{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T07:30:35Z","timestamp":1771659035550,"version":"3.50.1"},"reference-count":96,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/OAPA.html"}],"funder":[{"DOI":"10.13039\/501100002671","name":"Universiti Tunku Abdul Rahman","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100002671","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2019]]},"DOI":"10.1109\/access.2019.2912657","type":"journal-article","created":{"date-parts":[[2019,6,6]],"date-time":"2019-06-06T20:09:31Z","timestamp":1559851771000},"page":"71286-71298","source":"Crossref","is-referenced-by-count":17,"title":["Investigation of Knowledge Sharing Behavior in Global Software Development Organizations Using Social Cognitive Theory"],"prefix":"10.1109","volume":"7","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4410-7841","authenticated-orcid":false,"given":"Rayhab","family":"Anwar","sequence":"first","affiliation":[]},{"given":"Mobashar","family":"Rehman","sequence":"additional","affiliation":[]},{"given":"Khor Siak","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Manzoor Ahmed","family":"Hashmani","sequence":"additional","affiliation":[]},{"given":"Amjad","family":"Shamim","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2015.12.037"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1016\/j.technovation.2009.04.003"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.2307\/25148667"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.2307\/25148670"},{"key":"ref76","author":"gorsuch","year":"1983","journal-title":"Factor Analysis"},{"key":"ref77","author":"kline","year":"1979","journal-title":"Psychometrics and Psychology"},{"key":"ref74","year":"2015","journal-title":"Malaysia-Annual-Industry-Report"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.15439\/2014F280"},{"key":"ref75","author":"robson","year":"2002","journal-title":"Real World Research"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1111\/isj.12053"},{"key":"ref78","author":"hair","year":"2009","journal-title":"Multivariate Data Analysis with Readings"},{"key":"ref79","author":"guilford","year":"1954","journal-title":"Psychometric Methods"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1201\/b19481"},{"key":"ref32","author":"battle","year":"2009","journal-title":"Essentials of public health biology A guide for the study of pathophysiology"},{"key":"ref31","first-page":"1","article-title":"Practice makes a difference: Experience and e-commerce","volume":"24","author":"klopping","year":"2006","journal-title":"Info Technol Learn Perf J"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1108\/02652320710728410"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1057\/palgrave.ejis.3000520"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1146\/annurev.publhealth.20.1.287"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.2307\/2393008"},{"key":"ref34","first-page":"43","article-title":"Building your information systems from the other side of the World: How Infosys manages time zone differences","volume":"5","author":"carmel","year":"2006","journal-title":"MIS Quart Executive"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1002\/smr.473"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1007\/BF02310555"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1108\/03055721211227255"},{"key":"ref63","author":"van de ven","year":"1980","journal-title":"Measuring and Assessing Organizations"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.2307\/249688"},{"key":"ref64","author":"burns","year":"2003","journal-title":"Marketing Research Online Research Applications"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1287\/isre.11.4.418.11876"},{"key":"ref65","year":"2012","journal-title":"Competing Across Borders How Cultural and Communication Barriers Affect Business"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2003.1205177"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1108\/02635570410567757"},{"key":"ref67","author":"davenport","year":"1998","journal-title":"Working Knowledge How Organizations Manage What They Know"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijintrel.2011.09.005"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/ICGSE.2011.22"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.19026\/rjaset.7.326"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/S0378-7206(00)00074-4"},{"key":"ref20","first-page":"145","article-title":"Predicting software self efficacy among business students: A preliminary assessment","volume":"14","author":"havelka","year":"2003","journal-title":"J Inf Syst Educ"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2010.05.029"},{"key":"ref21","first-page":"1","article-title":"The role of social presence and moderating role of computer self efficacy in predicting the continuance usage of e-learning systems","volume":"15","author":"hayashi","year":"2004","journal-title":"J Inf Syst Educ"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2016.11.015"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.2174\/1874110X01509012332"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-9707-4_13"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1080\/15205436.2018.1484489"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/982372.982405"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1080\/09537325.2016.1194387"},{"key":"ref95","first-page":"323","article-title":"Why incentive plans cannot work","volume":"71","author":"kohn","year":"1993","journal-title":"Harvard Bus Rev"},{"key":"ref94","first-page":"1","article-title":"Multi-level knowledge transfer in software development outsourcing projects: The agency theory view","author":"nuwangi","year":"2012","journal-title":"Proc 33rd Int Conf Inf Syst"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1002\/j.1681-4835.2014.tb00462.x"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1016\/j.jssr.2017.05.004"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/ICGSEW.2013.11"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/ICGSE.2006.261210"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2014.02.010"},{"key":"ref59","author":"andersen","year":"2012","journal-title":"Essentials of Sociology"},{"key":"ref58","first-page":"79","article-title":"Employee motivation and its most influential factors: A study on the telecommunication industry in Bangladesh","volume":"5","author":"safiullah","year":"2015","journal-title":"World"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1006\/ceps.1999.1020"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/NatPC.2011.6136312"},{"key":"ref55","first-page":"156","article-title":"Challenges and practices for effective knowledge transfer in globally distributed teams","author":"kroll","year":"2016","journal-title":"Proc Int'l Joint Conf on Knowledge Discovery Knowledge Eng and Knowledge Management"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/AIMSEC.2011.6011441"},{"key":"ref53","doi-asserted-by":"crossref","DOI":"10.4135\/9781446217375","author":"baumard","year":"1999","journal-title":"Tacit Knowledge in Organizations"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-19728-9_22"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2014.10.008"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2006.09.003"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/1835428.1835445"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.2307\/258173"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.4018\/joeuc.2008070102"},{"key":"ref14","first-page":"27","article-title":"An empirical examination of a model of computer learning performance","volume":"44","author":"hasan","year":"2004","journal-title":"J Comput Inf Syst"},{"key":"ref15","first-page":"365","article-title":"An enhanced technology acceptance model for Web-based learning","volume":"15","author":"gong","year":"2004","journal-title":"J Inf Syst Educ"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1177\/009207038801600107"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1108\/01409170610645402"},{"key":"ref81","first-page":"295","article-title":"The partial least squares approach to structural equation modeling","volume":"295","author":"chin","year":"1998","journal-title":"Modern Methods for Business Research"},{"key":"ref17","first-page":"17","article-title":"The impact of general and system-specific self-efficacy on computer training learning and reactions","volume":"9","author":"hasan","year":"2006","journal-title":"J Manage Inf Decis Sci"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.2307\/3150980"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.4018\/joeuc.2006010103"},{"key":"ref83","volume":"6","author":"hair","year":"2006","journal-title":"Multivariate Data Analysis with Readings"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.4018\/irmj.2007070106"},{"key":"ref80","author":"hair","year":"2014","journal-title":"A Primer on Partial Least Squares Structural Equation Modeling (PLS-SEM)"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1016\/j.jsis.2007.01.001"},{"key":"ref4","first-page":"159","article-title":"Trust, collaborative culture and tacit knowledge sharing in project management&#x2014;A relationship model","author":"kucharska","year":"2016","journal-title":"Proc 13th Int Conf Intellectual Capital Knowl Manage Org Learn (ICICKM)"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511615351"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2017.03.006"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2016.08.002"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1016\/j.lrp.2013.01.001"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2016.06.007"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/ICOSST.2015.7396413"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TEM.2007.893997"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1093\/elt\/54.4.328"},{"key":"ref87","author":"carmel","year":"1999","journal-title":"Global Software Teams Collaborating Across Borders and Time Zones"},{"key":"ref88","author":"karolak","year":"1999","journal-title":"Global Software Development Managing Virtual Teams and Environments"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1111\/exsy.12005"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/2925995.2926039"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ICGSE.2010.48"},{"key":"ref48","doi-asserted-by":"crossref","first-page":"465","DOI":"10.2105\/AJPH.91.3.465a","article-title":"A definition of &#x2019;social environment","volume":"91","author":"casper","year":"2001","journal-title":"Amer J Public Health"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1016\/j.hitech.2013.02.006"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1108\/JSIT-09-2012-0054"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ICGSE.2016.30"},{"key":"ref44","doi-asserted-by":"crossref","first-page":"27","DOI":"10.4156\/jdcta.vol6.issue21.4","article-title":"Knowledge sharing management risks in outsourcing from various continents perspective: A systematic literature review","volume":"6","author":"alam","year":"2012","journal-title":"Int J Digit Content Technol Appl"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-010-0105-9"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8600701\/08732822.pdf?arnumber=8732822","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,19]],"date-time":"2022-09-19T19:06:09Z","timestamp":1663614369000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8732822\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"references-count":96,"URL":"https:\/\/doi.org\/10.1109\/access.2019.2912657","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]}}}