DOI QR코드

DOI QR Code

지식유출 의도의 내재적 및 외재적 요인에 대한 연구: 암묵적 지식 관점에서

Internal and External Factors of Knowledge Leakage Intention: From Tacit Knowledge Perspective

  • 투고 : 2019.08.05
  • 심사 : 2019.09.16
  • 발행 : 2019.12.31

초록

In the rapidly changing business environment, knowledge has been recognized as a core asset for sustaining an organization's competitive advantage. In addition, knowledge sharing is one of the key elements of knowledge management, emphasizing external knowledge sharing beyond initial internal knowledge sharing. However, while knowledge management research emphasizes knowledge sharing, which is a positive aspect, research on preventing knowledge leakage that can have negative consequences is relatively lacking. Companies have tried to minimize the negative effects of knowledge management but many knowledge leakage accidents are still occurring. Therefore, this study aims to examine the effects of external factors based on deterrence theory and internal factors based on self-determination theory on knowledge leakage intention focusing on tacit knowledge. The results of the empirical analysis of 100 data sets collected through a scenario-based survey show that certainty of sanctions, social disapproval, and competence are found to have a significant effect on reducing tacit knowledge leakage intention. Furthermore, informal sanctions have a greater impact on tacit knowledge leakage intention than formal sanctions and external factors have a greater effect on tacit knowledge leakage intention than internal factors.

키워드

참고문헌

  1. 김문식 2013. "자기주도학습능력과 지식공유의 관계에 대한 개인의 목표지향성과 조직 특성의 조절 효과," 한국기업경영학회 (20:4), pp. 249- 271.
  2. 신가희, 곽선화 2017. "지식은폐와 지식공유의 영향 요인과 관계에 관한 연구," 지식경영연구 (18:2), pp. 129-157. https://doi.org/10.15813/kmr.2017.18.2.007
  3. 신동준 2009. "처벌의 효과: 억제이론에 대한 비판적 고찰," 형사정책 (21:2), pp. 191-216. https://doi.org/10.36999/KJC.2009.21.2.191
  4. 장용선 2010. "조직문화 유형이 지식공유에 미치는 영향 분석," 대한경영학회지 (23:5), pp. 2793-2813.
  5. 황호민, 이상곤 2019. "팀 내외의 사회적 자본이 R&D 성과에 미치는 영향: 지식공유의 매개효과," 지식경영연구 (20:3), pp. 49-71 https://doi.org/10.15813/kmr.2019.20.3.004
  6. Ahmad, A., Bosua, R., and Scheepers, R. 2014. "Protecting organizational competitive advantage: a knowledge leakage perspective," Computers & Security (42), pp. 27-39. https://doi.org/10.1016/j.cose.2014.01.001
  7. Alavi, M., and Leidner, D. E. 2001. "Knowledge management and knowledge management systems: Conceptual foundations and research issues," MIS Quarterly (25:1), pp. 107-136. https://doi.org/10.2307/3250961
  8. Alexy, O., George, G., and Salter, A. J. 2013. "Cui bono? The selective revealing of knowledge and its implications for innovative activity," Academy of Management Review (38:2), pp. 270-291. https://doi.org/10.5465/amr.2011.0193
  9. Annansingh, F. 2012. "Exploring the Risks of Knowledge Leakage: An Information Systems Case Study Approach," New Research on Knowledge Management Models and Methods, IntechOpen.
  10. Argyres, N. S., and Silverman, B. S. 2004. "R&D, organization structure, and the development of corporate technological knowledge," Strategic Management Journal (25:8-9), pp. 929-958. https://doi.org/10.1002/smj.387
  11. Beccaria, C. 1963. On Crimes and Punishment, Macmillan, New York.
  12. Chesbrough, H. W. 2006. Open Innovation: The New Imperative for Creating and Profiting from Technology, Harvard Business Press.
  13. Comrey, A. L. 1973. A First Course in Factor Analysis, Academic Press, New York.
  14. Crossler, R. E., Johnston, A. C., and Lowry, P.B. 2013. "Future directions for behavioral information security research," Computers & Security (32), pp. 90-101. https://doi.org/10.1016/j.cose.2012.09.010
  15. D'Arcy, J., Hovav, A. and Galletta, D. 2009. "User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach," Information Systems Research (20:1), pp. 79-98. https://doi.org/10.1287/isre.1070.0160
  16. Deci, E. L. and Ryan, R. M. 2000. "The "what" and "why" of goal pursuits: Human needs and the self-determination of behavior," Psychological Inquiry (11:4), pp. 227-268. https://doi.org/10.1207/S15327965PLI1104_01
  17. Deci, E. L., and Ryan, R. M. 2002. Overview of self-determination theory: An Organismic Dialectical Perspective. Handbook of self-determination research.
  18. Desouza, K. C. 2006. "Knowledge Security: An Interesting Research Space," Journal of Information Science & Technology (3:1), pp. 1-7.
  19. Durst, S., Aggestam, L., and Ferenhof, H. A. 2015. "Understanding knowledge leakage: A review of previous studies," Vine (45:4), pp. 568-586. https://doi.org/10.1108/VINE-01-2015-0009
  20. Eisenhardt, K. and Santos, F. 2000. "Knowledge-based view: a new theory of strategy?" Handbook of Strategy and Management (1:1), pp. 31-47.
  21. Ernst, and Young. 2003. Global Information Security Survey, New York.
  22. Gefen, D. Straub, D., and Boudreau, M. C. 2000. "Structural equation modeling and regression: Guidelines for research practice," Communications of the Association for Information Systems (4:1), article 7.
  23. Gibbs, J. P. 1975. "Crime, punishment, and deterrence," Southwestern Social Science Quartely (48:5), pp. 515-530.
  24. Grasmick, H. G., and Bursik Jr, R. J. 1990. "Conscience, significant others, and rational choice: Extending the deterrence model," Law and society review, pp. 837-861.
  25. Harrington, S. J. 1996. "The effect of codes of ethics and personal denial of responsibility on computer abuse judgments and intentions," MIS Quarterly (20:3), pp. 257-278. https://doi.org/10.2307/249656
  26. Hendriks, P. 1999. "Why share knowledge? The influence of ICT on the motivation for knowledge sharing," Knowledge and Process Management (6:2), pp. 91-100. https://doi.org/10.1002/(SICI)1099-1441(199906)6:2<91::AID-KPM54>3.0.CO;2-M
  27. Herath, T., and Rao, H. R. 2009a. "Protection motivation and deterrence: a framework for security policy compliance in organizations," European Journal of Information Systems (18:2), pp. 106-125. https://doi.org/10.1057/ejis.2009.6
  28. Herath, T., and Rao, H. R. 2009b. "Encouraging information security behaviors in organizations: role of penalties, pressures and perceived effectiveness," Decision Support Systems (47:2), pp. 154-165. https://doi.org/10.1016/j.dss.2009.02.005
  29. Higgins, G., Wilson, A., and Fell, B. 2005. "An application of deterrence theory to software piracy," Journal of Criminal Justice and Popular Culture (12:3), pp. 166-184.
  30. Hu, Q., Xu, Z. and Dinev, T. 2011. "Does deterrence work in reducing information security policy abuse by employees?," Communications of the ACM (54:6), pp. 54-60. https://doi.org/10.1145/1953122.1953142
  31. Jennex, M. E and Durcikova. A. 2013. "Assessing knowledge loss risk," 46th Hawaii International Conference on System Sciences, pp. 3478-3487.
  32. Jiang, X., Li, M. and Gao, S. 2013. "Managing knowledge leakage in strategic alliances: The effects of trust and formal contracts," Industrial Marketing Management (42:6), pp. 983-991. https://doi.org/10.1016/j.indmarman.2013.03.013
  33. Johnston, M. M. and Finney, S. J. 2010. "Measuring basic needs satisfaction: Evaluating prev ious resea rch a nd conduct ing new psychometric evaluations of the Basic needs satisfaction in general scale," Contemporary Educational Psychology (35:4), pp. 280-296. https://doi.org/10.1016/j.cedpsych.2010.04.003
  34. Kankanhalli, A., Teo, H. H. and Tan, B. C. 2003. "An integrative study of information systems security effectiveness," International Journal of Information Management (23:2), pp. 139-154. https://doi.org/10.1016/S0268-4012(02)00105-6
  35. Kogut, B. and Zander, U. 1992. "Knowledge of the firm, combinative capabilities, and the replication of technology," Organization Science (3:3), pp. 383-397. https://doi.org/10.1287/orsc.3.3.383
  36. Kohn, A. 1993. Why incentive plans cannot work, Harvard Business Review 71.
  37. Manhart, M. and Thalmann, S. 2015. "Protecting organizational knowledge: a structured literature review," Journal of Knowledge Management (19:2), pp. 190-211. https://doi.org/10.1108/JKM-05-2014-0198
  38. Nagin, D. S. and Pogarsky, G. 2001. "Integrating celerity, impulsivity, and extralegal sanction threats into a model of general deterrence: Theory and evidence," Criminology (39:4), pp. 865-892. https://doi.org/10.1111/j.1745-9125.2001.tb00943.x
  39. Niemiec, C. P. and Ryan, R. M. 2009. "Autonomy, competence, and relatedness in the classroom: Applying self-determination theory to educational practice," School Field (7:2), pp. 133-144.
  40. Nonaka, I. and Takeuchi, H. 1995. The Knowledge - Creating Company: How Japanese Companies Create the Dynamics of Innovation, Oxford university press.
  41. Norman, P. M. 2002. "Protecting knowledge in strategic alliances: Resource and relational characteristics," The Journal of High Technology Management Research (13:2), pp. 177-202. https://doi.org/10.1016/S1047-8310(02)00050-0
  42. Pahnila, S., Siponen, M., and Mahmood, A. 2007. "Employees' behavior towards IS security policy compliance," In Proceedings of the 40th Annual Hawaii International Conference on System Sciences, Hawaii, USA.
  43. Parker, H. 2012. "Knowledge acquisition and leakage in inter‐firm relationships involving new technology‐based firms," Management Decision (50:9), pp.1618-1633. https://doi.org/10.1108/00251741211266714
  44. Paternoster, R. 2010. "How much do we really know about criminal deterrence?" The journal of criminal law and criminology, pp. 765-824.
  45. Paternoster, R. and Simpson, S. 1996. "Sanction threats and appeals to morality: Testing a rational choice model of corporate crime," Law & Society Review (30), pp. 549-583. https://doi.org/10.2307/3054128
  46. Piquero, A. and Tibbetts, S. 1996. "Specifying the direct and indirect effects of low self-control and situational factors in offenders' decision making: Toward a more complete model of rational offending," Justice Quarterly (13:3), pp. 481-510. https://doi.org/10.1080/07418829600093061
  47. Pogarsky, G. and Piquero, A. R. 2004. "Studying the reach of deterrence: Can deterrence theory help explain police misconduct?" Journal of Criminal Justice (32:4), pp. 371-386. https://doi.org/10.1016/j.jcrimjus.2004.04.007
  48. Ritala, P., Husted, K., and Olander, H. 2018. "External knowledge sharing and radical innovation: the downsides of uncontrolled openness," Journal of Knowledge Management (22:5), pp. 1104-1123. https://doi.org/10.1108/JKM-05-2017-0172
  49. Ritala, P., Olander, H. and Michailova, S. 2015. "Knowledge sharing, knowledge leaking and relative innovation performance: An empirical study," Technovation (35), pp. 22-31. https://doi.org/10.1016/j.technovation.2014.07.011
  50. Roca, J. C. and Gagne, M. 2008. "Understanding e-learning continuance intention in the workplace: A self-determination theory perspective," Computer in human behavior (24:4), pp. 1585-1604. https://doi.org/10.1016/j.chb.2007.06.001
  51. Ryan, R. M. 1994. "Representations of relationships to teachers, parents, and friends as predictors of academic motivation and self-esteem," Journal of early adolescence (14), pp. 226-249. https://doi.org/10.1177/027243169401400207
  52. Ryan, R. M. and Deci, E. L. 2000. "Self-determination theory and the facilitation of intrinsic motivation, social development, and well-being," American psychologist (55:1), pp. 68. https://doi.org/10.1037/0003-066X.55.1.68
  53. Ryan, R. M. and Deci, E. L. 2002. An overview of self-determination theory: An organismic dialectical perspective, Handbook of self-determination research. Rochester, NY: University of Rochester Press.
  54. Ryan, R. M., Patrick, H., Deci, E. L. and Williams, G. C. 2008. "Facilitating health behaviour change and its maintenance: Interventions based on self-determination theory," European Health Psychologist (10:1), pp. 2-5.
  55. Ryan, R. M., Rigby, C. S. and Przybylski, A. 2006. "The motivational pull of video games : A self-determination theory approach," Motivation and emotion (30:4), pp. 344-360. https://doi.org/10.1007/s11031-006-9051-8
  56. Silberman, M. 1976. "Toward a theory of criminal deterrence," American Sociological Review (41:3), pp. 442-461. https://doi.org/10.2307/2094253
  57. Siponen, M. and Vance, A. 2010. "Neutralization: new insights into the problem of employee information systems security policy violations," MIS Quarterly (34:3), pp. 487-502. https://doi.org/10.2307/25750688
  58. Siponen, M., Pahnila, S. and Mahmood, A. 2007. "Employees' adherence to information security policies: an empirical study," International Information Security Conference, pp. 133-144.
  59. Skinner, W. F. and Fream, A. M. 1997. "A social learning theory analysis of computer crime among college students," Journal of Research in Crime and Delinquency (34:4), pp. 495-518. https://doi.org/10.1177/0022427897034004005
  60. Straub, D. W. 1990. "Effective IS security: an empirical study," Information Systems Research (1:3), pp. 255-276. https://doi.org/10.1287/isre.1.3.255
  61. Teece, D. J. 1996. "Firm organization, industrial structure, and technological innovation," Journal of Economic Behavior & Organization (31:2), pp. 193-224. https://doi.org/10.1016/S0167-2681(96)00895-5
  62. Tittle, C. R. 1980. Sanctions and Social Deviance: The Question of Deterrence. New York, Praeger.
  63. Trevino, L. K. 1992. "Experimental Approaches to Studying Ethical-Unethical Behavior in Organizations," Business Ethics Quarterly (2:2), pp. 121-136. https://doi.org/10.2307/3857567
  64. Vayrynen, K., Hekkala, R. and Liias, T. 2013. "Knowledge protection challenges of social media encountered by organizations," Journal of Organizational Computing and Electronic Commerce (23:1-2), pp. 34-55. https://doi.org/10.1080/10919392.2013.748607
  65. Von Hirsch, A. 1999. Colloquium, Criminal deterrence and sentence severity: An Analysis of Recent Research. Hart Oxford.
  66. Wang, S. and Noe, R. A. 2010. "Knowledge sharing: A review and directions for future research," Human Resource Management Review (20:2), pp. 115-131. https://doi.org/10.1016/j.hrmr.2009.10.001
  67. Williams, G. C., McGregor, H. A. and Sharp, D. 2006. "Testing a self-determination theory intervention for motivating tobacco cessation: supporting autonomy and competence in a clinical trial," Health psychology (25:1), pp. 91-101. https://doi.org/10.1037/0278-6133.25.1.91
  68. Zhang, L., Smith, W. W., and Mcdowell, W. C. 2006. "Examining digital piracy: self-control, punishment, and self-efficacy," Information Resources Management Journal (22:1), pp. 24-44. https://doi.org/10.4018/irmj.2009010102