{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T01:37:28Z","timestamp":1760060248999,"version":"build-2065373602"},"reference-count":26,"publisher":"MDPI AG","issue":"8","license":[{"start":{"date-parts":[[2025,8,18]],"date-time":"2025-08-18T00:00:00Z","timestamp":1755475200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Future Internet"],"abstract":"<jats:p>This study examines the influence of software agents on information-sharing behavior within security-sensitive organizations, where confidentiality and hierarchical culture often limit the flow of knowledge. While such organizations aim to collect, analyze, and disseminate information for security purposes, internal sharing dynamics are shaped by competing norms of secrecy and collaboration. To explore this tension, we developed a digital simulation game in which participants from security-sensitive organizations engaged in collaborative tasks over three rounds. In rounds two and three, software agents were introduced to interact with participants by sharing public and classified information. A total of 28 participants took part, generating 1626 text-based interactions. Findings indicate that (1) information-sharing patterns in security-sensitive contexts differ significantly from those in non-sensitive environments; (2) when software agents share classified information, participants are more likely to share sensitive data in return; (3) when participants are aware of the agents\u2019 presence, they reduce classified sharing and increase public sharing; and (4) agents that share both public and classified information lead to decreased public and increased classified sharing. These results provide insight into the role of artificial agents in shaping communication behaviors in secure environments and inform strategies for training and design in knowledge-sensitive organizational settings.<\/jats:p>","DOI":"10.3390\/fi17080373","type":"journal-article","created":{"date-parts":[[2025,8,18]],"date-time":"2025-08-18T13:28:22Z","timestamp":1755523702000},"page":"373","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Software Agents as Information-Sharing Enhancers in Security-Sensitive Organizations"],"prefix":"10.3390","volume":"17","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5927-5517","authenticated-orcid":false,"given":"Yonit","family":"Rusho","sequence":"first","affiliation":[{"name":"Department of Software Engineering, Pernick Faculty of Engineering, Shenkar College of Engineering, Design, Art, Anne Frank 12, Ramat Gan 5252626, Israel"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1791-0310","authenticated-orcid":false,"given":"Daphne Ruth","family":"Raban","sequence":"additional","affiliation":[{"name":"School of Business Administration, Faculty of Social Sciences, University of Haifa, Haifa 3498838, Israel"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9613-713X","authenticated-orcid":false,"given":"Michal","family":"Chalamish","sequence":"additional","affiliation":[{"name":"Department of Software Engineering, Pernick Faculty of Engineering, Shenkar College of Engineering, Design, Art, Anne Frank 12, Ramat Gan 5252626, Israel"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6661-6674","authenticated-orcid":false,"given":"Vered","family":"Pnueli","sequence":"additional","affiliation":[{"name":"Department of Software Engineering, Pernick Faculty of Engineering, Shenkar College of Engineering, Design, Art, Anne Frank 12, Ramat Gan 5252626, Israel"}]}],"member":"1968","published-online":{"date-parts":[[2025,8,18]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1504\/IJKL.2005.006251","article-title":"Information sharing online: A research challenge","volume":"1","author":"Rafaeli","year":"2005","journal-title":"Int. J. Knowl. Learn."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"334","DOI":"10.36941\/ajis-2025-0022","article-title":"Knowledge Sharing and Decision-Making Effectiveness in Higher Education: Empirical Evidence from a University","volume":"14","author":"Hussein","year":"2025","journal-title":"Acad. J. Interdiscip. Stud."},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Danko, L., and Crhov\u00e1, Z. (2024). Rethinking the Role of Knowledge Sharing on Organizational Performance in Knowledge-Intensive Business Services. J. Knowl. Econ., 1\u201321.","DOI":"10.1007\/s13132-024-02354-5"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"1215","DOI":"10.1002\/smj.3256","article-title":"Engineering serendipity: When does knowledge sharing lead to knowledge production?","volume":"42","author":"Lane","year":"2021","journal-title":"Strat. Manag. J."},{"key":"ref_5","first-page":"99","article-title":"Creating intelligence communities","volume":"25","author":"Omand","year":"2010","journal-title":"Public Policy Adm."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1016\/j.ijhcs.2006.09.003","article-title":"Knowledge sharing behavior in virtual communities: The relationship between trust, self-efficacy, and outcome expectations","volume":"65","author":"Hsu","year":"2007","journal-title":"Int. J. Hum. Comput. Stud."},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Mubin, O., D\u2019Arcy, T., Murtaza, G., Simoff, S., Stanton, C., and Stevens, C. (2014, January 25\u201329). Active or passive?: Investigating the impact of robot role in meetings. Proceedings of the IEEE RO-MAN 2014\u201423rd IEEE International Symposium on Robot and Human Interactive Communication: Human-Robot Co-Existence: Adaptive Interfaces and Systems for Daily Life, Therapy, Assistance and Socially Engaging Interactions, Edinburgh, Scotland, UK.","DOI":"10.1109\/ROMAN.2014.6926315"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"174","DOI":"10.1177\/1046878105286184","article-title":"Testing social theories in computer-mediated communication through gaming and simulation","volume":"37","author":"Noy","year":"2006","journal-title":"Simul. Gaming"},{"key":"ref_9","unstructured":"Siman-tov, D., and Alon, N. (2018). The Cybersphere Obligates and Facilitates a Revolution in Intelligence Affairs. Cyber Intell. Secur., 2, Available online: https:\/\/www.inss.org.il\/publication\/cybersphere-obligates-facilitates-revolution-intelligence-affairs\/."},{"key":"ref_10","first-page":"292","article-title":"Information culture and its influences in knowledge creation: Evidence from university teams engaged in collaborative innovation projects","volume":"35","author":"Vick","year":"2015","journal-title":"Int. J. Inf. Manag."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"740","DOI":"10.1016\/j.respol.2008.01.008","article-title":"Re-thinking new knowledge production: A literature review and a research agenda","volume":"37","author":"Hessels","year":"2008","journal-title":"Res. Policy"},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Rusho, Y., Raban, D.R., Simantov, D., and Ravid, G. (2025). Knowledge Sharing in Security-Sensitive Communities. Futur. Internet, 17.","DOI":"10.3390\/fi17040144"},{"key":"ref_13","unstructured":"Rusho, Y., Nudler, I., and Ravid, G. (2023). Knowledge Development in Communities During Crises: A Discourse Comparison Tool, EasyChair."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"319","DOI":"10.1016\/j.giq.2013.10.003","article-title":"Government innovation through social media","volume":"30","author":"Criado","year":"2013","journal-title":"Gov. Inf. Q."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"304","DOI":"10.1207\/S15327965PLI1403&4_21","article-title":"Hidden Profiles: A Brief History","volume":"14","author":"Stasser","year":"2003","journal-title":"Psychol. Inq."},{"key":"ref_16","first-page":"31","article-title":"Intelligence 2.0: A New Approach to the Production of Intelligence","volume":"5","author":"Ofer","year":"2013","journal-title":"Mil. Strateg. Aff."},{"key":"ref_17","first-page":"110","article-title":"From new media to communication","volume":"16","author":"Rafaeli","year":"1988","journal-title":"Sage Annu. Rev. Commun. Res. Adv. Commun. Sci."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"355","DOI":"10.1177\/146144480200400303","article-title":"Interactivity: A concept explication","volume":"4","author":"Kiousis","year":"2002","journal-title":"New Media Soc."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"2191","DOI":"10.1007\/s11135-013-9886-5","article-title":"The effects of information sharing and interactivity on the intention to use social networking websites","volume":"48","author":"Pai","year":"2014","journal-title":"Qual. Quant."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"536","DOI":"10.1007\/s10458-010-9165-y","article-title":"AutoMed: An automated mediator for multi-issue bilateral negotiations","volume":"24","author":"Chalamish","year":"2012","journal-title":"Auton. Agent. Multi. Agent. Syst."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1007\/s10458-014-9253-5","article-title":"A study of computational and human strategies in revelation games","volume":"29","author":"Peled","year":"2015","journal-title":"Auton. Agent. Multi. Agent. Syst."},{"key":"ref_22","unstructured":"Siu, H.C., Pena, J.D., Chen, E., Zhou, Y., Lopez, V.J., Palko, K., Chang, K.C., and Allen, R.E. (2022, January 09). Evaluation of Human-AI Teams for Learned and Rule-Based Agents in Hanabi. NeurIPS Proceedings. Available online: https:\/\/proceedings.neurips.cc\/paper\/2021\/hash\/86e8f7ab32cfd12577bc2619bc635690-Abstract.html."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1016\/j.entcom.2017.02.003","article-title":"Player-centered game AI from a flow perspective: Towards a better understanding of past trends and future directions","volume":"20","year":"2017","journal-title":"Entertain. Comput."},{"key":"ref_24","unstructured":"Zvelebilova, J., Savage, S., and Riedl, C. (2025, July 15). Collective Attention in Human-AI Teams. arXiv, Available online: https:\/\/arxiv.org\/pdf\/2407.17489."},{"key":"ref_25","unstructured":"Hemmer, P., Westphal, M., Schemmer, M., Vetter, S., V\u00f6ssing, M., and Satzger, G. Human-AI Collaboration: The Effect of AI Delegation on Human Task Performance and Task Satisfaction. Proceedings of the International Conference on Intelligent User Interfaces, Proceedings IUI."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"S112","DOI":"10.1016\/j.giq.2011.08.002","article-title":"Transnational public sector knowledge networks: Knowledge and information sharing in a multi-dimensional context","volume":"29","author":"Dawes","year":"2012","journal-title":"Gov. Inf. Q."}],"container-title":["Future Internet"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1999-5903\/17\/8\/373\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T18:29:58Z","timestamp":1760034598000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1999-5903\/17\/8\/373"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,18]]},"references-count":26,"journal-issue":{"issue":"8","published-online":{"date-parts":[[2025,8]]}},"alternative-id":["fi17080373"],"URL":"https:\/\/doi.org\/10.3390\/fi17080373","relation":{},"ISSN":["1999-5903"],"issn-type":[{"type":"electronic","value":"1999-5903"}],"subject":[],"published":{"date-parts":[[2025,8,18]]}}}