The Mutual Knowledge Problem and Its Consequences for Dispersed Collaboration
Organization Science
Informational Influence in Organizations: An Integrated Approach to Knowledge Adoption
Information Systems Research
Out of Sight, Out of Sync: Understanding Conflict in Distributed Teams
Organization Science
Transactive Memory Systems in Organizations: Matching Tasks, Expertise, and People
Organization Science
The Economic Incentives for Sharing Security Information
Information Systems Research
Information Systems Research
Supporting Collaboration in Heterogeneous Environments
Journal of Management Information Systems
Poaching and the Misappropriation of Information: Transaction Risks of Information Exchange
Journal of Management Information Systems
Information Exploitation and Interorganizational Systems Ownership
Journal of Management Information Systems
Journal of Management Information Systems
Expertise Integration and Creativity in Information Systems Development
Journal of Management Information Systems
Just Right Outsourcing: Understanding and Managing Risk
Journal of Management Information Systems
Exploring Perceptions of Organizational Ownership of Information and Expertise
Journal of Management Information Systems
Team Knowledge and Coordination in Geographically Distributed Software Development
Journal of Management Information Systems
Intrusion Prevention in Information Systems: Reactive and Proactive Responses
Journal of Management Information Systems
Market Reactions to Information Security Breach Announcements: An Empirical Analysis
International Journal of Electronic Commerce
Journal of Management Information Systems
An Economic Analysis of Policies for the Protection and Reuse of Noncopyrightable Database Contents
Journal of Management Information Systems
Journal of Management Information Systems
The Deterrent and Displacement Effects of Information Security Enforcement: International Evidence
Journal of Management Information Systems
Understanding the Value of Countermeasure Portfolios in Information Systems Security
Journal of Management Information Systems
Videoconferencing in the Field: A Heuristic Processing Model
Management Science
Geography, Networks, and Knowledge Flow
Organization Science
Information Systems Research
How Knowledge Validation Processes Affect Knowledge Contribution
Journal of Management Information Systems
How does social software change knowledge management? Toward a strategic research agenda
The Journal of Strategic Information Systems
A heuristic-systematic model of end-user information processing when encountering IS exceptions
Information and Management
Hi-index | 0.00 |
In many domains of increased turbulence and volatility, interorganizational ad hoc collaborations are common. One such domain is homeland security in which security professionals collaborate virtually with individuals outside of their own organizations in response to a security threat. In such a domain, a safe context is needed to ensure that interactions with collaborators not only help to solve the immediate threat but also avoid the improper use by outside parties of information released during these collaborations. We use the heuristic systematic model of information processing to hypothesize that the relationship between different safe context factors and a security professional's perceptions of collaboration success will be contingent on differences in geographic proximity of the collaborating parties-differences in proximity that are not related to differences in physical face-to-face contact but to differences in social proximity. Our exploratory empirical investigation finds support for the hypothesized interaction effect: safe contexts that require deeper processing are related to higher levels of perceived success when the parties are geographically proximal (with no differences in face-to-face contact), whereas safe contexts that involve heuristic-based processing are related to success when parties are geographically less proximal. Our findings suggest that the utility of safe context factors is contextualized based on the proximity of interacting parties, that geographical proximity's social space dimension plays a key role independent of differences in physical face-to-face contact, and that, practically, to be successful, ad hoc collaborators should have access to a range of safe context factors, using them in different combinations depending on the proximity of network members.