scispace - formally typeset
Search or ask a question
Author

David Zweig

Bio: David Zweig is an academic researcher from University of Toronto. The author has contributed to research in topics: China & Globalization. The author has an hindex of 36, co-authored 154 publications receiving 5298 citations. Previous affiliations of David Zweig include Tufts University & Harvard University.


Papers
More filters
Journal ArticleDOI
TL;DR: In this article, a multidimensional measure of knowledge hiding was developed and investigated, and the results of three studies suggest that knowledge hiding is comprised of three related factors: evasive hiding, rationalized hiding, and playing dumb.
Abstract: Summary Despite the efforts to enhance knowledge transfer in organizations, success has been elusive. It is becoming clear that in many instances employees are unwilling to share their knowledge even when organizational practices are designed to facilitate transfer. Consequently, this paper develops and investigates a novel construct, knowledge hiding. We establish that knowledge hiding exists, we distinguish knowledge hiding from related concepts (knowledge hoarding and knowledge sharing), and we develop a multidimensional measure of this construct. We also identify several predictors of knowledge hiding in organizations. The results of three studies, using different methods, suggest that knowledge hiding is comprised of three related factors: evasive hiding, rationalized hiding, and playing dumb. Each of these hiding behaviors is predicted by distrust, yet each also has a different set of interpersonal and organizational predictors. We draw implications for future research on knowledge management. Copyright © 2010 John Wiley & Sons, Ltd.

808 citations

Journal ArticleDOI
TL;DR: A booming domestic economy, rapid urbanization, increased export processing, and the Chinese people's voracious appetite for cars are increasing the country's demand for oil and natural gas, in dustrial and construction materials, foreign capital and technology.
Abstract: AN UNPRECEDENTED need for resources is now driving China's foreign policy. A booming domestic economy, rapid urbanization, increased export processing, and the Chinese people's voracious appetite for cars are increasing the country's demand for oil and natural gas, in dustrial and construction materials, foreign capital and technology. Twenty years ago, China was East Asia's largest oil exporter. Now it is the world's second-largest importer; last year, it alone accounted for 31 percent of global growth in oil demand. Now that China is the work shop of the world, its hunger for electricity and industrial resources has soared. China's combined share ofthe world's consumption ofaluminum, copper, nickel, and iron ore more than doubled within only ten years, from 7 percent in 1ggo to 15 percent in 2oO; it has now reached about 20 percent and is likely to double again by the end of the decade. Despite calls by Prime Minister WenJiabao and other politicians to cut consumption of energy and other resources, there is little sign of this appetite abating. Justin Yifu Lin, director of the China Center for Economic Research at Peking University, in Beijing, says the country's economy could grow at 9 percent per year for the next 20 years. These new needs already have serious implications for China's foreign policy. Beijing's access to foreign resources is necessary both for

437 citations

Journal ArticleDOI
TL;DR: In this paper, the authors explore whether some types of knowledge hiding are more harmful than others, and they find that knowledge hiding may actually enhance the relationships between colleagues and might break the cycle of secrecy in organizations.
Abstract: Research has begun to document the negative organizational consequences of knowledge hiding, or the intentional attempt to conceal knowledge, among employees. However, different knowledge hiding behaviours exist, and we explore whether some types of knowledge hiding are more harmful than others. Although theory would suggest that knowledge hiders rationalize their behaviours and fail to anticipate the negative consequences of their behaviours, we found that they did anticipate harmed relationships and retaliation. In addition, targets of knowledge hiding did not always construe the behaviour as harmful or as necessitating retaliation. Overall, our research suggests that not all knowledge hiding is equally harmful. Some types of knowledge hiding may actually enhance the relationships between colleagues and might break the cycle of knowledge hiding in organizations.

313 citations

Journal ArticleDOI
TL;DR: In this paper, the authors examined the relationship between organizational socialization tactics, newcomers' selfefficacy, proactive behaviors, and socialization outcomes, and found that newcomers who engaged in less feedback-seeking and information-seeking behavior were more strongly related to socialization outcome.

306 citations


Cited by
More filters
01 Jan 2000
TL;DR: In this article, the authors propose a method to use the information of the user's interaction with the system to improve the performance of the system. But they do not consider the impact of the interaction on the overall system.
Abstract: Статья посвящена вопросам влияния власти на поведение человека. Авторы рассматривают данные различных источников, в которых увеличение власти связывается с напористостью, а ее уменьшение - с подавленностью. Конкретно, власть ассоциируется с: а) позитивным аффектом; б) вниманием к вознаграждению и к свойствам других, удовлетворяющим личные цели; в) автоматической переработкой информации и резкими суждениями; г) расторможенным социальным поведением. Уменьшение власти, напротив, ассоциируется с: а) негативным аффектом; б) вниманием к угрозам и наказаниям, к интересам других и к тем характеристикам я, которые отвечают целям других; в) контролируемой переработкой информации и совещательным типом рассуждений; г) подавленным социальным поведением. Обсуждаются также последствия этих паттернов поведения, связанных с властью, и потенциальные модераторы.

2,293 citations

Journal ArticleDOI
TL;DR: Cor conservation of resources (COR) theory has become one of the most widely cited theories in organizational psychology and organizational behavior and has been adopted across the many areas of the stress spectrum, from burnout to traumatic stress.
Abstract: Over the past 30 years, conservation of resources (COR) theory has become one of the most widely cited theories in organizational psychology and organizational behavior. COR theory has been adopted across the many areas of the stress spectrum, from burnout to traumatic stress. Further attesting to the theory's centrality, COR theory is largely the basis for the more work-specific leading theory of organizational stress, namely the job demands-resources model. One of the major advantages of COR theory is its ability to make a wide range of specific hypotheses that are much broader than those offered by theories that focus on a single central resource, such as control, or that speak about resources in general. In this article, we will revisit the principles and corollaries of COR theory that inform those more specific hypotheses and will review research in organizational behavior that has relied on the theory.

1,852 citations

Journal ArticleDOI
TL;DR: An interdisciplinary review of privacy-related research is provided in order to enable a more cohesive treatment and recommends that researchers be alert to an overarching macro model that is referred to as APCO (Antecedents → Privacy Concerns → Outcomes).
Abstract: To date, many important threads of information privacy research have developed, but these threads have not been woven together into a cohesive fabric. This paper provides an interdisciplinary review of privacy-related research in order to enable a more cohesive treatment. With a sample of 320 privacy articles and 128 books and book sections, we classify previous literature in two ways: (1) using an ethics-based nomenclature of normative, purely descriptive, and empirically descriptive, and (2) based on their level of analysis: individual, group, organizational, and societal. Based upon our analyses via these two classification approaches, we identify three major areas in which previous research contributions reside: the conceptualization of information privacy, the relationship between information privacy and other constructs, and the contextual nature of these relationships. As we consider these major areas, we draw three overarching conclusions. First, there are many theoretical developments in the body of normative and purely descriptive studies that have not been addressed in empirical research on privacy. Rigorous studies that either trace processes associated with, or test implied assertions from, these value-laden arguments could add great value. Second, some of the levels of analysis have received less attention in certain contexts than have others in the research to date. Future empirical studies-both positivist and interpretive--could profitably be targeted to these under-researched levels of analysis. Third, positivist empirical studies will add the greatest value if they focus on antecedents to privacy concerns and on actual outcomes. In that light, we recommend that researchers be alert to an overarching macro model that we term APCO (Antecedents → Privacy Concerns → Outcomes).

1,595 citations