Construct: Communication
This construct belongs to the following categories:
This construct is used by:
Papers using this construct cite the following papers for the source of this construct:
- Chen, 2007: How Organizational Climate and Structure Affect Knowledge Management\textemdashThe Social Interaction Perspective
- Monteiro et al., 2008: Knowledge Flows Within Multinational Corporations: Explaining Subsidiary Isolation and Its Performance Implications
- van den Hooff, 2004: Knowledge Sharing in Context: The Influence of Organizational Commitment, Communication Climate and CMC Use on Knowledge Sharing
- Cheng et al., 2008: Trust and Knowledge Sharing in Green Supply Chains
- Yahya, 2002: Managing Human Resources toward Achieving Knowledge Management
- Hurley, 1998: Innovation, Market Orientation, and Organizational Learning: An Integration and Empirical Examination
- Mohr, 1994: Characteristics of Partnership Success: Partnership Attributes, Communication Behavior, and Conflict Resolution Techniques
- Morgan, 1994: The Commitment-Trust Theory of Relationship Marketing
- Martins, 2002: Information Security Culture
The following constructs were (potentially) derived from this construct:
- Information security knowledge sharing by Sohrabi Safa et al., 2016: Information Security Policy Compliance Model in Organizations
- Information security collaboration by Sohrabi Safa et al., 2016: Information Security Policy Compliance Model in Organizations
- Information security intervention by Sohrabi Safa et al., 2016: Information Security Policy Compliance Model in Organizations
- Information security experience by Sohrabi Safa et al., 2016: Information Security Policy Compliance Model in Organizations
- Attachment by Sohrabi Safa et al., 2016: Information Security Policy Compliance Model in Organizations
- Commitment by Sohrabi Safa et al., 2016: Information Security Policy Compliance Model in Organizations
- Personal norms by Sohrabi Safa et al., 2016: Information Security Policy Compliance Model in Organizations
- Attitude towards compliance with ISOP by Sohrabi Safa et al., 2016: Information Security Policy Compliance Model in Organizations
- ISOP compliance behavioural intentions by Sohrabi Safa et al., 2016: Information Security Policy Compliance Model in Organizations
- Communication by Witherspoon et al., 2013: Antecedents of Organizational Knowledge Sharing: A Meta-Analysis and Critique
- Participation by Witherspoon et al., 2013: Antecedents of Organizational Knowledge Sharing: A Meta-Analysis and Critique
- Social trust by Witherspoon et al., 2013: Antecedents of Organizational Knowledge Sharing: A Meta-Analysis and Critique
- Shared goals by Witherspoon et al., 2013: Antecedents of Organizational Knowledge Sharing: A Meta-Analysis and Critique
- Information asset management by Da Veiga, 2015: Information Security Culture and Information Protection Culture: A Validated Assessment Instrument
- Information security management by Da Veiga, 2015: Information Security Culture and Information Protection Culture: A Validated Assessment Instrument
- Change management by Da Veiga, 2015: Information Security Culture and Information Protection Culture: A Validated Assessment Instrument
- User management by Da Veiga, 2015: Information Security Culture and Information Protection Culture: A Validated Assessment Instrument
- Information security policy by Da Veiga, 2015: Information Security Culture and Information Protection Culture: A Validated Assessment Instrument
- Information security programme by Da Veiga, 2015: Information Security Culture and Information Protection Culture: A Validated Assessment Instrument
- Trust by Da Veiga, 2015: Information Security Culture and Information Protection Culture: A Validated Assessment Instrument
- Information security leadership by Da Veiga, 2015: Information Security Culture and Information Protection Culture: A Validated Assessment Instrument
- Training and awareness by Da Veiga, 2015: Information Security Culture and Information Protection Culture: A Validated Assessment Instrument
- Information Security Policy Enforcements by Alnatheer et al., 2012: Understanding And Measuring Information Security Culture.
- Leadership and Governance by Da Veiga, 2010: A Framework and Assessment Instrument for Information Security Culture
- Security Management and Operations by Da Veiga, 2010: A Framework and Assessment Instrument for Information Security Culture
- Security Policies by Da Veiga, 2010: A Framework and Assessment Instrument for Information Security Culture
- Security Programme Management by Da Veiga, 2010: A Framework and Assessment Instrument for Information Security Culture
- User Security Management by Da Veiga, 2010: A Framework and Assessment Instrument for Information Security Culture
- Technology Protection and Operations by Da Veiga, 2010: A Framework and Assessment Instrument for Information Security Culture
- Change by Da Veiga, 2010: A Framework and Assessment Instrument for Information Security Culture