Browse > Article
http://dx.doi.org/10.15813/kmr.2019.20.4.005

Internal and External Factors of Knowledge Leakage Intention: From Tacit Knowledge Perspective  

Kim, Yong-Tae (딜로이트 안진회계법인)
Koo, Yunmo (부산연구원)
Lee, Jae-Nam (고려대학교 경영대학)
Publication Information
Knowledge Management Research / v.20, no.4, 2019 , pp. 75-97 More about this Journal
Abstract
In the rapidly changing business environment, knowledge has been recognized as a core asset for sustaining an organization's competitive advantage. In addition, knowledge sharing is one of the key elements of knowledge management, emphasizing external knowledge sharing beyond initial internal knowledge sharing. However, while knowledge management research emphasizes knowledge sharing, which is a positive aspect, research on preventing knowledge leakage that can have negative consequences is relatively lacking. Companies have tried to minimize the negative effects of knowledge management but many knowledge leakage accidents are still occurring. Therefore, this study aims to examine the effects of external factors based on deterrence theory and internal factors based on self-determination theory on knowledge leakage intention focusing on tacit knowledge. The results of the empirical analysis of 100 data sets collected through a scenario-based survey show that certainty of sanctions, social disapproval, and competence are found to have a significant effect on reducing tacit knowledge leakage intention. Furthermore, informal sanctions have a greater impact on tacit knowledge leakage intention than formal sanctions and external factors have a greater effect on tacit knowledge leakage intention than internal factors.
Keywords
Knowledge leakage intention; Knowledge sharing; Knowledge management; Tacit knowledge; Internal factor; External factor; Experiment study;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 Parker, H. 2012. "Knowledge acquisition and leakage in inter‐firm relationships involving new technology‐based firms," Management Decision (50:9), pp.1618-1633.   DOI
2 Paternoster, R. 2010. "How much do we really know about criminal deterrence?" The journal of criminal law and criminology, pp. 765-824.
3 Paternoster, R. and Simpson, S. 1996. "Sanction threats and appeals to morality: Testing a rational choice model of corporate crime," Law & Society Review (30), pp. 549-583.   DOI
4 Piquero, A. and Tibbetts, S. 1996. "Specifying the direct and indirect effects of low self-control and situational factors in offenders' decision making: Toward a more complete model of rational offending," Justice Quarterly (13:3), pp. 481-510.   DOI
5 Pogarsky, G. and Piquero, A. R. 2004. "Studying the reach of deterrence: Can deterrence theory help explain police misconduct?" Journal of Criminal Justice (32:4), pp. 371-386.   DOI
6 Ritala, P., Husted, K., and Olander, H. 2018. "External knowledge sharing and radical innovation: the downsides of uncontrolled openness," Journal of Knowledge Management (22:5), pp. 1104-1123.   DOI
7 Ritala, P., Olander, H. and Michailova, S. 2015. "Knowledge sharing, knowledge leaking and relative innovation performance: An empirical study," Technovation (35), pp. 22-31.   DOI
8 Roca, J. C. and Gagne, M. 2008. "Understanding e-learning continuance intention in the workplace: A self-determination theory perspective," Computer in human behavior (24:4), pp. 1585-1604.   DOI
9 Ryan, R. M. 1994. "Representations of relationships to teachers, parents, and friends as predictors of academic motivation and self-esteem," Journal of early adolescence (14), pp. 226-249.   DOI
10 Ryan, R. M. and Deci, E. L. 2000. "Self-determination theory and the facilitation of intrinsic motivation, social development, and well-being," American psychologist (55:1), pp. 68.   DOI
11 Ryan, R. M. and Deci, E. L. 2002. An overview of self-determination theory: An organismic dialectical perspective, Handbook of self-determination research. Rochester, NY: University of Rochester Press.
12 장용선 2010. "조직문화 유형이 지식공유에 미치는 영향 분석," 대한경영학회지 (23:5), pp. 2793-2813.
13 김문식 2013. "자기주도학습능력과 지식공유의 관계에 대한 개인의 목표지향성과 조직 특성의 조절 효과," 한국기업경영학회 (20:4), pp. 249- 271.
14 신가희, 곽선화 2017. "지식은폐와 지식공유의 영향 요인과 관계에 관한 연구," 지식경영연구 (18:2), pp. 129-157.   DOI
15 신동준 2009. "처벌의 효과: 억제이론에 대한 비판적 고찰," 형사정책 (21:2), pp. 191-216.   DOI
16 황호민, 이상곤 2019. "팀 내외의 사회적 자본이 R&D 성과에 미치는 영향: 지식공유의 매개효과," 지식경영연구 (20:3), pp. 49-71   DOI
17 Ahmad, A., Bosua, R., and Scheepers, R. 2014. "Protecting organizational competitive advantage: a knowledge leakage perspective," Computers & Security (42), pp. 27-39.   DOI
18 Alavi, M., and Leidner, D. E. 2001. "Knowledge management and knowledge management systems: Conceptual foundations and research issues," MIS Quarterly (25:1), pp. 107-136.   DOI
19 Alexy, O., George, G., and Salter, A. J. 2013. "Cui bono? The selective revealing of knowledge and its implications for innovative activity," Academy of Management Review (38:2), pp. 270-291.   DOI
20 Annansingh, F. 2012. "Exploring the Risks of Knowledge Leakage: An Information Systems Case Study Approach," New Research on Knowledge Management Models and Methods, IntechOpen.
21 Siponen, M. and Vance, A. 2010. "Neutralization: new insights into the problem of employee information systems security policy violations," MIS Quarterly (34:3), pp. 487-502.   DOI
22 Ryan, R. M., Patrick, H., Deci, E. L. and Williams, G. C. 2008. "Facilitating health behaviour change and its maintenance: Interventions based on self-determination theory," European Health Psychologist (10:1), pp. 2-5.
23 Ryan, R. M., Rigby, C. S. and Przybylski, A. 2006. "The motivational pull of video games : A self-determination theory approach," Motivation and emotion (30:4), pp. 344-360.   DOI
24 Silberman, M. 1976. "Toward a theory of criminal deterrence," American Sociological Review (41:3), pp. 442-461.   DOI
25 Siponen, M., Pahnila, S. and Mahmood, A. 2007. "Employees' adherence to information security policies: an empirical study," International Information Security Conference, pp. 133-144.
26 Skinner, W. F. and Fream, A. M. 1997. "A social learning theory analysis of computer crime among college students," Journal of Research in Crime and Delinquency (34:4), pp. 495-518.   DOI
27 Straub, D. W. 1990. "Effective IS security: an empirical study," Information Systems Research (1:3), pp. 255-276.   DOI
28 Teece, D. J. 1996. "Firm organization, industrial structure, and technological innovation," Journal of Economic Behavior & Organization (31:2), pp. 193-224.   DOI
29 Beccaria, C. 1963. On Crimes and Punishment, Macmillan, New York.
30 Argyres, N. S., and Silverman, B. S. 2004. "R&D, organization structure, and the development of corporate technological knowledge," Strategic Management Journal (25:8-9), pp. 929-958.   DOI
31 Von Hirsch, A. 1999. Colloquium, Criminal deterrence and sentence severity: An Analysis of Recent Research. Hart Oxford.
32 Tittle, C. R. 1980. Sanctions and Social Deviance: The Question of Deterrence. New York, Praeger.
33 Trevino, L. K. 1992. "Experimental Approaches to Studying Ethical-Unethical Behavior in Organizations," Business Ethics Quarterly (2:2), pp. 121-136.   DOI
34 Vayrynen, K., Hekkala, R. and Liias, T. 2013. "Knowledge protection challenges of social media encountered by organizations," Journal of Organizational Computing and Electronic Commerce (23:1-2), pp. 34-55.   DOI
35 Wang, S. and Noe, R. A. 2010. "Knowledge sharing: A review and directions for future research," Human Resource Management Review (20:2), pp. 115-131.   DOI
36 D'Arcy, J., Hovav, A. and Galletta, D. 2009. "User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach," Information Systems Research (20:1), pp. 79-98.   DOI
37 Chesbrough, H. W. 2006. Open Innovation: The New Imperative for Creating and Profiting from Technology, Harvard Business Press.
38 Comrey, A. L. 1973. A First Course in Factor Analysis, Academic Press, New York.
39 Crossler, R. E., Johnston, A. C., and Lowry, P.B. 2013. "Future directions for behavioral information security research," Computers & Security (32), pp. 90-101.   DOI
40 Deci, E. L. and Ryan, R. M. 2000. "The "what" and "why" of goal pursuits: Human needs and the self-determination of behavior," Psychological Inquiry (11:4), pp. 227-268.   DOI
41 Deci, E. L., and Ryan, R. M. 2002. Overview of self-determination theory: An Organismic Dialectical Perspective. Handbook of self-determination research.
42 Desouza, K. C. 2006. "Knowledge Security: An Interesting Research Space," Journal of Information Science & Technology (3:1), pp. 1-7.
43 Durst, S., Aggestam, L., and Ferenhof, H. A. 2015. "Understanding knowledge leakage: A review of previous studies," Vine (45:4), pp. 568-586.   DOI
44 Gibbs, J. P. 1975. "Crime, punishment, and deterrence," Southwestern Social Science Quartely (48:5), pp. 515-530.
45 Williams, G. C., McGregor, H. A. and Sharp, D. 2006. "Testing a self-determination theory intervention for motivating tobacco cessation: supporting autonomy and competence in a clinical trial," Health psychology (25:1), pp. 91-101.   DOI
46 Zhang, L., Smith, W. W., and Mcdowell, W. C. 2006. "Examining digital piracy: self-control, punishment, and self-efficacy," Information Resources Management Journal (22:1), pp. 24-44.   DOI
47 Eisenhardt, K. and Santos, F. 2000. "Knowledge-based view: a new theory of strategy?" Handbook of Strategy and Management (1:1), pp. 31-47.
48 Ernst, and Young. 2003. Global Information Security Survey, New York.
49 Gefen, D. Straub, D., and Boudreau, M. C. 2000. "Structural equation modeling and regression: Guidelines for research practice," Communications of the Association for Information Systems (4:1), article 7.
50 Harrington, S. J. 1996. "The effect of codes of ethics and personal denial of responsibility on computer abuse judgments and intentions," MIS Quarterly (20:3), pp. 257-278.   DOI
51 Hendriks, P. 1999. "Why share knowledge? The influence of ICT on the motivation for knowledge sharing," Knowledge and Process Management (6:2), pp. 91-100.   DOI
52 Herath, T., and Rao, H. R. 2009a. "Protection motivation and deterrence: a framework for security policy compliance in organizations," European Journal of Information Systems (18:2), pp. 106-125.   DOI
53 Herath, T., and Rao, H. R. 2009b. "Encouraging information security behaviors in organizations: role of penalties, pressures and perceived effectiveness," Decision Support Systems (47:2), pp. 154-165.   DOI
54 Higgins, G., Wilson, A., and Fell, B. 2005. "An application of deterrence theory to software piracy," Journal of Criminal Justice and Popular Culture (12:3), pp. 166-184.
55 Grasmick, H. G., and Bursik Jr, R. J. 1990. "Conscience, significant others, and rational choice: Extending the deterrence model," Law and society review, pp. 837-861.
56 Hu, Q., Xu, Z. and Dinev, T. 2011. "Does deterrence work in reducing information security policy abuse by employees?," Communications of the ACM (54:6), pp. 54-60.   DOI
57 Jennex, M. E and Durcikova. A. 2013. "Assessing knowledge loss risk," 46th Hawaii International Conference on System Sciences, pp. 3478-3487.
58 Jiang, X., Li, M. and Gao, S. 2013. "Managing knowledge leakage in strategic alliances: The effects of trust and formal contracts," Industrial Marketing Management (42:6), pp. 983-991.   DOI
59 Kankanhalli, A., Teo, H. H. and Tan, B. C. 2003. "An integrative study of information systems security effectiveness," International Journal of Information Management (23:2), pp. 139-154.   DOI
60 Johnston, M. M. and Finney, S. J. 2010. "Measuring basic needs satisfaction: Evaluating prev ious resea rch a nd conduct ing new psychometric evaluations of the Basic needs satisfaction in general scale," Contemporary Educational Psychology (35:4), pp. 280-296.   DOI
61 Kogut, B. and Zander, U. 1992. "Knowledge of the firm, combinative capabilities, and the replication of technology," Organization Science (3:3), pp. 383-397.   DOI
62 Niemiec, C. P. and Ryan, R. M. 2009. "Autonomy, competence, and relatedness in the classroom: Applying self-determination theory to educational practice," School Field (7:2), pp. 133-144.
63 Kohn, A. 1993. Why incentive plans cannot work, Harvard Business Review 71.
64 Manhart, M. and Thalmann, S. 2015. "Protecting organizational knowledge: a structured literature review," Journal of Knowledge Management (19:2), pp. 190-211.   DOI
65 Nagin, D. S. and Pogarsky, G. 2001. "Integrating celerity, impulsivity, and extralegal sanction threats into a model of general deterrence: Theory and evidence," Criminology (39:4), pp. 865-892.   DOI
66 Nonaka, I. and Takeuchi, H. 1995. The Knowledge - Creating Company: How Japanese Companies Create the Dynamics of Innovation, Oxford university press.
67 Norman, P. M. 2002. "Protecting knowledge in strategic alliances: Resource and relational characteristics," The Journal of High Technology Management Research (13:2), pp. 177-202.   DOI
68 Pahnila, S., Siponen, M., and Mahmood, A. 2007. "Employees' behavior towards IS security policy compliance," In Proceedings of the 40th Annual Hawaii International Conference on System Sciences, Hawaii, USA.