Please use this identifier to cite or link to this item:
標題: A study on the knowledge sharing behavior on blogs and forums
作者: 張展嘉
Chang, Chan-Chia
關鍵字: word-of-mouth;電子口碑行銷;blogs;forums;knowledge sharing;部落格;論壇;知識分享行為
出版社: 科技管理研究所
引用: Ardichvili, A., Page, V., and Wentling, T. (2003), “Motivation and Barriers to Participation in Virtual Knowledge Sharing Teams,” Journal of Knowledge Management, 7(3), 64-77. Arpan L. M. and Raney, A. A. (2003), “An Experimental Investigation of News Source and the Hostile Media Effect,”Journalism and Mass Communication Quarterly, 80 (2), 265-281. Avolio, B., Yammarino, F. J., and Bass, B. M. (1991), “Identifying Common Methods Variance with Data Collected from a Single Source: An Unresolved Sticky Issue,” Journal of Management, 17(3), 571-587. Ba, S., Stallaert, J., and Whinston, A. B. (2001), “Research Commentary: Introducing a Third Dimension in Information Systems Design-The Case for Incentive Alignment,” Information Systems Research, 12(3), 225- 239. Babin, B. J., Darden, W. R., and Griffin, M. (1994), “Work and/or Fun: Measuring Hedonic and Utilitarian Shopping Value,” Journal of Consumer Research, 20(4), 644-656. Bagozzi, R. P. (1975), “Marketing as Exchange,” Journal of Marketing, 39(4), 32-39. Balasubramanian, S., Bronnenberg, B. J., and Peterson, R. (1997), “Exploring the Implications of the Internet. for Consumer Marketing,” Journal of Academy of Marketing Science, 25 (4), 329-46. Bandura, A. (2001), “Guide for Constructing Self-Efficacy Scales,” Measurement and Evaluation in Counseling and Development, Published electronically, Bandura, A. (2000), “Exercise of Human Agency through Collective Efficacy,” Current Directions in Psychological Science, 9(3), 75-78. Bandura, A. (1997), “Self-efficacy: The Exercise of Control,” New York: Freeman. Bandura, A. (1986), “Social Foundations of Thought and Action: A Social Cognitive Theory,” Prentice-Hall, Englewood Cliffs, NJ. Batson, C. D. and Shaw, L. L. (1991), “Evidence for Altruism: Toward a Pluralism of Prosocial Motives,” Psychological Inquiry, 2(2), 107-122. Batson, C. D., Duncan, B. D., Ackerman, P., Buckley, T., And Birch, K. (1981), “Is Emphatic Emotion a Source of Altruistic Motivation,” Journal of Personality and Social Psychology, 40(2), 290-302. Bayn, B. (2005), “Shaping Online Social Behavior Through User Interface Design,” Published electronically, 20Behavior.pdf. Blau, P. (1964), “Exchange and Power in Social Life,” John Wiley & Sons, Inc, New York Berger, C. R. and Calabrese﹐“Some Explorations in Initial Interaction and Beyond: Toward a Developmental Theory of Interpersonal Communication,” Human Communication Research, 1(2), 99-112. Bock, G., Zmud, R., Kim, Y., and Lee, J. (2005), “Behavioral Intention Formation in Knowledge Sharing: Examining the Roles of Extrinsic Motivators, Social- Psychological Forces, and Organizational Climate,” MIS Quarterly, 29(1), 87-111. Butler, B., Sproull, L., Kiesler, S., and Kraut, R. (2002), “Community Effort in Online Groups: Who Does the Work and Why?” Published electronically, Cabrera, A. and Cabrera, E. F. (2002),“Knowledge Sharing Dilemmas,” Organization Studies, 23(5), 687- 710. Campbell, D. T. and Fiske, D. W. (1959), “Convergent and Discriminant Validation by the Multitrait-Multimethod Matrix,” Psychological Bulletin, 56(2), 81-105. Carroll, J., Howard, S., Vetere, F., Peck, J., and Murphy, J. (2002), “Just What Do the Youth of Today Want? Technology Appropriation by Young People,”System Sciences, Proceedings of the 35th Annual Hawaii International Conference on, 1777-1785. Chapple, E. D. (1970), “Culture and Biological Man,”New York: Holt, Rinehart and Winston. Childers, T. L., Carr, C. L., Peck, J., and Carson, S. (2001), “Hedonic and Utilitarian Motivations for Online Retail Shopping Behavior,” Journal of Retailing, 77(4), 511-535. Churchill, G. A. and Jr. (1979), “A Paradigm for Developing Better Measures of Marketing Constructs,” Journal of Marketing Research, 16 (1), 64-73. Connolly, T. and Thom B. K. (1990), “Discretionary Databases: Theory, Data, and Implications,” in organizations and Communication Technology, J. Fulk and C. Steinfilied (Eds), Sage Publications, Newbury Park, CA, 219-233. Constant, D., Kiesler, S., and Sproull, L. (1994), “What''s Mine Is Ours, or Is It? A Study of Attitude About Information Sharing,” Information Systems Research, 5(4), 400-422. Constant, D., Sproull, L., and Kiesler, S. (1996), “The Kindness of Strangers: On the Usefulness of Weak Ties for Technical Advice,” Organization Science, 7(2), 119- 135. Covington, M. V. (1992), “Making the Grade: A Self-Worth Perspective on Motivation and School Reform,”New York: Cambridge University Press. Culnan, M. J. (1993), “How Did They Get My Name? An Exploratory Investigation of Consumer Attitudes Toward Secondary Information Use,”MIS Quarterly, 17 (3), 341-363. Davenport, T. H. and Prusak, L. (1998), “Working Knowledge: How Organizations Manage What They Know,” Harvard Business School Press, Boston. Davis, F. D., Bagozzi, R. P., and Warshaw P. R. (1992), “Extrinsic and Intrinsic Motivation to Use Computers in the Workplace,” Journal of Applied Social Psychology, 22 (14), 1111-1132. Davis, F., Bagozzi, R. P., and Warshaw, P. R. (1989), “User Acceptance of Computer Technology: A Comparison of Two Theoretical Models,” Management Science, 35(8), 982-1003. Deci, E. L. (1971), “Effects of Externally Mediated Rewards on Intrinsic Motivation,” Journal of Personality and Social Psychology, 18 (1), 105-115. Deci, E. L. and Ryan, R. M. (1980), “The Empirical Exploration of Intrinsic Motivational Processes,” Advances in Experimental Social Psychology, Ed: L. Berkowitz, Academic Press, New York, 13, 39-80. Dellarocas, C., Fan, M., and Wood, C.A. (2004), “Self- Interest, Reciprocity, and Participation in Online Reputation Systems,” Workshop in Information Systems and Economics (WISE), Published electronically, _EbayParticipation.pdf. Doty, D. H., and Glick, W. H. (1998), “Common Methods Bias: Does Common Methods Variance Really Bias Results?” Organizational Research Methods, vol. 1(4), 374-406. Eccles, J. S., Wigfield, A., and Schiefele, U. (1998), “Motivation,”In N. Eisenberg (Ed.), Handbook of child psychology, vol. 3, 5th ed, 1017-1095. New York: Wiley. Eighmey, J. (1997),“Profiling User Responses to Commercial Web Sites,”Journal of Advertising Research, 37 (3), 59-66. Elliot, A. J. and Dweck, C. S. (2005),“Handbook of Competence and Motivation,”The Guilford Press, New York. Emerson, R. M. (1976), “Social Exchange Theory,” Annual Review of Sociology, 2(15), 335-362. Fehr, E. and Gachter, S. (2000), “Fairness and Retaliation: The Economics of Reciprocity,” Journal of Economic Perspectives, 14(40), 159-181. Fogel, M. (2003), “Blogging for Dollars,” Inc, 25(5), 36, Retrieved from Ebsco database. Fornell, C. and Larcker, D. F. (1981), “Evaluating Structural Equation Models with Unobservable Variables and Measurement Error,” Journal of Marketing Research, vol. 18 (1), 39-50. Gist, M. E. and Mitchell, T. R. (1992), “Self-efficacy: A Theoretical Analysis of Its Determinants and Malleability,” Academy of Management Review, 17(2), 183- 211. Goodman, P. S. and Darr, E. D. (1998), “Computer-Aided Systems and Communities: Mechanisms for Organisational Learning in Distributed Environments,” MIS Quaterly, 22 (4), 417-440. Gupta, S. and Kim, H. (2004), “Virtual Community: Concepts, Implications, and Future Research Directions,” In Proceedings of the Tenth Americas Conference on Information Systems, 2679- 2687. Hall, H. (2001), “Social Exchanges for Knowledge Exchange Paper Presented at Managing Knowledge: Conversations and Critiques,” University of Leicester Management Centre, 10-11, Published electronically, hazel_publications.html. Hennig-Thurau, T., Gwinner, K. P., Walsh, G., and Gremler, D. D. (2004), “Electronic Word-of-Mouth via Consumer- Opinion Platforms: What Motivates Consumers to Articulate Themselves on the Internet,” Journal of Interactive Marketing, 18(1), 38-52. Herbig, P. and Milewicz, J. (1995), “The Relationship of Reputation and Credibility to Brand Success,” Journal of Consumer Marketing, 12(4), 5-10. Herbig, F., Milewicz, J., and Golden, J. (1994), “A Model of Reputation Creation and Destruction,” Journal of Business Research (forthcoming), Vol. 31, 23-31. Hibbard, J. D., Kumar, N., and Stern, L. W. (2001), “Examining the Impact of Destructive Acts in Marketing Channel Relationships,” Journal of Marketing Research, 28 (1), 45-61. Hilliard, A. L. (1950), “The Forms of Value: The Extension of Hedonistic Axiology,” New York, NY: Columbia University Press. Hiltz, S. R. and Wellman, B. (1997), “Asynchronous Learning Networks as A Virtual Classroom,” Communications of the ACM, 40(9), 44-49. Hoffman, M. L. (1981), “Is Altruism Part of Human Nature,” Journal of Personality and Social Psychology, 40(1), 121-137. Holbrook, M.B. (1999), “Consumer Value: A Framework for Analysis and Research,” New York, NY: Routledge. Hui, K. L., Tan B. C. Y., and Goh, C. Y. (2006), “Online Information Disclosure: Motivators and Measurements,” ACM Transactions on Internet Technology, vol. 6(4),1543. Published electronically, Jap, S. D. and Ganesan, S. (2000), “Control Mechanisms and the Relationship Life Cycle: Implications for Safeguarding Specific Investments and Developing Commitment,” Journal of Marketing Research, 37 (2), 227- 245. Jarvenpaa, S. L. and Staples, D. (2000), “The Use of Collaborative Electronic Media for Information Sharing: An Exploratory Study of Determinants,” Journal of Strategic Information Systems, 9(2/3), 129-154. Johnson, R. A. and Wichern, D. W. (1992), “Applied Multivariate Statistical Analysis,” 3d ed, Englewood Cliffs, New Jersey: Prentice-Hall. Kankanhalli, A., Tan, B. C. Y., and Wei K. K. (2005), “Contributing Knowledge to Electronic Knowledge Repositories: An Empirical Investigation,” MIS Quarterly 29(1), 113-143. Kanter, R. M. (1995), “Managing the Human Side of Change,” in The Organizational Behavior Reader, D. A. Kold, J. S. Osland, and I. M. Rubin, Eds. New Jersey: Prentice Hall. Kim, C. and Kertadjaja, R. (2004), “Weblogs and Instant Messengers: Communication Methods for Asian International Students to Maintain Long-Distance Friendships,” Published electronically, informatics/capstones/2004/kertadjaja_kim.pdf. Kollock, P. (1999), “The Economies of Online Cooperation: Gifts and Publics Goods in Cyberspace,” in Communities in Cyberspace, P. Kollock, Ed. London: Routledge, 220- 239. Krebs, D. L. (1975), “Empathy and Altruism,” Journal of Personality and Social Psychology, 32(6), 1132-1146. Kwok, J. S. H. and Gao, S. (2004), “Knowledge Sharing Community in P2P Network: A Study of Motivational Perspective,” Journal of Knowledge Management, 8(1), 94- 102. Levin, D.Z., Cross, R., and Abrams L. C. (2002), “Why Should I Trust You? Predictors of Interpersonal Trust in a Knowledge Transfer Context,” Academy of Management Meeting, Published electronically, Why_Should_I_Trust_You.pdf. Luthans, F. (2000a), “Positive Organizational Behavior: Developing and Managing Psychological Strengths,” Academy of Management Executive, 16(1), 57-72. Luthans, F. (2000b), “The Need for and Meaning of Positive Organizational Behavior,” Journal of Organizational Behavior, 23(6), 695-706. Lovelock, C. and Wirtz J. (2004), “Services Marketing: People, Technology, Strategy,” 4th ed., Prentice Hall, New Jersey. Markus, M. L. (2001), “Toward a Theory of Knowledge Reuse: Types of Knowledge Reuse Situations and Factors in Reuse Success,” Journal of Management Information Systems, 18(1), 57-94. Milewicz, J. and Herbig, P. (1994), “Reputation and Sales Force Success,” Marketing Intelligence and Planning, 12 (1), 4-16. Molm, L.D. (1997), “Coercive Power in Social Exchange,” Cambridge University Press. Montgomery, B M. and Duck, S. (1991), “Studying Interpersonal Interaction,” The Guilford press, New York, London. Neter, John, M. H., Kutner, C. J., Nachtsheim, and Wasserman (1996), “Applied Linear Statistical Models,” 4th ed, Boston: McGraw-Hill. O''Dell, C. and Grayson, C. J. (1998), “If Only We Knew What We Know,” The Free Press, New York. Orlikowski, W. J. (1993), “CASE Tools as Organizational Change: Investigating Incremental and Radical Changes in Systems Development,” MIS Quarterly, 17(3), 309-340. Papacharissi, Z. and Rubin, A.M. (2000), “Predictors of Internet Use,”Journal of Broadcasting & Electronic Media, 44 (2), 175-196. Podsakoff, P. M., MacKenzie, S. B., Lee, J. Y., and Podsakoff, N. P. (2003)“Common Method Bias in Behavioral Research: A Critical Review of the Literature and Recommended Remedies,” Journal of Applied Psychology, 88(5), 879-903. Podsakoff, P. M. and Organ, D. W. (1986), “Self-Reports in Organizational Research: Problems and Prospects,” Journal of Management, 12(4), 531-544. Prasad, B. (1999), “A Model for Optimizing Performance Based on Reliability, Life-Cycle Costs and Other Measurements,” Production Planning & Control, 10(3), 286-300. Rioux, K. (2000), “Sharing Information Found for Others on the Web: A Preliminary Examination,” In D. Kraft (Ed.), Proceedings of the 63rd Annual Meeting of the American Society for Information Science, (37), 68-77. Medford, New Jersey: Information Today. Santosa, P. I., Wei, K. K., and Chan, H. C. (2005), “Student Involvement with Online Forum and Its Effects on Intention to Seek and Intention to Share: An Exploratory Study,” Published electronically, Lee_and_Rao.pdf. Seybold, P. B. and Marshak, R. T. (1998), “Customers.Com: How to Create a Profitable Business Strategy for the Internet & Beyond,” Times press, New York, NY. Shumaker, S. and Brownell, A. (1984), “Toward a Theory of Social Support: Closing Conceptual Gaps,” Journal of Social Issues, 40(4), 11-36. Smith, D. H. (1981), “Altruism, Volunteers, and Voluteerism,” Journal of Voluntary Action Research, 10 (1), 21-36. Smith, H. J., Milberg, S. J., and Burke, S. (1996), “Information Privacy: Measuring Individuals,' Concerns about Organizations Practices,” MIS Quarterly, 20(2), 167-196. Stajkovic, A. D. and Luthans, F. (1998), “Self-Efficacy and Work-Related Outcomes,” A meta-analysis, Psycholoxical Bulletin, 124(2), 240-261. Stewart, K. A. and Segars, A. H. (2002), “An Empirical Examination of the Concern for Information Privacy Instrument,” Information Systems Research, 13(1), 36-49. Sundar, H., Silver, D., Gagvani, N., and Dickinson, S. (2003), “Skeleton Based Shape Matching and Retrieval,” In Proceedings of Shape Modeling and Applications, Seoul, Korea. Swaminathan, V., Lepkowska-White, E., and Rao, B.P. (1999), “Browsers or Buyers in Cyberspace? An Investigation of Factors Influencing Electronic Exchange,” Journal of Computer-mediated Communication, 5(2), 1-24. Thibaut, J. W. and Kelley, H. H. (1959), “The Social Psychology of Groups,” John Wiley and Sons Inc, New York. Tiwana, A. and Bush, A. (2001), “A Social Exchange Architecture for Distributed Web Communities,” Journal of Knowledge Management, 5(3), 242-248. Tziner, A. (1999), “The Relationship Between Distal and Proximal Factors and the Use of Political Considerations in Performance Appraisal,”Journal of Business and Psychology, 14(1), 217-231. Tziner, A. and Murphy, K. R. (1999), “Additional Evidence of Attitudinal Influences in Performance Appraisal,” Journal of Business and Psychology, 13(3), 407-419. Wagner, C. and Bolloju, N. (2005), “Supporting Knowledge Management in Organizations with Conversational Technologies: Discussion Forums, Weblog, Wikis,”Journal of Database Management, 16(2), 1-16. Vallerand, R. J. (1997), “Toward a Hierarchical Model of Intrinsic and Extrinsic Motivation,” Advances in Experimental Social Psychology, 29, 271-360. Walsh, G., Gwinner, K. P., and Swanson, S. R. (2004), “What Makes Mavens Tick? Exploring the Motives of Market Mavens' Initiation of Information Diffusion,” Journal of Consumer Marketing, 21(2/3), 109-122. Wasko, M. M. and Faraj, S. (2000), “It Is What One Does'': Why People Participate and Help Others in Electronic Communities of Practice,” Journal of Strategic Information Systems, 9(2/3), 155-173. Wasko, M. and Teigland, R. (2002),“The Provision of Online Public Goods: Examining Social Structure in a Network of Practice,”in Proceedings of the 23rd Annual International Conference on Information Systems, L. Applegate, R. Galliers, and J. I. DeGross (Eds), Barcelona, Spain, 163-171. Wasko, M. M. and Faraj, S. (2005), “Why Should I Share? Examining Social Capital and Knowledge Contribution in Electronic Networks of Practice,” MIS Quarterly, 29(1), 35-57. Westin, A. F. (1967), “Privacy and Freedom,” Midwest Journal of Political Science, 12(4), 620-621. Westner, M. K. (2004), “Weblog Service Providing,” Published electronically, dissertation-weblog-blog-blogg-weblogs-blogs.pdf. White, S. and Lui, S. (2005),“Distinguishing Costs of Cooperation and Control in Alliances,” Strategic Management Journal, Published electronically, 70.pdf, 3. Wolff, P. (2004),“Blog Posting Intervals. Mapping Blog Communities,” Published electronically, #107209329503704470. Zeithaml, V. A. and Bitner, M. J. (2003), “Services Marketing: Integrating Customer Focus Across the Firm,” 3rd ed, McGraw-Hill, New York.

Electronic word-of-mouth (eWOM) plays a major role for customers' buy decision. Through blogs and forums, company may be able to use eWOM to maintain a better customer relationship by enhancing customers' knowledge sharing. Thus, this study attempts to enhance our understanding of knowledge sharing intention to enhance their valuable knowledge or experience leading to eWOM behavior through blogs and forums.
This study uses this model of cost-benefit framework to predict the users' contribution behavior. It provides four types of benefit (include reputation, reciprocity, enjoy helping, self-efficacy) and two types of cost (include convenient costs and interaction costs) developed from psychology literature. The results suggest that qualified support for all of our hypothesized relationships.
According to social exchange theory, if the blogs or forums can provides a controllable benefit to its users or reduce the user cost, access can also be linked to behavior. Thus, firm may be able to use the results of this study to enhance customers' knowledge sharing intention in their blogs or forums.
其他識別: U0005-1307200602114800
Appears in Collections:科技管理研究所

Show full item record

Google ScholarTM


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.