{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,26]],"date-time":"2025-11-26T16:12:08Z","timestamp":1764173528923,"version":"build-2065373602"},"reference-count":25,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2008,10,24]],"date-time":"2008-10-24T00:00:00Z","timestamp":1224806400000},"content-version":"vor","delay-in-days":662,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Proc of Assoc for Info"],"published-print":{"date-parts":[[2007,1]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Information sharing stands for a two\u2010way activity in which information is given and received in the same context. The present study reviews information sharing from the viewpoint of information giving. The empirical analysis draws on interviews with twenty environmental activists in Finland, 2005. Three major motives for information giving in non\u2010work contexts were identified: first, seredipitous altruism to provide help to other people, second, pursuit of the ends of seeking information by proxy, and third, duty\u2010driven needs characteristic of persons elected to positions of trust. Since in most cases information giving was driven by altruistic motives, the lack of reciprocity did not in practice weaken the motives for information giving. However, in the case of sensitive information, information giving tends to be restricted by calculations of the risk of information leakage against benefits obtained from the personally rewarding experience of providing important information to others.<\/jats:p>","DOI":"10.1002\/meet.1450440210","type":"journal-article","created":{"date-parts":[[2009,2,11]],"date-time":"2009-02-11T13:28:26Z","timestamp":1234358906000},"page":"1-13","source":"Crossref","is-referenced-by-count":11,"title":["Motives for giving information in non\u2010work contexts and the expectations of reciprocity. The case of environmental activists"],"prefix":"10.1002","volume":"44","author":[{"given":"Reijo","family":"Savolainen","sequence":"first","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2008,10,24]]},"reference":[{"key":"e_1_2_7_2_1","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1097-4571(1999)50:1<74::AID-ASI9>3.0.CO;2-F"},{"volume-title":"Managing the Flow of Technology: Technology Transfer and the Dissemination of Technological Information within the R & D Organization","year":"1977","author":"Allen T. J.","key":"e_1_2_7_3_1"},{"issue":"3","key":"e_1_2_7_4_1","first-page":"341","article-title":"Opinion leadership, poverty and information sharing","volume":"26","author":"Chatman E. A.","year":"1987","journal-title":"RQ"},{"key":"e_1_2_7_5_1","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1097-4571(199107)42:6<438::AID-ASI6>3.0.CO;2-B"},{"volume-title":"The Information World of Retired Women","year":"1992","author":"Chatman Elfreda A.","key":"e_1_2_7_6_1"},{"key":"e_1_2_7_7_1","first-page":"303","volume-title":"The kindness of strangers: on the usefulness of electronic weak ties for technical advice","author":"Constant D.","year":"1997"},{"volume-title":"Information seeking in context. Proceedings of an international conference on research in information needs, seeking and use in different contexts, 14\u201316 August 1996, Tampere, Finland, 412\u2013421","year":"1977","author":"Erdelez S.","key":"e_1_2_7_8_1"},{"key":"e_1_2_7_9_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.20019"},{"issue":"2","key":"e_1_2_7_10_1","article-title":"Something old, something new: preliminary findings from an exploratory study about people's information habits and information grounds","volume":"10","author":"Fisher K. E.","year":"2005","journal-title":"Information Research"},{"key":"e_1_2_7_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/1-4020-3670-1_6"},{"key":"e_1_2_7_12_1","first-page":"329","volume-title":"Annual Review of Information Science and Technology","author":"Foster J.","year":"2006"},{"key":"e_1_2_7_13_1","doi-asserted-by":"publisher","DOI":"10.1086\/225469"},{"key":"e_1_2_7_14_1","doi-asserted-by":"publisher","DOI":"10.2307\/202051"},{"key":"e_1_2_7_15_1","doi-asserted-by":"publisher","DOI":"10.1080\/14716310310001631462"},{"key":"e_1_2_7_16_1","doi-asserted-by":"crossref","unstructured":"Lincoln Y.&Guba E.(1985). Naturalistic Inquiry.Sage.Newbury Park","DOI":"10.1016\/0147-1767(85)90062-8"},{"key":"e_1_2_7_17_1","doi-asserted-by":"publisher","DOI":"10.1108\/00220410310457993"},{"key":"e_1_2_7_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0306-4573(99)00027-8"},{"key":"e_1_2_7_19_1","doi-asserted-by":"publisher","DOI":"10.1086\/603154"},{"key":"e_1_2_7_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/358916.361990"},{"key":"e_1_2_7_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/0740-8188(95)90048-9"},{"key":"e_1_2_7_22_1","doi-asserted-by":"crossref","unstructured":"Savolainen R.(2007a). Information source horizons and source preferences of environmental activists: a social phenomenological approach.Journal of the American Society for Information Science and Technology(forthcoming).","DOI":"10.1002\/asi.20644"},{"key":"e_1_2_7_23_1","doi-asserted-by":"crossref","unstructured":"Savolainen R.(2007b). Source preferences in the context of seeking problem\u2010specific information.Information Processing & Management(forthcoming).","DOI":"10.1016\/j.ipm.2007.02.008"},{"issue":"4","key":"e_1_2_7_24_1","article-title":"Challenges in sharing information effectively: examples from command and control","volume":"11","author":"Sonnenwald D. H.","year":"2006","journal-title":"Information Research"},{"key":"e_1_2_7_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/1-4020-3670-1_7"},{"key":"e_1_2_7_26_1","doi-asserted-by":"publisher","DOI":"10.1177\/0165551504046997"}],"container-title":["Proceedings of the American Society for Information Science and Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fmeet.1450440210","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/asistdl.onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/meet.1450440210","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T09:42:16Z","timestamp":1760953336000},"score":1,"resource":{"primary":{"URL":"https:\/\/asistdl.onlinelibrary.wiley.com\/doi\/10.1002\/meet.1450440210"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,1]]},"references-count":25,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2007,1]]}},"alternative-id":["10.1002\/meet.1450440210"],"URL":"https:\/\/doi.org\/10.1002\/meet.1450440210","archive":["Portico"],"relation":{},"ISSN":["0044-7870","1550-8390"],"issn-type":[{"type":"print","value":"0044-7870"},{"type":"electronic","value":"1550-8390"}],"subject":[],"published":{"date-parts":[[2007,1]]}}}