{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T01:06:00Z","timestamp":1760058360306,"version":"build-2065373602"},"reference-count":88,"publisher":"MDPI AG","issue":"4","license":[{"start":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T00:00:00Z","timestamp":1742947200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Future Internet"],"abstract":"<jats:p>Collective intelligence inherently relies on knowledge sharing. In security-sensitive organizations, tension arises between the need to develop collective knowledge and organizational culture, which requires secrecy. Drawing on the effects of trust on social behavior, this study examines knowledge-sharing in security-sensitive organizations compared to non-sensitive organizations dealing with the same subject matter. Methodology\u2014We use Social Network Analysis (SNA) to analyze data from 18 communities: 7 security-sensitive and 9 non-sensitive. This comparative analysis explores the impact of organizational culture on communication structures and knowledge-sharing patterns. Findings\u2014(1) The communication structure of security-sensitive communities differs from the structure of non-sensitive communities; (2) Security-sensitive communities have a higher density than non-sensitive communities. (3) When two security-sensitive organizations join together, knowledge sharing decreases. (4) Characteristics of the organizational culture of security-sensitive communities affect their network structure, which in turn affects knowledge sharing. This study provides valuable insights into the complex relationship between organizational culture, trust, and knowledge sharing in security-sensitive contexts. It highlights how secrecy and trust dynamics shape communication patterns and collective intelligence, contributing to a deeper understanding of knowledge-sharing practices in environments where security concerns are paramount. The findings are particularly relevant for improving knowledge-sharing strategies in both security-sensitive and non-sensitive organizations.<\/jats:p>","DOI":"10.3390\/fi17040144","type":"journal-article","created":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T04:17:14Z","timestamp":1742962634000},"page":"144","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Knowledge Sharing in Security-Sensitive Communities"],"prefix":"10.3390","volume":"17","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5927-5517","authenticated-orcid":false,"given":"Yonit","family":"Rusho","sequence":"first","affiliation":[{"name":"Department of Industrial Engineering and Management, Ben Gurion University of the Negev, Beer Sheba 8410501, Israel"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1791-0310","authenticated-orcid":false,"given":"Daphne Ruth","family":"Raban","sequence":"additional","affiliation":[{"name":"School of Business Administration, Faculty of Social Sciences, University of Haifa, Haifa 3498838, Israel"}]},{"given":"David","family":"Simantov","sequence":"additional","affiliation":[{"name":"Institute for the Research of the Methodology of Intelligence (IRMI), Ramat Hasharon 4713401, Israel"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0471-6538","authenticated-orcid":false,"given":"Gilad","family":"Ravid","sequence":"additional","affiliation":[{"name":"Department of Industrial Engineering and Management, Ben Gurion University of the Negev, Beer Sheba 8410501, Israel"}]}],"member":"1968","published-online":{"date-parts":[[2025,3,26]]},"reference":[{"key":"ref_1","unstructured":"Simantov, D., Padan, C., and Idelman, Y. (2017). Applied Communities, The Democratic Institute. Available online: https:\/\/www.democratic.co.il\/2017\/05\/15\/\u05e7\u05d4\u05d9\u05dc\u05d5\u05ea-\u05d9\u05d9\u05e9\u05d5\u05de\u05d9\u05d5\u05ea\/."},{"key":"ref_2","first-page":"31","article-title":"Intelligence 2.0: A New Approach to the Production of Intelligence","volume":"5","author":"Ofer","year":"2013","journal-title":"Mil. Strateg. Aff."},{"key":"ref_3","first-page":"4","article-title":"A capabilities-based theory of technology deployment in diverse teams: Leapfrogging the pitfalls of diversity and leveraging its potential with collaborative technology","volume":"5","author":"Carte","year":"2004","journal-title":"J. Assoc. Inf. Syst."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1111\/j.1748-8583.2010.00158.x","article-title":"Knowledge sharing in diverse organisations","volume":"22","author":"Lauring","year":"2012","journal-title":"Hum. Resour. Manag. J."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"144","DOI":"10.1016\/j.im.2012.10.002","article-title":"Trust and knowledge sharing in diverse global virtual teams","volume":"50","author":"Pinjani","year":"2013","journal-title":"Inf. Manag."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"264","DOI":"10.1080\/14778238.2019.1595986","article-title":"Similarity-dissimilarity and social capital in research knowledge networks: Explaining knowledge sharing in academic institutions","volume":"17","author":"Ku","year":"2019","journal-title":"Knowl. Manag. Res. Pract."},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"James, P., Nadarajah, Y., Haive, K., and Stead, V.C. (2012). Sustainable Communities, Sustainable Development: Other Paths for Papua New Guinea, University of Hawaii Press.","DOI":"10.21313\/hawaii\/9780824835880.001.0001"},{"key":"ref_8","unstructured":"RSA (2023, October 12). Communities Connected: Inclusion, Participation and Common Purpose\u2014RSA. Available online: http:\/\/www.campaigntoendloneliness.org."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"94","DOI":"10.1108\/13673270410523934","article-title":"Knowledge sharing community in P2P network: A study of motivational perspective","volume":"8","author":"Kwok","year":"2004","journal-title":"J. Knowl. Manag."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1057\/palgrave.kmrp.8499999","article-title":"Knowledge sharing in a multi-cultural setting: A case study","volume":"1","author":"Ford","year":"2003","journal-title":"Knowl. Manag. Res. Pract."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"277","DOI":"10.1108\/JKM-05-2014-0184","article-title":"With whom shall I share my knowledge? A recipient perspective of knowledge sharing","volume":"19","author":"Zhang","year":"2015","journal-title":"J. Knowl. Manag."},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Phythian, M. (2013). Understanding the Intelligence Cycle, Routledge.","DOI":"10.4324\/9780203558478"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"959","DOI":"10.1080\/02684520601046291","article-title":"What\u2019s wrong with the intelligence cycle","volume":"21","author":"Hulnick","year":"2006","journal-title":"Intell. Natl. Secur."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"480","DOI":"10.1017\/jmo.2022.35","article-title":"Tailoring competitive information sources to the sequence of dynamic capabilities","volume":"28","author":"Markovich","year":"2022","journal-title":"J. Manag. Organ."},{"key":"ref_15","unstructured":"Davies, P.H.J., and Gustafson, K. (2013). The Intelligence Cycle is dead, long live the Intelligence Cycle: Rethinking intelligence fundamentals for a new intelligence doctrine. Understanding the Intelligence Cycle, Routledge."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1080\/14702430701811987","article-title":"Rethinking Military Intelligence Failure\u2014Putting the Wheels Back on the Intelligence Cycle","volume":"9","author":"Evans","year":"2009","journal-title":"Def. Stud."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1080\/08850608608435033","article-title":"Making the intelligence \u201cCycle\u201d work","volume":"1","author":"Johnson","year":"2008","journal-title":"Int. J. Intell. CounterIntell."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"708","DOI":"10.1016\/j.emj.2019.04.003","article-title":"Competitive intelligence embeddedness: Drivers and performance consequences","volume":"37","author":"Markovich","year":"2019","journal-title":"Eur. Manag. J."},{"key":"ref_19","first-page":"73","article-title":"The Cybersphere Obligates and Facilitates a Revolution in Intelligence Affairs","volume":"2","author":"Alon","year":"2018","journal-title":"Cyber Intell. Secur."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"614","DOI":"10.1080\/08850600490496425","article-title":"Knowledge-sharing in the intelligence community after 9\/11","volume":"17","author":"Lahneman","year":"2004","journal-title":"Int. J. Intell. CounterIntell."},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Li, J., Luo, X., and Lei, H. (2024). TrustHealth: Enhancing eHealth Security with Blockchain and Trusted Execution Environments. Electronics, 13.","DOI":"10.3390\/electronics13122425"},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Muzammal, S.M., Murugesan, R.K., Jhanjhi, N.Z., Hossain, M.S., and Yassine, A. (2022). Trust and Mobility-Based Protocol for Secure Routing in Internet of Things. Sensors, 22.","DOI":"10.3390\/s22166215"},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Di Nocera, F., Tempestini, G., and Orsini, M. (2023). Usable Security: A Systematic Literature Review. Information, 14.","DOI":"10.3390\/info14120641"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"709","DOI":"10.2307\/258792","article-title":"An Integrative Model of Organizational Trust","volume":"20","author":"Mayer","year":"1995","journal-title":"Acad. Manag. Rev."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1287\/orsc.11.1.35.12567","article-title":"Information Privacy: Corporate Management and National Regulation","volume":"11","author":"Milberg","year":"2000","journal-title":"Organ. Sci."},{"key":"ref_26","first-page":"99","article-title":"Differences in consumer-generated media adoption and use: A cross-national perspective","volume":"17","author":"Gretzel","year":"2008","journal-title":"J. Hosp. Leis. Mark."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"594","DOI":"10.1057\/s41275-017-0075-5","article-title":"Knowledge sharing via social media in software development: A systematic literature review","volume":"15","author":"Sarka","year":"2017","journal-title":"Knowl. Manag. Res. Pract."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"13","DOI":"10.2753\/MIS0742-1222240401","article-title":"Self-perception-based versus transference-based trust determinants in computer-mediated transactions: A cross-cultural comparison study","volume":"24","author":"Kim","year":"2008","journal-title":"J. Manag. Inf. Syst."},{"key":"ref_29","first-page":"18","article-title":"Knowledge Sharing and Trust in Organizations","volume":"8","author":"McNeish","year":"2010","journal-title":"IUP J. Knowl. Manag."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"211","DOI":"10.37886\/ruo.2020.013","article-title":"Trust and Knowledge Sharing of Employees in Organizations","volume":"9","year":"2020","journal-title":"Rev. Za Univerzalno Odli\u010dnost"},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"758","DOI":"10.3846\/16111699.2017.1317019","article-title":"Explicating the role of trust in knowledge sharing: A structural equation model test","volume":"18","author":"Chlivickas","year":"2017","journal-title":"J. Bus. Econ. Manag."},{"key":"ref_32","unstructured":"Senge, P.M. (2006). The Fifth Discipline: The Art and Practice of the Learning Organization, Broadway Business."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"209","DOI":"10.1007\/978-3-642-01206-8_18","article-title":"Identification of social tension in organizational networks: Relating clan\/clique formation to social tension","volume":"207","author":"Collingsworth","year":"2009","journal-title":"Stud. Comput. Intell."},{"key":"ref_34","first-page":"3","article-title":"Reciprocity analysis of online learning networks","volume":"9","author":"Aviv","year":"2005","journal-title":"J. Asynchronous Learn. Netw."},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Koren, H., Kaminer, I., and Raban, D.R. (2016). Consume, modify, share (CMS): The interplay between individual decisions and structural network properties in the diffusion of information. PLoS ONE, 11.","DOI":"10.1371\/journal.pone.0164651"},{"key":"ref_36","unstructured":"Nelson, L., Nairn, R., and Chi, E.H. (2010, January 6). Mail2tag: Efficient targeting of news in an organization. Proceedings of the CSCW Workshop Collective Intelligence in Organizations, Savannah, GA, USA."},{"key":"ref_37","doi-asserted-by":"crossref","unstructured":"Bakshy, E., Mason, W.A., Hofman, J.M., and Watts, D.J. (2011, January 9\u201312). Everyone\u2019s an influencer: Quantifying influence on twitter. Proceedings of the 4th ACM International Conference on Web Search and Data Mining, WSDM 2011, Hong Kong, China.","DOI":"10.1145\/1935826.1935845"},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"1088","DOI":"10.1038\/s41467-021-21246-9","article-title":"Inference and analysis of cell-cell communication using CellChat","volume":"12","author":"Jin","year":"2021","journal-title":"Nat. Commun."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"903","DOI":"10.1007\/s11121-016-0678-8","article-title":"Peer Influence on Academic Performance: A Social Network Analysis of Social-Emotional Intervention Effects","volume":"17","author":"DeLay","year":"2016","journal-title":"Prev. Sci."},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"541","DOI":"10.1080\/15236803.2010.12001614","article-title":"Social Network Analysis (SNA) Applications in Evaluating MPA Classes","volume":"16","author":"Naim","year":"2010","journal-title":"J. Public Aff. Educ."},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"489","DOI":"10.1007\/s10734-013-9617-9","article-title":"Understanding social learning relations of international students in a large classroom using social network analysis","volume":"66","author":"Rienties","year":"2013","journal-title":"High. Educ."},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1016\/j.ijinfomgt.2017.08.003","article-title":"Social network analysis: Characteristics of online social networks after a disaster","volume":"38","author":"Kim","year":"2018","journal-title":"Int. J. Inf. Manage."},{"key":"ref_43","first-page":"136","article-title":"The social network analysis of Switzerland football team on FIFA world cup 2014","volume":"15","author":"Clemente","year":"2015","journal-title":"J. Phys. Educ. Sport"},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1080\/24733938.2018.1478122","article-title":"Integrating communication and passing networks in football using social network analysis","volume":"3","author":"Mclean","year":"2019","journal-title":"Sci. Med. Footb."},{"key":"ref_45","unstructured":"Nayak, R.C., and Agarwal, R. (2025, January 08). A Model of Creativity and Innovation in Organizations. Available online: https:\/\/journals.indexcopernicus.com\/api\/file\/viewByFileId\/1301296."},{"key":"ref_46","doi-asserted-by":"crossref","unstructured":"Rowe, R., Creamer, G., Hershkop, S., and Stolfo, S.J. (2007, January 12). Automated social hierarchy detection through email network analysis. Proceedings of the Joint Ninth WebKDD and First SNA-KDD 2007 Workshop on Web Mining and Social Network Analysis, San Jose, CA, USA.","DOI":"10.1145\/1348549.1348562"},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"415","DOI":"10.1146\/annurev.soc.27.1.415","article-title":"Birds of a feather: Homophily in social networks","volume":"27","author":"McPherson","year":"2001","journal-title":"Annu. Rev. Sociol."},{"key":"ref_48","doi-asserted-by":"crossref","first-page":"e2023301118","DOI":"10.1073\/pnas.2023301118","article-title":"The echo chamber effect on social media","volume":"118","author":"Cinelli","year":"2021","journal-title":"Proc. Natl. Acad. Sci. USA"},{"key":"ref_49","unstructured":"Rusho, Y., Nudler, I., and Ravid, G. (2023, November 02). Knowledge Development in Communities During Crises: A Discourse Comparison Tool. Available online: https:\/\/easychair.org\/publications\/preprint\/RjmR."},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"297","DOI":"10.1609\/icwsm.v5i1.14127","article-title":"Detecting and tracking political abuse in social media","volume":"5","author":"Ratkiewicz","year":"2011","journal-title":"Proc. Int. AAAI Conf. Web Soc. Media"},{"key":"ref_51","doi-asserted-by":"crossref","first-page":"225","DOI":"10.1609\/icwsm.v7i1.14440","article-title":"Friendship paradox redux: Your friends are more interesting than you","volume":"7","author":"Hodas","year":"2013","journal-title":"Proc. Int. AAAI Conf. Web Soc. Media"},{"key":"ref_52","doi-asserted-by":"crossref","unstructured":"Wilkin, J., Biggs, E., and Tatem, A.J. (2019). Measurement of Social Networks for Innovation within Community Disaster Resilience. Sustainability, 11.","DOI":"10.3390\/su11071943"},{"key":"ref_53","doi-asserted-by":"crossref","unstructured":"Mislove, A., Marcon, M., Gummadi, K.P., Druschel, P., and Bhattacharjee, B. (2007, January 24\u201326). Measurement and analysis of online social networks. Proceedings of the ACM SIGCOMM Internet Measurement Conference, IMC, San Diego, CA, USA.","DOI":"10.1145\/1298306.1298311"},{"key":"ref_54","doi-asserted-by":"crossref","first-page":"408","DOI":"10.1016\/j.laa.2007.01.011","article-title":"The minimal spectral radius of graphs with a given diameter","volume":"423","author":"Kooij","year":"2007","journal-title":"Linear Algebra Appl."},{"key":"ref_55","unstructured":"Lerman, K., Ghosh, R., and Surachawala, T. (2024, June 12). Social Contagion: An Empirical Study of Information Spread on Digg and Twitter Follower Graphs. Available online: http:\/\/twitter.com."},{"key":"ref_56","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1353\/sais.2002.0009","article-title":"Social Capital and Development: The Coming Agenda","volume":"22","author":"Fukuyama","year":"2002","journal-title":"SAIS Rev."},{"key":"ref_57","doi-asserted-by":"crossref","first-page":"04018013","DOI":"10.1061\/(ASCE)ME.1943-5479.0000612","article-title":"Influence of Organizational Characteristics on Construction Project Performance Using Corporate Social Networks","volume":"34","author":"Castillo","year":"2018","journal-title":"J. Manag. Eng."},{"key":"ref_58","first-page":"77","article-title":"Communication, Commitment & Trust: Exploring the Triad","volume":"6","author":"Zeffane","year":"2011","journal-title":"Int. J. Bus. Manag."},{"key":"ref_59","first-page":"43","article-title":"Mapping Networks of Terrorist Cells","volume":"24","author":"Krebs","year":"2002","journal-title":"Connections"},{"key":"ref_60","unstructured":"Izquierdo, L.R., and Hanneman, R.A. (2021, February 20). Introduction to the Formal Analysis of Social Networks. Publ. Electron., Available online: https:\/\/luis.izqui.org\/papers\/Izquierdo_Hanneman_2006-version2.pdf."},{"key":"ref_61","unstructured":"Prell, C., and Skvoretz, J. (2023, February 15). Looking at Social Capital Through Triad Structures Co-Evolution of Trade Networks and Environmental Inequalities View Project Structural Anonymization Techniques for Large, Labeled, and Dynamic So-cial Graphs (Funding Agency: NSF), View Project. Available online: https:\/\/www.researchgate.net\/publication\/237049727."},{"key":"ref_62","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1137\/S003614450342480","article-title":"The structure and function of complex networks","volume":"45","author":"Newman","year":"2003","journal-title":"SIAM Rev."},{"key":"ref_63","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1007\/s13278-018-0533-y","article-title":"Analysis of social interaction network properties and growth on Twitter","volume":"8","author":"Sadri","year":"2018","journal-title":"Soc. Netw. Anal. Min."},{"key":"ref_64","doi-asserted-by":"crossref","first-page":"268701","DOI":"10.1103\/PhysRevLett.93.268701","article-title":"Patterns of link reciprocity in directed networks","volume":"93","author":"Garlaschelli","year":"2004","journal-title":"Phys. Rev. Lett."},{"key":"ref_65","first-page":"4","article-title":"Looking at social capital through triad structures","volume":"28","author":"Prell","year":"2008","journal-title":"Connections"},{"key":"ref_66","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1186\/s13673-014-0014-x","article-title":"Detecting misinformation in online social networks using cognitive psychology","volume":"4","author":"Kumar","year":"2014","journal-title":"Human-centric Comput. Inf. Sci."},{"key":"ref_67","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1002\/cplx.10066","article-title":"Dynamics of social networks","volume":"8","author":"Ebel","year":"2002","journal-title":"Complexity"},{"key":"ref_68","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1007\/978-3-540-89853-5_16","article-title":"The small world of web network graphs","volume":"Volume 20 CCIS","author":"Missen","year":"2008","journal-title":"Communications in Computer and Information Science"},{"key":"ref_69","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1109\/MIC.2015.93","article-title":"Trust Networks: Topology, Dynamics, and Measurements","volume":"19","author":"Agreste","year":"2015","journal-title":"IEEE Internet Comput."},{"key":"ref_70","unstructured":"Huang, J., and Fox, M.S. (2006, January 25\u201329). An ontology of trust\u2014Formal semantics and transitivity. Proceedings of the ACM International Conference Proceeding Series, Pittsburgh, PA, USA."},{"key":"ref_71","doi-asserted-by":"crossref","unstructured":"Orangi, M.A., and Hashemi Golpayegani, A. (2018, January 17\u201319). An Activity-Based User Trusting Behavior Diffusion Model in Social Networks. Proceedings of the 9th International Symposium on Telecommunication: With Emphasis on Information and Communication Technology, IST 2018, Tehran, Iran.","DOI":"10.1109\/ISTEL.2018.8661050"},{"key":"ref_72","unstructured":"Newman, M.E., Barab\u00e1si, A.-L.E., and Watts, D.J. (2006). The Structure and Dynamics of Networks, Princeton University Press."},{"key":"ref_73","unstructured":"Oliver, K., Crossley, N., Edwards, G., Koskinen, J., and Everett, M. (2014). Covert Networks\u2014Structures, Processes and Types, IEEE."},{"key":"ref_74","doi-asserted-by":"crossref","unstructured":"Keegan, B., Ahmed, M.A., Williams, D., Srivastava, J., and Contractor, N. (2010, January 20\u201322). Dark gold: Statistical properties of clandestine networks in massively multiplayer online games. Proceedings of the SocialCom 2010: 2nd IEEE International Conference on Social Computing, PASSAT 2010: 2nd IEEE International Conference on Privacy, Security, Risk and Trust, Minneapolis, MN, USA.","DOI":"10.1109\/SocialCom.2010.36"},{"key":"ref_75","doi-asserted-by":"crossref","unstructured":"Lim, H.L., and Sudweeks, F. (2008). Discourse and network analyses of learning conversations. Handbook of Research on Computer Mediated Communication, IGI Global.","DOI":"10.4018\/978-1-59904-863-5.ch034"},{"key":"ref_76","first-page":"1","article-title":"Analyzing Discourse and Text Complexity for Learning and Collaborating","volume":"534","year":"2014","journal-title":"Stud. Comput. Intell."},{"key":"ref_77","doi-asserted-by":"crossref","unstructured":"Hu, L. (2022). Turn-Taking Patterns in Dialogic Collaborative Problem Solving, IEEE.","DOI":"10.1007\/s11251-021-09565-2"},{"key":"ref_78","doi-asserted-by":"crossref","first-page":"551","DOI":"10.1177\/10464964221118674","article-title":"Arguments at Odds\u2014Dyadic Turn-Taking and Conflict Development in Consensus-Making Groups","volume":"54","author":"Ziembowicz","year":"2023","journal-title":"Small Group Res."},{"key":"ref_79","doi-asserted-by":"crossref","first-page":"1987","DOI":"10.1080\/1369118X.2021.1924224","article-title":"Predicting conflict-prone disputes using the structure of turn-taking: The case of Wikipedia","volume":"25","author":"Ziembowicz","year":"2022","journal-title":"Inf. Commun. Soc."},{"key":"ref_80","doi-asserted-by":"crossref","first-page":"2678","DOI":"10.1080\/10494820.2021.1897844","article-title":"A longitudinal study into the effects of material incentives on knowledge-sharing networks and information lifecycles in an online forum","volume":"31","author":"Zhan","year":"2023","journal-title":"Interact. Learn. Environ."},{"key":"ref_81","doi-asserted-by":"crossref","first-page":"163","DOI":"10.1016\/j.socnet.2014.10.005","article-title":"Reciprocity, transitivity, and the mysterious three-cycle","volume":"40","author":"Block","year":"2015","journal-title":"Soc. Netw."},{"key":"ref_82","first-page":"5969","article-title":"The Bullwhip Effect in Supply Networks","volume":"67","author":"Osadchiy","year":"2021","journal-title":"Manage. Sci."},{"key":"ref_83","unstructured":"Dover, R. (2024, August 17). Trust in Interstate Intelligence Sharing. Available online: https:\/\/figshare.le.ac.uk\/articles\/journal_contribution\/Trust_in_Interstate_Intelligence_Sharing\/12437027?file=22927349."},{"key":"ref_84","doi-asserted-by":"crossref","first-page":"386","DOI":"10.1080\/08850607.2022.2079161","article-title":"The Social Ties that Bind: Unraveling the Role of Trust in International Intelligence Cooperation","volume":"36","author":"Tuinier","year":"2023","journal-title":"Int. J. Intell. CounterIntell."},{"key":"ref_85","doi-asserted-by":"crossref","first-page":"222","DOI":"10.1177\/15553434221103718","article-title":"A Naturalistic Investigation of Trust, AI, and Intelligence Work","volume":"16","author":"Dorton","year":"2022","journal-title":"J. Cogn. Eng. Decis. Mak."},{"key":"ref_86","unstructured":"Hislop, D. (2011). The Paradox of Communities of Practice. Knowledge Networks, IGI Global."},{"key":"ref_87","doi-asserted-by":"crossref","first-page":"1593","DOI":"10.1287\/orsc.2015.1009","article-title":"Knowledge sharing in online communities: Learning to cross geographic and hierarchical boundaries","volume":"26","author":"Hwang","year":"2015","journal-title":"Organ. Sci."},{"key":"ref_88","doi-asserted-by":"crossref","first-page":"226","DOI":"10.1016\/j.im.2010.03.001","article-title":"To give or to receive? Factors influencing members\u2019 knowledge sharing and community promotion in professional virtual communities","volume":"47","author":"Chen","year":"2010","journal-title":"Inf. Manag."}],"container-title":["Future Internet"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1999-5903\/17\/4\/144\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T17:00:19Z","timestamp":1760029219000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1999-5903\/17\/4\/144"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,26]]},"references-count":88,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2025,4]]}},"alternative-id":["fi17040144"],"URL":"https:\/\/doi.org\/10.3390\/fi17040144","relation":{},"ISSN":["1999-5903"],"issn-type":[{"type":"electronic","value":"1999-5903"}],"subject":[],"published":{"date-parts":[[2025,3,26]]}}}