Sunteți pe pagina 1din 10

2015 48th Hawaii International Conference on System Sciences

The Impact of Role Conflict, Role Ambiguity, and Locus of Control on


Organizational Knowledge Sharing Practices

Simon Cleveland Timothy J. Ellis


Nova Southeastern University Nova Southeastern University
sc1674@nova.edu ellist@nova.edu

Abstract Furthermore, knowledge transfer success rate is


Knowledge management (KM) literature identifies measured as mediocre 13% among European and US
numerous barriers that inhibit employees knowledge organizations [7]. It seems the problem is not rooted
sharing practices. Presently, there is a research gap in the technology, but in series of factors that
that examines what factors promote such barriers underlie widely accepted knowledge sharing barriers
and their direct impact on knowledge seeking and such as employees poor communication skills, lack
knowledge contributing behaviors via information of time, and lack of trust[8, 9].
and communication technologies (ICTs). To bridge To truly understand this problem it is necessary to
the gap, a content analysis study of 104 KM articles examine the behavioral characteristics of knowledge
identified three contributors to common KM barriers. sharing and determine potential factors that may
A proposed causal model based on the contributors impact these characteristics. For this purpose, the
was tested using structural equation modeling goal of this study is to answer two questions: 1) What
technique on the responses collected from 314 ICT are the potential factors that contribute to the
users. The results demonstrate that role conflict, role common knowledge sharing barriers?, and 2) How do
ambiguity, and locus of control predicted knowledge these factors impact employees use of ICTs for the
seeking and knowledge contributing behaviors via purposes of knowledge seeking and knowledge
ICTs. contributing? A predictive knowledge sharing model
was developed to explain the impact of the proposed
1. Introduction factors on employees knowledge sharing behaviors
via ICTs.
This article builds upon prior research-in-progress
study [1] by expanding the scope, refining the model 2. Knowledge Sharing Process
and providing the final results of the research.
While extant literature demonstrates that Knowledge sharing, the process of continuous
sustainability of competitive advantage for any firm dissemination, absorption, and utilization of
is achieved through the effective dissemination of information among employees for the purposes of
knowledge between employees [2], a gap exists in the integrated learning, consists of two practices:
understanding of how to effectively promote knowledge contributing (donation) and knowledge
knowledge sharing within organizations. For seeking (collection) [10]. Examination of the process
example, a recent study demonstrated that the mere through the prism of these two distinct behavioral
existence of organizational procedures to share blocks will allow an adequate exploration of the
knowledge does not guarantee the occurrence of unique drivers that impact each behavior and a
knowledge sharing. In fact, while 62% of determination of potential contributors to the lack of
organizations report having formal procedures for knowledge sharing success. Furthermore, a set of
documenting experiential knowledge, 89% of their inhibitors (barriers) to each behavior are proposed.
employees never engage in knowledge exchange [3].
Similarly, some studies suggest that information and 2.1 Knowledge Seeking
communication technologies (ICTs) can facilitate the
flow of knowledge [4], while others have shown little Knowledge seeking involves behavior associated
evidence of such success [5]. In fact, US firms spend with actively searching for information for the
nearly $4.5 billion on ICTs without realizable purposes of fulfilling specific information needs [11].
benefits to the knowledge sharing processes [6]. Such needs typically stem from the existence of

1530-1605/15 $31.00 2015 IEEE 3801


DOI 10.1109/HICSS.2015.457
ambiguous problems in need of knowledge on KM researchers have relied on the social
potential courses of action [12]. Belkin [13] argued exchange theory to explain knowledge contributing
that knowledge seeking behavior consists of: 1) the behaviors [21]. The theory suggests that individuals
seekers awareness of knowledge disparity; 2) a quest constantly weigh the individual costs and benefits
for gathering relevant information, and 3) an before making a determination whether to engage in
awareness of reduced knowledge disparity. specific behaviors as individuals who share expertise
A theory that explains this behavior is the with others risk losing the competitive advantage, or
information foraging theory proposed by Pirolli and damage to their reputation (in the cases of providing
Card [12] who suggested that valuable information is the wrong information) [22].
viewed as prey that is often hidden in the Extant KM literature provides a host of extrinsic
environment (e.g. online documentation, books, motivators, such as status change, promotions, and
media, people, etc). Since it may take longer to locate raises, positively affect knowledge contributing
a piece of information from a file drawer than from behavior [23]. Work-related characteristics, such as
an online database, information foragers, similar to in-role behavior, work and task conflict,
predators, are forced to make decisions whether to decentralization, and work engagement also drive
hunt for hard-to-locate prey, or focus on accessing knowledge contributing behaviors [24].
prey that maximize the rate of gain of information Additionally, a blend of intrinsic and
relevant to their task, (p. 646). As a result, the organizational factors has also been found to impact
foragers consider certain information more valuable knowledge contributing behaviors. For example,
when the amount of time and effort taken to locate it enjoyment in helping others, reciprocity,
is minimal and will not seek additional information if agreeableness, conscientiousness, openness to
efficiency has been achieved. The theory also experience, and role breadth self-efficacy are key
explains that in order to locate the more profitable factors that impact employees knowledge
information, foragers will modify their strategies or contributing practices [25, 26]. Moreover, ethical
the structure of the environment to maximize their culture, sense of belonging, and social ties are all
rate of gaining valuable information, (p. 643). positively related to knowledge contributing [27].
KM research suggests that a key inhibitor to Knowledge contributing behaviors are also impacted
knowledge seeking behaviors is lack of time. Time by community identity, social awareness, and
constraints were characterized as the employees knowledge sharing self-efficacy [28]. Finally,
unwillingness to devote time and resources for anticipated reciprocal relationships and sense of self
knowledge sharing [14], lack of contact time and worth also drive attitudes toward knowledge
interaction between knowledge sources and recipients contribution and subjective norms (e.g. normative
[8], tools available to share knowledge are very time beliefs and motivation to abide by them) and
consuming [14], stress and fears of retribution for organizational climate (fairness, innovativeness, and
failing to meet a deadline [15]. affiliation) impact individual intentions to share
Perceived time pressure is frequently attributed to knowledge [22].
the characteristics of the tasks assigned to employees. One essential element for knowledge contributing
For example, pressure to complete large workloads is communication, since it is used to establish
cause severe time constraints that often lead relationships among individuals that lead to the
employees to seek knowledge from highly accessible development of trust, shared language, collegiality,
sources via ICTs [16]. Task uncertainty and task and openness [21]. As a result, it can be argued that
interdependence lead seekers to widen the search for knowledge contribution is inhibited by constraints
knowledge sources[17] while task complexity and such as poor interpersonal communication skills and
high demanding work are associated with an lack of trust.
increased need for problem solving information and The review of literature revealed a host of
general-purpose sources [18]. Moreover, individuals individual characteristics and extrinsic factors that
engage in greater feedback seeking behaviors in fostered both knowledge seeking and knowledge
environments characterized by higher role ambiguity contributing behaviors. Three major inhibitors to both
[19]. behaviors were recognized (lack of time, poor
communication, and lack of trust). Next, three
2.2. Knowledge Contributing underlying factors that potentially contribute to these
barriers (i.e. role conflict, role ambiguity, and locus
Knowledge contributing is a behavior that of control) were examined.
involves exchange of knowledge, information, and
assistance between individuals and groups [20].

3802
3. Contributors to Knowledge Sharing Testing the reliability of the coding was
Behaviors performed at two separate intervals using random
selection of units as recommended by [32].
Measurement to determine whether a perfect
To extract potential contributing factors to the agreement or agreement by chance has occurred was
identified knowledge sharing barriers, a content performed using kappa statistic [33]. Kappa of .7 was
analysis study was conducted following the six stages achieved and was considered an acceptable reliability
identified by [29]. The first stage included the design level.
of the method, definitions of context, data source During the coding phase, 61 sources (a total of
exploration, and identification of barriers. The 199 references) were found to contain the categories
manifest approach, focusing on identification of the that percolated to the concepts of role conflict, role
physical occurrences of the common knowledge ambiguity, and locus of control. Role conflict
barriers within each article, was selected [30]. This percolated through seven different categories that
process was followed by the selection of journal collectively appeared 89 times throughout the
articles as the unit of analysis. A purposive sample of sources. Two of these categories (job complexity and
articles examined during the literature review was job interdependence) accounted for more than 60% of
selected from the discipline of knowledge the references. The role ambiguity variable emerged
management from a variety of domains (e.g. through five different categories that appeared 123
information systems, information technology times. One of these categories (job clarity) accounted
consulting, healthcare, education, research, and new for 76% of all references. Finally, the locus of control
product development). 104 KM articles were variable percolated through four different categories
extracted from the domains of information systems, that appeared 39 times. One of these categories (job
information technology consulting, healthcare, awards) accounted for 62% of all references.
education, research, new product development, and
information sciences databases as recommended by
3.1 Role Conflict
[31]. The databases included: ABI/Inform Complete-
ProQuest, ACM Digital Library, IEEE Computer
Society Digital Library, Computers and Applied Role conflict is defined as the occurrences of two
Sciences Complete - EBSCO host, Wiley Online or more role pressures for an employee, where the
Library - Blackwell Publishers, IBI Global Science compliance with one makes it difficult to comply
Direct Elsevier, Taylor & Francis, JSTOR, with the other [34]. It is characterized as over-
ProQuest Computing ProQuest, and SpringerLink - demand on employees to complete specific tasks that
Springer. they perceive as excessive on their time availability
A single coder used both inductive and deductive [35]. According to the organizational role theory
approaches to discover sentences and paragraph (ORT), in the workplace, employee behaviors are
references that percolated to three potential determined by a set of rules, norms and specific
contributing factors. Berg [30] suggested that during social positions that are directed by normative
the inductive approach, the researcher becomes expectations and organizational demands [34]. Role
absorbed in the articles to determine the theme or conflicts arise due to a combination of multiple and
meaning of the authors message, while the deductive sometimes conflicting supervisory expectations and
approach relied on schemes grounded in theory. lack of sufficient employee training [36]. Moreover,
The coding unit used in the study was a mixture of role conflicts are observed as a result of changes in
words and textual references. The categories for the organizational culture and job responsibilities as a
coding were words that represented specific themes. result of new enterprise technologies propagation [37,
For example, coded sentences, or paragraphs that 38]. [39] proposed that leading conditions for role
describe increased task conflict, task conflict include lack of sufficient time to perform the
interdependence, as well as any associated synonyms new role and stress caused by the inability to meet
were categorized under the category job complexity. expected requirements and behaviors.
These categories were assigned to specific concepts Information systems research suggests that the
that constituted variables [30]. These concepts were lack of time barrier stems from the introduction of
determined during the content analysis review of new technology, conflicting expectations and norms
each article. The final grouping of the categories of employees roles in the enterprise. For example, an
percolated to a single concept (e.g. role conflict, role investigation of the impact of ICT-created stress on
ambiguity, and locus of control). employees role stress and productivity showed that
an increase in role stress resulted in time pressures
and a need for multitasking [40]. Employees are

3803
overloaded by information quantity, the introduction questions and disguised conversation for information
of new technology, and leaner organization sources are also expected to experience higher role
structures. ambiguity and role conflict than the ones who less
In this study, it is proposed that employees seek to frequently used such tactics.
resolve their role conflicts by engaging in knowledge A higher level of uncertainty with a work role is
seeking about their roles, expectations and values positively related to information-seeking via the use
from internal sources (colleagues and supervisors), of indirect knowledge-seeking tactics. Such tactics
and external groups (sources outside their work are positively related to role ambiguity, while overt
group) [41]. As a result: tactics (direct solicitation of information) were
negatively related to role ambiguity [44]. Finally,
H1a. Role conflict positively impacts knowledge perceived lack of competence also inhibits
seeking behaviors via ICTs. knowledge seeking behaviors [45].
Role ambiguity has a negative effect on job
According to the social exchange theory, performance and strong impact on empowerment as
individuals will perform favors to others with the ambiguous tasks or goals introduce a great level of
expectation of forthcoming return. This expectation is uncertainty into employees work which results in
predicated on the existence of a long-term increased expectations from multiple stakeholders
relationship between individuals [26]. It is argued [46]. Correspondingly, access to information helps to
that as employees experience role conflict and engage reduce uncertainty, increase understanding of work
in knowledge seeking with others, they will also roles and increase employee empowerment. A meta-
reciprocate by contributing knowledge to their peers analysis of 96 journal articles found that role
in order to solidify long-term relationships. ambiguity negatively correlates with feedback from
Therefore, it is proposed that: others (knowledge contribution) because individuals
learn their roles primarily through such feedback
H1b. Role conflict positively impacts knowledge [47].
contributing behaviors via ICTs. Consistent connectivity to an ICT enhances work
speed, increases workload levels and increases
3.2 Role Ambiguity employees perceived work overload. For example,
consistent connectivity to an ICT (e.g. email) results
Role ambiguity is defined as the level to which in frequent interruptions to employees work
clear information is lacking regarding the expectation practices, while changes to the ICT results in role
associated with a specific position [34, 42]. It is ambiguity due to new learning demands. Workload
related to conflicting supervisory expectations, and role ambiguity become the dominant stressors
ambiguous definitions of tasks, and lack of that lead to exhaustion and turnover intentions [48].
clarification of duties. Role theory suggests that Individuals faced with expectations of their duties
individuals experiencing role ambiguity will engage tend to seek clarification and engage in information
in attempts to resolve the issues associated with the seeking behaviors in order to exchange tacit
vagueness of their positions since new or changing knowledge that can assist them in completing their
roles have the potential to increase ambiguity in roles [49]. As a result, it is proposed that under
conditions of novel technologies, rapid organizational conditions of low ambiguity:
growth, reorganizations, and shifts in managerial
philosophies. H2a. Role ambiguity positively impacts
Employees engage in knowledge seeking tactics knowledge seeking behaviors via ICTs.
from their supervisors and colleagues in order to
reduce uncertainty about their roles [43]. Those who Employees use ICTs to share information usually
engage in greater knowledge seeking experience exchanged in informal places (e.g. by the water
reduced levels or role ambiguity and role conflict. cooler or when bumping in the hallway), for
Conversely, those who do not engage in knowledge discussions, clarification, informal communication,
seeking experience higher levels of role ambiguity and problem solving [50]. These conversations lead
and role conflict. Employees who rely on third- to sharing of random ideas, noteworthy items, or
parties as information-seeking sources while other personal experiences that can clarify
excluding their supervisors are expected to encounter ambiguities. At the same time, social exchange
higher levels of ambiguity and role conflict than the theory posits that individuals assess the benefit and
ones relying on both third-party and supervisors for costs before engaging in interactions with others [21].
information sources. Those who relied on indirect When high role ambiguity exists, costs to contribute

3804
knowledge will be greater than the benefits due to tend to be more withdrawn, less likely to take risks,
perceived time pressure. In contrast, when low role and rely more on information from their inner circle
ambiguity is present, individuals will focus on since this makes them feel safe.
seeking task-specific knowledge to achieve higher A meta-analysis study of 106 articles found that
benefits at lower costs. Therefore it is proposed that externals learned more and had higher transfer levels
under conditions of low ambiguity: of declarative knowledge [56]. Furthermore,
externals were found to communicate via ICTs for
H2b. Role ambiguity positively impacts the purpose of inclusion [54] and shared more
knowledge contributing behaviors via ICTs. appropriate and less premature information than
internals [57]. As a result, it is proposed that:
3.3 Locus of Control
H3b. External locus of control positively impacts
Locus of control (LOC) is the extent to which knowledge contributing behaviors via ICTs.
employees believe that events in their lives are either
contingent upon their own behaviors or on the actions Figure 1 provides the proposed causal model.
of others [51]. According to the social learning theory H1a +
(SLT), peoples motivations to engage in a specific Role Conflict
H1b +
behavior are impacted by the results of previous Knowledge Seeking
behaviors [52]. Since individuals strive to minimize
H2a +
negative consequences while maximizing positive Role Ambiguity
H2b +
results, they will engage in behaviors that are
expected to have a high probability of resulting in H3a + Knowledge Contributing

positive outcomes [51]. Positive results will either Locus of Control


H3b +
reinforce or weaken repetitions of that behavior,
depending on whether an individual believes that the
Figure 1. Proposed model
reinforcement resulted from his or her personal
behavior or from an outside entity. This personal
locus (location) of control is characterized as internal 5. Methodology
or external.
Individuals with high internal LOC (internals) 5.1 Scales
believe their behaviors determine what occurs to
them. Extant literature shows that internals tend to Role conflict and role ambiguity were measured
engage in word-of-mouth communication with out- using a 7-point scale ranging from very false (1) to
group members (colleagues) and in increased level of very true (7) developed by Rizzo, House and
information seeking in order to remain in control of Lirtzman [42]. Spector [58] Work Locus of Control
their environment. Internals score themselves as more Scale (WLOC) was used to measure locus of control.
knowledgeable of the product class than externals The original scale was measured via a 7-point Likert
and are reported to find greater enjoyment in face-to- scale with anchors on 1 = strongly disagree and 7 =
face and computer mediated communication with strongly agree. External WLOC was represented by
others [53, 54]. high scores, while internal WLOC by low scores.
Studies have demonstrated relationships between Knowledge seeking and knowledge contributing
internal LOC, information acquisition, and learning behaviors were measured via a scale originally
motivation. For example, internals process developed by Van Den Hooff and De Ridder [10].
information better than externals so much so that if The original instrument used a 5-point Likert scale
internals were added to a team, the team experiences and consisted of a total of eight items. The scale was
an increased information-processing capacity, greater modified to a 7-point Likert scale and the wording
information acquisition behavior, and better team adjusted to fit the ICT context of the study. To
performance [55]. As a result, it is proposed that: determine the understandability of the questions and
the loading of the modified instrument, the scale was
H3a. Internal locus of control positively impacts validated with a purposive sample of six experts.
knowledge seeking behaviors via ICTs; Extant literature demonstrates that such sample sizes
were sufficient to determine instrument clarity [59,
Individuals with high external LOC (externals) 60]. The experts in the current study matched the
believe that factors such as luck, fate, or powerful characteristics of the targeted population for this
others determine what happens to them [51]. They study (full-time employees that fulfilled the job

3805
function of analyst and used ICTs to share knowledge of the respondents were between the ages of 30 and
within their organizations). Furthermore, knowledge 60. Three quarters of the sample had attained an
of survey preparation techniques was a prerequisite in associates or higher college degree. Over 60% had
order to leverage recommendations for improvement between one and 10 years of work experience and the
of the instrument items. majority (nearly 90%) earned an annual income of
$50,000 or higher. Approximately 60% of the
5.2 Population and Sample Size participants worked in mid-size companies with over
500 employees, while the largest industry represented
The population for this study was considered by the sample (22%) was government, followed by
employees who used ICTs at work (e.g. email, instant financial services (12.7%), and telecommunications
messaging, forums, and knowledge repositories) to and internet (6.7%).
seek and contribute knowledge. Employees in
supervisory roles experience higher levels of 6.2 Exploratory Factor Analysis
ambiguity and uncertainty with their job duties than
non-supervisory employees [61]. As a result the Exploratory factor analysis (EFA) was conducted
sample was delimited to participants with the job to assess construct validity. Principal components
function of analyst from across of variety of analysis with verimax rotation, and Kaiser
industries since this position was consistent across normalization was performed on all constructs.
organizations in terms of its non-supervisory duties. Several items were removed to arrive to a clean
Furthermore, part-time employees experience pattern matrix without cross-loadings. The procedure
significantly greater role ambiguity than their full- produced a five-factor model with factor loadings
time counter parts due to perceived job strain as a ranging from 0.70 to 0.89 (eigenvalues >1) that
result of reduced information training, job explained 71% of the total variance.
information, and social support [62]. In order to
control for this variable, only full-time employees 6.3 Confirmatory Factor Analysis
were invited to take part in the study. Finally, the
sample was restricted to employees who resided only Confirmatory factor analysis (CFA) was
in the United States. Moreover, since structured performed prior to the SEM in an effort to establish a
equation modeling (SEM) was used to analyze the good fit of the measurement model [66]. The model
data, a sample size of at least 200 participants was estimation was performed using the maximum
targeted [63, 64]. likelihood estimator (ML) as it fit the studys sample
Survey invitations were sent to 1,368 employees size and data type [67]. Model fit was assessed based
of organizations from a variety of industries. Each on criteria proposed by [68].
respondent was pre-qualified prior to taking the final Table 1 provides the reliability and validity values
survey to ensure the delimitations criteria were met. for the estimated model. To determine whether the
As part of the pre-qualification process, participants measures were unrelated, a test for discriminant
were asked whether they used any of the following validity was performed and the square root values of
systems at work: email, instant messaging, online all AVEs (on the diagonal) were evaluated. All
forums, or knowledge repositories. Only users of values were below the established threshold of <.85
these ICTs were allowed to proceed with the survey. [69]. As a result, it was established that the criteria
The survey process returned 498 responses. Of these, for construct reliability, convergent validity, and
173 were excluded during the pre-qualification disriminant validities were satisfied.
process, leaving 326 useful responses (a response rate Since all the survey data was collected through the
of 23.8%). same questionnaire during the same period of time,
systematic measurement error can impact the
6. Results estimates of the relationships between the constructs.
Such error, attributed to common method variance
(CMV), often stems from the measurement method.
6.1 Demographics Williams and Brown [70] argued that when there
is CMV present, the measurement intercorrelation
The final sample used for the analysis consisted of can be either inflated or deflated, resulting in
314 participants (Mahalanobis distance statistics for measurement errors. Common latent factor (CLF)
p-value of 0.001 were used to identify and remove was added to the model to determine the variance that
twelve multivariate outliers[65]). The sample is common to all factors. This method uses the CLF
contained 55% males and 45% females. Nearly 70% to capture the common variance among all observed

3806
variables in the model. The standardized regression To determine the impact of internal versus external
weights from the model were compared to the LOC on the knowledge seeking and knowledge
standardized regression weights of a model without contributing behaviors, each case was coded for high
the CLF to determine whether differences will (external LOC) versus low (internal LOC) values as
require the retention of the CLF during the recommended by [58]. Next, the SEM model was
computation of the structural model [71]. Since none tested for each group. The results demonstrated
of the compared values exceeded .08, it was support for both H3a and H3b were supported.
concluded that the presence of CMV was not of Finally, role conflict was found to have no
significant size to impact the interpretations of the significant impact on knowledge seeking behaviors;
results. therefore H1a was rejected.

Table 1. Reliability and Validity Values Table 2. Hypotheses Testing Results


CR AVE MSV ASV WLOC KnowSeek KnowContr RoleConf RoleAmb Path
WLOC 0.848 0.584 0.052 0.027 0.764 Coeficient
KnowSeek 0.857 0.667 0.549 0.150 0.173 0.817 Hypothesis Hypothesized Path () Remarks
KnowContr 0.855 0.597 0.549 0.148 0.097 0.741 0.773 H1a KnowSeek <--- RoleConf 0.08 Rejected
RoleConf 0.889 0.501 0.163 0.055 0.227 0.041 0.043 0.708 H1b KnowContr <--- RoleConf 0.14** Supported
RoleAmb 0.801 0.592 0.163 0.058 0.129 -0.139 -0.180 0.404 0.769 H2a KnowSeek <--- RoleAmb 0.17* Supported
WLOC - Work Locus of Control H2b KnowContr <--- RoleAmb 0.21* Supported
CR = Composite Reliability
H3a KnowSeek <--- WLCS 0.19** Supported
AVE = Average Variance Extracted
H3b KnowContr <--- WLCS 0.14* Supported
MSV = Maximum Shared Variance
ASV = Average Shared Variance *p .05; **p.10

6.4 Structural Equation Modeling 7. Implications, Limitations and Future


Research
The SEM model (Figure 2) was specified using the
CFA measurement model. The model estimation was The current gap in the KM literature on how to
performed using ML. The model fit was considered effectively promote knowledge sharing among
estimated when the established threshold criteria employees in organizations exists because barriers
values were met (x2/df=2.815, GFI=.892, that inhibit knowledge sharing practices are poorly
RMSEA=.076, NFI=.875, AGFI=.854, CFI=.915, understood. This study enhanced the KM body of
PGFI=.662, PNFI=.721). knowledge by providing an in-depth view of three of
these barriers that are often disregarded in KM
studies: lack of time, poor communications skills, and
lack of trust. A six-stage content analysis study was
conducted on 104 articles and a total of 199
references that percolated to three observed major
contributors to these barriers: role conflict, role
ambiguity, and locus of control. The responses were
analyzed from 314 full-time analysts who used ICTs
at their places of employment to share knowledge.
The final results confirmed that the proposed
contributors predicted employees knowledge sharing
behaviors via ICT.
The present study extended prior KM models by
Figure 2. SEM model
incorporating employees knowledge-sharing
behaviors via specific technology agents. For
example, Connelly and Kelloway [20] questioned
6.5 Hypotheses Testing whether separate knowledge sharing practices existed
among different occupations and how these practices
Table 2 shows the results of the hypotheses
were influenced by employees commitment to their
testing. The results showed that role conflict and role
roles. The current study provided partial answers to
ambiguity positively influenced knowledge
these questions. The results showed that the conflict
contributing behaviors. Thus, H1b and H2b were
and ambiguity influenced knowledge sharing
supported. In addition, role ambiguity was also found
behaviors via ICTs. Moreover, the study
to positively influence knowledge seeking behaviors,
demonstrated that employees personal LOC also
thus H2a was supported.
influenced these behaviors.

3807
The results of the present study extend prior that the impacts of exogenous on the endogenous
research [72] which sought an answer to the question variables may be much more pronounced in jobs with
of how perceived time pressure influenced greater demand on the use of ICTs (e.g. system
knowledge seekers behaviors. The researchers found administrators, software developers, or content
that perceived time pressure prevented participants managers).
from sharing their knowledge as it fostered feelings Future research can test the model with a sample
of preoccupation. The current study showed that from a different job function type. Moreover, future
perceived time pressures were in fact symptoms of research can focus on expanding understanding of the
the conflict and ambiguity in the roles of individuals, effects of ICT systems on knowledge sharing
and it was precisely these contributors that influenced behaviors. First, specific ICT capacities that
the knowledge seeking and contributing practices. complement knowledge users needs and contribute
Furthermore, the results demonstrated that these to the increase in knowledge seeking and knowledge
contributors positively influenced the behaviors in contributing practices should be examined. For
question. example, future studies should explore what effects
The present research provides several practical have specific groupings of ICTs (both synchronous
implications for organizations. First, the study adds and asynchronous) on knowledge sharing behaviors.
value to the organizational decision making process Future studies should also examine whether there is
by highlighting the contributors to employees lack of an optimum number of ICT systems for each specific
time to exchange knowledge, mainly role conflict and behavior (knowledge seeking versus knowledge
role ambiguity. Management is encouraged to be contributing). These studies should also investigate
mindful of the level of conflicting job expectation the optimum level of knowledge sharing that can be
that can result in increased employee role stress. achieved through the unique characteristics of each
Furthermore, while organizations frequently invest in ICT type.
ICTs in order to improve employees productivity,
increase communication, and decrease production 8. References
time [73], management needs to recognize that new
technology also increases employees role conflict [1] S. Cleveland, and T. Ellis, "Causal Model for Predicting
and role ambiguity. Such investments result in Knowledge Sharing Via Icts", 20th Americas Conference
increase lack of time due to increased need to learn on Information Systems, 2014.
how to use the new technology. If an employees role [2] J. Evermann, "Towards a Cognitive Foundation for
conflict is also increased at such times, the level of Knowledge Representation", Information Systems Journal,
perceived time pressure will inhibit knowledge 15(2), 2005, pp. 147-178.
sharing behaviors. Future research is needed to [3] T. Williams, "How Do Organizations Learn Lessons
demonstrate whether the type of ICT can act as from Projects-and Do They?", Engineering Management,
IEEE Transactions on, 55(2), 2008, pp. 248-266.
moderator on the relationships between role conflict,
[4] M. Alavi, and D.E. Leidner, "Knowlede Management
role ambiguity, and knowledge sharing behaviors. and Knowledge Management Systems: Conceptual
This study also demonstrated that internal LOC is Foundations and Research Issues", MIS Quarterly, 25(1),
a good predictor of knowledge seeking behaviors. 2001, pp. 107.
Since employees with external LOC are known to be [5] S. Kelly, and M. Jones, "Groupware and the Social
communication apprehensive, organizations should Infrastructure of Communication", Communications of the
also consider implementing training programs that ACM, 44(12), 2001, pp. 77-79.
are designed to improve communication skills among [6] D. Gilmour, "How to Fix Knowledge Management",
these employees. These programs will help Harvard Business Review, 81(10), 2003, pp. 16-17.
[7] R. Ruggles, "The State of the Notion", California
employees overcome the communication barriers
Management Review, 40(3), 1998, pp. 80-89.
created by their LOC and help them engage more [8] A. Riege, "Three-Dozen Knowledge-Sharing Barriers
freely in knowledge seeking behaviors. Managers Must Consider", Journal of Knowledge
A limitation of this study is its generalizability Management, 9(3), 2005, pp. 18-35.
across certain job types. This study was delimited to [9] P.Y.-T. Sun, and J.L. Scott, "An Investigation of
respondents who occupied the position of analyst. It Barriers to Knowledge Transfer", Journal of Knowledge
is plausible that the selection of respondents with this Management, 9(2), 2005, pp. 75-90.
specific job function led to the rejection of the H1a [10] B. Van Den Hooff, and J.A. De Ridder, "Knowledge
hypothesis. It is also possible that results of this study Sharing in Context: The Influence of Organizational
Commitment, Communication Climate and Cmc Use on
would not apply to employees with jobs where role
Knowledge Sharing", Journal of Knowledge Management,
conflict, role ambiguity, and ICTs are not present 8(6), 2004, pp. 117-130.
(e.g. certain trade jobs). Furthermore, it is probable

3808
[11] Y. Xu, C. Tan, and L. Yang, "Who Will You Ask? An Repositories: An Empirical Investigation", MIS Quarterly,
Empirical Study of Interpersonal Task Information 21(5), 2005, pp. 113-143.
Seeking", Journal of the American Society for Information [27] S. Chai, and M. Kim, "A Socio-Technical Approach to
Science and Technology, 57(12), 2006, pp. 1666-1677. Knowledge Contribution Behavior: An Empirical
[12] P. Pirolli, and S. Card, "Information Foraging", Investigation of Social Networking Sites Users",
Psychological Review, 106(4), 1999, pp. 643-675. International Journal of Information Management, 32(2),
[13] N.J. Belkin, "Anomalous States of Knowledge as a 2012, pp. 118-126.
Basis for Information Retrieval", Canadian journal of [28] F.-C. Tseng, and F.-Y. Kuo, "The Way We Share and
information science, 5(1), 1980, pp. 133-143. Learn: An Exploratory Study of the Self-Regulatory
[14] V.R. Santos, A.L. Soares, and J.. Carvalho, Mechanisms in the Professional Online Learning
"Knowledge Sharing Barriers in Complex Research and Community", Computers in Human Behavior, 26(5), 2010,
Development Projects: An Exploratory Study on the pp. 1043-1053.
Perceptions of Project Managers", Knowledge and Process [29] K. Krippendorff, "Content Analysis", in (Barnouw, E.,
Management, 19(1), 2012, pp. 27-38. Gerbner, G., Schramm, W., Worth, T.L., and Gross, L.,
[15] B.S. Fugate, R.W. Thomas, and S.L. Golicic, "The 'eds.'): International Encyclopedia of Communications,
Impact of Coping with Time Pressure on Boundary Oxford University Press New York and Oxford, 1989
Spanner Collaborative Behaviors", International Journal of [30] B. Berg, Qualitative Research Methods for the Social
Physical Distribution & Logistics Management, 42(7), Sciences, Allyn & Bacon, 4 edn, Needham Heights, MA,
2012, pp. 697-715. 2001.
[16] R. Fidel, and M. Green, "The Many Faces of [31] Levy, and T.J. Ellis, "A Systems Approach to Conduct
Accessibility: Engineers' Perception of Information an Effective Literature Review in Support of Information
Sources", Information Processing & Management, 40(3), Systems Research", Informing Science: International
2004, pp. 563-581. Journal of an Emerging Transdiscipline, 9(2006, pp. 181-
[17] Cross, R.E. Rice, and A. Parker, "Information Seeking 212.
in Social Context: Structural Influences and Receipt of [32] D. Riffe, S. Lacy, and F.G. Fico, Analyzing Media
Information Benefits", IEEE Transactions on Systems, Messages: Using Quantitative Content Analysis in
Man, and Cybernetics, Part C: Applications and Reviews, Research, Lawrence Earlbaum Associates, Inc, Mahwah,
31(4), 2001, pp. 438-448. NJ, 2005.
[18] K. Bystrm, and K. Jrvelin, "Task Complexity [33] J. Cohen, "A Coefficient of Agreement for Nominal
Affects Information Seeking and Use", Information Scales", Educational and psychological measurement,
Processing & Management, 31(2), 1995, pp. 191-213. 20(1), 1960, pp. 37-46.
[19] S.J. Ashford, and L.L. Cummings, "Feedback as an [34] R.L. Kahn, D.M. Wolfe, R.P. Quinn, J.D. Snoek, and
Individual Resource: Personal Strategies of Creating R.A. Rosenthal, Organizational Stress: Studies in Role
Information", Organizational Behavior and Human Conflict and Ambiguity, Wiley, New York, 1964.
Performance, 32(3), 1983, pp. 370-398. [35] S.M. Sales, "Some Effects of Role Overload and Role
[20] C.E. Connelly, and E.K. Kelloway, "Predictors of Underload", Organizational Behavior and Human
Employees Perceptions of Knowledge Sharing Cultures", Performance, 5(6), 1970, pp. 592-608.
Leadership & Organization Development Journal, 24(5), [36] M. Wickham, and M. Parker, "Reconceptualising
2003, pp. 294-301. Organisational Role Theory for Contemporary
[21] P.M. Blau, Exchange and Power in Social Life, Wiley, Organisational Contexts", Journal of Managerial
New York, NY, 1964. Psychology, 22(5), 2007, pp. 440-464.
[22] G.-W. Bock, R.W. Zmud, Y.-G. Kim, and J.-N. Lee, [37] S. Cleveland, and T.J. Ellis, "Toward a Model for
"Behavioral Intention Formation in Knowledge Sharing: Customer-Driven Release Management", 19th Americas
Examining the Roles of Extrinsic Motivators, Social- Conference on Information Systems, 2013.
Psychological Forces, and Organizational Climate", MIS [38] S. Cleveland, and T.J. Ellis, "Orchestrating End-User
Quarterly, 29(1), 2005, pp. 87-111. Perspectives in the Software Release Process: An
[23] A. Kankanhalli, B.C. Tan, and K.K. Wei, Integrated Release Management Framework", Advances in
"Understanding Seeking from Electronic Knowledge Human-Computer Interaction, 2014(2014).
Repositories: An Empirical Study", Journal of the [39] N.M. Noor, "Work-Family Conflict, Work-and
American Society for Information Science and Technology, Family-Role Salience, and Women's Well-Being", The
56(11), 2005, pp. 1156-1166. Journal of Social Psychology, 144(4), 2004, pp. 389-406.
[24] L. Lu, F. Zhou, and K. Leung, "Effects of Task and [40] M. Tarafdar, Q. Tu, B.S. Ragu-Nathan, and T. Ragu-
Relationship Conflicts on Individual Work Behaviors", Nathan, "The Impact of Technostress on Role Stress and
International Journal of Conflict Management, 22(2), 2011, Productivity", Journal of Management Information
pp. 131-150. Systems, 24(1), 2007, pp. 301-328.
[25] A. Cabrera, W.C. Collins, and J.F. Salgado, [41] R.T. Sparrowe, and R.C. Liden, "Process and Structure
"Determinants of Individual Engagement in Knowledge in Leader-Member Exchange", Academy of Management
Sharing", The International Journal of Human Resource Review, 1997, pp. 522-552.
Management, 17(2), 2006, pp. 245-264. [42] J.R. Rizzo, R.J. House, and S.I. Lirtzman, "Role
[26] A. Kankanhalli, B.C. Tan, and K.-K. Wei, Conflict and Ambiguity in Complex Organizations",
"Contributing Knowledge to Electronic Knowledge

3809
Administrative Science Quarterly, 15(2), 1970, pp. 150- [58] P.E. Spector, "Development of the Work Locus of
163. Control Scale", Journal of occupational psychology, 61(4),
[43] V.D. Miller, and F.M. Jablin, "Information Seeking 1988, pp. 335-340.
During Organizational Entry: Influences, Tactics, and a [59] L. Abraham, A. Hareendran, I.W. Mills, M.L. Martin,
Model of the Process", Academy of Management Review, P. Abrams, M.J. Drake, R.P. Macdonagh, and J.G. Noble,
1991, pp. 92-120. "Development and Validation of a Quality-of-Life Measure
[44] T. Holder, "Women in Nontraditional Occupations: for Men with Nocturia", Urology, 63(3), 2004, pp. 481-
Information-Seeking During Organizational Entry", Journal 486.
of Business Communication, 33(1), 1996, pp. 9-26. [60] S. Hart, E. Jan Hultink, N. Tzokas, and H.R.
[45] F. Lee, "The Social Costs of Seeking Help", The Commandeur, "Industrial Companies' Evaluation Criteria
Journal of Applied Behavioral Science, 38(1), 2002, pp. 17- in New Product Development Gates", Journal of Product
35. Innovation Management, 20(1), 2003, pp. 22-36.
[46] D.K. Knight, H.-J. Kim, and C. Crutsinger, [61] J. Hannaway, "Managerial Behavior, Uncertainty and
"Examining the Effects of Role Stress on Customer Hierarchy: A Prelude to a Synthesis", Human Relations,
Orientation and Job Performance of Retail Salespeople", 38(11), 1985, pp. 1085-1100.
International Journal of Retail & Distribution Management, [62] B.D. Steffy, and J.W. Jones, "Differences between
35(5), 2007, pp. 381-392. Full-Time and Part-Time Employees in Perceived Role
[47] S.E. Jackson, and R.S. Schuler, "A Meta-Analysis and Strain and Work Satisfaction", Journal of Organizational
Conceptual Critique of Research on Role Ambiguity and Behavior, 11(4), 1990, pp. 321-329.
Role Conflict in Work Settings", Organizational Behavior [63] J.C. Loehlin, Latent Variable Models: An Introduction
and Human Decision Processes, 36(1), 1985, pp. 16-78. to Factor, Path and Structural Analysis, Lawrence Erlbaum
[48] R. Ayyagari, V. Grover, and R. Purvis, "Technostress: Associates Publishers, 2nd edn, Hillsdale, NJ, 1992.
Technological Antecedents and Implications", MIS [64] R. Weston, and P.A. Gore, "A Brief Guide to
Quarterly, 35(4), 2011, pp. 831-858. Structural Equation Modeling", The Counseling
[49] M.H. Hsieh, "Human Centric Knowledge Seeking Psychologist, 34(5), 2006, pp. 719-751.
Strategies: A Stakeholder Perspective", Journal of [65] R.B. Kline, Principles and Practice of Structural
Knowledge Management, 13(4), 2009, pp. 115-133. Equation Modeling, Guilford press, New York, NY, 2005.
[50] D. Zhao, and M.B. Rosson, "How and Why People [66] J.C. Anderson, and D.W. Gerbing, "Structural
Twitter: The Role That Micro-Blogging Plays in Informal Equation Modeling in Practice: A Review and
Communication at Work", in (Editor, 'ed.'^'eds.'): Book Recommended Two-Step Approach", Psychological
How and Why People Twitter: The Role That Micro- Bulletin, 103(3), 1988, pp. 411-423.
Blogging Plays in Informal Communication at Work, [67] K.A. Bollen, Structural Equations with Latent
ACM, 2009, pp. 243-252. Variables, John Wiley & Sons, New York, 1989.
[51] J.B. Rotter, "Generalized Expectancies for Internal [68] S. Ryu, S.H. Ho, and I. Han, "Knowledge Sharing
Versus External Control of Reinforcement", Psychological Behavior of Physicians in Hospitals", Expert Systems with
monographs: General and applied, 80(1), 1966, pp. 1-28. Applications, 25(1), 2003, pp. 113-122.
[52] J.B. Rotter, Social Learning and Clinical Psychology, [69] D.T. Campbell, and D.W. Fiske, "Convergent and
Prentice-Hall, Englewood Cliffs, NJ, 1954. Discriminant Validation by the Multitrait-Multimethod
[53] N. Srinivasan, and S. Tikoo, "Effect of Locus of Matrix", Psychological Bulletin, 56(2), 1959, pp. 81.
Control on Information Search Behavior", Advances in [70] L.J. Williams, and B.K. Brown, "Method Variance in
Consumer Research, 19(1), 1992, pp. 498-504. Organizational Behavior and Human Resources Research:
[54] L.M. Flaherty, K.J. Pearce, and R.B. Rubin, "Internet Effects on Correlations, Path Coefficients, and Hypothesis
and Face-to-Face Communication: Not Functional Testing", Organizational Behavior and Human Decision
Alternatives", Communication Quarterly, 46(3), 1998, pp. Processes, 57(2), 1994, pp. 185-209.
250-268. [71] K.A. Bollen, "A New Incremental Fit Index for
[55] C. Boone, and A. Van Witteloostuijn, "Team Locus- General Structural Equation Models", Sociological
of-Control Composition, Leadership Structure, Information Methods & Research, 17(3), 1989, pp. 303-316.
Acquisition, and Financial Performance: A Business [72] C.E. Connelly, D.P. Ford, O. Turel, B. Gallupe, and D.
Simulation Study", Academy of Management Journal, Zweig, "Im Busy (and Competitive)!Antecedents of
48(5), 2005, pp. 889-909. Knowledge Sharing under Pressure", Knowledge
[56] J.A. Colquitt, J.A. Lepine, and R.A. Noe, "Toward an Management Research & Practice, 2013, pp. 1-12.
Integrative Theory of Training Motivation: A Meta- [73] L. Borghans, and B. Weel, "The Division of Labour,
Analytic Path Analysis of 20 Years of Research", Journal Worker Organisation, and Technological Change", The
of Applied Psychology, 85(5), 2000, pp. 678-707. Economic Journal, 116(509), 2006, pp. F45-F72.
[57] Y. Libert, P. Janne, D. Razavi, I. Merckaert, P.
Scalliet, N. Delvaux, A.-M. Etienne, S. Conradt, J.
Klastersky, and J. Boniver, "Impact of Medical Specialists'
Locus of Control on Communication Skills in Oncological
Interviews", British journal of cancer, 88(4), 2003, pp. 502-
509.

3810

S-ar putea să vă placă și