Uploaded by Muhammad Fayyaz Sheikh

Management strategies to mitigate knowl

advertisement
Knowledge Management Research & Practice
ISSN: (Print) (Online) Journal homepage: https://www.tandfonline.com/loi/tkmr20
Management strategies to mitigate knowledge
hiding behaviours: symmetric and asymmetric
analyses
Dr Muhammad Waseem Bari, Mrs Irum Shahzadi & Dr Muhammad Fayyaz
Sheikh
To cite this article: Dr Muhammad Waseem Bari, Mrs Irum Shahzadi & Dr Muhammad
Fayyaz Sheikh (2023): Management strategies to mitigate knowledge hiding behaviours:
symmetric and asymmetric analyses, Knowledge Management Research & Practice, DOI:
10.1080/14778238.2023.2178344
To link to this article: https://doi.org/10.1080/14778238.2023.2178344
Published online: 16 Feb 2023.
Submit your article to this journal
View related articles
View Crossmark data
Full Terms & Conditions of access and use can be found at
https://www.tandfonline.com/action/journalInformation?journalCode=tkmr20
KNOWLEDGE MANAGEMENT RESEARCH & PRACTICE
https://doi.org/10.1080/14778238.2023.2178344
ORIGINAL ARTICLE
Management strategies to mitigate knowledge hiding behaviours: symmetric
and asymmetric analyses
Dr Muhammad Waseem Bari
, Mrs Irum Shahzadi and Dr Muhammad Fayyaz Sheikh
Lyallpur Business School, Government College University, Faisalabad, Pakistan
ABSTRACT
ARTICLE HISTORY
The study investigates the impact of management strategies (reducing chain of command,
developing informal interaction, implementing incentive policy, easy performance appraisal,
encouraging higher interdependency, and open space workstations) to mitigate the knowl­
edge-hiding behaviours while using the psychological contract as a mediator between man­
agement strategies and knowledge-hiding behaviours. Symmetric (PLS-SEM) and asymmetric
(fsQCA) methods are used to analyse time lag data collected from 457 employees of software
houses. Except for the reducing chain of command, the PLS-SEM results show that all manage­
ment strategies and psychological contract have a significant role in reducing knowledgehiding behaviours. The fsQCA results suggest that all management strategies and psychologi­
cal contract play their role in different causal recipes while influencing the knowledge-hiding
behaviours, however, developing informal interaction, implementing incentive policy, easy
performance appraisal, and psychological contracts have more consistent contributions in
these causal recipes.
Received 15 April 2022
Revised 24 January 2023
Accepted 28 January 2023
1. Introduction
Connelly et al. (2012) initially introduced the concept
of knowledge hiding in the organisational context.
Subsequently, many studies, to control this negative
workplace behaviour, explore the antecedents and
outcomes of knowledge hiding that include innova­
tion (Bogilović et al., 2017b), creativity (Černe et al.,
2017),
individual/organisational
performance
(Connelly et al., 2012), employee silence (Bari, et al.,
2020), psychological contract breach (Bari, Ghaffar
et al., 2020), team performance (Bogilović et al.,
2017; Fong et al., 2018), cronyism, interpersonal rela­
tions (Connelly & Zweig, 2015), altruistic leadership
(Abdillah et al., 2022), dark triad (Pan et al., 2018), and
job security (Serenko & Bontis, 2016).
Knowledge hiding is different from other negative
behaviours in that knowledge hiders adopt straight
denial or sometimes diplomatic behaviour to hide
knowledge from the knowledge seekers (Bernatović
et al., 2021). Therefore, Connelly et al. (2012) classify
knowledge hiding into three distinctive categories
namely, evasive hiding, playing dumb, and rationa­
lised hiding. Each knowledge-hiding behaviour
(KHBs) has certain motives and outcomes. In evasive
hiding, the knowledge holder intends to deceive others
by giving false or partially incorrect information
whereas, in playing dumb, the knowledge holder com­
pletely ignores or puts off others’ requests. On the
other hand, in rationalised hiding, the knowledge
CONTACT Dr Muhammad Waseem Bari
School, Faisalabad, Pakistan
© 2023 The Operational Research Society
KEYWORDS
Management strategies;
knowledge hiding;
psychological contract;
fsQCA; PLS-SEM; software
houses
hider presents enough reasoning for not disclosing
or sharing the requested information (Connelly et al.,
2019, 2012). Considering this, researchers have
emphasised that each category and its antecedents
and outcomes should be examined explicitly. As
a result, several studies have been conducted to exam­
ine the antecedents and outcomes of knowledge hid­
ing, particularly from a negative perspective, however,
very few researchers have proposed empirical solu­
tions to control KHBs (Butt & Ahmad, 2020;
Connelly et al., 2019).
It is noted that the adoption of KHBs depends on
the situation (Connelly & Zweig, 2015; Connelly et al.,
2012), therefore, it is necessary to explore distinctive
ways to control KHBs effectively. In this regard, Butt
and Ahmad (2020) proposed six strategies to mitigate
knowledge hiding (SMKH) in organisations. These
strategies include reducing chain of command
(RCC), developing informal interaction (DII), intro­
ducing and implementing incentive policy (IIP), initi­
ating easy performance appraisal (EPA), encouraging
higher interdependency (EHI), and introducing open
space work stations (OSWS; Butt & Ahmad, 2020).
However, the literature lacks sufficient empirical evi­
dence to validate the effectiveness of these strategies.
Butt and Ahmad (2020) have invited scholars to test
the impact of proposed mitigating strategies on KHBs
in different cultural contexts (Butt & Ahmad, 2020). In
response to this call, this study aims at empirically
testing and validating these strategies in the South
muhammadwaseembari786@hotmail.com
Government College University Faisalabad, Lyallpur Business
2
M. W. BARI ET AL.
Asian context, which has been overlooked by previous
researchers.
Drawing on social exchange theory (SET; Blau,
1964), reciprocal trust between the knowledge holder
and the knowledge seeker is inevitable for knowledge
sharing and diminishing KHBs (Silva & Goncalves,
2016). Therefore, this study proposes that an intact
psychological contract (PC) may enhance the effec­
tiveness of SMKH to decrease KHBs in organisations.
Rousseau (1989) defines the PC as “an individual’s
beliefs about the terms of the exchange agreement
between employee and employer”. Rousseau (1989)
categorised PC into three dimensions namely, transac­
tional PC, relational PC, and a balanced PC. The
application of these three dimensions of PC may per­
form differently in different organisational cultures
(Shaheen et al., 2019). The perceived mutual expecta­
tions between employees and the organisation develop
a PC. The fulfilment/non-fulfilment of these mutual
expectations can influence the performance and beha­
viours of both parties (Bari, et al., 2020; Chaudhry
et al., 2011; Zhang et al., 2018; Vui-Yee Koon, 2022).
The PC is not limited to the relationship between
employer and employee, it also exists between employ­
ees (Schalk & Roe, 2007). An intact PC is a vital factor
in the organisation to reduce negative behaviours
(Bari, et al., 2020). Thus, PC may act as a mediator
between SMKH and KHBs that has not been empiri­
cally examined in previous studies.
Hence, the objectives of this study are two-fold:
first, to explore the impact of SMKH on KHBs
(Playing dump, evasive hiding, and rationalised
knowledge hiding) of employees of an organisation.
Second, to examine how PC mediates the relation
between SMKH and KHBs. To achieve the aforemen­
tioned objectives, this study has two research ques­
tions. First, what is the impact of SMKH on the three
dimensions of KHBs? Second, how does PC mediate
the relationship between SMKH and KHBs? For
empirical investigation, data are collected from the
employees of the software industry in Pakistan. The
rationale behind the selection of the software industry
is the workplace where knowledge workers are regu­
larly involved in creative and innovative activities,
which heavily depend on knowledge. Secondly, pre­
vious studies have confirmed the existence of KHBs in
the software industry of Pakistan (Bari, et al., 2020).
Therefore, it is of great importance to examine the
strategies to mitigate the KHBs in this industry.
This study has at least three important contribu­
tions. First, this is the first study that empirically
investigates the effectiveness of SMKH to control
employees’ KHBs in software houses in a developing
economy context i.e., Pakistan. Second, this study
employs both symmetrical (Partial Least Squares
Structural Equation Modelling; Hair et al., 2016) and
asymmetrical (Fuzzy Set Qualitative Comparative
Analysis; Rasoolimanesh et al., 2021) analyses to con­
firm the existence of KHBs in employees in the pre­
sence or absence of SMKH. Third, this study examines
how PC is supportive of SMKH for diminishing the
KHBs in software houses.
2. Literature review
2.1. Knowledge hiding
Knowledge-hiding practices are found at different
levels in different organisations and countries. For
instance, 46% of Chinese and 76% of Americans are
involved in knowledge-hiding practices in the work­
place (Pan et al., 2018; Peng, 2013; Z. Zhang & Min,
2021). The knowledge hiders have feelings of psycho­
logical ownership regarding the knowledge they
owned, thereby, they show a high tendency to hide
knowledge from others (Peng, 2013). Drawing on SET,
KHBs are reciprocally developed between employees
(Connelly et al., 2012). Knowledge hiders not only
stop sharing their knowledge but also halt colleagues
to develop innovative notions (Černe et al., 2014;
Peng, 2013). Employees’ KHBs impede their creative
skills and performance (Černe et al., 2014). Connelly
and Zweig (2015) report that KHBs impair employees’
social relationships. Drawing on the conservation of
resources theory (Hobfoll, 1989), Han et al. (2020)
find that a competitive psychological climate is an
important determinant of knowledge-hiding beha­
viour to stay competitive as compared to others.
Knowledge hiding exists in three forms (Connelly
et al., 2012) namely, playing dumb, evasive hiding, and
rationalised hiding. Being an evasive knowledge hider
an individual intends to deceive others by giving mis­
leading or incorrect information or making
a bewildering promise to answer in the future. When
an individual pretends to be unfamiliar with the
requested knowledge and avoids providing the infor­
mation is referred to as playing dumb behaviour. An
individual who presents enough reasoning for not
disclosing or sharing requested information refers to
as a rationalised knowledge hider (Butt & Ahmad,
2019; Connelly et al., 2012; Demirkasımoğlu, 2016;
Webster et al., 2008). KHBs have several antecedents
and negative consequences presented in the literature
(Bari, Misbah et al., 2020; Butt & Ahmad, 2020;
Demirkasımoğlu, 2016; Fong et al., 2018; Huo et al.,
2016; Xiao & Cooke, 2018), which reflect this destruc­
tive workplace behaviour must be controlled through
effective mitigating strategies.
2.2. Strategies to Mitigate Knowledge Hiding
(SMKH)
Organisations firmly believe in knowledge-sharing
culture among employees, thus, organisations do
KNOWLEDGE MANAGEMENT RESEARCH & PRACTICE
make efforts to control the knowledge-hiding culture.
Scholars have also highlighted the need for the identi­
fication of effective strategies. However, the effective­
ness of the management strategies and practices to
control the knowledge-hiding culture within the orga­
nisations is debatable (Anand & Hassan, 2019; Butt &
Ahmad, 2020; Connelly et al., 2019).
Anand and Hassan (2019) classify the causes of
knowledge hiding into four categories namely, indi­
vidual, organisational, job, and co-worker related.
They suggest various remedies to curtail the conse­
quences of KHBs such as improving employee core
self-evaluation, making employees aware of each
other’s jobs, providing opportunities for socialising
beyond work, 360-degree feedback on hiding acts,
and facilitating a positive work and cross-linking
environment. In addition, Abubakar et al (2019)
also report that fair treatment by organisations
makes their employees more involved in their
work, and develops trust and sharing behaviours in
the workplace. In a qualitative study, Butt and
Ahmad (2020) propose six SMKH within the orga­
nisations to mitigate KHBs. These six strategies and
their potential relationships with KHBs are dis­
cussed in the following lines.
2.3. Reducing chain of command
Complex and bureaucratic structure-based organisa­
tions have more propensity for knowledge hiding.
When a message transmits through a complex hier­
archy, there are higher chances of manipulation of the
original content of the message (Butt & Ahmad, 2020).
Easy access to top management develops mutual
bonding that ultimately diminishes KHBs. Butt and
Ahmad (2020) argue that while transmitting the mes­
sage through many layers, juniors may hide knowl­
edge from senior managers. Open doors for employees
specifically, junior staff develop confidence and trust
among employees and the organisation (Butt, 2021;
Butt & Ahmad, 2020). The confidence and frequent
direct interaction with seniors enhance the productiv­
ity and innovative skills of junior employees. A long
and multi-reporting chain of command also creates
problems such as miscommunication and delays in
decision-making (Crumpton, 2013). A flatter or Semi
flatter organisational structure not only reduces the
cost of administrative/supervisory positions but also
develops direct interaction and trust among workers,
and promotes knowledge sharing culture
(Schneckenberg, 2009; Webster et al., 2008) Hence,
this study proposes that
H1a: Reducing chain of command decreases KHBs.
3
2.4. Developing informal interaction
Literature has underlined the detrimental effects of
knowledge hiding on social relationships (Connelly
& Zweig, 2015), employee creativity (Bogilović et al.,
2017; Černe et al., 2014), and team creativity
(Bogilović et al., 2017). Anand and Hassan (2019)
suggest that providing opportunities for socialisation
beyond work can engender positive work behaviours
and overcome mutual work-related issues. Informal
groups and communities make employees aware of
each other’s jobs and also make them understand the
obstructive effects of knowledge hiding in the work­
place. Informal interaction provides opportunities to
share ideas and experiences that enhance cooperation,
creativity, and confidence (Butt & Ahmad, 2020). The
development of interpersonal trust may curtail unethi­
cal practices i.e., knowledge hiding among employees.
Knowledge hiding impairs interpersonal relationships.
Connelly et al. (2012) explain that personal conflicts
can develop the intention of knowledge hiding while
social interactions can curtail it. An open communica­
tion system (Shaheen et al., 2019), informal interaction
(L. Zhang & Deng, 2014), social get-togethers, and
informal friendship at the workplace (Enwereuzor
et al., 2022) develop trust among workers and moti­
vate them to share their tacit as well as explicit knowl­
edge (Chen et al., 2014). Therefore, the study
hypothesises that
H1b: Developing informal interaction among employ­
ees reduces KHBs.
2.5. Introducing and implementing incentive
policy
A rational reward system encourages employees to
share knowledge and discourages knowledge hiding
simultaneously (Butt & Ahmad, 2020) which increases
workers’ professional commitment to the firm (Butt,
2020). Suppiah and Sandhu (2011) document that
rewards and recognition can motivate workers to
share knowledge. De Almeida et al. (2016) endorse
the relationship between incentives and benefits and
knowledge-sharing behaviours. Offering incentives to
managers for their knowledge-sharing behaviour at
work promotes knowledge-sharing culture and dis­
courages KHBs (Connelly et al., 2019; Miminoshvili
and Černe, 2021). Lee et al. (2014) also support the
positive equation of performance-based compensation
and knowledge-sharing behaviours. The monetary
and non-monetary rewards enhance self-confidence
in employees and motivate them intrinsically to
share their explicit as well as tacit knowledge and skills
4
M. W. BARI ET AL.
with colleagues (Anand & Hassan, 2019). Thus, this
study proposes that
H1c: Introducing and implementing incentive policy
reduces KHBs.
2.6. Initiating easy performance appraisal
Sometimes managers are hesitant to share their
knowledge with colleagues due to fear and the strict
performance criteria of the organisation (Butt &
Ahmad, 2020; Černe et al., 2014). Organizations that
emphasise on prevention of volunteer knowledge
sharing may promote KHBs among managers.
Conversely, organisations that loosely account for
volunteer KHBs while evaluating employee perfor­
mance face fewer KHBs within an organisation (Butt,
2021; Butt & Ahmad, 2020). The strict questions
regarding knowledge transfer during the process of
performance appraisal may annoy the workers and
induce them to hide their tacit knowledge (Connelly
et al., 2019, 2012; Serenko & Bontis, 2016). When
management enforces the incentive-based policy to
share knowledge with subordinates (Butt & Ahmad,
2019), an ambiance of competition with co-workers
starts. Bordia et al. (2006) confirm the negative rela­
tionship between employees’ fear of negative evalua­
tions and their knowledge-sharing intentions. An easy
performance appraisal may work as a proxy for
rewards as it looks unrealistic to offer tangible incen­
tives every time to the workers who adopt knowledgesharing behaviours (Fischer, 2022). Anand and
Hassan (2019) suggest 360 degree feedback as an
effective appraisal tool and strategy to create
a positive culture of knowledge sharing in the organi­
sations. Thus, this study proposes that
H1d: Initiating easy performance appraisal decreases
KHBs.
2.7. Encouraging higher interdependency
Butt and Ahmad (2020) reveal that interdependency at
work discourages KHBs (Bari et al., 2019; Bari, et al.,
2020). Interdependence reciprocates knowledgesharing culture and discourages KHBs (Z. Zhang &
Min, 2021). Bogilović et al (2017) argues that knowl­
edge hiding from co-workers hinders not only
employees’ creativity but also the team and organisa­
tions’ creative capabilities (Hernaus et al., 2017).
Anand and Hassan (2019) favour teamwork and
mutual collaboration of employees across departments
to promote a knowledge-sharing culture. Previous
research describes that task interdependence needs to
be decided first before knowledge integration of the
team (Fong et al., 2018; Kou, 2020). However, new
researchers claim that mutual understanding of the
team members for knowledge integration is more
important than task interdependence decisions (Kou,
2020). Scholars believe that developing an attitude of
interdependence among employees can motivate them
to share knowledge and innovative ideas (Johnson,
2003; Kim et al., 2018). Thus, considering the above
arguments, this study proposes that
H1e: Encouraging higher interdependency among
employees reduces KHBs
2.8. Open space workstation
An open workstation engenders strong interpersonal
relations among colleagues that reduce knowledgehiding. Anand and Hassan (2019) suggest that provid­
ing a conducive work environment for working cre­
ates a sense of connectivity among employees and
restrains them from KHBs. Butt and Ahmad (2020)
state that OSWS promotes knowledge sharing among
employees and discourages KHBs because OSWS pro­
vides convenience in discussions and idea-sharing.
Further, OSWS may help reduce competition among
employees, improve collaboration, a friendly work
environment, and effective communication among
managers/ employees, and motivate employees to
avoid knowledge-hiding practices. Peng (2013)
explains that organisation-based psychological owner­
ship helps reduce self-perception of knowledge posses­
sion, as OSWS discourages a knowledge-hiding
culture. Scholars recommend that organisations
should provide an open workplace with resources
and facilities, and remove barriers during communi­
cation among workers to enhance the collaboration
and knowledge-sharing culture (Evans, 2012). The
knowledge-sharing behaviour in the open workplace
also depends on the nature of workplace interdepen­
dencies (Perumal & Sreekumaran Nair, 2022). When
goals and resources are independent in the open work­
place, workers perceive non-competition and avoid
knowledge hiding. On the other hand, when goals
and resources are interdependent, colleagues perceive
competition and adopt KHBs. Given the above discus­
sion, the study hypothesises that:
H1f: Open space workstation reduces KHBs
2.9. Psychological contract (mediator)
A PC is an informal and unwritten set of expectations
between an employee and his employer that outlines
an employment relationship. Rousseau (1989) defines
the PC as an “individual’s beliefs about the terms of
KNOWLEDGE MANAGEMENT RESEARCH & PRACTICE
the exchange agreement between employee and
employer”. The PC has three perspectives namely,
transactional PC, relational PC, and balanced PC
(Rousseau, 1989). In the organisational context, PC
is considered an important individual mechanism
that engenders the expected employment relationship
and helps in setting the future behaviour of employees
(Dai & Wang, 2016; Kingshott, 2006). An individual’s
PC with the organisation depends on the individual’s
expectations, which are implicit and perceptual
(Rousseau, 1996), and likely to be revised over time
(Guest, 2004). Mutual trust regulates reciprocal obli­
gations under PC (Dai & Wang, 2016) that further
develops positive behaviour of employees (Dai &
Wang, 2016; Neill & Adya, 2007). Dai and Wang
(2016) report that a strong PC promotes a knowledgesharing culture (He & Li, 2011). Contrary, a PC breach
develops counterproductive work behaviours in
employees (Ng et al., 2014; Khalid et al., 2021).
When an employee receives fair treatment and justi­
fied benefits from the organisation against his/her
performance, he/she performs more positively
(Bashir et al., 2021). Therefore, this study proposes
that PC as a mediator enhances the impact of SMKH
to decrease the KHBs. Hence, the following hypoth­
eses are formulated.
H2a. PC mediates the relationship between RCC and
KHBs.
H2b. PC mediates the relationship between DII among
employees and KHBs.
Figure 1. Conceptual framework.
5
H2c. PC mediates the relationship between IIP and
KHBs.
H2d. PC mediates the relationship between EPA and
KHBs.
H2e. PC mediates the relationship between EHI
among employees and KHBs.
H2f. PC mediates the relationship between OSWS and
KHBs.
Figure 1 explains the positions of the variables and
the direction of the hypotheses.
3. Methods
3.1. Population and data collection procedure
The sample consists of randomly selected employees
working in IT firms in Pakistan. IT sector is pre­
sumed to be a place of innovation and knowledge
creation. It is also embedded with a dynamic busi­
ness environment therefore quite suitable for testing
the hypotheses developed in this study. According to
Pakistan Software Export Board (PSEB), currently,
more than 4,641 (PSEB, 2020) IT-based registered
companies are providing IT-related business solu­
tions and services. Considering the knowledge crea­
tion and sharing perspective, this study filters 337
firms that are providing business-related new soft­
ware development services in different cities of
6
M. W. BARI ET AL.
Figure 2. Post-analysis model.
Pakistan (PSEB 2021). Given the difficult circum­
stances due to COVID-19, an online questionnaire
in English language is designed in “google forms”.
A cover letter is attached with the questionnaire,
which asks employees to take permission from
their leadership before filling it out and be as
rational as possible because this survey is based on
their perception of a particular phenomenon not on
right or wrong answers. The cover letter also
describes what was attached to this survey form
bearing the following instructions/information.
First, it was asked the employees before filling out
the survey form, got permission from your leader­
ship, and confirmed it on the provided place of the
form. Second, the respondents were asked to provide
answers as rationale as possible because this survey
is just their perception about a particular phenom­
enon, not a right or wrong answer. Third, all data
will be kept secret, no individual identification will
be disclosed to anyone and these responses will be
used only for research and analysis purposes.
One thousand email addresses of the employees
from the IT firms’ websites are collected. Three times
lag approach is adopted while collecting the data. Each
time lag has 45 days gap. In the first wave, 781 ran­
domly selected employees are approached and sent
a web link of the survey form with questions about 6
SMKH. Out of 781, 642 employees filled the survey
form (attrition rate 17.79%). In wave 2 after 45 days,
642 employees are asked questions about knowledge
hiding. Out of 642 employees, 561 filled out the survey
form (attrition rate 12.05%). In the third wave, again
with 45 days gap, questions about PC and employees’
demographics are asked from 561 employees. Out of
561, 457 employees completed the survey form (attri­
tion rate 18.53%).
The demographics of respondents are as follows.
Gender: out of 457 employees, 332 are male and 125
are female. Education: out of 457 employees, 251 have
master’s degrees, 112 have bachelor’s degrees, and 94
employees have higher secondary school degrees and
some IT-related diplomas. Experience: 125 employees
have more than 10 years of experience, 205 employees
have 5–10 years of experience, and 127 employees
have 0–5 years of experience. Position and Role: 61
employees are project managers and they have some
strategic level roles, 127 are senior team leaders and
have project development roles, 105 are supervisors
and have operational roles, and 164 employees are at
the input stage.
3.2. Measurement
All items are measured on a five-point Likert scale
ranging from 1 (strongly disagree) to 5 (strongly
agree).
3.2.1. Strategies to Mitigate Knowledge Hiding
(SMKH)
This study uses six SMKH developed by Butt and
Ahmad (2020). The items used to measure these
KNOWLEDGE MANAGEMENT RESEARCH & PRACTICE
strategies are also adopted from Butt and Ahmad
(2020). The following lines describe the items of
SMKH.
Reducing Chain of Command (5 items), sample
item is “I can easily approach top management of
my organization to discuss any innovative business
idea”, Developing Informal Interactions (5 Items),
sample item is “Informal social interactions
improve my level of productivity and creativity”.
Implementing Incentive Policy (3 items), sample
item is “I am rewarded for my participation in
knowledge sharing activities”. Easy Performance
Appraisal (3 items), sample item is “My perfor­
mance is evaluated against my knowledge-sharing
behavior”. Encourage Higher Interdependency (4
items), sample item is “I prefer to work in teams
to get work-related information from team mem­
bers”. Open Space Work Stations (4 items), sample
item is “Open space work station improves sociali­
zation at the workplace”. Cronbach’s Alpha values
of these six SMKH are 0.873, 0.892, 0.731, 0.724,
0.758, and 0.879 respectively.
3.2.2. Knowledge hiding
The authors adopt 12 items KHBs (Evasive hiding,
playing dumb, and rationalised hiding) scale devel­
oped by Connelly et al. (2012). Respondents are
asked to specify the extent to which they involve in
any of mentioned behaviours. Sample items for eva­
sive hiding, playing dumb, and rationalised hiding are
“agree to help him/her but never really intend to”, “I
pretend that I do not know the information”
(α = 0.00), “I explain that I would like to tell him/her
but was not supposed to” respectively. Cronbach’s
Alpha value is 0.919.
3.2.3. Psychological contract
PC is measured with 11 items scale developed by
Rousseau and Tijoriwala (1999). A sample item is “I
do this job just for the money”. Cronbach’s Alpha
value is 0.892.
3.3. Statistical tools, results, and findings
Numerous traditional approaches such as Partial
Least Squares Structural Equation Modelling (PLSSEM) and regression have been applied to examine
the relationships of KHBs with their different ante­
cedents and consequences. However, the small R2
value in PLS-SEM and regression models can be
misleading about the ability of different measures
to sustainably explain the variance in the exogen­
ous constructs (Kaya et al., 2020; Wu et al., 2014).
To account for such potential difficulties, we aug­
ment our PLS-SEM approach with a fuzzy set qua­
litative comparative analysis (fsQCA). While the
PLS-SEM approach provides general tendencies of
7
the constructs towards the outcomes, fsQCA
exposes the presence of different realities regarding
the observed variables (Kaya et al., 2020). The
fsQCA relies on configuration theory, which helps
evaluate the holistic interactions among non-linear
and disordered variables. The fsQCA approach
facilitates the outcomes and predictor constructs
to be on a fuzzy scale (continuous) not on
a merely dichotomous scale (binary), as in other
QCA-based approaches (Kaya et al., 2020;
Kourouthanassis et al., 2017). Further, the PLSSEM approach provides symmetric analyses as it
calculates average effects, whereas, the scope of
the fsQCA approach can be extended to an asym­
metric analysis (Kaya et al., 2020; Rasoolimanesh
et al., 2021). In sum, the fsQCA may extend our
understanding of the research questions under
investigation in an innovative way in addition to
the PLS-SEM approach. The following sections
describe symmetric and asymmetric approaches
we adopt and their findings.
3.4. Symmetric analysis
In this study, PLS-SEM is applied for symmetric
modelling. The constructs’ reliability and validity
are measured with different indicators such as item
loadings, Cronbach’s alpha, composite reliability
(CR), rho_A, average variance extracted (AVE), con­
vergent validity, and discriminant validity. The
retained factor loadings of all constructs are above
0.700 and significant (see, Table 1, and outer values
of Figure 1; Hair et al., 2014). The convergent valid­
ity of this model is assessed with the estimations of
Cronbach’s alpha, CR, rho_A, and AVE. Table 1
presents values of Cronbach’s alpha, CR, rho_A,
and AVE that are above the recommended standards
of 0.70, 0.70, .0.70, and 0.5, respectively (Hair et al.,
2016). Fornell and Larcker’s criterion (Fornell &
Larcker, 1981) and HTMT ratios (Hair et al., 2016)
are used to confirm the discriminant validity. In
Table 2, the square root of AVE for every variable
is greater than its correlation coefficients with the
other variables. In short, the results confirm the
convergent validity and discriminant validity of the
model.
In Table 3, DII (β = −0.146, ρ = 0.045), IIP
(β = −0.152, ρ = 0.028), EPA (β = −0.165, ρ = 0.034),
and EHI (β = −0.184, ρ = 0.017) have a negative impact
on KHBs while RCC (β = −0.027, ρ = 0.637) and
OSWS (β = −0.29, ρ = 0.600) have no impact on
KHBs. Therefore, H1b, H1c, H1d, H1e are accepted
and H1a and H1f are rejected. Table 4, this study uses
bootstrapping approach with a simulation of 5,000
samples with replacement, PC significantly mediates
the impact of DII (β = −0.203, ρ = 2.878), IIP
(β = −0.189, ρ = 2.174), EPA (β = −0.182, ρ = 2.162),
8
M. W. BARI ET AL.
Table 1. Model measurement.
Variables
Reducing Chain of Command
Developing Informal Interaction
Implementing Incentive Policy
Easy Performance Appraisal
Encouraging Higher Interdependency
Open Space Workstation
KHBs
Psychological Contract
Items
RCC-1
RCC-2
RCC-3
RCC-4
DII-1
DII-2
DII-3
DII-4
DII-5
IIP-1
IIP-2
IIP-3
EPA-1
EPA-2
EPA-3
EHI-1
EHI-2
EHI-3
EHI-4
OSWS-1
OSWS-2
OSWS-3
OSWS-4
KHBs-1
KHBs-2
KHBs-3
KHBs-4
KHBs-5
KHBs-6
KHBs-7
KHBs-8
KHBs-9
KHBs-10
KHBs-11
KHBs-12
PC-1
PC-2
PC-3
PC-4
PC-5
PC-6
PC-7
PC-8
PC-9
PC-10
PC-11
Factor
Loadings
0.811
0.861
0.883
0.847
0.825
0.859
0.850
0.804
0.837
0.801
0.759
0.858
0.815
0.786
0.800
0.718
0.817
0.679
0.796
0.876
0.802
0.883
0.862
0.800
0.793
0.735
0.783
0.765
0.731
0.751
0.806
0.716
0.732
0.784
0.697
0.829
0.834
0.802
0.796
0.821
0.814
0.806
0.797
0.824
0.799
0.820
Cronbach’s Alpha
0.873
rho_A
0.875
CR
0.913
AVE
0.634
0.892
0.894
0.920
0.697
0.731
0.737
0.848
0.651
0.724
0.738
0.842
0.640
0.758
0.779
0.840
0.569
0.879
0.888
0.917
0.634
0.919
0.905
0.928
0.560
0.892
0.889
0.855
0.661
Note: CR = Composite Reliability, AVE = Average Variance Extracted
Table 2. Discriminant validity.
Fornell-Larcker Criterion
Constructs
DII
EHI
EPA
IIP
KHBs
OSWS
PC
RCC
Heterotrait-Monotrait Ratio (HTMT)
DII
EHI
EPA
IIP
KHBs OSWS
PC
RCC
0.835
0.091
0.755
0.174
0.370
0.800
0.525
0.212
0.414
0.807
−0.169 −0.111 −0.192 −0.187
0.748
0.251
0.237
0.501
0.332 −0.156 0.857
0.513
0.267
0.514
0.570 −0.183 0.465 0.813
0.247
0.233
0.474
0.255 −0.147 0.649 0.427 0.851
DII
EHI
EPA
0.118
0.204
0.646
0.176
0.275
0.555
0.284
0.455
0.279
0.137
0.259
0.295
0.249
0.536
0.206
0.623
0.606
0.586
IIP
KHBs
OSWS
PC
0.219
0.398 0.161
0.678 0.180
0.316 0.161
0.504
0.730
0.467
RCC
Note: RCC = Reducing Chain of Command, DII = Developing Informal Interaction, IIP = Implementing Incentive Policy, EPA = Easy Performance Appraisal,
EHI = Encouraging Higher Interdependency, OSWS = Open Space Work Station, KHBs = KHBss, PC = Psychological Contract
EHI (β = −0.218, ρ = 3.141), and OSWS (β = −0.141,
ρ = 1.969) on KHBs. However, PC fails to mediate
thesignificant effect of RCC on KHBs (β = −0.056,
ρ = 0.669). Thus, H2b, H2c, H2d, H2e, and H2f are
accepted based on empirical support, and H2a is
rejected due to lack of evidence. Figure 2 explains the
post analyses results.
3.5. Asymmetric analysis
The fsQCA is an asymmetric approach, which is based
on fuzzy logic and fuzzy sets. It has multiple signifi­
cances. First, beta and correlation coefficients in the
regression analysis are not sufficient to explain the
relationship between two or more constructs.
However, fuzzy sets are very effective in this scenario
KNOWLEDGE MANAGEMENT RESEARCH & PRACTICE
9
Table 3. Direct relationship.
Structural Paths
RCC→KHBs
DII→ KHBs
IIP→ KHBs
EPA→ KHBs
EHI → KHBs
OSWS → KHBs
Path co-efficient
(t-value)
−0.027, (0.472)
−0.146, (2.694)
−0.165, (3.062)
−0.152, (2.865)
−0.184, (3.711)
−0.029, (0.525)
Confidence interval (95%)
(−0.133–0.090)
(−0.289 − 0.014)
(−0.387 − 0.064)
(−0.314 − 0.038)
(−0.431–0.109)
(−0.133 0.078)
f2 Effect
size
0.001
0.026
0.023
0.032
0.038
0.001
p-Value
0.637
0.045
0.028
0.034
0.017
0.600
Results
H1a, Rejected
H1b, Accepted
H1c, Accepted
H1d, Accepted
H1e, Accepted
H1f, Rejected
Note: Note: RCC = Reducing Chain of Command, DII = Developing Informal Interaction, IIP = Implementing Incentive Policy, EPA = Easy Performance
Appraisal, EHI = Encouraging Higher Interdependency, OSWS = Open Space Work Station, KHBs = KHBs, PC = Psychological Contract
Table 4. Mediation effect.
Paths
RCC→PC→KHBs
DII→ PC→KHBs
IIP→ PC→KHBs
EPA→ PC→KHBs
EHI → PC→KHBs
OSWS → PC→KHBs
Indirect Effects
−0.056
−0.203
−0.189
−0.182
−0.218
−0.141
T Statistics
0.669
2.878
2.174
2.162
3.141
1.969
Confidence Interval (95%)
−0.213
0.110
−0.339 − 0.047
−0.304 − 0.036
−0.281 − 0.029
−0.411 − 0.059
−0.260 − 0.025
p-Value
0.502
0.020
0.021
0.024
0.013
0.048
Results
H2a, Rejected
H2b, Accepted
H2c, Accepted
H2d, Accepted
H2e, Accepted
H2f, Accepted
Note: Note: RCC = Reducing Chain of Command, DII = Developing Informal Interaction, IIP = Implementing Incentive Policy, EPA = Easy Performance
Appraisal, EHI = Encouraging Higher Interdependency, OSWS = Open Space Work Stations, KHBs = KHBs, PC = Psychological Contract
(Kaya et al., 2020; Olya & Altinay, 2016; Wu et al.,
2014) because fsQCA provides manifold solutions that
can provide the same output. Second, the effectiveness
of symmetric methods (i.e., multiple regression analy­
sis, MRA, and structural equation modelling, SEM)
while testing a model with several endogenous con­
structs that are highly correlated is questionable due to
collinearity (Olya & Altinay, 2016; Rasoolimanesh
et al., 2021). Therefore, while applying MRA and
SEM models, the big size of a sample is not helpful
to control the impact of confounding factors such as
education, experience, gender, age, etc. (Woodside,
2013).
Third, practically, an outcome of a construct
depends on the joint impact of multiple antecedents
which is known as an algorithm in an asymmetric
approach (Kaya et al., 2020; Woodside, 2013). In
symmetric methods, high values of an endogenous
construct (say A) are enough for forecasting the
occurrence of high values of an endogenous con­
struct (say B), however, a high score of (A) does not
confirm the occurrence of a high score of (B). On
the other hand, in asymmetric association, high
scores of an endogenous construct (A) are impor­
tant and enough for predicting the existence of
a high score construct (B; Kaya et al., 2020).
Fourth, the asymmetric method is conditional on
both logic (i.e., negative and positive; Woodside,
2013), because dependence on one logic can be
inappropriate.
3.5.1. Calibration
The fsQCA is based on the logic of set membership,
therefore, data should be converted into fuzzy sets
scaling from one (full membership) to zero (full nonmembership; Afonso et al., 2018; Ragin, 2009). This
study uses standardised latent variables calculated
through PLS-SEM (SmartPLS.3) for all constructs
cases (conditions & outcomes; Hair et al., 2016;
Ragin, 2009). The calibration procedure needs to
define 3 anchors: full non-membership, crossover
point, and full membership (Afonso et al., 2018;
Ragin, 2009; Silva & Goncalves, 2016). Therefore, in
this paper the rating of 3 is full membership, zero is the
crossover point, and −3 is full non-membership.
3.5.2. Necessary conditions
Necessary conditions play an important role in fsQCA
to complete the analysis of sufficient conditions
(Afonso et al., 2018; Schneider & Wagemann, 2010).
This paper investigates the two endogenous con­
structs, psychological contract, and knowledge hiding
in the PLS-SEM model as outcome conditions. While
conducting the fsQCA, six antecedent conditions for
the outcome PC (RCC, DII, IIP, EPA, EHI, and
OSWS) and seven antecedent conditions for the out­
come KHBs (RCC, DII, IIP, EPA, EHI, OSWS, and
PC) are considered. To determine whether any of the
six or seven conditions are necessary for PC or KHBs
respectively, this study measures whether the condi­
tion is consistently present or absent in all cases where
the outcome is present or absent (Kaya et al., 2020;
Rihoux & Ragin, 2008). Hence, PC or KHBs is attain­
able if the condition in question happens. The level to
which the cases follow this rule depicts “consistency”.
As per scholars’ recommendation, a relevant consis­
tency value above the threshold of 0.8 or 0.9 indicates
a condition is “almost always necessary” or “neces­
sary” respectively (Afonso et al., 2018; Ragin, 2009).
Table 5 shows the fsQCA test results on the necessity
of the conditions concerning both the outcomes PC
10
M. W. BARI ET AL.
Table 5. Analysis of necessary conditions.
S. No.
Conditions
Consistency
Outcome = PC, Consistency Cut = 0.9, Coverage Cut = 0.80
1
DII+IIP
0.945
2
DII+EPA
0.959
3
DII+OSWS
0.940
4
EPA+OSWS
0.951
Outcome = ~PC, Consistency Cut = 0.9, Coverage Cut = 0.80
1
~DII+~IIP
0.942
2
~DII+~OSWS
0.965
3
~IIP+~EPA
0.955
4
~IIP+~OSWS
0.962
Relevance of Necessity
Coverage
0.824
0.793
0.804
0.809
0.823
0.803
0.806
0.813
0.820
0.819
0.818
0.808
0.844
0.849
0.846
0.841
0.792
0.783
0.810
0.802
Outcome = KHBs, Consistency Cut = 0.9, Coverage Cut = 0.80
1
~DII+~PC
0.910
2
~IIP+~PC
0.905
Outcome = ~KHBs, Consistency Cut = 0.9, Coverage Cut = 0.80
No combination of conditions meets the criteria of the necessary condition
Note: RCC = Reducing Chain of Command, DII = Developing Informal Interaction, IIP = Implementing Incentive Policy,
EPA = Easy Performance Appraisal, EHI = Encouraging Higher Interdependency, OSWS = Open Space Work Station,
Knowledge Hiding Behaviours= KHBs, PC = Psychological Contract
and KHBs. The results present that no necessary con­
ditions are identified for PC and KHBs
3.5.3. Sufficient conditions
The truth table provides the base for the analyses of
sufficient conditions (Ragin, 2009). The fsQCA algo­
rithm is used to develop the truth tables for both out­
comes, PC, and KHBs. This study uses a frequency
threshold of 10 observations to eliminate comparatively
less significant configurations (Rihoux & Ragin, 2008).
It helps reduce truth tables for finding meaningful con­
figurations. Scholars suggest that post-frequency
restriction, a minimum of 80% of the cases should
stay in the sample set (Ragin, 2009). The frequency
threshold confirms that 83% and 88% of the cases are
part of the analyses for KHBs and PC respectively. To
confirm which configurations are sufficient for attain­
ing the outcomes, this study uses 0.80 (Ragin, 2009;
Rasoolimanesh et al., 2021) as the threshold for consis­
tency and 0.5 threshold for the proportional reduction
in inconsistency (PRI) to control the occurrence of
simultaneous subset associations of attribute
Table 6. Analysis of sufficiency.
S. No.
Conditions
Consistency
Outcome = PC, Consistency Cut = 0.9, PRI. Cut = 0.5, n. Cut = 10
1
RCC*IIP*EPA*EHI
0.976
2
RCC*IIP*EPA*OSWS
0.973
3
RCC*~DII*~IIP*EPA*~EHI
0.967
4
~DII*~IIP*EPA*EHI*~OSWS
0.963
5
~RCC*~DII*IIP*EPA*~EHI*~OSWS
0.975
6
RCC*~DII*~IIP*~EPA*EHI*OSWS
0.974
Solution 0.925 0.844 0.669
Outcome = ~PC, Consistency Cut = 0.9, PRI. Cut = 0.5, n. Cut = 10
1
~RCC*~EPA*~EHI*~OSWS
0.965
2
~DII*~IIP*~EPA*~OSWS
0.974
3
~IIP*~EPA*~EHI*~OSWS
0.971
4
~RCC*~DII*~IIP*~EHI*~OSWS
0.979
Solution
0.955
Coverage
Unique Coverage
Proportional Reduction Inefficiency (PRI)
0.673
0.694
0.547
0.575
0.533
0.544
0.014
0.021
0.012
0.021
0.013
0.027
0.872
0.863
0.571
0.474
0.510
0.592
0.665
0.879
0.662
0.630
0.789
0.041
0.701
0.008
0.023
0.826
0.879
0.856
0.883
0.826
Outcome = KHBs, Consistency Cut = 0.9, PRI. Cut = 0.5, n. Cut = 10
1
~RCC*~DII*~IIP*~EPA*~OSWS*~PC
0.900
2
~RCC*~DII*~IIP*~EHI*~OSWS*~PC
0.901
3
~RCC*~DII*~EPA*~EHI*~OSWS*~PC
0.904
4
~RCC*~IIP*~EPA*~EHI*~OSWS*~PC
0.908
5
~DII*~IIP*~EPA*~EHI*~OSWS*~PC
0.906
Solution
0.895
0.599
0.575
0.576
0.574
0.586
0.678
0.041
0.017
0.018
0.016
0.028
0.652
0.640
0.653
0.653
0.662
0.675
Outcome = ~KHBs, Consistency Cut = 0.9, PRI. Cut = 0.5, n. Cut = 10
1
RCC*~DII*~IIP*~EPA*EHI*~PC
0.943
2
RCC*~DII*~IIP*EPA*~OSWS*~PC
0.953
3
RCC*~DII*IIP*EPA*OSWS*~PC
0.957
4
RCC*DII*IIP*EPA*EHI*PC
0.964
5
RCC*DII*IIP*EPA*OSWS*PC
0.954
6
~DII*~IIP*EPA*EHI*~OSWS*~PC
0.929
7
~RCC*~DII*IIP*EPA*~EHI*~OSWS*~PC
0.941
8
~RCC*DII*IIP*~EPA*~EHI*~OSWS*~PC
0.942
9
RCC*DII*~IIP*~EPA*~EHI*~OSWS*~PC
0.942
Solution
0.859
0.522
0.506
0.531
0.620
0.633
0.528
0.494
0.522
0.492
0.793
0.014
0.001
0.007
0.005
0.010
0.008
0.003
0.014
0.006
0.600
0.643
0.675
0.757
0.718
0.538
0.564
0.575
0.506
0.496
Note: RCC = Reducing Chain of Command, DII = Developing Informal Interaction, IIP = Implementing Incentive Policy, EPA = Easy Performance Appraisal,
EHI = Encouraging Higher Interdependency, OSWS = Open Space Work Station, Knowledge Hiding Behaviours= KHBs, PC = Psychological Contract
KNOWLEDGE MANAGEMENT RESEARCH & PRACTICE
combinations in both the outcomes and their negations
as well (Afonso et al., 2018; Schneider & Wagemann,
2012, p. 242). The fsQCA software offers three types of
solutions (i.e., parsimonious, complex, and intermedi­
ate; Ragin, 2009). Table 6 reports the complex solutions
for both outcomes (PC and KHBs). The coverage and
consistency values for each solution and their specific
configurations are above the thresholds.
3.5.4. Causal recipes for the presence of the
outcomes
The complex solution for the presence of a PC has six
configurations (Table 6). For instance, configuration 1
depicts that effectively reducing the chain of com­
mand, effective implementation of incentive policy,
easy performance appraisal, and higher interdepen­
dency among employees (RCC*IIP*EPA*EHI) pro­
motes psychological contract. Similarly, the complex
solution for the presence of KHBs has five configura­
tions (Table 6). The results depict these five config­
urations are negation-based combinations of different
causal conditions. For instance, the first configuration
explains that combining negation of reducing the
chain of command, developing informal interaction,
implementation of incentive policy, easy performance
appraisal, open space workstation, and PC
(~RCC*~DII*~IIP*~EPA*~OSWS*~PC) promotes
KHBs at the workplace.
3.5.5. Causal recipes for the negation of the
outcomes
The fsQCA provides additional analyses about the
inverse of the outcome to explain which configuration
can consistently lead to the negation of the outcome
(Schneider & Wagemann, 2012). As compared to PLSSEM, the fsQCA may provide different results from
the configurations leading to the outcome (presence)
to the configurations leading to the negation of the
outcome (absence; Afonso et al., 2018; Rihoux &
Ragin, 2008). The present study also investigates
which conditions consistently lead to ~PC and
~KHBs. Table 6, the results of ~PC depict the four
configurations that have met the threshold of consis­
tency as all values are greater than 0.9. These results
show four configurations are consistently associated
with ~psychological contract. Similarly, this study
examines which conditions consistently lead to
~KHBs at the frequency threshold 10, consistency
0.9, and PRI 0.5. Table 6, The fsQCA generates nine
configurations with different combinations to negate
the KHBs. For instance, in the first configuration,
presence of reduced chain of command and higher
interdependency among employees, and in absence
of informal interactions, Incentive Policy, Easy
Performance Appraisal, and PC decrease knowledge
hiding (RCC* ~DII*~IIP* ~EPA *EHI *~PC).
11
4. Discussion
The objective of this study is to evaluate the impact of
different management strategies to mitigate knowl­
edge hiding in the workplace, and the absence of
these strategies, how KHBs develop. Besides, how psy­
chological contact mediates the impact of these man­
agement strategies on KHBs. This study uses both
symmetric (PLS-SEM) and asymmetric (fsQCA)
approaches to investigate the phenomenon. The
results of this study are based on the data provided
by 684 employees working in IT firms in Pakistan. The
final results from the PLS-SEM show that four ante­
cedents (DII, IIP, EPA, and EHI) have a significant
negative impact on KHBs, however, two antecedents
(RCC and OSWS) have no significant impact on
KHBs. PC mediates the negative impact of five ante­
cedents (DII, IIP, EPA, EHI, OSWS) on KHBs. On the
other hand, fsQCA results present a detailed under­
standing of how these six antecedent conditions sup­
port psychological contract. For instance, EPA
consistently play role in all six configurations to
develop PC (also in line with PLS-SEM results).
Similarly, RCC also consistently appears in four out
of six configurations and supports PC. In contrast,
Table 6 shows four antecedent conditions in combina­
tion impact PC negatively. For example, ~OSWS con­
sistently appears in all four conditions and confirms
that the absence of OSWS is a problem in the devel­
opment of the PC.
Table 6, considering the KHBs as an outcome,
fsQCA provides five recipes based on different ante­
cedent combinations. From these five combinations of
antecedents, ~PC and ~OSWS consistently appears in
all five recipes and confirm that the absence of PC and
OSWS promotes KHBs. Similarly, Table 6 presents
nine recipes based on different combinations of ante­
cedents that negate KHBs. In these nine recipes, the
antecedents, DII, IIP, EPA, EHI, and PC are consis­
tently absent/present to negate KHBs. The results of
the net effect present a R2 value of 52% for a PC while
the outcome of the combinatory effects presents an
overall solution coverage of 84% for PC presence and
78% for ~PC outcome condition. Similarly, the R2
value for KHBs is 46% while the analysis of the com­
bined recipe effects shows an overall solution coverage
of 67% for KHBs’ existence and 79% for the negation
of KHBs.
The results of this study are in line with previous
studies and indicate that the management strategies
(RCC, DII, IIP, EPA, HI, and OSWS) can play an
effective and significant role to decrease the KHBs
(Butt, 2020, 2020; Butt & Ahmad, 2019). PC acts as
a bridge to develop trust among workers and promote
knowledge-sharing culture (Bari, Misbah et al., 2020;
Connelly & Kevin Kelloway, 2003; Khoreva &
Wechtler, 2020). Although, all recommended
12
M. W. BARI ET AL.
management strategies (RCC, DII, IIP, EPA, EHI, and
OSWS) and PC with different combined recipes
(Table 6) play their role to change the KHBs of the
workers, however, DII, IIP, EPA, EHI, and PC con­
sistently play their role (presence/absence) in different
combinations to decrease knowledge hiding practices.
This study has conducted analyses on the responses
collected from the employees working in software
houses in Pakistan. Different software houses have
different organisational structures, places, and sizes.
Therefore, the occurrence of the phenomenon (knowl­
edge hiding) and application of the SMKH may be
different in different organisations. For instance, the
workplace of some software houses may be small and
they already have installed OSWS. Similarly, flat or
semi-flat organisational structures do not need to
focus on RCC. On the other hand, for the software
houses that already have applied the job interdepen­
dence approach, the chances of knowledge hiding may
be less as compared to other ones.
4.1. Theoretical contribution
The theoretical framework of this study is based on
SET (Blau, 1964) and it is hypothesised that certain
management strategies (RCC, DII, IIP, EPA, EHI,
OSWS; Butt & Ahmad, 2020)can help to control
KHBs of workers at the workplace. In addition, PC
can strengthen these management strategies to control
KHBs. To confirm the application of SET, this study
employs two methods PLS-SEM and fsQCA. The
results of both methods (PLS-SEM & fsQCA) con­
firms the effectiveness and significance of all proposed
SMKH (except RCC which is not significant through
PLS-SEM) to decrease the KHBs. Moreover, the said
methods also confirm the significant role of PC to
increase the efficacy of SMKH and decreasing the
KHBs. These results support Blau’ theory of social
exchange (Blau, 1964). The fsQCA approach further
elaborates the results by highlighting which individual
strategy and combinations of SMKH (Table 6) consis­
tently support SET and required to control the KHBs.
PLS-SEM based results indicate that OSWS strategy
has no direct significant effect on KHBs, however, as
a mediator, PC enhances its significance to control the
KHBs, and supports the application of SET.
should promote social interaction-based activities i.e.,
social get gathers, and open-place communication dis­
cussions. Second, managers should arrange knowl­
edge-based activities and provide awareness about
the outcomes of knowledge sharing and KHBs.
Third, although all proposed SMKH are effective to
control KHBs, however, PC is imperative. Without
mutual trust, it is very difficult for managers to moti­
vate employees to knowledge sharing. For instance,
OSWS has no direct significant effect on KHBs but
PC significantly mediates this relationship. Therefore,
managers should promote a trusting culture in the
workplace. Fourth, to build trust among employees,
job interdependence is an effective strategy (Fong
et al., 2018). Fifth, an appraisal strategy based on
reward against knowledge sharing can help control
KHBs.
4.3. Limitations and directions for future studies
This study has certain limitations and future
research directions. First, the objective of this
study is to investigate the effectiveness of SMKH
proposed by (Butt, 2020; Butt & Ahmad, 2020) in
their exploratory studies. Although the empirical
investigation in this study has proved the signifi­
cance of the SMKH, in the future, further manage­
ment strategies and practices should be explored for
the effective controlling of KHBs. Second, the appli­
cation of these SMKH is checked in one industry
(IT), and the responses of other industries may be
different. Therefore, in the future, industry-based
comparative studies are recommended. Third, dif­
ferent cultures and soft issues of human resources
can impact the significance of the SMKH differently.
Thus, in the future, cross-culture/border studies are
recommended. Fourth, the time lag method is used
for data collection which may limit the generalisa­
bility of this study. Therefore, a longitudinal study
can be conducted for the long-term application of
these strategies (Butt, 2020). Fifth, this study uses
PC as a mediator, in the future, other variables
(workplace democracy, organisational justice) as
a mediator and moderators (job interdependence)
can be checked.
Disclosure statement
4.2. Managerial implications
The outcomes have significant managerial workplace
implications because they enhance the stakeholders’
understanding of which management strategies/mea­
sures can motivate employees to avoid KHBs and
adopt knowledge-sharing behaviour. First, to promote
a knowledge-sharing culture, workplace managers
No potential conflict of interest was reported by the
author(s).
ORCID
Dr Muhammad Waseem Bari
0003-2329-3857
http://orcid.org/0000-
KNOWLEDGE MANAGEMENT RESEARCH & PRACTICE
References
Abdillah, M. R., Wu, W., & Anita, R. (2022). Can altruistic
leadership prevent knowledge-hiding behaviour? Testing
dual mediation mechanisms. Knowledge Management
Research and Practice, 20(3), 352–366. https://doi.org/
10.1080/14778238.2020.1776171
Afonso, C., Silva, G. M., Gonçalves, H. M., & Duarte, M.
(2018). The role of motivations and involvement in wine
tourists’ intention to return: SEM and fsQCA findings.
Journal of Business Research, 89(1), 313–321. https://doi.
org/10.1016/j.jbusres.2017.11.042
Anand, P., & Hassan, Y. (2019). Knowledge hiding in orga­
nizations: Everything that managers need to know.
Development and Learning in Organizations, 33(6),
12–15. https://doi.org/10.1108/DLO-12-2018-0158
Anser, M. K., Ali, M., Usman, M., Rana, M. L. T., & Yousaf,
Z. (2021). Ethical leadership and knowledge hiding: An
intervening and interactional analysis. The Service
Industries Journal, 41(5–6), 307–329.
Bari, M. W., Abrar, M., Shaheen, S., Bashir, M., &
Fanchen, M. (2019). Knowledge hiding behaviors and
team creativity: The contingent role of perceived mastery
motivational climate. SAGE Open, 9(3), 1–15. https://doi.
org/10.1177/2158244019876297
Bari, M. W., Ghaffar, M., & Ahmad, B. (2020). Knowledgehiding behaviors and employees’ silence: Mediating role
of psychological contract breach. Journal of Knowledge
Management, 1(1), 1–37. https://doi.org/10.1108/JKM02-2020-0149
Bari, M. W., Misbah, G., & Bashir, A. (2020). Knowledgehiding behaviors and employees’ silence: Mediating role
of psychological contract breach. Journal of Knowledge
Management, 24(9), 2171–2194. doi:10.1108/JKM-022020-0149.
Bashir, H., Ahmad, B., Bari, M. W., & Khan, Q. U. A. (2021).
The impact of organizational practices on formation and
development of psychological contract: Expatriates’ percep­
tion-based view. International Journal of Emerging Markets,
1–17. https://doi.org/10.1108/IJOEM-10-2020-1187
Bernatović, I., Slavec Gomezel, A., & Černe, M. (2021).
Mapping the knowledge-hiding field and its future pro­
spects: A bibliometric co-citation, co-word, and coupling
analysis. Knowledge Management Research & Practice, 20
(3), 394–409.
Blau, P. M. (1964). Social exchange theory. Sage
International. http://www.tut.ee/public/m/martmurdvee/EconPsy/5/6._EconPsy_-_Social_exchange.pdf
Bogilović, S., Černe, M., & Škerlavaj, M. (2017b). Hiding
behind a mask? Cultural intelligence, knowledge hiding,
and individual and team creativity. European Journal of
Work and Organizational Psychology, 26(5), 710–723.
https://doi.org/10.1080/1359432X.2017.1337747
Bordia, P., Irmer, B. E., & Abusah, D. (2006). Differences in
sharing knowledge interpersonally and via databases: The
role of evaluation apprehension and perceived benefits.
European Journal of Work and Organizational
Psychology, 15(3), 262–280. https://doi.org/10.1080/
13594320500417784
Butt, A. S. (2020). Mitigating knowledge hiding in firms: An
exploratory study. Baltic Journal of Management, 15(4),
631–645. https://doi.org/10.1108/BJM-01-2020-0016
Butt, A. S. (2021). Top-down knowledge hiding in buying
and supplying firms: Causes and some suggestions.
International Journal of Services and Operations
Management, 38(2), 299–307. https://doi.org/10.1504/
IJSOM.2021.113030
13
Butt, A. S., & Ahmad, A. B. (2019). Are there any antece­
dents of top-down knowledge hiding in firms? Evidence
from the United Arab Emirates. Journal of Knowledge
Management, 23(8), 1605–1627. https://doi.org/10.1108/
JKM-04-2019-0204
Butt, A. S., & Ahmad, A. B. (2020). Strategies to mitigate
knowledge hiding behavior: Building theories from mul­
tiple case studies. Management Decision, 59(6), 1291–
1311. doi:10.1108/MD-01-2020-0038.
Černe, M., Hernaus, T., Dysvik, A., & Škerlavaj, M. (2017).
The role of multilevel synergistic interplay among team
mastery climate, knowledge hiding, and job characteris­
tics in stimulating innovative work behavior. Human
Resource Management Journal, 27(2), 281–299. https://
doi.org/10.1111/1748-8583.12132
Černe, M., Nerstad, C. G. L., Dysvik, A., & Škerlavaj, M.
(2014). What goes around comes around: Knowledge
hiding, perceived motivational climate, and creativity.
Academy of Management Journal, 57(1), 172–192.
https://doi.org/10.5465/amj.2012.0122
Chaudhry, A., Coyle-Shapiro, J. A. M., & Wayne, S. J.
(2011). A longitudinal study of the impact of organiza­
tional change on transactional, relational, and balanced
psychological contracts. Journal of Leadership and
Organizational Studies, 18(2), 247–259. https://doi.org/
10.1177/1548051810385942
Chen, Y. H., Lin, T. P., & Yen, D. C. (2014). How to facilitate
inter-organizational knowledge sharing: The impact of
trust. Information and Management, 51(5), 568–578.
http://dx.doi.org/10.1016/j.im.2014.03.007
Connelly, C. E., Černe, M., Dysvik, A., & Škerlavaj, M.
(2019). Understanding knowledge hiding in
organizations. Journal of Organizational Behavior, 40(7),
779–782. https://doi.org/10.1002/job.2407
Connelly, C. E., & Kevin Kelloway, E. (2003). Predictors of
employees’ perceptions of knowledge sharing cultures.
Leadership & Organization Development Journal, 24(5),
294–301. https://doi.org/10.1108/01437730310485815
Connelly, C. E., & Zweig, D. (2015). How perpetrators and
targets construe knowledge hiding in organizations.
European Journal of Work and Organizational
Psychology, 24(3), 479–489. https://doi.org/10.1080/
1359432X.2014.931325
Connelly, C. E., Zweig, D., Webster, J., & Trougakos, J. P.
(2012). Knowledge hiding in organizations. Journal of
Organizational Behavior, 33(1), 64–88. https://doi.org/
10.1002/job
Crumpton, M. A. (2013). Is the chain of command working
for you? The Bottom Line: Managing Library Finances, 26
(3), 88–91. https://doi.org/10.1108/BL-07-2013-0017
Dai, L., & Wang, L. (2016). Psychological contract, recipro­
cal preference and knowledge sharing willingness. Open
Journal of Social Sciences, 4(8), 60–76. https://doi.org/10.
4236/jss.2016.48008
de Almeida, F. C., Lesca, H., & Canton, A. W. P. (2016).
Intrinsic motivation for knowledge sharing –
Competitive intelligence process in a telecom company.
Journal of Knowledge Management, 20(6), 1282–1301.
https://doi.org/10.1108/JKM-02-2016-0083
Demirkasımoğlu, N. (2016). Knowledge hiding in academia:
Is personality a key factor? International Journal of Higher
Education, 5(1), 128–140. https://doi.org/10.5430/ijhe.
v5n1p128
Enwereuzor, I. K., Ugwu, L. E., & Ugwu, L. I. (2022).
Unlocking the mask: How respectful engagement
enhances tacit knowledge sharing among organizational
14
M. W. BARI ET AL.
members. International Journal of Manpower, 1–20.
https://doi.org/10.1108/IJM-04-2021-0246
Evans, N. (2012). Destroying collaboration and knowledge
sharing in the workplace: A reverse brainstorming
approach. Knowledge Management Research & Practice,
10(2), 175–187. https://doi.org/10.1057/kmrp.2011.43
Fischer, C. (2022). Incentives can’t buy me knowledge: The
missing effects of appreciation and aligned performance
appraisals on knowledge sharing of public employees.
Review of Public Personnel Administration, 42(2),
368–389. https://doi.org/10.1177/0734371X20986839
Fong, P. S. W., Men, C., Luo, J., & Jia, R. (2018). Knowledge
hiding and team creativity: The contingent role of task
interdependence. Management Decision, 56(2), 329–343.
https://doi.org/10.1108/MD-11-2016-0778
Fornell, C., & Larcker, D. F. (1981). Structural equation
models with unobservable variables and measurement
error: Algebra and statistics. Journal of Marketing
Research, 18(3), 382–388. https://doi.org/10.1177/
002224378101800313
Guest, D. E. (2004). The psychology of the employment
relationship: An analysis based on the psychological
contract. Applied Psychology, 53(4), 541–555. https://doi.
org/10.1111/j.1464-0597.2004.00187.x
Hair, J. F., Jr, Hult, G. T. M., Ringle, C., & Sarstedt, M.
(2016). A primer on partial least squares structural equa­
tion modeling (PLS-SEM) (2nd) ed.).
Hair, J. F., Jr, Sarstedt, M., Hopkins, L., &
Kuppelwieser, V. G. (2014). Partial least squares struc­
tural equation modeling (PLS-SEM).An emerging tool in
business research. European Business Review, 26(2),
106–121. https://doi.org/10.1108/EBR-10-2013-0128
Han, M. S., Masood, K., Cudjoe, D., & Wang, Y. (2020).
Knowledge hiding as the dark side of competitive psy­
chological climate. Leadership and Organization
Development Journal, 42(2), 195–207. doi:10.1108/
LODJ-03-2020-0090.
He, M. R., & Li, Y. J. (2011). An empirical study on the
influence of psychological contract types on the tacit
knowledge sharing willingness. Journal of Management,
8(1), 56–60.
Hernaus, T., Dysvik, A., & Behaviour, O. (2017). The role of
multilevel synergistic interplay among team mastery cli­
mate, knowledge hiding, and job characteristics in stimu­
lating innovative work behavior. 27(2), 281–299. https://
doi.org/10.1111/1748-8583.12132
Hobfoll, S. E. (1989). Conservation of resources: A new
attempt at conceptualizing stress. American Psychologist,
44(3), 513–520. https://doi.org/10.1037/0003-066X.44.3.
513
Huo, W., Cai, Z., Luo, J., Men, C., & Jia, R. (2016).
Antecedents and intervention mechanisms: A multilevel study of R&D team’s knowledge hiding behavior.
Journal of Knowledge Management, 20(5), 880–897.
https://doi.org/10.1108/JKM-11-2015-0451
Johnson, D. W. (2003). Social interdependence:
Interrelationships among theory, research, and practice.
American Psychologist, 58(11), 934. https://doi.org/10.
1037/0003-066X.58.11.934
Kaya, B., Abubakar, A. M., Behravesh, E., Yildiz, H., &
Mert, I. S. (2020). Antecedents of innovative perfor­
mance: Findings from PLS-SEM and fuzzy sets (fsQCA).
Journal of Business Research, 114(April), 278–289. https://
doi.org/10.1016/j.jbusres.2020.04.016
Khoreva, V., & Wechtler, H. (2020). Exploring the conse­
quences of knowledge hiding: An agency theory
perspective. Journal of Managerial Psychology, 35(2),
71–84. https://doi.org/10.1108/JMP-11-2018-0514
Kim, B., Kim, E., Kim, Y., & Cho, J. Y. (2018). Where to find
innovative ideas: Interdependence-building mechanisms
and boundary-spanning exploration. Knowledge
Management Research & Practice, 16(3), 376–387.
https://doi.org/10.1080/14778238.2018.1493367
Kingshott, R. P. J. (2006). The impact of psychological con­
tracts upon trust and commitment within supplier –
Buyer relationships: A social exchange view. Industrial
Marketing Management, 35(6), 724–739. doi:10.1016/j.
indmarman.2005.06.006.
Koon, V. Y. (2022). The role of organizational compassion
in knowledge hiding and thriving at work. Knowledge
Management Research & Practice, 20(3), 486–501.
Kou, C. Y. (2020). Subjective interdependencies in knowl­
edge integration. Knowledge Management Research and
Practice, 18(4), 394–404. https://doi.org/10.1080/
14778238.2019.1678413
Kourouthanassis, P. E., Mikalef, P., Pappas, I. O., &
Kostagiolas, P. (2017). Explaining travellers online infor­
mation satisfaction: A complexity theory approach on
information needs, barriers, sources and personal
characteristics. Information & Management, 54(6),
814–824. https://doi.org/10.1016/j.im.2017.03.004
Lee, H., Reid, E., & Kim, W. G. (2014). Understanding
knowledge sharing in online travel communities:
Antecedents and the moderating effects of interaction
modes. Journal of Hospitality & Tourism Research, 38
(2), 222–242. https://doi.org/10.1177/1096348012451454
Miminoshvili, M., & Černe, M. (2021). Workplace inclu­
sion–exclusion and knowledge-hiding behavior of min­
ority members. Knowledge Management Research &
Practice, 20(3), 422–435.
Neill, B. S. O., & Adya, M. (2007). Knowledge sharing and
the psychological contract stages of employment. 22(4),
411–436. https://doi.org/10.1108/02683940710745969
Ng, T. W. H., Feldman, D. C., & Butts, M. M. (2014).
Psychological contract breaches and employee voice
behaviour: The moderating effects of changes in social
relationships. European Journal of Work and
Organizational Psychology, 23(4), 537–553. https://doi.
org/10.1080/1359432X.2013.766394
Olya, H. G. T., & Altinay, L. (2016). Asymmetric modeling
of intention to purchase tourism weather insurance and
loyalty. Journal of Business Research, 69(8), 2791–2800.
https://doi.org/10.1016/j.jbusres.2015.11.015
Pan, W., Zhang, Q., Teo, T. S. H., & Lim, V. K. G. (2018).
The dark triad and knowledge hiding. International
Journal of Information Management, 42(2), 36–48.
https://doi.org/10.1016/j.ijinfomgt.2018.05.008
Peng, H. (2013). Why and when do people hide knowledge?
Journal of Knowledge Management, 17(3), 398–415.
https://doi.org/10.1108/JKM-12-2012-0380
Perumal, S., & Sreekumaran Nair, S. (2022). Impact of views
about knowledge and workplace relationships on tacit
knowledge sharing. Knowledge Management Research
and Practice, 20(3), 410–421. https://doi.org/10.1080/
14778238.2021.1947756
PSEB. (2020). Company Directory. Pakistan Software Export
Board. https://pseb.org.pk/app/company_directory.php
Ragin, C. C. (2009). Redesigning social inquiry Fuzzy sets and
beyond. University of Chicago Press.
Rasoolimanesh, S. M., Ringle, C. M., Sarstedt, M., & Olya, H.
(2021). The combined use of symmetric and asymmetric
approaches: Partial least squares-structural equation
modeling and fuzzy-set qualitative comparative analysis.
KNOWLEDGE MANAGEMENT RESEARCH & PRACTICE
International Journal of Contemporary Hospitality
Management, 33(5), 1571–1592. https://doi.org/10.1108/
IJCHM-10-2020-1164
Rihoux, B., & Ragin, C. C. (2008). Configurational compara­
tive methods: Qualitative comparative analysis (QCA) and
related techniques. Sage Publications.
Rousseau, D. M. (1989). Psychological and implied con­
tracts in organizations. Employee Responsibilities and
Rights Journal, 2(2), 121–139. https://doi.org/10.1007/
BF01384942
Rousseau, D. M. (1996). Psychological contract measures.
Carnegie Mellon University.
Rousseau, D. M., & Tijoriwala, S. A. (1999). What’s a good
reason to change? Motivated reasoning and social
accounts in promoting organizational change. Journal of
Applied Psychology, 84(4), 514–528.
Schalk, R., & Roe, R. E. (2007). Towards a dynamic model of
the psychological contract. Journal for the Theory of Social
Behaviour, 37(2), 167–182. https://doi.org/10.1111/j.
1468-5914.2007.00330.x
Schneckenberg, D. (2009). Web 2.0 and the empowerment of
the knowledge worker. Journal of Knowledge Management,
13(6), 509–520. https://doi.org/10.1108/
13673270910997150
Schneider, C. Q., & Wagemann, C. (2010). Standards of
good practice in qualitative comparative analysis (QCA)
and fuzzy-sets. Comparative Sociology, 9(3), 397–418.
https://doi.org/10.1163/156913210X12493538729793
Schneider, C. Q., & Wagemann, C. (2012). Set-theoretic
methods for the social sciences: A guide to qualitative
comparative analysis. Cambridge University Press.
Serenko, A., & Bontis, N. (2016). Understanding counter­
productive knowledge behavior: Antecedents and conse­
quences of intra-organizational knowledge hiding.
Journal of Knowledge Management, 20(6), 1199–1224.
https://doi.org/10.1108/JKM-05-2016-0203
Shaheen, S., Bari, M. W., Hameed, F., & Anwar, M. M.
(2019). Organizational cronyism as an antecedent of
ingratiation: Mediating role of relational psychological
contract. Frontiers in Psychology, 10(1), 1–20. https://
doi.org/10.3389/fpsyg.2019.01609
Silva, G. M., & Goncalves, H. M. (2016). Causal recipes for
customer loyalty to travel agencies: Differences between
15
online and offline customers. Journal of Business
Research, 69(11), 5512–5518. https://doi.org/10.1016/j.
jbusres.2016.04.163
Suppiah, V., & Sandhu, M. S. (2011). Organisational cul­
ture’s influence on tacit knowledge-sharing behaviour.
Journal of Knowledge Management, 15(3), 462–477.
doi:10.1108/13673271111137439.
Webster, J., Brown, G., Zweig, D., Connelly, C. E., Brodt, S.,
& Sitkin, S. (2008). Beyond knowledge sharing:
Withholding knowledge at work. Research in Personnel
and Human Resources Management, 27(8), 1–37. https://
doi.org/10.1016/S0742-7301(08)
Woodside, A. G. (2013). Moving beyond multiple regression
analysis to algorithms: Calling for adoption of a paradigm
shift from symmetric to asymmetric thinking in data
analysis and crafting theory. Journal of Business Re, 66
(4), 463–472. https://doi.org/10.1016/j.jbusres.2012.12.
021
Wu, P.-L., Yeh, -S.-S., Woodside, A. G., & Woodside, A. G.
(2014). Applying complexity theory to deepen service
dominant logic: Configural analysis of customer
experience-and-outcome assessments of professional ser­
vices for personal transformations. Journal of Business
Research, 67(8), 1647–1670. https://doi.org/10.1016/j.
jbusres.2014.03.012
Xiao, M., & Cooke, F. L. (2018). Why and when knowledge
hiding in the workplace is harmful: A review of the
literature and directions for future research in the
Chinese context. Asia Pacific Journal of Human
Resources, 57(4), 470–502. https://doi.org/10.1111/17447941.12198
Zhang, L., & Deng, Y. (2014). Guanxi with supervisor and
counterproductive work behavior: The mediating role of
job satisfaction. Journal of Business Ethics, 134(3),
413–427. https://doi.org/10.1007/s10551-014-2438-7
Zhang, Z., & Min, M. (2021). Organizational rewards and
knowledge hiding: Task attributes as contingencies.
Management Decision, 59(10), 2385–2404. https://doi.
org/10.1108/MD-02-2020-0150
Zhang, Y., Ren, T., & Li, X. (2018). Psychological con­
tract and employee attitudes. Chinese Management
Studies, 13(1), 26–50. https://doi.org/10.1108/cms-062017-0171
Download