{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,4]],"date-time":"2026-05-04T20:52:31Z","timestamp":1777927951774,"version":"3.51.4"},"reference-count":89,"publisher":"SAGE Publications","issue":"1","license":[{"start":{"date-parts":[[2022,11,22]],"date-time":"2022-11-22T00:00:00Z","timestamp":1669075200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["Journal of Librarianship and Information Science"],"published-print":{"date-parts":[[2024,3]]},"abstract":"<jats:p>This study examined the knowledge hiding behaviour (KHB) of undergraduates of a university in southwestern, Nigeria, as well as the individual and social factors influencing their knowledge hiding behaviour. The study adopted the descriptive survey design. Random sampling was used to select 390 undergraduates across the faculties of the university. A structured questionnaire was used to collect data. Findings revealed that the undergraduates engaged in knowledge hiding. The study also identified the various methods the students used to hide knowledge, among which are pretense of lack of knowledge, avoiding interactive classes, reading alone and unwillingness to release lecture notes, among others. The results show that the individual factors (distrust and psychological ownership), as well as the social factors (negative or lack of mutual reciprocity, lack of social interaction and lack of social identification), predicted the KHB of the students. The study concluded that the undergraduates engaged in knowledge hiding in so many ways and for many reasons. The individual factors of the students, as well as the social factors surrounding them, predicted their KHB. The study made some recommendations for research and practice.<\/jats:p>","DOI":"10.1177\/09610006221133564","type":"journal-article","created":{"date-parts":[[2022,11,22]],"date-time":"2022-11-22T08:59:24Z","timestamp":1669107564000},"page":"145-163","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":3,"title":["Knowledge hiding in the academia: Individual and social factors predicting knowledge hiding behaviour of undergraduates of a Nigerian university"],"prefix":"10.1177","volume":"56","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1892-5346","authenticated-orcid":false,"given":"Funmilola O","family":"Omotayo","sequence":"first","affiliation":[{"name":"University of Ibadan, Nigeria"}]},{"given":"Aderonke O","family":"Akintibubo","sequence":"additional","affiliation":[{"name":"University of Ibadan, Nigeria"}]}],"member":"179","published-online":{"date-parts":[[2022,11,22]]},"reference":[{"issue":"2","key":"e_1_3_3_2_1","first-page":"332","article-title":"Supervisor\u2019 knowledge hiding and knowledge-based trust: From the lens of social impact theory","volume":"74","author":"Afshan G","year":"2022","unstructured":"Afshan G, Sahibzada UF, Rani H, et al. (2022) Supervisor\u2019 knowledge hiding and knowledge-based trust: From the lens of social impact theory. Aslib Journal of Information Management 74(2): 332\u2013353.","journal-title":"Aslib Journal of Information Management"},{"key":"e_1_3_3_3_1","doi-asserted-by":"publisher","DOI":"10.21272\/sec.2(4).114-122.2018"},{"key":"e_1_3_3_4_1","doi-asserted-by":"publisher","DOI":"10.14738\/abr.25.355"},{"key":"e_1_3_3_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.indmarman.2017.03.007"},{"key":"e_1_3_3_6_1","doi-asserted-by":"publisher","DOI":"10.1080\/10963758.2013.850294"},{"key":"e_1_3_3_7_1","doi-asserted-by":"publisher","DOI":"10.1002\/job.583"},{"key":"e_1_3_3_8_1","doi-asserted-by":"crossref","unstructured":"Batool U Raziq MM Obaid A et al. (2022) Psychological ownership and knowledge behaviors during a pandemic: Role of approach motivation. Current Psychology. Epub ahead of print 15 August 2022. https:\/\/doi.org\/10.1007\/s12144-022-03450-y","DOI":"10.1007\/s12144-022-03450-y"},{"key":"e_1_3_3_9_1","doi-asserted-by":"publisher","DOI":"10.5465\/amd.2014.0015"},{"key":"e_1_3_3_10_1","doi-asserted-by":"publisher","DOI":"10.5267\/j.msl.2018.10.015"},{"key":"e_1_3_3_11_1","volume-title":"Power and Exchange in Social Life","author":"Blau P","year":"1964","unstructured":"Blau P (1964) Power and Exchange in Social Life. New York: John Wiley and Sons."},{"key":"e_1_3_3_12_1","doi-asserted-by":"publisher","DOI":"10.2307\/25148669"},{"key":"e_1_3_3_13_1","doi-asserted-by":"publisher","DOI":"10.1287\/orsc.1090.0507"},{"key":"e_1_3_3_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/B978-012057770-5\/50016-3"},{"key":"e_1_3_3_15_1","doi-asserted-by":"publisher","DOI":"10.1111\/joop.12249"},{"key":"e_1_3_3_16_1","doi-asserted-by":"publisher","DOI":"10.1108\/JKM-04-2019-0204"},{"key":"e_1_3_3_17_1","doi-asserted-by":"crossref","unstructured":"Caliendo M Fossen F Kritikos A (2010) Trust positive reciprocity and negative reciprocity: Do these traits impact entrepreneurial dynamics? IZA Discussion Paper No. 5370 1\u201337. https:\/\/doi.org\/10.2139\/ssrn.1728327","DOI":"10.2139\/ssrn.1728327"},{"key":"e_1_3_3_18_1","doi-asserted-by":"publisher","DOI":"10.5465\/amj.2012.0122"},{"key":"e_1_3_3_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2006.04.001"},{"key":"e_1_3_3_20_1","doi-asserted-by":"publisher","DOI":"10.1002\/job.2407"},{"key":"e_1_3_3_21_1","doi-asserted-by":"publisher","DOI":"10.1108\/01437730310485815"},{"key":"e_1_3_3_22_1","doi-asserted-by":"publisher","DOI":"10.1002\/job.737"},{"key":"e_1_3_3_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-24319-4_7"},{"key":"e_1_3_3_24_1","doi-asserted-by":"publisher","DOI":"10.1177\/0149206305279602"},{"key":"e_1_3_3_25_1","volume-title":"Working Knowledge: How Organisations Manage What They Know","author":"Davenport TH","year":"1998","unstructured":"Davenport TH, Prusak L (1998) Working Knowledge: How Organisations Manage What They Know. Boston, MA: Harvard Business School Press."},{"issue":"1","key":"e_1_3_3_26_1","first-page":"128","article-title":"Knowledge hiding in academia: Is personality a key factor?","volume":"5","author":"Demirkas\u0131mo\u011flu N","year":"2016","unstructured":"Demirkas\u0131mo\u011flu N (2016) Knowledge hiding in academia: Is personality a key factor? International Journal of Higher Education 5(1): 128\u2013140.","journal-title":"International Journal of Higher Education"},{"key":"e_1_3_3_27_1","doi-asserted-by":"publisher","DOI":"10.1287\/orsc.2014.0945"},{"key":"e_1_3_3_28_1","doi-asserted-by":"publisher","DOI":"10.4018\/jkm.2008100101"},{"issue":"7","key":"e_1_3_3_29_1","doi-asserted-by":"crossref","first-page":"783","DOI":"10.1002\/job.2364","article-title":"Different motivations for knowledge sharing and hiding: The role of motivating work design","volume":"40","author":"Gagn\u00e9 M","year":"2019","unstructured":"Gagn\u00e9 M, Tian AW, Soo C, et al. (2019) Different motivations for knowledge sharing and hiding: The role of motivating work design. Journal of Organizational Behavior, Special Issue: Understanding Knowledge Hiding in Organizations 40(7): 783\u2013799.","journal-title":"Journal of Organizational Behavior, Special Issue: Understanding Knowledge Hiding in Organizations"},{"key":"e_1_3_3_30_1","doi-asserted-by":"publisher","DOI":"10.2307\/2092623"},{"key":"e_1_3_3_31_1","first-page":"155","article-title":"An epistemology of trust","volume":"8","author":"Grovier T","year":"1994","unstructured":"Grovier T (1994) An epistemology of trust. International Journal of Moral and Social Studies 8: 155\u2013174.","journal-title":"International Journal of Moral and Social Studies"},{"key":"e_1_3_3_32_1","doi-asserted-by":"publisher","DOI":"10.1002\/job.2599"},{"key":"e_1_3_3_33_1","doi-asserted-by":"publisher","DOI":"10.1108\/13287261211255338"},{"key":"e_1_3_3_34_1","doi-asserted-by":"publisher","DOI":"10.1108\/JKM-11-2017-0531"},{"key":"e_1_3_3_35_1","doi-asserted-by":"publisher","DOI":"10.1108\/01425450310456479"},{"key":"e_1_3_3_36_1","doi-asserted-by":"publisher","DOI":"10.1108\/JKM-06-2015-0222"},{"key":"e_1_3_3_37_1","doi-asserted-by":"publisher","DOI":"10.1177\/000276426801200102"},{"key":"e_1_3_3_38_1","doi-asserted-by":"publisher","DOI":"10.1177\/0266382120969307"},{"key":"e_1_3_3_39_1","doi-asserted-by":"publisher","DOI":"10.1108\/BIJ-05-2019-0213"},{"key":"e_1_3_3_40_1","doi-asserted-by":"publisher","DOI":"10.1108\/HRMID-09-2018-0179"},{"key":"e_1_3_3_41_1","unstructured":"Ispirli D (2014) Knowledge as an object of psychological ownership and knowledge hiding via territoriality among knowledge workers. Manisa Turkey: Institute of Social Sciences. Available at: www.researchgate.net\/profile\/Deniz_Dirik\/publication\/ (accessed 7 November 2021)."},{"key":"e_1_3_3_42_1","doi-asserted-by":"crossref","unstructured":"Jessup SA Alarcon GM Capiola A et al. (2020) Multi-method approach measuring trust distrust and suspicion in information technology. In: Moallem A (ed.) HCI for Cybersecurity Privacy and Trust. HCII 2020. Lecture notes in Computer Science vol. 12210. Cham: Springer pp.412\u2013426. https:\/\/doi.org\/10.1007\/978-3-030-50309-3_27","DOI":"10.1007\/978-3-030-50309-3_27"},{"key":"e_1_3_3_43_1","doi-asserted-by":"publisher","DOI":"10.18352\/lq.10238"},{"key":"e_1_3_3_44_1","doi-asserted-by":"publisher","DOI":"10.1057\/kmrp.2014.24"},{"key":"e_1_3_3_45_1","doi-asserted-by":"publisher","DOI":"10.1108\/JKM-02-2017-0048"},{"key":"e_1_3_3_46_1","doi-asserted-by":"publisher","DOI":"10.17230\/ad-minister.30.7"},{"key":"e_1_3_3_47_1","doi-asserted-by":"publisher","DOI":"10.1177\/0266666918793927"},{"key":"e_1_3_3_48_1","doi-asserted-by":"publisher","DOI":"10.1108\/JKM-01-2015-0043"},{"key":"e_1_3_3_49_1","unstructured":"Liang TP Liu CC Wu CH (2008) Can social exchange theory explain individual knowledge-sharing behaviour? A meta-analysis. International Conference on Information Systems Proceedings 171: 1\u201338. https:\/\/aisel.aisnet.org\/icis2008\/171 (accessed 22 July 2021)."},{"key":"e_1_3_3_50_1","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511815447"},{"key":"e_1_3_3_51_1","unstructured":"Lorenz GV Buhtz K (2017) Social influence in technology adoption research: A literature review and research agenda. In: Proceedings of the 25th European Conference on Information Systems (ECIS) Guimar\u00e3es Portugal 5\u201310 June 2017 pp.2331\u20132351. ERN: Institutions. http:\/\/aisel.aisnet.org\/ecis2017_rp\/148"},{"key":"e_1_3_3_52_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.paid.2018.05.005"},{"key":"e_1_3_3_53_1","volume-title":"Knowledge hiding in organisations: A multilevel analysis of antecedents and consequences","author":"Mangold S","year":"2017","unstructured":"Mangold S (2017) Knowledge hiding in organisations: A multilevel analysis of antecedents and consequences. PhD Thesis, Technische Universitat Munchen."},{"key":"e_1_3_3_54_1","doi-asserted-by":"publisher","DOI":"10.3389\/fpsyg.2021.563070"},{"key":"e_1_3_3_55_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-4175-5_6"},{"key":"e_1_3_3_56_1","doi-asserted-by":"publisher","DOI":"10.2147\/PRBM.S348467"},{"issue":"2","key":"e_1_3_3_57_1","first-page":"279","article-title":"Knowledge hoarding among academic staff in higher education institutions in Uganda: Risk or strategy?","volume":"4","author":"Muhenda MB","year":"2014","unstructured":"Muhenda MB, Lwanga EK (2014) Knowledge hoarding among academic staff in higher education institutions in Uganda: Risk or strategy? World Review of Business Research 4(2): 279\u2013290.","journal-title":"World Review of Business Research"},{"key":"e_1_3_3_58_1","doi-asserted-by":"publisher","DOI":"10.2307\/259373"},{"key":"e_1_3_3_59_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbusres.2021.09.026"},{"key":"e_1_3_3_60_1","doi-asserted-by":"publisher","DOI":"10.1108\/JSIT-02-2016-0009"},{"key":"e_1_3_3_61_1","doi-asserted-by":"crossref","unstructured":"Otache I Edopkolor JE (2022) Work placement learning and student employability: Do student satisfaction commitment and achievement matter? Industry and Higher Education. Epub ahead of print 8 May 2022. https:\/\/doi.org\/10.1177\/09504222221091989","DOI":"10.1177\/09504222221091989"},{"key":"e_1_3_3_62_1","doi-asserted-by":"crossref","unstructured":"Peng H (2013) Why and when do people hide knowledge? Journal of Knowledge Management 17(3): 398\u2013415. https:\/\/doi.org\/10.1108\/JKM-12-2012-0380","DOI":"10.1108\/JKM-12-2012-0380"},{"issue":"1","key":"e_1_3_3_63_1","first-page":"155","article-title":"Interpersonal trust and knowledge hiding behavior: The joint moderating effects of the personal reputation concern and perceived uncertainty","volume":"31","author":"Peng W","year":"2019","unstructured":"Peng W, Fangwei Z, Haoyang S, et al. (2019) Interpersonal trust and knowledge hiding behavior: The joint moderating effects of the personal reputation concern and perceived uncertainty. Management Review 31(1): 155\u2013170.","journal-title":"Management Review"},{"key":"e_1_3_3_64_1","doi-asserted-by":"publisher","DOI":"10.1002\/job.628"},{"key":"e_1_3_3_65_1","doi-asserted-by":"publisher","DOI":"10.2307\/259124"},{"key":"e_1_3_3_66_1","doi-asserted-by":"publisher","DOI":"10.1037\/1089-2680.7.1.84"},{"key":"e_1_3_3_67_1","doi-asserted-by":"publisher","DOI":"10.1037\/0021-9010.88.5.879"},{"key":"e_1_3_3_68_1","doi-asserted-by":"publisher","DOI":"10.1108\/JKM-09-2014-0391"},{"key":"e_1_3_3_69_1","doi-asserted-by":"publisher","DOI":"10.1108\/13673270510602746"},{"key":"e_1_3_3_70_1","unstructured":"Rusk JD (2018) Trust and distrust scale development: Operationalization and instrument validation. PhD Thesis Kennesaw State University. Available at: https:\/\/digitalcommons.kennesaw.edu\/dba_etd\/42 (accessed 7 January 2022)."},{"key":"e_1_3_3_71_1","doi-asserted-by":"publisher","DOI":"10.1108\/JKM-05-2016-0203"},{"key":"e_1_3_3_72_1","doi-asserted-by":"publisher","DOI":"10.1111\/cogs.12773"},{"key":"e_1_3_3_73_1","doi-asserted-by":"publisher","DOI":"10.1080\/14778238.2020.1774434"},{"key":"e_1_3_3_74_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbusres.2018.12.034"},{"key":"e_1_3_3_75_1","doi-asserted-by":"publisher","DOI":"10.1287\/orsc.4.3.367"},{"key":"e_1_3_3_76_1","doi-asserted-by":"publisher","DOI":"10.1080\/10494820802190374"},{"key":"e_1_3_3_77_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.obhdp.2010.07.001"},{"key":"e_1_3_3_78_1","doi-asserted-by":"publisher","DOI":"10.1177\/0893318920985178"},{"key":"e_1_3_3_79_1","doi-asserted-by":"publisher","DOI":"10.1108\/JKM-04-2017-0146"},{"key":"e_1_3_3_80_1","doi-asserted-by":"publisher","DOI":"10.1177\/1059601195202008"},{"key":"e_1_3_3_81_1","doi-asserted-by":"publisher","DOI":"10.1108\/JKM-07-2015-0268"},{"key":"e_1_3_3_82_1","doi-asserted-by":"publisher","DOI":"10.1002\/job.249"},{"key":"e_1_3_3_83_1","doi-asserted-by":"publisher","DOI":"10.5465\/amle.2013.0066"},{"key":"e_1_3_3_84_1","doi-asserted-by":"publisher","DOI":"10.2307\/25148667"},{"key":"e_1_3_3_85_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0742-7301(08)27001-5"},{"key":"e_1_3_3_86_1","doi-asserted-by":"publisher","DOI":"10.3389\/fpsyg.2021.796976"},{"issue":"1","key":"e_1_3_3_87_1","first-page":"1","article-title":"Partial least squares structural equation modeling (PLS-SEM) techniques using SmartPLS","volume":"24","author":"Wong KK-K","year":"2013","unstructured":"Wong KK-K (2013) Partial least squares structural equation modeling (PLS-SEM) techniques using SmartPLS. Marketing Bulletin 24(1): 1\u201332.","journal-title":"Marketing Bulletin"},{"key":"e_1_3_3_88_1","doi-asserted-by":"publisher","DOI":"10.3389\/fpsyg.2021.769282"},{"key":"e_1_3_3_89_1","doi-asserted-by":"publisher","DOI":"10.3389\/fpsyg.2022.833285"},{"key":"e_1_3_3_90_1","doi-asserted-by":"publisher","DOI":"10.26710\/jbsee.v8i1.2114"}],"container-title":["Journal of Librarianship and Information Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/09610006221133564","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.1177\/09610006221133564","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/09610006221133564","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T22:58:53Z","timestamp":1777676333000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.1177\/09610006221133564"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,22]]},"references-count":89,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2024,3]]}},"alternative-id":["10.1177\/09610006221133564"],"URL":"https:\/\/doi.org\/10.1177\/09610006221133564","relation":{},"ISSN":["0961-0006","1741-6477"],"issn-type":[{"value":"0961-0006","type":"print"},{"value":"1741-6477","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,11,22]]}}}