{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,10,13]],"date-time":"2023-10-13T17:11:50Z","timestamp":1697217110295},"reference-count":103,"publisher":"Emerald","issue":"5","license":[{"start":{"date-parts":[[2015,9,21]],"date-time":"2015-09-21T00:00:00Z","timestamp":1442793600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,9,21]]},"abstract":"Purpose<\/jats:title>\u2013 The purpose of this paper is to investigate how customer power of environmental factors affects customer support (CS) engineers\u2019 personal motivations in a knowledge-sharing context. The authors examine extrinsic (i.e. organizational rewards, reputation, and reciprocity) and intrinsic motivations (i.e. knowledge self-efficacy) affecting knowledge-sharing intentions based on the social exchange theory (SET) and self-efficacy theory. Furthermore, the authors introduce the concept of the social power theory to investigate the moderating effect of customer power on the relationships between personal motivations and knowledge-sharing intentions.<\/jats:p><\/jats:sec>Design\/methodology\/approach<\/jats:title>\u2013 This study collects 349 questionnaires of CS engineers from 16 countries, including the USA, China, Japan, South Korea, and Taiwan. After the data collection, the research model and hypotheses are tested using partial least squares.<\/jats:p><\/jats:sec>Findings<\/jats:title>\u2013 The empirical results show that reputation, reciprocity, and knowledge self-efficacy are significantly and positively related to knowledge-sharing intentions. Also, the results show that customer power can significantly moderate the relationships between personal motivations and knowledge-sharing intentions.<\/jats:p><\/jats:sec>Research limitations\/implications<\/jats:title>\u2013 The findings help multinational corporations employ the perception of customer power to motivate CS engineers to share knowledge. Especially, the results can help organizations increase customer added value through effective knowledge sharing.<\/jats:p><\/jats:sec>Originality\/value<\/jats:title>\u2013 The research model integrates personal motivations derived from the SET and self-efficacy theory and customer power of environmental factors. Additionally, this study is the first to investigate the moderating effect of customer power on employees\u2019 personal motivations and behavioral intentions.<\/jats:p><\/jats:sec>","DOI":"10.1108\/ajim-02-2015-0028","type":"journal-article","created":{"date-parts":[[2015,9,16]],"date-time":"2015-09-16T14:47:03Z","timestamp":1442414823000},"page":"505-525","source":"Crossref","is-referenced-by-count":5,"title":["The effect of customer power on enterprise internal knowledge sharing: an empirical study"],"prefix":"10.1108","volume":"67","author":[{"given":"Yu-Wei","family":"Chang","sequence":"first","affiliation":[]},{"given":"Ping-Yu","family":"Hsu","sequence":"additional","affiliation":[]},{"given":"Wen-Lung","family":"Shiau","sequence":"additional","affiliation":[]},{"given":"Ronghua","family":"Yi","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2020122023205585100_b1","doi-asserted-by":"crossref","unstructured":"Amayah, A.T. (2013), \u201cDeterminants of knowledge sharing in a public sector organization\u201d, Journal of Knowledge Management , Vol. 17 No. 3, pp. 454-471.","DOI":"10.1108\/JKM-11-2012-0369"},{"key":"key2020122023205585100_b2","doi-asserted-by":"crossref","unstructured":"Ba, S. , Statlaert, J. and Whinston, A.B. (2001), \u201cResearch commentary: introducing a third dimension in information systems design\u2013the case for incentive alignment\u201d, Information Systems Research , Vol. 12 No. 3, pp. 225-239.","DOI":"10.1287\/isre.12.3.225.9712"},{"key":"key2020122023205585100_b3","unstructured":"Babcock, P. (2004), \u201cShedding light on knowledge management\u201d, HR Magazine , Vol. 49 No. 5, pp. 46-50."},{"key":"key2020122023205585100_b4","doi-asserted-by":"crossref","unstructured":"Bandura, A. (1977), \u201cSelf-efficacy: toward a unifying theory of behavioral change\u201d, Psychological Review , Vol. 84 No. 2, pp. 191-215.","DOI":"10.1037\/0033-295X.84.2.191"},{"key":"key2020122023205585100_b5","unstructured":"Bandura, A. (1986), Social Foundations of Thought and Action: A Social Cognitive Theory , Prentice Hall, Upper Saddle River, NJ."},{"key":"key2020122023205585100_b6","doi-asserted-by":"crossref","unstructured":"Bandura, A. , Freeman, W.H. and Lightsey, R. (1999), \u201cSelf-efficacy: the exercise of control\u201d, Journal of Cognitive Psychotherapy , Vol. 13 No. 2, pp. 158-166.","DOI":"10.1891\/0889-8391.13.2.158"},{"key":"key2020122023205585100_b7","unstructured":"Blau, P.M. (1964), Exchange and Power in Social Life , Transaction Publishers, New Brunswick, NJ."},{"key":"key2020122023205585100_b8","doi-asserted-by":"crossref","unstructured":"Bock, G.W. and Kim, Y.G. (2002), \u201cBreaking the myths of rewards: an exploratory study of attitudes about knowledge sharing\u201d, Information Resources Management Journal , Vol. 15 No. 2, pp. 14-21.","DOI":"10.4018\/irmj.2002040102"},{"key":"key2020122023205585100_b9","doi-asserted-by":"crossref","unstructured":"Bock, G.W. , Zmud, R.W. and Kim, Y.G. (2005), \u201cBehavioral intention formation in knowledge sharing: examining the roles of extrinsic motivators, social-psychological forces, and organizational climate\u201d, MIS Quarterly , Vol. 29 No. 1, pp. 87-111.","DOI":"10.2307\/25148669"},{"key":"key2020122023205585100_b10","unstructured":"Bowersox, D.J. , Closs, D.J. and Stank, T.P. (1999), 21st Century Logistics: Making Supply Chain Integration a Reality , Council of Logistics Management, Oak Brook, IL."},{"key":"key2020122023205585100_b11","doi-asserted-by":"crossref","unstructured":"Brass, D.J. and Burkhardt, M.E. (1993), \u201cPotential power and power use: an investigation of structure and behavior\u201d, Academy of Management Journal , Vol. 36 No. 3, pp. 441-470.","DOI":"10.2307\/256588"},{"key":"key2020122023205585100_b12","unstructured":"Brown, J.R. , Lusch, R.F. and Muehling, D.D. (1983), \u201cConflict and power-dependence relations in retailer-supplier channels\u201d, Journal of Retailing , Vol. 59 No. 4, pp. 53-80."},{"key":"key2020122023205585100_b13","doi-asserted-by":"crossref","unstructured":"Brown, J.R. , Lusch, R.F. and Nicholson, C.Y. (1995), \u201cPower and relationship commitment: their impact on marketing channel member performance\u201d, Journal of Retailing , Vol. 71 No. 4, pp. 363-392.","DOI":"10.1016\/0022-4359(95)90019-5"},{"key":"key2020122023205585100_b14","unstructured":"Butler, G. (1998), \u201cBook review (Self-efficacy:The Exercise of Control, by Albert Bandura)\u201d, British Journal of Clinical Psychology , Vol. 37 No. 4, pp. 467-473."},{"key":"key2020122023205585100_b15","doi-asserted-by":"crossref","unstructured":"Casimir, G. , Ng, Y.N.K. and Chen, C.L.P. (2012), \u201cUsing IT to share knowledge and the TRA\u201d, Journal of Knowledge Management , Vol. 16 No. 3, pp. 461-479.","DOI":"10.1108\/13673271211238779"},{"key":"key2020122023205585100_b16","doi-asserted-by":"crossref","unstructured":"Chai, S. , Das, S. and Rao, R. (2011), \u201cFactors affecting blogger\u2019s knowledge sharing: an investigation across gender\u201d, Journal of Management Information Systems , Vol. 28 No. 3, pp. 309-342.","DOI":"10.2753\/MIS0742-1222280309"},{"key":"key2020122023205585100_b17","doi-asserted-by":"crossref","unstructured":"Chang, Y.W. , Hsu, P.Y. , Shiau, W.L. and Tsai, C.C. (2014), \u201cKnowledge sharing intention in the United States and China: a cross-cultural study\u201d, European Journal of Information Systems , Vol. 24, pp. 262-277.","DOI":"10.1057\/ejis.2014.28"},{"key":"key2020122023205585100_b502","unstructured":"Chin, W.W. (1998), \u201cThe partial least squares approach for structural equation modeling\u201d, in Marcoulides, G.A. (Ed.), Modern Methods for Business Research , Lawrence Erlbaum, London, pp. 295-336."},{"key":"key2020122023205585100_b19","doi-asserted-by":"crossref","unstructured":"Chwelos, P. , Benbasat, I. and Dexter, A.S. (2001), \u201cResearch report: empirical test of an EDI adoption model\u201d, Information Systems Research , Vol. 12 No. 3, pp. 304-321.","DOI":"10.1287\/isre.12.3.304.9708"},{"key":"key2020122023205585100_b20","doi-asserted-by":"crossref","unstructured":"Coleman, J.S. (1988), \u201cSocial capital in the creation of human capital\u201d, American Journal of Sociology , Vol. 94 No. 6, pp. 95-120.","DOI":"10.1086\/228943"},{"key":"key2020122023205585100_b23","doi-asserted-by":"crossref","unstructured":"Compeau, D. , Higgins, C.A. and Huff, S. (1999), \u201cSocial cognitive theory and individual reactions to computing technology: a longitudinal study\u201d, MIS Quarterly , Vol. 23 No. 2, pp. 145-158.","DOI":"10.2307\/249749"},{"key":"key2020122023205585100_b21","doi-asserted-by":"crossref","unstructured":"Compeau, D.R. and Higgins, C.A. (1995a), \u201cApplication of social cognitive theory to training for computer skills\u201d, Information Systems Research , Vol. 6 No. 2, pp. 118-143.","DOI":"10.1287\/isre.6.2.118"},{"key":"key2020122023205585100_b22","doi-asserted-by":"crossref","unstructured":"Compeau, D.R. and Higgins, C.A. (1995b), \u201cComputer self-efficacy: development of a measure and initial test\u201d, MIS Quarterly , Vol. 19 No. 2, pp. 189-211.","DOI":"10.2307\/249688"},{"key":"key2020122023205585100_b24","doi-asserted-by":"crossref","unstructured":"Constant, D. , Kiesler, S. and Sproull, L. (1994), \u201cWhat\u2019s mine is ours, or is it? A study of attitudes about information sharing\u201d, Information Systems Research , Vol. 5 No. 4, pp. 400-421.","DOI":"10.1287\/isre.5.4.400"},{"key":"key2020122023205585100_b25","doi-asserted-by":"crossref","unstructured":"Constant, D. , Sproull, L. and Kiesler, S. (1996), \u201cThe kindness of strangers: the usefulness of electronic weak ties for technical advice\u201d, Organization Science , Vol. 7 No. 2, pp. 119-135.","DOI":"10.1287\/orsc.7.2.119"},{"key":"key2020122023205585100_b26","doi-asserted-by":"crossref","unstructured":"Crook, C.W. and Kumar, R.L. (1998), \u201cElectronic data interchange: a multi-industry investigation using grounded theory\u201d, Information & Management , Vol. 34 No. 2, pp. 75-89.","DOI":"10.1016\/S0378-7206(98)00040-8"},{"key":"key2020122023205585100_b27","doi-asserted-by":"crossref","unstructured":"Deci, E.L. and Ryan, R.M. (1985), Intrinsic Motivation and Self-Determination in Human Behavior , Plenum, New York, NY.","DOI":"10.1007\/978-1-4899-2271-7"},{"key":"key2020122023205585100_b28","doi-asserted-by":"crossref","unstructured":"Deci, E.L. and Ryan, R.M. (1987), \u201cThe support of autonomy and the control of behavior\u201d, Journal of Personality and Social Psychology , Vol. 53 No. 6, pp. 1024-1037.","DOI":"10.1037\/0022-3514.53.6.1024"},{"key":"key2020122023205585100_b29","unstructured":"Donath, J.S. (1999), \u201cIdentity and deception in the virtual community\u201d, in Smith, M.A. and Kollock, P. (Eds), Communities in Cyberspace , Routledge, New York, NY, pp. 29-59."},{"key":"key2020122023205585100_b30","unstructured":"Drea, J.T. , Bruner, G.C. and Hensel, P.J. (1993), \u201cScaling and measurement: comparing alternative measures of the French and Raven power bases\u201d, Journal of Personal Selling and Sales Management , Vol. 13 No. 4, pp. 73-80."},{"key":"key2020122023205585100_b31","unstructured":"Emerson, R.M. (1972a), \u201cExchange theory, part I: a psychological basis for social exchange\u201d, in Berger, J. , Zelditc, M.J.R. and Anderson, B. (Eds), Sociological Theories in Progress , (2), Houghton-Mifflin, Boston, MA, pp. 38-57."},{"key":"key2020122023205585100_b32","unstructured":"Emerson, R.M. (1972b), \u201cExchange theory, part II: exchange relations and networks\u201d, in Berger, J. , Zelditc, M.J.R. and Anderson, B. (Eds), Sociological Theories in Progress , (2), Houghton-Mifflin, Boston, MA, pp. 58-87."},{"key":"key2020122023205585100_b33","unstructured":"Fagan, M.H. , Neill, S. and Wooldridge, B.R. (2008), \u201cExploring the intention to use computers: an empirical investigation of the role of intrinsic motivation, extrinsic motivation, and perceived ease of use\u201d, Journal of Computer Information Systems , Vol. 48 No. 3, pp. 31-37."},{"key":"key2020122023205585100_b34","doi-asserted-by":"crossref","unstructured":"Flynn, B.B. , Zhao, X. , Huo, B. and Yeung, J.H.Y. (2008), \u201cWe\u2019ve got the power! How customer power affects supply chain relationships\u201d, Business Horizons , Vol. 51 No. 3, pp. 169-174.","DOI":"10.1016\/j.bushor.2008.01.009"},{"key":"key2020122023205585100_b35","doi-asserted-by":"crossref","unstructured":"Fornell, C. and Larcker, D.F. (1981), \u201cEvaluating structural equations with unobservable variables and measurement error\u201d, Journal of Marketing Research , Vol. 18 No. 1, pp. 39-50.","DOI":"10.1177\/002224378101800104"},{"key":"key2020122023205585100_b36","unstructured":"French, R.P. and Raven, B.H. (1959), \u201cThe bases of social power\u201d, in Cartwright, D. and Arbor, A. (Eds), Social Power , University of Michigan Press, Ann Arbor, MI, pp. 155-164."},{"key":"key2020122023205585100_b37","doi-asserted-by":"crossref","unstructured":"Frohlich, M.T. and Westbrook, R. (2001), \u201cArcs of integration: an international study of supply chain strategies\u201d, Journal of Operations Management , Vol. 19 No. 2, pp. 185-200.","DOI":"10.1016\/S0272-6963(00)00055-3"},{"key":"key2020122023205585100_b38","doi-asserted-by":"crossref","unstructured":"Gist, M.E. , Schwoerer, C.E. and Rosen, B. (1989), \u201cEffects of alternative training methods on self-efficacy and performance in computer software training\u201d, Journal of Applied Psychology , Vol. 74 No. 6, pp. 884-891.","DOI":"10.1037\/0021-9010.74.6.884"},{"key":"key2020122023205585100_b39","doi-asserted-by":"crossref","unstructured":"Gomez-Mejia, L.R. and Balkin, D.B. (1990), \u201cRethinking rewards for technical employees\u201d, Organizational Dynamics , Vol. 18 No. 4, pp. 62-76.","DOI":"10.1016\/0090-2616(90)90057-V"},{"key":"key2020122023205585100_b40","doi-asserted-by":"crossref","unstructured":"Goodman, L.E. and Dion, P.A. (2001), \u201cThe determinants of commitment in the distributor-manufacturer relationship\u201d, Industrial Marketing Management , Vol. 30 No. 3, pp. 287-300.","DOI":"10.1016\/S0019-8501(99)00092-9"},{"key":"key2020122023205585100_b41","doi-asserted-by":"crossref","unstructured":"Grover, V. (1993), \u201cAn empirically derived model for the adoption of customer-based interorganizational systems\u201d, Decision Sciences , Vol. 24 No. 3, pp. 603-640.","DOI":"10.1111\/j.1540-5915.1993.tb01295.x"},{"key":"key2020122023205585100_b42","unstructured":"Hall, H. (2001), \u201cSocial exchange for knowledge exchange\u201d, in Hall, H. (Ed.), Managing Knowledge: Conversations and Critiques , University of Leicester Management Centre, pp. 1-23."},{"key":"key2020122023205585100_b43","unstructured":"Harman, H.H. (1976), Modern Factor Analysis , University of Chicago Press, Chicago, NY."},{"key":"key2020122023205585100_b44","unstructured":"Hill, T. , Smith, N.D. and Mann, M.F. (1986), \u201cCommunicating innovations: convincing computer phobics to adopt innovative technologies\u201d, Advances in Consumer Research , Vol. 13 No. 1, pp. 419-422."},{"key":"key2020122023205585100_b45","doi-asserted-by":"crossref","unstructured":"Hill, T. , Smith, N.D. and Mann, M.F. (1987), \u201cRole of efficacy expectations in predicting the decision to use advanced technologies: the case of computers\u201d, Journal of Applied Psychology , Vol. 72 No. 2, pp. 307-313.","DOI":"10.1037\/0021-9010.72.2.307"},{"key":"key2020122023205585100_b46","doi-asserted-by":"crossref","unstructured":"Hinkin, T.R. and Schriesheim, C.A. (1990), \u201cRelationships between subordinate perceptions of supervisor influence tactics and attributed bases of supervisory power\u201d, Human Relations , Vol. 43 No. 3, pp. 221-237.","DOI":"10.1177\/001872679004300302"},{"key":"key2020122023205585100_b47","doi-asserted-by":"crossref","unstructured":"Hinkin, T.R. and Schriesheim, C.A. (1994), \u201cAn examination of subordinate-perceived relationships between leader reward and punishment behavior and leader bases of power\u201d, Human Relations , Vol. 47 No. 7, pp. 779-800.","DOI":"10.1177\/001872679404700702"},{"key":"key2020122023205585100_b49","doi-asserted-by":"crossref","unstructured":"Homans, G.C. (1958), \u201cSocial behavior as exchange\u201d, The American Journal of Sociology , Vol. 63 No. 6, pp. 597-606.","DOI":"10.1086\/222355"},{"key":"key2020122023205585100_b50","doi-asserted-by":"crossref","unstructured":"Hoy, W.K. (1998), \u201cBook review (Self-efficacy: The Exercise of Control, by Albert Bandura)\u201d, Educational Administration Quarterly , Vol. 34 No. 1, pp. 153-158.","DOI":"10.1177\/0013161X98034001010"},{"key":"key2020122023205585100_b48","doi-asserted-by":"crossref","unstructured":"Hsu, C.L. and Lin, J.C.C. (2008), \u201cAcceptance of blog usage: the roles of technology acceptance, social influence and knowledge sharing motivation\u201d, Information & Management , Vol. 45 No. 1, pp. 65-74.","DOI":"10.1016\/j.im.2007.11.001"},{"key":"key2020122023205585100_b501","doi-asserted-by":"crossref","unstructured":"Huang, Q. , Davison, R.M. and Gu, J. (2008), \u201cImpact of personal and cultural factors on knowledge sharing in China\u201d, Asia Pacific Journal of Management , Vol. 25 No. 3, pp. 451-471.","DOI":"10.1007\/s10490-008-9095-2"},{"key":"key2020122023205585100_b51","doi-asserted-by":"crossref","unstructured":"Huber, G.P. (2001), \u201cTransfer of knowledge in knowledge management systems: unexplored issues and suggested studies\u201d, European Journal of Information Systems , Vol. 10 No. 2, pp. 72-79.","DOI":"10.1057\/palgrave.ejis.3000399"},{"key":"key2020122023205585100_b52","doi-asserted-by":"crossref","unstructured":"Hung, S.Y. , Lai, H.M. and Chang, W.W. (2011), \u201cKnowledge-sharing motivations affecting R & D employees\u2019 acceptance of electronic knowledge repository\u201d, Behaviour & Information Technology , Vol. 30 No. 2, pp. 213-230.","DOI":"10.1080\/0144929X.2010.545146"},{"key":"key2020122023205585100_b53","doi-asserted-by":"crossref","unstructured":"Hunt, S.D. and Nevin, J.R. (1974), \u201cPower in a channel of distribution: sources and consequences\u201d, Journal of Marketing Research , Vol. 11 No. 2, pp. 186-193.","DOI":"10.1177\/002224377401100210"},{"key":"key2020122023205585100_b54","doi-asserted-by":"crossref","unstructured":"Iacovou, C.L. , Benbasat, I. and Dexter, A.S. (1995), \u201cElectronic data interchange and small organizations: adoption and impact of technology\u201d, MIS Quarterly , Vol. 19 No. 4, pp. 465-485.","DOI":"10.2307\/249629"},{"key":"key2020122023205585100_b55","doi-asserted-by":"crossref","unstructured":"Igbaria, M. and Iivari, J. (1995), \u201cThe effects of self-efficacy on computer usage\u201d, Omega , Vol. 23 No. 6, pp. 587-605.","DOI":"10.1016\/0305-0483(95)00035-6"},{"key":"key2020122023205585100_b56","doi-asserted-by":"crossref","unstructured":"Jauch, L.R. (1976), \u201cTailoring incentives to fit researchers\u201d, Research Management , Vol. 19 No. 6, pp. 23-27.","DOI":"10.1080\/00345334.1976.11756383"},{"key":"key2020122023205585100_b57","doi-asserted-by":"crossref","unstructured":"Jeyaraj, A. , Rottman, J.W. and Lacity, M.C. (2006), \u201cA review of the predictors, linkages, and biases in IT innovation adoption research\u201d, Journal of Information Technology , Vol. 21 No. 1, pp. 1-23.","DOI":"10.1057\/palgrave.jit.2000056"},{"key":"key2020122023205585100_b58","doi-asserted-by":"crossref","unstructured":"Jonsson, P. and Zineldin, M. (2003), \u201cAchieving high satisfaction in supplier dealer working relationships\u201d, Supply Chain Management: An International Journal , Vol. 8 No. 3, pp. 224-240.","DOI":"10.1108\/13598540310484627"},{"key":"key2020122023205585100_b59","unstructured":"Kalman, M.E. (1999), \u201cThe effects of organizational commitment and expected outcomes on the motivation to share discretionary information in a collaborative database: communication dilemmas and other serious games\u201d, published PhD thesis, University of Southern California."},{"key":"key2020122023205585100_b60","doi-asserted-by":"crossref","unstructured":"Kankanhalli, A. , Tan, B.C.Y. and Wei, K.K. (2005), \u201cContributing knowledge to electronic knowledge repositories: an empirical investigation\u201d, MIS Quarterly , Vol. 29 No. 1, pp. 113-143.","DOI":"10.2307\/25148670"},{"key":"key2020122023205585100_b62","doi-asserted-by":"crossref","unstructured":"Koning, J.W. Jr (1993), \u201cThree others R\u2019s: recognition, reward and resentment\u201d, Research and Technology Management , Vol. 36 No. 4, pp. 19-29.","DOI":"10.1080\/08956308.1993.11670911"},{"key":"key2020122023205585100_b63","unstructured":"KPMG Knowledge Advisory Services (2003), \u201cInsights from KPMG\u2019s European knowledge management survey 2002\/2003\u201d, available at: http:\/\/ep2010.salzburgresearch.at\/knowledge_base\/kpmg_2003.pdf (accessed May 11, 2014)."},{"key":"key2020122023205585100_b64","doi-asserted-by":"crossref","unstructured":"Kuan, K.Y. and Chau, P.Y.K. (2001), \u201cA perception-based model for EDI adoption in small businesses using a technology-organization-environment framework\u201d, Information & Management , Vol. 38 No. 8, pp. 507-521.","DOI":"10.1016\/S0378-7206(01)00073-8"},{"key":"key2020122023205585100_b66","doi-asserted-by":"crossref","unstructured":"Liao, C.C. , To, P.L. and Hsu, F.C. (2013), \u201cExploring knowledge sharing in virtual communities\u201d, Online Information Review , Vol. 37 No. 6, pp. 891-909.","DOI":"10.1108\/OIR-11-2012-0196"},{"key":"key2020122023205585100_b65","doi-asserted-by":"crossref","unstructured":"Liao, L.F. (2008), \u201cKnowledge-sharing in R & D departments: a social power and social exchange theory perspective\u201d, The International Journal of Human Resource Management , Vol. 19 No. 10, pp. 1881-1895.","DOI":"10.1080\/09585190802324072"},{"key":"key2020122023205585100_b67","doi-asserted-by":"crossref","unstructured":"Lin, H.F. (2007), \u201cEffects of extrinsic and intrinsic motivation on employee knowledge sharing intentions\u201d, Journal of Information Science , Vol. 33 No. 2, pp. 135-149.","DOI":"10.1177\/0165551506068174"},{"key":"key2020122023205585100_b68","doi-asserted-by":"crossref","unstructured":"Lin, N. (1986), \u201cConceptualizing social support\u201d, in Lin, N. , Dean, A. and Ensel, W. (Eds), Social Support, Life Events, and Depression , Academic Press, Orlando, FL, pp. 17-30.","DOI":"10.1016\/B978-0-12-450660-2.50008-2"},{"key":"key2020122023205585100_b69","unstructured":"Lin, N. (1999), \u201cBuilding a network theory of social capital\u201d, Connections , Vol. 22 No. 1, pp. 28-51."},{"key":"key2020122023205585100_b70","doi-asserted-by":"crossref","unstructured":"Lin, N. (2000), \u201cInequality in social capital\u201d, Contemporary Sociology , Vol. 29, pp. 785-795.","DOI":"10.2307\/2654086"},{"key":"key2020122023205585100_b71","unstructured":"Locke, E.A. (1997), \u201cBook review (Self-Efficacy: The Exercise Of Control, by Albert Bandura)\u201d, Personnel Psychology , Vol. 50 No. 3, pp. 737-746."},{"key":"key2020122023205585100_b72","unstructured":"Luthans, F. (2003), \u201cPositive organizational behavior: developing and managing psychological strengths\u201d, Academy of Management Executive , Vol. 16 No. 1, pp. 57-75."},{"key":"key2020122023205585100_b73","doi-asserted-by":"crossref","unstructured":"Maddux, J.E. (1998), \u201cWhy the little blue engine could: self-efficacy and the real power of positive thinking\u201d, Contemporary Psychology: APA Review of Books , Vol. 43 No. 9, pp. 601-602.","DOI":"10.1037\/001749"},{"key":"key2020122023205585100_b74","unstructured":"Malhotra, Y. and Galletta, D.F. (1999), \u201cExtending the technology acceptance model to account for social influence: theoretical bases and empirical validation\u201d, Proceedings of the 32nd Hawaii International Conference on System Science, IEEE Computer Society Press, Hawaii."},{"key":"key2020122023205585100_b75","unstructured":"Maloni, M. and Benton, W.C. (2000), \u201cPower influences in the supply chain\u201d, Journal of Business Logistics , Vol. 21 No. 1, pp. 49-73."},{"key":"key2020122023205585100_b76","doi-asserted-by":"crossref","unstructured":"Martocchio, J.J. (1992), \u201cMicrocomputer usage as opportunity: the influence of context in employee training\u201d, Personnel Psychology , Vol. 45 No. 3, pp. 529-551.","DOI":"10.1111\/j.1744-6570.1992.tb00859.x"},{"key":"key2020122023205585100_b77","doi-asserted-by":"crossref","unstructured":"Mattila, A.S. and Enz, C.A. (2002), \u201cThe role of emotions in service encounters\u201d, Journal of Service Research , Vol. 4 No. 4, pp. 268-277.","DOI":"10.1177\/1094670502004004004"},{"key":"key2020122023205585100_b78","doi-asserted-by":"crossref","unstructured":"Mechanic, D. (1962), \u201cSources of power of lower participants in complex organizations\u201d, Administrative Science Quarterly , Vol. 7 No. 3, pp. 349-364.","DOI":"10.2307\/2390947"},{"key":"key2020122023205585100_b79","doi-asserted-by":"crossref","unstructured":"Moon, J.W. and Kim, Y.G. (2001), \u201cExtending the TAM for a world-wide-web context\u201d, Information & Management , Vol. 38 No. 4, pp. 217-230.","DOI":"10.1016\/S0378-7206(00)00061-6"},{"key":"key2020122023205585100_b80","doi-asserted-by":"crossref","unstructured":"Naylor, J.B. , Naim, M.M. and Berry, D. (1999), \u201cLeagility: integrating the lean and agile manufacturing paradigms in the total supply chain\u201d, International Journal of Production Economics , Vol. 62 No. 1, pp. 107-118.","DOI":"10.1016\/S0925-5273(98)00223-0"},{"key":"key2020122023205585100_b81","doi-asserted-by":"crossref","unstructured":"Osterloh, M. and Frey, B. (2000), \u201cMotivation, knowledge, transfer, and organizational forms\u201d, Organization Science , Vol. 11 No. 5, pp. 538-50.","DOI":"10.1287\/orsc.11.5.538.15204"},{"key":"key2020122023205585100_b82","doi-asserted-by":"crossref","unstructured":"Park, J.H. , Gu, B. , Leung, A.C.M. and Konana, P. (2014), \u201cAn investigation of information sharing and seeking behaviors in online investment communities\u201d, Computers in Human Behavior , Vol. 31 No. 1, pp. 1-12.","DOI":"10.1016\/j.chb.2013.10.002"},{"key":"key2020122023205585100_b83","doi-asserted-by":"crossref","unstructured":"Pavlou, P.A. (2002), \u201cInstitution-based trust in interorganizational exchange relationships: the role of online B2B marketplaces on trust formation\u201d, Journal of Strategic Information Systems , Vol. 11 No. 3, pp. 215-243.","DOI":"10.1016\/S0963-8687(02)00017-3"},{"key":"key2020122023205585100_b84","unstructured":"Pee, L. , Kankanhalli, A. , Ong, L. and Vu, M. (2010), \u201cAntecedents, and impact of knowledge management capability in public organizations\u201d, Pacific Asia Conference on Information Systems, Taipei, pp. 713-724."},{"key":"key2020122023205585100_b85","doi-asserted-by":"crossref","unstructured":"Pfeffer, J. (1992), \u201cUnderstanding power in organizations\u201d, California Management Review , Vol. 34 No. 2, pp. 29-50.","DOI":"10.2307\/41166692"},{"key":"key2020122023205585100_b86","doi-asserted-by":"crossref","unstructured":"Pi, S.M. , Chou, C.H. and Liao, H.L. (2013), \u201cA study of Facebook groups members\u2019 knowledge sharing\u201d, Computers in Human Behavior , Vol. 29 No. 5, pp. 1971-1979.","DOI":"10.1016\/j.chb.2013.04.019"},{"key":"key2020122023205585100_b87","unstructured":"PRWeb (2013), \u201cGlobal knowledge management market revenues to exceed $157 billion by 2012, according to a new report by global industry analysts Inc.\u201d, available at: www.prweb.com\/releases\/knowledge\/management\/prweb1553554.htm (accessed May 11, 2014)."},{"key":"key2020122023205585100_b88","doi-asserted-by":"crossref","unstructured":"Rahim, M.A. (1989), \u201cRelationships of leader power to compliance and satisfaction with supervision: evidence from a national sample of managers\u201d, Journal of Management , Vol. 15 No. 4, pp. 545-556.","DOI":"10.1177\/014920638901500404"},{"key":"key2020122023205585100_b89","doi-asserted-by":"crossref","unstructured":"Ramaseshan, B. , Yip, L.S.C. and Pae, J.H. (2006), \u201cPower, satisfaction, and relationship commitment in Chinese store-tenant relationship and their impact on performance\u201d, Journal of Retailing , Vol. 82 No. 1, pp. 63-70.","DOI":"10.1016\/j.jretai.2005.11.004"},{"key":"key2020122023205585100_b90","doi-asserted-by":"crossref","unstructured":"Rezaboklah, B. , Bornemann, D. , Hansen, U. and Schrader, U. (2006), \u201cConsumer power: a comparison of the old economy and the internet economy\u201d, Journal of Consumer Policy , Vol. 29 No. 1, pp. 3-36.","DOI":"10.1007\/s10603-005-3307-7"},{"key":"key2020122023205585100_b91","doi-asserted-by":"crossref","unstructured":"Rotter, J.B. (1954), Social Learning and Clinical Psychology , Prentice-Hall, Englewood Cliffs, NJ.","DOI":"10.1037\/10788-000"},{"key":"key2020122023205585100_b92","doi-asserted-by":"crossref","unstructured":"Ryan, R.M. and Deci, E.L. (2000), \u201cSelf-determination theory and the facilitation of intrinsic motivation, social development, and well-being\u201d, American Psychologist , Vol. 55 No. 1, pp. 68-78.","DOI":"10.1037\/0003-066X.55.1.68"},{"key":"key2020122023205585100_b93","doi-asserted-by":"crossref","unstructured":"Sharma, S. , Durand, R.M. and Gur Arie, O. (1981), \u201cIdentification and analysis of moderator variables\u201d, Journal of Marketing Research , Vol. 18 No. 3, pp. 291-300.","DOI":"10.1177\/002224378101800303"},{"key":"key2020122023205585100_b94","doi-asserted-by":"crossref","unstructured":"Stone, E.F. and Hollenbeck, J.R. (1984), \u201cSome issues associated with the use of moderated regression\u201d, Organizational Behavior and Human Performance , Vol. 34 No. 84, pp. 195-213.","DOI":"10.1016\/0030-5073(84)90003-5"},{"key":"key2020122023205585100_b95","doi-asserted-by":"crossref","unstructured":"Taylor, S. and Todd, P.A. (1995), \u201cUnderstanding information technology usage: a test of competing models\u201d, Information Systems Research , Vol. 6 No. 2, pp. 144-176.","DOI":"10.1287\/isre.6.2.144"},{"key":"key2020122023205585100_b96","unstructured":"Thibaut, J.W. and Kelley, H. (1959), The Social Psychology of Groups , Wiley, New York, NY."},{"key":"key2020122023205585100_b97","unstructured":"Vrugt, A. (1998), \u201cBook review (Self-Efficacy: The Exercise Of Control, by Albert Bandura)\u201d, International Journal of Selection and Assessment , Vol. 6 No. 2, pp. 131-136."},{"key":"key2020122023205585100_b98","doi-asserted-by":"crossref","unstructured":"Wang, Y. and Ahmed, P.K. (2009), \u201cThe moderating effect of the business strategic orientation on ecommerce adoption: evidence from UK family run SMEs\u201d, Journal of Strategic Information Systems , Vol. 18 No. 1, pp. 16-30.","DOI":"10.1016\/j.jsis.2008.11.001"},{"key":"key2020122023205585100_b99","doi-asserted-by":"crossref","unstructured":"Wasko, M.M. and Faraj, S. (2005), \u201cWhy should I share? Examining social capital and knowledge contribution in electronic networks of practice\u201d, MIS Quarterly , Vol. 29 No. 1, pp. 35-57.","DOI":"10.2307\/25148667"},{"key":"key2020122023205585100_b100","doi-asserted-by":"crossref","unstructured":"Webster, J. and Martocchio, J.J. (1993), \u201cTurning work into play: implications for microcomputer software training\u201d, Journal of Management , Vol. 19 No. 1, pp. 127-146.","DOI":"10.1177\/014920639301900109"},{"key":"key2020122023205585100_b101","unstructured":"Yoo, Y. and Torrey, B. (2002), \u201cNational culture and knowledge management in a global learning organization\u201d, in Choo, C.W. and Bontis, N. (Eds), The Strategic Management of Intellectual Capital and Organizational Knowledge , Oxford University Press, Oxford, NY, pp. 421-434."},{"key":"key2020122023205585100_b102","doi-asserted-by":"crossref","unstructured":"Yukl, G. and Falbe, C.M. (1991), \u201cImportance of different power sources in downward and lateral relations\u201d, Journal of Applied Psychology , Vol. 76 No. 3, pp. 416-423.","DOI":"10.1037\/0021-9010.76.3.416"},{"key":"key2020122023205585100_b103","doi-asserted-by":"crossref","unstructured":"Zhao, X. , Huo, B. , Flynn, B.B. and Yeung, J.H.Y. (2008), \u201cThe impact of power and relationship commitment on the integration between manufacturers and customers in a supply chain\u201d, Journal of Operations Management , Vol. 26 No. 3, pp. 368-388.","DOI":"10.1016\/j.jom.2007.08.002"}],"container-title":["Aslib Journal of Information Management"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/AJIM-02-2015-0028","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/AJIM-02-2015-0028\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/AJIM-02-2015-0028\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,14]],"date-time":"2023-08-14T05:59:50Z","timestamp":1691992790000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/AJIM-02-2015-0028\/full\/html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,9,21]]},"references-count":103,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2015,9,21]]}},"alternative-id":["10.1108\/AJIM-02-2015-0028"],"URL":"https:\/\/doi.org\/10.1108\/ajim-02-2015-0028","relation":{},"ISSN":["2050-3806"],"issn-type":[{"value":"2050-3806","type":"print"}],"subject":[],"published":{"date-parts":[[2015,9,21]]}}}