes predict non-normative judgments
-
J. Hepler A good thing isn't always a good thing: dispositional attitudes predict non-normative judgments Personality and Individual Differences 75 0 2015 59 63 10.1016/j.paid.2014.11.016
-
(2015)
Personality and Individual Differences
, vol.75
, pp. 59-63
-
-
Hepler, J.1
-
25
-
-
79952542216
-
The influence of intrinsic and extrinsic motivation on individuals' knowledge sharing behavior
-
S.-Y. Hung, A. Durcikova, H.-M. Lai, and W.-M. Lin The influence of intrinsic and extrinsic motivation on individuals' knowledge sharing behavior International Journal of Human-Computer Studies 69 6 2011 415 427 10.1016/j.ijhcs.2011.02.004
-
(2011)
International Journal of Human-Computer Studies
, vol.69
, Issue.6
, pp. 415-427
-
-
Hung, S.-Y.1
Durcikova, A.2
Lai, H.-M.3
Lin, W.-M.4
-
26
-
-
84887852395
-
Information systems security policy compliance: An empirical study of the effects of socialisation, influence, and cognition
-
P. Ifinedo Information systems security policy compliance: an empirical study of the effects of socialisation, influence, and cognition Information & Management 51 1 2014 69 79 10.1016/j.im.2013.10.001
-
(2014)
Information & Management
, vol.51
, Issue.1
, pp. 69-79
-
-
Ifinedo, P.1
-
27
-
-
84870666662
-
A multi-tier phishing detection and filtering approach
-
R. Islam, and J. Abawajy A multi-tier phishing detection and filtering approach Journal of Network and Computer Applications 36 1 2013 324 335 10.1016/j.jnca.2012.05.009
-
(2013)
Journal of Network and Computer Applications
, vol.36
, Issue.1
, pp. 324-335
-
-
Islam, R.1
Abawajy, J.2
-
28
-
-
79957997626
-
Individual, social, and organizational contexts for active knowledge sharing in communities of practice
-
Su-H. Jeon, Y.-G. Kim, and J. Koh Individual, social, and organizational contexts for active knowledge sharing in communities of practice Expert Systems with Applications 38 10 2011 12423 12431 10.1016/j.eswa.2011.04.023
-
(2011)
Expert Systems with Applications
, vol.38
, Issue.10
, pp. 12423-12431
-
-
Jeon, S.-H.1
Kim, Y.-G.2
Koh, J.3
-
29
-
-
79953270907
-
An integrative model for knowledge sharing in communities-of-practice
-
S. Jeon, Y.-G. Kim, and J. Koh An integrative model for knowledge sharing in communities-of-practice Journal of Knowledge Management 15 2 2011 251 269 10.1108/13673271111119682
-
(2011)
Journal of Knowledge Management
, vol.15
, Issue.2
, pp. 251-269
-
-
Jeon, S.1
Kim, Y.-G.2
Koh, J.3
-
30
-
-
34247201963
-
Motivating knowledge sharing through a knowledge management system
-
W.R. King, and Peter V. Marks Jr. Motivating knowledge sharing through a knowledge management system Omega 36 1 2008 131 146 10.1016/j.omega.2005.10.006
-
(2008)
Omega
, vol.36
, Issue.1
, pp. 131-146
-
-
King, W.R.1
Marks, P.V.2
-
31
-
-
84902170062
-
Knowledge sharing motivation among IT personnel: Integrated model and implications of employment contracts
-
N. Koriat, and R. Gelbard Knowledge sharing motivation among IT personnel: Integrated model and implications of employment contracts International Journal of Information Management 34 5 2014 577 591 10.1016/j.ijinfomgt.2014.04.009
-
(2014)
International Journal of Information Management
, vol.34
, Issue.5
, pp. 577-591
-
-
Koriat, N.1
Gelbard, R.2
-
33
-
-
84897379477
-
Knowledge sharing in interest online communities: A comparison of posters and lurkers
-
H.-M. Lai, and T.T. Chen Knowledge sharing in interest online communities: a comparison of posters and lurkers Computers in Human Behavior 35 0 2014 295 306 10.1016/j.chb.2014.02.004
-
(2014)
Computers in Human Behavior
, vol.35
, pp. 295-306
-
-
Lai, H.-M.1
Chen, T.T.2
-
34
-
-
84890508850
-
The temporal relationships among habit, intention and IS uses
-
W.-K. Lee The temporal relationships among habit, intention and IS uses Computers in Human Behavior 32 0 2014 54 60 10.1016/j.chb.2013.11.010
-
(2014)
Computers in Human Behavior
, vol.32
, pp. 54-60
-
-
Lee, W.-K.1
-
35
-
-
4544362187
-
What influences IT ethical behavior intentions - Planned behavior, reasoned action, perceived importance, or individual characteristics?
-
L.N.K. Leonard, T. Paul Cronan, and J. Kreie What influences IT ethical behavior intentions - planned behavior, reasoned action, perceived importance, or individual characteristics? Information & Management 42 1 2004 143 158 10.1016/j.im.2003.12.008
-
(2004)
Information & Management
, vol.42
, Issue.1
, pp. 143-158
-
-
Leonard, L.N.K.1
Cronan, T.P.2
Kreie, J.3
-
36
-
-
80455155149
-
Knowledge sharing and investment decisions in information security
-
D. Liu, Y. Ji, and V. Mookerjee Knowledge sharing and investment decisions in information security Decision Support Systems 52 1 2011 95 107 10.1016/j.dss.2011.05.007
-
(2011)
Decision Support Systems
, vol.52
, Issue.1
, pp. 95-107
-
-
Liu, D.1
Ji, Y.2
Mookerjee, V.3
-
37
-
-
75349090403
-
Understanding compliance with internet use policy from the perspective of rational choice theory
-
H. Li, J. Zhang, and R. Sarathy Understanding compliance with internet use policy from the perspective of rational choice theory Decision Support Systems 48 4 2010 635 645 10.1016/j.dss.2009.12.005
-
(2010)
Decision Support Systems
, vol.48
, Issue.4
, pp. 635-645
-
-
Li, H.1
Zhang, J.2
Sarathy, R.3
-
38
-
-
84887055065
-
An investigation of information sharing and seeking behaviors in online investment communities
-
J.H. Park, B. Gu, A.C.M. Leung, and P. Konana An investigation of information sharing and seeking behaviors in online investment communities Computers in Human Behavior 31 0 2014 1 12 10.1016/j.chb.2013.10.002
-
(2014)
Computers in Human Behavior
, vol.31
, pp. 1-12
-
-
Park, J.H.1
Gu, B.2
Leung, A.C.M.3
Konana, P.4
-
39
-
-
84897916714
-
Determining employee awareness using the human aspects of information security questionnaire (HAIS-Q)
-
K. Parsons, A. McCormac, M. Butavicius, M. Pattinson, and C. Jerram Determining employee awareness using the human aspects of information security questionnaire (HAIS-Q) Computers & Security 0 2014 10.1016/j.cose.2013.12.003
-
(2014)
Computers & Security
-
-
Parsons, K.1
McCormac, A.2
Butavicius, M.3
Pattinson, M.4
Jerram, C.5
-
40
-
-
84876994807
-
A study of Facebook groups members' knowledge sharing
-
S.-M. Pi, C.-H. Chou, and H.-L. Liao A study of Facebook groups members' knowledge sharing Computers in Human Behavior 29 5 2013 1971 1979 10.1016/j.chb.2013.04.019
-
(2013)
Computers in Human Behavior
, vol.29
, Issue.5
, pp. 1971-1979
-
-
Pi, S.-M.1
Chou, C.-H.2
Liao, H.-L.3
-
41
-
-
38749127524
-
Information technology employees in state government: A study of affective organizational commitment, job involvement, and job satisfaction
-
M.F. Reid, C.K. Riemenschneider, M.W. Allen, and D.J. Armstrong Information technology employees in state government: a study of affective organizational commitment, job involvement, and job satisfaction The American Review of Public Administration 38 1 2008 41 61 10.1177/0275074007303136
-
(2008)
The American Review of Public Administration
, vol.38
, Issue.1
, pp. 41-61
-
-
Reid, M.F.1
Riemenschneider, C.K.2
Allen, M.W.3
Armstrong, D.J.4
-
42
-
-
71949094501
-
Self-efficacy in information security: Its influence on end users' information security practice behavior
-
H.-S. Rhee, C. Kim, and Y.U. Ryu Self-efficacy in information security: Its influence on end users' information security practice behavior Computers & Security 28 8 2009 816 826 10.1016/j.cose.2009.05.008
-
(2009)
Computers & Security
, vol.28
, Issue.8
, pp. 816-826
-
-
Rhee, H.-S.1
Kim, C.2
Ryu, Y.U.3
-
43
-
-
84898078970
-
Information security knowledge sharing in organizations: Investigating the effect of behavioral information security governance and national culture
-
W. Rocha Flores, E. Antonsen, and M. Ekstedt Information security knowledge sharing in organizations: Investigating the effect of behavioral information security governance and national culture Computers & Security 43 0 2014 90 110 10.1016/j.cose.2014.03.004
-
(2014)
Computers & Security
, vol.43
, pp. 90-110
-
-
Rocha Flores, W.1
Antonsen, E.2
Ekstedt, M.3
-
44
-
-
78651298535
-
Motivation and autonomy in counseling, psychotherapy, and behavior change: A look at theory and practice
-
R.M. Ryan, M.F. Lynch, M. Vansteenkiste, and E.L. Deci Motivation and autonomy in counseling, psychotherapy, and behavior change: a look at theory and practice The Counseling Psychologist 2010 10.1177/0011000009359313
-
(2010)
The Counseling Psychologist
-
-
Ryan, R.M.1
Lynch, M.F.2
Vansteenkiste, M.3
Deci, E.L.4
-
45
-
-
84921625716
-
An artificial neural network classification approach for improving accuracy of customer identification in e-commerce
-
N.S. Safa, N.A. Ghani, and M.A. Ismail An artificial neural network classification approach for improving accuracy of customer identification in e-commerce Malaysian Journal of Computer Science 27 3 2014 171 185
-
(2014)
Malaysian Journal of Computer Science
, vol.27
, Issue.3
, pp. 171-185
-
-
Safa, N.S.1
Ghani, N.A.2
Ismail, M.A.3
-
46
-
-
84883520453
-
A customer loyalty formation model in electronic commerce
-
N.S. Safa, and M.A. Ismail A customer loyalty formation model in electronic commerce Economic Modelling 35 0 2013 559 564 10.1016/j.econmod.2013.08.011
-
(2013)
Economic Modelling
, vol.35
, pp. 559-564
-
-
Safa, N.S.1
Ismail, M.A.2
-
47
-
-
84935921946
-
Information security conscious care behaviour formation in organizations
-
N.S. Safa, M. Sookhak, R. Von Solms, S. Furnell, N.A. Ghani, and T. Herawan Information security conscious care behaviour formation in organizations Computers & Security 53 0 2015 65 78 10.1016/j.cose.2015.05.012
-
(2015)
Computers & Security
, vol.53
, pp. 65-78
-
-
Safa, N.S.1
Sookhak, M.2
Von Solms, R.3
Furnell, S.4
Ghani, N.A.5
Herawan, T.6
-
48
-
-
84947072811
-
Information security policy compliance model in organizations
-
N.S. Safa, R. Von Solms, and S. Furnell Information security policy compliance model in organizations Computers & Security 2015 10.1016/j.cose.2015.10.006
-
(2015)
Computers & Security
-
-
Safa, N.S.1
Von Solms, R.2
Furnell, S.3
-
50
-
-
84915827746
-
Information disclosure on social networking sites: An intrinsic-extrinsic motivation perspective
-
J. Shibchurn, and X. Yan Information disclosure on social networking sites: an intrinsic-extrinsic motivation perspective Computers in Human Behavior 44 0 2015 103 117 10.1016/j.chb.2014.10.059
-
(2015)
Computers in Human Behavior
, vol.44
, pp. 103-117
-
-
Shibchurn, J.1
Yan, X.2
-
51
-
-
84961290871
-
Personality, attitudes, and intentions: Predicting initial adoption of information security behavior
-
J. Shropshire, M. Warkentin, and S. Sharma Personality, attitudes, and intentions: predicting initial adoption of information security behavior Computers & Security 49 0 2015 177 191 10.1016/j.cose.2015.01.002
-
(2015)
Computers & Security
, vol.49
, pp. 177-191
-
-
Shropshire, J.1
Warkentin, M.2
Sharma, S.3
-
52
-
-
84891789669
-
Employees' adherence to information security policies: An exploratory field study
-
M. Siponen, M.M. Adam, and S. Pahnila Employees' adherence to information security policies: an exploratory field study Information & Management 51 2 2014 217 224 10.1016/j.im.2013.08.006
-
(2014)
Information & Management
, vol.51
, Issue.2
, pp. 217-224
-
-
Siponen, M.1
Adam, M.M.2
Pahnila, S.3
-
53
-
-
84878856268
-
Information security - Professional perceptions of knowledge-sharing intention under self-efficacy, trust, reciprocity, and shared-language
-
A. Tamjidyamcholo, M.S. Bin Baba, H. Tamjid, and R. Gholipour Information security - professional perceptions of knowledge-sharing intention under self-efficacy, trust, reciprocity, and shared-language Computers & Education 68 0 2013 223 232 10.1016/j.compedu.2013.05.010
-
(2013)
Computers & Education
, vol.68
, pp. 223-232
-
-
Tamjidyamcholo, A.1
Bin Baba, M.S.2
Tamjid, H.3
Gholipour, R.4
-
54
-
-
84896448432
-
Evaluation model for knowledge sharing in information security professional virtual community
-
A. Tamjidyamcholo, M.S. Bin Baba, N.L.M. Shuib, and V.A. Rohani Evaluation model for knowledge sharing in information security professional virtual community Computers & Security 43 0 2014 19 34 10.1016/j.cose.2014.02.010
-
(2014)
Computers & Security
, vol.43
, pp. 19-34
-
-
Tamjidyamcholo, A.1
Bin Baba, M.S.2
Shuib, N.L.M.3
Rohani, V.A.4
-
56
-
-
84861093724
-
Motivating IS security compliance: Insights from habit and protection motivation theory
-
A. Vance, M. Siponen, and S. Pahnila Motivating IS security compliance: insights from habit and protection motivation theory Information & Management 49 3-4 2012 190 198 10.1016/j.im.2012.04.002
-
(2012)
Information & Management
, vol.49
, Issue.3-4
, pp. 190-198
-
-
Vance, A.1
Siponen, M.2
Pahnila, S.3
-
57
-
-
84885188079
-
From information security to cyber security
-
R. Von Solms, and J. Van Niekerk From information security to cyber security Computers & Security 38 0 2013 97 102 10.1016/j.cose.2013.04.004
-
(2013)
Computers & Security
, vol.38
, pp. 97-102
-
-
Von Solms, R.1
Van Niekerk, J.2
-
58
-
-
2342475711
-
Towards information security behavioural compliance
-
C. Vroom, and R. von Solms Towards information security behavioural compliance Computers & Security 23 3 2004 191 198 10.1016/j.cose.2004.01.012
-
(2004)
Computers & Security
, vol.23
, Issue.3
, pp. 191-198
-
-
Vroom, C.1
Von Solms, R.2
-
59
-
-
76749117937
-
Knowledge sharing: A review and directions for future research
-
S. Wang, and R.A. Noe Knowledge sharing: a review and directions for future research Human Resource Management Review 20 2 2010 115 131 10.1016/j.hrmr.2009.10.001
-
(2010)
Human Resource Management Review
, vol.20
, Issue.2
, pp. 115-131
-
-
Wang, S.1
Noe, R.A.2
-
60
-
-
84919833316
-
Motivations of employees' knowledge sharing behaviors: A self-determination perspective
-
W.-T. Wang, and Ya-P. Hou Motivations of employees' knowledge sharing behaviors: a self-determination perspective Information and Organization 25 1 2015 1 26 10.1016/j.infoandorg.2014.11.001
-
(2015)
Information and Organization
, vol.25
, Issue.1
, pp. 1-26
-
-
Wang, W.-T.1
Hou, Y.-P.2
-
61
-
-
64849093814
-
Security practitioners in context: Their activities and interactions with other stakeholders within organizations
-
R. Werlinger, K. Hawkey, D. Botta, and K. Beznosov Security practitioners in context: their activities and interactions with other stakeholders within organizations International Journal of Human-Computer Studies 67 7 2009 584 606 10.1016/j.ijhcs.2009.03.002
-
(2009)
International Journal of Human-Computer Studies
, vol.67
, Issue.7
, pp. 584-606
-
-
Werlinger, R.1
Hawkey, K.2
Botta, D.3
Beznosov, K.4
-
62
-
-
64749095408
-
Social capital, behavioural control, and tacit knowledge sharing - A multi-informant design
-
S.-C. Yang, and C.-K. Farn Social capital, behavioural control, and tacit knowledge sharing - A multi-informant design International Journal of Information Management 29 3 2009 210 218 10.1016/j.ijinfomgt.2008.09.002
-
(2009)
International Journal of Information Management
, vol.29
, Issue.3
, pp. 210-218
-
-
Yang, S.-C.1
Farn, C.-K.2
|