Information security - Professional perceptions of knowledge-sharing intention under self-efficacy, trust, reciprocity, and shared-language

Published on Oct 1, 2013in Computer Education
· DOI :10.1016/J.COMPEDU.2013.05.010
Alireza Tamjidyamcholo5
Estimated H-index: 5
(Information Technology University),
Mohd Sapiyan Baba7
Estimated H-index: 7
(Information Technology University)
+ 1 AuthorsRahmatollah Gholipour5
Estimated H-index: 5
(UT: University of Tehran)
Knowledge sharing is an important component of knowledge management systems. Security knowledge sharing substantially reduces risk and investment in information security. Despite the importance of information security, little research based on knowledge sharing has focused on the security profession. Therefore, this study analyses key factors, containing attitude, self-efficacy, trust, norm of reciprocity, and shared language, in respect of the information security workers intention to share knowledge. Information security professionals in virtual communities, including the Information Security Professional Association (ISPA), Information Systems Security Association (ISSA), Society of Information Risk Analysts (SIRA), and LinkedIn security groups, were surveyed to test the proposed research model. Confirmatory factor analysis (CFA) and the structural equation modelling (SEM) technique were used to analyse the data and evaluate the research model. The results showed that the research model fit the data well and the structural model suggests a strong relationship between attitude, trust, and norms of reciprocity to knowledge sharing intention. Hypotheses regarding the influence of self-efficacy and reciprocity, to knowledge sharing attitude were upheld. Shared language did not influence either the attitude or intention to share knowledge. We model six factors which influence security workers knowledge sharing intention.Effect of attitude, trust, reciprocity to knowledge sharing intention were upheld.Self-efficacy and reciprocity had influence on knowledge sharing attitude.Shared language affected neither intention nor attitude to share knowledge.
📖 Papers frequently viewed together
3 Authors (Chao-Min Chiu, ..., Eric T. G. Wang)
2,130 Citations
2,054 Citations
3,359 Citations
This study aimed to explore the relationship between knowledge sharing intentions and the perceptions of individual technology users who are members of virtual communities. We characterized learners' perceptions of new technological products or services by including both an individual's psychological state of readiness to accept technology and also compatibility as factors affecting technology acceptance. By adopting virtual communities as samples for this empirical study, the Technology Accepta...
71 CitationsSource
#1Robert E. Crossler (MSU: Mississippi State University)H-Index: 15
#2Allen C. Johnston (UAB: University of Alabama at Birmingham)H-Index: 18
Last. Richard L. Baskerville (GSU: Georgia State University)H-Index: 68
view all 6 authors...
Information Security (InfoSec) research is far reaching and includes many approaches to deal with protecting and mitigating threats to the information assets and technical resources available within computer based systems. Although a predominant weakness in properly securing information assets is the individual user within an organization, much of the focus of extant security research is on technical issues. The purpose of this paper is to highlight future directions for Behavioral InfoSec resea...
388 CitationsSource
#1Young Ae Kim (KAIST)H-Index: 8
#2Muhammad Aurangzeb Ahmad (UMN: University of Minnesota)H-Index: 13
With the proliferation of online communities, the deployment of knowledge, skills, experiences and user generated content are generally facilitated among participant users. In online social media-sharing communities, the success of social interactions for content sharing and dissemination among completely unknown users depends on 'trust'. Therefore, providing a satisfactory trust model to evaluate the quality of content and to recommend personalized trustworthy content providers is vital for a s...
75 CitationsSource
#1Yuh-Jen Chen (NKFUST: National Kaohsiung First University of Science and Technology)H-Index: 1
#2Yuh-Min Chen (NCKU: National Cheng Kung University)H-Index: 24
Capable of providing an interactive platform for enterprise experts to create and share empirical knowledge cooperatively, professional virtual communities have arisen from the pervasive use of the Internet. This circumstance incurs an overload of information and overflow of spam messages, accounting for high-volume low-quality knowledge in virtual communities. Therefore, providing valid knowledge decision support in order to assist community members to accurately predict and supply required emp...
17 CitationsSource
Aug 20, 2012 in ARES (Availability, Reliability and Security)
#1Daniel Feledi (TU Wien: Vienna University of Technology)H-Index: 2
#2Stefan Fenz (TU Wien: Vienna University of Technology)H-Index: 20
Nowadays information systems play a vital role for organizations and individuals, which is why their protection is becoming increasingly important. Often, solutions are developed for very similar problems over and over again. An exchange of knowledge between experts would be desirable in order to prevent developing always the same solutions by independent persons. Such an exchange could also lead to solutions of higher quality, as existing approaches could be advanced, instead of always reinvent...
14 CitationsSource
#1Shiuann-Shuoh Chen (NCU: National Central University)H-Index: 1
#2Yu-Wei Chuang (NCU: National Central University)H-Index: 1
Last. Pei-Yi Chen (NCU: National Central University)H-Index: 1
view all 3 authors...
Firms can obtain competitive advantages from their employees' knowledge sharing behaviors. This paper presents a research model to examine the direct and indirect effects of knowledge management systems (KMS) quality, KMS self-efficacy, organizational climate and attitude on the intention to share knowledge in the new product development process. The hypotheses are tested on data collected from 134 major electronic manufacturing firms in Taiwan, using partial least squares regression. The result...
123 CitationsSource
#1Samuel Kai Wah Chu (HKU: University of Hong Kong)H-Index: 25
#2Carol K. K. Chan (HKU: University of Hong Kong)H-Index: 27
Last. Agnes Tiwari (HKU: University of Hong Kong)H-Index: 25
view all 3 authors...
Blogging has been recommended as a suitable tool for learning during internship due to its associated usefulness in collaborative learning, reflection, communication, and social support. In this study, blogging was incorporated into the internship activities of two discipline-specific groups of interns: information management (n?=?53) and nursing (n?=?28). In examining the behavior, perceptions and processes of blogging among interns from the two disciplines, a mixed-methods design was used to o...
108 CitationsSource
#1Kiyana Zolfaghar (KNTU: K.N.Toosi University of Technology)H-Index: 8
#2Abdollah Aghaie (KNTU: K.N.Toosi University of Technology)H-Index: 12
Studying the social phenomena within computer science and web environment, demands more attention in recent years. In this regard, trust is a crucial basis for social interactions among users in online environment specifically social web applications in which user participation is the primary driver of value. Predicting unknown trust relationship between users is a problem addressed in this paper, using data mining and classification approach. Achieving this, we provide a framework of social tru...
49 CitationsSource
#1Tung-Ching Lin (NSYSU: National Sun Yat-sen University)H-Index: 23
#2Sheng Wu (NTU: National Taiwan University)H-Index: 27
Last. Chun-Tai Lu (NSYSU: National Sun Yat-sen University)H-Index: 1
view all 3 authors...
With a view to achieve the ultimate goal of a permanent development, operation, and growth, to any business and enterprise, the strategy of knowledge management must be reinforced, and the sooner the better. In despite of those new and high interests shown toward the organization-embedded knowledge, not much concrete finding has been obtained regarding how and why employees are reluctant to share what they know. In our research, we proposed to base on the relations model theory to explore how di...
67 CitationsSource
Nowadays, information systems constitute a crucial part of organizations; by losing security, these organizations will lose plenty of competitive advantages as well. The core point of information security (InfoSecu) is risk management. There are a great deal of research works and standards in security risk management (ISRM) including NIST 80030 and ISO/IEC 27005. However, only few works of research focus on InfoSecu risk reduction, while the standards explain general principles and guidelines. T...
14 Citations
Cited By77
#1Adel Yazdanmehr (CUNY: City University of New York)H-Index: 3
#2Jingguo Wang (UTA: University of Texas at Arlington)H-Index: 27
Peers may help others avoid violating organisational information security policies (ISPs). This study explores how peer monitoring reduces employee ISP violation intention. We propose that peer mon...
#1Minh-Tri Ha (VNUHCM: Vietnam National University, Ho Chi Minh City)
Personal or private relationships between leaders of construction firms and government officials are critical to a firm’s market success because they provide access to valuable information that the...
Suppressing knowledge hiding is a prerequisite for achieving positive knowledge interactions among people. Most previous studies concentrate on knowledge hiding in organizations, but the quantitative examination of knowledge hiding antecedents in the online knowledge community has been limited. This study investigates individuals’ knowledge hiding intentions in the context of the online knowledge community through an integrated framework of protection motivation theory, self-determination theory...
#1Farshad ParhamniaH-Index: 1
#2Majid FarahianH-Index: 6
Last. Yusef RajabiH-Index: 1
view all 3 authors...
#1Emi Moriuchi (RIT: Rochester Institute of Technology)H-Index: 7
Self-efficacy is the most frequently examined attribute in the adoption of Information Systems (IS) security innovations. Yet, the role of self-efficacy in the adoption of IS security innovations is ambiguous. The empirical studies that examined the factor have produced mixed and inconsistent results. Through a meta-analysis of 59 extant research, the study aggregated findings of the past research that examined the effect of self-efficacy and the adoption of IS security innovations. The results ...
1 CitationsSource
#1Abdullah Almuqrin (KSU: King Saud University)
#2Ibrahim Mutambik (KSU: King Saud University)
Knowledge sharing positively and significantly improves academics' research, instruction and community service. The study of knowledge sharing in Saudi higher education is limited and offers little guidance to administrators, as well as faculty on how to capitalize on knowledge sharing and utilize it to their own and organizations' benefits. This research presents findings from an original quantitative study testing a structural equation model linking social cognitive theory to knowledge sharing...
1 CitationsSource
#1Xiaoli Wu (RUC: Renmin University of China)
#2Wenbo Kuang (RUC: Renmin University of China)
In this digital era, social media plays a significant role in information distribution. Health information sharing behavior is an essential component of information exchange, which has become one o...