1,872
Views
217
CrossRef citations to date
0
Altmetric
Original Article

Factors Affecting Bloggers' Knowledge Sharing: An Investigation Across Gender

, &
Pages 309-342 | Published online: 09 Dec 2014

References

  • Agarwal, R., and Karahanna, E. Time flies when you're having fun: Cognitive absorption and beliefs about information technology usage. MIS Quarterly, 24, 4 (2000), 665-694.
  • Ahuja, M. K., and Thatcher, J. B. Moving beyond intentions and toward the theory of trying: Effects of work environment and gender on post-adoption information technology use. MIS Quarterly, 29, 3 (2005), 427-459.
  • Alavi, M., and Leidner, D. E. Review: Knowledge management and knowledge management systems: Conceptual foundations and research issues. MIS Quarterly, 25, 1 (2001), 107-136.
  • Altman, I., and Taylor, D. A. Social Penetration: The Development of Interpersonal Relationships. New York: Holt, Rinehart and Winston, 1973.
  • Anderson, E., and Weitz, B. Determinants of continuity in conventional industrial channel dyads. Marketing Science, 8, 4 (1989), 310-323.
  • Anderson, J. C., and Narus, J. A. A model of distributor firm and manufacturer firm working partnerships. Journal of Marketing, 54, 1 (1990), 42-58.
  • Archer, J. Sex differences in social behavior: Are the social role and evolutionary explanations compatible? American Psychologist, 51, 9 (1996), 909-917.
  • Ariño, A.; De La Torre, J.; and Ring, P. S. Relational quality: Managing trust in corporate alliances. IESE Research Papers, 44, 1 (2001), 109-131.
  • Avram, G. At the crossroads of knowledge management and social software. Electronic Journal of Knowledge Management, 4, 1 (2006), 1-10.
  • Awad, N. F., and Krishnan, M. The personalization privacy paradox: An empirical evaluation of information transparency and the willingness to be profiled online for personalization. MIS Quarterly, 30, 1 (2006), 13-28.
  • Banerjee, S.; Kang, H.; Bagchi-Sen, S.; and Rao, H. Gender divide in the use of the Internet applications. International Journal of E-Business Research, 1, 2 (2005), 24-39.
  • Barclay, D.; Higgins, C.; and Thompson, R. The partial least squares (PLS) approach to causal modeling: Personal computer adoption and use as an illustration. Technology Studies, 2, 2 (1995), 285-309.
  • Baron, R. M., and Kenny, D. A. The moderator-mediator variable distinction in social psychological research: Conceptual, strategic and statistical considerations. Journal of Personality and Social Psychology, 51, 6 (1986), 1173-1182.
  • Bartel Sheehan, K. An investigation of gender differences in on-line privacy concerns and resultant behaviors. Journal of Interactive Marketing, 13, 4 (1999), 24-38.
  • Benenson, J. F. Gender differences in social networks. Journal of Early Adolescence, 10, 4 (1990), 472-495.
  • Ben-Ner, A.; Putterman, L.; Kong, F.; and Magan, D. Reciprocity in a two-part dictator game. Journal of Economic Behavior & Organization, 53, 3 (2004), 333-352.
  • Blau, P. M. Exchange and Power in Social Life. Piscataway, NJ: Transaction Publishers, 1992.
  • Bock, G.-W.; Zmud, R. W.; Kim, Y. G.; and Lee., J. N. Behavioral intention formation in knowledge sharing: Examining the roles of extrinsic motivators, social-psychological forces, and organizational climate. MIS Quarterly, 29, 1 (2005), 87-111.
  • Booth, A. Sex and social participation. American Sociological Review, 37 (April 1972), 183-192.
  • Brown, H. G.; Poole, M. S.; and Rodgers, T. L. Interpersonal traits, complementarity, and trust in virtual collaboration. Journal of Management Information Systems, 20, 4 (Spring 2004), 115-138.
  • Chai, S., and Kim, M. What makes bloggers share knowledge? An investigation on the role of trust. International Journal of Information Management, 30, 5 (2010), 408-415.
  • Chai, S.; Lee., J.; and Rao., H. Managing private information safety on blogs. Paper presented at the Second Secure Knowledge Management Workshop, Brooklyn, NY, September 28-92, 2006.
  • Chellappa, R. K., and Sin, R. G. Personalization versus privacy: An empirical examination of the online consumer's dilemma. Information Technology and Management, 6, 2 (2005), 181-202.
  • Child, J. Trust—The fundamental bond in global collaboration. Organizational Dynamics, 29, 4 (2001), 274-288.
  • Chin, W. W. The partial least squares approach for structural equation modeling. In G. A. Marcoulides (ed.), Modern Methods for Business Research. London: Lawrence Erlbaum, 1998, pp. 295-330.
  • Chin, W. W., and Gopal, A. Adoption intention in GSS: Relative importance of beliefs. ACM SIGMIS Database, 26, 2-3 (1995), 42-64.
  • Chin, W. W.; Marcolin, B. L.; and Newsted, P. R. A partial least squares latent variable modeling approach for measuring interaction effects: Results from a Monte Carlo simulation study and an electronic-mail emotion/adoption study. Information Systems Research, 14, 2 (2003), 189-217.
  • Chiu, C.-M.; Hsu, M.-H.; and Wang, E. T. G. Understanding knowledge sharing in virtual communities: An integration of social capital and social cognitive theories. Decision Support Systems, 42, 3 (2006), 1872-1888.
  • Choudhury, V., and Karahanna, E. The relative advantage of electronic channels: A multidimensional view. MIS Quarterly, 32, 1 (2008), 179-200.
  • Chow, W. S., and Chan, L. S. Social network, social trust and shared goals in organizational knowledge sharing. Information & Management, 45, 7 (2008), 458-465.
  • Clark, M., and Ayers, M. Friendship similarity during early adolescence: Gender and racial patterns. Journal of Psychology, 126, 4 (1992), 393-406.
  • Coleman, J. S. Social capital in the creation of human capital. American Journal of Sociology, 94, Supplement (1988), 95-120.
  • Collins, H. M. Tacit knowledge, trust and the Q of sapphire. Social Studies of Science, 31, 1 (2001), 71-85.
  • Culnan, M. J., and Armstrong, P. K. Information privacy concerns, procedural fairness, and impersonal trust: An empirical investigation. Organization Science, 10, 1 (1999), 104-115.
  • Davenport, T. H., and Prusak, L. Working Knowledge: How Organizations Manage What They Know. Boston: Harvard Business School Press, 2000.
  • Doney, P. M.; Cannon, J. P.; and Mullen, M. R. Understanding the influence of national culture on the development of trust. Academy of Management Review, 23, 3 (1998), 601-620.
  • Eagly, A., and Wood, W. Explaining sex differences in social behavior: A meta-analytic perspective. Personality & Social Psychology Bulletin, 17, 3 (1991), 306-315.
  • Falk, A., and Fischbacher, U. A theory of reciprocity. Games and Economic Behavior, 54, 2 (2006), 293-315.
  • Fornell, C., and Larcker, D. F. Evaluating structural equation models with unobservable variables and measurement error. Journal of Marketing Research, 18, 1 (1981), 39-50.
  • Friedman, B.; Kahn, P. H., Jr.; and Howe, D. C. Trust online. Communications of the ACM, 43, 12 (2000), 34-40.
  • Gefen, D. E-commerce: The role of familiarity and trust. Omega, 28, 6 (2000), 725-737.
  • Gefen, D., and Ridings, C. If you spoke as she does, sir, instead of the way you do: A sociolinguistics perspective of gender differences in virtual communities. ACM SIGMIS Database, 36, 2 (2005), 78-92.
  • Gefen, D., and Straub, D. W. Gender differences in the perception and use of e-mail: An extension to the technology acceptance model. MIS Quarterly, 21, 4 (1997), 389-400.
  • Gefen, D.; Karahanna, E.; and Straub, D. W. Trust and TA M in online shopping: An integrated model. MIS Quarterly, 27, 1 (2003), 51-90.
  • Guo, X.; Vogel, D.; Zhou, Z.; Zhang, X.; and Chen, H. Chaos theory as a lens for interpreting blogging. Journal of Management Information Systems, 26, 1 (Summer 2009), 101-128.
  • Haenlein, M., and Kaplan, A. M. A beginner's guide to partial least squares analysis. Understanding Statistics, 3, 4 (2004), 283-297.
  • He, W.; Qiao, Q.; and Wei, K. K. Social relationship and its role in knowledge management systems usage. Information & Management, 46, 3 (2009), 175-180.
  • Hoffman, D. L.; Novak, T. P.; and Peralta, M. Building consumer trust online. Communications of the ACM, 42, 4 (1999), 80-85.
  • Hollis, M. Trust with Reason. Cambridge: Cambridge University Press, 1998.
  • Hoover, J. N. Most business tech pros wary about Web 2.0 tools in business. InformationWeek (February 24, 2007) (available at www.informationweek.com/news/197008457/
  • Howcroft, D., and Trauth, E. M. The implications of a critical agenda in gender and IS research. Information Systems Journal, 18, 2 (2008), 185-202.
  • Hsu, C. L., and Lin, J. C. C. Acceptance of blog usage: The roles of technology acceptance, social influence and knowledge sharing motivation. Information & Management, 45, 1 (2008), 65-75.
  • Hsu, M. H.; Ju, T. L.; Yen, C. H.; and Chang, C.-M. Knowledge sharing behavior in virtual communities: The relationship between trust, self-efficacy, and outcome expectations. International Journal of Human-Computer Studies, 65, 2 (2007), 153-169.
  • Huber, G. P. Transfer of knowledge in knowledge management systems: Unexplored issues and suggested studies. European Journal of Information Systems, 10, 2 (2001), 72-79.
  • Jackson, A.; Yates, J. A.; and Orlikowski, W. Corporate blogging: Building community through persistent digital talk. In R. H. Sprague (ed.), Proceedings of the 40th Annual Hawaii International Conference on System Sciences. Los Alamitos, CA: IEEE Computer Society, 2007.
  • Jacobs, P. E. Wireless and innovation. Lecture delivered to mark the G20 Summit, University Business School, Seoul, South Korea, November 10, 2010.
  • Jarvenpaa, S. L.; Tractinsky, N.; and Saarinen, L. Consumer trust in an Internet store: A cross-cultural validation. Journal of Computer-Mediated Communication, 5, 2 (1999), 1-35.
  • Kankanhalli, A.; Tan, B. C. Y.; and Wei, K. K. Contributing knowledge to electronic knowledge repositories: An empirical investigation. MIS Quarterly, 29, 1 (2005), 113-143.
  • Keil, M.; Tan, B. C. Y.; Wei, K. K.; Saarinen, T.; Tuunainen, V.; and Wassenaar, A. A cross-cultural study on escalation of commitment behavior in software projects. MIS Quarterly, 24, 2 (2000), 299-325.
  • Kim, D. J.; Ferrin, D.; and Rao, H. R. A trust-based consumer decision-making model in electronic commerce: The role of trust, perceived risk, and their antecedents. Decision Support Systems, 44, 2 (2007), 544-564.
  • Kim, D. J.; Song, Y. I.; Braynov, B. S.; and Rao, H. R. A multi-dimensional trust formation model in B-to-C e-commerce: A conceptual framework and content analyses of academia/practitioner perspective. Decision Support Systems, 40, 2 (2005), 143-165.
  • Kumar, R.; Novak, J.; Raghavan, P.; and Tomkins, A. Structure and evolution of blogspace. Communications of the ACM, 47, 12 (2004), 35-39.
  • Larson, A. Network dyads in entrepreneurial settings: A study of governance of exchange relationships. Administrative Science Quarterly, 37, 1 (1992), 76-104.
  • Leimeister, J. M.; Ebner, W.; and Krcmar, H. Design, implementation, and evaluation of trust-supporting components in virtual communities for patients. Journal of Management Information Systems, 21, 4 (Spring 2005), 101-131.
  • Lertpittayapoom, N.; Paul, S.; and Mykytyn, P. A theoretical perspective on effective interorganizational knowledge sharing. In R. H. Sprague (ed.), Proceedings of the 40th Annual Hawaii International Conference on System Sciences. Los Alamitos, CA: IEEE Computer Society, 2007.
  • Levy, M. Web 2.0 implications on knowledge management. Journal of Knowledge Management, 13, 1 (2009), 120-134.
  • Limerick, D.; Cunnington, B.; and Kozmetsky, G. Managing the New Organization: A Blueprint for Networks and Strategic Alliances. San Francisco: Jossey-Bass, 1993.
  • Lin, H. F. Effects of extrinsic and intrinsic motivation on employee knowledge sharing intentions. Journal of Information Science, 33, 2 (2007), 135-149.
  • Lu, H., and Hsiao, K. Gender differences in reasons for frequent blog posting. Online Information Review, 33, 1 (2009), 135-156.
  • Maccoby, E. E. Gender and relationships. American Psychologist, 45, 4 (1990), 513-520.
  • Malhotra, N. K.; Kim, S. S.; and Agarwal, J. Internet users' information privacy concerns (IUIPC): The construct, the scale, and a causal model. Information Systems Research, 15, 4 (2004), 336-355.
  • McKnight, D. H., and Chervany, N. What trust means in e-commerce customer relationships: An interdisciplinary conceptual typology. International Journal of Electronic Commerce, 6, 2 (2002), 35-59.
  • McKnight, D. H.; Choudhury, V.; and Kacmar, C. Developing and validating trust measures for e-commerce: An integrative typology. Information Systems Research, 13, 3 (2002), 334-359.
  • Metzger, M. J. Communication privacy management in electronic commerce. Journal of Computer-Mediated Communication, 12, 2 (2007), 335-361.
  • Murugesan, S. Understanding Web 2.0. IT Professional, 9, 4 (2007), 34-41.
  • Nahapiet, J., and Ghoshal, S. Social capital, intellectual capital, and the organizational advantage. Academy of Management Review, 23, 2 (1998), 242-266.
  • Nardi, B. A.; Schiano, D. J.; Gumbrecht, M.; and Swartz, L. Why we blog. Communications of the ACM, 47, 12 (2004), 41-46.
  • Nicolaou, A. I., and McKnight, D. H. Perceived information quality in data exchanges: Effects on risk, trust, and intention to use. Information Systems Research, 17, 4 (2006), 332-351.
  • Nonaka, I. A dynamic theory of organizational knowledge creation. Organization Science, 5, 1 (1994), 14-37.
  • Ostrom, E. Toward a behavioral theory linking trust, reciprocity and reputation. In E. Ostrom and J. Walker (ed.), Trust and Reciprocity: Interdisciplinary Lessons from Experimental Research. New York: Russell Sage Foundation, 2003.
  • Parameswaran, M., and Whinston, A. B. Research issues in social computing. Journal of the Association for Information Systems, 8, 6 (2007), 336-350.
  • Paul, D. L., and McDaniel, R. R., Jr. A field study of the effect of interpersonal trust on virtual collaborative relationship performance. MIS Quarterly, 28, 2 (2004), 183-227.
  • Pavlou, P. Institution-based trust in interorganizational exchange relationships: The role of online B2B marketplaces on trust formation. Journal of Strategic Information Systems, 11, 3-4 (2002), 215-243.
  • Peng, T. C., and Chou, S. T. iTrustU: A blog recommender system based on multi-faceted trust and collaborative filtering. In Proceedings of the 2009 ACM Symposium on Applied Computing. New York: ACM Press, 2009, pp. 1278-1285.
  • Petronio, S.; Caughlin, J. P.; Braithwaite, D.; and Baxter, L. Communication privacy management theory: Understanding families. In D. O. Braithwaite and L. A. Baxter (ed.), Engaging Theories in Family Communication: Multiple Perspectives. Thousand Oaks, CA: Sage, 2006, pp. 35-49.
  • Qian, H., and Scott, C. R. Anonymity and self-disclosure on weblogs. Journal of Computer-Mediated Communication, 12, 4 (2007), 1428-1451.
  • Qureshi, I., and Compeau, D. Assessing between-group differences in information systems research: A comparison of covariance- and component-based SEM. MIS Quarterly, 33, 1 (2009), 197-214.
  • Ratnasingam, P. Trust in inter-organizational exchanges: A case study in business to business electronic commerce. Decision Support Systems, 39, 3 (2005), 525-544.
  • Ratnasingam, P., and Pavlou, P. A. Technology trust in Internet-based interorganizational electronic commerce. Journal of Electronic Commerce in Organizations, 1, 1 (2003), 17-41.
  • Rempel, J. K.; Holmes, J. G.; and Zanna, M. P. Trust in close relationships. Journal of Personality and Social Psychology, 49, 1 (1985), 95-112.
  • Ridings, C. M.; Gefen, D.; and Arinze, B. Some antecedents and effects of trust in virtual communities. Journal of Strategic Information Systems, 11, 3-4 (2002), 271-295.
  • Salam, A. F.; Iyer, L.; Palvia, P.; and Singh, R. Trust, technology usage and exchange relationship in e-commerce: A comprehensive framework. Communications of the ACM, 48, 2 (2005), 73-77.
  • Sears, D. O. College sophomores in the laboratory: Influences of a narrow data base on social psychology's view of human nature. Journal of Personality and Social Psychology, 51, 3 (1986), 515-530.
  • Sharratt, M., and Usoro, A. Understanding knowledge-sharing in online communities of practice. Electronic Journal of Knowledge Management, 1, 2 (2003), 187-196.
  • Sia, C. L.; Lim, K. H.; Leung, K.; Lee, M. K. O.; Huang, W. W.; and Benbasat, I. Web strategies to promote Internet shopping: Is cultural-customization needed? MIS Quarterly, 33, 3 (2009), 491-512.
  • Silva, L.; Goel, L.; and Mousavidin, E. Exploring the dynamics of blog communities: The case of MetaFilter. Information Systems Journal, 19, 1 (2009), 55-81.
  • Snyder, J.; Carpenter, D.; and Slauson, G. J. Myspace.com—A social networking site and social contract theory. Paper presented at the 2006 Information Systems Education Conference, Dallas, November 2-5, 2006 (available at http://proc.isecon.org/2006/3333/ISECON.2006.Snyder.pdf
  • Sobel, J. Can we trust social capital? Journal of Economic Literature, 40, 1 (2002), 139-154.
  • Staples, D. S., and Webster, J. Exploring the effects of trust, task interdependence and virtualness on knowledge sharing in teams. Information Systems Journal, 18, 6 (2008), 617-640.
  • Tannen, D. You Just Don't Understand: Women and Men in Conversation. New York: Ballantine, 1990.
  • Taylor, W. A. Computer-mediated knowledge sharing and individual user differences: An exploratory study. European Journal of Information Systems, 13, 1 (2004), 52-64.
  • Teo, T.; Srivastava, S.; and Jiang, L. Trust and electronic government success: An empirical study. Journal of Management Information Systems, 25, 3 (Winter 2008-9), 99-132.
  • Trauth, E. M., and Howcroft, D. Critical empirical research in IS: An example of gender and the IT workforce. Information Technology & People, 19, 3 (2006), 272-292.
  • Tsai, W., and Ghoshal, S. Social capital and value creation: The role of intrafirm networks. Academy of Management Journal, 41, 4 (1998), 464-476.
  • Uehara, E. Dual exchange theory, social networks and informal social support. American Journal of Sociology, 3 (November 1990), 521-557.
  • Vance, A.; Elie-dit-Cosaque, C.; and Straub, D. W. Examining trust in information technology artifacts: The effects of system quality and culture. Journal of Management Information Systems, 24, 4 (Spring 2008), 73-100.
  • Venkatesh, V., and Morris, M. G. Why don't men ever stop to ask for directions? Gender, social influence, and their role in technology acceptance and usage behavior. MIS Quarterly, 24, 1 (2000), 115-139.
  • Wagner, C., and Bolloju, N. Supporting knowledge management in organizations with conversational technologies: Discussion forums, weblogs, and wikis. Journal of Database Management, 16, 2 (2005), 1-8.
  • Walker, G.; Kogut, B.; and Shan, W. Social capital, structural holes and the formation of an industry network. Organization Science, 8, 2 (1997), 109-125.
  • Wasko, M. M., and Faraj, S. Why should I share? Examining social capital and knowledge contribution in electronic networks of practice. MIS Quarterly, 29, 1 (2005), 35-57.
  • Westin, A. F. Privacy and Freedom. New York: Athenaeum, 1967.
  • Wu, W., and Sukoco, B. M. Why should I share? Examining consumer's motives and trust on knowledge sharing. Journal of Computer Information Systems, 50, 4 (2010), 11-19.
  • Yli-Renko, H.; Autio, E.; and Sapienza, H. J. Social capital, knowledge acquisition, and knowledge exploitation in young technology-based firms. Strategic Management Journal, 22, 6 (2001), 587-613.
  • Young, O.; Brown, E.; Keitt, T.; Owyang, J.; Koplowitz, R.; and Lo, H. Global enterprise Web 2.0 market forecast: 2007 to 2013. Forrester Research, Cambridge, MA, 2008.
  • Zalta, E. The Stanford Encyclopedia of Philosophy: A university/library partnership in support of scholarly communication and open access. College & Research Libraries News, 67, 8 (2006), 502-504.
  • Zucker, L. Production of trust: Institutional sources of economic structure, 1840-1920. In B. M. Staw and L. L. Cummings (ed.), Research in Organizational Behavior. Greenwich, CT: JAI Press, 1986.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.