Professional Documents
Culture Documents
Kankanhalli ContributingKnowledgeElectronic 2005
Kankanhalli ContributingKnowledgeElectronic 2005
Kankanhalli ContributingKnowledgeElectronic 2005
Investigation
Author(s): Atreyi Kankanhalli, Bernard C. Y. Tan and Kwok-Kee Wei
Source: MIS Quarterly , Mar., 2005, Vol. 29, No. 1, Special Issue on Information
Technologies and Knowledge Management (Mar., 2005), pp. 113-143
Published by: Management Information Systems Research Center, University of
Minnesota
JSTOR is a not-for-profit service that helps scholars, researchers, and students discover, use, and build upon a wide
range of content in a trusted digital archive. We use information technology and tools to increase productivity and
facilitate new forms of scholarship. For more information about JSTOR, please contact support@jstor.org.
Your use of the JSTOR archive indicates your acceptance of the Terms & Conditions of Use, available at
https://about.jstor.org/terms
usage by knowledge contributors. Besides contri facilitate knowledge reuse through access to the
buting to theory building in KM, the results of this codified expertise. A key technological component
study inform KM practice. of this approach is electronic knowledge reposi
tories (EKRs) (Grover and Davenport 2001). The
Keywords: Knowledge management, electronic network model corresponds to the personalization
knowledge repositories, knowledge contribution, approach to KM (Hansen et al. 1999). This
social exchange, social capital approach emphasizes linkage among people for
the purpose of knowledge exchange. Important
technological components of this approach are
knowledge directories that provide location of
Introduction expertise (Ruggles 1998) and electronic forum
software that allows people to interact within
The strategic management of organizational communities of practice (Brown and Duguid 1991).
knowledge is a key factor that can help organiza
tions to sustain competitive advantage in volatile While technological capabilities are important,
environments. Organizations are turning to knowl having sophisticated KM systems does not
edge management (KM) initiatives and techno guarantee success in KM initiatives (Cross and
logies to leverage their knowledge resources. Baird 2000; McDermott 1999). This is because
According to the analyst firm IDC, business social issues appear to be significant in ensuring
spending on KM could rise from $2.7 billion in knowledge sharing success (Ruppel and Harring
2002 to $4.8 billion in 2007 (Babcock 2004). ton 2001). Both social and technical barriers to
Concurrent with the organizational interest in KM, usage of KM systems have been listed and calls
a large number of academic papers have been have been made to simultaneously address both
published on KM (Schultze and Leidner 2002). sets of issues (McDermott 1999; Zack 1999) in
These developments reflect the significance of KM order to be able to reap the benefits of KM that
among scholars and practitioners. have been experienced by some organizations
(Davenportetal. 1998; O'Dell and Grayson 1998).
Knowledge management is defined as "a systemic
and organizationally specified process for ac This study focuses on EKRs since they are
quiring, organizing, and communicating both tacit fundamental to organizational knowledge capture
and explicit knowledge of employees so that other and dissemination, yet the factors affecting EKR
employees may make use of it to be more effective usage are not well understood (Markus 2001).
and productive in their work" (Alavi and Leidner EKRs are electronic stores of content acquired
1999, p. 6). KM systems are "a class of informa about all subjects for which the organization has
tion systems applied to managing organizational decided to maintain knowledge (Liebowitz and
knowledge. That is, they are IT-based systems Beckman 1998). EKRs can comprise multiple
developed to support and enhance the organiza knowledge bases as well as the mechanisms for
tional processes of knowledge creation, storage/ acquisition, control, and publication of the knowl
retrieval, transfer, and application" (Alavi and edge.3 The process of knowledge sharing through
Leidner 2001, p. 114). Two models of KM systems EKRs involves people contributing knowledge to
have been identified in the information systems populate EKRs (e.g., customer and supplier
literature: the repository model and the network knowledge, industry best practices, and product
model (Alavi 2000).2 The repository model expertise) and people seeking knowledge from
corresponds to the codification approach to KM
(Hansen et al. 1999). This approach emphasizes
codification and storage of knowledge so as to 3According to the definition, the capabilities of EKRs are
analogous to the mnemonic functions of organizational
memory information systems (Stein and Zwass 1995).
However, conceptualization of organizational memory
2Zack (1999) alternately labels these two models as information systems concentrates more on description at
integrative and interactive architectures respectively. the subsystem level.
EKRs for reuse. Success of EKRs requires that edge contributors. In investigating the usage of
knowledge contributors be willing to part with their EKRs, the first choice of theoretical bases would
knowledge and knowledge seekers be willing to appear to be theories such as the technology
reuse the codified knowledge (Ba et al. 2001). acceptance model (Davis 1989) which have been
The distinction between contributors and seekers successful in explaining the usage of information
is conceptual in that the same individual can be a systems (e.g., Venkatesh and Davis 2000).
contributor or a seeker at different points in time. Although the technology acceptance model may
This study examines EKR usage from the partially explain the behavior of knowledge
perspective of knowledge contributors as this is contributors,4 this model does not directly account
the first step toward knowledge leverage through for the social cost and benefit factors experienced
EKRs. Unless knowledge contributors are willing by knowledge contributors that may affect their
to provide content to EKRs, knowledge reuse usage of collective technologies such as EKRs.
through EKRs cannot take place. However, the social and individual cost and benefit
factors in knowledge sharing can be accounted for
Several prior studies have adopted a conceptual by social exchange theory. The impact of cost and
(Kollock 1999; Markus 2001) or qualitative ap benefit factors on EKR usage by knowledge
proach (Goodman and Darr 1998; Orlikowski contributors is likely to be contingent upon
1993; Wasko and Faraj 2000) in attempts to contextual factors (Constant et al. 1996; Goodman
understand the behavior of knowledge contribu and Darr 1998; Jarvenpaa and Staples 2000;
tors. Other studies have conducted experiments Orlikowski 1993). Social capital theory accounts
(Constant et al. 1994) or surveys (Bock et al. 2005; for several important contextual factors in
Constant et al. 1996; Jarvenpaa and Staples 2000; knowledge exchange. Therefore, this study uses
Wasko and Faraj 2005) to model and explain the social exchange theory and the social capital
contributor behavior with varying success. theory as its theoretical bases.
Existing empirical studies focus on the benefits
(acting as motivators) rather than the costs (acting
as inhibitors) of knowledge contribution, despite
suggestions from practitioner literature (O'Dell and Cost and Benefit Factors
Grayson 1998) and conceptual literature (Ba et al.
2001) that cost factors can be important in Cost and benefit factors in our study are derived
determining knowledge-sharing behavior. This based on social exchange theory. Social ex
study advances theoretical development on change theory explains human behavior in social
knowledge contribution in two important ways. exchanges (Blau 1964), which differ from eco
First, it simultaneously investigates both cost and nomic exchanges in that obligations are not clearly
benefit factors affecting EKR usage. Second, it specified. In such exchanges, people do others a
incorporates contextual factors to illustrate how favor with a general expectation of some future
these may moderate the relationships between return but no clear expectation of exact future
cost and benefit factors and EKR usage. The return. Therefore, social exchange assumes the
results suggest organizational interventions and existence of relatively long-term relationships of
technology design considerations that can promote interest as opposed to one-off exchanges (Molm
knowledge contribution to EKRs, thereby faci 1997). Knowledge sharing through EKRs can be
litating reuse of organizational knowledge. seen as a form of generalized social exchange
(Fulk et al 1996) where more than two people
participate and reciprocal dependence is indirect,
with the EKR serving as the intermediary between rewards for their contributions (Beer and Nohria
knowledge contributors and seekers. Knowledge 2000; Hall 2001) through which they can obtain a
contributors share their knowledge with no exact better lifestyle. As a result of contribution, knowl
expectation of future return. The quantity and edge contributors may also enhance their image or
value of knowledge contributed is difficult to reputation in the organization (Ba et al. 2001;
specify and so is the return obtained. Hence, Constant et al. 1994; Constant et al. 1996), which
knowledge contributors are likely to work on the can serve to increase their self-concept. By
assumption of relatively longer-term relationships sharing their knowledge, contributors may receive
of interest. reciprocal benefits, i.e., their future requests for
knowledge being met by others (Connolly and
Resources (tangible and intangible) are the cur Thorn 1990; Kollock 1999; Wasko and Faraj
rency of social exchange. Resources given away 2000), which can facilitate their work. Intrinsic
during social exchange or negative outcomes of benefits are sought after as ends by themselves.
exchange can be seen as costs. Resources For example, through contribution, knowledge con
received as a result of social exchange or positive tributors can be satisfied by enhancing their knowl
outcomes of exchange can be seen as benefits. edge self-efficacy or confidence in their ability to
Social exchange theory posits that people behave provide valuable knowledge that is useful to the
in ways that maximize their benefits and minimize organization (Constant et al. 1994; Constant et al.
their costs (Molm 1997). In agreement with this 1996). Also, by contributing knowledge to EKRs,
theory, researchers have suggested that in knowledge contributors have the opportunity to
creasing the benefits and reducing the costs for help others (Ba et al. 2001; Wasko and Faraj
contributing knowledge can help to encourage 2000). Previous studies on altruism have shown
knowledge sharing using KM systems (Markus that people enjoy and derive pleasure from such
2001; Wasko and Faraj 2000), including EKRs. acts of helping others (Baumeister 1982; Krebs
1975). Research has established extrinsic and
During social exchange, costs can be incurred in intrinsic benefits as motivators of human behavior
the form of opportunity costs and actual loss of in several domains (Vallerand 1997), including
resources (Molm 1997). Opportunity costs are knowledge sharing (Osterloh and Frey 2000).
rewards foregone from alternative behavior not
chosen. For example, the time and effort required
to codify and input knowledge into EKRs (Ba et al.
2001; Markus 2001) can act as an opportunity cost Contextual Factors
that precludes knowledge contributors from per
forming alternative tasks at that time and accruing Contextual factors in our study are derived from
the corresponding rewards. Also, knowledge con social capital theory. Social capital refers to the
tributors may perceive a loss of power and unique resources embedded within networks of human
value within the organization associated with the relationships (Nahapiet and Ghoshal 1998).
knowledge they transfer to EKRs (Davenport and These networks include proximate as well as
Prusak 1998; Gray 2001). Such loss of knowledge virtual communities (Rheingold 2000). Social
power can be considered as an actual loss of capital theory posits that social capital provides the
resource during knowledge contribution. conditions necessary for knowledge exchange to
occur. Three key aspects of social capital that can
During social exchange, benefits acting as moti define the context for knowledge exchange are
vators of human behavior can be extrinsic or trust, norms, and identification (Nahapiet and
intrinsic in nature (Deci and Ryan 1980; Vallerand Ghoshal 1998). Trust, norms, and identification
1997). Extrinsic benefits are sought after as can be considered as social capital since they are
means to ends desired by people. For example, organizational resources or assets rooted within
knowledge contributors may receive organizational social relationships that can improve the efficiency
of coordinated action. Practitioner literature has A norm represents a degree of consensus in the
described the impacts of these factors without social system (Coleman 1990). Norms have the
considering whether their effects are direct or effect of moderating human behavior in accor
moderating. However, several prior academic dance with the expectations of the group or
studies (e.g., Constant et al. 1994; Jarvenpaa and community. Pro-sharing norms that have been
Staples 2000) have hinted at the moderating role reported to enhance the climate for knowledge
of these aspects of social capital in knowledge sharing are norms of teamwork (Starbuck 1992),
sharing situations. Specifically, these three factors collaboration and sharing (Goodman and Darr
are believed to be able to amplify or dampen the 1998; Jarvenpaa and Staples 2000; Orlikowski
effects of particular cost and benefit factors on 1993), willingness to value and respond to
knowledge-sharing behavior. diversity, openness to conflicting views, and
tolerance for failure (Leonard-Barton 1995). The
Trust is the belief that the intended action of others effects of costs and extrinsic benefits on knowl
would be appropriate from our point of view edge contribution behavior are likely to be con
(Mistzal 1996). It indicates a willingness of people tingent on these norms. The effects of intrinsic
to be vulnerable to others due to beliefs in their benefits on knowledge contribution are not likely to
good intent and concern, competence and capa be affected by contextual factors since these
bility, and reliability (Mishra 1996). McKnight etal. benefits are seen as ends in themselves. The cost
(1998) term these trusting beliefs as benevolence and extrinsic benefit factors may not influence
belief, competence belief, and predictability belief, contribution behavior under conditions of strong
respectively. Generalized trust is an impersonal pro-sharing norms. Specifically, when pro-sharing
form of trust that does not rest with a specific norms are strong, the costs of knowledge sharing
individual but rests on behavior that is generalized may not be a deterrent to knowledge contributors.
to a social unit as a whole (e.g., a community of Conversely when pro-sharing norms are weak, the
knowledge workers exchanging knowledge costs of contribution may be salient. For example,
through EKRs) (Putnam 1993). In the context of it has been found that the costs of knowledge
our study, generalized trust refers to the belief in sharing were a deterrent to KM system usage
the good intent, competence, and reliability of when there was incompatibility between the
employees with respect to contributing and reusing collective nature of the technology and the com
knowledge through EKRs. With strong gener petitive norm of the organizational context
alized trust, people may trust each other without (Orlikowski 1993). The extrinsic benefits of knowl
having much personal knowledge about each edge sharing may not be salient to knowledge
other. Generalized trust has been viewed as a key contributors when pro-sharing norms are strong.
factor that provides a context for cooperation (Tsai For example, in environments where such norms
and Ghoshal 1998) and effective knowledge are strong, there is greater openness to the
exchange (Adler 2001). When generalized trust is potential for value creation through knowledge
strong, the effort required for knowledge sharing exchange (Nahapiet and Ghoshal 1998) even
may not be salient to knowledge contributors when extrinsic benefits to stimulate knowledge
because they believe that knowledge shared is not contribution may not exist.
likely to be misused by reusers (Davenport and
Prusak 1998). Conversely, when generalized trust Identification is a condition where the interests of
is weak, knowledge contributors may find the effort individuals merge with the interests of the
required for knowledge sharing to be salient organization, resulting in the creation of an identity
because they believe that others may inappro based on those interests (Johnson et al. 1999).
priately use their knowledge. For example, con Identification sets the context within which com
sultants at Ernst and Young declined to make the munication and knowledge exchange occur among
effort to contribute knowledge to repositories in organizational members (Nahapiet and Ghoshal
situations where trust did not exist (Markus 2001). 1998). Three components of identification that
have been identified in the literature are similarity contributors contingent on particular contextual
of values, membership in the organization, and factors (i.e., generalized trust, pro-sharing norms,
loyalty toward the organization (Patchen 1970). and identification).
Similarity of values reflects the extent to which
members of an organization possess joint goals
and interests. Membership is the degree to which
self-concept of members is linked to the organiza Loss of Knowledge Power
tion. Loyalty refers to the extent to which mem
Previous research suggests that by contributing a
bers support and defend the organization.
part of their unique knowledge, knowledge con
Identification is likely to provide a context for pro
tributors give up sole claim to the benefits
social behavior by raising the concern for collective
stemming from such knowledge (Gray 2001).
interests which merge with the individual's own
Therefore, knowledge contributors retain less
interests (Johnson et al. 1999; O'Reilly and Chat
proprietary knowledge upon which to argue their
man 1986). Under conditions of strong identifica
value to the organization. This may reduce the
tion, the effects of certain costs and benefits
power position of knowledge contributors in
pertaining to knowledge sharing may be nullified in
relation to the organization, making them more
the face of collective outcomes (Constant et al.
replaceable. These arguments have also been
1996). Therefore, when identification is strong, the
echoed by scholars in economics (Williamson
effort required for knowledge sharing may not be 1975) and organization strategy (Mintzberg 1973;
a deterrent to knowledge contributors because the Pfeffer 1992) in that uniqueness is considered a
concern for organizational outcomes may domi key aspect of organizational power because the
nate. Similarly, in such contexts, the need for lower the substitutability of an individual, the
organizational reward for knowledge sharing may greater is his or her power (Hickson et al. 1971).
not be salient to knowledge contributors because The KM literature reports the loss of power due to
the regard for collective outcomes is strong. knowledge contribution as a barrier to knowledge
sharing (Davenport and Prusak 1998; Orlikowski
1993). Since knowledge is perceived as a source
of power, knowledge contributors may fear losing
Research Model their power or value if others know what they know
(Gray 2001; Thibaut and Kelley 1986). Potential
and Hypotheses knowledge contributors may keep themselves out
of a knowledge exchange if they feel they can
The research model for explaining EKR usage by
benefit more by hoarding their knowledge rather
knowledge contributors incorporates constructs
than by sharing it (Davenport and Prusak 1998).
from social exchange theory and social capital
theory (see Figure 1). Previous studies have
While the above discussion suggests a negative
emphasized the importance of cost and benefit
relationship between loss of knowledge power and
factors in determining knowledge sharing behavior
EKR usage by knowledge contributors, this rela
(Ba et al. 2001; Markus 2001). Prior research has
tionship may be contingent on pro-sharing norms.
also highlighted the importance of contextual When such norms are strong, the barriers to
social capital factors in influencing the conditions
knowledge transfer witnessed in contexts that
for knowledge sharing (Cohen and Prusak 2001; value personal expertise may be ineffective
Nahapiet and Ghoshal 1998). Therefore, cost (Jarvenpaa and Staples 2000). In such conditions
factors (i.e., loss of knowledge power and codifi when other employees are seen to be sharing
cation effort) and benefit factors (i.e., organiza knowledge, the deterrent effect of the loss of
tional reward, image, reciprocity, knowledge self knowledge power (which is relative to other em
efficacy, and enjoyment in helping others) are ployees) may not be significant. Conversely with
hypothesized to impact EKR usage by knowledge weak pro-sharing norms, knowledge contributors
Costs
Identification
Org
1 ' c
| [ _^ o
Image* _-H4-" r n
Pro-sharing Norms T
I-1 R
Reciprocity _ - H5- B
Pro-sharing Norms ~" ^
may be concerned about loss of knowledge power H2a: Codification effort is negatively related to
when they contribute knowledge to EKRs. EKR usage by knowledge contributors under
conditions of weak generalized trust
HI: Loss of knowledge power is negatively
related to EKR usage by knowledge Codification effort may also be negatively related
contributors under conditions of weak pro to EKR usage by knowledge contributors contin
sharing norms. gent on pro-sharing norms. With strong teamwork
as well as cooperation and collaboration norms,
people tend not to be bothered about the effort
required to contribute knowledge since others may
Codification Effort
be likewise contributing. Conversely, when weak
pro-sharing norms prevail, knowledge contributors
The act of knowledge contribution to EKRs in
tend to be aware of and hindered by the effort
volves explication and codification of knowledge.
required to codify knowledge for EKRs (Orlikowski
This can entail costs to knowledge contributors as
1993). Therefore, knowledge contributors may be
an expense of time and effort (Ba et al. 2001;
deterred by codification effort when pro-sharing
Markus 2001). Effort has been observed to be a norms are weak.
significant predictor of technology adoption
(Agarwal 2000). The time required for codifying
H2b: Codification effort is negatively related to
knowledge can be considered as an opportunity
EKR usage by knowledge contributors under
cost. Orlikowski (1993) reported a situation where
conditions of weak pro-sharing norms.
consultants avoided knowledge contribution due to
high opportunity cost. They were unwilling to use
Further, codification effort may be negatively
the KM system as this would have required them
related to EKR usage by knowledge contributors
to incur non-chargeable hours or give up their
contingent on identification. When identification is
personal time. After contributing knowledge, there
strong, collective concerns may dominate over
may be additional requests for clarification and
certain costs and benefits since collective interests
assistance from knowledge recipients, which take
merge with the individual's own interests (Johnson
up more codification time from knowledge con
et al. 1999). In such situations, knowledge contri
tributors (Goodman and Darr 1998).
butors may not be concerned about their codifi
cation effort in the presence of the collective need
The above arguments suggest a negative relation
for contributing knowledge to EKRs. Conversely,
ship between codification effort and EKR usage by
when identification is weak, codification effort may
knowledge contributors, but this relationship is
become a deterrent to knowledge contribution.
likely to be contingent on generalized trust. Strong
generalized trust implies a general belief in the
H2c: Codification effort is negatively related to
good intent of others (Putnam 1993). When
EKR usage by knowledge contributors under
generalized trust is strong, knowledge contributors conditions of weak identification.
are likely to believe that knowledge recipients
would not misuse their knowledge and would give
them credit for their codification effort. Under such
circumstances, knowledge contributors may be Organizational Reward
confident that their effort would be appreciated and
may not be concerned about the effort they have To encourage EKR usage by knowledge contri
to put in when contributing knowledge to EKRs. butors, organizations may provide various forms of
Conversely, codification effort may become a organizational reward such as increased pay,
deterrent to knowledge contribution when gener bonuses, job security, or career advancement (Ba
alized trust is weak. et al. 2001; Beer and Nohria 2000; Hall 2001).
a benefit for knowledge contributors because they 1999). Knowledge self-efficacy is typically mani
expect future help from others in lieu of their fested in the form of people believing that their
contributions5 (Connolly and Thorn 1990; Kollock knowledge can help to solve job-related problems
1999). Prior research suggests that people who (Constant et al. 1996), improve work efficiency (Ba
share knowledge in online communities believe in et al. 2001), or make a difference to their organi
reciprocity (Wasko and Faraj 2000). Further, zation (Kollock 1999; Wasko and Faraj 2000).
researchers have observed that people who Conversely, if people feel that they lack knowledge
regularly helped others in virtual communities that is useful to the organization, they may decline
Reciprocity (RECP) The belief that current contribution to EKR would lead
knowledge being met (Davenport and Prusak 1998)
Conceptual Validatio
IDEN5) were dr
these questions
Given that the
withquestions
the other
constructs were adapted from
developed for Another
this four
study, all g
subjected to a two-stage
second stage co
(s
exercise sorter
based on was g
procedu
Moore and printed (1991)
Benbasat on car
dents vious
participated in stage,
the t
firs
sorting) as definitions
sorters. Each of
sortt
questions questions
printed on by
cards
had the to
questions
construct sort
by
categ
tions together Apart
and from
giving t
a
related questions
IMAG4)(which
that m w
This process allhelped to corr
sorters iden
worded questions.
the The
intendedlabel
c
sorters for questions
the constructswer
closely to the names
from theof th
sorte
Overall, the procity
four sorters (RECP
corre
86 percent ofonthe question
suggestions
constructs desirable
(see Table to On
2). ha
image (IMAG5) per
and construct
pro-shari
and two additional
questions for ques
identi
the organizational
been using EKRs as knowledge contributors for mechanisms sur
KM initiatives.
2.5 years. They used information technology These similaritie
extensively in the course of their responses
work. from the 10 organization
for data analysis.
All organizations surveyed used EKRs as a critical
component of their KM initiative. For instance one
organization in the education sector used a Lotus
Data
Notes-based EKR to store student Analysis
counseling and Resu
case studies and project reviews. Another organi
zation in the real estate sector The
usedconstructs
their Lotus were first assessed
Notes-based system for storing andcase studies,
validity. After ascertaining that
project reviews, and lessons learned
could (after
meetaction
parametric requirement
reviews). All EKRs studied were sion
mainly test, theto
used hypotheses were
store project reviews, case studies,
moderated lessons
multiple regression anal
learned, and best practices. The contents
tical testsof the carried out at a 5 p
were
significance.
EKRs were in the form of documents (Word or pdf
format) and presentations (PowerPoint format).
Keywords and other metadata were used to index
and retrieve the content. Therefore, the contents
Reliability
were fairly structured. The number of EKR and Validity
users
in these organizations varied from about 120 to
The constructs
2,000, while the organization sizes ranged were assessed
from for reliability using
Cronbach's
about 250 to 2,500. All organizations alpha (Cronbach
provided KM 1951). Nunnally
(1978) suggested
training and incentives for knowledge that a value of at least 0.70
sharing.
indicated adequate
There was also top management support for reliability.
KM In order to improve
the reliabilities
initiatives. However, there were no explicit man of the corresponding constructs,
one question
dates for employees to use EKRs was omitted
(or other KMfrom each of the
following constructs:
systems), i.e., EKR usage was voluntary. organizational reward
(OREW1), reciprocity
Information obtained and observations of EKRs (RECP1), pro-sharing norms
during interviews revealed that (PSNM5),
all and
of identification
the 10 (IDEN6). Subse
quently, all of
organizations participating in this survey werethe constructs had adequate
reliability
comparable in terms of their EKR (see Table 5).and
capabilities
The questions were tested for validity using factor Hypotheses Tests
analysis with principal components analysis and
varimax rotation. Convergent validity was as Studies in information systems (e.g., McKeen etal.
1994; Weill and Olson 1989) and in other disci
sessed by checking loadings to see if items within
the same construct correlate highly amongst plines (e.g., Jehn et al. 1999) have used moder
themselves. Discriminant validity was assessed ated multiple regression to test interaction effects.
by examining the factor loadings to see if ques Moderated multiple regression is a hierarchical
tions loaded more highly on their intended procedure that first tests the relationship between
constructs than on other constructs (Cook and independent constructs and the dependent con
Campbell 1979). Loadings of 0.45 to 0.54 are struct, and then tests the relationship between
considered fair, 0.55 to 0.62 are considered good, interaction terms and the dependent construct
0.63 to 0.70 are considered very good, and above (Sharma et al. 1981; Stone and Hollenbeck 1984).
0.71 are considered excellent (Comrey 1973). Interaction terms are computed by multiplying two
independent constructs. A significant change in
Factor analysis yielded 11 components with explanatory power between the two steps, which
eigenvalues above 1 (see Table 6). These 11 can be assessed by looking at the significance of
components corresponded to the 11 constructs. the change in F value, indicates the presence of
Two questions for codification effort (CEFF4 and moderating effects.
CEFF5) tapped onto other constructs and were
omitted. All other questions had at least good In this study, the independent constructs were
loadings on their intended constructs. After entered in the first step of regression and the
omitting the two questions, the reliability of the interaction terms were added in the second step.
codification effort construct improved to 0.91. All interaction terms were assessed simulta
R2 change 0.08
F change 3.23**
*p < 0.05; **p < 0.01, ***p < 0.001
Table 7 summarizes the results of hypotheses community size) were included in a moderated
tests. Loss of knowledge power had no significant multiple regression model together with the 11
relationship with EKR usage even under conditions original constructs. The results demonstrated that
of weak pro-sharing norms, i.e., H1 was not sup the significant main effects and interaction terms
ported. Codification effort had a significant nega remained the same as in Table 7. None of the
tive relationship with EKR usage under conditions control variables had a significant impact on EKR
of weak generalized trust but not under conditions usage. Also, the inclusion of the control variables
of weak pro-sharing norms and weak identification, did not significantly increase the variance ex
i.e., H2a was supported but H2b and H2c were not plained. Therefore, the results of hypotheses tests
supported. Organizational reward had a significant (see Table 7) appeared to be stable and
positive relationship with EKR usage, not under independent of control variables.
conditions of weak pro-sharing norms but under
conditions of strong identification (this was oppo
site to the prediction of hypothesis H3b), i.e., H3a
and H3b were not supported. Image had no Discussion and Implications WM
significant relationship with EKR usage even under
conditions of weak pro-sharing norms. Hence, H4 Based on our findings, loss of knowledge power
was not supported. Reciprocity had a significant did not significantly affect EKR usage by knowl
positive relationship with EKR usage under con edge contributors, not even under conditions of
ditions of weak pro-sharing norms, i.e., H5 was weak pro-sharing norms. This may be due to the
supported. Knowledge self-efficacy and enjoyment fact that knowledge contribution is voluntary in the
in helping others had significant positive relation organizations surveyed in this study. Under such
ships with EKR usage, i.e., H6 and H7 were circumstances, knowledge contributors can decide
supported. what to contribute to EKRs. Hence, they need not
fear that their knowledge contribution would render
The standardized coefficients in Table 7 indicate them less valuable to the organization. The
that, relatively, enjoyment in helping others had the respondents of this survey are actively partici
strongest impact on EKR usage by knowledge pating in the creation or acquisition of new knowl
contributors followed by knowledge self-efficacy edge in the course of their work. Thus, they can
and organizational rewards (both directly and remain valuable to the organization even after
moderated by identification). Codification effort contributing knowledge to EKRs. Another plau
moderated by generalized trust and reciprocity sible explanation for this result is self-selection
moderated by pro-sharing norms had the least among the survey respondents. Knowledge contri
impact among the significant determinants of EKR butors who responded to this survey may also be
usage by knowledge contributors. those who are more likely to contribute their
knowledge to EKRs. These knowledge contri
butors may tend to be less concerned about the
loss of knowledge power.
Control Variables
The relationship between codification effort and
Further analysis was carried out to make sure the EKR usage by knowledge contributors was
significant results were not due to covariation with contingent on generalized trust. As hypothesized,
control variables. Previous literature suggests that when generalized trust is strong, codification effort
gender (Jarvenpaa and Staples 2000), age may not be a deterrent for EKR usage by knowl
(Jarvenpaa and Staples 2000), work experience edge contributors. However, the relationship
(Constant et al. 1994), and education (Constant et between codification effort and EKR usage by
al. 1994) may affect knowledge contribution knowledge contributors was not contingent on pro
behavior. EKR user community size may also sharing norms and identification. Therefore, even
influence EKR usage. These control variables when there are norms of collaboration and
(age, gender, education, work experience, and cooperation or when the interests of people are
aligned with those of the organization, such when pro-sharing norms are weak. Prior literature
contextual factors do not impact the relationship suggests that increased recognition by colleagues
between codification effort and EKR usage by or the organizational community can be an impor
knowledge contributors. The existing literature (Ba tant motivator for employees to contribute their
et al. 2001; Goodman and Darr 1998) has dis knowledge (Constant et al. 1994; Hall 2001;
cussed the deterrent effect of codification effort on Kollock 1999; O'Dell and Grayson 1998). How
knowledge contribution. The findings of this study ever, ourfindings suggest that future research may
extend the previous literature by revealing that the want to further examine the role of pro-sharing
relationship between codification effort and norms in relation to image as a motivator for
knowledge contribution to EKRs is salient when knowledge contribution.
generalized trust is weak.
The relationship between reciprocity and EKR
The relationship between organizational reward usage by knowledge contributors was contingent
and EKR usage by knowledge contributors was on pro-sharing norms. As hypothesized, when
both direct and contingent on identification. pro-sharing norms are strong and there is a
Contrary to hypothesis H3b, this relationship climate of collaboration and cooperation, knowl
appears to be stronger when identification is edge contributors do not look for reciprocity when
strong, i.e., when knowledge contributors to EKR contributing their knowledge to EKRs. However,
share the same interests as the organization, they when pro-sharing norms are weak, reciprocity
tend to be more motivated by organizational benefit is a motivator for knowledge contribution to
rewards. It appears that if knowledge contributors EKRs. This finding extends prior literature
do not share the interests of the organization, even (Connolly and Thorn 1990; Kollock 1999) by
organizational reward may not motivate them to indicating that the relationship between reciprocity
contribute their knowledge to EKRs. The relation and EKR usage by knowledge contributors is
ship between organizational reward and EKR significant when pro-sharing norms are weak.
usage was not contingent on pro-sharing norms.
Several organizations have used organizational Knowledge self-efficacy significantly impacted EKR
reward (Ba et al. 2001; Beer and Nohria 2000; Hall usage by knowledge contributors. As hypothe
2001) to build up pro-sharing norms among their sized, when people are confident of their ability to
employees. Being used to obtaining organiza contribute knowledge that would be useful to the
tional reward, knowledge contributors may organization, they tend to be more motivated to do
continue to expect such rewards for knowledge so through EKRs. This result is consistent with
contribution to EKRs even after pro-sharing norms previous KM experiments (Constant et al. 1996)
have developed. The findings of this study extend and conceptual articles (Ba et al. 2001). Enjoy
prior literature by revealing that the relationship ment in helping others also significantly affected
between organizational reward and EKR usage by EKR usage by knowledge contributors. As hypoth
knowledge contributors is most significant when esized, when people feel good about contributing
identification is strong. knowledge to help others, they tend to be more
motivated to do so through EKRs. Again, this
Image did not significantly affect EKR usage by result is consistent with previous KM conceptual
knowledge contributors, not even under conditions (Ba et al. 2001) and case study literature
of weak pro-sharing norms. This may be due to (Davenport and Prusak 1998) highlighting altruism
the dual effects of pro-sharing norms. On one as a motivator for knowledge sharing.
hand, strong teamwork and collaboration norms
may reduce the need for improved image as a
motivator for knowledge contribution to EKRs. On
the other hand, strong error tolerance and diversity Implications for Theory
norms may enhance the need for this benefit since
the risk of making mistakes during contribution are This study advances theoretical development in
lessened. The converse dual effects may occur the area of KM in general and EKRs in particular.
??^
Costs
Codification effort
I-:-1>Tma*-~ ~* KNOWLEDGE
Reciprocity __^? "u-'?
Pro-sharing Norms ^^ CONTRIBUTORS
- 0.25*** s'
Intrinsic Benefits
I-1 ^ /^ R2 = 0.52
I-1 ^ 0.43*** ^^ ^
Knowledge Self-efficacy ^ ^
^????^?_^_^^____^______________________________________________________
butors. The fostering of intrinsic benefits alone edge self-efficacy among valued knowledge
may be sufficient to motivate knowledge contri contributors by indicating to them that their
butors to contribute their knowledge to EKRs, in knowledge contribution makes a significant dif
many contexts (different combinations of con ference to the organization. This can be done by
textual factors). The impact of cost factors (codifi highlighting the improved organizational perfor
cation effort) appears to be moderated by mance arising from their knowledge contributions.
contextual factors (generalized trust). This implies Organizations such as Amazon.com regularly
that measures to alleviate the costs of knowledge recognize their top reviewers, serving as a way to
contribution to EKRs may only be necessary in enhance the self-efficacy of these knowledge
specific contexts. For example, it may be useful to contributors.
reduce codification effort when generalized trust is
weak but it may not be necessary to do this when Second, management can attempt to raise the
generalized trust is strong. In summary, three level of enjoyment that knowledge contributors
contextual factors that have been found to be experience as they help others. This may be done
important are generalized trust, pro-sharing norms, by connecting knowledge contributors and knowl
and identification. edge recipients in order to allow recipients to
express their appreciation for the knowledge
Apart from identifying factors that determine EKR received. The realization that their colleagues
usage by knowledge contributors, this study also have benefitted from their knowledge contribution
contributes to theory by unveiling factors that do can increase the feeling of altruism among
not appear to impact EKR usage by knowledge knowledge contributors (Davenport and Prusak
contributors. For example, the loss of knowledge 1998). As a way of motivating knowledge contri
power is thought to be a barrier to knowledge butors, knowledge seekers can be rewarded for
contribution. However, in our study, this is not a finding solutions from EKRs and acknowledging
significant concern for knowledge contributors to the sources of the solutions. The Most Valuable
EKR. As another example, image is considered as Professionals Program at Microsoft Corporation is
a motivator for knowledge contribution. However, an example of an initiative that raises altruism (and
our findings show that knowledge contributors to community spirit) in this way. Through this pro
EKR may not be concerned about the image gram, people who have provided useful technical
associated with knowledge contribution. These assistance to other users of Microsoft technology
results suggest that future research should take a are identified and informed that they have helped
closer look at how power and image are perceived others (Microsoft 2002).
by knowledge contributors. Besides identifying the
constructs that can or cannot predict EKR usage Third, organizational reward (such as better work
by knowledge contributors, this study also under assignment, promotion incentive, salary incentive,
takes a rigorous conceptual and empirical process bonus incentive, or job security) seems to be
to develop measures for each of these constructs. effective for encouraging EKR usage by knowl
edge contributors. Organizations have used
various forms of organizational reward to
encourage employees to contribute their knowl
Implications for Practice edge to EKRs. For example, IBM Global Services
introduced schemes to identify and reward specific
Collectively, the results of this study indicate the instances of knowledge contribution (Berry 2000).
circumstances under which organizational mea Organizational reward appears to be particularly
sures to promote knowledge contribution to EKRs effective under conditions of strong identification.
may be more effective. These results offer sug Thus, to build a critical mass of knowledge
gestions to management about how to promote contributors, management can offer organizational
EKR usage by knowledge contributors. First, reward and publicize such reward first among
management can raise the perceptions of knowl employees, groups, or business units whose
interests are known to align with those of the other's knowledge. Such practices are adhered to
organization. in exemplar KM organizations such as Buckman
Laboratories (Buckman 2004).
Fourth, management can raise the perceptions of
reciprocity benefit among knowledge workers by The fact that enjoyment in helping others is the
highlighting situations where requests for help from most important motivator for contributors to EKRs
knowledge contributors have been promptly followed by knowledge self-efficacy and organi
answered. Valued knowledge contributors can be zational rewards (both directly and moderated by
asked to testify in KM events about how they have identification) implies a priority for the managerial
benefitted from the knowledge contribution of recommendations outlined above. For example,
others. Reciprocity appears to be particularly measures to increase enjoyment in helping others
important when pro-sharing norms are weak. may be more effective in terms of encouraging
Alternatively, management can strengthen pro EKR contributors than organizational rewards and,
sharing norms to reduce the necessity of reci therefore, should be given higher priority.
procity benefit for knowledge contributors to EKR. Similarly, the measures to increase reciprocity
Organizations have successfully promoted pro benefits and reduce codification effort may be of
sharing norms through a variety of means. For lower priority in motivating contributions to EKRs.
example, at British Petroleum open office spaces
helped employees to more easily consult each
other (Chiem 2001). General Electric transfers its
employees between departments to promote pro Limitations and Future Studies
sharing norms (Dzinkowski 2001).
Results of this study must be interpreted in the
Finally, management can reduce codification effort context of its limitations. First, the use of cross
by deploying KM systems (including EKRs) that sectional data and regression analysis do not allow
facilitate entry of knowledge and thereby reduce the possibility of bidirectional (feedback) effects to
the time and effort needed to codify knowledge. be explored. For instance, the effects of EKR
Commercially available KM systems provide usage on subsequent perceptions of cost and
capabilities that prompt for knowledge and auto benefit factors by knowledge contributors has been
matically organize the knowledge captured to recognized but cannot be examined. Future
reduce codification effort. Examples are taxonomy studies can collect longitudinal data to assess
generators, classifiers, and clustering engines such bidirectional (feedback) effects.
available from companies such as Autonomy and
Verity. KM systems may be designed to allow Second, based on a sample of 150 respondents,
more natural forms of knowledge contribution (e.g., several significant results have been obtained.
audio or video) as opposed to purely text However, a larger sample that brings more statis
contributions. Besides trying to reduce the time tical power would have allowed more sophisticated
and effort needed to codify knowledge, manage statistical analysis. With such samples, future
ment can also allocate time for employees to share studies can test a second-order model using struc
knowledge by integrating this activity into regular tural equation modeling techniques. Cost and
work processes. Such a practice has been benefit can be modeled as second-order con
common in consultancy firms like Accenture structs with the various cost and benefit factors as
(Hansen et al. 1999). Codification effort appears formative indicators. Such a model would allow a
to be a salient barrier when generalized trust is more rigorous test of the constructs from social
weak. Hence, when it is difficult to deploy KM exchange theory.
systems that facilitate codification efforts, manage
ment can raise the level of generalized trust. This Third, our research model was empirically tested
can be done by giving due credit for knowledge based on the responses of knowledge contributors
contributions and ensuring appropriate usage of from 10 public organizations in Singapore. Since
the manner of operation and culture of public and tual) factors, this model
private (for-profit) organizations in Singapore is not power when compared to
substantially different, the results of our study are broader sense, this study d
potentially generalizable to private organizations of using social exchange th
with KM initiatives. However caution must be theory to account for th
exercised when attempting to generalize the technologies (which include
results across a range of organizations operating KM systems). Besides con
in varied contexts. Future studies can replicate building in the area of KM
this study using our revised research model (see particular, the results of th
Figure 2) in other contexts. For example, a similar implications to KM practitio
research approach can be used to investigate EKR
usage by knowledge seekers. Other forms of KM In a future characterized by
systems (such as those supporting the personali effective leverage of org
zation strategy) can also be studied in a similar would be a factor different
way. In addition, our revised research model can from less successful org
be tested with respondents from different organi toward facilitating knowled
zational settings to assess the external validity of contributions to EKRs need
the results. organizations invest m
initiatives, it is imperative
Fourth, future research can extend our revised initiatives and KM systems
theoretical model (see Figure 2) to account for the continue to generate finding
remaining unexplained variance in EKR usage by
knowledge contributors. To extend the revised
theoretical model, additional theoretical perspec
References
tives such as the technology acceptance model
(Davis 1989) and the task-technology fit model
Adler, P. S. "Market, Hier
(Goodhue and Thompson 1995) may be incor
Knowledge Economy a
porated. The technology acceptance model can
Capitalism," Organization
help to better account for the ease of use and
pp. 215-234.
usefulness of EKRs. The task-technology fit
Agarwal, R. "Individual Acce
model can help to better explain the effects of
Technologies," in Framin
knowledge type on knowledge contribution to
Management: Projecting th
EKRs. Additionally, the use of concepts from the Past, R. W. Zmud (Ed.),
organizational memory information systems litera Resources, Cincinnati, O
ture (e.g., Stein and Zwass 1995) may enable Aiken, L. S., and West, S. G
researchers to investigate specific subsystems of Testing and Interpretin
EKRs as well as the KM activities associated with
Publications, Newbury Par
these subsystems. Alavi, M. "Managing Organ
in Framing the Domains
Projecting the Future thr
Zmud (Ed.), Pinnaflex Ed
Conclusion i Cincinnati, OH, 2000, pp.
Alavi, M., and Leidner, D. E
This study develops and tests
menta theoretical
Systems: model
Issues, C
that explains how cost and benefit
fits," factors can of
Communications
37.
impact EKR usage by knowledge contributors, and
the contexts under which these
Alavi, M., and Leidner, D. effects may
E. "Review: Knowledge
operate. By encompassing Management
individual and Knowledge Management
level (cost
Systems: Conceptual level
and benefit) factors and community Foundations and Re
(contex
search Issues," MIS Quartedy (25:1), 2001, pp. Cohen, D., and Prusak, L. In Good Company:
107-136. How Social Capital Makes Organizations Work,
Ba, S., Stallaert, J., and Whinston, A. B. Harvard Business School Press., Boston, 2001
"Research Commentary: Introducing a Third Coleman, J. Foundations of Social Theory,
Dimension in Information Systems Design?The Harvard University Press, Cambridge, MA,
Case for Incentive Alignment," Information Sys 1990.
tems Research (12:3), 2001, pp. 225-239. Comrey, A. L. A First Course in Factor Analysis,
Babcock, P. "Shedding Light on Knowledge Academic Press, NewYork, 1973.
Management," HR Magazine (49:5), 2004, pp. Connolly, T., and Thorn, B. K. "Discretionary
46-50. Databases: Theory, Data, and Implications," in
Bandura, A. Social Foundations of Thought and Organizations and Communication Technology.
Action: A Social Cognitive Theory, Prentice J. Fulk and C. Steinfield (Eds.), Sage Publi
Hall, Englewood Cliffs, NJ, 1986. cations, Newbury Park, CA, 1990, pp. 219-233.
Baumeister, R. F. "A Self-Presentational View of Constant, D., Kiesler, S., and Sproull, L. "What's
Social Phenomena," Psychological Bulletin Mine Is Ours or Is It? A Study of Attitudes
(91:1), 1982, pp. 3-26. about Information Sharing," Information
Beer, M., and Nohria, N. "Cracking the Code of Systems Research (5:4), 1994, pp. 400-421.
Change," Harvard Business Review (78:3), Constant, D., Sproull, L., and Kiesler, S. "The
2000, pp. 133-141. Kindness of Strangers: The Usefulness of
Electronic Weak Ties for Technical Advice,"
Berry, J. "Employees Cash in on KM?Knowledge
Organization Science (7:2), 1996, pp. 119-135.
Management Programs Pay Rewards to Share
Cook, M., and Campbell, D. T. Quasi-Experimen
Ideas," Internetweek (814), 2000, pp. 45-46.
tation: Design and Analysis Issues for Field
Blau, P. M. Exchange and Power in Social Life,
Settings, Houghton Mifflin, Boston, 1979.
John Wiley, NewYork, 1964.
Cronbach, L. J. "Coefficient Alpha and the Internal
Bock, G. W., and Kim, Y. G. "Breaking the Myths
Structure of Tests," Psychometrika (16), 1951,
of Rewards: An Exploratory Study of Attitudes
pp. 297-334.
about Knowledge Sharing," Information
Cross, R., and Baird, L. "Technology Is Not
Resource Management Journal (15:2), 2002,
Enough: Improving Performance by Building
pp. 14-21.
Organizational Memory," Sloan Management
Bock, G. W., Zmud, R. W., Kim, Y. G., and Lee,
Review (4V.3), 2000, pp. 69-78.
J. N. "Behavioral Intention Formation in Knowl
Davenport, T. H., De Long, D. W., and Beers, M.
edge Sharing: Examining the Roles of Extrinsic
C. "Successful Knowledge Management Pro
Motivators, Social-Psychological Forces, and jects," Sloan Management Review (39:2), 1998,
Organizational Climate," MIS Quarterly (29:1), pp. 43-57.
March 2005, pp. 87-111. Davenport, T. H., and Prusak, L. Working Knowl
Brown, J. S., and Duguid, P. "Organizational edge: How Organizations Manage What They
Learning and Communities of Practice," Organi Know, Harvard Business School Press, Boston,
zation Science (2:1), 1991, pp. 40-57. 1998.
Buckman, R. H. Building a Knowledge-Driven Davis, F. D. "Perceived Usefulness, Perceived
Organization, McGraw Hill, NewYork, 2004. Ease of Use, and User Acceptance of Informa
Cheney, G. "On the Various and Changing tion Technology," MIS Quarterly (13:3), 1989,
Meanings of Organizational Membership: A pp. 319-341.
Field Study of Organizational Identification," Deci, E. L., and Ryan, R. M. "The Empirical
Communication Monographs (50), 1983, pp. Exploration of Intrinsic Motivational Processes."
342-362. in Advances in Experimental Social Psychology.
Chiem, P. X. "Form Follows Strategy," Knowledge L. Berkowitz (Ed.), Academic Press, NewYork,
Management Magazine, October 2001 (avail 1980, pp. 39-80.
able online at http://www.destinationkm.com/ Dooley, D. Social Research Methods, Prentice
articles/default.asp?ArticlelD=369). Hall, Upper Saddle River, NJ, 2001.
Dzinkowski, R. "Removing Boundaries to Hickson, D. J., Hinings, C. R., Lee, C. A., Schenk,
Learning," Knowledge Management Magazine, R. E., and Pennings, J. M. "A Strategic Con
May 2001 (available online at http://www. tingencies Theory of Interorganizational Power,"
destinationkm.com/articles/default.asp7Article Administrative Sciences Quarterly (16:2), 1971,
ID=240). pp. 216-229.
Falk, R. F., and Miller, N. B. A Primer for Soft Igbaria, M., Parasraman, S., and Baroudi, J. J. "A
Modeling, University of Akron Press, Akron, Motivational Model of Microcomputer Usage,"
OH, 1992. Journal of Management Information Systems
Fulk, J., Flanagin, A., Kalman, M., Monge, P. R., (13:1), 1996, pp. 127-143.
and Ryan, T. "Connective and Communal Jarvenpaa, S. L., and Staples, D. S. "The Use of
Public Goods in Interactive Communication Collaborative Electronic Media for Information
Systems," Communication Theory (6:1), 1996, Sharing: An Exploratory Study of Determi
pp. 60-87. nants," Journal of Strategic Information Sys
Goodman, P. S., and Darr, E. D. "Computer tems (9:2/3), 2000, pp. 129-154.
Aided Systems and Communities: Mechanisms Jehn, K. A., Northcraft, G. B., and Neale, M. A.
for Organizational Learning in Distributed (1999). "Why Differences Make a Difference: A
Environments," MIS Quarterly (22:4), 1998, pp. Field Study of Diversity, Conflict, and Perfor
417-440. mance in Workgroups," Administrative Science
Goodhue, D. L., and Thompson, R. L. "Task Quarterly (44:4), 1999, pp. 741-763.
Technology Fit and Individual Performance," Johnson, W. L., Johnson, A. M., and Heimberg, F.
MIS Quarterly (19:2), 1995, pp. 213-236. "A Primary and Second Order Component
Gray, P. H. "The Impact of Knowledge Reposi Analysis of the Organizational Identification
tories on Power and Control in the Workplace," Questionnaire," Educational and Psychological
Information Technology and People (14:4), Measurement (59:1), 1999, pp. 159-170.
2001, pp. 368-384. Kalman, M. E. The Effects of Organizational
Green, G. I. "Perceived Importance of Systems Commitment and Expected Outcomes on the
Analyst's Job Skills, Roles and Non-Salary Motivation to Share Discretionary Information in
Incentives," MIS Quarterly (13:2), 1989, pp. a Collaborative Database: Communication
115-133. Dilemmas and Other Serious Games, unpub
Grover, V., and Davenport, T. H. "General Per lished Ph.D. Thesis, University of Southern
spectives on Knowledge Management: Fos California, Los Angeles, CA, 1999.
tering a Research Agenda," Journal of Manage Kim, J., and Mueller, C. W. Factor Analysis:
ment Information Systems (18:1), 2001, pp. 5 Statistical Methods and Practical Issues, Sage
21. Publications, Newbury Park, CA, 1981.
Hall, H. "Social Exchange for Knowledge Kollock, P. "The Economies of Online Coopera
Exchange," paper presented at Managing tion: Gifts and Public Goods in Cyberspace," in
Knowledge: Conversations and Critiques, Uni Communities in Cyberspace, M. Smith and P.
versity of Leicester Management Centre, April Kollock (Eds.), Routledge, NewYork, 1999, pp.
10-11,2001 (available online at http://www.soc. 220-239.
napier.ac.uk/publication/op/getpublication/ Krebs, D. L. "Empathy and Altruism," Journal of
publicationid/321908). Personality and Social Psychology (32:6), 1975,
Hansen, M. T., Nohria, N., and Tierney, T. pp. 1132-1146.
"What's Your Strategy for Managing Knowl Leonard-Barton, D. Wellsprings of Knowledge:
edge?," Harvard Business Review (77:2), 1999, Building and Sustaining the Source of Innova
pp. 106-116. tion, Harvard Business School Press, Boston,
Hargadon, A. B. "Firms as Knowledge Brokers: 1995.
Lessons in Pursuing Continuous Innovation," Liebowitz, J., and Beckman, T. Knowledge
California Management Review (40:3), 1998, Organizations: What Every Manager Should
pp. 209-227. Know, CRC Press, Boca Raton, FL, 1998.
mation Systems, Communications of the ACM, in Computer Science from the University of York
Decision Support Systems, European Journal of (United Kingdom). He is on leave from the
Information Systems, IEEE Transactions on National University of Singapore, where he is pro
Engineering Management, IEEE Transactions on fessor in the Department of Information Systems.
Professional Communication, IEEE Transactions He is past President of the Association for Infor
on Systems, Man, and Cybernetics, Information mation Systems. He has served on the editorial
and Management, Information Systems Research, boards of MIS Quarterly and Information Systems
International Journal of Human-Computer Studies, Research. His research has been published in
Journal of Management Information Systems, ACM Transactions on Computer-Human Interac
Journal of the AIS, Journal of the American tion, ACM Transactions on Information Systems,
Society for Information Science and Technology, European Journal of Information Systems, IEEE
Management Science and MIS Quarterly. His Transactions on Systems, Man, and Cybernetics,
current research focuses on cross-cultural issues, Information Systems Research, International
computer-mediated communication, knowledge Journal of Human-Computer Studies, Journal of
management, and information privacy. Management Information Systems, Journal of the
AIS, MIS Quarterly, and Management Science.
Kwok-Kee Wei is Chair Professor and Head of the His research focuses on computer-mediated com
Department of Information Systems at City munication, innovation and knowledge manage
University of Hong Kong. He received his D.Phil. ment, and human-computer interaction.
Appendix
Survey Items ^ H
Construct Item Wording
Sharing my knowledge throu
lose my unique value in the or
Sharing my knowledge throu
lose my power base in the or
Sharing my knowledge throug
lose my knowledge that make
(LOKP) respect to othe
Sharing my knowledge throu
lose my knowledge that no on
I do not have the time to enter
EKRs (CEFF1) Or
It is laborious to codify my k
(CEFF2) Orliko
f The effort is high for me to
Effort int0 EKRs (C
?_._. I am worried that if I shar
* EKRs, I will have to spend
answering follow up que
I am afraid that my submission
additional clarifications or req
(CEFF5) (1998)
It is important to get a better wo
I share my knowledge throu
It is important to be promoted
knowledge through EK
Organizational It is important to ge
Reward my knowledge thro
(OREW) It is important to get a h
my knowledge through E
It is important to get more job s
my knowledge through EK
_|_j (1998)_