1 |
Parker, H. 2012. "Knowledge acquisition and leakage in inter‐firm relationships involving new technology‐based firms," Management Decision (50:9), pp.1618-1633.
DOI
|
2 |
Paternoster, R. 2010. "How much do we really know about criminal deterrence?" The journal of criminal law and criminology, pp. 765-824.
|
3 |
Paternoster, R. and Simpson, S. 1996. "Sanction threats and appeals to morality: Testing a rational choice model of corporate crime," Law & Society Review (30), pp. 549-583.
DOI
|
4 |
Piquero, A. and Tibbetts, S. 1996. "Specifying the direct and indirect effects of low self-control and situational factors in offenders' decision making: Toward a more complete model of rational offending," Justice Quarterly (13:3), pp. 481-510.
DOI
|
5 |
Pogarsky, G. and Piquero, A. R. 2004. "Studying the reach of deterrence: Can deterrence theory help explain police misconduct?" Journal of Criminal Justice (32:4), pp. 371-386.
DOI
|
6 |
Ritala, P., Husted, K., and Olander, H. 2018. "External knowledge sharing and radical innovation: the downsides of uncontrolled openness," Journal of Knowledge Management (22:5), pp. 1104-1123.
DOI
|
7 |
Ritala, P., Olander, H. and Michailova, S. 2015. "Knowledge sharing, knowledge leaking and relative innovation performance: An empirical study," Technovation (35), pp. 22-31.
DOI
|
8 |
Roca, J. C. and Gagne, M. 2008. "Understanding e-learning continuance intention in the workplace: A self-determination theory perspective," Computer in human behavior (24:4), pp. 1585-1604.
DOI
|
9 |
Ryan, R. M. 1994. "Representations of relationships to teachers, parents, and friends as predictors of academic motivation and self-esteem," Journal of early adolescence (14), pp. 226-249.
DOI
|
10 |
Ryan, R. M. and Deci, E. L. 2000. "Self-determination theory and the facilitation of intrinsic motivation, social development, and well-being," American psychologist (55:1), pp. 68.
DOI
|
11 |
Ryan, R. M. and Deci, E. L. 2002. An overview of self-determination theory: An organismic dialectical perspective, Handbook of self-determination research. Rochester, NY: University of Rochester Press.
|
12 |
장용선 2010. "조직문화 유형이 지식공유에 미치는 영향 분석," 대한경영학회지 (23:5), pp. 2793-2813.
|
13 |
김문식 2013. "자기주도학습능력과 지식공유의 관계에 대한 개인의 목표지향성과 조직 특성의 조절 효과," 한국기업경영학회 (20:4), pp. 249- 271.
|
14 |
신가희, 곽선화 2017. "지식은폐와 지식공유의 영향 요인과 관계에 관한 연구," 지식경영연구 (18:2), pp. 129-157.
DOI
|
15 |
신동준 2009. "처벌의 효과: 억제이론에 대한 비판적 고찰," 형사정책 (21:2), pp. 191-216.
DOI
|
16 |
황호민, 이상곤 2019. "팀 내외의 사회적 자본이 R&D 성과에 미치는 영향: 지식공유의 매개효과," 지식경영연구 (20:3), pp. 49-71
DOI
|
17 |
Ahmad, A., Bosua, R., and Scheepers, R. 2014. "Protecting organizational competitive advantage: a knowledge leakage perspective," Computers & Security (42), pp. 27-39.
DOI
|
18 |
Alavi, M., and Leidner, D. E. 2001. "Knowledge management and knowledge management systems: Conceptual foundations and research issues," MIS Quarterly (25:1), pp. 107-136.
DOI
|
19 |
Alexy, O., George, G., and Salter, A. J. 2013. "Cui bono? The selective revealing of knowledge and its implications for innovative activity," Academy of Management Review (38:2), pp. 270-291.
DOI
|
20 |
Annansingh, F. 2012. "Exploring the Risks of Knowledge Leakage: An Information Systems Case Study Approach," New Research on Knowledge Management Models and Methods, IntechOpen.
|
21 |
Siponen, M. and Vance, A. 2010. "Neutralization: new insights into the problem of employee information systems security policy violations," MIS Quarterly (34:3), pp. 487-502.
DOI
|
22 |
Ryan, R. M., Patrick, H., Deci, E. L. and Williams, G. C. 2008. "Facilitating health behaviour change and its maintenance: Interventions based on self-determination theory," European Health Psychologist (10:1), pp. 2-5.
|
23 |
Ryan, R. M., Rigby, C. S. and Przybylski, A. 2006. "The motivational pull of video games : A self-determination theory approach," Motivation and emotion (30:4), pp. 344-360.
DOI
|
24 |
Silberman, M. 1976. "Toward a theory of criminal deterrence," American Sociological Review (41:3), pp. 442-461.
DOI
|
25 |
Siponen, M., Pahnila, S. and Mahmood, A. 2007. "Employees' adherence to information security policies: an empirical study," International Information Security Conference, pp. 133-144.
|
26 |
Skinner, W. F. and Fream, A. M. 1997. "A social learning theory analysis of computer crime among college students," Journal of Research in Crime and Delinquency (34:4), pp. 495-518.
DOI
|
27 |
Straub, D. W. 1990. "Effective IS security: an empirical study," Information Systems Research (1:3), pp. 255-276.
DOI
|
28 |
Teece, D. J. 1996. "Firm organization, industrial structure, and technological innovation," Journal of Economic Behavior & Organization (31:2), pp. 193-224.
DOI
|
29 |
Beccaria, C. 1963. On Crimes and Punishment, Macmillan, New York.
|
30 |
Argyres, N. S., and Silverman, B. S. 2004. "R&D, organization structure, and the development of corporate technological knowledge," Strategic Management Journal (25:8-9), pp. 929-958.
DOI
|
31 |
Von Hirsch, A. 1999. Colloquium, Criminal deterrence and sentence severity: An Analysis of Recent Research. Hart Oxford.
|
32 |
Tittle, C. R. 1980. Sanctions and Social Deviance: The Question of Deterrence. New York, Praeger.
|
33 |
Trevino, L. K. 1992. "Experimental Approaches to Studying Ethical-Unethical Behavior in Organizations," Business Ethics Quarterly (2:2), pp. 121-136.
DOI
|
34 |
Vayrynen, K., Hekkala, R. and Liias, T. 2013. "Knowledge protection challenges of social media encountered by organizations," Journal of Organizational Computing and Electronic Commerce (23:1-2), pp. 34-55.
DOI
|
35 |
Wang, S. and Noe, R. A. 2010. "Knowledge sharing: A review and directions for future research," Human Resource Management Review (20:2), pp. 115-131.
DOI
|
36 |
D'Arcy, J., Hovav, A. and Galletta, D. 2009. "User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach," Information Systems Research (20:1), pp. 79-98.
DOI
|
37 |
Chesbrough, H. W. 2006. Open Innovation: The New Imperative for Creating and Profiting from Technology, Harvard Business Press.
|
38 |
Comrey, A. L. 1973. A First Course in Factor Analysis, Academic Press, New York.
|
39 |
Crossler, R. E., Johnston, A. C., and Lowry, P.B. 2013. "Future directions for behavioral information security research," Computers & Security (32), pp. 90-101.
DOI
|
40 |
Deci, E. L. and Ryan, R. M. 2000. "The "what" and "why" of goal pursuits: Human needs and the self-determination of behavior," Psychological Inquiry (11:4), pp. 227-268.
DOI
|
41 |
Deci, E. L., and Ryan, R. M. 2002. Overview of self-determination theory: An Organismic Dialectical Perspective. Handbook of self-determination research.
|
42 |
Desouza, K. C. 2006. "Knowledge Security: An Interesting Research Space," Journal of Information Science & Technology (3:1), pp. 1-7.
|
43 |
Durst, S., Aggestam, L., and Ferenhof, H. A. 2015. "Understanding knowledge leakage: A review of previous studies," Vine (45:4), pp. 568-586.
DOI
|
44 |
Gibbs, J. P. 1975. "Crime, punishment, and deterrence," Southwestern Social Science Quartely (48:5), pp. 515-530.
|
45 |
Williams, G. C., McGregor, H. A. and Sharp, D. 2006. "Testing a self-determination theory intervention for motivating tobacco cessation: supporting autonomy and competence in a clinical trial," Health psychology (25:1), pp. 91-101.
DOI
|
46 |
Zhang, L., Smith, W. W., and Mcdowell, W. C. 2006. "Examining digital piracy: self-control, punishment, and self-efficacy," Information Resources Management Journal (22:1), pp. 24-44.
DOI
|
47 |
Eisenhardt, K. and Santos, F. 2000. "Knowledge-based view: a new theory of strategy?" Handbook of Strategy and Management (1:1), pp. 31-47.
|
48 |
Ernst, and Young. 2003. Global Information Security Survey, New York.
|
49 |
Gefen, D. Straub, D., and Boudreau, M. C. 2000. "Structural equation modeling and regression: Guidelines for research practice," Communications of the Association for Information Systems (4:1), article 7.
|
50 |
Harrington, S. J. 1996. "The effect of codes of ethics and personal denial of responsibility on computer abuse judgments and intentions," MIS Quarterly (20:3), pp. 257-278.
DOI
|
51 |
Hendriks, P. 1999. "Why share knowledge? The influence of ICT on the motivation for knowledge sharing," Knowledge and Process Management (6:2), pp. 91-100.
DOI
|
52 |
Herath, T., and Rao, H. R. 2009a. "Protection motivation and deterrence: a framework for security policy compliance in organizations," European Journal of Information Systems (18:2), pp. 106-125.
DOI
|
53 |
Herath, T., and Rao, H. R. 2009b. "Encouraging information security behaviors in organizations: role of penalties, pressures and perceived effectiveness," Decision Support Systems (47:2), pp. 154-165.
DOI
|
54 |
Higgins, G., Wilson, A., and Fell, B. 2005. "An application of deterrence theory to software piracy," Journal of Criminal Justice and Popular Culture (12:3), pp. 166-184.
|
55 |
Grasmick, H. G., and Bursik Jr, R. J. 1990. "Conscience, significant others, and rational choice: Extending the deterrence model," Law and society review, pp. 837-861.
|
56 |
Hu, Q., Xu, Z. and Dinev, T. 2011. "Does deterrence work in reducing information security policy abuse by employees?," Communications of the ACM (54:6), pp. 54-60.
DOI
|
57 |
Jennex, M. E and Durcikova. A. 2013. "Assessing knowledge loss risk," 46th Hawaii International Conference on System Sciences, pp. 3478-3487.
|
58 |
Jiang, X., Li, M. and Gao, S. 2013. "Managing knowledge leakage in strategic alliances: The effects of trust and formal contracts," Industrial Marketing Management (42:6), pp. 983-991.
DOI
|
59 |
Kankanhalli, A., Teo, H. H. and Tan, B. C. 2003. "An integrative study of information systems security effectiveness," International Journal of Information Management (23:2), pp. 139-154.
DOI
|
60 |
Johnston, M. M. and Finney, S. J. 2010. "Measuring basic needs satisfaction: Evaluating prev ious resea rch a nd conduct ing new psychometric evaluations of the Basic needs satisfaction in general scale," Contemporary Educational Psychology (35:4), pp. 280-296.
DOI
|
61 |
Kogut, B. and Zander, U. 1992. "Knowledge of the firm, combinative capabilities, and the replication of technology," Organization Science (3:3), pp. 383-397.
DOI
|
62 |
Niemiec, C. P. and Ryan, R. M. 2009. "Autonomy, competence, and relatedness in the classroom: Applying self-determination theory to educational practice," School Field (7:2), pp. 133-144.
|
63 |
Kohn, A. 1993. Why incentive plans cannot work, Harvard Business Review 71.
|
64 |
Manhart, M. and Thalmann, S. 2015. "Protecting organizational knowledge: a structured literature review," Journal of Knowledge Management (19:2), pp. 190-211.
DOI
|
65 |
Nagin, D. S. and Pogarsky, G. 2001. "Integrating celerity, impulsivity, and extralegal sanction threats into a model of general deterrence: Theory and evidence," Criminology (39:4), pp. 865-892.
DOI
|
66 |
Nonaka, I. and Takeuchi, H. 1995. The Knowledge - Creating Company: How Japanese Companies Create the Dynamics of Innovation, Oxford university press.
|
67 |
Norman, P. M. 2002. "Protecting knowledge in strategic alliances: Resource and relational characteristics," The Journal of High Technology Management Research (13:2), pp. 177-202.
DOI
|
68 |
Pahnila, S., Siponen, M., and Mahmood, A. 2007. "Employees' behavior towards IS security policy compliance," In Proceedings of the 40th Annual Hawaii International Conference on System Sciences, Hawaii, USA.
|