{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T17:37:03Z","timestamp":1754156223522,"version":"3.41.2"},"reference-count":87,"publisher":"Emerald","issue":"1","license":[{"start":{"date-parts":[[2020,6,12]],"date-time":"2020-06-12T00:00:00Z","timestamp":1591920000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JEIM"],"published-print":{"date-parts":[[2021,1,28]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-subheading\">Purpose<\/jats:title><jats:p>This study investigates information quality, information security technology and information sharing with moderation by information security culture and information leakage and how they all play out to influence supply chain performance for contract suppliers (Contract), noncontract suppliers (Noncontract) and pooled suppliers (Contract and Noncontract combined).<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Design\/methodology\/approach<\/jats:title><jats:p>Multigroup analysis was deployed to compare the impact on Contract and Noncontract.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Findings<\/jats:title><jats:p>The finding on pooled suppliers confirmed the hypothesis that, in the multigroup analysis, information security culture negatively impacted the information quality\u2013information sharing relationship of Contract.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Practical implications<\/jats:title><jats:p>The practical learning point is that Noncontract could still share information and perform and in some instances better than Contract. Noncontract suppliers are still workable.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Originality\/value<\/jats:title><jats:p>Information security culture motivated Noncontract to share and perform better than Contract. This result presents a dilemma.<\/jats:p><\/jats:sec>","DOI":"10.1108\/jeim-11-2019-0368","type":"journal-article","created":{"date-parts":[[2020,6,12]],"date-time":"2020-06-12T07:13:54Z","timestamp":1591946034000},"page":"28-53","source":"Crossref","is-referenced-by-count":10,"title":["Information sharing and the bane of information leakage: a multigroup analysis of contract versus noncontract"],"prefix":"10.1108","volume":"34","author":[{"given":"Wai-Peng","family":"Wong","sequence":"first","affiliation":[]},{"given":"Kim Hua","family":"Tan","sequence":"additional","affiliation":[]},{"given":"Stephanie Hui-Wen","family":"Chuah","sequence":"additional","affiliation":[]},{"given":"Ming-Lang","family":"Tseng","sequence":"additional","affiliation":[]},{"given":"Kuan Yew","family":"Wong","sequence":"additional","affiliation":[]},{"given":"Shamraiz","family":"Ahmad","sequence":"additional","affiliation":[]}],"member":"140","published-online":{"date-parts":[[2020,6,12]]},"reference":[{"key":"key2021123113231739200_ref001","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1016\/j.cose.2014.01.001","article-title":"Protecting organizational competitive advantage: a knowledge leakage perspective","volume":"42","year":"2014","journal-title":"Computers and Security"},{"key":"key2021123113231739200_ref002","doi-asserted-by":"crossref","first-page":"567","DOI":"10.1016\/j.chb.2015.03.054","article-title":"Design and validation of information security culture framework","volume":"49","year":"2015","journal-title":"Computers in Human Behavior"},{"issue":"3","key":"key2021123113231739200_ref003","doi-asserted-by":"crossref","first-page":"984","DOI":"10.1016\/j.ejor.2016.11.046","article-title":"Supply chain forecasting when information is not shared","volume":"260","year":"2017","journal-title":"European Journal of Operational Research"},{"key":"key2021123113231739200_ref004","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1016\/j.jnca.2016.01.008","article-title":"A survey on data leakage prevention systems","volume":"62","year":"2016","journal-title":"Journal of Network and Computer Applications"},{"issue":"3","key":"key2021123113231739200_ref005","doi-asserted-by":"crossref","first-page":"411","DOI":"10.1037\/0033-2909.103.3.411","article-title":"Structural equation modeling in Practice: a review and recommended two-step approach","volume":"103","year":"1988","journal-title":"Psychological Bulletin"},{"key":"key2021123113231739200_ref006","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.omega.2015.08.004","article-title":"Strategic and operational management of organizational resilience: current state of research and future directions","volume":"62","year":"2016","journal-title":"Omega"},{"key":"key2021123113231739200_ref007","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1016\/j.ijpe.2015.05.020","article-title":"Coordination in a multiple producers\u2013distributor supply chain and the value of information","volume":"167","year":"2015","journal-title":"International Journal of Production Economics"},{"issue":"4","key":"key2021123113231739200_ref008","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1016\/j.im.2014.12.004","article-title":"Institutional pressures in security management: direct and indirect influences on organizational investment in information security control resources","volume":"52","year":"2015","journal-title":"Information and Management"},{"issue":"3","key":"key2021123113231739200_ref009","doi-asserted-by":"crossref","first-page":"438","DOI":"10.1108\/02635570710734316","article-title":"Exploring organizational culture for information security management","volume":"107","year":"2007","journal-title":"Industrial Management and Data Systems"},{"year":"2019","key":"key2021123113231739200_ref010","first-page":"1"},{"issue":"3","key":"key2021123113231739200_ref011","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1080\/08874417.2015.11645767","article-title":"Impacts of comprehensive information security programs on information security culture","volume":"55","year":"2015","journal-title":"Journal of Computer Information Systems"},{"key":"key2021123113231739200_ref012","volume-title":"Statistical Power Analysis for the Behavioral Sciences","author":"Cohen","year":"1988","edition":"2nd Ed."},{"issue":"4","key":"key2021123113231739200_ref013","doi-asserted-by":"crossref","first-page":"400","DOI":"10.1287\/isre.5.4.400","article-title":"What's mine is ours, or is it? A study of attitudes about information sharing","volume":"5","year":"1994","journal-title":"Information Systems Research"},{"key":"key2021123113231739200_ref014","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1016\/j.cie.2015.01.024","article-title":"The impact of information sharing and inventory control coordination on supply chain performances","volume":"82","year":"2015","journal-title":"Computers and Industrial Engineering"},{"issue":"1","key":"key2021123113231739200_ref015","first-page":"196","article-title":"A framework and assessment instrument for information security culture","volume":"29","year":"2010","journal-title":"Computers and Security"},{"issue":"2","key":"key2021123113231739200_ref016","doi-asserted-by":"crossref","first-page":"243","DOI":"10.1016\/j.clsr.2015.01.005","article-title":"Information security culture and information protection culture: a validated assessment instrument","volume":"31","year":"2015","journal-title":"Computer Law and Security Report"},{"issue":"1","key":"key2021123113231739200_ref017","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1016\/j.ijpe.2010.06.015","article-title":"Information sharing and profit allotment based on supply chain cooperation","volume":"133","year":"2011","journal-title":"International Journal of Production Economics"},{"key":"key2021123113231739200_ref018","doi-asserted-by":"crossref","first-page":"116","DOI":"10.1016\/j.omega.2017.08.005","article-title":"Information sharing in supply chains with heterogeneous retailers","volume":"79","year":"2018","journal-title":"Omega"},{"key":"key2021123113231739200_ref019","volume-title":"Malaysian Industries","author":"Federation of Malaysian Manufacturers (FMM) Directory","year":"2015","edition":"45th ed."},{"issue":"1","key":"key2021123113231739200_ref020","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1016\/j.jom.2009.06.001","article-title":"The impact of supply chain integration on performance: a contingency and configuration approach","volume":"28","year":"2010","journal-title":"Journal of Operations Management"},{"key":"key2021123113231739200_ref021","first-page":"39","article-title":"Evaluating structural equation models with unobservable variables and measurement error","volume":"23","year":"1981","journal-title":"Journal of Marketing Research"},{"year":"2000","key":"key2021123113231739200_ref022","article-title":"The Performance impact of Interorganizational information systems: an empirical study of on-time Performance in U.S. Air Cargo"},{"year":"2019","key":"key2021123113231739200_ref023","doi-asserted-by":"publisher","DOI":"10.1108\/IntR-12-2017-0515"},{"key":"key2021123113231739200_ref024","first-page":"75","article-title":"The dark side of knowledge transfer: exploring knowledge leakage in joint R&D projects","volume":"41","year":"2015","journal-title":"Technovation"},{"key":"key2021123113231739200_ref025","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1007\/s10799-015-0253-1","article-title":"Economic incentives in security information sharing: the effects on market structures","year":"2016"},{"issue":"2","key":"key2021123113231739200_ref026","first-page":"423","article-title":"Security investment and information sharing under an alternative security breach probability function","volume":"17","year":"2013","journal-title":"Information Systems Frontiers"},{"issue":"3","key":"key2021123113231739200_ref027","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1509\/jim.14.0138","article-title":"Contract specificity, contract violation and relationship Performance in International buyer-supplier relationships","volume":"23","year":"2015","journal-title":"Journal of International Marketing"},{"issue":"10","key":"key2021123113231739200_ref028","doi-asserted-by":"crossref","first-page":"1719","DOI":"10.1111\/poms.12195","article-title":"Strategic information sharing in competing channels","volume":"23","year":"2014","journal-title":"Production and Operations Management"},{"year":"2017","key":"key2021123113231739200_ref029"},{"volume-title":"Advanced Issues in Partial Least Squares Structural Equation Modeling (PLS-SEM)","year":"2018","key":"key2021123113231739200_ref030"},{"key":"key2021123113231739200_ref031","doi-asserted-by":"publisher","first-page":"190","DOI":"10.1109\/IEMC.2003.1252258","article-title":"Information security culture in a value net","year":"2003"},{"issue":"1","key":"key2021123113231739200_ref032","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1007\/s11747-014-0403-8","article-title":"A new criterion for assessing discriminant validity in variance-based structural equation modeling","volume":"43","year":"2015","journal-title":"Journal of the Academy of Marketing Science"},{"issue":"1","key":"key2021123113231739200_ref033","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1108\/IMDS-09-2015-0382","article-title":"Using PLS path modeling in new technology research: updated guidelines","volume":"116","year":"2016","journal-title":"Industrial Management and Data Systems"},{"issue":"2","key":"key2021123113231739200_ref034","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1108\/13598541011028714.","article-title":"Inter-organizational governance, learning and performance in supply chain","volume":"15","year":"2010","journal-title":"Supply Chain Management: International Journal"},{"issue":"3","key":"key2021123113231739200_ref035","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1016\/j.jom.2007.08.003","article-title":"Theoretical perspectives on the coordination of supply chains","volume":"26","year":"2008","journal-title":"Journal of Operations Management"},{"issue":"4","key":"key2021123113231739200_ref036","doi-asserted-by":"crossref","first-page":"424","DOI":"10.1037\/1082-989X.3.4.424","article-title":"Fit indices in covariance structure modeling: sensitivityto underparameterized model misspecification","volume":"3","year":"1998","journal-title":"Psychological Methods"},{"key":"key2021123113231739200_ref037","doi-asserted-by":"crossref","first-page":"185","DOI":"10.1016\/j.ijpe.2016.11.002","article-title":"Optimization and coordination of supply chain with revenue sharing contracts and service requirement under supply and demand uncertainty","volume":"183","year":"2017","journal-title":"International Journal of Production Economics"},{"issue":"4","key":"key2021123113231739200_ref038","doi-asserted-by":"publisher","first-page":"552","DOI":"10.1111\/poms.12044","article-title":"The effects of competitive environment on supply chain information sharing and performance: an Empirical Study in China","volume":"23","year":"2014","journal-title":"Production and Operations Management"},{"issue":"2","key":"key2021123113231739200_ref039","doi-asserted-by":"crossref","first-page":"410","DOI":"10.1111\/j.1937-5956.2012.01372.x","article-title":"The impact of information sharing on supply chain Performance under asymmetric information","volume":"22","year":"2013","journal-title":"Production and Operations Management"},{"issue":"11","key":"key2021123113231739200_ref040","doi-asserted-by":"crossref","first-page":"2762","DOI":"10.1287\/mnsc.2014.1975","article-title":"Rational information leakage","volume":"60","year":"2014","journal-title":"Management Science"},{"issue":"2","key":"key2021123113231739200_ref041","doi-asserted-by":"crossref","first-page":"262","DOI":"10.1016\/j.ijpe.2010.02.014","article-title":"Supply chain integration with third-party logistics providers","volume":"125","year":"2010","journal-title":"International Journal of Production Economics"},{"key":"key2021123113231739200_ref042","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1016\/j.adhoc.2018.07.006","article-title":"Information sharing and bullwhip effect in smart destination network system","volume":"87","year":"2019","journal-title":"Ad Hoc Networks"},{"issue":"4","key":"key2021123113231739200_ref043","doi-asserted-by":"crossref","first-page":"246","DOI":"10.1108\/13598541111139062","article-title":"Supply chain resilience in the global financial crisis: an empirical study","volume":"16","year":"2011","journal-title":"Supply Chain Management: International Journal"},{"issue":"7","key":"key2021123113231739200_ref044","doi-asserted-by":"crossref","first-page":"546","DOI":"10.17705\/1jais.00302","article-title":"Lateral collinearity and misleading results in variance-based SEM: an illustration and recommendations","volume":"13","year":"2012","journal-title":"Journal of the Association for Information Systems"},{"issue":"3","key":"key2021123113231739200_ref045","doi-asserted-by":"crossref","first-page":"556","DOI":"10.1287\/mnsc.1120.1627","article-title":"Revenue sharing and information leakage in a supply chain","volume":"59","year":"2013","journal-title":"Management Science"},{"issue":"3","key":"key2021123113231739200_ref046","first-page":"1960","article-title":"Firm performance and customer-driven green supply chain management","volume":"112","year":"2016","journal-title":"Journal of Cleaner Production"},{"issue":"1","key":"key2021123113231739200_ref047","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1504\/IJMTM.2000.001329","article-title":"Information sharing in a supply chain","volume":"1","year":"2000","journal-title":"International Journal of Manufacturing Technology and Management"},{"issue":"22","key":"key2021123113231739200_ref048","doi-asserted-by":"crossref","first-page":"6792","DOI":"10.1080\/00207543.2014.918286","article-title":"Demand information sharing and channel choice in a dual-channel supply chain with multiple retailers","volume":"52","year":"2014","journal-title":"International Journal of Production Research"},{"issue":"3","key":"key2021123113231739200_ref049","doi-asserted-by":"crossref","first-page":"1641","DOI":"10.1016\/j.dss.2006.02.011","article-title":"Accessing information sharing and information quality in supply chain management","volume":"42","year":"2006","journal-title":"Decision Support Systems"},{"issue":"7","key":"key2021123113231739200_ref050","doi-asserted-by":"publisher","first-page":"339","DOI":"10.1016\/j.technovation.2014.05.001","article-title":"The challenge of cyber supply chain security to research and practice \u2013 an introduction","volume":"34","year":"2012","journal-title":"Technovation"},{"issue":"2","key":"key2021123113231739200_ref051","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1111\/joms.12179","article-title":"Effects of information technology capabilities on strategic alliances: implications for the resource-based View","volume":"53","year":"2016","journal-title":"Journal of Management Studies"},{"key":"key2021123113231739200_ref052","unstructured":"Little, T.D., Bovaird, J.A. and Widaman, K.F. (2006), \u201cOn the merits of orthogonalizing powered and product terms: implications for modeling interactions among latent variables Version: 1\/28\/2006 10:11 AM\u201d, available at: http:\/\/www.agencylab.ku.edu\/\u223cagencylab\/manuscripts\/(Little,%20Bovaird,%20and%20Widaman.in%20press).pdf."},{"key":"key2021123113231739200_ref053","doi-asserted-by":"crossref","first-page":"294","DOI":"10.1016\/j.jom.2008.09.004","article-title":"Governing buyer\u2013supplier relationships through transactional and relational mechanisms: evidence from China","volume":"27","year":"2009","journal-title":"Journal of Operations Management"},{"issue":"1","key":"key2021123113231739200_ref054","first-page":"1","article-title":"Information leakage and supply chain contracts","volume":"90","year":"2020","journal-title":"Omega"},{"issue":"9","key":"key2021123113231739200_ref055","doi-asserted-by":"crossref","first-page":"863","DOI":"10.1080\/07408170601019460","article-title":"Information sharing in supply chains: Incentives for information distortion","volume":"39","year":"2007","journal-title":"IIE Transactions"},{"issue":"3","key":"key2021123113231739200_ref056","doi-asserted-by":"publisher","first-page":"1118","DOI":"10.1080\/00207543.2017.1372647","article-title":"The industrial management of SMEs in the era of Industry 4.0","volume":"56","year":"2018","journal-title":"International Journal of Production Research"},{"issue":"3","key":"key2021123113231739200_ref057","first-page":"467","article-title":"Share if you care: the impact of information sharing and information quality on humanitarian supply chain - a social capital perspective","volume":"35","year":"2018","journal-title":"Information Development"},{"issue":"6","key":"key2021123113231739200_ref058","doi-asserted-by":"publisher","first-page":"838","DOI":"10.1108\/JEIM-09-2014-0092","article-title":"A framework for collaborative Planning, forecasting and replenishment (CPFR): state of the art","volume":"28","year":"2015","journal-title":"Journal of Enterprise Information Management"},{"issue":"3","key":"key2021123113231739200_ref059","doi-asserted-by":"crossref","first-page":"358","DOI":"10.1108\/JEIM-08-2017-0114","article-title":"Supply chain collaboration and firm's performance: the critical role of information sharing and trust","volume":"31","year":"2018","journal-title":"Journal of Enterprise Information Management"},{"issue":"1","key":"key2021123113231739200_ref060","doi-asserted-by":"publisher","first-page":"539","DOI":"10.1146\/annurev-psych-120710-100452","article-title":"Sources of method bias in social science research and recommendations on how to control it","volume":"63","year":"2012","journal-title":"Annual Review of Psychology"},{"issue":"1","key":"key2021123113231739200_ref061","doi-asserted-by":"publisher","first-page":"514","DOI":"10.1016\/j.ijoe.2011.09.001","article-title":"Supply chain integration and performance: the effects of long-term relationships, information technology and sharing, and logistics integration","volume":"153","year":"2012","journal-title":"International Journal of Production Economics"},{"key":"key2021123113231739200_ref062","doi-asserted-by":"crossref","first-page":"269","DOI":"10.1016\/j.cie.2018.09.042","article-title":"Information sharing in supply chain collaboration","volume":"126","year":"2018","journal-title":"Computers and Industrial Engineering"},{"volume-title":"SmartPLS 3. B\u00f6nningstedt: SmartPLS","year":"2015","key":"key2021123113231739200_ref063"},{"issue":"5","key":"key2021123113231739200_ref064","doi-asserted-by":"crossref","first-page":"1104","DOI":"10.1108\/JKM-05-2017-0172","article-title":"External knowledge sharing and radical innovation: the downsides of uncontrolled openness","volume":"22","year":"2018","journal-title":"Journal of Knowledge Management"},{"issue":"4","key":"key2021123113231739200_ref065","doi-asserted-by":"crossref","first-page":"361","DOI":"10.1108\/17410390810888651","article-title":"Organizational culture and supply chain strategy: a framework for effective information flows","volume":"21","year":"2008","journal-title":"Journal of Enterprise Information Management"},{"key":"key2021123113231739200_ref066","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1016\/j.cose.2015.05.012","article-title":"Information security conscious care behavior formation in organizations","volume":"53","year":"2015","journal-title":"Computers and Security"},{"issue":"3","key":"key2021123113231739200_ref067","doi-asserted-by":"crossref","first-page":"1005","DOI":"10.2308\/accr-10216","article-title":"Process integration and information sharing in supply chains","volume":"87","year":"2012","journal-title":"The Accounting Review"},{"issue":"4","key":"key2021123113231739200_ref068","doi-asserted-by":"crossref","first-page":"471","DOI":"10.1108\/SCM-11-2014-0386","article-title":"The role of collaboration in supply chain resilience","volume":"20","year":"2015","journal-title":"Supply Chain Management: International Journal"},{"first-page":"474","article-title":"Information under the network environment using computer information security technology","year":"2015","key":"key2021123113231739200_ref069"},{"issue":"1","key":"key2021123113231739200_ref070","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1016\/j.compedu.2013.05.010","article-title":"Information security- Professional perceptions of knowledge-sharing intention under self-efficacy, trust, reciprocity and shared-language","volume":"68","year":"2013","journal-title":"Computers and Education"},{"issue":"5","key":"key2021123113231739200_ref071","doi-asserted-by":"crossref","first-page":"377","DOI":"10.1108\/09600031011052831","article-title":"Supply chain information and relational alignment: mediators of EDI on firm Performance","volume":"40","year":"2010","journal-title":"International Journal of Physical Distribution and Logistics Management"},{"issue":"3","key":"key2021123113231739200_ref072","doi-asserted-by":"publisher","first-page":"621","DOI":"10.1007\/s10796-015-9553-6","article-title":"Information and knowledge leakage in supply chain","volume":"18","year":"2015","journal-title":"Information Systems Frontiers"},{"issue":"1","key":"key2021123113231739200_ref073","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1080\/00207543.2010.58942","article-title":"Cultivating an organizational information security culture","volume":"49","year":"2006","journal-title":"Computer Fraud and Security"},{"key":"key2021123113231739200_ref074","doi-asserted-by":"crossref","first-page":"476","DOI":"10.1016\/j.cose.2009.10.005","article-title":"Information security culture: a management perspective","volume":"29","year":"2010","journal-title":"Computers and Security"},{"key":"key2021123113231739200_ref075","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1016\/j.cose.2013.04.004","article-title":"From information security to cyber security","volume":"38","year":"2013","journal-title":"Computers and Security"},{"issue":"5","key":"key2021123113231739200_ref076","doi-asserted-by":"crossref","first-page":"371","DOI":"10.1016\/j.cose.2004.05.002","article-title":"The 10 deadly sins of information security management","volume":"23","year":"2004","journal-title":"Computers and Security"},{"issue":"2","key":"key2021123113231739200_ref077","doi-asserted-by":"crossref","first-page":"280","DOI":"10.1016\/j.im.2018.09.005","article-title":"Information sharing and the impact of shutdown policy in a supply chain with market disruption risk in the social media era","volume":"56","year":"2019","journal-title":"Information and Management"},{"key":"key2021123113231739200_ref078","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1007\/s11747-011-0268-z","article-title":"Transaction cost economics and its uses in marketing","volume":"40","year":"2012","journal-title":"Journal of the Academy of Marketing Science"},{"first-page":"800","volume-title":"Building an Information Technology Security Awareness and Training Program","year":"2003","key":"key2021123113231739200_ref079"},{"key":"key2021123113231739200_ref080","doi-asserted-by":"crossref","first-page":"222","DOI":"10.1016\/j.resconrec.2016.10.002","article-title":"Could the service consumption-production interface lift national logistics performance?","volume":"128","year":"2018","journal-title":"Resources, Conservation and Recycling"},{"key":"key2021123113231739200_ref081","doi-asserted-by":"crossref","first-page":"122","DOI":"10.1016\/j.ijpe.2013.09.016","article-title":"Information sharing and collaborative behaviors in enabling supply chain performance: a social exchange perspective","volume":"148","year":"2014","journal-title":"International Journal of Production Economics"},{"issue":"7","key":"key2021123113231739200_ref082","doi-asserted-by":"publisher","first-page":"1056","DOI":"10.1108\/IJOPM-01-2014-0037","article-title":"Knowledge sharing, commitment and opportunism in new product development","volume":"5","year":"2015","journal-title":"International Journal of Operations and Production Management"},{"issue":"2","key":"key2021123113231739200_ref083","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1016\/j.giq\/2010.06.008","article-title":"Information-sharing in public organizations: a literature review of interpersonal, intra-organizational and inter-organizational success factors","volume":"28","year":"2011","journal-title":"Government Information Quarterly"},{"issue":"3","key":"key2021123113231739200_ref084","doi-asserted-by":"crossref","first-page":"370","DOI":"10.1016\/j.cie.2013.03.012","article-title":"Effects of information technology alignment and information sharing on supply chain operational performance","volume":"65","year":"2013","journal-title":"Computers and Industrial Engineering"},{"issue":"3","key":"key2021123113231739200_ref085","doi-asserted-by":"crossref","first-page":"351","DOI":"10.1016\/j.compind.2010.10.002","article-title":"Modeling and evaluating information leakage caused by inferences in supply chains","volume":"62","year":"2011","journal-title":"Computers in Industry"},{"issue":"4","key":"key2021123113231739200_ref086","doi-asserted-by":"publisher","first-page":"1351","DOI":"10.1007\/s10845-011-0527-3","article-title":"Mitigating the risk of information leakage in a two-level supply chain through optimal supplier selection","volume":"23","year":"2012","journal-title":"Journal of Intelligent Manufacturing"},{"issue":"1","key":"key2021123113231739200_ref087","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1108\/IJPDLM-11-2017-0341","article-title":"How supply chain analytics enables operational supply chain transparency: an organizational information processing theory perspective","volume":"48","year":"2018","journal-title":"International Journal of Physical Distribution and Logistics Management"}],"container-title":["Journal of Enterprise Information Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/JEIM-11-2019-0368\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/JEIM-11-2019-0368\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T22:32:20Z","timestamp":1753396340000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/jeim\/article\/34\/1\/28-53\/516558"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6,12]]},"references-count":87,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2020,6,12]]},"published-print":{"date-parts":[[2021,1,28]]}},"alternative-id":["10.1108\/JEIM-11-2019-0368"],"URL":"https:\/\/doi.org\/10.1108\/jeim-11-2019-0368","relation":{},"ISSN":["1741-0398"],"issn-type":[{"type":"print","value":"1741-0398"}],"subject":[],"published":{"date-parts":[[2020,6,12]]}}}