{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,25]],"date-time":"2025-09-25T16:02:03Z","timestamp":1758816123169,"version":"3.37.3"},"reference-count":106,"publisher":"American Accounting Association","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,3,1]]},"abstract":"<jats:title>ABSTRACT<\/jats:title>\n               <jats:p>This study investigates the effects of media affordances and information security awareness on knowledge-sharing behavior among global software development (GSD) team members. Using survey data collected from 214 GSD team members, we identify three organizational media affordances based on prior affordance literature: awareness, searchability, and editability. Positive relationships are found between perceived media affordances and actualized media affordances. Two actualized affordances, awareness and editability, have significant relationships with knowledge-sharing behavior that are moderated by awareness of information security. We further find that occupational culture due to region affects some relationships among media affordances and knowledge-sharing behavior. This study contributes to the affordance literature by identifying the organizational media affordances related to knowledge-sharing behavior and showing that users' awareness of information security moderates the relationships of these media affordances on knowledge-sharing. This study provides managerial insights into how media's technical properties and users' awareness of information security shape members' knowledge-sharing.<\/jats:p>","DOI":"10.2308\/isys-2020-072","type":"journal-article","created":{"date-parts":[[2021,7,1]],"date-time":"2021-07-01T13:49:42Z","timestamp":1625147382000},"page":"111-132","source":"Crossref","is-referenced-by-count":3,"title":["Assessing Effects of Media Affordances and Information Security Awareness on Knowledge-Sharing in Global Software Development"],"prefix":"10.2308","volume":"36","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3743-7241","authenticated-orcid":true,"given":"Linda","family":"Greene","sequence":"first","affiliation":[{"name":"LG Energy Solutions"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6778-1444","authenticated-orcid":true,"given":"Inkyoung","family":"Hur","sequence":"additional","affiliation":[{"name":"Florida Atlantic University"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8994-6497","authenticated-orcid":true,"given":"Yair","family":"Levy","sequence":"additional","affiliation":[{"name":"Nova Southeastern University"}]},{"given":"Ling","family":"Wang","sequence":"additional","affiliation":[{"name":"Nova Southeastern University"}]},{"given":"Keumseok","family":"Kang","sequence":"additional","affiliation":[{"name":"Korea Advanced Institute of Science and Technology"}]}],"member":"1112","published-online":{"date-parts":[[2021,6,30]]},"reference":[{"key":"2024082915283249900_i1558-7959-36-1-111-Ambos1","doi-asserted-by":"crossref","unstructured":"Ambos,\n              T. C.,\n            \n            \n              Ambos\n              B.,\n            \n            \n              Eich\n              K. J.,\n             and\n\t\t\t\t\t\tPuckJ.\n          2016.\n\t\t\t\t\tImbalance and isolation: How team configurations affect global knowledge sharing.\n\t\t\t\t\tJournal of International Management22 (\n\t\t\t\t\t4):\n\t\t\t\t\t316\u2013\n\t\t\t\t\t332.\n\t\t\t\t\thttps:\/\/doi.org\/10.1016\/j.intman.2016.03.005","DOI":"10.1016\/j.intman.2016.03.005"},{"key":"2024082915283249900_i1558-7959-36-1-111-Andrade1","doi-asserted-by":"crossref","unstructured":"Andrade,\n              A. D.,\n             and\n\t\t\t\t\t\tUrquhartC.\n          2010.\n\t\t\t\t\tThe affordances of actor network theory in ICT for development research.\n\t\t\t\t\tInformation Technology & People23 (\n\t\t\t\t\t4):\n\t\t\t\t\t352\u2013\n\t\t\t\t\t374.\n\t\t\t\t\thttps:\/\/doi.org\/10.1108\/09593841011087806","DOI":"10.1108\/09593841011087806"},{"key":"2024082915283249900_i1558-7959-36-1-111-Anwar1","doi-asserted-by":"crossref","unstructured":"Anwar,\n              R.,\n            \n            \n              Rehman\n              M.,\n            \n            \n              Wang\n              K. S.,\n            \n            \n              Amin\n              A.,\n             and\n\t\t\t\t\t\tAkbarR.\n          2017.\n\t\t\t\t\tConceptual Framework for Implementation of Knowledge Sharing in Global Software Development Organizations.\n\t\t\t\t\tProceedings of the 2017 IEEE Symposium on Computer Applications and Industrial Electronics, Langkawi, Malaysia, April 24\u201325.","DOI":"10.1109\/ISCAIE.2017.8074972"},{"key":"2024082915283249900_i1558-7959-36-1-111-Bacabac1","unstructured":"Bacabac,\n              F.\n            \n          \n          2012.\n\t\t\t\t\tRevisiting collaborative writing and electronic dialogues in business communication.\n\t\t\t\t\tInCollaborative Learning and Writing: Essays on Using Small Groups in Teaching English and Composition,  edited byHunzerK. M.,166\u2013\n\t\t\t\t\t180.\n\t\t\t\t\tJefferson, NC:\n\t\t\t\t\tMcFarland."},{"key":"2024082915283249900_i1558-7959-36-1-111-Baker1","doi-asserted-by":"crossref","unstructured":"Baker,\n              G.\n            \n          \n          2002.\n\t\t\t\t\tThe effects of synchronous collaborative technologies on decision making: A study of virtual teams.\n\t\t\t\t\tInformation Resources Management Journal15 (\n\t\t\t\t\t4):\n\t\t\t\t\t79\u2013\n\t\t\t\t\t93.\n\t\t\t\t\thttps:\/\/doi.org\/10.4018\/irmj.2002100106","DOI":"10.4018\/irmj.2002100106"},{"key":"2024082915283249900_i1558-7959-36-1-111-Barad1","doi-asserted-by":"crossref","unstructured":"Barad,\n              K.\n            \n          \n          1996.\n\t\t\t\t\tMeeting the universe halfway: Realism and social constructivism without contradiction.\n\t\t\t\t\tInFeminism, Science, and the Philosophy of Science,  edited byNelsonL. H. and\n\t\t\t\t\t\tNelsonJ.,161\u2013\n\t\t\t\t\t194.\n\t\t\t\t\tDordrecht, The Netherlands:\n\t\t\t\t\tKluwer Press.","DOI":"10.1007\/978-94-009-1742-2_9"},{"key":"2024082915283249900_i1558-7959-36-1-111-Barrett1","doi-asserted-by":"crossref","unstructured":"Barrett,\n              M.,\n            \n            \n              Cooper\n              D. J.,\n             and\n\t\t\t\t\t\tJamalK.\n          2005.\n\t\t\t\t\tGlobalization and the coordinating of work in multinational audits.\n\t\t\t\t\tAccounting, Organizations and Society30 (\n\t\t\t\t\t1):\n\t\t\t\t\t1\u2013\n\t\t\t\t\t24.\n\t\t\t\t\thttps:\/\/doi.org\/10.1016\/j.aos.2004.02.002","DOI":"10.1016\/j.aos.2004.02.002"},{"key":"2024082915283249900_i1558-7959-36-1-111-Bechky1","doi-asserted-by":"crossref","unstructured":"Bechky,\n              B. A.\n            \n          \n          2003.\n\t\t\t\t\tSharing meaning across occupational communities: The transformation of understanding on a production floor.\n\t\t\t\t\tOrganization Science14 (\n\t\t\t\t\t3):\n\t\t\t\t\t312\u2013\n\t\t\t\t\t330.\n\t\t\t\t\thttps:\/\/doi.org\/10.1287\/orsc.14.3.312.15162","DOI":"10.1287\/orsc.14.3.312.15162"},{"key":"2024082915283249900_i1558-7959-36-1-111-Benaloh1","doi-asserted-by":"crossref","unstructured":"Benaloh,\n              J.,\n            \n            \n              Chase\n              M.,\n            \n            \n              Horvitz\n              E.,\n             and\n\t\t\t\t\t\tLauterK.\n          2009.\n\t\t\t\t\tPatient Controlled Encryption: Ensuring Privacy of Electronic Medical Records.\n\t\t\t\t\tProceedings of the 2009 ACM Workshop on Cloud Computing Security, Chicago, IL, November 9\u201313.","DOI":"10.1145\/1655008.1655024"},{"key":"2024082915283249900_i1558-7959-36-1-111-Bresica1","unstructured":"Bresica,\n              E.\n            \n          \n          2020.\n\t\t\t\t\tAt software firms, many people already worked from home.\n\t\t\t\t\tAvailable at: https:\/\/www.economist.com\/the-world-ahead\/2020\/11\/17\/at-software-firms-many-people-already-worked-from-home"},{"key":"2024082915283249900_i1558-7959-36-1-111-BurtonJones1","doi-asserted-by":"crossref","unstructured":"Burton-Jones,\n              A.,\n             and\n\t\t\t\t\t\tStraubD. W.\n          2006.\n\t\t\t\t\tReconceptualizing system usage: An approach and empirical test.\n\t\t\t\t\tInformation Systems Research17 (\n\t\t\t\t\t3):\n\t\t\t\t\t228\u2013\n\t\t\t\t\t246.\n\t\t\t\t\thttps:\/\/doi.org\/10.1287\/isre.1060.0096","DOI":"10.1287\/isre.1060.0096"},{"key":"2024082915283249900_i1558-7959-36-1-111-Byrne1","unstructured":"Byrne,\n              B. M.\n            \n          \n          2001.\n\t\t\t\t\tStructural Equation Modeling with AMOS: Basic Concepts, Applications, and Programming.\n\t\t\t\t\tMahwah, NJ:\n\t\t\t\t\tLaurence Erlbaum Associates. Inc., Publishers."},{"key":"2024082915283249900_i1558-7959-36-1-111-Cabrera1","doi-asserted-by":"crossref","unstructured":"Cabrera,\n              A.,\n             and\n\t\t\t\t\t\tCabreraE. F.\n          2002.\n\t\t\t\t\tKnowledge-sharing dilemmas.\n\t\t\t\t\tOrganization Studies23 (\n\t\t\t\t\t5):\n\t\t\t\t\t687\u2013\n\t\t\t\t\t710.\n\t\t\t\t\thttps:\/\/doi.org\/10.1177\/0170840602235001","DOI":"10.1177\/0170840602235001"},{"key":"2024082915283249900_i1558-7959-36-1-111-Carlson1","doi-asserted-by":"crossref","unstructured":"Carlson,\n              J. R.,\n             and\n\t\t\t\t\t\tGeorgeJ. F.\n          2004.\n\t\t\t\t\tMedia appropriateness in the conduct and discovery of deceptive communication: The relative influence of richness and synchronicity.\n\t\t\t\t\tGroup Decision and Negotiation13 (\n\t\t\t\t\t2):\n\t\t\t\t\t191\u2013\n\t\t\t\t\t210.\n\t\t\t\t\thttps:\/\/doi.org\/10.1023\/b:Grup.0000021841.01346.35","DOI":"10.1023\/B:GRUP.0000021841.01346.35"},{"key":"2024082915283249900_i1558-7959-36-1-111-Casey1","doi-asserted-by":"crossref","unstructured":"Casey,\n              V.\n            \n          \n          2011.\n\t\t\t\t\tImparting the importance of culture to global software development.\n\t\t\t\t\tACM Inroads1 (\n\t\t\t\t\t3):\n\t\t\t\t\t51\u2013\n\t\t\t\t\t57.\n\t\t\t\t\thttps:\/\/doi.org\/10.1145\/1835428.1835443","DOI":"10.1145\/1835428.1835443"},{"key":"2024082915283249900_i1558-7959-36-1-111-Chan1","doi-asserted-by":"crossref","unstructured":"Chan,\n              M.,\n            \n            \n              Woon\n              I.,\n             and\n\t\t\t\t\t\tKankanhalliA.\n          2005.\n\t\t\t\t\tPerceptions of information security in the workplace: Linking information security climate to compliant behavior.\n\t\t\t\t\tJournal of Information Privacy and Security1 (\n\t\t\t\t\t3):\n\t\t\t\t\t18\u2013\n\t\t\t\t\t41.\n\t\t\t\t\thttps:\/\/doi.org\/10.1080\/15536548.2005.10855772","DOI":"10.1080\/15536548.2005.10855772"},{"key":"2024082915283249900_i1558-7959-36-1-111-Chin1","doi-asserted-by":"crossref","unstructured":"Chin,\n              W. W.\n            \n          \n          2010.\n\t\t\t\t\tHow to write up and report PLS analyses.\n\t\t\t\t\tInHandbook of Partial Least Squares.\n\t\t\t\t\tBerlin and Heidelberg, Germany:\n\t\t\t\t\tSpringer.","DOI":"10.1007\/978-3-540-32827-8_29"},{"key":"2024082915283249900_i1558-7959-36-1-111-Cockrell1","doi-asserted-by":"crossref","unstructured":"Cockrell,\n              R. C.,\n            \n            \n              Stone\n              D. N.,\n             and\n\t\t\t\t\t\tWierB.\n          2018.\n\t\t\t\t\tAccounting for professional accountants' dysfunctional knowledge sharing: A Self-Determination Theory perspective.\n\t\t\t\t\tJournal of Information Systems32 (\n\t\t\t\t\t1):\n\t\t\t\t\t45\u2013\n\t\t\t\t\t65.\n\t\t\t\t\thttps:\/\/doi.org\/10.2308\/isys-51677","DOI":"10.2308\/isys-51677"},{"key":"2024082915283249900_i1558-7959-36-1-111-Cramton1","doi-asserted-by":"crossref","unstructured":"Cramton,\n              C. D.\n            \n          \n          2001.\n\t\t\t\t\tThe mutual knowledge problem and its consequences for dispersed collaboration.\n\t\t\t\t\tOrganization Science12 (\n\t\t\t\t\t3):\n\t\t\t\t\t346\u2013\n\t\t\t\t\t371.\n\t\t\t\t\thttps:\/\/doi.org\/10.1287\/orsc.12.3.346.10098","DOI":"10.1287\/orsc.12.3.346.10098"},{"key":"2024082915283249900_i1558-7959-36-1-111-DArcy1","doi-asserted-by":"crossref","unstructured":"D'Arcy,\n              J.,\n            \n            \n              Hovav\n              A.,\n             and\n\t\t\t\t\t\tGallettaD.\n          2009.\n\t\t\t\t\tUser awareness of security countermeasures and its impact on information systems misuse: A deterrence approach.\n\t\t\t\t\tInformation Systems Research20 (\n\t\t\t\t\t1):\n\t\t\t\t\t79\u2013\n\t\t\t\t\t98.\n\t\t\t\t\thttps:\/\/doi.org\/10.1287\/isre.1070.0160","DOI":"10.1287\/isre.1070.0160"},{"key":"2024082915283249900_i1558-7959-36-1-111-DaSilva1","doi-asserted-by":"crossref","unstructured":"Da Silva,\n              F.,\n            \n            \n              Prikladnicki\n              R.,\n            \n            \n              Fran\u00e7a\n              C.,\n            \n            \n              Monteiro\n              C.,\n            \n            \n              Costa\n              C.,\n             and\n\t\t\t\t\t\tRochaR.\n          2012.\n\t\t\t\t\tAn evidence-based model of distributed software development project management: Results from a systematic mapping study. Journal of Software: Evolution and Process24 (\n\t\t\t\t\t6):\n\t\t\t\t\t625\u2013\n\t\t\t\t\t642.\n\t\t\t\t\thttps:\/\/doi.org\/10.1002\/smr.563","DOI":"10.1002\/smr.563"},{"key":"2024082915283249900_i1558-7959-36-1-111-Davidson1","doi-asserted-by":"crossref","unstructured":"Davidson,\n              B. I.,\n            \n            \n              Desai\n              N. K.,\n             and\n\t\t\t\t\t\tGerardG. J.\n          2013.\n\t\t\t\t\tThe effect of continuous auditing on the relationship between internal audit sourcing and the external auditor's reliance on the internal audit function.\n\t\t\t\t\tJournal of Information Systems27 (\n\t\t\t\t\t1):\n\t\t\t\t\t41\u2013\n\t\t\t\t\t59.\n\t\t\t\t\thttps:\/\/doi.org\/10.2308\/isys-50430","DOI":"10.2308\/isys-50430"},{"key":"2024082915283249900_i1558-7959-36-1-111-Davison1","doi-asserted-by":"crossref","unstructured":"Davison,\n              R.,\n            \n            \n              B\u00e9langer\n              F.,\n            \n            \n              Ahuja\n              M.,\n            \n            \n              Watson-Manheim\n              M. B.,\n            \n            \n              DeLuca\n              D.,\n             and\n\t\t\t\t\t\tValacichJ. S.\n          2006.\n\t\t\t\t\tVirtual teams in and out of synchronicity.\n\t\t\t\t\tInformation Technology & People19 (\n\t\t\t\t\t4):\n\t\t\t\t\t323\u2013\n\t\t\t\t\t344.\n\t\t\t\t\thttps:\/\/doi.org\/10.1108\/09593840610718027","DOI":"10.1108\/09593840610718027"},{"key":"2024082915283249900_i1558-7959-36-1-111-Deloitte1","unstructured":"Deloitte.\n          2020.\n\t\t\t\t\tInternal Audit considerations in response to COVID-19.\n\t\t\t\t\tAvailable at: https:\/\/www2.deloitte.com\/content\/dam\/Deloitte\/uk\/Documents\/audit\/deloitte-uk-internal-audit-response-to-covid-19.pdf"},{"key":"2024082915283249900_i1558-7959-36-1-111-Dennis1","doi-asserted-by":"crossref","unstructured":"Dennis,\n              A. R.,\n             and\n\t\t\t\t\t\tKinneyS. T.\n          1998.\n\t\t\t\t\tTesting media richness theory in the new media: The effects of cues, feedback, and task equivocality.\n\t\t\t\t\tInformation Systems Research9 (\n\t\t\t\t\t3):\n\t\t\t\t\t256\u2013\n\t\t\t\t\t274.\n\t\t\t\t\thttps:\/\/doi.org\/10.1287\/isre.9.3.256","DOI":"10.1287\/isre.9.3.256"},{"key":"2024082915283249900_i1558-7959-36-1-111-Dennis2","doi-asserted-by":"crossref","unstructured":"Dennis,\n              A. R.,\n            \n            \n              Fuller\n              R. M.,\n             and\n\t\t\t\t\t\tValacichJ. S.\n          2008.\n\t\t\t\t\tMedia, tasks, and communication processes: A theory of media synchronicity.\n\t\t\t\t\tManagement Information Systems Quarterly32 (\n\t\t\t\t\t3):\n\t\t\t\t\t575\u2013\n\t\t\t\t\t600.\n\t\t\t\t\thttps:\/\/doi.org\/10.2307\/25148857","DOI":"10.2307\/25148857"},{"key":"2024082915283249900_i1558-7959-36-1-111-Dinev1","doi-asserted-by":"crossref","unstructured":"Dinev,\n              T.,\n             and\n\t\t\t\t\t\tHuQ.\n          2007.\n\t\t\t\t\tThe centrality of awareness in the formation of user behavioral intention toward protective information technologies.\n\t\t\t\t\tJournal of the Association for Information Systems8 (\n\t\t\t\t\t7):\n\t\t\t\t\t386\u2013\n\t\t\t\t\t408.\n\t\t\t\t\thttps:\/\/doi.org\/10.17705\/1jais.00133","DOI":"10.17705\/1jais.00133"},{"key":"2024082915283249900_i1558-7959-36-1-111-Downey1","doi-asserted-by":"crossref","unstructured":"Downey,\n              D. H.,\n             and\n\t\t\t\t\t\tBedardJ. C.\n          2019.\n\t\t\t\t\tCoordination and communication challenges in global group audits.\n\t\t\t\t\tAuditing: A Journal of Practice & Theory38 (\n\t\t\t\t\t1):\n\t\t\t\t\t123\u2013\n\t\t\t\t\t147.\n\t\t\t\t\thttps:\/\/doi.org\/10.2308\/ajpt-52016","DOI":"10.2308\/ajpt-52016"},{"key":"2024082915283249900_i1558-7959-36-1-111-Du1","doi-asserted-by":"crossref","unstructured":"Du,\n              W. D.,\n            \n            \n              Pan\n              S. L.,\n            \n            \n              Leidner\n              D. E.,\n             and\n\t\t\t\t\t\tYingW.\n          2019.\n\t\t\t\t\tAffordances, experimentation and actualization of FinTech: A blockchain implementation study.\n\t\t\t\t\tThe Journal of Strategic Information Systems28 (\n\t\t\t\t\t1):\n\t\t\t\t\t50\u2013\n\t\t\t\t\t65.\n\t\t\t\t\thttps:\/\/doi.org\/10.1016\/j.jsis.2018.10.002","DOI":"10.1016\/j.jsis.2018.10.002"},{"key":"2024082915283249900_i1558-7959-36-1-111-Dwivedi1","doi-asserted-by":"crossref","unstructured":"Dwivedi,\n              Y. K.,\n            \n            \n              Wastell\n              D.,\n            \n            \n              Laumer\n              S.,\n            \n            \n              Henriksen\n              H. Z.,\n            \n            \n              Myers\n              M. D.,\n            \n            \n              Bunker\n              D.,\n            \n          \n          A. Elbanna, M. N. Ravishankar, and\n          \n            \n              Srivastava\n              S. C.\n            \n          \n          2015.\n\t\t\t\t\tResearch on information systems failures and successes: Status update and future directions.\n\t\t\t\t\tInformation Systems Frontiers17 (\n\t\t\t\t\t1):\n\t\t\t\t\t143\u2013\n\t\t\t\t\t157.\n\t\t\t\t\thttps:\/\/doi.org\/10.1007\/s10796-014-9500-y","DOI":"10.1007\/s10796-014-9500-y"},{"key":"2024082915283249900_i1558-7959-36-1-111-Ellison1","doi-asserted-by":"crossref","unstructured":"Ellison,\n              N. B.,\n            \n            \n              Gibbs\n              J. L.,\n             and\n\t\t\t\t\t\tWeberM. S.\n          2015.\n\t\t\t\t\tThe use of enterprise social network sites for knowledge sharing in distributed organizations: The role of organizational affordances.\n\t\t\t\t\tThe American Behavioral Scientist59 (\n\t\t\t\t\t1):\n\t\t\t\t\t103\u2013\n\t\t\t\t\t123.\n\t\t\t\t\thttps:\/\/doi.org\/10.1177\/0002764214540510","DOI":"10.1177\/0002764214540510"},{"key":"2024082915283249900_i1558-7959-36-1-111-Faik1","doi-asserted-by":"crossref","unstructured":"Faik,\n              I.,\n            \n            \n              Barrett\n              M.,\n             and\n\t\t\t\t\t\tObornE.\n          2020.\n\t\t\t\t\tHow information technology matters in societal change: An affordance-based institutional logics perspective.\n\t\t\t\t\tManagement Information Systems Quarterly44 (\n\t\t\t\t\t3):\n\t\t\t\t\t1359\u2013\n\t\t\t\t\t1390.\n\t\t\t\t\thttps:\/\/doi.org\/10.25300\/MISQ\/2020\/14193","DOI":"10.25300\/MISQ\/2020\/14193"},{"key":"2024082915283249900_i1558-7959-36-1-111-Fayard1","doi-asserted-by":"crossref","unstructured":"Fayard,\n              A. L.,\n             and\n\t\t\t\t\t\tWeeksJ.\n          2014.\n\t\t\t\t\tAffordances for practice.\n\t\t\t\t\tInformation and Organization24 (\n\t\t\t\t\t4):\n\t\t\t\t\t236\u2013\n\t\t\t\t\t249.\n\t\t\t\t\thttps:\/\/doi.org\/10.1016\/j.infoandorg.2014.10.001","DOI":"10.1016\/j.infoandorg.2014.10.001"},{"key":"2024082915283249900_i1558-7959-36-1-111-Feledi1","doi-asserted-by":"crossref","unstructured":"Feledi,\n              D.,\n            \n            \n              Fenz\n              S.,\n             and\n\t\t\t\t\t\tLechnerL.\n          2013.\n\t\t\t\t\tToward web-based information security knowledge sharing.\n\t\t\t\t\tInformation Security Technical Report17 (\n\t\t\t\t\t4):\n\t\t\t\t\t199\u2013\n\t\t\t\t\t209.\n\t\t\t\t\thttps:\/\/doi.org\/10.1016\/j.istr.2013.03.004","DOI":"10.1016\/j.istr.2013.03.004"},{"key":"2024082915283249900_i1558-7959-36-1-111-Ford1","doi-asserted-by":"crossref","unstructured":"Ford,\n              D. P.,\n             and\n\t\t\t\t\t\tChanY. E.\n          2003.\n\t\t\t\t\tKnowledge sharing in a multi-cultural setting: A case study.\n\t\t\t\t\tKnowledge Management Research and Practice1 (\n\t\t\t\t\t1):\n\t\t\t\t\t11\u2013\n\t\t\t\t\t27.\n\t\t\t\t\thttps:\/\/doi.org\/10.1057\/palgrave.kmrp.8499999","DOI":"10.1057\/palgrave.kmrp.8499999"},{"key":"2024082915283249900_i1558-7959-36-1-111-Fornell1","doi-asserted-by":"crossref","unstructured":"Fornell,\n              C.,\n             and\n\t\t\t\t\t\tBooksteinF. L.\n          1982.\n\t\t\t\t\tTwo structural equation models: LISREL and PLS applied to consumer exit-voice theory.\n\t\t\t\t\tJMR, Journal of Marketing Research19 (\n\t\t\t\t\t4):\n\t\t\t\t\t440\u2013\n\t\t\t\t\t452.\n\t\t\t\t\thttps:\/\/doi.org\/10.1177\/002224378201900406","DOI":"10.1177\/002224378201900406"},{"key":"2024082915283249900_i1558-7959-36-1-111-Gartner1","unstructured":"Gartner.\n          2020.\n\t\t\t\t\tManaging remote teams during the coronavirus (COVID-19) outbreak.\n\t\t\t\t\tAvailable at: https:\/\/www.gartner.com\/en\/documents\/3982118\/managing-remote-teams-during-the-coronavirus-covid-19-ou"},{"key":"2024082915283249900_i1558-7959-36-1-111-Gaver1","doi-asserted-by":"crossref","unstructured":"Gaver,\n              W. W.\n            \n          \n          1991.\n\t\t\t\t\tTechnology Affordances.\n\t\t\t\t\tProceedings of the SIGCHI Conference on Human Factors in Computing Systems, New Orleans, LA, March 1.","DOI":"10.1145\/108844.108856"},{"key":"2024082915283249900_i1558-7959-36-1-111-Geerts1","doi-asserted-by":"crossref","unstructured":"Geerts,\n              G. L.,\n             and\n\t\t\t\t\t\tMcCarthyW. E.\n          2000.\n\t\t\t\t\tAugmented intensional reasoning in knowledge-based accounting systems.\n\t\t\t\t\tJournal of Information Systems14 (\n\t\t\t\t\t2):\n\t\t\t\t\t127\u2013\n\t\t\t\t\t150.\n\t\t\t\t\thttps:\/\/doi.org\/10.2308\/jis.2000.14.2.127","DOI":"10.2308\/jis.2000.14.2.127"},{"key":"2024082915283249900_i1558-7959-36-1-111-Gefen1","doi-asserted-by":"crossref","unstructured":"Gefen,\n              D.,\n            \n            \n              Straub\n              D.,\n             and\n\t\t\t\t\t\tBoudreauM. C.\n          2000.\n\t\t\t\t\tStructural equation modeling and regression: Guidelines for research practice.\n\t\t\t\t\tCommunications of the Association for Information Systems4 (\n\t\t\t\t\t1):\n\t\t\t\t\t7.\n\t\t\t\t\thttps:\/\/doi.org\/10.17705\/1CAIS.00407","DOI":"10.17705\/1CAIS.00407"},{"key":"2024082915283249900_i1558-7959-36-1-111-Gerber1","doi-asserted-by":"crossref","unstructured":"Gerber,\n              M.,\n             and\n\t\t\t\t\t\tvon SolmsR.\n          2005.\n\t\t\t\t\tManagement of risk in the information age.\n\t\t\t\t\tComputers & Security24 (\n\t\t\t\t\t1):\n\t\t\t\t\t16\u2013\n\t\t\t\t\t30.\n\t\t\t\t\thttps:\/\/doi.org\/10.1016\/j.cose.2004.11.002","DOI":"10.1016\/j.cose.2004.11.002"},{"key":"2024082915283249900_i1558-7959-36-1-111-Gibbs1","doi-asserted-by":"crossref","unstructured":"Gibbs,\n              J. L.,\n            \n            \n              Rozaidi\n              N. A.,\n             and\n\t\t\t\t\t\tEisenbergJ.\n          2013.\n\t\t\t\t\tOvercoming the \u201cideology of openness\u201d: Probing the affordances of social media for organizational knowledge sharing.\n\t\t\t\t\tJournal of Computer-Mediated Communication19 (\n\t\t\t\t\t1):\n\t\t\t\t\t102\u2013\n\t\t\t\t\t120.\n\t\t\t\t\thttps:\/\/doi.org\/10.1111\/jcc4.12034","DOI":"10.1111\/jcc4.12034"},{"key":"2024082915283249900_i1558-7959-36-1-111-Gibson1","doi-asserted-by":"crossref","unstructured":"Gibson,\n              J. J.\n            \n          \n          1978.\n\t\t\t\t\tThe ecological approach to visual perception.\n\t\t\t\t\tLeonardo11 (\n\t\t\t\t\t3):\n\t\t\t\t\t227\u2013\n\t\t\t\t\t235.\n\t\t\t\t\thttps:\/\/doi.org\/10.2307\/1574154","DOI":"10.2307\/1574154"},{"key":"2024082915283249900_i1558-7959-36-1-111-Govindarajan1","doi-asserted-by":"crossref","unstructured":"Govindarajan,\n              V.,\n             and\n\t\t\t\t\t\tGuptaA. K.\n          2002.\n\t\t\t\t\tBuilding an effective global business team.\n\t\t\t\t\tIEEE Engineering Management Review30 (\n\t\t\t\t\t2):\n\t\t\t\t\t28.\n\t\t\t\t\thttps:\/\/doi.org\/10.1109\/EMR.2002.1022419","DOI":"10.1109\/EMR.2002.1022419"},{"key":"2024082915283249900_i1558-7959-36-1-111-Hair1","doi-asserted-by":"crossref","unstructured":"Hair,\n              J. F.,\n            \n            \n              Ringle\n              C. M.,\n             and\n\t\t\t\t\t\tSarstedtM.\n          2011.\n\t\t\t\t\tPLS-SEM: Indeed a silver bullet.\n\t\t\t\t\tJournal of Marketing Theory and Practice19 (\n\t\t\t\t\t2):\n\t\t\t\t\t139\u2013\n\t\t\t\t\t152.\n\t\t\t\t\thttps:\/\/doi.org\/10.2753\/MTP1069-6679190202","DOI":"10.2753\/MTP1069-6679190202"},{"key":"2024082915283249900_i1558-7959-36-1-111-Hair2","doi-asserted-by":"crossref","unstructured":"Hair,\n              J. F.,\n            \n            \n              Risher\n              J. J.,\n            \n            \n              Sarstedt\n              M.,\n             and\n\t\t\t\t\t\tRingleC. M.\n          2019.\n\t\t\t\t\tWhen to use and how to report the results of PLS-SEM.\n\t\t\t\t\tEuropean Business Review31 (\n\t\t\t\t\t1):\n\t\t\t\t\t2\u2013\n\t\t\t\t\t24.\n\t\t\t\t\thttps:\/\/doi.org\/10.1108\/EBR-11-2018-0203","DOI":"10.1108\/EBR-11-2018-0203"},{"key":"2024082915283249900_i1558-7959-36-1-111-Hassan1","doi-asserted-by":"crossref","unstructured":"Hassan,\n              N. R.,\n             and\n\t\t\t\t\t\tMathiassenL.\n          2018.\n\t\t\t\t\tDistilling a body of knowledge for information systems development.\n\t\t\t\t\tInformation Systems Journal28 (\n\t\t\t\t\t1):\n\t\t\t\t\t175\u2013\n\t\t\t\t\t226.\n\t\t\t\t\thttps:\/\/doi.org\/10.1111\/isj.12126","DOI":"10.1111\/isj.12126"},{"key":"2024082915283249900_i1558-7959-36-1-111-Hassandoust1","doi-asserted-by":"crossref","unstructured":"Hassandoust,\n              F.,\n            \n            \n              Logeswaran\n              R.,\n             and\n\t\t\t\t\t\tKazerouniM. F.\n          2011.\n\t\t\t\t\tBehavioral factors influencing virtual knowledge sharing: Theory of reasoned action.\n\t\t\t\t\tJournal of Applied Research in Higher Education3 (\n\t\t\t\t\t2):\n\t\t\t\t\t116\u2013\n\t\t\t\t\t134.\n\t\t\t\t\thttps:\/\/doi.org\/10.1108\/17581181111198665","DOI":"10.1108\/17581181111198665"},{"key":"2024082915283249900_i1558-7959-36-1-111-Henseler1","doi-asserted-by":"crossref","unstructured":"Henseler,\n              J.,\n            \n            \n              Hubona\n              G.,\n             and\n\t\t\t\t\t\tRayP. A.\n          2016.\n\t\t\t\t\tUsing PLS path modeling in new technology research: Updated guidelines.\n\t\t\t\t\tIndustrial Management & Data Systems116 (\n\t\t\t\t\t1):\n\t\t\t\t\t2\u2013\n\t\t\t\t\t20.\n\t\t\t\t\thttps:\/\/doi.org\/10.1108\/IMDS-09-2015-0382","DOI":"10.1108\/IMDS-09-2015-0382"},{"key":"2024082915283249900_i1558-7959-36-1-111-Hu1","doi-asserted-by":"crossref","unstructured":"Hu,\n              L.,\n             and\n\t\t\t\t\t\tRandelA. E.\n          2014.\n\t\t\t\t\tKnowledge sharing in teams: Social capital, extrinsic incentives, and team innovation.\n\t\t\t\t\tGroup & Organization Management39 (\n\t\t\t\t\t2):\n\t\t\t\t\t213\u2013\n\t\t\t\t\t243.\n\t\t\t\t\thttps:\/\/doi.org\/10.1177\/1059601114520969","DOI":"10.1177\/1059601114520969"},{"key":"2024082915283249900_i1558-7959-36-1-111-Huh1","doi-asserted-by":"crossref","unstructured":"Huh,\n              J.,\n            \n            \n              Jones\n              L.,\n            \n            \n              Erickson\n              T.,\n            \n            \n              Kellogg\n              W. A.,\n            \n            \n              Bellamy\n              R. K. E.,\n             and\n\t\t\t\t\t\tThomasJ. C.\n          2007.\n\t\t\t\t\tBlogCentral: The Role of Internal Blogs at Work.\n\t\t\t\t\tProceedings of the CHI \u201807 Extended Abstracts on Human Factors in Computing Systems, San Jose, CA, April 28\u2013May 3.","DOI":"10.1145\/1240866.1241022"},{"key":"2024082915283249900_i1558-7959-36-1-111-Hung1","unstructured":"Hung,\n              Y. T. C.,\n             and\n\t\t\t\t\t\tNguyenM. T. T. D.\n          2008.\n\t\t\t\t\tThe Impact of Cultural Diversity on Global Virtual Team Collaboration: A Social Identity Perspective.\n\t\t\t\t\tProceedings of the 41st Annual Hawaii International Conference on System Sciences, Hawaii, HI, January 7\u201310."},{"key":"2024082915283249900_i1558-7959-36-1-111-Hwang1","unstructured":"Hwang,\n              H. S.,\n             and\n\t\t\t\t\t\tParkS.\n          2007.\n\t\t\t\t\tBeing Together: User's Subjective Experience of Social Presence in CMC Environments.\n\t\t\t\t\tProceedings of International Conference on Human-Computer Interaction, Beijing, China, July 22\u201327."},{"key":"2024082915283249900_i1558-7959-36-1-111-Kabir1","unstructured":"Kabir,\n              N.\n            \n          \n          2013.\n\t\t\t\t\tTacit knowledge, its codification and technological advancement.\n\t\t\t\t\tInternational Journal of Knowledge Management11:\n\t\t\t\t\t235\u2013\n\t\t\t\t\t243."},{"key":"2024082915283249900_i1558-7959-36-1-111-Kobielus1","unstructured":"Kobielus,\n              J.\n            \n          \n          2020.\n\t\t\t\t\tCoding together apart: Software development after COVID-19.\n\t\t\t\t\tAvailable at: https:\/\/www.infoworld.com\/article\/3537168\/coding-together-apart-software-development-after-covid-19.html"},{"key":"2024082915283249900_i1558-7959-36-1-111-Kolekofski1","doi-asserted-by":"crossref","unstructured":"Kolekofski,\n              K. E.,\n             and\n\t\t\t\t\t\tHemingerA. R.\n          2003.\n\t\t\t\t\tBeliefs and attitudes affecting intentions to share information in an organizational setting.\n\t\t\t\t\tInformation & Management40 (\n\t\t\t\t\t6):\n\t\t\t\t\t521\u2013\n\t\t\t\t\t532.\n\t\t\t\t\thttps:\/\/doi.org\/10.1016\/S0378-7206(02)00068-X","DOI":"10.1016\/S0378-7206(02)00068-X"},{"key":"2024082915283249900_i1558-7959-36-1-111-Krasnova1","doi-asserted-by":"crossref","unstructured":"Krasnova,\n              H.,\n            \n            \n              Spiekermann\n              S.,\n            \n            \n              Koroleva\n              K.,\n             and\n\t\t\t\t\t\tHildebrandT.\n          2010.\n\t\t\t\t\tOnline social networks: Why we disclose.\n\t\t\t\t\tJournal of Information Technology25 (\n\t\t\t\t\t2):\n\t\t\t\t\t109\u2013\n\t\t\t\t\t125.\n\t\t\t\t\thttps:\/\/doi.org\/10.1057\/jit.2010.6","DOI":"10.1057\/jit.2010.6"},{"key":"2024082915283249900_i1558-7959-36-1-111-Krisanthi1","unstructured":"Krisanthi,\n              G. A. T.,\n            \n            \n              Sukarsa\n              I. M.,\n             and\n\t\t\t\t\t\tBayupatiI. P. A.\n          2014.\n\t\t\t\t\tGovernance audit of application procurement using COBIT framework.\n\t\t\t\t\tJournal of Theoretical and Applied Information Technology59 (\n\t\t\t\t\t2):\n\t\t\t\t\t342\u2013\n\t\t\t\t\t351."},{"key":"2024082915283249900_i1558-7959-36-1-111-Kushin1","doi-asserted-by":"crossref","unstructured":"Kushin,\n              M. J.,\n             and\n\t\t\t\t\t\tYamamotoM.\n          2010.\n\t\t\t\t\tDid social media really matter? College students' use of online media and political decision making in the 2008 election.\n\t\t\t\t\tMass Communication & Society13 (\n\t\t\t\t\t5):\n\t\t\t\t\t608\u2013\n\t\t\t\t\t630.\n\t\t\t\t\thttps:\/\/doi.org\/10.1080\/15205436.2010.516863","DOI":"10.1080\/15205436.2010.516863"},{"key":"2024082915283249900_i1558-7959-36-1-111-Leonardi1","doi-asserted-by":"crossref","unstructured":"Leonardi,\n              P. M.\n            \n          \n          2011.\n\t\t\t\t\tWhen flexible routines meet flexible technologies: Affordance, constraint, and the imbrication of human and material agencies.\n\t\t\t\t\tManagement Information Systems Quarterly35 (\n\t\t\t\t\t1):\n\t\t\t\t\t147\u2013\n\t\t\t\t\t167.\n\t\t\t\t\thttps:\/\/doi.org\/10.2307\/23043493","DOI":"10.2307\/23043493"},{"key":"2024082915283249900_i1558-7959-36-1-111-Leonardi2","doi-asserted-by":"crossref","unstructured":"Leonardi,\n              P. M.,\n             and\n\t\t\t\t\t\tVaastE.\n          2016.\n\t\t\t\t\tSocial media and their affordances for organizing: A review and agenda for research.\n\t\t\t\t\tThe Academy of Management Annals11 (\n\t\t\t\t\t1):\n\t\t\t\t\t150\u2013\n\t\t\t\t\t188.\n\t\t\t\t\thttps:\/\/doi.org\/10.5465\/annals.2015.0144","DOI":"10.5465\/annals.2015.0144"},{"key":"2024082915283249900_i1558-7959-36-1-111-Leonardi3","doi-asserted-by":"crossref","unstructured":"Leonardi,\n              P. M.,\n            \n            \n              Huysman\n              M.,\n             and\n\t\t\t\t\t\tSteinfieldC.\n          2013.\n\t\t\t\t\tEnterprise social media: Definition, history, and prospects for the study of social technologies in organizations.\n\t\t\t\t\tJournal of Computer-Mediated Communication19 (\n\t\t\t\t\t1):\n\t\t\t\t\t1\u2013\n\t\t\t\t\t19.\n\t\t\t\t\thttps:\/\/doi.org\/10.1111\/jcc4.12029","DOI":"10.1111\/jcc4.12029"},{"key":"2024082915283249900_i1558-7959-36-1-111-Lin1","doi-asserted-by":"crossref","unstructured":"Lin,\n              K. Y.,\n             and\n\t\t\t\t\t\tLuH. P.\n          2011.\n\t\t\t\t\tWhy people use social networking sites: An empirical study integrating network externalities and motivation theory.\n\t\t\t\t\tComputers in Human Behavior27 (\n\t\t\t\t\t3):\n\t\t\t\t\t1152\u2013\n\t\t\t\t\t1161.\n\t\t\t\t\thttps:\/\/doi.org\/10.1016\/j.chb.2010.12.009","DOI":"10.1016\/j.chb.2010.12.009"},{"key":"2024082915283249900_i1558-7959-36-1-111-Liu1","doi-asserted-by":"crossref","unstructured":"Liu,\n              N.,\n             and\n\t\t\t\t\t\tLiuM. S.\n          2011.\n\t\t\t\t\tHuman resource practices and individual knowledge-sharing behavior\u2014An empirical study for Taiwanese R & D professionals.\n\t\t\t\t\tInternational Journal of Human Resource Management22 (\n\t\t\t\t\t4):\n\t\t\t\t\t981\u2013\n\t\t\t\t\t997.\n\t\t\t\t\thttps:\/\/doi.org\/10.1080\/09585192.2011.555138","DOI":"10.1080\/09585192.2011.555138"},{"key":"2024082915283249900_i1558-7959-36-1-111-Lober1","unstructured":"L\u00f6ber,\n              A.,\n            \n            \n              Grimm\n              S.,\n             and\n\t\t\t\t\t\tSchwabeG.\n          2006.\n\t\t\t\t\tAudio vs Chat: Can Media Speed Explain the Differences in Productivity?Zurich, Switzerland:\n\t\t\t\t\tZurich Open Repository and Archive, University of Zurich."},{"key":"2024082915283249900_i1558-7959-36-1-111-Lowry1","doi-asserted-by":"crossref","unstructured":"Lowry,\n              P. B.,\n             and\n\t\t\t\t\t\tZhangD.\n          2008.\n\t\t\t\t\tIssues, limitations, and opportunities in cross-cultural research on collaborative software in information systems.\n\t\t\t\t\tJournal of Global Information Management16 (\n\t\t\t\t\t1):\n\t\t\t\t\t61\u2013\n\t\t\t\t\t84.\n\t\t\t\t\thttps:\/\/doi.org\/10.4018\/jgim.2008010103","DOI":"10.4018\/jgim.2008010103"},{"key":"2024082915283249900_i1558-7959-36-1-111-Markus1","doi-asserted-by":"crossref","unstructured":"Markus,\n              M. L.\n            \n          \n          1994.\n\t\t\t\t\tElectronic mail as the medium of managerial choice.\n\t\t\t\t\tOrganization Science5 (\n\t\t\t\t\t4):\n\t\t\t\t\t502\u2013\n\t\t\t\t\t527.\n\t\t\t\t\thttps:\/\/doi.org\/10.1287\/orsc.5.4.502","DOI":"10.1287\/orsc.5.4.502"},{"key":"2024082915283249900_i1558-7959-36-1-111-Markus2","doi-asserted-by":"crossref","unstructured":"Markus,\n              M. L.,\n             and\n\t\t\t\t\t\tSilverM. S.\n          2008.\n\t\t\t\t\tA foundation for the study of IT effects: A new look at DeSanctis and Poole's concepts of structural features and spirit.\n\t\t\t\t\tJournal of the Association for Information Systems9 (\n\t\t\t\t\t10):\n\t\t\t\t\t609\u2013\n\t\t\t\t\t632.\n\t\t\t\t\thttps:\/\/doi.org\/10.17705\/1jais.00176","DOI":"10.17705\/1jais.00176"},{"key":"2024082915283249900_i1558-7959-36-1-111-Muniraman1","unstructured":"Muniraman,\n              C.,\n            \n            \n              Damodaran\n              M.,\n             and\n\t\t\t\t\t\tRyanA.\n          2007.\n\t\t\t\t\tSecurity and privacy issues in a knowledge management system.\n\t\t\t\t\tAvailable at: https:\/\/moam.info\/security-and-privacy-issues-in-a-knowledge-management-vcu_59f994d11723dd1472194d8e.html"},{"key":"2024082915283249900_i1558-7959-36-1-111-Nagy1","doi-asserted-by":"crossref","unstructured":"Nagy,\n              P.,\n             and\n\t\t\t\t\t\tNeffG.\n          2015.\n\t\t\t\t\tImagined affordance: Reconstructing a keyword for communication theory. Social Media & Society 1 (2). https:\/\/doi.org\/10.1177\/2056305115603385","DOI":"10.1177\/2056305115603385"},{"key":"2024082915283249900_i1558-7959-36-1-111-Nguyen1","doi-asserted-by":"crossref","unstructured":"Nguyen,\n              T. M.,\n            \n            \n              Nham\n              T. P.,\n            \n            \n              Froese\n              F. J.,\n             and\n\t\t\t\t\t\tMalikA.\n          2019.\n\t\t\t\t\tMotivation and knowledge sharing: A meta-analysis of main and moderating effects.\n\t\t\t\t\tJournal of Knowledge Management23 (\n\t\t\t\t\t5):\n\t\t\t\t\t998\u2013\n\t\t\t\t\t1016.\n\t\t\t\t\thttps:\/\/doi.org\/10.1108\/JKM-01-2019-0029","DOI":"10.1108\/JKM-01-2019-0029"},{"key":"2024082915283249900_i1558-7959-36-1-111-Norman1","unstructured":"Norman,\n              D.,\n            \n          \n          1988.\n\t\t\t\t\tThe Psychology of Everyday Things.\n\t\t\t\t\tNew York, NY:\n\t\t\t\t\tBasic Books."},{"key":"2024082915283249900_i1558-7959-36-1-111-Obrand1","doi-asserted-by":"crossref","unstructured":"\u00d6brand,\n              L.,\n            \n            \n              Augustsson\n              N. P.,\n            \n            \n              Mathiassen\n              L.,\n             and\n\t\t\t\t\t\tHolmstr\u00f6mJ.\n          2019.\n\t\t\t\t\tThe interstitiality of IT risk: An inquiry into information systems development practices.\n\t\t\t\t\tInformation Systems Journal29 (\n\t\t\t\t\t1):\n\t\t\t\t\t97\u2013\n\t\t\t\t\t118.\n\t\t\t\t\thttps:\/\/doi.org\/10.1111\/isj.12178","DOI":"10.1111\/isj.12178"},{"key":"2024082915283249900_i1558-7959-36-1-111-Oshri1","doi-asserted-by":"crossref","unstructured":"Oshri,\n              I.,\n            \n            \n              Kotlarsky\n              J.,\n             and\n\t\t\t\t\t\tWillcocksL. P.\n          2007.\n\t\t\t\t\tGlobal software development: Exploring socialization in distributed strategic projects.\n\t\t\t\t\tThe Journal of Strategic Information Systems16 (\n\t\t\t\t\t1):\n\t\t\t\t\t24.\n\t\t\t\t\thttps:\/\/doi.org\/10.1016\/j.jsis.2007.01.001","DOI":"10.1016\/j.jsis.2007.01.001"},{"key":"2024082915283249900_i1558-7959-36-1-111-Penny1","doi-asserted-by":"crossref","unstructured":"Penny,\n              K. I.\n            \n          \n          1996.\n\t\t\t\t\tAppropriate critical values when testing for a single multivariate outlier by using the Mahalanobis distance.\n\t\t\t\t\tJournal of the Royal Statistical Society45 (\n\t\t\t\t\t1):\n\t\t\t\t\t73\u2013\n\t\t\t\t\t81.","DOI":"10.2307\/2986224"},{"key":"2024082915283249900_i1558-7959-36-1-111-Razzak1","doi-asserted-by":"crossref","unstructured":"Razzak,\n              M. A.,\n             and\n\t\t\t\t\t\tAhmedR.\n          2013.\n\t\t\t\t\tSpatial Knowledge Creation and Sharing Activities in a Distributed Agile Project.\n\t\t\t\t\tProceedings of the 2013 IEEE 8th International Conference on Global Software Engineering Workshops, Bari, Italy, August 26.","DOI":"10.1109\/ICGSEW.2013.11"},{"key":"2024082915283249900_i1558-7959-36-1-111-Rehman1","doi-asserted-by":"crossref","unstructured":"Rehman,\n              M.,\n            \n            \n              Mahmood\n              A. K.,\n            \n            \n              Salleh\n              R.,\n             and\n\t\t\t\t\t\tAminA.\n          2014.\n\t\t\t\t\tWork Design Characteristics and Knowledge Sharing Behavior Among Software Engineers.\n\t\t\t\t\tProceedings of the 2014 International Conference on Computer and Information Sciences, Kuala Lumpur, Malaysia, June 3\u20135.","DOI":"10.1109\/ICCOINS.2014.6868447"},{"key":"2024082915283249900_i1558-7959-36-1-111-Reychav1","doi-asserted-by":"crossref","unstructured":"Reychav,\n              I.,\n             and\n\t\t\t\t\t\tWeisbergJ.\n          2010.\n\t\t\t\t\tBridging intention and behavior of knowledge sharing.\n\t\t\t\t\tJournal of Knowledge Management14 (\n\t\t\t\t\t2):\n\t\t\t\t\t285\u2013\n\t\t\t\t\t300.\n\t\t\t\t\thttps:\/\/doi.org\/10.1108\/13673271011032418","DOI":"10.1108\/13673271011032418"},{"key":"2024082915283249900_i1558-7959-36-1-111-Rice1","doi-asserted-by":"crossref","unstructured":"Rice,\n              R. E.\n            \n          \n          1992.\n\t\t\t\t\tTask analyzability, use of new media, and effectiveness: A multi-site exploration of media richness.\n\t\t\t\t\tOrganization Science3 (\n\t\t\t\t\t4):\n\t\t\t\t\t475\u2013\n\t\t\t\t\t500.\n\t\t\t\t\thttps:\/\/doi.org\/10.1287\/orsc.3.4.475","DOI":"10.1287\/orsc.3.4.475"},{"key":"2024082915283249900_i1558-7959-36-1-111-Rice2","doi-asserted-by":"crossref","unstructured":"Rice,\n              R. E.,\n            \n            \n              Evans\n              S. K.,\n            \n            \n              Pearce\n              K. E.,\n            \n            \n              Sivunen\n              A.,\n            \n            \n              Vitak\n              J.,\n             and\n\t\t\t\t\t\tTreemJ. W.\n          2017.\n\t\t\t\t\tOrganizational media affordances: Operationalization and associations with media use.\n\t\t\t\t\tJournal of Communication67 (\n\t\t\t\t\t1):\n\t\t\t\t\t24.\n\t\t\t\t\thttps:\/\/doi.org\/10.1111\/jcom.12273","DOI":"10.1111\/jcom.12273"},{"key":"2024082915283249900_i1558-7959-36-1-111-Richer1","doi-asserted-by":"crossref","unstructured":"Richer,\n              M. H.\n            \n          \n          1986.\n\t\t\t\t\tAn evaluation of expert system development tools.\n\t\t\t\t\tExpert Systems: International Journal of Knowledge Engineering and Neural Networks3 (\n\t\t\t\t\t3):\n\t\t\t\t\t166\u2013\n\t\t\t\t\t183.\n\t\t\t\t\thttps:\/\/doi.org\/10.1111\/j.1468-0394.1986.tb00489.x","DOI":"10.1111\/j.1468-0394.1986.tb00489.x"},{"key":"2024082915283249900_i1558-7959-36-1-111-Schouten1","doi-asserted-by":"crossref","unstructured":"Schouten,\n              A. P.,\n            \n            \n              van den Hooff\n              B.,\n             and\n\t\t\t\t\t\tFeldbergF.\n          2016.\n\t\t\t\t\tVirtual team work: Group decision making in 3D virtual environments.\n\t\t\t\t\tCommunication Research43 (\n\t\t\t\t\t2):\n\t\t\t\t\t180\u2013\n\t\t\t\t\t210.\n\t\t\t\t\thttps:\/\/doi.org\/10.1177\/0093650213509667","DOI":"10.1177\/0093650213509667"},{"key":"2024082915283249900_i1558-7959-36-1-111-Shah1","doi-asserted-by":"crossref","unstructured":"Shah,\n              S.,\n            \n            \n              Diwan\n              S.,\n            \n            \n              Kohan\n              L.,\n            \n            \n              Rosenblum\n              D.,\n            \n            \n              Gharibo\n              C.,\n            \n            \n              Soin\n              A.,\n            \n            \n              Sulindro\n              A.,\n            \n            \n              Nguyen\n              Q.,\n             and\n\t\t\t\t\t\tProvenzanoD. A.\n          2020.\n\t\t\t\t\tThe technological impact of COVID-19 on the future of education and health care delivery.\n\t\t\t\t\tPain Physician4 (\n\t\t\t\t\t23):\n\t\t\t\t\tS367\u2013\n\t\t\t\t\tS380.\n\t\t\t\t\thttps:\/\/doi.org\/10.36076\/ppj.2020\/23\/S367","DOI":"10.36076\/ppj.2020\/23\/S367"},{"key":"2024082915283249900_i1558-7959-36-1-111-Shami1","doi-asserted-by":"crossref","unstructured":"Shami,\n              M.,\n            \n            \n              Sakhaee\n              N.,\n             and\n\t\t\t\t\t\tShahbaznezhadH.\n          2009.\n\t\t\t\t\tMechanisms of customer knowledge management in e-commerce websites.\n\t\t\t\t\tResearch Journal of Information Technology1 (\n\t\t\t\t\t2):\n\t\t\t\t\t893\u2013\n\t\t\t\t\t896.\n\t\t\t\t\thttps:\/\/doi.org\/10.2139\/ssrn.2660663","DOI":"10.2139\/ssrn.2660663"},{"key":"2024082915283249900_i1558-7959-36-1-111-Shin1","doi-asserted-by":"crossref","unstructured":"Shin,\n              D. H.\n            \n          \n          2010.\n\t\t\t\t\tThe effects of trust, security and privacy in social networking: A security-based approach to understand the pattern of adoption.\n\t\t\t\t\tInteracting with Computers22 (\n\t\t\t\t\t5):\n\t\t\t\t\t428\u2013\n\t\t\t\t\t438.\n\t\t\t\t\thttps:\/\/doi.org\/10.1016\/j.intcom.2010.05.001","DOI":"10.1016\/j.intcom.2010.05.001"},{"key":"2024082915283249900_i1558-7959-36-1-111-Sidorova1","doi-asserted-by":"crossref","unstructured":"Sidorova,\n              A.,\n            \n            \n              Evangelopoulos\n              N.,\n            \n            \n              Valacich\n              J. S.,\n             and\n\t\t\t\t\t\tRamakrishnanT.\n          2008.\n\t\t\t\t\tUncovering the intellectual core of the information systems discipline.\n\t\t\t\t\tManagement Information Systems Quarterly32 (\n\t\t\t\t\t3):\n\t\t\t\t\t467\u2013\n\t\t\t\t\t482.\n\t\t\t\t\thttps:\/\/doi.org\/10.2307\/25148852","DOI":"10.2307\/25148852"},{"key":"2024082915283249900_i1558-7959-36-1-111-Silic1","doi-asserted-by":"crossref","unstructured":"Silic,\n              M.,\n             and\n\t\t\t\t\t\tBackA.\n          2016.\n\t\t\t\t\tThe influence of risk factors in decision-making process for open source software adoption.\n\t\t\t\t\tInternational Journal of Information Technology & Decision Making15 (\n\t\t\t\t\t01):\n\t\t\t\t\t151\u2013\n\t\t\t\t\t185.\n\t\t\t\t\thttps:\/\/doi.org\/10.1142\/s0219622015500364","DOI":"10.1142\/S0219622015500364"},{"key":"2024082915283249900_i1558-7959-36-1-111-Singer1","unstructured":"Singer,\n              J. B.\n            \n          \n          2011.\n\t\t\t\t\tJournalism and digital technologies. In Changing the News: The Forces Shaping Journalism in Uncertain Times,  edited byLowreyW. and\n\t\t\t\t\t\tGadeP.,213\u2013\n\t\t\t\t\t229.\n\t\t\t\t\tNew York, NY:Routledge."},{"key":"2024082915283249900_i1558-7959-36-1-111-Strong1","doi-asserted-by":"crossref","unstructured":"Strong,\n              D. M.,\n            \n            \n              Volkoff\n              O.,\n            \n            \n              Johnson\n              S. A.,\n            \n            \n              Pelletier\n              L. R.,\n            \n            \n              Tulu\n              B.,\n            \n            \n              Bar-On\n              I.,\n            \n            \n              Trudel\n              J.,\n             and\n\t\t\t\t\t\tGarberL.\n          2014.\n\t\t\t\t\tA theory of organization-EHR affordance actualization.\n\t\t\t\t\tJournal of the Association for Information Systems15 (\n\t\t\t\t\t2):\n\t\t\t\t\t53\u2013\n\t\t\t\t\t85.\n\t\t\t\t\thttps:\/\/doi.org\/10.17705\/1jais.00353","DOI":"10.17705\/1jais.00353"},{"key":"2024082915283249900_i1558-7959-36-1-111-Torok1","unstructured":"Torok,\n              G.\n            \n          \n          2020.\n\t\t\t\t\tPandemic potential: Four app development trends in a post-Covid-19 world.\n\t\t\t\t\tAvailable at: https:\/\/www.forbes.com\/sites\/forbestechcouncil\/2020\/09\/10\/pandemic-potential-four-app-development-trends-in-a-post-covid-19-world\/?sh=3b665026492f"},{"key":"2024082915283249900_i1558-7959-36-1-111-Treem1","doi-asserted-by":"crossref","unstructured":"Treem,\n              J. W.,\n             and\n\t\t\t\t\t\tLeonardiP. M.\n          2012.\n\t\t\t\t\tSocial media use in organizations: Exploring the affordances of visibility, editability, persistence, and association.\n\t\t\t\t\tCommunication Yearbook36:\n\t\t\t\t\t143\u2013\n\t\t\t\t\t189.","DOI":"10.1080\/23808985.2013.11679130"},{"key":"2024082915283249900_i1558-7959-36-1-111-Trinkle1","doi-asserted-by":"crossref","unstructured":"Trinkle,\n              B. S.,\n            \n            \n              Crossler\n              R. E.,\n             and\n\t\t\t\t\t\tWarkentinM.\n          2014.\n\t\t\t\t\tI'm game, are you? Reducing real-world security threats by managing employee activity in online social networks.\n\t\t\t\t\tJournal of Information Systems28 (\n\t\t\t\t\t2):\n\t\t\t\t\t307\u2013\n\t\t\t\t\t327.\n\t\t\t\t\thttps:\/\/doi.org\/10.2308\/isys-50776","DOI":"10.2308\/isys-50776"},{"key":"2024082915283249900_i1558-7959-36-1-111-Tuttle1","doi-asserted-by":"crossref","unstructured":"Tuttle,\n              B.,\n             and\n\t\t\t\t\t\tVanderveldeS. D.\n          2007.\n\t\t\t\t\tAn empirical examination of CobiT as an internal control framework for information technology.\n\t\t\t\t\tInternational Journal of Accounting Information Systems8 (\n\t\t\t\t\t4):\n\t\t\t\t\t240\u2013\n\t\t\t\t\t263.\n\t\t\t\t\thttps:\/\/doi.org\/10.1016\/j.accinf.2007.09.001","DOI":"10.1016\/j.accinf.2007.09.001"},{"key":"2024082915283249900_i1558-7959-36-1-111-Vahtera1","doi-asserted-by":"crossref","unstructured":"Vahtera,\n              P.,\n            \n            \n              Buckley\n              P.,\n             and\n\t\t\t\t\t\tAliyevM.\n          2017.\n\t\t\t\t\tAffective conflict and identification of knowledge sources in MNE teams.\n\t\t\t\t\tInternational Business Review26 (\n\t\t\t\t\t5):\n\t\t\t\t\t14.\n\t\t\t\t\thttps:\/\/doi.org\/10.1016\/j.ibusrev.2017.02.006","DOI":"10.1016\/j.ibusrev.2017.02.006"},{"key":"2024082915283249900_i1558-7959-36-1-111-vandenHooff1","doi-asserted-by":"crossref","unstructured":"van den Hooff,\n              B.,\n            \n            \n              Schouten\n              A. P.,\n             and\n\t\t\t\t\t\tSimonovskiS.\n          2012.\n\t\t\t\t\tWhat one feels and what one knows: The influence of emotions on attitudes and intentions toward knowledge sharing.\n\t\t\t\t\tJournal of Knowledge Management16 (\n\t\t\t\t\t1):\n\t\t\t\t\t148\u2013\n\t\t\t\t\t158.\n\t\t\t\t\thttps:\/\/doi.org\/10.1108\/13673271211198990","DOI":"10.1108\/13673271211198990"},{"key":"2024082915283249900_i1558-7959-36-1-111-VanMaanen1","unstructured":"Van Maanen,\n              J.,\n             and\n\t\t\t\t\t\tBarleyS.\n          1984.\n\t\t\t\t\tOccupational communities: Culture and control in organizations.\n\t\t\t\t\tResearch in Organizational Behavior6:\n\t\t\t\t\t287\u2013\n\t\t\t\t\t365."},{"key":"2024082915283249900_i1558-7959-36-1-111-Vinzi1","unstructured":"Vinzi,\n              V. E.,\n            \n            \n              Chin\n              W. W.,\n            \n            \n              Henseler\n              J.,\n             and\n\t\t\t\t\t\tWangH.\n          2010.\n\t\t\t\t\tHandbook of partial least squares.\n\t\t\t\t\tVolume 201.\n\t\t\t\t\tGermany:\n\t\t\t\t\tSpringer."},{"key":"2024082915283249900_i1558-7959-36-1-111-Wagner1","doi-asserted-by":"crossref","unstructured":"Wagner,\n              D.,\n            \n            \n              Wagner\n              H. T.,\n             and\n\t\t\t\t\t\tVollmarG.\n          2014.\n\t\t\t\t\tThe impact of information technology on knowledge creation: An affordance approach to social media.\n\t\t\t\t\tJournal of Enterprise Information Management27 (\n\t\t\t\t\t1):\n\t\t\t\t\t31\u2013\n\t\t\t\t\t44.\n\t\t\t\t\thttps:\/\/doi.org\/10.1108\/JEIM-09-2012-0063","DOI":"10.1108\/JEIM-09-2012-0063"},{"key":"2024082915283249900_i1558-7959-36-1-111-WSJ1","unstructured":"Wall Street Journal.\n          2020.\n\t\t\t\t\tA finance team's view on preparing for a virtual audit. Available at: https:\/\/deloitte.wsj.com\/cio\/2020\/08\/10\/a-finance-teams-view-on-preparing-for-a-virtual-audit\/"},{"key":"2024082915283249900_i1558-7959-36-1-111-Wang1","doi-asserted-by":"crossref","unstructured":"Wang,\n              W. T.,\n             and\n\t\t\t\t\t\tHouY. P.\n          2015.\n\t\t\t\t\tMotivations of employees' knowledge sharing behaviors: A self-determination perspective.\n\t\t\t\t\tInformation and Organization25 (\n\t\t\t\t\t1):\n\t\t\t\t\t1\u2013\n\t\t\t\t\t26.\n\t\t\t\t\thttps:\/\/doi.org\/10.1016\/j.infoandorg.2014.11.001","DOI":"10.1016\/j.infoandorg.2014.11.001"},{"key":"2024082915283249900_i1558-7959-36-1-111-Weinberg1","doi-asserted-by":"crossref","unstructured":"Weinberg,\n              F. J.\n            \n          \n          2015.\n\t\t\t\t\tEpistemological beliefs and knowledge sharing in work teams: A new model and research questions.\n\t\t\t\t\tThe Learning Organization22 (\n\t\t\t\t\t1):\n\t\t\t\t\t40\u2013\n\t\t\t\t\t57.\n\t\t\t\t\thttps:\/\/doi.org\/10.1108\/TLO-11-2013-0067","DOI":"10.1108\/TLO-11-2013-0067"},{"key":"2024082915283249900_i1558-7959-36-1-111-Wolfe1","doi-asserted-by":"crossref","unstructured":"Wolfe,\n              C.,\n             and\n\t\t\t\t\t\tLoraasT.\n          2008.\n\t\t\t\t\tKnowledge sharing: The effects of incentives, environment, and person.\n\t\t\t\t\tJournal of Information Systems22 (\n\t\t\t\t\t2):\n\t\t\t\t\t53\u2013\n\t\t\t\t\t76.\n\t\t\t\t\thttps:\/\/doi.org\/10.2308\/jis.2008.22.2.53","DOI":"10.2308\/jis.2008.22.2.53"},{"key":"2024082915283249900_i1558-7959-36-1-111-Yague1","doi-asserted-by":"crossref","unstructured":"Yague,\n              A.,\n            \n            \n              Garbajosa\n              J.,\n            \n            \n              Diaz\n              J.,\n             and\n\t\t\t\t\t\tGonzalezE.\n          2016.\n\t\t\t\t\tAn exploratory study in communication in Agile Global Software Development.\n\t\t\t\t\tComputer Standards & Interfaces48:\n\t\t\t\t\t13.\n\t\t\t\t\thttps:\/\/doi.org\/10.1016\/j.csi.2016.06.002","DOI":"10.1016\/j.csi.2016.06.002"},{"key":"2024082915283249900_i1558-7959-36-1-111-Zahedi1","doi-asserted-by":"crossref","unstructured":"Zahedi,\n              M.,\n            \n            \n              Shahin\n              M.,\n             and\n\t\t\t\t\t\tBabarM. A.\n          2016.\n\t\t\t\t\tA systematic review of knowledge sharing challenges and practices in global software development.\n\t\t\t\t\tInternational Journal of Information Management36 (\n\t\t\t\t\t6):\n\t\t\t\t\t995\u2013\n\t\t\t\t\t1019.\n\t\t\t\t\thttps:\/\/doi.org\/10.1016\/j.ijinfomgt.2016.06.007","DOI":"10.1016\/j.ijinfomgt.2016.06.007"},{"key":"2024082915283249900_i1558-7959-36-1-111-Zammuto1","doi-asserted-by":"crossref","unstructured":"Zammuto,\n              R. F.,\n            \n            \n              Griffith\n              T. L.,\n            \n            \n              Majchrzak\n              A.,\n            \n            \n              Dougherty\n              D. J.,\n             and\n\t\t\t\t\t\tFarajS.\n          2007.\n\t\t\t\t\tInformation technology and the changing fabric of organization.\n\t\t\t\t\tOrganization Science18 (\n\t\t\t\t\t5):\n\t\t\t\t\t749\u2013\n\t\t\t\t\t762.\n\t\t\t\t\thttps:\/\/doi.org\/10.1287\/orsc.1070.0307","DOI":"10.1287\/orsc.1070.0307"},{"key":"2024082915283249900_i1558-7959-36-1-111-Zhang1","doi-asserted-by":"crossref","unstructured":"Zhang,\n              A. Y.,\n            \n            \n              Tsui\n              A. S.,\n             and\n\t\t\t\t\t\tWangD. X.\n          2011.\n\t\t\t\t\tLeadership behaviors and group creativity in Chinese organizations: The role of group processes.\n\t\t\t\t\tThe Leadership Quarterly22 (\n\t\t\t\t\t5):\n\t\t\t\t\t851\u2013\n\t\t\t\t\t862.\n\t\t\t\t\thttps:\/\/doi.org\/10.1016\/j.leaqua.2011.07.007","DOI":"10.1016\/j.leaqua.2011.07.007"}],"container-title":["Journal of Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/publications.aaahq.org\/jis\/article-pdf\/36\/1\/111\/8019\/i1558-7959-36-1-111.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/publications.aaahq.org\/jis\/article-pdf\/36\/1\/111\/8019\/i1558-7959-36-1-111.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,29]],"date-time":"2024-08-29T17:01:25Z","timestamp":1724950885000},"score":1,"resource":{"primary":{"URL":"https:\/\/publications.aaahq.org\/jis\/article\/36\/1\/111\/993\/Assessing-Effects-of-Media-Affordances-and"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,30]]},"references-count":106,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2021,6,30]]},"published-print":{"date-parts":[[2022,3,1]]}},"URL":"https:\/\/doi.org\/10.2308\/isys-2020-072","relation":{},"ISSN":["1558-7959","0888-7985"],"issn-type":[{"type":"electronic","value":"1558-7959"},{"type":"print","value":"0888-7985"}],"subject":[],"published":{"date-parts":[[2021,6,30]]}}}